1. This site uses cookies. By continuing to use this site, you are agreeing to our use of cookies. Learn More.

rv042 vpn has calls dropping

Discussion in 'Cisco Small Business Routers and VPN Solutions' started by mjahall, Jun 14, 2011.

  1. mjahall

    mjahall Networkin' Nut Member

    Hi, I set up a vpn on a rv042. This goes to a sonicwall tz210. I have some IP phones running accross this VPN. I have received a notice the past two days saying calls drop across the VPN sometimes. (This vpn is 4 days old). I looked at the log from the rv042 during the time the last call dropped and pasted below. Can someone identify what can be wrong?

    Thanks

    Jun 14 12:06:25 2011 VPN Log Ignoring Vendor ID payload [404bf439522ca3f6]
    Jun 14 12:06:25 2011 Connection Accepted UDP 173.161.64.93:500->70.89.220.5:500 on ixp1
    Jun 14 12:06:25 2011 VPN Log Ignoring Vendor ID payload [5b362bc820f60007]
    Jun 14 12:06:25 2011 VPN Log Ignoring Vendor ID payload [4a131c8107035845...]
    Jun 14 12:06:25 2011 VPN Log Ignoring Vendor ID payload Type = [draft-ietf-ipsec-nat-t-ike-03]
    Jun 14 12:06:25 2011 VPN Log Ignoring Vendor ID payload Type = [draft-ietf-ipsec-nat-t-ike-02_n]
    Jun 14 12:06:25 2011 VPN Log Ignoring Vendor ID payload Type = [draft-ietf-ipsec-nat-t-ike-00]
    Jun 14 12:06:25 2011 VPN Log Ignoring Vendor ID payload [da8e937880010000]
    Jun 14 12:06:25 2011 VPN Log Received Vendor ID payload Type = [Dead Peer Detection]
    Jun 14 12:06:25 2011 VPN Log Ignoring Vendor ID payload Type = [XAUTH]
    Jun 14 12:06:25 2011 VPN Log [Tunnel Negotiation Info] <<< Responder Received Aggressive Mode 1st packet
    Jun 14 12:06:25 2011 VPN Log Aggressive mode peer ID is ID_IPV4_ADDR: '173.161.64.93'
    Jun 14 12:06:25 2011 VPN Log Responding to Aggressive Mode from 173.161.64.93
    Jun 14 12:06:25 2011 VPN Log [Tunnel Negotiation Info] >>> Responder Send Aggressive Mode 2nd packet
    Jun 14 12:06:25 2011 VPN Log ignoring Delete SA payload: ISAKMP SA not found (maybe expired)
    Jun 14 12:06:25 2011 VPN Log [Tunnel Negotiation Info] <<< Responder Received Aggressive Mode 3rd packet
    Jun 14 12:06:25 2011 VPN Log Aggressive mode peer ID is ID_IPV4_ADDR: '173.161.64.93'
    Jun 14 12:06:25 2011 VPN Log [Tunnel Negotiation Info] Aggressive Mode Phase 1 SA Established
    Jun 14 12:06:25 2011 VPN Log [Tunnel Negotiation Info] Initiator Cookies = cec4 b68c df88 bcc4
    Jun 14 12:06:25 2011 VPN Log [Tunnel Negotiation Info] Responder Cookies = 7f56 6ef8 4b30 dee6
    Jun 14 12:07:31 2011 VPN Log Received informational payload, type INVALID_COOKIE
     

Share This Page