unten der Trace.
Es sieht für mich immer noch so aus, als wenn beide probieren würden, die Verbindung aufzubauen. Wenn der Lancom es zuerst schafft, funktioniert der Hermes nicht mehr.
Code: Alles auswählen
unten der Trace.
Es sieht für mich immer noch so aus, als wenn beide probieren würden, die Verbindung aufzubauen. Wenn der Lancom es zuerst schafft, funktioniert der Hermes nicht mehr.
Jemand eine Idee?
Kann ich beim Lancom ausschalten, dass er die Verbindung innitieren möchte?
[code][VPN-Status] 2013/12/23 10:29:39,033
IKE info: NOTIFY received of type ISAKMP_NOTIFY_DPD_R_U_THERE for peer ARAKIEL S eq-Nr 0xc34, expected 0xc34
[VPN-Status] 2013/12/23 10:29:39,034
IKE info: ISAKMP_NOTIFY_DPD_R_U_THERE_ACK sent for Phase-1 SA to peer ARAKIEL, s equence nr 0xc34
[VPN-Status] 2013/12/23 10:29:49,394
IKE info: The remote peer ARAKIEL supports NAT-T in draft mode
IKE info: The remote peer ARAKIEL supports NAT-T in draft mode
IKE info: The remote peer ARAKIEL supports NAT-T in RFC mode
IKE info: The remote server xxx.xxx.xxx.xxx:500 (UDP) peer ARAKIEL id <no_id> negotiated rfc-3706-dead-peer-detection
[VPN-Status] 2013/12/23 10:29:49,395
IKE info: phase-1 proposal failed: remote No 1 encryption algorithm = 3DES_CBC <-> local No 1 encryption algorithm = AES_CBC
IKE info: phase-1 proposal failed: remote No 1 encryption algorithm = 3DES_CBC <-> local No 2 encryption algorithm = AES_CBC
IKE info: phase-1 proposal failed: remote No 1 encryption algorithm = 3DES_CBC <-> local No 3 encryption algorithm = BLOWFISH_ CBC
IKE info: phase-1 proposal failed: remote No 1 encryption algorithm = 3DES_CBC <-> local No 4 encryption algorithm = BLOWFISH_ CBC
IKE info: phase-1 proposal failed: remote No 1 encryption algorithm = 3DES_CBC <-> local No 5 encryption algorithm = CAST_CBC
IKE info: phase-1 proposal failed: remote No 1 encryption algorithm = 3DES_CBC <-> local No 6 encryption algorithm = CAST_CBC
IKE info: phase-1 proposal failed: remote No 1 hash algorithm = SHA <-> local No 7 hash algorithm = MD5
IKE info: Phase-1 remote proposal 1 for peer ARAKIEL matched with local proposal 8
[VPN-Status] 2013/12/23 10:29:49,783
IKE info: Phase-1 [responder] for peer ARAKIEL between initiator id alteratskiel.dyn.promedisoft.com, responder id 84.144.165 .13 done
IKE info: SA ISAKMP for peer ARAKIEL encryption 3des-cbc authentication sha1
IKE info: life time ( 3600 sec/ 0 kb)
[VPN-Status] 2013/12/23 10:29:49,784
IKE info: Phase-1 SA Rekeying Timeout (Soft-Event) for peer ARAKIEL set to 3240 seconds (Responder)
[VPN-Status] 2013/12/23 10:29:49,784
IKE info: Phase-1 SA Timeout (Hard-Event) for peer ARAKIEL set to 3600 seconds (Responder)
[VPN-Status] 2013/12/23 10:30:01,491
IKE info: NOTIFY received of type ISAKMP_NOTIFY_DPD_R_U_THERE for peer ARAKIEL Seq-Nr 0x6517, expected 0x6517
[VPN-Status] 2013/12/23 10:30:01,492
IKE info: ISAKMP_NOTIFY_DPD_R_U_THERE_ACK sent for Phase-1 SA to peer ARAKIEL, sequence nr 0x6517
[VPN-Status] 2013/12/23 10:30:04,500
IKE info: Delete Notificaton sent for Phase-1 SA to peer ARAKIEL
[VPN-Status] 2013/12/23 10:30:04,500
IKE info: Phase-1 SA removed: peer ARAKIEL rule ARAKIEL removed
[VPN-Status] 2013/12/23 10:30:13,580
IKE info: NOTIFY received of type ISAKMP_NOTIFY_DPD_R_U_THERE for peer ARAKIEL Seq-Nr 0x6518, expected 0x6518
[VPN-Status] 2013/12/23 10:30:13,581
IKE info: ISAKMP_NOTIFY_DPD_R_U_THERE_ACK sent for Phase-1 SA to peer ARAKIEL, sequence nr 0x6518
[VPN-Status] 2013/12/23 10:30:25,649
IKE info: NOTIFY received of type ISAKMP_NOTIFY_DPD_R_U_THERE for peer ARAKIEL Seq-Nr 0x6519, expected 0x6519
[VPN-Status] 2013/12/23 10:30:25,650
IKE info: ISAKMP_NOTIFY_DPD_R_U_THERE_ACK sent for Phase-1 SA to peer ARAKIEL, sequence nr 0x6519
[VPN-Status] 2013/12/23 10:30:37,748
IKE info: NOTIFY received of type ISAKMP_NOTIFY_DPD_R_U_THERE for peer ARAKIEL Seq-Nr 0x651a, expected 0x651a
[VPN-Status] 2013/12/23 10:30:37,749
IKE info: ISAKMP_NOTIFY_DPD_R_U_THERE_ACK sent for Phase-1 SA to peer ARAKIEL, sequence nr 0x651a
[VPN-Status] 2013/12/23 10:30:49,907
IKE info: NOTIFY received of type ISAKMP_NOTIFY_DPD_R_U_THERE for peer ARAKIEL Seq-Nr 0x651b, expected 0x651b
[VPN-Status] 2013/12/23 10:30:49,907
IKE info: ISAKMP_NOTIFY_DPD_R_U_THERE_ACK sent for Phase-1 SA to peer ARAKIEL, sequence nr 0x651b
[VPN-Status] 2013/12/23 10:31:02,006
IKE info: NOTIFY received of type ISAKMP_NOTIFY_DPD_R_U_THERE for peer ARAKIEL Seq-Nr 0x651c, expected 0x651c
[VPN-Status] 2013/12/23 10:31:02,006
IKE info: ISAKMP_NOTIFY_DPD_R_U_THERE_ACK sent for Phase-1 SA to peer ARAKIEL, sequence nr 0x651c
[VPN-Status] 2013/12/23 10:31:06,260
suppress DNS resolution for ARAKIEL
IpStr=>alteratskiel.dyn.promedisoft.com<, IpAddr=xxx.xxx.xxx.xxx, IpTtl=10s
[VPN-Status] 2013/12/23 10:31:14,077
IKE info: NOTIFY received of type ISAKMP_NOTIFY_DPD_R_U_THERE for peer ARAKIEL Seq-Nr 0x651d, expected 0x651d
[VPN-Status] 2013/12/23 10:31:14,078
IKE info: ISAKMP_NOTIFY_DPD_R_U_THERE_ACK sent for Phase-1 SA to peer ARAKIEL, sequence nr 0x651d
[VPN-Status] 2013/12/23 10:31:26,114
IKE info: NOTIFY received of type ISAKMP_NOTIFY_DPD_R_U_THERE for peer ARAKIEL Seq-Nr 0x651e, expec
[VPN-Status] 2013/12/23 10:31:26,115
IKE info: ISAKMP_NOTIFY_DPD_R_U_THERE_ACK sent for Phase-1 SA to peer ARAKIEL, sequence nr 0x651e
[VPN-Status] 2013/12/23 10:31:38,193
IKE info: NOTIFY received of type ISAKMP_NOTIFY_DPD_R_U_THERE for peer ARAKIEL Seq-Nr 0x651f, expec
[VPN-Status] 2013/12/23 10:31:38,194
IKE info: ISAKMP_NOTIFY_DPD_R_U_THERE_ACK sent for Phase-1 SA to peer ARAKIEL, sequence nr 0x651f
[VPN-Status] 2013/12/23 10:31:50,332
IKE info: NOTIFY received of type ISAKMP_NOTIFY_DPD_R_U_THERE for peer ARAKIEL Seq-Nr 0x6520, expec
[VPN-Status] 2013/12/23 10:31:50,333
IKE info: ISAKMP_NOTIFY_DPD_R_U_THERE_ACK sent for Phase-1 SA to peer ARAKIEL, sequence nr 0x6520
[VPN-Status] 2013/12/23 10:32:02,371
IKE info: NOTIFY received of type ISAKMP_NOTIFY_DPD_R_U_THERE for peer ARAKIEL Seq-Nr 0x6521, expected 0x6521
[VPN-Status] 2013/12/23 10:32:02,371
IKE info: ISAKMP_NOTIFY_DPD_R_U_THERE_ACK sent for Phase-1 SA to peer ARAKIEL, sequence nr 0x6521
[VPN-Status] 2013/12/23 10:32:14,500
IKE info: NOTIFY received of type ISAKMP_NOTIFY_DPD_R_U_THERE for peer ARAKIEL Seq-Nr 0x6522, expected 0x6522
[VPN-Status] 2013/12/23 10:32:14,500
IKE info: ISAKMP_NOTIFY_DPD_R_U_THERE_ACK sent for Phase-1 SA to peer ARAKIEL, sequence nr 0x6522
[VPN-Status] 2013/12/23 10:32:15,700
suppress DNS resolution for ARAKIEL
IpStr=>alteratskiel.dyn.promedisoft.com<, IpAddr=xxx.xxx.xxx.xxx, IpTtl=10s
[VPN-Status] 2013/12/23 10:32:20,510
IKE info: Phase-2 SA Soft-Event occured for peer ARAKIEL (Responder)
[VPN-Status] 2013/12/23 10:32:20,518
IKE info: soft event: rekeying started for peer ARAKIEL, rule ipsec-0-ARAKIEL-pr0-l0-r0
[VPN-Status] 2013/12/23 10:32:20,645
IKE info: Phase-2 SA Rekeying Timeout (Soft-Event) for peer ARAKIEL set to 23040 seconds (Initiator)
[VPN-Status] 2013/12/23 10:32:20,645
IKE info: Phase-2 SA Timeout (Hard-Event) for peer ARAKIEL set to 28800 seconds (Initiator)
[VPN-Status] 2013/12/23 10:32:20,646
IKE info: Phase-2 [inititiator] done with 2 SAS for peer ARAKIEL rule ipsec-0-ARAKIEL-pr0-l0-r0
IKE info: rule:' ipsec 10.1.110.0/255.255.255.0 <-> 10.46.20.0/255.255.255.0 '
IKE info: SA ESP [0xb5be3d24] alg AES keylength 256 +hmac HMAC_SHA outgoing
IKE info: SA ESP [0x1aa96493] alg AES keylength 256 +hmac HMAC_SHA incoming
IKE info: life soft( 23040 sec/1600000 kb) hard (28800 sec/2000000 kb)
IKE info: tunnel between src: xxx.xxx.xxx.xxx dst: xxx.xxx.xxx.xxx
[VPN-Status] 2013/12/23 10:32:26,679
IKE info: NOTIFY received of type ISAKMP_NOTIFY_DPD_R_U_THERE for peer ARAKIEL Seq-Nr 0x6523, expected 0x6523
[VPN-Status] 2013/12/23 10:32:26,679
IKE info: ISAKMP_NOTIFY_DPD_R_U_THERE_ACK sent for Phase-1 SA to peer ARAKIEL, sequence nr 0x6523
[VPN-Status] 2013/12/23 10:32:35,690
IKE info: Delete Notificaton sent for Phase-2 SA ipsec-0-ARAKIEL-pr0-l0-r0 to peer ARAKIEL, spi [0x1115e07e]
[VPN-Status] 2013/12/23 10:32:35,690
IKE info: Phase-2 SA removed: peer ARAKIEL rule ipsec-0-ARAKIEL-pr0-l0-r0 removed
IKE info: containing Protocol IPSEC_ESP, with spis [53e40800 ] [1115e07e ]
[VPN-Status] 2013/12/23 10:32:38,747
IKE info: NOTIFY received of type ISAKMP_NOTIFY_DPD_R_U_THERE for peer ARAKIEL Seq-Nr 0x6524, expected 0x6524
[VPN-Status] 2013/12/23 10:32:38,748
IKE info: ISAKMP_NOTIFY_DPD_R_U_THERE_ACK sent for Phase-1 SA to peer ARAKIEL, sequence nr 0x6524
[VPN-Status] 2013/12/23 10:32:50,906
IKE info: NOTIFY received of type ISAKMP_NOTIFY_DPD_R_U_THERE for peer ARAKIEL Seq-Nr 0x6525, expected 0x6525
[VPN-Status] 2013/12/23 10:32:50,907
IKE info: ISAKMP_NOTIFY_DPD_R_U_THERE_ACK sent for Phase-1 SA to peer ARAKIEL, sequence nr 0x6525
[VPN-Status] 2013/12/23 10:33:03,025
IKE info: NOTIFY received of type ISAKMP_NOTIFY_DPD_R_U_THERE for peer ARAKIEL Seq-Nr 0x6526, expected 0x6526
[VPN-Status] 2013/12/23 10:33:03,026
IKE info: ISAKMP_NOTIFY_DPD_R_U_THERE_ACK sent for Phase-1 SA to peer ARAKIEL, sequence nr 0x6526