LANCOM VPN Abbrüche - vermutlich DSL Abbrüche
Moderator: Lancom-Systems Moderatoren
LANCOM VPN Abbrüche - vermutlich DSL Abbrüche
Guten Abend liebes Forum,
anscheinend ist mein Wissen in Bezug auf LANCOM Router relativ begrenzt und damit benötige nochmal Ihre Unterstützung, danke schonmal im voraus an alle!
Ausgangslage:
DSL - Fritzbox (192.168.178.X) - LANCOM 1790VA (192.168.25.X (Bridge Mode) - Clients
Die VPN Verbindungen brechen in unregelmäßigen, aber kurze Abständen ab. Im Clientbetrieb ist vorerst kein Problem zu erkennen.
Jedoch erscheint im Log des Routers:
Idx. Zeit Quelle Level Meldung
1 2021-04-26 23:02:56 AUTH Hinweis User TS successfully logged in
2 2021-04-26 23:02:10 AUTH Info User TS logged out
3 2021-04-26 22:59:04 KERN Info xDSL: [1] Set up line to Auto/ISDN
4 2021-04-26 22:58:54 KERN Hinweis [xDSL] link up: 1000 Mbps, full duplex
5 2021-04-26 22:58:51 KERN Hinweis [xDSL] link down
6 2021-04-26 22:58:13 KERN Hinweis [xDSL] link up: 1000 Mbps, full duplex
7 2021-04-26 22:57:58 KERN Hinweis [xDSL] link down
8 2021-04-26 22:57:58 KERN Hinweis xDSL: [1] Booting modem: Linecode change
9 2021-04-26 22:52:58 KERN Info xDSL: [1] Set up line to Auto/POTS
10 2021-04-26 22:52:47 KERN Hinweis [xDSL] link up: 1000 Mbps, full duplex
Client:
26.04.2021 23:02:16 - srcadr=0.0.0.0:9500, dstadr=XXX:443,icookie=b6.66.42.6f.11.7e.cc.91,rcookie=e4.cd.70.e5.5a.98.4d.de,exchange=INFORMATIONAL,msgid=00000017,flags=01
26.04.2021 23:02:16 - ncpadapter: reset_ip4_properties, manual=0
26.04.2021 23:02:16 - Ikev2: ConRef=4,SEND: NOTIFY_MSG_R_U_HERE
26.04.2021 23:02:16 - IPSec: Disconnecting from XXX on channel 1.
26.04.2021 23:02:16 - IPSec: Disconnecting from XXX on channel 1.
26.04.2021 23:02:16 - srcadr=0.0.0.0:9500, dstadr=XXX:443,icookie=b6.66.42.6f.11.7e.cc.91,rcookie=e4.cd.70.e5.5a.98.4d.de,exchange=INFORMATIONAL,msgid=00000018,flags=01
26.04.2021 23:02:16 - recv_tcp: msglen=61
26.04.2021 23:02:16 - Ikev2: ConRef=4,RECV: NOTIFY_MSG_R_U_HERE_ACK
26.04.2021 23:02:16 - recv_tcp: msglen=73
26.04.2021 23:02:16 - osspecific_del_dns: cmdline=netsh interface ipv4 delete dnsservers 6 all validate=no
26.04.2021 23:02:16 - srcadr=0.0.0.0:9500, dstadr=XXX:443,icookie=b6.66.42.6f.11.7e.cc.91,rcookie=e4.cd.70.e5.5a.98.4d.de,exchange=INFORMATIONAL,msgid=00000019,flags=01
26.04.2021 23:02:16 - recv_tcp: msglen=69
26.04.2021 23:02:16 - osspecific_del_dns: cmdline=netsh interface ipv4 delete dnsservers 6 all validate=no
26.04.2021 23:02:17 - osspecific_del_dns: cmdline=netsh interface ipv4 delete dnsservers 6 all validate=no
26.04.2021 23:02:17 - System: Setting NCP virtual adapter linkstatus=0,laststate=1.
26.04.2021 23:02:18 - IPSec: Disconnected from XXX on channel 1.
Ich vermute eine fehlerhafte Konfiguration des DSL-Bridge Modes, wodurch die Verbindung "resettet" wird und die VPN-Verbindung abbricht.
Im Clientbetrieb ist durch die kurze neu Verbindung keine Auswirkung zu spüren.
Dies ist lediglich eine Vermutung, jedoch habe ich die Gültigkeitsdauer des VPN-Zugangs bereits auf die maximale Dauer erhöht.
Entschuldigt nochmal die Störung, ich wünsche einen angenehmen Abend.
anscheinend ist mein Wissen in Bezug auf LANCOM Router relativ begrenzt und damit benötige nochmal Ihre Unterstützung, danke schonmal im voraus an alle!
Ausgangslage:
DSL - Fritzbox (192.168.178.X) - LANCOM 1790VA (192.168.25.X (Bridge Mode) - Clients
Die VPN Verbindungen brechen in unregelmäßigen, aber kurze Abständen ab. Im Clientbetrieb ist vorerst kein Problem zu erkennen.
Jedoch erscheint im Log des Routers:
Idx. Zeit Quelle Level Meldung
1 2021-04-26 23:02:56 AUTH Hinweis User TS successfully logged in
2 2021-04-26 23:02:10 AUTH Info User TS logged out
3 2021-04-26 22:59:04 KERN Info xDSL: [1] Set up line to Auto/ISDN
4 2021-04-26 22:58:54 KERN Hinweis [xDSL] link up: 1000 Mbps, full duplex
5 2021-04-26 22:58:51 KERN Hinweis [xDSL] link down
6 2021-04-26 22:58:13 KERN Hinweis [xDSL] link up: 1000 Mbps, full duplex
7 2021-04-26 22:57:58 KERN Hinweis [xDSL] link down
8 2021-04-26 22:57:58 KERN Hinweis xDSL: [1] Booting modem: Linecode change
9 2021-04-26 22:52:58 KERN Info xDSL: [1] Set up line to Auto/POTS
10 2021-04-26 22:52:47 KERN Hinweis [xDSL] link up: 1000 Mbps, full duplex
Client:
26.04.2021 23:02:16 - srcadr=0.0.0.0:9500, dstadr=XXX:443,icookie=b6.66.42.6f.11.7e.cc.91,rcookie=e4.cd.70.e5.5a.98.4d.de,exchange=INFORMATIONAL,msgid=00000017,flags=01
26.04.2021 23:02:16 - ncpadapter: reset_ip4_properties, manual=0
26.04.2021 23:02:16 - Ikev2: ConRef=4,SEND: NOTIFY_MSG_R_U_HERE
26.04.2021 23:02:16 - IPSec: Disconnecting from XXX on channel 1.
26.04.2021 23:02:16 - IPSec: Disconnecting from XXX on channel 1.
26.04.2021 23:02:16 - srcadr=0.0.0.0:9500, dstadr=XXX:443,icookie=b6.66.42.6f.11.7e.cc.91,rcookie=e4.cd.70.e5.5a.98.4d.de,exchange=INFORMATIONAL,msgid=00000018,flags=01
26.04.2021 23:02:16 - recv_tcp: msglen=61
26.04.2021 23:02:16 - Ikev2: ConRef=4,RECV: NOTIFY_MSG_R_U_HERE_ACK
26.04.2021 23:02:16 - recv_tcp: msglen=73
26.04.2021 23:02:16 - osspecific_del_dns: cmdline=netsh interface ipv4 delete dnsservers 6 all validate=no
26.04.2021 23:02:16 - srcadr=0.0.0.0:9500, dstadr=XXX:443,icookie=b6.66.42.6f.11.7e.cc.91,rcookie=e4.cd.70.e5.5a.98.4d.de,exchange=INFORMATIONAL,msgid=00000019,flags=01
26.04.2021 23:02:16 - recv_tcp: msglen=69
26.04.2021 23:02:16 - osspecific_del_dns: cmdline=netsh interface ipv4 delete dnsservers 6 all validate=no
26.04.2021 23:02:17 - osspecific_del_dns: cmdline=netsh interface ipv4 delete dnsservers 6 all validate=no
26.04.2021 23:02:17 - System: Setting NCP virtual adapter linkstatus=0,laststate=1.
26.04.2021 23:02:18 - IPSec: Disconnected from XXX on channel 1.
Ich vermute eine fehlerhafte Konfiguration des DSL-Bridge Modes, wodurch die Verbindung "resettet" wird und die VPN-Verbindung abbricht.
Im Clientbetrieb ist durch die kurze neu Verbindung keine Auswirkung zu spüren.
Dies ist lediglich eine Vermutung, jedoch habe ich die Gültigkeitsdauer des VPN-Zugangs bereits auf die maximale Dauer erhöht.
Entschuldigt nochmal die Störung, ich wünsche einen angenehmen Abend.
Re: LANCOM VPN Abbrüche - vermutlich DSL Abbrüche
Warum brauchst Du zusätzlich eine Fritzbox und lässt nicht direkt den Lancom die Einwahl machen?
Vielleicht solltest Du konkreter schreiben was Du für einen Anschluss bei welchem Anbieter hast.
Vielleicht solltest Du konkreter schreiben was Du für einen Anschluss bei welchem Anbieter hast.
Re: LANCOM VPN Abbrüche - vermutlich DSL Abbrüche
Die Fritzbox soll als DMZ dienen. Zudem läuft hierüber die Nutzung der privaten Endgeräte.
Es handelt sich um einen 100 Mbit 1&1 DSL Anschluss - leider aktuell ohne feste IP-Adresse aber mit DynDNS über Strato.
Jedoch kann ich den DynDNS eigentlich als Fehlerursache ausschließen, dieser läuft konstant und stabil.
Die Verbindung scheint jedoch stabil zu laufen, hier kann ich keine Auffälligkeiten feststellen.
Ich gehe von einem Verbindungsproblem zwischen Lancom und der Fritzbox aus.
Ich hoffe ich konnte es nun etwas besser beschreiben.
Es handelt sich um einen 100 Mbit 1&1 DSL Anschluss - leider aktuell ohne feste IP-Adresse aber mit DynDNS über Strato.
Jedoch kann ich den DynDNS eigentlich als Fehlerursache ausschließen, dieser läuft konstant und stabil.
Die Verbindung scheint jedoch stabil zu laufen, hier kann ich keine Auffälligkeiten feststellen.
Ich gehe von einem Verbindungsproblem zwischen Lancom und der Fritzbox aus.
Ich hoffe ich konnte es nun etwas besser beschreiben.
Re: LANCOM VPN Abbrüche - vermutlich DSL Abbrüche
Wie ist der Lancom auf der WAN Seite konfiguriert? Internet over Plain Ethernet?
Wenn ich das richtig lese, hat die Fritzbox eine Exposed Host Freigabe. (Ne DMZ ist das ja eigentlich nicht). Hast du dann dem Lancom eine feste IP zugewiesen, damit die Exposed Host Freigabe immer gleich bleibt?
Wenn ich das richtig lese, hat die Fritzbox eine Exposed Host Freigabe. (Ne DMZ ist das ja eigentlich nicht). Hast du dann dem Lancom eine feste IP zugewiesen, damit die Exposed Host Freigabe immer gleich bleibt?
Re: LANCOM VPN Abbrüche - vermutlich DSL Abbrüche
Ich würde dann trotzdem den Lancom die Einwahl machen lassen. Dann machst Du auf dem Lancom ein Gästenetz auf und hängst dort die Fritzbox ran, wenn Du dessen WLAN nutzen möchtest.JJSS hat geschrieben: 27 Apr 2021, 15:14 Die Fritzbox soll als DMZ dienen. Zudem läuft hierüber die Nutzung der privaten Endgeräte.
Re: LANCOM VPN Abbrüche - vermutlich DSL Abbrüche
Dass ist grundsätzlich umsetzbar, jedoch müsste es aus meiner Theorie auch so funktionieren oder? Es hat schon weitere Vorteil, denn im Fall einer Störung wird zeitnah geholfen. Bei Drittanbieterroutern wird ja gerne das Problem abgeschoben.
Am liebsten wäre mir, wenn ich das Problem irgendwie in der Konstellation behoben bekomme.
Liegt es eventuell an der Port 4 Konfiguration (da WAN/LAN).
Wäre super wenn jemand in der gleichen Konstellation unterstützen könnte.
Vielen Dank!
Am liebsten wäre mir, wenn ich das Problem irgendwie in der Konstellation behoben bekomme.
Liegt es eventuell an der Port 4 Konfiguration (da WAN/LAN).
Wäre super wenn jemand in der gleichen Konstellation unterstützen könnte.
Vielen Dank!
Re: LANCOM VPN Abbrüche - vermutlich DSL Abbrüche
Es ist keine Expost Host freigabe eingerichtet, es werden lediglich die für VPN benötigten Ports durchgeroutet.ftm hat geschrieben: 27 Apr 2021, 16:36 Wie ist der Lancom auf der WAN Seite konfiguriert? Internet over Plain Ethernet?
Wenn ich das richtig lese, hat die Fritzbox eine Exposed Host Freigabe. (Ne DMZ ist das ja eigentlich nicht). Hast du dann dem Lancom eine feste IP zugewiesen, damit die Exposed Host Freigabe immer gleich bleibt?
Kann ich irgendwie die Config ala Cisco in txt exportieren? Dann würde ich diesem hier posten.
Anbei zwei Bilder, jedoch weiss ich nicht, ob diese weiterhelfen werden.
Du hast keine ausreichende Berechtigung, um die Dateianhänge dieses Beitrags anzusehen.
Re: LANCOM VPN Abbrüche - vermutlich DSL Abbrüche
Moin JJSS,
wenn du das VDSL-Modem nicht brauchst, dann schalte es ab. Spart Strom und du bekommst nicht alle 5 Minuten eine Meldung im Syslog, daß das Modem gebootet hat.
Ciao, Georg
wenn du das VDSL-Modem nicht brauchst, dann schalte es ab. Spart Strom und du bekommst nicht alle 5 Minuten eine Meldung im Syslog, daß das Modem gebootet hat.
Ciao, Georg
Re: LANCOM VPN Abbrüche - vermutlich DSL Abbrüche
Hallo Georg,
vielen Dank für deine Nachricht.
Kannst du mir eventuell sagen wo ich das mache?
Ist das die Ursache für die Abbrüche?
vielen Dank für deine Nachricht.
Kannst du mir eventuell sagen wo ich das mache?
Ist das die Ursache für die Abbrüche?
Re: LANCOM VPN Abbrüche - vermutlich DSL Abbrüche
Konfiguration - Schnittstellen - Interface-Einstellungen - VDSL-Interface - "Protokoll" auf "Aus".JJSS hat geschrieben: Kannst du mir eventuell sagen wo ich das mache?
Ich denke nicht.JJSS hat geschrieben: Ist das die Ursache für die Abbrüche?
Re: LANCOM VPN Abbrüche - vermutlich DSL Abbrüche
Zumindest ist das die Ursache fuer die von Ihm im ersten Posting dokumentierten Meldungen des xDSL Modem. Dieses wird in seinem Aufbau ja nicht benutzt, ist aber aktiviert und versucht dann die ganze Zeit zu synchronisieren.Dr.Zett hat geschrieben: 29 Apr 2021, 21:46Ich denke nicht.JJSS hat geschrieben: Ist das die Ursache für die Abbrüche?

Dr.House hat geschrieben:Dr. House: Du bist geheilt. Steh auf und wandle.
Patient: Sind Sie geisteskrank?
Dr. House: In der Bibel sagen die Leute schlicht "Ja, Herr" und verfallen dann ins Lobpreisen.
Re: LANCOM VPN Abbrüche - vermutlich DSL Abbrüche
Vielen lieben Dank für die Rückmeldung, ich habe die Option nun deaktiviert und warte auf Feedback.
Kann ich ansonsten das Problem schon Proaktiv schneller analysieren?
Kann ich ansonsten das Problem schon Proaktiv schneller analysieren?
Re: LANCOM VPN Abbrüche - vermutlich DSL Abbrüche
Es war tatsächlich nicht die Ursache, kann ich eventuell irgendwelche Informationen (vollwertige) zur Verfügung stellen und wenn ja wie?
Sorry nochmal
Sorry nochmal

Re: LANCOM VPN Abbrüche - vermutlich DSL Abbrüche
Anbei der vollständige Log seitens des Clients.
Während dem Abbruch war die öffentliche IP durchgehend erreichbar.
Ich hoffe ihr könnt hieraus etwas hilfreiches entnehmen. Danke schonmal.
03.05.2021 22:03:50 - EAP MSCHAP2:send response for userid=<XXX@XXX.com>
03.05.2021 22:03:50 - Ike: ConRef=4, RECV_MSG2_AUTH, name=XXXXXXXX, vpngw=XX.XXX.XXX.XX:443
03.05.2021 22:03:50 - Ikev2: ConRef=4,Received notify messages -
03.05.2021 22:03:50 - IkeV2: ConRef=4,Auth - Receiving EAP payload
03.05.2021 22:03:50 - EAP MSCHAP2:recv success for userid=<XXX@XXX.com>
03.05.2021 22:03:50 - EAP MSCHAP2:send ack for userid=<XXX@XXX.com>
03.05.2021 22:03:50 - Ike: ConRef=4, RECV_MSG2_AUTH, name=XXXXXXXX, vpngw=XX.XXX.XXX.XX:443
03.05.2021 22:03:50 - Ikev2: ConRef=4,Received notify messages -
03.05.2021 22:03:50 - IkeV2: ConRef=4,Auth - Receiving EAP payload
03.05.2021 22:03:50 - Eap: status=0,Method=MSCHAPV2
03.05.2021 22:03:50 - Eap: status success,method=MSCHAPV2
03.05.2021 22:03:50 - Ike: ConRef=4, XMIT_MSG1_AUTH__AFTER_EAP, name=XXXXXXXX, vpngw=XX.XXX.XXX.XX:443
03.05.2021 22:03:50 - Auth: ConRef=4,Local is authenticating with=2,Shared key
03.05.2021 22:03:50 - Ike: ConRef=4, XMIT_MSG1_AUTH__AFTER_EAP_RESUME3, name=XXXXXXXX, vpngw=XX.XXX.XXX.XX:443
03.05.2021 22:03:50 - Ike: ConRef=4, RECV_MSG2_AUTH, name=XXXXXXXX, vpngw=XX.XXX.XXX.XX:443
03.05.2021 22:03:50 - Ikev2: ConRef=4,Received notify messages -
03.05.2021 22:03:50 - Ikev2: Notifymsg=<IKEV2_NOTIFY_INITIAL_CONTACT>
03.05.2021 22:03:50 - Ike: ConRef=4, RECV_MSG2_AUTH_RESUME1, name=XXXXXXXX, vpngw=XX.XXX.XXX.XX:443
03.05.2021 22:03:50 - Auth: ConRef=4,Remote is authenticating with=2,Shared key
03.05.2021 22:03:50 - Ikev2:recv IDR payload:ID_DER_ASN1_DN:pid=0,port=0,3014311230100603
03.05.2021 22:03:50 - IKESA2_CHILD: - ConRef=4, protection suite:
03.05.2021 22:03:50 - PID=3,#ENCR=20,KEYLEN=256,INTEG=0,PRF=0,DHGRP=0,AUTHM=0,CERTON=0
03.05.2021 22:03:50 - INSPIL=4,INSPI=57bbf4c3,OUTSPIL=4,OUTSPI=6c6445da,LifeType=1,LifeSec=31536000,LifeKb=50000
03.05.2021 22:03:50 - Ikev2 Child: ConRef=4,recv TSI=192.168.25.205-192.168.25.205
03.05.2021 22:03:50 - Ikev2 Child: ConRef=4,recv TSR=192.168.25.0-192.168.25.255
03.05.2021 22:03:50 - IkeV2: ConRef=4,Auth-Turning on DPD mode
03.05.2021 22:03:50 - IPSec: Quick Mode is Ready: IkeIndex=4,VpnSrcPort=9500
03.05.2021 22:03:50 - IPSec: Assigned IP Address:IPv4=192.168.25.205,IPv6=0.0.0.0
03.05.2021 22:03:50 - IPSec: Assigned IP Network Mask:IPv4=0.0.0.0,IPv6=0.0.0.0
03.05.2021 22:03:50 - IPSec: Gateway IP Address:IPv4=0.0.0.0,IPv6=0.0.0.0
03.05.2021 22:03:50 - IPSec: Primary DNS Server: 192.168.25.1
03.05.2021 22:03:50 - IPSec: Secondary DNS Server: 192.168.25.1
03.05.2021 22:03:50 - IPSec: Primary WINS Server: 0.0.0.0
03.05.2021 22:03:50 - IPSec: Secondary WINS Server: 0.0.0.0
03.05.2021 22:03:50 - IPSec: Primary NCP SEM Server: 0.0.0.0
03.05.2021 22:03:50 - IPSec: Secondary NCP SEM Server: 0.0.0.0
03.05.2021 22:03:50 - IPSec: Primary DNS6 Server: 0.0.0.0
03.05.2021 22:03:50 - IPSec: Secondary DNS6 Server: 0.0.0.0
03.05.2021 22:03:50 - IPSec: Primary NCP SEM6 Server: 0.0.0.0
03.05.2021 22:03:50 - IPSec: Secondary NCP SEM6 Server: 0.0.0.0
03.05.2021 22:03:50 - IPSec: Conref=4, Created an IPSEC SA with the following characteristics
03.05.2021 22:03:50 - Gateway=XX.XXX.XXX.XX,NatdMode=0,Roamingcon=0
03.05.2021 22:03:50 - srcranges=[192.168.25.205:0-192.168.25.205:65535],
03.05.2021 22:03:50 - dstranges=[192.168.25.0:0-192.168.25.255:65535],
03.05.2021 22:03:50 - IPSec:ConRef=4 connected: Effective ESP LifeDuration in Seconds = 22075200,Effective IKE lifetime=22075200
03.05.2021 22:03:50 - IPSec: Connected to XXXXXXXX on channel 1.
03.05.2021 22:03:50 - ncpadapter: set IP adapter properties
03.05.2021 22:03:50 - ncpadapter: set ipv4 properties,ip4adr=192.168.25.205,ip4selneg=1
03.05.2021 22:03:50 - ncpadapter: set_ip4_properties, manual=0
03.05.2021 22:03:50 - System: Setting NCP virtual adapter linkstatus=1,laststate=0.
03.05.2021 22:03:50 - System: Setting NCP virtual adapter linkstatus=1,laststate=1.
03.05.2021 22:03:50 - PPP(Ipcp): connected to XXXXXXXX with IP Address: 192.168.25.205
03.05.2021 22:03:50 - SUCCESS: IpSec connection ready
03.05.2021 22:03:50 - ipdhcp: xmit response,f_param.yiaddr=192.168.25.205
03.05.2021 22:03:50 - ipdhcp: xmit response,f_param.yiaddr=192.168.25.205
03.05.2021 22:03:50 - Link: dhcp ack sent
03.05.2021 22:03:51 - DhcpV6: received MSG_CONFIRM, adapterstate=2
03.05.2021 22:03:52 - INFO - MONITOR: Connected -> XXXXXXXX
03.05.2021 22:03:52 - INFO - MONITOR: Media=Automatic, Tx=68 Byte, Rx=127 Byte
03.05.2021 22:03:52 - DhcpV6: received MSG_CONFIRM, adapterstate=2
03.05.2021 22:03:52 - Link: iphlp_renew_done
03.05.2021 22:03:52 - SUCCESS: Link -> <XXXXXXXX> IP address assigned to IP stack - link is operational.
03.05.2021 22:03:52 - osspecific_add_dns: cmdline=netsh interface ipv4 add dnsservers 11 192.168.25.1 validate=no
03.05.2021 22:03:53 - osspecific_add_dns: cmdline=netsh interface ipv4 add dnsservers 11 192.168.25.1 validate=no
03.05.2021 22:03:54 - DhcpV6: received MSG_CONFIRM, adapterstate=2
03.05.2021 22:03:58 - DhcpV6: received MSG_SOLICIT, adapterstate=2
03.05.2021 22:03:59 - DhcpV6: received MSG_REQUEST, adapterstate=2
03.05.2021 22:23:45 - INFO - MONITOR: Disconnected
03.05.2021 22:23:45 - INFO - MONITOR: Media=Automatic, Tx=2189611 Byte, Rx=8676672 Byte
03.05.2021 22:23:45 - ncpadapter: reset IP adapter properties
03.05.2021 22:23:45 - ncpadapter: reset ipv4 properties,ip4adr=192.168.25.205
03.05.2021 22:23:45 - ncpadapter: reset_ip4_properties, manual=0
03.05.2021 22:23:45 - IPSec: Disconnecting from XXXXXXXX on channel 1.
03.05.2021 22:23:45 - IPSec: Disconnecting from XXXXXXXX on channel 1.
03.05.2021 22:23:45 - System: Setting NCP virtual adapter linkstatus=0,laststate=1.
03.05.2021 22:23:45 - ncpadapter: reset IP adapter properties
03.05.2021 22:23:45 - ncpadapter: reset ipv4 properties,ip4adr=0.0.0.0
03.05.2021 22:23:45 - ncpadapter: reset_ip4_properties, manual=0
03.05.2021 22:23:45 - Ike: ConRef=4, RECV_MSG1_CHILD, name=XXXXXXXX, vpngw=XX.XXX.XXX.XX:443
03.05.2021 22:23:45 - Ikev2: ConRef=4,Received notify messages -
03.05.2021 22:23:45 - Ikev2 Child: ConRef=4,recv TSI=0.0.0.0-255.255.255.255
03.05.2021 22:23:45 - Ikev2 Child: ConRef=4,recv TSR=192.168.25.205-192.168.25.205
03.05.2021 22:23:45 - Ike: ConRef=4, XMIT_MSG2_CHILD, name=XXXXXXXX, vpngw=XX.XXX.XXX.XX:443
03.05.2021 22:23:45 - Ikev2 Child: ConRef=4,send response TSI=0.0.0.0-255.255.255.255
03.05.2021 22:23:45 - Ikev2 Child: ConRef=4,send response tsr=192.168.25.205-192.168.25.205
03.05.2021 22:23:45 - osspecific_del_dns: cmdline=netsh interface ipv4 delete dnsservers 11 all validate=no
03.05.2021 22:23:45 - osspecific_del_dns: cmdline=netsh interface ipv4 delete dnsservers 11 all validate=no
03.05.2021 22:23:56 - System: DNSHandling=0
03.05.2021 22:23:56 - IPSec: Start building connection
03.05.2021 22:23:56 - IpsDial: Generate available provider links - media available is = 2200
03.05.2021 22:23:56 - IpsDial: Created the following list of provider links:
03.05.2021 22:23:56 - IPSec: DNSREQ: resolving GW=<XXX.de> over lan:
03.05.2021 22:23:56 - IPSec: DNSREQ resolved vpn ipadr=XX.XXX.XXX.XX,ipadr6=0.0.0.0
03.05.2021 22:23:56 - ipsdial: resolved at least one remote tunnel endpoint.
03.05.2021 22:23:56 - IpsDial: connection time interface choice,LocIpa=192.168.21.103,AdapterIndex=200
03.05.2021 22:23:56 - Ikev2: Opening connection in PATHFINDER mode : XXXXXXXX
03.05.2021 22:23:56 - Ikev2: Outgoing connect request IKEv2 mode - gateway=XX.XXX.XXX.XX : XXXXXXXX
03.05.2021 22:23:56 - Ikev2: ConRef=5, XMIT_MSG1_INIT, name=XXXXXXXX, vpngw=XX.XXX.XXX.XX:500
03.05.2021 22:24:00 - Isakmp: re-sending packet to=XX.XXX.XXX.XX:500,size=1060
03.05.2021 22:24:04 - IKEv2(INIT): Switching to TCP ENCAPSULATION in PATHFINDER_1 : XXXXXXXX
03.05.2021 22:24:04 - Ike: Opening PATHFINDER1 connection: XXXXXXXX
03.05.2021 22:24:04 - Ikev2: Pathfinder-Outgoing connect request : XXXXXXXX
03.05.2021 22:24:04 - Ikev2: ConRef=5, XMIT_MSG1_INIT, name=XXXXXXXX, vpngw=XX.XXX.XXX.XX:443
03.05.2021 22:24:04 - TcpConnectionBase: connect_request, locadr=0.0.0.0:9500, remadr=XX.XXX.XXX.XX:443
03.05.2021 22:24:04 - Ikev2: ConRef=5, RECV_MSG2_INIT, adapterindex=0,name=XXXXXXXX, remote ip:port=XX.XXX.XXX.XX:443,local ip:port=0.0.0.0:9500
03.05.2021 22:24:04 - Ikev2: ConRef=5,Received notify messages -
03.05.2021 22:24:04 - Ikev2: Notifymsg=<IKEV2_FRAGMENTATION_SUPPORTED>
03.05.2021 22:24:04 - Ike: Turning on IKE fragment mode - XXXXXXXX
03.05.2021 22:24:04 - IPSec: Final Tunnel EndPoint is=XX.XXX.XXX.XX
03.05.2021 22:24:04 - Ikev2: RECV_MSG2_INIT - ConRef=5, Remote supports IKEv2 fragmentation
03.05.2021 22:24:04 - IKESA2_INIT: - ConRef=5, protection suite:
03.05.2021 22:24:04 - PID=1,#ENCR=20,KEYLEN=256,INTEG=0,PRF=5,DHGRP=14,AUTHM=0,CERTON=0
03.05.2021 22:24:04 - INSPIL=0,INSPI=00000000,OUTSPIL=0,OUTSPI=00000000,LifeType=1,LifeSec=31536000,LifeKb=0
03.05.2021 22:24:04 - Ike: ConRef=5, XMIT_MSG1_AUTH, name=XXXXXXXX, vpngw=XX.XXX.XXX.XX:443
03.05.2021 22:24:04 - Ike: ConRef=5, XMIT_MSG1_AUTH_BEFORE_EAP0, name=XXXXXXXX, vpngw=XX.XXX.XXX.XX:443
03.05.2021 22:24:04 - Ike: ConRef=5, XMIT_MSG1_AUTH_RESUME0, name=XXXXXXXX, vpngw=XX.XXX.XXX.XX:443
03.05.2021 22:24:04 - Auth: ConRef=5, no local ID configured --> using a default
03.05.2021 22:24:04 - Ikev2:send idi payload:ID_IPV4_ADDR:pid=0,port=0,192.168.254.2
03.05.2021 22:24:04 - Ike: ConRef=5, XMIT_MSG1_AUTH_RESUME1, name=XXXXXXXX, vpngw=XX.XXX.XXX.XX:443
03.05.2021 22:24:04 - Ikev2 Child: ConRef=5,send request TSI=0.0.0.0-255.255.255.255
03.05.2021 22:24:04 - Ikev2 Child: ConRef=5,send request TSR=192.168.25.0-192.168.25.255
03.05.2021 22:24:04 - IkeV2: ConRef=5,Auth - initiating an EAP session
03.05.2021 22:24:04 - IPSec: Phase1 is Ready,AdapterIndex=200,IkeIndex=5,LocTepIpAdr=192.168.21.103,AltRekey=1
03.05.2021 22:24:05 - Ike: ConRef=5, RECV_MSG2_AUTH, name=XXXXXXXX, vpngw=XX.XXX.XXX.XX:443
03.05.2021 22:24:05 - Ikev2: ConRef=5,Received notify messages -
03.05.2021 22:24:05 - Ikev2: ConRef=5, Received 1 certificates.
03.05.2021 22:24:05 - Auth: ConRef=5, PKI response with errorcode=0.
03.05.2021 22:24:05 - Ike: ConRef=5, RECV_MSG2_AUTH_RESUME1, name=XXXXXXXX, vpngw=XX.XXX.XXX.XX:443
03.05.2021 22:24:05 - Auth: ConRef=5,Remote is authenticating with=1,RSA
03.05.2021 22:24:05 - IkeV2: ConRef=5,Auth - Receiving EAP payload
03.05.2021 22:24:05 - EAP: recv identity request,User=<XXX@XXX.com>
03.05.2021 22:24:05 - EAP: sending identity response,User=<XXX@XXX.com>
03.05.2021 22:24:05 - Ike: ConRef=5, RECV_MSG2_AUTH, name=XXXXXXXX, vpngw=XX.XXX.XXX.XX:443
03.05.2021 22:24:05 - Ikev2: ConRef=5,Received notify messages -
03.05.2021 22:24:05 - IkeV2: ConRef=5,Auth - Receiving EAP payload
03.05.2021 22:24:05 - EAP MSCHAP2:recv challenge for userid=<XXX@XXX.com>
03.05.2021 22:24:05 - EAP MSCHAP2:send response for userid=<XXX@XXX.com>
03.05.2021 22:24:05 - Ike: ConRef=5, RECV_MSG2_AUTH, name=XXXXXXXX, vpngw=XX.XXX.XXX.XX:443
03.05.2021 22:24:05 - Ikev2: ConRef=5,Received notify messages -
03.05.2021 22:24:05 - IkeV2: ConRef=5,Auth - Receiving EAP payload
03.05.2021 22:24:05 - EAP MSCHAP2:recv success for userid=<XXX@XXX.com>
03.05.2021 22:24:05 - EAP MSCHAP2:send ack for userid=<XXX@XXX.com>
03.05.2021 22:24:05 - Ike: ConRef=5, RECV_MSG2_AUTH, name=XXXXXXXX, vpngw=XX.XXX.XXX.XX:443
03.05.2021 22:24:05 - Ikev2: ConRef=5,Received notify messages -
03.05.2021 22:24:05 - IkeV2: ConRef=5,Auth - Receiving EAP payload
03.05.2021 22:24:05 - Eap: status=0,Method=MSCHAPV2
03.05.2021 22:24:05 - Eap: status success,method=MSCHAPV2
03.05.2021 22:24:05 - Ike: ConRef=5, XMIT_MSG1_AUTH__AFTER_EAP, name=XXXXXXXX, vpngw=XX.XXX.XXX.XX:443
03.05.2021 22:24:05 - Auth: ConRef=5,Local is authenticating with=2,Shared key
03.05.2021 22:24:05 - Ike: ConRef=5, XMIT_MSG1_AUTH__AFTER_EAP_RESUME3, name=XXXXXXXX, vpngw=XX.XXX.XXX.XX:443
03.05.2021 22:24:05 - Ike: ConRef=5, RECV_MSG2_AUTH, name=XXXXXXXX, vpngw=XX.XXX.XXX.XX:443
03.05.2021 22:24:05 - Ikev2: ConRef=5,Received notify messages -
03.05.2021 22:24:05 - Ikev2: Notifymsg=<IKEV2_NOTIFY_INITIAL_CONTACT>
03.05.2021 22:24:05 - Ike: ConRef=5, RECV_MSG2_AUTH_RESUME1, name=XXXXXXXX, vpngw=XX.XXX.XXX.XX:443
03.05.2021 22:24:05 - Auth: ConRef=5,Remote is authenticating with=2,Shared key
03.05.2021 22:24:05 - Ikev2:recv IDR payload:ID_DER_ASN1_DN:pid=0,port=0,3014311230100603
03.05.2021 22:24:05 - IKESA2_CHILD: - ConRef=5, protection suite:
03.05.2021 22:24:05 - PID=3,#ENCR=20,KEYLEN=256,INTEG=0,PRF=0,DHGRP=0,AUTHM=0,CERTON=0
03.05.2021 22:24:05 - INSPIL=4,INSPI=0e8cd20e,OUTSPIL=4,OUTSPI=18d343a5,LifeType=1,LifeSec=31536000,LifeKb=50000
03.05.2021 22:24:05 - Ikev2 Child: ConRef=5,recv TSI=192.168.25.205-192.168.25.205
03.05.2021 22:24:05 - Ikev2 Child: ConRef=5,recv TSR=192.168.25.0-192.168.25.255
03.05.2021 22:24:05 - IkeV2: ConRef=5,Auth-Turning on DPD mode
03.05.2021 22:24:05 - IPSec: Quick Mode is Ready: IkeIndex=5,VpnSrcPort=9500
03.05.2021 22:24:05 - IPSec: Assigned IP Address:IPv4=192.168.25.205,IPv6=0.0.0.0
03.05.2021 22:24:05 - IPSec: Assigned IP Network Mask:IPv4=0.0.0.0,IPv6=0.0.0.0
03.05.2021 22:24:05 - IPSec: Gateway IP Address:IPv4=0.0.0.0,IPv6=0.0.0.0
03.05.2021 22:24:05 - IPSec: Primary DNS Server: 192.168.25.1
03.05.2021 22:24:05 - IPSec: Secondary DNS Server: 192.168.25.1
03.05.2021 22:24:05 - IPSec: Primary WINS Server: 0.0.0.0
03.05.2021 22:24:05 - IPSec: Secondary WINS Server: 0.0.0.0
03.05.2021 22:24:05 - IPSec: Primary NCP SEM Server: 0.0.0.0
03.05.2021 22:24:05 - IPSec: Secondary NCP SEM Server: 0.0.0.0
03.05.2021 22:24:05 - IPSec: Primary DNS6 Server: 0.0.0.0
03.05.2021 22:24:05 - IPSec: Secondary DNS6 Server: 0.0.0.0
03.05.2021 22:24:05 - IPSec: Primary NCP SEM6 Server: 0.0.0.0
03.05.2021 22:24:05 - IPSec: Secondary NCP SEM6 Server: 0.0.0.0
03.05.2021 22:24:05 - IPSec: Conref=5, Created an IPSEC SA with the following characteristics
03.05.2021 22:24:05 - Gateway=XX.XXX.XXX.XX,NatdMode=0,Roamingcon=0
03.05.2021 22:24:05 - srcranges=[192.168.25.205:0-192.168.25.205:65535],
03.05.2021 22:24:05 - dstranges=[192.168.25.0:0-192.168.25.255:65535],
03.05.2021 22:24:05 - IPSec:ConRef=5 connected: Effective ESP LifeDuration in Seconds = 22075200,Effective IKE lifetime=22075200
03.05.2021 22:24:05 - IPSec: Connected to XXXXXXXX on channel 1.
03.05.2021 22:24:05 - ncpadapter: set IP adapter properties
03.05.2021 22:24:05 - ncpadapter: set ipv4 properties,ip4adr=192.168.25.205,ip4selneg=1
03.05.2021 22:24:05 - ncpadapter: set_ip4_properties, manual=0
03.05.2021 22:24:05 - System: Setting NCP virtual adapter linkstatus=1,laststate=0.
03.05.2021 22:24:05 - System: Setting NCP virtual adapter linkstatus=1,laststate=1.
03.05.2021 22:24:05 - PPP(Ipcp): connected to XXXXXXXX with IP Address: 192.168.25.205
03.05.2021 22:24:05 - SUCCESS: IpSec connection ready
03.05.2021 22:24:05 - ipdhcp: xmit response,f_param.yiaddr=192.168.25.205
03.05.2021 22:24:05 - Link: dhcp ack sent
03.05.2021 22:24:07 - DhcpV6: received MSG_CONFIRM, adapterstate=2
03.05.2021 22:24:08 - DhcpV6: received MSG_CONFIRM, adapterstate=2
03.05.2021 22:24:08 - Link: iphlp_renew_done
03.05.2021 22:24:08 - SUCCESS: Link -> <XXXXXXXX> IP address assigned to IP stack - link is operational.
03.05.2021 22:24:08 - osspecific_add_dns: cmdline=netsh interface ipv4 add dnsservers 11 192.168.25.2 validate=no
03.05.2021 22:24:08 - osspecific_add_dns: cmdline=netsh interface ipv4 add dnsservers 11 192.168.25.1 validate=no
03.05.2021 22:24:08 - INFO - MONITOR: Connected -> XXXXXXXX
03.05.2021 22:24:08 - INFO - MONITOR: Media=Automatic, Tx=362 Byte, Rx=380 Byte
03.05.2021 22:24:09 - osspecific_add_dns: cmdline=netsh interface ipv4 add dnsservers 11 192.168.25.1 validate=no
03.05.2021 22:24:10 - DhcpV6: received MSG_CONFIRM, adapterstate=2
03.05.2021 22:24:14 - DhcpV6: received MSG_SOLICIT, adapterstate=2
03.05.2021 22:24:15 - DhcpV6: received MSG_REQUEST, adapterstate=2
03.05.2021 22:24:28 - ncpadapter: reset IP adapter properties
03.05.2021 22:24:28 - ncpadapter: reset ipv4 properties,ip4adr=192.168.25.205
03.05.2021 22:24:28 - ncpadapter: reset_ip4_properties, manual=0
03.05.2021 22:24:28 - IPSec: Disconnecting from XXXXXXXX on channel 1.
03.05.2021 22:24:28 - IPSec: Disconnecting from XXXXXXXX on channel 1.
03.05.2021 22:24:28 - System: Setting NCP virtual adapter linkstatus=0,laststate=1.
03.05.2021 22:24:28 - ncpadapter: reset IP adapter properties
03.05.2021 22:24:28 - ncpadapter: reset ipv4 properties,ip4adr=0.0.0.0
03.05.2021 22:24:28 - ncpadapter: reset_ip4_properties, manual=0
03.05.2021 22:24:28 - Ike: ConRef=5, RECV_MSG1_CHILD, name=XXXXXXXX, vpngw=XX.XXX.XXX.XX:443
03.05.2021 22:24:28 - Ikev2: ConRef=5,Received notify messages -
03.05.2021 22:24:28 - Ikev2 Child: ConRef=5,recv TSI=0.0.0.0-255.255.255.255
03.05.2021 22:24:28 - Ikev2 Child: ConRef=5,recv TSR=192.168.25.205-192.168.25.205
03.05.2021 22:24:28 - Ike: ConRef=5, XMIT_MSG2_CHILD, name=XXXXXXXX, vpngw=XX.XXX.XXX.XX:443
03.05.2021 22:24:28 - Ikev2 Child: ConRef=5,send response TSI=0.0.0.0-255.255.255.255
03.05.2021 22:24:28 - Ikev2 Child: ConRef=5,send response tsr=192.168.25.205-192.168.25.205
03.05.2021 22:24:28 - osspecific_del_dns: cmdline=netsh interface ipv4 delete dnsservers 11 all validate=no
03.05.2021 22:24:28 - osspecific_del_dns: cmdline=netsh interface ipv4 delete dnsservers 11 all validate=no
03.05.2021 22:24:28 - INFO - MONITOR: Disconnected
03.05.2021 22:24:28 - INFO - MONITOR: Media=Automatic, Tx=245398 Byte, Rx=984578 Byte
03.05.2021 22:24:29 - osspecific_del_dns: cmdline=netsh interface ipv4 delete dnsservers 11 all validate=no
03.05.2021 22:25:11 - System: DNSHandling=0
03.05.2021 22:25:11 - IPSec: Start building connection
03.05.2021 22:25:11 - IpsDial: Generate available provider links - media available is = 2200
03.05.2021 22:25:11 - IpsDial: Created the following list of provider links:
03.05.2021 22:25:11 - IPSec: DNSREQ: resolving GW=<XXX.de> over lan:
03.05.2021 22:25:11 - IPSec: DNSREQ resolved vpn ipadr=XX.XXX.XXX.XX,ipadr6=0.0.0.0
03.05.2021 22:25:11 - ipsdial: resolved at least one remote tunnel endpoint.
03.05.2021 22:25:11 - IpsDial: connection time interface choice,LocIpa=192.168.21.103,AdapterIndex=200
03.05.2021 22:25:11 - Ikev2: Opening connection in PATHFINDER mode : XXXXXXXX
03.05.2021 22:25:11 - Ikev2: Outgoing connect request IKEv2 mode - gateway=XX.XXX.XXX.XX : XXXXXXXX
03.05.2021 22:25:11 - Ikev2: ConRef=6, XMIT_MSG1_INIT, name=XXXXXXXX, vpngw=XX.XXX.XXX.XX:500
03.05.2021 22:25:15 - Isakmp: re-sending packet to=XX.XXX.XXX.XX:500,size=1060
03.05.2021 22:25:19 - IKEv2(INIT): Switching to TCP ENCAPSULATION in PATHFINDER_1 : XXXXXXXX
03.05.2021 22:25:19 - Ike: Opening PATHFINDER1 connection: XXXXXXXX
03.05.2021 22:25:19 - Ikev2: Pathfinder-Outgoing connect request : XXXXXXXX
03.05.2021 22:25:19 - Ikev2: ConRef=6, XMIT_MSG1_INIT, name=XXXXXXXX, vpngw=XX.XXX.XXX.XX:443
03.05.2021 22:25:19 - TcpConnectionBase: connect_request, locadr=0.0.0.0:9500, remadr=XX.XXX.XXX.XX:443
03.05.2021 22:25:19 - Ikev2: ConRef=6, RECV_MSG2_INIT, adapterindex=0,name=XXXXXXXX, remote ip:port=XX.XXX.XXX.XX:443,local ip:port=0.0.0.0:9500
03.05.2021 22:25:19 - Ikev2: ConRef=6,Received notify messages -
03.05.2021 22:25:19 - Ikev2: Notifymsg=<IKEV2_FRAGMENTATION_SUPPORTED>
03.05.2021 22:25:19 - Ike: Turning on IKE fragment mode - XXXXXXXX
03.05.2021 22:25:19 - IPSec: Final Tunnel EndPoint is=XX.XXX.XXX.XX
03.05.2021 22:25:19 - Ikev2: RECV_MSG2_INIT - ConRef=6, Remote supports IKEv2 fragmentation
03.05.2021 22:25:19 - IKESA2_INIT: - ConRef=6, protection suite:
03.05.2021 22:25:19 - PID=1,#ENCR=20,KEYLEN=256,INTEG=0,PRF=5,DHGRP=14,AUTHM=0,CERTON=0
03.05.2021 22:25:19 - INSPIL=0,INSPI=00000000,OUTSPIL=0,OUTSPI=00000000,LifeType=1,LifeSec=31536000,LifeKb=0
03.05.2021 22:25:19 - Ike: ConRef=6, XMIT_MSG1_AUTH, name=XXXXXXXX, vpngw=XX.XXX.XXX.XX:443
03.05.2021 22:25:19 - Ike: ConRef=6, XMIT_MSG1_AUTH_BEFORE_EAP0, name=XXXXXXXX, vpngw=XX.XXX.XXX.XX:443
03.05.2021 22:25:19 - Ike: ConRef=6, XMIT_MSG1_AUTH_RESUME0, name=XXXXXXXX, vpngw=XX.XXX.XXX.XX:443
03.05.2021 22:25:19 - Auth: ConRef=6, no local ID configured --> using a default
03.05.2021 22:25:19 - Ikev2:send idi payload:ID_IPV4_ADDR:pid=0,port=0,192.168.254.2
03.05.2021 22:25:19 - Ike: ConRef=6, XMIT_MSG1_AUTH_RESUME1, name=XXXXXXXX, vpngw=XX.XXX.XXX.XX:443
03.05.2021 22:25:19 - Ikev2 Child: ConRef=6,send request TSI=0.0.0.0-255.255.255.255
03.05.2021 22:25:19 - Ikev2 Child: ConRef=6,send request TSR=192.168.25.0-192.168.25.255
03.05.2021 22:25:19 - IkeV2: ConRef=6,Auth - initiating an EAP session
03.05.2021 22:25:19 - IPSec: Phase1 is Ready,AdapterIndex=200,IkeIndex=6,LocTepIpAdr=192.168.21.103,AltRekey=1
03.05.2021 22:25:19 - Ike: ConRef=6, RECV_MSG2_AUTH, name=XXXXXXXX, vpngw=XX.XXX.XXX.XX:443
03.05.2021 22:25:19 - Ikev2: ConRef=6,Received notify messages -
03.05.2021 22:25:19 - Ikev2: ConRef=6, Received 1 certificates.
03.05.2021 22:25:19 - Auth: ConRef=6, PKI response with errorcode=0.
03.05.2021 22:25:19 - Ike: ConRef=6, RECV_MSG2_AUTH_RESUME1, name=XXXXXXXX, vpngw=XX.XXX.XXX.XX:443
03.05.2021 22:25:19 - Auth: ConRef=6,Remote is authenticating with=1,RSA
03.05.2021 22:25:19 - IkeV2: ConRef=6,Auth - Receiving EAP payload
03.05.2021 22:25:19 - EAP: recv identity request,User=<XXX@XXX.com>
03.05.2021 22:25:19 - EAP: sending identity response,User=<XXX@XXX.com>
03.05.2021 22:25:19 - Ike: ConRef=6, RECV_MSG2_AUTH, name=XXXXXXXX, vpngw=XX.XXX.XXX.XX:443
03.05.2021 22:25:19 - Ikev2: ConRef=6,Received notify messages -
03.05.2021 22:25:19 - IkeV2: ConRef=6,Auth - Receiving EAP payload
03.05.2021 22:25:19 - EAP MSCHAP2:recv challenge for userid=<XXX@XXX.com>
03.05.2021 22:25:19 - EAP MSCHAP2:send response for userid=<XXX@XXX.com>
03.05.2021 22:25:19 - Ike: ConRef=6, RECV_MSG2_AUTH, name=XXXXXXXX, vpngw=XX.XXX.XXX.XX:443
03.05.2021 22:25:19 - Ikev2: ConRef=6,Received notify messages -
03.05.2021 22:25:19 - IkeV2: ConRef=6,Auth - Receiving EAP payload
03.05.2021 22:25:19 - EAP MSCHAP2:recv success for userid=<XXX@XXX.com>
03.05.2021 22:25:19 - EAP MSCHAP2:send ack for userid=<XXX@XXX.com>
03.05.2021 22:25:19 - Ike: ConRef=6, RECV_MSG2_AUTH, name=XXXXXXXX, vpngw=XX.XXX.XXX.XX:443
03.05.2021 22:25:19 - Ikev2: ConRef=6,Received notify messages -
03.05.2021 22:25:19 - IkeV2: ConRef=6,Auth - Receiving EAP payload
03.05.2021 22:25:19 - Eap: status=0,Method=MSCHAPV2
03.05.2021 22:25:19 - Eap: status success,method=MSCHAPV2
03.05.2021 22:25:19 - Ike: ConRef=6, XMIT_MSG1_AUTH__AFTER_EAP, name=XXXXXXXX, vpngw=XX.XXX.XXX.XX:443
03.05.2021 22:25:19 - Auth: ConRef=6,Local is authenticating with=2,Shared key
03.05.2021 22:25:19 - Ike: ConRef=6, XMIT_MSG1_AUTH__AFTER_EAP_RESUME3, name=XXXXXXXX, vpngw=XX.XXX.XXX.XX:443
03.05.2021 22:25:19 - Ike: ConRef=6, RECV_MSG2_AUTH, name=XXXXXXXX, vpngw=XX.XXX.XXX.XX:443
03.05.2021 22:25:19 - Ikev2: ConRef=6,Received notify messages -
03.05.2021 22:25:19 - Ikev2: Notifymsg=<IKEV2_NOTIFY_INITIAL_CONTACT>
03.05.2021 22:25:19 - Ike: ConRef=6, RECV_MSG2_AUTH_RESUME1, name=XXXXXXXX, vpngw=XX.XXX.XXX.XX:443
03.05.2021 22:25:19 - Auth: ConRef=6,Remote is authenticating with=2,Shared key
03.05.2021 22:25:19 - Ikev2:recv IDR payload:ID_DER_ASN1_DN:pid=0,port=0,3014311230100603
03.05.2021 22:25:19 - IKESA2_CHILD: - ConRef=6, protection suite:
03.05.2021 22:25:19 - PID=3,#ENCR=20,KEYLEN=256,INTEG=0,PRF=0,DHGRP=0,AUTHM=0,CERTON=0
03.05.2021 22:25:19 - INSPIL=4,INSPI=b3532623,OUTSPIL=4,OUTSPI=59c2d8b1,LifeType=1,LifeSec=31536000,LifeKb=50000
03.05.2021 22:25:19 - Ikev2 Child: ConRef=6,recv TSI=192.168.25.205-192.168.25.205
03.05.2021 22:25:19 - Ikev2 Child: ConRef=6,recv TSR=192.168.25.0-192.168.25.255
03.05.2021 22:25:19 - IkeV2: ConRef=6,Auth-Turning on DPD mode
03.05.2021 22:25:19 - IPSec: Quick Mode is Ready: IkeIndex=6,VpnSrcPort=9500
03.05.2021 22:25:19 - IPSec: Assigned IP Address:IPv4=192.168.25.205,IPv6=0.0.0.0
03.05.2021 22:25:19 - IPSec: Assigned IP Network Mask:IPv4=0.0.0.0,IPv6=0.0.0.0
03.05.2021 22:25:19 - IPSec: Gateway IP Address:IPv4=0.0.0.0,IPv6=0.0.0.0
03.05.2021 22:25:19 - IPSec: Primary DNS Server: 192.168.25.1
03.05.2021 22:25:19 - IPSec: Secondary DNS Server: 192.168.25.1
03.05.2021 22:25:19 - IPSec: Primary WINS Server: 0.0.0.0
03.05.2021 22:25:19 - IPSec: Secondary WINS Server: 0.0.0.0
03.05.2021 22:25:19 - IPSec: Primary NCP SEM Server: 0.0.0.0
03.05.2021 22:25:19 - IPSec: Secondary NCP SEM Server: 0.0.0.0
03.05.2021 22:25:19 - IPSec: Primary DNS6 Server: 0.0.0.0
03.05.2021 22:25:19 - IPSec: Secondary DNS6 Server: 0.0.0.0
03.05.2021 22:25:19 - IPSec: Primary NCP SEM6 Server: 0.0.0.0
03.05.2021 22:25:19 - IPSec: Secondary NCP SEM6 Server: 0.0.0.0
03.05.2021 22:25:19 - IPSec: Conref=6, Created an IPSEC SA with the following characteristics
03.05.2021 22:25:19 - Gateway=XX.XXX.XXX.XX,NatdMode=0,Roamingcon=0
03.05.2021 22:25:19 - srcranges=[192.168.25.205:0-192.168.25.205:65535],
03.05.2021 22:25:19 - dstranges=[192.168.25.0:0-192.168.25.255:65535],
03.05.2021 22:25:19 - IPSec:ConRef=6 connected: Effective ESP LifeDuration in Seconds = 22075200,Effective IKE lifetime=22075200
03.05.2021 22:25:19 - IPSec: Connected to XXXXXXXX on channel 1.
03.05.2021 22:25:19 - ncpadapter: set IP adapter properties
03.05.2021 22:25:19 - ncpadapter: set ipv4 properties,ip4adr=192.168.25.205,ip4selneg=1
03.05.2021 22:25:19 - ncpadapter: set_ip4_properties, manual=0
03.05.2021 22:25:19 - System: Setting NCP virtual adapter linkstatus=1,laststate=0.
03.05.2021 22:25:19 - System: Setting NCP virtual adapter linkstatus=1,laststate=1.
03.05.2021 22:25:19 - PPP(Ipcp): connected to XXXXXXXX with IP Address: 192.168.25.205
03.05.2021 22:25:19 - SUCCESS: IpSec connection ready
03.05.2021 22:25:19 - ipdhcp: xmit response,f_param.yiaddr=192.168.25.205
03.05.2021 22:25:19 - Link: dhcp ack sent
03.05.2021 22:25:20 - DhcpV6: received MSG_CONFIRM, adapterstate=2
03.05.2021 22:25:21 - DhcpV6: received MSG_CONFIRM, adapterstate=2
03.05.2021 22:25:22 - INFO - MONITOR: Connected -> XXXXXXXX
03.05.2021 22:25:22 - INFO - MONITOR: Media=Automatic, Tx=7107 Byte, Rx=5970 Byte
03.05.2021 22:25:22 - Link: iphlp_renew_done
03.05.2021 22:25:22 - SUCCESS: Link -> <XXXXXXXX> IP address assigned to IP stack - link is operational.
03.05.2021 22:25:22 - osspecific_add_dns: cmdline=netsh interface ipv4 add dnsservers 11 192.168.25.2 validate=no
03.05.2021 22:25:22 - osspecific_add_dns: cmdline=netsh interface ipv4 add dnsservers 11 192.168.25.1 validate=no
03.05.2021 22:25:22 - osspecific_add_dns: cmdline=netsh interface ipv4 add dnsservers 11 192.168.25.1 validate=no
03.05.2021 22:27:23 - System: DNSHandling=0
03.05.2021 22:27:23 - IPSec: Start building connection
03.05.2021 22:27:23 - IpsDial: Generate available provider links - media available is = 2200
03.05.2021 22:27:23 - IpsDial: Created the following list of provider links:
03.05.2021 22:27:23 - IPSec: DNSREQ: resolving GW=<XXX.de> over lan:
03.05.2021 22:27:23 - IPSec: DNSREQ resolved vpn ipadr=XX.XXX.XXX.XX,ipadr6=0.0.0.0
03.05.2021 22:27:23 - ipsdial: resolved at least one remote tunnel endpoint.
03.05.2021 22:27:23 - IpsDial: connection time interface choice,LocIpa=192.168.21.103,AdapterIndex=200
03.05.2021 22:27:23 - Ikev2: Opening connection in PATHFINDER mode : XXXXXXXX
03.05.2021 22:27:23 - Ikev2: Outgoing connect request IKEv2 mode - gateway=XX.XXX.XXX.XX : XXXXXXXX
03.05.2021 22:27:23 - Ikev2: ConRef=7, XMIT_MSG1_INIT, name=XXXXXXXX, vpngw=XX.XXX.XXX.XX:500
03.05.2021 22:27:26 - Isakmp: re-sending packet to=XX.XXX.XXX.XX:500,size=1060
03.05.2021 22:27:30 - IKEv2(INIT): Switching to TCP ENCAPSULATION in PATHFINDER_1 : XXXXXXXX
03.05.2021 22:27:30 - Ike: Opening PATHFINDER1 connection: XXXXXXXX
03.05.2021 22:27:30 - Ikev2: Pathfinder-Outgoing connect request : XXXXXXXX
03.05.2021 22:27:30 - Ikev2: ConRef=7, XMIT_MSG1_INIT, name=XXXXXXXX, vpngw=XX.XXX.XXX.XX:443
03.05.2021 22:27:30 - Ikev2: ConRef=7, RECV_MSG2_INIT, adapterindex=0,name=XXXXXXXX, remote ip:port=XX.XXX.XXX.XX:443,local ip:port=0.0.0.0:9500
03.05.2021 22:27:30 - Ikev2: ConRef=7,Received notify messages -
03.05.2021 22:27:30 - Ikev2: Notifymsg=<IKEV2_FRAGMENTATION_SUPPORTED>
03.05.2021 22:27:30 - Ike: Turning on IKE fragment mode - XXXXXXXX
03.05.2021 22:27:30 - IPSec: Final Tunnel EndPoint is=XX.XXX.XXX.XX
03.05.2021 22:27:30 - Ikev2: RECV_MSG2_INIT - ConRef=7, Remote supports IKEv2 fragmentation
03.05.2021 22:27:30 - IKESA2_INIT: - ConRef=7, protection suite:
03.05.2021 22:27:30 - PID=1,#ENCR=20,KEYLEN=256,INTEG=0,PRF=5,DHGRP=14,AUTHM=0,CERTON=0
03.05.2021 22:27:30 - INSPIL=0,INSPI=00000000,OUTSPIL=0,OUTSPI=00000000,LifeType=1,LifeSec=31536000,LifeKb=0
03.05.2021 22:27:30 - Ike: ConRef=7, XMIT_MSG1_AUTH, name=XXXXXXXX, vpngw=XX.XXX.XXX.XX:443
03.05.2021 22:27:30 - Ike: ConRef=7, XMIT_MSG1_AUTH_BEFORE_EAP0, name=XXXXXXXX, vpngw=XX.XXX.XXX.XX:443
03.05.2021 22:27:30 - Ike: ConRef=7, XMIT_MSG1_AUTH_RESUME0, name=XXXXXXXX, vpngw=XX.XXX.XXX.XX:443
03.05.2021 22:27:30 - Auth: ConRef=7, no local ID configured --> using a default
03.05.2021 22:27:30 - Ikev2:send idi payload:ID_IPV4_ADDR:pid=0,port=0,192.168.254.2
03.05.2021 22:27:30 - Ike: ConRef=7, XMIT_MSG1_AUTH_RESUME1, name=XXXXXXXX, vpngw=XX.XXX.XXX.XX:443
03.05.2021 22:27:30 - Ikev2 Child: ConRef=7,send request TSI=0.0.0.0-255.255.255.255
03.05.2021 22:27:30 - Ikev2 Child: ConRef=7,send request TSR=192.168.25.0-192.168.25.255
03.05.2021 22:27:30 - IkeV2: ConRef=7,Auth - initiating an EAP session
03.05.2021 22:27:30 - IPSec: Phase1 is Ready,AdapterIndex=200,IkeIndex=7,LocTepIpAdr=192.168.21.103,AltRekey=1
03.05.2021 22:27:31 - Ike: ConRef=7, RECV_MSG2_AUTH, name=XXXXXXXX, vpngw=XX.XXX.XXX.XX:443
03.05.2021 22:27:31 - Ikev2: ConRef=7,Received notify messages -
03.05.2021 22:27:31 - Ikev2: ConRef=7, Received 1 certificates.
03.05.2021 22:27:31 - Auth: ConRef=7, PKI response with errorcode=0.
03.05.2021 22:27:31 - Ike: ConRef=7, RECV_MSG2_AUTH_RESUME1, name=XXXXXXXX, vpngw=XX.XXX.XXX.XX:443
03.05.2021 22:27:31 - Auth: ConRef=7,Remote is authenticating with=1,RSA
03.05.2021 22:27:31 - IkeV2: ConRef=7,Auth - Receiving EAP payload
03.05.2021 22:27:31 - EAP: recv identity request,User=<XXX@XXX.com>
03.05.2021 22:27:31 - EAP: sending identity response,User=<XXX@XXX.com>
03.05.2021 22:27:31 - Ike: ConRef=7, RECV_MSG2_AUTH, name=XXXXXXXX, vpngw=XX.XXX.XXX.XX:443
03.05.2021 22:27:31 - Ikev2: ConRef=7,Received notify messages -
03.05.2021 22:27:31 - IkeV2: ConRef=7,Auth - Receiving EAP payload
03.05.2021 22:27:31 - EAP MSCHAP2:recv challenge for userid=<XXX@XXX.com>
03.05.2021 22:27:31 - EAP MSCHAP2:send response for userid=<XXX@XXX.com>
03.05.2021 22:27:31 - Ike: ConRef=7, RECV_MSG2_AUTH, name=XXXXXXXX, vpngw=XX.XXX.XXX.XX:443
03.05.2021 22:27:31 - Ikev2: ConRef=7,Received notify messages -
03.05.2021 22:27:31 - IkeV2: ConRef=7,Auth - Receiving EAP payload
03.05.2021 22:27:31 - EAP MSCHAP2:recv success for userid=<XXX@XXX.com>
03.05.2021 22:27:31 - EAP MSCHAP2:send ack for userid=<XXX@XXX.com>
03.05.2021 22:27:31 - Ike: ConRef=7, RECV_MSG2_AUTH, name=XXXXXXXX, vpngw=XX.XXX.XXX.XX:443
03.05.2021 22:27:31 - Ikev2: ConRef=7,Received notify messages -
03.05.2021 22:27:31 - IkeV2: ConRef=7,Auth - Receiving EAP payload
03.05.2021 22:27:31 - Eap: status=0,Method=MSCHAPV2
03.05.2021 22:27:31 - Eap: status success,method=MSCHAPV2
03.05.2021 22:27:31 - Ike: ConRef=7, XMIT_MSG1_AUTH__AFTER_EAP, name=XXXXXXXX, vpngw=XX.XXX.XXX.XX:443
03.05.2021 22:27:31 - Auth: ConRef=7,Local is authenticating with=2,Shared key
03.05.2021 22:27:31 - Ike: ConRef=7, XMIT_MSG1_AUTH__AFTER_EAP_RESUME3, name=XXXXXXXX, vpngw=XX.XXX.XXX.XX:443
03.05.2021 22:27:31 - Ike: ConRef=7, RECV_MSG2_AUTH, name=XXXXXXXX, vpngw=XX.XXX.XXX.XX:443
03.05.2021 22:27:31 - Ikev2: ConRef=7,Received notify messages -
03.05.2021 22:27:31 - Ikev2: Notifymsg=<IKEV2_NOTIFY_INITIAL_CONTACT>
03.05.2021 22:27:31 - Ike: ConRef=7, RECV_MSG2_AUTH_RESUME1, name=XXXXXXXX, vpngw=XX.XXX.XXX.XX:443
03.05.2021 22:27:31 - Auth: ConRef=7,Remote is authenticating with=2,Shared key
03.05.2021 22:27:31 - Ikev2:recv IDR payload:ID_DER_ASN1_DN:pid=0,port=0,3014311230100603
03.05.2021 22:27:31 - IKESA2_CHILD: - ConRef=7, protection suite:
03.05.2021 22:27:31 - PID=3,#ENCR=20,KEYLEN=256,INTEG=0,PRF=0,DHGRP=0,AUTHM=0,CERTON=0
03.05.2021 22:27:31 - INSPIL=4,INSPI=39192c4e,OUTSPIL=4,OUTSPI=8da025d6,LifeType=1,LifeSec=31536000,LifeKb=50000
03.05.2021 22:27:31 - Ikev2 Child: ConRef=7,recv TSI=192.168.25.205-192.168.25.205
03.05.2021 22:27:31 - Ikev2 Child: ConRef=7,recv TSR=192.168.25.0-192.168.25.255
03.05.2021 22:27:31 - IkeV2: ConRef=7,Auth-Turning on DPD mode
03.05.2021 22:27:31 - IPSec: Quick Mode is Ready: IkeIndex=7,VpnSrcPort=9500
03.05.2021 22:27:31 - IPSec: Assigned IP Address:IPv4=192.168.25.205,IPv6=0.0.0.0
03.05.2021 22:27:31 - IPSec: Assigned IP Network Mask:IPv4=0.0.0.0,IPv6=0.0.0.0
03.05.2021 22:27:31 - IPSec: Gateway IP Address:IPv4=0.0.0.0,IPv6=0.0.0.0
03.05.2021 22:27:31 - IPSec: Primary DNS Server: 192.168.25.1
03.05.2021 22:27:31 - IPSec: Secondary DNS Server: 192.168.25.1
03.05.2021 22:27:31 - IPSec: Primary WINS Server: 0.0.0.0
03.05.2021 22:27:31 - IPSec: Secondary WINS Server: 0.0.0.0
03.05.2021 22:27:31 - IPSec: Primary NCP SEM Server: 0.0.0.0
03.05.2021 22:27:31 - IPSec: Secondary NCP SEM Server: 0.0.0.0
03.05.2021 22:27:31 - IPSec: Primary DNS6 Server: 0.0.0.0
03.05.2021 22:27:31 - IPSec: Secondary DNS6 Server: 0.0.0.0
03.05.2021 22:27:31 - IPSec: Primary NCP SEM6 Server: 0.0.0.0
03.05.2021 22:27:31 - IPSec: Secondary NCP SEM6 Server: 0.0.0.0
03.05.2021 22:27:31 - IPSec: Conref=7, Created an IPSEC SA with the following characteristics
03.05.2021 22:27:31 - Gateway=XX.XXX.XXX.XX,NatdMode=0,Roamingcon=0
03.05.2021 22:27:31 - srcranges=[192.168.25.205:0-192.168.25.205:65535],
03.05.2021 22:27:31 - dstranges=[192.168.25.0:0-192.168.25.255:65535],
03.05.2021 22:27:31 - IPSec:ConRef=7 connected: Effective ESP LifeDuration in Seconds = 22075200,Effective IKE lifetime=22075200
03.05.2021 22:27:31 - IPSec: Connected to XXXXXXXX on channel 1.
03.05.2021 22:27:31 - ncpadapter: set IP adapter properties
03.05.2021 22:27:31 - ncpadapter: set ipv4 properties,ip4adr=192.168.25.205,ip4selneg=1
03.05.2021 22:27:31 - ncpadapter: set_ip4_properties, manual=0
03.05.2021 22:27:31 - System: Setting NCP virtual adapter linkstatus=1,laststate=0.
03.05.2021 22:27:31 - System: Setting NCP virtual adapter linkstatus=1,laststate=1.
03.05.2021 22:27:31 - PPP(Ipcp): connected to XXXXXXXX with IP Address: 192.168.25.205
03.05.2021 22:27:31 - SUCCESS: IpSec connection ready
03.05.2021 22:27:31 - ipdhcp: xmit response,f_param.yiaddr=192.168.25.205
03.05.2021 22:27:31 - ipdhcp: xmit response,f_param.yiaddr=192.168.25.205
03.05.2021 22:27:31 - Link: dhcp ack sent
03.05.2021 22:27:33 - DhcpV6: received MSG_CONFIRM, adapterstate=2
03.05.2021 22:27:33 - DhcpV6: received MSG_CONFIRM, adapterstate=2
03.05.2021 22:27:33 - INFO - MONITOR: Connected -> XXXXXXXX
03.05.2021 22:27:33 - INFO - MONITOR: Media=Automatic, Tx=316071 Byte, Rx=1424179 Byte
03.05.2021 22:27:34 - Link: iphlp_renew_done
03.05.2021 22:27:34 - SUCCESS: Link -> <XXXXXXXX> IP address assigned to IP stack - link is operational.
03.05.2021 22:27:34 - osspecific_add_dns: cmdline=netsh interface ipv4 add dnsservers 11 192.168.25.2 validate=no
03.05.2021 22:27:34 - osspecific_add_dns: cmdline=netsh interface ipv4 add dnsservers 11 192.168.25.1 validate=no
03.05.2021 22:27:34 - osspecific_add_dns: cmdline=netsh interface ipv4 add dnsservers 11 192.168.25.1 validate=no
03.05.2021 22:27:34 - osspecific_add_dns: cmdline=netsh interface ipv4 add dnsservers 11 192.168.25.1 validate=no
03.05.2021 22:27:35 - DhcpV6: received MSG_CONFIRM, adapterstate=2
03.05.2021 22:27:39 - DhcpV6: received MSG_SOLICIT, adapterstate=2
03.05.2021 22:27:40 - DhcpV6: received MSG_REQUEST, adapterstate=2
03.05.2021 22:28:42 - Ikev2: ConRef=7,SEND: NOTIFY_MSG_R_U_HERE
03.05.2021 22:28:46 - Isakmp: re-sending packet to=XX.XXX.XXX.XX:443,size=68
03.05.2021 22:28:50 - Isakmp: re-sending packet to=XX.XXX.XXX.XX:443,size=68
03.05.2021 22:28:54 - Isakmp: re-sending packet to=XX.XXX.XXX.XX:443,size=68
03.05.2021 22:28:58 - Isakmp: re-sending packet to=XX.XXX.XXX.XX:443,size=68
03.05.2021 22:29:02 - Isakmp: re-sending packet to=XX.XXX.XXX.XX:443,size=68
03.05.2021 22:29:06 - Isakmp: re-sending packet to=XX.XXX.XXX.XX:443,size=68
03.05.2021 22:29:10 - Isakmp: re-sending packet to=XX.XXX.XXX.XX:443,size=68
03.05.2021 22:29:14 - INFO - MONITOR: Disconnected
03.05.2021 22:29:14 - INFO - MONITOR: Media=Automatic, Tx=821555 Byte, Rx=3330206 Byte
03.05.2021 22:29:14 - ERROR - 4035: IKE(phase1):Disconnect due to no DPD response.
03.05.2021 22:29:14 - Ikev2: phase1:name(XXXXXXXX) - ConRef=7,ERROR - DPD timer response expired
03.05.2021 22:29:14 - IPSec: Disconnected from XXXXXXXX on channel 1.
03.05.2021 22:29:14 - ncpadapter: reset IP adapter properties
03.05.2021 22:29:14 - ncpadapter: reset ipv4 properties,ip4adr=192.168.25.205
03.05.2021 22:29:14 - ncpadapter: reset_ip4_properties, manual=0
03.05.2021 22:29:14 - osspecific_del_dns: cmdline=netsh interface ipv4 delete dnsservers 11 all validate=no
03.05.2021 22:29:14 - osspecific_del_dns: cmdline=netsh interface ipv4 delete dnsservers 11 all validate=no
03.05.2021 22:29:15 - osspecific_del_dns: cmdline=netsh interface ipv4 delete dnsservers 11 all validate=no
03.05.2021 22:29:15 - osspecific_del_dns: cmdline=netsh interface ipv4 delete dnsservers 11 all validate=no
03.05.2021 22:29:15 - System: Setting NCP virtual adapter linkstatus=0,laststate=1.
Während dem Abbruch war die öffentliche IP durchgehend erreichbar.
Ich hoffe ihr könnt hieraus etwas hilfreiches entnehmen. Danke schonmal.
03.05.2021 22:03:50 - EAP MSCHAP2:send response for userid=<XXX@XXX.com>
03.05.2021 22:03:50 - Ike: ConRef=4, RECV_MSG2_AUTH, name=XXXXXXXX, vpngw=XX.XXX.XXX.XX:443
03.05.2021 22:03:50 - Ikev2: ConRef=4,Received notify messages -
03.05.2021 22:03:50 - IkeV2: ConRef=4,Auth - Receiving EAP payload
03.05.2021 22:03:50 - EAP MSCHAP2:recv success for userid=<XXX@XXX.com>
03.05.2021 22:03:50 - EAP MSCHAP2:send ack for userid=<XXX@XXX.com>
03.05.2021 22:03:50 - Ike: ConRef=4, RECV_MSG2_AUTH, name=XXXXXXXX, vpngw=XX.XXX.XXX.XX:443
03.05.2021 22:03:50 - Ikev2: ConRef=4,Received notify messages -
03.05.2021 22:03:50 - IkeV2: ConRef=4,Auth - Receiving EAP payload
03.05.2021 22:03:50 - Eap: status=0,Method=MSCHAPV2
03.05.2021 22:03:50 - Eap: status success,method=MSCHAPV2
03.05.2021 22:03:50 - Ike: ConRef=4, XMIT_MSG1_AUTH__AFTER_EAP, name=XXXXXXXX, vpngw=XX.XXX.XXX.XX:443
03.05.2021 22:03:50 - Auth: ConRef=4,Local is authenticating with=2,Shared key
03.05.2021 22:03:50 - Ike: ConRef=4, XMIT_MSG1_AUTH__AFTER_EAP_RESUME3, name=XXXXXXXX, vpngw=XX.XXX.XXX.XX:443
03.05.2021 22:03:50 - Ike: ConRef=4, RECV_MSG2_AUTH, name=XXXXXXXX, vpngw=XX.XXX.XXX.XX:443
03.05.2021 22:03:50 - Ikev2: ConRef=4,Received notify messages -
03.05.2021 22:03:50 - Ikev2: Notifymsg=<IKEV2_NOTIFY_INITIAL_CONTACT>
03.05.2021 22:03:50 - Ike: ConRef=4, RECV_MSG2_AUTH_RESUME1, name=XXXXXXXX, vpngw=XX.XXX.XXX.XX:443
03.05.2021 22:03:50 - Auth: ConRef=4,Remote is authenticating with=2,Shared key
03.05.2021 22:03:50 - Ikev2:recv IDR payload:ID_DER_ASN1_DN:pid=0,port=0,3014311230100603
03.05.2021 22:03:50 - IKESA2_CHILD: - ConRef=4, protection suite:
03.05.2021 22:03:50 - PID=3,#ENCR=20,KEYLEN=256,INTEG=0,PRF=0,DHGRP=0,AUTHM=0,CERTON=0
03.05.2021 22:03:50 - INSPIL=4,INSPI=57bbf4c3,OUTSPIL=4,OUTSPI=6c6445da,LifeType=1,LifeSec=31536000,LifeKb=50000
03.05.2021 22:03:50 - Ikev2 Child: ConRef=4,recv TSI=192.168.25.205-192.168.25.205
03.05.2021 22:03:50 - Ikev2 Child: ConRef=4,recv TSR=192.168.25.0-192.168.25.255
03.05.2021 22:03:50 - IkeV2: ConRef=4,Auth-Turning on DPD mode
03.05.2021 22:03:50 - IPSec: Quick Mode is Ready: IkeIndex=4,VpnSrcPort=9500
03.05.2021 22:03:50 - IPSec: Assigned IP Address:IPv4=192.168.25.205,IPv6=0.0.0.0
03.05.2021 22:03:50 - IPSec: Assigned IP Network Mask:IPv4=0.0.0.0,IPv6=0.0.0.0
03.05.2021 22:03:50 - IPSec: Gateway IP Address:IPv4=0.0.0.0,IPv6=0.0.0.0
03.05.2021 22:03:50 - IPSec: Primary DNS Server: 192.168.25.1
03.05.2021 22:03:50 - IPSec: Secondary DNS Server: 192.168.25.1
03.05.2021 22:03:50 - IPSec: Primary WINS Server: 0.0.0.0
03.05.2021 22:03:50 - IPSec: Secondary WINS Server: 0.0.0.0
03.05.2021 22:03:50 - IPSec: Primary NCP SEM Server: 0.0.0.0
03.05.2021 22:03:50 - IPSec: Secondary NCP SEM Server: 0.0.0.0
03.05.2021 22:03:50 - IPSec: Primary DNS6 Server: 0.0.0.0
03.05.2021 22:03:50 - IPSec: Secondary DNS6 Server: 0.0.0.0
03.05.2021 22:03:50 - IPSec: Primary NCP SEM6 Server: 0.0.0.0
03.05.2021 22:03:50 - IPSec: Secondary NCP SEM6 Server: 0.0.0.0
03.05.2021 22:03:50 - IPSec: Conref=4, Created an IPSEC SA with the following characteristics
03.05.2021 22:03:50 - Gateway=XX.XXX.XXX.XX,NatdMode=0,Roamingcon=0
03.05.2021 22:03:50 - srcranges=[192.168.25.205:0-192.168.25.205:65535],
03.05.2021 22:03:50 - dstranges=[192.168.25.0:0-192.168.25.255:65535],
03.05.2021 22:03:50 - IPSec:ConRef=4 connected: Effective ESP LifeDuration in Seconds = 22075200,Effective IKE lifetime=22075200
03.05.2021 22:03:50 - IPSec: Connected to XXXXXXXX on channel 1.
03.05.2021 22:03:50 - ncpadapter: set IP adapter properties
03.05.2021 22:03:50 - ncpadapter: set ipv4 properties,ip4adr=192.168.25.205,ip4selneg=1
03.05.2021 22:03:50 - ncpadapter: set_ip4_properties, manual=0
03.05.2021 22:03:50 - System: Setting NCP virtual adapter linkstatus=1,laststate=0.
03.05.2021 22:03:50 - System: Setting NCP virtual adapter linkstatus=1,laststate=1.
03.05.2021 22:03:50 - PPP(Ipcp): connected to XXXXXXXX with IP Address: 192.168.25.205
03.05.2021 22:03:50 - SUCCESS: IpSec connection ready
03.05.2021 22:03:50 - ipdhcp: xmit response,f_param.yiaddr=192.168.25.205
03.05.2021 22:03:50 - ipdhcp: xmit response,f_param.yiaddr=192.168.25.205
03.05.2021 22:03:50 - Link: dhcp ack sent
03.05.2021 22:03:51 - DhcpV6: received MSG_CONFIRM, adapterstate=2
03.05.2021 22:03:52 - INFO - MONITOR: Connected -> XXXXXXXX
03.05.2021 22:03:52 - INFO - MONITOR: Media=Automatic, Tx=68 Byte, Rx=127 Byte
03.05.2021 22:03:52 - DhcpV6: received MSG_CONFIRM, adapterstate=2
03.05.2021 22:03:52 - Link: iphlp_renew_done
03.05.2021 22:03:52 - SUCCESS: Link -> <XXXXXXXX> IP address assigned to IP stack - link is operational.
03.05.2021 22:03:52 - osspecific_add_dns: cmdline=netsh interface ipv4 add dnsservers 11 192.168.25.1 validate=no
03.05.2021 22:03:53 - osspecific_add_dns: cmdline=netsh interface ipv4 add dnsservers 11 192.168.25.1 validate=no
03.05.2021 22:03:54 - DhcpV6: received MSG_CONFIRM, adapterstate=2
03.05.2021 22:03:58 - DhcpV6: received MSG_SOLICIT, adapterstate=2
03.05.2021 22:03:59 - DhcpV6: received MSG_REQUEST, adapterstate=2
03.05.2021 22:23:45 - INFO - MONITOR: Disconnected
03.05.2021 22:23:45 - INFO - MONITOR: Media=Automatic, Tx=2189611 Byte, Rx=8676672 Byte
03.05.2021 22:23:45 - ncpadapter: reset IP adapter properties
03.05.2021 22:23:45 - ncpadapter: reset ipv4 properties,ip4adr=192.168.25.205
03.05.2021 22:23:45 - ncpadapter: reset_ip4_properties, manual=0
03.05.2021 22:23:45 - IPSec: Disconnecting from XXXXXXXX on channel 1.
03.05.2021 22:23:45 - IPSec: Disconnecting from XXXXXXXX on channel 1.
03.05.2021 22:23:45 - System: Setting NCP virtual adapter linkstatus=0,laststate=1.
03.05.2021 22:23:45 - ncpadapter: reset IP adapter properties
03.05.2021 22:23:45 - ncpadapter: reset ipv4 properties,ip4adr=0.0.0.0
03.05.2021 22:23:45 - ncpadapter: reset_ip4_properties, manual=0
03.05.2021 22:23:45 - Ike: ConRef=4, RECV_MSG1_CHILD, name=XXXXXXXX, vpngw=XX.XXX.XXX.XX:443
03.05.2021 22:23:45 - Ikev2: ConRef=4,Received notify messages -
03.05.2021 22:23:45 - Ikev2 Child: ConRef=4,recv TSI=0.0.0.0-255.255.255.255
03.05.2021 22:23:45 - Ikev2 Child: ConRef=4,recv TSR=192.168.25.205-192.168.25.205
03.05.2021 22:23:45 - Ike: ConRef=4, XMIT_MSG2_CHILD, name=XXXXXXXX, vpngw=XX.XXX.XXX.XX:443
03.05.2021 22:23:45 - Ikev2 Child: ConRef=4,send response TSI=0.0.0.0-255.255.255.255
03.05.2021 22:23:45 - Ikev2 Child: ConRef=4,send response tsr=192.168.25.205-192.168.25.205
03.05.2021 22:23:45 - osspecific_del_dns: cmdline=netsh interface ipv4 delete dnsservers 11 all validate=no
03.05.2021 22:23:45 - osspecific_del_dns: cmdline=netsh interface ipv4 delete dnsservers 11 all validate=no
03.05.2021 22:23:56 - System: DNSHandling=0
03.05.2021 22:23:56 - IPSec: Start building connection
03.05.2021 22:23:56 - IpsDial: Generate available provider links - media available is = 2200
03.05.2021 22:23:56 - IpsDial: Created the following list of provider links:
03.05.2021 22:23:56 - IPSec: DNSREQ: resolving GW=<XXX.de> over lan:
03.05.2021 22:23:56 - IPSec: DNSREQ resolved vpn ipadr=XX.XXX.XXX.XX,ipadr6=0.0.0.0
03.05.2021 22:23:56 - ipsdial: resolved at least one remote tunnel endpoint.
03.05.2021 22:23:56 - IpsDial: connection time interface choice,LocIpa=192.168.21.103,AdapterIndex=200
03.05.2021 22:23:56 - Ikev2: Opening connection in PATHFINDER mode : XXXXXXXX
03.05.2021 22:23:56 - Ikev2: Outgoing connect request IKEv2 mode - gateway=XX.XXX.XXX.XX : XXXXXXXX
03.05.2021 22:23:56 - Ikev2: ConRef=5, XMIT_MSG1_INIT, name=XXXXXXXX, vpngw=XX.XXX.XXX.XX:500
03.05.2021 22:24:00 - Isakmp: re-sending packet to=XX.XXX.XXX.XX:500,size=1060
03.05.2021 22:24:04 - IKEv2(INIT): Switching to TCP ENCAPSULATION in PATHFINDER_1 : XXXXXXXX
03.05.2021 22:24:04 - Ike: Opening PATHFINDER1 connection: XXXXXXXX
03.05.2021 22:24:04 - Ikev2: Pathfinder-Outgoing connect request : XXXXXXXX
03.05.2021 22:24:04 - Ikev2: ConRef=5, XMIT_MSG1_INIT, name=XXXXXXXX, vpngw=XX.XXX.XXX.XX:443
03.05.2021 22:24:04 - TcpConnectionBase: connect_request, locadr=0.0.0.0:9500, remadr=XX.XXX.XXX.XX:443
03.05.2021 22:24:04 - Ikev2: ConRef=5, RECV_MSG2_INIT, adapterindex=0,name=XXXXXXXX, remote ip:port=XX.XXX.XXX.XX:443,local ip:port=0.0.0.0:9500
03.05.2021 22:24:04 - Ikev2: ConRef=5,Received notify messages -
03.05.2021 22:24:04 - Ikev2: Notifymsg=<IKEV2_FRAGMENTATION_SUPPORTED>
03.05.2021 22:24:04 - Ike: Turning on IKE fragment mode - XXXXXXXX
03.05.2021 22:24:04 - IPSec: Final Tunnel EndPoint is=XX.XXX.XXX.XX
03.05.2021 22:24:04 - Ikev2: RECV_MSG2_INIT - ConRef=5, Remote supports IKEv2 fragmentation
03.05.2021 22:24:04 - IKESA2_INIT: - ConRef=5, protection suite:
03.05.2021 22:24:04 - PID=1,#ENCR=20,KEYLEN=256,INTEG=0,PRF=5,DHGRP=14,AUTHM=0,CERTON=0
03.05.2021 22:24:04 - INSPIL=0,INSPI=00000000,OUTSPIL=0,OUTSPI=00000000,LifeType=1,LifeSec=31536000,LifeKb=0
03.05.2021 22:24:04 - Ike: ConRef=5, XMIT_MSG1_AUTH, name=XXXXXXXX, vpngw=XX.XXX.XXX.XX:443
03.05.2021 22:24:04 - Ike: ConRef=5, XMIT_MSG1_AUTH_BEFORE_EAP0, name=XXXXXXXX, vpngw=XX.XXX.XXX.XX:443
03.05.2021 22:24:04 - Ike: ConRef=5, XMIT_MSG1_AUTH_RESUME0, name=XXXXXXXX, vpngw=XX.XXX.XXX.XX:443
03.05.2021 22:24:04 - Auth: ConRef=5, no local ID configured --> using a default
03.05.2021 22:24:04 - Ikev2:send idi payload:ID_IPV4_ADDR:pid=0,port=0,192.168.254.2
03.05.2021 22:24:04 - Ike: ConRef=5, XMIT_MSG1_AUTH_RESUME1, name=XXXXXXXX, vpngw=XX.XXX.XXX.XX:443
03.05.2021 22:24:04 - Ikev2 Child: ConRef=5,send request TSI=0.0.0.0-255.255.255.255
03.05.2021 22:24:04 - Ikev2 Child: ConRef=5,send request TSR=192.168.25.0-192.168.25.255
03.05.2021 22:24:04 - IkeV2: ConRef=5,Auth - initiating an EAP session
03.05.2021 22:24:04 - IPSec: Phase1 is Ready,AdapterIndex=200,IkeIndex=5,LocTepIpAdr=192.168.21.103,AltRekey=1
03.05.2021 22:24:05 - Ike: ConRef=5, RECV_MSG2_AUTH, name=XXXXXXXX, vpngw=XX.XXX.XXX.XX:443
03.05.2021 22:24:05 - Ikev2: ConRef=5,Received notify messages -
03.05.2021 22:24:05 - Ikev2: ConRef=5, Received 1 certificates.
03.05.2021 22:24:05 - Auth: ConRef=5, PKI response with errorcode=0.
03.05.2021 22:24:05 - Ike: ConRef=5, RECV_MSG2_AUTH_RESUME1, name=XXXXXXXX, vpngw=XX.XXX.XXX.XX:443
03.05.2021 22:24:05 - Auth: ConRef=5,Remote is authenticating with=1,RSA
03.05.2021 22:24:05 - IkeV2: ConRef=5,Auth - Receiving EAP payload
03.05.2021 22:24:05 - EAP: recv identity request,User=<XXX@XXX.com>
03.05.2021 22:24:05 - EAP: sending identity response,User=<XXX@XXX.com>
03.05.2021 22:24:05 - Ike: ConRef=5, RECV_MSG2_AUTH, name=XXXXXXXX, vpngw=XX.XXX.XXX.XX:443
03.05.2021 22:24:05 - Ikev2: ConRef=5,Received notify messages -
03.05.2021 22:24:05 - IkeV2: ConRef=5,Auth - Receiving EAP payload
03.05.2021 22:24:05 - EAP MSCHAP2:recv challenge for userid=<XXX@XXX.com>
03.05.2021 22:24:05 - EAP MSCHAP2:send response for userid=<XXX@XXX.com>
03.05.2021 22:24:05 - Ike: ConRef=5, RECV_MSG2_AUTH, name=XXXXXXXX, vpngw=XX.XXX.XXX.XX:443
03.05.2021 22:24:05 - Ikev2: ConRef=5,Received notify messages -
03.05.2021 22:24:05 - IkeV2: ConRef=5,Auth - Receiving EAP payload
03.05.2021 22:24:05 - EAP MSCHAP2:recv success for userid=<XXX@XXX.com>
03.05.2021 22:24:05 - EAP MSCHAP2:send ack for userid=<XXX@XXX.com>
03.05.2021 22:24:05 - Ike: ConRef=5, RECV_MSG2_AUTH, name=XXXXXXXX, vpngw=XX.XXX.XXX.XX:443
03.05.2021 22:24:05 - Ikev2: ConRef=5,Received notify messages -
03.05.2021 22:24:05 - IkeV2: ConRef=5,Auth - Receiving EAP payload
03.05.2021 22:24:05 - Eap: status=0,Method=MSCHAPV2
03.05.2021 22:24:05 - Eap: status success,method=MSCHAPV2
03.05.2021 22:24:05 - Ike: ConRef=5, XMIT_MSG1_AUTH__AFTER_EAP, name=XXXXXXXX, vpngw=XX.XXX.XXX.XX:443
03.05.2021 22:24:05 - Auth: ConRef=5,Local is authenticating with=2,Shared key
03.05.2021 22:24:05 - Ike: ConRef=5, XMIT_MSG1_AUTH__AFTER_EAP_RESUME3, name=XXXXXXXX, vpngw=XX.XXX.XXX.XX:443
03.05.2021 22:24:05 - Ike: ConRef=5, RECV_MSG2_AUTH, name=XXXXXXXX, vpngw=XX.XXX.XXX.XX:443
03.05.2021 22:24:05 - Ikev2: ConRef=5,Received notify messages -
03.05.2021 22:24:05 - Ikev2: Notifymsg=<IKEV2_NOTIFY_INITIAL_CONTACT>
03.05.2021 22:24:05 - Ike: ConRef=5, RECV_MSG2_AUTH_RESUME1, name=XXXXXXXX, vpngw=XX.XXX.XXX.XX:443
03.05.2021 22:24:05 - Auth: ConRef=5,Remote is authenticating with=2,Shared key
03.05.2021 22:24:05 - Ikev2:recv IDR payload:ID_DER_ASN1_DN:pid=0,port=0,3014311230100603
03.05.2021 22:24:05 - IKESA2_CHILD: - ConRef=5, protection suite:
03.05.2021 22:24:05 - PID=3,#ENCR=20,KEYLEN=256,INTEG=0,PRF=0,DHGRP=0,AUTHM=0,CERTON=0
03.05.2021 22:24:05 - INSPIL=4,INSPI=0e8cd20e,OUTSPIL=4,OUTSPI=18d343a5,LifeType=1,LifeSec=31536000,LifeKb=50000
03.05.2021 22:24:05 - Ikev2 Child: ConRef=5,recv TSI=192.168.25.205-192.168.25.205
03.05.2021 22:24:05 - Ikev2 Child: ConRef=5,recv TSR=192.168.25.0-192.168.25.255
03.05.2021 22:24:05 - IkeV2: ConRef=5,Auth-Turning on DPD mode
03.05.2021 22:24:05 - IPSec: Quick Mode is Ready: IkeIndex=5,VpnSrcPort=9500
03.05.2021 22:24:05 - IPSec: Assigned IP Address:IPv4=192.168.25.205,IPv6=0.0.0.0
03.05.2021 22:24:05 - IPSec: Assigned IP Network Mask:IPv4=0.0.0.0,IPv6=0.0.0.0
03.05.2021 22:24:05 - IPSec: Gateway IP Address:IPv4=0.0.0.0,IPv6=0.0.0.0
03.05.2021 22:24:05 - IPSec: Primary DNS Server: 192.168.25.1
03.05.2021 22:24:05 - IPSec: Secondary DNS Server: 192.168.25.1
03.05.2021 22:24:05 - IPSec: Primary WINS Server: 0.0.0.0
03.05.2021 22:24:05 - IPSec: Secondary WINS Server: 0.0.0.0
03.05.2021 22:24:05 - IPSec: Primary NCP SEM Server: 0.0.0.0
03.05.2021 22:24:05 - IPSec: Secondary NCP SEM Server: 0.0.0.0
03.05.2021 22:24:05 - IPSec: Primary DNS6 Server: 0.0.0.0
03.05.2021 22:24:05 - IPSec: Secondary DNS6 Server: 0.0.0.0
03.05.2021 22:24:05 - IPSec: Primary NCP SEM6 Server: 0.0.0.0
03.05.2021 22:24:05 - IPSec: Secondary NCP SEM6 Server: 0.0.0.0
03.05.2021 22:24:05 - IPSec: Conref=5, Created an IPSEC SA with the following characteristics
03.05.2021 22:24:05 - Gateway=XX.XXX.XXX.XX,NatdMode=0,Roamingcon=0
03.05.2021 22:24:05 - srcranges=[192.168.25.205:0-192.168.25.205:65535],
03.05.2021 22:24:05 - dstranges=[192.168.25.0:0-192.168.25.255:65535],
03.05.2021 22:24:05 - IPSec:ConRef=5 connected: Effective ESP LifeDuration in Seconds = 22075200,Effective IKE lifetime=22075200
03.05.2021 22:24:05 - IPSec: Connected to XXXXXXXX on channel 1.
03.05.2021 22:24:05 - ncpadapter: set IP adapter properties
03.05.2021 22:24:05 - ncpadapter: set ipv4 properties,ip4adr=192.168.25.205,ip4selneg=1
03.05.2021 22:24:05 - ncpadapter: set_ip4_properties, manual=0
03.05.2021 22:24:05 - System: Setting NCP virtual adapter linkstatus=1,laststate=0.
03.05.2021 22:24:05 - System: Setting NCP virtual adapter linkstatus=1,laststate=1.
03.05.2021 22:24:05 - PPP(Ipcp): connected to XXXXXXXX with IP Address: 192.168.25.205
03.05.2021 22:24:05 - SUCCESS: IpSec connection ready
03.05.2021 22:24:05 - ipdhcp: xmit response,f_param.yiaddr=192.168.25.205
03.05.2021 22:24:05 - Link: dhcp ack sent
03.05.2021 22:24:07 - DhcpV6: received MSG_CONFIRM, adapterstate=2
03.05.2021 22:24:08 - DhcpV6: received MSG_CONFIRM, adapterstate=2
03.05.2021 22:24:08 - Link: iphlp_renew_done
03.05.2021 22:24:08 - SUCCESS: Link -> <XXXXXXXX> IP address assigned to IP stack - link is operational.
03.05.2021 22:24:08 - osspecific_add_dns: cmdline=netsh interface ipv4 add dnsservers 11 192.168.25.2 validate=no
03.05.2021 22:24:08 - osspecific_add_dns: cmdline=netsh interface ipv4 add dnsservers 11 192.168.25.1 validate=no
03.05.2021 22:24:08 - INFO - MONITOR: Connected -> XXXXXXXX
03.05.2021 22:24:08 - INFO - MONITOR: Media=Automatic, Tx=362 Byte, Rx=380 Byte
03.05.2021 22:24:09 - osspecific_add_dns: cmdline=netsh interface ipv4 add dnsservers 11 192.168.25.1 validate=no
03.05.2021 22:24:10 - DhcpV6: received MSG_CONFIRM, adapterstate=2
03.05.2021 22:24:14 - DhcpV6: received MSG_SOLICIT, adapterstate=2
03.05.2021 22:24:15 - DhcpV6: received MSG_REQUEST, adapterstate=2
03.05.2021 22:24:28 - ncpadapter: reset IP adapter properties
03.05.2021 22:24:28 - ncpadapter: reset ipv4 properties,ip4adr=192.168.25.205
03.05.2021 22:24:28 - ncpadapter: reset_ip4_properties, manual=0
03.05.2021 22:24:28 - IPSec: Disconnecting from XXXXXXXX on channel 1.
03.05.2021 22:24:28 - IPSec: Disconnecting from XXXXXXXX on channel 1.
03.05.2021 22:24:28 - System: Setting NCP virtual adapter linkstatus=0,laststate=1.
03.05.2021 22:24:28 - ncpadapter: reset IP adapter properties
03.05.2021 22:24:28 - ncpadapter: reset ipv4 properties,ip4adr=0.0.0.0
03.05.2021 22:24:28 - ncpadapter: reset_ip4_properties, manual=0
03.05.2021 22:24:28 - Ike: ConRef=5, RECV_MSG1_CHILD, name=XXXXXXXX, vpngw=XX.XXX.XXX.XX:443
03.05.2021 22:24:28 - Ikev2: ConRef=5,Received notify messages -
03.05.2021 22:24:28 - Ikev2 Child: ConRef=5,recv TSI=0.0.0.0-255.255.255.255
03.05.2021 22:24:28 - Ikev2 Child: ConRef=5,recv TSR=192.168.25.205-192.168.25.205
03.05.2021 22:24:28 - Ike: ConRef=5, XMIT_MSG2_CHILD, name=XXXXXXXX, vpngw=XX.XXX.XXX.XX:443
03.05.2021 22:24:28 - Ikev2 Child: ConRef=5,send response TSI=0.0.0.0-255.255.255.255
03.05.2021 22:24:28 - Ikev2 Child: ConRef=5,send response tsr=192.168.25.205-192.168.25.205
03.05.2021 22:24:28 - osspecific_del_dns: cmdline=netsh interface ipv4 delete dnsservers 11 all validate=no
03.05.2021 22:24:28 - osspecific_del_dns: cmdline=netsh interface ipv4 delete dnsservers 11 all validate=no
03.05.2021 22:24:28 - INFO - MONITOR: Disconnected
03.05.2021 22:24:28 - INFO - MONITOR: Media=Automatic, Tx=245398 Byte, Rx=984578 Byte
03.05.2021 22:24:29 - osspecific_del_dns: cmdline=netsh interface ipv4 delete dnsservers 11 all validate=no
03.05.2021 22:25:11 - System: DNSHandling=0
03.05.2021 22:25:11 - IPSec: Start building connection
03.05.2021 22:25:11 - IpsDial: Generate available provider links - media available is = 2200
03.05.2021 22:25:11 - IpsDial: Created the following list of provider links:
03.05.2021 22:25:11 - IPSec: DNSREQ: resolving GW=<XXX.de> over lan:
03.05.2021 22:25:11 - IPSec: DNSREQ resolved vpn ipadr=XX.XXX.XXX.XX,ipadr6=0.0.0.0
03.05.2021 22:25:11 - ipsdial: resolved at least one remote tunnel endpoint.
03.05.2021 22:25:11 - IpsDial: connection time interface choice,LocIpa=192.168.21.103,AdapterIndex=200
03.05.2021 22:25:11 - Ikev2: Opening connection in PATHFINDER mode : XXXXXXXX
03.05.2021 22:25:11 - Ikev2: Outgoing connect request IKEv2 mode - gateway=XX.XXX.XXX.XX : XXXXXXXX
03.05.2021 22:25:11 - Ikev2: ConRef=6, XMIT_MSG1_INIT, name=XXXXXXXX, vpngw=XX.XXX.XXX.XX:500
03.05.2021 22:25:15 - Isakmp: re-sending packet to=XX.XXX.XXX.XX:500,size=1060
03.05.2021 22:25:19 - IKEv2(INIT): Switching to TCP ENCAPSULATION in PATHFINDER_1 : XXXXXXXX
03.05.2021 22:25:19 - Ike: Opening PATHFINDER1 connection: XXXXXXXX
03.05.2021 22:25:19 - Ikev2: Pathfinder-Outgoing connect request : XXXXXXXX
03.05.2021 22:25:19 - Ikev2: ConRef=6, XMIT_MSG1_INIT, name=XXXXXXXX, vpngw=XX.XXX.XXX.XX:443
03.05.2021 22:25:19 - TcpConnectionBase: connect_request, locadr=0.0.0.0:9500, remadr=XX.XXX.XXX.XX:443
03.05.2021 22:25:19 - Ikev2: ConRef=6, RECV_MSG2_INIT, adapterindex=0,name=XXXXXXXX, remote ip:port=XX.XXX.XXX.XX:443,local ip:port=0.0.0.0:9500
03.05.2021 22:25:19 - Ikev2: ConRef=6,Received notify messages -
03.05.2021 22:25:19 - Ikev2: Notifymsg=<IKEV2_FRAGMENTATION_SUPPORTED>
03.05.2021 22:25:19 - Ike: Turning on IKE fragment mode - XXXXXXXX
03.05.2021 22:25:19 - IPSec: Final Tunnel EndPoint is=XX.XXX.XXX.XX
03.05.2021 22:25:19 - Ikev2: RECV_MSG2_INIT - ConRef=6, Remote supports IKEv2 fragmentation
03.05.2021 22:25:19 - IKESA2_INIT: - ConRef=6, protection suite:
03.05.2021 22:25:19 - PID=1,#ENCR=20,KEYLEN=256,INTEG=0,PRF=5,DHGRP=14,AUTHM=0,CERTON=0
03.05.2021 22:25:19 - INSPIL=0,INSPI=00000000,OUTSPIL=0,OUTSPI=00000000,LifeType=1,LifeSec=31536000,LifeKb=0
03.05.2021 22:25:19 - Ike: ConRef=6, XMIT_MSG1_AUTH, name=XXXXXXXX, vpngw=XX.XXX.XXX.XX:443
03.05.2021 22:25:19 - Ike: ConRef=6, XMIT_MSG1_AUTH_BEFORE_EAP0, name=XXXXXXXX, vpngw=XX.XXX.XXX.XX:443
03.05.2021 22:25:19 - Ike: ConRef=6, XMIT_MSG1_AUTH_RESUME0, name=XXXXXXXX, vpngw=XX.XXX.XXX.XX:443
03.05.2021 22:25:19 - Auth: ConRef=6, no local ID configured --> using a default
03.05.2021 22:25:19 - Ikev2:send idi payload:ID_IPV4_ADDR:pid=0,port=0,192.168.254.2
03.05.2021 22:25:19 - Ike: ConRef=6, XMIT_MSG1_AUTH_RESUME1, name=XXXXXXXX, vpngw=XX.XXX.XXX.XX:443
03.05.2021 22:25:19 - Ikev2 Child: ConRef=6,send request TSI=0.0.0.0-255.255.255.255
03.05.2021 22:25:19 - Ikev2 Child: ConRef=6,send request TSR=192.168.25.0-192.168.25.255
03.05.2021 22:25:19 - IkeV2: ConRef=6,Auth - initiating an EAP session
03.05.2021 22:25:19 - IPSec: Phase1 is Ready,AdapterIndex=200,IkeIndex=6,LocTepIpAdr=192.168.21.103,AltRekey=1
03.05.2021 22:25:19 - Ike: ConRef=6, RECV_MSG2_AUTH, name=XXXXXXXX, vpngw=XX.XXX.XXX.XX:443
03.05.2021 22:25:19 - Ikev2: ConRef=6,Received notify messages -
03.05.2021 22:25:19 - Ikev2: ConRef=6, Received 1 certificates.
03.05.2021 22:25:19 - Auth: ConRef=6, PKI response with errorcode=0.
03.05.2021 22:25:19 - Ike: ConRef=6, RECV_MSG2_AUTH_RESUME1, name=XXXXXXXX, vpngw=XX.XXX.XXX.XX:443
03.05.2021 22:25:19 - Auth: ConRef=6,Remote is authenticating with=1,RSA
03.05.2021 22:25:19 - IkeV2: ConRef=6,Auth - Receiving EAP payload
03.05.2021 22:25:19 - EAP: recv identity request,User=<XXX@XXX.com>
03.05.2021 22:25:19 - EAP: sending identity response,User=<XXX@XXX.com>
03.05.2021 22:25:19 - Ike: ConRef=6, RECV_MSG2_AUTH, name=XXXXXXXX, vpngw=XX.XXX.XXX.XX:443
03.05.2021 22:25:19 - Ikev2: ConRef=6,Received notify messages -
03.05.2021 22:25:19 - IkeV2: ConRef=6,Auth - Receiving EAP payload
03.05.2021 22:25:19 - EAP MSCHAP2:recv challenge for userid=<XXX@XXX.com>
03.05.2021 22:25:19 - EAP MSCHAP2:send response for userid=<XXX@XXX.com>
03.05.2021 22:25:19 - Ike: ConRef=6, RECV_MSG2_AUTH, name=XXXXXXXX, vpngw=XX.XXX.XXX.XX:443
03.05.2021 22:25:19 - Ikev2: ConRef=6,Received notify messages -
03.05.2021 22:25:19 - IkeV2: ConRef=6,Auth - Receiving EAP payload
03.05.2021 22:25:19 - EAP MSCHAP2:recv success for userid=<XXX@XXX.com>
03.05.2021 22:25:19 - EAP MSCHAP2:send ack for userid=<XXX@XXX.com>
03.05.2021 22:25:19 - Ike: ConRef=6, RECV_MSG2_AUTH, name=XXXXXXXX, vpngw=XX.XXX.XXX.XX:443
03.05.2021 22:25:19 - Ikev2: ConRef=6,Received notify messages -
03.05.2021 22:25:19 - IkeV2: ConRef=6,Auth - Receiving EAP payload
03.05.2021 22:25:19 - Eap: status=0,Method=MSCHAPV2
03.05.2021 22:25:19 - Eap: status success,method=MSCHAPV2
03.05.2021 22:25:19 - Ike: ConRef=6, XMIT_MSG1_AUTH__AFTER_EAP, name=XXXXXXXX, vpngw=XX.XXX.XXX.XX:443
03.05.2021 22:25:19 - Auth: ConRef=6,Local is authenticating with=2,Shared key
03.05.2021 22:25:19 - Ike: ConRef=6, XMIT_MSG1_AUTH__AFTER_EAP_RESUME3, name=XXXXXXXX, vpngw=XX.XXX.XXX.XX:443
03.05.2021 22:25:19 - Ike: ConRef=6, RECV_MSG2_AUTH, name=XXXXXXXX, vpngw=XX.XXX.XXX.XX:443
03.05.2021 22:25:19 - Ikev2: ConRef=6,Received notify messages -
03.05.2021 22:25:19 - Ikev2: Notifymsg=<IKEV2_NOTIFY_INITIAL_CONTACT>
03.05.2021 22:25:19 - Ike: ConRef=6, RECV_MSG2_AUTH_RESUME1, name=XXXXXXXX, vpngw=XX.XXX.XXX.XX:443
03.05.2021 22:25:19 - Auth: ConRef=6,Remote is authenticating with=2,Shared key
03.05.2021 22:25:19 - Ikev2:recv IDR payload:ID_DER_ASN1_DN:pid=0,port=0,3014311230100603
03.05.2021 22:25:19 - IKESA2_CHILD: - ConRef=6, protection suite:
03.05.2021 22:25:19 - PID=3,#ENCR=20,KEYLEN=256,INTEG=0,PRF=0,DHGRP=0,AUTHM=0,CERTON=0
03.05.2021 22:25:19 - INSPIL=4,INSPI=b3532623,OUTSPIL=4,OUTSPI=59c2d8b1,LifeType=1,LifeSec=31536000,LifeKb=50000
03.05.2021 22:25:19 - Ikev2 Child: ConRef=6,recv TSI=192.168.25.205-192.168.25.205
03.05.2021 22:25:19 - Ikev2 Child: ConRef=6,recv TSR=192.168.25.0-192.168.25.255
03.05.2021 22:25:19 - IkeV2: ConRef=6,Auth-Turning on DPD mode
03.05.2021 22:25:19 - IPSec: Quick Mode is Ready: IkeIndex=6,VpnSrcPort=9500
03.05.2021 22:25:19 - IPSec: Assigned IP Address:IPv4=192.168.25.205,IPv6=0.0.0.0
03.05.2021 22:25:19 - IPSec: Assigned IP Network Mask:IPv4=0.0.0.0,IPv6=0.0.0.0
03.05.2021 22:25:19 - IPSec: Gateway IP Address:IPv4=0.0.0.0,IPv6=0.0.0.0
03.05.2021 22:25:19 - IPSec: Primary DNS Server: 192.168.25.1
03.05.2021 22:25:19 - IPSec: Secondary DNS Server: 192.168.25.1
03.05.2021 22:25:19 - IPSec: Primary WINS Server: 0.0.0.0
03.05.2021 22:25:19 - IPSec: Secondary WINS Server: 0.0.0.0
03.05.2021 22:25:19 - IPSec: Primary NCP SEM Server: 0.0.0.0
03.05.2021 22:25:19 - IPSec: Secondary NCP SEM Server: 0.0.0.0
03.05.2021 22:25:19 - IPSec: Primary DNS6 Server: 0.0.0.0
03.05.2021 22:25:19 - IPSec: Secondary DNS6 Server: 0.0.0.0
03.05.2021 22:25:19 - IPSec: Primary NCP SEM6 Server: 0.0.0.0
03.05.2021 22:25:19 - IPSec: Secondary NCP SEM6 Server: 0.0.0.0
03.05.2021 22:25:19 - IPSec: Conref=6, Created an IPSEC SA with the following characteristics
03.05.2021 22:25:19 - Gateway=XX.XXX.XXX.XX,NatdMode=0,Roamingcon=0
03.05.2021 22:25:19 - srcranges=[192.168.25.205:0-192.168.25.205:65535],
03.05.2021 22:25:19 - dstranges=[192.168.25.0:0-192.168.25.255:65535],
03.05.2021 22:25:19 - IPSec:ConRef=6 connected: Effective ESP LifeDuration in Seconds = 22075200,Effective IKE lifetime=22075200
03.05.2021 22:25:19 - IPSec: Connected to XXXXXXXX on channel 1.
03.05.2021 22:25:19 - ncpadapter: set IP adapter properties
03.05.2021 22:25:19 - ncpadapter: set ipv4 properties,ip4adr=192.168.25.205,ip4selneg=1
03.05.2021 22:25:19 - ncpadapter: set_ip4_properties, manual=0
03.05.2021 22:25:19 - System: Setting NCP virtual adapter linkstatus=1,laststate=0.
03.05.2021 22:25:19 - System: Setting NCP virtual adapter linkstatus=1,laststate=1.
03.05.2021 22:25:19 - PPP(Ipcp): connected to XXXXXXXX with IP Address: 192.168.25.205
03.05.2021 22:25:19 - SUCCESS: IpSec connection ready
03.05.2021 22:25:19 - ipdhcp: xmit response,f_param.yiaddr=192.168.25.205
03.05.2021 22:25:19 - Link: dhcp ack sent
03.05.2021 22:25:20 - DhcpV6: received MSG_CONFIRM, adapterstate=2
03.05.2021 22:25:21 - DhcpV6: received MSG_CONFIRM, adapterstate=2
03.05.2021 22:25:22 - INFO - MONITOR: Connected -> XXXXXXXX
03.05.2021 22:25:22 - INFO - MONITOR: Media=Automatic, Tx=7107 Byte, Rx=5970 Byte
03.05.2021 22:25:22 - Link: iphlp_renew_done
03.05.2021 22:25:22 - SUCCESS: Link -> <XXXXXXXX> IP address assigned to IP stack - link is operational.
03.05.2021 22:25:22 - osspecific_add_dns: cmdline=netsh interface ipv4 add dnsservers 11 192.168.25.2 validate=no
03.05.2021 22:25:22 - osspecific_add_dns: cmdline=netsh interface ipv4 add dnsservers 11 192.168.25.1 validate=no
03.05.2021 22:25:22 - osspecific_add_dns: cmdline=netsh interface ipv4 add dnsservers 11 192.168.25.1 validate=no
03.05.2021 22:27:23 - System: DNSHandling=0
03.05.2021 22:27:23 - IPSec: Start building connection
03.05.2021 22:27:23 - IpsDial: Generate available provider links - media available is = 2200
03.05.2021 22:27:23 - IpsDial: Created the following list of provider links:
03.05.2021 22:27:23 - IPSec: DNSREQ: resolving GW=<XXX.de> over lan:
03.05.2021 22:27:23 - IPSec: DNSREQ resolved vpn ipadr=XX.XXX.XXX.XX,ipadr6=0.0.0.0
03.05.2021 22:27:23 - ipsdial: resolved at least one remote tunnel endpoint.
03.05.2021 22:27:23 - IpsDial: connection time interface choice,LocIpa=192.168.21.103,AdapterIndex=200
03.05.2021 22:27:23 - Ikev2: Opening connection in PATHFINDER mode : XXXXXXXX
03.05.2021 22:27:23 - Ikev2: Outgoing connect request IKEv2 mode - gateway=XX.XXX.XXX.XX : XXXXXXXX
03.05.2021 22:27:23 - Ikev2: ConRef=7, XMIT_MSG1_INIT, name=XXXXXXXX, vpngw=XX.XXX.XXX.XX:500
03.05.2021 22:27:26 - Isakmp: re-sending packet to=XX.XXX.XXX.XX:500,size=1060
03.05.2021 22:27:30 - IKEv2(INIT): Switching to TCP ENCAPSULATION in PATHFINDER_1 : XXXXXXXX
03.05.2021 22:27:30 - Ike: Opening PATHFINDER1 connection: XXXXXXXX
03.05.2021 22:27:30 - Ikev2: Pathfinder-Outgoing connect request : XXXXXXXX
03.05.2021 22:27:30 - Ikev2: ConRef=7, XMIT_MSG1_INIT, name=XXXXXXXX, vpngw=XX.XXX.XXX.XX:443
03.05.2021 22:27:30 - Ikev2: ConRef=7, RECV_MSG2_INIT, adapterindex=0,name=XXXXXXXX, remote ip:port=XX.XXX.XXX.XX:443,local ip:port=0.0.0.0:9500
03.05.2021 22:27:30 - Ikev2: ConRef=7,Received notify messages -
03.05.2021 22:27:30 - Ikev2: Notifymsg=<IKEV2_FRAGMENTATION_SUPPORTED>
03.05.2021 22:27:30 - Ike: Turning on IKE fragment mode - XXXXXXXX
03.05.2021 22:27:30 - IPSec: Final Tunnel EndPoint is=XX.XXX.XXX.XX
03.05.2021 22:27:30 - Ikev2: RECV_MSG2_INIT - ConRef=7, Remote supports IKEv2 fragmentation
03.05.2021 22:27:30 - IKESA2_INIT: - ConRef=7, protection suite:
03.05.2021 22:27:30 - PID=1,#ENCR=20,KEYLEN=256,INTEG=0,PRF=5,DHGRP=14,AUTHM=0,CERTON=0
03.05.2021 22:27:30 - INSPIL=0,INSPI=00000000,OUTSPIL=0,OUTSPI=00000000,LifeType=1,LifeSec=31536000,LifeKb=0
03.05.2021 22:27:30 - Ike: ConRef=7, XMIT_MSG1_AUTH, name=XXXXXXXX, vpngw=XX.XXX.XXX.XX:443
03.05.2021 22:27:30 - Ike: ConRef=7, XMIT_MSG1_AUTH_BEFORE_EAP0, name=XXXXXXXX, vpngw=XX.XXX.XXX.XX:443
03.05.2021 22:27:30 - Ike: ConRef=7, XMIT_MSG1_AUTH_RESUME0, name=XXXXXXXX, vpngw=XX.XXX.XXX.XX:443
03.05.2021 22:27:30 - Auth: ConRef=7, no local ID configured --> using a default
03.05.2021 22:27:30 - Ikev2:send idi payload:ID_IPV4_ADDR:pid=0,port=0,192.168.254.2
03.05.2021 22:27:30 - Ike: ConRef=7, XMIT_MSG1_AUTH_RESUME1, name=XXXXXXXX, vpngw=XX.XXX.XXX.XX:443
03.05.2021 22:27:30 - Ikev2 Child: ConRef=7,send request TSI=0.0.0.0-255.255.255.255
03.05.2021 22:27:30 - Ikev2 Child: ConRef=7,send request TSR=192.168.25.0-192.168.25.255
03.05.2021 22:27:30 - IkeV2: ConRef=7,Auth - initiating an EAP session
03.05.2021 22:27:30 - IPSec: Phase1 is Ready,AdapterIndex=200,IkeIndex=7,LocTepIpAdr=192.168.21.103,AltRekey=1
03.05.2021 22:27:31 - Ike: ConRef=7, RECV_MSG2_AUTH, name=XXXXXXXX, vpngw=XX.XXX.XXX.XX:443
03.05.2021 22:27:31 - Ikev2: ConRef=7,Received notify messages -
03.05.2021 22:27:31 - Ikev2: ConRef=7, Received 1 certificates.
03.05.2021 22:27:31 - Auth: ConRef=7, PKI response with errorcode=0.
03.05.2021 22:27:31 - Ike: ConRef=7, RECV_MSG2_AUTH_RESUME1, name=XXXXXXXX, vpngw=XX.XXX.XXX.XX:443
03.05.2021 22:27:31 - Auth: ConRef=7,Remote is authenticating with=1,RSA
03.05.2021 22:27:31 - IkeV2: ConRef=7,Auth - Receiving EAP payload
03.05.2021 22:27:31 - EAP: recv identity request,User=<XXX@XXX.com>
03.05.2021 22:27:31 - EAP: sending identity response,User=<XXX@XXX.com>
03.05.2021 22:27:31 - Ike: ConRef=7, RECV_MSG2_AUTH, name=XXXXXXXX, vpngw=XX.XXX.XXX.XX:443
03.05.2021 22:27:31 - Ikev2: ConRef=7,Received notify messages -
03.05.2021 22:27:31 - IkeV2: ConRef=7,Auth - Receiving EAP payload
03.05.2021 22:27:31 - EAP MSCHAP2:recv challenge for userid=<XXX@XXX.com>
03.05.2021 22:27:31 - EAP MSCHAP2:send response for userid=<XXX@XXX.com>
03.05.2021 22:27:31 - Ike: ConRef=7, RECV_MSG2_AUTH, name=XXXXXXXX, vpngw=XX.XXX.XXX.XX:443
03.05.2021 22:27:31 - Ikev2: ConRef=7,Received notify messages -
03.05.2021 22:27:31 - IkeV2: ConRef=7,Auth - Receiving EAP payload
03.05.2021 22:27:31 - EAP MSCHAP2:recv success for userid=<XXX@XXX.com>
03.05.2021 22:27:31 - EAP MSCHAP2:send ack for userid=<XXX@XXX.com>
03.05.2021 22:27:31 - Ike: ConRef=7, RECV_MSG2_AUTH, name=XXXXXXXX, vpngw=XX.XXX.XXX.XX:443
03.05.2021 22:27:31 - Ikev2: ConRef=7,Received notify messages -
03.05.2021 22:27:31 - IkeV2: ConRef=7,Auth - Receiving EAP payload
03.05.2021 22:27:31 - Eap: status=0,Method=MSCHAPV2
03.05.2021 22:27:31 - Eap: status success,method=MSCHAPV2
03.05.2021 22:27:31 - Ike: ConRef=7, XMIT_MSG1_AUTH__AFTER_EAP, name=XXXXXXXX, vpngw=XX.XXX.XXX.XX:443
03.05.2021 22:27:31 - Auth: ConRef=7,Local is authenticating with=2,Shared key
03.05.2021 22:27:31 - Ike: ConRef=7, XMIT_MSG1_AUTH__AFTER_EAP_RESUME3, name=XXXXXXXX, vpngw=XX.XXX.XXX.XX:443
03.05.2021 22:27:31 - Ike: ConRef=7, RECV_MSG2_AUTH, name=XXXXXXXX, vpngw=XX.XXX.XXX.XX:443
03.05.2021 22:27:31 - Ikev2: ConRef=7,Received notify messages -
03.05.2021 22:27:31 - Ikev2: Notifymsg=<IKEV2_NOTIFY_INITIAL_CONTACT>
03.05.2021 22:27:31 - Ike: ConRef=7, RECV_MSG2_AUTH_RESUME1, name=XXXXXXXX, vpngw=XX.XXX.XXX.XX:443
03.05.2021 22:27:31 - Auth: ConRef=7,Remote is authenticating with=2,Shared key
03.05.2021 22:27:31 - Ikev2:recv IDR payload:ID_DER_ASN1_DN:pid=0,port=0,3014311230100603
03.05.2021 22:27:31 - IKESA2_CHILD: - ConRef=7, protection suite:
03.05.2021 22:27:31 - PID=3,#ENCR=20,KEYLEN=256,INTEG=0,PRF=0,DHGRP=0,AUTHM=0,CERTON=0
03.05.2021 22:27:31 - INSPIL=4,INSPI=39192c4e,OUTSPIL=4,OUTSPI=8da025d6,LifeType=1,LifeSec=31536000,LifeKb=50000
03.05.2021 22:27:31 - Ikev2 Child: ConRef=7,recv TSI=192.168.25.205-192.168.25.205
03.05.2021 22:27:31 - Ikev2 Child: ConRef=7,recv TSR=192.168.25.0-192.168.25.255
03.05.2021 22:27:31 - IkeV2: ConRef=7,Auth-Turning on DPD mode
03.05.2021 22:27:31 - IPSec: Quick Mode is Ready: IkeIndex=7,VpnSrcPort=9500
03.05.2021 22:27:31 - IPSec: Assigned IP Address:IPv4=192.168.25.205,IPv6=0.0.0.0
03.05.2021 22:27:31 - IPSec: Assigned IP Network Mask:IPv4=0.0.0.0,IPv6=0.0.0.0
03.05.2021 22:27:31 - IPSec: Gateway IP Address:IPv4=0.0.0.0,IPv6=0.0.0.0
03.05.2021 22:27:31 - IPSec: Primary DNS Server: 192.168.25.1
03.05.2021 22:27:31 - IPSec: Secondary DNS Server: 192.168.25.1
03.05.2021 22:27:31 - IPSec: Primary WINS Server: 0.0.0.0
03.05.2021 22:27:31 - IPSec: Secondary WINS Server: 0.0.0.0
03.05.2021 22:27:31 - IPSec: Primary NCP SEM Server: 0.0.0.0
03.05.2021 22:27:31 - IPSec: Secondary NCP SEM Server: 0.0.0.0
03.05.2021 22:27:31 - IPSec: Primary DNS6 Server: 0.0.0.0
03.05.2021 22:27:31 - IPSec: Secondary DNS6 Server: 0.0.0.0
03.05.2021 22:27:31 - IPSec: Primary NCP SEM6 Server: 0.0.0.0
03.05.2021 22:27:31 - IPSec: Secondary NCP SEM6 Server: 0.0.0.0
03.05.2021 22:27:31 - IPSec: Conref=7, Created an IPSEC SA with the following characteristics
03.05.2021 22:27:31 - Gateway=XX.XXX.XXX.XX,NatdMode=0,Roamingcon=0
03.05.2021 22:27:31 - srcranges=[192.168.25.205:0-192.168.25.205:65535],
03.05.2021 22:27:31 - dstranges=[192.168.25.0:0-192.168.25.255:65535],
03.05.2021 22:27:31 - IPSec:ConRef=7 connected: Effective ESP LifeDuration in Seconds = 22075200,Effective IKE lifetime=22075200
03.05.2021 22:27:31 - IPSec: Connected to XXXXXXXX on channel 1.
03.05.2021 22:27:31 - ncpadapter: set IP adapter properties
03.05.2021 22:27:31 - ncpadapter: set ipv4 properties,ip4adr=192.168.25.205,ip4selneg=1
03.05.2021 22:27:31 - ncpadapter: set_ip4_properties, manual=0
03.05.2021 22:27:31 - System: Setting NCP virtual adapter linkstatus=1,laststate=0.
03.05.2021 22:27:31 - System: Setting NCP virtual adapter linkstatus=1,laststate=1.
03.05.2021 22:27:31 - PPP(Ipcp): connected to XXXXXXXX with IP Address: 192.168.25.205
03.05.2021 22:27:31 - SUCCESS: IpSec connection ready
03.05.2021 22:27:31 - ipdhcp: xmit response,f_param.yiaddr=192.168.25.205
03.05.2021 22:27:31 - ipdhcp: xmit response,f_param.yiaddr=192.168.25.205
03.05.2021 22:27:31 - Link: dhcp ack sent
03.05.2021 22:27:33 - DhcpV6: received MSG_CONFIRM, adapterstate=2
03.05.2021 22:27:33 - DhcpV6: received MSG_CONFIRM, adapterstate=2
03.05.2021 22:27:33 - INFO - MONITOR: Connected -> XXXXXXXX
03.05.2021 22:27:33 - INFO - MONITOR: Media=Automatic, Tx=316071 Byte, Rx=1424179 Byte
03.05.2021 22:27:34 - Link: iphlp_renew_done
03.05.2021 22:27:34 - SUCCESS: Link -> <XXXXXXXX> IP address assigned to IP stack - link is operational.
03.05.2021 22:27:34 - osspecific_add_dns: cmdline=netsh interface ipv4 add dnsservers 11 192.168.25.2 validate=no
03.05.2021 22:27:34 - osspecific_add_dns: cmdline=netsh interface ipv4 add dnsservers 11 192.168.25.1 validate=no
03.05.2021 22:27:34 - osspecific_add_dns: cmdline=netsh interface ipv4 add dnsservers 11 192.168.25.1 validate=no
03.05.2021 22:27:34 - osspecific_add_dns: cmdline=netsh interface ipv4 add dnsservers 11 192.168.25.1 validate=no
03.05.2021 22:27:35 - DhcpV6: received MSG_CONFIRM, adapterstate=2
03.05.2021 22:27:39 - DhcpV6: received MSG_SOLICIT, adapterstate=2
03.05.2021 22:27:40 - DhcpV6: received MSG_REQUEST, adapterstate=2
03.05.2021 22:28:42 - Ikev2: ConRef=7,SEND: NOTIFY_MSG_R_U_HERE
03.05.2021 22:28:46 - Isakmp: re-sending packet to=XX.XXX.XXX.XX:443,size=68
03.05.2021 22:28:50 - Isakmp: re-sending packet to=XX.XXX.XXX.XX:443,size=68
03.05.2021 22:28:54 - Isakmp: re-sending packet to=XX.XXX.XXX.XX:443,size=68
03.05.2021 22:28:58 - Isakmp: re-sending packet to=XX.XXX.XXX.XX:443,size=68
03.05.2021 22:29:02 - Isakmp: re-sending packet to=XX.XXX.XXX.XX:443,size=68
03.05.2021 22:29:06 - Isakmp: re-sending packet to=XX.XXX.XXX.XX:443,size=68
03.05.2021 22:29:10 - Isakmp: re-sending packet to=XX.XXX.XXX.XX:443,size=68
03.05.2021 22:29:14 - INFO - MONITOR: Disconnected
03.05.2021 22:29:14 - INFO - MONITOR: Media=Automatic, Tx=821555 Byte, Rx=3330206 Byte
03.05.2021 22:29:14 - ERROR - 4035: IKE(phase1):Disconnect due to no DPD response.
03.05.2021 22:29:14 - Ikev2: phase1:name(XXXXXXXX) - ConRef=7,ERROR - DPD timer response expired
03.05.2021 22:29:14 - IPSec: Disconnected from XXXXXXXX on channel 1.
03.05.2021 22:29:14 - ncpadapter: reset IP adapter properties
03.05.2021 22:29:14 - ncpadapter: reset ipv4 properties,ip4adr=192.168.25.205
03.05.2021 22:29:14 - ncpadapter: reset_ip4_properties, manual=0
03.05.2021 22:29:14 - osspecific_del_dns: cmdline=netsh interface ipv4 delete dnsservers 11 all validate=no
03.05.2021 22:29:14 - osspecific_del_dns: cmdline=netsh interface ipv4 delete dnsservers 11 all validate=no
03.05.2021 22:29:15 - osspecific_del_dns: cmdline=netsh interface ipv4 delete dnsservers 11 all validate=no
03.05.2021 22:29:15 - osspecific_del_dns: cmdline=netsh interface ipv4 delete dnsservers 11 all validate=no
03.05.2021 22:29:15 - System: Setting NCP virtual adapter linkstatus=0,laststate=1.