Netgear FVS318Gv2 – ProSAFE VPN Firewall Series User Manual

Page of 129
Troubleshoot the VPN Client 
114
NETGEAR ProSAFE VPN Client 
Default (SA Cnx-P1) RECV phase 1 Main Mode [KEY][NONCE]
Default (SA Cnx-P1) SEND phase 1 Main Mode [ID][HASH][NOTIFY]
Default ipsec_get_keystate: no keystate in ISAKMP SA 00B57C50
Explanation. The pre-shared key or local ID might be incorrect. The logs of the remote 
endpoint might provide more information.
Resolution. Ensure that you use the same pre-shared key on each side of the VPN tunnel 
and that the local IDs are correctly defined. For information about configuring the pre-shared 
key, see 
received remote ID other than expected
VPN console log:
Default sysdep_app_open: Init Connection for : Cnx-Cnx-P2 Cnx-remote-addr
Default sysdep_app_open: IPV4_SUBNET Network 192.168.1.1
Default sysdep_app_open: IPV4_SUBNET Netmask 255.255.255.0
Default (SA Cnx-P1) SEND phase 1 Main Mode [SA][VID]
Default (SA Cnx-P1) RECV phase 1 Main Mode [SA][VID]
Default (SA Cnx-P1) SEND phase 1 Main Mode [KEY][NONCE]
Default (SA Cnx-P1) RECV phase 1 Main Mode [KEY][NONCE]
Default (SA Cnx-P1) SEND phase 1 Main Mode [ID][HASH][NOTIFY]
Default (SA Cnx-P1) RECV phase 1 Main Mode [ID][HASH][NOTIFY]
Default ike_phase_1_recv_ID: received remote ID other than expected
Explanation. The value in the Remote ID field does not match the value that the remote 
endpoint is expecting.
Resolution. Ensure that you use the correct value in the Remote ID field on the VPN Client 
(see 
30).
NO_PROPOSAL_CHOSEN error
This is a phase 1 error.
VPN console log:
Default sysdep_app_open: Init Connection for : Cnx-Cnx-P2 Cnx-remote-addr
Default sysdep_app_open: IPV4_SUBNET Network 192.168.1.1
Default sysdep_app_open: IPV4_SUBNET Netmask 255.255.255.0
Default (SA Cnx-P1) SEND phase 1 Main Mode [SA][VID]
Default RECV Informational [NOTIFY] with NO_PROPOSAL_CHOSEN error
Explanation. The phase 1 encryption algorithms might mismatch on the tunnel endpoints.
Resolution. Ensure that the phase 1 IKE encryption algorithms are the same on each side of 
the VPN tunnel. For information about authentication, see