This widget could not be displayed.
This widget could not be displayed.
cancel
Showing results for 
Search instead for 
Did you mean: 

RT-BE88U - Instant Guard - no more traffic

HeadCrash
Star II

Hello everyone,

I'm using a MESH network consisting of three RT-BE88U routers. Since I updated the routers to the latest firmware: 3.0.0.6.102_39112-g7a02961_1472-g67069_BB0B, I've noticed that my clients, which connect via Instant Guard (VPN Connection), no longer have any data throughput.
Can anyone else observe the same issue or help me with this?

This is an excerpt from the Instant Guard log.

Nov  7 13:28:27 08[NET] received packet: from XXX.XXX.XXX.XXX[500] to XXX.XXX.XXX.XXX[500] (432 bytes)

Nov  7 13:28:27 08[ENC] parsed IKE_SA_INIT request 0 [ SA KE No N(REDIR_SUP) N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) ]

Nov  7 13:28:27 08[IKE] XXX.XXX.XXX.XXX is initiating an IKE_SA

Nov  7 13:28:27 08[CFG] selected proposal: IKE:AES_CBC_256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_2048

Nov  7 13:28:27 08[IKE] local host is behind NAT, sending keep alives

Nov  7 13:28:27 08[IKE] remote host is behind NAT

Nov  7 13:28:27 08[IKE] sending cert request for "C=TW, O=ASUS, CN=ASUS RT-BE88U-A4C8 Root CA"

Nov  7 13:28:27 08[ENC] generating IKE_SA_INIT response 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) CERTREQ N(FRAG_SUP) N(CHDLESS_SUP) N(MULT_AUTH) V ]

Nov  7 13:28:27 08[NET] sending packet: from XXX.XXX.XXX.XXX[500] to XXX.XXX.XXX.XXX[500] (501 bytes)

Nov  7 13:28:27 06[NET] received packet: from XXX.XXX.XXX.XXX[26058] to XXX.XXX.XXX.XXX[4500] (352 bytes)

Nov  7 13:28:27 06[ENC] unknown attribute type INTERNAL_DNS_DOMAIN

Nov  7 13:28:27 06[ENC] parsed IKE_AUTH request 1 [ IDi N(INIT_CONTACT) CPRQ(ADDR MASK DHCP DNS ADDR6 DHCP6 DNS6 DOMAIN) N(ESP_TFC_PAD_N) N(NON_FIRST_FRAG) SA TSi TSr N(EAP_ONLY) ]

Nov  7 13:28:27 06[CFG] looking for peer configs matching XXX.XXX.XXX.XXX[%any]...XXX.XXX.XXX.XXX[F75780949A8F4A62A83EEB328CB2C217]

Nov  7 13:28:27 06[CFG] selected peer config 'Host-to-Netv2'

Nov  7 13:28:27 06[IKE] initiating EAP_IDENTITY method (id 0x00)

Nov  7 13:28:27 06[IKE] received ESP_TFC_PADDING_NOT_SUPPORTED, not using ESPv3 TFC padding

Nov  7 13:28:27 06[IKE] authentication of 'DNS-NAME.org' (myself) with RSA signature successful

Nov  7 13:28:27 06[IKE] sending end entity cert "C=TW, O=ASUS, CN=DNS-NAME.org"

Nov  7 13:28:27 06[ENC] generating IKE_AUTH response 1 [ IDr CERT AUTH EAP/REQ/ID ]

Nov  7 13:28:27 06[NET] sending packet: from XXX.XXX.XXX.XXX[4500] to XXX.XXX.XXX.XXX[26058] (1232 bytes)

Nov  7 13:28:27 07[NET] received packet: from XXX.XXX.XXX.XXX[26058] to XXX.XXX.XXX.XXX[4500] (112 bytes)

Nov  7 13:28:27 07[ENC] parsed IKE_AUTH request 2 [ EAP/RES/ID ]

Nov  7 13:28:27 07[IKE] received EAP identity 'F75780949A8F4A62A83EEB328CB2C217'

Nov  7 13:28:27 07[IKE] initiating EAP_MSCHAPV2 method (id 0x20)

Nov  7 13:28:27 07[ENC] generating IKE_AUTH response 2 [ EAP/REQ/MSCHAPV2 ]

Nov  7 13:28:27 07[NET] sending packet: from XXX.XXX.XXX.XXX[4500] to XXX.XXX.XXX.XXX[26058] (112 bytes)

Nov  7 13:28:27 05[NET] received packet: from XXX.XXX.XXX.XXX[26058] to XXX.XXX.XXX.XXX[4500] (160 bytes)

Nov  7 13:28:27 05[ENC] parsed IKE_AUTH request 3 [ EAP/RES/MSCHAPV2 ]

Nov  7 13:28:27 05[ENC] generating IKE_AUTH response 3 [ EAP/REQ/MSCHAPV2 ]

Nov  7 13:28:27 05[NET] sending packet: from XXX.XXX.XXX.XXX[4500] to XXX.XXX.XXX.XXX[26058] (144 bytes)

Nov  7 13:28:27 08[NET] received packet: from XXX.XXX.XXX.XXX[26058] to XXX.XXX.XXX.XXX[4500] (80 bytes)

Nov  7 13:28:27 08[ENC] parsed IKE_AUTH request 4 [ EAP/RES/MSCHAPV2 ]

Nov  7 13:28:27 08[IKE] EAP method EAP_MSCHAPV2 succeeded, MSK established

Nov  7 13:28:27 08[ENC] generating IKE_AUTH response 4 [ EAP/SUCC ]

Nov  7 13:28:27 08[NET] sending packet: from XXX.XXX.XXX.XXX[4500] to XXX.XXX.XXX.XXX[26058] (80 bytes)

Nov  7 13:28:27 06[NET] received packet: from XXX.XXX.XXX.XXX[26058] to XXX.XXX.XXX.XXX[4500] (112 bytes)

Nov  7 13:28:27 06[ENC] parsed IKE_AUTH request 5 [ AUTH ]

Nov  7 13:28:27 06[IKE] authentication of 'F75780949A8F4A62A83EEB328CB2C217' with EAP successful

Nov  7 13:28:27 06[IKE] authentication of 'DNS-NAME.org' (myself) with EAP

Nov  7 13:28:27 06[IKE] peer requested virtual IP %any

Nov  7 13:28:27 06[CFG] reassigning offline lease to 'F75780949A8F4A62A83EEB328CB2C217'

Nov  7 13:28:27 06[IKE] assigning virtual IP 10.10.10.1 to peer 'F75780949A8F4A62A83EEB328CB2C217'

Nov  7 13:28:27 06[IKE] peer requested virtual IP %any6

Nov  7 13:28:27 06[IKE] no virtual IP found for %any6 requested by 'F75780949A8F4A62A83EEB328CB2C217'

Nov  7 13:28:27 06[IKE] IKE_SA Host-to-Netv2[30] established between XXX.XXX.XXX.XXX[DNS-NAME.org]...XXX.XXX.XXX.XXX[F75780949A8F4A62A83EEB328CB2C217]

Nov  7 13:28:27 06[IKE] scheduling reauthentication in 9880s

Nov  7 13:28:27 06[IKE] maximum IKE_SA lifetime 10420s

Nov  7 13:28:27 06[CFG] selected proposal: ESP:AES_CBC_256/HMAC_SHA2_256_128/NO_EXT_SEQ

Nov  7 13:28:27 06[IKE] CHILD_SA Host-to-Netv2{3} established with SPIs c47d74dd_i 05db87d0_o and TS 0.0.0.0/0 === 10.10.10.1/32

Nov  7 13:28:27 06[ENC] generating IKE_AUTH response 5 [ AUTH CPRP(ADDR DNS DNS) SA TSi TSr N(AUTH_LFT) ]

Nov  7 13:28:27 06[NET] sending packet: from XXX.XXX.XXX.XXX[4500] to XXX.XXX.XXX.XXX[26058] (256 bytes)

Nov  7 13:28:42 08[IKE] sending DPD request

Nov  7 13:28:42 08[ENC] generating INFORMATIONAL request 0 [ ]

Nov  7 13:28:42 08[NET] sending packet: from XXX.XXX.XXX.XXX[4500] to XXX.XXX.XXX.XXX[26058] (80 bytes)

Nov  7 13:28:42 07[NET] received packet: from XXX.XXX.XXX.XXX[26058] to XXX.XXX.XXX.XXX[4500] (80 bytes)

Nov  7 13:28:42 07[ENC] parsed INFORMATIONAL response 0 [ ]

Nov  7 13:28:52 08[IKE] sending DPD request

Nov  7 13:28:52 08[ENC] generating INFORMATIONAL request 1 [ ]

Nov  7 13:28:52 08[NET] sending packet: from XXX.XXX.XXX.XXX[4500] to XXX.XXX.XXX.XXX[26058] (80 bytes)

Nov  7 13:28:52 07[NET] received packet: from XXX.XXX.XXX.XXX[26058] to XXX.XXX.XXX.XXX[4500] (80 bytes)

Nov  7 13:28:52 07[ENC] parsed INFORMATIONAL response 1 [ ]

Nov  7 13:29:05 06[NET] received packet: from XXX.XXX.XXX.XXX[26058] to XXX.XXX.XXX.XXX[4500] (80 bytes)

Nov  7 13:29:05 06[ENC] parsed INFORMATIONAL request 6 [ D ]

Nov  7 13:29:05 06[IKE] received DELETE for IKE_SA Host-to-Netv2[30]

Nov  7 13:29:05 06[IKE] deleting IKE_SA Host-to-Netv2[30] between XXX.XXX.XXX.XXX[DNS-NAME.org]...XXX.XXX.XXX.XXX[F75780949A8F4A62A83EEB328CB2C217]

Nov  7 13:29:05 06[IKE] IKE_SA deleted

Nov  7 13:29:05 06[ENC] generating INFORMATIONAL response 6 [ ]

Nov  7 13:29:05 06[NET] sending packet: from XXX.XXX.XXX.XXX[4500] to XXX.XXX.XXX.XXX[26058] (80 bytes)

Nov  7 13:29:05 06[CFG] lease 10.10.10.1 by 'F75780949A8F4A62A83EEB328CB2C217' went offline

13 REPLIES 13

Nope. Over here the Problem is ongoining when its deaktivatet. No Traffic wenn Connection to Instant guard. 

Have done factory reset on each router after firmware updates? This is needed. Also check for correct updates in AiProtection?

After deaktivating the Problem ist ongoing

Alex52
Rising Star II

Try uninstall and reset up of Instant Guard feature. If problem unresolved after all this, must use App to submit feedback to ASUS. Problem would be in ASUS side of Instant Guard feature. ASUS had problem with US feature servers and fixed. European servers may require ASUS fix.