Hello all,<br><br>I've been working to get my ipsec VPN working and it does for my laptop but when I try to connect using my android phone l2tp seems to fail.<br>The ipsec connection is succesfull (I guess...), "ipsec setup status" show one tunnel active.<br>
I've compared the plutosterr log files and syslog files when making both connections, and the difference seems to be the following:<br>from plutostderr log:<br> phone: "L2TP"[2] 87.212.84.1 #1: the peer proposed: <a href="http://85.17.206.174/32:17/1701">85.17.206.174/32:17/1701</a> -> <a href="http://87.212.84.1/32:17/0">87.212.84.1/32:17/0</a><br>
laptop: "L2TP"[2] 87.212.84.1 #1: the peer proposed: <a href="http://85.17.206.174/32:17/1701">85.17.206.174/32:17/1701</a> -> <a href="http://192.168.1.8/32:17/0">192.168.1.8/32:17/0</a><br><br>In the syslog of "laptop" there comes a lot log messages, the syslog of a "phone" connection remains empty...<br>
Below the configuration of ipsec/xl2tpd and version used, in the end th full log output of plutosterr log from where I've extracted the above difference.<br><br>!versions:<br>distribution: ubuntu 10.04<br>uname -r: 2.6.32-41-generic<br>
openswan version: U2.6.34/K2.6.32-41-generic (netkey)<br>xl2tpd version: xl2tpd-1.2.6<br><br>!configuration files:<br><ipsec.conf><br>version 2.0 # conforms to second version of ipsec.conf specification<br><br>
config setup<br> # NAT-TRAVERSAL support, see README.NAT-Traversal<br> nat_traversal=yes<br> listen=XX.XX.XX.174<br> # exclude networks used on server side by adding %v4:!a.b.c.0/24<br>
virtual_private=%v4:<a href="http://10.0.0.0/8,%v4:192.168.0.0/16,%v4:172.16.0.0/12">10.0.0.0/8,%v4:192.168.0.0/16,%v4:172.16.0.0/12</a><br> # OE is now off by default. Uncomment and change to on, to enable.<br>
oe=off<br> # which IPsec stack to use. netkey,klips,mast,auto or none<br> protostack=netkey<br> plutostderrlog=/var/log/pluto.log<br><br> # Add connections here<br> nhelpers=0<br>
<br>conn L2TP<br> authby=secret<br> auto=add<br> pfs=no<br> type=transport<br> rekey=no<br> compress=yes<br> left=XX.XX.XX.174<br> leftnexthop=XX.XX.XX.254<br>
leftprotoport=17/1701<br> right=%any<br> rightsubnet=vhost:%no,%priv<br> rightprotoport=17/%any<br> forceencaps=yes<br> dpddelay=40<br> dpdtimeout=130<br>
dpdaction=clear<br></ipsec.conf><br><br><xl2tpd.conf><br>[global] <br> auth file = /etc/ppp/chap-secrets<br> port = 1701<br> debug tunnel = yes<br> debug avp = yes<br> debug packet = yes<br>
debug network = yes<br> debug state = yes<br><br>[lns default]<br> ip range = 192.168.4.51-192.168.4.55<br> local ip = 192.168.4.1<br> require chap = yes<br> refuse pap = yes<br> require authentication = yes<br>
name = <a href="http://verweggistan.eu">verweggistan.eu</a><br> ppp debug = yes<br> pppoptfile = /etc/ppp/options.xl2tpd<br> length bit = yes<br></xl2tpd.conf><br><br><options.xl2tpd><br>ipcp-accept-local<br>
ipcp-accept-remote<br>noccp<br>modem<br>auth<br>idle 1800<br>mtu 1410<br>mru 1410<br>noreplacedefaultroute<br>debug<br>lock<br>proxyarp<br>connect-delay 5000<br></options.xl2tpd><br><br>!full plutostderr logs of both connections:<br>
<plutosterr connect from laptop><br>packet from XX.XX.XX.1:500: ignoring unknown Vendor ID payload [4f45755c645c6a795c5c6170]<br>packet from XX.XX.XX.1:500: received Vendor ID payload [Dead Peer Detection]<br>packet from XX.XX.XX.1:500: received Vendor ID payload [RFC 3947] method set to=109 <br>
packet from XX.XX.XX.1:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03] meth=108, but already using method 109<br>packet from XX.XX.XX.1:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] meth=106, but already using method 109<br>
packet from XX.XX.XX.1:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02] meth=107, but already using method 109<br>packet from XX.XX.XX.1:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]<br>sh: /bin/openswan-statsd: not found<br>
"L2TP"[1] XX.XX.XX.1 #1: responding to Main Mode from unknown peer XX.XX.XX.1<br>"L2TP"[1] XX.XX.XX.1 #1: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1<br>"L2TP"[1] XX.XX.XX.1 #1: STATE_MAIN_R1: sent MR1, expecting MI2<br>
"L2TP"[1] XX.XX.XX.1 #1: NAT-Traversal: Result using RFC 3947 (NAT-Traversal): both are NATed<br>"L2TP"[1] XX.XX.XX.1 #1: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2<br>sh: /bin/openswan-statsd: not found<br>
"L2TP"[1] XX.XX.XX.1 #1: STATE_MAIN_R2: sent MR2, expecting MI3<br>"L2TP"[1] XX.XX.XX.1 #1: Main mode peer ID is ID_IPV4_ADDR: '192.168.1.8'<br>"L2TP"[1] XX.XX.XX.1 #1: switched from "L2TP" to "L2TP"<br>
"L2TP"[2] XX.XX.XX.1 #1: deleting connection "L2TP" instance with peer XX.XX.XX.1 {isakmp=#0/ipsec=#0}<br>"L2TP"[2] XX.XX.XX.1 #1: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3<br>
sh: /bin/openswan-statsd: not found<br>"L2TP"[2] XX.XX.XX.1 #1: new NAT mapping for #1, was XX.XX.XX.1:500, now XX.XX.XX.1:4500<br>"L2TP"[2] XX.XX.XX.1 #1: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=aes_128 prf=oakley_sha group=modp2048}<br>
"L2TP"[2] XX.XX.XX.1 #1: Dead Peer Detection (RFC 3706): enabled<br>"L2TP"[2] XX.XX.XX.1 #1: the peer proposed: XX.XX.XX.174/32:17/1701 -> <a href="http://192.168.1.8/32:17/0">192.168.1.8/32:17/0</a><br>
"L2TP"[2] XX.XX.XX.1 #1: NAT-Traversal: received 2 NAT-OA. using first, ignoring others<br>sh: /bin/openswan-statsd: not found<br>"L2TP"[2] XX.XX.XX.1 #2: responding to Quick Mode proposal {msgid:2e70fdae}<br>
"L2TP"[2] XX.XX.XX.1 #2: us: XX.XX.XX.174<XX.XX.XX.174>[+S=C]:17/1701---XX.XX.XX.254<br>"L2TP"[2] XX.XX.XX.1 #2: them: XX.XX.XX.1[192.168.1.8,+S=C]:17/1701===<a href="http://192.168.1.8/32">192.168.1.8/32</a><br>
"L2TP"[2] XX.XX.XX.1 #2: transition from state STATE_QUICK_R0 to state STATE_QUICK_R1<br>"L2TP"[2] XX.XX.XX.1 #2: STATE_QUICK_R1: sent QR1, inbound IPsec SA installed, expecting QI2<br>"L2TP"[2] XX.XX.XX.1 #2: Dead Peer Detection (RFC 3706): enabled<br>
"L2TP"[2] XX.XX.XX.1 #2: transition from state STATE_QUICK_R1 to state STATE_QUICK_R2<br>sh: /bin/openswan-statsd: not found<br>"L2TP"[2] XX.XX.XX.1 #2: STATE_QUICK_R2: IPsec SA established transport mode {ESP/NAT=>0x48efebac <0xd3066c7a xfrm=AES_128-HMAC_SHA1 NATOA=192.168.1.8 NATD=XX.XX.XX.1:4500 DPD=enabled}<br>
</plutostderr connect from laptop><br><br><plutosterr connect from phone><br>adding interface eth0/eth0 XX.XX.XX.174:500<br>adding interface eth0/eth0 XX.XX.XX.174:4500<br>skipping interface lo with 127.0.0.1<br>
skipping interface lo with ::1<br>loading secrets from "/etc/ipsec.secrets"<br>packet from XX.XX.XX.1:60500: ignoring unknown Vendor ID payload [f758f22668750f03b08df6ebe1d00403]<br>packet from XX.XX.XX.1:60500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02] method set to=107 <br>
packet from XX.XX.XX.1:60500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] meth=106, but already using method 107<br>packet from XX.XX.XX.1:60500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03] method set to=108 <br>
packet from XX.XX.XX.1:60500: received Vendor ID payload [RFC 3947] method set to=109 <br>packet from XX.XX.XX.1:60500: received Vendor ID payload [Dead Peer Detection]<br>sh: /bin/openswan-statsd: not found<br>"L2TP"[1] XX.XX.XX.1 #1: responding to Main Mode from unknown peer XX.XX.XX.1<br>
"L2TP"[1] XX.XX.XX.1 #1: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1<br>"L2TP"[1] XX.XX.XX.1 #1: STATE_MAIN_R1: sent MR1, expecting MI2<br>"L2TP"[1] XX.XX.XX.1 #1: NAT-Traversal: Result using RFC 3947 (NAT-Traversal): both are NATed<br>
"L2TP"[1] XX.XX.XX.1 #1: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2<br>sh: /bin/openswan-statsd: not found<br>"L2TP"[1] XX.XX.XX.1 #1: STATE_MAIN_R2: sent MR2, expecting MI3<br>"L2TP"[1] XX.XX.XX.1 #1: ignoring informational payload, type IPSEC_INITIAL_CONTACT msgid=00000000<br>
"L2TP"[1] XX.XX.XX.1 #1: Main mode peer ID is ID_IPV4_ADDR: '192.168.1.7'<br>"L2TP"[1] XX.XX.XX.1 #1: switched from "L2TP" to "L2TP"<br>"L2TP"[2] XX.XX.XX.1 #1: deleting connection "L2TP" instance with peer XX.XX.XX.1 {isakmp=#0/ipsec=#0}<br>
"L2TP"[2] XX.XX.XX.1 #1: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3<br>sh: /bin/openswan-statsd: not found<br>"L2TP"[2] XX.XX.XX.1 #1: new NAT mapping for #1, was XX.XX.XX.1:60500, now XX.XX.XX.1:64500<br>
"L2TP"[2] XX.XX.XX.1 #1: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=aes_128 prf=oakley_sha group=modp1024}<br>"L2TP"[2] XX.XX.XX.1 #1: Dead Peer Detection (RFC 3706): enabled<br>
"L2TP"[2] XX.XX.XX.1 #1: peer client type is FQDN<br>"L2TP"[2] XX.XX.XX.1 #1: Applying workaround for MS-818043 NAT-T bug<br>"L2TP"[2] XX.XX.XX.1 #1: the peer proposed: XX.XX.XX.174/32:17/1701 -> XX.XX.XX.1/32:17/0<br>
sh: /bin/openswan-statsd: not found<br>"L2TP"[2] XX.XX.XX.1 #2: responding to Quick Mode proposal {msgid:e88f1bcf}<br>"L2TP"[2] XX.XX.XX.1 #2: us: XX.XX.XX.174<XX.XX.XX.174>[+S=C]:17/1701---XX.XX.XX.254<br>
"L2TP"[2] XX.XX.XX.1 #2: them: XX.XX.XX.1[192.168.1.7,+S=C]:17/1701<br>"L2TP"[2] XX.XX.XX.1 #2: transition from state STATE_QUICK_R0 to state STATE_QUICK_R1<br>"L2TP"[2] XX.XX.XX.1 #2: STATE_QUICK_R1: sent QR1, inbound IPsec SA installed, expecting QI2<br>
"L2TP"[2] XX.XX.XX.1 #2: Dead Peer Detection (RFC 3706): enabled<br>"L2TP"[2] XX.XX.XX.1 #2: transition from state STATE_QUICK_R1 to state STATE_QUICK_R2<br>sh: /bin/openswan-statsd: not found<br>"L2TP"[2] XX.XX.XX.1 #2: STATE_QUICK_R2: IPsec SA established transport mode {ESP/NAT=>0x3efcc616 <0x01572877 xfrm=AES_128-HMAC_SHA1 NATOA=none NATD=XX.XX.XX.1:64500 DPD=enabled}<br>
"L2TP"[2] XX.XX.XX.1 #1: received Delete SA payload: deleting ISAKMP State #1<br>sh: /bin/openswan-statsd: not found<br>packet from XX.XX.XX.1:64500: received and ignored informational message<br>"L2TP"[2] XX.XX.XX.1 #2: DPD: could not find newest phase 1 state<br>
</plutosterr connect from phone><br><br><syslog connect from lptop><br>Jul 8 14:49:51 verweggistan xl2tpd[12389]: get_call: allocating new tunnel for host XX.XX.XX.1, port 1701.<br>
Jul 8 14:49:51 verweggistan xl2tpd[12389]: handle_avps: handling avp's for tunnel 58083, call 34341<br>
Jul 8 14:49:51 verweggistan xl2tpd[12389]: message_type_avp: message type 1 (Start-Control-Connection-Request)<br>
Jul 8 14:49:51 verweggistan xl2tpd[12389]: protocol_version_avp: peer is using version 1, revision 0.<br>
Jul 8 14:49:51 verweggistan xl2tpd[12389]: framing_caps_avp: supported peer frames: async sync<br>
Jul 8 14:49:51 verweggistan xl2tpd[12389]: bearer_caps_avp: supported peer bearers:<br>
Jul 8 14:49:51 verweggistan xl2tpd[12389]: firmware_rev_avp: peer reports firmware version 1680 (0x0690)<br>
Jul 8 14:49:51 verweggistan xl2tpd[12389]: hostname_avp: peer reports hostname 'geert-K53SD'<br>
Jul 8 14:49:51 verweggistan xl2tpd[12389]: vendor_avp: peer reports vendor '<a href="http://xelerance.com">xelerance.com</a>'<br>
Jul 8 14:49:51 verweggistan xl2tpd[12389]: assigned_tunnel_avp: using peer's tunnel 19802<br>
Jul 8 14:49:51 verweggistan xl2tpd[12389]: receive_window_size_avp: peer wants RWS of 4. Will use flow control.<br>
Jul 8 14:49:51 verweggistan xl2tpd[12389]: control_finish: message type
is Start-Control-Connection-Request(1). Tunnel is 19802, call is 0.<br>
Jul 8 14:49:51 verweggistan xl2tpd[12389]: control_finish: Peer requested tunnel 19802 twice, ignoring second one.<br>
Jul 8 14:49:51 verweggistan xl2tpd[12389]: build_fdset: closing down tunnel 58083<br>
Jul 8 14:49:51 verweggistan xl2tpd[12389]: network_thread: recv packet
from XX.XX.XX.1, size = 20, tunnel = 53080, call = 0 ref=0 refhim=0<br>
Jul 8 14:49:51 verweggistan xl2tpd[12389]: handle_avps: handling avp's for tunnel 53080, call 0<br>
Jul 8 14:49:51 verweggistan xl2tpd[12389]: message_type_avp: message type 3 (Start-Control-Connection-Connected)<br>
Jul 8 14:49:51 verweggistan xl2tpd[12389]: control_finish: message type
is Start-Control-Connection-Connected(3). Tunnel is 19802, call is 0.<br>
Jul 8 14:49:51 verweggistan xl2tpd[12389]: Connection established to
XX.XX.XX.1, 1701. Local: 53080, Remote: 19802 (ref=0/0). LNS session
is 'default'<br>
Jul 8 14:49:51 verweggistan xl2tpd[12389]: network_thread: recv packet
from XX.XX.XX.1, size = 48, tunnel = 53080, call = 0 ref=0 refhim=0<br>
Jul 8 14:49:51 verweggistan xl2tpd[12389]: handle_avps: handling avp's for tunnel 53080, call 0<br>
Jul 8 14:49:51 verweggistan xl2tpd[12389]: message_type_avp: message type 10 (Incoming-Call-Request)<br>
Jul 8 14:49:51 verweggistan xl2tpd[12389]: message_type_avp: new incoming call<br>
Jul 8 14:49:51 verweggistan xl2tpd[12389]: assigned_call_avp: using peer's call 63786<br>
Jul 8 14:49:51 verweggistan xl2tpd[12389]: call_serno_avp: serial number is 2<br>
Jul 8 14:49:51 verweggistan xl2tpd[12389]: bearer_type_avp: peer bears:digital<br>
Jul 8 14:49:51 verweggistan xl2tpd[12389]: control_finish: message type
is Incoming-Call-Request(10). Tunnel is 19802, call is 0.<br>
Jul 8 14:49:51 verweggistan xl2tpd[12389]: control_finish: Sending ICRP<br>
Jul 8 14:49:51 verweggistan xl2tpd[12389]: network_thread: recv packet
from XX.XX.XX.1, size = 12, tunnel = 53080, call = 0 ref=0 refhim=0<br>
Jul 8 14:49:51 verweggistan xl2tpd[12389]: last message repeated 3 times<br>
Jul 8 14:49:51 verweggistan xl2tpd[12389]: network_thread: recv packet
from XX.XX.XX.1, size = 50, tunnel = 53080, call = 53177 ref=0 refhim=0<br>
Jul 8 14:49:51 verweggistan xl2tpd[12389]: handle_avps: handling avp's for tunnel 53080, call 53177<br>
Jul 8 14:49:51 verweggistan xl2tpd[12389]: message_type_avp: message type 12 (Incoming-Call-Connected)<br>
Jul 8 14:49:51 verweggistan xl2tpd[12389]: tx_speed_avp: transmit baud rate is 0<br>
Jul 8 14:49:51 verweggistan xl2tpd[12389]: frame_type_avp: peer uses:sync frames<br>
Jul 8 14:49:51 verweggistan xl2tpd[12389]: rx_speed_avp: receive baud rate is 0<br>
Jul 8 14:49:51 verweggistan xl2tpd[12389]: control_finish: message type
is Incoming-Call-Connected(12). Tunnel is 19802, call is 63786.<br>
Jul 8 14:49:51 verweggistan xl2tpd[12389]: control_finish: Warning: Peer did not specify transmit speed<br>
Jul 8 14:49:51 verweggistan xl2tpd[12389]: start_pppd: I'm running: <br>
Jul 8 14:49:51 verweggistan xl2tpd[12389]: "/usr/sbin/pppd" <br>
Jul 8 14:49:51 verweggistan xl2tpd[12389]: "passive" <br>
Jul 8 14:49:51 verweggistan xl2tpd[12389]: "nodetach" <br>
Jul 8 14:49:51 verweggistan xl2tpd[12389]: "192.168.4.1:192.168.4.51" <br>
Jul 8 14:49:51 verweggistan xl2tpd[12389]: "refuse-pap" <br>
Jul 8 14:49:51 verweggistan xl2tpd[12389]: "name" <br>
Jul 8 14:49:51 verweggistan xl2tpd[12389]: "<a href="http://verweggistan.eu">verweggistan.eu</a>" <br>
Jul 8 14:49:51 verweggistan xl2tpd[12389]: "debug" <br>
Jul 8 14:49:51 verweggistan xl2tpd[12389]: "file" <br>
Jul 8 14:49:51 verweggistan xl2tpd[12389]: "/etc/ppp/options.xl2tpd" <br>
Jul 8 14:49:51 verweggistan xl2tpd[12389]: "/dev/pts/2" <br>
Jul 8 14:49:51 verweggistan xl2tpd[12389]: Call established with XX.XX.XX.1, Local: 53177, Remote: 63786, Serial: 2<br>
Jul 8 14:49:51 verweggistan xl2tpd[12389]: network_thread: recv packet
from XX.XX.XX.1, size = 36, tunnel = 53080, call = 53177 ref=0 refhim=0<br>
Jul 8 14:49:51 verweggistan pppd[12682]: pppd 2.4.5 started by root, uid 0<br>
Jul 8 14:49:51 verweggistan pppd[12682]: using channel 20<br>
Jul 8 14:49:51 verweggistan pppd[12682]: Using interface ppp0<br>
Jul 8 14:49:51 verweggistan pppd[12682]: Connect: ppp0 <--> /dev/pts/2<br>
Jul 8 14:49:51 verweggistan pppd[12682]: sent [LCP ConfReq id=0x1
<mru 1410> <asyncmap 0x0> <auth eap> <magic
0x581396cc> <pcomp> <accomp>]<br>
Jul 8 14:49:51 verweggistan xl2tpd[12389]: network_thread: recv packet
from XX.XX.XX.1, size = 21, tunnel = 53080, call = 53177 ref=0 refhim=0<br>
Jul 8 14:49:51 verweggistan pppd[12682]: rcvd [LCP ConfNak id=0x1 <auth chap MD5>]<br>
Jul 8 14:49:51 verweggistan pppd[12682]: sent [LCP ConfReq id=0x2
<mru 1410> <asyncmap 0x0> <auth chap MD5> <magic
0x581396cc> <pcomp> <accomp>]<br>
Jul 8 14:49:51 verweggistan xl2tpd[12389]: network_thread: recv packet
from XX.XX.XX.1, size = 41, tunnel = 53080, call = 53177 ref=0 refhim=0<br>
Jul 8 14:49:51 verweggistan pppd[12682]: rcvd [LCP ConfAck id=0x2
<mru 1410> <asyncmap 0x0> <auth chap MD5> <magic
0x581396cc> <pcomp> <accomp>]<br>
Jul 8 14:49:52 verweggistan xl2tpd[12389]: network_thread: select timeout<br>
Jul 8 14:49:52 verweggistan xl2tpd[12389]: network_thread: select timeout<br>
Jul 8 14:49:54 verweggistan xl2tpd[12389]: network_thread: recv packet
from XX.XX.XX.1, size = 36, tunnel = 53080, call = 53177 ref=0 refhim=0<br>
Jul 8 14:49:54 verweggistan pppd[12682]: rcvd [LCP ConfReq id=0x1
<mru 1410> <asyncmap 0x0> <magic 0x7b5e443c>
<pcomp> <accomp>]<br>
Jul 8 14:49:54 verweggistan pppd[12682]: sent [LCP ConfAck id=0x1
<mru 1410> <asyncmap 0x0> <magic 0x7b5e443c>
<pcomp> <accomp>]<br>
Jul 8 14:49:54 verweggistan pppd[12682]: sent [LCP EchoReq id=0x0 magic=0x581396cc]<br>
Jul 8 14:49:54 verweggistan pppd[12682]: sent [CHAP Challenge id=0x4e
<88f87955749099d365a232478b043dacf2>, name = "<a href="http://verweggistan.eu">verweggistan.eu</a>"]<br>
Jul 8 14:49:54 verweggistan xl2tpd[12389]: network_thread: recv packet
from XX.XX.XX.1, size = 18, tunnel = 53080, call = 53177 ref=0 refhim=0<br>
Jul 8 14:49:54 verweggistan xl2tpd[12389]: network_thread: recv packet
from XX.XX.XX.1, size = 18, tunnel = 53080, call = 53177 ref=0 refhim=0<br>
Jul 8 14:49:54 verweggistan xl2tpd[12389]: network_thread: recv packet
from XX.XX.XX.1, size = 36, tunnel = 53080, call = 53177 ref=0 refhim=0<br>
Jul 8 14:49:54 verweggistan pppd[12682]: rcvd [LCP EchoReq id=0x0 magic=0x7b5e443c]<br>
Jul 8 14:49:54 verweggistan pppd[12682]: sent [LCP EchoRep id=0x0 magic=0x581396cc]<br>
Jul 8 14:49:54 verweggistan pppd[12682]: rcvd [LCP EchoRep id=0x0 magic=0x7b5e443c]<br>
Jul 8 14:49:54 verweggistan pppd[12682]: rcvd [CHAP Response id=0x4e <26cf5ad31429ce553414ecc8b0ad49f1>, name = "geert"]<br>
Jul 8 14:49:54 verweggistan pppd[12682]: sent [CHAP Success id=0x4e "Access granted"]<br>
Jul 8 14:49:54 verweggistan pppd[12682]: sent [IPCP ConfReq id=0x1 <compress VJ 0f 01> <addr 192.168.4.1>]<br>
Jul 8 14:49:54 verweggistan xl2tpd[12389]: network_thread: recv packet
from XX.XX.XX.1, size = 26, tunnel = 53080, call = 53177 ref=0 refhim=0<br>
Jul 8 14:49:54 verweggistan xl2tpd[12389]: network_thread: recv packet
from XX.XX.XX.1, size = 26, tunnel = 53080, call = 53177 ref=0 refhim=0<br>
Jul 8 14:49:54 verweggistan pppd[12682]: rcvd [IPCP ConfReq id=0x1 <compress VJ 0f 01> <addr 0.0.0.0>]<br>
Jul 8 14:49:54 verweggistan pppd[12682]: sent [IPCP ConfNak id=0x1 <addr 192.168.4.51>]<br>
Jul 8 14:49:54 verweggistan pppd[12682]: rcvd [IPCP ConfAck id=0x1 <compress VJ 0f 01> <addr 192.168.4.1>]<br>
Jul 8 14:49:54 verweggistan xl2tpd[12389]: network_thread: recv packet
from XX.XX.XX.1, size = 26, tunnel = 53080, call = 53177 ref=0 refhim=0<br>
Jul 8 14:49:54 verweggistan pppd[12682]: rcvd [IPCP ConfReq id=0x2 <compress VJ 0f 01> <addr 192.168.4.51>]<br>
Jul 8 14:49:54 verweggistan pppd[12682]: sent [IPCP ConfAck id=0x2 <compress VJ 0f 01> <addr 192.168.4.51>]<br>
Jul 8 14:49:54 verweggistan pppd[12682]: Cannot determine ethernet address for proxy ARP<br>
Jul 8 14:49:54 verweggistan pppd[12682]: local IP address 192.168.4.1<br>
Jul 8 14:49:54 verweggistan pppd[12682]: remote IP address 192.168.4.51<br>
Jul 8 14:49:54 verweggistan pppd[12682]: Script /etc/ppp/ip-up started (pid 12685)<br>
Jul 8 14:49:54 verweggistan pppd[12682]: Script /etc/ppp/ip-up finished (pid 12685), status = 0x0<br>
Jul 8 14:50:24 verweggistan pppd[12682]: sent [LCP EchoReq id=0x1 magic=0x581396cc]<br></syslog connect from laptop><br><br><syslog connect from phone><br>Jul 8 14:37:06 verweggistan ipsec_setup: ...Openswan IPsec started<br>
Jul 8 14:37:06 verweggistan pluto: adjusting ipsec.d to /etc/ipsec.d<br>Jul 8 14:37:06 verweggistan pluto: bind() will be filtered for XX.XX.XX.174 <br>Jul 8 14:37:06 verweggistan ipsec__plutorun: 002 added connection description "L2TP"<br>
Jul 8 14:37:06 verweggistan ipsec__plutorun: 003 NAT-Traversal: Trying new style NAT-T<br>Jul 8 14:37:06 verweggistan ipsec__plutorun: 003 NAT-Traversal: ESPINUDP(1) setup failed for new style NAT-T family IPv4 (errno=19)<br>
Jul 8 14:37:06 verweggistan ipsec__plutorun: 003 NAT-Traversal: Trying old style NAT-T<br></syslog connect from phone><br><br>Thank allot for looking at this!<br><br>Best regards,<br>Geert<br>