PhoneGurl7385
Programmer
I am trying to set up a VPN phone with the Avaya 5610. I have made it through Phase 1 and having an issue with Phase 2.
Error code:3997700:0
Module:IKECFG:1184
Error code: 3997700:0
Module: IKMPD:353
My Settings are the following:
SERVER: IP OF THE VPN ROUTER
IKE ID: GroupVPN
PSK: presharded key from IT guy (re-entered serveral times to ensure it was correct)
IKE PARAMETERS:
IKE ID TYPE: FQDN
Diffie-Helman Group: 2
Encryption Alg: 3DES
Authentication Alg: SHA1
IKE Xchg Mode: Agressive
IKE Config Mode: Disabled
XAuth: Disabled
Cert Expiry Check: Disabled
Cert DN Check: Disabled
IPSec Parameters:
Encryption Alg:3DES
Authentication Alg: SHA1
Diffie-Helman Group: 2
VPN START MODE: BOOT
PASSWORD TYPE: N/A
Encapulation: 4500-4500
Systlog Server: Nothing programmed here
Protected Nets:
Virtual IP: Statically assigned to the internal subnet
Remote Net #1: 192.XXX.X.0/24
COPY TOS: NO
FILE SRVR: BLANK
QTEST: DISABLED
CONNECTIVITY CHECK: ALWAYS
I have checked with the router configuration and it matches. I am getting an error on the Sonicwall that
NAT Discovery : Local IPSec Security Gateway behind a NAT/NAPT Device
NAT Discovery : Peer IPSec Security Gateway behind a NAT/NAPT DeviceIKE Responder: ESP encryption algorithm does not match
IKE Responder: IPSec proposal does not match (Phase 2)
Any suggestions on how to fix this issue?
Error code:3997700:0
Module:IKECFG:1184
Error code: 3997700:0
Module: IKMPD:353
My Settings are the following:
SERVER: IP OF THE VPN ROUTER
IKE ID: GroupVPN
PSK: presharded key from IT guy (re-entered serveral times to ensure it was correct)
IKE PARAMETERS:
IKE ID TYPE: FQDN
Diffie-Helman Group: 2
Encryption Alg: 3DES
Authentication Alg: SHA1
IKE Xchg Mode: Agressive
IKE Config Mode: Disabled
XAuth: Disabled
Cert Expiry Check: Disabled
Cert DN Check: Disabled
IPSec Parameters:
Encryption Alg:3DES
Authentication Alg: SHA1
Diffie-Helman Group: 2
VPN START MODE: BOOT
PASSWORD TYPE: N/A
Encapulation: 4500-4500
Systlog Server: Nothing programmed here
Protected Nets:
Virtual IP: Statically assigned to the internal subnet
Remote Net #1: 192.XXX.X.0/24
COPY TOS: NO
FILE SRVR: BLANK
QTEST: DISABLED
CONNECTIVITY CHECK: ALWAYS
I have checked with the router configuration and it matches. I am getting an error on the Sonicwall that
NAT Discovery : Local IPSec Security Gateway behind a NAT/NAPT Device
NAT Discovery : Peer IPSec Security Gateway behind a NAT/NAPT DeviceIKE Responder: ESP encryption algorithm does not match
IKE Responder: IPSec proposal does not match (Phase 2)
Any suggestions on how to fix this issue?