Quantcast
Channel: IP-Phone-Forum
Viewing all articles
Browse latest Browse all 15636

[Problem] Fritzbox 7390 VPN IKE-Error

$
0
0
'Nabend

Ich bin verzweifelt und gebe langsam auf! Meine Fritzbox will sich nicht mit einem Netgear VPN Router/Server verbinden. Alle meine erstellten *.cfg Konfigurationsversuche scheitern beim VPN Aufbau und erhalten die Fehlermeldung "VPN-Fehler: IKE-Error 0x2027".

Aus purer Verzweiflung habe ich mir nun einen VPN Client (TheGreenBow) auf meinem PC installiert und hiermit auch erfolgreich eine VPN Verbindung aufbauen können. Es funktioniert also grundsätzlich, die "Arbeit" soll aber eigentlich die Fritzbox übernehmen.

Ich hoffe Ihr könnt mir helfen. Nachfolgend die beiden Configs zum Vergleich, in der Hoffnung, dass jemandem meine Fehler/Dummheiten in der Fritz Config direkt auffallen.

[ AAA.dyndns.org ist Netgear VPN Router; BBB.dyndns.org ist meine Fritzbox ]

Funktionierende Config des VPN Client:
Code:

# Do not edit this file. It is overwritten by VpnConf.
# SIGNATURE MD5 = xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
# Creation Date : 2013-11-15 at 22:47:28
# Written by VpnConf 5.51
#

[General]
Shared-SADB = Defined
Retransmits = 2
Exchange-max-time = 15
Default-phase-1-lifetime = 3600,360:28800
Bitblocking = 0
Xauth-interval = 60
DPD-interval = 30
DPD_retrans = 5
DPD_wait = 15

[Default-phase-2-lifetime]
LIFE_TYPE = SECONDS
LIFE_DURATION = 3600,300:28800

# ==================== PHASES 1 ====================

[Phase 1]
AAA.dyndns.org = Gateway-P1

[Gateway-main-mode]
DOI = IPSEC
EXCHANGE_TYPE = ID_PROT
Transforms = 3DES-SHA-GRP2

[Gateway-P1]
Phase = 1
Address = AAA.dyndns.org
Transport = udp
Configuration = Gateway-main-mode
Authentication = "123"

# ==================== PHASES 2 ====================

[Phase 2]
Passive-connections = Gateway-Tunnel-P2

[Gateway-Tunnel-P2]
Phase = 2
ISAKMP-peer = Gateway-P1
Remote-ID = Tunnel-remote-addr
Configuration = Tunnel-quick-mode
AutoStart = 0
USBStart = 0
AltDns = 0.0.0.0
AltWins = 0.0.0.0

# ==================== Ipsec ID ====================

[Tunnel-remote-addr]
ID-type = IPV4_RANGE
Network = 192.168.250.90
Netmask = 192.168.250.100

# ==================== TRANSFORMS ====================

[Tunnel-quick-mode]
DOI = IPSEC
EXCHANGE_TYPE = QUICK_MODE
Suites = Tunnel-quick-mode-suite

[Tunnel-quick-mode-suite]
Protocols = TGBQM-ESP-3DES-SHA-PFSGRP2-TUN

[TGBQM-ESP-3DES-SHA-PFSGRP2-TUN]
PROTOCOL_ID = IPSEC_ESP
Transforms = TGBQM-ESP-3DES-SHA-PFSGRP2-TUN-XF

[TGBQM-ESP-3DES-SHA-PFSGRP2-TUN-XF]
TRANSFORM_ID = 3DES
AUTHENTICATION_ALGORITHM = HMAC_SHA
GROUP_DESCRIPTION = MODP_1024
ENCAPSULATION_MODE = TUNNEL
Life = Default-phase-2-lifetime

# ==================== CERTIFICATES ====================

Nicht funktionierende Config der Fritzbox:
Code:

/*
 * C:\test.cfg
 * Sat Nov 17 23:50:13 2013
 */

vpncfg {
        connections {
                enabled = no;
                conn_type = conntype_lan;
                name = "test";
                always_renew = no;
                reject_not_encrypted = no;
                dont_filter_netbios = no;
                localip = 0.0.0.0;
                local_virtualip = 0.0.0.0;
                remoteip = 0.0.0.0;
                remote_virtualip = 0.0.0.0;
                remotehostname = "AAA.dyndns.org";
                localid {
                        fqdn = "BBB.dyndns.org";
                }
                remoteid {
                        fqdn = "AAA.dyndns.org";
                }
                mode = phase1_mode_idp;
                phase1ss = "all/all/all";
                keytype = connkeytype_pre_shared;
                key = "123";
                cert_do_server_auth = no;
                use_nat_t = no;
                use_xauth = no;
                use_cfgmode = no;
                phase2localid {
                        ipnet {
                                ipaddr = 0.0.0.0;
                                mask = 0.0.0.0;
                        }
                }
                phase2remoteid {
                        ipnet {
                                ipaddr = 192.168.250.90;
                                mask = 192.168.250.100;
                        }
                }
                phase2ss = "esp-all-all/ah-all/comp-all/pfs";
                accesslist = "permit ip any 192.168.250.0 255.255.255.0";
        }
        ike_forward_rules = "udp 0.0.0.0:500 0.0.0.0:500",
                            "udp 0.0.0.0:4500 0.0.0.0:4500";
}

// EOF


Ich vermute meinen Fehler im Bereich "localid" und/oder "phase2remoteid". Am VPN Router ist Start IP auf .90 und End IP auf .100 gesetzt.

Ich freue mich über jede Idee, das muss doch irgendwie klappen!

Greetz, M

Viewing all articles
Browse latest Browse all 15636


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>