WRVS4400N w/VPN - Logging websites visited with IP addresses or usernames?

I just recently added this new router to my network, it does much better than our old one (a motorola modem/router)
I want to see the websites and web activity performed by my employees with this network.  I was told that it was available and before i did the firmware upgrade, i thought i was able to (under VPN log)  anyways I am a n00b with this, can anyone help me understand how to view activity logs.  (I can view ACL, but not VPN or system)

Thank you for responding to my cry for help, David.
I'm confused, though.  I thought that's what the access-list 190 does.  Are you saying I need a second ip route statement?  Or, am I missing an access list item that allows that traffic back out from the LAN to the vpn users?
In a nutshell, I'm not sure how to implement your suggestion.  If possible, could you give me an example?
Thanks again!
Dave

Similar Messages

  • Log into Disco with email address

    Hi, I have database users that use their email address to log into the application.
    They cant do this to log into Discoverer - Ho do you get around this?
    Thanks

    If you're trying to connect into Discoverer, then you have either an 'Apps' EUL or a 'standard' EUL. Apps interfaces to Oracle Apps (Enterprise Suite). If an 'Apps' EUL the usernames would have to be allowed as Oracle Apps usernames. If allowed, then would probably be okay in Disco as it just considers the username as an Oracle Apps username.
    If a 'standard' EUL, then the users are database names (ie: schemas) and again, would have to be a legal database username to work.
    The '@' would be something I'd wonder about right away.
    Russ

  • I delete my browser history but websites visited still show up in Search mode. Why?

    How can the browser history really be deleted so nothing shows up when a search is being done?  When I follow the traditional steps to delete the browser history, it shows the history as being cleared, but any letter typed in Search mode will show any websites visited with that letter in the name...  So how do I really delete the browser history, so nothing shows up under search?  And yes, I know you can take the browser info off the search mode, but that doesn't clear the info.  If you put the browser back on search, it's all still there.

    Don't wipe your phone!!!  its a pain in the back side re-installing everything back

  • WRVS4400N [VPN log]: shutting down

    Ive setup a few WRVS4400N over the past 6 months, and have been receiving the below message from some of them every couple of hours.
    What does the message indicate? Any action to take?
    Thanks
    +++++++++++++++++++++++++++++++
    Sep 18 07:03:35  - [VPN Log]: shutting down
    Sep 18 07:03:35  - IPSEC EVENT: KLIPS device ipsec0 shut down.
    Sep 18 07:03:37  - [VPN Log]: Starting Pluto (Openswan Version cvs2006Jan12_11:29:56 X.509-1.5.4 PLUTO_SENDS_VENDORID PLUTO_USES_KEYRR; Vendor ID OE@ECqImzhFD)
    Sep 18 07:03:37  - [VPN Log]: @(#) built on May 10 2011:17:24:48:
    Sep 18 07:03:37  - [VPN Log]: Setting NAT-Traversal port-4500 floating to on
    Sep 18 07:03:37  - [VPN Log]:    port floating activation criteria nat_t1/port_fload1
    Sep 18 07:03:37  - [VPN Log]:   including NAT-Traversal patch (Version 0.6c)
    Sep 18 07:03:37  - [VPN Log]: ike_alg_register_enc(): Activating OAKLEY_AES_CBC: Ok (ret0)
    Sep 18 07:03:37  - [VPN Log]: starting up 1 cryptographic helpers
    Sep 18 07:03:37  - [VPN Log]: started helper pid 739 (fd:5)
    Sep 18 07:03:37  - [VPN Log]: Using KLIPS IPsec interface code on 2.4.27-star
    Sep 18 07:03:37  - [VPN Log]: Changing to directory '/etc/ipsec.d/cacerts'
    Sep 18 07:03:37  - [VPN Log]: Changing to directory '/etc/ipsec.d/aacerts'
    Sep 18 07:03:37  - [VPN Log]: Changing to directory '/etc/ipsec.d/ocspcerts'
    Sep 18 07:03:37  - [VPN Log]: Changing to directory '/etc/ipsec.d/crls'
    Sep 18 07:03:37  - [VPN Log]:   Warning: empty directory
    +++++++++++++++++++++++++++++++

    And im also getting this for an RVS4000
    Sep 25 18:27:42  - Receive NTP Reply from ntp-1.mcs.anl.gov
    Sep 25 18:27:46  - [VPN Log]: shutting down
    Sep 25 18:27:47  - IPSEC EVENT: KLIPS device ipsec0 shut down.
    Sep 25 18:27:48  - [VPN Log]: Starting Pluto (Openswan Version cvs2006Jan12_11:29:56 X.509-1.5.4 PLUTO_SENDS_VENDORID PLUTO_USES_KEYRR; Vendor ID OE@ECqImzhFD)
    Sep 25 18:27:48  - [VPN Log]: @(#) built on May 12 2011:16:06:15:
    Sep 25 18:27:48  - [VPN Log]: Setting NAT-Traversal port-4500 floating to on
    Sep 25 18:27:48  - [VPN Log]:    port floating activation criteria nat_t1/port_fload1
    Sep 25 18:27:48  - [VPN Log]:   including NAT-Traversal patch (Version 0.6c)
    Sep 25 18:27:48  - [VPN Log]: ike_alg_register_enc(): Activating OAKLEY_AES_CBC: Ok (ret0)
    Sep 25 18:27:48  - [VPN Log]: starting up 1 cryptographic helpers
    Sep 25 18:27:48  - [VPN Log]: started helper pidW48 (fd:5)
    Sep 25 18:27:48  - [VPN Log]: Using KLIPS IPsec interface code on 2.4.27-star
    Sep 25 18:27:48  - [VPN Log]: Changing to directory '/etc/ipsec.d/cacerts'
    Sep 25 18:27:48  - [VPN Log]: Changing to directory '/etc/ipsec.d/aacerts'
    Sep 25 18:27:48  - [VPN Log]: Changing to directory '/etc/ipsec.d/ocspcerts'
    Sep 25 18:27:48  - [VPN Log]: Changing to directory '/etc/ipsec.d/crls'
    Sep 25 18:27:48  - [VPN Log]:   Warning: empty directory

  • WRVS4400N quickvpn Vpn client accounts

                       Hello everyone, i'm new to cisco forum and i salute you all.
         Now lets get to business...hahaha
         Well i configured client account on the wrvs4400n v2 to use with quickvpn.
         3 of the 5 users created works fine when connecting to router but the other ones doesnt connect good.
         They all got the same client .pem install in Quickvpn.
         Let's say i try connecting with user num.2 with quickvpn it doesnt want to connect, it says connecting, for long time but noting happens.
         But when i look in VPN Summary on router it shows as connected?
             Any clue on whats going on?
         Thanx Pastload.

    Hello mpyhala, thanks for the quick reply.
    Yes i did try it on different PC. I can connect with no issue with my account on both PC with the same config. But not with user 2 and user 3. There is one error message about certificat, but if you click 'no' it will connect anyway, it works for the 3 users but not with the other 2's.
    And yes i did uninstalled quickvpn twice (clean uninstalled). And no change, still can not connect with user 2 and 3. I have deleted user 2 and 3 and created different user with different password and still the same.
    But if i look in vpn summary it shows user 2 as connected. But the quickvpn still showing ' connecting ' and it give me nothing.
    Does someone knows how is this possible? Do you need Logs.
    I notice that when establishing connection with my user the wget.exe make the connection and disconnect after connection is made.
    But the 2 other users the connection establishes with wget.exe but it doesnt close connection. It stays connected until i close it my self.
    Dont know if it could help.      
    Update:
    User 1
    2013/07/10 20:05:13 [STATUS]OS Version: Windows 7
    2013/07/10 20:05:13 [STATUS]Windows Firewall Domain Profile Settings: ON
    2013/07/10 20:05:13 [STATUS]Windows Firewall Private Profile Settings: ON
    2013/07/10 20:05:13 [STATUS]Windows Firewall Private Profile Settings: ON
    2013/07/10 20:05:13 [STATUS]One network interface detected with IP address 192.168.1.101
    2013/07/10 20:05:13 [STATUS]Connecting...
    2013/07/10 20:05:13 [DEBUG]Input VPN Server Address = xx.37.1.xx
    2013/07/10 20:05:13 [STATUS]Connecting to remote gateway with IP address: xx.37.1.xx
    2013/07/10 20:05:14 [WARNING]Server's certificate doesn't exist on your local computer.
    2013/07/10 20:05:18 [STATUS]Remote gateway was reached by https ...
    2013/07/10 20:05:18 [STATUS]Provisioning...
    2013/07/10 20:05:28 [STATUS]Success to connect.
    2013/07/10 20:05:28 [STATUS]Tunnel is configured. Ping test is about to start.
    2013/07/10 20:05:28 [STATUS]Verifying Network...
    2013/07/10 20:05:34 [WARNING]Failed to ping remote VPN Router!
    *This user is connecting to router  (Working)*
    2013/07/10 20:07:03 [STATUS]Disconnecting...
    2013/07/10 20:07:09 [STATUS]Success to disconnect.
    User 2
    2013/07/10 20:07:25 [STATUS]OS Version: Windows 7
    2013/07/10 20:07:25 [STATUS]Windows Firewall Domain Profile Settings: ON
    2013/07/10 20:07:25 [STATUS]Windows Firewall Private Profile Settings: ON
    2013/07/10 20:07:25 [STATUS]Windows Firewall Private Profile Settings: ON
    2013/07/10 20:07:25 [STATUS]One network interface detected with IP address 192.168.1.101
    2013/07/10 20:07:25 [STATUS]Connecting...
    2013/07/10 20:07:25 [DEBUG]Input VPN Server Address = xx.37.1.xx
    2013/07/10 20:07:25 [STATUS]Connecting to remote gateway with IP address: xx.37.1.xx
    2013/07/10 20:07:26 [WARNING]Server's certificate doesn't exist on your local computer.
    2013/07/10 20:15:34 [WARNING]Failed to connect.
    *This user doesnt connect why?*
    * It hangs on Connecting in QuickVpn*
    Same machine, same setting
    --20:15:34-- 
    https:// User 2: *password*@xx.37.1.xx :60443/StartConnection.htm?version=1?IP=192.168.1.101?PASSWD=*password*?USER=User 2
               => `C://Program Files//Cisco Small Business//QuickVPN Client//vpnserver.conf'
    Connecting to xx.37.1.xx:60443... connected.
    HTTP request sent, awaiting response...
    Read error (Unknown error) in headers.
    Giving up.

  • SSL VPN on Cisco 1941 with Firewall woes

    Hi Folks,
    Been trying to setup SSL VPN on a 1941 with limited sucess.
    I can get the VPN configured and working but as soon as enable the firewall it blocks the VPN
    The VPN connects and I can ping the internal gateway address from a remote client  but I can't
    connect to any of the internal Lan address.
    Been round and round in circles, any help appreciated.
    Cheers
    Building configuration...
    Current configuration : 9532 bytes
    ! Last configuration change at 13:08:29 UTC Sun Feb 23 2014 by admin
    version 15.2
    service timestamps debug datetime msec
    service timestamps log datetime msec
    no service password-encryption
    hostname router
    boot-start-marker
    boot-end-marker
    no logging buffered
    enable secret 4 xxxxx
    aaa new-model
    aaa authentication login default local
    aaa authorization exec default local
    aaa session-id common
    ip cef
    ip name-server 8.8.8.8
    ip name-server 4.4.4.4
    no ipv6 cef
    multilink bundle-name authenticated
    crypto pki trustpoint my-gw-ca
    enrollment selfsigned
    subject-name Cn=gw
    revocation-check crl
    rsakeypair gw-rsa
    crypto pki trustpoint test_trustpoint_config_created_for_sdm
    subject-name [email protected]
    revocation-check crl
    crypto pki certificate chain my-gw-ca
    certificate self-signed 01
      30820320 30820208 A0030201 02020101 300D0609 2A864886 F70D0101 05050030
      DAC0F948 A5B56EDD CD6DABBD 47463AB2 7E3F0DC3 DF4ECCE6 EAC5E916 B83DA4D0 C3119E9B
                quit
    crypto pki certificate chain test_trustpoint_config_created_for_sdm
    license udi pid CISCO1941/K9 sn
    username aaa privilege 15 secret 4
    username bbb privilege 0 secret 4
    username ccc privilege 15 view root secret 4
    redundancy
    class-map type inspect match-all CCP_SSLVPN
    match access-group name CCP_IP
    class-map type inspect match-any ccp-skinny-inspect
    match protocol skinny
    class-map type inspect match-any SDM_WEBVPN
    match access-group name SDM_WEBVPN
    class-map type inspect match-any ccp-h323nxg-inspect
    match protocol h323-nxg
    class-map type inspect match-any ccp-cls-icmp-access
    match protocol icmp
    match protocol tcp
    match protocol udp
    class-map type inspect match-any ccp-h225ras-inspect
    match protocol h225ras
    class-map type inspect match-any ccp-h323annexe-inspect
    match protocol h323-annexe
    class-map type inspect match-any ccp-cls-insp-traffic
    match protocol dns
    match protocol ftp
    match protocol https
    match protocol icmp
    match protocol imap
    match protocol pop3
    match protocol netshow
    match protocol shell
    match protocol realmedia
    match protocol rtsp
    match protocol smtp
    match protocol sql-net
    match protocol streamworks
    match protocol tftp
    match protocol vdolive
    match protocol tcp
    match protocol udp
    class-map type inspect match-any ccp-h323-inspect
    match protocol h323
    class-map type inspect match-all ccp-invalid-src
    match access-group 100
    class-map type inspect match-any ccp-sip-inspect
    match protocol sip
    class-map type inspect match-all ccp-protocol-http
    match protocol http
    class-map type inspect match-all SDM_WEBVPN_TRAFFIC
    match class-map SDM_WEBVPN
    match access-group 102
    class-map type inspect match-all ccp-insp-traffic
    match class-map ccp-cls-insp-traffic
    class-map type inspect match-all ccp-icmp-access
    match class-map ccp-cls-icmp-access
    policy-map type inspect ccp-inspect
    class type inspect ccp-invalid-src
      pass
    class type inspect ccp-protocol-http
      inspect
    class type inspect ccp-insp-traffic
      inspect
    class type inspect ccp-sip-inspect
      inspect
    class type inspect ccp-h323-inspect
      inspect
    class type inspect ccp-h323annexe-inspect
      inspect
    class type inspect ccp-h225ras-inspect
      inspect
    class type inspect ccp-h323nxg-inspect
      inspect
    class type inspect ccp-skinny-inspect
      inspect
    class class-default
      pass
    policy-map type inspect ccp-sslvpn-pol
    class type inspect CCP_SSLVPN
      pass
    class class-default
      drop
    policy-map type inspect ccp-permit
    class type inspect SDM_WEBVPN_TRAFFIC
      inspect
    class class-default
      pass
    policy-map type inspect ccp-permit-icmpreply
    class type inspect ccp-icmp-access
      inspect
    class class-default
      pass
    zone security out-zone
    zone security in-zone
    zone security sslvpn-zone
    zone-pair security ccp-zp-self-out source self destination out-zone
    service-policy type inspect ccp-permit-icmpreply
    zone-pair security ccp-zp-in-out source in-zone destination out-zone
    service-policy type inspect ccp-inspect
    zone-pair security ccp-zp-out-self source out-zone destination self
    service-policy type inspect ccp-permit
    zone-pair security zp-out-zone-sslvpn-zone source out-zone destination sslvpn-zone
    service-policy type inspect ccp-sslvpn-pol
    zone-pair security zp-sslvpn-zone-out-zone source sslvpn-zone destination out-zone
    service-policy type inspect ccp-sslvpn-pol
    zone-pair security zp-in-zone-sslvpn-zone source in-zone destination sslvpn-zone
    service-policy type inspect ccp-sslvpn-pol
    zone-pair security zp-sslvpn-zone-in-zone source sslvpn-zone destination in-zone
    service-policy type inspect ccp-sslvpn-pol
    crypto vpn anyconnect flash0:/webvpn/anyconnect-win-3.1.05152-k9.pkg sequence 1
    interface Embedded-Service-Engine0/0
    no ip address
    shutdown
    interface GigabitEthernet0/0
    description $ETH-LAN$$FW_INSIDE$
    ip address 192.168.192.1 255.255.255.0
    ip nat inside
    ip virtual-reassembly in
    zone-member security in-zone
    duplex auto
    speed auto
    interface GigabitEthernet0/1
    description $ETH-WAN$$FW_OUTSIDE$
    ip address 194.74.99.99 255.255.255.224
    ip nat outside
    ip virtual-reassembly in
    zone-member security out-zone
    duplex auto
    speed auto
    interface Virtual-Template1
    description $FW_INSIDE$
    ip unnumbered GigabitEthernet0/1
    zone-member security in-zone
    interface Virtual-Template2
    description $FW_INSIDE$
    ip unnumbered GigabitEthernet0/1
    zone-member security in-zone
    interface Virtual-Template3
    ip unnumbered GigabitEthernet0/1
    zone-member security sslvpn-zone
    ip local pool vpn-ssl-pool 192.168.192.200 192.168.192.210
    ip forward-protocol nd
    ip http server
    ip http authentication local
    no ip http secure-server
    ip http timeout-policy idle 60 life 86400 requests 10000
    ip dns server
    ip nat inside source list 1 interface GigabitEthernet0/1 overload
    ip route 0.0.0.0 0.0.0.0 GigabitEthernet0/1
    ip access-list extended CCP_IP
    remark CCP_ACL Category=128
    permit ip any any
    ip access-list extended SDM_WEBVPN
    remark CCP_ACL Category=1
    permit tcp any any eq 4444
    access-list 1 remark CCP_ACL Category=2
    access-list 1 permit 192.168.192.0 0.0.0.255
    access-list 100 remark CCP_ACL Category=128
    access-list 100 permit ip host 255.255.255.255 any
    access-list 100 permit ip 127.0.0.0 0.255.255.255 any
    access-list 101 remark CCP_ACL Category=0
    access-list 101 permit ip any host 192.168.192.2
    access-list 102 remark CCP_ACL Category=128
    access-list 102 permit ip any host 194.74.2.81
    control-plane
    webvpn gateway ssl_gw
    ip address 194.74.99.99 port 4444 
    ssl trustpoint my-gw-ca
    inservice
    webvpn context ssl-ctx
    acl "ssl-acl"
       permit ip 192.168.192.0 255.255.255.0 192.168.192.0 255.255.255.0
    gateway ssl_gw
    max-users 10
    ssl authenticate verify all
    inservice
    policy group ssl_policy
       functions svc-enabled
       filter tunnel ssl-acl
       svc address-pool "vpn-ssl-pool" netmask 255.255.255.0
       svc keep-client-installed
       svc split include 192.168.192.0 255.255.255.0
       svc dns-server primary 192.168.192.2
    default-group-policy ssl_policy
    end

    Hello Fahad,
    Please see my inline responses.
    1)I have some questions, does this 5500 Series of ASA firewall also have IDS(Intrusion Detection System)?
    You can have an IPS module if your ASA model supports it.
    2) My other question is that the configuration and troubleshooting of SSL VPN technique is  same on all ASA models?
    Yes, pretty much the same
    Regards,
    Jazib

  • I have to find a time stamp for a website visited from an earlier version of an Iphone, how do i do this?

    basically someone has an old iphone and there was inappropiate websites visited on the phone and i was blamed for it.
    I want to know how to find out the exact time and date these were visited and how they were accessed. and to clear my name as they were instead of looking at how this could have happened, they said i hacked into the phone and used it, when i didnt even know they had thier phone in my house at the time.
    thanks for any answers or help.

    I have managed to find the solution to this problem in another thread. I have copied the response from that thread below.
    The solution that worked was to navigate to the preferences file and delete the plist file as described below.
    Peter Bannon
    RE: My iphoto Library is Empty ????? 
    Sep 12, 2005 1:13 PM (in response to Nic Hard)
    Nic Here are some of the standard fixes I think may help in your case: 4. Your iPhoto preferences file may be corrupted.
    (MAKE SURE you QUIT iPhoto first)
    You will find it in your Home directory:
    (Home/your account) >Library>Preferences>com.apple.iPhoto.plist  Remove or trash the preference (.plist file) and restart iPhoto.  If it still doesn't work go on to these remedies, in order.  5. Bad Album data?
    Old Toad says:
    1 - move the Albums folder and the AlbumData.xml file to the desktop.
    2 - launch iPhoto. It if launches successfully you probably have a corrupt album. To locate the bad "apple", pun intended, do the following: 1 - move one of the individual album folders and it's associated data file into the new Albums folder that was created in the iPhoto Library folder.
    2 - launch iPhoto. If it's successful do the same with the next album folder and data file. If iPhoto doesn't launch successfully, that's a bad one and remove it and the data file.
    3 - repeat for each individual album folder in the old Albums folder. 6. Rebuild Library
    QUIT IPHOTO FIRST
    Relaunch while holding down the key combination below for your version
    Option+Shift IPHOTO 2
    CommandOptionShift IPHOTO 4
    Command+Option IPHOTO 5 

  • RV042G VPN - How to connect with Windows 7 IPsec client?

    Hello,
    I'm trying to use the Windows 7 VPN client, to connect to my RV042G. Here are some Screenshots of my router's and Windows' configuration:
    I tried different other configurations, too, but each time, I get a lot of errors on the router. The upper configuration results in the following:
    Feb 13 14:58:05 2014     VPN Log     packet from 192.168.1.24:500: ignoring Vendor ID payload [MS NT5 ISAKMPOAKLEY 00000008]
    Feb 13 14:58:05 2014     VPN Log     packet from 192.168.1.24:500: ignoring Vendor ID payload [MS NT5 ISAKMPOAKLEY 00000008]
    Feb 13 14:58:05 2014     VPN Log     packet from 192.168.1.24:500: received Vendor ID payload [RFC 3947]
    Feb 13 14:58:05 2014     VPN Log     packet from 192.168.1.24:500: received Vendor ID payload [RFC 3947]
    Feb 13 14:58:05 2014     VPN Log     packet from 192.168.1.24:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
    Feb 13 14:58:05 2014     VPN Log     packet from 192.168.1.24:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
    Feb 13 14:58:05 2014     VPN Log     packet from 192.168.1.24:500: ignoring Vendor ID payload [FRAGMENTATION]
    Feb 13 14:58:05 2014     VPN Log     packet from 192.168.1.24:500: ignoring Vendor ID payload [FRAGMENTATION]
    Feb 13 14:58:05 2014     VPN Log     packet from 192.168.1.24:500: ignoring Vendor ID payload [fb1de3cdf341b7ea16b7e5be0855f120]
    Feb 13 14:58:05 2014     VPN Log     packet from 192.168.1.24:500: ignoring Vendor ID payload [fb1de3cdf341b7ea16b7e5be0855f120]
    Feb 13 14:58:05 2014     VPN Log     packet from 192.168.1.24:500: ignoring Vendor ID payload [Vid-Initial-Contact]
    Feb 13 14:58:05 2014     VPN Log     packet from 192.168.1.24:500: ignoring Vendor ID payload [Vid-Initial-Contact]
    Feb 13 14:58:05 2014     VPN Log     packet from 192.168.1.24:500: ignoring Vendor ID payload [e3a5966a76379fe707228231e5ce8652]
    Feb 13 14:58:05 2014     VPN Log     packet from 192.168.1.24:500: ignoring Vendor ID payload [e3a5966a76379fe707228231e5ce8652]
    Feb 13 14:58:05 2014     VPN Log     packet from 192.168.1.24:500: [Tunnel Negotiation Info] <<< Responder Received Main Mode 1st packet
    Feb 13 14:58:05 2014     VPN Log     packet from 192.168.1.24:500: [Tunnel Negotiation Info] <<< Responder Received Main Mode 1st packet
    Feb 13 14:58:05 2014     VPN Log     (c2gips0)[2] 192.168.1.24 #89: responding to Main Mode from unknown peer 192.168.1.24
    Feb 13 14:58:05 2014     VPN Log     (c2gips0)[2] 192.168.1.24 #89: OAKLEY_AES_CBC is not enabled for this connection. Attribute OAKLEY_ENCRYPTION_ALGORITHM
    Feb 13 14:58:05 2014    Kernel     last message repeated 5 times
    Feb 13 14:58:05 2014     VPN Log     (c2gips0)[2] 192.168.1.24 #89: OAKLEY_GROUP_MODP2048 is not enabled for this connection. Attribute OAKLEY_GROUP_DESCRIPTION
    Feb 13 14:58:05 2014     VPN Log     (c2gips0)[2] 192.168.1.24 #89: OAKLEY_GROUP_MODP2048 is not enabled for this connection. Attribute OAKLEY_GROUP_DESCRIPTION
    Feb 13 14:58:05 2014     VPN Log     (c2gips0)[2] 192.168.1.24 #89: [Tunnel Negotiation Info] >>> Responder Send Main Mode 2nd packet
    Feb 13 14:58:05 2014     VPN Log     (c2gips0)[2] 192.168.1.24 #89: [Tunnel Negotiation Info] >>> Responder Send Main Mode 2nd packet
    Feb 13 14:58:05 2014     VPN Log     (c2gips0)[2] 192.168.1.24 #89: [Tunnel Negotiation Info] <<< Responder Received Main Mode 3rd packet
    Feb 13 14:58:05 2014     VPN Log     (c2gips0)[2] 192.168.1.24 #89: [Tunnel Negotiation Info] <<< Responder Received Main Mode 3rd packet
    Feb 13 14:58:05 2014     VPN Log     (c2gips0)[2] 192.168.1.24 #89: [Tunnel Negotiation Info] >>> Responder send Main Mode 4th packet
    Feb 13 14:58:05 2014     VPN Log     (c2gips0)[2] 192.168.1.24 #89: [Tunnel Negotiation Info] >>> Responder send Main Mode 4th packet
    Feb 13 14:58:05 2014     VPN Log     (c2gips0)[2] 192.168.1.24 #89: [Tunnel Negotiation Info] <<< Responder Received Main Mode 5th packet
    Feb 13 14:58:05 2014     VPN Log     (c2gips0)[2] 192.168.1.24 #89: [Tunnel Negotiation Info] <<< Responder Received Main Mode 5th packet
    Feb 13 14:58:05 2014     VPN Log     (c2gips0)[2] 192.168.1.24 #89: Peer ID is ID_IPV4_ADDR: '192.168.1.24'
    Feb 13 14:58:05 2014     VPN Log     (c2gips0)[2] 192.168.1.24 #89: [Tunnel Negotiation Info] >>> Responder Send Main Mode 6th packet
    Feb 13 14:58:05 2014     VPN Log     (c2gips0)[2] 192.168.1.24 #89: [Tunnel Negotiation Info] >>> Responder Send Main Mode 6th packet
    Feb 13 14:58:05 2014     VPN Log     (c2gips0)[2] 192.168.1.24 #89: [Tunnel Negotiation Info] Main Mode Phase 1 SA Established
    Feb 13 14:58:05 2014     VPN Log     (c2gips0)[2] 192.168.1.24 #89: [Tunnel Negotiation Info] Main Mode Phase 1 SA Established
    Feb 13 14:58:05 2014     VPN Log     (c2gips0)[2] 192.168.1.24 #89: sent MR3, ISAKMP SA established
    Feb 13 14:58:05 2014     VPN Log     (c2gips0)[2] 192.168.1.24 #89: [Tunnel Negotiation Info] <<< Responder Received Quick Mode 1st packet
    Feb 13 14:58:05 2014     VPN Log     (c2gips0)[2] 192.168.1.24 #89: [Tunnel Negotiation Info] <<< Responder Received Quick Mode 1st packet
    Feb 13 14:58:05 2014     VPN Log     (c2gips0)[2] 192.168.1.24 #89: cannot respond to IPsec SA request because no connection is known for 78.52.27.132:17/1701...192.168.1.24[[email protected]]:17/1701
    Feb 13 14:58:05 2014     VPN Log     (c2gips0)[2] 192.168.1.24 #89: sending encrypted notification INVALID_ID_INFORMATION to 192.168.1.24:500
    Feb 13 14:58:07 2014     VPN Log     (c2gips0)[2] 192.168.1.24 #89: Quick Mode I1 message is unacceptable because it uses a previously used Message ID 0x00000001 (perhaps this is a duplicated packet)
    Feb 13 14:58:07 2014     VPN Log     (c2gips0)[2] 192.168.1.24 #89: Quick Mode I1 message is unacceptable because it uses a previously used Message ID 0x00000001 (perhaps this is a duplicated packet)
    Feb 13 14:58:07 2014     VPN Log     (c2gips0)[2] 192.168.1.24 #89: sending encrypted notification INVALID_MESSAGE_ID to 192.168.1.24:500
    Feb 13 14:58:10 2014     VPN Log     (c2gips0)[2] 192.168.1.24 #89: Quick Mode I1 message is unacceptable because it uses a previously used Message ID 0x00000001 (perhaps this is a duplicated packet)
    Feb 13 14:58:10 2014     VPN Log     (c2gips0)[2] 192.168.1.24 #89: Quick Mode I1 message is unacceptable because it uses a previously used Message ID 0x00000001 (perhaps this is a duplicated packet)
    Feb 13 14:58:10 2014     VPN Log     (c2gips0)[2] 192.168.1.24 #89: sending encrypted notification INVALID_MESSAGE_ID to 192.168.1.24:500
    Feb 13 14:58:14 2014     VPN Log     (c2gips0)[2] 192.168.1.24 #89: Quick Mode I1 message is unacceptable because it uses a previously used Message ID 0x00000001 (perhaps this is a duplicated packet)
    Feb 13 14:58:14 2014     VPN Log     (c2gips0)[2] 192.168.1.24 #89: Quick Mode I1 message is unacceptable because it uses a previously used Message ID 0x00000001 (perhaps this is a duplicated packet)
    Feb 13 14:58:14 2014     VPN Log     (c2gips0)[2] 192.168.1.24 #89: sending encrypted notification INVALID_MESSAGE_ID to 192.168.1.24:500
    Feb 13 14:58:22 2014     VPN Log     (c2gips0)[2] 192.168.1.24 #89: Quick Mode I1 message is unacceptable because it uses a previously used Message ID 0x00000001 (perhaps this is a duplicated packet)
    Feb 13 14:58:22 2014     VPN Log     (c2gips0)[2] 192.168.1.24 #89: Quick Mode I1 message is unacceptable because it uses a previously used Message ID 0x00000001 (perhaps this is a duplicated packet)
    Feb 13 14:58:22 2014     VPN Log     (c2gips0)[2] 192.168.1.24 #89: sending encrypted notification INVALID_MESSAGE_ID to 192.168.1.24:500
    Feb 13 14:58:38 2014     VPN Log     (c2gips0)[2] 192.168.1.24 #89: Quick Mode I1 message is unacceptable because it uses a previously used Message ID 0x00000001 (perhaps this is a duplicated packet)
    Feb 13 14:58:38 2014     VPN Log     (c2gips0)[2] 192.168.1.24 #89: Quick Mode I1 message is unacceptable because it uses a previously used Message ID 0x00000001 (perhaps this is a duplicated packet)
    Feb 13 14:58:38 2014     VPN Log     (c2gips0)[2] 192.168.1.24 #89: sending encrypted notification INVALID_MESSAGE_ID to 192.168.1.24:500
    Feb 13 14:58:52 2014     VPN Log     (c2gips0)[2] 192.168.1.24 #89: received Delete SA payload: deleting ISAKMP State #89
    Feb 13 14:58:52 2014     VPN Log     (c2gips0)[2] 192.168.1.24 #89: received Delete SA payload: deleting ISAKMP State #89
    Feb 13 14:58:52 2014     VPN Log     (c2gips0)[2] 192.168.1.24: deleting connection (c2gips0) instance with peer 192.168.1.24 {isakmp=#0/ipsec=#0}
    Does anyone know, how to configure the router and Windows 7, to get a working VPN tunnel?
    Thanks.

    Ok, I could find the time, to try this out. I followed this instruction: https://www.shrew.net/support/Howto_Linksys and it works.
    There is at last one Problem: I can't access computers behind the remote router from the connected client. The client can see the remote router and computers behind the remote router can see the connected client using the IP-adress, I used for shrewsoft.
    I tried to ping some remote PCs from the client, but I get timeout messages. Ping is enabled on all devices. There are no log errors on the router. I tried to add the remote router on the client as a standard gateway, and I decativated the router's firewall, but without success.
    Does anyone know, why the communication just works in one direction?

  • WRVS4400N - eth0: received packet with own address as source address

    I am using a WRVS4400N as my primary router for a small office.  I get the following message repeated over and over in my logs.  This seems to happen for 2 or 3 days and then it will go away for about a week and then come back.  Does anyone know what is causing this?  The best I can tell I don't have any IP conflicts on the network and most of the time the network has very little traffic other than 2 or 3 computers surfing the web.
    Jan  3 16:48:09  - eth0: received packet with  own address as source address
    Jan  3 16:48:09  - eth0: received packet with  own address as source address
    Jan  3 16:48:15  - eth0: received packet with  own address as source address
    Jan  3 16:48:27  - eth0: received packet with  own address as source address
    Jan  3 16:48:51  - eth0: received packet with  own address as source address

    any news on this issue?
    I am getting more and more messages (20+/day) - hundreds this month.
    Now Coming every 10 minutes - HELP
    eth0: received packet with own address as source address
    Done everything, now waiting for input from Cisco.
    Please, anyone as Cisco got any answers?
    1:38 AM [email protected] WRVS4400N Security Log [6B:C6:FD]
    12:36 AM [email protected] WRVS4400N Security Log [6B:C6:FD]
    2:38 AM [email protected] WRVS4400N Security Log [6B:C6:FD]
    3:38 AM [email protected] WRVS4400N Security Log [6B:C6:FD]
    4:38 AM [email protected] WRVS4400N Security Log [6B:C6:FD]
    5:38 AM [email protected] WRVS4400N Security Log [6B:C6:FD]
    6:38 AM [email protected] WRVS4400N Security Log [6B:C6:FD]
    7:38 AM [email protected] WRVS4400N Security Log [6B:C6:FD]
    8:38 AM [email protected] WRVS4400N Security Log [6B:C6:FD]

  • RV320 VPN log level

    Hello
    The RV320 logs are very poor to troubleshoot VPN issues, even with external syslog facility, at the maximum log level the device does not log any VPN event.
    Is there a way to increase the log level?
    Is there a separate syslog facility local# for VPN? 
    Where to get extensive documentation about syslog facilities numbers used by RV320?
    Thank you

    Cisco support team is trying to fix this up, but it's not working
    They managed to build a working tunnel but that's not the point, we need VPN logs, period.
    It looks like the device only starts VPN log after a succesfull VPN connection, making the device impossible to setup, diagnose or monitor failed VPN connections. This is a no go.
    using external syslog does not help, the only VPN related output I get in log is : 
    Oct 22 12:32:18 10.0.0.254 VPN Log: [g2gips0]: [Tunnel Disconnected]
    what I should get (and is a must have) would be :
    2014-10-20, 05:15:31
    VPN Log
    [g2gips2] #11: [Tunnel Established] ISAKMP SA established
    2014-10-20, 05:15:54
    VPN Log
    [g2gips2] #14: [Tunnel Established] sent MR3, ISAKMP SA established
    2014-10-20, 05:15:55
    VPN Log
    [g2gips2]: cmd=up-client peer=62.176.126.28 peer_client=192.168.1.0/24 peer_client_net=192.168.1.0 peer_client_mask=255.255.255.0
    2014-10-20, 05:15:55
    VPN Log
    ip route add 192.168.1.0/24 via 88.161.221.254 dev eth1 metric 35
    2014-10-20, 05:15:55
    VPN Log
    iptables -t nat -I vpn -s 10.0.0.0/24 -d 192.168.1.0/24 -j ACCEPT
    2014-10-20, 05:15:55
    VPN Log
    iptables -t nat -I vpn -s 192.168.1.0/24 -d 10.0.0.0/24 -j ACCEPT
    2014-10-20, 05:15:55
    VPN Log
    iptables -t nat -I vpn_postrouting -s 10.0.0.0/24 -d 192.168.1.0/24 -j ACCEPT
    2014-10-20, 05:15:55
    VPN Log
    iptables -t nat -I vpn_postrouting -o eth0 -s 192.168.1.0/24 -d 10.0.0.0/24 -j ACCEPT
    2014-10-20, 05:15:55
    VPN Log
    [g2gips2] #15: [Tunnel Established] IPsec SA established {ESP=>0xc570a9c8 < 0xc43d09ba}
    2014-10-20, 05:16:53
    VPN Log
    [g2gips2] #15: [Tunnel Negotiation Fail] DPD: Could not find newest phase 1 state
    2014-10-20, 05:26:44
    User Log
    User cisco Session Expired
    2014-10-20, 06:14:42
    VPN Log
    [g2gips2] #16: [Tunnel Established] sent MR3, ISAKMP SA established
    2014-10-20, 06:14:42
    VPN Log
    [g2gips2] #17: [Tunnel Established] IPsec SA established {ESP=>0xc0931255 < 0xc928b34e}
    2014-10-20, 06:14:42
    VPN Log
    [g2gips2] #16: [Tunnel Authorize Fail] ignoring Delete SA payload: PROTO_IPSEC_ESP SA(0xc570a9c8) not found (maybe expired)
    2014-10-20, 07:13:34
    VPN Log
    [g2gips2] #18: [Tunnel Established] IPsec SA established {ESP=>0xcea6223a < 0xcfbc92ba}
    2014-10-20, 07:13:34
    VPN Log
    [g2gips2] #16: [Tunnel Authorize Fail] ignoring Delete SA payload: PROTO_IPSEC_ESP SA(0xc0931255) not found (maybe expired)
    2014-10-20, 08:12:20
    VPN Log
    [g2gips2] #19: [Tunnel Established] IPsec SA established {ESP=>0xcdb2138d < 0xcfa80369}
    2014-10-20, 08:12:20
    VPN Log
    [g2gips2] #16: [Tunnel Authorize Fail] ignoring Delete SA payload: PROTO_IPSEC_ESP SA(0xcea6223a) not found (maybe expired)
    2014-10-20, 09:11:09
    VPN Log
    [g2gips2] #20: [Tunnel Established] IPsec SA established {ESP=>0xc5aeba36 < 0xcd182a7c}
    2014-10-20, 09:11:09
    VPN Log
    [g2gips2] #16: [Tunnel Authorize Fail] ignoring Delete SA payload: PROTO_IPSEC_ESP SA(0xcdb2138d) not found (maybe expired)
    2014-10-20, 10:09:57
    VPN Log
    [g2gips2] #21: [Tunnel Established] IPsec SA established {ESP=>0xc862dbe2 < 0xc68a5a29}
    2014-10-20, 10:09:57
    VPN Log
    [g2gips2] #16: [Tunnel Authorize Fail] ignoring Delete SA payload: PROTO_IPSEC_ESP SA(0xc5aeba36) not found (maybe expired)
    2014-10-20, 11:08:45
    VPN Log
    [g2gips2] #22: [Tunnel Established] IPsec SA established {ESP=>0xc8c5d191 < 0xc7009873}
    2014-10-20, 11:08:45
    VPN Log
    [g2gips2] #16: [Tunnel Authorize Fail] ignoring Delete SA payload: PROTO_IPSEC_ESP SA(0xc862dbe2) not found (maybe expired)
    2014-10-20, 12:07:29
    VPN Log
    [g2gips2] #23: [Tunnel Established] IPsec SA established {ESP=>0xcbb5aca6 < 0xc087d294}
    2014-10-20, 12:07:29
    VPN Log
    [g2gips2] #16: [Tunnel Authorize Fail] ignoring Delete SA payload: PROTO_IPSEC_ESP SA(0xc8c5d191) not found (maybe expired)
    2014-10-20, 13:06:16
    VPN Log
    [g2gips2] #24: [Tunnel Established] IPsec SA established {ESP=>0xce08b895 < 0xca8ee98b}
    2014-10-20, 13:06:16
    VPN Log
    [g2gips2] #16: [Tunnel Authorize Fail] ignoring Delete SA payload: PROTO_IPSEC_ESP SA(0xcbb5aca6) not found (maybe expired)
    2014-10-20, 14:05:03
    VPN Log
    [g2gips2] #25: [Tunnel Established] IPsec SA established {ESP=>0xc84ace20 < 0xc66ee4e5}
    2014-10-20, 14:05:03
    VPN Log
    [g2gips2] #16: [Tunnel Authorize Fail] ignoring Delete SA payload: PROTO_IPSEC_ESP SA(0xce08b895) not found (maybe expired)
    2014-10-20, 14:13:46
    VPN Log
    [g2gips2] #26: [Tunnel Established] sent MR3, ISAKMP SA established
    2014-10-20, 15:03:54
    VPN Log
    [g2gips2] #27: [Tunnel Established] IPsec SA established {ESP=>0xc8808731 < 0xc6aaaf12}
    2014-10-20, 15:03:54
    VPN Log
    [g2gips2] #26: [Tunnel Authorize Fail] ignoring Delete SA payload: PROTO_IPSEC_ESP SA(0xc84ace20) not found (maybe expired)
    2014-10-20, 16:02:47
    VPN Log
    [g2gips2] #28: [Tunnel Established] IPsec SA established {ESP=>0xc20db40f < 0xcbcbb7c5}
    2014-10-20, 16:02:47
    VPN Log
    [g2gips2] #26: [Tunnel Authorize Fail] ignoring Delete SA payload: PROTO_IPSEC_ESP SA(0xc8808731) not found (maybe expired)
    2014-10-20, 17:01:39
    VPN Log
    [g2gips2] #29: [Tunnel Established] IPsec SA established {ESP=>0xc8f8b88c < 0xc87177ac}
    2014-10-20, 17:01:39
    VPN Log
    [g2gips2] #26: [Tunnel Authorize Fail] ignoring Delete SA payload: PROTO_IPSEC_ESP SA(0xc20db40f) not found (maybe expired)
    2014-10-20, 18:00:24
    VPN Log
    [g2gips2] #30: [Tunnel Established] IPsec SA established {ESP=>0xc24edeb7 < 0xc31180a7}
    2014-10-20, 18:00:24
    VPN Log
    [g2gips2] #26: [Tunnel Authorize Fail] ignoring Delete SA payload: PROTO_IPSEC_ESP SA(0xc8f8b88c) not found (maybe expired)
    2014-10-20, 18:59:12
    VPN Log
    [g2gips2] #31: [Tunnel Established] IPsec SA established {ESP=>0xcf388896 < 0xcca051f9}
    2014-10-20, 18:59:12
    VPN Log
    [g2gips2] #26: [Tunnel Authorize Fail] ignoring Delete SA payload: PROTO_IPSEC_ESP SA(0xc24edeb7) not found (maybe expired)
    2014-10-20, 19:57:59
    VPN Log
    [g2gips2] #32: [Tunnel Established] IPsec SA established {ESP=>0xcb12a9c8 < 0xc6d3e8a4}
    2014-10-20, 19:57:59
    VPN Log
    [g2gips2] #26: [Tunnel Authorize Fail] ignoring Delete SA payload: PROTO_IPSEC_ESP SA(0xcf388896) not found (maybe expired)
    2014-10-20, 20:56:46
    VPN Log
    [g2gips2] #33: [Tunnel Established] IPsec SA established {ESP=>0xcdc041c8 < 0xc69fa232}
    2014-10-20, 20:56:46
    VPN Log
    [g2gips2] #26: [Tunnel Authorize Fail] ignoring Delete SA payload: PROTO_IPSEC_ESP SA(0xcb12a9c8) not found (maybe expired)
    2014-10-20, 21:55:36
    VPN Log
    [g2gips2] #34: [Tunnel Established] IPsec SA established {ESP=>0xc4f97df6 < 0xc4a67abd}
    2014-10-20, 21:55:36
    VPN Log
    [g2gips2] #26: [Tunnel Authorize Fail] ignoring Delete SA payload: PROTO_IPSEC_ESP SA(0xcdc041c8) not found (maybe expired)
    2014-10-20, 22:12:56
    VPN Log
    [g2gips2] #35: [Tunnel Established] sent MR3, ISAKMP SA established
    2014-10-20, 22:54:27
    VPN Log
    [g2gips2] #36: [Tunnel Established] IPsec SA established {ESP=>0xc3716585 < 0xc41ab42b}
    2014-10-20, 22:54:27
    VPN Log
    [g2gips2] #35: [Tunnel Authorize Fail] ignoring Delete SA payload: PROTO_IPSEC_ESP SA(0xc4f97df6) not found (maybe expired)
    2014-10-20, 23:53:13
    VPN Log
    [g2gips2] #37: [Tunnel Established] IPsec SA established {ESP=>0xcfc747c8 < 0xc5994856}
    2014-10-20, 23:53:13
    VPN Log
    [g2gips2] #35: [Tunnel Authorize Fail] ignoring Delete SA payload: PROTO_IPSEC_ESP SA(0xc3716585) not found (maybe expired)
    2014-10-21, 00:51:58
    VPN Log
    [g2gips2] #38: [Tunnel Established] IPsec SA established {ESP=>0xcf4ea957 < 0xc566c6d3}
    2014-10-21, 00:51:58
    VPN Log
    [g2gips2] #35: [Tunnel Authorize Fail] ignoring Delete SA payload: PROTO_IPSEC_ESP SA(0xcfc747c8) not found (maybe expired)
    2014-10-21, 01:50:48
    VPN Log
    [g2gips2] #39: [Tunnel Established] IPsec SA established {ESP=>0xc4f4ddc5 < 0xc852f0a8}
    2014-10-21, 01:50:48
    VPN Log
    [g2gips2] #35: [Tunnel Authorize Fail] ignoring Delete SA payload: PROTO_IPSEC_ESP SA(0xcf4ea957) not found (maybe expired)
    2014-10-21, 02:49:33
    VPN Log
    [g2gips2] #40: [Tunnel Established] IPsec SA established {ESP=>0xc4d14f63 < 0xc841322e}
    2014-10-21, 02:49:33
    VPN Log
    [g2gips2] #35: [Tunnel Authorize Fail] ignoring Delete SA payload: PROTO_IPSEC_ESP SA(0xc4f4ddc5) not found (maybe expired)
    2014-10-21, 03:48:17
    VPN Log
    [g2gips2] #41: [Tunnel Established] IPsec SA established {ESP=>0xcab61c1d < 0xc8e06d65}
    2014-10-21, 03:48:17
    VPN Log
    [g2gips2] #35: [Tunnel Authorize Fail] ignoring Delete SA payload: PROTO_IPSEC_ESP SA(0xc4d14f63) not found (maybe expired)
    2014-10-21, 04:47:10
    VPN Log
    [g2gips2] #42: [Tunnel Established] IPsec SA established {ESP=>0xcc4d0867 < 0xc5370a2f}
    2014-10-21, 04:47:10
    VPN Log
    [g2gips2] #35: [Tunnel Authorize Fail] ignoring Delete SA payload: PROTO_IPSEC_ESP SA(0xcab61c1d) not found (maybe expired)
    2014-10-21, 05:45:57
    VPN Log
    [g2gips2] #43: [Tunnel Established] IPsec SA established {ESP=>0xcb8459a9 < 0xcab43b24}
    2014-10-21, 05:45:57
    VPN Log
    [g2gips2] #35: [Tunnel Authorize Fail] ignoring Delete SA payload: PROTO_IPSEC_ESP SA(0xcc4d0867) not found (maybe expired)
    2014-10-21, 06:12:00
    VPN Log
    [g2gips2] #44: [Tunnel Established] sent MR3, ISAKMP SA established
    2014-10-21, 06:44:47
    VPN Log
    [g2gips2] #45: [Tunnel Established] IPsec SA established {ESP=>0xc1d633d9 < 0xc5b9214f}
    2014-10-21, 06:44:47
    VPN Log
    [g2gips2] #44: [Tunnel Authorize Fail] ignoring Delete SA payload: PROTO_IPSEC_ESP SA(0xcb8459a9) not found (maybe expired)
    2014-10-21, 07:43:37
    VPN Log
    [g2gips2] #46: [Tunnel Established] IPsec SA established {ESP=>0xc8a6235e < 0xc549a18d}
    2014-10-21, 07:43:37
    VPN Log
    [g2gips2] #44: [Tunnel Authorize Fail] ignoring Delete SA payload: PROTO_IPSEC_ESP SA(0xc1d633d9) not found (maybe expired)
    2014-10-21, 08:42:28
    VPN Log
    [g2gips2] #47: [Tunnel Established] IPsec SA established {ESP=>0xc563592a < 0xc033e13d}
    2014-10-21, 08:42:28
    VPN Log
    [g2gips2] #44: [Tunnel Authorize Fail] ignoring Delete SA payload: PROTO_IPSEC_ESP SA(0xc8a6235e) not found (maybe expired)
    2014-10-21, 09:41:12
    VPN Log
    [g2gips2] #48: [Tunnel Established] IPsec SA established {ESP=>0xc6c5e0b6 < 0xc9acd1e2}
    2014-10-21, 09:41:12
    VPN Log
    [g2gips2] #44: [Tunnel Authorize Fail] ignoring Delete SA payload: PROTO_IPSEC_ESP SA(0xc563592a) not found (maybe expired)
    2014-10-21, 10:40:03
    VPN Log
    [g2gips2] #49: [Tunnel Established] IPsec SA established {ESP=>0xc49d311a < 0xca8961e8}
    2014-10-21, 10:40:03
    VPN Log
    [g2gips2] #44: [Tunnel Authorize Fail] ignoring Delete SA payload: PROTO_IPSEC_ESP SA(0xc6c5e0b6) not found (maybe expired)
    2014-10-21, 11:38:53
    VPN Log
    [g2gips2] #50: [Tunnel Established] IPsec SA established {ESP=>0xc682b92b < 0xc01e3e5f}
    2014-10-21, 11:38:53
    VPN Log
    [g2gips2] #44: [Tunnel Authorize Fail] ignoring Delete SA payload: PROTO_IPSEC_ESP SA(0xc49d311a) not found (maybe expired)
    2014-10-21, 12:37:41
    VPN Log
    [g2gips2] #51: [Tunnel Established] IPsec SA established {ESP=>0xc0e9d4eb < 0xc0c1b26a}
    2014-10-21, 12:37:41
    VPN Log
    [g2gips2] #44: [Tunnel Authorize Fail] ignoring Delete SA payload: PROTO_IPSEC_ESP SA(0xc682b92b) not found (maybe expired)
    2014-10-21, 13:36:29
    VPN Log
    [g2gips2] #52: [Tunnel Established] IPsec SA established {ESP=>0xc424276a < 0xc0467e19}

  • Why when using private browsing does Safari still remember websites visited?

    Even when private browsing is selected on my MacBook and iPad2, websites visited are remembered and displayed in history.  Why is this?

    Hi Graham,
    Welcome to the Support Communities!  Is it possible that you have some Safari windows open as private browsing, and others not?  See the overview of private browsing below (see the note I've highlighted in bold):
    Safari 8 (Yosemite): Use Private Browsing windows
    http://support.apple.com/kb/PH19216
    Use Private Browsing windows in Safari
    When you use Private Browsing windows, Safari doesn’t save your browsing history, and it asks websites you visit not to track you.
    Use Private Browsing:
    Choose File > New Private Window, or switch to a Safari window that’s already using Private Browsing. A window that’s using Private Browsing has a dark address and search field with white text.
    When you use a Private Browsing window:
    Each tab in the window is isolated from the others, so websites you view in one tab can’t track your browsing in other tabs.
    Safari doesn’t remember the webpages you visit or your AutoFill information.
    Safari doesn’t store your open webpages in iCloud, so they aren’t shown when you view all your open tabs from other devices.
    Your recent searches aren’t included in the results list when you use the address and search field.
    Items you download aren’t included in the downloads list. (The items do remain on your computer.
    Safari doesn’t remember changes to your cookies or other website data. Safari also asks websites and others who provide those sites with content (including advertisers) not to keep track of your browsing, although it is up to the websites to honor this request.
    Plug-ins that support Private Browsing stop storing cookies and other tracking information.
    Websites can’t modify information stored on your device, so services normally available at such sites may work differently until you turn off Private Browsing.
    Note:   None of the above applies in other Safari windows you may have open that don’t use Private Browsing.
    Stop using Private Browsing:
    Close the Private Browsing window, switch to a different Safari window that isn’t using Private Browsing, or choose File > New Window to open a window that doesn’t use Private Browsing. To further enhance privacy:
    Delete any items you downloaded while using Private Browsing windows.
    Close any other Private Browsing windows that are still open, to prevent others from using the Back and Forward buttons to see pages you visited in them.
    Besides using Private Browsing windows, you can manage cookies and data stored by all websites and have Safari ask all websites not to track you.
    If you forget to use a Private Browsing window, you can clear your browsing history.
    Last Modified: Jan 6, 2015
    Cheers,
    - Judy

  • Is SSL and multiple websites possible with Lion Server?

    this is the obligatory apology from a nub here....
    I have not been a sys admin since the days of NT 4.0.
    I like to think that "hey, i might need a touch up here and there, but I think I can find my way around..."  Wrong.
    I have been searching, and reading and searching and reading, and trying everything I can think of..  and I CAN NOT figure out how to get mutliple websites working with Lion Server, using self signed certs 1 for each of my subdomains.
    Has anyone, anywhere (thank you google for returning searches to me from 2004?!?!  More puzzled confusion....)  posted a step by step guide yet??? 
    I have a mac mini, and I have two domain names that are resolving to my exterinal interface on my router just fine, and I have tried what I thought was
    every different possible combination of voodoo, magic, 00000...MoreTestingNeeded.conf, and all the other tricks.
    Is it possible to get ssl and multiple websites working with one IP address? 
    Thanks...

    Thank you very much for your time and input.  My birthday was fantastic! Thanks for asking.
    I found out about SNI while researching an error I was getting in the log.  I really never found any definitive "this is what you need to do", so I was going to get back to it later.
    You probably know this, but Lion Server breaks out all of the virtual hosts into seperate documents in the "sites" directory.   All I do is I launch the server.app, and in the web component, I enter the name of the website that I want to resolve to my server, and I give it the path to the docs.  Thats it.  There is no DNS configuration to speak of, on my part, and I don't believe that its necessary (?) to touch the httpd.conf file at this point yet either, even though I think I hear others saying you do.  (I have no issues with getting into the file and making any changes, I just thought it was interesting.)
    I am still trying to figure out how a user is supposed to add any other types of services LIKE ftp, etc.  I know and use the server admin tools, but I have found that the app really does do its job in terms of creating all the dns records for resolving the sites you create.  I sure hope its not just using the host file, is it? I never see any additional files in the DNS manager, for any of the subdomains.  Where are they?
    Here is the contents of what appears to be the first file read, that is for SSL enabled sites:
    ``````````````````````````````````````````````````````````````````
    This is "0000_any_443.conf:"
    `````````````````````````````````````````````````````````````````
    ## Default Virtual Host Configuration
    NameVIrtualHost *:443
    <VirtualHost *:443>
      ServerAdmin [email protected]
      DocumentRoot "/path/to/the/docs"
      DirectoryIndex index.html index.php /wiki/ default.html
      CustomLog "//log" cmbndvhst
      ErrorLog "/"
      <IfModule mod_ssl.c>
      SSLEngine On
      SSLCipherSuite "SOMEGARBAGEIDONTKNOWIFISHOULDSHAREORWHAT"
      SSLProtocol -ALL +SSLv3 +TLSv1
      SSLProxyEngine On
      SSLCertificateFile "/sslcerts/certs/*.DOMAIN.COM.XXXXXXXXXXXXXXXXXXXXXXXXXXXX.cert.pem"
      SSLCertificateKeyFile "/sslcerts/certs/*.DOMAIN.COM.XXXXXXXXXXXXXXXXXXXXXXXXXXX.key.pem"
      SSLCertificateChainFile "/path/*.DOMAIN.COM.XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX.chain.pem"
      SSLProxyProtocol -ALL +SSLv3 +TLSv1
      </IfModule>
      <Directory "/Path/To/The/Docs/XXXX/SDFSDD">
      Options All +MultiViews -ExecCGI -Indexes
      AllowOverride None
      <IfModule mod_dav.c>
      DAV Off
      </IfModule>
      </Directory>
      Include /httpd_passwordreset_required.conf
    </VirtualHost>
    ```````````````````````````````````````````````````````````````````````````````` `````````````
    So..  my questions are:
    Where in the .confs do I add what I need from your above items?  Would it go each of the site docs that I need?  I am really not sure what apple is doing here.
    I have 4 domain names resolving to my server right now, and subdomains to each of the domains.  So there are a total of about 10 "site" docs, not a big deal to change each, I just wonder if Lion overwrites these docs with each refresh or what? Also, If I try to add a third .com right now it breaks the whole site.
    (Out of conversation, but I just remembered this.  I just had to "quit" out of the server.app.)  When installing the directory server,  it hangs on "getting certificates". The spinning wheel (not the rainbow collered one, but the black one by the words "Getting Certificates") just sits there and spins.  I finally just hit the red X and relaunch server.
    Lastly, you meniton importing the key.  I am using the key manager within the server app.  I am not sure where and how I would make the cert and key you are referring to for the importing?  I have tried to use the key manager in the OS, but I am not sure of the relationship between that key manager app, and the key manager within the server.app.  I have tried to create certs in the keymanager in the OS side, but I do not know how to get them to show up for use in the keymanager in the server.app.
    BTW: Thanks.   Thanks for the help.  I really appreciate it.

  • Odd Site-to-Site VPN Log Activity

    I have two rv016s connected site-to-site to Netgear FVS114 and FVS124G.  But while the SA lifetimes are set for 3600, I'm seeing tunnel activity in the logs almost every minute like this:
    Mar  1 12:05:09 2014
         VPN Log
        [Tunnel Negotiation Info] Quick Mode Phase 2 SA Established, IPSec Tunnel Connected
    Mar  1 12:05:09 2014
         VPN Log
        [Tunnel Negotiation Info] Quick Mode Phase 2 SA Established, IPSec Tunnel Connected
    Mar  1 12:05:09 2014
         VPN Log
        [Tunnel Negotiation Info] >>> Initiator Send Quick Mode 3rd packet
    Mar  1 12:05:09 2014
         VPN Log
        [Tunnel Negotiation Info] Outbound SPI value = da651654
    Mar  1 12:05:09 2014
         VPN Log
        [Tunnel Negotiation Info] Inbound  SPI value = fe2d6610
    Mar  1 12:05:09 2014
         VPN Log
        [Tunnel Negotiation Info] <<< Initiator Received Quick Mode 2nd packet
    Mar  1 12:05:09 2014
         VPN Log
        [Tunnel Negotiation Info] >>> Initiator send Quick Mode 1st packet
    Mar  1 12:05:09 2014
         VPN Log
        initiating Quick Mode PSK+ENCRYPT+TUNNEL+NAT-T to replace #865
    Mar  1 12:05:01 2014
         VPN Log
        Informational Exchange message is invalid because it has a previously used Message ID (0x8cf47d5c)
    Mar  1 12:05:01 2014
         VPN Log
        Informational Exchange message is invalid because it has a previously used Message ID (0x8cf47d5c)
    Mar  1 12:05:00 2014
         VPN Log
        Discarding duplicate packet; already STATE_MAIN_I4
    Mar  1 12:04:53 2014
         VPN Log
        Informational Exchange message is invalid because it has a previously used Message ID (0x8cf47d5c)
    Mar  1 12:04:49 2014
         VPN Log
        ignoring Delete SA payload: ISAKMP SA not found (maybe expired)
    Mar  1 12:04:00 2014
         VPN Log
        [Tunnel Negotiation Info] Responder Cookies = 0ac d08f fcfe 73f
    Mar  1 12:04:00 2014
         VPN Log
        [Tunnel Negotiation Info] Initiator Cookies = 4e7c fa42 a059 c577
    Mar  1 12:04:00 2014
         VPN Log
        [Tunnel Negotiation Info] Main Mode Phase 1 SA Established
    Mar  1 12:04:00 2014
         VPN Log
        Main mode peer ID is ID_IPV4_ADDR: '10.168.2.2'(This is the Netgear IP address behind another router)
    Mar  1 12:04:00 2014
         VPN Log
        [Tunnel Negotiation Info] >>> Initiator Receive Main Mode 6th packet
    Mar  1 12:04:00 2014
         VPN Log
        [Tunnel Negotiation Info] >>> Initiator Send Main Mode 5th packet
    Mar  1 12:04:00 2014
         VPN Log
        [Tunnel Negotiation Info] <<< Initiator Received Main Mode 4th packet
    Mar  1 12:03:59 2014
         VPN Log
        [Tunnel Negotiation Info] >>> Initiator send Main Mode 3rd packet
    Mar  1 12:03:59 2014
         VPN Log
        [Tunnel Negotiation Info] <<< Initiator Received Main Mode 2nd packet
    Mar  1 12:03:59 2014
         VPN Log
        Ignoring Vendor ID payload [648982785bedbdd6...]
    Mar  1 12:03:59 2014
         VPN Log
        Received Vendor ID payload Type = [Dead Peer Detection]
    Mar  1 12:03:59 2014
         VPN Log
        Received Vendor ID payload Type = [draft-ietf-ipsec-nat-t-ike-00]
    Mar  1 12:03:59 2014
         VPN Log
        [Tunnel Negotiation Info] >>> Initiator Send Main Mode 1st packet
    Mar  1 12:03:59 2014
         VPN Log
        Initiating Main Mode to replace #863
    Mar  1 12:03:32 2014
         VPN Log
        Discarding duplicate packet; already STATE_QUICK_R2
    Mar  1 12:03:28 2014
         VPN Log
        [Tunnel Negotiation Info] Quick Mode Phase 2 SA Established, IPSec Tunnel Connected
    Mar  1 12:03:28 2014
         VPN Log
        [Tunnel Negotiation Info] <<< Responder Received Quick Mode 3rd packet
    Mar  1 12:03:27 2014
         VPN Log
        [Tunnel Negotiation Info] >>> Responder send Quick Mode 2nd packet
    Mar  1 12:03:27 2014
         VPN Log
        [Tunnel Negotiation Info] Outbound SPI value = c582ca66
    Mar  1 12:03:27 2014
         VPN Log
        [Tunnel Negotiation Info] Inbound  SPI value = fe2d660f
    Mar  1 12:03:27 2014
         VPN Log
        [Tunnel Negotiation Info] <<< Responder Received Quick Mode 1st packet
    Mar  1 12:01:10 2014
         VPN Log
        Discarding duplicate packet; already STATE_QUICK_R2
    Mar  1 12:00:31 2014
         VPN Log
        Informational Exchange message is invalid because it has a previously used Message ID (0xf14a5b81)
    Mar  1 12:00:28 2014
         VPN Log
        ignoring Delete SA payload: ISAKMP SA not found (maybe expired)
    Mar  1 12:00:09 2014
         VPN Log
        [Tunnel Negotiation Info] Quick Mode Phase 2 SA Established, IPSec Tunnel Connected
    Here's another one that just seems like it's going bezerk with establishing tunnels:
    Mar  1 12:30:49 2014
         VPN Log
        [Tunnel Negotiation Info] >>> Responder send Quick Mode 2nd packet
    Mar  1 12:30:49 2014
         VPN Log
        [Tunnel Negotiation Info] Outbound SPI value = ee1d9944
    Mar  1 12:30:49 2014
         VPN Log
        [Tunnel Negotiation Info] Inbound  SPI value = ea54adfc
    Mar  1 12:30:49 2014
         VPN Log
        [Tunnel Negotiation Info] <<< Responder Received Quick Mode 1st packet
    Mar  1 12:30:49 2014
         VPN Log
        [Tunnel Negotiation Info] Responder Cookies = e7bb 8999 0bb 55f1
    Mar  1 12:30:49 2014
         VPN Log
        [Tunnel Negotiation Info] Initiator Cookies = 1a2 43e6 50e7 c24b
    Mar  1 12:30:49 2014
         VPN Log
        [Tunnel Negotiation Info] Main Mode Phase 1 SA Established
    Mar  1 12:30:49 2014
         VPN Log
        [Tunnel Negotiation Info] >>> Responder Send Main Mode 6th packet
    Mar  1 12:30:49 2014
         VPN Log
        Main mode peer ID is ID_IPV4_ADDR: '69.73.703.187'
    Mar  1 12:30:49 2014
         VPN Log
        [Tunnel Negotiation Info] <<< Responder Received Main Mode 5th packet
    Mar  1 12:30:49 2014
         VPN Log
        [Tunnel Negotiation Info] >>> Responder send Main Mode 4th packet
    Mar  1 12:30:48 2014
         VPN Log
        [Tunnel Negotiation Info] <<< Responder Received Main Mode 3rd packet
    Mar  1 12:30:48 2014
         VPN Log
        [Tunnel Negotiation Info] <<< Responder Received Main Mode 3rd packet
    Mar  1 12:30:48 2014
         VPN Log
        [Tunnel Negotiation Info] >>> Responder Send Main Mode 2nd packet
    Mar  1 12:30:48 2014
         VPN Log
        [Tunnel Negotiation Info] <<< Responder Received Main Mode 1st packet
    Mar  1 12:30:48 2014
         VPN Log
        received Delete SA payload: deleting ISAKMP State #11132
    Mar  1 12:30:45 2014
         VPN Log
        Discarding duplicate packet; already STATE_QUICK_R2
    Mar  1 12:30:45 2014
         VPN Log
        Discarding duplicate packet; already STATE_QUICK_R2
    Mar  1 12:30:45 2014
         VPN Log
        Discarding duplicate packet; already STATE_QUICK_R2
    Mar  1 12:30:45 2014
         VPN Log
        Discarding duplicate packet; already STATE_QUICK_R2
    Mar  1 12:30:40 2014
         VPN Log
        Discarding duplicate packet; already STATE_QUICK_R2
    Mar  1 12:30:40 2014
         VPN Log
        Discarding duplicate packet; already STATE_QUICK_R2
    Mar  1 12:30:40 2014
         VPN Log
        Discarding duplicate packet; already STATE_QUICK_R2
    Mar  1 12:30:40 2014
         VPN Log
        Discarding duplicate packet; already STATE_QUICK_R2
    Mar  1 12:30:40 2014
         VPN Log
        Discarding duplicate packet; already STATE_QUICK_R2
    Mar  1 12:30:40 2014
         VPN Log
        Discarding duplicate packet; already STATE_QUICK_R2
    Mar  1 12:30:40 2014
         VPN Log
        Discarding duplicate packet; already STATE_QUICK_R2
    Mar  1 12:30:36 2014
         VPN Log
        [Tunnel Negotiation Info] Quick Mode Phase 2 SA Established, IPSec Tunnel Connected
    Mar  1 12:30:36 2014
         VPN Log
        [Tunnel Negotiation Info] Quick Mode Phase 2 SA Established, IPSec Tunnel Connected
    Mar  1 12:30:36 2014
         VPN Log
        [Tunnel Negotiation Info] Quick Mode Phase 2 SA Established, IPSec Tunnel Connected
    Mar  1 12:30:36 2014
         VPN Log
        [Tunnel Negotiation Info] Quick Mode Phase 2 SA Established, IPSec Tunnel Connected
    Mar  1 12:30:36 2014
         VPN Log
        [Tunnel Negotiation Info] Quick Mode Phase 2 SA Established, IPSec Tunnel Connected
    Mar  1 12:30:36 2014
         VPN Log
        [Tunnel Negotiation Info] <<< Responder Received Quick Mode 3rd packet
    Mar  1 12:30:36 2014
         VPN Log
        [Tunnel Negotiation Info] >>> Responder send Quick Mode 2nd packet
    Mar  1 12:30:36 2014
         VPN Log
        [Tunnel Negotiation Info] Outbound SPI value = 9afb9a70
    Mar  1 12:30:36 2014
         VPN Log
        [Tunnel Negotiation Info] Inbound  SPI value = ea54adfb
    Mar  1 12:30:36 2014
         VPN Log
        [Tunnel Negotiation Info] <<< Responder Received Quick Mode 1st packet
    Mar  1 12:30:35 2014
         VPN Log
        [Tunnel Negotiation Info] Responder Cookies = f39f a167 9a76 a182
    Mar  1 12:30:35 2014
         VPN Log
        [Tunnel Negotiation Info] Initiator Cookies = 3e15 253 fde4 3a35
    Mar  1 12:30:35 2014
         VPN Log
        [Tunnel Negotiation Info] Main Mode Phase 1 SA Established
    Mar  1 12:30:35 2014
         VPN Log
        [Tunnel Negotiation Info] >>> Responder Send Main Mode 6th packet
    Mar  1 12:30:35 2014
         VPN Log
        Main mode peer ID is ID_IPV4_ADDR: '69.73.703.187'
    Mar  1 12:30:35 2014
         VPN Log
        [Tunnel Negotiation Info] <<< Responder Received Main Mode 5th packet
    Mar  1 12:30:35 2014
         VPN Log
        [Tunnel Negotiation Info] >>> Responder send Main Mode 4th packet
    Mar  1 12:30:35 2014
         VPN Log
        [Tunnel Negotiation Info] <<< Responder Received Main Mode 3rd packet
    Mar  1 12:30:34 2014
         VPN Log
        [Tunnel Negotiation Info] >>> Responder Send Main Mode 2nd packet
    Mar  1 12:30:34 2014
         VPN Log
        [Tunnel Negotiation Info] <<< Responder Received Main Mode 1st packet
    Mar  1 12:30:34 2014
         VPN Log
        received Delete SA payload: deleting ISAKMP State #11130
    Mar  1 12:30:31 2014
         VPN Log
        Discarding duplicate packet; already STATE_QUICK_R2
    Mar  1 12:30:31 2014
         VPN Log
        Discarding duplicate packet; already STATE_QUICK_R2
    Mar  1 12:30:31 2014
         VPN Log
        Discarding duplicate packet; already STATE_QUICK_R2
    Mar  1 12:30:31 2014
         VPN Log
        Discarding duplicate packet; already STATE_QUICK_R2
    Mar  1 12:30:31 2014
         VPN Log
        Discarding duplicate packet; already STATE_QUICK_R2
    Mar  1 12:30:26 2014
         VPN Log
        Discarding duplicate packet; already STATE_QUICK_R2
    Mar  1 12:30:26 2014
         VPN Log
        Discarding duplicate packet; already STATE_QUICK_R2
    Mar  1 12:30:26 2014
         VPN Log
        Discarding duplicate packet; already STATE_QUICK_R2
    Mar  1 12:30:26 2014
         VPN Log
        Discarding duplicate packet; already STATE_QUICK_R2
    Mar  1 12:30:26 2014
         VPN Log
        Discarding duplicate packet; already STATE_QUICK_R2
    Mar  1 12:30:22 2014
         VPN Log
        [Tunnel Negotiation Info] Quick Mode Phase 2 SA Established, IPSec Tunnel Connected
    Mar  1 12:30:22 2014
         VPN Log
        [Tunnel Negotiation Info] Quick Mode Phase 2 SA Established, IPSec Tunnel Connected
    Mar  1 12:30:22 2014
         VPN Log
        [Tunnel Negotiation Info] Quick Mode Phase 2 SA Established, IPSec Tunnel Connected
    Mar  1 12:30:22 2014
         VPN Log
        [Tunnel Negotiation Info] Quick Mode Phase 2 SA Established, IPSec Tunnel Connected
    Mar  1 12:30:22 2014
         VPN Log
        [Tunnel Negotiation Info] Quick Mode Phase 2 SA Established, IPSec Tunnel Connected
    Mar  1 12:30:22 2014
         VPN Log
        [Tunnel Negotiation Info] Quick Mode Phase 2 SA Established, IPSec Tunnel Connected
    Mar  1 12:30:22 2014
         VPN Log
        [Tunnel Negotiation Info] <<< Responder Received Quick Mode 3rd packet
    Mar  1 12:30:22 2014
         VPN Log
        [Tunnel Negotiation Info] >>> Responder send Quick Mode 2nd packet
    Mar  1 12:30:22 2014
         VPN Log
        [Tunnel Negotiation Info] Outbound SPI value = 9a21d322
    Mar  1 12:30:22 2014
         VPN Log
        [Tunnel Negotiation Info] Inbound  SPI value = ea54adfa
    Mar  1 12:30:22 2014
         VPN Log
        [Tunnel Negotiation Info] <<< Responder Received Quick Mode 1st packet
    Mar  1 12:30:22 2014
         VPN Log
        [Tunnel Negotiation Info] Responder Cookies = 33d1 9cc0 a279 7d4d
    Mar  1 12:30:22 2014
         VPN Log
        [Tunnel Negotiation Info] Initiator Cookies = fff2 8d26 78e4 4845
    Mar  1 12:30:22 2014
         VPN Log
        [Tunnel Negotiation Info] Main Mode Phase 1 SA Established
    Mar  1 12:30:22 2014
         VPN Log
        [Tunnel Negotiation Info] >>> Responder Send Main Mode 6th packet
    Mar  1 12:30:22 2014
         VPN Log
        Main mode peer ID is ID_IPV4_ADDR: '69.73.703.187'
    Mar  1 12:30:22 2014
         VPN Log
        [Tunnel Negotiation Info] <<< Responder Received Main Mode 5th packet
    Mar  1 12:30:21 2014
         VPN Log
        [Tunnel Negotiation Info] >>> Responder send Main Mode 4th packet
    Mar  1 12:30:21 2014
         VPN Log
        [Tunnel Negotiation Info] <<< Responder Received Main Mode 3rd packet
    Mar  1 12:30:21 2014
         VPN Log
        [Tunnel Negotiation Info] >>> Responder Send Main Mode 2nd packet
    Mar  1 12:30:21 2014
         VPN Log
        [Tunnel Negotiation Info] >>> Responder Send Main Mode 2nd packet
    Mar  1 12:30:21 2014
         VPN Log
        [Tunnel Negotiation Info] >>> Responder Send Main Mode 2nd packet
    Mar  1 12:30:21 2014
         VPN Log
        [Tunnel Negotiation Info] <<< Responder Received Main Mode 1st packet
    Mar  1 12:30:21 2014
         VPN Log
        received Delete SA payload: deleting ISAKMP State #11128
    Mar  1 12:30:18 2014
         VPN Log
        Discarding duplicate packet; already STATE_QUICK_R2
    Mar  1 12:30:18 2014
         VPN Log
        Discarding duplicate packet; already STATE_QUICK_R2
    Mar  1 12:30:18 2014
         VPN Log
        Discarding duplicate packet; already STATE_QUICK_R2
    Mar  1 12:30:13 2014
         VPN Log
        Discarding duplicate packet; already STATE_QUICK_R2
    Mar  1 12:30:13 2014
         VPN Log
        Discarding duplicate packet; already STATE_QUICK_R2
    Mar  1 12:30:13 2014
         VPN Log
        Discarding duplicate packet; already STATE_QUICK_R2
    Mar  1 12:30:13 2014
         VPN Log
        Discarding duplicate packet; already STATE_QUICK_R2
    Mar  1 12:30:13 2014
         VPN Log
        Discarding duplicate packet; already STATE_QUICK_R2
    Mar  1 12:30:08 2014
         VPN Log
        [Tunnel Negotiation Info] Quick Mode Phase 2 SA Established, IPSec Tunnel Connected
    Mar  1 12:30:08 2014
         VPN Log
        [Tunnel Negotiation Info] Quick Mode Phase 2 SA Established, IPSec Tunnel Connected
    Mar  1 12:30:08 2014
         VPN Log
        [Tunnel Negotiation Info] Quick Mode Phase 2 SA Established, IPSec Tunnel Connected
    Mar  1 12:30:08 2014
         VPN Log
        [Tunnel Negotiation Info] Quick Mode Phase 2 SA Established, IPSec Tunnel Connected
    Mar  1 12:30:08 2014
         VPN Log
        [Tunnel Negotiation Info] Quick Mode Phase 2 SA Established, IPSec Tunnel Connected
    Mar  1 12:30:08 2014
         VPN Log
        [Tunnel Negotiation Info] Quick Mode Phase 2 SA Established, IPSec Tunnel Connected
    Mar  1 12:30:08 2014
         VPN Log
        [Tunnel Negotiation Info] <<< Responder Received Quick Mode 3rd packet
    Mar  1 12:30:08 2014
         VPN Log
        [Tunnel Negotiation Info] >>> Responder send Quick Mode 2nd packet
    Mar  1 12:30:08 2014
         VPN Log
        [Tunnel Negotiation Info] Outbound SPI value = f4dc2980
    Mar  1 12:30:08 2014
         VPN Log
        [Tunnel Negotiation Info] Inbound  SPI value = ea54adf9
    Mar  1 12:30:08 2014
         VPN Log
        [Tunnel Negotiation Info] <<< Responder Received Quick Mode 1st packet
    Mar  1 12:30:08 2014
         VPN Log
        [Tunnel Negotiation Info] Responder Cookies = be4b c078 afac 9ef6
    Mar  1 12:30:08 2014
         VPN Log
        [Tunnel Negotiation Info] Initiator Cookies = 7c8e dd4d a0db 71d2
    Mar  1 12:30:08 2014
         VPN Log
        [Tunnel Negotiation Info] Main Mode Phase 1 SA Established
    Mar  1 12:30:08 2014
         VPN Log
        [Tunnel Negotiation Info] >>> Responder Send Main Mode 6th packet
    Mar  1 12:30:08 2014
         VPN Log
        Main mode peer ID is ID_IPV4_ADDR: '69.73.703.187'
    Mar  1 12:30:08 2014
         VPN Log
        [Tunnel Negotiation Info] <<< Responder Received Main Mode 5th packet
    Mar  1 12:30:08 2014
         VPN Log
        [Tunnel Negotiation Info] >>> Responder send Main Mode 4th packet
    Mar  1 12:30:08 2014
         VPN Log
        [Tunnel Negotiation Info] >>> Responder send Main Mode 4th packet
    Mar  1 12:30:08 2014
         VPN Log
        [Tunnel Negotiation Info] <<< Responder Received Main Mode 3rd packet
    Mar  1 12:30:07 2014
         VPN Log
        [Tunnel Negotiation Info] >>> Responder Send Main Mode 2nd packet
    Mar  1 12:30:07 2014
         VPN Log
        [Tunnel Negotiation Info] <<< Responder Received Main Mode 1st packet
    Mar  1 12:30:07 2014
         VPN Log
        received Delete SA payload: deleting ISAKMP State #11126
    Mar  1 12:30:04 2014
         VPN Log
        Discarding duplicate packet; already STATE_QUICK_R2
    Mar  1 12:30:04 2014
         VPN Log
        Discarding duplicate packet; already STATE_QUICK_R2
    Mar  1 12:30:04 2014
         VPN Log
        Discarding duplicate packet; already STATE_QUICK_R2
    Mar  1 12:30:04 2014
         VPN Log
        Discarding duplicate packet; already STATE_QUICK_R2
    Mar  1 12:30:04 2014
         VPN Log
        Discarding duplicate packet; already STATE_QUICK_R2
    Mar  1 12:30:00 2014
         VPN Log
        Discarding duplicate packet; already STATE_QUICK_R2
    Mar  1 12:30:00 2014
         VPN Log
        Discarding duplicate packet; already STATE_QUICK_R2
    Mar  1 12:30:00 2014
         VPN Log
        Discarding duplicate packet; already STATE_QUICK_R2
    I've highlighted in yellow all the things that I think are odd on the first one.  Almost everything on the second one is odd to me.  Any ideas why there's so much re-negotiation?
    Huntsville's Premiere Car and Bike e-magazine: www.huntsvillecarscene.com       

    Samir,
    The logs are interesting. I would like to see the tunnel settings on the RV016 and Netgear. Can you post some screenshots? (Mask sensitive information)
    - Marty

  • Populating our log message along with standard sap log in ck11n.

    Hi all,
    I have developed a user exit which is used in costing of material using ck11n.
    Here i have to show our custom log message along with the standard log shown by standard sap system after costing run is complete.
    I got one FM-- CM_F_MESSAGE  which is used by SAP. But i want the message along with SAP messages and not separately.
    Can u help me out for this. its very urgent.
    Thanks in advance.

    Hi
    I'm not sure because I don't know that trx, but I seem the function group of that function manages a log, so you can try.
    This is an extract of abap code of SAPLCKDI where that fm is used:
    CALL FUNCTION 'CM_F_MESSAGE'
       EXPORTING
         ARBGB = Y_CMF-CK
         MSGNR = '327'
         MSGTY = Y_CMF-W
         MSGV1 = SICHT
         MSGV2 = KLVAR.
    So I suppose you should call it by this way:
    CALL FUNCTION 'CM_F_MESSAGE'
       EXPORTING
         ARBGB = <your message class>
         MSGNR = <message number>
         MSGTY = <message type>
         MSGV1 = <text 1>
         MSGV2 = <text 2>
         MSGV3 = <text 3>
    I think MSGV* is optional parameter.
    Max

  • I think I finished installing Mountain Lion, and am at the "log in" page with my name and the Lion icon, but I cannot do any of the functions on screen. That is, I cannot log in, sleep, restart, or shut down. I am running it on an Early 2009 Macbook Pro

    I think I finished installing Mountain Lion, and am at the "log in" page with the Mountain Lion icon, but I cannot do any of the functions on screen. That is, I cannot log in, sleep, restart, or shut down. I am running it on an Early 2009 Macbook Pro, which is said to have the capabilities of running Mountain Lion.

    BrettGoudy wrote:
    ...Is there any way I can install a partition that runs snow leopard on my early 2011 MB pro with what I have (new SSD, New RAM, Current version Lion running, no external drive, lack of original snow leopard disks [I lost them ] and the general 10.6.3 snow leopard boot disks)...
    As the last post suggests, call Apple and order a replacement original disc for about $17.  They will ask you the model and serial numbers.
    Your retail version of Snow Leopard OS 10.6.3 will not work on that Mac as it requires a minimum of OS X 10.6.7 to boot and operate.
    Another alternative is to again borrow another Mac to install your retail Snow Leopard into an external HD or partition, upgrade it to 10.6.8 and then clone it back to a partition on your MBP.

Maybe you are looking for