VPN Verbindung bricht immer wieder ab

Forum zu aktuellen Geräten der LANCOM Router/Gateway Serie

Moderator: Lancom-Systems Moderatoren

Antworten
IngoDemos
Beiträge: 8
Registriert: 20 Mär 2006, 15:54

VPN Verbindung bricht immer wieder ab

Beitrag von IngoDemos »

Hallo ich habe eine VPN-Verbindung zwischen dem LANCOM Standard VPN Client und einem DSL/l 1611 Router. Wenn ich die ganzez Zeit arbeite ist die Verbindung auch stabil. Sobald ich aber ca. 60 sec nichts tue wird die Verbindung abgebaut.
Ich habe mal ein Trace gemacht:

[VPN-Status] 2007/08/09 10:03:07,370
VPN: installing ruleset for DEMOS (192.168.100.238)

[VPN-Status] 2007/08/09 10:03:07,420
VPN: ruleset installed for DEMOS (192.168.100.238)

[VPN-Status] 2007/08/09 10:03:07,420
VPN: wait for IKE negotiation from DEMOS (192.168.100.238)

[VPN-Status] 2007/08/09 10:03:07,460
VPN: rulesets installed

[VPN-Status] 2007/08/09 10:03:08,030
IKE info: The remote server 192.168.100.238:500 peer DEMOS id <no_id> supports NAT-T in mode draft
IKE info: The remote server 192.168.100.238:500 peer DEMOS id <no_id> supports NAT-T in mode draft

[VPN-Status] 2007/08/09 10:03:08,030
IKE info: Phase-1 remote proposal 1 for peer DEMOS matched with local proposal 1

[VPN-Status] 2007/08/09 10:03:08,860
IKE info: Phase-1 [responder] for peer DEMOS between initiator id 192.168.100.238, responder id 192.168.100.250 done
IKE info: SA ISAKMP for peer DEMOS encryption 3des-cbc authentication md5
IKE info: life time ( 20000 sec/ 0 kb)

[VPN-Status] 2007/08/09 10:03:08,960
IKE info: Phase-2 remote proposal 1 for peer DEMOS matched with local proposal 1

[VPN-Status] 2007/08/09 10:03:09,810
IKE info: Phase-2 [responder] done with 2 SAS for peer DEMOS rule ipsec-0-DEMOS-pr0-l0-r0
IKE info: rule:' ipsec 192.168.100.0/255.255.255.0 <-> 192.168.100.238/255.255.255.255 '
IKE info: SA ESP [0xde540fa0] alg 3DES keylength 192 +hmac HMAC_MD5 outgoing
IKE info: SA ESP [0x7367f4ff] alg 3DES keylength 192 +hmac HMAC_MD5 incoming
IKE info: life soft( 720 sec/36000 kb) hard (800 sec/40000 kb)
IKE info: tunnel between src: 192.168.100.250 dst: 192.168.100.238

[VPN-Status] 2007/08/09 10:03:10,820
VPN: DEMOS (192.168.100.238) connected

[VPN-Status] 2007/08/09 10:03:30,820
VPN: Disconnect info: physical-disconnected (0x4304) for DEMOS (192.168.100.238)

[VPN-Status] 2007/08/09 10:03:30,820
VPN: disconnecting DEMOS (192.168.100.238)

[VPN-Status] 2007/08/09 10:03:30,860
IKE info: Delete Notificaton sent for Phase-2 SA ipsec-0-DEMOS-pr0-l0-r0 to peer DEMOS, spi [0x7367f4ff]

[VPN-Status] 2007/08/09 10:03:30,870
IKE info: Phase-2 SA removed: peer DEMOS rule ipsec-0-DEMOS-pr0-l0-r0 removed
IKE info: containing Protocol IPSEC_ESP, with spis [de540fa0 ] [7367f4ff ]

[VPN-Status] 2007/08/09 10:03:30,870
IKE info: Delete Notificaton sent for Phase-1 SA to peer DEMOS

[VPN-Status] 2007/08/09 10:03:30,870
IKE info: Phase-1 SA removed: peer DEMOS rule DEMOS removed

[VPN-Status] 2007/08/09 10:03:30,970
VPN: selecting first remote gateway using strategy eFirst for DEMOS
=> no remote gateway selected

[VPN-Status] 2007/08/09 10:03:30,970
VPN: installing ruleset for DEMOS (0.0.0.0)

[VPN-Status] 2007/08/09 10:03:31,070
VPN: DEMOS (0.0.0.0) disconnected

[VPN-Status] 2007/08/09 10:03:31,100
VPN: rulesets installed

[VPN-Status] 2007/08/09 10:04:34,660
VPN: installing ruleset for DEMOS (192.168.100.238)

[VPN-Status] 2007/08/09 10:04:34,720
VPN: ruleset installed for DEMOS (192.168.100.238)

[VPN-Status] 2007/08/09 10:04:34,720
VPN: wait for IKE negotiation from DEMOS (192.168.100.238)

[VPN-Status] 2007/08/09 10:04:34,760
VPN: rulesets installed

[VPN-Status] 2007/08/09 10:04:35,220
IKE info: The remote server 192.168.100.238:500 peer DEMOS id <no_id> supports NAT-T in mode draft

[VPN-Status] 2007/08/09 10:04:35,220
IKE info: Phase-1 remote proposal 1 for peer DEMOS matched with local proposal 1

[VPN-Status] 2007/08/09 10:04:36,050
IKE info: Phase-1 [responder] for peer DEMOS between initiator id 192.168.100.238, responder id 192.168.100.250 done
IKE info: SA ISAKMP for peer DEMOS encryption 3des-cbc authentication md5
IKE info: life time ( 20000 sec/ 0 kb)

[VPN-Status] 2007/08/09 10:04:36,180
IKE info: Phase-2 remote proposal 1 for peer DEMOS matched with local proposal 1

[VPN-Status] 2007/08/09 10:04:36,890
IKE info: Phase-2 [responder] done with 2 SAS for peer DEMOS rule ipsec-0-DEMOS-pr0-l0-r0
IKE info: rule:' ipsec 192.168.100.0/255.255.255.0 <-> 192.168.100.238/255.255.255.255 '
IKE info: SA ESP [0xa926ff93] alg 3DES keylength 192 +hmac HMAC_MD5 outgoing
IKE info: SA ESP [0x03ea13e3] alg 3DES keylength 192 +hmac HMAC_MD5 incoming
IKE info: life soft( 720 sec/36000 kb) hard (800 sec/40000 kb)
IKE info: tunnel between src: 192.168.100.250 dst: 192.168.100.238

[VPN-Status] 2007/08/09 10:04:37,900
VPN: DEMOS (192.168.100.238) connected

Viele Grüße

Ingo
Antworten