I am wondering if anyone tried to configure a Net to Net IPSEC tunnel using the Linksys VPN Router (BEFVP41). On the surface, it seems to support the right authentication and encryption methods (3DES, MD5, PFS, and IKE), but after configuring a tunnel (PFS:Y, SA:ike, with a shared secret) I get this from my ASL log:
peer: c0 a8 00 32
peer: c0 a8 00 32
sending:
state hash entry 1
state hash entry 23
state object #13 found, in STATE_MAIN_I1
state object not found
state transition function for STATE_MAIN_I1 failed: NO_PROPOSAL_CHOSEN
This is an exerpt from the linksys log:
IKE[1] Rx > MM_R1 : 192.168.0.100
IKE[1] ISAKMP SA CKI=[ca017c73 b49c9d49] CKR=[1883e3bb d856873]
IKE[1] ISAKMP SA 3DES / SHA / PreShared / MODP_1024 / 3600 sec
IKE[1] TX >> MM_I1 : 192.168.0.100
IKE[1] Rx > MM_R1 : 192.168.0.100
IKE[1] ISAKMP SA CKI=[ca017c73 b49c9d49] CKR=[d8c497d5 87bec920]
IKE[1] ISAKMP SA 3DES / SHA / PreShared / MODP_1024 / 3600 sec
192.168.0.100 is the asl address. The external ips are on the same subnet, so there is no NAT or connectivity issue. The internal subnets are 192.168.2.0/24 and 192.168.1.0/24. They are talking, but probably not speaking the same language. If anyone has any ideas, I'll give them a try.
This thread was automatically locked due to age.