Hallo,
ich habe ein Problem mit der iPhone VPN Verbindung zur endian Firewall 3.0 Community.
Er baut eine Verbindung auf, bricht diese dann aber wieder ab. Auf dem Iphone kommt nur "der L2TP-VPN-Server antwortet nicht. ..."
hier der LOG:
Code
System 2014-01-31 15:39:00 ipsec: 14[NET] received packet from 2.201.3.27[32406] to 192.168.254.253[500] (500 bytes)
System 2014-01-31 15:39:00 ipsec 14[ENC] parsed ID_PROT request 0 [ SA V V V V V V V V V V V V ]
System 2014-01-31 15:39:00 ipsec 14[IKE] received NAT-T (RFC 3947) vendor ID
System 2014-01-31 15:39:00 ipsec 14[IKE] received draft-ietf-ipsec-nat-t-ike vendor ID
System 2014-01-31 15:39:00 ipsec 14[IKE] received draft-ietf-ipsec-nat-t-ike-08 vendor ID
System 2014-01-31 15:39:00 ipsec 14[IKE] received draft-ietf-ipsec-nat-t-ike-07 vendor ID
System 2014-01-31 15:39:00 ipsec 14[IKE] received draft-ietf-ipsec-nat-t-ike-06 vendor ID
System 2014-01-31 15:39:00 ipsec 14[IKE] received draft-ietf-ipsec-nat-t-ike-05 vendor ID
System 2014-01-31 15:39:00 ipsec 14[IKE] received draft-ietf-ipsec-nat-t-ike-04 vendor ID
System 2014-01-31 15:39:00 ipsec 14[IKE] received draft-ietf-ipsec-nat-t-ike-03 vendor ID
System 2014-01-31 15:39:00 ipsec 14[IKE] received draft-ietf-ipsec-nat-t-ike-02 vendor ID
System 2014-01-31 15:39:00 ipsec 14[IKE] received draft-ietf-ipsec-nat-t-ike-02\n vendor ID
System 2014-01-31 15:39:00 ipsec 14[IKE] received FRAGMENTATION vendor ID
System 2014-01-31 15:39:00 ipsec 14[IKE] received DPD vendor ID
System 2014-01-31 15:39:00 ipsec 14[IKE] 2.201.3.27 is initiating a Main Mode IKE_SA
System 2014-01-31 15:39:00 ipsec 14[ENC] generating ID_PROT response 0 [ SA V V V V ]
System 2014-01-31 15:39:00 ipsec: 14[NET] sending packet from 192.168.254.253[500] to 2.201.3.27[32406] (156 bytes)
System 2014-01-31 15:39:01 ipsec: 16[NET] received packet from 2.201.3.27[32406] to 192.168.254.253[500] (228 bytes)
System 2014-01-31 15:39:01 ipsec 16[ENC] parsed ID_PROT request 0 [ KE No NAT-D NAT-D ]
System 2014-01-31 15:39:01 ipsec 16[IKE] local host is behind NAT, sending keep alives
System 2014-01-31 15:39:01 ipsec 16[IKE] remote host is behind NAT
System 2014-01-31 15:39:01 ipsec 16[ENC] generating ID_PROT response 0 [ KE No NAT-D NAT-D ]
System 2014-01-31 15:39:01 ipsec: 16[NET] sending packet from 192.168.254.253[500] to 2.201.3.27[32406] (244 bytes)
System 2014-01-31 15:39:02 ipsec: 10[NET] received packet from 2.201.3.27[33080] to 192.168.254.253[4500] (108 bytes)
System 2014-01-31 15:39:02 ipsec 10[ENC] parsed ID_PROT request 0 [ ID HASH N(INITIAL_CONTACT) ]
System 2014-01-31 15:39:02 ipsec 10[CFG] looking for pre-shared key peer configs matching 192.168.254.253...2.201.3.27[100.88.83.27]
System 2014-01-31 15:39:02 ipsec 10[CFG] selected peer config "ipsecIPHONE"
System 2014-01-31 15:39:02 ipsecIPHONE (10) 10[IKE] IKE_SA ipsecIPHONE[10] established between 192.168.254.253[192.168.254.253]...2.201.3.27[100.88.83.27]
System 2014-01-31 15:39:02 ipsec 10[IKE] scheduling reauthentication in 2835s
System 2014-01-31 15:39:02 ipsec 10[IKE] maximum IKE_SA lifetime 3375s
System 2014-01-31 15:39:02 ipsec 10[ENC] generating ID_PROT response 0 [ ID HASH ]
System 2014-01-31 15:39:02 ipsec: 10[NET] sending packet from 192.168.254.253[4500] to 2.201.3.27[33080] (76 bytes)
System 2014-01-31 15:39:04 ipsec: 12[NET] received packet from 2.201.3.27[33080] to 192.168.254.253[4500] (316 bytes)
System 2014-01-31 15:39:04 ipsec 12[ENC] parsed QUICK_MODE request 2337649623 [ HASH SA No ID ID NAT-OA NAT-OA ]
System 2014-01-31 15:39:04 ipsec 12[IKE] received 3600s lifetime, configured 28800s
System 2014-01-31 15:39:04 ipsec 12[ENC] generating QUICK_MODE response 2337649623 [ HASH SA No ID ID NAT-OA NAT-OA ]
System 2014-01-31 15:39:04 ipsec: 12[NET] sending packet from 192.168.254.253[4500] to 2.201.3.27[33080] (204 bytes)
System 2014-01-31 15:39:04 ipsec: 13[NET] received packet from 2.201.3.27[33080] to 192.168.254.253[4500] (60 bytes)
System 2014-01-31 15:39:04 ipsec 13[ENC] parsed QUICK_MODE request 2337649623 [ HASH ]
System 2014-01-31 15:39:04 ipsec 13[IKE] CHILD_SA ipsecIPHONE{2} established with SPIs ce7f5dde_i 06e70cfb_o and TS 192.168.254.253/32[udp/l2tp] === 2.201.3.27/32[udp/49244]
System 2014-01-31 15:39:25 ipsec: 03[NET] received packet from 2.201.3.27[33080] to 192.168.254.253[4500] (76 bytes)
System 2014-01-31 15:39:25 ipsec 03[ENC] parsed INFORMATIONAL_V1 request 3375187876 [ HASH D ]
System 2014-01-31 15:39:25 ipsec 03[IKE] received DELETE for ESP CHILD_SA with SPI 06e70cfb
System 2014-01-31 15:39:25 ipsec 03[IKE] closing CHILD_SA ipsecIPHONE{2} with SPIs ce7f5dde_i (567 bytes) 06e70cfb_o (0 bytes) and TS 192.168.254.253/32[udp/l2tp] === 2.201.3.27/32[udp/49244]
System 2014-01-31 15:39:26 ipsec: 11[NET] received packet from 2.201.3.27[33080] to 192.168.254.253[4500] (92 bytes)
System 2014-01-31 15:39:26 ipsec 11[ENC] parsed INFORMATIONAL_V1 request 3659187924 [ HASH D ]
System 2014-01-31 15:39:26 ipsecIPHONE (10) 11[IKE] received DELETE for IKE_SA ipsecIPHONE[10]
System 2014-01-31 15:39:26 ipsecIPHONE (10) 11[IKE] deleting IKE_SA ipsecIPHONE[10] between 192.168.254.253[192.168.254.253]...2.201.3.27[100.88.83.27]
Alles anzeigen
kann mir jemand weiter helfen? Es wäre sehr schön wenn das mit Boardmitteln des iPhones funktioniert.
Danke.