Code: Alles auswählen
[VPN-Debug] 2023/03/18 00:03:01,067
Peer DEFAULT [responder]: Received an IKE_AUTH-REQUEST of 1220 bytes (encrypted)
Gateways: [2003:e.......]:500<--[2a01:598:b1a4:7b.............]:500
SPIs: 0x583395696A940FD3776FCED0CBD443C1, Message-ID 1
Payloads: ENCRYPTED_FRAGMENT
QUB-DATA: [2003:e..........]:4500<---[2a01:598:b1...............]:4500 rtg_tag 0 physical-channel WAN(1)
transport: [id: 25, UDP (17) {incoming unicast, fixed source address}, dst: 2a01:598:b............., tag 0 (U), src: 2003:eb:5f0b..............., hop limit: 255, DSCP: CS6, ECN: Not-ECT, pmtu: 1492, (R) iface: INTERNET-DEFAULT (3), next hop: fe80:.........], local port: 500, remote port: 500
+IKE_SA found and assigned
Message verified successfully
[VPN-Status] 2023/03/18 00:03:01,068
Peer DEFAULT [responder]: Received an IKE_AUTH-REQUEST of 1220 bytes (encrypted)
Gateways: [2003:eb:5..........]:500<--[2a01:598:b1a.............]:500
SPIs: 0x583395696A940FD3776FCED0CBD443C1, Message-ID 1
Ikev2 Fragment Number/Total: 1/3
[VPN-Debug] 2023/03/18 00:03:01,069
Peer DEFAULT [responder]: Received an IKE_AUTH-REQUEST of 1220 bytes (encrypted)
Gateways: [2003:e............]:500<--[2a01:598:b...........]:500
SPIs: 0x583395696A940FD3776FCED0CBD443C1, Message-ID 1
Payloads: ENCRYPTED_FRAGMENT
QUB-DATA: [2003:eb:5f0b............]:4500<---[2a01:598:b1..........]:4500 rtg_tag 0 physical-channel WAN(1)
transport: [id: 25, UDP (17) {incoming unicast, fixed source address}, dst: 2a01:598:b1............., tag 0 (U), src: 2003:eb:5............, hop limit: 255, DSCP: CS6, ECN: Not-ECT, pmtu: 1492, (R) iface: INTERNET-DEFAULT (3), next hop: fe80............], local port: 500, remote port: 500
+IKE_SA found and assigned
Message verified successfully
[VPN-Status] 2023/03/18 00:03:01,069
Peer DEFAULT [responder]: Received an IKE_AUTH-REQUEST of 1220 bytes (encrypted)
Gateways: [2003:eb:5f0..........]:500<--[2a01:598:b...........]:500
SPIs: 0x583395696A940FD3776FCED0CBD443C1, Message-ID 1
Ikev2 Fragment Number/Total: 2/3
[VPN-Debug] 2023/03/18 00:03:01,071
Peer DEFAULT [responder]: Received an IKE_AUTH-REQUEST of 116 bytes (encrypted)
Gateways: [2003:eb:5f............]:500<--[2a01:59..........]:500
SPIs: 0x583395696A940FD3776FCED0CBD443C1, Message-ID 1
Payloads: ENCRYPTED_FRAGMENT
QUB-DATA: [2003:eb:..........]:4500<---[2a01:598:b1a4:7b6..........]:4500 rtg_tag 0 physical-channel WAN(1)
transport: [id: 25, UDP (17) {incoming unicast, fixed source address}, dst: 2a01:598:b1a........., tag 0 (U), src: 2003:eb:5..........., hop limit: 255, DSCP: CS6, ECN: Not-ECT, pmtu: 1492, (R) iface: INTERNET-DEFAULT (3), next hop: fe80::3631....], local port: 500, remote port: 500
+IKE_SA found and assigned
Message verified successfully
IKEv2-Fragment 1/3 decrypted successfully
IKEv2-Fragment 2/3 decrypted successfully
IKEv2-Fragment 3/3 decrypted successfully
[VPN-Status] 2023/03/18 00:03:01,085
Peer DEFAULT [responder]: Received an IKE_AUTH-REQUEST of 2359 bytes
Gateways: [2003:eb:5f0b:ee0.........]:500<--[2a01:598:b1a4:7b6....]:500
SPIs: 0x583395696A940FD3776FCED0CBD443C1, Message-ID 1
CHILD_SA ('', '' ) entered to SADB
Switching to local port 4500 and remote port 4500
Received 4 notifications:
+INITIAL_CONTACT (STATUS)
+ESP_TFC_PADDING_NOT_SUPPORTED (STATUS)
+NON_FIRST_FRAGMENTS_ALSO (STATUS)
+MOBIKE_SUPPORTED (STATUS)
+Received-ID C=de,CN=vpn-...:FQDN matches the Expected-ID C=de,CN=vpn-...:FQDN
+Peer identified: IPHONE-CERT
+Peer uses AUTH(RSA:SHA1)
+Authentication successful
IKE_SA ('IPHONE-CERT', 'ISAKMP-PEER-IPHONE-CERT' IPSEC_IKE SPIs 0x583395696A940FD3776FCED0CBD443C1) removed from SADB
IKE_SA ('IPHONE-CERT', 'ISAKMP-PEER-IPHONE-CERT' IPSEC_IKE SPIs 0x583395696A940FD3776FCED0CBD443C1) entered to SADB
Request attributes:
INTERNAL_IP4_ADDRESS()
INTERNAL_IP4_NETMASK()
INTERNAL_IP4_DHCP()
INTERNAL_IP4_DNS()
INTERNAL_IP6_ADDRESS()
INTERNAL_IP6_DHCP()
INTERNAL_IP6_DNS()
INTERNAL_DNS_DOMAIN()
Assigned IPv4 config parameters:
IP: 192.168.15.164
DNS: 0.0.0.0, 0.0.0.0
TSi: ( 0, 0-65535, 0.0.0.0-255.255.255.255)
TSr: ( 0, 0-65535, 0.0.0.0-255.255.255.255)
+CHILD-SA:
ESP-Proposal-1 Peer-SPI: 0x0E85DAFA (3 transforms)
ENCR : AES-CBC-256
INTEG: HMAC-SHA-256
ESN : NONE
ESP-Proposal-2 Peer-SPI: 0x0512AA30 (3 transforms)
ENCR : AES-CBC-256
INTEG: HMAC-SHA-256
ESN : NONE
ESP-Proposal-3 Peer-SPI: 0x00094328 (3 transforms)
ENCR : AES-CBC-256
INTEG: HMAC-SHA-256
ESN : NONE
ESP-Proposal-4 Peer-SPI: 0x0B587F18 (3 transforms)
ENCR : AES-CBC-128
INTEG: HMAC-SHA1
ESN : NONE
ESP-Proposal-5 Peer-SPI: 0x0D42111D (3 transforms)
ENCR : 3DES
INTEG: HMAC-SHA1
ESN : NONE