Cybersecurity Forum

This forum is for all security enthusiasts to discuss Fortinet's latest & evolving technologies and to connect & network with peers in the cybersecurity hemisphere. Share and learn on a broad range of topics like best practices, use cases, integrations and more. For support specific questions/resources, please visit the Support Forum or the Knowledge Base.

wlknsl
New Contributor

Getting a win10 native vpn L2tp to connect successfully to a Azure fortigateVM

Hi guys, well ive tried all sorts and just hope that someone can point me in the right direction, ive followed the wizard to connect a native lt2p windows to a fortigateVM in azure and when i test the client and i can see the client hitting the wan port (port1) but the native client doesnt get as far as asking for the PSK to connect to our azure network, any advise would be, like i say i can see the client hitting the fortigate and the interface becomes green with a connection in brackets  of the device but that's it , its as if it doesn't know what to do next or its been blocked from going any further

ive included the log below of the L2tp vpn connection as well but im struggling to see where the error is 

UploadedImages_T9ZcQx20Q2c9vY4PSsnc_FWrulesl2tp-T.jpeg
UploadedImages_UBAydLlBQUqcheh0clmj_vpnl2tp-T.jpeg
UploadedImages_7gdJ5oFSjOy9K0ok7S9a_L2TPvpn tunnel-M.jpeg

VS-BRIGG # ike 0: comes 85.255.235.132:2915->192.168.1.76:500,ifindex=5,vrf=0....
ike 0: IKEv1 exchange=Identity Protection id=bed40f6733f17281/0000000000000000 len=408 vrf=0
ike 0: in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
ike 0:bed40f6733f17281/0000000000000000:3288: responder: main mode get 1st message...
ike 0:bed40f6733f17281/0000000000000000:3288: VID unknown (20): 01528BBBC00696121849AB9A1C5B2A5100000001
ike 0:bed40f6733f17281/0000000000000000:3288: VID MS NT5 ISAKMPOAKLEY 1E2B516905991C7D7C96FCBFB587E46100000009
ike 0:bed40f6733f17281/0000000000000000:3288: VID RFC 3947 4A131C81070358455C5728F20E95452F
ike 0:bed40f6733f17281/0000000000000000:3288: VID draft-ietf-ipsec-nat-t-ike-02\n 90CB80913EBB696E086381B5EC427B1F
ike 0:bed40f6733f17281/0000000000000000:3288: VID FRAGMENTATION 4048B7D56EBCE88525E7DE7F00D6C2D3
ike 0:bed40f6733f17281/0000000000000000:3288: VID unknown (16): FB1DE3CDF341B7EA16B7E5BE0855F120
ike 0:bed40f6733f17281/0000000000000000:3288: VID unknown (16): 26244D38EDDB61B3172A36E3D0CFB819
ike 0:bed40f6733f17281/0000000000000000:3288: VID unknown (16): E3A5966A76379FE707228231E5CE8652
ike 0:bed40f6733f17281/0000000000000000:3288: negotiation result
ike 0:bed40f6733f17281/0000000000000000:3288: proposal id = 1:
ike 0:bed40f6733f17281/0000000000000000:3288: protocol id = ISAKMP:
ike 0:bed40f6733f17281/0000000000000000:3288: trans_id = KEY_IKE.
ike 0:bed40f6733f17281/0000000000000000:3288: encapsulation = IKE/none
ike 0:bed40f6733f17281/0000000000000000:3288: type=OAKLEY_ENCRYPT_ALG, val=3DES_CBC.
ike 0:bed40f6733f17281/0000000000000000:3288: type=OAKLEY_HASH_ALG, val=SHA.
ike 0:bed40f6733f17281/0000000000000000:3288: type=AUTH_METHOD, val=PRESHARED_KEY.
ike 0:bed40f6733f17281/0000000000000000:3288: type=OAKLEY_GROUP, val=MODP1024.
ike 0:bed40f6733f17281/0000000000000000:3288: ISAKMP SA lifetime=28800
ike 0:bed40f6733f17281/0000000000000000:3288: SA proposal chosen, matched gateway L2TP VPN
ike 0:L2TP VPN: created connection: 0x728a898 5 192.168.1.76->85.255.235.132:2915.
ike 0:L2TP VPN:3288: selected NAT-T version: RFC 3947
ike 0:L2TP VPN:3288: cookie bed40f6733f17281/b52e54bc6632d63b
ike 0:L2TP VPN:3288: out BED40F6733F17281B52E54BC6632D63B0110020000000000000000BC0D00003800000001000000010000002C01010001000000240501000080010005800200028004000280030001800B0001000C0004000070800D0000144A131C81070358455C5728F20E95452F0D000014AFCAD71368A1F1C96B8696FC775701000D0000148299031757A36082C6A621DE000000000D0000144048B7D56EBCE88525E7DE7F00D6C2D3000000184048B7D56EBCE88525E7DE7F00D6C2D3C0000000
ike 0:L2TP VPN:3288: sent IKE msg (ident_r1send): 192.168.1.76:500->85.255.235.132:2915, len=188, vrf=0, id=bed40f6733f17281/b52e54bc6632d63b
ike 0: comes 85.255.235.132:2915->192.168.1.76:500,ifindex=5,vrf=0....
ike 0: IKEv1 exchange=Identity Protection id=bed40f6733f17281/b52e54bc6632d63b len=260 vrf=0
ike 0: in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
ike 0:L2TP VPN:3288: responder:main mode get 2nd message...
ike 0:L2TP VPN:3288: received NAT-D payload type 20
ike 0:L2TP VPN:3288: received NAT-D payload type 20
ike 0:L2TP VPN:3288: NAT detected: ME PEER
ike 0:L2TP VPN:3288: out BED40F6733F17281B52E54BC6632D63B0410020000000000000000E40A000084CA1335DE6602D6AEF2E309A3EAF0E5BA74D7D194248B084BB787002436503EE3960E756C27D6A350B0C66430780AFE475543B6BB7F5C26D0B18B221B2308622EF39D3C5715F9A83FB2E13FC32109673A83BD34B50D0254D6BCC19D7FBDE5EFB464391CDBB0AF9B1349C37A0A6E2EF2FABAFD95D70DF275A5BE1AC1444BA21E6114000014704C32AB30503AACFDDC27FF862EF8FB14000018565BB57D734BE560B6DF8C6C1D5C019E9830C73C000000189DC52A47AD1CBDACF179F1862134BC40C3EB4771
ike 0:L2TP VPN:3288: sent IKE msg (ident_r2send): 192.168.1.76:500->85.255.235.132:2915, len=228, vrf=0, id=bed40f6733f17281/b52e54bc6632d63b
ike 0:L2TP VPN:3288: ISAKMP SA bed40f6733f17281/b52e54bc6632d63b key 24:2EFC76053C9896F588A895B6BAFF64E35FDD30519C1EAF71
ike 0: comes 85.255.235.132:53064->192.168.1.76:4500,ifindex=5,vrf=0....
ike 0: IKEv1 exchange=Identity Protection id=bed40f6733f17281/b52e54bc6632d63b len=68 vrf=0
ike 0: in BED40F6733F17281B52E54BC6632D63B051002010000000000000044EAB4ED5F5D710D21EC4B42330C84742240E049F19EF4732121A64406E51C832B299080E251B15C6D
ike 0:L2TP VPN:3288: responder: main mode get 3rd message...
ike 0:L2TP VPN:3288: dec BED40F6733F17281B52E54BC6632D63B0510020100000000000000440800000C01000000AC140A0200000018517EEEA16C4DEE780825B7D780C4C79F2933C6A600000000
ike 0:L2TP VPN:3288: peer identifier IPV4_ADDR 172.20.10.2
ike 0:L2TP VPN:3288: PSK authentication succeeded
ike 0:L2TP VPN:3288: authentication OK
ike 0:L2TP VPN:3288: enc BED40F6733F17281B52E54BC6632D63B0510020100000000000000400800000C01000000C0A8014C000000180174842AAFA9614495C3A2381F12D2DECF84D903
ike 0:L2TP VPN:3288: remote port change 2915 -> 53064
ike 0:L2TP VPN:3288: out BED40F6733F17281B52E54BC6632D63B05100201000000000000004429749C652DCE77F0DC57E0331D703834FEB86225063B5E08D3A8B5483ED5E667389CF4C0BA098C9D
ike 0:L2TP VPN:3288: sent IKE msg (ident_r3send): 192.168.1.76:4500->85.255.235.132:53064, len=68, vrf=0, id=bed40f6733f17281/b52e54bc6632d63b
ike 0:L2TP VPN: adding new dynamic tunnel for 85.255.235.132:53064
ike 0:L2TP VPN_0: tunnel created tun_id 85.255.235.132 remote_location 0.0.0.0
ike 0:L2TP VPN_0: added new dynamic tunnel for 85.255.235.132:53064
ike 0:L2TP VPN_0:3288: established IKE SA bed40f6733f17281/b52e54bc6632d63b
ike 0:L2TP VPN_0: DPD disabled, not negotiated
ike 0:L2TP VPN_0:3288: check peer route: if_addr4_rcvd=0, if_addr6_rcvd=0, mode_cfg=0
ike 0:L2TP VPN_0:3288: no pending Quick-Mode negotiations
ike 0: comes 85.255.235.132:53064->192.168.1.76:4500,ifindex=5,vrf=0....
ike 0: IKEv1 exchange=Quick id=bed40f6733f17281/b52e54bc6632d63b:00000001 len=436 vrf=0
ike 0: in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
ike 0:L2TP VPN_0:3288:317866: responder received first quick-mode message
ike 0:L2TP VPN_0:3288: dec BED40F6733F17281B52E54BC6632D63B0810200100000001000001B4010000187B22F0F0D1D89441C7D725CB2AE2A94D8AA6C6CD0A000118000000010000000102000038010304016C47D3840000002C010C0000800400048006010080050002800100010002000400000E1080010002000200040003D09002000038020304016C47D3840000002C010C0000800400048006008080050002800100010002000400000E1080010002000200040003D09002000034030304016C47D38400000028010300008004000480050002800100010002000400000E1080010002000200040003D09002000034040304016C47D38400000028010200008004000480050002800100010002000400000E1080010002000200040003D09000000034050304016C47D38400000028010B00008004000480050002800100010002000400000E1080010002000200040003D09005000034790BF1F1840DE834BB3A3D4C80E9CB86209ECC4F238B4F54650AD4451A9BE41924AF5F20B839C699CA4DA1F68AD358CD0500000C011106A5AC140A021500000C011106A551829A7B1500000C01000000AC140A020000000C0100000051829A7B00000000
ike 0:L2TP VPN_0:3288:317866: received NATOA-i 172.20.10.2
ike 0:L2TP VPN_0:3288:317866: received NATOA-r 81.130.154.123
ike 0:L2TP VPN_0:3288:317866: peer proposal is: peer:17:172.20.10.2-172.20.10.2:1701, me:17:81.130.154.123-81.130.154.123:1701
ike 0:L2TP VPN_0:3288:L2TP VPN:317866: trying
ike 0:L2TP VPN_0:3288:317866: transport mode, override with 17:192.168.1.76-192.168.1.76:1701 -> 17:85.255.235.132-85.255.235.132:0
ike 0:L2TP VPN_0:3288:L2TP VPN:317866: matched phase2
ike 0:L2TP VPN_0:3288:L2TP VPN:317866: dynamic client
ike 0:L2TP VPN_0:3288:L2TP VPN:317866: my proposal:
ike 0:L2TP VPN_0:3288:L2TP VPN:317866: proposal id = 1:
ike 0:L2TP VPN_0:3288:L2TP VPN:317866: protocol id = IPSEC_ESP:
ike 0:L2TP VPN_0:3288:L2TP VPN:317866: trans_id = ESP_AES_CBC (key_len = 256)
ike 0:L2TP VPN_0:3288:L2TP VPN:317866: encapsulation = ENCAPSULATION_MODE_TRANSPORT
ike 0:L2TP VPN_0:3288:L2TP VPN:317866: type = AUTH_ALG, val=MD5
ike 0:L2TP VPN_0:3288:L2TP VPN:317866: trans_id = ESP_3DES
ike 0:L2TP VPN_0:3288:L2TP VPN:317866: encapsulation = ENCAPSULATION_MODE_TRANSPORT
ike 0:L2TP VPN_0:3288:L2TP VPN:317866: type = AUTH_ALG, val=SHA1
ike 0:L2TP VPN_0:3288:L2TP VPN:317866: trans_id = ESP_AES_CBC (key_len = 192)
ike 0:L2TP VPN_0:3288:L2TP VPN:317866: encapsulation = ENCAPSULATION_MODE_TRANSPORT
ike 0:L2TP VPN_0:3288:L2TP VPN:317866: type = AUTH_ALG, val=SHA1
ike 0:L2TP VPN_0:3288:L2TP VPN:317866: incoming proposal:
ike 0:L2TP VPN_0:3288:L2TP VPN:317866: proposal id = 1:
ike 0:L2TP VPN_0:3288:L2TP VPN:317866: protocol id = IPSEC_ESP:
ike 0:L2TP VPN_0:3288:L2TP VPN:317866: trans_id = ESP_AES_CBC (key_len = 256)
ike 0:L2TP VPN_0:3288:L2TP VPN:317866: encapsulation = UDP_ENCAPSULATION_MODE_TRANSPORT_RFC3947
ike 0:L2TP VPN_0:3288:L2TP VPN:317866: type = AUTH_ALG, val=SHA1
ike 0:L2TP VPN_0:3288:L2TP VPN:317866: incoming proposal:
ike 0:L2TP VPN_0:3288:L2TP VPN:317866: proposal id = 2:
ike 0:L2TP VPN_0:3288:L2TP VPN:317866: protocol id = IPSEC_ESP:
ike 0:L2TP VPN_0:3288:L2TP VPN:317866: trans_id = ESP_AES_CBC (key_len = 128)
ike 0:L2TP VPN_0:3288:L2TP VPN:317866: encapsulation = UDP_ENCAPSULATION_MODE_TRANSPORT_RFC3947
ike 0:L2TP VPN_0:3288:L2TP VPN:317866: type = AUTH_ALG, val=SHA1
ike 0:L2TP VPN_0:3288:L2TP VPN:317866: incoming proposal:
ike 0:L2TP VPN_0:3288:L2TP VPN:317866: proposal id = 3:
ike 0:L2TP VPN_0:3288:L2TP VPN:317866: protocol id = IPSEC_ESP:
ike 0:L2TP VPN_0:3288:L2TP VPN:317866: trans_id = ESP_3DES
ike 0:L2TP VPN_0:3288:L2TP VPN:317866: encapsulation = UDP_ENCAPSULATION_MODE_TRANSPORT_RFC3947
ike 0:L2TP VPN_0:3288:L2TP VPN:317866: type = AUTH_ALG, val=SHA1
ike 0:L2TP VPN_0:3288:L2TP VPN:317866: negotiation result
ike 0:L2TP VPN_0:3288:L2TP VPN:317866: proposal id = 3:
ike 0:L2TP VPN_0:3288:L2TP VPN:317866: protocol id = IPSEC_ESP:
ike 0:L2TP VPN_0:3288:L2TP VPN:317866: trans_id = ESP_3DES
ike 0:L2TP VPN_0:3288:L2TP VPN:317866: encapsulation = ENCAPSULATION_MODE_TRANSPORT
ike 0:L2TP VPN_0:3288:L2TP VPN:317866: type = AUTH_ALG, val=SHA1
ike 0:L2TP VPN_0:3288:L2TP VPN:317866: using udp transport mode.
ike 0:L2TP VPN_0:3288:317866: sending NATOA-i 85.255.235.132
ike 0:L2TP VPN_0:3288:317866: sending NATOA-r 192.168.1.76
ike 0:L2TP VPN_0:3288:L2TP VPN:317866: replay protection enabled
ike 0:L2TP VPN_0:3288:L2TP VPN:317866: SA life soft seconds=3590.
ike 0:L2TP VPN_0:3288:L2TP VPN:317866: SA life hard seconds=3600.
ike 0:L2TP VPN_0:3288:L2TP VPN:317866: IPsec SA selectors #src=1 #dst=1
ike 0:L2TP VPN_0:3288:L2TP VPN:317866: src 0 7 17:192.168.1.76-192.168.1.76:1701
ike 0:L2TP VPN_0:3288:L2TP VPN:317866: dst 0 7 17:85.255.235.132-85.255.235.132:0
ike 0:L2TP VPN_0:3288:L2TP VPN:317866: add dynamic IPsec SA selectors
ike 0:L2TP VPN_0:3288:L2TP VPN:317866: added dynamic IPsec SA proxyids, new serial 1
ike 0:L2TP VPN:317866: add route 85.255.235.132/255.255.255.255 gw 85.255.235.132 oif L2TP VPN(65) metric 15 priority 0
ike 0:L2TP VPN_0:3288:L2TP VPN:317866: tunnel 1 of VDOM limit 0/0
ike 0:L2TP VPN_0:3288:L2TP VPN:317866: add IPsec SA: SPIs=5beece16/6c47d384
ike 0:L2TP VPN_0:3288:L2TP VPN:317866: IPsec SA dec spi 5beece16 key 24:4C2E8A40BDDC854C5BB53FDBFAB2A2D89820CCC14E133DC3 auth 20:770E0F2B848320200B82D33F0507E719867B5821
ike 0:L2TP VPN_0:3288:L2TP VPN:317866: IPsec SA enc spi 6c47d384 key 24:B4AA9527DD049B46E24E07494F6FF1D02141672CCD56FAA3 auth 20:C41A14CD03301A3F6AD3734166F8A82D87ED5955
ike 0:L2TP VPN_0:3288:L2TP VPN:317866: transport mode encapsulation is enabled
ike 0:L2TP VPN_0:3288:L2TP VPN:317866: added IPsec SA: SPIs=5beece16/6c47d384
ike 0:L2TP VPN_0:3288:L2TP VPN:317866: sending SNMP tunnel UP trap
ike 0:L2TP VPN_0:3288: enc BED40F6733F17281B52E54BC6632D63B0810200100000001000000B8010000182775718197313B998F9D52ACF3C055AE7D6D6BD70A000040000000010000000100000034030304015BEECE1600000028010300008004000480050002800100010002000400000E1080010002000200040003D090050000144C150445157B5AED8C13C2656002BC070500000C011106A5AC140A021500000C011106A551829A7B1500000C0100000055FFEB840000000C01000000C0A8014C
ike 0:L2TP VPN_0:3288: out BED40F6733F17281B52E54BC6632D63B0810200100000001000000BC6D5E34F80E0FBABB4CE2BA23CF16E51B091981209859A31D7B0866BB037D18DDED9703C7C735F104BB49AE5C6D99DCC24E027FEDF17DF77E69DD4FB3A100E5CE5333D1632587F79D69B088E8C5E36133AFD095102DC12CF84B58F019E54B43DE1EF2396677BC3A3386446B4433C436BBCF8B4DD8B564C64787B6945896BAEE53DBA67106F0F1372B3D8023D9929A6991625B8D0FF2852E5738685EE7346695BD
ike 0:L2TP VPN_0:3288: sent IKE msg (quick_r1send): 192.168.1.76:4500->85.255.235.132:53064, len=188, vrf=0, id=bed40f6733f17281/b52e54bc6632d63b:00000001
ike 0: comes 85.255.235.132:53064->192.168.1.76:4500,ifindex=5,vrf=0....
ike 0: IKEv1 exchange=Quick id=bed40f6733f17281/b52e54bc6632d63b:00000001 len=60 vrf=0
ike 0: in BED40F6733F17281B52E54BC6632D63B08102001000000010000003CFA26CEE044E346DDA0EECF35B4E9ABEDF78ACC91E1C84AEF229292634BCDCBE4
ike 0:L2TP VPN_0:3288: dec BED40F6733F17281B52E54BC6632D63B08102001000000010000003C00000018B387B2FA2E01FDAD8747FD72FF28A5551E36C8060000000000000000
ike 0:L2TP VPN_0:L2TP VPN:317866: send SA_DONE SPI 0x6c47d384
ike 0: comes 85.255.235.132:53064->192.168.1.76:4500,ifindex=5,vrf=0....
ike 0: IKEv1 exchange=Quick id=bed40f6733f17281/b52e54bc6632d63b:00000002 len=436 vrf=0
ike 0: in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
ike 0:L2TP VPN_0:3288:317867: responder received first quick-mode message
ike 0:L2TP VPN_0:3288: dec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
ike 0:L2TP VPN_0:3288:317867: received NATOA-i 172.20.10.2
ike 0:L2TP VPN_0:3288:317867: received NATOA-r 81.130.154.123
ike 0:L2TP VPN_0:3288:317867: peer proposal is: peer:17:172.20.10.2-172.20.10.2:1701, me:17:81.130.154.123-81.130.154.123:1701
ike 0:L2TP VPN_0:3288:L2TP VPN:317867: trying
ike 0:L2TP VPN_0:3288:317867: transport mode, override with 17:192.168.1.76-192.168.1.76:1701 -> 17:85.255.235.132-85.255.235.132:0
ike 0:L2TP VPN_0:3288:L2TP VPN:317867: matched phase2
ike 0:L2TP VPN_0:3288:L2TP VPN:317867: dynamic client
ike 0:L2TP VPN_0:3288:L2TP VPN:317867: my proposal:
ike 0:L2TP VPN_0:3288:L2TP VPN:317867: proposal id = 1:
ike 0:L2TP VPN_0:3288:L2TP VPN:317867: protocol id = IPSEC_ESP:
ike 0:L2TP VPN_0:3288:L2TP VPN:317867: trans_id = ESP_AES_CBC (key_len = 256)
ike 0:L2TP VPN_0:3288:L2TP VPN:317867: encapsulation = ENCAPSULATION_MODE_TRANSPORT
ike 0:L2TP VPN_0:3288:L2TP VPN:317867: type = AUTH_ALG, val=MD5
ike 0:L2TP VPN_0:3288:L2TP VPN:317867: trans_id = ESP_3DES
ike 0:L2TP VPN_0:3288:L2TP VPN:317867: encapsulation = ENCAPSULATION_MODE_TRANSPORT
ike 0:L2TP VPN_0:3288:L2TP VPN:317867: type = AUTH_ALG, val=SHA1
ike 0:L2TP VPN_0:3288:L2TP VPN:317867: trans_id = ESP_AES_CBC (key_len = 192)
ike 0:L2TP VPN_0:3288:L2TP VPN:317867: encapsulation = ENCAPSULATION_MODE_TRANSPORT
ike 0:L2TP VPN_0:3288:L2TP VPN:317867: type = AUTH_ALG, val=SHA1
ike 0:L2TP VPN_0:3288:L2TP VPN:317867: incoming proposal:
ike 0:L2TP VPN_0:3288:L2TP VPN:317867: proposal id = 1:
ike 0:L2TP VPN_0:3288:L2TP VPN:317867: protocol id = IPSEC_ESP:
ike 0:L2TP VPN_0:3288:L2TP VPN:317867: trans_id = ESP_AES_CBC (key_len = 256)
ike 0:L2TP VPN_0:3288:L2TP VPN:317867: encapsulation = UDP_ENCAPSULATION_MODE_TRANSPORT_RFC3947
ike 0:L2TP VPN_0:3288:L2TP VPN:317867: type = AUTH_ALG, val=SHA1
ike 0:L2TP VPN_0:3288:L2TP VPN:317867: incoming proposal:
ike 0:L2TP VPN_0:3288:L2TP VPN:317867: proposal id = 2:
ike 0:L2TP VPN_0:3288:L2TP VPN:317867: protocol id = IPSEC_ESP:
ike 0:L2TP VPN_0:3288:L2TP VPN:317867: trans_id = ESP_AES_CBC (key_len = 128)
ike 0:L2TP VPN_0:3288:L2TP VPN:317867: encapsulation = UDP_ENCAPSULATION_MODE_TRANSPORT_RFC3947
ike 0:L2TP VPN_0:3288:L2TP VPN:317867: type = AUTH_ALG, val=SHA1
ike 0:L2TP VPN_0:3288:L2TP VPN:317867: incoming proposal:
ike 0:L2TP VPN_0:3288:L2TP VPN:317867: proposal id = 3:
ike 0:L2TP VPN_0:3288:L2TP VPN:317867: protocol id = IPSEC_ESP:
ike 0:L2TP VPN_0:3288:L2TP VPN:317867: trans_id = ESP_3DES
ike 0:L2TP VPN_0:3288:L2TP VPN:317867: encapsulation = UDP_ENCAPSULATION_MODE_TRANSPORT_RFC3947
ike 0:L2TP VPN_0:3288:L2TP VPN:317867: type = AUTH_ALG, val=SHA1
ike 0:L2TP VPN_0:3288:L2TP VPN:317867: negotiation result
ike 0:L2TP VPN_0:3288:L2TP VPN:317867: proposal id = 3:
ike 0:L2TP VPN_0:3288:L2TP VPN:317867: protocol id = IPSEC_ESP:
ike 0:L2TP VPN_0:3288:L2TP VPN:317867: trans_id = ESP_3DES
ike 0:L2TP VPN_0:3288:L2TP VPN:317867: encapsulation = ENCAPSULATION_MODE_TRANSPORT
ike 0:L2TP VPN_0:3288:L2TP VPN:317867: type = AUTH_ALG, val=SHA1
ike 0:L2TP VPN_0:3288:L2TP VPN:317867: using udp transport mode.
ike 0:L2TP VPN_0:3288:317867: sending NATOA-i 85.255.235.132
ike 0:L2TP VPN_0:3288:317867: sending NATOA-r 192.168.1.76
ike 0:L2TP VPN_0:3288:L2TP VPN:317867: replay protection enabled
ike 0:L2TP VPN_0:3288:L2TP VPN:317867: SA life soft seconds=3591.
ike 0:L2TP VPN_0:3288:L2TP VPN:317867: SA life hard seconds=3600.
ike 0:L2TP VPN_0:3288:L2TP VPN:317867: IPsec SA selectors #src=1 #dst=1
ike 0:L2TP VPN_0:3288:L2TP VPN:317867: src 0 7 17:192.168.1.76-192.168.1.76:1701
ike 0:L2TP VPN_0:3288:L2TP VPN:317867: dst 0 7 17:85.255.235.132-85.255.235.132:0
ike 0:L2TP VPN_0:3288:L2TP VPN:317867: add dynamic IPsec SA selectors
ike 0:L2TP VPN_0:3288:L2TP VPN:317867: added dynamic IPsec SA proxyids, existing serial 1
ike 0:L2TP VPN_0:3288:L2TP VPN:317867: add IPsec SA: SPIs=5beece17/a78d69ac
ike 0:L2TP VPN_0:3288:L2TP VPN:317867: IPsec SA dec spi 5beece17 key 24:AE7D202EA8770FDCB5482FE94DAB704CF74C981DF5D46F0E auth 20:517A7AF6612825AA1BECBE3B3B9D9B7B1DF64490
ike 0:L2TP VPN_0:3288:L2TP VPN:317867: IPsec SA enc spi a78d69ac key 24:F6D3A2733493BD8429C979D76767EEEB0BA4EA7AF36EF940 auth 20:DA5C2FDDF8EEECC0E062866553B3171782428297
ike 0:L2TP VPN_0:3288:L2TP VPN:317867: transport mode encapsulation is enabled
ike 0:L2TP VPN_0:3288:L2TP VPN:317867: added IPsec SA: SPIs=5beece17/a78d69ac
ike 0:L2TP VPN_0:3288: enc BED40F6733F17281B52E54BC6632D63B0810200100000002000000B8010000185819CDD13FCBAA2E93A7E9000FA6844307F008D30A000040000000010000000100000034030304015BEECE1700000028010300008004000480050002800100010002000400000E1080010002000200040003D09005000014D4641F64BE827F8C7A0DF93BB31F845B0500000C011106A5AC140A021500000C011106A551829A7B1500000C0100000055FFEB840000000C01000000C0A8014C
ike 0:L2TP VPN_0:3288: out BED40F6733F17281B52E54BC6632D63B0810200100000002000000BC0DCF7C63671A880017971E5327FCD5868BC6E1CCA386198F644E94970CE57DA0AEE2C04AC1A4AC68C10980CA151F15520AD326F8144145409AF75BE0D1BAC8A8DC8CDB38EB11BF61951DAE1AE7DF5838A221DA4EC202C65B3EE985147449CEA6E147E9ACFA0866D57AC3D8C014B7A9D4EEED815F87F011FBE8F7D70675C53B3A9F86844A981D47A946349132365A89EBAAA50E334781864CFC86FA4F5AF5AE25
ike 0:L2TP VPN_0:3288: sent IKE msg (quick_r1send): 192.168.1.76:4500->85.255.235.132:53064, len=188, vrf=0, id=bed40f6733f17281/b52e54bc6632d63b:00000002
ike 0: comes 85.255.235.132:53064->192.168.1.76:4500,ifindex=5,vrf=0....
ike 0: IKEv1 exchange=Quick id=bed40f6733f17281/b52e54bc6632d63b:00000002 len=60 vrf=0
ike 0: in BED40F6733F17281B52E54BC6632D63B08102001000000020000003CF26CCD5B23E3453BFDE584AD83D9F056B57E641D86407359F87977706AF3BBD7
ike 0:L2TP VPN_0:3288: dec BED40F6733F17281B52E54BC6632D63B08102001000000020000003C000000186AD67D1C86624B30203732EBE712726784BC05820000000000000000
ike 0:L2TP VPN_0:L2TP VPN:317867: send SA_DONE SPI 0xa78d69ac
ike 0: comes 85.255.235.132:53064->192.168.1.76:4500,ifindex=5,vrf=0....
ike 0: IKEv1 exchange=Informational id=bed40f6733f17281/b52e54bc6632d63b:b454f680 len=76 vrf=0
ike 0: in BED40F6733F17281B52E54BC6632D63B08100501B454F6800000004C7DD9328A84957BDB59BC9785B1FD566FC0FD060DAF39E741330F181D0289ED55152A797FEACA53D2E908CBED5C620C2E
ike 0:L2TP VPN_0:3288: dec BED40F6733F17281B52E54BC6632D63B08100501B454F6800000004C0C00001862601E1F1BA8469AD74A96E21390D7CF811508250000001000000001030400016C47D3840000000000000000
ike 0:L2TP VPN_0:3288: recv IPsec SA delete, spi count 1
ike 0:L2TP VPN_0: deleting IPsec SA with SPI 6c47d384
ike 0:L2TP VPN_0:L2TP VPN: deleted IPsec SA with SPI 6c47d384, SA count: 1
ike 0:NewcastleOffice: NAT keep-alive 5 192.168.1.76->86.31.248.15:4500.
ike 0:NewcastleOffice:3093: out FF
ike 0:NewcastleOffice:3093: sent IKE msg (keepalive): 192.168.1.76:4500->86.31.248.15:4500, len=1, vrf=0, id=ff00000000000000/0000000019000000:01e66844
ike 0:Brigg-to-cloud: NAT keep-alive 5 192.168.1.76->52.151.83.162:4500.
ike 0:Brigg-to-cloud:2964: out FF
ike 0:Brigg-to-cloud:2964: sent IKE msg (keepalive): 192.168.1.76:4500->52.151.83.162:4500, len=1, vrf=0, id=ff00000000000000/0000000039000000
ike 0: comes 85.255.235.132:53064->192.168.1.76:4500,ifindex=5,vrf=0....
ike 0: IKEv1 exchange=Quick id=bed40f6733f17281/b52e54bc6632d63b:00000003 len=436 vrf=0
ike 0: in BED40F6733F17281B52E54BC6632D63B0810200100000003000001B4CC12BCD27571096FF382EB9079D380F03781435C04BF6E814B791F4C254C7CFEFB9D9128A2FB4D1AE579D4E26E42B272DD814E81236DDB6A220771420CFE842FB809D2AD43EA1C57A2A7D7D5A75D2D2B7405375CEEB34FF0BC207215637BD28245DBDFC1ACB3507B53B767E4828437C9470763BD95244B4F6679463F1FB8AB15892F3062A95B900EF65D733319C5A25238238A3A0DC6CD1F9CB0E1C24B29EDDCA7D076F4440D0FFFD70960AF4E27CC8D8A490FBE5FCD1EB0AA5F56E27B9F7717D734BA07D488E10D9827FDA896F0D205787C8267E11B0A797E4A56314FE96270C2AECD07BBDF64D238B856C3A35EEA3E4E22423E1464A807141F762EC23A48E462BEF0CB22A2437EE4B2B167E288D09002A28E7B903C9BE4E5A71EFFCDCB8DCC4F6C114FF5634A4AE0F166E72228570C37FBC23A4D9551B10B77D7FBAD2A8CF4E9B1D458DEF689B3458CB6C2D63D364B5F4DF3CA7C63A7A05ADEEB78C199D7410D8D55B66376706C77D4EA946894674D5F218880F5A8BAD0D60EC48379FAC26885D7B756A10865C5912147DC0CE45D56F67F6D333CB3A6B7
ike 0:L2TP VPN_0:3288:317868: responder received first quick-mode message
ike 0:L2TP VPN_0:3288: dec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
ike 0:L2TP VPN_0:3288:317868: received NATOA-i 172.20.10.2
ike 0:L2TP VPN_0:3288:317868: received NATOA-r 81.130.154.123
ike 0:L2TP VPN_0:3288:317868: peer proposal is: peer:17:172.20.10.2-172.20.10.2:1701, me:17:81.130.154.123-81.130.154.123:1701
ike 0:L2TP VPN_0:3288:L2TP VPN:317868: trying
ike 0:L2TP VPN_0:3288:317868: transport mode, override with 17:192.168.1.76-192.168.1.76:1701 -> 17:85.255.235.132-85.255.235.132:0
ike 0:L2TP VPN_0:3288:L2TP VPN:317868: matched phase2
ike 0:L2TP VPN_0:3288:L2TP VPN:317868: dynamic client
ike 0:L2TP VPN_0:3288:L2TP VPN:317868: my proposal:
ike 0:L2TP VPN_0:3288:L2TP VPN:317868: proposal id = 1:
ike 0:L2TP VPN_0:3288:L2TP VPN:317868: protocol id = IPSEC_ESP:
ike 0:L2TP VPN_0:3288:L2TP VPN:317868: trans_id = ESP_AES_CBC (key_len = 256)
ike 0:L2TP VPN_0:3288:L2TP VPN:317868: encapsulation = ENCAPSULATION_MODE_TRANSPORT
ike 0:L2TP VPN_0:3288:L2TP VPN:317868: type = AUTH_ALG, val=MD5
ike 0:L2TP VPN_0:3288:L2TP VPN:317868: trans_id = ESP_3DES
ike 0:L2TP VPN_0:3288:L2TP VPN:317868: encapsulation = ENCAPSULATION_MODE_TRANSPORT
ike 0:L2TP VPN_0:3288:L2TP VPN:317868: type = AUTH_ALG, val=SHA1
ike 0:L2TP VPN_0:3288:L2TP VPN:317868: trans_id = ESP_AES_CBC (key_len = 192)
ike 0:L2TP VPN_0:3288:L2TP VPN:317868: encapsulation = ENCAPSULATION_MODE_TRANSPORT
ike 0:L2TP VPN_0:3288:L2TP VPN:317868: type = AUTH_ALG, val=SHA1
ike 0:L2TP VPN_0:3288:L2TP VPN:317868: incoming proposal:
ike 0:L2TP VPN_0:3288:L2TP VPN:317868: proposal id = 1:
ike 0:L2TP VPN_0:3288:L2TP VPN:317868: protocol id = IPSEC_ESP:
ike 0:L2TP VPN_0:3288:L2TP VPN:317868: trans_id = ESP_AES_CBC (key_len = 256)
ike 0:L2TP VPN_0:3288:L2TP VPN:317868: encapsulation = UDP_ENCAPSULATION_MODE_TRANSPORT_RFC3947
ike 0:L2TP VPN_0:3288:L2TP VPN:317868: type = AUTH_ALG, val=SHA1
ike 0:L2TP VPN_0:3288:L2TP VPN:317868: incoming proposal:
ike 0:L2TP VPN_0:3288:L2TP VPN:317868: proposal id = 2:
ike 0:L2TP VPN_0:3288:L2TP VPN:317868: protocol id = IPSEC_ESP:
ike 0:L2TP VPN_0:3288:L2TP VPN:317868: trans_id = ESP_AES_CBC (key_len = 128)
ike 0:L2TP VPN_0:3288:L2TP VPN:317868: encapsulation = UDP_ENCAPSULATION_MODE_TRANSPORT_RFC3947
ike 0:L2TP VPN_0:3288:L2TP VPN:317868: type = AUTH_ALG, val=SHA1
ike 0:L2TP VPN_0:3288:L2TP VPN:317868: incoming proposal:
ike 0:L2TP VPN_0:3288:L2TP VPN:317868: proposal id = 3:
ike 0:L2TP VPN_0:3288:L2TP VPN:317868: protocol id = IPSEC_ESP:
ike 0:L2TP VPN_0:3288:L2TP VPN:317868: trans_id = ESP_3DES
ike 0:L2TP VPN_0:3288:L2TP VPN:317868: encapsulation = UDP_ENCAPSULATION_MODE_TRANSPORT_RFC3947
ike 0:L2TP VPN_0:3288:L2TP VPN:317868: type = AUTH_ALG, val=SHA1
ike 0:L2TP VPN_0:3288:L2TP VPN:317868: negotiation result
ike 0:L2TP VPN_0:3288:L2TP VPN:317868: proposal id = 3:
ike 0:L2TP VPN_0:3288:L2TP VPN:317868: protocol id = IPSEC_ESP:
ike 0:L2TP VPN_0:3288:L2TP VPN:317868: trans_id = ESP_3DES
ike 0:L2TP VPN_0:3288:L2TP VPN:317868: encapsulation = ENCAPSULATION_MODE_TRANSPORT
ike 0:L2TP VPN_0:3288:L2TP VPN:317868: type = AUTH_ALG, val=SHA1
ike 0:L2TP VPN_0:3288:L2TP VPN:317868: using udp transport mode.
ike 0:L2TP VPN_0:3288:317868: sending NATOA-i 85.255.235.132
ike 0:L2TP VPN_0:3288:317868: sending NATOA-r 192.168.1.76
ike 0:L2TP VPN_0:3288:L2TP VPN:317868: replay protection enabled
ike 0:L2TP VPN_0:3288:L2TP VPN:317868: SA life soft seconds=3589.
ike 0:L2TP VPN_0:3288:L2TP VPN:317868: SA life hard seconds=3600.
ike 0:L2TP VPN_0:3288:L2TP VPN:317868: IPsec SA selectors #src=1 #dst=1
ike 0:L2TP VPN_0:3288:L2TP VPN:317868: src 0 7 17:192.168.1.76-192.168.1.76:1701
ike 0:L2TP VPN_0:3288:L2TP VPN:317868: dst 0 7 17:85.255.235.132-85.255.235.132:0
ike 0:L2TP VPN_0:3288:L2TP VPN:317868: add dynamic IPsec SA selectors
ike 0:L2TP VPN_0:3288:L2TP VPN:317868: added dynamic IPsec SA proxyids, existing serial 1
ike 0:L2TP VPN_0:3288:L2TP VPN:317868: add IPsec SA: SPIs=5beece18/fa86ccd0
ike 0:L2TP VPN_0:3288:L2TP VPN:317868: IPsec SA dec spi 5beece18 key 24:2DF96A3069556A2275D760EE19B42E7B3DB921A9C0092C37 auth 20:CFA389596F25D2849895901D4FA90311FC304B5B
ike 0:L2TP VPN_0:3288:L2TP VPN:317868: IPsec SA enc spi fa86ccd0 key 24:36E8D5388B6A1EBEE7B31CD669BC5FC438F66C5DC0EAB99A auth 20:AB700024A66443A153C5B61AEBEA8A5E8874A343
ike 0:L2TP VPN_0:3288:L2TP VPN:317868: transport mode encapsulation is enabled
ike 0:L2TP VPN_0:3288:L2TP VPN:317868: added IPsec SA: SPIs=5beece18/fa86ccd0
ike 0:L2TP VPN_0:3288: enc BED40F6733F17281B52E54BC6632D63B0810200100000003000000B801000018ADC28B27D2ACE46640ADEEB92CAFB65BD9897D1A0A000040000000010000000100000034030304015BEECE1800000028010300008004000480050002800100010002000400000E1080010002000200040003D09005000014704381761CAB8C765CAF97A943B059F70500000C011106A5AC140A021500000C011106A551829A7B1500000C0100000055FFEB840000000C01000000C0A8014C
ike 0:L2TP VPN_0:3288: out BED40F6733F17281B52E54BC6632D63B0810200100000003000000BC76691879248F7C071A1553A27DD767AAC45A5069C76397D114374DCD12BBBB019EE8A58CDBD1FD4803BCE1A6CB13AEAA733912EE4D80473E48DF44E46B8B60D882E4A6A84D6EE59E4095AA68F609C2236F303F7F5B91730E12A2289EC5057BDA166B1A2524553EA1E6ACD2036525D20E17881BAE5B2D853925486CF9716A6DE8F903D27DD228F8537A2836E3926AC592D5C5A1C13F0D0148C901E06955B99C9A
ike 0:L2TP VPN_0:3288: sent IKE msg (quick_r1send): 192.168.1.76:4500->85.255.235.132:53064, len=188, vrf=0, id=bed40f6733f17281/b52e54bc6632d63b:00000003
ike 0: comes 85.255.235.132:53064->192.168.1.76:4500,ifindex=5,vrf=0....
ike 0: IKEv1 exchange=Quick id=bed40f6733f17281/b52e54bc6632d63b:00000003 len=60 vrf=0
ike 0: in BED40F6733F17281B52E54BC6632D63B08102001000000030000003CAF9485006ACD157B420B7BBCA66DC7188E63F242217D790F24D2565B8B97D3E1
ike 0:L2TP VPN_0:3288: dec BED40F6733F17281B52E54BC6632D63B08102001000000030000003C00000018829DACB8C63E8573CE17803BAFBFFEDB97F8A59C0000000000000000
ike 0:L2TP VPN_0:L2TP VPN:317868: send SA_DONE SPI 0xfa86ccd0
ike 0: comes 85.255.235.132:53064->192.168.1.76:4500,ifindex=5,vrf=0....
ike 0: IKEv1 exchange=Informational id=bed40f6733f17281/b52e54bc6632d63b:cabd1733 len=76 vrf=0
ike 0: in BED40F6733F17281B52E54BC6632D63B08100501CABD17330000004C64F2411BFFC744C05B339C165BA100921154149586077329BB6BD8893BC9E8DA02B27060C80884C3205E829C403137D4
ike 0:L2TP VPN_0:3288: dec BED40F6733F17281B52E54BC6632D63B08100501CABD17330000004C0C00001893C65BA09EBE6BE411A157F60C946D128DBF24CF000000100000000103040001A78D69AC0000000000000000
ike 0:L2TP VPN_0:3288: recv IPsec SA delete, spi count 1
ike 0:L2TP VPN_0: deleting IPsec SA with SPI a78d69ac
ike 0:L2TP VPN_0:L2TP VPN: deleted IPsec SA with SPI a78d69ac, SA count: 1
ike 0: comes 85.255.235.132:53064->192.168.1.76:4500,ifindex=5,vrf=0....
ike 0: IKEv1 exchange=Quick id=bed40f6733f17281/b52e54bc6632d63b:00000004 len=436 vrf=0
ike 0: in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
ike 0:L2TP VPN_0:3288:317869: responder received first quick-mode message
ike 0:L2TP VPN_0:3288: dec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
ike 0:L2TP VPN_0:3288:317869: received NATOA-i 172.20.10.2
ike 0:L2TP VPN_0:3288:317869: received NATOA-r 81.130.154.123
ike 0:L2TP VPN_0:3288:317869: peer proposal is: peer:17:172.20.10.2-172.20.10.2:1701, me:17:81.130.154.123-81.130.154.123:1701
ike 0:L2TP VPN_0:3288:L2TP VPN:317869: trying
ike 0:L2TP VPN_0:3288:317869: transport mode, override with 17:192.168.1.76-192.168.1.76:1701 -> 17:85.255.235.132-85.255.235.132:0
ike 0:L2TP VPN_0:3288:L2TP VPN:317869: matched phase2
ike 0:L2TP VPN_0:3288:L2TP VPN:317869: dynamic client
ike 0:L2TP VPN_0:3288:L2TP VPN:317869: my proposal:
ike 0:L2TP VPN_0:3288:L2TP VPN:317869: proposal id = 1:
ike 0:L2TP VPN_0:3288:L2TP VPN:317869: protocol id = IPSEC_ESP:
ike 0:L2TP VPN_0:3288:L2TP VPN:317869: trans_id = ESP_AES_CBC (key_len = 256)
ike 0:L2TP VPN_0:3288:L2TP VPN:317869: encapsulation = ENCAPSULATION_MODE_TRANSPORT
ike 0:L2TP VPN_0:3288:L2TP VPN:317869: type = AUTH_ALG, val=MD5
ike 0:L2TP VPN_0:3288:L2TP VPN:317869: trans_id = ESP_3DES
ike 0:L2TP VPN_0:3288:L2TP VPN:317869: encapsulation = ENCAPSULATION_MODE_TRANSPORT
ike 0:L2TP VPN_0:3288:L2TP VPN:317869: type = AUTH_ALG, val=SHA1
ike 0:L2TP VPN_0:3288:L2TP VPN:317869: trans_id = ESP_AES_CBC (key_len = 192)
ike 0:L2TP VPN_0:3288:L2TP VPN:317869: encapsulation = ENCAPSULATION_MODE_TRANSPORT
ike 0:L2TP VPN_0:3288:L2TP VPN:317869: type = AUTH_ALG, val=SHA1
ike 0:L2TP VPN_0:3288:L2TP VPN:317869: incoming proposal:
ike 0:L2TP VPN_0:3288:L2TP VPN:317869: proposal id = 1:
ike 0:L2TP VPN_0:3288:L2TP VPN:317869: protocol id = IPSEC_ESP:
ike 0:L2TP VPN_0:3288:L2TP VPN:317869: trans_id = ESP_AES_CBC (key_len = 256)
ike 0:L2TP VPN_0:3288:L2TP VPN:317869: encapsulation = UDP_ENCAPSULATION_MODE_TRANSPORT_RFC3947
ike 0:L2TP VPN_0:3288:L2TP VPN:317869: type = AUTH_ALG, val=SHA1
ike 0:L2TP VPN_0:3288:L2TP VPN:317869: incoming proposal:
ike 0:L2TP VPN_0:3288:L2TP VPN:317869: proposal id = 2:
ike 0:L2TP VPN_0:3288:L2TP VPN:317869: protocol id = IPSEC_ESP:
ike 0:L2TP VPN_0:3288:L2TP VPN:317869: trans_id = ESP_AES_CBC (key_len = 128)
ike 0:L2TP VPN_0:3288:L2TP VPN:317869: encapsulation = UDP_ENCAPSULATION_MODE_TRANSPORT_RFC3947
ike 0:L2TP VPN_0:3288:L2TP VPN:317869: type = AUTH_ALG, val=SHA1
ike 0:L2TP VPN_0:3288:L2TP VPN:317869: incoming proposal:
ike 0:L2TP VPN_0:3288:L2TP VPN:317869: proposal id = 3:
ike 0:L2TP VPN_0:3288:L2TP VPN:317869: protocol id = IPSEC_ESP:
ike 0:L2TP VPN_0:3288:L2TP VPN:317869: trans_id = ESP_3DES
ike 0:L2TP VPN_0:3288:L2TP VPN:317869: encapsulation = UDP_ENCAPSULATION_MODE_TRANSPORT_RFC3947
ike 0:L2TP VPN_0:3288:L2TP VPN:317869: type = AUTH_ALG, val=SHA1
ike 0:L2TP VPN_0:3288:L2TP VPN:317869: negotiation result
ike 0:L2TP VPN_0:3288:L2TP VPN:317869: proposal id = 3:
ike 0:L2TP VPN_0:3288:L2TP VPN:317869: protocol id = IPSEC_ESP:
ike 0:L2TP VPN_0:3288:L2TP VPN:317869: trans_id = ESP_3DES
ike 0:L2TP VPN_0:3288:L2TP VPN:317869: encapsulation = ENCAPSULATION_MODE_TRANSPORT
ike 0:L2TP VPN_0:3288:L2TP VPN:317869: type = AUTH_ALG, val=SHA1
ike 0:L2TP VPN_0:3288:L2TP VPN:317869: using udp transport mode.
ike 0:L2TP VPN_0:3288:317869: sending NATOA-i 85.255.235.132
ike 0:L2TP VPN_0:3288:317869: sending NATOA-r 192.168.1.76
ike 0:L2TP VPN_0:3288:L2TP VPN:317869: replay protection enabled
ike 0:L2TP VPN_0:3288:L2TP VPN:317869: SA life soft seconds=3591.
ike 0:L2TP VPN_0:3288:L2TP VPN:317869: SA life hard seconds=3600.
ike 0:L2TP VPN_0:3288:L2TP VPN:317869: IPsec SA selectors #src=1 #dst=1
ike 0:L2TP VPN_0:3288:L2TP VPN:317869: src 0 7 17:192.168.1.76-192.168.1.76:1701
ike 0:L2TP VPN_0:3288:L2TP VPN:317869: dst 0 7 17:85.255.235.132-85.255.235.132:0
ike 0:L2TP VPN_0:3288:L2TP VPN:317869: add dynamic IPsec SA selectors
ike 0:L2TP VPN_0:3288:L2TP VPN:317869: added dynamic IPsec SA proxyids, existing serial 1
ike 0:L2TP VPN_0:3288:L2TP VPN:317869: add IPsec SA: SPIs=5beece19/2c280b9e
ike 0:L2TP VPN_0:3288:L2TP VPN:317869: IPsec SA dec spi 5beece19 key 24:6C738B3E73A21214C670021C7A7C2CE218F9BE38EF5A4587 auth 20:0C7804108290320AB5AB631079E751C37FF54F8E
ike 0:L2TP VPN_0:3288:L2TP VPN:317869: IPsec SA enc spi 2c280b9e key 24:E8F7F844D8166427467FFA98A73BB2AD7ED5AE2784097D45 auth 20:2246B2FB00B2674F1D05AD6B3EDD6C812C87B09F
ike 0:L2TP VPN_0:3288:L2TP VPN:317869: transport mode encapsulation is enabled
ike 0:L2TP VPN_0:3288:L2TP VPN:317869: added IPsec SA: SPIs=5beece19/2c280b9e
ike 0:L2TP VPN_0:3288: enc BED40F6733F17281B52E54BC6632D63B0810200100000004000000B8010000182769B0DEC015C48C635F9165246EA548506EBB4E0A000040000000010000000100000034030304015BEECE1900000028010300008004000480050002800100010002000400000E1080010002000200040003D090050000143D1D58CB92C20982BBC625933FEE71D00500000C011106A5AC140A021500000C011106A551829A7B1500000C0100000055FFEB840000000C01000000C0A8014C
ike 0:L2TP VPN_0:3288: out BED40F6733F17281B52E54BC6632D63B0810200100000004000000BC3780A3BE04760253BCC7FC2F1F235463353448FD915C473126F11FC85EAC7DA3679E4C1F4DAAF967B7B10774CB12F7047D58FC38F8AE79C686928F1AD75F5EB4E05263D927278AB5D5BE4C64A9E85E1AE8354E48BFA567F0F585C8AB5454D9F89A47F55B9BC186C2D691CE55041220746FADFC4AE5DD3080CA0CA8C25A5BEF8BDCA5A47997A91EF34ECF83C0A54CEFF942E4CBC3605B78DBA8C561E6F6B0191C
ike 0:L2TP VPN_0:3288: sent IKE msg (quick_r1send): 192.168.1.76:4500->85.255.235.132:53064, len=188, vrf=0, id=bed40f6733f17281/b52e54bc6632d63b:00000004
ike 0: comes 85.255.235.132:53064->192.168.1.76:4500,ifindex=5,vrf=0....
ike 0: IKEv1 exchange=Quick id=bed40f6733f17281/b52e54bc6632d63b:00000004 len=60 vrf=0
ike 0: in BED40F6733F17281B52E54BC6632D63B08102001000000040000003C2673A224989E0F132B2C74E3762C08E4C5CDBFC44E03851602AF437909921037
ike 0:L2TP VPN_0:3288: dec BED40F6733F17281B52E54BC6632D63B08102001000000040000003C0000001848C41D2C9DF7A499B26E28CDE0C15DB2BD68E3F10000000000000000
ike 0:L2TP VPN_0:L2TP VPN:317869: send SA_DONE SPI 0x2c280b9e
ike 0: comes 85.255.235.132:53064->192.168.1.76:4500,ifindex=5,vrf=0....
ike 0: IKEv1 exchange=Informational id=bed40f6733f17281/b52e54bc6632d63b:fbbe040e len=76 vrf=0
ike 0: in BED40F6733F17281B52E54BC6632D63B08100501FBBE040E0000004CEC4FEAA1FD42D5DBFB28EACC04983E3561229E1CA80D36EF47BB3616DC6E8A40BBE45C3124100FF0ED3027A5912B846D
ike 0:L2TP VPN_0:3288: dec BED40F6733F17281B52E54BC6632D63B08100501FBBE040E0000004C0C00001848352AF5E003A480DFB2C23A39A41C44AB7EA44B000000100000000103040001FA86CCD00000000000000000
ike 0:L2TP VPN_0:3288: recv IPsec SA delete, spi count 1
ike 0:L2TP VPN_0: deleting IPsec SA with SPI fa86ccd0
ike 0:L2TP VPN_0:L2TP VPN: deleted IPsec SA with SPI fa86ccd0, SA count: 1
ike 0:L2TP VPN_0: NAT keep-alive 5 192.168.1.76->85.255.235.132:53064.
ike 0:L2TP VPN_0:3288: out FF
ike 0:L2TP VPN_0:3288: sent IKE msg (keepalive): 192.168.1.76:4500->85.255.235.132:53064, len=1, vrf=0, id=ff00000000000000/0000000049010000
ike 0: comes 86.31.248.15:4500->192.168.1.76:4500,ifindex=5,vrf=0....
ike 0: IKEv1 exchange=Informational id=62a9ac258d5167b0/40b63da668636190:e0c91add len=108 vrf=0
ike 0: in 62A9AC258D5167B040B63DA66863619008100501E0C91ADD0000006C180CCD59667A88998823A76FEB9B1F24DC7A2BEFAD58888035792105351CF357237E0F1D5599BC5CC11885777711800959BE4349AC3094E2B0E9DF805E91F735AFAFC2EFD53BB7332C454C682B1CA8AE
ike 0:NewcastleOffice:3093: dec 62A9AC258D5167B040B63DA66863619008100501E0C91ADD0000006C0B0000249229357DEAAE278C101AAA7A856D9327684CB28B10DC1714EBBD3C217EDB1427000000200000000101108D2862A9AC258D5167B040B63DA6686361900000824F0C80D1C42FC7A1822F33390B
ike 0:NewcastleOffice:3093: notify msg received: R-U-THERE
ike 0:NewcastleOffice:3093: enc 62A9AC258D5167B040B63DA66863619008100501FE37B917000000600B000024D1B848B5F228753B2D633234183C81D98A31DAF94D32901A696146AC8E488191000000200000000101108D2962A9AC258D5167B040B63DA6686361900000824F
ike 0:NewcastleOffice:3093: out 62A9AC258D5167B040B63DA66863619008100501FE37B9170000006CED2D819D145C8E98AFBF605B0F5A5D40A019A0EDEEE689D19C28AA928B0A89B062E7D0E420CA6708BC3EA02D7CA3C55D8D7830F3CC7D7C6690BDF122F4E396F1CE39FC5795C0402D48D0BF0522EFB42B
ike 0:NewcastleOffice:3093: sent IKE msg (R-U-THERE-ACK): 192.168.1.76:4500->86.31.248.15:4500, len=108, vrf=0, id=62a9ac258d5167b0/40b63da668636190:fe37b917
ike shrank heap by 118784 bytes
ike 0:Brigg-to-cloud: link is idle 5 192.168.1.76->52.151.83.162:4500 dpd=2 seqno=9f3 rr=0
ike 0:Brigg-to-cloud:2964: send IKEv1 DPD probe, seqno 2547
ike 0:Brigg-to-cloud:2964: enc C2FDD1326D0F0D8A7061042D47A547F3081005015B04905D000000600B000024A5FFDE7689CE2A86E61BBE8C32174C736C3DFD83D3E2EA865F02BC4A212423D4000000200000000101108D28C2FDD1326D0F0D8A7061042D47A547F3000009F3
ike 0:Brigg-to-cloud:2964: out C2FDD1326D0F0D8A7061042D47A547F3081005015B04905D0000006C54E24868B592B9CA36DA593CA283A6149F3C383C298F8750B7441C3090FB4F4940141E074FA397CCC407CE9FAB512BD698F4BBF4DBAB28C8E2D4AF0B1861475ED1CD87C56436A1F3B01914CFC9485AAC
ike 0:Brigg-to-cloud:2964: sent IKE msg (R-U-THERE): 192.168.1.76:4500->52.151.83.162:4500, len=108, vrf=0, id=c2fdd1326d0f0d8a/7061042d47a547f3:5b04905d
ike 0: comes 52.151.83.162:4500->192.168.1.76:4500,ifindex=5,vrf=0....
ike 0: IKEv1 exchange=Informational id=c2fdd1326d0f0d8a/7061042d47a547f3:cc53c349 len=108 vrf=0
ike 0: in C2FDD1326D0F0D8A7061042D47A547F308100501CC53C3490000006C5521F0E13CD58F920A807C9A7AFDF528D507EB2D3943B531B9FAB49D2B1999F2F39B81196F1124042CCD21FE8ABD065D1A691845B09B532DCCCA0B28276464ABF29BA8BEDDC3B08F6A7244E9D08AB881
ike 0:Brigg-to-cloud:2964: dec C2FDD1326D0F0D8A7061042D47A547F308100501CC53C3490000006C0B000024EC3BC8BCA6288F82293C94EC376D6A92E0419588EE832AD07FC93D4635A5D621000000200000000101108D29C2FDD1326D0F0D8A7061042D47A547F3000009F372A3862EA1E9EFDEFA848A0B
ike 0:Brigg-to-cloud:2964: notify msg received: R-U-THERE-ACK
ike 0: comes 85.255.235.132:53064->192.168.1.76:4500,ifindex=5,vrf=0....
ike 0: IKEv1 exchange=Quick id=bed40f6733f17281/b52e54bc6632d63b:00000005 len=436 vrf=0
ike 0: in BED40F6733F17281B52E54BC6632D63B0810200100000005000001B4B3AF8DEFE533FB61467A5194D45964EE6E8C9392D3C16B9B4840ADF95BE942F261C6DD18DE909553926C58478F86A89A2C1FA3A471CE3D0A559E0E8D0AF6BF3EB4BC4D33040B6F2E985FEE70C2826B3EC5EEE02EDCF63EBB6C2C4E1D823E5273ACD208C9EF4872C4E545D2902A77E09AE247DE3275AC5DF9E052B89F0B96951DF07349D849B7F62F202FE0910E3BEEA05B6150FC40555A9A3733FAF8AA83925581A52C98831BADD0945F477813A3E525D5BE839A941EB518464F341BD869A8558E89CE06820194F3BD039E1A92942254F8FD5ED2B21094F0718FD754DDBE64BC69495E07A93BA2B7710ACEDE2BE3224DFE30727820A78B10CA5EBA27BA545167E4E1E28DCE6A0BBFE8CE33C6114552EC27AEDB8CECAE3902F36BB523F1F0B8A45196C4A2CDCA93DCC1AB29C7311DF7958EECB724D3AC43BA6C6454E75CA6A0462928CE4E915BD4F669CF4642A4FB218D2465C1564D7049FCEF7C9627487ABB37BA199FE1EF6AC6E0AA8AA09477415691DD5FB5A5C0C1E2D2909F70323319845E580B1A372A988341AE1509B3EDD453ECA551C0C8AD8F965F
ike 0:L2TP VPN_0:3288:317872: responder received first quick-mode message
ike 0:L2TP VPN_0:3288: dec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
ike 0:L2TP VPN_0:3288:317872: received NATOA-i 172.20.10.2
ike 0:L2TP VPN_0:3288:317872: received NATOA-r 81.130.154.123
ike 0:L2TP VPN_0:3288:317872: peer proposal is: peer:17:172.20.10.2-172.20.10.2:1701, me:17:81.130.154.123-81.130.154.123:1701
ike 0:L2TP VPN_0:3288:L2TP VPN:317872: trying
ike 0:L2TP VPN_0:3288:317872: transport mode, override with 17:192.168.1.76-192.168.1.76:1701 -> 17:85.255.235.132-85.255.235.132:0
ike 0:L2TP VPN_0:3288:L2TP VPN:317872: matched phase2
ike 0:L2TP VPN_0:3288:L2TP VPN:317872: dynamic client
ike 0:L2TP VPN_0:3288:L2TP VPN:317872: my proposal:
ike 0:L2TP VPN_0:3288:L2TP VPN:317872: proposal id = 1:
ike 0:L2TP VPN_0:3288:L2TP VPN:317872: protocol id = IPSEC_ESP:
ike 0:L2TP VPN_0:3288:L2TP VPN:317872: trans_id = ESP_AES_CBC (key_len = 256)
ike 0:L2TP VPN_0:3288:L2TP VPN:317872: encapsulation = ENCAPSULATION_MODE_TRANSPORT
ike 0:L2TP VPN_0:3288:L2TP VPN:317872: type = AUTH_ALG, val=MD5
ike 0:L2TP VPN_0:3288:L2TP VPN:317872: trans_id = ESP_3DES
ike 0:L2TP VPN_0:3288:L2TP VPN:317872: encapsulation = ENCAPSULATION_MODE_TRANSPORT
ike 0:L2TP VPN_0:3288:L2TP VPN:317872: type = AUTH_ALG, val=SHA1
ike 0:L2TP VPN_0:3288:L2TP VPN:317872: trans_id = ESP_AES_CBC (key_len = 192)
ike 0:L2TP VPN_0:3288:L2TP VPN:317872: encapsulation = ENCAPSULATION_MODE_TRANSPORT
ike 0:L2TP VPN_0:3288:L2TP VPN:317872: type = AUTH_ALG, val=SHA1
ike 0:L2TP VPN_0:3288:L2TP VPN:317872: incoming proposal:
ike 0:L2TP VPN_0:3288:L2TP VPN:317872: proposal id = 1:
ike 0:L2TP VPN_0:3288:L2TP VPN:317872: protocol id = IPSEC_ESP:
ike 0:L2TP VPN_0:3288:L2TP VPN:317872: trans_id = ESP_AES_CBC (key_len = 256)
ike 0:L2TP VPN_0:3288:L2TP VPN:317872: encapsulation = UDP_ENCAPSULATION_MODE_TRANSPORT_RFC3947
ike 0:L2TP VPN_0:3288:L2TP VPN:317872: type = AUTH_ALG, val=SHA1
ike 0:L2TP VPN_0:3288:L2TP VPN:317872: incoming proposal:
ike 0:L2TP VPN_0:3288:L2TP VPN:317872: proposal id = 2:
ike 0:L2TP VPN_0:3288:L2TP VPN:317872: protocol id = IPSEC_ESP:
ike 0:L2TP VPN_0:3288:L2TP VPN:317872: trans_id = ESP_AES_CBC (key_len = 128)
ike 0:L2TP VPN_0:3288:L2TP VPN:317872: encapsulation = UDP_ENCAPSULATION_MODE_TRANSPORT_RFC3947
ike 0:L2TP VPN_0:3288:L2TP VPN:317872: type = AUTH_ALG, val=SHA1
ike 0:L2TP VPN_0:3288:L2TP VPN:317872: incoming proposal:
ike 0:L2TP VPN_0:3288:L2TP VPN:317872: proposal id = 3:
ike 0:L2TP VPN_0:3288:L2TP VPN:317872: protocol id = IPSEC_ESP:
ike 0:L2TP VPN_0:3288:L2TP VPN:317872: trans_id = ESP_3DES
ike 0:L2TP VPN_0:3288:L2TP VPN:317872: encapsulation = UDP_ENCAPSULATION_MODE_TRANSPORT_RFC3947
ike 0:L2TP VPN_0:3288:L2TP VPN:317872: type = AUTH_ALG, val=SHA1
ike 0:L2TP VPN_0:3288:L2TP VPN:317872: negotiation result
ike 0:L2TP VPN_0:3288:L2TP VPN:317872: proposal id = 3:
ike 0:L2TP VPN_0:3288:L2TP VPN:317872: protocol id = IPSEC_ESP:
ike 0:L2TP VPN_0:3288:L2TP VPN:317872: trans_id = ESP_3DES
ike 0:L2TP VPN_0:3288:L2TP VPN:317872: encapsulation = ENCAPSULATION_MODE_TRANSPORT
ike 0:L2TP VPN_0:3288:L2TP VPN:317872: type = AUTH_ALG, val=SHA1
ike 0:L2TP VPN_0:3288:L2TP VPN:317872: using udp transport mode.
ike 0:L2TP VPN_0:3288:317872: sending NATOA-i 85.255.235.132
ike 0:L2TP VPN_0:3288:317872: sending NATOA-r 192.168.1.76
ike 0:L2TP VPN_0:3288:L2TP VPN:317872: replay protection enabled
ike 0:L2TP VPN_0:3288:L2TP VPN:317872: SA life soft seconds=3586.
ike 0:L2TP VPN_0:3288:L2TP VPN:317872: SA life hard seconds=3600.
ike 0:L2TP VPN_0:3288:L2TP VPN:317872: IPsec SA selectors #src=1 #dst=1
ike 0:L2TP VPN_0:3288:L2TP VPN:317872: src 0 7 17:192.168.1.76-192.168.1.76:1701
ike 0:L2TP VPN_0:3288:L2TP VPN:317872: dst 0 7 17:85.255.235.132-85.255.235.132:0
ike 0:L2TP VPN_0:3288:L2TP VPN:317872: add dynamic IPsec SA selectors
ike 0:L2TP VPN_0:3288:L2TP VPN:317872: added dynamic IPsec SA proxyids, existing serial 1
ike 0:L2TP VPN_0:3288:L2TP VPN:317872: add IPsec SA: SPIs=5beece1a/b1778bec
ike 0:L2TP VPN_0:3288:L2TP VPN:317872: IPsec SA dec spi 5beece1a key 24:13D0A756CFEB60A88F6E00976C0AD138E1D3C834A8531EE9 auth 20:73E977B398967A965D6F81223EFB7E5F77C4E635
ike 0:L2TP VPN_0:3288:L2TP VPN:317872: IPsec SA enc spi b1778bec key 24:C71E34DF5D80B474F0548627D9EDF069D42917818C3DBBEA auth 20:3D94FE08B35DF2493672E5139391E0D938031D04
ike 0:L2TP VPN_0:3288:L2TP VPN:317872: transport mode encapsulation is enabled
ike 0:L2TP VPN_0:3288:L2TP VPN:317872: added IPsec SA: SPIs=5beece1a/b1778bec
ike 0:L2TP VPN_0:3288: enc BED40F6733F17281B52E54BC6632D63B0810200100000005000000B8010000185DC2043CDF6606F80F2982ECA675D011005BCAD80A000040000000010000000100000034030304015BEECE1A00000028010300008004000480050002800100010002000400000E1080010002000200040003D09005000014DFEC1C2DD8972797DE1CDB9E0E9DC5290500000C011106A5AC140A021500000C011106A551829A7B1500000C0100000055FFEB840000000C01000000C0A8014C
ike 0:L2TP VPN_0:3288: out BED40F6733F17281B52E54BC6632D63B0810200100000005000000BCAA9575C9A6D6253E42191F641AF74017508575E415A3E08C6FD7114C385C75E634686917E7EB8514C27591EF596CCF3B770B3E2B6342D1A7460CC622B3102B3259FA9273C3EAADAB6E6C5B766A1BC5D311C893EC64A1ABDA6532CE11FEEBC7B231E259C47A6AC9A814EA3372FD740D11BCBFA29C61876503EB2F637CDD113F23A5FC983EA74BA963F6F569C34A53DA0BFEA66C99771CD7AD5D83554ECD0BC629
ike 0:L2TP VPN_0:3288: sent IKE msg (quick_r1send): 192.168.1.76:4500->85.255.235.132:53064, len=188, vrf=0, id=bed40f6733f17281/b52e54bc6632d63b:00000005
ike 0: comes 85.255.235.132:53064->192.168.1.76:4500,ifindex=5,vrf=0....
ike 0: IKEv1 exchange=Quick id=bed40f6733f17281/b52e54bc6632d63b:00000005 len=60 vrf=0
ike 0: in BED40F6733F17281B52E54BC6632D63B08102001000000050000003C18AE1D72645F4DD51EECA768FAAAF6BB16DAEF90F03CDC827DC77B8D80DD5FE9
ike 0:L2TP VPN_0:3288: dec BED40F6733F17281B52E54BC6632D63B08102001000000050000003C00000018DE8429FA9ED9FF63F034DB05255729789FE81EFB0000000000000000
ike 0:L2TP VPN_0:L2TP VPN:317872: send SA_DONE SPI 0xb1778bec
ike 0: comes 85.255.235.132:53064->192.168.1.76:4500,ifindex=5,vrf=0....
ike 0: IKEv1 exchange=Informational id=bed40f6733f17281/b52e54bc6632d63b:55c1c289 len=76 vrf=0
ike 0: in BED40F6733F17281B52E54BC6632D63B0810050155C1C2890000004C1B51697FE99064996384D059579CFD3C17031039A7A9BB512C729DE15F87695724E8C5997A1774470F40E4E2EE79088A
ike 0:L2TP VPN_0:3288: dec BED40F6733F17281B52E54BC6632D63B0810050155C1C2890000004C0C000018752B8B68091259608F1DDEDC33F046D49575A6CC0000001000000001030400012C280B9E0000000000000000
ike 0:L2TP VPN_0:3288: recv IPsec SA delete, spi count 1
ike 0:L2TP VPN_0: deleting IPsec SA with SPI 2c280b9e
ike 0:L2TP VPN_0:L2TP VPN: deleted IPsec SA with SPI 2c280b9e, SA count: 1
ike 0:L2TP VPN_0: NAT keep-alive 5 192.168.1.76->85.255.235.132:53064.
ike 0:L2TP VPN_0:3288: out FF
ike 0:L2TP VPN_0:3288: sent IKE msg (keepalive): 192.168.1.76:4500->85.255.235.132:53064, len=1, vrf=0, id=ff00000000000000/0000000009010000:303a2049
ike shrank heap by 126976 bytes
ike 0:Brigg-to-cloud: NAT keep-alive 5 192.168.1.76->52.151.83.162:4500.
ike 0:Brigg-to-cloud:2964: out FF
ike 0:Brigg-to-cloud:2964: sent IKE msg (keepalive): 192.168.1.76:4500->52.151.83.162:4500, len=1, vrf=0, id=ff00000000000000/0000000021000000:4c2ab482
ike 0: comes 85.255.235.132:53064->192.168.1.76:4500,ifindex=5,vrf=0....
ike 0: IKEv1 exchange=Quick id=bed40f6733f17281/b52e54bc6632d63b:00000006 len=436 vrf=0
ike 0: in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
ike 0:L2TP VPN_0:3288:317873: responder received first quick-mode message
ike 0:L2TP VPN_0:3288: dec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
ike 0:L2TP VPN_0:3288:317873: received NATOA-i 172.20.10.2
ike 0:L2TP VPN_0:3288:317873: received NATOA-r 81.130.154.123
ike 0:L2TP VPN_0:3288:317873: peer proposal is: peer:17:172.20.10.2-172.20.10.2:1701, me:17:81.130.154.123-81.130.154.123:1701
ike 0:L2TP VPN_0:3288:L2TP VPN:317873: trying
ike 0:L2TP VPN_0:3288:317873: transport mode, override with 17:192.168.1.76-192.168.1.76:1701 -> 17:85.255.235.132-85.255.235.132:0
ike 0:L2TP VPN_0:3288:L2TP VPN:317873: matched phase2
ike 0:L2TP VPN_0:3288:L2TP VPN:317873: dynamic client
ike 0:L2TP VPN_0:3288:L2TP VPN:317873: my proposal:
ike 0:L2TP VPN_0:3288:L2TP VPN:317873: proposal id = 1:
ike 0:L2TP VPN_0:3288:L2TP VPN:317873: protocol id = IPSEC_ESP:
ike 0:L2TP VPN_0:3288:L2TP VPN:317873: trans_id = ESP_AES_CBC (key_len = 256)
ike 0:L2TP VPN_0:3288:L2TP VPN:317873: encapsulation = ENCAPSULATION_MODE_TRANSPORT
ike 0:L2TP VPN_0:3288:L2TP VPN:317873: type = AUTH_ALG, val=MD5
ike 0:L2TP VPN_0:3288:L2TP VPN:317873: trans_id = ESP_3DES
ike 0:L2TP VPN_0:3288:L2TP VPN:317873: encapsulation = ENCAPSULATION_MODE_TRANSPORT
ike 0:L2TP VPN_0:3288:L2TP VPN:317873: type = AUTH_ALG, val=SHA1
ike 0:L2TP VPN_0:3288:L2TP VPN:317873: trans_id = ESP_AES_CBC (key_len = 192)
ike 0:L2TP VPN_0:3288:L2TP VPN:317873: encapsulation = ENCAPSULATION_MODE_TRANSPORT
ike 0:L2TP VPN_0:3288:L2TP VPN:317873: type = AUTH_ALG, val=SHA1
ike 0:L2TP VPN_0:3288:L2TP VPN:317873: incoming proposal:
ike 0:L2TP VPN_0:3288:L2TP VPN:317873: proposal id = 1:
ike 0:L2TP VPN_0:3288:L2TP VPN:317873: protocol id = IPSEC_ESP:
ike 0:L2TP VPN_0:3288:L2TP VPN:317873: trans_id = ESP_AES_CBC (key_len = 256)
ike 0:L2TP VPN_0:3288:L2TP VPN:317873: encapsulation = UDP_ENCAPSULATION_MODE_TRANSPORT_RFC3947
ike 0:L2TP VPN_0:3288:L2TP VPN:317873: type = AUTH_ALG, val=SHA1
ike 0:L2TP VPN_0:3288:L2TP VPN:317873: incoming proposal:
ike 0:L2TP VPN_0:3288:L2TP VPN:317873: proposal id = 2:
ike 0:L2TP VPN_0:3288:L2TP VPN:317873: protocol id = IPSEC_ESP:
ike 0:L2TP VPN_0:3288:L2TP VPN:317873: trans_id = ESP_AES_CBC (key_len = 128)
ike 0:L2TP VPN_0:3288:L2TP VPN:317873: encapsulation = UDP_ENCAPSULATION_MODE_TRANSPORT_RFC3947
ike 0:L2TP VPN_0:3288:L2TP VPN:317873: type = AUTH_ALG, val=SHA1
ike 0:L2TP VPN_0:3288:L2TP VPN:317873: incoming proposal:
ike 0:L2TP VPN_0:3288:L2TP VPN:317873: proposal id = 3:
ike 0:L2TP VPN_0:3288:L2TP VPN:317873: protocol id = IPSEC_ESP:
ike 0:L2TP VPN_0:3288:L2TP VPN:317873: trans_id = ESP_3DES
ike 0:L2TP VPN_0:3288:L2TP VPN:317873: encapsulation = UDP_ENCAPSULATION_MODE_TRANSPORT_RFC3947
ike 0:L2TP VPN_0:3288:L2TP VPN:317873: type = AUTH_ALG, val=SHA1
ike 0:L2TP VPN_0:3288:L2TP VPN:317873: negotiation result
ike 0:L2TP VPN_0:3288:L2TP VPN:317873: proposal id = 3:
ike 0:L2TP VPN_0:3288:L2TP VPN:317873: protocol id = IPSEC_ESP:
ike 0:L2TP VPN_0:3288:L2TP VPN:317873: trans_id = ESP_3DES
ike 0:L2TP VPN_0:3288:L2TP VPN:317873: encapsulation = ENCAPSULATION_MODE_TRANSPORT
ike 0:L2TP VPN_0:3288:L2TP VPN:317873: type = AUTH_ALG, val=SHA1
ike 0:L2TP VPN_0:3288:L2TP VPN:317873: using udp transport mode.
ike 0:L2TP VPN_0:3288:317873: sending NATOA-i 85.255.235.132
ike 0:L2TP VPN_0:3288:317873: sending NATOA-r 192.168.1.76
ike 0:L2TP VPN_0:3288:L2TP VPN:317873: replay protection enabled
ike 0:L2TP VPN_0:3288:L2TP VPN:317873: SA life soft seconds=3588.
ike 0:L2TP VPN_0:3288:L2TP VPN:317873: SA life hard seconds=3600.
ike 0:L2TP VPN_0:3288:L2TP VPN:317873: IPsec SA selectors #src=1 #dst=1
ike 0:L2TP VPN_0:3288:L2TP VPN:317873: src 0 7 17:192.168.1.76-192.168.1.76:1701
ike 0:L2TP VPN_0:3288:L2TP VPN:317873: dst 0 7 17:85.255.235.132-85.255.235.132:0
ike 0:L2TP VPN_0:3288:L2TP VPN:317873: add dynamic IPsec SA selectors
ike 0:L2TP VPN_0:3288:L2TP VPN:317873: added dynamic IPsec SA proxyids, existing serial 1
ike 0:L2TP VPN_0:3288:L2TP VPN:317873: add IPsec SA: SPIs=5beece1b/2aaed9fe
ike 0:L2TP VPN_0:3288:L2TP VPN:317873: IPsec SA dec spi 5beece1b key 24:7FF24911F7B2FAF4B731CAFB65C5B6A451036B10CE85F918 auth 20:4BAFA4E3C639155D0B5FF41A45B59D47CA2C62B7
ike 0:L2TP VPN_0:3288:L2TP VPN:317873: IPsec SA enc spi 2aaed9fe key 24:14E0CAE23D9C40C7B8B39F273E5AF1BED354164230EA35E5 auth 20:E18BF6D8650EAF0F86BA7DFD615A6D1C2771E47A
ike 0:L2TP VPN_0:3288:L2TP VPN:317873: transport mode encapsulation is enabled
ike 0:L2TP VPN_0:3288:L2TP VPN:317873: added IPsec SA: SPIs=5beece1b/2aaed9fe
ike 0:L2TP VPN_0:3288: enc BED40F6733F17281B52E54BC6632D63B0810200100000006000000B80100001822ED3877500E4864538F29988659FFEB34DB8DC50A000040000000010000000100000034030304015BEECE1B00000028010300008004000480050002800100010002000400000E1080010002000200040003D090050000147603122CF2C821221201679D31C872980500000C011106A5AC140A021500000C011106A551829A7B1500000C0100000055FFEB840000000C01000000C0A8014C
ike 0:L2TP VPN_0:3288: out BED40F6733F17281B52E54BC6632D63B0810200100000006000000BC9D624B561D2D9BA9A97FBEC208E8BB3F5F4D6DBF3326BC28CFE745318FEC00903AF8971B721D9F4190B966CDCE23EA36E5BA25D4CF49988642699047972F1338C48704DB230D7CAA9828BD6B3FC40473A1C0E431A9F2243E52831B7AAAF88CE7BFA04B79B8356978C531BA83B2D093C42B406E0635C0F911494B2998FD7290F5A684A5C2413DDB2123A84A767C09DBFE41CB890265DF0669E6C82F693083323C
ike 0:L2TP VPN_0:3288: sent IKE msg (quick_r1send): 192.168.1.76:4500->85.255.235.132:53064, len=188, vrf=0, id=bed40f6733f17281/b52e54bc6632d63b:00000006
ike 0: comes 85.255.235.132:53064->192.168.1.76:4500,ifindex=5,vrf=0....
ike 0: IKEv1 exchange=Quick id=bed40f6733f17281/b52e54bc6632d63b:00000006 len=60 vrf=0
ike 0: in BED40F6733F17281B52E54BC6632D63B08102001000000060000003C7C4F114214083ED45AE496800F032F9216DA25A1D4CE537F550435C414F4323D
ike 0:L2TP VPN_0:3288: dec BED40F6733F17281B52E54BC6632D63B08102001000000060000003C0000001841B04DF4F3AFA723B9AACA7B9475919D6BF37DCD0000000000000000
ike 0: comes 85.255.235.132:53064->192.168.1.76:4500,ifindex=5,vrf=0....
ike 0: IKEv1 exchange=Informational id=bed40f6733f17281/b52e54bc6632d63b:2004f1e4 len=76 vrf=0
ike 0: in BED40F6733F17281B52E54BC6632D63B081005012004F1E40000004C462027C528C9C052DBC26E5C367CD001BFB94BFD50B038EA9B6D045C97998AC382D55AAE053755A956C470059058B1A0
ike 0:L2TP VPN_0:3288: dec BED40F6733F17281B52E54BC6632D63B081005012004F1E40000004C0C0000186B761CEBF91FC7696C47CC2DCA4E6B301D344ABE000000100000000103040001B1778BEC0000000000000000
ike 0:L2TP VPN_0:3288: recv IPsec SA delete, spi count 1
ike 0:L2TP VPN_0: deleting IPsec SA with SPI b1778bec
ike 0:L2TP VPN_0:L2TP VPN: deleted IPsec SA with SPI b1778bec, SA count: 1
ike 0:L2TP VPN_0:L2TP VPN:317873: send SA_DONE SPI 0x2aaed9fe
ike 0:L2TP VPN_0: NAT keep-alive 5 192.168.1.76->85.255.235.132:53064.
ike 0:L2TP VPN_0:3288: out FF
ike 0:L2TP VPN_0:3288: sent IKE msg (keepalive): 192.168.1.76:4500->85.255.235.132:53064, len=1, vrf=0, id=ff00000000000000/0000000039000000
ike 0: comes 86.31.248.15:4500->192.168.1.76:4500,ifindex=5,vrf=0....
ike 0: IKEv1 exchange=Informational id=62a9ac258d5167b0/40b63da668636190:26152caf len=108 vrf=0
ike 0: in 62A9AC258D5167B040B63DA6686361900810050126152CAF0000006CA1804FCBA66BB5430B788BE755957DCD7F45FD3084C2CED85D4E8012A93D3C73C5689E34D090CD2E457C313F92FF52CE293D5C443474C97F8C41D875122CE021FC396AE86FD5E72786FDD3D8C0C988FC
ike 0:NewcastleOffice:3093: dec 62A9AC258D5167B040B63DA6686361900810050126152CAF0000006C0B000024EFB6DD57C0230407F2B14CF92CC616A2F1301BDE2FB4BCE0540B3E82797AA591000000200000000101108D2862A9AC258D5167B040B63DA66863619000008250966D92BE29DAFB2FB4E8080B
ike 0:NewcastleOffice:3093: notify msg received: R-U-THERE
ike 0:NewcastleOffice:3093: enc 62A9AC258D5167B040B63DA668636190081005019458BBE1000000600B0000241DCB60B376D0A5B7D5E641D47894412AE35C0023AFC5B918AF792542EA212115000000200000000101108D2962A9AC258D5167B040B63DA66863619000008250
ike 0:NewcastleOffice:3093: out 62A9AC258D5167B040B63DA668636190081005019458BBE10000006C7D4870D4343C07E15690E90847920482AFD967EF78BBE41D4B7320BB5DF3F798301C288BDF1A0428138D1FB4E70368B68E70672D2DE214684D8642BB31154D4563C0B427A539F4521874CF5D4BE2B799
ike 0:NewcastleOffice:3093: sent IKE msg (R-U-THERE-ACK): 192.168.1.76:4500->86.31.248.15:4500, len=108, vrf=0, id=62a9ac258d5167b0/40b63da668636190:9458bbe1
ike 0: comes 85.255.235.132:53064->192.168.1.76:4500,ifindex=5,vrf=0....
ike 0: IKEv1 exchange=Informational id=bed40f6733f17281/b52e54bc6632d63b:171d7811 len=76 vrf=0
ike 0: in BED40F6733F17281B52E54BC6632D63B08100501171D78110000004C1CD2F56CD27A8B4EE2446EF88BC961F033DF831FC6BE2D2DDDD746D155EFA0EB350FABADBFA0C31EECB59A909F51474D
ike 0:L2TP VPN_0:3288: dec BED40F6733F17281B52E54BC6632D63B08100501171D78110000004C0C000018CE2907540DF60B4FA10E8DA6F3ADB0839399DF370000001000000001030400012AAED9FE0000000000000000
ike 0:L2TP VPN_0:3288: recv IPsec SA delete, spi count 1
ike 0:L2TP VPN_0: deleting IPsec SA with SPI 2aaed9fe
ike 0:L2TP VPN_0:L2TP VPN: deleted IPsec SA with SPI 2aaed9fe, SA count: 0
ike 0:L2TP VPN:317873: del route 85.255.235.132/255.255.255.255 oif L2TP VPN(65) metric 15 priority 0
ike 0:L2TP VPN_0: sending SNMP tunnel DOWN trap for L2TP VPN
ike 0:L2TP VPN_0:L2TP VPN: delete
ike 0: comes 85.255.235.132:53064->192.168.1.76:4500,ifindex=5,vrf=0....
ike 0: IKEv1 exchange=Informational id=bed40f6733f17281/b52e54bc6632d63b:351446d5 len=84 vrf=0
ike 0: in BED40F6733F17281B52E54BC6632D63B08100501351446D5000000540172CDB2DC8099FD1942C53E68321FB8ADA751FA24DF46B6747CDA0813B0B9390B0033912156B11A112B470E549B91529F54DD11C765A052
ike 0:L2TP VPN_0:3288: dec BED40F6733F17281B52E54BC6632D63B08100501351446D5000000540C00001883619DF3C3B90ED24710D1E2C0B3D1A32F15C6090000001C0000000101100001BED40F6733F17281B52E54BC6632D63B00000000
ike 0:L2TP VPN_0:3288: recv ISAKMP SA delete bed40f6733f17281/b52e54bc6632d63b
ike 0:L2TP VPN_0: deleting
ike 0:L2TP VPN_0: flushing
ike 0:L2TP VPN_0: sending SNMP tunnel DOWN trap
ike 0:L2TP VPN_0: flushed
ike 0:L2TP VPN_0: delete dynamic
ike 0:L2TP VPN_0: reset NAT-T
ike 0:L2TP VPN_0: deleted
1 REPLY 1
johnathan
Staff
Staff

ike 0:L2TP VPN_0:3288: dec BED40F6733F17281B52E54BC6632D63B08100501171D78110000004C0C000018CE2907540DF60B4FA10E8DA6F3ADB0839399DF370000001000000001030400012AAED9FE0000000000000000
ike 0:L2TP VPN_0:3288: recv IPsec SA delete, spi count 1
ike 0:L2TP VPN_0: deleting IPsec SA with SPI 2aaed9fe

Looks like the client is requesting for the tunnel to come down after it establishes on the FortiGate. Are you able to verify it happens on multiple different devices?