Indice   FAQ  
Iscriviti  Login
Indice RouterOS RouterOS

l2tp-ipsec

Tutto su questo sistema operativo linux based - Configurazioni, dubbi, problematiche &....

l2tp-ipsec

Messaggioda Ciospy » ven 5 ott 2018, 20:44

ciao a tutti, ho un problema con una connessione l2tp-ipsec, ho provato e riprovato ma niente.Non riesco collegarmi in vpn, ho provato da iphone x e da macbook pro...è un rb2011 con ros 6.43.2. Di seguito vi posto il log ipsec. Spero che qualche buona anima possa darmi una dritta. grazie a tutti :ave:

20:21:46 ipsec,debug encryption(aes-cbc)
20:21:46 ipsec,debug hmac(sha1)
20:21:46 ipsec,debug call pfkey_send_update_nat
20:21:46 ipsec IPsec-SA established: ESP/Transport 192.168.88.50[500]->95.xxx.xxx.xxx[500] spi=0x
44894b5
20:21:46 ipsec,debug pfkey update sent.
20:21:46 ipsec,debug encryption(aes-cbc)
20:21:46 ipsec,debug hmac(sha1)
20:21:46 ipsec,debug call pfkey_send_add_nat
20:21:46 ipsec IPsec-SA established: ESP/Transport 95.xxx.xxx.xxx[500]->192.168.88.50[500] spi=0x
2bac55b
20:21:46 ipsec,debug pfkey add sent.
20:22:06 ipsec,debug ===== received 76 bytes from 192.168.88.50[500] to 95.xxx.xxx.xxx[500]
20:22:06 ipsec,debug,packet 006b2b7f c9d5b2fe 14cbbcaf 3ed9e7a6 08100501 5e3c7d0f 0000004c cb1ef
ec8
20:22:06 ipsec,debug,packet 25c7485f 11edc57f 6cd2c3de 2fcd7570 1e41923c f04560b7 f6ebc206 8ab3b
bc3
20:22:06 ipsec,debug,packet 2c798978 e43362ec f036fc76
20:22:06 ipsec,debug receive Information.
20:22:06 ipsec,debug compute IV for phase2
20:22:06 ipsec,debug phase1 last IV:
20:22:06 ipsec,debug 10caee4e e6e5f5df b7675c3c c90a9041 5e3c7d0f
20:22:06 ipsec,debug hash(sha1)
20:22:06 ipsec,debug encryption(aes)
20:22:06 ipsec,debug phase2 IV computed:
20:22:06 ipsec,debug 24a6a689 7c970c5d 97108d30 23d19236
20:22:06 ipsec,debug encryption(aes)
20:22:06 ipsec,debug IV was saved for next processing:
20:22:06 ipsec,debug 8ab3bbc3 2c798978 e43362ec f036fc76
20:22:06 ipsec,debug encryption(aes)
20:22:06 ipsec,debug with key:
20:22:06 ipsec,debug 2bc330cd 2979ebb4 6ffddef8 a408caea 329973dc acbc66ec c5bd3528 3f8b67e3
20:22:06 ipsec,debug decrypted payload by IV:
20:22:06 ipsec,debug 24a6a689 7c970c5d 97108d30 23d19236
20:22:06 ipsec,debug decrypted payload, but not trimed.
20:22:06 ipsec,debug 0c000018 bf74b62c 0b2e41d8 5675336c 6781bafe e1bf40da 00000010 00000001
20:22:06 ipsec,debug 03040001 02bac55b 00000000 00000008
20:22:06 ipsec,debug padding len=9
20:22:06 ipsec,debug skip to trim padding.
20:22:06 ipsec,debug decrypted.
20:22:06 ipsec,debug 006b2b7f c9d5b2fe 14cbbcaf 3ed9e7a6 08100501 5e3c7d0f 0000004c 0c000018
20:22:06 ipsec,debug bf74b62c 0b2e41d8 5675336c 6781bafe e1bf40da 00000010 00000001 03040001
20:22:06 ipsec,debug 02bac55b 00000000 00000008
20:22:06 ipsec,debug HASH with:
20:22:06 ipsec,debug 5e3c7d0f 00000010 00000001 03040001 02bac55b
20:22:06 ipsec,debug hmac(hmac_sha1)
20:22:06 ipsec,debug HASH computed:
20:22:06 ipsec,debug bf74b62c 0b2e41d8 5675336c 6781bafe e1bf40da
20:22:06 ipsec,debug hash validated.
20:22:06 ipsec,debug begin.
20:22:06 ipsec,debug seen nptype=8(hash) len=24
20:22:06 ipsec,debug seen nptype=12(delete) len=16
20:22:06 ipsec,debug succeed.
20:22:06 ipsec,debug 192.168.88.50 delete payload for protocol ESP
20:22:06 ipsec purged IPsec-SA proto_id=ESP spi=0x2bac55b
20:22:06 ipsec purged IPsec-SA proto_id=ESP spi=0x44894b5
20:22:06 ipsec,debug an undead schedule has been deleted.
20:22:06 ipsec removing generated policy
20:22:06 ipsec,debug purged SAs.
20:22:06 ipsec,debug ===== received 92 bytes from 192.168.88.50[500] to 95.xxx.xxx.xxx[500]
20:22:06 ipsec,debug,packet 006b2b7f c9d5b2fe 14cbbcaf 3ed9e7a6 08100501 4835ab61 0000005c 084b1
925
20:22:06 ipsec,debug,packet 515c751d 89fbbb42 d9b9b8b5 1ca25c1a 29b189ea 69fc2f4a c94caff6 498bb
292
20:22:06 ipsec,debug,packet 31c4613b f0169342 c3ee8543 4ee86e14 b72a10b6 0ba7817d c8a571be
20:22:06 ipsec,debug receive Information.
20:22:06 ipsec,debug compute IV for phase2
20:22:06 ipsec,debug phase1 last IV:
20:22:06 ipsec,debug 10caee4e e6e5f5df b7675c3c c90a9041 4835ab61
20:22:06 ipsec,debug hash(sha1)
20:22:06 ipsec,debug encryption(aes)
20:22:06 ipsec,debug phase2 IV computed:
20:22:06 ipsec,debug 6ab3e949 395e2131 fa022b33 fc649610
20:22:06 ipsec,debug encryption(aes)
20:22:06 ipsec,debug IV was saved for next processing:
20:22:06 ipsec,debug 4ee86e14 b72a10b6 0ba7817d c8a571be
20:22:06 ipsec,debug encryption(aes)
20:22:06 ipsec,debug with key:
20:22:06 ipsec,debug 2bc330cd 2979ebb4 6ffddef8 a408caea 329973dc acbc66ec c5bd3528 3f8b67e3
20:22:06 ipsec,debug decrypted payload by IV:
20:22:06 ipsec,debug 6ab3e949 395e2131 fa022b33 fc649610
20:22:06 ipsec,debug decrypted payload, but not trimed.
20:22:06 ipsec,debug 0c000018 910b3369 b5269cc7 af5f0b09 fb222de9 b18f963c 0000001c 00000001
20:22:06 ipsec,debug 01100001 006b2b7f c9d5b2fe 14cbbcaf 3ed9e7a6 00000000 00000000 0000000c
20:22:06 ipsec,debug padding len=13
20:22:06 ipsec,debug skip to trim padding.
20:22:06 ipsec,debug decrypted.
20:22:06 ipsec,debug 006b2b7f c9d5b2fe 14cbbcaf 3ed9e7a6 08100501 4835ab61 0000005c 0c000018
20:22:06 ipsec,debug 910b3369 b5269cc7 af5f0b09 fb222de9 b18f963c 0000001c 00000001 01100001
20:22:06 ipsec,debug 006b2b7f c9d5b2fe 14cbbcaf 3ed9e7a6 00000000 00000000 0000000c
20:22:06 ipsec,debug HASH with:
20:22:06 ipsec,debug 4835ab61 0000001c 00000001 01100001 006b2b7f c9d5b2fe 14cbbcaf 3ed9e7a6
20:22:06 ipsec,debug hmac(hmac_sha1)
20:22:06 ipsec,debug HASH computed:
20:22:06 ipsec,debug 910b3369 b5269cc7 af5f0b09 fb222de9 b18f963c
20:22:06 ipsec,debug hash validated.
20:22:06 ipsec,debug begin.
20:22:06 ipsec,debug seen nptype=8(hash) len=24
20:22:06 ipsec,debug seen nptype=12(delete) len=28
20:22:06 ipsec,debug succeed.
20:22:06 ipsec,debug 192.168.88.50 delete payload for protocol ISAKMP
20:22:06 ipsec,info purging ISAKMP-SA 95.xxx.xxx.xxx[500]<=>192.168.88.50[500] spi=006b2b7fc9d5b2
fe:14cbbcaf3ed9e7a6.
20:22:06 ipsec purged ISAKMP-SA 95.xxx.xxx.xxx[500]<=>192.168.88.50[500] spi=006b2b7fc9d5b2fe:14c
bbcaf3ed9e7a6.
20:22:06 ipsec,debug purged SAs.
20:22:06 ipsec,info ISAKMP-SA deleted 95.xxx.xxx.xxx[500]-192.168.88.50[500] spi:006b2b7fc9d5b2fe
:14cbbcaf3ed9e7a6 rekey:1
20:22:06 ipsec,debug an undead schedule has been deleted
Ciospy
Mikrotik-User 10° Liv
Mikrotik-User 10° Liv
 
Messaggi: 17
Iscritto il: mer 25 set 2013, 12:15

Re: l2tp-ipsec

Messaggioda Ciospy » sab 6 ott 2018, 10:23

scusate, ho risolto, anche se è molto strana questa cosa. Praticamente ho disattivato il nat trasversale e ho disattivato e riattivato il server l2tp ed è partito subito :humm: qualcuno può spiegarmi qesto?

Volevo chiedere anche se io faccio una vpn dal mikrotik verso un altro router remoto, per far si che non cada la connessione per via del tempo massimo preimpostato come posso risolvere?

Ultima cosa. ho notato che in vpn la banda massima che raggiungo sono 17Mb circa. è possibile fare di meglio?

grazie
Ciospy
Mikrotik-User 10° Liv
Mikrotik-User 10° Liv
 
Messaggi: 17
Iscritto il: mer 25 set 2013, 12:15



Torna a RouterOS

Chi c’è in linea

Visitano il forum: Nessuno e 5 ospiti