Подключение к vpn

Обсуждение ПО и его настройки
Anton777
Сообщения: 9
Зарегистрирован: 02 дек 2019, 13:33

Помогите с настройкой подключения к vpn на роутере.
Имеется следующее: логин, пароль и ключ выданные для доступа к vpn сети, а так же инструкция для создания подключения в Windows. В общем то проблем при подключении не возникает на всех моих устройствах как на Windows, так и на Linux и Android. А вот на самом роутере ничего не выходит.
Что делал:
- создал L2TP клиента
- прописал логин, пароль, IPsec Secret
- установил протокол аутентификации mschap v.2 (по инструкции используется именно он)
- в profiles отредактировал default-encryption установив "use encryption=yes" (в инструкции так же указано что необходимо использовать шифрование)
Подключится при таких настройках не удается.
Пробовал в IPsec Proposal отредактировать дефолтный профиль изменив значение PFS group на "none". И это не принесло результата.
Подскажите что я мог упустить?


Anton777
Сообщения: 9
Зарегистрирован: 02 дек 2019, 13:33

Забыл уточнить, что все правила файрвола отключены


easyman
Сообщения: 108
Зарегистрирован: 19 окт 2018, 13:44

Что в логе?


Anton777
Сообщения: 9
Зарегистрирован: 02 дек 2019, 13:33

В логах следующее:

Код: Выделить всё

10:02:51 l2tp,ppp,info debug: vpn: initializing... 
10:02:51 l2tp,ppp,info debug: vpn: connecting... 
10:02:51 l2tp,debug debug: tunnel 16 entering state: wait-ctl-reply 
10:02:51 l2tp,debug,packet debug: sent control message to yyy.yyy.yyy.yyy:1701 from 
0.0.0.0:1701 
10:02:51 l2tp,debug,packet debug:     tunnel-id=0, session-id=0, ns=0, nr=0 
10:02:51 l2tp,debug,packet debug:     (M) Message-Type=SCCRQ 
10:02:51 l2tp,debug,packet debug:     (M) Protocol-Version=0x01:00 
10:02:51 l2tp,debug,packet debug:     (M) Framing-Capabilities=0x1 
10:02:51 l2tp,debug,packet debug:     (M) Bearer-Capabilities=0x0 
10:02:51 l2tp,debug,packet debug:     Firmware-Revision=0x1 
10:02:51 l2tp,debug,packet debug:     (M) Host-Name="MikroTik" 
10:02:51 l2tp,debug,packet debug:     Vendor-Name="MikroTik" 
10:02:51 l2tp,debug,packet debug:     (M) Assigned-Tunnel-ID=16 
10:02:51 l2tp,debug,packet debug:     (M) Receive-Window-Size=4 
10:02:51 ipsec debug: acquire for policy: xxx.xxx.xxx.xxx:1701 <=> yyy.yyy.yyy.yyy:1
701 ip-proto:17 
10:02:51 ipsec debug: peer is IKEv1 
10:02:51 ipsec,debug debug:  (proto_id=ESP spisize=4 spi=00000000 spi_p=00000000 e
ncmode=Transport reqid=0:0) 
10:02:51 ipsec,debug debug:   (trns_id=AES-CBC encklen=256 authtype=hmac-sha1) 
10:02:51 ipsec,debug debug:   (trns_id=AES-CTR encklen=256 authtype=hmac-sha1) 
10:02:51 ipsec,debug debug:   (trns_id=AES-CTR encklen=288 authtype=hmac-sha1) 
10:02:51 ipsec,debug debug:   (trns_id=AES-GCM-ICV16 encklen=256 authtype=254) 
10:02:51 ipsec,debug debug:   (trns_id=AES-GCM-ICV16 encklen=288 authtype=254) 
10:02:51 ipsec,debug debug:   (trns_id=AES-CBC encklen=192 authtype=hmac-sha1) 
10:02:51 ipsec,debug debug:   (trns_id=AES-CTR encklen=192 authtype=hmac-sha1) 
10:02:51 ipsec,debug debug:   (trns_id=AES-CTR encklen=224 authtype=hmac-sha1) 
10:02:51 ipsec,debug debug:   (trns_id=AES-GCM-ICV16 encklen=192 authtype=254) 
10:02:51 ipsec,debug debug:   (trns_id=AES-GCM-ICV16 encklen=224 authtype=254) 
10:02:51 ipsec,debug debug:   (trns_id=AES-CBC encklen=128 authtype=hmac-sha1) 
10:02:51 ipsec,debug debug:   (trns_id=AES-CTR encklen=128 authtype=hmac-sha1) 
10:02:51 ipsec,debug debug:   (trns_id=AES-CTR encklen=160 authtype=hmac-sha1) 
10:02:51 ipsec,debug debug:   (trns_id=AES-GCM-ICV16 encklen=128 authtype=254) 
10:02:51 ipsec,debug debug:   (trns_id=AES-GCM-ICV16 encklen=160 authtype=254) 
10:02:51 ipsec,debug debug:   (trns_id=3DES encklen=0 authtype=hmac-sha1) 
10:02:51 ipsec debug: IPsec-SA request for yyy.yyy.yyy.yyy queued due to no phase1 f
ound. 
10:02:51 ipsec,debug debug: === 
10:02:51 ipsec,info debug: initiate new phase 1 (Identity Protection): xxx.xxx.xxx.xxx[500]<=>yyy.yyy.yyy.yyy[500] 
10:02:51 ipsec,debug debug: new cookie: 
10:02:51 ipsec,debug debug: e6ac4b4a04136ddd 
10:02:51 ipsec,debug debug: add payload of len 168, next type 13 
10:02:51 ipsec,debug debug: add payload of len 16, next type 13 
10:02:51 ipsec,debug debug: add payload of len 16, next type 13 
10:02:51 ipsec,debug debug: add payload of len 16, next type 13 
10:02:51 ipsec,debug debug: add payload of len 16, next type 13 
10:02:51 ipsec,debug debug: add payload of len 16, next type 13 
10:02:51 ipsec,debug debug: add payload of len 16, next type 13 
10:02:51 ipsec,debug debug: add payload of len 16, next type 13 
10:02:51 ipsec,debug debug: add payload of len 16, next type 13 
10:02:51 ipsec,debug debug: add payload of len 16, next type 13 
10:02:51 ipsec,debug debug: add payload of len 16, next type 13 
10:02:51 ipsec,debug debug: add payload of len 16, next type 13 
10:02:51 ipsec,debug debug: add payload of len 16, next type 13 
10:02:51 ipsec,debug debug: add payload of len 16, next type 0 
10:02:51 ipsec,debug debug: 460 bytes from xxx.xxx.xxx.xxx[500] to yyy.yyy.yyy.yyy[5
00] 
10:02:51 ipsec,debug debug: 1 times of 460 bytes message will be sent to yyy.yyy.yyy.yyy[500] 
10:02:51 ipsec,debug,packet debug: e6ac4b4a 04136ddd 00000000 00000000 01100200 00
000000 000001cc 0d0000ac 
10:02:51 ipsec,debug,packet debug: 00000001 00000001 000000a0 01010004 03000028 01
010000 800b0001 000c0004 
10:02:51 ipsec,debug,packet debug: 00015180 80010007 800e0080 80030001 80020002 80
04000e 03000028 02010000 
10:02:51 ipsec,debug,packet debug: 800b0001 000c0004 00015180 80010007 800e0080 80
030001 80020002 80040002 
10:02:51 ipsec,debug,packet debug: 03000024 03010000 800b0001 000c0004 00015180 80
010005 80030001 80020002 
10:02:51 ipsec,debug,packet debug: 8004000e 00000024 04010000 800b0001 000c0004 00
015180 80010005 80030001 
10:02:51 ipsec,debug,packet debug: 80020002 80040002 0d000014 4a131c81 07035845 5c
5728f2 0e95452f 0d000014 
10:02:51 ipsec,debug,packet debug: 8f8d8382 6d246b6f c7a8a6a4 28c11de8 0d000014 43
9b59f8 ba676c4c 7737ae22 
10:02:51 ipsec,debug,packet debug: eab8f582 0d000014 4d1e0e13 6deafa34 c4f3ea9f 02
ec7285 0d000014 80d0bb3d 
10:02:51 ipsec,debug,packet debug: ef54565e e84645d4 c85ce3ee 0d000014 9909b64e ed
937c65 73de52ac e952fa6b 
10:02:51 ipsec,debug,packet debug: 0d000014 7d9419a6 5310ca6f 2c179d92 15529d56 0d
000014 cd604643 35df21f8 
10:02:51 ipsec,debug,packet debug: 7cfdb2fc 68b6a448 0d000014 90cb8091 3ebb696e 08
6381b5 ec427b1f 0d000014 
10:02:51 ipsec,debug,packet debug: 16f6ca16 e4a4066d 83821a0f 0aeaa862 0d000014 44
85152d 18b6bbcd 0be8a846 
10:02:51 ipsec,debug,packet debug: 9579ddcc 0d000014 12f5f28c 457168a9 702d9fe2 74
cc0100 00000014 afcad713 
10:02:51 ipsec,debug,packet debug: 68a1f1c9 6b8696fc 77570100 
10:02:51 ipsec debug: sent phase1 packet xxx.xxx.xxx.xxx[500]<=>yyy.yyy.yyy.yyy[500]
 e6ac4b4a04136ddd:0000000000000000 
10:02:52 l2tp,debug,packet debug: sent control message to yyy.yyy.yyy.yyy:1701 from 
0.0.0.0:1701 
10:02:52 l2tp,debug,packet debug:     tunnel-id=0, session-id=0, ns=0, nr=0 
10:02:52 l2tp,debug,packet debug:     (M) Message-Type=SCCRQ 
10:02:52 l2tp,debug,packet debug:     (M) Protocol-Version=0x01:00 
10:02:52 l2tp,debug,packet debug:     (M) Framing-Capabilities=0x1 
10:02:52 l2tp,debug,packet debug:     (M) Bearer-Capabilities=0x0 
10:02:52 l2tp,debug,packet debug:     Firmware-Revision=0x1 
10:02:52 l2tp,debug,packet debug:     (M) Host-Name="MikroTik" 
10:02:52 l2tp,debug,packet debug:     Vendor-Name="MikroTik" 
10:02:52 l2tp,debug,packet debug:     (M) Assigned-Tunnel-ID=16 
10:02:52 l2tp,debug,packet debug:     (M) Receive-Window-Size=4 
10:02:53 l2tp,debug,packet debug: sent control message to yyy.yyy.yyy.yyy:1701 from 
0.0.0.0:1701 
10:02:53 l2tp,debug,packet debug:     tunnel-id=0, session-id=0, ns=0, nr=0 
10:02:53 l2tp,debug,packet debug:     (M) Message-Type=SCCRQ 
10:02:53 l2tp,debug,packet debug:     (M) Protocol-Version=0x01:00 
10:02:53 l2tp,debug,packet debug:     (M) Framing-Capabilities=0x1 
10:02:53 l2tp,debug,packet debug:     (M) Bearer-Capabilities=0x0 
10:02:53 l2tp,debug,packet debug:     Firmware-Revision=0x1 
10:02:53 l2tp,debug,packet debug:     (M) Host-Name="MikroTik" 
10:02:53 l2tp,debug,packet debug:     Vendor-Name="MikroTik" 
10:02:53 l2tp,debug,packet debug:     (M) Assigned-Tunnel-ID=16 
10:02:53 l2tp,debug,packet debug:     (M) Receive-Window-Size=4 
10:02:55 l2tp,debug,packet debug: sent control message to yyy.yyy.yyy.yyy:1701 from 
0.0.0.0:1701 
10:02:55 l2tp,debug,packet debug:     tunnel-id=0, session-id=0, ns=0, nr=0 
10:02:55 l2tp,debug,packet debug:     (M) Message-Type=SCCRQ 
10:02:55 l2tp,debug,packet debug:     (M) Protocol-Version=0x01:00 
10:02:55 l2tp,debug,packet debug:     (M) Framing-Capabilities=0x1 
10:02:55 l2tp,debug,packet debug:     (M) Bearer-Capabilities=0x0 
10:02:55 l2tp,debug,packet debug:     Firmware-Revision=0x1 
10:02:55 l2tp,debug,packet debug:     (M) Host-Name="MikroTik" 
10:02:55 l2tp,debug,packet debug:     Vendor-Name="MikroTik" 
10:02:55 l2tp,debug,packet debug:     (M) Assigned-Tunnel-ID=16 
10:02:55 l2tp,debug,packet debug:     (M) Receive-Window-Size=4 
10:02:59 l2tp,debug,packet debug: sent control message to yyy.yyy.yyy.yyy:1701 from 
0.0.0.0:1701 
10:02:59 l2tp,debug,packet debug:     tunnel-id=0, session-id=0, ns=0, nr=0 
10:02:59 l2tp,debug,packet debug:     (M) Message-Type=SCCRQ 
10:02:59 l2tp,debug,packet debug:     (M) Protocol-Version=0x01:00 
10:02:59 l2tp,debug,packet debug:     (M) Framing-Capabilities=0x1 
10:02:59 l2tp,debug,packet debug:     (M) Bearer-Capabilities=0x0 
10:02:59 l2tp,debug,packet debug:     Firmware-Revision=0x1 
10:02:59 l2tp,debug,packet debug:     (M) Host-Name="MikroTik" 
10:02:59 l2tp,debug,packet debug:     Vendor-Name="MikroTik" 
10:02:59 l2tp,debug,packet debug:     (M) Assigned-Tunnel-ID=16 
10:02:59 l2tp,debug,packet debug:     (M) Receive-Window-Size=4 
10:03:01 ipsec,debug debug: 460 bytes from xxx.xxx.xxx.xxx[500] to yyy.yyy.yyy.yyy[5
00] 
10:03:01 ipsec,debug debug: 1 times of 460 bytes message will be sent to yyy.yyy.yyy.yyy[500] 
10:03:01 ipsec,debug,packet debug: e6ac4b4a 04136ddd 00000000 00000000 01100200 00
000000 000001cc 0d0000ac 
10:03:01 ipsec,debug,packet debug: 00000001 00000001 000000a0 01010004 03000028 01
010000 800b0001 000c0004 
10:03:01 ipsec,debug,packet debug: 00015180 80010007 800e0080 80030001 80020002 80
04000e 03000028 02010000 
10:03:01 ipsec,debug,packet debug: 800b0001 000c0004 00015180 80010007 800e0080 80
030001 80020002 80040002 
10:03:01 ipsec,debug,packet debug: 03000024 03010000 800b0001 000c0004 00015180 80
010005 80030001 80020002 
10:03:01 ipsec,debug,packet debug: 8004000e 00000024 04010000 800b0001 000c0004 00
015180 80010005 80030001 
10:03:01 ipsec,debug,packet debug: 80020002 80040002 0d000014 4a131c81 07035845 5c
5728f2 0e95452f 0d000014 
10:03:01 ipsec,debug,packet debug: 8f8d8382 6d246b6f c7a8a6a4 28c11de8 0d000014 43
9b59f8 ba676c4c 7737ae22 
10:03:01 ipsec,debug,packet debug: eab8f582 0d000014 4d1e0e13 6deafa34 c4f3ea9f 02
ec7285 0d000014 80d0bb3d 
10:03:01 ipsec,debug,packet debug: ef54565e e84645d4 c85ce3ee 0d000014 9909b64e ed
937c65 73de52ac e952fa6b 
10:03:01 ipsec,debug,packet debug: 0d000014 7d9419a6 5310ca6f 2c179d92 15529d56 0d
000014 cd604643 35df21f8 
10:03:01 ipsec,debug,packet debug: 7cfdb2fc 68b6a448 0d000014 90cb8091 3ebb696e 08
6381b5 ec427b1f 0d000014 
10:03:01 ipsec,debug,packet debug: 16f6ca16 e4a4066d 83821a0f 0aeaa862 0d000014 44
85152d 18b6bbcd 0be8a846 
10:03:01 ipsec,debug,packet debug: 9579ddcc 0d000014 12f5f28c 457168a9 702d9fe2 74
cc0100 00000014 afcad713 
10:03:01 ipsec,debug,packet debug: 68a1f1c9 6b8696fc 77570100 
10:03:01 ipsec debug: resent phase1 packet xxx.xxx.xxx.xxx[500]<=>yyy.yyy.yyy.yyy[50
0] e6ac4b4a04136ddd:0000000000000000 
10:03:07 l2tp,debug,packet debug: sent control message to yyy.yyy.yyy.yyy:1701 from 
0.0.0.0:1701 
10:03:07 l2tp,debug,packet debug:     tunnel-id=0, session-id=0, ns=0, nr=0 
10:03:07 l2tp,debug,packet debug:     (M) Message-Type=SCCRQ 
10:03:07 l2tp,debug,packet debug:     (M) Protocol-Version=0x01:00 
10:03:07 l2tp,debug,packet debug:     (M) Framing-Capabilities=0x1 
10:03:07 l2tp,debug,packet debug:     (M) Bearer-Capabilities=0x0 
10:03:07 l2tp,debug,packet debug:     Firmware-Revision=0x1 
10:03:07 l2tp,debug,packet debug:     (M) Host-Name="MikroTik" 
10:03:07 l2tp,debug,packet debug:     Vendor-Name="MikroTik" 
10:03:07 l2tp,debug,packet debug:     (M) Assigned-Tunnel-ID=16 
10:03:07 l2tp,debug,packet debug:     (M) Receive-Window-Size=4 
10:03:11 ipsec,debug debug: 460 bytes from xxx.xxx.xxx.xxx[500] to yyy.yyy.yyy.yyy[5
00] 
10:03:11 ipsec,debug debug: 1 times of 460 bytes message will be sent to yyy.yyy.yyy.yyy[500] 
10:03:11 ipsec,debug,packet debug: e6ac4b4a 04136ddd 00000000 00000000 01100200 00
000000 000001cc 0d0000ac 
10:03:11 ipsec,debug,packet debug: 00000001 00000001 000000a0 01010004 03000028 01
010000 800b0001 000c0004 
10:03:11 ipsec,debug,packet debug: 00015180 80010007 800e0080 80030001 80020002 80
04000e 03000028 02010000 
10:03:11 ipsec,debug,packet debug: 800b0001 000c0004 00015180 80010007 800e0080 80
030001 80020002 80040002 
10:03:11 ipsec,debug,packet debug: 03000024 03010000 800b0001 000c0004 00015180 80
010005 80030001 80020002 
10:03:11 ipsec,debug,packet debug: 8004000e 00000024 04010000 800b0001 000c0004 00
015180 80010005 80030001 
10:03:11 ipsec,debug,packet debug: 80020002 80040002 0d000014 4a131c81 07035845 5c
5728f2 0e95452f 0d000014 
10:03:11 ipsec,debug,packet debug: 8f8d8382 6d246b6f c7a8a6a4 28c11de8 0d000014 43
9b59f8 ba676c4c 7737ae22 
10:03:11 ipsec,debug,packet debug: eab8f582 0d000014 4d1e0e13 6deafa34 c4f3ea9f 02
ec7285 0d000014 80d0bb3d 
10:03:11 ipsec,debug,packet debug: ef54565e e84645d4 c85ce3ee 0d000014 9909b64e ed
937c65 73de52ac e952fa6b 
10:03:11 ipsec,debug,packet debug: 0d000014 7d9419a6 5310ca6f 2c179d92 15529d56 0d
000014 cd604643 35df21f8 
10:03:11 ipsec,debug,packet debug: 7cfdb2fc 68b6a448 0d000014 90cb8091 3ebb696e 08
6381b5 ec427b1f 0d000014 
10:03:11 ipsec,debug,packet debug: 16f6ca16 e4a4066d 83821a0f 0aeaa862 0d000014 44
85152d 18b6bbcd 0be8a846 
10:03:11 ipsec,debug,packet debug: 9579ddcc 0d000014 12f5f28c 457168a9 702d9fe2 74
cc0100 00000014 afcad713 
10:03:11 ipsec,debug,packet debug: 68a1f1c9 6b8696fc 77570100 
10:03:11 ipsec debug: resent phase1 packet xxx.xxx.xxx.xxx[500]<=>yyy.yyy.yyy.yyy[50
0] e6ac4b4a04136ddd:0000000000000000 
10:03:15 l2tp,debug debug: tunnel 16 received no replies, disconnecting 
10:03:15 l2tp,debug debug: tunnel 16 entering state: dead 
10:03:15 l2tp,debug debug: session 1 entering state: dead 
10:03:15 l2tp,ppp,debug debug: vpn: CCP close 
10:03:15 l2tp,ppp,debug debug: vpn: BCP close 
10:03:15 l2tp,ppp,debug debug: vpn: IPCP close 
10:03:15 l2tp,ppp,debug debug: vpn: IPV6CP close 
10:03:15 l2tp,ppp,debug debug: vpn: MPLSCP close 
10:03:15 l2tp,ppp,info debug: vpn: terminating... - session closed 
10:03:15 l2tp,ppp,debug debug: vpn: LCP lowerdown 
10:03:15 l2tp,ppp,debug debug: vpn: LCP down event in initial state 
10:03:15 l2tp,ppp,info debug: vpn: disconnected 
10:03:15 l2tp,ppp,info debug: vpn: initializing... 
10:03:15 l2tp,ppp,info debug: vpn: connecting... 
10:03:15 l2tp,debug debug: tunnel 17 entering state: wait-ctl-reply 
10:03:15 l2tp,debug,packet debug: sent control message to yyy.yyy.yyy.yyy:1701 from 
0.0.0.0:1701 
10:03:15 l2tp,debug,packet debug:     tunnel-id=0, session-id=0, ns=0, nr=0 
10:03:15 l2tp,debug,packet debug:     (M) Message-Type=SCCRQ 
10:03:15 l2tp,debug,packet debug:     (M) Protocol-Version=0x01:00 
10:03:15 l2tp,debug,packet debug:     (M) Framing-Capabilities=0x1 
10:03:15 l2tp,debug,packet debug:     (M) Bearer-Capabilities=0x0 
10:03:15 l2tp,debug,packet debug:     Firmware-Revision=0x1 
10:03:15 l2tp,debug,packet debug:     (M) Host-Name="MikroTik" 
10:03:15 l2tp,debug,packet debug:     Vendor-Name="MikroTik" 
10:03:15 l2tp,debug,packet debug:     (M) Assigned-Tunnel-ID=17 
10:03:15 l2tp,debug,packet debug:     (M) Receive-Window-Size=4 
10:03:16 l2tp,debug,packet debug: sent control message to yyy.yyy.yyy.yyy:1701 from 
0.0.0.0:1701 
10:03:16 l2tp,debug,packet debug:     tunnel-id=0, session-id=0, ns=0, nr=0 
10:03:16 l2tp,debug,packet debug:     (M) Message-Type=SCCRQ 
10:03:16 l2tp,debug,packet debug:     (M) Protocol-Version=0x01:00 
10:03:16 l2tp,debug,packet debug:     (M) Framing-Capabilities=0x1 
10:03:16 l2tp,debug,packet debug:     (M) Bearer-Capabilities=0x0 
10:03:16 l2tp,debug,packet debug:     Firmware-Revision=0x1 
10:03:16 l2tp,debug,packet debug:     (M) Host-Name="MikroTik" 
10:03:16 l2tp,debug,packet debug:     Vendor-Name="MikroTik" 
10:03:16 l2tp,debug,packet debug:     (M) Assigned-Tunnel-ID=17 
10:03:16 l2tp,debug,packet debug:     (M) Receive-Window-Size=4 
10:03:17 l2tp,debug,packet debug: sent control message to yyy.yyy.yyy.yyy:1701 from 
0.0.0.0:1701 
10:03:17 l2tp,debug,packet debug:     tunnel-id=0, session-id=0, ns=0, nr=0 
10:03:17 l2tp,debug,packet debug:     (M) Message-Type=SCCRQ 
10:03:17 l2tp,debug,packet debug:     (M) Protocol-Version=0x01:00 
10:03:17 l2tp,debug,packet debug:     (M) Framing-Capabilities=0x1 
10:03:17 l2tp,debug,packet debug:     (M) Bearer-Capabilities=0x0 
10:03:17 l2tp,debug,packet debug:     Firmware-Revision=0x1 
10:03:17 l2tp,debug,packet debug:     (M) Host-Name="MikroTik" 
10:03:17 l2tp,debug,packet debug:     Vendor-Name="MikroTik" 
10:03:17 l2tp,debug,packet debug:     (M) Assigned-Tunnel-ID=17 
10:03:17 l2tp,debug,packet debug:     (M) Receive-Window-Size=4 
10:03:19 l2tp,debug,packet debug: sent control message to yyy.yyy.yyy.yyy:1701 from 
0.0.0.0:1701 
10:03:19 l2tp,debug,packet debug:     tunnel-id=0, session-id=0, ns=0, nr=0 
10:03:19 l2tp,debug,packet debug:     (M) Message-Type=SCCRQ 
10:03:19 l2tp,debug,packet debug:     (M) Protocol-Version=0x01:00 
10:03:19 l2tp,debug,packet debug:     (M) Framing-Capabilities=0x1 
10:03:19 l2tp,debug,packet debug:     (M) Bearer-Capabilities=0x0 
10:03:19 l2tp,debug,packet debug:     Firmware-Revision=0x1 
10:03:19 l2tp,debug,packet debug:     (M) Host-Name="MikroTik" 
10:03:19 l2tp,debug,packet debug:     Vendor-Name="MikroTik" 
10:03:19 l2tp,debug,packet debug:     (M) Assigned-Tunnel-ID=17 
10:03:19 l2tp,debug,packet debug:     (M) Receive-Window-Size=4 
10:03:21 ipsec,debug debug: 460 bytes from xxx.xxx.xxx.xxx[500] to yyy.yyy.yyy.yyy[5
00] 
10:03:21 ipsec,debug debug: 1 times of 460 bytes message will be sent to yyy.yyy.yyy.yyy[500] 
10:03:21 ipsec,debug,packet debug: e6ac4b4a 04136ddd 00000000 00000000 01100200 00
000000 000001cc 0d0000ac 
10:03:21 ipsec,debug,packet debug: 00000001 00000001 000000a0 01010004 03000028 01
010000 800b0001 000c0004 
10:03:21 ipsec,debug,packet debug: 00015180 80010007 800e0080 80030001 80020002 80
04000e 03000028 02010000 
10:03:21 ipsec,debug,packet debug: 800b0001 000c0004 00015180 80010007 800e0080 80
030001 80020002 80040002 
10:03:21 ipsec,debug,packet debug: 03000024 03010000 800b0001 000c0004 00015180 80
010005 80030001 80020002 
10:03:21 ipsec,debug,packet debug: 8004000e 00000024 04010000 800b0001 000c0004 00
015180 80010005 80030001 
10:03:21 ipsec,debug,packet debug: 80020002 80040002 0d000014 4a131c81 07035845 5c
5728f2 0e95452f 0d000014 
10:03:21 ipsec,debug,packet debug: 8f8d8382 6d246b6f c7a8a6a4 28c11de8 0d000014 43
9b59f8 ba676c4c 7737ae22 
10:03:21 ipsec,debug,packet debug: eab8f582 0d000014 4d1e0e13 6deafa34 c4f3ea9f 02
ec7285 0d000014 80d0bb3d 
10:03:21 ipsec,debug,packet debug: ef54565e e84645d4 c85ce3ee 0d000014 9909b64e ed
937c65 73de52ac e952fa6b 
10:03:21 ipsec,debug,packet debug: 0d000014 7d9419a6 5310ca6f 2c179d92 15529d56 0d
000014 cd604643 35df21f8 
10:03:21 ipsec,debug,packet debug: 7cfdb2fc 68b6a448 0d000014 90cb8091 3ebb696e 08
6381b5 ec427b1f 0d000014 
10:03:21 ipsec,debug,packet debug: 16f6ca16 e4a4066d 83821a0f 0aeaa862 0d000014 44
85152d 18b6bbcd 0be8a846 
10:03:21 ipsec,debug,packet debug: 9579ddcc 0d000014 12f5f28c 457168a9 702d9fe2 74
cc0100 00000014 afcad713 
10:03:21 ipsec,debug,packet debug: 68a1f1c9 6b8696fc 77570100 
10:03:21 ipsec debug: resent phase1 packet xxx.xxx.xxx.xxx[500]<=>yyy.yyy.yyy.yyy[50
0] e6ac4b4a04136ddd:0000000000000000 
10:03:22 ipsec debug: yyy.yyy.yyy.yyy phase2 negotiation failed due to time up waiti
ng for phase1. AH yyy.yyy.yyy.yyy[0]->xxx.xxx.xxx.xxx[0]  
10:03:22 ipsec debug: delete phase 2 handler. 
10:03:23 l2tp,debug,packet debug: sent control message to yyy.yyy.yyy.yyy:1701 from 
0.0.0.0:1701 
10:03:23 l2tp,debug,packet debug:     tunnel-id=0, session-id=0, ns=0, nr=0 
10:03:23 l2tp,debug,packet debug:     (M) Message-Type=SCCRQ 
10:03:23 l2tp,debug,packet debug:     (M) Protocol-Version=0x01:00 
10:03:23 l2tp,debug,packet debug:     (M) Framing-Capabilities=0x1 
10:03:23 l2tp,debug,packet debug:     (M) Bearer-Capabilities=0x0 
10:03:23 l2tp,debug,packet debug:     Firmware-Revision=0x1 
10:03:23 l2tp,debug,packet debug:     (M) Host-Name="MikroTik" 
10:03:23 l2tp,debug,packet debug:     Vendor-Name="MikroTik" 
10:03:23 l2tp,debug,packet debug:     (M) Assigned-Tunnel-ID=17 
10:03:23 l2tp,debug,packet debug:     (M) Receive-Window-Size=4 
10:03:23 ipsec debug: acquire for policy: xxx.xxx.xxx.xxx:1701 <=> yyy.yyy.yyy.yyy:1
701 ip-proto:17 
10:03:23 ipsec,debug debug:  (proto_id=ESP spisize=4 spi=00000000 spi_p=00000000 e
ncmode=Transport reqid=0:0) 
10:03:23 ipsec,debug debug:   (trns_id=AES-CBC encklen=256 authtype=hmac-sha1) 
10:03:23 ipsec,debug debug:   (trns_id=AES-CTR encklen=256 authtype=hmac-sha1) 
10:03:23 ipsec,debug debug:   (trns_id=AES-CTR encklen=288 authtype=hmac-sha1) 
10:03:23 ipsec,debug debug:   (trns_id=AES-GCM-ICV16 encklen=256 authtype=254) 
10:03:23 ipsec,debug debug:   (trns_id=AES-GCM-ICV16 encklen=288 authtype=254) 
10:03:23 ipsec,debug debug:   (trns_id=AES-CBC encklen=192 authtype=hmac-sha1) 
10:03:23 ipsec,debug debug:   (trns_id=AES-CTR encklen=192 authtype=hmac-sha1) 
10:03:23 ipsec,debug debug:   (trns_id=AES-CTR encklen=224 authtype=hmac-sha1) 
10:03:23 ipsec,debug debug:   (trns_id=AES-GCM-ICV16 encklen=192 authtype=254) 
10:03:23 ipsec,debug debug:   (trns_id=AES-GCM-ICV16 encklen=224 authtype=254) 
10:03:23 ipsec,debug debug:   (trns_id=AES-CBC encklen=128 authtype=hmac-sha1) 
10:03:23 ipsec,debug debug:   (trns_id=AES-CTR encklen=128 authtype=hmac-sha1) 
10:03:23 ipsec,debug debug:   (trns_id=AES-CTR encklen=160 authtype=hmac-sha1) 
10:03:23 ipsec,debug debug:   (trns_id=AES-GCM-ICV16 encklen=128 authtype=254) 
10:03:23 ipsec,debug debug:   (trns_id=AES-GCM-ICV16 encklen=160 authtype=254) 
10:03:23 ipsec,debug debug:   (trns_id=3DES encklen=0 authtype=hmac-sha1) 
10:03:23 ipsec debug: yyy.yyy.yyy.yyy request for establishing IPsec-SA was queued d
ue to no phase1 found. 
10:03:31 l2tp,debug,packet debug: sent control message to yyy.yyy.yyy.yyy:1701 from 
0.0.0.0:1701 
10:03:31 l2tp,debug,packet debug:     tunnel-id=0, session-id=0, ns=0, nr=0 
10:03:31 l2tp,debug,packet debug:     (M) Message-Type=SCCRQ 
10:03:31 l2tp,debug,packet debug:     (M) Protocol-Version=0x01:00 
10:03:31 l2tp,debug,packet debug:     (M) Framing-Capabilities=0x1 
10:03:31 l2tp,debug,packet debug:     (M) Bearer-Capabilities=0x0 
10:03:31 l2tp,debug,packet debug:     Firmware-Revision=0x1 
10:03:31 l2tp,debug,packet debug:     (M) Host-Name="MikroTik" 
10:03:31 l2tp,debug,packet debug:     Vendor-Name="MikroTik" 
10:03:31 l2tp,debug,packet debug:     (M) Assigned-Tunnel-ID=17 
10:03:31 l2tp,debug,packet debug:     (M) Receive-Window-Size=4 
10:03:31 ipsec,debug debug: 460 bytes from xxx.xxx.xxx.xxx[500] to yyy.yyy.yyy.yyy[5
00] 
10:03:31 ipsec,debug debug: 1 times of 460 bytes message will be sent to yyy.yyy.yyy.yyy[500] 
10:03:31 ipsec,debug,packet debug: e6ac4b4a 04136ddd 00000000 00000000 01100200 00
000000 000001cc 0d0000ac 
10:03:31 ipsec,debug,packet debug: 00000001 00000001 000000a0 01010004 03000028 01
010000 800b0001 000c0004 
10:03:31 ipsec,debug,packet debug: 00015180 80010007 800e0080 80030001 80020002 80
04000e 03000028 02010000 
10:03:31 ipsec,debug,packet debug: 800b0001 000c0004 00015180 80010007 800e0080 80
030001 80020002 80040002 
10:03:31 ipsec,debug,packet debug: 03000024 03010000 800b0001 000c0004 00015180 80
010005 80030001 80020002 
10:03:31 ipsec,debug,packet debug: 8004000e 00000024 04010000 800b0001 000c0004 00
015180 80010005 80030001 
10:03:31 ipsec,debug,packet debug: 80020002 80040002 0d000014 4a131c81 07035845 5c
5728f2 0e95452f 0d000014 
10:03:31 ipsec,debug,packet debug: 8f8d8382 6d246b6f c7a8a6a4 28c11de8 0d000014 43
9b59f8 ba676c4c 7737ae22 
10:03:31 ipsec,debug,packet debug: eab8f582 0d000014 4d1e0e13 6deafa34 c4f3ea9f 02
ec7285 0d000014 80d0bb3d 
10:03:31 ipsec,debug,packet debug: ef54565e e84645d4 c85ce3ee 0d000014 9909b64e ed
937c65 73de52ac e952fa6b 
10:03:31 ipsec,debug,packet debug: 0d000014 7d9419a6 5310ca6f 2c179d92 15529d56 0d
000014 cd604643 35df21f8 
10:03:31 ipsec,debug,packet debug: 7cfdb2fc 68b6a448 0d000014 90cb8091 3ebb696e 08
6381b5 ec427b1f 0d000014 
10:03:31 ipsec,debug,packet debug: 16f6ca16 e4a4066d 83821a0f 0aeaa862 0d000014 44
85152d 18b6bbcd 0be8a846 
10:03:31 ipsec,debug,packet debug: 9579ddcc 0d000014 12f5f28c 457168a9 702d9fe2 74
cc0100 00000014 afcad713 
10:03:31 ipsec,debug,packet debug: 68a1f1c9 6b8696fc 77570100 
10:03:31 ipsec debug: resent phase1 packet xxx.xxx.xxx.xxx[500]<=>yyy.yyy.yyy.yyy[50
0] e6ac4b4a04136ddd:0000000000000000 
10:03:39 l2tp,debug debug: tunnel 17 received no replies, disconnecting 
10:03:39 l2tp,debug debug: tunnel 17 entering state: dead 
10:03:39 l2tp,debug debug: session 1 entering state: dead 
10:03:39 l2tp,ppp,debug debug: vpn: CCP close 
10:03:39 l2tp,ppp,debug debug: vpn: BCP close 
10:03:39 l2tp,ppp,debug debug: vpn: IPCP close 
10:03:39 l2tp,ppp,debug debug: vpn: IPV6CP close 
10:03:39 l2tp,ppp,debug debug: vpn: MPLSCP close 
10:03:39 l2tp,ppp,info debug: vpn: terminating... - session closed 
10:03:39 l2tp,ppp,debug debug: vpn: LCP lowerdown 
10:03:39 l2tp,ppp,debug debug: vpn: LCP down event in initial state 
10:03:39 l2tp,ppp,info debug: vpn: disconnected 
10:03:39 l2tp,ppp,info debug: vpn: initializing... 
10:03:39 l2tp,ppp,info debug: vpn: connecting... 
10:03:39 l2tp,debug debug: tunnel 18 entering state: wait-ctl-reply 
10:03:39 l2tp,debug,packet debug: sent control message to yyy.yyy.yyy.yyy:1701 from 
0.0.0.0:1701 
10:03:39 l2tp,debug,packet debug:     tunnel-id=0, session-id=0, ns=0, nr=0 
10:03:39 l2tp,debug,packet debug:     (M) Message-Type=SCCRQ 
10:03:39 l2tp,debug,packet debug:     (M) Protocol-Version=0x01:00 
10:03:39 l2tp,debug,packet debug:     (M) Framing-Capabilities=0x1 
10:03:39 l2tp,debug,packet debug:     (M) Bearer-Capabilities=0x0 
10:03:39 l2tp,debug,packet debug:     Firmware-Revision=0x1 
10:03:39 l2tp,debug,packet debug:     (M) Host-Name="MikroTik" 
10:03:39 l2tp,debug,packet debug:     Vendor-Name="MikroTik" 
10:03:39 l2tp,debug,packet debug:     (M) Assigned-Tunnel-ID=18 
10:03:39 l2tp,debug,packet debug:     (M) Receive-Window-Size=4 
10:03:40 l2tp,debug,packet debug: sent control message to yyy.yyy.yyy.yyy:1701 from 
0.0.0.0:1701 
10:03:40 l2tp,debug,packet debug:     tunnel-id=0, session-id=0, ns=0, nr=0 
10:03:40 l2tp,debug,packet debug:     (M) Message-Type=SCCRQ 
10:03:40 l2tp,debug,packet debug:     (M) Protocol-Version=0x01:00 
10:03:40 l2tp,debug,packet debug:     (M) Framing-Capabilities=0x1 
10:03:40 l2tp,debug,packet debug:     (M) Bearer-Capabilities=0x0 
10:03:40 l2tp,debug,packet debug:     Firmware-Revision=0x1 
10:03:40 l2tp,debug,packet debug:     (M) Host-Name="MikroTik" 
10:03:40 l2tp,debug,packet debug:     Vendor-Name="MikroTik" 
10:03:40 l2tp,debug,packet debug:     (M) Assigned-Tunnel-ID=18 
10:03:40 l2tp,debug,packet debug:     (M) Receive-Window-Size=4 
10:03:41 ipsec,debug debug: 460 bytes from xxx.xxx.xxx.xxx[500] to yyy.yyy.yyy.yyy[5
00] 
10:03:41 ipsec,debug debug: 1 times of 460 bytes message will be sent to 1yyy.yyy.yyy.yyy[500] 
10:03:41 ipsec,debug,packet debug: e6ac4b4a 04136ddd 00000000 00000000 01100200 00
000000 000001cc 0d0000ac 
10:03:41 ipsec,debug,packet debug: 00000001 00000001 000000a0 01010004 03000028 01
010000 800b0001 000c0004 
10:03:41 ipsec,debug,packet debug: 00015180 80010007 800e0080 80030001 80020002 80
04000e 03000028 02010000 
10:03:41 ipsec,debug,packet debug: 800b0001 000c0004 00015180 80010007 800e0080 80
030001 80020002 80040002 
10:03:41 ipsec,debug,packet debug: 03000024 03010000 800b0001 000c0004 00015180 80
010005 80030001 80020002 
10:03:41 ipsec,debug,packet debug: 8004000e 00000024 04010000 800b0001 000c0004 00
015180 80010005 80030001 
10:03:41 ipsec,debug,packet debug: 80020002 80040002 0d000014 4a131c81 07035845 5c
5728f2 0e95452f 0d000014 
10:03:41 ipsec,debug,packet debug: 8f8d8382 6d246b6f c7a8a6a4 28c11de8 0d000014 43
9b59f8 ba676c4c 7737ae22 
10:03:41 ipsec,debug,packet debug: eab8f582 0d000014 4d1e0e13 6deafa34 c4f3ea9f 02
ec7285 0d000014 80d0bb3d 
10:03:41 ipsec,debug,packet debug: ef54565e e84645d4 c85ce3ee 0d000014 9909b64e ed
937c65 73de52ac e952fa6b 
10:03:41 ipsec,debug,packet debug: 0d000014 7d9419a6 5310ca6f 2c179d92 15529d56 0d
000014 cd604643 35df21f8 
10:03:41 ipsec,debug,packet debug: 7cfdb2fc 68b6a448 0d000014 90cb8091 3ebb696e 08
6381b5 ec427b1f 0d000014 
10:03:41 ipsec,debug,packet debug: 16f6ca16 e4a4066d 83821a0f 0aeaa862 0d000014 44
85152d 18b6bbcd 0be8a846 
10:03:41 ipsec,debug,packet debug: 9579ddcc 0d000014 12f5f28c 457168a9 702d9fe2 74
cc0100 00000014 afcad713 
10:03:41 ipsec,debug,packet debug: 68a1f1c9 6b8696fc 77570100 
10:03:41 ipsec debug: resent phase1 packet xxx.xxx.xxx.xxx[500]<=>yyy.yyy.yyy.yyy[50
0] e6ac4b4a04136ddd:0000000000000000 
10:03:41 l2tp,debug,packet debug: sent control message to yyy.yyy.yyy.yyy:1701 from 
0.0.0.0:1701 
10:03:41 l2tp,debug,packet debug:     tunnel-id=0, session-id=0, ns=0, nr=0 
10:03:41 l2tp,debug,packet debug:     (M) Message-Type=SCCRQ 
10:03:41 l2tp,debug,packet debug:     (M) Protocol-Version=0x01:00 
10:03:41 l2tp,debug,packet debug:     (M) Framing-Capabilities=0x1 
10:03:41 l2tp,debug,packet debug:     (M) Bearer-Capabilities=0x0 
10:03:41 l2tp,debug,packet debug:     Firmware-Revision=0x1 
10:03:41 l2tp,debug,packet debug:     (M) Host-Name="MikroTik" 
10:03:41 l2tp,debug,packet debug:     Vendor-Name="MikroTik" 
10:03:41 l2tp,debug,packet debug:     (M) Assigned-Tunnel-ID=18 
10:03:41 l2tp,debug,packet debug:     (M) Receive-Window-Size=4 
10:03:43 l2tp,debug,packet debug: sent control message to yyy.yyy.yyy.yyy:1701 from 
0.0.0.0:1701 
10:03:43 l2tp,debug,packet debug:     tunnel-id=0, session-id=0, ns=0, nr=0 
10:03:43 l2tp,debug,packet debug:     (M) Message-Type=SCCRQ 
10:03:43 l2tp,debug,packet debug:     (M) Protocol-Version=0x01:00 
10:03:43 l2tp,debug,packet debug:     (M) Framing-Capabilities=0x1 
10:03:43 l2tp,debug,packet debug:     (M) Bearer-Capabilities=0x0 
10:03:43 l2tp,debug,packet debug:     Firmware-Revision=0x1 
10:03:43 l2tp,debug,packet debug:     (M) Host-Name="MikroTik" 
10:03:43 l2tp,debug,packet debug:     Vendor-Name="MikroTik" 
10:03:43 l2tp,debug,packet debug:     (M) Assigned-Tunnel-ID=18 
10:03:43 l2tp,debug,packet debug:     (M) Receive-Window-Size=4 
10:03:47 l2tp,debug,packet debug: sent control message to yyy.yyy.yyy.yyy:1701 from 
0.0.0.0:1701 
10:03:47 l2tp,debug,packet debug:     tunnel-id=0, session-id=0, ns=0, nr=0 
10:03:47 l2tp,debug,packet debug:     (M) Message-Type=SCCRQ 
10:03:47 l2tp,debug,packet debug:     (M) Protocol-Version=0x01:00 
10:03:47 l2tp,debug,packet debug:     (M) Framing-Capabilities=0x1 
10:03:47 l2tp,debug,packet debug:     (M) Bearer-Capabilities=0x0 
10:03:47 l2tp,debug,packet debug:     Firmware-Revision=0x1 
10:03:47 l2tp,debug,packet debug:     (M) Host-Name="MikroTik" 
10:03:47 l2tp,debug,packet debug:     Vendor-Name="MikroTik" 
10:03:47 l2tp,debug,packet debug:     (M) Assigned-Tunnel-ID=18 
10:03:47 l2tp,debug,packet debug:     (M) Receive-Window-Size=4 
10:03:51 ipsec,error phase1 negotiation failed due to time up xxx.xxx.xxx.xxx[500]
<=>188.170.20.18[500] e6ac4b4a04136ddd:0000000000000000 
10:03:51 ipsec,error debug: phase1 negotiation failed due to time up xxx.xxx.xxx.xxx[500]<=>yyy.yyy.yyy.yyy[500] e6ac4b4a04136ddd:0000000000000000 
10:03:51 ipsec,debug debug: ===


Ca6ko
Сообщения: 1484
Зарегистрирован: 23 ноя 2018, 11:08
Откуда: Харкiв

Anton777 писал(а): 11 апр 2020, 08:58 прописал логин, пароль, IPsec Secret
Там может L2TP secret нужно ?


1-е Правило WiFi - Везде где только можно откажитесь от WiFi!
2-е Правило WiFi -Устройство, которое пользователь не носит с собой постоянно, должно подключаться кабелем!!

Микротики есть разные: черные, белые, красные. Но все равно хочется над чем нибудь заморочится.
Anton777
Сообщения: 9
Зарегистрирован: 02 дек 2019, 13:33

Ca6ko писал(а): 13 апр 2020, 10:02
Anton777 писал(а): 11 апр 2020, 08:58 прописал логин, пароль, IPsec Secret
Там может L2TP secret нужно ?
По лигике не нужно, так как используется связка L2TP+IPSec, но чем черт не шутит, а точнее MikroTik. Бьюсь над этой проблемой и пока безрезультатно(( Спасибо всем, кто пытается помочь. Готов испробовать любые позы камасутры, так как у меня нет ни вариантов, ни идей.


easyman
Сообщения: 108
Зарегистрирован: 19 окт 2018, 13:44

Со временем в микротике всё в порядке?


Anton777
Сообщения: 9
Зарегистрирован: 02 дек 2019, 13:33

easyman писал(а): 13 апр 2020, 12:25 Со временем в микротике всё в порядке?
Да, время соответсвует действительности


easyman
Сообщения: 108
Зарегистрирован: 19 окт 2018, 13:44

ipsec proposal - это вторая фаза, а у вас с первой швах.
На линуксе имеет смысл подглядеть ipsec statusall при поднятом соединении.
если затруднения с пониманием - то сюда, попробуем понять на что та сторона соглашается.


Anton777
Сообщения: 9
Зарегистрирован: 02 дек 2019, 13:33

easyman писал(а): 13 апр 2020, 21:20 ipsec proposal - это вторая фаза, а у вас с первой швах.
На линуксе имеет смысл подглядеть ipsec statusall при поднятом соединении.
если затруднения с пониманием - то сюда, попробуем понять на что та сторона соглашается.
Вот такой вывод:
Status of IKE charon daemon (strongSwan 5.6.2, Linux 4.15.0-96-generic, x86_64):
uptime: 5 minutes, since Apr 14 10:22:35 2020
malloc: sbrk 2703360, mmap 0, used 626528, free 2076832
worker threads: 11 of 16 idle, 5/0/0/0 working, job queue: 0/0/0/0, scheduled: 3
loaded plugins: charon aesni aes rc2 sha2 sha1 md4 md5 mgf1 random nonce x509 revocation constraints pubkey pkcs1 pkcs7 pkcs8 pkcs12 pgp dnskey sshkey pem openssl fips-prf gmp agent xcbc hmac gcm attr kernel-netlink resolve socket-default connmark stroke updown eap-mschapv2 xauth-generic counters
Listening IP addresses:
10.10.10.10
192.168.0.100
Connections:
52529895-01cd-4679-99c0-89085f50febe: %any...xxx.xxx.xxx.xxx IKEv1
52529895-01cd-4679-99c0-89085f50febe: local: [10.10.10.10] uses pre-shared key authentication
52529895-01cd-4679-99c0-89085f50febe: remote: uses pre-shared key authentication
52529895-01cd-4679-99c0-89085f50febe: child: dynamic === dynamic[udp/l2f] TRANSPORT
Security Associations (1 up, 0 connecting):
52529895-01cd-4679-99c0-89085f50febe[1]: ESTABLISHED 5 minutes ago, 10.10.10.10[10.10.10.10]...xxx.xxx.xxx.xxx[xxx.xxx.xxx.xxx]
52529895-01cd-4679-99c0-89085f50febe[1]: IKEv1 SPIs: f6l2c5629pso0fac_i* 018fbac31ecn5zba_r, pre-shared key reauthentication in 2 hours
52529895-01cd-4679-99c0-89085f50febe[1]: IKE proposal: AES_CBC_256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_2048
52529895-01cd-4679-99c0-89085f50febe{1}: INSTALLED, TRANSPORT, reqid 1, ESP in UDP SPIs: q5h728e3_i 66131j1m_o
52529895-01cd-4679-99c0-89085f50febe{1}: AES_CBC_256/HMAC_SHA1_96, 14629332 bytes_i (17158 pkts, 0s ago), 4554406 bytes_o (16306 pkts, 12s ago), rekeying in 37 minutes
52529895-01cd-4679-99c0-89085f50febe{1}: 10.10.10.10/32 === xxx.xxx.xxx.xxx/32[udp/l2f]


Ответить