Προς το περιεχόμενο

gtgt

Members
  • ΜΗΝΥΜΑΤΑ FORUM

    165
  • ΜΕΛΟΣ

  • ΤΕΛ. ΕΠΙΣΚΕΨΗ

Σχετικά με gtgt

  • Ημερομηνία γέννησης 12/10/1981

Πρόσφατες Επισκέψεις

Η εμφάνιση επισκεπτών είναι απενεργοποιημένη ή δεν έχετε πρόσβαση σε αυτή.

gtgt's Achievements

Proficient

Proficient (10/15)

  • Πρώτο Μήνυμα
  • Collaborator
  • Εκκίνηση Συζήτησης
  • 1 Εβδομάδα Μετά
  • Ένα Μήνα Μετά

Πρόσφατες Διακρίσεις

1

Φήμη

  1. Ενδιαφέρομαι για αγορά τηλεόρασης 55 ιντσών και πάνω και budget εως 500ευρώ. Απαραίτητα να είναι smart, να έχει υβριδική, καλή εικόνα για ταινίες, καλό ήχο. Ευχαριστώ
  2. gtgt

    Μη έγκυρη sim

    Ήρθε από Αμερική χρησιμοποιημένο με προηγούμενο πάροχο Αμερικής. Αυτός.που.μ το χάρισε είναι Ελλάδα. Μπορούμε να κάνουμε κάτι? Ευχαριστώ
  3. gtgt

    Μη έγκυρη sim

    Μόλις μου χάρισαν ένα iphone xs max από Αμερική και έβαλα την κάρτα σιμ που είναι κόσμοτε και δεν την παίρνει τι να κάνω?
  4. Θέλω να στείλω ήχο από τον υπολογιστή σε ηχεία που θα βρίσκονται περίπου στα 7 μέτρα σε εξωτερικό χώρο. Είναι κατάστημα και απλά να σπάσει η μονοτονία. Θα συνδεθούν με ρεύμα και όσο γίνεται οικονομικά. Ευχαριστώ
  5. gtgt

    Αγορά SSD

    Καλημέρα.Έχω ένα dell 15 3542 i3. μιας και το έχω αρκετά χρόνια κι αρχίζει και κολλάει θέλω να το αναβαθμίσω. Σκέφτομαι για ssd τουλάχιστον 500gb. έχετε κάτι να προτείνετε? Από μία έρευνα βρήκα τον Western Digital Blue 3D 500GB γύρω στα 70 ευρώ. Αν έχετε κάτι άλλο΄υπόψιν πείτε μου. Εντωμεταξύ επειδή καμιά φορά ανοίγω photoshop και τα παίζει σκέφτομαι να βάλω πιο μεγάλη μνήμη. Είναι ddr3l απ ότι είδα. Υ.Γ. Το έχω καθαρίσει εσωτερικά, τούμπες δεν έχει φάει, γενικά είναι σαν καινούργιο και τα οικονομικά δεν επιτρέπουν αντικατάσταση.
  6. Καλησπέρα. Θα ήθελα να μου προτείνετε έναν εσωτερικό για αναβάθμιση ps4 μέχρι 60 ευρώ αν είναι δυνατόν. Από μια πρόχειρη έρευνα είδα ότι τα απαραίτητα χαρακτηριστικά είναι 2,5 ιντσών, τουλάχιστον 1Τ, 7200rpm. Ευχαριστώ
  7. Εννοώ θερμάστρες εξωτερικού χώρου Σε αυτό το στυλ δηλαδή https://www.skroutz.gr/s/10164814/MultiHome-PHW-2500CR.html
  8. Ψάχνω θερμάστρες για κάλυψη επαγγελματικού χώρου περίπου 70τ.μ. Αν έχει καποιος να μου προτείνει γιατι δεν μπορώ να βρω κριτικές για αυτα τα προιόντα. Ευχαριστώ
  9. 22/04/19 ειναι αντιστροφη. Η συνδεση μου ειναι ιδιωτικο δικτυο. Αλλαξα στο phase 2 σε group 2 (καπου το είδα ως προταση) γιατι απο οτι καταλαβα εκει κολλαει.19/04/22 16:43:16 ii : - Firewall Type = CISCO-UNKNOWN 19/04/22 16:43:16 == : new config iv ( 8 bytes ) 19/04/22 16:43:16 ii : sending config pull request 19/04/22 16:43:16 >> : hash payload 19/04/22 16:43:16 >> : attribute payload 19/04/22 16:43:16 == : new configure hash ( 20 bytes ) 19/04/22 16:43:16 >= : cookies cd6eecee11dbf4bf:86a82707d6d6521b 19/04/22 16:43:16 >= : message 3674b3f5 19/04/22 16:43:16 >= : encrypt iv ( 8 bytes ) 19/04/22 16:43:16 == : encrypt packet ( 166 bytes ) 19/04/22 16:43:16 == : stored iv ( 8 bytes ) 19/04/22 16:43:16 DB : config resend event canceled ( ref count = 1 ) 19/04/22 16:43:16 -> : send NAT-T:IKE packet 192.168.1.12:4500 -> 62.217.96.231:4500 ( 204 bytes ) 19/04/22 16:43:16 DB : config resend event scheduled ( ref count = 2 ) 19/04/22 16:43:16 DB : config ref decrement ( ref count = 1, obj count = 1 ) 19/04/22 16:43:16 DB : phase1 ref decrement ( ref count = 3, obj count = 1 ) 19/04/22 16:43:16 <- : recv NAT-T:IKE packet 62.217.96.231:4500 -> 192.168.1.12:4500 ( 180 bytes ) 19/04/22 16:43:16 DB : phase1 found 19/04/22 16:43:16 DB : phase1 ref increment ( ref count = 4, obj count = 1 ) 19/04/22 16:43:16 ii : processing config packet ( 180 bytes ) 19/04/22 16:43:16 DB : config found 19/04/22 16:43:16 DB : config ref increment ( ref count = 2, obj count = 1 ) 19/04/22 16:43:16 =< : cookies cd6eecee11dbf4bf:86a82707d6d6521b 19/04/22 16:43:16 =< : message 3674b3f5 19/04/22 16:43:16 =< : decrypt iv ( 8 bytes ) 19/04/22 16:43:16 == : decrypt packet ( 180 bytes ) 19/04/22 16:43:16 <= : trimmed packet padding ( 6 bytes ) 19/04/22 16:43:16 <= : stored iv ( 8 bytes ) 19/04/22 16:43:16 << : hash payload 19/04/22 16:43:16 << : attribute payload 19/04/22 16:43:16 == : configure hash_i ( computed ) ( 20 bytes ) 19/04/22 16:43:16 == : configure hash_c ( computed ) ( 20 bytes ) 19/04/22 16:43:16 ii : configure hash verified 19/04/22 16:43:16 ii : received config pull response 19/04/22 16:43:16 ii : - IP4 Address = 172.16.1.2 19/04/22 16:43:16 ii : - IP4 Netmask = 255.255.255.128 19/04/22 16:43:16 ii : - IP4 DNS Server = 195.130.95.1 19/04/22 16:43:16 ii : - Save Password = 0 19/04/22 16:43:16 ii : - Application Version = Cisco Systems, Inc ASA5520 Version 8.2(2) built by builders on Mon 11-Jan-10 14:19 19/04/22 16:43:16 DB : config resend event canceled ( ref count = 1 ) 19/04/22 16:43:16 DB : config ref decrement ( ref count = 0, obj count = 1 ) 19/04/22 16:43:16 DB : phase1 ref decrement ( ref count = 3, obj count = 1 ) 19/04/22 16:43:16 ii : enabled adapter ROOT\VNET\0000 19/04/22 16:43:16 ii : adapter ROOT\VNET\0000 unavailable, retrying ... 19/04/22 16:43:17 ii : apapter ROOT\VNET\0000 MTU is 1380 19/04/22 16:43:17 ii : generating IPSEC security policies at REQUIRE level 19/04/22 16:43:17 ii : creating NONE INBOUND policy ANY:62.217.96.231:* -> ANY:192.168.1.12:* 19/04/22 16:43:17 DB : policy ref increment ( ref count = 1, obj count = 0 ) 19/04/22 16:43:17 DB : policy added ( obj count = 1 ) 19/04/22 16:43:17 DB : policy ref decrement ( ref count = 0, obj count = 1 ) 19/04/22 16:43:17 K> : send pfkey X_SPDADD UNSPEC message 19/04/22 16:43:17 K< : recv pfkey X_SPDADD UNSPEC message 19/04/22 16:43:17 DB : policy found 19/04/22 16:43:17 DB : policy ref increment ( ref count = 1, obj count = 1 ) 19/04/22 16:43:17 DB : policy ref decrement ( ref count = 0, obj count = 1 ) 19/04/22 16:43:17 ii : creating NONE OUTBOUND policy ANY:192.168.1.12:* -> ANY:62.217.96.231:* 19/04/22 16:43:17 ii : created NONE policy route for 62.217.96.231/32 19/04/22 16:43:17 DB : policy ref increment ( ref count = 1, obj count = 1 ) 19/04/22 16:43:17 DB : policy added ( obj count = 2 ) 19/04/22 16:43:17 DB : policy ref decrement ( ref count = 0, obj count = 2 ) 19/04/22 16:43:17 K> : send pfkey X_SPDADD UNSPEC message 19/04/22 16:43:17 K< : recv pfkey X_SPDADD UNSPEC message 19/04/22 16:43:17 DB : policy found 19/04/22 16:43:17 DB : policy ref increment ( ref count = 1, obj count = 2 ) 19/04/22 16:43:17 DB : policy ref decrement ( ref count = 0, obj count = 2 ) 19/04/22 16:43:17 ii : creating NONE INBOUND policy ANY:192.168.1.1:* -> ANY:172.16.1.2:* 19/04/22 16:43:17 DB : policy ref increment ( ref count = 1, obj count = 2 ) 19/04/22 16:43:17 DB : policy added ( obj count = 3 ) 19/04/22 16:43:17 DB : policy ref decrement ( ref count = 0, obj count = 3 ) 19/04/22 16:43:17 K> : send pfkey X_SPDADD UNSPEC message 19/04/22 16:43:17 ii : creating NONE OUTBOUND policy ANY:172.16.1.2:* -> ANY:192.168.1.1:* 19/04/22 16:43:17 DB : policy ref increment ( ref count = 1, obj count = 3 ) 19/04/22 16:43:17 DB : policy added ( obj count = 4 ) 19/04/22 16:43:17 DB : policy ref decrement ( ref count = 0, obj count = 4 ) 19/04/22 16:43:17 K> : send pfkey X_SPDADD UNSPEC message 19/04/22 16:43:17 K< : recv pfkey X_SPDADD UNSPEC message 19/04/22 16:43:17 DB : policy found 19/04/22 16:43:17 ii : creating IPSEC INBOUND policy ANY:0.0.0.0/0:* -> ANY:172.16.1.2:* 19/04/22 16:43:17 DB : policy ref increment ( ref count = 1, obj count = 4 ) 19/04/22 16:43:17 DB : policy ref increment ( ref count = 1, obj count = 4 ) 19/04/22 16:43:17 DB : policy added ( obj count = 5 ) 19/04/22 16:43:17 DB : policy ref decrement ( ref count = 0, obj count = 5 ) 19/04/22 16:43:17 DB : policy ref decrement ( ref count = 0, obj count = 5 ) 19/04/22 16:43:17 K< : recv pfkey X_SPDADD UNSPEC message 19/04/22 16:43:17 K> : send pfkey X_SPDADD UNSPEC message 19/04/22 16:43:17 DB : policy found 19/04/22 16:43:17 DB : policy ref increment ( ref count = 1, obj count = 5 ) 19/04/22 16:43:17 ii : creating IPSEC OUTBOUND policy ANY:172.16.1.2:* -> ANY:0.0.0.0/0:* 19/04/22 16:43:17 DB : policy ref decrement ( ref count = 0, obj count = 5 ) 19/04/22 16:43:17 K< : recv pfkey X_SPDADD UNSPEC message 19/04/22 16:43:17 DB : policy found 19/04/22 16:43:17 DB : policy ref increment ( ref count = 1, obj count = 5 ) 19/04/22 16:43:17 DB : policy ref decrement ( ref count = 0, obj count = 5 ) 19/04/22 16:43:17 ii : created IPSEC policy route for 0.0.0.0 19/04/22 16:43:17 DB : policy ref increment ( ref count = 1, obj count = 5 ) 19/04/22 16:43:17 DB : policy added ( obj count = 6 ) 19/04/22 16:43:17 DB : policy ref decrement ( ref count = 0, obj count = 6 ) 19/04/22 16:43:17 K> : send pfkey X_SPDADD UNSPEC message 19/04/22 16:43:17 K< : recv pfkey X_SPDADD UNSPEC message 19/04/22 16:43:17 DB : policy found 19/04/22 16:43:17 DB : policy ref increment ( ref count = 1, obj count = 6 ) 19/04/22 16:43:17 ii : calling init phase2 for initial policy 19/04/22 16:43:17 DB : policy found 19/04/22 16:43:17 DB : policy ref increment ( ref count = 2, obj count = 6 ) 19/04/22 16:43:17 DB : policy found 19/04/22 16:43:17 DB : policy ref increment ( ref count = 1, obj count = 6 ) 19/04/22 16:43:17 DB : tunnel found 19/04/22 16:43:17 DB : tunnel ref increment ( ref count = 6, obj count = 1 ) 19/04/22 16:43:17 DB : tunnel ref increment ( ref count = 7, obj count = 1 ) 19/04/22 16:43:17 DB : new phase2 ( IPSEC initiator ) 19/04/22 16:43:17 DB : phase2 ref increment ( ref count = 1, obj count = 0 ) 19/04/22 16:43:17 DB : phase2 added ( obj count = 1 ) 19/04/22 16:43:17 K> : send pfkey GETSPI ESP message 19/04/22 16:43:17 DB : phase2 ref decrement ( ref count = 0, obj count = 1 ) 19/04/22 16:43:17 DB : tunnel ref decrement ( ref count = 6, obj count = 1 ) 19/04/22 16:43:17 DB : policy ref decrement ( ref count = 0, obj count = 6 ) 19/04/22 16:43:17 DB : policy ref decrement ( ref count = 1, obj count = 6 ) 19/04/22 16:43:17 DB : policy ref decrement ( ref count = 0, obj count = 6 ) 19/04/22 16:43:17 K< : recv pfkey GETSPI ESP message 19/04/22 16:43:17 DB : phase2 found 19/04/22 16:43:17 DB : phase2 ref increment ( ref count = 1, obj count = 1 ) 19/04/22 16:43:17 ii : updated spi for 1 ipsec-esp proposal 19/04/22 16:43:17 DB : phase1 found 19/04/22 16:43:17 DB : phase1 ref increment ( ref count = 4, obj count = 1 ) 19/04/22 16:43:17 >> : hash payload 19/04/22 16:43:17 >> : security association payload 19/04/22 16:43:17 >> : - proposal #1 payload 19/04/22 16:43:17 >> : -- transform #1 payload 19/04/22 16:43:17 >> : -- transform #2 payload 19/04/22 16:43:17 >> : -- transform #3 payload 19/04/22 16:43:17 >> : -- transform #4 payload 19/04/22 16:43:17 >> : -- transform #5 payload 19/04/22 16:43:17 >> : -- transform #6 payload 19/04/22 16:43:17 >> : -- transform #7 payload 19/04/22 16:43:17 >> : -- transform #8 payload 19/04/22 16:43:17 >> : -- transform #9 payload 19/04/22 16:43:17 >> : -- transform #10 payload 19/04/22 16:43:17 >> : -- transform #11 payload 19/04/22 16:43:17 >> : -- transform #12 payload 19/04/22 16:43:17 >> : -- transform #13 payload 19/04/22 16:43:17 >> : -- transform #14 payload 19/04/22 16:43:17 >> : -- transform #15 payload 19/04/22 16:43:17 >> : -- transform #16 payload 19/04/22 16:43:17 >> : -- transform #17 payload 19/04/22 16:43:17 >> : -- transform #18 payload 19/04/22 16:43:17 >> : -- transform #19 payload 19/04/22 16:43:17 >> : -- transform #20 payload 19/04/22 16:43:17 >> : -- transform #21 payload 19/04/22 16:43:17 >> : -- transform #22 payload 19/04/22 16:43:17 >> : -- transform #23 payload 19/04/22 16:43:17 >> : -- transform #24 payload 19/04/22 16:43:17 >> : -- transform #25 payload 19/04/22 16:43:17 >> : -- transform #26 payload 19/04/22 16:43:17 >> : -- transform #27 payload 19/04/22 16:43:17 >> : -- transform #28 payload 19/04/22 16:43:17 >> : -- transform #29 payload 19/04/22 16:43:17 >> : -- transform #30 payload 19/04/22 16:43:17 >> : -- transform #31 payload 19/04/22 16:43:17 >> : -- transform #32 payload 19/04/22 16:43:17 >> : -- transform #33 payload 19/04/22 16:43:17 >> : -- transform #34 payload 19/04/22 16:43:17 >> : -- transform #35 payload 19/04/22 16:43:17 >> : -- transform #36 payload 19/04/22 16:43:17 >> : -- transform #37 payload 19/04/22 16:43:17 >> : -- transform #38 payload 19/04/22 16:43:17 >> : -- transform #39 payload 19/04/22 16:43:17 >> : -- transform #40 payload 19/04/22 16:43:17 >> : -- transform #41 payload 19/04/22 16:43:17 >> : -- transform #42 payload 19/04/22 16:43:17 >> : -- transform #43 payload 19/04/22 16:43:17 >> : -- transform #44 payload 19/04/22 16:43:17 >> : -- transform #45 payload 19/04/22 16:43:17 >> : nonce payload 19/04/22 16:43:17 >> : key exchange payload 19/04/22 16:43:17 >> : identification payload 19/04/22 16:43:17 >> : identification payload 19/04/22 16:43:17 == : phase2 hash_i ( input ) ( 1772 bytes ) 19/04/22 16:43:17 == : phase2 hash_i ( computed ) ( 20 bytes ) 19/04/22 16:43:17 == : new phase2 iv ( 8 bytes ) 19/04/22 16:43:17 >= : cookies cd6eecee11dbf4bf:86a82707d6d6521b 19/04/22 16:43:17 >= : message bab1e3e6 19/04/22 16:43:17 >= : encrypt iv ( 8 bytes ) 19/04/22 16:43:17 == : encrypt packet ( 1820 bytes ) 19/04/22 16:43:17 == : stored iv ( 8 bytes ) 19/04/22 16:43:17 -> : send NAT-T:IKE packet 192.168.1.12:4500 -> 62.217.96.231:4500 ( 1852 bytes ) 19/04/22 16:43:17 ii : fragmented packet to 1514 bytes ( MTU 1500 bytes ) 19/04/22 16:43:17 ii : fragmented packet to 386 bytes ( MTU 1500 bytes ) 19/04/22 16:43:17 DB : phase2 resend event scheduled ( ref count = 2 ) 19/04/22 16:43:17 DB : phase1 ref decrement ( ref count = 3, obj count = 1 ) 19/04/22 16:43:17 DB : phase2 ref decrement ( ref count = 1, obj count = 1 ) 19/04/22 16:43:18 ii : split DNS is disabled 19/04/22 16:43:18 DB : tunnel ref increment ( ref count = 7, obj count = 1 ) 19/04/22 16:43:21 K< : recv pfkey ACQUIRE UNSPEC message 19/04/22 16:43:21 DB : policy found 19/04/22 16:43:21 DB : policy ref increment ( ref count = 1, obj count = 6 ) 19/04/22 16:43:21 DB : policy found 19/04/22 16:43:21 DB : policy ref increment ( ref count = 1, obj count = 6 ) 19/04/22 16:43:21 DB : tunnel found 19/04/22 16:43:21 DB : tunnel ref increment ( ref count = 8, obj count = 1 ) 19/04/22 16:43:21 DB : tunnel ref increment ( ref count = 9, obj count = 1 ) 19/04/22 16:43:21 DB : new phase2 ( IPSEC initiator ) 19/04/22 16:43:21 DB : phase2 ref increment ( ref count = 1, obj count = 1 ) 19/04/22 16:43:21 DB : phase2 added ( obj count = 2 ) 19/04/22 16:43:21 K> : send pfkey GETSPI ESP message 19/04/22 16:43:21 DB : phase2 ref decrement ( ref count = 0, obj count = 2 ) 19/04/22 16:43:21 DB : tunnel ref decrement ( ref count = 8, obj count = 1 ) 19/04/22 16:43:21 DB : policy ref decrement ( ref count = 0, obj count = 6 ) 19/04/22 16:43:21 DB : policy ref decrement ( ref count = 0, obj count = 6 ) 19/04/22 16:43:21 K< : recv pfkey GETSPI ESP message 19/04/22 16:43:21 DB : phase2 found 19/04/22 16:43:21 DB : phase2 ref increment ( ref count = 1, obj count = 2 ) 19/04/22 16:43:21 ii : updated spi for 1 ipsec-esp proposal 19/04/22 16:43:21 DB : phase1 found 19/04/22 16:43:21 DB : phase1 ref increment ( ref count = 4, obj count = 1 ) 19/04/22 16:43:21 >> : hash payload 19/04/22 16:43:21 >> : security association payload 19/04/22 16:43:21 >> : - proposal #1 payload 19/04/22 16:43:21 >> : -- transform #1 payload 19/04/22 16:43:21 >> : -- transform #2 payload 19/04/22 16:43:21 >> : -- transform #3 payload 19/04/22 16:43:21 >> : -- transform #4 payload 19/04/22 16:43:21 >> : -- transform #5 payload 19/04/22 16:43:21 >> : -- transform #6 payload 19/04/22 16:43:21 >> : -- transform #7 payload 19/04/22 16:43:21 >> : -- transform #8 payload 19/04/22 16:43:21 >> : -- transform #9 payload 19/04/22 16:43:21 >> : -- transform #10 payload 19/04/22 16:43:21 >> : -- transform #11 payload 19/04/22 16:43:21 >> : -- transform #12 payload 19/04/22 16:43:21 >> : -- transform #13 payload 19/04/22 16:43:21 >> : -- transform #14 payload 19/04/22 16:43:21 >> : -- transform #15 payload 19/04/22 16:43:21 >> : -- transform #16 payload 19/04/22 16:43:21 >> : -- transform #17 payload 19/04/22 16:43:21 >> : -- transform #18 payload 19/04/22 16:43:21 >> : -- transform #19 payload 19/04/22 16:43:21 >> : -- transform #20 payload 19/04/22 16:43:21 >> : -- transform #21 payload 19/04/22 16:43:21 >> : -- transform #22 payload 19/04/22 16:43:21 >> : -- transform #23 payload 19/04/22 16:43:21 >> : -- transform #24 payload 19/04/22 16:43:21 >> : -- transform #25 payload 19/04/22 16:43:21 >> : -- transform #26 payload 19/04/22 16:43:21 >> : -- transform #27 payload 19/04/22 16:43:21 >> : -- transform #28 payload 19/04/22 16:43:21 >> : -- transform #29 payload 19/04/22 16:43:21 >> : -- transform #30 payload 19/04/22 16:43:21 >> : -- transform #31 payload 19/04/22 16:43:21 >> : -- transform #32 payload 19/04/22 16:43:21 >> : -- transform #33 payload 19/04/22 16:43:21 >> : -- transform #34 payload 19/04/22 16:43:21 >> : -- transform #35 payload 19/04/22 16:43:21 >> : -- transform #36 payload 19/04/22 16:43:21 >> : -- transform #37 payload 19/04/22 16:43:21 >> : -- transform #38 payload 19/04/22 16:43:21 >> : -- transform #39 payload 19/04/22 16:43:21 >> : -- transform #40 payload 19/04/22 16:43:21 >> : -- transform #41 payload 19/04/22 16:43:21 >> : -- transform #42 payload 19/04/22 16:43:21 >> : -- transform #43 payload 19/04/22 16:43:21 >> : -- transform #44 payload 19/04/22 16:43:21 >> : -- transform #45 payload 19/04/22 16:43:21 >> : nonce payload 19/04/22 16:43:21 >> : key exchange payload 19/04/22 16:43:21 >> : identification payload 19/04/22 16:43:21 >> : identification payload 19/04/22 16:43:21 == : phase2 hash_i ( input ) ( 1772 bytes ) 19/04/22 16:43:21 == : phase2 hash_i ( computed ) ( 20 bytes ) 19/04/22 16:43:21 == : new phase2 iv ( 8 bytes ) 19/04/22 16:43:21 >= : cookies cd6eecee11dbf4bf:86a82707d6d6521b 19/04/22 16:43:21 >= : message cbe40098 19/04/22 16:43:21 >= : encrypt iv ( 8 bytes ) 19/04/22 16:43:21 == : encrypt packet ( 1820 bytes ) 19/04/22 16:43:21 == : stored iv ( 8 bytes ) 19/04/22 16:43:21 -> : send NAT-T:IKE packet 192.168.1.12:4500 -> 62.217.96.231:4500 ( 1852 bytes ) 19/04/22 16:43:21 ii : fragmented packet to 1514 bytes ( MTU 1500 bytes ) 19/04/22 16:43:21 ii : fragmented packet to 386 bytes ( MTU 1500 bytes ) 19/04/22 16:43:21 DB : phase2 resend event scheduled ( ref count = 2 ) 19/04/22 16:43:21 DB : phase1 ref decrement ( ref count = 3, obj count = 1 ) 19/04/22 16:43:21 DB : phase2 ref decrement ( ref count = 1, obj count = 2 ) 19/04/22 16:43:22 ii : fragmented packet to 1514 bytes ( MTU 1500 bytes ) 19/04/22 16:43:22 ii : fragmented packet to 386 bytes ( MTU 1500 bytes ) 19/04/22 16:43:22 -> : resend 1 phase2 packet(s) [0/2] 192.168.1.12:4500 -> 62.217.96.231:4500 19/04/22 16:43:24 <- : recv NAT-T:IKE packet 62.217.96.231:4500 -> 192.168.1.12:4500 ( 180 bytes ) 19/04/22 16:43:24 DB : phase1 found 19/04/22 16:43:24 DB : phase1 ref increment ( ref count = 4, obj count = 1 ) 19/04/22 16:43:24 ii : processing config packet ( 180 bytes ) 19/04/22 16:43:24 DB : config found 19/04/22 16:43:24 DB : config ref increment ( ref count = 1, obj count = 1 ) 19/04/22 16:43:24 !! : config packet ignored ( config already mature ) 19/04/22 16:43:24 DB : config ref decrement ( ref count = 0, obj count = 1 ) 19/04/22 16:43:24 DB : phase1 ref decrement ( ref count = 3, obj count = 1 ) 19/04/22 16:43:26 ii : fragmented packet to 1514 bytes ( MTU 1500 bytes ) 19/04/22 16:43:26 ii : fragmented packet to 386 bytes ( MTU 1500 bytes ) 19/04/22 16:43:26 -> : resend 1 phase2 packet(s) [0/2] 192.168.1.12:4500 -> 62.217.96.231:4500 19/04/22 16:43:27 ii : fragmented packet to 1514 bytes ( MTU 1500 bytes ) 19/04/22 16:43:27 ii : fragmented packet to 386 bytes ( MTU 1500 bytes ) 19/04/22 16:43:27 -> : resend 1 phase2 packet(s) [1/2] 192.168.1.12:4500 -> 62.217.96.231:4500 19/04/22 16:43:31 ii : fragmented packet to 1514 bytes ( MTU 1500 bytes ) 19/04/22 16:43:31 ii : fragmented packet to 386 bytes ( MTU 1500 bytes ) 19/04/22 16:43:31 -> : resend 1 phase2 packet(s) [1/2] 192.168.1.12:4500 -> 62.217.96.231:4500 19/04/22 16:43:31 DB : phase1 found 19/04/22 16:43:31 DB : phase1 ref increment ( ref count = 4, obj count = 1 ) 19/04/22 16:43:31 ii : sending peer DPDV1-R-U-THERE notification 19/04/22 16:43:31 ii : - 192.168.1.12:4500 -> 62.217.96.231:4500 19/04/22 16:43:31 ii : - isakmp spi = cd6eecee11dbf4bf:86a82707d6d6521b 19/04/22 16:43:31 ii : - data size 4 19/04/22 16:43:31 >> : hash payload 19/04/22 16:43:31 >> : notification payload 19/04/22 16:43:31 == : new informational hash ( 20 bytes ) 19/04/22 16:43:31 == : new informational iv ( 8 bytes ) 19/04/22 16:43:31 >= : cookies cd6eecee11dbf4bf:86a82707d6d6521b 19/04/22 16:43:31 >= : message a304978d 19/04/22 16:43:31 >= : encrypt iv ( 8 bytes ) 19/04/22 16:43:31 == : encrypt packet ( 84 bytes ) 19/04/22 16:43:31 == : stored iv ( 8 bytes ) 19/04/22 16:43:31 -> : send NAT-T:IKE packet 192.168.1.12:4500 -> 62.217.96.231:4500 ( 116 bytes ) 19/04/22 16:43:31 ii : DPD ARE-YOU-THERE sequence 11c62699 requested 19/04/22 16:43:31 DB : phase1 ref decrement ( ref count = 3, obj count = 1 ) 19/04/22 16:43:31 DB : phase1 found 19/04/22 16:43:31 DB : phase1 ref increment ( ref count = 4, obj count = 1 ) 19/04/22 16:43:31 -> : send NAT-T:KEEP-ALIVE packet 192.168.1.12:4500 -> 62.217.96.231:4500 19/04/22 16:43:31 DB : phase1 ref decrement ( ref count = 3, obj count = 1 ) 19/04/22 16:43:32 <- : recv NAT-T:IKE packet 62.217.96.231:4500 -> 192.168.1.12:4500 ( 180 bytes ) 19/04/22 16:43:32 DB : phase1 found 19/04/22 16:43:32 DB : phase1 ref increment ( ref count = 4, obj count = 1 ) 19/04/22 16:43:32 ii : processing config packet ( 180 bytes ) 19/04/22 16:43:32 DB : config found 19/04/22 16:43:32 DB : config ref increment ( ref count = 1, obj count = 1 ) 19/04/22 16:43:32 !! : config packet ignored ( config already mature ) 19/04/22 16:43:32 DB : config ref decrement ( ref count = 0, obj count = 1 ) 19/04/22 16:43:32 DB : phase1 ref decrement ( ref count = 3, obj count = 1 ) 19/04/22 16:43:32 ii : fragmented packet to 1514 bytes ( MTU 1500 bytes ) 19/04/22 16:43:32 ii : fragmented packet to 386 bytes ( MTU 1500 bytes ) 19/04/22 16:43:32 -> : resend 1 phase2 packet(s) [2/2] 192.168.1.12:4500 -> 62.217.96.231:4500 19/04/22 16:43:36 ii : fragmented packet to 1514 bytes ( MTU 1500 bytes ) 19/04/22 16:43:36 ii : fragmented packet to 386 bytes ( MTU 1500 bytes ) 19/04/22 16:43:36 -> : resend 1 phase2 packet(s) [2/2] 192.168.1.12:4500 -> 62.217.96.231:4500 19/04/22 16:43:37 K< : recv pfkey ACQUIRE UNSPEC message 19/04/22 16:43:37 DB : policy found 19/04/22 16:43:37 DB : policy ref increment ( ref count = 1, obj count = 6 ) 19/04/22 16:43:37 DB : policy found 19/04/22 16:43:37 DB : policy ref increment ( ref count = 1, obj count = 6 ) 19/04/22 16:43:37 DB : tunnel found 19/04/22 16:43:37 DB : tunnel ref increment ( ref count = 9, obj count = 1 ) 19/04/22 16:43:37 DB : tunnel ref increment ( ref count = 10, obj count = 1 ) 19/04/22 16:43:37 DB : new phase2 ( IPSEC initiator ) 19/04/22 16:43:37 DB : phase2 ref increment ( ref count = 1, obj count = 2 ) 19/04/22 16:43:37 DB : phase2 added ( obj count = 3 ) 19/04/22 16:43:37 K> : send pfkey GETSPI ESP message 19/04/22 16:43:37 DB : phase2 ref decrement ( ref count = 0, obj count = 3 ) 19/04/22 16:43:37 DB : tunnel ref decrement ( ref count = 9, obj count = 1 ) 19/04/22 16:43:37 DB : policy ref decrement ( ref count = 0, obj count = 6 ) 19/04/22 16:43:37 DB : policy ref decrement ( ref count = 0, obj count = 6 ) 19/04/22 16:43:37 K< : recv pfkey GETSPI ESP message 19/04/22 16:43:37 DB : phase2 found 19/04/22 16:43:37 DB : phase2 ref increment ( ref count = 1, obj count = 3 ) 19/04/22 16:43:37 ii : updated spi for 1 ipsec-esp proposal 19/04/22 16:43:37 DB : phase1 found 19/04/22 16:43:37 DB : phase1 ref increment ( ref count = 4, obj count = 1 ) 19/04/22 16:43:37 >> : hash payload 19/04/22 16:43:37 >> : security association payload 19/04/22 16:43:37 >> : - proposal #1 payload 19/04/22 16:43:37 >> : -- transform #1 payload 19/04/22 16:43:37 >> : -- transform #2 payload 19/04/22 16:43:37 >> : -- transform #3 payload 19/04/22 16:43:37 >> : -- transform #4 payload 19/04/22 16:43:37 >> : -- transform #5 payload 19/04/22 16:43:37 >> : -- transform #6 payload 19/04/22 16:43:37 >> : -- transform #7 payload 19/04/22 16:43:37 >> : -- transform #8 payload 19/04/22 16:43:37 >> : -- transform #9 payload 19/04/22 16:43:37 >> : -- transform #10 payload 19/04/22 16:43:37 >> : -- transform #11 payload 19/04/22 16:43:37 >> : -- transform #12 payload 19/04/22 16:43:37 >> : -- transform #13 payload 19/04/22 16:43:37 >> : -- transform #14 payload 19/04/22 16:43:37 >> : -- transform #15 payload 19/04/22 16:43:37 >> : -- transform #16 payload 19/04/22 16:43:37 >> : -- transform #17 payload 19/04/22 16:43:37 >> : -- transform #18 payload 19/04/22 16:43:37 >> : -- transform #19 payload 19/04/22 16:43:37 >> : -- transform #20 payload 19/04/22 16:43:37 >> : -- transform #21 payload 19/04/22 16:43:37 >> : -- transform #22 payload 19/04/22 16:43:37 >> : -- transform #23 payload 19/04/22 16:43:37 >> : -- transform #24 payload 19/04/22 16:43:37 >> : -- transform #25 payload 19/04/22 16:43:37 >> : -- transform #26 payload 19/04/22 16:43:37 >> : -- transform #27 payload 19/04/22 16:43:37 >> : -- transform #28 payload 19/04/22 16:43:37 >> : -- transform #29 payload 19/04/22 16:43:37 >> : -- transform #30 payload 19/04/22 16:43:37 >> : -- transform #31 payload 19/04/22 16:43:37 >> : -- transform #32 payload 19/04/22 16:43:37 >> : -- transform #33 payload 19/04/22 16:43:37 >> : -- transform #34 payload 19/04/22 16:43:37 >> : -- transform #35 payload 19/04/22 16:43:37 >> : -- transform #36 payload 19/04/22 16:43:37 >> : -- transform #37 payload 19/04/22 16:43:37 >> : -- transform #38 payload 19/04/22 16:43:37 >> : -- transform #39 payload 19/04/22 16:43:37 >> : -- transform #40 payload 19/04/22 16:43:37 >> : -- transform #41 payload 19/04/22 16:43:37 >> : -- transform #42 payload 19/04/22 16:43:37 >> : -- transform #43 payload 19/04/22 16:43:37 >> : -- transform #44 payload 19/04/22 16:43:37 >> : -- transform #45 payload 19/04/22 16:43:37 >> : nonce payload 19/04/22 16:43:37 >> : key exchange payload 19/04/22 16:43:37 >> : identification payload 19/04/22 16:43:37 >> : identification payload 19/04/22 16:43:37 == : phase2 hash_i ( input ) ( 1772 bytes ) 19/04/22 16:43:37 == : phase2 hash_i ( computed ) ( 20 bytes ) 19/04/22 16:43:37 == : new phase2 iv ( 8 bytes ) 19/04/22 16:43:37 >= : cookies cd6eecee11dbf4bf:86a82707d6d6521b 19/04/22 16:43:37 >= : message b36d8614 19/04/22 16:43:37 >= : encrypt iv ( 8 bytes ) 19/04/22 16:43:37 == : encrypt packet ( 1820 bytes ) 19/04/22 16:43:37 == : stored iv ( 8 bytes ) 19/04/22 16:43:37 -> : send NAT-T:IKE packet 192.168.1.12:4500 -> 62.217.96.231:4500 ( 1852 bytes ) 19/04/22 16:43:37 ii : fragmented packet to 1514 bytes ( MTU 1500 bytes ) 19/04/22 16:43:37 ii : fragmented packet to 386 bytes ( MTU 1500 bytes ) 19/04/22 16:43:37 DB : phase2 resend event scheduled ( ref count = 2 ) 19/04/22 16:43:37 DB : phase1 ref decrement ( ref count = 3, obj count = 1 ) 19/04/22 16:43:37 DB : phase2 ref decrement ( ref count = 1, obj count = 3 ) 19/04/22 16:43:37 ii : resend limit exceeded for phase2 exchange 19/04/22 16:43:37 ii : phase2 removal before expire time 19/04/22 16:43:37 DB : phase2 deleted ( obj count = 2 ) 19/04/22 16:43:37 DB : tunnel ref decrement ( ref count = 8, obj count = 1 ) 19/04/22 16:43:40 <- : recv NAT-T:IKE packet 62.217.96.231:4500 -> 192.168.1.12:4500 ( 180 bytes ) 19/04/22 16:43:40 DB : phase1 found 19/04/22 16:43:40 DB : phase1 ref increment ( ref count = 4, obj count = 1 ) 19/04/22 16:43:40 ii : processing config packet ( 180 bytes ) 19/04/22 16:43:40 DB : config found 19/04/22 16:43:40 DB : config ref increment ( ref count = 1, obj count = 1 ) 19/04/22 16:43:40 !! : config packet ignored ( config already mature ) 19/04/22 16:43:40 DB : config ref decrement ( ref count = 0, obj count = 1 ) 19/04/22 16:43:40 DB : phase1 ref decrement ( ref count = 3, obj count = 1 ) 19/04/22 16:43:41 ii : resend limit exceeded for phase2 exchange 19/04/22 16:43:41 ii : phase2 removal before expire time 19/04/22 16:43:41 DB : phase2 deleted ( obj count = 1 ) 19/04/22 16:43:41 DB : tunnel ref decrement ( ref count = 7, obj count = 1 ) 19/04/22 16:43:42 ii : fragmented packet to 1514 bytes ( MTU 1500 bytes ) 19/04/22 16:43:42 ii : fragmented packet to 386 bytes ( MTU 1500 bytes ) 19/04/22 16:43:42 -> : resend 1 phase2 packet(s) [0/2] 192.168.1.12:4500 -> 62.217.96.231:4500 19/04/22 16:43:46 DB : phase1 found 19/04/22 16:43:46 DB : phase1 ref increment ( ref count = 4, obj count = 1 ) 19/04/22 16:43:46 -> : send NAT-T:KEEP-ALIVE packet 192.168.1.12:4500 -> 62.217.96.231:4500 19/04/22 16:43:46 DB : phase1 ref decrement ( ref count = 3, obj count = 1 ) 19/04/22 16:43:46 DB : phase1 found 19/04/22 16:43:46 DB : phase1 ref increment ( ref count = 4, obj count = 1 ) 19/04/22 16:43:46 ii : next tunnel DPD retry in 4 secs for peer 62.217.96.231:4500 19/04/22 16:43:46 ii : sending peer DPDV1-R-U-THERE notification 19/04/22 16:43:46 ii : - 192.168.1.12:4500 -> 62.217.96.231:4500 19/04/22 16:43:46 ii : - isakmp spi = cd6eecee11dbf4bf:86a82707d6d6521b 19/04/22 16:43:46 ii : - data size 4 19/04/22 16:43:46 >> : hash payload 19/04/22 16:43:46 >> : notification payload 19/04/22 16:43:46 == : new informational hash ( 20 bytes ) 19/04/22 16:43:46 == : new informational iv ( 8 bytes ) 19/04/22 16:43:46 >= : cookies cd6eecee11dbf4bf:86a82707d6d6521b 19/04/22 16:43:46 >= : message 5896897e 19/04/22 16:43:46 >= : encrypt iv ( 8 bytes ) 19/04/22 16:43:46 == : encrypt packet ( 84 bytes ) 19/04/22 16:43:46 == : stored iv ( 8 bytes ) 19/04/22 16:43:46 -> : send NAT-T:IKE packet 192.168.1.12:4500 -> 62.217.96.231:4500 ( 116 bytes ) 19/04/22 16:43:46 ii : DPD ARE-YOU-THERE sequence 11c6269a requested 19/04/22 16:43:46 DB : phase1 ref decrement ( ref count = 3, obj count = 1 ) 19/04/22 16:43:47 ii : fragmented packet to 1514 bytes ( MTU 1500 bytes ) 19/04/22 16:43:47 ii : fragmented packet to 386 bytes ( MTU 1500 bytes ) 19/04/22 16:43:47 -> : resend 1 phase2 packet(s) [1/2] 192.168.1.12:4500 -> 62.217.96.231:4500 19/04/22 16:43:48 <- : recv NAT-T:IKE packet 62.217.96.231:4500 -> 192.168.1.12:4500 ( 84 bytes ) 19/04/22 16:43:48 DB : phase1 found 19/04/22 16:43:48 DB : phase1 ref increment ( ref count = 4, obj count = 1 ) 19/04/22 16:43:48 ii : processing informational packet ( 84 bytes ) 19/04/22 16:43:48 == : new informational iv ( 8 bytes ) 19/04/22 16:43:48 =< : cookies cd6eecee11dbf4bf:86a82707d6d6521b 19/04/22 16:43:48 =< : message 823db71f 19/04/22 16:43:48 =< : decrypt iv ( 8 bytes ) 19/04/22 16:43:48 == : decrypt packet ( 84 bytes ) 19/04/22 16:43:48 <= : trimmed packet padding ( 4 bytes ) 19/04/22 16:43:48 <= : stored iv ( 8 bytes ) 19/04/22 16:43:48 << : hash payload 19/04/22 16:43:48 << : delete payload 19/04/22 16:43:48 == : informational hash_i ( computed ) ( 20 bytes ) 19/04/22 16:43:48 == : informational hash_c ( received ) ( 20 bytes ) 19/04/22 16:43:48 ii : informational hash verified 19/04/22 16:43:48 ii : received peer DELETE message 19/04/22 16:43:48 ii : - 62.217.96.231:4500 -> 192.168.1.12:4500 19/04/22 16:43:48 ii : - isakmp spi = cd6eecee11dbf4bf:86a82707d6d6521b 19/04/22 16:43:48 DB : phase1 found 19/04/22 16:43:48 DB : phase1 ref increment ( ref count = 5, obj count = 1 ) 19/04/22 16:43:48 ii : cleanup, marked phase1 cd6eecee11dbf4bf:86a82707d6d6521b for removal 19/04/22 16:43:48 DB : phase1 soft event canceled ( ref count = 4 ) 19/04/22 16:43:48 DB : phase1 hard event canceled ( ref count = 3 ) 19/04/22 16:43:48 DB : phase1 dead event canceled ( ref count = 2 ) 19/04/22 16:43:48 DB : config ref increment ( ref count = 1, obj count = 1 ) 19/04/22 16:43:48 DB : config deleted ( obj count = 0 ) 19/04/22 16:43:48 DB : tunnel ref decrement ( ref count = 6, obj count = 1 ) 19/04/22 16:43:48 ii : phase1 removal before expire time 19/04/22 16:43:48 DB : phase1 not found 19/04/22 16:43:48 DB : phase1 ref decrement ( ref count = 1, obj count = 1 ) 19/04/22 16:43:48 DB : phase1 deleted ( obj count = 0 ) 19/04/22 16:43:48 DB : tunnel ref decrement ( ref count = 5, obj count = 1 ) 19/04/22 16:43:48 DB : policy found 19/04/22 16:43:48 DB : policy ref increment ( ref count = 1, obj count = 6 ) 19/04/22 16:43:48 ii : removing IPSEC INBOUND policy ANY:0.0.0.0/0:* -> ANY:172.16.1.2:* 19/04/22 16:43:48 K> : send pfkey X_SPDDELETE2 UNSPEC message 19/04/22 16:43:48 DB : policy ref decrement ( ref count = 0, obj count = 6 ) 19/04/22 16:43:48 DB : policy found 19/04/22 16:43:48 DB : policy ref increment ( ref count = 1, obj count = 6 ) 19/04/22 16:43:48 ii : removing IPSEC OUTBOUND policy ANY:172.16.1.2:* -> ANY:0.0.0.0/0:* 19/04/22 16:43:48 K> : send pfkey X_SPDDELETE2 UNSPEC message 19/04/22 16:43:48 DB : policy ref decrement ( ref count = 0, obj count = 6 ) 19/04/22 16:43:48 K< : recv pfkey X_SPDDELETE2 UNSPEC message 19/04/22 16:43:48 ii : removed IPSEC policy route for ANY:0.0.0.0/0:* 19/04/22 16:43:48 DB : policy found 19/04/22 16:43:48 DB : policy ref increment ( ref count = 1, obj count = 6 ) 19/04/22 16:43:48 ii : removing NONE INBOUND policy ANY:192.168.1.1:* -> ANY:172.16.1.2:* 19/04/22 16:43:48 K> : send pfkey X_SPDDELETE2 UNSPEC message 19/04/22 16:43:48 DB : policy ref decrement ( ref count = 0, obj count = 6 ) 19/04/22 16:43:48 DB : policy found 19/04/22 16:43:48 DB : policy ref increment ( ref count = 1, obj count = 6 ) 19/04/22 16:43:48 ii : removing NONE OUTBOUND policy ANY:172.16.1.2:* -> ANY:192.168.1.1:* 19/04/22 16:43:48 K> : send pfkey X_SPDDELETE2 UNSPEC message 19/04/22 16:43:48 DB : policy ref decrement ( ref count = 0, obj count = 6 ) 19/04/22 16:43:48 DB : policy found 19/04/22 16:43:48 DB : policy ref increment ( ref count = 1, obj count = 6 ) 19/04/22 16:43:48 ii : removing NONE INBOUND policy ANY:62.217.96.231:* -> ANY:192.168.1.12:* 19/04/22 16:43:48 K> : send pfkey X_SPDDELETE2 UNSPEC message 19/04/22 16:43:48 DB : policy ref decrement ( ref count = 0, obj count = 6 ) 19/04/22 16:43:48 DB : policy found 19/04/22 16:43:48 DB : policy ref increment ( ref count = 1, obj count = 6 ) 19/04/22 16:43:48 ii : removing NONE OUTBOUND policy ANY:192.168.1.12:* -> ANY:62.217.96.231:* 19/04/22 16:43:48 K> : send pfkey X_SPDDELETE2 UNSPEC message 19/04/22 16:43:48 DB : policy ref decrement ( ref count = 0, obj count = 6 ) 19/04/22 16:43:48 ii : removed NONE policy route for ANY:62.217.96.231:* 19/04/22 16:43:48 DB : policy found 19/04/22 16:43:48 DB : policy ref increment ( ref count = 1, obj count = 6 ) 19/04/22 16:43:48 DB : policy deleted ( obj count = 5 ) 19/04/22 16:43:48 K< : recv pfkey X_SPDDELETE2 UNSPEC message 19/04/22 16:43:48 DB : policy found 19/04/22 16:43:48 DB : policy ref increment ( ref count = 1, obj count = 5 ) 19/04/22 16:43:48 DB : policy deleted ( obj count = 4 ) 19/04/22 16:43:48 K< : recv pfkey X_SPDDELETE2 UNSPEC message 19/04/22 16:43:48 DB : policy found 19/04/22 16:43:48 DB : policy ref increment ( ref count = 1, obj count = 4 ) 19/04/22 16:43:48 DB : policy deleted ( obj count = 3 ) 19/04/22 16:43:48 K< : recv pfkey X_SPDDELETE2 UNSPEC message 19/04/22 16:43:48 DB : policy found 19/04/22 16:43:48 DB : policy ref increment ( ref count = 1, obj count = 3 ) 19/04/22 16:43:48 DB : policy deleted ( obj count = 2 ) 19/04/22 16:43:48 K< : recv pfkey X_SPDDELETE2 UNSPEC message 19/04/22 16:43:48 DB : policy found 19/04/22 16:43:48 DB : policy ref increment ( ref count = 1, obj count = 2 ) 19/04/22 16:43:48 DB : policy deleted ( obj count = 1 ) 19/04/22 16:43:48 K< : recv pfkey X_SPDDELETE2 UNSPEC message 19/04/22 16:43:48 DB : policy found 19/04/22 16:43:48 DB : policy ref increment ( ref count = 1, obj count = 1 ) 19/04/22 16:43:48 DB : policy deleted ( obj count = 0 ) 19/04/22 16:43:49 ii : disable adapter ROOT\VNET\0000 19/04/22 16:43:49 DB : tunnel dpd event canceled ( ref count = 4 ) 19/04/22 16:43:49 DB : tunnel natt event canceled ( ref count = 3 ) 19/04/22 16:43:49 DB : tunnel stats event canceled ( ref count = 2 ) 19/04/22 16:43:49 DB : removing tunnel config references 19/04/22 16:43:49 DB : removing tunnel phase2 references 19/04/22 16:43:49 DB : phase2 ref increment ( ref count = 2, obj count = 1 ) 19/04/22 16:43:49 DB : phase2 resend event canceled ( ref count = 1 ) 19/04/22 16:43:49 ii : phase2 removal before expire time 19/04/22 16:43:49 DB : phase2 deleted ( obj count = 0 ) 19/04/22 16:43:49 DB : tunnel ref decrement ( ref count = 1, obj count = 1 ) 19/04/22 16:43:49 DB : removing tunnel phase1 references 19/04/22 16:43:49 DB : tunnel deleted ( obj count = 0 ) 19/04/22 16:43:49 DB : peer ref decrement ( ref count = 1, obj count = 1 ) 19/04/22 16:43:49 DB : removing all peer tunnel references 19/04/22 16:43:49 DB : peer deleted ( obj count = 0 ) 19/04/22 16:43:49 ii : ipc client process thread exit ...
  10. Όχι,δεν έκανα κάτι ε τα άλλα γιατί μου φάνηκε δύσκολο το πώς. Μίλησα με τον υπεύθυνο αλλά ούτε καν υπάρχει περίπτωση να βρω άκρη. Τα logs ομως ειναι: 19/04/22 02:43:44 ## : IKE Daemon, ver 2.2.2 19/04/22 02:43:44 ## : Copyright 2013 Shrew Soft Inc. 19/04/22 02:43:44 ## : This product linked OpenSSL 1.0.1c 10 May 2012 19/04/22 02:43:44 ii : opened 'C:\Program Files\ShrewSoft\VPN Client\debug\iked.log' 19/04/22 02:43:44 ii : rebuilding vnet device list ... 19/04/22 02:43:44 ii : device ROOT\VNET\0000 disabled 19/04/22 02:43:44 ii : network process thread begin ... 19/04/22 02:43:44 ii : pfkey process thread begin ... 19/04/22 02:43:44 ii : ipc server process thread begin ... 19/04/22 02:44:13 ii : ipc client process thread begin ... 19/04/22 02:44:13 <A : peer config add message 19/04/22 02:44:13 <A : proposal config message 19/04/22 02:44:13 <A : proposal config message 19/04/22 02:44:13 <A : client config message 19/04/22 02:44:13 <A : xauth username message 19/04/22 02:44:13 <A : xauth password message 19/04/22 02:44:13 <A : local id 'vpn-clients' message 19/04/22 02:44:13 <A : preshared key message 19/04/22 02:44:13 <A : peer tunnel enable message 19/04/22 02:44:13 DB : peer ref increment ( ref count = 1, obj count = 0 ) 19/04/22 02:44:13 DB : peer added ( obj count = 1 ) 19/04/22 02:44:13 ii : local address 192.168.1.7 selected for peer 19/04/22 02:44:13 DB : peer ref increment ( ref count = 2, obj count = 1 ) 19/04/22 02:44:13 DB : tunnel ref increment ( ref count = 1, obj count = 0 ) 19/04/22 02:44:13 DB : tunnel added ( obj count = 1 ) 19/04/22 02:44:13 DB : tunnel ref increment ( ref count = 2, obj count = 1 ) 19/04/22 02:44:13 DB : new phase1 ( ISAKMP initiator ) 19/04/22 02:44:13 DB : exchange type is aggressive 19/04/22 02:44:13 DB : 192.168.1.7:500 <-> 62.217.96.231:500 19/04/22 02:44:13 DB : 42c46d696b4edc45:0000000000000000 19/04/22 02:44:13 DB : phase1 ref increment ( ref count = 1, obj count = 0 ) 19/04/22 02:44:13 DB : phase1 added ( obj count = 1 ) 19/04/22 02:44:13 >> : security association payload 19/04/22 02:44:13 >> : - proposal #1 payload 19/04/22 02:44:13 >> : -- transform #1 payload 19/04/22 02:44:13 >> : -- transform #2 payload 19/04/22 02:44:13 >> : -- transform #3 payload 19/04/22 02:44:13 >> : -- transform #4 payload 19/04/22 02:44:13 >> : -- transform #5 payload 19/04/22 02:44:13 >> : -- transform #6 payload 19/04/22 02:44:13 >> : -- transform #7 payload 19/04/22 02:44:13 >> : -- transform #8 payload 19/04/22 02:44:13 >> : -- transform #9 payload 19/04/22 02:44:13 >> : -- transform #10 payload 19/04/22 02:44:13 >> : -- transform #11 payload 19/04/22 02:44:13 >> : -- transform #12 payload 19/04/22 02:44:13 >> : -- transform #13 payload 19/04/22 02:44:13 >> : -- transform #14 payload 19/04/22 02:44:13 >> : -- transform #15 payload 19/04/22 02:44:13 >> : -- transform #16 payload 19/04/22 02:44:13 >> : -- transform #17 payload 19/04/22 02:44:13 >> : -- transform #18 payload 19/04/22 02:44:13 >> : key exchange payload 19/04/22 02:44:13 >> : nonce payload 19/04/22 02:44:13 >> : identification payload 19/04/22 02:44:13 >> : vendor id payload 19/04/22 02:44:13 ii : local supports XAUTH 19/04/22 02:44:13 >> : vendor id payload 19/04/22 02:44:13 ii : local supports nat-t ( draft v00 ) 19/04/22 02:44:13 >> : vendor id payload 19/04/22 02:44:13 ii : local supports nat-t ( draft v01 ) 19/04/22 02:44:13 >> : vendor id payload 19/04/22 02:44:13 ii : local supports nat-t ( draft v02 ) 19/04/22 02:44:13 >> : vendor id payload 19/04/22 02:44:13 ii : local supports nat-t ( draft v03 ) 19/04/22 02:44:13 >> : vendor id payload 19/04/22 02:44:13 ii : local supports nat-t ( rfc ) 19/04/22 02:44:13 >> : vendor id payload 19/04/22 02:44:13 ii : local supports FRAGMENTATION 19/04/22 02:44:13 >> : vendor id payload 19/04/22 02:44:13 >> : vendor id payload 19/04/22 02:44:13 ii : local supports DPDv1 19/04/22 02:44:13 >> : vendor id payload 19/04/22 02:44:13 ii : local is SHREW SOFT compatible 19/04/22 02:44:13 >> : vendor id payload 19/04/22 02:44:13 ii : local is NETSCREEN compatible 19/04/22 02:44:13 >> : vendor id payload 19/04/22 02:44:13 ii : local is SIDEWINDER compatible 19/04/22 02:44:13 >> : vendor id payload 19/04/22 02:44:13 ii : local is CISCO UNITY compatible 19/04/22 02:44:13 >= : cookies 42c46d696b4edc45:0000000000000000 19/04/22 02:44:13 >= : message 00000000 19/04/22 02:44:13 -> : send IKE packet 192.168.1.7:500 -> 62.217.96.231:500 ( 1207 bytes ) 19/04/22 02:44:13 DB : phase1 resend event scheduled ( ref count = 2 ) 19/04/22 02:44:13 DB : phase1 ref decrement ( ref count = 1, obj count = 1 ) 19/04/22 02:44:13 <- : recv IKE packet 62.217.96.231:500 -> 192.168.1.7:500 ( 440 bytes ) 19/04/22 02:44:13 DB : phase1 found 19/04/22 02:44:13 DB : phase1 ref increment ( ref count = 2, obj count = 1 ) 19/04/22 02:44:13 ii : processing phase1 packet ( 440 bytes ) 19/04/22 02:44:13 =< : cookies 42c46d696b4edc45:a204b73e2a3e5870 19/04/22 02:44:13 =< : message 00000000 19/04/22 02:44:13 << : security association payload 19/04/22 02:44:13 << : - propsal #1 payload 19/04/22 02:44:13 << : -- transform #14 payload 19/04/22 02:44:13 ii : unmatched isakmp proposal/transform 19/04/22 02:44:13 ii : cipher type ( 3des != aes ) 19/04/22 02:44:13 ii : unmatched isakmp proposal/transform 19/04/22 02:44:13 ii : cipher type ( 3des != aes ) 19/04/22 02:44:13 ii : unmatched isakmp proposal/transform 19/04/22 02:44:13 ii : cipher type ( 3des != aes ) 19/04/22 02:44:13 ii : unmatched isakmp proposal/transform 19/04/22 02:44:13 ii : cipher type ( 3des != aes ) 19/04/22 02:44:13 ii : unmatched isakmp proposal/transform 19/04/22 02:44:13 ii : cipher type ( 3des != aes ) 19/04/22 02:44:13 ii : unmatched isakmp proposal/transform 19/04/22 02:44:13 ii : cipher type ( 3des != aes ) 19/04/22 02:44:13 ii : unmatched isakmp proposal/transform 19/04/22 02:44:13 ii : cipher type ( 3des != blowfish ) 19/04/22 02:44:13 ii : unmatched isakmp proposal/transform 19/04/22 02:44:13 ii : cipher type ( 3des != blowfish ) 19/04/22 02:44:13 ii : unmatched isakmp proposal/transform 19/04/22 02:44:13 ii : cipher type ( 3des != blowfish ) 19/04/22 02:44:13 ii : unmatched isakmp proposal/transform 19/04/22 02:44:13 ii : cipher type ( 3des != blowfish ) 19/04/22 02:44:13 ii : unmatched isakmp proposal/transform 19/04/22 02:44:13 ii : cipher type ( 3des != blowfish ) 19/04/22 02:44:13 ii : unmatched isakmp proposal/transform 19/04/22 02:44:13 ii : cipher type ( 3des != blowfish ) 19/04/22 02:44:13 ii : unmatched isakmp proposal/transform 19/04/22 02:44:13 ii : hash type ( hmac-sha1 != hmac-md5 ) 19/04/22 02:44:13 ii : matched isakmp proposal #1 transform #14 19/04/22 02:44:13 ii : - transform = ike 19/04/22 02:44:13 ii : - cipher type = 3des 19/04/22 02:44:13 ii : - key length = default 19/04/22 02:44:13 ii : - hash type = sha1 19/04/22 02:44:13 ii : - dh group = group2 ( modp-1024 ) 19/04/22 02:44:13 ii : - auth type = xauth-initiator-psk 19/04/22 02:44:13 ii : - life seconds = 86400 19/04/22 02:44:13 ii : - life kbytes = 0 19/04/22 02:44:13 << : key exchange payload 19/04/22 02:44:13 << : nonce payload 19/04/22 02:44:13 << : identification payload 19/04/22 02:44:13 ii : phase1 id match ( natt prevents ip match ) 19/04/22 02:44:13 ii : received = ipv4-host 192.168.7.2 19/04/22 02:44:13 << : hash payload 19/04/22 02:44:13 << : vendor id payload 19/04/22 02:44:13 ii : peer is CISCO UNITY compatible 19/04/22 02:44:13 << : vendor id payload 19/04/22 02:44:13 ii : peer supports XAUTH 19/04/22 02:44:13 << : vendor id payload 19/04/22 02:44:13 ii : peer supports DPDv1 19/04/22 02:44:13 << : vendor id payload 19/04/22 02:44:13 ii : peer supports nat-t ( draft v02 ) 19/04/22 02:44:13 << : nat discovery payload 19/04/22 02:44:13 << : nat discovery payload 19/04/22 02:44:13 << : vendor id payload 19/04/22 02:44:13 ii : unknown vendor id ( 20 bytes ) 19/04/22 02:44:13 0x : 4048b7d5 6ebce885 25e7de7f 00d6c2d3 c0000000 19/04/22 02:44:13 << : vendor id payload 19/04/22 02:44:13 ii : unknown vendor id ( 16 bytes ) 19/04/22 02:44:13 0x : 1f07f70e aa6514d3 b0fa9654 2a500100 19/04/22 02:44:13 ii : nat discovery - local address is translated 19/04/22 02:44:13 ii : nat discovery - remote address is translated 19/04/22 02:44:13 ii : switching to src nat-t udp port 4500 19/04/22 02:44:13 ii : switching to dst nat-t udp port 4500 19/04/22 02:44:13 == : DH shared secret ( 128 bytes ) 19/04/22 02:44:13 == : SETKEYID ( 20 bytes ) 19/04/22 02:44:13 == : SETKEYID_d ( 20 bytes ) 19/04/22 02:44:13 == : SETKEYID_a ( 20 bytes ) 19/04/22 02:44:13 == : SETKEYID_e ( 20 bytes ) 19/04/22 02:44:13 == : cipher key ( 40 bytes ) 19/04/22 02:44:13 == : cipher iv ( 8 bytes ) 19/04/22 02:44:13 == : phase1 hash_i ( computed ) ( 20 bytes ) 19/04/22 02:44:13 >> : hash payload 19/04/22 02:44:13 >> : nat discovery payload 19/04/22 02:44:13 >> : nat discovery payload 19/04/22 02:44:13 >= : cookies 42c46d696b4edc45:a204b73e2a3e5870 19/04/22 02:44:13 >= : message 00000000 19/04/22 02:44:13 >= : encrypt iv ( 8 bytes ) 19/04/22 02:44:13 == : encrypt packet ( 100 bytes ) 19/04/22 02:44:13 == : stored iv ( 8 bytes ) 19/04/22 02:44:13 DB : phase1 resend event canceled ( ref count = 1 ) 19/04/22 02:44:13 -> : send NAT-T:IKE packet 192.168.1.7:4500 -> 62.217.96.231:4500 ( 132 bytes ) 19/04/22 02:44:13 == : phase1 hash_r ( computed ) ( 20 bytes ) 19/04/22 02:44:13 == : phase1 hash_r ( received ) ( 20 bytes ) 19/04/22 02:44:13 ii : phase1 sa established 19/04/22 02:44:13 ii : 62.217.96.231:4500 <-> 192.168.1.7:4500 19/04/22 02:44:13 ii : 42c46d696b4edc45:a204b73e2a3e5870 19/04/22 02:44:13 ii : sending peer INITIAL-CONTACT notification 19/04/22 02:44:13 ii : - 192.168.1.7:4500 -> 62.217.96.231:4500 19/04/22 02:44:13 ii : - isakmp spi = 42c46d696b4edc45:a204b73e2a3e5870 19/04/22 02:44:13 ii : - data size 0 19/04/22 02:44:13 >> : hash payload 19/04/22 02:44:13 >> : notification payload 19/04/22 02:44:13 == : new informational hash ( 20 bytes ) 19/04/22 02:44:13 == : new informational iv ( 8 bytes ) 19/04/22 02:44:13 >= : cookies 42c46d696b4edc45:a204b73e2a3e5870 19/04/22 02:44:13 >= : message da5301ce 19/04/22 02:44:13 >= : encrypt iv ( 8 bytes ) 19/04/22 02:44:13 == : encrypt packet ( 80 bytes ) 19/04/22 02:44:13 == : stored iv ( 8 bytes ) 19/04/22 02:44:13 -> : send NAT-T:IKE packet 192.168.1.7:4500 -> 62.217.96.231:4500 ( 116 bytes ) 19/04/22 02:44:13 DB : tunnel ref increment ( ref count = 3, obj count = 1 ) 19/04/22 02:44:13 DB : tunnel ref increment ( ref count = 4, obj count = 1 ) 19/04/22 02:44:13 DB : phase1 ref increment ( ref count = 2, obj count = 1 ) 19/04/22 02:44:13 DB : phase1 ref increment ( ref count = 3, obj count = 1 ) 19/04/22 02:44:13 DB : phase1 ref increment ( ref count = 4, obj count = 1 ) 19/04/22 02:44:13 DB : phase2 not found 19/04/22 02:44:13 DB : phase1 ref decrement ( ref count = 3, obj count = 1 ) 19/04/22 02:44:14 <- : recv NAT-T:IKE packet 62.217.96.231:4500 -> 192.168.1.7:4500 ( 76 bytes ) 19/04/22 02:44:14 DB : phase1 found 19/04/22 02:44:14 DB : phase1 ref increment ( ref count = 4, obj count = 1 ) 19/04/22 02:44:14 ii : processing config packet ( 76 bytes ) 19/04/22 02:44:14 DB : config not found 19/04/22 02:44:14 DB : tunnel ref increment ( ref count = 5, obj count = 1 ) 19/04/22 02:44:14 DB : config ref increment ( ref count = 1, obj count = 0 ) 19/04/22 02:44:14 DB : config added ( obj count = 1 ) 19/04/22 02:44:14 == : new config iv ( 8 bytes ) 19/04/22 02:44:14 =< : cookies 42c46d696b4edc45:a204b73e2a3e5870 19/04/22 02:44:14 =< : message 8f207370 19/04/22 02:44:14 =< : decrypt iv ( 8 bytes ) 19/04/22 02:44:14 == : decrypt packet ( 76 bytes ) 19/04/22 02:44:14 <= : trimmed packet padding ( 4 bytes ) 19/04/22 02:44:14 <= : stored iv ( 8 bytes ) 19/04/22 02:44:14 << : hash payload 19/04/22 02:44:14 << : attribute payload 19/04/22 02:44:14 == : configure hash_i ( computed ) ( 20 bytes ) 19/04/22 02:44:14 == : configure hash_c ( computed ) ( 20 bytes ) 19/04/22 02:44:14 ii : configure hash verified 19/04/22 02:44:14 ii : - xauth authentication type 19/04/22 02:44:14 ii : - xauth username 19/04/22 02:44:14 ii : - xauth password 19/04/22 02:44:14 ii : received basic xauth request - 19/04/22 02:44:14 ii : - standard xauth username 19/04/22 02:44:14 ii : - standard xauth password 19/04/22 02:44:14 ii : sending xauth response for monitor 19/04/22 02:44:14 >> : hash payload 19/04/22 02:44:14 >> : attribute payload 19/04/22 02:44:14 == : new configure hash ( 20 bytes ) 19/04/22 02:44:14 >= : cookies 42c46d696b4edc45:a204b73e2a3e5870 19/04/22 02:44:14 >= : message 8f207370 19/04/22 02:44:14 >= : encrypt iv ( 8 bytes ) 19/04/22 02:44:14 == : encrypt packet ( 85 bytes ) 19/04/22 02:44:14 == : stored iv ( 8 bytes ) 19/04/22 02:44:14 -> : send NAT-T:IKE packet 192.168.1.7:4500 -> 62.217.96.231:4500 ( 124 bytes ) 19/04/22 02:44:14 DB : config resend event scheduled ( ref count = 2 ) 19/04/22 02:44:14 DB : config ref decrement ( ref count = 1, obj count = 1 ) 19/04/22 02:44:14 DB : phase1 ref decrement ( ref count = 3, obj count = 1 ) 19/04/22 02:44:14 <- : recv NAT-T:IKE packet 62.217.96.231:4500 -> 192.168.1.7:4500 ( 76 bytes ) 19/04/22 02:44:14 DB : phase1 found 19/04/22 02:44:14 DB : phase1 ref increment ( ref count = 4, obj count = 1 ) 19/04/22 02:44:14 ii : processing config packet ( 76 bytes ) 19/04/22 02:44:14 DB : config found 19/04/22 02:44:14 DB : config ref increment ( ref count = 2, obj count = 1 ) 19/04/22 02:44:14 == : new config iv ( 8 bytes ) 19/04/22 02:44:14 =< : cookies 42c46d696b4edc45:a204b73e2a3e5870 19/04/22 02:44:14 =< : message e2737ae6 19/04/22 02:44:14 =< : decrypt iv ( 8 bytes ) 19/04/22 02:44:14 == : decrypt packet ( 76 bytes ) 19/04/22 02:44:14 <= : trimmed packet padding ( 4 bytes ) 19/04/22 02:44:14 <= : stored iv ( 8 bytes ) 19/04/22 02:44:14 << : hash payload 19/04/22 02:44:14 << : attribute payload 19/04/22 02:44:14 == : configure hash_i ( computed ) ( 20 bytes ) 19/04/22 02:44:14 == : configure hash_c ( computed ) ( 20 bytes ) 19/04/22 02:44:14 ii : configure hash verified 19/04/22 02:44:14 !! : duplicate xauth request, authentication failed 19/04/22 02:44:14 DB : config ref decrement ( ref count = 1, obj count = 1 ) 19/04/22 02:44:14 DB : phase1 soft event canceled ( ref count = 3 ) 19/04/22 02:44:14 DB : phase1 hard event canceled ( ref count = 2 ) 19/04/22 02:44:14 DB : phase1 dead event canceled ( ref count = 1 ) 19/04/22 02:44:14 ii : sending peer DELETE message 19/04/22 02:44:14 ii : - 192.168.1.7:4500 -> 62.217.96.231:4500 19/04/22 02:44:14 ii : - isakmp spi = 42c46d696b4edc45:a204b73e2a3e5870 19/04/22 02:44:14 ii : - data size 0 19/04/22 02:44:14 >> : hash payload 19/04/22 02:44:14 >> : delete payload 19/04/22 02:44:14 == : new informational hash ( 20 bytes ) 19/04/22 02:44:14 == : new informational iv ( 8 bytes ) 19/04/22 02:44:14 >= : cookies 42c46d696b4edc45:a204b73e2a3e5870 19/04/22 02:44:14 >= : message fc2f6523 19/04/22 02:44:14 >= : encrypt iv ( 8 bytes ) 19/04/22 02:44:14 == : encrypt packet ( 80 bytes ) 19/04/22 02:44:14 == : stored iv ( 8 bytes ) 19/04/22 02:44:14 -> : send NAT-T:IKE packet 192.168.1.7:4500 -> 62.217.96.231:4500 ( 116 bytes ) 19/04/22 02:44:14 DB : config ref increment ( ref count = 2, obj count = 1 ) 19/04/22 02:44:14 DB : config resend event canceled ( ref count = 1 ) 19/04/22 02:44:14 DB : config deleted ( obj count = 0 ) 19/04/22 02:44:14 DB : tunnel ref decrement ( ref count = 4, obj count = 1 ) 19/04/22 02:44:14 ii : phase1 removal before expire time 19/04/22 02:44:14 DB : phase1 deleted ( obj count = 0 ) 19/04/22 02:44:14 DB : tunnel ref decrement ( ref count = 3, obj count = 1 ) 19/04/22 02:44:14 DB : policy not found 19/04/22 02:44:14 DB : policy not found 19/04/22 02:44:14 DB : policy not found 19/04/22 02:44:14 DB : policy not found 19/04/22 02:44:14 ii : removing IPsec over DHCP policies 19/04/22 02:44:14 DB : policy not found 19/04/22 02:44:14 DB : policy not found 19/04/22 02:44:14 DB : tunnel dpd event canceled ( ref count = 2 ) 19/04/22 02:44:14 DB : tunnel natt event canceled ( ref count = 1 ) 19/04/22 02:44:14 DB : removing tunnel config references 19/04/22 02:44:14 DB : removing tunnel phase2 references 19/04/22 02:44:14 DB : removing tunnel phase1 references 19/04/22 02:44:14 DB : tunnel deleted ( obj count = 0 ) 19/04/22 02:44:14 DB : peer ref decrement ( ref count = 1, obj count = 1 ) 19/04/22 02:44:14 DB : removing all peer tunnel references 19/04/22 02:44:14 DB : peer deleted ( obj count = 0 ) 19/04/22 02:44:14 ii : ipc client process thread exit ... 19/04/22 02:47:17 ii : hard halt signal received, shutting down 19/04/22 02:47:17 ii : network process thread exit ... 19/04/22 02:47:17 ii : pfkey process thread exit ... 19/04/22 02:47:17 ii : ipc server process thread exit ...
  11. attached to key daemon ... peer configured iskamp proposal configured esp proposal configured client configured local id configured remote id configured pre-shared key configured bringing up tunnel ... no dhcp response from gateway tunnel disabled detached from key daemonattached to key daemon ... peer configured iskamp proposal configured esp proposal configured client configured local id configured remote id configured pre-shared key configured bringing up tunnel ... no dhcp response from gateway tunnel disabled detached from key daemonattached to key daemon ... peer configured iskamp proposal configured esp proposal configured client configured local id configured remote id configured pre-shared key configured bringing up tunnel ... no dhcp response from gateway tunnel disabled detached from key daemonattached to key daemon ... peer configured iskamp proposal configured esp proposal configured client configured local id configured remote id configured pre-shared key configured bringing up tunnel ... no dhcp response from gateway tunnel disabled detached from key daemon
  12. Τώρα από σου πω ότι μου ακούγονται κινέζικα? Δεν έχω τόσο ειδικές γνώσεις. Αν θες γίνε πιο συγκεκριμένος σε παρακαλώ κι ευχαριστώ φυσικά για τη βοήθεια
  13. Μετά από εγκατάσταση του screw soft κι έπειτα κάνοντας import το file με τις έτοιμες ρυθμίσεις προσπάθησα να συνδεθώ με το vpn της σχολής στην οποία φοιτώ. Μου δείχνει ότι με συνδέει, προσπαθώ να μπω αλλά δεν ανοίγει καμία σελίδα, με αποσυνδέει και με συνδέει ξανά συνεχώς κάνοντας το ίδιο πράγμα. Επικοινώνησα με το τμήμα της σχολής και συγκεκριμένα με τον υπεύθυνο για το vpn και με ενημέωρσε πως αν ο πάροχος μου είναι wind ή cyta πιθανότατα δεν θα καταφέρω να συνδεθώ, μιας και είχαν κι άλλοι παρόμοιο θέμα. Εν συνεχεία επικοινώνησα με τη wind η οποία μου είπε ότι δεν υπάρχει θέμα από αυτούς για το vpn. Με λίγα λόγια κανείς δεν ξέρει. Απενεργοποίησα το firewall (windows defender) αλλά τζίφος. Μπορώ να κάνω κάτι; Στο ρούτερ ας πούμε.
  14. Σε ευχαριστώ πολύ για την απάντησή σου. Έβαλα την παραγγελία και σε λίγες μέρες που θα παραλάβω θα τις δω. Έκανα την πιο συμφέρουσα για εμένα επιλογή. Πήρα το κ2 καταγραφικό και τις κάμερες που προανέφερα. Τουλάχιστον αν δεν είναι καλές αργότερα που θα έχω την οικονομική δυνατότητα να τις αλλάζω σιγά-σιγά.
  15. https://www.e-shop.gr/hikvision-ds-2ce16h0t-itf28-5-mp-bullet-camera-p-PER.993375 https://www.e-shop.gr/hikvision-ds-2ce56h0t-itmf28-5-mp-turret-camera-p-PER.993399 Κοιτάω αποκλειστικά hikvision διότι θεωρείται αξιόπιστη. Τι άποψη έχεις?
  • Δημιουργία νέου...