Skip to main content
Warum O2
Warenkorb
Service
Gelöst

Heute Probleme mit VoWifi?

  • October 20, 2019
  • 1 Antwort
  • 419 Aufrufe

ThetaPhi
Besucher:in

Moin,

Ich habe Galaxy S7, welches bereits seit dem Anfang aller Zeit VoWifi (also Telefonieren über das lokale WLAN-Netz) unterstützt. Heute wollte ich von Zuhause telefonieren, wo das LTE/3G Netz recht schwach ist, und habe festgestellt, dass weder das VoWifi-Symbol auf meinem Smartphone erscheinen, noch das Gespräch darüber aufgebaut wird und entsprechend schlecht war die Sprachqualität.

Es hat bisher immer funktioniert, allerdings hat die Netzwerkanalyse des Verkehrs heute auf der Internetanbindung ergeben, dass das Telefon zwar versucht eine IKE-Verbindung aufzubauen, aber nur Fehlerpakete durch den O2-Server gesendet werden, es kommt daher die nötige IPsec-Verbindung nicht zustande. Der Server bei O2 ist nicht tot (obwohl er sich nicht anpingen lässt), denn er antwortet, wenn aber nur mit Fehlercodes; das Smartphone versucht es mehrmals gibt aber dann nach etwa einer Minute auf:

tcpdump: listening on ifwan, link-type LINUX_SLL (Linux cooked), capture size 262144 bytes

13:14:52.891607 IP (tos 0x0, ttl 63, id 43990, offset 0, flags [DF], proto UDP (17), length 492)

    p4FC8B9EF.dip0.t-ipconnect.de.47289 > 89.204.136.64.isakmp: [udp sum ok] isakmp 2.0 msgid 00000000 cookie 6300386cf8f8b6ed->0000000000000000: parent_sa ikev2_init[I]:

    (sa: len=44

        (p: #1 protoid=isakmp transform=4 len=44

            (t: #1 type=encr id=aes (type=keylen value=0100))

            (t: #2 type=integ id=hmac-sha )

            (t: #3 type=prf id=hmac-sha )

            (t: #4 type=dh id=modp2048 )))

    (v2ke: len=256 group=modp2048)

    (nonce: len=32 nonce=(6d41a0ab84c2bfe8b3d1f8aec845fd89f6d804c9debe16f5c3657c1b8efbb971) )

    (n: prot_id=#0 type=16388(nat_detection_source_ip))

    (n: prot_id=#0 type=16389(nat_detection_destination_ip))

    (n: prot_id=#0 type=16430(status))

    (n: prot_id=#0 type=16431(status))

    (n: prot_id=#0 type=16406(status))

13:14:53.359451 IP (tos 0x0, ttl 247, id 58887, offset 0, flags [none], proto UDP (17), length 80)

    89.204.136.64.isakmp > p4FC8B9EF.dip0.t-ipconnect.de.47289: [udp sum ok] isakmp 2.0 msgid 00000000 cookie 6300386cf8f8b6ed->0000000000000000: parent_sa ikev2_init[R]:

    (n: prot_id=#0 type=16390(cookie) data=(00003fd983d6fa315727b38869f380e4))

13:14:53.362645 IP (tos 0x0, ttl 63, id 44037, offset 0, flags [DF], proto UDP (17), length 516)

    p4FC8B9EF.dip0.t-ipconnect.de.47289 > 89.204.136.64.isakmp: [udp sum ok] isakmp 2.0 msgid 00000000 cookie 6300386cf8f8b6ed->0000000000000000: parent_sa ikev2_init[I]:

    (n: prot_id=#0 type=16390(cookie) data=(00003fd983d6fa315727...0000402f00010002000300040000000800004016))

    (sa: len=44

        (p: #1 protoid=isakmp transform=4 len=44

            (t: #1 type=encr id=aes (type=keylen value=0100))

            (t: #2 type=integ id=hmac-sha )

            (t: #3 type=prf id=hmac-sha )

            (t: #4 type=dh id=modp2048 )))

    (v2ke: len=256 group=modp2048)

    (nonce: len=32 nonce=(6d41a0ab84c2bfe8b3d1f8aec845fd89f6d804c9debe16f5c3657c1b8efbb971) )

    (n: prot_id=#0 type=16388(nat_detection_source_ip))

    (n: prot_id=#0 type=16389(nat_detection_destination_ip))

    (n: prot_id=#0 type=16430(status))

    (n: prot_id=#0 type=16431(status))

    (n: prot_id=#0 type=16406(status))

13:14:53.533432 IP (tos 0x0, ttl 247, id 59083, offset 0, flags [none], proto UDP (17), length 444)

    89.204.136.64.isakmp > p4FC8B9EF.dip0.t-ipconnect.de.47289: [udp sum ok] isakmp 2.0 msgid 00000000 cookie 6300386cf8f8b6ed->1014026301c0561f: parent_sa ikev2_init[R]:

    (sa: len=44

        (p: #1 protoid=isakmp transform=4 len=44

            (t: #1 type=encr id=aes (type=keylen value=0100))

            (t: #2 type=prf id=hmac-sha )

            (t: #3 type=integ id=hmac-sha )

            (t: #4 type=dh id=modp2048 )))

    (v2ke: len=256 group=modp2048)

    (nonce: len=16 nonce=(ddeed1a4291f7b521e0c28ef967a8c70) )

    (n: prot_id=isakmp type=16388(nat_detection_source_ip))

    (n: prot_id=isakmp type=16389(nat_detection_destination_ip))

13:14:53.546107 IP (tos 0x0, ttl 63, id 44049, offset 0, flags [DF], proto UDP (17), length 380)

    p4FC8B9EF.dip0.t-ipconnect.de.34235 > 89.204.136.64.ipsec-nat-t: [udp sum ok] NONESP-encap: isakmp 2.0 msgid 00000001 cookie 6300386cf8f8b6ed->1014026301c0561f: child_sa  ikev2_auth[I]:

    (v2e: len=316)

13:14:54.554383 IP (tos 0x0, ttl 63, id 44104, offset 0, flags [DF], proto UDP (17), length 380)

    p4FC8B9EF.dip0.t-ipconnect.de.34235 > 89.204.136.64.ipsec-nat-t: [udp sum ok] NONESP-encap: isakmp 2.0 msgid 00000001 cookie 6300386cf8f8b6ed->1014026301c0561f: child_sa  ikev2_auth[I]:

    (v2e: len=316)

13:14:56.551553 IP (tos 0x0, ttl 63, id 44153, offset 0, flags [DF], proto UDP (17), length 380)

    p4FC8B9EF.dip0.t-ipconnect.de.34235 > 89.204.136.64.ipsec-nat-t: [udp sum ok] NONESP-encap: isakmp 2.0 msgid 00000001 cookie 6300386cf8f8b6ed->1014026301c0561f: child_sa  ikev2_auth[I]:

    (v2e: len=316)

13:15:00.553687 IP (tos 0x0, ttl 63, id 44257, offset 0, flags [DF], proto UDP (17), length 380)

    p4FC8B9EF.dip0.t-ipconnect.de.34235 > 89.204.136.64.ipsec-nat-t: [udp sum ok] NONESP-encap: isakmp 2.0 msgid 00000001 cookie 6300386cf8f8b6ed->1014026301c0561f: child_sa  ikev2_auth[I]:

    (v2e: len=316)

13:15:00.649423 IP (tos 0x0, ttl 247, id 382, offset 0, flags [none], proto UDP (17), length 156)

    89.204.136.64.ipsec-nat-t > p4FC8B9EF.dip0.t-ipconnect.de.34235: [udp sum ok] NONESP-encap: isakmp 2.0 msgid 00000001 cookie 6300386cf8f8b6ed->1014026301c0561f: child_sa  ikev2_auth[R]:

    (v2e: len=92)

13:15:00.655230 IP (tos 0x0, ttl 63, id 44262, offset 0, flags [DF], proto UDP (17), length 108)

    p4FC8B9EF.dip0.t-ipconnect.de.34235 > 89.204.136.64.ipsec-nat-t: [udp sum ok] NONESP-encap: isakmp 2.0 msgid 00000002 cookie 6300386cf8f8b6ed->1014026301c0561f: child_sa  inf2[I]:

    (v2e: len=44)

13:15:00.656455 IP (tos 0x0, ttl 247, id 391, offset 0, flags [none], proto UDP (17), length 68)

    89.204.136.64.ipsec-nat-t > p4FC8B9EF.dip0.t-ipconnect.de.34235: [udp sum ok] NONESP-encap: isakmp 2.0 msgid 00000001 cookie 6300386cf8f8b6ed->0000000000000000: child_sa  ikev2_auth[R]:

    (n: prot_id=#0 type=4(invalid_ike_spi))

13:15:00.815298 IP (tos 0x0, ttl 247, id 515, offset 0, flags [none], proto UDP (17), length 68)

    89.204.136.64.ipsec-nat-t > p4FC8B9EF.dip0.t-ipconnect.de.34235: [udp sum ok] NONESP-encap: isakmp 2.0 msgid 00000002 cookie 6300386cf8f8b6ed->0000000000000000: child_sa  inf2[R]:

    (n: prot_id=#0 type=4(invalid_ike_spi))

13:15:00.920271 IP (tos 0x0, ttl 63, id 44288, offset 0, flags [DF], proto UDP (17), length 492)

    p4FC8B9EF.dip0.t-ipconnect.de.47289 > 89.204.136.64.isakmp: [udp sum ok] isakmp 2.0 msgid 00000000 cookie 48efa33ed7df6b75->0000000000000000: parent_sa ikev2_init[I]:

    (sa: len=44

        (p: #1 protoid=isakmp transform=4 len=44

            (t: #1 type=encr id=aes (type=keylen value=0100))

            (t: #2 type=integ id=hmac-sha )

            (t: #3 type=prf id=hmac-sha )

            (t: #4 type=dh id=modp2048 )))

    (v2ke: len=256 group=modp2048)

    (nonce: len=32 nonce=(2e8857efb8fc4fa6799cbf347e9926c53344099d0d6ef5dcd0fb3d3045455079) )

    (n: prot_id=#0 type=16388(nat_detection_source_ip))

    (n: prot_id=#0 type=16389(nat_detection_destination_ip))

    (n: prot_id=#0 type=16430(status))

    (n: prot_id=#0 type=16431(status))

    (n: prot_id=#0 type=16406(status))

13:15:01.639331 IP (tos 0x0, ttl 247, id 1304, offset 0, flags [none], proto UDP (17), length 80)

    89.204.136.64.isakmp > p4FC8B9EF.dip0.t-ipconnect.de.47289: [udp sum ok] isakmp 2.0 msgid 00000000 cookie 48efa33ed7df6b75->0000000000000000: parent_sa ikev2_init[R]:

    (n: prot_id=#0 type=16390(cookie) data=(00003fd97f96e416c11aef8ff0815e21))

13:15:01.728718 IP (tos 0x0, ttl 63, id 44315, offset 0, flags [DF], proto UDP (17), length 516)

    p4FC8B9EF.dip0.t-ipconnect.de.47289 > 89.204.136.64.isakmp: [udp sum ok] isakmp 2.0 msgid 00000000 cookie 48efa33ed7df6b75->0000000000000000: parent_sa ikev2_init[I]:

    (n: prot_id=#0 type=16390(cookie) data=(00003fd97f96e416c11a...0000402f00010002000300040000000800004016))

    (sa: len=44

        (p: #1 protoid=isakmp transform=4 len=44

            (t: #1 type=encr id=aes (type=keylen value=0100))

            (t: #2 type=integ id=hmac-sha )

            (t: #3 type=prf id=hmac-sha )

            (t: #4 type=dh id=modp2048 )))

    (v2ke: len=256 group=modp2048)

    (nonce: len=32 nonce=(2e8857efb8fc4fa6799cbf347e9926c53344099d0d6ef5dcd0fb3d3045455079) )

    (n: prot_id=#0 type=16388(nat_detection_source_ip))

    (n: prot_id=#0 type=16389(nat_detection_destination_ip))

    (n: prot_id=#0 type=16430(status))

    (n: prot_id=#0 type=16431(status))

    (n: prot_id=#0 type=16406(status))

13:15:01.920349 IP (tos 0x0, ttl 63, id 44320, offset 0, flags [DF], proto UDP (17), length 516)

    p4FC8B9EF.dip0.t-ipconnect.de.47289 > 89.204.136.64.isakmp: [udp sum ok] isakmp 2.0 msgid 00000000 cookie 48efa33ed7df6b75->0000000000000000: parent_sa ikev2_init[I]:

    (n: prot_id=#0 type=16390(cookie) data=(00003fd97f96e416c11a...0000402f00010002000300040000000800004016))

    (sa: len=44

        (p: #1 protoid=isakmp transform=4 len=44

            (t: #1 type=encr id=aes (type=keylen value=0100))

            (t: #2 type=integ id=hmac-sha )

            (t: #3 type=prf id=hmac-sha )

            (t: #4 type=dh id=modp2048 )))

    (v2ke: len=256 group=modp2048)

    (nonce: len=32 nonce=(2e8857efb8fc4fa6799cbf347e9926c53344099d0d6ef5dcd0fb3d3045455079) )

    (n: prot_id=#0 type=16388(nat_detection_source_ip))

    (n: prot_id=#0 type=16389(nat_detection_destination_ip))

    (n: prot_id=#0 type=16430(status))

    (n: prot_id=#0 type=16431(status))

    (n: prot_id=#0 type=16406(status))

13:15:02.557341 IP (tos 0x0, ttl 247, id 2239, offset 0, flags [none], proto UDP (17), length 444)

    89.204.136.64.isakmp > p4FC8B9EF.dip0.t-ipconnect.de.47289: [udp sum ok] isakmp 2.0 msgid 00000000 cookie 48efa33ed7df6b75->547bd7d001f864d4: parent_sa ikev2_init[R]:

    (sa: len=44

        (p: #1 protoid=isakmp transform=4 len=44

            (t: #1 type=encr id=aes (type=keylen value=0100))

            (t: #2 type=prf id=hmac-sha )

            (t: #3 type=integ id=hmac-sha )

            (t: #4 type=dh id=modp2048 )))

    (v2ke: len=256 group=modp2048)

    (nonce: len=16 nonce=(bc383a1b9b7ee21c1a03bf0bb3eda069) )

    (n: prot_id=isakmp type=16388(nat_detection_source_ip))

    (n: prot_id=isakmp type=16389(nat_detection_destination_ip))

13:15:02.670439 IP (tos 0x0, ttl 63, id 44381, offset 0, flags [DF], proto UDP (17), length 380)

    p4FC8B9EF.dip0.t-ipconnect.de.34235 > 89.204.136.64.ipsec-nat-t: [udp sum ok] NONESP-encap: isakmp 2.0 msgid 00000001 cookie 48efa33ed7df6b75->547bd7d001f864d4: child_sa  ikev2_auth[I]:

    (v2e: len=316)

13:15:02.973993 IP (tos 0x0, ttl 247, id 2637, offset 0, flags [none], proto UDP (17), length 444)

    89.204.136.64.isakmp > p4FC8B9EF.dip0.t-ipconnect.de.47289: [udp sum ok] isakmp 2.0 msgid 00000000 cookie 48efa33ed7df6b75->547bd7d001f864d4: parent_sa ikev2_init[R]:

    (sa: len=44

        (p: #1 protoid=isakmp transform=4 len=44

            (t: #1 type=encr id=aes (type=keylen value=0100))

            (t: #2 type=prf id=hmac-sha )

            (t: #3 type=integ id=hmac-sha )

            (t: #4 type=dh id=modp2048 )))

    (v2ke: len=256 group=modp2048)

    (nonce: len=16 nonce=(bc383a1b9b7ee21c1a03bf0bb3eda069) )

    (n: prot_id=isakmp type=16388(nat_detection_source_ip))

    (n: prot_id=isakmp type=16389(nat_detection_destination_ip))

13:15:03.674875 IP (tos 0x0, ttl 63, id 44451, offset 0, flags [DF], proto UDP (17), length 380)

    p4FC8B9EF.dip0.t-ipconnect.de.34235 > 89.204.136.64.ipsec-nat-t: [udp sum ok] NONESP-encap: isakmp 2.0 msgid 00000001 cookie 48efa33ed7df6b75->547bd7d001f864d4: child_sa  ikev2_auth[I]:

    (v2e: len=316)

13:15:05.676965 IP (tos 0x0, ttl 63, id 44464, offset 0, flags [DF], proto UDP (17), length 380)

    p4FC8B9EF.dip0.t-ipconnect.de.34235 > 89.204.136.64.ipsec-nat-t: [udp sum ok] NONESP-encap: isakmp 2.0 msgid 00000001 cookie 48efa33ed7df6b75->547bd7d001f864d4: child_sa  ikev2_auth[I]:

    (v2e: len=316)

13:15:09.641221 IP (tos 0x0, ttl 247, id 9156, offset 0, flags [none], proto UDP (17), length 156)

    89.204.136.64.ipsec-nat-t > p4FC8B9EF.dip0.t-ipconnect.de.34235: [udp sum ok] NONESP-encap: isakmp 2.0 msgid 00000001 cookie 48efa33ed7df6b75->547bd7d001f864d4: child_sa  ikev2_auth[R]:

    (v2e: len=92)

13:15:09.677376 IP (tos 0x0, ttl 63, id 44727, offset 0, flags [DF], proto UDP (17), length 380)

    p4FC8B9EF.dip0.t-ipconnect.de.34235 > 89.204.136.64.ipsec-nat-t: [udp sum ok] NONESP-encap: isakmp 2.0 msgid 00000001 cookie 48efa33ed7df6b75->547bd7d001f864d4: child_sa  ikev2_auth[I]:

    (v2e: len=316)

13:15:09.681820 IP (tos 0x0, ttl 63, id 44728, offset 0, flags [DF], proto UDP (17), length 108)

    p4FC8B9EF.dip0.t-ipconnect.de.34235 > 89.204.136.64.ipsec-nat-t: [udp sum ok] NONESP-encap: isakmp 2.0 msgid 00000002 cookie 48efa33ed7df6b75->547bd7d001f864d4: child_sa  inf2[I]:

    (v2e: len=44)

13:15:09.745652 IP (tos 0x0, ttl 247, id 9223, offset 0, flags [none], proto UDP (17), length 68)

    89.204.136.64.ipsec-nat-t > p4FC8B9EF.dip0.t-ipconnect.de.34235: [udp sum ok] NONESP-encap: isakmp 2.0 msgid 00000001 cookie 48efa33ed7df6b75->0000000000000000: child_sa  ikev2_auth[R]:

    (n: prot_id=#0 type=4(invalid_ike_spi))

13:15:09.745672 IP (tos 0x0, ttl 247, id 9224, offset 0, flags [none], proto UDP (17), length 68)

    89.204.136.64.ipsec-nat-t > p4FC8B9EF.dip0.t-ipconnect.de.34235: [udp sum ok] NONESP-encap: isakmp 2.0 msgid 00000002 cookie 48efa33ed7df6b75->0000000000000000: child_sa  inf2[R]:

    (n: prot_id=#0 type=4(invalid_ike_spi))

13:15:09.934882 IP (tos 0x0, ttl 63, id 44750, offset 0, flags [DF], proto UDP (17), length 492)

    p4FC8B9EF.dip0.t-ipconnect.de.47289 > 89.204.136.64.isakmp: [udp sum ok] isakmp 2.0 msgid 00000000 cookie 1764aee3e9089c39->0000000000000000: parent_sa ikev2_init[I]:

    (sa: len=44

        (p: #1 protoid=isakmp transform=4 len=44

            (t: #1 type=encr id=aes (type=keylen value=0100))

            (t: #2 type=integ id=hmac-sha )

            (t: #3 type=prf id=hmac-sha )

            (t: #4 type=dh id=modp2048 )))

    (v2ke: len=256 group=modp2048)

    (nonce: len=32 nonce=(d59b13403b0accf698c209468cc0cc7b94e9ab3543f674268562f749205ab340) )

    (n: prot_id=#0 type=16388(nat_detection_source_ip))

    (n: prot_id=#0 type=16389(nat_detection_destination_ip))

    (n: prot_id=#0 type=16430(status))

    (n: prot_id=#0 type=16431(status))

    (n: prot_id=#0 type=16406(status))

13:15:10.939196 IP (tos 0x0, ttl 63, id 44805, offset 0, flags [DF], proto UDP (17), length 492)

    p4FC8B9EF.dip0.t-ipconnect.de.47289 > 89.204.136.64.isakmp: [udp sum ok] isakmp 2.0 msgid 00000000 cookie 1764aee3e9089c39->0000000000000000: parent_sa ikev2_init[I]:

    (sa: len=44

        (p: #1 protoid=isakmp transform=4 len=44

            (t: #1 type=encr id=aes (type=keylen value=0100))

            (t: #2 type=integ id=hmac-sha )

            (t: #3 type=prf id=hmac-sha )

            (t: #4 type=dh id=modp2048 )))

    (v2ke: len=256 group=modp2048)

    (nonce: len=32 nonce=(d59b13403b0accf698c209468cc0cc7b94e9ab3543f674268562f749205ab340) )

    (n: prot_id=#0 type=16388(nat_detection_source_ip))

    (n: prot_id=#0 type=16389(nat_detection_destination_ip))

    (n: prot_id=#0 type=16430(status))

    (n: prot_id=#0 type=16431(status))

    (n: prot_id=#0 type=16406(status))

13:15:11.136544 IP (tos 0x0, ttl 247, id 10409, offset 0, flags [none], proto UDP (17), length 80)

    89.204.136.64.isakmp > p4FC8B9EF.dip0.t-ipconnect.de.47289: [udp sum ok] isakmp 2.0 msgid 00000000 cookie 1764aee3e9089c39->0000000000000000: parent_sa ikev2_init[R]:

    (n: prot_id=#0 type=16390(cookie) data=(00003fd90c6fc674a64b1889db67d23c))

13:15:11.140044 IP (tos 0x0, ttl 63, id 44823, offset 0, flags [DF], proto UDP (17), length 516)

    p4FC8B9EF.dip0.t-ipconnect.de.47289 > 89.204.136.64.isakmp: [udp sum ok] isakmp 2.0 msgid 00000000 cookie 1764aee3e9089c39->0000000000000000: parent_sa ikev2_init[I]:

    (n: prot_id=#0 type=16390(cookie) data=(00003fd90c6fc674a64b...0000402f00010002000300040000000800004016))

    (sa: len=44

        (p: #1 protoid=isakmp transform=4 len=44

            (t: #1 type=encr id=aes (type=keylen value=0100))

            (t: #2 type=integ id=hmac-sha )

            (t: #3 type=prf id=hmac-sha )

            (t: #4 type=dh id=modp2048 )))

    (v2ke: len=256 group=modp2048)

    (nonce: len=32 nonce=(d59b13403b0accf698c209468cc0cc7b94e9ab3543f674268562f749205ab340) )

    (n: prot_id=#0 type=16388(nat_detection_source_ip))

    (n: prot_id=#0 type=16389(nat_detection_destination_ip))

    (n: prot_id=#0 type=16430(status))

    (n: prot_id=#0 type=16431(status))

    (n: prot_id=#0 type=16406(status))

13:15:12.078706 IP (tos 0x0, ttl 247, id 11028, offset 0, flags [none], proto UDP (17), length 80)

    89.204.136.64.isakmp > p4FC8B9EF.dip0.t-ipconnect.de.47289: [udp sum ok] isakmp 2.0 msgid 00000000 cookie 1764aee3e9089c39->0000000000000000: parent_sa ikev2_init[R]:

    (n: prot_id=#0 type=16390(cookie) data=(00003fd90c6fc674a64b1889db67d23c))

13:15:12.145513 IP (tos 0x0, ttl 63, id 44877, offset 0, flags [DF], proto UDP (17), length 516)

    p4FC8B9EF.dip0.t-ipconnect.de.47289 > 89.204.136.64.isakmp: [udp sum ok] isakmp 2.0 msgid 00000000 cookie 1764aee3e9089c39->0000000000000000: parent_sa ikev2_init[I]:

    (n: prot_id=#0 type=16390(cookie) data=(00003fd90c6fc674a64b...0000402f00010002000300040000000800004016))

    (sa: len=44

        (p: #1 protoid=isakmp transform=4 len=44

            (t: #1 type=encr id=aes (type=keylen value=0100))

            (t: #2 type=integ id=hmac-sha )

            (t: #3 type=prf id=hmac-sha )

            (t: #4 type=dh id=modp2048 )))

    (v2ke: len=256 group=modp2048)

    (nonce: len=32 nonce=(d59b13403b0accf698c209468cc0cc7b94e9ab3543f674268562f749205ab340) )

    (n: prot_id=#0 type=16388(nat_detection_source_ip))

    (n: prot_id=#0 type=16389(nat_detection_destination_ip))

    (n: prot_id=#0 type=16430(status))

    (n: prot_id=#0 type=16431(status))

    (n: prot_id=#0 type=16406(status))

13:15:12.148711 IP (tos 0x0, ttl 63, id 44878, offset 0, flags [DF], proto UDP (17), length 516)

    p4FC8B9EF.dip0.t-ipconnect.de.47289 > 89.204.136.64.isakmp: [udp sum ok] isakmp 2.0 msgid 00000000 cookie 1764aee3e9089c39->0000000000000000: parent_sa ikev2_init[I]:

    (n: prot_id=#0 type=16390(cookie) data=(00003fd90c6fc674a64b...0000402f00010002000300040000000800004016))

    (sa: len=44

        (p: #1 protoid=isakmp transform=4 len=44

            (t: #1 type=encr id=aes (type=keylen value=0100))

            (t: #2 type=integ id=hmac-sha )

            (t: #3 type=prf id=hmac-sha )

            (t: #4 type=dh id=modp2048 )))

    (v2ke: len=256 group=modp2048)

    (nonce: len=32 nonce=(d59b13403b0accf698c209468cc0cc7b94e9ab3543f674268562f749205ab340) )

    (n: prot_id=#0 type=16388(nat_detection_source_ip))

    (n: prot_id=#0 type=16389(nat_detection_destination_ip))

    (n: prot_id=#0 type=16430(status))

    (n: prot_id=#0 type=16431(status))

    (n: prot_id=#0 type=16406(status))

13:15:12.248647 IP (tos 0x0, ttl 247, id 11178, offset 0, flags [none], proto UDP (17), length 444)

    89.204.136.64.isakmp > p4FC8B9EF.dip0.t-ipconnect.de.47289: [udp sum ok] isakmp 2.0 msgid 00000000 cookie 1764aee3e9089c39->6620a0ee016023f6: parent_sa ikev2_init[R]:

    (sa: len=44

        (p: #1 protoid=isakmp transform=4 len=44

            (t: #1 type=encr id=aes (type=keylen value=0100))

            (t: #2 type=prf id=hmac-sha )

            (t: #3 type=integ id=hmac-sha )

            (t: #4 type=dh id=modp2048 )))

    (v2ke: len=256 group=modp2048)

    (nonce: len=16 nonce=(9ea5570af06e5c473930a1f9593433a1) )

    (n: prot_id=isakmp type=16388(nat_detection_source_ip))

    (n: prot_id=isakmp type=16389(nat_detection_destination_ip))

13:15:12.284434 IP (tos 0x0, ttl 63, id 44891, offset 0, flags [DF], proto UDP (17), length 380)

    p4FC8B9EF.dip0.t-ipconnect.de.34235 > 89.204.136.64.ipsec-nat-t: [udp sum ok] NONESP-encap: isakmp 2.0 msgid 00000001 cookie 1764aee3e9089c39->6620a0ee016023f6: child_sa  ikev2_auth[I]:

    (v2e: len=316)

13:15:13.289453 IP (tos 0x0, ttl 63, id 44978, offset 0, flags [DF], proto UDP (17), length 380)

    p4FC8B9EF.dip0.t-ipconnect.de.34235 > 89.204.136.64.ipsec-nat-t: [udp sum ok] NONESP-encap: isakmp 2.0 msgid 00000001 cookie 1764aee3e9089c39->6620a0ee016023f6: child_sa  ikev2_auth[I]:

    (v2e: len=316)

13:15:15.290772 IP (tos 0x0, ttl 63, id 45061, offset 0, flags [DF], proto UDP (17), length 380)

    p4FC8B9EF.dip0.t-ipconnect.de.34235 > 89.204.136.64.ipsec-nat-t: [udp sum ok] NONESP-encap: isakmp 2.0 msgid 00000001 cookie 1764aee3e9089c39->6620a0ee016023f6: child_sa  ikev2_auth[I]:

    (v2e: len=316)

13:15:18.418855 IP (tos 0x0, ttl 247, id 16795, offset 0, flags [none], proto UDP (17), length 220)

    89.204.136.64.ipsec-nat-t > p4FC8B9EF.dip0.t-ipconnect.de.34235: [udp sum ok] NONESP-encap: isakmp 2.0 msgid 00000001 cookie 1764aee3e9089c39->6620a0ee016023f6: child_sa  ikev2_auth[R]:

    (v2e: len=156)

13:15:18.577784 IP (tos 0x0, ttl 63, id 45349, offset 0, flags [DF], proto UDP (17), length 140)

    p4FC8B9EF.dip0.t-ipconnect.de.34235 > 89.204.136.64.ipsec-nat-t: [udp sum ok] NONESP-encap: isakmp 2.0 msgid 00000002 cookie 1764aee3e9089c39->6620a0ee016023f6: child_sa  ikev2_auth[I]:

    (v2e: len=76)

13:15:19.583926 IP (tos 0x0, ttl 63, id 45444, offset 0, flags [DF], proto UDP (17), length 140)

    p4FC8B9EF.dip0.t-ipconnect.de.34235 > 89.204.136.64.ipsec-nat-t: [udp sum ok] NONESP-encap: isakmp 2.0 msgid 00000002 cookie 1764aee3e9089c39->6620a0ee016023f6: child_sa  ikev2_auth[I]:

    (v2e: len=76)

13:15:21.583942 IP (tos 0x0, ttl 63, id 45629, offset 0, flags [DF], proto UDP (17), length 140)

    p4FC8B9EF.dip0.t-ipconnect.de.34235 > 89.204.136.64.ipsec-nat-t: [udp sum ok] NONESP-encap: isakmp 2.0 msgid 00000002 cookie 1764aee3e9089c39->6620a0ee016023f6: child_sa  ikev2_auth[I]:

    (v2e: len=76)

13:15:25.582175 IP (tos 0x0, ttl 63, id 45656, offset 0, flags [DF], proto UDP (17), length 140)

    p4FC8B9EF.dip0.t-ipconnect.de.34235 > 89.204.136.64.ipsec-nat-t: [udp sum ok] NONESP-encap: isakmp 2.0 msgid 00000002 cookie 1764aee3e9089c39->6620a0ee016023f6: child_sa  ikev2_auth[I]:

    (v2e: len=76)

13:15:26.056222 IP (tos 0x0, ttl 247, id 23660, offset 0, flags [none], proto UDP (17), length 108)

    89.204.136.64.ipsec-nat-t > p4FC8B9EF.dip0.t-ipconnect.de.34235: [udp sum ok] NONESP-encap: isakmp 2.0 msgid 00000002 cookie 1764aee3e9089c39->6620a0ee016023f6: child_sa  ikev2_auth[R]:

    (v2e: len=44)

13:15:26.098015 IP (tos 0x0, ttl 63, id 45659, offset 0, flags [DF], proto UDP (17), length 108)

    p4FC8B9EF.dip0.t-ipconnect.de.34235 > 89.204.136.64.ipsec-nat-t: [udp sum ok] NONESP-encap: isakmp 2.0 msgid 00000003 cookie 1764aee3e9089c39->6620a0ee016023f6: child_sa  inf2[I]:

    (v2e: len=44)

13:15:26.156747 IP (tos 0x0, ttl 247, id 23778, offset 0, flags [none], proto UDP (17), length 68)

    89.204.136.64.ipsec-nat-t > p4FC8B9EF.dip0.t-ipconnect.de.34235: [udp sum ok] NONESP-encap: isakmp 2.0 msgid 00000003 cookie 1764aee3e9089c39->0000000000000000: child_sa  inf2[R]:

    (n: prot_id=#0 type=4(invalid_ike_spi))



45 packets captured

45 packets received by filter

0 packets dropped by kernel

 

Ist das ein bekanntes Problem heute und wird an einer Lösung gearbeitet. Hat jemand anderes auch das Problem, dass das VoWLAN-Symbol verschwunden ist?

Lösung von ThetaPhi

Es geht wieder, siehe weiterer Thread. Leider konnte bis heute dieser Beitrag nicht angesehen werden.

1 Antwort

ThetaPhi
Besucher:in
  • Autor
  • Besucher:in
  • Lösung
  • October 21, 2019

Es geht wieder, siehe weiterer Thread. Leider konnte bis heute dieser Beitrag nicht angesehen werden.