Ports 5 are forwarded to the WAN Interface (TL-R600VPN)ĭead Peer Detection: checked 10 Sec and 5 retriesĬharon: 15 sending packet: from 80.x.x.x to 188.x.x.x (92 bytes)Ĭharon: 15 generating INFORMATIONAL_V1 request 1237439593 Ĭharon: 15 found 1 matching config, but none allows pre-shared key authentication using Main ModeĬharon: 15 looking for pre-shared key peer configs matching 80.x.x.x…188.x.x.xĬharon: 15 parsed ID_PROT request 0 Ĭharon: 15 received packet: from 188.x.x.x to 80.x.x.x (76 bytes)Ĭharon: 15 sending packet: from 80.x.x.x to 188.x.x.x (244 bytes)Ĭharon: 15 generating ID_PROT response 0 Ĭharon: 15 remote host is behind NATĬharon: 15 received packet: from 188.x.x.x to 80.x.x.x (228 bytes)Ĭharon: 15 sending packet: from 80.x.x.x to 188.x.x.x (156 bytes)Ĭharon: 15 188.x.x.x is initiating a Main Mode IKE_SAĬharon: 15 received draft-ietf-ipsec-nat-t-ike-00 vendor IDĬharon: 15 received draft-ietf-ipsec-nat-t-ike-02\n vendor IDĬharon: 15 received draft-ietf-ipsec-nat-t-ike-02 vendor IDĬharon: 15 received NAT-T (RFC 3947) vendor ID The problem here is that we use the infrastructure of our client. We’ve a site office in which we like to implementate a site to site vpn. I’ve a Problem with IPSec Site to Site VPN between PFsense 2.2.3 to TL-R600 VPN (Behind Fritzbox) I've chanced the IP-adress into domain name and it works!
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |