[vpn-help] Funkwerk R4100 crashes on Phase2 totally

Dirk Wahrheit wahrheit at macnetix.de
Wed Mar 23 03:05:52 CDT 2011


Hi,

I am using a Funkwerk (Former Bintec) R4100 with latest SW-Release V.7.9 Rev. 5 (Patch 5) IPSec from 2011/02/04 00:00:00
When I connect with the Shewsoft Client V.2.1.7 the Router crashes totally and reboots.
Connections from Old Bintec IPSec Client and NCP Client are fine.

Settings for Shewsoft Client from (german with English screenshots):
http://www.router-forum.de/board-bintec-funkwerk-enterprise-communications/thread-ipsec-bintec--lt---gt--shrew-soft-client-51944-page-1.html

Settings for R4100 as given in the Article (german):
http://www.funkwerk-ec.com/faq_bintec_262_ipsecclient_zu_r3000_ikeconfigmode_fci_01_de,10993,194.html


Any Ideas?

debug log from Funkwerk R4100 console:
16:45:31 DEBUG/IPSEC: P1: peer 0 () sa 3 (R): new ip 79.197.214.162 <- ip 178.26.9.170
16:45:31 INFO/IPSEC: P1: peer 0 () sa 3 (R): Vendor ID: 178.26.9.170:500 (No Id) is 'draft-ietf-ipsec-nat-t-ike-00'
16:45:31 INFO/IPSEC: P1: peer 0 () sa 3 (R): Vendor ID: 178.26.9.170:500 (No Id) is '16f6ca16e4a4066d83821a0f0aeaa862'
16:45:31 INFO/IPSEC: P1: peer 0 () sa 3 (R): Vendor ID: 178.26.9.170:500 (No Id) is 'draft-ietf-ipsec-nat-t-ike-02'
16:45:31 INFO/IPSEC: P1: peer 0 () sa 3 (R): Vendor ID: 178.26.9.170:500 (No Id) is 'draft-ietf-ipsec-nat-t-ike-03'
16:45:31 INFO/IPSEC: P1: peer 0 () sa 3 (R): Vendor ID: 178.26.9.170:500 (No Id) is '4a131c81070358455c5728f20e95452f'
16:45:31 INFO/IPSEC: P1: peer 0 () sa 3 (R): Vendor ID: 178.26.9.170:500 (No Id) is '4048b7d56ebce88525e7de7f00d6c2d380000000'
16:45:31 INFO/IPSEC: P1: peer 0 () sa 3 (R): Vendor ID: 178.26.9.170:500 (No Id) is 'Dead Peer Detection (DPD, RFC 3706)'
16:45:31 INFO/IPSEC: P1: peer 0 () sa 3 (R): Vendor ID: 178.26.9.170:500 (No Id) is 'f14b94b7bff1fef02773b8c49feded26'
16:45:31 INFO/IPSEC: P1: peer 0 () sa 3 (R): Vendor ID: 178.26.9.170:500 (No Id) is '166f932d55eb64d8e4df4fd37e2313f0d0fd8451'
16:45:31 INFO/IPSEC: P1: peer 0 () sa 3 (R): Vendor ID: 178.26.9.170:500 (No Id) is '8404adf9cda05760b2ca292e4bff537b'
16:45:31 INFO/IPSEC: P1: peer 0 () sa 3 (R): Vendor ID: 178.26.9.170:500 (No Id) is '12f5f28c457168a9702d9fe274cc0100'
16:45:31 DEBUG/IPSEC: P1: peer 3 (MAC_Schwanke-Seer) sa 3 (R): identified ip 79.197.214.162 <- ip 178.26.9.170
16:45:31 DEBUG/INET: NAT: new incoming session on ifc 10001 prot 17 79.197.214.162:4500/79.197.214.162:4500 <- 178.26.9.170:4500

è Here Router crashes and reboots


Debug from Shewsoft:
<PRIVATE_DONE_BY_ME>  == I changed it to for non public Information

11/03/22 17:45:01 ## : IKE Daemon, ver 2.1.7
11/03/22 17:45:01 ## : Copyright 2010 Shrew Soft Inc.
11/03/22 17:45:01 ## : This product linked OpenSSL 0.9.8h 28 May 2008
11/03/22 17:45:01 ii : opened 'C:\Program Files\ShrewSoft\VPN Client\debug\iked.log'
11/03/22 17:45:01 ii : rebuilding vnet device list ...
11/03/22 17:45:01 ii : device ROOT\VNET\0000 disabled
11/03/22 17:45:01 ii : network process thread begin ...
11/03/22 17:45:01 ii : ipc server process thread begin ...
11/03/22 17:45:01 ii : pfkey process thread begin ...
11/03/22 17:45:31 ii : ipc client process thread begin ...
11/03/22 17:45:31 <A : peer config add message
11/03/22 17:45:31 DB : peer added ( obj count = 1 )
11/03/22 17:45:31 ii : local address 192.168.178.24 selected for peer
11/03/22 17:45:31 DB : tunnel added ( obj count = 1 )
11/03/22 17:45:31 <A : proposal config message
11/03/22 17:45:31 <A : proposal config message
11/03/22 17:45:31 <A : client config message
11/03/22 17:45:31 <A : local id '<PRIVATE_DONE_BY_ME>' message
11/03/22 17:45:31 <A : remote id '<PRIVATE_DONE_BY_ME>' message
11/03/22 17:45:31 <A : preshared key message
11/03/22 17:45:31 <A : peer tunnel enable message
11/03/22 17:45:31 DB : new phase1 ( ISAKMP initiator )
11/03/22 17:45:31 DB : exchange type is aggressive
11/03/22 17:45:31 DB : 192.168.178.24:500 <-> 79.197.214.162:500
11/03/22 17:45:31 DB : 97fa5bcdbac05134:0000000000000000
11/03/22 17:45:31 DB : phase1 added ( obj count = 1 )
11/03/22 17:45:31 >> : security association payload
11/03/22 17:45:31 >> : - proposal #1 payload
11/03/22 17:45:31 >> : -- transform #1 payload
11/03/22 17:45:31 >> : key exchange payload
11/03/22 17:45:31 >> : nonce payload
11/03/22 17:45:31 >> : identification payload
11/03/22 17:45:31 >> : vendor id payload
11/03/22 17:45:31 ii : local supports nat-t ( draft v00 )
11/03/22 17:45:31 >> : vendor id payload
11/03/22 17:45:31 ii : local supports nat-t ( draft v01 )
11/03/22 17:45:31 >> : vendor id payload
11/03/22 17:45:31 ii : local supports nat-t ( draft v02 )
11/03/22 17:45:31 >> : vendor id payload
11/03/22 17:45:31 ii : local supports nat-t ( draft v03 )
11/03/22 17:45:31 >> : vendor id payload
11/03/22 17:45:31 ii : local supports nat-t ( rfc )
11/03/22 17:45:31 >> : vendor id payload
11/03/22 17:45:31 ii : local supports FRAGMENTATION
11/03/22 17:45:31 >> : vendor id payload
11/03/22 17:45:31 ii : local supports DPDv1
11/03/22 17:45:31 >> : vendor id payload
11/03/22 17:45:31 ii : local is SHREW SOFT compatible
11/03/22 17:45:31 >> : vendor id payload
11/03/22 17:45:31 ii : local is NETSCREEN compatible
11/03/22 17:45:31 >> : vendor id payload
11/03/22 17:45:31 ii : local is SIDEWINDER compatible
11/03/22 17:45:31 >> : vendor id payload
11/03/22 17:45:31 ii : local is CISCO UNITY compatible
11/03/22 17:45:31 >= : cookies 97fa5bcdbac05134:0000000000000000
11/03/22 17:45:31 >= : message 00000000
11/03/22 17:45:31 -> : send IKE packet 192.168.178.24:500 -> 79.197.214.162:500 ( 533 bytes )
11/03/22 17:45:31 DB : phase1 resend event scheduled ( ref count = 2 )
11/03/22 17:45:31 <- : recv IKE packet 79.197.214.162:500 -> 192.168.178.24:500 ( 473 bytes )
11/03/22 17:45:31 DB : phase1 found
11/03/22 17:45:31 ii : processing phase1 packet ( 473 bytes )
11/03/22 17:45:31 =< : cookies 97fa5bcdbac05134:4fc9666dfcbc8a34
11/03/22 17:45:31 =< : message 00000000
11/03/22 17:45:31 << : security association payload
11/03/22 17:45:31 << : - propsal #1 payload
11/03/22 17:45:31 << : -- transform #1 payload
11/03/22 17:45:31 ii : matched isakmp proposal #1 transform #1
11/03/22 17:45:31 ii : - transform    = ike
11/03/22 17:45:31 ii : - cipher type  = aes
11/03/22 17:45:31 ii : - key length   = 128 bits
11/03/22 17:45:31 ii : - hash type    = md5
11/03/22 17:45:31 ii : - dh group     = modp-1024
11/03/22 17:45:31 ii : - auth type    = psk
11/03/22 17:45:31 ii : - life seconds = 14400
11/03/22 17:45:31 ii : - life kbytes  = 0
11/03/22 17:45:31 << : key exchange payload
11/03/22 17:45:31 << : nonce payload
11/03/22 17:45:31 << : identification payload
11/03/22 17:45:31 ii : phase1 id match
11/03/22 17:45:31 ii : received = fqdn <PRIVATE_DONE_BY_ME>
11/03/22 17:45:31 << : hash payload
11/03/22 17:45:31 << : vendor id payload
11/03/22 17:45:31 ii : unknown vendor id ( 16 bytes )
11/03/22 17:45:31 0x : 0048e227 0bea8395 ed778d34 3cc2a076
11/03/22 17:45:31 << : vendor id payload
11/03/22 17:45:31 ii : unknown vendor id ( 16 bytes )
11/03/22 17:45:31 0x : 810fa565 f8ab1436 9105d706 fbd57279
11/03/22 17:45:31 << : vendor id payload
11/03/22 17:45:31 ii : peer supports nat-t ( draft v03 )
11/03/22 17:45:31 << : vendor id payload
11/03/22 17:45:31 ii : peer supports nat-t ( draft v02 )
11/03/22 17:45:31 << : vendor id payload
11/03/22 17:45:31 ii : unknown vendor id ( 16 bytes )
11/03/22 17:45:31 0x : cd604643 35df21f8 7cfdb2fc 68b6a448
11/03/22 17:45:31 << : vendor id payload
11/03/22 17:45:31 ii : peer supports nat-t ( draft v00 )
11/03/22 17:45:31 << : vendor id payload
11/03/22 17:45:31 ii : peer supports XAUTH
11/03/22 17:45:31 << : vendor id payload
11/03/22 17:45:31 ii : peer supports DPDv1
11/03/22 17:45:31 << : nat discovery payload
11/03/22 17:45:31 << : nat discovery payload
11/03/22 17:45:31 ii : nat discovery - local address is translated
11/03/22 17:45:31 ii : switching to src nat-t udp port 4500
11/03/22 17:45:31 ii : switching to dst nat-t udp port 4500
11/03/22 17:45:31 == : DH shared secret ( 128 bytes )
11/03/22 17:45:31 == : SETKEYID ( 16 bytes )
11/03/22 17:45:31 == : SETKEYID_d ( 16 bytes )
11/03/22 17:45:31 == : SETKEYID_a ( 16 bytes )
11/03/22 17:45:31 == : SETKEYID_e ( 16 bytes )
11/03/22 17:45:31 == : cipher key ( 16 bytes )
11/03/22 17:45:31 == : cipher iv ( 16 bytes )
11/03/22 17:45:31 == : phase1 hash_i ( computed ) ( 16 bytes )
11/03/22 17:45:31 >> : hash payload
11/03/22 17:45:31 >> : nat discovery payload
11/03/22 17:45:31 >> : nat discovery payload
11/03/22 17:45:31 >= : cookies 97fa5bcdbac05134:4fc9666dfcbc8a34
11/03/22 17:45:31 >= : message 00000000
11/03/22 17:45:31 >= : encrypt iv ( 16 bytes )
11/03/22 17:45:31 == : encrypt packet ( 88 bytes )
11/03/22 17:45:31 == : stored iv ( 16 bytes )
11/03/22 17:45:31 DB : phase1 resend event canceled ( ref count = 1 )
11/03/22 17:45:31 -> : send NAT-T:IKE packet 192.168.178.24:4500 -> 79.197.214.162:4500 ( 124 bytes )
11/03/22 17:45:31 == : phase1 hash_r ( computed ) ( 16 bytes )
11/03/22 17:45:31 == : phase1 hash_r ( received ) ( 16 bytes )
11/03/22 17:45:31 ii : phase1 sa established
11/03/22 17:45:31 ii : 79.197.214.162:4500 <-> 192.168.178.24:4500
11/03/22 17:45:31 ii : 97fa5bcdbac05134:4fc9666dfcbc8a34
11/03/22 17:45:31 ii : sending peer INITIAL-CONTACT notification
11/03/22 17:45:31 ii : - 192.168.178.24:4500 -> 79.197.214.162:4500
11/03/22 17:45:31 ii : - isakmp spi = 97fa5bcdbac05134:4fc9666dfcbc8a34
11/03/22 17:45:31 ii : - data size 0
11/03/22 17:45:31 >> : hash payload
11/03/22 17:45:31 >> : notification payload
11/03/22 17:45:31 == : new informational hash ( 16 bytes )
11/03/22 17:45:31 == : new informational iv ( 16 bytes )
11/03/22 17:45:31 >= : cookies 97fa5bcdbac05134:4fc9666dfcbc8a34
11/03/22 17:45:31 >= : message fef119d8
11/03/22 17:45:31 >= : encrypt iv ( 16 bytes )
11/03/22 17:45:31 == : encrypt packet ( 76 bytes )
11/03/22 17:45:31 == : stored iv ( 16 bytes )
11/03/22 17:45:31 -> : send NAT-T:IKE packet 192.168.178.24:4500 -> 79.197.214.162:4500 ( 108 bytes )
11/03/22 17:45:31 DB : config added ( obj count = 1 )
11/03/22 17:45:31 ii : building config attribute list
11/03/22 17:45:31 ii : - IP4 Address
11/03/22 17:45:31 ii : - Address Expiry
11/03/22 17:45:31 ii : - IP4 Netamask
11/03/22 17:45:31 ii : - IP4 DNS Server
11/03/22 17:45:31 ii : - IP4 WINS Server
11/03/22 17:45:31 ii : - IP4 Subnet
11/03/22 17:45:31 == : new config iv ( 16 bytes )
11/03/22 17:45:31 ii : sending config pull request
11/03/22 17:45:31 >> : hash payload
11/03/22 17:45:31 >> : attribute payload
11/03/22 17:45:31 == : new configure hash ( 16 bytes )
11/03/22 17:45:31 >= : cookies 97fa5bcdbac05134:4fc9666dfcbc8a34
11/03/22 17:45:31 >= : message aa57932e
11/03/22 17:45:31 >= : encrypt iv ( 16 bytes )
11/03/22 17:45:31 == : encrypt packet ( 80 bytes )
11/03/22 17:45:31 == : stored iv ( 16 bytes )
11/03/22 17:45:31 -> : send NAT-T:IKE packet 192.168.178.24:4500 -> 79.197.214.162:4500 ( 124 bytes )
11/03/22 17:45:31 DB : config resend event scheduled ( ref count = 2 )
11/03/22 17:45:31 DB : phase2 not found
11/03/22 17:45:36 -> : resend 1 config packet(s) 192.168.178.24:4500 -> 79.197.214.162:4500
11/03/22 17:45:41 -> : resend 1 config packet(s) 192.168.178.24:4500 -> 79.197.214.162:4500
11/03/22 17:45:46 DB : phase1 found
11/03/22 17:45:46 ii : sending peer DPDV1-R-U-THERE notification
11/03/22 17:45:46 ii : - 192.168.178.24:4500 -> 79.197.214.162:4500
11/03/22 17:45:46 ii : - isakmp spi = 97fa5bcdbac05134:4fc9666dfcbc8a34
11/03/22 17:45:46 ii : - data size 4
11/03/22 17:45:46 >> : hash payload
11/03/22 17:45:46 >> : notification payload
11/03/22 17:45:46 == : new informational hash ( 16 bytes )
11/03/22 17:45:46 == : new informational iv ( 16 bytes )
11/03/22 17:45:46 >= : cookies 97fa5bcdbac05134:4fc9666dfcbc8a34
11/03/22 17:45:46 >= : message 03f63145
11/03/22 17:45:46 >= : encrypt iv ( 16 bytes )
11/03/22 17:45:46 == : encrypt packet ( 80 bytes )
11/03/22 17:45:46 == : stored iv ( 16 bytes )
11/03/22 17:45:46 -> : send NAT-T:IKE packet 192.168.178.24:4500 -> 79.197.214.162:4500 ( 124 bytes )
11/03/22 17:45:46 ii : DPD ARE-YOU-THERE sequence 3266bf02 requested
11/03/22 17:45:46 DB : phase1 found
11/03/22 17:45:46 -> : send NAT-T:KEEP-ALIVE packet 192.168.178.24:4500 -> 79.197.214.162:4500
11/03/22 17:45:46 -> : resend 1 config packet(s) 192.168.178.24:4500 -> 79.197.214.162:4500
11/03/22 17:45:51 ii : resend limit exceeded for config exchange
11/03/22 17:45:51 DB : config deleted ( obj count = 0 )
11/03/22 17:46:01 DB : phase1 found
11/03/22 17:46:01 -> : send NAT-T:KEEP-ALIVE packet 192.168.178.24:4500 -> 79.197.214.162:4500
11/03/22 17:46:01 DB : phase1 found
11/03/22 17:46:01 ii : next tunnel DPD retry in 4 secs for peer 79.197.214.162:4500
11/03/22 17:46:01 ii : sending peer DPDV1-R-U-THERE notification
11/03/22 17:46:01 ii : - 192.168.178.24:4500 -> 79.197.214.162:4500
11/03/22 17:46:01 ii : - isakmp spi = 97fa5bcdbac05134:4fc9666dfcbc8a34
11/03/22 17:46:01 ii : - data size 4
11/03/22 17:46:01 >> : hash payload
11/03/22 17:46:01 >> : notification payload
11/03/22 17:46:01 == : new informational hash ( 16 bytes )
11/03/22 17:46:01 == : new informational iv ( 16 bytes )
11/03/22 17:46:01 >= : cookies 97fa5bcdbac05134:4fc9666dfcbc8a34
11/03/22 17:46:01 >= : message 7f6e94af
11/03/22 17:46:01 >= : encrypt iv ( 16 bytes )
11/03/22 17:46:01 == : encrypt packet ( 80 bytes )
11/03/22 17:46:01 == : stored iv ( 16 bytes )
11/03/22 17:46:01 -> : send NAT-T:IKE packet 192.168.178.24:4500 -> 79.197.214.162:4500 ( 124 bytes )
11/03/22 17:46:01 ii : DPD ARE-YOU-THERE sequence 3266bf03 requested
11/03/22 17:46:05 DB : phase1 found
11/03/22 17:46:05 ii : next tunnel DPD retry in 3 secs for peer 79.197.214.162:4500
11/03/22 17:46:05 ii : sending peer DPDV1-R-U-THERE notification
11/03/22 17:46:05 ii : - 192.168.178.24:4500 -> 79.197.214.162:4500
11/03/22 17:46:05 ii : - isakmp spi = 97fa5bcdbac05134:4fc9666dfcbc8a34
11/03/22 17:46:05 ii : - data size 4
11/03/22 17:46:05 >> : hash payload
11/03/22 17:46:05 >> : notification payload
11/03/22 17:46:05 == : new informational hash ( 16 bytes )
11/03/22 17:46:05 == : new informational iv ( 16 bytes )
11/03/22 17:46:05 >= : cookies 97fa5bcdbac05134:4fc9666dfcbc8a34
11/03/22 17:46:05 >= : message 7db1d967
11/03/22 17:46:05 >= : encrypt iv ( 16 bytes )
11/03/22 17:46:05 == : encrypt packet ( 80 bytes )
11/03/22 17:46:05 == : stored iv ( 16 bytes )
11/03/22 17:46:05 -> : send NAT-T:IKE packet 192.168.178.24:4500 -> 79.197.214.162:4500 ( 124 bytes )
11/03/22 17:46:05 ii : DPD ARE-YOU-THERE sequence 3266bf04 requested
11/03/22 17:46:08 DB : phase1 found
11/03/22 17:46:08 ii : next tunnel DPD retry in 2 secs for peer 79.197.214.162:4500
11/03/22 17:46:08 ii : sending peer DPDV1-R-U-THERE notification
11/03/22 17:46:08 ii : - 192.168.178.24:4500 -> 79.197.214.162:4500
11/03/22 17:46:08 ii : - isakmp spi = 97fa5bcdbac05134:4fc9666dfcbc8a34
11/03/22 17:46:08 ii : - data size 4
11/03/22 17:46:08 >> : hash payload
11/03/22 17:46:08 >> : notification payload
11/03/22 17:46:08 == : new informational hash ( 16 bytes )
11/03/22 17:46:08 == : new informational iv ( 16 bytes )
11/03/22 17:46:08 >= : cookies 97fa5bcdbac05134:4fc9666dfcbc8a34
11/03/22 17:46:08 >= : message d06a3948
11/03/22 17:46:08 >= : encrypt iv ( 16 bytes )
11/03/22 17:46:08 == : encrypt packet ( 80 bytes )
11/03/22 17:46:08 == : stored iv ( 16 bytes )
11/03/22 17:46:08 -> : send NAT-T:IKE packet 192.168.178.24:4500 -> 79.197.214.162:4500 ( 124 bytes )
11/03/22 17:46:08 ii : DPD ARE-YOU-THERE sequence 3266bf05 requested
11/03/22 17:46:10 DB : phase1 found
11/03/22 17:46:10 ii : next tunnel DPD retry in 1 secs for peer 79.197.214.162:4500
11/03/22 17:46:10 ii : sending peer DPDV1-R-U-THERE notification
11/03/22 17:46:10 ii : - 192.168.178.24:4500 -> 79.197.214.162:4500
11/03/22 17:46:10 ii : - isakmp spi = 97fa5bcdbac05134:4fc9666dfcbc8a34
11/03/22 17:46:10 ii : - data size 4
11/03/22 17:46:10 >> : hash payload
11/03/22 17:46:10 >> : notification payload
11/03/22 17:46:10 == : new informational hash ( 16 bytes )
11/03/22 17:46:10 == : new informational iv ( 16 bytes )
11/03/22 17:46:10 >= : cookies 97fa5bcdbac05134:4fc9666dfcbc8a34
11/03/22 17:46:10 >= : message 3113028a
11/03/22 17:46:10 >= : encrypt iv ( 16 bytes )
11/03/22 17:46:10 == : encrypt packet ( 80 bytes )
11/03/22 17:46:10 == : stored iv ( 16 bytes )
11/03/22 17:46:10 -> : send NAT-T:IKE packet 192.168.178.24:4500 -> 79.197.214.162:4500 ( 124 bytes )
11/03/22 17:46:10 ii : DPD ARE-YOU-THERE sequence 3266bf06 requested
11/03/22 17:46:11 !! : tunnel DPD timeout for peer 79.197.214.162:4500
11/03/22 17:46:11 DB : policy not found
11/03/22 17:46:11 DB : policy not found
11/03/22 17:46:11 DB : policy not found
11/03/22 17:46:11 DB : policy not found
11/03/22 17:46:11 DB : tunnel natt event canceled ( ref count = 3 )
11/03/22 17:46:11 DB : tunnel stats event canceled ( ref count = 2 )
11/03/22 17:46:11 DB : removing tunnel config references
11/03/22 17:46:11 DB : removing tunnel phase2 references
11/03/22 17:46:11 DB : removing tunnel phase1 references
11/03/22 17:46:11 DB : phase1 soft event canceled ( ref count = 3 )
11/03/22 17:46:11 DB : phase1 hard event canceled ( ref count = 2 )
11/03/22 17:46:11 DB : phase1 dead event canceled ( ref count = 1 )
11/03/22 17:46:11 ii : sending peer DELETE message
11/03/22 17:46:11 ii : - 192.168.178.24:4500 -> 79.197.214.162:4500
11/03/22 17:46:11 ii : - isakmp spi = 97fa5bcdbac05134:4fc9666dfcbc8a34
11/03/22 17:46:11 ii : - data size 0
11/03/22 17:46:11 >> : hash payload
11/03/22 17:46:11 >> : delete payload
11/03/22 17:46:11 == : new informational hash ( 16 bytes )
11/03/22 17:46:11 == : new informational iv ( 16 bytes )
11/03/22 17:46:11 >= : cookies 97fa5bcdbac05134:4fc9666dfcbc8a34
11/03/22 17:46:11 >= : message f02aa6e1
11/03/22 17:46:11 >= : encrypt iv ( 16 bytes )
11/03/22 17:46:11 == : encrypt packet ( 76 bytes )
11/03/22 17:46:11 == : stored iv ( 16 bytes )
11/03/22 17:46:11 -> : send NAT-T:IKE packet 192.168.178.24:4500 -> 79.197.214.162:4500 ( 108 bytes )
11/03/22 17:46:11 ii : phase1 removal before expire time
11/03/22 17:46:11 DB : phase1 deleted ( obj count = 0 )
11/03/22 17:46:11 DB : tunnel deleted ( obj count = 0 )
11/03/22 17:46:11 DB : removing all peer tunnel refrences
11/03/22 17:46:11 DB : peer deleted ( obj count = 0 )
11/03/22 17:46:11 ii : ipc client process thread exit ...


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.shrew.net/pipermail/vpn-help/attachments/20110323/0e667ccd/attachment-0001.html>


More information about the vpn-help mailing list