Ritesh
asked on
IPSEC VPN on Draytek 2860
I'm trying to setup a IPSEC VPN tunnel between a Draytek 2860 and a Cisco ASA 5520.
I did manage to establish the VPN connection before but now I am unable to connect. Here are the logs from Draytek Syslog
I did manage to establish the VPN connection before but now I am unable to connect. Here are the logs from Draytek Syslog
2018-08-13 01:41:29 [IPSEC][L2L][5:WMH_PXP1][@xx.xxx.x.xxx] IKE link timeout: state linking
2018-08-13 01:41:26 IKE <==, Next Payload=ISAKMP_NEXT_N, Exchange Type = 0x5, Message ID = 0x0
2018-08-13 01:41:20 IKE <==, Next Payload=ISAKMP_NEXT_N, Exchange Type = 0x5, Message ID = 0x0
2018-08-13 01:41:16 IKE ==>, Next Payload=ISAKMP_NEXT_KE, Exchange Type = 0x2, Message ID = 0x0
2018-08-13 01:41:16 Accept Phase1 prorosals : ENCR OAKLEY_AES_CBC, HASH OAKLEY_SHA
2018-08-13 01:41:16 IKE <==, Next Payload=ISAKMP_NEXT_SA, Exchange Type = 0x2, Message ID = 0x0
2018-08-13 01:41:16 IKE ==>, Next Payload=ISAKMP_NEXT_SA, Exchange Type = 0x2, Message ID = 0x0
2018-08-13 01:41:16 [IPSEC/IKE][L2L][5:WMH_PXP1][@xx.xxx.x.xxx] Initiating IKE Main Mode
2018-08-13 01:41:16 Initiating IKE Main Mode to xx.xxx.x.xxx
2018-08-13 01:41:16 Dialing Node5 (WMH_PXP1) : xx.xxx.x.xxx
Do your IPSEC Phase two policies match. Including the remote and local subnets that will be encrypted on both ends.
ASKER
Yes I believe so. Is there any way to pin-point where the issue lies exactly?
ASKER CERTIFIED SOLUTION
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
Author abandoned