Mit Wincp Sp2 auf Ipcop mit Ipsec (markus Mueller)

#0
14.04.2005, 18:20
...neu hier

Beiträge: 1
#1 Hallo!
Habe folgendes kleines bzw. größeres Problem:

Möchte von meinem Heim-PC (WinXP SP2 mit Support-Tools SP2 und Markus Mueller-Tool, dynamische IP) über VPN mit IPSEC auf einen IPCOP v 1.4.5 zugreifen, der eine feste IP besitzt.

Folgender Aufbau:

LAN – IPCOP – Internet – Heim-PC


Meine Ipsec.conf vom XP-PC sieht folgendermaßen aus:
***************************************************
conn vpntest
left=141.51.110.127
leftsubnet=192.168.111.0/24
right=%any
presharedkey=vpntest
network=auto
auto=start
pfs=yes
***************************************************


Die ipsec.conf auf dem IPCOP so:
****************************************
config setup
interfaces=%defaultroute
klipsdebug=none
plutodebug=none
plutoload=%search
plutostart=%search
uniqueids=yes
nat_traversal=yes
virtual_private=%v4:10.0.0.0/8,%v4:172.16.0.0/12,%v4:192.168.0.0/16,%v4:
!192.168.10.0/255.255.255.0

conn %default
keyingtries=0
disablearrivalcheck=no

conn vpntest
compress=no
left=141.51.110.127
leftsubnet=192.168.111.0/255.255.255.0
leftnexthop=%defaultroute
type=tunnel
authby=secret
pfs=yes
right=%any
rightsubnet=vhost:%no,%priv
rightnexthop=%defaultroute
auto=add
****************************************


Und die ipsec.secrets sieht so aus:
***********************************
141.51.110.127 0.0.0.0 : PSK “vpntest”
141.51.110.127 %any : PSK “vpntest”
***********************************

Starte ich nun in der cmd IPSEC kommt folgendes:

***********************************************************
C:ProgrammeSupport Tools>ipsec
IPSec Version 2.2.0 (c) 2001-2003 Marcus Mueller
Getting running Config ...
Microsoft's Windows XP identified
Setting up IPSec ...

Deactivating old policy...
Removing old policy...

Connection vpntest:
MyTunnel : 172.177.72.9
MyNet : 172.177.72.9/255.255.255.255
PartnerTunnel: 141.51.110.127
PartnerNet : 192.168.111.0/255.255.255.0
CA (ID) : Preshared Key ******************
PFS : y
Auto : start
Auth.Mode : MD5
Rekeying : 3600S/50000K
Activating policy...

C:ProgrammeSupport Tools>
***********************************************************



Ein Ping auf eine IP im LAN, das hinter dem IPCOP ist, sieht folgender Maßen aus:
**************************************************
Ping wird ausgeführt für 192.168.111.50 mit 32 Bytes Daten:

IP-Sicherheit wird verhandelt.
Zeitüberschreitung der Anforderung.
Zeitüberschreitung der Anforderung.
Zeitüberschreitung der Anforderung.

Ping-Statistik für 192.168.111.50:
Pakete: Gesendet = 4, Empfangen = 0, Verloren = 4 (100% Verlust),
**************************************************

Auch nach 10 oder mehr Ping-Versuchen kommt keine Antwort.

Woran kann das liegen????
Wäre für Antworten und Tips echt dankbar!


Zudem habe ich auch schon die neue ipseccmd.exe von der microsoft-website runtergeladen, da ich winxp sp2 verwende, aber leider ging es dann immer noch nicht.
1. muss ich beim ipcop noch irgendwelche ports für das ipsec freimachen? wenn ja, welche (außer udp 500, udp 4500)?
habe diesen oakleyreport mal aktiviert.
da ich es jetzt noch auf einem anderen rechner probiert habe, kommen dort andere ips vor.
kurze erläuterung:
141.51.8.4 ipcop
192.168.111.0 LAN dahinter


Hier die Log-Datei:

******************************
4-13: 16:12:34:312:45c Acquire from driver: op=00000009 src=172.182.194.125.0 dst=192.168.111.50.0 proto = 0, SrcMask=255.255.255.255, DstMask=255.255.255.0, Tunnel 1, TunnelEndpt=141.51.110.127 Inbound TunnelEndpt=172.182.194.125
4-13: 16:12:34:328:a1c Filter to match: Src 141.51.110.127 Dst 172.182.194.125
4-13: 16:12:34:328:a1c MM PolicyName: 4
4-13: 16:12:34:328:a1c MMPolicy dwFlags 2 SoftSAExpireTime 28800
4-13: 16:12:34:328:a1c MMOffer[0] LifetimeSec 28800 QMLimit 1 DHGroup 2
4-13: 16:12:34:328:a1c MMOffer[0] Encrypt: Dreifach-DES CBC Hash: SHA
4-13: 16:12:34:328:a1c MMOffer[1] LifetimeSec 28800 QMLimit 1 DHGroup 2
4-13: 16:12:34:328:a1c MMOffer[1] Encrypt: Dreifach-DES CBC Hash: MD5
4-13: 16:12:34:328:a1c MMOffer[2] LifetimeSec 28800 QMLimit 1 DHGroup 1
4-13: 16:12:34:328:a1c MMOffer[2] Encrypt: DES CBC Hash: SHA
4-13: 16:12:34:328:a1c MMOffer[3] LifetimeSec 28800 QMLimit 1 DHGroup 1
4-13: 16:12:34:328:a1c MMOffer[3] Encrypt: DES CBC Hash: MD5
4-13: 16:12:34:328:a1c Auth[0]:PresharedKey KeyLen 22
4-13: 16:12:34:328:a1c QM PolicyName: Host-vpntest filter action dwFlags 1
4-13: 16:12:34:328:a1c QMOffer[0] LifetimeKBytes 50000 LifetimeSec 3600
4-13: 16:12:34:328:a1c QMOffer[0] dwFlags 0 dwPFSGroup -2147483648
4-13: 16:12:34:328:a1c Algo[0] Operation: ESP Algo: Dreifach-DES CBC HMAC: MD5
4-13: 16:12:34:328:a1c Starting Negotiation: src = 172.182.194.125.0500, dst = 141.51.110.127.0500, proto = 00, context = 00000009, ProxySrc = 172.182.194.125.0000, ProxyDst = 192.168.111.0.0000 SrcMask = 255.255.255.255 DstMask = 255.255.255.0
4-13: 16:12:34:328:a1c constructing ISAKMP Header
4-13: 16:12:34:328:a1c constructing SA (ISAKMP)
4-13: 16:12:34:328:a1c Constructing Vendor MS NT5 ISAKMPOAKLEY
4-13: 16:12:34:328:a1c Constructing Vendor FRAGMENTATION
4-13: 16:12:34:328:a1c Constructing Vendor draft-ietf-ipsec-nat-t-ike-02
4-13: 16:12:34:328:a1c Constructing Vendor Vid-Initial-Contact
4-13: 16:12:34:328:a1c
4-13: 16:12:34:328:a1c Sending: SA = 0x000ED870 to 141.51.110.127:Type 2.500
4-13: 16:12:34:328:a1c ISAKMP Header: (V1.0), len = 276
4-13: 16:12:34:328:a1c I-COOKIE 04b0300cb95125c8
4-13: 16:12:34:328:a1c R-COOKIE 0000000000000000
4-13: 16:12:34:328:a1c exchange: Oakley Main Mode
4-13: 16:12:34:328:a1c flags: 0
4-13: 16:12:34:328:a1c next payload: SA
4-13: 16:12:34:328:a1c message ID: 00000000
4-13: 16:12:34:328:a1c Ports S:f401 D:f401
4-13: 16:12:34:484:a1c
4-13: 16:12:34:484:a1c Receive: (get) SA = 0x000ed870 from 141.51.110.127.500
4-13: 16:12:34:484:a1c ISAKMP Header: (V1.0), len = 104
4-13: 16:12:34:484:a1c I-COOKIE 04b0300cb95125c8
4-13: 16:12:34:484:a1c R-COOKIE 0d17a7c6742be5b5
4-13: 16:12:34:484:a1c exchange: Oakley Main Mode
4-13: 16:12:34:484:a1c flags: 0
4-13: 16:12:34:484:a1c next payload: SA
4-13: 16:12:34:484:a1c message ID: 00000000
4-13: 16:12:34:484:a1c processing payload SA
4-13: 16:12:34:484:a1c Received Phase 1 Transform 1
4-13: 16:12:34:484:a1c Encryption Alg Dreifach-DES CBC(5)
4-13: 16:12:34:484:a1c Hash Alg SHA(2)
4-13: 16:12:34:484:a1c Oakley Group 2
4-13: 16:12:34:484:a1c Auth Method Vorinstallierter Schlüssel(1)
4-13: 16:12:34:484:a1c Life type in Seconds
4-13: 16:12:34:484:a1c Life duration of 28800
4-13: 16:12:34:484:a1c Phase 1 SA accepted: transform=1
4-13: 16:12:34:484:a1c SA - Oakley proposal accepted
4-13: 16:12:34:484:a1c processing payload VENDOR ID
4-13: 16:12:34:484:a1c Received VendorId draft-ietf-ipsec-nat-t-ike-02
4-13: 16:12:34:484:a1c ClearFragList
4-13: 16:12:34:484:a1c constructing ISAKMP Header
4-13: 16:12:34:546:a1c constructing KE
4-13: 16:12:34:546:a1c constructing NONCE (ISAKMP)
4-13: 16:12:34:546:a1c Constructing NatDisc
4-13: 16:12:34:546:a1c
4-13: 16:12:34:546:a1c Sending: SA = 0x000ED870 to 141.51.110.127:Type 2.500
4-13: 16:12:34:546:a1c ISAKMP Header: (V1.0), len = 232
4-13: 16:12:34:546:a1c I-COOKIE 04b0300cb95125c8
4-13: 16:12:34:546:a1c R-COOKIE 0d17a7c6742be5b5
4-13: 16:12:34:546:a1c exchange: Oakley Main Mode
4-13: 16:12:34:546:a1c flags: 0
4-13: 16:12:34:546:a1c next payload: KE
4-13: 16:12:34:546:a1c message ID: 00000000
4-13: 16:12:34:546:a1c Ports S:f401 D:f401
4-13: 16:12:34:812:a1c
4-13: 16:12:34:812:a1c Receive: (get) SA = 0x000ed870 from 141.51.110.127.500
4-13: 16:12:34:812:a1c ISAKMP Header: (V1.0), len = 228
4-13: 16:12:34:812:a1c I-COOKIE 04b0300cb95125c8
4-13: 16:12:34:812:a1c R-COOKIE 0d17a7c6742be5b5
4-13: 16:12:34:812:a1c exchange: Oakley Main Mode
4-13: 16:12:34:812:a1c flags: 0
4-13: 16:12:34:812:a1c next payload: KE
4-13: 16:12:34:812:a1c message ID: 00000000
4-13: 16:12:34:812:a1c processing payload KE
4-13: 16:12:34:843:a1c processing payload NONCE
4-13: 16:12:34:843:a1c processing payload NATDISC
4-13: 16:12:34:843:a1c Processing NatHash
4-13: 16:12:34:843:a1c Nat hash 3b69cda984b22c837116e61219e98544
4-13: 16:12:34:843:a1c ac92b05c
4-13: 16:12:34:843:a1c SA StateMask2 f
4-13: 16:12:34:843:a1c processing payload NATDISC
4-13: 16:12:34:843:a1c Processing NatHash
4-13: 16:12:34:843:a1c Nat hash 7444c79929547320bf81b0768d7b5a96
4-13: 16:12:34:843:a1c 3beaeeb5
4-13: 16:12:34:843:a1c SA StateMask2 8f
4-13: 16:12:34:843:a1c ClearFragList
4-13: 16:12:34:843:a1c constructing ISAKMP Header
4-13: 16:12:34:843:a1c constructing ID
4-13: 16:12:34:843:a1c MM ID Type 1
4-13: 16:12:34:843:a1c MM ID acb6c27d
4-13: 16:12:34:843:a1c constructing HASH
4-13: 16:12:34:843:a1c
4-13: 16:12:34:843:a1c Sending: SA = 0x000ED870 to 141.51.110.127:Type 2.500
4-13: 16:12:34:843:a1c ISAKMP Header: (V1.0), len = 68
4-13: 16:12:34:843:a1c I-COOKIE 04b0300cb95125c8
4-13: 16:12:34:843:a1c R-COOKIE 0d17a7c6742be5b5
4-13: 16:12:34:843:a1c exchange: Oakley Main Mode
4-13: 16:12:34:843:a1c flags: 1 ( encrypted )
4-13: 16:12:34:843:a1c next payload: ID
4-13: 16:12:34:843:a1c message ID: 00000000
4-13: 16:12:34:843:a1c Ports S:f401 D:f401
4-13: 16:12:34:921:a1c
4-13: 16:12:34:921:a1c Receive: (get) SA = 0x000ed870 from 141.51.110.127.500
4-13: 16:12:34:921:a1c ISAKMP Header: (V1.0), len = 68
4-13: 16:12:34:921:a1c I-COOKIE 04b0300cb95125c8
4-13: 16:12:34:921:a1c R-COOKIE 0d17a7c6742be5b5
4-13: 16:12:34:921:a1c exchange: Oakley Main Mode
4-13: 16:12:34:921:a1c flags: 1 ( encrypted )
4-13: 16:12:34:921:a1c next payload: ID
4-13: 16:12:34:921:a1c message ID: 00000000
4-13: 16:12:34:921:a1c processing payload ID
4-13: 16:12:34:921:a1c processing payload HASH
4-13: 16:12:34:921:a1c AUTH: Phase I authentication accepted
4-13: 16:12:34:921:a1c ClearFragList
4-13: 16:12:34:921:a1c MM established. SA: 000ED870
4-13: 16:12:34:921:a1c QM PolicyName: Host-vpntest filter action dwFlags 1
4-13: 16:12:34:921:a1c QMOffer[0] LifetimeKBytes 50000 LifetimeSec 3600
4-13: 16:12:34:921:a1c QMOffer[0] dwFlags 0 dwPFSGroup -2147483648
4-13: 16:12:34:921:a1c Algo[0] Operation: ESP Algo: Dreifach-DES CBC HMAC: MD5
4-13: 16:12:34:921:a1c GetSpi: src = 192.168.111.0.0000, dst = 172.182.194.125.0000, proto = 00, context = 00000009, srcMask = 255.255.255.0, destMask = 255.255.255.255, TunnelFilter 1
4-13: 16:12:34:921:a1c Setting SPI 2942279703
4-13: 16:12:34:921:a1c constructing ISAKMP Header
4-13: 16:12:34:921:a1c constructing HASH (null)
4-13: 16:12:34:921:a1c constructing SA (IPSEC)
4-13: 16:12:34:921:a1c constructing QM KE
4-13: 16:12:34:984:a1c constructing NONCE (IPSEC)
4-13: 16:12:34:984:a1c constructing ID (proxy)
4-13: 16:12:34:984:a1c constructing ID (proxy)
4-13: 16:12:34:984:a1c constructing HASH (QM)
4-13: 16:12:34:984:a1c
4-13: 16:12:34:984:a1c Sending: SA = 0x000ED870 to 141.51.110.127:Type 2.500
4-13: 16:12:34:984:a1c ISAKMP Header: (V1.0), len = 308
4-13: 16:12:34:984:a1c I-COOKIE 04b0300cb95125c8
4-13: 16:12:34:984:a1c R-COOKIE 0d17a7c6742be5b5
4-13: 16:12:34:984:a1c exchange: Oakley Quick Mode
4-13: 16:12:34:984:a1c flags: 1 ( encrypted )
4-13: 16:12:34:984:a1c next payload: HASH
4-13: 16:12:34:984:a1c message ID: e3595662
4-13: 16:12:34:984:a1c Ports S:f401 D:f401
4-13: 16:12:35:187:a1c
4-13: 16:12:35:187:a1c Receive: (get) SA = 0x000ed870 from 141.51.110.127.500
4-13: 16:12:35:187:a1c ISAKMP Header: (V1.0), len = 300
4-13: 16:12:35:187:a1c I-COOKIE 04b0300cb95125c8
4-13: 16:12:35:187:a1c R-COOKIE 0d17a7c6742be5b5
4-13: 16:12:35:187:a1c exchange: Oakley Quick Mode
4-13: 16:12:35:187:a1c flags: 1 ( encrypted )
4-13: 16:12:35:187:a1c next payload: HASH
4-13: 16:12:35:187:a1c message ID: e3595662
4-13: 16:12:35:187:a1c Received commit re-send
4-13: 16:12:35:187:a1c processing HASH (QM)
4-13: 16:12:35:187:a1c ClearFragList
4-13: 16:12:35:187:a1c processing payload NONCE
4-13: 16:12:35:187:a1c processing payload KE
4-13: 16:12:35:187:a1c Quick Mode KE processed; Saved KE data
4-13: 16:12:35:187:a1c processing payload ID
4-13: 16:12:35:187:a1c processing payload ID
4-13: 16:12:35:187:a1c processing payload SA
4-13: 16:12:35:187:a1c Negotiated Proxy ID: Src 172.182.194.125.0 Dst 192.168.111.0.0
4-13: 16:12:35:187:a1c Dst id for subnet. Mask 255.255.255.0
4-13: 16:12:35:187:a1c Checking Proposal 1: Proto= ESP(3), num trans=1 Next=0
4-13: 16:12:35:187:a1c Checking Transform # 1: ID=Dreifach-DES CBC(3)
4-13: 16:12:35:187:a1c SA life type in seconds
4-13: 16:12:35:187:a1c SA life duration 00000e10
4-13: 16:12:35:187:a1c SA life type in kilobytes
4-13: 16:12:35:187:a1c SA life duration 0000c350
4-13: 16:12:35:187:a1c tunnel mode is Tunnelmodus(1)
4-13: 16:12:35:187:a1c HMAC algorithm is MD5(1)
4-13: 16:12:35:187:a1c group description for PFS is 2
4-13: 16:12:35:187:a1c Phase 2 SA accepted: proposal=1 transform=1
4-13: 16:12:35:203:a1c constructing ISAKMP Header
4-13: 16:12:35:203:a1c constructing HASH (QM)
4-13: 16:12:35:203:a1c Adding QMs: src = 172.182.194.125.0000, dst = 192.168.111.0.0000, proto = 00, context = 00000009, my tunnel = 172.182.194.125, peer tunnel = 141.51.110.127, SrcMask = 0.0.0.0, DestMask = 255.255.255.0 Lifetime = 3600 LifetimeKBytes 50000 dwFlags 201 Direction 2 EncapType 1
4-13: 16:12:35:203:a1c Algo[0] Operation: ESP Algo: Dreifach-DES CBC HMAC: MD5
4-13: 16:12:35:203:a1c Algo[0] MySpi: 2942279703 PeerSpi: 837560770
4-13: 16:12:35:203:a1c Encap Ports Src 500 Dst 500
4-13: 16:12:35:203:a1c Skipping Outbound SA add
4-13: 16:12:35:203:a1c Adding QMs: src = 172.182.194.125.0000, dst = 192.168.111.0.0000, proto = 00, context = 00000009, my tunnel = 172.182.194.125, peer tunnel = 141.51.110.127, SrcMask = 0.0.0.0, DestMask = 255.255.255.0 Lifetime = 3600 LifetimeKBytes 50000 dwFlags 201 Direction 3 EncapType 1
4-13: 16:12:35:203:a1c Algo[0] Operation: ESP Algo: Dreifach-DES CBC HMAC: MD5
4-13: 16:12:35:203:a1c Algo[0] MySpi: 2942279703 PeerSpi: 837560770
4-13: 16:12:35:203:a1c Encap Ports Src 500 Dst 500
4-13: 16:12:35:203:a1c Skipping Inbound SA add
4-13: 16:12:35:203:a1c isadb_set_status sa:000ED870 centry:000F0638 status 0
4-13: 16:12:35:203:a1c
4-13: 16:12:35:203:a1c Sending: SA = 0x000ED870 to 141.51.110.127:Type 4.500
4-13: 16:12:35:203:a1c ISAKMP Header: (V1.0), len = 52
4-13: 16:12:35:203:a1c I-COOKIE 04b0300cb95125c8
4-13: 16:12:35:203:a1c R-COOKIE 0d17a7c6742be5b5
4-13: 16:12:35:203:a1c exchange: Oakley Quick Mode
4-13: 16:12:35:203:a1c flags: 1 ( encrypted )
4-13: 16:12:35:203:a1c next payload: HASH
4-13: 16:12:35:203:a1c message ID: e3595662
4-13: 16:12:35:203:a1c Ports S:f401 D:f401
4-13: 16:13:35:218:a1c CE Dead. sa:000ED870 ce:000F0638 status:35ef
4-13: 16:13:39:375:698 isadb_schedule_kill_oldPolicy_sas: 2f30eee1-73d0-4583-859c1807f8c5f1f1 4
4-13: 16:13:39:375:698 isadb_schedule_kill_oldPolicy_sas: e5f261f4-7a30-4267-a36e5938ebdf636f 4
4-13: 16:13:39:375:698 isadb_schedule_kill_oldPolicy_sas: b4a0920a-6df5-4511-93b18c907d3c72ec 3
4-13: 16:13:39:375:698 isadb_schedule_kill_oldPolicy_sas: 7cff7e0d-3692-47e1-861a2c2ba7a3113c 3
4-13: 16:13:39:375:698 isadb_schedule_kill_oldPolicy_sas: 68786512-75c6-4d58-a2976101999cdd09 1
4-13: 16:13:39:375:698 isadb_schedule_kill_oldPolicy_sas: 90dee05a-fa39-4b2e-a33d3c0a1265c1be 2
4-13: 16:13:39:375:698 isadb_schedule_kill_oldPolicy_sas: 23164f5d-933c-43e9-aba755df77de80ff 2
4-13: 16:13:39:375:a1c QM Deleted. Notify from driver: Src 172.182.194.125 Dest 192.168.111.0 InSPI 2942279703 OutSpi 837560770 Tunnel 7f6e338d TunnelFilter 0
4-13: 16:13:39:375:a1c constructing ISAKMP Header
4-13: 16:13:39:375:a1c constructing HASH (null)
4-13: 16:13:39:375:a1c Construct QM Delete Spi 2942279703
4-13: 16:13:39:375:a1c constructing HASH (Notify/Delete)
4-13: 16:13:39:375:a1c Not setting retransmit to downlevel client. SA 000ED870 Centry 00000000
4-13: 16:13:39:375:a1c
4-13: 16:13:39:375:a1c Sending: SA = 0x000ED870 to 141.51.110.127:Type 1.500
4-13: 16:13:39:375:a1c ISAKMP Header: (V1.0), len = 68
4-13: 16:13:39:375:a1c I-COOKIE 04b0300cb95125c8
4-13: 16:13:39:375:a1c R-COOKIE 0d17a7c6742be5b5
4-13: 16:13:39:375:a1c exchange: ISAKMP Informational Exchange
4-13: 16:13:39:375:a1c flags: 1 ( encrypted )
4-13: 16:13:39:375:a1c next payload: HASH
4-13: 16:13:39:375:a1c message ID: d6eb63e9
4-13: 16:13:39:375:a1c Ports S:f401 D:f401
4-13: 16:13:39:375:a1c PrivatePeerAddr 0
4-13: 16:13:39:390:a1c entered kill_old_policy_sas 4
4-13: 16:13:39:390:a1c entered kill_old_policy_sas 4
4-13: 16:13:39:390:a1c SA Dead. sa:000ED870 status:3619
4-13: 16:13:39:390:a1c isadb_set_status sa:000ED870 centry:00000000 status 3619
4-13: 16:13:39:390:a1c constructing ISAKMP Header
4-13: 16:13:39:390:a1c constructing HASH (null)
4-13: 16:13:39:390:a1c constructing DELETE. MM 000ED870
4-13: 16:13:39:390:a1c constructing HASH (Notify/Delete)
4-13: 16:13:39:390:a1c Not setting retransmit to downlevel client. SA 000ED870 Centry 00000000
4-13: 16:13:39:390:a1c
4-13: 16:13:39:390:a1c Sending: SA = 0x000ED870 to 141.51.110.127:Type 1.500
4-13: 16:13:39:390:a1c ISAKMP Header: (V1.0), len = 84
4-13: 16:13:39:390:a1c I-COOKIE 04b0300cb95125c8
4-13: 16:13:39:390:a1c R-COOKIE 0d17a7c6742be5b5
4-13: 16:13:39:390:a1c exchange: ISAKMP Informational Exchange
4-13: 16:13:39:390:a1c flags: 1 ( encrypted )
4-13: 16:13:39:390:a1c next payload: HASH
4-13: 16:13:39:390:a1c message ID: 3e39fcdb
4-13: 16:13:39:390:a1c Ports S:f401 D:f401
4-13: 16:13:39:390:a1c entered kill_old_policy_sas 3
4-13: 16:13:39:390:a1c entered kill_old_policy_sas 3
4-13: 16:13:39:390:a1c entered kill_old_policy_sas 1
4-13: 16:13:39:390:a1c entered kill_old_policy_sas 2
4-13: 16:13:39:390:a1c entered kill_old_policy_sas 2
4-13: 16:13:39:453:60c
4-13: 16:13:39:453:60c Receive: (get) SA = 0x000ed870 from 141.51.110.127.500
4-13: 16:13:39:453:60c ISAKMP Header: (V1.0), len = 68
4-13: 16:13:39:453:60c I-COOKIE 04b0300cb95125c8
4-13: 16:13:39:453:60c R-COOKIE 0d17a7c6742be5b5
4-13: 16:13:39:453:60c exchange: ISAKMP Informational Exchange
4-13: 16:13:39:453:60c flags: 1 ( encrypted )
4-13: 16:13:39:453:60c next payload: HASH
4-13: 16:13:39:453:60c message ID: 9569a704
4-13: 16:13:39:453:60c processing HASH (Notify/Delete)
4-13: 16:13:39:453:60c processing payload DELETE
4-13: 16:13:39:453:60c Asked to delete phase2 SPI we don't own: 837560770 proto=3
4-13: 16:13:39:531:60c
4-13: 16:13:39:531:60c Receive: (get) SA = 0x000ed870 from 141.51.110.127.500
4-13: 16:13:39:531:60c ISAKMP Header: (V1.0), len = 84
4-13: 16:13:39:531:60c I-COOKIE 04b0300cb95125c8
4-13: 16:13:39:531:60c R-COOKIE 0d17a7c6742be5b5
4-13: 16:13:39:531:60c exchange: ISAKMP Informational Exchange
4-13: 16:13:39:531:60c flags: 1 ( encrypted )
4-13: 16:13:39:531:60c next payload: HASH
4-13: 16:13:39:531:60c message ID: 2c34471a
4-13: 16:13:39:531:60c processing HASH (Notify/Delete)
4-13: 16:13:39:531:60c processing payload DELETE
4-13: 16:13:46:796:60c ClearFragList
****************************

Kann mir jemand sagen, was nicht funktioniert????

Gruß Ben
Seitenanfang Seitenende
Um auf dieses Thema zu ANTWORTEN
bitte erst » hier kostenlos registrieren!!

Folgende Themen könnten Dich auch interessieren: