09/09/14 08:59:46 ## : IKE Daemon, ver 2.1.0
09/09/14 08:59:46 ## : Copyright 2008 Shrew Soft Inc.
09/09/14 08:59:46 ## : This product linked OpenSSL 0.9.8h 28 May 2008
09/09/14 08:59:46 ii : opened 'C:\Program Files\ShrewSoft\VPN Client\debug\iked.log'
09/09/14 08:59:46 ii : opened 'C:\Program Files\ShrewSoft\VPN Client/debug/dump-ike-decrypt.cap'
09/09/14 08:59:46 ii : rebuilding vnet device list ...
09/09/14 08:59:46 ii : device ROOT\VNET\0000 disabled
09/09/14 08:59:46 ii : network process thread begin ...
09/09/14 08:59:46 ii : ipc server process thread begin ...
09/09/14 08:59:46 ii : pfkey process thread begin ...
09/09/14 08:59:46 K< : recv pfkey X_SPDDUMP UNSPEC message
09/09/14 08:59:46 DB : policy added ( obj count = 1 )
09/09/14 09:00:02 ii : ipc client process thread begin ...
09/09/14 09:00:02 XXX.XXX.XXX.XXX
09/09/14 09:00:03 DB : 0ba2fdb81f9c6554:0000000000000000
09/09/14 09:00:03 DB : phase1 added ( obj count = 1 )
09/09/14 09:00:03 >> : security association payload
09/09/14 09:00:03 >> : - proposal #1 payload
09/09/14 09:00:03 >> : -- transform #1 payload
09/09/14 09:00:03 >> : -- transform #2 payload
09/09/14 09:00:03 >> : -- transform #3 payload
09/09/14 09:00:03 >> : -- transform #4 payload
09/09/14 09:00:03 >> : -- transform #5 payload
09/09/14 09:00:03 >> : -- transform #6 payload
09/09/14 09:00:03 >> : -- transform #7 payload
09/09/14 09:00:03 >> : -- transform #8 payload
09/09/14 09:00:03 >> : -- transform #9 payload
09/09/14 09:00:03 >> : -- transform #10 payload
09/09/14 09:00:03 >> : -- transform #11 payload
09/09/14 09:00:03 >> : -- transform #12 payload
09/09/14 09:00:03 >> : -- transform #13 payload
09/09/14 09:00:03 >> : -- transform #14 payload
09/09/14 09:00:03 >> : -- transform #15 payload
09/09/14 09:00:03 >> : -- transform #16 payload
09/09/14 09:00:03 >> : -- transform #17 payload
09/09/14 09:00:03 >> : -- transform #18 payload
09/09/14 09:00:03 >> : key exchange payload
09/09/14 09:00:03 >> : nonce payload
09/09/14 09:00:03 >> : identification payload
09/09/14 09:00:03 >> : vendor id payload
09/09/14 09:00:03 ii : local supports XAUTH
09/09/14 09:00:03 >> : vendor id payload
09/09/14 09:00:03 ii : local supports nat-t ( draft v00 )
09/09/14 09:00:03 >> : vendor id payload
09/09/14 09:00:03 ii : local supports nat-t ( draft v01 )
09/09/14 09:00:03 >> : vendor id payload
09/09/14 09:00:03 ii : local supports nat-t ( draft v02 )
09/09/14 09:00:03 >> : vendor id payload
09/09/14 09:00:03 ii : local supports nat-t ( draft v03 )
09/09/14 09:00:03 >> : vendor id payload
09/09/14 09:00:03 ii : local supports nat-t ( rfc )
09/09/14 09:00:03 >> : vendor id payload
09/09/14 09:00:03 ii : local supports DPDv1
09/09/14 09:00:03 >> : vendor id payload
09/09/14 09:00:03 ii : local is SHREW SOFT compatible
09/09/14 09:00:03 >> : vendor id payload
09/09/14 09:00:03 ii : local is NETSCREEN compatible
09/09/14 09:00:03 >> : vendor id payload
09/09/14 09:00:03 ii : local is SIDEWINDER compatible
09/09/14 09:00:03 >> : vendor id payload
09/09/14 09:00:03 ii : local is CISCO UNITY compatible
09/09/14 09:00:03 >= : cookies 0ba2fdb81f9c6554:0000000000000000
09/09/14 09:00:03 >= : message 00000000
09/09/14 09:00:03 -> : send IKE packet 192.168.240.47:500 -> XXX.XXX.XXX.XXX:500 ( 1161 bytes )
09/09/14 09:00:03 DB : phase1 resend event scheduled ( ref count = 2 )
09/09/14 09:00:03 <- : recv IKE packet XXX.XXX.XXX.XXX:500 -> 192.168.240.47:500 ( 388 bytes )
09/09/14 09:00:03 DB : phase1 found
09/09/14 09:00:03 ii : processing phase1 packet ( 388 bytes )
09/09/14 09:00:03 =< : cookies 0ba2fdb81f9c6554:8da53e12e63c6fa5
09/09/14 09:00:03 =< : message 00000000
09/09/14 09:00:03 << : security association payload
09/09/14 09:00:03 << : - propsal #1 payload
09/09/14 09:00:03 << : -- transform #13 payload
09/09/14 09:00:03 ii : unmatched isakmp proposal/transform
09/09/14 09:00:03 ii : cipher type ( 3des != aes )
09/09/14 09:00:03 ii : unmatched isakmp proposal/transform
09/09/14 09:00:03 ii : cipher type ( 3des != aes )
09/09/14 09:00:03 ii : unmatched isakmp proposal/transform
09/09/14 09:00:03 ii : cipher type ( 3des != aes )
09/09/14 09:00:03 ii : unmatched isakmp proposal/transform
09/09/14 09:00:03 ii : cipher type ( 3des != aes )
09/09/14 09:00:03 ii : unmatched isakmp proposal/transform
09/09/14 09:00:03 ii : cipher type ( 3des != aes )
09/09/14 09:00:03 ii : unmatched isakmp proposal/transform
09/09/14 09:00:03 ii : cipher type ( 3des != aes )
09/09/14 09:00:03 ii : unmatched isakmp proposal/transform
09/09/14 09:00:03 ii : cipher type ( 3des != blowfish )
09/09/14 09:00:03 ii : unmatched isakmp proposal/transform
09/09/14 09:00:03 ii : cipher type ( 3des != blowfish )
09/09/14 09:00:03 ii : unmatched isakmp proposal/transform
09/09/14 09:00:03 ii : cipher type ( 3des != blowfish )
09/09/14 09:00:03 ii : unmatched isakmp proposal/transform
09/09/14 09:00:03 ii : cipher type ( 3des != blowfish )
09/09/14 09:00:03 ii : unmatched isakmp proposal/transform
09/09/14 09:00:03 ii : cipher type ( 3des != blowfish )
09/09/14 09:00:03 ii : unmatched isakmp proposal/transform
09/09/14 09:00:03 ii : cipher type ( 3des != blowfish )
09/09/14 09:00:03 ii : matched isakmp proposal #1 transform #13
09/09/14 09:00:03 ii : - transform = ike
09/09/14 09:00:03 ii : - cipher type = 3des
09/09/14 09:00:03 ii : - key length = default
09/09/14 09:00:03 ii : - hash type = md5
09/09/14 09:00:03 ii : - dh group = modp-1024
09/09/14 09:00:03 ii : - auth type = xauth-initiator-psk
09/09/14 09:00:03 ii : - life seconds = 86400
09/09/14 09:00:03 ii : - life kbytes = 0
09/09/14 09:00:03 << : key exchange payload
09/09/14 09:00:03 << : nonce payload
09/09/14 09:00:03 << : identification payload
09/09/14 09:00:03 ii : phase1 id target is any
09/09/14 09:00:03 ii : phase1 id match
09/09/14 09:00:03 ii : received = ipv4-host XXX.XXX.XXX.XXX
09/09/14 09:00:03 << : hash payload
09/09/14 09:00:03 << : vendor id payload
09/09/14 09:00:03 ii : peer is CISCO UNITY compatible
09/09/14 09:00:03 << : vendor id payload
09/09/14 09:00:03 ii : peer supports XAUTH
09/09/14 09:00:03 << : vendor id payload
09/09/14 09:00:03 ii : peer supports DPDv1
09/09/14 09:00:03 << : vendor id payload
09/09/14 09:00:03 ii : unknown vendor id ( 20 bytes )
09/09/14 09:00:03 0x : 4048b7d5 6ebce885 25e7de7f 00d6c2d3 c0000000
09/09/14 09:00:03 << : vendor id payload
09/09/14 09:00:03 ii : unknown vendor id ( 16 bytes )
09/09/14 09:00:03 0x : 7862990f e63d6fa5 723ab5f0 89c61a28
09/09/14 09:00:03 << : vendor id payload
09/09/14 09:00:03 ii : unknown vendor id ( 16 bytes )
09/09/14 09:00:03 0x : 1f07f70e aa6514d3 b0fa9654 2a500407
09/09/14 09:00:03 ii : nat-t is unsupported by remote peer
09/09/14 09:00:03 == : DH shared secret ( 128 bytes )
09/09/14 09:00:03 == : SETKEYID ( 16 bytes )
09/09/14 09:00:03 == : SETKEYID_d ( 16 bytes )
09/09/14 09:00:03 == : SETKEYID_a ( 16 bytes )
09/09/14 09:00:03 == : SETKEYID_e ( 16 bytes )
09/09/14 09:00:03 == : cipher key ( 32 bytes )
09/09/14 09:00:03 == : cipher iv ( 8 bytes )
09/09/14 09:00:03 == : phase1 hash_i ( computed ) ( 16 bytes )
09/09/14 09:00:03 >> : hash payload
09/09/14 09:00:03 >= : cookies 0ba2fdb81f9c6554:8da53e12e63c6fa5
09/09/14 09:00:03 >= : message 00000000
09/09/14 09:00:03 >= : encrypt iv ( 8 bytes )
09/09/14 09:00:03 == : encrypt packet ( 48 bytes )
09/09/14 09:00:03 == : stored iv ( 8 bytes )
09/09/14 09:00:03 DB : phase1 resend event canceled ( ref count = 1 )
09/09/14 09:00:03 -> : send IKE packet 192.168.240.47:500 -> XXX.XXX.XXX.XXX:500 ( 80 bytes )
09/09/14 09:00:03 == : phase1 hash_r ( computed ) ( 16 bytes )
09/09/14 09:00:03 == : phase1 hash_r ( received ) ( 16 bytes )
09/09/14 09:00:03 ii : phase1 sa established
09/09/14 09:00:03 ii : XXX.XXX.XXX.XXX:500 <-> 192.168.240.47:500
09/09/14 09:00:03 ii : ba2fdb81f9c6554:8da53e12e63c6fa5
09/09/14 09:00:03 ii : sending peer INITIAL-CONTACT notification
09/09/14 09:00:03 ii : - 192.168.240.47:500 -> XXX.XXX.XXX.XXX:500
09/09/14 09:00:03 ii : - isakmp spi = 0ba2fdb81f9c6554:8da53e12e63c6fa5
09/09/14 09:00:03 ii : - data size 0
09/09/14 09:00:03 >> : hash payload
09/09/14 09:00:03 >> : notification payload
09/09/14 09:00:03 == : new informational hash ( 16 bytes )
09/09/14 09:00:03 == : new informational iv ( 8 bytes )
09/09/14 09:00:03 >= : cookies 0ba2fdb81f9c6554:8da53e12e63c6fa5
09/09/14 09:00:03 >= : message 6b9b0ea8
09/09/14 09:00:03 >= : encrypt iv ( 8 bytes )
09/09/14 09:00:03 == : encrypt packet ( 76 bytes )
09/09/14 09:00:03 == : stored iv ( 8 bytes )
09/09/14 09:00:03 -> : send IKE packet 192.168.240.47:500 -> XXX.XXX.XXX.XXX:500 ( 104 bytes )
09/09/14 09:00:03 DB : phase2 not found
09/09/14 09:00:03 <- : recv IKE packet XXX.XXX.XXX.XXX:500 -> 192.168.240.47:500 ( 100 bytes )
09/09/14 09:00:03 DB : phase1 found
09/09/14 09:00:03 ii : processing config packet ( 100 bytes )
09/09/14 09:00:03 DB : config not found
09/09/14 09:00:03 DB : config added ( obj count = 1 )
09/09/14 09:00:03 == : new config iv ( 8 bytes )
09/09/14 09:00:03 =< : cookies 0ba2fdb81f9c6554:8da53e12e63c6fa5
09/09/14 09:00:03 =< : message 58359a74
09/09/14 09:00:03 =< : decrypt iv ( 8 bytes )
09/09/14 09:00:03 == : decrypt packet ( 100 bytes )
09/09/14 09:00:03 <= : stored iv ( 8 bytes )
09/09/14 09:00:03 << : hash payload
09/09/14 09:00:03 << : attribute payload
09/09/14 09:00:03 == : configure hash_i ( computed ) ( 16 bytes )
09/09/14 09:00:03 == : configure hash_c ( computed ) ( 16 bytes )
09/09/14 09:00:03 ii : configure hash verified
09/09/14 09:00:03 ii : received xauth request - Enter Username and Password.
09/09/14 09:00:03 ii : added standard xauth username attribute
09/09/14 09:00:03 ii : added standard xauth password attribute
09/09/14 09:00:03 ii : sending xauth response for user
09/09/14 09:00:03 >> : hash payload
09/09/14 09:00:03 >> : attribute payload
09/09/14 09:00:03 == : new configure hash ( 16 bytes )
09/09/14 09:00:03 >= : cookies 0ba2fdb81f9c6554:8da53e12e63c6fa5
09/09/14 09:00:03 >= : message 58359a74
09/09/14 09:00:03 >= : encrypt iv ( 8 bytes )
09/09/14 09:00:03 == : encrypt packet ( 83 bytes )
09/09/14 09:00:03 == : stored iv ( 8 bytes )
09/09/14 09:00:03 -> : send IKE packet 192.168.240.47:500 -> XXX.XXX.XXX.XXX:500 ( 112 bytes )
09/09/14 09:00:03 DB : config resend event scheduled ( ref count = 2 )
09/09/14 09:00:03 <- : recv IKE packet XXX.XXX.XXX.XXX:500 -> 192.168.240.47:500 ( 60 bytes )
09/09/14 09:00:03 DB : phase1 found
09/09/14 09:00:03 ii : processing config packet ( 60 bytes )
09/09/14 09:00:03 DB : config found
09/09/14 09:00:03 == : new config iv ( 8 bytes )
09/09/14 09:00:03 =< : cookies 0ba2fdb81f9c6554:8da53e12e63c6fa5
09/09/14 09:00:03 =< : message edeaaaad
09/09/14 09:00:03 =< : decrypt iv ( 8 bytes )
09/09/14 09:00:03 == : decrypt packet ( 60 bytes )
09/09/14 09:00:03 <= : stored iv ( 8 bytes )
09/09/14 09:00:03 << : hash payload
09/09/14 09:00:03 << : attribute payload
09/09/14 09:00:03 == : configure hash_i ( computed ) ( 16 bytes )
09/09/14 09:00:03 == : configure hash_c ( computed ) ( 16 bytes )
09/09/14 09:00:03 ii : configure hash verified
09/09/14 09:00:03 ii : received xauth result -
09/09/14 09:00:03 ii : user user authentication succeeded
09/09/14 09:00:03 ii : sending xauth acknowledge
09/09/14 09:00:03 >> : hash payload
09/09/14 09:00:03 >> : attribute payload
09/09/14 09:00:03 == : new configure hash ( 16 bytes )
09/09/14 09:00:03 >= : cookies 0ba2fdb81f9c6554:8da53e12e63c6fa5
09/09/14 09:00:03 >= : message edeaaaad
09/09/14 09:00:03 >= : encrypt iv ( 8 bytes )
09/09/14 09:00:03 == : encrypt packet ( 56 bytes )
09/09/14 09:00:03 == : stored iv ( 8 bytes )
09/09/14 09:00:03 DB : config resend event canceled ( ref count = 1 )
09/09/14 09:00:03 -> : send IKE packet 192.168.240.47:500 -> XXX.XXX.XXX.XXX:500 ( 88 bytes )
09/09/14 09:00:03 DB : config resend event scheduled ( ref count = 2 )
09/09/14 09:00:03 ii : building config attribute list
09/09/14 09:00:03 ii : - IP4 Address
09/09/14 09:00:03 ii : - Address Expiry
09/09/14 09:00:03 ii : - IP4 Netamask
09/09/14 09:00:03 ii : - IP4 DNS Server
09/09/14 09:00:03 ii : - IP4 WINS Server
09/09/14 09:00:03 ii : - DNS Suffix
09/09/14 09:00:03 ii : - Split DNS Domain
09/09/14 09:00:03 ii : - IP4 Split Network Include
09/09/14 09:00:03 ii : - IP4 Split Network Exclude
09/09/14 09:00:03 ii : - Login Banner
09/09/14 09:00:03 ii : - PFS Group
09/09/14 09:00:03 ii : - Save Password
09/09/14 09:00:03 == : new config iv ( 8 bytes )
09/09/14 09:00:03 ii : sending config pull request
09/09/14 09:00:03 >> : hash payload
09/09/14 09:00:03 >> : attribute payload
09/09/14 09:00:03 == : new configure hash ( 16 bytes )
09/09/14 09:00:03 >= : cookies 0ba2fdb81f9c6554:8da53e12e63c6fa5
09/09/14 09:00:03 >= : message 06c1c085
09/09/14 09:00:03 >= : encrypt iv ( 8 bytes )
09/09/14 09:00:03 == : encrypt packet ( 104 bytes )
09/09/14 09:00:03 == : stored iv ( 8 bytes )
09/09/14 09:00:03 DB : config resend event canceled ( ref count = 1 )
09/09/14 09:00:03 -> : send IKE packet 192.168.240.47:500 -> XXX.XXX.XXX.XXX:500 ( 136 bytes )
09/09/14 09:00:03 DB : config resend event scheduled ( ref count = 2 )
09/09/14 09:00:05 <- : recv IKE packet XXX.XXX.XXX.XXX:500 -> 192.168.240.47:500 ( 404 bytes )
09/09/14 09:00:05 DB : phase1 found
09/09/14 09:00:05 ii : processing config packet ( 404 bytes )
09/09/14 09:00:05 DB : config found
09/09/14 09:00:05 =< : cookies 0ba2fdb81f9c6554:8da53e12e63c6fa5
09/09/14 09:00:05 =< : message 06c1c085
09/09/14 09:00:05 =< : decrypt iv ( 8 bytes )
09/09/14 09:00:05 == : decrypt packet ( 404 bytes )
09/09/14 09:00:05 <= : trimmed packet padding ( 2 bytes )
09/09/14 09:00:05 <= : stored iv ( 8 bytes )
09/09/14 09:00:05 << : hash payload
09/09/14 09:00:05 << : attribute payload
09/09/14 09:00:05 == : configure hash_i ( computed ) ( 16 bytes )
09/09/14 09:00:05 == : configure hash_c ( computed ) ( 16 bytes )
09/09/14 09:00:05 ii : configure hash verified
09/09/14 09:00:05 ii : received config pull response
09/09/14 09:00:05 ii : - IP4 Address = 192.168.251.144
09/09/14 09:00:05 ii : - IP4 Netmask = 255.255.254.0
09/09/14 09:00:05 ii : - IP4 DNS Server = XXX.XXX.XXX.XXX
09/09/14 09:00:05 ii : - IP4 DNS Server = XXX.XXX.XXX.XXX
09/09/14 09:00:05 ii : - Login Banner =...
09/09/14 09:00:05 ii : - Save Password = 0
09/09/14 09:00:05 ii : - IP4 Split Network Include = ANY:XXX.XXX.XXX.0/23:*
09/09/14 09:00:05 ii : - IP4 Split Network Include = ANY:XXX.XXX.XXX.0/26:*
09/09/14 09:00:05 ii : - IP4 Split Network Include = ANY:192.168.221.0/24:*
09/09/14 09:00:05 ii : - DNS Suffix = XXXXXXXXXXX
09/09/14 09:00:05 ii : - PFS Group = 0
09/09/14 09:00:05 DB : config resend event canceled ( ref count = 1 )
09/09/14 09:00:05 ii : VNET adapter MTU is 1500
09/09/14 09:00:05 ii : enabled adapter ROOT\VNET\0000
09/09/14 09:00:05 ii : creating IPSEC INBOUND policy ANY:XXX.XXX.XXX.0/23:* -> ANY:192.168.251.144:*
09/09/14 09:00:05 DB : policy added ( obj count = 2 )
09/09/14 09:00:05 K> : send pfkey X_SPDADD UNSPEC message
09/09/14 09:00:05 ii : creating IPSEC OUTBOUND policy ANY:192.168.251.144:* -> ANY:XXX.XXX.XXX.0/23:*
09/09/14 09:00:05 K< : recv pfkey X_SPDADD UNSPEC message
09/09/14 09:00:05 DB : policy found
09/09/14 09:00:05 ii : created IPSEC policy route for XXX.XXX.XXX.0/23
09/09/14 09:00:05 DB : policy added ( obj count = 3 )
09/09/14 09:00:05 K> : send pfkey X_SPDADD UNSPEC message
09/09/14 09:00:05 ii : creating IPSEC INBOUND policy ANY:XXX.XXX.XXX.64/26:* -> ANY:192.168.251.144:*
09/09/14 09:00:05 DB : policy added ( obj count = 4 )
09/09/14 09:00:05 K> : send pfkey X_SPDADD UNSPEC message
09/09/14 09:00:05 ii : creating IPSEC OUTBOUND policy ANY:192.168.251.144:* -> ANY:XXX.XXX.XXX.64/26:*
09/09/14 09:00:05 ii : created IPSEC policy route for XXX.XXX.XXX.64/26
09/09/14 09:00:05 DB : policy added ( obj count = 5 )
09/09/14 09:00:05 K> : send pfkey X_SPDADD UNSPEC message
09/09/14 09:00:05 ii : creating IPSEC INBOUND policy ANY:192.168.221.0/24:* -> ANY:192.168.251.144:*
09/09/14 09:00:05 DB : policy added ( obj count = 6 )
09/09/14 09:00:05 K> : send pfkey X_SPDADD UNSPEC message
09/09/14 09:00:05 ii : creating IPSEC OUTBOUND policy ANY:192.168.251.144:* -> ANY:192.168.221.0/24:*
09/09/14 09:00:05 ii : created IPSEC policy route for 192.168.221.0/24
09/09/14 09:00:05 DB : policy added ( obj count = 7 )
09/09/14 09:00:05 K> : send pfkey X_SPDADD UNSPEC message
09/09/14 09:00:05 ii : split DNS bypassed ( no split domains defined )
09/09/14 09:00:05 K< : recv pfkey X_SPDADD UNSPEC message
09/09/14 09:00:05 DB : policy found
09/09/14 09:00:05 ii : calling init phase2 for initial policy
09/09/14 09:00:05 DB : policy found
09/09/14 09:00:05 DB : policy found
09/09/14 09:00:05 DB : tunnel found
09/09/14 09:00:05 DB : new phase2 ( IPSEC initiator )
09/09/14 09:00:05 DB : phase2 added ( obj count = 1 )
09/09/14 09:00:05 K> : send pfkey GETSPI ESP message
09/09/14 09:00:05 K< : recv pfkey X_SPDADD UNSPEC message
09/09/14 09:00:05 DB : policy found
09/09/14 09:00:05 K< : recv pfkey X_SPDADD UNSPEC message
09/09/14 09:00:05 DB : policy found
09/09/14 09:00:05 K< : recv pfkey X_SPDADD UNSPEC message
09/09/14 09:00:05 DB : policy found
09/09/14 09:00:05 K< : recv pfkey X_SPDADD UNSPEC message
09/09/14 09:00:05 DB : policy found
09/09/14 09:00:05 K< : recv pfkey GETSPI ESP message
09/09/14 09:00:05 DB : phase2 found
09/09/14 09:00:05 ii : updated spi for 1 ipsec-esp proposal
09/09/14 09:00:05 DB : phase1 found
09/09/14 09:00:05 >> : hash payload
09/09/14 09:00:05 >> : security association payload
09/09/14 09:00:05 >> : - proposal #1 payload
09/09/14 09:00:05 >> : -- transform #1 payload
09/09/14 09:00:05 >> : -- transform #2 payload
09/09/14 09:00:05 >> : -- transform #3 payload
09/09/14 09:00:05 >> : -- transform #4 payload
09/09/14 09:00:05 >> : -- transform #5 payload
09/09/14 09:00:05 >> : -- transform #6 payload
09/09/14 09:00:05 >> : -- transform #7 payload
09/09/14 09:00:05 >> : -- transform #8 payload
09/09/14 09:00:05 >> : -- transform #9 payload
09/09/14 09:00:05 >> : -- transform #10 payload
09/09/14 09:00:05 >> : -- transform #11 payload
09/09/14 09:00:05 >> : -- transform #12 payload
09/09/14 09:00:05 >> : -- transform #13 payload
09/09/14 09:00:05 >> : -- transform #14 payload
09/09/14 09:00:05 >> : -- transform #15 payload
09/09/14 09:00:05 >> : -- transform #16 payload
09/09/14 09:00:05 >> : -- transform #17 payload
09/09/14 09:00:05 >> : -- transform #18 payload
09/09/14 09:00:05 >> : nonce payload
09/09/14 09:00:05 >> : identification payload
09/09/14 09:00:05 >> : identification payload
09/09/14 09:00:05 == : phase2 hash_i ( input ) ( 632 bytes )
09/09/14 09:00:05 == : phase2 hash_i ( computed ) ( 16 bytes )
09/09/14 09:00:05 == : new phase2 iv ( 8 bytes )
09/09/14 09:00:05 >= : cookies 0ba2fdb81f9c6554:8da53e12e63c6fa5
09/09/14 09:00:05 >= : message c30a6843
09/09/14 09:00:05 >= : encrypt iv ( 8 bytes )
09/09/14 09:00:05 == : encrypt packet ( 676 bytes )
09/09/14 09:00:05 == : stored iv ( 8 bytes )
09/09/14 09:00:05 -> : send IKE packet 192.168.240.47:500 -> XXX.XXX.XXX.XXX:500 ( 704 bytes )
09/09/14 09:00:05 DB : phase2 resend event scheduled ( ref count = 2 )
09/09/14 09:00:05 <- : recv IKE packet XXX.XXX.XXX.XXX:500 -> 192.168.240.47:500 ( 148 bytes )
09/09/14 09:00:05 DB : phase1 found
09/09/14 09:00:05 ii : processing phase2 packet ( 148 bytes )
09/09/14 09:00:05 DB : phase2 found
09/09/14 09:00:05 =< : cookies 0ba2fdb81f9c6554:8da53e12e63c6fa5
09/09/14 09:00:05 =< : message c30a6843
09/09/14 09:00:05 =< : decrypt iv ( 8 bytes )
09/09/14 09:00:05 == : decrypt packet ( 148 bytes )
09/09/14 09:00:05 <= : stored iv ( 8 bytes )
09/09/14 09:00:05 << : hash payload
09/09/14 09:00:05 << : security association payload
09/09/14 09:00:05 << : - propsal #1 payload
09/09/14 09:00:05 << : -- transform #1 payload
09/09/14 09:00:05 << : nonce payload
09/09/14 09:00:05 << : identification payload
09/09/14 09:00:05 << : identification payload
09/09/14 09:00:05 == : phase2 hash_r ( input ) ( 124 bytes )
09/09/14 09:00:05 == : phase2 hash_r ( computed ) ( 16 bytes )
09/09/14 09:00:05 == : phase2 hash_r ( received ) ( 16 bytes )
09/09/14 09:00:05 ii : unmatched ipsec-esp proposal/transform
09/09/14 09:00:05 ii : crypto transform type ( esp-3des != esp-aes )
09/09/14 09:00:05 ii : unmatched ipsec-esp proposal/transform
09/09/14 09:00:05 ii : crypto transform type ( esp-3des != esp-aes )
09/09/14 09:00:05 ii : unmatched ipsec-esp proposal/transform
09/09/14 09:00:05 ii : crypto transform type ( esp-3des != esp-aes )
09/09/14 09:00:05 ii : unmatched ipsec-esp proposal/transform
09/09/14 09:00:05 ii : crypto transform type ( esp-3des != esp-aes )
09/09/14 09:00:05 ii : unmatched ipsec-esp proposal/transform
09/09/14 09:00:05 ii : crypto transform type ( esp-3des != esp-aes )
09/09/14 09:00:05 ii : unmatched ipsec-esp proposal/transform
09/09/14 09:00:05 ii : crypto transform type ( esp-3des != esp-aes )
09/09/14 09:00:05 ii : unmatched ipsec-esp proposal/transform
09/09/14 09:00:05 ii : crypto transform type ( esp-3des != esp-blowfish )
09/09/14 09:00:05 ii : unmatched ipsec-esp proposal/transform
09/09/14 09:00:05 ii : crypto transform type ( esp-3des != esp-blowfish )
09/09/14 09:00:05 ii : unmatched ipsec-esp proposal/transform
09/09/14 09:00:05 ii : crypto transform type ( esp-3des != esp-blowfish )
09/09/14 09:00:05 ii : unmatched ipsec-esp proposal/transform
09/09/14 09:00:05 ii : crypto transform type ( esp-3des != esp-blowfish )
09/09/14 09:00:05 ii : unmatched ipsec-esp proposal/transform
09/09/14 09:00:05 ii : crypto transform type ( esp-3des != esp-blowfish )
09/09/14 09:00:05 ii : unmatched ipsec-esp proposal/transform
09/09/14 09:00:05 ii : crypto transform type ( esp-3des != esp-blowfish )
09/09/14 09:00:05 !! : peer violates RFC, transform number mismatch ( 1 != 13 )
09/09/14 09:00:05 ii : matched ipsec-esp proposal #1 transform #13
09/09/14 09:00:05 ii : - transform = esp-3des
09/09/14 09:00:05 ii : - key length = default
09/09/14 09:00:05 ii : - encap mode = tunnel
09/09/14 09:00:05 ii : - msg auth = hmac-md5
09/09/14 09:00:05 ii : - pfs dh group = none
09/09/14 09:00:05 ii : - life seconds = 3600
09/09/14 09:00:05 ii : - life kbytes = 0
09/09/14 09:00:05 DB : policy found
09/09/14 09:00:05 K> : send pfkey GETSPI ESP message
09/09/14 09:00:05 K< : recv pfkey GETSPI ESP message
09/09/14 09:00:05 DB : phase2 found
09/09/14 09:00:05 ii : phase2 ids accepted
09/09/14 09:00:05 ii : - loc ANY:192.168.251.144:* -> ANY:XXX.XXX.XXX.0/23:*
09/09/14 09:00:05 ii : - rmt ANY:XXX.XXX.XXX.0/23:* -> ANY:192.168.251.144:*
09/09/14 09:00:05 ii : phase2 sa established
09/09/14 09:00:05 ii : 192.168.240.47:500 <-> XXX.XXX.XXX.XXX:500
09/09/14 09:00:05 == : phase2 hash_p ( input ) ( 45 bytes )
09/09/14 09:00:05 == : phase2 hash_p ( computed ) ( 16 bytes )
09/09/14 09:00:05 >> : hash payload
09/09/14 09:00:05 >= : cookies 0ba2fdb81f9c6554:8da53e12e63c6fa5
09/09/14 09:00:05 >= : message c30a6843
09/09/14 09:00:05 >= : encrypt iv ( 8 bytes )
09/09/14 09:00:05 == : encrypt packet ( 48 bytes )
09/09/14 09:00:05 == : stored iv ( 8 bytes )
09/09/14 09:00:05 DB : phase2 resend event canceled ( ref count = 1 )
09/09/14 09:00:05 -> : send IKE packet 192.168.240.47:500 -> XXX.XXX.XXX.XXX:500 ( 80 bytes )
09/09/14 09:00:05 == : spi cipher key data ( 24 bytes )
09/09/14 09:00:05 == : spi hmac key data ( 16 bytes )
09/09/14 09:00:05 K> : send pfkey UPDATE ESP message
09/09/14 09:00:05 K< : recv pfkey UPDATE ESP message
09/09/14 09:00:05 == : spi cipher key data ( 24 bytes )
09/09/14 09:00:05 == : spi hmac key data ( 16 bytes )
09/09/14 09:00:05 K> : send pfkey UPDATE ESP message
09/09/14 09:00:05 K< : recv pfkey UPDATE ESP message
09/09/14 09:00:08 K< : recv pfkey ACQUIRE UNSPEC message
09/09/14 09:00:08 DB : policy found
09/09/14 09:00:08 DB : policy found
09/09/14 09:00:08 DB : tunnel found
09/09/14 09:00:08 DB : new phase2 ( IPSEC initiator )
09/09/14 09:00:08 DB : phase2 added ( obj count = 2 )
09/09/14 09:00:08 K> : send pfkey GETSPI ESP message
09/09/14 09:00:08 K< : recv pfkey GETSPI ESP message
09/09/14 09:00:08 DB : phase2 found
09/09/14 09:00:08 ii : updated spi for 1 ipsec-esp proposal
09/09/14 09:00:08 DB : phase1 found
09/09/14 09:00:08 >> : hash payload
09/09/14 09:00:08 >> : security association payload
09/09/14 09:00:08 >> : - proposal #1 payload
09/09/14 09:00:08 >> : -- transform #1 payload
09/09/14 09:00:08 >> : -- transform #2 payload
09/09/14 09:00:08 >> : -- transform #3 payload
09/09/14 09:00:08 >> : -- transform #4 payload
09/09/14 09:00:08 >> : -- transform #5 payload
09/09/14 09:00:08 >> : -- transform #6 payload
09/09/14 09:00:08 >> : -- transform #7 payload
09/09/14 09:00:08 >> : -- transform #8 payload
09/09/14 09:00:08 >> : -- transform #9 payload
09/09/14 09:00:08 >> : -- transform #10 payload
09/09/14 09:00:08 >> : -- transform #11 payload
09/09/14 09:00:08 >> : -- transform #12 payload
09/09/14 09:00:08 >> : -- transform #13 payload
09/09/14 09:00:08 >> : -- transform #14 payload
09/09/14 09:00:08 >> : -- transform #15 payload
09/09/14 09:00:08 >> : -- transform #16 payload
09/09/14 09:00:08 >> : -- transform #17 payload
09/09/14 09:00:08 >> : -- transform #18 payload
09/09/14 09:00:08 >> : nonce payload
09/09/14 09:00:08 >> : identification payload
09/09/14 09:00:08 >> : identification payload
09/09/14 09:00:08 == : phase2 hash_i ( input ) ( 632 bytes )
09/09/14 09:00:08 == : phase2 hash_i ( computed ) ( 16 bytes )
09/09/14 09:00:08 == : new phase2 iv ( 8 bytes )
09/09/14 09:00:08 >= : cookies 0ba2fdb81f9c6554:8da53e12e63c6fa5
09/09/14 09:00:08 >= : message 3c44c994
09/09/14 09:00:08 >= : encrypt iv ( 8 bytes )
09/09/14 09:00:08 == : encrypt packet ( 676 bytes )
09/09/14 09:00:08 == : stored iv ( 8 bytes )
09/09/14 09:00:08 -> : send IKE packet 192.168.240.47:500 -> XXX.XXX.XXX.XXX:500 ( 704 bytes )
09/09/14 09:00:08 DB : phase2 resend event scheduled ( ref count = 2 )
09/09/14 09:00:08 <- : recv IKE packet XXX.XXX.XXX.XXX:500 -> 192.168.240.47:500 ( 148 bytes )
09/09/14 09:00:08 DB : phase1 found
09/09/14 09:00:08 ii : processing phase2 packet ( 148 bytes )
09/09/14 09:00:08 DB : phase2 found
09/09/14 09:00:08 =< : cookies 0ba2fdb81f9c6554:8da53e12e63c6fa5
09/09/14 09:00:08 =< : message 3c44c994
09/09/14 09:00:08 =< : decrypt iv ( 8 bytes )
09/09/14 09:00:08 == : decrypt packet ( 148 bytes )
09/09/14 09:00:08 <= : stored iv ( 8 bytes )
09/09/14 09:00:08 << : hash payload
09/09/14 09:00:08 << : security association payload
09/09/14 09:00:08 << : - propsal #1 payload
09/09/14 09:00:08 << : -- transform #1 payload
09/09/14 09:00:08 << : nonce payload
09/09/14 09:00:08 << : identification payload
09/09/14 09:00:08 << : identification payload
09/09/14 09:00:08 == : phase2 hash_r ( input ) ( 124 bytes )
09/09/14 09:00:08 == : phase2 hash_r ( computed ) ( 16 bytes )
09/09/14 09:00:08 == : phase2 hash_r ( received ) ( 16 bytes )
09/09/14 09:00:08 ii : unmatched ipsec-esp proposal/transform
09/09/14 09:00:08 ii : crypto transform type ( esp-3des != esp-aes )
09/09/14 09:00:08 ii : unmatched ipsec-esp proposal/transform
09/09/14 09:00:08 ii : crypto transform type ( esp-3des != esp-aes )
09/09/14 09:00:08 ii : unmatched ipsec-esp proposal/transform
09/09/14 09:00:08 ii : crypto transform type ( esp-3des != esp-aes )
09/09/14 09:00:08 ii : unmatched ipsec-esp proposal/transform
09/09/14 09:00:08 ii : crypto transform type ( esp-3des != esp-aes )
09/09/14 09:00:08 ii : unmatched ipsec-esp proposal/transform
09/09/14 09:00:08 ii : crypto transform type ( esp-3des != esp-aes )
09/09/14 09:00:08 ii : unmatched ipsec-esp proposal/transform
09/09/14 09:00:08 ii : crypto transform type ( esp-3des != esp-aes )
09/09/14 09:00:08 ii : unmatched ipsec-esp proposal/transform
09/09/14 09:00:08 ii : crypto transform type ( esp-3des != esp-blowfish )
09/09/14 09:00:08 ii : unmatched ipsec-esp proposal/transform
09/09/14 09:00:08 ii : crypto transform type ( esp-3des != esp-blowfish )
09/09/14 09:00:08 ii : unmatched ipsec-esp proposal/transform
09/09/14 09:00:08 ii : crypto transform type ( esp-3des != esp-blowfish )
09/09/14 09:00:08 ii : unmatched ipsec-esp proposal/transform
09/09/14 09:00:08 ii : crypto transform type ( esp-3des != esp-blowfish )
09/09/14 09:00:08 ii : unmatched ipsec-esp proposal/transform
09/09/14 09:00:08 ii : crypto transform type ( esp-3des != esp-blowfish )
09/09/14 09:00:08 ii : unmatched ipsec-esp proposal/transform
09/09/14 09:00:08 ii : crypto transform type ( esp-3des != esp-blowfish )
09/09/14 09:00:08 !! : peer violates RFC, transform number mismatch ( 1 != 13 )
09/09/14 09:00:08 ii : matched ipsec-esp proposal #1 transform #13
09/09/14 09:00:08 ii : - transform = esp-3des
09/09/14 09:00:08 ii : - key length = default
09/09/14 09:00:08 ii : - encap mode = tunnel
09/09/14 09:00:08 ii : - msg auth = hmac-md5
09/09/14 09:00:08 ii : - pfs dh group = none
09/09/14 09:00:08 ii : - life seconds = 3600
09/09/14 09:00:08 ii : - life kbytes = 0
09/09/14 09:00:08 DB : policy found
09/09/14 09:00:08 K> : send pfkey GETSPI ESP message
09/09/14 09:00:08 ii : phase2 ids accepted
09/09/14 09:00:08 ii : - loc ANY:192.168.251.144:* -> ANY:XXX.XXX.71.64/26:*
09/09/14 09:00:08 ii : - rmt ANY:XXX.XXX.XXX.64/26:* -> ANY:192.168.251.144:*
09/09/14 09:00:08 ii : phase2 sa established
09/09/14 09:00:08 ii : 192.168.240.47:500 <-> XXX.XXX.XXX.XXX:500
09/09/14 09:00:08 == : phase2 hash_p ( input ) ( 45 bytes )
09/09/14 09:00:08 == : phase2 hash_p ( computed ) ( 16 bytes )
09/09/14 09:00:08 >> : hash payload
09/09/14 09:00:08 >= : cookies 0ba2fdb81f9c6554:8da53e12e63c6fa5
09/09/14 09:00:08 >= : message 3c44c994
09/09/14 09:00:08 >= : encrypt iv ( 8 bytes )
09/09/14 09:00:08 == : encrypt packet ( 48 bytes )
09/09/14 09:00:08 == : stored iv ( 8 bytes )
09/09/14 09:00:08 DB : phase2 resend event canceled ( ref count = 1 )
09/09/14 09:00:08 -> : send IKE packet 192.168.240.47:500 -> XXX.XXX.XXX.XXX:500 ( 80 bytes )
09/09/14 09:00:08 == : spi cipher key data ( 24 bytes )
09/09/14 09:00:08 == : spi hmac key data ( 16 bytes )
09/09/14 09:00:08 K> : send pfkey UPDATE ESP message
09/09/14 09:00:08 == : spi cipher key data ( 24 bytes )
09/09/14 09:00:08 == : spi hmac key data ( 16 bytes )
09/09/14 09:00:08 K> : send pfkey UPDATE ESP message
09/09/14 09:00:08 K< : recv pfkey GETSPI ESP message
09/09/14 09:00:08 DB : phase2 found
09/09/14 09:00:08 K< : recv pfkey UPDATE ESP message
09/09/14 09:00:08 K< : recv pfkey UPDATE ESP message
09/09/14 09:00:18 DB : phase1 found
09/09/14 09:00:18 ii : sending peer DPDV1-R-U-THERE notification
09/09/14 09:00:18 ii : - 192.168.240.47:500 -> XXX.XXX.XXX.XXX:500
09/09/14 09:00:18 ii : - isakmp spi = 0ba2fdb81f9c6554:8da53e12e63c6fa5
09/09/14 09:00:18 ii : - data size 4
09/09/14 09:00:18 >> : hash payload
09/09/14 09:00:18 >> : notification payload
09/09/14 09:00:18 == : new informational hash ( 16 bytes )
09/09/14 09:00:18 == : new informational iv ( 8 bytes )
09/09/14 09:00:18 >= : cookies 0ba2fdb81f9c6554:8da53e12e63c6fa5
09/09/14 09:00:18 >= : message 62a09523
09/09/14 09:00:18 >= : encrypt iv ( 8 bytes )
09/09/14 09:00:18 == : encrypt packet ( 80 bytes )
09/09/14 09:00:18 == : stored iv ( 8 bytes )
09/09/14 09:00:18 -> : send IKE packet 192.168.240.47:500 -> XXX.XXX.XXX.XXX:500 ( 112 bytes )
09/09/14 09:00:18 ii : DPD ARE-YOU-THERE sequence 3b73015d requested
09/09/14 09:00:18 <- : recv IKE packet XXX.XXX.XXX.XXX:500 -> 192.168.240.47:500 ( 84 bytes )
09/09/14 09:00:18 DB : phase1 found
09/09/14 09:00:18 ii : processing informational packet ( 84 bytes )
09/09/14 09:00:18 == : new informational iv ( 8 bytes )
09/09/14 09:00:18 =< : cookies 0ba2fdb81f9c6554:8da53e12e63c6fa5
09/09/14 09:00:18 =< : message f0d8e07f
09/09/14 09:00:18 =< : decrypt iv ( 8 bytes )
09/09/14 09:00:18 == : decrypt packet ( 84 bytes )
09/09/14 09:00:18 <= : trimmed packet padding ( 4 bytes )
09/09/14 09:00:18 <= : stored iv ( 8 bytes )
09/09/14 09:00:18 << : hash payload
09/09/14 09:00:18 << : notification payload
09/09/14 09:00:18 == : informational hash_i ( computed ) ( 16 bytes )
09/09/14 09:00:18 == : informational hash_c ( received ) ( 16 bytes )
09/09/14 09:00:18 ii : informational hash verified
09/09/14 09:00:18 ii : received peer DPDV1-R-U-THERE-ACK notification
09/09/14 09:00:18 ii : - XXX.XXX.XXX.XXX:500 -> 192.168.240.47:500
09/09/14 09:00:18 ii : - isakmp spi = 0ba2fdb81f9c6554:8da53e12e63c6fa5
09/09/14 09:00:18 ii : - data size 4
09/09/14 09:00:18 ii : DPD ARE-YOU-THERE-ACK sequence 3b73015d accepted
09/09/14 09:00:18 ii : next tunnel DPD request in 15 secs for peer XXX.XXX.XXX.XXX:500
09/09/14 09:00:33 DB : phase1 found
09/09/14 09:00:33 ii : sending peer DPDV1-R-U-THERE notification
09/09/14 09:00:33 ii : - 192.168.240.47:500 -> XXX.XXX.XXX.XXX:500
09/09/14 09:00:33 ii : - isakmp spi = 0ba2fdb81f9c6554:8da53e12e63c6fa5
09/09/14 09:00:33 ii : - data size 4
09/09/14 09:00:33 >> : hash payload
09/09/14 09:00:33 >> : notification payload
09/09/14 09:00:33 == : new informational hash ( 16 bytes )
09/09/14 09:00:33 == : new informational iv ( 8 bytes )
09/09/14 09:00:33 >= : cookies 0ba2fdb81f9c6554:8da53e12e63c6fa5
09/09/14 09:00:33 >= : message 46672fcc
09/09/14 09:00:33 >= : encrypt iv ( 8 bytes )
09/09/14 09:00:33 == : encrypt packet ( 80 bytes )
09/09/14 09:00:33 == : stored iv ( 8 bytes )
09/09/14 09:00:33 -> : send IKE packet 192.168.240.47:500 -> XXX.XXX.XXX.XXX:500 ( 112 bytes )
09/09/14 09:00:33 ii : DPD ARE-YOU-THERE sequence 3b73015e requested
09/09/14 09:00:33 <- : recv IKE packet XXX.XXX.XXX.XXX:500 -> 192.168.240.47:500 ( 84 bytes )
09/09/14 09:00:33 DB : phase1 found
09/09/14 09:00:33 ii : processing informational packet ( 84 bytes )
09/09/14 09:00:33 == : new informational iv ( 8 bytes )
09/09/14 09:00:33 =< : cookies 0ba2fdb81f9c6554:8da53e12e63c6fa5
09/09/14 09:00:33 =< : message b59854e3
09/09/14 09:00:33 =< : decrypt iv ( 8 bytes )
09/09/14 09:00:33 == : decrypt packet ( 84 bytes )
09/09/14 09:00:33 <= : trimmed packet padding ( 4 bytes )
09/09/14 09:00:33 <= : stored iv ( 8 bytes )
09/09/14 09:00:33 << : hash payload
09/09/14 09:00:33 << : notification payload
09/09/14 09:00:33 == : informational hash_i ( computed ) ( 16 bytes )
09/09/14 09:00:33 == : informational hash_c ( received ) ( 16 bytes )
09/09/14 09:00:33 ii : informational hash verified
09/09/14 09:00:33 ii : received peer DPDV1-R-U-THERE-ACK notification
09/09/14 09:00:33 ii : - XXX.XXX.XXX.XXX:500 -> 192.168.240.47:500
09/09/14 09:00:33 ii : - isakmp spi = 0ba2fdb81f9c6554:8da53e12e63c6fa5
09/09/14 09:00:33 ii : - data size 4
09/09/14 09:00:33 ii : DPD ARE-YOU-THERE-ACK sequence 3b73015e accepted
09/09/14 09:00:33 ii : next tunnel DPD request in 15 secs for peer XXX.XXX.XXX.XXX:500
09/09/14 09:00:48 DB : phase1 found
09/09/14 09:00:48 ii : sending peer DPDV1-R-U-THERE notification
09/09/14 09:00:48 ii : - 192.168.240.47:500 -> XXX.XXX.XXX.XXX:500
09/09/14 09:00:48 ii : - isakmp spi = 0ba2fdb81f9c6554:8da53e12e63c6fa5
09/09/14 09:00:48 ii : - data size 4
09/09/14 09:00:48 >> : hash payload
09/09/14 09:00:48 >> : notification payload
09/09/14 09:00:48 == : new informational hash ( 16 bytes )
09/09/14 09:00:48 == : new informational iv ( 8 bytes )
09/09/14 09:00:48 >= : cookies 0ba2fdb81f9c6554:8da53e12e63c6fa5
09/09/14 09:00:48 >= : message 60f975f6
09/09/14 09:00:48 >= : encrypt iv ( 8 bytes )
09/09/14 09:00:48 == : encrypt packet ( 80 bytes )
09/09/14 09:00:48 == : stored iv ( 8 bytes )
09/09/14 09:00:48 -> : send IKE packet 192.168.240.47:500 -> XXX.XXX.XXX.XXX:500 ( 112 bytes )
09/09/14 09:00:48 ii : DPD ARE-YOU-THERE sequence 3b73015f requested
09/09/14 09:00:48 <- : recv IKE packet XXX.XXX.XXX.XXX:500 -> 192.168.240.47:500 ( 84 bytes )
09/09/14 09:00:48 DB : phase1 found
09/09/14 09:00:48 ii : processing informational packet ( 84 bytes )
09/09/14 09:00:48 == : new informational iv ( 8 bytes )
09/09/14 09:00:48 =< : cookies 0ba2fdb81f9c6554:8da53e12e63c6fa5
09/09/14 09:00:48 =< : message 94ec12ed
09/09/14 09:00:48 =< : decrypt iv ( 8 bytes )
09/09/14 09:00:48 == : decrypt packet ( 84 bytes )
09/09/14 09:00:48 <= : trimmed packet padding ( 4 bytes )
09/09/14 09:00:48 <= : stored iv ( 8 bytes )
09/09/14 09:00:48 << : hash payload
09/09/14 09:00:48 << : notification payload
09/09/14 09:00:48 == : informational hash_i ( computed ) ( 16 bytes )
09/09/14 09:00:48 == : informational hash_c ( received ) ( 16 bytes )
09/09/14 09:00:48 ii : informational hash verified
09/09/14 09:00:48 ii : received peer DPDV1-R-U-THERE-ACK notification
09/09/14 09:00:48 ii : - XXX.XXX.XXX.XXX:500 -> 192.168.240.47:500
09/09/14 09:00:48 ii : - isakmp spi = 0ba2fdb81f9c6554:8da53e12e63c6fa5
09/09/14 09:00:48 ii : - data size 4
09/09/14 09:00:48 ii : DPD ARE-YOU-THERE-ACK sequence 3b73015f accepted
09/09/14 09:00:48 ii : next tunnel DPD request in 15 secs for peer XXX.XXX.XXX.XXX:500
09/09/14 09:01:03 DB : phase1 found
09/09/14 09:01:03 ii : sending peer DPDV1-R-U-THERE notification
09/09/14 09:01:03 ii : - 192.168.240.47:500 -> XXX.XXX.XXX.XXX:500
09/09/14 09:01:03 ii : - isakmp spi = 0ba2fdb81f9c6554:8da53e12e63c6fa5
09/09/14 09:01:03 ii : - data size 4
09/09/14 09:01:03 >> : hash payload
09/09/14 09:01:03 >> : notification payload
09/09/14 09:01:03 == : new informational hash ( 16 bytes )
09/09/14 09:01:03 == : new informational iv ( 8 bytes )
09/09/14 09:01:03 >= : cookies 0ba2fdb81f9c6554:8da53e12e63c6fa5
09/09/14 09:01:03 >= : message 270afa36
09/09/14 09:01:03 >= : encrypt iv ( 8 bytes )
09/09/14 09:01:03 == : encrypt packet ( 80 bytes )
09/09/14 09:01:03 == : stored iv ( 8 bytes )
09/09/14 09:01:03 -> : send IKE packet 192.168.240.47:500 -> XXX.XXX.XXX.XXX:500 ( 112 bytes )
09/09/14 09:01:03 ii : DPD ARE-YOU-THERE sequence 3b730160 requested
09/09/14 09:01:03 <- : recv IKE packet XXX.XXX.XXX.XXX:500 -> 192.168.240.47:500 ( 84 bytes )
09/09/14 09:01:03 DB : phase1 found
09/09/14 09:01:03 ii : processing informational packet ( 84 bytes )
09/09/14 09:01:03 == : new informational iv ( 8 bytes )
09/09/14 09:01:03 =< : cookies 0ba2fdb81f9c6554:8da53e12e63c6fa5
09/09/14 09:01:03 =< : message 58da122e
09/09/14 09:01:03 =< : decrypt iv ( 8 bytes )
09/09/14 09:01:03 == : decrypt packet ( 84 bytes )
09/09/14 09:01:03 <= : trimmed packet padding ( 4 bytes )
09/09/14 09:01:03 <= : stored iv ( 8 bytes )
09/09/14 09:01:03 << : hash payload
09/09/14 09:01:03 << : notification payload
09/09/14 09:01:03 == : informational hash_i ( computed ) ( 16 bytes )
09/09/14 09:01:03 == : informational hash_c ( received ) ( 16 bytes )
09/09/14 09:01:03 ii : informational hash verified
09/09/14 09:01:03 ii : received peer DPDV1-R-U-THERE-ACK notification
09/09/14 09:01:03 ii : - XXX.XXX.XXX.XXX:500 -> 192.168.240.47:500
09/09/14 09:01:03 ii : - isakmp spi = 0ba2fdb81f9c6554:8da53e12e63c6fa5
09/09/14 09:01:03 ii : - data size 4
09/09/14 09:01:03 ii : DPD ARE-YOU-THERE-ACK sequence 3b730160 accepted
09/09/14 09:01:03 ii : next tunnel DPD request in 15 secs for peer XXX.XXX.XXX.XXX:500
09/09/14 09:01:18 DB : phase1 found
09/09/14 09:01:18 ii : sending peer DPDV1-R-U-THERE notification
09/09/14 09:01:18 ii : - 192.168.240.47:500 -> XXX.XXX.XXX.XXX:500
09/09/14 09:01:18 ii : - isakmp spi = 0ba2fdb81f9c6554:8da53e12e63c6fa5
09/09/14 09:01:18 ii : - data size 4
09/09/14 09:01:18 >> : hash payload
09/09/14 09:01:18 >> : notification payload
09/09/14 09:01:18 == : new informational hash ( 16 bytes )
09/09/14 09:01:18 == : new informational iv ( 8 bytes )
09/09/14 09:01:18 >= : cookies 0ba2fdb81f9c6554:8da53e12e63c6fa5
09/09/14 09:01:18 >= : message b3ad6e72
09/09/14 09:01:18 >= : encrypt iv ( 8 bytes )
09/09/14 09:01:18 == : encrypt packet ( 80 bytes )
09/09/14 09:01:18 == : stored iv ( 8 bytes )
09/09/14 09:01:18 -> : send IKE packet 192.168.240.47:500 -> XXX.XXX.XXX.XXX:500 ( 112 bytes )
09/09/14 09:01:18 ii : DPD ARE-YOU-THERE sequence 3b730161 requested
09/09/14 09:01:18 <- : recv IKE packet XXX.XXX.XXX.XXX:500 -> 192.168.240.47:500 ( 84 bytes )
09/09/14 09:01:18 DB : phase1 found
09/09/14 09:01:18 ii : processing informational packet ( 84 bytes )
09/09/14 09:01:18 == : new informational iv ( 8 bytes )
09/09/14 09:01:18 =< : cookies 0ba2fdb81f9c6554:8da53e12e63c6fa5
09/09/14 09:01:18 =< : message de1824c0
09/09/14 09:01:18 =< : decrypt iv ( 8 bytes )
09/09/14 09:01:18 == : decrypt packet ( 84 bytes )
09/09/14 09:01:18 <= : trimmed packet padding ( 4 bytes )
09/09/14 09:01:18 <= : stored iv ( 8 bytes )
09/09/14 09:01:18 << : hash payload
09/09/14 09:01:18 << : notification payload
09/09/14 09:01:18 == : informational hash_i ( computed ) ( 16 bytes )
09/09/14 09:01:18 == : informational hash_c ( received ) ( 16 bytes )
09/09/14 09:01:18 ii : informational hash verified
09/09/14 09:01:18 ii : received peer DPDV1-R-U-THERE-ACK notification
09/09/14 09:01:18 ii : - XXX.XXX.XXX.XXX:500 -> 192.168.240.47:500
09/09/14 09:01:18 ii : - isakmp spi = 0ba2fdb81f9c6554:8da53e12e63c6fa5
09/09/14 09:01:18 ii : - data size 4
09/09/14 09:01:18 ii : DPD ARE-YOU-THERE-ACK sequence 3b730161 accepted
09/09/14 09:01:18 ii : next tunnel DPD request in 15 secs for peer XXX.XXX.XXX.XXX:500
09/09/14 09:01:33 DB : phase1 found
09/09/14 09:01:33 ii : sending peer DPDV1-R-U-THERE notification
09/09/14 09:01:33 ii : - 192.168.240.47:500 -> XXX.XXX.XXX.XXX:500
09/09/14 09:01:33 ii : - isakmp spi = 0ba2fdb81f9c6554:8da53e12e63c6fa5
09/09/14 09:01:33 ii : - data size 4
09/09/14 09:01:33 >> : hash payload
09/09/14 09:01:33 >> : notification payload
09/09/14 09:01:33 == : new informational hash ( 16 bytes )
09/09/14 09:01:33 == : new informational iv ( 8 bytes )
09/09/14 09:01:33 >= : cookies 0ba2fdb81f9c6554:8da53e12e63c6fa5
09/09/14 09:01:33 >= : message 4e5196b8
09/09/14 09:01:33 >= : encrypt iv ( 8 bytes )
09/09/14 09:01:33 == : encrypt packet ( 80 bytes )
09/09/14 09:01:33 == : stored iv ( 8 bytes )
09/09/14 09:01:33 -> : send IKE packet 192.168.240.47:500 -> XXX.XXX.XXX.XXX:500 ( 112 bytes )
09/09/14 09:01:33 ii : DPD ARE-YOU-THERE sequence 3b730162 requested
09/09/14 09:01:33 <- : recv IKE packet XXX.XXX.XXX.XXX:500 -> 192.168.240.47:500 ( 84 bytes )
09/09/14 09:01:33 DB : phase1 found
09/09/14 09:01:33 ii : processing informational packet ( 84 bytes )
09/09/14 09:01:33 == : new informational iv ( 8 bytes )
09/09/14 09:01:33 =< : cookies 0ba2fdb81f9c6554:8da53e12e63c6fa5
09/09/14 09:01:33 =< : message 79b56ab3
09/09/14 09:01:33 =< : decrypt iv ( 8 bytes )
09/09/14 09:01:33 == : decrypt packet ( 84 bytes )
09/09/14 09:01:33 <= : trimmed packet padding ( 4 bytes )
09/09/14 09:01:33 <= : stored iv ( 8 bytes )
09/09/14 09:01:33 << : hash payload
09/09/14 09:01:33 << : notification payload
09/09/14 09:01:33 == : informational hash_i ( computed ) ( 16 bytes )
09/09/14 09:01:33 == : informational hash_c ( received ) ( 16 bytes )
09/09/14 09:01:33 ii : informational hash verified
09/09/14 09:01:33 ii : received peer DPDV1-R-U-THERE-ACK notification
09/09/14 09:01:33 ii : - XXX.XXX.XXX.XXX:500 -> 192.168.240.47:500
09/09/14 09:01:33 ii : - isakmp spi = 0ba2fdb81f9c6554:8da53e12e63c6fa5
09/09/14 09:01:33 ii : - data size 4
09/09/14 09:01:33 ii : DPD ARE-YOU-THERE-ACK sequence 3b730162 accepted
09/09/14 09:01:33 ii : next tunnel DPD request in 15 secs for peer XXX.XXX.XXX.XXX:500
09/09/14 09:01:48 DB : phase1 found
09/09/14 09:01:48 ii : sending peer DPDV1-R-U-THERE notification
09/09/14 09:01:48 ii : - 192.168.240.47:500 -> XXX.XXX.XXX.XXX:500
09/09/14 09:01:48 ii : - isakmp spi = 0ba2fdb81f9c6554:8da53e12e63c6fa5
09/09/14 09:01:48 ii : - data size 4
09/09/14 09:01:48 >> : hash payload
09/09/14 09:01:48 >> : notification payload
09/09/14 09:01:48 == : new informational hash ( 16 bytes )
09/09/14 09:01:48 == : new informational iv ( 8 bytes )
09/09/14 09:01:48 >= : cookies 0ba2fdb81f9c6554:8da53e12e63c6fa5
09/09/14 09:01:48 >= : message 069ae7c7
09/09/14 09:01:48 >= : encrypt iv ( 8 bytes )
09/09/14 09:01:48 == : encrypt packet ( 80 bytes )
09/09/14 09:01:48 == : stored iv ( 8 bytes )
09/09/14 09:01:48 -> : send IKE packet 192.168.240.47:500 -> XXX.XXX.XXX.XXX:500 ( 112 bytes )
09/09/14 09:01:48 ii : DPD ARE-YOU-THERE sequence 3b730163 requested
09/09/14 09:01:48 <- : recv IKE packet XXX.XXX.XXX.XXX:500 -> 192.168.240.47:500 ( 84 bytes )
09/09/14 09:01:48 DB : phase1 found
09/09/14 09:01:48 ii : processing informational packet ( 84 bytes )
09/09/14 09:01:48 == : new informational iv ( 8 bytes )
09/09/14 09:01:48 =< : cookies 0ba2fdb81f9c6554:8da53e12e63c6fa5
09/09/14 09:01:48 =< : message 0c46b835
09/09/14 09:01:48 =< : decrypt iv ( 8 bytes )
09/09/14 09:01:48 == : decrypt packet ( 84 bytes )
09/09/14 09:01:48 <= : trimmed packet padding ( 4 bytes )
09/09/14 09:01:48 <= : stored iv ( 8 bytes )
09/09/14 09:01:48 << : hash payload
09/09/14 09:01:48 << : notification payload
09/09/14 09:01:48 == : informational hash_i ( computed ) ( 16 bytes )
09/09/14 09:01:48 == : informational hash_c ( received ) ( 16 bytes )
09/09/14 09:01:48 ii : informational hash verified
09/09/14 09:01:48 ii : received peer DPDV1-R-U-THERE-ACK notification
09/09/14 09:01:48 ii : - XXX.XXX.XXX.XXX:500 -> 192.168.240.47:500
09/09/14 09:01:48 ii : - isakmp spi = 0ba2fdb81f9c6554:8da53e12e63c6fa5
09/09/14 09:01:48 ii : - data size 4
09/09/14 09:01:48 ii : DPD ARE-YOU-THERE-ACK sequence 3b730163 accepted
09/09/14 09:01:48 ii : next tunnel DPD request in 15 secs for peer XXX.XXX.XXX.XXX:500
09/09/14 09:02:03 DB : phase1 found
09/09/14 09:02:03 ii : sending peer DPDV1-R-U-THERE notification
09/09/14 09:02:03 ii : - 192.168.240.47:500 -> XXX.XXX.XXX.XXX:500
09/09/14 09:02:03 ii : - isakmp spi = 0ba2fdb81f9c6554:8da53e12e63c6fa5
09/09/14 09:02:03 ii : - data size 4
09/09/14 09:02:03 >> : hash payload
09/09/14 09:02:03 >> : notification payload
09/09/14 09:02:03 == : new informational hash ( 16 bytes )
09/09/14 09:02:03 == : new informational iv ( 8 bytes )
09/09/14 09:03:46 !! : get_fwd - sendarp retry exceeded
09/09/14 09:03:46 !! : no arp entry for dst : XXX.XXX.XXX.XXX
09/09/14 09:03:46 >= : cookies 0ba2fdb81f9c6554:8da53e12e63c6fa5
09/09/14 09:03:46 >= : message c20ac452
09/09/14 09:03:46 >= : encrypt iv ( 8 bytes )
09/09/14 09:03:46 == : encrypt packet ( 80 bytes )
09/09/14 09:03:46 == : stored iv ( 8 bytes )
09/09/14 09:03:46 -> : send IKE packet 192.168.240.47:500 -> XXX.XXX.XXX.XXX:500 ( 112 bytes )
09/09/14 09:03:46 ii : DPD ARE-YOU-THERE sequence 3b730164 requested
09/09/14 09:04:01 DB : phase1 found
09/09/14 09:04:01 ii : next tunnel DPD retry in 4 secs for peer XXX.XXX.XXX.XXX:500
09/09/14 09:04:01 ii : sending peer DPDV1-R-U-THERE notification
09/09/14 09:04:01 ii : - 192.168.240.47:500 -> XXX.XXX.XXX.XXX:500
09/09/14 09:04:01 ii : - isakmp spi = 0ba2fdb81f9c6554:8da53e12e63c6fa5
09/09/14 09:04:01 ii : - data size 4
09/09/14 09:04:01 >> : hash payload
09/09/14 09:04:01 >> : notification payload
09/09/14 09:04:01 == : new informational hash ( 16 bytes )
09/09/14 09:04:01 == : new informational iv ( 8 bytes )
09/09/14 09:04:01 >= : cookies 0ba2fdb81f9c6554:8da53e12e63c6fa5
09/09/14 09:04:01 >= : message c4747801
09/09/14 09:04:01 >= : encrypt iv ( 8 bytes )
09/09/14 09:04:01 == : encrypt packet ( 80 bytes )
09/09/14 09:04:01 == : stored iv ( 8 bytes )
09/09/14 09:04:01 -> : send IKE packet 192.168.240.47:500 -> XXX.XXX.XXX.XXX:500 ( 112 bytes )
09/09/14 09:04:01 ii : DPD ARE-YOU-THERE sequence 3b730165 requested
09/09/14 09:04:05 DB : phase1 found
09/09/14 09:04:05 ii : next tunnel DPD retry in 3 secs for peer XXX.XXX.XXX.XXX:500
09/09/14 09:04:05 ii : sending peer DPDV1-R-U-THERE notification
09/09/14 09:04:05 ii : - 192.168.240.47:500 -> XXX.XXX.XXX.XXX:500
09/09/14 09:04:05 ii : - isakmp spi = 0ba2fdb81f9c6554:8da53e12e63c6fa5
09/09/14 09:04:05 ii : - data size 4
09/09/14 09:04:05 >> : hash payload
09/09/14 09:04:05 >> : notification payload
09/09/14 09:04:05 == : new informational hash ( 16 bytes )
09/09/14 09:04:05 == : new informational iv ( 8 bytes )
09/09/14 09:04:05 >= : cookies 0ba2fdb81f9c6554:8da53e12e63c6fa5
09/09/14 09:04:05 >= : message e3695ee4
09/09/14 09:04:05 >= : encrypt iv ( 8 bytes )
09/09/14 09:04:05 == : encrypt packet ( 80 bytes )
09/09/14 09:04:05 == : stored iv ( 8 bytes )
09/09/14 09:04:05 -> : send IKE packet 192.168.240.47:500 -> XXX.XXX.XXX.XXX:500 ( 112 bytes )
09/09/14 09:04:05 ii : DPD ARE-YOU-THERE sequence 3b730166 requested
09/09/14 09:04:05 ANY:192.168.251.144:*
09/09/14 09:04:05 K> : send pfkey X_SPDDELETE2 UNSPEC message
09/09/14 09:04:05 DB : policy found
09/09/14 09:04:05 ii : removing IPSEC OUTBOUND policy ANY:192.168.251.144:* -> ANY:XXX.XXX.XXX.0/23:*
09/09/14 09:04:05 K> : send pfkey X_SPDDELETE2 UNSPEC message
09/09/14 09:04:05 K< : recv pfkey X_SPDDELETE2 UNSPEC message
09/09/14 09:04:05 ii : removed IPSEC policy route for ANY:XXX.XXX.XXX.0/23:*
09/09/14 09:04:05 DB : policy found
09/09/14 09:04:05 ii : removing IPSEC INBOUND policy ANY:XXX.XXX.71.64/26:* -> ANY:192.168.251.144:*
09/09/14 09:04:05 K> : send pfkey X_SPDDELETE2 UNSPEC message
09/09/14 09:04:05 DB : policy found
09/09/14 09:04:05 ii : removing IPSEC OUTBOUND policy ANY:192.168.251.144:* -> ANY:XXX.XXX.71.64/26:*
09/09/14 09:04:05 K> : send pfkey X_SPDDELETE2 UNSPEC message
09/09/14 09:04:05 ii : removed IPSEC policy route for ANY:XXX.XXX.71.64/26:*
09/09/14 09:04:05 DB : policy found
09/09/14 09:04:05 ii : removing IPSEC INBOUND policy ANY:192.168.221.0/24:* -> ANY:192.168.251.144:*
09/09/14 09:04:05 K> : send pfkey X_SPDDELETE2 UNSPEC message
09/09/14 09:04:05 DB : policy found
09/09/14 09:04:05 ii : removing IPSEC OUTBOUND policy ANY:192.168.251.144:* -> ANY:192.168.221.0/24:*
09/09/14 09:04:05 K> : send pfkey X_SPDDELETE2 UNSPEC message
09/09/14 09:04:05 DB : policy found
09/09/14 09:04:05 DB : policy deleted ( obj count = 6 )
09/09/14 09:04:05 K< : recv pfkey X_SPDDELETE2 UNSPEC message
09/09/14 09:04:05 DB : policy found
09/09/14 09:04:05 DB : policy deleted ( obj count = 5 )
09/09/14 09:04:05 K< : recv pfkey X_SPDDELETE2 UNSPEC message
09/09/14 09:04:05 DB : policy found
09/09/14 09:04:05 DB : policy deleted ( obj count = 4 )
09/09/14 09:04:05 K< : recv pfkey X_SPDDELETE2 UNSPEC message
09/09/14 09:04:05 DB : policy found
09/09/14 09:04:05 DB : policy deleted ( obj count = 3 )
09/09/14 09:04:05 K< : recv pfkey X_SPDDELETE2 UNSPEC message
09/09/14 09:04:05 DB : policy found
09/09/14 09:04:05 DB : policy deleted ( obj count = 2 )
09/09/14 09:04:05 K< : recv pfkey X_SPDDELETE2 UNSPEC message
09/09/14 09:04:05 DB : policy found
09/09/14 09:04:05 DB : policy deleted ( obj count = 1 )
09/09/14 09:04:05 ii : disabled adapter ROOT\VNET\0000
09/09/14 09:04:05 DB : tunnel dpd event canceled ( ref count = 6 )
09/09/14 09:04:05 DB : tunnel stats event canceled ( ref count = 5 )
09/09/14 09:04:05 DB : removing tunnel config references
09/09/14 09:04:05 DB : config deleted ( obj count = 0 )
09/09/14 09:04:05 DB : removing tunnel phase2 references
09/09/14 09:04:05 DB : phase2 soft event canceled ( ref count = 2 )
09/09/14 09:04:05 DB : phase2 hard event canceled ( ref count = 1 )
09/09/14 09:04:05 DB : phase1 found
09/09/14 09:04:05 ii : sending peer DELETE message
09/09/14 09:04:05 ii : - 192.168.240.47:500 -> XXX.XXX.XXX.XXX:500
09/09/14 09:04:05 ii : - ipsec-esp spi = 0x950d6dc2
09/09/14 09:04:05 ii : - data size 0
09/09/14 09:04:05 >> : hash payload
09/09/14 09:04:05 >> : delete payload
09/09/14 09:04:05 == : new informational hash ( 16 bytes )
09/09/14 09:04:05 == : new informational iv ( 8 bytes )
09/09/14 09:04:05 >= : cookies 0ba2fdb81f9c6554:8da53e12e63c6fa5
09/09/14 09:04:05 >= : message de1b74df
09/09/14 09:04:05 >= : encrypt iv ( 8 bytes )
09/09/14 09:04:05 == : encrypt packet ( 64 bytes )
09/09/14 09:04:05 == : stored iv ( 8 bytes )
09/09/14 09:04:05 -> : send IKE packet 192.168.240.47:500 -> XXX.XXX.XXX.XXX:500 ( 96 bytes )
09/09/14 09:04:05 K> : send pfkey DELETE ESP message
09/09/14 09:04:05 K> : send pfkey DELETE ESP message
09/09/14 09:04:05 ii : phase2 removal before expire time
09/09/14 09:04:05 DB : phase2 deleted ( obj count = 1 )
09/09/14 09:04:05 DB : phase2 soft event canceled ( ref count = 2 )
09/09/14 09:04:05 DB : phase2 hard event canceled ( ref count = 1 )
09/09/14 09:04:05 DB : phase1 found
09/09/14 09:04:05 ii : sending peer DELETE message
09/09/14 09:04:05 ii : - 192.168.240.47:500 -> XXX.XXX.XXX.XXX:500
09/09/14 09:04:05 ii : - ipsec-esp spi = 0xdf6c5f01
09/09/14 09:04:05 ii : - data size 0
09/09/14 09:04:05 >> : hash payload
09/09/14 09:04:05 >> : delete payload
09/09/14 09:04:05 == : new informational hash ( 16 bytes )
09/09/14 09:04:05 == : new informational iv ( 8 bytes )
09/09/14 09:04:05 >= : cookies 0ba2fdb81f9c6554:8da53e12e63c6fa5
09/09/14 09:04:05 >= : message d1b25531
09/09/14 09:04:05 >= : encrypt iv ( 8 bytes )
09/09/14 09:04:05 == : encrypt packet ( 64 bytes )
09/09/14 09:04:05 == : stored iv ( 8 bytes )
09/09/14 09:04:05 -> : send IKE packet 192.168.240.47:500 -> XXX.XXX.XXX.XXX:500 ( 96 bytes )
09/09/14 09:04:05 K> : send pfkey DELETE ESP message
09/09/14 09:04:05 K> : send pfkey DELETE ESP message
09/09/14 09:04:05 ii : phase2 removal before expire time
09/09/14 09:04:05 DB : phase2 deleted ( obj count = 0 )
09/09/14 09:04:05 DB : removing tunnel phase1 references
09/09/14 09:04:05 DB : phase1 soft event canceled ( ref count = 3 )
09/09/14 09:04:05 DB : phase1 hard event canceled ( ref count = 2 )
09/09/14 09:04:05 DB : phase1 dead event canceled ( ref count = 1 )
09/09/14 09:04:05 ii : sending peer DELETE message
09/09/14 09:04:05 ii : - 192.168.240.47:500 -> XXX.XXX.XXX.XXX:500
09/09/14 09:04:05 ii : - isakmp spi = 0ba2fdb81f9c6554:8da53e12e63c6fa5
09/09/14 09:04:05 ii : - data size 0
09/09/14 09:04:05 >> : hash payload
09/09/14 09:04:05 >> : delete payload
09/09/14 09:04:05 == : new informational hash ( 16 bytes )
09/09/14 09:04:05 == : new informational iv ( 8 bytes )
09/09/14 09:04:05 >= : cookies 0ba2fdb81f9c6554:8da53e12e63c6fa5
09/09/14 09:04:05 >= : message a9843cf9
09/09/14 09:04:05 >= : encrypt iv ( 8 bytes )
09/09/14 09:04:05 == : encrypt packet ( 76 bytes )
09/09/14 09:04:05 == : stored iv ( 8 bytes )
09/09/14 09:04:05 -> : send IKE packet 192.168.240.47:500 -> XXX.XXX.XXX.XXX:500 ( 104 bytes )
09/09/14 09:04:05 ii : phase1 removal before expire time
09/09/14 09:04:05 DB : phase1 deleted ( obj count = 0 )
09/09/14 09:04:05 DB : tunnel deleted ( obj count = 0 )
09/09/14 09:04:05 K< : recv pfkey DELETE ESP message
09/09/14 09:04:05 K< : recv pfkey DELETE ESP message
09/09/14 09:04:05 K< : recv pfkey DELETE ESP message
09/09/14 09:04:05 DB : removing all peer tunnel refrences
09/09/14 09:04:05 DB : peer deleted ( obj count = 0 )
09/09/14 09:04:05 ii : ipc client process thread exit ...
09/09/14 09:04:05 K< : recv pfkey DELETE ESP message