Oops, I should have anticipated that.
Here's the configuration on the SnapGear:
Tunnel Name: merriam
Enable this tunnel: [checked]
Local Interface: default gateway interface (the outside IP)
Keying: Aggressive Mode
Local address: static IP address
Remote address: DNS hostname address [this is a DSL connection using DLink DDNS]
Initiate Tunnel Negotiation: [checked]
Optional Endpoint ID: [blank]
IP Payload Compression: [not checked]
Dead Peer Detection: [not checked]
Initiate Phase 1 & 2 rekeying: [checked]
The remote party's DNS hostname: simplemoveskc.dlinkddns.com
Required Endpoint ID: merriam@simplemovesstl.com
Key lifetime (sec): 28800
Rekey margin (sec): 600
Rekey fuzz (%): 100
Preshared Secret: [secret, but the same on both ends]
Phase 1 Proposal: 3DES-MD5-Diffie-Hellman Group 2 (1024 bit)
Local Network: Network of LAN Port [192.168.207.0/24]
Remote Network: 192.168.0.0/24
Key Lifetime (sec): 3600
Phase 2 Proposal: 3DES-MD5
Perfect Forward Secrecy: [unchecked]
On the DIR-330, I have the following:
Enable: [checked]
Name: merriam
Local Net /Mask: 192.168.0.0/24
Remote IP: Site to Site 74.223.104.146
Remote Local LAN Net /Mask: 192.168.207.0/24
Authentication: Pre-shared Key [same as above]
Local ID : Custom string: merriam@simplemovesstl.com
Remote ID : Default
Phase 1 :
Aggressive mode [checked]
NAT-T Enable: [not checked]
Keep Alive / DPD: none
DH Group : 2 - modp 1024
IKE Proposal List :
Cipher Hash
#1: 3DES MD5
#2: 3DES MD5
#3: 3DES MD5
#4: 3DES MD5
IKE Lifetime : 28800 Seconds
Phase 2:
PFS Enable: [unchecked]
PFS DH Group: 2 - modp 1024-bit [this is grayed out]
IPSec Proposal List:
Cipher Hash
#1: 3DES MD5
#2: 3DES MD5
#3: 3DES MD5
#4: 3DES MD5
IPSec lifetime: 3600 seconds
I know IPSec is difficult, but this has been a complete nightmare. Seems like if everything is the same on both ends, it should just work. But maybe I'm just a dreamer.
Grateful for your help,
Bill