habe in der Fa. einen 1711 & zuhause einen 1821. Router zu Router Kopplung klappt seit langer Zeit einwandfrei (auch zu anderen Routern vom 1711 aus).
Nun wollte ich für meine Laptops (Macbook & Netbook mit XP) einen mobilen VPN Zugang einrichten für unterwegs.
Zuerst hatte ich den Lancom Advanced Client auf dem Netbook ausprobiert. Hatte im 1711 mit dem 1-Click Wizard einen Zugang eingerichtet und per ini-Datei in den Adv.Client übernommen & bin dann in Urlaub.
Leider ging gar nichts. Nicht mal IKE Phase I kam zustande. Zum Glück hatte ich noch einen SSH Zugang offengelassen...
Zurück zuhause habe ich dann den Adv.Client deinstalliert & den Shrewsoft-Client installiiert. Im 1711 habe ich den VPN Zugang dann händisch erstellt. Leider das gleiche Problem. Es ging nicht mal ein Phase I connect. Hab mich dann per SSH auf den 1711 eingeloggt und einen VPN trace gestartet. Es passiert GAR NICHTS, ergo kam der Client nicht mal auf den Router drauf (Namensauflösung klappte aber).
Habe testweise dann die Firewall auf dem 1711 deaktiviert. Gleiches Ergebnis, keinen Verbindung.
Ok, dachte ich, evtl. ein Problem des Netbooks. Also Macbook angeworfen & IP-Securitas installiert. Habs genauso wie hier im Forums-Howto eingerichtet. Wieder gab ein Trace auf dem 1711 keine einzige Ausgabe.
Auf meinem lokalen 1821 hatte ich natürlich die Route zum 1711 gelöscht & die VPN Verbindung deaktiviert.
Hab keinen Ahnung, warum Router zu Router problemlos klappt, aber kein Client auf den 1711 kommt.
Hat da jemand eine idee, wie ich weiterforschen sollte oder - besser noch - woran es liegen könnte ?
Danke, Rado
IP-securitas Debug Log:
Code: Alles auswählen
IPSecuritas 3.1 build 1860, Mon Oct 15 22:03:05 CEST 2007, nadig
Darwin 8.10.1 Darwin Kernel Version 8.10.1: Wed May 23 16:33:00 PDT 2007; root:xnu-792.22.5~1/RELEASE_I386 i386
Nov 03, 18:13:04 Info APP IPSec authenticating
Nov 03, 18:13:04 Info APP IKE daemon started
Nov 03, 18:13:04 Debug APP State change from AUTHENTICATING to RUNNING after event TIMER
Nov 03, 18:13:04 Info APP IPSec started
Nov 03, 18:13:04 Debug APP Received SADB message type X_SPDUPDATE - not interesting
Nov 03, 18:13:04 Debug APP Received SADB message type X_SPDUPDATE - not interesting
Nov 03, 18:13:04 Error IKE Foreground mode.
Nov 03, 18:13:04 Info IKE @(#)ipsec-tools CVS (http://ipsec-tools.sourceforge.net)
Nov 03, 18:13:04 Info IKE @(#)This product linked OpenSSL 0.9.7l 28 Sep 2006 (http://www.openssl.org/)
Nov 03, 18:13:04 Info IKE Reading configuration from "/Library/Application Support/Lobotomo Software/IPSecuritas/racoon.conf"
Nov 03, 18:13:04 Info IKE Resize address pool from 0 to 255
Nov 03, 18:13:04 Debug IKE lifetime = 28800
Nov 03, 18:13:04 Debug IKE lifebyte = 0
Nov 03, 18:13:04 Debug IKE encklen=128
Nov 03, 18:13:04 Debug IKE p:1 t:1
Nov 03, 18:13:04 Debug IKE AES-CBC(7)
Nov 03, 18:13:04 Debug IKE MD5(1)
Nov 03, 18:13:04 Debug IKE 1024-bit MODP group(2)
Nov 03, 18:13:04 Debug IKE pre-shared key(1)
Nov 03, 18:13:04 Debug IKE hmac(modp1024)
Nov 03, 18:13:04 Debug IKE compression algorithm can not be checked because sadb message doesn't support it.
Nov 03, 18:13:04 Debug IKE parse successed.
Nov 03, 18:13:04 Debug IKE open /Library/Application Support/Lobotomo Software/IPSecuritas/admin.sock as racoon management.
Nov 03, 18:13:04 Info IKE 192.168.2.38[4500] used as isakmp port (fd=6)
Nov 03, 18:13:04 Info IKE 192.168.2.38[500] used as isakmp port (fd=7)
Nov 03, 18:13:04 Debug IKE get pfkey X_SPDDUMP message
Nov 03, 18:13:04 Debug IKE 02120000 0f000200 01000000 ca000000 03000500 ff180000 10020000 c0a80100
Nov 03, 18:13:04 Debug IKE 00000000 00000000 03000600 ff200000 10020000 c0a80226 00000000 00000000
Nov 03, 18:13:04 Debug IKE 07001200 02000100 08000000 00000000 28003200 02031200 10020000 55b3c189
Nov 03, 18:13:04 Debug IKE 00000000 00000000 10020000 c0a80226 00000000 00000000
Nov 03, 18:13:04 Debug IKE get pfkey X_SPDDUMP message
Nov 03, 18:13:04 Debug IKE 02120000 0f000200 00000000 ca000000 03000500 ff200000 10020000 c0a80226
Nov 03, 18:13:04 Debug IKE 00000000 00000000 03000600 ff180000 10020000 c0a80100 00000000 00000000
Nov 03, 18:13:04 Debug IKE 07001200 02000200 07000000 00000000 28003200 02031100 10020000 c0a80226
Nov 03, 18:13:04 Debug IKE 00000000 00000000 10020000 55b3c189 00000000 00000000
Nov 03, 18:13:04 Debug IKE sub:0xbffff6a0: 192.168.2.38/32[0] 192.168.1.0/24[0] proto=any dir=out
Nov 03, 18:13:04 Debug IKE db :0x108ca8: 192.168.1.0/24[0] 192.168.2.38/32[0] proto=any dir=in
Nov 03, 18:13:05 Info APP Initiated connection VPN_Firma
Nov 03, 18:13:05 Debug IKE get pfkey ACQUIRE message
Nov 03, 18:13:05 Debug IKE 02060003 24000000 05000000 00000000 03000500 ff200000 10020000 c0a80226
Nov 03, 18:13:05 Debug IKE 00000000 00000000 03000600 ff200000 10020000 55b3c189 00000000 00000000
Nov 03, 18:13:05 Debug IKE 1c000d00 20000000 00030000 00000000 00010008 00000000 01000000 01000000
Nov 03, 18:13:05 Debug IKE 00000000 00000000 00000000 00000000 00000000 00000000 80510100 00000000
Nov 03, 18:13:05 Debug IKE 80700000 00000000 00000000 00000000 00040000 00000000 0001c001 00000000
Nov 03, 18:13:05 Debug IKE 01000000 01000000 00000000 00000000 00000000 00000000 00000000 00000000
Nov 03, 18:13:05 Debug IKE 80510100 00000000 80700000 00000000 00000000 00000000 000c0000 00000000
Nov 03, 18:13:05 Debug IKE 00010001 00000000 01000000 01000000 00000000 00000000 00000000 00000000
Nov 03, 18:13:05 Debug IKE 00000000 00000000 80510100 00000000 80700000 00000000 00000000 00000000
Nov 03, 18:13:05 Error IKE inappropriate sadb acquire message passed.
Nov 03, 18:13:05 Debug IKE get pfkey ACQUIRE message
Nov 03, 18:13:05 Debug IKE 02060003 14000000 0e000000 5e000000 03000500 ff200000 10020000 c0a80226
Nov 03, 18:13:05 Debug IKE 00000000 00000000 03000600 ff200000 10020000 55b3c189 00000000 00000000
Nov 03, 18:13:05 Debug IKE 0a000d00 20000000 000c0000 00000000 00010001 00000000 01000000 01000000
Nov 03, 18:13:05 Debug IKE 00000000 00000000 00000000 00000000 00000000 00000000 80510100 00000000
Nov 03, 18:13:05 Debug IKE 80700000 00000000 00000000 00000000 02001200 02000200 07000000 00000000
Nov 03, 18:13:05 Debug IKE suitable outbound SP found: 192.168.2.38/32[0] 192.168.1.0/24[0] proto=any dir=out.
Nov 03, 18:13:05 Debug IKE sub:0xbffff67c: 192.168.1.0/24[0] 192.168.2.38/32[0] proto=any dir=in
Nov 03, 18:13:05 Debug IKE db :0x108ca8: 192.168.1.0/24[0] 192.168.2.38/32[0] proto=any dir=in
Nov 03, 18:13:05 Debug IKE suitable inbound SP found: 192.168.1.0/24[0] 192.168.2.38/32[0] proto=any dir=in.
Nov 03, 18:13:05 Debug IKE new acquire 192.168.2.38/32[0] 192.168.1.0/24[0] proto=any dir=out
Nov 03, 18:13:05 Debug IKE (proto_id=ESP spisize=4 spi=00000000 spi_p=00000000 encmode=Tunnel reqid=18:17)
Nov 03, 18:13:05 Debug IKE (trns_id=AES encklen=128 authtype=hmac-md5)
Nov 03, 18:13:05 Debug IKE in post_acquire
Nov 03, 18:13:05 Debug IKE configuration found for remote_ip.
Nov 03, 18:13:05 Info IKE IPsec-SA request for remote_ip queued due to no phase1 found.
Nov 03, 18:13:05 Debug IKE ===
Nov 03, 18:13:05 Info IKE initiate new phase 1 negotiation: 192.168.2.38[500]<=>remote_ip[500]
Nov 03, 18:13:05 Info IKE begin Aggressive mode.
Nov 03, 18:13:05 Debug IKE new cookie:
Nov 03, 18:13:05 Debug IKE 54b6eb5866f144a1
Nov 03, 18:13:05 Debug IKE use ID type of User_FQDN
Nov 03, 18:13:05 Debug IKE compute DH's private.
Nov 03, 18:13:05 Debug IKE 67c6a950 c4b61292 9ac4c005 f3acc476 91028388 bfab23ce 4a708822 75500614
Nov 03, 18:13:05 Debug IKE 30557f24 c1ea4963 e9552945 10459595 2dc3133c 23da45d5 bcbc7c4c 118d9d95
Nov 03, 18:13:05 Debug IKE cd6a4b2e ddd0011c ecc5efd5 1165c65d 22102deb 326d52fc 96cce6f6 bac439e9
Nov 03, 18:13:05 Debug IKE 2f7ce738 73050731 d47f2874 14c1e050 3590d41a ec94a23d 74166a1e 0771a573
Nov 03, 18:13:05 Debug IKE compute DH's public.
Nov 03, 18:13:05 Debug IKE e7416d57 ca8c6dc7 327fc22e fc57f923 73dc47c7 3dee6ef9 0e97367e c77039bc
Nov 03, 18:13:05 Debug IKE c6456481 3b4c39df 3298364f 0a7cf5f6 ce077320 9fb29d55 c547e9d1 0e6d74bb
Nov 03, 18:13:05 Debug IKE 323df930 8e8482f5 681f8b4b c0080073 9890f5a7 b0dd5e47 c7946d8d f2d71e94
Nov 03, 18:13:05 Debug IKE f87f3a20 4045694f 53991f1e 8bf3678a b1808697 76a9ecfc b03838a6 9a19c509
Nov 03, 18:13:05 Debug IKE authmethod is pre-shared key
Nov 03, 18:13:05 Debug IKE add payload of len 52, next type 4
Nov 03, 18:13:05 Debug IKE add payload of len 128, next type 10
Nov 03, 18:13:05 Debug IKE add payload of len 16, next type 5
Nov 03, 18:13:05 Debug IKE add payload of len 19, next type 13
Nov 03, 18:13:05 Debug IKE add payload of len 20, next type 13
Nov 03, 18:13:05 Debug IKE add payload of len 16, next type 13
Nov 03, 18:13:05 Debug IKE add payload of len 16, next type 13
Nov 03, 18:13:05 Debug IKE add payload of len 16, next type 13
Nov 03, 18:13:05 Debug IKE add payload of len 16, next type 13
Nov 03, 18:13:05 Debug IKE add payload of len 16, next type 13
Nov 03, 18:13:05 Debug IKE add payload of len 16, next type 13
Nov 03, 18:13:05 Debug IKE add payload of len 16, next type 13
Nov 03, 18:13:05 Debug IKE add payload of len 16, next type 13
Nov 03, 18:13:05 Debug IKE add payload of len 16, next type 13
Nov 03, 18:13:05 Debug IKE add payload of len 16, next type 13
Nov 03, 18:13:05 Debug IKE add payload of len 16, next type 13
Nov 03, 18:13:05 Debug IKE add payload of len 16, next type 0
Nov 03, 18:13:05 Debug IKE 523 bytes from 192.168.2.38[500] to remote_ip[500]
Nov 03, 18:13:05 Debug IKE sockname 192.168.2.38[500]
Nov 03, 18:13:05 Debug IKE send packet from 192.168.2.38[500]
Nov 03, 18:13:05 Debug IKE send packet to remote_ip[500]
Nov 03, 18:13:05 Debug IKE 1 times of 523 bytes message will be sent to remote_ip[500]
Nov 03, 18:13:05 Debug IKE 54b6eb58 66f144a1 00000000 00000000 01100400 00000000 0000020b 04000038
Nov 03, 18:13:05 Debug IKE 00000001 00000001 0000002c 01010001 00000024 01010000 800b0001 800c7080
Nov 03, 18:13:05 Debug IKE 80010007 800e0080 80030001 80020001 80040002 0a000084 e7416d57 ca8c6dc7
Nov 03, 18:13:05 Debug IKE 327fc22e fc57f923 73dc47c7 3dee6ef9 0e97367e c77039bc c6456481 3b4c39df
Nov 03, 18:13:05 Debug IKE 3298364f 0a7cf5f6 ce077320 9fb29d55 c547e9d1 0e6d74bb 323df930 8e8482f5
Nov 03, 18:13:05 Debug IKE 681f8b4b c0080073 9890f5a7 b0dd5e47 c7946d8d f2d71e94 f87f3a20 4045694f
Nov 03, 18:13:05 Debug IKE 53991f1e 8bf3678a b1808697 76a9ecfc b03838a6 9a19c509 05000014 ec4eed77
Nov 03, 18:13:05 Debug IKE 13f46486 be9afac7 bb68d63a 0d000017 03000000 70626f6f 6b40636f 636f6e2e
Nov 03, 18:13:05 Debug IKE 696e740d 00001840 48b7d56e bce88525 e7de7f00 d6c2d380 0000000d 0000144a
Nov 03, 18:13:05 Debug IKE 131c8107 0358455c 5728f20e 95452f0d 0000148f 8d83826d 246b6fc7 a8a6a428
Nov 03, 18:13:05 Debug IKE c11de80d 00001443 9b59f8ba 676c4c77 37ae22ea b8f5820d 0000144d 1e0e136d
Nov 03, 18:13:05 Debug IKE eafa34c4 f3ea9f02 ec72850d 00001480 d0bb3def 54565ee8 4645d4c8 5ce3ee0d
Nov 03, 18:13:05 Debug IKE 00001499 09b64eed 937c6573 de52ace9 52fa6b0d 0000147d 9419a653 10ca6f2c
Nov 03, 18:13:05 Debug IKE 179d9215 529d560d 000014cd 60464335 df21f87c fdb2fc68 b6a4480d 00001490
Nov 03, 18:13:05 Debug IKE cb80913e bb696e08 6381b5ec 427b1f0d 00001416 f6ca16e4 a4066d83 821a0f0a
Nov 03, 18:13:05 Debug IKE eaa8620d 00001444 85152d18 b6bbcd0b e8a84695 79ddcc00 000014af cad71368
Nov 03, 18:13:05 Debug IKE a1f1c96b 8696fc77 570100
Nov 03, 18:13:05 Debug IKE resend phase1 packet 54b6eb5866f144a1:0000000000000000
Nov 03, 18:13:10 Debug IKE 523 bytes from 192.168.2.38[500] to remote_ip[500]
Nov 03, 18:13:10 Debug IKE sockname 192.168.2.38[500]
Nov 03, 18:13:10 Debug IKE send packet from 192.168.2.38[500]
Nov 03, 18:13:10 Debug IKE send packet to remote_ip[500]
Nov 03, 18:13:10 Debug IKE 1 times of 523 bytes message will be sent to remote_ip[500]
Nov 03, 18:13:10 Debug IKE 54b6eb58 66f144a1 00000000 00000000 01100400 00000000 0000020b 04000038
Nov 03, 18:13:10 Debug IKE 00000001 00000001 0000002c 01010001 00000024 01010000 800b0001 800c7080
Nov 03, 18:13:10 Debug IKE 80010007 800e0080 80030001 80020001 80040002 0a000084 e7416d57 ca8c6dc7
Nov 03, 18:13:10 Debug IKE 327fc22e fc57f923 73dc47c7 3dee6ef9 0e97367e c77039bc c6456481 3b4c39df
Nov 03, 18:13:10 Debug IKE 3298364f 0a7cf5f6 ce077320 9fb29d55 c547e9d1 0e6d74bb 323df930 8e8482f5
Nov 03, 18:13:10 Debug IKE 681f8b4b c0080073 9890f5a7 b0dd5e47 c7946d8d f2d71e94 f87f3a20 4045694f
Nov 03, 18:13:10 Debug IKE 53991f1e 8bf3678a b1808697 76a9ecfc b03838a6 9a19c509 05000014 ec4eed77
Nov 03, 18:13:10 Debug IKE 13f46486 be9afac7 bb68d63a 0d000017 03000000 70626f6f 6b40636f 636f6e2e
Nov 03, 18:13:10 Debug IKE 696e740d 00001840 48b7d56e bce88525 e7de7f00 d6c2d380 0000000d 0000144a
Nov 03, 18:13:10 Debug IKE 131c8107 0358455c 5728f20e 95452f0d 0000148f 8d83826d 246b6fc7 a8a6a428
Nov 03, 18:13:10 Debug IKE c11de80d 00001443 9b59f8ba 676c4c77 37ae22ea b8f5820d 0000144d 1e0e136d
Nov 03, 18:13:10 Debug IKE eafa34c4 f3ea9f02 ec72850d 00001480 d0bb3def 54565ee8 4645d4c8 5ce3ee0d
Nov 03, 18:13:10 Debug IKE 00001499 09b64eed 937c6573 de52ace9 52fa6b0d 0000147d 9419a653 10ca6f2c
Nov 03, 18:13:10 Debug IKE 179d9215 529d560d 000014cd 60464335 df21f87c fdb2fc68 b6a4480d 00001490
Nov 03, 18:13:10 Debug IKE cb80913e bb696e08 6381b5ec 427b1f0d 00001416 f6ca16e4 a4066d83 821a0f0a
Nov 03, 18:13:10 Debug IKE eaa8620d 00001444 85152d18 b6bbcd0b e8a84695 79ddcc00 000014af cad71368
Nov 03, 18:13:10 Debug IKE a1f1c96b 8696fc77 570100
Nov 03, 18:13:10 Debug IKE resend phase1 packet 54b6eb5866f144a1:0000000000000000
Nov 03, 18:13:12 Info APP Initiated connection VPN_Firma
Nov 03, 18:13:12 Debug IKE get pfkey ACQUIRE message
Nov 03, 18:13:12 Debug IKE 02060003 14000000 0f000000 5e000000 03000500 ff200000 10020000 c0a80226
Nov 03, 18:13:12 Debug IKE 00000000 00000000 03000600 ff200000 10020000 55b3c189 00000000 00000000
Nov 03, 18:13:12 Debug IKE 0a000d00 20000000 000c0000 00000000 00010001 00000000 01000000 01000000
Nov 03, 18:13:12 Debug IKE 00000000 00000000 00000000 00000000 00000000 00000000 80510100 00000000
Nov 03, 18:13:12 Debug IKE 80700000 00000000 00000000 00000000 02001200 02000200 07000000 00000000
Nov 03, 18:13:12 Debug IKE suitable outbound SP found: 192.168.2.38/32[0] 192.168.1.0/24[0] proto=any dir=out.
Nov 03, 18:13:12 Debug IKE sub:0xbffff67c: 192.168.1.0/24[0] 192.168.2.38/32[0] proto=any dir=in
Nov 03, 18:13:12 Debug IKE db :0x108ca8: 192.168.1.0/24[0] 192.168.2.38/32[0] proto=any dir=in
Nov 03, 18:13:12 Debug IKE suitable inbound SP found: 192.168.1.0/24[0] 192.168.2.38/32[0] proto=any dir=in.
Nov 03, 18:13:12 Debug IKE new acquire 192.168.2.38/32[0] 192.168.1.0/24[0] proto=any dir=out
Nov 03, 18:13:12 Debug IKE (proto_id=ESP spisize=4 spi=00000000 spi_p=00000000 encmode=Tunnel reqid=18:17)
Nov 03, 18:13:12 Debug IKE (trns_id=AES encklen=128 authtype=hmac-md5)
Nov 03, 18:13:12 Debug IKE in post_acquire
Nov 03, 18:13:12 Debug IKE configuration found for remote_ip.
Nov 03, 18:13:12 Info IKE request for establishing IPsec-SA was queued due to no phase1 found.
Nov 03, 18:13:15 Debug IKE 523 bytes from 192.168.2.38[500] to remote_ip[500]
Nov 03, 18:13:15 Debug IKE sockname 192.168.2.38[500]
Nov 03, 18:13:15 Debug IKE send packet from 192.168.2.38[500]
Nov 03, 18:13:15 Debug IKE send packet to remote_ip[500]
Nov 03, 18:13:15 Debug IKE 1 times of 523 bytes message will be sent to remote_ip[500]
Nov 03, 18:13:15 Debug IKE 54b6eb58 66f144a1 00000000 00000000 01100400 00000000 0000020b 04000038
Nov 03, 18:13:15 Debug IKE 00000001 00000001 0000002c 01010001 00000024 01010000 800b0001 800c7080
Nov 03, 18:13:15 Debug IKE 80010007 800e0080 80030001 80020001 80040002 0a000084 e7416d57 ca8c6dc7
Nov 03, 18:13:15 Debug IKE 327fc22e fc57f923 73dc47c7 3dee6ef9 0e97367e c77039bc c6456481 3b4c39df
Nov 03, 18:13:15 Debug IKE 3298364f 0a7cf5f6 ce077320 9fb29d55 c547e9d1 0e6d74bb 323df930 8e8482f5
Nov 03, 18:13:15 Debug IKE 681f8b4b c0080073 9890f5a7 b0dd5e47 c7946d8d f2d71e94 f87f3a20 4045694f
Nov 03, 18:13:15 Debug IKE 53991f1e 8bf3678a b1808697 76a9ecfc b03838a6 9a19c509 05000014 ec4eed77
Nov 03, 18:13:15 Debug IKE 13f46486 be9afac7 bb68d63a 0d000017 03000000 70626f6f 6b40636f 636f6e2e
Nov 03, 18:13:15 Debug IKE 696e740d 00001840 48b7d56e bce88525 e7de7f00 d6c2d380 0000000d 0000144a
Nov 03, 18:13:15 Debug IKE 131c8107 0358455c 5728f20e 95452f0d 0000148f 8d83826d 246b6fc7 a8a6a428
Nov 03, 18:13:15 Debug IKE c11de80d 00001443 9b59f8ba 676c4c77 37ae22ea b8f5820d 0000144d 1e0e136d
Nov 03, 18:13:15 Debug IKE eafa34c4 f3ea9f02 ec72850d 00001480 d0bb3def 54565ee8 4645d4c8 5ce3ee0d
Nov 03, 18:13:15 Debug IKE 00001499 09b64eed 937c6573 de52ace9 52fa6b0d 0000147d 9419a653 10ca6f2c
Nov 03, 18:13:15 Debug IKE 179d9215 529d560d 000014cd 60464335 df21f87c fdb2fc68 b6a4480d 00001490
Nov 03, 18:13:15 Debug IKE cb80913e bb696e08 6381b5ec 427b1f0d 00001416 f6ca16e4 a4066d83 821a0f0a
Nov 03, 18:13:15 Debug IKE eaa8620d 00001444 85152d18 b6bbcd0b e8a84695 79ddcc00 000014af cad71368
Nov 03, 18:13:15 Debug IKE a1f1c96b 8696fc77 570100
Nov 03, 18:13:15 Debug IKE resend phase1 packet 54b6eb5866f144a1:0000000000000000
Nov 03, 18:13:19 Info APP Initiated connection VPN_Firma
Nov 03, 18:13:19 Debug IKE get pfkey ACQUIRE message
Nov 03, 18:13:19 Debug IKE 02060003 14000000 10000000 5e000000 03000500 ff200000 10020000 c0a80226
Nov 03, 18:13:19 Debug IKE 00000000 00000000 03000600 ff200000 10020000 55b3c189 00000000 00000000
Nov 03, 18:13:19 Debug IKE 0a000d00 20000000 000c0000 00000000 00010001 00000000 01000000 01000000
Nov 03, 18:13:19 Debug IKE 00000000 00000000 00000000 00000000 00000000 00000000 80510100 00000000
Nov 03, 18:13:19 Debug IKE 80700000 00000000 00000000 00000000 02001200 02000200 07000000 00000000
Nov 03, 18:13:19 Debug IKE suitable outbound SP found: 192.168.2.38/32[0] 192.168.1.0/24[0] proto=any dir=out.
Nov 03, 18:13:19 Debug IKE sub:0xbffff67c: 192.168.1.0/24[0] 192.168.2.38/32[0] proto=any dir=in
Nov 03, 18:13:19 Debug IKE db :0x108ca8: 192.168.1.0/24[0] 192.168.2.38/32[0] proto=any dir=in
Nov 03, 18:13:19 Debug IKE suitable inbound SP found: 192.168.1.0/24[0] 192.168.2.38/32[0] proto=any dir=in.
Nov 03, 18:13:19 Debug IKE new acquire 192.168.2.38/32[0] 192.168.1.0/24[0] proto=any dir=out
Nov 03, 18:13:19 Debug IKE (proto_id=ESP spisize=4 spi=00000000 spi_p=00000000 encmode=Tunnel reqid=18:17)
Nov 03, 18:13:19 Debug IKE (trns_id=AES encklen=128 authtype=hmac-md5)
Nov 03, 18:13:19 Debug IKE in post_acquire
Nov 03, 18:13:19 Debug IKE configuration found for remote_ip.
Nov 03, 18:13:19 Info IKE request for establishing IPsec-SA was queued due to no phase1 found.
Nov 03, 18:13:20 Debug IKE 523 bytes from 192.168.2.38[500] to remote_ip[500]
Nov 03, 18:13:20 Debug IKE sockname 192.168.2.38[500]
Nov 03, 18:13:20 Debug IKE send packet from 192.168.2.38[500]
Nov 03, 18:13:20 Debug IKE send packet to remote_ip[500]
Nov 03, 18:13:20 Debug IKE 1 times of 523 bytes message will be sent to remote_ip[500]
Nov 03, 18:13:20 Debug IKE 54b6eb58 66f144a1 00000000 00000000 01100400 00000000 0000020b 04000038
Nov 03, 18:13:20 Debug IKE 00000001 00000001 0000002c 01010001 00000024 01010000 800b0001 800c7080
Nov 03, 18:13:20 Debug IKE 80010007 800e0080 80030001 80020001 80040002 0a000084 e7416d57 ca8c6dc7
Nov 03, 18:13:20 Debug IKE 327fc22e fc57f923 73dc47c7 3dee6ef9 0e97367e c77039bc c6456481 3b4c39df
Nov 03, 18:13:20 Debug IKE 3298364f 0a7cf5f6 ce077320 9fb29d55 c547e9d1 0e6d74bb 323df930 8e8482f5
Nov 03, 18:13:20 Debug IKE 681f8b4b c0080073 9890f5a7 b0dd5e47 c7946d8d f2d71e94 f87f3a20 4045694f
Nov 03, 18:13:20 Debug IKE 53991f1e 8bf3678a b1808697 76a9ecfc b03838a6 9a19c509 05000014 ec4eed77
Nov 03, 18:13:20 Debug IKE 13f46486 be9afac7 bb68d63a 0d000017 03000000 70626f6f 6b40636f 636f6e2e
Nov 03, 18:13:20 Debug IKE 696e740d 00001840 48b7d56e bce88525 e7de7f00 d6c2d380 0000000d 0000144a
Nov 03, 18:13:20 Debug IKE 131c8107 0358455c 5728f20e 95452f0d 0000148f 8d83826d 246b6fc7 a8a6a428
Nov 03, 18:13:20 Debug IKE c11de80d 00001443 9b59f8ba 676c4c77 37ae22ea b8f5820d 0000144d 1e0e136d
Nov 03, 18:13:20 Debug IKE eafa34c4 f3ea9f02 ec72850d 00001480 d0bb3def 54565ee8 4645d4c8 5ce3ee0d
Nov 03, 18:13:20 Debug IKE 00001499 09b64eed 937c6573 de52ace9 52fa6b0d 0000147d 9419a653 10ca6f2c
Nov 03, 18:13:20 Debug IKE 179d9215 529d560d 000014cd 60464335 df21f87c fdb2fc68 b6a4480d 00001490
Nov 03, 18:13:20 Debug IKE cb80913e bb696e08 6381b5ec 427b1f0d 00001416 f6ca16e4 a4066d83 821a0f0a
Nov 03, 18:13:20 Debug IKE eaa8620d 00001444 85152d18 b6bbcd0b e8a84695 79ddcc00 000014af cad71368
Nov 03, 18:13:20 Debug IKE a1f1c96b 8696fc77 570100
Nov 03, 18:13:20 Debug IKE resend phase1 packet 54b6eb5866f144a1:0000000000000000
Nov 03, 18:13:21 Error IKE phase2 negotiation failed due to time up waiting for phase1. ESP remote_ip[500]->192.168.2.38[500]
Nov 03, 18:13:21 Info IKE delete phase 2 handler.
Nov 03, 18:13:25 Debug IKE 523 bytes from 192.168.2.38[500] to remote_ip[500]
Nov 03, 18:13:25 Debug IKE sockname 192.168.2.38[500]
Nov 03, 18:13:25 Debug IKE send packet from 192.168.2.38[500]
Nov 03, 18:13:25 Debug IKE send packet to remote_ip[500]
Nov 03, 18:13:25 Debug IKE 1 times of 523 bytes message will be sent to remote_ip[500]
Nov 03, 18:13:25 Debug IKE 54b6eb58 66f144a1 00000000 00000000 01100400 00000000 0000020b 04000038
Nov 03, 18:13:25 Debug IKE 00000001 00000001 0000002c 01010001 00000024 01010000 800b0001 800c7080
Nov 03, 18:13:25 Debug IKE 80010007 800e0080 80030001 80020001 80040002 0a000084 e7416d57 ca8c6dc7
Nov 03, 18:13:25 Debug IKE 327fc22e fc57f923 73dc47c7 3dee6ef9 0e97367e c77039bc c6456481 3b4c39df
Nov 03, 18:13:25 Debug IKE 3298364f 0a7cf5f6 ce077320 9fb29d55 c547e9d1 0e6d74bb 323df930 8e8482f5
Nov 03, 18:13:25 Debug IKE 681f8b4b c0080073 9890f5a7 b0dd5e47 c7946d8d f2d71e94 f87f3a20 4045694f
Nov 03, 18:13:25 Debug IKE 53991f1e 8bf3678a b1808697 76a9ecfc b03838a6 9a19c509 05000014 ec4eed77
Nov 03, 18:13:25 Debug IKE 13f46486 be9afac7 bb68d63a 0d000017 03000000 70626f6f 6b40636f 636f6e2e
Nov 03, 18:13:25 Debug IKE 696e740d 00001840 48b7d56e bce88525 e7de7f00 d6c2d380 0000000d 0000144a
Nov 03, 18:13:25 Debug IKE 131c8107 0358455c 5728f20e 95452f0d 0000148f 8d83826d 246b6fc7 a8a6a428
Nov 03, 18:13:25 Debug IKE c11de80d 00001443 9b59f8ba 676c4c77 37ae22ea b8f5820d 0000144d 1e0e136d
Nov 03, 18:13:25 Debug IKE eafa34c4 f3ea9f02 ec72850d 00001480 d0bb3def 54565ee8 4645d4c8 5ce3ee0d
Nov 03, 18:13:25 Debug IKE 00001499 09b64eed 937c6573 de52ace9 52fa6b0d 0000147d 9419a653 10ca6f2c
Nov 03, 18:13:25 Debug IKE 179d9215 529d560d 000014cd 60464335 df21f87c fdb2fc68 b6a4480d 00001490
Nov 03, 18:13:25 Debug IKE cb80913e bb696e08 6381b5ec 427b1f0d 00001416 f6ca16e4 a4066d83 821a0f0a
Nov 03, 18:13:25 Debug IKE eaa8620d 00001444 85152d18 b6bbcd0b e8a84695 79ddcc00 000014af cad71368
Nov 03, 18:13:25 Debug IKE a1f1c96b 8696fc77 570100
Nov 03, 18:13:25 Debug IKE resend phase1 packet 54b6eb5866f144a1:0000000000000000
Nov 03, 18:13:26 Info APP Initiated connection VPN_Firma
Nov 03, 18:13:26 Debug IKE get pfkey ACQUIRE message
Nov 03, 18:13:26 Debug IKE 02060003 24000000 06000000 00000000 03000500 ff200000 10020000 c0a80226
Nov 03, 18:13:26 Debug IKE 00000000 00000000 03000600 ff200000 10020000 55b3c189 00000000 00000000
Nov 03, 18:13:26 Debug IKE 1c000d00 20000000 00030000 00000000 00010008 00000000 01000000 01000000
Nov 03, 18:13:26 Debug IKE 00000000 00000000 00000000 00000000 00000000 00000000 80510100 00000000
Nov 03, 18:13:26 Debug IKE 80700000 00000000 00000000 00000000 00040000 00000000 0001c001 00000000
Nov 03, 18:13:26 Debug IKE 01000000 01000000 00000000 00000000 00000000 00000000 00000000 00000000
Nov 03, 18:13:26 Debug IKE 80510100 00000000 80700000 00000000 00000000 00000000 000c0000 00000000
Nov 03, 18:13:26 Debug IKE 00010001 00000000 01000000 01000000 00000000 00000000 00000000 00000000
Nov 03, 18:13:26 Debug IKE 00000000 00000000 80510100 00000000 80700000 00000000 00000000 00000000
Nov 03, 18:13:26 Error IKE inappropriate sadb acquire message passed.
Nov 03, 18:13:26 Debug IKE get pfkey ACQUIRE message
Nov 03, 18:13:26 Debug IKE 02060003 14000000 11000000 5e000000 03000500 ff200000 10020000 c0a80226
Nov 03, 18:13:26 Debug IKE 00000000 00000000 03000600 ff200000 10020000 55b3c189 00000000 00000000
Nov 03, 18:13:26 Debug IKE 0a000d00 20000000 000c0000 00000000 00010001 00000000 01000000 01000000
Nov 03, 18:13:26 Debug IKE 00000000 00000000 00000000 00000000 00000000 00000000 80510100 00000000
Nov 03, 18:13:26 Debug IKE 80700000 00000000 00000000 00000000 02001200 02000200 07000000 00000000
Nov 03, 18:13:26 Debug IKE suitable outbound SP found: 192.168.2.38/32[0] 192.168.1.0/24[0] proto=any dir=out.
Nov 03, 18:13:26 Debug IKE sub:0xbffff67c: 192.168.1.0/24[0] 192.168.2.38/32[0] proto=any dir=in
Nov 03, 18:13:26 Debug IKE db :0x108ca8: 192.168.1.0/24[0] 192.168.2.38/32[0] proto=any dir=in
Nov 03, 18:13:26 Debug IKE suitable inbound SP found: 192.168.1.0/24[0] 192.168.2.38/32[0] proto=any dir=in.
Nov 03, 18:13:26 Debug IKE new acquire 192.168.2.38/32[0] 192.168.1.0/24[0] proto=any dir=out
Nov 03, 18:13:26 Debug IKE (proto_id=ESP spisize=4 spi=00000000 spi_p=00000000 encmode=Tunnel reqid=18:17)
Nov 03, 18:13:26 Debug IKE (trns_id=AES encklen=128 authtype=hmac-md5)
Nov 03, 18:13:26 Debug IKE in post_acquire
Nov 03, 18:13:26 Debug IKE configuration found for remote_ip.
Nov 03, 18:13:26 Info IKE request for establishing IPsec-SA was queued due to no phase1 found.
Nov 03, 18:13:28 Error IKE phase2 negotiation failed due to time up waiting for phase1. ESP remote_ip[500]->192.168.2.38[500]
Nov 03, 18:13:28 Info IKE delete phase 2 handler.
Nov 03, 18:13:30 Debug IKE 523 bytes from 192.168.2.38[500] to remote_ip[500]
Nov 03, 18:13:30 Debug IKE sockname 192.168.2.38[500]
Nov 03, 18:13:30 Debug IKE send packet from 192.168.2.38[500]
Nov 03, 18:13:30 Debug IKE send packet to remote_ip[500]
Nov 03, 18:13:30 Debug IKE 1 times of 523 bytes message will be sent to remote_ip[500]
Nov 03, 18:13:30 Debug IKE 54b6eb58 66f144a1 00000000 00000000 01100400 00000000 0000020b 04000038
Nov 03, 18:13:30 Debug IKE 00000001 00000001 0000002c 01010001 00000024 01010000 800b0001 800c7080
Nov 03, 18:13:30 Debug IKE 80010007 800e0080 80030001 80020001 80040002 0a000084 e7416d57 ca8c6dc7
Nov 03, 18:13:30 Debug IKE 327fc22e fc57f923 73dc47c7 3dee6ef9 0e97367e c77039bc c6456481 3b4c39df
Nov 03, 18:13:30 Debug IKE 3298364f 0a7cf5f6 ce077320 9fb29d55 c547e9d1 0e6d74bb 323df930 8e8482f5
Nov 03, 18:13:30 Debug IKE 681f8b4b c0080073 9890f5a7 b0dd5e47 c7946d8d f2d71e94 f87f3a20 4045694f
Nov 03, 18:13:30 Debug IKE 53991f1e 8bf3678a b1808697 76a9ecfc b03838a6 9a19c509 05000014 ec4eed77
Nov 03, 18:13:30 Debug IKE 13f46486 be9afac7 bb68d63a 0d000017 03000000 70626f6f 6b40636f 636f6e2e
Nov 03, 18:13:30 Debug IKE 696e740d 00001840 48b7d56e bce88525 e7de7f00 d6c2d380 0000000d 0000144a
Nov 03, 18:13:30 Debug IKE 131c8107 0358455c 5728f20e 95452f0d 0000148f 8d83826d 246b6fc7 a8a6a428
Nov 03, 18:13:30 Debug IKE c11de80d 00001443 9b59f8ba 676c4c77 37ae22ea b8f5820d 0000144d 1e0e136d
Nov 03, 18:13:30 Debug IKE eafa34c4 f3ea9f02 ec72850d 00001480 d0bb3def 54565ee8 4645d4c8 5ce3ee0d
Nov 03, 18:13:30 Debug IKE 00001499 09b64eed 937c6573 de52ace9 52fa6b0d 0000147d 9419a653 10ca6f2c
Nov 03, 18:13:30 Debug IKE 179d9215 529d560d 000014cd 60464335 df21f87c fdb2fc68 b6a4480d 00001490
Nov 03, 18:13:30 Debug IKE cb80913e bb696e08 6381b5ec 427b1f0d 00001416 f6ca16e4 a4066d83 821a0f0a
Nov 03, 18:13:30 Debug IKE eaa8620d 00001444 85152d18 b6bbcd0b e8a84695 79ddcc00 000014af cad71368
Nov 03, 18:13:30 Debug IKE a1f1c96b 8696fc77 570100
Nov 03, 18:13:30 Debug IKE resend phase1 packet 54b6eb5866f144a1:0000000000000000
Nov 03, 18:13:33 Info APP Initiated connection VPN_Firma
Nov 03, 18:13:33 Debug IKE get pfkey ACQUIRE message
Nov 03, 18:13:33 Debug IKE 02060003 14000000 12000000 5e000000 03000500 ff200000 10020000 c0a80226
Nov 03, 18:13:33 Debug IKE 00000000 00000000 03000600 ff200000 10020000 55b3c189 00000000 00000000
Nov 03, 18:13:33 Debug IKE 0a000d00 20000000 000c0000 00000000 00010001 00000000 01000000 01000000
Nov 03, 18:13:33 Debug IKE 00000000 00000000 00000000 00000000 00000000 00000000 80510100 00000000
Nov 03, 18:13:33 Debug IKE 80700000 00000000 00000000 00000000 02001200 02000200 07000000 00000000
Nov 03, 18:13:33 Debug IKE suitable outbound SP found: 192.168.2.38/32[0] 192.168.1.0/24[0] proto=any dir=out.
Nov 03, 18:13:33 Debug IKE sub:0xbffff67c: 192.168.1.0/24[0] 192.168.2.38/32[0] proto=any dir=in
Nov 03, 18:13:33 Debug IKE db :0x108ca8: 192.168.1.0/24[0] 192.168.2.38/32[0] proto=any dir=in
Nov 03, 18:13:33 Debug IKE suitable inbound SP found: 192.168.1.0/24[0] 192.168.2.38/32[0] proto=any dir=in.
Nov 03, 18:13:33 Debug IKE new acquire 192.168.2.38/32[0] 192.168.1.0/24[0] proto=any dir=out
Nov 03, 18:13:33 Debug IKE (proto_id=ESP spisize=4 spi=00000000 spi_p=00000000 encmode=Tunnel reqid=18:17)
Nov 03, 18:13:33 Debug IKE (trns_id=AES encklen=128 authtype=hmac-md5)
Nov 03, 18:13:33 Debug IKE in post_acquire
Nov 03, 18:13:33 Debug IKE configuration found for remote_ip.
Nov 03, 18:13:33 Info IKE request for establishing IPsec-SA was queued due to no phase1 found.
Nov 03, 18:13:35 Error IKE phase1 negotiation failed due to time up. 54b6eb5866f144a1:0000000000000000
Nov 03, 18:13:35 Error IKE phase2 negotiation failed due to time up waiting for phase1. ESP remote_ip[500]->192.168.2.38[500]
Nov 03, 18:13:35 Info IKE delete phase 2 handler.
Nov 03, 18:13:38 Warning APP Connection VPN_Firma timed out
Nov 03, 18:13:38 Warning APP Giving up
Nov 03, 18:13:38 Info IKE Flushing all SAs for peer remote_ip
Nov 03, 18:13:38 Debug APP Received SADB message type X_SPDDELETE - not interesting
Nov 03, 18:13:38 Debug APP Received SADB message type X_SPDDELETE - not interesting
Nov 03, 18:13:38 Debug IKE get pfkey X_SPDDELETE message
Nov 03, 18:13:38 Debug IKE 020f0000 0f000000 00000000 5e000000 07001200 02000200 07000000 00000000
Nov 03, 18:13:38 Debug IKE 28003200 02031300 10020000 c0a80226 00000000 00000000 10020000 55b3c189
Nov 03, 18:13:38 Debug IKE 00000000 00000000 03000500 ff200000 10020000 c0a80226 00000000 00000000
Nov 03, 18:13:38 Debug IKE 03000600 ff180000 10020000 c0a80100 00000000 00000000
Nov 03, 18:13:38 Debug IKE sub:0xbffff6a4: 192.168.2.38/32[0] 192.168.1.0/24[0] proto=any dir=out
Nov 03, 18:13:38 Debug IKE db :0x108ca8: 192.168.1.0/24[0] 192.168.2.38/32[0] proto=any dir=in
Nov 03, 18:13:38 Debug IKE sub:0xbffff6a4: 192.168.2.38/32[0] 192.168.1.0/24[0] proto=any dir=out
Nov 03, 18:13:38 Debug IKE db :0x108ee8: 192.168.2.38/32[0] 192.168.1.0/24[0] proto=any dir=out
Nov 03, 18:13:38 Debug IKE get pfkey X_SPDDELETE message
Nov 03, 18:13:38 Debug IKE 020f0000 0f000000 00000000 5e000000 07001200 02000100 08000000 00000000
Nov 03, 18:13:38 Debug IKE 28003200 02031400 10020000 55b3c189 00000000 00000000 10020000 c0a80226
Nov 03, 18:13:38 Debug IKE 00000000 00000000 03000500 ff180000 10020000 c0a80100 00000000 00000000
Nov 03, 18:13:38 Debug IKE 03000600 ff200000 10020000 c0a80226 00000000 00000000
Nov 03, 18:13:38 Debug IKE sub:0xbffff6a4: 192.168.1.0/24[0] 192.168.2.38/32[0] proto=any dir=in
Nov 03, 18:13:38 Debug IKE db :0x108ca8: 192.168.1.0/24[0] 192.168.2.38/32[0] proto=any dir=in
Nov 03, 18:13:42 Error IKE phase2 negotiation failed due to time up waiting for phase1. ESP remote_ip[500]->192.168.2.38[500]
Nov 03, 18:13:42 Info IKE delete phase 2 handler.
Nov 03, 18:13:48 Debug APP State change from RUNNING to STOPPING after event STOP
Nov 03, 18:13:48 Info APP IPSec stopping
Nov 03, 18:13:48 Info IKE caught signal 15
Nov 03, 18:13:48 Debug APP Received SADB message type FLUSH
Nov 03, 18:13:48 Debug APP SA change detected
Nov 03, 18:13:48 Debug IKE get pfkey FLUSH message
Nov 03, 18:13:48 Debug IKE 02090000 02000000 00000000 ca000000
Nov 03, 18:13:48 Debug IKE an undead schedule has been deleted.
Nov 03, 18:13:49 Debug IKE call pfkey_send_dump
Nov 03, 18:13:49 Info IKE racoon shutdown
Nov 03, 18:13:49 Info APP IKE daemon terminated
Nov 03, 18:13:49 Debug APP State change from STOPPING to IDLE after event RECONFIGURE
Nov 03, 18:13:49 Info APP IPSec stopped
Nov 03, 18:13:49 Debug APP Received SADB message type X_SPDFLUSH - not interesting
Nov 03, 18:13:49 Debug APP Received SADB message type FLUSH
Nov 03, 18:13:49 Debug APP SA change detected