[vpn-help] Client to LAN VPN Connection TL-ER6020

Tim Hutchison tim.tmssolutionsltd at gmail.com
Mon Mar 23 07:43:43 CDT 2015


Alexis,

Attached is the debug log for the client.  I'm having trouble getting 
the logs for the gateway end, but I will keep trying.

Tim

On 3/14/2015 10:49 AM, Alexis La Goutte wrote:
> Hi Tim,
>
> It is possible to attach debug log ? (on client and on gateway)
> because missing information to help...
>
> On Thu, Mar 12, 2015 at 4:00 PM, Tim Hutchison 
> <tim.tmssolutionsltd at gmail.com <mailto:tim.tmssolutionsltd at gmail.com>> 
> wrote:
>
>     Hello,
>
>     I am trying to use a client-to-LAN VPN connection with the Shrew
>     Soft client and a TP-Link TL-ER6020 VPN Router.  I've followed
>     TP-Link's tutorial, but I have not been able to connect.  Are
>     there any known issues connecting to this router or do you have
>     any suggestions on how to solve this problem?  Also, when I use
>     the VPN Trace, I don't get any output. Here is the output when I
>     try to connect:
>
>     config loaded for site 'Youngblood'
>     attached to key daemon ...
>     peer configured
>     iskamp proposal configured
>     esp proposal configured
>     client configured
>     local id configured
>     remote id configured
>     pre-shared key configured
>     bringing up tunnel ...
>     negotiation timout occurred
>     tunnel disabled
>     detached from key daemon
>
>     Thanks,
>
>     Tim
>
>     _______________________________________________
>     vpn-help mailing list
>     vpn-help at lists.shrew.net <mailto:vpn-help at lists.shrew.net>
>     https://lists.shrew.net/mailman/listinfo/vpn-help
>
>

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.shrew.net/pipermail/vpn-help/attachments/20150323/6ac17ab5/attachment-0001.html>
-------------- next part --------------
15/03/23 08:39:28 ## : IKE Daemon, ver 2.2.2
15/03/23 08:39:28 ## : Copyright 2013 Shrew Soft Inc.
15/03/23 08:39:28 ## : This product linked OpenSSL 1.0.1c 10 May 2012
15/03/23 08:39:28 ii : opened 'C:\Program Files\ShrewSoft\VPN Client\debug\iked.log'
15/03/23 08:39:28 ii : opened 'C:\Program Files\ShrewSoft\VPN Client/debug/dump-ike-decrypt.cap'
15/03/23 08:39:28 ii : opened 'C:\Program Files\ShrewSoft\VPN Client/debug/dump-ike-encrypt.cap'
15/03/23 08:39:28 ii : rebuilding vnet device list ...
15/03/23 08:39:28 ii : device ROOT\VNET\0000 disabled
15/03/23 08:39:28 ii : network process thread begin ...
15/03/23 08:39:28 ii : pfkey process thread begin ...
15/03/23 08:39:28 ii : ipc server process thread begin ...
15/03/23 08:39:32 ii : ipc client process thread begin ...
15/03/23 08:39:32 <A : peer config add message
15/03/23 08:39:32 <A : proposal config message
15/03/23 08:39:32 <A : proposal config message
15/03/23 08:39:32 <A : client config message
15/03/23 08:39:32 <A : local id '1224zmz284' message
15/03/23 08:39:32 <A : remote id '3je7483bk2' message
15/03/23 08:39:32 <A : preshared key message
15/03/23 08:39:32 <A : remote resource message
15/03/23 08:39:32 <A : peer tunnel enable message
15/03/23 08:39:32 DB : peer added ( obj count = 1 )
15/03/23 08:39:32 ii : local address 192.168.57.101 selected for peer
15/03/23 08:39:32 DB : tunnel added ( obj count = 1 )
15/03/23 08:39:32 DB : new phase1 ( ISAKMP initiator )
15/03/23 08:39:32 DB : exchange type is aggressive
15/03/23 08:39:32 DB : 192.168.57.101:500 <-> 208.125.79.154:500
15/03/23 08:39:32 DB : d94e4e6069dda27f:0000000000000000
15/03/23 08:39:32 DB : phase1 added ( obj count = 1 )
15/03/23 08:39:32 >> : security association payload
15/03/23 08:39:32 >> : - proposal #1 payload 
15/03/23 08:39:32 >> : -- transform #1 payload 
15/03/23 08:39:32 >> : key exchange payload
15/03/23 08:39:32 >> : nonce payload
15/03/23 08:39:32 >> : identification payload
15/03/23 08:39:32 >> : vendor id payload
15/03/23 08:39:32 ii : local supports nat-t ( draft v00 )
15/03/23 08:39:32 >> : vendor id payload
15/03/23 08:39:32 ii : local supports nat-t ( draft v01 )
15/03/23 08:39:32 >> : vendor id payload
15/03/23 08:39:32 ii : local supports nat-t ( draft v02 )
15/03/23 08:39:32 >> : vendor id payload
15/03/23 08:39:32 ii : local supports nat-t ( draft v03 )
15/03/23 08:39:32 >> : vendor id payload
15/03/23 08:39:32 ii : local supports nat-t ( rfc )
15/03/23 08:39:32 >> : vendor id payload
15/03/23 08:39:32 ii : local supports FRAGMENTATION
15/03/23 08:39:32 >> : vendor id payload
15/03/23 08:39:32 >> : vendor id payload
15/03/23 08:39:32 ii : local supports DPDv1
15/03/23 08:39:32 >> : vendor id payload
15/03/23 08:39:32 ii : local is SHREW SOFT compatible
15/03/23 08:39:32 >> : vendor id payload
15/03/23 08:39:32 ii : local is NETSCREEN compatible
15/03/23 08:39:32 >> : vendor id payload
15/03/23 08:39:32 ii : local is SIDEWINDER compatible
15/03/23 08:39:32 >> : vendor id payload
15/03/23 08:39:32 ii : local is CISCO UNITY compatible
15/03/23 08:39:32 >= : cookies d94e4e6069dda27f:0000000000000000
15/03/23 08:39:32 >= : message 00000000
15/03/23 08:39:32 -> : send IKE packet 192.168.57.101:500 -> 208.125.79.154:500 ( 534 bytes )
15/03/23 08:39:32 DB : phase1 resend event scheduled ( ref count = 2 )
15/03/23 08:39:32 <- : recv IKE packet 208.125.79.154:500 -> 192.168.57.101:500 ( 56 bytes )
15/03/23 08:39:32 DB : phase1 found
15/03/23 08:39:32 ii : processing informational packet ( 56 bytes )
15/03/23 08:39:32 =< : cookies d94e4e6069dda27f:75fcef7b8351a043
15/03/23 08:39:32 =< : message 70155758
15/03/23 08:39:32 << : notification payload
15/03/23 08:39:32 ii : received peer INVALID-EXCHANGE-TYPE notification
15/03/23 08:39:32 ii : - 208.125.79.154:500 -> 192.168.57.101:500
15/03/23 08:39:32 ii : - isakmp spi = d94e4e6069dda27f:75fcef7b8351a043
15/03/23 08:39:32 ii : - data size 0
15/03/23 08:39:37 -> : resend 1 phase1 packet(s) [0/2] 192.168.57.101:500 -> 208.125.79.154:500
15/03/23 08:39:37 <- : recv IKE packet 208.125.79.154:500 -> 192.168.57.101:500 ( 56 bytes )
15/03/23 08:39:37 DB : phase1 found
15/03/23 08:39:37 ii : processing informational packet ( 56 bytes )
15/03/23 08:39:37 =< : cookies d94e4e6069dda27f:5593c7d6137c731e
15/03/23 08:39:37 =< : message b4d5c1ba
15/03/23 08:39:37 << : notification payload
15/03/23 08:39:37 ii : received peer INVALID-EXCHANGE-TYPE notification
15/03/23 08:39:37 ii : - 208.125.79.154:500 -> 192.168.57.101:500
15/03/23 08:39:37 ii : - isakmp spi = d94e4e6069dda27f:5593c7d6137c731e
15/03/23 08:39:37 ii : - data size 0
15/03/23 08:39:42 -> : resend 1 phase1 packet(s) [1/2] 192.168.57.101:500 -> 208.125.79.154:500
15/03/23 08:39:42 <- : recv IKE packet 208.125.79.154:500 -> 192.168.57.101:500 ( 56 bytes )
15/03/23 08:39:42 DB : phase1 found
15/03/23 08:39:42 ii : processing informational packet ( 56 bytes )
15/03/23 08:39:42 =< : cookies d94e4e6069dda27f:686e30963de0d766
15/03/23 08:39:42 =< : message 8faf4e2f
15/03/23 08:39:42 << : notification payload
15/03/23 08:39:42 ii : received peer INVALID-EXCHANGE-TYPE notification
15/03/23 08:39:42 ii : - 208.125.79.154:500 -> 192.168.57.101:500
15/03/23 08:39:42 ii : - isakmp spi = d94e4e6069dda27f:686e30963de0d766
15/03/23 08:39:42 ii : - data size 0
15/03/23 08:39:47 -> : resend 1 phase1 packet(s) [2/2] 192.168.57.101:500 -> 208.125.79.154:500
15/03/23 08:39:47 <- : recv IKE packet 208.125.79.154:500 -> 192.168.57.101:500 ( 56 bytes )
15/03/23 08:39:47 DB : phase1 found
15/03/23 08:39:47 ii : processing informational packet ( 56 bytes )
15/03/23 08:39:47 =< : cookies d94e4e6069dda27f:a80ef8211efcf73a
15/03/23 08:39:47 =< : message 8a43eea9
15/03/23 08:39:47 << : notification payload
15/03/23 08:39:47 ii : received peer INVALID-EXCHANGE-TYPE notification
15/03/23 08:39:47 ii : - 208.125.79.154:500 -> 192.168.57.101:500
15/03/23 08:39:47 ii : - isakmp spi = d94e4e6069dda27f:a80ef8211efcf73a
15/03/23 08:39:47 ii : - data size 0
15/03/23 08:39:52 ii : resend limit exceeded for phase1 exchange
15/03/23 08:39:52 ii : phase1 removal before expire time
15/03/23 08:39:52 DB : phase1 deleted ( obj count = 0 )
15/03/23 08:39:52 DB : policy not found
15/03/23 08:39:52 DB : policy not found
15/03/23 08:39:52 DB : policy not found
15/03/23 08:39:52 DB : policy not found
15/03/23 08:39:52 DB : policy not found
15/03/23 08:39:52 DB : policy not found
15/03/23 08:39:52 DB : removing tunnel config references
15/03/23 08:39:52 DB : removing tunnel phase2 references
15/03/23 08:39:52 DB : removing tunnel phase1 references
15/03/23 08:39:52 DB : tunnel deleted ( obj count = 0 )
15/03/23 08:39:52 DB : removing all peer tunnel references
15/03/23 08:39:52 DB : peer deleted ( obj count = 0 )
15/03/23 08:39:52 ii : ipc client process thread exit ...
-------------- next part --------------
15/03/23 08:39:20 ## : IPSEC Daemon, ver 2.2.2
15/03/23 08:39:20 ## : Copyright 2013 Shrew Soft Inc.
15/03/23 08:39:20 ## : This product linked OpenSSL 1.0.1c 10 May 2012
15/03/23 08:39:20 ## : This product linked zlib v1.2.3
15/03/23 08:39:20 ii : opened 'dump-ipsec-pub.cap'
15/03/23 08:39:20 ii : opened 'dump-ipsec-prv.cap'
15/03/23 08:39:20 ii : network send process thread begin ...
15/03/23 08:39:20 ii : network recv process thread begin ...
15/03/23 08:39:20 ii : pfkey server process thread begin ...
15/03/23 08:39:20 ii : vflt recv device attached
15/03/23 08:39:20 ii : vflt send device attached
15/03/23 08:39:20 ii : pfkey client process thread begin ...
15/03/23 08:39:20 K< : recv DUMP UNSPEC message
15/03/23 08:39:20 K< : recv X_SPDDUMP UNSPEC message
15/03/23 08:39:21 ii : pfkey client process thread begin ...
15/03/23 08:39:21 K< : message REGISTER AH received
15/03/23 08:39:21 K< : message REGISTER ESP received
15/03/23 08:39:21 K< : message REGISTER IPCOMP received
15/03/23 08:39:21 K< : recv X_SPDDUMP UNSPEC message
15/03/23 08:39:27 ii : pfkey client process thread exit ...
15/03/23 08:39:28 ii : pfkey client process thread begin ...
15/03/23 08:39:28 K< : message REGISTER AH received
15/03/23 08:39:28 K< : message REGISTER ESP received
15/03/23 08:39:28 K< : message REGISTER IPCOMP received
15/03/23 08:39:28 K< : recv X_SPDDUMP UNSPEC message


More information about the vpn-help mailing list