ich sitze nun schon seit geraumer Zeit an dem 1781VA (Firmware 9.04.0084). Mein Endziel ist es eine Filiale und 3 Roadwarrior (2x Windows, 1x MacOS [Nativer Client]) per VPN anzubinden.
Ich habe es nun endlich hinbekommen mit dem ShrewSoft VPNClient eine IPSec VPN (PSK) Verbindung zu dem Router aufzubauen. Den Versuch das über den nativen Windowsclient zu machen habe ich mittlerweile komplett aufgegeben.
Für die Einrichtung bin ich nach dieser Anleitung vorgegangen https://www.shrew.net/support/Howto_Lancom. An anderer Stelle habe ich gelesen, dass man wohl trotzdem noch die Firewalleinstellungen im Lancom anpassen müsste, wie die Einstellung nun aussehen sollten ist mir aber leider nicht klar. Um die Einstellungen der FW zu Prüfen habe ich den Artikel VPN Client - access to all destination addresses zur Hilfe genommen.
Der 1781VA hat im Netz die IP 192.168.0.112, mein Client (WIN_VPN) bekommt erfolgreich die vorausgewählte IP 192.168.0.98. (Optimal wäre DHCP, wie das gehen soll ist mir nun aber komplett schleierhaft)
Kann mir hier jemand von euch helfen meinem Roadwarrior Zugang zum lokalen Netz zu geben?
Beste Grüße
Jan
Angehängt habe ich die Ausgaben »show vpn«, »trace + vpn-status« und die Ausgabe des ShrewSoft VPNClients.
Bei Aufgebauter Verbindung gibt »show vpn« folgende Ausgabe, die zumindest für mich eigentlich ganz gut aussieht.
Code: Alles auswählen
> show vpn
# of connections = 2
Connection #1 ikev1 0.0.0.0/0.0.0.0:0 <-> 192.168.0.98/255.255.255.255:0 any
Name: WIN_VPN
Unique Id: ipsec-0-WIN_VPN-pr0-l0-r0
Flags: aggressive-mode
Local Network: IPV4_ADDR_SUBNET(any:0, 0.0.0.0/0.0.0.0)
Local Gateway: IPV4_ADDR(any:0, 0.0.0.0)
Remote Gateway: IPV4_ADDR(any:0, 0.0.0.0)
Remote Network: IPV4_ADDR(any:0, 192.168.0.98/255.255.255.255)
Connection #2 ikev1 0.0.0.0/0.0.0.0:0 <-> 192.168.0.99/255.255.255.255:0 any
Name: APPLE_VPN
Unique Id: ipsec-0-APPLE_VPN-pr0-l0-r0
Flags: aggressive-mode ikecfg
Local Network: IPV4_ADDR_SUBNET(any:0, 0.0.0.0/0.0.0.0)
Local Gateway: IPV4_ADDR(any:0, 0.0.0.0)
Remote Gateway: IPV4_ADDR(any:0, 0.0.0.0)
Remote Network: IPV4_ADDR(any:0, 192.168.0.99/255.255.255.255)
Code: Alles auswählen
attached to key daemon ...
peer configured
iskamp proposal configured
esp proposal configured
client configured
local id configured
remote id configured
pre-shared key configured
bringing up tunnel ...
network device configured
tunnel enabled
Und die komplette Ausgabe für: trace + vpn-status
Code: Alles auswählen
root@Lancom1781VA:/
> trace + vpn-status
VPN-Status ON
[VPN-Status] 2015/01/17 13:11:03,833
IKE info: The remote server 77.20.82.12:59931 (UDP) peer def-aggr-peer id <no_id> negotiated rfc-3706-dead-peer-detection
[VPN-Status] 2015/01/17 13:11:03,833
IKE info: Phase-1 remote proposal 1 for peer def-aggr-peer matched with local proposal 1
[VPN-Status] 2015/01/17 13:11:03,923
IKE info: Phase-1 [responder] for peer WIN_VPN initiator id my.vpn.domain, responder id my.vpn.domain
IKE info: initiator cookie: 0x83abb4a0a3f04524, responder cookie: 0x0d5f2672d6aa187e
IKE info: SA ISAKMP for peer WIN_VPN encryption aes-cbc authentication SHA1
IKE info: life time ( 86400 sec/ 0 kb)
[VPN-Status] 2015/01/17 13:11:03,924
IKE info: Phase-1 SA Rekeying Timeout (Soft-Event) for peer WIN_VPN set to 77760 seconds (Responder)
[VPN-Status] 2015/01/17 13:11:03,924
IKE info: Phase-1 SA Timeout (Hard-Event) for peer WIN_VPN set to 86400 seconds (Responder)
[VPN-Status] 2015/01/17 13:11:03,929
IKE info: NOTIFY received of type INITIAL_CONTACT for peer WIN_VPN
[VPN-Status] 2015/01/17 13:11:03,929
IKE info: Phase-1 [responder] got INITIAL-CONTACT from peer WIN_VPN (77.20.82.12)
[VPN-Status] 2015/01/17 13:11:03,929
IKE info: Phase-1 SA removed: peer WIN_VPN rule WIN_VPN removed
[VPN-Status] 2015/01/17 13:11:03,929
IKE info: IKE-CFG: Received REQUEST message with id 0 from peer WIN_VPN
IKE info: IKE-CFG: Attribute INTERNAL_IP4_ADDRESS len 0 value (none) received
IKE info: IKE-CFG: Attribute INTERNAL_ADDRESS_EXPIRY len 0 value (none) received
IKE info: IKE-CFG: Attribute INTERNAL_IP4_NETMASK len 0 value (none) received
IKE info: IKE-CFG: Attribute INTERNAL_IP4_DNS len 0 value (none) received
IKE info: IKE-CFG: Attribute INTERNAL_IP4_NBNS len 0 value (none) received
IKE info: IKE-CFG: Attribute INTERNAL_IP4_SUBNET len 0 value (none) received
[VPN-Status] 2015/01/17 13:11:03,930
VPN: set local server addresses for WIN_VPN (0.0.0.0)
DNS: 192.168.0.112, 0.0.0.0
NBNS: 192.168.0.112, 0.0.0.0
[VPN-Status] 2015/01/17 13:11:03,929
IKE info: IKE-CFG: Creating REPLY message with id 0 for peer WIN_VPN
IKE info: IKE-CFG: Attribute INTERNAL_IP4_SUBNET len 8 value 0.0.0.0/0.0.0.0 added
IKE info: IKE-CFG: Attribute INTERNAL_IP4_NBNS len 4 value 192.168.0.112 added
IKE info: IKE-CFG: Attribute INTERNAL_IP4_DNS len 4 value 192.168.0.112 added
IKE info: IKE-CFG: Attribute INTERNAL_IP4_NETMASK len 0 skipped
IKE info: IKE-CFG: Attribute INTERNAL_ADDRESS_EXPIRY len 4 value 1200 added
IKE info: IKE-CFG: Attribute INTERNAL_IP4_ADDRESS len 4 value 192.168.0.98 added
IKE info: IKE-CFG: Sending message
[VPN-Status] 2015/01/17 13:11:09,136
IKE info: Phase-2 remote proposal 1 for peer WIN_VPN matched with local proposal 1
[VPN-Status] 2015/01/17 13:11:09,453
IKE info: Phase-2 SA Rekeying Timeout (Soft-Event) for peer WIN_VPN set to 3240 seconds (Responder)
[VPN-Status] 2015/01/17 13:11:09,453
IKE info: Phase-2 SA Timeout (Hard-Event) for peer WIN_VPN set to 3600 seconds (Responder)
[VPN-Status] 2015/01/17 13:11:09,453
IKE info: Phase-2 [responder] done with 2 SAS for peer WIN_VPN rule ipsec-0-WIN_VPN-pr0-l0-r0
IKE info: rule:' ipsec 0.0.0.0/0.0.0.0 <-> 192.168.0.98/255.255.255.255 '
IKE info: SA ESP [0xa929df60] alg AES_CBC keylength 256 +hmac HMAC_SHA outgoing
IKE info: SA ESP [0x3bfc17c5] alg AES_CBC keylength 256 +hmac HMAC_SHA incoming
IKE info: life soft( 3240 sec/0 kb) hard (3600 sec/0 kb)
IKE info: tunnel between src: 192.168.0.112 dst: 77.20.82.12
[VPN-Status] 2015/01/17 13:11:09,454
VPN: WAN state changed to WanCalled for WIN_VPN (77.20.82.12), called by: 009d2774
[VPN-Status] 2015/01/17 13:11:09,454
vpn-maps[21], remote: WIN_VPN, nego, static-name, connected-by-name
[VPN-Status] 2015/01/17 13:11:09,454
VPN: wait for IKE negotiation from WIN_VPN (77.20.82.12)
[VPN-Status] 2015/01/17 13:11:09,454
VPN: WAN state changed to WanProtocol for WIN_VPN (77.20.82.12), called by: 009d2774
[VPN-Status] 2015/01/17 13:11:10,454
VPN: WIN_VPN connected
[VPN-Status] 2015/01/17 13:11:10,454
VPN: WAN state changed to WanConnect for WIN_VPN (77.20.82.12), called by: 009d2774
[VPN-Status] 2015/01/17 13:11:10,454
vpn-maps[21], remote: WIN_VPN, connected, static-name, connected-by-name