Guest User!

You are not Sophos Staff.

This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

IPsec Connection Problem: EST-P1: Malformed paylod in packet. Verify preshared secrets at both the ends

Hi guys!

I have some problem about IPsec site-to-site VPN between 2 locations. And my error logs giving these datas:

2017-05-18 11:27:15
IPsec
FAILED
-
EST-P1: Malformed paylod in packet. Verify preshared secrets at both the ends
17858
2017-05-18 11:27:15
IPsec
SUCCESSFUL
-
EST-P1: System did not accept any proposal received. Need to reconfigure the connection on either of the ends
17854
2017-05-18 11:26:45
IPsec
SUCCESSFUL
-
packet from REMOTEIP:500: NAT-T: Remote Server is behind NAT device
17876
2017-05-18 11:26:45
IPsec
SUCCESSFUL
-
"NVI_IPsec-1" SA-MGT: Initiating rekeying of connection's main mode SA 31
17884
2017-05-18 11:26:45
IPsec
FAILED
-
NVI_IPsec-1 EST-P1: Max number of retransmission 2 reached. No response to first encrypted message
17857
2017-05-18 11:26:05
IPsec
FAILED
-
EST-P1: Malformed paylod in packet. Verify preshared secrets at both the ends
17858
2017-05-18 11:26:05
IPsec
SUCCESSFUL
-
EST-P1: System did not accept any proposal received. Need to reconfigure the connection on either of the ends
17854
2017-05-18 11:25:34
IPsec
SUCCESSFUL
-
packet from REMOTEIP:500: NAT-T: Remote Server is behind NAT device
17876
2017-05-18 11:25:34
IPsec
SUCCESSFUL
-
"NVI_IPsec-1" SA-MGT: Initiating rekeying of connection's main mode SA 30
17884
2017-05-18 11:25:34
IPsec
SUCCESSFUL
-
"NVI_IPsec-1" SA-MGT: Phase1 SA is being re-keyed
17886
2017-05-18 11:25:14
IPsec
FAILED
-
EST-P1: Malformed paylod in packet. Verify preshared secrets at both the ends
17858

Do you have an idea? An another question about IPsec. How can I change IPSEC Protocol to ESP?

Ali Erdem Sunar



This thread was automatically locked due to age.
Parents Reply
  • Ferrara,

    I found otherside's FW! It's Cisco! Below the details:

    IPsec Details:

    Name: XYZ_IPsec
    Connection Type: Site-to-Site
    Policy: XYZ Policy (I created customly)
    Action on VPN Restart: Respond Only
    Authentication Type: Preshared Key
    Local: PORT-2-WAN-IP
    Remote: REMOTEIP
    Local Subnet: project.local (192.168.23.0/24)
    NATed LAN: Same as Local LAN address
    Remote Allow NAT Traversal: Disabled
    Remote LAN Network: center.local (172.23.0.0/16)

    XYZ IPSec Policy Details:

Children