Tek-Tips is the largest IT community on the Internet today!

Members share and learn making Tek-Tips Forums the best source of peer-reviewed technical information on the Internet!

  • Congratulations strongm on being selected by the Tek-Tips community for having the most helpful posts in the forums last week. Way to Go!

9650 VPN Phone Not Retaining Settings

Status
Not open for further replies.

demanding

IS-IT--Management
Jan 7, 2008
631
US
I have a 9650 phone I'm trying to use as a VPN phone. After I enable VPN, enter the user name and password, it connects just fine and if I log out/back in it is fine but if I reboot (as you know can happen at home), the settings are lost - I have enabled VPN again, enter user name (password seems to stay but for grins I re-enter anyway) (if I do not do this, it gives me a 905 error and then goes into Discover. Is this the way it is suppose to work? I referred to Avaya document support.avaya.com/css/P8/documents/100168963 and see how to get settings to "save" but they are not. I expected this to be like the 4621 phones used as VPN-once everything is configured, the settings stay.
 
My 9611 vpn retains the settings in the case of a reboot what firmware is your CM and phone on?


There was an issue using the 10.0.0.x /24 in the private side of your network for an ip range , but this got addressed in later fixes , also what does your 46xx settings file look like?

APSS (SME)
ACSS (SME)
ACIS (UC)
 
CM 6.2; 9650 firmware is 3.1. In the 46xx settings file, what do you want to see?
 
I noticed under VPN settings in the 46xx settings file that VPNMode is set to "0" - is this correct?

############### VPN SETTINGS (H.323 ONLY) ################
##
## Variable Name : NVVPNMODE
## Valid Values
## 0 DISABLE
## 1 ENABLE
## Default Value
## 1 ENABLE
## Description
## This variable dictates when the VPN Client is started. If it's value is
## 1, VPN Client is started immediately after TCP/IP stack is initialized,
## If it's value is 0, VPN Client is disabled
## Example : Setting VPN startup mode to ENABLE.
## SET NVVPNMODE 1
SET NVVPNMODE 0
 
no that should be 1 , give that a whirl first

APSS (SME)
ACSS (SME)
ACIS (UC)
 
That did not work...and it caused an office phone to prompt for a VPN password. So I changed it back to "0". And now my office phone (even after rebooting it 2 more times) is prompting for a VPN login/password.
 
hmm pretty sure i gave you the correct setting there have a look below at an example on my setting file taken from another user tlpeter


Here a how to enable,disable and remove it.


Enable the vpn option

Open the 46xxsettings.txt and add the next lines:

CODE

IF $GROUP SEQ 0 GOTO NO96XXVPN

IF $GROUP SEQ 876 GOTO 96XXVPN

# 96XXVPN
GET 96xxvpn.txt

# NO96XXVPN

SET NVVPNMODE 0

SET VPNPROC 0



Then make a new file called: 96xxvpn.txt

Put in the next lines and change as needed:

CODE

################################################## #
## VPN Mode
## 0: Disabled, 1: Enabled.
################################################## #

SET NVVPNMODE 1

################################################## #
## Vendor.
## 1: Juniper/Netscreen, 2. Cisco
## 3: CheckPoint/ Nokia 4: Other
## 5: Nortel.
################################################## #

SET NVVPNSVENDOR 1

################################################## #
## Encapsulation Type.
## 0: 4500-4500, 1: Disabled
## 2: 2070-500, 3: ?
## 4: RFC (500-500)
################################################## #

SET NVVPNENCAPS 0

################################################## #
## Copy TOS.
## 1: Yes, 2: No
################################################## #

SET NVVPNCOPYTOS 2
################################################## #
## Authentication Type.
##
## [For Cisco/Juniper/Checkpoint/Other]
## 3: PSK, 4: PSK with Xauth
## 5: RSA signatures with Xauth, 6: Hybrid Xauth
## 7: RSA signatures.
##
## [Nortel Authentication Type]
## 1: Local credentials, 2: Radius Credentials.
## 3: Radius SecureID, 4: Radius Axent.
################################################## #

SET NVVPNAUTHTYPE 5
################################################## #
## VPN User Type.
## 1: Any, 2: User
################################################## #

SET NVVPNUSERTYPE 1
################################################## #
## VPN User name.
################################################## #

SET NVVPNUSER mscep1
################################################## #
## Password Type.
## 1: Save in Flash, 2: Erase on reset
## 3: Numeric OTP, 4: Alpha-Numeric OTP
## 5: Erase on VPN termination.
################################################## #

SET NVVPNPSWDTYPE 1
################################################## #
## User Password.
################################################## #

SET NVVPNPSWD mscep1
################################################## #
## IKE ID (Group Name).
################################################## #

SET NVIKEID mscep
################################################## #
## IKE ID Type.
## 1: IPv4_ADDR, 2: FQDN
## 3: USER_FQDN, 9: DER_ASN1_DN
## 11: Key ID
################################################## #

SET NVIKEIDTYPE 11
################################################## #
## IKE Xchg Mode.
## 1: Aggressive, 2: Identity Protect.
################################################## #

SET NVIKEXCHGMODE 2
################################################## #
## IKE DH Group.
################################################## #

SET NVIKEDHGRP 2
################################################## #
## IKE Encryption Algo.
## 1: AES-128, 2: 3DES
## 3: DEs 4: AEs-192
## 5: AES-256 0: Any
################################################## #

SET NVIKEP1ENCALG 0
################################################## #
## IKE Auth algo.
## 0: Any, 1: MD5
## 2: sHA-1
################################################## #

SET NVIKEP1AUTHALG 0
################################################## #
## IKE Config Mode.
## 0: Enabled, 1: Disabled.
################################################## #

SET NVIKECONFIGMODE 0
################################################## #
## IPsec PFS DH group.
################################################## #

SET NVPFSDHGRP 2
################################################## #
## IPsec Encryption Algo.
## 1: AES-128, 2: 3DES
## 3: DEs 4: AEs-192
## 5: AES-256 6: None
## 0: Any
################################################## #

SET NVIKEP2ENCALG 0
################################################## #
## IPsec Authentication Algo.
## 0: Any, 1: MD5
## 2: sHA-1
################################################## #

SET NVIKEP2AUTHALG 0
################################################## #
## Protected Network.
################################################## #

## SET NVIPSECSUBNET 0.0.0.0/0, 0.0.0.0/0
################################################## #
## IKE Over TCP.
## 0: Never, 1: Auto
## 2: Always
################################################## #

SET NVIKEOVERTCP 0
################################################## #
## Craft access
## 0: Enabled, 1: only view option is available?
################################################## #

SET PROCSTAT 0
################################################## #
## VPN craft access
## 0: disabled, 1: view only
## 2: View and edit.
################################################## #

SET VPNPROC 2
################################################## #
## Call Server address
################################################## #

SET MCIPADD 192.168.42.1

################################################## #
## craft access code
################################################## #

SET PROCPSWD 27238

################################################## #
## VPN craft access code
################################################## #

# END

APSS (SME)
ACSS (SME)
ACIS (UC)
 
Thanks. I have set up the 96xxvpn.txt file - and looking at the settings for the 46xx file - can you explain this part:

Open the 46xxsettings.txt and add the next lines:

CODE

IF $GROUP SEQ 0 GOTO NO96XXVPN

IF $GROUP SEQ 876 GOTO 96XXVPN

# 96XXVPN
GET 96xxvpn.txt

# NO96XXVPN

SET NVVPNMODE 0

SET VPNPROC 0


 
I put these settings on a test server and it works beautifully! I also looked up the meanings of the stuff above. So, since I have 96xx phones on the production server (along with the current 46xx VPN phones), is there any concern using the settings above for 9650 H323 phones as VPN on that production server (with regard to the settings you provided)?
 
Status
Not open for further replies.

Part and Inventory Search

Sponsor

Back
Top