Προς το περιεχόμενο

Προτεινόμενες αναρτήσεις

Δημοσ.

Μετά από εγκατάσταση  του screw soft κι έπειτα κάνοντας import το  file με τις έτοιμες ρυθμίσεις προσπάθησα να συνδεθώ με το vpn της σχολής στην οποία φοιτώ.  Μου δείχνει ότι με συνδέει, προσπαθώ να μπω αλλά δεν ανοίγει καμία σελίδα, με αποσυνδέει και με συνδέει ξανά συνεχώς κάνοντας το ίδιο πράγμα. Επικοινώνησα με το τμήμα της σχολής  και συγκεκριμένα με τον υπεύθυνο για το vpn και με ενημέωρσε πως αν ο πάροχος μου είναι wind ή cyta πιθανότατα δεν θα καταφέρω να συνδεθώ, μιας και είχαν κι άλλοι παρόμοιο θέμα. Εν συνεχεία επικοινώνησα με τη wind η οποία μου είπε ότι δεν υπάρχει θέμα από αυτούς για το vpn. Με λίγα λόγια κανείς δεν ξέρει. Απενεργοποίησα το firewall (windows defender) αλλά τζίφος. Μπορώ να κάνω κάτι; Στο ρούτερ ας πούμε.

Δημοσ.

Χωρίς logs καταρχάς (απο το pc κατά την διάρκεια της διαδικασίας της σύνδεσης με vpn ή και σε συνενόηση με το υπέυθυνο τμήμα vpn της σχολής να βλέπει αντίστοιχα logs στην απέναντι πλευρά προερετικά) δεν θα βγεί καμία άκρη. Ο πάροχος που σου δίνει Internet δεν θα πρέπει να παρεμβάλεται εκτός αν  είσαι πίσω CGN και το modem/router στο σπίτι σου έχει private ip στο wan interface ή RFC 6598 (100.64.0.0/10) και προσπαθείς να κάνεις IPsec VPN.  Σε κάθε περίπτωση μπορείς να δείς στο modem/router σου (wan ipv4 address) αλλά και αν έχει κάποια επιλογή IPsec vpn passthrough (θα πρέπει να είναι ενεργοποιημένη) όπως και τοπικά logs απο το pc όταν προσπαθεί να ανοίξει vpn.  

Δημοσ.

Τώρα από σου πω ότι μου ακούγονται κινέζικα? Δεν έχω τόσο ειδικές γνώσεις. Αν θες γίνε πιο συγκεκριμένος σε παρακαλώ κι ευχαριστώ φυσικά για τη βοήθεια 

Δημοσ.

Δές σε google βάση του modem/router που έχεις:

-- Έχει επιλογή για IPsec passthrough και πως το ενεργοποιείς

-- Πως να δείς την WAN IPv4 του modem/router που έχεις (δεν χρείαζετε να πείς εδω ποιά είναι απλά αν είναι public ή κάτι άλλο)

 --- Αν έισαι πίσω απο CGN τότε θα έχεις private IPv4 στην WAN ή κάτι εντός του 100.64.0.0/10 ως IPv4 

    https://whatismyipaddress.com/private-ip

  https://www.lifewire.com/what-is-a-private-ip-address-2625970

Για logs  στον VPN client στο PC σου με ένα απλό google search:

-- https://www.watchguard.com/help/docs/fireware/12/en-US/Content/en-US/mvpn/ipsec/client/shrew_client_troubleshoot_c.html

 

 

Δημοσ.

attached to key daemon ...
peer configured
iskamp proposal configured
esp proposal configured
client configured
local id configured
remote id configured
pre-shared key configured
bringing up tunnel ...
no dhcp response from gateway
tunnel disabled
detached from key daemonattached to key daemon ...
peer configured
iskamp proposal configured
esp proposal configured
client configured
local id configured
remote id configured
pre-shared key configured
bringing up tunnel ...
no dhcp response from gateway
tunnel disabled
detached from key daemonattached to key daemon ...
peer configured
iskamp proposal configured
esp proposal configured
client configured
local id configured
remote id configured
pre-shared key configured
bringing up tunnel ...
no dhcp response from gateway
tunnel disabled
detached from key daemonattached to key daemon ...
peer configured
iskamp proposal configured
esp proposal configured
client configured
local id configured
remote id configured
pre-shared key configured
bringing up tunnel ...
no dhcp response from gateway
tunnel disabled
detached from key daemon

Δημοσ.

1. Με τα προηγούμενα (IPsec passthrough, WAN ipv4 etc) δεν αναφέρεις κάτι ?

2. Τα logs σε αυτό το επίπεδο λεπτομέριας είναι άχρηστα. Θές περισσότερη λεπτομέρεια (debug/loud level).

 

Θα σου πρότεινα να συνενοηθείς με το VPN/IT τμήμα της σχολής για παιρετέρω βοήθεια, αυτοί δίνουν το VPN με τις σχετικές ρυθμίσεις/προυποθέσεις και είναι υπεύθυνοι για την λειτουργία του και τις σχετικές βοήθειες (...προτού πετάξουν την μπάλα στην εξέδρα ότι φταίει κάτι άλλο).

Δημοσ.

Όχι,δεν έκανα κάτι ε τα άλλα γιατί μου φάνηκε δύσκολο το πώς. Μίλησα με τον υπεύθυνο αλλά ούτε καν υπάρχει περίπτωση να βρω άκρη. Τα logs ομως ειναι:

19/04/22 02:43:44 ## : IKE Daemon, ver 2.2.2
19/04/22 02:43:44 ## : Copyright 2013 Shrew Soft Inc.
19/04/22 02:43:44 ## : This product linked OpenSSL 1.0.1c 10 May 2012
19/04/22 02:43:44 ii : opened 'C:\Program Files\ShrewSoft\VPN Client\debug\iked.log'
19/04/22 02:43:44 ii : rebuilding vnet device list ...
19/04/22 02:43:44 ii : device ROOT\VNET\0000 disabled
19/04/22 02:43:44 ii : network process thread begin ...
19/04/22 02:43:44 ii : pfkey process thread begin ...
19/04/22 02:43:44 ii : ipc server process thread begin ...
19/04/22 02:44:13 ii : ipc client process thread begin ...
19/04/22 02:44:13 <A : peer config add message
19/04/22 02:44:13 <A : proposal config message
19/04/22 02:44:13 <A : proposal config message
19/04/22 02:44:13 <A : client config message
19/04/22 02:44:13 <A : xauth username message
19/04/22 02:44:13 <A : xauth password message
19/04/22 02:44:13 <A : local id 'vpn-clients' message
19/04/22 02:44:13 <A : preshared key message
19/04/22 02:44:13 <A : peer tunnel enable message
19/04/22 02:44:13 DB : peer ref increment ( ref count = 1, obj count = 0 )
19/04/22 02:44:13 DB : peer added ( obj count = 1 )
19/04/22 02:44:13 ii : local address 192.168.1.7 selected for peer
19/04/22 02:44:13 DB : peer ref increment ( ref count = 2, obj count = 1 )
19/04/22 02:44:13 DB : tunnel ref increment ( ref count = 1, obj count = 0 )
19/04/22 02:44:13 DB : tunnel added ( obj count = 1 )
19/04/22 02:44:13 DB : tunnel ref increment ( ref count = 2, obj count = 1 )
19/04/22 02:44:13 DB : new phase1 ( ISAKMP initiator )
19/04/22 02:44:13 DB : exchange type is aggressive
19/04/22 02:44:13 DB : 192.168.1.7:500 <-> 62.217.96.231:500
19/04/22 02:44:13 DB : 42c46d696b4edc45:0000000000000000
19/04/22 02:44:13 DB : phase1 ref increment ( ref count = 1, obj count = 0 )
19/04/22 02:44:13 DB : phase1 added ( obj count = 1 )
19/04/22 02:44:13 >> : security association payload
19/04/22 02:44:13 >> : - proposal #1 payload 
19/04/22 02:44:13 >> : -- transform #1 payload 
19/04/22 02:44:13 >> : -- transform #2 payload 
19/04/22 02:44:13 >> : -- transform #3 payload 
19/04/22 02:44:13 >> : -- transform #4 payload 
19/04/22 02:44:13 >> : -- transform #5 payload 
19/04/22 02:44:13 >> : -- transform #6 payload 
19/04/22 02:44:13 >> : -- transform #7 payload 
19/04/22 02:44:13 >> : -- transform #8 payload 
19/04/22 02:44:13 >> : -- transform #9 payload 
19/04/22 02:44:13 >> : -- transform #10 payload 
19/04/22 02:44:13 >> : -- transform #11 payload 
19/04/22 02:44:13 >> : -- transform #12 payload 
19/04/22 02:44:13 >> : -- transform #13 payload 
19/04/22 02:44:13 >> : -- transform #14 payload 
19/04/22 02:44:13 >> : -- transform #15 payload 
19/04/22 02:44:13 >> : -- transform #16 payload 
19/04/22 02:44:13 >> : -- transform #17 payload 
19/04/22 02:44:13 >> : -- transform #18 payload 
19/04/22 02:44:13 >> : key exchange payload
19/04/22 02:44:13 >> : nonce payload
19/04/22 02:44:13 >> : identification payload
19/04/22 02:44:13 >> : vendor id payload
19/04/22 02:44:13 ii : local supports XAUTH
19/04/22 02:44:13 >> : vendor id payload
19/04/22 02:44:13 ii : local supports nat-t ( draft v00 )
19/04/22 02:44:13 >> : vendor id payload
19/04/22 02:44:13 ii : local supports nat-t ( draft v01 )
19/04/22 02:44:13 >> : vendor id payload
19/04/22 02:44:13 ii : local supports nat-t ( draft v02 )
19/04/22 02:44:13 >> : vendor id payload
19/04/22 02:44:13 ii : local supports nat-t ( draft v03 )
19/04/22 02:44:13 >> : vendor id payload
19/04/22 02:44:13 ii : local supports nat-t ( rfc )
19/04/22 02:44:13 >> : vendor id payload
19/04/22 02:44:13 ii : local supports FRAGMENTATION
19/04/22 02:44:13 >> : vendor id payload
19/04/22 02:44:13 >> : vendor id payload
19/04/22 02:44:13 ii : local supports DPDv1
19/04/22 02:44:13 >> : vendor id payload
19/04/22 02:44:13 ii : local is SHREW SOFT compatible
19/04/22 02:44:13 >> : vendor id payload
19/04/22 02:44:13 ii : local is NETSCREEN compatible
19/04/22 02:44:13 >> : vendor id payload
19/04/22 02:44:13 ii : local is SIDEWINDER compatible
19/04/22 02:44:13 >> : vendor id payload
19/04/22 02:44:13 ii : local is CISCO UNITY compatible
19/04/22 02:44:13 >= : cookies 42c46d696b4edc45:0000000000000000
19/04/22 02:44:13 >= : message 00000000
19/04/22 02:44:13 -> : send IKE packet 192.168.1.7:500 -> 62.217.96.231:500 ( 1207 bytes )
19/04/22 02:44:13 DB : phase1 resend event scheduled ( ref count = 2 )
19/04/22 02:44:13 DB : phase1 ref decrement ( ref count = 1, obj count = 1 )
19/04/22 02:44:13 <- : recv IKE packet 62.217.96.231:500 -> 192.168.1.7:500 ( 440 bytes )
19/04/22 02:44:13 DB : phase1 found
19/04/22 02:44:13 DB : phase1 ref increment ( ref count = 2, obj count = 1 )
19/04/22 02:44:13 ii : processing phase1 packet ( 440 bytes )
19/04/22 02:44:13 =< : cookies 42c46d696b4edc45:a204b73e2a3e5870
19/04/22 02:44:13 =< : message 00000000
19/04/22 02:44:13 << : security association payload
19/04/22 02:44:13 << : - propsal #1 payload 
19/04/22 02:44:13 << : -- transform #14 payload 
19/04/22 02:44:13 ii : unmatched isakmp proposal/transform
19/04/22 02:44:13 ii : cipher type ( 3des != aes )
19/04/22 02:44:13 ii : unmatched isakmp proposal/transform
19/04/22 02:44:13 ii : cipher type ( 3des != aes )
19/04/22 02:44:13 ii : unmatched isakmp proposal/transform
19/04/22 02:44:13 ii : cipher type ( 3des != aes )
19/04/22 02:44:13 ii : unmatched isakmp proposal/transform
19/04/22 02:44:13 ii : cipher type ( 3des != aes )
19/04/22 02:44:13 ii : unmatched isakmp proposal/transform
19/04/22 02:44:13 ii : cipher type ( 3des != aes )
19/04/22 02:44:13 ii : unmatched isakmp proposal/transform
19/04/22 02:44:13 ii : cipher type ( 3des != aes )
19/04/22 02:44:13 ii : unmatched isakmp proposal/transform
19/04/22 02:44:13 ii : cipher type ( 3des != blowfish )
19/04/22 02:44:13 ii : unmatched isakmp proposal/transform
19/04/22 02:44:13 ii : cipher type ( 3des != blowfish )
19/04/22 02:44:13 ii : unmatched isakmp proposal/transform
19/04/22 02:44:13 ii : cipher type ( 3des != blowfish )
19/04/22 02:44:13 ii : unmatched isakmp proposal/transform
19/04/22 02:44:13 ii : cipher type ( 3des != blowfish )
19/04/22 02:44:13 ii : unmatched isakmp proposal/transform
19/04/22 02:44:13 ii : cipher type ( 3des != blowfish )
19/04/22 02:44:13 ii : unmatched isakmp proposal/transform
19/04/22 02:44:13 ii : cipher type ( 3des != blowfish )
19/04/22 02:44:13 ii : unmatched isakmp proposal/transform
19/04/22 02:44:13 ii : hash type ( hmac-sha1 != hmac-md5 )
19/04/22 02:44:13 ii : matched isakmp proposal #1 transform #14
19/04/22 02:44:13 ii : - transform    = ike
19/04/22 02:44:13 ii : - cipher type  = 3des
19/04/22 02:44:13 ii : - key length   = default
19/04/22 02:44:13 ii : - hash type    = sha1
19/04/22 02:44:13 ii : - dh group     = group2 ( modp-1024 )
19/04/22 02:44:13 ii : - auth type    = xauth-initiator-psk
19/04/22 02:44:13 ii : - life seconds = 86400
19/04/22 02:44:13 ii : - life kbytes  = 0
19/04/22 02:44:13 << : key exchange payload
19/04/22 02:44:13 << : nonce payload
19/04/22 02:44:13 << : identification payload
19/04/22 02:44:13 ii : phase1 id match ( natt prevents ip match )
19/04/22 02:44:13 ii : received = ipv4-host 192.168.7.2
19/04/22 02:44:13 << : hash payload
19/04/22 02:44:13 << : vendor id payload
19/04/22 02:44:13 ii : peer is CISCO UNITY compatible
19/04/22 02:44:13 << : vendor id payload
19/04/22 02:44:13 ii : peer supports XAUTH
19/04/22 02:44:13 << : vendor id payload
19/04/22 02:44:13 ii : peer supports DPDv1
19/04/22 02:44:13 << : vendor id payload
19/04/22 02:44:13 ii : peer supports nat-t ( draft v02 )
19/04/22 02:44:13 << : nat discovery payload
19/04/22 02:44:13 << : nat discovery payload
19/04/22 02:44:13 << : vendor id payload
19/04/22 02:44:13 ii : unknown vendor id ( 20 bytes )
19/04/22 02:44:13 0x : 4048b7d5 6ebce885 25e7de7f 00d6c2d3 c0000000
19/04/22 02:44:13 << : vendor id payload
19/04/22 02:44:13 ii : unknown vendor id ( 16 bytes )
19/04/22 02:44:13 0x : 1f07f70e aa6514d3 b0fa9654 2a500100
19/04/22 02:44:13 ii : nat discovery - local address is translated
19/04/22 02:44:13 ii : nat discovery - remote address is translated
19/04/22 02:44:13 ii : switching to src nat-t udp port 4500
19/04/22 02:44:13 ii : switching to dst nat-t udp port 4500
19/04/22 02:44:13 == : DH shared secret ( 128 bytes )
19/04/22 02:44:13 == : SETKEYID ( 20 bytes )
19/04/22 02:44:13 == : SETKEYID_d ( 20 bytes )
19/04/22 02:44:13 == : SETKEYID_a ( 20 bytes )
19/04/22 02:44:13 == : SETKEYID_e ( 20 bytes )
19/04/22 02:44:13 == : cipher key ( 40 bytes )
19/04/22 02:44:13 == : cipher iv ( 8 bytes )
19/04/22 02:44:13 == : phase1 hash_i ( computed ) ( 20 bytes )
19/04/22 02:44:13 >> : hash payload
19/04/22 02:44:13 >> : nat discovery payload
19/04/22 02:44:13 >> : nat discovery payload
19/04/22 02:44:13 >= : cookies 42c46d696b4edc45:a204b73e2a3e5870
19/04/22 02:44:13 >= : message 00000000
19/04/22 02:44:13 >= : encrypt iv ( 8 bytes )
19/04/22 02:44:13 == : encrypt packet ( 100 bytes )
19/04/22 02:44:13 == : stored iv ( 8 bytes )
19/04/22 02:44:13 DB : phase1 resend event canceled ( ref count = 1 )
19/04/22 02:44:13 -> : send NAT-T:IKE packet 192.168.1.7:4500 -> 62.217.96.231:4500 ( 132 bytes )
19/04/22 02:44:13 == : phase1 hash_r ( computed ) ( 20 bytes )
19/04/22 02:44:13 == : phase1 hash_r ( received ) ( 20 bytes )
19/04/22 02:44:13 ii : phase1 sa established
19/04/22 02:44:13 ii : 62.217.96.231:4500 <-> 192.168.1.7:4500
19/04/22 02:44:13 ii : 42c46d696b4edc45:a204b73e2a3e5870
19/04/22 02:44:13 ii : sending peer INITIAL-CONTACT notification
19/04/22 02:44:13 ii : - 192.168.1.7:4500 -> 62.217.96.231:4500
19/04/22 02:44:13 ii : - isakmp spi = 42c46d696b4edc45:a204b73e2a3e5870
19/04/22 02:44:13 ii : - data size 0
19/04/22 02:44:13 >> : hash payload
19/04/22 02:44:13 >> : notification payload
19/04/22 02:44:13 == : new informational hash ( 20 bytes )
19/04/22 02:44:13 == : new informational iv ( 8 bytes )
19/04/22 02:44:13 >= : cookies 42c46d696b4edc45:a204b73e2a3e5870
19/04/22 02:44:13 >= : message da5301ce
19/04/22 02:44:13 >= : encrypt iv ( 8 bytes )
19/04/22 02:44:13 == : encrypt packet ( 80 bytes )
19/04/22 02:44:13 == : stored iv ( 8 bytes )
19/04/22 02:44:13 -> : send NAT-T:IKE packet 192.168.1.7:4500 -> 62.217.96.231:4500 ( 116 bytes )
19/04/22 02:44:13 DB : tunnel ref increment ( ref count = 3, obj count = 1 )
19/04/22 02:44:13 DB : tunnel ref increment ( ref count = 4, obj count = 1 )
19/04/22 02:44:13 DB : phase1 ref increment ( ref count = 2, obj count = 1 )
19/04/22 02:44:13 DB : phase1 ref increment ( ref count = 3, obj count = 1 )
19/04/22 02:44:13 DB : phase1 ref increment ( ref count = 4, obj count = 1 )
19/04/22 02:44:13 DB : phase2 not found
19/04/22 02:44:13 DB : phase1 ref decrement ( ref count = 3, obj count = 1 )
19/04/22 02:44:14 <- : recv NAT-T:IKE packet 62.217.96.231:4500 -> 192.168.1.7:4500 ( 76 bytes )
19/04/22 02:44:14 DB : phase1 found
19/04/22 02:44:14 DB : phase1 ref increment ( ref count = 4, obj count = 1 )
19/04/22 02:44:14 ii : processing config packet ( 76 bytes )
19/04/22 02:44:14 DB : config not found
19/04/22 02:44:14 DB : tunnel ref increment ( ref count = 5, obj count = 1 )
19/04/22 02:44:14 DB : config ref increment ( ref count = 1, obj count = 0 )
19/04/22 02:44:14 DB : config added ( obj count = 1 )
19/04/22 02:44:14 == : new config iv ( 8 bytes )
19/04/22 02:44:14 =< : cookies 42c46d696b4edc45:a204b73e2a3e5870
19/04/22 02:44:14 =< : message 8f207370
19/04/22 02:44:14 =< : decrypt iv ( 8 bytes )
19/04/22 02:44:14 == : decrypt packet ( 76 bytes )
19/04/22 02:44:14 <= : trimmed packet padding ( 4 bytes )
19/04/22 02:44:14 <= : stored iv ( 8 bytes )
19/04/22 02:44:14 << : hash payload
19/04/22 02:44:14 << : attribute payload
19/04/22 02:44:14 == : configure hash_i ( computed ) ( 20 bytes )
19/04/22 02:44:14 == : configure hash_c ( computed ) ( 20 bytes )
19/04/22 02:44:14 ii : configure hash verified
19/04/22 02:44:14 ii : - xauth authentication type
19/04/22 02:44:14 ii : - xauth username
19/04/22 02:44:14 ii : - xauth password
19/04/22 02:44:14 ii : received basic xauth request - 
19/04/22 02:44:14 ii : - standard xauth username
19/04/22 02:44:14 ii : - standard xauth password
19/04/22 02:44:14 ii : sending xauth response for monitor
19/04/22 02:44:14 >> : hash payload
19/04/22 02:44:14 >> : attribute payload
19/04/22 02:44:14 == : new configure hash ( 20 bytes )
19/04/22 02:44:14 >= : cookies 42c46d696b4edc45:a204b73e2a3e5870
19/04/22 02:44:14 >= : message 8f207370
19/04/22 02:44:14 >= : encrypt iv ( 8 bytes )
19/04/22 02:44:14 == : encrypt packet ( 85 bytes )
19/04/22 02:44:14 == : stored iv ( 8 bytes )
19/04/22 02:44:14 -> : send NAT-T:IKE packet 192.168.1.7:4500 -> 62.217.96.231:4500 ( 124 bytes )
19/04/22 02:44:14 DB : config resend event scheduled ( ref count = 2 )
19/04/22 02:44:14 DB : config ref decrement ( ref count = 1, obj count = 1 )
19/04/22 02:44:14 DB : phase1 ref decrement ( ref count = 3, obj count = 1 )
19/04/22 02:44:14 <- : recv NAT-T:IKE packet 62.217.96.231:4500 -> 192.168.1.7:4500 ( 76 bytes )
19/04/22 02:44:14 DB : phase1 found
19/04/22 02:44:14 DB : phase1 ref increment ( ref count = 4, obj count = 1 )
19/04/22 02:44:14 ii : processing config packet ( 76 bytes )
19/04/22 02:44:14 DB : config found
19/04/22 02:44:14 DB : config ref increment ( ref count = 2, obj count = 1 )
19/04/22 02:44:14 == : new config iv ( 8 bytes )
19/04/22 02:44:14 =< : cookies 42c46d696b4edc45:a204b73e2a3e5870
19/04/22 02:44:14 =< : message e2737ae6
19/04/22 02:44:14 =< : decrypt iv ( 8 bytes )
19/04/22 02:44:14 == : decrypt packet ( 76 bytes )
19/04/22 02:44:14 <= : trimmed packet padding ( 4 bytes )
19/04/22 02:44:14 <= : stored iv ( 8 bytes )
19/04/22 02:44:14 << : hash payload
19/04/22 02:44:14 << : attribute payload
19/04/22 02:44:14 == : configure hash_i ( computed ) ( 20 bytes )
19/04/22 02:44:14 == : configure hash_c ( computed ) ( 20 bytes )
19/04/22 02:44:14 ii : configure hash verified
19/04/22 02:44:14 !! : duplicate xauth request, authentication failed
19/04/22 02:44:14 DB : config ref decrement ( ref count = 1, obj count = 1 )
19/04/22 02:44:14 DB : phase1 soft event canceled ( ref count = 3 )
19/04/22 02:44:14 DB : phase1 hard event canceled ( ref count = 2 )
19/04/22 02:44:14 DB : phase1 dead event canceled ( ref count = 1 )
19/04/22 02:44:14 ii : sending peer DELETE message
19/04/22 02:44:14 ii : - 192.168.1.7:4500 -> 62.217.96.231:4500
19/04/22 02:44:14 ii : - isakmp spi = 42c46d696b4edc45:a204b73e2a3e5870
19/04/22 02:44:14 ii : - data size 0
19/04/22 02:44:14 >> : hash payload
19/04/22 02:44:14 >> : delete payload
19/04/22 02:44:14 == : new informational hash ( 20 bytes )
19/04/22 02:44:14 == : new informational iv ( 8 bytes )
19/04/22 02:44:14 >= : cookies 42c46d696b4edc45:a204b73e2a3e5870
19/04/22 02:44:14 >= : message fc2f6523
19/04/22 02:44:14 >= : encrypt iv ( 8 bytes )
19/04/22 02:44:14 == : encrypt packet ( 80 bytes )
19/04/22 02:44:14 == : stored iv ( 8 bytes )
19/04/22 02:44:14 -> : send NAT-T:IKE packet 192.168.1.7:4500 -> 62.217.96.231:4500 ( 116 bytes )
19/04/22 02:44:14 DB : config ref increment ( ref count = 2, obj count = 1 )
19/04/22 02:44:14 DB : config resend event canceled ( ref count = 1 )
19/04/22 02:44:14 DB : config deleted ( obj count = 0 )
19/04/22 02:44:14 DB : tunnel ref decrement ( ref count = 4, obj count = 1 )
19/04/22 02:44:14 ii : phase1 removal before expire time
19/04/22 02:44:14 DB : phase1 deleted ( obj count = 0 )
19/04/22 02:44:14 DB : tunnel ref decrement ( ref count = 3, obj count = 1 )
19/04/22 02:44:14 DB : policy not found
19/04/22 02:44:14 DB : policy not found
19/04/22 02:44:14 DB : policy not found
19/04/22 02:44:14 DB : policy not found
19/04/22 02:44:14 ii : removing IPsec over DHCP policies
19/04/22 02:44:14 DB : policy not found
19/04/22 02:44:14 DB : policy not found
19/04/22 02:44:14 DB : tunnel dpd event canceled ( ref count = 2 )
19/04/22 02:44:14 DB : tunnel natt event canceled ( ref count = 1 )
19/04/22 02:44:14 DB : removing tunnel config references
19/04/22 02:44:14 DB : removing tunnel phase2 references
19/04/22 02:44:14 DB : removing tunnel phase1 references
19/04/22 02:44:14 DB : tunnel deleted ( obj count = 0 )
19/04/22 02:44:14 DB : peer ref decrement ( ref count = 1, obj count = 1 )
19/04/22 02:44:14 DB : removing all peer tunnel references
19/04/22 02:44:14 DB : peer deleted ( obj count = 0 )
19/04/22 02:44:14 ii : ipc client process thread exit ...
19/04/22 02:47:17 ii : hard halt signal received, shutting down
19/04/22 02:47:17 ii : network process thread exit ...
19/04/22 02:47:17 ii : pfkey process thread exit ...
19/04/22 02:47:17 ii : ipc server process thread exit ...

Δημοσ. (επεξεργασμένο)
5 ώρες πριν, gtgt είπε

19/04/22 02:44:14 ii : - xauth authentication type
19/04/22 02:44:14 ii : - xauth username
19/04/22 02:44:14 ii : - xauth password
19/04/22 02:44:14 ii : received basic xauth request - 
19/04/22 02:44:14 ii : - standard xauth username
19/04/22 02:44:14 ii : - standard xauth password
19/04/22 02:44:14 ii : sending xauth response for monitor

5 ώρες πριν, gtgt είπε

19/04/22 02:44:14 !! : duplicate xauth request, authentication failed

Η ώρα/ημερομηνία είναι λάθος στο PC σου (19/04/22 ...???) κάτι το οποίο είναι βασικό όταν έχει να κάνει και με certificates.

Βάλε την σωστή και ξαναδοκίμασε, αν έχεις πάλι το ίδιο error θα πρέπει να μιλήσεις μαζί τους.

Σε κάθε περίπτωση θα πρέπει να δίνουν οδηγίες όπως και υποστήριξη για το τι χρειάζεται για να μπορέσει κάποιος να συνδεθεί στο  VPN που έχουν φτιάξει. 

Επεξ/σία από Επισκέπτης
Δημοσ. (επεξεργασμένο)

22/04/19 ειναι αντιστροφη. Η συνδεση μου ειναι ιδιωτικο δικτυο. Αλλαξα στο phase 2 σε group 2 (καπου το είδα ως προταση) γιατι απο οτι καταλαβα εκει κολλαει.19/04/22 16:43:16 ii : - Firewall Type = CISCO-UNKNOWN
19/04/22 16:43:16 == : new config iv ( 8 bytes )
19/04/22 16:43:16 ii : sending config pull request
19/04/22 16:43:16 >> : hash payload
19/04/22 16:43:16 >> : attribute payload
19/04/22 16:43:16 == : new configure hash ( 20 bytes )
19/04/22 16:43:16 >= : cookies cd6eecee11dbf4bf:86a82707d6d6521b
19/04/22 16:43:16 >= : message 3674b3f5
19/04/22 16:43:16 >= : encrypt iv ( 8 bytes )
19/04/22 16:43:16 == : encrypt packet ( 166 bytes )
19/04/22 16:43:16 == : stored iv ( 8 bytes )
19/04/22 16:43:16 DB : config resend event canceled ( ref count = 1 )
19/04/22 16:43:16 -> : send NAT-T:IKE packet 192.168.1.12:4500 -> 62.217.96.231:4500 ( 204 bytes )
19/04/22 16:43:16 DB : config resend event scheduled ( ref count = 2 )
19/04/22 16:43:16 DB : config ref decrement ( ref count = 1, obj count = 1 )
19/04/22 16:43:16 DB : phase1 ref decrement ( ref count = 3, obj count = 1 )
19/04/22 16:43:16 <- : recv NAT-T:IKE packet 62.217.96.231:4500 -> 192.168.1.12:4500 ( 180 bytes )
19/04/22 16:43:16 DB : phase1 found
19/04/22 16:43:16 DB : phase1 ref increment ( ref count = 4, obj count = 1 )
19/04/22 16:43:16 ii : processing config packet ( 180 bytes )
19/04/22 16:43:16 DB : config found
19/04/22 16:43:16 DB : config ref increment ( ref count = 2, obj count = 1 )
19/04/22 16:43:16 =< : cookies cd6eecee11dbf4bf:86a82707d6d6521b
19/04/22 16:43:16 =< : message 3674b3f5
19/04/22 16:43:16 =< : decrypt iv ( 8 bytes )
19/04/22 16:43:16 == : decrypt packet ( 180 bytes )
19/04/22 16:43:16 <= : trimmed packet padding ( 6 bytes )
19/04/22 16:43:16 <= : stored iv ( 8 bytes )
19/04/22 16:43:16 << : hash payload
19/04/22 16:43:16 << : attribute payload
19/04/22 16:43:16 == : configure hash_i ( computed ) ( 20 bytes )
19/04/22 16:43:16 == : configure hash_c ( computed ) ( 20 bytes )
19/04/22 16:43:16 ii : configure hash verified
19/04/22 16:43:16 ii : received config pull response
19/04/22 16:43:16 ii : - IP4 Address = 172.16.1.2
19/04/22 16:43:16 ii : - IP4 Netmask = 255.255.255.128
19/04/22 16:43:16 ii : - IP4 DNS Server = 195.130.95.1
19/04/22 16:43:16 ii : - Save Password = 0
19/04/22 16:43:16 ii : - Application Version = Cisco Systems, Inc ASA5520 Version 8.2(2) built by builders on Mon 11-Jan-10 14:19
19/04/22 16:43:16 DB : config resend event canceled ( ref count = 1 )
19/04/22 16:43:16 DB : config ref decrement ( ref count = 0, obj count = 1 )
19/04/22 16:43:16 DB : phase1 ref decrement ( ref count = 3, obj count = 1 )
19/04/22 16:43:16 ii : enabled adapter ROOT\VNET\0000 
19/04/22 16:43:16 ii : adapter ROOT\VNET\0000 unavailable, retrying ...
19/04/22 16:43:17 ii : apapter ROOT\VNET\0000 MTU is 1380
19/04/22 16:43:17 ii : generating IPSEC security policies at REQUIRE level
19/04/22 16:43:17 ii : creating NONE INBOUND policy ANY:62.217.96.231:* -> ANY:192.168.1.12:*
19/04/22 16:43:17 DB : policy ref increment ( ref count = 1, obj count = 0 )
19/04/22 16:43:17 DB : policy added ( obj count = 1 )
19/04/22 16:43:17 DB : policy ref decrement ( ref count = 0, obj count = 1 )
19/04/22 16:43:17 K> : send pfkey X_SPDADD UNSPEC message
19/04/22 16:43:17 K< : recv pfkey X_SPDADD UNSPEC message
19/04/22 16:43:17 DB : policy found
19/04/22 16:43:17 DB : policy ref increment ( ref count = 1, obj count = 1 )
19/04/22 16:43:17 DB : policy ref decrement ( ref count = 0, obj count = 1 )
19/04/22 16:43:17 ii : creating NONE OUTBOUND policy ANY:192.168.1.12:* -> ANY:62.217.96.231:*
19/04/22 16:43:17 ii : created NONE policy route for 62.217.96.231/32
19/04/22 16:43:17 DB : policy ref increment ( ref count = 1, obj count = 1 )
19/04/22 16:43:17 DB : policy added ( obj count = 2 )
19/04/22 16:43:17 DB : policy ref decrement ( ref count = 0, obj count = 2 )
19/04/22 16:43:17 K> : send pfkey X_SPDADD UNSPEC message
19/04/22 16:43:17 K< : recv pfkey X_SPDADD UNSPEC message
19/04/22 16:43:17 DB : policy found
19/04/22 16:43:17 DB : policy ref increment ( ref count = 1, obj count = 2 )
19/04/22 16:43:17 DB : policy ref decrement ( ref count = 0, obj count = 2 )
19/04/22 16:43:17 ii : creating NONE INBOUND policy ANY:192.168.1.1:* -> ANY:172.16.1.2:*
19/04/22 16:43:17 DB : policy ref increment ( ref count = 1, obj count = 2 )
19/04/22 16:43:17 DB : policy added ( obj count = 3 )
19/04/22 16:43:17 DB : policy ref decrement ( ref count = 0, obj count = 3 )
19/04/22 16:43:17 K> : send pfkey X_SPDADD UNSPEC message
19/04/22 16:43:17 ii : creating NONE OUTBOUND policy ANY:172.16.1.2:* -> ANY:192.168.1.1:*
19/04/22 16:43:17 DB : policy ref increment ( ref count = 1, obj count = 3 )
19/04/22 16:43:17 DB : policy added ( obj count = 4 )
19/04/22 16:43:17 DB : policy ref decrement ( ref count = 0, obj count = 4 )
19/04/22 16:43:17 K> : send pfkey X_SPDADD UNSPEC message
19/04/22 16:43:17 K< : recv pfkey X_SPDADD UNSPEC message
19/04/22 16:43:17 DB : policy found
19/04/22 16:43:17 ii : creating IPSEC INBOUND policy ANY:0.0.0.0/0:* -> ANY:172.16.1.2:*
19/04/22 16:43:17 DB : policy ref increment ( ref count = 1, obj count = 4 )
19/04/22 16:43:17 DB : policy ref increment ( ref count = 1, obj count = 4 )
19/04/22 16:43:17 DB : policy added ( obj count = 5 )
19/04/22 16:43:17 DB : policy ref decrement ( ref count = 0, obj count = 5 )
19/04/22 16:43:17 DB : policy ref decrement ( ref count = 0, obj count = 5 )
19/04/22 16:43:17 K< : recv pfkey X_SPDADD UNSPEC message
19/04/22 16:43:17 K> : send pfkey X_SPDADD UNSPEC message
19/04/22 16:43:17 DB : policy found
19/04/22 16:43:17 DB : policy ref increment ( ref count = 1, obj count = 5 )
19/04/22 16:43:17 ii : creating IPSEC OUTBOUND policy ANY:172.16.1.2:* -> ANY:0.0.0.0/0:*
19/04/22 16:43:17 DB : policy ref decrement ( ref count = 0, obj count = 5 )
19/04/22 16:43:17 K< : recv pfkey X_SPDADD UNSPEC message
19/04/22 16:43:17 DB : policy found
19/04/22 16:43:17 DB : policy ref increment ( ref count = 1, obj count = 5 )
19/04/22 16:43:17 DB : policy ref decrement ( ref count = 0, obj count = 5 )
19/04/22 16:43:17 ii : created IPSEC policy route for 0.0.0.0
19/04/22 16:43:17 DB : policy ref increment ( ref count = 1, obj count = 5 )
19/04/22 16:43:17 DB : policy added ( obj count = 6 )
19/04/22 16:43:17 DB : policy ref decrement ( ref count = 0, obj count = 6 )
19/04/22 16:43:17 K> : send pfkey X_SPDADD UNSPEC message
19/04/22 16:43:17 K< : recv pfkey X_SPDADD UNSPEC message
19/04/22 16:43:17 DB : policy found
19/04/22 16:43:17 DB : policy ref increment ( ref count = 1, obj count = 6 )
19/04/22 16:43:17 ii : calling init phase2 for initial policy
19/04/22 16:43:17 DB : policy found
19/04/22 16:43:17 DB : policy ref increment ( ref count = 2, obj count = 6 )
19/04/22 16:43:17 DB : policy found
19/04/22 16:43:17 DB : policy ref increment ( ref count = 1, obj count = 6 )
19/04/22 16:43:17 DB : tunnel found
19/04/22 16:43:17 DB : tunnel ref increment ( ref count = 6, obj count = 1 )
19/04/22 16:43:17 DB : tunnel ref increment ( ref count = 7, obj count = 1 )
19/04/22 16:43:17 DB : new phase2 ( IPSEC initiator )
19/04/22 16:43:17 DB : phase2 ref increment ( ref count = 1, obj count = 0 )
19/04/22 16:43:17 DB : phase2 added ( obj count = 1 )
19/04/22 16:43:17 K> : send pfkey GETSPI ESP message
19/04/22 16:43:17 DB : phase2 ref decrement ( ref count = 0, obj count = 1 )
19/04/22 16:43:17 DB : tunnel ref decrement ( ref count = 6, obj count = 1 )
19/04/22 16:43:17 DB : policy ref decrement ( ref count = 0, obj count = 6 )
19/04/22 16:43:17 DB : policy ref decrement ( ref count = 1, obj count = 6 )
19/04/22 16:43:17 DB : policy ref decrement ( ref count = 0, obj count = 6 )
19/04/22 16:43:17 K< : recv pfkey GETSPI ESP message
19/04/22 16:43:17 DB : phase2 found
19/04/22 16:43:17 DB : phase2 ref increment ( ref count = 1, obj count = 1 )
19/04/22 16:43:17 ii : updated spi for 1 ipsec-esp proposal
19/04/22 16:43:17 DB : phase1 found
19/04/22 16:43:17 DB : phase1 ref increment ( ref count = 4, obj count = 1 )
19/04/22 16:43:17 >> : hash payload
19/04/22 16:43:17 >> : security association payload
19/04/22 16:43:17 >> : - proposal #1 payload 
19/04/22 16:43:17 >> : -- transform #1 payload 
19/04/22 16:43:17 >> : -- transform #2 payload 
19/04/22 16:43:17 >> : -- transform #3 payload 
19/04/22 16:43:17 >> : -- transform #4 payload 
19/04/22 16:43:17 >> : -- transform #5 payload 
19/04/22 16:43:17 >> : -- transform #6 payload 
19/04/22 16:43:17 >> : -- transform #7 payload 
19/04/22 16:43:17 >> : -- transform #8 payload 
19/04/22 16:43:17 >> : -- transform #9 payload 
19/04/22 16:43:17 >> : -- transform #10 payload 
19/04/22 16:43:17 >> : -- transform #11 payload 
19/04/22 16:43:17 >> : -- transform #12 payload 
19/04/22 16:43:17 >> : -- transform #13 payload 
19/04/22 16:43:17 >> : -- transform #14 payload 
19/04/22 16:43:17 >> : -- transform #15 payload 
19/04/22 16:43:17 >> : -- transform #16 payload 
19/04/22 16:43:17 >> : -- transform #17 payload 
19/04/22 16:43:17 >> : -- transform #18 payload 
19/04/22 16:43:17 >> : -- transform #19 payload 
19/04/22 16:43:17 >> : -- transform #20 payload 
19/04/22 16:43:17 >> : -- transform #21 payload 
19/04/22 16:43:17 >> : -- transform #22 payload 
19/04/22 16:43:17 >> : -- transform #23 payload 
19/04/22 16:43:17 >> : -- transform #24 payload 
19/04/22 16:43:17 >> : -- transform #25 payload 
19/04/22 16:43:17 >> : -- transform #26 payload 
19/04/22 16:43:17 >> : -- transform #27 payload 
19/04/22 16:43:17 >> : -- transform #28 payload 
19/04/22 16:43:17 >> : -- transform #29 payload 
19/04/22 16:43:17 >> : -- transform #30 payload 
19/04/22 16:43:17 >> : -- transform #31 payload 
19/04/22 16:43:17 >> : -- transform #32 payload 
19/04/22 16:43:17 >> : -- transform #33 payload 
19/04/22 16:43:17 >> : -- transform #34 payload 
19/04/22 16:43:17 >> : -- transform #35 payload 
19/04/22 16:43:17 >> : -- transform #36 payload 
19/04/22 16:43:17 >> : -- transform #37 payload 
19/04/22 16:43:17 >> : -- transform #38 payload 
19/04/22 16:43:17 >> : -- transform #39 payload 
19/04/22 16:43:17 >> : -- transform #40 payload 
19/04/22 16:43:17 >> : -- transform #41 payload 
19/04/22 16:43:17 >> : -- transform #42 payload 
19/04/22 16:43:17 >> : -- transform #43 payload 
19/04/22 16:43:17 >> : -- transform #44 payload 
19/04/22 16:43:17 >> : -- transform #45 payload 
19/04/22 16:43:17 >> : nonce payload
19/04/22 16:43:17 >> : key exchange payload
19/04/22 16:43:17 >> : identification payload
19/04/22 16:43:17 >> : identification payload
19/04/22 16:43:17 == : phase2 hash_i ( input ) ( 1772 bytes )
19/04/22 16:43:17 == : phase2 hash_i ( computed ) ( 20 bytes )
19/04/22 16:43:17 == : new phase2 iv ( 8 bytes )
19/04/22 16:43:17 >= : cookies cd6eecee11dbf4bf:86a82707d6d6521b
19/04/22 16:43:17 >= : message bab1e3e6
19/04/22 16:43:17 >= : encrypt iv ( 8 bytes )
19/04/22 16:43:17 == : encrypt packet ( 1820 bytes )
19/04/22 16:43:17 == : stored iv ( 8 bytes )
19/04/22 16:43:17 -> : send NAT-T:IKE packet 192.168.1.12:4500 -> 62.217.96.231:4500 ( 1852 bytes )
19/04/22 16:43:17 ii : fragmented packet to 1514 bytes ( MTU 1500 bytes )
19/04/22 16:43:17 ii : fragmented packet to 386 bytes ( MTU 1500 bytes )
19/04/22 16:43:17 DB : phase2 resend event scheduled ( ref count = 2 )
19/04/22 16:43:17 DB : phase1 ref decrement ( ref count = 3, obj count = 1 )
19/04/22 16:43:17 DB : phase2 ref decrement ( ref count = 1, obj count = 1 )
19/04/22 16:43:18 ii : split DNS is disabled
19/04/22 16:43:18 DB : tunnel ref increment ( ref count = 7, obj count = 1 )
19/04/22 16:43:21 K< : recv pfkey ACQUIRE UNSPEC message
19/04/22 16:43:21 DB : policy found
19/04/22 16:43:21 DB : policy ref increment ( ref count = 1, obj count = 6 )
19/04/22 16:43:21 DB : policy found
19/04/22 16:43:21 DB : policy ref increment ( ref count = 1, obj count = 6 )
19/04/22 16:43:21 DB : tunnel found
19/04/22 16:43:21 DB : tunnel ref increment ( ref count = 8, obj count = 1 )
19/04/22 16:43:21 DB : tunnel ref increment ( ref count = 9, obj count = 1 )
19/04/22 16:43:21 DB : new phase2 ( IPSEC initiator )
19/04/22 16:43:21 DB : phase2 ref increment ( ref count = 1, obj count = 1 )
19/04/22 16:43:21 DB : phase2 added ( obj count = 2 )
19/04/22 16:43:21 K> : send pfkey GETSPI ESP message
19/04/22 16:43:21 DB : phase2 ref decrement ( ref count = 0, obj count = 2 )
19/04/22 16:43:21 DB : tunnel ref decrement ( ref count = 8, obj count = 1 )
19/04/22 16:43:21 DB : policy ref decrement ( ref count = 0, obj count = 6 )
19/04/22 16:43:21 DB : policy ref decrement ( ref count = 0, obj count = 6 )
19/04/22 16:43:21 K< : recv pfkey GETSPI ESP message
19/04/22 16:43:21 DB : phase2 found
19/04/22 16:43:21 DB : phase2 ref increment ( ref count = 1, obj count = 2 )
19/04/22 16:43:21 ii : updated spi for 1 ipsec-esp proposal
19/04/22 16:43:21 DB : phase1 found
19/04/22 16:43:21 DB : phase1 ref increment ( ref count = 4, obj count = 1 )
19/04/22 16:43:21 >> : hash payload
19/04/22 16:43:21 >> : security association payload
19/04/22 16:43:21 >> : - proposal #1 payload 
19/04/22 16:43:21 >> : -- transform #1 payload 
19/04/22 16:43:21 >> : -- transform #2 payload 
19/04/22 16:43:21 >> : -- transform #3 payload 
19/04/22 16:43:21 >> : -- transform #4 payload 
19/04/22 16:43:21 >> : -- transform #5 payload 
19/04/22 16:43:21 >> : -- transform #6 payload 
19/04/22 16:43:21 >> : -- transform #7 payload 
19/04/22 16:43:21 >> : -- transform #8 payload 
19/04/22 16:43:21 >> : -- transform #9 payload 
19/04/22 16:43:21 >> : -- transform #10 payload 
19/04/22 16:43:21 >> : -- transform #11 payload 
19/04/22 16:43:21 >> : -- transform #12 payload 
19/04/22 16:43:21 >> : -- transform #13 payload 
19/04/22 16:43:21 >> : -- transform #14 payload 
19/04/22 16:43:21 >> : -- transform #15 payload 
19/04/22 16:43:21 >> : -- transform #16 payload 
19/04/22 16:43:21 >> : -- transform #17 payload 
19/04/22 16:43:21 >> : -- transform #18 payload 
19/04/22 16:43:21 >> : -- transform #19 payload 
19/04/22 16:43:21 >> : -- transform #20 payload 
19/04/22 16:43:21 >> : -- transform #21 payload 
19/04/22 16:43:21 >> : -- transform #22 payload 
19/04/22 16:43:21 >> : -- transform #23 payload 
19/04/22 16:43:21 >> : -- transform #24 payload 
19/04/22 16:43:21 >> : -- transform #25 payload 
19/04/22 16:43:21 >> : -- transform #26 payload 
19/04/22 16:43:21 >> : -- transform #27 payload 
19/04/22 16:43:21 >> : -- transform #28 payload 
19/04/22 16:43:21 >> : -- transform #29 payload 
19/04/22 16:43:21 >> : -- transform #30 payload 
19/04/22 16:43:21 >> : -- transform #31 payload 
19/04/22 16:43:21 >> : -- transform #32 payload 
19/04/22 16:43:21 >> : -- transform #33 payload 
19/04/22 16:43:21 >> : -- transform #34 payload 
19/04/22 16:43:21 >> : -- transform #35 payload 
19/04/22 16:43:21 >> : -- transform #36 payload 
19/04/22 16:43:21 >> : -- transform #37 payload 
19/04/22 16:43:21 >> : -- transform #38 payload 
19/04/22 16:43:21 >> : -- transform #39 payload 
19/04/22 16:43:21 >> : -- transform #40 payload 
19/04/22 16:43:21 >> : -- transform #41 payload 
19/04/22 16:43:21 >> : -- transform #42 payload 
19/04/22 16:43:21 >> : -- transform #43 payload 
19/04/22 16:43:21 >> : -- transform #44 payload 
19/04/22 16:43:21 >> : -- transform #45 payload 
19/04/22 16:43:21 >> : nonce payload
19/04/22 16:43:21 >> : key exchange payload
19/04/22 16:43:21 >> : identification payload
19/04/22 16:43:21 >> : identification payload
19/04/22 16:43:21 == : phase2 hash_i ( input ) ( 1772 bytes )
19/04/22 16:43:21 == : phase2 hash_i ( computed ) ( 20 bytes )
19/04/22 16:43:21 == : new phase2 iv ( 8 bytes )
19/04/22 16:43:21 >= : cookies cd6eecee11dbf4bf:86a82707d6d6521b
19/04/22 16:43:21 >= : message cbe40098
19/04/22 16:43:21 >= : encrypt iv ( 8 bytes )
19/04/22 16:43:21 == : encrypt packet ( 1820 bytes )
19/04/22 16:43:21 == : stored iv ( 8 bytes )
19/04/22 16:43:21 -> : send NAT-T:IKE packet 192.168.1.12:4500 -> 62.217.96.231:4500 ( 1852 bytes )
19/04/22 16:43:21 ii : fragmented packet to 1514 bytes ( MTU 1500 bytes )
19/04/22 16:43:21 ii : fragmented packet to 386 bytes ( MTU 1500 bytes )
19/04/22 16:43:21 DB : phase2 resend event scheduled ( ref count = 2 )
19/04/22 16:43:21 DB : phase1 ref decrement ( ref count = 3, obj count = 1 )
19/04/22 16:43:21 DB : phase2 ref decrement ( ref count = 1, obj count = 2 )
19/04/22 16:43:22 ii : fragmented packet to 1514 bytes ( MTU 1500 bytes )
19/04/22 16:43:22 ii : fragmented packet to 386 bytes ( MTU 1500 bytes )
19/04/22 16:43:22 -> : resend 1 phase2 packet(s) [0/2] 192.168.1.12:4500 -> 62.217.96.231:4500
19/04/22 16:43:24 <- : recv NAT-T:IKE packet 62.217.96.231:4500 -> 192.168.1.12:4500 ( 180 bytes )
19/04/22 16:43:24 DB : phase1 found
19/04/22 16:43:24 DB : phase1 ref increment ( ref count = 4, obj count = 1 )
19/04/22 16:43:24 ii : processing config packet ( 180 bytes )
19/04/22 16:43:24 DB : config found
19/04/22 16:43:24 DB : config ref increment ( ref count = 1, obj count = 1 )
19/04/22 16:43:24 !! : config packet ignored ( config already mature )
19/04/22 16:43:24 DB : config ref decrement ( ref count = 0, obj count = 1 )
19/04/22 16:43:24 DB : phase1 ref decrement ( ref count = 3, obj count = 1 )
19/04/22 16:43:26 ii : fragmented packet to 1514 bytes ( MTU 1500 bytes )
19/04/22 16:43:26 ii : fragmented packet to 386 bytes ( MTU 1500 bytes )
19/04/22 16:43:26 -> : resend 1 phase2 packet(s) [0/2] 192.168.1.12:4500 -> 62.217.96.231:4500
19/04/22 16:43:27 ii : fragmented packet to 1514 bytes ( MTU 1500 bytes )
19/04/22 16:43:27 ii : fragmented packet to 386 bytes ( MTU 1500 bytes )
19/04/22 16:43:27 -> : resend 1 phase2 packet(s) [1/2] 192.168.1.12:4500 -> 62.217.96.231:4500
19/04/22 16:43:31 ii : fragmented packet to 1514 bytes ( MTU 1500 bytes )
19/04/22 16:43:31 ii : fragmented packet to 386 bytes ( MTU 1500 bytes )
19/04/22 16:43:31 -> : resend 1 phase2 packet(s) [1/2] 192.168.1.12:4500 -> 62.217.96.231:4500
19/04/22 16:43:31 DB : phase1 found
19/04/22 16:43:31 DB : phase1 ref increment ( ref count = 4, obj count = 1 )
19/04/22 16:43:31 ii : sending peer DPDV1-R-U-THERE notification
19/04/22 16:43:31 ii : - 192.168.1.12:4500 -> 62.217.96.231:4500
19/04/22 16:43:31 ii : - isakmp spi = cd6eecee11dbf4bf:86a82707d6d6521b
19/04/22 16:43:31 ii : - data size 4
19/04/22 16:43:31 >> : hash payload
19/04/22 16:43:31 >> : notification payload
19/04/22 16:43:31 == : new informational hash ( 20 bytes )
19/04/22 16:43:31 == : new informational iv ( 8 bytes )
19/04/22 16:43:31 >= : cookies cd6eecee11dbf4bf:86a82707d6d6521b
19/04/22 16:43:31 >= : message a304978d
19/04/22 16:43:31 >= : encrypt iv ( 8 bytes )
19/04/22 16:43:31 == : encrypt packet ( 84 bytes )
19/04/22 16:43:31 == : stored iv ( 8 bytes )
19/04/22 16:43:31 -> : send NAT-T:IKE packet 192.168.1.12:4500 -> 62.217.96.231:4500 ( 116 bytes )
19/04/22 16:43:31 ii : DPD ARE-YOU-THERE sequence 11c62699 requested
19/04/22 16:43:31 DB : phase1 ref decrement ( ref count = 3, obj count = 1 )
19/04/22 16:43:31 DB : phase1 found
19/04/22 16:43:31 DB : phase1 ref increment ( ref count = 4, obj count = 1 )
19/04/22 16:43:31 -> : send NAT-T:KEEP-ALIVE packet 192.168.1.12:4500 -> 62.217.96.231:4500
19/04/22 16:43:31 DB : phase1 ref decrement ( ref count = 3, obj count = 1 )
19/04/22 16:43:32 <- : recv NAT-T:IKE packet 62.217.96.231:4500 -> 192.168.1.12:4500 ( 180 bytes )
19/04/22 16:43:32 DB : phase1 found
19/04/22 16:43:32 DB : phase1 ref increment ( ref count = 4, obj count = 1 )
19/04/22 16:43:32 ii : processing config packet ( 180 bytes )
19/04/22 16:43:32 DB : config found
19/04/22 16:43:32 DB : config ref increment ( ref count = 1, obj count = 1 )
19/04/22 16:43:32 !! : config packet ignored ( config already mature )
19/04/22 16:43:32 DB : config ref decrement ( ref count = 0, obj count = 1 )
19/04/22 16:43:32 DB : phase1 ref decrement ( ref count = 3, obj count = 1 )
19/04/22 16:43:32 ii : fragmented packet to 1514 bytes ( MTU 1500 bytes )
19/04/22 16:43:32 ii : fragmented packet to 386 bytes ( MTU 1500 bytes )
19/04/22 16:43:32 -> : resend 1 phase2 packet(s) [2/2] 192.168.1.12:4500 -> 62.217.96.231:4500
19/04/22 16:43:36 ii : fragmented packet to 1514 bytes ( MTU 1500 bytes )
19/04/22 16:43:36 ii : fragmented packet to 386 bytes ( MTU 1500 bytes )
19/04/22 16:43:36 -> : resend 1 phase2 packet(s) [2/2] 192.168.1.12:4500 -> 62.217.96.231:4500
19/04/22 16:43:37 K< : recv pfkey ACQUIRE UNSPEC message
19/04/22 16:43:37 DB : policy found
19/04/22 16:43:37 DB : policy ref increment ( ref count = 1, obj count = 6 )
19/04/22 16:43:37 DB : policy found
19/04/22 16:43:37 DB : policy ref increment ( ref count = 1, obj count = 6 )
19/04/22 16:43:37 DB : tunnel found
19/04/22 16:43:37 DB : tunnel ref increment ( ref count = 9, obj count = 1 )
19/04/22 16:43:37 DB : tunnel ref increment ( ref count = 10, obj count = 1 )
19/04/22 16:43:37 DB : new phase2 ( IPSEC initiator )
19/04/22 16:43:37 DB : phase2 ref increment ( ref count = 1, obj count = 2 )
19/04/22 16:43:37 DB : phase2 added ( obj count = 3 )
19/04/22 16:43:37 K> : send pfkey GETSPI ESP message
19/04/22 16:43:37 DB : phase2 ref decrement ( ref count = 0, obj count = 3 )
19/04/22 16:43:37 DB : tunnel ref decrement ( ref count = 9, obj count = 1 )
19/04/22 16:43:37 DB : policy ref decrement ( ref count = 0, obj count = 6 )
19/04/22 16:43:37 DB : policy ref decrement ( ref count = 0, obj count = 6 )
19/04/22 16:43:37 K< : recv pfkey GETSPI ESP message
19/04/22 16:43:37 DB : phase2 found
19/04/22 16:43:37 DB : phase2 ref increment ( ref count = 1, obj count = 3 )
19/04/22 16:43:37 ii : updated spi for 1 ipsec-esp proposal
19/04/22 16:43:37 DB : phase1 found
19/04/22 16:43:37 DB : phase1 ref increment ( ref count = 4, obj count = 1 )
19/04/22 16:43:37 >> : hash payload
19/04/22 16:43:37 >> : security association payload
19/04/22 16:43:37 >> : - proposal #1 payload 
19/04/22 16:43:37 >> : -- transform #1 payload 
19/04/22 16:43:37 >> : -- transform #2 payload 
19/04/22 16:43:37 >> : -- transform #3 payload 
19/04/22 16:43:37 >> : -- transform #4 payload 
19/04/22 16:43:37 >> : -- transform #5 payload 
19/04/22 16:43:37 >> : -- transform #6 payload 
19/04/22 16:43:37 >> : -- transform #7 payload 
19/04/22 16:43:37 >> : -- transform #8 payload 
19/04/22 16:43:37 >> : -- transform #9 payload 
19/04/22 16:43:37 >> : -- transform #10 payload 
19/04/22 16:43:37 >> : -- transform #11 payload 
19/04/22 16:43:37 >> : -- transform #12 payload 
19/04/22 16:43:37 >> : -- transform #13 payload 
19/04/22 16:43:37 >> : -- transform #14 payload 
19/04/22 16:43:37 >> : -- transform #15 payload 
19/04/22 16:43:37 >> : -- transform #16 payload 
19/04/22 16:43:37 >> : -- transform #17 payload 
19/04/22 16:43:37 >> : -- transform #18 payload 
19/04/22 16:43:37 >> : -- transform #19 payload 
19/04/22 16:43:37 >> : -- transform #20 payload 
19/04/22 16:43:37 >> : -- transform #21 payload 
19/04/22 16:43:37 >> : -- transform #22 payload 
19/04/22 16:43:37 >> : -- transform #23 payload 
19/04/22 16:43:37 >> : -- transform #24 payload 
19/04/22 16:43:37 >> : -- transform #25 payload 
19/04/22 16:43:37 >> : -- transform #26 payload 
19/04/22 16:43:37 >> : -- transform #27 payload 
19/04/22 16:43:37 >> : -- transform #28 payload 
19/04/22 16:43:37 >> : -- transform #29 payload 
19/04/22 16:43:37 >> : -- transform #30 payload 
19/04/22 16:43:37 >> : -- transform #31 payload 
19/04/22 16:43:37 >> : -- transform #32 payload 
19/04/22 16:43:37 >> : -- transform #33 payload 
19/04/22 16:43:37 >> : -- transform #34 payload 
19/04/22 16:43:37 >> : -- transform #35 payload 
19/04/22 16:43:37 >> : -- transform #36 payload 
19/04/22 16:43:37 >> : -- transform #37 payload 
19/04/22 16:43:37 >> : -- transform #38 payload 
19/04/22 16:43:37 >> : -- transform #39 payload 
19/04/22 16:43:37 >> : -- transform #40 payload 
19/04/22 16:43:37 >> : -- transform #41 payload 
19/04/22 16:43:37 >> : -- transform #42 payload 
19/04/22 16:43:37 >> : -- transform #43 payload 
19/04/22 16:43:37 >> : -- transform #44 payload 
19/04/22 16:43:37 >> : -- transform #45 payload 
19/04/22 16:43:37 >> : nonce payload
19/04/22 16:43:37 >> : key exchange payload
19/04/22 16:43:37 >> : identification payload
19/04/22 16:43:37 >> : identification payload
19/04/22 16:43:37 == : phase2 hash_i ( input ) ( 1772 bytes )
19/04/22 16:43:37 == : phase2 hash_i ( computed ) ( 20 bytes )
19/04/22 16:43:37 == : new phase2 iv ( 8 bytes )
19/04/22 16:43:37 >= : cookies cd6eecee11dbf4bf:86a82707d6d6521b
19/04/22 16:43:37 >= : message b36d8614
19/04/22 16:43:37 >= : encrypt iv ( 8 bytes )
19/04/22 16:43:37 == : encrypt packet ( 1820 bytes )
19/04/22 16:43:37 == : stored iv ( 8 bytes )
19/04/22 16:43:37 -> : send NAT-T:IKE packet 192.168.1.12:4500 -> 62.217.96.231:4500 ( 1852 bytes )
19/04/22 16:43:37 ii : fragmented packet to 1514 bytes ( MTU 1500 bytes )
19/04/22 16:43:37 ii : fragmented packet to 386 bytes ( MTU 1500 bytes )
19/04/22 16:43:37 DB : phase2 resend event scheduled ( ref count = 2 )
19/04/22 16:43:37 DB : phase1 ref decrement ( ref count = 3, obj count = 1 )
19/04/22 16:43:37 DB : phase2 ref decrement ( ref count = 1, obj count = 3 )
19/04/22 16:43:37 ii : resend limit exceeded for phase2 exchange
19/04/22 16:43:37 ii : phase2 removal before expire time
19/04/22 16:43:37 DB : phase2 deleted ( obj count = 2 )
19/04/22 16:43:37 DB : tunnel ref decrement ( ref count = 8, obj count = 1 )
19/04/22 16:43:40 <- : recv NAT-T:IKE packet 62.217.96.231:4500 -> 192.168.1.12:4500 ( 180 bytes )
19/04/22 16:43:40 DB : phase1 found
19/04/22 16:43:40 DB : phase1 ref increment ( ref count = 4, obj count = 1 )
19/04/22 16:43:40 ii : processing config packet ( 180 bytes )
19/04/22 16:43:40 DB : config found
19/04/22 16:43:40 DB : config ref increment ( ref count = 1, obj count = 1 )
19/04/22 16:43:40 !! : config packet ignored ( config already mature )
19/04/22 16:43:40 DB : config ref decrement ( ref count = 0, obj count = 1 )
19/04/22 16:43:40 DB : phase1 ref decrement ( ref count = 3, obj count = 1 )
19/04/22 16:43:41 ii : resend limit exceeded for phase2 exchange
19/04/22 16:43:41 ii : phase2 removal before expire time
19/04/22 16:43:41 DB : phase2 deleted ( obj count = 1 )
19/04/22 16:43:41 DB : tunnel ref decrement ( ref count = 7, obj count = 1 )
19/04/22 16:43:42 ii : fragmented packet to 1514 bytes ( MTU 1500 bytes )
19/04/22 16:43:42 ii : fragmented packet to 386 bytes ( MTU 1500 bytes )
19/04/22 16:43:42 -> : resend 1 phase2 packet(s) [0/2] 192.168.1.12:4500 -> 62.217.96.231:4500
19/04/22 16:43:46 DB : phase1 found
19/04/22 16:43:46 DB : phase1 ref increment ( ref count = 4, obj count = 1 )
19/04/22 16:43:46 -> : send NAT-T:KEEP-ALIVE packet 192.168.1.12:4500 -> 62.217.96.231:4500
19/04/22 16:43:46 DB : phase1 ref decrement ( ref count = 3, obj count = 1 )
19/04/22 16:43:46 DB : phase1 found
19/04/22 16:43:46 DB : phase1 ref increment ( ref count = 4, obj count = 1 )
19/04/22 16:43:46 ii : next tunnel DPD retry in 4 secs for peer 62.217.96.231:4500
19/04/22 16:43:46 ii : sending peer DPDV1-R-U-THERE notification
19/04/22 16:43:46 ii : - 192.168.1.12:4500 -> 62.217.96.231:4500
19/04/22 16:43:46 ii : - isakmp spi = cd6eecee11dbf4bf:86a82707d6d6521b
19/04/22 16:43:46 ii : - data size 4
19/04/22 16:43:46 >> : hash payload
19/04/22 16:43:46 >> : notification payload
19/04/22 16:43:46 == : new informational hash ( 20 bytes )
19/04/22 16:43:46 == : new informational iv ( 8 bytes )
19/04/22 16:43:46 >= : cookies cd6eecee11dbf4bf:86a82707d6d6521b
19/04/22 16:43:46 >= : message 5896897e
19/04/22 16:43:46 >= : encrypt iv ( 8 bytes )
19/04/22 16:43:46 == : encrypt packet ( 84 bytes )
19/04/22 16:43:46 == : stored iv ( 8 bytes )
19/04/22 16:43:46 -> : send NAT-T:IKE packet 192.168.1.12:4500 -> 62.217.96.231:4500 ( 116 bytes )
19/04/22 16:43:46 ii : DPD ARE-YOU-THERE sequence 11c6269a requested
19/04/22 16:43:46 DB : phase1 ref decrement ( ref count = 3, obj count = 1 )
19/04/22 16:43:47 ii : fragmented packet to 1514 bytes ( MTU 1500 bytes )
19/04/22 16:43:47 ii : fragmented packet to 386 bytes ( MTU 1500 bytes )
19/04/22 16:43:47 -> : resend 1 phase2 packet(s) [1/2] 192.168.1.12:4500 -> 62.217.96.231:4500
19/04/22 16:43:48 <- : recv NAT-T:IKE packet 62.217.96.231:4500 -> 192.168.1.12:4500 ( 84 bytes )
19/04/22 16:43:48 DB : phase1 found
19/04/22 16:43:48 DB : phase1 ref increment ( ref count = 4, obj count = 1 )
19/04/22 16:43:48 ii : processing informational packet ( 84 bytes )
19/04/22 16:43:48 == : new informational iv ( 8 bytes )
19/04/22 16:43:48 =< : cookies cd6eecee11dbf4bf:86a82707d6d6521b
19/04/22 16:43:48 =< : message 823db71f
19/04/22 16:43:48 =< : decrypt iv ( 8 bytes )
19/04/22 16:43:48 == : decrypt packet ( 84 bytes )
19/04/22 16:43:48 <= : trimmed packet padding ( 4 bytes )
19/04/22 16:43:48 <= : stored iv ( 8 bytes )
19/04/22 16:43:48 << : hash payload
19/04/22 16:43:48 << : delete payload
19/04/22 16:43:48 == : informational hash_i ( computed ) ( 20 bytes )
19/04/22 16:43:48 == : informational hash_c ( received ) ( 20 bytes )
19/04/22 16:43:48 ii : informational hash verified
19/04/22 16:43:48 ii : received peer DELETE message
19/04/22 16:43:48 ii : - 62.217.96.231:4500 -> 192.168.1.12:4500
19/04/22 16:43:48 ii : - isakmp spi = cd6eecee11dbf4bf:86a82707d6d6521b
19/04/22 16:43:48 DB : phase1 found
19/04/22 16:43:48 DB : phase1 ref increment ( ref count = 5, obj count = 1 )
19/04/22 16:43:48 ii : cleanup, marked phase1 cd6eecee11dbf4bf:86a82707d6d6521b for removal
19/04/22 16:43:48 DB : phase1 soft event canceled ( ref count = 4 )
19/04/22 16:43:48 DB : phase1 hard event canceled ( ref count = 3 )
19/04/22 16:43:48 DB : phase1 dead event canceled ( ref count = 2 )
19/04/22 16:43:48 DB : config ref increment ( ref count = 1, obj count = 1 )
19/04/22 16:43:48 DB : config deleted ( obj count = 0 )
19/04/22 16:43:48 DB : tunnel ref decrement ( ref count = 6, obj count = 1 )
19/04/22 16:43:48 ii : phase1 removal before expire time
19/04/22 16:43:48 DB : phase1 not found
19/04/22 16:43:48 DB : phase1 ref decrement ( ref count = 1, obj count = 1 )
19/04/22 16:43:48 DB : phase1 deleted ( obj count = 0 )
19/04/22 16:43:48 DB : tunnel ref decrement ( ref count = 5, obj count = 1 )
19/04/22 16:43:48 DB : policy found
19/04/22 16:43:48 DB : policy ref increment ( ref count = 1, obj count = 6 )
19/04/22 16:43:48 ii : removing IPSEC INBOUND policy ANY:0.0.0.0/0:* -> ANY:172.16.1.2:*
19/04/22 16:43:48 K> : send pfkey X_SPDDELETE2 UNSPEC message
19/04/22 16:43:48 DB : policy ref decrement ( ref count = 0, obj count = 6 )
19/04/22 16:43:48 DB : policy found
19/04/22 16:43:48 DB : policy ref increment ( ref count = 1, obj count = 6 )
19/04/22 16:43:48 ii : removing IPSEC OUTBOUND policy ANY:172.16.1.2:* -> ANY:0.0.0.0/0:*
19/04/22 16:43:48 K> : send pfkey X_SPDDELETE2 UNSPEC message
19/04/22 16:43:48 DB : policy ref decrement ( ref count = 0, obj count = 6 )
19/04/22 16:43:48 K< : recv pfkey X_SPDDELETE2 UNSPEC message
19/04/22 16:43:48 ii : removed IPSEC policy route for ANY:0.0.0.0/0:*
19/04/22 16:43:48 DB : policy found
19/04/22 16:43:48 DB : policy ref increment ( ref count = 1, obj count = 6 )
19/04/22 16:43:48 ii : removing NONE INBOUND policy ANY:192.168.1.1:* -> ANY:172.16.1.2:*
19/04/22 16:43:48 K> : send pfkey X_SPDDELETE2 UNSPEC message
19/04/22 16:43:48 DB : policy ref decrement ( ref count = 0, obj count = 6 )
19/04/22 16:43:48 DB : policy found
19/04/22 16:43:48 DB : policy ref increment ( ref count = 1, obj count = 6 )
19/04/22 16:43:48 ii : removing NONE OUTBOUND policy ANY:172.16.1.2:* -> ANY:192.168.1.1:*
19/04/22 16:43:48 K> : send pfkey X_SPDDELETE2 UNSPEC message
19/04/22 16:43:48 DB : policy ref decrement ( ref count = 0, obj count = 6 )
19/04/22 16:43:48 DB : policy found
19/04/22 16:43:48 DB : policy ref increment ( ref count = 1, obj count = 6 )
19/04/22 16:43:48 ii : removing NONE INBOUND policy ANY:62.217.96.231:* -> ANY:192.168.1.12:*
19/04/22 16:43:48 K> : send pfkey X_SPDDELETE2 UNSPEC message
19/04/22 16:43:48 DB : policy ref decrement ( ref count = 0, obj count = 6 )
19/04/22 16:43:48 DB : policy found
19/04/22 16:43:48 DB : policy ref increment ( ref count = 1, obj count = 6 )
19/04/22 16:43:48 ii : removing NONE OUTBOUND policy ANY:192.168.1.12:* -> ANY:62.217.96.231:*
19/04/22 16:43:48 K> : send pfkey X_SPDDELETE2 UNSPEC message
19/04/22 16:43:48 DB : policy ref decrement ( ref count = 0, obj count = 6 )
19/04/22 16:43:48 ii : removed NONE policy route for ANY:62.217.96.231:*
19/04/22 16:43:48 DB : policy found
19/04/22 16:43:48 DB : policy ref increment ( ref count = 1, obj count = 6 )
19/04/22 16:43:48 DB : policy deleted ( obj count = 5 )
19/04/22 16:43:48 K< : recv pfkey X_SPDDELETE2 UNSPEC message
19/04/22 16:43:48 DB : policy found
19/04/22 16:43:48 DB : policy ref increment ( ref count = 1, obj count = 5 )
19/04/22 16:43:48 DB : policy deleted ( obj count = 4 )
19/04/22 16:43:48 K< : recv pfkey X_SPDDELETE2 UNSPEC message
19/04/22 16:43:48 DB : policy found
19/04/22 16:43:48 DB : policy ref increment ( ref count = 1, obj count = 4 )
19/04/22 16:43:48 DB : policy deleted ( obj count = 3 )
19/04/22 16:43:48 K< : recv pfkey X_SPDDELETE2 UNSPEC message
19/04/22 16:43:48 DB : policy found
19/04/22 16:43:48 DB : policy ref increment ( ref count = 1, obj count = 3 )
19/04/22 16:43:48 DB : policy deleted ( obj count = 2 )
19/04/22 16:43:48 K< : recv pfkey X_SPDDELETE2 UNSPEC message
19/04/22 16:43:48 DB : policy found
19/04/22 16:43:48 DB : policy ref increment ( ref count = 1, obj count = 2 )
19/04/22 16:43:48 DB : policy deleted ( obj count = 1 )
19/04/22 16:43:48 K< : recv pfkey X_SPDDELETE2 UNSPEC message
19/04/22 16:43:48 DB : policy found
19/04/22 16:43:48 DB : policy ref increment ( ref count = 1, obj count = 1 )
19/04/22 16:43:48 DB : policy deleted ( obj count = 0 )
19/04/22 16:43:49 ii : disable adapter ROOT\VNET\0000
19/04/22 16:43:49 DB : tunnel dpd event canceled ( ref count = 4 )
19/04/22 16:43:49 DB : tunnel natt event canceled ( ref count = 3 )
19/04/22 16:43:49 DB : tunnel stats event canceled ( ref count = 2 )
19/04/22 16:43:49 DB : removing tunnel config references
19/04/22 16:43:49 DB : removing tunnel phase2 references
19/04/22 16:43:49 DB : phase2 ref increment ( ref count = 2, obj count = 1 )
19/04/22 16:43:49 DB : phase2 resend event canceled ( ref count = 1 )
19/04/22 16:43:49 ii : phase2 removal before expire time
19/04/22 16:43:49 DB : phase2 deleted ( obj count = 0 )
19/04/22 16:43:49 DB : tunnel ref decrement ( ref count = 1, obj count = 1 )
19/04/22 16:43:49 DB : removing tunnel phase1 references
19/04/22 16:43:49 DB : tunnel deleted ( obj count = 0 )
19/04/22 16:43:49 DB : peer ref decrement ( ref count = 1, obj count = 1 )
19/04/22 16:43:49 DB : removing all peer tunnel references
19/04/22 16:43:49 DB : peer deleted ( obj count = 0 )
19/04/22 16:43:49 ii : ipc client process thread exit ...

Επεξ/σία από gtgt
Δημοσ. (επεξεργασμένο)

Σε IKEv1/IKEv2 που προσπαθείς να ανοίξεις IPsec, υπάρχουν 2 φάσεις που πραγματοποιούνται σε μια σειρά απο βήματα. Αν δεν ολοκληρωθεί η πρώτη φάση (και όλα τα βήματα της σωστά) δεν πας στην δεύτερη. Βάση των logs δεν "ἑκλεινε" το phase 1 λόγω authentication.

Αυτός που δίνει την VPN υπηρεσία σου δίνει οδηγίες τι χρειάζετε για να παίξει σωστά και να ανέβει το IPsec tunnel.

Το τι χρειάζετε να γίνει configured επαναλαμβάνω δεν το βάζουμε στα κουτουρού, κάπου είδα κάπου διάβασα...

 

Επεξ/σία από Επισκέπτης

Δημιουργήστε ένα λογαριασμό ή συνδεθείτε για να σχολιάσετε

Πρέπει να είστε μέλος για να αφήσετε σχόλιο

Δημιουργία λογαριασμού

Εγγραφείτε με νέο λογαριασμό στην κοινότητα μας. Είναι πανεύκολο!

Δημιουργία νέου λογαριασμού

Σύνδεση

Έχετε ήδη λογαριασμό; Συνδεθείτε εδώ.

Συνδεθείτε τώρα
  • Δημιουργία νέου...