Hi , all
I’m trying to make a VPN site-to-site from my office to AWS(Amazon) but’m having some problems.
Apr/27/2016 17:49:49 ipsec,debug AWS: KA remove: 1.1.1.1[4500]->2.2.2.2[4500]
Apr/27/2016 17:49:49 ipsec,debug AWS: unknown Informational exchange received.
Apr/27/2016 17:49:52 ipsec,debug AWS: initiate new phase 1 negotiation: 1.1.1.1[500]<=>2.2.2.2[500]
Apr/27/2016 17:49:52 ipsec,debug AWS: begin Identity Protection mode.
Apr/27/2016 17:49:52 ipsec,debug AWS: sent phase1 packet 1.1.1.1[500]<=>2.2.2.2[500] 22c7075e079d613b:0000000000000000
Apr/27/2016 17:49:52 ipsec,debug AWS: received Vendor ID: DPD
Apr/27/2016 17:49:52 ipsec,debug AWS: received Vendor ID: RFC 3947
Apr/27/2016 17:49:52 ipsec,debug AWS: Selected NAT-T version: RFC 3947
Apr/27/2016 17:49:52 ipsec,debug AWS: Hashing 2.2.2.2[500] with algo #2
Apr/27/2016 17:49:52 ipsec,debug AWS: Hashing 1.1.1.1[500] with algo #2
Apr/27/2016 17:49:52 ipsec,debug AWS: Adding remote and local NAT-D payloads.
Apr/27/2016 17:49:52 ipsec,debug AWS: sent phase1 packet 1.1.1.1[500]<=>2.2.2.2[500] 22c7075e079d613b:6baca71be74b3ff1
Apr/27/2016 17:49:52 ipsec,debug AWS: Hashing 1.1.1.1[500] with algo #2
Apr/27/2016 17:49:52 ipsec,debug AWS: NAT-D payload #0 verified
Apr/27/2016 17:49:52 ipsec,debug AWS: Hashing 2.2.2.2[500] with algo #2
Apr/27/2016 17:49:52 ipsec,debug AWS: NAT-D payload #1 doesn’t match
Apr/27/2016 17:49:52 ipsec,debug AWS: NAT detected: PEER
Apr/27/2016 17:49:52 ipsec,debug AWS: KA list add: 1.1.1.1[4500]->2.2.2.2[4500]
Apr/27/2016 17:49:52 ipsec,debug AWS: sent phase1 packet 1.1.1.1[4500]<=>2.2.2.2[4500] 22c7075e079d613b:6baca71be74b3ff1
Apr/27/2016 17:49:53 ipsec,debug AWS: ISAKMP-SA established 1.1.1.1[4500]-2.2.2.2[4500] spi:22c7075e079d613b:6baca71be74b3ff1
If you have any tutorial for aws.
Thank you for your help.