Nos partenaires et nous-mêmes utilisons différentes technologies, telles que les cookies, pour personnaliser les contenus et les publicités, proposer des fonctionnalités sur les réseaux sociaux et analyser le trafic. Merci de cliquer sur le bouton ci-dessous pour donner votre accord. Vous pouvez changer d’avis et modifier vos choix à tout moment. Informations RGPD
12/10/31 10:41:12 ## : IKE Daemon, ver 2.1.7 12/10/31 10:41:12 ## : Copyright 2010 Shrew Soft Inc. 12/10/31 10:41:12 ## : This product linked OpenSSL 0.9.8h 28 May 2008 12/10/31 10:41:12 ii : opened 'C:\Program Files\VPN Client\debug\iked.log' 12/10/31 10:41:12 ii : opened 'C:\Program Files\VPN Client/debug/dump-ike-decrypt.cap' 12/10/31 10:41:12 ii : rebuilding vnet device list ... 12/10/31 10:41:12 ii : device ROOT\VNET\0000 disabled 12/10/31 10:41:12 ii : network process thread begin ... 12/10/31 10:41:12 ii : pfkey process thread begin ... 12/10/31 10:41:12 ii : ipc server process thread begin ... 12/10/31 10:41:23 ii : ipc client process thread begin ... 12/10/31 10:41:23 <A : peer config add message 12/10/31 10:41:23 DB : peer added ( obj count = 1 ) 12/10/31 10:41:23 ii : local address 192.168.1.150 selected for peer 12/10/31 10:41:23 DB : tunnel added ( obj count = 1 ) 12/10/31 10:41:23 <A : proposal config message 12/10/31 10:41:23 <A : proposal config message 12/10/31 10:41:23 <A : client config message 12/10/31 10:41:23 <A : local id 'srx_remote1.com' message 12/10/31 10:41:23 <A : remote id 'srx_local1.com' message 12/10/31 10:41:23 <A : preshared key message 12/10/31 10:41:23 <A : remote resource message 12/10/31 10:41:23 <A : peer tunnel enable message 12/10/31 10:41:23 DB : new phase1 ( ISAKMP initiator ) 12/10/31 10:41:23 DB : exchange type is aggressive 12/10/31 10:41:23 DB : 192.168.1.150:500 <-> <Remote Address>:500 12/10/31 10:41:23 DB : b496e6af73f427cd:0000000000000000 12/10/31 10:41:23 DB : phase1 added ( obj count = 1 ) 12/10/31 10:41:23 >> : security association payload 12/10/31 10:41:23 >> : - proposal #1 payload 12/10/31 10:41:23 >> : -- transform #1 payload 12/10/31 10:41:23 >> : -- transform #2 payload 12/10/31 10:41:23 >> : -- transform #3 payload 12/10/31 10:41:23 >> : -- transform #4 payload 12/10/31 10:41:23 >> : -- transform #5 payload 12/10/31 10:41:23 >> : -- transform #6 payload 12/10/31 10:41:23 >> : -- transform #7 payload 12/10/31 10:41:23 >> : -- transform #8 payload 12/10/31 10:41:23 >> : -- transform #9 payload 12/10/31 10:41:23 >> : -- transform #10 payload 12/10/31 10:41:23 >> : -- transform #11 payload 12/10/31 10:41:23 >> : -- transform #12 payload 12/10/31 10:41:23 >> : -- transform #13 payload 12/10/31 10:41:23 >> : -- transform #14 payload 12/10/31 10:41:23 >> : -- transform #15 payload 12/10/31 10:41:23 >> : -- transform #16 payload 12/10/31 10:41:23 >> : -- transform #17 payload 12/10/31 10:41:23 >> : -- transform #18 payload 12/10/31 10:41:23 >> : key exchange payload 12/10/31 10:41:23 >> : nonce payload 12/10/31 10:41:23 >> : identification payload 12/10/31 10:41:23 >> : vendor id payload 12/10/31 10:41:23 ii : local supports nat-t ( draft v00 ) 12/10/31 10:41:23 >> : vendor id payload 12/10/31 10:41:23 ii : local supports nat-t ( draft v01 ) 12/10/31 10:41:23 >> : vendor id payload 12/10/31 10:41:23 ii : local supports nat-t ( draft v02 ) 12/10/31 10:41:23 >> : vendor id payload 12/10/31 10:41:23 ii : local supports nat-t ( draft v03 ) 12/10/31 10:41:23 >> : vendor id payload 12/10/31 10:41:23 ii : local supports nat-t ( rfc ) 12/10/31 10:41:23 >> : vendor id payload 12/10/31 10:41:23 ii : local supports FRAGMENTATION 12/10/31 10:41:23 >> : vendor id payload 12/10/31 10:41:23 ii : local supports DPDv1 12/10/31 10:41:23 >> : vendor id payload 12/10/31 10:41:23 ii : local is SHREW SOFT compatible 12/10/31 10:41:23 >> : vendor id payload 12/10/31 10:41:23 ii : local is NETSCREEN compatible 12/10/31 10:41:23 >> : vendor id payload 12/10/31 10:41:23 ii : local is SIDEWINDER compatible 12/10/31 10:41:23 >> : vendor id payload 12/10/31 10:41:23 ii : local is CISCO UNITY compatible 12/10/31 10:41:23 >= : cookies b496e6af73f427cd:0000000000000000 12/10/31 10:41:23 >= : message 00000000 12/10/31 10:41:23 -> : send IKE packet 192.168.1.150:500 -> <Remote Address>:500 ( 1179 bytes ) 12/10/31 10:41:23 DB : phase1 resend event scheduled ( ref count = 2 ) 12/10/31 10:41:24 <- : recv IKE packet <Remote Address>:500 -> 192.168.1.150:500 ( 410 bytes ) 12/10/31 10:41:24 DB : phase1 found 12/10/31 10:41:24 ii : processing phase1 packet ( 410 bytes ) 12/10/31 10:41:24 =< : cookies b496e6af73f427cd:9cb8d971dd389c3e 12/10/31 10:41:24 =< : message 00000000 12/10/31 10:41:24 << : security association payload 12/10/31 10:41:24 << : - propsal #1 payload 12/10/31 10:41:24 << : -- transform #14 payload 12/10/31 10:41:24 ii : unmatched isakmp proposal/transform 12/10/31 10:41:24 ii : cipher type ( 3des != aes ) 12/10/31 10:41:24 ii : unmatched isakmp proposal/transform 12/10/31 10:41:24 ii : cipher type ( 3des != aes ) 12/10/31 10:41:24 ii : unmatched isakmp proposal/transform 12/10/31 10:41:24 ii : cipher type ( 3des != aes ) 12/10/31 10:41:24 ii : unmatched isakmp proposal/transform 12/10/31 10:41:24 ii : cipher type ( 3des != aes ) 12/10/31 10:41:24 ii : unmatched isakmp proposal/transform 12/10/31 10:41:24 ii : cipher type ( 3des != aes ) 12/10/31 10:41:24 ii : unmatched isakmp proposal/transform 12/10/31 10:41:24 ii : cipher type ( 3des != aes ) 12/10/31 10:41:24 ii : unmatched isakmp proposal/transform 12/10/31 10:41:24 ii : cipher type ( 3des != blowfish ) 12/10/31 10:41:24 ii : unmatched isakmp proposal/transform 12/10/31 10:41:24 ii : cipher type ( 3des != blowfish ) 12/10/31 10:41:24 ii : unmatched isakmp proposal/transform 12/10/31 10:41:24 ii : cipher type ( 3des != blowfish ) 12/10/31 10:41:24 ii : unmatched isakmp proposal/transform 12/10/31 10:41:24 ii : cipher type ( 3des != blowfish ) 12/10/31 10:41:24 ii : unmatched isakmp proposal/transform 12/10/31 10:41:24 ii : cipher type ( 3des != blowfish ) 12/10/31 10:41:24 ii : unmatched isakmp proposal/transform 12/10/31 10:41:24 ii : cipher type ( 3des != blowfish ) 12/10/31 10:41:24 ii : unmatched isakmp proposal/transform 12/10/31 10:41:24 ii : hash type ( hmac-sha != hmac-md5 ) 12/10/31 10:41:24 ii : matched isakmp proposal #1 transform #14 12/10/31 10:41:24 ii : - transform = ike 12/10/31 10:41:24 ii : - cipher type = 3des 12/10/31 10:41:24 ii : - key length = default 12/10/31 10:41:24 ii : - hash type = sha1 12/10/31 10:41:24 ii : - dh group = modp-1024 12/10/31 10:41:24 ii : - auth type = psk 12/10/31 10:41:24 ii : - life seconds = 86400 12/10/31 10:41:24 ii : - life kbytes = 0 12/10/31 10:41:24 << : key exchange payload 12/10/31 10:41:24 << : nonce payload 12/10/31 10:41:24 << : identification payload 12/10/31 10:41:24 ii : phase1 id match 12/10/31 10:41:24 ii : received = fqdn srx_local1.com 12/10/31 10:41:24 << : hash payload 12/10/31 10:41:24 << : vendor id payload 12/10/31 10:41:24 ii : peer is CISCO UNITY compatible 12/10/31 10:41:24 << : vendor id payload 12/10/31 10:41:24 ii : peer is IPSEC-TOOLS compatible 12/10/31 10:41:24 << : vendor id payload 12/10/31 10:41:24 ii : peer supports nat-t ( rfc ) 12/10/31 10:41:24 << : nat discovery payload 12/10/31 10:41:24 << : nat discovery payload 12/10/31 10:41:24 << : vendor id payload 12/10/31 10:41:24 ii : peer supports DPDv1 12/10/31 10:41:24 ii : nat discovery - local address is translated 12/10/31 10:41:24 ii : nat discovery - remote address is translated 12/10/31 10:41:24 ii : switching to src nat-t udp port 4500 12/10/31 10:41:24 ii : switching to dst nat-t udp port 500 12/10/31 10:41:24 == : DH shared secret ( 128 bytes ) 12/10/31 10:41:24 == : SETKEYID ( 20 bytes ) 12/10/31 10:41:24 == : SETKEYID_d ( 20 bytes ) 12/10/31 10:41:24 == : SETKEYID_a ( 20 bytes ) 12/10/31 10:41:24 == : SETKEYID_e ( 20 bytes ) 12/10/31 10:41:24 == : cipher key ( 40 bytes ) 12/10/31 10:41:24 == : cipher iv ( 8 bytes ) 12/10/31 10:41:24 == : phase1 hash_i ( computed ) ( 20 bytes ) 12/10/31 10:41:24 >> : hash payload 12/10/31 10:41:24 >> : nat discovery payload 12/10/31 10:41:24 >> : nat discovery payload 12/10/31 10:41:24 >= : cookies b496e6af73f427cd:9cb8d971dd389c3e 12/10/31 10:41:24 >= : message 00000000 12/10/31 10:41:24 >= : encrypt iv ( 8 bytes ) 12/10/31 10:41:24 == : encrypt packet ( 100 bytes ) 12/10/31 10:41:24 == : stored iv ( 8 bytes ) 12/10/31 10:41:24 DB : phase1 resend event canceled ( ref count = 1 ) 12/10/31 10:41:24 -> : send NAT-T:IKE packet 192.168.1.150:4500 -> <Remote Address>:500 ( 132 bytes ) 12/10/31 10:41:24 == : phase1 hash_r ( computed ) ( 20 bytes ) 12/10/31 10:41:24 == : phase1 hash_r ( received ) ( 20 bytes ) 12/10/31 10:41:24 ii : phase1 sa established 12/10/31 10:41:24 ii : <Remote Address>:500 <-> 192.168.1.150:4500 12/10/31 10:41:24 ii : b496e6af73f427cd:9cb8d971dd389c3e 12/10/31 10:41:24 ii : sending peer INITIAL-CONTACT notification 12/10/31 10:41:24 ii : - 192.168.1.150:4500 -> <Remote Address>:500 12/10/31 10:41:24 ii : - isakmp spi = b496e6af73f427cd:9cb8d971dd389c3e 12/10/31 10:41:24 ii : - data size 0 12/10/31 10:41:24 >> : hash payload 12/10/31 10:41:24 >> : notification payload 12/10/31 10:41:24 == : new informational hash ( 20 bytes ) 12/10/31 10:41:24 == : new informational iv ( 8 bytes ) 12/10/31 10:41:24 >= : cookies b496e6af73f427cd:9cb8d971dd389c3e 12/10/31 10:41:24 >= : message 911bf921 12/10/31 10:41:24 >= : encrypt iv ( 8 bytes ) 12/10/31 10:41:24 == : encrypt packet ( 80 bytes ) 12/10/31 10:41:24 == : stored iv ( 8 bytes ) 12/10/31 10:41:24 -> : send NAT-T:IKE packet 192.168.1.150:4500 -> <Remote Address>:500 ( 116 bytes ) 12/10/31 10:41:24 DB : config added ( obj count = 1 ) 12/10/31 10:41:24 ii : configuration method is manual 12/10/31 10:41:24 DB : phase2 not found 12/10/31 10:41:24 ii : generating IPSEC security policies at UNIQUE level 12/10/31 10:41:24 ii : creating NONE INBOUND policy ANY:<Remote Address>:* -> ANY:192.168.1.150:* 12/10/31 10:41:24 DB : policy added ( obj count = 1 ) 12/10/31 10:41:24 K> : send pfkey X_SPDADD UNSPEC message 12/10/31 10:41:24 K< : recv pfkey X_SPDADD UNSPEC message 12/10/31 10:41:24 DB : policy found 12/10/31 10:41:24 ii : creating NONE OUTBOUND policy ANY:192.168.1.150:* -> ANY:<Remote Address>:* 12/10/31 10:41:24 ii : created NONE policy route for <Remote Address>/32 12/10/31 10:41:24 DB : policy added ( obj count = 2 ) 12/10/31 10:41:24 K> : send pfkey X_SPDADD UNSPEC message 12/10/31 10:41:24 K< : recv pfkey X_SPDADD UNSPEC message 12/10/31 10:41:24 DB : policy found 12/10/31 10:41:24 ii : creating NONE INBOUND policy ANY:192.168.1.1:* -> ANY:192.168.1.150:* 12/10/31 10:41:24 DB : policy added ( obj count = 3 ) 12/10/31 10:41:24 K> : send pfkey X_SPDADD UNSPEC message 12/10/31 10:41:24 ii : creating NONE OUTBOUND policy ANY:192.168.1.150:* -> ANY:192.168.1.1:* 12/10/31 10:41:24 K< : recv pfkey X_SPDADD UNSPEC message 12/10/31 10:41:24 DB : policy found 12/10/31 10:41:24 ii : created NONE policy route for 192.168.1.1/32 12/10/31 10:41:24 DB : policy added ( obj count = 4 ) 12/10/31 10:41:24 K> : send pfkey X_SPDADD UNSPEC message 12/10/31 10:41:24 ii : creating IPSEC INBOUND policy ANY:192.168.2.0/24:* -> ANY:192.168.1.150:* 12/10/31 10:41:24 DB : policy added ( obj count = 5 ) 12/10/31 10:41:24 K> : send pfkey X_SPDADD UNSPEC message 12/10/31 10:41:24 ii : creating IPSEC OUTBOUND policy ANY:192.168.1.150:* -> ANY:192.168.2.0/24:* 12/10/31 10:41:24 K< : recv pfkey X_SPDADD UNSPEC message 12/10/31 10:41:24 DB : policy found 12/10/31 10:41:24 K< : recv pfkey X_SPDADD UNSPEC message 12/10/31 10:41:24 DB : policy found 12/10/31 10:41:24 ii : created IPSEC policy route for 192.168.2.0/24 12/10/31 10:41:24 DB : policy added ( obj count = 6 ) 12/10/31 10:41:24 K> : send pfkey X_SPDADD UNSPEC message 12/10/31 10:41:24 ii : split DNS is disabled 12/10/31 10:41:24 K< : recv pfkey X_SPDADD UNSPEC message 12/10/31 10:41:24 DB : policy found 12/10/31 10:41:24 ii : calling init phase2 for initial policy 12/10/31 10:41:24 DB : policy found 12/10/31 10:41:24 DB : policy found 12/10/31 10:41:24 DB : tunnel found 12/10/31 10:41:24 DB : new phase2 ( IPSEC initiator ) 12/10/31 10:41:24 DB : phase2 added ( obj count = 1 ) 12/10/31 10:41:24 K> : send pfkey GETSPI ESP message 12/10/31 10:41:24 K< : recv pfkey GETSPI ESP message 12/10/31 10:41:24 DB : phase2 found 12/10/31 10:41:24 ii : updated spi for 1 ipsec-esp proposal 12/10/31 10:41:24 DB : phase1 found 12/10/31 10:41:24 >> : hash payload 12/10/31 10:41:24 >> : security association payload 12/10/31 10:41:24 >> : - proposal #1 payload 12/10/31 10:41:24 >> : -- transform #1 payload 12/10/31 10:41:24 >> : -- transform #2 payload 12/10/31 10:41:24 >> : -- transform #3 payload 12/10/31 10:41:24 >> : -- transform #4 payload 12/10/31 10:41:24 >> : -- transform #5 payload 12/10/31 10:41:24 >> : -- transform #6 payload 12/10/31 10:41:24 >> : -- transform #7 payload 12/10/31 10:41:24 >> : -- transform #8 payload 12/10/31 10:41:24 >> : -- transform #9 payload 12/10/31 10:41:24 >> : -- transform #10 payload 12/10/31 10:41:24 >> : -- transform #11 payload 12/10/31 10:41:24 >> : -- transform #12 payload 12/10/31 10:41:24 >> : -- transform #13 payload 12/10/31 10:41:24 >> : -- transform #14 payload 12/10/31 10:41:24 >> : -- transform #15 payload 12/10/31 10:41:24 >> : -- transform #16 payload 12/10/31 10:41:24 >> : -- transform #17 payload 12/10/31 10:41:24 >> : -- transform #18 payload 12/10/31 10:41:24 >> : nonce payload 12/10/31 10:41:24 >> : identification payload 12/10/31 10:41:24 >> : identification payload 12/10/31 10:41:24 == : phase2 hash_i ( input ) ( 632 bytes ) 12/10/31 10:41:24 == : phase2 hash_i ( computed ) ( 20 bytes ) 12/10/31 10:41:24 == : new phase2 iv ( 8 bytes ) 12/10/31 10:41:24 >= : cookies b496e6af73f427cd:9cb8d971dd389c3e 12/10/31 10:41:24 >= : message 3beb6f53 12/10/31 10:41:24 >= : encrypt iv ( 8 bytes ) 12/10/31 10:41:24 == : encrypt packet ( 680 bytes ) 12/10/31 10:41:24 == : stored iv ( 8 bytes ) 12/10/31 10:41:24 -> : send NAT-T:IKE packet 192.168.1.150:4500 -> <Remote Address>:500 ( 716 bytes ) 12/10/31 10:41:24 DB : phase2 resend event scheduled ( ref count = 2 ) 12/10/31 10:41:24 <- : recv NAT-T:IKE packet <Remote Address>:500 -> 192.168.1.150:4500 ( 84 bytes ) 12/10/31 10:41:24 DB : phase1 found 12/10/31 10:41:24 ii : processing informational packet ( 84 bytes ) 12/10/31 10:41:24 == : new informational iv ( 8 bytes ) 12/10/31 10:41:24 =< : cookies b496e6af73f427cd:9cb8d971dd389c3e 12/10/31 10:41:24 =< : message f94f5564 12/10/31 10:41:24 =< : decrypt iv ( 8 bytes ) 12/10/31 10:41:24 == : decrypt packet ( 84 bytes ) 12/10/31 10:41:24 <= : trimmed packet padding ( 4 bytes ) 12/10/31 10:41:24 <= : stored iv ( 8 bytes ) 12/10/31 10:41:24 << : hash payload 12/10/31 10:41:24 << : notification payload 12/10/31 10:41:24 == : informational hash_i ( computed ) ( 20 bytes ) 12/10/31 10:41:24 == : informational hash_c ( received ) ( 20 bytes ) 12/10/31 10:41:24 ii : informational hash verified 12/10/31 10:41:24 ii : received peer INITIAL-CONTACT notification 12/10/31 10:41:24 ii : - <Remote Address>:500 -> 192.168.1.150:4500 12/10/31 10:41:24 ii : - isakmp spi = b496e6af73f427cd:9cb8d971dd389c3e 12/10/31 10:41:24 ii : - data size 0 12/10/31 10:41:25 <- : recv NAT-T:IKE packet <Remote Address>:500 -> 192.168.1.150:4500 ( 156 bytes ) 12/10/31 10:41:25 DB : phase1 found 12/10/31 10:41:25 ii : processing phase2 packet ( 156 bytes ) 12/10/31 10:41:25 DB : phase2 found 12/10/31 10:41:25 =< : cookies b496e6af73f427cd:9cb8d971dd389c3e 12/10/31 10:41:25 =< : message 3beb6f53 12/10/31 10:41:25 =< : decrypt iv ( 8 bytes ) 12/10/31 10:41:25 == : decrypt packet ( 156 bytes ) 12/10/31 10:41:25 <= : trimmed packet padding ( 4 bytes ) 12/10/31 10:41:25 <= : stored iv ( 8 bytes ) 12/10/31 10:41:25 << : hash payload 12/10/31 10:41:25 << : security association payload 12/10/31 10:41:25 << : - propsal #1 payload 12/10/31 10:41:25 << : -- transform #14 payload 12/10/31 10:41:25 << : nonce payload 12/10/31 10:41:25 << : identification payload 12/10/31 10:41:25 << : identification payload 12/10/31 10:41:25 == : phase2 hash_r ( input ) ( 124 bytes ) 12/10/31 10:41:25 == : phase2 hash_r ( computed ) ( 20 bytes ) 12/10/31 10:41:25 == : phase2 hash_r ( received ) ( 20 bytes ) 12/10/31 10:41:25 ii : unmatched ipsec-esp proposal/transform 12/10/31 10:41:25 ii : crypto transform type ( esp-3des != esp-aes ) 12/10/31 10:41:25 ii : unmatched ipsec-esp proposal/transform 12/10/31 10:41:25 ii : crypto transform type ( esp-3des != esp-aes ) 12/10/31 10:41:25 ii : unmatched ipsec-esp proposal/transform 12/10/31 10:41:25 ii : crypto transform type ( esp-3des != esp-aes ) 12/10/31 10:41:25 ii : unmatched ipsec-esp proposal/transform 12/10/31 10:41:25 ii : crypto transform type ( esp-3des != esp-aes ) 12/10/31 10:41:25 ii : unmatched ipsec-esp proposal/transform 12/10/31 10:41:25 ii : crypto transform type ( esp-3des != esp-aes ) 12/10/31 10:41:25 ii : unmatched ipsec-esp proposal/transform 12/10/31 10:41:25 ii : crypto transform type ( esp-3des != esp-aes ) 12/10/31 10:41:25 ii : unmatched ipsec-esp proposal/transform 12/10/31 10:41:25 ii : crypto transform type ( esp-3des != esp-blowfish ) 12/10/31 10:41:25 ii : unmatched ipsec-esp proposal/transform 12/10/31 10:41:25 ii : crypto transform type ( esp-3des != esp-blowfish ) 12/10/31 10:41:25 ii : unmatched ipsec-esp proposal/transform 12/10/31 10:41:25 ii : crypto transform type ( esp-3des != esp-blowfish ) 12/10/31 10:41:25 ii : unmatched ipsec-esp proposal/transform 12/10/31 10:41:25 ii : crypto transform type ( esp-3des != esp-blowfish ) 12/10/31 10:41:25 ii : unmatched ipsec-esp proposal/transform 12/10/31 10:41:25 ii : crypto transform type ( esp-3des != esp-blowfish ) 12/10/31 10:41:25 ii : unmatched ipsec-esp proposal/transform 12/10/31 10:41:25 ii : crypto transform type ( esp-3des != esp-blowfish ) 12/10/31 10:41:25 ii : unmatched ipsec-esp proposal/transform 12/10/31 10:41:25 ii : msg auth ( hmac-sha != hmac-md5 ) 12/10/31 10:41:25 ii : matched ipsec-esp proposal #1 transform #14 12/10/31 10:41:25 ii : - transform = esp-3des 12/10/31 10:41:25 ii : - key length = default 12/10/31 10:41:25 ii : - encap mode = udp-tunnel ( rfc ) 12/10/31 10:41:25 ii : - msg auth = hmac-sha 12/10/31 10:41:25 ii : - pfs dh group = none 12/10/31 10:41:25 ii : - life seconds = 3600 12/10/31 10:41:25 ii : - life kbytes = 0 12/10/31 10:41:25 DB : policy found 12/10/31 10:41:25 K> : send pfkey GETSPI ESP message 12/10/31 10:41:25 ii : phase2 ids accepted 12/10/31 10:41:25 ii : - loc ANY:192.168.1.150:* -> ANY:192.168.2.0/24:* 12/10/31 10:41:25 ii : - rmt ANY:192.168.2.0/24:* -> ANY:192.168.1.150:* 12/10/31 10:41:25 ii : phase2 sa established 12/10/31 10:41:25 ii : 192.168.1.150:4500 <-> <Remote Address>:500 12/10/31 10:41:25 == : phase2 hash_p ( input ) ( 41 bytes ) 12/10/31 10:41:25 == : phase2 hash_p ( computed ) ( 20 bytes ) 12/10/31 10:41:25 >> : hash payload 12/10/31 10:41:25 >= : cookies b496e6af73f427cd:9cb8d971dd389c3e 12/10/31 10:41:25 >= : message 3beb6f53 12/10/31 10:41:25 >= : encrypt iv ( 8 bytes ) 12/10/31 10:41:25 == : encrypt packet ( 52 bytes ) 12/10/31 10:41:25 K< : recv pfkey GETSPI ESP message 12/10/31 10:41:25 == : stored iv ( 8 bytes ) 12/10/31 10:41:25 DB : phase2 found 12/10/31 10:41:25 DB : phase2 resend event canceled ( ref count = 2 ) 12/10/31 10:41:25 -> : send NAT-T:IKE packet 192.168.1.150:4500 -> <Remote Address>:500 ( 84 bytes ) 12/10/31 10:41:25 == : spi cipher key data ( 24 bytes ) 12/10/31 10:41:25 == : spi hmac key data ( 20 bytes ) 12/10/31 10:41:25 K> : send pfkey UPDATE ESP message 12/10/31 10:41:25 == : spi cipher key data ( 24 bytes ) 12/10/31 10:41:25 == : spi hmac key data ( 20 bytes ) 12/10/31 10:41:25 K> : send pfkey UPDATE ESP message 12/10/31 10:41:25 K< : recv pfkey UPDATE ESP message 12/10/31 10:41:25 K< : recv pfkey UPDATE ESP message 12/10/31 10:41:39 DB : phase1 found 12/10/31 10:41:39 ii : sending peer DPDV1-R-U-THERE notification 12/10/31 10:41:39 ii : - 192.168.1.150:4500 -> <Remote Address>:500 12/10/31 10:41:39 ii : - isakmp spi = b496e6af73f427cd:9cb8d971dd389c3e 12/10/31 10:41:39 ii : - data size 4 12/10/31 10:41:39 >> : hash payload 12/10/31 10:41:39 >> : notification payload 12/10/31 10:41:39 == : new informational hash ( 20 bytes ) 12/10/31 10:41:39 == : new informational iv ( 8 bytes ) 12/10/31 10:41:39 >= : cookies b496e6af73f427cd:9cb8d971dd389c3e 12/10/31 10:41:39 >= : message 1f844efa 12/10/31 10:41:39 >= : encrypt iv ( 8 bytes ) 12/10/31 10:41:39 == : encrypt packet ( 84 bytes ) 12/10/31 10:41:39 == : stored iv ( 8 bytes ) 12/10/31 10:41:39 -> : send NAT-T:IKE packet 192.168.1.150:4500 -> <Remote Address>:500 ( 116 bytes ) 12/10/31 10:41:39 ii : DPD ARE-YOU-THERE sequence 05024ba0 requested 12/10/31 10:41:39 DB : phase1 found 12/10/31 10:41:39 -> : send NAT-T:KEEP-ALIVE packet 192.168.1.150:4500 -> <Remote Address>:500 12/10/31 10:41:39 <- : recv NAT-T:IKE packet <Remote Address>:500 -> 192.168.1.150:4500 ( 92 bytes ) 12/10/31 10:41:39 DB : phase1 found 12/10/31 10:41:39 ii : processing informational packet ( 92 bytes ) 12/10/31 10:41:39 == : new informational iv ( 8 bytes ) 12/10/31 10:41:39 =< : cookies b496e6af73f427cd:9cb8d971dd389c3e 12/10/31 10:41:39 =< : message 9e503a50 12/10/31 10:41:39 =< : decrypt iv ( 8 bytes ) 12/10/31 10:41:39 == : decrypt packet ( 92 bytes ) 12/10/31 10:41:39 <= : trimmed packet padding ( 8 bytes ) 12/10/31 10:41:39 <= : stored iv ( 8 bytes ) 12/10/31 10:41:39 << : hash payload 12/10/31 10:41:39 << : notification payload 12/10/31 10:41:39 == : informational hash_i ( computed ) ( 20 bytes ) 12/10/31 10:41:39 == : informational hash_c ( received ) ( 20 bytes ) 12/10/31 10:41:39 ii : informational hash verified 12/10/31 10:41:39 ii : received peer DPDV1-R-U-THERE-ACK notification 12/10/31 10:41:39 ii : - <Remote Address>:500 -> 192.168.1.150:4500 12/10/31 10:41:39 ii : - isakmp spi = b496e6af73f427cd:9cb8d971dd389c3e 12/10/31 10:41:39 ii : - data size 4 12/10/31 10:41:39 ii : DPD ARE-YOU-THERE-ACK sequence 05024ba0 accepted 12/10/31 10:41:39 ii : next tunnel DPD request in 15 secs for peer <Remote Address>:500 12/10/31 10:41:54 DB : phase1 found 12/10/31 10:41:54 -> : send NAT-T:KEEP-ALIVE packet 192.168.1.150:4500 -> <Remote Address>:500 12/10/31 10:41:54 DB : phase1 found 12/10/31 10:41:54 ii : sending peer DPDV1-R-U-THERE notification 12/10/31 10:41:54 ii : - 192.168.1.150:4500 -> <Remote Address>:500 12/10/31 10:41:54 ii : - isakmp spi = b496e6af73f427cd:9cb8d971dd389c3e 12/10/31 10:41:54 ii : - data size 4 12/10/31 10:41:54 >> : hash payload 12/10/31 10:41:54 >> : notification payload 12/10/31 10:41:54 == : new informational hash ( 20 bytes ) 12/10/31 10:41:54 == : new informational iv ( 8 bytes ) 12/10/31 10:41:54 >= : cookies b496e6af73f427cd:9cb8d971dd389c3e 12/10/31 10:41:54 >= : message 91dd2913 12/10/31 10:41:54 >= : encrypt iv ( 8 bytes ) 12/10/31 10:41:54 == : encrypt packet ( 84 bytes ) 12/10/31 10:41:54 == : stored iv ( 8 bytes ) 12/10/31 10:41:54 -> : send NAT-T:IKE packet 192.168.1.150:4500 -> <Remote Address>:500 ( 116 bytes ) 12/10/31 10:41:54 ii : DPD ARE-YOU-THERE sequence 05024ba1 requested 12/10/31 10:41:54 <- : recv NAT-T:IKE packet <Remote Address>:500 -> 192.168.1.150:4500 ( 92 bytes ) 12/10/31 10:41:54 DB : phase1 found 12/10/31 10:41:54 ii : processing informational packet ( 92 bytes ) 12/10/31 10:41:54 == : new informational iv ( 8 bytes ) 12/10/31 10:41:54 =< : cookies b496e6af73f427cd:9cb8d971dd389c3e 12/10/31 10:41:54 =< : message c3de8db9 12/10/31 10:41:54 =< : decrypt iv ( 8 bytes ) 12/10/31 10:41:54 == : decrypt packet ( 92 bytes ) 12/10/31 10:41:54 <= : trimmed packet padding ( 8 bytes ) 12/10/31 10:41:54 <= : stored iv ( 8 bytes ) 12/10/31 10:41:54 << : hash payload 12/10/31 10:41:54 << : notification payload 12/10/31 10:41:54 == : informational hash_i ( computed ) ( 20 bytes ) 12/10/31 10:41:54 == : informational hash_c ( received ) ( 20 bytes ) 12/10/31 10:41:54 ii : informational hash verified 12/10/31 10:41:54 ii : received peer DPDV1-R-U-THERE-ACK notification 12/10/31 10:41:54 ii : - <Remote Address>:500 -> 192.168.1.150:4500 12/10/31 10:41:54 ii : - isakmp spi = b496e6af73f427cd:9cb8d971dd389c3e 12/10/31 10:41:54 ii : - data size 4 12/10/31 10:41:54 ii : DPD ARE-YOU-THERE-ACK sequence 05024ba1 accepted 12/10/31 10:41:54 ii : next tunnel DPD request in 15 secs for peer <Remote Address>:500 12/10/31 10:42:09 DB : phase1 found 12/10/31 10:42:09 -> : send NAT-T:KEEP-ALIVE packet 192.168.1.150:4500 -> <Remote Address>:500 12/10/31 10:42:09 DB : phase1 found 12/10/31 10:42:09 ii : sending peer DPDV1-R-U-THERE notification 12/10/31 10:42:09 ii : - 192.168.1.150:4500 -> <Remote Address>:500 12/10/31 10:42:09 ii : - isakmp spi = b496e6af73f427cd:9cb8d971dd389c3e 12/10/31 10:42:09 ii : - data size 4 12/10/31 10:42:09 >> : hash payload 12/10/31 10:42:09 >> : notification payload 12/10/31 10:42:09 == : new informational hash ( 20 bytes ) 12/10/31 10:42:09 == : new informational iv ( 8 bytes ) 12/10/31 10:42:09 >= : cookies b496e6af73f427cd:9cb8d971dd389c3e 12/10/31 10:42:09 >= : message 0c25fb25 12/10/31 10:42:09 >= : encrypt iv ( 8 bytes ) 12/10/31 10:42:09 == : encrypt packet ( 84 bytes ) 12/10/31 10:42:09 == : stored iv ( 8 bytes ) 12/10/31 10:42:09 -> : send NAT-T:IKE packet 192.168.1.150:4500 -> <Remote Address>:500 ( 116 bytes ) 12/10/31 10:42:09 ii : DPD ARE-YOU-THERE sequence 05024ba2 requested 12/10/31 10:42:10 <- : recv NAT-T:IKE packet <Remote Address>:500 -> 192.168.1.150:4500 ( 92 bytes ) 12/10/31 10:42:10 DB : phase1 found 12/10/31 10:42:10 ii : processing informational packet ( 92 bytes ) 12/10/31 10:42:10 == : new informational iv ( 8 bytes ) 12/10/31 10:42:10 =< : cookies b496e6af73f427cd:9cb8d971dd389c3e 12/10/31 10:42:10 =< : message 8ab7c85d 12/10/31 10:42:10 =< : decrypt iv ( 8 bytes ) 12/10/31 10:42:10 == : decrypt packet ( 92 bytes ) 12/10/31 10:42:10 <= : trimmed packet padding ( 8 bytes ) 12/10/31 10:42:10 <= : stored iv ( 8 bytes ) 12/10/31 10:42:10 << : hash payload 12/10/31 10:42:10 << : notification payload 12/10/31 10:42:10 == : informational hash_i ( computed ) ( 20 bytes ) 12/10/31 10:42:10 == : informational hash_c ( received ) ( 20 bytes ) 12/10/31 10:42:10 ii : informational hash verified 12/10/31 10:42:10 ii : received peer DPDV1-R-U-THERE-ACK notification 12/10/31 10:42:10 ii : - <Remote Address>:500 -> 192.168.1.150:4500 12/10/31 10:42:10 ii : - isakmp spi = b496e6af73f427cd:9cb8d971dd389c3e 12/10/31 10:42:10 ii : - data size 4 12/10/31 10:42:10 ii : DPD ARE-YOU-THERE-ACK sequence 05024ba2 accepted 12/10/31 10:42:10 ii : next tunnel DPD request in 15 secs for peer <Remote Address>:500