Hello community,
I would like to create an IPSec tunnel (site-to-site) with a Teltonika RUTC50 and a FRITZ!Box 7590.
Local IP mask behind the RUTC50: 10.0.2.0/24
Local IP mask behind the Fritzbox: 10.0.2.0/24
Settings of the RUTC50:
Remote endpoint: xxxxx(.)myfritz(.)net
Authentication method: Pre-shared key
Pre shared key: xxxxxxx
Mode: Start
Type: Tunnel
Local subnet: 10.0.2.0/24
Remote subnet: 10.0.1.0/24
Key exchange: IKEv1
Aggressive: on
Local firewall: on
Dead peer detection: on
DPD action: Restart
Phase 1:
Encryption: AES 256
Authentication: SHA1
DH group: MODP1024
IKE lifetime: 8h
Phase 2:
Encryption: AES 256
Hash: SHA1
PFS group: MODP1024
Lifetime: 8h
All other settings are empty or off.
Settings of the Fritzbox:
VPN password (Preshared Key): xxxxxxx (the same as the pre shared key of the RUTC50)
Name of the VPN connection: Wohnwagen Bruno
Internet address of the remote site: xxxxx(.)dynv6(.)net
Internet address of this FRITZ!Box: xxxxx(.)myfritz(.)net
Remote Network: 10.0.2.0
Subnetmask: 255.255.255.0
Keep VPN-connection permanent: on
All other settings are empty or off.
Logfile from RUTC50:
Tue Sep 17 13:27:35 2024 daemon.info ipsec: 07[IKE] <HentHome-HentHome_c|1> initiating Aggressive Mode IKE_SA HentHome-HentHome_c[1] to 79.255.41.236
Tue Sep 17 13:27:35 2024 daemon.info ipsec: 07[ENC] <HentHome-HentHome_c|1> generating AGGRESSIVE request 0 [ SA KE No ID V V V V V ]
Tue Sep 17 13:27:35 2024 daemon.info ipsec: 07[NET] <HentHome-HentHome_c|1> sending packet: from 46.114.119.128[500] to 79.255.41.236[500] (420 bytes)
Tue Sep 17 13:27:39 2024 daemon.info ipsec: 11[IKE] <HentHome-HentHome_c|1> sending retransmit 1 of request message ID 0, seq 1
Tue Sep 17 13:27:39 2024 daemon.info ipsec: 11[NET] <HentHome-HentHome_c|1> sending packet: from 46.114.119.128[500] to 79.255.41.236[500] (420 bytes)
Tue Sep 17 13:27:46 2024 daemon.info ipsec: 13[IKE] <HentHome-HentHome_c|1> sending retransmit 2 of request message ID 0, seq 1
Tue Sep 17 13:27:46 2024 daemon.info ipsec: 13[NET] <HentHome-HentHome_c|1> sending packet: from 46.114.119.128[500] to 79.255.41.236[500] (420 bytes)
Tue Sep 17 13:27:59 2024 daemon.info ipsec: 15[IKE] <HentHome-HentHome_c|1> sending retransmit 3 of request message ID 0, seq 1
Tue Sep 17 13:27:59 2024 daemon.info ipsec: 15[NET] <HentHome-HentHome_c|1> sending packet: from 46.114.119.128[500] to 79.255.41.236[500] (420 bytes)
Tue Sep 17 13:28:15 2024 daemon.info ipsec: 00[IKE] <HentHome-HentHome_c|1> destroying IKE_SA in state CONNECTING without notification
Tue Sep 17 14:22:49 2024 daemon.info ipsec: 07[IKE] <HentHome-HentHome_c|1> initiating Aggressive Mode IKE_SA HentHome-HentHome_c[1] to 79.255.41.236
Tue Sep 17 14:22:49 2024 daemon.info ipsec: 07[ENC] <HentHome-HentHome_c|1> generating AGGRESSIVE request 0 [ SA KE No ID V V V V V ]
Tue Sep 17 14:22:49 2024 daemon.info ipsec: 07[NET] <HentHome-HentHome_c|1> sending packet: from 46.114.119.128[500] to 79.255.41.236[500] (420 bytes)
Tue Sep 17 14:22:49 2024 daemon.info ipsec: 11[NET] <HentHome-HentHome_c|1> received packet: from 79.255.41.236[500] to 46.114.119.128[500] (56 bytes)
Tue Sep 17 14:22:49 2024 daemon.info ipsec: 11[ENC] <HentHome-HentHome_c|1> parsed INFORMATIONAL_V1 request 2857047406 [ N(INVAL_ID) ]
Tue Sep 17 14:22:49 2024 daemon.info ipsec: 11[IKE] <HentHome-HentHome_c|1> received INVALID_ID_INFORMATION error notify
Tue Sep 17 14:23:19 2024 daemon.info ipsec: 11[IKE] <HentHome-HentHome_c|9> initiating Aggressive Mode IKE_SA HentHome-HentHome_c[9] to 79.255.41.236
Tue Sep 17 14:23:19 2024 daemon.info ipsec: 11[ENC] <HentHome-HentHome_c|9> generating AGGRESSIVE request 0 [ SA KE No ID V V V V V ]
Tue Sep 17 14:23:19 2024 daemon.info ipsec: 11[NET] <HentHome-HentHome_c|9> sending packet: from 46.114.119.128[500] to 79.255.41.236[500] (420 bytes)
Tue Sep 17 14:23:23 2024 daemon.info ipsec: 15[IKE] <HentHome-HentHome_c|9> sending retransmit 1 of request message ID 0, seq 1
Tue Sep 17 14:23:23 2024 daemon.info ipsec: 15[NET] <HentHome-HentHome_c|9> sending packet: from 46.114.119.128[500] to 79.255.41.236[500] (420 bytes)
Tue Sep 17 14:23:30 2024 daemon.info ipsec: 05[IKE] <HentHome-HentHome_c|9> sending retransmit 2 of request message ID 0, seq 1
Tue Sep 17 14:23:30 2024 daemon.info ipsec: 05[NET] <HentHome-HentHome_c|9> sending packet: from 46.114.119.128[500] to 79.255.41.236[500] (420 bytes)
Tue Sep 17 14:23:43 2024 daemon.info ipsec: 13[IKE] <HentHome-HentHome_c|9> sending retransmit 3 of request message ID 0, seq 1
Tue Sep 17 14:23:43 2024 daemon.info ipsec: 13[NET] <HentHome-HentHome_c|9> sending packet: from 46.114.119.128[500] to 79.255.41.236[500] (420 bytes)
Tue Sep 17 14:23:45 2024 daemon.info ipsec: 00[IKE] <HentHome-HentHome_c|9> destroying IKE_SA in state CONNECTING without notification
Logfile from Fritzbox:
17.09.24 13:28:17 VPN-Fehler: Wohnwagen Bruno, IKE-Error 0x203f [3 Meldungen seit 17.09.24 13:27:45]
The new settings from RUTC50:
Remote endpoint: xxxxx(.)myfritz(.)net
Authentication method: Pre-shared key
Pre shared key: xxxxxxx
Mode: Start
Type: Tunnel
Local subnet: 10.0.2.0/24
Remote subnet: 10.0.1.0/24
Key exchange: IKEv2
Aggressive: off
Local firewall: on
Dead peer detection: on
DPD action: Restart
Phase 1:
Encryption: AES 256
Authentication: SHA1
DH group: MODP2048
IKE lifetime: 8h
Phase 2:
Encryption: AES 256
Hash: SHA1
PFS group: No PFS
Lifetime: 8h
All other settings are empty or off.
Settings of the Fritzbox:
I havenât changed anything in the settings of the Fritzbox.
Logfile from RUTC50:
Tue Sep 17 19:20:02 2024 daemon.info ipsec: 07[IKE] <HentHome-HentHome_c|1> initiating IKE_SA HentHome-HentHome_c[1] to 79.255.41.236
Tue Sep 17 19:20:02 2024 daemon.info ipsec: 07[ENC] <HentHome-HentHome_c|1> generating IKE_SA_INIT request 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(REDIR_SUP) ]
Tue Sep 17 19:20:02 2024 daemon.info ipsec: 07[NET] <HentHome-HentHome_c|1> sending packet: from 46.114.119.128[500] to 79.255.41.236[500] (1076 bytes)
Tue Sep 17 19:20:03 2024 daemon.info ipsec: 11[NET] <HentHome-HentHome_c|1> received packet: from 79.255.41.236[500] to 46.114.119.128[500] (432 bytes)
Tue Sep 17 19:20:03 2024 daemon.info ipsec: 11[ENC] <HentHome-HentHome_c|1> parsed IKE_SA_INIT response 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) ]
Tue Sep 17 19:20:03 2024 daemon.info ipsec: 11[CFG] <HentHome-HentHome_c|1> selected proposal: IKE:AES_CBC_256/HMAC_SHA2_512_256/PRF_HMAC_SHA2_512/MODP_2048
Tue Sep 17 19:20:03 2024 daemon.info ipsec: 11[CFG] <HentHome-HentHome_c|1> no IDi configured, fall back on IP address
Tue Sep 17 19:20:03 2024 daemon.info ipsec: 11[IKE] <HentHome-HentHome_c|1> authentication of â46.114.119.128â (myself) with pre-shared key
Tue Sep 17 19:20:03 2024 daemon.info ipsec: 11[IKE] <HentHome-HentHome_c|1> establishing CHILD_SA HentHome-HentHome_c{1}
Tue Sep 17 19:20:03 2024 daemon.info ipsec: 11[ENC] <HentHome-HentHome_c|1> generating IKE_AUTH request 1 [ IDi N(INIT_CONTACT) IDr AUTH SA TSi TSr N(MOBIKE_SUP) N(ADD_4_ADDR) N(ADD_4_ADDR) N(ADD_6_ADDR) N(EAP_ONLY) N(MSG_ID_SYN_SUP) ]
Tue Sep 17 19:20:03 2024 daemon.info ipsec: 11[NET] <HentHome-HentHome_c|1> sending packet: from 46.114.119.128[4500] to 79.255.41.236[4500] (528 bytes)
Tue Sep 17 19:20:03 2024 daemon.info ipsec: 12[NET] <HentHome-HentHome_c|1> received packet: from 79.255.41.236[4500] to 46.114.119.128[4500] (96 bytes)
Tue Sep 17 19:20:03 2024 daemon.info ipsec: 12[ENC] <HentHome-HentHome_c|1> parsed IKE_AUTH response 1 [ N(AUTH_FAILED) ]
Tue Sep 17 19:20:03 2024 daemon.info ipsec: 12[IKE] <HentHome-HentHome_c|1> received AUTHENTICATION_FAILED notify error
Tue Sep 17 19:20:32 2024 daemon.info ipsec: 10[IKE] <HentHome-HentHome_c|4> initiating IKE_SA HentHome-HentHome_c[4] to 79.255.41.236
Tue Sep 17 19:20:32 2024 daemon.info ipsec: 10[ENC] <HentHome-HentHome_c|4> generating IKE_SA_INIT request 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(REDIR_SUP) ]
Tue Sep 17 19:20:32 2024 daemon.info ipsec: 10[NET] <HentHome-HentHome_c|4> sending packet: from 46.114.119.128[500] to 79.255.41.236[500] (1076 bytes)
Tue Sep 17 19:20:33 2024 daemon.info ipsec: 07[NET] <HentHome-HentHome_c|4> received packet: from 79.255.41.236[500] to 46.114.119.128[500] (432 bytes)
Tue Sep 17 19:20:33 2024 daemon.info ipsec: 07[ENC] <HentHome-HentHome_c|4> parsed IKE_SA_INIT response 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) ]
Tue Sep 17 19:20:33 2024 daemon.info ipsec: 07[CFG] <HentHome-HentHome_c|4> selected proposal: IKE:AES_CBC_256/HMAC_SHA2_512_256/PRF_HMAC_SHA2_512/MODP_2048
Tue Sep 17 19:20:33 2024 daemon.info ipsec: 07[CFG] <HentHome-HentHome_c|4> no IDi configured, fall back on IP address
Tue Sep 17 19:20:33 2024 daemon.info ipsec: 07[IKE] <HentHome-HentHome_c|4> authentication of â46.114.119.128â (myself) with pre-shared key
Tue Sep 17 19:20:33 2024 daemon.info ipsec: 07[IKE] <HentHome-HentHome_c|4> establishing CHILD_SA HentHome-HentHome_c{2}
Tue Sep 17 19:20:33 2024 daemon.info ipsec: 07[ENC] <HentHome-HentHome_c|4> generating IKE_AUTH request 1 [ IDi N(INIT_CONTACT) IDr AUTH SA TSi TSr N(MOBIKE_SUP) N(ADD_4_ADDR) N(ADD_4_ADDR) N(ADD_6_ADDR) N(EAP_ONLY) N(MSG_ID_SYN_SUP) ]
Tue Sep 17 19:20:33 2024 daemon.info ipsec: 07[NET] <HentHome-HentHome_c|4> sending packet: from 46.114.119.128[4500] to 79.255.41.236[4500] (528 bytes)
Tue Sep 17 19:20:33 2024 daemon.info ipsec: 09[NET] <HentHome-HentHome_c|4> received packet: from 79.255.41.236[4500] to 46.114.119.128[4500] (96 bytes)
Tue Sep 17 19:20:33 2024 daemon.info ipsec: 09[ENC] <HentHome-HentHome_c|4> parsed IKE_AUTH response 1 [ N(AUTH_FAILED) ]
Tue Sep 17 19:20:33 2024 daemon.info ipsec: 09[IKE] <HentHome-HentHome_c|4> received AUTHENTICATION_FAILED notify error
âLogfileâ from Fritzbox:
17.09.24 19:20:48 VPN-Fehler: Wohnwagen Bruno, IKE-Error 0x2026 [3 Meldungen seit 17.09.24 19:20:16] (no proposal chosen)
Have you set the two fields âLocal identifierâ and âRemote identifierâ they are just below the âPre-shared keyâ one ?
Or check the /etc/config/ipsec file, you should have something like:
Das Wichtigste ist, dass die Identifier stimmen und die 2 Netzwerke, die hier miteinander verbunden werden sollen, unterschiedliche IP-Subnetze verwenden!
Das habe ich alles gemacht.
Jedoch beschreibt der Artikel nicht eine IPSec-Site-to-Site-Verbindung zwischen Fritzbox, die man relativ wenig konfigurieren kann, mit einem Router, bei dem man nahezu alles einstellen kann.
Hab ich alles selber schon konfiguriert, zwischen MikroTik (wirklich ALLES konfigurierbar hier) und FB7590 (total kastriert das Teil).
Was mich dazu gefĂŒhrt hat, anstatt IPSec (mittlerweile âveraltetâ und âlangsamâ) auf das wesentlich neuere und massiv performantere WireGuard zu setzen.
Hast du dich damit schon mal auseinandergesetzt?
Wesentlich einfacher zu konfigurieren (fast schon âidiotensicherâ).
Deine FB7590 kann das auch!
Lass uns IPSec zum laufen kriegen und WireGuard googelst du du dir dann zusammen, ok?
Dann kannst du alles parallel machen und schön umsteigen auf WireGuard.
Mach mal alles wie im Link den ich dir geschickt hab und wennâs nicht klappt, schicke die LogeintrĂ€ge wie von @flebourse erwĂ€hnt.