Hi,
I want to set up an IPSec VPN between Teltonika RUT240 and Fritzbox 7590.
Status: Connected
RX: 0 B
TX: 0 B
According to the status, the tunnel is connected, but no packets are passing through it.
LOG:
Wed Mar 18 10:10:31 2026 daemon.info ipsec: 06[IKE] xxxx_c|1> initiating Aggressive Mode IKE_SA sunscan-sunscan_c[1] to 2001:9e8:2037:8f71:cece:xxxx:xxxx:xxxx
Wed Mar 18 10:10:32 2026 daemon.info ipsec: 06[ENC] xxxx_c|1> generating AGGRESSIVE request 0 [ SA KE No ID V V V V V ]
Wed Mar 18 10:10:32 2026 daemon.info ipsec: 06[NET] xxxx_c|1> sending packet: from 2a00:fbc:f221:3c60:8154:xxxx:xxxx:xxxx[500] to 2001:9e8:2037:8f71:cece:xxxx:xxxx:xxxx[500] (440 bytes)
Wed Mar 18 10:10:32 2026 daemon.info ipsec: 10[NET] xxxx_c|1> received packet: from 2001:9e8:2037:8f71:cece:xxxx:xxxx:xxxx[500] to 2a00:fbc:f221:3c60:8154:xxxx:xxxx:xxxx[500] (480 bytes)
Wed Mar 18 10:10:32 2026 daemon.info ipsec: 10[ENC] xxxx_c|1> parsed AGGRESSIVE response 0 [ SA KE No ID HASH N((24576)) V V V V V V NAT-D NAT-D ]
Wed Mar 18 10:10:32 2026 daemon.info ipsec: 10[IKE] xxxx_c|1> received XAuth vendor ID
Wed Mar 18 10:10:32 2026 daemon.info ipsec: 10[IKE] xxxx_c|1> received DPD vendor ID
Wed Mar 18 10:10:32 2026 daemon.info ipsec: 10[IKE] xxxx_c|1> received NAT-T (RFC 3947) vendor ID
Wed Mar 18 10:10:32 2026 daemon.info ipsec: 10[IKE] xxxx_c|1> received draft-ietf-ipsec-nat-t-ike-02\n vendor ID
Wed Mar 18 10:10:32 2026 daemon.info ipsec: 10[IKE] xxxx_c|1> received draft-ietf-ipsec-nat-t-ike-03 vendor ID
Wed Mar 18 10:10:32 2026 daemon.info ipsec: 10[ENC] xxxx_c|1> received unknown vendor ID: a2:22:6f:c3:64:50:0f:56:34:ff:77:db:xxxx:xxxx:xxxx
Wed Mar 18 10:10:32 2026 daemon.info ipsec: 10[CFG] xxxx_c|1> selected proposal: IKE:AES_CBC_256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024
Wed Mar 18 10:10:33 2026 daemon.info ipsec: 10[IKE] xxxx_c|1> IKE_SA sunscan-sunscan_c[1] established between 2a00:fbc:f221:3c60:8154:xxxx:xxxx:xxxx[xxxxxx.xxxxxxx.de]...2001:9e8:2037:8f71:cece:xxxx:xxxx:xxxx[gw.sunscanner.de]
Wed Mar 18 10:10:33 2026 daemon.info ipsec: 10[IKE] xxxx_c|1> scheduling reauthentication in 9879s
Wed Mar 18 10:10:33 2026 daemon.info ipsec: 10[IKE] xxxx_c|1> maximum IKE_SA lifetime 10419s
Wed Mar 18 10:10:33 2026 daemon.info ipsec: 10[ENC] xxxx_c|1> generating AGGRESSIVE request 0 [ HASH NAT-D NAT-D ]
Wed Mar 18 10:10:33 2026 daemon.info ipsec: 10[NET] xxxx_c|1> sending packet: from 2a00:fbc:f221:3c60:8154:xxxx:xxxx:xxxx[500] to 2001:9e8:2037:8f71:cece:xxxx:xxxx:xxxx[500] (108 bytes)
Wed Mar 18 10:10:33 2026 daemon.info ipsec: 10[ENC] xxxx_c|1> generating QUICK_MODE request 1530596724 [ HASH SA No KE ID ID ]
Wed Mar 18 10:10:33 2026 daemon.info ipsec: 10[NET] xxxx_c|1> sending packet: from 2a00:fbc:f221:3c60:8154:xxxx:xxxx:xxxx[500] to 2001:9e8:2037:8f71:cece:xxxx:xxxx:xxxx[500] (316 bytes)
Wed Mar 18 10:10:34 2026 daemon.info ipsec: 11[NET] xxxx_c|1> received packet: from 2001:9e8:2037:8f71:cece:xxxx:xxxx:xxxx[500] to 2a00:fbc:f221:3c60:8154:xxxx:xxxx:xxxx[500] (300 bytes)
Wed Mar 18 10:10:34 2026 daemon.info ipsec: 11[ENC] xxxx_c|1> parsed QUICK_MODE response 1530596724 [ HASH SA No KE ID ID ]
can any support?