[vpn-help] Tunnel not coming up ..Urgent ..

nikish bhat nikishbhat at googlemail.com
Sat Oct 13 12:48:34 CDT 2012


Hi Alex,

Attached also is the error output from shrew utility.

Regards,
Nikish

On Tue, Oct 2, 2012 at 7:08 PM, nikish bhat <nikishbhat at googlemail.com>wrote:

> Hi Team,
>
> I am using shrew client version 2.1.7 to connect to an SRX-100 VPN gateway
> with JUNOS 11.4 but I am getting the below mentioned error everytime.I
> am trying it from the past 3-4 days but still no luck.
> I am having WIN7 64-bit on my windows machine.
>
> I am really struggling to get the tunnel enabled.
> Appreciate any help.
>
>
> 12/10/02 18:56:01 ii : ipc client process thread begin ...
>
> 12/10/02 18:56:01 <A : peer config add message
>
> 12/10/02 18:56:01 DB : peer added ( obj count = 1 )
>
> 12/10/02 18:56:01 ii : local address x.x.x.x selected for peer
>
> 12/10/02 18:56:01 DB : tunnel added ( obj count = 1 )
>
> 12/10/02 18:56:01 <A : proposal config message
>
> 12/10/02 18:56:01 <A : proposal config message
>
> 12/10/02 18:56:01 <A : client config message
>
> 12/10/02 18:56:01 <A : xauth username message
>
> 12/10/02 18:56:01 <A : xauth password message
>
> 12/10/02 18:56:01 <A : local id 'remote at domian.com' message
>
> 12/10/02 18:56:01 <A : preshared key message
>
> 12/10/02 18:56:01 <A : peer tunnel enable message
>
> 12/10/02 18:56:01 DB : new phase1 ( ISAKMP initiator )
>
> 12/10/02 18:56:01 DB : exchange type is aggressive
>
> 12/10/02 18:56:01 DB : x.x.x.x::500 <-> x.x.x.x:500
>
> 12/10/02 18:56:01 DB : eba815e2952d5cf8:0000000000000000
>
> 12/10/02 18:56:01 DB : phase1 added ( obj count = 1 )
>
> 12/10/02 18:56:01 >> : security association payload
>
> 12/10/02 18:56:01 >> : - proposal #1 payload
>
> 12/10/02 18:56:01 >> : -- transform #1 payload
>
> 12/10/02 18:56:01 >> : key exchange payload
>
> 12/10/02 18:56:01 >> : nonce payload
>
> 12/10/02 18:56:01 >> : identification payload
>
> 12/10/02 18:56:01 >> : vendor id payload
>
> 12/10/02 18:56:01 ii : local supports XAUTH
>
> 12/10/02 18:56:01 >> : vendor id payload
>
> 12/10/02 18:56:01 ii : local supports nat-t ( draft v00 )
>
> 12/10/02 18:56:01 >> : vendor id payload
>
> 12/10/02 18:56:01 ii : local supports nat-t ( draft v01 )
>
> 12/10/02 18:56:01 >> : vendor id payload
>
> 12/10/02 18:56:01 ii : local supports nat-t ( draft v02 )
>
> 12/10/02 18:56:01 >> : vendor id payload
>
> 12/10/02 18:56:01 ii : local supports nat-t ( draft v03 )
>
> 12/10/02 18:56:01 >> : vendor id payload
>
> 12/10/02 18:56:01 ii : local supports nat-t ( rfc )
>
> 12/10/02 18:56:01 >> : vendor id payload
>
> 12/10/02 18:56:01 ii : local supports FRAGMENTATION
>
> 12/10/02 18:56:01 >> : vendor id payload
>
> 12/10/02 18:56:01 ii : local supports DPDv1
>
> 12/10/02 18:56:01 >> : vendor id payload
>
> 12/10/02 18:56:01 ii : local is SHREW SOFT compatible
>
> 12/10/02 18:56:01 >> : vendor id payload
>
> 12/10/02 18:56:01 ii : local is NETSCREEN compatible
>
> 12/10/02 18:56:01 >> : vendor id payload
>
> 12/10/02 18:56:01 ii : local is SIDEWINDER compatible
>
> 12/10/02 18:56:01 >> : vendor id payload
>
> 12/10/02 18:56:01 ii : local is CISCO UNITY compatible
>
> 12/10/02 18:56:01 >= : cookies eba815e2952d5cf8:0000000000000000
>
> 12/10/02 18:56:01 >= : message 00000000
>
> 12/10/02 18:56:01 -> : send IKE packet x.x.x.x:500 -> x.x.x.x:500 ( 533
> bytes )
>
> 12/10/02 18:56:01 DB : phase1 resend event scheduled ( ref count = 2 )
>
> 12/10/02 18:56:01 <- : recv IKE packet x.x.x.x:500 -> x.x.x.x:500 ( 102
> bytes )
>
> 12/10/02 18:56:01 DB : phase1 found
>
> 12/10/02 18:56:01 ii : processing informational packet ( 102 bytes )
>
> 12/10/02 18:56:01 =< : cookies eba815e2952d5cf8:31e74a4caa00d17b
>
> 12/10/02 18:56:01 =< : message 17405094
>
> 12/10/02 18:56:01 << : notification payload
>
> 12/10/02 18:56:01 ii : received peer NO-PROPOSAL-CHOSEN notification
>
> 12/10/02 18:56:01 ii : - x.x.x.x:500 -> x.x.x.x:500
>
> 12/10/02 18:56:01 ii : - isakmp spi = eba815e2952d5cf8:31e74a4caa00d17b
>
> 12/10/02 18:56:01 ii : - data size 46
>
> 12/10/02 18:56:06 -> : resend 1 phase1 packet(s) x.x.x.x:500 -> x.x.x.x:500
>
> 12/10/02 18:56:11 -> : resend 1 phase1 packet(s) x.x.x.x:500 -> x.x.x.x:500
>
> 12/10/02 18:56:11 <- : recv IKE packet x.x.x.x:500 -> x.x.x.x:500 ( 102
> bytes )
>
> 12/10/02 18:56:11 DB : phase1 found
>
> 12/10/02 18:56:11 ii : processing informational packet ( 102 bytes )
>
> 12/10/02 18:56:11 =< : cookies eba815e2952d5cf8:31e74a4caa00d17b
>
> 12/10/02 18:56:11 =< : message 17405094
>
> 12/10/02 18:56:11 << : notification payload
>
> 12/10/02 18:56:11 ii : received peer NO-PROPOSAL-CHOSEN notification
>
> 12/10/02 18:56:11 ii : - x.x.x.x:500 -> x.x.x.x:500
>
> 12/10/02 18:56:11 ii : - isakmp spi = eba815e2952d5cf8:31e74a4caa00d17b
>
> 12/10/02 18:56:11 ii : - data size 46
>
> 12/10/02 18:56:16 -> : resend 1 phase1 packet(s) x.x.x.x -> x.x.x.x:500
>
> 12/10/02 18:56:21 ii : resend limit exceeded for phase1 exchange
>
> 12/10/02 18:56:21 ii : phase1 removal before expire time
>
> 12/10/02 18:56:21 DB : phase1 deleted ( obj count = 0 )
>
> 12/10/02 18:56:21 DB : policy not found
>
> 12/10/02 18:56:21 DB : policy not found
>
> 12/10/02 18:56:21 DB : tunnel stats event canceled ( ref count = 1 )
>
> 12/10/02 18:56:21 DB : removing tunnel config references
>
> 12/10/02 18:56:21 DB : removing tunnel phase2 references
>
> 12/10/02 18:56:21 DB : removing tunnel phase1 references
>
> 12/10/02 18:56:21 DB : tunnel deleted ( obj count = 0 )
>
> 12/10/02 18:56:21 DB : removing all peer tunnel refrences
>
> 12/10/02 18:56:21 DB : peer deleted ( obj count = 0 )
>
> 12/10/02 18:56:21 ii : ipc client process thread exit ...
>
>
>
> *Regards,*
>
> *Nikish*
>
> *Mob - 91 9029331403*
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.shrew.net/pipermail/vpn-help/attachments/20121013/1528997b/attachment-0002.html>
-------------- next part --------------

12/10/13 23:15:52 ii : ipc client process thread exit ...
12/10/13 23:15:52 K< : recv pfkey DELETE ESP message
12/10/13 23:15:52 K< : recv pfkey DELETE ESP message
12/10/13 23:17:07 ii : ipc client process thread begin ...
12/10/13 23:17:07 <A : peer config add message
12/10/13 23:17:07 DB : peer added ( obj count = 1 )
12/10/13 23:17:07 ii : local address 111.125.205.194 selected for peer
12/10/13 23:17:07 DB : tunnel added ( obj count = 1 )
12/10/13 23:17:07 <A : proposal config message
12/10/13 23:17:07 <A : proposal config message
12/10/13 23:17:07 <A : client config message
12/10/13 23:17:07 <A : xauth username message
12/10/13 23:17:07 <A : xauth password message
12/10/13 23:17:07 <A : local id 'remote at domain.com' message
12/10/13 23:17:07 <A : preshared key message
12/10/13 23:17:07 <A : remote resource message
12/10/13 23:17:07 <A : peer tunnel enable message
12/10/13 23:17:07 DB : new phase1 ( ISAKMP initiator )
12/10/13 23:17:07 DB : exchange type is aggressive
12/10/13 23:17:07 DB : 111.125.205.194:500 <-> x.x.x.x:500
12/10/13 23:17:07 DB : 9e2ee8d2ea294587:0000000000000000
12/10/13 23:17:07 DB : phase1 added ( obj count = 1 )
12/10/13 23:17:07 >> : security association payload
12/10/13 23:17:07 >> : - proposal #1 payload 
12/10/13 23:17:07 >> : -- transform #1 payload 
12/10/13 23:17:07 >> : key exchange payload
12/10/13 23:17:07 >> : nonce payload
12/10/13 23:17:07 >> : identification payload
12/10/13 23:17:07 >> : vendor id payload
12/10/13 23:17:07 ii : local supports XAUTH
12/10/13 23:17:07 >> : vendor id payload
12/10/13 23:17:07 ii : local supports nat-t ( draft v00 )
12/10/13 23:17:07 >> : vendor id payload
12/10/13 23:17:07 ii : local supports nat-t ( draft v01 )
12/10/13 23:17:07 >> : vendor id payload
12/10/13 23:17:07 ii : local supports nat-t ( draft v02 )
12/10/13 23:17:07 >> : vendor id payload
12/10/13 23:17:07 ii : local supports nat-t ( draft v03 )
12/10/13 23:17:07 >> : vendor id payload
12/10/13 23:17:07 ii : local supports nat-t ( rfc )
12/10/13 23:17:07 >> : vendor id payload
12/10/13 23:17:07 ii : local supports FRAGMENTATION
12/10/13 23:17:07 >> : vendor id payload
12/10/13 23:17:07 ii : local supports DPDv1
12/10/13 23:17:07 >> : vendor id payload
12/10/13 23:17:07 ii : local is SHREW SOFT compatible
12/10/13 23:17:07 >> : vendor id payload
12/10/13 23:17:07 ii : local is NETSCREEN compatible
12/10/13 23:17:07 >> : vendor id payload
12/10/13 23:17:07 ii : local is SIDEWINDER compatible
12/10/13 23:17:07 >> : vendor id payload
12/10/13 23:17:07 ii : local is CISCO UNITY compatible
12/10/13 23:17:07 >= : cookies 9e2ee8d2ea294587:0000000000000000
12/10/13 23:17:07 >= : message 00000000
12/10/13 23:17:07 -> : send IKE packet 111.125.205.194:500 -> x.x.x.x:500 ( 533 bytes )
12/10/13 23:17:07 DB : phase1 resend event scheduled ( ref count = 2 )
12/10/13 23:17:07 <- : recv IKE packet x.x.x.x:500 -> 111.125.205.194:500 ( 500 bytes )
12/10/13 23:17:07 DB : phase1 found
12/10/13 23:17:07 ii : processing phase1 packet ( 500 bytes )
12/10/13 23:17:07 =< : cookies 9e2ee8d2ea294587:ae22adb5fdefb00e
12/10/13 23:17:07 =< : message 00000000
12/10/13 23:17:07 << : security association payload
12/10/13 23:17:07 << : - propsal #1 payload 
12/10/13 23:17:07 << : -- transform #1 payload 
12/10/13 23:17:07 ii : matched isakmp proposal #1 transform #1
12/10/13 23:17:07 ii : - transform    = ike
12/10/13 23:17:07 ii : - cipher type  = 3des
12/10/13 23:17:07 ii : - key length   = default
12/10/13 23:17:07 ii : - hash type    = md5
12/10/13 23:17:07 ii : - dh group     = modp-1024
12/10/13 23:17:07 ii : - auth type    = xauth-initiator-psk
12/10/13 23:17:07 ii : - life seconds = 180
12/10/13 23:17:07 ii : - life kbytes  = 0
12/10/13 23:17:07 << : key exchange payload
12/10/13 23:17:07 << : nonce payload
12/10/13 23:17:07 << : identification payload
12/10/13 23:17:07 ii : phase1 id match ( natt prevents ip match )
12/10/13 23:17:07 ii : received = ipv4-host x.x.x.x
12/10/13 23:17:07 << : hash payload
12/10/13 23:17:07 << : vendor id payload
12/10/13 23:17:07 ii : peer supports DPDv1
12/10/13 23:17:07 << : vendor id payload
12/10/13 23:17:07 ii : unknown vendor id ( 16 bytes )
12/10/13 23:17:07 0x : 27bab5dc 01ea0760 ea4e3190 ac27c0d0
12/10/13 23:17:07 << : vendor id payload
12/10/13 23:17:07 ii : unknown vendor id ( 16 bytes )
12/10/13 23:17:07 0x : 6105c422 e76847e4 3f968480 1292aecd
12/10/13 23:17:07 << : vendor id payload
12/10/13 23:17:07 ii : peer supports nat-t ( draft v00 )
12/10/13 23:17:07 << : vendor id payload
12/10/13 23:17:07 ii : unknown vendor id ( 16 bytes )
12/10/13 23:17:07 0x : cd604643 35df21f8 7cfdb2fc 68b6a448
12/10/13 23:17:07 << : vendor id payload
12/10/13 23:17:07 ii : peer supports nat-t ( draft v02 )
12/10/13 23:17:07 << : vendor id payload
12/10/13 23:17:07 ii : peer supports nat-t ( draft v03 )
12/10/13 23:17:07 << : vendor id payload
12/10/13 23:17:07 ii : peer supports nat-t ( rfc )
12/10/13 23:17:07 << : vendor id payload
12/10/13 23:17:07 ii : unknown vendor id ( 28 bytes )
12/10/13 23:17:07 0x : 69936922 8741c6d4 ca094c93 e242c9de 19e7b7c6 00000005 00000500
12/10/13 23:17:07 << : nat discovery payload
12/10/13 23:17:07 << : nat discovery payload
12/10/13 23:17:07 ii : disabled nat-t ( no nat detected )
12/10/13 23:17:07 == : DH shared secret ( 128 bytes )
12/10/13 23:17:07 == : SETKEYID ( 16 bytes )
12/10/13 23:17:07 == : SETKEYID_d ( 16 bytes )
12/10/13 23:17:07 == : SETKEYID_a ( 16 bytes )
12/10/13 23:17:07 == : SETKEYID_e ( 16 bytes )
12/10/13 23:17:07 == : cipher key ( 32 bytes )
12/10/13 23:17:07 == : cipher iv ( 8 bytes )
12/10/13 23:17:07 == : phase1 hash_i ( computed ) ( 16 bytes )
12/10/13 23:17:07 >> : hash payload
12/10/13 23:17:07 >> : nat discovery payload
12/10/13 23:17:07 >> : nat discovery payload
12/10/13 23:17:07 >= : cookies 9e2ee8d2ea294587:ae22adb5fdefb00e
12/10/13 23:17:07 >= : message 00000000
12/10/13 23:17:07 >= : encrypt iv ( 8 bytes )
12/10/13 23:17:07 == : encrypt packet ( 88 bytes )
12/10/13 23:17:07 == : stored iv ( 8 bytes )
12/10/13 23:17:07 DB : phase1 resend event canceled ( ref count = 1 )
12/10/13 23:17:07 -> : send IKE packet 111.125.205.194:500 -> x.x.x.x:500 ( 120 bytes )
12/10/13 23:17:07 == : phase1 hash_r ( computed ) ( 16 bytes )
12/10/13 23:17:07 == : phase1 hash_r ( received ) ( 16 bytes )
12/10/13 23:17:07 ii : phase1 sa established
12/10/13 23:17:07 ii : x.x.x.x:500 <-> 111.125.205.194:500
12/10/13 23:17:07 ii : 9e2ee8d2ea294587:ae22adb5fdefb00e
12/10/13 23:17:07 ii : sending peer INITIAL-CONTACT notification
12/10/13 23:17:07 ii : - 111.125.205.194:500 -> x.x.x.x:500
12/10/13 23:17:07 ii : - isakmp spi = 9e2ee8d2ea294587:ae22adb5fdefb00e
12/10/13 23:17:07 ii : - data size 0
12/10/13 23:17:07 >> : hash payload
12/10/13 23:17:07 >> : notification payload
12/10/13 23:17:07 == : new informational hash ( 16 bytes )
12/10/13 23:17:07 == : new informational iv ( 8 bytes )
12/10/13 23:17:07 >= : cookies 9e2ee8d2ea294587:ae22adb5fdefb00e
12/10/13 23:17:07 >= : message be31c237
12/10/13 23:17:07 >= : encrypt iv ( 8 bytes )
12/10/13 23:17:07 == : encrypt packet ( 76 bytes )
12/10/13 23:17:07 == : stored iv ( 8 bytes )
12/10/13 23:17:07 -> : send IKE packet 111.125.205.194:500 -> x.x.x.x:500 ( 104 bytes )
12/10/13 23:17:07 DB : phase2 not found
12/10/13 23:17:07 <- : recv IKE packet x.x.x.x:500 -> 111.125.205.194:500 ( 68 bytes )
12/10/13 23:17:07 DB : phase1 found
12/10/13 23:17:07 ii : processing config packet ( 68 bytes )
12/10/13 23:17:07 DB : config not found
12/10/13 23:17:07 DB : config added ( obj count = 1 )
12/10/13 23:17:07 == : new config iv ( 8 bytes )
12/10/13 23:17:07 =< : cookies 9e2ee8d2ea294587:ae22adb5fdefb00e
12/10/13 23:17:07 =< : message 8c600910
12/10/13 23:17:07 =< : decrypt iv ( 8 bytes )
12/10/13 23:17:07 == : decrypt packet ( 68 bytes )
12/10/13 23:17:07 <= : trimmed packet padding ( 4 bytes )
12/10/13 23:17:07 <= : stored iv ( 8 bytes )
12/10/13 23:17:07 << : hash payload
12/10/13 23:17:07 << : attribute payload
12/10/13 23:17:07 == : configure hash_i ( computed ) ( 16 bytes )
12/10/13 23:17:07 == : configure hash_c ( computed ) ( 16 bytes )
12/10/13 23:17:07 ii : configure hash verified
12/10/13 23:17:07 ii : - xauth username
12/10/13 23:17:07 ii : - xauth password
12/10/13 23:17:07 ii : received basic xauth request - 
12/10/13 23:17:07 ii : - standard xauth username
12/10/13 23:17:07 ii : - standard xauth password
12/10/13 23:17:07 ii : sending xauth response for test
12/10/13 23:17:07 >> : hash payload
12/10/13 23:17:07 >> : attribute payload
12/10/13 23:17:07 == : new configure hash ( 16 bytes )
12/10/13 23:17:07 >= : cookies 9e2ee8d2ea294587:ae22adb5fdefb00e
12/10/13 23:17:07 >= : message 8c600910
12/10/13 23:17:07 >= : encrypt iv ( 8 bytes )
12/10/13 23:17:07 == : encrypt packet ( 83 bytes )
12/10/13 23:17:07 == : stored iv ( 8 bytes )
12/10/13 23:17:07 -> : send IKE packet 111.125.205.194:500 -> x.x.x.x:500 ( 112 bytes )
12/10/13 23:17:07 DB : config resend event scheduled ( ref count = 2 )
12/10/13 23:17:08 <- : recv IKE packet x.x.x.x:500 -> 111.125.205.194:500 ( 60 bytes )
12/10/13 23:17:08 DB : phase1 found
12/10/13 23:17:08 ii : processing config packet ( 60 bytes )
12/10/13 23:17:08 DB : config found
12/10/13 23:17:08 == : new config iv ( 8 bytes )
12/10/13 23:17:08 =< : cookies 9e2ee8d2ea294587:ae22adb5fdefb00e
12/10/13 23:17:08 =< : message beda86f2
12/10/13 23:17:08 =< : decrypt iv ( 8 bytes )
12/10/13 23:17:08 == : decrypt packet ( 60 bytes )
12/10/13 23:17:08 <= : stored iv ( 8 bytes )
12/10/13 23:17:08 << : hash payload
12/10/13 23:17:08 << : attribute payload
12/10/13 23:17:08 == : configure hash_i ( computed ) ( 16 bytes )
12/10/13 23:17:08 == : configure hash_c ( computed ) ( 16 bytes )
12/10/13 23:17:08 ii : configure hash verified
12/10/13 23:17:08 ii : received xauth result - 
12/10/13 23:17:08 ii : user test authentication succeeded
12/10/13 23:17:08 ii : sending xauth acknowledge
12/10/13 23:17:08 >> : hash payload
12/10/13 23:17:08 >> : attribute payload
12/10/13 23:17:08 == : new configure hash ( 16 bytes )
12/10/13 23:17:08 >= : cookies 9e2ee8d2ea294587:ae22adb5fdefb00e
12/10/13 23:17:08 >= : message beda86f2
12/10/13 23:17:08 >= : encrypt iv ( 8 bytes )
12/10/13 23:17:08 == : encrypt packet ( 56 bytes )
12/10/13 23:17:08 == : stored iv ( 8 bytes )
12/10/13 23:17:08 DB : config resend event canceled ( ref count = 1 )
12/10/13 23:17:08 -> : send IKE packet 111.125.205.194:500 -> x.x.x.x:500 ( 88 bytes )
12/10/13 23:17:08 DB : config resend event scheduled ( ref count = 2 )
12/10/13 23:17:08 ii : building config attribute list
12/10/13 23:17:08 ii : - IP4 Address
12/10/13 23:17:08 ii : - Address Expiry
12/10/13 23:17:08 ii : - IP4 Netamask
12/10/13 23:17:08 ii : - IP4 DNS Server
12/10/13 23:17:08 ii : sending config push acknowledge
12/10/13 23:17:08 >> : hash payload
12/10/13 23:17:08 >> : attribute payload
12/10/13 23:17:08 == : new configure hash ( 16 bytes )
12/10/13 23:17:08 >= : cookies 9e2ee8d2ea294587:ae22adb5fdefb00e
12/10/13 23:17:08 >= : message beda86f2
12/10/13 23:17:08 >= : encrypt iv ( 8 bytes )
12/10/13 23:17:08 == : encrypt packet ( 72 bytes )
12/10/13 23:17:08 == : stored iv ( 8 bytes )
12/10/13 23:17:08 DB : config resend event canceled ( ref count = 1 )
12/10/13 23:17:08 -> : send IKE packet 111.125.205.194:500 -> x.x.x.x:500 ( 104 bytes )
12/10/13 23:17:08 DB : config resend event scheduled ( ref count = 2 )
12/10/13 23:17:08 <- : recv IKE packet x.x.x.x:500 -> 111.125.205.194:500 ( 92 bytes )
12/10/13 23:17:08 DB : phase1 found
12/10/13 23:17:08 ii : processing config packet ( 92 bytes )
12/10/13 23:17:08 DB : config found
12/10/13 23:17:08 == : new config iv ( 8 bytes )
12/10/13 23:17:08 =< : cookies 9e2ee8d2ea294587:ae22adb5fdefb00e
12/10/13 23:17:08 =< : message bfc813b5
12/10/13 23:17:08 =< : decrypt iv ( 8 bytes )
12/10/13 23:17:08 == : decrypt packet ( 92 bytes )
12/10/13 23:17:08 <= : stored iv ( 8 bytes )
12/10/13 23:17:08 << : hash payload
12/10/13 23:17:08 << : attribute payload
12/10/13 23:17:08 == : configure hash_i ( computed ) ( 16 bytes )
12/10/13 23:17:08 == : configure hash_c ( computed ) ( 16 bytes )
12/10/13 23:17:08 ii : configure hash verified
12/10/13 23:17:08 ii : received config push request
12/10/13 23:17:08 ii : - IP4 Address = 10.10.10.62
12/10/13 23:17:08 ii : - IP4 Netmask = 255.255.255.255
12/10/13 23:17:08 ii : - IP4 DNS Server = 4.2.2.2
12/10/13 23:17:08 ii : - IP4 Subnet
12/10/13 23:17:08 DB : config resend event canceled ( ref count = 1 )
12/10/13 23:17:08 ii : enabled adapter ROOT\VNET\0000 
12/10/13 23:17:08 ii : apapter ROOT\VNET\0000 MTU is 1500
12/10/13 23:17:08 ii : generating IPSEC security policies at UNIQUE level
12/10/13 23:17:08 ii : creating NONE INBOUND policy ANY:x.x.x.x:* -> ANY:111.125.205.194:*
12/10/13 23:17:08 DB : policy added ( obj count = 1 )
12/10/13 23:17:08 K> : send pfkey X_SPDADD UNSPEC message
12/10/13 23:17:08 ii : creating NONE OUTBOUND policy ANY:111.125.205.194:* -> ANY:x.x.x.x:*
12/10/13 23:17:08 K< : recv pfkey X_SPDADD UNSPEC message
12/10/13 23:17:08 DB : policy found
12/10/13 23:17:08 ii : created NONE policy route for x.x.x.x/32
12/10/13 23:17:08 DB : policy added ( obj count = 2 )
12/10/13 23:17:08 K> : send pfkey X_SPDADD UNSPEC message
12/10/13 23:17:08 K< : recv pfkey X_SPDADD UNSPEC message
12/10/13 23:17:08 DB : policy found
12/10/13 23:17:08 ii : calling init phase2 for nailed policy
12/10/13 23:17:08 DB : policy found
12/10/13 23:17:08 DB : policy not found
12/10/13 23:17:08 !! : unable to locate inbound policy for init phase2
12/10/13 23:17:08 ii : creating IPSEC INBOUND policy ANY:10.48.156.0/24:* -> ANY:10.10.10.62:*
12/10/13 23:17:08 DB : policy added ( obj count = 3 )
12/10/13 23:17:08 K> : send pfkey X_SPDADD UNSPEC message
12/10/13 23:17:08 ii : creating IPSEC OUTBOUND policy ANY:10.10.10.62:* -> ANY:10.48.156.0/24:*
12/10/13 23:17:08 K< : recv pfkey X_SPDADD UNSPEC message
12/10/13 23:17:08 DB : policy found
12/10/13 23:17:08 ii : created IPSEC policy route for 10.48.156.0/24
12/10/13 23:17:08 DB : policy added ( obj count = 4 )
12/10/13 23:17:08 K> : send pfkey X_SPDADD UNSPEC message
12/10/13 23:17:08 ii : split DNS is disabled
12/10/13 23:17:08 K< : recv pfkey X_SPDADD UNSPEC message
12/10/13 23:17:08 DB : policy found
12/10/13 23:17:08 ii : calling init phase2 for nailed policy
12/10/13 23:17:08 DB : policy found
12/10/13 23:17:08 DB : policy found
12/10/13 23:17:08 DB : tunnel found
12/10/13 23:17:08 DB : new phase2 ( IPSEC initiator )
12/10/13 23:17:08 DB : phase2 added ( obj count = 1 )
12/10/13 23:17:08 K> : send pfkey GETSPI ESP message
12/10/13 23:17:08 K< : recv pfkey GETSPI ESP message
12/10/13 23:17:08 DB : phase2 found
12/10/13 23:17:08 ii : updated spi for 1 ipsec-esp proposal
12/10/13 23:17:08 DB : phase1 found
12/10/13 23:17:08 >> : hash payload
12/10/13 23:17:08 >> : security association payload
12/10/13 23:17:08 >> : - proposal #1 payload 
12/10/13 23:17:08 >> : -- transform #1 payload 
12/10/13 23:17:08 >> : nonce payload
12/10/13 23:17:08 >> : identification payload
12/10/13 23:17:08 >> : identification payload
12/10/13 23:17:08 == : phase2 hash_i ( input ) ( 108 bytes )
12/10/13 23:17:08 == : phase2 hash_i ( computed ) ( 16 bytes )
12/10/13 23:17:08 == : new phase2 iv ( 8 bytes )
12/10/13 23:17:08 >= : cookies 9e2ee8d2ea294587:ae22adb5fdefb00e
12/10/13 23:17:08 >= : message 99978079
12/10/13 23:17:08 >= : encrypt iv ( 8 bytes )
12/10/13 23:17:08 == : encrypt packet ( 152 bytes )
12/10/13 23:17:08 == : stored iv ( 8 bytes )
12/10/13 23:17:08 -> : send IKE packet 111.125.205.194:500 -> x.x.x.x:500 ( 184 bytes )
12/10/13 23:17:08 DB : phase2 resend event scheduled ( ref count = 2 )
12/10/13 23:17:08 <- : recv IKE packet x.x.x.x:500 -> 111.125.205.194:500 ( 148 bytes )
12/10/13 23:17:08 DB : phase1 found
12/10/13 23:17:08 ii : processing phase2 packet ( 148 bytes )
12/10/13 23:17:08 DB : phase2 found
12/10/13 23:17:08 =< : cookies 9e2ee8d2ea294587:ae22adb5fdefb00e
12/10/13 23:17:08 =< : message 99978079
12/10/13 23:17:08 =< : decrypt iv ( 8 bytes )
12/10/13 23:17:08 == : decrypt packet ( 148 bytes )
12/10/13 23:17:08 <= : stored iv ( 8 bytes )
12/10/13 23:17:08 << : hash payload
12/10/13 23:17:08 << : security association payload
12/10/13 23:17:08 << : - propsal #1 payload 
12/10/13 23:17:08 << : -- transform #1 payload 
12/10/13 23:17:08 << : nonce payload
12/10/13 23:17:08 << : identification payload
12/10/13 23:17:08 << : identification payload
12/10/13 23:17:08 == : phase2 hash_r ( input ) ( 124 bytes )
12/10/13 23:17:08 == : phase2 hash_r ( computed ) ( 16 bytes )
12/10/13 23:17:08 == : phase2 hash_r ( received ) ( 16 bytes )
12/10/13 23:17:08 ii : matched ipsec-esp proposal #1 transform #1
12/10/13 23:17:08 ii : - transform    = esp-3des
12/10/13 23:17:08 ii : - key length   = default
12/10/13 23:17:08 ii : - encap mode   = tunnel
12/10/13 23:17:08 ii : - msg auth     = hmac-md5
12/10/13 23:17:08 ii : - pfs dh group = none
12/10/13 23:17:08 ii : - life seconds = 28800
12/10/13 23:17:08 ii : - life kbytes  = 0
12/10/13 23:17:08 DB : policy found
12/10/13 23:17:08 K> : send pfkey GETSPI ESP message
12/10/13 23:17:08 K< : recv pfkey GETSPI ESP message
12/10/13 23:17:08 DB : phase2 found
12/10/13 23:17:08 ii : phase2 ids accepted
12/10/13 23:17:08 ii : - loc ANY:10.10.10.62:* -> ANY:10.48.156.0/24:*
12/10/13 23:17:08 ii : - rmt ANY:10.48.156.0/24:* -> ANY:10.10.10.62:*
12/10/13 23:17:08 ii : phase2 sa established
12/10/13 23:17:08 ii : 111.125.205.194:500 <-> x.x.x.x:500
12/10/13 23:17:08 == : phase2 hash_p ( input ) ( 41 bytes )
12/10/13 23:17:08 == : phase2 hash_p ( computed ) ( 16 bytes )
12/10/13 23:17:08 >> : hash payload
12/10/13 23:17:08 >= : cookies 9e2ee8d2ea294587:ae22adb5fdefb00e
12/10/13 23:17:08 >= : message 99978079
12/10/13 23:17:08 >= : encrypt iv ( 8 bytes )
12/10/13 23:17:08 == : encrypt packet ( 48 bytes )
12/10/13 23:17:08 == : stored iv ( 8 bytes )
12/10/13 23:17:08 DB : phase2 resend event canceled ( ref count = 1 )
12/10/13 23:17:08 -> : send IKE packet 111.125.205.194:500 -> x.x.x.x:500 ( 80 bytes )
12/10/13 23:17:08 == : spi cipher key data ( 24 bytes )
12/10/13 23:17:08 == : spi hmac key data ( 16 bytes )
12/10/13 23:17:08 K> : send pfkey UPDATE ESP message
12/10/13 23:17:08 K< : recv pfkey UPDATE ESP message
12/10/13 23:17:08 == : spi cipher key data ( 24 bytes )
12/10/13 23:17:08 == : spi hmac key data ( 16 bytes )
12/10/13 23:17:08 K> : send pfkey UPDATE ESP message
12/10/13 23:17:08 K< : recv pfkey UPDATE ESP message
12/10/13 23:17:18 <- : recv IKE packet x.x.x.x:500 -> 111.125.205.194:500 ( 92 bytes )
12/10/13 23:17:18 DB : phase1 found
12/10/13 23:17:18 ii : processing config packet ( 92 bytes )
12/10/13 23:17:18 DB : config found
12/10/13 23:17:18 !! : config packet ignored, ( config already mature )
12/10/13 23:17:22 DB : phase1 found
12/10/13 23:17:22 ii : sending peer DPDV1-R-U-THERE notification
12/10/13 23:17:22 ii : - 111.125.205.194:500 -> x.x.x.x:500
12/10/13 23:17:22 ii : - isakmp spi = 9e2ee8d2ea294587:ae22adb5fdefb00e
12/10/13 23:17:22 ii : - data size 4
12/10/13 23:17:22 >> : hash payload
12/10/13 23:17:22 >> : notification payload
12/10/13 23:17:22 == : new informational hash ( 16 bytes )
12/10/13 23:17:22 == : new informational iv ( 8 bytes )
12/10/13 23:17:22 >= : cookies 9e2ee8d2ea294587:ae22adb5fdefb00e
12/10/13 23:17:22 >= : message ed3fbbf5
12/10/13 23:17:22 >= : encrypt iv ( 8 bytes )
12/10/13 23:17:22 == : encrypt packet ( 80 bytes )
12/10/13 23:17:22 == : stored iv ( 8 bytes )
12/10/13 23:17:22 -> : send IKE packet 111.125.205.194:500 -> x.x.x.x:500 ( 112 bytes )
12/10/13 23:17:22 ii : DPD ARE-YOU-THERE sequence 2b32e049 requested
12/10/13 23:17:22 <- : recv IKE packet x.x.x.x:500 -> 111.125.205.194:500 ( 84 bytes )
12/10/13 23:17:22 DB : phase1 found
12/10/13 23:17:22 ii : processing informational packet ( 84 bytes )
12/10/13 23:17:22 == : new informational iv ( 8 bytes )
12/10/13 23:17:22 =< : cookies 9e2ee8d2ea294587:ae22adb5fdefb00e
12/10/13 23:17:22 =< : message e6bc17cf
12/10/13 23:17:22 =< : decrypt iv ( 8 bytes )
12/10/13 23:17:22 == : decrypt packet ( 84 bytes )
12/10/13 23:17:22 <= : trimmed packet padding ( 4 bytes )
12/10/13 23:17:22 <= : stored iv ( 8 bytes )
12/10/13 23:17:22 << : hash payload
12/10/13 23:17:22 << : notification payload
12/10/13 23:17:22 == : informational hash_i ( computed ) ( 16 bytes )
12/10/13 23:17:22 == : informational hash_c ( received ) ( 16 bytes )
12/10/13 23:17:22 ii : informational hash verified
12/10/13 23:17:22 ii : received peer DPDV1-R-U-THERE-ACK notification
12/10/13 23:17:22 ii : - x.x.x.x:500 -> 111.125.205.194:500
12/10/13 23:17:22 ii : - isakmp spi = 9e2ee8d2ea294587:ae22adb5fdefb00e
12/10/13 23:17:22 ii : - data size 4
12/10/13 23:17:22 ii : DPD ARE-YOU-THERE-ACK sequence 2b32e049 accepted
12/10/13 23:17:22 ii : next tunnel DPD request in 15 secs for peer x.x.x.x:500
12/10/13 23:17:28 <- : recv IKE packet x.x.x.x:500 -> 111.125.205.194:500 ( 92 bytes )
12/10/13 23:17:28 DB : phase1 found
12/10/13 23:17:28 ii : processing config packet ( 92 bytes )
12/10/13 23:17:28 DB : config found
12/10/13 23:17:28 !! : config packet ignored, ( config already mature )
12/10/13 23:17:37 DB : phase1 found
12/10/13 23:17:37 ii : sending peer DPDV1-R-U-THERE notification
12/10/13 23:17:37 ii : - 111.125.205.194:500 -> x.x.x.x:500
12/10/13 23:17:37 ii : - isakmp spi = 9e2ee8d2ea294587:ae22adb5fdefb00e
12/10/13 23:17:37 ii : - data size 4
12/10/13 23:17:37 >> : hash payload
12/10/13 23:17:37 >> : notification payload
12/10/13 23:17:37 == : new informational hash ( 16 bytes )
12/10/13 23:17:37 == : new informational iv ( 8 bytes )
12/10/13 23:17:37 >= : cookies 9e2ee8d2ea294587:ae22adb5fdefb00e
12/10/13 23:17:37 >= : message 17ae9c6a
12/10/13 23:17:37 >= : encrypt iv ( 8 bytes )
12/10/13 23:17:37 == : encrypt packet ( 80 bytes )
12/10/13 23:17:37 == : stored iv ( 8 bytes )
12/10/13 23:17:37 -> : send IKE packet 111.125.205.194:500 -> x.x.x.x:500 ( 112 bytes )
12/10/13 23:17:37 ii : DPD ARE-YOU-THERE sequence 2b32e04a requested
12/10/13 23:17:38 <- : recv IKE packet x.x.x.x:500 -> 111.125.205.194:500 ( 84 bytes )
12/10/13 23:17:38 DB : phase1 found
12/10/13 23:17:38 ii : processing informational packet ( 84 bytes )
12/10/13 23:17:38 == : new informational iv ( 8 bytes )
12/10/13 23:17:38 =< : cookies 9e2ee8d2ea294587:ae22adb5fdefb00e
12/10/13 23:17:38 =< : message 8ac3e7ec
12/10/13 23:17:38 =< : decrypt iv ( 8 bytes )
12/10/13 23:17:38 == : decrypt packet ( 84 bytes )
12/10/13 23:17:38 <= : trimmed packet padding ( 4 bytes )
12/10/13 23:17:38 <= : stored iv ( 8 bytes )
12/10/13 23:17:38 << : hash payload
12/10/13 23:17:38 << : notification payload
12/10/13 23:17:38 == : informational hash_i ( computed ) ( 16 bytes )
12/10/13 23:17:38 == : informational hash_c ( received ) ( 16 bytes )
12/10/13 23:17:38 ii : informational hash verified
12/10/13 23:17:38 ii : received peer DPDV1-R-U-THERE-ACK notification
12/10/13 23:17:38 ii : - x.x.x.x:500 -> 111.125.205.194:500
12/10/13 23:17:38 ii : - isakmp spi = 9e2ee8d2ea294587:ae22adb5fdefb00e
12/10/13 23:17:38 ii : - data size 4
12/10/13 23:17:38 ii : DPD ARE-YOU-THERE-ACK sequence 2b32e04a accepted
12/10/13 23:17:38 ii : next tunnel DPD request in 15 secs for peer x.x.x.x:500
12/10/13 23:17:38 <- : recv IKE packet x.x.x.x:500 -> 111.125.205.194:500 ( 92 bytes )
12/10/13 23:17:38 DB : phase1 found
12/10/13 23:17:38 ii : processing config packet ( 92 bytes )
12/10/13 23:17:38 DB : config found
12/10/13 23:17:38 !! : config packet ignored, ( config already mature )
12/10/13 23:17:48 <- : recv IKE packet x.x.x.x:500 -> 111.125.205.194:500 ( 92 bytes )
12/10/13 23:17:48 DB : phase1 found
12/10/13 23:17:48 ii : processing config packet ( 92 bytes )
12/10/13 23:17:48 DB : config found
12/10/13 23:17:48 !! : config packet ignored, ( config already mature )
12/10/13 23:17:53 DB : phase1 found
12/10/13 23:17:53 ii : sending peer DPDV1-R-U-THERE notification
12/10/13 23:17:53 ii : - 111.125.205.194:500 -> x.x.x.x:500
12/10/13 23:17:53 ii : - isakmp spi = 9e2ee8d2ea294587:ae22adb5fdefb00e
12/10/13 23:17:53 ii : - data size 4
12/10/13 23:17:53 >> : hash payload
12/10/13 23:17:53 >> : notification payload
12/10/13 23:17:53 == : new informational hash ( 16 bytes )
12/10/13 23:17:53 == : new informational iv ( 8 bytes )
12/10/13 23:17:53 >= : cookies 9e2ee8d2ea294587:ae22adb5fdefb00e
12/10/13 23:17:53 >= : message 6e9a0d8c
12/10/13 23:17:53 >= : encrypt iv ( 8 bytes )
12/10/13 23:17:53 == : encrypt packet ( 80 bytes )
12/10/13 23:17:53 == : stored iv ( 8 bytes )
12/10/13 23:17:53 -> : send IKE packet 111.125.205.194:500 -> x.x.x.x:500 ( 112 bytes )
12/10/13 23:17:53 ii : DPD ARE-YOU-THERE sequence 2b32e04b requested
12/10/13 23:17:53 <- : recv IKE packet x.x.x.x:500 -> 111.125.205.194:500 ( 84 bytes )
12/10/13 23:17:53 DB : phase1 found
12/10/13 23:17:53 ii : processing informational packet ( 84 bytes )
12/10/13 23:17:53 == : new informational iv ( 8 bytes )
12/10/13 23:17:53 =< : cookies 9e2ee8d2ea294587:ae22adb5fdefb00e
12/10/13 23:17:53 =< : message fef2bc46
12/10/13 23:17:53 =< : decrypt iv ( 8 bytes )
12/10/13 23:17:53 == : decrypt packet ( 84 bytes )
12/10/13 23:17:53 <= : trimmed packet padding ( 4 bytes )
12/10/13 23:17:53 <= : stored iv ( 8 bytes )
12/10/13 23:17:53 << : hash payload
12/10/13 23:17:53 << : notification payload
12/10/13 23:17:53 == : informational hash_i ( computed ) ( 16 bytes )
12/10/13 23:17:53 == : informational hash_c ( received ) ( 16 bytes )
12/10/13 23:17:53 ii : informational hash verified
12/10/13 23:17:53 ii : received peer DPDV1-R-U-THERE-ACK notification
12/10/13 23:17:53 ii : - x.x.x.x:500 -> 111.125.205.194:500
12/10/13 23:17:53 ii : - isakmp spi = 9e2ee8d2ea294587:ae22adb5fdefb00e
12/10/13 23:17:53 ii : - data size 4
12/10/13 23:17:53 ii : DPD ARE-YOU-THERE-ACK sequence 2b32e04b accepted
12/10/13 23:17:53 ii : next tunnel DPD request in 15 secs for peer x.x.x.x:500
12/10/13 23:17:58 <- : recv IKE packet x.x.x.x:500 -> 111.125.205.194:500 ( 92 bytes )
12/10/13 23:17:58 DB : phase1 found
12/10/13 23:17:58 ii : processing config packet ( 92 bytes )
12/10/13 23:17:58 DB : config found
12/10/13 23:17:58 !! : config packet ignored, ( config already mature )
12/10/13 23:18:08 DB : phase1 found
12/10/13 23:18:08 ii : sending peer DPDV1-R-U-THERE notification
12/10/13 23:18:08 ii : - 111.125.205.194:500 -> x.x.x.x:500
12/10/13 23:18:08 ii : - isakmp spi = 9e2ee8d2ea294587:ae22adb5fdefb00e
12/10/13 23:18:08 ii : - data size 4
12/10/13 23:18:08 >> : hash payload
12/10/13 23:18:08 >> : notification payload
12/10/13 23:18:08 == : new informational hash ( 16 bytes )
12/10/13 23:18:08 == : new informational iv ( 8 bytes )
12/10/13 23:18:08 >= : cookies 9e2ee8d2ea294587:ae22adb5fdefb00e
12/10/13 23:18:08 >= : message e49a5ebe
12/10/13 23:18:08 >= : encrypt iv ( 8 bytes )
12/10/13 23:18:08 == : encrypt packet ( 80 bytes )
12/10/13 23:18:08 == : stored iv ( 8 bytes )
12/10/13 23:18:08 -> : send IKE packet 111.125.205.194:500 -> x.x.x.x:500 ( 112 bytes )
12/10/13 23:18:08 ii : DPD ARE-YOU-THERE sequence 2b32e04c requested
12/10/13 23:18:08 <- : recv IKE packet x.x.x.x:500 -> 111.125.205.194:500 ( 76 bytes )
12/10/13 23:18:08 DB : phase1 found
12/10/13 23:18:08 ii : processing informational packet ( 76 bytes )
12/10/13 23:18:08 == : new informational iv ( 8 bytes )
12/10/13 23:18:08 =< : cookies 9e2ee8d2ea294587:ae22adb5fdefb00e
12/10/13 23:18:08 =< : message 9aa18e45
12/10/13 23:18:08 =< : decrypt iv ( 8 bytes )
12/10/13 23:18:08 == : decrypt packet ( 76 bytes )
12/10/13 23:18:08 <= : stored iv ( 8 bytes )
12/10/13 23:18:08 << : hash payload
12/10/13 23:18:08 << : delete payload
12/10/13 23:18:08 == : informational hash_i ( computed ) ( 16 bytes )
12/10/13 23:18:08 == : informational hash_c ( received ) ( 16 bytes )
12/10/13 23:18:08 ii : informational hash verified
12/10/13 23:18:08 ii : received peer DELETE message
12/10/13 23:18:08 ii : - x.x.x.x:500 -> 111.125.205.194:500
12/10/13 23:18:08 ii : - isakmp spi = 9e2ee8d2ea294587:ae22adb5fdefb00e
12/10/13 23:18:08 DB : phase1 found
12/10/13 23:18:08 ii : cleanup, marked phase1 9e2ee8d2ea294587:ae22adb5fdefb00e for removal
12/10/13 23:18:08 DB : phase1 soft event canceled ( ref count = 4 )
12/10/13 23:18:08 DB : phase1 hard event canceled ( ref count = 3 )
12/10/13 23:18:08 DB : phase1 dead event canceled ( ref count = 2 )
12/10/13 23:18:08 DB : config deleted ( obj count = 0 )
12/10/13 23:18:08 ii : phase1 removal before expire time
12/10/13 23:18:08 DB : phase1 not found
12/10/13 23:18:08 DB : phase1 deleted ( obj count = 0 )
12/10/13 23:18:08 DB : policy found
12/10/13 23:18:08 ii : removing IPSEC INBOUND policy ANY:10.48.156.0/24:* -> ANY:10.10.10.62:*
12/10/13 23:18:08 K> : send pfkey X_SPDDELETE2 UNSPEC message
12/10/13 23:18:08 DB : policy found
12/10/13 23:18:08 ii : removing IPSEC OUTBOUND policy ANY:10.10.10.62:* -> ANY:10.48.156.0/24:*
12/10/13 23:18:08 K> : send pfkey X_SPDDELETE2 UNSPEC message
12/10/13 23:18:08 K< : recv pfkey X_SPDDELETE2 UNSPEC message
12/10/13 23:18:08 ii : removed IPSEC policy route for ANY:10.48.156.0/24:*
12/10/13 23:18:08 DB : policy found
12/10/13 23:18:08 ii : removing NONE INBOUND policy ANY:x.x.x.x:* -> ANY:111.125.205.194:*
12/10/13 23:18:08 K> : send pfkey X_SPDDELETE2 UNSPEC message
12/10/13 23:18:08 DB : policy found
12/10/13 23:18:08 ii : removing NONE OUTBOUND policy ANY:111.125.205.194:* -> ANY:x.x.x.x:*
12/10/13 23:18:08 K> : send pfkey X_SPDDELETE2 UNSPEC message
12/10/13 23:18:08 ii : removed NONE policy route for ANY:x.x.x.x:*
12/10/13 23:18:08 DB : policy found
12/10/13 23:18:08 DB : policy deleted ( obj count = 3 )
12/10/13 23:18:08 K< : recv pfkey X_SPDDELETE2 UNSPEC message
12/10/13 23:18:08 DB : policy found
12/10/13 23:18:08 DB : policy deleted ( obj count = 2 )
12/10/13 23:18:08 K< : recv pfkey X_SPDDELETE2 UNSPEC message
12/10/13 23:18:08 DB : policy found
12/10/13 23:18:08 DB : policy deleted ( obj count = 1 )
12/10/13 23:18:08 K< : recv pfkey X_SPDDELETE2 UNSPEC message
12/10/13 23:18:08 DB : policy found
12/10/13 23:18:08 DB : policy deleted ( obj count = 0 )
12/10/13 23:18:09 ii : disable adapter ROOT\VNET\0000
12/10/13 23:18:09 DB : tunnel dpd event canceled ( ref count = 3 )
12/10/13 23:18:09 DB : tunnel stats event canceled ( ref count = 2 )
12/10/13 23:18:09 DB : removing tunnel config references
12/10/13 23:18:09 DB : removing tunnel phase2 references
12/10/13 23:18:09 DB : phase2 soft event canceled ( ref count = 2 )
12/10/13 23:18:09 DB : phase2 hard event canceled ( ref count = 1 )
12/10/13 23:18:09 DB : phase1 not found
12/10/13 23:18:09 K> : send pfkey DELETE ESP message
12/10/13 23:18:09 K> : send pfkey DELETE ESP message
12/10/13 23:18:09 ii : phase2 removal before expire time
12/10/13 23:18:09 DB : phase2 deleted ( obj count = 0 )
12/10/13 23:18:09 DB : removing tunnel phase1 references
12/10/13 23:18:09 DB : tunnel deleted ( obj count = 0 )
12/10/13 23:18:09 DB : removing all peer tunnel refrences
12/10/13 23:18:09 DB : peer deleted ( obj count = 0 )
12/10/13 23:18:09 ii : ipc client process thread exit ...
12/10/13 23:18:09 K< : recv pfkey DELETE ESP message
12/10/13 23:18:09 K< : recv pfkey DELETE ESP message


More information about the vpn-help mailing list