ich möchte im ersten Schritt einen VPN-Tunnel mit Extranet Adressen einrichten, um danach einen PPTP-Tunnel hindurchzulegen und es später mit weiteren IPSec+PPTP Tunneln zu einem Load-Balancing aufzubauen. Sobald ich den funktionierenden IPSec Tunnel auf Extranet Adressen umstelle, kommt der Tunnel nicht mehr zu Stande und ich hoffe, es hat noch jemand einen Tipp für mich. Ich habe schon aufmerksam im Forum hier gelesen, aber bisher hat nichts geholfen. Irgendwas mache ich doch noch falsch, aber ich sehe den Wald vor lauter Bäumen nicht mehr. Muss ich in der Firewall noch was freischalten?
Zentrale:
- Lancom 1781EF, LCOS 8.84
- Netz 10.10.0.0/16
- feste öffentliche IP
- Aufbau der Netzbeziehungen unter VPN -> Allgemein auf "immer alle gemeinsam"
Code: Alles auswählen
Peer SH-Time Extranet-Address Remote-Gw Rtg-tag Layer dynamic IKE-Exchange Rule-creation DPD-Inact-Timeout IKE-CFG XAUTH SSL-Encaps. OCSP-Check
-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
FILIALE 9999 0.0.0.0 xxxxxxxxxx.no-ip.biz 0 FILIALE No Main-Mode auto 60 Off Off No No
IP-Address IP-Netmask Rtg-tag Peer-or-IP Distance Masquerade Active Comment
------------------------------------------------------------------------------------------------------------------------------------------------------------
10.1.1.0 255.255.255.0 0 FILIALE 0 No Yes
224.0.0.0 224.0.0.0 0 0.0.0.0 0 No Yes block multicasts: 224-255.x.y.z
255.255.255.255 0.0.0.0 0 INTERNET 0 on Yes
- Lancom 1821n, LCOS 8.82
- Netz 10.1.1.0/24
- dynamische IP, mit no-ip.biz aufgelöst
- Aufbau der Netzbeziehungen unter VPN -> Allgemein auf "immer alle gemeinsam"
Code: Alles auswählen
Peer SH-Time Extranet-Address Remote-Gw Rtg-tag Layer dynamic IKE-Exchange Rule-creation DPD-Inact-Timeout IKE-CFG XAUTH SSL-Encaps. OCSP-Check
-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
VPN-ZENTRALE 9999 0.0.0.0 x31.xxx.xxx.xx2 0 VPN-ZENTRALE No Main-Mode auto 60 Off Off No No
IP-Address IP-Netmask Rtg-tag Peer-or-IP Distance Masquerade Active Comment
------------------------------------------------------------------------------------------------------------------------------------------------------------
10.10.0.0 255.255.0.0 0 VPN-ZENTRALE 0 No Yes
224.0.0.0 224.0.0.0 0 0.0.0.0 0 No Yes
255.255.255.255 0.0.0.0 0 T-CLSURF 0 on Yes
Nun stelle ich es folgendermaßen um:
Code: Alles auswählen
Peer SH-Time Extranet-Address Remote-Gw Rtg-tag Layer dynamic IKE-Exchange Rule-creation DPD-Inact-Timeout IKE-CFG XAUTH SSL-Encaps. OCSP-Check
-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
FILIALE 9999 192.168.22.1 xxxxxxxxxx.no-ip.biz 0 FILIALE No Main-Mode auto 60 Off Off No No
IP-Address IP-Netmask Rtg-tag Peer-or-IP Distance Masquerade Active Comment
------------------------------------------------------------------------------------------------------------------------------------------------------------
192.168.76.1 255.255.255.255 0 FILIALE 0 Yes Yes
224.0.0.0 224.0.0.0 0 0.0.0.0 0 No Yes block multicasts: 224-255.x.y.z
255.255.255.255 0.0.0.0 0 INTERNET 0 on Yes
Peer SH-Time Extranet-Address Remote-Gw Rtg-tag Layer dynamic IKE-Exchange Rule-creation DPD-Inact-Timeout IKE-CFG XAUTH SSL-Encaps. OCSP-Check
-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
VPN-ZENTRALE 9999 192.168.76.1 x31.xxx.xxx.xx2 0 VPN-ZENTRALE No Main-Mode auto 60 Off Off No No
IP-Address IP-Netmask Rtg-tag Peer-or-IP Distance Masquerade Active Comment
------------------------------------------------------------------------------------------------------------------------------------------------------------
192.168.22.1 255.255.255.255 0 VPN-ZENTRALE 0 Yes Yes
224.0.0.0 224.0.0.0 0 0.0.0.0 0 No Yes
255.255.255.255 0.0.0.0 0 T-CLSURF 0 on Yes
Die VPN Rules sehen wie folgt aus:
Code: Alles auswählen
In der Zentrale:
Connection #1 192.168.22.1/255.255.255.255:0 <-> 192.168.76.1/255.255.255.255:0 any
Name: FILIALE
Unique Id: ipsec-0-FILIALE-pr0-l0-r0
Flags: main-mode
Local Network: IPV4_ADDR(any:0, 192.168.22.1/255.255.255.255)
Local Gateway: IPV4_ADDR(any:0, x31.xxx.xxx.xx2)
Remote Gateway: IPV4_ADDR(any:0, 87.xxx.xxx.xx4)
Remote Network: IPV4_ADDR(any:0, 192.168.76.1/255.255.255.255)
In der Filiale:
Connection #1 192.168.76.1/255.255.255.255:0 <-> 192.168.22.1/255.255.255.255:0 any
Name: VPN-ZENTRALE
Unique Id: ipsec-0-VPN-ZENTRALE-pr0-l0-r0
Flags: main-mode
Local Network: IPV4_ADDR(any:0, 192.168.76.1/255.255.255.255)
Local Gateway: IPV4_ADDR(any:0, 87.xxx.xxx.xx4)
Remote Gateway: IPV4_ADDR(any:0, x31.xxx.xxx.xx2)
Remote Network: IPV4_ADDR(any:0, 192.168.22.1/255.255.255.255)
Code: Alles auswählen
[VPN-Status] 2014/05/07 13:37:34,910 Devicetime: 2014/05/07 13:37:33,610
selecting first remote gateway using strategy eFirst for FILIALE
=> CurrIdx=0, IpStr=>heikobernd.no-ip.biz<, IpAddr=87.170.36.114, IpTtl=60s
[VPN-Status] 2014/05/07 13:37:34,910 Devicetime: 2014/05/07 13:37:33,610
VPN: installing ruleset for FILIALE (87.xxx.xxx.xx4)
[VPN-Status] 2014/05/07 13:37:34,910 Devicetime: 2014/05/07 13:37:33,610
VPN: WAN state changed to WanDisconnect for FILIALE (87.xxx.xxx.xx4), called by: 0091af88
[VPN-Status] 2014/05/07 13:37:34,910 Devicetime: 2014/05/07 13:37:33,611
VPN: WAN state changed to WanIdle for FILIALE (87.xxx.xxx.xx4), called by: 0091af88
[VPN-Status] 2014/05/07 13:37:34,910 Devicetime: 2014/05/07 13:37:33,611
VPN: FILIALE (87.xxx.xxx.xx4) disconnected
[VPN-Status] 2014/05/07 13:37:36,018 Devicetime: 2014/05/07 13:37:34,610
VPN: WAN state changed to WanCall for FILIALE (87.xxx.xxx.xx4), called by: 0091af88
[VPN-Status] 2014/05/07 13:37:36,018 Devicetime: 2014/05/07 13:37:34,611
VPN: connecting to FILIALE (87.xxx.xxx.xx4)
[VPN-Status] 2014/05/07 13:37:36,018 Devicetime: 2014/05/07 13:37:34,611
vpn-maps[24], remote: FILIALE, nego, dns-name, static-name, connected-by-name
[VPN-Status] 2014/05/07 13:37:36,018 Devicetime: 2014/05/07 13:37:34,611
vpn-maps[24], remote: FILIALE, nego, dns-name, static-name, connected-by-name
[VPN-Status] 2014/05/07 13:37:36,018 Devicetime: 2014/05/07 13:37:34,629
vpn-maps[24], remote: FILIALE, nego, dns-name, static-name, connected-by-name
[VPN-Status] 2014/05/07 13:37:36,018 Devicetime: 2014/05/07 13:37:34,629
VPN: installing ruleset for FILIALE (87.xxx.xxx.xx4)
[VPN-Status] 2014/05/07 13:37:36,018 Devicetime: 2014/05/07 13:37:34,630
IKE info: Phase-1 negotiation started for peer FILIALE rule isakmp-peer-FILIALE using MAIN mode
[VPN-Status] 2014/05/07 13:37:36,018 Devicetime: 2014/05/07 13:37:34,642
VPN: ruleset installed for FILIALE (87.xxx.xxx.xx4)
[VPN-Status] 2014/05/07 13:37:36,018 Devicetime: 2014/05/07 13:37:34,643
VPN: start IKE negotiation for FILIALE (87.xxx.xxx.xx4)
[VPN-Status] 2014/05/07 13:37:36,018 Devicetime: 2014/05/07 13:37:34,643
VPN: WAN state changed to WanProtocol for FILIALE (87.xxx.xxx.xx4), called by: 0091af88
[VPN-Status] 2014/05/07 13:37:36,018 Devicetime: 2014/05/07 13:37:34,708
IKE info: The remote server 87.xxx.xxx.xx4:500 (UDP) peer FILIALE id <no_id> is Enigmatec IPSEC version 1.5.1
IKE info: The remote peer FILIALE supports NAT-T in draft mode
IKE info: The remote peer FILIALE supports NAT-T in draft mode
IKE info: The remote peer FILIALE supports NAT-T in RFC mode
IKE info: The remote server 87.xxx.xxx.xx4:500 (UDP) peer FILIALE id <no_id> negotiated rfc-3706-dead-peer-detection
[VPN-Status] 2014/05/07 13:37:36,018 Devicetime: 2014/05/07 13:37:34,710
IKE info: Phase-1 remote proposal 1 for peer FILIALE matched with local proposal 1
[VPN-Status] 2014/05/07 13:37:36,236 Devicetime: 2014/05/07 13:37:34,725
IKE info: The remote peer FILIALE supports NAT-T in draft mode
IKE info: The remote peer FILIALE supports NAT-T in draft mode
IKE info: The remote peer FILIALE supports NAT-T in RFC mode
IKE info: The remote server 87.xxx.xxx.xx4:500 (UDP) peer FILIALE id <no_id> is Enigmatec IPSEC version 1.5.1
IKE info: The remote server 87.xxx.xxx.xx4:500 (UDP) peer FILIALE id <no_id> negotiated rfc-3706-dead-peer-detection
[VPN-Status] 2014/05/07 13:37:36,236 Devicetime: 2014/05/07 13:37:34,726
IKE info: Phase-1 remote proposal 1 for peer FILIALE matched with local proposal 1
[VPN-Status] 2014/05/07 13:37:36,751 Devicetime: 2014/05/07 13:37:35,235
IKE info: Phase-1 [responder] got INITIAL-CONTACT from peer FILIALE (87.xxx.xxx.xx4)
[VPN-Status] 2014/05/07 13:37:36,969 Devicetime: 2014/05/07 13:37:35,619
IKE info: Phase-1 [responder] for peer FILIALE between initiator id OU=DBJW,CN=FILIALE,O=DBJW, responder id OU=DBJW,CN=VPN-Zentrale,O=DBJW done
IKE info: initiator cookie: 0x95c52222277335a6, responder cookie: 0xc0fffe0d9d8debc2
IKE info: SA ISAKMP for peer FILIALE encryption aes-cbc authentication SHA1
IKE info: life time ( 108000 sec/ 0 kb)
[VPN-Status] 2014/05/07 13:37:36,969 Devicetime: 2014/05/07 13:37:35,621
IKE info: Phase-1 SA Rekeying Timeout (Soft-Event) for peer FILIALE set to 97200 seconds (Responder)
[VPN-Status] 2014/05/07 13:37:36,969 Devicetime: 2014/05/07 13:37:35,623
IKE info: Phase-1 SA Timeout (Hard-Event) for peer FILIALE set to 108000 seconds (Responder)
[VPN-Status] 2014/05/07 13:37:37,469 Devicetime: 2014/05/07 13:37:35,997
IKE info: Phase-1 [inititiator] got INITIAL-CONTACT from peer FILIALE (87.xxx.xxx.xx4)
[VPN-Status] 2014/05/07 13:37:37,469 Devicetime: 2014/05/07 13:37:35,998
IKE info: Phase-1 SA removed: peer FILIALE rule FILIALE removed
[VPN-Status] 2014/05/07 13:37:37,469 Devicetime: 2014/05/07 13:37:36,001
IKE info: Phase-1 [initiator] for peer FILIALE between initiator id OU=DBJW,CN=VPN-Zentrale,O=DBJW, responder id OU=DBJW,CN=FILIALE,O=DBJW done
IKE info: initiator cookie: 0x984e23f3566f5e5a, responder cookie: 0x4a1e1263f8012880
IKE info: SA ISAKMP for peer FILIALE encryption aes-cbc authentication SHA1
IKE info: life time ( 108000 sec/ 0 kb)
[VPN-Status] 2014/05/07 13:37:37,469 Devicetime: 2014/05/07 13:37:36,003
IKE info: Phase-1 SA Rekeying Timeout (Soft-Event) for peer FILIALE set to 86400 seconds (Initiator)
[VPN-Status] 2014/05/07 13:37:37,469 Devicetime: 2014/05/07 13:37:36,004
IKE info: Phase-1 SA Timeout (Hard-Event) for peer FILIALE set to 108000 seconds (Initiator)
[VPN-Status] 2014/05/07 13:37:37,469 Devicetime: 2014/05/07 13:37:36,156
IKE info: Phase-2 SA Rekeying Timeout (Soft-Event) for peer FILIALE set to 23040 seconds (Initiator)
[VPN-Status] 2014/05/07 13:37:37,469 Devicetime: 2014/05/07 13:37:36,157
IKE info: Phase-2 SA Timeout (Hard-Event) for peer FILIALE set to 28800 seconds (Initiator)
[VPN-Status] 2014/05/07 13:37:37,469 Devicetime: 2014/05/07 13:37:36,158
IKE info: Phase-2 [inititiator] done with 2 SAS for peer FILIALE rule ipsec-0-FILIALE-pr0-l0-r0
IKE info: rule:' ipsec 192.168.22.1/255.255.255.255 <-> 192.168.76.1/255.255.255.255 '
IKE info: SA ESP [0x476bfe0c] alg AES keylength 256 +hmac HMAC_SHA outgoing
IKE info: SA ESP [0x1c133a11] alg AES keylength 256 +hmac HMAC_SHA incoming
IKE info: life soft( 23040 sec/1600000 kb) hard (28800 sec/2000000 kb)
IKE info: tunnel between src: x31.xxx.xxx.xx2 dst: 87.xxx.xxx.xx4
[VPN-Status] 2014/05/07 13:38:06,016 Devicetime: 2014/05/07 13:38:04,652
VPN: connection for FILIALE (87.xxx.xxx.xx4) timed out: no response
[VPN-Status] 2014/05/07 13:38:06,016 Devicetime: 2014/05/07 13:38:04,652
VPN: Error: IFC-I-Connection-timeout-IKE-IPSEC (0x1106) for FILIALE (87.xxx.xxx.xx4)
[VPN-Status] 2014/05/07 13:38:06,016 Devicetime: 2014/05/07 13:38:04,652
VPN: disconnecting FILIALE (87.xxx.xxx.xx4)
[VPN-Status] 2014/05/07 13:38:06,016 Devicetime: 2014/05/07 13:38:04,652
VPN: Error: IFC-I-Connection-timeout-IKE-IPSEC (0x1106) for FILIALE (87.xxx.xxx.xx4)
[VPN-Status] 2014/05/07 13:38:06,016 Devicetime: 2014/05/07 13:38:04,667
IKE info: Delete Notification sent for Phase-2 SA ipsec-0-FILIALE-pr0-l0-r0 to peer FILIALE, spi [0x1c133a11]
[VPN-Status] 2014/05/07 13:38:06,016 Devicetime: 2014/05/07 13:38:04,668
IKE info: Phase-2 SA removed: peer FILIALE rule ipsec-0-FILIALE-pr0-l0-r0 removed
IKE info: containing Protocol IPSEC_ESP, with spis [476bfe0c ] [1c133a11 ]
[VPN-Status] 2014/05/07 13:38:06,016 Devicetime: 2014/05/07 13:38:04,678
IKE info: Delete Notification sent for Phase-1 SA to peer FILIALE, cookies [0x984e23f3566f5e5a 0x4a1e1263f8012880]
[VPN-Status] 2014/05/07 13:38:06,016 Devicetime: 2014/05/07 13:38:04,678
IKE info: Phase-1 SA removed: peer FILIALE rule FILIALE removed
[VPN-Status] 2014/05/07 13:38:06,016 Devicetime: 2014/05/07 13:38:04,702
VPN: FILIALE (87.xxx.xxx.xx4) disconnected
[VPN-Status] 2014/05/07 13:38:06,016 Devicetime: 2014/05/07 13:38:04,702
vpn-maps[24], remote: FILIALE, idle, dns-name, static-name
[VPN-Status] 2014/05/07 13:38:06,016 Devicetime: 2014/05/07 13:38:04,710
selecting next remote gateway using strategy eFirst for FILIALE
=> no remote gateway selected