Hi Claude,
Sorry but no other solution for the moment, i think there is a incompatibility between this NIC and Shrew driver... and there is no active dev on Shrew, i think the better solution is to check a another VPN client... Cheers, On Mon, Dec 14, 2015 at 2:24 AM, DUVERGIER Claude < [email protected]> wrote: > Hello, > > According to attached pfSense log, it did got something and responded to > it... > > charon: 13[IKE] <con2|120> sending XAuth vendor ID > > charon: 13[IKE] <con2|120> sending DPD vendor ID > > charon: 13[IKE] <con2|120> sending Cisco Unity vendor ID > > charon: 13[IKE] <con2|120> sending FRAGMENTATION vendor ID > > charon: 13[IKE] <con2|120> sending NAT-T (RFC 3947) vendor ID > > charon: 13[ENC] <con2|120> generating AGGRESSIVE response 0 [ SA KE No > ID NAT-D NAT-D HASH V V V V V ] > > charon: 13[NET] <con2|120> sending packet: from 10.0.0.1[500] to > 12.34.56.78[500] (463 bytes) > > charon: 13[IKE] <con2|120> sending retransmit 1 of response message ID > 0, seq 1 > > charon: 13[NET] <con2|120> sending packet: from 10.0.0.1[500] to > 12.34.56.78[500] (463 bytes) > > charon: 06[NET] <con2|120> received packet: from 12.34.56.78[500] to > 10.0.0.1[500] (1181 bytes) > > charon: 06[IKE] <con2|120> received retransmit of request with ID 0, > retransmitting response > > charon: 06[NET] <con2|120> sending packet: from 10.0.0.1[500] to > 12.34.56.78[500] (463 bytes) > > charon: 13[NET] <con2|117> received packet: from 12.34.56.78[4500] to > 10.0.0.1[4500] (92 bytes) > > charon: 13[ENC] <con2|117> parsed INFORMATIONAL_V1 request 3503928170 [ > HASH N(DPD) ] > > charon: 13[IKE] <con2|117> queueing ISAKMP_DPD task > > charon: 13[IKE] <con2|117> activating new tasks > > charon: 13[IKE] <con2|117> activating ISAKMP_DPD task > > charon: 13[ENC] <con2|117> generating INFORMATIONAL_V1 request > 3209268149 [ HASH N(DPD_ACK) ] > > charon: 13[NET] <con2|117> sending packet: from 10.0.0.1[4500] to > 12.34.56.78[4500] (92 bytes) > > charon: 13[IKE] <con2|117> activating new tasks > > charon: 13[IKE] <con2|117> nothing to initiate > > Client's public IP = 12.34.56.78 > pfSense's LAN IP = 10.0.0.1 > > > There is sometimes some issue with NIC (in this case, the nic have > > TCP/IP hardware stack... may be why there is this problem !) > As I said, I've found several topics that reports issues with VPN and > this NIC: my message aimed to report the issue and to check for existing > solution (tweaks, beta client, etc.). > > > Do you have try a another vpn client ? (like SoftEther VPN ?) > Didn't know about that client but it seems it only speaks IPSec with a > SoftEther VPN Server (I can't see any "IPSec" setting in the client GUI). > Do you know any other IPSec Windows client I could try? > > Thanks > > -- > DUVERGIER Claude > > Le 11/12/2015 08:59, Alexis La Goutte a écrit : > > Bonjour Claude, > > > > What say VPN Pfsense gateway logs ? received the packet ? > > > > There is sometimes some issue with NIC (in this case, the nic have > > TCP/IP hardware stack... may be why there is this problem !) > > Do you have try a another vpn client ? (like SoftEther VPN ?) > > > > Cheers > > > > On Sat, Nov 28, 2015 at 5:21 PM, DUVERGIER Claude > > <[email protected] > > <mailto:[email protected]>> wrote: > > > > Hello, > > > > I'm having troubles connecting to VPN using v2.2.2 client on a > Windows 7 > > 64-bits machine that has "Killer e2200 Gigabit Ethernet Controller" > NIC: > > it times out ("negotiation timout occurred"). > > > > The same "VPN configuration" works just fine on other Windows 7 > > computers and even on a VMware virtual machine hosted on my "Killer > > e2200" machine (where it does not work natively). > > > > I have found multiple occurrences of such incompatibilities between > > Shrew Soft and Killer e2200: > > * > > > http://www.tomshardware.co.uk/forum/36203-43-shrew-soft-wireless-windows > > * > > > http://www.techpowerup.com/forums/threads/intel-nic-network-interface-controller-vs-killer-e2200.200606/page-2#post-3163550 > > > > Some suggests to disable the "Microsoft Virtual Wifi Adapter" (so as > > your FAQ) but I don't have any. > > > > I tried updating the Killer e2200 drivers to their last version, all > the > > "NAT Traversal" possible values: no luck. > > > > Is it a known issue? Is there a workaround? > > > > > > Client and Gateway Information: > > * VPN Client Version = 2.2.2 > > * Windows OS Version = Windows 7 Pro SP1 64 bits > > * Gateway Make/Model = pfSense (strongSwan) > > * Gateway OS Version = 2.2.5 > > > > > > Here are the connection window logs: > > ----- > > config loaded for site 'Foobar' > > attached to key daemon ... > > peer configured > > iskamp proposal configured > > esp proposal configured > > client configured > > local id configured > > remote id configured > > pre-shared key configured > > bringing up tunnel ... > > negotiation timout occurred > > tunnel disabled > > detached from key daemon > > ----- > > > > Also see attached iked.log, here is an excerpt: > > ----- > > [...] > > 15/11/28 17:11:35 >= : cookies dff03a917b3e80f1:0000000000000000 > > 15/11/28 17:11:35 >= : message 00000000 > > 15/11/28 17:11:35 -> : send IKE packet 192.168.0.10:500 > > <http://192.168.0.10:500> -> > > 12.34.56.78:500 <http://12.34.56.78:500> ( 1209 bytes ) > > 15/11/28 17:11:35 DB : phase1 resend event scheduled ( ref count = 2 > ) > > 15/11/28 17:11:40 -> : resend 1 phase1 packet(s) [0/2] > > 192.168.0.10:500 <http://192.168.0.10:500> > > -> 12.34.56.78:500 <http://12.34.56.78:500> > > 15/11/28 17:11:45 -> : resend 1 phase1 packet(s) [1/2] > > 192.168.0.10:500 <http://192.168.0.10:500> > > -> 12.34.56.78:500 <http://12.34.56.78:500> > > 15/11/28 17:11:50 -> : resend 1 phase1 packet(s) [2/2] > > 192.168.0.10:500 <http://192.168.0.10:500> > > -> 12.34.56.78:500 <http://12.34.56.78:500> > > 15/11/28 17:11:55 ii : resend limit exceeded for phase1 exchange > > 15/11/28 17:11:55 ii : phase1 removal before expire time > > 15/11/28 17:11:55 DB : phase1 deleted ( obj count = 0 ) > > 15/11/28 17:11:55 DB : policy not found > > 15/11/28 17:11:55 DB : policy not found > > 15/11/28 17:11:55 DB : policy not found > > 15/11/28 17:11:55 DB : policy not found > > 15/11/28 17:11:55 DB : removing tunnel config references > > 15/11/28 17:11:55 DB : removing tunnel phase2 references > > 15/11/28 17:11:55 DB : removing tunnel phase1 references > > 15/11/28 17:11:55 DB : tunnel deleted ( obj count = 0 ) > > 15/11/28 17:11:55 DB : removing all peer tunnel references > > 15/11/28 17:11:55 DB : peer deleted ( obj count = 0 ) > > 15/11/28 17:11:55 ii : ipc client process thread exit ... > > ----- > > > > Regards > > > > > > -- > > DUVERGIER Claude > > > > _______________________________________________ > > vpn-help mailing list > > [email protected] <mailto:[email protected]> > > https://lists.shrew.net/mailman/listinfo/vpn-help > > > > >
_______________________________________________ vpn-help mailing list [email protected] https://lists.shrew.net/mailman/listinfo/vpn-help
