Hallo zusammen,
leider bekomme ich es nicht hin mit meinem iPhone 12 Pro eine IKE2 VPN zur OpnSense i.d. neusten Version herzustellen.
Ich bin nach diesem Link vorgegangen:
https://docs.opnsense.org/manual/how-tos/ipsec-swanctl-rw-ikev2-eap-mschapv2.html
Meine Opnsense ist hinter einer FritzBox!, bei der FritzBox! sind alle entsprechenden Ports freigegeben.
Meine Logs der Firewall sagen folgendes:
2025-07-20T14:07:16 Informational charon 16[IKE] <2ae66195-b865-4427-bb71-6463efb28cd5|72> sending keep alive to 212.117.xx.xx[4500]
2025-07-20T14:07:14 Informational charon 16[JOB] <8a3834e7-9448-47ce-a1c1-747a4e0f206f|74> deleting half open IKE_SA with 80.187.xx.xx after timeout
2025-07-20T14:07:14 Informational charon 16[JOB] <8a3834e7-9448-47ce-a1c1-747a4e0f206f|73> deleting half open IKE_SA with 80.187.xx.xx after timeout
2025-07-20T14:07:04 Informational charon 11[IKE] <8a3834e7-9448-47ce-a1c1-747a4e0f206f|74> sending keep alive to 80.187.xx.xx[10041]
2025-07-20T14:07:04 Informational charon 11[IKE] <8a3834e7-9448-47ce-a1c1-747a4e0f206f|73> sending keep alive to 80.187.xx.xx[10041]
2025-07-20T14:06:56 Informational charon 11[ENC] <2ae66195-b865-4427-bb71-6463efb28cd5|72> parsed INFORMATIONAL response 135 [ N(NATD_S_IP) N(NATD_D_IP) ]
2025-07-20T14:06:56 Informational charon 11[NET] <2ae66195-b865-4427-bb71-6463efb28cd5|72> received packet: from 212.117.xxx.xxx[4500] to 192.168.178.2[4500] (128 bytes)
2025-07-20T14:06:56 Informational charon 11[NET] <2ae66195-b865-4427-bb71-6463efb28cd5|72> sending packet: from 192.168.178.2[4500] to 212.117.xxx.xxx[4500] (128 bytes)
2025-07-20T14:06:56 Informational charon 11[ENC] <2ae66195-b865-4427-bb71-6463efb28cd5|72> generating INFORMATIONAL request 135 [ N(NATD_S_IP) N(NATD_D_IP) ]
2025-07-20T14:06:56 Informational charon 11[IKE] <2ae66195-b865-4427-bb71-6463efb28cd5|72> sending DPD request
2025-07-20T14:06:46 Informational charon 11[IKE] <2ae66195-b865-4427-bb71-6463efb28cd5|72> sending keep alive to 212.117.93.203[4500]
2025-07-20T14:06:44 Informational charon 11[NET] <8a3834e7-9448-47ce-a1c1-747a4e0f206f|74> sending packet: from 192.168.178.2[4500] to 80.187.xxx.xxx[10041] (452 bytes)
2025-07-20T14:06:44 Informational charon 11[NET] <8a3834e7-9448-47ce-a1c1-747a4e0f206f|74> sending packet: from 192.168.178.2[4500] to 80.187.xxx.xxx[10041] (1236 bytes)
2025-07-20T14:06:44 Informational charon 11[ENC] <8a3834e7-9448-47ce-a1c1-747a4e0f206f|74> generating IKE_AUTH response 1 [ EF(2/2) ]
2025-07-20T14:06:44 Informational charon 11[ENC] <8a3834e7-9448-47ce-a1c1-747a4e0f206f|74> generating IKE_AUTH response 1 [ EF(1/2) ]
2025-07-20T14:06:44 Informational charon 11[ENC] <8a3834e7-9448-47ce-a1c1-747a4e0f206f|74> splitting IKE message (1616 bytes) into 2 fragments
2025-07-20T14:06:44 Informational charon 11[ENC] <8a3834e7-9448-47ce-a1c1-747a4e0f206f|74> generating IKE_AUTH response 1 [ IDr CERT AUTH EAP/REQ/ID ]
2025-07-20T14:06:44 Informational charon 11[IKE] <8a3834e7-9448-47ce-a1c1-747a4e0f206f|74> sending end entity cert "C=DE, xxxx
2025-07-20T14:06:44 Informational charon 11[IKE] <8a3834e7-9448-47ce-a1c1-747a4e0f206f|74> authentication of 'MEIN FQDN' (myself) with RSA_EMSA_PKCS1_SHA2_256 successful
2025-07-20T14:06:44 Informational charon 11[IKE] <8a3834e7-9448-47ce-a1c1-747a4e0f206f|74> received ESP_TFC_PADDING_NOT_SUPPORTED, not using ESPv3 TFC padding
2025-07-20T14:06:44 Informational charon 11[IKE] <8a3834e7-9448-47ce-a1c1-747a4e0f206f|74> peer supports MOBIKE
2025-07-20T14:06:44 Informational charon 11[IKE] <8a3834e7-9448-47ce-a1c1-747a4e0f206f|74> initiating EAP_IDENTITY method (id 0x00)
2025-07-20T14:06:44 Informational charon 11[CFG] <8a3834e7-9448-47ce-a1c1-747a4e0f206f|74> selected peer config '8a3834e7-9448-47ce-a1c1-747a4e0f206f'
2025-07-20T14:06:44 Informational charon 11[CFG] <74> looking for peer configs matching 192.168.178.2[XXXXx]...80.187.xx.xx[username@test.de]
2025-07-20T14:06:44 Informational charon 11[ENC] <74> parsed IKE_AUTH request 1 [ IDi N(INIT_CONTACT) IDr CPRQ(ADDR MASK DHCP DNS ADDR6 DHCP6 DNS6 DOMAIN) N(ESP_TFC_PAD_N) N(NON_FIRST_FRAG) SA TSi TSr N(MOBIKE_SUP) ]
2025-07-20T14:06:44 Informational charon 11[ENC] <74> unknown attribute type INTERNAL_DNS_DOMAIN
2025-07-20T14:06:44 Informational charon 11[NET] <74> received packet: from 80.187.xx.xx[10041] to 192.168.178.2[4500] (400 bytes)
2025-07-20T14:06:44 Informational charon 11[NET] <74> sending packet: from 192.168.178.2[500] to 80.187.xx.xx[500] (325 bytes)
2025-07-20T14:06:44 Informational charon 11[ENC] <74> generating IKE_SA_INIT response 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) CERTREQ N(FRAG_SUP) N(HASH_ALG) N(CHDLESS_SUP) N(MULT_AUTH) ]
2025-07-20T14:06:44 Informational charon 11[IKE] <74> sending cert request for
2025-07-20T14:06:44 Informational charon 11[IKE] <74> sending cert request for
2025-07-20T14:06:44 Informational charon 11[IKE] <74> remote host is behind NAT
2025-07-20T14:06:44 Informational charon 11[IKE] <74> local host is behind NAT, sending keep alives
2025-07-20T14:06:44 Informational charon 11[CFG] <74> selected proposal: IKE:AES_CBC_256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/ECP_256
2025-07-20T14:06:44 Informational charon 11[IKE] <74> 80.187.123.49 is initiating an IKE_SA
2025-07-20T14:06:44 Informational charon 11[ENC] <74> parsed IKE_SA_INIT request 0 [ SAxx KE No N(REDIR_SUP) N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) ]
2025-07-20T14:06:44 Informational charon 11[NET] <74> received packet: from 80.187.xxx.xx[500] to 192.168.178.2[500] (370 bytes)
2025-07-20T14:06:44 Informational charon 11[NET] <8a3834e7-9448-47ce-a1c1-747a4e0f206f|73> sending packet: from 192.168.178.2[4500] to 80.187.xx.xx[10041] (452 bytes)
2025-07-20T14:06:44 Informational charon 11[NET] <8a3834e7-9448-47ce-a1c1-747a4e0f206f|73> sending packet: from 192.168.178.2[4500] to 80.187.xx.xx[10041] (1236 bytes)
2025-07-20T14:06:44 Informational charon 11[ENC] <8a3834e7-9448-47ce-a1c1-747a4e0f206f|73> generating IKE_AUTH response 1 [ EF(2/2) ]
2025-07-20T14:06:44 Informational charon 11[ENC] <8a3834e7-9448-47ce-a1c1-747a4e0f206f|73> generating IKE_AUTH response 1 [ EF(1/2) ]
2025-07-20T14:06:44 Informational charon 11[ENC] <8a3834e7-9448-47ce-a1c1-747a4e0f206f|73> splitting IKE message (1616 bytes) into 2 fragments
2025-07-20T14:06:44 Informational charon 11[ENC] <8a3834e7-9448-47ce-a1c1-747a4e0f206f|73> generating IKE_AUTH response 1 [ IDr CERT AUTH EAP/REQ/ID ]
2025-07-20T14:06:44 Informational charon 11[IKE] <8a3834e7-9448-47ce-a1c1-747a4e0f206f|73> sending end entity cert "C=DE,
2025-07-20T14:06:44 Informational charon 11[IKE] <8a3834e7-9448-47ce-a1c1-747a4e0f206f|73> authentication of 'FQDN' (myself) with RSA_EMSA_PKCS1_SHA2_256 successful
2025-07-20T14:06:44 Informational charon 11[IKE] <8a3834e7-9448-47ce-a1c1-747a4e0f206f|73> received ESP_TFC_PADDING_NOT_SUPPORTED, not using ESPv3 TFC padding
2025-07-20T14:06:44 Informational charon 11[IKE] <8a3834e7-9448-47ce-a1c1-747a4e0f206f|73> peer supports MOBIKE
2025-07-20T14:06:44 Informational charon 11[IKE] <8a3834e7-9448-47ce-a1c1-747a4e0f206f|73> initiating EAP_IDENTITY method (id 0x00)
2025-07-20T14:06:44 Informational charon 11[CFG] <8a3834e7-9448-47ce-a1c1-747a4e0f206f|73> selected peer config '8a3834e7-9448-47ce-a1c1-747a4e0f206f'
2025-07-20T14:06:44 Informational charon 11[CFG] <73> looking for peer configs matching 192.168.178.2xxxx
2025-07-20T14:06:44 Informational charon 11[ENC] <73> parsed IKE_AUTH request 1 [ IDi N(INIT_CONTACT) IDr CPRQ(ADDR MASK DHCP DNS ADDR6 DHCP6 DNS6 DOMAIN) N(ESP_TFC_PAD_N) N(NON_FIRST_FRAG) SA TSi TSr N(MOBIKE_SUP) ]
2025-07-20T14:06:44 Informational charon 11[ENC] <73> unknown attribute type INTERNAL_DNS_DOMAIN
2025-07-20T14:06:44 Informational charon 11[NET] <73> received packet: from 80.187.xx.xx[10041] to 192.168.178.2[4500] (400 bytes)
2025-07-20T14:06:44 Informational charon 11[NET] <73> sending packet: from 192.168.178.2[500] to 80.187.xx.xx[500] (325 bytes)
2025-07-20T14:06:44 Informational charon 11[ENC] <73> generating IKE_SA_INIT response 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) CERTREQ N(FRAG_SUP) N(HASH_ALG) N(CHDLESS_SUP) N(MULT_AUTH) ]
2025-07-20T14:06:44 Informational charon 11[IKE] <73> sending cert request for "C=DE,
2025-07-20T14:06:44 Informational charon 11[IKE] <73> sending cert request for "C=DE,
2025-07-20T14:06:44 Informational charon 11[IKE] <73> remote host is behind NAT
2025-07-20T14:06:44 Informational charon 11[IKE] <73> local host is behind NAT, sending keep alives
2025-07-20T14:06:44 Informational charon 11[CFG] <73> selected proposal: IKE:AES_CBC_256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/ECP_256
2025-07-20T14:06:44 Informational charon 11[IKE] <73> 80.187.123.49 is initiating an IKE_SA
2025-07-20T14:06:44 Informational charon 11[ENC] <73> parsed IKE_SA_INIT request 0 [ SA KE No N(REDIR_SUP) N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) ]
2025-07-20T14:06:44 Informational charon 11[NET] <73> received packet: from 80.187.xx.xx[500] to 192.168.178.2[500] (370 bytes)
Einer eine Idee woran es liegen kann?
Grüße
leider bekomme ich es nicht hin mit meinem iPhone 12 Pro eine IKE2 VPN zur OpnSense i.d. neusten Version herzustellen.
Ich bin nach diesem Link vorgegangen:
https://docs.opnsense.org/manual/how-tos/ipsec-swanctl-rw-ikev2-eap-mschapv2.html
Meine Opnsense ist hinter einer FritzBox!, bei der FritzBox! sind alle entsprechenden Ports freigegeben.
Meine Logs der Firewall sagen folgendes:
2025-07-20T14:07:16 Informational charon 16[IKE] <2ae66195-b865-4427-bb71-6463efb28cd5|72> sending keep alive to 212.117.xx.xx[4500]
2025-07-20T14:07:14 Informational charon 16[JOB] <8a3834e7-9448-47ce-a1c1-747a4e0f206f|74> deleting half open IKE_SA with 80.187.xx.xx after timeout
2025-07-20T14:07:14 Informational charon 16[JOB] <8a3834e7-9448-47ce-a1c1-747a4e0f206f|73> deleting half open IKE_SA with 80.187.xx.xx after timeout
2025-07-20T14:07:04 Informational charon 11[IKE] <8a3834e7-9448-47ce-a1c1-747a4e0f206f|74> sending keep alive to 80.187.xx.xx[10041]
2025-07-20T14:07:04 Informational charon 11[IKE] <8a3834e7-9448-47ce-a1c1-747a4e0f206f|73> sending keep alive to 80.187.xx.xx[10041]
2025-07-20T14:06:56 Informational charon 11[ENC] <2ae66195-b865-4427-bb71-6463efb28cd5|72> parsed INFORMATIONAL response 135 [ N(NATD_S_IP) N(NATD_D_IP) ]
2025-07-20T14:06:56 Informational charon 11[NET] <2ae66195-b865-4427-bb71-6463efb28cd5|72> received packet: from 212.117.xxx.xxx[4500] to 192.168.178.2[4500] (128 bytes)
2025-07-20T14:06:56 Informational charon 11[NET] <2ae66195-b865-4427-bb71-6463efb28cd5|72> sending packet: from 192.168.178.2[4500] to 212.117.xxx.xxx[4500] (128 bytes)
2025-07-20T14:06:56 Informational charon 11[ENC] <2ae66195-b865-4427-bb71-6463efb28cd5|72> generating INFORMATIONAL request 135 [ N(NATD_S_IP) N(NATD_D_IP) ]
2025-07-20T14:06:56 Informational charon 11[IKE] <2ae66195-b865-4427-bb71-6463efb28cd5|72> sending DPD request
2025-07-20T14:06:46 Informational charon 11[IKE] <2ae66195-b865-4427-bb71-6463efb28cd5|72> sending keep alive to 212.117.93.203[4500]
2025-07-20T14:06:44 Informational charon 11[NET] <8a3834e7-9448-47ce-a1c1-747a4e0f206f|74> sending packet: from 192.168.178.2[4500] to 80.187.xxx.xxx[10041] (452 bytes)
2025-07-20T14:06:44 Informational charon 11[NET] <8a3834e7-9448-47ce-a1c1-747a4e0f206f|74> sending packet: from 192.168.178.2[4500] to 80.187.xxx.xxx[10041] (1236 bytes)
2025-07-20T14:06:44 Informational charon 11[ENC] <8a3834e7-9448-47ce-a1c1-747a4e0f206f|74> generating IKE_AUTH response 1 [ EF(2/2) ]
2025-07-20T14:06:44 Informational charon 11[ENC] <8a3834e7-9448-47ce-a1c1-747a4e0f206f|74> generating IKE_AUTH response 1 [ EF(1/2) ]
2025-07-20T14:06:44 Informational charon 11[ENC] <8a3834e7-9448-47ce-a1c1-747a4e0f206f|74> splitting IKE message (1616 bytes) into 2 fragments
2025-07-20T14:06:44 Informational charon 11[ENC] <8a3834e7-9448-47ce-a1c1-747a4e0f206f|74> generating IKE_AUTH response 1 [ IDr CERT AUTH EAP/REQ/ID ]
2025-07-20T14:06:44 Informational charon 11[IKE] <8a3834e7-9448-47ce-a1c1-747a4e0f206f|74> sending end entity cert "C=DE, xxxx
2025-07-20T14:06:44 Informational charon 11[IKE] <8a3834e7-9448-47ce-a1c1-747a4e0f206f|74> authentication of 'MEIN FQDN' (myself) with RSA_EMSA_PKCS1_SHA2_256 successful
2025-07-20T14:06:44 Informational charon 11[IKE] <8a3834e7-9448-47ce-a1c1-747a4e0f206f|74> received ESP_TFC_PADDING_NOT_SUPPORTED, not using ESPv3 TFC padding
2025-07-20T14:06:44 Informational charon 11[IKE] <8a3834e7-9448-47ce-a1c1-747a4e0f206f|74> peer supports MOBIKE
2025-07-20T14:06:44 Informational charon 11[IKE] <8a3834e7-9448-47ce-a1c1-747a4e0f206f|74> initiating EAP_IDENTITY method (id 0x00)
2025-07-20T14:06:44 Informational charon 11[CFG] <8a3834e7-9448-47ce-a1c1-747a4e0f206f|74> selected peer config '8a3834e7-9448-47ce-a1c1-747a4e0f206f'
2025-07-20T14:06:44 Informational charon 11[CFG] <74> looking for peer configs matching 192.168.178.2[XXXXx]...80.187.xx.xx[username@test.de]
2025-07-20T14:06:44 Informational charon 11[ENC] <74> parsed IKE_AUTH request 1 [ IDi N(INIT_CONTACT) IDr CPRQ(ADDR MASK DHCP DNS ADDR6 DHCP6 DNS6 DOMAIN) N(ESP_TFC_PAD_N) N(NON_FIRST_FRAG) SA TSi TSr N(MOBIKE_SUP) ]
2025-07-20T14:06:44 Informational charon 11[ENC] <74> unknown attribute type INTERNAL_DNS_DOMAIN
2025-07-20T14:06:44 Informational charon 11[NET] <74> received packet: from 80.187.xx.xx[10041] to 192.168.178.2[4500] (400 bytes)
2025-07-20T14:06:44 Informational charon 11[NET] <74> sending packet: from 192.168.178.2[500] to 80.187.xx.xx[500] (325 bytes)
2025-07-20T14:06:44 Informational charon 11[ENC] <74> generating IKE_SA_INIT response 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) CERTREQ N(FRAG_SUP) N(HASH_ALG) N(CHDLESS_SUP) N(MULT_AUTH) ]
2025-07-20T14:06:44 Informational charon 11[IKE] <74> sending cert request for
2025-07-20T14:06:44 Informational charon 11[IKE] <74> sending cert request for
2025-07-20T14:06:44 Informational charon 11[IKE] <74> remote host is behind NAT
2025-07-20T14:06:44 Informational charon 11[IKE] <74> local host is behind NAT, sending keep alives
2025-07-20T14:06:44 Informational charon 11[CFG] <74> selected proposal: IKE:AES_CBC_256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/ECP_256
2025-07-20T14:06:44 Informational charon 11[IKE] <74> 80.187.123.49 is initiating an IKE_SA
2025-07-20T14:06:44 Informational charon 11[ENC] <74> parsed IKE_SA_INIT request 0 [ SAxx KE No N(REDIR_SUP) N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) ]
2025-07-20T14:06:44 Informational charon 11[NET] <74> received packet: from 80.187.xxx.xx[500] to 192.168.178.2[500] (370 bytes)
2025-07-20T14:06:44 Informational charon 11[NET] <8a3834e7-9448-47ce-a1c1-747a4e0f206f|73> sending packet: from 192.168.178.2[4500] to 80.187.xx.xx[10041] (452 bytes)
2025-07-20T14:06:44 Informational charon 11[NET] <8a3834e7-9448-47ce-a1c1-747a4e0f206f|73> sending packet: from 192.168.178.2[4500] to 80.187.xx.xx[10041] (1236 bytes)
2025-07-20T14:06:44 Informational charon 11[ENC] <8a3834e7-9448-47ce-a1c1-747a4e0f206f|73> generating IKE_AUTH response 1 [ EF(2/2) ]
2025-07-20T14:06:44 Informational charon 11[ENC] <8a3834e7-9448-47ce-a1c1-747a4e0f206f|73> generating IKE_AUTH response 1 [ EF(1/2) ]
2025-07-20T14:06:44 Informational charon 11[ENC] <8a3834e7-9448-47ce-a1c1-747a4e0f206f|73> splitting IKE message (1616 bytes) into 2 fragments
2025-07-20T14:06:44 Informational charon 11[ENC] <8a3834e7-9448-47ce-a1c1-747a4e0f206f|73> generating IKE_AUTH response 1 [ IDr CERT AUTH EAP/REQ/ID ]
2025-07-20T14:06:44 Informational charon 11[IKE] <8a3834e7-9448-47ce-a1c1-747a4e0f206f|73> sending end entity cert "C=DE,
2025-07-20T14:06:44 Informational charon 11[IKE] <8a3834e7-9448-47ce-a1c1-747a4e0f206f|73> authentication of 'FQDN' (myself) with RSA_EMSA_PKCS1_SHA2_256 successful
2025-07-20T14:06:44 Informational charon 11[IKE] <8a3834e7-9448-47ce-a1c1-747a4e0f206f|73> received ESP_TFC_PADDING_NOT_SUPPORTED, not using ESPv3 TFC padding
2025-07-20T14:06:44 Informational charon 11[IKE] <8a3834e7-9448-47ce-a1c1-747a4e0f206f|73> peer supports MOBIKE
2025-07-20T14:06:44 Informational charon 11[IKE] <8a3834e7-9448-47ce-a1c1-747a4e0f206f|73> initiating EAP_IDENTITY method (id 0x00)
2025-07-20T14:06:44 Informational charon 11[CFG] <8a3834e7-9448-47ce-a1c1-747a4e0f206f|73> selected peer config '8a3834e7-9448-47ce-a1c1-747a4e0f206f'
2025-07-20T14:06:44 Informational charon 11[CFG] <73> looking for peer configs matching 192.168.178.2xxxx
2025-07-20T14:06:44 Informational charon 11[ENC] <73> parsed IKE_AUTH request 1 [ IDi N(INIT_CONTACT) IDr CPRQ(ADDR MASK DHCP DNS ADDR6 DHCP6 DNS6 DOMAIN) N(ESP_TFC_PAD_N) N(NON_FIRST_FRAG) SA TSi TSr N(MOBIKE_SUP) ]
2025-07-20T14:06:44 Informational charon 11[ENC] <73> unknown attribute type INTERNAL_DNS_DOMAIN
2025-07-20T14:06:44 Informational charon 11[NET] <73> received packet: from 80.187.xx.xx[10041] to 192.168.178.2[4500] (400 bytes)
2025-07-20T14:06:44 Informational charon 11[NET] <73> sending packet: from 192.168.178.2[500] to 80.187.xx.xx[500] (325 bytes)
2025-07-20T14:06:44 Informational charon 11[ENC] <73> generating IKE_SA_INIT response 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) CERTREQ N(FRAG_SUP) N(HASH_ALG) N(CHDLESS_SUP) N(MULT_AUTH) ]
2025-07-20T14:06:44 Informational charon 11[IKE] <73> sending cert request for "C=DE,
2025-07-20T14:06:44 Informational charon 11[IKE] <73> sending cert request for "C=DE,
2025-07-20T14:06:44 Informational charon 11[IKE] <73> remote host is behind NAT
2025-07-20T14:06:44 Informational charon 11[IKE] <73> local host is behind NAT, sending keep alives
2025-07-20T14:06:44 Informational charon 11[CFG] <73> selected proposal: IKE:AES_CBC_256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/ECP_256
2025-07-20T14:06:44 Informational charon 11[IKE] <73> 80.187.123.49 is initiating an IKE_SA
2025-07-20T14:06:44 Informational charon 11[ENC] <73> parsed IKE_SA_INIT request 0 [ SA KE No N(REDIR_SUP) N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) ]
2025-07-20T14:06:44 Informational charon 11[NET] <73> received packet: from 80.187.xx.xx[500] to 192.168.178.2[500] (370 bytes)
Einer eine Idee woran es liegen kann?
Grüße