• April 24, 2024, 01:07:14 PM
  • Welcome, Guest
Please login or register.

Login with username, password and session length
Advanced search  

News:

This Forum Beta is ONLY for registered owners of D-Link products in the USA for which we have created boards at this time.

Author Topic: Dlf 260e ipsec vpn xauth tunnel with iphone or android problem  (Read 5619 times)

5umm1

  • Level 1 Member
  • *
  • Posts: 1

Cant setup ipsec tunnel with xauth between Dfl 260e and any mobile divice. Here is logs and settings. http://rghost.ru/57336295

Date   Severity   Category/ID   Rule   Proto   Src/DstIf   Src/DstIP   Src/DstPort   Event/Action
2012-05-22
03:55:09   Info   IPSEC
1802030         


ike_sa_negotiation_failed
no_ike_sa
2012-05-22
03:55:09   Warning   IPSEC
1802715         


event_on_ike_sa
side=Initiator msg="not done" int_severity=6
2012-05-22
03:55:09   Info   IPSEC
1800317         


peer_is_dead
IPsec_tunnel_disabled
peer=255.255.255.255
2012-05-22
03:54:57   Info   IPSEC
1802030         


ike_sa_negotiation_failed
no_ike_sa
2012-05-22
03:54:57   Warning   IPSEC
1802715         


event_on_ike_sa
side=Initiator msg="not done" int_severity=6
2012-05-22
03:54:55   Info   IPSEC
1803021         


ipsec_sa_statistics
done=56 success=0 failed=56
2012-05-22
03:54:55   Warning   IPSEC
1800109         


ike_quickmode_failed
local_ip=93.174.242.226 remote_ip=213.33.244.166 cookies=d318ab39726d76ec6713350ee7dfff8b reason="No proposal chosen"
2012-05-22
03:54:55   Warning   IPSEC
1803020         


ipsec_sa_failed
no_ipsec_sa
statusmsg="No proposal chosen"
2012-05-22
03:54:55   Info   IPSEC
1800102         


ipsec_event
message=" Remote Proxy ID 192.168.2.59 any"
2012-05-22
03:54:55   Info   IPSEC
1800102         


ipsec_event
message=" Local Proxy ID 0.0.0.0/0 any"
2012-05-22
03:54:55   Info   IPSEC
1802703         


ike_sa_negotiation_completed
ike_sa_completed
local_peer="93.174.242.226:4500 ID 93.174.242.226" remote_peer="213.33.244.166:4500 ID 61 64 6d 69 " initiator_spi="d318ab39 726d76ec" responder_spi="6713350e e7dfff8b" int_severity=6
2012-05-22
03:54:55   Info   IPSEC
1800102         


ipsec_event
message="IPsec SA [Responder] negotiation failed:"
2012-05-22
03:54:55   Notice   IPSEC
1802300         


rule_selection_failed
info="Quick-Mode local ID mismatch" int_severity=6
2012-05-22
03:54:55   Info   IPSEC
1803001         


failed_to_select_policy_rule
2012-05-22
03:54:55   Warning   IPSEC
1800102         


ipsec_event
message=" Remote Proxy ID 192.168.2.59 any"
2012-05-22
03:54:55   Warning   IPSEC
1800102         


ipsec_event
message=" Local Proxy ID 0.0.0.0/0 any"
2012-05-22
03:54:55   Info   IPSEC
1802703         


ike_sa_negotiation_completed
ike_sa_completed
local_peer="93.174.242.226:4500 ID 93.174.242.226" remote_peer="213.33.244.166:4500 ID 61 64 6d 69 " initiator_spi="d318ab39 726d76ec" responder_spi="6713350e e7dfff8b" int_severity=4
2012-05-22
03:54:55   Warning   IPSEC
1800102         


ipsec_event
message="IPsec SA [Responder] negotiation failed:"
2012-05-22
03:54:55   Info   IPSEC
1803024         


xauth_exchange_done
statusmsg="Authentication done"
2012-05-22
03:54:55   Info   IPSEC
1803023         


config_mode_exchange_event
msg="IP address 192.168.2.59/16 assigned for client"
2012-05-22
03:54:55   Info   IPSEC
1802703         


ike_sa_negotiation_completed
ike_sa_completed
local_peer="93.174.242.226:4500 ID 93.174.242.226" remote_peer="213.33.244.166:4500 ID 61 64 6d 69 " initiator_spi="d318ab39 726d76ec" responder_spi="6713350e e7dfff8b" int_severity=6
2012-05-22
03:54:55   Info   IPSEC
1802709         


cfgmode_exchange_event
cfgmode=REPLY msg=completed int_severity=6
2012-05-22
03:54:55   Info   IPSEC
1802703         


ike_sa_negotiation_completed
ike_sa_completed
local_peer="93.174.242.226:4500 ID 93.174.242.226" remote_peer="213.33.244.166:4500 ID 61 64 6d 69 " initiator_spi="d318ab39 726d76ec" responder_spi="6713350e e7dfff8b" int_severity=6
2012-05-22
03:54:55   Info   IPSEC
1802024         


ike_sa_negotiation_completed
options="Responder, NAT-T" mode="Aggressive Mode" auth="XAUTH I pre-shared keys" encryption=aes-cbc keysize=256 hash=sha1 dhgroup=2 bits=1024 lifetime=3600
2012-05-22
03:54:45   Info   IPSEC
1802030         


ike_sa_negotiation_failed
no_ike_sa
2012-05-22
03:54:45   Warning   IPSEC
1802715         


event_on_ike_sa
side=Initiator msg="not done" int_severity=6
2012-05-22
03:54:45   Info   IPSEC
1800317         


peer_is_dead
IPsec_tunnel_disabled
peer=255.255.255.255
2012-05-22
03:54:33   Info   IPSEC
1802030         


ike_sa_negotiation_failed
no_ike_sa
2012-05-22
03:54:33   Warning   IPSEC
1802715         


event_on_ike_sa
side=Initiator msg="not done" int_severity=6
2012-05-22
03:54:21   Info   IPSEC
1802030         


ike_sa_negotiation_failed
no_ike_sa
2012-05-22
03:54:21   Warning   IPSEC
1802715         


event_on_ike_sa
side=Initiator msg="not done" int_severity=6
2012-05-22
03:54:21   Info   IPSEC
1800317         


peer_is_dead
IPsec_tunnel_disabled
peer=255.255.255.255
Logged

FurryNutz

  • Poweruser
  •   ▲
    ▲ ▲
  • *****
  • Posts: 49923
  • D-Link Global Forum Moderator
    • Router Troubleshooting
Re: Dlf 260e ipsec vpn xauth tunnel with iphone or android problem
« Reply #1 on: November 07, 2014, 10:18:12 AM »

Any status on this?  ???
Logged
Cable: 1Gb/50Mb>NetGear CM1200>DIR-882>HP 24pt Gb Switch. COVR-1202/2202/3902,DIR-2660/80,3xDGL-4500s,DIR-LX1870,857,835,827,815,890L,880L,868L,836L,810L,685,657,3x655s,645,628,601,DNR-202L,DNS-345,DCS-933L,936L,960L and 8000LH.