So here are the differences between my working ipsec.conf and the generated ipsec.conf:
config setup
protostack=netkey
nat_traversal=yes
virtual_private=%v4:10.0.0.0/8,%v4:192.168.0.0/16,%v4:172.16.0.0/12,%v4:!192.168.177.0/24
oe=off
conn my_ipsec-tunnel
authby=secre
#compress=no
#dpdaction=hold
left=%defaultroute
leftid=@FQDN OF NS
leftnexthop=%defaultroute
leftsourceip=192.168.177.21
leftsubnets={ 192.168.177.0/24 }
#pfs=yes
right=%any
rightid=@FQDN OF FRITZBOX
rightsubnets={ 192.168.179.0/24 }
ike=aes256-sha1;modp1024
phase2=esp
phase2alg=aes256-sha1;modp1024
I marked every change to the generated config as strong words.
Here´s the fritzbox config and things i changed to make it work after generate by AVM VPN tool:
vpncfg {
connections {
enabled = yes;
conn_type = conntype_lan;
name = “FQDN OF NS”;
always_renew = yes;
reject_not_encrypted = no;
dont_filter_netbios = yes;
localip = 0.0.0.0;
local_virtualip = 0.0.0.0;
remoteip = 0.0.0.0;
remote_virtualip = 0.0.0.0;
remotehostname = “FQDN OF NS”;
localid {
fqdn = “FQDN OF FRITZBOX”;
}
remoteid {
ipaddr = “FQDN OF NS”;
}
mode = phase1_mode_aggressive;
phase1ss = “all/all/all”;
keytype = connkeytype_pre_shared;
key = “SECRETKEY”;
cert_do_server_auth = no;
use_nat_t = yes;
use_xauth = yes;
use_cfgmode = no;
phase2localid {
ipnet {
ipaddr = 192.168.179.0;
mask = 255.255.255.0;
}
}
phase2remoteid {
ipnet {
ipaddr = 192.168.177.0;
mask = 255.255.255.0;
}
}
phase2ss = “esp-aes256-3des-sha/ah-all-sha/comp-lzs-no/pfs”;
accesslist = “permit ip any 192.168.177.0 255.255.255.0”;
}
ike_forward_rules = “udp 0.0.0.0:500 0.0.0.0:500”,
“udp 0.0.0.0:4500 0.0.0.0:4500”;
}
// EOF
If there are still questions i can also upload my config files.