Hi,<br><br>I'm receiving the following errors on initial IKE negotiation after renewing the DHCP address on the WAN interface that my IPSEC tunnel is being built over. Before the renewal, the devices rekeyed several times w/ no issues.<br>
<br>peer-172.16.103.7-tunnel-1" #365: max number of retransmissions (20) reached STATE_MAIN_I1. No response (or no acceptable response) to our first IKE message<br>Apr 14 17:23:38 pluto[19596]: "peer-172.16.103.7-tunnel-1" #365: starting keying attempt 15 of an unlimited number<br>
Apr 14 17:23:38 pluto[19596]: "peer-172.16.103.7-tunnel-1" #366: initiating Main Mode to replace #365<br>Apr 14 17:23:38 pluto[19596]: ERROR: "peer-172.16.103.7-tunnel-1" #366: sendto on eth0 to <a href="http://172.16.103.7:500">172.16.103.7:500</a> failed in main_outI1. Errno 22: Invalid argument<br>
Apr 14 17:23:48 pluto[19596]: ERROR: "peer-172.16.103.7-tunnel-1" #366: sendto on eth0 to <a href="http://172.16.103.7:500">172.16.103.7:500</a> failed in EVENT_RETRANSMIT. Errno 22: Invalid argument<br>Apr 14 17:24:08 pluto[19596]: ERROR: "peer-172.16.103.7-tunnel-1" #366: sendto on eth0 to <a href="http://172.16.103.7:500">172.16.103.7:500</a> failed in EVENT_RETRANSMIT. Errno 22: Invalid argument<br>
Apr 14 17:25:28 last message repeated 2 times<br>Apr 14 17:26:08 pluto[19596]: ERROR: "peer-172.16.103.7-tunnel-1" #366: sendto on eth0 to <a href="http://172.16.103.7:500">172.16.103.7:500</a> failed in EVENT_RETRANSMIT. Errno 22: Invalid argument<br>
Apr 14 17:27:28 last message repeated 2 times<br>Apr 14 17:28:08 pluto[19596]: ERROR: "peer-172.16.103.7-tunnel-1" #366: sendto on eth0 to <a href="http://172.16.103.7:500">172.16.103.7:500</a> failed in EVENT_RETRANSMIT. Errno 22: Invalid argument<br>
Apr 14 17:29:28 last message repeated 2 times<br>Apr 14 17:30:08 pluto[19596]: ERROR: "peer-172.16.103.7-tunnel-1" #366: sendto on eth0 to <a href="http://172.16.103.7:500">172.16.103.7:500</a> failed in EVENT_RETRANSMIT. Errno 22: Invalid argument<br>
Apr 14 17:31:28 last message repeated 2 times<br><br>Here's what I have configured in my ipsec.conf:<br><br>version 2.0<br><br>config setup<br> interfaces=%defaultroute<br> hidetos=yes<br> nhelpers=5<br>
plutowait=yes<br><br>conn clear<br> auto=ignore<br><br>conn clear-or-private<br> auto=ignore<br><br>conn private-or-clear<br> auto=ignore<br><br>conn private<br> auto=ignore<br><br>conn block<br>
auto=ignore<br><br>conn packetdefault<br> auto=ignore<br><br>conn peer-172.16.103.7-tunnel-1<br> left=%defaultroute<br> leftid=@Robyn<br> right=<a href="http://172.16.103.7">172.16.103.7</a><br>
leftsubnet=<a href="http://10.224.0.18/32">10.224.0.18/32</a><br> rightsubnet=<a href="http://10.224.0.17/32">10.224.0.17/32</a><br> ike=aes128-sha1<br> ikelifetime=28800s<br> aggrmode=no<br>
esp=aes128-sha1<br> keylife=3600s<br> rekeymargin=540s<br> type=tunnel<br> pfs=yes<br> compress=no<br> authby=rsasig<br> leftrsasigkey=myRSAkey #actual local side RSA pub key is here<br>
rightrsasigkey=remoteRSAkey #actual remote side RSA pub key is here<br> auto=start<br><br>Any ideas? Let me know if you need more information.<br><br>Thanks!<br><br>Robyn<br>