Hébergeur de fichiers indépendant

vpn logs.txt

À propos

Type de fichier
Fichier TXT de 26 Ko (text/plain)
Confidentialité
Fichier public, envoyé le 31 octobre 2012 à 10:47, depuis l'adresse IP 78.236.x.x (France)
Sécurité
Ne contient aucun Virus ou Malware connus - Dernière vérification: 3 jours
Statistiques
La présente page de téléchargement a été vue 587 fois depuis l'envoi du fichier
Page de téléchargement

Aperçu du fichier


12/10/31 10:41:12 ## : IKE Daemon, ver 2.1.7
12/10/31 10:41:12 ## : Copyright 2010 Shrew Soft Inc.
12/10/31 10:41:12 ## : This product linked OpenSSL 0.9.8h 28 May 2008
12/10/31 10:41:12 ii : opened 'C:\Program Files\VPN Client\debug\iked.log'
12/10/31 10:41:12 ii : opened 'C:\Program Files\VPN Client/debug/dump-ike-decrypt.cap'
12/10/31 10:41:12 ii : rebuilding vnet device list ...
12/10/31 10:41:12 ii : device ROOT\VNET\0000 disabled
12/10/31 10:41:12 ii : network process thread begin ...
12/10/31 10:41:12 ii : pfkey process thread begin ...
12/10/31 10:41:12 ii : ipc server process thread begin ...
12/10/31 10:41:23 ii : ipc client process thread begin ...
12/10/31 10:41:23 <A : peer config add message
12/10/31 10:41:23 DB : peer added ( obj count = 1 )
12/10/31 10:41:23 ii : local address 192.168.1.150 selected for peer
12/10/31 10:41:23 DB : tunnel added ( obj count = 1 )
12/10/31 10:41:23 <A : proposal config message
12/10/31 10:41:23 <A : proposal config message
12/10/31 10:41:23 <A : client config message
12/10/31 10:41:23 <A : local id 'srx_remote1.com' message
12/10/31 10:41:23 <A : remote id 'srx_local1.com' message
12/10/31 10:41:23 <A : preshared key message
12/10/31 10:41:23 <A : remote resource message
12/10/31 10:41:23 <A : peer tunnel enable message
12/10/31 10:41:23 DB : new phase1 ( ISAKMP initiator )
12/10/31 10:41:23 DB : exchange type is aggressive
12/10/31 10:41:23 DB : 192.168.1.150:500 <-> <Remote Address>:500
12/10/31 10:41:23 DB : b496e6af73f427cd:0000000000000000
12/10/31 10:41:23 DB : phase1 added ( obj count = 1 )
12/10/31 10:41:23 >> : security association payload
12/10/31 10:41:23 >> : - proposal #1 payload 
12/10/31 10:41:23 >> : -- transform #1 payload 
12/10/31 10:41:23 >> : -- transform #2 payload 
12/10/31 10:41:23 >> : -- transform #3 payload 
12/10/31 10:41:23 >> : -- transform #4 payload 
12/10/31 10:41:23 >> : -- transform #5 payload 
12/10/31 10:41:23 >> : -- transform #6 payload 
12/10/31 10:41:23 >> : -- transform #7 payload 
12/10/31 10:41:23 >> : -- transform #8 payload 
12/10/31 10:41:23 >> : -- transform #9 payload 
12/10/31 10:41:23 >> : -- transform #10 payload 
12/10/31 10:41:23 >> : -- transform #11 payload 
12/10/31 10:41:23 >> : -- transform #12 payload 
12/10/31 10:41:23 >> : -- transform #13 payload 
12/10/31 10:41:23 >> : -- transform #14 payload 
12/10/31 10:41:23 >> : -- transform #15 payload 
12/10/31 10:41:23 >> : -- transform #16 payload 
12/10/31 10:41:23 >> : -- transform #17 payload 
12/10/31 10:41:23 >> : -- transform #18 payload 
12/10/31 10:41:23 >> : key exchange payload
12/10/31 10:41:23 >> : nonce payload
12/10/31 10:41:23 >> : identification payload
12/10/31 10:41:23 >> : vendor id payload
12/10/31 10:41:23 ii : local supports nat-t ( draft v00 )
12/10/31 10:41:23 >> : vendor id payload
12/10/31 10:41:23 ii : local supports nat-t ( draft v01 )
12/10/31 10:41:23 >> : vendor id payload
12/10/31 10:41:23 ii : local supports nat-t ( draft v02 )
12/10/31 10:41:23 >> : vendor id payload
12/10/31 10:41:23 ii : local supports nat-t ( draft v03 )
12/10/31 10:41:23 >> : vendor id payload
12/10/31 10:41:23 ii : local supports nat-t ( rfc )
12/10/31 10:41:23 >> : vendor id payload
12/10/31 10:41:23 ii : local supports FRAGMENTATION
12/10/31 10:41:23 >> : vendor id payload
12/10/31 10:41:23 ii : local supports DPDv1
12/10/31 10:41:23 >> : vendor id payload
12/10/31 10:41:23 ii : local is SHREW SOFT compatible
12/10/31 10:41:23 >> : vendor id payload
12/10/31 10:41:23 ii : local is NETSCREEN compatible
12/10/31 10:41:23 >> : vendor id payload
12/10/31 10:41:23 ii : local is SIDEWINDER compatible
12/10/31 10:41:23 >> : vendor id payload
12/10/31 10:41:23 ii : local is CISCO UNITY compatible
12/10/31 10:41:23 >= : cookies b496e6af73f427cd:0000000000000000
12/10/31 10:41:23 >= : message 00000000
12/10/31 10:41:23 -> : send IKE packet 192.168.1.150:500 -> <Remote Address>:500 ( 1179 bytes )
12/10/31 10:41:23 DB : phase1 resend event scheduled ( ref count = 2 )
12/10/31 10:41:24 <- : recv IKE packet <Remote Address>:500 -> 192.168.1.150:500 ( 410 bytes )
12/10/31 10:41:24 DB : phase1 found
12/10/31 10:41:24 ii : processing phase1 packet ( 410 bytes )
12/10/31 10:41:24 =< : cookies b496e6af73f427cd:9cb8d971dd389c3e
12/10/31 10:41:24 =< : message 00000000
12/10/31 10:41:24 << : security association payload
12/10/31 10:41:24 << : - propsal #1 payload 
12/10/31 10:41:24 << : -- transform #14 payload 
12/10/31 10:41:24 ii : unmatched isakmp proposal/transform
12/10/31 10:41:24 ii : cipher type ( 3des != aes )
12/10/31 10:41:24 ii : unmatched isakmp proposal/transform
12/10/31 10:41:24 ii : cipher type ( 3des != aes )
12/10/31 10:41:24 ii : unmatched isakmp proposal/transform
12/10/31 10:41:24 ii : cipher type ( 3des != aes )
12/10/31 10:41:24 ii : unmatched isakmp proposal/transform
12/10/31 10:41:24 ii : cipher type ( 3des != aes )
12/10/31 10:41:24 ii : unmatched isakmp proposal/transform
12/10/31 10:41:24 ii : cipher type ( 3des != aes )
12/10/31 10:41:24 ii : unmatched isakmp proposal/transform
12/10/31 10:41:24 ii : cipher type ( 3des != aes )
12/10/31 10:41:24 ii : unmatched isakmp proposal/transform
12/10/31 10:41:24 ii : cipher type ( 3des != blowfish )
12/10/31 10:41:24 ii : unmatched isakmp proposal/transform
12/10/31 10:41:24 ii : cipher type ( 3des != blowfish )
12/10/31 10:41:24 ii : unmatched isakmp proposal/transform
12/10/31 10:41:24 ii : cipher type ( 3des != blowfish )
12/10/31 10:41:24 ii : unmatched isakmp proposal/transform
12/10/31 10:41:24 ii : cipher type ( 3des != blowfish )
12/10/31 10:41:24 ii : unmatched isakmp proposal/transform
12/10/31 10:41:24 ii : cipher type ( 3des != blowfish )
12/10/31 10:41:24 ii : unmatched isakmp proposal/transform
12/10/31 10:41:24 ii : cipher type ( 3des != blowfish )
12/10/31 10:41:24 ii : unmatched isakmp proposal/transform
12/10/31 10:41:24 ii : hash type ( hmac-sha != hmac-md5 )
12/10/31 10:41:24 ii : matched isakmp proposal #1 transform #14
12/10/31 10:41:24 ii : - transform    = ike
12/10/31 10:41:24 ii : - cipher type  = 3des
12/10/31 10:41:24 ii : - key length   = default
12/10/31 10:41:24 ii : - hash type    = sha1
12/10/31 10:41:24 ii : - dh group     = modp-1024
12/10/31 10:41:24 ii : - auth type    = psk
12/10/31 10:41:24 ii : - life seconds = 86400
12/10/31 10:41:24 ii : - life kbytes  = 0
12/10/31 10:41:24 << : key exchange payload
12/10/31 10:41:24 << : nonce payload
12/10/31 10:41:24 << : identification payload
12/10/31 10:41:24 ii : phase1 id match 
12/10/31 10:41:24 ii : received = fqdn srx_local1.com
12/10/31 10:41:24 << : hash payload
12/10/31 10:41:24 << : vendor id payload
12/10/31 10:41:24 ii : peer is CISCO UNITY compatible
12/10/31 10:41:24 << : vendor id payload
12/10/31 10:41:24 ii : peer is IPSEC-TOOLS compatible
12/10/31 10:41:24 << : vendor id payload
12/10/31 10:41:24 ii : peer supports nat-t ( rfc )
12/10/31 10:41:24 << : nat discovery payload
12/10/31 10:41:24 << : nat discovery payload
12/10/31 10:41:24 << : vendor id payload
12/10/31 10:41:24 ii : peer supports DPDv1
12/10/31 10:41:24 ii : nat discovery - local address is translated
12/10/31 10:41:24 ii : nat discovery - remote address is translated
12/10/31 10:41:24 ii : switching to src nat-t udp port 4500
12/10/31 10:41:24 ii : switching to dst nat-t udp port 500
12/10/31 10:41:24 == : DH shared secret ( 128 bytes )
12/10/31 10:41:24 == : SETKEYID ( 20 bytes )
12/10/31 10:41:24 == : SETKEYID_d ( 20 bytes )
12/10/31 10:41:24 == : SETKEYID_a ( 20 bytes )
12/10/31 10:41:24 == : SETKEYID_e ( 20 bytes )
12/10/31 10:41:24 == : cipher key ( 40 bytes )
12/10/31 10:41:24 == : cipher iv ( 8 bytes )
12/10/31 10:41:24 == : phase1 hash_i ( computed ) ( 20 bytes )
12/10/31 10:41:24 >> : hash payload
12/10/31 10:41:24 >> : nat discovery payload
12/10/31 10:41:24 >> : nat discovery payload
12/10/31 10:41:24 >= : cookies b496e6af73f427cd:9cb8d971dd389c3e
12/10/31 10:41:24 >= : message 00000000
12/10/31 10:41:24 >= : encrypt iv ( 8 bytes )
12/10/31 10:41:24 == : encrypt packet ( 100 bytes )
12/10/31 10:41:24 == : stored iv ( 8 bytes )
12/10/31 10:41:24 DB : phase1 resend event canceled ( ref count = 1 )
12/10/31 10:41:24 -> : send NAT-T:IKE packet 192.168.1.150:4500 -> <Remote Address>:500 ( 132 bytes )
12/10/31 10:41:24 == : phase1 hash_r ( computed ) ( 20 bytes )
12/10/31 10:41:24 == : phase1 hash_r ( received ) ( 20 bytes )
12/10/31 10:41:24 ii : phase1 sa established
12/10/31 10:41:24 ii : <Remote Address>:500 <-> 192.168.1.150:4500
12/10/31 10:41:24 ii : b496e6af73f427cd:9cb8d971dd389c3e
12/10/31 10:41:24 ii : sending peer INITIAL-CONTACT notification
12/10/31 10:41:24 ii : - 192.168.1.150:4500 -> <Remote Address>:500
12/10/31 10:41:24 ii : - isakmp spi = b496e6af73f427cd:9cb8d971dd389c3e
12/10/31 10:41:24 ii : - data size 0
12/10/31 10:41:24 >> : hash payload
12/10/31 10:41:24 >> : notification payload
12/10/31 10:41:24 == : new informational hash ( 20 bytes )
12/10/31 10:41:24 == : new informational iv ( 8 bytes )
12/10/31 10:41:24 >= : cookies b496e6af73f427cd:9cb8d971dd389c3e
12/10/31 10:41:24 >= : message 911bf921
12/10/31 10:41:24 >= : encrypt iv ( 8 bytes )
12/10/31 10:41:24 == : encrypt packet ( 80 bytes )
12/10/31 10:41:24 == : stored iv ( 8 bytes )
12/10/31 10:41:24 -> : send NAT-T:IKE packet 192.168.1.150:4500 -> <Remote Address>:500 ( 116 bytes )
12/10/31 10:41:24 DB : config added ( obj count = 1 )
12/10/31 10:41:24 ii : configuration method is manual
12/10/31 10:41:24 DB : phase2 not found
12/10/31 10:41:24 ii : generating IPSEC security policies at UNIQUE level
12/10/31 10:41:24 ii : creating NONE INBOUND policy ANY:<Remote Address>:* -> ANY:192.168.1.150:*
12/10/31 10:41:24 DB : policy added ( obj count = 1 )
12/10/31 10:41:24 K> : send pfkey X_SPDADD UNSPEC message
12/10/31 10:41:24 K< : recv pfkey X_SPDADD UNSPEC message
12/10/31 10:41:24 DB : policy found
12/10/31 10:41:24 ii : creating NONE OUTBOUND policy ANY:192.168.1.150:* -> ANY:<Remote Address>:*
12/10/31 10:41:24 ii : created NONE policy route for <Remote Address>/32
12/10/31 10:41:24 DB : policy added ( obj count = 2 )
12/10/31 10:41:24 K> : send pfkey X_SPDADD UNSPEC message
12/10/31 10:41:24 K< : recv pfkey X_SPDADD UNSPEC message
12/10/31 10:41:24 DB : policy found
12/10/31 10:41:24 ii : creating NONE INBOUND policy ANY:192.168.1.1:* -> ANY:192.168.1.150:*
12/10/31 10:41:24 DB : policy added ( obj count = 3 )
12/10/31 10:41:24 K> : send pfkey X_SPDADD UNSPEC message
12/10/31 10:41:24 ii : creating NONE OUTBOUND policy ANY:192.168.1.150:* -> ANY:192.168.1.1:*
12/10/31 10:41:24 K< : recv pfkey X_SPDADD UNSPEC message
12/10/31 10:41:24 DB : policy found
12/10/31 10:41:24 ii : created NONE policy route for 192.168.1.1/32
12/10/31 10:41:24 DB : policy added ( obj count = 4 )
12/10/31 10:41:24 K> : send pfkey X_SPDADD UNSPEC message
12/10/31 10:41:24 ii : creating IPSEC INBOUND policy ANY:192.168.2.0/24:* -> ANY:192.168.1.150:*
12/10/31 10:41:24 DB : policy added ( obj count = 5 )
12/10/31 10:41:24 K> : send pfkey X_SPDADD UNSPEC message
12/10/31 10:41:24 ii : creating IPSEC OUTBOUND policy ANY:192.168.1.150:* -> ANY:192.168.2.0/24:*
12/10/31 10:41:24 K< : recv pfkey X_SPDADD UNSPEC message
12/10/31 10:41:24 DB : policy found
12/10/31 10:41:24 K< : recv pfkey X_SPDADD UNSPEC message
12/10/31 10:41:24 DB : policy found
12/10/31 10:41:24 ii : created IPSEC policy route for 192.168.2.0/24
12/10/31 10:41:24 DB : policy added ( obj count = 6 )
12/10/31 10:41:24 K> : send pfkey X_SPDADD UNSPEC message
12/10/31 10:41:24 ii : split DNS is disabled
12/10/31 10:41:24 K< : recv pfkey X_SPDADD UNSPEC message
12/10/31 10:41:24 DB : policy found
12/10/31 10:41:24 ii : calling init phase2 for initial policy
12/10/31 10:41:24 DB : policy found
12/10/31 10:41:24 DB : policy found
12/10/31 10:41:24 DB : tunnel found
12/10/31 10:41:24 DB : new phase2 ( IPSEC initiator )
12/10/31 10:41:24 DB : phase2 added ( obj count = 1 )
12/10/31 10:41:24 K> : send pfkey GETSPI ESP message
12/10/31 10:41:24 K< : recv pfkey GETSPI ESP message
12/10/31 10:41:24 DB : phase2 found
12/10/31 10:41:24 ii : updated spi for 1 ipsec-esp proposal
12/10/31 10:41:24 DB : phase1 found
12/10/31 10:41:24 >> : hash payload
12/10/31 10:41:24 >> : security association payload
12/10/31 10:41:24 >> : - proposal #1 payload 
12/10/31 10:41:24 >> : -- transform #1 payload 
12/10/31 10:41:24 >> : -- transform #2 payload 
12/10/31 10:41:24 >> : -- transform #3 payload 
12/10/31 10:41:24 >> : -- transform #4 payload 
12/10/31 10:41:24 >> : -- transform #5 payload 
12/10/31 10:41:24 >> : -- transform #6 payload 
12/10/31 10:41:24 >> : -- transform #7 payload 
12/10/31 10:41:24 >> : -- transform #8 payload 
12/10/31 10:41:24 >> : -- transform #9 payload 
12/10/31 10:41:24 >> : -- transform #10 payload 
12/10/31 10:41:24 >> : -- transform #11 payload 
12/10/31 10:41:24 >> : -- transform #12 payload 
12/10/31 10:41:24 >> : -- transform #13 payload 
12/10/31 10:41:24 >> : -- transform #14 payload 
12/10/31 10:41:24 >> : -- transform #15 payload 
12/10/31 10:41:24 >> : -- transform #16 payload 
12/10/31 10:41:24 >> : -- transform #17 payload 
12/10/31 10:41:24 >> : -- transform #18 payload 
12/10/31 10:41:24 >> : nonce payload
12/10/31 10:41:24 >> : identification payload
12/10/31 10:41:24 >> : identification payload
12/10/31 10:41:24 == : phase2 hash_i ( input ) ( 632 bytes )
12/10/31 10:41:24 == : phase2 hash_i ( computed ) ( 20 bytes )
12/10/31 10:41:24 == : new phase2 iv ( 8 bytes )
12/10/31 10:41:24 >= : cookies b496e6af73f427cd:9cb8d971dd389c3e
12/10/31 10:41:24 >= : message 3beb6f53
12/10/31 10:41:24 >= : encrypt iv ( 8 bytes )
12/10/31 10:41:24 == : encrypt packet ( 680 bytes )
12/10/31 10:41:24 == : stored iv ( 8 bytes )
12/10/31 10:41:24 -> : send NAT-T:IKE packet 192.168.1.150:4500 -> <Remote Address>:500 ( 716 bytes )
12/10/31 10:41:24 DB : phase2 resend event scheduled ( ref count = 2 )
12/10/31 10:41:24 <- : recv NAT-T:IKE packet <Remote Address>:500 -> 192.168.1.150:4500 ( 84 bytes )
12/10/31 10:41:24 DB : phase1 found
12/10/31 10:41:24 ii : processing informational packet ( 84 bytes )
12/10/31 10:41:24 == : new informational iv ( 8 bytes )
12/10/31 10:41:24 =< : cookies b496e6af73f427cd:9cb8d971dd389c3e
12/10/31 10:41:24 =< : message f94f5564
12/10/31 10:41:24 =< : decrypt iv ( 8 bytes )
12/10/31 10:41:24 == : decrypt packet ( 84 bytes )
12/10/31 10:41:24 <= : trimmed packet padding ( 4 bytes )
12/10/31 10:41:24 <= : stored iv ( 8 bytes )
12/10/31 10:41:24 << : hash payload
12/10/31 10:41:24 << : notification payload
12/10/31 10:41:24 == : informational hash_i ( computed ) ( 20 bytes )
12/10/31 10:41:24 == : informational hash_c ( received ) ( 20 bytes )
12/10/31 10:41:24 ii : informational hash verified
12/10/31 10:41:24 ii : received peer INITIAL-CONTACT notification
12/10/31 10:41:24 ii : - <Remote Address>:500 -> 192.168.1.150:4500
12/10/31 10:41:24 ii : - isakmp spi = b496e6af73f427cd:9cb8d971dd389c3e
12/10/31 10:41:24 ii : - data size 0
12/10/31 10:41:25 <- : recv NAT-T:IKE packet <Remote Address>:500 -> 192.168.1.150:4500 ( 156 bytes )
12/10/31 10:41:25 DB : phase1 found
12/10/31 10:41:25 ii : processing phase2 packet ( 156 bytes )
12/10/31 10:41:25 DB : phase2 found
12/10/31 10:41:25 =< : cookies b496e6af73f427cd:9cb8d971dd389c3e
12/10/31 10:41:25 =< : message 3beb6f53
12/10/31 10:41:25 =< : decrypt iv ( 8 bytes )
12/10/31 10:41:25 == : decrypt packet ( 156 bytes )
12/10/31 10:41:25 <= : trimmed packet padding ( 4 bytes )
12/10/31 10:41:25 <= : stored iv ( 8 bytes )
12/10/31 10:41:25 << : hash payload
12/10/31 10:41:25 << : security association payload
12/10/31 10:41:25 << : - propsal #1 payload 
12/10/31 10:41:25 << : -- transform #14 payload 
12/10/31 10:41:25 << : nonce payload
12/10/31 10:41:25 << : identification payload
12/10/31 10:41:25 << : identification payload
12/10/31 10:41:25 == : phase2 hash_r ( input ) ( 124 bytes )
12/10/31 10:41:25 == : phase2 hash_r ( computed ) ( 20 bytes )
12/10/31 10:41:25 == : phase2 hash_r ( received ) ( 20 bytes )
12/10/31 10:41:25 ii : unmatched ipsec-esp proposal/transform
12/10/31 10:41:25 ii : crypto transform type ( esp-3des != esp-aes )
12/10/31 10:41:25 ii : unmatched ipsec-esp proposal/transform
12/10/31 10:41:25 ii : crypto transform type ( esp-3des != esp-aes )
12/10/31 10:41:25 ii : unmatched ipsec-esp proposal/transform
12/10/31 10:41:25 ii : crypto transform type ( esp-3des != esp-aes )
12/10/31 10:41:25 ii : unmatched ipsec-esp proposal/transform
12/10/31 10:41:25 ii : crypto transform type ( esp-3des != esp-aes )
12/10/31 10:41:25 ii : unmatched ipsec-esp proposal/transform
12/10/31 10:41:25 ii : crypto transform type ( esp-3des != esp-aes )
12/10/31 10:41:25 ii : unmatched ipsec-esp proposal/transform
12/10/31 10:41:25 ii : crypto transform type ( esp-3des != esp-aes )
12/10/31 10:41:25 ii : unmatched ipsec-esp proposal/transform
12/10/31 10:41:25 ii : crypto transform type ( esp-3des != esp-blowfish )
12/10/31 10:41:25 ii : unmatched ipsec-esp proposal/transform
12/10/31 10:41:25 ii : crypto transform type ( esp-3des != esp-blowfish )
12/10/31 10:41:25 ii : unmatched ipsec-esp proposal/transform
12/10/31 10:41:25 ii : crypto transform type ( esp-3des != esp-blowfish )
12/10/31 10:41:25 ii : unmatched ipsec-esp proposal/transform
12/10/31 10:41:25 ii : crypto transform type ( esp-3des != esp-blowfish )
12/10/31 10:41:25 ii : unmatched ipsec-esp proposal/transform
12/10/31 10:41:25 ii : crypto transform type ( esp-3des != esp-blowfish )
12/10/31 10:41:25 ii : unmatched ipsec-esp proposal/transform
12/10/31 10:41:25 ii : crypto transform type ( esp-3des != esp-blowfish )
12/10/31 10:41:25 ii : unmatched ipsec-esp proposal/transform
12/10/31 10:41:25 ii : msg auth ( hmac-sha != hmac-md5 )
12/10/31 10:41:25 ii : matched ipsec-esp proposal #1 transform #14
12/10/31 10:41:25 ii : - transform    = esp-3des
12/10/31 10:41:25 ii : - key length   = default
12/10/31 10:41:25 ii : - encap mode   = udp-tunnel ( rfc )
12/10/31 10:41:25 ii : - msg auth     = hmac-sha
12/10/31 10:41:25 ii : - pfs dh group = none
12/10/31 10:41:25 ii : - life seconds = 3600
12/10/31 10:41:25 ii : - life kbytes  = 0
12/10/31 10:41:25 DB : policy found
12/10/31 10:41:25 K> : send pfkey GETSPI ESP message
12/10/31 10:41:25 ii : phase2 ids accepted
12/10/31 10:41:25 ii : - loc ANY:192.168.1.150:* -> ANY:192.168.2.0/24:*
12/10/31 10:41:25 ii : - rmt ANY:192.168.2.0/24:* -> ANY:192.168.1.150:*
12/10/31 10:41:25 ii : phase2 sa established
12/10/31 10:41:25 ii : 192.168.1.150:4500 <-> <Remote Address>:500
12/10/31 10:41:25 == : phase2 hash_p ( input ) ( 41 bytes )
12/10/31 10:41:25 == : phase2 hash_p ( computed ) ( 20 bytes )
12/10/31 10:41:25 >> : hash payload
12/10/31 10:41:25 >= : cookies b496e6af73f427cd:9cb8d971dd389c3e
12/10/31 10:41:25 >= : message 3beb6f53
12/10/31 10:41:25 >= : encrypt iv ( 8 bytes )
12/10/31 10:41:25 == : encrypt packet ( 52 bytes )
12/10/31 10:41:25 K< : recv pfkey GETSPI ESP message
12/10/31 10:41:25 == : stored iv ( 8 bytes )
12/10/31 10:41:25 DB : phase2 found
12/10/31 10:41:25 DB : phase2 resend event canceled ( ref count = 2 )
12/10/31 10:41:25 -> : send NAT-T:IKE packet 192.168.1.150:4500 -> <Remote Address>:500 ( 84 bytes )
12/10/31 10:41:25 == : spi cipher key data ( 24 bytes )
12/10/31 10:41:25 == : spi hmac key data ( 20 bytes )
12/10/31 10:41:25 K> : send pfkey UPDATE ESP message
12/10/31 10:41:25 == : spi cipher key data ( 24 bytes )
12/10/31 10:41:25 == : spi hmac key data ( 20 bytes )
12/10/31 10:41:25 K> : send pfkey UPDATE ESP message
12/10/31 10:41:25 K< : recv pfkey UPDATE ESP message
12/10/31 10:41:25 K< : recv pfkey UPDATE ESP message
12/10/31 10:41:39 DB : phase1 found
12/10/31 10:41:39 ii : sending peer DPDV1-R-U-THERE notification
12/10/31 10:41:39 ii : - 192.168.1.150:4500 -> <Remote Address>:500
12/10/31 10:41:39 ii : - isakmp spi = b496e6af73f427cd:9cb8d971dd389c3e
12/10/31 10:41:39 ii : - data size 4
12/10/31 10:41:39 >> : hash payload
12/10/31 10:41:39 >> : notification payload
12/10/31 10:41:39 == : new informational hash ( 20 bytes )
12/10/31 10:41:39 == : new informational iv ( 8 bytes )
12/10/31 10:41:39 >= : cookies b496e6af73f427cd:9cb8d971dd389c3e
12/10/31 10:41:39 >= : message 1f844efa
12/10/31 10:41:39 >= : encrypt iv ( 8 bytes )
12/10/31 10:41:39 == : encrypt packet ( 84 bytes )
12/10/31 10:41:39 == : stored iv ( 8 bytes )
12/10/31 10:41:39 -> : send NAT-T:IKE packet 192.168.1.150:4500 -> <Remote Address>:500 ( 116 bytes )
12/10/31 10:41:39 ii : DPD ARE-YOU-THERE sequence 05024ba0 requested
12/10/31 10:41:39 DB : phase1 found
12/10/31 10:41:39 -> : send NAT-T:KEEP-ALIVE packet 192.168.1.150:4500 -> <Remote Address>:500
12/10/31 10:41:39 <- : recv NAT-T:IKE packet <Remote Address>:500 -> 192.168.1.150:4500 ( 92 bytes )
12/10/31 10:41:39 DB : phase1 found
12/10/31 10:41:39 ii : processing informational packet ( 92 bytes )
12/10/31 10:41:39 == : new informational iv ( 8 bytes )
12/10/31 10:41:39 =< : cookies b496e6af73f427cd:9cb8d971dd389c3e
12/10/31 10:41:39 =< : message 9e503a50
12/10/31 10:41:39 =< : decrypt iv ( 8 bytes )
12/10/31 10:41:39 == : decrypt packet ( 92 bytes )
12/10/31 10:41:39 <= : trimmed packet padding ( 8 bytes )
12/10/31 10:41:39 <= : stored iv ( 8 bytes )
12/10/31 10:41:39 << : hash payload
12/10/31 10:41:39 << : notification payload
12/10/31 10:41:39 == : informational hash_i ( computed ) ( 20 bytes )
12/10/31 10:41:39 == : informational hash_c ( received ) ( 20 bytes )
12/10/31 10:41:39 ii : informational hash verified
12/10/31 10:41:39 ii : received peer DPDV1-R-U-THERE-ACK notification
12/10/31 10:41:39 ii : - <Remote Address>:500 -> 192.168.1.150:4500
12/10/31 10:41:39 ii : - isakmp spi = b496e6af73f427cd:9cb8d971dd389c3e
12/10/31 10:41:39 ii : - data size 4
12/10/31 10:41:39 ii : DPD ARE-YOU-THERE-ACK sequence 05024ba0 accepted
12/10/31 10:41:39 ii : next tunnel DPD request in 15 secs for peer <Remote Address>:500
12/10/31 10:41:54 DB : phase1 found
12/10/31 10:41:54 -> : send NAT-T:KEEP-ALIVE packet 192.168.1.150:4500 -> <Remote Address>:500
12/10/31 10:41:54 DB : phase1 found
12/10/31 10:41:54 ii : sending peer DPDV1-R-U-THERE notification
12/10/31 10:41:54 ii : - 192.168.1.150:4500 -> <Remote Address>:500
12/10/31 10:41:54 ii : - isakmp spi = b496e6af73f427cd:9cb8d971dd389c3e
12/10/31 10:41:54 ii : - data size 4
12/10/31 10:41:54 >> : hash payload
12/10/31 10:41:54 >> : notification payload
12/10/31 10:41:54 == : new informational hash ( 20 bytes )
12/10/31 10:41:54 == : new informational iv ( 8 bytes )
12/10/31 10:41:54 >= : cookies b496e6af73f427cd:9cb8d971dd389c3e
12/10/31 10:41:54 >= : message 91dd2913
12/10/31 10:41:54 >= : encrypt iv ( 8 bytes )
12/10/31 10:41:54 == : encrypt packet ( 84 bytes )
12/10/31 10:41:54 == : stored iv ( 8 bytes )
12/10/31 10:41:54 -> : send NAT-T:IKE packet 192.168.1.150:4500 -> <Remote Address>:500 ( 116 bytes )
12/10/31 10:41:54 ii : DPD ARE-YOU-THERE sequence 05024ba1 requested
12/10/31 10:41:54 <- : recv NAT-T:IKE packet <Remote Address>:500 -> 192.168.1.150:4500 ( 92 bytes )
12/10/31 10:41:54 DB : phase1 found
12/10/31 10:41:54 ii : processing informational packet ( 92 bytes )
12/10/31 10:41:54 == : new informational iv ( 8 bytes )
12/10/31 10:41:54 =< : cookies b496e6af73f427cd:9cb8d971dd389c3e
12/10/31 10:41:54 =< : message c3de8db9
12/10/31 10:41:54 =< : decrypt iv ( 8 bytes )
12/10/31 10:41:54 == : decrypt packet ( 92 bytes )
12/10/31 10:41:54 <= : trimmed packet padding ( 8 bytes )
12/10/31 10:41:54 <= : stored iv ( 8 bytes )
12/10/31 10:41:54 << : hash payload
12/10/31 10:41:54 << : notification payload
12/10/31 10:41:54 == : informational hash_i ( computed ) ( 20 bytes )
12/10/31 10:41:54 == : informational hash_c ( received ) ( 20 bytes )
12/10/31 10:41:54 ii : informational hash verified
12/10/31 10:41:54 ii : received peer DPDV1-R-U-THERE-ACK notification
12/10/31 10:41:54 ii : - <Remote Address>:500 -> 192.168.1.150:4500
12/10/31 10:41:54 ii : - isakmp spi = b496e6af73f427cd:9cb8d971dd389c3e
12/10/31 10:41:54 ii : - data size 4
12/10/31 10:41:54 ii : DPD ARE-YOU-THERE-ACK sequence 05024ba1 accepted
12/10/31 10:41:54 ii : next tunnel DPD request in 15 secs for peer <Remote Address>:500
12/10/31 10:42:09 DB : phase1 found
12/10/31 10:42:09 -> : send NAT-T:KEEP-ALIVE packet 192.168.1.150:4500 -> <Remote Address>:500
12/10/31 10:42:09 DB : phase1 found
12/10/31 10:42:09 ii : sending peer DPDV1-R-U-THERE notification
12/10/31 10:42:09 ii : - 192.168.1.150:4500 -> <Remote Address>:500
12/10/31 10:42:09 ii : - isakmp spi = b496e6af73f427cd:9cb8d971dd389c3e
12/10/31 10:42:09 ii : - data size 4
12/10/31 10:42:09 >> : hash payload
12/10/31 10:42:09 >> : notification payload
12/10/31 10:42:09 == : new informational hash ( 20 bytes )
12/10/31 10:42:09 == : new informational iv ( 8 bytes )
12/10/31 10:42:09 >= : cookies b496e6af73f427cd:9cb8d971dd389c3e
12/10/31 10:42:09 >= : message 0c25fb25
12/10/31 10:42:09 >= : encrypt iv ( 8 bytes )
12/10/31 10:42:09 == : encrypt packet ( 84 bytes )
12/10/31 10:42:09 == : stored iv ( 8 bytes )
12/10/31 10:42:09 -> : send NAT-T:IKE packet 192.168.1.150:4500 -> <Remote Address>:500 ( 116 bytes )
12/10/31 10:42:09 ii : DPD ARE-YOU-THERE sequence 05024ba2 requested
12/10/31 10:42:10 <- : recv NAT-T:IKE packet <Remote Address>:500 -> 192.168.1.150:4500 ( 92 bytes )
12/10/31 10:42:10 DB : phase1 found
12/10/31 10:42:10 ii : processing informational packet ( 92 bytes )
12/10/31 10:42:10 == : new informational iv ( 8 bytes )
12/10/31 10:42:10 =< : cookies b496e6af73f427cd:9cb8d971dd389c3e
12/10/31 10:42:10 =< : message 8ab7c85d
12/10/31 10:42:10 =< : decrypt iv ( 8 bytes )
12/10/31 10:42:10 == : decrypt packet ( 92 bytes )
12/10/31 10:42:10 <= : trimmed packet padding ( 8 bytes )
12/10/31 10:42:10 <= : stored iv ( 8 bytes )
12/10/31 10:42:10 << : hash payload
12/10/31 10:42:10 << : notification payload
12/10/31 10:42:10 == : informational hash_i ( computed ) ( 20 bytes )
12/10/31 10:42:10 == : informational hash_c ( received ) ( 20 bytes )
12/10/31 10:42:10 ii : informational hash verified
12/10/31 10:42:10 ii : received peer DPDV1-R-U-THERE-ACK notification
12/10/31 10:42:10 ii : - <Remote Address>:500 -> 192.168.1.150:4500
12/10/31 10:42:10 ii : - isakmp spi = b496e6af73f427cd:9cb8d971dd389c3e
12/10/31 10:42:10 ii : - data size 4
12/10/31 10:42:10 ii : DPD ARE-YOU-THERE-ACK sequence 05024ba2 accepted
12/10/31 10:42:10 ii : next tunnel DPD request in 15 secs for peer <Remote Address>:500


Partager le fichier

Télécharger vpn_logs.txt

Télécharger le fichier (26 Ko)