Setup Issue on Debian Virtual running on Hyper-V

Post your questions about SoftEther VPN software here. Please answer questions if you can afford.
Post Reply
andywilde16
Posts: 1
Joined: Tue Feb 25, 2020 2:25 pm

Setup Issue on Debian Virtual running on Hyper-V

Post by andywilde16 » Tue Feb 25, 2020 5:21 pm

<r>I am struggling to get my SoftEther VPN server up and running with client connections for my home network.<br/>
<br/>
I am running a Windows Server 2012 R2 Hyper-V environment with a virtual Debian 10 server which has EtherSoft VPN server installed on it. The Debian VM has one virtual NIC (eth0) and I have enabled MAC Address Spoofing on the VM.<br/>
<br/>
The host server is connected directly to the LAN switch which is also connected to the Internet router, the LAN consists of a single 10.0.20.x IP range on a single subnet. The management of the VPN Server is via a windows VM on the same host.<br/>
<br/>
I have UDP ports 500 and 4500 forwarded to the same ports internally and pointing to the Debian VM IP address, there is within EtherSoft VPN a local bridge setup and Secure NAT is disabled. I have created an L2TP connection on my iPhone and I can connect to the VPN and get a DHCP address from the DHCP server on my LAN, the address will PING from other hosts on the LAN but the iPhone is not able to browse to any web page and when I try the PING reponses stop. I have followed all videos and instructions and understand that all I need to do is to have the local bridge in place to get this to work.<br/>
<br/>
I have copied the log contents below for the connection in the hope the issue is obvious but I am getting frustrated with a lack of a solution even after a reinstallation and setup<br/>
<br/>
Thanks in advance<br/>



<br/>
<br/>
<I><s></s><B><s></s>2020-02-25 17:13:52.734 IPsec Client 3 (62.189.80.255:500 -> 10.0.20.20:500): A new IPsec client is created.<br/>
2020-02-25 17:13:52.734 IPsec IKE Session (IKE SA) 3 (Client: 3) (62.189.80.255:500 -> 10.0.20.20:500): A new IKE SA (Main Mode) is created. Initiator Cookie: 0xA9F38B527A90B61E, Responder Cookie: 0xE378895DC51C31D3, DH Group: MODP 2048 (Group 14), Hash Algorithm: SHA-2-256, Cipher Algorithm: AES-CBC, Cipher Key Size: 256 bits, Lifetime: 4294967295 Kbytes or 3600 seconds<br/>
2020-02-25 17:13:52.968 IPsec Client 3 (62.189.80.255:50169 -> 10.0.20.20:4500): The port number information of this client is updated.<br/>
2020-02-25 17:13:52.968 IPsec Client 3 (62.189.80.255:50169 -> 10.0.20.20:4500): <br/>
2020-02-25 17:13:52.968 IPsec IKE Session (IKE SA) 3 (Client: 3) (62.189.80.255:50169 -> 10.0.20.20:4500): This IKE SA is established between the server and the client.<br/>
2020-02-25 17:13:53.821 IPsec IKE Session (IKE SA) 3 (Client: 3) (62.189.80.255:50169 -> 10.0.20.20:4500): The client initiates a QuickMode negotiation.<br/>
2020-02-25 17:13:53.821 IPsec ESP Session (IPsec SA) 5 (Client: 3) (62.189.80.255:50169 -> 10.0.20.20:4500): A new IPsec SA (Direction: Client -> Server) is created. SPI: 0x8538A90C, DH Group: (null), Hash Algorithm: SHA-1, Cipher Algorithm: AES-CBC, Cipher Key Size: 256 bits, Lifetime: 4294967295 Kbytes or 3600 seconds<br/>
2020-02-25 17:13:53.821 IPsec ESP Session (IPsec SA) 5 (Client: 3) (62.189.80.255:50169 -> 10.0.20.20:4500): A new IPsec SA (Direction: Server -> Client) is created. SPI: 0x5574009, DH Group: (null), Hash Algorithm: SHA-1, Cipher Algorithm: AES-CBC, Cipher Key Size: 256 bits, Lifetime: 4294967295 Kbytes or 3600 seconds<br/>
2020-02-25 17:13:53.852 IPsec ESP Session (IPsec SA) 5 (Client: 3) (62.189.80.255:50169 -> 10.0.20.20:4500): This IPsec SA is established between the server and the client.<br/>
2020-02-25 17:13:53.852 IPsec Client 3 (62.189.80.255:50169 -> 10.0.20.20:4500): The L2TP Server Module is started.<br/>
2020-02-25 17:13:53.903 L2TP PPP Session [62.189.80.255:1701]: A new PPP session (Upper protocol: L2TP) is started. IP Address of PPP Client: 62.189.80.255 (Hostname: "Jedi-Knight"), Port Number of PPP Client: 1701, IP Address of PPP Server: 10.0.20.20, Port Number of PPP Server: 1701, Client Software Name: "L2TP VPN Client", IPv4 TCP MSS (Max Segment Size): 1314 bytes<br/>
2020-02-25 17:13:53.964 On the TCP Listener (Port 0), a Client (IP address 62.189.80.255, Host name "62.189.80.255", Port number 1701) has connected.<br/>
2020-02-25 17:13:53.964 For the client (IP address: 62.189.80.255, host name: "62.189.80.255", port number: 1701), connection "CID-5" has been created.<br/>
2020-02-25 17:13:53.964 SSL communication for connection "CID-5" has been started. The encryption algorithm name is "(null)".<br/>
2020-02-25 17:13:53.964 [HUB "Home_VPN"] The connection "CID-5" (IP address: 62.189.80.255, Host name: 62.189.80.255, Port number: 1701, Client name: "L2TP VPN Client", Version: 4.32, Build: 9731) is attempting to connect to the Virtual Hub. The auth type provided is "External server authentication" and the user name is "Bob".<br/>
2020-02-25 17:13:53.964 [HUB "Home_VPN"] Connection "CID-5": Successfully authenticated as user "Bob".<br/>
2020-02-25 17:13:53.964 [HUB "Home_VPN"] Connection "CID-5": The new session "SID-BOB-[L2TP]-3" has been created. (IP address: 62.189.80.255, Port number: 1701, Physical underlying protocol: "Legacy VPN - L2TP")<br/>
2020-02-25 17:13:53.964 [HUB "Home_VPN"] Session "SID-BOB-[L2TP]-3": The parameter has been set. Max number of TCP connections: 1, Use of encryption: Yes, Use of compression: No, Use of Half duplex communication: No, Timeout: 20 seconds.<br/>
2020-02-25 17:13:53.964 [HUB "Home_VPN"] Session "SID-BOB-[L2TP]-3": VPN Client details: (Client product name: "L2TP VPN Client", Client version: 432, Client build number: 9731, Server product name: "SoftEther VPN Server (64 bit)", Server version: 432, Server build number: 9731, Client OS name: "L2TP VPN Client", Client OS version: "-", Client product ID: "-", Client host name: "Jedi-Knight", Client IP address: "62.189.80.255", Client port number: 1701, Server host name: "10.0.20.20", Server IP address: "10.0.20.20", Server port number: 1701, Proxy host name: "", Proxy IP address: "0.0.0.0", Proxy port number: 0, Virtual Hub name: "Home_VPN", Client unique ID: "98000D5C310EC50CE606DEBB3320A124")<br/>
2020-02-25 17:13:53.984 L2TP PPP Session [62.189.80.255:1701]: Trying to request an IP address from the DHCP server.<br/>
2020-02-25 17:13:54.482 [HUB "Home_VPN"] Session "SID-LOCALBRIDGE-1": The DHCP server of host "00-15-5D-14-09-07" (10.0.20.10) on this session allocated, for host "SID-BOB-[L2TP]-3" on another session "CA-47-F4-48-5B-F5", the new IP address 10.0.20.98.<br/>
2020-02-25 17:13:54.482 L2TP PPP Session [62.189.80.255:1701]: An IP address is assigned. IP Address of Client: 10.0.20.98, Subnet Mask: 255.255.255.0, Default Gateway: 10.0.20.1, Domain Name: "xxxx.local", DNS Server 1: 10.0.20.11, DNS Server 2: 8.8.8.8, WINS Server 1: 0.0.0.0, WINS Server 2: 0.0.0.0, IP Address of DHCP Server: 10.0.20.10, Lease Lifetime: 172800 seconds<br/>
2020-02-25 17:13:54.482 L2TP PPP Session [62.189.80.255:1701]: The IP address and other network information parameters are set successfully. IP Address of Client: 10.0.20.98, Subnet Mask: 255.255.255.0, Default Gateway: 10.0.20.1, DNS Server 1: 10.0.20.11, DNS Server 2: 8.8.8.8, WINS Server 1: 0.0.0.0, WINS Server 2: 0.0.0.0<br/>
2020-02-25 17:13:56.698 L2TP PPP Session [62.189.80.255:1701]: The PPP session is disconnected because the upper-layer protocol "L2TP" has been disconnected.<br/>
2020-02-25 17:13:56.698 L2TP PPP Session [62.189.80.255:1701]: The PPP session is disconnected.<br/>
2020-02-25 17:13:56.708 IPsec ESP Session (IPsec SA) 5 (Client: 3) (62.189.80.255:50169 -> 10.0.20.20:4500): This IPsec SA is deleted.<br/>
2020-02-25 17:13:56.708 IPsec IKE Session (IKE SA) 3 (Client: 3) (62.189.80.255:50169 -> 10.0.20.20:4500): The server initiates a QuickMode negotiation.<br/>
2020-02-25 17:13:56.708 IPsec ESP Session (IPsec SA) 6 (Client: 3) (62.189.80.255:50169 -> 10.0.20.20:4500): A new IPsec SA (Direction: Client -> Server) is created. SPI: 0xAC70ADBC, DH Group: (null), Hash Algorithm: SHA-1, Cipher Algorithm: AES-CBC, Cipher Key Size: 256 bits, Lifetime: 4294967295 Kbytes or 3600 seconds<br/>
2020-02-25 17:13:56.708 IPsec ESP Session (IPsec SA) 6 (Client: 3) (62.189.80.255:50169 -> 10.0.20.20:4500): A new IPsec SA (Direction: Server -> Client) is created. SPI: 0x0, DH Group: (null), Hash Algorithm: SHA-1, Cipher Algorithm: AES-CBC, Cipher Key Size: 256 bits, Lifetime: 4294967295 Kbytes or 3600 seconds<br/>
2020-02-25 17:13:56.708 IPsec IKE Session (IKE SA) 3 (Client: 3) (62.189.80.255:50169 -> 10.0.20.20:4500): This IKE SA is deleted.<br/>
2020-02-25 17:13:56.708 IPsec ESP Session (IPsec SA) 5 (Client: 3) (62.189.80.255:50169 -> 10.0.20.20:4500): This IPsec SA is deleted.<br/>
2020-02-25 17:13:56.708 IPsec ESP Session (IPsec SA) 6 (Client: 3) (62.189.80.255:50169 -> 10.0.20.20:4500): This IPsec SA is deleted.<br/>
2020-02-25 17:13:56.708 IPsec ESP Session (IPsec SA) 6 (Client: 3) (62.189.80.255:50169 -> 10.0.20.20:4500): This IPsec SA is deleted.<br/>
2020-02-25 17:13:57.247 [HUB "Home_VPN"] Session "SID-BOB-[L2TP]-3": The session has been terminated. The statistical information is as follows: Total outgoing data size: 2042 bytes, Total incoming data size: 1071 bytes.<br/>
2020-02-25 17:13:57.278 Connection "CID-5" terminated by the cause "The VPN session has been deleted. It is possible that either the administrator disconnected the session or the connection from the client to the VPN Server has been disconnected." (code 11).<br/>
2020-02-25 17:13:57.278 Connection "CID-5" has been terminated.<br/>
2020-02-25 17:13:57.278 The connection with the client (IP address 62.189.80.255, Port number 1701) has been disconnected.<e>
</e></B><e>
</e></I></r>

Post Reply