Menu

Show posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.

Show posts Menu

Messages - Speedy2024

#1
Das habe ich schon versucht.
Ich habe einen ipsec Tunnel von der OpnSense zum LAN des Servers, den ich erreichen möchte.
#2
Danke. Caddy habe ich installiert und konfiguriert. Wenn ich die Domain aufrufe, wird mir nur eine weiße Seite angezeigt. Am Log des Zielservern kann ich keine Einträge finden.
Caddy sagt folgendes:

"error","ts":"2024-11-24T16:10:08Z","logger":"http.log.access.6ab45eee-d04c-48a4-8d72-569cf3131087","msg":"handled request","request":{"remote_ip":"109.xx.xx.xx","remote_port":"29869","client_ip":"109.xx.xx.xx","proto":"HTTP/2.0","method":"GET","host":"cloud.meinedomain.net","uri":"/","headers":{"Upgrade-Insecure-Requests":["1"],"Sec-Fetch-Mode":["navigate"],"Sec-Fetch-Dest":["document"],"Accept":["text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8"],"Sec-Fetch-Site":["none"],"Priority":["u=0, i"],"Accept-Encoding":["gzip, deflate, br"],"User-Agent":["Mozilla/5.0 (iPhone; CPU iPhone OS 18_1_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/18.1.1 Mobile/15E148 Safari/604.1"],"Accept-Language":["de-DE,de;q=0.9"]},"tls":{"resumed":false,"version":772,"cipher_suite":4865,"proto":"h2","server_name":"cloud.meinedomain.net"}},"bytes_read":0,"user_id":"","duration":3.108861155,"size":0,"status":502,"resp_headers":{"Server":["Caddy"],"Alt-Svc":["h3=\":443\"; ma=2592000"]}}
#3
Guten Morgen,

ich habe zwei Standorte per S2S verbunden. Ein Standort (A) hat eine feste IP, der andere (B) eine dynamische.
Für meine Domain hinterlege ich als Record A Standort A. Sobald die Anfrage dort eintrifft, soll diese zum Webserver an Standort B weitergeleitet werden.

Wie realisiere ich das am besten?

Danke Euch.
#4
Ich habe noch folgendes im log gesehen:

configured proposals: ESP:AES_CBC_256/HMAC_SHA2_256_128/MODP_2048/NO_EXT_SEQ
received proposals: ESP:AES_CBC_256/HMAC_SHA2_256_128/NO_EXT_SEQ


Nun habe ich in der OpnSense in Phase 2 auf aes256-sha256 (ohne MODP_2048) umgestellt und es läuft jetzt stabil.

Danke für eure Rückmeldungen.
#5
Danke. Habe im Start Post noch was angehängt.
#6
Hallo,

ich habe einen ipsec Tunnel zwischen der OpnSense (feste IP) und einem kleinen Festa TPLink (dyn. IP) aufgebaut. Nach Ablauf der eingestellten SA Liftetime, ist der Tunnel für ca. 2min down. Die Einstellungen im Festa sind recht übersichtlich und ich weiß nicht, wo ich ansetzen soll. Habt ihr eine Idee?


Hier noch Logauszüge:

2024-11-14T08:42:53 Informational charon 09[NET1] <baa084c5-d489-4c98-9b04-cc83354160a8|65> sending packet: from OpnSense-WAN-IP[4500] to TPLINK-WAN-IP[4500] (256 bytes)
2024-11-14T08:42:53 Informational charon 09[ENC1] <baa084c5-d489-4c98-9b04-cc83354160a8|65> generating IKE_AUTH response 1 [ IDr AUTH N(ESP_TFC_PAD_N) SA TSi TSr ]
2024-11-14T08:42:53 Notice charon [UPDOWN] received up-client event for reqid 4
2024-11-14T08:42:53 Notice charon [UPDOWN] received up-client event for reqid 4
2024-11-14T08:42:53 Notice charon [UPDOWN] received up-client event for reqid 4
2024-11-14T08:42:53 Informational charon 09[IKE0] <baa084c5-d489-4c98-9b04-cc83354160a8|65> CHILD_SA a47ca189-339d-4157-95b5-4f7554397d64{487} established with SPIs c7ab4e7c_i c06beb70_o and TS 10.1.0.0/24 10.1.5.0/24 192.168.2.0/24 === 192.168.3.0/24
2024-11-14T08:42:53 Informational charon 09[CFG1] <baa084c5-d489-4c98-9b04-cc83354160a8|65> selected proposal: ESP:AES_CBC_256/HMAC_SHA2_256_128/NO_EXT_SEQ
2024-11-14T08:42:53 Informational charon 09[IKE1] <baa084c5-d489-4c98-9b04-cc83354160a8|65> maximum IKE_SA lifetime 15464s
2024-11-14T08:42:53 Informational charon 09[IKE1] <baa084c5-d489-4c98-9b04-cc83354160a8|65> scheduling rekeying in 14024s
2024-11-14T08:42:53 Informational charon 09[IKE0] <baa084c5-d489-4c98-9b04-cc83354160a8|65> IKE_SA baa084c5-d489-4c98-9b04-cc83354160a8[65] established between OpnSense-WAN-IP[OpnSense-WAN-IP]...TPLINK-WAN-IP[meindyndnsaccount.ddns.net]
2024-11-14T08:42:53 Informational charon 09[IKE1] <baa084c5-d489-4c98-9b04-cc83354160a8|65> authentication of 'OpnSense-WAN-IP' (myself) with pre-shared key
2024-11-14T08:42:53 Informational charon 09[IKE1] <baa084c5-d489-4c98-9b04-cc83354160a8|65> peer supports MOBIKE, but disabled in config
2024-11-14T08:42:53 Informational charon 09[IKE1] <baa084c5-d489-4c98-9b04-cc83354160a8|65> authentication of 'meindyndnsaccount.ddns.net' with pre-shared key successful
2024-11-14T08:42:53 Informational charon 09[CFG1] <baa084c5-d489-4c98-9b04-cc83354160a8|65> selected peer config 'baa084c5-d489-4c98-9b04-cc83354160a8'
2024-11-14T08:42:53 Informational charon 09[CFG1] <65> looking for peer configs matching OpnSense-WAN-IP[OpnSense-WAN-IP]...TPLINK-WAN-IP[meindyndnsaccount.ddns.net]
2024-11-14T08:42:53 Informational charon 09[ENC1] <65> parsed IKE_AUTH request 1 [ IDi IDr AUTH SA TSi TSr N(MOBIKE_SUP) N(ADD_4_ADDR) N(MULT_AUTH) N(EAP_ONLY) ]
2024-11-14T08:42:53 Informational charon 09[NET1] <65> received packet: from TPLINK-WAN-IP[4500] to OpnSense-WAN-IP[4500] (320 bytes)
2024-11-14T08:42:52 Informational charon 09[NET1] <65> sending packet: from OpnSense-WAN-IP[500] to TPLINK-WAN-IP[500] (509 bytes)
2024-11-14T08:42:52 Informational charon 09[ENC1] <65> generating IKE_SA_INIT response 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) CERTREQ N(HASH_ALG) N(CHDLESS_SUP) N(MULT_AUTH) ]
2024-11-14T08:42:52 Informational charon 09[IKE1] <65> sending cert request for "C=DE, CN=internal-sslvpn-ca"
2024-11-14T08:42:52 Informational charon 09[IKE1] <65> sending cert request for "C=US, O=Let's Encrypt, CN=R11"
2024-11-14T08:42:52 Informational charon 09[IKE1] <65> remote host is behind NAT
2024-11-14T08:42:52 Informational charon 09[CFG1] <65> selected proposal: IKE:AES_CBC_256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_2048
2024-11-14T08:42:52 Informational charon 09[IKE0] <65> TPLINK-WAN-IP is initiating an IKE_SA
2024-11-14T08:42:52 Informational charon 09[ENC1] <65> parsed IKE_SA_INIT request 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(HASH_ALG) ]
2024-11-14T08:42:52 Informational charon 09[NET1] <65> received packet: from TPLINK-WAN-IP[500] to OpnSense-WAN-IP[500] (448 bytes)
2024-11-14T08:42:46 Informational charon 09[IKE1] <baa084c5-d489-4c98-9b04-cc83354160a8|64> received AUTHENTICATION_FAILED notify error
2024-11-14T08:42:46 Informational charon 09[ENC1] <baa084c5-d489-4c98-9b04-cc83354160a8|64> parsed IKE_AUTH response 1 [ N(AUTH_FAILED) ]
2024-11-14T08:42:46 Informational charon 09[NET1] <baa084c5-d489-4c98-9b04-cc83354160a8|64> received packet: from TPLINK-WAN-IP[4500] to OpnSense-WAN-IP[4500] (80 bytes)
2024-11-14T08:42:46 Informational charon 09[NET1] <baa084c5-d489-4c98-9b04-cc83354160a8|64> sending packet: from OpnSense-WAN-IP[4500] to TPLINK-WAN-IP[4500] (320 bytes)
2024-11-14T08:42:46 Informational charon 09[ENC1] <baa084c5-d489-4c98-9b04-cc83354160a8|64> generating IKE_AUTH request 1 [ IDi CERTREQ AUTH N(ESP_TFC_PAD_N) SA TSi TSr N(MULT_AUTH) N(EAP_ONLY) N(MSG_ID_SYN_SUP) ]
2024-11-14T08:42:46 Informational charon 09[IKE0] <baa084c5-d489-4c98-9b04-cc83354160a8|64> establishing CHILD_SA a47ca189-339d-4157-95b5-4f7554397d64{486} reqid 4
2024-11-14T08:42:46 Informational charon 09[IKE1] <baa084c5-d489-4c98-9b04-cc83354160a8|64> authentication of 'OpnSense-WAN-IP' (myself) with pre-shared key
2024-11-14T08:42:46 Informational charon 09[CFG1] <baa084c5-d489-4c98-9b04-cc83354160a8|64> no IDi configured, fall back on IP address
2024-11-14T08:42:46 Informational charon 09[IKE1] <baa084c5-d489-4c98-9b04-cc83354160a8|64> sending cert request for "C=DE, CN=internal-sslvpn-ca"
2024-11-14T08:42:46 Informational charon 09[IKE1] <baa084c5-d489-4c98-9b04-cc83354160a8|64> sending cert request for "C=US, O=Let's Encrypt, CN=R11"
2024-11-14T08:42:46 Informational charon 09[IKE1] <baa084c5-d489-4c98-9b04-cc83354160a8|64> remote host is behind NAT
2024-11-14T08:42:46 Informational charon 09[CFG1] <baa084c5-d489-4c98-9b04-cc83354160a8|64> selected proposal: IKE:AES_CBC_256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_2048
2024-11-14T08:42:46 Informational charon 09[ENC1] <baa084c5-d489-4c98-9b04-cc83354160a8|64> parsed IKE_SA_INIT response 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(HASH_ALG) N(MULT_AUTH) ]
2024-11-14T08:42:46 Informational charon 09[NET1] <baa084c5-d489-4c98-9b04-cc83354160a8|64> received packet: from TPLINK-WAN-IP[500] to OpnSense-WAN-IP[500] (456 bytes)
2024-11-14T08:42:45 Informational charon 11[NET1] <baa084c5-d489-4c98-9b04-cc83354160a8|64> sending packet: from OpnSense-WAN-IP[500] to TPLINK-WAN-IP[500] (464 bytes)
2024-11-14T08:42:45 Informational charon 11[ENC1] <baa084c5-d489-4c98-9b04-cc83354160a8|64> generating IKE_SA_INIT request 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(REDIR_SUP) ]
2024-11-14T08:42:45 Informational charon 11[IKE0] <baa084c5-d489-4c98-9b04-cc83354160a8|64> initiating IKE_SA baa084c5-d489-4c98-9b04-cc83354160a8[64] to TPLINK-WAN-IP
2024-11-14T08:42:45 Informational charon 11[KNL1] creating acquire job for policy OpnSense-WAN-IP/32 === TPLINK-WAN-IP/32 with reqid {4}
2024-11-14T08:42:27 Informational charon 11[IKE1] <baa084c5-d489-4c98-9b04-cc83354160a8|63> received AUTHENTICATION_FAILED notify error
2024-11-14T08:42:27 Informational charon 11[ENC1] <baa084c5-d489-4c98-9b04-cc83354160a8|63> parsed IKE_AUTH response 1 [ N(AUTH_FAILED) ]
2024-11-14T08:42:27 Informational charon 11[NET1] <baa084c5-d489-4c98-9b04-cc83354160a8|63> received packet: from TPLINK-WAN-IP[4500] to OpnSense-WAN-IP[4500] (80 bytes)
2024-11-14T08:42:27 Informational charon 11[NET1] <baa084c5-d489-4c98-9b04-cc83354160a8|63> sending packet: from OpnSense-WAN-IP[4500] to TPLINK-WAN-IP[4500] (320 bytes)
2024-11-14T08:42:27 Informational charon 11[ENC1] <baa084c5-d489-4c98-9b04-cc83354160a8|63> generating IKE_AUTH request 1 [ IDi CERTREQ AUTH N(ESP_TFC_PAD_N) SA TSi TSr N(MULT_AUTH) N(EAP_ONLY) N(MSG_ID_SYN_SUP) ]
2024-11-14T08:42:27 Informational charon 11[IKE0] <baa084c5-d489-4c98-9b04-cc83354160a8|63> establishing CHILD_SA a47ca189-339d-4157-95b5-4f7554397d64{485} reqid 4
2024-11-14T08:42:27 Informational charon 11[IKE1] <baa084c5-d489-4c98-9b04-cc83354160a8|63> authentication of 'OpnSense-WAN-IP' (myself) with pre-shared key
2024-11-14T08:42:27 Informational charon 11[CFG1] <baa084c5-d489-4c98-9b04-cc83354160a8|63> no IDi configured, fall back on IP address
2024-11-14T08:42:27 Informational charon 11[IKE1] <baa084c5-d489-4c98-9b04-cc83354160a8|63> sending cert request for "C=DE, CN=internal-sslvpn-ca"
2024-11-14T08:42:27 Informational charon 11[IKE1] <baa084c5-d489-4c98-9b04-cc83354160a8|63> sending cert request for "C=US, O=Let's Encrypt, CN=R11"
2024-11-14T08:42:27 Informational charon 11[IKE1] <baa084c5-d489-4c98-9b04-cc83354160a8|63> remote host is behind NAT
2024-11-14T08:42:27 Informational charon 11[CFG1] <baa084c5-d489-4c98-9b04-cc83354160a8|63> selected proposal: IKE:AES_CBC_256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_2048
2024-11-14T08:42:27 Informational charon 11[ENC1] <baa084c5-d489-4c98-9b04-cc83354160a8|63> parsed IKE_SA_INIT response 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(HASH_ALG) N(MULT_AUTH) ]
2024-11-14T08:42:27 Informational charon 11[NET1] <baa084c5-d489-4c98-9b04-cc83354160a8|63> received packet: from TPLINK-WAN-IP[500] to OpnSense-WAN-IP[500] (456 bytes)
2024-11-14T08:42:26 Informational charon 11[NET1] <baa084c5-d489-4c98-9b04-cc83354160a8|63> sending packet: from OpnSense-WAN-IP[500] to TPLINK-WAN-IP[500] (464 bytes)
2024-11-14T08:42:26 Informational charon 11[ENC1] <baa084c5-d489-4c98-9b04-cc83354160a8|63> generating IKE_SA_INIT request 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(REDIR_SUP) ]
2024-11-14T08:42:26 Informational charon 11[IKE0] <baa084c5-d489-4c98-9b04-cc83354160a8|63> initiating IKE_SA baa084c5-d489-4c98-9b04-cc83354160a8[63] to TPLINK-WAN-IP
2024-11-14T08:42:26 Informational charon 11[KNL1] creating acquire job for policy OpnSense-WAN-IP/32 === TPLINK-WAN-IP/32 with reqid {4}
2024-11-14T08:42:11 Informational charon 11[IKE1] <baa084c5-d489-4c98-9b04-cc83354160a8|62> received AUTHENTICATION_FAILED notify error
2024-11-14T08:42:11 Informational charon 11[ENC1] <baa084c5-d489-4c98-9b04-cc83354160a8|62> parsed IKE_AUTH response 1 [ N(AUTH_FAILED) ]
2024-11-14T08:42:11 Informational charon 11[NET1] <baa084c5-d489-4c98-9b04-cc83354160a8|62> received packet: from TPLINK-WAN-IP[4500] to OpnSense-WAN-IP[4500] (80 bytes)
2024-11-14T08:42:11 Informational charon 11[NET1] <baa084c5-d489-4c98-9b04-cc83354160a8|62> sending packet: from OpnSense-WAN-IP[4500] to TPLINK-WAN-IP[4500] (320 bytes)
2024-11-14T08:42:11 Informational charon 11[ENC1] <baa084c5-d489-4c98-9b04-cc83354160a8|62> generating IKE_AUTH request 1 [ IDi CERTREQ AUTH N(ESP_TFC_PAD_N) SA TSi TSr N(MULT_AUTH) N(EAP_ONLY) N(MSG_ID_SYN_SUP) ]
2024-11-14T08:42:11 Informational charon 11[IKE0] <baa084c5-d489-4c98-9b04-cc83354160a8|62> establishing CHILD_SA a47ca189-339d-4157-95b5-4f7554397d64{484} reqid 4
2024-11-14T08:42:11 Informational charon 11[IKE1] <baa084c5-d489-4c98-9b04-cc83354160a8|62> authentication of 'OpnSense-WAN-IP' (myself) with pre-shared key
2024-11-14T08:42:11 Informational charon 11[CFG1] <baa084c5-d489-4c98-9b04-cc83354160a8|62> no IDi configured, fall back on IP address
2024-11-14T08:42:11 Informational charon 11[IKE1] <baa084c5-d489-4c98-9b04-cc83354160a8|62> sending cert request for "C=DE, CN=internal-sslvpn-ca"
2024-11-14T08:42:11 Informational charon 11[IKE1] <baa084c5-d489-4c98-9b04-cc83354160a8|62> sending cert request for "C=US, O=Let's Encrypt, CN=R11"
2024-11-14T08:42:11 Informational charon 11[IKE1] <baa084c5-d489-4c98-9b04-cc83354160a8|62> remote host is behind NAT
2024-11-14T08:42:11 Informational charon 11[CFG1] <baa084c5-d489-4c98-9b04-cc83354160a8|62> selected proposal: IKE:AES_CBC_256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_2048
2024-11-14T08:42:11 Informational charon 11[ENC1] <baa084c5-d489-4c98-9b04-cc83354160a8|62> parsed IKE_SA_INIT response 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(HASH_ALG) N(MULT_AUTH) ]
2024-11-14T08:42:11 Informational charon 11[NET1] <baa084c5-d489-4c98-9b04-cc83354160a8|62> received packet: from TPLINK-WAN-IP[500] to OpnSense-WAN-IP[500] (456 bytes)
2024-11-14T08:42:10 Informational charon 11[NET1] <baa084c5-d489-4c98-9b04-cc83354160a8|62> sending packet: from OpnSense-WAN-IP[500] to TPLINK-WAN-IP[500] (464 bytes)
2024-11-14T08:42:10 Informational charon 11[ENC1] <baa084c5-d489-4c98-9b04-cc83354160a8|62> generating IKE_SA_INIT request 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(REDIR_SUP) ]
2024-11-14T08:42:10 Informational charon 11[IKE0] <baa084c5-d489-4c98-9b04-cc83354160a8|62> initiating IKE_SA baa084c5-d489-4c98-9b04-cc83354160a8[62] to TPLINK-WAN-IP
2024-11-14T08:42:10 Informational charon 11[KNL1] creating acquire job for policy OpnSense-WAN-IP/32 === TPLINK-WAN-IP/32 with reqid {4}
2024-11-14T08:41:56 Informational charon 14[IKE1] <baa084c5-d489-4c98-9b04-cc83354160a8|61> received AUTHENTICATION_FAILED notify error
2024-11-14T08:41:56 Informational charon 14[ENC1] <baa084c5-d489-4c98-9b04-cc83354160a8|61> parsed IKE_AUTH response 1 [ N(AUTH_FAILED) ]
2024-11-14T08:41:56 Informational charon 14[NET1] <baa084c5-d489-4c98-9b04-cc83354160a8|61> received packet: from TPLINK-WAN-IP[4500] to OpnSense-WAN-IP[4500] (80 bytes)
2024-11-14T08:41:56 Informational charon 14[NET1] <baa084c5-d489-4c98-9b04-cc83354160a8|61> sending packet: from OpnSense-WAN-IP[4500] to TPLINK-WAN-IP[4500] (320 bytes)
2024-11-14T08:41:56 Informational charon 14[ENC1] <baa084c5-d489-4c98-9b04-cc83354160a8|61> generating IKE_AUTH request 1 [ IDi CERTREQ AUTH N(ESP_TFC_PAD_N) SA TSi TSr N(MULT_AUTH) N(EAP_ONLY) N(MSG_ID_SYN_SUP) ]
2024-11-14T08:41:56 Informational charon 14[IKE0] <baa084c5-d489-4c98-9b04-cc83354160a8|61> establishing CHILD_SA a47ca189-339d-4157-95b5-4f7554397d64{483} reqid 4
2024-11-14T08:41:56 Informational charon 14[IKE1] <baa084c5-d489-4c98-9b04-cc83354160a8|61> authentication of 'OpnSense-WAN-IP' (myself) with pre-shared key
2024-11-14T08:41:56 Informational charon 14[CFG1] <baa084c5-d489-4c98-9b04-cc83354160a8|61> no IDi configured, fall back on IP address
2024-11-14T08:41:56 Informational charon 14[IKE1] <baa084c5-d489-4c98-9b04-cc83354160a8|61> sending cert request for "C=DE, CN=internal-sslvpn-ca"
2024-11-14T08:41:56 Informational charon 14[IKE1] <baa084c5-d489-4c98-9b04-cc83354160a8|61> sending cert request for "C=US, O=Let's Encrypt, CN=R11"
2024-11-14T08:41:56 Informational charon 14[IKE1] <baa084c5-d489-4c98-9b04-cc83354160a8|61> remote host is behind NAT
2024-11-14T08:41:56 Informational charon 14[CFG1] <baa084c5-d489-4c98-9b04-cc83354160a8|61> selected proposal: IKE:AES_CBC_256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_2048
2024-11-14T08:41:56 Informational charon 14[ENC1] <baa084c5-d489-4c98-9b04-cc83354160a8|61> parsed IKE_SA_INIT response 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(HASH_ALG) N(MULT_AUTH) ]
2024-11-14T08:41:56 Informational charon 14[NET1] <baa084c5-d489-4c98-9b04-cc83354160a8|61> received packet: from TPLINK-WAN-IP[500] to OpnSense-WAN-IP[500] (456 bytes)
2024-11-14T08:41:56 Informational charon 14[NET1] <baa084c5-d489-4c98-9b04-cc83354160a8|61> sending packet: from OpnSense-WAN-IP[500] to TPLINK-WAN-IP[500] (464 bytes)
2024-11-14T08:41:56 Informational charon 14[ENC1] <baa084c5-d489-4c98-9b04-cc83354160a8|61> generating IKE_SA_INIT request 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(REDIR_SUP) ]
2024-11-14T08:41:56 Informational charon 14[IKE0] <baa084c5-d489-4c98-9b04-cc83354160a8|61> initiating IKE_SA baa084c5-d489-4c98-9b04-cc83354160a8[61] to TPLINK-WAN-IP
2024-11-14T08:41:56 Informational charon 11[KNL1] creating acquire job for policy OpnSense-WAN-IP/32 === TPLINK-WAN-IP/32 with reqid {4}
2024-11-14T08:41:48 Informational charon 14[IKE1] <baa084c5-d489-4c98-9b04-cc83354160a8|60> received AUTHENTICATION_FAILED notify error
2024-11-14T08:41:48 Informational charon 14[ENC1] <baa084c5-d489-4c98-9b04-cc83354160a8|60> parsed IKE_AUTH response 1 [ N(AUTH_FAILED) ]

#7
 ;D
Du dachtest wohl, dass der ja nicht so blöd sein wird und das noch nicht geprüft hat...
Alles gut, jetzt läuft es ja.
#8
Es läuft jetzt. Nach Anpassung der MTU auf 1460 und MSS auf 1400, ging es sofort.

Besten Dank für die Hilfe.
#9
Ja, die andere Seite hat ein 192.168.x.x. Netz. Da sollte nicht kollidieren. Ein zweites Gateway gibt es auch nicht. Es ist eigentlich ein ganz simpler Aufbau.
Im Detail: 5 Server in der Cloud. Alle Server haben eine LAN und WAN NIC. Bei 4 Servern ist die WAN NIC deaktiviert und auf der LAN NIC als Gateway die OpnSense eingetragen. Diese ist der 5. Server mit aktivierter LAN und WAN NIC.
#10
Ich habe die Firewall prinzipiell in der Standard-Config gelassen. Das IPsecNetzwerk ist das über den Site2Site Tunnel.
Das Problem kann man auch reproduzieren. Sobald ich beim Eset Antivir auf Aktualisieren klicke, kommt die Meldung in der Firewall. Das Programm "rödelt" sich dann tot und nach einigen Minuten kommt die Meldung, dass das Update abgebrochen ist. 

Vielen Dank für Deine Bemühungen.
#11
Muss das splitten, da es sonst zu groß wäre.
#13
Noch weitere Screenshots.
#14
Hallo,

danke für die Rückmeldung.
Hier die gewünschten Daten:
#15
Guten Morgen,

ich bin nun mal mit einer OpnSense gestartet.
Letztlich ist es keine unüberschaubare Konstellation. Die Server haben die OpnSense als Gateway hinterlegt. Diese hat das LAN und WAN Interface. Keine weiteren Geräte mehr dazwischen. Leider klappen Updates des Virenschutzes nicht, Windows Updates streiken. Aus meiner Sicht ist die Regel für ausgehenden Traffic (LantoWAN) hinterlegt. Ich kann auf das Internet zugreifen, aber einige Pakete werden in regelmäßigen Abständen geblockt.
Meinetwegen kann zu Testzwecken erstmal alles erlaubt sein (LANtoWAN). Es läuft nebenbei noch eine Site2Site Verbindung - ohne Probleme.

Hat jemand einen Denkanstoss?
Danke.