[vpn-help] I connect to VPN client, but disconnects after a couple seconds.

Cesar Tamayo terran2cv at gmail.com
Thu Feb 25 03:05:54 CST 2010


     I downloaded the version 2.1.5 for my Windows 7 64 bit and I also tried
using the 2.1.6 Beta. I am able to connect to the Cisco VPN client, but once
connected the tunnel only stays open for a couple seconds and I am never
able to map to the drives I am attempting to map. I have found a blog online
with someone who had a similar problem on the following link.
http://rhyous.com/2009/10/29/windows-7-64-bit-vpn-client-shrewsoft/ and
http://read-stuff-here.blogspot.com/2009/09/shrew-vpn-tutorial-on-windows-64-bit.html
.
I did everything on there and still was not able to change anything on my
original problem. Attached are files with the bug logs I was instructed to
compile in the ShrewSoft site
http://www.shrew.net/support/wiki/BugReportVpnWindows . If you can please
help me.

Cesar Tamayo
California State Northridge [CASE #4036038]
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.shrew.net/pipermail/vpn-help/attachments/20100225/97d4a3c0/attachment-0001.html>
-------------- next part --------------
10/02/22 23:01:05 ## : IKE Daemon, ver 2.1.5
10/02/22 23:01:05 ## : Copyright 2009 Shrew Soft Inc.
10/02/22 23:01:05 ## : This product linked OpenSSL 0.9.8h 28 May 2008
10/02/22 23:01:05 ii : opened 'C:\Program Files\ShrewSoft\VPN Client\debug\iked.log'
10/02/22 23:01:05 ii : opened 'C:\Program Files\ShrewSoft\VPN Client/debug/dump-ike-decrypt.cap'
10/02/22 23:01:05 ii : rebuilding vnet device list ...
10/02/22 23:01:05 ii : device ROOT\VNET\0000 disabled
10/02/22 23:01:05 ii : network process thread begin ...
10/02/22 23:01:05 ii : pfkey process thread begin ...
10/02/22 23:01:05 ii : ipc server process thread begin ...
10/02/22 23:01:20 !! : unable to connect to pfkey interface
10/02/22 23:01:26 ii : ipc client process thread begin ...
10/02/22 23:01:26 <A : peer config add message
10/02/22 23:01:26 <A : proposal config message
10/02/22 23:01:26 <A : proposal config message
10/02/22 23:01:26 <A : client config message
10/02/22 23:01:26 <A : xauth username message
10/02/22 23:01:26 <A : xauth password message
10/02/22 23:01:26 <A : local id 'csun-vpn' message
10/02/22 23:01:26 <A : preshared key message
10/02/22 23:01:26 <A : peer tunnel enable message
10/02/22 23:01:26 ii : local supports XAUTH
10/02/22 23:01:26 ii : local supports nat-t ( draft v00 )
10/02/22 23:01:26 ii : local supports nat-t ( draft v01 )
10/02/22 23:01:26 ii : local supports nat-t ( draft v02 )
10/02/22 23:01:26 ii : local supports nat-t ( draft v03 )
10/02/22 23:01:26 ii : local supports nat-t ( rfc )
10/02/22 23:01:26 ii : local supports FRAGMENTATION
10/02/22 23:01:26 ii : local supports DPDv1
10/02/22 23:01:26 ii : local is SHREW SOFT compatible
10/02/22 23:01:26 ii : local is NETSCREEN compatible
10/02/22 23:01:26 ii : local is SIDEWINDER compatible
10/02/22 23:01:26 ii : local is CISCO UNITY compatible
10/02/22 23:01:26 >= : cookies 231a1834dca27ff8:0000000000000000
10/02/22 23:01:26 >= : message 00000000
10/02/22 23:01:26 ii : processing phase1 packet ( 448 bytes )
10/02/22 23:01:26 =< : cookies 231a1834dca27ff8:7302e3006d9d7639
10/02/22 23:01:26 =< : message 00000000
10/02/22 23:01:26 ii : matched isakmp proposal #1 transform #13
10/02/22 23:01:26 ii : - transform    = ike
10/02/22 23:01:26 ii : - cipher type  = 3des
10/02/22 23:01:26 ii : - key length   = default
10/02/22 23:01:26 ii : - hash type    = md5
10/02/22 23:01:26 ii : - dh group     = modp-1024
10/02/22 23:01:26 ii : - auth type    = xauth-initiator-psk
10/02/22 23:01:26 ii : - life seconds = 86400
10/02/22 23:01:26 ii : - life kbytes  = 0
10/02/22 23:01:26 ii : phase1 id match ( natt prevents ip match )
10/02/22 23:01:26 ii : received = ipv4-host 130.166.1.6
10/02/22 23:01:26 ii : peer is CISCO UNITY compatible
10/02/22 23:01:26 ii : peer supports XAUTH
10/02/22 23:01:26 ii : peer supports DPDv1
10/02/22 23:01:26 ii : peer supports nat-t ( draft v02 )
10/02/22 23:01:26 ii : nat discovery - local address is translated
10/02/22 23:01:26 ii : switching to src nat-t udp port 4500
10/02/22 23:01:26 ii : switching to dst nat-t udp port 4500
10/02/22 23:01:26 >= : cookies 231a1834dca27ff8:7302e3006d9d7639
10/02/22 23:01:26 >= : message 00000000
10/02/22 23:01:26 ii : phase1 sa established
10/02/22 23:01:26 ii : 130.166.1.6:4500 <-> 192.168.1.101:4500
10/02/22 23:01:26 ii : 231a1834dca27ff8:7302e3006d9d7639
10/02/22 23:01:26 ii : sending peer INITIAL-CONTACT notification
10/02/22 23:01:26 ii : - 192.168.1.101:4500 -> 130.166.1.6:4500
10/02/22 23:01:26 ii : - isakmp spi = 231a1834dca27ff8:7302e3006d9d7639
10/02/22 23:01:26 ii : - data size 0
10/02/22 23:01:26 >= : cookies 231a1834dca27ff8:7302e3006d9d7639
10/02/22 23:01:26 >= : message 339a888e
10/02/22 23:01:26 ii : processing config packet ( 100 bytes )
10/02/22 23:01:26 =< : cookies 231a1834dca27ff8:7302e3006d9d7639
10/02/22 23:01:26 =< : message a8892f03
10/02/22 23:01:26 ii : - xauth authentication type
10/02/22 23:01:26 ii : - xauth username
10/02/22 23:01:26 ii : - xauth password
10/02/22 23:01:26 ii : received basic xauth request - Enter Username and Password.
10/02/22 23:01:26 ii : - standard xauth username
10/02/22 23:01:26 ii : - standard xauth password
10/02/22 23:01:26 ii : sending xauth response for cot79129
10/02/22 23:01:26 >= : cookies 231a1834dca27ff8:7302e3006d9d7639
10/02/22 23:01:26 >= : message a8892f03
10/02/22 23:01:27 ii : processing config packet ( 60 bytes )
10/02/22 23:01:27 =< : cookies 231a1834dca27ff8:7302e3006d9d7639
10/02/22 23:01:27 =< : message 68694222
10/02/22 23:01:27 ii : received xauth result - 
10/02/22 23:01:27 ii : user cot79129 authentication succeeded
10/02/22 23:01:27 ii : sending xauth acknowledge
10/02/22 23:01:27 >= : cookies 231a1834dca27ff8:7302e3006d9d7639
10/02/22 23:01:27 >= : message 68694222
10/02/22 23:01:27 ii : building config attribute list
10/02/22 23:01:27 ii : sending config pull request
10/02/22 23:01:27 >= : cookies 231a1834dca27ff8:7302e3006d9d7639
10/02/22 23:01:27 >= : message 9174ed32
10/02/22 23:01:27 ii : processing config packet ( 580 bytes )
10/02/22 23:01:27 =< : cookies 231a1834dca27ff8:7302e3006d9d7639
10/02/22 23:01:27 =< : message 9174ed32
10/02/22 23:01:27 ii : received config pull response
10/02/22 23:01:27 ii : waiting for vnet to arrive ...
10/02/22 23:01:28 !! : VNET adapter MTU defaulted to 1500.
10/02/22 23:01:28 ii : creating NONE INBOUND policy ANY:130.166.1.6:* -> ANY:192.168.1.101:*
10/02/22 23:01:28 ii : creating NONE OUTBOUND policy ANY:192.168.1.101:* -> ANY:130.166.1.6:*
10/02/22 23:01:28 ii : created NONE policy route for 130.166.1.6/32
10/02/22 23:01:28 ii : creating IPSEC INBOUND policy ANY:0.0.0.0/0:* -> ANY:130.166.243.20:*
10/02/22 23:01:28 ii : creating IPSEC OUTBOUND policy ANY:130.166.243.20:* -> ANY:0.0.0.0/0:*
10/02/22 23:01:28 ii : created IPSEC policy route for 0.0.0.0
10/02/22 23:01:28 ii : split DNS bypassed ( no split domains defined )
10/02/22 23:01:28 !! : unable to locate inbound policy for init phase2
10/02/22 23:01:35 ii : processing config packet ( 580 bytes )
10/02/22 23:01:35 !! : config packet ignored, ( config already mature )
10/02/22 23:01:41 ii : sending peer DPDV1-R-U-THERE notification
10/02/22 23:01:41 ii : - 192.168.1.101:4500 -> 130.166.1.6:4500
10/02/22 23:01:41 ii : - isakmp spi = 231a1834dca27ff8:7302e3006d9d7639
10/02/22 23:01:41 ii : - data size 4
10/02/22 23:01:41 >= : cookies 231a1834dca27ff8:7302e3006d9d7639
10/02/22 23:01:41 >= : message 99a159e1
10/02/22 23:01:43 ii : processing config packet ( 580 bytes )
10/02/22 23:01:43 !! : config packet ignored, ( config already mature )
10/02/22 23:01:51 ii : processing config packet ( 580 bytes )
10/02/22 23:01:51 !! : config packet ignored, ( config already mature )
10/02/22 23:01:56 ii : sending peer DPDV1-R-U-THERE notification
10/02/22 23:01:56 ii : - 192.168.1.101:4500 -> 130.166.1.6:4500
10/02/22 23:01:56 ii : - isakmp spi = 231a1834dca27ff8:7302e3006d9d7639
10/02/22 23:01:56 ii : - data size 4
10/02/22 23:01:56 >= : cookies 231a1834dca27ff8:7302e3006d9d7639
10/02/22 23:01:56 >= : message 73137a1c
10/02/22 23:01:59 ii : processing informational packet ( 76 bytes )
10/02/22 23:01:59 =< : cookies 231a1834dca27ff8:7302e3006d9d7639
10/02/22 23:01:59 =< : message 34435d7b
10/02/22 23:01:59 ii : received peer DELETE message
10/02/22 23:01:59 ii : - 130.166.1.6:4500 -> 192.168.1.101:4500
10/02/22 23:01:59 ii : - isakmp spi = 231a1834dca27ff8:7302e3006d9d7639
10/02/22 23:01:59 ii : cleanup, marked phase1 231a1834dca27ff8:7302e3006d9d7639 for removal
10/02/22 23:01:59 ii : phase1 removal before expire time
10/02/22 23:01:59 ii : removing IPSEC INBOUND policy ANY:0.0.0.0/0:* -> ANY:130.166.243.20:*
10/02/22 23:01:59 ii : removing IPSEC OUTBOUND policy ANY:130.166.243.20:* -> ANY:0.0.0.0/0:*
10/02/22 23:01:59 ii : removed IPSEC policy route for ANY:0.0.0.0/0:*
10/02/22 23:01:59 ii : removing NONE INBOUND policy ANY:130.166.1.6:* -> ANY:192.168.1.101:*
10/02/22 23:01:59 ii : removing NONE OUTBOUND policy ANY:192.168.1.101:* -> ANY:130.166.1.6:*
10/02/22 23:01:59 ii : removed NONE policy route for ANY:130.166.1.6:*
10/02/22 23:01:59 DB : removing tunnel config references
10/02/22 23:01:59 DB : removing tunnel phase2 references
10/02/22 23:01:59 DB : removing tunnel phase1 references
10/02/22 23:01:59 DB : removing all peer tunnel refrences
10/02/22 23:01:59 ii : ipc client process thread exit ...
-------------- next part --------------
A non-text attachment was scrubbed...
Name: vpn-bug.zip
Type: application/zip
Size: 5875 bytes
Desc: not available
URL: <https://lists.shrew.net/pipermail/vpn-help/attachments/20100225/97d4a3c0/attachment-0001.zip>
-------------- next part --------------
10/02/25 00:01:20 ## : IKE Daemon, ver 2.1.6
10/02/25 00:01:20 ## : Copyright 2009 Shrew Soft Inc.
10/02/25 00:01:20 ## : This product linked OpenSSL 0.9.8h 28 May 2008
10/02/25 00:01:20 ii : opened 'C:\Program Files\ShrewSoft\VPN Client\debug\iked.log'
10/02/25 00:01:20 ii : opened 'C:\Program Files\ShrewSoft\VPN Client/debug/dump-ike-decrypt.cap'
10/02/25 00:01:20 ii : opened 'C:\Program Files\ShrewSoft\VPN Client/debug/dump-ike-encrypt.cap'
10/02/25 00:01:20 ii : rebuilding vnet device list ...
10/02/25 00:01:20 ii : device ROOT\VNET\0000 disabled
10/02/25 00:01:20 ii : network process thread begin ...
10/02/25 00:01:20 ii : ipc server process thread begin ...
10/02/25 00:01:20 ii : pfkey process thread begin ...
10/02/25 00:01:26 !! : unable to connect to pfkey interface
10/02/25 00:01:27 !! : unable to connect to pfkey interface
10/02/25 00:01:44 ii : ipc client process thread begin ...
10/02/25 00:01:44 <A : peer config add message
10/02/25 00:01:44 DB : peer added ( obj count = 1 )
10/02/25 00:01:44 ii : local address 192.168.1.101 selected for peer
10/02/25 00:01:44 DB : tunnel added ( obj count = 1 )
10/02/25 00:01:44 <A : proposal config message
10/02/25 00:01:44 <A : proposal config message
10/02/25 00:01:44 <A : client config message
10/02/25 00:01:44 <A : xauth username message
10/02/25 00:01:44 <A : xauth password message
10/02/25 00:01:44 <A : local id 'csun-vpn' message
10/02/25 00:01:44 <A : preshared key message
10/02/25 00:01:44 <A : peer tunnel enable message
10/02/25 00:01:44 DB : new phase1 ( ISAKMP initiator )
10/02/25 00:01:44 DB : exchange type is aggressive
10/02/25 00:01:44 DB : 192.168.1.101:500 <-> 130.166.1.6:500
10/02/25 00:01:44 DB : e8acf1cc221d8ec9:0000000000000000
10/02/25 00:01:44 DB : phase1 added ( obj count = 1 )
10/02/25 00:01:44 >> : security association payload
10/02/25 00:01:44 >> : - proposal #1 payload 
10/02/25 00:01:44 >> : -- transform #1 payload 
10/02/25 00:01:44 >> : -- transform #2 payload 
10/02/25 00:01:44 >> : -- transform #3 payload 
10/02/25 00:01:44 >> : -- transform #4 payload 
10/02/25 00:01:44 >> : -- transform #5 payload 
10/02/25 00:01:44 >> : -- transform #6 payload 
10/02/25 00:01:44 >> : -- transform #7 payload 
10/02/25 00:01:44 >> : -- transform #8 payload 
10/02/25 00:01:44 >> : -- transform #9 payload 
10/02/25 00:01:44 >> : -- transform #10 payload 
10/02/25 00:01:44 >> : -- transform #11 payload 
10/02/25 00:01:44 >> : -- transform #12 payload 
10/02/25 00:01:44 >> : -- transform #13 payload 
10/02/25 00:01:44 >> : -- transform #14 payload 
10/02/25 00:01:44 >> : -- transform #15 payload 
10/02/25 00:01:44 >> : -- transform #16 payload 
10/02/25 00:01:44 >> : -- transform #17 payload 
10/02/25 00:01:44 >> : -- transform #18 payload 
10/02/25 00:01:44 >> : key exchange payload
10/02/25 00:01:44 >> : nonce payload
10/02/25 00:01:44 >> : identification payload
10/02/25 00:01:44 >> : vendor id payload
10/02/25 00:01:44 ii : local supports XAUTH
10/02/25 00:01:44 >> : vendor id payload
10/02/25 00:01:44 ii : local supports nat-t ( draft v00 )
10/02/25 00:01:44 >> : vendor id payload
10/02/25 00:01:44 ii : local supports nat-t ( draft v01 )
10/02/25 00:01:44 >> : vendor id payload
10/02/25 00:01:44 ii : local supports nat-t ( draft v02 )
10/02/25 00:01:44 >> : vendor id payload
10/02/25 00:01:44 ii : local supports nat-t ( draft v03 )
10/02/25 00:01:44 >> : vendor id payload
10/02/25 00:01:44 ii : local supports nat-t ( rfc )
10/02/25 00:01:44 >> : vendor id payload
10/02/25 00:01:44 ii : local supports DPDv1
10/02/25 00:01:44 >> : vendor id payload
10/02/25 00:01:44 ii : local is SHREW SOFT compatible
10/02/25 00:01:44 >> : vendor id payload
10/02/25 00:01:44 ii : local is NETSCREEN compatible
10/02/25 00:01:44 >> : vendor id payload
10/02/25 00:01:44 ii : local is SIDEWINDER compatible
10/02/25 00:01:44 >> : vendor id payload
10/02/25 00:01:44 ii : local is CISCO UNITY compatible
10/02/25 00:01:44 >= : cookies e8acf1cc221d8ec9:0000000000000000
10/02/25 00:01:44 >= : message 00000000
10/02/25 00:01:44 -> : send IKE packet 192.168.1.101:500 -> 130.166.1.6:500 ( 1160 bytes )
10/02/25 00:01:44 DB : phase1 resend event scheduled ( ref count = 2 )
10/02/25 00:01:44 <- : recv IKE packet 130.166.1.6:500 -> 192.168.1.101:500 ( 448 bytes )
10/02/25 00:01:44 DB : phase1 found
10/02/25 00:01:44 ii : processing phase1 packet ( 448 bytes )
10/02/25 00:01:44 =< : cookies e8acf1cc221d8ec9:88c8ffa785bfa24f
10/02/25 00:01:44 =< : message 00000000
10/02/25 00:01:44 << : security association payload
10/02/25 00:01:44 << : - propsal #1 payload 
10/02/25 00:01:44 << : -- transform #13 payload 
10/02/25 00:01:44 ii : unmatched isakmp proposal/transform
10/02/25 00:01:44 ii : cipher type ( 3des != aes )
10/02/25 00:01:44 ii : unmatched isakmp proposal/transform
10/02/25 00:01:44 ii : cipher type ( 3des != aes )
10/02/25 00:01:44 ii : unmatched isakmp proposal/transform
10/02/25 00:01:44 ii : cipher type ( 3des != aes )
10/02/25 00:01:44 ii : unmatched isakmp proposal/transform
10/02/25 00:01:44 ii : cipher type ( 3des != aes )
10/02/25 00:01:44 ii : unmatched isakmp proposal/transform
10/02/25 00:01:44 ii : cipher type ( 3des != aes )
10/02/25 00:01:44 ii : unmatched isakmp proposal/transform
10/02/25 00:01:44 ii : cipher type ( 3des != aes )
10/02/25 00:01:44 ii : unmatched isakmp proposal/transform
10/02/25 00:01:44 ii : cipher type ( 3des != blowfish )
10/02/25 00:01:44 ii : unmatched isakmp proposal/transform
10/02/25 00:01:44 ii : cipher type ( 3des != blowfish )
10/02/25 00:01:44 ii : unmatched isakmp proposal/transform
10/02/25 00:01:44 ii : cipher type ( 3des != blowfish )
10/02/25 00:01:44 ii : unmatched isakmp proposal/transform
10/02/25 00:01:44 ii : cipher type ( 3des != blowfish )
10/02/25 00:01:44 ii : unmatched isakmp proposal/transform
10/02/25 00:01:44 ii : cipher type ( 3des != blowfish )
10/02/25 00:01:44 ii : unmatched isakmp proposal/transform
10/02/25 00:01:44 ii : cipher type ( 3des != blowfish )
10/02/25 00:01:44 ii : matched isakmp proposal #1 transform #13
10/02/25 00:01:44 ii : - transform    = ike
10/02/25 00:01:44 ii : - cipher type  = 3des
10/02/25 00:01:44 ii : - key length   = default
10/02/25 00:01:44 ii : - hash type    = md5
10/02/25 00:01:44 ii : - dh group     = modp-1024
10/02/25 00:01:44 ii : - auth type    = xauth-initiator-psk
10/02/25 00:01:44 ii : - life seconds = 86400
10/02/25 00:01:44 ii : - life kbytes  = 0
10/02/25 00:01:44 << : key exchange payload
10/02/25 00:01:44 << : nonce payload
10/02/25 00:01:44 << : identification payload
10/02/25 00:01:44 ii : phase1 id target is any
10/02/25 00:01:44 ii : phase1 id match 
10/02/25 00:01:44 ii : received = ipv4-host 130.166.1.6
10/02/25 00:01:44 << : hash payload
10/02/25 00:01:44 << : vendor id payload
10/02/25 00:01:44 ii : peer is CISCO UNITY compatible
10/02/25 00:01:44 << : vendor id payload
10/02/25 00:01:44 ii : peer supports XAUTH
10/02/25 00:01:44 << : vendor id payload
10/02/25 00:01:44 ii : peer supports DPDv1
10/02/25 00:01:44 << : vendor id payload
10/02/25 00:01:44 ii : peer supports nat-t ( draft v02 )
10/02/25 00:01:44 << : nat discovery payload
10/02/25 00:01:44 << : nat discovery payload
10/02/25 00:01:44 << : vendor id payload
10/02/25 00:01:44 ii : unknown vendor id ( 20 bytes )
10/02/25 00:01:44 0x : 4048b7d5 6ebce885 25e7de7f 00d6c2d3 c0000000
10/02/25 00:01:44 << : vendor id payload
10/02/25 00:01:44 ii : unknown vendor id ( 16 bytes )
10/02/25 00:01:44 0x : 7d0f58ba 85bea24f afb0eeac 3708a23b
10/02/25 00:01:44 << : vendor id payload
10/02/25 00:01:44 ii : unknown vendor id ( 16 bytes )
10/02/25 00:01:44 0x : 1f07f70e aa6514d3 b0fa9654 2a500407
10/02/25 00:01:44 ii : nat discovery - local address is translated
10/02/25 00:01:44 ii : switching to src nat-t udp port 4500
10/02/25 00:01:44 ii : switching to dst nat-t udp port 4500
10/02/25 00:01:44 == : DH shared secret ( 128 bytes )
10/02/25 00:01:44 == : SETKEYID ( 16 bytes )
10/02/25 00:01:44 == : SETKEYID_d ( 16 bytes )
10/02/25 00:01:44 == : SETKEYID_a ( 16 bytes )
10/02/25 00:01:44 == : SETKEYID_e ( 16 bytes )
10/02/25 00:01:44 == : cipher key ( 32 bytes )
10/02/25 00:01:44 == : cipher iv ( 8 bytes )
10/02/25 00:01:44 == : phase1 hash_i ( computed ) ( 16 bytes )
10/02/25 00:01:44 >> : hash payload
10/02/25 00:01:44 >> : nat discovery payload
10/02/25 00:01:44 >> : nat discovery payload
10/02/25 00:01:44 >= : cookies e8acf1cc221d8ec9:88c8ffa785bfa24f
10/02/25 00:01:44 >= : message 00000000
10/02/25 00:01:44 >= : encrypt iv ( 8 bytes )
10/02/25 00:01:44 == : encrypt packet ( 88 bytes )
10/02/25 00:01:44 == : stored iv ( 8 bytes )
10/02/25 00:01:44 DB : phase1 resend event canceled ( ref count = 1 )
10/02/25 00:01:44 -> : send NAT-T:IKE packet 192.168.1.101:4500 -> 130.166.1.6:4500 ( 124 bytes )
10/02/25 00:01:44 == : phase1 hash_r ( computed ) ( 16 bytes )
10/02/25 00:01:44 == : phase1 hash_r ( received ) ( 16 bytes )
10/02/25 00:01:44 ii : phase1 sa established
10/02/25 00:01:44 ii : 130.166.1.6:4500 <-> 192.168.1.101:4500
10/02/25 00:01:44 ii : e8acf1cc221d8ec9:88c8ffa785bfa24f
10/02/25 00:01:44 ii : sending peer INITIAL-CONTACT notification
10/02/25 00:01:44 ii : - 192.168.1.101:4500 -> 130.166.1.6:4500
10/02/25 00:01:44 ii : - isakmp spi = e8acf1cc221d8ec9:88c8ffa785bfa24f
10/02/25 00:01:44 ii : - data size 0
10/02/25 00:01:44 >> : hash payload
10/02/25 00:01:44 >> : notification payload
10/02/25 00:01:44 == : new informational hash ( 16 bytes )
10/02/25 00:01:44 == : new informational iv ( 8 bytes )
10/02/25 00:01:44 >= : cookies e8acf1cc221d8ec9:88c8ffa785bfa24f
10/02/25 00:01:44 >= : message 0333ff03
10/02/25 00:01:44 >= : encrypt iv ( 8 bytes )
10/02/25 00:01:44 == : encrypt packet ( 76 bytes )
10/02/25 00:01:44 == : stored iv ( 8 bytes )
10/02/25 00:01:44 -> : send NAT-T:IKE packet 192.168.1.101:4500 -> 130.166.1.6:4500 ( 108 bytes )
10/02/25 00:01:44 DB : phase2 not found
10/02/25 00:01:44 <- : recv NAT-T:IKE packet 130.166.1.6:4500 -> 192.168.1.101:4500 ( 100 bytes )
10/02/25 00:01:44 DB : phase1 found
10/02/25 00:01:44 ii : processing config packet ( 100 bytes )
10/02/25 00:01:44 DB : config not found
10/02/25 00:01:44 DB : config added ( obj count = 1 )
10/02/25 00:01:44 == : new config iv ( 8 bytes )
10/02/25 00:01:44 =< : cookies e8acf1cc221d8ec9:88c8ffa785bfa24f
10/02/25 00:01:44 =< : message 3086f35d
10/02/25 00:01:44 =< : decrypt iv ( 8 bytes )
10/02/25 00:01:44 == : decrypt packet ( 100 bytes )
10/02/25 00:01:44 <= : stored iv ( 8 bytes )
10/02/25 00:01:44 << : hash payload
10/02/25 00:01:44 << : attribute payload
10/02/25 00:01:44 == : configure hash_i ( computed ) ( 16 bytes )
10/02/25 00:01:44 == : configure hash_c ( computed ) ( 16 bytes )
10/02/25 00:01:44 ii : configure hash verified
10/02/25 00:01:44 ii : - xauth authentication type
10/02/25 00:01:44 ii : - xauth username
10/02/25 00:01:44 ii : - xauth password
10/02/25 00:01:44 ii : received basic xauth request - Enter Username and Password.
10/02/25 00:01:44 ii : - standard xauth username
10/02/25 00:01:44 ii : - standard xauth password
10/02/25 00:01:44 ii : sending xauth response for cot79129
10/02/25 00:01:44 >> : hash payload
10/02/25 00:01:44 >> : attribute payload
10/02/25 00:01:44 == : new configure hash ( 16 bytes )
10/02/25 00:01:44 >= : cookies e8acf1cc221d8ec9:88c8ffa785bfa24f
10/02/25 00:01:44 >= : message 3086f35d
10/02/25 00:01:44 >= : encrypt iv ( 8 bytes )
10/02/25 00:01:44 == : encrypt packet ( 83 bytes )
10/02/25 00:01:44 == : stored iv ( 8 bytes )
10/02/25 00:01:44 -> : send NAT-T:IKE packet 192.168.1.101:4500 -> 130.166.1.6:4500 ( 116 bytes )
10/02/25 00:01:44 DB : config resend event scheduled ( ref count = 2 )
10/02/25 00:01:44 <- : recv NAT-T:IKE packet 130.166.1.6:4500 -> 192.168.1.101:4500 ( 60 bytes )
10/02/25 00:01:44 DB : phase1 found
10/02/25 00:01:44 ii : processing config packet ( 60 bytes )
10/02/25 00:01:44 DB : config found
10/02/25 00:01:44 == : new config iv ( 8 bytes )
10/02/25 00:01:44 =< : cookies e8acf1cc221d8ec9:88c8ffa785bfa24f
10/02/25 00:01:44 =< : message 71e98316
10/02/25 00:01:44 =< : decrypt iv ( 8 bytes )
10/02/25 00:01:44 == : decrypt packet ( 60 bytes )
10/02/25 00:01:44 <= : stored iv ( 8 bytes )
10/02/25 00:01:44 << : hash payload
10/02/25 00:01:44 << : attribute payload
10/02/25 00:01:44 == : configure hash_i ( computed ) ( 16 bytes )
10/02/25 00:01:44 == : configure hash_c ( computed ) ( 16 bytes )
10/02/25 00:01:44 ii : configure hash verified
10/02/25 00:01:44 ii : received xauth result - 
10/02/25 00:01:44 ii : user cot79129 authentication succeeded
10/02/25 00:01:44 ii : sending xauth acknowledge
10/02/25 00:01:44 >> : hash payload
10/02/25 00:01:44 >> : attribute payload
10/02/25 00:01:44 == : new configure hash ( 16 bytes )
10/02/25 00:01:44 >= : cookies e8acf1cc221d8ec9:88c8ffa785bfa24f
10/02/25 00:01:44 >= : message 71e98316
10/02/25 00:01:44 >= : encrypt iv ( 8 bytes )
10/02/25 00:01:44 == : encrypt packet ( 56 bytes )
10/02/25 00:01:44 == : stored iv ( 8 bytes )
10/02/25 00:01:44 DB : config resend event canceled ( ref count = 1 )
10/02/25 00:01:44 -> : send NAT-T:IKE packet 192.168.1.101:4500 -> 130.166.1.6:4500 ( 92 bytes )
10/02/25 00:01:44 DB : config resend event scheduled ( ref count = 2 )
10/02/25 00:01:44 ii : building config attribute list
10/02/25 00:01:44 ii : - IP4 Address
10/02/25 00:01:44 ii : - Address Expiry
10/02/25 00:01:44 ii : - IP4 Netamask
10/02/25 00:01:44 ii : - IP4 DNS Server
10/02/25 00:01:44 ii : - IP4 WINS Server
10/02/25 00:01:44 ii : - DNS Suffix
10/02/25 00:01:44 ii : - Split DNS Domain
10/02/25 00:01:44 ii : - IP4 Split Network Include
10/02/25 00:01:44 ii : - IP4 Split Network Exclude
10/02/25 00:01:44 ii : - Login Banner
10/02/25 00:01:44 ii : - PFS Group
10/02/25 00:01:44 ii : - Save Password
10/02/25 00:01:44 ii : - Application Version = Cisco Systems VPN Client 4.8.01.0300:WinNT
10/02/25 00:01:44 ii : - Firewall Type = CISCO-UNKNOWN
10/02/25 00:01:44 == : new config iv ( 8 bytes )
10/02/25 00:01:44 ii : sending config pull request
10/02/25 00:01:44 >> : hash payload
10/02/25 00:01:44 >> : attribute payload
10/02/25 00:01:44 == : new configure hash ( 16 bytes )
10/02/25 00:01:44 >= : cookies e8acf1cc221d8ec9:88c8ffa785bfa24f
10/02/25 00:01:44 >= : message f0708405
10/02/25 00:01:44 >= : encrypt iv ( 8 bytes )
10/02/25 00:01:44 == : encrypt packet ( 166 bytes )
10/02/25 00:01:44 == : stored iv ( 8 bytes )
10/02/25 00:01:44 DB : config resend event canceled ( ref count = 1 )
10/02/25 00:01:44 -> : send NAT-T:IKE packet 192.168.1.101:4500 -> 130.166.1.6:4500 ( 204 bytes )
10/02/25 00:01:44 DB : config resend event scheduled ( ref count = 2 )
10/02/25 00:01:44 <- : recv NAT-T:IKE packet 130.166.1.6:4500 -> 192.168.1.101:4500 ( 684 bytes )
10/02/25 00:01:44 DB : phase1 found
10/02/25 00:01:44 ii : processing config packet ( 684 bytes )
10/02/25 00:01:44 DB : config found
10/02/25 00:01:44 =< : cookies e8acf1cc221d8ec9:88c8ffa785bfa24f
10/02/25 00:01:44 =< : message f0708405
10/02/25 00:01:44 =< : decrypt iv ( 8 bytes )
10/02/25 00:01:44 == : decrypt packet ( 684 bytes )
10/02/25 00:01:44 <= : trimmed packet padding ( 2 bytes )
10/02/25 00:01:44 <= : stored iv ( 8 bytes )
10/02/25 00:01:44 << : hash payload
10/02/25 00:01:44 << : attribute payload
10/02/25 00:01:44 == : configure hash_i ( computed ) ( 16 bytes )
10/02/25 00:01:44 == : configure hash_c ( computed ) ( 16 bytes )
10/02/25 00:01:44 ii : configure hash verified
10/02/25 00:01:44 ii : received config pull response
10/02/25 00:01:44 ii : - IP4 Address = 130.166.243.30
10/02/25 00:01:44 ii : - IP4 Netmask = 255.255.0.0
10/02/25 00:01:44 ii : - IP4 DNS Server = 130.166.1.242
10/02/25 00:01:44 ii : - IP4 DNS Server = 130.166.252.242
10/02/25 00:01:44 ii : - Login Banner = You are attempt ...
10/02/25 00:01:44 ii : - Save Password = 0
10/02/25 00:01:44 ii : - DNS Suffix = csun.edu
10/02/25 00:01:44 ii : - PFS Group = 0
10/02/25 00:01:44 ii : - Application Version = Cisco Systems, Inc./VPN 3000 Concentrator Version 4.7.2.P built by vmurphy on Jul 30 2008 15:10:24
10/02/25 00:01:44 DB : config resend event canceled ( ref count = 1 )
10/02/25 00:01:45 ii : enabled adapter ROOT\VNET\0000 
10/02/25 00:01:45 ii : apapter ROOT\VNET\0000 MTU is 1500
10/02/25 00:01:45 ii : creating NONE INBOUND policy ANY:130.166.1.6:* -> ANY:192.168.1.101:*
10/02/25 00:01:45 DB : policy added ( obj count = 1 )
10/02/25 00:01:45 K> : send pfkey X_SPDADD UNSPEC message
10/02/25 00:01:45 ii : creating NONE OUTBOUND policy ANY:192.168.1.101:* -> ANY:130.166.1.6:*
10/02/25 00:01:45 K< : recv pfkey X_SPDADD UNSPEC message
10/02/25 00:01:45 DB : policy found
10/02/25 00:01:45 ii : created NONE policy route for 130.166.1.6/32
10/02/25 00:01:45 DB : policy added ( obj count = 2 )
10/02/25 00:01:45 K> : send pfkey X_SPDADD UNSPEC message
10/02/25 00:01:45 ii : creating IPSEC INBOUND policy ANY:0.0.0.0/0:* -> ANY:130.166.243.30:*
10/02/25 00:01:45 DB : policy added ( obj count = 3 )
10/02/25 00:01:45 K> : send pfkey X_SPDADD UNSPEC message
10/02/25 00:01:45 ii : creating IPSEC OUTBOUND policy ANY:130.166.243.30:* -> ANY:0.0.0.0/0:*
10/02/25 00:01:45 K< : recv pfkey X_SPDADD UNSPEC message
10/02/25 00:01:45 DB : policy found
10/02/25 00:01:45 ii : calling init phase2 for initial policy
10/02/25 00:01:45 DB : policy found
10/02/25 00:01:45 DB : policy not found
10/02/25 00:01:45 !! : unable to locate inbound policy for init phase2
10/02/25 00:01:45 K< : recv pfkey X_SPDADD UNSPEC message
10/02/25 00:01:45 DB : policy found
10/02/25 00:01:45 ii : created IPSEC policy route for 0.0.0.0
10/02/25 00:01:45 DB : policy added ( obj count = 4 )
10/02/25 00:01:45 K> : send pfkey X_SPDADD UNSPEC message
10/02/25 00:01:45 K< : recv pfkey X_SPDADD UNSPEC message
10/02/25 00:01:45 DB : policy found
10/02/25 00:01:45 ii : split DNS bypassed ( no split domains defined )
10/02/25 00:01:53 <- : recv NAT-T:IKE packet 130.166.1.6:4500 -> 192.168.1.101:4500 ( 684 bytes )
10/02/25 00:01:53 DB : phase1 found
10/02/25 00:01:53 ii : processing config packet ( 684 bytes )
10/02/25 00:01:53 DB : config found
10/02/25 00:01:53 !! : config packet ignored, ( config already mature )
10/02/25 00:01:59 DB : phase1 found
10/02/25 00:01:59 ii : sending peer DPDV1-R-U-THERE notification
10/02/25 00:01:59 ii : - 192.168.1.101:4500 -> 130.166.1.6:4500
10/02/25 00:01:59 ii : - isakmp spi = e8acf1cc221d8ec9:88c8ffa785bfa24f
10/02/25 00:01:59 ii : - data size 4
10/02/25 00:01:59 >> : hash payload
10/02/25 00:01:59 >> : notification payload
10/02/25 00:01:59 == : new informational hash ( 16 bytes )
10/02/25 00:01:59 == : new informational iv ( 8 bytes )
10/02/25 00:01:59 >= : cookies e8acf1cc221d8ec9:88c8ffa785bfa24f
10/02/25 00:01:59 >= : message 801d8363
10/02/25 00:01:59 >= : encrypt iv ( 8 bytes )
10/02/25 00:01:59 == : encrypt packet ( 80 bytes )
10/02/25 00:01:59 == : stored iv ( 8 bytes )
10/02/25 00:01:59 -> : send NAT-T:IKE packet 192.168.1.101:4500 -> 130.166.1.6:4500 ( 116 bytes )
10/02/25 00:01:59 ii : DPD ARE-YOU-THERE sequence 1d4bacb5 requested
10/02/25 00:01:59 DB : phase1 found
10/02/25 00:01:59 -> : send NAT-T:KEEP-ALIVE packet 192.168.1.101:4500 -> 130.166.1.6:4500
10/02/25 00:02:00 <- : recv NAT-T:IKE packet 130.166.1.6:4500 -> 192.168.1.101:4500 ( 684 bytes )
10/02/25 00:02:00 DB : phase1 found
10/02/25 00:02:00 ii : processing config packet ( 684 bytes )
10/02/25 00:02:00 DB : config found
10/02/25 00:02:00 !! : config packet ignored, ( config already mature )
10/02/25 00:02:08 <- : recv NAT-T:IKE packet 130.166.1.6:4500 -> 192.168.1.101:4500 ( 684 bytes )
10/02/25 00:02:08 DB : phase1 found
10/02/25 00:02:08 ii : processing config packet ( 684 bytes )
10/02/25 00:02:08 DB : config found
10/02/25 00:02:08 !! : config packet ignored, ( config already mature )
10/02/25 00:02:14 DB : phase1 found
10/02/25 00:02:14 -> : send NAT-T:KEEP-ALIVE packet 192.168.1.101:4500 -> 130.166.1.6:4500
10/02/25 00:02:14 DB : phase1 found
10/02/25 00:02:14 ii : next tunnel DPD retry in 4 secs for peer 130.166.1.6:4500
10/02/25 00:02:14 ii : sending peer DPDV1-R-U-THERE notification
10/02/25 00:02:14 ii : - 192.168.1.101:4500 -> 130.166.1.6:4500
10/02/25 00:02:14 ii : - isakmp spi = e8acf1cc221d8ec9:88c8ffa785bfa24f
10/02/25 00:02:14 ii : - data size 4
10/02/25 00:02:14 >> : hash payload
10/02/25 00:02:14 >> : notification payload
10/02/25 00:02:14 == : new informational hash ( 16 bytes )
10/02/25 00:02:14 == : new informational iv ( 8 bytes )
10/02/25 00:02:14 >= : cookies e8acf1cc221d8ec9:88c8ffa785bfa24f
10/02/25 00:02:14 >= : message 77df6a93
10/02/25 00:02:14 >= : encrypt iv ( 8 bytes )
10/02/25 00:02:14 == : encrypt packet ( 80 bytes )
10/02/25 00:02:14 == : stored iv ( 8 bytes )
10/02/25 00:02:14 -> : send NAT-T:IKE packet 192.168.1.101:4500 -> 130.166.1.6:4500 ( 116 bytes )
10/02/25 00:02:14 ii : DPD ARE-YOU-THERE sequence 1d4bacb6 requested
10/02/25 00:02:16 <- : recv NAT-T:IKE packet 130.166.1.6:4500 -> 192.168.1.101:4500 ( 76 bytes )
10/02/25 00:02:16 DB : phase1 found
10/02/25 00:02:16 ii : processing informational packet ( 76 bytes )
10/02/25 00:02:16 == : new informational iv ( 8 bytes )
10/02/25 00:02:16 =< : cookies e8acf1cc221d8ec9:88c8ffa785bfa24f
10/02/25 00:02:16 =< : message de392f25
10/02/25 00:02:16 =< : decrypt iv ( 8 bytes )
10/02/25 00:02:16 == : decrypt packet ( 76 bytes )
10/02/25 00:02:16 <= : stored iv ( 8 bytes )
10/02/25 00:02:16 << : hash payload
10/02/25 00:02:16 << : delete payload
10/02/25 00:02:16 == : informational hash_i ( computed ) ( 16 bytes )
10/02/25 00:02:16 == : informational hash_c ( received ) ( 16 bytes )
10/02/25 00:02:16 ii : informational hash verified
10/02/25 00:02:16 ii : received peer DELETE message
10/02/25 00:02:16 ii : - 130.166.1.6:4500 -> 192.168.1.101:4500
10/02/25 00:02:16 ii : - isakmp spi = e8acf1cc221d8ec9:88c8ffa785bfa24f
10/02/25 00:02:16 DB : phase1 found
10/02/25 00:02:16 ii : cleanup, marked phase1 e8acf1cc221d8ec9:88c8ffa785bfa24f for removal
10/02/25 00:02:16 DB : phase1 soft event canceled ( ref count = 4 )
10/02/25 00:02:16 DB : phase1 hard event canceled ( ref count = 3 )
10/02/25 00:02:16 DB : phase1 dead event canceled ( ref count = 2 )
10/02/25 00:02:16 DB : config deleted ( obj count = 0 )
10/02/25 00:02:16 ii : phase1 removal before expire time
10/02/25 00:02:16 DB : phase1 not found
10/02/25 00:02:16 DB : phase1 deleted ( obj count = 0 )
10/02/25 00:02:16 DB : policy found
10/02/25 00:02:16 ii : removing IPSEC INBOUND policy ANY:0.0.0.0/0:* -> ANY:130.166.243.30:*
10/02/25 00:02:16 K> : send pfkey X_SPDDELETE2 UNSPEC message
10/02/25 00:02:16 DB : policy found
10/02/25 00:02:16 ii : removing IPSEC OUTBOUND policy ANY:130.166.243.30:* -> ANY:0.0.0.0/0:*
10/02/25 00:02:16 K> : send pfkey X_SPDDELETE2 UNSPEC message
10/02/25 00:02:16 K< : recv pfkey X_SPDDELETE2 UNSPEC message
10/02/25 00:02:16 ii : removed IPSEC policy route for ANY:0.0.0.0/0:*
10/02/25 00:02:16 DB : policy found
10/02/25 00:02:16 ii : removing NONE INBOUND policy ANY:130.166.1.6:* -> ANY:192.168.1.101:*
10/02/25 00:02:16 K> : send pfkey X_SPDDELETE2 UNSPEC message
10/02/25 00:02:16 DB : policy found
10/02/25 00:02:16 ii : removing NONE OUTBOUND policy ANY:192.168.1.101:* -> ANY:130.166.1.6:*
10/02/25 00:02:16 K> : send pfkey X_SPDDELETE2 UNSPEC message
10/02/25 00:02:16 ii : removed NONE policy route for ANY:130.166.1.6:*
10/02/25 00:02:16 DB : policy found
10/02/25 00:02:16 DB : policy deleted ( obj count = 3 )
10/02/25 00:02:16 K< : recv pfkey X_SPDDELETE2 UNSPEC message
10/02/25 00:02:16 DB : policy found
10/02/25 00:02:16 DB : policy deleted ( obj count = 2 )
10/02/25 00:02:16 K< : recv pfkey X_SPDDELETE2 UNSPEC message
10/02/25 00:02:16 DB : policy found
10/02/25 00:02:16 DB : policy deleted ( obj count = 1 )
10/02/25 00:02:16 K< : recv pfkey X_SPDDELETE2 UNSPEC message
10/02/25 00:02:16 DB : policy found
10/02/25 00:02:16 DB : policy deleted ( obj count = 0 )
10/02/25 00:02:18 DB : phase1 not found
10/02/25 00:02:18 !! : unable to locate phase1 to process DPD for peer 130.166.1.6:4500
10/02/25 00:02:18 ii : disable adapter ROOT\VNET\0000
10/02/25 00:02:18 DB : tunnel dpd event canceled ( ref count = 3 )
10/02/25 00:02:18 DB : tunnel natt event canceled ( ref count = 2 )
10/02/25 00:02:18 DB : tunnel stats event canceled ( ref count = 1 )
10/02/25 00:02:18 DB : removing tunnel config references
10/02/25 00:02:18 DB : removing tunnel phase2 references
10/02/25 00:02:18 DB : removing tunnel phase1 references
10/02/25 00:02:18 DB : tunnel deleted ( obj count = 0 )
10/02/25 00:02:18 DB : removing all peer tunnel refrences
10/02/25 00:02:18 DB : peer deleted ( obj count = 0 )
10/02/25 00:02:18 ii : ipc client process thread exit ...
10/02/25 00:04:03 ii : ipc client process thread begin ...
10/02/25 00:04:03 <A : peer config add message
10/02/25 00:04:03 DB : peer added ( obj count = 1 )
10/02/25 00:04:03 ii : local address 192.168.1.101 selected for peer
10/02/25 00:04:03 DB : tunnel added ( obj count = 1 )
10/02/25 00:04:03 <A : proposal config message
10/02/25 00:04:03 <A : proposal config message
10/02/25 00:04:03 <A : client config message
10/02/25 00:04:03 <A : xauth username message
10/02/25 00:04:03 <A : xauth password message
10/02/25 00:04:03 <A : local id 'csun-vpn' message
10/02/25 00:04:03 <A : preshared key message
10/02/25 00:04:03 <A : peer tunnel enable message
10/02/25 00:04:03 DB : new phase1 ( ISAKMP initiator )
10/02/25 00:04:03 DB : exchange type is aggressive
10/02/25 00:04:03 DB : 192.168.1.101:500 <-> 130.166.1.6:500
10/02/25 00:04:03 DB : 97581bb4a68d8a0a:0000000000000000
10/02/25 00:04:03 DB : phase1 added ( obj count = 1 )
10/02/25 00:04:03 >> : security association payload
10/02/25 00:04:03 >> : - proposal #1 payload 
10/02/25 00:04:03 >> : -- transform #1 payload 
10/02/25 00:04:03 >> : -- transform #2 payload 
10/02/25 00:04:03 >> : -- transform #3 payload 
10/02/25 00:04:03 >> : -- transform #4 payload 
10/02/25 00:04:03 >> : -- transform #5 payload 
10/02/25 00:04:03 >> : -- transform #6 payload 
10/02/25 00:04:03 >> : -- transform #7 payload 
10/02/25 00:04:03 >> : -- transform #8 payload 
10/02/25 00:04:03 >> : -- transform #9 payload 
10/02/25 00:04:03 >> : -- transform #10 payload 
10/02/25 00:04:03 >> : -- transform #11 payload 
10/02/25 00:04:03 >> : -- transform #12 payload 
10/02/25 00:04:03 >> : -- transform #13 payload 
10/02/25 00:04:03 >> : -- transform #14 payload 
10/02/25 00:04:03 >> : -- transform #15 payload 
10/02/25 00:04:03 >> : -- transform #16 payload 
10/02/25 00:04:03 >> : -- transform #17 payload 
10/02/25 00:04:03 >> : -- transform #18 payload 
10/02/25 00:04:03 >> : key exchange payload
10/02/25 00:04:03 >> : nonce payload
10/02/25 00:04:03 >> : identification payload
10/02/25 00:04:03 >> : vendor id payload
10/02/25 00:04:03 ii : local supports XAUTH
10/02/25 00:04:03 >> : vendor id payload
10/02/25 00:04:03 ii : local supports nat-t ( draft v00 )
10/02/25 00:04:03 >> : vendor id payload
10/02/25 00:04:03 ii : local supports nat-t ( draft v01 )
10/02/25 00:04:03 >> : vendor id payload
10/02/25 00:04:03 ii : local supports nat-t ( draft v02 )
10/02/25 00:04:03 >> : vendor id payload
10/02/25 00:04:03 ii : local supports nat-t ( draft v03 )
10/02/25 00:04:03 >> : vendor id payload
10/02/25 00:04:03 ii : local supports nat-t ( rfc )
10/02/25 00:04:03 >> : vendor id payload
10/02/25 00:04:03 ii : local supports DPDv1
10/02/25 00:04:03 >> : vendor id payload
10/02/25 00:04:03 ii : local is SHREW SOFT compatible
10/02/25 00:04:03 >> : vendor id payload
10/02/25 00:04:03 ii : local is NETSCREEN compatible
10/02/25 00:04:03 >> : vendor id payload
10/02/25 00:04:03 ii : local is SIDEWINDER compatible
10/02/25 00:04:03 >> : vendor id payload
10/02/25 00:04:03 ii : local is CISCO UNITY compatible
10/02/25 00:04:03 >= : cookies 97581bb4a68d8a0a:0000000000000000
10/02/25 00:04:03 >= : message 00000000
10/02/25 00:04:03 -> : send IKE packet 192.168.1.101:500 -> 130.166.1.6:500 ( 1160 bytes )
10/02/25 00:04:03 DB : phase1 resend event scheduled ( ref count = 2 )
10/02/25 00:04:03 <- : recv IKE packet 130.166.1.6:500 -> 192.168.1.101:500 ( 448 bytes )
10/02/25 00:04:03 DB : phase1 found
10/02/25 00:04:03 ii : processing phase1 packet ( 448 bytes )
10/02/25 00:04:03 =< : cookies 97581bb4a68d8a0a:19621858b0fc6935
10/02/25 00:04:03 =< : message 00000000
10/02/25 00:04:03 << : security association payload
10/02/25 00:04:03 << : - propsal #1 payload 
10/02/25 00:04:03 << : -- transform #13 payload 
10/02/25 00:04:03 ii : unmatched isakmp proposal/transform
10/02/25 00:04:03 ii : cipher type ( 3des != aes )
10/02/25 00:04:03 ii : unmatched isakmp proposal/transform
10/02/25 00:04:03 ii : cipher type ( 3des != aes )
10/02/25 00:04:03 ii : unmatched isakmp proposal/transform
10/02/25 00:04:03 ii : cipher type ( 3des != aes )
10/02/25 00:04:03 ii : unmatched isakmp proposal/transform
10/02/25 00:04:03 ii : cipher type ( 3des != aes )
10/02/25 00:04:03 ii : unmatched isakmp proposal/transform
10/02/25 00:04:03 ii : cipher type ( 3des != aes )
10/02/25 00:04:03 ii : unmatched isakmp proposal/transform
10/02/25 00:04:03 ii : cipher type ( 3des != aes )
10/02/25 00:04:03 ii : unmatched isakmp proposal/transform
10/02/25 00:04:03 ii : cipher type ( 3des != blowfish )
10/02/25 00:04:03 ii : unmatched isakmp proposal/transform
10/02/25 00:04:03 ii : cipher type ( 3des != blowfish )
10/02/25 00:04:03 ii : unmatched isakmp proposal/transform
10/02/25 00:04:03 ii : cipher type ( 3des != blowfish )
10/02/25 00:04:03 ii : unmatched isakmp proposal/transform
10/02/25 00:04:03 ii : cipher type ( 3des != blowfish )
10/02/25 00:04:03 ii : unmatched isakmp proposal/transform
10/02/25 00:04:03 ii : cipher type ( 3des != blowfish )
10/02/25 00:04:03 ii : unmatched isakmp proposal/transform
10/02/25 00:04:03 ii : cipher type ( 3des != blowfish )
10/02/25 00:04:03 ii : matched isakmp proposal #1 transform #13
10/02/25 00:04:03 ii : - transform    = ike
10/02/25 00:04:03 ii : - cipher type  = 3des
10/02/25 00:04:03 ii : - key length   = default
10/02/25 00:04:03 ii : - hash type    = md5
10/02/25 00:04:03 ii : - dh group     = modp-1024
10/02/25 00:04:03 ii : - auth type    = xauth-initiator-psk
10/02/25 00:04:03 ii : - life seconds = 86400
10/02/25 00:04:03 ii : - life kbytes  = 0
10/02/25 00:04:03 << : key exchange payload
10/02/25 00:04:03 << : nonce payload
10/02/25 00:04:03 << : identification payload
10/02/25 00:04:03 ii : phase1 id target is any
10/02/25 00:04:03 ii : phase1 id match 
10/02/25 00:04:03 ii : received = ipv4-host 130.166.1.6
10/02/25 00:04:03 << : hash payload
10/02/25 00:04:03 << : vendor id payload
10/02/25 00:04:03 ii : peer is CISCO UNITY compatible
10/02/25 00:04:03 << : vendor id payload
10/02/25 00:04:03 ii : peer supports XAUTH
10/02/25 00:04:03 << : vendor id payload
10/02/25 00:04:03 ii : peer supports DPDv1
10/02/25 00:04:03 << : vendor id payload
10/02/25 00:04:03 ii : peer supports nat-t ( draft v02 )
10/02/25 00:04:03 << : nat discovery payload
10/02/25 00:04:03 << : nat discovery payload
10/02/25 00:04:03 << : vendor id payload
10/02/25 00:04:03 ii : unknown vendor id ( 20 bytes )
10/02/25 00:04:03 0x : 4048b7d5 6ebce885 25e7de7f 00d6c2d3 c0000000
10/02/25 00:04:03 << : vendor id payload
10/02/25 00:04:03 ii : unknown vendor id ( 16 bytes )
10/02/25 00:04:03 0x : eca5bf45 b0fd6935 d69bed89 6eecc2f3
10/02/25 00:04:03 << : vendor id payload
10/02/25 00:04:03 ii : unknown vendor id ( 16 bytes )
10/02/25 00:04:03 0x : 1f07f70e aa6514d3 b0fa9654 2a500407
10/02/25 00:04:03 ii : nat discovery - local address is translated
10/02/25 00:04:03 ii : switching to src nat-t udp port 4500
10/02/25 00:04:03 ii : switching to dst nat-t udp port 4500
10/02/25 00:04:03 == : DH shared secret ( 128 bytes )
10/02/25 00:04:03 == : SETKEYID ( 16 bytes )
10/02/25 00:04:03 == : SETKEYID_d ( 16 bytes )
10/02/25 00:04:03 == : SETKEYID_a ( 16 bytes )
10/02/25 00:04:03 == : SETKEYID_e ( 16 bytes )
10/02/25 00:04:03 == : cipher key ( 32 bytes )
10/02/25 00:04:03 == : cipher iv ( 8 bytes )
10/02/25 00:04:03 == : phase1 hash_i ( computed ) ( 16 bytes )
10/02/25 00:04:03 >> : hash payload
10/02/25 00:04:03 >> : nat discovery payload
10/02/25 00:04:03 >> : nat discovery payload
10/02/25 00:04:03 >= : cookies 97581bb4a68d8a0a:19621858b0fc6935
10/02/25 00:04:03 >= : message 00000000
10/02/25 00:04:03 >= : encrypt iv ( 8 bytes )
10/02/25 00:04:03 == : encrypt packet ( 88 bytes )
10/02/25 00:04:03 == : stored iv ( 8 bytes )
10/02/25 00:04:03 DB : phase1 resend event canceled ( ref count = 1 )
10/02/25 00:04:03 -> : send NAT-T:IKE packet 192.168.1.101:4500 -> 130.166.1.6:4500 ( 124 bytes )
10/02/25 00:04:03 == : phase1 hash_r ( computed ) ( 16 bytes )
10/02/25 00:04:03 == : phase1 hash_r ( received ) ( 16 bytes )
10/02/25 00:04:03 ii : phase1 sa established
10/02/25 00:04:03 ii : 130.166.1.6:4500 <-> 192.168.1.101:4500
10/02/25 00:04:03 ii : 97581bb4a68d8a0a:19621858b0fc6935
10/02/25 00:04:03 ii : sending peer INITIAL-CONTACT notification
10/02/25 00:04:03 ii : - 192.168.1.101:4500 -> 130.166.1.6:4500
10/02/25 00:04:03 ii : - isakmp spi = 97581bb4a68d8a0a:19621858b0fc6935
10/02/25 00:04:03 ii : - data size 0
10/02/25 00:04:03 >> : hash payload
10/02/25 00:04:03 >> : notification payload
10/02/25 00:04:03 == : new informational hash ( 16 bytes )
10/02/25 00:04:03 == : new informational iv ( 8 bytes )
10/02/25 00:04:03 >= : cookies 97581bb4a68d8a0a:19621858b0fc6935
10/02/25 00:04:03 >= : message 47ddfe2e
10/02/25 00:04:03 >= : encrypt iv ( 8 bytes )
10/02/25 00:04:03 == : encrypt packet ( 76 bytes )
10/02/25 00:04:03 == : stored iv ( 8 bytes )
10/02/25 00:04:03 -> : send NAT-T:IKE packet 192.168.1.101:4500 -> 130.166.1.6:4500 ( 108 bytes )
10/02/25 00:04:03 DB : phase2 not found
10/02/25 00:04:03 <- : recv NAT-T:IKE packet 130.166.1.6:4500 -> 192.168.1.101:4500 ( 100 bytes )
10/02/25 00:04:03 DB : phase1 found
10/02/25 00:04:03 ii : processing config packet ( 100 bytes )
10/02/25 00:04:03 DB : config not found
10/02/25 00:04:03 DB : config added ( obj count = 1 )
10/02/25 00:04:03 == : new config iv ( 8 bytes )
10/02/25 00:04:03 =< : cookies 97581bb4a68d8a0a:19621858b0fc6935
10/02/25 00:04:03 =< : message 276c0156
10/02/25 00:04:03 =< : decrypt iv ( 8 bytes )
10/02/25 00:04:03 == : decrypt packet ( 100 bytes )
10/02/25 00:04:03 <= : stored iv ( 8 bytes )
10/02/25 00:04:03 << : hash payload
10/02/25 00:04:03 << : attribute payload
10/02/25 00:04:03 == : configure hash_i ( computed ) ( 16 bytes )
10/02/25 00:04:03 == : configure hash_c ( computed ) ( 16 bytes )
10/02/25 00:04:03 ii : configure hash verified
10/02/25 00:04:03 ii : - xauth authentication type
10/02/25 00:04:03 ii : - xauth username
10/02/25 00:04:03 ii : - xauth password
10/02/25 00:04:03 ii : received basic xauth request - Enter Username and Password.
10/02/25 00:04:03 ii : - standard xauth username
10/02/25 00:04:03 ii : - standard xauth password
10/02/25 00:04:03 ii : sending xauth response for cot79129
10/02/25 00:04:03 >> : hash payload
10/02/25 00:04:03 >> : attribute payload
10/02/25 00:04:03 == : new configure hash ( 16 bytes )
10/02/25 00:04:03 >= : cookies 97581bb4a68d8a0a:19621858b0fc6935
10/02/25 00:04:03 >= : message 276c0156
10/02/25 00:04:03 >= : encrypt iv ( 8 bytes )
10/02/25 00:04:03 == : encrypt packet ( 83 bytes )
10/02/25 00:04:03 == : stored iv ( 8 bytes )
10/02/25 00:04:03 -> : send NAT-T:IKE packet 192.168.1.101:4500 -> 130.166.1.6:4500 ( 116 bytes )
10/02/25 00:04:03 DB : config resend event scheduled ( ref count = 2 )
10/02/25 00:04:03 <- : recv NAT-T:IKE packet 130.166.1.6:4500 -> 192.168.1.101:4500 ( 60 bytes )
10/02/25 00:04:03 DB : phase1 found
10/02/25 00:04:03 ii : processing config packet ( 60 bytes )
10/02/25 00:04:03 DB : config found
10/02/25 00:04:03 == : new config iv ( 8 bytes )
10/02/25 00:04:03 =< : cookies 97581bb4a68d8a0a:19621858b0fc6935
10/02/25 00:04:03 =< : message fa6d8463
10/02/25 00:04:03 =< : decrypt iv ( 8 bytes )
10/02/25 00:04:03 == : decrypt packet ( 60 bytes )
10/02/25 00:04:03 <= : stored iv ( 8 bytes )
10/02/25 00:04:03 << : hash payload
10/02/25 00:04:03 << : attribute payload
10/02/25 00:04:03 == : configure hash_i ( computed ) ( 16 bytes )
10/02/25 00:04:03 == : configure hash_c ( computed ) ( 16 bytes )
10/02/25 00:04:03 ii : configure hash verified
10/02/25 00:04:03 ii : received xauth result - 
10/02/25 00:04:03 ii : user cot79129 authentication succeeded
10/02/25 00:04:03 ii : sending xauth acknowledge
10/02/25 00:04:03 >> : hash payload
10/02/25 00:04:03 >> : attribute payload
10/02/25 00:04:03 == : new configure hash ( 16 bytes )
10/02/25 00:04:03 >= : cookies 97581bb4a68d8a0a:19621858b0fc6935
10/02/25 00:04:03 >= : message fa6d8463
10/02/25 00:04:03 >= : encrypt iv ( 8 bytes )
10/02/25 00:04:03 == : encrypt packet ( 56 bytes )
10/02/25 00:04:03 == : stored iv ( 8 bytes )
10/02/25 00:04:03 DB : config resend event canceled ( ref count = 1 )
10/02/25 00:04:03 -> : send NAT-T:IKE packet 192.168.1.101:4500 -> 130.166.1.6:4500 ( 92 bytes )
10/02/25 00:04:03 DB : config resend event scheduled ( ref count = 2 )
10/02/25 00:04:03 ii : building config attribute list
10/02/25 00:04:03 ii : - IP4 Address
10/02/25 00:04:03 ii : - Address Expiry
10/02/25 00:04:03 ii : - IP4 Netamask
10/02/25 00:04:03 ii : - IP4 DNS Server
10/02/25 00:04:03 ii : - IP4 WINS Server
10/02/25 00:04:03 ii : - DNS Suffix
10/02/25 00:04:03 ii : - Split DNS Domain
10/02/25 00:04:03 ii : - IP4 Split Network Include
10/02/25 00:04:03 ii : - IP4 Split Network Exclude
10/02/25 00:04:03 ii : - Login Banner
10/02/25 00:04:03 ii : - Save Password
10/02/25 00:04:03 ii : - Application Version = Cisco Systems VPN Client 4.8.01.0300:WinNT
10/02/25 00:04:03 ii : - Firewall Type = CISCO-UNKNOWN
10/02/25 00:04:03 == : new config iv ( 8 bytes )
10/02/25 00:04:03 ii : sending config pull request
10/02/25 00:04:03 >> : hash payload
10/02/25 00:04:03 >> : attribute payload
10/02/25 00:04:03 == : new configure hash ( 16 bytes )
10/02/25 00:04:03 >= : cookies 97581bb4a68d8a0a:19621858b0fc6935
10/02/25 00:04:03 >= : message 9dce4127
10/02/25 00:04:03 >= : encrypt iv ( 8 bytes )
10/02/25 00:04:03 == : encrypt packet ( 162 bytes )
10/02/25 00:04:03 == : stored iv ( 8 bytes )
10/02/25 00:04:03 DB : config resend event canceled ( ref count = 1 )
10/02/25 00:04:03 -> : send NAT-T:IKE packet 192.168.1.101:4500 -> 130.166.1.6:4500 ( 196 bytes )
10/02/25 00:04:03 DB : config resend event scheduled ( ref count = 2 )
10/02/25 00:04:03 <- : recv NAT-T:IKE packet 130.166.1.6:4500 -> 192.168.1.101:4500 ( 684 bytes )
10/02/25 00:04:03 DB : phase1 found
10/02/25 00:04:03 ii : processing config packet ( 684 bytes )
10/02/25 00:04:03 DB : config found
10/02/25 00:04:03 =< : cookies 97581bb4a68d8a0a:19621858b0fc6935
10/02/25 00:04:03 =< : message 9dce4127
10/02/25 00:04:03 =< : decrypt iv ( 8 bytes )
10/02/25 00:04:03 == : decrypt packet ( 684 bytes )
10/02/25 00:04:03 <= : trimmed packet padding ( 6 bytes )
10/02/25 00:04:03 <= : stored iv ( 8 bytes )
10/02/25 00:04:03 << : hash payload
10/02/25 00:04:03 << : attribute payload
10/02/25 00:04:03 == : configure hash_i ( computed ) ( 16 bytes )
10/02/25 00:04:03 == : configure hash_c ( computed ) ( 16 bytes )
10/02/25 00:04:03 ii : configure hash verified
10/02/25 00:04:03 ii : received config pull response
10/02/25 00:04:03 ii : - IP4 Address = 130.166.243.30
10/02/25 00:04:03 ii : - IP4 Netmask = 255.255.0.0
10/02/25 00:04:03 ii : - IP4 DNS Server = 130.166.1.242
10/02/25 00:04:03 ii : - IP4 DNS Server = 130.166.252.242
10/02/25 00:04:03 ii : - Login Banner = You are attempt ...
10/02/25 00:04:03 ii : - Save Password = 0
10/02/25 00:04:03 ii : - DNS Suffix = csun.edu
10/02/25 00:04:03 ii : - Application Version = Cisco Systems, Inc./VPN 3000 Concentrator Version 4.7.2.P built by vmurphy on Jul 30 2008 15:10:24
10/02/25 00:04:03 DB : config resend event canceled ( ref count = 1 )
10/02/25 00:04:03 ii : enabled adapter ROOT\VNET\0000 
10/02/25 00:04:03 ii : apapter ROOT\VNET\0000 MTU is 1500
10/02/25 00:04:04 ii : creating NONE INBOUND policy ANY:130.166.1.6:* -> ANY:192.168.1.101:*
10/02/25 00:04:04 DB : policy added ( obj count = 1 )
10/02/25 00:04:04 K> : send pfkey X_SPDADD UNSPEC message
10/02/25 00:04:04 ii : creating NONE OUTBOUND policy ANY:192.168.1.101:* -> ANY:130.166.1.6:*
10/02/25 00:04:04 K< : recv pfkey X_SPDADD UNSPEC message
10/02/25 00:04:04 DB : policy found
10/02/25 00:04:04 ii : created NONE policy route for 130.166.1.6/32
10/02/25 00:04:04 DB : policy added ( obj count = 2 )
10/02/25 00:04:04 K> : send pfkey X_SPDADD UNSPEC message
10/02/25 00:04:04 ii : creating IPSEC INBOUND policy ANY:0.0.0.0/0:* -> ANY:130.166.243.30:*
10/02/25 00:04:04 DB : policy added ( obj count = 3 )
10/02/25 00:04:04 K> : send pfkey X_SPDADD UNSPEC message
10/02/25 00:04:04 ii : creating IPSEC OUTBOUND policy ANY:130.166.243.30:* -> ANY:0.0.0.0/0:*
10/02/25 00:04:04 K< : recv pfkey X_SPDADD UNSPEC message
10/02/25 00:04:04 DB : policy found
10/02/25 00:04:04 ii : calling init phase2 for initial policy
10/02/25 00:04:04 DB : policy found
10/02/25 00:04:04 DB : policy not found
10/02/25 00:04:04 !! : unable to locate inbound policy for init phase2
10/02/25 00:04:04 K< : recv pfkey X_SPDADD UNSPEC message
10/02/25 00:04:04 DB : policy found
10/02/25 00:04:04 ii : created IPSEC policy route for 0.0.0.0
10/02/25 00:04:04 DB : policy added ( obj count = 4 )
10/02/25 00:04:04 K> : send pfkey X_SPDADD UNSPEC message
10/02/25 00:04:04 ii : split DNS bypassed ( no split domains defined )
10/02/25 00:04:04 K< : recv pfkey X_SPDADD UNSPEC message
10/02/25 00:04:04 DB : policy found
10/02/25 00:04:11 <- : recv NAT-T:IKE packet 130.166.1.6:4500 -> 192.168.1.101:4500 ( 684 bytes )
10/02/25 00:04:11 DB : phase1 found
10/02/25 00:04:11 ii : processing config packet ( 684 bytes )
10/02/25 00:04:11 DB : config found
10/02/25 00:04:11 !! : config packet ignored, ( config already mature )
10/02/25 00:04:18 DB : phase1 found
10/02/25 00:04:18 ii : sending peer DPDV1-R-U-THERE notification
10/02/25 00:04:18 ii : - 192.168.1.101:4500 -> 130.166.1.6:4500
10/02/25 00:04:18 ii : - isakmp spi = 97581bb4a68d8a0a:19621858b0fc6935
10/02/25 00:04:18 ii : - data size 4
10/02/25 00:04:18 >> : hash payload
10/02/25 00:04:18 >> : notification payload
10/02/25 00:04:18 == : new informational hash ( 16 bytes )
10/02/25 00:04:18 == : new informational iv ( 8 bytes )
10/02/25 00:04:18 >= : cookies 97581bb4a68d8a0a:19621858b0fc6935
10/02/25 00:04:18 >= : message 63bc8121
10/02/25 00:04:18 >= : encrypt iv ( 8 bytes )
10/02/25 00:04:18 == : encrypt packet ( 80 bytes )
10/02/25 00:04:18 == : stored iv ( 8 bytes )
10/02/25 00:04:18 -> : send NAT-T:IKE packet 192.168.1.101:4500 -> 130.166.1.6:4500 ( 116 bytes )
10/02/25 00:04:18 ii : DPD ARE-YOU-THERE sequence 2338f65f requested
10/02/25 00:04:18 DB : phase1 found
10/02/25 00:04:18 -> : send NAT-T:KEEP-ALIVE packet 192.168.1.101:4500 -> 130.166.1.6:4500
10/02/25 00:04:19 <- : recv NAT-T:IKE packet 130.166.1.6:4500 -> 192.168.1.101:4500 ( 684 bytes )
10/02/25 00:04:19 DB : phase1 found
10/02/25 00:04:19 ii : processing config packet ( 684 bytes )
10/02/25 00:04:19 DB : config found
10/02/25 00:04:19 !! : config packet ignored, ( config already mature )
10/02/25 00:04:27 <- : recv NAT-T:IKE packet 130.166.1.6:4500 -> 192.168.1.101:4500 ( 684 bytes )
10/02/25 00:04:27 DB : phase1 found
10/02/25 00:04:27 ii : processing config packet ( 684 bytes )
10/02/25 00:04:27 DB : config found
10/02/25 00:04:27 !! : config packet ignored, ( config already mature )
10/02/25 00:04:33 DB : phase1 found
10/02/25 00:04:33 ii : next tunnel DPD retry in 4 secs for peer 130.166.1.6:4500
10/02/25 00:04:33 ii : sending peer DPDV1-R-U-THERE notification
10/02/25 00:04:33 ii : - 192.168.1.101:4500 -> 130.166.1.6:4500
10/02/25 00:04:33 ii : - isakmp spi = 97581bb4a68d8a0a:19621858b0fc6935
10/02/25 00:04:33 ii : - data size 4
10/02/25 00:04:33 >> : hash payload
10/02/25 00:04:33 >> : notification payload
10/02/25 00:04:33 == : new informational hash ( 16 bytes )
10/02/25 00:04:33 == : new informational iv ( 8 bytes )
10/02/25 00:04:33 >= : cookies 97581bb4a68d8a0a:19621858b0fc6935
10/02/25 00:04:33 >= : message e740793c
10/02/25 00:04:33 >= : encrypt iv ( 8 bytes )
10/02/25 00:04:33 == : encrypt packet ( 80 bytes )
10/02/25 00:04:33 == : stored iv ( 8 bytes )
10/02/25 00:04:33 -> : send NAT-T:IKE packet 192.168.1.101:4500 -> 130.166.1.6:4500 ( 116 bytes )
10/02/25 00:04:33 ii : DPD ARE-YOU-THERE sequence 2338f660 requested
10/02/25 00:04:33 DB : phase1 found
10/02/25 00:04:33 -> : send NAT-T:KEEP-ALIVE packet 192.168.1.101:4500 -> 130.166.1.6:4500
10/02/25 00:04:35 <- : recv NAT-T:IKE packet 130.166.1.6:4500 -> 192.168.1.101:4500 ( 76 bytes )
10/02/25 00:04:35 DB : phase1 found
10/02/25 00:04:35 ii : processing informational packet ( 76 bytes )
10/02/25 00:04:35 == : new informational iv ( 8 bytes )
10/02/25 00:04:35 =< : cookies 97581bb4a68d8a0a:19621858b0fc6935
10/02/25 00:04:35 =< : message 29fb0aec
10/02/25 00:04:35 =< : decrypt iv ( 8 bytes )
10/02/25 00:04:35 == : decrypt packet ( 76 bytes )
10/02/25 00:04:35 <= : stored iv ( 8 bytes )
10/02/25 00:04:35 << : hash payload
10/02/25 00:04:35 << : delete payload
10/02/25 00:04:35 == : informational hash_i ( computed ) ( 16 bytes )
10/02/25 00:04:35 == : informational hash_c ( received ) ( 16 bytes )
10/02/25 00:04:35 ii : informational hash verified
10/02/25 00:04:35 ii : received peer DELETE message
10/02/25 00:04:35 ii : - 130.166.1.6:4500 -> 192.168.1.101:4500
10/02/25 00:04:35 ii : - isakmp spi = 97581bb4a68d8a0a:19621858b0fc6935
10/02/25 00:04:35 DB : phase1 found
10/02/25 00:04:35 ii : cleanup, marked phase1 97581bb4a68d8a0a:19621858b0fc6935 for removal
10/02/25 00:04:35 DB : phase1 soft event canceled ( ref count = 4 )
10/02/25 00:04:35 DB : phase1 hard event canceled ( ref count = 3 )
10/02/25 00:04:35 DB : phase1 dead event canceled ( ref count = 2 )
10/02/25 00:04:35 DB : config deleted ( obj count = 0 )
10/02/25 00:04:35 ii : phase1 removal before expire time
10/02/25 00:04:35 DB : phase1 not found
10/02/25 00:04:35 DB : policy found
10/02/25 00:04:35 ii : removing IPSEC INBOUND policy ANY:0.0.0.0/0:* -> ANY:130.166.243.30:*
10/02/25 00:04:35 K> : send pfkey X_SPDDELETE2 UNSPEC message
10/02/25 00:04:35 DB : policy found
10/02/25 00:04:35 ii : removing IPSEC OUTBOUND policy ANY:130.166.243.30:* -> ANY:0.0.0.0/0:*
10/02/25 00:04:35 K> : send pfkey X_SPDDELETE2 UNSPEC message
10/02/25 00:04:35 K< : recv pfkey X_SPDDELETE2 UNSPEC message
10/02/25 00:04:35 ii : removed IPSEC policy route for ANY:0.0.0.0/0:*
10/02/25 00:04:35 DB : policy found
10/02/25 00:04:35 ii : removing NONE INBOUND policy ANY:130.166.1.6:* -> ANY:192.168.1.101:*
10/02/25 00:04:35 K> : send pfkey X_SPDDELETE2 UNSPEC message
10/02/25 00:04:35 DB : policy found
10/02/25 00:04:35 ii : removing NONE OUTBOUND policy ANY:192.168.1.101:* -> ANY:130.166.1.6:*
10/02/25 00:04:35 K> : send pfkey X_SPDDELETE2 UNSPEC message
10/02/25 00:04:35 ii : removed NONE policy route for ANY:130.166.1.6:*
10/02/25 00:04:35 DB : phase1 deleted ( obj count = 0 )
10/02/25 00:04:35 DB : policy found
10/02/25 00:04:35 DB : policy deleted ( obj count = 3 )
10/02/25 00:04:35 K< : recv pfkey X_SPDDELETE2 UNSPEC message
10/02/25 00:04:35 DB : policy found
10/02/25 00:04:35 DB : policy deleted ( obj count = 2 )
10/02/25 00:04:35 K< : recv pfkey X_SPDDELETE2 UNSPEC message
10/02/25 00:04:35 DB : policy found
10/02/25 00:04:35 DB : policy deleted ( obj count = 1 )
10/02/25 00:04:35 K< : recv pfkey X_SPDDELETE2 UNSPEC message
10/02/25 00:04:35 DB : policy found
10/02/25 00:04:35 DB : policy deleted ( obj count = 0 )
10/02/25 00:04:36 ii : disable adapter ROOT\VNET\0000
10/02/25 00:04:36 DB : tunnel dpd event canceled ( ref count = 3 )
10/02/25 00:04:36 DB : tunnel natt event canceled ( ref count = 2 )
10/02/25 00:04:36 DB : tunnel stats event canceled ( ref count = 1 )
10/02/25 00:04:36 DB : removing tunnel config references
10/02/25 00:04:36 DB : removing tunnel phase2 references
10/02/25 00:04:36 DB : removing tunnel phase1 references
10/02/25 00:04:36 DB : tunnel deleted ( obj count = 0 )
10/02/25 00:04:36 DB : removing all peer tunnel refrences
10/02/25 00:04:36 DB : peer deleted ( obj count = 0 )
10/02/25 00:04:36 ii : ipc client process thread exit ...


More information about the vpn-help mailing list