Sonicwall TZ205 und Vigor 2920 - VPN hält nur 15sek

Lan2Lan, VPN, SSL-VPN, Remote DialIn, statische Routen, Radius Setup

Moderatoren: TommyTC, alf, Petrus, andreastc, DSL-Hexe, nobody

Sonicwall TZ205 und Vigor 2920 - VPN hält nur 15sek

Beitragvon vpn-noob » So 26.10.2014 - 12:19

Hallo,

habe die letzten 2 Tage versucht, eine stabile VPN Verbindung zwischen o.a. Geräte im Aggressive Mode herzustellen.
Zuerst hatte ich so meine Probleme mit dem Verbindungsaufbau. Nachdem ich bei beiden Seiten auf 3des mit MD5 umgestellt habe, konnte eine Verbindung hergestellt werden.
Leider hält diese Verbindung nur 15sek an.

Eckdaten:
Beide Geräte haben DynDNS.
Die Sonicwall hängt hinter einer Fritzbox welche ESP etc. (TCP-UDP 500, 4500 sowie ESP Prot.) an die Sonicwall weiterleitet.
Die Sonicwall hat am WAN-Port die IP 192.168.11.2

Die Sonicwall hat zusätzlich noch 2 weitere Tunnel im Aggr. Mode zu festen IPs laufen (Lancom und Sonicwall) - ohne Probleme.

Die Logdateien beider Firewall spucken jede Menge dazu aus.
Ein hochladen der Dateien funktioniert irgendwie nicht... :/
Den Sonicwall Komplett Code kann man als .csv speichern und in Excel importieren, dann liest es sich besser!

Auszug der Sonicwall:
Code: Alles auswählen
Tunnel Down. policy 4(Franke), Dst 192.168.1.0 - 192.168.1.255, Src 192.168.10.0 - 192.168.10.255, GW 91.42.57.248, inSpi 0x581ee128, Reason: Remove IPsec SaNode   IPsec Tunnel status changed
   RECEIVED<<< ISAKMP OAK INFO (InitCookie:0xaedf5f03f5431781 RespCookie:0x97917f1391d03b23, MsgID: 0xF5EC6827) *(HASH, DEL)
VPN Policy: Franke   Received IKE SA delete request
VPN Policy: Franke   IKE Initiator: Start Quick Mode (Phase 2).
   SENDING>>>> ISAKMP OAK QM (InitCookie:0xaedf5f03f5431781 RespCookie:0x97917f1391d03b23, MsgID: 0x277CE621) *(HASH, SA, NON, ID, ID)
   RECEIVED<<< ISAKMP OAK QM (InitCookie:0xaedf5f03f5431781 RespCookie:0x97917f1391d03b23, MsgID: 0x277CE621) *(HASH, SA, NON, ID, ID)
VPN Policy: Franke; Local network 192.168.10.0 / 255.255.255.0; Remote network 192.168.1.0/255.255.255.0   IKE Initiator: Accepting IPsec proposal (Phase 2)
VPN Policy: Franke; ESP:3DES; HMAC_MD5;  Lifetime=28800 secs; inSPI:0x581ee128; outSPI:0xf22f4ea3   IKE negotiation complete. Adding IPsec SA. (Phase 2)
   SENDING>>>> ISAKMP OAK QM (InitCookie:0xaedf5f03f5431781 RespCookie:0x97917f1391d03b23, MsgID: 0x277CE621) *(HASH)
Tunnel Up. policy 4(Franke), Dst 192.168.1.0 - 192.168.1.255, Src 192.168.10.0 - 192.168.10.255, GW 91.42.57.248, inSpi 0x581ee128, Reason: IPsec Commit SA. Existed dstNode   IPsec Tunnel status changed



Sonicwall komplett.
Code: Alles auswählen
"Time","ID","Category","Group","Event","Msg. Type","Priority","Ether Type","Src. MAC","Src. Int.","Src. Zone","Dst. MAC","Dst. Int.","Dst. Zone","Src. IP","Src. Port","Src. Name","Src.NAT IP","Src.NAT Port","In SPI","Dst. IP","Dst. Port","Dst. Name","Dst.NAT IP","Dst.NAT Port","Out SPI","IP Protocol","ICMP Type","ICMP Code","RX Bytes","TX Bytes","Access Rule","NAT Policy","User Name","Session Time","Session Type","IDP Rule","IDP Priority","HTTP OP","URL","VPN Policy","HTTP Result","Block Cat","Application","FW Action","Notes","Message"
"10/26/2014 10:18:03","5","Log","General","Clear Log","Standard","Information","","","","","","","","","","","","","","","","","","","","","","","","","","","","","","","","","","","","","","","","Log Cleared"
"10/26/2014 10:18:03","713","Network","TCP","TCP Connection Abort","Standard Note String","Debug","2048","00:1f:d0:a5:73:c4","X0","LAN","c0:ea:e4:8d:7e:48","X0","LAN","192.168.10.206","63831","","","","","192.168.10.2","4443","","","","","tcp","","","46","","","5","admin","","Web","","","","","","","","General HTTPS MGMT","Drop","TCP Flag(s): ACK RST","TCP connection abort received; TCP connection dropped"
"10/26/2014 10:18:26","1233","Firewall Settings","Multicast","Link-Local/Multicast IPv6 Packet","Standard Note Protocol","Notice","34525","08:96:d7:1e:98:af","X1","WAN","33:33:00:00:00:0c","","","fe80::a96:d7ff:fe1e:98af","35757","","","","","ff02::c","1900","","","","","udp","","","165","","","","","","","","","","","","","","","Drop","","Unhandled link-local or multicast IPv6 packet dropped"
"10/26/2014 10:18:36","1197","Network","NAT","Connection NAT Mapping","Standard Note String","Notice","","","X0","LAN","08:96:d7:1e:98:af","X1","WAN","192.168.10.1","32722","","192.168.11.2","39590","","85.13.132.60","110","","85.13.132.60","110","","tcp","","","","52","1 (LAN->WAN)","10"," ","","","","","","","","","","POP3","","Source: 192.168.11.2, 39590, Destination: 85.13.132.60, 110, Protocol: 6","Nat Mapping"
"10/26/2014 10:18:37","888","Network","TCP","TCP Connection Does Not Exist","Standard Note String","Debug","2048","e0:cb:4e:10:3d:6e","X0","LAN","c0:ea:e4:8d:7e:48","X1","WAN","192.168.10.1","32726","","","","","85.13.132.60","110","","","","","tcp","","","46","","","","","","","","","","","","","","","Drop","TCP Flag(s): RST","TCP packet received on non-existent/closed connection; TCP packet dropped"
"10/26/2014 10:18:52","358","VPN","VPN IKE","Aggressive Mode Started","Standard Note String","Information","","","","","","","","192.168.11.2","500","","","","","91.42.57.248","500","","","","","udp","","","","","","","","","","","","","","","","","","","VPN Policy: Franke","IKE Initiator: Start Aggressive Mode negotiation (Phase 1)"
"10/26/2014 10:18:52","171","VPN","VPN IKE","IPsec Dead Peer Detection","Standard Message String","Debug","","","","","","","","192.168.11.2","500","","","","","91.42.57.248","500","","","","","","","","","","","","","","","","","","","Franke","","","","","","SENDING>>>> ISAKMP OAK AG (InitCookie:0xaedf5f03f5431781 RespCookie:0x0000000000000000, MsgID: 0x0)  (SA, KE, NON, ID, VID, VID, VID, VID, VID, VID, VID, VID, VID)"
"10/26/2014 10:18:52","171","VPN","VPN IKE","IPsec Dead Peer Detection","Standard Message String","Debug","","","","","","","","91.42.57.248","500","","","","","192.168.11.2","500","","","","","","","","","","","","","","","","","","","Franke","","","","","","RECEIVED<<< ISAKMP OAK AG (InitCookie:0xaedf5f03f5431781 RespCookie:0x97917f1391d03b23, MsgID: 0x0)  (SA, KE, NON, ID, HASH, VID, VID, NATD, NATD)"
"10/26/2014 10:18:52","240","VPN","VPN IKE","VPN Local Behind NAT Device","Standard Note String","Information","","","","","","","","","","","","","","","","","","","","","","","","","","","","","","","","","","","","","","","","NAT Discovery : Local IPsec Security Gateway behind a NAT/NAPT Device"
"10/26/2014 10:18:52","354","VPN","VPN IKE","Initial Aggressive Mode Completed","Standard Note String","Information","","","","","","","","192.168.11.2","4500","","","","","91.42.57.248","4500","","","","","","","","","","","","","","","","","","","","","","","","VPN Policy: Franke;3DES; MD5; DH Group 2; lifetime=28800 secs","IKE Initiator: Aggressive Mode complete (Phase 1)."
"10/26/2014 10:18:52","171","VPN","VPN IKE","IPsec Dead Peer Detection","Standard Message String","Debug","","","","","","","","192.168.11.2","4500","","","","","91.42.57.248","4500","","","","","","","","","","","","","","","","","","","Franke","","","","","","SENDING>>>> ISAKMP OAK AG (InitCookie:0xaedf5f03f5431781 RespCookie:0x97917f1391d03b23, MsgID: 0x0) *(HASH, NATD, NATD)"
"10/26/2014 10:18:52","171","VPN","VPN IKE","IPsec Dead Peer Detection","Standard Message String","Debug","","","","","","","","192.168.11.2","4500","","","","","91.42.57.248","4500","","","","","","","","","","","","","","","","","","","Franke","","","","","","SENDING>>>> ISAKMP OAK INFO (InitCookie:0xaedf5f03f5431781 RespCookie:0x97917f1391d03b23, MsgID: 0x4FF22339) *(HASH, NOTIFY: INITIAL_CONTACT)"
"10/26/2014 10:18:53","346","VPN","VPN IKE","Quick Mode Started","Standard Note String","Information","","","","","","","","192.168.11.2","4500","","","","","91.42.57.248","4500","","","","","","","","","","","","","","","","","","","","","","","","VPN Policy: Franke","IKE Initiator: Start Quick Mode (Phase 2)."
"10/26/2014 10:18:53","171","VPN","VPN IKE","IPsec Dead Peer Detection","Standard Message String","Debug","","","","","","","","192.168.11.2","4500","","","","","91.42.57.248","4500","","","","","","","","","","","","","","","","","","","Franke","","","","","","SENDING>>>> ISAKMP OAK QM (InitCookie:0xaedf5f03f5431781 RespCookie:0x97917f1391d03b23, MsgID: 0x277CE621) *(HASH, SA, NON, ID, ID)"
"10/26/2014 10:18:53","171","VPN","VPN IKE","IPsec Dead Peer Detection","Standard Message String","Debug","","","","","","","","91.42.57.248","4500","","","","","192.168.11.2","4500","","","","","","","","","","","","","","","","","","","Franke","","","","","","RECEIVED<<< ISAKMP OAK QM (InitCookie:0xaedf5f03f5431781 RespCookie:0x97917f1391d03b23, MsgID: 0x277CE621) *(HASH, SA, NON, ID, ID)"
"10/26/2014 10:18:53","372","VPN","VPN IKE","IKE Initiator: Accept Proposal","Standard Note String","Information","","","","","","","","192.168.11.2","4500","","","","","91.42.57.248","4500","","","","","udp","","","","","","","","","","","","","","","","","","","VPN Policy: Franke; Local network 192.168.10.0 / 255.255.255.0; Remote network 192.168.1.0/255.255.255.0","IKE Initiator: Accepting IPsec proposal (Phase 2)"
"10/26/2014 10:18:53","89","VPN","VPN IKE","IPsec SA Added","Standard Note String","Information","","","","","","","","192.168.11.2","4500","","","","","91.42.57.248","4500","","","","","udp","","","","","","","","","","","","","","","","","","","VPN Policy: Franke; ESP:3DES; HMAC_MD5;  Lifetime=28800 secs; inSPI:0x581ee128; outSPI:0xf22f4ea3","IKE negotiation complete. Adding IPsec SA. (Phase 2)"
"10/26/2014 10:18:53","171","VPN","VPN IKE","IPsec Dead Peer Detection","Standard Message String","Debug","","","","","","","","192.168.11.2","4500","","","","","91.42.57.248","4500","","","","","","","","","","","","","","","","","","","Franke","","","","","","SENDING>>>> ISAKMP OAK QM (InitCookie:0xaedf5f03f5431781 RespCookie:0x97917f1391d03b23, MsgID: 0x277CE621) *(HASH)"
"10/26/2014 10:18:53","427","VPN","VPN IPsec","IPsec Tunnel Status Changed","Standard Note String","Information","","","","","","","","","","","","","","","","","","","","","","","","","","","","","","","","","","","","","","","Tunnel Up. policy 4(Franke), Dst 192.168.1.0 - 192.168.1.255, Src 192.168.10.0 - 192.168.10.255, GW 91.42.57.248, inSpi 0x581ee128, Reason: IPsec Commit SA. Existed dstNode","IPsec Tunnel status changed"
"10/26/2014 10:19:02","713","Network","TCP","TCP Connection Abort","Standard Note String","Debug","2048","00:1f:d0:a5:73:c4","X0","LAN","c0:ea:e4:8d:7e:48","X0","LAN","192.168.10.206","63934","","","","","192.168.10.2","4443","","","","","tcp","","","46","","","5","admin","","Web","","","","","","","","General HTTPS MGMT","Drop","TCP Flag(s): ACK RST","TCP connection abort received; TCP connection dropped"
"10/26/2014 10:19:09","171","VPN","VPN IKE","IPsec Dead Peer Detection","Standard Message String","Debug","","","","","","","","91.42.57.248","4500","","","","","192.168.11.2","4500","","","","","","","","","","","","","","","","","","","Franke","","","","","","RECEIVED<<< ISAKMP OAK INFO (InitCookie:0xaedf5f03f5431781 RespCookie:0x97917f1391d03b23, MsgID: 0xF1E86423) *(HASH, DEL)"
"10/26/2014 10:19:09","412","VPN","VPN IKE","Receive IPsec Delete Request","Standard Note String","Information","","","","","","","","91.42.57.248","4500","","","","","192.168.11.2","4500","","","","","","","","","","","","","","","","","","","","","","","","VPN Policy: Franke, SPI:0xf22f4ea3","Received IPsec SA delete request"
"10/26/2014 10:19:09","427","VPN","VPN IPsec","IPsec Tunnel Status Changed","Standard Note String","Information","","","","","","","","","","","","","","","","","","","","","","","","","","","","","","","","","","","","","","","Tunnel Down. policy 4(Franke), Dst 192.168.1.0 - 192.168.1.255, Src 192.168.10.0 - 192.168.10.255, GW 91.42.57.248, inSpi 0x581ee128, Reason: Remove IPsec SaNode","IPsec Tunnel status changed"
"10/26/2014 10:19:09","171","VPN","VPN IKE","IPsec Dead Peer Detection","Standard Message String","Debug","","","","","","","","91.42.57.248","4500","","","","","192.168.11.2","4500","","","","","","","","","","","","","","","","","","","Franke","","","","","","RECEIVED<<< ISAKMP OAK INFO (InitCookie:0xaedf5f03f5431781 RespCookie:0x97917f1391d03b23, MsgID: 0xF5EC6827) *(HASH, DEL)"
"10/26/2014 10:19:09","413","VPN","VPN IKE","Receive IKE Delete Request","Standard Note String","Information","","","","","","","","91.42.57.248","4500","","","","","192.168.11.2","4500","","","","","","","","","","","","","","","","","","","","","","","","VPN Policy: Franke","Received IKE SA delete request"
"10/26/2014 10:19:12","358","VPN","VPN IKE","Aggressive Mode Started","Standard Note String","Information","","","","","","","","192.168.11.2","500","","","","","91.42.57.248","500","","","","","udp","","","","","","","","","","","","","","","","","","","VPN Policy: Franke","IKE Initiator: Start Aggressive Mode negotiation (Phase 1)"
"10/26/2014 10:19:12","171","VPN","VPN IKE","IPsec Dead Peer Detection","Standard Message String","Debug","","","","","","","","192.168.11.2","500","","","","","91.42.57.248","500","","","","","","","","","","","","","","","","","","","Franke","","","","","","SENDING>>>> ISAKMP OAK AG (InitCookie:0xbe5c4104eb142a3c RespCookie:0x0000000000000000, MsgID: 0x0)  (SA, KE, NON, ID, VID, VID, VID, VID, VID, VID, VID, VID, VID)"
"10/26/2014 10:19:12","171","VPN","VPN IKE","IPsec Dead Peer Detection","Standard Message String","Debug","","","","","","","","91.42.57.248","500","","","","","192.168.11.2","500","","","","","","","","","","","","","","","","","","","Franke","","","","","","RECEIVED<<< ISAKMP OAK AG (InitCookie:0xbe5c4104eb142a3c RespCookie:0x6f9b3d85349ff69d, MsgID: 0x0)  (SA, KE, NON, ID, HASH, VID, VID, NATD, NATD)"
"10/26/2014 10:19:12","354","VPN","VPN IKE","Initial Aggressive Mode Completed","Standard Note String","Information","","","","","","","","192.168.11.2","4500","","","","","91.42.57.248","4500","","","","","","","","","","","","","","","","","","","","","","","","VPN Policy: Franke;3DES; MD5; DH Group 2; lifetime=28800 secs","IKE Initiator: Aggressive Mode complete (Phase 1)."
"10/26/2014 10:19:12","171","VPN","VPN IKE","IPsec Dead Peer Detection","Standard Message String","Debug","","","","","","","","192.168.11.2","4500","","","","","91.42.57.248","4500","","","","","","","","","","","","","","","","","","","Franke","","","","","","SENDING>>>> ISAKMP OAK AG (InitCookie:0xbe5c4104eb142a3c RespCookie:0x6f9b3d85349ff69d, MsgID: 0x0) *(HASH, NATD, NATD)"
"10/26/2014 10:19:13","171","VPN","VPN IKE","IPsec Dead Peer Detection","Standard Message String","Debug","","","","","","","","192.168.11.2","4500","","","","","91.42.57.248","4500","","","","","","","","","","","","","","","","","","","Franke","","","","","","SENDING>>>> ISAKMP OAK INFO (InitCookie:0xbe5c4104eb142a3c RespCookie:0x6f9b3d85349ff69d, MsgID: 0xB872AD97) *(HASH, NOTIFY: INITIAL_CONTACT)"
"10/26/2014 10:19:14","346","VPN","VPN IKE","Quick Mode Started","Standard Note String","Information","","","","","","","","192.168.11.2","4500","","","","","91.42.57.248","4500","","","","","","","","","","","","","","","","","","","","","","","","VPN Policy: Franke","IKE Initiator: Start Quick Mode (Phase 2)."
"10/26/2014 10:19:14","171","VPN","VPN IKE","IPsec Dead Peer Detection","Standard Message String","Debug","","","","","","","","192.168.11.2","4500","","","","","91.42.57.248","4500","","","","","","","","","","","","","","","","","","","Franke","","","","","","SENDING>>>> ISAKMP OAK QM (InitCookie:0xbe5c4104eb142a3c RespCookie:0x6f9b3d85349ff69d, MsgID: 0x26E3DCE2) *(HASH, SA, NON, ID, ID)"
"10/26/2014 10:19:14","171","VPN","VPN IKE","IPsec Dead Peer Detection","Standard Message String","Debug","","","","","","","","91.42.57.248","4500","","","","","192.168.11.2","4500","","","","","","","","","","","","","","","","","","","Franke","","","","","","RECEIVED<<< ISAKMP OAK QM (InitCookie:0xbe5c4104eb142a3c RespCookie:0x6f9b3d85349ff69d, MsgID: 0x26E3DCE2) *(HASH, SA, NON, ID, ID)"
"10/26/2014 10:19:14","372","VPN","VPN IKE","IKE Initiator: Accept Proposal","Standard Note String","Information","","","","","","","","192.168.11.2","4500","","","","","91.42.57.248","4500","","","","","udp","","","","","","","","","","","","","","","","","","","VPN Policy: Franke; Local network 192.168.10.0 / 255.255.255.0; Remote network 192.168.1.0/255.255.255.0","IKE Initiator: Accepting IPsec proposal (Phase 2)"
"10/26/2014 10:19:14","89","VPN","VPN IKE","IPsec SA Added","Standard Note String","Information","","","","","","","","192.168.11.2","4500","","","","","91.42.57.248","4500","","","","","udp","","","","","","","","","","","","","","","","","","","VPN Policy: Franke; ESP:3DES; HMAC_MD5;  Lifetime=28800 secs; inSPI:0xa6cf5506; outSPI:0xf22f4ea4","IKE negotiation complete. Adding IPsec SA. (Phase 2)"
"10/26/2014 10:19:14","171","VPN","VPN IKE","IPsec Dead Peer Detection","Standard Message String","Debug","","","","","","","","192.168.11.2","4500","","","","","91.42.57.248","4500","","","","","","","","","","","","","","","","","","","Franke","","","","","","SENDING>>>> ISAKMP OAK QM (InitCookie:0xbe5c4104eb142a3c RespCookie:0x6f9b3d85349ff69d, MsgID: 0x26E3DCE2) *(HASH)"
"10/26/2014 10:19:14","427","VPN","VPN IPsec","IPsec Tunnel Status Changed","Standard Note String","Information","","","","","","","","","","","","","","","","","","","","","","","","","","","","","","","","","","","","","","","Tunnel Up. policy 4(Franke), Dst 192.168.1.0 - 192.168.1.255, Src 192.168.10.0 - 192.168.10.255, GW 91.42.57.248, inSpi 0xa6cf5506, Reason: IPsec Commit SA. Existed dstNode","IPsec Tunnel status changed"



Draytek
Code: Alles auswählen
"2014-10-26 11:09:03", "Buffer Status: L:93, M:5, S:1195 --> delete garbage states."

"2014-10-26 11:09:03", "Buffer Status: L:94, M:5, S:1195 --> delete garbage states."

"2014-10-26 11:09:03", "Buffer Status: L:94, M:5, S:1194 --> delete garbage states."

"2014-10-26 11:09:03", "Buffer Status: L:94, M:5, S:1193 --> delete garbage states."

"2014-10-26 11:09:03", "Buffer Status: L:94, M:4, S:1193 --> delete garbage states."

"2014-10-26 11:09:03", "Buffer Status: L:94, M:3, S:1194 --> delete garbage states."

"2014-10-26 11:09:03", "Buffer Status: L:94, M:6, S:1194 --> delete garbage states."

"2014-10-26 11:09:03", "Buffer Status: L:94, M:6, S:1193 --> delete garbage states."

"2014-10-26 11:09:03", "Buffer Status: L:94, M:6, S:1192 --> delete garbage states."

"2014-10-26 11:09:03", "Buffer Status: L:94, M:6, S:1191 --> delete garbage states."

"2014-10-26 11:09:03", "Buffer Status: L:94, M:6, S:1190 --> delete garbage states."

"2014-10-26 11:09:03", "Buffer Status: L:94, M:6, S:1189 --> delete garbage states."

"2014-10-26 11:09:03", "IKE ==>, Next Payload=ISAKMP_NEXT_SA, Exchange Type = 0x4, Message ID = 0x0"

"2014-10-26 11:09:03", "Buffer Status: L:93, M:6, S:1190 --> delete garbage states."

"2014-10-26 11:09:03", "Buffer Status: L:92, M:6, S:1190 --> delete garbage states."

"2014-10-26 11:09:03", "Buffer Status: L:92, M:6, S:1189 --> delete garbage states."

"2014-10-26 11:09:03", "Buffer Status: L:92, M:5, S:1189 --> delete garbage states."

"2014-10-26 11:09:03", "IKE <==, Next Payload=ISAKMP_NEXT_HASH, Exchange Type = 0x4, Message ID = 0x0"

"2014-10-26 11:09:03", "NAT-Traversal: Using RFC 3947, both are NATed"

"2014-10-26 11:09:03", "Buffer Status: L:92, M:5, S:1188 --> delete garbage states."

"2014-10-26 11:09:03", "Buffer Status: L:94, M:5, S:1188 --> delete garbage states."

"2014-10-26 11:09:03", "ISAKMP SA established with 178.1.153.47. In/Out Index: -1/0"

"2014-10-26 11:09:03", "Buffer Status: L:94, M:4, S:1188 --> delete garbage states."

"2014-10-26 11:09:03", "IKE <==, Next Payload=ISAKMP_NEXT_HASH, Exchange Type = 0x5, Message ID = 0x9a28bfb1"

"2014-10-26 11:09:04", "Buffer Status: L:94, M:4, S:1188 --> delete garbage states."

"2014-10-26 11:09:04", "IKE <==, Next Payload=ISAKMP_NEXT_HASH, Exchange Type = 0x20, Message ID = 0xd518b09a"

"2014-10-26 11:09:04", "Buffer Status: L:94, M:4, S:1187 --> delete garbage states."

"2014-10-26 11:09:04", "Buffer Status: L:94, M:4, S:1186 --> delete garbage states."

"2014-10-26 11:09:04", "Buffer Status: L:94, M:4, S:1185 --> delete garbage states."

"2014-10-26 11:09:04", "Buffer Status: L:94, M:4, S:1184 --> delete garbage states."

"2014-10-26 11:09:04", "Buffer Status: L:94, M:4, S:1183 --> delete garbage states."

"2014-10-26 11:09:04", "Receive client L2L remote network setting is 192.168.1.0/24"

"2014-10-26 11:09:04", "[IPsec dial-in] Client subnet c0a80a00/ffffff00 match VPN[0] remote subnet setting."

"2014-10-26 11:09:04", "Buffer Status: L:94, M:4, S:1182 --> delete garbage states."

"2014-10-26 11:09:04", "Responding to Quick Mode from 178.1.153.47"

"2014-10-26 11:09:04", "Buffer Status: L:94, M:4, S:1181 --> delete garbage states."

"2014-10-26 11:09:04", "Buffer Status: L:94, M:3, S:1181 --> delete garbage states."

"2014-10-26 11:09:04", "Buffer Status: L:94, M:2, S:1181 --> delete garbage states."

"2014-10-26 11:09:04", "IKE ==>, Next Payload=ISAKMP_NEXT_HASH, Exchange Type = 0x20, Message ID = 0xd518b09a"

"2014-10-26 11:09:04", "Buffer Status: L:94, M:1, S:1182 --> delete garbage states."

"2014-10-26 11:09:04", "Buffer Status: L:94, M:1, S:1181 --> delete garbage states."

"2014-10-26 11:09:04", "Buffer Status: L:94, M:0, S:1181 --> delete garbage states."

"2014-10-26 11:09:04", "IKE <==, Next Payload=ISAKMP_NEXT_HASH, Exchange Type = 0x20, Message ID = 0xd518b09a"

"2014-10-26 11:09:04", "Buffer Status: L:94, M:0, S:1180 --> delete garbage states."

"2014-10-26 11:09:04", "Buffer Status: L:94, M:2, S:1180 --> delete garbage states."

"2014-10-26 11:09:04", "IPsec SA established with 178.1.153.47. In/Out Index: -1/0"

"2014-10-26 11:09:04", "[L2L][UP][IPSec][@1:Boelling]"

"2014-10-26 11:08:45", "Buffer Status: L:94, M:6, S:1190 --> delete garbage states."

"2014-10-26 11:08:45", "Buffer Status: L:94, M:6, S:1189 --> delete garbage states."

"2014-10-26 11:08:45", "Buffer Status: L:94, M:6, S:1188 --> delete garbage states."

"2014-10-26 11:08:45", "IKE ==>, Next Payload=ISAKMP_NEXT_SA, Exchange Type = 0x4, Message ID = 0x0"

"2014-10-26 11:08:45", "Buffer Status: L:93, M:6, S:1189 --> delete garbage states."

"2014-10-26 11:08:45", "Buffer Status: L:92, M:6, S:1189 --> delete garbage states."

"2014-10-26 11:08:45", "Buffer Status: L:92, M:6, S:1188 --> delete garbage states."

"2014-10-26 11:08:45", "Buffer Status: L:92, M:5, S:1188 --> delete garbage states."

"2014-10-26 11:08:45", "IKE <==, Next Payload=ISAKMP_NEXT_HASH, Exchange Type = 0x4, Message ID = 0x0"

"2014-10-26 11:08:45", "NAT-Traversal: Using RFC 3947, both are NATed"

"2014-10-26 11:08:45", "Buffer Status: L:94, M:5, S:1188 --> delete garbage states."

"2014-10-26 11:08:45", "ISAKMP SA established with 178.1.153.47. In/Out Index: -1/0"

"2014-10-26 11:08:45", "Buffer Status: L:94, M:4, S:1188 --> delete garbage states."

"2014-10-26 11:08:45", "IKE <==, Next Payload=ISAKMP_NEXT_HASH, Exchange Type = 0x5, Message ID = 0xc17d8cc9"

"2014-10-26 11:08:46", "Buffer Status: L:94, M:4, S:1188 --> delete garbage states."

"2014-10-26 11:08:46", "IKE <==, Next Payload=ISAKMP_NEXT_HASH, Exchange Type = 0x20, Message ID = 0x6a613b3a"

"2014-10-26 11:08:46", "Buffer Status: L:94, M:4, S:1187 --> delete garbage states."

"2014-10-26 11:08:46", "Buffer Status: L:94, M:4, S:1186 --> delete garbage states."

"2014-10-26 11:08:46", "Buffer Status: L:94, M:4, S:1185 --> delete garbage states."

"2014-10-26 11:08:46", "Buffer Status: L:94, M:4, S:1184 --> delete garbage states."

"2014-10-26 11:08:46", "Buffer Status: L:94, M:4, S:1183 --> delete garbage states."

"2014-10-26 11:08:46", "Receive client L2L remote network setting is 192.168.1.0/24"

"2014-10-26 11:08:46", "[IPsec dial-in] Client subnet c0a80a00/ffffff00 match VPN[0] remote subnet setting."

"2014-10-26 11:08:46", "Buffer Status: L:94, M:4, S:1182 --> delete garbage states."

"2014-10-26 11:08:46", "Responding to Quick Mode from 178.1.153.47"

"2014-10-26 11:08:46", "Buffer Status: L:94, M:4, S:1181 --> delete garbage states."

"2014-10-26 11:08:46", "Buffer Status: L:94, M:3, S:1181 --> delete garbage states."

"2014-10-26 11:08:46", "Buffer Status: L:94, M:2, S:1181 --> delete garbage states."

"2014-10-26 11:08:46", "IKE ==>, Next Payload=ISAKMP_NEXT_HASH, Exchange Type = 0x20, Message ID = 0x6a613b3a"

"2014-10-26 11:08:46", "Buffer Status: L:94, M:1, S:1182 --> delete garbage states."

"2014-10-26 11:08:46", "Buffer Status: L:94, M:1, S:1181 --> delete garbage states."

"2014-10-26 11:08:46", "Buffer Status: L:94, M:0, S:1181 --> delete garbage states."

"2014-10-26 11:08:46", "IKE <==, Next Payload=ISAKMP_NEXT_HASH, Exchange Type = 0x20, Message ID = 0x6a613b3a"

"2014-10-26 11:08:46", "Buffer Status: L:94, M:0, S:1180 --> delete garbage states."

"2014-10-26 11:08:46", "Buffer Status: L:94, M:2, S:1180 --> delete garbage states."

"2014-10-26 11:08:46", "IPsec SA established with 178.1.153.47. In/Out Index: -1/0"

"2014-10-26 11:08:46", "[L2L][UP][IPSec][@1:Boelling]"

"2014-10-26 11:09:01", "Buffer Status: L:94, M:2, S:1180 --> delete garbage states."

"2014-10-26 11:09:01", "==> Drop All VPN in delete_garbage_states."

"2014-10-26 11:09:02", "[L2L][DOWN][IPSec][@1:Boelling]"

"2014-10-26 11:09:02", "IKE_RELEASE VPN : L2L Profile Index = 1, Name = Boelling"

"2014-10-26 11:09:02", "IKE ==>, Next Payload=ISAKMP_NEXT_HASH, Exchange Type = 0x5, Message ID = 0xe1b9265d"

"2014-10-26 11:09:02", "IKE ==>, Next Payload=ISAKMP_NEXT_HASH, Exchange Type = 0x5, Message ID = 0xe5bd2a61"

"2014-10-26 11:09:02", "DOUBLE free for 819d6910: 7a99 from this.id.name2"

"2014-10-26 11:09:03", "IKE <==, Next Payload=ISAKMP_NEXT_SA, Exchange Type = 0x4, Message ID = 0x0"

"2014-10-26 11:09:03", "Responding to Aggressive Mode from 178.1.153.47"

"2014-10-26 11:09:03", "Buffer Status: L:93, M:7, S:1196 --> delete garbage states."

"2014-10-26 11:09:03", "Buffer Status: L:94, M:6, S:1196 --> delete garbage states."

"2014-10-26 11:09:03", "Buffer Status: L:94, M:6, S:1195 --> delete garbage states."

"2014-10-26 11:09:03", "Buffer Status: L:94, M:6, S:1194 --> delete garbage states."

"2014-10-26 11:09:03", "Buffer Status: L:94, M:5, S:1194 --> delete garbage states."

"2014-10-26 11:09:03", "Buffer Status: L:94, M:4, S:1195 --> delete garbage states."

"2014-10-26 11:09:03", "Buffer Status: L:94, M:7, S:1195 --> delete garbage states."

"2014-10-26 11:09:03", "Buffer Status: L:94, M:7, S:1194 --> delete garbage states."

"2014-10-26 11:09:03", "Buffer Status: L:94, M:6, S:1194 --> delete garbage states."

"2014-10-26 11:09:03", "Buffer Status: L:94, M:5, S:1195 --> delete garbage states."

"2014-10-26 11:09:03", "Buffer Status: L:94, M:5, S:1195 --> delete garbage states."

"2014-10-26 11:09:03", "Buffer Status: L:94, M:5, S:1195 --> delete garbage states."

"2014-10-26 11:09:03", "Buffer Status: L:94, M:5, S:1195 --> delete garbage states."

"2014-10-26 11:09:03", "Buffer Status: L:94, M:5, S:1195 --> delete garbage states."

"2014-10-26 11:09:03", "Buffer Status: L:94, M:5, S:1195 --> delete garbage states."

"2014-10-26 11:09:03", "Buffer Status: L:94, M:5, S:1195 --> delete garbage states."

"2014-10-26 11:09:03", "Buffer Status: L:94, M:5, S:1195 --> delete garbage states."

"2014-10-26 11:09:03", "Buffer Status: L:94, M:5, S:1195 --> delete garbage states."

"2014-10-26 11:09:03", "Buffer Status: L:94, M:5, S:1195 --> delete garbage states."

"2014-10-26 11:09:03", "Buffer Status: L:94, M:5, S:1195 --> delete garbage states."

"2014-10-26 11:09:03", "Buffer Status: L:94, M:5, S:1195 --> delete garbage states."

"2014-10-26 11:09:03", "Buffer Status: L:94, M:5, S:1195 --> delete garbage states."

"2014-10-26 11:09:03", "Buffer Status: L:94, M:5, S:1195 --> delete garbage states."

"2014-10-26 11:09:03", "Buffer Status: L:94, M:5, S:1195 --> delete garbage states."

"2014-10-26 11:09:03", "Buffer Status: L:94, M:5, S:1195 --> delete garbage states."

"2014-10-26 11:09:03", "Buffer Status: L:94, M:5, S:1195 --> delete garbage states."

"2014-10-26 11:09:03", "Buffer Status: L:94, M:5, S:1195 --> delete garbage states."

"2014-10-26 11:09:03", "Buffer Status: L:94, M:5, S:1195 --> delete garbage states."

"2014-10-26 11:09:03", "Buffer Status: L:94, M:5, S:1195 --> delete garbage states."

"2014-10-26 11:09:03", "Buffer Status: L:94, M:5, S:1195 --> delete garbage states."

"2014-10-26 11:09:03", "Buffer Status: L:94, M:5, S:1195 --> delete garbage states."

"2014-10-26 11:09:03", "Buffer Status: L:94, M:5, S:1195 --> delete garbage states."

"2014-10-26 11:09:03", "Buffer Status: L:94, M:5, S:1195 --> delete garbage states."

"2014-10-26 11:09:03", "Buffer Status: L:94, M:6, S:1194 --> delete garbage states."

"2014-10-26 11:09:03", "Buffer Status: L:93, M:6, S:1194 --> delete garbage states."


Vielen Dank im voraus!
vpn-noob
User
 
Beiträge: 11
Registriert: Fr 14.07.2006 - 18:22

Re: Sonicwall TZ205 und Vigor 2920 - VPN hält nur 15sek

Beitragvon brian » Mo 27.10.2014 - 09:31

Hallo vpn-noob,

ich habe keine Erfahrungen mit den Sonicwall-Produkten.
Ich kann dir nur die Anleitungen unter

http://www.draytek.com/index.php?option ... 93&lang=en

ans Herz legen. Vielleicht findet sich hier eine Lösung.

MfG
brian
brian
Power-User
 
Beiträge: 194
Registriert: Do 14.10.2010 - 10:15

Re: Sonicwall TZ205 und Vigor 2920 - VPN hält nur 15sek

Beitragvon vpn-noob » Di 28.10.2014 - 07:20

Hallo,

die Links auf der .com Seite kannte ich noch nicht.
Danke!
vpn-noob
User
 
Beiträge: 11
Registriert: Fr 14.07.2006 - 18:22


Zurück zu Fernzugriff und Netzwerkkopplung

Wer ist online?

Mitglieder in diesem Forum: 0 Mitglieder und 0 Gäste