Fortinet Forum
The Forums are a place to find answers on a range of Fortinet products from peers and product experts.
moheyelbaz
New Contributor

L2TP not fully connecting after DMZ

Hello every one,

 

Kindly i have issue with fortigate 80f

 

the connection not fully established, it shown in connected peers for 10 seconds without any traffic and the connection was dropped.

 

the firewall is after fiber router and i'm using DMZ to forward traffic to firewall.

 

below you can find debug log.

for help please 

 

ike 0: comes 51.39.30.90:2369->192.168.100.10:500,ifindex=5....
ike 0: IKEv1 exchange=Identity Protection id=1e979cdc9e8163c1/0000000000000000 len=408
ike 0: in 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
ike 0:1e979cdc9e8163c1/0000000000000000:1: responder: main mode get 1st message...
ike 0:1e979cdc9e8163c1/0000000000000000:1: VID unknown (20): 01528BBBC00696121849AB9A1C5B2A5100000001
ike 0:1e979cdc9e8163c1/0000000000000000:1: VID MS NT5 ISAKMPOAKLEY 1E2B516905991C7D7C96FCBFB587E46100000009
ike 0:1e979cdc9e8163c1/0000000000000000:1: VID RFC 3947 4A131C81070358455C5728F20E95452F
ike 0:1e979cdc9e8163c1/0000000000000000:1: VID draft-ietf-ipsec-nat-t-ike-02\n 90CB80913EBB696E086381B5EC427B1F
ike 0:1e979cdc9e8163c1/0000000000000000:1: VID FRAGMENTATION 4048B7D56EBCE88525E7DE7F00D6C2D3
ike 0:1e979cdc9e8163c1/0000000000000000:1: VID unknown (16): FB1DE3CDF341B7EA16B7E5BE0855F120
ike 0:1e979cdc9e8163c1/0000000000000000:1: VID unknown (16): 26244D38EDDB61B3172A36E3D0CFB819
ike 0:1e979cdc9e8163c1/0000000000000000:1: VID unknown (16): E3A5966A76379FE707228231E5CE8652
ike 0:1e979cdc9e8163c1/0000000000000000:1: negotiation result
ike 0:1e979cdc9e8163c1/0000000000000000:1: proposal id = 1:
ike 0:1e979cdc9e8163c1/0000000000000000:1: protocol id = ISAKMP:
ike 0:1e979cdc9e8163c1/0000000000000000:1: trans_id = KEY_IKE.
ike 0:1e979cdc9e8163c1/0000000000000000:1: encapsulation = IKE/none
ike 0:1e979cdc9e8163c1/0000000000000000:1: type=OAKLEY_ENCRYPT_ALG, val=3DES_CBC.
ike 0:1e979cdc9e8163c1/0000000000000000:1: type=OAKLEY_HASH_ALG, val=SHA.
ike 0:1e979cdc9e8163c1/0000000000000000:1: type=AUTH_METHOD, val=PRESHARED_KEY.
ike 0:1e979cdc9e8163c1/0000000000000000:1: type=OAKLEY_GROUP, val=MODP1024.
ike 0:1e979cdc9e8163c1/0000000000000000:1: ISAKMP SA lifetime=86400
ike 0:1e979cdc9e8163c1/0000000000000000:1: SA proposal chosen, matched gateway OfficeVPN
ike 0:OfficeVPN: created connection: 0x182a6d50 5 192.168.100.10->51.39.30.90:2369.
ike 0:OfficeVPN:1: selected NAT-T version: RFC 3947
ike 0:OfficeVPN:1: cookie 1e979cdc9e8163c1/df35dc8cc4a1dc53
ike 0:OfficeVPN:1: out 1E979CDC9E8163C1DF35DC8CC4A1DC530110020000000000000000BC0D00003800000001000000010000002C01010001000000240501000080010005800200028004000280030001800B0001000C0004000070800D0000144A131C81070358455C5728F20E95452F0D000014AFCAD71368A1F1C96B8696FC775701000D0000148299031757A36082C6A621DE000000000D0000144048B7D56EBCE88525E7DE7F00D6C2D3000000184048B7D56EBCE88525E7DE7F00D6C2D3C0000000
ike 0:OfficeVPN:1: sent IKE msg (ident_r1send): 192.168.100.10:500->51.39.30.90:2369, len=188, id=1e979cdc9e8163c1/df35dc8cc4a1dc53
ike 0: comes 51.39.30.90:2369->192.168.100.10:500,ifindex=5....
ike 0: IKEv1 exchange=Identity Protection id=1e979cdc9e8163c1/df35dc8cc4a1dc53 len=260
ike 0: in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
ike 0:OfficeVPN:1: responder:main mode get 2nd message...
ike 0:OfficeVPN:1: received NAT-D payload type 20
ike 0:OfficeVPN:1: received NAT-D payload type 20
ike 0:OfficeVPN:1: NAT detected: ME PEER
ike 0:OfficeVPN:1: out 1E979CDC9E8163C1DF35DC8CC4A1DC530410020000000000000000E40A000084354867A04CF3E199AA9AF39A862731305774BF285081DA93B6E56EE7C6FB36B98DF672ED55FDE084943129C6EB5AB255B32CC6540B66E5895C1B17694F86CD25C067735F11A68CEC565F5681953E42A14F12769E82D534394710E1274B98930333A641603907C9DFBFA105326A4D862085DFD3AE3EF5438FAABC86DD9985DF0314000014B862AD9833ABE0372DE959B0ED506976140000184BC96B7EA499991773EB46A09A1566F27B4EB99F000000185955FCA0B4FC67A451682F84CFC4F73A26F69C95
ike 0:OfficeVPN:1: sent IKE msg (ident_r2send): 192.168.100.10:500->51.39.30.90:2369, len=228, id=1e979cdc9e8163c1/df35dc8cc4a1dc53
ike 0:OfficeVPN:1: ISAKMP SA 1e979cdc9e8163c1/df35dc8cc4a1dc53 key 24:4AA5810A87284D5BBBC5783EC4B72335C339199F57EEDBE4
ike 0: comes 51.39.30.90:2370->192.168.100.10:4500,ifindex=5....
ike 0: IKEv1 exchange=Identity Protection id=1e979cdc9e8163c1/df35dc8cc4a1dc53 len=68
ike 0: in 1E979CDC9E8163C1DF35DC8CC4A1DC53051002010000000000000044559E2E76D2C6D59E526358419D94C685A53BCC304A8FF200D0E954AAC406FB2A643D57646553A7CC
ike 0:OfficeVPN:1: responder: main mode get 3rd message...
ike 0:OfficeVPN:1: dec 1E979CDC9E8163C1DF35DC8CC4A1DC530510020100000000000000440800000C01000000C0A8010400000018D7906A13263704511DD8A5BAAC1A218E7A2BE23400000000
ike 0:OfficeVPN:1: peer identifier IPV4_ADDR 192.168.1.4
ike 0:OfficeVPN:1: PSK authentication succeeded
ike 0:OfficeVPN:1: authentication OK
ike 0:OfficeVPN:1: enc 1E979CDC9E8163C1DF35DC8CC4A1DC530510020100000000000000400800000C01000000C0A8640A0000001868F11C33CAE072D9E0CDF84D29047B7F4FBD8E6C
ike 0:OfficeVPN:1: remote port change 2369 -> 2370
ike 0:OfficeVPN:1: out 1E979CDC9E8163C1DF35DC8CC4A1DC53051002010000000000000044A6D9EEB8A7E7E2977F49FE456C4B156C71D9386489AB9F9EE1EE42737969A6088F4B8BFB04920624
ike 0:OfficeVPN:1: sent IKE msg (ident_r3send): 192.168.100.10:4500->51.39.30.90:2370, len=68, id=1e979cdc9e8163c1/df35dc8cc4a1dc53
ike 0:OfficeVPN: adding new dynamic tunnel for 51.39.30.90:2370
ike 0:OfficeVPN_0: added new dynamic tunnel for 51.39.30.90:2370
ike 0:OfficeVPN_0:1: established IKE SA 1e979cdc9e8163c1/df35dc8cc4a1dc53
ike 0:OfficeVPN_0: DPD disabled, not negotiated
ike 0:OfficeVPN_0:1: check peer route: if_addr4_rcvd=0, if_addr6_rcvd=0
ike 0:OfficeVPN_0:1: no pending Quick-Mode negotiations
ike 0:OfficeVPN: carrier up
ike 0: comes 51.39.30.90:2370->192.168.100.10:4500,ifindex=5....
ike 0: IKEv1 exchange=Quick id=1e979cdc9e8163c1/df35dc8cc4a1dc53:00000001 len=436
ike 0: in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
ike 0:OfficeVPN_0:1:6: responder received first quick-mode message
ike 0:OfficeVPN_0:1: dec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
ike 0:OfficeVPN_0:1:6: received NATOA-i 192.168.1.4
ike 0:OfficeVPN_0:1:6: received NATOA-r 50.60.70.80
ike 0:OfficeVPN_0:1:6: peer proposal is: peer:17:192.168.1.4-192.168.1.4:1701, me:17:50.60.70.80-50.60.70.80:1701
ike 0:OfficeVPN_0:1:OfficeVPN:6: trying
ike 0:OfficeVPN_0:1:6: transport mode, override with 17:192.168.100.10-192.168.100.10:1701 -> 17:51.39.30.90-51.39.30.90:0
ike 0:OfficeVPN_0:1:OfficeVPN:6: matched phase2
ike 0:OfficeVPN_0:1:OfficeVPN:6: dynamic client
ike 0:OfficeVPN_0:1:OfficeVPN:6: my proposal:
ike 0:OfficeVPN_0:1:OfficeVPN:6: proposal id = 1:
ike 0:OfficeVPN_0:1:OfficeVPN:6: protocol id = IPSEC_ESP:
ike 0:OfficeVPN_0:1:OfficeVPN:6: trans_id = ESP_AES_CBC (key_len = 256)
ike 0:OfficeVPN_0:1:OfficeVPN:6: encapsulation = ENCAPSULATION_MODE_TRANSPORT
ike 0:OfficeVPN_0:1:OfficeVPN:6: type = AUTH_ALG, val=MD5
ike 0:OfficeVPN_0:1:OfficeVPN:6: trans_id = ESP_3DES
ike 0:OfficeVPN_0:1:OfficeVPN:6: encapsulation = ENCAPSULATION_MODE_TRANSPORT
ike 0:OfficeVPN_0:1:OfficeVPN:6: type = AUTH_ALG, val=SHA1
ike 0:OfficeVPN_0:1:OfficeVPN:6: trans_id = ESP_AES_CBC (key_len = 192)
ike 0:OfficeVPN_0:1:OfficeVPN:6: encapsulation = ENCAPSULATION_MODE_TRANSPORT
ike 0:OfficeVPN_0:1:OfficeVPN:6: type = AUTH_ALG, val=SHA1
ike 0:OfficeVPN_0:1:OfficeVPN:6: incoming proposal:
ike 0:OfficeVPN_0:1:OfficeVPN:6: proposal id = 1:
ike 0:OfficeVPN_0:1:OfficeVPN:6: protocol id = IPSEC_ESP:
ike 0:OfficeVPN_0:1:OfficeVPN:6: trans_id = ESP_AES_CBC (key_len = 256)
ike 0:OfficeVPN_0:1:OfficeVPN:6: encapsulation = UDP_ENCAPSULATION_MODE_TRANSPORT_RFC3947
ike 0:OfficeVPN_0:1:OfficeVPN:6: type = AUTH_ALG, val=SHA1
ike 0:OfficeVPN_0:1:OfficeVPN:6: incoming proposal:
ike 0:OfficeVPN_0:1:OfficeVPN:6: proposal id = 2:
ike 0:OfficeVPN_0:1:OfficeVPN:6: protocol id = IPSEC_ESP:
ike 0:OfficeVPN_0:1:OfficeVPN:6: trans_id = ESP_AES_CBC (key_len = 128)
ike 0:OfficeVPN_0:1:OfficeVPN:6: encapsulation = UDP_ENCAPSULATION_MODE_TRANSPORT_RFC3947
ike 0:OfficeVPN_0:1:OfficeVPN:6: type = AUTH_ALG, val=SHA1
ike 0:OfficeVPN_0:1:OfficeVPN:6: incoming proposal:
ike 0:OfficeVPN_0:1:OfficeVPN:6: proposal id = 3:
ike 0:OfficeVPN_0:1:OfficeVPN:6: protocol id = IPSEC_ESP:
ike 0:OfficeVPN_0:1:OfficeVPN:6: trans_id = ESP_3DES
ike 0:OfficeVPN_0:1:OfficeVPN:6: encapsulation = UDP_ENCAPSULATION_MODE_TRANSPORT_RFC3947
ike 0:OfficeVPN_0:1:OfficeVPN:6: type = AUTH_ALG, val=SHA1
ike 0:OfficeVPN_0:1:OfficeVPN:6: negotiation result
ike 0:OfficeVPN_0:1:OfficeVPN:6: proposal id = 3:
ike 0:OfficeVPN_0:1:OfficeVPN:6: protocol id = IPSEC_ESP:
ike 0:OfficeVPN_0:1:OfficeVPN:6: trans_id = ESP_3DES
ike 0:OfficeVPN_0:1:OfficeVPN:6: encapsulation = ENCAPSULATION_MODE_TRANSPORT
ike 0:OfficeVPN_0:1:OfficeVPN:6: type = AUTH_ALG, val=SHA1
ike 0:OfficeVPN_0:1:OfficeVPN:6: using udp transport mode.
ike 0:OfficeVPN_0:1:6: sending NATOA-i 51.39.30.90
ike 0:OfficeVPN_0:1:6: sending NATOA-r 192.168.100.10
ike 0:OfficeVPN_0:1:OfficeVPN:6: replay protection enabled
ike 0:OfficeVPN_0:1:OfficeVPN:6: SA life soft seconds=3586.
ike 0:OfficeVPN_0:1:OfficeVPN:6: SA life hard seconds=3600.
ike 0:OfficeVPN_0:1:OfficeVPN:6: IPsec SA selectors #src=1 #dst=1
ike 0:OfficeVPN_0:1:OfficeVPN:6: src 0 7 17:192.168.100.10-192.168.100.10:1701
ike 0:OfficeVPN_0:1:OfficeVPN:6: dst 0 7 17:51.39.30.90-51.39.30.90:0
ike 0:OfficeVPN_0:1:OfficeVPN:6: add dynamic IPsec SA selectors
ike 0:OfficeVPN_0:1:OfficeVPN:6: added dynamic IPsec SA proxyids, new serial 1
ike 0:OfficeVPN:6: add route 51.39.30.90/255.255.255.255 gw 51.39.30.90 oif OfficeVPN(47) metric 15 priority 0
ike 0:OfficeVPN_0:1:OfficeVPN:6: tunnel 1 of VDOM limit 0/0
ike 0:OfficeVPN_0:1:OfficeVPN:6: add IPsec SA: SPIs=b0584ff2/e42932c2
ike 0:OfficeVPN_0:1:OfficeVPN:6: IPsec SA dec spi b0584ff2 key 24:FBF19D746311CBBE40DD4938357C1AFCE0B2DA46AE380784 auth 20:1D7561E7D6031AF5BD524A24E24A38C018278055
ike 0:OfficeVPN_0:1:OfficeVPN:6: IPsec SA enc spi e42932c2 key 24:DD1CF91AE918DB77E02F610C053B45EB053396A292910F89 auth 20:63C5962A52D0E2128DD4903BFC530DB3DFDEFC97
ike 0:OfficeVPN_0:1:OfficeVPN:6: transport mode encapsulation is enabled
ike 0:OfficeVPN_0:1:OfficeVPN:6: added IPsec SA: SPIs=b0584ff2/e42932c2
ike 0:OfficeVPN_0:1:OfficeVPN:6: sending SNMP tunnel UP trap
ike 0:OfficeVPN_0:1: enc 1E979CDC9E8163C1DF35DC8CC4A1DC530810200100000001000000B8010000188828771FFA6570CDD556C564C8568E82EADE62E80A00004000000001000000010000003403030401B0584FF200000028010300008004000480050002800100010002000400000E1080010002000200040003D090050000144035B04BA5E5D935256737F1600D46280500000C011106A5C0A801041500000C011106A5B02DB5111500000C010000003327035E0000000C01000000C0A8640A
ike 0:OfficeVPN_0:1: out 1E979CDC9E8163C1DF35DC8CC4A1DC530810200100000001000000BC019524680137DC86C58649D885DB4D10D80AFC5828021DC9874E93048696575C206BD83B8263741900401DAD71C4B2E60815AD1E12C73F10D4D306FA23FAF6D17CA6AC561872343CB615B9299C825082C8AFB9E1B52B03C8C698EC395295029EC561BCAAEC15373713543281B1B1380CDBB98243B31F147D2EBA4C1CB82024546A4C98E248D1C4C4678D47B9BE1898BA750A26144D9830D3639B7FD646FDDF0F
ike 0:OfficeVPN_0:1: sent IKE msg (quick_r1send): 192.168.100.10:4500->51.39.30.90:2370, len=188, id=1e979cdc9e8163c1/df35dc8cc4a1dc53:00000001
ike 0: comes 51.39.30.90:2370->192.168.100.10:4500,ifindex=5....
ike 0: IKEv1 exchange=Quick id=1e979cdc9e8163c1/df35dc8cc4a1dc53:00000001 len=60
ike 0: in 1E979CDC9E8163C1DF35DC8CC4A1DC5308102001000000010000003CF5F7BE60C4658FB4E50D6ADE5E426656CAE910B18CFE5A9149C240D9795254BC
ike 0:OfficeVPN_0:1: dec 1E979CDC9E8163C1DF35DC8CC4A1DC5308102001000000010000003C0000001836CB48CB88FC3E08F5F5F1F4A907FEE6E0BB22910000000000000000
ike 0:OfficeVPN_0:OfficeVPN:6: send SA_DONE SPI 0xe42932c2
ike 0: comes 51.39.30.90:2370->192.168.100.10:4500,ifindex=5....
ike 0: IKEv1 exchange=Quick id=1e979cdc9e8163c1/df35dc8cc4a1dc53:00000002 len=436
ike 0: in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
ike 0:OfficeVPN_0:1:7: responder received first quick-mode message
ike 0:OfficeVPN_0:1: dec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
ike 0:OfficeVPN_0:1:7: received NATOA-i 192.168.1.4
ike 0:OfficeVPN_0:1:7: received NATOA-r 50.60.70.80
ike 0:OfficeVPN_0:1:7: peer proposal is: peer:17:192.168.1.4-192.168.1.4:1701, me:17:50.60.70.80-50.60.70.80:1701
ike 0:OfficeVPN_0:1:OfficeVPN:7: trying
ike 0:OfficeVPN_0:1:7: transport mode, override with 17:192.168.100.10-192.168.100.10:1701 -> 17:51.39.30.90-51.39.30.90:0
ike 0:OfficeVPN_0:1:OfficeVPN:7: matched phase2
ike 0:OfficeVPN_0:1:OfficeVPN:7: dynamic client
ike 0:OfficeVPN_0:1:OfficeVPN:7: my proposal:
ike 0:OfficeVPN_0:1:OfficeVPN:7: proposal id = 1:
ike 0:OfficeVPN_0:1:OfficeVPN:7: protocol id = IPSEC_ESP:
ike 0:OfficeVPN_0:1:OfficeVPN:7: trans_id = ESP_AES_CBC (key_len = 256)
ike 0:OfficeVPN_0:1:OfficeVPN:7: encapsulation = ENCAPSULATION_MODE_TRANSPORT
ike 0:OfficeVPN_0:1:OfficeVPN:7: type = AUTH_ALG, val=MD5
ike 0:OfficeVPN_0:1:OfficeVPN:7: trans_id = ESP_3DES
ike 0:OfficeVPN_0:1:OfficeVPN:7: encapsulation = ENCAPSULATION_MODE_TRANSPORT
ike 0:OfficeVPN_0:1:OfficeVPN:7: type = AUTH_ALG, val=SHA1
ike 0:OfficeVPN_0:1:OfficeVPN:7: trans_id = ESP_AES_CBC (key_len = 192)
ike 0:OfficeVPN_0:1:OfficeVPN:7: encapsulation = ENCAPSULATION_MODE_TRANSPORT
ike 0:OfficeVPN_0:1:OfficeVPN:7: type = AUTH_ALG, val=SHA1
ike 0:OfficeVPN_0:1:OfficeVPN:7: incoming proposal:
ike 0:OfficeVPN_0:1:OfficeVPN:7: proposal id = 1:
ike 0:OfficeVPN_0:1:OfficeVPN:7: protocol id = IPSEC_ESP:
ike 0:OfficeVPN_0:1:OfficeVPN:7: trans_id = ESP_AES_CBC (key_len = 256)
ike 0:OfficeVPN_0:1:OfficeVPN:7: encapsulation = UDP_ENCAPSULATION_MODE_TRANSPORT_RFC3947
ike 0:OfficeVPN_0:1:OfficeVPN:7: type = AUTH_ALG, val=SHA1
ike 0:OfficeVPN_0:1:OfficeVPN:7: incoming proposal:
ike 0:OfficeVPN_0:1:OfficeVPN:7: proposal id = 2:
ike 0:OfficeVPN_0:1:OfficeVPN:7: protocol id = IPSEC_ESP:
ike 0:OfficeVPN_0:1:OfficeVPN:7: trans_id = ESP_AES_CBC (key_len = 128)
ike 0:OfficeVPN_0:1:OfficeVPN:7: encapsulation = UDP_ENCAPSULATION_MODE_TRANSPORT_RFC3947
ike 0:OfficeVPN_0:1:OfficeVPN:7: type = AUTH_ALG, val=SHA1
ike 0:OfficeVPN_0:1:OfficeVPN:7: incoming proposal:
ike 0:OfficeVPN_0:1:OfficeVPN:7: proposal id = 3:
ike 0:OfficeVPN_0:1:OfficeVPN:7: protocol id = IPSEC_ESP:
ike 0:OfficeVPN_0:1:OfficeVPN:7: trans_id = ESP_3DES
ike 0:OfficeVPN_0:1:OfficeVPN:7: encapsulation = UDP_ENCAPSULATION_MODE_TRANSPORT_RFC3947
ike 0:OfficeVPN_0:1:OfficeVPN:7: type = AUTH_ALG, val=SHA1
ike 0:OfficeVPN_0:1:OfficeVPN:7: negotiation result
ike 0:OfficeVPN_0:1:OfficeVPN:7: proposal id = 3:
ike 0:OfficeVPN_0:1:OfficeVPN:7: protocol id = IPSEC_ESP:
ike 0:OfficeVPN_0:1:OfficeVPN:7: trans_id = ESP_3DES
ike 0:OfficeVPN_0:1:OfficeVPN:7: encapsulation = ENCAPSULATION_MODE_TRANSPORT
ike 0:OfficeVPN_0:1:OfficeVPN:7: type = AUTH_ALG, val=SHA1
ike 0:OfficeVPN_0:1:OfficeVPN:7: using udp transport mode.
ike 0:OfficeVPN_0:1:7: sending NATOA-i 51.39.30.90
ike 0:OfficeVPN_0:1:7: sending NATOA-r 192.168.100.10
ike 0:OfficeVPN_0:1:OfficeVPN:7: replay protection enabled
ike 0:OfficeVPN_0:1:OfficeVPN:7: SA life soft seconds=3588.
ike 0:OfficeVPN_0:1:OfficeVPN:7: SA life hard seconds=3600.
ike 0:OfficeVPN_0:1:OfficeVPN:7: IPsec SA selectors #src=1 #dst=1
ike 0:OfficeVPN_0:1:OfficeVPN:7: src 0 7 17:192.168.100.10-192.168.100.10:1701
ike 0:OfficeVPN_0:1:OfficeVPN:7: dst 0 7 17:51.39.30.90-51.39.30.90:0
ike 0:OfficeVPN_0:1:OfficeVPN:7: add dynamic IPsec SA selectors
ike 0:OfficeVPN_0:1:OfficeVPN:7: added dynamic IPsec SA proxyids, existing serial 1
ike 0:OfficeVPN_0:1:OfficeVPN:7: add IPsec SA: SPIs=b0584ff3/a7d66f14
ike 0:OfficeVPN_0:1:OfficeVPN:7: IPsec SA dec spi b0584ff3 key 24:6E7005C156D729BE588AC95A8A1802BFBE8E37BADEFA5D31 auth 20:F8419177064F47CF59A9638E5B784F6CDBFD8767
ike 0:OfficeVPN_0:1:OfficeVPN:7: IPsec SA enc spi a7d66f14 key 24:FB6A70D0FDDFEFB2F98D2A4C1CBF9CC7A0EC4648B12D1B20 auth 20:844DB8CA81B92919039C16A83E7690E42F01E06A
ike 0:OfficeVPN_0:1:OfficeVPN:7: transport mode encapsulation is enabled
ike 0:OfficeVPN_0:1:OfficeVPN:7: added IPsec SA: SPIs=b0584ff3/a7d66f14
ike 0:OfficeVPN_0:1: enc 1E979CDC9E8163C1DF35DC8CC4A1DC530810200100000002000000B801000018281DB9CBF61CA117B946E21361F8080F53F8191F0A00004000000001000000010000003403030401B0584FF300000028010300008004000480050002800100010002000400000E1080010002000200040003D090050000146BE0C9446CC696B75B727EFFC006B4780500000C011106A5C0A801041500000C011106A5B02DB5111500000C010000003327035E0000000C01000000C0A8640A
ike 0:OfficeVPN_0:1: out 1E979CDC9E8163C1DF35DC8CC4A1DC530810200100000002000000BC0CBFD068BF0664674A4A78FFEA749FC7FBAFBF03CD4BA683FEBB8D167F22C8CEB077D527D9AD7F148B68AC881AED0A6291FE67D2BA4AFA0A55B4EB3DFEB10603C99025B06A06C0AD14B5BF714237147D8A93E3BB446E65052202CFF27DCB19F7C094F79EC2AA1D9A10520BA336265AD335D2EE422490604A2465298024C26C1CA89E00DA5002322C1ACE2B90239B235302C21908A8599814524F88C772BA8F5E
ike 0:OfficeVPN_0:1: sent IKE msg (quick_r1send): 192.168.100.10:4500->51.39.30.90:2370, len=188, id=1e979cdc9e8163c1/df35dc8cc4a1dc53:00000002
ike 0: comes 51.39.30.90:2370->192.168.100.10:4500,ifindex=5....
ike 0: IKEv1 exchange=Quick id=1e979cdc9e8163c1/df35dc8cc4a1dc53:00000002 len=60
ike 0: in 1E979CDC9E8163C1DF35DC8CC4A1DC5308102001000000020000003C52DF9F62F6CC6F7B92E721902FDD0017C2A7F160EF281AD7437F94B141E7A204
ike 0:OfficeVPN_0:1: dec 1E979CDC9E8163C1DF35DC8CC4A1DC5308102001000000020000003C000000188D55399F9B35F80511E0C77EC4C7B507410765DA0000000000000000
ike 0:OfficeVPN_0:OfficeVPN:7: send SA_DONE SPI 0xa7d66f14
ike 0: comes 51.39.30.90:2370->192.168.100.10:4500,ifindex=5....
ike 0: IKEv1 exchange=Informational id=1e979cdc9e8163c1/df35dc8cc4a1dc53:3a6a133c len=76
ike 0: in 1E979CDC9E8163C1DF35DC8CC4A1DC53081005013A6A133C0000004C86E182D439514D1E740C9A32495BCD81F8CB6CA5AB8F15C0E8D833786C8B2D12667958A5F392A596BC563C672B8F3117
ike 0:OfficeVPN_0:1: dec 1E979CDC9E8163C1DF35DC8CC4A1DC53081005013A6A133C0000004C0C0000182DB69EA852284457D44B995748F3FC0348F19838000000100000000103040001E42932C20000000000000000
ike 0:OfficeVPN_0:1: recv IPsec SA delete, spi count 1
ike 0:OfficeVPN_0: deleting IPsec SA with SPI e42932c2
ike 0:OfficeVPN_0:OfficeVPN: deleted IPsec SA with SPI e42932c2, SA count: 1
ike 0: comes 51.39.30.90:2370->192.168.100.10:4500,ifindex=5....
ike 0: IKEv1 exchange=Quick id=1e979cdc9e8163c1/df35dc8cc4a1dc53:00000003 len=436
ike 0: in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
ike 0:OfficeVPN_0:1:8: responder received first quick-mode message
ike 0:OfficeVPN_0:1: dec 1E979CDC9E8163C1DF35DC8CC4A1DC530810200100000003000001B401000018C185A14E556D63A16F57968ADAF44492414560CF0A00011800000001000000010200003801030401E2F79D480000002C010C0000800400048006010080050002800100010002000400000E1080010002000200040003D0900200003802030401E2F79D480000002C010C0000800400048006008080050002800100010002000400000E1080010002000200040003D0900200003403030401E2F79D4800000028010300008004000480050002800100010002000400000E1080010002000200040003D0900200003404030401E2F79D4800000028010200008004000480050002800100010002000400000E1080010002000200040003D0900000003405030401E2F79D4800000028010B00008004000480050002800100010002000400000E1080010002000200040003D090050000340F6A04C3CAFE836AA239627CCF23BE6C24E90AFDDA2038A66EEF7A408CA18C38F189E8B5012BE887C03669AE5F54EAFE0500000C011106A5C0A801041500000C011106A5B02DB5111500000C01000000C0A801040000000C01000000B02DB51100000000
ike 0:OfficeVPN_0:1:8: received NATOA-i 192.168.1.4
ike 0:OfficeVPN_0:1:8: received NATOA-r 50.60.70.80
ike 0:OfficeVPN_0:1:8: peer proposal is: peer:17:192.168.1.4-192.168.1.4:1701, me:17:50.60.70.80-50.60.70.80:1701
ike 0:OfficeVPN_0:1:OfficeVPN:8: trying
ike 0:OfficeVPN_0:1:8: transport mode, override with 17:192.168.100.10-192.168.100.10:1701 -> 17:51.39.30.90-51.39.30.90:0
ike 0:OfficeVPN_0:1:OfficeVPN:8: matched phase2
ike 0:OfficeVPN_0:1:OfficeVPN:8: dynamic client
ike 0:OfficeVPN_0:1:OfficeVPN:8: my proposal:
ike 0:OfficeVPN_0:1:OfficeVPN:8: proposal id = 1:
ike 0:OfficeVPN_0:1:OfficeVPN:8: protocol id = IPSEC_ESP:
ike 0:OfficeVPN_0:1:OfficeVPN:8: trans_id = ESP_AES_CBC (key_len = 256)
ike 0:OfficeVPN_0:1:OfficeVPN:8: encapsulation = ENCAPSULATION_MODE_TRANSPORT
ike 0:OfficeVPN_0:1:OfficeVPN:8: type = AUTH_ALG, val=MD5
ike 0:OfficeVPN_0:1:OfficeVPN:8: trans_id = ESP_3DES
ike 0:OfficeVPN_0:1:OfficeVPN:8: encapsulation = ENCAPSULATION_MODE_TRANSPORT
ike 0:OfficeVPN_0:1:OfficeVPN:8: type = AUTH_ALG, val=SHA1
ike 0:OfficeVPN_0:1:OfficeVPN:8: trans_id = ESP_AES_CBC (key_len = 192)
ike 0:OfficeVPN_0:1:OfficeVPN:8: encapsulation = ENCAPSULATION_MODE_TRANSPORT
ike 0:OfficeVPN_0:1:OfficeVPN:8: type = AUTH_ALG, val=SHA1
ike 0:OfficeVPN_0:1:OfficeVPN:8: incoming proposal:
ike 0:OfficeVPN_0:1:OfficeVPN:8: proposal id = 1:
ike 0:OfficeVPN_0:1:OfficeVPN:8: protocol id = IPSEC_ESP:
ike 0:OfficeVPN_0:1:OfficeVPN:8: trans_id = ESP_AES_CBC (key_len = 256)
ike 0:OfficeVPN_0:1:OfficeVPN:8: encapsulation = UDP_ENCAPSULATION_MODE_TRANSPORT_RFC3947
ike 0:OfficeVPN_0:1:OfficeVPN:8: type = AUTH_ALG, val=SHA1
ike 0:OfficeVPN_0:1:OfficeVPN:8: incoming proposal:
ike 0:OfficeVPN_0:1:OfficeVPN:8: proposal id = 2:
ike 0:OfficeVPN_0:1:OfficeVPN:8: protocol id = IPSEC_ESP:
ike 0:OfficeVPN_0:1:OfficeVPN:8: trans_id = ESP_AES_CBC (key_len = 128)
ike 0:OfficeVPN_0:1:OfficeVPN:8: encapsulation = UDP_ENCAPSULATION_MODE_TRANSPORT_RFC3947
ike 0:OfficeVPN_0:1:OfficeVPN:8: type = AUTH_ALG, val=SHA1
ike 0:OfficeVPN_0:1:OfficeVPN:8: incoming proposal:
ike 0:OfficeVPN_0:1:OfficeVPN:8: proposal id = 3:
ike 0:OfficeVPN_0:1:OfficeVPN:8: protocol id = IPSEC_ESP:
ike 0:OfficeVPN_0:1:OfficeVPN:8: trans_id = ESP_3DES
ike 0:OfficeVPN_0:1:OfficeVPN:8: encapsulation = UDP_ENCAPSULATION_MODE_TRANSPORT_RFC3947
ike 0:OfficeVPN_0:1:OfficeVPN:8: type = AUTH_ALG, val=SHA1
ike 0:OfficeVPN_0:1:OfficeVPN:8: negotiation result
ike 0:OfficeVPN_0:1:OfficeVPN:8: proposal id = 3:
ike 0:OfficeVPN_0:1:OfficeVPN:8: protocol id = IPSEC_ESP:
ike 0:OfficeVPN_0:1:OfficeVPN:8: trans_id = ESP_3DES
ike 0:OfficeVPN_0:1:OfficeVPN:8: encapsulation = ENCAPSULATION_MODE_TRANSPORT
ike 0:OfficeVPN_0:1:OfficeVPN:8: type = AUTH_ALG, val=SHA1
ike 0:OfficeVPN_0:1:OfficeVPN:8: using udp transport mode.
ike 0:OfficeVPN_0:1:8: sending NATOA-i 51.39.30.90
ike 0:OfficeVPN_0:1:8: sending NATOA-r 192.168.100.10
ike 0:OfficeVPN_0:1:OfficeVPN:8: replay protection enabled
ike 0:OfficeVPN_0:1:OfficeVPN:8: SA life soft seconds=3591.
ike 0:OfficeVPN_0:1:OfficeVPN:8: SA life hard seconds=3600.
ike 0:OfficeVPN_0:1:OfficeVPN:8: IPsec SA selectors #src=1 #dst=1
ike 0:OfficeVPN_0:1:OfficeVPN:8: src 0 7 17:192.168.100.10-192.168.100.10:1701
ike 0:OfficeVPN_0:1:OfficeVPN:8: dst 0 7 17:51.39.30.90-51.39.30.90:0
ike 0:OfficeVPN_0:1:OfficeVPN:8: add dynamic IPsec SA selectors
ike 0:OfficeVPN_0:1:OfficeVPN:8: added dynamic IPsec SA proxyids, existing serial 1
ike 0:OfficeVPN_0:1:OfficeVPN:8: add IPsec SA: SPIs=b0584ff4/e2f79d48
ike 0:OfficeVPN_0:1:OfficeVPN:8: IPsec SA dec spi b0584ff4 key 24:C79F23EFE5A42703121BC75E820B0DC2D7C29FC04048EF29 auth 20:F4D952B0FF1069BB732BC9424813BC5F629072D0
ike 0:OfficeVPN_0:1:OfficeVPN:8: IPsec SA enc spi e2f79d48 key 24:547D894F2C98766DB8B75D8D47FB8743ADDA58E1E04F30F4 auth 20:47306D0D3D2B75D185785F8FFA4F42C9FF455867
ike 0:OfficeVPN_0:1:OfficeVPN:8: transport mode encapsulation is enabled
ike 0:OfficeVPN_0:1:OfficeVPN:8: added IPsec SA: SPIs=b0584ff4/e2f79d48
ike 0:OfficeVPN_0:1: enc 1E979CDC9E8163C1DF35DC8CC4A1DC530810200100000003000000B80100001889BC7405A3A5DEFB2AD00FED57FDC3CED455E6120A00004000000001000000010000003403030401B0584FF400000028010300008004000480050002800100010002000400000E1080010002000200040003D090050000143B17219236C0E8537F30B7B37A7EBB1A0500000C011106A5C0A801041500000C011106A5B02DB5111500000C010000003327035E0000000C01000000C0A8640A
ike 0:OfficeVPN_0:1: out 1E979CDC9E8163C1DF35DC8CC4A1DC530810200100000003000000BCABBE1EF6BCD305D71081B43D4EE891C8A03080BA4BF08CD67E4CCFCA3E25746CC2B13FFED246C46E2E43C1CD8D1A95523E1404FB1DAF0D66E9463E70529AD5F54348AAB7A28FBE65B1C65C460F6792A6122C42D56C77009D2FFC240B2CA69BB2CB671CC1C651F70D6E7927453B3E9BC91DE758200B627FF48AC125EAE0B3F6527B9354BDF8540191C62DB63C59B96B856091F9E61E215A11B987038984B08936
ike 0:OfficeVPN_0:1: sent IKE msg (quick_r1send): 192.168.100.10:4500->51.39.30.90:2370, len=188, id=1e979cdc9e8163c1/df35dc8cc4a1dc53:00000003
ike 0: comes 51.39.30.90:2370->192.168.100.10:4500,ifindex=5....
ike 0: IKEv1 exchange=Quick id=1e979cdc9e8163c1/df35dc8cc4a1dc53:00000003 len=60
ike 0: in 1E979CDC9E8163C1DF35DC8CC4A1DC5308102001000000030000003C49900406B98233C0CF260B6AA2E3228587874B9BCFF4BF275E64F59354BF96AE
ike 0:OfficeVPN_0:1: dec 1E979CDC9E8163C1DF35DC8CC4A1DC5308102001000000030000003C000000184A84F882347F9976B6156F6651FCD15E00321CB50000000000000000
ike 0: comes 51.39.30.90:2370->192.168.100.10:4500,ifindex=5....
ike 0: IKEv1 exchange=Informational id=1e979cdc9e8163c1/df35dc8cc4a1dc53:9fcd1764 len=76
ike 0: in 1E979CDC9E8163C1DF35DC8CC4A1DC53081005019FCD17640000004C7E962D88AE8953901C482E54A16917FFC369A50C1876276EFD0FC3AA241847FC2BC2AB82F22A67817800D94B74A1FE1E
ike 0:OfficeVPN_0:1: dec 1E979CDC9E8163C1DF35DC8CC4A1DC53081005019FCD17640000004C0C0000189015A44109E6D365C56323898DD17F3F6446F215000000100000000103040001A7D66F140000000000000000
ike 0:OfficeVPN_0:1: recv IPsec SA delete, spi count 1
ike 0:OfficeVPN_0: deleting IPsec SA with SPI a7d66f14
ike 0:OfficeVPN_0:OfficeVPN: deleted IPsec SA with SPI a7d66f14, SA count: 1
ike 0:OfficeVPN_0:OfficeVPN:8: send SA_DONE SPI 0xe2f79d48
ike 0: comes 51.39.30.90:2370->192.168.100.10:4500,ifindex=5....
ike 0: IKEv1 exchange=Quick id=1e979cdc9e8163c1/df35dc8cc4a1dc53:00000004 len=436
ike 0: in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
ike 0:OfficeVPN_0:1:9: responder received first quick-mode message
ike 0:OfficeVPN_0:1: dec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
ike 0:OfficeVPN_0:1:9: received NATOA-i 192.168.1.4
ike 0:OfficeVPN_0:1:9: received NATOA-r 50.60.70.80
ike 0:OfficeVPN_0:1:9: peer proposal is: peer:17:192.168.1.4-192.168.1.4:1701, me:17:50.60.70.80-50.60.70.80:1701
ike 0:OfficeVPN_0:1:OfficeVPN:9: trying
ike 0:OfficeVPN_0:1:9: transport mode, override with 17:192.168.100.10-192.168.100.10:1701 -> 17:51.39.30.90-51.39.30.90:0
ike 0:OfficeVPN_0:1:OfficeVPN:9: matched phase2
ike 0:OfficeVPN_0:1:OfficeVPN:9: dynamic client
ike 0:OfficeVPN_0:1:OfficeVPN:9: my proposal:
ike 0:OfficeVPN_0:1:OfficeVPN:9: proposal id = 1:
ike 0:OfficeVPN_0:1:OfficeVPN:9: protocol id = IPSEC_ESP:
ike 0:OfficeVPN_0:1:OfficeVPN:9: trans_id = ESP_AES_CBC (key_len = 256)
ike 0:OfficeVPN_0:1:OfficeVPN:9: encapsulation = ENCAPSULATION_MODE_TRANSPORT
ike 0:OfficeVPN_0:1:OfficeVPN:9: type = AUTH_ALG, val=MD5
ike 0:OfficeVPN_0:1:OfficeVPN:9: trans_id = ESP_3DES
ike 0:OfficeVPN_0:1:OfficeVPN:9: encapsulation = ENCAPSULATION_MODE_TRANSPORT
ike 0:OfficeVPN_0:1:OfficeVPN:9: type = AUTH_ALG, val=SHA1
ike 0:OfficeVPN_0:1:OfficeVPN:9: trans_id = ESP_AES_CBC (key_len = 192)
ike 0:OfficeVPN_0:1:OfficeVPN:9: encapsulation = ENCAPSULATION_MODE_TRANSPORT
ike 0:OfficeVPN_0:1:OfficeVPN:9: type = AUTH_ALG, val=SHA1
ike 0:OfficeVPN_0:1:OfficeVPN:9: incoming proposal:
ike 0:OfficeVPN_0:1:OfficeVPN:9: proposal id = 1:
ike 0:OfficeVPN_0:1:OfficeVPN:9: protocol id = IPSEC_ESP:
ike 0:OfficeVPN_0:1:OfficeVPN:9: trans_id = ESP_AES_CBC (key_len = 256)
ike 0:OfficeVPN_0:1:OfficeVPN:9: encapsulation = UDP_ENCAPSULATION_MODE_TRANSPORT_RFC3947
ike 0:OfficeVPN_0:1:OfficeVPN:9: type = AUTH_ALG, val=SHA1
ike 0:OfficeVPN_0:1:OfficeVPN:9: incoming proposal:
ike 0:OfficeVPN_0:1:OfficeVPN:9: proposal id = 2:
ike 0:OfficeVPN_0:1:OfficeVPN:9: protocol id = IPSEC_ESP:
ike 0:OfficeVPN_0:1:OfficeVPN:9: trans_id = ESP_AES_CBC (key_len = 128)
ike 0:OfficeVPN_0:1:OfficeVPN:9: encapsulation = UDP_ENCAPSULATION_MODE_TRANSPORT_RFC3947
ike 0:OfficeVPN_0:1:OfficeVPN:9: type = AUTH_ALG, val=SHA1
ike 0:OfficeVPN_0:1:OfficeVPN:9: incoming proposal:
ike 0:OfficeVPN_0:1:OfficeVPN:9: proposal id = 3:
ike 0:OfficeVPN_0:1:OfficeVPN:9: protocol id = IPSEC_ESP:
ike 0:OfficeVPN_0:1:OfficeVPN:9: trans_id = ESP_3DES
ike 0:OfficeVPN_0:1:OfficeVPN:9: encapsulation = UDP_ENCAPSULATION_MODE_TRANSPORT_RFC3947
ike 0:OfficeVPN_0:1:OfficeVPN:9: type = AUTH_ALG, val=SHA1
ike 0:OfficeVPN_0:1:OfficeVPN:9: negotiation result
ike 0:OfficeVPN_0:1:OfficeVPN:9: proposal id = 3:
ike 0:OfficeVPN_0:1:OfficeVPN:9: protocol id = IPSEC_ESP:
ike 0:OfficeVPN_0:1:OfficeVPN:9: trans_id = ESP_3DES
ike 0:OfficeVPN_0:1:OfficeVPN:9: encapsulation = ENCAPSULATION_MODE_TRANSPORT
ike 0:OfficeVPN_0:1:OfficeVPN:9: type = AUTH_ALG, val=SHA1
ike 0:OfficeVPN_0:1:OfficeVPN:9: using udp transport mode.
ike 0:OfficeVPN_0:1:9: sending NATOA-i 51.39.30.90
ike 0:OfficeVPN_0:1:9: sending NATOA-r 192.168.100.10
ike 0:OfficeVPN_0:1:OfficeVPN:9: replay protection enabled
ike 0:OfficeVPN_0:1:OfficeVPN:9: SA life soft seconds=3588.
ike 0:OfficeVPN_0:1:OfficeVPN:9: SA life hard seconds=3600.
ike 0:OfficeVPN_0:1:OfficeVPN:9: IPsec SA selectors #src=1 #dst=1
ike 0:OfficeVPN_0:1:OfficeVPN:9: src 0 7 17:192.168.100.10-192.168.100.10:1701
ike 0:OfficeVPN_0:1:OfficeVPN:9: dst 0 7 17:51.39.30.90-51.39.30.90:0
ike 0:OfficeVPN_0:1:OfficeVPN:9: add dynamic IPsec SA selectors
ike 0:OfficeVPN_0:1:OfficeVPN:9: added dynamic IPsec SA proxyids, existing serial 1
ike 0:OfficeVPN_0:1:OfficeVPN:9: add IPsec SA: SPIs=b0584ff5/baf6114e
ike 0:OfficeVPN_0:1:OfficeVPN:9: IPsec SA dec spi b0584ff5 key 24:AB3D43C45CB8EBE24B4821DC18B46C91AC9FEDE26B983463 auth 20:A45575B5153DA1F1E6DF16EF90A24D62332A8034
ike 0:OfficeVPN_0:1:OfficeVPN:9: IPsec SA enc spi baf6114e key 24:A96CB6F6E9CE76C697CE7780E89491ACD42A731FF1DE9176 auth 20:6F3C43D73E8751E3E4290073BAA6EA77CB424C89
ike 0:OfficeVPN_0:1:OfficeVPN:9: transport mode encapsulation is enabled
ike 0:OfficeVPN_0:1:OfficeVPN:9: added IPsec SA: SPIs=b0584ff5/baf6114e
ike 0:OfficeVPN_0:1: enc 1E979CDC9E8163C1DF35DC8CC4A1DC530810200100000004000000B8010000186CCCBEBF51C19B9DD7C3DBC973E453C78CF0423C0A00004000000001000000010000003403030401B0584FF500000028010300008004000480050002800100010002000400000E1080010002000200040003D0900500001449059C838EE6B2308B2410BAE7F8E6CD0500000C011106A5C0A801041500000C011106A5B02DB5111500000C010000003327035E0000000C01000000C0A8640A
ike 0:OfficeVPN_0:1: out 1E979CDC9E8163C1DF35DC8CC4A1DC530810200100000004000000BC36E702A9B88675C85A0072670F2C7707248496B3798EAE220A264C288678811A5B50206B1386611B902B3F8CB0BCF614A161F25AE065FB6C6E96FA9D0545909603AECC56AADC18B4E4FC6A4947761C31D33A1C84D33EFEA584B840EEB978E78D6DEA283BD51C5B90F3060933D213DAE880D8B71652716AF72D21C7EF30E3C26E99F9D99546BBC532645C98688EDB4A686C2B340BBDE35632D9BD9303676D7335
ike 0:OfficeVPN_0:1: sent IKE msg (quick_r1send): 192.168.100.10:4500->51.39.30.90:2370, len=188, id=1e979cdc9e8163c1/df35dc8cc4a1dc53:00000004
ike 0: comes 51.39.30.90:2370->192.168.100.10:4500,ifindex=5....
ike 0: IKEv1 exchange=Quick id=1e979cdc9e8163c1/df35dc8cc4a1dc53:00000004 len=60
ike 0: in 1E979CDC9E8163C1DF35DC8CC4A1DC5308102001000000040000003CE16841FCE56A293EF150468D3D4ADF4F88E433C12CEB0635E4A250333075E96E
ike 0:OfficeVPN_0:1: dec 1E979CDC9E8163C1DF35DC8CC4A1DC5308102001000000040000003C00000018891716EEAD44E943C05930C631013B4D155895990000000000000000
ike 0:OfficeVPN_0:OfficeVPN:9: send SA_DONE SPI 0xbaf6114e
ike 0: comes 51.39.30.90:2370->192.168.100.10:4500,ifindex=5....
ike 0: IKEv1 exchange=Informational id=1e979cdc9e8163c1/df35dc8cc4a1dc53:23ac66c7 len=76
ike 0: in 1E979CDC9E8163C1DF35DC8CC4A1DC530810050123AC66C70000004CC96DE6C1A00F9128699DA37492C0D496E410168DEAFBA1C187020BC3FCA3F8D2FBB50207E60524CF02D47BC0F57EF1B1
ike 0:OfficeVPN_0:1: dec 1E979CDC9E8163C1DF35DC8CC4A1DC530810050123AC66C70000004C0C00001837182FFFF3AFDDBBB42DE72DBD9A2E97FC2D502B000000100000000103040001E2F79D480000000000000000
ike 0:OfficeVPN_0:1: recv IPsec SA delete, spi count 1
ike 0:OfficeVPN_0: deleting IPsec SA with SPI e2f79d48
ike 0:OfficeVPN_0:OfficeVPN: deleted IPsec SA with SPI e2f79d48, SA count: 1
ike shrank heap by 118784 bytes
ike 0:OfficeVPN_0: NAT keep-alive 5 192.168.100.10->51.39.30.90:2370.
ike 0:OfficeVPN_0:1: out FF
ike 0:OfficeVPN_0:1: sent IKE msg (keepalive): 192.168.100.10:4500->51.39.30.90:2370, len=1, id=ff00000000000000/0000000000000000
ike 0: comes 51.39.30.90:2370->192.168.100.10:4500,ifindex=5....
ike 0: IKEv1 exchange=Quick id=1e979cdc9e8163c1/df35dc8cc4a1dc53:00000005 len=436
ike 0: in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
ike 0:OfficeVPN_0:1:10: responder received first quick-mode message
ike 0:OfficeVPN_0:1: dec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
ike 0:OfficeVPN_0:1:10: received NATOA-i 192.168.1.4
ike 0:OfficeVPN_0:1:10: received NATOA-r 50.60.70.80
ike 0:OfficeVPN_0:1:10: peer proposal is: peer:17:192.168.1.4-192.168.1.4:1701, me:17:50.60.70.80-50.60.70.80:1701
ike 0:OfficeVPN_0:1:OfficeVPN:10: trying
ike 0:OfficeVPN_0:1:10: transport mode, override with 17:192.168.100.10-192.168.100.10:1701 -> 17:51.39.30.90-51.39.30.90:0
ike 0:OfficeVPN_0:1:OfficeVPN:10: matched phase2
ike 0:OfficeVPN_0:1:OfficeVPN:10: dynamic client
ike 0:OfficeVPN_0:1:OfficeVPN:10: my proposal:
ike 0:OfficeVPN_0:1:OfficeVPN:10: proposal id = 1:
ike 0:OfficeVPN_0:1:OfficeVPN:10: protocol id = IPSEC_ESP:
ike 0:OfficeVPN_0:1:OfficeVPN:10: trans_id = ESP_AES_CBC (key_len = 256)
ike 0:OfficeVPN_0:1:OfficeVPN:10: encapsulation = ENCAPSULATION_MODE_TRANSPORT
ike 0:OfficeVPN_0:1:OfficeVPN:10: type = AUTH_ALG, val=MD5
ike 0:OfficeVPN_0:1:OfficeVPN:10: trans_id = ESP_3DES
ike 0:OfficeVPN_0:1:OfficeVPN:10: encapsulation = ENCAPSULATION_MODE_TRANSPORT
ike 0:OfficeVPN_0:1:OfficeVPN:10: type = AUTH_ALG, val=SHA1
ike 0:OfficeVPN_0:1:OfficeVPN:10: trans_id = ESP_AES_CBC (key_len = 192)
ike 0:OfficeVPN_0:1:OfficeVPN:10: encapsulation = ENCAPSULATION_MODE_TRANSPORT
ike 0:OfficeVPN_0:1:OfficeVPN:10: type = AUTH_ALG, val=SHA1
ike 0:OfficeVPN_0:1:OfficeVPN:10: incoming proposal:
ike 0:OfficeVPN_0:1:OfficeVPN:10: proposal id = 1:
ike 0:OfficeVPN_0:1:OfficeVPN:10: protocol id = IPSEC_ESP:
ike 0:OfficeVPN_0:1:OfficeVPN:10: trans_id = ESP_AES_CBC (key_len = 256)
ike 0:OfficeVPN_0:1:OfficeVPN:10: encapsulation = UDP_ENCAPSULATION_MODE_TRANSPORT_RFC3947
ike 0:OfficeVPN_0:1:OfficeVPN:10: type = AUTH_ALG, val=SHA1
ike 0:OfficeVPN_0:1:OfficeVPN:10: incoming proposal:
ike 0:OfficeVPN_0:1:OfficeVPN:10: proposal id = 2:
ike 0:OfficeVPN_0:1:OfficeVPN:10: protocol id = IPSEC_ESP:
ike 0:OfficeVPN_0:1:OfficeVPN:10: trans_id = ESP_AES_CBC (key_len = 128)
ike 0:OfficeVPN_0:1:OfficeVPN:10: encapsulation = UDP_ENCAPSULATION_MODE_TRANSPORT_RFC3947
ike 0:OfficeVPN_0:1:OfficeVPN:10: type = AUTH_ALG, val=SHA1
ike 0:OfficeVPN_0:1:OfficeVPN:10: incoming proposal:
ike 0:OfficeVPN_0:1:OfficeVPN:10: proposal id = 3:
ike 0:OfficeVPN_0:1:OfficeVPN:10: protocol id = IPSEC_ESP:
ike 0:OfficeVPN_0:1:OfficeVPN:10: trans_id = ESP_3DES
ike 0:OfficeVPN_0:1:OfficeVPN:10: encapsulation = UDP_ENCAPSULATION_MODE_TRANSPORT_RFC3947
ike 0:OfficeVPN_0:1:OfficeVPN:10: type = AUTH_ALG, val=SHA1
ike 0:OfficeVPN_0:1:OfficeVPN:10: negotiation result
ike 0:OfficeVPN_0:1:OfficeVPN:10: proposal id = 3:
ike 0:OfficeVPN_0:1:OfficeVPN:10: protocol id = IPSEC_ESP:
ike 0:OfficeVPN_0:1:OfficeVPN:10: trans_id = ESP_3DES
ike 0:OfficeVPN_0:1:OfficeVPN:10: encapsulation = ENCAPSULATION_MODE_TRANSPORT
ike 0:OfficeVPN_0:1:OfficeVPN:10: type = AUTH_ALG, val=SHA1
ike 0:OfficeVPN_0:1:OfficeVPN:10: using udp transport mode.
ike 0:OfficeVPN_0:1:10: sending NATOA-i 51.39.30.90
ike 0:OfficeVPN_0:1:10: sending NATOA-r 192.168.100.10
ike 0:OfficeVPN_0:1:OfficeVPN:10: replay protection enabled
ike 0:OfficeVPN_0:1:OfficeVPN:10: SA life soft seconds=3591.
ike 0:OfficeVPN_0:1:OfficeVPN:10: SA life hard seconds=3600.
ike 0:OfficeVPN_0:1:OfficeVPN:10: IPsec SA selectors #src=1 #dst=1
ike 0:OfficeVPN_0:1:OfficeVPN:10: src 0 7 17:192.168.100.10-192.168.100.10:1701
ike 0:OfficeVPN_0:1:OfficeVPN:10: dst 0 7 17:51.39.30.90-51.39.30.90:0
ike 0:OfficeVPN_0:1:OfficeVPN:10: add dynamic IPsec SA selectors
ike 0:OfficeVPN_0:1:OfficeVPN:10: added dynamic IPsec SA proxyids, existing serial 1
ike 0:OfficeVPN_0:1:OfficeVPN:10: add IPsec SA: SPIs=b0584ff6/e56297d0
ike 0:OfficeVPN_0:1:OfficeVPN:10: IPsec SA dec spi b0584ff6 key 24:E11747DDE1B3EA5B7D5FA66815AFD0A17613643F021773C8 auth 20:2931402856BCACDB8D9717F914685A44363EC2B4
ike 0:OfficeVPN_0:1:OfficeVPN:10: IPsec SA enc spi e56297d0 key 24:41B1FF7145C496FF856364A5F6A17BFB5FA2A29BAE1014F6 auth 20:18CE0A5068D02147C48A574889E43515797BDED8
ike 0:OfficeVPN_0:1:OfficeVPN:10: transport mode encapsulation is enabled
ike 0:OfficeVPN_0:1:OfficeVPN:10: added IPsec SA: SPIs=b0584ff6/e56297d0
ike 0:OfficeVPN_0:1: enc 1E979CDC9E8163C1DF35DC8CC4A1DC530810200100000005000000B8010000183D7F8D5CCE40344921B469E15DFE784A0C6374DF0A00004000000001000000010000003403030401B0584FF600000028010300008004000480050002800100010002000400000E1080010002000200040003D09005000014A9FB2BDDEF221A863F1DBA8494D4CE350500000C011106A5C0A801041500000C011106A5B02DB5111500000C010000003327035E0000000C01000000C0A8640A
ike 0:OfficeVPN_0:1: out 1E979CDC9E8163C1DF35DC8CC4A1DC530810200100000005000000BC4337C0C4B4086A9D801A3ED79C99E6817CA4E305D02B7975D0F0831D84955EECA88CDB07AB19FC12DFABC8FD16C70AF0E495C989E15C9E96E66C91C8F1662B7CC04AC3E5318BF55DB8C466130905BDFA860E8324C595EADEE0ABA0C40F9E0286FBD3DDB915D09288E83BE72FB84D3FA6B2DD31487EA0EC577C58F1AF465A77CCB1A232CE205CF7C7E90FDF8840AF0689275138BF27BE5047E68D592BC323BEAE
ike 0:OfficeVPN_0:1: sent IKE msg (quick_r1send): 192.168.100.10:4500->51.39.30.90:2370, len=188, id=1e979cdc9e8163c1/df35dc8cc4a1dc53:00000005
ike 0: comes 51.39.30.90:2370->192.168.100.10:4500,ifindex=5....
ike 0: IKEv1 exchange=Quick id=1e979cdc9e8163c1/df35dc8cc4a1dc53:00000005 len=60
ike 0: in 1E979CDC9E8163C1DF35DC8CC4A1DC5308102001000000050000003C5EAB8CB1015AF72DD9F58AEFAB3A7B18071EEB995644AA2076A66916D9FF9256
ike 0:OfficeVPN_0:1: dec 1E979CDC9E8163C1DF35DC8CC4A1DC5308102001000000050000003C00000018BA7F0228522A50808667BE33C22E71B61D473F850000000000000000
ike 0:OfficeVPN_0:OfficeVPN:10: send SA_DONE SPI 0xe56297d0
ike 0: comes 51.39.30.90:2370->192.168.100.10:4500,ifindex=5....
ike 0: IKEv1 exchange=Informational id=1e979cdc9e8163c1/df35dc8cc4a1dc53:79de5c19 len=76
ike 0: in 1E979CDC9E8163C1DF35DC8CC4A1DC530810050179DE5C190000004C9C31F0136E533F683C52031B43D1EA89A0CDD05F57553287F95519F3E4B3887C44D28575BCE17E0620DC7C8426C59D26
ike 0:OfficeVPN_0:1: dec 1E979CDC9E8163C1DF35DC8CC4A1DC530810050179DE5C190000004C0C00001804AD5B24DF10F272ECCC61B9BF9511606AA1CFC3000000100000000103040001BAF6114E0000000000000000
ike 0:OfficeVPN_0:1: recv IPsec SA delete, spi count 1
ike 0:OfficeVPN_0: deleting IPsec SA with SPI baf6114e
ike 0:OfficeVPN_0:OfficeVPN: deleted IPsec SA with SPI baf6114e, SA count: 1
ike 0:OfficeVPN_0: NAT keep-alive 5 192.168.100.10->51.39.30.90:2370.
ike 0:OfficeVPN_0:1: out FF
ike 0:OfficeVPN_0:1: sent IKE msg (keepalive): 192.168.100.10:4500->51.39.30.90:2370, len=1, id=ff00000000000000/0000000000000000
ike 0: comes 51.39.30.90:2370->192.168.100.10:4500,ifindex=5....
ike 0: IKEv1 exchange=Quick id=1e979cdc9e8163c1/df35dc8cc4a1dc53:00000006 len=436
ike 0: in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
ike 0:OfficeVPN_0:1:11: responder received first quick-mode message
ike 0:OfficeVPN_0:1: dec 1E979CDC9E8163C1DF35DC8CC4A1DC530810200100000006000001B40100001853D615BEC08EC34F26741FF5D6F0DAB0900559AE0A000118000000010000000102000038010304010832BE1E0000002C010C0000800400048006010080050002800100010002000400000E1080010002000200040003D09002000038020304010832BE1E0000002C010C0000800400048006008080050002800100010002000400000E1080010002000200040003D09002000034030304010832BE1E00000028010300008004000480050002800100010002000400000E1080010002000200040003D09002000034040304010832BE1E00000028010200008004000480050002800100010002000400000E1080010002000200040003D09000000034050304010832BE1E00000028010B00008004000480050002800100010002000400000E1080010002000200040003D090050000340A8295CF0FF90ABCA8CF31B35BE95370057DA7EB54D215D817DBB10BEBEEAFF56E729A7893D6E67F28D7CF624617C6B30500000C011106A5C0A801041500000C011106A5B02DB5111500000C01000000C0A801040000000C01000000B02DB51100000000
ike 0:OfficeVPN_0:1:11: received NATOA-i 192.168.1.4
ike 0:OfficeVPN_0:1:11: received NATOA-r 50.60.70.80
ike 0:OfficeVPN_0:1:11: peer proposal is: peer:17:192.168.1.4-192.168.1.4:1701, me:17:50.60.70.80-50.60.70.80:1701
ike 0:OfficeVPN_0:1:OfficeVPN:11: trying
ike 0:OfficeVPN_0:1:11: transport mode, override with 17:192.168.100.10-192.168.100.10:1701 -> 17:51.39.30.90-51.39.30.90:0
ike 0:OfficeVPN_0:1:OfficeVPN:11: matched phase2
ike 0:OfficeVPN_0:1:OfficeVPN:11: dynamic client
ike 0:OfficeVPN_0:1:OfficeVPN:11: my proposal:
ike 0:OfficeVPN_0:1:OfficeVPN:11: proposal id = 1:
ike 0:OfficeVPN_0:1:OfficeVPN:11: protocol id = IPSEC_ESP:
ike 0:OfficeVPN_0:1:OfficeVPN:11: trans_id = ESP_AES_CBC (key_len = 256)
ike 0:OfficeVPN_0:1:OfficeVPN:11: encapsulation = ENCAPSULATION_MODE_TRANSPORT
ike 0:OfficeVPN_0:1:OfficeVPN:11: type = AUTH_ALG, val=MD5
ike 0:OfficeVPN_0:1:OfficeVPN:11: trans_id = ESP_3DES
ike 0:OfficeVPN_0:1:OfficeVPN:11: encapsulation = ENCAPSULATION_MODE_TRANSPORT
ike 0:OfficeVPN_0:1:OfficeVPN:11: type = AUTH_ALG, val=SHA1
ike 0:OfficeVPN_0:1:OfficeVPN:11: trans_id = ESP_AES_CBC (key_len = 192)
ike 0:OfficeVPN_0:1:OfficeVPN:11: encapsulation = ENCAPSULATION_MODE_TRANSPORT
ike 0:OfficeVPN_0:1:OfficeVPN:11: type = AUTH_ALG, val=SHA1
ike 0:OfficeVPN_0:1:OfficeVPN:11: incoming proposal:
ike 0:OfficeVPN_0:1:OfficeVPN:11: proposal id = 1:
ike 0:OfficeVPN_0:1:OfficeVPN:11: protocol id = IPSEC_ESP:
ike 0:OfficeVPN_0:1:OfficeVPN:11: trans_id = ESP_AES_CBC (key_len = 256)
ike 0:OfficeVPN_0:1:OfficeVPN:11: encapsulation = UDP_ENCAPSULATION_MODE_TRANSPORT_RFC3947
ike 0:OfficeVPN_0:1:OfficeVPN:11: type = AUTH_ALG, val=SHA1
ike 0:OfficeVPN_0:1:OfficeVPN:11: incoming proposal:
ike 0:OfficeVPN_0:1:OfficeVPN:11: proposal id = 2:
ike 0:OfficeVPN_0:1:OfficeVPN:11: protocol id = IPSEC_ESP:
ike 0:OfficeVPN_0:1:OfficeVPN:11: trans_id = ESP_AES_CBC (key_len = 128)
ike 0:OfficeVPN_0:1:OfficeVPN:11: encapsulation = UDP_ENCAPSULATION_MODE_TRANSPORT_RFC3947
ike 0:OfficeVPN_0:1:OfficeVPN:11: type = AUTH_ALG, val=SHA1
ike 0:OfficeVPN_0:1:OfficeVPN:11: incoming proposal:
ike 0:OfficeVPN_0:1:OfficeVPN:11: proposal id = 3:
ike 0:OfficeVPN_0:1:OfficeVPN:11: protocol id = IPSEC_ESP:
ike 0:OfficeVPN_0:1:OfficeVPN:11: trans_id = ESP_3DES
ike 0:OfficeVPN_0:1:OfficeVPN:11: encapsulation = UDP_ENCAPSULATION_MODE_TRANSPORT_RFC3947
ike 0:OfficeVPN_0:1:OfficeVPN:11: type = AUTH_ALG, val=SHA1
ike 0:OfficeVPN_0:1:OfficeVPN:11: negotiation result
ike 0:OfficeVPN_0:1:OfficeVPN:11: proposal id = 3:
ike 0:OfficeVPN_0:1:OfficeVPN:11: protocol id = IPSEC_ESP:
ike 0:OfficeVPN_0:1:OfficeVPN:11: trans_id = ESP_3DES
ike 0:OfficeVPN_0:1:OfficeVPN:11: encapsulation = ENCAPSULATION_MODE_TRANSPORT
ike 0:OfficeVPN_0:1:OfficeVPN:11: type = AUTH_ALG, val=SHA1
ike 0:OfficeVPN_0:1:OfficeVPN:11: using udp transport mode.
ike 0:OfficeVPN_0:1:11: sending NATOA-i 51.39.30.90
ike 0:OfficeVPN_0:1:11: sending NATOA-r 192.168.100.10
ike 0:OfficeVPN_0:1:OfficeVPN:11: replay protection enabled
ike 0:OfficeVPN_0:1:OfficeVPN:11: SA life soft seconds=3591.
ike 0:OfficeVPN_0:1:OfficeVPN:11: SA life hard seconds=3600.
ike 0:OfficeVPN_0:1:OfficeVPN:11: IPsec SA selectors #src=1 #dst=1
ike 0:OfficeVPN_0:1:OfficeVPN:11: src 0 7 17:192.168.100.10-192.168.100.10:1701
ike 0:OfficeVPN_0:1:OfficeVPN:11: dst 0 7 17:51.39.30.90-51.39.30.90:0
ike 0:OfficeVPN_0:1:OfficeVPN:11: add dynamic IPsec SA selectors
ike 0:OfficeVPN_0:1:OfficeVPN:11: added dynamic IPsec SA proxyids, existing serial 1
ike 0:OfficeVPN_0:1:OfficeVPN:11: add IPsec SA: SPIs=b0584ff7/0832be1e
ike 0:OfficeVPN_0:1:OfficeVPN:11: IPsec SA dec spi b0584ff7 key 24:27831216C5524F67BA61532FEE90DD5C58C583BA71E14C24 auth 20:BCB53027260CD7EA24D44E4F78AA648E3DFE4FC0
ike 0:OfficeVPN_0:1:OfficeVPN:11: IPsec SA enc spi 0832be1e key 24:A475FFBC8BDB4E8811CA1603954560027B3FCE0D977C7135 auth 20:609F09B2B28C6ACA03FD69A7FDA6780A474E70A7
ike 0:OfficeVPN_0:1:OfficeVPN:11: transport mode encapsulation is enabled
ike 0:OfficeVPN_0:1:OfficeVPN:11: added IPsec SA: SPIs=b0584ff7/0832be1e
ike 0:OfficeVPN_0:1: enc 1E979CDC9E8163C1DF35DC8CC4A1DC530810200100000006000000B80100001834DEEBF26A29DA8714231C5AC9AB718D5CF6CDD90A00004000000001000000010000003403030401B0584FF700000028010300008004000480050002800100010002000400000E1080010002000200040003D09005000014A37021CECD5646FD1194F286B0E1305A0500000C011106A5C0A801041500000C011106A5B02DB5111500000C010000003327035E0000000C01000000C0A8640A
ike 0:OfficeVPN_0:1: out 1E979CDC9E8163C1DF35DC8CC4A1DC530810200100000006000000BCC8E225D3CF4001A04A70B9BF733C60BCBBFA7536EB264CBCF5774E5B8F0583982EC53ADDA58B8EC19812EBB55D92E228D54F86374122AE5040A132A764F8DD54CC0DFD441AD9451668FC9B305CEE2E99D7E4A7F5980AECFE39943D5E02D1E11469A09D9CCC2B8F02AEE3F064839EE5F9BF6D1A30C44CD1B18F4B732BEAB1966EC9C2171CDCA739E45242070147EA3B3AB9D06F46521B36D8F5DAFD0A49EB9FFC
ike 0:OfficeVPN_0:1: sent IKE msg (quick_r1send): 192.168.100.10:4500->51.39.30.90:2370, len=188, id=1e979cdc9e8163c1/df35dc8cc4a1dc53:00000006
ike 0: comes 51.39.30.90:2370->192.168.100.10:4500,ifindex=5....
ike 0: IKEv1 exchange=Quick id=1e979cdc9e8163c1/df35dc8cc4a1dc53:00000006 len=60
ike 0: in 1E979CDC9E8163C1DF35DC8CC4A1DC5308102001000000060000003CABB1B382AA09F5BAB9FFCA0C7DA1C117D5A7BE3EC98CD3126FFB49CF14BF13B1
ike 0:OfficeVPN_0:1: dec 1E979CDC9E8163C1DF35DC8CC4A1DC5308102001000000060000003C00000018B1677EF5B938CCACA83F7C8A44DD87C54EFF32DB0000000000000000
ike 0:OfficeVPN_0:OfficeVPN:11: send SA_DONE SPI 0x832be1e
ike 0: comes 51.39.30.90:2370->192.168.100.10:4500,ifindex=5....
ike 0: IKEv1 exchange=Informational id=1e979cdc9e8163c1/df35dc8cc4a1dc53:8e21aa75 len=76
ike 0: in 1E979CDC9E8163C1DF35DC8CC4A1DC53081005018E21AA750000004C45050C6F3D3274C2FB059EB83E7D13CA531ACA57B35E4AE1755CE392397D45A3E9909C7B683C0412472CC6E89AF33559
ike 0:OfficeVPN_0:1: dec 1E979CDC9E8163C1DF35DC8CC4A1DC53081005018E21AA750000004C0C000018A225ECEF797A938FF600BEDEA80C17C460AE70DA000000100000000103040001E56297D00000000000000000
ike 0:OfficeVPN_0:1: recv IPsec SA delete, spi count 1
ike 0:OfficeVPN_0: deleting IPsec SA with SPI e56297d0
ike 0:OfficeVPN_0:OfficeVPN: deleted IPsec SA with SPI e56297d0, SA count: 1
ike 0:OfficeVPN_0: NAT keep-alive 5 192.168.100.10->51.39.30.90:2370.
ike 0:OfficeVPN_0:1: out FF
ike 0:OfficeVPN_0:1: sent IKE msg (keepalive): 192.168.100.10:4500->51.39.30.90:2370, len=1, id=ff00000000000000/0000000000000000
ike 0: comes 51.39.30.90:2370->192.168.100.10:4500,ifindex=5....
ike 0: IKEv1 exchange=Informational id=1e979cdc9e8163c1/df35dc8cc4a1dc53:21fde214 len=76
ike 0: in 1E979CDC9E8163C1DF35DC8CC4A1DC530810050121FDE2140000004C29335D675339A5DCBADA587E5CDA233B88F6ED2235D8EAC3837AB7D9B95091615E69A5550772E83D568773F0167F9412
ike 0:OfficeVPN_0:1: dec 1E979CDC9E8163C1DF35DC8CC4A1DC530810050121FDE2140000004C0C0000182FA660F93EBBF7A0E72CECC6770E8CB5C23E40060000001000000001030400010832BE1E0000000000000000
ike 0:OfficeVPN_0:1: recv IPsec SA delete, spi count 1
ike 0:OfficeVPN_0: deleting IPsec SA with SPI 0832be1e
ike 0:OfficeVPN_0:OfficeVPN: deleted IPsec SA with SPI 0832be1e, SA count: 0
ike 0:OfficeVPN:11: del route 51.39.30.90/255.255.255.255 oif OfficeVPN(47) metric 15 priority 0
ike 0:OfficeVPN_0: sending SNMP tunnel DOWN trap for OfficeVPN
ike 0:OfficeVPN_0:OfficeVPN: delete
ike 0: comes 51.39.30.90:2370->192.168.100.10:4500,ifindex=5....
ike 0: IKEv1 exchange=Informational id=1e979cdc9e8163c1/df35dc8cc4a1dc53:33eb8adc len=84
ike 0: in 1E979CDC9E8163C1DF35DC8CC4A1DC530810050133EB8ADC000000549AFA3299AD55CF0F8B2F627C52CA463F9ADB6A11339B3EEAF634C35264AA9FFEC8EF429215A3C7921A663CB31CFD5E6E7E3F9AF070996CB2
ike 0:OfficeVPN_0:1: dec 1E979CDC9E8163C1DF35DC8CC4A1DC530810050133EB8ADC000000540C0000189734F8A3E7A91CDDBA4B5DEE46B1A9A30420175D0000001C00000001011000011E979CDC9E8163C1DF35DC8CC4A1DC5300000000
ike 0:OfficeVPN_0:1: recv ISAKMP SA delete 1e979cdc9e8163c1/df35dc8cc4a1dc53
ike 0:OfficeVPN_0: deleting
ike 0:OfficeVPN_0: flushing
ike 0:OfficeVPN_0: sending SNMP tunnel DOWN trap
ike 0:OfficeVPN_0: flushed
ike 0:OfficeVPN_0: delete dynamic
ike 0:OfficeVPN_0: reset NAT-T
ike 0:OfficeVPN_0: deleted
ike 0:OfficeVPN: carrier down


0 REPLIES 0