D-Link DI-808HV Router (280006OB) Logo

Related Topics:

Posted on Jul 07, 2008

D-Link DI-808HV Router VPN Tunnel No Package Flow

I I have D-Link 808 HV VPN Router and I have 3 Site to Site IPSEC Vpn's configured on it. Since a few days one of the VPN tunnels (192.168.0.0/192.168.1.0)either goes DOWN or stays UP but I cannot ping any packets between the two networks. However the WAN Interface is always UP and the rest 2 tunnels are also UP.Please find attached a portion of the log below...

Friday November 24, 2006 01:28:14 Warming : delete IPSec tunnel because remote subnet no response
Friday November 24, 2006 01:28:14 Send IKE (INFO) : delete [192.168.1.0|10.10.12.70]-->[193.220.24.185|192.168.0.0] phase 2
Friday November 24, 2006 01:28:14 IKE phase2 (IPSec SA) remove : 192.168.1.0 <-> 192.168.0.0
Friday November 24, 2006 01:28:14 inbound SPI = 0x35000010, outbound SPI = 0x2b000010
Friday November 24, 2006 01:28:14 Send IKE (INFO) : delete 10.10.12.70 -> 193.220.24.185 phase 1
Friday November 24, 2006 01:28:14 IKE phase1 (ISAKMP SA) remove : 10.10.12.70 <-> 193.220.24.185
Friday November 24, 2006 01:28:30 IPSec tunnel keep alive : peer IP 192.168.3.254
Friday November 24, 2006 01:28:30 [192.168.1.0|10.10.12.70]-->[10.10.12.74|192.168.3.0]
Friday November 24, 2006 01:29:08 IPSec tunnel keep alive : peer IP 192.168.2.254
Friday November 24, 2006 01:29:08 [192.168.1.0|10.10.12.70]-->[10.10.8.130|192.168.2.0]
Friday November 24, 2006 01:29:14 Send IKE M1(INIT) : 10.10.12.70 --> 193.220.24.185
Friday November 24, 2006 01:29:15 Receive IKE M2(RESP) : 193.220.24.185 --> 10.10.12.70
Friday November 24, 2006 01:29:15 Try to match with ENC:3DES AUTH:PSK HASH:SHA1 Group:Group5
Friday November 24, 2006 01:29:15 Send IKE M3(KEYINIT) : 10.10.12.70 --> 193.220.24.185
Friday November 24, 2006 01:29:15 Receive IKE M4(KEYRESP) : 193.220.24.185 --> 10.10.12.70
Friday November 24, 2006 01:29:16 Send IKE M5(IDINIT) : 10.10.12.70 --> 193.220.24.185
Friday November 24, 2006 01:29:16 Receive IKE M6(IDRESP) : 193.220.24.185 --> 10.10.12.70
Friday November 24, 2006 01:29:16 IKE Phase1 (ISAKMP SA) established : 193.220.24.185 <-> 10.10.12.70
Friday November 24, 2006 01:29:16 Send IKE Q1(QINIT) : 192.168.1.0 --> 192.168.0.0
Friday November 24, 2006 01:29:16 Receive IKE Q2(QRESP) : [192.168.0.0|193.220.24.185]-->[10.10.12.70|192.168.1.0]
Friday November 24, 2006 01:29:16 Try to match ESP with MODE:Tunnel PROTOCAL:ESP-3DES AUTH:MD5 HASH:Others PFS(Group):NONE
Friday November 24, 2006 01:29:16 Send IKE Q3(QHASH) : 192.168.1.0 --> 192.168.0.0
Friday November 24, 2006 01:29:16 IKE Phase2 (IPSEC SA) established : [192.168.0.0|193.220.24.185]<->[10.10.12.70|192.168.1.0]
Friday November 24, 2006 01:29:16 inbound SPI = 0x37000010, outbound SPI = 0x2d000010
Friday November 24, 2006 01:29:19 IPSec tunnel keep alive : peer IP 192.168.3.254
Friday November 24, 2006 01:29:19 [192.168.1.0|10.10.12.70]-->[10.10.12.74|192.168.3.0]
Friday November 24, 2006 01:29:25 IPSec tunnel keep alive : peer IP 192.168.2.254
Friday November 24, 2006 01:29:25 [192.168.1.0|10.10.12.70]-->[10.10.8.130|192.168.2.0
Friday November 24, 2006 01:29:47 [192.168.1.0|10.10.12.70]-->[193.220.24.185|192.168.0.0]
Friday November 24, 2006 01:29:49 IPSec tunnel keep alive : peer IP 192.168.3.254
Friday November 24, 2006 01:29:49 [192.168.1.0|10.10.12.70]-->[10.10.12.74|192.168.3.0]
Friday November 24, 2006 01:29:55 IPSec tunnel keep alive : peer IP 192.168.2.254
Friday November 24, 2006 01:29:55 [192.168.1.0|10.10.12.70]-->[10.10.8.130|192.168.2.0]
Friday November 24, 2006 01:30:03 IPSec tunnel keep alive : peer IP 192.168.0.254
Friday November 24, 2006 01:30:03 [192.168.1.0|10.10.12.70]-->[193.220.24.185|192.168.0.0]
Friday November 24, 2006 01:30:19 IPSec tunnel keep alive : peer IP 192.168.0.254
Friday November 24, 2006 01:30:19 [192.168.1.0|10.10.12.70]-->[193.220.24.185|192.168.0.0]

Your kind assistance will be highly appreciated.

Anup

  • tmolina Aug 27, 2008

    Same as the above, but with different IPs

×

1 Answer

Anonymous

Level 1:

An expert who has achieved level 1.

Mayor:

An expert whose answer got voted for 2 times.

  • Contributor 1 Answer
  • Posted on Oct 09, 2008
Anonymous
Contributor
Level 1:

An expert who has achieved level 1.

Mayor:

An expert whose answer got voted for 2 times.

Joined: Oct 09, 2008
Answers
1
Questions
0
Helped
2128
Points
2

Add Your Answer

×

Uploading: 0%

my-video-file.mp4

Complete. Click "Add" to insert your video. Add

×

Loading...
Loading...

Related Questions:

0helpful
1answer

Cannot link vpn. direct from internet provider works. when try connection via d-link dir625 does not connect. does allow internet access

Ok to Setup you VPN follow the instructions below. You can configure DI-804HV, DI-808HV, and DI-824VUP+ by web management interface. Type 192.168.0.1 (The LAN IP is 192.168.0.1 by default) in the browser, and then input user name: admin (there is no password by default) to pass authentication of web management interface. Then finish the configurations as showed below on Gateway A and Gateway B. Configurations of Gateway A 􀂾 Model: DI-804HV (DI-808HV, or DI-824VUP+) 􀂾 Firmware version: v1.40 (You can download the latest firmware on D-Link’s website.) 􀂾 WAN IP Address: 14.15.16.17 (Static IP) 􀂾 LAN IP Address: 10.5.6.1 (Subnet Mask: 255.255.255.0) 􀂾 VPN Configurations: 􀂄 Enable VPN function on Gateway A. 􀂄 Tunnel Name: toGatewayB 􀂄 VPN Method: IKE (Main mode) 􀂄 Local Subnet: 10.5.6.0 􀂄 Local Netmask: 255.255.255.0 􀂄 Remote Subnet: 172.23.9.0 􀂄 Remote Netmask: 255.255.255.0 􀂄 Remote Gateway: 22.23.24.25 􀂄 Pre-share Key: hr5xb8416aa9r6 􀂄 IKE Proposal (Please remember to add the correct proposal ID into the list of IKE Proposal Index when you finish inputting the following information.) 􀀹 Proposal Name: toGatewayB 􀀹 DH Group: Group 2 􀀹 Encryption Algorithm: 3DES 􀀹 Authentication Algorithm: SHA1 􀀹 Life Time: 28800 􀀹 Life Time Unit: Second 􀂄 IPSec Proposal (Please remember to add the correct proposal ID into the list of IKE Proposal Index when you finish inputting the following information.) 􀀹 Proposal Name: toGatewayB 􀀹 DH Group: Group 2 􀀹 Encapsulation Protocol: ESP 􀀹 Encryption Algorithm: 3DES 􀀹 Authentication Algorithm: SHA1 􀀹 Life Time: 3600 􀀹 Life Time Unit: Second 4. Verify the VPN connection Before you start to establish VPN connection between Gateway A and Gateway B, please make sure the Internet connection between Gateway A and Gateway B is workable. You can use “Ping Test” tool on Gateway A (or Gateway B), and input the IP address of Gateway B (or Gateway A) to see if there is any response from its peer device. Connect a PC (called PC_A) to the LAN port of Gateway A, and connect another PC (called PC_B) to the LAN port of Gateway B. Start to “Ping” PC_B on PC_A, then Gateway A will start to establish IPSec connection with Gateway B. If you can get “Ping” responses from PC_B on PC_A, then it means the tunnel has been established successfully. You can also check the “VPN Status” page with web management interface to verify the status of VPN connections. Figure 1: VPN status of Gateway A after IPSec connection has been established. Figure 2: VPN status of Gateway B after IPSec connection has been established.
Hope this helps
Here it is in PDF.http://www.vpnc.org/InteropProfiles/D-Link-DI.pdf
tip

How to setup VPN on a D-link Router.


Ok to Setup you VPN follow the instructions below. You can configure DI-804HV, DI-808HV, and DI-824VUP+ by web management interface. Type 192.168.0.1 (The LAN IP is 192.168.0.1 by default) in the browser, and then input user name: admin (there is no password by default) to pass authentication of web management interface. Then finish the configurations as showed below on Gateway A and Gateway B. Configurations of Gateway A 􀂾 Model: DI-804HV (DI-808HV, or DI-824VUP+) 􀂾 Firmware version: v1.40 (You can download the latest firmware on D-Link’s website.) 􀂾 WAN IP Address: 14.15.16.17 (Static IP) 􀂾 LAN IP Address: 10.5.6.1 (Subnet Mask: 255.255.255.0) 􀂾 VPN Configurations: 􀂄 Enable VPN function on Gateway A. 􀂄 Tunnel Name: toGatewayB 􀂄 VPN Method: IKE (Main mode) 􀂄 Local Subnet: 10.5.6.0 􀂄 Local Netmask: 255.255.255.0 􀂄 Remote Subnet: 172.23.9.0 􀂄 Remote Netmask: 255.255.255.0 􀂄 Remote Gateway: 22.23.24.25 􀂄 Pre-share Key: hr5xb8416aa9r6 􀂄 IKE Proposal (Please remember to add the correct proposal ID into the list of IKE Proposal Index when you finish inputting the following information.) 􀀹 Proposal Name: toGatewayB 􀀹 DH Group: Group 2 􀀹 Encryption Algorithm: 3DES 􀀹 Authentication Algorithm: SHA1 􀀹 Life Time: 28800 􀀹 Life Time Unit: Second 􀂄 IPSec Proposal (Please remember to add the correct proposal ID into the list of IKE Proposal Index when you finish inputting the following information.) 􀀹 Proposal Name: toGatewayB 􀀹 DH Group: Group 2 􀀹 Encapsulation Protocol: ESP 􀀹 Encryption Algorithm: 3DES 􀀹 Authentication Algorithm: SHA1 􀀹 Life Time: 3600 􀀹 Life Time Unit: Second 4. Verify the VPN connection Before you start to establish VPN connection between Gateway A and Gateway B, please make sure the Internet connection between Gateway A and Gateway B is workable. You can use “Ping Test” tool on Gateway A (or Gateway B), and input the IP address of Gateway B (or Gateway A) to see if there is any response from its peer device. Connect a PC (called PC_A) to the LAN port of Gateway A, and connect another PC (called PC_B) to the LAN port of Gateway B. Start to “Ping” PC_B on PC_A, then Gateway A will start to establish IPSec connection with Gateway B. If you can get “Ping” responses from PC_B on PC_A, then it means the tunnel has been established successfully. You can also check the “VPN Status” page with web management interface to verify the status of VPN connections. Figure 1: VPN status of Gateway A after IPSec connection has been established. Figure 2: VPN status of Gateway B after IPSec connection has been established.
Hope this helps
Here it is in PDF.http://www.vpnc.org/InteropProfiles/D-Link-DI.pdf






on Feb 11, 2010 • Computers & Internet
0helpful
2answers

Can't access network folder after connect thru vpn

if you connect through vpn and your network folder is in your local network, you cannot access the network folder because you are virtually connected to an external network other than your local network. because of this you are actually trying to find your local network folder that is not present on that external network. you may need to disconnect your vpn before you access the network folder in your local network
0helpful
1answer

Vpn site to site

you need to create an IPSec tunnel between the router and windows server 2003 (run secpol.msc). From the dlink router, you need to set the IP address of the VoIP gateway as part of the LAN that is included on the VPN tunnel. Since it is the server 2003 that has a static IP, you need to initiate the connection from the Dlink router.
0helpful
1answer

VPN tunnel between two DLINK VPN DIR-130

- Logon to the configuration page of your D-Link.
- Go to Advanced tab
- And Click on Firewall Settings on the left side
- Under that look for Application Gateway Level at the bottom and you must uncheck at the box on it and click on save settings at the top.

0helpful
1answer

VPN

This example will demonstrate how to create a Virtual private Network (VPN) between two remote locations through the Internet. The VPN policy will use 3DES IPSec to securely send/receive encrypted data over the Internet. When the VPN tunnel is enabled, the two offices will virtually appear to be on the same local network. This example will consist of two DI-804V VPN Routers with a simple setup. The two remote offices in this example will be known as Office A and Office B. Both VPN Routers must already be set up and able to access each other. This is only an example, your setup will vary using the WAN IP address provided by your ISP. Please note the differences in the IP addresses for each office. We will begin by configuring the DI-804V at Office A. Start by going into VPN Settings under the Basic Setup menu. Step 1. In the Connection Name field, type in OfficeA. Click ADD. Step 2. A properties screen will appear for the new connection you have made. Fill in the appropriate information for Office A: Connection Name: OfficeA Local IPSEC Identifier: Local Remote IPSEC Identifier: Remote Remote IP Network: 192.168.1.0 Remote IP Netmask: 255.255.255.0 Remote Gateway IP: 192.170.0.2 Network Interface: WAN ETHERNET Secure Association: IKE Perfect Forward Secure: Enabled PreShared Key: 123456 Key Life: 28800 IKE Life Time: 3600 Step 3 Click SAVE. There should now be a VPN policy created for Office A. Now you will want to Save & Restart the DI-804V. Note: 123456 is an example of a preshared key, please fill in any secret preshared key you desire. Keep in mind that both sites require the same preshared key. Office A setup is now complete, we will now configure Office B with the other DI-804V, Follow the same steps previously with Ofice A to create a VPN policy. Step 1 Please change the appropriate information. Connection Name: OfficeB Local IPSEC Identifier: Local Remote IPSEC Identifier: Remote Remote IP Network: 192.168.0.0 Remote IP Netmask: 255.255.255.0 Remote Gateway IP: 192.170.0.1 Network Interface: WAN ETHERNET Secure Association: IKE Perfect Forward Secure: Enabled PreShared Key: 123456 Key Life: 28800 IKE Life Time: 3600 Step 2 Click SAVE. There should now be a VPN policy created for Office B. Now you will want to Save & Restart the DI-804V. After the VPN policies have been created for the two Offices, the two remote locations should authenticate and connect. To view the status of the VPN connection, go to the Device Status menu. On the bottom-left side of the menu, click on the VPN Status icon. A VPN Status pop-up screen will appear showing VPN connection status. If a VPN tunnel is active, the State should indicate Q-Estab. Go to a DOS prompt and ping the internal IP address of the remote network.
0helpful
1answer

Configuring a VPN tunnel

Step 1: Log into the web based configuration of the router by typing in the IP address of the router (default: 192.168.0.1) in your web browser. By default the username is admin and there is no password. Step 2: Click the VPN button on the left column, select the checkbox to Enable the VPN, and then in the box next to Max. number of tunnels , enter the maximum numbers of VPN tunnels that you would like to have connected. Step 3: In the space provided, enter the Tunnel Name for ID number 1, select IKE, and then click More. Step 4: In the Local Subnet and Local Netmask fields enter the network identifier for the local DI-804HV´s LAN and the corresponding subnet mask. Step 5: In the Remote Subnet and Remote Netmask fields enter the network identifier for the remote DI-804HV´s LAN and the corresponding subnet mask. Step 6: In the Remote Gateway field enter the WAN IP address of the remote DI-804HV and in the Preshared Key field, enter a key which must be exactly the same as the Preshared Key that is configured on the remote DI-804HV. Step 7: Click Apply and then click on Select IKE Proposal... Step 8: Enter a name for proposal ID number 1 and select Group 1, 2, or 5 from the DH Group dropdown menu. Step 9: Select DES or 3DES as the Encryption Algorithm and either SHA-1 or MD5 as the Authentication Algorithm. Step 10: Enter a Lifetime value and then either select Sec. or KByte as the unit for the lifetime value. Step 11: Select 1 out of the Proposal ID dropdown menu and click Add To, which will add the proposal that was just configured to the IKE Proposal Index. Click Apply and then click Back. Step 12: Click on Select IPSec Proposal... Step 13: Enter a name for proposal ID number 1 and select Group 1, 2, 5, or None from the DH Group dropdown menu. Step 14: Select ESP or AH as the Encapsulation Protocol. Step 15: Select DES or 3DES as the Encryption Algorithm and either SHA-1, MD5, or None as the Authentication Algorithm. Step 16: Enter a Lifetime value and then either select Sec. or KB as the unit for the lifetime value. Step 17: Select 1 out of the Proposal ID dropdown menu and click Add To, which will add the proposal that was just configured to the IPSec Proposal Index. Click Apply and then click Restart. Step 18: Follow these instructions to configure your Other DI-804HV using the exact same settings for the IKE Proposal and the IPSec Proposal. Also make sure that Step 4 is configured to reflect the LAN settings for what is now the Local DI-804HV and that Steps 5 & 6 are configured to reflect the Subnet and WAN IP of what is now the Remote DI-804HV Step 19: To establish the connection, open a command prompt and ping an IP address of a computer on the remote LAN. Once you receive replies the tunnel has been established.
0helpful
1answer

Configuring the DI-804HV/DI-808HV

Step 1: Log into the web based configuration of the router by typing in the IP address of the router (default: 192.168.0.1) in your web browser. By default the username is admin and there is no password. Step 2: Click the VPN button on the left column, select the checkbox to Enable the VPN, and then in the box next to Max. number of tunnels, enter the maximum numbers of VPN tunnels that you would like to have connected. Step 3: In the space provided, enter the Tunnel Name for ID number 1, select IKE, and then click More. Step 4: In the Local Subnet and Local Netmask fields enter the network identifier for DI-804HV´s LAN and the corresponding subnet mask. Step 5: In the Remote Subnet and Remote Netmask fields enter the network identifier for the DI-804V´s LAN and the corresponding subnet mask. Step 6: In the Remote Gateway field enter the WAN IP address of the remote DI-804V and in the Preshared Key field, enter a key which must be exactly the same as the Preshared Key that is configured on the DI-804V. Step 7: Click Apply and then click on Select IKE Proposal... Step 8: Enter a name for proposal ID number 1 and select Group 2 from the DH Group drop-down menu. Step 9: Select 3DES as the Encryption Algorithm and SHA-1 as the Authentication Algorithm. Step 10: Enter a Lifetime value of 28800 and then select Sec. as the unit for the lifetime value. Step 11: Select 1 out of the Proposal ID drop-down menu and click Add To, which will add the proposal that was just configured to the IKE Proposal Index. Click Apply and then click Back. Step 12: Click on Select IPSec Proposal... Step 13: Enter a name for proposal ID number 1 and select None from the DH Group drop-down menu. Step 14: Select ESP as the Encapsulation Protocol. Step 15: Select 3DES as the Encryption Algorithm and MD5 as the Authentication Algorithm. Step 16: Enter a Lifetime value of 3600 and then select Sec. as the unit for the lifetime value. Step 17: Select 1 out of the Proposal ID dropdown menu and click Add To, which will add the proposal that was just configured to the IPSec Proposal Index. Click Apply and then click Restart. Configuring the DI-804V: Step 1: Access the router?s web configuration by entering the router?s IP address in your web browser. The default IP address is 192.168.0.1. Login using your password. The default username is admin and the password is blank. Help Accessing Web Management Step 2: Click on Basic Setup and then select Device IP Settings on the left. Step 3: Change the LAN IP address so that it is on a different subnet than the LAN of the DI-804HV (ie 192.168.1.1). Step 4: Click Next until you reach the Save & Restart screen. Click Save & Restart and then click Basic Setup once the unit has rebooted. Step 3: Click on VPN Settings. Step 4: Name your VPN connection and click ADD. Step 5: In Remote IP Network and Remote IP Netmask fields enter the network identifier and corresponding subnet mask of the DI-804HV´s LAN. Step 6: In the Remote Gateway IP field enter the WAN IP address of the DI-804HV and make sure that the Network Interface is set to WAN Ethernet. Step 7: Verify that Secure Association is set to IKE and that Perfect Forward Secure is Disabled. Step 8: Verify the Encryption Protocol is set to 3DES and enter in your Preshared Key. The Preshared Key needs to be identical to the one configured on the DI-804HV Step 9: Leave the Key Life and IKE Life Time values at their default levels and click SAVE. Step 10: Click Next and then click on Save & Restart Establishing a connection: Step 1: Open a command prompt (Start > Run and type CMD) and from a computer on the internal LAN of the DI-804HV, ping the IP address of a computer that is on the internal LAN of the DI-804V, or vice versa. Step 2: Once you begin to receive replies, the VPN connection has been established. Step 3: To view the Status of the VPN on the DI-804V, click on Device Status. Step 4: From the Device Status screen click on VPN Status. Step 5: When the VPN has been established, the Status will be Active.
0helpful
1answer

Nortel Extranet VPN using ESP IPSec

Step 1 Go into the web-based configuration on the router (enter 192.168.0.1 in your web brower). Enter username (admin) and password (blank). Step 2 Click on Advanced at the top and then click on Applications on the left side. Step 3 Check Enable Step 4 Enter a name (i.e. Nortel). Step 5 Enter 500 for Trigger Port (500 - 500). Step 6 Select Both for Trigger Type. Step 7 Enter 500 for Public Port. Step 8 Select Both for Public Type. Step 9 Click Apply and then click on Continue when prompted.
0helpful
1answer

Nortel Contivity VPN client?

Nortel Contivity will work with the your D-Link router, however its functionality depends on the authentication type (AH will not work), NAT compatibilty mode, and disabling keep alives on the server. Contact your Network Administrator to find out how your VPN is configured. Step 1 Verify that you are using the latest version of firmware on your router. Step 2 Login to the Web Management for your router by entering its IP address (192.168.0.1) in your web browser. The default username is admin, and the password is blank. Step 3 Click the Advanced Tab to access the Virtual Server Settings. There is a list of pre-defined Virtual Server Rules towards the bottom of the page. Find the IPSec Rule. Click the pen and paper icon to edit its settings. Enable the rule, enter the IP address of the computer attempting to connect to the VPN in the Private IP field, then Apply the changes. Step 4 Create a new Virtual Server entry. Name the Virtual Server, "NortelVPN". Enter the IP address of the computer attempting to connect to the VPN in the Private IP field. For the Protocol Type, select Both. Enter 9550 for both the Public and Private Ports. Set the Schedule to always, then Apply the settings. Step 5 Access the Tools Page, then click the Misc button. Disable IPSec Pass-through, then click Apply. If the VPN Server is properly configured to work with clients behind NAT routers you should be able to connect to the VPN.
Not finding what you are looking for?

2,138 views

Ask a Question

Usually answered in minutes!

Top D-Link Computers & Internet Experts

ExpressFiX
ExpressFiX

Level 2 Expert

691 Answers

k24674

Level 3 Expert

8093 Answers

Grand Canyon Tech
Grand Canyon Tech

Level 3 Expert

3867 Answers

Are you a D-Link Computer and Internet Expert? Answer questions, earn points and help others

Answer questions

Manuals & User Guides

Loading...