1. Aktuelles
  2. Dashboard
  3. Forum
    1. Unerledigte Themen
  4. Mitglieder
    1. Letzte Aktivitäten
    2. Benutzer online
  5. Community vs. Enterprise
  • Anmelden
  • Registrieren
  • Suche
Dieses Thema
  • Alles
  • Dieses Thema
  • Dieses Forum
  • Artikel
  • Forum
  • Seiten
  • Erweiterte Suche
  1. efw-forum - Endian Firewall Support Forum
  2. Forum
  3. Endian Firewall 3.x
  4. Endian Firewall 3.0
  5. iOS,Android

iPhone VPN

  • flyinghuman
  • 31. Januar 2014 um 15:44
  • Erledigt
  • flyinghuman
    Anfänger
    Beiträge
    7
    • 31. Januar 2014 um 15:44
    • #1

    Hallo,

    ich habe ein Problem mit der iPhone VPN Verbindung zur endian Firewall 3.0 Community.
    Er baut eine Verbindung auf, bricht diese dann aber wieder ab. Auf dem Iphone kommt nur "der L2TP-VPN-Server antwortet nicht. ..."

    hier der LOG:

    Code
    System	2014-01-31 15:39:00	ipsec: 14[NET] received packet from 2.201.3.27[32406] to 192.168.254.253[500] (500 bytes)
    System	2014-01-31 15:39:00	ipsec 14[ENC] parsed ID_PROT request 0 [ SA V V V V V V V V V V V V ]
    System	2014-01-31 15:39:00	ipsec 14[IKE] received NAT-T (RFC 3947) vendor ID
    System	2014-01-31 15:39:00	ipsec 14[IKE] received draft-ietf-ipsec-nat-t-ike vendor ID
    System	2014-01-31 15:39:00	ipsec 14[IKE] received draft-ietf-ipsec-nat-t-ike-08 vendor ID
    System	2014-01-31 15:39:00	ipsec 14[IKE] received draft-ietf-ipsec-nat-t-ike-07 vendor ID
    System	2014-01-31 15:39:00	ipsec 14[IKE] received draft-ietf-ipsec-nat-t-ike-06 vendor ID
    System	2014-01-31 15:39:00	ipsec 14[IKE] received draft-ietf-ipsec-nat-t-ike-05 vendor ID
    System	2014-01-31 15:39:00	ipsec 14[IKE] received draft-ietf-ipsec-nat-t-ike-04 vendor ID
    System	2014-01-31 15:39:00	ipsec 14[IKE] received draft-ietf-ipsec-nat-t-ike-03 vendor ID
    System	2014-01-31 15:39:00	ipsec 14[IKE] received draft-ietf-ipsec-nat-t-ike-02 vendor ID
    System	2014-01-31 15:39:00	ipsec 14[IKE] received draft-ietf-ipsec-nat-t-ike-02\n vendor ID
    System	2014-01-31 15:39:00	ipsec 14[IKE] received FRAGMENTATION vendor ID
    System	2014-01-31 15:39:00	ipsec 14[IKE] received DPD vendor ID
    System	2014-01-31 15:39:00	ipsec 14[IKE] 2.201.3.27 is initiating a Main Mode IKE_SA
    System	2014-01-31 15:39:00	ipsec 14[ENC] generating ID_PROT response 0 [ SA V V V V ]
    System	2014-01-31 15:39:00	ipsec: 14[NET] sending packet from 192.168.254.253[500] to 2.201.3.27[32406] (156 bytes)
    System	2014-01-31 15:39:01	ipsec: 16[NET] received packet from 2.201.3.27[32406] to 192.168.254.253[500] (228 bytes)
    System	2014-01-31 15:39:01	ipsec 16[ENC] parsed ID_PROT request 0 [ KE No NAT-D NAT-D ]
    System	2014-01-31 15:39:01	ipsec 16[IKE] local host is behind NAT, sending keep alives
    System	2014-01-31 15:39:01	ipsec 16[IKE] remote host is behind NAT
    System	2014-01-31 15:39:01	ipsec 16[ENC] generating ID_PROT response 0 [ KE No NAT-D NAT-D ]
    System	2014-01-31 15:39:01	ipsec: 16[NET] sending packet from 192.168.254.253[500] to 2.201.3.27[32406] (244 bytes)
    System	2014-01-31 15:39:02	ipsec: 10[NET] received packet from 2.201.3.27[33080] to 192.168.254.253[4500] (108 bytes)
    System	2014-01-31 15:39:02	ipsec 10[ENC] parsed ID_PROT request 0 [ ID HASH N(INITIAL_CONTACT) ]
    System	2014-01-31 15:39:02	ipsec 10[CFG] looking for pre-shared key peer configs matching 192.168.254.253...2.201.3.27[100.88.83.27]
    System	2014-01-31 15:39:02	ipsec 10[CFG] selected peer config "ipsecIPHONE"
    System	2014-01-31 15:39:02	ipsecIPHONE (10) 10[IKE] IKE_SA ipsecIPHONE[10] established between 192.168.254.253[192.168.254.253]...2.201.3.27[100.88.83.27]
    System	2014-01-31 15:39:02	ipsec 10[IKE] scheduling reauthentication in 2835s
    System	2014-01-31 15:39:02	ipsec 10[IKE] maximum IKE_SA lifetime 3375s
    System	2014-01-31 15:39:02	ipsec 10[ENC] generating ID_PROT response 0 [ ID HASH ]
    System	2014-01-31 15:39:02	ipsec: 10[NET] sending packet from 192.168.254.253[4500] to 2.201.3.27[33080] (76 bytes)
    System	2014-01-31 15:39:04	ipsec: 12[NET] received packet from 2.201.3.27[33080] to 192.168.254.253[4500] (316 bytes)
    System	2014-01-31 15:39:04	ipsec 12[ENC] parsed QUICK_MODE request 2337649623 [ HASH SA No ID ID NAT-OA NAT-OA ]
    System	2014-01-31 15:39:04	ipsec 12[IKE] received 3600s lifetime, configured 28800s
    System	2014-01-31 15:39:04	ipsec 12[ENC] generating QUICK_MODE response 2337649623 [ HASH SA No ID ID NAT-OA NAT-OA ]
    System	2014-01-31 15:39:04	ipsec: 12[NET] sending packet from 192.168.254.253[4500] to 2.201.3.27[33080] (204 bytes)
    System	2014-01-31 15:39:04	ipsec: 13[NET] received packet from 2.201.3.27[33080] to 192.168.254.253[4500] (60 bytes)
    System	2014-01-31 15:39:04	ipsec 13[ENC] parsed QUICK_MODE request 2337649623 [ HASH ]
    System	2014-01-31 15:39:04	ipsec 13[IKE] CHILD_SA ipsecIPHONE{2} established with SPIs ce7f5dde_i 06e70cfb_o and TS 192.168.254.253/32[udp/l2tp] === 2.201.3.27/32[udp/49244]
    System	2014-01-31 15:39:25	ipsec: 03[NET] received packet from 2.201.3.27[33080] to 192.168.254.253[4500] (76 bytes)
    System	2014-01-31 15:39:25	ipsec 03[ENC] parsed INFORMATIONAL_V1 request 3375187876 [ HASH D ]
    System	2014-01-31 15:39:25	ipsec 03[IKE] received DELETE for ESP CHILD_SA with SPI 06e70cfb
    System	2014-01-31 15:39:25	ipsec 03[IKE] closing CHILD_SA ipsecIPHONE{2} with SPIs ce7f5dde_i (567 bytes) 06e70cfb_o (0 bytes) and TS 192.168.254.253/32[udp/l2tp] === 2.201.3.27/32[udp/49244]
    System	2014-01-31 15:39:26	ipsec: 11[NET] received packet from 2.201.3.27[33080] to 192.168.254.253[4500] (92 bytes)
    System	2014-01-31 15:39:26	ipsec 11[ENC] parsed INFORMATIONAL_V1 request 3659187924 [ HASH D ]
    System	2014-01-31 15:39:26	ipsecIPHONE (10) 11[IKE] received DELETE for IKE_SA ipsecIPHONE[10]
    System	2014-01-31 15:39:26	ipsecIPHONE (10) 11[IKE] deleting IKE_SA ipsecIPHONE[10] between 192.168.254.253[192.168.254.253]...2.201.3.27[100.88.83.27]
    Alles anzeigen

    kann mir jemand weiter helfen? Es wäre sehr schön wenn das mit Boardmitteln des iPhones funktioniert.
    Danke.

Unterstützt von

  1. Datenschutzerklärung
  2. Impressum
Community-Software: WoltLab Suite™