bottleneck
Choose style:

Author Topic: VPN Server Connection Problems  (Read 14061 times)

0 Members and 1 Guest are viewing this topic.

Offline derrikn

  • Backer
  • *
  • Posts: 15
  • Thanks: 0
  • Registered : 21/09/2014
    YearsYearsYearsYearsYearsYearsYearsYearsYearsYearsYears
VPN Server Connection Problems
« on: May 15, 2016, 01:34:20 pm »
I'm hoping I can get a little help trying to setup my VPN Server. iOS seems to connect fine, but my Android phone seems to be having some problems. The first log is from my Android phone, and the 2nd is from my iPhone. The thing I noticed is the Android is trying to set an IP in the 192.xxx.xxx.xxx range. But my local network is 10.xxx.xxx.xxx.
Has anyone had similar experiences and figured out how to get the VPN Server working for Android?

Code: [Select]
May 15 09:56:06 AlmondPlus authpriv.warn pluto[13651]: "myvpn"[2] 172.XX.XX.XX6 #7: responding to Main Mode from unknown peer 172.XX.XX.XX6
May 15 09:56:06 AlmondPlus authpriv.warn pluto[13651]: "myvpn"[2] 172.XX.XX.XX6 #7: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
May 15 09:56:06 AlmondPlus authpriv.warn pluto[13651]: "myvpn"[2] 172.XX.XX.XX6 #7: STATE_MAIN_R1: sent MR1, expecting MI2
May 15 09:56:06 AlmondPlus authpriv.warn pluto[13651]: "myvpn"[2] 172.XX.XX.XX6 #7: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike (MacOS X): both are NATed
May 15 09:56:06 AlmondPlus authpriv.warn pluto[13651]: "myvpn"[2] 172.XX.XX.XX6 #7: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
May 15 09:56:06 AlmondPlus authpriv.warn pluto[13651]: "myvpn"[2] 172.XX.XX.XX6 #7: STATE_MAIN_R2: sent MR2, expecting MI3
May 15 09:56:06 AlmondPlus authpriv.warn pluto[13651]: "myvpn"[2] 172.XX.XX.XX6 #7: Main mode peer ID is ID_IPV4_ADDR: '192.0.0.4'
May 15 09:56:06 AlmondPlus authpriv.warn pluto[13651]: "myvpn"[2] 172.XX.XX.XX6 #7: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
May 15 09:56:06 AlmondPlus authpriv.warn pluto[13651]: "myvpn"[2] 172.XX.XX.XX6 #7: new NAT mapping for #7, was 172.XX.XX.XX6:29640, now 172.XX.XX.XX6:58832
May 15 09:56:06 AlmondPlus authpriv.warn pluto[13651]: "myvpn"[2] 172.XX.XX.XX6 #7: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=aes_256 prf=OAKLEY_SHA2_256 group=modp1024}
May 15 09:56:06 AlmondPlus authpriv.warn pluto[13651]: "myvpn"[2] 172.XX.XX.XX6 #7: ignoring informational payload, type IPSEC_INITIAL_CONTACT msgid=00000000
May 15 09:56:06 AlmondPlus authpriv.warn pluto[13651]: "myvpn"[2] 172.XX.XX.XX6 #7: received and ignored informational message
May 15 09:56:07 AlmondPlus authpriv.warn pluto[13651]: "myvpn"[2] 172.XX.XX.XX6 #7: the peer proposed: 173.XX.XXX.XX4/32:17/1701 -> 192.0.0.4/32:17/0
May 15 09:56:07 AlmondPlus authpriv.warn pluto[13651]: "myvpn"[2] 172.XX.XX.XX6 #8: responding to Quick Mode proposal {msgid:6bd63ebc}
May 15 09:56:07 AlmondPlus authpriv.warn pluto[13651]: "myvpn"[2] 172.XX.XX.XX6 #8:     us: 192.168.1.154<192.168.1.154>:17/1701
May 15 09:56:07 AlmondPlus authpriv.warn pluto[13651]: "myvpn"[2] 172.XX.XX.XX6 #8:   them: 172.XX.XX.XX6[192.0.0.4]:17/0
May 15 09:56:07 AlmondPlus authpriv.warn pluto[13651]: "myvpn"[2] 172.XX.XX.XX6 #8: keeping refhim=4294901761 during rekey
May 15 09:56:07 AlmondPlus authpriv.warn pluto[13651]: "myvpn"[2] 172.XX.XX.XX6 #8: transition from state STATE_QUICK_R0 to state STATE_QUICK_R1
May 15 09:56:07 AlmondPlus authpriv.warn pluto[13651]: "myvpn"[2] 172.XX.XX.XX6 #8: STATE_QUICK_R1: sent QR1, inbound IPsec SA installed, expecting QI2
May 15 09:56:07 AlmondPlus authpriv.warn pluto[13651]: "myvpn"[2] 172.XX.XX.XX6 #8: transition from state STATE_QUICK_R1 to state STATE_QUICK_R2
May 15 09:56:07 AlmondPlus authpriv.warn pluto[13651]: "myvpn"[2] 172.XX.XX.XX6 #8: STATE_QUICK_R2: IPsec SA established transport mode {ESP=>0x0ef7fd52 <0x1bb91d12 xfrm=AES_256-HMAC_SHA2_256 NATOA=none NATD=172.XX.XX.XX6:58832 DPD=none}

Code: [Select]
May 15 09:56:37 AlmondPlus authpriv.warn pluto[13651]: "myvpn"[5] 70.XXX.XXX.X4 #9: responding to Main Mode from unknown peer 70.XXX.XXX.X4
May 15 09:56:37 AlmondPlus authpriv.warn pluto[13651]: "myvpn"[5] 70.XXX.XXX.X4 #9: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
May 15 09:56:37 AlmondPlus authpriv.warn pluto[13651]: "myvpn"[5] 70.XXX.XXX.X4 #9: STATE_MAIN_R1: sent MR1, expecting MI2
May 15 09:56:38 AlmondPlus authpriv.warn pluto[13651]: "myvpn"[5] 70.XXX.XXX.X4 #9: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike (MacOS X): both are NATed
May 15 09:56:38 AlmondPlus authpriv.warn pluto[13651]: "myvpn"[5] 70.XXX.XXX.X4 #9: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
May 15 09:56:38 AlmondPlus authpriv.warn pluto[13651]: "myvpn"[5] 70.XXX.XXX.X4 #9: STATE_MAIN_R2: sent MR2, expecting MI3
May 15 09:56:38 AlmondPlus authpriv.warn pluto[13651]: "myvpn"[5] 70.XXX.XXX.X4 #9: ignoring informational payload, type IPSEC_INITIAL_CONTACT msgid=00000000
May 15 09:56:38 AlmondPlus authpriv.warn pluto[13651]: "myvpn"[5] 70.XXX.XXX.X4 #9: Main mode peer ID is ID_IPV4_ADDR: '100.98.82.95'
May 15 09:56:38 AlmondPlus authpriv.warn pluto[13651]: "myvpn"[5] 70.XXX.XXX.X4 #9: switched from "myvpn" to "myvpn"
May 15 09:56:38 AlmondPlus authpriv.warn pluto[13651]: "myvpn"[6] 70.XXX.XXX.X4 #9: deleting connection "myvpn" instance with peer 70.XXX.XXX.X4 {isakmp=#0/ipsec=#0}
May 15 09:56:38 AlmondPlus authpriv.warn pluto[13651]: "myvpn"[6] 70.XXX.XXX.X4 #9: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
May 15 09:56:38 AlmondPlus authpriv.warn pluto[13651]: "myvpn"[6] 70.XXX.XXX.X4 #9: new NAT mapping for #9, was 70.XXX.XXX.X4:5914, now 70.XXX.XXX.X4:5911
May 15 09:56:38 AlmondPlus authpriv.warn pluto[13651]: "myvpn"[6] 70.XXX.XXX.X4 #9: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=aes_256 prf=OAKLEY_SHA2_256 group=modp2048}
May 15 09:56:38 AlmondPlus authpriv.warn pluto[13651]: "myvpn"[6] 70.XXX.XXX.X4 #9: the peer proposed: 173.XX.XXX.XX4/32:17/1701 -> 100.98.82.95/32:17/0
May 15 09:56:38 AlmondPlus authpriv.warn pluto[13651]: "myvpn"[6] 70.XXX.XXX.X4 #9: NAT-Traversal: received 2 NAT-OA. using first, ignoring others
May 15 09:56:38 AlmondPlus authpriv.warn pluto[13651]: "myvpn"[6] 70.XXX.XXX.X4 #10: responding to Quick Mode proposal {msgid:987c2885}
May 15 09:56:38 AlmondPlus authpriv.warn pluto[13651]: "myvpn"[6] 70.XXX.XXX.X4 #10:     us: 192.168.1.154<192.168.1.154>:17/1701
May 15 09:56:38 AlmondPlus authpriv.warn pluto[13651]: "myvpn"[6] 70.XXX.XXX.X4 #10:   them: 70.XXX.XXX.X4[100.98.82.95]:17/64931
May 15 09:56:38 AlmondPlus authpriv.warn pluto[13651]: "myvpn"[6] 70.XXX.XXX.X4 #10: transition from state STATE_QUICK_R0 to state STATE_QUICK_R1
May 15 09:56:38 AlmondPlus authpriv.warn pluto[13651]: "myvpn"[6] 70.XXX.XXX.X4 #10: STATE_QUICK_R1: sent QR1, inbound IPsec SA installed, expecting QI2
May 15 09:56:39 AlmondPlus authpriv.warn pluto[13651]: "myvpn"[6] 70.XXX.XXX.X4 #10: transition from state STATE_QUICK_R1 to state STATE_QUICK_R2
May 15 09:56:39 AlmondPlus authpriv.warn pluto[13651]: "myvpn"[6] 70.XXX.XXX.X4 #10: STATE_QUICK_R2: IPsec SA established transport mode {ESP=>0x06cdb726 <0x3a3c3121 xfrm=AES_256-HMAC_SHA1 NATOA=100.98.82.95 NATD=70.XXX.XXX.X4:5911 DPD=none}


Offline SecureComp

  • Backer
  • *
  • Posts: 541
  • Thanks: 1
  • Registered : 05/08/2014
    YearsYearsYearsYearsYearsYearsYearsYearsYearsYearsYears
Re: VPN Server Connection Problems
« Reply #1 on: May 15, 2016, 05:54:30 pm »
I have the VPN working with Android on several phones and versions of the OS.

What are the details of your VPN config?  no need to include passwords, etc.

VPN Type - IPSec Server
IPSec Policy - Pre-Shared Key
Pre Shared Key - xxxxxxxx
Local Endpoint Address - WAN IP
Local IP Address - router IP


Android setup
L2TP/IPSec VPN

Kickstarter Backer
Securifi Wiki Editor and Beta Tester, Not a Securifi employee
Almond+, many sensors, IOS App, Android Apps and Widgets

Offline derrikn

  • Backer
  • *
  • Posts: 15
  • Thanks: 0
  • Registered : 21/09/2014
    YearsYearsYearsYearsYearsYearsYearsYearsYearsYearsYears
Re: VPN Server Connection Problems
« Reply #2 on: May 15, 2016, 08:41:48 pm »
That may be my issue. I currently have a FIOS router acting as my modem with a local IP of 192.168.1.1. My Almond+ is connected to the FIOS rounter as DMZ Host with WAN IP set to 192.168.1.154.
I'm not sure if I need to force the Android to pick something other than 192.xxx.xxx.xxx

VPN Type - IPSec Server
IPSec Policy - Pre-Shared Key
Pre Shared Key - xxxxxxxx
Local Endpoint Address - 192.168.1.154
Local IP Address - 10.10.10.1

Android setup
L2TP/IPSec PSK

Offline Ashok

  • Securifi Staff
  • *
  • Posts: 2770
  • Thanks: 3
  • Registered : 25/07/2014
    YearsYearsYearsYearsYearsYearsYearsYearsYearsYearsYears
Re: VPN Server Connection Problems
« Reply #3 on: May 16, 2016, 03:05:55 pm »
@ derrikn,

VPN server could be created only when the Almond+ is setup in Router mode by receiving the direct WAN IP.  Hence, you may have to setup the Verizon Fios modem completely under bridge mode and then use the Almond+ in Router mode.

Offline derrikn

  • Backer
  • *
  • Posts: 15
  • Thanks: 0
  • Registered : 21/09/2014
    YearsYearsYearsYearsYearsYearsYearsYearsYearsYearsYears
Re: VPN Server Connection Problems
« Reply #4 on: May 17, 2016, 12:41:37 am »
Thanks Ashok. I'll try contacting my Fios provider to see if they can put my router in bridge mode.

Offline tastewar1

  • Backer
  • *
  • Posts: 36
  • Thanks: 0
  • Registered : 20/08/2014
    YearsYearsYearsYearsYearsYearsYearsYearsYearsYearsYears
Re: VPN Server Connection Problems
« Reply #5 on: May 17, 2016, 10:36:41 am »
I'd be curious to learn if you have any luck with VZ. I have had my A+ in front of my VZ provided router for a number of reasons, but on the downside, it makes it (nearly?) impossible to use some of the fancy features of Fios.

Offline derrikn

  • Backer
  • *
  • Posts: 15
  • Thanks: 0
  • Registered : 21/09/2014
    YearsYearsYearsYearsYearsYearsYearsYearsYearsYearsYears
Re: VPN Server Connection Problems
« Reply #6 on: May 17, 2016, 09:33:58 pm »
I am now a new Frontier customer since Verizon sold their Fios business to them. I was told last night that I would have to purchase a "Premium Support" subscription to have tech support put my router in Bridge mode. Still SMH on that news.

Offline SecureComp

  • Backer
  • *
  • Posts: 541
  • Thanks: 1
  • Registered : 05/08/2014
    YearsYearsYearsYearsYearsYearsYearsYearsYearsYearsYears
Re: VPN Server Connection Problems
« Reply #7 on: May 17, 2016, 10:02:37 pm »
I am now a new Frontier customer since Verizon sold their Fios business to them. I was told last night that I would have to purchase a "Premium Support" subscription to have tech support put my router in Bridge mode. Still SMH on that news.

You can get the Admin password for your router and do it yourself if you are so inclined.
Kickstarter Backer
Securifi Wiki Editor and Beta Tester, Not a Securifi employee
Almond+, many sensors, IOS App, Android Apps and Widgets

Offline derrikn

  • Backer
  • *
  • Posts: 15
  • Thanks: 0
  • Registered : 21/09/2014
    YearsYearsYearsYearsYearsYearsYearsYearsYearsYearsYears
Re: VPN Server Connection Problems
« Reply #8 on: May 18, 2016, 12:26:47 am »
Everything I've read online says the Fios company will need to enable Bridge mode on a FIOS-G1100.
If that isn't the case, I'd love to be able to do it on my own.

Offline SecureComp

  • Backer
  • *
  • Posts: 541
  • Thanks: 1
  • Registered : 05/08/2014
    YearsYearsYearsYearsYearsYearsYearsYearsYearsYearsYears
Re: VPN Server Connection Problems
« Reply #9 on: May 18, 2016, 12:56:21 am »
No that's not correct.

They certainly don't want folks doing and discourage any DIY efforts because it impacts an potential support issues.

There are other factors to consider, what are you using FIOS for?
Internet Only
TV Internet
TV Internet Voice

Also which modem do you have?

That said, making a call to customer support is not a big deal, signing up for whatever package they require is the i$$ue.

Check and see, after signing up for whatever support package, if you can opt out after 30 days, leaving your config in place.

Kickstarter Backer
Securifi Wiki Editor and Beta Tester, Not a Securifi employee
Almond+, many sensors, IOS App, Android Apps and Widgets

Offline Zimmie

  • Backer
  • *
  • Posts: 10
  • Thanks: 0
  • Registered : 20/09/2014
    YearsYearsYearsYearsYearsYearsYearsYearsYearsYearsYears
Re: VPN Server Connection Problems
« Reply #10 on: May 23, 2016, 07:11:00 pm »
I got my "FiOS Quantum Gateway" (appears to be the same thing as the G1100) into bridge mode. Did it a few months ago, so I don't recall the exact details. I will try to find the specifics. I only have FiOS for Internet access. My ONT is very inconveniently located (they even drilled through a wall to run the power cord), otherwise I would just use the Ethernet jack directly.

On your VPN issue, though, you're right. Something weird is definitely going on. 192.0.0.0/29 is a block specifically reserved for what is called "Dual Stack Lite" operation (RFC 6333). Can you test it with the Android phone on WiFi on someone else's network? For example, enable tethering on the iPhone, connect the Android phone to the iPhone's WiFi network, then test?

Offline derrikn

  • Backer
  • *
  • Posts: 15
  • Thanks: 0
  • Registered : 21/09/2014
    YearsYearsYearsYearsYearsYearsYearsYearsYearsYearsYears
Re: VPN Server Connection Problems
« Reply #11 on: May 25, 2016, 12:02:51 am »
No that's not correct.

They certainly don't want folks doing and discourage any DIY efforts because it impacts an potential support issues.

There are other factors to consider, what are you using FIOS for?
Internet Only
TV Internet
TV Internet Voice

Also which modem do you have?

That said, making a call to customer support is not a big deal, signing up for whatever package they require is the i$$ue.

Check and see, after signing up for whatever support package, if you can opt out after 30 days, leaving your config in place.
I only have FIOS internet with no other services.

So, I tried calling Frontier and after spending too much time dealing with them I was told they can't enable Bridge mode.

Offline derrikn

  • Backer
  • *
  • Posts: 15
  • Thanks: 0
  • Registered : 21/09/2014
    YearsYearsYearsYearsYearsYearsYearsYearsYearsYearsYears
Re: VPN Server Connection Problems
« Reply #12 on: May 25, 2016, 12:11:07 am »
I got my "FiOS Quantum Gateway" (appears to be the same thing as the G1100) into bridge mode. Did it a few months ago, so I don't recall the exact details. I will try to find the specifics. I only have FiOS for Internet access. My ONT is very inconveniently located (they even drilled through a wall to run the power cord), otherwise I would just use the Ethernet jack directly.

On your VPN issue, though, you're right. Something weird is definitely going on. 192.0.0.0/29 is a block specifically reserved for what is called "Dual Stack Lite" operation (RFC 6333). Can you test it with the Android phone on WiFi on someone else's network? For example, enable tethering on the iPhone, connect the Android phone to the iPhone's WiFi network, then test?
I would appreciate any help getting my G1100 in bridge mode. I've been looking, but haven't found anything that works.

Here is what happened when I tried to enable VPN on my Android phone while connected to my iPad's hotspot:
Code: [Select]
May 24 14:50:08 AlmondPlus authpriv.warn pluto[4090]: packet from 70.xxx.xxx.xxx:3211: received Vendor ID payload [RFC 3947] method set to=115
May 24 14:50:08 AlmondPlus authpriv.warn pluto[4090]: packet from 70.xxx.xxx.xxx:3211: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02] meth=107, but already using method 115
May 24 14:50:08 AlmondPlus authpriv.warn pluto[4090]: packet from 70.xxx.xxx.xxx:3211: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] meth=106, but already using method 115
May 24 14:50:08 AlmondPlus authpriv.warn pluto[4090]: packet from 70.xxx.xxx.xxx:3211: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
May 24 14:50:08 AlmondPlus authpriv.warn pluto[4090]: packet from 70.xxx.xxx.xxx:3211: ignoring Vendor ID payload [FRAGMENTATION 80000000]
May 24 14:50:08 AlmondPlus authpriv.warn pluto[4090]: packet from 70.xxx.xxx.xxx:3211: received Vendor ID payload [Dead Peer Detection]
May 24 14:50:08 AlmondPlus authpriv.warn pluto[4090]: "myvpn"[3] 70.xxx.xxx.xxx #4: responding to Main Mode from unknown peer 70.xxx.xxx.xxx
May 24 14:50:08 AlmondPlus authpriv.warn pluto[4090]: "myvpn"[3] 70.xxx.xxx.xxx #4: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
May 24 14:50:08 AlmondPlus authpriv.warn pluto[4090]: "myvpn"[3] 70.xxx.xxx.xxx #4: STATE_MAIN_R1: sent MR1, expecting MI2
May 24 14:50:08 AlmondPlus authpriv.warn pluto[4090]: "myvpn"[3] 70.xxx.xxx.xxx #4: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike (MacOS X): both are NATed
May 24 14:50:08 AlmondPlus authpriv.warn pluto[4090]: "myvpn"[3] 70.xxx.xxx.xxx #4: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
May 24 14:50:08 AlmondPlus authpriv.warn pluto[4090]: "myvpn"[3] 70.xxx.xxx.xxx #4: STATE_MAIN_R2: sent MR2, expecting MI3
May 24 14:50:08 AlmondPlus authpriv.warn pluto[4090]: "myvpn"[3] 70.xxx.xxx.xxx #4: Main mode peer ID is ID_IPV4_ADDR: '172.xxx.11.12'
May 24 14:50:08 AlmondPlus authpriv.warn pluto[4090]: "myvpn"[3] 70.xxx.xxx.xxx #4: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
May 24 14:50:08 AlmondPlus authpriv.warn pluto[4090]: "myvpn"[3] 70.xxx.xxx.xxx #4: new NAT mapping for #4, was 70.xxx.xxx.xxx:3211, now 70.xxx.xxx.xxx:3204
May 24 14:50:08 AlmondPlus authpriv.warn pluto[4090]: "myvpn"[3] 70.xxx.xxx.xxx #4: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=aes_256 prf=OAKLEY_SHA2_256 group=modp1024}
May 24 14:50:08 AlmondPlus authpriv.warn pluto[4090]: "myvpn"[3] 70.xxx.xxx.xxx #4: ignoring informational payload, type IPSEC_INITIAL_CONTACT msgid=00000000
May 24 14:50:08 AlmondPlus authpriv.warn pluto[4090]: "myvpn"[3] 70.xxx.xxx.xxx #4: received and ignored informational message
May 24 14:50:09 AlmondPlus authpriv.warn pluto[4090]: "myvpn"[3] 70.xxx.xxx.xxx #4: the peer proposed: 17x.5x.xx3.1xx/32:17/1701 -> 172.xxx.11.12/32:17/0
May 24 14:50:09 AlmondPlus authpriv.warn pluto[4090]: "myvpn"[3] 70.xxx.xxx.xxx #5: responding to Quick Mode proposal {msgid:5db5a2d9}
May 24 14:50:09 AlmondPlus authpriv.warn pluto[4090]: "myvpn"[3] 70.xxx.xxx.xxx #5:     us: 192.168.1.154<192.168.1.154>:17/1701
May 24 14:50:09 AlmondPlus authpriv.warn pluto[4090]: "myvpn"[3] 70.xxx.xxx.xxx #5:   them: 70.xxx.xxx.xxx[172.xxx.11.12]:17/0
May 24 14:50:09 AlmondPlus authpriv.warn pluto[4090]: "myvpn"[3] 70.xxx.xxx.xxx #5: keeping refhim=4294901761 during rekey
May 24 14:50:09 AlmondPlus authpriv.warn pluto[4090]: "myvpn"[3] 70.xxx.xxx.xxx #5: transition from state STATE_QUICK_R0 to state STATE_QUICK_R1
May 24 14:50:09 AlmondPlus authpriv.warn pluto[4090]: "myvpn"[3] 70.xxx.xxx.xxx #5: STATE_QUICK_R1: sent QR1, inbound IPsec SA installed, expecting QI2
May 24 14:50:10 AlmondPlus authpriv.warn pluto[4090]: "myvpn"[3] 70.xxx.xxx.xxx #5: transition from state STATE_QUICK_R1 to state STATE_QUICK_R2
May 24 14:50:10 AlmondPlus authpriv.warn pluto[4090]: "myvpn"[3] 70.xxx.xxx.xxx #5: STATE_QUICK_R2: IPsec SA established transport mode {ESP=>0x0931ba88 <0x7a5f407a xfrm=AES_256-HMAC_SHA2_256 NATOA=none NATD=70.xxx.xxx.xxx:3204 DPD=none}

Offline tastewar1

  • Backer
  • *
  • Posts: 36
  • Thanks: 0
  • Registered : 20/08/2014
    YearsYearsYearsYearsYearsYearsYearsYearsYearsYearsYears
Re: VPN Server Connection Problems
« Reply #13 on: May 25, 2016, 08:49:06 am »
So if you only have their internet, why not make your A+ the gateway router?

Offline derrikn

  • Backer
  • *
  • Posts: 15
  • Thanks: 0
  • Registered : 21/09/2014
    YearsYearsYearsYearsYearsYearsYearsYearsYearsYearsYears
Re: VPN Server Connection Problems
« Reply #14 on: May 26, 2016, 03:22:44 am »
So if you only have their internet, why not make your A+ the gateway router?
My FIOS router's WAN connection uses COAX, not RJ45.

 

Page created in 0.036 seconds with 16 queries.

bottleneck