show security ipsec security-associations index 131075 detail node0: -------------------------------------------------------------------------- ID: 131075 Virtual-system: root, VPN Name: IPSEC-15-VPN Local Gateway: 124.29.233.138, Remote Gateway: 103.229.87.66 Local Identity: ipv4_subnet(any:0,[0..7]=0.0.0.0/0) Remote Identity: ipv4_subnet(any:0,[0..7]=0.0.0.0/0) Version: IKEv1 DF-bit: clear, Copy-Outer-DSCP Disabled, Bind-interface: st0.15 Port: 500, Nego#: 800, Fail#: 0, Def-Del#: 0 Flag: 0x600a29 Tunnel events: Thu Jun 28 2018 05:04:19 -0500: IPSec SA negotiation successfully completed (1 times) Thu Jun 28 2018 05:04:05 -0500: IPSec SA delete payload received from peer, corresponding IPSec SAs cleared (1 times) Thu Jun 28 2018 05:00:19 -0500: IPSec SA negotiation successfully completed (1 times) Thu Jun 28 2018 05:00:05 -0500: IPSec SA delete payload received from peer, corresponding IPSec SAs cleared (1 times) Thu Jun 28 2018 04:56:19 -0500: IPSec SA negotiation successfully completed (1 times) Thu Jun 28 2018 04:56:11 -0500: IPSec SA delete payload received from peer, corresponding IPSec SAs cleared (1 times) Thu Jun 28 2018 04:52:26 -0500: IPSec SA negotiation successfully completed (1 times) Thu Jun 28 2018 04:52:21 -0500: IPSec SA delete payload received from peer, corresponding IPSec SAs cleared (1 times) Thu Jun 28 2018 04:27:19 -0500: IKE SA negotiation successfully completed (11 times) Direction: inbound, SPI: 93308561, AUX-SPI: 0 , VPN Monitoring: - Hard lifetime: Expires in 3444 seconds Lifesize Remaining: Unlimited Soft lifetime: Expires in 2870 seconds Mode: Tunnel(0 0), Type: dynamic, State: installed Protocol: ESP, Authentication: hmac-md5-96, Encryption: 3des-cbc Anti-replay service: counter-based enabled, Replay window size: 64 Direction: outbound, SPI: a6b9887a, AUX-SPI: 0 , VPN Monitoring: - Hard lifetime: Expires in 3444 seconds Lifesize Remaining: Unlimited Soft lifetime: Expires in 2870 seconds Mode: Tunnel(0 0), Type: dynamic, State: installed Protocol: ESP, Authentication: hmac-md5-96, Encryption: 3des-cbc Anti-replay service: counter-based enabled, Replay window size: 64 ======================================================= show log junilog|match st0.15 Jun 25 01:47:51 rpd[1867]: EVENT st0.15 index 86 Jun 25 01:47:51 rpd[1867]: EVENT UpDown st0.15 index 86 Jun 25 01:47:51 rpd[1867]: EVENT UpDown st0.15 index 86 10.115.10.2 -> 10.115.10.2 Jun 25 01:47:51 kmd[1902]: KMD_VPN_DOWN_ALARM_USER: VPN IPSEC-15-VPN from 103.229.87.66 is down. Local-ip: 124.29.233.138, gateway name: IKE-U15-GW, vpn name: IPSEC-15-VPN, tunnel-id: 131075, local tunnel-if: st0.15, remote tunnel-ip: 10.115.10.1, Local IKE-ID: 124.29.233.138, Remote IKE-ID: 103.229.87.66, XAUTH username: Not-Applicable, VR id: 0, Traffic-selector: , Traffic-selector local ID: ipv4_subnet(any:0,[0..7]=0.0.0.0/0), Traffic-selector remote ID: ipv4_subnet(any:0,[0..7]=0.0.0.0/0), SA Type: Static, Reason: IPSec SA delete payload received from peer, corresponding IPSec SAs cleared Jun 25 01:47:51 mib2d[1865]: SNMP_TRAP_LINK_DOWN: ifIndex 588, ifAdminStatus up(1), ifOperStatus down(2), ifName st0.15 Jun 25 01:48:06 kmd[1902]: KMD_VPN_UP_ALARM_USER: VPN IPSEC-15-VPN from 103.229.87.66 is up. Local-ip: 124.29.233.138, gateway name: IKE-U15-GW, vpn name: IPSEC-15-VPN, tunnel-id: 131075, local tunnel-if: st0.15, remote tunnel-ip: 10.115.10.1, Local IKE-ID: 124.29.233.138, Remote IKE-ID: 103.229.87.66, XAUTH username: Not-Applicable, VR id: 0, Traffic-selector: , Traffic-selector local ID: ipv4_subnet(any:0,[0..7]=0.0.0.0/0), Traffic-selector remote ID: ipv4_subnet(any:0,[0..7]=0.0.0.0/0), SA Type: Static Jun 25 01:48:06 rpd[1867]: EVENT st0.15 index 86 Jun 25 01:48:06 rpd[1867]: EVENT UpDown st0.15 index 86 Jun 25 01:48:06 rpd[1867]: EVENT UpDown st0.15 index 86 10.115.10.2 -> 10.115.10.2 Jun 25 01:48:06 mib2d[1865]: SNMP_TRAP_LINK_UP: ifIndex 588, ifAdminStatus up(1), ifOperStatus up(1), ifName st0.15 Jun 25 01:51:52 kmd[1902]: KMD_VPN_DOWN_ALARM_USER: VPN IPSEC-15-VPN from 103.229.87.66 is down. Local-ip: 124.29.233.138, gateway name: IKE-U15-GW, vpn name: IPSEC-15-VPN, tunnel-id: 131075, local tunnel-if: st0.15, remote tunnel-ip: 10.115.10.1, Local IKE-ID: 124.29.233.138, Remote IKE-ID: 103.229.87.66, XAUTH username: Not-Applicable, VR id: 0, Traffic-selector: , Traffic-selector local ID: ipv4_subnet(any:0,[0..7]=0.0.0.0/0), Traffic-selector remote ID: ipv4_subnet(any:0,[0..7]=0.0.0.0/0), SA Type: Static, Reason: IPSec SA delete payload received from peer, corresponding IPSec SAs cleared Jun 25 01:51:52 rpd[1867]: EVENT st0.15 index 86 Jun 25 01:51:52 rpd[1867]: EVENT UpDown st0.15 index 86 Jun 25 01:51:52 rpd[1867]: EVENT UpDown st0.15 index 86 10.115.10.2 -> 10.115.10.2 Jun 25 01:51:52 mib2d[1865]: SNMP_TRAP_LINK_DOWN: ifIndex 588, ifAdminStatus up(1), ifOperStatus down(2), ifName st0.15 Jun 25 01:52:07 rpd[1867]: EVENT st0.15 index 86 Jun 25 01:52:07 rpd[1867]: EVENT UpDown st0.15 index 86 Jun 25 01:52:07 kmd[1902]: KMD_VPN_UP_ALARM_USER: VPN IPSEC-15-VPN from 103.229.87.66 is up. Local-ip: 124.29.233.138, gateway name: IKE-U15-GW, vpn name: IPSEC-15-VPN, tunnel-id: 131075, local tunnel-if: st0.15, remote tunnel-ip: 10.115.10.1, Local IKE-ID: 124.29.233.138, Remote IKE-ID: 103.229.87.66, XAUTH username: Not-Applicable, VR id: 0, Traffic-selector: , Traffic-selector local ID: ipv4_subnet(any:0,[0..7]=0.0.0.0/0), Traffic-selector remote ID: ipv4_subnet(any:0,[0..7]=0.0.0.0/0), SA Type: Static Jun 25 01:52:07 rpd[1867]: EVENT UpDown st0.15 index 86 10.115.10.2 -> 10.115.10.2 Jun 25 01:52:07 mib2d[1865]: SNMP_TRAP_LINK_UP: ifIndex 588, ifAdminStatus up(1), ifOperStatus up(1), ifName st0.15