2023-02-25T12:48:31 Informational charon 15[CFG] installing trap failed, remote address unknown 2023-02-25T12:48:31 Informational charon 15[CFG] installing 'con1-001' 2023-02-25T12:48:31 Informational charon 15[CFG] installing trap failed, remote address unknown 2023-02-25T12:48:31 Informational charon 15[CFG] installing 'con1-000'
establishing IKE_SA failed, peer not responding
# This file is automatically generated. Do not editconfig setup uniqueids = yesconn con1-000 aggressive = yes fragmentation = yes keyexchange = ikev1 mobike = no reauth = yes rekey = yes forceencaps = no installpolicy = yes type = tunnel dpdaction = restart dpddelay = 10s dpdtimeout = 60s left = <wan-ip> right = <fqdn-fritz1> rightallowany = yes leftid = fqdn:<fqdn-sense> ikelifetime = 28800s lifetime = 3600s ike = aes256-sha512-modp1024! leftauth = psk rightauth = psk rightid = fqdn:<fqdn-fritz1> reqid = 1 rightsubnet = 192.168.x.0/24 leftsubnet = 192.168.y.0/24 esp = aes256-sha512-modp1024! auto = routeconn con1-001 aggressive = yes fragmentation = yes keyexchange = ikev1 mobike = no reauth = yes rekey = yes forceencaps = no installpolicy = yes type = tunnel dpdaction = restart dpddelay = 10s dpdtimeout = 60s left = <wan-ip> right = <fqdn-fritz1> rightallowany = yes leftid = fqdn:<fqdn-sense> ikelifetime = 28800s lifetime = 3600s ike = aes256-sha512-modp1024! leftauth = psk rightauth = psk rightid = fqdn:<fqdn-fritz1> reqid = 2 rightsubnet = 192.168.x.0/24 leftsubnet = 192.168.z.0/24 esp = aes256-sha512-modp1024! auto = routeconn con2 aggressive = yes fragmentation = yes keyexchange = ikev1 mobike = no reauth = yes rekey = yes forceencaps = no installpolicy = yes type = tunnel dpdaction = restart dpddelay = 10s dpdtimeout = 60s left = <wan-ip> right = <fqdn-fritz2> rightallowany = yes leftid = fqdn:<fqdn-sense> ikelifetime = 28800s lifetime = 3600s ike = aes256-sha512-modp1024! leftauth = psk rightauth = psk rightid = fqdn:<fqdn-fritz2> reqid = 3 rightsubnet = 192.168.u.0/24 leftsubnet = 192.168.y.0/24 esp = aes256-sha512-modp1024! auto = routeinclude ipsec.opnsense.d/*.conf
# This file is automatically generated. Do not editconnections { con1 { unique = replace aggressive = yes version = 1 mobike = no local_addrs = <wan-ip> local-0 { id = fqdn:<fqdn-sense> auth = psk } remote-0 { id = fqdn:<fqdn-fritz1> auth = psk } remote_addrs = %any encap = no dpd_delay = 10 s dpd_timeout = 60 s proposals = aes256-sha512-modp1024 children { con1-000 { start_action = trap policies = yes mode = tunnel sha256_96 = no dpd_action = start local_ts = 192.168.y.0/24 remote_ts = 192.168.x.0/24 reqid = 1 esp_proposals = aes256-sha512-modp1024 life_time = 3600 s } con1-001 { start_action = trap policies = yes mode = tunnel sha256_96 = no dpd_action = start local_ts = 192.168.z.0/24 remote_ts = 192.168.x.0/24 reqid = 2 esp_proposals = aes256-sha512-modp1024 life_time = 3600 s } } } con2 { unique = replace aggressive = yes version = 1 mobike = no local_addrs = <wan-ip> local-0 { id = fqdn:<fqdn-sense> auth = psk } remote-0 { id = fqdn:<fqdn-fritz2> auth = psk } remote_addrs = %any encap = no dpd_delay = 10 s dpd_timeout = 60 s proposals = aes256-sha512-modp1024 children { con2-000 { start_action = trap policies = yes mode = tunnel sha256_96 = no dpd_action = start local_ts = 192.168.z.0/24 remote_ts = 192.168.u.0/24 reqid = 3 esp_proposals = aes256-sha512-modp1024 life_time = 3600 s } } }}pools {}secrets { ike-p1-0 { id-0 = fqdn:<fqdn-fritz1> secret = xx== } ike-p1-1 { id-0 = fqdn:<fqdn-fritz2> secret = yy== } ike-xy-ab-cd-ef-gh { id-0 = <fqdn-sense> secret = zz== }}# Include config snippetsinclude conf.d/*.conf
"Die FRITZ!Box nutzt beim Schlüsselaustausch über Diffie-Hellman initial 1024 Bit (DH-Gruppe 2). Sie akzeptiert danach aber auch 768, 1536, 2048 und 3072 Bit (DH-Gruppe 1, 5, 14 und 15)."
1) Muss dann nicht einfach nur bei Children die 2 Phase 2 Einträge rein? Sieht mir nach 2 separaten Connections aus? Im Prinzip also "tunnel isolation" in Phase 1 entsprechend alter GUI. Ich nehme an das ist auf 22.7.x nicht gesetzt bei dir?