ich habe ein VPN zwischen einem Lancom 1611+ (8.0) und einem Bintec-Router gemäß der KB von Lancom eingerichtet, leider komme ich nicht weiter.
Das VPN baut sich nicht auf, der Lanmonitor zeigt:
Zeitüberschreitung während IKE- oder IPSEC- Verhandlung
Ich muß zugeben, dass ich von der Einrichtung von VPNs wenig Ahnung habe. Auf dem 1611+ sind zwar 7 VPN-Verbindungen aktiv aber alle zwischen Lancoms...
Vielleicht hat ja jemand Zeit sich den Trace anzuschauen und mir einen Tipp zu geben wonach ich als nächstes suchen kann.
Code: Alles auswählen
VPN: connecting to VOIPGATE2 (84.110.148.36)
[VPN-Status] 2010/07/24 15:01:22,311 Devicetime: 2010/07/24 15:01:21,960
VPN: start dynamic VPN negotiation for VOIPGATE2 (84.110.148.36) via ICMP/UDP
[VPN-Status] 2010/07/24 15:01:22,311 Devicetime: 2010/07/24 15:01:21,960
VPN: create dynamic VPN V2 authentication packet for VOIPGATE2 (84.110.148.36)
DNS: 192.168.4.201, 192.168.1.209
NBNS: 192.168.4.250, 192.168.4.201
polling address: 192.168.4.250
[VPN-Status] 2010/07/24 15:01:22,311 Devicetime: 2010/07/24 15:01:21,960
VPN: installing ruleset for VOIPGATE2 (84.110.148.36)
[VPN-Status] 2010/07/24 15:01:22,311 Devicetime: 2010/07/24 15:01:21,960
VPN: start IKE negotiation for VOIPGATE2 (84.110.148.36)
[VPN-Status] 2010/07/24 15:01:22,311 Devicetime: 2010/07/24 15:01:21,970
IKE info: Phase-1 negotiation started for peer VOIPGATE2 rule isakmp-peer-VOIPGATE2 using AGGRESSIVE mode
[VPN-Status] 2010/07/24 15:01:22,311 Devicetime: 2010/07/24 15:01:22,000
VPN: ruleset installed for VOIPGATE2 (84.110.148.36)
[VPN-Status] 2010/07/24 15:01:52,187 Devicetime: 2010/07/24 15:01:52,000
VPN: connection for VOIPGATE2 (84.110.148.36) timed out: no response
[VPN-Status] 2010/07/24 15:01:52,187 Devicetime: 2010/07/24 15:01:52,000
VPN: Error: IFC-I-Connection-timeout-IKE-IPSEC (0x1106) for VOIPGATE2 (84.110.148.36)
[VPN-Status] 2010/07/24 15:01:52,390 Devicetime: 2010/07/24 15:01:52,000
VPN: disconnecting VOIPGATE2 (84.110.148.36)
[VPN-Status] 2010/07/24 15:01:52,390 Devicetime: 2010/07/24 15:01:52,000
VPN: Error: IFC-I-Connection-timeout-IKE-IPSEC (0x1106) for VOIPGATE2 (84.110.148.36)
[VPN-Status] 2010/07/24 15:01:52,390 Devicetime: 2010/07/24 15:01:52,030
VPN: VOIPGATE2 (84.110.148.36) disconnected
[VPN-Status] 2010/07/24 15:01:52,390 Devicetime: 2010/07/24 15:01:52,060
selecting next remote gateway using strategy eFirst for VOIPGATE2
=> no remote gateway selected
[VPN-Status] 2010/07/24 15:01:52,390 Devicetime: 2010/07/24 15:01:52,060
selecting first remote gateway using strategy eFirst for VOIPGATE2
=> CurrIdx=0, IpStr=>84.110.148.36<, IpAddr=84.110.148.36, IpTtl=0s
[VPN-Status] 2010/07/24 15:01:52,390 Devicetime: 2010/07/24 15:01:52,060
VPN: installing ruleset for VOIPGATE2 (84.110.148.36)
[VPN-Status] 2010/07/24 15:01:53,265 Devicetime: 2010/07/24 15:01:53,060
VPN: connecting to VOIPGATE2 (84.110.148.36)
[VPN-Status] 2010/07/24 15:01:53,499 Devicetime: 2010/07/24 15:01:53,080
VPN: start dynamic VPN negotiation for VOIPGATE2 (84.110.148.36) via ICMP/UDP
[VPN-Status] 2010/07/24 15:01:53,499 Devicetime: 2010/07/24 15:01:53,080
VPN: create dynamic VPN V2 authentication packet for VOIPGATE2 (84.110.148.36)
DNS: 192.168.4.201, 192.168.1.209
NBNS: 192.168.4.250, 192.168.4.201
polling address: 192.168.4.250
[VPN-Status] 2010/07/24 15:01:53,499 Devicetime: 2010/07/24 15:01:53,080
VPN: installing ruleset for VOIPGATE2 (84.110.148.36)
[VPN-Status] 2010/07/24 15:01:53,499 Devicetime: 2010/07/24 15:01:53,080
VPN: start IKE negotiation for VOIPGATE2 (84.110.148.36)
[VPN-Status] 2010/07/24 15:01:53,499 Devicetime: 2010/07/24 15:01:53,080
IKE info: Phase-1 negotiation started for peer VOIPGATE2 rule isakmp-peer-VOIPGATE2 using AGGRESSIVE mode
[VPN-Status] 2010/07/24 15:01:53,499 Devicetime: 2010/07/24 15:01:53,120
VPN: ruleset installed for VOIPGATE2 (84.110.148.36)
[VPN-Status] 2010/07/24 15:02:23,313 Devicetime: 2010/07/24 15:02:23,120
VPN: connection for VOIPGATE2 (84.110.148.36) timed out: no response
[VPN-Status] 2010/07/24 15:02:23,313 Devicetime: 2010/07/24 15:02:23,120
VPN: Error: IFC-I-Connection-timeout-IKE-IPSEC (0x1106) for VOIPGATE2 (84.110.148.36)
[VPN-Status] 2010/07/24 15:02:23,469 Devicetime: 2010/07/24 15:02:23,120
VPN: disconnecting VOIPGATE2 (84.110.148.36)
[VPN-Status] 2010/07/24 15:02:23,469 Devicetime: 2010/07/24 15:02:23,120
VPN: Error: IFC-I-Connection-timeout-IKE-IPSEC (0x1106) for VOIPGATE2 (84.110.148.36)
[VPN-Status] 2010/07/24 15:02:23,469 Devicetime: 2010/07/24 15:02:23,150
VPN: VOIPGATE2 (84.110.148.36) disconnected
[VPN-Status] 2010/07/24 15:02:23,469 Devicetime: 2010/07/24 15:02:23,190
selecting next remote gateway using strategy eFirst for VOIPGATE2
=> no remote gateway selected
[VPN-Status] 2010/07/24 15:02:23,469 Devicetime: 2010/07/24 15:02:23,190
selecting first remote gateway using strategy eFirst for VOIPGATE2
=> CurrIdx=0, IpStr=>84.110.148.36<, IpAddr=84.110.148.36, IpTtl=0s
[VPN-Status] 2010/07/24 15:02:23,469 Devicetime: 2010/07/24 15:02:23,190
VPN: installing ruleset for VOIPGATE2 (84.110.148.36)
[VPN-Status] 2010/07/24 15:02:24,407 Devicetime: 2010/07/24 15:02:24,190
Mögliche Ursachen:
- Die Gateway-Adresse ist nicht korrekt.....
Habe die IP mehrfach kontrolliert, sie stimmt
- Die Gegenseite ist für diese Verbindung nicht konfiguriert, und kann die Verbindungsanfrage nicht zuordnen. Daher antwortet sie nicht.
Tja.. konfiguriert ist sie...
- Eine Firewall verhindert, das die Anfragepakete den LANCOM der Gegenseite erreichen.
Ne, da sollte nichts sein
Ich habe auf dem Bintec auch mal einen Trace gemacht:
Code: Alles auswählen
15:30:23 INFO/IPSEC: P1: peer 0 () sa 451 (R): delete ip 84.110.148.36 <- ip 84.87.2.154: Lifetime expired
15:30:30 DEBUG/IPSEC: P1: peer 0 () sa 500 (R): new ip 84.110.148.36 <- ip 84.87.2.154
15:30:30 DEBUG/IPSEC: P1: peer 1 (idefix) sa 500 (R): identified ip 84.110.148.36 <- ip 84.87.2.154
15:30:30 INFO/IPSEC: P1: peer 1 (idefix) sa 500 (R): failed ip 84.110.148.36 <- ip 84.87.2.154 (Invalid flags)
15:30:30 INFO/IPSEC: P1: peer 1 (idefix) sa 500 (R): delete ip 84.110.148.36 <- ip 84.87.2.154: Lifetime expired
15:30:33 DEBUG/INET: NAT: delete session on ifc 1100 prot 1 84.110.148.36:185/84.110.148.36:185 <-> 84.87.2.154:0
15:30:34 DEBUG/INET: NAT: new incoming session on ifc 1100 prot 1 84.110.148.36:189/84.110.148.36:189 <- 84.87.2.154:0
15:30:34 DEBUG/IPSEC: P1: peer 0 () sa 501 (R): new ip 84.110.148.36 <- ip 84.87.2.154
15:30:34 INFO/IPSEC: P1: peer 0 () sa 501 (R): Vendor ID: 84.87.2.154:500 (No Id) is 'eeefa37809e32ad4de4f6b010c26a640'
15:30:34 INFO/IPSEC: P1: peer 0 () sa 501 (R): Vendor ID: 84.87.2.154:500 (No Id) is 'draft-ietf-ipsec-nat-t-ike-02'
15:30:34 INFO/IPSEC: P1: peer 0 () sa 501 (R): Vendor ID: 84.87.2.154:500 (No Id) is 'draft-ietf-ipsec-nat-t-ike-03'
15:30:34 INFO/IPSEC: P1: peer 0 () sa 501 (R): Vendor ID: 84.87.2.154:500 (No Id) is '4a131c81070358455c5728f20e95452f'
15:30:34 INFO/IPSEC: P1: peer 0 () sa 501 (R): Vendor ID: 84.87.2.154:500 (No Id) is 'draft-ietf-ipsra-isakmp-xauth-06'
15:30:34 INFO/IPSEC: P1: peer 0 () sa 501 (R): Vendor ID: 84.87.2.154:500 (No Id) is 'Dead Peer Detection (DPD, RFC 3706
)'
15:30:34 DEBUG/IPSEC: SPD: dynamic peers not allowed
15:30:34 DEBUG/IPSEC: P1: peer 0 () sa 501 (R): ip 84.110.148.36 <- ip 84.87.2.154: no proposal
15:30:34 INFO/IPSEC: P1: peer 0 () sa 501 (R): failed ip 84.110.148.36 <- id fqdn(any:0,[0..9]=idefix.vpn) (No proposal
chosen)
15:30:34 DEBUG/IPSEC: P1: peer 0 () sa 502 (R): new ip 84.110.148.36 <- ip 84.87.2.154
15:30:34 DEBUG/IPSEC: P1: peer 1 (idefix) sa 502 (R): identified ip 84.110.148.36 <- ip 84.87.2.154
15:30:34 INFO/IPSEC: P1: peer 1 (idefix) sa 502 (R): failed ip 84.110.148.36 <- ip 84.87.2.154 (Invalid flags)
15:30:34 INFO/IPSEC: P1: peer 1 (idefix) sa 502 (R): delete ip 84.110.148.36 <- ip 84.87.2.154: Lifetime expired
15:30:42 DEBUG/IPSEC: P1: peer 0 () sa 503 (R): new ip 84.110.148.36 <- ip 84.87.2.154
15:30:42 DEBUG/IPSEC: P1: peer 1 (idefix) sa 503 (R): identified ip 84.110.148.36 <- ip 84.87.2.154
15:30:42 INFO/IPSEC: P1: peer 1 (idefix) sa 503 (R): failed ip 84.110.148.36 <- ip 84.87.2.154 (Invalid flags)
15:30:42 INFO/IPSEC: P1: peer 1 (idefix) sa 503 (R): delete ip 84.110.148.36 <- ip 84.87.2.154: Lifetime expired
15:30:51 DEBUG/IPSEC: P1: peer 0 () sa 504 (R): new ip 84.110.148.36 <- ip 84.87.2.154
15:30:51 DEBUG/IPSEC: P1: peer 1 (idefix) sa 504 (R): identified ip 84.110.148.36 <- ip 84.87.2.154
15:30:51 INFO/IPSEC: P1: peer 1 (idefix) sa 504 (R): failed ip 84.110.148.36 <- ip 84.87.2.154 (Invalid flags)
15:30:51 INFO/IPSEC: P1: peer 1 (idefix) sa 504 (R): delete ip 84.110.148.36 <- ip 84.87.2.154: Lifetime expired
15:30:54 INFO/IPSEC: P1: peer 0 () sa 456 (R): delete ip 84.110.148.36 <- ip 84.87.2.154: Lifetime expired
15:31:02 DEBUG/IPSEC: P1: peer 0 () sa 505 (R): new ip 84.110.148.36 <- ip 84.87.2.154
15:31:02 DEBUG/IPSEC: P1: peer 1 (idefix) sa 505 (R): identified ip 84.110.148.36 <- ip 84.87.2.154
15:31:02 INFO/IPSEC: P1: peer 1 (idefix) sa 505 (R): failed ip 84.110.148.36 <- ip 84.87.2.154 (Invalid flags)
15:31:02 INFO/IPSEC: P1: peer 1 (idefix) sa 505 (R): delete ip 84.110.148.36 <- ip 84.87.2.154: Lifetime expired
15:31:04 DEBUG/INET: NAT: delete session on ifc 1100 prot 1 84.110.148.36:186/84.110.148.36:186 <-> 84.87.2.154:0
15:31:06 DEBUG/INET: NAT: new incoming session on ifc 1100 prot 1 84.110.148.36:190/84.110.148.36:190 <- 84.87.2.154:0
15:31:06 DEBUG/IPSEC: P1: peer 0 () sa 506 (R): new ip 84.110.148.36 <- ip 84.87.2.154
15:31:06 INFO/IPSEC: P1: peer 0 () sa 506 (R): Vendor ID: 84.87.2.154:500 (No Id) is 'eeefa37809e32ad4de4f6b010c26a640'
15:31:06 INFO/IPSEC: P1: peer 0 () sa 506 (R): Vendor ID: 84.87.2.154:500 (No Id) is 'draft-ietf-ipsec-nat-t-ike-02'
15:31:06 INFO/IPSEC: P1: peer 0 () sa 506 (R): Vendor ID: 84.87.2.154:500 (No Id) is 'draft-ietf-ipsec-nat-t-ike-03'
15:31:06 INFO/IPSEC: P1: peer 0 () sa 506 (R): Vendor ID: 84.87.2.154:500 (No Id) is '4a131c81070358455c5728f20e95452f'
15:31:06 INFO/IPSEC: P1: peer 0 () sa 506 (R): Vendor ID: 84.87.2.154:500 (No Id) is 'draft-ietf-ipsra-isakmp-xauth-06'
15:31:06 INFO/IPSEC: P1: peer 0 () sa 506 (R): Vendor ID: 84.87.2.154:500 (No Id) is 'Dead Peer Detection (DPD, RFC 3706
)'
15:31:06 DEBUG/IPSEC: SPD: dynamic peers not allowed
15:31:06 DEBUG/IPSEC: P1: peer 0 () sa 506 (R): ip 84.110.148.36 <- ip 84.87.2.154: no proposal
15:31:06 INFO/IPSEC: P1: peer 0 () sa 506 (R): failed ip 84.110.148.36 <- id fqdn(any:0,[0..9]=idefix.vpn) (No proposal
chosen)
15:31:06 DEBUG/IPSEC: P1: peer 0 () sa 507 (R): new ip 84.110.148.36 <- ip 84.87.2.154
15:31:06 DEBUG/IPSEC: P1: peer 1 (idefix) sa 507 (R): identified ip 84.110.148.36 <- ip 84.87.2.154
15:31:06 INFO/IPSEC: P1: peer 1 (idefix) sa 507 (R): failed ip 84.110.148.36 <- ip 84.87.2.154 (Invalid flags)
15:31:06 INFO/IPSEC: P1: peer 1 (idefix) sa 507 (R): delete ip 84.110.148.36 <- ip 84.87.2.154: Lifetime expired
Vielen Dank!