09/09/14 08:59:46 ## : IKE Daemon, ver 2.1.0 09/09/14 08:59:46 ## : Copyright 2008 Shrew Soft Inc. 09/09/14 08:59:46 ## : This product linked OpenSSL 0.9.8h 28 May 2008 09/09/14 08:59:46 ii : opened 'C:\Program Files\ShrewSoft\VPN Client\debug\iked.log' 09/09/14 08:59:46 ii : opened 'C:\Program Files\ShrewSoft\VPN Client/debug/dump-ike-decrypt.cap' 09/09/14 08:59:46 ii : rebuilding vnet device list ... 09/09/14 08:59:46 ii : device ROOT\VNET\0000 disabled 09/09/14 08:59:46 ii : network process thread begin ... 09/09/14 08:59:46 ii : ipc server process thread begin ... 09/09/14 08:59:46 ii : pfkey process thread begin ... 09/09/14 08:59:46 K< : recv pfkey X_SPDDUMP UNSPEC message 09/09/14 08:59:46 DB : policy added ( obj count = 1 ) 09/09/14 09:00:02 ii : ipc client process thread begin ... 09/09/14 09:00:02 XXX.XXX.XXX.XXX 09/09/14 09:00:03 DB : 0ba2fdb81f9c6554:0000000000000000 09/09/14 09:00:03 DB : phase1 added ( obj count = 1 ) 09/09/14 09:00:03 >> : security association payload 09/09/14 09:00:03 >> : - proposal #1 payload 09/09/14 09:00:03 >> : -- transform #1 payload 09/09/14 09:00:03 >> : -- transform #2 payload 09/09/14 09:00:03 >> : -- transform #3 payload 09/09/14 09:00:03 >> : -- transform #4 payload 09/09/14 09:00:03 >> : -- transform #5 payload 09/09/14 09:00:03 >> : -- transform #6 payload 09/09/14 09:00:03 >> : -- transform #7 payload 09/09/14 09:00:03 >> : -- transform #8 payload 09/09/14 09:00:03 >> : -- transform #9 payload 09/09/14 09:00:03 >> : -- transform #10 payload 09/09/14 09:00:03 >> : -- transform #11 payload 09/09/14 09:00:03 >> : -- transform #12 payload 09/09/14 09:00:03 >> : -- transform #13 payload 09/09/14 09:00:03 >> : -- transform #14 payload 09/09/14 09:00:03 >> : -- transform #15 payload 09/09/14 09:00:03 >> : -- transform #16 payload 09/09/14 09:00:03 >> : -- transform #17 payload 09/09/14 09:00:03 >> : -- transform #18 payload 09/09/14 09:00:03 >> : key exchange payload 09/09/14 09:00:03 >> : nonce payload 09/09/14 09:00:03 >> : identification payload 09/09/14 09:00:03 >> : vendor id payload 09/09/14 09:00:03 ii : local supports XAUTH 09/09/14 09:00:03 >> : vendor id payload 09/09/14 09:00:03 ii : local supports nat-t ( draft v00 ) 09/09/14 09:00:03 >> : vendor id payload 09/09/14 09:00:03 ii : local supports nat-t ( draft v01 ) 09/09/14 09:00:03 >> : vendor id payload 09/09/14 09:00:03 ii : local supports nat-t ( draft v02 ) 09/09/14 09:00:03 >> : vendor id payload 09/09/14 09:00:03 ii : local supports nat-t ( draft v03 ) 09/09/14 09:00:03 >> : vendor id payload 09/09/14 09:00:03 ii : local supports nat-t ( rfc ) 09/09/14 09:00:03 >> : vendor id payload 09/09/14 09:00:03 ii : local supports DPDv1 09/09/14 09:00:03 >> : vendor id payload 09/09/14 09:00:03 ii : local is SHREW SOFT compatible 09/09/14 09:00:03 >> : vendor id payload 09/09/14 09:00:03 ii : local is NETSCREEN compatible 09/09/14 09:00:03 >> : vendor id payload 09/09/14 09:00:03 ii : local is SIDEWINDER compatible 09/09/14 09:00:03 >> : vendor id payload 09/09/14 09:00:03 ii : local is CISCO UNITY compatible 09/09/14 09:00:03 >= : cookies 0ba2fdb81f9c6554:0000000000000000 09/09/14 09:00:03 >= : message 00000000 09/09/14 09:00:03 -> : send IKE packet 192.168.240.47:500 -> XXX.XXX.XXX.XXX:500 ( 1161 bytes ) 09/09/14 09:00:03 DB : phase1 resend event scheduled ( ref count = 2 ) 09/09/14 09:00:03 <- : recv IKE packet XXX.XXX.XXX.XXX:500 -> 192.168.240.47:500 ( 388 bytes ) 09/09/14 09:00:03 DB : phase1 found 09/09/14 09:00:03 ii : processing phase1 packet ( 388 bytes ) 09/09/14 09:00:03 =< : cookies 0ba2fdb81f9c6554:8da53e12e63c6fa5 09/09/14 09:00:03 =< : message 00000000 09/09/14 09:00:03 << : security association payload 09/09/14 09:00:03 << : - propsal #1 payload 09/09/14 09:00:03 << : -- transform #13 payload 09/09/14 09:00:03 ii : unmatched isakmp proposal/transform 09/09/14 09:00:03 ii : cipher type ( 3des != aes ) 09/09/14 09:00:03 ii : unmatched isakmp proposal/transform 09/09/14 09:00:03 ii : cipher type ( 3des != aes ) 09/09/14 09:00:03 ii : unmatched isakmp proposal/transform 09/09/14 09:00:03 ii : cipher type ( 3des != aes ) 09/09/14 09:00:03 ii : unmatched isakmp proposal/transform 09/09/14 09:00:03 ii : cipher type ( 3des != aes ) 09/09/14 09:00:03 ii : unmatched isakmp proposal/transform 09/09/14 09:00:03 ii : cipher type ( 3des != aes ) 09/09/14 09:00:03 ii : unmatched isakmp proposal/transform 09/09/14 09:00:03 ii : cipher type ( 3des != aes ) 09/09/14 09:00:03 ii : unmatched isakmp proposal/transform 09/09/14 09:00:03 ii : cipher type ( 3des != blowfish ) 09/09/14 09:00:03 ii : unmatched isakmp proposal/transform 09/09/14 09:00:03 ii : cipher type ( 3des != blowfish ) 09/09/14 09:00:03 ii : unmatched isakmp proposal/transform 09/09/14 09:00:03 ii : cipher type ( 3des != blowfish ) 09/09/14 09:00:03 ii : unmatched isakmp proposal/transform 09/09/14 09:00:03 ii : cipher type ( 3des != blowfish ) 09/09/14 09:00:03 ii : unmatched isakmp proposal/transform 09/09/14 09:00:03 ii : cipher type ( 3des != blowfish ) 09/09/14 09:00:03 ii : unmatched isakmp proposal/transform 09/09/14 09:00:03 ii : cipher type ( 3des != blowfish ) 09/09/14 09:00:03 ii : matched isakmp proposal #1 transform #13 09/09/14 09:00:03 ii : - transform = ike 09/09/14 09:00:03 ii : - cipher type = 3des 09/09/14 09:00:03 ii : - key length = default 09/09/14 09:00:03 ii : - hash type = md5 09/09/14 09:00:03 ii : - dh group = modp-1024 09/09/14 09:00:03 ii : - auth type = xauth-initiator-psk 09/09/14 09:00:03 ii : - life seconds = 86400 09/09/14 09:00:03 ii : - life kbytes = 0 09/09/14 09:00:03 << : key exchange payload 09/09/14 09:00:03 << : nonce payload 09/09/14 09:00:03 << : identification payload 09/09/14 09:00:03 ii : phase1 id target is any 09/09/14 09:00:03 ii : phase1 id match 09/09/14 09:00:03 ii : received = ipv4-host XXX.XXX.XXX.XXX 09/09/14 09:00:03 << : hash payload 09/09/14 09:00:03 << : vendor id payload 09/09/14 09:00:03 ii : peer is CISCO UNITY compatible 09/09/14 09:00:03 << : vendor id payload 09/09/14 09:00:03 ii : peer supports XAUTH 09/09/14 09:00:03 << : vendor id payload 09/09/14 09:00:03 ii : peer supports DPDv1 09/09/14 09:00:03 << : vendor id payload 09/09/14 09:00:03 ii : unknown vendor id ( 20 bytes ) 09/09/14 09:00:03 0x : 4048b7d5 6ebce885 25e7de7f 00d6c2d3 c0000000 09/09/14 09:00:03 << : vendor id payload 09/09/14 09:00:03 ii : unknown vendor id ( 16 bytes ) 09/09/14 09:00:03 0x : 7862990f e63d6fa5 723ab5f0 89c61a28 09/09/14 09:00:03 << : vendor id payload 09/09/14 09:00:03 ii : unknown vendor id ( 16 bytes ) 09/09/14 09:00:03 0x : 1f07f70e aa6514d3 b0fa9654 2a500407 09/09/14 09:00:03 ii : nat-t is unsupported by remote peer 09/09/14 09:00:03 == : DH shared secret ( 128 bytes ) 09/09/14 09:00:03 == : SETKEYID ( 16 bytes ) 09/09/14 09:00:03 == : SETKEYID_d ( 16 bytes ) 09/09/14 09:00:03 == : SETKEYID_a ( 16 bytes ) 09/09/14 09:00:03 == : SETKEYID_e ( 16 bytes ) 09/09/14 09:00:03 == : cipher key ( 32 bytes ) 09/09/14 09:00:03 == : cipher iv ( 8 bytes ) 09/09/14 09:00:03 == : phase1 hash_i ( computed ) ( 16 bytes ) 09/09/14 09:00:03 >> : hash payload 09/09/14 09:00:03 >= : cookies 0ba2fdb81f9c6554:8da53e12e63c6fa5 09/09/14 09:00:03 >= : message 00000000 09/09/14 09:00:03 >= : encrypt iv ( 8 bytes ) 09/09/14 09:00:03 == : encrypt packet ( 48 bytes ) 09/09/14 09:00:03 == : stored iv ( 8 bytes ) 09/09/14 09:00:03 DB : phase1 resend event canceled ( ref count = 1 ) 09/09/14 09:00:03 -> : send IKE packet 192.168.240.47:500 -> XXX.XXX.XXX.XXX:500 ( 80 bytes ) 09/09/14 09:00:03 == : phase1 hash_r ( computed ) ( 16 bytes ) 09/09/14 09:00:03 == : phase1 hash_r ( received ) ( 16 bytes ) 09/09/14 09:00:03 ii : phase1 sa established 09/09/14 09:00:03 ii : XXX.XXX.XXX.XXX:500 <-> 192.168.240.47:500 09/09/14 09:00:03 ii : ba2fdb81f9c6554:8da53e12e63c6fa5 09/09/14 09:00:03 ii : sending peer INITIAL-CONTACT notification 09/09/14 09:00:03 ii : - 192.168.240.47:500 -> XXX.XXX.XXX.XXX:500 09/09/14 09:00:03 ii : - isakmp spi = 0ba2fdb81f9c6554:8da53e12e63c6fa5 09/09/14 09:00:03 ii : - data size 0 09/09/14 09:00:03 >> : hash payload 09/09/14 09:00:03 >> : notification payload 09/09/14 09:00:03 == : new informational hash ( 16 bytes ) 09/09/14 09:00:03 == : new informational iv ( 8 bytes ) 09/09/14 09:00:03 >= : cookies 0ba2fdb81f9c6554:8da53e12e63c6fa5 09/09/14 09:00:03 >= : message 6b9b0ea8 09/09/14 09:00:03 >= : encrypt iv ( 8 bytes ) 09/09/14 09:00:03 == : encrypt packet ( 76 bytes ) 09/09/14 09:00:03 == : stored iv ( 8 bytes ) 09/09/14 09:00:03 -> : send IKE packet 192.168.240.47:500 -> XXX.XXX.XXX.XXX:500 ( 104 bytes ) 09/09/14 09:00:03 DB : phase2 not found 09/09/14 09:00:03 <- : recv IKE packet XXX.XXX.XXX.XXX:500 -> 192.168.240.47:500 ( 100 bytes ) 09/09/14 09:00:03 DB : phase1 found 09/09/14 09:00:03 ii : processing config packet ( 100 bytes ) 09/09/14 09:00:03 DB : config not found 09/09/14 09:00:03 DB : config added ( obj count = 1 ) 09/09/14 09:00:03 == : new config iv ( 8 bytes ) 09/09/14 09:00:03 =< : cookies 0ba2fdb81f9c6554:8da53e12e63c6fa5 09/09/14 09:00:03 =< : message 58359a74 09/09/14 09:00:03 =< : decrypt iv ( 8 bytes ) 09/09/14 09:00:03 == : decrypt packet ( 100 bytes ) 09/09/14 09:00:03 <= : stored iv ( 8 bytes ) 09/09/14 09:00:03 << : hash payload 09/09/14 09:00:03 << : attribute payload 09/09/14 09:00:03 == : configure hash_i ( computed ) ( 16 bytes ) 09/09/14 09:00:03 == : configure hash_c ( computed ) ( 16 bytes ) 09/09/14 09:00:03 ii : configure hash verified 09/09/14 09:00:03 ii : received xauth request - Enter Username and Password. 09/09/14 09:00:03 ii : added standard xauth username attribute 09/09/14 09:00:03 ii : added standard xauth password attribute 09/09/14 09:00:03 ii : sending xauth response for user 09/09/14 09:00:03 >> : hash payload 09/09/14 09:00:03 >> : attribute payload 09/09/14 09:00:03 == : new configure hash ( 16 bytes ) 09/09/14 09:00:03 >= : cookies 0ba2fdb81f9c6554:8da53e12e63c6fa5 09/09/14 09:00:03 >= : message 58359a74 09/09/14 09:00:03 >= : encrypt iv ( 8 bytes ) 09/09/14 09:00:03 == : encrypt packet ( 83 bytes ) 09/09/14 09:00:03 == : stored iv ( 8 bytes ) 09/09/14 09:00:03 -> : send IKE packet 192.168.240.47:500 -> XXX.XXX.XXX.XXX:500 ( 112 bytes ) 09/09/14 09:00:03 DB : config resend event scheduled ( ref count = 2 ) 09/09/14 09:00:03 <- : recv IKE packet XXX.XXX.XXX.XXX:500 -> 192.168.240.47:500 ( 60 bytes ) 09/09/14 09:00:03 DB : phase1 found 09/09/14 09:00:03 ii : processing config packet ( 60 bytes ) 09/09/14 09:00:03 DB : config found 09/09/14 09:00:03 == : new config iv ( 8 bytes ) 09/09/14 09:00:03 =< : cookies 0ba2fdb81f9c6554:8da53e12e63c6fa5 09/09/14 09:00:03 =< : message edeaaaad 09/09/14 09:00:03 =< : decrypt iv ( 8 bytes ) 09/09/14 09:00:03 == : decrypt packet ( 60 bytes ) 09/09/14 09:00:03 <= : stored iv ( 8 bytes ) 09/09/14 09:00:03 << : hash payload 09/09/14 09:00:03 << : attribute payload 09/09/14 09:00:03 == : configure hash_i ( computed ) ( 16 bytes ) 09/09/14 09:00:03 == : configure hash_c ( computed ) ( 16 bytes ) 09/09/14 09:00:03 ii : configure hash verified 09/09/14 09:00:03 ii : received xauth result - 09/09/14 09:00:03 ii : user user authentication succeeded 09/09/14 09:00:03 ii : sending xauth acknowledge 09/09/14 09:00:03 >> : hash payload 09/09/14 09:00:03 >> : attribute payload 09/09/14 09:00:03 == : new configure hash ( 16 bytes ) 09/09/14 09:00:03 >= : cookies 0ba2fdb81f9c6554:8da53e12e63c6fa5 09/09/14 09:00:03 >= : message edeaaaad 09/09/14 09:00:03 >= : encrypt iv ( 8 bytes ) 09/09/14 09:00:03 == : encrypt packet ( 56 bytes ) 09/09/14 09:00:03 == : stored iv ( 8 bytes ) 09/09/14 09:00:03 DB : config resend event canceled ( ref count = 1 ) 09/09/14 09:00:03 -> : send IKE packet 192.168.240.47:500 -> XXX.XXX.XXX.XXX:500 ( 88 bytes ) 09/09/14 09:00:03 DB : config resend event scheduled ( ref count = 2 ) 09/09/14 09:00:03 ii : building config attribute list 09/09/14 09:00:03 ii : - IP4 Address 09/09/14 09:00:03 ii : - Address Expiry 09/09/14 09:00:03 ii : - IP4 Netamask 09/09/14 09:00:03 ii : - IP4 DNS Server 09/09/14 09:00:03 ii : - IP4 WINS Server 09/09/14 09:00:03 ii : - DNS Suffix 09/09/14 09:00:03 ii : - Split DNS Domain 09/09/14 09:00:03 ii : - IP4 Split Network Include 09/09/14 09:00:03 ii : - IP4 Split Network Exclude 09/09/14 09:00:03 ii : - Login Banner 09/09/14 09:00:03 ii : - PFS Group 09/09/14 09:00:03 ii : - Save Password 09/09/14 09:00:03 == : new config iv ( 8 bytes ) 09/09/14 09:00:03 ii : sending config pull request 09/09/14 09:00:03 >> : hash payload 09/09/14 09:00:03 >> : attribute payload 09/09/14 09:00:03 == : new configure hash ( 16 bytes ) 09/09/14 09:00:03 >= : cookies 0ba2fdb81f9c6554:8da53e12e63c6fa5 09/09/14 09:00:03 >= : message 06c1c085 09/09/14 09:00:03 >= : encrypt iv ( 8 bytes ) 09/09/14 09:00:03 == : encrypt packet ( 104 bytes ) 09/09/14 09:00:03 == : stored iv ( 8 bytes ) 09/09/14 09:00:03 DB : config resend event canceled ( ref count = 1 ) 09/09/14 09:00:03 -> : send IKE packet 192.168.240.47:500 -> XXX.XXX.XXX.XXX:500 ( 136 bytes ) 09/09/14 09:00:03 DB : config resend event scheduled ( ref count = 2 ) 09/09/14 09:00:05 <- : recv IKE packet XXX.XXX.XXX.XXX:500 -> 192.168.240.47:500 ( 404 bytes ) 09/09/14 09:00:05 DB : phase1 found 09/09/14 09:00:05 ii : processing config packet ( 404 bytes ) 09/09/14 09:00:05 DB : config found 09/09/14 09:00:05 =< : cookies 0ba2fdb81f9c6554:8da53e12e63c6fa5 09/09/14 09:00:05 =< : message 06c1c085 09/09/14 09:00:05 =< : decrypt iv ( 8 bytes ) 09/09/14 09:00:05 == : decrypt packet ( 404 bytes ) 09/09/14 09:00:05 <= : trimmed packet padding ( 2 bytes ) 09/09/14 09:00:05 <= : stored iv ( 8 bytes ) 09/09/14 09:00:05 << : hash payload 09/09/14 09:00:05 << : attribute payload 09/09/14 09:00:05 == : configure hash_i ( computed ) ( 16 bytes ) 09/09/14 09:00:05 == : configure hash_c ( computed ) ( 16 bytes ) 09/09/14 09:00:05 ii : configure hash verified 09/09/14 09:00:05 ii : received config pull response 09/09/14 09:00:05 ii : - IP4 Address = 192.168.251.144 09/09/14 09:00:05 ii : - IP4 Netmask = 255.255.254.0 09/09/14 09:00:05 ii : - IP4 DNS Server = XXX.XXX.XXX.XXX 09/09/14 09:00:05 ii : - IP4 DNS Server = XXX.XXX.XXX.XXX 09/09/14 09:00:05 ii : - Login Banner =... 09/09/14 09:00:05 ii : - Save Password = 0 09/09/14 09:00:05 ii : - IP4 Split Network Include = ANY:XXX.XXX.XXX.0/23:* 09/09/14 09:00:05 ii : - IP4 Split Network Include = ANY:XXX.XXX.XXX.0/26:* 09/09/14 09:00:05 ii : - IP4 Split Network Include = ANY:192.168.221.0/24:* 09/09/14 09:00:05 ii : - DNS Suffix = XXXXXXXXXXX 09/09/14 09:00:05 ii : - PFS Group = 0 09/09/14 09:00:05 DB : config resend event canceled ( ref count = 1 ) 09/09/14 09:00:05 ii : VNET adapter MTU is 1500 09/09/14 09:00:05 ii : enabled adapter ROOT\VNET\0000 09/09/14 09:00:05 ii : creating IPSEC INBOUND policy ANY:XXX.XXX.XXX.0/23:* -> ANY:192.168.251.144:* 09/09/14 09:00:05 DB : policy added ( obj count = 2 ) 09/09/14 09:00:05 K> : send pfkey X_SPDADD UNSPEC message 09/09/14 09:00:05 ii : creating IPSEC OUTBOUND policy ANY:192.168.251.144:* -> ANY:XXX.XXX.XXX.0/23:* 09/09/14 09:00:05 K< : recv pfkey X_SPDADD UNSPEC message 09/09/14 09:00:05 DB : policy found 09/09/14 09:00:05 ii : created IPSEC policy route for XXX.XXX.XXX.0/23 09/09/14 09:00:05 DB : policy added ( obj count = 3 ) 09/09/14 09:00:05 K> : send pfkey X_SPDADD UNSPEC message 09/09/14 09:00:05 ii : creating IPSEC INBOUND policy ANY:XXX.XXX.XXX.64/26:* -> ANY:192.168.251.144:* 09/09/14 09:00:05 DB : policy added ( obj count = 4 ) 09/09/14 09:00:05 K> : send pfkey X_SPDADD UNSPEC message 09/09/14 09:00:05 ii : creating IPSEC OUTBOUND policy ANY:192.168.251.144:* -> ANY:XXX.XXX.XXX.64/26:* 09/09/14 09:00:05 ii : created IPSEC policy route for XXX.XXX.XXX.64/26 09/09/14 09:00:05 DB : policy added ( obj count = 5 ) 09/09/14 09:00:05 K> : send pfkey X_SPDADD UNSPEC message 09/09/14 09:00:05 ii : creating IPSEC INBOUND policy ANY:192.168.221.0/24:* -> ANY:192.168.251.144:* 09/09/14 09:00:05 DB : policy added ( obj count = 6 ) 09/09/14 09:00:05 K> : send pfkey X_SPDADD UNSPEC message 09/09/14 09:00:05 ii : creating IPSEC OUTBOUND policy ANY:192.168.251.144:* -> ANY:192.168.221.0/24:* 09/09/14 09:00:05 ii : created IPSEC policy route for 192.168.221.0/24 09/09/14 09:00:05 DB : policy added ( obj count = 7 ) 09/09/14 09:00:05 K> : send pfkey X_SPDADD UNSPEC message 09/09/14 09:00:05 ii : split DNS bypassed ( no split domains defined ) 09/09/14 09:00:05 K< : recv pfkey X_SPDADD UNSPEC message 09/09/14 09:00:05 DB : policy found 09/09/14 09:00:05 ii : calling init phase2 for initial policy 09/09/14 09:00:05 DB : policy found 09/09/14 09:00:05 DB : policy found 09/09/14 09:00:05 DB : tunnel found 09/09/14 09:00:05 DB : new phase2 ( IPSEC initiator ) 09/09/14 09:00:05 DB : phase2 added ( obj count = 1 ) 09/09/14 09:00:05 K> : send pfkey GETSPI ESP message 09/09/14 09:00:05 K< : recv pfkey X_SPDADD UNSPEC message 09/09/14 09:00:05 DB : policy found 09/09/14 09:00:05 K< : recv pfkey X_SPDADD UNSPEC message 09/09/14 09:00:05 DB : policy found 09/09/14 09:00:05 K< : recv pfkey X_SPDADD UNSPEC message 09/09/14 09:00:05 DB : policy found 09/09/14 09:00:05 K< : recv pfkey X_SPDADD UNSPEC message 09/09/14 09:00:05 DB : policy found 09/09/14 09:00:05 K< : recv pfkey GETSPI ESP message 09/09/14 09:00:05 DB : phase2 found 09/09/14 09:00:05 ii : updated spi for 1 ipsec-esp proposal 09/09/14 09:00:05 DB : phase1 found 09/09/14 09:00:05 >> : hash payload 09/09/14 09:00:05 >> : security association payload 09/09/14 09:00:05 >> : - proposal #1 payload 09/09/14 09:00:05 >> : -- transform #1 payload 09/09/14 09:00:05 >> : -- transform #2 payload 09/09/14 09:00:05 >> : -- transform #3 payload 09/09/14 09:00:05 >> : -- transform #4 payload 09/09/14 09:00:05 >> : -- transform #5 payload 09/09/14 09:00:05 >> : -- transform #6 payload 09/09/14 09:00:05 >> : -- transform #7 payload 09/09/14 09:00:05 >> : -- transform #8 payload 09/09/14 09:00:05 >> : -- transform #9 payload 09/09/14 09:00:05 >> : -- transform #10 payload 09/09/14 09:00:05 >> : -- transform #11 payload 09/09/14 09:00:05 >> : -- transform #12 payload 09/09/14 09:00:05 >> : -- transform #13 payload 09/09/14 09:00:05 >> : -- transform #14 payload 09/09/14 09:00:05 >> : -- transform #15 payload 09/09/14 09:00:05 >> : -- transform #16 payload 09/09/14 09:00:05 >> : -- transform #17 payload 09/09/14 09:00:05 >> : -- transform #18 payload 09/09/14 09:00:05 >> : nonce payload 09/09/14 09:00:05 >> : identification payload 09/09/14 09:00:05 >> : identification payload 09/09/14 09:00:05 == : phase2 hash_i ( input ) ( 632 bytes ) 09/09/14 09:00:05 == : phase2 hash_i ( computed ) ( 16 bytes ) 09/09/14 09:00:05 == : new phase2 iv ( 8 bytes ) 09/09/14 09:00:05 >= : cookies 0ba2fdb81f9c6554:8da53e12e63c6fa5 09/09/14 09:00:05 >= : message c30a6843 09/09/14 09:00:05 >= : encrypt iv ( 8 bytes ) 09/09/14 09:00:05 == : encrypt packet ( 676 bytes ) 09/09/14 09:00:05 == : stored iv ( 8 bytes ) 09/09/14 09:00:05 -> : send IKE packet 192.168.240.47:500 -> XXX.XXX.XXX.XXX:500 ( 704 bytes ) 09/09/14 09:00:05 DB : phase2 resend event scheduled ( ref count = 2 ) 09/09/14 09:00:05 <- : recv IKE packet XXX.XXX.XXX.XXX:500 -> 192.168.240.47:500 ( 148 bytes ) 09/09/14 09:00:05 DB : phase1 found 09/09/14 09:00:05 ii : processing phase2 packet ( 148 bytes ) 09/09/14 09:00:05 DB : phase2 found 09/09/14 09:00:05 =< : cookies 0ba2fdb81f9c6554:8da53e12e63c6fa5 09/09/14 09:00:05 =< : message c30a6843 09/09/14 09:00:05 =< : decrypt iv ( 8 bytes ) 09/09/14 09:00:05 == : decrypt packet ( 148 bytes ) 09/09/14 09:00:05 <= : stored iv ( 8 bytes ) 09/09/14 09:00:05 << : hash payload 09/09/14 09:00:05 << : security association payload 09/09/14 09:00:05 << : - propsal #1 payload 09/09/14 09:00:05 << : -- transform #1 payload 09/09/14 09:00:05 << : nonce payload 09/09/14 09:00:05 << : identification payload 09/09/14 09:00:05 << : identification payload 09/09/14 09:00:05 == : phase2 hash_r ( input ) ( 124 bytes ) 09/09/14 09:00:05 == : phase2 hash_r ( computed ) ( 16 bytes ) 09/09/14 09:00:05 == : phase2 hash_r ( received ) ( 16 bytes ) 09/09/14 09:00:05 ii : unmatched ipsec-esp proposal/transform 09/09/14 09:00:05 ii : crypto transform type ( esp-3des != esp-aes ) 09/09/14 09:00:05 ii : unmatched ipsec-esp proposal/transform 09/09/14 09:00:05 ii : crypto transform type ( esp-3des != esp-aes ) 09/09/14 09:00:05 ii : unmatched ipsec-esp proposal/transform 09/09/14 09:00:05 ii : crypto transform type ( esp-3des != esp-aes ) 09/09/14 09:00:05 ii : unmatched ipsec-esp proposal/transform 09/09/14 09:00:05 ii : crypto transform type ( esp-3des != esp-aes ) 09/09/14 09:00:05 ii : unmatched ipsec-esp proposal/transform 09/09/14 09:00:05 ii : crypto transform type ( esp-3des != esp-aes ) 09/09/14 09:00:05 ii : unmatched ipsec-esp proposal/transform 09/09/14 09:00:05 ii : crypto transform type ( esp-3des != esp-aes ) 09/09/14 09:00:05 ii : unmatched ipsec-esp proposal/transform 09/09/14 09:00:05 ii : crypto transform type ( esp-3des != esp-blowfish ) 09/09/14 09:00:05 ii : unmatched ipsec-esp proposal/transform 09/09/14 09:00:05 ii : crypto transform type ( esp-3des != esp-blowfish ) 09/09/14 09:00:05 ii : unmatched ipsec-esp proposal/transform 09/09/14 09:00:05 ii : crypto transform type ( esp-3des != esp-blowfish ) 09/09/14 09:00:05 ii : unmatched ipsec-esp proposal/transform 09/09/14 09:00:05 ii : crypto transform type ( esp-3des != esp-blowfish ) 09/09/14 09:00:05 ii : unmatched ipsec-esp proposal/transform 09/09/14 09:00:05 ii : crypto transform type ( esp-3des != esp-blowfish ) 09/09/14 09:00:05 ii : unmatched ipsec-esp proposal/transform 09/09/14 09:00:05 ii : crypto transform type ( esp-3des != esp-blowfish ) 09/09/14 09:00:05 !! : peer violates RFC, transform number mismatch ( 1 != 13 ) 09/09/14 09:00:05 ii : matched ipsec-esp proposal #1 transform #13 09/09/14 09:00:05 ii : - transform = esp-3des 09/09/14 09:00:05 ii : - key length = default 09/09/14 09:00:05 ii : - encap mode = tunnel 09/09/14 09:00:05 ii : - msg auth = hmac-md5 09/09/14 09:00:05 ii : - pfs dh group = none 09/09/14 09:00:05 ii : - life seconds = 3600 09/09/14 09:00:05 ii : - life kbytes = 0 09/09/14 09:00:05 DB : policy found 09/09/14 09:00:05 K> : send pfkey GETSPI ESP message 09/09/14 09:00:05 K< : recv pfkey GETSPI ESP message 09/09/14 09:00:05 DB : phase2 found 09/09/14 09:00:05 ii : phase2 ids accepted 09/09/14 09:00:05 ii : - loc ANY:192.168.251.144:* -> ANY:XXX.XXX.XXX.0/23:* 09/09/14 09:00:05 ii : - rmt ANY:XXX.XXX.XXX.0/23:* -> ANY:192.168.251.144:* 09/09/14 09:00:05 ii : phase2 sa established 09/09/14 09:00:05 ii : 192.168.240.47:500 <-> XXX.XXX.XXX.XXX:500 09/09/14 09:00:05 == : phase2 hash_p ( input ) ( 45 bytes ) 09/09/14 09:00:05 == : phase2 hash_p ( computed ) ( 16 bytes ) 09/09/14 09:00:05 >> : hash payload 09/09/14 09:00:05 >= : cookies 0ba2fdb81f9c6554:8da53e12e63c6fa5 09/09/14 09:00:05 >= : message c30a6843 09/09/14 09:00:05 >= : encrypt iv ( 8 bytes ) 09/09/14 09:00:05 == : encrypt packet ( 48 bytes ) 09/09/14 09:00:05 == : stored iv ( 8 bytes ) 09/09/14 09:00:05 DB : phase2 resend event canceled ( ref count = 1 ) 09/09/14 09:00:05 -> : send IKE packet 192.168.240.47:500 -> XXX.XXX.XXX.XXX:500 ( 80 bytes ) 09/09/14 09:00:05 == : spi cipher key data ( 24 bytes ) 09/09/14 09:00:05 == : spi hmac key data ( 16 bytes ) 09/09/14 09:00:05 K> : send pfkey UPDATE ESP message 09/09/14 09:00:05 K< : recv pfkey UPDATE ESP message 09/09/14 09:00:05 == : spi cipher key data ( 24 bytes ) 09/09/14 09:00:05 == : spi hmac key data ( 16 bytes ) 09/09/14 09:00:05 K> : send pfkey UPDATE ESP message 09/09/14 09:00:05 K< : recv pfkey UPDATE ESP message 09/09/14 09:00:08 K< : recv pfkey ACQUIRE UNSPEC message 09/09/14 09:00:08 DB : policy found 09/09/14 09:00:08 DB : policy found 09/09/14 09:00:08 DB : tunnel found 09/09/14 09:00:08 DB : new phase2 ( IPSEC initiator ) 09/09/14 09:00:08 DB : phase2 added ( obj count = 2 ) 09/09/14 09:00:08 K> : send pfkey GETSPI ESP message 09/09/14 09:00:08 K< : recv pfkey GETSPI ESP message 09/09/14 09:00:08 DB : phase2 found 09/09/14 09:00:08 ii : updated spi for 1 ipsec-esp proposal 09/09/14 09:00:08 DB : phase1 found 09/09/14 09:00:08 >> : hash payload 09/09/14 09:00:08 >> : security association payload 09/09/14 09:00:08 >> : - proposal #1 payload 09/09/14 09:00:08 >> : -- transform #1 payload 09/09/14 09:00:08 >> : -- transform #2 payload 09/09/14 09:00:08 >> : -- transform #3 payload 09/09/14 09:00:08 >> : -- transform #4 payload 09/09/14 09:00:08 >> : -- transform #5 payload 09/09/14 09:00:08 >> : -- transform #6 payload 09/09/14 09:00:08 >> : -- transform #7 payload 09/09/14 09:00:08 >> : -- transform #8 payload 09/09/14 09:00:08 >> : -- transform #9 payload 09/09/14 09:00:08 >> : -- transform #10 payload 09/09/14 09:00:08 >> : -- transform #11 payload 09/09/14 09:00:08 >> : -- transform #12 payload 09/09/14 09:00:08 >> : -- transform #13 payload 09/09/14 09:00:08 >> : -- transform #14 payload 09/09/14 09:00:08 >> : -- transform #15 payload 09/09/14 09:00:08 >> : -- transform #16 payload 09/09/14 09:00:08 >> : -- transform #17 payload 09/09/14 09:00:08 >> : -- transform #18 payload 09/09/14 09:00:08 >> : nonce payload 09/09/14 09:00:08 >> : identification payload 09/09/14 09:00:08 >> : identification payload 09/09/14 09:00:08 == : phase2 hash_i ( input ) ( 632 bytes ) 09/09/14 09:00:08 == : phase2 hash_i ( computed ) ( 16 bytes ) 09/09/14 09:00:08 == : new phase2 iv ( 8 bytes ) 09/09/14 09:00:08 >= : cookies 0ba2fdb81f9c6554:8da53e12e63c6fa5 09/09/14 09:00:08 >= : message 3c44c994 09/09/14 09:00:08 >= : encrypt iv ( 8 bytes ) 09/09/14 09:00:08 == : encrypt packet ( 676 bytes ) 09/09/14 09:00:08 == : stored iv ( 8 bytes ) 09/09/14 09:00:08 -> : send IKE packet 192.168.240.47:500 -> XXX.XXX.XXX.XXX:500 ( 704 bytes ) 09/09/14 09:00:08 DB : phase2 resend event scheduled ( ref count = 2 ) 09/09/14 09:00:08 <- : recv IKE packet XXX.XXX.XXX.XXX:500 -> 192.168.240.47:500 ( 148 bytes ) 09/09/14 09:00:08 DB : phase1 found 09/09/14 09:00:08 ii : processing phase2 packet ( 148 bytes ) 09/09/14 09:00:08 DB : phase2 found 09/09/14 09:00:08 =< : cookies 0ba2fdb81f9c6554:8da53e12e63c6fa5 09/09/14 09:00:08 =< : message 3c44c994 09/09/14 09:00:08 =< : decrypt iv ( 8 bytes ) 09/09/14 09:00:08 == : decrypt packet ( 148 bytes ) 09/09/14 09:00:08 <= : stored iv ( 8 bytes ) 09/09/14 09:00:08 << : hash payload 09/09/14 09:00:08 << : security association payload 09/09/14 09:00:08 << : - propsal #1 payload 09/09/14 09:00:08 << : -- transform #1 payload 09/09/14 09:00:08 << : nonce payload 09/09/14 09:00:08 << : identification payload 09/09/14 09:00:08 << : identification payload 09/09/14 09:00:08 == : phase2 hash_r ( input ) ( 124 bytes ) 09/09/14 09:00:08 == : phase2 hash_r ( computed ) ( 16 bytes ) 09/09/14 09:00:08 == : phase2 hash_r ( received ) ( 16 bytes ) 09/09/14 09:00:08 ii : unmatched ipsec-esp proposal/transform 09/09/14 09:00:08 ii : crypto transform type ( esp-3des != esp-aes ) 09/09/14 09:00:08 ii : unmatched ipsec-esp proposal/transform 09/09/14 09:00:08 ii : crypto transform type ( esp-3des != esp-aes ) 09/09/14 09:00:08 ii : unmatched ipsec-esp proposal/transform 09/09/14 09:00:08 ii : crypto transform type ( esp-3des != esp-aes ) 09/09/14 09:00:08 ii : unmatched ipsec-esp proposal/transform 09/09/14 09:00:08 ii : crypto transform type ( esp-3des != esp-aes ) 09/09/14 09:00:08 ii : unmatched ipsec-esp proposal/transform 09/09/14 09:00:08 ii : crypto transform type ( esp-3des != esp-aes ) 09/09/14 09:00:08 ii : unmatched ipsec-esp proposal/transform 09/09/14 09:00:08 ii : crypto transform type ( esp-3des != esp-aes ) 09/09/14 09:00:08 ii : unmatched ipsec-esp proposal/transform 09/09/14 09:00:08 ii : crypto transform type ( esp-3des != esp-blowfish ) 09/09/14 09:00:08 ii : unmatched ipsec-esp proposal/transform 09/09/14 09:00:08 ii : crypto transform type ( esp-3des != esp-blowfish ) 09/09/14 09:00:08 ii : unmatched ipsec-esp proposal/transform 09/09/14 09:00:08 ii : crypto transform type ( esp-3des != esp-blowfish ) 09/09/14 09:00:08 ii : unmatched ipsec-esp proposal/transform 09/09/14 09:00:08 ii : crypto transform type ( esp-3des != esp-blowfish ) 09/09/14 09:00:08 ii : unmatched ipsec-esp proposal/transform 09/09/14 09:00:08 ii : crypto transform type ( esp-3des != esp-blowfish ) 09/09/14 09:00:08 ii : unmatched ipsec-esp proposal/transform 09/09/14 09:00:08 ii : crypto transform type ( esp-3des != esp-blowfish ) 09/09/14 09:00:08 !! : peer violates RFC, transform number mismatch ( 1 != 13 ) 09/09/14 09:00:08 ii : matched ipsec-esp proposal #1 transform #13 09/09/14 09:00:08 ii : - transform = esp-3des 09/09/14 09:00:08 ii : - key length = default 09/09/14 09:00:08 ii : - encap mode = tunnel 09/09/14 09:00:08 ii : - msg auth = hmac-md5 09/09/14 09:00:08 ii : - pfs dh group = none 09/09/14 09:00:08 ii : - life seconds = 3600 09/09/14 09:00:08 ii : - life kbytes = 0 09/09/14 09:00:08 DB : policy found 09/09/14 09:00:08 K> : send pfkey GETSPI ESP message 09/09/14 09:00:08 ii : phase2 ids accepted 09/09/14 09:00:08 ii : - loc ANY:192.168.251.144:* -> ANY:XXX.XXX.71.64/26:* 09/09/14 09:00:08 ii : - rmt ANY:XXX.XXX.XXX.64/26:* -> ANY:192.168.251.144:* 09/09/14 09:00:08 ii : phase2 sa established 09/09/14 09:00:08 ii : 192.168.240.47:500 <-> XXX.XXX.XXX.XXX:500 09/09/14 09:00:08 == : phase2 hash_p ( input ) ( 45 bytes ) 09/09/14 09:00:08 == : phase2 hash_p ( computed ) ( 16 bytes ) 09/09/14 09:00:08 >> : hash payload 09/09/14 09:00:08 >= : cookies 0ba2fdb81f9c6554:8da53e12e63c6fa5 09/09/14 09:00:08 >= : message 3c44c994 09/09/14 09:00:08 >= : encrypt iv ( 8 bytes ) 09/09/14 09:00:08 == : encrypt packet ( 48 bytes ) 09/09/14 09:00:08 == : stored iv ( 8 bytes ) 09/09/14 09:00:08 DB : phase2 resend event canceled ( ref count = 1 ) 09/09/14 09:00:08 -> : send IKE packet 192.168.240.47:500 -> XXX.XXX.XXX.XXX:500 ( 80 bytes ) 09/09/14 09:00:08 == : spi cipher key data ( 24 bytes ) 09/09/14 09:00:08 == : spi hmac key data ( 16 bytes ) 09/09/14 09:00:08 K> : send pfkey UPDATE ESP message 09/09/14 09:00:08 == : spi cipher key data ( 24 bytes ) 09/09/14 09:00:08 == : spi hmac key data ( 16 bytes ) 09/09/14 09:00:08 K> : send pfkey UPDATE ESP message 09/09/14 09:00:08 K< : recv pfkey GETSPI ESP message 09/09/14 09:00:08 DB : phase2 found 09/09/14 09:00:08 K< : recv pfkey UPDATE ESP message 09/09/14 09:00:08 K< : recv pfkey UPDATE ESP message 09/09/14 09:00:18 DB : phase1 found 09/09/14 09:00:18 ii : sending peer DPDV1-R-U-THERE notification 09/09/14 09:00:18 ii : - 192.168.240.47:500 -> XXX.XXX.XXX.XXX:500 09/09/14 09:00:18 ii : - isakmp spi = 0ba2fdb81f9c6554:8da53e12e63c6fa5 09/09/14 09:00:18 ii : - data size 4 09/09/14 09:00:18 >> : hash payload 09/09/14 09:00:18 >> : notification payload 09/09/14 09:00:18 == : new informational hash ( 16 bytes ) 09/09/14 09:00:18 == : new informational iv ( 8 bytes ) 09/09/14 09:00:18 >= : cookies 0ba2fdb81f9c6554:8da53e12e63c6fa5 09/09/14 09:00:18 >= : message 62a09523 09/09/14 09:00:18 >= : encrypt iv ( 8 bytes ) 09/09/14 09:00:18 == : encrypt packet ( 80 bytes ) 09/09/14 09:00:18 == : stored iv ( 8 bytes ) 09/09/14 09:00:18 -> : send IKE packet 192.168.240.47:500 -> XXX.XXX.XXX.XXX:500 ( 112 bytes ) 09/09/14 09:00:18 ii : DPD ARE-YOU-THERE sequence 3b73015d requested 09/09/14 09:00:18 <- : recv IKE packet XXX.XXX.XXX.XXX:500 -> 192.168.240.47:500 ( 84 bytes ) 09/09/14 09:00:18 DB : phase1 found 09/09/14 09:00:18 ii : processing informational packet ( 84 bytes ) 09/09/14 09:00:18 == : new informational iv ( 8 bytes ) 09/09/14 09:00:18 =< : cookies 0ba2fdb81f9c6554:8da53e12e63c6fa5 09/09/14 09:00:18 =< : message f0d8e07f 09/09/14 09:00:18 =< : decrypt iv ( 8 bytes ) 09/09/14 09:00:18 == : decrypt packet ( 84 bytes ) 09/09/14 09:00:18 <= : trimmed packet padding ( 4 bytes ) 09/09/14 09:00:18 <= : stored iv ( 8 bytes ) 09/09/14 09:00:18 << : hash payload 09/09/14 09:00:18 << : notification payload 09/09/14 09:00:18 == : informational hash_i ( computed ) ( 16 bytes ) 09/09/14 09:00:18 == : informational hash_c ( received ) ( 16 bytes ) 09/09/14 09:00:18 ii : informational hash verified 09/09/14 09:00:18 ii : received peer DPDV1-R-U-THERE-ACK notification 09/09/14 09:00:18 ii : - XXX.XXX.XXX.XXX:500 -> 192.168.240.47:500 09/09/14 09:00:18 ii : - isakmp spi = 0ba2fdb81f9c6554:8da53e12e63c6fa5 09/09/14 09:00:18 ii : - data size 4 09/09/14 09:00:18 ii : DPD ARE-YOU-THERE-ACK sequence 3b73015d accepted 09/09/14 09:00:18 ii : next tunnel DPD request in 15 secs for peer XXX.XXX.XXX.XXX:500 09/09/14 09:00:33 DB : phase1 found 09/09/14 09:00:33 ii : sending peer DPDV1-R-U-THERE notification 09/09/14 09:00:33 ii : - 192.168.240.47:500 -> XXX.XXX.XXX.XXX:500 09/09/14 09:00:33 ii : - isakmp spi = 0ba2fdb81f9c6554:8da53e12e63c6fa5 09/09/14 09:00:33 ii : - data size 4 09/09/14 09:00:33 >> : hash payload 09/09/14 09:00:33 >> : notification payload 09/09/14 09:00:33 == : new informational hash ( 16 bytes ) 09/09/14 09:00:33 == : new informational iv ( 8 bytes ) 09/09/14 09:00:33 >= : cookies 0ba2fdb81f9c6554:8da53e12e63c6fa5 09/09/14 09:00:33 >= : message 46672fcc 09/09/14 09:00:33 >= : encrypt iv ( 8 bytes ) 09/09/14 09:00:33 == : encrypt packet ( 80 bytes ) 09/09/14 09:00:33 == : stored iv ( 8 bytes ) 09/09/14 09:00:33 -> : send IKE packet 192.168.240.47:500 -> XXX.XXX.XXX.XXX:500 ( 112 bytes ) 09/09/14 09:00:33 ii : DPD ARE-YOU-THERE sequence 3b73015e requested 09/09/14 09:00:33 <- : recv IKE packet XXX.XXX.XXX.XXX:500 -> 192.168.240.47:500 ( 84 bytes ) 09/09/14 09:00:33 DB : phase1 found 09/09/14 09:00:33 ii : processing informational packet ( 84 bytes ) 09/09/14 09:00:33 == : new informational iv ( 8 bytes ) 09/09/14 09:00:33 =< : cookies 0ba2fdb81f9c6554:8da53e12e63c6fa5 09/09/14 09:00:33 =< : message b59854e3 09/09/14 09:00:33 =< : decrypt iv ( 8 bytes ) 09/09/14 09:00:33 == : decrypt packet ( 84 bytes ) 09/09/14 09:00:33 <= : trimmed packet padding ( 4 bytes ) 09/09/14 09:00:33 <= : stored iv ( 8 bytes ) 09/09/14 09:00:33 << : hash payload 09/09/14 09:00:33 << : notification payload 09/09/14 09:00:33 == : informational hash_i ( computed ) ( 16 bytes ) 09/09/14 09:00:33 == : informational hash_c ( received ) ( 16 bytes ) 09/09/14 09:00:33 ii : informational hash verified 09/09/14 09:00:33 ii : received peer DPDV1-R-U-THERE-ACK notification 09/09/14 09:00:33 ii : - XXX.XXX.XXX.XXX:500 -> 192.168.240.47:500 09/09/14 09:00:33 ii : - isakmp spi = 0ba2fdb81f9c6554:8da53e12e63c6fa5 09/09/14 09:00:33 ii : - data size 4 09/09/14 09:00:33 ii : DPD ARE-YOU-THERE-ACK sequence 3b73015e accepted 09/09/14 09:00:33 ii : next tunnel DPD request in 15 secs for peer XXX.XXX.XXX.XXX:500 09/09/14 09:00:48 DB : phase1 found 09/09/14 09:00:48 ii : sending peer DPDV1-R-U-THERE notification 09/09/14 09:00:48 ii : - 192.168.240.47:500 -> XXX.XXX.XXX.XXX:500 09/09/14 09:00:48 ii : - isakmp spi = 0ba2fdb81f9c6554:8da53e12e63c6fa5 09/09/14 09:00:48 ii : - data size 4 09/09/14 09:00:48 >> : hash payload 09/09/14 09:00:48 >> : notification payload 09/09/14 09:00:48 == : new informational hash ( 16 bytes ) 09/09/14 09:00:48 == : new informational iv ( 8 bytes ) 09/09/14 09:00:48 >= : cookies 0ba2fdb81f9c6554:8da53e12e63c6fa5 09/09/14 09:00:48 >= : message 60f975f6 09/09/14 09:00:48 >= : encrypt iv ( 8 bytes ) 09/09/14 09:00:48 == : encrypt packet ( 80 bytes ) 09/09/14 09:00:48 == : stored iv ( 8 bytes ) 09/09/14 09:00:48 -> : send IKE packet 192.168.240.47:500 -> XXX.XXX.XXX.XXX:500 ( 112 bytes ) 09/09/14 09:00:48 ii : DPD ARE-YOU-THERE sequence 3b73015f requested 09/09/14 09:00:48 <- : recv IKE packet XXX.XXX.XXX.XXX:500 -> 192.168.240.47:500 ( 84 bytes ) 09/09/14 09:00:48 DB : phase1 found 09/09/14 09:00:48 ii : processing informational packet ( 84 bytes ) 09/09/14 09:00:48 == : new informational iv ( 8 bytes ) 09/09/14 09:00:48 =< : cookies 0ba2fdb81f9c6554:8da53e12e63c6fa5 09/09/14 09:00:48 =< : message 94ec12ed 09/09/14 09:00:48 =< : decrypt iv ( 8 bytes ) 09/09/14 09:00:48 == : decrypt packet ( 84 bytes ) 09/09/14 09:00:48 <= : trimmed packet padding ( 4 bytes ) 09/09/14 09:00:48 <= : stored iv ( 8 bytes ) 09/09/14 09:00:48 << : hash payload 09/09/14 09:00:48 << : notification payload 09/09/14 09:00:48 == : informational hash_i ( computed ) ( 16 bytes ) 09/09/14 09:00:48 == : informational hash_c ( received ) ( 16 bytes ) 09/09/14 09:00:48 ii : informational hash verified 09/09/14 09:00:48 ii : received peer DPDV1-R-U-THERE-ACK notification 09/09/14 09:00:48 ii : - XXX.XXX.XXX.XXX:500 -> 192.168.240.47:500 09/09/14 09:00:48 ii : - isakmp spi = 0ba2fdb81f9c6554:8da53e12e63c6fa5 09/09/14 09:00:48 ii : - data size 4 09/09/14 09:00:48 ii : DPD ARE-YOU-THERE-ACK sequence 3b73015f accepted 09/09/14 09:00:48 ii : next tunnel DPD request in 15 secs for peer XXX.XXX.XXX.XXX:500 09/09/14 09:01:03 DB : phase1 found 09/09/14 09:01:03 ii : sending peer DPDV1-R-U-THERE notification 09/09/14 09:01:03 ii : - 192.168.240.47:500 -> XXX.XXX.XXX.XXX:500 09/09/14 09:01:03 ii : - isakmp spi = 0ba2fdb81f9c6554:8da53e12e63c6fa5 09/09/14 09:01:03 ii : - data size 4 09/09/14 09:01:03 >> : hash payload 09/09/14 09:01:03 >> : notification payload 09/09/14 09:01:03 == : new informational hash ( 16 bytes ) 09/09/14 09:01:03 == : new informational iv ( 8 bytes ) 09/09/14 09:01:03 >= : cookies 0ba2fdb81f9c6554:8da53e12e63c6fa5 09/09/14 09:01:03 >= : message 270afa36 09/09/14 09:01:03 >= : encrypt iv ( 8 bytes ) 09/09/14 09:01:03 == : encrypt packet ( 80 bytes ) 09/09/14 09:01:03 == : stored iv ( 8 bytes ) 09/09/14 09:01:03 -> : send IKE packet 192.168.240.47:500 -> XXX.XXX.XXX.XXX:500 ( 112 bytes ) 09/09/14 09:01:03 ii : DPD ARE-YOU-THERE sequence 3b730160 requested 09/09/14 09:01:03 <- : recv IKE packet XXX.XXX.XXX.XXX:500 -> 192.168.240.47:500 ( 84 bytes ) 09/09/14 09:01:03 DB : phase1 found 09/09/14 09:01:03 ii : processing informational packet ( 84 bytes ) 09/09/14 09:01:03 == : new informational iv ( 8 bytes ) 09/09/14 09:01:03 =< : cookies 0ba2fdb81f9c6554:8da53e12e63c6fa5 09/09/14 09:01:03 =< : message 58da122e 09/09/14 09:01:03 =< : decrypt iv ( 8 bytes ) 09/09/14 09:01:03 == : decrypt packet ( 84 bytes ) 09/09/14 09:01:03 <= : trimmed packet padding ( 4 bytes ) 09/09/14 09:01:03 <= : stored iv ( 8 bytes ) 09/09/14 09:01:03 << : hash payload 09/09/14 09:01:03 << : notification payload 09/09/14 09:01:03 == : informational hash_i ( computed ) ( 16 bytes ) 09/09/14 09:01:03 == : informational hash_c ( received ) ( 16 bytes ) 09/09/14 09:01:03 ii : informational hash verified 09/09/14 09:01:03 ii : received peer DPDV1-R-U-THERE-ACK notification 09/09/14 09:01:03 ii : - XXX.XXX.XXX.XXX:500 -> 192.168.240.47:500 09/09/14 09:01:03 ii : - isakmp spi = 0ba2fdb81f9c6554:8da53e12e63c6fa5 09/09/14 09:01:03 ii : - data size 4 09/09/14 09:01:03 ii : DPD ARE-YOU-THERE-ACK sequence 3b730160 accepted 09/09/14 09:01:03 ii : next tunnel DPD request in 15 secs for peer XXX.XXX.XXX.XXX:500 09/09/14 09:01:18 DB : phase1 found 09/09/14 09:01:18 ii : sending peer DPDV1-R-U-THERE notification 09/09/14 09:01:18 ii : - 192.168.240.47:500 -> XXX.XXX.XXX.XXX:500 09/09/14 09:01:18 ii : - isakmp spi = 0ba2fdb81f9c6554:8da53e12e63c6fa5 09/09/14 09:01:18 ii : - data size 4 09/09/14 09:01:18 >> : hash payload 09/09/14 09:01:18 >> : notification payload 09/09/14 09:01:18 == : new informational hash ( 16 bytes ) 09/09/14 09:01:18 == : new informational iv ( 8 bytes ) 09/09/14 09:01:18 >= : cookies 0ba2fdb81f9c6554:8da53e12e63c6fa5 09/09/14 09:01:18 >= : message b3ad6e72 09/09/14 09:01:18 >= : encrypt iv ( 8 bytes ) 09/09/14 09:01:18 == : encrypt packet ( 80 bytes ) 09/09/14 09:01:18 == : stored iv ( 8 bytes ) 09/09/14 09:01:18 -> : send IKE packet 192.168.240.47:500 -> XXX.XXX.XXX.XXX:500 ( 112 bytes ) 09/09/14 09:01:18 ii : DPD ARE-YOU-THERE sequence 3b730161 requested 09/09/14 09:01:18 <- : recv IKE packet XXX.XXX.XXX.XXX:500 -> 192.168.240.47:500 ( 84 bytes ) 09/09/14 09:01:18 DB : phase1 found 09/09/14 09:01:18 ii : processing informational packet ( 84 bytes ) 09/09/14 09:01:18 == : new informational iv ( 8 bytes ) 09/09/14 09:01:18 =< : cookies 0ba2fdb81f9c6554:8da53e12e63c6fa5 09/09/14 09:01:18 =< : message de1824c0 09/09/14 09:01:18 =< : decrypt iv ( 8 bytes ) 09/09/14 09:01:18 == : decrypt packet ( 84 bytes ) 09/09/14 09:01:18 <= : trimmed packet padding ( 4 bytes ) 09/09/14 09:01:18 <= : stored iv ( 8 bytes ) 09/09/14 09:01:18 << : hash payload 09/09/14 09:01:18 << : notification payload 09/09/14 09:01:18 == : informational hash_i ( computed ) ( 16 bytes ) 09/09/14 09:01:18 == : informational hash_c ( received ) ( 16 bytes ) 09/09/14 09:01:18 ii : informational hash verified 09/09/14 09:01:18 ii : received peer DPDV1-R-U-THERE-ACK notification 09/09/14 09:01:18 ii : - XXX.XXX.XXX.XXX:500 -> 192.168.240.47:500 09/09/14 09:01:18 ii : - isakmp spi = 0ba2fdb81f9c6554:8da53e12e63c6fa5 09/09/14 09:01:18 ii : - data size 4 09/09/14 09:01:18 ii : DPD ARE-YOU-THERE-ACK sequence 3b730161 accepted 09/09/14 09:01:18 ii : next tunnel DPD request in 15 secs for peer XXX.XXX.XXX.XXX:500 09/09/14 09:01:33 DB : phase1 found 09/09/14 09:01:33 ii : sending peer DPDV1-R-U-THERE notification 09/09/14 09:01:33 ii : - 192.168.240.47:500 -> XXX.XXX.XXX.XXX:500 09/09/14 09:01:33 ii : - isakmp spi = 0ba2fdb81f9c6554:8da53e12e63c6fa5 09/09/14 09:01:33 ii : - data size 4 09/09/14 09:01:33 >> : hash payload 09/09/14 09:01:33 >> : notification payload 09/09/14 09:01:33 == : new informational hash ( 16 bytes ) 09/09/14 09:01:33 == : new informational iv ( 8 bytes ) 09/09/14 09:01:33 >= : cookies 0ba2fdb81f9c6554:8da53e12e63c6fa5 09/09/14 09:01:33 >= : message 4e5196b8 09/09/14 09:01:33 >= : encrypt iv ( 8 bytes ) 09/09/14 09:01:33 == : encrypt packet ( 80 bytes ) 09/09/14 09:01:33 == : stored iv ( 8 bytes ) 09/09/14 09:01:33 -> : send IKE packet 192.168.240.47:500 -> XXX.XXX.XXX.XXX:500 ( 112 bytes ) 09/09/14 09:01:33 ii : DPD ARE-YOU-THERE sequence 3b730162 requested 09/09/14 09:01:33 <- : recv IKE packet XXX.XXX.XXX.XXX:500 -> 192.168.240.47:500 ( 84 bytes ) 09/09/14 09:01:33 DB : phase1 found 09/09/14 09:01:33 ii : processing informational packet ( 84 bytes ) 09/09/14 09:01:33 == : new informational iv ( 8 bytes ) 09/09/14 09:01:33 =< : cookies 0ba2fdb81f9c6554:8da53e12e63c6fa5 09/09/14 09:01:33 =< : message 79b56ab3 09/09/14 09:01:33 =< : decrypt iv ( 8 bytes ) 09/09/14 09:01:33 == : decrypt packet ( 84 bytes ) 09/09/14 09:01:33 <= : trimmed packet padding ( 4 bytes ) 09/09/14 09:01:33 <= : stored iv ( 8 bytes ) 09/09/14 09:01:33 << : hash payload 09/09/14 09:01:33 << : notification payload 09/09/14 09:01:33 == : informational hash_i ( computed ) ( 16 bytes ) 09/09/14 09:01:33 == : informational hash_c ( received ) ( 16 bytes ) 09/09/14 09:01:33 ii : informational hash verified 09/09/14 09:01:33 ii : received peer DPDV1-R-U-THERE-ACK notification 09/09/14 09:01:33 ii : - XXX.XXX.XXX.XXX:500 -> 192.168.240.47:500 09/09/14 09:01:33 ii : - isakmp spi = 0ba2fdb81f9c6554:8da53e12e63c6fa5 09/09/14 09:01:33 ii : - data size 4 09/09/14 09:01:33 ii : DPD ARE-YOU-THERE-ACK sequence 3b730162 accepted 09/09/14 09:01:33 ii : next tunnel DPD request in 15 secs for peer XXX.XXX.XXX.XXX:500 09/09/14 09:01:48 DB : phase1 found 09/09/14 09:01:48 ii : sending peer DPDV1-R-U-THERE notification 09/09/14 09:01:48 ii : - 192.168.240.47:500 -> XXX.XXX.XXX.XXX:500 09/09/14 09:01:48 ii : - isakmp spi = 0ba2fdb81f9c6554:8da53e12e63c6fa5 09/09/14 09:01:48 ii : - data size 4 09/09/14 09:01:48 >> : hash payload 09/09/14 09:01:48 >> : notification payload 09/09/14 09:01:48 == : new informational hash ( 16 bytes ) 09/09/14 09:01:48 == : new informational iv ( 8 bytes ) 09/09/14 09:01:48 >= : cookies 0ba2fdb81f9c6554:8da53e12e63c6fa5 09/09/14 09:01:48 >= : message 069ae7c7 09/09/14 09:01:48 >= : encrypt iv ( 8 bytes ) 09/09/14 09:01:48 == : encrypt packet ( 80 bytes ) 09/09/14 09:01:48 == : stored iv ( 8 bytes ) 09/09/14 09:01:48 -> : send IKE packet 192.168.240.47:500 -> XXX.XXX.XXX.XXX:500 ( 112 bytes ) 09/09/14 09:01:48 ii : DPD ARE-YOU-THERE sequence 3b730163 requested 09/09/14 09:01:48 <- : recv IKE packet XXX.XXX.XXX.XXX:500 -> 192.168.240.47:500 ( 84 bytes ) 09/09/14 09:01:48 DB : phase1 found 09/09/14 09:01:48 ii : processing informational packet ( 84 bytes ) 09/09/14 09:01:48 == : new informational iv ( 8 bytes ) 09/09/14 09:01:48 =< : cookies 0ba2fdb81f9c6554:8da53e12e63c6fa5 09/09/14 09:01:48 =< : message 0c46b835 09/09/14 09:01:48 =< : decrypt iv ( 8 bytes ) 09/09/14 09:01:48 == : decrypt packet ( 84 bytes ) 09/09/14 09:01:48 <= : trimmed packet padding ( 4 bytes ) 09/09/14 09:01:48 <= : stored iv ( 8 bytes ) 09/09/14 09:01:48 << : hash payload 09/09/14 09:01:48 << : notification payload 09/09/14 09:01:48 == : informational hash_i ( computed ) ( 16 bytes ) 09/09/14 09:01:48 == : informational hash_c ( received ) ( 16 bytes ) 09/09/14 09:01:48 ii : informational hash verified 09/09/14 09:01:48 ii : received peer DPDV1-R-U-THERE-ACK notification 09/09/14 09:01:48 ii : - XXX.XXX.XXX.XXX:500 -> 192.168.240.47:500 09/09/14 09:01:48 ii : - isakmp spi = 0ba2fdb81f9c6554:8da53e12e63c6fa5 09/09/14 09:01:48 ii : - data size 4 09/09/14 09:01:48 ii : DPD ARE-YOU-THERE-ACK sequence 3b730163 accepted 09/09/14 09:01:48 ii : next tunnel DPD request in 15 secs for peer XXX.XXX.XXX.XXX:500 09/09/14 09:02:03 DB : phase1 found 09/09/14 09:02:03 ii : sending peer DPDV1-R-U-THERE notification 09/09/14 09:02:03 ii : - 192.168.240.47:500 -> XXX.XXX.XXX.XXX:500 09/09/14 09:02:03 ii : - isakmp spi = 0ba2fdb81f9c6554:8da53e12e63c6fa5 09/09/14 09:02:03 ii : - data size 4 09/09/14 09:02:03 >> : hash payload 09/09/14 09:02:03 >> : notification payload 09/09/14 09:02:03 == : new informational hash ( 16 bytes ) 09/09/14 09:02:03 == : new informational iv ( 8 bytes ) 09/09/14 09:03:46 !! : get_fwd - sendarp retry exceeded 09/09/14 09:03:46 !! : no arp entry for dst : XXX.XXX.XXX.XXX 09/09/14 09:03:46 >= : cookies 0ba2fdb81f9c6554:8da53e12e63c6fa5 09/09/14 09:03:46 >= : message c20ac452 09/09/14 09:03:46 >= : encrypt iv ( 8 bytes ) 09/09/14 09:03:46 == : encrypt packet ( 80 bytes ) 09/09/14 09:03:46 == : stored iv ( 8 bytes ) 09/09/14 09:03:46 -> : send IKE packet 192.168.240.47:500 -> XXX.XXX.XXX.XXX:500 ( 112 bytes ) 09/09/14 09:03:46 ii : DPD ARE-YOU-THERE sequence 3b730164 requested 09/09/14 09:04:01 DB : phase1 found 09/09/14 09:04:01 ii : next tunnel DPD retry in 4 secs for peer XXX.XXX.XXX.XXX:500 09/09/14 09:04:01 ii : sending peer DPDV1-R-U-THERE notification 09/09/14 09:04:01 ii : - 192.168.240.47:500 -> XXX.XXX.XXX.XXX:500 09/09/14 09:04:01 ii : - isakmp spi = 0ba2fdb81f9c6554:8da53e12e63c6fa5 09/09/14 09:04:01 ii : - data size 4 09/09/14 09:04:01 >> : hash payload 09/09/14 09:04:01 >> : notification payload 09/09/14 09:04:01 == : new informational hash ( 16 bytes ) 09/09/14 09:04:01 == : new informational iv ( 8 bytes ) 09/09/14 09:04:01 >= : cookies 0ba2fdb81f9c6554:8da53e12e63c6fa5 09/09/14 09:04:01 >= : message c4747801 09/09/14 09:04:01 >= : encrypt iv ( 8 bytes ) 09/09/14 09:04:01 == : encrypt packet ( 80 bytes ) 09/09/14 09:04:01 == : stored iv ( 8 bytes ) 09/09/14 09:04:01 -> : send IKE packet 192.168.240.47:500 -> XXX.XXX.XXX.XXX:500 ( 112 bytes ) 09/09/14 09:04:01 ii : DPD ARE-YOU-THERE sequence 3b730165 requested 09/09/14 09:04:05 DB : phase1 found 09/09/14 09:04:05 ii : next tunnel DPD retry in 3 secs for peer XXX.XXX.XXX.XXX:500 09/09/14 09:04:05 ii : sending peer DPDV1-R-U-THERE notification 09/09/14 09:04:05 ii : - 192.168.240.47:500 -> XXX.XXX.XXX.XXX:500 09/09/14 09:04:05 ii : - isakmp spi = 0ba2fdb81f9c6554:8da53e12e63c6fa5 09/09/14 09:04:05 ii : - data size 4 09/09/14 09:04:05 >> : hash payload 09/09/14 09:04:05 >> : notification payload 09/09/14 09:04:05 == : new informational hash ( 16 bytes ) 09/09/14 09:04:05 == : new informational iv ( 8 bytes ) 09/09/14 09:04:05 >= : cookies 0ba2fdb81f9c6554:8da53e12e63c6fa5 09/09/14 09:04:05 >= : message e3695ee4 09/09/14 09:04:05 >= : encrypt iv ( 8 bytes ) 09/09/14 09:04:05 == : encrypt packet ( 80 bytes ) 09/09/14 09:04:05 == : stored iv ( 8 bytes ) 09/09/14 09:04:05 -> : send IKE packet 192.168.240.47:500 -> XXX.XXX.XXX.XXX:500 ( 112 bytes ) 09/09/14 09:04:05 ii : DPD ARE-YOU-THERE sequence 3b730166 requested 09/09/14 09:04:05 ANY:192.168.251.144:* 09/09/14 09:04:05 K> : send pfkey X_SPDDELETE2 UNSPEC message 09/09/14 09:04:05 DB : policy found 09/09/14 09:04:05 ii : removing IPSEC OUTBOUND policy ANY:192.168.251.144:* -> ANY:XXX.XXX.XXX.0/23:* 09/09/14 09:04:05 K> : send pfkey X_SPDDELETE2 UNSPEC message 09/09/14 09:04:05 K< : recv pfkey X_SPDDELETE2 UNSPEC message 09/09/14 09:04:05 ii : removed IPSEC policy route for ANY:XXX.XXX.XXX.0/23:* 09/09/14 09:04:05 DB : policy found 09/09/14 09:04:05 ii : removing IPSEC INBOUND policy ANY:XXX.XXX.71.64/26:* -> ANY:192.168.251.144:* 09/09/14 09:04:05 K> : send pfkey X_SPDDELETE2 UNSPEC message 09/09/14 09:04:05 DB : policy found 09/09/14 09:04:05 ii : removing IPSEC OUTBOUND policy ANY:192.168.251.144:* -> ANY:XXX.XXX.71.64/26:* 09/09/14 09:04:05 K> : send pfkey X_SPDDELETE2 UNSPEC message 09/09/14 09:04:05 ii : removed IPSEC policy route for ANY:XXX.XXX.71.64/26:* 09/09/14 09:04:05 DB : policy found 09/09/14 09:04:05 ii : removing IPSEC INBOUND policy ANY:192.168.221.0/24:* -> ANY:192.168.251.144:* 09/09/14 09:04:05 K> : send pfkey X_SPDDELETE2 UNSPEC message 09/09/14 09:04:05 DB : policy found 09/09/14 09:04:05 ii : removing IPSEC OUTBOUND policy ANY:192.168.251.144:* -> ANY:192.168.221.0/24:* 09/09/14 09:04:05 K> : send pfkey X_SPDDELETE2 UNSPEC message 09/09/14 09:04:05 DB : policy found 09/09/14 09:04:05 DB : policy deleted ( obj count = 6 ) 09/09/14 09:04:05 K< : recv pfkey X_SPDDELETE2 UNSPEC message 09/09/14 09:04:05 DB : policy found 09/09/14 09:04:05 DB : policy deleted ( obj count = 5 ) 09/09/14 09:04:05 K< : recv pfkey X_SPDDELETE2 UNSPEC message 09/09/14 09:04:05 DB : policy found 09/09/14 09:04:05 DB : policy deleted ( obj count = 4 ) 09/09/14 09:04:05 K< : recv pfkey X_SPDDELETE2 UNSPEC message 09/09/14 09:04:05 DB : policy found 09/09/14 09:04:05 DB : policy deleted ( obj count = 3 ) 09/09/14 09:04:05 K< : recv pfkey X_SPDDELETE2 UNSPEC message 09/09/14 09:04:05 DB : policy found 09/09/14 09:04:05 DB : policy deleted ( obj count = 2 ) 09/09/14 09:04:05 K< : recv pfkey X_SPDDELETE2 UNSPEC message 09/09/14 09:04:05 DB : policy found 09/09/14 09:04:05 DB : policy deleted ( obj count = 1 ) 09/09/14 09:04:05 ii : disabled adapter ROOT\VNET\0000 09/09/14 09:04:05 DB : tunnel dpd event canceled ( ref count = 6 ) 09/09/14 09:04:05 DB : tunnel stats event canceled ( ref count = 5 ) 09/09/14 09:04:05 DB : removing tunnel config references 09/09/14 09:04:05 DB : config deleted ( obj count = 0 ) 09/09/14 09:04:05 DB : removing tunnel phase2 references 09/09/14 09:04:05 DB : phase2 soft event canceled ( ref count = 2 ) 09/09/14 09:04:05 DB : phase2 hard event canceled ( ref count = 1 ) 09/09/14 09:04:05 DB : phase1 found 09/09/14 09:04:05 ii : sending peer DELETE message 09/09/14 09:04:05 ii : - 192.168.240.47:500 -> XXX.XXX.XXX.XXX:500 09/09/14 09:04:05 ii : - ipsec-esp spi = 0x950d6dc2 09/09/14 09:04:05 ii : - data size 0 09/09/14 09:04:05 >> : hash payload 09/09/14 09:04:05 >> : delete payload 09/09/14 09:04:05 == : new informational hash ( 16 bytes ) 09/09/14 09:04:05 == : new informational iv ( 8 bytes ) 09/09/14 09:04:05 >= : cookies 0ba2fdb81f9c6554:8da53e12e63c6fa5 09/09/14 09:04:05 >= : message de1b74df 09/09/14 09:04:05 >= : encrypt iv ( 8 bytes ) 09/09/14 09:04:05 == : encrypt packet ( 64 bytes ) 09/09/14 09:04:05 == : stored iv ( 8 bytes ) 09/09/14 09:04:05 -> : send IKE packet 192.168.240.47:500 -> XXX.XXX.XXX.XXX:500 ( 96 bytes ) 09/09/14 09:04:05 K> : send pfkey DELETE ESP message 09/09/14 09:04:05 K> : send pfkey DELETE ESP message 09/09/14 09:04:05 ii : phase2 removal before expire time 09/09/14 09:04:05 DB : phase2 deleted ( obj count = 1 ) 09/09/14 09:04:05 DB : phase2 soft event canceled ( ref count = 2 ) 09/09/14 09:04:05 DB : phase2 hard event canceled ( ref count = 1 ) 09/09/14 09:04:05 DB : phase1 found 09/09/14 09:04:05 ii : sending peer DELETE message 09/09/14 09:04:05 ii : - 192.168.240.47:500 -> XXX.XXX.XXX.XXX:500 09/09/14 09:04:05 ii : - ipsec-esp spi = 0xdf6c5f01 09/09/14 09:04:05 ii : - data size 0 09/09/14 09:04:05 >> : hash payload 09/09/14 09:04:05 >> : delete payload 09/09/14 09:04:05 == : new informational hash ( 16 bytes ) 09/09/14 09:04:05 == : new informational iv ( 8 bytes ) 09/09/14 09:04:05 >= : cookies 0ba2fdb81f9c6554:8da53e12e63c6fa5 09/09/14 09:04:05 >= : message d1b25531 09/09/14 09:04:05 >= : encrypt iv ( 8 bytes ) 09/09/14 09:04:05 == : encrypt packet ( 64 bytes ) 09/09/14 09:04:05 == : stored iv ( 8 bytes ) 09/09/14 09:04:05 -> : send IKE packet 192.168.240.47:500 -> XXX.XXX.XXX.XXX:500 ( 96 bytes ) 09/09/14 09:04:05 K> : send pfkey DELETE ESP message 09/09/14 09:04:05 K> : send pfkey DELETE ESP message 09/09/14 09:04:05 ii : phase2 removal before expire time 09/09/14 09:04:05 DB : phase2 deleted ( obj count = 0 ) 09/09/14 09:04:05 DB : removing tunnel phase1 references 09/09/14 09:04:05 DB : phase1 soft event canceled ( ref count = 3 ) 09/09/14 09:04:05 DB : phase1 hard event canceled ( ref count = 2 ) 09/09/14 09:04:05 DB : phase1 dead event canceled ( ref count = 1 ) 09/09/14 09:04:05 ii : sending peer DELETE message 09/09/14 09:04:05 ii : - 192.168.240.47:500 -> XXX.XXX.XXX.XXX:500 09/09/14 09:04:05 ii : - isakmp spi = 0ba2fdb81f9c6554:8da53e12e63c6fa5 09/09/14 09:04:05 ii : - data size 0 09/09/14 09:04:05 >> : hash payload 09/09/14 09:04:05 >> : delete payload 09/09/14 09:04:05 == : new informational hash ( 16 bytes ) 09/09/14 09:04:05 == : new informational iv ( 8 bytes ) 09/09/14 09:04:05 >= : cookies 0ba2fdb81f9c6554:8da53e12e63c6fa5 09/09/14 09:04:05 >= : message a9843cf9 09/09/14 09:04:05 >= : encrypt iv ( 8 bytes ) 09/09/14 09:04:05 == : encrypt packet ( 76 bytes ) 09/09/14 09:04:05 == : stored iv ( 8 bytes ) 09/09/14 09:04:05 -> : send IKE packet 192.168.240.47:500 -> XXX.XXX.XXX.XXX:500 ( 104 bytes ) 09/09/14 09:04:05 ii : phase1 removal before expire time 09/09/14 09:04:05 DB : phase1 deleted ( obj count = 0 ) 09/09/14 09:04:05 DB : tunnel deleted ( obj count = 0 ) 09/09/14 09:04:05 K< : recv pfkey DELETE ESP message 09/09/14 09:04:05 K< : recv pfkey DELETE ESP message 09/09/14 09:04:05 K< : recv pfkey DELETE ESP message 09/09/14 09:04:05 DB : removing all peer tunnel refrences 09/09/14 09:04:05 DB : peer deleted ( obj count = 0 ) 09/09/14 09:04:05 ii : ipc client process thread exit ... 09/09/14 09:04:05 K< : recv pfkey DELETE ESP message