[vpn-help] Problem reaching subnets behind Fritzbox
Michael Hüttl
mihue.huettl at googlemail.com
Tue Jan 26 15:15:41 CST 2010
Hi,
I used the AVM VPN connection software before to connect to a Fritzbox and
would like to use the Shrew client instead. Installation and connection to
the remote network worked fine, but I still have a problem connecting to
subnets behind the remote net, in details:
I am connecting to a remote net 192.168.116.0/24, where the Fritzbox is
located and which works fine. There exist three further subnets behind the
Fritzbox, which I cannot reach:
192.168.115.32/27, 192.168.115.64/27, 200.200.200.0/24, which works fine
using the Fritz VPN Software. I Have configured the networks in the policy
segment of the VPN Site Configuration and concerning the Debug trace, the
policies are added, but I cannot ping any of the three nets. Any idea, where
to search the problem? My routing table and the Ike trace are attached. I´m
not sure whether it has to with the routing in the remote nets or the VPN
client, because it works fine with the AVM Client. Any idea?
Thanks a lot
Michael Huettl
Network Destination Netmask Gateway Interface Metric
0.0.0.0 0.0.0.0 192.168.110.250 192.168.110.150 25
127.0.0.0 255.0.0.0 127.0.0.1 127.0.0.1 1
192.168.72.0 255.255.255.0 192.168.72.1 192.168.72.1 20
192.168.72.1 255.255.255.255 127.0.0.1 127.0.0.1 20
192.168.72.255 255.255.255.255 192.168.72.1 192.168.72.1 20
192.168.110.0 255.255.255.0 192.168.110.150 192.168.110.150 25
192.168.110.150 255.255.255.255 127.0.0.1 127.0.0.1 25
192.168.110.255 255.255.255.255 192.168.110.150 192.168.110.150 25
192.168.115.32 255.255.255.224 192.168.116.202 192.168.116.202 1
192.168.115.64 255.255.255.224 192.168.116.202 192.168.116.202 1
192.168.116.0 255.255.255.0 192.168.116.202 192.168.116.202 1
192.168.116.202 255.255.255.255 127.0.0.1 127.0.0.1 30
192.168.116.255 255.255.255.255 192.168.116.202 192.168.116.202 30
192.168.136.0 255.255.255.0 192.168.136.1 192.168.136.1 20
192.168.136.1 255.255.255.255 127.0.0.1 127.0.0.1 20
192.168.136.255 255.255.255.255 192.168.136.1 192.168.136.1 20
200.200.200.0 255.255.255.0 192.168.116.202 192.168.116.202 1
224.0.0.0 240.0.0.0 192.168.72.1 192.168.72.1 20
224.0.0.0 240.0.0.0 192.168.110.150 192.168.110.150 25
224.0.0.0 240.0.0.0 192.168.116.202 192.168.116.202 30
224.0.0.0 240.0.0.0 192.168.136.1 192.168.136.1 20
255.255.255.255 255.255.255.255 192.168.72.1 192.168.72.1 1
255.255.255.255 255.255.255.255 192.168.110.150 192.168.110.150 1
255.255.255.255 255.255.255.255 192.168.116.202 192.168.116.202 1
255.255.255.255 255.255.255.255 192.168.136.1 192.168.136.1 1
255.255.255.255 255.255.255.255 192.168.136.1 4 1
255.255.255.255 255.255.255.255 192.168.136.1 10007 1
Default Gateway: 192.168.110.250
===========================================================================
10/01/26 21:18:10 ## : IKE Daemon, ver 2.1.5
10/01/26 21:18:10 ## : Copyright 2009 Shrew Soft Inc.
10/01/26 21:18:10 ## : This product linked OpenSSL 0.9.8h 28 May 2008
10/01/26 21:18:10 ii : opened 'C:\Program Files\ShrewSoft\VPN
Client\debug\iked.log'
10/01/26 21:18:10 ii : opened 'C:\Program Files\ShrewSoft\VPN
Client/debug/dump-ike-decrypt.cap'
10/01/26 21:18:10 ii : opened 'C:\Program Files\ShrewSoft\VPN
Client/debug/dump-ike-encrypt.cap'
10/01/26 21:18:10 ii : rebuilding vnet device list ...
10/01/26 21:18:10 ii : device ROOT\VNET\0000 disabled
10/01/26 21:18:10 ii : network process thread begin ...
10/01/26 21:18:10 ii : pfkey process thread begin ...
10/01/26 21:18:10 ii : ipc server process thread begin ...
10/01/26 21:19:05 ii : ipc client process thread begin ...
10/01/26 21:19:05 <A : peer config add message
10/01/26 21:19:05 DB : peer added ( obj count = 1 )
10/01/26 21:19:05 ii : local address 192.168.110.150 selected for peer
10/01/26 21:19:05 DB : tunnel added ( obj count = 1 )
10/01/26 21:19:05 <A : proposal config message
10/01/26 21:19:05 <A : proposal config message
10/01/26 21:19:05 <A : proposal config message
10/01/26 21:19:05 <A : client config message
10/01/26 21:19:05 <A : local id 'michael.huettl at huettl-gmbh.de' message
10/01/26 21:19:05 <A : preshared key message
10/01/26 21:19:05 <A : remote resource message
10/01/26 21:19:05 <A : remote resource message
10/01/26 21:19:05 <A : remote resource message
10/01/26 21:19:05 <A : remote resource message
10/01/26 21:19:05 <A : peer tunnel enable message
10/01/26 21:19:05 DB : new phase1 ( ISAKMP initiator )
10/01/26 21:19:05 DB : exchange type is aggressive
10/01/26 21:19:05 DB : 192.168.110.150:500 <-> 87.78.69.220:500
10/01/26 21:19:05 DB : 9e1e592bf5ae00db:0000000000000000
10/01/26 21:19:05 DB : phase1 added ( obj count = 1 )
10/01/26 21:19:05 >> : security association payload
10/01/26 21:19:05 >> : - proposal #1 payload
10/01/26 21:19:05 >> : -- transform #1 payload
10/01/26 21:19:05 >> : key exchange payload
10/01/26 21:19:05 >> : nonce payload
10/01/26 21:19:05 >> : identification payload
10/01/26 21:19:05 >> : vendor id payload
10/01/26 21:19:05 ii : local supports nat-t ( draft v00 )
10/01/26 21:19:05 >> : vendor id payload
10/01/26 21:19:05 ii : local supports nat-t ( draft v01 )
10/01/26 21:19:05 >> : vendor id payload
10/01/26 21:19:05 ii : local supports nat-t ( draft v02 )
10/01/26 21:19:05 >> : vendor id payload
10/01/26 21:19:05 ii : local supports nat-t ( draft v03 )
10/01/26 21:19:05 >> : vendor id payload
10/01/26 21:19:05 ii : local supports nat-t ( rfc )
10/01/26 21:19:05 >> : vendor id payload
10/01/26 21:19:05 ii : local supports FRAGMENTATION
10/01/26 21:19:05 >> : vendor id payload
10/01/26 21:19:05 ii : local supports DPDv1
10/01/26 21:19:05 >> : vendor id payload
10/01/26 21:19:05 ii : local is SHREW SOFT compatible
10/01/26 21:19:05 >> : vendor id payload
10/01/26 21:19:05 ii : local is NETSCREEN compatible
10/01/26 21:19:05 >> : vendor id payload
10/01/26 21:19:05 ii : local is SIDEWINDER compatible
10/01/26 21:19:05 >> : vendor id payload
10/01/26 21:19:05 ii : local is CISCO UNITY compatible
10/01/26 21:19:05 >= : cookies 9e1e592bf5ae00db:0000000000000000
10/01/26 21:19:05 >= : message 00000000
10/01/26 21:19:05 -> : send IKE packet 192.168.110.150:500 ->
87.78.69.220:500 ( 537 bytes )
10/01/26 21:19:05 DB : phase1 resend event scheduled ( ref count = 2 )
10/01/26 21:19:06 <- : recv IKE packet 87.78.69.220:500 ->
192.168.110.150:500 ( 304 bytes )
10/01/26 21:19:06 DB : phase1 found
10/01/26 21:19:06 ii : processing phase1 packet ( 304 bytes )
10/01/26 21:19:06 =< : cookies 9e1e592bf5ae00db:434283c235f105b3
10/01/26 21:19:06 =< : message 00000000
10/01/26 21:19:06 << : security association payload
10/01/26 21:19:06 << : - propsal #1 payload
10/01/26 21:19:06 << : -- transform #1 payload
10/01/26 21:19:06 ii : matched isakmp proposal #1 transform #1
10/01/26 21:19:06 ii : - transform = ike
10/01/26 21:19:06 ii : - cipher type = aes
10/01/26 21:19:06 ii : - key length = 256 bits
10/01/26 21:19:06 ii : - hash type = sha1
10/01/26 21:19:06 ii : - dh group = modp-1024
10/01/26 21:19:06 ii : - auth type = psk
10/01/26 21:19:06 ii : - life seconds = 3600
10/01/26 21:19:06 ii : - life kbytes = 0
10/01/26 21:19:06 << : key exchange payload
10/01/26 21:19:06 << : nonce payload
10/01/26 21:19:06 << : identification payload
10/01/26 21:19:06 ii : phase1 id match ( natt prevents ip match )
10/01/26 21:19:06 ii : received = ipv4-host 87.78.69.220
10/01/26 21:19:06 << : hash payload
10/01/26 21:19:06 << : vendor id payload
10/01/26 21:19:06 ii : peer supports XAUTH
10/01/26 21:19:06 << : vendor id payload
10/01/26 21:19:06 ii : peer supports DPDv1
10/01/26 21:19:06 ii : nat-t is unsupported by remote peer
10/01/26 21:19:06 == : DH shared secret ( 128 bytes )
10/01/26 21:19:06 == : SETKEYID ( 20 bytes )
10/01/26 21:19:06 == : SETKEYID_d ( 20 bytes )
10/01/26 21:19:06 == : SETKEYID_a ( 20 bytes )
10/01/26 21:19:06 == : SETKEYID_e ( 20 bytes )
10/01/26 21:19:06 == : cipher key ( 32 bytes )
10/01/26 21:19:06 == : cipher iv ( 16 bytes )
10/01/26 21:19:06 == : phase1 hash_i ( computed ) ( 20 bytes )
10/01/26 21:19:06 >> : hash payload
10/01/26 21:19:06 >= : cookies 9e1e592bf5ae00db:434283c235f105b3
10/01/26 21:19:06 >= : message 00000000
10/01/26 21:19:06 >= : encrypt iv ( 16 bytes )
10/01/26 21:19:06 == : encrypt packet ( 52 bytes )
10/01/26 21:19:06 == : stored iv ( 16 bytes )
10/01/26 21:19:06 DB : phase1 resend event canceled ( ref count = 1 )
10/01/26 21:19:06 -> : send IKE packet 192.168.110.150:500 ->
87.78.69.220:500 ( 88 bytes )
10/01/26 21:19:06 == : phase1 hash_r ( computed ) ( 20 bytes )
10/01/26 21:19:06 == : phase1 hash_r ( received ) ( 20 bytes )
10/01/26 21:19:06 ii : phase1 sa established
10/01/26 21:19:06 ii : 87.78.69.220:500 <-> 192.168.110.150:500
10/01/26 21:19:06 ii : 9e1e592bf5ae00db:434283c235f105b3
10/01/26 21:19:06 ii : sending peer INITIAL-CONTACT notification
10/01/26 21:19:06 ii : - 192.168.110.150:500 -> 87.78.69.220:500
10/01/26 21:19:06 ii : - isakmp spi = 9e1e592bf5ae00db:434283c235f105b3
10/01/26 21:19:06 ii : - data size 0
10/01/26 21:19:06 >> : hash payload
10/01/26 21:19:06 >> : notification payload
10/01/26 21:19:06 == : new informational hash ( 20 bytes )
10/01/26 21:19:06 == : new informational iv ( 16 bytes )
10/01/26 21:19:06 >= : cookies 9e1e592bf5ae00db:434283c235f105b3
10/01/26 21:19:06 >= : message e725d291
10/01/26 21:19:06 >= : encrypt iv ( 16 bytes )
10/01/26 21:19:06 == : encrypt packet ( 80 bytes )
10/01/26 21:19:06 == : stored iv ( 16 bytes )
10/01/26 21:19:06 -> : send IKE packet 192.168.110.150:500 ->
87.78.69.220:500 ( 120 bytes )
10/01/26 21:19:06 DB : config added ( obj count = 1 )
10/01/26 21:19:06 ii : building config attribute list
10/01/26 21:19:06 ii : - IP4 Address
10/01/26 21:19:06 ii : - Address Expiry
10/01/26 21:19:06 ii : - IP4 Netamask
10/01/26 21:19:06 == : new config iv ( 16 bytes )
10/01/26 21:19:06 ii : sending config pull request
10/01/26 21:19:06 >> : hash payload
10/01/26 21:19:06 >> : attribute payload
10/01/26 21:19:06 == : new configure hash ( 20 bytes )
10/01/26 21:19:06 >= : cookies 9e1e592bf5ae00db:434283c235f105b3
10/01/26 21:19:06 >= : message 7963e34c
10/01/26 21:19:06 >= : encrypt iv ( 16 bytes )
10/01/26 21:19:06 == : encrypt packet ( 72 bytes )
10/01/26 21:19:06 == : stored iv ( 16 bytes )
10/01/26 21:19:06 -> : send IKE packet 192.168.110.150:500 ->
87.78.69.220:500 ( 104 bytes )
10/01/26 21:19:06 DB : config resend event scheduled ( ref count = 2 )
10/01/26 21:19:06 DB : phase2 not found
10/01/26 21:19:06 <- : recv IKE packet 87.78.69.220:500 ->
192.168.110.150:500 ( 92 bytes )
10/01/26 21:19:06 DB : phase1 found
10/01/26 21:19:06 ii : processing informational packet ( 92 bytes )
10/01/26 21:19:06 == : new informational iv ( 16 bytes )
10/01/26 21:19:06 =< : cookies 9e1e592bf5ae00db:434283c235f105b3
10/01/26 21:19:06 =< : message 71bffda7
10/01/26 21:19:06 =< : decrypt iv ( 16 bytes )
10/01/26 21:19:06 == : decrypt packet ( 92 bytes )
10/01/26 21:19:06 <= : trimmed packet padding ( 12 bytes )
10/01/26 21:19:06 <= : stored iv ( 16 bytes )
10/01/26 21:19:06 << : hash payload
10/01/26 21:19:06 << : notification payload
10/01/26 21:19:06 == : informational hash_i ( computed ) ( 20 bytes )
10/01/26 21:19:06 == : informational hash_c ( received ) ( 20 bytes )
10/01/26 21:19:06 ii : informational hash verified
10/01/26 21:19:06 ii : received peer INITIAL-CONTACT notification
10/01/26 21:19:06 ii : - 87.78.69.220:500 -> 192.168.110.150:500
10/01/26 21:19:06 ii : - isakmp spi = 9e1e592bf5ae00db:434283c235f105b3
10/01/26 21:19:06 ii : - data size 0
10/01/26 21:19:06 <- : recv IKE packet 87.78.69.220:500 ->
192.168.110.150:500 ( 76 bytes )
10/01/26 21:19:06 DB : phase1 found
10/01/26 21:19:06 ii : processing config packet ( 76 bytes )
10/01/26 21:19:06 DB : config found
10/01/26 21:19:06 =< : cookies 9e1e592bf5ae00db:434283c235f105b3
10/01/26 21:19:06 =< : message 7963e34c
10/01/26 21:19:06 =< : decrypt iv ( 16 bytes )
10/01/26 21:19:06 == : decrypt packet ( 76 bytes )
10/01/26 21:19:06 <= : trimmed packet padding ( 8 bytes )
10/01/26 21:19:06 <= : stored iv ( 16 bytes )
10/01/26 21:19:06 << : hash payload
10/01/26 21:19:06 << : attribute payload
10/01/26 21:19:06 == : configure hash_i ( computed ) ( 20 bytes )
10/01/26 21:19:06 == : configure hash_c ( computed ) ( 20 bytes )
10/01/26 21:19:06 ii : configure hash verified
10/01/26 21:19:06 ii : received config pull response
10/01/26 21:19:06 ii : - IP4 Address = 192.168.116.202
10/01/26 21:19:06 DB : config resend event canceled ( ref count = 1 )
10/01/26 21:19:06 !! : invalid private netmask, defaulting to class c
10/01/26 21:19:10 ii : VNET adapter MTU is 1500
10/01/26 21:19:10 ii : enabled adapter ROOT\VNET\0000
10/01/26 21:19:10 ii : creating IPSEC INBOUND policy ANY:192.168.116.0/24:*
-> ANY:192.168.116.202:*
10/01/26 21:19:10 DB : policy added ( obj count = 1 )
10/01/26 21:19:10 K> : send pfkey X_SPDADD UNSPEC message
10/01/26 21:19:10 K< : recv pfkey X_SPDADD UNSPEC message
10/01/26 21:19:10 ii : creating IPSEC OUTBOUND policy ANY:192.168.116.202:*
-> ANY:192.168.116.0/24:*
10/01/26 21:19:10 DB : policy found
10/01/26 21:19:13 ii : created IPSEC policy route for 192.168.116.0/24
10/01/26 21:19:13 DB : policy added ( obj count = 2 )
10/01/26 21:19:13 K> : send pfkey X_SPDADD UNSPEC message
10/01/26 21:19:13 ii : creating IPSEC INBOUND policy ANY:192.168.115.32/27:*
-> ANY:192.168.116.202:*
10/01/26 21:19:13 DB : policy added ( obj count = 3 )
10/01/26 21:19:13 K> : send pfkey X_SPDADD UNSPEC message
10/01/26 21:19:13 ii : creating IPSEC OUTBOUND policy ANY:192.168.116.202:*
-> ANY:192.168.115.32/27:*
10/01/26 21:19:13 ii : created IPSEC policy route for 192.168.115.32/27
10/01/26 21:19:13 DB : policy added ( obj count = 4 )
10/01/26 21:19:13 K> : send pfkey X_SPDADD UNSPEC message
10/01/26 21:19:13 ii : creating IPSEC INBOUND policy ANY:192.168.115.64/27:*
-> ANY:192.168.116.202:*
10/01/26 21:19:13 DB : policy added ( obj count = 5 )
10/01/26 21:19:13 K> : send pfkey X_SPDADD UNSPEC message
10/01/26 21:19:13 ii : creating IPSEC OUTBOUND policy ANY:192.168.116.202:*
-> ANY:192.168.115.64/27:*
10/01/26 21:19:13 ii : created IPSEC policy route for 192.168.115.64/27
10/01/26 21:19:13 DB : policy added ( obj count = 6 )
10/01/26 21:19:13 K> : send pfkey X_SPDADD UNSPEC message
10/01/26 21:19:13 ii : creating IPSEC INBOUND policy ANY:200.200.200.0/24:*
-> ANY:192.168.116.202:*
10/01/26 21:19:13 DB : policy added ( obj count = 7 )
10/01/26 21:19:13 K> : send pfkey X_SPDADD UNSPEC message
10/01/26 21:19:13 ii : creating IPSEC OUTBOUND policy ANY:192.168.116.202:*
-> ANY:200.200.200.0/24:*
10/01/26 21:19:13 ii : created IPSEC policy route for 200.200.200.0/24
10/01/26 21:19:13 DB : policy added ( obj count = 8 )
10/01/26 21:19:13 K> : send pfkey X_SPDADD UNSPEC message
10/01/26 21:19:13 ii : split DNS is disabled
10/01/26 21:19:14 K< : recv pfkey X_SPDADD UNSPEC message
10/01/26 21:19:14 DB : policy found
10/01/26 21:19:14 K< : recv pfkey X_SPDADD UNSPEC message
10/01/26 21:19:14 DB : policy found
10/01/26 21:19:14 K< : recv pfkey X_SPDADD UNSPEC message
10/01/26 21:19:14 DB : policy found
10/01/26 21:19:14 K< : recv pfkey X_SPDADD UNSPEC message
10/01/26 21:19:14 DB : policy found
10/01/26 21:19:14 K< : recv pfkey X_SPDADD UNSPEC message
10/01/26 21:19:14 DB : policy found
10/01/26 21:19:14 K< : recv pfkey X_SPDADD UNSPEC message
10/01/26 21:19:14 DB : policy found
10/01/26 21:19:14 K< : recv pfkey X_SPDADD UNSPEC message
10/01/26 21:19:14 DB : policy found
10/01/26 21:19:16 <- : recv IKE packet 87.78.69.220:500 ->
192.168.110.150:500 ( 76 bytes )
10/01/26 21:19:16 DB : phase1 found
10/01/26 21:19:16 ii : processing config packet ( 76 bytes )
10/01/26 21:19:16 DB : config found
10/01/26 21:19:16 !! : config packet ignored, ( config already mature )
10/01/26 21:19:21 DB : phase1 found
10/01/26 21:19:21 ii : sending peer DPDV1-R-U-THERE notification
10/01/26 21:19:21 ii : - 192.168.110.150:500 -> 87.78.69.220:500
10/01/26 21:19:21 ii : - isakmp spi = 9e1e592bf5ae00db:434283c235f105b3
10/01/26 21:19:21 ii : - data size 4
10/01/26 21:19:21 >> : hash payload
10/01/26 21:19:21 >> : notification payload
10/01/26 21:19:21 == : new informational hash ( 20 bytes )
10/01/26 21:19:21 == : new informational iv ( 16 bytes )
10/01/26 21:19:21 >= : cookies 9e1e592bf5ae00db:434283c235f105b3
10/01/26 21:19:21 >= : message d47cfd58
10/01/26 21:19:21 >= : encrypt iv ( 16 bytes )
10/01/26 21:19:21 == : encrypt packet ( 84 bytes )
10/01/26 21:19:21 == : stored iv ( 16 bytes )
10/01/26 21:19:21 -> : send IKE packet 192.168.110.150:500 ->
87.78.69.220:500 ( 120 bytes )
10/01/26 21:19:21 ii : DPD ARE-YOU-THERE sequence 13557105 requested
10/01/26 21:19:21 <- : recv IKE packet 87.78.69.220:500 ->
192.168.110.150:500 ( 92 bytes )
10/01/26 21:19:21 DB : phase1 found
10/01/26 21:19:21 ii : processing informational packet ( 92 bytes )
10/01/26 21:19:21 == : new informational iv ( 16 bytes )
10/01/26 21:19:21 =< : cookies 9e1e592bf5ae00db:434283c235f105b3
10/01/26 21:19:21 =< : message d47cfd58
10/01/26 21:19:21 =< : decrypt iv ( 16 bytes )
10/01/26 21:19:21 == : decrypt packet ( 92 bytes )
10/01/26 21:19:21 <= : trimmed packet padding ( 8 bytes )
10/01/26 21:19:21 <= : stored iv ( 16 bytes )
10/01/26 21:19:21 << : hash payload
10/01/26 21:19:21 << : notification payload
10/01/26 21:19:21 == : informational hash_i ( computed ) ( 20 bytes )
10/01/26 21:19:21 == : informational hash_c ( received ) ( 20 bytes )
10/01/26 21:19:21 ii : informational hash verified
10/01/26 21:19:21 ii : received peer DPDV1-R-U-THERE-ACK notification
10/01/26 21:19:21 ii : - 87.78.69.220:500 -> 192.168.110.150:500
10/01/26 21:19:21 ii : - isakmp spi = 9e1e592bf5ae00db:434283c235f105b3
10/01/26 21:19:21 ii : - data size 4
10/01/26 21:19:21 ii : DPD ARE-YOU-THERE-ACK sequence 13557105 accepted
10/01/26 21:19:21 ii : next tunnel DPD request in 15 secs for peer
87.78.69.220:500
10/01/26 21:19:36 DB : phase1 found
10/01/26 21:19:36 ii : sending peer DPDV1-R-U-THERE notification
10/01/26 21:19:36 ii : - 192.168.110.150:500 -> 87.78.69.220:500
10/01/26 21:19:36 ii : - isakmp spi = 9e1e592bf5ae00db:434283c235f105b3
10/01/26 21:19:36 ii : - data size 4
10/01/26 21:19:36 >> : hash payload
10/01/26 21:19:36 >> : notification payload
10/01/26 21:19:36 == : new informational hash ( 20 bytes )
10/01/26 21:19:36 == : new informational iv ( 16 bytes )
10/01/26 21:19:36 >= : cookies 9e1e592bf5ae00db:434283c235f105b3
10/01/26 21:19:36 >= : message d94919f8
10/01/26 21:19:36 >= : encrypt iv ( 16 bytes )
10/01/26 21:19:36 == : encrypt packet ( 84 bytes )
10/01/26 21:19:36 == : stored iv ( 16 bytes )
10/01/26 21:19:36 -> : send IKE packet 192.168.110.150:500 ->
87.78.69.220:500 ( 120 bytes )
10/01/26 21:19:36 ii : DPD ARE-YOU-THERE sequence 13557106 requested
10/01/26 21:19:36 <- : recv IKE packet 87.78.69.220:500 ->
192.168.110.150:500 ( 92 bytes )
10/01/26 21:19:36 DB : phase1 found
10/01/26 21:19:36 ii : processing informational packet ( 92 bytes )
10/01/26 21:19:36 == : new informational iv ( 16 bytes )
10/01/26 21:19:36 =< : cookies 9e1e592bf5ae00db:434283c235f105b3
10/01/26 21:19:36 =< : message d94919f8
10/01/26 21:19:36 =< : decrypt iv ( 16 bytes )
10/01/26 21:19:36 == : decrypt packet ( 92 bytes )
10/01/26 21:19:36 <= : trimmed packet padding ( 8 bytes )
10/01/26 21:19:36 <= : stored iv ( 16 bytes )
10/01/26 21:19:36 << : hash payload
10/01/26 21:19:36 << : notification payload
10/01/26 21:19:36 == : informational hash_i ( computed ) ( 20 bytes )
10/01/26 21:19:36 == : informational hash_c ( received ) ( 20 bytes )
10/01/26 21:19:36 ii : informational hash verified
10/01/26 21:19:36 ii : received peer DPDV1-R-U-THERE-ACK notification
10/01/26 21:19:36 ii : - 87.78.69.220:500 -> 192.168.110.150:500
10/01/26 21:19:36 ii : - isakmp spi = 9e1e592bf5ae00db:434283c235f105b3
10/01/26 21:19:36 ii : - data size 4
10/01/26 21:19:36 ii : DPD ARE-YOU-THERE-ACK sequence 13557106 accepted
10/01/26 21:19:36 ii : next tunnel DPD request in 15 secs for peer
87.78.69.220:500
10/01/26 21:19:36 <- : recv IKE packet 87.78.69.220:500 ->
192.168.110.150:500 ( 76 bytes )
10/01/26 21:19:36 DB : phase1 found
10/01/26 21:19:36 ii : processing config packet ( 76 bytes )
10/01/26 21:19:36 DB : config found
10/01/26 21:19:36 !! : config packet ignored, ( config already mature )
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.shrew.net/pipermail/vpn-help/attachments/20100126/d3e84666/attachment.html>
More information about the vpn-help
mailing list