Looking at the summary of the VPN Client status it says that User is "online". It even gives a duration that the user has been online. The problem is the software never completes the connection on the local vista computer and I am unable to use the remote connection. I tried all 3 settings for the Port for the VPN - Auto, 443, and 60443.

A GroupVPN tunnel has to be created in RV042 defining preshared key etc. Using open source ipsec vpn clients, it should be possible to connect to RV042 using the preshared key. I tried with commercial greenbow client and one more free client called "Linsys ipsec client". analiza www.Vpntracker.com, jego tematy (linksys rvs4000, wrvs4400n, cisco rv042) i głównych konkurentów (cisco.com, thegreenbow.com, portforward.com) CISCO RV042G Cisco Small Business RV042G Dual Gigabit WAN VPN Router 4 port S Cisco RV042G VPN Load-Balance Router ??ú??º??í Internet ??a??ö??ë 2 5.0 out of 5 stars 2. 4 offers from $79.99. CISCO SYSTEMS 5-Port Gigabit VPN Router (RV130K9NA) 3.1 out of 5 stars 42. 2 offers Page 73: Configuration Of The Rv042 Appendix C Gateway-to-Gateway VPN Tunnel Enable. Select For the Local Security Gateway Type, select IP Only. The WAN IP address (B.B.B.B) of the RV042 will be automatically detected. For the Local Security Group Type, select Subnet. Enter the RV042's local network settings in the IP Address and Subnet Mask

This configuration guide was created using a Cisco RV042 v2 running firmware 1.3.12.19-tm Your Mac VPN Tracker runs on Mac OS X 10.4, 10.5 and 10.6 The configuration described in this guide requires VPN Tracker 6. Make sure Open VPN Tracker, and click the plus button in the bottom left corner of the window to add a new connection:

Cisco RV042G Dual Gigabit WAN VPN Router. Performance - Supports Gigabit Ethernet speeds for internal and external wired connections; easily manages large files and concurrent users to keep employees productive; Simple, highly secure access so that you can connect multiple locations and remote workers using VPN, or set up separate virtual networks and access rules to secure sensitive data This document explains how to upgrade the firmware on RV016, RV042, RV042G, and RV082 VPN Routers. Applicable Devices . RV016 (Download latest) RV042 (Download latest) RV042G (Download latest) RV082 (Download latest) Download Latest Firmware. Download the appropriate file using the links above. The objective of this article is to guide you through the setup wizards on the RV016, RV042, RV042G, and RV082 routers.

Objective. This article explains how to configure remote access Virtual Private Network (VPN) tunnel from client to gateway on RV016, RV042, RV042G and RV082 VPN Routers with the help of third party VPN client software as The Green Bow or VPN Tracker.

Deleting the Gateway to Gateway VPN connection makes all fine. The client is a MacBook Air with VPN Tracker software. And the Gateway to Gateway (to another RV042) always stops with the "packet from XXX.XXX.XXX.XXX:500: [Tunnel Authorize Fail] no connection has been authorized with policy=PSK+AGGRESSIVE" message. Setup VPN router and Mac for IPsec: Assuming that you are using VPN Tracker, please follow the helpful online guide released by equinux on this subject. If you are using IP Securitas 3.0, you can still follow the VPN Tracker guide to set the RV042, then make the following settings in the software as follows: This configuration guide was created using a Cisco RV042 v2 running firmware 1.3.12.19-tm Your Mac VPN Tracker runs on Mac OS X 10.4, 10.5 and 10.6 The configuration described in this guide requires VPN Tracker 6. Make sure Open VPN Tracker, and click the plus button in the bottom left corner of the window to add a new connection: Cisco RV042G Dual Gigabit WAN VPN Router. Performance - Supports Gigabit Ethernet speeds for internal and external wired connections; easily manages large files and concurrent users to keep employees productive; Simple, highly secure access so that you can connect multiple locations and remote workers using VPN, or set up separate virtual networks and access rules to secure sensitive data