Haken bei SHA-256 drin, AES-GCM bei Default und FH rausgenommen. Ich mache das ganze über WAN - wobei mein WAN internes Netz ist, Aufbau sieht wie folgt aus
1936VAG-5G spielt den Router und spannt das 192.168.178.0/24 er Netz auf, da ist das Tablet per WLAN drin und der WAN-Anschluss vom 2100EF, das interne Netz vom 2100EF ist 192.168.99.0/24. Also von daher das sollte eigentlich kein Problem darstellen.
Code: Alles auswählen
[VPN-IKE] 2025/05/29 22:30:40,388 Devicetime: 2025/05/29 22:30:39,254
[DEFAULT] Received packet:
IKE 2.0 Header:
Source/Port : 192.168.178.79:55605
Destination/Port : 192.168.178.125:500
Routing-tag : 0
Com-channel : 0
| Initiator cookie : 13 73 E7 69 90 BC 9B B2
| Responder cookie : 00 00 00 00 00 00 00 00
| Next Payload : SA
| Version : 2.0
| Exchange type : IKE_SA_INIT
| Flags : 0x08 Initiator
| Msg-ID : 0
| Length : 940 Bytes
SA Payload
| Next Payload : NONCE
| CRITICAL : NO
| Reserved : 0x00
| Length : 276 Bytes
| PROPOSAL Payload
| | Next Payload : PROPOSAL
| | Reserved : 0x00
| | Length : 116 Bytes
| | Proposal number : 1
| | Protocol ID : IPSEC_IKE
| | SPI size : 0
| | #Transforms : 12
| | TRANSFORM Payload
| | | Next Payload : TRANSFORM
| | | Reserved : 0x00
| | | Length : 12 Bytes
| | | Transform Type: ENCR (1)
| | | Reserved2 : 0x00
| | | Transform ID : AES-CBC (12)
| | | Attribute 0
| | | | Type : Basic, KEYLENGTH
| | | | Value : 256
| | TRANSFORM Payload
| | | Next Payload : TRANSFORM
| | | Reserved : 0x00
| | | Length : 12 Bytes
| | | Transform Type: ENCR (1)
| | | Reserved2 : 0x00
| | | Transform ID : AES-CBC (12)
| | | Attribute 0
| | | | Type : Basic, KEYLENGTH
| | | | Value : 192
| | TRANSFORM Payload
| | | Next Payload : TRANSFORM
| | | Reserved : 0x00
| | | Length : 12 Bytes
| | | Transform Type: ENCR (1)
| | | Reserved2 : 0x00
| | | Transform ID : AES-CBC (12)
| | | Attribute 0
| | | | Type : Basic, KEYLENGTH
| | | | Value : 128
| | TRANSFORM Payload
| | | Next Payload : TRANSFORM
| | | Reserved : 0x00
| | | Length : 8 Bytes
| | | Transform Type: INTEG (3)
| | | Reserved2 : 0x00
| | | Transform ID : HMAC-SHA-512 (14)
| | | Attributes : NONE
| | TRANSFORM Payload
| | | Next Payload : TRANSFORM
| | | Reserved : 0x00
| | | Length : 8 Bytes
| | | Transform Type: INTEG (3)
| | | Reserved2 : 0x00
| | | Transform ID : HMAC-SHA-384 (13)
| | | Attributes : NONE
| | TRANSFORM Payload
| | | Next Payload : TRANSFORM
| | | Reserved : 0x00
| | | Length : 8 Bytes
| | | Transform Type: INTEG (3)
| | | Reserved2 : 0x00
| | | Transform ID : HMAC-SHA-256 (12)
| | | Attributes : NONE
| | TRANSFORM Payload
| | | Next Payload : TRANSFORM
| | | Reserved : 0x00
| | | Length : 8 Bytes
| | | Transform Type: INTEG (3)
| | | Reserved2 : 0x00
| | | Transform ID : AES-XCBC-96 (5)
| | | Attributes : NONE
| | TRANSFORM Payload
| | | Next Payload : TRANSFORM
| | | Reserved : 0x00
| | | Length : 8 Bytes
| | | Transform Type: DH (4)
| | | Reserved2 : 0x00
| | | Transform ID : 4096-BIT MODP (16)
| | | Attributes : NONE
| | TRANSFORM Payload
| | | Next Payload : TRANSFORM
| | | Reserved : 0x00
| | | Length : 8 Bytes
| | | Transform Type: DH (4)
| | | Reserved2 : 0x00
| | | Transform ID : 3072-BIT MODP (15)
| | | Attributes : NONE
| | TRANSFORM Payload
| | | Next Payload : TRANSFORM
| | | Reserved : 0x00
| | | Length : 8 Bytes
| | | Transform Type: DH (4)
| | | Reserved2 : 0x00
| | | Transform ID : 2048-BIT MODP (14)
| | | Attributes : NONE
| | TRANSFORM Payload
| | | Next Payload : TRANSFORM
| | | Reserved : 0x00
| | | Length : 8 Bytes
| | | Transform Type: PRF (2)
| | | Reserved2 : 0x00
| | | Transform ID : PRF-HMAC-SHA1 (2)
| | | Attributes : NONE
| | TRANSFORM Payload
| | | Next Payload : NONE
| | | Reserved : 0x00
| | | Length : 8 Bytes
| | | Transform Type: PRF (2)
| | | Reserved2 : 0x00
| | | Transform ID : PRF-AES128-XCBC (4)
| | | Attributes : NONE
| PROPOSAL Payload
| | Next Payload : NONE
| | Reserved : 0x00
| | Length : 156 Bytes
| | Proposal number : 2
| | Protocol ID : IPSEC_IKE
| | SPI size : 0
| | #Transforms : 14
| | TRANSFORM Payload
| | | Next Payload : TRANSFORM
| | | Reserved : 0x00
| | | Length : 12 Bytes
| | | Transform Type: ENCR (1)
| | | Reserved2 : 0x00
| | | Transform ID : AES-GCM-16 (20)
| | | Attribute 0
| | | | Type : Basic, KEYLENGTH
| | | | Value : 256
| | TRANSFORM Payload
| | | Next Payload : TRANSFORM
| | | Reserved : 0x00
| | | Length : 12 Bytes
| | | Transform Type: ENCR (1)
| | | Reserved2 : 0x00
| | | Transform ID : AES-GCM-12 (19)
| | | Attribute 0
| | | | Type : Basic, KEYLENGTH
| | | | Value : 256
| | TRANSFORM Payload
| | | Next Payload : TRANSFORM
| | | Reserved : 0x00
| | | Length : 12 Bytes
| | | Transform Type: ENCR (1)
| | | Reserved2 : 0x00
| | | Transform ID : AES-GCM-8 (18)
| | | Attribute 0
| | | | Type : Basic, KEYLENGTH
| | | | Value : 256
| | TRANSFORM Payload
| | | Next Payload : TRANSFORM
| | | Reserved : 0x00
| | | Length : 12 Bytes
| | | Transform Type: ENCR (1)
| | | Reserved2 : 0x00
| | | Transform ID : AES-GCM-16 (20)
| | | Attribute 0
| | | | Type : Basic, KEYLENGTH
| | | | Value : 192
| | TRANSFORM Payload
| | | Next Payload : TRANSFORM
| | | Reserved : 0x00
| | | Length : 12 Bytes
| | | Transform Type: ENCR (1)
| | | Reserved2 : 0x00
| | | Transform ID : AES-GCM-12 (19)
| | | Attribute 0
| | | | Type : Basic, KEYLENGTH
| | | | Value : 192
| | TRANSFORM Payload
| | | Next Payload : TRANSFORM
| | | Reserved : 0x00
| | | Length : 12 Bytes
| | | Transform Type: ENCR (1)
| | | Reserved2 : 0x00
| | | Transform ID : AES-GCM-8 (18)
| | | Attribute 0
| | | | Type : Basic, KEYLENGTH
| | | | Value : 192
| | TRANSFORM Payload
| | | Next Payload : TRANSFORM
| | | Reserved : 0x00
| | | Length : 12 Bytes
| | | Transform Type: ENCR (1)
| | | Reserved2 : 0x00
| | | Transform ID : AES-GCM-16 (20)
| | | Attribute 0
| | | | Type : Basic, KEYLENGTH
| | | | Value : 128
| | TRANSFORM Payload
| | | Next Payload : TRANSFORM
| | | Reserved : 0x00
| | | Length : 12 Bytes
| | | Transform Type: ENCR (1)
| | | Reserved2 : 0x00
| | | Transform ID : AES-GCM-12 (19)
| | | Attribute 0
| | | | Type : Basic, KEYLENGTH
| | | | Value : 128
| | TRANSFORM Payload
| | | Next Payload : TRANSFORM
| | | Reserved : 0x00
| | | Length : 12 Bytes
| | | Transform Type: ENCR (1)
| | | Reserved2 : 0x00
| | | Transform ID : AES-GCM-8 (18)
| | | Attribute 0
| | | | Type : Basic, KEYLENGTH
| | | | Value : 128
| | TRANSFORM Payload
| | | Next Payload : TRANSFORM
| | | Reserved : 0x00
| | | Length : 8 Bytes
| | | Transform Type: DH (4)
| | | Reserved2 : 0x00
| | | Transform ID : 4096-BIT MODP (16)
| | | Attributes : NONE
| | TRANSFORM Payload
| | | Next Payload : TRANSFORM
| | | Reserved : 0x00
| | | Length : 8 Bytes
| | | Transform Type: DH (4)
| | | Reserved2 : 0x00
| | | Transform ID : 3072-BIT MODP (15)
| | | Attributes : NONE
| | TRANSFORM Payload
| | | Next Payload : TRANSFORM
| | | Reserved : 0x00
| | | Length : 8 Bytes
| | | Transform Type: DH (4)
| | | Reserved2 : 0x00
| | | Transform ID : 2048-BIT MODP (14)
| | | Attributes : NONE
| | TRANSFORM Payload
| | | Next Payload : TRANSFORM
| | | Reserved : 0x00
| | | Length : 8 Bytes
| | | Transform Type: PRF (2)
| | | Reserved2 : 0x00
| | | Transform ID : PRF-HMAC-SHA1 (2)
| | | Attributes : NONE
| | TRANSFORM Payload
| | | Next Payload : NONE
| | | Reserved : 0x00
| | | Length : 8 Bytes
| | | Transform Type: PRF (2)
| | | Reserved2 : 0x00
| | | Transform ID : PRF-AES128-XCBC (4)
| | | Attributes : NONE
NONCE Payload
| Next Payload : KE
| CRITICAL : NO
| Reserved : 0x00
| Length : 36 Bytes
| Nonce(256 bits) : 00 33 D7 54 EE 5F F4 9B 13 14 09 4C 20 8C FC F5
| 56 7A 54 5D C2 1B 86 DB 51 B2 AE 20 CE FE 39 65
KE Payload
| Next Payload : NOTIFY
| CRITICAL : NO
| Reserved : 0x00
| Length : 520 Bytes
| DH Group : 16
| Reserved2 : 0x0000
| DH-Key(4096 bits) : 85 2C 05 2E 6F E9 71 A7 4F D1 F3 39 5D 5E A2 F1
| AF 7A 53 54 E4 F9 4F D0 E6 64 DE 3E 58 42 BC 3C
| 17 1F D3 71 9C CA 6F 96 8F 36 46 31 02 C5 B2 71
| A0 72 5B 5C 63 C4 92 52 F9 A1 9F 61 88 22 79 DE
| BD 7B A5 ED D3 F8 02 ED 6F 7D 17 52 0D 5A 15 06
| B3 95 B3 64 A8 6A C1 0A 6B 3B B7 F6 95 FE 54 A0
| C0 D4 E0 10 66 B6 4A 65 D1 4D 0C B4 DC 86 A7 C6
| 47 D5 75 94 43 25 14 1B B1 73 B0 AA 1D 0D 0E 30
| 8F 63 52 BC AA 76 8C 2C 88 8D 6D 41 71 6D 83 6F
| 14 10 B9 F2 6C 0A EB 5F 29 69 0D 15 A0 8E F6 38
| 2C CA 52 EF 9C E4 92 B1 35 29 CB C4 F1 2C 27 00
| 14 B4 57 ED 35 97 34 9F F5 93 CE 77 0A C3 9F EC
| EF 0B 45 51 71 F6 29 C6 79 F2 D8 C0 90 17 02 C5
| 09 6E 9D 55 89 7A 38 45 3C 4B AC E6 06 C3 24 8E
| 2C 5C D5 BE DD FE 01 B3 68 EF 48 8C 1C 9F 8F B9
| 22 6F D9 65 24 CD 70 72 92 68 BB 91 03 9F A7 4E
| C8 0D E6 BB EB 28 91 8E 14 15 90 2D B7 AE 27 6A
| 1D 54 31 53 CA 4E 5E 41 3E 20 06 FD 7A 73 8B 04
| 13 3F 76 13 91 B8 23 DA 15 10 67 02 FF 0F 4E EA
| 34 2F 62 7C D1 BE 2A F9 D8 55 5D 4D AA 8C 66 51
| CB 24 8B 4F 12 6F 8F 75 5D 1B E7 80 F5 E4 58 37
| 5B F7 E0 BF 75 5E BA 8F 32 53 44 00 92 DC 84 8A
| 12 42 51 99 9F 86 5F AE 55 8E 73 8A D9 88 9E 36
| 3D F9 31 59 35 A6 3C 71 5A 8D DA 07 78 3D 52 0F
| F7 FD 3C 9B D3 FA 00 42 D1 6E 34 D7 FE 88 9C 04
| A5 FC D9 A9 8B 45 B8 DA 47 DD 94 EE 42 2B 1C 8F
| 46 8B 33 25 2D 78 6D BC 1C 5C DA CA 5A B8 34 1D
| B3 07 AA DD CC FD 16 93 80 91 EC 8D FB 26 BD CF
| AC 72 32 F3 BD 55 DE 79 D7 4F 6F 0E 25 B0 4B 88
| DF 9A 6F 08 C2 67 C0 D6 91 3B 49 57 27 D1 FF C8
| AE D5 3E 6F 95 5B A7 84 D1 18 12 41 9A D4 28 BC
| 22 FF F5 C5 8F CF 7A E0 D6 9B 03 BB ED 3C FD 1A
NOTIFY Payload
| Next Payload : NOTIFY
| CRITICAL : NO
| Reserved : 0x00
| Length : 28 Bytes
| Protocol ID : <Unknown 0>
| SPI size : 0
| Message type : STATUS_NAT_DETECTION_SOURCE_IP
| Notif. data : 8F DA CE 46 53 AD 9D 58 A6 63 6E 2D D6 DA 6C 1D
| 7A 02 D7 E6
NOTIFY Payload
| Next Payload : NOTIFY
| CRITICAL : NO
| Reserved : 0x00
| Length : 28 Bytes
| Protocol ID : <Unknown 0>
| SPI size : 0
| Message type : STATUS_NAT_DETECTION_DESTINATION_IP
| Notif. data : 57 6F 2D 6B E1 10 E2 A6 10 93 D0 4E 81 A1 44 3C
| F5 26 7E 3D
NOTIFY Payload
| Next Payload : NOTIFY
| CRITICAL : NO
| Reserved : 0x00
| Length : 8 Bytes
| Protocol ID : <Unknown 0>
| SPI size : 0
| Message type : IKEV2_FRAGMENTATION_SUPPORTED
NOTIFY Payload
| Next Payload : NONE
| CRITICAL : NO
| Reserved : 0x00
| Length : 16 Bytes
| Protocol ID : <Unknown 0>
| SPI size : 0
| Message type : SIGNATURE_HASH_ALGORITHMS
| Sign. Hash Algs. : SHA1, SHA-256, SHA-384, SHA-512
[VPN-Debug] 2025/05/29 22:30:40,389 Devicetime: 2025/05/29 22:30:39,255
Peer DEFAULT: Received an IKE_SA_INIT-REQUEST of 940 bytes
Gateways: 192.168.178.125:500<--192.168.178.79:55605
SPIs: 0x1373E76990BC9BB20000000000000000, Message-ID 0
Payloads: SA, NONCE, KE, NOTIFY(DETECTION_SOURCE_IP), NOTIFY(DETECTION_DESTINATION_IP), NOTIFY(IKEV2_FRAGMENTATION_SUPPORTED), NOTIFY(SIGNATURE_HASH_ALGORITHMS)
QUB-DATA: 192.168.178.125:500<---192.168.178.79:55605 rtg_tag 0 physical-channel WAN(1)
transport: [id: 700, UDP (17) {incoming unicast, fixed source address}, dst: 192.168.178.79, tag 0 (U), src: 192.168.178.125, hop limit: 64, DSCP: CS6, ECN: Not-ECT, pmtu: 1500, iface: INET_1 (3), mac address: b0:cf:cb:fa:3f:57, port 0], local port: 500, remote port: 55605
+No IKE_SA found
Counting consumed licenses by active channels...
Consumed connected licenses : 0
Negotiating connections : 0
IKE negotiations : 0
MPPE connections : 0
LTA licenses : 0
Licenses in use : 0 < 25
+Passive connection request accepted (17 micro seconds)
(IKEv2-Exchange 'DEFAULT', 'ISAKMP-PEER-DEFAULT' 0x1373E76990BC9BB206D5DF200CB90E7A00000000, P1, RESPONDER): Setting Negotiation SA
Referencing (IKE_SA, 0x1373E76990BC9BB206D5DF200CB90E7A00000000, responder): use_count 3
Looking for payload NOTIFY(SIGNATURE_HASH_ALGORITHMS) (41)...Found 1 payload.
+Received signature hash algorithms: SHA1, SHA-256, SHA-384, SHA-512
Looking for payload NOTIFY(DETECTION_SOURCE_IP) (41)...Found 1 payload.
+Computing SHA1(0x1373E76990BC9BB20000000000000000|192.168.178.79:55605)
+Computing SHA1(0x1373E76990BC9BB20000000000000000C0A8B24FD935)
+Computed: 0x8FDACE4653AD9D58A6636E2DD6DA6C1D7A02D7E6
+Received: 0x8FDACE4653AD9D58A6636E2DD6DA6C1D7A02D7E6
+Equal => NAT-T is disabled
Looking for payload NOTIFY(DETECTION_DESTINATION_IP) (41)...Found 1 payload.
+Computing SHA1(0x1373E76990BC9BB20000000000000000|192.168.178.125:500)
+Computing SHA1(0x1373E76990BC9BB20000000000000000C0A8B27D01F4)
+Computed: 0x576F2D6BE110E2A61093D04E81A1443CF5267E3D
+Received: 0x576F2D6BE110E2A61093D04E81A1443CF5267E3D
+Equal => NAT-T is disabled
Looking for payload NOTIFY(IKEV2_FRAGMENTATION_SUPPORTED) (41)...Found 1 payload.
Looking for payload IKE_SA (33)...Found 1 payload.
+Config ENCR transform(s): AES-CBC-256
+Received ENCR transform(s): AES-CBC-256 AES-CBC-192 AES-CBC-128
+Best intersection: AES-CBC-256
+Config PRF transform(s): PRF-HMAC-SHA-256 PRF-HMAC-SHA1
+Received PRF transform(s): PRF-HMAC-SHA1 PRF-AES128-XCBC
+Best intersection: PRF-HMAC-SHA1
+Config INTEG transform(s): HMAC-SHA-256 HMAC-SHA1
+Received INTEG transform(s): HMAC-SHA-512 HMAC-SHA-384 HMAC-SHA-256 AES-XCBC-96
+Best intersection: HMAC-SHA-256
+Config DH transform(s): 30 29 28 21 20 16 19 15 14 2
+Received DH transform(s): 16 15 14
+Best intersection: 16
Looking for payload NONCE (40)...Found 1 payload.
+Nonce length=32 bytes
+Nonce=0x0033D754EE5FF49B1314094C208CFCF5567A545DC21B86DB51B2AE20CEFE3965
+SA-DATA-Ni=0x0033D754EE5FF49B1314094C208CFCF5567A545DC21B86DB51B2AE20CEFE3965
[VPN-Status] 2025/05/29 22:30:40,420 Devicetime: 2025/05/29 22:30:39,255
Peer DEFAULT: Received an IKE_SA_INIT-REQUEST of 940 bytes
Gateways: 192.168.178.125:500<--192.168.178.79:55605
SPIs: 0x1373E76990BC9BB20000000000000000, Message-ID 0
Peer identified: DEFAULT
IKE_SA ('', '' IPSEC_IKE SPIs 0x1373E76990BC9BB206D5DF200CB90E7A) entered to SADB
Received 4 notifications:
+NAT_DETECTION_SOURCE_IP(0x8FDACE4653AD9D58A6636E2DD6DA6C1D7A02D7E6) (STATUS)
+NAT_DETECTION_DESTINATION_IP(0x576F2D6BE110E2A61093D04E81A1443CF5267E3D) (STATUS)
+IKEV2_FRAGMENTATION_SUPPORTED (STATUS)
+SIGNATURE_HASH_ALGORITHMS(0x0001000200030004) (STATUS)
Peer (initiator) is not behind a NAT. NAT-T is disabled
We (responder) are not behind a NAT. NAT-T is disabled
+IKE-SA:
IKE-Proposal-1 (12 transforms)
ENCR : AES-CBC-256 AES-CBC-192 AES-CBC-128
PRF : PRF-HMAC-SHA1 PRF-AES128-XCBC
INTEG: HMAC-SHA-512 HMAC-SHA-384 HMAC-SHA-256 AES-XCBC-96
DH : 16 15 14
IKE-Proposal-2 (14 transforms)
ENCR : AES-GCM-16-256 AES-GCM-12 AES-GCM-8 AES-GCM-16-192 AES-GCM-12 AES-GCM-8 AES-GCM-16-128 AES-GCM-12 AES-GCM-8
PRF : PRF-HMAC-SHA1 PRF-AES128-XCBC
DH : 16 15 14
+Received KE-DH-Group 16 (4096 bits)
[VPN-IKE] 2025/05/29 22:30:40,420 Devicetime: 2025/05/29 22:30:39,256
[DEFAULT] Sending packet:
IKE 2.0 Header:
Source/Port : 192.168.178.125:500
Destination/Port : 192.168.178.79:55605
Routing-tag : 0
Com-channel : 0
| Initiator cookie : 13 73 E7 69 90 BC 9B B2
| Responder cookie : 06 D5 DF 20 0C B9 0E 7A
| Next Payload : SA
| Version : 2.0
| Exchange type : IKE_SA_INIT
| Flags : 0x20 Response
| Msg-ID : 0
| Length : 761 Bytes
SA Payload
| Next Payload : KE
| CRITICAL : NO
| Reserved : 0x00
| Length : 48 Bytes
| PROPOSAL Payload
| | Next Payload : NONE
| | Reserved : 0x00
| | Length : 44 Bytes
| | Proposal number : 1
| | Protocol ID : IPSEC_IKE
| | SPI size : 0
| | #Transforms : 4
| | TRANSFORM Payload
| | | Next Payload : TRANSFORM
| | | Reserved : 0x00
| | | Length : 12 Bytes
| | | Transform Type: ENCR (1)
| | | Reserved2 : 0x00
| | | Transform ID : AES-CBC (12)
| | | Attribute 0
| | | | Type : Basic, KEYLENGTH
| | | | Value : 256
| | TRANSFORM Payload
| | | Next Payload : TRANSFORM
| | | Reserved : 0x00
| | | Length : 8 Bytes
| | | Transform Type: PRF (2)
| | | Reserved2 : 0x00
| | | Transform ID : PRF-HMAC-SHA1 (2)
| | | Attributes : NONE
| | TRANSFORM Payload
| | | Next Payload : TRANSFORM
| | | Reserved : 0x00
| | | Length : 8 Bytes
| | | Transform Type: INTEG (3)
| | | Reserved2 : 0x00
| | | Transform ID : HMAC-SHA-256 (12)
| | | Attributes : NONE
| | TRANSFORM Payload
| | | Next Payload : NONE
| | | Reserved : 0x00
| | | Length : 8 Bytes
| | | Transform Type: DH (4)
| | | Reserved2 : 0x00
| | | Transform ID : 4096-BIT MODP (16)
| | | Attributes : NONE
KE Payload
| Next Payload : NONCE
| CRITICAL : NO
| Reserved : 0x00
| Length : 520 Bytes
| DH Group : 16
| Reserved2 : 0x0000
| DH-Key(4096 bits) : 11 E0 D6 B4 78 C9 DE 0A 3B E6 3D F7 1B E5 09 46
| 98 23 E8 75 CA F9 CD E4 C3 47 37 79 6A B6 AE 28
| F9 5D 82 CE B0 35 65 FA 70 7D 1E 82 43 63 86 31
| 2D 90 FA 7A BE 72 DF 81 A2 B7 E6 3A D5 C6 80 CE
| 3A B5 2C 93 D3 71 A5 2C 3A B2 EB 72 7E 71 58 0A
| 43 A6 2E C4 A5 04 ED 3B A1 FC 93 89 E6 5A 48 5E
| C2 D5 E7 89 35 DB 8F EB 88 77 23 4B FD 26 97 26
| 51 DF 61 3C A4 C1 85 04 81 64 C0 2C 39 2E 22 9D
| AD E4 90 D9 C9 7E C2 0F 56 B7 B9 53 C6 13 C7 7A
| 38 DE 55 AD F9 FA ED 33 53 3D 15 81 13 2D 37 52
| 7D 04 31 89 F5 ED F6 0E 11 3C F6 E7 69 A5 85 21
| AA 9A 66 AA 9E 40 68 BF B3 01 E9 CF B8 5F A2 C9
| AC E5 85 ED B9 88 E6 A1 DB E2 5D C1 BB D8 07 A4
| 0B A9 61 A3 7A 85 80 FD DC D1 A7 8C 2A 01 43 72
| 49 9C 02 C3 A9 2C F5 65 92 D3 74 F3 1F 05 73 15
| 84 0A B1 B8 CA 76 1B 51 94 C5 43 94 85 C0 F6 2A
| 55 D6 16 9D 32 21 99 E8 FE 92 3D E1 D7 FD 24 B1
| 83 D7 DE 9A 8F 04 52 73 BF 6C F1 26 DD D2 00 73
| 17 B8 02 C0 17 95 62 72 A2 07 68 FE F0 6B BE B7
| 12 95 F7 AB 33 1E A1 B4 AD 30 A7 59 0B F2 61 BA
| 44 95 A7 62 2C F1 55 B7 62 54 77 EE 1A E3 FD 06
| 43 D0 08 0A 95 38 95 5E E7 C7 42 8F 2A 11 71 44
| 24 24 3B 9C CB 50 5F 43 D5 78 82 87 8F BB 14 B3
| BC 92 87 9D BC 98 60 8B 3F 44 56 BB 83 4C BD 13
| 76 49 91 83 07 8A A3 DD 4B 3E CB 3B 3C AA 1F F2
| 85 8D 79 66 B2 05 FF 4B DD 9F D2 C7 65 FE A2 03
| 14 D6 83 8A 59 D8 CC 6D 8E 1D 87 3A 23 BC AF 5E
| 93 B3 A7 27 34 F9 09 AB 9E 15 8F 09 50 0B 01 B1
| 19 93 CF A8 C8 B9 9B BF 51 60 5F 5A 7E 4D 7F B4
| 7D F0 37 A5 46 15 63 3F 5B 06 BE 0D 99 3B 42 F9
| CF 77 6B 91 51 4C DD 41 10 E2 D9 A9 62 32 B8 FE
| 68 88 96 BC 2E 52 7C B3 82 CD 93 36 1F 3D 1B 03
NONCE Payload
| Next Payload : NOTIFY
| CRITICAL : NO
| Reserved : 0x00
| Length : 36 Bytes
| Nonce(256 bits) : 8F F7 C9 A0 78 FF 05 40 DF E7 EC 17 F3 67 79 66
| 67 FD F2 EC 59 60 CD 5F C6 0B 35 B4 44 86 41 C7
NOTIFY Payload
| Next Payload : NOTIFY
| CRITICAL : NO
| Reserved : 0x00
| Length : 28 Bytes
| Protocol ID : <Unknown 0>
| SPI size : 0
| Message type : STATUS_NAT_DETECTION_SOURCE_IP
| Notif. data : 6E 61 81 84 8C 28 95 0A 7F C7 CE 80 C7 EC F8 5C
| 10 29 E0 9B
NOTIFY Payload
| Next Payload : NOTIFY
| CRITICAL : NO
| Reserved : 0x00
| Length : 28 Bytes
| Protocol ID : <Unknown 0>
| SPI size : 0
| Message type : STATUS_NAT_DETECTION_DESTINATION_IP
| Notif. data : 52 99 95 F1 33 6B 97 D3 FB F9 54 FA 9E CB 2E 8C
| 72 53 DE DE
NOTIFY Payload
| Next Payload : NOTIFY
| CRITICAL : NO
| Reserved : 0x00
| Length : 16 Bytes
| Protocol ID : <Unknown 0>
| SPI size : 0
| Message type : SIGNATURE_HASH_ALGORITHMS
| Sign. Hash Algs. : SHA-256, SHA-384, SHA-512, IDENTITY
NOTIFY Payload
| Next Payload : CERTREQ
| CRITICAL : NO
| Reserved : 0x00
| Length : 8 Bytes
| Protocol ID : <Unknown 0>
| SPI size : 0
| Message type : IKEV2_FRAGMENTATION_SUPPORTED
CERTREQ Payload
| Next Payload : VENDOR
| CRITICAL : NO
| Reserved : 0x00
| Length : 25 Bytes
| Cert. Type : X509_SIG
| Cert. Authority : 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
| 00 00 00 00
VENDOR Payload
| Next Payload : NONE
| CRITICAL : NO
| Reserved : 0x00
| Length : 24 Bytes
| Vendor ID : 81 75 2E B5 91 4D 73 5C DF CD C8 58 C3 A8 ED 7C
| 1C 66 D1 42
[VPN-Debug] 2025/05/29 22:30:40,498 Devicetime: 2025/05/29 22:30:39,387
Peer DEFAULT: Constructing an IKE_SA_INIT-RESPONSE for send
Constructing payload NONCE (40):
+Nonce length=32 bytes
+Nonce=0x8FF7C9A078FF0540DFE7EC17F367796667FDF2EC5960CD5FC60B35B4448641C7
+SA-DATA-Nr=0x8FF7C9A078FF0540DFE7EC17F367796667FDF2EC5960CD5FC60B35B4448641C7
Constructing payload NOTIFY(DETECTION_SOURCE_IP) (41):
+Computing SHA1(0x1373E76990BC9BB206D5DF200CB90E7A|192.168.178.125:500)
+Computing SHA1(0x1373E76990BC9BB206D5DF200CB90E7AC0A8B27D01F4)
+0x6E6181848C28950A7FC7CE80C7ECF85C1029E09B
Constructing payload NOTIFY(DETECTION_DESTINATION_IP) (41):
+Computing SHA1(0x1373E76990BC9BB206D5DF200CB90E7A|192.168.178.79:55605)
+Computing SHA1(0x1373E76990BC9BB206D5DF200CB90E7AC0A8B24FD935)
+0x529995F1336B97D3FBF954FA9ECB2E8C7253DEDE
Constructing payload NOTIFY(SIGNATURE_HASH_ALGORITHMS) (41):
+Signature hash algorithms: SHA-256,SHA-384,SHA-512,Identity
Constructing payload NOTIFY(IKEV2_FRAGMENTATION_SUPPORTED) (41):
Constructing payload NOTIFY(USE_PPK) (41):
+Initiator does not support PPK
Constructing payload CERTREQ (38):
+0x0000000000000000000000000000000000000000
Constructing payload VENDOR(FRAGMENTATION) (43):
Constructing payload VENDOR(FRAGMENTATION(C0000000)) (43):
Constructing payload VENDOR(ikev2 config payload: Do not narrow my traffic selector) (43):
Constructing payload VENDOR(activate lancom-systems notification private range) (43):
Constructing payload NOTIFY(DEVICE-ID) (41):
+Peer does not support private notifications -> ignore
+Shared secret derived in 65986 micro seconds
IKE_SA(0x1373E76990BC9BB206D5DF200CB90E7A).EXPECTED-MSG-ID raised to 1
(IKEv2-Exchange 'DEFAULT', 'ISAKMP-PEER-DEFAULT' 0x1373E76990BC9BB206D5DF200CB90E7A00000000, P1, RESPONDER): Resetting Negotiation SA
(IKE_SA, 'DEFAULT', 'ISAKMP-PEER-DEFAULT', 0x1373E76990BC9BB206D5DF200CB90E7A00000000, responder): use_count --5
+(request, response) pair inserted into retransmission map
Sending an IKE_SA_INIT-RESPONSE of 761 bytes (responder)
Gateways: 192.168.178.125:500-->192.168.178.79:55605, tag 0 (UDP)
SPIs: 0x1373E76990BC9BB206D5DF200CB90E7A, Message-ID 0
Payloads: SA, KE, NONCE, NOTIFY(DETECTION_SOURCE_IP), NOTIFY(DETECTION_DESTINATION_IP), NOTIFY(SIGNATURE_HASH_ALGORITHMS), NOTIFY(IKEV2_FRAGMENTATION_SUPPORTED), CERTREQ, VENDOR(activate lancom-systems notification private range)
[VPN-Status] 2025/05/29 22:30:40,500 Devicetime: 2025/05/29 22:30:39,387
Peer DEFAULT: Constructing an IKE_SA_INIT-RESPONSE for send
+IKE-SA:
IKE-Proposal-1 (4 transforms)
ENCR : AES-CBC-256
PRF : PRF-HMAC-SHA1
INTEG: HMAC-SHA-256
DH : 16
+KE-DH-Group 16 (4096 bits)
IKE_SA_INIT [responder] for peer DEFAULT initiator id <no ipsec id>, responder id <no ipsec id>
initiator cookie: 0x1373E76990BC9BB2, responder cookie: 0x06D5DF200CB90E7A
SA ISAKMP for peer DEFAULT
Encryption : AES-CBC-256
Integrity : AUTH-HMAC-SHA-256
IKE-DH-Group : 16
PRF : PRF-HMAC-SHA1
life time soft 05/30/2025 20:06:39 (in 77760 sec) / 0 kb
life time hard 05/30/2025 22:30:39 (in 86400 sec) / 0 kb
DPD: NONE
Negotiated: IKEV2_FRAGMENTATION
Sending an IKE_SA_INIT-RESPONSE of 761 bytes (responder)
Gateways: 192.168.178.125:500-->192.168.178.79:55605, tag 0 (UDP)
SPIs: 0x1373E76990BC9BB206D5DF200CB90E7A, Message-ID 0
[VPN-IKE] 2025/05/29 22:30:40,500 Devicetime: 2025/05/29 22:30:39,388
[DEFAULT] Received packet:
IKE 2.0 Header:
Source/Port : 192.168.178.79:55605
Destination/Port : 192.168.178.125:500
Routing-tag : 0
Com-channel : 0
| Initiator cookie : 13 73 E7 69 90 BC 9B B2
| Responder cookie : 06 D5 DF 20 0C B9 0E 7A
| Next Payload : ENCR
| Version : 2.0
| Exchange type : IKE_AUTH
| Flags : 0x08 Initiator
| Msg-ID : 1
| Length : 496 Bytes
ENCR Payload
| Next Payload : IDI
| CRITICAL : NO
| Reserved : 0x00
| Length : 468 Bytes
| IV : 79 B0 54 F6 B5 29 60 60 B9 CD BA 42 66 24 E8 DA
| Encrypted Data : 9A FC EE 7A 8B 50 6A 9C 4C 1E B7 33 0D 6C 10 46
| B7 B5 2F 18 D4 9D CB 72 63 47 F0 7A 94 51 9F 87
| EA 32 E5 47 46 42 43 FD A3 84 A3 70 D2 9D 5D 70
| C4 33 92 49 CB 35 28 1C 10 62 2C 2E BD 89 D8 11
| 6E 86 34 AE 97 01 5D ED 34 55 FF CF 78 57 71 28
| A5 C6 C0 43 15 0D 9D CE DF 60 2D 0D 67 F9 37 C9
| 62 EC 29 75 11 77 77 9B B9 E3 79 94 F7 1B 7D F6
| 9E 45 9A BE 78 2F EF B6 52 74 72 E9 8B 9D 12 A9
| 57 E2 92 07 B8 95 2E E3 FA 6C 4A 8F C4 33 2E 23
| A5 89 04 D1 58 C0 FC A5 B3 30 9D D8 9D C9 6F C0
| CC CD E1 5D D1 4D 86 4E 50 8E 56 E7 AE E1 08 77
| 9A 3C 3C D5 A2 92 88 37 F1 D8 4E 09 13 C4 5F CD
| 0A 3B A8 AB F1 93 9C 0A E5 0A 3B A5 20 B9 26 E7
| 6E B1 6D F3 19 CD 98 36 C1 4B F8 03 75 AC 62 71
| 32 68 4E BA 19 98 88 10 2B 38 B1 BD D2 88 2C 24
| 8D 53 3A 5E A4 95 30 70 BF 5C BC 8A 3D 1F 00 21
| EB 48 9F 7E 92 A3 B4 A1 A0 B6 CD 78 82 32 63 9D
| B3 76 FE FA E4 D0 E6 71 8D 98 F7 DF 23 56 5F 04
| F7 A9 AA 4A 23 53 AF BC 05 28 02 55 6A 2E 22 5E
| F8 B1 D8 B5 E4 BE 42 C5 55 D2 A5 EF F9 E6 87 7A
| D6 D7 3B F7 36 36 F5 A8 56 FA BC 2D 86 B6 11 A9
| 12 1D DC A6 E0 FC E6 D1 E2 66 B0 37 C6 6D DE 79
| 22 B9 46 46 B2 52 00 A5 41 4B E9 79 BA EA E3 F5
| E5 39 B1 51 48 59 B0 14 90 F1 28 21 88 5E 73 FC
| 9D 55 61 32 D2 D3 36 3B 93 0B 79 DA 4A E2 7A 85
| 3F A2 8C DB 48 FE FB C6 FA AB F9 19 F0 D1 6B 3A
| 4D 8B 95 38 48 F0 1D A9 67 3B ED F6 00 A9 4F 5B
| ICV : 12 10 78 A1 4F DD 61 A3 ED 7E 2A 51 D6 C9 F5 74
[VPN-IKE] 2025/05/29 22:30:40,500 Devicetime: 2025/05/29 22:30:39,388
[DEFAULT] Received packet after decryption:
IKE 2.0 Header:
Source/Port : 192.168.178.79:55605
Destination/Port : 192.168.178.125:500
Routing-tag : 0
Com-channel : 0
| Initiator cookie : 13 73 E7 69 90 BC 9B B2
| Responder cookie : 06 D5 DF 20 0C B9 0E 7A
| Next Payload : ENCR
| Version : 2.0
| Exchange type : IKE_AUTH
| Flags : 0x08 Initiator
| Msg-ID : 1
| Length : 496 Bytes
ENCR Payload
| Next Payload : IDI
| CRITICAL : NO
| Reserved : 0x00
| Length : 468 Bytes
| IV : 79 B0 54 F6 B5 29 60 60 B9 CD BA 42 66 24 E8 DA
| ICV : 12 10 78 A1 4F DD 61 A3 ED 7E 2A 51 D6 C9 F5 74
IDI Payload
| Next Payload : IDR
| CRITICAL : NO
| Reserved : 0x00
| Length : 10 Bytes
| ID type : FQDN
| Reserved : 0x000000
| ID : FH
IDR Payload
| Next Payload : AUTH
| CRITICAL : NO
| Reserved : 0x00
| Length : 12 Bytes
| ID type : IPV4_ADDR
| Reserved : 0x000000
| ID : 192.168.178.125
AUTH Payload
| Next Payload : SA
| CRITICAL : NO
| Reserved : 0x00
| Length : 28 Bytes
| Auth. Method : PRESHARED_KEY
| Reserved : 0x000000
| Auth. Data : 8D 3C 97 E3 30 4F 7B BB 7E A5 2F 36 B1 8A 4C 1E
| 48 10 80 FB
SA Payload
| Next Payload : TSi
| CRITICAL : NO
| Reserved : 0x00
| Length : 212 Bytes
| PROPOSAL Payload
| | Next Payload : PROPOSAL
| | Reserved : 0x00
| | Length : 80 Bytes
| | Proposal number : 1
| | Protocol ID : IPSEC_ESP
| | SPI size : 4
| | #Transforms : 7
| | SPI : 54 F8 25 5C
| | TRANSFORM Payload
| | | Next Payload : TRANSFORM
| | | Reserved : 0x00
| | | Length : 12 Bytes
| | | Transform Type: ENCR (1)
| | | Reserved2 : 0x00
| | | Transform ID : AES-CBC (12)
| | | Attribute 0
| | | | Type : Basic, KEYLENGTH
| | | | Value : 256
| | TRANSFORM Payload
| | | Next Payload : TRANSFORM
| | | Reserved : 0x00
| | | Length : 12 Bytes
| | | Transform Type: ENCR (1)
| | | Reserved2 : 0x00
| | | Transform ID : AES-CBC (12)
| | | Attribute 0
| | | | Type : Basic, KEYLENGTH
| | | | Value : 192
| | TRANSFORM Payload
| | | Next Payload : TRANSFORM
| | | Reserved : 0x00
| | | Length : 12 Bytes
| | | Transform Type: ENCR (1)
| | | Reserved2 : 0x00
| | | Transform ID : AES-CBC (12)
| | | Attribute 0
| | | | Type : Basic, KEYLENGTH
| | | | Value : 128
| | TRANSFORM Payload
| | | Next Payload : TRANSFORM
| | | Reserved : 0x00
| | | Length : 8 Bytes
| | | Transform Type: INTEG (3)
| | | Reserved2 : 0x00
| | | Transform ID : HMAC-SHA-512 (14)
| | | Attributes : NONE
| | TRANSFORM Payload
| | | Next Payload : TRANSFORM
| | | Reserved : 0x00
| | | Length : 8 Bytes
| | | Transform Type: INTEG (3)
| | | Reserved2 : 0x00
| | | Transform ID : HMAC-SHA-384 (13)
| | | Attributes : NONE
| | TRANSFORM Payload
| | | Next Payload : TRANSFORM
| | | Reserved : 0x00
| | | Length : 8 Bytes
| | | Transform Type: INTEG (3)
| | | Reserved2 : 0x00
| | | Transform ID : HMAC-SHA-256 (12)
| | | Attributes : NONE
| | TRANSFORM Payload
| | | Next Payload : NONE
| | | Reserved : 0x00
| | | Length : 8 Bytes
| | | Transform Type: ESN (5)
| | | Reserved2 : 0x00
| | | Transform ID : NONE (0)
| | | Attributes : NONE
| PROPOSAL Payload
| | Next Payload : NONE
| | Reserved : 0x00
| | Length : 128 Bytes
| | Proposal number : 2
| | Protocol ID : IPSEC_ESP
| | SPI size : 4
| | #Transforms : 10
| | SPI : 5B 29 33 11
| | TRANSFORM Payload
| | | Next Payload : TRANSFORM
| | | Reserved : 0x00
| | | Length : 12 Bytes
| | | Transform Type: ENCR (1)
| | | Reserved2 : 0x00
| | | Transform ID : AES-GCM-16 (20)
| | | Attribute 0
| | | | Type : Basic, KEYLENGTH
| | | | Value : 256
| | TRANSFORM Payload
| | | Next Payload : TRANSFORM
| | | Reserved : 0x00
| | | Length : 12 Bytes
| | | Transform Type: ENCR (1)
| | | Reserved2 : 0x00
| | | Transform ID : AES-GCM-12 (19)
| | | Attribute 0
| | | | Type : Basic, KEYLENGTH
| | | | Value : 256
| | TRANSFORM Payload
| | | Next Payload : TRANSFORM
| | | Reserved : 0x00
| | | Length : 12 Bytes
| | | Transform Type: ENCR (1)
| | | Reserved2 : 0x00
| | | Transform ID : AES-GCM-8 (18)
| | | Attribute 0
| | | | Type : Basic, KEYLENGTH
| | | | Value : 256
| | TRANSFORM Payload
| | | Next Payload : TRANSFORM
| | | Reserved : 0x00
| | | Length : 12 Bytes
| | | Transform Type: ENCR (1)
| | | Reserved2 : 0x00
| | | Transform ID : AES-GCM-16 (20)
| | | Attribute 0
| | | | Type : Basic, KEYLENGTH
| | | | Value : 192
| | TRANSFORM Payload
| | | Next Payload : TRANSFORM
| | | Reserved : 0x00
| | | Length : 12 Bytes
| | | Transform Type: ENCR (1)
| | | Reserved2 : 0x00
| | | Transform ID : AES-GCM-12 (19)
| | | Attribute 0
| | | | Type : Basic, KEYLENGTH
| | | | Value : 192
| | TRANSFORM Payload
| | | Next Payload : TRANSFORM
| | | Reserved : 0x00
| | | Length : 12 Bytes
| | | Transform Type: ENCR (1)
| | | Reserved2 : 0x00
| | | Transform ID : AES-GCM-8 (18)
| | | Attribute 0
| | | | Type : Basic, KEYLENGTH
| | | | Value : 192
| | TRANSFORM Payload
| | | Next Payload : TRANSFORM
| | | Reserved : 0x00
| | | Length : 12 Bytes
| | | Transform Type: ENCR (1)
| | | Reserved2 : 0x00
| | | Transform ID : AES-GCM-16 (20)
| | | Attribute 0
| | | | Type : Basic, KEYLENGTH
| | | | Value : 128
| | TRANSFORM Payload
| | | Next Payload : TRANSFORM
| | | Reserved : 0x00
| | | Length : 12 Bytes
| | | Transform Type: ENCR (1)
| | | Reserved2 : 0x00
| | | Transform ID : AES-GCM-12 (19)
| | | Attribute 0
| | | | Type : Basic, KEYLENGTH
| | | | Value : 128
| | TRANSFORM Payload
| | | Next Payload : TRANSFORM
| | | Reserved : 0x00
| | | Length : 12 Bytes
| | | Transform Type: ENCR (1)
| | | Reserved2 : 0x00
| | | Transform ID : AES-GCM-8 (18)
| | | Attribute 0
| | | | Type : Basic, KEYLENGTH
| | | | Value : 128
| | TRANSFORM Payload
| | | Next Payload : NONE
| | | Reserved : 0x00
| | | Length : 8 Bytes
| | | Transform Type: ESN (5)
| | | Reserved2 : 0x00
| | | Transform ID : NONE (0)
| | | Attributes : NONE
TSi Payload
| Next Payload : TSr
| CRITICAL : NO
| Reserved : 0x00
| Length : 64 Bytes
| Number of TSs : 2
| Reserved : 0x000000
| Traffic Selector 0
| | Type : TS_IPV4_ADDR_RANGE
| | Protocol : ANY
| | Length : 16
| | Start Port : 0
| | End Port : 65535
| | Address Range : 0.0.0.0 - 255.255.255.255
| Traffic Selector 1
| | Type : TS_IPV6_ADDR_RANGE
| | Protocol : ANY
| | Length : 40
| | Start Port : 0
| | End Port : 65535
| | Address Range : :: - ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff
TSr Payload
| Next Payload : CP
| CRITICAL : NO
| Reserved : 0x00
| Length : 64 Bytes
| Number of TSs : 2
| Reserved : 0x000000
| Traffic Selector 0
| | Type : TS_IPV4_ADDR_RANGE
| | Protocol : ANY
| | Length : 16
| | Start Port : 0
| | End Port : 65535
| | Address Range : 0.0.0.0 - 255.255.255.255
| Traffic Selector 1
| | Type : TS_IPV6_ADDR_RANGE
| | Protocol : ANY
| | Length : 40
| | Start Port : 0
| | End Port : 65535
| | Address Range : :: - ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff
CP Payload
| Next Payload : NONE
| CRITICAL : NO
| Reserved : 0x00
| Length : 32 Bytes
| Type : REQUEST
| Reserved2 : 0x000000
| Attribute 0
| | Type : Variable, INTERNAL_IP4_ADDRESS
| | Length : 0
| | Value :
| Attribute 1
| | Type : Variable, INTERNAL_IP6_ADDRESS
| | Length : 0
| | Value :
| Attribute 2
| | Type : Variable, INTERNAL_IP4_DNS
| | Length : 0
| | Value :
| Attribute 3
| | Type : Variable, INTERNAL_IP6_DNS
| | Length : 0
| | Value :
| Attribute 4
| | Type : Variable, INTERNAL_IP4_NETMASK
| | Length : 0
| | Value :
| Attribute 5
| | Type : Variable, APPLICATION_VERSION
| | Length : 0
| | Value :
Rest : E5 69 01 17 F2 77 B8 37 9C 09
[VPN-Debug] 2025/05/29 22:30:40,500 Devicetime: 2025/05/29 22:30:39,389
Config parser update peer's FH remote gateway to 192.168.178.79 (old 0.0.0.0)
[VPN-Debug] 2025/05/29 22:30:40,501 Devicetime: 2025/05/29 22:30:39,389
Peer DEFAULT [responder]: Received an IKE_AUTH-REQUEST of 496 bytes (encrypted)
Gateways: 192.168.178.125:500<--192.168.178.79:55605
SPIs: 0x1373E76990BC9BB206D5DF200CB90E7A, Message-ID 1
Payloads: ENCR
QUB-DATA: 192.168.178.125:500<---192.168.178.79:55605 rtg_tag 0 physical-channel WAN(1)
transport: [id: 700, UDP (17) {incoming unicast, fixed source address}, dst: 192.168.178.79, tag 0 (U), src: 192.168.178.125, hop limit: 64, DSCP: CS6, ECN: Not-ECT, pmtu: 1500, iface: INET_1 (3), mac address: b0:cf:cb:fa:3f:57, port 0], local port: 500, remote port: 55605
+IKE_SA found and assigned
+Exchange created (flags: 0x00000000)
Message verified successfully
Message decrypted successfully
Payloads: ENCR, IDI, IDR, AUTH(PSK), SA, TSI, TSR, CP(REQUEST)
(IKEv2-Exchange 'DEFAULT', 'ISAKMP-PEER-DEFAULT' 0x1373E76990BC9BB206D5DF200CB90E7A00000001, P2, RESPONDER): Setting Negotiation SA
Referencing (CHILD_SA, 0x1373E76990BC9BB206D5DF200CB90E7A0000000100, responder): use_count 3
Looking for payload IDI (35)...Found 1 payload.
+Received-ID FH:FQDN matches the Expected-ID FH:FQDN
+Config ENCR transform(s): AES-CBC-256
+Received ENCR transform(s): AES-CBC-256
+Best intersection: AES-CBC-256
+Config PRF transform(s): PRF-HMAC-SHA-256 PRF-HMAC-SHA1
+Received PRF transform(s): PRF-HMAC-SHA1
+Best intersection: PRF-HMAC-SHA1
+Config INTEG transform(s): HMAC-SHA-256 HMAC-SHA1
+Received INTEG transform(s): HMAC-SHA-256
+Best intersection: HMAC-SHA-256
+Config DH transform(s): 16 2
+Received DH transform(s): 16
+Best intersection: 16
Looking for payload TSI (44)...Found 1 payload.
Looking for a rule...
Trying rule 0: IPSEC-0-FH-PR0-L0-R0
Determining best intersection for TSi
Expected TS :( 0, 0-65535, 235.2.143.209-235.2.143.209 )
Received TS :( 0, 0-65535, 0.0.0.0-255.255.255.255)
Intersection:( 0, 0-65535, 235.2.143.209-235.2.143.209 )
Determining best intersection for TSi
Expected TS :( 0, 0-65535, 235.2.143.209-235.2.143.209 )
Received TS :( 0, 0-65535, ::-ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff)
-No intersection
Best :( 0, 0-65535, 235.2.143.209-235.2.143.209 )
Determining best intersection for TSr
Expected TS :( 0, 0-65535, 0.0.0.0-255.255.255.255)
Received TS :( 0, 0-65535, 0.0.0.0-255.255.255.255)
Intersection:( 0, 0-65535, 0.0.0.0-255.255.255.255)
Determining best intersection for TSr
Expected TS :( 0, 0-65535, 0.0.0.0-255.255.255.255)
Received TS :( 0, 0-65535, ::-ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff)
-No intersection
Best :( 0, 0-65535, 0.0.0.0-255.255.255.255)
+Valid intersection found
TSi: ( 0, 0-65535, 235.2.143.209-235.2.143.209 )
TSr: ( 0, 0-65535, 0.0.0.0-255.255.255.255)
+TSi OK.
Looking for payload TSR (45)...Found 1 payload.
+TSr OK.
Looking for payload CHILD_SA (33)...Found 1 payload.
+Config ENCR transform(s): AES-CBC-256
+Received ENCR transform(s): AES-CBC-256 AES-CBC-192 AES-CBC-128
+Best intersection: AES-CBC-256
+Config INTEG transform(s): HMAC-SHA-256 HMAC-SHA1
+Received INTEG transform(s): HMAC-SHA-512 HMAC-SHA-384 HMAC-SHA-256
+Best intersection: HMAC-SHA-256
+Config ESN transform(s): NONE
+Received ESN transform(s): NONE
+Best intersection: NONE
[VPN-Status] 2025/05/29 22:30:40,501 Devicetime: 2025/05/29 22:30:39,389
Peer DEFAULT [responder]: Received an IKE_AUTH-REQUEST of 496 bytes (encrypted)
Gateways: 192.168.178.125:500<--192.168.178.79:55605
SPIs: 0x1373E76990BC9BB206D5DF200CB90E7A, Message-ID 1
CHILD_SA ('', '' ) entered to SADB
+Received-ID FH:FQDN matches the Expected-ID FH:FQDN
+Peer identified: FH
+Peer uses AUTH(PSK)
+Authentication successful
Request attributes:
INTERNAL_IP4_ADDRESS()
INTERNAL_IP6_ADDRESS()
INTERNAL_IP4_DNS()
INTERNAL_IP6_DNS()
INTERNAL_IP4_NETMASK()
APPLICATION_VERSION()
Assigned IPv4 config parameters:
IP: 235.2.143.209
DNS: 192.168.99.1
Cannot assign IPv6 config parameters to non-existent interface FH
TSi: ( 0, 0-65535, 235.2.143.209-235.2.143.209 )
TSr: ( 0, 0-65535, 0.0.0.0-255.255.255.255)
+CHILD-SA:
ESP-Proposal-1 Peer-SPI: 0x54F8255C (7 transforms)
ENCR : AES-CBC-256 AES-CBC-192 AES-CBC-128
INTEG: HMAC-SHA-512 HMAC-SHA-384 HMAC-SHA-256
ESN : NONE
ESP-Proposal-2 Peer-SPI: 0x5B293311 (10 transforms)
ENCR : AES-GCM-16-256 AES-GCM-12 AES-GCM-8 AES-GCM-16-192 AES-GCM-12 AES-GCM-8 AES-GCM-16-128 AES-GCM-12 AES-GCM-8
ESN : NONE
[VPN-IKE] 2025/05/29 22:30:40,501 Devicetime: 2025/05/29 22:30:39,390
[FH] Sending packet before encryption:
IKE 2.0 Header:
Source/Port : 192.168.178.125:500
Destination/Port : 192.168.178.79:55605
Routing-tag : 0
Com-channel : 12
| Initiator cookie : 13 73 E7 69 90 BC 9B B2
| Responder cookie : 06 D5 DF 20 0C B9 0E 7A
| Next Payload : ENCR
| Version : 2.0
| Exchange type : IKE_AUTH
| Flags : 0x20 Response
| Msg-ID : 1
| Length : 240 Bytes
ENCR Payload
| Next Payload : IDR
| CRITICAL : NO
| Reserved : 0x00
| Length : 212 Bytes
| IV : C7 AA 0E 29 FA 0F 45 26 7B D3 97 BE 65 49 BA 20
| ICV : 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
IDR Payload
| Next Payload : AUTH
| CRITICAL : NO
| Reserved : 0x00
| Length : 12 Bytes
| ID type : IPV4_ADDR
| Reserved : 0x000000
| ID : 192.168.178.125
AUTH Payload
| Next Payload : CP
| CRITICAL : NO
| Reserved : 0x00
| Length : 28 Bytes
| Auth. Method : PRESHARED_KEY
| Reserved : 0x000000
| Auth. Data : 51 02 2C 06 5B 7F B7 70 D6 55 45 8A 14 84 8E 3A
| DF D0 E1 44
CP Payload
| Next Payload : TSi
| CRITICAL : NO
| Reserved : 0x00
| Length : 24 Bytes
| Type : REPLY
| Reserved2 : 0x000000
| Attribute 0
| | Type : Variable, INTERNAL_IP4_ADDRESS
| | Length : 4
| | Value : 235.2.143.209
| Attribute 1
| | Type : Variable, INTERNAL_IP4_DNS
| | Length : 4
| | Value : 192.168.99.1
TSi Payload
| Next Payload : TSr
| CRITICAL : NO
| Reserved : 0x00
| Length : 24 Bytes
| Number of TSs : 1
| Reserved : 0x000000
| Traffic Selector 0
| | Type : TS_IPV4_ADDR_RANGE
| | Protocol : ANY
| | Length : 16
| | Start Port : 0
| | End Port : 65535
| | Address Range : 235.2.143.209 - 235.2.143.209
TSr Payload
| Next Payload : NOTIFY
| CRITICAL : NO
| Reserved : 0x00
| Length : 24 Bytes
| Number of TSs : 1
| Reserved : 0x000000
| Traffic Selector 0
| | Type : TS_IPV4_ADDR_RANGE
| | Protocol : ANY
| | Length : 16
| | Start Port : 0
| | End Port : 65535
| | Address Range : 0.0.0.0 - 255.255.255.255
NOTIFY Payload
| Next Payload : SA
| CRITICAL : NO
| Reserved : 0x00
| Length : 8 Bytes
| Protocol ID : <Unknown 0>
| SPI size : 0
| Message type : STATUS_INITIAL_CONTACT
SA Payload
| Next Payload : NONE
| CRITICAL : NO
| Reserved : 0x00
| Length : 44 Bytes
| PROPOSAL Payload
| | Next Payload : NONE
| | Reserved : 0x00
| | Length : 40 Bytes
| | Proposal number : 1
| | Protocol ID : IPSEC_ESP
| | SPI size : 4
| | #Transforms : 3
| | SPI : 91 11 BE 9C
| | TRANSFORM Payload
| | | Next Payload : TRANSFORM
| | | Reserved : 0x00
| | | Length : 12 Bytes
| | | Transform Type: ENCR (1)
| | | Reserved2 : 0x00
| | | Transform ID : AES-CBC (12)
| | | Attribute 0
| | | | Type : Basic, KEYLENGTH
| | | | Value : 256
| | TRANSFORM Payload
| | | Next Payload : TRANSFORM
| | | Reserved : 0x00
| | | Length : 8 Bytes
| | | Transform Type: INTEG (3)
| | | Reserved2 : 0x00
| | | Transform ID : HMAC-SHA-256 (12)
| | | Attributes : NONE
| | TRANSFORM Payload
| | | Next Payload : NONE
| | | Reserved : 0x00
| | | Length : 8 Bytes
| | | Transform Type: ESN (5)
| | | Reserved2 : 0x00
| | | Transform ID : NONE (0)
| | | Attributes : NONE
Rest : 00 00 00 00 00 00 00 00 00 00 00 0B
[VPN-IKE] 2025/05/29 22:30:40,501 Devicetime: 2025/05/29 22:30:39,390
[FH] Sending packet after encryption:
IKE 2.0 Header:
Source/Port : 192.168.178.125:500
Destination/Port : 192.168.178.79:55605
Routing-tag : 0
Com-channel : 12
| Initiator cookie : 13 73 E7 69 90 BC 9B B2
| Responder cookie : 06 D5 DF 20 0C B9 0E 7A
| Next Payload : ENCR
| Version : 2.0
| Exchange type : IKE_AUTH
| Flags : 0x20 Response
| Msg-ID : 1
| Length : 240 Bytes
ENCR Payload
| Next Payload : IDR
| CRITICAL : NO
| Reserved : 0x00
| Length : 212 Bytes
| IV : C7 AA 0E 29 FA 0F 45 26 7B D3 97 BE 65 49 BA 20
| Encrypted Data : EE FB 55 B2 87 C6 EB 69 08 1A B2 A3 83 09 A6 65
| 64 16 2F 89 5D 6B 38 D2 61 84 63 04 42 09 94 A7
| D4 C7 75 BD B5 3B 78 93 D8 49 20 1F A9 37 58 25
| 50 6C 10 CD 95 DD 78 5E 96 75 E0 CB 4C C6 8D 13
| 0A F3 B2 C6 95 B7 4A D1 46 60 1E BA C3 AA B1 E8
| C7 DD A9 6D 43 DD 66 64 DB 89 32 3B 45 63 E2 35
| 0A C5 FF B8 C8 48 EF EE 3E 67 D4 40 5B 0F 56 63
| CF 81 50 81 D0 09 0A A6 E1 93 2B 4E 67 CB 7C 4F
| B7 AC 8A 9B 51 35 EF F4 D0 73 A2 4C 4C A7 AA 8A
| 39 5E 97 2A 7E E2 89 90 39 29 E9 19 83 6A 37 BA
| 31 F1 A8 94 D1 C8 7C 56 50 69 7A 1D 8D C9 E5 9A
| ICV : 7D B9 15 3F BD D0 46 87 70 F8 7F 29 33 5D D0 50
[VPN-Debug] 2025/05/29 22:30:40,501 Devicetime: 2025/05/29 22:30:39,391
Peer FH: Constructing an IKE_AUTH-RESPONSE for send
Constructing payload NOTIFY(MOBIKE_SUPPORTED) (41):
+Initiator does not support MOBIKE
Constructing payload NOTIFY(MANAGEMENT_IP4_ADDRESS) (41):
Constructing payload NOTIFY(MANAGEMENT_IP6_ADDRESS) (41):
Constructing payload CP(REPLY) (47):
+INTERNAL_IP4_ADDRESS(235.2.143.209)
+INTERNAL_IP4_DNS(192.168.99.1)
Constructing payload NOTIFY(INITIAL_CONTACT) (41):
Message encrypted successfully
Message authenticated successfully
IKE_SA(0x1373E76990BC9BB206D5DF200CB90E7A).EXPECTED-MSG-ID raised to 2
IPSEC overhead initialized to 34
(IKEv2-Exchange 'FH', 'IPSEC-0-FH-PR0-L0-R0' 0x1373E76990BC9BB206D5DF200CB90E7A00000001, P2, RESPONDER, comchannel 12): Resetting Negotiation SA
(CHILD_SA, 'FH', 'IPSEC-0-FH-PR0-L0-R0', 0x1373E76990BC9BB206D5DF200CB90E7A0000000100, responder): use_count --2
+(request, response) pair inserted into retransmission map
Sending an IKE_AUTH-RESPONSE of 240 bytes (responder encrypted)
Gateways: 192.168.178.125:500-->192.168.178.79:55605, tag 0 (UDP)
SPIs: 0x1373E76990BC9BB206D5DF200CB90E7A, Message-ID 1
Payloads: ENCR
[VPN-Status] 2025/05/29 22:30:40,501 Devicetime: 2025/05/29 22:30:39,391
Peer FH: Constructing an IKE_AUTH-RESPONSE for send
+Local-ID 192.168.178.125:IPV4_ADDR
+I use AUTH(PSK)
IKE_SA_INIT [responder] for peer FH initiator id FH, responder id 192.168.178.125
initiator cookie: 0x1373E76990BC9BB2, responder cookie: 0x06D5DF200CB90E7A
SA ISAKMP for peer FH
Encryption : AES-CBC-256
Integrity : AUTH-HMAC-SHA-256
IKE-DH-Group : 16
PRF : PRF-HMAC-SHA1
life time soft 05/30/2025 20:06:39 (in 77760 sec) / 0 kb
life time hard 05/30/2025 22:30:39 (in 86400 sec) / 0 kb
DPD: 31 sec
Negotiated: IKEV2_FRAGMENTATION
Reply attributes:
INTERNAL_IP4_ADDRESS(235.2.143.209)
INTERNAL_IP4_DNS(192.168.99.1)
+TSi 0: ( 0, 0-65535, 235.2.143.209-235.2.143.209 )
+TSr 0: ( 0, 0-65535, 0.0.0.0-255.255.255.255)
+CHILD-SA:
ESP-Proposal-1 My-SPI: 0x9111BE9C (3 transforms)
ENCR : AES-CBC-256
INTEG: HMAC-SHA-256
ESN : NONE
CHILD_SA [responder] done with 2 SAS for peer FH rule IPSEC-0-FH-PR0-L0-R0
192.168.178.125:500-->192.168.178.79:55605, Routing tag 0, Com-channel 12, IPsec-Offset 77
rule: ipsec 0.0.0.0/0 <-> 235.2.143.209/32
outgoing SA ESP [0x54F8255C]
Encryption : AES-CBC-256
Integrity : AUTH-HMAC-SHA-256
PFS-DH-Group : None
ESN : None
incoming SA ESP [0x9111BE9C]
Encryption : AES-CBC-256
Integrity : AUTH-HMAC-SHA-256
PFS-DH-Group : None
ESN : None
life time soft 05/30/2025 02:06:39 (in 12960 sec) / 1800000 kb
life time hard 05/30/2025 02:30:39 (in 14400 sec) / 2000000 kb
tunnel between src: 192.168.178.125 dst: 192.168.178.79
Sending an IKE_AUTH-RESPONSE of 240 bytes (responder encrypted)
Gateways: 192.168.178.125:500-->192.168.178.79:55605, tag 0 (UDP)
SPIs: 0x1373E76990BC9BB206D5DF200CB90E7A, Message-ID 1
[VPN-Debug] 2025/05/29 22:30:40,559 Devicetime: 2025/05/29 22:30:39,391
Peer FH: Trigger next pended request to establish an exchange
Current request is none
IKE_SA is not REPLACED
There are 0 pending requests
[VPN-Status] 2025/05/29 22:30:40,559 Devicetime: 2025/05/29 22:30:39,391
set_ip_transport for FH: [id: 701, UDP (17) {incoming unicast, fixed source address}, dst: 192.168.178.79, tag 0 (U), src: 192.168.178.125, hop limit: 64, pmtu: 1500, iface: INET_1 (3), mac address: b0:cf:cb:fa:3f:57, port 0] (vpn-mtu=1280 vpn-mtu-offset=77)
[VPN-Status] 2025/05/29 22:30:40,559 Devicetime: 2025/05/29 22:30:39,391
VPN: WAN state changed to WanCalled for FH (192.168.178.79 IKEv2)[BT] ffffffff82e753eb ffffffff82e84963 ffffffff82e5f3ed ffffffff83cb21a9 ffffffff85f92456 ffffffff83cacdb9 ffffffff83cb5f30
[VPN-Status] 2025/05/29 22:30:40,559 Devicetime: 2025/05/29 22:30:39,391
vpn-maps[12], remote: FH, nego, dns-name, static-name, connected-by-name
[VPN-Status] 2025/05/29 22:30:40,559 Devicetime: 2025/05/29 22:30:39,391
VPN: wait for IKE negotiation from FH (192.168.178.79 IKEv2)
[VPN-Status] 2025/05/29 22:30:40,559 Devicetime: 2025/05/29 22:30:39,391
VPN: WAN state changed to WanProtocol for FH (192.168.178.79 IKEv2)[BT] ffffffff82e753eb ffffffff82e84963 ffffffff82e5de4b ffffffff82e5f23c ffffffff83cb21a9 ffffffff85f92456 ffffffff83cacdb9 ffffffff83cb5f30
[VPN-Status] 2025/05/29 22:30:41,511 Devicetime: 2025/05/29 22:30:40,393
VPN: FH connected
[VPN-Debug] 2025/05/29 22:30:41,511 Devicetime: 2025/05/29 22:30:40,393 [Tunnel-Groups] Peer FH without group has connected to 192.168.178.79, ignored
[VPN-Status] 2025/05/29 22:30:41,511 Devicetime: 2025/05/29 22:30:40,393
VPN: WAN state changed to WanConnect for FH (192.168.178.79 IKEv2)[BT] ffffffff82e753eb ffffffff82e84963 ffffffff82e5cf0e ffffffff8189e6e5 ffffffff85f92456 ffffffff83cacdb9 ffffffff83cb5f30
[VPN-Status] 2025/05/29 22:30:41,511 Devicetime: 2025/05/29 22:30:40,393
vpn-maps[12], remote: FH, connected, dns-name, static-name, connected-by-name
[TraceStopped] 2025/05/29 22:30:57,233