Jump to content

Dmitry Tumashev

Forum Members
  • Posts

    4
  • Joined

  • Last visited

Posts posted by Dmitry Tumashev

  1. Да уж, заработает одно, сломается другое. L2TP VPN поднял, на клиентах теперь работает интернет, но доступа к устройствам из локальной сети почему-то нет, только к самому роутеру по 192.168.1.1. В самом ВПН стоит доступ к домашней сети, и нужные мне устройства в ней как раз и находятся. Что не так?

    Скрытый текст

    ApplicationFrameHost_2018-02-19_19-36-18.png.f19c46df65e0a700b18d2a8a5e16f417.pngApplicationFrameHost_2018-02-19_19-39-24.thumb.png.9fff489dc2ebf8419b4e640b3ee5c96e.png

     

  2. 4 minutes ago, r13 said:

    Поставить новый веб, в нем L2TP/IPSec настраивается также как и прочие VPN

    Настройки в ручную есть в теме по  L2TP/IPSec

    Понимаю, что это уже оффтоп, но подскажите пожалуйста, но как новый веб поставить?

  3. Настраивал IPSec для подключения с андроид-устройства по гайду с сайта. C телефона подключаюсь нормально, но ни интернета, ни доступа к локальной сети нет. Что я делаю не так? Прошивка 2.10, роутер Keenetic Lite III, клиент - Android 8.0.

    Логи:

    Spoiler
    
    Feb 16 16:51:53ipsec
    09[IKE] received NAT-T (RFC 3947) vendor ID 
    Feb 16 16:51:53ipsec
    09[IKE] received draft-ietf-ipsec-nat-t-ike-02 vendor ID 
    Feb 16 16:51:53ipsec
    09[IKE] received draft-ietf-ipsec-nat-t-ike-02\n vendor ID 
    Feb 16 16:51:53ipsec
    09[IKE] received draft-ietf-ipsec-nat-t-ike-00 vendor ID 
    Feb 16 16:51:53ipsec
    09[IKE] received XAuth vendor ID 
    Feb 16 16:51:53ipsec
    09[IKE] received Cisco Unity vendor ID 
    Feb 16 16:51:53ipsec
    09[IKE] received FRAGMENTATION vendor ID 
    Feb 16 16:51:53ipsec
    09[IKE] received DPD vendor ID 
    Feb 16 16:51:53ipsec
    09[IKE] 188.162.72.32 is initiating a Main Mode IKE_SA 
    Feb 16 16:51:53ipsec
    09[CFG] received proposals: IKE:AES_CBC=256/HMAC_SHA2_384_192/PRF_HMAC_SHA2_384/MODP_1024/#, IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024/#, IKE:AES_CBC=256/HMAC_SHA2_512_256/PRF_HMAC_SHA2_512/MODP_1024/#, IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024/#, IKE:AES_CBC=256/HMAC_MD5_96/PRF_HMAC_MD5/MODP_1024/#, IKE:AES_CBC=128/HMAC_SHA2_512_256/PRF_HMAC_SHA2_512/MODP_1024/#, IKE:AES_CBC=128/HMAC_SHA2_384_192/PRF_HMAC_SHA2_384/MODP_1024/#, IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024/#, IKE:AES_CBC=128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024/#, IKE:AES_CBC=128/HMAC_MD5_96/PRF_HMAC_MD5/MODP_1024/#, IKE:3DES_CBC/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024/#, IKE:3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024/#, IKE:3DES_CBC/HMAC_MD5_96/PRF_HMAC_MD5/MODP_1024/#, IKE:DES_CBC/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024/#, IKE:DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024/#, IKE:DES_CBC/HMAC_MD5_96/PRF_HMAC_MD5/MODP_1024/# 
    Feb 16 16:51:53ipsec
    09[CFG] configured proposals: IKE:AES_CBC=128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024/# 
    Feb 16 16:51:53ipsec
    09[CFG] selected proposal: IKE:AES_CBC=128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024/# 
    Feb 16 16:51:53ipsec
    09[IKE] sending XAuth vendor ID 
    Feb 16 16:51:53ipsec
    09[IKE] sending DPD vendor ID 
    Feb 16 16:51:53ipsec
    09[IKE] sending Cisco Unity vendor ID 
    Feb 16 16:51:53ipsec
    09[IKE] sending FRAGMENTATION vendor ID 
    Feb 16 16:51:53ipsec
    09[IKE] sending NAT-T (RFC 3947) vendor ID 
    Feb 16 16:51:54ipsec
    10[IKE] remote host is behind NAT 
    Feb 16 16:51:54ipsec
    10[IKE] linked key for crypto map '(unnamed)' is not found, still searching 
    Feb 16 16:51:54ipsec
    11[CFG] looking for XAuthInitPSK peer configs matching 5.166.124.249...188.162.72.32[10.214.173.63] 
    Feb 16 16:51:54ipsec
    11[CFG] selected peer config "VirtualIPServer" 
    Feb 16 16:51:54ipsec
    13[IKE] EAP-MS-CHAPv2 succeeded: 'Welcome2strongSwan' 
    Feb 16 16:51:54ipsec
    13[IKE] XAuth authentication of 'Tumist' successful 
    Feb 16 16:51:54ipsec
    15[IKE] IKE_SA VirtualIPServer[1] established between 5.166.124.249[mykeenetic.net]...188.162.72.32[10.214.173.63] 
    Feb 16 16:51:54ipsec
    15[IKE] scheduling reauthentication in 28765s 
    Feb 16 16:51:54ipsec
    15[IKE] maximum IKE_SA lifetime 28785s 
    Feb 16 16:51:54ndm
    IpSec::Configurator: crypto map "VirtualIPServer" active IKE SA: 1, active CHILD SA: 0.
    Feb 16 16:51:54ipsec
    14[IKE] peer requested virtual IP %any 
    Feb 16 16:51:54ipsec
    14[CFG] assigning new lease to 'Tumist' 
    Feb 16 16:51:54ipsec
    14[IKE] assigning virtual IP 172.20.0.1 to peer 'Tumist' 
    Feb 16 16:51:55ipsec
    16[CFG] received proposals: ESP:AES_CBC=256/HMAC_SHA2_512_256/#/#/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA2_384_192/#/#/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA1_96/#/#/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA2_256_128/#/#/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_MD5_96/#/#/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA2_512_256/#/#/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA2_384_192/#/#/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA1_96/#/#/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA2_256_128/#/#/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_MD5_96/#/#/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA2_512_256/#/#/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA2_384_192/#/#/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA1_96/#/#/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA2_256_128/#/#/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_MD5_96/#/#/NO_EXT_SEQ, ESP:DES_CBC/HMAC_SHA2_512_256/#/#/NO_EXT_SEQ, ESP:DES_CBC/HMAC_SHA2_384_192/#/#/NO_EXT_SEQ, ESP:DES_CBC/HMAC_SHA1_96/#/#/NO_EXT_SEQ, ESP:DES_CBC/HMAC_SHA2_256_128/#/#/NO_EXT_SEQ, ESP:DES_CBC/HMAC_MD5_96/#/#/NO_EXT_SEQ 
    Feb 16 16:51:55ipsec
    16[CFG] configured proposals: ESP:AES_CBC=128/HMAC_SHA1_96/#/#/NO_EXT_SEQ 
    Feb 16 16:51:55ipsec
    16[CFG] selected proposal: ESP:AES_CBC=128/HMAC_SHA1_96/#/#/NO_EXT_SEQ 
    Feb 16 16:51:55ipsec
    16[IKE] received 0 lifebytes, configured 21474836480 
    Feb 16 16:51:55ipsec
    07[IKE] CHILD_SA VirtualIPServer{1} established with SPIs c6c1e0fa_i 0533d491_o and TS 0.0.0.0/0 === 172.20.0.1/32 
    Feb 16 16:51:55ndm
    IpSec::Configurator: crypto map "VirtualIPServer" is up: remote client "Tumist" with IP "172.20.0.1" connected.
    Feb 16 16:51:56ndm
    IpSec::IpSecNetfilter: start reloading netfilter configuration...
    Feb 16 16:51:56ndm
    IpSec::IpSecNetfilter: netfilter configuration reloading is done.

     

     

     

×
×
  • Create New...