Hello all, does anyone tested this config and can help me?
The thing is, I can connect to the router, the status is "tunnel enabled". If I start to ping a client inside the 192.168.6.0 network, the client starts negotiating again, but nothing happens (e.g. I get no answer from the pinged device). With VPN Trace I can see (in Security Associations), that the tunnel always stays in LARVAL state. The IKE Service Log can be found below. Any suggestions for me (and sorry for this long mail)? Thanks, Alexander The settings I use on the Linksys (Firmware 1.45.7, Dec 30 2003) are: (I know not the best settings possible, but these are the default settings of the device) VPN SETTINGS Tunnel Name: Alex1 Local Secure Group: 192.168.6.0, Mask:255.255.255.0 (Local LAN behind Linksys) Remote Secure Group: Any (This Gateway accepts request from any IP address!) Remote Security Gateway: Any (This Gateway accepts request from any IP address!) Encryption: DES (3DES is not selected) Authentication: MD5 (SHA is not selected) Key Management: Auto (IKE) PFS (Perfect Forward Secrecy) enabled Pre-shared Key:xxxxxx Key Lifetime: 3600 Sec. ADVANCED SETTINGS Phase 1: Mode: Main mode Proposal 1: Encryption: DES Authentication: MD5 Group 768 Bit Key Lifetime: 3600 seconds (Note: Following three additional proposals are also proposed in Main mode: DES/MD5/768, 3DES/SHA/1024 and 3DES/MD5/1024.) Phase 2: Enccryption: DES Authentication: MD5 PFS: On Group: 768 Bit Key Lifetime: 3600 seconds ------------------------------------------------------------------ On the Client Side I use: General: Serverip, Port 500, Auto Config disabled Local Host, Address Method: Use existing Client: NAT Traversal: enable, Port 4500, 15s, IKE Fragmentation disabled Dead Peer Detection and ISAKMP Failure Notifications enabled Name Resolution: Nothing enabled/checked. Authentication: Mutual PSK Local Identity: IP Address, checked Use a discovered local host address Remote Identity: IP Address, checked Use a discovered remote host address Credentials: the Pre Shared Key :-) Phase1: Main, auto, des, md5, 3600s, 0kbytes. Phase2: esp-des,md5,group1, disabled, 3600s, 0kbytes Policy: Unique, nothing checked, include 192.168.6.0 / 255.255.255.0 ------------------------------------------------------------------ IKE Service Log 11/04/20 12:47:37 ## : IKE Daemon, ver 2.1.7 11/04/20 12:47:37 ## : Copyright 2010 Shrew Soft Inc. 11/04/20 12:47:37 ## : This product linked OpenSSL 0.9.8h 28 May 2008 11/04/20 12:47:37 ii : opened 'C:\Programme\ShrewSoft\VPN Client\debug\iked.log' 11/04/20 12:47:37 ii : rebuilding vnet device list ... 11/04/20 12:47:37 ii : device ROOT\VNET\0000 disabled 11/04/20 12:47:37 ii : network process thread begin ... 11/04/20 12:47:37 ii : ipc server process thread begin ... 11/04/20 12:47:37 ii : pfkey process thread begin ... 11/04/20 12:47:47 !! : unable to connect to pfkey interface 11/04/20 12:47:54 ii : ipc client process thread begin ... 11/04/20 12:47:54 <A : peer config add message 11/04/20 12:47:54 DB : peer ref increment ( ref count = 1, obj count = 0 ) 11/04/20 12:47:54 DB : peer added ( obj count = 1 ) 11/04/20 12:47:54 ii : local address 2.200.38.165 selected for peer 11/04/20 12:47:54 DB : peer ref increment ( ref count = 2, obj count = 1 ) 11/04/20 12:47:54 DB : tunnel ref increment ( ref count = 1, obj count = 0 ) 11/04/20 12:47:54 DB : tunnel added ( obj count = 1 ) 11/04/20 12:47:54 <A : proposal config message 11/04/20 12:47:54 <A : proposal config message 11/04/20 12:47:54 <A : client config message 11/04/20 12:47:54 <A : preshared key message 11/04/20 12:47:54 <A : remote resource message 11/04/20 12:47:54 <A : peer tunnel enable message 11/04/20 12:47:54 DB : tunnel ref increment ( ref count = 2, obj count = 1 ) 11/04/20 12:47:54 DB : new phase1 ( ISAKMP initiator ) 11/04/20 12:47:54 DB : exchange type is identity protect 11/04/20 12:47:54 DB : 2.200.38.165:500 <-> 62.226.82.189:500 11/04/20 12:47:54 DB : 24bc4af0af0b6800:0000000000000000 11/04/20 12:47:54 DB : phase1 ref increment ( ref count = 1, obj count = 0 ) 11/04/20 12:47:54 DB : phase1 added ( obj count = 1 ) 11/04/20 12:47:54 >> : security association payload 11/04/20 12:47:54 >> : - proposal #1 payload 11/04/20 12:47:54 >> : -- transform #1 payload 11/04/20 12:47:54 >> : -- transform #2 payload 11/04/20 12:47:54 >> : -- transform #3 payload 11/04/20 12:47:54 >> : -- transform #4 payload 11/04/20 12:47:54 >> : -- transform #5 payload 11/04/20 12:47:54 >> : vendor id payload 11/04/20 12:47:54 ii : local supports nat-t ( draft v00 ) 11/04/20 12:47:54 >> : vendor id payload 11/04/20 12:47:54 ii : local supports nat-t ( draft v01 ) 11/04/20 12:47:54 >> : vendor id payload 11/04/20 12:47:54 ii : local supports nat-t ( draft v02 ) 11/04/20 12:47:54 >> : vendor id payload 11/04/20 12:47:54 ii : local supports nat-t ( draft v03 ) 11/04/20 12:47:54 >> : vendor id payload 11/04/20 12:47:54 ii : local supports nat-t ( rfc ) 11/04/20 12:47:54 >> : vendor id payload 11/04/20 12:47:54 ii : local supports DPDv1 11/04/20 12:47:54 >> : vendor id payload 11/04/20 12:47:54 ii : local is SHREW SOFT compatible 11/04/20 12:47:54 >> : vendor id payload 11/04/20 12:47:54 ii : local is NETSCREEN compatible 11/04/20 12:47:54 >> : vendor id payload 11/04/20 12:47:54 ii : local is SIDEWINDER compatible 11/04/20 12:47:54 >> : vendor id payload 11/04/20 12:47:54 ii : local is CISCO UNITY compatible 11/04/20 12:47:54 >= : cookies 24bc4af0af0b6800:0000000000000000 11/04/20 12:47:54 >= : message 00000000 11/04/20 12:47:54 -> : send IKE packet 2.200.38.165:500 -> 62.226.82.189:500 ( 460 bytes ) 11/04/20 12:47:54 DB : phase1 resend event scheduled ( ref count = 2 ) 11/04/20 12:47:54 DB : phase1 ref decrement ( ref count = 1, obj count = 1 ) 11/04/20 12:47:54 DB : tunnel ref increment ( ref count = 3, obj count = 1 ) 11/04/20 12:47:56 <- : recv IKE packet 62.226.82.189:500 -> 2.200.38.165:500 ( 84 bytes ) 11/04/20 12:47:56 DB : phase1 found 11/04/20 12:47:56 DB : phase1 ref increment ( ref count = 2, obj count = 1 ) 11/04/20 12:47:56 ii : processing phase1 packet ( 84 bytes ) 11/04/20 12:47:56 =< : cookies 24bc4af0af0b6800:45830cf66a05afc1 11/04/20 12:47:56 =< : message 00000000 11/04/20 12:47:56 << : security association payload 11/04/20 12:47:56 << : - propsal #1 payload 11/04/20 12:47:56 << : -- transform #1 payload 11/04/20 12:47:56 ii : unmatched isakmp proposal/transform 11/04/20 12:47:56 ii : dh group description ( modp-1024 != modp-3072 ) 11/04/20 12:47:56 ii : unmatched isakmp proposal/transform 11/04/20 12:47:56 ii : dh group description ( modp-1024 != modp-2048 ) 11/04/20 12:47:56 ii : unmatched isakmp proposal/transform 11/04/20 12:47:56 ii : dh group description ( modp-1024 != modp-1536 ) 11/04/20 12:47:56 !! : peer violates RFC, transform number mismatch ( 1 != 4 ) 11/04/20 12:47:56 ii : matched isakmp proposal #1 transform #1 11/04/20 12:47:56 ii : - transform = ike 11/04/20 12:47:56 ii : - cipher type = des 11/04/20 12:47:56 ii : - key length = default 11/04/20 12:47:56 ii : - hash type = md5 11/04/20 12:47:56 ii : - dh group = modp-1024 11/04/20 12:47:56 ii : - auth type = psk 11/04/20 12:47:56 ii : - life seconds = 3600 11/04/20 12:47:56 ii : - life kbytes = 0 11/04/20 12:47:56 >> : key exchange payload 11/04/20 12:47:56 >> : nonce payload 11/04/20 12:47:56 >= : cookies 24bc4af0af0b6800:45830cf66a05afc1 11/04/20 12:47:56 >= : message 00000000 11/04/20 12:47:56 DB : phase1 resend event canceled ( ref count = 1 ) 11/04/20 12:47:56 -> : send IKE packet 2.200.38.165:500 -> 62.226.82.189:500 ( 212 bytes ) 11/04/20 12:47:56 DB : phase1 resend event scheduled ( ref count = 2 ) 11/04/20 12:47:56 DB : phase1 ref decrement ( ref count = 1, obj count = 1 ) 11/04/20 12:47:57 <- : recv IKE packet 62.226.82.189:500 -> 2.200.38.165:500 ( 184 bytes ) 11/04/20 12:47:57 DB : phase1 found 11/04/20 12:47:57 DB : phase1 ref increment ( ref count = 2, obj count = 1 ) 11/04/20 12:47:57 ii : processing phase1 packet ( 184 bytes ) 11/04/20 12:47:57 =< : cookies 24bc4af0af0b6800:45830cf66a05afc1 11/04/20 12:47:57 =< : message 00000000 11/04/20 12:47:57 << : key exchange payload 11/04/20 12:47:57 << : nonce payload 11/04/20 12:47:57 ii : nat-t is unsupported by remote peer 11/04/20 12:47:57 == : DH shared secret ( 128 bytes ) 11/04/20 12:47:57 == : SETKEYID ( 16 bytes ) 11/04/20 12:47:57 == : SETKEYID_d ( 16 bytes ) 11/04/20 12:47:57 == : SETKEYID_a ( 16 bytes ) 11/04/20 12:47:57 == : SETKEYID_e ( 16 bytes ) 11/04/20 12:47:57 == : cipher key ( 8 bytes ) 11/04/20 12:47:57 == : cipher iv ( 8 bytes ) 11/04/20 12:47:57 >> : identification payload 11/04/20 12:47:57 == : phase1 hash_i ( computed ) ( 16 bytes ) 11/04/20 12:47:57 >> : hash payload 11/04/20 12:47:57 >= : cookies 24bc4af0af0b6800:45830cf66a05afc1 11/04/20 12:47:57 >= : message 00000000 11/04/20 12:47:57 >= : encrypt iv ( 8 bytes ) 11/04/20 12:47:57 == : encrypt packet ( 60 bytes ) 11/04/20 12:47:57 == : stored iv ( 8 bytes ) 11/04/20 12:47:57 DB : phase1 resend event canceled ( ref count = 1 ) 11/04/20 12:47:57 -> : send IKE packet 2.200.38.165:500 -> 62.226.82.189:500 ( 88 bytes ) 11/04/20 12:47:57 DB : phase1 ref decrement ( ref count = 0, obj count = 1 ) 11/04/20 12:47:58 <- : recv IKE packet 62.226.82.189:500 -> 2.200.38.165:500 ( 60 bytes ) 11/04/20 12:47:58 DB : phase1 found 11/04/20 12:47:58 DB : phase1 ref increment ( ref count = 1, obj count = 1 ) 11/04/20 12:47:58 ii : processing phase1 packet ( 60 bytes ) 11/04/20 12:47:58 =< : cookies 24bc4af0af0b6800:45830cf66a05afc1 11/04/20 12:47:58 =< : message 00000000 11/04/20 12:47:58 =< : decrypt iv ( 8 bytes ) 11/04/20 12:47:58 == : decrypt packet ( 60 bytes ) 11/04/20 12:47:58 <= : stored iv ( 8 bytes ) 11/04/20 12:47:58 << : identification payload 11/04/20 12:47:58 ii : phase1 id match ( natt prevents ip match ) 11/04/20 12:47:58 ii : received = ipv4-host 62.226.82.189 11/04/20 12:47:58 << : hash payload 11/04/20 12:47:58 == : phase1 hash_r ( computed ) ( 16 bytes ) 11/04/20 12:47:58 == : phase1 hash_r ( received ) ( 16 bytes ) 11/04/20 12:47:58 ii : phase1 sa established 11/04/20 12:47:58 ii : 62.226.82.189:500 <-> 2.200.38.165:500 11/04/20 12:47:58 ii : 24bc4af0af0b6800:45830cf66a05afc1 11/04/20 12:47:58 ii : sending peer INITIAL-CONTACT notification 11/04/20 12:47:58 ii : - 2.200.38.165:500 -> 62.226.82.189:500 11/04/20 12:47:58 ii : - isakmp spi = 24bc4af0af0b6800:45830cf66a05afc1 11/04/20 12:47:58 ii : - data size 0 11/04/20 12:47:58 >> : hash payload 11/04/20 12:47:58 >> : notification payload 11/04/20 12:47:58 == : new informational hash ( 16 bytes ) 11/04/20 12:47:58 == : new informational iv ( 8 bytes ) 11/04/20 12:47:58 >= : cookies 24bc4af0af0b6800:45830cf66a05afc1 11/04/20 12:47:58 >= : message 45fc1aaa 11/04/20 12:47:58 >= : encrypt iv ( 8 bytes ) 11/04/20 12:47:58 == : encrypt packet ( 76 bytes ) 11/04/20 12:47:58 == : stored iv ( 8 bytes ) 11/04/20 12:47:58 -> : send IKE packet 2.200.38.165:500 -> 62.226.82.189:500 ( 104 bytes ) 11/04/20 12:47:58 DB : tunnel ref increment ( ref count = 4, obj count = 1 ) 11/04/20 12:47:58 DB : config ref increment ( ref count = 1, obj count = 0 ) 11/04/20 12:47:58 DB : config added ( obj count = 1 ) 11/04/20 12:47:58 ii : configuration method is manual 11/04/20 12:47:58 DB : config ref decrement ( ref count = 0, obj count = 1 ) 11/04/20 12:47:58 DB : phase1 ref increment ( ref count = 2, obj count = 1 ) 11/04/20 12:47:58 DB : phase1 ref increment ( ref count = 3, obj count = 1 ) 11/04/20 12:47:58 DB : phase1 ref increment ( ref count = 4, obj count = 1 ) 11/04/20 12:47:58 DB : phase2 not found 11/04/20 12:47:58 DB : phase1 ref decrement ( ref count = 3, obj count = 1 ) 11/04/20 12:47:58 ii : generating IPSEC security policies at UNIQUE level 11/04/20 12:47:58 ii : creating NONE INBOUND policy ANY:62.226.82.189:* -> ANY:2.200.38.165:* 11/04/20 12:47:58 DB : policy ref increment ( ref count = 1, obj count = 0 ) 11/04/20 12:47:58 DB : policy added ( obj count = 1 ) 11/04/20 12:47:58 DB : policy ref decrement ( ref count = 0, obj count = 1 ) 11/04/20 12:47:58 K> : send pfkey X_SPDADD UNSPEC message 11/04/20 12:47:58 ii : creating NONE OUTBOUND policy ANY:2.200.38.165:* -> ANY:62.226.82.189:* 11/04/20 12:47:58 K< : recv pfkey X_SPDADD UNSPEC message 11/04/20 12:47:58 DB : policy found 11/04/20 12:47:58 DB : policy ref increment ( ref count = 1, obj count = 1 ) 11/04/20 12:47:58 DB : policy ref decrement ( ref count = 0, obj count = 1 ) 11/04/20 12:47:58 ii : created NONE policy route for 62.226.82.189/32 11/04/20 12:47:58 DB : policy ref increment ( ref count = 1, obj count = 1 ) 11/04/20 12:47:58 DB : policy added ( obj count = 2 ) 11/04/20 12:47:58 DB : policy ref decrement ( ref count = 0, obj count = 2 ) 11/04/20 12:47:58 K> : send pfkey X_SPDADD UNSPEC message 11/04/20 12:47:58 K< : recv pfkey X_SPDADD UNSPEC message 11/04/20 12:47:58 DB : policy found 11/04/20 12:47:58 DB : policy ref increment ( ref count = 1, obj count = 2 ) 11/04/20 12:47:58 DB : policy ref decrement ( ref count = 0, obj count = 2 ) 11/04/20 12:47:58 ii : creating IPSEC INBOUND policy ANY:192.168.6.0/24:* -> ANY:2.200.38.165:* 11/04/20 12:47:58 DB : policy ref increment ( ref count = 1, obj count = 2 ) 11/04/20 12:47:58 DB : policy added ( obj count = 3 ) 11/04/20 12:47:58 DB : policy ref decrement ( ref count = 0, obj count = 3 ) 11/04/20 12:47:58 K> : send pfkey X_SPDADD UNSPEC message 11/04/20 12:47:58 ii : creating IPSEC OUTBOUND policy ANY:2.200.38.165:* -> ANY:192.168.6.0/24:* 11/04/20 12:47:58 K< : recv pfkey X_SPDADD UNSPEC message 11/04/20 12:47:58 DB : policy found 11/04/20 12:47:58 DB : policy ref increment ( ref count = 1, obj count = 3 ) 11/04/20 12:47:58 DB : policy ref decrement ( ref count = 0, obj count = 3 ) 11/04/20 12:47:58 ii : created IPSEC policy route for 192.168.6.0/24 11/04/20 12:47:58 DB : policy ref increment ( ref count = 1, obj count = 3 ) 11/04/20 12:47:58 DB : policy added ( obj count = 4 ) 11/04/20 12:47:58 DB : policy ref decrement ( ref count = 0, obj count = 4 ) 11/04/20 12:47:58 K> : send pfkey X_SPDADD UNSPEC message 11/04/20 12:47:58 ii : split DNS is disabled 11/04/20 12:47:58 K< : recv pfkey X_SPDADD UNSPEC message 11/04/20 12:47:58 DB : policy found 11/04/20 12:47:58 DB : policy ref increment ( ref count = 1, obj count = 4 ) 11/04/20 12:47:58 DB : policy ref decrement ( ref count = 0, obj count = 4 ) 11/04/20 12:48:05 K< : recv pfkey ACQUIRE UNSPEC message 11/04/20 12:48:05 DB : policy found 11/04/20 12:48:05 DB : policy ref increment ( ref count = 1, obj count = 4 ) 11/04/20 12:48:05 DB : policy found 11/04/20 12:48:05 DB : policy ref increment ( ref count = 1, obj count = 4 ) 11/04/20 12:48:05 DB : tunnel found 11/04/20 12:48:05 DB : tunnel ref increment ( ref count = 5, obj count = 1 ) 11/04/20 12:48:05 DB : tunnel ref increment ( ref count = 6, obj count = 1 ) 11/04/20 12:48:05 DB : new phase2 ( IPSEC initiator ) 11/04/20 12:48:05 DB : phase2 ref increment ( ref count = 1, obj count = 0 ) 11/04/20 12:48:05 DB : phase2 added ( obj count = 1 ) 11/04/20 12:48:05 K> : send pfkey GETSPI ESP message 11/04/20 12:48:05 DB : phase2 ref decrement ( ref count = 0, obj count = 1 ) 11/04/20 12:48:05 DB : tunnel ref decrement ( ref count = 5, obj count = 1 ) 11/04/20 12:48:05 DB : policy ref decrement ( ref count = 0, obj count = 4 ) 11/04/20 12:48:05 DB : policy ref decrement ( ref count = 0, obj count = 4 ) 11/04/20 12:48:05 K< : recv pfkey GETSPI ESP message 11/04/20 12:48:05 DB : phase2 found 11/04/20 12:48:05 DB : phase2 ref increment ( ref count = 1, obj count = 1 ) 11/04/20 12:48:05 ii : updated spi for 1 ipsec-esp proposal 11/04/20 12:48:05 DB : phase1 found 11/04/20 12:48:05 DB : phase1 ref increment ( ref count = 4, obj count = 1 ) 11/04/20 12:48:05 >> : hash payload 11/04/20 12:48:05 >> : security association payload 11/04/20 12:48:05 >> : - proposal #1 payload 11/04/20 12:48:05 >> : -- transform #1 payload 11/04/20 12:48:05 >> : nonce payload 11/04/20 12:48:05 >> : key exchange payload 11/04/20 12:48:05 >> : identification payload 11/04/20 12:48:05 >> : identification payload 11/04/20 12:48:05 == : phase2 hash_i ( input ) ( 212 bytes ) 11/04/20 12:48:05 == : phase2 hash_i ( computed ) ( 16 bytes ) 11/04/20 12:48:05 == : new phase2 iv ( 8 bytes ) 11/04/20 12:48:05 >= : cookies 24bc4af0af0b6800:45830cf66a05afc1 11/04/20 12:48:05 >= : message d04428db 11/04/20 12:48:05 >= : encrypt iv ( 8 bytes ) 11/04/20 12:48:05 == : encrypt packet ( 256 bytes ) 11/04/20 12:48:05 == : stored iv ( 8 bytes ) 11/04/20 12:48:05 -> : send IKE packet 2.200.38.165:500 -> 62.226.82.189:500 ( 288 bytes ) 11/04/20 12:48:05 DB : phase2 resend event scheduled ( ref count = 2 ) 11/04/20 12:48:05 DB : phase1 ref decrement ( ref count = 3, obj count = 1 ) 11/04/20 12:48:05 DB : phase2 ref decrement ( ref count = 1, obj count = 1 ) 11/04/20 12:48:10 -> : resend 1 phase2 packet(s) 2.200.38.165:500 -> 62.226.82.189:500 11/04/20 12:48:15 -> : resend 1 phase2 packet(s) 2.200.38.165:500 -> 62.226.82.189:500 11/04/20 12:48:20 -> : resend 1 phase2 packet(s) 2.200.38.165:500 -> 62.226.82.189:500 11/04/20 12:48:21 K< : recv pfkey ACQUIRE UNSPEC message 11/04/20 12:48:21 DB : policy found 11/04/20 12:48:21 DB : policy ref increment ( ref count = 1, obj count = 4 ) 11/04/20 12:48:21 DB : policy found 11/04/20 12:48:21 DB : policy ref increment ( ref count = 1, obj count = 4 ) 11/04/20 12:48:21 DB : tunnel found 11/04/20 12:48:21 DB : tunnel ref increment ( ref count = 6, obj count = 1 ) 11/04/20 12:48:21 DB : tunnel ref increment ( ref count = 7, obj count = 1 ) 11/04/20 12:48:21 DB : new phase2 ( IPSEC initiator ) 11/04/20 12:48:21 DB : phase2 ref increment ( ref count = 1, obj count = 1 ) 11/04/20 12:48:21 DB : phase2 added ( obj count = 2 ) 11/04/20 12:48:21 K> : send pfkey GETSPI ESP message 11/04/20 12:48:21 DB : phase2 ref decrement ( ref count = 0, obj count = 2 ) 11/04/20 12:48:21 DB : tunnel ref decrement ( ref count = 6, obj count = 1 ) 11/04/20 12:48:21 DB : policy ref decrement ( ref count = 0, obj count = 4 ) 11/04/20 12:48:21 DB : policy ref decrement ( ref count = 0, obj count = 4 ) 11/04/20 12:48:21 K< : recv pfkey GETSPI ESP message 11/04/20 12:48:21 DB : phase2 found 11/04/20 12:48:21 DB : phase2 ref increment ( ref count = 1, obj count = 2 ) 11/04/20 12:48:21 ii : updated spi for 1 ipsec-esp proposal 11/04/20 12:48:21 DB : phase1 found 11/04/20 12:48:21 DB : phase1 ref increment ( ref count = 4, obj count = 1 ) 11/04/20 12:48:21 >> : hash payload 11/04/20 12:48:21 >> : security association payload 11/04/20 12:48:21 >> : - proposal #1 payload 11/04/20 12:48:21 >> : -- transform #1 payload 11/04/20 12:48:21 >> : nonce payload 11/04/20 12:48:21 >> : key exchange payload 11/04/20 12:48:21 >> : identification payload 11/04/20 12:48:21 >> : identification payload 11/04/20 12:48:21 == : phase2 hash_i ( input ) ( 212 bytes ) 11/04/20 12:48:21 == : phase2 hash_i ( computed ) ( 16 bytes ) 11/04/20 12:48:21 == : new phase2 iv ( 8 bytes ) 11/04/20 12:48:21 >= : cookies 24bc4af0af0b6800:45830cf66a05afc1 11/04/20 12:48:21 >= : message 4880aaf1 11/04/20 12:48:21 >= : encrypt iv ( 8 bytes ) 11/04/20 12:48:21 == : encrypt packet ( 256 bytes ) 11/04/20 12:48:21 == : stored iv ( 8 bytes ) 11/04/20 12:48:21 -> : send IKE packet 2.200.38.165:500 -> 62.226.82.189:500 ( 288 bytes ) 11/04/20 12:48:21 DB : phase2 resend event scheduled ( ref count = 2 ) 11/04/20 12:48:21 DB : phase1 ref decrement ( ref count = 3, obj count = 1 ) 11/04/20 12:48:21 DB : phase2 ref decrement ( ref count = 1, obj count = 2 ) 11/04/20 12:48:25 ii : resend limit exceeded for phase2 exchange 11/04/20 12:48:25 ii : phase2 removal before expire time 11/04/20 12:48:25 DB : phase2 deleted ( obj count = 1 ) 11/04/20 12:48:25 DB : tunnel ref decrement ( ref count = 5, obj count = 1 ) 11/04/20 12:48:25 <A : peer tunnel disable message 11/04/20 12:48:25 DB : policy found 11/04/20 12:48:25 DB : policy ref increment ( ref count = 1, obj count = 4 ) 11/04/20 12:48:25 ii : removing IPSEC INBOUND policy ANY:192.168.6.0/24:* -> ANY:2.200.38.165:* 11/04/20 12:48:25 K> : send pfkey X_SPDDELETE2 UNSPEC message 11/04/20 12:48:25 K< : recv pfkey X_SPDDELETE2 UNSPEC message 11/04/20 12:48:25 DB : policy ref decrement ( ref count = 0, obj count = 4 ) 11/04/20 12:48:25 DB : policy found 11/04/20 12:48:25 DB : policy ref increment ( ref count = 1, obj count = 4 ) 11/04/20 12:48:25 ii : removing IPSEC OUTBOUND policy ANY:2.200.38.165:* -> ANY:192.168.6.0/24:* 11/04/20 12:48:25 K> : send pfkey X_SPDDELETE2 UNSPEC message 11/04/20 12:48:25 DB : policy ref decrement ( ref count = 0, obj count = 4 ) 11/04/20 12:48:25 ii : removed IPSEC policy route for ANY:192.168.6.0/24:* 11/04/20 12:48:25 DB : policy found 11/04/20 12:48:25 DB : policy ref increment ( ref count = 1, obj count = 4 ) 11/04/20 12:48:25 ii : removing NONE INBOUND policy ANY:62.226.82.189:* -> ANY:2.200.38.165:* 11/04/20 12:48:25 K> : send pfkey X_SPDDELETE2 UNSPEC message 11/04/20 12:48:25 DB : policy ref decrement ( ref count = 0, obj count = 4 ) 11/04/20 12:48:25 DB : policy found 11/04/20 12:48:25 DB : policy ref increment ( ref count = 1, obj count = 4 ) 11/04/20 12:48:25 ii : removing NONE OUTBOUND policy ANY:2.200.38.165:* -> ANY:62.226.82.189:* 11/04/20 12:48:25 K> : send pfkey X_SPDDELETE2 UNSPEC message 11/04/20 12:48:25 DB : policy ref decrement ( ref count = 0, obj count = 4 ) 11/04/20 12:48:25 ii : removed NONE policy route for ANY:62.226.82.189:* 11/04/20 12:48:25 DB : policy found 11/04/20 12:48:25 DB : policy ref increment ( ref count = 1, obj count = 4 ) 11/04/20 12:48:25 DB : policy deleted ( obj count = 3 ) 11/04/20 12:48:25 K< : recv pfkey X_SPDDELETE2 UNSPEC message 11/04/20 12:48:25 DB : policy found 11/04/20 12:48:25 DB : policy ref increment ( ref count = 1, obj count = 3 ) 11/04/20 12:48:25 DB : policy deleted ( obj count = 2 ) 11/04/20 12:48:25 K< : recv pfkey X_SPDDELETE2 UNSPEC message 11/04/20 12:48:25 DB : policy found 11/04/20 12:48:25 DB : policy ref increment ( ref count = 1, obj count = 2 ) 11/04/20 12:48:25 DB : policy deleted ( obj count = 1 ) 11/04/20 12:48:25 K< : recv pfkey X_SPDDELETE2 UNSPEC message 11/04/20 12:48:25 DB : policy found 11/04/20 12:48:25 DB : policy ref increment ( ref count = 1, obj count = 1 ) 11/04/20 12:48:25 DB : policy deleted ( obj count = 0 ) 11/04/20 12:48:25 DB : tunnel stats event canceled ( ref count = 4 ) 11/04/20 12:48:25 DB : removing tunnel config references 11/04/20 12:48:25 DB : config ref increment ( ref count = 1, obj count = 1 ) 11/04/20 12:48:25 DB : config deleted ( obj count = 0 ) 11/04/20 12:48:25 DB : tunnel ref decrement ( ref count = 3, obj count = 1 ) 11/04/20 12:48:25 DB : removing tunnel phase2 references 11/04/20 12:48:25 DB : phase2 ref increment ( ref count = 2, obj count = 1 ) 11/04/20 12:48:25 DB : phase2 resend event canceled ( ref count = 1 ) 11/04/20 12:48:25 ii : phase2 removal before expire time 11/04/20 12:48:25 DB : phase2 deleted ( obj count = 0 ) 11/04/20 12:48:25 DB : tunnel ref decrement ( ref count = 2, obj count = 1 ) 11/04/20 12:48:25 DB : removing tunnel phase1 references 11/04/20 12:48:25 DB : phase1 ref increment ( ref count = 4, obj count = 1 ) 11/04/20 12:48:25 DB : phase1 soft event canceled ( ref count = 3 ) 11/04/20 12:48:25 DB : phase1 hard event canceled ( ref count = 2 ) 11/04/20 12:48:25 DB : phase1 dead event canceled ( ref count = 1 ) 11/04/20 12:48:25 ii : sending peer DELETE message 11/04/20 12:48:25 ii : - 2.200.38.165:500 -> 62.226.82.189:500 11/04/20 12:48:25 ii : - isakmp spi = 24bc4af0af0b6800:45830cf66a05afc1 11/04/20 12:48:25 ii : - data size 0 11/04/20 12:48:25 >> : hash payload 11/04/20 12:48:25 >> : delete payload 11/04/20 12:48:25 == : new informational hash ( 16 bytes ) 11/04/20 12:48:25 == : new informational iv ( 8 bytes ) 11/04/20 12:48:25 >= : cookies 24bc4af0af0b6800:45830cf66a05afc1 11/04/20 12:48:25 >= : message e08fc1b5 11/04/20 12:48:25 >= : encrypt iv ( 8 bytes ) 11/04/20 12:48:25 == : encrypt packet ( 76 bytes ) 11/04/20 12:48:25 == : stored iv ( 8 bytes ) 11/04/20 12:48:25 -> : send IKE packet 2.200.38.165:500 -> 62.226.82.189:500 ( 104 bytes ) 11/04/20 12:48:25 ii : phase1 removal before expire time 11/04/20 12:48:25 DB : phase1 deleted ( obj count = 0 ) 11/04/20 12:48:25 DB : tunnel ref decrement ( ref count = 1, obj count = 1 ) 11/04/20 12:48:25 DB : tunnel deleted ( obj count = 0 ) 11/04/20 12:48:25 DB : peer ref decrement ( ref count = 1, obj count = 1 ) 11/04/20 12:48:25 DB : removing all peer tunnel refrences 11/04/20 12:48:25 DB : peer deleted ( obj count = 0 ) 11/04/20 12:48:25 ii : ipc client process thread exit ... -- GMX DSL Doppel-Flat ab 19,99 Euro/mtl.! Jetzt mit gratis Handy-Flat! http://portal.gmx.net/de/go/dsl _______________________________________________ vpn-help mailing list [email protected] http://lists.shrew.net/mailman/listinfo/vpn-help
