Yes, simple little desktop 8 port gigabit switches. I have put 8 of them in and 5 have failed. John T eServices For You "Life is a succession of lessons which must be lived to be understood." Ralph Waldo Emerson (1802-1882) > -----Original Message----- > From: isapros-bounce@xxxxxxxxxxxxx [mailto:isapros-bounce@xxxxxxxxxxxxx] On Behalf > Of Thomas W Shinder > Sent: Thursday, December 14, 2006 7:33 PM > To: isapros@xxxxxxxxxxxxx > Subject: [isapros] Re: Anyone Speak Linksys? > > Even their dumb switches fail since Syphco. I told you they were the > "Moron Empire" or at least something like that. > > Thomas W Shinder, M.D. > Site: www.isaserver.org > Blog: http://blogs.isaserver.org/shinder > Book: http://tinyurl.com/3xqb7 > MVP -- ISA Firewalls > > > > > -----Original Message----- > > From: isapros-bounce@xxxxxxxxxxxxx > > [mailto:isapros-bounce@xxxxxxxxxxxxx] On Behalf Of John T (Lists) > > Sent: Thursday, December 14, 2006 8:09 PM > > To: isapros@xxxxxxxxxxxxx > > Subject: [isapros] Re: Anyone Speak Linksys? > > > > The only Linksys I speak anymore (post Cisco) is barf. 50% of > > the devices I > > have purchased for clients post Cisco takeover have failed. > > (And nearly > > every device less than 5-6 years old but before Cisco got > > there hands on it > > are still in service, even old firmware/model versions of the > > same device > > that now new has a 50% or more failure rate.) > > > > John T > > eServices For You > > > > "Life is a succession of lessons which must be lived to be > > understood." > > Ralph Waldo Emerson (1802-1882) > > > > > > > > > -----Original Message----- > > > From: isapros-bounce@xxxxxxxxxxxxx > > [mailto:isapros-bounce@xxxxxxxxxxxxx] > > On Behalf > > > Of Amy Babinchak > > > Sent: Thursday, December 14, 2006 4:54 PM > > > To: isapros@xxxxxxxxxxxxx > > > Subject: [isapros] Anyone Speak Linksys? > > > > > > I've got this in my VPN log on the Linksys end of a ISA > > 2004 to Linksys > > > site-to-site VPN connection. The tunnel claims to be > > connected but I'm > > > having trouble sending data through it. Here's the log on > > the Linksys > > > side. > > > > > > Dec 14 18:37:38 2006 VPN Log received Delete SA > > payload: deleting > > > ISAKMP State #127 > > > Dec 14 18:37:38 2006 VPN Log Received Vendor ID > > payload Type = > > > [MS NT5 ISAKMPOAKLEY 00000004] > > > Dec 14 18:37:38 2006 VPN Log Ignoring Vendor ID > > payload Type = > > > [FRAGMENTATION] > > > Dec 14 18:37:38 2006 VPN Log Received Vendor ID > > payload Type = > > > [draft-ietf-ipsec-nat-t-ike-02_n] > > > Dec 14 18:37:38 2006 VPN Log [Tunnel Negotiation Info] <<< > > > Responder Received Main Mode 1st packet > > > Dec 14 18:37:38 2006 VPN Log [Tunnel Negotiation Info] >>> > > > Responder Send Main Mode 2nd packet > > > Dec 14 18:37:38 2006 VPN Log Initiating Main Mode > > > Dec 14 18:37:38 2006 VPN Log [Tunnel Negotiation Info] >>> > > > Initiator Send Main Mode 1st packet > > > Dec 14 18:37:38 2006 VPN Log Received Vendor ID > > payload Type = > > > [MS NT5 ISAKMPOAKLEY 00000004] > > > Dec 14 18:37:38 2006 VPN Log Ignoring Vendor ID > > payload Type = > > > [FRAGMENTATION] > > > Dec 14 18:37:38 2006 VPN Log Received Vendor ID > > payload Type = > > > [draft-ietf-ipsec-nat-t-ike-02_n] > > > Dec 14 18:37:38 2006 VPN Log [Tunnel Negotiation Info] <<< > > > Initiator Received Main Mode 2nd packet > > > Dec 14 18:37:38 2006 VPN Log [Tunnel Negotiation Info] >>> > > > Initiator send Main Mode 3rd packet > > > Dec 14 18:37:38 2006 VPN Log Phase 1 message is part of an > > > unknown exchange > > > Dec 14 18:37:39 2006 VPN Log [Tunnel Negotiation Info] <<< > > > Initiator Received Main Mode 4th packet > > > Dec 14 18:37:39 2006 VPN Log [Tunnel Negotiation Info] >>> > > > Initiator Send Main Mode 5th packet > > > Dec 14 18:37:39 2006 VPN Log [Tunnel Negotiation Info] >>> > > > Initiator Receive Main Mode 6th packet > > > Dec 14 18:37:39 2006 VPN Log Main mode peer ID is > > ID_IPV4_ADDR: > > > '72.158.241.2' > > > Dec 14 18:37:39 2006 VPN Log [Tunnel Negotiation > > Info] Main Mode > > > Phase 1 SA Established > > > Dec 14 18:37:39 2006 VPN Log [Tunnel Negotiation > > Info] Initiator > > > Cookies = 8829 f0cf 9dc2 73e1 > > > Dec 14 18:37:39 2006 VPN Log [Tunnel Negotiation > > Info] Responder > > > Cookies = 5bc7 46b1 dc42 b7d4 > > > Dec 14 18:37:39 2006 VPN Log initiating Quick Mode > > PSK+TUNNEL+PFS > > > > > > Dec 14 18:37:39 2006 VPN Log [Tunnel Negotiation Info] >>> > > > Initiator send Quick Mode 1st packet > > > Dec 14 18:37:39 2006 VPN Log IKE message has the > > Commit Flag set > > > but Pluto doesn't implement this feature; ignoring flag > > > Dec 14 18:37:39 2006 VPN Log [Tunnel Negotiation Info] <<< > > > Initiator Received Quick Mode 2nd packet > > > Dec 14 18:37:39 2006 VPN Log [Tunnel Negotiation > > Info] Inbound > > > SPI value = 617c35a1 > > > Dec 14 18:37:39 2006 VPN Log [Tunnel Negotiation > > Info] Outbound > > > SPI value = 9faea60d > > > Dec 14 18:37:39 2006 VPN Log [Tunnel Negotiation Info] >>> > > > Initiator Send Quick Mode 3rd packet > > > Dec 14 18:37:39 2006 VPN Log [Tunnel Negotiation > > Info] Quick Mode > > > Phase 2 SA Established, IPSec Tunnel Connected > > > Dec 14 18:37:39 2006 VPN Log Phase 1 message is part of an > > > unknown exchange > > > Dec 14 18:37:39 2006 VPN Log IKE message has the > > Commit Flag set > > > but Pluto doesn't implement this feature; ignoring flag > > > Dec 14 18:37:39 2006 VPN Log message ignored because > > it contains > > > an payload type (ISAKMP_NEXT_HASH) unexpected in this message > > > Dec 14 18:37:41 2006 VPN Log Phase 1 message is part of an > > > unknown exchange > > > > > > > > > > > > > > > Amy Babinchak > > > > > > > > > >