iPhone connection fails although Windows PC can connect

Post your questions about SoftEther VPN software here. Please answer questions if you can afford.
Post Reply
mf_2
Posts: 16
Joined: Wed Oct 05, 2022 9:38 pm

iPhone connection fails although Windows PC can connect

Post by mf_2 » Sat Oct 08, 2022 11:05 am

Thanks to the big help of user "solo" I was able to get my SoftEther server running and Windows PCs can connect just fine.
However my iPhone cannot. I tried the user name in all uppercase (same as on Windows) and all lowercase (as was suggested in another thread where somebody had issues with an iPhone)
I am running L2TP with a PSK.
What is causing this?

The redacted server log shows as follows:

12:45: Successful connection from Windows
12:50: Failed auth from iPhone

Code: Select all

2022-10-08 12:45:39.876 IPsec Client 22 (79.245.182.153:64820 -> 192.168.0.230:500): A new IPsec client is created.
2022-10-08 12:45:39.876 IPsec IKE Session (IKE SA) 19 (Client: 22) (79.245.182.153:64820 -> 192.168.0.230:500): A new IKE SA (Main Mode) is created. Initiator Cookie: 0xAC2C3FCCEE906F49, Responder Cookie: 0xDACE9AE4430E56D1, DH Group: MODP 2048 (Group 14), Hash Algorithm: SHA-1, Cipher Algorithm: AES-CBC, Cipher Key Size: 256 bits, Lifetime: 4294967295 Kbytes or 28800 seconds
2022-10-08 12:45:39.892 IPsec Client 22 (79.245.182.153:64821 -> 192.168.0.230:4500): The port number information of this client is updated.
2022-10-08 12:45:39.892 IPsec Client 22 (79.245.182.153:64821 -> 192.168.0.230:4500): 
2022-10-08 12:45:39.892 IPsec IKE Session (IKE SA) 19 (Client: 22) (79.245.182.153:64821 -> 192.168.0.230:4500): This IKE SA is established between the server and the client.
2022-10-08 12:45:39.892 IPsec IKE Session (IKE SA) 19 (Client: 22) (79.245.182.153:64821 -> 192.168.0.230:4500): The client initiates a QuickMode negotiation.
2022-10-08 12:45:39.892 IPsec ESP Session (IPsec SA) 20 (Client: 22) (79.245.182.153:64821 -> 192.168.0.230:4500): A new IPsec SA (Direction: Client -> Server) is created. SPI: 0x1F381CA0, DH Group: (null), Hash Algorithm: SHA-1, Cipher Algorithm: AES-CBC, Cipher Key Size: 256 bits, Lifetime: 250000 Kbytes or 3600 seconds
2022-10-08 12:45:39.892 IPsec ESP Session (IPsec SA) 20 (Client: 22) (79.245.182.153:64821 -> 192.168.0.230:4500): A new IPsec SA (Direction: Server -> Client) is created. SPI: 0x731F346, DH Group: (null), Hash Algorithm: SHA-1, Cipher Algorithm: AES-CBC, Cipher Key Size: 256 bits, Lifetime: 250000 Kbytes or 3600 seconds
2022-10-08 12:45:39.907 IPsec ESP Session (IPsec SA) 20 (Client: 22) (79.245.182.153:64821 -> 192.168.0.230:4500): This IPsec SA is established between the server and the client.
2022-10-08 12:45:39.907 IPsec Client 22 (79.245.182.153:64821 -> 192.168.0.230:4500): The L2TP Server Module is started.
2022-10-08 12:45:39.923 L2TP PPP Session [79.245.182.153:1701]: A new PPP session (Upper protocol: L2TP) is started. IP Address of PPP Client: 79.245.182.153 (Hostname: "MFLAPTOP-CONTOSO.CONTOSO-CORP.INT"), Port Number of PPP Client: 1701, IP Address of PPP Server: 192.168.0.230, Port Number of PPP Server: 1701, Client Software Name: "L2TP VPN Client - Microsoft", IPv4 TCP MSS (Max Segment Size): 1314 bytes
2022-10-08 12:45:39.954 On the TCP Listener (Port 0), a Client (IP address 79.245.182.153, Host name "p4ff5b699.dip0.t-ipconnect.de", Port number 1701) has connected.
2022-10-08 12:45:39.954 For the client (IP address: 79.245.182.153, host name: "p4ff5b699.dip0.t-ipconnect.de", port number: 1701), connection "CID-18" has been created.
2022-10-08 12:45:39.954 SSL communication for connection "CID-18" has been started. The encryption algorithm name is "(null)".
2022-10-08 12:45:39.954 [HUB "VPN"] The connection "CID-18" (IP address: 79.245.182.153, Host name: p4ff5b699.dip0.t-ipconnect.de, Port number: 1701, Client name: "L2TP VPN Client - Microsoft", Version: 4.39, Build: 9772) is attempting to connect to the Virtual Hub. The auth type provided is "External server authentication" and the user name is "CONTOSO-CORP\MAF".
2022-10-08 12:45:39.954 [HUB "VPN"] Connection "CID-18": Successfully authenticated as user "CONTOSO-CORP\MAF".
2022-10-08 12:45:39.954 [HUB "VPN"] Connection "CID-18": The new session "SID-CONTOSO-CORP\MAF-[L2TP]-14" has been created. (IP address: 79.245.182.153, Port number: 1701, Physical underlying protocol: "Legacy VPN - L2TP")
2022-10-08 12:45:39.954 [HUB "VPN"] Session "SID-CONTOSO-CORP\MAF-[L2TP]-14": The parameter has been set. Max number of TCP connections: 1, Use of encryption: Yes, Use of compression: No, Use of Half duplex communication: No, Timeout: 20 seconds.
2022-10-08 12:45:39.954 [HUB "VPN"] Session "SID-CONTOSO-CORP\MAF-[L2TP]-14": VPN Client details: (Client product name: "L2TP VPN Client - Microsoft", Client version: 439, Client build number: 9772, Server product name: "SoftEther VPN Server (64 bit)", Server version: 439, Server build number: 9772, Client OS name: "L2TP VPN Client - Microsoft", Client OS version: "-", Client product ID: "-", Client host name: "MFLAPTOP-CONTOSO.CONTOSO-CORP.INT", Client IP address: "79.245.182.153", Client port number: 1701, Server host name: "192.168.0.230", Server IP address: "192.168.0.230", Server port number: 1701, Proxy host name: "", Proxy IP address: "0.0.0.0", Proxy port number: 0, Virtual Hub name: "VPN", Client unique ID: "6D6FD68E18D9786EFEE8C68274A65F80")
2022-10-08 12:45:39.954 L2TP PPP Session [79.245.182.153:1701]: Trying to request an IP address from the DHCP server.
2022-10-08 12:45:39.954 [HUB "VPN"] SecureNAT: The DHCP entry 6 has been created. MAC address: CA-42-A6-50-F8-7B, IP address: 192.168.30.10, host name: MFLAPTOP-CONTOSO.CONTOSO-CORP.INT, expiration span: 7200 seconds
2022-10-08 12:45:39.954 [HUB "VPN"] Session "SID-SECURENAT-8": The DHCP server of host "5E-86-53-72-3C-7B" (192.168.30.1) on this session allocated, for host "SID-CONTOSO-CORP\MAF-[L2TP]-14" on another session "CA-42-A6-50-F8-7B", the new IP address 192.168.30.10.
2022-10-08 12:45:39.954 L2TP PPP Session [79.245.182.153:1701]: An IP address is assigned. IP Address of Client: 192.168.30.10, Subnet Mask: 255.255.255.0, Default Gateway: 192.168.30.1, Domain Name: "CONTOSO-CORP.INT", DNS Server 1: 192.168.30.1, DNS Server 2: 0.0.0.0, WINS Server 1: 0.0.0.0, WINS Server 2: 0.0.0.0, IP Address of DHCP Server: 192.168.30.1, Lease Lifetime: 7200 seconds
2022-10-08 12:45:39.954 L2TP PPP Session [79.245.182.153:1701]: The IP address and other network information parameters are set successfully. IP Address of Client: 192.168.30.10, Subnet Mask: 255.255.255.0, Default Gateway: 192.168.30.1, DNS Server 1: 192.168.30.1, DNS Server 2: 0.0.0.0, WINS Server 1: 0.0.0.0, WINS Server 2: 0.0.0.0
2022-10-08 12:45:40.314 [HUB "VPN"] SecureNAT: The UDP session 200 has been created. Connection source 192.168.30.10:56639, Connection destination 192.168.30.1:53
2022-10-08 12:45:40.360 [HUB "VPN"] SecureNAT: The UDP session 201 has been created. Connection source 192.168.30.10:60436, Connection destination 192.168.30.1:53
2022-10-08 12:45:40.360 [HUB "VPN"] SecureNAT: The TCP session 202 has been created. Connection source 192.168.30.10:24447, Connection destination 192.168.0.230:389
2022-10-08 12:45:40.360 [HUB "VPN"] SecureNAT: The TCP session 203 has been created. Connection source 192.168.30.10:24450, Connection destination 192.168.0.230:389
2022-10-08 12:45:40.392 [HUB "VPN"] SecureNAT: The connection to TCP session 202: Host "192.168.0.230 (192.168.0.230)", Port 389 was successful.
2022-10-08 12:45:40.392 [HUB "VPN"] SecureNAT: The connection to TCP session 203: Host "192.168.0.230 (192.168.0.230)", Port 389 was successful.
2022-10-08 12:45:40.392 [HUB "VPN"] SecureNAT: The TCP session 202 has been deleted.
2022-10-08 12:45:40.392 [HUB "VPN"] SecureNAT: The TCP session 203 has been deleted.
2022-10-08 12:45:40.642 [HUB "VPN"] SecureNAT: The UDP session 204 has been created. Connection source 192.168.30.10:59912, Connection destination 192.168.30.1:53
2022-10-08 12:45:40.876 [HUB "VPN"] SecureNAT: The UDP session 205 has been created. Connection source 192.168.30.10:56360, Connection destination 192.168.30.1:53
2022-10-08 12:45:40.876 [HUB "VPN"] SecureNAT: The TCP session 206 has been created. Connection source 192.168.30.10:24454, Connection destination 13.107.4.52:80
2022-10-08 12:45:40.907 [HUB "VPN"] SecureNAT: The connection to TCP session 206: Host "13.107.4.52 (13.107.4.52)", Port 80 was successful.
2022-10-08 12:45:41.220 [HUB "VPN"] SecureNAT: The TCP session 206 has been deleted.
2022-10-08 12:45:41.251 [HUB "VPN"] SecureNAT: The UDP session 207 has been created. Connection source 192.168.30.10:62709, Connection destination 192.168.30.1:53
2022-10-08 12:45:41.485 [HUB "VPN"] SecureNAT: The TCP session 208 has been created. Connection source 192.168.30.10:49457, Connection destination 40.113.110.67:443
2022-10-08 12:45:41.517 [HUB "VPN"] SecureNAT: The connection to TCP session 208: Host "40.113.110.67 (40.113.110.67)", Port 443 was successful.
2022-10-08 12:45:41.735 [HUB "VPN"] SecureNAT: The UDP session 209 has been created. Connection source 192.168.30.10:58230, Connection destination 192.168.30.1:53
2022-10-08 12:45:41.798 [HUB "VPN"] SecureNAT: The UDP session 210 has been created. Connection source 192.168.30.10:50064, Connection destination 255.255.255.255:1900
2022-10-08 12:45:42.657 [HUB "VPN"] SecureNAT: The UDP session 211 has been created. Connection source 192.168.30.10:50072, Connection destination 255.255.255.255:1900
2022-10-08 12:45:45.532 [HUB "VPN"] SecureNAT: The UDP session 212 has been created. Connection source 192.168.30.10:59514, Connection destination 10.74.210.210:53
2022-10-08 12:45:46.079 L2TP PPP Session [79.245.182.153:1701]: The PPP session is disconnected by the VPN Client's disconnecting request.
2022-10-08 12:45:46.079 L2TP PPP Session [79.245.182.153:1701]: The PPP session is disconnected.
2022-10-08 12:45:46.142 IPsec ESP Session (IPsec SA) 20 (Client: 22) (79.245.182.153:64821 -> 192.168.0.230:4500): This IPsec SA is deleted.
2022-10-08 12:45:46.142 IPsec IKE Session (IKE SA) 19 (Client: 22) (79.245.182.153:64821 -> 192.168.0.230:4500): The server initiates a QuickMode negotiation.
2022-10-08 12:45:46.142 IPsec ESP Session (IPsec SA) 21 (Client: 22) (79.245.182.153:64821 -> 192.168.0.230:4500): A new IPsec SA (Direction: Client -> Server) is created. SPI: 0x86671649, DH Group: (null), Hash Algorithm: SHA-1, Cipher Algorithm: AES-CBC, Cipher Key Size: 256 bits, Lifetime: 250000 Kbytes or 3600 seconds
2022-10-08 12:45:46.142 IPsec ESP Session (IPsec SA) 21 (Client: 22) (79.245.182.153:64821 -> 192.168.0.230:4500): A new IPsec SA (Direction: Server -> Client) is created. SPI: 0x0, DH Group: (null), Hash Algorithm: SHA-1, Cipher Algorithm: AES-CBC, Cipher Key Size: 256 bits, Lifetime: 250000 Kbytes or 3600 seconds
2022-10-08 12:45:46.142 IPsec IKE Session (IKE SA) 19 (Client: 22) (79.245.182.153:64821 -> 192.168.0.230:4500): This IKE SA is deleted.
2022-10-08 12:45:46.142 IPsec ESP Session (IPsec SA) 20 (Client: 22) (79.245.182.153:64821 -> 192.168.0.230:4500): This IPsec SA is deleted.
2022-10-08 12:45:46.142 IPsec ESP Session (IPsec SA) 21 (Client: 22) (79.245.182.153:64821 -> 192.168.0.230:4500): This IPsec SA is deleted.
2022-10-08 12:45:46.142 IPsec ESP Session (IPsec SA) 21 (Client: 22) (79.245.182.153:64821 -> 192.168.0.230:4500): This IPsec SA is deleted.
2022-10-08 12:45:46.548 [HUB "VPN"] Session "SID-CONTOSO-CORP\MAF-[L2TP]-14": The session has been terminated. The statistical information is as follows: Total outgoing data size: 28252 bytes, Total incoming data size: 15416 bytes.
2022-10-08 12:45:46.579 Connection "CID-18" terminated by the cause "The VPN session has been deleted. It is possible that either the administrator disconnected the session or the connection from the client to the VPN Server has been disconnected." (code 11).
2022-10-08 12:45:46.579 Connection "CID-18" has been terminated.
2022-10-08 12:45:46.579 The connection with the client (IP address 79.245.182.153, Port number 1701) has been disconnected.
2022-10-08 12:45:48.689 IPsec Client 23 (79.245.182.153:64820 -> 192.168.0.230:500): A new IPsec client is created.
2022-10-08 12:45:48.689 IPsec IKE Session (IKE SA) 20 (Client: 23) (79.245.182.153:64820 -> 192.168.0.230:500): A new IKE SA (Main Mode) is created. Initiator Cookie: 0x56C9B9F152C752F2, Responder Cookie: 0x25D053A138A85D08, DH Group: MODP 2048 (Group 14), Hash Algorithm: SHA-1, Cipher Algorithm: AES-CBC, Cipher Key Size: 256 bits, Lifetime: 4294967295 Kbytes or 28800 seconds
2022-10-08 12:45:48.704 IPsec Client 23 (79.245.182.153:64820 -> 192.168.0.230:500): This client (Client 23) and the other client (Client 22) is the same client. So they are merged to the client 22.
2022-10-08 12:45:48.704 IPsec Client 22 (79.245.182.153:64821 -> 192.168.0.230:4500): 
2022-10-08 12:45:48.704 IPsec IKE Session (IKE SA) 20 (Client: 22) (79.245.182.153:64821 -> 192.168.0.230:4500): This IKE SA is established between the server and the client.
2022-10-08 12:45:48.704 IPsec IKE Session (IKE SA) 20 (Client: 22) (79.245.182.153:64821 -> 192.168.0.230:4500): The server initiates a QuickMode negotiation.
2022-10-08 12:45:48.704 IPsec ESP Session (IPsec SA) 22 (Client: 22) (79.245.182.153:64821 -> 192.168.0.230:4500): A new IPsec SA (Direction: Client -> Server) is created. SPI: 0x6C64274, DH Group: (null), Hash Algorithm: SHA-1, Cipher Algorithm: AES-CBC, Cipher Key Size: 256 bits, Lifetime: 250000 Kbytes or 3600 seconds
2022-10-08 12:45:48.704 IPsec ESP Session (IPsec SA) 22 (Client: 22) (79.245.182.153:64821 -> 192.168.0.230:4500): A new IPsec SA (Direction: Server -> Client) is created. SPI: 0x0, DH Group: (null), Hash Algorithm: SHA-1, Cipher Algorithm: AES-CBC, Cipher Key Size: 256 bits, Lifetime: 250000 Kbytes or 3600 seconds
2022-10-08 12:45:48.704 IPsec IKE Session (IKE SA) 20 (Client: 22) (79.245.182.153:64821 -> 192.168.0.230:4500): The client initiates a QuickMode negotiation.
2022-10-08 12:45:48.704 IPsec ESP Session (IPsec SA) 23 (Client: 22) (79.245.182.153:64821 -> 192.168.0.230:4500): A new IPsec SA (Direction: Client -> Server) is created. SPI: 0x73CC4D8C, DH Group: (null), Hash Algorithm: SHA-1, Cipher Algorithm: AES-CBC, Cipher Key Size: 256 bits, Lifetime: 250000 Kbytes or 3600 seconds
2022-10-08 12:45:48.704 IPsec ESP Session (IPsec SA) 23 (Client: 22) (79.245.182.153:64821 -> 192.168.0.230:4500): A new IPsec SA (Direction: Server -> Client) is created. SPI: 0x6C6304EE, DH Group: (null), Hash Algorithm: SHA-1, Cipher Algorithm: AES-CBC, Cipher Key Size: 256 bits, Lifetime: 250000 Kbytes or 3600 seconds
2022-10-08 12:45:48.704 IPsec ESP Session (IPsec SA) 22 (Client: 22) (79.245.182.153:64821 -> 192.168.0.230:4500): The SPI which has been pending is now set. New SPI: 0x50F8234E
2022-10-08 12:45:48.704 IPsec ESP Session (IPsec SA) 22 (Client: 22) (79.245.182.153:64821 -> 192.168.0.230:4500): This IPsec SA is established between the server and the client.
2022-10-08 12:45:48.704 IPsec ESP Session (IPsec SA) 23 (Client: 22) (79.245.182.153:64821 -> 192.168.0.230:4500): This IPsec SA is established between the server and the client.
2022-10-08 12:45:48.720 IPsec ESP Session (IPsec SA) 23 (Client: 22) (79.245.182.153:64821 -> 192.168.0.230:4500): This IPsec SA is deleted.
2022-10-08 12:45:48.720 L2TP PPP Session [79.245.182.153:1701]: A new PPP session (Upper protocol: L2TP) is started. IP Address of PPP Client: 79.245.182.153 (Hostname: "MFLAPTOP-CONTOSO.CONTOSO-CORP.INT"), Port Number of PPP Client: 1701, IP Address of PPP Server: 192.168.0.230, Port Number of PPP Server: 1701, Client Software Name: "L2TP VPN Client - Microsoft", IPv4 TCP MSS (Max Segment Size): 1314 bytes
2022-10-08 12:45:48.735 On the TCP Listener (Port 0), a Client (IP address 79.245.182.153, Host name "p4ff5b699.dip0.t-ipconnect.de", Port number 1701) has connected.
2022-10-08 12:45:48.735 For the client (IP address: 79.245.182.153, host name: "p4ff5b699.dip0.t-ipconnect.de", port number: 1701), connection "CID-19" has been created.
2022-10-08 12:45:48.735 SSL communication for connection "CID-19" has been started. The encryption algorithm name is "(null)".
2022-10-08 12:45:48.735 [HUB "VPN"] The connection "CID-19" (IP address: 79.245.182.153, Host name: p4ff5b699.dip0.t-ipconnect.de, Port number: 1701, Client name: "L2TP VPN Client - Microsoft", Version: 4.39, Build: 9772) is attempting to connect to the Virtual Hub. The auth type provided is "External server authentication" and the user name is "CONTOSO-CORP\MAF".
2022-10-08 12:45:48.735 [HUB "VPN"] Connection "CID-19": Successfully authenticated as user "CONTOSO-CORP\MAF".
2022-10-08 12:45:48.735 [HUB "VPN"] Connection "CID-19": The new session "SID-CONTOSO-CORP\MAF-[L2TP]-15" has been created. (IP address: 79.245.182.153, Port number: 1701, Physical underlying protocol: "Legacy VPN - L2TP")
2022-10-08 12:45:48.735 [HUB "VPN"] Session "SID-CONTOSO-CORP\MAF-[L2TP]-15": The parameter has been set. Max number of TCP connections: 1, Use of encryption: Yes, Use of compression: No, Use of Half duplex communication: No, Timeout: 20 seconds.
2022-10-08 12:45:48.735 [HUB "VPN"] Session "SID-CONTOSO-CORP\MAF-[L2TP]-15": VPN Client details: (Client product name: "L2TP VPN Client - Microsoft", Client version: 439, Client build number: 9772, Server product name: "SoftEther VPN Server (64 bit)", Server version: 439, Server build number: 9772, Client OS name: "L2TP VPN Client - Microsoft", Client OS version: "-", Client product ID: "-", Client host name: "MFLAPTOP-CONTOSO.CONTOSO-CORP.INT", Client IP address: "79.245.182.153", Client port number: 1701, Server host name: "192.168.0.230", Server IP address: "192.168.0.230", Server port number: 1701, Proxy host name: "", Proxy IP address: "0.0.0.0", Proxy port number: 0, Virtual Hub name: "VPN", Client unique ID: "6D6FD68E18D9786EFEE8C68274A65F80")
2022-10-08 12:45:48.751 L2TP PPP Session [79.245.182.153:1701]: Trying to request an IP address from the DHCP server.
2022-10-08 12:45:48.751 [HUB "VPN"] SecureNAT: The DHCP entry 7 has been created. MAC address: CA-42-A6-50-F8-7B, IP address: 192.168.30.10, host name: MFLAPTOP-CONTOSO.CONTOSO-CORP.INT, expiration span: 7200 seconds
2022-10-08 12:45:48.751 [HUB "VPN"] Session "SID-SECURENAT-8": The DHCP server of host "5E-86-53-72-3C-7B" (192.168.30.1) on this session allocated, for host "SID-CONTOSO-CORP\MAF-[L2TP]-15" on another session "CA-42-A6-50-F8-7B", the new IP address 192.168.30.10.
2022-10-08 12:45:48.751 L2TP PPP Session [79.245.182.153:1701]: An IP address is assigned. IP Address of Client: 192.168.30.10, Subnet Mask: 255.255.255.0, Default Gateway: 192.168.30.1, Domain Name: "CONTOSO-CORP.INT", DNS Server 1: 192.168.30.1, DNS Server 2: 0.0.0.0, WINS Server 1: 0.0.0.0, WINS Server 2: 0.0.0.0, IP Address of DHCP Server: 192.168.30.1, Lease Lifetime: 7200 seconds
2022-10-08 12:45:48.751 L2TP PPP Session [79.245.182.153:1701]: The IP address and other network information parameters are set successfully. IP Address of Client: 192.168.30.10, Subnet Mask: 255.255.255.0, Default Gateway: 192.168.30.1, DNS Server 1: 192.168.30.1, DNS Server 2: 0.0.0.0, WINS Server 1: 0.0.0.0, WINS Server 2: 0.0.0.0
2022-10-08 12:45:48.860 [HUB "VPN"] SecureNAT: The UDP session 213 has been created. Connection source 192.168.30.10:53121, Connection destination 192.168.30.1:53
2022-10-08 12:45:49.048 [HUB "VPN"] SecureNAT: The UDP session 214 has been created. Connection source 192.168.30.10:49697, Connection destination 192.168.30.1:53
2022-10-08 12:45:49.048 [HUB "VPN"] SecureNAT: The UDP session 215 has been created. Connection source 192.168.30.10:63381, Connection destination 192.168.30.1:53
2022-10-08 12:45:49.079 [HUB "VPN"] SecureNAT: The TCP session 216 has been created. Connection source 192.168.30.10:31063, Connection destination 192.168.0.230:389
2022-10-08 12:45:49.095 [HUB "VPN"] SecureNAT: The connection to TCP session 216: Host "192.168.0.230 (192.168.0.230)", Port 389 was successful.
2022-10-08 12:45:49.282 [HUB "VPN"] SecureNAT: The UDP session 217 has been created. Connection source 192.168.30.10:52656, Connection destination 192.168.30.1:53
2022-10-08 12:45:49.282 [HUB "VPN"] SecureNAT: The TCP session 216 has been deleted.
2022-10-08 12:45:49.314 [HUB "VPN"] SecureNAT: The TCP session 218 has been created. Connection source 192.168.30.10:31068, Connection destination 192.168.0.230:389
2022-10-08 12:45:49.329 [HUB "VPN"] SecureNAT: The connection to TCP session 218: Host "192.168.0.230 (192.168.0.230)", Port 389 was successful.
2022-10-08 12:45:49.595 [HUB "VPN"] SecureNAT: The TCP session 218 has been deleted.
2022-10-08 12:45:49.751 [HUB "VPN"] SecureNAT: The UDP session 219 has been created. Connection source 192.168.30.10:52246, Connection destination 192.168.30.1:53
2022-10-08 12:45:49.767 [HUB "VPN"] SecureNAT: The TCP session 220 has been created. Connection source 192.168.30.10:31069, Connection destination 13.107.4.52:80
2022-10-08 12:45:49.798 [HUB "VPN"] SecureNAT: The connection to TCP session 220: Host "13.107.4.52 (13.107.4.52)", Port 80 was successful.
2022-10-08 12:45:49.829 [HUB "VPN"] SecureNAT: The UDP session 221 has been created. Connection source 192.168.30.10:57363, Connection destination 192.168.30.1:53
2022-10-08 12:45:49.829 [HUB "VPN"] SecureNAT: The TCP session 220 has been deleted.
2022-10-08 12:45:50.064 [HUB "VPN"] SecureNAT: The TCP session 222 has been created. Connection source 192.168.30.10:49459, Connection destination 40.113.110.67:443
2022-10-08 12:45:50.095 [HUB "VPN"] SecureNAT: The connection to TCP session 222: Host "40.113.110.67 (40.113.110.67)", Port 443 was successful.
2022-10-08 12:45:50.814 [HUB "VPN"] SecureNAT: The UDP session 223 has been created. Connection source 192.168.30.10:54461, Connection destination 255.255.255.255:1900
2022-10-08 12:45:51.548 [HUB "VPN"] SecureNAT: The UDP session 224 has been created. Connection source 192.168.30.10:59514, Connection destination 10.74.210.211:53
2022-10-08 12:45:53.157 [HUB "VPN"] SecureNAT: The UDP session 225 has been created. Connection source 192.168.30.10:54469, Connection destination 255.255.255.255:1900
2022-10-08 12:45:57.610 [HUB "VPN"] SecureNAT: The UDP session 226 has been created. Connection source 192.168.30.10:60153, Connection destination 10.74.210.210:53
2022-10-08 12:45:59.610 [HUB "VPN"] SecureNAT: The UDP session 227 has been created. Connection source 192.168.30.10:60153, Connection destination 10.74.210.211:53
2022-10-08 12:46:00.735 [HUB "VPN"] SecureNAT: The UDP session 228 has been created. Connection source 192.168.30.10:55321, Connection destination 255.255.255.255:3702
2022-10-08 12:46:03.282 L2TP PPP Session [79.245.182.153:1701]: The PPP session is disconnected by the VPN Client's disconnecting request.
2022-10-08 12:46:03.282 L2TP PPP Session [79.245.182.153:1701]: The PPP session is disconnected.
2022-10-08 12:46:03.517 IPsec ESP Session (IPsec SA) 22 (Client: 22) (79.245.182.153:64821 -> 192.168.0.230:4500): This IPsec SA is deleted.
2022-10-08 12:46:03.517 IPsec IKE Session (IKE SA) 20 (Client: 22) (79.245.182.153:64821 -> 192.168.0.230:4500): The server initiates a QuickMode negotiation.
2022-10-08 12:46:03.517 IPsec ESP Session (IPsec SA) 24 (Client: 22) (79.245.182.153:64821 -> 192.168.0.230:4500): A new IPsec SA (Direction: Client -> Server) is created. SPI: 0x3D9294BC, DH Group: (null), Hash Algorithm: SHA-1, Cipher Algorithm: AES-CBC, Cipher Key Size: 256 bits, Lifetime: 250000 Kbytes or 3600 seconds
2022-10-08 12:46:03.517 IPsec ESP Session (IPsec SA) 24 (Client: 22) (79.245.182.153:64821 -> 192.168.0.230:4500): A new IPsec SA (Direction: Server -> Client) is created. SPI: 0x0, DH Group: (null), Hash Algorithm: SHA-1, Cipher Algorithm: AES-CBC, Cipher Key Size: 256 bits, Lifetime: 250000 Kbytes or 3600 seconds
2022-10-08 12:46:03.517 IPsec IKE Session (IKE SA) 20 (Client: 22) (79.245.182.153:64821 -> 192.168.0.230:4500): This IKE SA is deleted.
2022-10-08 12:46:03.517 IPsec ESP Session (IPsec SA) 22 (Client: 22) (79.245.182.153:64821 -> 192.168.0.230:4500): This IPsec SA is deleted.
2022-10-08 12:46:03.517 IPsec ESP Session (IPsec SA) 24 (Client: 22) (79.245.182.153:64821 -> 192.168.0.230:4500): This IPsec SA is deleted.
2022-10-08 12:46:03.517 IPsec ESP Session (IPsec SA) 23 (Client: 22) (79.245.182.153:64821 -> 192.168.0.230:4500): This IPsec SA is deleted.
2022-10-08 12:46:03.517 IPsec ESP Session (IPsec SA) 24 (Client: 22) (79.245.182.153:64821 -> 192.168.0.230:4500): This IPsec SA is deleted.
2022-10-08 12:46:03.860 [HUB "VPN"] Session "SID-CONTOSO-CORP\MAF-[L2TP]-15": The session has been terminated. The statistical information is as follows: Total outgoing data size: 87090 bytes, Total incoming data size: 23494 bytes.
2022-10-08 12:46:03.892 Connection "CID-19" terminated by the cause "The VPN session has been deleted. It is possible that either the administrator disconnected the session or the connection from the client to the VPN Server has been disconnected." (code 11).
2022-10-08 12:46:03.892 Connection "CID-19" has been terminated.
2022-10-08 12:46:03.892 The connection with the client (IP address 79.245.182.153, Port number 1701) has been disconnected.
2022-10-08 12:46:13.939 IPsec Client 22 (79.245.182.153:64821 -> 192.168.0.230:4500): This IPsec Client is deleted.
2022-10-08 12:46:40.517 [HUB "VPN"] SecureNAT: The UDP session 200 has been deleted.
2022-10-08 12:46:40.517 [HUB "VPN"] SecureNAT: The UDP session 201 has been deleted.
2022-10-08 12:46:40.782 [HUB "VPN"] SecureNAT: The UDP session 204 has been deleted.
2022-10-08 12:46:41.048 [HUB "VPN"] SecureNAT: The UDP session 205 has been deleted.
2022-10-08 12:46:41.579 [HUB "VPN"] SecureNAT: The UDP session 207 has been deleted.
2022-10-08 12:46:44.236 [HUB "VPN"] SecureNAT: The UDP session 209 has been deleted.
2022-10-08 12:46:45.564 [HUB "VPN"] SecureNAT: The UDP session 210 has been deleted.
2022-10-08 12:46:46.095 [HUB "VPN"] SecureNAT: The UDP session 211 has been deleted.
2022-10-08 12:46:49.017 [HUB "VPN"] SecureNAT: The UDP session 213 has been deleted.
2022-10-08 12:46:49.282 [HUB "VPN"] SecureNAT: The UDP session 214 has been deleted.
2022-10-08 12:46:49.282 [HUB "VPN"] SecureNAT: The UDP session 215 has been deleted.
2022-10-08 12:46:49.548 [HUB "VPN"] SecureNAT: The UDP session 217 has been deleted.
2022-10-08 12:46:49.814 [HUB "VPN"] SecureNAT: The UDP session 219 has been deleted.
2022-10-08 12:46:51.673 [HUB "VPN"] SecureNAT: The UDP session 212 has been deleted.
2022-10-08 12:46:51.673 [HUB "VPN"] SecureNAT: The UDP session 224 has been deleted.
2022-10-08 12:46:51.939 [HUB "VPN"] SecureNAT: The UDP session 221 has been deleted.
2022-10-08 12:46:54.329 [HUB "VPN"] SecureNAT: The UDP session 223 has been deleted.
2022-10-08 12:46:59.642 [HUB "VPN"] SecureNAT: The UDP session 226 has been deleted.
2022-10-08 12:46:59.642 [HUB "VPN"] SecureNAT: The UDP session 227 has been deleted.
2022-10-08 12:47:02.032 [HUB "VPN"] SecureNAT: The UDP session 225 has been deleted.
2022-10-08 12:47:02.298 [HUB "VPN"] SecureNAT: The UDP session 228 has been deleted.
2022-10-08 12:49:59.533 IPsec Client 24 (79.245.182.153:64826 -> 192.168.0.230:500): A new IPsec client is created.
2022-10-08 12:49:59.533 IPsec IKE Session (IKE SA) 21 (Client: 24) (79.245.182.153:64826 -> 192.168.0.230:500): A new IKE SA (Main Mode) is created. Initiator Cookie: 0xE9E6F6C6F040F7E1, Responder Cookie: 0x4FB4A464992F5F37, DH Group: MODP 2048 (Group 14), Hash Algorithm: SHA-2-256, Cipher Algorithm: AES-CBC, Cipher Key Size: 256 bits, Lifetime: 4294967295 Kbytes or 3600 seconds
2022-10-08 12:49:59.595 IPsec Client 24 (79.245.182.153:64827 -> 192.168.0.230:4500): The port number information of this client is updated.
2022-10-08 12:49:59.595 IPsec Client 24 (79.245.182.153:64827 -> 192.168.0.230:4500): 
2022-10-08 12:49:59.595 IPsec IKE Session (IKE SA) 21 (Client: 24) (79.245.182.153:64827 -> 192.168.0.230:4500): This IKE SA is established between the server and the client.
2022-10-08 12:50:00.580 IPsec IKE Session (IKE SA) 21 (Client: 24) (79.245.182.153:64827 -> 192.168.0.230:4500): The client initiates a QuickMode negotiation.
2022-10-08 12:50:00.580 IPsec ESP Session (IPsec SA) 25 (Client: 24) (79.245.182.153:64827 -> 192.168.0.230:4500): A new IPsec SA (Direction: Client -> Server) is created. SPI: 0x67A2B012, DH Group: (null), Hash Algorithm: SHA-1, Cipher Algorithm: AES-CBC, Cipher Key Size: 256 bits, Lifetime: 4294967295 Kbytes or 3600 seconds
2022-10-08 12:50:00.580 IPsec ESP Session (IPsec SA) 25 (Client: 24) (79.245.182.153:64827 -> 192.168.0.230:4500): A new IPsec SA (Direction: Server -> Client) is created. SPI: 0xB2E278, DH Group: (null), Hash Algorithm: SHA-1, Cipher Algorithm: AES-CBC, Cipher Key Size: 256 bits, Lifetime: 4294967295 Kbytes or 3600 seconds
2022-10-08 12:50:00.595 IPsec ESP Session (IPsec SA) 25 (Client: 24) (79.245.182.153:64827 -> 192.168.0.230:4500): This IPsec SA is established between the server and the client.
2022-10-08 12:50:00.595 IPsec Client 24 (79.245.182.153:64827 -> 192.168.0.230:4500): The L2TP Server Module is started.
2022-10-08 12:50:00.611 L2TP PPP Session [79.245.182.153:1701]: A new PPP session (Upper protocol: L2TP) is started. IP Address of PPP Client: 79.245.182.153 (Hostname: "iPhone-von-Maximilian"), Port Number of PPP Client: 1701, IP Address of PPP Server: 192.168.0.230, Port Number of PPP Server: 1701, Client Software Name: "L2TP VPN Client", IPv4 TCP MSS (Max Segment Size): 1314 bytes
2022-10-08 12:50:00.627 On the TCP Listener (Port 0), a Client (IP address 79.245.182.153, Host name "pXXXXXXXX.dip0.t-ipconnect.de", Port number 1701) has connected.
2022-10-08 12:50:00.627 For the client (IP address: 79.245.182.153, host name: "pXXXXXXXX.dip0.t-ipconnect.de", port number: 1701), connection "CID-20" has been created.
2022-10-08 12:50:00.627 SSL communication for connection "CID-20" has been started. The encryption algorithm name is "(null)".
2022-10-08 12:50:00.627 [HUB "VPN"] The connection "CID-20" (IP address: 79.245.182.153, Host name: pXXXXXXXX.dip0.t-ipconnect.de, Port number: 1701, Client name: "L2TP VPN Client", Version: 4.39, Build: 9772) is attempting to connect to the Virtual Hub. The auth type provided is "External server authentication" and the user name is "CONTOSO-CORP\MAF".
2022-10-08 12:50:00.627 [HUB "VPN"] Connection "CID-20": User authentication failed. The user name that has been provided was "CONTOSO-CORP\MAF".
2022-10-08 12:50:00.673 Connection "CID-20" terminated by the cause "User authentication failed." (code 9).
2022-10-08 12:50:00.673 Connection "CID-20" has been terminated.
2022-10-08 12:50:00.673 The connection with the client (IP address 79.245.182.153, Port number 1701) has been disconnected.
2022-10-08 12:50:00.689 IPsec ESP Session (IPsec SA) 25 (Client: 24) (79.245.182.153:64827 -> 192.168.0.230:4500): This IPsec SA is deleted.
2022-10-08 12:50:00.689 IPsec IKE Session (IKE SA) 21 (Client: 24) (79.245.182.153:64827 -> 192.168.0.230:4500): This IKE SA is deleted.
2022-10-08 12:50:00.689 IPsec ESP Session (IPsec SA) 25 (Client: 24) (79.245.182.153:64827 -> 192.168.0.230:4500): This IPsec SA is deleted.
2022-10-08 12:50:00.939 L2TP PPP Session [79.245.182.153:1701]: A PPP protocol error occurred, or the PPP session has been disconnected.
2022-10-08 12:50:11.080 IPsec Client 24 (79.245.182.153:64827 -> 192.168.0.230:4500): This IPsec Client is deleted.
2022-10-08 12:50:34.127 On the TCP Listener (Port 5555), a Client (IP address 127.0.0.1, Host name "CONTOSO-DC01.CONTOSO-CORP.INT", Port number 55719) has connected.
2022-10-08 12:50:34.127 For the client (IP address: 127.0.0.1, host name: "CONTOSO-DC01.CONTOSO-CORP.INT", port number: 55719), connection "CID-21" has been created.
2022-10-08 12:50:34.158 SSL communication for connection "CID-21" has been started. The encryption algorithm name is "TLS_AES_256_GCM_SHA384".
2022-10-08 12:50:34.173 Connection "CID-21" connected using server admin mode.
2022-10-08 12:50:34.173 Connection "CID-21" successfully logged in using administration mode.
2022-10-08 12:50:34.173 Connection "CID-21" created a new remote procedure call session "RPC-2876" for the purpose of administration mode.
2022-10-08 12:50:43.064 Connection "CID-21" terminated by the cause "No error." (code 0).
2022-10-08 12:50:43.064 Connection "CID-21" has been terminated.
2022-10-08 12:50:43.064 The connection with the client (IP address 127.0.0.1, Port number 55719) has been disconnected.
2022-10-08 12:50:46.299 On the TCP Listener (Port 5555), a Client (IP address 127.0.0.1, Host name "CONTOSO-DC01.CONTOSO-CORP.INT", Port number 55724) has connected.
2022-10-08 12:50:46.299 For the client (IP address: 127.0.0.1, host name: "CONTOSO-DC01.CONTOSO-CORP.INT", port number: 55724), connection "CID-22" has been created.
2022-10-08 12:50:46.345 SSL communication for connection "CID-22" has been started. The encryption algorithm name is "TLS_AES_256_GCM_SHA384".
2022-10-08 12:50:46.345 Connection "CID-22" connected using server admin mode.
2022-10-08 12:50:46.345 Connection "CID-22" successfully logged in using administration mode.
2022-10-08 12:50:46.345 Connection "CID-22" created a new remote procedure call session "RPC-2840" for the purpose of administration mode.
2022-10-08 12:50:57.502 Administration mode [RPC-2840]: The log file on the server "CONTOSO-DC01" (log file "server_log/vpn_20221008.log") has been downloaded.
2022-10-08 12:53:06.346 IPsec Client 25 (80.187.66.73:500 -> 192.168.0.230:500): A new IPsec client is created.
2022-10-08 12:53:06.346 IPsec IKE Session (IKE SA) 22 (Client: 25) (80.187.66.73:500 -> 192.168.0.230:500): A new IKE SA (Main Mode) is created. Initiator Cookie: 0x63C869EDF183E3EA, Responder Cookie: 0xF6EB17DFF4823A2A, DH Group: MODP 2048 (Group 14), Hash Algorithm: SHA-2-256, Cipher Algorithm: AES-CBC, Cipher Key Size: 256 bits, Lifetime: 4294967295 Kbytes or 3600 seconds
2022-10-08 12:53:06.455 IPsec Client 25 (80.187.66.73:10892 -> 192.168.0.230:4500): The port number information of this client is updated.
2022-10-08 12:53:06.455 IPsec Client 25 (80.187.66.73:10892 -> 192.168.0.230:4500): 
2022-10-08 12:53:06.455 IPsec IKE Session (IKE SA) 22 (Client: 25) (80.187.66.73:10892 -> 192.168.0.230:4500): This IKE SA is established between the server and the client.
2022-10-08 12:53:07.330 IPsec IKE Session (IKE SA) 22 (Client: 25) (80.187.66.73:10892 -> 192.168.0.230:4500): The client initiates a QuickMode negotiation.
2022-10-08 12:53:07.330 IPsec ESP Session (IPsec SA) 26 (Client: 25) (80.187.66.73:10892 -> 192.168.0.230:4500): A new IPsec SA (Direction: Client -> Server) is created. SPI: 0x952C8AE4, DH Group: (null), Hash Algorithm: SHA-1, Cipher Algorithm: AES-CBC, Cipher Key Size: 256 bits, Lifetime: 4294967295 Kbytes or 3600 seconds
2022-10-08 12:53:07.330 IPsec ESP Session (IPsec SA) 26 (Client: 25) (80.187.66.73:10892 -> 192.168.0.230:4500): A new IPsec SA (Direction: Server -> Client) is created. SPI: 0xFB3DEEC, DH Group: (null), Hash Algorithm: SHA-1, Cipher Algorithm: AES-CBC, Cipher Key Size: 256 bits, Lifetime: 4294967295 Kbytes or 3600 seconds
2022-10-08 12:53:07.361 IPsec Client 25 (80.187.66.73:10892 -> 192.168.0.230:4500): The L2TP Server Module is started.
2022-10-08 12:53:07.361 IPsec ESP Session (IPsec SA) 26 (Client: 25) (80.187.66.73:10892 -> 192.168.0.230:4500): This IPsec SA is established between the server and the client.
2022-10-08 12:53:07.471 L2TP PPP Session [80.187.66.73:1701]: A new PPP session (Upper protocol: L2TP) is started. IP Address of PPP Client: 80.187.66.73 (Hostname: "iPhone-von-Maximilian"), Port Number of PPP Client: 1701, IP Address of PPP Server: 192.168.0.230, Port Number of PPP Server: 1701, Client Software Name: "L2TP VPN Client", IPv4 TCP MSS (Max Segment Size): 1314 bytes
2022-10-08 12:53:07.564 On the TCP Listener (Port 0), a Client (IP address 80.187.66.73, Host name "tmo-066-73.customers.d1-online.com", Port number 1701) has connected.
2022-10-08 12:53:07.564 For the client (IP address: 80.187.66.73, host name: "tmo-066-73.customers.d1-online.com", port number: 1701), connection "CID-23" has been created.
2022-10-08 12:53:07.564 SSL communication for connection "CID-23" has been started. The encryption algorithm name is "(null)".
2022-10-08 12:53:07.564 [HUB "VPN"] The connection "CID-23" (IP address: 80.187.66.73, Host name: tmo-066-73.customers.d1-online.com, Port number: 1701, Client name: "L2TP VPN Client", Version: 4.39, Build: 9772) is attempting to connect to the Virtual Hub. The auth type provided is "External server authentication" and the user name is "CONTOSO-CORP\MAF".
2022-10-08 12:53:07.564 [HUB "VPN"] Connection "CID-23": User authentication failed. The user name that has been provided was "CONTOSO-CORP\MAF".
2022-10-08 12:53:07.596 Connection "CID-23" terminated by the cause "User authentication failed." (code 9).
2022-10-08 12:53:07.596 Connection "CID-23" has been terminated.
2022-10-08 12:53:07.596 The connection with the client (IP address 80.187.66.73, Port number 1701) has been disconnected.
2022-10-08 12:53:07.611 IPsec IKE Session (IKE SA) 22 (Client: 25) (80.187.66.73:10892 -> 192.168.0.230:4500): This IKE SA is deleted.
2022-10-08 12:53:07.611 IPsec ESP Session (IPsec SA) 26 (Client: 25) (80.187.66.73:10892 -> 192.168.0.230:4500): This IPsec SA is deleted.
2022-10-08 12:53:07.611 IPsec ESP Session (IPsec SA) 26 (Client: 25) (80.187.66.73:10892 -> 192.168.0.230:4500): This IPsec SA is deleted.
2022-10-08 12:53:07.877 L2TP PPP Session [80.187.66.73:1701]: A PPP protocol error occurred, or the PPP session has been disconnected.
2022-10-08 12:53:18.080 IPsec Client 25 (80.187.66.73:10892 -> 192.168.0.230:4500): This IPsec Client is deleted.
2022-10-08 12:54:14.033 IPsec Client 26 (80.187.66.73:500 -> 192.168.0.230:500): A new IPsec client is created.
2022-10-08 12:54:14.033 IPsec IKE Session (IKE SA) 23 (Client: 26) (80.187.66.73:500 -> 192.168.0.230:500): A new IKE SA (Main Mode) is created. Initiator Cookie: 0xEFFA5DD1CE50AF56, Responder Cookie: 0xFDD11E86D8184DB9, DH Group: MODP 2048 (Group 14), Hash Algorithm: SHA-2-256, Cipher Algorithm: AES-CBC, Cipher Key Size: 256 bits, Lifetime: 4294967295 Kbytes or 3600 seconds
2022-10-08 12:54:14.143 IPsec Client 26 (80.187.66.73:10892 -> 192.168.0.230:4500): The port number information of this client is updated.
2022-10-08 12:54:14.143 IPsec Client 26 (80.187.66.73:10892 -> 192.168.0.230:4500): 
2022-10-08 12:54:14.143 IPsec IKE Session (IKE SA) 23 (Client: 26) (80.187.66.73:10892 -> 192.168.0.230:4500): This IKE SA is established between the server and the client.
2022-10-08 12:54:15.018 IPsec IKE Session (IKE SA) 23 (Client: 26) (80.187.66.73:10892 -> 192.168.0.230:4500): The client initiates a QuickMode negotiation.
2022-10-08 12:54:15.018 IPsec ESP Session (IPsec SA) 27 (Client: 26) (80.187.66.73:10892 -> 192.168.0.230:4500): A new IPsec SA (Direction: Client -> Server) is created. SPI: 0x6D603632, DH Group: (null), Hash Algorithm: SHA-1, Cipher Algorithm: AES-CBC, Cipher Key Size: 256 bits, Lifetime: 4294967295 Kbytes or 3600 seconds
2022-10-08 12:54:15.033 IPsec ESP Session (IPsec SA) 27 (Client: 26) (80.187.66.73:10892 -> 192.168.0.230:4500): A new IPsec SA (Direction: Server -> Client) is created. SPI: 0xCF10989, DH Group: (null), Hash Algorithm: SHA-1, Cipher Algorithm: AES-CBC, Cipher Key Size: 256 bits, Lifetime: 4294967295 Kbytes or 3600 seconds
2022-10-08 12:54:15.049 IPsec ESP Session (IPsec SA) 27 (Client: 26) (80.187.66.73:10892 -> 192.168.0.230:4500): This IPsec SA is established between the server and the client.
2022-10-08 12:54:15.065 IPsec Client 26 (80.187.66.73:10892 -> 192.168.0.230:4500): The L2TP Server Module is started.
2022-10-08 12:54:15.127 L2TP PPP Session [80.187.66.73:1701]: A new PPP session (Upper protocol: L2TP) is started. IP Address of PPP Client: 80.187.66.73 (Hostname: "iPhone-von-Maximilian"), Port Number of PPP Client: 1701, IP Address of PPP Server: 192.168.0.230, Port Number of PPP Server: 1701, Client Software Name: "L2TP VPN Client", IPv4 TCP MSS (Max Segment Size): 1314 bytes
2022-10-08 12:54:15.190 On the TCP Listener (Port 0), a Client (IP address 80.187.66.73, Host name "tmo-066-73.customers.d1-online.com", Port number 1701) has connected.
2022-10-08 12:54:15.190 For the client (IP address: 80.187.66.73, host name: "tmo-066-73.customers.d1-online.com", port number: 1701), connection "CID-24" has been created.
2022-10-08 12:54:15.190 SSL communication for connection "CID-24" has been started. The encryption algorithm name is "(null)".
2022-10-08 12:54:15.190 [HUB "VPN"] The connection "CID-24" (IP address: 80.187.66.73, Host name: tmo-066-73.customers.d1-online.com, Port number: 1701, Client name: "L2TP VPN Client", Version: 4.39, Build: 9772) is attempting to connect to the Virtual Hub. The auth type provided is "External server authentication" and the user name is "CONTOSO-CORP\maf".
2022-10-08 12:54:15.190 [HUB "VPN"] Connection "CID-24": User authentication failed. The user name that has been provided was "CONTOSO-CORP\maf".
2022-10-08 12:54:15.236 Connection "CID-24" terminated by the cause "User authentication failed." (code 9).
2022-10-08 12:54:15.236 Connection "CID-24" has been terminated.
2022-10-08 12:54:15.236 The connection with the client (IP address 80.187.66.73, Port number 1701) has been disconnected.
2022-10-08 12:54:15.236 IPsec IKE Session (IKE SA) 23 (Client: 26) (80.187.66.73:10892 -> 192.168.0.230:4500): This IKE SA is deleted.
2022-10-08 12:54:15.236 IPsec ESP Session (IPsec SA) 27 (Client: 26) (80.187.66.73:10892 -> 192.168.0.230:4500): This IPsec SA is deleted.
2022-10-08 12:54:15.236 IPsec ESP Session (IPsec SA) 27 (Client: 26) (80.187.66.73:10892 -> 192.168.0.230:4500): This IPsec SA is deleted.
2022-10-08 12:54:15.518 L2TP PPP Session [80.187.66.73:1701]: A PPP protocol error occurred, or the PPP session has been disconnected.
2022-10-08 12:54:25.643 IPsec Client 26 (80.187.66.73:10892 -> 192.168.0.230:4500): This IPsec Client is deleted.
2022-10-08 12:59:46.690 Administration mode [RPC-2840]: The log file on the server "CONTOSO-DC01" (log file "server_log/vpn_20221008.log") has been downloaded.



mf_2
Posts: 16
Joined: Wed Oct 05, 2022 9:38 pm

Re: iPhone connection fails although Windows PC can connect

Post by mf_2 » Mon Oct 10, 2022 11:49 am

Does anybody have any idea? Are there additional logs that I can provide?

solo
Posts: 1228
Joined: Sun Feb 14, 2021 10:31 am

Re: iPhone connection fails although Windows PC can connect

Post by solo » Mon Oct 10, 2022 12:10 pm

Hi again :-)

can your iPhone connect OK to VPN Gate? If not, it's not compatible with SE.

Post Reply