![]() # 12:02:14 : Received duplicated pkt at Respnder NOTE: If you're based in India or Hong Kong, see the following articles: TS103322 - The India virtual server is removed from McAfee VPN products. If the problem continues, contact Customer Service. Use this article if: You are unable to connect to the internet through McAfee VPN. # 12:02:14 : The sent ip is 104.45.x.x, port is 500 Connection issues with McAfee VPN products. # 12:02:14 : IKE found existing ike sa node 2abc050 # 12:02:14 : IKE Catcher: received 616 bytes from socket. # 12:02:14 : IKEv2: Aborted negotiations for IKE_SA(0x02a4b5a0/00010002) because the time limit has elapsed. ![]() # 12:02:13 : Received duplicated pkt at Respnder # 12:02:13 : IKE found existing ike sa node 2abc050 3 Use only destination port UDP/4500 (NAT-T port) for the gateway. # 12:02:13 : IKE Catcher: received 616 bytes from socket. McAfee Firewall/VPN gateway for end-user computers running on Microsoft Windows. # 12:02:12 : install_ike_sa_key set ike sa crypto active. # 12:02:12 : IKESA LT timer armed, after seconds Is there anyway I can confirm on the Azure side if the packet is being received? I turned on debugging and confirmed with Juniper that the message might not be making it to Azure, but Azure resends the packet. Unset interface tunnel.1 acvpn-dynamic-routing Set vpn "AzureVPN" id 0x2 bind interface tunnel.1 Set vpn "AzureVPN" gateway "Azure Gateway" no-replay tunnel idletime 0 sec-level compatible Unset ipsec access-session info-exch-connected Set ipsec access-session dead-p2-sa-timeout 0 Set ipsec access-session lower-threshold 0 Set ipsec access-session upper-threshold 0 Set ike gateway ikev2 "Azure Gateway" auth-method self preshare peer preshare Set ike gateway ikev2 "Azure Gateway" address 104.45.138.88 outgoing-interface "ethernet0/6" preshare "********" sec-level compatible Set interface tunnel.1 ip unnumbered interface ethernet0/6 Set interface "ethernet0/6" zone "Untrust" Set zone "Untrust-Tun" vrouter "trust-vr" IKE V2 104.45.138.88: Received a notification message for 16388 NOTIFY_MSG_NAT_DETECTION_SOURCE_IP.Ĭan't figure out where the NAT is happening and believe this is the problem. IKE V2 104.45.138.88: Received a notification message for 16389 NOTIFY_MSG_NAT_DETECTION_DESTINATION_IP. Juniper logs show an information message with: Trying to setup a multi-site VPN between Azure and Juniper SSG5 Firmware version 6.3.0r17.0.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |