[vpn-help] Issues connecting to company VPN using a "Pocket WiFi - LTE" access point

Guido 嵬 到 guido.out at aversano.org
Wed Apr 30 03:47:39 CDT 2014


Hi,

I am experiencing problems connecting to my company VPN, using the
2.2.2 client on Windows 8.1 (imported PCF configuration).
The connection is established, but no traffic passes through, and I
get disconnected by the server after a while. If I look at security
associations in the VPN Trace utility, I can see 2 associations remain
in LARVAL state, before forced disconnection, and no bytes are
exchanged. See my logs below for more info.

The problem appears only when I am connected to the internet by a
Pocket WiFi - LTE cellular access point that I rented in Japan,
otherwise the client works fine.
I thought to a NAT/firewall issue with the access point, but note that
I manage to connect using the same Pocket WiFi access point, but using
iOS Cisco VPN software embedded in my iPad.

I would really appreciate any help from you all on this issue!

Regards,
Guido

--------------------------------------------------------------------------------------------------------------------------------------
14/04/28 15:58:33 ## : IPSEC Daemon, ver 2.2.2
14/04/28 15:58:33 ## : Copyright 2013 Shrew Soft Inc.
14/04/28 15:58:33 ## : This product linked OpenSSL 1.0.1c 10 May 2012
14/04/28 15:58:33 ## : This product linked zlib v1.2.3
14/04/28 15:58:33 ii : network send process thread begin ...
14/04/28 15:58:33 ii : vflt send device attached
14/04/28 15:58:33 ii : pfkey server process thread begin ...
14/04/28 15:58:33 ii : network recv process thread begin ...
14/04/28 15:58:33 ii : vflt recv device attached
14/04/28 15:58:33 ii : pfkey client process thread begin ...
14/04/28 15:58:33 K< : recv DUMP UNSPEC message
14/04/28 15:58:33 K< : recv X_SPDDUMP UNSPEC message
14/04/28 15:58:34 ii : pfkey client process thread begin ...
14/04/28 15:58:34 K< : message REGISTER AH received
14/04/28 15:58:34 K< : message REGISTER ESP received
14/04/28 15:58:34 K< : message REGISTER IPCOMP received
14/04/28 15:58:34 K< : recv X_SPDDUMP UNSPEC message
14/04/28 15:58:53 K< : recv X_SPDADD UNSPEC pfkey message
14/04/28 15:58:53 ii : - id    = 0
14/04/28 15:58:53 ii : - type  = NONE
14/04/28 15:58:53 ii : - dir   = INBOUND
14/04/28 15:58:53 DB : policy ref increment ( ref count = 1, policy count = 0 )
14/04/28 15:58:53 DB : policy added
14/04/28 15:58:53 DB : policy ref decrement ( ref count = 0, policy count = 1 )
14/04/28 15:58:53 ii : removed arp mirror rule ( policycount 1 )
14/04/28 15:58:53 K< : recv X_SPDADD UNSPEC pfkey message
14/04/28 15:58:53 ii : - id    = 0
14/04/28 15:58:53 ii : - type  = NONE
14/04/28 15:58:53 ii : - dir   = OUTBOUND
14/04/28 15:58:53 DB : policy ref increment ( ref count = 1, policy count = 1 )
14/04/28 15:58:53 DB : policy added
14/04/28 15:58:53 ii : installed accept rule for 210.80.199.3/255.255.255.255
14/04/28 15:58:53 DB : policy ref decrement ( ref count = 0, policy count = 2 )
14/04/28 15:58:53 K< : recv X_SPDADD UNSPEC pfkey message
14/04/28 15:58:53 ii : - id    = 0
14/04/28 15:58:53 ii : - type  = NONE
14/04/28 15:58:53 ii : - dir   = INBOUND
14/04/28 15:58:53 DB : policy ref increment ( ref count = 1, policy count = 2 )
14/04/28 15:58:53 DB : policy added
14/04/28 15:58:53 DB : policy ref decrement ( ref count = 0, policy count = 3 )
14/04/28 15:58:53 K< : recv X_SPDADD UNSPEC pfkey message
14/04/28 15:58:53 ii : - id    = 0
14/04/28 15:58:53 ii : - type  = NONE
14/04/28 15:58:53 ii : - dir   = OUTBOUND
14/04/28 15:58:53 DB : policy ref increment ( ref count = 1, policy count = 3 )
14/04/28 15:58:53 DB : policy added
14/04/28 15:58:53 ii : installed accept rule for 192.168.1.1/255.255.255.255
14/04/28 15:58:53 DB : policy ref decrement ( ref count = 0, policy count = 4 )
14/04/28 15:58:53 K< : recv X_SPDADD UNSPEC pfkey message
14/04/28 15:58:53 ii : - id    = 0
14/04/28 15:58:53 ii : - type  = IPSEC
14/04/28 15:58:53 ii : - dir   = INBOUND
14/04/28 15:58:53 ii : - transform #0
14/04/28 15:58:53 ii : -- proto = 50
14/04/28 15:58:53 ii : -- level = REQUIRE
14/04/28 15:58:53 ii : -- mode  = TUNNEL
14/04/28 15:58:53 ii : -- reqid = 0
14/04/28 15:58:53 ii : -- tsrc  = 210.80.199.3:0
14/04/28 15:58:53 ii : -- tdst  = 192.168.1.102:0
14/04/28 15:58:53 DB : policy ref increment ( ref count = 1, policy count = 4 )
14/04/28 15:58:53 DB : policy added
14/04/28 15:58:53 DB : policy ref decrement ( ref count = 0, policy count = 5 )
14/04/28 15:58:53 ii : inspecting ARP request ...
14/04/28 15:58:53 DB : policy not found
14/04/28 15:58:53 ii : ignoring ARP request for 10.120.2.101, no policy found
14/04/28 15:58:53 K< : recv X_SPDADD UNSPEC pfkey message
14/04/28 15:58:53 ii : - id    = 0
14/04/28 15:58:53 ii : - type  = IPSEC
14/04/28 15:58:53 ii : - dir   = OUTBOUND
14/04/28 15:58:53 ii : - transform #0
14/04/28 15:58:53 ii : -- proto = 50
14/04/28 15:58:53 ii : -- level = REQUIRE
14/04/28 15:58:53 ii : -- mode  = TUNNEL
14/04/28 15:58:53 ii : -- reqid = 0
14/04/28 15:58:53 ii : -- tsrc  = 192.168.1.102:0
14/04/28 15:58:53 ii : -- tdst  = 210.80.199.3:0
14/04/28 15:58:53 DB : policy ref increment ( ref count = 1, policy count = 5 )
14/04/28 15:58:53 DB : policy added
14/04/28 15:58:53 ii : installed divert rule for 10.0.0.0/255.0.0.0
14/04/28 15:58:53 DB : policy ref decrement ( ref count = 0, policy count = 6 )
14/04/28 15:58:53 K< : recv X_SPDADD UNSPEC pfkey message
14/04/28 15:58:53 ii : - id    = 0
14/04/28 15:58:53 ii : - type  = IPSEC
14/04/28 15:58:53 ii : - dir   = INBOUND
14/04/28 15:58:53 ii : - transform #0
14/04/28 15:58:53 ii : -- proto = 50
14/04/28 15:58:53 ii : -- level = REQUIRE
14/04/28 15:58:53 ii : -- mode  = TUNNEL
14/04/28 15:58:53 ii : -- reqid = 0
14/04/28 15:58:53 ii : -- tsrc  = 210.80.199.3:0
14/04/28 15:58:53 ii : -- tdst  = 192.168.1.102:0
14/04/28 15:58:53 DB : policy ref increment ( ref count = 1, policy count = 6 )
14/04/28 15:58:53 DB : policy added
14/04/28 15:58:53 DB : policy ref decrement ( ref count = 0, policy count = 7 )
14/04/28 15:58:53 K< : recv GETSPI ESP pfkey message
14/04/28 15:58:53 ii : allocated spi for ESP sa
14/04/28 15:58:53 ii : - spi  = 0xd019cddc
14/04/28 15:58:53 ii : - src  = 210.80.199.3:4500
14/04/28 15:58:53 ii : - dst  = 192.168.1.102:4500
14/04/28 15:58:53 DB : sa ref increment ( ref count = 1, sa count = 0 )
14/04/28 15:58:53 DB : sa added
14/04/28 15:58:53 DB : sa ref increment ( ref count = 2, sa count = 1 )
14/04/28 15:58:53 DB : sa ref decrement ( ref count = 1, sa count = 1 )
14/04/28 15:58:53 K> : sent GETSPI ESP pfkey message
14/04/28 15:58:53 K> : sent GETSPI ESP pfkey message
14/04/28 15:58:53 K< : recv X_SPDADD UNSPEC pfkey message
14/04/28 15:58:53 ii : - id    = 0
14/04/28 15:58:53 ii : - type  = IPSEC
14/04/28 15:58:53 ii : - dir   = OUTBOUND
14/04/28 15:58:53 ii : - transform #0
14/04/28 15:58:53 ii : -- proto = 50
14/04/28 15:58:53 ii : -- level = REQUIRE
14/04/28 15:58:53 ii : -- mode  = TUNNEL
14/04/28 15:58:53 ii : -- reqid = 0
14/04/28 15:58:53 ii : -- tsrc  = 192.168.1.102:0
14/04/28 15:58:53 ii : -- tdst  = 210.80.199.3:0
14/04/28 15:58:53 DB : policy ref increment ( ref count = 1, policy count = 7 )
14/04/28 15:58:53 DB : policy added
14/04/28 15:58:53 ii : installed divert rule for 192.168.90.0/255.255.255.0
14/04/28 15:58:53 DB : policy ref decrement ( ref count = 0, policy count = 8 )
14/04/28 15:58:53 K< : recv X_SPDADD UNSPEC pfkey message
14/04/28 15:58:53 ii : - id    = 0
14/04/28 15:58:53 ii : - type  = IPSEC
14/04/28 15:58:53 ii : - dir   = INBOUND
14/04/28 15:58:53 ii : - transform #0
14/04/28 15:58:53 ii : -- proto = 50
14/04/28 15:58:53 ii : -- level = REQUIRE
14/04/28 15:58:53 ii : -- mode  = TUNNEL
14/04/28 15:58:53 ii : -- reqid = 0
14/04/28 15:58:53 ii : -- tsrc  = 210.80.199.3:0
14/04/28 15:58:53 ii : -- tdst  = 192.168.1.102:0
14/04/28 15:58:53 DB : policy ref increment ( ref count = 1, policy count = 8 )
14/04/28 15:58:53 DB : policy added
14/04/28 15:58:53 DB : policy ref decrement ( ref count = 0, policy count = 9 )
14/04/28 15:58:53 K< : recv X_SPDADD UNSPEC pfkey message
14/04/28 15:58:53 ii : - id    = 0
14/04/28 15:58:53 ii : - type  = IPSEC
14/04/28 15:58:53 ii : - dir   = OUTBOUND
14/04/28 15:58:53 ii : - transform #0
14/04/28 15:58:53 ii : -- proto = 50
14/04/28 15:58:53 ii : -- level = REQUIRE
14/04/28 15:58:53 ii : -- mode  = TUNNEL
14/04/28 15:58:53 ii : -- reqid = 0
14/04/28 15:58:53 ii : -- tsrc  = 192.168.1.102:0
14/04/28 15:58:53 ii : -- tdst  = 210.80.199.3:0
14/04/28 15:58:53 DB : policy ref increment ( ref count = 1, policy count = 9 )
14/04/28 15:58:53 DB : policy added
14/04/28 15:58:53 ii : installed divert rule for 172.16.30.0/255.255.255.0
14/04/28 15:58:53 DB : policy ref decrement ( ref count = 0, policy count = 10 )
14/04/28 15:58:53 K< : recv X_SPDADD UNSPEC pfkey message
14/04/28 15:58:53 ii : - id    = 0
14/04/28 15:58:53 ii : - type  = IPSEC
14/04/28 15:58:53 ii : - dir   = INBOUND
14/04/28 15:58:53 ii : - transform #0
14/04/28 15:58:53 ii : -- proto = 50
14/04/28 15:58:53 ii : -- level = REQUIRE
14/04/28 15:58:53 ii : -- mode  = TUNNEL
14/04/28 15:58:53 ii : -- reqid = 0
14/04/28 15:58:53 ii : -- tsrc  = 210.80.199.3:0
14/04/28 15:58:53 ii : -- tdst  = 192.168.1.102:0
14/04/28 15:58:53 DB : policy ref increment ( ref count = 1, policy count = 10 )
14/04/28 15:58:53 DB : policy added
14/04/28 15:58:53 DB : policy ref decrement ( ref count = 0, policy count = 11 )
14/04/28 15:58:53 K< : recv X_SPDADD UNSPEC pfkey message
14/04/28 15:58:53 ii : - id    = 0
14/04/28 15:58:53 ii : - type  = IPSEC
14/04/28 15:58:53 ii : - dir   = OUTBOUND
14/04/28 15:58:53 ii : - transform #0
14/04/28 15:58:53 ii : -- proto = 50
14/04/28 15:58:53 ii : -- level = REQUIRE
14/04/28 15:58:53 ii : -- mode  = TUNNEL
14/04/28 15:58:53 ii : -- reqid = 0
14/04/28 15:58:53 ii : -- tsrc  = 192.168.1.102:0
14/04/28 15:58:53 ii : -- tdst  = 210.80.199.3:0
14/04/28 15:58:53 DB : policy ref increment ( ref count = 1, policy count = 11 )
14/04/28 15:58:53 DB : policy added
14/04/28 15:58:53 ii : installed divert rule for 192.168.3.0/255.255.255.0
14/04/28 15:58:53 DB : policy ref decrement ( ref count = 0, policy count = 12 )
14/04/28 15:58:53 K< : recv X_SPDADD UNSPEC pfkey message
14/04/28 15:58:53 ii : - id    = 0
14/04/28 15:58:53 ii : - type  = IPSEC
14/04/28 15:58:53 ii : - dir   = INBOUND
14/04/28 15:58:53 ii : - transform #0
14/04/28 15:58:53 ii : -- proto = 50
14/04/28 15:58:53 ii : -- level = REQUIRE
14/04/28 15:58:53 ii : -- mode  = TUNNEL
14/04/28 15:58:53 ii : -- reqid = 0
14/04/28 15:58:53 ii : -- tsrc  = 210.80.199.3:0
14/04/28 15:58:53 ii : -- tdst  = 192.168.1.102:0
14/04/28 15:58:53 DB : policy ref increment ( ref count = 1, policy count = 12 )
14/04/28 15:58:53 DB : policy added
14/04/28 15:58:53 DB : policy ref decrement ( ref count = 0, policy count = 13 )
14/04/28 15:58:53 K< : recv X_SPDADD UNSPEC pfkey message
14/04/28 15:58:53 ii : - id    = 0
14/04/28 15:58:53 ii : - type  = IPSEC
14/04/28 15:58:53 ii : - dir   = OUTBOUND
14/04/28 15:58:53 ii : - transform #0
14/04/28 15:58:53 ii : -- proto = 50
14/04/28 15:58:53 ii : -- level = REQUIRE
14/04/28 15:58:53 ii : -- mode  = TUNNEL
14/04/28 15:58:53 ii : -- reqid = 0
14/04/28 15:58:53 ii : -- tsrc  = 192.168.1.102:0
14/04/28 15:58:53 ii : -- tdst  = 210.80.199.3:0
14/04/28 15:58:53 DB : policy ref increment ( ref count = 1, policy count = 13 )
14/04/28 15:58:53 K< : recv GET UNSPEC pfkey message
14/04/28 15:58:53 DB : policy added
14/04/28 15:58:53 ii : installed divert rule for 205.197.192.150/255.255.255.255
14/04/28 15:58:53 DB : sa found
14/04/28 15:58:53 DB : sa ref increment ( ref count = 2, sa count = 1 )
14/04/28 15:58:53 DB : policy ref decrement ( ref count = 0, policy count = 14 )
14/04/28 15:58:53 DB : sa ref decrement ( ref count = 1, sa count = 1 )
14/04/28 15:58:53 K< : recv X_SPDADD UNSPEC pfkey message
14/04/28 15:58:53 ii : - id    = 0
14/04/28 15:58:53 ii : - type  = IPSEC
14/04/28 15:58:53 ii : - dir   = INBOUND
14/04/28 15:58:53 ii : - transform #0
14/04/28 15:58:53 ii : -- proto = 50
14/04/28 15:58:53 ii : -- level = REQUIRE
14/04/28 15:58:53 ii : -- mode  = TUNNEL
14/04/28 15:58:53 ii : -- reqid = 0
14/04/28 15:58:53 ii : -- tsrc  = 210.80.199.3:0
14/04/28 15:58:53 ii : -- tdst  = 192.168.1.102:0
14/04/28 15:58:53 DB : policy ref increment ( ref count = 1, policy count = 14 )
14/04/28 15:58:53 DB : policy added
14/04/28 15:58:53 DB : policy ref decrement ( ref count = 0, policy count = 15 )
14/04/28 15:58:53 K< : recv X_SPDADD UNSPEC pfkey message
14/04/28 15:58:53 ii : - id    = 0
14/04/28 15:58:53 ii : - type  = IPSEC
14/04/28 15:58:53 ii : - dir   = OUTBOUND
14/04/28 15:58:53 ii : - transform #0
14/04/28 15:58:53 ii : -- proto = 50
14/04/28 15:58:53 ii : -- level = REQUIRE
14/04/28 15:58:53 ii : -- mode  = TUNNEL
14/04/28 15:58:53 ii : -- reqid = 0
14/04/28 15:58:53 ii : -- tsrc  = 192.168.1.102:0
14/04/28 15:58:53 ii : -- tdst  = 210.80.199.3:0
14/04/28 15:58:53 DB : policy ref increment ( ref count = 1, policy count = 15 )
14/04/28 15:58:53 DB : policy added
14/04/28 15:58:53 ii : installed divert rule for 205.197.192.151/255.255.255.255
14/04/28 15:58:53 DB : policy ref decrement ( ref count = 0, policy count = 16 )
14/04/28 15:58:54 ii : inspecting ARP request ...
14/04/28 15:58:54 DB : policy not found
14/04/28 15:58:54 ii : ignoring ARP request for 10.120.2.101, no policy found
14/04/28 15:58:54 K< : recv GET UNSPEC pfkey message
14/04/28 15:58:54 DB : sa found
14/04/28 15:58:54 DB : sa ref increment ( ref count = 2, sa count = 1 )
14/04/28 15:58:54 DB : sa ref decrement ( ref count = 1, sa count = 1 )
14/04/28 15:58:54 ii : inspecting ARP request ...
14/04/28 15:58:54 !! : ARP packet has invalid header
14/04/28 15:58:55 ii : inspecting ARP request ...
14/04/28 15:58:55 DB : policy not found
14/04/28 15:58:55 ii : ignoring ARP request for 10.120.2.101, no policy found
14/04/28 15:58:55 K< : recv GET UNSPEC pfkey message
14/04/28 15:58:55 DB : sa found
14/04/28 15:58:55 DB : sa ref increment ( ref count = 2, sa count = 1 )
14/04/28 15:58:55 DB : sa ref decrement ( ref count = 1, sa count = 1 )
14/04/28 15:58:56 ii : inspecting ARP request ...
14/04/28 15:58:56 ii : ignoring ARP request for 10.120.2.101,
duplicate address check
14/04/28 15:58:56 ii : inspecting ARP request ...
14/04/28 15:58:56 DB : policy found
14/04/28 15:58:56 DB : policy not found
14/04/28 15:58:56 ii : spoofing ARP response for 10.1.4.201
14/04/28 15:58:56 DB : policy found
14/04/28 15:58:56 DB : policy ref increment ( ref count = 1, policy count = 16 )
14/04/28 15:58:56 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 15:58:56 K> : sent ACQUIRE UNSPEC pfkey message
14/04/28 15:58:56 ii : - id   = 6
14/04/28 15:58:56 K< : recv GETSPI ESP pfkey message
14/04/28 15:58:56 ii : allocated spi for ESP sa
14/04/28 15:58:56 ii : - spi  = 0xef880ced
14/04/28 15:58:56 ii : - src  = 210.80.199.3:4500
14/04/28 15:58:56 ii : - dst  = 192.168.1.102:4500
14/04/28 15:58:56 DB : sa ref increment ( ref count = 1, sa count = 1 )
14/04/28 15:58:56 DB : sa added
14/04/28 15:58:56 DB : sa ref increment ( ref count = 2, sa count = 2 )
14/04/28 15:58:56 DB : sa ref decrement ( ref count = 1, sa count = 2 )
14/04/28 15:58:56 K> : sent ACQUIRE UNSPEC pfkey message
14/04/28 15:58:56 ii : - id   = 6
14/04/28 15:58:56 K> : sent GETSPI ESP pfkey message
14/04/28 15:58:56 K> : sent GETSPI ESP pfkey message
14/04/28 15:58:56 ii : queueing ip packet
14/04/28 15:58:56 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 15:58:56 ii : inspecting ARP request ...
14/04/28 15:58:56 DB : policy not found
14/04/28 15:58:56 ii : ignoring ARP request for 192.168.1.1, no policy found
14/04/28 15:58:56 DB : policy found
14/04/28 15:58:56 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 15:58:56 ii : queueing ip packet
14/04/28 15:58:56 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 15:58:56 DB : policy found
14/04/28 15:58:56 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 15:58:56 ii : queueing ip packet
14/04/28 15:58:56 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 15:58:56 DB : policy found
14/04/28 15:58:56 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 15:58:56 ii : queueing ip packet
14/04/28 15:58:56 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 15:58:56 DB : policy found
14/04/28 15:58:56 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 15:58:56 ii : queueing ip packet
14/04/28 15:58:56 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 15:58:56 DB : policy found
14/04/28 15:58:56 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 15:58:56 ii : queueing ip packet
14/04/28 15:58:56 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 15:58:56 DB : policy found
14/04/28 15:58:56 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 15:58:56 ii : queueing ip packet
14/04/28 15:58:56 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 15:58:56 K< : recv GET UNSPEC pfkey message
14/04/28 15:58:56 DB : sa found
14/04/28 15:58:56 DB : sa ref increment ( ref count = 2, sa count = 2 )
14/04/28 15:58:56 DB : sa ref decrement ( ref count = 1, sa count = 2 )
14/04/28 15:58:56 K< : recv GET UNSPEC pfkey message
14/04/28 15:58:56 DB : sa found
14/04/28 15:58:56 DB : sa ref increment ( ref count = 2, sa count = 2 )
14/04/28 15:58:56 DB : sa ref decrement ( ref count = 1, sa count = 2 )
14/04/28 15:58:57 ii : inspecting ARP request ...
14/04/28 15:58:57 DB : policy found
14/04/28 15:58:57 DB : policy not found
14/04/28 15:58:57 ii : spoofing ARP response for 10.1.4.202
14/04/28 15:58:57 DB : policy found
14/04/28 15:58:57 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 15:58:57 ii : queueing ip packet
14/04/28 15:58:57 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 15:58:57 K< : recv GET UNSPEC pfkey message
14/04/28 15:58:57 DB : sa found
14/04/28 15:58:57 DB : sa ref increment ( ref count = 2, sa count = 2 )
14/04/28 15:58:57 DB : sa ref decrement ( ref count = 1, sa count = 2 )
14/04/28 15:58:57 K< : recv GET UNSPEC pfkey message
14/04/28 15:58:57 DB : sa found
14/04/28 15:58:57 DB : sa ref increment ( ref count = 2, sa count = 2 )
14/04/28 15:58:57 DB : sa ref decrement ( ref count = 1, sa count = 2 )
14/04/28 15:58:57 DB : policy found
14/04/28 15:58:57 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 15:58:57 ii : queueing ip packet
14/04/28 15:58:57 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 15:58:57 DB : policy found
14/04/28 15:58:57 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 15:58:57 ii : queueing ip packet
14/04/28 15:58:57 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 15:58:57 DB : policy found
14/04/28 15:58:57 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 15:58:57 ii : queueing ip packet
14/04/28 15:58:57 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 15:58:57 DB : policy found
14/04/28 15:58:57 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 15:58:57 ii : queueing ip packet
14/04/28 15:58:57 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 15:58:58 DB : policy found
14/04/28 15:58:58 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 15:58:58 ii : queueing ip packet
14/04/28 15:58:58 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 15:58:58 DB : policy found
14/04/28 15:58:58 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 15:58:58 ii : queueing ip packet
14/04/28 15:58:58 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 15:58:58 K< : recv GET UNSPEC pfkey message
14/04/28 15:58:58 DB : sa found
14/04/28 15:58:58 DB : sa ref increment ( ref count = 2, sa count = 2 )
14/04/28 15:58:58 DB : sa ref decrement ( ref count = 1, sa count = 2 )
14/04/28 15:58:58 K< : recv GET UNSPEC pfkey message
14/04/28 15:58:58 DB : sa found
14/04/28 15:58:58 DB : sa ref increment ( ref count = 2, sa count = 2 )
14/04/28 15:58:58 DB : sa ref decrement ( ref count = 1, sa count = 2 )
14/04/28 15:58:59 DB : policy found
14/04/28 15:58:59 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 15:58:59 ii : queueing ip packet
14/04/28 15:58:59 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 15:58:59 DB : policy found
14/04/28 15:58:59 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 15:58:59 ii : queueing ip packet
14/04/28 15:58:59 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 15:58:59 DB : policy found
14/04/28 15:58:59 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 15:58:59 ii : queueing ip packet
14/04/28 15:58:59 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 15:58:59 DB : policy found
14/04/28 15:58:59 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 15:58:59 ii : queueing ip packet
14/04/28 15:58:59 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 15:58:59 DB : policy found
14/04/28 15:58:59 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 15:58:59 ii : queueing ip packet
14/04/28 15:58:59 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 15:58:59 DB : policy found
14/04/28 15:58:59 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 15:58:59 ii : queueing ip packet
14/04/28 15:58:59 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 15:58:59 K< : recv GET UNSPEC pfkey message
14/04/28 15:58:59 DB : sa found
14/04/28 15:58:59 DB : sa ref increment ( ref count = 2, sa count = 2 )
14/04/28 15:58:59 DB : sa ref decrement ( ref count = 1, sa count = 2 )
14/04/28 15:58:59 K< : recv GET UNSPEC pfkey message
14/04/28 15:58:59 DB : sa found
14/04/28 15:58:59 DB : sa ref increment ( ref count = 2, sa count = 2 )
14/04/28 15:58:59 DB : sa ref decrement ( ref count = 1, sa count = 2 )
14/04/28 15:59:00 DB : policy found
14/04/28 15:59:00 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 15:59:00 ii : queueing ip packet
14/04/28 15:59:00 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 15:59:00 DB : policy found
14/04/28 15:59:00 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 15:59:00 ii : queueing ip packet
14/04/28 15:59:00 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 15:59:00 DB : policy found
14/04/28 15:59:00 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 15:59:00 ii : queueing ip packet
14/04/28 15:59:00 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 15:59:00 DB : policy found
14/04/28 15:59:00 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 15:59:00 ii : queueing ip packet
14/04/28 15:59:00 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 15:59:00 DB : policy found
14/04/28 15:59:00 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 15:59:00 ii : queueing ip packet
14/04/28 15:59:00 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 15:59:00 K< : recv GET UNSPEC pfkey message
14/04/28 15:59:00 DB : sa found
14/04/28 15:59:00 DB : sa ref increment ( ref count = 2, sa count = 2 )
14/04/28 15:59:00 DB : sa ref decrement ( ref count = 1, sa count = 2 )
14/04/28 15:59:00 K< : recv GET UNSPEC pfkey message
14/04/28 15:59:00 DB : sa found
14/04/28 15:59:00 DB : sa ref increment ( ref count = 2, sa count = 2 )
14/04/28 15:59:00 DB : sa ref decrement ( ref count = 1, sa count = 2 )
14/04/28 15:59:01 DB : policy found
14/04/28 15:59:01 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 15:59:01 ii : queueing ip packet
14/04/28 15:59:01 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 15:59:01 DB : policy found
14/04/28 15:59:01 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 15:59:01 ii : queueing ip packet
14/04/28 15:59:01 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 15:59:01 K< : recv GET UNSPEC pfkey message
14/04/28 15:59:01 DB : sa found
14/04/28 15:59:01 DB : sa ref increment ( ref count = 2, sa count = 2 )
14/04/28 15:59:01 DB : sa ref decrement ( ref count = 1, sa count = 2 )
14/04/28 15:59:01 K< : recv GET UNSPEC pfkey message
14/04/28 15:59:01 DB : sa found
14/04/28 15:59:01 DB : sa ref increment ( ref count = 2, sa count = 2 )
14/04/28 15:59:01 DB : sa ref decrement ( ref count = 1, sa count = 2 )
14/04/28 15:59:02 K< : recv GET UNSPEC pfkey message
14/04/28 15:59:02 DB : sa found
14/04/28 15:59:02 DB : sa ref increment ( ref count = 2, sa count = 2 )
14/04/28 15:59:02 DB : sa ref decrement ( ref count = 1, sa count = 2 )
14/04/28 15:59:02 K< : recv GET UNSPEC pfkey message
14/04/28 15:59:02 DB : sa found
14/04/28 15:59:02 DB : sa ref increment ( ref count = 2, sa count = 2 )
14/04/28 15:59:02 DB : sa ref decrement ( ref count = 1, sa count = 2 )
14/04/28 15:59:02 DB : policy found
14/04/28 15:59:02 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 15:59:02 ii : queueing ip packet
14/04/28 15:59:02 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 15:59:02 ii : inspecting ARP request ...
14/04/28 15:59:02 DB : policy found
14/04/28 15:59:02 DB : policy not found
14/04/28 15:59:02 ii : spoofing ARP response for 10.164.8.218
14/04/28 15:59:02 DB : policy found
14/04/28 15:59:02 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 15:59:02 ii : queueing ip packet
14/04/28 15:59:02 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 15:59:03 ii : inspecting ARP request ...
14/04/28 15:59:03 DB : policy not found
14/04/28 15:59:03 ii : ignoring ARP request for 192.168.1.1, no policy found
14/04/28 15:59:03 DB : policy found
14/04/28 15:59:03 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 15:59:03 ii : queueing ip packet
14/04/28 15:59:03 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 15:59:03 DB : policy found
14/04/28 15:59:03 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 15:59:03 ii : queueing ip packet
14/04/28 15:59:03 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 15:59:03 DB : policy found
14/04/28 15:59:03 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 15:59:03 ii : queueing ip packet
14/04/28 15:59:03 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 15:59:03 DB : policy found
14/04/28 15:59:03 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 15:59:03 ii : queueing ip packet
14/04/28 15:59:03 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 15:59:03 DB : policy found
14/04/28 15:59:03 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 15:59:03 ii : queueing ip packet
14/04/28 15:59:03 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 15:59:03 K< : recv GET UNSPEC pfkey message
14/04/28 15:59:03 DB : sa found
14/04/28 15:59:03 DB : sa ref increment ( ref count = 2, sa count = 2 )
14/04/28 15:59:03 DB : sa ref decrement ( ref count = 1, sa count = 2 )
14/04/28 15:59:03 K< : recv GET UNSPEC pfkey message
14/04/28 15:59:03 DB : sa found
14/04/28 15:59:03 DB : sa ref increment ( ref count = 2, sa count = 2 )
14/04/28 15:59:03 DB : sa ref decrement ( ref count = 1, sa count = 2 )
14/04/28 15:59:03 DB : policy found
14/04/28 15:59:03 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 15:59:03 ii : queueing ip packet
14/04/28 15:59:03 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 15:59:04 DB : policy found
14/04/28 15:59:04 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 15:59:04 ii : queueing ip packet
14/04/28 15:59:04 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 15:59:04 DB : policy found
14/04/28 15:59:04 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 15:59:04 ii : queueing ip packet
14/04/28 15:59:04 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 15:59:04 DB : policy found
14/04/28 15:59:04 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 15:59:04 ii : queueing ip packet
14/04/28 15:59:04 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 15:59:04 DB : policy found
14/04/28 15:59:04 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 15:59:04 ii : queueing ip packet
14/04/28 15:59:04 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 15:59:04 DB : policy found
14/04/28 15:59:04 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 15:59:04 ii : queueing ip packet
14/04/28 15:59:04 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 15:59:04 DB : policy found
14/04/28 15:59:04 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 15:59:04 ii : queueing ip packet
14/04/28 15:59:04 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 15:59:04 DB : policy found
14/04/28 15:59:04 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 15:59:04 ii : queueing ip packet
14/04/28 15:59:04 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 15:59:04 DB : policy found
14/04/28 15:59:04 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 15:59:04 ii : queueing ip packet
14/04/28 15:59:04 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 15:59:04 K< : recv GET UNSPEC pfkey message
14/04/28 15:59:04 DB : sa found
14/04/28 15:59:04 DB : sa ref increment ( ref count = 2, sa count = 2 )
14/04/28 15:59:04 DB : sa ref decrement ( ref count = 1, sa count = 2 )
14/04/28 15:59:04 K< : recv GET UNSPEC pfkey message
14/04/28 15:59:04 DB : sa found
14/04/28 15:59:04 DB : sa ref increment ( ref count = 2, sa count = 2 )
14/04/28 15:59:04 DB : sa ref decrement ( ref count = 1, sa count = 2 )
14/04/28 15:59:05 DB : policy found
14/04/28 15:59:05 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 15:59:05 ii : queueing ip packet
14/04/28 15:59:05 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 15:59:05 K< : recv GET UNSPEC pfkey message
14/04/28 15:59:05 DB : sa found
14/04/28 15:59:05 DB : sa ref increment ( ref count = 2, sa count = 2 )
14/04/28 15:59:05 DB : sa ref decrement ( ref count = 1, sa count = 2 )
14/04/28 15:59:05 K< : recv GET UNSPEC pfkey message
14/04/28 15:59:05 DB : sa found
14/04/28 15:59:05 DB : sa ref increment ( ref count = 2, sa count = 2 )
14/04/28 15:59:05 DB : sa ref decrement ( ref count = 1, sa count = 2 )
14/04/28 15:59:05 DB : policy found
14/04/28 15:59:05 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 15:59:05 ii : queueing ip packet
14/04/28 15:59:05 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 15:59:06 DB : policy found
14/04/28 15:59:06 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 15:59:06 ii : queueing ip packet
14/04/28 15:59:06 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 15:59:06 DB : policy found
14/04/28 15:59:06 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 15:59:06 ii : queueing ip packet
14/04/28 15:59:06 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 15:59:06 K< : recv GET UNSPEC pfkey message
14/04/28 15:59:06 DB : sa found
14/04/28 15:59:06 DB : sa ref increment ( ref count = 2, sa count = 2 )
14/04/28 15:59:06 DB : sa ref decrement ( ref count = 1, sa count = 2 )
14/04/28 15:59:06 K< : recv GET UNSPEC pfkey message
14/04/28 15:59:06 DB : sa found
14/04/28 15:59:06 DB : sa ref increment ( ref count = 2, sa count = 2 )
14/04/28 15:59:06 DB : sa ref decrement ( ref count = 1, sa count = 2 )
14/04/28 15:59:06 DB : policy found
14/04/28 15:59:06 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 15:59:06 ii : queueing ip packet
14/04/28 15:59:06 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 15:59:07 DB : policy found
14/04/28 15:59:07 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 15:59:07 ii : queueing ip packet
14/04/28 15:59:07 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 15:59:07 DB : policy found
14/04/28 15:59:07 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 15:59:07 ii : queueing ip packet
14/04/28 15:59:07 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 15:59:07 DB : policy found
14/04/28 15:59:07 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 15:59:07 ii : queueing ip packet
14/04/28 15:59:07 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 15:59:07 DB : policy found
14/04/28 15:59:07 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 15:59:07 ii : queueing ip packet
14/04/28 15:59:07 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 15:59:07 DB : policy found
14/04/28 15:59:07 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 15:59:07 ii : queueing ip packet
14/04/28 15:59:07 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 15:59:07 K< : recv GET UNSPEC pfkey message
14/04/28 15:59:07 DB : sa found
14/04/28 15:59:07 DB : sa ref increment ( ref count = 2, sa count = 2 )
14/04/28 15:59:07 DB : sa ref decrement ( ref count = 1, sa count = 2 )
14/04/28 15:59:07 K< : recv GET UNSPEC pfkey message
14/04/28 15:59:07 DB : sa found
14/04/28 15:59:07 DB : sa ref increment ( ref count = 2, sa count = 2 )
14/04/28 15:59:07 DB : sa ref decrement ( ref count = 1, sa count = 2 )
14/04/28 15:59:08 ii : sa never reached maturity
14/04/28 15:59:08 ii : removed sa divert rule for 210.80.199.3->192.168.1.102
14/04/28 15:59:08 DB : sa deleted ( sa count = 1 )
14/04/28 15:59:08 K< : recv GET UNSPEC pfkey message
14/04/28 15:59:08 DB : sa not found
14/04/28 15:59:08 ii : failed to locate UNSPEC sa for get
14/04/28 15:59:08 ii : - spi  = 0xd019cddc
14/04/28 15:59:08 K< : recv GET UNSPEC pfkey message
14/04/28 15:59:08 DB : sa found
14/04/28 15:59:08 DB : sa ref increment ( ref count = 2, sa count = 1 )
14/04/28 15:59:08 DB : sa ref decrement ( ref count = 1, sa count = 1 )
14/04/28 15:59:09 K< : recv GET UNSPEC pfkey message
14/04/28 15:59:09 DB : sa found
14/04/28 15:59:09 DB : sa ref increment ( ref count = 2, sa count = 1 )
14/04/28 15:59:09 DB : sa ref decrement ( ref count = 1, sa count = 1 )
14/04/28 15:59:10 DB : policy found
14/04/28 15:59:10 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 15:59:10 ii : queueing ip packet
14/04/28 15:59:10 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 15:59:10 DB : policy found
14/04/28 15:59:10 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 15:59:10 ii : queueing ip packet
14/04/28 15:59:10 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 15:59:10 K< : recv GET UNSPEC pfkey message
14/04/28 15:59:10 DB : sa found
14/04/28 15:59:10 DB : sa ref increment ( ref count = 2, sa count = 1 )
14/04/28 15:59:10 DB : sa ref decrement ( ref count = 1, sa count = 1 )
14/04/28 15:59:11 ii : inspecting ARP request ...
14/04/28 15:59:11 DB : policy found
14/04/28 15:59:11 DB : policy not found
14/04/28 15:59:11 ii : spoofing ARP response for 10.164.8.218
14/04/28 15:59:11 ii : sa never reached maturity
14/04/28 15:59:11 ii : removed sa divert rule for 210.80.199.3->192.168.1.102
14/04/28 15:59:11 DB : sa deleted ( sa count = 0 )
14/04/28 15:59:11 ii : inspecting ARP request ...
14/04/28 15:59:11 DB : policy not found
14/04/28 15:59:11 ii : ignoring ARP request for 192.168.1.1, no policy found
14/04/28 15:59:11 DB : policy found
14/04/28 15:59:11 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 15:59:11 ii : queueing ip packet
14/04/28 15:59:11 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 15:59:11 DB : policy found
14/04/28 15:59:11 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 15:59:11 ii : queueing ip packet
14/04/28 15:59:11 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 15:59:11 DB : policy found
14/04/28 15:59:11 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 15:59:11 ii : queueing ip packet
14/04/28 15:59:11 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 15:59:11 K< : recv GET UNSPEC pfkey message
14/04/28 15:59:11 DB : sa not found
14/04/28 15:59:11 ii : failed to locate UNSPEC sa for get
14/04/28 15:59:11 ii : - spi  = 0xef880ced
14/04/28 15:59:11 DB : policy found
14/04/28 15:59:11 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 15:59:11 ii : queueing ip packet
14/04/28 15:59:11 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 15:59:11 DB : policy found
14/04/28 15:59:11 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 15:59:11 ii : queueing ip packet
14/04/28 15:59:11 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 15:59:12 ii : aquire timelimit expired
14/04/28 15:59:12 DB : policy ref decrement ( ref count = 0, policy count = 16 )
14/04/28 15:59:12 DB : policy found
14/04/28 15:59:12 DB : policy ref increment ( ref count = 1, policy count = 16 )
14/04/28 15:59:12 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 15:59:12 K> : sent ACQUIRE UNSPEC pfkey message
14/04/28 15:59:12 ii : - id   = 6
14/04/28 15:59:12 K> : sent ACQUIRE UNSPEC pfkey message
14/04/28 15:59:12 ii : - id   = 6
14/04/28 15:59:12 ii : queueing ip packet
14/04/28 15:59:12 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 15:59:12 K< : recv GETSPI ESP pfkey message
14/04/28 15:59:12 ii : allocated spi for ESP sa
14/04/28 15:59:12 ii : - spi  = 0xe1394c24
14/04/28 15:59:12 ii : - src  = 210.80.199.3:4500
14/04/28 15:59:12 ii : - dst  = 192.168.1.102:4500
14/04/28 15:59:12 DB : sa ref increment ( ref count = 1, sa count = 0 )
14/04/28 15:59:12 DB : sa added
14/04/28 15:59:12 DB : sa ref increment ( ref count = 2, sa count = 1 )
14/04/28 15:59:12 DB : sa ref decrement ( ref count = 1, sa count = 1 )
14/04/28 15:59:12 K> : sent GETSPI ESP pfkey message
14/04/28 15:59:12 K> : sent GETSPI ESP pfkey message
14/04/28 15:59:12 K< : recv GET UNSPEC pfkey message
14/04/28 15:59:12 DB : sa found
14/04/28 15:59:12 DB : sa ref increment ( ref count = 2, sa count = 1 )
14/04/28 15:59:12 DB : sa ref decrement ( ref count = 1, sa count = 1 )
14/04/28 15:59:12 DB : policy found
14/04/28 15:59:12 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 15:59:12 ii : queueing ip packet
14/04/28 15:59:12 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 15:59:12 DB : policy found
14/04/28 15:59:12 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 15:59:12 ii : queueing ip packet
14/04/28 15:59:12 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 15:59:12 DB : policy found
14/04/28 15:59:12 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 15:59:12 ii : queueing ip packet
14/04/28 15:59:12 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 15:59:13 DB : policy found
14/04/28 15:59:13 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 15:59:13 ii : queueing ip packet
14/04/28 15:59:13 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 15:59:13 DB : policy found
14/04/28 15:59:13 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 15:59:13 ii : queueing ip packet
14/04/28 15:59:13 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 15:59:13 DB : policy found
14/04/28 15:59:13 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 15:59:13 ii : queueing ip packet
14/04/28 15:59:13 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 15:59:13 K< : recv GET UNSPEC pfkey message
14/04/28 15:59:13 DB : sa found
14/04/28 15:59:13 DB : sa ref increment ( ref count = 2, sa count = 1 )
14/04/28 15:59:13 DB : sa ref decrement ( ref count = 1, sa count = 1 )
14/04/28 15:59:14 K< : recv GET UNSPEC pfkey message
14/04/28 15:59:14 DB : sa found
14/04/28 15:59:14 DB : sa ref increment ( ref count = 2, sa count = 1 )
14/04/28 15:59:14 DB : sa ref decrement ( ref count = 1, sa count = 1 )
14/04/28 15:59:15 DB : policy found
14/04/28 15:59:15 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 15:59:15 ii : queueing ip packet
14/04/28 15:59:15 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 15:59:15 K< : recv GET UNSPEC pfkey message
14/04/28 15:59:15 DB : sa found
14/04/28 15:59:15 DB : sa ref increment ( ref count = 2, sa count = 1 )
14/04/28 15:59:15 DB : sa ref decrement ( ref count = 1, sa count = 1 )
14/04/28 15:59:15 DB : policy found
14/04/28 15:59:15 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 15:59:15 ii : queueing ip packet
14/04/28 15:59:15 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 15:59:16 K< : recv GET UNSPEC pfkey message
14/04/28 15:59:16 DB : sa found
14/04/28 15:59:16 DB : sa ref increment ( ref count = 2, sa count = 1 )
14/04/28 15:59:16 DB : sa ref decrement ( ref count = 1, sa count = 1 )
14/04/28 15:59:16 DB : policy found
14/04/28 15:59:16 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 15:59:16 ii : queueing ip packet
14/04/28 15:59:16 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 15:59:17 ii : inspecting ARP request ...
14/04/28 15:59:17 DB : policy not found
14/04/28 15:59:17 ii : ignoring ARP request for 192.168.1.1, no policy found
14/04/28 15:59:17 K< : recv GET UNSPEC pfkey message
14/04/28 15:59:17 DB : sa found
14/04/28 15:59:17 DB : sa ref increment ( ref count = 2, sa count = 1 )
14/04/28 15:59:17 DB : sa ref decrement ( ref count = 1, sa count = 1 )
14/04/28 15:59:17 DB : policy found
14/04/28 15:59:17 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 15:59:17 ii : queueing ip packet
14/04/28 15:59:17 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 15:59:18 K< : recv GET UNSPEC pfkey message
14/04/28 15:59:18 DB : sa found
14/04/28 15:59:18 DB : sa ref increment ( ref count = 2, sa count = 1 )
14/04/28 15:59:18 DB : sa ref decrement ( ref count = 1, sa count = 1 )
14/04/28 15:59:18 DB : policy found
14/04/28 15:59:18 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 15:59:18 ii : queueing ip packet
14/04/28 15:59:18 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 15:59:19 DB : policy found
14/04/28 15:59:19 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 15:59:19 ii : queueing ip packet
14/04/28 15:59:19 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 15:59:19 K< : recv GET UNSPEC pfkey message
14/04/28 15:59:19 DB : sa found
14/04/28 15:59:19 DB : sa ref increment ( ref count = 2, sa count = 1 )
14/04/28 15:59:19 DB : sa ref decrement ( ref count = 1, sa count = 1 )
14/04/28 15:59:20 DB : policy found
14/04/28 15:59:20 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 15:59:20 ii : queueing ip packet
14/04/28 15:59:20 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 15:59:20 K< : recv GET UNSPEC pfkey message
14/04/28 15:59:20 DB : sa found
14/04/28 15:59:20 DB : sa ref increment ( ref count = 2, sa count = 1 )
14/04/28 15:59:20 DB : sa ref decrement ( ref count = 1, sa count = 1 )
14/04/28 15:59:20 ii : inspecting ARP request ...
14/04/28 15:59:20 DB : policy found
14/04/28 15:59:20 DB : policy not found
14/04/28 15:59:20 ii : spoofing ARP response for 10.164.8.218
14/04/28 15:59:20 DB : policy found
14/04/28 15:59:20 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 15:59:20 ii : queueing ip packet
14/04/28 15:59:20 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 15:59:20 DB : policy found
14/04/28 15:59:20 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 15:59:20 ii : queueing ip packet
14/04/28 15:59:20 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 15:59:20 DB : policy found
14/04/28 15:59:20 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 15:59:20 ii : queueing ip packet
14/04/28 15:59:20 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 15:59:21 DB : policy found
14/04/28 15:59:21 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 15:59:21 ii : queueing ip packet
14/04/28 15:59:21 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 15:59:21 K< : recv GET UNSPEC pfkey message
14/04/28 15:59:21 DB : sa found
14/04/28 15:59:21 DB : sa ref increment ( ref count = 2, sa count = 1 )
14/04/28 15:59:21 DB : sa ref decrement ( ref count = 1, sa count = 1 )
14/04/28 15:59:21 DB : policy found
14/04/28 15:59:21 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 15:59:21 ii : queueing ip packet
14/04/28 15:59:21 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 15:59:22 DB : policy found
14/04/28 15:59:22 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 15:59:22 ii : queueing ip packet
14/04/28 15:59:22 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 15:59:22 DB : policy found
14/04/28 15:59:22 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 15:59:22 ii : queueing ip packet
14/04/28 15:59:22 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 15:59:22 K< : recv GET UNSPEC pfkey message
14/04/28 15:59:22 DB : sa found
14/04/28 15:59:22 DB : sa ref increment ( ref count = 2, sa count = 1 )
14/04/28 15:59:22 DB : sa ref decrement ( ref count = 1, sa count = 1 )
14/04/28 15:59:23 DB : policy found
14/04/28 15:59:23 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 15:59:23 ii : queueing ip packet
14/04/28 15:59:23 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 15:59:23 K< : recv GET UNSPEC pfkey message
14/04/28 15:59:23 DB : sa found
14/04/28 15:59:23 DB : sa ref increment ( ref count = 2, sa count = 1 )
14/04/28 15:59:23 DB : sa ref decrement ( ref count = 1, sa count = 1 )
14/04/28 15:59:23 K< : recv X_SPDDELETE2 UNSPEC pfkey message
14/04/28 15:59:23 ii : - id   = 5
14/04/28 15:59:23 ii : - type = IPSEC
14/04/28 15:59:23 ii : - dir  = INBOUND
14/04/28 15:59:23 DB : policy found
14/04/28 15:59:23 DB : policy ref increment ( ref count = 1, policy count = 16 )
14/04/28 15:59:23 DB : policy deleted ( policy count = 15 )
14/04/28 15:59:23 K< : recv X_SPDDELETE2 UNSPEC pfkey message
14/04/28 15:59:23 ii : - id   = 6
14/04/28 15:59:23 ii : - type = IPSEC
14/04/28 15:59:23 ii : - dir  = OUTBOUND
14/04/28 15:59:23 DB : policy found
14/04/28 15:59:23 DB : policy ref increment ( ref count = 2, policy count = 15 )
14/04/28 15:59:23 ii : removed divert rule for 10.0.0.0/255.0.0.0
14/04/28 15:59:23 DB : policy deleted ( policy count = 14 )
14/04/28 15:59:23 K< : recv X_SPDDELETE2 UNSPEC pfkey message
14/04/28 15:59:23 ii : - id   = 7
14/04/28 15:59:23 ii : - type = IPSEC
14/04/28 15:59:23 ii : - dir  = INBOUND
14/04/28 15:59:23 DB : policy found
14/04/28 15:59:23 DB : policy ref increment ( ref count = 1, policy count = 14 )
14/04/28 15:59:23 DB : policy deleted ( policy count = 13 )
14/04/28 15:59:23 K< : recv X_SPDDELETE2 UNSPEC pfkey message
14/04/28 15:59:23 ii : - id   = 9
14/04/28 15:59:23 ii : - type = IPSEC
14/04/28 15:59:23 ii : - dir  = OUTBOUND
14/04/28 15:59:23 DB : policy found
14/04/28 15:59:23 DB : policy ref increment ( ref count = 1, policy count = 13 )
14/04/28 15:59:23 ii : removed divert rule for 192.168.90.0/255.255.255.0
14/04/28 15:59:23 DB : policy deleted ( policy count = 12 )
14/04/28 15:59:23 K< : recv X_SPDDELETE2 UNSPEC pfkey message
14/04/28 15:59:23 ii : - id   = 10
14/04/28 15:59:23 ii : - type = IPSEC
14/04/28 15:59:23 ii : - dir  = INBOUND
14/04/28 15:59:23 DB : policy found
14/04/28 15:59:23 DB : policy ref increment ( ref count = 1, policy count = 12 )
14/04/28 15:59:23 DB : policy deleted ( policy count = 11 )
14/04/28 15:59:23 K< : recv X_SPDDELETE2 UNSPEC pfkey message
14/04/28 15:59:23 ii : - id   = 11
14/04/28 15:59:23 ii : - type = IPSEC
14/04/28 15:59:23 ii : - dir  = OUTBOUND
14/04/28 15:59:23 DB : policy found
14/04/28 15:59:23 DB : policy ref increment ( ref count = 1, policy count = 11 )
14/04/28 15:59:23 ii : removed divert rule for 172.16.30.0/255.255.255.0
14/04/28 15:59:23 DB : policy deleted ( policy count = 10 )
14/04/28 15:59:23 K< : recv X_SPDDELETE2 UNSPEC pfkey message
14/04/28 15:59:23 ii : - id   = 12
14/04/28 15:59:23 ii : - type = IPSEC
14/04/28 15:59:23 ii : - dir  = INBOUND
14/04/28 15:59:23 DB : policy found
14/04/28 15:59:23 DB : policy ref increment ( ref count = 1, policy count = 10 )
14/04/28 15:59:23 DB : policy deleted ( policy count = 9 )
14/04/28 15:59:23 K< : recv X_SPDDELETE2 UNSPEC pfkey message
14/04/28 15:59:23 ii : - id   = 13
14/04/28 15:59:23 ii : - type = IPSEC
14/04/28 15:59:23 ii : - dir  = OUTBOUND
14/04/28 15:59:23 DB : policy found
14/04/28 15:59:23 DB : policy ref increment ( ref count = 1, policy count = 9 )
14/04/28 15:59:23 ii : removed divert rule for 192.168.3.0/255.255.255.0
14/04/28 15:59:23 DB : policy deleted ( policy count = 8 )
14/04/28 15:59:23 K< : recv X_SPDDELETE2 UNSPEC pfkey message
14/04/28 15:59:23 ii : - id   = 14
14/04/28 15:59:23 ii : - type = IPSEC
14/04/28 15:59:23 ii : - dir  = INBOUND
14/04/28 15:59:23 DB : policy found
14/04/28 15:59:23 DB : policy ref increment ( ref count = 1, policy count = 8 )
14/04/28 15:59:23 DB : policy deleted ( policy count = 7 )
14/04/28 15:59:23 K< : recv X_SPDDELETE2 UNSPEC pfkey message
14/04/28 15:59:23 ii : - id   = 15
14/04/28 15:59:23 ii : - type = IPSEC
14/04/28 15:59:23 ii : - dir  = OUTBOUND
14/04/28 15:59:23 DB : policy found
14/04/28 15:59:23 DB : policy ref increment ( ref count = 1, policy count = 7 )
14/04/28 15:59:23 ii : removed divert rule for 205.197.192.150/255.255.255.255
14/04/28 15:59:23 DB : policy deleted ( policy count = 6 )
14/04/28 15:59:23 K< : recv X_SPDDELETE2 UNSPEC pfkey message
14/04/28 15:59:23 ii : - id   = 16
14/04/28 15:59:23 ii : - type = IPSEC
14/04/28 15:59:23 ii : - dir  = INBOUND
14/04/28 15:59:23 DB : policy found
14/04/28 15:59:23 DB : policy ref increment ( ref count = 1, policy count = 6 )
14/04/28 15:59:23 DB : policy deleted ( policy count = 5 )
14/04/28 15:59:23 K< : recv X_SPDDELETE2 UNSPEC pfkey message
14/04/28 15:59:23 ii : - id   = 17
14/04/28 15:59:23 ii : - type = IPSEC
14/04/28 15:59:23 ii : - dir  = OUTBOUND
14/04/28 15:59:23 DB : policy found
14/04/28 15:59:23 DB : policy ref increment ( ref count = 1, policy count = 5 )
14/04/28 15:59:23 ii : removed divert rule for 205.197.192.151/255.255.255.255
14/04/28 15:59:23 DB : policy deleted ( policy count = 4 )
14/04/28 15:59:23 K< : recv X_SPDDELETE2 UNSPEC pfkey message
14/04/28 15:59:23 ii : - id   = 3
14/04/28 15:59:23 ii : - type = NONE
14/04/28 15:59:23 ii : - dir  = INBOUND
14/04/28 15:59:23 DB : policy found
14/04/28 15:59:23 DB : policy ref increment ( ref count = 1, policy count = 4 )
14/04/28 15:59:23 DB : policy deleted ( policy count = 3 )
14/04/28 15:59:23 K< : recv X_SPDDELETE2 UNSPEC pfkey message
14/04/28 15:59:23 ii : - id   = 4
14/04/28 15:59:23 ii : - type = NONE
14/04/28 15:59:23 ii : - dir  = OUTBOUND
14/04/28 15:59:23 DB : policy found
14/04/28 15:59:23 DB : policy ref increment ( ref count = 1, policy count = 3 )
14/04/28 15:59:23 ii : removed accept rule for 192.168.1.1/255.255.255.255
14/04/28 15:59:23 DB : policy deleted ( policy count = 2 )
14/04/28 15:59:23 K< : recv X_SPDDELETE2 UNSPEC pfkey message
14/04/28 15:59:23 ii : - id   = 1
14/04/28 15:59:23 ii : - type = NONE
14/04/28 15:59:23 ii : - dir  = INBOUND
14/04/28 15:59:23 DB : policy found
14/04/28 15:59:23 DB : policy ref increment ( ref count = 1, policy count = 2 )
14/04/28 15:59:23 DB : policy deleted ( policy count = 1 )
14/04/28 15:59:23 K< : recv X_SPDDELETE2 UNSPEC pfkey message
14/04/28 15:59:23 ii : - id   = 2
14/04/28 15:59:23 ii : - type = NONE
14/04/28 15:59:23 ii : - dir  = OUTBOUND
14/04/28 15:59:23 DB : policy found
14/04/28 15:59:23 DB : policy ref increment ( ref count = 1, policy count = 1 )
14/04/28 15:59:23 ii : removed accept rule for 210.80.199.3/255.255.255.255
14/04/28 15:59:23 DB : policy deleted ( policy count = 0 )
14/04/28 15:59:23 ii : removed mirror rule ( policycount 0 )
14/04/28 15:59:24 K< : recv GET UNSPEC pfkey message
14/04/28 15:59:24 DB : sa found
14/04/28 15:59:24 DB : sa ref increment ( ref count = 2, sa count = 1 )
14/04/28 15:59:24 DB : sa ref decrement ( ref count = 1, sa count = 1 )
14/04/28 15:59:25 K< : recv GET UNSPEC pfkey message
14/04/28 15:59:25 DB : sa found
14/04/28 15:59:25 DB : sa ref increment ( ref count = 2, sa count = 1 )
14/04/28 15:59:25 DB : sa ref decrement ( ref count = 1, sa count = 1 )
14/04/28 15:59:26 K< : recv GET UNSPEC pfkey message
14/04/28 15:59:26 DB : sa found
14/04/28 15:59:26 DB : sa ref increment ( ref count = 2, sa count = 1 )
14/04/28 15:59:26 DB : sa ref decrement ( ref count = 1, sa count = 1 )
14/04/28 15:59:27 ii : sa never reached maturity
14/04/28 15:59:27 ii : removed sa divert rule for 210.80.199.3->192.168.1.102
14/04/28 15:59:27 DB : sa deleted ( sa count = 0 )
14/04/28 15:59:27 K< : recv X_SPDADD UNSPEC pfkey message
14/04/28 15:59:27 ii : - id    = 0
14/04/28 15:59:27 ii : - type  = NONE
14/04/28 15:59:27 ii : - dir   = INBOUND
14/04/28 15:59:27 DB : policy ref increment ( ref count = 1, policy count = 0 )
14/04/28 15:59:27 DB : policy added
14/04/28 15:59:27 DB : policy ref decrement ( ref count = 0, policy count = 1 )
14/04/28 15:59:27 ii : removed arp mirror rule ( policycount 1 )
14/04/28 15:59:27 K< : recv X_SPDADD UNSPEC pfkey message
14/04/28 15:59:27 ii : - id    = 0
14/04/28 15:59:27 ii : - type  = NONE
14/04/28 15:59:27 ii : - dir   = OUTBOUND
14/04/28 15:59:27 DB : policy ref increment ( ref count = 1, policy count = 1 )
14/04/28 15:59:27 DB : policy added
14/04/28 15:59:27 ii : installed accept rule for 210.80.199.3/255.255.255.255
14/04/28 15:59:27 DB : policy ref decrement ( ref count = 0, policy count = 2 )
14/04/28 15:59:27 K< : recv X_SPDADD UNSPEC pfkey message
14/04/28 15:59:27 ii : - id    = 0
14/04/28 15:59:27 ii : - type  = NONE
14/04/28 15:59:27 ii : - dir   = INBOUND
14/04/28 15:59:27 DB : policy ref increment ( ref count = 1, policy count = 2 )
14/04/28 15:59:27 DB : policy added
14/04/28 15:59:27 DB : policy ref decrement ( ref count = 0, policy count = 3 )
14/04/28 15:59:27 K< : recv X_SPDADD UNSPEC pfkey message
14/04/28 15:59:27 ii : - id    = 0
14/04/28 15:59:27 ii : - type  = NONE
14/04/28 15:59:27 ii : - dir   = OUTBOUND
14/04/28 15:59:27 DB : policy ref increment ( ref count = 1, policy count = 3 )
14/04/28 15:59:27 DB : policy added
14/04/28 15:59:27 ii : installed accept rule for 192.168.1.1/255.255.255.255
14/04/28 15:59:27 DB : policy ref decrement ( ref count = 0, policy count = 4 )
14/04/28 15:59:27 K< : recv X_SPDADD UNSPEC pfkey message
14/04/28 15:59:27 ii : - id    = 0
14/04/28 15:59:27 ii : - type  = IPSEC
14/04/28 15:59:27 ii : - dir   = INBOUND
14/04/28 15:59:27 ii : - transform #0
14/04/28 15:59:27 ii : -- proto = 50
14/04/28 15:59:27 ii : -- level = REQUIRE
14/04/28 15:59:27 ii : -- mode  = TUNNEL
14/04/28 15:59:27 ii : -- reqid = 0
14/04/28 15:59:27 ii : -- tsrc  = 210.80.199.3:0
14/04/28 15:59:27 ii : -- tdst  = 192.168.1.102:0
14/04/28 15:59:27 DB : policy ref increment ( ref count = 1, policy count = 4 )
14/04/28 15:59:27 DB : policy added
14/04/28 15:59:27 DB : policy ref decrement ( ref count = 0, policy count = 5 )
14/04/28 15:59:27 K< : recv X_SPDADD UNSPEC pfkey message
14/04/28 15:59:27 ii : - id    = 0
14/04/28 15:59:27 ii : - type  = IPSEC
14/04/28 15:59:27 ii : - dir   = OUTBOUND
14/04/28 15:59:27 ii : - transform #0
14/04/28 15:59:27 ii : -- proto = 50
14/04/28 15:59:27 ii : -- level = REQUIRE
14/04/28 15:59:27 ii : -- mode  = TUNNEL
14/04/28 15:59:27 ii : -- reqid = 0
14/04/28 15:59:27 ii : -- tsrc  = 192.168.1.102:0
14/04/28 15:59:27 ii : -- tdst  = 210.80.199.3:0
14/04/28 15:59:27 DB : policy ref increment ( ref count = 1, policy count = 5 )
14/04/28 15:59:27 DB : policy added
14/04/28 15:59:27 ii : installed divert rule for 10.0.0.0/255.0.0.0
14/04/28 15:59:27 DB : policy ref decrement ( ref count = 0, policy count = 6 )
14/04/28 15:59:27 K< : recv X_SPDADD UNSPEC pfkey message
14/04/28 15:59:27 ii : - id    = 0
14/04/28 15:59:27 ii : - type  = IPSEC
14/04/28 15:59:27 ii : - dir   = INBOUND
14/04/28 15:59:27 ii : - transform #0
14/04/28 15:59:27 ii : -- proto = 50
14/04/28 15:59:27 ii : -- level = REQUIRE
14/04/28 15:59:27 ii : -- mode  = TUNNEL
14/04/28 15:59:27 ii : -- reqid = 0
14/04/28 15:59:27 ii : -- tsrc  = 210.80.199.3:0
14/04/28 15:59:27 ii : -- tdst  = 192.168.1.102:0
14/04/28 15:59:27 DB : policy ref increment ( ref count = 1, policy count = 6 )
14/04/28 15:59:27 DB : policy added
14/04/28 15:59:27 DB : policy ref decrement ( ref count = 0, policy count = 7 )
14/04/28 15:59:27 K< : recv GETSPI ESP pfkey message
14/04/28 15:59:27 ii : allocated spi for ESP sa
14/04/28 15:59:27 ii : - spi  = 0x77339000
14/04/28 15:59:27 ii : - src  = 210.80.199.3:4500
14/04/28 15:59:27 ii : - dst  = 192.168.1.102:4500
14/04/28 15:59:27 DB : sa ref increment ( ref count = 1, sa count = 0 )
14/04/28 15:59:27 DB : sa added
14/04/28 15:59:27 DB : sa ref increment ( ref count = 2, sa count = 1 )
14/04/28 15:59:27 DB : sa ref decrement ( ref count = 1, sa count = 1 )
14/04/28 15:59:27 K> : sent GETSPI ESP pfkey message
14/04/28 15:59:27 K> : sent GETSPI ESP pfkey message
14/04/28 15:59:27 K< : recv X_SPDADD UNSPEC pfkey message
14/04/28 15:59:27 ii : - id    = 0
14/04/28 15:59:27 ii : - type  = IPSEC
14/04/28 15:59:27 ii : - dir   = OUTBOUND
14/04/28 15:59:27 ii : - transform #0
14/04/28 15:59:27 ii : -- proto = 50
14/04/28 15:59:27 ii : -- level = REQUIRE
14/04/28 15:59:27 ii : -- mode  = TUNNEL
14/04/28 15:59:27 ii : -- reqid = 0
14/04/28 15:59:27 ii : -- tsrc  = 192.168.1.102:0
14/04/28 15:59:27 ii : -- tdst  = 210.80.199.3:0
14/04/28 15:59:27 DB : policy ref increment ( ref count = 1, policy count = 7 )
14/04/28 15:59:27 DB : policy added
14/04/28 15:59:27 ii : installed divert rule for 192.168.90.0/255.255.255.0
14/04/28 15:59:27 DB : policy ref decrement ( ref count = 0, policy count = 8 )
14/04/28 15:59:27 K< : recv X_SPDADD UNSPEC pfkey message
14/04/28 15:59:27 ii : - id    = 0
14/04/28 15:59:27 ii : - type  = IPSEC
14/04/28 15:59:27 ii : - dir   = INBOUND
14/04/28 15:59:27 ii : - transform #0
14/04/28 15:59:27 ii : -- proto = 50
14/04/28 15:59:27 ii : -- level = REQUIRE
14/04/28 15:59:27 ii : -- mode  = TUNNEL
14/04/28 15:59:27 ii : -- reqid = 0
14/04/28 15:59:27 ii : -- tsrc  = 210.80.199.3:0
14/04/28 15:59:27 ii : -- tdst  = 192.168.1.102:0
14/04/28 15:59:27 DB : policy ref increment ( ref count = 1, policy count = 8 )
14/04/28 15:59:27 DB : policy added
14/04/28 15:59:27 DB : policy ref decrement ( ref count = 0, policy count = 9 )
14/04/28 15:59:27 K< : recv X_SPDADD UNSPEC pfkey message
14/04/28 15:59:27 ii : - id    = 0
14/04/28 15:59:27 ii : - type  = IPSEC
14/04/28 15:59:27 ii : - dir   = OUTBOUND
14/04/28 15:59:27 ii : - transform #0
14/04/28 15:59:27 ii : -- proto = 50
14/04/28 15:59:27 ii : -- level = REQUIRE
14/04/28 15:59:27 ii : -- mode  = TUNNEL
14/04/28 15:59:27 ii : -- reqid = 0
14/04/28 15:59:27 ii : -- tsrc  = 192.168.1.102:0
14/04/28 15:59:27 ii : -- tdst  = 210.80.199.3:0
14/04/28 15:59:27 DB : policy ref increment ( ref count = 1, policy count = 9 )
14/04/28 15:59:27 DB : policy added
14/04/28 15:59:27 ii : installed divert rule for 172.16.30.0/255.255.255.0
14/04/28 15:59:27 DB : policy ref decrement ( ref count = 0, policy count = 10 )
14/04/28 15:59:27 K< : recv X_SPDADD UNSPEC pfkey message
14/04/28 15:59:27 ii : - id    = 0
14/04/28 15:59:27 ii : - type  = IPSEC
14/04/28 15:59:27 ii : - dir   = INBOUND
14/04/28 15:59:27 ii : - transform #0
14/04/28 15:59:27 ii : -- proto = 50
14/04/28 15:59:27 ii : -- level = REQUIRE
14/04/28 15:59:27 ii : -- mode  = TUNNEL
14/04/28 15:59:27 ii : -- reqid = 0
14/04/28 15:59:27 ii : -- tsrc  = 210.80.199.3:0
14/04/28 15:59:27 ii : -- tdst  = 192.168.1.102:0
14/04/28 15:59:27 DB : policy ref increment ( ref count = 1, policy count = 10 )
14/04/28 15:59:27 DB : policy added
14/04/28 15:59:27 DB : policy ref decrement ( ref count = 0, policy count = 11 )
14/04/28 15:59:27 K< : recv X_SPDADD UNSPEC pfkey message
14/04/28 15:59:27 ii : - id    = 0
14/04/28 15:59:27 ii : - type  = IPSEC
14/04/28 15:59:27 ii : - dir   = OUTBOUND
14/04/28 15:59:27 ii : - transform #0
14/04/28 15:59:27 ii : -- proto = 50
14/04/28 15:59:27 ii : -- level = REQUIRE
14/04/28 15:59:27 ii : -- mode  = TUNNEL
14/04/28 15:59:27 ii : -- reqid = 0
14/04/28 15:59:27 ii : -- tsrc  = 192.168.1.102:0
14/04/28 15:59:27 ii : -- tdst  = 210.80.199.3:0
14/04/28 15:59:27 DB : policy ref increment ( ref count = 1, policy count = 11 )
14/04/28 15:59:27 DB : policy added
14/04/28 15:59:27 ii : installed divert rule for 192.168.3.0/255.255.255.0
14/04/28 15:59:27 DB : policy ref decrement ( ref count = 0, policy count = 12 )
14/04/28 15:59:27 K< : recv X_SPDADD UNSPEC pfkey message
14/04/28 15:59:27 ii : - id    = 0
14/04/28 15:59:27 ii : - type  = IPSEC
14/04/28 15:59:27 ii : - dir   = INBOUND
14/04/28 15:59:27 ii : - transform #0
14/04/28 15:59:27 ii : -- proto = 50
14/04/28 15:59:27 ii : -- level = REQUIRE
14/04/28 15:59:27 ii : -- mode  = TUNNEL
14/04/28 15:59:27 ii : -- reqid = 0
14/04/28 15:59:27 ii : -- tsrc  = 210.80.199.3:0
14/04/28 15:59:27 ii : -- tdst  = 192.168.1.102:0
14/04/28 15:59:27 DB : policy ref increment ( ref count = 1, policy count = 12 )
14/04/28 15:59:27 DB : policy added
14/04/28 15:59:27 DB : policy ref decrement ( ref count = 0, policy count = 13 )
14/04/28 15:59:27 K< : recv X_SPDADD UNSPEC pfkey message
14/04/28 15:59:27 ii : - id    = 0
14/04/28 15:59:27 ii : - type  = IPSEC
14/04/28 15:59:27 ii : - dir   = OUTBOUND
14/04/28 15:59:27 ii : - transform #0
14/04/28 15:59:27 ii : -- proto = 50
14/04/28 15:59:27 ii : -- level = REQUIRE
14/04/28 15:59:27 ii : -- mode  = TUNNEL
14/04/28 15:59:27 ii : -- reqid = 0
14/04/28 15:59:27 ii : -- tsrc  = 192.168.1.102:0
14/04/28 15:59:27 ii : -- tdst  = 210.80.199.3:0
14/04/28 15:59:27 DB : policy ref increment ( ref count = 1, policy count = 13 )
14/04/28 15:59:27 DB : policy added
14/04/28 15:59:27 ii : installed divert rule for 205.197.192.150/255.255.255.255
14/04/28 15:59:27 DB : policy ref decrement ( ref count = 0, policy count = 14 )
14/04/28 15:59:27 K< : recv X_SPDADD UNSPEC pfkey message
14/04/28 15:59:27 ii : - id    = 0
14/04/28 15:59:27 ii : - type  = IPSEC
14/04/28 15:59:27 ii : - dir   = INBOUND
14/04/28 15:59:27 ii : - transform #0
14/04/28 15:59:27 ii : -- proto = 50
14/04/28 15:59:27 ii : -- level = REQUIRE
14/04/28 15:59:27 ii : -- mode  = TUNNEL
14/04/28 15:59:27 ii : -- reqid = 0
14/04/28 15:59:27 ii : -- tsrc  = 210.80.199.3:0
14/04/28 15:59:27 ii : -- tdst  = 192.168.1.102:0
14/04/28 15:59:27 DB : policy ref increment ( ref count = 1, policy count = 14 )
14/04/28 15:59:27 DB : policy added
14/04/28 15:59:27 DB : policy ref decrement ( ref count = 0, policy count = 15 )
14/04/28 15:59:27 K< : recv X_SPDADD UNSPEC pfkey message
14/04/28 15:59:27 ii : - id    = 0
14/04/28 15:59:27 ii : - type  = IPSEC
14/04/28 15:59:27 ii : - dir   = OUTBOUND
14/04/28 15:59:27 ii : - transform #0
14/04/28 15:59:27 ii : -- proto = 50
14/04/28 15:59:27 ii : -- level = REQUIRE
14/04/28 15:59:27 ii : -- mode  = TUNNEL
14/04/28 15:59:27 ii : -- reqid = 0
14/04/28 15:59:27 ii : -- tsrc  = 192.168.1.102:0
14/04/28 15:59:27 ii : -- tdst  = 210.80.199.3:0
14/04/28 15:59:27 DB : policy ref increment ( ref count = 1, policy count = 15 )
14/04/28 15:59:27 DB : policy added
14/04/28 15:59:27 ii : installed divert rule for 205.197.192.151/255.255.255.255
14/04/28 15:59:27 DB : policy ref decrement ( ref count = 0, policy count = 16 )
14/04/28 15:59:27 ii : inspecting ARP request ...
14/04/28 15:59:27 DB : policy not found
14/04/28 15:59:27 ii : ignoring ARP request for 10.120.2.101, no policy found
14/04/28 15:59:27 K< : recv GET UNSPEC pfkey message
14/04/28 15:59:27 DB : sa not found
14/04/28 15:59:27 ii : failed to locate UNSPEC sa for get
14/04/28 15:59:27 ii : - spi  = 0xe1394c24
14/04/28 15:59:27 K< : recv GET UNSPEC pfkey message
14/04/28 15:59:27 DB : sa found
14/04/28 15:59:27 DB : sa ref increment ( ref count = 2, sa count = 1 )
14/04/28 15:59:27 DB : sa ref decrement ( ref count = 1, sa count = 1 )
14/04/28 15:59:28 ii : inspecting ARP request ...
14/04/28 15:59:28 DB : policy not found
14/04/28 15:59:28 ii : ignoring ARP request for 10.120.2.101, no policy found
14/04/28 15:59:28 K< : recv GET UNSPEC pfkey message
14/04/28 15:59:28 DB : sa found
14/04/28 15:59:28 DB : sa ref increment ( ref count = 2, sa count = 1 )
14/04/28 15:59:28 DB : sa ref decrement ( ref count = 1, sa count = 1 )
14/04/28 15:59:29 ii : inspecting ARP request ...
14/04/28 15:59:29 DB : policy not found
14/04/28 15:59:29 ii : ignoring ARP request for 10.120.2.101, no policy found
14/04/28 15:59:29 K< : recv GET UNSPEC pfkey message
14/04/28 15:59:29 DB : sa found
14/04/28 15:59:29 DB : sa ref increment ( ref count = 2, sa count = 1 )
14/04/28 15:59:29 DB : sa ref decrement ( ref count = 1, sa count = 1 )
14/04/28 15:59:30 ii : inspecting ARP request ...
14/04/28 15:59:30 ii : ignoring ARP request for 10.120.2.101,
duplicate address check
14/04/28 15:59:30 ii : inspecting ARP request ...
14/04/28 15:59:30 DB : policy found
14/04/28 15:59:30 DB : policy not found
14/04/28 15:59:30 ii : spoofing ARP response for 10.1.4.201
14/04/28 15:59:30 DB : policy found
14/04/28 15:59:30 DB : policy ref increment ( ref count = 1, policy count = 16 )
14/04/28 15:59:30 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 15:59:30 K> : sent ACQUIRE UNSPEC pfkey message
14/04/28 15:59:30 ii : - id   = 25
14/04/28 15:59:30 K> : sent ACQUIRE UNSPEC pfkey message
14/04/28 15:59:30 ii : - id   = 25
14/04/28 15:59:30 ii : queueing ip packet
14/04/28 15:59:30 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 15:59:30 K< : recv GETSPI ESP pfkey message
14/04/28 15:59:30 ii : allocated spi for ESP sa
14/04/28 15:59:30 ii : - spi  = 0x6b5a7c63
14/04/28 15:59:30 ii : - src  = 210.80.199.3:4500
14/04/28 15:59:30 ii : - dst  = 192.168.1.102:4500
14/04/28 15:59:30 DB : sa ref increment ( ref count = 1, sa count = 1 )
14/04/28 15:59:30 DB : sa added
14/04/28 15:59:30 DB : sa ref increment ( ref count = 2, sa count = 2 )
14/04/28 15:59:30 DB : sa ref decrement ( ref count = 1, sa count = 2 )
14/04/28 15:59:30 K> : sent GETSPI ESP pfkey message
14/04/28 15:59:30 K> : sent GETSPI ESP pfkey message
14/04/28 15:59:30 DB : policy found
14/04/28 15:59:30 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 15:59:30 ii : queueing ip packet
14/04/28 15:59:30 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 15:59:30 ii : inspecting ARP request ...
14/04/28 15:59:30 DB : policy not found
14/04/28 15:59:30 ii : ignoring ARP request for 192.168.1.1, no policy found
14/04/28 15:59:30 DB : policy found
14/04/28 15:59:30 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 15:59:30 ii : queueing ip packet
14/04/28 15:59:30 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 15:59:30 K< : recv GET UNSPEC pfkey message
14/04/28 15:59:30 DB : sa found
14/04/28 15:59:30 DB : sa ref increment ( ref count = 2, sa count = 2 )
14/04/28 15:59:30 DB : sa ref decrement ( ref count = 1, sa count = 2 )
14/04/28 15:59:30 K< : recv GET UNSPEC pfkey message
14/04/28 15:59:30 DB : sa found
14/04/28 15:59:30 DB : sa ref increment ( ref count = 2, sa count = 2 )
14/04/28 15:59:30 DB : sa ref decrement ( ref count = 1, sa count = 2 )
14/04/28 15:59:31 ii : inspecting ARP request ...
14/04/28 15:59:31 DB : policy found
14/04/28 15:59:31 DB : policy not found
14/04/28 15:59:31 ii : spoofing ARP response for 10.1.4.202
14/04/28 15:59:31 DB : policy found
14/04/28 15:59:31 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 15:59:31 ii : queueing ip packet
14/04/28 15:59:31 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 15:59:31 K< : recv GET UNSPEC pfkey message
14/04/28 15:59:31 DB : sa found
14/04/28 15:59:31 DB : sa ref increment ( ref count = 2, sa count = 2 )
14/04/28 15:59:31 DB : sa ref decrement ( ref count = 1, sa count = 2 )
14/04/28 15:59:31 K< : recv GET UNSPEC pfkey message
14/04/28 15:59:31 DB : sa found
14/04/28 15:59:31 DB : sa ref increment ( ref count = 2, sa count = 2 )
14/04/28 15:59:31 DB : sa ref decrement ( ref count = 1, sa count = 2 )
14/04/28 15:59:31 DB : policy found
14/04/28 15:59:31 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 15:59:31 ii : queueing ip packet
14/04/28 15:59:31 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 15:59:32 DB : policy found
14/04/28 15:59:32 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 15:59:32 ii : queueing ip packet
14/04/28 15:59:32 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 15:59:32 DB : policy found
14/04/28 15:59:32 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 15:59:32 ii : queueing ip packet
14/04/28 15:59:32 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 15:59:32 K< : recv GET UNSPEC pfkey message
14/04/28 15:59:32 DB : sa found
14/04/28 15:59:32 DB : sa ref increment ( ref count = 2, sa count = 2 )
14/04/28 15:59:32 DB : sa ref decrement ( ref count = 1, sa count = 2 )
14/04/28 15:59:32 K< : recv GET UNSPEC pfkey message
14/04/28 15:59:32 DB : sa found
14/04/28 15:59:32 DB : sa ref increment ( ref count = 2, sa count = 2 )
14/04/28 15:59:32 DB : sa ref decrement ( ref count = 1, sa count = 2 )
14/04/28 15:59:32 DB : policy found
14/04/28 15:59:32 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 15:59:32 ii : queueing ip packet
14/04/28 15:59:32 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 15:59:33 DB : policy found
14/04/28 15:59:33 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 15:59:33 ii : queueing ip packet
14/04/28 15:59:33 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 15:59:33 K< : recv GET UNSPEC pfkey message
14/04/28 15:59:33 DB : policy found
14/04/28 15:59:33 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 15:59:33 DB : sa found
14/04/28 15:59:33 DB : sa ref increment ( ref count = 2, sa count = 2 )
14/04/28 15:59:33 ii : queueing ip packet
14/04/28 15:59:33 DB : sa ref decrement ( ref count = 1, sa count = 2 )
14/04/28 15:59:33 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 15:59:33 DB : policy found
14/04/28 15:59:33 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 15:59:33 ii : queueing ip packet
14/04/28 15:59:33 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 15:59:33 K< : recv GET UNSPEC pfkey message
14/04/28 15:59:33 DB : sa found
14/04/28 15:59:33 DB : sa ref increment ( ref count = 2, sa count = 2 )
14/04/28 15:59:33 DB : sa ref decrement ( ref count = 1, sa count = 2 )
14/04/28 15:59:34 DB : policy found
14/04/28 15:59:34 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 15:59:34 ii : queueing ip packet
14/04/28 15:59:34 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 15:59:34 DB : policy found
14/04/28 15:59:34 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 15:59:34 ii : queueing ip packet
14/04/28 15:59:34 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 15:59:34 DB : policy found
14/04/28 15:59:34 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 15:59:34 ii : queueing ip packet
14/04/28 15:59:34 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 15:59:34 DB : policy found
14/04/28 15:59:34 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 15:59:34 ii : queueing ip packet
14/04/28 15:59:34 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 15:59:34 K< : recv GET UNSPEC pfkey message
14/04/28 15:59:34 DB : sa found
14/04/28 15:59:34 DB : sa ref increment ( ref count = 2, sa count = 2 )
14/04/28 15:59:34 DB : sa ref decrement ( ref count = 1, sa count = 2 )
14/04/28 15:59:34 K< : recv GET UNSPEC pfkey message
14/04/28 15:59:34 DB : sa found
14/04/28 15:59:34 DB : sa ref increment ( ref count = 2, sa count = 2 )
14/04/28 15:59:34 DB : sa ref decrement ( ref count = 1, sa count = 2 )
14/04/28 15:59:35 DB : policy found
14/04/28 15:59:35 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 15:59:35 ii : queueing ip packet
14/04/28 15:59:35 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 15:59:35 DB : policy found
14/04/28 15:59:35 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 15:59:35 ii : queueing ip packet
14/04/28 15:59:35 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 15:59:35 DB : policy found
14/04/28 15:59:35 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 15:59:35 ii : queueing ip packet
14/04/28 15:59:35 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 15:59:35 K< : recv GET UNSPEC pfkey message
14/04/28 15:59:35 DB : sa found
14/04/28 15:59:35 DB : sa ref increment ( ref count = 2, sa count = 2 )
14/04/28 15:59:35 DB : sa ref decrement ( ref count = 1, sa count = 2 )
14/04/28 15:59:35 K< : recv GET UNSPEC pfkey message
14/04/28 15:59:35 DB : sa found
14/04/28 15:59:35 DB : sa ref increment ( ref count = 2, sa count = 2 )
14/04/28 15:59:35 DB : sa ref decrement ( ref count = 1, sa count = 2 )
14/04/28 15:59:36 DB : policy found
14/04/28 15:59:36 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 15:59:36 ii : queueing ip packet
14/04/28 15:59:36 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 15:59:36 K< : recv GET UNSPEC pfkey message
14/04/28 15:59:36 DB : sa found
14/04/28 15:59:36 DB : sa ref increment ( ref count = 2, sa count = 2 )
14/04/28 15:59:36 DB : sa ref decrement ( ref count = 1, sa count = 2 )
14/04/28 15:59:36 K< : recv GET UNSPEC pfkey message
14/04/28 15:59:36 DB : sa found
14/04/28 15:59:36 DB : sa ref increment ( ref count = 2, sa count = 2 )
14/04/28 15:59:36 DB : sa ref decrement ( ref count = 1, sa count = 2 )
14/04/28 15:59:37 ii : inspecting ARP request ...
14/04/28 15:59:37 DB : policy not found
14/04/28 15:59:37 ii : ignoring ARP request for 192.168.1.1, no policy found
14/04/28 15:59:37 DB : policy found
14/04/28 15:59:37 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 15:59:37 ii : queueing ip packet
14/04/28 15:59:37 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 15:59:37 K< : recv GET UNSPEC pfkey message
14/04/28 15:59:37 DB : sa found
14/04/28 15:59:37 DB : sa ref increment ( ref count = 2, sa count = 2 )
14/04/28 15:59:37 DB : sa ref decrement ( ref count = 1, sa count = 2 )
14/04/28 15:59:37 K< : recv GET UNSPEC pfkey message
14/04/28 15:59:37 DB : sa found
14/04/28 15:59:37 DB : sa ref increment ( ref count = 2, sa count = 2 )
14/04/28 15:59:37 DB : sa ref decrement ( ref count = 1, sa count = 2 )
14/04/28 15:59:38 DB : policy found
14/04/28 15:59:38 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 15:59:38 ii : queueing ip packet
14/04/28 15:59:38 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 15:59:38 DB : policy found
14/04/28 15:59:38 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 15:59:38 ii : queueing ip packet
14/04/28 15:59:38 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 15:59:38 DB : policy found
14/04/28 15:59:38 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 15:59:38 ii : queueing ip packet
14/04/28 15:59:38 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 15:59:38 DB : policy found
14/04/28 15:59:38 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 15:59:38 ii : queueing ip packet
14/04/28 15:59:38 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 15:59:38 DB : policy found
14/04/28 15:59:38 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 15:59:38 ii : queueing ip packet
14/04/28 15:59:38 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 15:59:38 K< : recv GET UNSPEC pfkey message
14/04/28 15:59:38 DB : sa found
14/04/28 15:59:38 DB : sa ref increment ( ref count = 2, sa count = 2 )
14/04/28 15:59:38 DB : sa ref decrement ( ref count = 1, sa count = 2 )
14/04/28 15:59:38 K< : recv GET UNSPEC pfkey message
14/04/28 15:59:38 DB : sa found
14/04/28 15:59:38 DB : sa ref increment ( ref count = 2, sa count = 2 )
14/04/28 15:59:38 DB : sa ref decrement ( ref count = 1, sa count = 2 )
14/04/28 15:59:39 DB : policy found
14/04/28 15:59:39 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 15:59:39 ii : queueing ip packet
14/04/28 15:59:39 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 15:59:39 DB : policy found
14/04/28 15:59:39 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 15:59:39 ii : queueing ip packet
14/04/28 15:59:39 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 15:59:39 K< : recv GET UNSPEC pfkey message
14/04/28 15:59:39 DB : sa found
14/04/28 15:59:39 DB : sa ref increment ( ref count = 2, sa count = 2 )
14/04/28 15:59:39 DB : sa ref decrement ( ref count = 1, sa count = 2 )
14/04/28 15:59:39 K< : recv GET UNSPEC pfkey message
14/04/28 15:59:39 DB : sa found
14/04/28 15:59:39 DB : sa ref increment ( ref count = 2, sa count = 2 )
14/04/28 15:59:39 DB : sa ref decrement ( ref count = 1, sa count = 2 )
14/04/28 15:59:40 DB : policy found
14/04/28 15:59:40 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 15:59:40 ii : queueing ip packet
14/04/28 15:59:40 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 15:59:40 K< : recv GET UNSPEC pfkey message
14/04/28 15:59:40 DB : sa found
14/04/28 15:59:40 DB : sa ref increment ( ref count = 2, sa count = 2 )
14/04/28 15:59:40 DB : sa ref decrement ( ref count = 1, sa count = 2 )
14/04/28 15:59:40 K< : recv GET UNSPEC pfkey message
14/04/28 15:59:40 DB : sa found
14/04/28 15:59:40 DB : sa ref increment ( ref count = 2, sa count = 2 )
14/04/28 15:59:40 DB : sa ref decrement ( ref count = 1, sa count = 2 )
14/04/28 15:59:41 K< : recv GET UNSPEC pfkey message
14/04/28 15:59:41 DB : sa found
14/04/28 15:59:41 DB : sa ref increment ( ref count = 2, sa count = 2 )
14/04/28 15:59:41 DB : sa ref decrement ( ref count = 1, sa count = 2 )
14/04/28 15:59:41 K< : recv GET UNSPEC pfkey message
14/04/28 15:59:41 DB : sa found
14/04/28 15:59:41 DB : sa ref increment ( ref count = 2, sa count = 2 )
14/04/28 15:59:41 DB : sa ref decrement ( ref count = 1, sa count = 2 )
14/04/28 15:59:42 ii : sa never reached maturity
14/04/28 15:59:42 ii : removed sa divert rule for 210.80.199.3->192.168.1.102
14/04/28 15:59:42 DB : sa deleted ( sa count = 1 )
14/04/28 15:59:42 DB : policy found
14/04/28 15:59:42 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 15:59:42 ii : queueing ip packet
14/04/28 15:59:42 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 15:59:42 DB : policy found
14/04/28 15:59:42 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 15:59:42 ii : queueing ip packet
14/04/28 15:59:42 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 15:59:42 K< : recv GET UNSPEC pfkey message
14/04/28 15:59:42 DB : sa not found
14/04/28 15:59:42 ii : failed to locate UNSPEC sa for get
14/04/28 15:59:42 ii : - spi  = 0x77339000
14/04/28 15:59:42 K< : recv GET UNSPEC pfkey message
14/04/28 15:59:42 DB : sa found
14/04/28 15:59:42 DB : sa ref increment ( ref count = 2, sa count = 1 )
14/04/28 15:59:42 DB : sa ref decrement ( ref count = 1, sa count = 1 )
14/04/28 15:59:43 K< : recv GET UNSPEC pfkey message
14/04/28 15:59:43 DB : sa found
14/04/28 15:59:43 DB : sa ref increment ( ref count = 2, sa count = 1 )
14/04/28 15:59:43 DB : sa ref decrement ( ref count = 1, sa count = 1 )
14/04/28 15:59:44 DB : policy found
14/04/28 15:59:44 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 15:59:44 ii : queueing ip packet
14/04/28 15:59:44 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 15:59:44 DB : policy found
14/04/28 15:59:44 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 15:59:44 ii : queueing ip packet
14/04/28 15:59:44 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 15:59:44 DB : policy found
14/04/28 15:59:44 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 15:59:44 ii : queueing ip packet
14/04/28 15:59:44 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 15:59:44 K< : recv GET UNSPEC pfkey message
14/04/28 15:59:44 DB : sa found
14/04/28 15:59:44 DB : sa ref increment ( ref count = 2, sa count = 1 )
14/04/28 15:59:44 DB : sa ref decrement ( ref count = 1, sa count = 1 )
14/04/28 15:59:45 ii : inspecting ARP request ...
14/04/28 15:59:45 DB : policy found
14/04/28 15:59:45 DB : policy not found
14/04/28 15:59:45 ii : spoofing ARP response for 10.164.8.218
14/04/28 15:59:45 DB : policy found
14/04/28 15:59:45 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 15:59:45 ii : queueing ip packet
14/04/28 15:59:45 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 15:59:45 DB : policy found
14/04/28 15:59:45 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 15:59:45 ii : queueing ip packet
14/04/28 15:59:45 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 15:59:45 ii : inspecting ARP request ...
14/04/28 15:59:45 !! : ARP packet has invalid header
14/04/28 15:59:45 ii : sa never reached maturity
14/04/28 15:59:45 ii : removed sa divert rule for 210.80.199.3->192.168.1.102
14/04/28 15:59:45 DB : sa deleted ( sa count = 0 )
14/04/28 15:59:45 DB : policy found
14/04/28 15:59:45 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 15:59:45 ii : queueing ip packet
14/04/28 15:59:45 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 15:59:45 DB : policy found
14/04/28 15:59:45 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 15:59:45 ii : queueing ip packet
14/04/28 15:59:45 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 15:59:45 ii : inspecting ARP request ...
14/04/28 15:59:45 DB : policy not found
14/04/28 15:59:45 ii : ignoring ARP request for 192.168.1.1, no policy found
14/04/28 15:59:45 DB : policy found
14/04/28 15:59:45 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 15:59:45 ii : queueing ip packet
14/04/28 15:59:45 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 15:59:45 K< : recv GET UNSPEC pfkey message
14/04/28 15:59:45 DB : sa not found
14/04/28 15:59:45 ii : failed to locate UNSPEC sa for get
14/04/28 15:59:45 ii : - spi  = 0x6b5a7c63
14/04/28 15:59:46 DB : policy found
14/04/28 15:59:46 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 15:59:46 ii : queueing ip packet
14/04/28 15:59:46 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 15:59:46 ii : aquire timelimit expired
14/04/28 15:59:46 DB : policy ref decrement ( ref count = 0, policy count = 16 )
14/04/28 15:59:47 DB : policy found
14/04/28 15:59:47 DB : policy ref increment ( ref count = 1, policy count = 16 )
14/04/28 15:59:47 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 15:59:47 K> : sent ACQUIRE UNSPEC pfkey message
14/04/28 15:59:47 ii : - id   = 25
14/04/28 15:59:47 K> : sent ACQUIRE UNSPEC pfkey message
14/04/28 15:59:47 ii : - id   = 25
14/04/28 15:59:47 ii : queueing ip packet
14/04/28 15:59:47 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 15:59:47 K< : recv GETSPI ESP pfkey message
14/04/28 15:59:47 ii : allocated spi for ESP sa
14/04/28 15:59:47 ii : - spi  = 0x999ba6d2
14/04/28 15:59:47 ii : - src  = 210.80.199.3:4500
14/04/28 15:59:47 ii : - dst  = 192.168.1.102:4500
14/04/28 15:59:47 DB : sa ref increment ( ref count = 1, sa count = 0 )
14/04/28 15:59:47 DB : sa added
14/04/28 15:59:47 DB : sa ref increment ( ref count = 2, sa count = 1 )
14/04/28 15:59:47 DB : sa ref decrement ( ref count = 1, sa count = 1 )
14/04/28 15:59:47 K> : sent GETSPI ESP pfkey message
14/04/28 15:59:47 K> : sent GETSPI ESP pfkey message
14/04/28 15:59:47 DB : policy found
14/04/28 15:59:47 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 15:59:47 ii : queueing ip packet
14/04/28 15:59:47 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 15:59:48 K< : recv GET UNSPEC pfkey message
14/04/28 15:59:48 DB : sa found
14/04/28 15:59:48 DB : sa ref increment ( ref count = 2, sa count = 1 )
14/04/28 15:59:48 DB : sa ref decrement ( ref count = 1, sa count = 1 )
14/04/28 15:59:48 DB : policy found
14/04/28 15:59:48 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 15:59:48 ii : queueing ip packet
14/04/28 15:59:48 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 15:59:49 K< : recv GET UNSPEC pfkey message
14/04/28 15:59:49 DB : sa found
14/04/28 15:59:49 DB : sa ref increment ( ref count = 2, sa count = 1 )
14/04/28 15:59:49 DB : sa ref decrement ( ref count = 1, sa count = 1 )
14/04/28 15:59:49 DB : policy found
14/04/28 15:59:49 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 15:59:49 ii : queueing ip packet
14/04/28 15:59:49 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 15:59:49 DB : policy found
14/04/28 15:59:49 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 15:59:49 ii : queueing ip packet
14/04/28 15:59:49 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 15:59:50 K< : recv GET UNSPEC pfkey message
14/04/28 15:59:50 DB : sa found
14/04/28 15:59:50 DB : sa ref increment ( ref count = 2, sa count = 1 )
14/04/28 15:59:50 DB : sa ref decrement ( ref count = 1, sa count = 1 )
14/04/28 15:59:51 K< : recv GET UNSPEC pfkey message
14/04/28 15:59:51 DB : sa found
14/04/28 15:59:51 DB : sa ref increment ( ref count = 2, sa count = 1 )
14/04/28 15:59:51 DB : sa ref decrement ( ref count = 1, sa count = 1 )
14/04/28 15:59:51 DB : policy found
14/04/28 15:59:51 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 15:59:51 ii : queueing ip packet
14/04/28 15:59:51 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 15:59:52 K< : recv GET UNSPEC pfkey message
14/04/28 15:59:52 DB : sa found
14/04/28 15:59:52 DB : sa ref increment ( ref count = 2, sa count = 1 )
14/04/28 15:59:52 DB : sa ref decrement ( ref count = 1, sa count = 1 )
14/04/28 15:59:52 ii : inspecting ARP request ...
14/04/28 15:59:52 DB : policy not found
14/04/28 15:59:52 ii : ignoring ARP request for 192.168.1.1, no policy found
14/04/28 15:59:53 K< : recv GET UNSPEC pfkey message
14/04/28 15:59:53 DB : sa found
14/04/28 15:59:53 DB : sa ref increment ( ref count = 2, sa count = 1 )
14/04/28 15:59:53 DB : sa ref decrement ( ref count = 1, sa count = 1 )
14/04/28 15:59:53 DB : policy found
14/04/28 15:59:53 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 15:59:53 ii : queueing ip packet
14/04/28 15:59:53 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 15:59:53 DB : policy found
14/04/28 15:59:53 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 15:59:53 ii : queueing ip packet
14/04/28 15:59:53 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 15:59:53 DB : policy found
14/04/28 15:59:53 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 15:59:53 ii : queueing ip packet
14/04/28 15:59:53 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 15:59:54 DB : policy found
14/04/28 15:59:54 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 15:59:54 ii : queueing ip packet
14/04/28 15:59:54 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 15:59:54 K< : recv GET UNSPEC pfkey message
14/04/28 15:59:54 DB : sa found
14/04/28 15:59:54 DB : sa ref increment ( ref count = 2, sa count = 1 )
14/04/28 15:59:54 DB : sa ref decrement ( ref count = 1, sa count = 1 )
14/04/28 15:59:54 DB : policy found
14/04/28 15:59:54 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 15:59:54 ii : queueing ip packet
14/04/28 15:59:54 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 15:59:55 K< : recv GET UNSPEC pfkey message
14/04/28 15:59:55 DB : sa found
14/04/28 15:59:55 DB : sa ref increment ( ref count = 2, sa count = 1 )
14/04/28 15:59:55 DB : sa ref decrement ( ref count = 1, sa count = 1 )
14/04/28 15:59:56 K< : recv GET UNSPEC pfkey message
14/04/28 15:59:56 DB : sa found
14/04/28 15:59:56 DB : sa ref increment ( ref count = 2, sa count = 1 )
14/04/28 15:59:56 DB : sa ref decrement ( ref count = 1, sa count = 1 )
14/04/28 15:59:57 K< : recv GET UNSPEC pfkey message
14/04/28 15:59:57 DB : sa found
14/04/28 15:59:57 DB : sa ref increment ( ref count = 2, sa count = 1 )
14/04/28 15:59:57 DB : sa ref decrement ( ref count = 1, sa count = 1 )
14/04/28 15:59:58 K< : recv GET UNSPEC pfkey message
14/04/28 15:59:58 DB : sa found
14/04/28 15:59:58 DB : sa ref increment ( ref count = 2, sa count = 1 )
14/04/28 15:59:58 DB : sa ref decrement ( ref count = 1, sa count = 1 )
14/04/28 15:59:58 K< : recv X_SPDDELETE2 UNSPEC pfkey message
14/04/28 15:59:58 ii : - id   = 24
14/04/28 15:59:58 ii : - type = IPSEC
14/04/28 15:59:58 ii : - dir  = INBOUND
14/04/28 15:59:58 DB : policy found
14/04/28 15:59:58 DB : policy ref increment ( ref count = 1, policy count = 16 )
14/04/28 15:59:58 DB : policy deleted ( policy count = 15 )
14/04/28 15:59:58 K< : recv X_SPDDELETE2 UNSPEC pfkey message
14/04/28 15:59:58 ii : - id   = 25
14/04/28 15:59:58 ii : - type = IPSEC
14/04/28 15:59:58 ii : - dir  = OUTBOUND
14/04/28 15:59:58 DB : policy found
14/04/28 15:59:58 DB : policy ref increment ( ref count = 2, policy count = 15 )
14/04/28 15:59:58 ii : removed divert rule for 10.0.0.0/255.0.0.0
14/04/28 15:59:58 DB : policy deleted ( policy count = 14 )
14/04/28 15:59:58 K< : recv X_SPDDELETE2 UNSPEC pfkey message
14/04/28 15:59:58 ii : - id   = 26
14/04/28 15:59:58 ii : - type = IPSEC
14/04/28 15:59:58 ii : - dir  = INBOUND
14/04/28 15:59:58 DB : policy found
14/04/28 15:59:58 DB : policy ref increment ( ref count = 1, policy count = 14 )
14/04/28 15:59:58 DB : policy deleted ( policy count = 13 )
14/04/28 15:59:58 K< : recv X_SPDDELETE2 UNSPEC pfkey message
14/04/28 15:59:58 ii : - id   = 28
14/04/28 15:59:58 ii : - type = IPSEC
14/04/28 15:59:58 ii : - dir  = OUTBOUND
14/04/28 15:59:58 DB : policy found
14/04/28 15:59:58 DB : policy ref increment ( ref count = 1, policy count = 13 )
14/04/28 15:59:58 ii : removed divert rule for 192.168.90.0/255.255.255.0
14/04/28 15:59:58 DB : policy deleted ( policy count = 12 )
14/04/28 15:59:58 K< : recv X_SPDDELETE2 UNSPEC pfkey message
14/04/28 15:59:58 ii : - id   = 29
14/04/28 15:59:58 ii : - type = IPSEC
14/04/28 15:59:58 ii : - dir  = INBOUND
14/04/28 15:59:58 DB : policy found
14/04/28 15:59:58 DB : policy ref increment ( ref count = 1, policy count = 12 )
14/04/28 15:59:58 DB : policy deleted ( policy count = 11 )
14/04/28 15:59:58 K< : recv X_SPDDELETE2 UNSPEC pfkey message
14/04/28 15:59:58 ii : - id   = 30
14/04/28 15:59:58 ii : - type = IPSEC
14/04/28 15:59:58 ii : - dir  = OUTBOUND
14/04/28 15:59:58 DB : policy found
14/04/28 15:59:58 DB : policy ref increment ( ref count = 1, policy count = 11 )
14/04/28 15:59:58 ii : removed divert rule for 172.16.30.0/255.255.255.0
14/04/28 15:59:58 DB : policy deleted ( policy count = 10 )
14/04/28 15:59:58 K< : recv X_SPDDELETE2 UNSPEC pfkey message
14/04/28 15:59:58 ii : - id   = 31
14/04/28 15:59:58 ii : - type = IPSEC
14/04/28 15:59:58 ii : - dir  = INBOUND
14/04/28 15:59:58 DB : policy found
14/04/28 15:59:58 DB : policy ref increment ( ref count = 1, policy count = 10 )
14/04/28 15:59:58 DB : policy deleted ( policy count = 9 )
14/04/28 15:59:58 K< : recv X_SPDDELETE2 UNSPEC pfkey message
14/04/28 15:59:58 ii : - id   = 32
14/04/28 15:59:58 ii : - type = IPSEC
14/04/28 15:59:58 ii : - dir  = OUTBOUND
14/04/28 15:59:58 DB : policy found
14/04/28 15:59:58 DB : policy ref increment ( ref count = 1, policy count = 9 )
14/04/28 15:59:58 ii : removed divert rule for 192.168.3.0/255.255.255.0
14/04/28 15:59:58 DB : policy deleted ( policy count = 8 )
14/04/28 15:59:58 K< : recv X_SPDDELETE2 UNSPEC pfkey message
14/04/28 15:59:58 ii : - id   = 33
14/04/28 15:59:58 ii : - type = IPSEC
14/04/28 15:59:58 ii : - dir  = INBOUND
14/04/28 15:59:58 DB : policy found
14/04/28 15:59:58 DB : policy ref increment ( ref count = 1, policy count = 8 )
14/04/28 15:59:58 DB : policy deleted ( policy count = 7 )
14/04/28 15:59:58 K< : recv X_SPDDELETE2 UNSPEC pfkey message
14/04/28 15:59:58 ii : - id   = 34
14/04/28 15:59:58 ii : - type = IPSEC
14/04/28 15:59:58 ii : - dir  = OUTBOUND
14/04/28 15:59:58 DB : policy found
14/04/28 15:59:58 DB : policy ref increment ( ref count = 1, policy count = 7 )
14/04/28 15:59:58 ii : removed divert rule for 205.197.192.150/255.255.255.255
14/04/28 15:59:58 DB : policy deleted ( policy count = 6 )
14/04/28 15:59:58 K< : recv X_SPDDELETE2 UNSPEC pfkey message
14/04/28 15:59:58 ii : - id   = 35
14/04/28 15:59:58 ii : - type = IPSEC
14/04/28 15:59:58 ii : - dir  = INBOUND
14/04/28 15:59:58 DB : policy found
14/04/28 15:59:58 DB : policy ref increment ( ref count = 1, policy count = 6 )
14/04/28 15:59:58 DB : policy deleted ( policy count = 5 )
14/04/28 15:59:58 K< : recv X_SPDDELETE2 UNSPEC pfkey message
14/04/28 15:59:58 ii : - id   = 36
14/04/28 15:59:58 ii : - type = IPSEC
14/04/28 15:59:58 ii : - dir  = OUTBOUND
14/04/28 15:59:58 DB : policy found
14/04/28 15:59:58 DB : policy ref increment ( ref count = 1, policy count = 5 )
14/04/28 15:59:58 ii : removed divert rule for 205.197.192.151/255.255.255.255
14/04/28 15:59:58 DB : policy deleted ( policy count = 4 )
14/04/28 15:59:58 K< : recv X_SPDDELETE2 UNSPEC pfkey message
14/04/28 15:59:58 ii : - id   = 22
14/04/28 15:59:58 ii : - type = NONE
14/04/28 15:59:58 ii : - dir  = INBOUND
14/04/28 15:59:58 DB : policy found
14/04/28 15:59:58 DB : policy ref increment ( ref count = 1, policy count = 4 )
14/04/28 15:59:58 DB : policy deleted ( policy count = 3 )
14/04/28 15:59:58 K< : recv X_SPDDELETE2 UNSPEC pfkey message
14/04/28 15:59:58 ii : - id   = 23
14/04/28 15:59:58 ii : - type = NONE
14/04/28 15:59:58 ii : - dir  = OUTBOUND
14/04/28 15:59:58 DB : policy found
14/04/28 15:59:58 DB : policy ref increment ( ref count = 1, policy count = 3 )
14/04/28 15:59:58 ii : removed accept rule for 192.168.1.1/255.255.255.255
14/04/28 15:59:58 DB : policy deleted ( policy count = 2 )
14/04/28 15:59:58 K< : recv X_SPDDELETE2 UNSPEC pfkey message
14/04/28 15:59:58 ii : - id   = 20
14/04/28 15:59:58 ii : - type = NONE
14/04/28 15:59:58 ii : - dir  = INBOUND
14/04/28 15:59:58 DB : policy found
14/04/28 15:59:58 DB : policy ref increment ( ref count = 1, policy count = 2 )
14/04/28 15:59:58 DB : policy deleted ( policy count = 1 )
14/04/28 15:59:58 K< : recv X_SPDDELETE2 UNSPEC pfkey message
14/04/28 15:59:58 ii : - id   = 21
14/04/28 15:59:58 ii : - type = NONE
14/04/28 15:59:58 ii : - dir  = OUTBOUND
14/04/28 15:59:58 DB : policy found
14/04/28 15:59:58 DB : policy ref increment ( ref count = 1, policy count = 1 )
14/04/28 15:59:58 ii : removed accept rule for 210.80.199.3/255.255.255.255
14/04/28 15:59:58 DB : policy deleted ( policy count = 0 )
14/04/28 15:59:58 ii : removed mirror rule ( policycount 0 )
14/04/28 15:59:59 K< : recv GET UNSPEC pfkey message
14/04/28 15:59:59 DB : sa found
14/04/28 15:59:59 DB : sa ref increment ( ref count = 2, sa count = 1 )
14/04/28 15:59:59 DB : sa ref decrement ( ref count = 1, sa count = 1 )
14/04/28 16:00:00 K< : recv GET UNSPEC pfkey message
14/04/28 16:00:00 DB : sa found
14/04/28 16:00:00 DB : sa ref increment ( ref count = 2, sa count = 1 )
14/04/28 16:00:00 DB : sa ref decrement ( ref count = 1, sa count = 1 )
14/04/28 16:00:01 K< : recv GET UNSPEC pfkey message
14/04/28 16:00:01 DB : sa found
14/04/28 16:00:01 DB : sa ref increment ( ref count = 2, sa count = 1 )
14/04/28 16:00:01 DB : sa ref decrement ( ref count = 1, sa count = 1 )
14/04/28 16:00:02 K< : recv X_SPDADD UNSPEC pfkey message
14/04/28 16:00:02 ii : - id    = 0
14/04/28 16:00:02 ii : - type  = NONE
14/04/28 16:00:02 ii : - dir   = INBOUND
14/04/28 16:00:02 DB : policy ref increment ( ref count = 1, policy count = 0 )
14/04/28 16:00:02 DB : policy added
14/04/28 16:00:02 DB : policy ref decrement ( ref count = 0, policy count = 1 )
14/04/28 16:00:02 ii : removed arp mirror rule ( policycount 1 )
14/04/28 16:00:02 K< : recv X_SPDADD UNSPEC pfkey message
14/04/28 16:00:02 ii : - id    = 0
14/04/28 16:00:02 ii : - type  = NONE
14/04/28 16:00:02 ii : - dir   = OUTBOUND
14/04/28 16:00:02 DB : policy ref increment ( ref count = 1, policy count = 1 )
14/04/28 16:00:02 DB : policy added
14/04/28 16:00:02 ii : installed accept rule for 210.80.199.3/255.255.255.255
14/04/28 16:00:02 DB : policy ref decrement ( ref count = 0, policy count = 2 )
14/04/28 16:00:02 K< : recv X_SPDADD UNSPEC pfkey message
14/04/28 16:00:02 ii : - id    = 0
14/04/28 16:00:02 ii : - type  = NONE
14/04/28 16:00:02 ii : - dir   = INBOUND
14/04/28 16:00:02 DB : policy ref increment ( ref count = 1, policy count = 2 )
14/04/28 16:00:02 DB : policy added
14/04/28 16:00:02 DB : policy ref decrement ( ref count = 0, policy count = 3 )
14/04/28 16:00:02 K< : recv X_SPDADD UNSPEC pfkey message
14/04/28 16:00:02 ii : - id    = 0
14/04/28 16:00:02 ii : - type  = NONE
14/04/28 16:00:02 ii : - dir   = OUTBOUND
14/04/28 16:00:02 DB : policy ref increment ( ref count = 1, policy count = 3 )
14/04/28 16:00:02 DB : policy added
14/04/28 16:00:02 ii : installed accept rule for 192.168.1.1/255.255.255.255
14/04/28 16:00:02 DB : policy ref decrement ( ref count = 0, policy count = 4 )
14/04/28 16:00:02 K< : recv X_SPDADD UNSPEC pfkey message
14/04/28 16:00:02 ii : - id    = 0
14/04/28 16:00:02 ii : - type  = IPSEC
14/04/28 16:00:02 ii : - dir   = INBOUND
14/04/28 16:00:02 ii : - transform #0
14/04/28 16:00:02 ii : -- proto = 50
14/04/28 16:00:02 ii : -- level = REQUIRE
14/04/28 16:00:02 ii : -- mode  = TUNNEL
14/04/28 16:00:02 ii : -- reqid = 0
14/04/28 16:00:02 ii : -- tsrc  = 210.80.199.3:0
14/04/28 16:00:02 ii : -- tdst  = 192.168.1.102:0
14/04/28 16:00:02 DB : policy ref increment ( ref count = 1, policy count = 4 )
14/04/28 16:00:02 DB : policy added
14/04/28 16:00:02 DB : policy ref decrement ( ref count = 0, policy count = 5 )
14/04/28 16:00:02 K< : recv X_SPDADD UNSPEC pfkey message
14/04/28 16:00:02 ii : - id    = 0
14/04/28 16:00:02 ii : - type  = IPSEC
14/04/28 16:00:02 ii : - dir   = OUTBOUND
14/04/28 16:00:02 ii : - transform #0
14/04/28 16:00:02 ii : -- proto = 50
14/04/28 16:00:02 ii : -- level = REQUIRE
14/04/28 16:00:02 ii : -- mode  = TUNNEL
14/04/28 16:00:02 ii : -- reqid = 0
14/04/28 16:00:02 ii : -- tsrc  = 192.168.1.102:0
14/04/28 16:00:02 ii : -- tdst  = 210.80.199.3:0
14/04/28 16:00:02 DB : policy ref increment ( ref count = 1, policy count = 5 )
14/04/28 16:00:02 DB : policy added
14/04/28 16:00:02 ii : installed divert rule for 10.0.0.0/255.0.0.0
14/04/28 16:00:02 DB : policy ref decrement ( ref count = 0, policy count = 6 )
14/04/28 16:00:02 K< : recv X_SPDADD UNSPEC pfkey message
14/04/28 16:00:02 ii : - id    = 0
14/04/28 16:00:02 ii : - type  = IPSEC
14/04/28 16:00:02 ii : - dir   = INBOUND
14/04/28 16:00:02 ii : - transform #0
14/04/28 16:00:02 ii : -- proto = 50
14/04/28 16:00:02 ii : -- level = REQUIRE
14/04/28 16:00:02 ii : -- mode  = TUNNEL
14/04/28 16:00:02 ii : -- reqid = 0
14/04/28 16:00:02 ii : -- tsrc  = 210.80.199.3:0
14/04/28 16:00:02 ii : -- tdst  = 192.168.1.102:0
14/04/28 16:00:02 DB : policy ref increment ( ref count = 1, policy count = 6 )
14/04/28 16:00:02 DB : policy added
14/04/28 16:00:02 DB : policy ref decrement ( ref count = 0, policy count = 7 )
14/04/28 16:00:02 K< : recv GETSPI ESP pfkey message
14/04/28 16:00:02 ii : allocated spi for ESP sa
14/04/28 16:00:02 ii : - spi  = 0xb62d1786
14/04/28 16:00:02 ii : - src  = 210.80.199.3:4500
14/04/28 16:00:02 ii : - dst  = 192.168.1.102:4500
14/04/28 16:00:02 DB : sa ref increment ( ref count = 1, sa count = 1 )
14/04/28 16:00:02 DB : sa added
14/04/28 16:00:02 DB : sa ref increment ( ref count = 2, sa count = 2 )
14/04/28 16:00:02 DB : sa ref decrement ( ref count = 1, sa count = 2 )
14/04/28 16:00:02 K> : sent GETSPI ESP pfkey message
14/04/28 16:00:02 K> : sent GETSPI ESP pfkey message
14/04/28 16:00:02 K< : recv X_SPDADD UNSPEC pfkey message
14/04/28 16:00:02 ii : - id    = 0
14/04/28 16:00:02 ii : - type  = IPSEC
14/04/28 16:00:02 ii : - dir   = OUTBOUND
14/04/28 16:00:02 ii : - transform #0
14/04/28 16:00:02 ii : -- proto = 50
14/04/28 16:00:02 ii : -- level = REQUIRE
14/04/28 16:00:02 ii : -- mode  = TUNNEL
14/04/28 16:00:02 ii : -- reqid = 0
14/04/28 16:00:02 ii : -- tsrc  = 192.168.1.102:0
14/04/28 16:00:02 ii : -- tdst  = 210.80.199.3:0
14/04/28 16:00:02 DB : policy ref increment ( ref count = 1, policy count = 7 )
14/04/28 16:00:02 DB : policy added
14/04/28 16:00:02 ii : installed divert rule for 192.168.90.0/255.255.255.0
14/04/28 16:00:02 DB : policy ref decrement ( ref count = 0, policy count = 8 )
14/04/28 16:00:02 K< : recv X_SPDADD UNSPEC pfkey message
14/04/28 16:00:02 ii : - id    = 0
14/04/28 16:00:02 ii : - type  = IPSEC
14/04/28 16:00:02 ii : - dir   = INBOUND
14/04/28 16:00:02 ii : - transform #0
14/04/28 16:00:02 ii : -- proto = 50
14/04/28 16:00:02 ii : -- level = REQUIRE
14/04/28 16:00:02 ii : -- mode  = TUNNEL
14/04/28 16:00:02 ii : -- reqid = 0
14/04/28 16:00:02 ii : -- tsrc  = 210.80.199.3:0
14/04/28 16:00:02 ii : -- tdst  = 192.168.1.102:0
14/04/28 16:00:02 DB : policy ref increment ( ref count = 1, policy count = 8 )
14/04/28 16:00:02 DB : policy added
14/04/28 16:00:02 DB : policy ref decrement ( ref count = 0, policy count = 9 )
14/04/28 16:00:02 K< : recv X_SPDADD UNSPEC pfkey message
14/04/28 16:00:02 ii : - id    = 0
14/04/28 16:00:02 ii : - type  = IPSEC
14/04/28 16:00:02 ii : - dir   = OUTBOUND
14/04/28 16:00:02 ii : - transform #0
14/04/28 16:00:02 ii : -- proto = 50
14/04/28 16:00:02 ii : -- level = REQUIRE
14/04/28 16:00:02 ii : -- mode  = TUNNEL
14/04/28 16:00:02 ii : -- reqid = 0
14/04/28 16:00:02 ii : -- tsrc  = 192.168.1.102:0
14/04/28 16:00:02 ii : -- tdst  = 210.80.199.3:0
14/04/28 16:00:02 DB : policy ref increment ( ref count = 1, policy count = 9 )
14/04/28 16:00:02 DB : policy added
14/04/28 16:00:02 ii : installed divert rule for 172.16.30.0/255.255.255.0
14/04/28 16:00:02 DB : policy ref decrement ( ref count = 0, policy count = 10 )
14/04/28 16:00:02 K< : recv X_SPDADD UNSPEC pfkey message
14/04/28 16:00:02 ii : - id    = 0
14/04/28 16:00:02 ii : - type  = IPSEC
14/04/28 16:00:02 ii : - dir   = INBOUND
14/04/28 16:00:02 ii : - transform #0
14/04/28 16:00:02 ii : -- proto = 50
14/04/28 16:00:02 ii : -- level = REQUIRE
14/04/28 16:00:02 ii : -- mode  = TUNNEL
14/04/28 16:00:02 ii : -- reqid = 0
14/04/28 16:00:02 ii : -- tsrc  = 210.80.199.3:0
14/04/28 16:00:02 ii : -- tdst  = 192.168.1.102:0
14/04/28 16:00:02 DB : policy ref increment ( ref count = 1, policy count = 10 )
14/04/28 16:00:02 DB : policy added
14/04/28 16:00:02 DB : policy ref decrement ( ref count = 0, policy count = 11 )
14/04/28 16:00:02 K< : recv X_SPDADD UNSPEC pfkey message
14/04/28 16:00:02 ii : - id    = 0
14/04/28 16:00:02 ii : - type  = IPSEC
14/04/28 16:00:02 ii : - dir   = OUTBOUND
14/04/28 16:00:02 ii : - transform #0
14/04/28 16:00:02 ii : -- proto = 50
14/04/28 16:00:02 ii : -- level = REQUIRE
14/04/28 16:00:02 ii : -- mode  = TUNNEL
14/04/28 16:00:02 ii : -- reqid = 0
14/04/28 16:00:02 ii : -- tsrc  = 192.168.1.102:0
14/04/28 16:00:02 ii : -- tdst  = 210.80.199.3:0
14/04/28 16:00:02 DB : policy ref increment ( ref count = 1, policy count = 11 )
14/04/28 16:00:02 DB : policy added
14/04/28 16:00:02 ii : installed divert rule for 192.168.3.0/255.255.255.0
14/04/28 16:00:02 DB : policy ref decrement ( ref count = 0, policy count = 12 )
14/04/28 16:00:02 K< : recv X_SPDADD UNSPEC pfkey message
14/04/28 16:00:02 ii : - id    = 0
14/04/28 16:00:02 ii : - type  = IPSEC
14/04/28 16:00:02 ii : - dir   = INBOUND
14/04/28 16:00:02 ii : - transform #0
14/04/28 16:00:02 ii : -- proto = 50
14/04/28 16:00:02 ii : -- level = REQUIRE
14/04/28 16:00:02 ii : -- mode  = TUNNEL
14/04/28 16:00:02 ii : -- reqid = 0
14/04/28 16:00:02 ii : -- tsrc  = 210.80.199.3:0
14/04/28 16:00:02 ii : -- tdst  = 192.168.1.102:0
14/04/28 16:00:02 DB : policy ref increment ( ref count = 1, policy count = 12 )
14/04/28 16:00:02 DB : policy added
14/04/28 16:00:02 DB : policy ref decrement ( ref count = 0, policy count = 13 )
14/04/28 16:00:02 K< : recv X_SPDADD UNSPEC pfkey message
14/04/28 16:00:02 ii : - id    = 0
14/04/28 16:00:02 ii : - type  = IPSEC
14/04/28 16:00:02 ii : - dir   = OUTBOUND
14/04/28 16:00:02 ii : - transform #0
14/04/28 16:00:02 ii : -- proto = 50
14/04/28 16:00:02 ii : -- level = REQUIRE
14/04/28 16:00:02 ii : -- mode  = TUNNEL
14/04/28 16:00:02 ii : -- reqid = 0
14/04/28 16:00:02 ii : -- tsrc  = 192.168.1.102:0
14/04/28 16:00:02 ii : -- tdst  = 210.80.199.3:0
14/04/28 16:00:02 DB : policy ref increment ( ref count = 1, policy count = 13 )
14/04/28 16:00:02 DB : policy added
14/04/28 16:00:02 ii : installed divert rule for 205.197.192.150/255.255.255.255
14/04/28 16:00:02 DB : policy ref decrement ( ref count = 0, policy count = 14 )
14/04/28 16:00:02 K< : recv X_SPDADD UNSPEC pfkey message
14/04/28 16:00:02 ii : - id    = 0
14/04/28 16:00:02 ii : - type  = IPSEC
14/04/28 16:00:02 ii : - dir   = INBOUND
14/04/28 16:00:02 ii : - transform #0
14/04/28 16:00:02 ii : -- proto = 50
14/04/28 16:00:02 ii : -- level = REQUIRE
14/04/28 16:00:02 ii : -- mode  = TUNNEL
14/04/28 16:00:02 ii : -- reqid = 0
14/04/28 16:00:02 ii : -- tsrc  = 210.80.199.3:0
14/04/28 16:00:02 ii : -- tdst  = 192.168.1.102:0
14/04/28 16:00:02 DB : policy ref increment ( ref count = 1, policy count = 14 )
14/04/28 16:00:02 DB : policy added
14/04/28 16:00:02 DB : policy ref decrement ( ref count = 0, policy count = 15 )
14/04/28 16:00:02 K< : recv X_SPDADD UNSPEC pfkey message
14/04/28 16:00:02 ii : - id    = 0
14/04/28 16:00:02 ii : - type  = IPSEC
14/04/28 16:00:02 ii : - dir   = OUTBOUND
14/04/28 16:00:02 ii : - transform #0
14/04/28 16:00:02 ii : -- proto = 50
14/04/28 16:00:02 ii : -- level = REQUIRE
14/04/28 16:00:02 ii : -- mode  = TUNNEL
14/04/28 16:00:02 ii : -- reqid = 0
14/04/28 16:00:02 ii : -- tsrc  = 192.168.1.102:0
14/04/28 16:00:02 ii : -- tdst  = 210.80.199.3:0
14/04/28 16:00:02 DB : policy ref increment ( ref count = 1, policy count = 15 )
14/04/28 16:00:02 DB : policy added
14/04/28 16:00:02 ii : installed divert rule for 205.197.192.151/255.255.255.255
14/04/28 16:00:02 DB : policy ref decrement ( ref count = 0, policy count = 16 )
14/04/28 16:00:02 ii : inspecting ARP request ...
14/04/28 16:00:02 DB : policy not found
14/04/28 16:00:02 ii : ignoring ARP request for 10.120.2.101, no policy found
14/04/28 16:00:02 ii : sa never reached maturity
14/04/28 16:00:02 ii : removed sa divert rule for 210.80.199.3->192.168.1.102
14/04/28 16:00:02 DB : sa deleted ( sa count = 1 )
14/04/28 16:00:02 K< : recv GET UNSPEC pfkey message
14/04/28 16:00:02 DB : sa not found
14/04/28 16:00:02 ii : failed to locate UNSPEC sa for get
14/04/28 16:00:02 ii : - spi  = 0x999ba6d2
14/04/28 16:00:02 K< : recv GET UNSPEC pfkey message
14/04/28 16:00:02 DB : sa found
14/04/28 16:00:02 DB : sa ref increment ( ref count = 2, sa count = 1 )
14/04/28 16:00:02 DB : sa ref decrement ( ref count = 1, sa count = 1 )
14/04/28 16:00:03 ii : inspecting ARP request ...
14/04/28 16:00:03 DB : policy not found
14/04/28 16:00:03 ii : ignoring ARP request for 10.120.2.101, no policy found
14/04/28 16:00:03 K< : recv GET UNSPEC pfkey message
14/04/28 16:00:03 DB : sa found
14/04/28 16:00:03 DB : sa ref increment ( ref count = 2, sa count = 1 )
14/04/28 16:00:03 DB : sa ref decrement ( ref count = 1, sa count = 1 )
14/04/28 16:00:04 ii : inspecting ARP request ...
14/04/28 16:00:04 DB : policy not found
14/04/28 16:00:04 ii : ignoring ARP request for 10.120.2.101, no policy found
14/04/28 16:00:04 K< : recv GET UNSPEC pfkey message
14/04/28 16:00:04 DB : sa found
14/04/28 16:00:04 DB : sa ref increment ( ref count = 2, sa count = 1 )
14/04/28 16:00:04 DB : sa ref decrement ( ref count = 1, sa count = 1 )
14/04/28 16:00:05 ii : inspecting ARP request ...
14/04/28 16:00:05 ii : ignoring ARP request for 10.120.2.101,
duplicate address check
14/04/28 16:00:05 ii : inspecting ARP request ...
14/04/28 16:00:05 DB : policy found
14/04/28 16:00:05 DB : policy not found
14/04/28 16:00:05 ii : spoofing ARP response for 10.1.4.201
14/04/28 16:00:05 DB : policy found
14/04/28 16:00:05 DB : policy ref increment ( ref count = 1, policy count = 16 )
14/04/28 16:00:05 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 16:00:05 K> : sent ACQUIRE UNSPEC pfkey message
14/04/28 16:00:05 ii : - id   = 44
14/04/28 16:00:05 K> : sent ACQUIRE UNSPEC pfkey message
14/04/28 16:00:05 ii : - id   = 44
14/04/28 16:00:05 ii : queueing ip packet
14/04/28 16:00:05 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 16:00:05 K< : recv GETSPI ESP pfkey message
14/04/28 16:00:05 ii : allocated spi for ESP sa
14/04/28 16:00:05 ii : - spi  = 0xc6da0d33
14/04/28 16:00:05 ii : - src  = 210.80.199.3:4500
14/04/28 16:00:05 ii : - dst  = 192.168.1.102:4500
14/04/28 16:00:05 DB : sa ref increment ( ref count = 1, sa count = 1 )
14/04/28 16:00:05 DB : sa added
14/04/28 16:00:05 DB : sa ref increment ( ref count = 2, sa count = 2 )
14/04/28 16:00:05 DB : sa ref decrement ( ref count = 1, sa count = 2 )
14/04/28 16:00:05 K> : sent GETSPI ESP pfkey message
14/04/28 16:00:05 K> : sent GETSPI ESP pfkey message
14/04/28 16:00:05 ii : inspecting ARP request ...
14/04/28 16:00:05 DB : policy not found
14/04/28 16:00:05 ii : ignoring ARP request for 192.168.1.1, no policy found
14/04/28 16:00:05 DB : policy found
14/04/28 16:00:05 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 16:00:05 ii : queueing ip packet
14/04/28 16:00:05 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 16:00:05 DB : policy found
14/04/28 16:00:05 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 16:00:05 ii : queueing ip packet
14/04/28 16:00:05 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 16:00:05 DB : policy found
14/04/28 16:00:05 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 16:00:05 ii : queueing ip packet
14/04/28 16:00:05 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 16:00:05 DB : policy found
14/04/28 16:00:05 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 16:00:05 ii : queueing ip packet
14/04/28 16:00:05 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 16:00:05 DB : policy found
14/04/28 16:00:05 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 16:00:05 ii : queueing ip packet
14/04/28 16:00:05 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 16:00:05 DB : policy found
14/04/28 16:00:05 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 16:00:05 ii : queueing ip packet
14/04/28 16:00:05 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 16:00:05 K< : recv GET UNSPEC pfkey message
14/04/28 16:00:05 DB : sa found
14/04/28 16:00:05 DB : sa ref increment ( ref count = 2, sa count = 2 )
14/04/28 16:00:05 DB : sa ref decrement ( ref count = 1, sa count = 2 )
14/04/28 16:00:05 K< : recv GET UNSPEC pfkey message
14/04/28 16:00:05 DB : sa found
14/04/28 16:00:05 DB : sa ref increment ( ref count = 2, sa count = 2 )
14/04/28 16:00:05 DB : sa ref decrement ( ref count = 1, sa count = 2 )
14/04/28 16:00:06 ii : inspecting ARP request ...
14/04/28 16:00:06 DB : policy found
14/04/28 16:00:06 DB : policy not found
14/04/28 16:00:06 ii : spoofing ARP response for 10.1.4.202
14/04/28 16:00:06 DB : policy found
14/04/28 16:00:06 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 16:00:06 ii : queueing ip packet
14/04/28 16:00:06 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 16:00:06 K< : recv GET UNSPEC pfkey message
14/04/28 16:00:06 DB : sa found
14/04/28 16:00:06 DB : sa ref increment ( ref count = 2, sa count = 2 )
14/04/28 16:00:06 DB : sa ref decrement ( ref count = 1, sa count = 2 )
14/04/28 16:00:06 K< : recv GET UNSPEC pfkey message
14/04/28 16:00:06 DB : sa found
14/04/28 16:00:06 DB : sa ref increment ( ref count = 2, sa count = 2 )
14/04/28 16:00:06 DB : sa ref decrement ( ref count = 1, sa count = 2 )
14/04/28 16:00:06 DB : policy found
14/04/28 16:00:06 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 16:00:06 ii : queueing ip packet
14/04/28 16:00:06 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 16:00:06 DB : policy found
14/04/28 16:00:06 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 16:00:06 ii : queueing ip packet
14/04/28 16:00:06 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 16:00:06 DB : policy found
14/04/28 16:00:06 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 16:00:06 ii : queueing ip packet
14/04/28 16:00:06 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 16:00:06 DB : policy found
14/04/28 16:00:06 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 16:00:06 ii : queueing ip packet
14/04/28 16:00:06 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 16:00:07 DB : policy found
14/04/28 16:00:07 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 16:00:07 ii : queueing ip packet
14/04/28 16:00:07 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 16:00:07 K< : recv GET UNSPEC pfkey message
14/04/28 16:00:07 DB : sa found
14/04/28 16:00:07 DB : sa ref increment ( ref count = 2, sa count = 2 )
14/04/28 16:00:07 DB : sa ref decrement ( ref count = 1, sa count = 2 )
14/04/28 16:00:07 K< : recv GET UNSPEC pfkey message
14/04/28 16:00:07 DB : sa found
14/04/28 16:00:07 DB : sa ref increment ( ref count = 2, sa count = 2 )
14/04/28 16:00:07 DB : sa ref decrement ( ref count = 1, sa count = 2 )
14/04/28 16:00:08 DB : policy found
14/04/28 16:00:08 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 16:00:08 ii : queueing ip packet
14/04/28 16:00:08 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 16:00:08 DB : policy found
14/04/28 16:00:08 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 16:00:08 ii : queueing ip packet
14/04/28 16:00:08 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 16:00:08 DB : policy found
14/04/28 16:00:08 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 16:00:08 ii : queueing ip packet
14/04/28 16:00:08 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 16:00:08 DB : policy found
14/04/28 16:00:08 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 16:00:08 ii : queueing ip packet
14/04/28 16:00:08 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 16:00:08 DB : policy found
14/04/28 16:00:08 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 16:00:08 ii : queueing ip packet
14/04/28 16:00:08 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 16:00:08 DB : policy found
14/04/28 16:00:08 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 16:00:08 ii : queueing ip packet
14/04/28 16:00:08 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 16:00:08 K< : recv GET UNSPEC pfkey message
14/04/28 16:00:08 DB : sa found
14/04/28 16:00:08 DB : sa ref increment ( ref count = 2, sa count = 2 )
14/04/28 16:00:08 DB : sa ref decrement ( ref count = 1, sa count = 2 )
14/04/28 16:00:08 K< : recv GET UNSPEC pfkey message
14/04/28 16:00:08 DB : sa found
14/04/28 16:00:08 DB : sa ref increment ( ref count = 2, sa count = 2 )
14/04/28 16:00:08 DB : sa ref decrement ( ref count = 1, sa count = 2 )
14/04/28 16:00:09 DB : policy found
14/04/28 16:00:09 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 16:00:09 ii : queueing ip packet
14/04/28 16:00:09 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 16:00:09 DB : policy found
14/04/28 16:00:09 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 16:00:09 ii : queueing ip packet
14/04/28 16:00:09 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 16:00:09 K< : recv GET UNSPEC pfkey message
14/04/28 16:00:09 DB : sa found
14/04/28 16:00:09 DB : sa ref increment ( ref count = 2, sa count = 2 )
14/04/28 16:00:09 DB : sa ref decrement ( ref count = 1, sa count = 2 )
14/04/28 16:00:09 K< : recv GET UNSPEC pfkey message
14/04/28 16:00:09 DB : sa found
14/04/28 16:00:09 DB : sa ref increment ( ref count = 2, sa count = 2 )
14/04/28 16:00:09 DB : sa ref decrement ( ref count = 1, sa count = 2 )
14/04/28 16:00:10 DB : policy found
14/04/28 16:00:10 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 16:00:10 ii : queueing ip packet
14/04/28 16:00:10 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 16:00:10 K< : recv GET UNSPEC pfkey message
14/04/28 16:00:10 DB : sa found
14/04/28 16:00:10 DB : sa ref increment ( ref count = 2, sa count = 2 )
14/04/28 16:00:10 DB : sa ref decrement ( ref count = 1, sa count = 2 )
14/04/28 16:00:10 K< : recv GET UNSPEC pfkey message
14/04/28 16:00:10 DB : sa found
14/04/28 16:00:10 DB : sa ref increment ( ref count = 2, sa count = 2 )
14/04/28 16:00:10 DB : sa ref decrement ( ref count = 1, sa count = 2 )
14/04/28 16:00:11 K< : recv GET UNSPEC pfkey message
14/04/28 16:00:11 DB : sa found
14/04/28 16:00:11 DB : sa ref increment ( ref count = 2, sa count = 2 )
14/04/28 16:00:11 DB : sa ref decrement ( ref count = 1, sa count = 2 )
14/04/28 16:00:11 K< : recv GET UNSPEC pfkey message
14/04/28 16:00:11 DB : sa found
14/04/28 16:00:11 DB : sa ref increment ( ref count = 2, sa count = 2 )
14/04/28 16:00:11 DB : sa ref decrement ( ref count = 1, sa count = 2 )
14/04/28 16:00:11 DB : policy found
14/04/28 16:00:11 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 16:00:11 ii : queueing ip packet
14/04/28 16:00:11 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 16:00:12 ii : inspecting ARP request ...
14/04/28 16:00:12 DB : policy not found
14/04/28 16:00:12 ii : ignoring ARP request for 192.168.1.1, no policy found
14/04/28 16:00:12 DB : policy found
14/04/28 16:00:12 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 16:00:12 ii : queueing ip packet
14/04/28 16:00:12 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 16:00:12 K< : recv GET UNSPEC pfkey message
14/04/28 16:00:12 DB : sa found
14/04/28 16:00:12 DB : sa ref increment ( ref count = 2, sa count = 2 )
14/04/28 16:00:12 DB : sa ref decrement ( ref count = 1, sa count = 2 )
14/04/28 16:00:12 K< : recv GET UNSPEC pfkey message
14/04/28 16:00:12 DB : sa found
14/04/28 16:00:12 DB : sa ref increment ( ref count = 2, sa count = 2 )
14/04/28 16:00:12 DB : sa ref decrement ( ref count = 1, sa count = 2 )
14/04/28 16:00:13 DB : policy found
14/04/28 16:00:13 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 16:00:13 ii : queueing ip packet
14/04/28 16:00:13 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 16:00:13 DB : policy found
14/04/28 16:00:13 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 16:00:13 ii : queueing ip packet
14/04/28 16:00:13 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 16:00:13 DB : policy found
14/04/28 16:00:13 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 16:00:13 ii : queueing ip packet
14/04/28 16:00:13 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 16:00:13 DB : policy found
14/04/28 16:00:13 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 16:00:13 ii : queueing ip packet
14/04/28 16:00:13 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 16:00:13 K< : recv GET UNSPEC pfkey message
14/04/28 16:00:13 DB : sa found
14/04/28 16:00:13 DB : sa ref increment ( ref count = 2, sa count = 2 )
14/04/28 16:00:13 DB : sa ref decrement ( ref count = 1, sa count = 2 )
14/04/28 16:00:13 K< : recv GET UNSPEC pfkey message
14/04/28 16:00:13 DB : sa found
14/04/28 16:00:13 DB : sa ref increment ( ref count = 2, sa count = 2 )
14/04/28 16:00:13 DB : sa ref decrement ( ref count = 1, sa count = 2 )
14/04/28 16:00:14 K< : recv GET UNSPEC pfkey message
14/04/28 16:00:14 DB : sa found
14/04/28 16:00:14 DB : sa ref increment ( ref count = 2, sa count = 2 )
14/04/28 16:00:14 DB : sa ref decrement ( ref count = 1, sa count = 2 )
14/04/28 16:00:14 K< : recv GET UNSPEC pfkey message
14/04/28 16:00:14 DB : sa found
14/04/28 16:00:14 DB : sa ref increment ( ref count = 2, sa count = 2 )
14/04/28 16:00:14 DB : sa ref decrement ( ref count = 1, sa count = 2 )
14/04/28 16:00:15 DB : policy found
14/04/28 16:00:15 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 16:00:15 ii : queueing ip packet
14/04/28 16:00:15 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 16:00:15 K< : recv GET UNSPEC pfkey message
14/04/28 16:00:15 DB : sa found
14/04/28 16:00:15 DB : sa ref increment ( ref count = 2, sa count = 2 )
14/04/28 16:00:15 DB : sa ref decrement ( ref count = 1, sa count = 2 )
14/04/28 16:00:15 K< : recv GET UNSPEC pfkey message
14/04/28 16:00:15 DB : sa found
14/04/28 16:00:15 DB : sa ref increment ( ref count = 2, sa count = 2 )
14/04/28 16:00:15 DB : sa ref decrement ( ref count = 1, sa count = 2 )
14/04/28 16:00:16 K< : recv GET UNSPEC pfkey message
14/04/28 16:00:16 DB : sa found
14/04/28 16:00:16 DB : sa ref increment ( ref count = 2, sa count = 2 )
14/04/28 16:00:16 DB : sa ref decrement ( ref count = 1, sa count = 2 )
14/04/28 16:00:16 K< : recv GET UNSPEC pfkey message
14/04/28 16:00:16 DB : sa found
14/04/28 16:00:16 DB : sa ref increment ( ref count = 2, sa count = 2 )
14/04/28 16:00:16 DB : sa ref decrement ( ref count = 1, sa count = 2 )
14/04/28 16:00:17 ii : sa never reached maturity
14/04/28 16:00:17 ii : removed sa divert rule for 210.80.199.3->192.168.1.102
14/04/28 16:00:17 DB : sa deleted ( sa count = 1 )
14/04/28 16:00:17 K< : recv GET UNSPEC pfkey message
14/04/28 16:00:17 DB : sa not found
14/04/28 16:00:17 ii : failed to locate UNSPEC sa for get
14/04/28 16:00:17 ii : - spi  = 0xb62d1786
14/04/28 16:00:17 K< : recv GET UNSPEC pfkey message
14/04/28 16:00:17 DB : sa found
14/04/28 16:00:17 DB : sa ref increment ( ref count = 2, sa count = 1 )
14/04/28 16:00:17 DB : sa ref decrement ( ref count = 1, sa count = 1 )
14/04/28 16:00:18 K< : recv GET UNSPEC pfkey message
14/04/28 16:00:18 DB : sa found
14/04/28 16:00:18 DB : sa ref increment ( ref count = 2, sa count = 1 )
14/04/28 16:00:18 DB : sa ref decrement ( ref count = 1, sa count = 1 )
14/04/28 16:00:18 DB : policy found
14/04/28 16:00:18 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 16:00:18 ii : queueing ip packet
14/04/28 16:00:18 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 16:00:19 DB : policy found
14/04/28 16:00:19 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 16:00:19 ii : queueing ip packet
14/04/28 16:00:19 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 16:00:19 DB : policy found
14/04/28 16:00:19 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 16:00:19 ii : queueing ip packet
14/04/28 16:00:19 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 16:00:19 K< : recv GET UNSPEC pfkey message
14/04/28 16:00:19 DB : sa found
14/04/28 16:00:19 DB : sa ref increment ( ref count = 2, sa count = 1 )
14/04/28 16:00:19 DB : sa ref decrement ( ref count = 1, sa count = 1 )
14/04/28 16:00:19 DB : policy found
14/04/28 16:00:19 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 16:00:19 ii : queueing ip packet
14/04/28 16:00:19 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 16:00:20 ii : sa never reached maturity
14/04/28 16:00:20 ii : removed sa divert rule for 210.80.199.3->192.168.1.102
14/04/28 16:00:20 DB : sa deleted ( sa count = 0 )
14/04/28 16:00:20 ii : inspecting ARP request ...
14/04/28 16:00:20 DB : policy not found
14/04/28 16:00:20 ii : ignoring ARP request for 192.168.1.1, no policy found
14/04/28 16:00:20 DB : policy found
14/04/28 16:00:20 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 16:00:20 ii : queueing ip packet
14/04/28 16:00:20 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 16:00:20 K< : recv GET UNSPEC pfkey message
14/04/28 16:00:20 DB : sa not found
14/04/28 16:00:20 ii : failed to locate UNSPEC sa for get
14/04/28 16:00:20 ii : - spi  = 0xc6da0d33
14/04/28 16:00:20 DB : policy found
14/04/28 16:00:20 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 16:00:20 ii : queueing ip packet
14/04/28 16:00:20 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 16:00:20 DB : policy found
14/04/28 16:00:20 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 16:00:20 ii : queueing ip packet
14/04/28 16:00:20 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 16:00:21 ii : aquire timelimit expired
14/04/28 16:00:21 DB : policy ref decrement ( ref count = 0, policy count = 16 )
14/04/28 16:00:22 DB : policy found
14/04/28 16:00:22 DB : policy ref increment ( ref count = 1, policy count = 16 )
14/04/28 16:00:22 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 16:00:22 K> : sent ACQUIRE UNSPEC pfkey message
14/04/28 16:00:22 ii : - id   = 44
14/04/28 16:00:22 K> : sent ACQUIRE UNSPEC pfkey message
14/04/28 16:00:22 ii : - id   = 44
14/04/28 16:00:22 ii : queueing ip packet
14/04/28 16:00:22 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 16:00:22 K< : recv GETSPI ESP pfkey message
14/04/28 16:00:22 ii : allocated spi for ESP sa
14/04/28 16:00:22 ii : - spi  = 0xf0844244
14/04/28 16:00:22 ii : - src  = 210.80.199.3:4500
14/04/28 16:00:22 ii : - dst  = 192.168.1.102:4500
14/04/28 16:00:22 DB : sa ref increment ( ref count = 1, sa count = 0 )
14/04/28 16:00:22 DB : sa added
14/04/28 16:00:22 DB : sa ref increment ( ref count = 2, sa count = 1 )
14/04/28 16:00:22 DB : sa ref decrement ( ref count = 1, sa count = 1 )
14/04/28 16:00:22 K> : sent GETSPI ESP pfkey message
14/04/28 16:00:22 K> : sent GETSPI ESP pfkey message
14/04/28 16:00:22 DB : policy found
14/04/28 16:00:22 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 16:00:22 ii : queueing ip packet
14/04/28 16:00:22 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 16:00:22 K< : recv GET UNSPEC pfkey message
14/04/28 16:00:22 DB : sa found
14/04/28 16:00:22 DB : sa ref increment ( ref count = 2, sa count = 1 )
14/04/28 16:00:22 DB : sa ref decrement ( ref count = 1, sa count = 1 )
14/04/28 16:00:22 DB : policy found
14/04/28 16:00:22 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 16:00:22 ii : queueing ip packet
14/04/28 16:00:22 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 16:00:22 DB : policy found
14/04/28 16:00:22 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 16:00:22 ii : queueing ip packet
14/04/28 16:00:22 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 16:00:23 K< : recv GET UNSPEC pfkey message
14/04/28 16:00:23 DB : sa found
14/04/28 16:00:23 DB : sa ref increment ( ref count = 2, sa count = 1 )
14/04/28 16:00:23 DB : sa ref decrement ( ref count = 1, sa count = 1 )
14/04/28 16:00:24 K< : recv GET UNSPEC pfkey message
14/04/28 16:00:24 DB : sa found
14/04/28 16:00:24 DB : sa ref increment ( ref count = 2, sa count = 1 )
14/04/28 16:00:24 DB : sa ref decrement ( ref count = 1, sa count = 1 )
14/04/28 16:00:25 K< : recv GET UNSPEC pfkey message
14/04/28 16:00:25 DB : sa found
14/04/28 16:00:25 DB : sa ref increment ( ref count = 2, sa count = 1 )
14/04/28 16:00:25 DB : sa ref decrement ( ref count = 1, sa count = 1 )
14/04/28 16:00:26 K< : recv GET UNSPEC pfkey message
14/04/28 16:00:26 DB : sa found
14/04/28 16:00:26 DB : sa ref increment ( ref count = 2, sa count = 1 )
14/04/28 16:00:26 DB : sa ref decrement ( ref count = 1, sa count = 1 )
14/04/28 16:00:26 DB : policy found
14/04/28 16:00:26 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 16:00:26 ii : queueing ip packet
14/04/28 16:00:26 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 16:00:26 DB : policy found
14/04/28 16:00:26 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 16:00:26 ii : queueing ip packet
14/04/28 16:00:26 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 16:00:27 ii : inspecting ARP request ...
14/04/28 16:00:27 DB : policy not found
14/04/28 16:00:27 ii : ignoring ARP request for 192.168.1.1, no policy found
14/04/28 16:00:27 K< : recv GET UNSPEC pfkey message
14/04/28 16:00:27 DB : sa found
14/04/28 16:00:27 DB : sa ref increment ( ref count = 2, sa count = 1 )
14/04/28 16:00:27 DB : sa ref decrement ( ref count = 1, sa count = 1 )
14/04/28 16:00:28 DB : policy found
14/04/28 16:00:28 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 16:00:28 ii : queueing ip packet
14/04/28 16:00:28 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 16:00:28 K< : recv GET UNSPEC pfkey message
14/04/28 16:00:28 DB : sa found
14/04/28 16:00:28 DB : sa ref increment ( ref count = 2, sa count = 1 )
14/04/28 16:00:28 DB : sa ref decrement ( ref count = 1, sa count = 1 )
14/04/28 16:00:29 DB : policy found
14/04/28 16:00:29 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 16:00:29 ii : queueing ip packet
14/04/28 16:00:29 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 16:00:29 DB : policy found
14/04/28 16:00:29 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 16:00:29 ii : queueing ip packet
14/04/28 16:00:29 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 16:00:29 K< : recv GET UNSPEC pfkey message
14/04/28 16:00:29 DB : sa found
14/04/28 16:00:29 DB : sa ref increment ( ref count = 2, sa count = 1 )
14/04/28 16:00:29 DB : sa ref decrement ( ref count = 1, sa count = 1 )
14/04/28 16:00:29 DB : policy found
14/04/28 16:00:29 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 16:00:29 ii : queueing ip packet
14/04/28 16:00:29 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 16:00:30 DB : policy found
14/04/28 16:00:30 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 16:00:30 ii : queueing ip packet
14/04/28 16:00:30 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 16:00:30 K< : recv GET UNSPEC pfkey message
14/04/28 16:00:30 DB : sa found
14/04/28 16:00:30 DB : sa ref increment ( ref count = 2, sa count = 1 )
14/04/28 16:00:30 DB : sa ref decrement ( ref count = 1, sa count = 1 )
14/04/28 16:00:30 DB : policy found
14/04/28 16:00:30 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 16:00:30 ii : queueing ip packet
14/04/28 16:00:30 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 16:00:31 DB : policy found
14/04/28 16:00:31 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 16:00:31 ii : queueing ip packet
14/04/28 16:00:31 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 16:00:31 K< : recv GET UNSPEC pfkey message
14/04/28 16:00:31 DB : sa found
14/04/28 16:00:31 DB : sa ref increment ( ref count = 2, sa count = 1 )
14/04/28 16:00:31 DB : sa ref decrement ( ref count = 1, sa count = 1 )
14/04/28 16:00:32 DB : policy found
14/04/28 16:00:32 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 16:00:32 ii : queueing ip packet
14/04/28 16:00:32 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 16:00:32 DB : policy found
14/04/28 16:00:32 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 16:00:32 ii : queueing ip packet
14/04/28 16:00:32 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 16:00:32 K< : recv X_SPDDELETE2 UNSPEC pfkey message
14/04/28 16:00:32 ii : - id   = 43
14/04/28 16:00:32 ii : - type = IPSEC
14/04/28 16:00:32 ii : - dir  = INBOUND
14/04/28 16:00:32 DB : policy found
14/04/28 16:00:32 DB : policy ref increment ( ref count = 1, policy count = 16 )
14/04/28 16:00:32 DB : policy deleted ( policy count = 15 )
14/04/28 16:00:32 K< : recv X_SPDDELETE2 UNSPEC pfkey message
14/04/28 16:00:32 ii : - id   = 44
14/04/28 16:00:32 ii : - type = IPSEC
14/04/28 16:00:32 ii : - dir  = OUTBOUND
14/04/28 16:00:32 DB : policy found
14/04/28 16:00:32 DB : policy ref increment ( ref count = 2, policy count = 15 )
14/04/28 16:00:32 ii : removed divert rule for 10.0.0.0/255.0.0.0
14/04/28 16:00:32 DB : policy deleted ( policy count = 14 )
14/04/28 16:00:32 K< : recv X_SPDDELETE2 UNSPEC pfkey message
14/04/28 16:00:32 ii : - id   = 45
14/04/28 16:00:32 ii : - type = IPSEC
14/04/28 16:00:32 ii : - dir  = INBOUND
14/04/28 16:00:32 DB : policy found
14/04/28 16:00:32 DB : policy ref increment ( ref count = 1, policy count = 14 )
14/04/28 16:00:32 DB : policy deleted ( policy count = 13 )
14/04/28 16:00:32 K< : recv X_SPDDELETE2 UNSPEC pfkey message
14/04/28 16:00:32 ii : - id   = 47
14/04/28 16:00:32 ii : - type = IPSEC
14/04/28 16:00:32 ii : - dir  = OUTBOUND
14/04/28 16:00:32 DB : policy found
14/04/28 16:00:32 DB : policy ref increment ( ref count = 1, policy count = 13 )
14/04/28 16:00:32 ii : removed divert rule for 192.168.90.0/255.255.255.0
14/04/28 16:00:32 DB : policy deleted ( policy count = 12 )
14/04/28 16:00:32 K< : recv X_SPDDELETE2 UNSPEC pfkey message
14/04/28 16:00:32 ii : - id   = 48
14/04/28 16:00:32 ii : - type = IPSEC
14/04/28 16:00:32 ii : - dir  = INBOUND
14/04/28 16:00:32 DB : policy found
14/04/28 16:00:32 DB : policy ref increment ( ref count = 1, policy count = 12 )
14/04/28 16:00:32 DB : policy deleted ( policy count = 11 )
14/04/28 16:00:32 K< : recv X_SPDDELETE2 UNSPEC pfkey message
14/04/28 16:00:32 ii : - id   = 49
14/04/28 16:00:32 ii : - type = IPSEC
14/04/28 16:00:32 ii : - dir  = OUTBOUND
14/04/28 16:00:32 DB : policy found
14/04/28 16:00:32 DB : policy ref increment ( ref count = 1, policy count = 11 )
14/04/28 16:00:32 ii : removed divert rule for 172.16.30.0/255.255.255.0
14/04/28 16:00:32 DB : policy deleted ( policy count = 10 )
14/04/28 16:00:32 K< : recv GET UNSPEC pfkey message
14/04/28 16:00:32 DB : sa found
14/04/28 16:00:32 DB : sa ref increment ( ref count = 2, sa count = 1 )
14/04/28 16:00:32 DB : sa ref decrement ( ref count = 1, sa count = 1 )
14/04/28 16:00:32 K< : recv X_SPDDELETE2 UNSPEC pfkey message
14/04/28 16:00:32 ii : - id   = 50
14/04/28 16:00:32 ii : - type = IPSEC
14/04/28 16:00:32 ii : - dir  = INBOUND
14/04/28 16:00:32 DB : policy found
14/04/28 16:00:32 DB : policy ref increment ( ref count = 1, policy count = 10 )
14/04/28 16:00:32 DB : policy deleted ( policy count = 9 )
14/04/28 16:00:32 K< : recv X_SPDDELETE2 UNSPEC pfkey message
14/04/28 16:00:32 ii : - id   = 51
14/04/28 16:00:32 ii : - type = IPSEC
14/04/28 16:00:32 ii : - dir  = OUTBOUND
14/04/28 16:00:32 DB : policy found
14/04/28 16:00:32 DB : policy ref increment ( ref count = 1, policy count = 9 )
14/04/28 16:00:32 ii : removed divert rule for 192.168.3.0/255.255.255.0
14/04/28 16:00:32 DB : policy deleted ( policy count = 8 )
14/04/28 16:00:32 K< : recv X_SPDDELETE2 UNSPEC pfkey message
14/04/28 16:00:32 ii : - id   = 52
14/04/28 16:00:32 ii : - type = IPSEC
14/04/28 16:00:32 ii : - dir  = INBOUND
14/04/28 16:00:32 DB : policy found
14/04/28 16:00:32 DB : policy ref increment ( ref count = 1, policy count = 8 )
14/04/28 16:00:32 DB : policy deleted ( policy count = 7 )
14/04/28 16:00:32 K< : recv X_SPDDELETE2 UNSPEC pfkey message
14/04/28 16:00:32 ii : - id   = 53
14/04/28 16:00:32 ii : - type = IPSEC
14/04/28 16:00:32 ii : - dir  = OUTBOUND
14/04/28 16:00:32 DB : policy found
14/04/28 16:00:32 DB : policy ref increment ( ref count = 1, policy count = 7 )
14/04/28 16:00:32 ii : removed divert rule for 205.197.192.150/255.255.255.255
14/04/28 16:00:32 DB : policy deleted ( policy count = 6 )
14/04/28 16:00:32 K< : recv X_SPDDELETE2 UNSPEC pfkey message
14/04/28 16:00:32 ii : - id   = 54
14/04/28 16:00:32 ii : - type = IPSEC
14/04/28 16:00:32 ii : - dir  = INBOUND
14/04/28 16:00:32 DB : policy found
14/04/28 16:00:32 DB : policy ref increment ( ref count = 1, policy count = 6 )
14/04/28 16:00:32 DB : policy deleted ( policy count = 5 )
14/04/28 16:00:32 K< : recv X_SPDDELETE2 UNSPEC pfkey message
14/04/28 16:00:32 ii : - id   = 55
14/04/28 16:00:32 ii : - type = IPSEC
14/04/28 16:00:32 ii : - dir  = OUTBOUND
14/04/28 16:00:32 DB : policy found
14/04/28 16:00:32 DB : policy ref increment ( ref count = 1, policy count = 5 )
14/04/28 16:00:32 ii : removed divert rule for 205.197.192.151/255.255.255.255
14/04/28 16:00:32 DB : policy deleted ( policy count = 4 )
14/04/28 16:00:32 K< : recv X_SPDDELETE2 UNSPEC pfkey message
14/04/28 16:00:32 ii : - id   = 41
14/04/28 16:00:32 ii : - type = NONE
14/04/28 16:00:32 ii : - dir  = INBOUND
14/04/28 16:00:32 DB : policy found
14/04/28 16:00:32 DB : policy ref increment ( ref count = 1, policy count = 4 )
14/04/28 16:00:32 DB : policy deleted ( policy count = 3 )
14/04/28 16:00:32 K< : recv X_SPDDELETE2 UNSPEC pfkey message
14/04/28 16:00:32 ii : - id   = 42
14/04/28 16:00:32 ii : - type = NONE
14/04/28 16:00:32 ii : - dir  = OUTBOUND
14/04/28 16:00:32 DB : policy found
14/04/28 16:00:32 DB : policy ref increment ( ref count = 1, policy count = 3 )
14/04/28 16:00:32 ii : removed accept rule for 192.168.1.1/255.255.255.255
14/04/28 16:00:32 DB : policy deleted ( policy count = 2 )
14/04/28 16:00:32 K< : recv X_SPDDELETE2 UNSPEC pfkey message
14/04/28 16:00:32 ii : - id   = 39
14/04/28 16:00:32 ii : - type = NONE
14/04/28 16:00:32 ii : - dir  = INBOUND
14/04/28 16:00:32 DB : policy found
14/04/28 16:00:32 DB : policy ref increment ( ref count = 1, policy count = 2 )
14/04/28 16:00:32 DB : policy deleted ( policy count = 1 )
14/04/28 16:00:32 K< : recv X_SPDDELETE2 UNSPEC pfkey message
14/04/28 16:00:32 ii : - id   = 40
14/04/28 16:00:32 ii : - type = NONE
14/04/28 16:00:32 ii : - dir  = OUTBOUND
14/04/28 16:00:32 DB : policy found
14/04/28 16:00:32 DB : policy ref increment ( ref count = 1, policy count = 1 )
14/04/28 16:00:32 ii : removed accept rule for 210.80.199.3/255.255.255.255
14/04/28 16:00:32 DB : policy deleted ( policy count = 0 )
14/04/28 16:00:32 ii : removed mirror rule ( policycount 0 )
14/04/28 16:00:33 K< : recv GET UNSPEC pfkey message
14/04/28 16:00:33 DB : sa found
14/04/28 16:00:33 DB : sa ref increment ( ref count = 2, sa count = 1 )
14/04/28 16:00:33 DB : sa ref decrement ( ref count = 1, sa count = 1 )
14/04/28 16:00:34 K< : recv GET UNSPEC pfkey message
14/04/28 16:00:34 DB : sa found
14/04/28 16:00:34 DB : sa ref increment ( ref count = 2, sa count = 1 )
14/04/28 16:00:34 DB : sa ref decrement ( ref count = 1, sa count = 1 )
14/04/28 16:00:35 K< : recv GET UNSPEC pfkey message
14/04/28 16:00:35 DB : sa found
14/04/28 16:00:35 DB : sa ref increment ( ref count = 2, sa count = 1 )
14/04/28 16:00:35 DB : sa ref decrement ( ref count = 1, sa count = 1 )
14/04/28 16:00:36 K< : recv GET UNSPEC pfkey message
14/04/28 16:00:36 DB : sa found
14/04/28 16:00:36 DB : sa ref increment ( ref count = 2, sa count = 1 )
14/04/28 16:00:36 DB : sa ref decrement ( ref count = 1, sa count = 1 )
14/04/28 16:00:37 ii : sa never reached maturity
14/04/28 16:00:37 ii : removed sa divert rule for 210.80.199.3->192.168.1.102
14/04/28 16:00:37 DB : sa deleted ( sa count = 0 )
14/04/28 16:00:37 K< : recv GET UNSPEC pfkey message
14/04/28 16:00:37 DB : sa not found
14/04/28 16:00:37 ii : failed to locate UNSPEC sa for get
14/04/28 16:00:37 ii : - spi  = 0xf0844244
14/04/28 16:00:44 K< : recv X_SPDADD UNSPEC pfkey message
14/04/28 16:00:44 ii : - id    = 0
14/04/28 16:00:44 ii : - type  = NONE
14/04/28 16:00:44 ii : - dir   = INBOUND
14/04/28 16:00:44 DB : policy ref increment ( ref count = 1, policy count = 0 )
14/04/28 16:00:44 DB : policy added
14/04/28 16:00:44 DB : policy ref decrement ( ref count = 0, policy count = 1 )
14/04/28 16:00:44 ii : removed arp mirror rule ( policycount 1 )
14/04/28 16:00:44 K< : recv X_SPDADD UNSPEC pfkey message
14/04/28 16:00:44 ii : - id    = 0
14/04/28 16:00:44 ii : - type  = NONE
14/04/28 16:00:44 ii : - dir   = OUTBOUND
14/04/28 16:00:44 DB : policy ref increment ( ref count = 1, policy count = 1 )
14/04/28 16:00:44 DB : policy added
14/04/28 16:00:44 ii : installed accept rule for 210.80.199.3/255.255.255.255
14/04/28 16:00:44 DB : policy ref decrement ( ref count = 0, policy count = 2 )
14/04/28 16:00:44 K< : recv X_SPDADD UNSPEC pfkey message
14/04/28 16:00:44 ii : - id    = 0
14/04/28 16:00:44 ii : - type  = NONE
14/04/28 16:00:44 ii : - dir   = INBOUND
14/04/28 16:00:44 DB : policy ref increment ( ref count = 1, policy count = 2 )
14/04/28 16:00:44 DB : policy added
14/04/28 16:00:44 DB : policy ref decrement ( ref count = 0, policy count = 3 )
14/04/28 16:00:44 K< : recv X_SPDADD UNSPEC pfkey message
14/04/28 16:00:44 ii : - id    = 0
14/04/28 16:00:44 ii : - type  = NONE
14/04/28 16:00:44 ii : - dir   = OUTBOUND
14/04/28 16:00:44 DB : policy ref increment ( ref count = 1, policy count = 3 )
14/04/28 16:00:44 DB : policy added
14/04/28 16:00:44 ii : installed accept rule for 192.168.1.1/255.255.255.255
14/04/28 16:00:44 DB : policy ref decrement ( ref count = 0, policy count = 4 )
14/04/28 16:00:44 K< : recv X_SPDADD UNSPEC pfkey message
14/04/28 16:00:44 ii : - id    = 0
14/04/28 16:00:44 ii : - type  = IPSEC
14/04/28 16:00:44 ii : - dir   = INBOUND
14/04/28 16:00:44 ii : - transform #0
14/04/28 16:00:44 ii : -- proto = 50
14/04/28 16:00:44 ii : -- level = REQUIRE
14/04/28 16:00:44 ii : -- mode  = TUNNEL
14/04/28 16:00:44 ii : -- reqid = 0
14/04/28 16:00:44 ii : -- tsrc  = 210.80.199.3:0
14/04/28 16:00:44 ii : -- tdst  = 192.168.1.102:0
14/04/28 16:00:44 DB : policy ref increment ( ref count = 1, policy count = 4 )
14/04/28 16:00:44 DB : policy added
14/04/28 16:00:44 DB : policy ref decrement ( ref count = 0, policy count = 5 )
14/04/28 16:00:44 K< : recv X_SPDADD UNSPEC pfkey message
14/04/28 16:00:44 ii : - id    = 0
14/04/28 16:00:44 ii : - type  = IPSEC
14/04/28 16:00:44 ii : - dir   = OUTBOUND
14/04/28 16:00:44 ii : - transform #0
14/04/28 16:00:44 ii : -- proto = 50
14/04/28 16:00:44 ii : -- level = REQUIRE
14/04/28 16:00:44 ii : -- mode  = TUNNEL
14/04/28 16:00:44 ii : -- reqid = 0
14/04/28 16:00:44 ii : -- tsrc  = 192.168.1.102:0
14/04/28 16:00:44 ii : -- tdst  = 210.80.199.3:0
14/04/28 16:00:44 DB : policy ref increment ( ref count = 1, policy count = 5 )
14/04/28 16:00:44 DB : policy added
14/04/28 16:00:44 ii : installed divert rule for 10.0.0.0/255.0.0.0
14/04/28 16:00:44 DB : policy ref decrement ( ref count = 0, policy count = 6 )
14/04/28 16:00:44 K< : recv X_SPDADD UNSPEC pfkey message
14/04/28 16:00:44 ii : - id    = 0
14/04/28 16:00:44 ii : - type  = IPSEC
14/04/28 16:00:44 ii : - dir   = INBOUND
14/04/28 16:00:44 ii : - transform #0
14/04/28 16:00:44 ii : -- proto = 50
14/04/28 16:00:44 ii : -- level = REQUIRE
14/04/28 16:00:44 ii : -- mode  = TUNNEL
14/04/28 16:00:44 ii : -- reqid = 0
14/04/28 16:00:44 ii : -- tsrc  = 210.80.199.3:0
14/04/28 16:00:44 ii : -- tdst  = 192.168.1.102:0
14/04/28 16:00:44 DB : policy ref increment ( ref count = 1, policy count = 6 )
14/04/28 16:00:44 DB : policy added
14/04/28 16:00:44 DB : policy ref decrement ( ref count = 0, policy count = 7 )
14/04/28 16:00:44 K< : recv GETSPI ESP pfkey message
14/04/28 16:00:44 ii : allocated spi for ESP sa
14/04/28 16:00:44 ii : - spi  = 0xdc705fe1
14/04/28 16:00:44 ii : - src  = 210.80.199.3:4500
14/04/28 16:00:44 ii : - dst  = 192.168.1.102:4500
14/04/28 16:00:44 DB : sa ref increment ( ref count = 1, sa count = 0 )
14/04/28 16:00:44 DB : sa added
14/04/28 16:00:44 DB : sa ref increment ( ref count = 2, sa count = 1 )
14/04/28 16:00:44 DB : sa ref decrement ( ref count = 1, sa count = 1 )
14/04/28 16:00:44 K> : sent GETSPI ESP pfkey message
14/04/28 16:00:44 K> : sent GETSPI ESP pfkey message
14/04/28 16:00:44 K< : recv X_SPDADD UNSPEC pfkey message
14/04/28 16:00:44 ii : - id    = 0
14/04/28 16:00:44 ii : - type  = IPSEC
14/04/28 16:00:44 ii : - dir   = OUTBOUND
14/04/28 16:00:44 ii : - transform #0
14/04/28 16:00:44 ii : -- proto = 50
14/04/28 16:00:44 ii : -- level = REQUIRE
14/04/28 16:00:44 ii : -- mode  = TUNNEL
14/04/28 16:00:44 ii : -- reqid = 0
14/04/28 16:00:44 ii : -- tsrc  = 192.168.1.102:0
14/04/28 16:00:44 ii : -- tdst  = 210.80.199.3:0
14/04/28 16:00:44 DB : policy ref increment ( ref count = 1, policy count = 7 )
14/04/28 16:00:44 DB : policy added
14/04/28 16:00:44 ii : installed divert rule for 192.168.90.0/255.255.255.0
14/04/28 16:00:44 DB : policy ref decrement ( ref count = 0, policy count = 8 )
14/04/28 16:00:44 K< : recv X_SPDADD UNSPEC pfkey message
14/04/28 16:00:44 ii : - id    = 0
14/04/28 16:00:44 ii : - type  = IPSEC
14/04/28 16:00:44 ii : - dir   = INBOUND
14/04/28 16:00:44 ii : - transform #0
14/04/28 16:00:44 ii : -- proto = 50
14/04/28 16:00:44 ii : -- level = REQUIRE
14/04/28 16:00:44 ii : -- mode  = TUNNEL
14/04/28 16:00:44 ii : -- reqid = 0
14/04/28 16:00:44 ii : -- tsrc  = 210.80.199.3:0
14/04/28 16:00:44 ii : -- tdst  = 192.168.1.102:0
14/04/28 16:00:44 DB : policy ref increment ( ref count = 1, policy count = 8 )
14/04/28 16:00:44 DB : policy added
14/04/28 16:00:44 DB : policy ref decrement ( ref count = 0, policy count = 9 )
14/04/28 16:00:44 K< : recv X_SPDADD UNSPEC pfkey message
14/04/28 16:00:44 ii : - id    = 0
14/04/28 16:00:44 ii : - type  = IPSEC
14/04/28 16:00:44 ii : - dir   = OUTBOUND
14/04/28 16:00:44 ii : - transform #0
14/04/28 16:00:44 ii : -- proto = 50
14/04/28 16:00:44 ii : -- level = REQUIRE
14/04/28 16:00:44 ii : -- mode  = TUNNEL
14/04/28 16:00:44 ii : -- reqid = 0
14/04/28 16:00:44 ii : -- tsrc  = 192.168.1.102:0
14/04/28 16:00:44 ii : -- tdst  = 210.80.199.3:0
14/04/28 16:00:44 DB : policy ref increment ( ref count = 1, policy count = 9 )
14/04/28 16:00:44 DB : policy added
14/04/28 16:00:44 ii : installed divert rule for 172.16.30.0/255.255.255.0
14/04/28 16:00:44 DB : policy ref decrement ( ref count = 0, policy count = 10 )
14/04/28 16:00:44 K< : recv X_SPDADD UNSPEC pfkey message
14/04/28 16:00:44 ii : - id    = 0
14/04/28 16:00:44 ii : - type  = IPSEC
14/04/28 16:00:44 ii : - dir   = INBOUND
14/04/28 16:00:44 ii : - transform #0
14/04/28 16:00:44 ii : -- proto = 50
14/04/28 16:00:44 ii : -- level = REQUIRE
14/04/28 16:00:44 ii : -- mode  = TUNNEL
14/04/28 16:00:44 ii : -- reqid = 0
14/04/28 16:00:44 ii : -- tsrc  = 210.80.199.3:0
14/04/28 16:00:44 ii : -- tdst  = 192.168.1.102:0
14/04/28 16:00:44 DB : policy ref increment ( ref count = 1, policy count = 10 )
14/04/28 16:00:44 DB : policy added
14/04/28 16:00:44 DB : policy ref decrement ( ref count = 0, policy count = 11 )
14/04/28 16:00:44 K< : recv X_SPDADD UNSPEC pfkey message
14/04/28 16:00:44 ii : - id    = 0
14/04/28 16:00:44 ii : - type  = IPSEC
14/04/28 16:00:44 ii : - dir   = OUTBOUND
14/04/28 16:00:44 ii : - transform #0
14/04/28 16:00:44 ii : -- proto = 50
14/04/28 16:00:44 ii : -- level = REQUIRE
14/04/28 16:00:44 ii : -- mode  = TUNNEL
14/04/28 16:00:44 ii : -- reqid = 0
14/04/28 16:00:44 ii : -- tsrc  = 192.168.1.102:0
14/04/28 16:00:44 ii : -- tdst  = 210.80.199.3:0
14/04/28 16:00:44 DB : policy ref increment ( ref count = 1, policy count = 11 )
14/04/28 16:00:44 DB : policy added
14/04/28 16:00:44 ii : installed divert rule for 192.168.3.0/255.255.255.0
14/04/28 16:00:44 DB : policy ref decrement ( ref count = 0, policy count = 12 )
14/04/28 16:00:44 K< : recv X_SPDADD UNSPEC pfkey message
14/04/28 16:00:44 ii : - id    = 0
14/04/28 16:00:44 ii : - type  = IPSEC
14/04/28 16:00:44 ii : - dir   = INBOUND
14/04/28 16:00:44 ii : - transform #0
14/04/28 16:00:44 ii : -- proto = 50
14/04/28 16:00:44 ii : -- level = REQUIRE
14/04/28 16:00:44 ii : -- mode  = TUNNEL
14/04/28 16:00:44 ii : -- reqid = 0
14/04/28 16:00:44 ii : -- tsrc  = 210.80.199.3:0
14/04/28 16:00:44 ii : -- tdst  = 192.168.1.102:0
14/04/28 16:00:44 DB : policy ref increment ( ref count = 1, policy count = 12 )
14/04/28 16:00:44 DB : policy added
14/04/28 16:00:44 DB : policy ref decrement ( ref count = 0, policy count = 13 )
14/04/28 16:00:44 K< : recv X_SPDADD UNSPEC pfkey message
14/04/28 16:00:44 ii : - id    = 0
14/04/28 16:00:44 ii : - type  = IPSEC
14/04/28 16:00:44 ii : - dir   = OUTBOUND
14/04/28 16:00:44 ii : - transform #0
14/04/28 16:00:44 ii : -- proto = 50
14/04/28 16:00:44 ii : -- level = REQUIRE
14/04/28 16:00:44 ii : -- mode  = TUNNEL
14/04/28 16:00:44 ii : -- reqid = 0
14/04/28 16:00:44 ii : -- tsrc  = 192.168.1.102:0
14/04/28 16:00:44 ii : -- tdst  = 210.80.199.3:0
14/04/28 16:00:44 DB : policy ref increment ( ref count = 1, policy count = 13 )
14/04/28 16:00:44 DB : policy added
14/04/28 16:00:44 ii : installed divert rule for 205.197.192.150/255.255.255.255
14/04/28 16:00:44 DB : policy ref decrement ( ref count = 0, policy count = 14 )
14/04/28 16:00:44 K< : recv X_SPDADD UNSPEC pfkey message
14/04/28 16:00:44 ii : - id    = 0
14/04/28 16:00:44 ii : - type  = IPSEC
14/04/28 16:00:44 ii : - dir   = INBOUND
14/04/28 16:00:44 ii : - transform #0
14/04/28 16:00:44 ii : -- proto = 50
14/04/28 16:00:44 ii : -- level = REQUIRE
14/04/28 16:00:44 ii : -- mode  = TUNNEL
14/04/28 16:00:44 ii : -- reqid = 0
14/04/28 16:00:44 ii : -- tsrc  = 210.80.199.3:0
14/04/28 16:00:44 ii : -- tdst  = 192.168.1.102:0
14/04/28 16:00:44 DB : policy ref increment ( ref count = 1, policy count = 14 )
14/04/28 16:00:44 DB : policy added
14/04/28 16:00:44 DB : policy ref decrement ( ref count = 0, policy count = 15 )
14/04/28 16:00:44 K< : recv X_SPDADD UNSPEC pfkey message
14/04/28 16:00:44 ii : - id    = 0
14/04/28 16:00:44 ii : - type  = IPSEC
14/04/28 16:00:44 ii : - dir   = OUTBOUND
14/04/28 16:00:44 ii : - transform #0
14/04/28 16:00:44 ii : -- proto = 50
14/04/28 16:00:44 ii : -- level = REQUIRE
14/04/28 16:00:44 ii : -- mode  = TUNNEL
14/04/28 16:00:44 ii : -- reqid = 0
14/04/28 16:00:44 ii : -- tsrc  = 192.168.1.102:0
14/04/28 16:00:44 ii : -- tdst  = 210.80.199.3:0
14/04/28 16:00:44 DB : policy ref increment ( ref count = 1, policy count = 15 )
14/04/28 16:00:44 DB : policy added
14/04/28 16:00:44 ii : installed divert rule for 205.197.192.151/255.255.255.255
14/04/28 16:00:44 DB : policy ref decrement ( ref count = 0, policy count = 16 )
14/04/28 16:00:45 ii : inspecting ARP request ...
14/04/28 16:00:45 DB : policy not found
14/04/28 16:00:45 ii : ignoring ARP request for 10.120.2.101, no policy found
14/04/28 16:00:45 K< : recv GET UNSPEC pfkey message
14/04/28 16:00:45 DB : sa found
14/04/28 16:00:45 DB : sa ref increment ( ref count = 2, sa count = 1 )
14/04/28 16:00:45 DB : sa ref decrement ( ref count = 1, sa count = 1 )
14/04/28 16:00:46 ii : inspecting ARP request ...
14/04/28 16:00:46 DB : policy not found
14/04/28 16:00:46 ii : ignoring ARP request for 10.120.2.101, no policy found
14/04/28 16:00:46 K< : recv GET UNSPEC pfkey message
14/04/28 16:00:46 DB : sa found
14/04/28 16:00:46 DB : sa ref increment ( ref count = 2, sa count = 1 )
14/04/28 16:00:46 DB : sa ref decrement ( ref count = 1, sa count = 1 )
14/04/28 16:00:47 ii : inspecting ARP request ...
14/04/28 16:00:47 DB : policy not found
14/04/28 16:00:47 ii : ignoring ARP request for 10.120.2.101, no policy found
14/04/28 16:00:47 K< : recv GET UNSPEC pfkey message
14/04/28 16:00:47 DB : sa found
14/04/28 16:00:47 DB : sa ref increment ( ref count = 2, sa count = 1 )
14/04/28 16:00:47 DB : sa ref decrement ( ref count = 1, sa count = 1 )
14/04/28 16:00:48 ii : inspecting ARP request ...
14/04/28 16:00:48 ii : ignoring ARP request for 10.120.2.101,
duplicate address check
14/04/28 16:00:48 ii : inspecting ARP request ...
14/04/28 16:00:48 DB : policy found
14/04/28 16:00:48 DB : policy not found
14/04/28 16:00:48 ii : spoofing ARP response for 10.1.4.201
14/04/28 16:00:48 DB : policy found
14/04/28 16:00:48 DB : policy ref increment ( ref count = 1, policy count = 16 )
14/04/28 16:00:48 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 16:00:48 K> : sent ACQUIRE UNSPEC pfkey message
14/04/28 16:00:48 ii : - id   = 63
14/04/28 16:00:48 K> : sent ACQUIRE UNSPEC pfkey message
14/04/28 16:00:48 ii : - id   = 63
14/04/28 16:00:48 ii : queueing ip packet
14/04/28 16:00:48 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 16:00:48 K< : recv GETSPI ESP pfkey message
14/04/28 16:00:48 ii : allocated spi for ESP sa
14/04/28 16:00:48 ii : - spi  = 0x5afd9425
14/04/28 16:00:48 ii : - src  = 210.80.199.3:4500
14/04/28 16:00:48 ii : - dst  = 192.168.1.102:4500
14/04/28 16:00:48 DB : sa ref increment ( ref count = 1, sa count = 1 )
14/04/28 16:00:48 DB : sa added
14/04/28 16:00:48 DB : sa ref increment ( ref count = 2, sa count = 2 )
14/04/28 16:00:48 DB : sa ref decrement ( ref count = 1, sa count = 2 )
14/04/28 16:00:48 K> : sent GETSPI ESP pfkey message
14/04/28 16:00:48 K> : sent GETSPI ESP pfkey message
14/04/28 16:00:48 ii : inspecting ARP request ...
14/04/28 16:00:48 DB : policy not found
14/04/28 16:00:48 ii : ignoring ARP request for 192.168.1.1, no policy found
14/04/28 16:00:48 K< : recv GET UNSPEC pfkey message
14/04/28 16:00:48 DB : sa found
14/04/28 16:00:48 DB : sa ref increment ( ref count = 2, sa count = 2 )
14/04/28 16:00:48 DB : sa ref decrement ( ref count = 1, sa count = 2 )
14/04/28 16:00:48 K< : recv GET UNSPEC pfkey message
14/04/28 16:00:48 DB : sa found
14/04/28 16:00:48 DB : sa ref increment ( ref count = 2, sa count = 2 )
14/04/28 16:00:48 DB : sa ref decrement ( ref count = 1, sa count = 2 )
14/04/28 16:00:49 ii : inspecting ARP request ...
14/04/28 16:00:49 DB : policy found
14/04/28 16:00:49 DB : policy not found
14/04/28 16:00:49 ii : spoofing ARP response for 10.1.4.202
14/04/28 16:00:49 DB : policy found
14/04/28 16:00:49 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 16:00:49 ii : queueing ip packet
14/04/28 16:00:49 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 16:00:49 DB : policy found
14/04/28 16:00:49 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 16:00:49 ii : queueing ip packet
14/04/28 16:00:49 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 16:00:49 DB : policy found
14/04/28 16:00:49 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 16:00:49 ii : queueing ip packet
14/04/28 16:00:49 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 16:00:49 DB : policy found
14/04/28 16:00:49 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 16:00:49 ii : queueing ip packet
14/04/28 16:00:49 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 16:00:49 K< : recv GET UNSPEC pfkey message
14/04/28 16:00:49 DB : sa found
14/04/28 16:00:49 DB : sa ref increment ( ref count = 2, sa count = 2 )
14/04/28 16:00:49 DB : sa ref decrement ( ref count = 1, sa count = 2 )
14/04/28 16:00:49 K< : recv GET UNSPEC pfkey message
14/04/28 16:00:49 DB : sa found
14/04/28 16:00:49 DB : sa ref increment ( ref count = 2, sa count = 2 )
14/04/28 16:00:49 DB : sa ref decrement ( ref count = 1, sa count = 2 )
14/04/28 16:00:50 DB : policy found
14/04/28 16:00:50 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 16:00:50 ii : queueing ip packet
14/04/28 16:00:50 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 16:00:50 DB : policy found
14/04/28 16:00:50 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 16:00:50 ii : queueing ip packet
14/04/28 16:00:50 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 16:00:50 K< : recv GET UNSPEC pfkey message
14/04/28 16:00:50 DB : sa found
14/04/28 16:00:50 DB : sa ref increment ( ref count = 2, sa count = 2 )
14/04/28 16:00:50 DB : sa ref decrement ( ref count = 1, sa count = 2 )
14/04/28 16:00:50 K< : recv GET UNSPEC pfkey message
14/04/28 16:00:50 DB : sa found
14/04/28 16:00:50 DB : sa ref increment ( ref count = 2, sa count = 2 )
14/04/28 16:00:50 DB : sa ref decrement ( ref count = 1, sa count = 2 )
14/04/28 16:00:51 DB : policy found
14/04/28 16:00:51 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 16:00:51 ii : queueing ip packet
14/04/28 16:00:51 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 16:00:51 DB : policy found
14/04/28 16:00:51 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 16:00:51 ii : queueing ip packet
14/04/28 16:00:51 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 16:00:51 DB : policy found
14/04/28 16:00:51 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 16:00:51 ii : queueing ip packet
14/04/28 16:00:51 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 16:00:51 DB : policy found
14/04/28 16:00:51 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 16:00:51 ii : queueing ip packet
14/04/28 16:00:51 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 16:00:51 K< : recv GET UNSPEC pfkey message
14/04/28 16:00:51 DB : sa found
14/04/28 16:00:51 DB : sa ref increment ( ref count = 2, sa count = 2 )
14/04/28 16:00:51 DB : sa ref decrement ( ref count = 1, sa count = 2 )
14/04/28 16:00:51 K< : recv GET UNSPEC pfkey message
14/04/28 16:00:51 DB : sa found
14/04/28 16:00:51 DB : sa ref increment ( ref count = 2, sa count = 2 )
14/04/28 16:00:51 DB : sa ref decrement ( ref count = 1, sa count = 2 )
14/04/28 16:00:52 DB : policy found
14/04/28 16:00:52 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 16:00:52 ii : queueing ip packet
14/04/28 16:00:52 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 16:00:52 DB : policy found
14/04/28 16:00:52 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 16:00:52 ii : queueing ip packet
14/04/28 16:00:52 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 16:00:52 DB : policy found
14/04/28 16:00:52 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 16:00:52 ii : queueing ip packet
14/04/28 16:00:52 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 16:00:52 DB : policy found
14/04/28 16:00:52 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 16:00:52 ii : queueing ip packet
14/04/28 16:00:52 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 16:00:53 K< : recv GET UNSPEC pfkey message
14/04/28 16:00:53 DB : sa found
14/04/28 16:00:53 DB : sa ref increment ( ref count = 2, sa count = 2 )
14/04/28 16:00:53 DB : sa ref decrement ( ref count = 1, sa count = 2 )
14/04/28 16:00:53 K< : recv GET UNSPEC pfkey message
14/04/28 16:00:53 DB : sa found
14/04/28 16:00:53 DB : sa ref increment ( ref count = 2, sa count = 2 )
14/04/28 16:00:53 DB : sa ref decrement ( ref count = 1, sa count = 2 )
14/04/28 16:00:53 DB : policy found
14/04/28 16:00:53 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 16:00:53 ii : queueing ip packet
14/04/28 16:00:53 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 16:00:54 K< : recv GET UNSPEC pfkey message
14/04/28 16:00:54 DB : sa found
14/04/28 16:00:54 DB : sa ref increment ( ref count = 2, sa count = 2 )
14/04/28 16:00:54 DB : sa ref decrement ( ref count = 1, sa count = 2 )
14/04/28 16:00:54 K< : recv GET UNSPEC pfkey message
14/04/28 16:00:54 DB : sa found
14/04/28 16:00:54 DB : sa ref increment ( ref count = 2, sa count = 2 )
14/04/28 16:00:54 DB : sa ref decrement ( ref count = 1, sa count = 2 )
14/04/28 16:00:54 DB : policy found
14/04/28 16:00:54 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 16:00:54 ii : queueing ip packet
14/04/28 16:00:54 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 16:00:54 ii : inspecting ARP request ...
14/04/28 16:00:54 DB : policy not found
14/04/28 16:00:54 ii : ignoring ARP request for 192.168.1.1, no policy found
14/04/28 16:00:55 K< : recv GET UNSPEC pfkey message
14/04/28 16:00:55 DB : sa found
14/04/28 16:00:55 DB : sa ref increment ( ref count = 2, sa count = 2 )
14/04/28 16:00:55 DB : sa ref decrement ( ref count = 1, sa count = 2 )
14/04/28 16:00:55 K< : recv GET UNSPEC pfkey message
14/04/28 16:00:55 DB : sa found
14/04/28 16:00:55 DB : sa ref increment ( ref count = 2, sa count = 2 )
14/04/28 16:00:55 DB : sa ref decrement ( ref count = 1, sa count = 2 )
14/04/28 16:00:55 DB : policy found
14/04/28 16:00:55 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 16:00:55 ii : queueing ip packet
14/04/28 16:00:55 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 16:00:55 DB : policy found
14/04/28 16:00:55 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 16:00:55 ii : queueing ip packet
14/04/28 16:00:55 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 16:00:55 DB : policy found
14/04/28 16:00:55 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 16:00:55 ii : queueing ip packet
14/04/28 16:00:55 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 16:00:56 K< : recv GET UNSPEC pfkey message
14/04/28 16:00:56 DB : sa found
14/04/28 16:00:56 DB : sa ref increment ( ref count = 2, sa count = 2 )
14/04/28 16:00:56 DB : sa ref decrement ( ref count = 1, sa count = 2 )
14/04/28 16:00:56 K< : recv GET UNSPEC pfkey message
14/04/28 16:00:56 DB : sa found
14/04/28 16:00:56 DB : sa ref increment ( ref count = 2, sa count = 2 )
14/04/28 16:00:56 DB : sa ref decrement ( ref count = 1, sa count = 2 )
14/04/28 16:00:56 DB : policy found
14/04/28 16:00:56 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 16:00:56 ii : queueing ip packet
14/04/28 16:00:56 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 16:00:56 DB : policy found
14/04/28 16:00:56 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 16:00:56 ii : queueing ip packet
14/04/28 16:00:56 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 16:00:56 DB : policy found
14/04/28 16:00:56 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 16:00:56 ii : queueing ip packet
14/04/28 16:00:56 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 16:00:56 DB : policy found
14/04/28 16:00:56 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 16:00:56 ii : queueing ip packet
14/04/28 16:00:56 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 16:00:56 DB : policy found
14/04/28 16:00:56 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 16:00:56 ii : queueing ip packet
14/04/28 16:00:56 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 16:00:56 DB : policy found
14/04/28 16:00:56 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 16:00:56 ii : queueing ip packet
14/04/28 16:00:56 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 16:00:56 DB : policy found
14/04/28 16:00:56 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 16:00:56 ii : queueing ip packet
14/04/28 16:00:56 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 16:00:56 DB : policy found
14/04/28 16:00:56 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 16:00:56 ii : queueing ip packet
14/04/28 16:00:56 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 16:00:57 K< : recv GET UNSPEC pfkey message
14/04/28 16:00:57 DB : sa found
14/04/28 16:00:57 DB : sa ref increment ( ref count = 2, sa count = 2 )
14/04/28 16:00:57 DB : sa ref decrement ( ref count = 1, sa count = 2 )
14/04/28 16:00:57 K< : recv GET UNSPEC pfkey message
14/04/28 16:00:57 DB : sa found
14/04/28 16:00:57 DB : sa ref increment ( ref count = 2, sa count = 2 )
14/04/28 16:00:57 DB : sa ref decrement ( ref count = 1, sa count = 2 )
14/04/28 16:00:58 K< : recv GET UNSPEC pfkey message
14/04/28 16:00:58 DB : sa found
14/04/28 16:00:58 DB : sa ref increment ( ref count = 2, sa count = 2 )
14/04/28 16:00:58 DB : sa ref decrement ( ref count = 1, sa count = 2 )
14/04/28 16:00:58 K< : recv GET UNSPEC pfkey message
14/04/28 16:00:58 DB : sa found
14/04/28 16:00:58 DB : sa ref increment ( ref count = 2, sa count = 2 )
14/04/28 16:00:58 DB : sa ref decrement ( ref count = 1, sa count = 2 )
14/04/28 16:00:58 DB : policy found
14/04/28 16:00:58 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 16:00:58 ii : queueing ip packet
14/04/28 16:00:58 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 16:00:58 DB : policy found
14/04/28 16:00:58 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 16:00:58 ii : queueing ip packet
14/04/28 16:00:58 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 16:00:58 DB : policy found
14/04/28 16:00:58 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 16:00:58 ii : queueing ip packet
14/04/28 16:00:58 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 16:00:59 K< : recv GET UNSPEC pfkey message
14/04/28 16:00:59 DB : sa found
14/04/28 16:00:59 DB : sa ref increment ( ref count = 2, sa count = 2 )
14/04/28 16:00:59 DB : sa ref decrement ( ref count = 1, sa count = 2 )
14/04/28 16:00:59 K< : recv GET UNSPEC pfkey message
14/04/28 16:00:59 DB : sa found
14/04/28 16:00:59 DB : sa ref increment ( ref count = 2, sa count = 2 )
14/04/28 16:00:59 DB : sa ref decrement ( ref count = 1, sa count = 2 )
14/04/28 16:00:59 ii : sa never reached maturity
14/04/28 16:00:59 ii : removed sa divert rule for 210.80.199.3->192.168.1.102
14/04/28 16:00:59 DB : sa deleted ( sa count = 1 )
14/04/28 16:01:00 K< : recv GET UNSPEC pfkey message
14/04/28 16:01:00 DB : sa not found
14/04/28 16:01:00 ii : failed to locate UNSPEC sa for get
14/04/28 16:01:00 ii : - spi  = 0xdc705fe1
14/04/28 16:01:00 K< : recv GET UNSPEC pfkey message
14/04/28 16:01:00 DB : sa found
14/04/28 16:01:00 DB : sa ref increment ( ref count = 2, sa count = 1 )
14/04/28 16:01:00 DB : sa ref decrement ( ref count = 1, sa count = 1 )
14/04/28 16:01:01 K< : recv GET UNSPEC pfkey message
14/04/28 16:01:01 DB : sa found
14/04/28 16:01:01 DB : sa ref increment ( ref count = 2, sa count = 1 )
14/04/28 16:01:01 DB : sa ref decrement ( ref count = 1, sa count = 1 )
14/04/28 16:01:02 K< : recv GET UNSPEC pfkey message
14/04/28 16:01:02 DB : sa found
14/04/28 16:01:02 DB : sa ref increment ( ref count = 2, sa count = 1 )
14/04/28 16:01:02 DB : sa ref decrement ( ref count = 1, sa count = 1 )
14/04/28 16:01:02 DB : policy found
14/04/28 16:01:02 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 16:01:02 ii : queueing ip packet
14/04/28 16:01:02 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 16:01:02 DB : policy found
14/04/28 16:01:02 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 16:01:02 ii : queueing ip packet
14/04/28 16:01:02 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 16:01:03 K< : recv GET UNSPEC pfkey message
14/04/28 16:01:03 DB : sa found
14/04/28 16:01:03 DB : sa ref increment ( ref count = 2, sa count = 1 )
14/04/28 16:01:03 DB : sa ref decrement ( ref count = 1, sa count = 1 )
14/04/28 16:01:03 ii : sa never reached maturity
14/04/28 16:01:03 ii : removed sa divert rule for 210.80.199.3->192.168.1.102
14/04/28 16:01:03 DB : sa deleted ( sa count = 0 )
14/04/28 16:01:03 ii : inspecting ARP request ...
14/04/28 16:01:03 DB : policy not found
14/04/28 16:01:03 ii : ignoring ARP request for 192.168.1.1, no policy found
14/04/28 16:01:03 DB : policy found
14/04/28 16:01:03 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 16:01:03 ii : queueing ip packet
14/04/28 16:01:03 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 16:01:03 DB : policy found
14/04/28 16:01:03 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 16:01:03 ii : queueing ip packet
14/04/28 16:01:03 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 16:01:04 ii : aquire timelimit expired
14/04/28 16:01:04 K< : recv GET UNSPEC pfkey message
14/04/28 16:01:04 DB : policy ref decrement ( ref count = 0, policy count = 16 )
14/04/28 16:01:04 DB : sa not found
14/04/28 16:01:04 ii : failed to locate UNSPEC sa for get
14/04/28 16:01:04 ii : - spi  = 0x5afd9425
14/04/28 16:01:05 DB : policy found
14/04/28 16:01:05 DB : policy ref increment ( ref count = 1, policy count = 16 )
14/04/28 16:01:05 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 16:01:05 K> : sent ACQUIRE UNSPEC pfkey message
14/04/28 16:01:05 ii : - id   = 63
14/04/28 16:01:05 K> : sent ACQUIRE UNSPEC pfkey message
14/04/28 16:01:05 ii : - id   = 63
14/04/28 16:01:05 ii : queueing ip packet
14/04/28 16:01:05 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 16:01:05 K< : recv GETSPI ESP pfkey message
14/04/28 16:01:05 ii : allocated spi for ESP sa
14/04/28 16:01:05 ii : - spi  = 0xe657832e
14/04/28 16:01:05 ii : - src  = 210.80.199.3:4500
14/04/28 16:01:05 ii : - dst  = 192.168.1.102:4500
14/04/28 16:01:05 DB : sa ref increment ( ref count = 1, sa count = 0 )
14/04/28 16:01:05 DB : sa added
14/04/28 16:01:05 DB : sa ref increment ( ref count = 2, sa count = 1 )
14/04/28 16:01:05 DB : sa ref decrement ( ref count = 1, sa count = 1 )
14/04/28 16:01:05 K> : sent GETSPI ESP pfkey message
14/04/28 16:01:05 K> : sent GETSPI ESP pfkey message
14/04/28 16:01:05 DB : policy found
14/04/28 16:01:05 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 16:01:05 ii : queueing ip packet
14/04/28 16:01:05 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 16:01:06 K< : recv GET UNSPEC pfkey message
14/04/28 16:01:06 DB : sa found
14/04/28 16:01:06 DB : sa ref increment ( ref count = 2, sa count = 1 )
14/04/28 16:01:06 DB : sa ref decrement ( ref count = 1, sa count = 1 )
14/04/28 16:01:07 K< : recv GET UNSPEC pfkey message
14/04/28 16:01:07 DB : sa found
14/04/28 16:01:07 DB : sa ref increment ( ref count = 2, sa count = 1 )
14/04/28 16:01:07 DB : sa ref decrement ( ref count = 1, sa count = 1 )
14/04/28 16:01:08 K< : recv GET UNSPEC pfkey message
14/04/28 16:01:08 DB : sa found
14/04/28 16:01:08 DB : sa ref increment ( ref count = 2, sa count = 1 )
14/04/28 16:01:08 DB : sa ref decrement ( ref count = 1, sa count = 1 )
14/04/28 16:01:09 K< : recv GET UNSPEC pfkey message
14/04/28 16:01:09 DB : sa found
14/04/28 16:01:09 DB : sa ref increment ( ref count = 2, sa count = 1 )
14/04/28 16:01:09 DB : sa ref decrement ( ref count = 1, sa count = 1 )
14/04/28 16:01:10 ii : inspecting ARP request ...
14/04/28 16:01:10 DB : policy not found
14/04/28 16:01:10 ii : ignoring ARP request for 192.168.1.1, no policy found
14/04/28 16:01:10 K< : recv GET UNSPEC pfkey message
14/04/28 16:01:10 DB : sa found
14/04/28 16:01:10 DB : sa ref increment ( ref count = 2, sa count = 1 )
14/04/28 16:01:10 DB : sa ref decrement ( ref count = 1, sa count = 1 )
14/04/28 16:01:11 DB : policy found
14/04/28 16:01:11 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 16:01:11 ii : queueing ip packet
14/04/28 16:01:11 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 16:01:11 K< : recv GET UNSPEC pfkey message
14/04/28 16:01:11 DB : sa found
14/04/28 16:01:11 DB : sa ref increment ( ref count = 2, sa count = 1 )
14/04/28 16:01:11 DB : sa ref decrement ( ref count = 1, sa count = 1 )
14/04/28 16:01:12 K< : recv GET UNSPEC pfkey message
14/04/28 16:01:12 DB : sa found
14/04/28 16:01:12 DB : sa ref increment ( ref count = 2, sa count = 1 )
14/04/28 16:01:12 DB : sa ref decrement ( ref count = 1, sa count = 1 )
14/04/28 16:01:12 DB : policy found
14/04/28 16:01:12 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 16:01:12 ii : queueing ip packet
14/04/28 16:01:12 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 16:01:13 K< : recv GET UNSPEC pfkey message
14/04/28 16:01:13 DB : sa found
14/04/28 16:01:13 DB : sa ref increment ( ref count = 2, sa count = 1 )
14/04/28 16:01:13 DB : sa ref decrement ( ref count = 1, sa count = 1 )
14/04/28 16:01:14 DB : policy found
14/04/28 16:01:14 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 16:01:14 ii : queueing ip packet
14/04/28 16:01:14 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 16:01:14 K< : recv GET UNSPEC pfkey message
14/04/28 16:01:14 DB : sa found
14/04/28 16:01:14 DB : sa ref increment ( ref count = 2, sa count = 1 )
14/04/28 16:01:14 DB : sa ref decrement ( ref count = 1, sa count = 1 )
14/04/28 16:01:15 K< : recv GET UNSPEC pfkey message
14/04/28 16:01:15 DB : sa found
14/04/28 16:01:15 DB : sa ref increment ( ref count = 2, sa count = 1 )
14/04/28 16:01:15 DB : sa ref decrement ( ref count = 1, sa count = 1 )
14/04/28 16:01:15 K< : recv X_SPDDELETE2 UNSPEC pfkey message
14/04/28 16:01:15 ii : - id   = 62
14/04/28 16:01:15 ii : - type = IPSEC
14/04/28 16:01:15 ii : - dir  = INBOUND
14/04/28 16:01:15 DB : policy found
14/04/28 16:01:15 DB : policy ref increment ( ref count = 1, policy count = 16 )
14/04/28 16:01:15 DB : policy deleted ( policy count = 15 )
14/04/28 16:01:15 K< : recv X_SPDDELETE2 UNSPEC pfkey message
14/04/28 16:01:15 ii : - id   = 63
14/04/28 16:01:15 ii : - type = IPSEC
14/04/28 16:01:15 ii : - dir  = OUTBOUND
14/04/28 16:01:15 DB : policy found
14/04/28 16:01:15 DB : policy ref increment ( ref count = 2, policy count = 15 )
14/04/28 16:01:15 ii : removed divert rule for 10.0.0.0/255.0.0.0
14/04/28 16:01:15 DB : policy deleted ( policy count = 14 )
14/04/28 16:01:15 K< : recv X_SPDDELETE2 UNSPEC pfkey message
14/04/28 16:01:15 ii : - id   = 64
14/04/28 16:01:15 ii : - type = IPSEC
14/04/28 16:01:15 ii : - dir  = INBOUND
14/04/28 16:01:15 DB : policy found
14/04/28 16:01:15 DB : policy ref increment ( ref count = 1, policy count = 14 )
14/04/28 16:01:15 DB : policy deleted ( policy count = 13 )
14/04/28 16:01:15 K< : recv X_SPDDELETE2 UNSPEC pfkey message
14/04/28 16:01:15 ii : - id   = 66
14/04/28 16:01:15 ii : - type = IPSEC
14/04/28 16:01:15 ii : - dir  = OUTBOUND
14/04/28 16:01:15 DB : policy found
14/04/28 16:01:15 DB : policy ref increment ( ref count = 1, policy count = 13 )
14/04/28 16:01:15 ii : removed divert rule for 192.168.90.0/255.255.255.0
14/04/28 16:01:15 DB : policy deleted ( policy count = 12 )
14/04/28 16:01:15 K< : recv X_SPDDELETE2 UNSPEC pfkey message
14/04/28 16:01:15 ii : - id   = 67
14/04/28 16:01:15 ii : - type = IPSEC
14/04/28 16:01:15 ii : - dir  = INBOUND
14/04/28 16:01:15 DB : policy found
14/04/28 16:01:15 DB : policy ref increment ( ref count = 1, policy count = 12 )
14/04/28 16:01:15 DB : policy deleted ( policy count = 11 )
14/04/28 16:01:15 K< : recv X_SPDDELETE2 UNSPEC pfkey message
14/04/28 16:01:15 ii : - id   = 68
14/04/28 16:01:15 ii : - type = IPSEC
14/04/28 16:01:15 ii : - dir  = OUTBOUND
14/04/28 16:01:15 DB : policy found
14/04/28 16:01:15 DB : policy ref increment ( ref count = 1, policy count = 11 )
14/04/28 16:01:15 ii : removed divert rule for 172.16.30.0/255.255.255.0
14/04/28 16:01:15 DB : policy deleted ( policy count = 10 )
14/04/28 16:01:15 K< : recv X_SPDDELETE2 UNSPEC pfkey message
14/04/28 16:01:15 ii : - id   = 69
14/04/28 16:01:15 ii : - type = IPSEC
14/04/28 16:01:15 ii : - dir  = INBOUND
14/04/28 16:01:15 DB : policy found
14/04/28 16:01:15 DB : policy ref increment ( ref count = 1, policy count = 10 )
14/04/28 16:01:15 DB : policy deleted ( policy count = 9 )
14/04/28 16:01:15 K< : recv X_SPDDELETE2 UNSPEC pfkey message
14/04/28 16:01:15 ii : - id   = 70
14/04/28 16:01:15 ii : - type = IPSEC
14/04/28 16:01:15 ii : - dir  = OUTBOUND
14/04/28 16:01:15 DB : policy found
14/04/28 16:01:15 DB : policy ref increment ( ref count = 1, policy count = 9 )
14/04/28 16:01:15 ii : removed divert rule for 192.168.3.0/255.255.255.0
14/04/28 16:01:15 DB : policy deleted ( policy count = 8 )
14/04/28 16:01:15 K< : recv X_SPDDELETE2 UNSPEC pfkey message
14/04/28 16:01:15 ii : - id   = 71
14/04/28 16:01:15 ii : - type = IPSEC
14/04/28 16:01:15 ii : - dir  = INBOUND
14/04/28 16:01:15 DB : policy found
14/04/28 16:01:15 DB : policy ref increment ( ref count = 1, policy count = 8 )
14/04/28 16:01:15 DB : policy deleted ( policy count = 7 )
14/04/28 16:01:15 K< : recv X_SPDDELETE2 UNSPEC pfkey message
14/04/28 16:01:15 ii : - id   = 72
14/04/28 16:01:15 ii : - type = IPSEC
14/04/28 16:01:15 ii : - dir  = OUTBOUND
14/04/28 16:01:15 DB : policy found
14/04/28 16:01:15 DB : policy ref increment ( ref count = 1, policy count = 7 )
14/04/28 16:01:15 ii : removed divert rule for 205.197.192.150/255.255.255.255
14/04/28 16:01:15 DB : policy deleted ( policy count = 6 )
14/04/28 16:01:15 K< : recv X_SPDDELETE2 UNSPEC pfkey message
14/04/28 16:01:15 ii : - id   = 73
14/04/28 16:01:15 ii : - type = IPSEC
14/04/28 16:01:15 ii : - dir  = INBOUND
14/04/28 16:01:15 DB : policy found
14/04/28 16:01:15 DB : policy ref increment ( ref count = 1, policy count = 6 )
14/04/28 16:01:15 DB : policy deleted ( policy count = 5 )
14/04/28 16:01:15 K< : recv X_SPDDELETE2 UNSPEC pfkey message
14/04/28 16:01:15 ii : - id   = 74
14/04/28 16:01:15 ii : - type = IPSEC
14/04/28 16:01:15 ii : - dir  = OUTBOUND
14/04/28 16:01:15 DB : policy found
14/04/28 16:01:15 DB : policy ref increment ( ref count = 1, policy count = 5 )
14/04/28 16:01:15 ii : removed divert rule for 205.197.192.151/255.255.255.255
14/04/28 16:01:15 DB : policy deleted ( policy count = 4 )
14/04/28 16:01:15 K< : recv X_SPDDELETE2 UNSPEC pfkey message
14/04/28 16:01:15 ii : - id   = 60
14/04/28 16:01:15 ii : - type = NONE
14/04/28 16:01:15 ii : - dir  = INBOUND
14/04/28 16:01:15 DB : policy found
14/04/28 16:01:15 DB : policy ref increment ( ref count = 1, policy count = 4 )
14/04/28 16:01:15 DB : policy deleted ( policy count = 3 )
14/04/28 16:01:15 K< : recv X_SPDDELETE2 UNSPEC pfkey message
14/04/28 16:01:15 ii : - id   = 61
14/04/28 16:01:15 ii : - type = NONE
14/04/28 16:01:15 ii : - dir  = OUTBOUND
14/04/28 16:01:15 DB : policy found
14/04/28 16:01:15 DB : policy ref increment ( ref count = 1, policy count = 3 )
14/04/28 16:01:15 ii : removed accept rule for 192.168.1.1/255.255.255.255
14/04/28 16:01:15 DB : policy deleted ( policy count = 2 )
14/04/28 16:01:15 K< : recv X_SPDDELETE2 UNSPEC pfkey message
14/04/28 16:01:15 ii : - id   = 58
14/04/28 16:01:15 ii : - type = NONE
14/04/28 16:01:15 ii : - dir  = INBOUND
14/04/28 16:01:15 DB : policy found
14/04/28 16:01:15 DB : policy ref increment ( ref count = 1, policy count = 2 )
14/04/28 16:01:15 DB : policy deleted ( policy count = 1 )
14/04/28 16:01:15 K< : recv X_SPDDELETE2 UNSPEC pfkey message
14/04/28 16:01:15 ii : - id   = 59
14/04/28 16:01:15 ii : - type = NONE
14/04/28 16:01:15 ii : - dir  = OUTBOUND
14/04/28 16:01:15 DB : policy found
14/04/28 16:01:15 DB : policy ref increment ( ref count = 1, policy count = 1 )
14/04/28 16:01:15 ii : removed accept rule for 210.80.199.3/255.255.255.255
14/04/28 16:01:15 DB : policy deleted ( policy count = 0 )
14/04/28 16:01:15 ii : removed mirror rule ( policycount 0 )
14/04/28 16:01:16 K< : recv GET UNSPEC pfkey message
14/04/28 16:01:16 DB : sa found
14/04/28 16:01:16 DB : sa ref increment ( ref count = 2, sa count = 1 )
14/04/28 16:01:16 DB : sa ref decrement ( ref count = 1, sa count = 1 )
14/04/28 16:01:17 K< : recv GET UNSPEC pfkey message
14/04/28 16:01:17 DB : sa found
14/04/28 16:01:17 DB : sa ref increment ( ref count = 2, sa count = 1 )
14/04/28 16:01:17 DB : sa ref decrement ( ref count = 1, sa count = 1 )
14/04/28 16:01:18 K< : recv GET UNSPEC pfkey message
14/04/28 16:01:18 DB : sa found
14/04/28 16:01:18 DB : sa ref increment ( ref count = 2, sa count = 1 )
14/04/28 16:01:18 DB : sa ref decrement ( ref count = 1, sa count = 1 )
14/04/28 16:01:19 K< : recv GET UNSPEC pfkey message
14/04/28 16:01:19 DB : sa found
14/04/28 16:01:19 DB : sa ref increment ( ref count = 2, sa count = 1 )
14/04/28 16:01:19 DB : sa ref decrement ( ref count = 1, sa count = 1 )
14/04/28 16:01:19 K< : recv X_SPDADD UNSPEC pfkey message
14/04/28 16:01:19 ii : - id    = 0
14/04/28 16:01:19 ii : - type  = NONE
14/04/28 16:01:19 ii : - dir   = INBOUND
14/04/28 16:01:19 DB : policy ref increment ( ref count = 1, policy count = 0 )
14/04/28 16:01:19 DB : policy added
14/04/28 16:01:19 DB : policy ref decrement ( ref count = 0, policy count = 1 )
14/04/28 16:01:19 ii : removed arp mirror rule ( policycount 1 )
14/04/28 16:01:19 K< : recv X_SPDADD UNSPEC pfkey message
14/04/28 16:01:19 ii : - id    = 0
14/04/28 16:01:19 ii : - type  = NONE
14/04/28 16:01:19 ii : - dir   = OUTBOUND
14/04/28 16:01:19 DB : policy ref increment ( ref count = 1, policy count = 1 )
14/04/28 16:01:19 DB : policy added
14/04/28 16:01:19 ii : installed accept rule for 210.80.199.3/255.255.255.255
14/04/28 16:01:19 DB : policy ref decrement ( ref count = 0, policy count = 2 )
14/04/28 16:01:19 K< : recv X_SPDADD UNSPEC pfkey message
14/04/28 16:01:19 ii : - id    = 0
14/04/28 16:01:19 ii : - type  = NONE
14/04/28 16:01:19 ii : - dir   = INBOUND
14/04/28 16:01:19 DB : policy ref increment ( ref count = 1, policy count = 2 )
14/04/28 16:01:19 DB : policy added
14/04/28 16:01:19 DB : policy ref decrement ( ref count = 0, policy count = 3 )
14/04/28 16:01:19 K< : recv X_SPDADD UNSPEC pfkey message
14/04/28 16:01:19 ii : - id    = 0
14/04/28 16:01:19 ii : - type  = NONE
14/04/28 16:01:19 ii : - dir   = OUTBOUND
14/04/28 16:01:19 DB : policy ref increment ( ref count = 1, policy count = 3 )
14/04/28 16:01:19 DB : policy added
14/04/28 16:01:19 ii : installed accept rule for 192.168.1.1/255.255.255.255
14/04/28 16:01:19 DB : policy ref decrement ( ref count = 0, policy count = 4 )
14/04/28 16:01:19 K< : recv X_SPDADD UNSPEC pfkey message
14/04/28 16:01:19 ii : - id    = 0
14/04/28 16:01:19 ii : - type  = IPSEC
14/04/28 16:01:19 ii : - dir   = INBOUND
14/04/28 16:01:19 ii : - transform #0
14/04/28 16:01:19 ii : -- proto = 50
14/04/28 16:01:19 ii : -- level = REQUIRE
14/04/28 16:01:19 ii : -- mode  = TUNNEL
14/04/28 16:01:19 ii : -- reqid = 0
14/04/28 16:01:19 ii : -- tsrc  = 210.80.199.3:0
14/04/28 16:01:19 ii : -- tdst  = 192.168.1.102:0
14/04/28 16:01:19 DB : policy ref increment ( ref count = 1, policy count = 4 )
14/04/28 16:01:19 DB : policy added
14/04/28 16:01:19 DB : policy ref decrement ( ref count = 0, policy count = 5 )
14/04/28 16:01:19 K< : recv X_SPDADD UNSPEC pfkey message
14/04/28 16:01:19 ii : - id    = 0
14/04/28 16:01:19 ii : - type  = IPSEC
14/04/28 16:01:19 ii : - dir   = OUTBOUND
14/04/28 16:01:19 ii : - transform #0
14/04/28 16:01:19 ii : -- proto = 50
14/04/28 16:01:19 ii : -- level = REQUIRE
14/04/28 16:01:19 ii : -- mode  = TUNNEL
14/04/28 16:01:19 ii : -- reqid = 0
14/04/28 16:01:19 ii : -- tsrc  = 192.168.1.102:0
14/04/28 16:01:19 ii : -- tdst  = 210.80.199.3:0
14/04/28 16:01:19 DB : policy ref increment ( ref count = 1, policy count = 5 )
14/04/28 16:01:19 DB : policy added
14/04/28 16:01:19 ii : installed divert rule for 10.0.0.0/255.0.0.0
14/04/28 16:01:19 DB : policy ref decrement ( ref count = 0, policy count = 6 )
14/04/28 16:01:19 K< : recv X_SPDADD UNSPEC pfkey message
14/04/28 16:01:19 ii : - id    = 0
14/04/28 16:01:19 ii : - type  = IPSEC
14/04/28 16:01:19 ii : - dir   = INBOUND
14/04/28 16:01:19 ii : - transform #0
14/04/28 16:01:19 ii : -- proto = 50
14/04/28 16:01:19 ii : -- level = REQUIRE
14/04/28 16:01:19 ii : -- mode  = TUNNEL
14/04/28 16:01:19 ii : -- reqid = 0
14/04/28 16:01:19 ii : -- tsrc  = 210.80.199.3:0
14/04/28 16:01:19 ii : -- tdst  = 192.168.1.102:0
14/04/28 16:01:19 DB : policy ref increment ( ref count = 1, policy count = 6 )
14/04/28 16:01:19 DB : policy added
14/04/28 16:01:19 DB : policy ref decrement ( ref count = 0, policy count = 7 )
14/04/28 16:01:19 K< : recv GETSPI ESP pfkey message
14/04/28 16:01:19 ii : allocated spi for ESP sa
14/04/28 16:01:19 ii : - spi  = 0xcb2cf082
14/04/28 16:01:19 ii : - src  = 210.80.199.3:4500
14/04/28 16:01:19 ii : - dst  = 192.168.1.102:4500
14/04/28 16:01:19 DB : sa ref increment ( ref count = 1, sa count = 1 )
14/04/28 16:01:19 DB : sa added
14/04/28 16:01:19 DB : sa ref increment ( ref count = 2, sa count = 2 )
14/04/28 16:01:19 DB : sa ref decrement ( ref count = 1, sa count = 2 )
14/04/28 16:01:19 K> : sent GETSPI ESP pfkey message
14/04/28 16:01:19 K> : sent GETSPI ESP pfkey message
14/04/28 16:01:19 K< : recv X_SPDADD UNSPEC pfkey message
14/04/28 16:01:19 ii : - id    = 0
14/04/28 16:01:19 ii : - type  = IPSEC
14/04/28 16:01:19 ii : - dir   = OUTBOUND
14/04/28 16:01:19 ii : - transform #0
14/04/28 16:01:19 ii : -- proto = 50
14/04/28 16:01:19 ii : -- level = REQUIRE
14/04/28 16:01:19 ii : -- mode  = TUNNEL
14/04/28 16:01:19 ii : -- reqid = 0
14/04/28 16:01:19 ii : -- tsrc  = 192.168.1.102:0
14/04/28 16:01:19 ii : -- tdst  = 210.80.199.3:0
14/04/28 16:01:19 DB : policy ref increment ( ref count = 1, policy count = 7 )
14/04/28 16:01:19 DB : policy added
14/04/28 16:01:19 ii : installed divert rule for 192.168.90.0/255.255.255.0
14/04/28 16:01:19 DB : policy ref decrement ( ref count = 0, policy count = 8 )
14/04/28 16:01:19 K< : recv X_SPDADD UNSPEC pfkey message
14/04/28 16:01:19 ii : - id    = 0
14/04/28 16:01:19 ii : - type  = IPSEC
14/04/28 16:01:19 ii : - dir   = INBOUND
14/04/28 16:01:19 ii : - transform #0
14/04/28 16:01:19 ii : -- proto = 50
14/04/28 16:01:19 ii : -- level = REQUIRE
14/04/28 16:01:19 ii : -- mode  = TUNNEL
14/04/28 16:01:19 ii : -- reqid = 0
14/04/28 16:01:19 ii : -- tsrc  = 210.80.199.3:0
14/04/28 16:01:19 ii : -- tdst  = 192.168.1.102:0
14/04/28 16:01:19 DB : policy ref increment ( ref count = 1, policy count = 8 )
14/04/28 16:01:19 DB : policy added
14/04/28 16:01:19 DB : policy ref decrement ( ref count = 0, policy count = 9 )
14/04/28 16:01:19 K< : recv X_SPDADD UNSPEC pfkey message
14/04/28 16:01:19 ii : - id    = 0
14/04/28 16:01:19 ii : - type  = IPSEC
14/04/28 16:01:19 ii : - dir   = OUTBOUND
14/04/28 16:01:19 ii : - transform #0
14/04/28 16:01:19 ii : -- proto = 50
14/04/28 16:01:19 ii : -- level = REQUIRE
14/04/28 16:01:19 ii : -- mode  = TUNNEL
14/04/28 16:01:19 ii : -- reqid = 0
14/04/28 16:01:19 ii : -- tsrc  = 192.168.1.102:0
14/04/28 16:01:19 ii : -- tdst  = 210.80.199.3:0
14/04/28 16:01:19 DB : policy ref increment ( ref count = 1, policy count = 9 )
14/04/28 16:01:19 DB : policy added
14/04/28 16:01:19 ii : installed divert rule for 172.16.30.0/255.255.255.0
14/04/28 16:01:19 DB : policy ref decrement ( ref count = 0, policy count = 10 )
14/04/28 16:01:19 K< : recv X_SPDADD UNSPEC pfkey message
14/04/28 16:01:19 ii : - id    = 0
14/04/28 16:01:19 ii : - type  = IPSEC
14/04/28 16:01:19 ii : - dir   = INBOUND
14/04/28 16:01:19 ii : - transform #0
14/04/28 16:01:19 ii : -- proto = 50
14/04/28 16:01:19 ii : -- level = REQUIRE
14/04/28 16:01:19 ii : -- mode  = TUNNEL
14/04/28 16:01:19 ii : -- reqid = 0
14/04/28 16:01:19 ii : -- tsrc  = 210.80.199.3:0
14/04/28 16:01:19 ii : -- tdst  = 192.168.1.102:0
14/04/28 16:01:19 DB : policy ref increment ( ref count = 1, policy count = 10 )
14/04/28 16:01:19 DB : policy added
14/04/28 16:01:19 DB : policy ref decrement ( ref count = 0, policy count = 11 )
14/04/28 16:01:19 K< : recv X_SPDADD UNSPEC pfkey message
14/04/28 16:01:19 ii : - id    = 0
14/04/28 16:01:19 ii : - type  = IPSEC
14/04/28 16:01:19 ii : - dir   = OUTBOUND
14/04/28 16:01:19 ii : - transform #0
14/04/28 16:01:19 ii : -- proto = 50
14/04/28 16:01:19 ii : -- level = REQUIRE
14/04/28 16:01:19 ii : -- mode  = TUNNEL
14/04/28 16:01:19 ii : -- reqid = 0
14/04/28 16:01:19 ii : -- tsrc  = 192.168.1.102:0
14/04/28 16:01:19 ii : -- tdst  = 210.80.199.3:0
14/04/28 16:01:19 DB : policy ref increment ( ref count = 1, policy count = 11 )
14/04/28 16:01:19 DB : policy added
14/04/28 16:01:19 ii : installed divert rule for 192.168.3.0/255.255.255.0
14/04/28 16:01:19 DB : policy ref decrement ( ref count = 0, policy count = 12 )
14/04/28 16:01:19 K< : recv X_SPDADD UNSPEC pfkey message
14/04/28 16:01:19 ii : - id    = 0
14/04/28 16:01:19 ii : - type  = IPSEC
14/04/28 16:01:19 ii : - dir   = INBOUND
14/04/28 16:01:19 ii : - transform #0
14/04/28 16:01:19 ii : -- proto = 50
14/04/28 16:01:19 ii : -- level = REQUIRE
14/04/28 16:01:19 ii : -- mode  = TUNNEL
14/04/28 16:01:19 ii : -- reqid = 0
14/04/28 16:01:19 ii : -- tsrc  = 210.80.199.3:0
14/04/28 16:01:19 ii : -- tdst  = 192.168.1.102:0
14/04/28 16:01:19 DB : policy ref increment ( ref count = 1, policy count = 12 )
14/04/28 16:01:19 DB : policy added
14/04/28 16:01:19 DB : policy ref decrement ( ref count = 0, policy count = 13 )
14/04/28 16:01:19 K< : recv X_SPDADD UNSPEC pfkey message
14/04/28 16:01:19 ii : - id    = 0
14/04/28 16:01:19 ii : - type  = IPSEC
14/04/28 16:01:19 ii : - dir   = OUTBOUND
14/04/28 16:01:19 ii : - transform #0
14/04/28 16:01:19 ii : -- proto = 50
14/04/28 16:01:19 ii : -- level = REQUIRE
14/04/28 16:01:19 ii : -- mode  = TUNNEL
14/04/28 16:01:19 ii : -- reqid = 0
14/04/28 16:01:19 ii : -- tsrc  = 192.168.1.102:0
14/04/28 16:01:19 ii : -- tdst  = 210.80.199.3:0
14/04/28 16:01:19 DB : policy ref increment ( ref count = 1, policy count = 13 )
14/04/28 16:01:19 DB : policy added
14/04/28 16:01:19 ii : installed divert rule for 205.197.192.150/255.255.255.255
14/04/28 16:01:19 DB : policy ref decrement ( ref count = 0, policy count = 14 )
14/04/28 16:01:19 K< : recv X_SPDADD UNSPEC pfkey message
14/04/28 16:01:19 ii : - id    = 0
14/04/28 16:01:19 ii : - type  = IPSEC
14/04/28 16:01:19 ii : - dir   = INBOUND
14/04/28 16:01:19 ii : - transform #0
14/04/28 16:01:19 ii : -- proto = 50
14/04/28 16:01:19 ii : -- level = REQUIRE
14/04/28 16:01:19 ii : -- mode  = TUNNEL
14/04/28 16:01:19 ii : -- reqid = 0
14/04/28 16:01:19 ii : -- tsrc  = 210.80.199.3:0
14/04/28 16:01:19 ii : -- tdst  = 192.168.1.102:0
14/04/28 16:01:19 DB : policy ref increment ( ref count = 1, policy count = 14 )
14/04/28 16:01:19 DB : policy added
14/04/28 16:01:19 DB : policy ref decrement ( ref count = 0, policy count = 15 )
14/04/28 16:01:19 K< : recv X_SPDADD UNSPEC pfkey message
14/04/28 16:01:19 ii : - id    = 0
14/04/28 16:01:19 ii : - type  = IPSEC
14/04/28 16:01:19 ii : - dir   = OUTBOUND
14/04/28 16:01:19 ii : - transform #0
14/04/28 16:01:19 ii : -- proto = 50
14/04/28 16:01:19 ii : -- level = REQUIRE
14/04/28 16:01:19 ii : -- mode  = TUNNEL
14/04/28 16:01:19 ii : -- reqid = 0
14/04/28 16:01:19 ii : -- tsrc  = 192.168.1.102:0
14/04/28 16:01:19 ii : -- tdst  = 210.80.199.3:0
14/04/28 16:01:19 DB : policy ref increment ( ref count = 1, policy count = 15 )
14/04/28 16:01:19 DB : policy added
14/04/28 16:01:19 ii : installed divert rule for 205.197.192.151/255.255.255.255
14/04/28 16:01:19 DB : policy ref decrement ( ref count = 0, policy count = 16 )
14/04/28 16:01:19 ii : inspecting ARP request ...
14/04/28 16:01:19 DB : policy not found
14/04/28 16:01:19 ii : ignoring ARP request for 10.120.2.101, no policy found
14/04/28 16:01:20 ii : sa never reached maturity
14/04/28 16:01:20 ii : removed sa divert rule for 210.80.199.3->192.168.1.102
14/04/28 16:01:20 DB : sa deleted ( sa count = 1 )
14/04/28 16:01:20 K< : recv GET UNSPEC pfkey message
14/04/28 16:01:20 DB : sa not found
14/04/28 16:01:20 ii : failed to locate UNSPEC sa for get
14/04/28 16:01:20 ii : - spi  = 0xe657832e
14/04/28 16:01:20 K< : recv GET UNSPEC pfkey message
14/04/28 16:01:20 DB : sa found
14/04/28 16:01:20 DB : sa ref increment ( ref count = 2, sa count = 1 )
14/04/28 16:01:20 DB : sa ref decrement ( ref count = 1, sa count = 1 )
14/04/28 16:01:20 ii : inspecting ARP request ...
14/04/28 16:01:20 DB : policy not found
14/04/28 16:01:20 ii : ignoring ARP request for 10.120.2.101, no policy found
14/04/28 16:01:21 K< : recv GET UNSPEC pfkey message
14/04/28 16:01:21 DB : sa found
14/04/28 16:01:21 DB : sa ref increment ( ref count = 2, sa count = 1 )
14/04/28 16:01:21 DB : sa ref decrement ( ref count = 1, sa count = 1 )
14/04/28 16:01:21 ii : inspecting ARP request ...
14/04/28 16:01:21 DB : policy not found
14/04/28 16:01:21 ii : ignoring ARP request for 10.120.2.101, no policy found
14/04/28 16:01:22 K< : recv GET UNSPEC pfkey message
14/04/28 16:01:22 DB : sa found
14/04/28 16:01:22 DB : sa ref increment ( ref count = 2, sa count = 1 )
14/04/28 16:01:22 DB : sa ref decrement ( ref count = 1, sa count = 1 )
14/04/28 16:01:22 ii : inspecting ARP request ...
14/04/28 16:01:22 ii : ignoring ARP request for 10.120.2.101,
duplicate address check
14/04/28 16:01:22 ii : inspecting ARP request ...
14/04/28 16:01:22 DB : policy found
14/04/28 16:01:22 DB : policy not found
14/04/28 16:01:22 ii : spoofing ARP response for 10.1.4.201
14/04/28 16:01:22 DB : policy found
14/04/28 16:01:22 DB : policy ref increment ( ref count = 1, policy count = 16 )
14/04/28 16:01:22 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 16:01:22 K> : sent ACQUIRE UNSPEC pfkey message
14/04/28 16:01:22 ii : - id   = 82
14/04/28 16:01:22 K< : recv GETSPI ESP pfkey message
14/04/28 16:01:22 ii : allocated spi for ESP sa
14/04/28 16:01:22 ii : - spi  = 0x484bc25f
14/04/28 16:01:22 ii : - src  = 210.80.199.3:4500
14/04/28 16:01:22 ii : - dst  = 192.168.1.102:4500
14/04/28 16:01:22 DB : sa ref increment ( ref count = 1, sa count = 1 )
14/04/28 16:01:22 DB : sa added
14/04/28 16:01:22 DB : sa ref increment ( ref count = 2, sa count = 2 )
14/04/28 16:01:22 DB : sa ref decrement ( ref count = 1, sa count = 2 )
14/04/28 16:01:22 K> : sent ACQUIRE UNSPEC pfkey message
14/04/28 16:01:22 ii : - id   = 82
14/04/28 16:01:22 K> : sent GETSPI ESP pfkey message
14/04/28 16:01:22 K> : sent GETSPI ESP pfkey message
14/04/28 16:01:22 ii : queueing ip packet
14/04/28 16:01:22 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 16:01:22 DB : policy found
14/04/28 16:01:22 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 16:01:22 ii : queueing ip packet
14/04/28 16:01:22 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 16:01:22 ii : inspecting ARP request ...
14/04/28 16:01:22 DB : policy not found
14/04/28 16:01:22 ii : ignoring ARP request for 192.168.1.1, no policy found
14/04/28 16:01:22 DB : policy found
14/04/28 16:01:22 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 16:01:22 ii : queueing ip packet
14/04/28 16:01:22 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 16:01:22 DB : policy found
14/04/28 16:01:22 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 16:01:22 ii : queueing ip packet
14/04/28 16:01:22 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 16:01:23 K< : recv GET UNSPEC pfkey message
14/04/28 16:01:23 DB : sa found
14/04/28 16:01:23 DB : sa ref increment ( ref count = 2, sa count = 2 )
14/04/28 16:01:23 DB : sa ref decrement ( ref count = 1, sa count = 2 )
14/04/28 16:01:23 K< : recv GET UNSPEC pfkey message
14/04/28 16:01:23 DB : sa found
14/04/28 16:01:23 DB : sa ref increment ( ref count = 2, sa count = 2 )
14/04/28 16:01:23 DB : sa ref decrement ( ref count = 1, sa count = 2 )
14/04/28 16:01:23 ii : inspecting ARP request ...
14/04/28 16:01:23 DB : policy found
14/04/28 16:01:23 DB : policy not found
14/04/28 16:01:23 ii : spoofing ARP response for 10.1.4.202
14/04/28 16:01:23 DB : policy found
14/04/28 16:01:23 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 16:01:23 ii : queueing ip packet
14/04/28 16:01:23 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 16:01:24 DB : policy found
14/04/28 16:01:24 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 16:01:24 ii : queueing ip packet
14/04/28 16:01:24 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 16:01:24 DB : policy found
14/04/28 16:01:24 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 16:01:24 ii : queueing ip packet
14/04/28 16:01:24 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 16:01:24 DB : policy found
14/04/28 16:01:24 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 16:01:24 ii : queueing ip packet
14/04/28 16:01:24 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 16:01:24 DB : policy found
14/04/28 16:01:24 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 16:01:24 ii : queueing ip packet
14/04/28 16:01:24 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 16:01:24 K< : recv GET UNSPEC pfkey message
14/04/28 16:01:24 DB : sa found
14/04/28 16:01:24 DB : sa ref increment ( ref count = 2, sa count = 2 )
14/04/28 16:01:24 DB : sa ref decrement ( ref count = 1, sa count = 2 )
14/04/28 16:01:24 K< : recv GET UNSPEC pfkey message
14/04/28 16:01:24 DB : sa found
14/04/28 16:01:24 DB : sa ref increment ( ref count = 2, sa count = 2 )
14/04/28 16:01:24 DB : sa ref decrement ( ref count = 1, sa count = 2 )
14/04/28 16:01:24 DB : policy found
14/04/28 16:01:24 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 16:01:24 ii : queueing ip packet
14/04/28 16:01:24 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 16:01:25 K< : recv GET UNSPEC pfkey message
14/04/28 16:01:25 DB : sa found
14/04/28 16:01:25 DB : sa ref increment ( ref count = 2, sa count = 2 )
14/04/28 16:01:25 DB : sa ref decrement ( ref count = 1, sa count = 2 )
14/04/28 16:01:25 K< : recv GET UNSPEC pfkey message
14/04/28 16:01:25 DB : sa found
14/04/28 16:01:25 DB : sa ref increment ( ref count = 2, sa count = 2 )
14/04/28 16:01:25 DB : sa ref decrement ( ref count = 1, sa count = 2 )
14/04/28 16:01:25 DB : policy found
14/04/28 16:01:25 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 16:01:25 ii : queueing ip packet
14/04/28 16:01:25 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 16:01:25 DB : policy found
14/04/28 16:01:25 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 16:01:25 ii : queueing ip packet
14/04/28 16:01:25 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 16:01:25 DB : policy found
14/04/28 16:01:25 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 16:01:25 ii : queueing ip packet
14/04/28 16:01:25 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 16:01:25 DB : policy found
14/04/28 16:01:25 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 16:01:25 ii : queueing ip packet
14/04/28 16:01:25 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 16:01:25 DB : policy found
14/04/28 16:01:25 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 16:01:25 ii : queueing ip packet
14/04/28 16:01:25 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 16:01:26 K< : recv GET UNSPEC pfkey message
14/04/28 16:01:26 DB : sa found
14/04/28 16:01:26 DB : sa ref increment ( ref count = 2, sa count = 2 )
14/04/28 16:01:26 DB : sa ref decrement ( ref count = 1, sa count = 2 )
14/04/28 16:01:26 K< : recv GET UNSPEC pfkey message
14/04/28 16:01:26 DB : sa found
14/04/28 16:01:26 DB : sa ref increment ( ref count = 2, sa count = 2 )
14/04/28 16:01:26 DB : sa ref decrement ( ref count = 1, sa count = 2 )
14/04/28 16:01:26 DB : policy found
14/04/28 16:01:26 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 16:01:26 ii : queueing ip packet
14/04/28 16:01:26 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 16:01:26 DB : policy found
14/04/28 16:01:26 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 16:01:26 ii : queueing ip packet
14/04/28 16:01:26 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 16:01:27 K< : recv GET UNSPEC pfkey message
14/04/28 16:01:27 DB : sa found
14/04/28 16:01:27 DB : sa ref increment ( ref count = 2, sa count = 2 )
14/04/28 16:01:27 DB : sa ref decrement ( ref count = 1, sa count = 2 )
14/04/28 16:01:27 K< : recv GET UNSPEC pfkey message
14/04/28 16:01:27 DB : sa found
14/04/28 16:01:27 DB : sa ref increment ( ref count = 2, sa count = 2 )
14/04/28 16:01:27 DB : sa ref decrement ( ref count = 1, sa count = 2 )
14/04/28 16:01:27 DB : policy found
14/04/28 16:01:27 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 16:01:27 ii : queueing ip packet
14/04/28 16:01:27 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 16:01:27 ii : inspecting ARP request ...
14/04/28 16:01:27 !! : ARP packet has invalid header
14/04/28 16:01:28 K< : recv GET UNSPEC pfkey message
14/04/28 16:01:28 DB : sa found
14/04/28 16:01:28 DB : sa ref increment ( ref count = 2, sa count = 2 )
14/04/28 16:01:28 DB : sa ref decrement ( ref count = 1, sa count = 2 )
14/04/28 16:01:28 K< : recv GET UNSPEC pfkey message
14/04/28 16:01:28 DB : sa found
14/04/28 16:01:28 DB : sa ref increment ( ref count = 2, sa count = 2 )
14/04/28 16:01:28 DB : sa ref decrement ( ref count = 1, sa count = 2 )
14/04/28 16:01:29 DB : policy found
14/04/28 16:01:29 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 16:01:29 ii : queueing ip packet
14/04/28 16:01:29 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 16:01:29 ii : inspecting ARP request ...
14/04/28 16:01:29 DB : policy not found
14/04/28 16:01:29 ii : ignoring ARP request for 192.168.1.1, no policy found
14/04/28 16:01:29 K< : recv GET UNSPEC pfkey message
14/04/28 16:01:29 DB : sa found
14/04/28 16:01:29 DB : sa ref increment ( ref count = 2, sa count = 2 )
14/04/28 16:01:29 DB : sa ref decrement ( ref count = 1, sa count = 2 )
14/04/28 16:01:29 K< : recv GET UNSPEC pfkey message
14/04/28 16:01:29 DB : sa found
14/04/28 16:01:29 DB : sa ref increment ( ref count = 2, sa count = 2 )
14/04/28 16:01:29 DB : sa ref decrement ( ref count = 1, sa count = 2 )
14/04/28 16:01:29 DB : policy found
14/04/28 16:01:29 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 16:01:29 ii : queueing ip packet
14/04/28 16:01:29 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 16:01:30 K< : recv GET UNSPEC pfkey message
14/04/28 16:01:30 DB : sa found
14/04/28 16:01:30 DB : sa ref increment ( ref count = 2, sa count = 2 )
14/04/28 16:01:30 DB : sa ref decrement ( ref count = 1, sa count = 2 )
14/04/28 16:01:30 K< : recv GET UNSPEC pfkey message
14/04/28 16:01:30 DB : sa found
14/04/28 16:01:30 DB : sa ref increment ( ref count = 2, sa count = 2 )
14/04/28 16:01:30 DB : sa ref decrement ( ref count = 1, sa count = 2 )
14/04/28 16:01:30 DB : policy found
14/04/28 16:01:30 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 16:01:30 ii : queueing ip packet
14/04/28 16:01:30 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 16:01:30 DB : policy found
14/04/28 16:01:30 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 16:01:30 ii : queueing ip packet
14/04/28 16:01:30 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 16:01:30 DB : policy found
14/04/28 16:01:30 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 16:01:30 ii : queueing ip packet
14/04/28 16:01:30 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 16:01:30 DB : policy found
14/04/28 16:01:30 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 16:01:30 ii : queueing ip packet
14/04/28 16:01:30 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 16:01:31 K< : recv GET UNSPEC pfkey message
14/04/28 16:01:31 DB : sa found
14/04/28 16:01:31 DB : sa ref increment ( ref count = 2, sa count = 2 )
14/04/28 16:01:31 DB : sa ref decrement ( ref count = 1, sa count = 2 )
14/04/28 16:01:31 K< : recv GET UNSPEC pfkey message
14/04/28 16:01:31 DB : sa found
14/04/28 16:01:31 DB : sa ref increment ( ref count = 2, sa count = 2 )
14/04/28 16:01:31 DB : sa ref decrement ( ref count = 1, sa count = 2 )
14/04/28 16:01:32 K< : recv GET UNSPEC pfkey message
14/04/28 16:01:32 DB : sa found
14/04/28 16:01:32 DB : sa ref increment ( ref count = 2, sa count = 2 )
14/04/28 16:01:32 DB : sa ref decrement ( ref count = 1, sa count = 2 )
14/04/28 16:01:32 K< : recv GET UNSPEC pfkey message
14/04/28 16:01:32 DB : sa found
14/04/28 16:01:32 DB : sa ref increment ( ref count = 2, sa count = 2 )
14/04/28 16:01:32 DB : sa ref decrement ( ref count = 1, sa count = 2 )
14/04/28 16:01:32 DB : policy found
14/04/28 16:01:32 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 16:01:32 ii : queueing ip packet
14/04/28 16:01:32 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 16:01:33 K< : recv GET UNSPEC pfkey message
14/04/28 16:01:33 DB : sa found
14/04/28 16:01:33 DB : sa ref increment ( ref count = 2, sa count = 2 )
14/04/28 16:01:33 DB : sa ref decrement ( ref count = 1, sa count = 2 )
14/04/28 16:01:33 K< : recv GET UNSPEC pfkey message
14/04/28 16:01:33 DB : sa found
14/04/28 16:01:33 DB : sa ref increment ( ref count = 2, sa count = 2 )
14/04/28 16:01:33 DB : sa ref decrement ( ref count = 1, sa count = 2 )
14/04/28 16:01:34 ii : sa never reached maturity
14/04/28 16:01:34 ii : removed sa divert rule for 210.80.199.3->192.168.1.102
14/04/28 16:01:34 DB : sa deleted ( sa count = 1 )
14/04/28 16:01:34 K< : recv GET UNSPEC pfkey message
14/04/28 16:01:34 DB : sa not found
14/04/28 16:01:34 ii : failed to locate UNSPEC sa for get
14/04/28 16:01:34 ii : - spi  = 0xcb2cf082
14/04/28 16:01:34 K< : recv GET UNSPEC pfkey message
14/04/28 16:01:34 DB : sa found
14/04/28 16:01:34 DB : sa ref increment ( ref count = 2, sa count = 1 )
14/04/28 16:01:34 DB : sa ref decrement ( ref count = 1, sa count = 1 )
14/04/28 16:01:35 K< : recv GET UNSPEC pfkey message
14/04/28 16:01:35 DB : sa found
14/04/28 16:01:35 DB : sa ref increment ( ref count = 2, sa count = 1 )
14/04/28 16:01:35 DB : sa ref decrement ( ref count = 1, sa count = 1 )
14/04/28 16:01:36 DB : policy found
14/04/28 16:01:36 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 16:01:36 ii : queueing ip packet
14/04/28 16:01:36 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 16:01:36 K< : recv GET UNSPEC pfkey message
14/04/28 16:01:36 DB : sa found
14/04/28 16:01:36 DB : sa ref increment ( ref count = 2, sa count = 1 )
14/04/28 16:01:36 DB : sa ref decrement ( ref count = 1, sa count = 1 )
14/04/28 16:01:36 DB : policy found
14/04/28 16:01:36 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 16:01:36 ii : queueing ip packet
14/04/28 16:01:36 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 16:01:37 ii : sa never reached maturity
14/04/28 16:01:37 ii : removed sa divert rule for 210.80.199.3->192.168.1.102
14/04/28 16:01:37 DB : sa deleted ( sa count = 0 )
14/04/28 16:01:37 K< : recv GET UNSPEC pfkey message
14/04/28 16:01:37 DB : sa not found
14/04/28 16:01:37 ii : failed to locate UNSPEC sa for get
14/04/28 16:01:37 ii : - spi  = 0x484bc25f
14/04/28 16:01:37 DB : policy found
14/04/28 16:01:37 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 16:01:37 ii : queueing ip packet
14/04/28 16:01:37 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 16:01:37 ii : inspecting ARP request ...
14/04/28 16:01:37 DB : policy not found
14/04/28 16:01:37 ii : ignoring ARP request for 192.168.1.1, no policy found
14/04/28 16:01:38 DB : policy found
14/04/28 16:01:38 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 16:01:38 ii : queueing ip packet
14/04/28 16:01:38 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 16:01:38 ii : aquire timelimit expired
14/04/28 16:01:38 DB : policy ref decrement ( ref count = 0, policy count = 16 )
14/04/28 16:01:39 DB : policy found
14/04/28 16:01:39 DB : policy ref increment ( ref count = 1, policy count = 16 )
14/04/28 16:01:39 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 16:01:39 K> : sent ACQUIRE UNSPEC pfkey message
14/04/28 16:01:39 ii : - id   = 82
14/04/28 16:01:39 K> : sent ACQUIRE UNSPEC pfkey message
14/04/28 16:01:39 ii : - id   = 82
14/04/28 16:01:39 ii : queueing ip packet
14/04/28 16:01:39 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 16:01:39 K< : recv GETSPI ESP pfkey message
14/04/28 16:01:39 ii : allocated spi for ESP sa
14/04/28 16:01:39 ii : - spi  = 0xd4963f12
14/04/28 16:01:39 ii : - src  = 210.80.199.3:4500
14/04/28 16:01:39 ii : - dst  = 192.168.1.102:4500
14/04/28 16:01:39 DB : sa ref increment ( ref count = 1, sa count = 0 )
14/04/28 16:01:39 DB : sa added
14/04/28 16:01:39 DB : sa ref increment ( ref count = 2, sa count = 1 )
14/04/28 16:01:39 DB : sa ref decrement ( ref count = 1, sa count = 1 )
14/04/28 16:01:39 K> : sent GETSPI ESP pfkey message
14/04/28 16:01:39 K> : sent GETSPI ESP pfkey message
14/04/28 16:01:39 DB : policy found
14/04/28 16:01:39 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 16:01:39 ii : queueing ip packet
14/04/28 16:01:39 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 16:01:39 K< : recv GET UNSPEC pfkey message
14/04/28 16:01:39 DB : sa found
14/04/28 16:01:39 DB : sa ref increment ( ref count = 2, sa count = 1 )
14/04/28 16:01:39 DB : sa ref decrement ( ref count = 1, sa count = 1 )
14/04/28 16:01:40 K< : recv GET UNSPEC pfkey message
14/04/28 16:01:40 DB : sa found
14/04/28 16:01:40 DB : sa ref increment ( ref count = 2, sa count = 1 )
14/04/28 16:01:40 DB : sa ref decrement ( ref count = 1, sa count = 1 )
14/04/28 16:01:41 K< : recv GET UNSPEC pfkey message
14/04/28 16:01:41 DB : sa found
14/04/28 16:01:41 DB : sa ref increment ( ref count = 2, sa count = 1 )
14/04/28 16:01:41 DB : sa ref decrement ( ref count = 1, sa count = 1 )
14/04/28 16:01:42 K< : recv GET UNSPEC pfkey message
14/04/28 16:01:42 DB : sa found
14/04/28 16:01:42 DB : sa ref increment ( ref count = 2, sa count = 1 )
14/04/28 16:01:42 DB : sa ref decrement ( ref count = 1, sa count = 1 )
14/04/28 16:01:43 K< : recv GET UNSPEC pfkey message
14/04/28 16:01:43 DB : sa found
14/04/28 16:01:43 DB : sa ref increment ( ref count = 2, sa count = 1 )
14/04/28 16:01:43 DB : sa ref decrement ( ref count = 1, sa count = 1 )
14/04/28 16:01:44 ii : inspecting ARP request ...
14/04/28 16:01:44 DB : policy not found
14/04/28 16:01:44 ii : ignoring ARP request for 192.168.1.1, no policy found
14/04/28 16:01:44 K< : recv GET UNSPEC pfkey message
14/04/28 16:01:44 DB : sa found
14/04/28 16:01:44 DB : sa ref increment ( ref count = 2, sa count = 1 )
14/04/28 16:01:44 DB : sa ref decrement ( ref count = 1, sa count = 1 )
14/04/28 16:01:45 DB : policy found
14/04/28 16:01:45 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 16:01:45 ii : queueing ip packet
14/04/28 16:01:45 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 16:01:45 K< : recv GET UNSPEC pfkey message
14/04/28 16:01:45 DB : sa found
14/04/28 16:01:45 DB : sa ref increment ( ref count = 2, sa count = 1 )
14/04/28 16:01:45 DB : sa ref decrement ( ref count = 1, sa count = 1 )
14/04/28 16:01:46 K< : recv GET UNSPEC pfkey message
14/04/28 16:01:46 DB : sa found
14/04/28 16:01:46 DB : sa ref increment ( ref count = 2, sa count = 1 )
14/04/28 16:01:46 DB : sa ref decrement ( ref count = 1, sa count = 1 )
14/04/28 16:01:46 DB : policy found
14/04/28 16:01:46 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 16:01:46 ii : queueing ip packet
14/04/28 16:01:46 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 16:01:46 DB : policy found
14/04/28 16:01:46 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 16:01:46 ii : queueing ip packet
14/04/28 16:01:46 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 16:01:47 DB : policy found
14/04/28 16:01:47 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 16:01:47 ii : queueing ip packet
14/04/28 16:01:47 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 16:01:47 K< : recv GET UNSPEC pfkey message
14/04/28 16:01:47 DB : sa found
14/04/28 16:01:47 DB : sa ref increment ( ref count = 2, sa count = 1 )
14/04/28 16:01:47 DB : sa ref decrement ( ref count = 1, sa count = 1 )
14/04/28 16:01:47 DB : policy found
14/04/28 16:01:47 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 16:01:47 ii : queueing ip packet
14/04/28 16:01:47 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 16:01:48 DB : policy found
14/04/28 16:01:48 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 16:01:48 ii : queueing ip packet
14/04/28 16:01:48 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 16:01:48 DB : policy found
14/04/28 16:01:48 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 16:01:48 ii : queueing ip packet
14/04/28 16:01:48 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 16:01:48 K< : recv GET UNSPEC pfkey message
14/04/28 16:01:48 DB : sa found
14/04/28 16:01:48 DB : sa ref increment ( ref count = 2, sa count = 1 )
14/04/28 16:01:48 DB : sa ref decrement ( ref count = 1, sa count = 1 )
14/04/28 16:01:49 K< : recv GET UNSPEC pfkey message
14/04/28 16:01:49 DB : sa found
14/04/28 16:01:49 DB : sa ref increment ( ref count = 2, sa count = 1 )
14/04/28 16:01:49 DB : sa ref decrement ( ref count = 1, sa count = 1 )
14/04/28 16:01:49 DB : policy found
14/04/28 16:01:49 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 16:01:49 ii : queueing ip packet
14/04/28 16:01:49 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 16:01:49 DB : policy found
14/04/28 16:01:49 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 16:01:49 ii : queueing ip packet
14/04/28 16:01:49 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 16:01:50 ii : inspecting ARP request ...
14/04/28 16:01:50 DB : policy not found
14/04/28 16:01:50 ii : ignoring ARP request for 192.168.1.1, no policy found
14/04/28 16:01:50 K< : recv X_SPDDELETE2 UNSPEC pfkey message
14/04/28 16:01:50 ii : - id   = 81
14/04/28 16:01:50 ii : - type = IPSEC
14/04/28 16:01:50 ii : - dir  = INBOUND
14/04/28 16:01:50 DB : policy found
14/04/28 16:01:50 DB : policy ref increment ( ref count = 1, policy count = 16 )
14/04/28 16:01:50 DB : policy deleted ( policy count = 15 )
14/04/28 16:01:50 K< : recv X_SPDDELETE2 UNSPEC pfkey message
14/04/28 16:01:50 ii : - id   = 82
14/04/28 16:01:50 ii : - type = IPSEC
14/04/28 16:01:50 ii : - dir  = OUTBOUND
14/04/28 16:01:50 DB : policy found
14/04/28 16:01:50 DB : policy ref increment ( ref count = 2, policy count = 15 )
14/04/28 16:01:50 ii : removed divert rule for 10.0.0.0/255.0.0.0
14/04/28 16:01:50 DB : policy deleted ( policy count = 14 )
14/04/28 16:01:50 K< : recv X_SPDDELETE2 UNSPEC pfkey message
14/04/28 16:01:50 ii : - id   = 83
14/04/28 16:01:50 ii : - type = IPSEC
14/04/28 16:01:50 ii : - dir  = INBOUND
14/04/28 16:01:50 DB : policy found
14/04/28 16:01:50 DB : policy ref increment ( ref count = 1, policy count = 14 )
14/04/28 16:01:50 DB : policy deleted ( policy count = 13 )
14/04/28 16:01:50 K< : recv X_SPDDELETE2 UNSPEC pfkey message
14/04/28 16:01:50 ii : - id   = 85
14/04/28 16:01:50 ii : - type = IPSEC
14/04/28 16:01:50 ii : - dir  = OUTBOUND
14/04/28 16:01:50 DB : policy found
14/04/28 16:01:50 DB : policy ref increment ( ref count = 1, policy count = 13 )
14/04/28 16:01:50 ii : removed divert rule for 192.168.90.0/255.255.255.0
14/04/28 16:01:50 DB : policy deleted ( policy count = 12 )
14/04/28 16:01:50 K< : recv X_SPDDELETE2 UNSPEC pfkey message
14/04/28 16:01:50 ii : - id   = 86
14/04/28 16:01:50 ii : - type = IPSEC
14/04/28 16:01:50 ii : - dir  = INBOUND
14/04/28 16:01:50 DB : policy found
14/04/28 16:01:50 DB : policy ref increment ( ref count = 1, policy count = 12 )
14/04/28 16:01:50 DB : policy deleted ( policy count = 11 )
14/04/28 16:01:50 K< : recv X_SPDDELETE2 UNSPEC pfkey message
14/04/28 16:01:50 ii : - id   = 87
14/04/28 16:01:50 ii : - type = IPSEC
14/04/28 16:01:50 ii : - dir  = OUTBOUND
14/04/28 16:01:50 DB : policy found
14/04/28 16:01:50 DB : policy ref increment ( ref count = 1, policy count = 11 )
14/04/28 16:01:50 ii : removed divert rule for 172.16.30.0/255.255.255.0
14/04/28 16:01:50 DB : policy deleted ( policy count = 10 )
14/04/28 16:01:50 K< : recv X_SPDDELETE2 UNSPEC pfkey message
14/04/28 16:01:50 ii : - id   = 88
14/04/28 16:01:50 ii : - type = IPSEC
14/04/28 16:01:50 ii : - dir  = INBOUND
14/04/28 16:01:50 DB : policy found
14/04/28 16:01:50 DB : policy ref increment ( ref count = 1, policy count = 10 )
14/04/28 16:01:50 DB : policy deleted ( policy count = 9 )
14/04/28 16:01:50 K< : recv X_SPDDELETE2 UNSPEC pfkey message
14/04/28 16:01:50 ii : - id   = 89
14/04/28 16:01:50 ii : - type = IPSEC
14/04/28 16:01:50 ii : - dir  = OUTBOUND
14/04/28 16:01:50 DB : policy found
14/04/28 16:01:50 DB : policy ref increment ( ref count = 1, policy count = 9 )
14/04/28 16:01:50 ii : removed divert rule for 192.168.3.0/255.255.255.0
14/04/28 16:01:50 DB : policy deleted ( policy count = 8 )
14/04/28 16:01:50 K< : recv X_SPDDELETE2 UNSPEC pfkey message
14/04/28 16:01:50 ii : - id   = 90
14/04/28 16:01:50 ii : - type = IPSEC
14/04/28 16:01:50 ii : - dir  = INBOUND
14/04/28 16:01:50 DB : policy found
14/04/28 16:01:50 DB : policy ref increment ( ref count = 1, policy count = 8 )
14/04/28 16:01:50 DB : policy deleted ( policy count = 7 )
14/04/28 16:01:50 K< : recv X_SPDDELETE2 UNSPEC pfkey message
14/04/28 16:01:50 ii : - id   = 91
14/04/28 16:01:50 ii : - type = IPSEC
14/04/28 16:01:50 ii : - dir  = OUTBOUND
14/04/28 16:01:50 DB : policy found
14/04/28 16:01:50 DB : policy ref increment ( ref count = 1, policy count = 7 )
14/04/28 16:01:50 ii : removed divert rule for 205.197.192.150/255.255.255.255
14/04/28 16:01:50 DB : policy deleted ( policy count = 6 )
14/04/28 16:01:50 K< : recv X_SPDDELETE2 UNSPEC pfkey message
14/04/28 16:01:50 ii : - id   = 92
14/04/28 16:01:50 ii : - type = IPSEC
14/04/28 16:01:50 ii : - dir  = INBOUND
14/04/28 16:01:50 DB : policy found
14/04/28 16:01:50 DB : policy ref increment ( ref count = 1, policy count = 6 )
14/04/28 16:01:50 DB : policy deleted ( policy count = 5 )
14/04/28 16:01:50 K< : recv X_SPDDELETE2 UNSPEC pfkey message
14/04/28 16:01:50 ii : - id   = 93
14/04/28 16:01:50 ii : - type = IPSEC
14/04/28 16:01:50 ii : - dir  = OUTBOUND
14/04/28 16:01:50 DB : policy found
14/04/28 16:01:50 DB : policy ref increment ( ref count = 1, policy count = 5 )
14/04/28 16:01:50 ii : removed divert rule for 205.197.192.151/255.255.255.255
14/04/28 16:01:50 DB : policy deleted ( policy count = 4 )
14/04/28 16:01:50 K< : recv X_SPDDELETE2 UNSPEC pfkey message
14/04/28 16:01:50 ii : - id   = 79
14/04/28 16:01:50 ii : - type = NONE
14/04/28 16:01:50 ii : - dir  = INBOUND
14/04/28 16:01:50 DB : policy found
14/04/28 16:01:50 DB : policy ref increment ( ref count = 1, policy count = 4 )
14/04/28 16:01:50 DB : policy deleted ( policy count = 3 )
14/04/28 16:01:50 K< : recv X_SPDDELETE2 UNSPEC pfkey message
14/04/28 16:01:50 ii : - id   = 80
14/04/28 16:01:50 ii : - type = NONE
14/04/28 16:01:50 ii : - dir  = OUTBOUND
14/04/28 16:01:50 DB : policy found
14/04/28 16:01:50 DB : policy ref increment ( ref count = 1, policy count = 3 )
14/04/28 16:01:50 ii : removed accept rule for 192.168.1.1/255.255.255.255
14/04/28 16:01:50 DB : policy deleted ( policy count = 2 )
14/04/28 16:01:50 K< : recv X_SPDDELETE2 UNSPEC pfkey message
14/04/28 16:01:50 ii : - id   = 77
14/04/28 16:01:50 ii : - type = NONE
14/04/28 16:01:50 ii : - dir  = INBOUND
14/04/28 16:01:50 DB : policy found
14/04/28 16:01:50 DB : policy ref increment ( ref count = 1, policy count = 2 )
14/04/28 16:01:50 DB : policy deleted ( policy count = 1 )
14/04/28 16:01:50 K< : recv X_SPDDELETE2 UNSPEC pfkey message
14/04/28 16:01:50 ii : - id   = 78
14/04/28 16:01:50 ii : - type = NONE
14/04/28 16:01:50 ii : - dir  = OUTBOUND
14/04/28 16:01:50 DB : policy found
14/04/28 16:01:50 DB : policy ref increment ( ref count = 1, policy count = 1 )
14/04/28 16:01:50 ii : removed accept rule for 210.80.199.3/255.255.255.255
14/04/28 16:01:50 DB : policy deleted ( policy count = 0 )
14/04/28 16:01:50 ii : removed mirror rule ( policycount 0 )
14/04/28 16:01:50 K< : recv GET UNSPEC pfkey message
14/04/28 16:01:50 DB : sa found
14/04/28 16:01:50 DB : sa ref increment ( ref count = 2, sa count = 1 )
14/04/28 16:01:50 DB : sa ref decrement ( ref count = 1, sa count = 1 )
14/04/28 16:01:51 K< : recv GET UNSPEC pfkey message
14/04/28 16:01:51 DB : sa found
14/04/28 16:01:51 DB : sa ref increment ( ref count = 2, sa count = 1 )
14/04/28 16:01:51 DB : sa ref decrement ( ref count = 1, sa count = 1 )
14/04/28 16:01:52 K< : recv GET UNSPEC pfkey message
14/04/28 16:01:52 DB : sa found
14/04/28 16:01:52 DB : sa ref increment ( ref count = 2, sa count = 1 )
14/04/28 16:01:52 DB : sa ref decrement ( ref count = 1, sa count = 1 )
14/04/28 16:01:53 K< : recv GET UNSPEC pfkey message
14/04/28 16:01:53 DB : sa found
14/04/28 16:01:53 DB : sa ref increment ( ref count = 2, sa count = 1 )
14/04/28 16:01:53 DB : sa ref decrement ( ref count = 1, sa count = 1 )
14/04/28 16:01:54 K< : recv X_SPDADD UNSPEC pfkey message
14/04/28 16:01:54 ii : - id    = 0
14/04/28 16:01:54 ii : - type  = NONE
14/04/28 16:01:54 ii : - dir   = INBOUND
14/04/28 16:01:54 DB : policy ref increment ( ref count = 1, policy count = 0 )
14/04/28 16:01:54 DB : policy added
14/04/28 16:01:54 DB : policy ref decrement ( ref count = 0, policy count = 1 )
14/04/28 16:01:54 ii : removed arp mirror rule ( policycount 1 )
14/04/28 16:01:54 ii : sa never reached maturity
14/04/28 16:01:54 ii : removed sa divert rule for 210.80.199.3->192.168.1.102
14/04/28 16:01:54 DB : sa deleted ( sa count = 0 )
14/04/28 16:01:54 K< : recv X_SPDADD UNSPEC pfkey message
14/04/28 16:01:54 ii : - id    = 0
14/04/28 16:01:54 ii : - type  = NONE
14/04/28 16:01:54 ii : - dir   = OUTBOUND
14/04/28 16:01:54 DB : policy ref increment ( ref count = 1, policy count = 1 )
14/04/28 16:01:54 DB : policy added
14/04/28 16:01:54 ii : installed accept rule for 210.80.199.3/255.255.255.255
14/04/28 16:01:54 DB : policy ref decrement ( ref count = 0, policy count = 2 )
14/04/28 16:01:54 K< : recv X_SPDADD UNSPEC pfkey message
14/04/28 16:01:54 ii : - id    = 0
14/04/28 16:01:54 ii : - type  = NONE
14/04/28 16:01:54 ii : - dir   = INBOUND
14/04/28 16:01:54 DB : policy ref increment ( ref count = 1, policy count = 2 )
14/04/28 16:01:54 DB : policy added
14/04/28 16:01:54 DB : policy ref decrement ( ref count = 0, policy count = 3 )
14/04/28 16:01:54 K< : recv X_SPDADD UNSPEC pfkey message
14/04/28 16:01:54 ii : - id    = 0
14/04/28 16:01:54 ii : - type  = NONE
14/04/28 16:01:54 ii : - dir   = OUTBOUND
14/04/28 16:01:54 DB : policy ref increment ( ref count = 1, policy count = 3 )
14/04/28 16:01:54 DB : policy added
14/04/28 16:01:54 ii : installed accept rule for 192.168.1.1/255.255.255.255
14/04/28 16:01:54 DB : policy ref decrement ( ref count = 0, policy count = 4 )
14/04/28 16:01:54 K< : recv X_SPDADD UNSPEC pfkey message
14/04/28 16:01:54 ii : - id    = 0
14/04/28 16:01:54 ii : - type  = IPSEC
14/04/28 16:01:54 ii : - dir   = INBOUND
14/04/28 16:01:54 ii : - transform #0
14/04/28 16:01:54 ii : -- proto = 50
14/04/28 16:01:54 ii : -- level = REQUIRE
14/04/28 16:01:54 ii : -- mode  = TUNNEL
14/04/28 16:01:54 ii : -- reqid = 0
14/04/28 16:01:54 ii : -- tsrc  = 210.80.199.3:0
14/04/28 16:01:54 ii : -- tdst  = 192.168.1.102:0
14/04/28 16:01:54 DB : policy ref increment ( ref count = 1, policy count = 4 )
14/04/28 16:01:54 DB : policy added
14/04/28 16:01:54 DB : policy ref decrement ( ref count = 0, policy count = 5 )
14/04/28 16:01:54 K< : recv X_SPDADD UNSPEC pfkey message
14/04/28 16:01:54 ii : - id    = 0
14/04/28 16:01:54 ii : - type  = IPSEC
14/04/28 16:01:54 ii : - dir   = OUTBOUND
14/04/28 16:01:54 ii : - transform #0
14/04/28 16:01:54 ii : -- proto = 50
14/04/28 16:01:54 ii : -- level = REQUIRE
14/04/28 16:01:54 ii : -- mode  = TUNNEL
14/04/28 16:01:54 ii : -- reqid = 0
14/04/28 16:01:54 ii : -- tsrc  = 192.168.1.102:0
14/04/28 16:01:54 ii : -- tdst  = 210.80.199.3:0
14/04/28 16:01:54 DB : policy ref increment ( ref count = 1, policy count = 5 )
14/04/28 16:01:54 DB : policy added
14/04/28 16:01:54 ii : installed divert rule for 10.0.0.0/255.0.0.0
14/04/28 16:01:54 DB : policy ref decrement ( ref count = 0, policy count = 6 )
14/04/28 16:01:54 K< : recv X_SPDADD UNSPEC pfkey message
14/04/28 16:01:54 ii : - id    = 0
14/04/28 16:01:54 ii : - type  = IPSEC
14/04/28 16:01:54 ii : - dir   = INBOUND
14/04/28 16:01:54 ii : - transform #0
14/04/28 16:01:54 ii : -- proto = 50
14/04/28 16:01:54 ii : -- level = REQUIRE
14/04/28 16:01:54 ii : -- mode  = TUNNEL
14/04/28 16:01:54 ii : -- reqid = 0
14/04/28 16:01:54 ii : -- tsrc  = 210.80.199.3:0
14/04/28 16:01:54 ii : -- tdst  = 192.168.1.102:0
14/04/28 16:01:54 DB : policy ref increment ( ref count = 1, policy count = 6 )
14/04/28 16:01:54 DB : policy added
14/04/28 16:01:54 DB : policy ref decrement ( ref count = 0, policy count = 7 )
14/04/28 16:01:54 K< : recv GETSPI ESP pfkey message
14/04/28 16:01:54 ii : allocated spi for ESP sa
14/04/28 16:01:54 ii : - spi  = 0x6a2dcbaf
14/04/28 16:01:54 ii : - src  = 210.80.199.3:4500
14/04/28 16:01:54 ii : - dst  = 192.168.1.102:4500
14/04/28 16:01:54 DB : sa ref increment ( ref count = 1, sa count = 0 )
14/04/28 16:01:54 DB : sa added
14/04/28 16:01:54 DB : sa ref increment ( ref count = 2, sa count = 1 )
14/04/28 16:01:54 DB : sa ref decrement ( ref count = 1, sa count = 1 )
14/04/28 16:01:54 K> : sent GETSPI ESP pfkey message
14/04/28 16:01:54 K> : sent GETSPI ESP pfkey message
14/04/28 16:01:54 K< : recv X_SPDADD UNSPEC pfkey message
14/04/28 16:01:54 ii : - id    = 0
14/04/28 16:01:54 ii : - type  = IPSEC
14/04/28 16:01:54 ii : - dir   = OUTBOUND
14/04/28 16:01:54 ii : - transform #0
14/04/28 16:01:54 ii : -- proto = 50
14/04/28 16:01:54 ii : -- level = REQUIRE
14/04/28 16:01:54 ii : -- mode  = TUNNEL
14/04/28 16:01:54 ii : -- reqid = 0
14/04/28 16:01:54 ii : -- tsrc  = 192.168.1.102:0
14/04/28 16:01:54 ii : -- tdst  = 210.80.199.3:0
14/04/28 16:01:54 DB : policy ref increment ( ref count = 1, policy count = 7 )
14/04/28 16:01:54 DB : policy added
14/04/28 16:01:54 ii : installed divert rule for 192.168.90.0/255.255.255.0
14/04/28 16:01:54 DB : policy ref decrement ( ref count = 0, policy count = 8 )
14/04/28 16:01:54 K< : recv X_SPDADD UNSPEC pfkey message
14/04/28 16:01:54 ii : - id    = 0
14/04/28 16:01:54 ii : - type  = IPSEC
14/04/28 16:01:54 ii : - dir   = INBOUND
14/04/28 16:01:54 ii : - transform #0
14/04/28 16:01:54 ii : -- proto = 50
14/04/28 16:01:54 ii : -- level = REQUIRE
14/04/28 16:01:54 ii : -- mode  = TUNNEL
14/04/28 16:01:54 ii : -- reqid = 0
14/04/28 16:01:54 ii : -- tsrc  = 210.80.199.3:0
14/04/28 16:01:54 ii : -- tdst  = 192.168.1.102:0
14/04/28 16:01:54 DB : policy ref increment ( ref count = 1, policy count = 8 )
14/04/28 16:01:54 DB : policy added
14/04/28 16:01:54 DB : policy ref decrement ( ref count = 0, policy count = 9 )
14/04/28 16:01:54 K< : recv X_SPDADD UNSPEC pfkey message
14/04/28 16:01:54 ii : - id    = 0
14/04/28 16:01:54 ii : - type  = IPSEC
14/04/28 16:01:54 ii : - dir   = OUTBOUND
14/04/28 16:01:54 ii : - transform #0
14/04/28 16:01:54 ii : -- proto = 50
14/04/28 16:01:54 ii : -- level = REQUIRE
14/04/28 16:01:54 ii : -- mode  = TUNNEL
14/04/28 16:01:54 ii : -- reqid = 0
14/04/28 16:01:54 ii : -- tsrc  = 192.168.1.102:0
14/04/28 16:01:54 ii : -- tdst  = 210.80.199.3:0
14/04/28 16:01:54 DB : policy ref increment ( ref count = 1, policy count = 9 )
14/04/28 16:01:54 DB : policy added
14/04/28 16:01:54 ii : installed divert rule for 172.16.30.0/255.255.255.0
14/04/28 16:01:54 DB : policy ref decrement ( ref count = 0, policy count = 10 )
14/04/28 16:01:54 K< : recv X_SPDADD UNSPEC pfkey message
14/04/28 16:01:54 ii : - id    = 0
14/04/28 16:01:54 ii : - type  = IPSEC
14/04/28 16:01:54 ii : - dir   = INBOUND
14/04/28 16:01:54 ii : - transform #0
14/04/28 16:01:54 ii : -- proto = 50
14/04/28 16:01:54 ii : -- level = REQUIRE
14/04/28 16:01:54 ii : -- mode  = TUNNEL
14/04/28 16:01:54 ii : -- reqid = 0
14/04/28 16:01:54 ii : -- tsrc  = 210.80.199.3:0
14/04/28 16:01:54 ii : -- tdst  = 192.168.1.102:0
14/04/28 16:01:54 DB : policy ref increment ( ref count = 1, policy count = 10 )
14/04/28 16:01:54 DB : policy added
14/04/28 16:01:54 DB : policy ref decrement ( ref count = 0, policy count = 11 )
14/04/28 16:01:54 K< : recv X_SPDADD UNSPEC pfkey message
14/04/28 16:01:54 ii : - id    = 0
14/04/28 16:01:54 ii : - type  = IPSEC
14/04/28 16:01:54 ii : - dir   = OUTBOUND
14/04/28 16:01:54 ii : - transform #0
14/04/28 16:01:54 ii : -- proto = 50
14/04/28 16:01:54 ii : -- level = REQUIRE
14/04/28 16:01:54 ii : -- mode  = TUNNEL
14/04/28 16:01:54 ii : -- reqid = 0
14/04/28 16:01:54 ii : -- tsrc  = 192.168.1.102:0
14/04/28 16:01:54 ii : -- tdst  = 210.80.199.3:0
14/04/28 16:01:54 DB : policy ref increment ( ref count = 1, policy count = 11 )
14/04/28 16:01:54 DB : policy added
14/04/28 16:01:54 ii : installed divert rule for 192.168.3.0/255.255.255.0
14/04/28 16:01:54 DB : policy ref decrement ( ref count = 0, policy count = 12 )
14/04/28 16:01:54 K< : recv X_SPDADD UNSPEC pfkey message
14/04/28 16:01:54 ii : - id    = 0
14/04/28 16:01:54 ii : - type  = IPSEC
14/04/28 16:01:54 ii : - dir   = INBOUND
14/04/28 16:01:54 ii : - transform #0
14/04/28 16:01:54 ii : -- proto = 50
14/04/28 16:01:54 ii : -- level = REQUIRE
14/04/28 16:01:54 ii : -- mode  = TUNNEL
14/04/28 16:01:54 ii : -- reqid = 0
14/04/28 16:01:54 ii : -- tsrc  = 210.80.199.3:0
14/04/28 16:01:54 ii : -- tdst  = 192.168.1.102:0
14/04/28 16:01:54 DB : policy ref increment ( ref count = 1, policy count = 12 )
14/04/28 16:01:54 DB : policy added
14/04/28 16:01:54 DB : policy ref decrement ( ref count = 0, policy count = 13 )
14/04/28 16:01:54 K< : recv X_SPDADD UNSPEC pfkey message
14/04/28 16:01:54 ii : - id    = 0
14/04/28 16:01:54 ii : - type  = IPSEC
14/04/28 16:01:54 ii : - dir   = OUTBOUND
14/04/28 16:01:54 ii : - transform #0
14/04/28 16:01:54 ii : -- proto = 50
14/04/28 16:01:54 ii : -- level = REQUIRE
14/04/28 16:01:54 ii : -- mode  = TUNNEL
14/04/28 16:01:54 ii : -- reqid = 0
14/04/28 16:01:54 ii : -- tsrc  = 192.168.1.102:0
14/04/28 16:01:54 ii : -- tdst  = 210.80.199.3:0
14/04/28 16:01:54 DB : policy ref increment ( ref count = 1, policy count = 13 )
14/04/28 16:01:54 DB : policy added
14/04/28 16:01:54 ii : installed divert rule for 205.197.192.150/255.255.255.255
14/04/28 16:01:54 DB : policy ref decrement ( ref count = 0, policy count = 14 )
14/04/28 16:01:54 K< : recv X_SPDADD UNSPEC pfkey message
14/04/28 16:01:54 ii : - id    = 0
14/04/28 16:01:54 ii : - type  = IPSEC
14/04/28 16:01:54 ii : - dir   = INBOUND
14/04/28 16:01:54 ii : - transform #0
14/04/28 16:01:54 ii : -- proto = 50
14/04/28 16:01:54 ii : -- level = REQUIRE
14/04/28 16:01:54 ii : -- mode  = TUNNEL
14/04/28 16:01:54 ii : -- reqid = 0
14/04/28 16:01:54 ii : -- tsrc  = 210.80.199.3:0
14/04/28 16:01:54 ii : -- tdst  = 192.168.1.102:0
14/04/28 16:01:54 DB : policy ref increment ( ref count = 1, policy count = 14 )
14/04/28 16:01:54 DB : policy added
14/04/28 16:01:54 DB : policy ref decrement ( ref count = 0, policy count = 15 )
14/04/28 16:01:54 K< : recv X_SPDADD UNSPEC pfkey message
14/04/28 16:01:54 ii : - id    = 0
14/04/28 16:01:54 ii : - type  = IPSEC
14/04/28 16:01:54 ii : - dir   = OUTBOUND
14/04/28 16:01:54 ii : - transform #0
14/04/28 16:01:54 ii : -- proto = 50
14/04/28 16:01:54 ii : -- level = REQUIRE
14/04/28 16:01:54 ii : -- mode  = TUNNEL
14/04/28 16:01:54 ii : -- reqid = 0
14/04/28 16:01:54 ii : -- tsrc  = 192.168.1.102:0
14/04/28 16:01:54 ii : -- tdst  = 210.80.199.3:0
14/04/28 16:01:54 DB : policy ref increment ( ref count = 1, policy count = 15 )
14/04/28 16:01:54 DB : policy added
14/04/28 16:01:54 ii : installed divert rule for 205.197.192.151/255.255.255.255
14/04/28 16:01:54 DB : policy ref decrement ( ref count = 0, policy count = 16 )
14/04/28 16:01:54 K< : recv GET UNSPEC pfkey message
14/04/28 16:01:54 DB : sa not found
14/04/28 16:01:54 ii : failed to locate UNSPEC sa for get
14/04/28 16:01:54 ii : - spi  = 0xd4963f12
14/04/28 16:01:54 K< : recv GET UNSPEC pfkey message
14/04/28 16:01:54 DB : sa found
14/04/28 16:01:54 DB : sa ref increment ( ref count = 2, sa count = 1 )
14/04/28 16:01:54 DB : sa ref decrement ( ref count = 1, sa count = 1 )
14/04/28 16:01:55 ii : inspecting ARP request ...
14/04/28 16:01:55 DB : policy not found
14/04/28 16:01:55 ii : ignoring ARP request for 10.120.2.101, no policy found
14/04/28 16:01:55 K< : recv GET UNSPEC pfkey message
14/04/28 16:01:55 DB : sa found
14/04/28 16:01:55 DB : sa ref increment ( ref count = 2, sa count = 1 )
14/04/28 16:01:55 DB : sa ref decrement ( ref count = 1, sa count = 1 )
14/04/28 16:01:56 ii : inspecting ARP request ...
14/04/28 16:01:56 DB : policy not found
14/04/28 16:01:56 ii : ignoring ARP request for 10.120.2.101, no policy found
14/04/28 16:01:56 K< : recv GET UNSPEC pfkey message
14/04/28 16:01:56 DB : sa found
14/04/28 16:01:56 DB : sa ref increment ( ref count = 2, sa count = 1 )
14/04/28 16:01:56 DB : sa ref decrement ( ref count = 1, sa count = 1 )
14/04/28 16:01:57 ii : inspecting ARP request ...
14/04/28 16:01:57 DB : policy not found
14/04/28 16:01:57 ii : ignoring ARP request for 10.120.2.101, no policy found
14/04/28 16:01:57 K< : recv GET UNSPEC pfkey message
14/04/28 16:01:57 DB : sa found
14/04/28 16:01:57 DB : sa ref increment ( ref count = 2, sa count = 1 )
14/04/28 16:01:57 DB : sa ref decrement ( ref count = 1, sa count = 1 )
14/04/28 16:01:58 ii : inspecting ARP request ...
14/04/28 16:01:58 ii : ignoring ARP request for 10.120.2.101,
duplicate address check
14/04/28 16:01:58 ii : inspecting ARP request ...
14/04/28 16:01:58 DB : policy found
14/04/28 16:01:58 DB : policy not found
14/04/28 16:01:58 ii : spoofing ARP response for 10.1.4.201
14/04/28 16:01:58 DB : policy found
14/04/28 16:01:58 DB : policy ref increment ( ref count = 1, policy count = 16 )
14/04/28 16:01:58 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 16:01:58 K> : sent ACQUIRE UNSPEC pfkey message
14/04/28 16:01:58 ii : - id   = 101
14/04/28 16:01:58 K> : sent ACQUIRE UNSPEC pfkey message
14/04/28 16:01:58 ii : - id   = 101
14/04/28 16:01:58 ii : queueing ip packet
14/04/28 16:01:58 K< : recv GETSPI ESP pfkey message
14/04/28 16:01:58 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 16:01:58 ii : allocated spi for ESP sa
14/04/28 16:01:58 ii : - spi  = 0x134da349
14/04/28 16:01:58 ii : - src  = 210.80.199.3:4500
14/04/28 16:01:58 ii : - dst  = 192.168.1.102:4500
14/04/28 16:01:58 DB : sa ref increment ( ref count = 1, sa count = 1 )
14/04/28 16:01:58 DB : sa added
14/04/28 16:01:58 DB : sa ref increment ( ref count = 2, sa count = 2 )
14/04/28 16:01:58 DB : sa ref decrement ( ref count = 1, sa count = 2 )
14/04/28 16:01:58 K> : sent GETSPI ESP pfkey message
14/04/28 16:01:58 K> : sent GETSPI ESP pfkey message
14/04/28 16:01:58 ii : inspecting ARP request ...
14/04/28 16:01:58 DB : policy not found
14/04/28 16:01:58 ii : ignoring ARP request for 192.168.1.1, no policy found
14/04/28 16:01:58 DB : policy found
14/04/28 16:01:58 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 16:01:58 ii : queueing ip packet
14/04/28 16:01:58 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 16:01:58 DB : policy found
14/04/28 16:01:58 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 16:01:58 ii : queueing ip packet
14/04/28 16:01:58 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 16:01:58 ii : inspecting ARP request ...
14/04/28 16:01:58 DB : policy found
14/04/28 16:01:58 DB : policy not found
14/04/28 16:01:58 ii : spoofing ARP response for 10.1.4.202
14/04/28 16:01:58 DB : policy found
14/04/28 16:01:58 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 16:01:58 ii : queueing ip packet
14/04/28 16:01:58 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 16:01:58 DB : policy found
14/04/28 16:01:58 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 16:01:58 ii : queueing ip packet
14/04/28 16:01:58 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 16:01:58 K< : recv GET UNSPEC pfkey message
14/04/28 16:01:58 DB : sa found
14/04/28 16:01:58 DB : sa ref increment ( ref count = 2, sa count = 2 )
14/04/28 16:01:58 DB : sa ref decrement ( ref count = 1, sa count = 2 )
14/04/28 16:01:58 K< : recv GET UNSPEC pfkey message
14/04/28 16:01:58 DB : sa found
14/04/28 16:01:58 DB : sa ref increment ( ref count = 2, sa count = 2 )
14/04/28 16:01:58 DB : sa ref decrement ( ref count = 1, sa count = 2 )
14/04/28 16:01:59 DB : policy found
14/04/28 16:01:59 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 16:01:59 ii : queueing ip packet
14/04/28 16:01:59 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 16:01:59 DB : policy found
14/04/28 16:01:59 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 16:01:59 ii : queueing ip packet
14/04/28 16:01:59 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 16:02:00 K< : recv GET UNSPEC pfkey message
14/04/28 16:02:00 DB : sa found
14/04/28 16:02:00 DB : sa ref increment ( ref count = 2, sa count = 2 )
14/04/28 16:02:00 DB : sa ref decrement ( ref count = 1, sa count = 2 )
14/04/28 16:02:00 K< : recv GET UNSPEC pfkey message
14/04/28 16:02:00 DB : sa found
14/04/28 16:02:00 DB : sa ref increment ( ref count = 2, sa count = 2 )
14/04/28 16:02:00 DB : sa ref decrement ( ref count = 1, sa count = 2 )
14/04/28 16:02:01 K< : recv GET UNSPEC pfkey message
14/04/28 16:02:01 DB : sa found
14/04/28 16:02:01 DB : sa ref increment ( ref count = 2, sa count = 2 )
14/04/28 16:02:01 DB : sa ref decrement ( ref count = 1, sa count = 2 )
14/04/28 16:02:01 K< : recv GET UNSPEC pfkey message
14/04/28 16:02:01 DB : sa found
14/04/28 16:02:01 DB : sa ref increment ( ref count = 2, sa count = 2 )
14/04/28 16:02:01 DB : sa ref decrement ( ref count = 1, sa count = 2 )
14/04/28 16:02:01 DB : policy found
14/04/28 16:02:01 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 16:02:01 ii : queueing ip packet
14/04/28 16:02:01 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 16:02:01 DB : policy found
14/04/28 16:02:01 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 16:02:01 ii : queueing ip packet
14/04/28 16:02:01 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 16:02:01 DB : policy found
14/04/28 16:02:01 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 16:02:01 ii : queueing ip packet
14/04/28 16:02:01 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 16:02:02 K< : recv GET UNSPEC pfkey message
14/04/28 16:02:02 DB : sa found
14/04/28 16:02:02 DB : sa ref increment ( ref count = 2, sa count = 2 )
14/04/28 16:02:02 DB : sa ref decrement ( ref count = 1, sa count = 2 )
14/04/28 16:02:02 K< : recv GET UNSPEC pfkey message
14/04/28 16:02:02 DB : sa found
14/04/28 16:02:02 DB : sa ref increment ( ref count = 2, sa count = 2 )
14/04/28 16:02:02 DB : sa ref decrement ( ref count = 1, sa count = 2 )
14/04/28 16:02:02 DB : policy found
14/04/28 16:02:02 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 16:02:02 ii : queueing ip packet
14/04/28 16:02:02 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 16:02:02 DB : policy found
14/04/28 16:02:02 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 16:02:02 ii : queueing ip packet
14/04/28 16:02:02 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 16:02:02 DB : policy found
14/04/28 16:02:02 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 16:02:02 ii : queueing ip packet
14/04/28 16:02:02 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 16:02:03 K< : recv GET UNSPEC pfkey message
14/04/28 16:02:03 DB : sa found
14/04/28 16:02:03 DB : sa ref increment ( ref count = 2, sa count = 2 )
14/04/28 16:02:03 DB : sa ref decrement ( ref count = 1, sa count = 2 )
14/04/28 16:02:03 K< : recv GET UNSPEC pfkey message
14/04/28 16:02:03 DB : sa found
14/04/28 16:02:03 DB : sa ref increment ( ref count = 2, sa count = 2 )
14/04/28 16:02:03 DB : sa ref decrement ( ref count = 1, sa count = 2 )
14/04/28 16:02:03 DB : policy found
14/04/28 16:02:03 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 16:02:03 ii : queueing ip packet
14/04/28 16:02:03 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 16:02:03 DB : policy found
14/04/28 16:02:03 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 16:02:03 ii : queueing ip packet
14/04/28 16:02:03 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 16:02:03 DB : policy found
14/04/28 16:02:03 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 16:02:03 ii : queueing ip packet
14/04/28 16:02:03 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 16:02:04 DB : policy found
14/04/28 16:02:04 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 16:02:04 ii : queueing ip packet
14/04/28 16:02:04 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 16:02:04 K< : recv GET UNSPEC pfkey message
14/04/28 16:02:04 DB : sa found
14/04/28 16:02:04 DB : sa ref increment ( ref count = 2, sa count = 2 )
14/04/28 16:02:04 DB : sa ref decrement ( ref count = 1, sa count = 2 )
14/04/28 16:02:04 K< : recv GET UNSPEC pfkey message
14/04/28 16:02:04 DB : sa found
14/04/28 16:02:04 DB : sa ref increment ( ref count = 2, sa count = 2 )
14/04/28 16:02:04 DB : sa ref decrement ( ref count = 1, sa count = 2 )
14/04/28 16:02:04 DB : policy found
14/04/28 16:02:04 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 16:02:04 ii : queueing ip packet
14/04/28 16:02:04 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 16:02:04 DB : policy found
14/04/28 16:02:04 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 16:02:04 ii : queueing ip packet
14/04/28 16:02:04 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 16:02:04 DB : policy found
14/04/28 16:02:04 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 16:02:04 ii : queueing ip packet
14/04/28 16:02:04 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 16:02:04 ii : inspecting ARP request ...
14/04/28 16:02:04 DB : policy not found
14/04/28 16:02:04 ii : ignoring ARP request for 192.168.1.1, no policy found
14/04/28 16:02:05 K< : recv GET UNSPEC pfkey message
14/04/28 16:02:05 DB : sa found
14/04/28 16:02:05 DB : sa ref increment ( ref count = 2, sa count = 2 )
14/04/28 16:02:05 DB : sa ref decrement ( ref count = 1, sa count = 2 )
14/04/28 16:02:05 K< : recv GET UNSPEC pfkey message
14/04/28 16:02:05 DB : sa found
14/04/28 16:02:05 DB : sa ref increment ( ref count = 2, sa count = 2 )
14/04/28 16:02:05 DB : sa ref decrement ( ref count = 1, sa count = 2 )
14/04/28 16:02:05 DB : policy found
14/04/28 16:02:05 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 16:02:05 ii : queueing ip packet
14/04/28 16:02:05 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 16:02:06 K< : recv GET UNSPEC pfkey message
14/04/28 16:02:06 DB : sa found
14/04/28 16:02:06 DB : sa ref increment ( ref count = 2, sa count = 2 )
14/04/28 16:02:06 DB : sa ref decrement ( ref count = 1, sa count = 2 )
14/04/28 16:02:06 K< : recv GET UNSPEC pfkey message
14/04/28 16:02:06 DB : sa found
14/04/28 16:02:06 DB : sa ref increment ( ref count = 2, sa count = 2 )
14/04/28 16:02:06 DB : sa ref decrement ( ref count = 1, sa count = 2 )
14/04/28 16:02:06 DB : policy found
14/04/28 16:02:06 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 16:02:06 ii : queueing ip packet
14/04/28 16:02:06 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 16:02:06 DB : policy found
14/04/28 16:02:06 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 16:02:06 ii : queueing ip packet
14/04/28 16:02:06 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 16:02:06 DB : policy found
14/04/28 16:02:06 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 16:02:06 ii : queueing ip packet
14/04/28 16:02:06 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 16:02:06 DB : policy found
14/04/28 16:02:06 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 16:02:06 ii : queueing ip packet
14/04/28 16:02:06 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 16:02:07 K< : recv GET UNSPEC pfkey message
14/04/28 16:02:07 DB : sa found
14/04/28 16:02:07 DB : sa ref increment ( ref count = 2, sa count = 2 )
14/04/28 16:02:07 DB : sa ref decrement ( ref count = 1, sa count = 2 )
14/04/28 16:02:07 K< : recv GET UNSPEC pfkey message
14/04/28 16:02:07 DB : sa found
14/04/28 16:02:07 DB : sa ref increment ( ref count = 2, sa count = 2 )
14/04/28 16:02:07 DB : sa ref decrement ( ref count = 1, sa count = 2 )
14/04/28 16:02:07 DB : policy found
14/04/28 16:02:07 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 16:02:07 ii : queueing ip packet
14/04/28 16:02:07 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 16:02:07 DB : policy found
14/04/28 16:02:07 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 16:02:07 ii : queueing ip packet
14/04/28 16:02:07 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 16:02:08 K< : recv GET UNSPEC pfkey message
14/04/28 16:02:08 DB : sa found
14/04/28 16:02:08 DB : sa ref increment ( ref count = 2, sa count = 2 )
14/04/28 16:02:08 DB : sa ref decrement ( ref count = 1, sa count = 2 )
14/04/28 16:02:08 K< : recv GET UNSPEC pfkey message
14/04/28 16:02:08 DB : sa found
14/04/28 16:02:08 DB : sa ref increment ( ref count = 2, sa count = 2 )
14/04/28 16:02:08 DB : sa ref decrement ( ref count = 1, sa count = 2 )
14/04/28 16:02:09 K< : recv GET UNSPEC pfkey message
14/04/28 16:02:09 DB : sa found
14/04/28 16:02:09 DB : sa ref increment ( ref count = 2, sa count = 2 )
14/04/28 16:02:09 DB : sa ref decrement ( ref count = 1, sa count = 2 )
14/04/28 16:02:09 K< : recv GET UNSPEC pfkey message
14/04/28 16:02:09 DB : sa found
14/04/28 16:02:09 DB : sa ref increment ( ref count = 2, sa count = 2 )
14/04/28 16:02:09 DB : sa ref decrement ( ref count = 1, sa count = 2 )
14/04/28 16:02:09 ii : sa never reached maturity
14/04/28 16:02:09 ii : removed sa divert rule for 210.80.199.3->192.168.1.102
14/04/28 16:02:09 DB : sa deleted ( sa count = 1 )
14/04/28 16:02:10 K< : recv GET UNSPEC pfkey message
14/04/28 16:02:10 DB : sa not found
14/04/28 16:02:10 ii : failed to locate UNSPEC sa for get
14/04/28 16:02:10 ii : - spi  = 0x6a2dcbaf
14/04/28 16:02:10 K< : recv GET UNSPEC pfkey message
14/04/28 16:02:10 DB : sa found
14/04/28 16:02:10 DB : sa ref increment ( ref count = 2, sa count = 1 )
14/04/28 16:02:10 DB : sa ref decrement ( ref count = 1, sa count = 1 )
14/04/28 16:02:10 DB : policy found
14/04/28 16:02:10 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 16:02:10 ii : queueing ip packet
14/04/28 16:02:10 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 16:02:10 DB : policy found
14/04/28 16:02:10 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 16:02:10 ii : queueing ip packet
14/04/28 16:02:10 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 16:02:10 DB : policy found
14/04/28 16:02:10 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 16:02:10 ii : queueing ip packet
14/04/28 16:02:10 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 16:02:10 DB : policy found
14/04/28 16:02:10 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 16:02:10 ii : queueing ip packet
14/04/28 16:02:10 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 16:02:10 DB : policy found
14/04/28 16:02:10 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 16:02:10 ii : queueing ip packet
14/04/28 16:02:10 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 16:02:11 DB : policy found
14/04/28 16:02:11 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 16:02:11 ii : queueing ip packet
14/04/28 16:02:11 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 16:02:11 DB : policy found
14/04/28 16:02:11 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 16:02:11 ii : queueing ip packet
14/04/28 16:02:11 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 16:02:11 K< : recv GET UNSPEC pfkey message
14/04/28 16:02:11 DB : sa found
14/04/28 16:02:11 DB : sa ref increment ( ref count = 2, sa count = 1 )
14/04/28 16:02:11 DB : sa ref decrement ( ref count = 1, sa count = 1 )
14/04/28 16:02:11 DB : policy found
14/04/28 16:02:11 DB : policy ref increment ( ref count = 2, policy count = 16 )
14/04/28 16:02:11 ii : queueing ip packet
14/04/28 16:02:11 DB : policy ref decrement ( ref count = 1, policy count = 16 )
14/04/28 16:02:12 K< : recv GET UNSPEC pfkey message
14/04/28 16:02:12 DB : sa found
14/04/28 16:02:12 DB : sa ref increment ( ref count = 2, sa count = 1 )
14/04/28 16:02:12 DB : sa ref decrement ( ref count = 1, sa count = 1 )
14/04/28 16:02:12 K< : recv X_SPDDELETE2 UNSPEC pfkey message
14/04/28 16:02:12 ii : - id   = 100
14/04/28 16:02:12 ii : - type = IPSEC
14/04/28 16:02:12 ii : - dir  = INBOUND
14/04/28 16:02:12 DB : policy found
14/04/28 16:02:12 DB : policy ref increment ( ref count = 1, policy count = 16 )
14/04/28 16:02:12 DB : policy deleted ( policy count = 15 )
14/04/28 16:02:12 K< : recv X_SPDDELETE2 UNSPEC pfkey message
14/04/28 16:02:12 ii : - id   = 101
14/04/28 16:02:12 ii : - type = IPSEC
14/04/28 16:02:12 ii : - dir  = OUTBOUND
14/04/28 16:02:12 DB : policy found
14/04/28 16:02:12 DB : policy ref increment ( ref count = 2, policy count = 15 )
14/04/28 16:02:12 ii : removed divert rule for 10.0.0.0/255.0.0.0
14/04/28 16:02:12 DB : policy deleted ( policy count = 14 )
14/04/28 16:02:12 K< : recv X_SPDDELETE2 UNSPEC pfkey message
14/04/28 16:02:12 ii : - id   = 102
14/04/28 16:02:12 ii : - type = IPSEC
14/04/28 16:02:12 ii : - dir  = INBOUND
14/04/28 16:02:12 DB : policy found
14/04/28 16:02:12 DB : policy ref increment ( ref count = 1, policy count = 14 )
14/04/28 16:02:12 DB : policy deleted ( policy count = 13 )
14/04/28 16:02:12 K< : recv X_SPDDELETE2 UNSPEC pfkey message
14/04/28 16:02:12 ii : - id   = 104
14/04/28 16:02:12 ii : - type = IPSEC
14/04/28 16:02:12 ii : - dir  = OUTBOUND
14/04/28 16:02:12 DB : policy found
14/04/28 16:02:12 DB : policy ref increment ( ref count = 1, policy count = 13 )
14/04/28 16:02:12 ii : removed divert rule for 192.168.90.0/255.255.255.0
14/04/28 16:02:12 DB : policy deleted ( policy count = 12 )
14/04/28 16:02:12 K< : recv X_SPDDELETE2 UNSPEC pfkey message
14/04/28 16:02:12 ii : - id   = 105
14/04/28 16:02:12 ii : - type = IPSEC
14/04/28 16:02:12 ii : - dir  = INBOUND
14/04/28 16:02:12 DB : policy found
14/04/28 16:02:12 DB : policy ref increment ( ref count = 1, policy count = 12 )
14/04/28 16:02:12 DB : policy deleted ( policy count = 11 )
14/04/28 16:02:12 K< : recv X_SPDDELETE2 UNSPEC pfkey message
14/04/28 16:02:12 ii : - id   = 106
14/04/28 16:02:12 ii : - type = IPSEC
14/04/28 16:02:12 ii : - dir  = OUTBOUND
14/04/28 16:02:12 DB : policy found
14/04/28 16:02:12 DB : policy ref increment ( ref count = 1, policy count = 11 )
14/04/28 16:02:12 ii : removed divert rule for 172.16.30.0/255.255.255.0
14/04/28 16:02:12 DB : policy deleted ( policy count = 10 )
14/04/28 16:02:12 K< : recv X_SPDDELETE2 UNSPEC pfkey message
14/04/28 16:02:12 ii : - id   = 107
14/04/28 16:02:12 ii : - type = IPSEC
14/04/28 16:02:12 ii : - dir  = INBOUND
14/04/28 16:02:12 DB : policy found
14/04/28 16:02:12 DB : policy ref increment ( ref count = 1, policy count = 10 )
14/04/28 16:02:12 DB : policy deleted ( policy count = 9 )
14/04/28 16:02:12 K< : recv X_SPDDELETE2 UNSPEC pfkey message
14/04/28 16:02:12 ii : - id   = 108
14/04/28 16:02:12 ii : - type = IPSEC
14/04/28 16:02:12 ii : - dir  = OUTBOUND
14/04/28 16:02:12 DB : policy found
14/04/28 16:02:12 DB : policy ref increment ( ref count = 1, policy count = 9 )
14/04/28 16:02:12 ii : removed divert rule for 192.168.3.0/255.255.255.0
14/04/28 16:02:12 DB : policy deleted ( policy count = 8 )
14/04/28 16:02:12 K< : recv X_SPDDELETE2 UNSPEC pfkey message
14/04/28 16:02:12 ii : - id   = 109
14/04/28 16:02:12 ii : - type = IPSEC
14/04/28 16:02:12 ii : - dir  = INBOUND
14/04/28 16:02:12 DB : policy found
14/04/28 16:02:12 DB : policy ref increment ( ref count = 1, policy count = 8 )
14/04/28 16:02:12 DB : policy deleted ( policy count = 7 )
14/04/28 16:02:12 K< : recv X_SPDDELETE2 UNSPEC pfkey message
14/04/28 16:02:12 ii : - id   = 110
14/04/28 16:02:12 ii : - type = IPSEC
14/04/28 16:02:12 ii : - dir  = OUTBOUND
14/04/28 16:02:12 DB : policy found
14/04/28 16:02:12 DB : policy ref increment ( ref count = 1, policy count = 7 )
14/04/28 16:02:12 ii : removed divert rule for 205.197.192.150/255.255.255.255
14/04/28 16:02:12 DB : policy deleted ( policy count = 6 )
14/04/28 16:02:12 K< : recv X_SPDDELETE2 UNSPEC pfkey message
14/04/28 16:02:12 ii : - id   = 111
14/04/28 16:02:12 ii : - type = IPSEC
14/04/28 16:02:12 ii : - dir  = INBOUND
14/04/28 16:02:12 DB : policy found
14/04/28 16:02:12 DB : policy ref increment ( ref count = 1, policy count = 6 )
14/04/28 16:02:12 DB : policy deleted ( policy count = 5 )
14/04/28 16:02:12 K< : recv X_SPDDELETE2 UNSPEC pfkey message
14/04/28 16:02:12 ii : - id   = 112
14/04/28 16:02:12 ii : - type = IPSEC
14/04/28 16:02:12 ii : - dir  = OUTBOUND
14/04/28 16:02:12 DB : policy found
14/04/28 16:02:12 DB : policy ref increment ( ref count = 1, policy count = 5 )
14/04/28 16:02:12 ii : removed divert rule for 205.197.192.151/255.255.255.255
14/04/28 16:02:12 DB : policy deleted ( policy count = 4 )
14/04/28 16:02:12 K< : recv X_SPDDELETE2 UNSPEC pfkey message
14/04/28 16:02:12 ii : - id   = 98
14/04/28 16:02:12 ii : - type = NONE
14/04/28 16:02:12 ii : - dir  = INBOUND
14/04/28 16:02:12 DB : policy found
14/04/28 16:02:12 DB : policy ref increment ( ref count = 1, policy count = 4 )
14/04/28 16:02:12 DB : policy deleted ( policy count = 3 )
14/04/28 16:02:12 K< : recv X_SPDDELETE2 UNSPEC pfkey message
14/04/28 16:02:12 ii : - id   = 99
14/04/28 16:02:12 ii : - type = NONE
14/04/28 16:02:12 ii : - dir  = OUTBOUND
14/04/28 16:02:12 DB : policy found
14/04/28 16:02:12 DB : policy ref increment ( ref count = 1, policy count = 3 )
14/04/28 16:02:12 ii : removed accept rule for 192.168.1.1/255.255.255.255
14/04/28 16:02:12 DB : policy deleted ( policy count = 2 )
14/04/28 16:02:12 K< : recv X_SPDDELETE2 UNSPEC pfkey message
14/04/28 16:02:12 ii : - id   = 96
14/04/28 16:02:12 ii : - type = NONE
14/04/28 16:02:12 ii : - dir  = INBOUND
14/04/28 16:02:12 DB : policy found
14/04/28 16:02:12 DB : policy ref increment ( ref count = 1, policy count = 2 )
14/04/28 16:02:12 DB : policy deleted ( policy count = 1 )
14/04/28 16:02:12 K< : recv X_SPDDELETE2 UNSPEC pfkey message
14/04/28 16:02:12 ii : - id   = 97
14/04/28 16:02:12 ii : - type = NONE
14/04/28 16:02:12 ii : - dir  = OUTBOUND
14/04/28 16:02:12 DB : policy found
14/04/28 16:02:12 DB : policy ref increment ( ref count = 1, policy count = 1 )
14/04/28 16:02:12 ii : removed accept rule for 210.80.199.3/255.255.255.255
14/04/28 16:02:12 DB : policy deleted ( policy count = 0 )
14/04/28 16:02:12 ii : removed mirror rule ( policycount 0 )
14/04/28 16:02:13 ii : sa never reached maturity
14/04/28 16:02:13 ii : removed sa divert rule for 210.80.199.3->192.168.1.102
14/04/28 16:02:13 DB : sa deleted ( sa count = 0 )
14/04/28 16:02:13 K< : recv GET UNSPEC pfkey message
14/04/28 16:02:13 DB : sa not found
14/04/28 16:02:13 ii : failed to locate UNSPEC sa for get
14/04/28 16:02:13 ii : - spi  = 0x134da349
14/04/28 16:02:19 ii : pfkey client process thread exit ...
14/04/28 16:02:22 ii : network recv process thread exit ...

----------------------------------------------------------------------------------------------------------------------------------------------------
14/04/28 15:58:25 ## : IKE Daemon, ver 2.2.2
14/04/28 15:58:25 ## : Copyright 2013 Shrew Soft Inc.
14/04/28 15:58:25 ## : This product linked OpenSSL 1.0.1c 10 May 2012
14/04/28 15:58:25 ii : opened 'C:\Program Files\ShrewSoft\VPN
Client\debug\iked.log'
14/04/28 15:58:25 ii : rebuilding vnet device list ...
14/04/28 15:58:25 ii : device ROOT\VNET\0000 disabled
14/04/28 15:58:25 ii : ipc server process thread begin ...
14/04/28 15:58:25 ii : network process thread begin ...
14/04/28 15:58:25 ii : pfkey process thread begin ...
14/04/28 15:58:33 !! : unable to connect to pfkey interface
14/04/28 15:58:49 ii : ipc client process thread begin ...
14/04/28 15:58:49 <A : peer config add message
14/04/28 15:58:49 <A : proposal config message
14/04/28 15:58:49 <A : proposal config message
14/04/28 15:58:49 <A : client config message
14/04/28 15:58:49 <A : xauth username message
14/04/28 15:58:49 <A : xauth password message
14/04/28 15:58:49 <A : local id 'ScanSoft' message
14/04/28 15:58:49 <A : preshared key message
14/04/28 15:58:49 <A : peer tunnel enable message
14/04/28 15:58:49 DB : peer added ( obj count = 1 )
14/04/28 15:58:49 ii : local address 192.168.1.102 selected for peer
14/04/28 15:58:49 DB : tunnel added ( obj count = 1 )
14/04/28 15:58:49 DB : new phase1 ( ISAKMP initiator )
14/04/28 15:58:49 DB : exchange type is aggressive
14/04/28 15:58:49 DB : 192.168.1.102:500 <-> 210.80.199.3:500
14/04/28 15:58:49 DB : def191b7e3fe0d6e:0000000000000000
14/04/28 15:58:49 DB : phase1 added ( obj count = 1 )
14/04/28 15:58:49 >> : security association payload
14/04/28 15:58:49 >> : - proposal #1 payload
14/04/28 15:58:49 >> : -- transform #1 payload
14/04/28 15:58:49 >> : -- transform #2 payload
14/04/28 15:58:49 >> : -- transform #3 payload
14/04/28 15:58:49 >> : -- transform #4 payload
14/04/28 15:58:49 >> : -- transform #5 payload
14/04/28 15:58:49 >> : -- transform #6 payload
14/04/28 15:58:49 >> : -- transform #7 payload
14/04/28 15:58:49 >> : -- transform #8 payload
14/04/28 15:58:49 >> : -- transform #9 payload
14/04/28 15:58:49 >> : -- transform #10 payload
14/04/28 15:58:49 >> : -- transform #11 payload
14/04/28 15:58:49 >> : -- transform #12 payload
14/04/28 15:58:49 >> : -- transform #13 payload
14/04/28 15:58:49 >> : -- transform #14 payload
14/04/28 15:58:49 >> : -- transform #15 payload
14/04/28 15:58:49 >> : -- transform #16 payload
14/04/28 15:58:49 >> : -- transform #17 payload
14/04/28 15:58:49 >> : -- transform #18 payload
14/04/28 15:58:49 >> : key exchange payload
14/04/28 15:58:49 >> : nonce payload
14/04/28 15:58:49 >> : identification payload
14/04/28 15:58:49 >> : vendor id payload
14/04/28 15:58:49 ii : local supports XAUTH
14/04/28 15:58:49 >> : vendor id payload
14/04/28 15:58:49 ii : local supports nat-t ( draft v00 )
14/04/28 15:58:49 >> : vendor id payload
14/04/28 15:58:49 ii : local supports nat-t ( draft v01 )
14/04/28 15:58:49 >> : vendor id payload
14/04/28 15:58:49 ii : local supports nat-t ( draft v02 )
14/04/28 15:58:49 >> : vendor id payload
14/04/28 15:58:49 ii : local supports nat-t ( draft v03 )
14/04/28 15:58:49 >> : vendor id payload
14/04/28 15:58:49 ii : local supports nat-t ( rfc )
14/04/28 15:58:49 >> : vendor id payload
14/04/28 15:58:49 >> : vendor id payload
14/04/28 15:58:49 ii : local supports DPDv1
14/04/28 15:58:49 >> : vendor id payload
14/04/28 15:58:49 ii : local is SHREW SOFT compatible
14/04/28 15:58:49 >> : vendor id payload
14/04/28 15:58:49 ii : local is NETSCREEN compatible
14/04/28 15:58:49 >> : vendor id payload
14/04/28 15:58:49 ii : local is SIDEWINDER compatible
14/04/28 15:58:49 >> : vendor id payload
14/04/28 15:58:49 ii : local is CISCO UNITY compatible
14/04/28 15:58:49 >= : cookies def191b7e3fe0d6e:0000000000000000
14/04/28 15:58:49 >= : message 00000000
14/04/28 15:58:49 -> : send IKE packet 192.168.1.102:500 ->
210.80.199.3:500 ( 1180 bytes )
14/04/28 15:58:49 DB : phase1 resend event scheduled ( ref count = 2 )
14/04/28 15:58:50 <- : recv IKE packet 210.80.199.3:500 ->
192.168.1.102:500 ( 448 bytes )
14/04/28 15:58:50 DB : phase1 found
14/04/28 15:58:50 ii : processing phase1 packet ( 448 bytes )
14/04/28 15:58:50 =< : cookies def191b7e3fe0d6e:ae57329ab4376263
14/04/28 15:58:50 =< : message 00000000
14/04/28 15:58:50 << : security association payload
14/04/28 15:58:50 << : - propsal #1 payload
14/04/28 15:58:50 << : -- transform #13 payload
14/04/28 15:58:50 ii : unmatched isakmp proposal/transform
14/04/28 15:58:50 ii : cipher type ( 3des != aes )
14/04/28 15:58:50 ii : unmatched isakmp proposal/transform
14/04/28 15:58:50 ii : cipher type ( 3des != aes )
14/04/28 15:58:50 ii : unmatched isakmp proposal/transform
14/04/28 15:58:50 ii : cipher type ( 3des != aes )
14/04/28 15:58:50 ii : unmatched isakmp proposal/transform
14/04/28 15:58:50 ii : cipher type ( 3des != aes )
14/04/28 15:58:50 ii : unmatched isakmp proposal/transform
14/04/28 15:58:50 ii : cipher type ( 3des != aes )
14/04/28 15:58:50 ii : unmatched isakmp proposal/transform
14/04/28 15:58:50 ii : cipher type ( 3des != aes )
14/04/28 15:58:50 ii : unmatched isakmp proposal/transform
14/04/28 15:58:50 ii : cipher type ( 3des != blowfish )
14/04/28 15:58:50 ii : unmatched isakmp proposal/transform
14/04/28 15:58:50 ii : cipher type ( 3des != blowfish )
14/04/28 15:58:50 ii : unmatched isakmp proposal/transform
14/04/28 15:58:50 ii : cipher type ( 3des != blowfish )
14/04/28 15:58:50 ii : unmatched isakmp proposal/transform
14/04/28 15:58:50 ii : cipher type ( 3des != blowfish )
14/04/28 15:58:50 ii : unmatched isakmp proposal/transform
14/04/28 15:58:50 ii : cipher type ( 3des != blowfish )
14/04/28 15:58:50 ii : unmatched isakmp proposal/transform
14/04/28 15:58:50 ii : cipher type ( 3des != blowfish )
14/04/28 15:58:50 ii : matched isakmp proposal #1 transform #13
14/04/28 15:58:50 ii : - transform    = ike
14/04/28 15:58:50 ii : - cipher type  = 3des
14/04/28 15:58:50 ii : - key length   = default
14/04/28 15:58:50 ii : - hash type    = md5
14/04/28 15:58:50 ii : - dh group     = group2 ( modp-1024 )
14/04/28 15:58:50 ii : - auth type    = xauth-initiator-psk
14/04/28 15:58:50 ii : - life seconds = 86400
14/04/28 15:58:50 ii : - life kbytes  = 0
14/04/28 15:58:50 << : key exchange payload
14/04/28 15:58:50 << : nonce payload
14/04/28 15:58:50 << : identification payload
14/04/28 15:58:50 ii : phase1 id target is any
14/04/28 15:58:50 ii : phase1 id match
14/04/28 15:58:50 ii : received = ipv4-host 210.80.199.3
14/04/28 15:58:50 << : hash payload
14/04/28 15:58:50 << : vendor id payload
14/04/28 15:58:50 ii : peer is CISCO UNITY compatible
14/04/28 15:58:50 << : vendor id payload
14/04/28 15:58:50 ii : peer supports XAUTH
14/04/28 15:58:50 << : vendor id payload
14/04/28 15:58:50 ii : peer supports DPDv1
14/04/28 15:58:50 << : vendor id payload
14/04/28 15:58:50 ii : peer supports nat-t ( draft v02 )
14/04/28 15:58:50 << : nat discovery payload
14/04/28 15:58:50 << : nat discovery payload
14/04/28 15:58:50 << : vendor id payload
14/04/28 15:58:50 ii : unknown vendor id ( 20 bytes )
14/04/28 15:58:50 0x : 4048b7d5 6ebce885 25e7de7f 00d6c2d3 c0000000
14/04/28 15:58:50 << : vendor id payload
14/04/28 15:58:50 ii : unknown vendor id ( 16 bytes )
14/04/28 15:58:50 0x : 5b909587 b4366263 b28398e2 db74b876
14/04/28 15:58:50 << : vendor id payload
14/04/28 15:58:50 ii : unknown vendor id ( 16 bytes )
14/04/28 15:58:50 0x : 1f07f70e aa6514d3 b0fa9654 2a500407
14/04/28 15:58:50 ii : nat discovery - local address is translated
14/04/28 15:58:50 ii : switching to src nat-t udp port 4500
14/04/28 15:58:50 ii : switching to dst nat-t udp port 4500
14/04/28 15:58:50 ww : short DH shared secret computed
14/04/28 15:58:50 == : DH shared secret ( 128 bytes )
14/04/28 15:58:50 == : SETKEYID ( 16 bytes )
14/04/28 15:58:50 == : SETKEYID_d ( 16 bytes )
14/04/28 15:58:50 == : SETKEYID_a ( 16 bytes )
14/04/28 15:58:50 == : SETKEYID_e ( 16 bytes )
14/04/28 15:58:50 == : cipher key ( 32 bytes )
14/04/28 15:58:50 == : cipher iv ( 8 bytes )
14/04/28 15:58:50 == : phase1 hash_i ( computed ) ( 16 bytes )
14/04/28 15:58:50 >> : hash payload
14/04/28 15:58:50 >> : nat discovery payload
14/04/28 15:58:50 >> : nat discovery payload
14/04/28 15:58:50 >= : cookies def191b7e3fe0d6e:ae57329ab4376263
14/04/28 15:58:50 >= : message 00000000
14/04/28 15:58:50 >= : encrypt iv ( 8 bytes )
14/04/28 15:58:50 == : encrypt packet ( 88 bytes )
14/04/28 15:58:50 == : stored iv ( 8 bytes )
14/04/28 15:58:50 DB : phase1 resend event canceled ( ref count = 1 )
14/04/28 15:58:50 -> : send NAT-T:IKE packet 192.168.1.102:4500 ->
210.80.199.3:4500 ( 124 bytes )
14/04/28 15:58:50 == : phase1 hash_r ( computed ) ( 16 bytes )
14/04/28 15:58:50 == : phase1 hash_r ( received ) ( 16 bytes )
14/04/28 15:58:50 ii : phase1 sa established
14/04/28 15:58:50 ii : 210.80.199.3:4500 <-> 192.168.1.102:4500
14/04/28 15:58:50 ii : def191b7e3fe0d6e:ae57329ab4376263
14/04/28 15:58:50 ii : sending peer INITIAL-CONTACT notification
14/04/28 15:58:50 ii : - 192.168.1.102:4500 -> 210.80.199.3:4500
14/04/28 15:58:50 ii : - isakmp spi = def191b7e3fe0d6e:ae57329ab4376263
14/04/28 15:58:50 ii : - data size 0
14/04/28 15:58:50 >> : hash payload
14/04/28 15:58:50 >> : notification payload
14/04/28 15:58:50 == : new informational hash ( 16 bytes )
14/04/28 15:58:50 == : new informational iv ( 8 bytes )
14/04/28 15:58:50 >= : cookies def191b7e3fe0d6e:ae57329ab4376263
14/04/28 15:58:50 >= : message 9475dca5
14/04/28 15:58:50 >= : encrypt iv ( 8 bytes )
14/04/28 15:58:50 == : encrypt packet ( 76 bytes )
14/04/28 15:58:50 == : stored iv ( 8 bytes )
14/04/28 15:58:50 -> : send NAT-T:IKE packet 192.168.1.102:4500 ->
210.80.199.3:4500 ( 108 bytes )
14/04/28 15:58:50 DB : phase2 not found
14/04/28 15:58:50 <- : recv NAT-T:IKE packet 210.80.199.3:4500 ->
192.168.1.102:4500 ( 116 bytes )
14/04/28 15:58:50 DB : phase1 found
14/04/28 15:58:50 ii : processing config packet ( 116 bytes )
14/04/28 15:58:50 DB : config not found
14/04/28 15:58:50 DB : config added ( obj count = 1 )
14/04/28 15:58:50 == : new config iv ( 8 bytes )
14/04/28 15:58:50 =< : cookies def191b7e3fe0d6e:ae57329ab4376263
14/04/28 15:58:50 =< : message fe0cbe33
14/04/28 15:58:50 =< : decrypt iv ( 8 bytes )
14/04/28 15:58:50 == : decrypt packet ( 116 bytes )
14/04/28 15:58:50 <= : trimmed packet padding ( 4 bytes )
14/04/28 15:58:50 <= : stored iv ( 8 bytes )
14/04/28 15:58:50 << : hash payload
14/04/28 15:58:50 << : attribute payload
14/04/28 15:58:50 == : configure hash_i ( computed ) ( 16 bytes )
14/04/28 15:58:50 == : configure hash_c ( computed ) ( 16 bytes )
14/04/28 15:58:50 ii : configure hash verified
14/04/28 15:58:50 ii : - xauth authentication type
14/04/28 15:58:50 ii : - xauth username
14/04/28 15:58:50 ww : unhandled xauth attribute 16526
14/04/28 15:58:50 ii : - xauth password
14/04/28 15:58:50 ii : received basic xauth request - Enter Username,
Password and Domain.
14/04/28 15:58:50 ii : - standard xauth username
14/04/28 15:58:50 ii : - standard xauth password
14/04/28 15:58:50 ii : sending xauth response for guido_aversano
14/04/28 15:58:50 >> : hash payload
14/04/28 15:58:50 >> : attribute payload
14/04/28 15:58:50 == : new configure hash ( 16 bytes )
14/04/28 15:58:50 >= : cookies def191b7e3fe0d6e:ae57329ab4376263
14/04/28 15:58:50 >= : message fe0cbe33
14/04/28 15:58:50 >= : encrypt iv ( 8 bytes )
14/04/28 15:58:50 == : encrypt packet ( 90 bytes )
14/04/28 15:58:50 == : stored iv ( 8 bytes )
14/04/28 15:58:50 -> : send NAT-T:IKE packet 192.168.1.102:4500 ->
210.80.199.3:4500 ( 124 bytes )
14/04/28 15:58:50 DB : config resend event scheduled ( ref count = 2 )
14/04/28 15:58:50 <- : recv NAT-T:IKE packet 210.80.199.3:4500 ->
192.168.1.102:4500 ( 60 bytes )
14/04/28 15:58:50 DB : phase1 found
14/04/28 15:58:50 ii : processing config packet ( 60 bytes )
14/04/28 15:58:50 DB : config found
14/04/28 15:58:50 == : new config iv ( 8 bytes )
14/04/28 15:58:50 =< : cookies def191b7e3fe0d6e:ae57329ab4376263
14/04/28 15:58:50 =< : message f0b44624
14/04/28 15:58:50 =< : decrypt iv ( 8 bytes )
14/04/28 15:58:50 == : decrypt packet ( 60 bytes )
14/04/28 15:58:50 <= : stored iv ( 8 bytes )
14/04/28 15:58:50 << : hash payload
14/04/28 15:58:50 << : attribute payload
14/04/28 15:58:50 == : configure hash_i ( computed ) ( 16 bytes )
14/04/28 15:58:50 == : configure hash_c ( computed ) ( 16 bytes )
14/04/28 15:58:50 ii : configure hash verified
14/04/28 15:58:50 ii : received xauth result -
14/04/28 15:58:50 ii : user guido_aversano authentication succeeded
14/04/28 15:58:50 ii : sending xauth acknowledge
14/04/28 15:58:50 >> : hash payload
14/04/28 15:58:50 >> : attribute payload
14/04/28 15:58:50 == : new configure hash ( 16 bytes )
14/04/28 15:58:50 >= : cookies def191b7e3fe0d6e:ae57329ab4376263
14/04/28 15:58:50 >= : message f0b44624
14/04/28 15:58:50 >= : encrypt iv ( 8 bytes )
14/04/28 15:58:50 == : encrypt packet ( 56 bytes )
14/04/28 15:58:50 == : stored iv ( 8 bytes )
14/04/28 15:58:50 DB : config resend event canceled ( ref count = 1 )
14/04/28 15:58:50 -> : send NAT-T:IKE packet 192.168.1.102:4500 ->
210.80.199.3:4500 ( 92 bytes )
14/04/28 15:58:50 DB : config resend event scheduled ( ref count = 2 )
14/04/28 15:58:50 ii : building config attribute list
14/04/28 15:58:50 ii : - IP4 Address
14/04/28 15:58:50 ii : - Address Expiry
14/04/28 15:58:50 ii : - IP4 Netmask
14/04/28 15:58:50 ii : - IP4 DNS Server
14/04/28 15:58:50 ii : - IP4 WINS Server
14/04/28 15:58:50 ii : - DNS Suffix
14/04/28 15:58:50 ii : - IP4 Split Network Include
14/04/28 15:58:50 ii : - IP4 Split Network Exclude
14/04/28 15:58:50 ii : - Login Banner
14/04/28 15:58:50 ii : - PFS Group
14/04/28 15:58:50 ii : - Save Password
14/04/28 15:58:50 ii : - CISCO UDP Port
14/04/28 15:58:50 ii : - Application Version = Cisco Systems VPN
Client 4.8.01.0300:WinNT
14/04/28 15:58:50 ii : - Firewall Type = CISCO-UNKNOWN
14/04/28 15:58:50 == : new config iv ( 8 bytes )
14/04/28 15:58:50 ii : sending config pull request
14/04/28 15:58:50 >> : hash payload
14/04/28 15:58:50 >> : attribute payload
14/04/28 15:58:50 == : new configure hash ( 16 bytes )
14/04/28 15:58:50 >= : cookies def191b7e3fe0d6e:ae57329ab4376263
14/04/28 15:58:50 >= : message 46842a33
14/04/28 15:58:50 >= : encrypt iv ( 8 bytes )
14/04/28 15:58:50 == : encrypt packet ( 166 bytes )
14/04/28 15:58:50 == : stored iv ( 8 bytes )
14/04/28 15:58:50 DB : config resend event canceled ( ref count = 1 )
14/04/28 15:58:50 -> : send NAT-T:IKE packet 192.168.1.102:4500 ->
210.80.199.3:4500 ( 204 bytes )
14/04/28 15:58:50 DB : config resend event scheduled ( ref count = 2 )
14/04/28 15:58:51 <- : recv NAT-T:IKE packet 210.80.199.3:4500 ->
192.168.1.102:4500 ( 308 bytes )
14/04/28 15:58:51 DB : phase1 found
14/04/28 15:58:51 ii : processing config packet ( 308 bytes )
14/04/28 15:58:51 DB : config found
14/04/28 15:58:51 =< : cookies def191b7e3fe0d6e:ae57329ab4376263
14/04/28 15:58:51 =< : message 46842a33
14/04/28 15:58:51 =< : decrypt iv ( 8 bytes )
14/04/28 15:58:51 == : decrypt packet ( 308 bytes )
14/04/28 15:58:51 <= : stored iv ( 8 bytes )
14/04/28 15:58:51 << : hash payload
14/04/28 15:58:51 << : attribute payload
14/04/28 15:58:51 == : configure hash_i ( computed ) ( 16 bytes )
14/04/28 15:58:51 == : configure hash_c ( computed ) ( 16 bytes )
14/04/28 15:58:51 ii : configure hash verified
14/04/28 15:58:51 ii : received config pull response
14/04/28 15:58:51 ii : - IP4 Address = 10.120.2.101
14/04/28 15:58:51 ii : - IP4 Netmask = 255.255.255.0
14/04/28 15:58:51 ii : - IP4 DNS Server = 10.1.4.201
14/04/28 15:58:51 ii : - IP4 DNS Server = 10.1.4.202
14/04/28 15:58:51 ii : - IP4 WINS Server = 10.1.4.201
14/04/28 15:58:51 ii : - Save Password = 0
14/04/28 15:58:51 ii : - IP4 Split Network Include = ANY:10.0.0.0/8:*
14/04/28 15:58:51 ii : - IP4 Split Network Include = ANY:192.168.90.0/24:*
14/04/28 15:58:51 ii : - IP4 Split Network Include = ANY:172.16.30.0/24:*
14/04/28 15:58:51 ii : - IP4 Split Network Include = ANY:192.168.3.0/24:*
14/04/28 15:58:51 ii : - IP4 Split Network Include = ANY:205.197.192.150/32:*
14/04/28 15:58:51 ii : - IP4 Split Network Include = ANY:205.197.192.151/32:*
14/04/28 15:58:51 ii : - DNS Suffix = nuance.com
14/04/28 15:58:51 ii : - PFS Group = 0
14/04/28 15:58:51 ii : - Application Version = Cisco Systems, Inc./VPN
3000 Concentrator Version 4.7.2.P built by vmurphy on Jul 30 2008
17:39:30
14/04/28 15:58:51 DB : config resend event canceled ( ref count = 1 )
14/04/28 15:58:51 ii : enabled adapter ROOT\VNET\0000
14/04/28 15:58:51 ii : adapter ROOT\VNET\0000 unavailable, retrying ...
14/04/28 15:58:53 ii : apapter ROOT\VNET\0000 MTU is 1380
14/04/28 15:58:53 ii : generating IPSEC security policies at REQUIRE level
14/04/28 15:58:53 ii : creating NONE INBOUND policy ANY:210.80.199.3:*
-> ANY:192.168.1.102:*
14/04/28 15:58:53 DB : policy added ( obj count = 1 )
14/04/28 15:58:53 K> : send pfkey X_SPDADD UNSPEC message
14/04/28 15:58:53 K< : recv pfkey X_SPDADD UNSPEC message
14/04/28 15:58:53 DB : policy found
14/04/28 15:58:53 ii : creating NONE OUTBOUND policy
ANY:192.168.1.102:* -> ANY:210.80.199.3:*
14/04/28 15:58:53 ii : created NONE policy route for 210.80.199.3/32
14/04/28 15:58:53 DB : policy added ( obj count = 2 )
14/04/28 15:58:53 K> : send pfkey X_SPDADD UNSPEC message
14/04/28 15:58:53 K< : recv pfkey X_SPDADD UNSPEC message
14/04/28 15:58:53 DB : policy found
14/04/28 15:58:53 ii : creating NONE INBOUND policy ANY:192.168.1.1:*
-> ANY:10.120.2.101:*
14/04/28 15:58:53 DB : policy added ( obj count = 3 )
14/04/28 15:58:53 K> : send pfkey X_SPDADD UNSPEC message
14/04/28 15:58:53 K< : recv pfkey X_SPDADD UNSPEC message
14/04/28 15:58:53 DB : policy found
14/04/28 15:58:53 ii : creating NONE OUTBOUND policy
ANY:10.120.2.101:* -> ANY:192.168.1.1:*
14/04/28 15:58:53 DB : policy added ( obj count = 4 )
14/04/28 15:58:53 K> : send pfkey X_SPDADD UNSPEC message
14/04/28 15:58:53 K< : recv pfkey X_SPDADD UNSPEC message
14/04/28 15:58:53 DB : policy found
14/04/28 15:58:53 ii : creating IPSEC INBOUND policy ANY:10.0.0.0/8:*
-> ANY:10.120.2.101:*
14/04/28 15:58:53 DB : policy added ( obj count = 5 )
14/04/28 15:58:53 K> : send pfkey X_SPDADD UNSPEC message
14/04/28 15:58:53 K< : recv pfkey X_SPDADD UNSPEC message
14/04/28 15:58:53 DB : policy found
14/04/28 15:58:53 ii : creating IPSEC OUTBOUND policy
ANY:10.120.2.101:* -> ANY:10.0.0.0/8:*
14/04/28 15:58:53 ii : created IPSEC policy route for 10.0.0.0/8
14/04/28 15:58:53 DB : policy added ( obj count = 6 )
14/04/28 15:58:53 K> : send pfkey X_SPDADD UNSPEC message
14/04/28 15:58:53 ii : creating IPSEC INBOUND policy
ANY:192.168.90.0/24:* -> ANY:10.120.2.101:*
14/04/28 15:58:53 DB : policy added ( obj count = 7 )
14/04/28 15:58:53 K> : send pfkey X_SPDADD UNSPEC message
14/04/28 15:58:53 ii : creating IPSEC OUTBOUND policy
ANY:10.120.2.101:* -> ANY:192.168.90.0/24:*
14/04/28 15:58:53 K< : recv pfkey X_SPDADD UNSPEC message
14/04/28 15:58:53 DB : policy found
14/04/28 15:58:53 ii : calling init phase2 for initial policy
14/04/28 15:58:53 DB : policy found
14/04/28 15:58:53 DB : policy found
14/04/28 15:58:53 DB : tunnel found
14/04/28 15:58:53 DB : new phase2 ( IPSEC initiator )
14/04/28 15:58:53 DB : phase2 added ( obj count = 1 )
14/04/28 15:58:53 K> : send pfkey GETSPI ESP message
14/04/28 15:58:53 K< : recv pfkey X_SPDADD UNSPEC message
14/04/28 15:58:53 DB : policy found
14/04/28 15:58:53 K< : recv pfkey GETSPI ESP message
14/04/28 15:58:53 DB : phase2 found
14/04/28 15:58:53 ii : updated spi for 1 ipsec-esp proposal
14/04/28 15:58:53 DB : phase1 found
14/04/28 15:58:53 >> : hash payload
14/04/28 15:58:53 >> : security association payload
14/04/28 15:58:53 >> : - proposal #1 payload
14/04/28 15:58:53 >> : -- transform #1 payload
14/04/28 15:58:53 >> : -- transform #2 payload
14/04/28 15:58:53 >> : -- transform #3 payload
14/04/28 15:58:53 >> : -- transform #4 payload
14/04/28 15:58:53 >> : -- transform #5 payload
14/04/28 15:58:53 >> : -- transform #6 payload
14/04/28 15:58:53 >> : -- transform #7 payload
14/04/28 15:58:53 >> : -- transform #8 payload
14/04/28 15:58:53 >> : -- transform #9 payload
14/04/28 15:58:53 >> : -- transform #10 payload
14/04/28 15:58:53 >> : -- transform #11 payload
14/04/28 15:58:53 >> : -- transform #12 payload
14/04/28 15:58:53 >> : -- transform #13 payload
14/04/28 15:58:53 >> : -- transform #14 payload
14/04/28 15:58:53 >> : -- transform #15 payload
14/04/28 15:58:53 >> : -- transform #16 payload
14/04/28 15:58:53 >> : -- transform #17 payload
14/04/28 15:58:53 >> : -- transform #18 payload
14/04/28 15:58:53 >> : -- transform #19 payload
14/04/28 15:58:53 >> : -- transform #20 payload
14/04/28 15:58:53 >> : -- transform #21 payload
14/04/28 15:58:53 >> : -- transform #22 payload
14/04/28 15:58:53 >> : -- transform #23 payload
14/04/28 15:58:53 >> : -- transform #24 payload
14/04/28 15:58:53 >> : -- transform #25 payload
14/04/28 15:58:53 >> : -- transform #26 payload
14/04/28 15:58:53 >> : -- transform #27 payload
14/04/28 15:58:53 >> : -- transform #28 payload
14/04/28 15:58:53 >> : -- transform #29 payload
14/04/28 15:58:53 >> : -- transform #30 payload
14/04/28 15:58:53 >> : -- transform #31 payload
14/04/28 15:58:53 >> : -- transform #32 payload
14/04/28 15:58:53 >> : -- transform #33 payload
14/04/28 15:58:53 >> : -- transform #34 payload
14/04/28 15:58:53 >> : -- transform #35 payload
14/04/28 15:58:53 >> : -- transform #36 payload
14/04/28 15:58:53 >> : -- transform #37 payload
14/04/28 15:58:53 >> : -- transform #38 payload
14/04/28 15:58:53 >> : -- transform #39 payload
14/04/28 15:58:53 >> : -- transform #40 payload
14/04/28 15:58:53 >> : -- transform #41 payload
14/04/28 15:58:53 >> : -- transform #42 payload
14/04/28 15:58:53 >> : -- transform #43 payload
14/04/28 15:58:53 >> : -- transform #44 payload
14/04/28 15:58:53 >> : -- transform #45 payload
14/04/28 15:58:53 >> : nonce payload
14/04/28 15:58:53 >> : identification payload
14/04/28 15:58:53 >> : identification payload
14/04/28 15:58:53 == : phase2 hash_i ( input ) ( 1460 bytes )
14/04/28 15:58:53 == : phase2 hash_i ( computed ) ( 16 bytes )
14/04/28 15:58:53 == : new phase2 iv ( 8 bytes )
14/04/28 15:58:53 >= : cookies def191b7e3fe0d6e:ae57329ab4376263
14/04/28 15:58:53 >= : message 3c4f0831
14/04/28 15:58:53 >= : encrypt iv ( 8 bytes )
14/04/28 15:58:53 == : encrypt packet ( 1504 bytes )
14/04/28 15:58:53 == : stored iv ( 8 bytes )
14/04/28 15:58:53 -> : send NAT-T:IKE packet 192.168.1.102:4500 ->
210.80.199.3:4500 ( 1540 bytes )
14/04/28 15:58:53 ii : fragmented packet to 1514 bytes ( MTU 1500 bytes )
14/04/28 15:58:53 ii : fragmented packet to 74 bytes ( MTU 1500 bytes )
14/04/28 15:58:53 DB : phase2 resend event scheduled ( ref count = 2 )
14/04/28 15:58:53 ii : created IPSEC policy route for 192.168.90.0/24
14/04/28 15:58:53 DB : policy added ( obj count = 8 )
14/04/28 15:58:53 K> : send pfkey X_SPDADD UNSPEC message
14/04/28 15:58:53 ii : creating IPSEC INBOUND policy
ANY:172.16.30.0/24:* -> ANY:10.120.2.101:*
14/04/28 15:58:53 DB : policy added ( obj count = 9 )
14/04/28 15:58:53 K> : send pfkey X_SPDADD UNSPEC message
14/04/28 15:58:53 ii : creating IPSEC OUTBOUND policy
ANY:10.120.2.101:* -> ANY:172.16.30.0/24:*
14/04/28 15:58:53 K< : recv pfkey X_SPDADD UNSPEC message
14/04/28 15:58:53 DB : policy found
14/04/28 15:58:53 K< : recv pfkey X_SPDADD UNSPEC message
14/04/28 15:58:53 DB : policy found
14/04/28 15:58:53 ii : created IPSEC policy route for 172.16.30.0/24
14/04/28 15:58:53 DB : policy added ( obj count = 10 )
14/04/28 15:58:53 K> : send pfkey X_SPDADD UNSPEC message
14/04/28 15:58:53 ii : creating IPSEC INBOUND policy
ANY:192.168.3.0/24:* -> ANY:10.120.2.101:*
14/04/28 15:58:53 DB : policy added ( obj count = 11 )
14/04/28 15:58:53 K> : send pfkey X_SPDADD UNSPEC message
14/04/28 15:58:53 ii : creating IPSEC OUTBOUND policy
ANY:10.120.2.101:* -> ANY:192.168.3.0/24:*
14/04/28 15:58:53 K< : recv pfkey X_SPDADD UNSPEC message
14/04/28 15:58:53 DB : policy found
14/04/28 15:58:53 K< : recv pfkey X_SPDADD UNSPEC message
14/04/28 15:58:53 DB : policy found
14/04/28 15:58:53 ii : created IPSEC policy route for 192.168.3.0/24
14/04/28 15:58:53 DB : policy added ( obj count = 12 )
14/04/28 15:58:53 K> : send pfkey X_SPDADD UNSPEC message
14/04/28 15:58:53 ii : creating IPSEC INBOUND policy
ANY:205.197.192.150/32:* -> ANY:10.120.2.101:*
14/04/28 15:58:53 DB : policy added ( obj count = 13 )
14/04/28 15:58:53 K> : send pfkey X_SPDADD UNSPEC message
14/04/28 15:58:53 ii : creating IPSEC OUTBOUND policy
ANY:10.120.2.101:* -> ANY:205.197.192.150/32:*
14/04/28 15:58:53 K< : recv pfkey X_SPDADD UNSPEC message
14/04/28 15:58:53 DB : policy found
14/04/28 15:58:53 K< : recv pfkey X_SPDADD UNSPEC message
14/04/28 15:58:53 DB : policy found
14/04/28 15:58:53 ii : created IPSEC policy route for 205.197.192.150/32
14/04/28 15:58:53 DB : policy added ( obj count = 14 )
14/04/28 15:58:53 K> : send pfkey X_SPDADD UNSPEC message
14/04/28 15:58:53 ii : creating IPSEC INBOUND policy
ANY:205.197.192.151/32:* -> ANY:10.120.2.101:*
14/04/28 15:58:53 DB : policy added ( obj count = 15 )
14/04/28 15:58:53 K> : send pfkey X_SPDADD UNSPEC message
14/04/28 15:58:53 ii : creating IPSEC OUTBOUND policy
ANY:10.120.2.101:* -> ANY:205.197.192.151/32:*
14/04/28 15:58:53 K< : recv pfkey X_SPDADD UNSPEC message
14/04/28 15:58:53 DB : policy found
14/04/28 15:58:53 K< : recv pfkey X_SPDADD UNSPEC message
14/04/28 15:58:53 DB : policy found
14/04/28 15:58:53 ii : created IPSEC policy route for 205.197.192.151/32
14/04/28 15:58:53 DB : policy added ( obj count = 16 )
14/04/28 15:58:53 K> : send pfkey X_SPDADD UNSPEC message
14/04/28 15:58:53 K< : recv pfkey X_SPDADD UNSPEC message
14/04/28 15:58:53 DB : policy found
14/04/28 15:58:53 ii : split DNS is disabled
14/04/28 15:58:56 K< : recv pfkey ACQUIRE UNSPEC message
14/04/28 15:58:56 DB : policy found
14/04/28 15:58:56 DB : policy found
14/04/28 15:58:56 DB : tunnel found
14/04/28 15:58:56 DB : new phase2 ( IPSEC initiator )
14/04/28 15:58:56 DB : phase2 added ( obj count = 2 )
14/04/28 15:58:56 K> : send pfkey GETSPI ESP message
14/04/28 15:58:56 K< : recv pfkey GETSPI ESP message
14/04/28 15:58:56 DB : phase2 found
14/04/28 15:58:56 ii : updated spi for 1 ipsec-esp proposal
14/04/28 15:58:56 DB : phase1 found
14/04/28 15:58:56 >> : hash payload
14/04/28 15:58:56 >> : security association payload
14/04/28 15:58:56 >> : - proposal #1 payload
14/04/28 15:58:56 >> : -- transform #1 payload
14/04/28 15:58:56 >> : -- transform #2 payload
14/04/28 15:58:56 >> : -- transform #3 payload
14/04/28 15:58:56 >> : -- transform #4 payload
14/04/28 15:58:56 >> : -- transform #5 payload
14/04/28 15:58:56 >> : -- transform #6 payload
14/04/28 15:58:56 >> : -- transform #7 payload
14/04/28 15:58:56 >> : -- transform #8 payload
14/04/28 15:58:56 >> : -- transform #9 payload
14/04/28 15:58:56 >> : -- transform #10 payload
14/04/28 15:58:56 >> : -- transform #11 payload
14/04/28 15:58:56 >> : -- transform #12 payload
14/04/28 15:58:56 >> : -- transform #13 payload
14/04/28 15:58:56 >> : -- transform #14 payload
14/04/28 15:58:56 >> : -- transform #15 payload
14/04/28 15:58:56 >> : -- transform #16 payload
14/04/28 15:58:56 >> : -- transform #17 payload
14/04/28 15:58:56 >> : -- transform #18 payload
14/04/28 15:58:56 >> : -- transform #19 payload
14/04/28 15:58:56 >> : -- transform #20 payload
14/04/28 15:58:56 >> : -- transform #21 payload
14/04/28 15:58:56 >> : -- transform #22 payload
14/04/28 15:58:56 >> : -- transform #23 payload
14/04/28 15:58:56 >> : -- transform #24 payload
14/04/28 15:58:56 >> : -- transform #25 payload
14/04/28 15:58:56 >> : -- transform #26 payload
14/04/28 15:58:56 >> : -- transform #27 payload
14/04/28 15:58:56 >> : -- transform #28 payload
14/04/28 15:58:56 >> : -- transform #29 payload
14/04/28 15:58:56 >> : -- transform #30 payload
14/04/28 15:58:56 >> : -- transform #31 payload
14/04/28 15:58:56 >> : -- transform #32 payload
14/04/28 15:58:56 >> : -- transform #33 payload
14/04/28 15:58:56 >> : -- transform #34 payload
14/04/28 15:58:56 >> : -- transform #35 payload
14/04/28 15:58:56 >> : -- transform #36 payload
14/04/28 15:58:56 >> : -- transform #37 payload
14/04/28 15:58:56 >> : -- transform #38 payload
14/04/28 15:58:56 >> : -- transform #39 payload
14/04/28 15:58:56 >> : -- transform #40 payload
14/04/28 15:58:56 >> : -- transform #41 payload
14/04/28 15:58:56 >> : -- transform #42 payload
14/04/28 15:58:56 >> : -- transform #43 payload
14/04/28 15:58:56 >> : -- transform #44 payload
14/04/28 15:58:56 >> : -- transform #45 payload
14/04/28 15:58:56 >> : nonce payload
14/04/28 15:58:56 >> : identification payload
14/04/28 15:58:56 >> : identification payload
14/04/28 15:58:56 == : phase2 hash_i ( input ) ( 1460 bytes )
14/04/28 15:58:56 == : phase2 hash_i ( computed ) ( 16 bytes )
14/04/28 15:58:56 == : new phase2 iv ( 8 bytes )
14/04/28 15:58:56 >= : cookies def191b7e3fe0d6e:ae57329ab4376263
14/04/28 15:58:56 >= : message a4e11861
14/04/28 15:58:56 >= : encrypt iv ( 8 bytes )
14/04/28 15:58:56 == : encrypt packet ( 1504 bytes )
14/04/28 15:58:56 == : stored iv ( 8 bytes )
14/04/28 15:58:56 -> : send NAT-T:IKE packet 192.168.1.102:4500 ->
210.80.199.3:4500 ( 1540 bytes )
14/04/28 15:58:56 ii : fragmented packet to 1514 bytes ( MTU 1500 bytes )
14/04/28 15:58:56 ii : fragmented packet to 74 bytes ( MTU 1500 bytes )
14/04/28 15:58:56 DB : phase2 resend event scheduled ( ref count = 2 )
14/04/28 15:58:58 ii : fragmented packet to 1514 bytes ( MTU 1500 bytes )
14/04/28 15:58:58 ii : fragmented packet to 74 bytes ( MTU 1500 bytes )
14/04/28 15:58:58 -> : resend 1 phase2 packet(s) [0/2]
192.168.1.102:4500 -> 210.80.199.3:4500
14/04/28 15:58:59 <- : recv NAT-T:IKE packet 210.80.199.3:4500 ->
192.168.1.102:4500 ( 308 bytes )
14/04/28 15:58:59 DB : phase1 found
14/04/28 15:58:59 ii : processing config packet ( 308 bytes )
14/04/28 15:58:59 DB : config found
14/04/28 15:58:59 !! : config packet ignored ( config already mature )
14/04/28 15:59:01 ii : fragmented packet to 1514 bytes ( MTU 1500 bytes )
14/04/28 15:59:01 ii : fragmented packet to 74 bytes ( MTU 1500 bytes )
14/04/28 15:59:01 -> : resend 1 phase2 packet(s) [0/2]
192.168.1.102:4500 -> 210.80.199.3:4500
14/04/28 15:59:03 ii : fragmented packet to 1514 bytes ( MTU 1500 bytes )
14/04/28 15:59:03 ii : fragmented packet to 74 bytes ( MTU 1500 bytes )
14/04/28 15:59:03 -> : resend 1 phase2 packet(s) [1/2]
192.168.1.102:4500 -> 210.80.199.3:4500
14/04/28 15:59:05 DB : phase1 found
14/04/28 15:59:05 ii : sending peer DPDV1-R-U-THERE notification
14/04/28 15:59:05 ii : - 192.168.1.102:4500 -> 210.80.199.3:4500
14/04/28 15:59:05 ii : - isakmp spi = def191b7e3fe0d6e:ae57329ab4376263
14/04/28 15:59:05 ii : - data size 4
14/04/28 15:59:05 >> : hash payload
14/04/28 15:59:05 >> : notification payload
14/04/28 15:59:05 == : new informational hash ( 16 bytes )
14/04/28 15:59:05 == : new informational iv ( 8 bytes )
14/04/28 15:59:05 >= : cookies def191b7e3fe0d6e:ae57329ab4376263
14/04/28 15:59:05 >= : message a73ee21c
14/04/28 15:59:05 >= : encrypt iv ( 8 bytes )
14/04/28 15:59:05 == : encrypt packet ( 80 bytes )
14/04/28 15:59:05 == : stored iv ( 8 bytes )
14/04/28 15:59:05 -> : send NAT-T:IKE packet 192.168.1.102:4500 ->
210.80.199.3:4500 ( 116 bytes )
14/04/28 15:59:05 ii : DPD ARE-YOU-THERE sequence 01763700 requested
14/04/28 15:59:05 DB : phase1 found
14/04/28 15:59:05 -> : send NAT-T:KEEP-ALIVE packet 192.168.1.102:4500
-> 210.80.199.3:4500
14/04/28 15:59:06 ii : fragmented packet to 1514 bytes ( MTU 1500 bytes )
14/04/28 15:59:06 ii : fragmented packet to 74 bytes ( MTU 1500 bytes )
14/04/28 15:59:06 -> : resend 1 phase2 packet(s) [1/2]
192.168.1.102:4500 -> 210.80.199.3:4500
14/04/28 15:59:08 <- : recv NAT-T:IKE packet 210.80.199.3:4500 ->
192.168.1.102:4500 ( 308 bytes )
14/04/28 15:59:08 DB : phase1 found
14/04/28 15:59:08 ii : processing config packet ( 308 bytes )
14/04/28 15:59:08 DB : config found
14/04/28 15:59:08 !! : config packet ignored ( config already mature )
14/04/28 15:59:08 ii : fragmented packet to 1514 bytes ( MTU 1500 bytes )
14/04/28 15:59:08 ii : fragmented packet to 74 bytes ( MTU 1500 bytes )
14/04/28 15:59:08 -> : resend 1 phase2 packet(s) [2/2]
192.168.1.102:4500 -> 210.80.199.3:4500
14/04/28 15:59:11 ii : fragmented packet to 1514 bytes ( MTU 1500 bytes )
14/04/28 15:59:11 ii : fragmented packet to 74 bytes ( MTU 1500 bytes )
14/04/28 15:59:11 -> : resend 1 phase2 packet(s) [2/2]
192.168.1.102:4500 -> 210.80.199.3:4500
14/04/28 15:59:12 K< : recv pfkey ACQUIRE UNSPEC message
14/04/28 15:59:12 DB : policy found
14/04/28 15:59:12 DB : policy found
14/04/28 15:59:12 DB : tunnel found
14/04/28 15:59:12 DB : new phase2 ( IPSEC initiator )
14/04/28 15:59:12 DB : phase2 added ( obj count = 3 )
14/04/28 15:59:12 K> : send pfkey GETSPI ESP message
14/04/28 15:59:12 K< : recv pfkey GETSPI ESP message
14/04/28 15:59:12 DB : phase2 found
14/04/28 15:59:12 ii : updated spi for 1 ipsec-esp proposal
14/04/28 15:59:12 DB : phase1 found
14/04/28 15:59:12 >> : hash payload
14/04/28 15:59:12 >> : security association payload
14/04/28 15:59:12 >> : - proposal #1 payload
14/04/28 15:59:12 >> : -- transform #1 payload
14/04/28 15:59:12 >> : -- transform #2 payload
14/04/28 15:59:12 >> : -- transform #3 payload
14/04/28 15:59:12 >> : -- transform #4 payload
14/04/28 15:59:12 >> : -- transform #5 payload
14/04/28 15:59:12 >> : -- transform #6 payload
14/04/28 15:59:12 >> : -- transform #7 payload
14/04/28 15:59:12 >> : -- transform #8 payload
14/04/28 15:59:12 >> : -- transform #9 payload
14/04/28 15:59:12 >> : -- transform #10 payload
14/04/28 15:59:12 >> : -- transform #11 payload
14/04/28 15:59:12 >> : -- transform #12 payload
14/04/28 15:59:12 >> : -- transform #13 payload
14/04/28 15:59:12 >> : -- transform #14 payload
14/04/28 15:59:12 >> : -- transform #15 payload
14/04/28 15:59:12 >> : -- transform #16 payload
14/04/28 15:59:12 >> : -- transform #17 payload
14/04/28 15:59:12 >> : -- transform #18 payload
14/04/28 15:59:12 >> : -- transform #19 payload
14/04/28 15:59:12 >> : -- transform #20 payload
14/04/28 15:59:12 >> : -- transform #21 payload
14/04/28 15:59:12 >> : -- transform #22 payload
14/04/28 15:59:12 >> : -- transform #23 payload
14/04/28 15:59:12 >> : -- transform #24 payload
14/04/28 15:59:12 >> : -- transform #25 payload
14/04/28 15:59:12 >> : -- transform #26 payload
14/04/28 15:59:12 >> : -- transform #27 payload
14/04/28 15:59:12 >> : -- transform #28 payload
14/04/28 15:59:12 >> : -- transform #29 payload
14/04/28 15:59:12 >> : -- transform #30 payload
14/04/28 15:59:12 >> : -- transform #31 payload
14/04/28 15:59:12 >> : -- transform #32 payload
14/04/28 15:59:12 >> : -- transform #33 payload
14/04/28 15:59:12 >> : -- transform #34 payload
14/04/28 15:59:12 >> : -- transform #35 payload
14/04/28 15:59:12 >> : -- transform #36 payload
14/04/28 15:59:12 >> : -- transform #37 payload
14/04/28 15:59:12 >> : -- transform #38 payload
14/04/28 15:59:12 >> : -- transform #39 payload
14/04/28 15:59:12 >> : -- transform #40 payload
14/04/28 15:59:12 >> : -- transform #41 payload
14/04/28 15:59:12 >> : -- transform #42 payload
14/04/28 15:59:12 >> : -- transform #43 payload
14/04/28 15:59:12 >> : -- transform #44 payload
14/04/28 15:59:12 >> : -- transform #45 payload
14/04/28 15:59:12 >> : nonce payload
14/04/28 15:59:12 >> : identification payload
14/04/28 15:59:12 >> : identification payload
14/04/28 15:59:12 == : phase2 hash_i ( input ) ( 1460 bytes )
14/04/28 15:59:12 == : phase2 hash_i ( computed ) ( 16 bytes )
14/04/28 15:59:12 == : new phase2 iv ( 8 bytes )
14/04/28 15:59:12 >= : cookies def191b7e3fe0d6e:ae57329ab4376263
14/04/28 15:59:12 >= : message a9057af1
14/04/28 15:59:12 >= : encrypt iv ( 8 bytes )
14/04/28 15:59:12 == : encrypt packet ( 1504 bytes )
14/04/28 15:59:12 == : stored iv ( 8 bytes )
14/04/28 15:59:12 -> : send NAT-T:IKE packet 192.168.1.102:4500 ->
210.80.199.3:4500 ( 1540 bytes )
14/04/28 15:59:12 ii : fragmented packet to 1514 bytes ( MTU 1500 bytes )
14/04/28 15:59:12 ii : fragmented packet to 74 bytes ( MTU 1500 bytes )
14/04/28 15:59:12 DB : phase2 resend event scheduled ( ref count = 2 )
14/04/28 15:59:13 ii : resend limit exceeded for phase2 exchange
14/04/28 15:59:13 ii : phase2 removal before expire time
14/04/28 15:59:13 DB : phase2 deleted ( obj count = 2 )
14/04/28 15:59:15 <- : recv NAT-T:IKE packet 210.80.199.3:4500 ->
192.168.1.102:4500 ( 308 bytes )
14/04/28 15:59:15 DB : phase1 found
14/04/28 15:59:15 ii : processing config packet ( 308 bytes )
14/04/28 15:59:15 DB : config found
14/04/28 15:59:15 !! : config packet ignored ( config already mature )
14/04/28 15:59:16 ii : resend limit exceeded for phase2 exchange
14/04/28 15:59:16 ii : phase2 removal before expire time
14/04/28 15:59:16 DB : phase2 deleted ( obj count = 1 )
14/04/28 15:59:17 ii : fragmented packet to 1514 bytes ( MTU 1500 bytes )
14/04/28 15:59:17 ii : fragmented packet to 74 bytes ( MTU 1500 bytes )
14/04/28 15:59:17 -> : resend 1 phase2 packet(s) [0/2]
192.168.1.102:4500 -> 210.80.199.3:4500
14/04/28 15:59:20 DB : phase1 found
14/04/28 15:59:20 -> : send NAT-T:KEEP-ALIVE packet 192.168.1.102:4500
-> 210.80.199.3:4500
14/04/28 15:59:20 DB : phase1 found
14/04/28 15:59:20 ii : next tunnel DPD retry in 4 secs for peer
210.80.199.3:4500
14/04/28 15:59:20 ii : sending peer DPDV1-R-U-THERE notification
14/04/28 15:59:20 ii : - 192.168.1.102:4500 -> 210.80.199.3:4500
14/04/28 15:59:20 ii : - isakmp spi = def191b7e3fe0d6e:ae57329ab4376263
14/04/28 15:59:20 ii : - data size 4
14/04/28 15:59:20 >> : hash payload
14/04/28 15:59:20 >> : notification payload
14/04/28 15:59:20 == : new informational hash ( 16 bytes )
14/04/28 15:59:20 == : new informational iv ( 8 bytes )
14/04/28 15:59:20 >= : cookies def191b7e3fe0d6e:ae57329ab4376263
14/04/28 15:59:20 >= : message 4d094a69
14/04/28 15:59:20 >= : encrypt iv ( 8 bytes )
14/04/28 15:59:20 == : encrypt packet ( 80 bytes )
14/04/28 15:59:20 == : stored iv ( 8 bytes )
14/04/28 15:59:20 -> : send NAT-T:IKE packet 192.168.1.102:4500 ->
210.80.199.3:4500 ( 116 bytes )
14/04/28 15:59:20 ii : DPD ARE-YOU-THERE sequence 01763701 requested
14/04/28 15:59:22 ii : fragmented packet to 1514 bytes ( MTU 1500 bytes )
14/04/28 15:59:22 ii : fragmented packet to 74 bytes ( MTU 1500 bytes )
14/04/28 15:59:22 -> : resend 1 phase2 packet(s) [1/2]
192.168.1.102:4500 -> 210.80.199.3:4500
14/04/28 15:59:23 <- : recv NAT-T:IKE packet 210.80.199.3:4500 ->
192.168.1.102:4500 ( 76 bytes )
14/04/28 15:59:23 DB : phase1 found
14/04/28 15:59:23 ii : processing informational packet ( 76 bytes )
14/04/28 15:59:23 == : new informational iv ( 8 bytes )
14/04/28 15:59:23 =< : cookies def191b7e3fe0d6e:ae57329ab4376263
14/04/28 15:59:23 =< : message 62202ac3
14/04/28 15:59:23 =< : decrypt iv ( 8 bytes )
14/04/28 15:59:23 == : decrypt packet ( 76 bytes )
14/04/28 15:59:23 <= : stored iv ( 8 bytes )
14/04/28 15:59:23 << : hash payload
14/04/28 15:59:23 << : delete payload
14/04/28 15:59:23 == : informational hash_i ( computed ) ( 16 bytes )
14/04/28 15:59:23 == : informational hash_c ( received ) ( 16 bytes )
14/04/28 15:59:23 ii : informational hash verified
14/04/28 15:59:23 ii : received peer DELETE message
14/04/28 15:59:23 ii : - 210.80.199.3:4500 -> 192.168.1.102:4500
14/04/28 15:59:23 ii : - isakmp spi = def191b7e3fe0d6e:ae57329ab4376263
14/04/28 15:59:23 DB : phase1 found
14/04/28 15:59:23 ii : cleanup, marked phase1
def191b7e3fe0d6e:ae57329ab4376263 for removal
14/04/28 15:59:23 DB : phase1 soft event canceled ( ref count = 4 )
14/04/28 15:59:23 DB : phase1 hard event canceled ( ref count = 3 )
14/04/28 15:59:23 DB : phase1 dead event canceled ( ref count = 2 )
14/04/28 15:59:23 DB : config deleted ( obj count = 0 )
14/04/28 15:59:23 ii : phase1 removal before expire time
14/04/28 15:59:23 DB : phase1 not found
14/04/28 15:59:23 DB : phase1 deleted ( obj count = 0 )
14/04/28 15:59:23 DB : policy found
14/04/28 15:59:23 ii : removing IPSEC INBOUND policy ANY:10.0.0.0/8:*
-> ANY:10.120.2.101:*
14/04/28 15:59:23 K> : send pfkey X_SPDDELETE2 UNSPEC message
14/04/28 15:59:23 DB : policy found
14/04/28 15:59:23 ii : removing IPSEC OUTBOUND policy
ANY:10.120.2.101:* -> ANY:10.0.0.0/8:*
14/04/28 15:59:23 K> : send pfkey X_SPDDELETE2 UNSPEC message
14/04/28 15:59:23 K< : recv pfkey X_SPDDELETE2 UNSPEC message
14/04/28 15:59:23 ii : removed IPSEC policy route for ANY:10.0.0.0/8:*
14/04/28 15:59:23 DB : policy found
14/04/28 15:59:23 ii : removing IPSEC INBOUND policy
ANY:192.168.90.0/24:* -> ANY:10.120.2.101:*
14/04/28 15:59:23 K> : send pfkey X_SPDDELETE2 UNSPEC message
14/04/28 15:59:23 DB : policy found
14/04/28 15:59:23 ii : removing IPSEC OUTBOUND policy
ANY:10.120.2.101:* -> ANY:192.168.90.0/24:*
14/04/28 15:59:23 K> : send pfkey X_SPDDELETE2 UNSPEC message
14/04/28 15:59:23 ii : removed IPSEC policy route for ANY:192.168.90.0/24:*
14/04/28 15:59:23 DB : policy found
14/04/28 15:59:23 ii : removing IPSEC INBOUND policy
ANY:172.16.30.0/24:* -> ANY:10.120.2.101:*
14/04/28 15:59:23 K> : send pfkey X_SPDDELETE2 UNSPEC message
14/04/28 15:59:23 DB : policy found
14/04/28 15:59:23 ii : removing IPSEC OUTBOUND policy
ANY:10.120.2.101:* -> ANY:172.16.30.0/24:*
14/04/28 15:59:23 K> : send pfkey X_SPDDELETE2 UNSPEC message
14/04/28 15:59:23 ii : removed IPSEC policy route for ANY:172.16.30.0/24:*
14/04/28 15:59:23 DB : policy found
14/04/28 15:59:23 ii : removing IPSEC INBOUND policy
ANY:192.168.3.0/24:* -> ANY:10.120.2.101:*
14/04/28 15:59:23 K> : send pfkey X_SPDDELETE2 UNSPEC message
14/04/28 15:59:23 DB : policy found
14/04/28 15:59:23 ii : removing IPSEC OUTBOUND policy
ANY:10.120.2.101:* -> ANY:192.168.3.0/24:*
14/04/28 15:59:23 K> : send pfkey X_SPDDELETE2 UNSPEC message
14/04/28 15:59:23 ii : removed IPSEC policy route for ANY:192.168.3.0/24:*
14/04/28 15:59:23 DB : policy found
14/04/28 15:59:23 ii : removing IPSEC INBOUND policy
ANY:205.197.192.150/32:* -> ANY:10.120.2.101:*
14/04/28 15:59:23 K> : send pfkey X_SPDDELETE2 UNSPEC message
14/04/28 15:59:23 DB : policy found
14/04/28 15:59:23 ii : removing IPSEC OUTBOUND policy
ANY:10.120.2.101:* -> ANY:205.197.192.150/32:*
14/04/28 15:59:23 K> : send pfkey X_SPDDELETE2 UNSPEC message
14/04/28 15:59:23 ii : removed IPSEC policy route for ANY:205.197.192.150/32:*
14/04/28 15:59:23 DB : policy found
14/04/28 15:59:23 ii : removing IPSEC INBOUND policy
ANY:205.197.192.151/32:* -> ANY:10.120.2.101:*
14/04/28 15:59:23 K> : send pfkey X_SPDDELETE2 UNSPEC message
14/04/28 15:59:23 DB : policy found
14/04/28 15:59:23 ii : removing IPSEC OUTBOUND policy
ANY:10.120.2.101:* -> ANY:205.197.192.151/32:*
14/04/28 15:59:23 K> : send pfkey X_SPDDELETE2 UNSPEC message
14/04/28 15:59:23 ii : removed IPSEC policy route for ANY:205.197.192.151/32:*
14/04/28 15:59:23 DB : policy found
14/04/28 15:59:23 ii : removing NONE INBOUND policy ANY:192.168.1.1:*
-> ANY:10.120.2.101:*
14/04/28 15:59:23 K> : send pfkey X_SPDDELETE2 UNSPEC message
14/04/28 15:59:23 DB : policy found
14/04/28 15:59:23 ii : removing NONE OUTBOUND policy
ANY:10.120.2.101:* -> ANY:192.168.1.1:*
14/04/28 15:59:23 K> : send pfkey X_SPDDELETE2 UNSPEC message
14/04/28 15:59:23 DB : policy found
14/04/28 15:59:23 ii : removing NONE INBOUND policy ANY:210.80.199.3:*
-> ANY:192.168.1.102:*
14/04/28 15:59:23 K> : send pfkey X_SPDDELETE2 UNSPEC message
14/04/28 15:59:23 DB : policy found
14/04/28 15:59:23 ii : removing NONE OUTBOUND policy
ANY:192.168.1.102:* -> ANY:210.80.199.3:*
14/04/28 15:59:23 K> : send pfkey X_SPDDELETE2 UNSPEC message
14/04/28 15:59:23 ii : removed NONE policy route for ANY:210.80.199.3:*
14/04/28 15:59:23 DB : policy found
14/04/28 15:59:23 DB : policy deleted ( obj count = 15 )
14/04/28 15:59:23 K< : recv pfkey X_SPDDELETE2 UNSPEC message
14/04/28 15:59:23 DB : policy found
14/04/28 15:59:23 DB : policy deleted ( obj count = 14 )
14/04/28 15:59:23 K< : recv pfkey X_SPDDELETE2 UNSPEC message
14/04/28 15:59:23 DB : policy found
14/04/28 15:59:23 DB : policy deleted ( obj count = 13 )
14/04/28 15:59:23 K< : recv pfkey X_SPDDELETE2 UNSPEC message
14/04/28 15:59:23 DB : policy found
14/04/28 15:59:23 DB : policy deleted ( obj count = 12 )
14/04/28 15:59:23 K< : recv pfkey X_SPDDELETE2 UNSPEC message
14/04/28 15:59:23 DB : policy found
14/04/28 15:59:23 DB : policy deleted ( obj count = 11 )
14/04/28 15:59:23 K< : recv pfkey X_SPDDELETE2 UNSPEC message
14/04/28 15:59:23 DB : policy found
14/04/28 15:59:23 DB : policy deleted ( obj count = 10 )
14/04/28 15:59:23 K< : recv pfkey X_SPDDELETE2 UNSPEC message
14/04/28 15:59:23 DB : policy found
14/04/28 15:59:23 DB : policy deleted ( obj count = 9 )
14/04/28 15:59:23 K< : recv pfkey X_SPDDELETE2 UNSPEC message
14/04/28 15:59:23 DB : policy found
14/04/28 15:59:23 DB : policy deleted ( obj count = 8 )
14/04/28 15:59:23 K< : recv pfkey X_SPDDELETE2 UNSPEC message
14/04/28 15:59:23 DB : policy found
14/04/28 15:59:23 DB : policy deleted ( obj count = 7 )
14/04/28 15:59:23 K< : recv pfkey X_SPDDELETE2 UNSPEC message
14/04/28 15:59:23 DB : policy found
14/04/28 15:59:23 DB : policy deleted ( obj count = 6 )
14/04/28 15:59:23 K< : recv pfkey X_SPDDELETE2 UNSPEC message
14/04/28 15:59:23 DB : policy found
14/04/28 15:59:23 DB : policy deleted ( obj count = 5 )
14/04/28 15:59:23 K< : recv pfkey X_SPDDELETE2 UNSPEC message
14/04/28 15:59:23 DB : policy found
14/04/28 15:59:23 DB : policy deleted ( obj count = 4 )
14/04/28 15:59:23 K< : recv pfkey X_SPDDELETE2 UNSPEC message
14/04/28 15:59:23 DB : policy found
14/04/28 15:59:23 DB : policy deleted ( obj count = 3 )
14/04/28 15:59:23 K< : recv pfkey X_SPDDELETE2 UNSPEC message
14/04/28 15:59:23 DB : policy found
14/04/28 15:59:23 DB : policy deleted ( obj count = 2 )
14/04/28 15:59:23 K< : recv pfkey X_SPDDELETE2 UNSPEC message
14/04/28 15:59:23 DB : policy found
14/04/28 15:59:23 DB : policy deleted ( obj count = 1 )
14/04/28 15:59:23 K< : recv pfkey X_SPDDELETE2 UNSPEC message
14/04/28 15:59:23 DB : policy found
14/04/28 15:59:23 DB : policy deleted ( obj count = 0 )
14/04/28 15:59:24 ii : disable adapter ROOT\VNET\0000
14/04/28 15:59:24 DB : phase1 not found
14/04/28 15:59:24 !! : unable to locate phase1 to process DPD for peer
210.80.199.3:4500
14/04/28 15:59:24 DB : tunnel dpd event canceled ( ref count = 4 )
14/04/28 15:59:24 DB : tunnel natt event canceled ( ref count = 3 )
14/04/28 15:59:24 DB : tunnel stats event canceled ( ref count = 2 )
14/04/28 15:59:24 DB : removing tunnel config references
14/04/28 15:59:24 DB : removing tunnel phase2 references
14/04/28 15:59:24 DB : phase2 resend event canceled ( ref count = 1 )
14/04/28 15:59:24 ii : phase2 removal before expire time
14/04/28 15:59:24 DB : phase2 deleted ( obj count = 0 )
14/04/28 15:59:24 DB : removing tunnel phase1 references
14/04/28 15:59:24 DB : tunnel deleted ( obj count = 0 )
14/04/28 15:59:24 DB : removing all peer tunnel references
14/04/28 15:59:24 DB : peer deleted ( obj count = 0 )
14/04/28 15:59:24 ii : ipc client process thread exit ...
14/04/28 15:59:24 ii : ipc client process thread begin ...
14/04/28 15:59:24 <A : peer config add message
14/04/28 15:59:24 <A : proposal config message
14/04/28 15:59:24 <A : proposal config message
14/04/28 15:59:24 <A : client config message
14/04/28 15:59:24 <A : xauth username message
14/04/28 15:59:24 <A : xauth password message
14/04/28 15:59:24 <A : local id 'ScanSoft' message
14/04/28 15:59:24 <A : preshared key message
14/04/28 15:59:24 <A : peer tunnel enable message
14/04/28 15:59:24 DB : peer added ( obj count = 1 )
14/04/28 15:59:24 ii : local address 192.168.1.102 selected for peer
14/04/28 15:59:24 DB : tunnel added ( obj count = 1 )
14/04/28 15:59:24 DB : new phase1 ( ISAKMP initiator )
14/04/28 15:59:24 DB : exchange type is aggressive
14/04/28 15:59:24 DB : 192.168.1.102:500 <-> 210.80.199.3:500
14/04/28 15:59:24 DB : 80fa5d8d7644e9e1:0000000000000000
14/04/28 15:59:24 DB : phase1 added ( obj count = 1 )
14/04/28 15:59:24 >> : security association payload
14/04/28 15:59:24 >> : - proposal #1 payload
14/04/28 15:59:24 >> : -- transform #1 payload
14/04/28 15:59:24 >> : -- transform #2 payload
14/04/28 15:59:24 >> : -- transform #3 payload
14/04/28 15:59:24 >> : -- transform #4 payload
14/04/28 15:59:24 >> : -- transform #5 payload
14/04/28 15:59:24 >> : -- transform #6 payload
14/04/28 15:59:24 >> : -- transform #7 payload
14/04/28 15:59:24 >> : -- transform #8 payload
14/04/28 15:59:24 >> : -- transform #9 payload
14/04/28 15:59:24 >> : -- transform #10 payload
14/04/28 15:59:24 >> : -- transform #11 payload
14/04/28 15:59:24 >> : -- transform #12 payload
14/04/28 15:59:24 >> : -- transform #13 payload
14/04/28 15:59:24 >> : -- transform #14 payload
14/04/28 15:59:24 >> : -- transform #15 payload
14/04/28 15:59:24 >> : -- transform #16 payload
14/04/28 15:59:24 >> : -- transform #17 payload
14/04/28 15:59:24 >> : -- transform #18 payload
14/04/28 15:59:24 >> : key exchange payload
14/04/28 15:59:24 >> : nonce payload
14/04/28 15:59:24 >> : identification payload
14/04/28 15:59:24 >> : vendor id payload
14/04/28 15:59:24 ii : local supports XAUTH
14/04/28 15:59:24 >> : vendor id payload
14/04/28 15:59:24 ii : local supports nat-t ( draft v00 )
14/04/28 15:59:24 >> : vendor id payload
14/04/28 15:59:24 ii : local supports nat-t ( draft v01 )
14/04/28 15:59:24 >> : vendor id payload
14/04/28 15:59:24 ii : local supports nat-t ( draft v02 )
14/04/28 15:59:24 >> : vendor id payload
14/04/28 15:59:24 ii : local supports nat-t ( draft v03 )
14/04/28 15:59:24 >> : vendor id payload
14/04/28 15:59:24 ii : local supports nat-t ( rfc )
14/04/28 15:59:24 >> : vendor id payload
14/04/28 15:59:24 >> : vendor id payload
14/04/28 15:59:24 ii : local supports DPDv1
14/04/28 15:59:24 >> : vendor id payload
14/04/28 15:59:24 ii : local is SHREW SOFT compatible
14/04/28 15:59:24 >> : vendor id payload
14/04/28 15:59:24 ii : local is NETSCREEN compatible
14/04/28 15:59:24 >> : vendor id payload
14/04/28 15:59:24 ii : local is SIDEWINDER compatible
14/04/28 15:59:24 >> : vendor id payload
14/04/28 15:59:24 ii : local is CISCO UNITY compatible
14/04/28 15:59:24 >= : cookies 80fa5d8d7644e9e1:0000000000000000
14/04/28 15:59:24 >= : message 00000000
14/04/28 15:59:24 -> : send IKE packet 192.168.1.102:500 ->
210.80.199.3:500 ( 1180 bytes )
14/04/28 15:59:24 DB : phase1 resend event scheduled ( ref count = 2 )
14/04/28 15:59:24 <- : recv IKE packet 210.80.199.3:500 ->
192.168.1.102:500 ( 448 bytes )
14/04/28 15:59:24 DB : phase1 found
14/04/28 15:59:24 ii : processing phase1 packet ( 448 bytes )
14/04/28 15:59:24 =< : cookies 80fa5d8d7644e9e1:df3f8bb8bfbddaa1
14/04/28 15:59:24 =< : message 00000000
14/04/28 15:59:24 << : security association payload
14/04/28 15:59:24 << : - propsal #1 payload
14/04/28 15:59:24 << : -- transform #13 payload
14/04/28 15:59:24 ii : unmatched isakmp proposal/transform
14/04/28 15:59:24 ii : cipher type ( 3des != aes )
14/04/28 15:59:24 ii : unmatched isakmp proposal/transform
14/04/28 15:59:24 ii : cipher type ( 3des != aes )
14/04/28 15:59:24 ii : unmatched isakmp proposal/transform
14/04/28 15:59:24 ii : cipher type ( 3des != aes )
14/04/28 15:59:24 ii : unmatched isakmp proposal/transform
14/04/28 15:59:24 ii : cipher type ( 3des != aes )
14/04/28 15:59:24 ii : unmatched isakmp proposal/transform
14/04/28 15:59:24 ii : cipher type ( 3des != aes )
14/04/28 15:59:24 ii : unmatched isakmp proposal/transform
14/04/28 15:59:24 ii : cipher type ( 3des != aes )
14/04/28 15:59:24 ii : unmatched isakmp proposal/transform
14/04/28 15:59:24 ii : cipher type ( 3des != blowfish )
14/04/28 15:59:24 ii : unmatched isakmp proposal/transform
14/04/28 15:59:24 ii : cipher type ( 3des != blowfish )
14/04/28 15:59:24 ii : unmatched isakmp proposal/transform
14/04/28 15:59:24 ii : cipher type ( 3des != blowfish )
14/04/28 15:59:24 ii : unmatched isakmp proposal/transform
14/04/28 15:59:24 ii : cipher type ( 3des != blowfish )
14/04/28 15:59:24 ii : unmatched isakmp proposal/transform
14/04/28 15:59:24 ii : cipher type ( 3des != blowfish )
14/04/28 15:59:24 ii : unmatched isakmp proposal/transform
14/04/28 15:59:24 ii : cipher type ( 3des != blowfish )
14/04/28 15:59:24 ii : matched isakmp proposal #1 transform #13
14/04/28 15:59:24 ii : - transform    = ike
14/04/28 15:59:24 ii : - cipher type  = 3des
14/04/28 15:59:24 ii : - key length   = default
14/04/28 15:59:24 ii : - hash type    = md5
14/04/28 15:59:24 ii : - dh group     = group2 ( modp-1024 )
14/04/28 15:59:24 ii : - auth type    = xauth-initiator-psk
14/04/28 15:59:24 ii : - life seconds = 86400
14/04/28 15:59:24 ii : - life kbytes  = 0
14/04/28 15:59:24 << : key exchange payload
14/04/28 15:59:24 << : nonce payload
14/04/28 15:59:24 << : identification payload
14/04/28 15:59:24 ii : phase1 id target is any
14/04/28 15:59:24 ii : phase1 id match
14/04/28 15:59:24 ii : received = ipv4-host 210.80.199.3
14/04/28 15:59:24 << : hash payload
14/04/28 15:59:24 << : vendor id payload
14/04/28 15:59:24 ii : peer is CISCO UNITY compatible
14/04/28 15:59:24 << : vendor id payload
14/04/28 15:59:24 ii : peer supports XAUTH
14/04/28 15:59:24 << : vendor id payload
14/04/28 15:59:24 ii : peer supports DPDv1
14/04/28 15:59:24 << : vendor id payload
14/04/28 15:59:24 ii : peer supports nat-t ( draft v02 )
14/04/28 15:59:24 << : nat discovery payload
14/04/28 15:59:24 << : nat discovery payload
14/04/28 15:59:24 << : vendor id payload
14/04/28 15:59:24 ii : unknown vendor id ( 20 bytes )
14/04/28 15:59:24 0x : 4048b7d5 6ebce885 25e7de7f 00d6c2d3 c0000000
14/04/28 15:59:24 << : vendor id payload
14/04/28 15:59:24 ii : unknown vendor id ( 16 bytes )
14/04/28 15:59:24 0x : 2af82ca5 bfbcdaa1 e73249a7 62071a6b
14/04/28 15:59:24 << : vendor id payload
14/04/28 15:59:24 ii : unknown vendor id ( 16 bytes )
14/04/28 15:59:24 0x : 1f07f70e aa6514d3 b0fa9654 2a500407
14/04/28 15:59:24 ii : nat discovery - local address is translated
14/04/28 15:59:24 ii : switching to src nat-t udp port 4500
14/04/28 15:59:24 ii : switching to dst nat-t udp port 4500
14/04/28 15:59:24 == : DH shared secret ( 128 bytes )
14/04/28 15:59:24 == : SETKEYID ( 16 bytes )
14/04/28 15:59:24 == : SETKEYID_d ( 16 bytes )
14/04/28 15:59:24 == : SETKEYID_a ( 16 bytes )
14/04/28 15:59:24 == : SETKEYID_e ( 16 bytes )
14/04/28 15:59:24 == : cipher key ( 32 bytes )
14/04/28 15:59:24 == : cipher iv ( 8 bytes )
14/04/28 15:59:24 == : phase1 hash_i ( computed ) ( 16 bytes )
14/04/28 15:59:24 >> : hash payload
14/04/28 15:59:24 >> : nat discovery payload
14/04/28 15:59:24 >> : nat discovery payload
14/04/28 15:59:24 >= : cookies 80fa5d8d7644e9e1:df3f8bb8bfbddaa1
14/04/28 15:59:24 >= : message 00000000
14/04/28 15:59:24 >= : encrypt iv ( 8 bytes )
14/04/28 15:59:24 == : encrypt packet ( 88 bytes )
14/04/28 15:59:24 == : stored iv ( 8 bytes )
14/04/28 15:59:24 DB : phase1 resend event canceled ( ref count = 1 )
14/04/28 15:59:24 -> : send NAT-T:IKE packet 192.168.1.102:4500 ->
210.80.199.3:4500 ( 124 bytes )
14/04/28 15:59:24 == : phase1 hash_r ( computed ) ( 16 bytes )
14/04/28 15:59:24 == : phase1 hash_r ( received ) ( 16 bytes )
14/04/28 15:59:24 ii : phase1 sa established
14/04/28 15:59:24 ii : 210.80.199.3:4500 <-> 192.168.1.102:4500
14/04/28 15:59:24 ii : 80fa5d8d7644e9e1:df3f8bb8bfbddaa1
14/04/28 15:59:24 ii : sending peer INITIAL-CONTACT notification
14/04/28 15:59:24 ii : - 192.168.1.102:4500 -> 210.80.199.3:4500
14/04/28 15:59:24 ii : - isakmp spi = 80fa5d8d7644e9e1:df3f8bb8bfbddaa1
14/04/28 15:59:24 ii : - data size 0
14/04/28 15:59:24 >> : hash payload
14/04/28 15:59:24 >> : notification payload
14/04/28 15:59:24 == : new informational hash ( 16 bytes )
14/04/28 15:59:24 == : new informational iv ( 8 bytes )
14/04/28 15:59:24 >= : cookies 80fa5d8d7644e9e1:df3f8bb8bfbddaa1
14/04/28 15:59:24 >= : message 5c306c52
14/04/28 15:59:24 >= : encrypt iv ( 8 bytes )
14/04/28 15:59:24 == : encrypt packet ( 76 bytes )
14/04/28 15:59:24 == : stored iv ( 8 bytes )
14/04/28 15:59:24 -> : send NAT-T:IKE packet 192.168.1.102:4500 ->
210.80.199.3:4500 ( 108 bytes )
14/04/28 15:59:24 DB : phase2 not found
14/04/28 15:59:24 <- : recv NAT-T:IKE packet 210.80.199.3:4500 ->
192.168.1.102:4500 ( 116 bytes )
14/04/28 15:59:24 DB : phase1 found
14/04/28 15:59:24 ii : processing config packet ( 116 bytes )
14/04/28 15:59:24 DB : config not found
14/04/28 15:59:24 DB : config added ( obj count = 1 )
14/04/28 15:59:24 == : new config iv ( 8 bytes )
14/04/28 15:59:24 =< : cookies 80fa5d8d7644e9e1:df3f8bb8bfbddaa1
14/04/28 15:59:24 =< : message 395d6851
14/04/28 15:59:24 =< : decrypt iv ( 8 bytes )
14/04/28 15:59:24 == : decrypt packet ( 116 bytes )
14/04/28 15:59:24 <= : trimmed packet padding ( 4 bytes )
14/04/28 15:59:24 <= : stored iv ( 8 bytes )
14/04/28 15:59:24 << : hash payload
14/04/28 15:59:24 << : attribute payload
14/04/28 15:59:24 == : configure hash_i ( computed ) ( 16 bytes )
14/04/28 15:59:24 == : configure hash_c ( computed ) ( 16 bytes )
14/04/28 15:59:24 ii : configure hash verified
14/04/28 15:59:24 ii : - xauth authentication type
14/04/28 15:59:24 ii : - xauth username
14/04/28 15:59:24 ww : unhandled xauth attribute 16526
14/04/28 15:59:24 ii : - xauth password
14/04/28 15:59:24 ii : received basic xauth request - Enter Username,
Password and Domain.
14/04/28 15:59:24 ii : - standard xauth username
14/04/28 15:59:24 ii : - standard xauth password
14/04/28 15:59:24 ii : sending xauth response for guido_aversano
14/04/28 15:59:24 >> : hash payload
14/04/28 15:59:24 >> : attribute payload
14/04/28 15:59:24 == : new configure hash ( 16 bytes )
14/04/28 15:59:24 >= : cookies 80fa5d8d7644e9e1:df3f8bb8bfbddaa1
14/04/28 15:59:24 >= : message 395d6851
14/04/28 15:59:24 >= : encrypt iv ( 8 bytes )
14/04/28 15:59:24 == : encrypt packet ( 90 bytes )
14/04/28 15:59:24 == : stored iv ( 8 bytes )
14/04/28 15:59:24 -> : send NAT-T:IKE packet 192.168.1.102:4500 ->
210.80.199.3:4500 ( 124 bytes )
14/04/28 15:59:24 DB : config resend event scheduled ( ref count = 2 )
14/04/28 15:59:25 <- : recv NAT-T:IKE packet 210.80.199.3:4500 ->
192.168.1.102:4500 ( 60 bytes )
14/04/28 15:59:25 DB : phase1 found
14/04/28 15:59:25 ii : processing config packet ( 60 bytes )
14/04/28 15:59:25 DB : config found
14/04/28 15:59:25 == : new config iv ( 8 bytes )
14/04/28 15:59:25 =< : cookies 80fa5d8d7644e9e1:df3f8bb8bfbddaa1
14/04/28 15:59:25 =< : message 87e400a1
14/04/28 15:59:25 =< : decrypt iv ( 8 bytes )
14/04/28 15:59:25 == : decrypt packet ( 60 bytes )
14/04/28 15:59:25 <= : stored iv ( 8 bytes )
14/04/28 15:59:25 << : hash payload
14/04/28 15:59:25 << : attribute payload
14/04/28 15:59:25 == : configure hash_i ( computed ) ( 16 bytes )
14/04/28 15:59:25 == : configure hash_c ( computed ) ( 16 bytes )
14/04/28 15:59:25 ii : configure hash verified
14/04/28 15:59:25 ii : received xauth result -
14/04/28 15:59:25 ii : user guido_aversano authentication succeeded
14/04/28 15:59:25 ii : sending xauth acknowledge
14/04/28 15:59:25 >> : hash payload
14/04/28 15:59:25 >> : attribute payload
14/04/28 15:59:25 == : new configure hash ( 16 bytes )
14/04/28 15:59:25 >= : cookies 80fa5d8d7644e9e1:df3f8bb8bfbddaa1
14/04/28 15:59:25 >= : message 87e400a1
14/04/28 15:59:25 >= : encrypt iv ( 8 bytes )
14/04/28 15:59:25 == : encrypt packet ( 56 bytes )
14/04/28 15:59:25 == : stored iv ( 8 bytes )
14/04/28 15:59:25 DB : config resend event canceled ( ref count = 1 )
14/04/28 15:59:25 -> : send NAT-T:IKE packet 192.168.1.102:4500 ->
210.80.199.3:4500 ( 92 bytes )
14/04/28 15:59:25 DB : config resend event scheduled ( ref count = 2 )
14/04/28 15:59:25 ii : building config attribute list
14/04/28 15:59:25 ii : - IP4 Address
14/04/28 15:59:25 ii : - Address Expiry
14/04/28 15:59:25 ii : - IP4 Netmask
14/04/28 15:59:25 ii : - IP4 DNS Server
14/04/28 15:59:25 ii : - IP4 WINS Server
14/04/28 15:59:25 ii : - DNS Suffix
14/04/28 15:59:25 ii : - IP4 Split Network Include
14/04/28 15:59:25 ii : - IP4 Split Network Exclude
14/04/28 15:59:25 ii : - Login Banner
14/04/28 15:59:25 ii : - PFS Group
14/04/28 15:59:25 ii : - Save Password
14/04/28 15:59:25 ii : - CISCO UDP Port
14/04/28 15:59:25 ii : - Application Version = Cisco Systems VPN
Client 4.8.01.0300:WinNT
14/04/28 15:59:25 ii : - Firewall Type = CISCO-UNKNOWN
14/04/28 15:59:25 == : new config iv ( 8 bytes )
14/04/28 15:59:25 ii : sending config pull request
14/04/28 15:59:25 >> : hash payload
14/04/28 15:59:25 >> : attribute payload
14/04/28 15:59:25 == : new configure hash ( 16 bytes )
14/04/28 15:59:25 >= : cookies 80fa5d8d7644e9e1:df3f8bb8bfbddaa1
14/04/28 15:59:25 >= : message fc16ffaa
14/04/28 15:59:25 >= : encrypt iv ( 8 bytes )
14/04/28 15:59:25 == : encrypt packet ( 166 bytes )
14/04/28 15:59:25 == : stored iv ( 8 bytes )
14/04/28 15:59:25 DB : config resend event canceled ( ref count = 1 )
14/04/28 15:59:25 -> : send NAT-T:IKE packet 192.168.1.102:4500 ->
210.80.199.3:4500 ( 204 bytes )
14/04/28 15:59:25 DB : config resend event scheduled ( ref count = 2 )
14/04/28 15:59:26 <- : recv NAT-T:IKE packet 210.80.199.3:4500 ->
192.168.1.102:4500 ( 308 bytes )
14/04/28 15:59:26 DB : phase1 found
14/04/28 15:59:26 ii : processing config packet ( 308 bytes )
14/04/28 15:59:26 DB : config found
14/04/28 15:59:26 =< : cookies 80fa5d8d7644e9e1:df3f8bb8bfbddaa1
14/04/28 15:59:26 =< : message fc16ffaa
14/04/28 15:59:26 =< : decrypt iv ( 8 bytes )
14/04/28 15:59:26 == : decrypt packet ( 308 bytes )
14/04/28 15:59:26 <= : stored iv ( 8 bytes )
14/04/28 15:59:26 << : hash payload
14/04/28 15:59:26 << : attribute payload
14/04/28 15:59:26 == : configure hash_i ( computed ) ( 16 bytes )
14/04/28 15:59:26 == : configure hash_c ( computed ) ( 16 bytes )
14/04/28 15:59:26 ii : configure hash verified
14/04/28 15:59:26 ii : received config pull response
14/04/28 15:59:26 ii : - IP4 Address = 10.120.2.101
14/04/28 15:59:26 ii : - IP4 Netmask = 255.255.255.0
14/04/28 15:59:26 ii : - IP4 DNS Server = 10.1.4.201
14/04/28 15:59:26 ii : - IP4 DNS Server = 10.1.4.202
14/04/28 15:59:26 ii : - IP4 WINS Server = 10.1.4.201
14/04/28 15:59:26 ii : - Save Password = 0
14/04/28 15:59:26 ii : - IP4 Split Network Include = ANY:10.0.0.0/8:*
14/04/28 15:59:26 ii : - IP4 Split Network Include = ANY:192.168.90.0/24:*
14/04/28 15:59:26 ii : - IP4 Split Network Include = ANY:172.16.30.0/24:*
14/04/28 15:59:26 ii : - IP4 Split Network Include = ANY:192.168.3.0/24:*
14/04/28 15:59:26 ii : - IP4 Split Network Include = ANY:205.197.192.150/32:*
14/04/28 15:59:26 ii : - IP4 Split Network Include = ANY:205.197.192.151/32:*
14/04/28 15:59:26 ii : - DNS Suffix = nuance.com
14/04/28 15:59:26 ii : - PFS Group = 0
14/04/28 15:59:26 ii : - Application Version = Cisco Systems, Inc./VPN
3000 Concentrator Version 4.7.2.P built by vmurphy on Jul 30 2008
17:39:30
14/04/28 15:59:26 DB : config resend event canceled ( ref count = 1 )
14/04/28 15:59:26 ii : enabled adapter ROOT\VNET\0000
14/04/28 15:59:26 ii : adapter ROOT\VNET\0000 unavailable, retrying ...
14/04/28 15:59:27 ii : apapter ROOT\VNET\0000 MTU is 1380
14/04/28 15:59:27 ii : generating IPSEC security policies at REQUIRE level
14/04/28 15:59:27 ii : creating NONE INBOUND policy ANY:210.80.199.3:*
-> ANY:192.168.1.102:*
14/04/28 15:59:27 DB : policy added ( obj count = 1 )
14/04/28 15:59:27 K> : send pfkey X_SPDADD UNSPEC message
14/04/28 15:59:27 K< : recv pfkey X_SPDADD UNSPEC message
14/04/28 15:59:27 DB : policy found
14/04/28 15:59:27 ii : creating NONE OUTBOUND policy
ANY:192.168.1.102:* -> ANY:210.80.199.3:*
14/04/28 15:59:27 ii : created NONE policy route for 210.80.199.3/32
14/04/28 15:59:27 DB : policy added ( obj count = 2 )
14/04/28 15:59:27 K> : send pfkey X_SPDADD UNSPEC message
14/04/28 15:59:27 K< : recv pfkey X_SPDADD UNSPEC message
14/04/28 15:59:27 DB : policy found
14/04/28 15:59:27 ii : creating NONE INBOUND policy ANY:192.168.1.1:*
-> ANY:10.120.2.101:*
14/04/28 15:59:27 DB : policy added ( obj count = 3 )
14/04/28 15:59:27 K> : send pfkey X_SPDADD UNSPEC message
14/04/28 15:59:27 ii : creating NONE OUTBOUND policy
ANY:10.120.2.101:* -> ANY:192.168.1.1:*
14/04/28 15:59:27 DB : policy added ( obj count = 4 )
14/04/28 15:59:27 K> : send pfkey X_SPDADD UNSPEC message
14/04/28 15:59:27 ii : creating IPSEC INBOUND policy ANY:10.0.0.0/8:*
-> ANY:10.120.2.101:*
14/04/28 15:59:27 DB : policy added ( obj count = 5 )
14/04/28 15:59:27 K> : send pfkey X_SPDADD UNSPEC message
14/04/28 15:59:27 ii : creating IPSEC OUTBOUND policy
ANY:10.120.2.101:* -> ANY:10.0.0.0/8:*
14/04/28 15:59:27 K< : recv pfkey X_SPDADD UNSPEC message
14/04/28 15:59:27 DB : policy found
14/04/28 15:59:27 K< : recv pfkey X_SPDADD UNSPEC message
14/04/28 15:59:27 DB : policy found
14/04/28 15:59:27 K< : recv pfkey X_SPDADD UNSPEC message
14/04/28 15:59:27 DB : policy found
14/04/28 15:59:27 ii : created IPSEC policy route for 10.0.0.0/8
14/04/28 15:59:27 DB : policy added ( obj count = 6 )
14/04/28 15:59:27 K> : send pfkey X_SPDADD UNSPEC message
14/04/28 15:59:27 ii : creating IPSEC INBOUND policy
ANY:192.168.90.0/24:* -> ANY:10.120.2.101:*
14/04/28 15:59:27 DB : policy added ( obj count = 7 )
14/04/28 15:59:27 K> : send pfkey X_SPDADD UNSPEC message
14/04/28 15:59:27 ii : creating IPSEC OUTBOUND policy
ANY:10.120.2.101:* -> ANY:192.168.90.0/24:*
14/04/28 15:59:27 K< : recv pfkey X_SPDADD UNSPEC message
14/04/28 15:59:27 DB : policy found
14/04/28 15:59:27 ii : calling init phase2 for initial policy
14/04/28 15:59:27 DB : policy found
14/04/28 15:59:27 DB : policy found
14/04/28 15:59:27 DB : tunnel found
14/04/28 15:59:27 DB : new phase2 ( IPSEC initiator )
14/04/28 15:59:27 DB : phase2 added ( obj count = 1 )
14/04/28 15:59:27 K> : send pfkey GETSPI ESP message
14/04/28 15:59:27 K< : recv pfkey X_SPDADD UNSPEC message
14/04/28 15:59:27 DB : policy found
14/04/28 15:59:27 K< : recv pfkey GETSPI ESP message
14/04/28 15:59:27 DB : phase2 found
14/04/28 15:59:27 ii : updated spi for 1 ipsec-esp proposal
14/04/28 15:59:27 DB : phase1 found
14/04/28 15:59:27 >> : hash payload
14/04/28 15:59:27 >> : security association payload
14/04/28 15:59:27 >> : - proposal #1 payload
14/04/28 15:59:27 >> : -- transform #1 payload
14/04/28 15:59:27 >> : -- transform #2 payload
14/04/28 15:59:27 >> : -- transform #3 payload
14/04/28 15:59:27 >> : -- transform #4 payload
14/04/28 15:59:27 >> : -- transform #5 payload
14/04/28 15:59:27 >> : -- transform #6 payload
14/04/28 15:59:27 >> : -- transform #7 payload
14/04/28 15:59:27 >> : -- transform #8 payload
14/04/28 15:59:27 >> : -- transform #9 payload
14/04/28 15:59:27 >> : -- transform #10 payload
14/04/28 15:59:27 >> : -- transform #11 payload
14/04/28 15:59:27 >> : -- transform #12 payload
14/04/28 15:59:27 >> : -- transform #13 payload
14/04/28 15:59:27 >> : -- transform #14 payload
14/04/28 15:59:27 >> : -- transform #15 payload
14/04/28 15:59:27 >> : -- transform #16 payload
14/04/28 15:59:27 >> : -- transform #17 payload
14/04/28 15:59:27 >> : -- transform #18 payload
14/04/28 15:59:27 >> : -- transform #19 payload
14/04/28 15:59:27 >> : -- transform #20 payload
14/04/28 15:59:27 >> : -- transform #21 payload
14/04/28 15:59:27 >> : -- transform #22 payload
14/04/28 15:59:27 >> : -- transform #23 payload
14/04/28 15:59:27 >> : -- transform #24 payload
14/04/28 15:59:27 >> : -- transform #25 payload
14/04/28 15:59:27 >> : -- transform #26 payload
14/04/28 15:59:27 >> : -- transform #27 payload
14/04/28 15:59:27 >> : -- transform #28 payload
14/04/28 15:59:27 >> : -- transform #29 payload
14/04/28 15:59:27 >> : -- transform #30 payload
14/04/28 15:59:27 >> : -- transform #31 payload
14/04/28 15:59:27 >> : -- transform #32 payload
14/04/28 15:59:27 >> : -- transform #33 payload
14/04/28 15:59:27 >> : -- transform #34 payload
14/04/28 15:59:27 >> : -- transform #35 payload
14/04/28 15:59:27 >> : -- transform #36 payload
14/04/28 15:59:27 >> : -- transform #37 payload
14/04/28 15:59:27 >> : -- transform #38 payload
14/04/28 15:59:27 >> : -- transform #39 payload
14/04/28 15:59:27 >> : -- transform #40 payload
14/04/28 15:59:27 >> : -- transform #41 payload
14/04/28 15:59:27 >> : -- transform #42 payload
14/04/28 15:59:27 >> : -- transform #43 payload
14/04/28 15:59:27 >> : -- transform #44 payload
14/04/28 15:59:27 >> : -- transform #45 payload
14/04/28 15:59:27 >> : nonce payload
14/04/28 15:59:27 >> : identification payload
14/04/28 15:59:27 >> : identification payload
14/04/28 15:59:27 == : phase2 hash_i ( input ) ( 1460 bytes )
14/04/28 15:59:27 == : phase2 hash_i ( computed ) ( 16 bytes )
14/04/28 15:59:27 == : new phase2 iv ( 8 bytes )
14/04/28 15:59:27 >= : cookies 80fa5d8d7644e9e1:df3f8bb8bfbddaa1
14/04/28 15:59:27 >= : message 0e591fef
14/04/28 15:59:27 >= : encrypt iv ( 8 bytes )
14/04/28 15:59:27 == : encrypt packet ( 1504 bytes )
14/04/28 15:59:27 == : stored iv ( 8 bytes )
14/04/28 15:59:27 -> : send NAT-T:IKE packet 192.168.1.102:4500 ->
210.80.199.3:4500 ( 1540 bytes )
14/04/28 15:59:27 ii : fragmented packet to 1514 bytes ( MTU 1500 bytes )
14/04/28 15:59:27 ii : fragmented packet to 74 bytes ( MTU 1500 bytes )
14/04/28 15:59:27 DB : phase2 resend event scheduled ( ref count = 2 )
14/04/28 15:59:27 ii : created IPSEC policy route for 192.168.90.0/24
14/04/28 15:59:27 DB : policy added ( obj count = 8 )
14/04/28 15:59:27 K> : send pfkey X_SPDADD UNSPEC message
14/04/28 15:59:27 ii : creating IPSEC INBOUND policy
ANY:172.16.30.0/24:* -> ANY:10.120.2.101:*
14/04/28 15:59:27 DB : policy added ( obj count = 9 )
14/04/28 15:59:27 K> : send pfkey X_SPDADD UNSPEC message
14/04/28 15:59:27 K< : recv pfkey X_SPDADD UNSPEC message
14/04/28 15:59:27 DB : policy found
14/04/28 15:59:27 K< : recv pfkey X_SPDADD UNSPEC message
14/04/28 15:59:27 DB : policy found
14/04/28 15:59:27 ii : creating IPSEC OUTBOUND policy
ANY:10.120.2.101:* -> ANY:172.16.30.0/24:*
14/04/28 15:59:27 ii : created IPSEC policy route for 172.16.30.0/24
14/04/28 15:59:27 DB : policy added ( obj count = 10 )
14/04/28 15:59:27 K> : send pfkey X_SPDADD UNSPEC message
14/04/28 15:59:27 ii : creating IPSEC INBOUND policy
ANY:192.168.3.0/24:* -> ANY:10.120.2.101:*
14/04/28 15:59:27 DB : policy added ( obj count = 11 )
14/04/28 15:59:27 K> : send pfkey X_SPDADD UNSPEC message
14/04/28 15:59:27 ii : creating IPSEC OUTBOUND policy
ANY:10.120.2.101:* -> ANY:192.168.3.0/24:*
14/04/28 15:59:27 K< : recv pfkey X_SPDADD UNSPEC message
14/04/28 15:59:27 DB : policy found
14/04/28 15:59:27 K< : recv pfkey X_SPDADD UNSPEC message
14/04/28 15:59:27 DB : policy found
14/04/28 15:59:27 ii : created IPSEC policy route for 192.168.3.0/24
14/04/28 15:59:27 DB : policy added ( obj count = 12 )
14/04/28 15:59:27 K> : send pfkey X_SPDADD UNSPEC message
14/04/28 15:59:27 ii : creating IPSEC INBOUND policy
ANY:205.197.192.150/32:* -> ANY:10.120.2.101:*
14/04/28 15:59:27 DB : policy added ( obj count = 13 )
14/04/28 15:59:27 K> : send pfkey X_SPDADD UNSPEC message
14/04/28 15:59:27 ii : creating IPSEC OUTBOUND policy
ANY:10.120.2.101:* -> ANY:205.197.192.150/32:*
14/04/28 15:59:27 K< : recv pfkey X_SPDADD UNSPEC message
14/04/28 15:59:27 DB : policy found
14/04/28 15:59:27 K< : recv pfkey X_SPDADD UNSPEC message
14/04/28 15:59:27 DB : policy found
14/04/28 15:59:27 ii : created IPSEC policy route for 205.197.192.150/32
14/04/28 15:59:27 DB : policy added ( obj count = 14 )
14/04/28 15:59:27 K> : send pfkey X_SPDADD UNSPEC message
14/04/28 15:59:27 ii : creating IPSEC INBOUND policy
ANY:205.197.192.151/32:* -> ANY:10.120.2.101:*
14/04/28 15:59:27 DB : policy added ( obj count = 15 )
14/04/28 15:59:27 K> : send pfkey X_SPDADD UNSPEC message
14/04/28 15:59:27 ii : creating IPSEC OUTBOUND policy
ANY:10.120.2.101:* -> ANY:205.197.192.151/32:*
14/04/28 15:59:27 K< : recv pfkey X_SPDADD UNSPEC message
14/04/28 15:59:27 DB : policy found
14/04/28 15:59:27 K< : recv pfkey X_SPDADD UNSPEC message
14/04/28 15:59:27 DB : policy found
14/04/28 15:59:27 ii : created IPSEC policy route for 205.197.192.151/32
14/04/28 15:59:27 DB : policy added ( obj count = 16 )
14/04/28 15:59:27 K> : send pfkey X_SPDADD UNSPEC message
14/04/28 15:59:27 K< : recv pfkey X_SPDADD UNSPEC message
14/04/28 15:59:27 DB : policy found
14/04/28 15:59:27 ii : split DNS is disabled
14/04/28 15:59:30 K< : recv pfkey ACQUIRE UNSPEC message
14/04/28 15:59:30 DB : policy found
14/04/28 15:59:30 DB : policy found
14/04/28 15:59:30 DB : tunnel found
14/04/28 15:59:30 DB : new phase2 ( IPSEC initiator )
14/04/28 15:59:30 DB : phase2 added ( obj count = 2 )
14/04/28 15:59:30 K> : send pfkey GETSPI ESP message
14/04/28 15:59:30 K< : recv pfkey GETSPI ESP message
14/04/28 15:59:30 DB : phase2 found
14/04/28 15:59:30 ii : updated spi for 1 ipsec-esp proposal
14/04/28 15:59:30 DB : phase1 found
14/04/28 15:59:30 >> : hash payload
14/04/28 15:59:30 >> : security association payload
14/04/28 15:59:30 >> : - proposal #1 payload
14/04/28 15:59:30 >> : -- transform #1 payload
14/04/28 15:59:30 >> : -- transform #2 payload
14/04/28 15:59:30 >> : -- transform #3 payload
14/04/28 15:59:30 >> : -- transform #4 payload
14/04/28 15:59:30 >> : -- transform #5 payload
14/04/28 15:59:30 >> : -- transform #6 payload
14/04/28 15:59:30 >> : -- transform #7 payload
14/04/28 15:59:30 >> : -- transform #8 payload
14/04/28 15:59:30 >> : -- transform #9 payload
14/04/28 15:59:30 >> : -- transform #10 payload
14/04/28 15:59:30 >> : -- transform #11 payload
14/04/28 15:59:30 >> : -- transform #12 payload
14/04/28 15:59:30 >> : -- transform #13 payload
14/04/28 15:59:30 >> : -- transform #14 payload
14/04/28 15:59:30 >> : -- transform #15 payload
14/04/28 15:59:30 >> : -- transform #16 payload
14/04/28 15:59:30 >> : -- transform #17 payload
14/04/28 15:59:30 >> : -- transform #18 payload
14/04/28 15:59:30 >> : -- transform #19 payload
14/04/28 15:59:30 >> : -- transform #20 payload
14/04/28 15:59:30 >> : -- transform #21 payload
14/04/28 15:59:30 >> : -- transform #22 payload
14/04/28 15:59:30 >> : -- transform #23 payload
14/04/28 15:59:30 >> : -- transform #24 payload
14/04/28 15:59:30 >> : -- transform #25 payload
14/04/28 15:59:30 >> : -- transform #26 payload
14/04/28 15:59:30 >> : -- transform #27 payload
14/04/28 15:59:30 >> : -- transform #28 payload
14/04/28 15:59:30 >> : -- transform #29 payload
14/04/28 15:59:30 >> : -- transform #30 payload
14/04/28 15:59:30 >> : -- transform #31 payload
14/04/28 15:59:30 >> : -- transform #32 payload
14/04/28 15:59:30 >> : -- transform #33 payload
14/04/28 15:59:30 >> : -- transform #34 payload
14/04/28 15:59:30 >> : -- transform #35 payload
14/04/28 15:59:30 >> : -- transform #36 payload
14/04/28 15:59:30 >> : -- transform #37 payload
14/04/28 15:59:30 >> : -- transform #38 payload
14/04/28 15:59:30 >> : -- transform #39 payload
14/04/28 15:59:30 >> : -- transform #40 payload
14/04/28 15:59:30 >> : -- transform #41 payload
14/04/28 15:59:30 >> : -- transform #42 payload
14/04/28 15:59:30 >> : -- transform #43 payload
14/04/28 15:59:30 >> : -- transform #44 payload
14/04/28 15:59:30 >> : -- transform #45 payload
14/04/28 15:59:30 >> : nonce payload
14/04/28 15:59:30 >> : identification payload
14/04/28 15:59:30 >> : identification payload
14/04/28 15:59:30 == : phase2 hash_i ( input ) ( 1460 bytes )
14/04/28 15:59:30 == : phase2 hash_i ( computed ) ( 16 bytes )
14/04/28 15:59:30 == : new phase2 iv ( 8 bytes )
14/04/28 15:59:30 >= : cookies 80fa5d8d7644e9e1:df3f8bb8bfbddaa1
14/04/28 15:59:30 >= : message b77f78d8
14/04/28 15:59:30 >= : encrypt iv ( 8 bytes )
14/04/28 15:59:30 == : encrypt packet ( 1504 bytes )
14/04/28 15:59:30 == : stored iv ( 8 bytes )
14/04/28 15:59:30 -> : send NAT-T:IKE packet 192.168.1.102:4500 ->
210.80.199.3:4500 ( 1540 bytes )
14/04/28 15:59:30 ii : fragmented packet to 1514 bytes ( MTU 1500 bytes )
14/04/28 15:59:30 ii : fragmented packet to 74 bytes ( MTU 1500 bytes )
14/04/28 15:59:30 DB : phase2 resend event scheduled ( ref count = 2 )
14/04/28 15:59:32 ii : fragmented packet to 1514 bytes ( MTU 1500 bytes )
14/04/28 15:59:32 ii : fragmented packet to 74 bytes ( MTU 1500 bytes )
14/04/28 15:59:32 -> : resend 1 phase2 packet(s) [0/2]
192.168.1.102:4500 -> 210.80.199.3:4500
14/04/28 15:59:34 <- : recv NAT-T:IKE packet 210.80.199.3:4500 ->
192.168.1.102:4500 ( 308 bytes )
14/04/28 15:59:34 DB : phase1 found
14/04/28 15:59:34 ii : processing config packet ( 308 bytes )
14/04/28 15:59:34 DB : config found
14/04/28 15:59:34 !! : config packet ignored ( config already mature )
14/04/28 15:59:35 ii : fragmented packet to 1514 bytes ( MTU 1500 bytes )
14/04/28 15:59:35 ii : fragmented packet to 74 bytes ( MTU 1500 bytes )
14/04/28 15:59:35 -> : resend 1 phase2 packet(s) [0/2]
192.168.1.102:4500 -> 210.80.199.3:4500
14/04/28 15:59:37 ii : fragmented packet to 1514 bytes ( MTU 1500 bytes )
14/04/28 15:59:37 ii : fragmented packet to 74 bytes ( MTU 1500 bytes )
14/04/28 15:59:37 -> : resend 1 phase2 packet(s) [1/2]
192.168.1.102:4500 -> 210.80.199.3:4500
14/04/28 15:59:39 DB : phase1 found
14/04/28 15:59:39 ii : sending peer DPDV1-R-U-THERE notification
14/04/28 15:59:39 ii : - 192.168.1.102:4500 -> 210.80.199.3:4500
14/04/28 15:59:39 ii : - isakmp spi = 80fa5d8d7644e9e1:df3f8bb8bfbddaa1
14/04/28 15:59:39 ii : - data size 4
14/04/28 15:59:39 >> : hash payload
14/04/28 15:59:39 >> : notification payload
14/04/28 15:59:39 == : new informational hash ( 16 bytes )
14/04/28 15:59:39 == : new informational iv ( 8 bytes )
14/04/28 15:59:39 >= : cookies 80fa5d8d7644e9e1:df3f8bb8bfbddaa1
14/04/28 15:59:39 >= : message 3f31273d
14/04/28 15:59:39 >= : encrypt iv ( 8 bytes )
14/04/28 15:59:39 == : encrypt packet ( 80 bytes )
14/04/28 15:59:39 == : stored iv ( 8 bytes )
14/04/28 15:59:39 -> : send NAT-T:IKE packet 192.168.1.102:4500 ->
210.80.199.3:4500 ( 116 bytes )
14/04/28 15:59:39 ii : DPD ARE-YOU-THERE sequence 00785131 requested
14/04/28 15:59:39 DB : phase1 found
14/04/28 15:59:39 -> : send NAT-T:KEEP-ALIVE packet 192.168.1.102:4500
-> 210.80.199.3:4500
14/04/28 15:59:40 ii : fragmented packet to 1514 bytes ( MTU 1500 bytes )
14/04/28 15:59:40 ii : fragmented packet to 74 bytes ( MTU 1500 bytes )
14/04/28 15:59:40 -> : resend 1 phase2 packet(s) [1/2]
192.168.1.102:4500 -> 210.80.199.3:4500
14/04/28 15:59:42 <- : recv NAT-T:IKE packet 210.80.199.3:4500 ->
192.168.1.102:4500 ( 308 bytes )
14/04/28 15:59:42 DB : phase1 found
14/04/28 15:59:42 ii : processing config packet ( 308 bytes )
14/04/28 15:59:42 DB : config found
14/04/28 15:59:42 !! : config packet ignored ( config already mature )
14/04/28 15:59:42 ii : fragmented packet to 1514 bytes ( MTU 1500 bytes )
14/04/28 15:59:42 ii : fragmented packet to 74 bytes ( MTU 1500 bytes )
14/04/28 15:59:42 -> : resend 1 phase2 packet(s) [2/2]
192.168.1.102:4500 -> 210.80.199.3:4500
14/04/28 15:59:45 ii : fragmented packet to 1514 bytes ( MTU 1500 bytes )
14/04/28 15:59:45 ii : fragmented packet to 74 bytes ( MTU 1500 bytes )
14/04/28 15:59:45 -> : resend 1 phase2 packet(s) [2/2]
192.168.1.102:4500 -> 210.80.199.3:4500
14/04/28 15:59:47 K< : recv pfkey ACQUIRE UNSPEC message
14/04/28 15:59:47 DB : policy found
14/04/28 15:59:47 DB : policy found
14/04/28 15:59:47 DB : tunnel found
14/04/28 15:59:47 DB : new phase2 ( IPSEC initiator )
14/04/28 15:59:47 DB : phase2 added ( obj count = 3 )
14/04/28 15:59:47 K> : send pfkey GETSPI ESP message
14/04/28 15:59:47 K< : recv pfkey GETSPI ESP message
14/04/28 15:59:47 DB : phase2 found
14/04/28 15:59:47 ii : updated spi for 1 ipsec-esp proposal
14/04/28 15:59:47 DB : phase1 found
14/04/28 15:59:47 >> : hash payload
14/04/28 15:59:47 >> : security association payload
14/04/28 15:59:47 >> : - proposal #1 payload
14/04/28 15:59:47 >> : -- transform #1 payload
14/04/28 15:59:47 >> : -- transform #2 payload
14/04/28 15:59:47 >> : -- transform #3 payload
14/04/28 15:59:47 >> : -- transform #4 payload
14/04/28 15:59:47 >> : -- transform #5 payload
14/04/28 15:59:47 >> : -- transform #6 payload
14/04/28 15:59:47 >> : -- transform #7 payload
14/04/28 15:59:47 >> : -- transform #8 payload
14/04/28 15:59:47 >> : -- transform #9 payload
14/04/28 15:59:47 >> : -- transform #10 payload
14/04/28 15:59:47 >> : -- transform #11 payload
14/04/28 15:59:47 >> : -- transform #12 payload
14/04/28 15:59:47 >> : -- transform #13 payload
14/04/28 15:59:47 >> : -- transform #14 payload
14/04/28 15:59:47 >> : -- transform #15 payload
14/04/28 15:59:47 >> : -- transform #16 payload
14/04/28 15:59:47 >> : -- transform #17 payload
14/04/28 15:59:47 >> : -- transform #18 payload
14/04/28 15:59:47 >> : -- transform #19 payload
14/04/28 15:59:47 >> : -- transform #20 payload
14/04/28 15:59:47 >> : -- transform #21 payload
14/04/28 15:59:47 >> : -- transform #22 payload
14/04/28 15:59:47 >> : -- transform #23 payload
14/04/28 15:59:47 >> : -- transform #24 payload
14/04/28 15:59:47 >> : -- transform #25 payload
14/04/28 15:59:47 >> : -- transform #26 payload
14/04/28 15:59:47 >> : -- transform #27 payload
14/04/28 15:59:47 >> : -- transform #28 payload
14/04/28 15:59:47 >> : -- transform #29 payload
14/04/28 15:59:47 >> : -- transform #30 payload
14/04/28 15:59:47 >> : -- transform #31 payload
14/04/28 15:59:47 >> : -- transform #32 payload
14/04/28 15:59:47 >> : -- transform #33 payload
14/04/28 15:59:47 >> : -- transform #34 payload
14/04/28 15:59:47 >> : -- transform #35 payload
14/04/28 15:59:47 >> : -- transform #36 payload
14/04/28 15:59:47 >> : -- transform #37 payload
14/04/28 15:59:47 >> : -- transform #38 payload
14/04/28 15:59:47 >> : -- transform #39 payload
14/04/28 15:59:47 >> : -- transform #40 payload
14/04/28 15:59:47 >> : -- transform #41 payload
14/04/28 15:59:47 >> : -- transform #42 payload
14/04/28 15:59:47 >> : -- transform #43 payload
14/04/28 15:59:47 >> : -- transform #44 payload
14/04/28 15:59:47 >> : -- transform #45 payload
14/04/28 15:59:47 >> : nonce payload
14/04/28 15:59:47 >> : identification payload
14/04/28 15:59:47 >> : identification payload
14/04/28 15:59:47 == : phase2 hash_i ( input ) ( 1460 bytes )
14/04/28 15:59:47 == : phase2 hash_i ( computed ) ( 16 bytes )
14/04/28 15:59:47 == : new phase2 iv ( 8 bytes )
14/04/28 15:59:47 >= : cookies 80fa5d8d7644e9e1:df3f8bb8bfbddaa1
14/04/28 15:59:47 >= : message 6a92b8da
14/04/28 15:59:47 >= : encrypt iv ( 8 bytes )
14/04/28 15:59:47 == : encrypt packet ( 1504 bytes )
14/04/28 15:59:47 == : stored iv ( 8 bytes )
14/04/28 15:59:47 -> : send NAT-T:IKE packet 192.168.1.102:4500 ->
210.80.199.3:4500 ( 1540 bytes )
14/04/28 15:59:47 ii : fragmented packet to 1514 bytes ( MTU 1500 bytes )
14/04/28 15:59:47 ii : fragmented packet to 74 bytes ( MTU 1500 bytes )
14/04/28 15:59:47 DB : phase2 resend event scheduled ( ref count = 2 )
14/04/28 15:59:47 ii : resend limit exceeded for phase2 exchange
14/04/28 15:59:47 ii : phase2 removal before expire time
14/04/28 15:59:47 DB : phase2 deleted ( obj count = 2 )
14/04/28 15:59:50 <- : recv NAT-T:IKE packet 210.80.199.3:4500 ->
192.168.1.102:4500 ( 308 bytes )
14/04/28 15:59:50 DB : phase1 found
14/04/28 15:59:50 ii : processing config packet ( 308 bytes )
14/04/28 15:59:50 DB : config found
14/04/28 15:59:50 !! : config packet ignored ( config already mature )
14/04/28 15:59:50 ii : resend limit exceeded for phase2 exchange
14/04/28 15:59:50 ii : phase2 removal before expire time
14/04/28 15:59:50 DB : phase2 deleted ( obj count = 1 )
14/04/28 15:59:52 ii : fragmented packet to 1514 bytes ( MTU 1500 bytes )
14/04/28 15:59:52 ii : fragmented packet to 74 bytes ( MTU 1500 bytes )
14/04/28 15:59:52 -> : resend 1 phase2 packet(s) [0/2]
192.168.1.102:4500 -> 210.80.199.3:4500
14/04/28 15:59:54 DB : phase1 found
14/04/28 15:59:54 -> : send NAT-T:KEEP-ALIVE packet 192.168.1.102:4500
-> 210.80.199.3:4500
14/04/28 15:59:54 DB : phase1 found
14/04/28 15:59:54 ii : next tunnel DPD retry in 4 secs for peer
210.80.199.3:4500
14/04/28 15:59:54 ii : sending peer DPDV1-R-U-THERE notification
14/04/28 15:59:54 ii : - 192.168.1.102:4500 -> 210.80.199.3:4500
14/04/28 15:59:54 ii : - isakmp spi = 80fa5d8d7644e9e1:df3f8bb8bfbddaa1
14/04/28 15:59:54 ii : - data size 4
14/04/28 15:59:54 >> : hash payload
14/04/28 15:59:54 >> : notification payload
14/04/28 15:59:54 == : new informational hash ( 16 bytes )
14/04/28 15:59:54 == : new informational iv ( 8 bytes )
14/04/28 15:59:54 >= : cookies 80fa5d8d7644e9e1:df3f8bb8bfbddaa1
14/04/28 15:59:54 >= : message b04fa50f
14/04/28 15:59:54 >= : encrypt iv ( 8 bytes )
14/04/28 15:59:54 == : encrypt packet ( 80 bytes )
14/04/28 15:59:54 == : stored iv ( 8 bytes )
14/04/28 15:59:54 -> : send NAT-T:IKE packet 192.168.1.102:4500 ->
210.80.199.3:4500 ( 116 bytes )
14/04/28 15:59:54 ii : DPD ARE-YOU-THERE sequence 00785132 requested
14/04/28 15:59:57 ii : fragmented packet to 1514 bytes ( MTU 1500 bytes )
14/04/28 15:59:57 ii : fragmented packet to 74 bytes ( MTU 1500 bytes )
14/04/28 15:59:57 -> : resend 1 phase2 packet(s) [1/2]
192.168.1.102:4500 -> 210.80.199.3:4500
14/04/28 15:59:58 <- : recv NAT-T:IKE packet 210.80.199.3:4500 ->
192.168.1.102:4500 ( 76 bytes )
14/04/28 15:59:58 DB : phase1 found
14/04/28 15:59:58 ii : processing informational packet ( 76 bytes )
14/04/28 15:59:58 == : new informational iv ( 8 bytes )
14/04/28 15:59:58 =< : cookies 80fa5d8d7644e9e1:df3f8bb8bfbddaa1
14/04/28 15:59:58 =< : message a31e8665
14/04/28 15:59:58 =< : decrypt iv ( 8 bytes )
14/04/28 15:59:58 == : decrypt packet ( 76 bytes )
14/04/28 15:59:58 <= : stored iv ( 8 bytes )
14/04/28 15:59:58 << : hash payload
14/04/28 15:59:58 << : delete payload
14/04/28 15:59:58 == : informational hash_i ( computed ) ( 16 bytes )
14/04/28 15:59:58 == : informational hash_c ( received ) ( 16 bytes )
14/04/28 15:59:58 ii : informational hash verified
14/04/28 15:59:58 ii : received peer DELETE message
14/04/28 15:59:58 ii : - 210.80.199.3:4500 -> 192.168.1.102:4500
14/04/28 15:59:58 ii : - isakmp spi = 80fa5d8d7644e9e1:df3f8bb8bfbddaa1
14/04/28 15:59:58 DB : phase1 found
14/04/28 15:59:58 ii : cleanup, marked phase1
80fa5d8d7644e9e1:df3f8bb8bfbddaa1 for removal
14/04/28 15:59:58 DB : phase1 soft event canceled ( ref count = 4 )
14/04/28 15:59:58 DB : phase1 hard event canceled ( ref count = 3 )
14/04/28 15:59:58 DB : phase1 dead event canceled ( ref count = 2 )
14/04/28 15:59:58 DB : config deleted ( obj count = 0 )
14/04/28 15:59:58 ii : phase1 removal before expire time
14/04/28 15:59:58 DB : phase1 not found
14/04/28 15:59:58 DB : phase1 deleted ( obj count = 0 )
14/04/28 15:59:58 DB : policy found
14/04/28 15:59:58 ii : removing IPSEC INBOUND policy ANY:10.0.0.0/8:*
-> ANY:10.120.2.101:*
14/04/28 15:59:58 K> : send pfkey X_SPDDELETE2 UNSPEC message
14/04/28 15:59:58 DB : policy found
14/04/28 15:59:58 ii : removing IPSEC OUTBOUND policy
ANY:10.120.2.101:* -> ANY:10.0.0.0/8:*
14/04/28 15:59:58 K> : send pfkey X_SPDDELETE2 UNSPEC message
14/04/28 15:59:58 K< : recv pfkey X_SPDDELETE2 UNSPEC message
14/04/28 15:59:58 ii : removed IPSEC policy route for ANY:10.0.0.0/8:*
14/04/28 15:59:58 DB : policy found
14/04/28 15:59:58 ii : removing IPSEC INBOUND policy
ANY:192.168.90.0/24:* -> ANY:10.120.2.101:*
14/04/28 15:59:58 K> : send pfkey X_SPDDELETE2 UNSPEC message
14/04/28 15:59:58 DB : policy found
14/04/28 15:59:58 ii : removing IPSEC OUTBOUND policy
ANY:10.120.2.101:* -> ANY:192.168.90.0/24:*
14/04/28 15:59:58 K> : send pfkey X_SPDDELETE2 UNSPEC message
14/04/28 15:59:58 ii : removed IPSEC policy route for ANY:192.168.90.0/24:*
14/04/28 15:59:58 DB : policy found
14/04/28 15:59:58 ii : removing IPSEC INBOUND policy
ANY:172.16.30.0/24:* -> ANY:10.120.2.101:*
14/04/28 15:59:58 K> : send pfkey X_SPDDELETE2 UNSPEC message
14/04/28 15:59:58 DB : policy found
14/04/28 15:59:58 ii : removing IPSEC OUTBOUND policy
ANY:10.120.2.101:* -> ANY:172.16.30.0/24:*
14/04/28 15:59:58 K> : send pfkey X_SPDDELETE2 UNSPEC message
14/04/28 15:59:58 ii : removed IPSEC policy route for ANY:172.16.30.0/24:*
14/04/28 15:59:58 DB : policy found
14/04/28 15:59:58 ii : removing IPSEC INBOUND policy
ANY:192.168.3.0/24:* -> ANY:10.120.2.101:*
14/04/28 15:59:58 K> : send pfkey X_SPDDELETE2 UNSPEC message
14/04/28 15:59:58 DB : policy found
14/04/28 15:59:58 ii : removing IPSEC OUTBOUND policy
ANY:10.120.2.101:* -> ANY:192.168.3.0/24:*
14/04/28 15:59:58 K> : send pfkey X_SPDDELETE2 UNSPEC message
14/04/28 15:59:58 ii : removed IPSEC policy route for ANY:192.168.3.0/24:*
14/04/28 15:59:58 DB : policy found
14/04/28 15:59:58 ii : removing IPSEC INBOUND policy
ANY:205.197.192.150/32:* -> ANY:10.120.2.101:*
14/04/28 15:59:58 K> : send pfkey X_SPDDELETE2 UNSPEC message
14/04/28 15:59:58 DB : policy found
14/04/28 15:59:58 ii : removing IPSEC OUTBOUND policy
ANY:10.120.2.101:* -> ANY:205.197.192.150/32:*
14/04/28 15:59:58 K> : send pfkey X_SPDDELETE2 UNSPEC message
14/04/28 15:59:58 ii : removed IPSEC policy route for ANY:205.197.192.150/32:*
14/04/28 15:59:58 DB : policy found
14/04/28 15:59:58 ii : removing IPSEC INBOUND policy
ANY:205.197.192.151/32:* -> ANY:10.120.2.101:*
14/04/28 15:59:58 K> : send pfkey X_SPDDELETE2 UNSPEC message
14/04/28 15:59:58 DB : policy found
14/04/28 15:59:58 ii : removing IPSEC OUTBOUND policy
ANY:10.120.2.101:* -> ANY:205.197.192.151/32:*
14/04/28 15:59:58 K> : send pfkey X_SPDDELETE2 UNSPEC message
14/04/28 15:59:58 ii : removed IPSEC policy route for ANY:205.197.192.151/32:*
14/04/28 15:59:58 DB : policy found
14/04/28 15:59:58 ii : removing NONE INBOUND policy ANY:192.168.1.1:*
-> ANY:10.120.2.101:*
14/04/28 15:59:58 K> : send pfkey X_SPDDELETE2 UNSPEC message
14/04/28 15:59:58 DB : policy found
14/04/28 15:59:58 ii : removing NONE OUTBOUND policy
ANY:10.120.2.101:* -> ANY:192.168.1.1:*
14/04/28 15:59:58 K> : send pfkey X_SPDDELETE2 UNSPEC message
14/04/28 15:59:58 DB : policy found
14/04/28 15:59:58 ii : removing NONE INBOUND policy ANY:210.80.199.3:*
-> ANY:192.168.1.102:*
14/04/28 15:59:58 K> : send pfkey X_SPDDELETE2 UNSPEC message
14/04/28 15:59:58 DB : policy found
14/04/28 15:59:58 ii : removing NONE OUTBOUND policy
ANY:192.168.1.102:* -> ANY:210.80.199.3:*
14/04/28 15:59:58 K> : send pfkey X_SPDDELETE2 UNSPEC message
14/04/28 15:59:58 ii : removed NONE policy route for ANY:210.80.199.3:*
14/04/28 15:59:58 DB : policy found
14/04/28 15:59:58 DB : policy deleted ( obj count = 15 )
14/04/28 15:59:58 K< : recv pfkey X_SPDDELETE2 UNSPEC message
14/04/28 15:59:58 DB : policy found
14/04/28 15:59:58 DB : policy deleted ( obj count = 14 )
14/04/28 15:59:58 K< : recv pfkey X_SPDDELETE2 UNSPEC message
14/04/28 15:59:58 DB : policy found
14/04/28 15:59:58 DB : policy deleted ( obj count = 13 )
14/04/28 15:59:58 K< : recv pfkey X_SPDDELETE2 UNSPEC message
14/04/28 15:59:58 DB : policy found
14/04/28 15:59:58 DB : policy deleted ( obj count = 12 )
14/04/28 15:59:58 K< : recv pfkey X_SPDDELETE2 UNSPEC message
14/04/28 15:59:58 DB : policy found
14/04/28 15:59:58 DB : policy deleted ( obj count = 11 )
14/04/28 15:59:58 K< : recv pfkey X_SPDDELETE2 UNSPEC message
14/04/28 15:59:58 DB : policy found
14/04/28 15:59:58 DB : policy deleted ( obj count = 10 )
14/04/28 15:59:58 K< : recv pfkey X_SPDDELETE2 UNSPEC message
14/04/28 15:59:58 DB : policy found
14/04/28 15:59:58 DB : policy deleted ( obj count = 9 )
14/04/28 15:59:58 K< : recv pfkey X_SPDDELETE2 UNSPEC message
14/04/28 15:59:58 DB : policy found
14/04/28 15:59:58 DB : policy deleted ( obj count = 8 )
14/04/28 15:59:58 K< : recv pfkey X_SPDDELETE2 UNSPEC message
14/04/28 15:59:58 DB : policy found
14/04/28 15:59:58 DB : policy deleted ( obj count = 7 )
14/04/28 15:59:58 K< : recv pfkey X_SPDDELETE2 UNSPEC message
14/04/28 15:59:58 DB : policy found
14/04/28 15:59:58 DB : policy deleted ( obj count = 6 )
14/04/28 15:59:58 K< : recv pfkey X_SPDDELETE2 UNSPEC message
14/04/28 15:59:58 DB : policy found
14/04/28 15:59:58 DB : policy deleted ( obj count = 5 )
14/04/28 15:59:58 K< : recv pfkey X_SPDDELETE2 UNSPEC message
14/04/28 15:59:58 DB : policy found
14/04/28 15:59:58 DB : policy deleted ( obj count = 4 )
14/04/28 15:59:58 K< : recv pfkey X_SPDDELETE2 UNSPEC message
14/04/28 15:59:58 DB : policy found
14/04/28 15:59:58 DB : policy deleted ( obj count = 3 )
14/04/28 15:59:58 K< : recv pfkey X_SPDDELETE2 UNSPEC message
14/04/28 15:59:58 DB : policy found
14/04/28 15:59:58 DB : policy deleted ( obj count = 2 )
14/04/28 15:59:58 K< : recv pfkey X_SPDDELETE2 UNSPEC message
14/04/28 15:59:58 DB : policy found
14/04/28 15:59:58 DB : policy deleted ( obj count = 1 )
14/04/28 15:59:58 K< : recv pfkey X_SPDDELETE2 UNSPEC message
14/04/28 15:59:58 DB : policy found
14/04/28 15:59:58 DB : policy deleted ( obj count = 0 )
14/04/28 15:59:58 ii : disable adapter ROOT\VNET\0000
14/04/28 15:59:58 DB : tunnel dpd event canceled ( ref count = 4 )
14/04/28 15:59:58 DB : tunnel natt event canceled ( ref count = 3 )
14/04/28 15:59:58 DB : tunnel stats event canceled ( ref count = 2 )
14/04/28 15:59:58 DB : removing tunnel config references
14/04/28 15:59:58 DB : removing tunnel phase2 references
14/04/28 15:59:58 DB : phase2 resend event canceled ( ref count = 1 )
14/04/28 15:59:58 ii : phase2 removal before expire time
14/04/28 15:59:58 DB : phase2 deleted ( obj count = 0 )
14/04/28 15:59:58 DB : removing tunnel phase1 references
14/04/28 15:59:58 DB : tunnel deleted ( obj count = 0 )
14/04/28 15:59:58 DB : removing all peer tunnel references
14/04/28 15:59:58 DB : peer deleted ( obj count = 0 )
14/04/28 15:59:58 ii : ipc client process thread exit ...
14/04/28 15:59:58 ii : ipc client process thread begin ...
14/04/28 15:59:58 <A : peer config add message
14/04/28 15:59:58 <A : proposal config message
14/04/28 15:59:58 <A : proposal config message
14/04/28 15:59:58 <A : client config message
14/04/28 15:59:58 <A : xauth username message
14/04/28 15:59:58 <A : xauth password message
14/04/28 15:59:58 <A : local id 'ScanSoft' message
14/04/28 15:59:58 <A : preshared key message
14/04/28 15:59:58 <A : peer tunnel enable message
14/04/28 15:59:58 DB : peer added ( obj count = 1 )
14/04/28 15:59:58 ii : local address 192.168.1.102 selected for peer
14/04/28 15:59:58 DB : tunnel added ( obj count = 1 )
14/04/28 15:59:58 DB : new phase1 ( ISAKMP initiator )
14/04/28 15:59:58 DB : exchange type is aggressive
14/04/28 15:59:58 DB : 192.168.1.102:500 <-> 210.80.199.3:500
14/04/28 15:59:58 DB : f2ca9b8a3be61417:0000000000000000
14/04/28 15:59:58 DB : phase1 added ( obj count = 1 )
14/04/28 15:59:58 >> : security association payload
14/04/28 15:59:58 >> : - proposal #1 payload
14/04/28 15:59:58 >> : -- transform #1 payload
14/04/28 15:59:58 >> : -- transform #2 payload
14/04/28 15:59:58 >> : -- transform #3 payload
14/04/28 15:59:58 >> : -- transform #4 payload
14/04/28 15:59:58 >> : -- transform #5 payload
14/04/28 15:59:58 >> : -- transform #6 payload
14/04/28 15:59:58 >> : -- transform #7 payload
14/04/28 15:59:58 >> : -- transform #8 payload
14/04/28 15:59:58 >> : -- transform #9 payload
14/04/28 15:59:58 >> : -- transform #10 payload
14/04/28 15:59:58 >> : -- transform #11 payload
14/04/28 15:59:58 >> : -- transform #12 payload
14/04/28 15:59:58 >> : -- transform #13 payload
14/04/28 15:59:58 >> : -- transform #14 payload
14/04/28 15:59:58 >> : -- transform #15 payload
14/04/28 15:59:58 >> : -- transform #16 payload
14/04/28 15:59:58 >> : -- transform #17 payload
14/04/28 15:59:58 >> : -- transform #18 payload
14/04/28 15:59:58 >> : key exchange payload
14/04/28 15:59:58 >> : nonce payload
14/04/28 15:59:58 >> : identification payload
14/04/28 15:59:58 >> : vendor id payload
14/04/28 15:59:58 ii : local supports XAUTH
14/04/28 15:59:58 >> : vendor id payload
14/04/28 15:59:58 ii : local supports nat-t ( draft v00 )
14/04/28 15:59:58 >> : vendor id payload
14/04/28 15:59:58 ii : local supports nat-t ( draft v01 )
14/04/28 15:59:58 >> : vendor id payload
14/04/28 15:59:58 ii : local supports nat-t ( draft v02 )
14/04/28 15:59:58 >> : vendor id payload
14/04/28 15:59:58 ii : local supports nat-t ( draft v03 )
14/04/28 15:59:58 >> : vendor id payload
14/04/28 15:59:58 ii : local supports nat-t ( rfc )
14/04/28 15:59:58 >> : vendor id payload
14/04/28 15:59:58 >> : vendor id payload
14/04/28 15:59:58 ii : local supports DPDv1
14/04/28 15:59:58 >> : vendor id payload
14/04/28 15:59:58 ii : local is SHREW SOFT compatible
14/04/28 15:59:58 >> : vendor id payload
14/04/28 15:59:58 ii : local is NETSCREEN compatible
14/04/28 15:59:58 >> : vendor id payload
14/04/28 15:59:58 ii : local is SIDEWINDER compatible
14/04/28 15:59:58 >> : vendor id payload
14/04/28 15:59:58 ii : local is CISCO UNITY compatible
14/04/28 15:59:58 >= : cookies f2ca9b8a3be61417:0000000000000000
14/04/28 15:59:58 >= : message 00000000
14/04/28 15:59:58 -> : send IKE packet 192.168.1.102:500 ->
210.80.199.3:500 ( 1180 bytes )
14/04/28 15:59:58 DB : phase1 resend event scheduled ( ref count = 2 )
14/04/28 15:59:59 <- : recv IKE packet 210.80.199.3:500 ->
192.168.1.102:500 ( 448 bytes )
14/04/28 15:59:59 DB : phase1 found
14/04/28 15:59:59 ii : processing phase1 packet ( 448 bytes )
14/04/28 15:59:59 =< : cookies f2ca9b8a3be61417:66baa16acc706b4e
14/04/28 15:59:59 =< : message 00000000
14/04/28 15:59:59 << : security association payload
14/04/28 15:59:59 << : - propsal #1 payload
14/04/28 15:59:59 << : -- transform #13 payload
14/04/28 15:59:59 ii : unmatched isakmp proposal/transform
14/04/28 15:59:59 ii : cipher type ( 3des != aes )
14/04/28 15:59:59 ii : unmatched isakmp proposal/transform
14/04/28 15:59:59 ii : cipher type ( 3des != aes )
14/04/28 15:59:59 ii : unmatched isakmp proposal/transform
14/04/28 15:59:59 ii : cipher type ( 3des != aes )
14/04/28 15:59:59 ii : unmatched isakmp proposal/transform
14/04/28 15:59:59 ii : cipher type ( 3des != aes )
14/04/28 15:59:59 ii : unmatched isakmp proposal/transform
14/04/28 15:59:59 ii : cipher type ( 3des != aes )
14/04/28 15:59:59 ii : unmatched isakmp proposal/transform
14/04/28 15:59:59 ii : cipher type ( 3des != aes )
14/04/28 15:59:59 ii : unmatched isakmp proposal/transform
14/04/28 15:59:59 ii : cipher type ( 3des != blowfish )
14/04/28 15:59:59 ii : unmatched isakmp proposal/transform
14/04/28 15:59:59 ii : cipher type ( 3des != blowfish )
14/04/28 15:59:59 ii : unmatched isakmp proposal/transform
14/04/28 15:59:59 ii : cipher type ( 3des != blowfish )
14/04/28 15:59:59 ii : unmatched isakmp proposal/transform
14/04/28 15:59:59 ii : cipher type ( 3des != blowfish )
14/04/28 15:59:59 ii : unmatched isakmp proposal/transform
14/04/28 15:59:59 ii : cipher type ( 3des != blowfish )
14/04/28 15:59:59 ii : unmatched isakmp proposal/transform
14/04/28 15:59:59 ii : cipher type ( 3des != blowfish )
14/04/28 15:59:59 ii : matched isakmp proposal #1 transform #13
14/04/28 15:59:59 ii : - transform    = ike
14/04/28 15:59:59 ii : - cipher type  = 3des
14/04/28 15:59:59 ii : - key length   = default
14/04/28 15:59:59 ii : - hash type    = md5
14/04/28 15:59:59 ii : - dh group     = group2 ( modp-1024 )
14/04/28 15:59:59 ii : - auth type    = xauth-initiator-psk
14/04/28 15:59:59 ii : - life seconds = 86400
14/04/28 15:59:59 ii : - life kbytes  = 0
14/04/28 15:59:59 << : key exchange payload
14/04/28 15:59:59 << : nonce payload
14/04/28 15:59:59 << : identification payload
14/04/28 15:59:59 ii : phase1 id target is any
14/04/28 15:59:59 ii : phase1 id match
14/04/28 15:59:59 ii : received = ipv4-host 210.80.199.3
14/04/28 15:59:59 << : hash payload
14/04/28 15:59:59 << : vendor id payload
14/04/28 15:59:59 ii : peer is CISCO UNITY compatible
14/04/28 15:59:59 << : vendor id payload
14/04/28 15:59:59 ii : peer supports XAUTH
14/04/28 15:59:59 << : vendor id payload
14/04/28 15:59:59 ii : peer supports DPDv1
14/04/28 15:59:59 << : vendor id payload
14/04/28 15:59:59 ii : peer supports nat-t ( draft v02 )
14/04/28 15:59:59 << : nat discovery payload
14/04/28 15:59:59 << : nat discovery payload
14/04/28 15:59:59 << : vendor id payload
14/04/28 15:59:59 ii : unknown vendor id ( 20 bytes )
14/04/28 15:59:59 0x : 4048b7d5 6ebce885 25e7de7f 00d6c2d3 c0000000
14/04/28 15:59:59 << : vendor id payload
14/04/28 15:59:59 ii : unknown vendor id ( 16 bytes )
14/04/28 15:59:59 0x : 937d0677 cc716b4e 51bfc445 4b97b578
14/04/28 15:59:59 << : vendor id payload
14/04/28 15:59:59 ii : unknown vendor id ( 16 bytes )
14/04/28 15:59:59 0x : 1f07f70e aa6514d3 b0fa9654 2a500407
14/04/28 15:59:59 ii : nat discovery - local address is translated
14/04/28 15:59:59 ii : switching to src nat-t udp port 4500
14/04/28 15:59:59 ii : switching to dst nat-t udp port 4500
14/04/28 15:59:59 == : DH shared secret ( 128 bytes )
14/04/28 15:59:59 == : SETKEYID ( 16 bytes )
14/04/28 15:59:59 == : SETKEYID_d ( 16 bytes )
14/04/28 15:59:59 == : SETKEYID_a ( 16 bytes )
14/04/28 15:59:59 == : SETKEYID_e ( 16 bytes )
14/04/28 15:59:59 == : cipher key ( 32 bytes )
14/04/28 15:59:59 == : cipher iv ( 8 bytes )
14/04/28 15:59:59 == : phase1 hash_i ( computed ) ( 16 bytes )
14/04/28 15:59:59 >> : hash payload
14/04/28 15:59:59 >> : nat discovery payload
14/04/28 15:59:59 >> : nat discovery payload
14/04/28 15:59:59 >= : cookies f2ca9b8a3be61417:66baa16acc706b4e
14/04/28 15:59:59 >= : message 00000000
14/04/28 15:59:59 >= : encrypt iv ( 8 bytes )
14/04/28 15:59:59 == : encrypt packet ( 88 bytes )
14/04/28 15:59:59 == : stored iv ( 8 bytes )
14/04/28 15:59:59 DB : phase1 resend event canceled ( ref count = 1 )
14/04/28 15:59:59 -> : send NAT-T:IKE packet 192.168.1.102:4500 ->
210.80.199.3:4500 ( 124 bytes )
14/04/28 15:59:59 == : phase1 hash_r ( computed ) ( 16 bytes )
14/04/28 15:59:59 == : phase1 hash_r ( received ) ( 16 bytes )
14/04/28 15:59:59 ii : phase1 sa established
14/04/28 15:59:59 ii : 210.80.199.3:4500 <-> 192.168.1.102:4500
14/04/28 15:59:59 ii : f2ca9b8a3be61417:66baa16acc706b4e
14/04/28 15:59:59 ii : sending peer INITIAL-CONTACT notification
14/04/28 15:59:59 ii : - 192.168.1.102:4500 -> 210.80.199.3:4500
14/04/28 15:59:59 ii : - isakmp spi = f2ca9b8a3be61417:66baa16acc706b4e
14/04/28 15:59:59 ii : - data size 0
14/04/28 15:59:59 >> : hash payload
14/04/28 15:59:59 >> : notification payload
14/04/28 15:59:59 == : new informational hash ( 16 bytes )
14/04/28 15:59:59 == : new informational iv ( 8 bytes )
14/04/28 15:59:59 >= : cookies f2ca9b8a3be61417:66baa16acc706b4e
14/04/28 15:59:59 >= : message 8aa56e26
14/04/28 15:59:59 >= : encrypt iv ( 8 bytes )
14/04/28 15:59:59 == : encrypt packet ( 76 bytes )
14/04/28 15:59:59 == : stored iv ( 8 bytes )
14/04/28 15:59:59 -> : send NAT-T:IKE packet 192.168.1.102:4500 ->
210.80.199.3:4500 ( 108 bytes )
14/04/28 15:59:59 DB : phase2 not found
14/04/28 15:59:59 <- : recv NAT-T:IKE packet 210.80.199.3:4500 ->
192.168.1.102:4500 ( 116 bytes )
14/04/28 15:59:59 DB : phase1 found
14/04/28 15:59:59 ii : processing config packet ( 116 bytes )
14/04/28 15:59:59 DB : config not found
14/04/28 15:59:59 DB : config added ( obj count = 1 )
14/04/28 15:59:59 == : new config iv ( 8 bytes )
14/04/28 15:59:59 =< : cookies f2ca9b8a3be61417:66baa16acc706b4e
14/04/28 15:59:59 =< : message cfc7e7d8
14/04/28 15:59:59 =< : decrypt iv ( 8 bytes )
14/04/28 15:59:59 == : decrypt packet ( 116 bytes )
14/04/28 15:59:59 <= : trimmed packet padding ( 4 bytes )
14/04/28 15:59:59 <= : stored iv ( 8 bytes )
14/04/28 15:59:59 << : hash payload
14/04/28 15:59:59 << : attribute payload
14/04/28 15:59:59 == : configure hash_i ( computed ) ( 16 bytes )
14/04/28 15:59:59 == : configure hash_c ( computed ) ( 16 bytes )
14/04/28 15:59:59 ii : configure hash verified
14/04/28 15:59:59 ii : - xauth authentication type
14/04/28 15:59:59 ii : - xauth username
14/04/28 15:59:59 ww : unhandled xauth attribute 16526
14/04/28 15:59:59 ii : - xauth password
14/04/28 15:59:59 ii : received basic xauth request - Enter Username,
Password and Domain.
14/04/28 15:59:59 ii : - standard xauth username
14/04/28 15:59:59 ii : - standard xauth password
14/04/28 15:59:59 ii : sending xauth response for guido_aversano
14/04/28 15:59:59 >> : hash payload
14/04/28 15:59:59 >> : attribute payload
14/04/28 15:59:59 == : new configure hash ( 16 bytes )
14/04/28 15:59:59 >= : cookies f2ca9b8a3be61417:66baa16acc706b4e
14/04/28 15:59:59 >= : message cfc7e7d8
14/04/28 15:59:59 >= : encrypt iv ( 8 bytes )
14/04/28 15:59:59 == : encrypt packet ( 90 bytes )
14/04/28 15:59:59 == : stored iv ( 8 bytes )
14/04/28 15:59:59 -> : send NAT-T:IKE packet 192.168.1.102:4500 ->
210.80.199.3:4500 ( 124 bytes )
14/04/28 15:59:59 DB : config resend event scheduled ( ref count = 2 )
14/04/28 15:59:59 <- : recv NAT-T:IKE packet 210.80.199.3:4500 ->
192.168.1.102:4500 ( 60 bytes )
14/04/28 15:59:59 DB : phase1 found
14/04/28 15:59:59 ii : processing config packet ( 60 bytes )
14/04/28 15:59:59 DB : config found
14/04/28 15:59:59 == : new config iv ( 8 bytes )
14/04/28 15:59:59 =< : cookies f2ca9b8a3be61417:66baa16acc706b4e
14/04/28 15:59:59 =< : message 45ffb546
14/04/28 15:59:59 =< : decrypt iv ( 8 bytes )
14/04/28 15:59:59 == : decrypt packet ( 60 bytes )
14/04/28 15:59:59 <= : stored iv ( 8 bytes )
14/04/28 15:59:59 << : hash payload
14/04/28 15:59:59 << : attribute payload
14/04/28 15:59:59 == : configure hash_i ( computed ) ( 16 bytes )
14/04/28 15:59:59 == : configure hash_c ( computed ) ( 16 bytes )
14/04/28 15:59:59 ii : configure hash verified
14/04/28 15:59:59 ii : received xauth result -
14/04/28 15:59:59 ii : user guido_aversano authentication succeeded
14/04/28 15:59:59 ii : sending xauth acknowledge
14/04/28 15:59:59 >> : hash payload
14/04/28 15:59:59 >> : attribute payload
14/04/28 15:59:59 == : new configure hash ( 16 bytes )
14/04/28 15:59:59 >= : cookies f2ca9b8a3be61417:66baa16acc706b4e
14/04/28 15:59:59 >= : message 45ffb546
14/04/28 15:59:59 >= : encrypt iv ( 8 bytes )
14/04/28 15:59:59 == : encrypt packet ( 56 bytes )
14/04/28 15:59:59 == : stored iv ( 8 bytes )
14/04/28 15:59:59 DB : config resend event canceled ( ref count = 1 )
14/04/28 15:59:59 -> : send NAT-T:IKE packet 192.168.1.102:4500 ->
210.80.199.3:4500 ( 92 bytes )
14/04/28 15:59:59 DB : config resend event scheduled ( ref count = 2 )
14/04/28 15:59:59 ii : building config attribute list
14/04/28 15:59:59 ii : - IP4 Address
14/04/28 15:59:59 ii : - Address Expiry
14/04/28 15:59:59 ii : - IP4 Netmask
14/04/28 15:59:59 ii : - IP4 DNS Server
14/04/28 15:59:59 ii : - IP4 WINS Server
14/04/28 15:59:59 ii : - DNS Suffix
14/04/28 15:59:59 ii : - IP4 Split Network Include
14/04/28 15:59:59 ii : - IP4 Split Network Exclude
14/04/28 15:59:59 ii : - Login Banner
14/04/28 15:59:59 ii : - PFS Group
14/04/28 15:59:59 ii : - Save Password
14/04/28 15:59:59 ii : - CISCO UDP Port
14/04/28 15:59:59 ii : - Application Version = Cisco Systems VPN
Client 4.8.01.0300:WinNT
14/04/28 15:59:59 ii : - Firewall Type = CISCO-UNKNOWN
14/04/28 15:59:59 == : new config iv ( 8 bytes )
14/04/28 15:59:59 ii : sending config pull request
14/04/28 15:59:59 >> : hash payload
14/04/28 15:59:59 >> : attribute payload
14/04/28 15:59:59 == : new configure hash ( 16 bytes )
14/04/28 15:59:59 >= : cookies f2ca9b8a3be61417:66baa16acc706b4e
14/04/28 15:59:59 >= : message 29c4ea0d
14/04/28 15:59:59 >= : encrypt iv ( 8 bytes )
14/04/28 15:59:59 == : encrypt packet ( 166 bytes )
14/04/28 15:59:59 == : stored iv ( 8 bytes )
14/04/28 15:59:59 DB : config resend event canceled ( ref count = 1 )
14/04/28 15:59:59 -> : send NAT-T:IKE packet 192.168.1.102:4500 ->
210.80.199.3:4500 ( 204 bytes )
14/04/28 15:59:59 DB : config resend event scheduled ( ref count = 2 )
14/04/28 16:00:00 <- : recv NAT-T:IKE packet 210.80.199.3:4500 ->
192.168.1.102:4500 ( 308 bytes )
14/04/28 16:00:00 DB : phase1 found
14/04/28 16:00:00 ii : processing config packet ( 308 bytes )
14/04/28 16:00:00 DB : config found
14/04/28 16:00:00 =< : cookies f2ca9b8a3be61417:66baa16acc706b4e
14/04/28 16:00:00 =< : message 29c4ea0d
14/04/28 16:00:00 =< : decrypt iv ( 8 bytes )
14/04/28 16:00:00 == : decrypt packet ( 308 bytes )
14/04/28 16:00:00 <= : stored iv ( 8 bytes )
14/04/28 16:00:00 << : hash payload
14/04/28 16:00:00 << : attribute payload
14/04/28 16:00:00 == : configure hash_i ( computed ) ( 16 bytes )
14/04/28 16:00:00 == : configure hash_c ( computed ) ( 16 bytes )
14/04/28 16:00:00 ii : configure hash verified
14/04/28 16:00:00 ii : received config pull response
14/04/28 16:00:00 ii : - IP4 Address = 10.120.2.101
14/04/28 16:00:00 ii : - IP4 Netmask = 255.255.255.0
14/04/28 16:00:00 ii : - IP4 DNS Server = 10.1.4.201
14/04/28 16:00:00 ii : - IP4 DNS Server = 10.1.4.202
14/04/28 16:00:00 ii : - IP4 WINS Server = 10.1.4.201
14/04/28 16:00:00 ii : - Save Password = 0
14/04/28 16:00:00 ii : - IP4 Split Network Include = ANY:10.0.0.0/8:*
14/04/28 16:00:00 ii : - IP4 Split Network Include = ANY:192.168.90.0/24:*
14/04/28 16:00:00 ii : - IP4 Split Network Include = ANY:172.16.30.0/24:*
14/04/28 16:00:00 ii : - IP4 Split Network Include = ANY:192.168.3.0/24:*
14/04/28 16:00:00 ii : - IP4 Split Network Include = ANY:205.197.192.150/32:*
14/04/28 16:00:00 ii : - IP4 Split Network Include = ANY:205.197.192.151/32:*
14/04/28 16:00:00 ii : - DNS Suffix = nuance.com
14/04/28 16:00:00 ii : - PFS Group = 0
14/04/28 16:00:00 ii : - Application Version = Cisco Systems, Inc./VPN
3000 Concentrator Version 4.7.2.P built by vmurphy on Jul 30 2008
17:39:30
14/04/28 16:00:00 DB : config resend event canceled ( ref count = 1 )
14/04/28 16:00:00 ii : enabled adapter ROOT\VNET\0000
14/04/28 16:00:00 ii : adapter ROOT\VNET\0000 unavailable, retrying ...
14/04/28 16:00:02 ii : apapter ROOT\VNET\0000 MTU is 1380
14/04/28 16:00:02 ii : generating IPSEC security policies at REQUIRE level
14/04/28 16:00:02 ii : creating NONE INBOUND policy ANY:210.80.199.3:*
-> ANY:192.168.1.102:*
14/04/28 16:00:02 DB : policy added ( obj count = 1 )
14/04/28 16:00:02 K> : send pfkey X_SPDADD UNSPEC message
14/04/28 16:00:02 ii : creating NONE OUTBOUND policy
ANY:192.168.1.102:* -> ANY:210.80.199.3:*
14/04/28 16:00:02 K< : recv pfkey X_SPDADD UNSPEC message
14/04/28 16:00:02 DB : policy found
14/04/28 16:00:02 ii : created NONE policy route for 210.80.199.3/32
14/04/28 16:00:02 DB : policy added ( obj count = 2 )
14/04/28 16:00:02 K> : send pfkey X_SPDADD UNSPEC message
14/04/28 16:00:02 K< : recv pfkey X_SPDADD UNSPEC message
14/04/28 16:00:02 DB : policy found
14/04/28 16:00:02 ii : creating NONE INBOUND policy ANY:192.168.1.1:*
-> ANY:10.120.2.101:*
14/04/28 16:00:02 DB : policy added ( obj count = 3 )
14/04/28 16:00:02 K> : send pfkey X_SPDADD UNSPEC message
14/04/28 16:00:02 ii : creating NONE OUTBOUND policy
ANY:10.120.2.101:* -> ANY:192.168.1.1:*
14/04/28 16:00:02 DB : policy added ( obj count = 4 )
14/04/28 16:00:02 K> : send pfkey X_SPDADD UNSPEC message
14/04/28 16:00:02 ii : creating IPSEC INBOUND policy ANY:10.0.0.0/8:*
-> ANY:10.120.2.101:*
14/04/28 16:00:02 K< : recv pfkey X_SPDADD UNSPEC message
14/04/28 16:00:02 DB : policy added ( obj count = 5 )
14/04/28 16:00:02 DB : policy found
14/04/28 16:00:02 K> : send pfkey X_SPDADD UNSPEC message
14/04/28 16:00:02 K< : recv pfkey X_SPDADD UNSPEC message
14/04/28 16:00:02 DB : policy found
14/04/28 16:00:02 ii : creating IPSEC OUTBOUND policy
ANY:10.120.2.101:* -> ANY:10.0.0.0/8:*
14/04/28 16:00:02 K< : recv pfkey X_SPDADD UNSPEC message
14/04/28 16:00:02 DB : policy found
14/04/28 16:00:02 ii : created IPSEC policy route for 10.0.0.0/8
14/04/28 16:00:02 DB : policy added ( obj count = 6 )
14/04/28 16:00:02 K> : send pfkey X_SPDADD UNSPEC message
14/04/28 16:00:02 ii : creating IPSEC INBOUND policy
ANY:192.168.90.0/24:* -> ANY:10.120.2.101:*
14/04/28 16:00:02 DB : policy added ( obj count = 7 )
14/04/28 16:00:02 K> : send pfkey X_SPDADD UNSPEC message
14/04/28 16:00:02 ii : creating IPSEC OUTBOUND policy
ANY:10.120.2.101:* -> ANY:192.168.90.0/24:*
14/04/28 16:00:02 K< : recv pfkey X_SPDADD UNSPEC message
14/04/28 16:00:02 DB : policy found
14/04/28 16:00:02 ii : calling init phase2 for initial policy
14/04/28 16:00:02 DB : policy found
14/04/28 16:00:02 DB : policy found
14/04/28 16:00:02 DB : tunnel found
14/04/28 16:00:02 DB : new phase2 ( IPSEC initiator )
14/04/28 16:00:02 DB : phase2 added ( obj count = 1 )
14/04/28 16:00:02 K> : send pfkey GETSPI ESP message
14/04/28 16:00:02 K< : recv pfkey X_SPDADD UNSPEC message
14/04/28 16:00:02 DB : policy found
14/04/28 16:00:02 K< : recv pfkey GETSPI ESP message
14/04/28 16:00:02 DB : phase2 found
14/04/28 16:00:02 ii : updated spi for 1 ipsec-esp proposal
14/04/28 16:00:02 DB : phase1 found
14/04/28 16:00:02 >> : hash payload
14/04/28 16:00:02 >> : security association payload
14/04/28 16:00:02 >> : - proposal #1 payload
14/04/28 16:00:02 >> : -- transform #1 payload
14/04/28 16:00:02 >> : -- transform #2 payload
14/04/28 16:00:02 >> : -- transform #3 payload
14/04/28 16:00:02 >> : -- transform #4 payload
14/04/28 16:00:02 >> : -- transform #5 payload
14/04/28 16:00:02 >> : -- transform #6 payload
14/04/28 16:00:02 >> : -- transform #7 payload
14/04/28 16:00:02 >> : -- transform #8 payload
14/04/28 16:00:02 >> : -- transform #9 payload
14/04/28 16:00:02 >> : -- transform #10 payload
14/04/28 16:00:02 >> : -- transform #11 payload
14/04/28 16:00:02 >> : -- transform #12 payload
14/04/28 16:00:02 >> : -- transform #13 payload
14/04/28 16:00:02 >> : -- transform #14 payload
14/04/28 16:00:02 >> : -- transform #15 payload
14/04/28 16:00:02 >> : -- transform #16 payload
14/04/28 16:00:02 >> : -- transform #17 payload
14/04/28 16:00:02 >> : -- transform #18 payload
14/04/28 16:00:02 >> : -- transform #19 payload
14/04/28 16:00:02 >> : -- transform #20 payload
14/04/28 16:00:02 >> : -- transform #21 payload
14/04/28 16:00:02 >> : -- transform #22 payload
14/04/28 16:00:02 >> : -- transform #23 payload
14/04/28 16:00:02 >> : -- transform #24 payload
14/04/28 16:00:02 >> : -- transform #25 payload
14/04/28 16:00:02 >> : -- transform #26 payload
14/04/28 16:00:02 >> : -- transform #27 payload
14/04/28 16:00:02 >> : -- transform #28 payload
14/04/28 16:00:02 >> : -- transform #29 payload
14/04/28 16:00:02 >> : -- transform #30 payload
14/04/28 16:00:02 >> : -- transform #31 payload
14/04/28 16:00:02 >> : -- transform #32 payload
14/04/28 16:00:02 >> : -- transform #33 payload
14/04/28 16:00:02 >> : -- transform #34 payload
14/04/28 16:00:02 >> : -- transform #35 payload
14/04/28 16:00:02 >> : -- transform #36 payload
14/04/28 16:00:02 >> : -- transform #37 payload
14/04/28 16:00:02 >> : -- transform #38 payload
14/04/28 16:00:02 >> : -- transform #39 payload
14/04/28 16:00:02 >> : -- transform #40 payload
14/04/28 16:00:02 >> : -- transform #41 payload
14/04/28 16:00:02 >> : -- transform #42 payload
14/04/28 16:00:02 >> : -- transform #43 payload
14/04/28 16:00:02 >> : -- transform #44 payload
14/04/28 16:00:02 >> : -- transform #45 payload
14/04/28 16:00:02 >> : nonce payload
14/04/28 16:00:02 >> : identification payload
14/04/28 16:00:02 >> : identification payload
14/04/28 16:00:02 == : phase2 hash_i ( input ) ( 1460 bytes )
14/04/28 16:00:02 == : phase2 hash_i ( computed ) ( 16 bytes )
14/04/28 16:00:02 == : new phase2 iv ( 8 bytes )
14/04/28 16:00:02 >= : cookies f2ca9b8a3be61417:66baa16acc706b4e
14/04/28 16:00:02 >= : message a3498adf
14/04/28 16:00:02 >= : encrypt iv ( 8 bytes )
14/04/28 16:00:02 == : encrypt packet ( 1504 bytes )
14/04/28 16:00:02 == : stored iv ( 8 bytes )
14/04/28 16:00:02 -> : send NAT-T:IKE packet 192.168.1.102:4500 ->
210.80.199.3:4500 ( 1540 bytes )
14/04/28 16:00:02 ii : fragmented packet to 1514 bytes ( MTU 1500 bytes )
14/04/28 16:00:02 ii : fragmented packet to 74 bytes ( MTU 1500 bytes )
14/04/28 16:00:02 DB : phase2 resend event scheduled ( ref count = 2 )
14/04/28 16:00:02 ii : created IPSEC policy route for 192.168.90.0/24
14/04/28 16:00:02 DB : policy added ( obj count = 8 )
14/04/28 16:00:02 K> : send pfkey X_SPDADD UNSPEC message
14/04/28 16:00:02 ii : creating IPSEC INBOUND policy
ANY:172.16.30.0/24:* -> ANY:10.120.2.101:*
14/04/28 16:00:02 DB : policy added ( obj count = 9 )
14/04/28 16:00:02 K> : send pfkey X_SPDADD UNSPEC message
14/04/28 16:00:02 ii : creating IPSEC OUTBOUND policy
ANY:10.120.2.101:* -> ANY:172.16.30.0/24:*
14/04/28 16:00:02 K< : recv pfkey X_SPDADD UNSPEC message
14/04/28 16:00:02 DB : policy found
14/04/28 16:00:02 K< : recv pfkey X_SPDADD UNSPEC message
14/04/28 16:00:02 DB : policy found
14/04/28 16:00:02 ii : created IPSEC policy route for 172.16.30.0/24
14/04/28 16:00:02 DB : policy added ( obj count = 10 )
14/04/28 16:00:02 K> : send pfkey X_SPDADD UNSPEC message
14/04/28 16:00:02 ii : creating IPSEC INBOUND policy
ANY:192.168.3.0/24:* -> ANY:10.120.2.101:*
14/04/28 16:00:02 DB : policy added ( obj count = 11 )
14/04/28 16:00:02 K> : send pfkey X_SPDADD UNSPEC message
14/04/28 16:00:02 ii : creating IPSEC OUTBOUND policy
ANY:10.120.2.101:* -> ANY:192.168.3.0/24:*
14/04/28 16:00:02 K< : recv pfkey X_SPDADD UNSPEC message
14/04/28 16:00:02 DB : policy found
14/04/28 16:00:02 K< : recv pfkey X_SPDADD UNSPEC message
14/04/28 16:00:02 DB : policy found
14/04/28 16:00:02 ii : created IPSEC policy route for 192.168.3.0/24
14/04/28 16:00:02 DB : policy added ( obj count = 12 )
14/04/28 16:00:02 K> : send pfkey X_SPDADD UNSPEC message
14/04/28 16:00:02 ii : creating IPSEC INBOUND policy
ANY:205.197.192.150/32:* -> ANY:10.120.2.101:*
14/04/28 16:00:02 DB : policy added ( obj count = 13 )
14/04/28 16:00:02 K> : send pfkey X_SPDADD UNSPEC message
14/04/28 16:00:02 K< : recv pfkey X_SPDADD UNSPEC message
14/04/28 16:00:02 DB : policy found
14/04/28 16:00:02 K< : recv pfkey X_SPDADD UNSPEC message
14/04/28 16:00:02 DB : policy found
14/04/28 16:00:02 ii : creating IPSEC OUTBOUND policy
ANY:10.120.2.101:* -> ANY:205.197.192.150/32:*
14/04/28 16:00:02 ii : created IPSEC policy route for 205.197.192.150/32
14/04/28 16:00:02 DB : policy added ( obj count = 14 )
14/04/28 16:00:02 K> : send pfkey X_SPDADD UNSPEC message
14/04/28 16:00:02 K< : recv pfkey X_SPDADD UNSPEC message
14/04/28 16:00:02 DB : policy found
14/04/28 16:00:02 ii : creating IPSEC INBOUND policy
ANY:205.197.192.151/32:* -> ANY:10.120.2.101:*
14/04/28 16:00:02 DB : policy added ( obj count = 15 )
14/04/28 16:00:02 K> : send pfkey X_SPDADD UNSPEC message
14/04/28 16:00:02 K< : recv pfkey X_SPDADD UNSPEC message
14/04/28 16:00:02 DB : policy found
14/04/28 16:00:02 ii : creating IPSEC OUTBOUND policy
ANY:10.120.2.101:* -> ANY:205.197.192.151/32:*
14/04/28 16:00:02 ii : created IPSEC policy route for 205.197.192.151/32
14/04/28 16:00:02 DB : policy added ( obj count = 16 )
14/04/28 16:00:02 K> : send pfkey X_SPDADD UNSPEC message
14/04/28 16:00:02 K< : recv pfkey X_SPDADD UNSPEC message
14/04/28 16:00:02 DB : policy found
14/04/28 16:00:02 ii : split DNS is disabled
14/04/28 16:00:05 K< : recv pfkey ACQUIRE UNSPEC message
14/04/28 16:00:05 DB : policy found
14/04/28 16:00:05 DB : policy found
14/04/28 16:00:05 DB : tunnel found
14/04/28 16:00:05 DB : new phase2 ( IPSEC initiator )
14/04/28 16:00:05 DB : phase2 added ( obj count = 2 )
14/04/28 16:00:05 K> : send pfkey GETSPI ESP message
14/04/28 16:00:05 K< : recv pfkey GETSPI ESP message
14/04/28 16:00:05 DB : phase2 found
14/04/28 16:00:05 ii : updated spi for 1 ipsec-esp proposal
14/04/28 16:00:05 DB : phase1 found
14/04/28 16:00:05 >> : hash payload
14/04/28 16:00:05 >> : security association payload
14/04/28 16:00:05 >> : - proposal #1 payload
14/04/28 16:00:05 >> : -- transform #1 payload
14/04/28 16:00:05 >> : -- transform #2 payload
14/04/28 16:00:05 >> : -- transform #3 payload
14/04/28 16:00:05 >> : -- transform #4 payload
14/04/28 16:00:05 >> : -- transform #5 payload
14/04/28 16:00:05 >> : -- transform #6 payload
14/04/28 16:00:05 >> : -- transform #7 payload
14/04/28 16:00:05 >> : -- transform #8 payload
14/04/28 16:00:05 >> : -- transform #9 payload
14/04/28 16:00:05 >> : -- transform #10 payload
14/04/28 16:00:05 >> : -- transform #11 payload
14/04/28 16:00:05 >> : -- transform #12 payload
14/04/28 16:00:05 >> : -- transform #13 payload
14/04/28 16:00:05 >> : -- transform #14 payload
14/04/28 16:00:05 >> : -- transform #15 payload
14/04/28 16:00:05 >> : -- transform #16 payload
14/04/28 16:00:05 >> : -- transform #17 payload
14/04/28 16:00:05 >> : -- transform #18 payload
14/04/28 16:00:05 >> : -- transform #19 payload
14/04/28 16:00:05 >> : -- transform #20 payload
14/04/28 16:00:05 >> : -- transform #21 payload
14/04/28 16:00:05 >> : -- transform #22 payload
14/04/28 16:00:05 >> : -- transform #23 payload
14/04/28 16:00:05 >> : -- transform #24 payload
14/04/28 16:00:05 >> : -- transform #25 payload
14/04/28 16:00:05 >> : -- transform #26 payload
14/04/28 16:00:05 >> : -- transform #27 payload
14/04/28 16:00:05 >> : -- transform #28 payload
14/04/28 16:00:05 >> : -- transform #29 payload
14/04/28 16:00:05 >> : -- transform #30 payload
14/04/28 16:00:05 >> : -- transform #31 payload
14/04/28 16:00:05 >> : -- transform #32 payload
14/04/28 16:00:05 >> : -- transform #33 payload
14/04/28 16:00:05 >> : -- transform #34 payload
14/04/28 16:00:05 >> : -- transform #35 payload
14/04/28 16:00:05 >> : -- transform #36 payload
14/04/28 16:00:05 >> : -- transform #37 payload
14/04/28 16:00:05 >> : -- transform #38 payload
14/04/28 16:00:05 >> : -- transform #39 payload
14/04/28 16:00:05 >> : -- transform #40 payload
14/04/28 16:00:05 >> : -- transform #41 payload
14/04/28 16:00:05 >> : -- transform #42 payload
14/04/28 16:00:05 >> : -- transform #43 payload
14/04/28 16:00:05 >> : -- transform #44 payload
14/04/28 16:00:05 >> : -- transform #45 payload
14/04/28 16:00:05 >> : nonce payload
14/04/28 16:00:05 >> : identification payload
14/04/28 16:00:05 >> : identification payload
14/04/28 16:00:05 == : phase2 hash_i ( input ) ( 1460 bytes )
14/04/28 16:00:05 == : phase2 hash_i ( computed ) ( 16 bytes )
14/04/28 16:00:05 == : new phase2 iv ( 8 bytes )
14/04/28 16:00:05 >= : cookies f2ca9b8a3be61417:66baa16acc706b4e
14/04/28 16:00:05 >= : message 7ffd9cd3
14/04/28 16:00:05 >= : encrypt iv ( 8 bytes )
14/04/28 16:00:05 == : encrypt packet ( 1504 bytes )
14/04/28 16:00:05 == : stored iv ( 8 bytes )
14/04/28 16:00:05 -> : send NAT-T:IKE packet 192.168.1.102:4500 ->
210.80.199.3:4500 ( 1540 bytes )
14/04/28 16:00:05 ii : fragmented packet to 1514 bytes ( MTU 1500 bytes )
14/04/28 16:00:05 ii : fragmented packet to 74 bytes ( MTU 1500 bytes )
14/04/28 16:00:05 DB : phase2 resend event scheduled ( ref count = 2 )
14/04/28 16:00:07 ii : fragmented packet to 1514 bytes ( MTU 1500 bytes )
14/04/28 16:00:07 ii : fragmented packet to 74 bytes ( MTU 1500 bytes )
14/04/28 16:00:07 -> : resend 1 phase2 packet(s) [0/2]
192.168.1.102:4500 -> 210.80.199.3:4500
14/04/28 16:00:08 <- : recv NAT-T:IKE packet 210.80.199.3:4500 ->
192.168.1.102:4500 ( 308 bytes )
14/04/28 16:00:08 DB : phase1 found
14/04/28 16:00:08 ii : processing config packet ( 308 bytes )
14/04/28 16:00:08 DB : config found
14/04/28 16:00:08 !! : config packet ignored ( config already mature )
14/04/28 16:00:10 ii : fragmented packet to 1514 bytes ( MTU 1500 bytes )
14/04/28 16:00:10 ii : fragmented packet to 74 bytes ( MTU 1500 bytes )
14/04/28 16:00:10 -> : resend 1 phase2 packet(s) [0/2]
192.168.1.102:4500 -> 210.80.199.3:4500
14/04/28 16:00:12 ii : fragmented packet to 1514 bytes ( MTU 1500 bytes )
14/04/28 16:00:12 ii : fragmented packet to 74 bytes ( MTU 1500 bytes )
14/04/28 16:00:12 -> : resend 1 phase2 packet(s) [1/2]
192.168.1.102:4500 -> 210.80.199.3:4500
14/04/28 16:00:14 DB : phase1 found
14/04/28 16:00:14 ii : sending peer DPDV1-R-U-THERE notification
14/04/28 16:00:14 ii : - 192.168.1.102:4500 -> 210.80.199.3:4500
14/04/28 16:00:14 ii : - isakmp spi = f2ca9b8a3be61417:66baa16acc706b4e
14/04/28 16:00:14 ii : - data size 4
14/04/28 16:00:14 >> : hash payload
14/04/28 16:00:14 >> : notification payload
14/04/28 16:00:14 == : new informational hash ( 16 bytes )
14/04/28 16:00:14 == : new informational iv ( 8 bytes )
14/04/28 16:00:14 >= : cookies f2ca9b8a3be61417:66baa16acc706b4e
14/04/28 16:00:14 >= : message 143c4c80
14/04/28 16:00:14 >= : encrypt iv ( 8 bytes )
14/04/28 16:00:14 == : encrypt packet ( 80 bytes )
14/04/28 16:00:14 == : stored iv ( 8 bytes )
14/04/28 16:00:14 -> : send NAT-T:IKE packet 192.168.1.102:4500 ->
210.80.199.3:4500 ( 116 bytes )
14/04/28 16:00:14 ii : DPD ARE-YOU-THERE sequence 1581dc7a requested
14/04/28 16:00:14 DB : phase1 found
14/04/28 16:00:14 -> : send NAT-T:KEEP-ALIVE packet 192.168.1.102:4500
-> 210.80.199.3:4500
14/04/28 16:00:15 ii : fragmented packet to 1514 bytes ( MTU 1500 bytes )
14/04/28 16:00:15 ii : fragmented packet to 74 bytes ( MTU 1500 bytes )
14/04/28 16:00:15 -> : resend 1 phase2 packet(s) [1/2]
192.168.1.102:4500 -> 210.80.199.3:4500
14/04/28 16:00:16 <- : recv NAT-T:IKE packet 210.80.199.3:4500 ->
192.168.1.102:4500 ( 308 bytes )
14/04/28 16:00:16 DB : phase1 found
14/04/28 16:00:16 ii : processing config packet ( 308 bytes )
14/04/28 16:00:16 DB : config found
14/04/28 16:00:16 !! : config packet ignored ( config already mature )
14/04/28 16:00:17 ii : fragmented packet to 1514 bytes ( MTU 1500 bytes )
14/04/28 16:00:17 ii : fragmented packet to 74 bytes ( MTU 1500 bytes )
14/04/28 16:00:17 -> : resend 1 phase2 packet(s) [2/2]
192.168.1.102:4500 -> 210.80.199.3:4500
14/04/28 16:00:20 ii : fragmented packet to 1514 bytes ( MTU 1500 bytes )
14/04/28 16:00:20 ii : fragmented packet to 74 bytes ( MTU 1500 bytes )
14/04/28 16:00:20 -> : resend 1 phase2 packet(s) [2/2]
192.168.1.102:4500 -> 210.80.199.3:4500
14/04/28 16:00:22 ii : resend limit exceeded for phase2 exchange
14/04/28 16:00:22 ii : phase2 removal before expire time
14/04/28 16:00:22 DB : phase2 deleted ( obj count = 1 )
14/04/28 16:00:22 K< : recv pfkey ACQUIRE UNSPEC message
14/04/28 16:00:22 DB : policy found
14/04/28 16:00:22 DB : policy found
14/04/28 16:00:22 DB : tunnel found
14/04/28 16:00:22 DB : new phase2 ( IPSEC initiator )
14/04/28 16:00:22 DB : phase2 added ( obj count = 2 )
14/04/28 16:00:22 K> : send pfkey GETSPI ESP message
14/04/28 16:00:22 K< : recv pfkey GETSPI ESP message
14/04/28 16:00:22 DB : phase2 found
14/04/28 16:00:22 ii : updated spi for 1 ipsec-esp proposal
14/04/28 16:00:22 DB : phase1 found
14/04/28 16:00:22 >> : hash payload
14/04/28 16:00:22 >> : security association payload
14/04/28 16:00:22 >> : - proposal #1 payload
14/04/28 16:00:22 >> : -- transform #1 payload
14/04/28 16:00:22 >> : -- transform #2 payload
14/04/28 16:00:22 >> : -- transform #3 payload
14/04/28 16:00:22 >> : -- transform #4 payload
14/04/28 16:00:22 >> : -- transform #5 payload
14/04/28 16:00:22 >> : -- transform #6 payload
14/04/28 16:00:22 >> : -- transform #7 payload
14/04/28 16:00:22 >> : -- transform #8 payload
14/04/28 16:00:22 >> : -- transform #9 payload
14/04/28 16:00:22 >> : -- transform #10 payload
14/04/28 16:00:22 >> : -- transform #11 payload
14/04/28 16:00:22 >> : -- transform #12 payload
14/04/28 16:00:22 >> : -- transform #13 payload
14/04/28 16:00:22 >> : -- transform #14 payload
14/04/28 16:00:22 >> : -- transform #15 payload
14/04/28 16:00:22 >> : -- transform #16 payload
14/04/28 16:00:22 >> : -- transform #17 payload
14/04/28 16:00:22 >> : -- transform #18 payload
14/04/28 16:00:22 >> : -- transform #19 payload
14/04/28 16:00:22 >> : -- transform #20 payload
14/04/28 16:00:22 >> : -- transform #21 payload
14/04/28 16:00:22 >> : -- transform #22 payload
14/04/28 16:00:22 >> : -- transform #23 payload
14/04/28 16:00:22 >> : -- transform #24 payload
14/04/28 16:00:22 >> : -- transform #25 payload
14/04/28 16:00:22 >> : -- transform #26 payload
14/04/28 16:00:22 >> : -- transform #27 payload
14/04/28 16:00:22 >> : -- transform #28 payload
14/04/28 16:00:22 >> : -- transform #29 payload
14/04/28 16:00:22 >> : -- transform #30 payload
14/04/28 16:00:22 >> : -- transform #31 payload
14/04/28 16:00:22 >> : -- transform #32 payload
14/04/28 16:00:22 >> : -- transform #33 payload
14/04/28 16:00:22 >> : -- transform #34 payload
14/04/28 16:00:22 >> : -- transform #35 payload
14/04/28 16:00:22 >> : -- transform #36 payload
14/04/28 16:00:22 >> : -- transform #37 payload
14/04/28 16:00:22 >> : -- transform #38 payload
14/04/28 16:00:22 >> : -- transform #39 payload
14/04/28 16:00:22 >> : -- transform #40 payload
14/04/28 16:00:22 >> : -- transform #41 payload
14/04/28 16:00:22 >> : -- transform #42 payload
14/04/28 16:00:22 >> : -- transform #43 payload
14/04/28 16:00:22 >> : -- transform #44 payload
14/04/28 16:00:22 >> : -- transform #45 payload
14/04/28 16:00:22 >> : nonce payload
14/04/28 16:00:22 >> : identification payload
14/04/28 16:00:22 >> : identification payload
14/04/28 16:00:22 == : phase2 hash_i ( input ) ( 1460 bytes )
14/04/28 16:00:22 == : phase2 hash_i ( computed ) ( 16 bytes )
14/04/28 16:00:22 == : new phase2 iv ( 8 bytes )
14/04/28 16:00:22 >= : cookies f2ca9b8a3be61417:66baa16acc706b4e
14/04/28 16:00:22 >= : message 7170df70
14/04/28 16:00:22 >= : encrypt iv ( 8 bytes )
14/04/28 16:00:22 == : encrypt packet ( 1504 bytes )
14/04/28 16:00:22 == : stored iv ( 8 bytes )
14/04/28 16:00:22 -> : send NAT-T:IKE packet 192.168.1.102:4500 ->
210.80.199.3:4500 ( 1540 bytes )
14/04/28 16:00:22 ii : fragmented packet to 1514 bytes ( MTU 1500 bytes )
14/04/28 16:00:22 ii : fragmented packet to 74 bytes ( MTU 1500 bytes )
14/04/28 16:00:22 DB : phase2 resend event scheduled ( ref count = 2 )
14/04/28 16:00:24 <- : recv NAT-T:IKE packet 210.80.199.3:4500 ->
192.168.1.102:4500 ( 308 bytes )
14/04/28 16:00:24 DB : phase1 found
14/04/28 16:00:24 ii : processing config packet ( 308 bytes )
14/04/28 16:00:24 DB : config found
14/04/28 16:00:24 !! : config packet ignored ( config already mature )
14/04/28 16:00:25 ii : resend limit exceeded for phase2 exchange
14/04/28 16:00:25 ii : phase2 removal before expire time
14/04/28 16:00:25 DB : phase2 deleted ( obj count = 1 )
14/04/28 16:00:27 ii : fragmented packet to 1514 bytes ( MTU 1500 bytes )
14/04/28 16:00:27 ii : fragmented packet to 74 bytes ( MTU 1500 bytes )
14/04/28 16:00:27 -> : resend 1 phase2 packet(s) [0/2]
192.168.1.102:4500 -> 210.80.199.3:4500
14/04/28 16:00:29 DB : phase1 found
14/04/28 16:00:29 -> : send NAT-T:KEEP-ALIVE packet 192.168.1.102:4500
-> 210.80.199.3:4500
14/04/28 16:00:29 DB : phase1 found
14/04/28 16:00:29 ii : next tunnel DPD retry in 4 secs for peer
210.80.199.3:4500
14/04/28 16:00:29 ii : sending peer DPDV1-R-U-THERE notification
14/04/28 16:00:29 ii : - 192.168.1.102:4500 -> 210.80.199.3:4500
14/04/28 16:00:29 ii : - isakmp spi = f2ca9b8a3be61417:66baa16acc706b4e
14/04/28 16:00:29 ii : - data size 4
14/04/28 16:00:29 >> : hash payload
14/04/28 16:00:29 >> : notification payload
14/04/28 16:00:29 == : new informational hash ( 16 bytes )
14/04/28 16:00:29 == : new informational iv ( 8 bytes )
14/04/28 16:00:29 >= : cookies f2ca9b8a3be61417:66baa16acc706b4e
14/04/28 16:00:29 >= : message b17fcbee
14/04/28 16:00:29 >= : encrypt iv ( 8 bytes )
14/04/28 16:00:29 == : encrypt packet ( 80 bytes )
14/04/28 16:00:29 == : stored iv ( 8 bytes )
14/04/28 16:00:29 -> : send NAT-T:IKE packet 192.168.1.102:4500 ->
210.80.199.3:4500 ( 116 bytes )
14/04/28 16:00:29 ii : DPD ARE-YOU-THERE sequence 1581dc7b requested
14/04/28 16:00:32 ii : fragmented packet to 1514 bytes ( MTU 1500 bytes )
14/04/28 16:00:32 ii : fragmented packet to 74 bytes ( MTU 1500 bytes )
14/04/28 16:00:32 -> : resend 1 phase2 packet(s) [1/2]
192.168.1.102:4500 -> 210.80.199.3:4500
14/04/28 16:00:32 <- : recv NAT-T:IKE packet 210.80.199.3:4500 ->
192.168.1.102:4500 ( 76 bytes )
14/04/28 16:00:32 DB : phase1 found
14/04/28 16:00:32 ii : processing informational packet ( 76 bytes )
14/04/28 16:00:32 == : new informational iv ( 8 bytes )
14/04/28 16:00:32 =< : cookies f2ca9b8a3be61417:66baa16acc706b4e
14/04/28 16:00:32 =< : message 42436f17
14/04/28 16:00:32 =< : decrypt iv ( 8 bytes )
14/04/28 16:00:32 == : decrypt packet ( 76 bytes )
14/04/28 16:00:32 <= : stored iv ( 8 bytes )
14/04/28 16:00:32 << : hash payload
14/04/28 16:00:32 << : delete payload
14/04/28 16:00:32 == : informational hash_i ( computed ) ( 16 bytes )
14/04/28 16:00:32 == : informational hash_c ( received ) ( 16 bytes )
14/04/28 16:00:32 ii : informational hash verified
14/04/28 16:00:32 ii : received peer DELETE message
14/04/28 16:00:32 ii : - 210.80.199.3:4500 -> 192.168.1.102:4500
14/04/28 16:00:32 ii : - isakmp spi = f2ca9b8a3be61417:66baa16acc706b4e
14/04/28 16:00:32 DB : phase1 found
14/04/28 16:00:32 ii : cleanup, marked phase1
f2ca9b8a3be61417:66baa16acc706b4e for removal
14/04/28 16:00:32 DB : phase1 soft event canceled ( ref count = 4 )
14/04/28 16:00:32 DB : phase1 hard event canceled ( ref count = 3 )
14/04/28 16:00:32 DB : phase1 dead event canceled ( ref count = 2 )
14/04/28 16:00:32 DB : config deleted ( obj count = 0 )
14/04/28 16:00:32 ii : phase1 removal before expire time
14/04/28 16:00:32 DB : phase1 not found
14/04/28 16:00:32 DB : phase1 deleted ( obj count = 0 )
14/04/28 16:00:32 DB : policy found
14/04/28 16:00:32 ii : removing IPSEC INBOUND policy ANY:10.0.0.0/8:*
-> ANY:10.120.2.101:*
14/04/28 16:00:32 K> : send pfkey X_SPDDELETE2 UNSPEC message
14/04/28 16:00:32 DB : policy found
14/04/28 16:00:32 ii : removing IPSEC OUTBOUND policy
ANY:10.120.2.101:* -> ANY:10.0.0.0/8:*
14/04/28 16:00:32 K> : send pfkey X_SPDDELETE2 UNSPEC message
14/04/28 16:00:32 K< : recv pfkey X_SPDDELETE2 UNSPEC message
14/04/28 16:00:32 ii : removed IPSEC policy route for ANY:10.0.0.0/8:*
14/04/28 16:00:32 DB : policy found
14/04/28 16:00:32 ii : removing IPSEC INBOUND policy
ANY:192.168.90.0/24:* -> ANY:10.120.2.101:*
14/04/28 16:00:32 K> : send pfkey X_SPDDELETE2 UNSPEC message
14/04/28 16:00:32 DB : policy found
14/04/28 16:00:32 ii : removing IPSEC OUTBOUND policy
ANY:10.120.2.101:* -> ANY:192.168.90.0/24:*
14/04/28 16:00:32 K> : send pfkey X_SPDDELETE2 UNSPEC message
14/04/28 16:00:32 ii : removed IPSEC policy route for ANY:192.168.90.0/24:*
14/04/28 16:00:32 DB : policy found
14/04/28 16:00:32 ii : removing IPSEC INBOUND policy
ANY:172.16.30.0/24:* -> ANY:10.120.2.101:*
14/04/28 16:00:32 K> : send pfkey X_SPDDELETE2 UNSPEC message
14/04/28 16:00:32 DB : policy found
14/04/28 16:00:32 ii : removing IPSEC OUTBOUND policy
ANY:10.120.2.101:* -> ANY:172.16.30.0/24:*
14/04/28 16:00:32 K> : send pfkey X_SPDDELETE2 UNSPEC message
14/04/28 16:00:32 ii : removed IPSEC policy route for ANY:172.16.30.0/24:*
14/04/28 16:00:32 DB : policy found
14/04/28 16:00:32 ii : removing IPSEC INBOUND policy
ANY:192.168.3.0/24:* -> ANY:10.120.2.101:*
14/04/28 16:00:32 K> : send pfkey X_SPDDELETE2 UNSPEC message
14/04/28 16:00:32 DB : policy found
14/04/28 16:00:32 ii : removing IPSEC OUTBOUND policy
ANY:10.120.2.101:* -> ANY:192.168.3.0/24:*
14/04/28 16:00:32 K> : send pfkey X_SPDDELETE2 UNSPEC message
14/04/28 16:00:32 ii : removed IPSEC policy route for ANY:192.168.3.0/24:*
14/04/28 16:00:32 DB : policy found
14/04/28 16:00:32 ii : removing IPSEC INBOUND policy
ANY:205.197.192.150/32:* -> ANY:10.120.2.101:*
14/04/28 16:00:32 K> : send pfkey X_SPDDELETE2 UNSPEC message
14/04/28 16:00:32 DB : policy found
14/04/28 16:00:32 ii : removing IPSEC OUTBOUND policy
ANY:10.120.2.101:* -> ANY:205.197.192.150/32:*
14/04/28 16:00:32 K> : send pfkey X_SPDDELETE2 UNSPEC message
14/04/28 16:00:32 ii : removed IPSEC policy route for ANY:205.197.192.150/32:*
14/04/28 16:00:32 DB : policy found
14/04/28 16:00:32 ii : removing IPSEC INBOUND policy
ANY:205.197.192.151/32:* -> ANY:10.120.2.101:*
14/04/28 16:00:32 K> : send pfkey X_SPDDELETE2 UNSPEC message
14/04/28 16:00:32 DB : policy found
14/04/28 16:00:32 ii : removing IPSEC OUTBOUND policy
ANY:10.120.2.101:* -> ANY:205.197.192.151/32:*
14/04/28 16:00:32 K> : send pfkey X_SPDDELETE2 UNSPEC message
14/04/28 16:00:32 ii : removed IPSEC policy route for ANY:205.197.192.151/32:*
14/04/28 16:00:32 DB : policy found
14/04/28 16:00:32 ii : removing NONE INBOUND policy ANY:192.168.1.1:*
-> ANY:10.120.2.101:*
14/04/28 16:00:32 K> : send pfkey X_SPDDELETE2 UNSPEC message
14/04/28 16:00:32 DB : policy found
14/04/28 16:00:32 ii : removing NONE OUTBOUND policy
ANY:10.120.2.101:* -> ANY:192.168.1.1:*
14/04/28 16:00:32 K> : send pfkey X_SPDDELETE2 UNSPEC message
14/04/28 16:00:32 DB : policy found
14/04/28 16:00:32 ii : removing NONE INBOUND policy ANY:210.80.199.3:*
-> ANY:192.168.1.102:*
14/04/28 16:00:32 K> : send pfkey X_SPDDELETE2 UNSPEC message
14/04/28 16:00:32 DB : policy found
14/04/28 16:00:32 ii : removing NONE OUTBOUND policy
ANY:192.168.1.102:* -> ANY:210.80.199.3:*
14/04/28 16:00:32 K> : send pfkey X_SPDDELETE2 UNSPEC message
14/04/28 16:00:32 ii : removed NONE policy route for ANY:210.80.199.3:*
14/04/28 16:00:32 DB : policy found
14/04/28 16:00:32 DB : policy deleted ( obj count = 15 )
14/04/28 16:00:32 K< : recv pfkey X_SPDDELETE2 UNSPEC message
14/04/28 16:00:32 DB : policy found
14/04/28 16:00:32 DB : policy deleted ( obj count = 14 )
14/04/28 16:00:32 K< : recv pfkey X_SPDDELETE2 UNSPEC message
14/04/28 16:00:32 DB : policy found
14/04/28 16:00:32 DB : policy deleted ( obj count = 13 )
14/04/28 16:00:32 K< : recv pfkey X_SPDDELETE2 UNSPEC message
14/04/28 16:00:32 DB : policy found
14/04/28 16:00:32 DB : policy deleted ( obj count = 12 )
14/04/28 16:00:32 K< : recv pfkey X_SPDDELETE2 UNSPEC message
14/04/28 16:00:32 DB : policy found
14/04/28 16:00:32 DB : policy deleted ( obj count = 11 )
14/04/28 16:00:32 K< : recv pfkey X_SPDDELETE2 UNSPEC message
14/04/28 16:00:32 DB : policy found
14/04/28 16:00:32 DB : policy deleted ( obj count = 10 )
14/04/28 16:00:32 K< : recv pfkey X_SPDDELETE2 UNSPEC message
14/04/28 16:00:32 DB : policy found
14/04/28 16:00:32 DB : policy deleted ( obj count = 9 )
14/04/28 16:00:32 K< : recv pfkey X_SPDDELETE2 UNSPEC message
14/04/28 16:00:32 DB : policy found
14/04/28 16:00:32 DB : policy deleted ( obj count = 8 )
14/04/28 16:00:32 K< : recv pfkey X_SPDDELETE2 UNSPEC message
14/04/28 16:00:32 DB : policy found
14/04/28 16:00:32 DB : policy deleted ( obj count = 7 )
14/04/28 16:00:32 K< : recv pfkey X_SPDDELETE2 UNSPEC message
14/04/28 16:00:32 DB : policy found
14/04/28 16:00:32 DB : policy deleted ( obj count = 6 )
14/04/28 16:00:32 K< : recv pfkey X_SPDDELETE2 UNSPEC message
14/04/28 16:00:32 DB : policy found
14/04/28 16:00:32 DB : policy deleted ( obj count = 5 )
14/04/28 16:00:32 K< : recv pfkey X_SPDDELETE2 UNSPEC message
14/04/28 16:00:32 DB : policy found
14/04/28 16:00:32 DB : policy deleted ( obj count = 4 )
14/04/28 16:00:32 K< : recv pfkey X_SPDDELETE2 UNSPEC message
14/04/28 16:00:32 DB : policy found
14/04/28 16:00:32 DB : policy deleted ( obj count = 3 )
14/04/28 16:00:32 K< : recv pfkey X_SPDDELETE2 UNSPEC message
14/04/28 16:00:32 DB : policy found
14/04/28 16:00:32 DB : policy deleted ( obj count = 2 )
14/04/28 16:00:32 K< : recv pfkey X_SPDDELETE2 UNSPEC message
14/04/28 16:00:32 DB : policy found
14/04/28 16:00:32 DB : policy deleted ( obj count = 1 )
14/04/28 16:00:32 K< : recv pfkey X_SPDDELETE2 UNSPEC message
14/04/28 16:00:32 DB : policy found
14/04/28 16:00:32 DB : policy deleted ( obj count = 0 )
14/04/28 16:00:32 ii : disable adapter ROOT\VNET\0000
14/04/28 16:00:32 DB : tunnel dpd event canceled ( ref count = 4 )
14/04/28 16:00:32 DB : tunnel natt event canceled ( ref count = 3 )
14/04/28 16:00:32 DB : tunnel stats event canceled ( ref count = 2 )
14/04/28 16:00:32 DB : removing tunnel config references
14/04/28 16:00:32 DB : removing tunnel phase2 references
14/04/28 16:00:32 DB : phase2 resend event canceled ( ref count = 1 )
14/04/28 16:00:32 ii : phase2 removal before expire time
14/04/28 16:00:32 DB : phase2 deleted ( obj count = 0 )
14/04/28 16:00:32 DB : removing tunnel phase1 references
14/04/28 16:00:32 DB : tunnel deleted ( obj count = 0 )
14/04/28 16:00:32 DB : removing all peer tunnel references
14/04/28 16:00:32 DB : peer deleted ( obj count = 0 )
14/04/28 16:00:32 ii : ipc client process thread exit ...
14/04/28 16:00:32 ii : ipc client process thread begin ...
14/04/28 16:00:32 <A : peer config add message
14/04/28 16:00:32 <A : proposal config message
14/04/28 16:00:32 <A : proposal config message
14/04/28 16:00:32 <A : client config message
14/04/28 16:00:32 <A : xauth username message
14/04/28 16:00:32 <A : xauth password message
14/04/28 16:00:32 <A : local id 'ScanSoft' message
14/04/28 16:00:33 <A : preshared key message
14/04/28 16:00:33 <A : peer tunnel enable message
14/04/28 16:00:33 DB : peer added ( obj count = 1 )
14/04/28 16:00:33 ii : local address 192.168.1.102 selected for peer
14/04/28 16:00:33 DB : tunnel added ( obj count = 1 )
14/04/28 16:00:33 DB : new phase1 ( ISAKMP initiator )
14/04/28 16:00:33 DB : exchange type is aggressive
14/04/28 16:00:33 DB : 192.168.1.102:500 <-> 210.80.199.3:500
14/04/28 16:00:33 DB : 5d822c1e0a5cef46:0000000000000000
14/04/28 16:00:33 DB : phase1 added ( obj count = 1 )
14/04/28 16:00:33 >> : security association payload
14/04/28 16:00:33 >> : - proposal #1 payload
14/04/28 16:00:33 >> : -- transform #1 payload
14/04/28 16:00:33 >> : -- transform #2 payload
14/04/28 16:00:33 >> : -- transform #3 payload
14/04/28 16:00:33 >> : -- transform #4 payload
14/04/28 16:00:33 >> : -- transform #5 payload
14/04/28 16:00:33 >> : -- transform #6 payload
14/04/28 16:00:33 >> : -- transform #7 payload
14/04/28 16:00:33 >> : -- transform #8 payload
14/04/28 16:00:33 >> : -- transform #9 payload
14/04/28 16:00:33 >> : -- transform #10 payload
14/04/28 16:00:33 >> : -- transform #11 payload
14/04/28 16:00:33 >> : -- transform #12 payload
14/04/28 16:00:33 >> : -- transform #13 payload
14/04/28 16:00:33 >> : -- transform #14 payload
14/04/28 16:00:33 >> : -- transform #15 payload
14/04/28 16:00:33 >> : -- transform #16 payload
14/04/28 16:00:33 >> : -- transform #17 payload
14/04/28 16:00:33 >> : -- transform #18 payload
14/04/28 16:00:33 >> : key exchange payload
14/04/28 16:00:33 >> : nonce payload
14/04/28 16:00:33 >> : identification payload
14/04/28 16:00:33 >> : vendor id payload
14/04/28 16:00:33 ii : local supports XAUTH
14/04/28 16:00:33 >> : vendor id payload
14/04/28 16:00:33 ii : local supports nat-t ( draft v00 )
14/04/28 16:00:33 >> : vendor id payload
14/04/28 16:00:33 ii : local supports nat-t ( draft v01 )
14/04/28 16:00:33 >> : vendor id payload
14/04/28 16:00:33 ii : local supports nat-t ( draft v02 )
14/04/28 16:00:33 >> : vendor id payload
14/04/28 16:00:33 ii : local supports nat-t ( draft v03 )
14/04/28 16:00:33 >> : vendor id payload
14/04/28 16:00:33 ii : local supports nat-t ( rfc )
14/04/28 16:00:33 >> : vendor id payload
14/04/28 16:00:33 >> : vendor id payload
14/04/28 16:00:33 ii : local supports DPDv1
14/04/28 16:00:33 >> : vendor id payload
14/04/28 16:00:33 ii : local is SHREW SOFT compatible
14/04/28 16:00:33 >> : vendor id payload
14/04/28 16:00:33 ii : local is NETSCREEN compatible
14/04/28 16:00:33 >> : vendor id payload
14/04/28 16:00:33 ii : local is SIDEWINDER compatible
14/04/28 16:00:33 >> : vendor id payload
14/04/28 16:00:33 ii : local is CISCO UNITY compatible
14/04/28 16:00:33 >= : cookies 5d822c1e0a5cef46:0000000000000000
14/04/28 16:00:33 >= : message 00000000
14/04/28 16:00:33 -> : send IKE packet 192.168.1.102:500 ->
210.80.199.3:500 ( 1180 bytes )
14/04/28 16:00:33 DB : phase1 resend event scheduled ( ref count = 2 )
14/04/28 16:00:38 -> : resend 1 phase1 packet(s) [0/2]
192.168.1.102:500 -> 210.80.199.3:500
14/04/28 16:00:41 <- : recv IKE packet 210.80.199.3:500 ->
192.168.1.102:500 ( 448 bytes )
14/04/28 16:00:41 DB : phase1 found
14/04/28 16:00:41 ii : processing phase1 packet ( 448 bytes )
14/04/28 16:00:41 =< : cookies 5d822c1e0a5cef46:b0d0f5ea1677c8a0
14/04/28 16:00:41 =< : message 00000000
14/04/28 16:00:41 << : security association payload
14/04/28 16:00:41 << : - propsal #1 payload
14/04/28 16:00:41 << : -- transform #13 payload
14/04/28 16:00:41 ii : unmatched isakmp proposal/transform
14/04/28 16:00:41 ii : cipher type ( 3des != aes )
14/04/28 16:00:41 ii : unmatched isakmp proposal/transform
14/04/28 16:00:41 ii : cipher type ( 3des != aes )
14/04/28 16:00:41 ii : unmatched isakmp proposal/transform
14/04/28 16:00:41 ii : cipher type ( 3des != aes )
14/04/28 16:00:41 ii : unmatched isakmp proposal/transform
14/04/28 16:00:41 ii : cipher type ( 3des != aes )
14/04/28 16:00:41 ii : unmatched isakmp proposal/transform
14/04/28 16:00:41 ii : cipher type ( 3des != aes )
14/04/28 16:00:41 ii : unmatched isakmp proposal/transform
14/04/28 16:00:41 ii : cipher type ( 3des != aes )
14/04/28 16:00:41 ii : unmatched isakmp proposal/transform
14/04/28 16:00:41 ii : cipher type ( 3des != blowfish )
14/04/28 16:00:41 ii : unmatched isakmp proposal/transform
14/04/28 16:00:41 ii : cipher type ( 3des != blowfish )
14/04/28 16:00:41 ii : unmatched isakmp proposal/transform
14/04/28 16:00:41 ii : cipher type ( 3des != blowfish )
14/04/28 16:00:41 ii : unmatched isakmp proposal/transform
14/04/28 16:00:41 ii : cipher type ( 3des != blowfish )
14/04/28 16:00:41 ii : unmatched isakmp proposal/transform
14/04/28 16:00:41 ii : cipher type ( 3des != blowfish )
14/04/28 16:00:41 ii : unmatched isakmp proposal/transform
14/04/28 16:00:41 ii : cipher type ( 3des != blowfish )
14/04/28 16:00:41 ii : matched isakmp proposal #1 transform #13
14/04/28 16:00:41 ii : - transform    = ike
14/04/28 16:00:41 ii : - cipher type  = 3des
14/04/28 16:00:41 ii : - key length   = default
14/04/28 16:00:41 ii : - hash type    = md5
14/04/28 16:00:41 ii : - dh group     = group2 ( modp-1024 )
14/04/28 16:00:41 ii : - auth type    = xauth-initiator-psk
14/04/28 16:00:41 ii : - life seconds = 86400
14/04/28 16:00:41 ii : - life kbytes  = 0
14/04/28 16:00:41 << : key exchange payload
14/04/28 16:00:41 << : nonce payload
14/04/28 16:00:41 << : identification payload
14/04/28 16:00:41 ii : phase1 id target is any
14/04/28 16:00:41 ii : phase1 id match
14/04/28 16:00:41 ii : received = ipv4-host 210.80.199.3
14/04/28 16:00:41 << : hash payload
14/04/28 16:00:41 << : vendor id payload
14/04/28 16:00:41 ii : peer is CISCO UNITY compatible
14/04/28 16:00:41 << : vendor id payload
14/04/28 16:00:41 ii : peer supports XAUTH
14/04/28 16:00:41 << : vendor id payload
14/04/28 16:00:41 ii : peer supports DPDv1
14/04/28 16:00:41 << : vendor id payload
14/04/28 16:00:41 ii : peer supports nat-t ( draft v02 )
14/04/28 16:00:41 << : nat discovery payload
14/04/28 16:00:41 << : nat discovery payload
14/04/28 16:00:41 << : vendor id payload
14/04/28 16:00:41 ii : unknown vendor id ( 20 bytes )
14/04/28 16:00:41 0x : 4048b7d5 6ebce885 25e7de7f 00d6c2d3 c0000000
14/04/28 16:00:41 << : vendor id payload
14/04/28 16:00:41 ii : unknown vendor id ( 16 bytes )
14/04/28 16:00:41 0x : 451752f7 1676c8a0 4ff7ff31 dbadc9a2
14/04/28 16:00:41 << : vendor id payload
14/04/28 16:00:41 ii : unknown vendor id ( 16 bytes )
14/04/28 16:00:41 0x : 1f07f70e aa6514d3 b0fa9654 2a500407
14/04/28 16:00:41 ii : nat discovery - local address is translated
14/04/28 16:00:41 ii : switching to src nat-t udp port 4500
14/04/28 16:00:41 ii : switching to dst nat-t udp port 4500
14/04/28 16:00:41 == : DH shared secret ( 128 bytes )
14/04/28 16:00:41 == : SETKEYID ( 16 bytes )
14/04/28 16:00:41 == : SETKEYID_d ( 16 bytes )
14/04/28 16:00:41 == : SETKEYID_a ( 16 bytes )
14/04/28 16:00:41 == : SETKEYID_e ( 16 bytes )
14/04/28 16:00:41 == : cipher key ( 32 bytes )
14/04/28 16:00:41 == : cipher iv ( 8 bytes )
14/04/28 16:00:41 == : phase1 hash_i ( computed ) ( 16 bytes )
14/04/28 16:00:41 >> : hash payload
14/04/28 16:00:41 >> : nat discovery payload
14/04/28 16:00:41 >> : nat discovery payload
14/04/28 16:00:41 >= : cookies 5d822c1e0a5cef46:b0d0f5ea1677c8a0
14/04/28 16:00:41 >= : message 00000000
14/04/28 16:00:41 >= : encrypt iv ( 8 bytes )
14/04/28 16:00:41 == : encrypt packet ( 88 bytes )
14/04/28 16:00:41 == : stored iv ( 8 bytes )
14/04/28 16:00:41 DB : phase1 resend event canceled ( ref count = 1 )
14/04/28 16:00:41 -> : send NAT-T:IKE packet 192.168.1.102:4500 ->
210.80.199.3:4500 ( 124 bytes )
14/04/28 16:00:41 == : phase1 hash_r ( computed ) ( 16 bytes )
14/04/28 16:00:41 == : phase1 hash_r ( received ) ( 16 bytes )
14/04/28 16:00:41 ii : phase1 sa established
14/04/28 16:00:41 ii : 210.80.199.3:4500 <-> 192.168.1.102:4500
14/04/28 16:00:41 ii : 5d822c1ea5cef46:b0d0f5ea1677c8a0
14/04/28 16:00:41 ii : sending peer INITIAL-CONTACT notification
14/04/28 16:00:41 ii : - 192.168.1.102:4500 -> 210.80.199.3:4500
14/04/28 16:00:41 ii : - isakmp spi = 5d822c1e0a5cef46:b0d0f5ea1677c8a0
14/04/28 16:00:41 ii : - data size 0
14/04/28 16:00:41 >> : hash payload
14/04/28 16:00:41 >> : notification payload
14/04/28 16:00:41 == : new informational hash ( 16 bytes )
14/04/28 16:00:41 == : new informational iv ( 8 bytes )
14/04/28 16:00:41 >= : cookies 5d822c1e0a5cef46:b0d0f5ea1677c8a0
14/04/28 16:00:41 >= : message fbf24403
14/04/28 16:00:41 >= : encrypt iv ( 8 bytes )
14/04/28 16:00:41 == : encrypt packet ( 76 bytes )
14/04/28 16:00:41 == : stored iv ( 8 bytes )
14/04/28 16:00:41 -> : send NAT-T:IKE packet 192.168.1.102:4500 ->
210.80.199.3:4500 ( 108 bytes )
14/04/28 16:00:41 DB : phase2 not found
14/04/28 16:00:42 <- : recv NAT-T:IKE packet 210.80.199.3:4500 ->
192.168.1.102:4500 ( 116 bytes )
14/04/28 16:00:42 DB : phase1 found
14/04/28 16:00:42 ii : processing config packet ( 116 bytes )
14/04/28 16:00:42 DB : config not found
14/04/28 16:00:42 DB : config added ( obj count = 1 )
14/04/28 16:00:42 == : new config iv ( 8 bytes )
14/04/28 16:00:42 =< : cookies 5d822c1e0a5cef46:b0d0f5ea1677c8a0
14/04/28 16:00:42 =< : message a1e84875
14/04/28 16:00:42 =< : decrypt iv ( 8 bytes )
14/04/28 16:00:42 == : decrypt packet ( 116 bytes )
14/04/28 16:00:42 <= : trimmed packet padding ( 4 bytes )
14/04/28 16:00:42 <= : stored iv ( 8 bytes )
14/04/28 16:00:42 << : hash payload
14/04/28 16:00:42 << : attribute payload
14/04/28 16:00:42 == : configure hash_i ( computed ) ( 16 bytes )
14/04/28 16:00:42 == : configure hash_c ( computed ) ( 16 bytes )
14/04/28 16:00:42 ii : configure hash verified
14/04/28 16:00:42 ii : - xauth authentication type
14/04/28 16:00:42 ii : - xauth username
14/04/28 16:00:42 ww : unhandled xauth attribute 16526
14/04/28 16:00:42 ii : - xauth password
14/04/28 16:00:42 ii : received basic xauth request - Enter Username,
Password and Domain.
14/04/28 16:00:42 ii : - standard xauth username
14/04/28 16:00:42 ii : - standard xauth password
14/04/28 16:00:42 ii : sending xauth response for guido_aversano
14/04/28 16:00:42 >> : hash payload
14/04/28 16:00:42 >> : attribute payload
14/04/28 16:00:42 == : new configure hash ( 16 bytes )
14/04/28 16:00:42 >= : cookies 5d822c1e0a5cef46:b0d0f5ea1677c8a0
14/04/28 16:00:42 >= : message a1e84875
14/04/28 16:00:42 >= : encrypt iv ( 8 bytes )
14/04/28 16:00:42 == : encrypt packet ( 90 bytes )
14/04/28 16:00:42 == : stored iv ( 8 bytes )
14/04/28 16:00:42 -> : send NAT-T:IKE packet 192.168.1.102:4500 ->
210.80.199.3:4500 ( 124 bytes )
14/04/28 16:00:42 DB : config resend event scheduled ( ref count = 2 )
14/04/28 16:00:42 <- : recv NAT-T:IKE packet 210.80.199.3:4500 ->
192.168.1.102:4500 ( 60 bytes )
14/04/28 16:00:42 DB : phase1 found
14/04/28 16:00:42 ii : processing config packet ( 60 bytes )
14/04/28 16:00:42 DB : config found
14/04/28 16:00:42 == : new config iv ( 8 bytes )
14/04/28 16:00:42 =< : cookies 5d822c1e0a5cef46:b0d0f5ea1677c8a0
14/04/28 16:00:42 =< : message df2132a1
14/04/28 16:00:42 =< : decrypt iv ( 8 bytes )
14/04/28 16:00:42 == : decrypt packet ( 60 bytes )
14/04/28 16:00:42 <= : stored iv ( 8 bytes )
14/04/28 16:00:42 << : hash payload
14/04/28 16:00:42 << : attribute payload
14/04/28 16:00:42 == : configure hash_i ( computed ) ( 16 bytes )
14/04/28 16:00:42 == : configure hash_c ( computed ) ( 16 bytes )
14/04/28 16:00:42 ii : configure hash verified
14/04/28 16:00:42 ii : received xauth result -
14/04/28 16:00:42 ii : user guido_aversano authentication succeeded
14/04/28 16:00:42 ii : sending xauth acknowledge
14/04/28 16:00:42 >> : hash payload
14/04/28 16:00:42 >> : attribute payload
14/04/28 16:00:42 == : new configure hash ( 16 bytes )
14/04/28 16:00:42 >= : cookies 5d822c1e0a5cef46:b0d0f5ea1677c8a0
14/04/28 16:00:42 >= : message df2132a1
14/04/28 16:00:42 >= : encrypt iv ( 8 bytes )
14/04/28 16:00:42 == : encrypt packet ( 56 bytes )
14/04/28 16:00:42 == : stored iv ( 8 bytes )
14/04/28 16:00:42 DB : config resend event canceled ( ref count = 1 )
14/04/28 16:00:42 -> : send NAT-T:IKE packet 192.168.1.102:4500 ->
210.80.199.3:4500 ( 92 bytes )
14/04/28 16:00:42 DB : config resend event scheduled ( ref count = 2 )
14/04/28 16:00:42 ii : building config attribute list
14/04/28 16:00:42 ii : - IP4 Address
14/04/28 16:00:42 ii : - Address Expiry
14/04/28 16:00:42 ii : - IP4 Netmask
14/04/28 16:00:42 ii : - IP4 DNS Server
14/04/28 16:00:42 ii : - IP4 WINS Server
14/04/28 16:00:42 ii : - DNS Suffix
14/04/28 16:00:42 ii : - IP4 Split Network Include
14/04/28 16:00:42 ii : - IP4 Split Network Exclude
14/04/28 16:00:42 ii : - Login Banner
14/04/28 16:00:42 ii : - PFS Group
14/04/28 16:00:42 ii : - Save Password
14/04/28 16:00:42 ii : - CISCO UDP Port
14/04/28 16:00:42 ii : - Application Version = Cisco Systems VPN
Client 4.8.01.0300:WinNT
14/04/28 16:00:42 ii : - Firewall Type = CISCO-UNKNOWN
14/04/28 16:00:42 == : new config iv ( 8 bytes )
14/04/28 16:00:42 ii : sending config pull request
14/04/28 16:00:42 >> : hash payload
14/04/28 16:00:42 >> : attribute payload
14/04/28 16:00:42 == : new configure hash ( 16 bytes )
14/04/28 16:00:42 >= : cookies 5d822c1e0a5cef46:b0d0f5ea1677c8a0
14/04/28 16:00:42 >= : message ba5924e0
14/04/28 16:00:42 >= : encrypt iv ( 8 bytes )
14/04/28 16:00:42 == : encrypt packet ( 166 bytes )
14/04/28 16:00:42 == : stored iv ( 8 bytes )
14/04/28 16:00:42 DB : config resend event canceled ( ref count = 1 )
14/04/28 16:00:42 -> : send NAT-T:IKE packet 192.168.1.102:4500 ->
210.80.199.3:4500 ( 204 bytes )
14/04/28 16:00:42 DB : config resend event scheduled ( ref count = 2 )
14/04/28 16:00:43 <- : recv NAT-T:IKE packet 210.80.199.3:4500 ->
192.168.1.102:4500 ( 308 bytes )
14/04/28 16:00:43 DB : phase1 found
14/04/28 16:00:43 ii : processing config packet ( 308 bytes )
14/04/28 16:00:43 DB : config found
14/04/28 16:00:43 =< : cookies 5d822c1e0a5cef46:b0d0f5ea1677c8a0
14/04/28 16:00:43 =< : message ba5924e0
14/04/28 16:00:43 =< : decrypt iv ( 8 bytes )
14/04/28 16:00:43 == : decrypt packet ( 308 bytes )
14/04/28 16:00:43 <= : stored iv ( 8 bytes )
14/04/28 16:00:43 << : hash payload
14/04/28 16:00:43 << : attribute payload
14/04/28 16:00:43 == : configure hash_i ( computed ) ( 16 bytes )
14/04/28 16:00:43 == : configure hash_c ( computed ) ( 16 bytes )
14/04/28 16:00:43 ii : configure hash verified
14/04/28 16:00:43 ii : received config pull response
14/04/28 16:00:43 ii : - IP4 Address = 10.120.2.101
14/04/28 16:00:43 ii : - IP4 Netmask = 255.255.255.0
14/04/28 16:00:43 ii : - IP4 DNS Server = 10.1.4.201
14/04/28 16:00:43 ii : - IP4 DNS Server = 10.1.4.202
14/04/28 16:00:43 ii : - IP4 WINS Server = 10.1.4.201
14/04/28 16:00:43 ii : - Save Password = 0
14/04/28 16:00:43 ii : - IP4 Split Network Include = ANY:10.0.0.0/8:*
14/04/28 16:00:43 ii : - IP4 Split Network Include = ANY:192.168.90.0/24:*
14/04/28 16:00:43 ii : - IP4 Split Network Include = ANY:172.16.30.0/24:*
14/04/28 16:00:43 ii : - IP4 Split Network Include = ANY:192.168.3.0/24:*
14/04/28 16:00:43 ii : - IP4 Split Network Include = ANY:205.197.192.150/32:*
14/04/28 16:00:43 ii : - IP4 Split Network Include = ANY:205.197.192.151/32:*
14/04/28 16:00:43 ii : - DNS Suffix = nuance.com
14/04/28 16:00:43 ii : - PFS Group = 0
14/04/28 16:00:43 ii : - Application Version = Cisco Systems, Inc./VPN
3000 Concentrator Version 4.7.2.P built by vmurphy on Jul 30 2008
17:39:30
14/04/28 16:00:43 DB : config resend event canceled ( ref count = 1 )
14/04/28 16:00:43 ii : enabled adapter ROOT\VNET\0000
14/04/28 16:00:43 ii : adapter ROOT\VNET\0000 unavailable, retrying ...
14/04/28 16:00:44 ii : apapter ROOT\VNET\0000 MTU is 1380
14/04/28 16:00:44 ii : generating IPSEC security policies at REQUIRE level
14/04/28 16:00:44 ii : creating NONE INBOUND policy ANY:210.80.199.3:*
-> ANY:192.168.1.102:*
14/04/28 16:00:44 DB : policy added ( obj count = 1 )
14/04/28 16:00:44 K> : send pfkey X_SPDADD UNSPEC message
14/04/28 16:00:44 K< : recv pfkey X_SPDADD UNSPEC message
14/04/28 16:00:44 DB : policy found
14/04/28 16:00:44 ii : creating NONE OUTBOUND policy
ANY:192.168.1.102:* -> ANY:210.80.199.3:*
14/04/28 16:00:44 ii : created NONE policy route for 210.80.199.3/32
14/04/28 16:00:44 DB : policy added ( obj count = 2 )
14/04/28 16:00:44 K> : send pfkey X_SPDADD UNSPEC message
14/04/28 16:00:44 K< : recv pfkey X_SPDADD UNSPEC message
14/04/28 16:00:44 DB : policy found
14/04/28 16:00:44 ii : creating NONE INBOUND policy ANY:192.168.1.1:*
-> ANY:10.120.2.101:*
14/04/28 16:00:44 DB : policy added ( obj count = 3 )
14/04/28 16:00:44 K> : send pfkey X_SPDADD UNSPEC message
14/04/28 16:00:44 ii : creating NONE OUTBOUND policy
ANY:10.120.2.101:* -> ANY:192.168.1.1:*
14/04/28 16:00:44 DB : policy added ( obj count = 4 )
14/04/28 16:00:44 K> : send pfkey X_SPDADD UNSPEC message
14/04/28 16:00:44 ii : creating IPSEC INBOUND policy ANY:10.0.0.0/8:*
-> ANY:10.120.2.101:*
14/04/28 16:00:44 DB : policy added ( obj count = 5 )
14/04/28 16:00:44 K> : send pfkey X_SPDADD UNSPEC message
14/04/28 16:00:44 K< : recv pfkey X_SPDADD UNSPEC message
14/04/28 16:00:44 DB : policy found
14/04/28 16:00:44 ii : creating IPSEC OUTBOUND policy
ANY:10.120.2.101:* -> ANY:10.0.0.0/8:*
14/04/28 16:00:44 K< : recv pfkey X_SPDADD UNSPEC message
14/04/28 16:00:44 DB : policy found
14/04/28 16:00:44 K< : recv pfkey X_SPDADD UNSPEC message
14/04/28 16:00:44 DB : policy found
14/04/28 16:00:44 ii : created IPSEC policy route for 10.0.0.0/8
14/04/28 16:00:44 DB : policy added ( obj count = 6 )
14/04/28 16:00:44 K> : send pfkey X_SPDADD UNSPEC message
14/04/28 16:00:44 ii : creating IPSEC INBOUND policy
ANY:192.168.90.0/24:* -> ANY:10.120.2.101:*
14/04/28 16:00:44 DB : policy added ( obj count = 7 )
14/04/28 16:00:44 K> : send pfkey X_SPDADD UNSPEC message
14/04/28 16:00:44 ii : creating IPSEC OUTBOUND policy
ANY:10.120.2.101:* -> ANY:192.168.90.0/24:*
14/04/28 16:00:44 K< : recv pfkey X_SPDADD UNSPEC message
14/04/28 16:00:44 DB : policy found
14/04/28 16:00:44 ii : calling init phase2 for initial policy
14/04/28 16:00:44 DB : policy found
14/04/28 16:00:44 DB : policy found
14/04/28 16:00:44 DB : tunnel found
14/04/28 16:00:44 DB : new phase2 ( IPSEC initiator )
14/04/28 16:00:44 DB : phase2 added ( obj count = 1 )
14/04/28 16:00:44 K> : send pfkey GETSPI ESP message
14/04/28 16:00:44 K< : recv pfkey X_SPDADD UNSPEC message
14/04/28 16:00:44 DB : policy found
14/04/28 16:00:44 K< : recv pfkey GETSPI ESP message
14/04/28 16:00:44 DB : phase2 found
14/04/28 16:00:44 ii : updated spi for 1 ipsec-esp proposal
14/04/28 16:00:44 DB : phase1 found
14/04/28 16:00:44 >> : hash payload
14/04/28 16:00:44 >> : security association payload
14/04/28 16:00:44 >> : - proposal #1 payload
14/04/28 16:00:44 >> : -- transform #1 payload
14/04/28 16:00:44 >> : -- transform #2 payload
14/04/28 16:00:44 >> : -- transform #3 payload
14/04/28 16:00:44 >> : -- transform #4 payload
14/04/28 16:00:44 >> : -- transform #5 payload
14/04/28 16:00:44 >> : -- transform #6 payload
14/04/28 16:00:44 >> : -- transform #7 payload
14/04/28 16:00:44 >> : -- transform #8 payload
14/04/28 16:00:44 >> : -- transform #9 payload
14/04/28 16:00:44 >> : -- transform #10 payload
14/04/28 16:00:44 >> : -- transform #11 payload
14/04/28 16:00:44 >> : -- transform #12 payload
14/04/28 16:00:44 >> : -- transform #13 payload
14/04/28 16:00:44 >> : -- transform #14 payload
14/04/28 16:00:44 >> : -- transform #15 payload
14/04/28 16:00:44 >> : -- transform #16 payload
14/04/28 16:00:44 >> : -- transform #17 payload
14/04/28 16:00:44 >> : -- transform #18 payload
14/04/28 16:00:44 >> : -- transform #19 payload
14/04/28 16:00:44 >> : -- transform #20 payload
14/04/28 16:00:44 >> : -- transform #21 payload
14/04/28 16:00:44 >> : -- transform #22 payload
14/04/28 16:00:44 >> : -- transform #23 payload
14/04/28 16:00:44 >> : -- transform #24 payload
14/04/28 16:00:44 >> : -- transform #25 payload
14/04/28 16:00:44 >> : -- transform #26 payload
14/04/28 16:00:44 >> : -- transform #27 payload
14/04/28 16:00:44 >> : -- transform #28 payload
14/04/28 16:00:44 >> : -- transform #29 payload
14/04/28 16:00:44 >> : -- transform #30 payload
14/04/28 16:00:44 >> : -- transform #31 payload
14/04/28 16:00:44 >> : -- transform #32 payload
14/04/28 16:00:44 >> : -- transform #33 payload
14/04/28 16:00:44 >> : -- transform #34 payload
14/04/28 16:00:44 >> : -- transform #35 payload
14/04/28 16:00:44 >> : -- transform #36 payload
14/04/28 16:00:44 >> : -- transform #37 payload
14/04/28 16:00:44 >> : -- transform #38 payload
14/04/28 16:00:44 >> : -- transform #39 payload
14/04/28 16:00:44 >> : -- transform #40 payload
14/04/28 16:00:44 >> : -- transform #41 payload
14/04/28 16:00:44 >> : -- transform #42 payload
14/04/28 16:00:44 >> : -- transform #43 payload
14/04/28 16:00:44 >> : -- transform #44 payload
14/04/28 16:00:44 >> : -- transform #45 payload
14/04/28 16:00:44 >> : nonce payload
14/04/28 16:00:44 >> : identification payload
14/04/28 16:00:44 >> : identification payload
14/04/28 16:00:44 == : phase2 hash_i ( input ) ( 1460 bytes )
14/04/28 16:00:44 == : phase2 hash_i ( computed ) ( 16 bytes )
14/04/28 16:00:44 == : new phase2 iv ( 8 bytes )
14/04/28 16:00:44 >= : cookies 5d822c1e0a5cef46:b0d0f5ea1677c8a0
14/04/28 16:00:44 >= : message 869e3a69
14/04/28 16:00:44 >= : encrypt iv ( 8 bytes )
14/04/28 16:00:44 == : encrypt packet ( 1504 bytes )
14/04/28 16:00:44 == : stored iv ( 8 bytes )
14/04/28 16:00:44 -> : send NAT-T:IKE packet 192.168.1.102:4500 ->
210.80.199.3:4500 ( 1540 bytes )
14/04/28 16:00:44 ii : fragmented packet to 1514 bytes ( MTU 1500 bytes )
14/04/28 16:00:44 ii : fragmented packet to 74 bytes ( MTU 1500 bytes )
14/04/28 16:00:44 DB : phase2 resend event scheduled ( ref count = 2 )
14/04/28 16:00:44 ii : created IPSEC policy route for 192.168.90.0/24
14/04/28 16:00:44 DB : policy added ( obj count = 8 )
14/04/28 16:00:44 K> : send pfkey X_SPDADD UNSPEC message
14/04/28 16:00:44 ii : creating IPSEC INBOUND policy
ANY:172.16.30.0/24:* -> ANY:10.120.2.101:*
14/04/28 16:00:44 DB : policy added ( obj count = 9 )
14/04/28 16:00:44 K> : send pfkey X_SPDADD UNSPEC message
14/04/28 16:00:44 ii : creating IPSEC OUTBOUND policy
ANY:10.120.2.101:* -> ANY:172.16.30.0/24:*
14/04/28 16:00:44 K< : recv pfkey X_SPDADD UNSPEC message
14/04/28 16:00:44 DB : policy found
14/04/28 16:00:44 K< : recv pfkey X_SPDADD UNSPEC message
14/04/28 16:00:44 DB : policy found
14/04/28 16:00:44 ii : created IPSEC policy route for 172.16.30.0/24
14/04/28 16:00:44 DB : policy added ( obj count = 10 )
14/04/28 16:00:44 K> : send pfkey X_SPDADD UNSPEC message
14/04/28 16:00:44 ii : creating IPSEC INBOUND policy
ANY:192.168.3.0/24:* -> ANY:10.120.2.101:*
14/04/28 16:00:44 DB : policy added ( obj count = 11 )
14/04/28 16:00:44 K> : send pfkey X_SPDADD UNSPEC message
14/04/28 16:00:44 ii : creating IPSEC OUTBOUND policy
ANY:10.120.2.101:* -> ANY:192.168.3.0/24:*
14/04/28 16:00:44 K< : recv pfkey X_SPDADD UNSPEC message
14/04/28 16:00:44 DB : policy found
14/04/28 16:00:44 K< : recv pfkey X_SPDADD UNSPEC message
14/04/28 16:00:44 DB : policy found
14/04/28 16:00:44 ii : created IPSEC policy route for 192.168.3.0/24
14/04/28 16:00:44 DB : policy added ( obj count = 12 )
14/04/28 16:00:44 K> : send pfkey X_SPDADD UNSPEC message
14/04/28 16:00:44 ii : creating IPSEC INBOUND policy
ANY:205.197.192.150/32:* -> ANY:10.120.2.101:*
14/04/28 16:00:44 DB : policy added ( obj count = 13 )
14/04/28 16:00:44 K> : send pfkey X_SPDADD UNSPEC message
14/04/28 16:00:44 K< : recv pfkey X_SPDADD UNSPEC message
14/04/28 16:00:44 DB : policy found
14/04/28 16:00:44 ii : creating IPSEC OUTBOUND policy
ANY:10.120.2.101:* -> ANY:205.197.192.150/32:*
14/04/28 16:00:44 K< : recv pfkey X_SPDADD UNSPEC message
14/04/28 16:00:44 DB : policy found
14/04/28 16:00:44 ii : created IPSEC policy route for 205.197.192.150/32
14/04/28 16:00:44 DB : policy added ( obj count = 14 )
14/04/28 16:00:44 K> : send pfkey X_SPDADD UNSPEC message
14/04/28 16:00:44 ii : creating IPSEC INBOUND policy
ANY:205.197.192.151/32:* -> ANY:10.120.2.101:*
14/04/28 16:00:44 K< : recv pfkey X_SPDADD UNSPEC message
14/04/28 16:00:44 DB : policy added ( obj count = 15 )
14/04/28 16:00:44 DB : policy found
14/04/28 16:00:44 K> : send pfkey X_SPDADD UNSPEC message
14/04/28 16:00:44 ii : creating IPSEC OUTBOUND policy
ANY:10.120.2.101:* -> ANY:205.197.192.151/32:*
14/04/28 16:00:44 K< : recv pfkey X_SPDADD UNSPEC message
14/04/28 16:00:44 DB : policy found
14/04/28 16:00:44 ii : created IPSEC policy route for 205.197.192.151/32
14/04/28 16:00:44 DB : policy added ( obj count = 16 )
14/04/28 16:00:44 K> : send pfkey X_SPDADD UNSPEC message
14/04/28 16:00:44 K< : recv pfkey X_SPDADD UNSPEC message
14/04/28 16:00:44 DB : policy found
14/04/28 16:00:44 ii : split DNS is disabled
14/04/28 16:00:48 K< : recv pfkey ACQUIRE UNSPEC message
14/04/28 16:00:48 DB : policy found
14/04/28 16:00:48 DB : policy found
14/04/28 16:00:48 DB : tunnel found
14/04/28 16:00:48 DB : new phase2 ( IPSEC initiator )
14/04/28 16:00:48 DB : phase2 added ( obj count = 2 )
14/04/28 16:00:48 K> : send pfkey GETSPI ESP message
14/04/28 16:00:48 K< : recv pfkey GETSPI ESP message
14/04/28 16:00:48 DB : phase2 found
14/04/28 16:00:48 ii : updated spi for 1 ipsec-esp proposal
14/04/28 16:00:48 DB : phase1 found
14/04/28 16:00:48 >> : hash payload
14/04/28 16:00:48 >> : security association payload
14/04/28 16:00:48 >> : - proposal #1 payload
14/04/28 16:00:48 >> : -- transform #1 payload
14/04/28 16:00:48 >> : -- transform #2 payload
14/04/28 16:00:48 >> : -- transform #3 payload
14/04/28 16:00:48 >> : -- transform #4 payload
14/04/28 16:00:48 >> : -- transform #5 payload
14/04/28 16:00:48 >> : -- transform #6 payload
14/04/28 16:00:48 >> : -- transform #7 payload
14/04/28 16:00:48 >> : -- transform #8 payload
14/04/28 16:00:48 >> : -- transform #9 payload
14/04/28 16:00:48 >> : -- transform #10 payload
14/04/28 16:00:48 >> : -- transform #11 payload
14/04/28 16:00:48 >> : -- transform #12 payload
14/04/28 16:00:48 >> : -- transform #13 payload
14/04/28 16:00:48 >> : -- transform #14 payload
14/04/28 16:00:48 >> : -- transform #15 payload
14/04/28 16:00:48 >> : -- transform #16 payload
14/04/28 16:00:48 >> : -- transform #17 payload
14/04/28 16:00:48 >> : -- transform #18 payload
14/04/28 16:00:48 >> : -- transform #19 payload
14/04/28 16:00:48 >> : -- transform #20 payload
14/04/28 16:00:48 >> : -- transform #21 payload
14/04/28 16:00:48 >> : -- transform #22 payload
14/04/28 16:00:48 >> : -- transform #23 payload
14/04/28 16:00:48 >> : -- transform #24 payload
14/04/28 16:00:48 >> : -- transform #25 payload
14/04/28 16:00:48 >> : -- transform #26 payload
14/04/28 16:00:48 >> : -- transform #27 payload
14/04/28 16:00:48 >> : -- transform #28 payload
14/04/28 16:00:48 >> : -- transform #29 payload
14/04/28 16:00:48 >> : -- transform #30 payload
14/04/28 16:00:48 >> : -- transform #31 payload
14/04/28 16:00:48 >> : -- transform #32 payload
14/04/28 16:00:48 >> : -- transform #33 payload
14/04/28 16:00:48 >> : -- transform #34 payload
14/04/28 16:00:48 >> : -- transform #35 payload
14/04/28 16:00:48 >> : -- transform #36 payload
14/04/28 16:00:48 >> : -- transform #37 payload
14/04/28 16:00:48 >> : -- transform #38 payload
14/04/28 16:00:48 >> : -- transform #39 payload
14/04/28 16:00:48 >> : -- transform #40 payload
14/04/28 16:00:48 >> : -- transform #41 payload
14/04/28 16:00:48 >> : -- transform #42 payload
14/04/28 16:00:48 >> : -- transform #43 payload
14/04/28 16:00:48 >> : -- transform #44 payload
14/04/28 16:00:48 >> : -- transform #45 payload
14/04/28 16:00:48 >> : nonce payload
14/04/28 16:00:48 >> : identification payload
14/04/28 16:00:48 >> : identification payload
14/04/28 16:00:48 == : phase2 hash_i ( input ) ( 1460 bytes )
14/04/28 16:00:48 == : phase2 hash_i ( computed ) ( 16 bytes )
14/04/28 16:00:48 == : new phase2 iv ( 8 bytes )
14/04/28 16:00:48 >= : cookies 5d822c1e0a5cef46:b0d0f5ea1677c8a0
14/04/28 16:00:48 >= : message 40029a20
14/04/28 16:00:48 >= : encrypt iv ( 8 bytes )
14/04/28 16:00:48 == : encrypt packet ( 1504 bytes )
14/04/28 16:00:48 == : stored iv ( 8 bytes )
14/04/28 16:00:48 -> : send NAT-T:IKE packet 192.168.1.102:4500 ->
210.80.199.3:4500 ( 1540 bytes )
14/04/28 16:00:48 ii : fragmented packet to 1514 bytes ( MTU 1500 bytes )
14/04/28 16:00:48 ii : fragmented packet to 74 bytes ( MTU 1500 bytes )
14/04/28 16:00:48 DB : phase2 resend event scheduled ( ref count = 2 )
14/04/28 16:00:49 ii : fragmented packet to 1514 bytes ( MTU 1500 bytes )
14/04/28 16:00:49 ii : fragmented packet to 74 bytes ( MTU 1500 bytes )
14/04/28 16:00:49 -> : resend 1 phase2 packet(s) [0/2]
192.168.1.102:4500 -> 210.80.199.3:4500
14/04/28 16:00:51 <- : recv NAT-T:IKE packet 210.80.199.3:4500 ->
192.168.1.102:4500 ( 308 bytes )
14/04/28 16:00:51 DB : phase1 found
14/04/28 16:00:51 ii : processing config packet ( 308 bytes )
14/04/28 16:00:51 DB : config found
14/04/28 16:00:51 !! : config packet ignored ( config already mature )
14/04/28 16:00:53 ii : fragmented packet to 1514 bytes ( MTU 1500 bytes )
14/04/28 16:00:53 ii : fragmented packet to 74 bytes ( MTU 1500 bytes )
14/04/28 16:00:53 -> : resend 1 phase2 packet(s) [0/2]
192.168.1.102:4500 -> 210.80.199.3:4500
14/04/28 16:00:54 ii : fragmented packet to 1514 bytes ( MTU 1500 bytes )
14/04/28 16:00:54 ii : fragmented packet to 74 bytes ( MTU 1500 bytes )
14/04/28 16:00:54 -> : resend 1 phase2 packet(s) [1/2]
192.168.1.102:4500 -> 210.80.199.3:4500
14/04/28 16:00:56 DB : phase1 found
14/04/28 16:00:56 ii : sending peer DPDV1-R-U-THERE notification
14/04/28 16:00:56 ii : - 192.168.1.102:4500 -> 210.80.199.3:4500
14/04/28 16:00:56 ii : - isakmp spi = 5d822c1e0a5cef46:b0d0f5ea1677c8a0
14/04/28 16:00:56 ii : - data size 4
14/04/28 16:00:56 >> : hash payload
14/04/28 16:00:56 >> : notification payload
14/04/28 16:00:56 == : new informational hash ( 16 bytes )
14/04/28 16:00:56 == : new informational iv ( 8 bytes )
14/04/28 16:00:56 >= : cookies 5d822c1e0a5cef46:b0d0f5ea1677c8a0
14/04/28 16:00:56 >= : message 1d0292ef
14/04/28 16:00:56 >= : encrypt iv ( 8 bytes )
14/04/28 16:00:56 == : encrypt packet ( 80 bytes )
14/04/28 16:00:56 == : stored iv ( 8 bytes )
14/04/28 16:00:56 -> : send NAT-T:IKE packet 192.168.1.102:4500 ->
210.80.199.3:4500 ( 116 bytes )
14/04/28 16:00:56 ii : DPD ARE-YOU-THERE sequence 18d93381 requested
14/04/28 16:00:56 DB : phase1 found
14/04/28 16:00:56 -> : send NAT-T:KEEP-ALIVE packet 192.168.1.102:4500
-> 210.80.199.3:4500
14/04/28 16:00:58 ii : fragmented packet to 1514 bytes ( MTU 1500 bytes )
14/04/28 16:00:58 ii : fragmented packet to 74 bytes ( MTU 1500 bytes )
14/04/28 16:00:58 -> : resend 1 phase2 packet(s) [1/2]
192.168.1.102:4500 -> 210.80.199.3:4500
14/04/28 16:00:59 ii : fragmented packet to 1514 bytes ( MTU 1500 bytes )
14/04/28 16:00:59 ii : fragmented packet to 74 bytes ( MTU 1500 bytes )
14/04/28 16:00:59 -> : resend 1 phase2 packet(s) [2/2]
192.168.1.102:4500 -> 210.80.199.3:4500
14/04/28 16:01:03 ii : fragmented packet to 1514 bytes ( MTU 1500 bytes )
14/04/28 16:01:03 ii : fragmented packet to 74 bytes ( MTU 1500 bytes )
14/04/28 16:01:03 -> : resend 1 phase2 packet(s) [2/2]
192.168.1.102:4500 -> 210.80.199.3:4500
14/04/28 16:01:04 ii : resend limit exceeded for phase2 exchange
14/04/28 16:01:04 ii : phase2 removal before expire time
14/04/28 16:01:04 DB : phase2 deleted ( obj count = 1 )
14/04/28 16:01:05 K< : recv pfkey ACQUIRE UNSPEC message
14/04/28 16:01:05 DB : policy found
14/04/28 16:01:05 DB : policy found
14/04/28 16:01:05 DB : tunnel found
14/04/28 16:01:05 DB : new phase2 ( IPSEC initiator )
14/04/28 16:01:05 DB : phase2 added ( obj count = 2 )
14/04/28 16:01:05 K> : send pfkey GETSPI ESP message
14/04/28 16:01:05 K< : recv pfkey GETSPI ESP message
14/04/28 16:01:05 DB : phase2 found
14/04/28 16:01:05 ii : updated spi for 1 ipsec-esp proposal
14/04/28 16:01:05 DB : phase1 found
14/04/28 16:01:05 >> : hash payload
14/04/28 16:01:05 >> : security association payload
14/04/28 16:01:05 >> : - proposal #1 payload
14/04/28 16:01:05 >> : -- transform #1 payload
14/04/28 16:01:05 >> : -- transform #2 payload
14/04/28 16:01:05 >> : -- transform #3 payload
14/04/28 16:01:05 >> : -- transform #4 payload
14/04/28 16:01:05 >> : -- transform #5 payload
14/04/28 16:01:05 >> : -- transform #6 payload
14/04/28 16:01:05 >> : -- transform #7 payload
14/04/28 16:01:05 >> : -- transform #8 payload
14/04/28 16:01:05 >> : -- transform #9 payload
14/04/28 16:01:05 >> : -- transform #10 payload
14/04/28 16:01:05 >> : -- transform #11 payload
14/04/28 16:01:05 >> : -- transform #12 payload
14/04/28 16:01:05 >> : -- transform #13 payload
14/04/28 16:01:05 >> : -- transform #14 payload
14/04/28 16:01:05 >> : -- transform #15 payload
14/04/28 16:01:05 >> : -- transform #16 payload
14/04/28 16:01:05 >> : -- transform #17 payload
14/04/28 16:01:05 >> : -- transform #18 payload
14/04/28 16:01:05 >> : -- transform #19 payload
14/04/28 16:01:05 >> : -- transform #20 payload
14/04/28 16:01:05 >> : -- transform #21 payload
14/04/28 16:01:05 >> : -- transform #22 payload
14/04/28 16:01:05 >> : -- transform #23 payload
14/04/28 16:01:05 >> : -- transform #24 payload
14/04/28 16:01:05 >> : -- transform #25 payload
14/04/28 16:01:05 >> : -- transform #26 payload
14/04/28 16:01:05 >> : -- transform #27 payload
14/04/28 16:01:05 >> : -- transform #28 payload
14/04/28 16:01:05 >> : -- transform #29 payload
14/04/28 16:01:05 >> : -- transform #30 payload
14/04/28 16:01:05 >> : -- transform #31 payload
14/04/28 16:01:05 >> : -- transform #32 payload
14/04/28 16:01:05 >> : -- transform #33 payload
14/04/28 16:01:05 >> : -- transform #34 payload
14/04/28 16:01:05 >> : -- transform #35 payload
14/04/28 16:01:05 >> : -- transform #36 payload
14/04/28 16:01:05 >> : -- transform #37 payload
14/04/28 16:01:05 >> : -- transform #38 payload
14/04/28 16:01:05 >> : -- transform #39 payload
14/04/28 16:01:05 >> : -- transform #40 payload
14/04/28 16:01:05 >> : -- transform #41 payload
14/04/28 16:01:05 >> : -- transform #42 payload
14/04/28 16:01:05 >> : -- transform #43 payload
14/04/28 16:01:05 >> : -- transform #44 payload
14/04/28 16:01:05 >> : -- transform #45 payload
14/04/28 16:01:05 >> : nonce payload
14/04/28 16:01:05 >> : identification payload
14/04/28 16:01:05 >> : identification payload
14/04/28 16:01:05 == : phase2 hash_i ( input ) ( 1460 bytes )
14/04/28 16:01:05 == : phase2 hash_i ( computed ) ( 16 bytes )
14/04/28 16:01:05 == : new phase2 iv ( 8 bytes )
14/04/28 16:01:05 >= : cookies 5d822c1e0a5cef46:b0d0f5ea1677c8a0
14/04/28 16:01:05 >= : message 65569624
14/04/28 16:01:05 >= : encrypt iv ( 8 bytes )
14/04/28 16:01:05 == : encrypt packet ( 1504 bytes )
14/04/28 16:01:05 == : stored iv ( 8 bytes )
14/04/28 16:01:05 -> : send NAT-T:IKE packet 192.168.1.102:4500 ->
210.80.199.3:4500 ( 1540 bytes )
14/04/28 16:01:05 ii : fragmented packet to 1514 bytes ( MTU 1500 bytes )
14/04/28 16:01:05 ii : fragmented packet to 74 bytes ( MTU 1500 bytes )
14/04/28 16:01:05 DB : phase2 resend event scheduled ( ref count = 2 )
14/04/28 16:01:07 <- : recv NAT-T:IKE packet 210.80.199.3:4500 ->
192.168.1.102:4500 ( 308 bytes )
14/04/28 16:01:07 DB : phase1 found
14/04/28 16:01:07 ii : processing config packet ( 308 bytes )
14/04/28 16:01:07 DB : config found
14/04/28 16:01:07 !! : config packet ignored ( config already mature )
14/04/28 16:01:08 ii : resend limit exceeded for phase2 exchange
14/04/28 16:01:08 ii : phase2 removal before expire time
14/04/28 16:01:08 DB : phase2 deleted ( obj count = 1 )
14/04/28 16:01:10 ii : fragmented packet to 1514 bytes ( MTU 1500 bytes )
14/04/28 16:01:10 ii : fragmented packet to 74 bytes ( MTU 1500 bytes )
14/04/28 16:01:10 -> : resend 1 phase2 packet(s) [0/2]
192.168.1.102:4500 -> 210.80.199.3:4500
14/04/28 16:01:11 DB : phase1 found
14/04/28 16:01:11 -> : send NAT-T:KEEP-ALIVE packet 192.168.1.102:4500
-> 210.80.199.3:4500
14/04/28 16:01:11 DB : phase1 found
14/04/28 16:01:11 ii : next tunnel DPD retry in 4 secs for peer
210.80.199.3:4500
14/04/28 16:01:11 ii : sending peer DPDV1-R-U-THERE notification
14/04/28 16:01:11 ii : - 192.168.1.102:4500 -> 210.80.199.3:4500
14/04/28 16:01:11 ii : - isakmp spi = 5d822c1e0a5cef46:b0d0f5ea1677c8a0
14/04/28 16:01:11 ii : - data size 4
14/04/28 16:01:11 >> : hash payload
14/04/28 16:01:11 >> : notification payload
14/04/28 16:01:11 == : new informational hash ( 16 bytes )
14/04/28 16:01:11 == : new informational iv ( 8 bytes )
14/04/28 16:01:11 >= : cookies 5d822c1e0a5cef46:b0d0f5ea1677c8a0
14/04/28 16:01:11 >= : message 4a7c70dc
14/04/28 16:01:11 >= : encrypt iv ( 8 bytes )
14/04/28 16:01:11 == : encrypt packet ( 80 bytes )
14/04/28 16:01:11 == : stored iv ( 8 bytes )
14/04/28 16:01:11 -> : send NAT-T:IKE packet 192.168.1.102:4500 ->
210.80.199.3:4500 ( 116 bytes )
14/04/28 16:01:11 ii : DPD ARE-YOU-THERE sequence 18d93382 requested
14/04/28 16:01:15 ii : fragmented packet to 1514 bytes ( MTU 1500 bytes )
14/04/28 16:01:15 ii : fragmented packet to 74 bytes ( MTU 1500 bytes )
14/04/28 16:01:15 -> : resend 1 phase2 packet(s) [1/2]
192.168.1.102:4500 -> 210.80.199.3:4500
14/04/28 16:01:15 <- : recv NAT-T:IKE packet 210.80.199.3:4500 ->
192.168.1.102:4500 ( 76 bytes )
14/04/28 16:01:15 DB : phase1 found
14/04/28 16:01:15 ii : processing informational packet ( 76 bytes )
14/04/28 16:01:15 == : new informational iv ( 8 bytes )
14/04/28 16:01:15 =< : cookies 5d822c1e0a5cef46:b0d0f5ea1677c8a0
14/04/28 16:01:15 =< : message 3e33cd22
14/04/28 16:01:15 =< : decrypt iv ( 8 bytes )
14/04/28 16:01:15 == : decrypt packet ( 76 bytes )
14/04/28 16:01:15 <= : stored iv ( 8 bytes )
14/04/28 16:01:15 << : hash payload
14/04/28 16:01:15 << : delete payload
14/04/28 16:01:15 == : informational hash_i ( computed ) ( 16 bytes )
14/04/28 16:01:15 == : informational hash_c ( received ) ( 16 bytes )
14/04/28 16:01:15 ii : informational hash verified
14/04/28 16:01:15 ii : received peer DELETE message
14/04/28 16:01:15 ii : - 210.80.199.3:4500 -> 192.168.1.102:4500
14/04/28 16:01:15 ii : - isakmp spi = 5d822c1e0a5cef46:b0d0f5ea1677c8a0
14/04/28 16:01:15 DB : phase1 found
14/04/28 16:01:15 ii : cleanup, marked phase1
5d822c1e0a5cef46:b0d0f5ea1677c8a0 for removal
14/04/28 16:01:15 DB : phase1 soft event canceled ( ref count = 4 )
14/04/28 16:01:15 DB : phase1 hard event canceled ( ref count = 3 )
14/04/28 16:01:15 DB : phase1 dead event canceled ( ref count = 2 )
14/04/28 16:01:15 DB : config deleted ( obj count = 0 )
14/04/28 16:01:15 ii : phase1 removal before expire time
14/04/28 16:01:15 DB : phase1 not found
14/04/28 16:01:15 DB : phase1 deleted ( obj count = 0 )
14/04/28 16:01:15 DB : policy found
14/04/28 16:01:15 ii : removing IPSEC INBOUND policy ANY:10.0.0.0/8:*
-> ANY:10.120.2.101:*
14/04/28 16:01:15 K> : send pfkey X_SPDDELETE2 UNSPEC message
14/04/28 16:01:15 DB : policy found
14/04/28 16:01:15 ii : removing IPSEC OUTBOUND policy
ANY:10.120.2.101:* -> ANY:10.0.0.0/8:*
14/04/28 16:01:15 K> : send pfkey X_SPDDELETE2 UNSPEC message
14/04/28 16:01:15 K< : recv pfkey X_SPDDELETE2 UNSPEC message
14/04/28 16:01:15 ii : removed IPSEC policy route for ANY:10.0.0.0/8:*
14/04/28 16:01:15 DB : policy found
14/04/28 16:01:15 ii : removing IPSEC INBOUND policy
ANY:192.168.90.0/24:* -> ANY:10.120.2.101:*
14/04/28 16:01:15 K> : send pfkey X_SPDDELETE2 UNSPEC message
14/04/28 16:01:15 DB : policy found
14/04/28 16:01:15 ii : removing IPSEC OUTBOUND policy
ANY:10.120.2.101:* -> ANY:192.168.90.0/24:*
14/04/28 16:01:15 K> : send pfkey X_SPDDELETE2 UNSPEC message
14/04/28 16:01:15 ii : removed IPSEC policy route for ANY:192.168.90.0/24:*
14/04/28 16:01:15 DB : policy found
14/04/28 16:01:15 ii : removing IPSEC INBOUND policy
ANY:172.16.30.0/24:* -> ANY:10.120.2.101:*
14/04/28 16:01:15 K> : send pfkey X_SPDDELETE2 UNSPEC message
14/04/28 16:01:15 DB : policy found
14/04/28 16:01:15 ii : removing IPSEC OUTBOUND policy
ANY:10.120.2.101:* -> ANY:172.16.30.0/24:*
14/04/28 16:01:15 K> : send pfkey X_SPDDELETE2 UNSPEC message
14/04/28 16:01:15 ii : removed IPSEC policy route for ANY:172.16.30.0/24:*
14/04/28 16:01:15 DB : policy found
14/04/28 16:01:15 ii : removing IPSEC INBOUND policy
ANY:192.168.3.0/24:* -> ANY:10.120.2.101:*
14/04/28 16:01:15 K> : send pfkey X_SPDDELETE2 UNSPEC message
14/04/28 16:01:15 DB : policy found
14/04/28 16:01:15 ii : removing IPSEC OUTBOUND policy
ANY:10.120.2.101:* -> ANY:192.168.3.0/24:*
14/04/28 16:01:15 K> : send pfkey X_SPDDELETE2 UNSPEC message
14/04/28 16:01:15 ii : removed IPSEC policy route for ANY:192.168.3.0/24:*
14/04/28 16:01:15 DB : policy found
14/04/28 16:01:15 ii : removing IPSEC INBOUND policy
ANY:205.197.192.150/32:* -> ANY:10.120.2.101:*
14/04/28 16:01:15 K> : send pfkey X_SPDDELETE2 UNSPEC message
14/04/28 16:01:15 DB : policy found
14/04/28 16:01:15 ii : removing IPSEC OUTBOUND policy
ANY:10.120.2.101:* -> ANY:205.197.192.150/32:*
14/04/28 16:01:15 K> : send pfkey X_SPDDELETE2 UNSPEC message
14/04/28 16:01:15 ii : removed IPSEC policy route for ANY:205.197.192.150/32:*
14/04/28 16:01:15 DB : policy found
14/04/28 16:01:15 ii : removing IPSEC INBOUND policy
ANY:205.197.192.151/32:* -> ANY:10.120.2.101:*
14/04/28 16:01:15 K> : send pfkey X_SPDDELETE2 UNSPEC message
14/04/28 16:01:15 DB : policy found
14/04/28 16:01:15 ii : removing IPSEC OUTBOUND policy
ANY:10.120.2.101:* -> ANY:205.197.192.151/32:*
14/04/28 16:01:15 K> : send pfkey X_SPDDELETE2 UNSPEC message
14/04/28 16:01:15 ii : removed IPSEC policy route for ANY:205.197.192.151/32:*
14/04/28 16:01:15 DB : policy found
14/04/28 16:01:15 ii : removing NONE INBOUND policy ANY:192.168.1.1:*
-> ANY:10.120.2.101:*
14/04/28 16:01:15 K> : send pfkey X_SPDDELETE2 UNSPEC message
14/04/28 16:01:15 DB : policy found
14/04/28 16:01:15 ii : removing NONE OUTBOUND policy
ANY:10.120.2.101:* -> ANY:192.168.1.1:*
14/04/28 16:01:15 K> : send pfkey X_SPDDELETE2 UNSPEC message
14/04/28 16:01:15 DB : policy found
14/04/28 16:01:15 ii : removing NONE INBOUND policy ANY:210.80.199.3:*
-> ANY:192.168.1.102:*
14/04/28 16:01:15 K> : send pfkey X_SPDDELETE2 UNSPEC message
14/04/28 16:01:15 DB : policy found
14/04/28 16:01:15 ii : removing NONE OUTBOUND policy
ANY:192.168.1.102:* -> ANY:210.80.199.3:*
14/04/28 16:01:15 K> : send pfkey X_SPDDELETE2 UNSPEC message
14/04/28 16:01:15 ii : removed NONE policy route for ANY:210.80.199.3:*
14/04/28 16:01:15 DB : policy found
14/04/28 16:01:15 DB : policy deleted ( obj count = 15 )
14/04/28 16:01:15 K< : recv pfkey X_SPDDELETE2 UNSPEC message
14/04/28 16:01:15 DB : policy found
14/04/28 16:01:15 DB : policy deleted ( obj count = 14 )
14/04/28 16:01:15 K< : recv pfkey X_SPDDELETE2 UNSPEC message
14/04/28 16:01:15 DB : policy found
14/04/28 16:01:15 DB : policy deleted ( obj count = 13 )
14/04/28 16:01:15 K< : recv pfkey X_SPDDELETE2 UNSPEC message
14/04/28 16:01:15 DB : policy found
14/04/28 16:01:15 DB : policy deleted ( obj count = 12 )
14/04/28 16:01:15 K< : recv pfkey X_SPDDELETE2 UNSPEC message
14/04/28 16:01:15 DB : policy found
14/04/28 16:01:15 DB : policy deleted ( obj count = 11 )
14/04/28 16:01:15 K< : recv pfkey X_SPDDELETE2 UNSPEC message
14/04/28 16:01:15 DB : policy found
14/04/28 16:01:15 DB : policy deleted ( obj count = 10 )
14/04/28 16:01:15 K< : recv pfkey X_SPDDELETE2 UNSPEC message
14/04/28 16:01:15 DB : policy found
14/04/28 16:01:15 DB : policy deleted ( obj count = 9 )
14/04/28 16:01:15 K< : recv pfkey X_SPDDELETE2 UNSPEC message
14/04/28 16:01:15 DB : policy found
14/04/28 16:01:15 DB : policy deleted ( obj count = 8 )
14/04/28 16:01:15 K< : recv pfkey X_SPDDELETE2 UNSPEC message
14/04/28 16:01:15 DB : policy found
14/04/28 16:01:15 DB : policy deleted ( obj count = 7 )
14/04/28 16:01:15 K< : recv pfkey X_SPDDELETE2 UNSPEC message
14/04/28 16:01:15 DB : policy found
14/04/28 16:01:15 DB : policy deleted ( obj count = 6 )
14/04/28 16:01:15 K< : recv pfkey X_SPDDELETE2 UNSPEC message
14/04/28 16:01:15 DB : policy found
14/04/28 16:01:15 DB : policy deleted ( obj count = 5 )
14/04/28 16:01:15 K< : recv pfkey X_SPDDELETE2 UNSPEC message
14/04/28 16:01:15 DB : policy found
14/04/28 16:01:15 DB : policy deleted ( obj count = 4 )
14/04/28 16:01:15 K< : recv pfkey X_SPDDELETE2 UNSPEC message
14/04/28 16:01:15 DB : policy found
14/04/28 16:01:15 DB : policy deleted ( obj count = 3 )
14/04/28 16:01:15 K< : recv pfkey X_SPDDELETE2 UNSPEC message
14/04/28 16:01:15 DB : policy found
14/04/28 16:01:15 DB : policy deleted ( obj count = 2 )
14/04/28 16:01:15 K< : recv pfkey X_SPDDELETE2 UNSPEC message
14/04/28 16:01:15 DB : policy found
14/04/28 16:01:15 DB : policy deleted ( obj count = 1 )
14/04/28 16:01:15 K< : recv pfkey X_SPDDELETE2 UNSPEC message
14/04/28 16:01:15 DB : policy found
14/04/28 16:01:15 DB : policy deleted ( obj count = 0 )
14/04/28 16:01:15 ii : disable adapter ROOT\VNET\0000
14/04/28 16:01:15 DB : tunnel dpd event canceled ( ref count = 4 )
14/04/28 16:01:15 DB : tunnel natt event canceled ( ref count = 3 )
14/04/28 16:01:15 DB : tunnel stats event canceled ( ref count = 2 )
14/04/28 16:01:15 DB : removing tunnel config references
14/04/28 16:01:15 DB : removing tunnel phase2 references
14/04/28 16:01:15 DB : phase2 resend event canceled ( ref count = 1 )
14/04/28 16:01:15 ii : phase2 removal before expire time
14/04/28 16:01:15 DB : phase2 deleted ( obj count = 0 )
14/04/28 16:01:15 DB : removing tunnel phase1 references
14/04/28 16:01:15 DB : tunnel deleted ( obj count = 0 )
14/04/28 16:01:15 DB : removing all peer tunnel references
14/04/28 16:01:15 DB : peer deleted ( obj count = 0 )
14/04/28 16:01:15 ii : ipc client process thread exit ...
14/04/28 16:01:15 ii : ipc client process thread begin ...
14/04/28 16:01:15 <A : peer config add message
14/04/28 16:01:15 <A : proposal config message
14/04/28 16:01:15 <A : proposal config message
14/04/28 16:01:15 <A : client config message
14/04/28 16:01:15 <A : xauth username message
14/04/28 16:01:15 <A : xauth password message
14/04/28 16:01:15 <A : local id 'ScanSoft' message
14/04/28 16:01:15 <A : preshared key message
14/04/28 16:01:15 <A : peer tunnel enable message
14/04/28 16:01:15 DB : peer added ( obj count = 1 )
14/04/28 16:01:15 ii : local address 192.168.1.102 selected for peer
14/04/28 16:01:15 DB : tunnel added ( obj count = 1 )
14/04/28 16:01:16 DB : new phase1 ( ISAKMP initiator )
14/04/28 16:01:16 DB : exchange type is aggressive
14/04/28 16:01:16 DB : 192.168.1.102:500 <-> 210.80.199.3:500
14/04/28 16:01:16 DB : e34379bb847f1e67:0000000000000000
14/04/28 16:01:16 DB : phase1 added ( obj count = 1 )
14/04/28 16:01:16 >> : security association payload
14/04/28 16:01:16 >> : - proposal #1 payload
14/04/28 16:01:16 >> : -- transform #1 payload
14/04/28 16:01:16 >> : -- transform #2 payload
14/04/28 16:01:16 >> : -- transform #3 payload
14/04/28 16:01:16 >> : -- transform #4 payload
14/04/28 16:01:16 >> : -- transform #5 payload
14/04/28 16:01:16 >> : -- transform #6 payload
14/04/28 16:01:16 >> : -- transform #7 payload
14/04/28 16:01:16 >> : -- transform #8 payload
14/04/28 16:01:16 >> : -- transform #9 payload
14/04/28 16:01:16 >> : -- transform #10 payload
14/04/28 16:01:16 >> : -- transform #11 payload
14/04/28 16:01:16 >> : -- transform #12 payload
14/04/28 16:01:16 >> : -- transform #13 payload
14/04/28 16:01:16 >> : -- transform #14 payload
14/04/28 16:01:16 >> : -- transform #15 payload
14/04/28 16:01:16 >> : -- transform #16 payload
14/04/28 16:01:16 >> : -- transform #17 payload
14/04/28 16:01:16 >> : -- transform #18 payload
14/04/28 16:01:16 >> : key exchange payload
14/04/28 16:01:16 >> : nonce payload
14/04/28 16:01:16 >> : identification payload
14/04/28 16:01:16 >> : vendor id payload
14/04/28 16:01:16 ii : local supports XAUTH
14/04/28 16:01:16 >> : vendor id payload
14/04/28 16:01:16 ii : local supports nat-t ( draft v00 )
14/04/28 16:01:16 >> : vendor id payload
14/04/28 16:01:16 ii : local supports nat-t ( draft v01 )
14/04/28 16:01:16 >> : vendor id payload
14/04/28 16:01:16 ii : local supports nat-t ( draft v02 )
14/04/28 16:01:16 >> : vendor id payload
14/04/28 16:01:16 ii : local supports nat-t ( draft v03 )
14/04/28 16:01:16 >> : vendor id payload
14/04/28 16:01:16 ii : local supports nat-t ( rfc )
14/04/28 16:01:16 >> : vendor id payload
14/04/28 16:01:16 >> : vendor id payload
14/04/28 16:01:16 ii : local supports DPDv1
14/04/28 16:01:16 >> : vendor id payload
14/04/28 16:01:16 ii : local is SHREW SOFT compatible
14/04/28 16:01:16 >> : vendor id payload
14/04/28 16:01:16 ii : local is NETSCREEN compatible
14/04/28 16:01:16 >> : vendor id payload
14/04/28 16:01:16 ii : local is SIDEWINDER compatible
14/04/28 16:01:16 >> : vendor id payload
14/04/28 16:01:16 ii : local is CISCO UNITY compatible
14/04/28 16:01:16 >= : cookies e34379bb847f1e67:0000000000000000
14/04/28 16:01:16 >= : message 00000000
14/04/28 16:01:16 -> : send IKE packet 192.168.1.102:500 ->
210.80.199.3:500 ( 1180 bytes )
14/04/28 16:01:16 DB : phase1 resend event scheduled ( ref count = 2 )
14/04/28 16:01:16 <- : recv IKE packet 210.80.199.3:500 ->
192.168.1.102:500 ( 448 bytes )
14/04/28 16:01:16 DB : phase1 found
14/04/28 16:01:16 ii : processing phase1 packet ( 448 bytes )
14/04/28 16:01:16 =< : cookies e34379bb847f1e67:ad6db09169ef7b6c
14/04/28 16:01:16 =< : message 00000000
14/04/28 16:01:16 << : security association payload
14/04/28 16:01:16 << : - propsal #1 payload
14/04/28 16:01:16 << : -- transform #13 payload
14/04/28 16:01:16 ii : unmatched isakmp proposal/transform
14/04/28 16:01:16 ii : cipher type ( 3des != aes )
14/04/28 16:01:16 ii : unmatched isakmp proposal/transform
14/04/28 16:01:16 ii : cipher type ( 3des != aes )
14/04/28 16:01:16 ii : unmatched isakmp proposal/transform
14/04/28 16:01:16 ii : cipher type ( 3des != aes )
14/04/28 16:01:16 ii : unmatched isakmp proposal/transform
14/04/28 16:01:16 ii : cipher type ( 3des != aes )
14/04/28 16:01:16 ii : unmatched isakmp proposal/transform
14/04/28 16:01:16 ii : cipher type ( 3des != aes )
14/04/28 16:01:16 ii : unmatched isakmp proposal/transform
14/04/28 16:01:16 ii : cipher type ( 3des != aes )
14/04/28 16:01:16 ii : unmatched isakmp proposal/transform
14/04/28 16:01:16 ii : cipher type ( 3des != blowfish )
14/04/28 16:01:16 ii : unmatched isakmp proposal/transform
14/04/28 16:01:16 ii : cipher type ( 3des != blowfish )
14/04/28 16:01:16 ii : unmatched isakmp proposal/transform
14/04/28 16:01:16 ii : cipher type ( 3des != blowfish )
14/04/28 16:01:16 ii : unmatched isakmp proposal/transform
14/04/28 16:01:16 ii : cipher type ( 3des != blowfish )
14/04/28 16:01:16 ii : unmatched isakmp proposal/transform
14/04/28 16:01:16 ii : cipher type ( 3des != blowfish )
14/04/28 16:01:16 ii : unmatched isakmp proposal/transform
14/04/28 16:01:16 ii : cipher type ( 3des != blowfish )
14/04/28 16:01:16 ii : matched isakmp proposal #1 transform #13
14/04/28 16:01:16 ii : - transform    = ike
14/04/28 16:01:16 ii : - cipher type  = 3des
14/04/28 16:01:16 ii : - key length   = default
14/04/28 16:01:16 ii : - hash type    = md5
14/04/28 16:01:16 ii : - dh group     = group2 ( modp-1024 )
14/04/28 16:01:16 ii : - auth type    = xauth-initiator-psk
14/04/28 16:01:16 ii : - life seconds = 86400
14/04/28 16:01:16 ii : - life kbytes  = 0
14/04/28 16:01:16 << : key exchange payload
14/04/28 16:01:16 << : nonce payload
14/04/28 16:01:16 << : identification payload
14/04/28 16:01:16 ii : phase1 id target is any
14/04/28 16:01:16 ii : phase1 id match
14/04/28 16:01:16 ii : received = ipv4-host 210.80.199.3
14/04/28 16:01:16 << : hash payload
14/04/28 16:01:16 << : vendor id payload
14/04/28 16:01:16 ii : peer is CISCO UNITY compatible
14/04/28 16:01:16 << : vendor id payload
14/04/28 16:01:16 ii : peer supports XAUTH
14/04/28 16:01:16 << : vendor id payload
14/04/28 16:01:16 ii : peer supports DPDv1
14/04/28 16:01:16 << : vendor id payload
14/04/28 16:01:16 ii : peer supports nat-t ( draft v02 )
14/04/28 16:01:16 << : nat discovery payload
14/04/28 16:01:16 << : nat discovery payload
14/04/28 16:01:16 << : vendor id payload
14/04/28 16:01:16 ii : unknown vendor id ( 20 bytes )
14/04/28 16:01:16 0x : 4048b7d5 6ebce885 25e7de7f 00d6c2d3 c0000000
14/04/28 16:01:16 << : vendor id payload
14/04/28 16:01:16 ii : unknown vendor id ( 16 bytes )
14/04/28 16:01:16 0x : 58aa178c 69ee7b6c d5f40a8d dda65dd2
14/04/28 16:01:16 << : vendor id payload
14/04/28 16:01:16 ii : unknown vendor id ( 16 bytes )
14/04/28 16:01:16 0x : 1f07f70e aa6514d3 b0fa9654 2a500407
14/04/28 16:01:16 ii : nat discovery - local address is translated
14/04/28 16:01:16 ii : switching to src nat-t udp port 4500
14/04/28 16:01:16 ii : switching to dst nat-t udp port 4500
14/04/28 16:01:16 == : DH shared secret ( 128 bytes )
14/04/28 16:01:16 == : SETKEYID ( 16 bytes )
14/04/28 16:01:16 == : SETKEYID_d ( 16 bytes )
14/04/28 16:01:16 == : SETKEYID_a ( 16 bytes )
14/04/28 16:01:16 == : SETKEYID_e ( 16 bytes )
14/04/28 16:01:16 == : cipher key ( 32 bytes )
14/04/28 16:01:16 == : cipher iv ( 8 bytes )
14/04/28 16:01:16 == : phase1 hash_i ( computed ) ( 16 bytes )
14/04/28 16:01:16 >> : hash payload
14/04/28 16:01:16 >> : nat discovery payload
14/04/28 16:01:16 >> : nat discovery payload
14/04/28 16:01:16 >= : cookies e34379bb847f1e67:ad6db09169ef7b6c
14/04/28 16:01:16 >= : message 00000000
14/04/28 16:01:16 >= : encrypt iv ( 8 bytes )
14/04/28 16:01:16 == : encrypt packet ( 88 bytes )
14/04/28 16:01:16 == : stored iv ( 8 bytes )
14/04/28 16:01:16 DB : phase1 resend event canceled ( ref count = 1 )
14/04/28 16:01:16 -> : send NAT-T:IKE packet 192.168.1.102:4500 ->
210.80.199.3:4500 ( 124 bytes )
14/04/28 16:01:16 == : phase1 hash_r ( computed ) ( 16 bytes )
14/04/28 16:01:16 == : phase1 hash_r ( received ) ( 16 bytes )
14/04/28 16:01:16 ii : phase1 sa established
14/04/28 16:01:16 ii : 210.80.199.3:4500 <-> 192.168.1.102:4500
14/04/28 16:01:16 ii : e34379bb847f1e67:ad6db09169ef7b6c
14/04/28 16:01:16 ii : sending peer INITIAL-CONTACT notification
14/04/28 16:01:16 ii : - 192.168.1.102:4500 -> 210.80.199.3:4500
14/04/28 16:01:16 ii : - isakmp spi = e34379bb847f1e67:ad6db09169ef7b6c
14/04/28 16:01:16 ii : - data size 0
14/04/28 16:01:16 >> : hash payload
14/04/28 16:01:16 >> : notification payload
14/04/28 16:01:16 == : new informational hash ( 16 bytes )
14/04/28 16:01:16 == : new informational iv ( 8 bytes )
14/04/28 16:01:16 >= : cookies e34379bb847f1e67:ad6db09169ef7b6c
14/04/28 16:01:16 >= : message b8d2bdd6
14/04/28 16:01:16 >= : encrypt iv ( 8 bytes )
14/04/28 16:01:16 == : encrypt packet ( 76 bytes )
14/04/28 16:01:16 == : stored iv ( 8 bytes )
14/04/28 16:01:16 -> : send NAT-T:IKE packet 192.168.1.102:4500 ->
210.80.199.3:4500 ( 108 bytes )
14/04/28 16:01:16 DB : phase2 not found
14/04/28 16:01:16 <- : recv NAT-T:IKE packet 210.80.199.3:4500 ->
192.168.1.102:4500 ( 116 bytes )
14/04/28 16:01:16 DB : phase1 found
14/04/28 16:01:16 ii : processing config packet ( 116 bytes )
14/04/28 16:01:16 DB : config not found
14/04/28 16:01:16 DB : config added ( obj count = 1 )
14/04/28 16:01:16 == : new config iv ( 8 bytes )
14/04/28 16:01:16 =< : cookies e34379bb847f1e67:ad6db09169ef7b6c
14/04/28 16:01:16 =< : message 14a71b79
14/04/28 16:01:16 =< : decrypt iv ( 8 bytes )
14/04/28 16:01:16 == : decrypt packet ( 116 bytes )
14/04/28 16:01:16 <= : trimmed packet padding ( 4 bytes )
14/04/28 16:01:16 <= : stored iv ( 8 bytes )
14/04/28 16:01:16 << : hash payload
14/04/28 16:01:16 << : attribute payload
14/04/28 16:01:16 == : configure hash_i ( computed ) ( 16 bytes )
14/04/28 16:01:16 == : configure hash_c ( computed ) ( 16 bytes )
14/04/28 16:01:16 ii : configure hash verified
14/04/28 16:01:16 ii : - xauth authentication type
14/04/28 16:01:16 ii : - xauth username
14/04/28 16:01:16 ww : unhandled xauth attribute 16526
14/04/28 16:01:16 ii : - xauth password
14/04/28 16:01:16 ii : received basic xauth request - Enter Username,
Password and Domain.
14/04/28 16:01:16 ii : - standard xauth username
14/04/28 16:01:16 ii : - standard xauth password
14/04/28 16:01:16 ii : sending xauth response for guido_aversano
14/04/28 16:01:16 >> : hash payload
14/04/28 16:01:16 >> : attribute payload
14/04/28 16:01:16 == : new configure hash ( 16 bytes )
14/04/28 16:01:16 >= : cookies e34379bb847f1e67:ad6db09169ef7b6c
14/04/28 16:01:16 >= : message 14a71b79
14/04/28 16:01:16 >= : encrypt iv ( 8 bytes )
14/04/28 16:01:16 == : encrypt packet ( 90 bytes )
14/04/28 16:01:16 == : stored iv ( 8 bytes )
14/04/28 16:01:16 -> : send NAT-T:IKE packet 192.168.1.102:4500 ->
210.80.199.3:4500 ( 124 bytes )
14/04/28 16:01:16 DB : config resend event scheduled ( ref count = 2 )
14/04/28 16:01:17 <- : recv NAT-T:IKE packet 210.80.199.3:4500 ->
192.168.1.102:4500 ( 60 bytes )
14/04/28 16:01:17 DB : phase1 found
14/04/28 16:01:17 ii : processing config packet ( 60 bytes )
14/04/28 16:01:17 DB : config found
14/04/28 16:01:17 == : new config iv ( 8 bytes )
14/04/28 16:01:17 =< : cookies e34379bb847f1e67:ad6db09169ef7b6c
14/04/28 16:01:17 =< : message 73bb1065
14/04/28 16:01:17 =< : decrypt iv ( 8 bytes )
14/04/28 16:01:17 == : decrypt packet ( 60 bytes )
14/04/28 16:01:17 <= : stored iv ( 8 bytes )
14/04/28 16:01:17 << : hash payload
14/04/28 16:01:17 << : attribute payload
14/04/28 16:01:17 == : configure hash_i ( computed ) ( 16 bytes )
14/04/28 16:01:17 == : configure hash_c ( computed ) ( 16 bytes )
14/04/28 16:01:17 ii : configure hash verified
14/04/28 16:01:17 ii : received xauth result -
14/04/28 16:01:17 ii : user guido_aversano authentication succeeded
14/04/28 16:01:17 ii : sending xauth acknowledge
14/04/28 16:01:17 >> : hash payload
14/04/28 16:01:17 >> : attribute payload
14/04/28 16:01:17 == : new configure hash ( 16 bytes )
14/04/28 16:01:17 >= : cookies e34379bb847f1e67:ad6db09169ef7b6c
14/04/28 16:01:17 >= : message 73bb1065
14/04/28 16:01:17 >= : encrypt iv ( 8 bytes )
14/04/28 16:01:17 == : encrypt packet ( 56 bytes )
14/04/28 16:01:17 == : stored iv ( 8 bytes )
14/04/28 16:01:17 DB : config resend event canceled ( ref count = 1 )
14/04/28 16:01:17 -> : send NAT-T:IKE packet 192.168.1.102:4500 ->
210.80.199.3:4500 ( 92 bytes )
14/04/28 16:01:17 DB : config resend event scheduled ( ref count = 2 )
14/04/28 16:01:17 ii : building config attribute list
14/04/28 16:01:17 ii : - IP4 Address
14/04/28 16:01:17 ii : - Address Expiry
14/04/28 16:01:17 ii : - IP4 Netmask
14/04/28 16:01:17 ii : - IP4 DNS Server
14/04/28 16:01:17 ii : - IP4 WINS Server
14/04/28 16:01:17 ii : - DNS Suffix
14/04/28 16:01:17 ii : - IP4 Split Network Include
14/04/28 16:01:17 ii : - IP4 Split Network Exclude
14/04/28 16:01:17 ii : - Login Banner
14/04/28 16:01:17 ii : - PFS Group
14/04/28 16:01:17 ii : - Save Password
14/04/28 16:01:17 ii : - CISCO UDP Port
14/04/28 16:01:17 ii : - Application Version = Cisco Systems VPN
Client 4.8.01.0300:WinNT
14/04/28 16:01:17 ii : - Firewall Type = CISCO-UNKNOWN
14/04/28 16:01:17 == : new config iv ( 8 bytes )
14/04/28 16:01:17 ii : sending config pull request
14/04/28 16:01:17 >> : hash payload
14/04/28 16:01:17 >> : attribute payload
14/04/28 16:01:17 == : new configure hash ( 16 bytes )
14/04/28 16:01:17 >= : cookies e34379bb847f1e67:ad6db09169ef7b6c
14/04/28 16:01:17 >= : message e0aa41aa
14/04/28 16:01:17 >= : encrypt iv ( 8 bytes )
14/04/28 16:01:17 == : encrypt packet ( 166 bytes )
14/04/28 16:01:17 == : stored iv ( 8 bytes )
14/04/28 16:01:17 DB : config resend event canceled ( ref count = 1 )
14/04/28 16:01:17 -> : send NAT-T:IKE packet 192.168.1.102:4500 ->
210.80.199.3:4500 ( 204 bytes )
14/04/28 16:01:17 DB : config resend event scheduled ( ref count = 2 )
14/04/28 16:01:18 <- : recv NAT-T:IKE packet 210.80.199.3:4500 ->
192.168.1.102:4500 ( 308 bytes )
14/04/28 16:01:18 DB : phase1 found
14/04/28 16:01:18 ii : processing config packet ( 308 bytes )
14/04/28 16:01:18 DB : config found
14/04/28 16:01:18 =< : cookies e34379bb847f1e67:ad6db09169ef7b6c
14/04/28 16:01:18 =< : message e0aa41aa
14/04/28 16:01:18 =< : decrypt iv ( 8 bytes )
14/04/28 16:01:18 == : decrypt packet ( 308 bytes )
14/04/28 16:01:18 <= : stored iv ( 8 bytes )
14/04/28 16:01:18 << : hash payload
14/04/28 16:01:18 << : attribute payload
14/04/28 16:01:18 == : configure hash_i ( computed ) ( 16 bytes )
14/04/28 16:01:18 == : configure hash_c ( computed ) ( 16 bytes )
14/04/28 16:01:18 ii : configure hash verified
14/04/28 16:01:18 ii : received config pull response
14/04/28 16:01:18 ii : - IP4 Address = 10.120.2.101
14/04/28 16:01:18 ii : - IP4 Netmask = 255.255.255.0
14/04/28 16:01:18 ii : - IP4 DNS Server = 10.1.4.201
14/04/28 16:01:18 ii : - IP4 DNS Server = 10.1.4.202
14/04/28 16:01:18 ii : - IP4 WINS Server = 10.1.4.201
14/04/28 16:01:18 ii : - Save Password = 0
14/04/28 16:01:18 ii : - IP4 Split Network Include = ANY:10.0.0.0/8:*
14/04/28 16:01:18 ii : - IP4 Split Network Include = ANY:192.168.90.0/24:*
14/04/28 16:01:18 ii : - IP4 Split Network Include = ANY:172.16.30.0/24:*
14/04/28 16:01:18 ii : - IP4 Split Network Include = ANY:192.168.3.0/24:*
14/04/28 16:01:18 ii : - IP4 Split Network Include = ANY:205.197.192.150/32:*
14/04/28 16:01:18 ii : - IP4 Split Network Include = ANY:205.197.192.151/32:*
14/04/28 16:01:18 ii : - DNS Suffix = nuance.com
14/04/28 16:01:18 ii : - PFS Group = 0
14/04/28 16:01:18 ii : - Application Version = Cisco Systems, Inc./VPN
3000 Concentrator Version 4.7.2.P built by vmurphy on Jul 30 2008
17:39:30
14/04/28 16:01:18 DB : config resend event canceled ( ref count = 1 )
14/04/28 16:01:18 ii : enabled adapter ROOT\VNET\0000
14/04/28 16:01:18 ii : adapter ROOT\VNET\0000 unavailable, retrying ...
14/04/28 16:01:19 ii : apapter ROOT\VNET\0000 MTU is 1380
14/04/28 16:01:19 ii : generating IPSEC security policies at REQUIRE level
14/04/28 16:01:19 ii : creating NONE INBOUND policy ANY:210.80.199.3:*
-> ANY:192.168.1.102:*
14/04/28 16:01:19 DB : policy added ( obj count = 1 )
14/04/28 16:01:19 K> : send pfkey X_SPDADD UNSPEC message
14/04/28 16:01:19 K< : recv pfkey X_SPDADD UNSPEC message
14/04/28 16:01:19 DB : policy found
14/04/28 16:01:19 ii : creating NONE OUTBOUND policy
ANY:192.168.1.102:* -> ANY:210.80.199.3:*
14/04/28 16:01:19 ii : created NONE policy route for 210.80.199.3/32
14/04/28 16:01:19 DB : policy added ( obj count = 2 )
14/04/28 16:01:19 K> : send pfkey X_SPDADD UNSPEC message
14/04/28 16:01:19 K< : recv pfkey X_SPDADD UNSPEC message
14/04/28 16:01:19 DB : policy found
14/04/28 16:01:19 ii : creating NONE INBOUND policy ANY:192.168.1.1:*
-> ANY:10.120.2.101:*
14/04/28 16:01:19 DB : policy added ( obj count = 3 )
14/04/28 16:01:19 K> : send pfkey X_SPDADD UNSPEC message
14/04/28 16:01:19 ii : creating NONE OUTBOUND policy
ANY:10.120.2.101:* -> ANY:192.168.1.1:*
14/04/28 16:01:19 DB : policy added ( obj count = 4 )
14/04/28 16:01:19 K< : recv pfkey X_SPDADD UNSPEC message
14/04/28 16:01:19 K> : send pfkey X_SPDADD UNSPEC message
14/04/28 16:01:19 DB : policy found
14/04/28 16:01:19 ii : creating IPSEC INBOUND policy ANY:10.0.0.0/8:*
-> ANY:10.120.2.101:*
14/04/28 16:01:19 DB : policy added ( obj count = 5 )
14/04/28 16:01:19 K> : send pfkey X_SPDADD UNSPEC message
14/04/28 16:01:19 ii : creating IPSEC OUTBOUND policy
ANY:10.120.2.101:* -> ANY:10.0.0.0/8:*
14/04/28 16:01:19 K< : recv pfkey X_SPDADD UNSPEC message
14/04/28 16:01:19 DB : policy found
14/04/28 16:01:19 K< : recv pfkey X_SPDADD UNSPEC message
14/04/28 16:01:19 DB : policy found
14/04/28 16:01:19 ii : created IPSEC policy route for 10.0.0.0/8
14/04/28 16:01:19 DB : policy added ( obj count = 6 )
14/04/28 16:01:19 K> : send pfkey X_SPDADD UNSPEC message
14/04/28 16:01:19 ii : creating IPSEC INBOUND policy
ANY:192.168.90.0/24:* -> ANY:10.120.2.101:*
14/04/28 16:01:19 DB : policy added ( obj count = 7 )
14/04/28 16:01:19 K> : send pfkey X_SPDADD UNSPEC message
14/04/28 16:01:19 ii : creating IPSEC OUTBOUND policy
ANY:10.120.2.101:* -> ANY:192.168.90.0/24:*
14/04/28 16:01:19 K< : recv pfkey X_SPDADD UNSPEC message
14/04/28 16:01:19 DB : policy found
14/04/28 16:01:19 ii : calling init phase2 for initial policy
14/04/28 16:01:19 DB : policy found
14/04/28 16:01:19 DB : policy found
14/04/28 16:01:19 DB : tunnel found
14/04/28 16:01:19 DB : new phase2 ( IPSEC initiator )
14/04/28 16:01:19 DB : phase2 added ( obj count = 1 )
14/04/28 16:01:19 K> : send pfkey GETSPI ESP message
14/04/28 16:01:19 K< : recv pfkey X_SPDADD UNSPEC message
14/04/28 16:01:19 DB : policy found
14/04/28 16:01:19 K< : recv pfkey GETSPI ESP message
14/04/28 16:01:19 DB : phase2 found
14/04/28 16:01:19 ii : updated spi for 1 ipsec-esp proposal
14/04/28 16:01:19 DB : phase1 found
14/04/28 16:01:19 >> : hash payload
14/04/28 16:01:19 >> : security association payload
14/04/28 16:01:19 >> : - proposal #1 payload
14/04/28 16:01:19 >> : -- transform #1 payload
14/04/28 16:01:19 >> : -- transform #2 payload
14/04/28 16:01:19 >> : -- transform #3 payload
14/04/28 16:01:19 >> : -- transform #4 payload
14/04/28 16:01:19 >> : -- transform #5 payload
14/04/28 16:01:19 >> : -- transform #6 payload
14/04/28 16:01:19 >> : -- transform #7 payload
14/04/28 16:01:19 >> : -- transform #8 payload
14/04/28 16:01:19 >> : -- transform #9 payload
14/04/28 16:01:19 >> : -- transform #10 payload
14/04/28 16:01:19 >> : -- transform #11 payload
14/04/28 16:01:19 >> : -- transform #12 payload
14/04/28 16:01:19 >> : -- transform #13 payload
14/04/28 16:01:19 >> : -- transform #14 payload
14/04/28 16:01:19 >> : -- transform #15 payload
14/04/28 16:01:19 >> : -- transform #16 payload
14/04/28 16:01:19 >> : -- transform #17 payload
14/04/28 16:01:19 >> : -- transform #18 payload
14/04/28 16:01:19 >> : -- transform #19 payload
14/04/28 16:01:19 >> : -- transform #20 payload
14/04/28 16:01:19 >> : -- transform #21 payload
14/04/28 16:01:19 >> : -- transform #22 payload
14/04/28 16:01:19 >> : -- transform #23 payload
14/04/28 16:01:19 >> : -- transform #24 payload
14/04/28 16:01:19 >> : -- transform #25 payload
14/04/28 16:01:19 >> : -- transform #26 payload
14/04/28 16:01:19 >> : -- transform #27 payload
14/04/28 16:01:19 >> : -- transform #28 payload
14/04/28 16:01:19 >> : -- transform #29 payload
14/04/28 16:01:19 >> : -- transform #30 payload
14/04/28 16:01:19 >> : -- transform #31 payload
14/04/28 16:01:19 >> : -- transform #32 payload
14/04/28 16:01:19 >> : -- transform #33 payload
14/04/28 16:01:19 >> : -- transform #34 payload
14/04/28 16:01:19 >> : -- transform #35 payload
14/04/28 16:01:19 >> : -- transform #36 payload
14/04/28 16:01:19 >> : -- transform #37 payload
14/04/28 16:01:19 >> : -- transform #38 payload
14/04/28 16:01:19 >> : -- transform #39 payload
14/04/28 16:01:19 >> : -- transform #40 payload
14/04/28 16:01:19 >> : -- transform #41 payload
14/04/28 16:01:19 >> : -- transform #42 payload
14/04/28 16:01:19 >> : -- transform #43 payload
14/04/28 16:01:19 >> : -- transform #44 payload
14/04/28 16:01:19 >> : -- transform #45 payload
14/04/28 16:01:19 >> : nonce payload
14/04/28 16:01:19 >> : identification payload
14/04/28 16:01:19 >> : identification payload
14/04/28 16:01:19 == : phase2 hash_i ( input ) ( 1460 bytes )
14/04/28 16:01:19 == : phase2 hash_i ( computed ) ( 16 bytes )
14/04/28 16:01:19 == : new phase2 iv ( 8 bytes )
14/04/28 16:01:19 >= : cookies e34379bb847f1e67:ad6db09169ef7b6c
14/04/28 16:01:19 >= : message 35e1b7ac
14/04/28 16:01:19 >= : encrypt iv ( 8 bytes )
14/04/28 16:01:19 == : encrypt packet ( 1504 bytes )
14/04/28 16:01:19 == : stored iv ( 8 bytes )
14/04/28 16:01:19 -> : send NAT-T:IKE packet 192.168.1.102:4500 ->
210.80.199.3:4500 ( 1540 bytes )
14/04/28 16:01:19 ii : fragmented packet to 1514 bytes ( MTU 1500 bytes )
14/04/28 16:01:19 ii : fragmented packet to 74 bytes ( MTU 1500 bytes )
14/04/28 16:01:19 DB : phase2 resend event scheduled ( ref count = 2 )
14/04/28 16:01:19 ii : created IPSEC policy route for 192.168.90.0/24
14/04/28 16:01:19 DB : policy added ( obj count = 8 )
14/04/28 16:01:19 K> : send pfkey X_SPDADD UNSPEC message
14/04/28 16:01:19 ii : creating IPSEC INBOUND policy
ANY:172.16.30.0/24:* -> ANY:10.120.2.101:*
14/04/28 16:01:19 DB : policy added ( obj count = 9 )
14/04/28 16:01:19 K> : send pfkey X_SPDADD UNSPEC message
14/04/28 16:01:19 ii : creating IPSEC OUTBOUND policy
ANY:10.120.2.101:* -> ANY:172.16.30.0/24:*
14/04/28 16:01:19 K< : recv pfkey X_SPDADD UNSPEC message
14/04/28 16:01:19 DB : policy found
14/04/28 16:01:19 K< : recv pfkey X_SPDADD UNSPEC message
14/04/28 16:01:19 DB : policy found
14/04/28 16:01:19 ii : created IPSEC policy route for 172.16.30.0/24
14/04/28 16:01:19 DB : policy added ( obj count = 10 )
14/04/28 16:01:19 K> : send pfkey X_SPDADD UNSPEC message
14/04/28 16:01:19 ii : creating IPSEC INBOUND policy
ANY:192.168.3.0/24:* -> ANY:10.120.2.101:*
14/04/28 16:01:19 DB : policy added ( obj count = 11 )
14/04/28 16:01:19 K> : send pfkey X_SPDADD UNSPEC message
14/04/28 16:01:19 ii : creating IPSEC OUTBOUND policy
ANY:10.120.2.101:* -> ANY:192.168.3.0/24:*
14/04/28 16:01:19 K< : recv pfkey X_SPDADD UNSPEC message
14/04/28 16:01:19 DB : policy found
14/04/28 16:01:19 K< : recv pfkey X_SPDADD UNSPEC message
14/04/28 16:01:19 DB : policy found
14/04/28 16:01:19 ii : created IPSEC policy route for 192.168.3.0/24
14/04/28 16:01:19 DB : policy added ( obj count = 12 )
14/04/28 16:01:19 K> : send pfkey X_SPDADD UNSPEC message
14/04/28 16:01:19 ii : creating IPSEC INBOUND policy
ANY:205.197.192.150/32:* -> ANY:10.120.2.101:*
14/04/28 16:01:19 DB : policy added ( obj count = 13 )
14/04/28 16:01:19 K> : send pfkey X_SPDADD UNSPEC message
14/04/28 16:01:19 ii : creating IPSEC OUTBOUND policy
ANY:10.120.2.101:* -> ANY:205.197.192.150/32:*
14/04/28 16:01:19 K< : recv pfkey X_SPDADD UNSPEC message
14/04/28 16:01:19 DB : policy found
14/04/28 16:01:19 K< : recv pfkey X_SPDADD UNSPEC message
14/04/28 16:01:19 DB : policy found
14/04/28 16:01:19 ii : created IPSEC policy route for 205.197.192.150/32
14/04/28 16:01:19 DB : policy added ( obj count = 14 )
14/04/28 16:01:19 K> : send pfkey X_SPDADD UNSPEC message
14/04/28 16:01:19 ii : creating IPSEC INBOUND policy
ANY:205.197.192.151/32:* -> ANY:10.120.2.101:*
14/04/28 16:01:19 DB : policy added ( obj count = 15 )
14/04/28 16:01:19 K> : send pfkey X_SPDADD UNSPEC message
14/04/28 16:01:19 ii : creating IPSEC OUTBOUND policy
ANY:10.120.2.101:* -> ANY:205.197.192.151/32:*
14/04/28 16:01:19 K< : recv pfkey X_SPDADD UNSPEC message
14/04/28 16:01:19 DB : policy found
14/04/28 16:01:19 K< : recv pfkey X_SPDADD UNSPEC message
14/04/28 16:01:19 DB : policy found
14/04/28 16:01:19 ii : created IPSEC policy route for 205.197.192.151/32
14/04/28 16:01:19 DB : policy added ( obj count = 16 )
14/04/28 16:01:19 K> : send pfkey X_SPDADD UNSPEC message
14/04/28 16:01:19 K< : recv pfkey X_SPDADD UNSPEC message
14/04/28 16:01:19 DB : policy found
14/04/28 16:01:19 ii : split DNS is disabled
14/04/28 16:01:22 K< : recv pfkey ACQUIRE UNSPEC message
14/04/28 16:01:22 DB : policy found
14/04/28 16:01:22 DB : policy found
14/04/28 16:01:22 DB : tunnel found
14/04/28 16:01:22 DB : new phase2 ( IPSEC initiator )
14/04/28 16:01:22 DB : phase2 added ( obj count = 2 )
14/04/28 16:01:22 K> : send pfkey GETSPI ESP message
14/04/28 16:01:22 K< : recv pfkey GETSPI ESP message
14/04/28 16:01:22 DB : phase2 found
14/04/28 16:01:22 ii : updated spi for 1 ipsec-esp proposal
14/04/28 16:01:22 DB : phase1 found
14/04/28 16:01:22 >> : hash payload
14/04/28 16:01:22 >> : security association payload
14/04/28 16:01:22 >> : - proposal #1 payload
14/04/28 16:01:22 >> : -- transform #1 payload
14/04/28 16:01:22 >> : -- transform #2 payload
14/04/28 16:01:22 >> : -- transform #3 payload
14/04/28 16:01:22 >> : -- transform #4 payload
14/04/28 16:01:22 >> : -- transform #5 payload
14/04/28 16:01:22 >> : -- transform #6 payload
14/04/28 16:01:22 >> : -- transform #7 payload
14/04/28 16:01:22 >> : -- transform #8 payload
14/04/28 16:01:22 >> : -- transform #9 payload
14/04/28 16:01:22 >> : -- transform #10 payload
14/04/28 16:01:22 >> : -- transform #11 payload
14/04/28 16:01:22 >> : -- transform #12 payload
14/04/28 16:01:22 >> : -- transform #13 payload
14/04/28 16:01:22 >> : -- transform #14 payload
14/04/28 16:01:22 >> : -- transform #15 payload
14/04/28 16:01:22 >> : -- transform #16 payload
14/04/28 16:01:22 >> : -- transform #17 payload
14/04/28 16:01:22 >> : -- transform #18 payload
14/04/28 16:01:22 >> : -- transform #19 payload
14/04/28 16:01:22 >> : -- transform #20 payload
14/04/28 16:01:22 >> : -- transform #21 payload
14/04/28 16:01:22 >> : -- transform #22 payload
14/04/28 16:01:22 >> : -- transform #23 payload
14/04/28 16:01:22 >> : -- transform #24 payload
14/04/28 16:01:22 >> : -- transform #25 payload
14/04/28 16:01:22 >> : -- transform #26 payload
14/04/28 16:01:22 >> : -- transform #27 payload
14/04/28 16:01:22 >> : -- transform #28 payload
14/04/28 16:01:22 >> : -- transform #29 payload
14/04/28 16:01:22 >> : -- transform #30 payload
14/04/28 16:01:22 >> : -- transform #31 payload
14/04/28 16:01:22 >> : -- transform #32 payload
14/04/28 16:01:22 >> : -- transform #33 payload
14/04/28 16:01:22 >> : -- transform #34 payload
14/04/28 16:01:22 >> : -- transform #35 payload
14/04/28 16:01:22 >> : -- transform #36 payload
14/04/28 16:01:22 >> : -- transform #37 payload
14/04/28 16:01:22 >> : -- transform #38 payload
14/04/28 16:01:22 >> : -- transform #39 payload
14/04/28 16:01:22 >> : -- transform #40 payload
14/04/28 16:01:22 >> : -- transform #41 payload
14/04/28 16:01:22 >> : -- transform #42 payload
14/04/28 16:01:22 >> : -- transform #43 payload
14/04/28 16:01:22 >> : -- transform #44 payload
14/04/28 16:01:22 >> : -- transform #45 payload
14/04/28 16:01:22 >> : nonce payload
14/04/28 16:01:22 >> : identification payload
14/04/28 16:01:22 >> : identification payload
14/04/28 16:01:22 == : phase2 hash_i ( input ) ( 1460 bytes )
14/04/28 16:01:22 == : phase2 hash_i ( computed ) ( 16 bytes )
14/04/28 16:01:22 == : new phase2 iv ( 8 bytes )
14/04/28 16:01:22 >= : cookies e34379bb847f1e67:ad6db09169ef7b6c
14/04/28 16:01:22 >= : message 060ed663
14/04/28 16:01:22 >= : encrypt iv ( 8 bytes )
14/04/28 16:01:22 == : encrypt packet ( 1504 bytes )
14/04/28 16:01:22 == : stored iv ( 8 bytes )
14/04/28 16:01:22 -> : send NAT-T:IKE packet 192.168.1.102:4500 ->
210.80.199.3:4500 ( 1540 bytes )
14/04/28 16:01:22 ii : fragmented packet to 1514 bytes ( MTU 1500 bytes )
14/04/28 16:01:22 ii : fragmented packet to 74 bytes ( MTU 1500 bytes )
14/04/28 16:01:22 DB : phase2 resend event scheduled ( ref count = 2 )
14/04/28 16:01:24 ii : fragmented packet to 1514 bytes ( MTU 1500 bytes )
14/04/28 16:01:24 ii : fragmented packet to 74 bytes ( MTU 1500 bytes )
14/04/28 16:01:24 -> : resend 1 phase2 packet(s) [0/2]
192.168.1.102:4500 -> 210.80.199.3:4500
14/04/28 16:01:26 <- : recv NAT-T:IKE packet 210.80.199.3:4500 ->
192.168.1.102:4500 ( 308 bytes )
14/04/28 16:01:26 DB : phase1 found
14/04/28 16:01:26 ii : processing config packet ( 308 bytes )
14/04/28 16:01:26 DB : config found
14/04/28 16:01:26 !! : config packet ignored ( config already mature )
14/04/28 16:01:27 ii : fragmented packet to 1514 bytes ( MTU 1500 bytes )
14/04/28 16:01:27 ii : fragmented packet to 74 bytes ( MTU 1500 bytes )
14/04/28 16:01:27 -> : resend 1 phase2 packet(s) [0/2]
192.168.1.102:4500 -> 210.80.199.3:4500
14/04/28 16:01:29 ii : fragmented packet to 1514 bytes ( MTU 1500 bytes )
14/04/28 16:01:29 ii : fragmented packet to 74 bytes ( MTU 1500 bytes )
14/04/28 16:01:29 -> : resend 1 phase2 packet(s) [1/2]
192.168.1.102:4500 -> 210.80.199.3:4500
14/04/28 16:01:31 DB : phase1 found
14/04/28 16:01:31 ii : sending peer DPDV1-R-U-THERE notification
14/04/28 16:01:31 ii : - 192.168.1.102:4500 -> 210.80.199.3:4500
14/04/28 16:01:31 ii : - isakmp spi = e34379bb847f1e67:ad6db09169ef7b6c
14/04/28 16:01:31 ii : - data size 4
14/04/28 16:01:31 >> : hash payload
14/04/28 16:01:31 >> : notification payload
14/04/28 16:01:31 == : new informational hash ( 16 bytes )
14/04/28 16:01:31 == : new informational iv ( 8 bytes )
14/04/28 16:01:31 >= : cookies e34379bb847f1e67:ad6db09169ef7b6c
14/04/28 16:01:31 >= : message a88c4533
14/04/28 16:01:31 >= : encrypt iv ( 8 bytes )
14/04/28 16:01:31 == : encrypt packet ( 80 bytes )
14/04/28 16:01:31 == : stored iv ( 8 bytes )
14/04/28 16:01:31 -> : send NAT-T:IKE packet 192.168.1.102:4500 ->
210.80.199.3:4500 ( 116 bytes )
14/04/28 16:01:31 ii : DPD ARE-YOU-THERE sequence 2c31ecba requested
14/04/28 16:01:31 DB : phase1 found
14/04/28 16:01:31 -> : send NAT-T:KEEP-ALIVE packet 192.168.1.102:4500
-> 210.80.199.3:4500
14/04/28 16:01:32 ii : fragmented packet to 1514 bytes ( MTU 1500 bytes )
14/04/28 16:01:32 ii : fragmented packet to 74 bytes ( MTU 1500 bytes )
14/04/28 16:01:32 -> : resend 1 phase2 packet(s) [1/2]
192.168.1.102:4500 -> 210.80.199.3:4500
14/04/28 16:01:34 <- : recv NAT-T:IKE packet 210.80.199.3:4500 ->
192.168.1.102:4500 ( 308 bytes )
14/04/28 16:01:34 DB : phase1 found
14/04/28 16:01:34 ii : processing config packet ( 308 bytes )
14/04/28 16:01:34 DB : config found
14/04/28 16:01:34 !! : config packet ignored ( config already mature )
14/04/28 16:01:34 ii : fragmented packet to 1514 bytes ( MTU 1500 bytes )
14/04/28 16:01:34 ii : fragmented packet to 74 bytes ( MTU 1500 bytes )
14/04/28 16:01:34 -> : resend 1 phase2 packet(s) [2/2]
192.168.1.102:4500 -> 210.80.199.3:4500
14/04/28 16:01:37 ii : fragmented packet to 1514 bytes ( MTU 1500 bytes )
14/04/28 16:01:37 ii : fragmented packet to 74 bytes ( MTU 1500 bytes )
14/04/28 16:01:37 -> : resend 1 phase2 packet(s) [2/2]
192.168.1.102:4500 -> 210.80.199.3:4500
14/04/28 16:01:39 ii : resend limit exceeded for phase2 exchange
14/04/28 16:01:39 ii : phase2 removal before expire time
14/04/28 16:01:39 DB : phase2 deleted ( obj count = 1 )
14/04/28 16:01:39 K< : recv pfkey ACQUIRE UNSPEC message
14/04/28 16:01:39 DB : policy found
14/04/28 16:01:39 DB : policy found
14/04/28 16:01:39 DB : tunnel found
14/04/28 16:01:39 DB : new phase2 ( IPSEC initiator )
14/04/28 16:01:39 DB : phase2 added ( obj count = 2 )
14/04/28 16:01:39 K> : send pfkey GETSPI ESP message
14/04/28 16:01:39 K< : recv pfkey GETSPI ESP message
14/04/28 16:01:39 DB : phase2 found
14/04/28 16:01:39 ii : updated spi for 1 ipsec-esp proposal
14/04/28 16:01:39 DB : phase1 found
14/04/28 16:01:39 >> : hash payload
14/04/28 16:01:39 >> : security association payload
14/04/28 16:01:39 >> : - proposal #1 payload
14/04/28 16:01:39 >> : -- transform #1 payload
14/04/28 16:01:39 >> : -- transform #2 payload
14/04/28 16:01:39 >> : -- transform #3 payload
14/04/28 16:01:39 >> : -- transform #4 payload
14/04/28 16:01:39 >> : -- transform #5 payload
14/04/28 16:01:39 >> : -- transform #6 payload
14/04/28 16:01:39 >> : -- transform #7 payload
14/04/28 16:01:39 >> : -- transform #8 payload
14/04/28 16:01:39 >> : -- transform #9 payload
14/04/28 16:01:39 >> : -- transform #10 payload
14/04/28 16:01:39 >> : -- transform #11 payload
14/04/28 16:01:39 >> : -- transform #12 payload
14/04/28 16:01:39 >> : -- transform #13 payload
14/04/28 16:01:39 >> : -- transform #14 payload
14/04/28 16:01:39 >> : -- transform #15 payload
14/04/28 16:01:39 >> : -- transform #16 payload
14/04/28 16:01:39 >> : -- transform #17 payload
14/04/28 16:01:39 >> : -- transform #18 payload
14/04/28 16:01:39 >> : -- transform #19 payload
14/04/28 16:01:39 >> : -- transform #20 payload
14/04/28 16:01:39 >> : -- transform #21 payload
14/04/28 16:01:39 >> : -- transform #22 payload
14/04/28 16:01:39 >> : -- transform #23 payload
14/04/28 16:01:39 >> : -- transform #24 payload
14/04/28 16:01:39 >> : -- transform #25 payload
14/04/28 16:01:39 >> : -- transform #26 payload
14/04/28 16:01:39 >> : -- transform #27 payload
14/04/28 16:01:39 >> : -- transform #28 payload
14/04/28 16:01:39 >> : -- transform #29 payload
14/04/28 16:01:39 >> : -- transform #30 payload
14/04/28 16:01:39 >> : -- transform #31 payload
14/04/28 16:01:39 >> : -- transform #32 payload
14/04/28 16:01:39 >> : -- transform #33 payload
14/04/28 16:01:39 >> : -- transform #34 payload
14/04/28 16:01:39 >> : -- transform #35 payload
14/04/28 16:01:39 >> : -- transform #36 payload
14/04/28 16:01:39 >> : -- transform #37 payload
14/04/28 16:01:39 >> : -- transform #38 payload
14/04/28 16:01:39 >> : -- transform #39 payload
14/04/28 16:01:39 >> : -- transform #40 payload
14/04/28 16:01:39 >> : -- transform #41 payload
14/04/28 16:01:39 >> : -- transform #42 payload
14/04/28 16:01:39 >> : -- transform #43 payload
14/04/28 16:01:39 >> : -- transform #44 payload
14/04/28 16:01:39 >> : -- transform #45 payload
14/04/28 16:01:39 >> : nonce payload
14/04/28 16:01:39 >> : identification payload
14/04/28 16:01:39 >> : identification payload
14/04/28 16:01:39 == : phase2 hash_i ( input ) ( 1460 bytes )
14/04/28 16:01:39 == : phase2 hash_i ( computed ) ( 16 bytes )
14/04/28 16:01:39 == : new phase2 iv ( 8 bytes )
14/04/28 16:01:39 >= : cookies e34379bb847f1e67:ad6db09169ef7b6c
14/04/28 16:01:39 >= : message 1f2203c4
14/04/28 16:01:39 >= : encrypt iv ( 8 bytes )
14/04/28 16:01:39 == : encrypt packet ( 1504 bytes )
14/04/28 16:01:39 == : stored iv ( 8 bytes )
14/04/28 16:01:39 -> : send NAT-T:IKE packet 192.168.1.102:4500 ->
210.80.199.3:4500 ( 1540 bytes )
14/04/28 16:01:39 ii : fragmented packet to 1514 bytes ( MTU 1500 bytes )
14/04/28 16:01:39 ii : fragmented packet to 74 bytes ( MTU 1500 bytes )
14/04/28 16:01:39 DB : phase2 resend event scheduled ( ref count = 2 )
14/04/28 16:01:42 <- : recv NAT-T:IKE packet 210.80.199.3:4500 ->
192.168.1.102:4500 ( 308 bytes )
14/04/28 16:01:42 DB : phase1 found
14/04/28 16:01:42 ii : processing config packet ( 308 bytes )
14/04/28 16:01:42 DB : config found
14/04/28 16:01:42 !! : config packet ignored ( config already mature )
14/04/28 16:01:42 ii : resend limit exceeded for phase2 exchange
14/04/28 16:01:42 ii : phase2 removal before expire time
14/04/28 16:01:42 DB : phase2 deleted ( obj count = 1 )
14/04/28 16:01:44 ii : fragmented packet to 1514 bytes ( MTU 1500 bytes )
14/04/28 16:01:44 ii : fragmented packet to 74 bytes ( MTU 1500 bytes )
14/04/28 16:01:44 -> : resend 1 phase2 packet(s) [0/2]
192.168.1.102:4500 -> 210.80.199.3:4500
14/04/28 16:01:46 DB : phase1 found
14/04/28 16:01:46 -> : send NAT-T:KEEP-ALIVE packet 192.168.1.102:4500
-> 210.80.199.3:4500
14/04/28 16:01:46 DB : phase1 found
14/04/28 16:01:46 ii : next tunnel DPD retry in 4 secs for peer
210.80.199.3:4500
14/04/28 16:01:46 ii : sending peer DPDV1-R-U-THERE notification
14/04/28 16:01:46 ii : - 192.168.1.102:4500 -> 210.80.199.3:4500
14/04/28 16:01:46 ii : - isakmp spi = e34379bb847f1e67:ad6db09169ef7b6c
14/04/28 16:01:46 ii : - data size 4
14/04/28 16:01:46 >> : hash payload
14/04/28 16:01:46 >> : notification payload
14/04/28 16:01:46 == : new informational hash ( 16 bytes )
14/04/28 16:01:46 == : new informational iv ( 8 bytes )
14/04/28 16:01:46 >= : cookies e34379bb847f1e67:ad6db09169ef7b6c
14/04/28 16:01:46 >= : message b714ac10
14/04/28 16:01:46 >= : encrypt iv ( 8 bytes )
14/04/28 16:01:46 == : encrypt packet ( 80 bytes )
14/04/28 16:01:46 == : stored iv ( 8 bytes )
14/04/28 16:01:46 -> : send NAT-T:IKE packet 192.168.1.102:4500 ->
210.80.199.3:4500 ( 116 bytes )
14/04/28 16:01:46 ii : DPD ARE-YOU-THERE sequence 2c31ecbb requested
14/04/28 16:01:49 ii : fragmented packet to 1514 bytes ( MTU 1500 bytes )
14/04/28 16:01:49 ii : fragmented packet to 74 bytes ( MTU 1500 bytes )
14/04/28 16:01:49 -> : resend 1 phase2 packet(s) [1/2]
192.168.1.102:4500 -> 210.80.199.3:4500
14/04/28 16:01:50 DB : phase1 found
14/04/28 16:01:50 ii : next tunnel DPD retry in 3 secs for peer
210.80.199.3:4500
14/04/28 16:01:50 ii : sending peer DPDV1-R-U-THERE notification
14/04/28 16:01:50 ii : - 192.168.1.102:4500 -> 210.80.199.3:4500
14/04/28 16:01:50 ii : - isakmp spi = e34379bb847f1e67:ad6db09169ef7b6c
14/04/28 16:01:50 ii : - data size 4
14/04/28 16:01:50 <- : recv NAT-T:IKE packet 210.80.199.3:4500 ->
192.168.1.102:4500 ( 76 bytes )
14/04/28 16:01:50 >> : hash payload
14/04/28 16:01:50 DB : phase1 found
14/04/28 16:01:50 >> : notification payload
14/04/28 16:01:50 ii : processing informational packet ( 76 bytes )
14/04/28 16:01:50 == : new informational hash ( 16 bytes )
14/04/28 16:01:50 == : new informational iv ( 8 bytes )
14/04/28 16:01:50 == : new informational iv ( 8 bytes )
14/04/28 16:01:50 =< : cookies e34379bb847f1e67:ad6db09169ef7b6c
14/04/28 16:01:50 >= : cookies e34379bb847f1e67:ad6db09169ef7b6c
14/04/28 16:01:50 =< : message 05530e94
14/04/28 16:01:50 >= : message f9a3f68d
14/04/28 16:01:50 =< : decrypt iv ( 8 bytes )
14/04/28 16:01:50 >= : encrypt iv ( 8 bytes )
14/04/28 16:01:50 == : decrypt packet ( 76 bytes )
14/04/28 16:01:50 == : encrypt packet ( 80 bytes )
14/04/28 16:01:50 <= : stored iv ( 8 bytes )
14/04/28 16:01:50 == : stored iv ( 8 bytes )
14/04/28 16:01:50 << : hash payload
14/04/28 16:01:50 -> : send NAT-T:IKE packet 192.168.1.102:4500 ->
210.80.199.3:4500 ( 116 bytes )
14/04/28 16:01:50 << : delete payload
14/04/28 16:01:50 == : informational hash_i ( computed ) ( 16 bytes )
14/04/28 16:01:50 == : informational hash_c ( received ) ( 16 bytes )
14/04/28 16:01:50 ii : informational hash verified
14/04/28 16:01:50 ii : received peer DELETE message
14/04/28 16:01:50 ii : - 210.80.199.3:4500 -> 192.168.1.102:4500
14/04/28 16:01:50 ii : - isakmp spi = e34379bb847f1e67:ad6db09169ef7b6c
14/04/28 16:01:50 DB : phase1 found
14/04/28 16:01:50 ii : cleanup, marked phase1
e34379bb847f1e67:ad6db09169ef7b6c for removal
14/04/28 16:01:50 DB : phase1 soft event canceled ( ref count = 5 )
14/04/28 16:01:50 DB : phase1 hard event canceled ( ref count = 4 )
14/04/28 16:01:50 DB : phase1 dead event canceled ( ref count = 3 )
14/04/28 16:01:50 DB : config deleted ( obj count = 0 )
14/04/28 16:01:50 ii : phase1 removal before expire time
14/04/28 16:01:50 DB : phase1 not found
14/04/28 16:01:50 DB : policy found
14/04/28 16:01:50 ii : removing IPSEC INBOUND policy ANY:10.0.0.0/8:*
-> ANY:10.120.2.101:*
14/04/28 16:01:50 K> : send pfkey X_SPDDELETE2 UNSPEC message
14/04/28 16:01:50 DB : policy found
14/04/28 16:01:50 ii : removing IPSEC OUTBOUND policy
ANY:10.120.2.101:* -> ANY:10.0.0.0/8:*
14/04/28 16:01:50 K> : send pfkey X_SPDDELETE2 UNSPEC message
14/04/28 16:01:50 K< : recv pfkey X_SPDDELETE2 UNSPEC message
14/04/28 16:01:50 ii : DPD ARE-YOU-THERE sequence 2c31ecbc requested
14/04/28 16:01:50 ii : removed IPSEC policy route for ANY:10.0.0.0/8:*
14/04/28 16:01:50 DB : policy found
14/04/28 16:01:50 ii : removing IPSEC INBOUND policy
ANY:192.168.90.0/24:* -> ANY:10.120.2.101:*
14/04/28 16:01:50 K> : send pfkey X_SPDDELETE2 UNSPEC message
14/04/28 16:01:50 DB : policy found
14/04/28 16:01:50 ii : removing IPSEC OUTBOUND policy
ANY:10.120.2.101:* -> ANY:192.168.90.0/24:*
14/04/28 16:01:50 K> : send pfkey X_SPDDELETE2 UNSPEC message
14/04/28 16:01:50 ii : removed IPSEC policy route for ANY:192.168.90.0/24:*
14/04/28 16:01:50 DB : policy found
14/04/28 16:01:50 ii : removing IPSEC INBOUND policy
ANY:172.16.30.0/24:* -> ANY:10.120.2.101:*
14/04/28 16:01:50 K> : send pfkey X_SPDDELETE2 UNSPEC message
14/04/28 16:01:50 DB : policy found
14/04/28 16:01:50 ii : removing IPSEC OUTBOUND policy
ANY:10.120.2.101:* -> ANY:172.16.30.0/24:*
14/04/28 16:01:50 K> : send pfkey X_SPDDELETE2 UNSPEC message
14/04/28 16:01:50 ii : removed IPSEC policy route for ANY:172.16.30.0/24:*
14/04/28 16:01:50 DB : policy found
14/04/28 16:01:50 ii : removing IPSEC INBOUND policy
ANY:192.168.3.0/24:* -> ANY:10.120.2.101:*
14/04/28 16:01:50 K> : send pfkey X_SPDDELETE2 UNSPEC message
14/04/28 16:01:50 DB : policy found
14/04/28 16:01:50 ii : removing IPSEC OUTBOUND policy
ANY:10.120.2.101:* -> ANY:192.168.3.0/24:*
14/04/28 16:01:50 K> : send pfkey X_SPDDELETE2 UNSPEC message
14/04/28 16:01:50 ii : removed IPSEC policy route for ANY:192.168.3.0/24:*
14/04/28 16:01:50 DB : policy found
14/04/28 16:01:50 ii : removing IPSEC INBOUND policy
ANY:205.197.192.150/32:* -> ANY:10.120.2.101:*
14/04/28 16:01:50 K> : send pfkey X_SPDDELETE2 UNSPEC message
14/04/28 16:01:50 DB : policy found
14/04/28 16:01:50 ii : removing IPSEC OUTBOUND policy
ANY:10.120.2.101:* -> ANY:205.197.192.150/32:*
14/04/28 16:01:50 K> : send pfkey X_SPDDELETE2 UNSPEC message
14/04/28 16:01:50 ii : removed IPSEC policy route for ANY:205.197.192.150/32:*
14/04/28 16:01:50 DB : policy found
14/04/28 16:01:50 ii : removing IPSEC INBOUND policy
ANY:205.197.192.151/32:* -> ANY:10.120.2.101:*
14/04/28 16:01:50 K> : send pfkey X_SPDDELETE2 UNSPEC message
14/04/28 16:01:50 DB : policy found
14/04/28 16:01:50 ii : removing IPSEC OUTBOUND policy
ANY:10.120.2.101:* -> ANY:205.197.192.151/32:*
14/04/28 16:01:50 K> : send pfkey X_SPDDELETE2 UNSPEC message
14/04/28 16:01:50 ii : removed IPSEC policy route for ANY:205.197.192.151/32:*
14/04/28 16:01:50 DB : policy found
14/04/28 16:01:50 ii : removing NONE INBOUND policy ANY:192.168.1.1:*
-> ANY:10.120.2.101:*
14/04/28 16:01:50 K> : send pfkey X_SPDDELETE2 UNSPEC message
14/04/28 16:01:50 DB : policy found
14/04/28 16:01:50 ii : removing NONE OUTBOUND policy
ANY:10.120.2.101:* -> ANY:192.168.1.1:*
14/04/28 16:01:50 K> : send pfkey X_SPDDELETE2 UNSPEC message
14/04/28 16:01:50 DB : policy found
14/04/28 16:01:50 ii : removing NONE INBOUND policy ANY:210.80.199.3:*
-> ANY:192.168.1.102:*
14/04/28 16:01:50 K> : send pfkey X_SPDDELETE2 UNSPEC message
14/04/28 16:01:50 DB : policy found
14/04/28 16:01:50 ii : removing NONE OUTBOUND policy
ANY:192.168.1.102:* -> ANY:210.80.199.3:*
14/04/28 16:01:50 K> : send pfkey X_SPDDELETE2 UNSPEC message
14/04/28 16:01:50 ii : removed NONE policy route for ANY:210.80.199.3:*
14/04/28 16:01:50 DB : policy found
14/04/28 16:01:50 DB : phase1 deleted ( obj count = 0 )
14/04/28 16:01:50 DB : policy deleted ( obj count = 15 )
14/04/28 16:01:50 K< : recv pfkey X_SPDDELETE2 UNSPEC message
14/04/28 16:01:50 DB : policy found
14/04/28 16:01:50 DB : policy deleted ( obj count = 14 )
14/04/28 16:01:50 K< : recv pfkey X_SPDDELETE2 UNSPEC message
14/04/28 16:01:50 DB : policy found
14/04/28 16:01:50 DB : policy deleted ( obj count = 13 )
14/04/28 16:01:50 K< : recv pfkey X_SPDDELETE2 UNSPEC message
14/04/28 16:01:50 DB : policy found
14/04/28 16:01:50 DB : policy deleted ( obj count = 12 )
14/04/28 16:01:50 K< : recv pfkey X_SPDDELETE2 UNSPEC message
14/04/28 16:01:50 DB : policy found
14/04/28 16:01:50 DB : policy deleted ( obj count = 11 )
14/04/28 16:01:50 K< : recv pfkey X_SPDDELETE2 UNSPEC message
14/04/28 16:01:50 DB : policy found
14/04/28 16:01:50 DB : policy deleted ( obj count = 10 )
14/04/28 16:01:50 K< : recv pfkey X_SPDDELETE2 UNSPEC message
14/04/28 16:01:50 DB : policy found
14/04/28 16:01:50 DB : policy deleted ( obj count = 9 )
14/04/28 16:01:50 K< : recv pfkey X_SPDDELETE2 UNSPEC message
14/04/28 16:01:50 DB : policy found
14/04/28 16:01:50 DB : policy deleted ( obj count = 8 )
14/04/28 16:01:50 K< : recv pfkey X_SPDDELETE2 UNSPEC message
14/04/28 16:01:50 DB : policy found
14/04/28 16:01:50 DB : policy deleted ( obj count = 7 )
14/04/28 16:01:50 K< : recv pfkey X_SPDDELETE2 UNSPEC message
14/04/28 16:01:50 DB : policy found
14/04/28 16:01:50 DB : policy deleted ( obj count = 6 )
14/04/28 16:01:50 K< : recv pfkey X_SPDDELETE2 UNSPEC message
14/04/28 16:01:50 DB : policy found
14/04/28 16:01:50 DB : policy deleted ( obj count = 5 )
14/04/28 16:01:50 K< : recv pfkey X_SPDDELETE2 UNSPEC message
14/04/28 16:01:50 DB : policy found
14/04/28 16:01:50 DB : policy deleted ( obj count = 4 )
14/04/28 16:01:50 K< : recv pfkey X_SPDDELETE2 UNSPEC message
14/04/28 16:01:50 DB : policy found
14/04/28 16:01:50 DB : policy deleted ( obj count = 3 )
14/04/28 16:01:50 K< : recv pfkey X_SPDDELETE2 UNSPEC message
14/04/28 16:01:50 DB : policy found
14/04/28 16:01:50 DB : policy deleted ( obj count = 2 )
14/04/28 16:01:50 K< : recv pfkey X_SPDDELETE2 UNSPEC message
14/04/28 16:01:50 DB : policy found
14/04/28 16:01:50 DB : policy deleted ( obj count = 1 )
14/04/28 16:01:50 K< : recv pfkey X_SPDDELETE2 UNSPEC message
14/04/28 16:01:50 DB : policy found
14/04/28 16:01:50 DB : policy deleted ( obj count = 0 )
14/04/28 16:01:50 ii : disable adapter ROOT\VNET\0000
14/04/28 16:01:50 DB : tunnel dpd event canceled ( ref count = 4 )
14/04/28 16:01:50 DB : tunnel natt event canceled ( ref count = 3 )
14/04/28 16:01:50 DB : tunnel stats event canceled ( ref count = 2 )
14/04/28 16:01:50 DB : removing tunnel config references
14/04/28 16:01:50 DB : removing tunnel phase2 references
14/04/28 16:01:50 DB : phase2 resend event canceled ( ref count = 1 )
14/04/28 16:01:50 ii : phase2 removal before expire time
14/04/28 16:01:50 DB : phase2 deleted ( obj count = 0 )
14/04/28 16:01:50 DB : removing tunnel phase1 references
14/04/28 16:01:50 DB : tunnel deleted ( obj count = 0 )
14/04/28 16:01:50 DB : removing all peer tunnel references
14/04/28 16:01:50 DB : peer deleted ( obj count = 0 )
14/04/28 16:01:50 ii : ipc client process thread exit ...
14/04/28 16:01:50 ii : ipc client process thread begin ...
14/04/28 16:01:50 <A : peer config add message
14/04/28 16:01:50 <A : proposal config message
14/04/28 16:01:50 <A : proposal config message
14/04/28 16:01:50 <A : client config message
14/04/28 16:01:50 <A : xauth username message
14/04/28 16:01:50 <A : xauth password message
14/04/28 16:01:50 <A : local id 'ScanSoft' message
14/04/28 16:01:50 <A : preshared key message
14/04/28 16:01:50 <A : peer tunnel enable message
14/04/28 16:01:50 DB : peer added ( obj count = 1 )
14/04/28 16:01:50 ii : local address 192.168.1.102 selected for peer
14/04/28 16:01:50 DB : tunnel added ( obj count = 1 )
14/04/28 16:01:50 DB : new phase1 ( ISAKMP initiator )
14/04/28 16:01:50 DB : exchange type is aggressive
14/04/28 16:01:50 DB : 192.168.1.102:500 <-> 210.80.199.3:500
14/04/28 16:01:50 DB : 535d7c927b085b2c:0000000000000000
14/04/28 16:01:50 DB : phase1 added ( obj count = 1 )
14/04/28 16:01:50 >> : security association payload
14/04/28 16:01:50 >> : - proposal #1 payload
14/04/28 16:01:50 >> : -- transform #1 payload
14/04/28 16:01:50 >> : -- transform #2 payload
14/04/28 16:01:50 >> : -- transform #3 payload
14/04/28 16:01:50 >> : -- transform #4 payload
14/04/28 16:01:50 >> : -- transform #5 payload
14/04/28 16:01:50 >> : -- transform #6 payload
14/04/28 16:01:50 >> : -- transform #7 payload
14/04/28 16:01:50 >> : -- transform #8 payload
14/04/28 16:01:50 >> : -- transform #9 payload
14/04/28 16:01:50 >> : -- transform #10 payload
14/04/28 16:01:50 >> : -- transform #11 payload
14/04/28 16:01:50 >> : -- transform #12 payload
14/04/28 16:01:50 >> : -- transform #13 payload
14/04/28 16:01:50 >> : -- transform #14 payload
14/04/28 16:01:50 >> : -- transform #15 payload
14/04/28 16:01:50 >> : -- transform #16 payload
14/04/28 16:01:50 >> : -- transform #17 payload
14/04/28 16:01:50 >> : -- transform #18 payload
14/04/28 16:01:50 >> : key exchange payload
14/04/28 16:01:50 >> : nonce payload
14/04/28 16:01:50 >> : identification payload
14/04/28 16:01:50 >> : vendor id payload
14/04/28 16:01:50 ii : local supports XAUTH
14/04/28 16:01:50 >> : vendor id payload
14/04/28 16:01:50 ii : local supports nat-t ( draft v00 )
14/04/28 16:01:50 >> : vendor id payload
14/04/28 16:01:50 ii : local supports nat-t ( draft v01 )
14/04/28 16:01:50 >> : vendor id payload
14/04/28 16:01:50 ii : local supports nat-t ( draft v02 )
14/04/28 16:01:50 >> : vendor id payload
14/04/28 16:01:50 ii : local supports nat-t ( draft v03 )
14/04/28 16:01:50 >> : vendor id payload
14/04/28 16:01:50 ii : local supports nat-t ( rfc )
14/04/28 16:01:50 >> : vendor id payload
14/04/28 16:01:50 >> : vendor id payload
14/04/28 16:01:50 ii : local supports DPDv1
14/04/28 16:01:50 >> : vendor id payload
14/04/28 16:01:50 ii : local is SHREW SOFT compatible
14/04/28 16:01:50 >> : vendor id payload
14/04/28 16:01:50 ii : local is NETSCREEN compatible
14/04/28 16:01:50 >> : vendor id payload
14/04/28 16:01:50 ii : local is SIDEWINDER compatible
14/04/28 16:01:50 >> : vendor id payload
14/04/28 16:01:50 ii : local is CISCO UNITY compatible
14/04/28 16:01:50 >= : cookies 535d7c927b085b2c:0000000000000000
14/04/28 16:01:50 >= : message 00000000
14/04/28 16:01:50 -> : send IKE packet 192.168.1.102:500 ->
210.80.199.3:500 ( 1180 bytes )
14/04/28 16:01:50 DB : phase1 resend event scheduled ( ref count = 2 )
14/04/28 16:01:51 <- : recv IKE packet 210.80.199.3:500 ->
192.168.1.102:500 ( 448 bytes )
14/04/28 16:01:51 DB : phase1 found
14/04/28 16:01:51 ii : processing phase1 packet ( 448 bytes )
14/04/28 16:01:51 =< : cookies 535d7c927b085b2c:1088eaa7e658427e
14/04/28 16:01:51 =< : message 00000000
14/04/28 16:01:51 << : security association payload
14/04/28 16:01:51 << : - propsal #1 payload
14/04/28 16:01:51 << : -- transform #13 payload
14/04/28 16:01:51 ii : unmatched isakmp proposal/transform
14/04/28 16:01:51 ii : cipher type ( 3des != aes )
14/04/28 16:01:51 ii : unmatched isakmp proposal/transform
14/04/28 16:01:51 ii : cipher type ( 3des != aes )
14/04/28 16:01:51 ii : unmatched isakmp proposal/transform
14/04/28 16:01:51 ii : cipher type ( 3des != aes )
14/04/28 16:01:51 ii : unmatched isakmp proposal/transform
14/04/28 16:01:51 ii : cipher type ( 3des != aes )
14/04/28 16:01:51 ii : unmatched isakmp proposal/transform
14/04/28 16:01:51 ii : cipher type ( 3des != aes )
14/04/28 16:01:51 ii : unmatched isakmp proposal/transform
14/04/28 16:01:51 ii : cipher type ( 3des != aes )
14/04/28 16:01:51 ii : unmatched isakmp proposal/transform
14/04/28 16:01:51 ii : cipher type ( 3des != blowfish )
14/04/28 16:01:51 ii : unmatched isakmp proposal/transform
14/04/28 16:01:51 ii : cipher type ( 3des != blowfish )
14/04/28 16:01:51 ii : unmatched isakmp proposal/transform
14/04/28 16:01:51 ii : cipher type ( 3des != blowfish )
14/04/28 16:01:51 ii : unmatched isakmp proposal/transform
14/04/28 16:01:51 ii : cipher type ( 3des != blowfish )
14/04/28 16:01:51 ii : unmatched isakmp proposal/transform
14/04/28 16:01:51 ii : cipher type ( 3des != blowfish )
14/04/28 16:01:51 ii : unmatched isakmp proposal/transform
14/04/28 16:01:51 ii : cipher type ( 3des != blowfish )
14/04/28 16:01:51 ii : matched isakmp proposal #1 transform #13
14/04/28 16:01:51 ii : - transform    = ike
14/04/28 16:01:51 ii : - cipher type  = 3des
14/04/28 16:01:51 ii : - key length   = default
14/04/28 16:01:51 ii : - hash type    = md5
14/04/28 16:01:51 ii : - dh group     = group2 ( modp-1024 )
14/04/28 16:01:51 ii : - auth type    = xauth-initiator-psk
14/04/28 16:01:51 ii : - life seconds = 86400
14/04/28 16:01:51 ii : - life kbytes  = 0
14/04/28 16:01:51 << : key exchange payload
14/04/28 16:01:51 << : nonce payload
14/04/28 16:01:51 << : identification payload
14/04/28 16:01:51 ii : phase1 id target is any
14/04/28 16:01:51 ii : phase1 id match
14/04/28 16:01:51 ii : received = ipv4-host 210.80.199.3
14/04/28 16:01:51 << : hash payload
14/04/28 16:01:51 << : vendor id payload
14/04/28 16:01:51 ii : peer is CISCO UNITY compatible
14/04/28 16:01:51 << : vendor id payload
14/04/28 16:01:51 ii : peer supports XAUTH
14/04/28 16:01:51 << : vendor id payload
14/04/28 16:01:51 ii : peer supports DPDv1
14/04/28 16:01:51 << : vendor id payload
14/04/28 16:01:51 ii : peer supports nat-t ( draft v02 )
14/04/28 16:01:51 << : nat discovery payload
14/04/28 16:01:51 << : nat discovery payload
14/04/28 16:01:51 << : vendor id payload
14/04/28 16:01:51 ii : unknown vendor id ( 20 bytes )
14/04/28 16:01:51 0x : 4048b7d5 6ebce885 25e7de7f 00d6c2d3 c0000000
14/04/28 16:01:51 << : vendor id payload
14/04/28 16:01:51 ii : unknown vendor id ( 16 bytes )
14/04/28 16:01:51 0x : e54f4dba e659427e 07fdb08d 9efcf499
14/04/28 16:01:51 << : vendor id payload
14/04/28 16:01:51 ii : unknown vendor id ( 16 bytes )
14/04/28 16:01:51 0x : 1f07f70e aa6514d3 b0fa9654 2a500407
14/04/28 16:01:51 ii : nat discovery - local address is translated
14/04/28 16:01:51 ii : switching to src nat-t udp port 4500
14/04/28 16:01:51 ii : switching to dst nat-t udp port 4500
14/04/28 16:01:51 == : DH shared secret ( 128 bytes )
14/04/28 16:01:51 == : SETKEYID ( 16 bytes )
14/04/28 16:01:51 == : SETKEYID_d ( 16 bytes )
14/04/28 16:01:51 == : SETKEYID_a ( 16 bytes )
14/04/28 16:01:51 == : SETKEYID_e ( 16 bytes )
14/04/28 16:01:51 == : cipher key ( 32 bytes )
14/04/28 16:01:51 == : cipher iv ( 8 bytes )
14/04/28 16:01:51 == : phase1 hash_i ( computed ) ( 16 bytes )
14/04/28 16:01:51 >> : hash payload
14/04/28 16:01:51 >> : nat discovery payload
14/04/28 16:01:51 >> : nat discovery payload
14/04/28 16:01:51 >= : cookies 535d7c927b085b2c:1088eaa7e658427e
14/04/28 16:01:51 >= : message 00000000
14/04/28 16:01:51 >= : encrypt iv ( 8 bytes )
14/04/28 16:01:51 == : encrypt packet ( 88 bytes )
14/04/28 16:01:51 == : stored iv ( 8 bytes )
14/04/28 16:01:51 DB : phase1 resend event canceled ( ref count = 1 )
14/04/28 16:01:51 -> : send NAT-T:IKE packet 192.168.1.102:4500 ->
210.80.199.3:4500 ( 124 bytes )
14/04/28 16:01:51 == : phase1 hash_r ( computed ) ( 16 bytes )
14/04/28 16:01:51 == : phase1 hash_r ( received ) ( 16 bytes )
14/04/28 16:01:51 ii : phase1 sa established
14/04/28 16:01:51 ii : 210.80.199.3:4500 <-> 192.168.1.102:4500
14/04/28 16:01:51 ii : 535d7c927b085b2c:1088eaa7e658427e
14/04/28 16:01:51 ii : sending peer INITIAL-CONTACT notification
14/04/28 16:01:51 ii : - 192.168.1.102:4500 -> 210.80.199.3:4500
14/04/28 16:01:51 ii : - isakmp spi = 535d7c927b085b2c:1088eaa7e658427e
14/04/28 16:01:51 ii : - data size 0
14/04/28 16:01:51 >> : hash payload
14/04/28 16:01:51 >> : notification payload
14/04/28 16:01:51 == : new informational hash ( 16 bytes )
14/04/28 16:01:51 == : new informational iv ( 8 bytes )
14/04/28 16:01:51 >= : cookies 535d7c927b085b2c:1088eaa7e658427e
14/04/28 16:01:51 >= : message 72f1cd36
14/04/28 16:01:51 >= : encrypt iv ( 8 bytes )
14/04/28 16:01:51 == : encrypt packet ( 76 bytes )
14/04/28 16:01:51 == : stored iv ( 8 bytes )
14/04/28 16:01:51 -> : send NAT-T:IKE packet 192.168.1.102:4500 ->
210.80.199.3:4500 ( 108 bytes )
14/04/28 16:01:51 DB : phase2 not found
14/04/28 16:01:51 <- : recv NAT-T:IKE packet 210.80.199.3:4500 ->
192.168.1.102:4500 ( 116 bytes )
14/04/28 16:01:51 DB : phase1 found
14/04/28 16:01:51 ii : processing config packet ( 116 bytes )
14/04/28 16:01:51 DB : config not found
14/04/28 16:01:51 DB : config added ( obj count = 1 )
14/04/28 16:01:51 == : new config iv ( 8 bytes )
14/04/28 16:01:51 =< : cookies 535d7c927b085b2c:1088eaa7e658427e
14/04/28 16:01:51 =< : message 4cc8b054
14/04/28 16:01:51 =< : decrypt iv ( 8 bytes )
14/04/28 16:01:51 == : decrypt packet ( 116 bytes )
14/04/28 16:01:51 <= : trimmed packet padding ( 4 bytes )
14/04/28 16:01:51 <= : stored iv ( 8 bytes )
14/04/28 16:01:51 << : hash payload
14/04/28 16:01:51 << : attribute payload
14/04/28 16:01:51 == : configure hash_i ( computed ) ( 16 bytes )
14/04/28 16:01:51 == : configure hash_c ( computed ) ( 16 bytes )
14/04/28 16:01:51 ii : configure hash verified
14/04/28 16:01:51 ii : - xauth authentication type
14/04/28 16:01:51 ii : - xauth username
14/04/28 16:01:51 ww : unhandled xauth attribute 16526
14/04/28 16:01:51 ii : - xauth password
14/04/28 16:01:51 ii : received basic xauth request - Enter Username,
Password and Domain.
14/04/28 16:01:51 ii : - standard xauth username
14/04/28 16:01:51 ii : - standard xauth password
14/04/28 16:01:51 ii : sending xauth response for guido_aversano
14/04/28 16:01:51 >> : hash payload
14/04/28 16:01:51 >> : attribute payload
14/04/28 16:01:51 == : new configure hash ( 16 bytes )
14/04/28 16:01:51 >= : cookies 535d7c927b085b2c:1088eaa7e658427e
14/04/28 16:01:51 >= : message 4cc8b054
14/04/28 16:01:51 >= : encrypt iv ( 8 bytes )
14/04/28 16:01:51 == : encrypt packet ( 90 bytes )
14/04/28 16:01:51 == : stored iv ( 8 bytes )
14/04/28 16:01:51 -> : send NAT-T:IKE packet 192.168.1.102:4500 ->
210.80.199.3:4500 ( 124 bytes )
14/04/28 16:01:51 DB : config resend event scheduled ( ref count = 2 )
14/04/28 16:01:52 <- : recv NAT-T:IKE packet 210.80.199.3:4500 ->
192.168.1.102:4500 ( 60 bytes )
14/04/28 16:01:52 DB : phase1 found
14/04/28 16:01:52 ii : processing config packet ( 60 bytes )
14/04/28 16:01:52 DB : config found
14/04/28 16:01:52 == : new config iv ( 8 bytes )
14/04/28 16:01:52 =< : cookies 535d7c927b085b2c:1088eaa7e658427e
14/04/28 16:01:52 =< : message 5bd50632
14/04/28 16:01:52 =< : decrypt iv ( 8 bytes )
14/04/28 16:01:52 == : decrypt packet ( 60 bytes )
14/04/28 16:01:52 <= : stored iv ( 8 bytes )
14/04/28 16:01:52 << : hash payload
14/04/28 16:01:52 << : attribute payload
14/04/28 16:01:52 == : configure hash_i ( computed ) ( 16 bytes )
14/04/28 16:01:52 == : configure hash_c ( computed ) ( 16 bytes )
14/04/28 16:01:52 ii : configure hash verified
14/04/28 16:01:52 ii : received xauth result -
14/04/28 16:01:52 ii : user guido_aversano authentication succeeded
14/04/28 16:01:52 ii : sending xauth acknowledge
14/04/28 16:01:52 >> : hash payload
14/04/28 16:01:52 >> : attribute payload
14/04/28 16:01:52 == : new configure hash ( 16 bytes )
14/04/28 16:01:52 >= : cookies 535d7c927b085b2c:1088eaa7e658427e
14/04/28 16:01:52 >= : message 5bd50632
14/04/28 16:01:52 >= : encrypt iv ( 8 bytes )
14/04/28 16:01:52 == : encrypt packet ( 56 bytes )
14/04/28 16:01:52 == : stored iv ( 8 bytes )
14/04/28 16:01:52 DB : config resend event canceled ( ref count = 1 )
14/04/28 16:01:52 -> : send NAT-T:IKE packet 192.168.1.102:4500 ->
210.80.199.3:4500 ( 92 bytes )
14/04/28 16:01:52 DB : config resend event scheduled ( ref count = 2 )
14/04/28 16:01:52 ii : building config attribute list
14/04/28 16:01:52 ii : - IP4 Address
14/04/28 16:01:52 ii : - Address Expiry
14/04/28 16:01:52 ii : - IP4 Netmask
14/04/28 16:01:52 ii : - IP4 DNS Server
14/04/28 16:01:52 ii : - IP4 WINS Server
14/04/28 16:01:52 ii : - DNS Suffix
14/04/28 16:01:52 ii : - IP4 Split Network Include
14/04/28 16:01:52 ii : - IP4 Split Network Exclude
14/04/28 16:01:52 ii : - Login Banner
14/04/28 16:01:52 ii : - PFS Group
14/04/28 16:01:52 ii : - Save Password
14/04/28 16:01:52 ii : - CISCO UDP Port
14/04/28 16:01:52 ii : - Application Version = Cisco Systems VPN
Client 4.8.01.0300:WinNT
14/04/28 16:01:52 ii : - Firewall Type = CISCO-UNKNOWN
14/04/28 16:01:52 == : new config iv ( 8 bytes )
14/04/28 16:01:52 ii : sending config pull request
14/04/28 16:01:52 >> : hash payload
14/04/28 16:01:52 >> : attribute payload
14/04/28 16:01:52 == : new configure hash ( 16 bytes )
14/04/28 16:01:52 >= : cookies 535d7c927b085b2c:1088eaa7e658427e
14/04/28 16:01:52 >= : message b48dc64b
14/04/28 16:01:52 >= : encrypt iv ( 8 bytes )
14/04/28 16:01:52 == : encrypt packet ( 166 bytes )
14/04/28 16:01:52 == : stored iv ( 8 bytes )
14/04/28 16:01:52 DB : config resend event canceled ( ref count = 1 )
14/04/28 16:01:52 -> : send NAT-T:IKE packet 192.168.1.102:4500 ->
210.80.199.3:4500 ( 204 bytes )
14/04/28 16:01:52 DB : config resend event scheduled ( ref count = 2 )
14/04/28 16:01:53 <- : recv NAT-T:IKE packet 210.80.199.3:4500 ->
192.168.1.102:4500 ( 308 bytes )
14/04/28 16:01:53 DB : phase1 found
14/04/28 16:01:53 ii : processing config packet ( 308 bytes )
14/04/28 16:01:53 DB : config found
14/04/28 16:01:53 =< : cookies 535d7c927b085b2c:1088eaa7e658427e
14/04/28 16:01:53 =< : message b48dc64b
14/04/28 16:01:53 =< : decrypt iv ( 8 bytes )
14/04/28 16:01:53 == : decrypt packet ( 308 bytes )
14/04/28 16:01:53 <= : stored iv ( 8 bytes )
14/04/28 16:01:53 << : hash payload
14/04/28 16:01:53 << : attribute payload
14/04/28 16:01:53 == : configure hash_i ( computed ) ( 16 bytes )
14/04/28 16:01:53 == : configure hash_c ( computed ) ( 16 bytes )
14/04/28 16:01:53 ii : configure hash verified
14/04/28 16:01:53 ii : received config pull response
14/04/28 16:01:53 ii : - IP4 Address = 10.120.2.101
14/04/28 16:01:53 ii : - IP4 Netmask = 255.255.255.0
14/04/28 16:01:53 ii : - IP4 DNS Server = 10.1.4.201
14/04/28 16:01:53 ii : - IP4 DNS Server = 10.1.4.202
14/04/28 16:01:53 ii : - IP4 WINS Server = 10.1.4.201
14/04/28 16:01:53 ii : - Save Password = 0
14/04/28 16:01:53 ii : - IP4 Split Network Include = ANY:10.0.0.0/8:*
14/04/28 16:01:53 ii : - IP4 Split Network Include = ANY:192.168.90.0/24:*
14/04/28 16:01:53 ii : - IP4 Split Network Include = ANY:172.16.30.0/24:*
14/04/28 16:01:53 ii : - IP4 Split Network Include = ANY:192.168.3.0/24:*
14/04/28 16:01:53 ii : - IP4 Split Network Include = ANY:205.197.192.150/32:*
14/04/28 16:01:53 ii : - IP4 Split Network Include = ANY:205.197.192.151/32:*
14/04/28 16:01:53 ii : - DNS Suffix = nuance.com
14/04/28 16:01:53 ii : - PFS Group = 0
14/04/28 16:01:53 ii : - Application Version = Cisco Systems, Inc./VPN
3000 Concentrator Version 4.7.2.P built by vmurphy on Jul 30 2008
17:39:30
14/04/28 16:01:53 DB : config resend event canceled ( ref count = 1 )
14/04/28 16:01:53 ii : enabled adapter ROOT\VNET\0000
14/04/28 16:01:53 ii : adapter ROOT\VNET\0000 unavailable, retrying ...
14/04/28 16:01:54 ii : apapter ROOT\VNET\0000 MTU is 1380
14/04/28 16:01:54 ii : generating IPSEC security policies at REQUIRE level
14/04/28 16:01:54 ii : creating NONE INBOUND policy ANY:210.80.199.3:*
-> ANY:192.168.1.102:*
14/04/28 16:01:54 DB : policy added ( obj count = 1 )
14/04/28 16:01:54 K> : send pfkey X_SPDADD UNSPEC message
14/04/28 16:01:54 K< : recv pfkey X_SPDADD UNSPEC message
14/04/28 16:01:54 DB : policy found
14/04/28 16:01:54 ii : creating NONE OUTBOUND policy
ANY:192.168.1.102:* -> ANY:210.80.199.3:*
14/04/28 16:01:54 ii : created NONE policy route for 210.80.199.3/32
14/04/28 16:01:54 DB : policy added ( obj count = 2 )
14/04/28 16:01:54 K> : send pfkey X_SPDADD UNSPEC message
14/04/28 16:01:54 K< : recv pfkey X_SPDADD UNSPEC message
14/04/28 16:01:54 DB : policy found
14/04/28 16:01:54 ii : creating NONE INBOUND policy ANY:192.168.1.1:*
-> ANY:10.120.2.101:*
14/04/28 16:01:54 DB : policy added ( obj count = 3 )
14/04/28 16:01:54 K> : send pfkey X_SPDADD UNSPEC message
14/04/28 16:01:54 ii : creating NONE OUTBOUND policy
ANY:10.120.2.101:* -> ANY:192.168.1.1:*
14/04/28 16:01:54 DB : policy added ( obj count = 4 )
14/04/28 16:01:54 K> : send pfkey X_SPDADD UNSPEC message
14/04/28 16:01:54 ii : creating IPSEC INBOUND policy ANY:10.0.0.0/8:*
-> ANY:10.120.2.101:*
14/04/28 16:01:54 DB : policy added ( obj count = 5 )
14/04/28 16:01:54 K> : send pfkey X_SPDADD UNSPEC message
14/04/28 16:01:54 ii : creating IPSEC OUTBOUND policy
ANY:10.120.2.101:* -> ANY:10.0.0.0/8:*
14/04/28 16:01:54 K< : recv pfkey X_SPDADD UNSPEC message
14/04/28 16:01:54 DB : policy found
14/04/28 16:01:54 K< : recv pfkey X_SPDADD UNSPEC message
14/04/28 16:01:54 DB : policy found
14/04/28 16:01:54 K< : recv pfkey X_SPDADD UNSPEC message
14/04/28 16:01:54 DB : policy found
14/04/28 16:01:54 ii : created IPSEC policy route for 10.0.0.0/8
14/04/28 16:01:54 DB : policy added ( obj count = 6 )
14/04/28 16:01:54 K> : send pfkey X_SPDADD UNSPEC message
14/04/28 16:01:54 ii : creating IPSEC INBOUND policy
ANY:192.168.90.0/24:* -> ANY:10.120.2.101:*
14/04/28 16:01:54 DB : policy added ( obj count = 7 )
14/04/28 16:01:54 K> : send pfkey X_SPDADD UNSPEC message
14/04/28 16:01:54 ii : creating IPSEC OUTBOUND policy
ANY:10.120.2.101:* -> ANY:192.168.90.0/24:*
14/04/28 16:01:54 K< : recv pfkey X_SPDADD UNSPEC message
14/04/28 16:01:54 DB : policy found
14/04/28 16:01:54 ii : calling init phase2 for initial policy
14/04/28 16:01:54 DB : policy found
14/04/28 16:01:54 DB : policy found
14/04/28 16:01:54 DB : tunnel found
14/04/28 16:01:54 DB : new phase2 ( IPSEC initiator )
14/04/28 16:01:54 DB : phase2 added ( obj count = 1 )
14/04/28 16:01:54 K> : send pfkey GETSPI ESP message
14/04/28 16:01:54 K< : recv pfkey X_SPDADD UNSPEC message
14/04/28 16:01:54 DB : policy found
14/04/28 16:01:54 K< : recv pfkey GETSPI ESP message
14/04/28 16:01:54 DB : phase2 found
14/04/28 16:01:54 ii : updated spi for 1 ipsec-esp proposal
14/04/28 16:01:54 DB : phase1 found
14/04/28 16:01:54 >> : hash payload
14/04/28 16:01:54 >> : security association payload
14/04/28 16:01:54 >> : - proposal #1 payload
14/04/28 16:01:54 >> : -- transform #1 payload
14/04/28 16:01:54 >> : -- transform #2 payload
14/04/28 16:01:54 >> : -- transform #3 payload
14/04/28 16:01:54 >> : -- transform #4 payload
14/04/28 16:01:54 >> : -- transform #5 payload
14/04/28 16:01:54 >> : -- transform #6 payload
14/04/28 16:01:54 >> : -- transform #7 payload
14/04/28 16:01:54 >> : -- transform #8 payload
14/04/28 16:01:54 >> : -- transform #9 payload
14/04/28 16:01:54 >> : -- transform #10 payload
14/04/28 16:01:54 >> : -- transform #11 payload
14/04/28 16:01:54 >> : -- transform #12 payload
14/04/28 16:01:54 >> : -- transform #13 payload
14/04/28 16:01:54 >> : -- transform #14 payload
14/04/28 16:01:54 >> : -- transform #15 payload
14/04/28 16:01:54 >> : -- transform #16 payload
14/04/28 16:01:54 >> : -- transform #17 payload
14/04/28 16:01:54 >> : -- transform #18 payload
14/04/28 16:01:54 >> : -- transform #19 payload
14/04/28 16:01:54 >> : -- transform #20 payload
14/04/28 16:01:54 >> : -- transform #21 payload
14/04/28 16:01:54 >> : -- transform #22 payload
14/04/28 16:01:54 >> : -- transform #23 payload
14/04/28 16:01:54 >> : -- transform #24 payload
14/04/28 16:01:54 >> : -- transform #25 payload
14/04/28 16:01:54 >> : -- transform #26 payload
14/04/28 16:01:54 >> : -- transform #27 payload
14/04/28 16:01:54 >> : -- transform #28 payload
14/04/28 16:01:54 >> : -- transform #29 payload
14/04/28 16:01:54 >> : -- transform #30 payload
14/04/28 16:01:54 >> : -- transform #31 payload
14/04/28 16:01:54 >> : -- transform #32 payload
14/04/28 16:01:54 >> : -- transform #33 payload
14/04/28 16:01:54 >> : -- transform #34 payload
14/04/28 16:01:54 >> : -- transform #35 payload
14/04/28 16:01:54 >> : -- transform #36 payload
14/04/28 16:01:54 >> : -- transform #37 payload
14/04/28 16:01:54 >> : -- transform #38 payload
14/04/28 16:01:54 >> : -- transform #39 payload
14/04/28 16:01:54 >> : -- transform #40 payload
14/04/28 16:01:54 >> : -- transform #41 payload
14/04/28 16:01:54 >> : -- transform #42 payload
14/04/28 16:01:54 >> : -- transform #43 payload
14/04/28 16:01:54 >> : -- transform #44 payload
14/04/28 16:01:54 >> : -- transform #45 payload
14/04/28 16:01:54 >> : nonce payload
14/04/28 16:01:54 >> : identification payload
14/04/28 16:01:54 >> : identification payload
14/04/28 16:01:54 == : phase2 hash_i ( input ) ( 1460 bytes )
14/04/28 16:01:54 == : phase2 hash_i ( computed ) ( 16 bytes )
14/04/28 16:01:54 == : new phase2 iv ( 8 bytes )
14/04/28 16:01:54 >= : cookies 535d7c927b085b2c:1088eaa7e658427e
14/04/28 16:01:54 >= : message 199fd417
14/04/28 16:01:54 >= : encrypt iv ( 8 bytes )
14/04/28 16:01:54 == : encrypt packet ( 1504 bytes )
14/04/28 16:01:54 == : stored iv ( 8 bytes )
14/04/28 16:01:54 -> : send NAT-T:IKE packet 192.168.1.102:4500 ->
210.80.199.3:4500 ( 1540 bytes )
14/04/28 16:01:54 ii : fragmented packet to 1514 bytes ( MTU 1500 bytes )
14/04/28 16:01:54 ii : fragmented packet to 74 bytes ( MTU 1500 bytes )
14/04/28 16:01:54 DB : phase2 resend event scheduled ( ref count = 2 )
14/04/28 16:01:54 ii : created IPSEC policy route for 192.168.90.0/24
14/04/28 16:01:54 DB : policy added ( obj count = 8 )
14/04/28 16:01:54 K> : send pfkey X_SPDADD UNSPEC message
14/04/28 16:01:54 ii : creating IPSEC INBOUND policy
ANY:172.16.30.0/24:* -> ANY:10.120.2.101:*
14/04/28 16:01:54 DB : policy added ( obj count = 9 )
14/04/28 16:01:54 K> : send pfkey X_SPDADD UNSPEC message
14/04/28 16:01:54 ii : creating IPSEC OUTBOUND policy
ANY:10.120.2.101:* -> ANY:172.16.30.0/24:*
14/04/28 16:01:54 K< : recv pfkey X_SPDADD UNSPEC message
14/04/28 16:01:54 DB : policy found
14/04/28 16:01:54 K< : recv pfkey X_SPDADD UNSPEC message
14/04/28 16:01:54 DB : policy found
14/04/28 16:01:54 ii : created IPSEC policy route for 172.16.30.0/24
14/04/28 16:01:54 DB : policy added ( obj count = 10 )
14/04/28 16:01:54 K> : send pfkey X_SPDADD UNSPEC message
14/04/28 16:01:54 ii : creating IPSEC INBOUND policy
ANY:192.168.3.0/24:* -> ANY:10.120.2.101:*
14/04/28 16:01:54 DB : policy added ( obj count = 11 )
14/04/28 16:01:54 K> : send pfkey X_SPDADD UNSPEC message
14/04/28 16:01:54 ii : creating IPSEC OUTBOUND policy
ANY:10.120.2.101:* -> ANY:192.168.3.0/24:*
14/04/28 16:01:54 K< : recv pfkey X_SPDADD UNSPEC message
14/04/28 16:01:54 DB : policy found
14/04/28 16:01:54 K< : recv pfkey X_SPDADD UNSPEC message
14/04/28 16:01:54 DB : policy found
14/04/28 16:01:54 ii : created IPSEC policy route for 192.168.3.0/24
14/04/28 16:01:54 DB : policy added ( obj count = 12 )
14/04/28 16:01:54 K> : send pfkey X_SPDADD UNSPEC message
14/04/28 16:01:54 ii : creating IPSEC INBOUND policy
ANY:205.197.192.150/32:* -> ANY:10.120.2.101:*
14/04/28 16:01:54 DB : policy added ( obj count = 13 )
14/04/28 16:01:54 K> : send pfkey X_SPDADD UNSPEC message
14/04/28 16:01:54 ii : creating IPSEC OUTBOUND policy
ANY:10.120.2.101:* -> ANY:205.197.192.150/32:*
14/04/28 16:01:54 K< : recv pfkey X_SPDADD UNSPEC message
14/04/28 16:01:54 DB : policy found
14/04/28 16:01:54 K< : recv pfkey X_SPDADD UNSPEC message
14/04/28 16:01:54 DB : policy found
14/04/28 16:01:54 ii : created IPSEC policy route for 205.197.192.150/32
14/04/28 16:01:54 DB : policy added ( obj count = 14 )
14/04/28 16:01:54 K> : send pfkey X_SPDADD UNSPEC message
14/04/28 16:01:54 ii : creating IPSEC INBOUND policy
ANY:205.197.192.151/32:* -> ANY:10.120.2.101:*
14/04/28 16:01:54 DB : policy added ( obj count = 15 )
14/04/28 16:01:54 K> : send pfkey X_SPDADD UNSPEC message
14/04/28 16:01:54 ii : creating IPSEC OUTBOUND policy
ANY:10.120.2.101:* -> ANY:205.197.192.151/32:*
14/04/28 16:01:54 K< : recv pfkey X_SPDADD UNSPEC message
14/04/28 16:01:54 DB : policy found
14/04/28 16:01:54 K< : recv pfkey X_SPDADD UNSPEC message
14/04/28 16:01:54 DB : policy found
14/04/28 16:01:54 ii : created IPSEC policy route for 205.197.192.151/32
14/04/28 16:01:54 DB : policy added ( obj count = 16 )
14/04/28 16:01:54 K> : send pfkey X_SPDADD UNSPEC message
14/04/28 16:01:54 K< : recv pfkey X_SPDADD UNSPEC message
14/04/28 16:01:54 DB : policy found
14/04/28 16:01:54 ii : split DNS is disabled
14/04/28 16:01:58 K< : recv pfkey ACQUIRE UNSPEC message
14/04/28 16:01:58 DB : policy found
14/04/28 16:01:58 DB : policy found
14/04/28 16:01:58 DB : tunnel found
14/04/28 16:01:58 DB : new phase2 ( IPSEC initiator )
14/04/28 16:01:58 DB : phase2 added ( obj count = 2 )
14/04/28 16:01:58 K> : send pfkey GETSPI ESP message
14/04/28 16:01:58 K< : recv pfkey GETSPI ESP message
14/04/28 16:01:58 DB : phase2 found
14/04/28 16:01:58 ii : updated spi for 1 ipsec-esp proposal
14/04/28 16:01:58 DB : phase1 found
14/04/28 16:01:58 >> : hash payload
14/04/28 16:01:58 >> : security association payload
14/04/28 16:01:58 >> : - proposal #1 payload
14/04/28 16:01:58 >> : -- transform #1 payload
14/04/28 16:01:58 >> : -- transform #2 payload
14/04/28 16:01:58 >> : -- transform #3 payload
14/04/28 16:01:58 >> : -- transform #4 payload
14/04/28 16:01:58 >> : -- transform #5 payload
14/04/28 16:01:58 >> : -- transform #6 payload
14/04/28 16:01:58 >> : -- transform #7 payload
14/04/28 16:01:58 >> : -- transform #8 payload
14/04/28 16:01:58 >> : -- transform #9 payload
14/04/28 16:01:58 >> : -- transform #10 payload
14/04/28 16:01:58 >> : -- transform #11 payload
14/04/28 16:01:58 >> : -- transform #12 payload
14/04/28 16:01:58 >> : -- transform #13 payload
14/04/28 16:01:58 >> : -- transform #14 payload
14/04/28 16:01:58 >> : -- transform #15 payload
14/04/28 16:01:58 >> : -- transform #16 payload
14/04/28 16:01:58 >> : -- transform #17 payload
14/04/28 16:01:58 >> : -- transform #18 payload
14/04/28 16:01:58 >> : -- transform #19 payload
14/04/28 16:01:58 >> : -- transform #20 payload
14/04/28 16:01:58 >> : -- transform #21 payload
14/04/28 16:01:58 >> : -- transform #22 payload
14/04/28 16:01:58 >> : -- transform #23 payload
14/04/28 16:01:58 >> : -- transform #24 payload
14/04/28 16:01:58 >> : -- transform #25 payload
14/04/28 16:01:58 >> : -- transform #26 payload
14/04/28 16:01:58 >> : -- transform #27 payload
14/04/28 16:01:58 >> : -- transform #28 payload
14/04/28 16:01:58 >> : -- transform #29 payload
14/04/28 16:01:58 >> : -- transform #30 payload
14/04/28 16:01:58 >> : -- transform #31 payload
14/04/28 16:01:58 >> : -- transform #32 payload
14/04/28 16:01:58 >> : -- transform #33 payload
14/04/28 16:01:58 >> : -- transform #34 payload
14/04/28 16:01:58 >> : -- transform #35 payload
14/04/28 16:01:58 >> : -- transform #36 payload
14/04/28 16:01:58 >> : -- transform #37 payload
14/04/28 16:01:58 >> : -- transform #38 payload
14/04/28 16:01:58 >> : -- transform #39 payload
14/04/28 16:01:58 >> : -- transform #40 payload
14/04/28 16:01:58 >> : -- transform #41 payload
14/04/28 16:01:58 >> : -- transform #42 payload
14/04/28 16:01:58 >> : -- transform #43 payload
14/04/28 16:01:58 >> : -- transform #44 payload
14/04/28 16:01:58 >> : -- transform #45 payload
14/04/28 16:01:58 >> : nonce payload
14/04/28 16:01:58 >> : identification payload
14/04/28 16:01:58 >> : identification payload
14/04/28 16:01:58 == : phase2 hash_i ( input ) ( 1460 bytes )
14/04/28 16:01:58 == : phase2 hash_i ( computed ) ( 16 bytes )
14/04/28 16:01:58 == : new phase2 iv ( 8 bytes )
14/04/28 16:01:58 >= : cookies 535d7c927b085b2c:1088eaa7e658427e
14/04/28 16:01:58 >= : message e1f6e56b
14/04/28 16:01:58 >= : encrypt iv ( 8 bytes )
14/04/28 16:01:58 == : encrypt packet ( 1504 bytes )
14/04/28 16:01:58 == : stored iv ( 8 bytes )
14/04/28 16:01:58 -> : send NAT-T:IKE packet 192.168.1.102:4500 ->
210.80.199.3:4500 ( 1540 bytes )
14/04/28 16:01:58 ii : fragmented packet to 1514 bytes ( MTU 1500 bytes )
14/04/28 16:01:58 ii : fragmented packet to 74 bytes ( MTU 1500 bytes )
14/04/28 16:01:58 DB : phase2 resend event scheduled ( ref count = 2 )
14/04/28 16:01:59 ii : fragmented packet to 1514 bytes ( MTU 1500 bytes )
14/04/28 16:01:59 ii : fragmented packet to 74 bytes ( MTU 1500 bytes )
14/04/28 16:01:59 -> : resend 1 phase2 packet(s) [0/2]
192.168.1.102:4500 -> 210.80.199.3:4500
14/04/28 16:02:01 <- : recv NAT-T:IKE packet 210.80.199.3:4500 ->
192.168.1.102:4500 ( 308 bytes )
14/04/28 16:02:01 DB : phase1 found
14/04/28 16:02:01 ii : processing config packet ( 308 bytes )
14/04/28 16:02:01 DB : config found
14/04/28 16:02:01 !! : config packet ignored ( config already mature )
14/04/28 16:02:03 ii : fragmented packet to 1514 bytes ( MTU 1500 bytes )
14/04/28 16:02:03 ii : fragmented packet to 74 bytes ( MTU 1500 bytes )
14/04/28 16:02:03 -> : resend 1 phase2 packet(s) [0/2]
192.168.1.102:4500 -> 210.80.199.3:4500
14/04/28 16:02:04 ii : fragmented packet to 1514 bytes ( MTU 1500 bytes )
14/04/28 16:02:04 ii : fragmented packet to 74 bytes ( MTU 1500 bytes )
14/04/28 16:02:04 -> : resend 1 phase2 packet(s) [1/2]
192.168.1.102:4500 -> 210.80.199.3:4500
14/04/28 16:02:06 DB : phase1 found
14/04/28 16:02:06 ii : sending peer DPDV1-R-U-THERE notification
14/04/28 16:02:06 ii : - 192.168.1.102:4500 -> 210.80.199.3:4500
14/04/28 16:02:06 ii : - isakmp spi = 535d7c927b085b2c:1088eaa7e658427e
14/04/28 16:02:06 ii : - data size 4
14/04/28 16:02:06 >> : hash payload
14/04/28 16:02:06 >> : notification payload
14/04/28 16:02:06 == : new informational hash ( 16 bytes )
14/04/28 16:02:06 == : new informational iv ( 8 bytes )
14/04/28 16:02:06 >= : cookies 535d7c927b085b2c:1088eaa7e658427e
14/04/28 16:02:06 >= : message 63ef65e4
14/04/28 16:02:06 >= : encrypt iv ( 8 bytes )
14/04/28 16:02:06 == : encrypt packet ( 80 bytes )
14/04/28 16:02:06 == : stored iv ( 8 bytes )
14/04/28 16:02:06 -> : send NAT-T:IKE packet 192.168.1.102:4500 ->
210.80.199.3:4500 ( 116 bytes )
14/04/28 16:02:06 ii : DPD ARE-YOU-THERE sequence 3d0a553b requested
14/04/28 16:02:06 DB : phase1 found
14/04/28 16:02:06 -> : send NAT-T:KEEP-ALIVE packet 192.168.1.102:4500
-> 210.80.199.3:4500
14/04/28 16:02:08 ii : fragmented packet to 1514 bytes ( MTU 1500 bytes )
14/04/28 16:02:08 ii : fragmented packet to 74 bytes ( MTU 1500 bytes )
14/04/28 16:02:08 -> : resend 1 phase2 packet(s) [1/2]
192.168.1.102:4500 -> 210.80.199.3:4500
14/04/28 16:02:09 <- : recv NAT-T:IKE packet 210.80.199.3:4500 ->
192.168.1.102:4500 ( 308 bytes )
14/04/28 16:02:09 DB : phase1 found
14/04/28 16:02:09 ii : processing config packet ( 308 bytes )
14/04/28 16:02:09 DB : config found
14/04/28 16:02:09 !! : config packet ignored ( config already mature )
14/04/28 16:02:09 ii : fragmented packet to 1514 bytes ( MTU 1500 bytes )
14/04/28 16:02:09 ii : fragmented packet to 74 bytes ( MTU 1500 bytes )
14/04/28 16:02:09 -> : resend 1 phase2 packet(s) [2/2]
192.168.1.102:4500 -> 210.80.199.3:4500
14/04/28 16:02:12 <A : peer tunnel disable message
14/04/28 16:02:12 DB : policy found
14/04/28 16:02:12 ii : removing IPSEC INBOUND policy ANY:10.0.0.0/8:*
-> ANY:10.120.2.101:*
14/04/28 16:02:12 K> : send pfkey X_SPDDELETE2 UNSPEC message
14/04/28 16:02:12 DB : policy found
14/04/28 16:02:12 ii : removing IPSEC OUTBOUND policy
ANY:10.120.2.101:* -> ANY:10.0.0.0/8:*
14/04/28 16:02:12 K> : send pfkey X_SPDDELETE2 UNSPEC message
14/04/28 16:02:12 K< : recv pfkey X_SPDDELETE2 UNSPEC message
14/04/28 16:02:12 ii : removed IPSEC policy route for ANY:10.0.0.0/8:*
14/04/28 16:02:12 DB : policy found
14/04/28 16:02:12 ii : removing IPSEC INBOUND policy
ANY:192.168.90.0/24:* -> ANY:10.120.2.101:*
14/04/28 16:02:12 K> : send pfkey X_SPDDELETE2 UNSPEC message
14/04/28 16:02:12 DB : policy found
14/04/28 16:02:12 ii : removing IPSEC OUTBOUND policy
ANY:10.120.2.101:* -> ANY:192.168.90.0/24:*
14/04/28 16:02:12 K> : send pfkey X_SPDDELETE2 UNSPEC message
14/04/28 16:02:12 ii : removed IPSEC policy route for ANY:192.168.90.0/24:*
14/04/28 16:02:12 DB : policy found
14/04/28 16:02:12 ii : removing IPSEC INBOUND policy
ANY:172.16.30.0/24:* -> ANY:10.120.2.101:*
14/04/28 16:02:12 K> : send pfkey X_SPDDELETE2 UNSPEC message
14/04/28 16:02:12 DB : policy found
14/04/28 16:02:12 ii : removing IPSEC OUTBOUND policy
ANY:10.120.2.101:* -> ANY:172.16.30.0/24:*
14/04/28 16:02:12 K> : send pfkey X_SPDDELETE2 UNSPEC message
14/04/28 16:02:12 ii : removed IPSEC policy route for ANY:172.16.30.0/24:*
14/04/28 16:02:12 DB : policy found
14/04/28 16:02:12 ii : removing IPSEC INBOUND policy
ANY:192.168.3.0/24:* -> ANY:10.120.2.101:*
14/04/28 16:02:12 K> : send pfkey X_SPDDELETE2 UNSPEC message
14/04/28 16:02:12 DB : policy found
14/04/28 16:02:12 ii : removing IPSEC OUTBOUND policy
ANY:10.120.2.101:* -> ANY:192.168.3.0/24:*
14/04/28 16:02:12 K> : send pfkey X_SPDDELETE2 UNSPEC message
14/04/28 16:02:12 ii : removed IPSEC policy route for ANY:192.168.3.0/24:*
14/04/28 16:02:12 DB : policy found
14/04/28 16:02:12 ii : removing IPSEC INBOUND policy
ANY:205.197.192.150/32:* -> ANY:10.120.2.101:*
14/04/28 16:02:12 K> : send pfkey X_SPDDELETE2 UNSPEC message
14/04/28 16:02:12 DB : policy found
14/04/28 16:02:12 ii : removing IPSEC OUTBOUND policy
ANY:10.120.2.101:* -> ANY:205.197.192.150/32:*
14/04/28 16:02:12 K> : send pfkey X_SPDDELETE2 UNSPEC message
14/04/28 16:02:12 ii : removed IPSEC policy route for ANY:205.197.192.150/32:*
14/04/28 16:02:12 DB : policy found
14/04/28 16:02:12 ii : removing IPSEC INBOUND policy
ANY:205.197.192.151/32:* -> ANY:10.120.2.101:*
14/04/28 16:02:12 K> : send pfkey X_SPDDELETE2 UNSPEC message
14/04/28 16:02:12 DB : policy found
14/04/28 16:02:12 ii : removing IPSEC OUTBOUND policy
ANY:10.120.2.101:* -> ANY:205.197.192.151/32:*
14/04/28 16:02:12 K> : send pfkey X_SPDDELETE2 UNSPEC message
14/04/28 16:02:12 ii : removed IPSEC policy route for ANY:205.197.192.151/32:*
14/04/28 16:02:12 DB : policy found
14/04/28 16:02:12 ii : removing NONE INBOUND policy ANY:192.168.1.1:*
-> ANY:10.120.2.101:*
14/04/28 16:02:12 K> : send pfkey X_SPDDELETE2 UNSPEC message
14/04/28 16:02:12 DB : policy found
14/04/28 16:02:12 ii : removing NONE OUTBOUND policy
ANY:10.120.2.101:* -> ANY:192.168.1.1:*
14/04/28 16:02:12 K> : send pfkey X_SPDDELETE2 UNSPEC message
14/04/28 16:02:12 DB : policy found
14/04/28 16:02:12 ii : removing NONE INBOUND policy ANY:210.80.199.3:*
-> ANY:192.168.1.102:*
14/04/28 16:02:12 K> : send pfkey X_SPDDELETE2 UNSPEC message
14/04/28 16:02:12 DB : policy found
14/04/28 16:02:12 ii : removing NONE OUTBOUND policy
ANY:192.168.1.102:* -> ANY:210.80.199.3:*
14/04/28 16:02:12 K> : send pfkey X_SPDDELETE2 UNSPEC message
14/04/28 16:02:12 ii : removed NONE policy route for ANY:210.80.199.3:*
14/04/28 16:02:12 DB : policy found
14/04/28 16:02:12 DB : policy deleted ( obj count = 15 )
14/04/28 16:02:12 K< : recv pfkey X_SPDDELETE2 UNSPEC message
14/04/28 16:02:12 DB : policy found
14/04/28 16:02:12 DB : policy deleted ( obj count = 14 )
14/04/28 16:02:12 K< : recv pfkey X_SPDDELETE2 UNSPEC message
14/04/28 16:02:12 DB : policy found
14/04/28 16:02:12 DB : policy deleted ( obj count = 13 )
14/04/28 16:02:12 K< : recv pfkey X_SPDDELETE2 UNSPEC message
14/04/28 16:02:12 DB : policy found
14/04/28 16:02:12 DB : policy deleted ( obj count = 12 )
14/04/28 16:02:12 K< : recv pfkey X_SPDDELETE2 UNSPEC message
14/04/28 16:02:12 DB : policy found
14/04/28 16:02:12 DB : policy deleted ( obj count = 11 )
14/04/28 16:02:12 K< : recv pfkey X_SPDDELETE2 UNSPEC message
14/04/28 16:02:12 DB : policy found
14/04/28 16:02:12 DB : policy deleted ( obj count = 10 )
14/04/28 16:02:12 K< : recv pfkey X_SPDDELETE2 UNSPEC message
14/04/28 16:02:12 DB : policy found
14/04/28 16:02:12 DB : policy deleted ( obj count = 9 )
14/04/28 16:02:12 K< : recv pfkey X_SPDDELETE2 UNSPEC message
14/04/28 16:02:12 DB : policy found
14/04/28 16:02:12 DB : policy deleted ( obj count = 8 )
14/04/28 16:02:12 K< : recv pfkey X_SPDDELETE2 UNSPEC message
14/04/28 16:02:12 DB : policy found
14/04/28 16:02:12 DB : policy deleted ( obj count = 7 )
14/04/28 16:02:12 K< : recv pfkey X_SPDDELETE2 UNSPEC message
14/04/28 16:02:12 DB : policy found
14/04/28 16:02:12 DB : policy deleted ( obj count = 6 )
14/04/28 16:02:12 K< : recv pfkey X_SPDDELETE2 UNSPEC message
14/04/28 16:02:12 DB : policy found
14/04/28 16:02:12 DB : policy deleted ( obj count = 5 )
14/04/28 16:02:12 K< : recv pfkey X_SPDDELETE2 UNSPEC message
14/04/28 16:02:12 DB : policy found
14/04/28 16:02:12 DB : policy deleted ( obj count = 4 )
14/04/28 16:02:12 K< : recv pfkey X_SPDDELETE2 UNSPEC message
14/04/28 16:02:12 DB : policy found
14/04/28 16:02:12 DB : policy deleted ( obj count = 3 )
14/04/28 16:02:12 K< : recv pfkey X_SPDDELETE2 UNSPEC message
14/04/28 16:02:12 DB : policy found
14/04/28 16:02:12 DB : policy deleted ( obj count = 2 )
14/04/28 16:02:12 K< : recv pfkey X_SPDDELETE2 UNSPEC message
14/04/28 16:02:12 DB : policy found
14/04/28 16:02:12 DB : policy deleted ( obj count = 1 )
14/04/28 16:02:12 K< : recv pfkey X_SPDDELETE2 UNSPEC message
14/04/28 16:02:12 DB : policy found
14/04/28 16:02:12 DB : policy deleted ( obj count = 0 )
14/04/28 16:02:12 ii : disable adapter ROOT\VNET\0000
14/04/28 16:02:12 DB : tunnel dpd event canceled ( ref count = 7 )
14/04/28 16:02:12 DB : tunnel natt event canceled ( ref count = 6 )
14/04/28 16:02:12 DB : tunnel stats event canceled ( ref count = 5 )
14/04/28 16:02:12 DB : removing tunnel config references
14/04/28 16:02:12 DB : config deleted ( obj count = 0 )
14/04/28 16:02:12 DB : removing tunnel phase2 references
14/04/28 16:02:12 DB : phase2 resend event canceled ( ref count = 1 )
14/04/28 16:02:12 ii : phase2 removal before expire time
14/04/28 16:02:12 DB : phase2 deleted ( obj count = 1 )
14/04/28 16:02:12 DB : phase2 resend event canceled ( ref count = 1 )
14/04/28 16:02:12 ii : phase2 removal before expire time
14/04/28 16:02:12 DB : phase2 deleted ( obj count = 0 )
14/04/28 16:02:12 DB : removing tunnel phase1 references
14/04/28 16:02:12 DB : phase1 soft event canceled ( ref count = 3 )
14/04/28 16:02:12 DB : phase1 hard event canceled ( ref count = 2 )
14/04/28 16:02:12 DB : phase1 dead event canceled ( ref count = 1 )
14/04/28 16:02:12 ii : sending peer DELETE message
14/04/28 16:02:12 ii : - 192.168.1.102:4500 -> 210.80.199.3:4500
14/04/28 16:02:12 ii : - isakmp spi = 535d7c927b085b2c:1088eaa7e658427e
14/04/28 16:02:12 ii : - data size 0
14/04/28 16:02:12 >> : hash payload
14/04/28 16:02:12 >> : delete payload
14/04/28 16:02:12 == : new informational hash ( 16 bytes )
14/04/28 16:02:12 == : new informational iv ( 8 bytes )
14/04/28 16:02:12 >= : cookies 535d7c927b085b2c:1088eaa7e658427e
14/04/28 16:02:12 >= : message c7fe6902
14/04/28 16:02:12 >= : encrypt iv ( 8 bytes )
14/04/28 16:02:12 == : encrypt packet ( 76 bytes )
14/04/28 16:02:12 == : stored iv ( 8 bytes )
14/04/28 16:02:12 -> : send NAT-T:IKE packet 192.168.1.102:4500 ->
210.80.199.3:4500 ( 108 bytes )
14/04/28 16:02:12 ii : phase1 removal before expire time
14/04/28 16:02:12 DB : phase1 deleted ( obj count = 0 )
14/04/28 16:02:12 DB : tunnel deleted ( obj count = 0 )
14/04/28 16:02:12 DB : removing all peer tunnel references
14/04/28 16:02:12 DB : peer deleted ( obj count = 0 )
14/04/28 16:02:12 ii : ipc client process thread exit ...
14/04/28 16:02:19 ii : hard halt signal received, shutting down
14/04/28 16:02:19 ii : network process thread exit ...
14/04/28 16:02:19 ii : pfkey process thread exit ...
14/04/28 16:02:19 ii : ipc server process thread exit ...


More information about the vpn-help mailing list