Цитата: Как ни странно, все лежит в той директории, куда он установлен.
Я ставил из исходников, конфигов я там не нашел. в etc/ тоже.
Цитата: и сильно проигрывает
по производительности режиму локального бриджа,
работающему в контексте ядра системы
А можно ссылку на инструкцию(желательно на русском), как настроить этот самый локальный бридж с учетом особенностей моего линуха.
Не коннектит скорее всего потому,что у меня не хватает модулей к iptables. А ядро пересобирать на этой железке я не умею.
Может прояснит ситуацию лог подключения
Код: 2016-06-05 22:40:21.201 IPsec Client 4 (192.168.0.20:500 -> 192.168.0.10:500): A new IPsec client is created.
2016-06-05 22:40:21.201 IPsec IKE Session (IKE SA) 4 (Client: 4) (192.168.0.20:500 -> 192.168.0.10:500): A new IKE SA (Main Mode) is created. Initiator Cookie: 0xCB4D49CE45F291D9, Responder Cookie: 0xD0A14297EBB3C327, DH Group: MODP 1024 (Group 2), Hash Algorithm: SHA-1, Cipher Algorithm: 3DES-CBC, Cipher Key Size: 192 bits, Lifetime: 4294967295 Kbytes or 28800 seconds
2016-06-05 22:40:21.301 IPsec Client 4 (192.168.0.20:4500 -> 192.168.0.10:4500): The port number information of this client is updated.
2016-06-05 22:40:21.301 IPsec Client 4 (192.168.0.20:4500 -> 192.168.0.10:4500):
2016-06-05 22:40:21.301 IPsec IKE Session (IKE SA) 4 (Client: 4) (192.168.0.20:4500 -> 192.168.0.10:4500): This IKE SA is established between the server and the client.
2016-06-05 22:40:21.321 IPsec IKE Session (IKE SA) 4 (Client: 4) (192.168.0.20:4500 -> 192.168.0.10:4500): The client initiates a QuickMode negotiation.
2016-06-05 22:40:21.321 IPsec ESP Session (IPsec SA) 5 (Client: 4) (192.168.0.20:4500 -> 192.168.0.10:4500): A new IPsec SA (Direction: Client -> Server) is created. SPI: 0x37493337, DH Group: (null), Hash Algorithm: SHA-1, Cipher Algorithm: AES-CBC, Cipher Key Size: 256 bits, Lifetime: 250000 Kbytes or 3600 seconds
2016-06-05 22:40:21.321 IPsec ESP Session (IPsec SA) 5 (Client: 4) (192.168.0.20:4500 -> 192.168.0.10:4500): A new IPsec SA (Direction: Server -> Client) is created. SPI: 0x46654DE0, DH Group: (null), Hash Algorithm: SHA-1, Cipher Algorithm: AES-CBC, Cipher Key Size: 256 bits, Lifetime: 250000 Kbytes or 3600 seconds
2016-06-05 22:40:21.341 IPsec ESP Session (IPsec SA) 5 (Client: 4) (192.168.0.20:4500 -> 192.168.0.10:4500): This IPsec SA is established between the server and the client.
2016-06-05 22:40:21.341 IPsec Client 4 (192.168.0.20:4500 -> 192.168.0.10:4500): The L2TP Server Module is started.
2016-06-05 22:40:21.361 L2TP PPP Session [192.168.0.20:1701]: A new PPP session (Upper protocol: L2TP) is started. IP Address of PPP Client: 192.168.0.20 (Hostname: "Anton"), Port Number of PPP Client: 1701, IP Address of PPP Server: 192.168.0.10, Port Number of PPP Server: 1701, Client Software Name: "L2TP VPN Client - Microsoft", IPv4 TCP MSS (Max Segment Size): 1314 bytes
2016-06-05 22:40:21.361 On the TCP Listener (Port 0), a Client (IP address 192.168.0.20, Host name "192.168.0.20", Port number 1701) has connected.
2016-06-05 22:40:21.361 For the client (IP address: 192.168.0.20, host name: "192.168.0.20", port number: 1701), connection "CID-4" has been created.
2016-06-05 22:40:21.361 SSL communication for connection "CID-4" has been started. The encryption algorithm name is "(null)".
2016-06-05 22:40:21.381 [HUB "vpn"] The connection "CID-4" (IP address: 192.168.0.20, Host name: 192.168.0.20, Port number: 1701, Client name: "L2TP VPN Client - Microsoft", Version: 4.21, Build: 9613) is attempting to connect to the Virtual Hub. The auth type provided is "External server authentication" and the user name is "user".
2016-06-05 22:40:21.401 [HUB "vpn"] Connection "CID-4": Successfully authenticated as user "user".
2016-06-05 22:40:21.401 [HUB "vpn"] Connection "CID-4": The new session "SID-USER-[L2TP]-5" has been created. (IP address: 192.168.0.20, Port number: 1701, Physical underlying protocol: "Legacy VPN - L2TP")
2016-06-05 22:40:21.401 [HUB "vpn"] Session "SID-USER-[L2TP]-5": The parameter has been set. Max number of TCP connections: 1, Use of encryption: Yes, Use of compression: No, Use of Half duplex communication: No, Timeout: 20 seconds.
2016-06-05 22:40:21.421 [HUB "vpn"] Session "SID-USER-[L2TP]-5": VPN Client details: (Client product name: "L2TP VPN Client - Microsoft", Client version: 421, Client build number: 9613, Server product name: "SoftEther VPN Server (32 bit) (Open Source)", Server version: 421, Server build number: 9613, Client OS name: "L2TP VPN Client - Microsoft", Client OS version: "-", Client product ID: "-", Client host name: "Anton", Client IP address: "192.168.0.20", Client port number: 1701, Server host name: "192.168.0.10", Server IP address: "192.168.0.10", Server port number: 1701, Proxy host name: "", Proxy IP address: "0.0.0.0", Proxy port number: 0, Virtual Hub name: "vpn", Client unique ID: "70462DBB7476AFF6E004620EC6381647")
2016-06-05 22:40:21.421 L2TP PPP Session [192.168.0.20:1701]: Trying to request an IP address from the DHCP server.
2016-06-05 22:40:26.421 L2TP PPP Session [192.168.0.20:1701]: Acquiring an IP address from the DHCP server failed. To accept a PPP session, you need to have a DHCP server. Make sure that a DHCP server is working normally in the Ethernet segment which the Virtual Hub belongs to. If you do not have a DHCP server, you can use the Virtual DHCP function of the SecureNAT on the Virtual Hub instead.
2016-06-05 22:40:34.361 IPsec ESP Session (IPsec SA) 5 (Client: 4) (192.168.0.20:4500 -> 192.168.0.10:4500): This IPsec SA is deleted.
2016-06-05 22:40:34.381 IPsec IKE Session (IKE SA) 4 (Client: 4) (192.168.0.20:4500 -> 192.168.0.10:4500): The server initiates a QuickMode negotiation.
2016-06-05 22:40:34.381 IPsec ESP Session (IPsec SA) 6 (Client: 4) (192.168.0.20:4500 -> 192.168.0.10:4500): A new IPsec SA (Direction: Client -> Server) is created. SPI: 0x62A7C065, DH Group: (null), Hash Algorithm: SHA-1, Cipher Algorithm: AES-CBC, Cipher Key Size: 256 bits, Lifetime: 250000 Kbytes or 3600 seconds
2016-06-05 22:40:34.381 IPsec ESP Session (IPsec SA) 6 (Client: 4) (192.168.0.20:4500 -> 192.168.0.10:4500): A new IPsec SA (Direction: Server -> Client) is created. SPI: 0x0, DH Group: (null), Hash Algorithm: SHA-1, Cipher Algorithm: AES-CBC, Cipher Key Size: 256 bits, Lifetime: 250000 Kbytes or 3600 seconds
2016-06-05 22:40:34.381 IPsec IKE Session (IKE SA) 4 (Client: 4) (192.168.0.20:4500 -> 192.168.0.10:4500): This IKE SA is deleted.
2016-06-05 22:40:34.381 IPsec ESP Session (IPsec SA) 5 (Client: 4) (192.168.0.20:4500 -> 192.168.0.10:4500): This IPsec SA is deleted.
2016-06-05 22:40:34.381 IPsec ESP Session (IPsec SA) 6 (Client: 4) (192.168.0.20:4500 -> 192.168.0.10:4500): This IPsec SA is deleted.
2016-06-05 22:40:34.381 IPsec ESP Session (IPsec SA) 6 (Client: 4) (192.168.0.20:4500 -> 192.168.0.10:4500): This IPsec SA is deleted.
2016-06-05 22:40:34.461 L2TP PPP Session [192.168.0.20:1701]: The VPN Client sent a packet though an IP address of the VPN Client hasn't been determined.
2016-06-05 22:40:34.461 L2TP PPP Session [192.168.0.20:1701]: A PPP protocol error occurred, or the PPP session has been disconnected.
2016-06-05 22:40:34.721 [HUB "vpn"] Session "SID-USER-[L2TP]-5": The session has been terminated. The statistical information is as follows: Total outgoing data size: 0 bytes, Total incoming data size: 1304 bytes.
2016-06-05 22:40:34.761 Connection "CID-4" terminated by the cause "The VPN session has been deleted. It is possible that either the administrator disconnected the session or the connection from the client to the VPN Server has been disconnected." (code 11).
2016-06-05 22:40:34.761 Connection "CID-4" has been terminated.
2016-06-05 22:40:34.761 The connection with the client (IP address 192.168.0.20, Port number 1701) has been disconnected.
2016-06-05 22:40:45.181 IPsec Client 4 (192.168.0.20:4500 -> 192.168.0.10:4500): This IPsec Client is deleted.