Jan 30 16:33:38 Added NHTB payload with private ip address 172.16.229.68 for peer 83.163.4.48 Jan 30 16:33:38 ike_policy_reply_private_payload_out: Start Jan 30 16:33:38 ike_st_o_encrypt: Marking encryption for packet Jan 30 16:33:38 ike_encode_packet: Start, SA = { 0xa5393dff 1506c8dd - 8aef651a ed15620c } / 54b7e067, nego = 1 Jan 30 16:33:38 ike_send_packet: Start, send SA = { a5393dff 1506c8dd - 8aef651a ed15620c}, nego = 1, src = 87.233.229.66:4500, dst = 83.163.4.48:54126, routing table id = 0 Jan 30 16:33:38 ike_get_sa: Start, SA = { 0e8c7501 3208e42e - 0251c20c f9f15c87 } / 72c9107e, remote = 83.163.186.13:54126 Jan 30 16:33:38 ike_sa_find: Found SA = { 0e8c7501 3208e42e - 0251c20c f9f15c87 } Jan 30 16:33:38 ike_decode_packet: Start Jan 30 16:33:38 ike_decode_packet: Start, SA = { 0e8c7501 3208e42e - 0251c20c f9f15c87} / 72c9107e, nego = 2 Jan 30 16:33:38 ike_st_i_encrypt: Check that packet was encrypted succeeded Jan 30 16:33:38 ike_st_i_qm_hash_3: Start, hash[0..20] = b599c40a 1df7418a ... Jan 30 16:33:38 ike_st_i_private: Start Jan 30 16:33:38 87.233.229.66:4500 (Responder) <-> 83.163.186.13:54126 { 0e8c7501 3208e42e - 0251c20c f9f15c87 [2] / 0x72c9107e } QM; MESSAGE: Phase 2 connection succeeded, Using PFS, group = 2 Jan 30 16:33:38 ike_qm_call_callback: MESSAGE: Phase 2 connection succeeded, Using PFS, group = 2 Jan 30 16:33:38 87.233.229.66:4500 (Responder) <-> 83.163.186.13:54126 { 0e8c7501 3208e42e - 0251c20c f9f15c87 [2] / 0x72c9107e } QM; MESSAGE: SA[0][0] = ESP 3des, life = 0 kB/3600 sec, group = 2, udp-tunnel, hmac-sha1-96, key len = 0, key rounds = 0 Jan 30 16:33:38 ike_qm_call_callback: MESSAGE: SA[0][0] = ESP 3des, life = 0 kB/3600 sec, group = 2, udp-tunnel, hmac-sha1-96, key len = 0, key rounds = 0 Jan 30 16:33:38 Added (spi=2118156005, protocol=ESP dst=87.233.229.66) entry to the dynamic sa spi hash table Jan 30 16:33:38 Added (spi=2118156005, protocol=ESP) entry to the inbound spi hash table Jan 30 16:33:38 Added (spi=2118156005, protocol=ESP dst=87.233.229.66) entry to the peer hash table Jan 30 16:33:38 Added (spi=3538486792, protocol=ESP dst=83.163.186.13) entry to the dynamic sa spi hash table Jan 30 16:33:38 Added (spi=3538486792, protocol=ESP dst=83.163.186.13) entry to the peer hash table Jan 30 16:33:38 Phase-2 [responder] done for p1_local=ipv4(udp:0,[0..3]=87.233.229.66) p1_remote=ipv4(udp:500,[0..3]=192.168.1.50) p2_local=ipv4_subnet(any:0,[0..7]=0.0.0.0/0) p2_remote=ipv4_subnet(any:0,[0..7]=0.0.0.0/0) Jan 30 16:33:38 Hardlife timer started for inbound ipsec-gw-SBS2 with 3600 seconds/0 kilobytes Jan 30 16:33:38 Softlife timer started for inbound ipsec-gw-SBS2 with 3040 seconds/0 kilobytes Jan 30 16:33:38 In iked_ipsec_sa_pair_add Jan 30 16:33:38 In iked_ipsec_sa_pair_add Adding GENCFG msg with key; Tunnel = 131073;SPI-In = 7e407ee5 Jan 30 16:33:38 Added dependency on SA config blob with tunnelid = 131073 Jan 30 16:33:38 Successfully added ipsec SA PAIR Jan 30 16:33:38 KMD_VPN_UP_ALARM_USER: VPN ipsec-gw-SBS2 from 83.163.186.13 is up. Jan 30 16:33:38 KMD_VPN_UP_ALARM_USER: VPN ipsec-gw-SBS2 from 83.163.186.13 is up. Jan 30 16:33:38 ike_st_o_qm_wait_done: Marking for waiting for done Jan 30 16:33:38 ike_send_notify: Connected, SA = { 0e8c7501 3208e42e - 0251c20c f9f15c87}, nego = 2 Jan 30 16:33:38 ike_get_sa: Start, SA = { a5393dff 1506c8dd - 8aef651a ed15620c } / 54b7e067, remote = 83.163.4.48:54126 Jan 30 16:33:38 ike_sa_find: Found SA = { a5393dff 1506c8dd - 8aef651a ed15620c } Jan 30 16:33:38 ike_decode_packet: Start Jan 30 16:33:38 ike_decode_packet: Start, SA = { a5393dff 1506c8dd - 8aef651a ed15620c} / 54b7e067, nego = 1 Jan 30 16:33:38 ike_st_i_encrypt: Check that packet was encrypted succeeded Jan 30 16:33:38 ike_st_i_qm_hash_3: Start, hash[0..20] = 03da8cd7 c8c1ea98 ... Jan 30 16:33:38 ike_st_i_private: Start Jan 30 16:33:38 87.233.229.66:4500 (Responder) <-> 83.163.4.48:54126 { a5393dff 1506c8dd - 8aef651a ed15620c [1] / 0x54b7e067 } QM; MESSAGE: Phase 2 connection succeeded, Using PFS, group = 2 Jan 30 16:33:38 ike_qm_call_callback: MESSAGE: Phase 2 connection succeeded, Using PFS, group = 2 Jan 30 16:33:38 87.233.229.66:4500 (Responder) <-> 83.163.4.48:54126 { a5393dff 1506c8dd - 8aef651a ed15620c [1] / 0x54b7e067 } QM; MESSAGE: SA[0][0] = ESP 3des, life = 0 kB/3600 sec, group = 2, udp-tunnel, hmac-sha1-96, key len = 0, key rounds = 0 Jan 30 16:33:38 ike_qm_call_callback: MESSAGE: SA[0][0] = ESP 3des, life = 0 kB/3600 sec, group = 2, udp-tunnel, hmac-sha1-96, key len = 0, key rounds = 0 Jan 30 16:33:38 Added (spi=813599107, protocol=ESP dst=87.233.229.66) entry to the dynamic sa spi hash table Jan 30 16:33:38 Added (spi=813599107, protocol=ESP) entry to the inbound spi hash table Jan 30 16:33:38 Added (spi=813599107, protocol=ESP dst=87.233.229.66) entry to the peer hash table Jan 30 16:33:38 Added (spi=3701142762, protocol=ESP dst=83.163.4.48) entry to the dynamic sa spi hash table Jan 30 16:33:38 Added (spi=3701142762, protocol=ESP dst=83.163.4.48) entry to the peer hash table Jan 30 16:33:38 Phase-2 [responder] done for p1_local=ipv4(udp:0,[0..3]=87.233.229.66) p1_remote=ipv4(udp:500,[0..3]=192.168.1.50) p2_local=ipv4_subnet(any:0,[0..7]=0.0.0.0/0) p2_remote=ipv4_subnet(any:0,[0..7]=0.0.0.0/0) Jan 30 16:33:38 Hardlife timer started for inbound ipsec-gw-SBS1 with 3600 seconds/0 kilobytes Jan 30 16:33:38 Softlife timer started for inbound ipsec-gw-SBS1 with 3009 seconds/0 kilobytes Jan 30 16:33:38 In iked_ipsec_sa_pair_add Jan 30 16:33:38 In iked_ipsec_sa_pair_add Adding GENCFG msg with key; Tunnel = 131074;SPI-In = 307e8983 Jan 30 16:33:38 Added dependency on SA config blob with tunnelid = 131074 Jan 30 16:33:38 Successfully added ipsec SA PAIR Jan 30 16:33:38 KMD_VPN_UP_ALARM_USER: VPN ipsec-gw-SBS1 from 83.163.4.48 is up. Jan 30 16:33:38 KMD_VPN_UP_ALARM_USER: VPN ipsec-gw-SBS1 from 83.163.4.48 is up. Jan 30 16:33:38 ike_st_o_qm_wait_done: Marking for waiting for done Jan 30 16:33:38 ike_send_notify: Connected, SA = { a5393dff 1506c8dd - 8aef651a ed15620c}, nego = 1 Jan 30 16:33:42 ike_retransmit_callback: Start, retransmit SA = { ecb179d0 89060357 - 00000000 00000000}, nego = -1 Jan 30 16:33:42 ike_send_packet: Start, retransmit previous packet SA = { ecb179d0 89060357 - 00000000 00000000}, nego = -1, src = 87.233.229.66:500, dst = 83.163.4.48:500, routing table id = 0 Jan 30 16:34:07 ike_remove_callback: Start, delete SA = { ecb179d0 89060357 - 00000000 00000000}, nego = -1 Jan 30 16:34:07 87.233.229.66:500 (Initiator) <-> 83.163.4.48:500 { ecb179d0 89060357 - 00000000 00000000 [-1] / 0x00000000 } IP; Connection timed out or error, calling callback Jan 30 16:34:07 Phase-1 negotiation failed with error Timeout for p1_local=ipv4(udp:500,[0..3]=87.233.229.66) p1_remote=ipv4(udp:500,[0..3]=83.163.4.48) Jan 30 16:34:07 Phase-2 sa_cfg lookup with local_id=ipv4_subnet(any:0,[0..7]=0.0.0.0/0), remote_id=ipv4_subnet(any:0,[0..7]=0.0.0.0/0) Jan 30 16:34:07 ike_delete_negotiation: Start, SA = { ecb179d0 89060357 - 00000000 00000000}, nego = -1 Jan 30 16:34:07 jnp_ike_tunnel_table_entry_delete: Deleting tunnel_id: 75370 from IKE tunnel table Jan 30 16:34:07 ike_sa_delete: Start, SA = { ecb179d0 89060357 - 00000000 00000000 } Jan 30 16:34:07 ike_free_negotiation_isakmp: Start, nego = -1 Jan 30 16:34:07 ike_free_negotiation: Start, nego = -1 Jan 30 16:34:07 P1 freeing PMdata 13ec800 Jan 30 16:34:07 P1 freeing PMdata 14a2400 Jan 30 16:34:07 ike_free_id_payload: Start, id type = 1 Jan 30 16:34:07 ike_free_sa: Start Jan 30 16:34:35 Deleted (spi=813599107, protocol=ESP dst=87.233.229.66) entry from the peer hash table Jan 30 16:34:35 Deleted (spi=813599107, protocol=ESP dst=87.233.229.66) entry from the dynamic sa spi hash table Jan 30 16:34:35 jnp_ike_connect_delete: Start, remote_name = 83.163.4.48:54126, flags = 00010000 Jan 30 16:34:35 jnp_ike_create_delete_internal: Start, remote_name = 83.163.4.48:54126, flags = 00010000 Jan 30 16:34:35 ike_sa_find_ip_port: Remote = 83.163.4.48:54126, Found SA = { a5393dff 1506c8dd - 8aef651a ed15620c} Jan 30 16:34:35 ike_alloc_negotiation: Start, SA = { a5393dff 1506c8dd - 8aef651a ed15620c} Jan 30 16:34:35 jnp_ike_create_delete_internal: SA = { a5393dff 1506c8dd - 8aef651a ed15620c}, nego = 2 Jan 30 16:34:35 ike_encode_packet: Start, SA = { 0xa5393dff 1506c8dd - 8aef651a ed15620c } / f3f8c15a, nego = 2 Jan 30 16:34:35 ike_send_packet: Start, send SA = { a5393dff 1506c8dd - 8aef651a ed15620c}, nego = 2, src = 87.233.229.66:4500, dst = 83.163.4.48:54126, routing table id = 0 Jan 30 16:34:35 ike_delete_negotiation: Start, SA = { a5393dff 1506c8dd - 8aef651a ed15620c}, nego = 2 Jan 30 16:34:35 ike_free_negotiation_info: Start, nego = 2 Jan 30 16:34:35 ike_free_negotiation: Start, nego = 2 Jan 30 16:34:35 Delete notification sent for 1 SPI's peer 83.163.4.48:54126; IKE SA was found Jan 30 16:34:35 NHTB entry not found. Not deleting NHTB entry Jan 30 16:34:35 In iked_ipsec_sa_pair_delete Deleting GENCFG msg with key; Tunnel = 131074;SPI-In = 813599107 Jan 30 16:34:35 Deleted SA pair for tunnel = 131074 with SPI-In = 813599107 to kernel Jan 30 16:34:35 Deleted (spi=813599107, protocol=ESP) entry from the inbound sa spi hash table Jan 30 16:34:35 Deleted (spi=3701142762, protocol=ESP dst=83.163.4.48) entry from the peer hash table Jan 30 16:34:35 Deleted (spi=3701142762, protocol=ESP dst=83.163.4.48) entry from the dynamic sa spi hash table Jan 30 16:34:35 jnp_ike_connect_delete: Start, remote_name = 83.163.4.48:54126, flags = 00010000 Jan 30 16:34:35 jnp_ike_create_delete_internal: Start, remote_name = 83.163.4.48:54126, flags = 00010000 Jan 30 16:34:35 ike_sa_find_ip_port: Remote = 83.163.4.48:54126, Found SA = { a5393dff 1506c8dd - 8aef651a ed15620c} Jan 30 16:34:35 ike_alloc_negotiation: Start, SA = { a5393dff 1506c8dd - 8aef651a ed15620c} Jan 30 16:34:35 jnp_ike_create_delete_internal: SA = { a5393dff 1506c8dd - 8aef651a ed15620c}, nego = 2 Jan 30 16:34:35 ike_encode_packet: Start, SA = { 0xa5393dff 1506c8dd - 8aef651a ed15620c } / ef1edb67, nego = 2 Jan 30 16:34:35 ike_send_packet: Start, send SA = { a5393dff 1506c8dd - 8aef651a ed15620c}, nego = 2, src = 87.233.229.66:4500, dst = 83.163.4.48:54126, routing table id = 0 Jan 30 16:34:35 ike_delete_negotiation: Start, SA = { a5393dff 1506c8dd - 8aef651a ed15620c}, nego = 2 Jan 30 16:34:35 ike_free_negotiation_info: Start, nego = 2 Jan 30 16:34:35 ike_free_negotiation: Start, nego = 2 Jan 30 16:34:35 Delete notification sent for 1 SPI's peer 83.163.4.48:54126; IKE SA was found Jan 30 16:34:35 KMD_VPN_DOWN_ALARM_USER: VPN ipsec-gw-SBS1 from 83.163.4.48 is down. Jan 30 16:34:35 KMD_VPN_DOWN_ALARM_USER: VPN ipsec-gw-SBS1 from 83.163.4.48 is down. Jan 30 16:34:35 Deleted (spi=2118156005, protocol=ESP dst=87.233.229.66) entry from the peer hash table Jan 30 16:34:35 Deleted (spi=2118156005, protocol=ESP dst=87.233.229.66) entry from the dynamic sa spi hash table Jan 30 16:34:35 jnp_ike_connect_delete: Start, remote_name = 83.163.186.13:54126, flags = 00010000 Jan 30 16:34:35 jnp_ike_create_delete_internal: Start, remote_name = 83.163.186.13:54126, flags = 00010000 Jan 30 16:34:35 ike_sa_find_ip_port: Remote = 83.163.186.13:54126, Found SA = { 0e8c7501 3208e42e - 0251c20c f9f15c87} Jan 30 16:34:35 ike_alloc_negotiation: Start, SA = { 0e8c7501 3208e42e - 0251c20c f9f15c87} Jan 30 16:34:35 jnp_ike_create_delete_internal: SA = { 0e8c7501 3208e42e - 0251c20c f9f15c87}, nego = 3 Jan 30 16:34:35 ike_encode_packet: Start, SA = { 0x0e8c7501 3208e42e - 0251c20c f9f15c87 } / 387a050c, nego = 3 Jan 30 16:34:35 ike_send_packet: Start, send SA = { 0e8c7501 3208e42e - 0251c20c f9f15c87}, nego = 3, src = 87.233.229.66:4500, dst = 83.163.186.13:54126, routing table id = 0 Jan 30 16:34:35 ike_delete_negotiation: Start, SA = { 0e8c7501 3208e42e - 0251c20c f9f15c87}, nego = 3 Jan 30 16:34:35 ike_free_negotiation_info: Start, nego = 3 Jan 30 16:34:35 ike_free_negotiation: Start, nego = 3 Jan 30 16:34:35 Delete notification sent for 1 SPI's peer 83.163.186.13:54126; IKE SA was found Jan 30 16:34:35 NHTB entry not found. Not deleting NHTB entry Jan 30 16:34:35 In iked_ipsec_sa_pair_delete Deleting GENCFG msg with key; Tunnel = 131073;SPI-In = 2118156005 Jan 30 16:34:35 Deleted SA pair for tunnel = 131073 with SPI-In = 2118156005 to kernel Jan 30 16:34:35 Deleted (spi=2118156005, protocol=ESP) entry from the inbound sa spi hash table Jan 30 16:34:35 Deleted (spi=3538486792, protocol=ESP dst=83.163.186.13) entry from the peer hash table Jan 30 16:34:35 Deleted (spi=3538486792, protocol=ESP dst=83.163.186.13) entry from the dynamic sa spi hash table Jan 30 16:34:35 jnp_ike_connect_delete: Start, remote_name = 83.163.186.13:54126, flags = 00010000 Jan 30 16:34:35 jnp_ike_create_delete_internal: Start, remote_name = 83.163.186.13:54126, flags = 00010000 Jan 30 16:34:35 ike_sa_find_ip_port: Remote = 83.163.186.13:54126, Found SA = { 0e8c7501 3208e42e - 0251c20c f9f15c87} Jan 30 16:34:35 ike_alloc_negotiation: Start, SA = { 0e8c7501 3208e42e - 0251c20c f9f15c87} Jan 30 16:34:35 jnp_ike_create_delete_internal: SA = { 0e8c7501 3208e42e - 0251c20c f9f15c87}, nego = 3 Jan 30 16:34:35 ike_encode_packet: Start, SA = { 0x0e8c7501 3208e42e - 0251c20c f9f15c87 } / 36d45d37, nego = 3 Jan 30 16:34:35 ike_send_packet: Start, send SA = { 0e8c7501 3208e42e - 0251c20c f9f15c87}, nego = 3, src = 87.233.229.66:4500, dst = 83.163.186.13:54126, routing table id = 0 Jan 30 16:34:35 ike_delete_negotiation: Start, SA = { 0e8c7501 3208e42e - 0251c20c f9f15c87}, nego = 3 Jan 30 16:34:35 ike_free_negotiation_info: Start, nego = 3 Jan 30 16:34:35 ike_free_negotiation: Start, nego = 3 Jan 30 16:34:35 Delete notification sent for 1 SPI's peer 83.163.186.13:54126; IKE SA was found Jan 30 16:34:35 KMD_VPN_DOWN_ALARM_USER: VPN ipsec-gw-SBS2 from 83.163.186.13 is down. Jan 30 16:34:35 KMD_VPN_DOWN_ALARM_USER: VPN ipsec-gw-SBS2 from 83.163.186.13 is down. Jan 30 16:34:37 ike_state_restart_packet: Start, restart packet SA = { 0e8c7501 3208e42e - 0251c20c f9f15c87}, nego = 0 Jan 30 16:34:37 ike_st_o_qm_done: Quick Mode negotiation done Jan 30 16:34:37 ike_send_notify: Connected, SA = { 0e8c7501 3208e42e - 0251c20c f9f15c87}, nego = 0 Jan 30 16:34:37 ike_delete_negotiation: Start, SA = { 0e8c7501 3208e42e - 0251c20c f9f15c87}, nego = 0 Jan 30 16:34:37 ike_free_negotiation_qm: Start, nego = 0 Jan 30 16:34:37 ike_free_negotiation: Start, nego = 0 Jan 30 16:34:37 ike_free_id_payload: Start, id type = 4 Jan 30 16:34:37 ike_free_id_payload: Start, id type = 4 Jan 30 16:34:37 ike_free_id_payload: Start, id type = 4 Jan 30 16:34:37 ike_free_id_payload: Start, id type = 4 Jan 30 16:34:38 ike_get_sa: Start, SA = { 0e8c7501 3208e42e - 0251c20c f9f15c87 } / 3638f10d, remote = 83.163.186.13:54126 Jan 30 16:34:38 ike_sa_find: Found SA = { 0e8c7501 3208e42e - 0251c20c f9f15c87 } Jan 30 16:34:38 ike_alloc_negotiation: Start, SA = { 0e8c7501 3208e42e - 0251c20c f9f15c87} Jan 30 16:34:38 ike_init_qm_negotiation: Start, initiator = 0, message_id = 3638f10d Jan 30 16:34:38 ike_decode_packet: Start Jan 30 16:34:38 ike_decode_packet: Start, SA = { 0e8c7501 3208e42e - 0251c20c f9f15c87} / 3638f10d, nego = 0 Jan 30 16:34:38 ike_decode_payload_sa: Start Jan 30 16:34:38 ike_decode_payload_t: Start, # trans = 1 Jan 30 16:34:38 ike_decode_payload_t: Start, # trans = 1 Jan 30 16:34:38 ike_st_i_encrypt: Check that packet was encrypted succeeded Jan 30 16:34:38 ike_st_i_qm_hash_1: Start, hash[0..20] = ca78a756 2c43ff56 ... Jan 30 16:34:38 ike_st_i_qm_nonce: Nonce[0..64] = b275e635 f83d923e ... Jan 30 16:34:38 ike_st_i_qm_ke: Ke[0..128] = 1ba39146 b6604c9d ... Jan 30 16:34:38 ike_st_i_qm_sa_proposals: Start Jan 30 16:34:38 Phase-2 sa_cfg lookup with local_id=ipv4_subnet(any:0,[0..7]=0.0.0.0/0), remote_id=ipv4_subnet(any:0,[0..7]=0.0.0.0/0) Jan 30 16:34:38 ike_qm_sa_reply: Start Jan 30 16:34:38 ike_qm_sa_reply: Selected proposal 0, and transform 0 for protocol 0 Jan 30 16:34:38 ike_st_i_private: Start Jan 30 16:34:38 ike_st_o_qm_hash_2: Start Jan 30 16:34:38 ike_st_o_qm_sa_values: Start Jan 30 16:34:38 ike_st_o_qm_nonce: Start Jan 30 16:34:38 ike_policy_reply_qm_nonce_data_len: Start Jan 30 16:34:38 ike_st_o_qm_optional_ke: Start Jan 30 16:34:38 ike_st_o_qm_optional_ids: Start Jan 30 16:34:38 Local QM id is ipv4_subnet(any:0,[0..7]=0.0.0.0/0) Jan 30 16:34:38 ike_policy_reply_qm_local_id: Start Jan 30 16:34:38 Remote QM id is ipv4_subnet(any:0,[0..7]=0.0.0.0/0) Jan 30 16:34:38 ike_policy_reply_qm_remote_id: Start Jan 30 16:34:38 ike_st_qm_optional_id: Start Jan 30 16:34:38 ike_st_qm_optional_id: Start Jan 30 16:34:38 ike_st_o_qm_optional_responder_lifetime_n: Start Jan 30 16:34:38 ike_st_o_private: Start Jan 30 16:34:38 Constructing NHTB payload for peer 83.163.186.13 Jan 30 16:34:38 Role is responder. Using responder spi 0xa9937696 for payload of ipsec-gw-SBS2 Jan 30 16:34:38 ike_policy_reply_private_payload_out: Start Jan 30 16:34:38 Added NHTB payload with private ip address 172.16.229.69 for peer 83.163.186.13 Jan 30 16:34:38 ike_policy_reply_private_payload_out: Start Jan 30 16:34:38 ike_st_o_encrypt: Marking encryption for packet Jan 30 16:34:38 ike_encode_packet: Start, SA = { 0x0e8c7501 3208e42e - 0251c20c f9f15c87 } / 3638f10d, nego = 0 Jan 30 16:34:38 ike_send_packet: Start, send SA = { 0e8c7501 3208e42e - 0251c20c f9f15c87}, nego = 0, src = 87.233.229.66:4500, dst = 83.163.186.13:54126, routing table id = 0 Jan 30 16:34:38 ike_get_sa: Start, SA = { 0e8c7501 3208e42e - 0251c20c f9f15c87 } / 3638f10d, remote = 83.163.186.13:54126 Jan 30 16:34:38 ike_sa_find: Found SA = { 0e8c7501 3208e42e - 0251c20c f9f15c87 } Jan 30 16:34:38 ike_decode_packet: Start Jan 30 16:34:38 ike_decode_packet: Start, SA = { 0e8c7501 3208e42e - 0251c20c f9f15c87} / 3638f10d, nego = 0 Jan 30 16:34:38 ike_st_i_encrypt: Check that packet was encrypted succeeded Jan 30 16:34:38 ike_st_i_qm_hash_3: Start, hash[0..20] = c9cf7d09 851bffff ... Jan 30 16:34:38 ike_st_i_private: Start Jan 30 16:34:38 87.233.229.66:4500 (Responder) <-> 83.163.186.13:54126 { 0e8c7501 3208e42e - 0251c20c f9f15c87 [0] / 0x3638f10d } QM; MESSAGE: Phase 2 connection succeeded, Using PFS, group = 2 Jan 30 16:34:38 ike_qm_call_callback: MESSAGE: Phase 2 connection succeeded, Using PFS, group = 2 Jan 30 16:34:38 87.233.229.66:4500 (Responder) <-> 83.163.186.13:54126 { 0e8c7501 3208e42e - 0251c20c f9f15c87 [0] / 0x3638f10d } QM; MESSAGE: SA[0][0] = ESP 3des, life = 0 kB/3600 sec, group = 2, udp-tunnel, hmac-sha1-96, key len = 0, key rounds = 0 Jan 30 16:34:38 ike_qm_call_callback: MESSAGE: SA[0][0] = ESP 3des, life = 0 kB/3600 sec, group = 2, udp-tunnel, hmac-sha1-96, key len = 0, key rounds = 0 Jan 30 16:34:38 Added (spi=2845013654, protocol=ESP dst=87.233.229.66) entry to the dynamic sa spi hash table Jan 30 16:34:38 Added (spi=2845013654, protocol=ESP) entry to the inbound spi hash table Jan 30 16:34:38 Added (spi=2845013654, protocol=ESP dst=87.233.229.66) entry to the peer hash table Jan 30 16:34:38 Added (spi=3174473413, protocol=ESP dst=83.163.186.13) entry to the dynamic sa spi hash table Jan 30 16:34:38 Added (spi=3174473413, protocol=ESP dst=83.163.186.13) entry to the peer hash table Jan 30 16:34:38 Phase-2 [responder] done for p1_local=ipv4(udp:0,[0..3]=87.233.229.66) p1_remote=ipv4(udp:500,[0..3]=192.168.1.50) p2_local=ipv4_subnet(any:0,[0..7]=0.0.0.0/0) p2_remote=ipv4_subnet(any:0,[0..7]=0.0.0.0/0) Jan 30 16:34:38 Hardlife timer started for inbound ipsec-gw-SBS2 with 3600 seconds/0 kilobytes Jan 30 16:34:38 Softlife timer started for inbound ipsec-gw-SBS2 with 3014 seconds/0 kilobytes Jan 30 16:34:38 In iked_ipsec_sa_pair_add Jan 30 16:34:38 In iked_ipsec_sa_pair_add Adding GENCFG msg with key; Tunnel = 131073;SPI-In = a9937696 Jan 30 16:34:38 Added dependency on SA config blob with tunnelid = 131073 Jan 30 16:34:38 Successfully added ipsec SA PAIR Jan 30 16:34:38 KMD_VPN_UP_ALARM_USER: VPN ipsec-gw-SBS2 from 83.163.186.13 is up. Jan 30 16:34:38 KMD_VPN_UP_ALARM_USER: VPN ipsec-gw-SBS2 from 83.163.186.13 is up. Jan 30 16:34:38 ike_st_o_qm_wait_done: Marking for waiting for done Jan 30 16:34:38 ike_send_notify: Connected, SA = { 0e8c7501 3208e42e - 0251c20c f9f15c87}, nego = 0 Jan 30 16:34:38 ike_get_sa: Start, SA = { a5393dff 1506c8dd - 8aef651a ed15620c } / 392e50f7, remote = 83.163.4.48:54126 Jan 30 16:34:38 ike_sa_find: Found SA = { a5393dff 1506c8dd - 8aef651a ed15620c } Jan 30 16:34:38 ike_alloc_negotiation: Start, SA = { a5393dff 1506c8dd - 8aef651a ed15620c} Jan 30 16:34:38 ike_init_qm_negotiation: Start, initiator = 0, message_id = 392e50f7 Jan 30 16:34:38 ike_decode_packet: Start Jan 30 16:34:38 ike_decode_packet: Start, SA = { a5393dff 1506c8dd - 8aef651a ed15620c} / 392e50f7, nego = 2 Jan 30 16:34:38 ike_decode_payload_sa: Start Jan 30 16:34:38 ike_decode_payload_t: Start, # trans = 1 Jan 30 16:34:38 ike_decode_payload_t: Start, # trans = 1 Jan 30 16:34:38 ike_st_i_encrypt: Check that packet was encrypted succeeded Jan 30 16:34:38 ike_st_i_qm_hash_1: Start, hash[0..20] = 969086e0 a2d8b4c7 ... Jan 30 16:34:38 ike_st_i_qm_nonce: Nonce[0..64] = ee2a55a2 a433e839 ... Jan 30 16:34:38 ike_st_i_qm_ke: Ke[0..128] = 574fa135 59b0c373 ... Jan 30 16:34:38 ike_st_i_qm_sa_proposals: Start Jan 30 16:34:38 Phase-2 sa_cfg lookup with local_id=ipv4_subnet(any:0,[0..7]=0.0.0.0/0), remote_id=ipv4_subnet(any:0,[0..7]=0.0.0.0/0) Jan 30 16:34:38 ike_qm_sa_reply: Start Jan 30 16:34:38 ike_qm_sa_reply: Selected proposal 0, and transform 0 for protocol 0 Jan 30 16:34:38 ike_st_i_private: Start Jan 30 16:34:38 ike_st_o_qm_hash_2: Start Jan 30 16:34:38 ike_st_o_qm_sa_values: Start Jan 30 16:34:38 ike_st_o_qm_nonce: Start Jan 30 16:34:38 ike_policy_reply_qm_nonce_data_len: Start Jan 30 16:34:38 ike_st_o_qm_optional_ke: Start Jan 30 16:34:38 ike_st_o_qm_optional_ids: Start Jan 30 16:34:38 Local QM id is ipv4_subnet(any:0,[0..7]=0.0.0.0/0) Jan 30 16:34:38 ike_policy_reply_qm_local_id: Start Jan 30 16:34:38 Remote QM id is ipv4_subnet(any:0,[0..7]=0.0.0.0/0) Jan 30 16:34:38 ike_policy_reply_qm_remote_id: Start Jan 30 16:34:38 ike_st_qm_optional_id: Start Jan 30 16:34:38 ike_st_qm_optional_id: Start Jan 30 16:34:38 ike_st_o_qm_optional_responder_lifetime_n: Start Jan 30 16:34:38 ike_st_o_private: Start Jan 30 16:34:38 Constructing NHTB payload for peer 83.163.4.48 Jan 30 16:34:38 Role is responder. Using responder spi 0x9f88079a for payload of ipsec-gw-SBS1 Jan 30 16:34:38 ike_policy_reply_private_payload_out: Start Jan 30 16:34:38 Added NHTB payload with private ip address 172.16.229.68 for peer 83.163.4.48 Jan 30 16:34:38 ike_policy_reply_private_payload_out: Start Jan 30 16:34:38 ike_st_o_encrypt: Marking encryption for packet Jan 30 16:34:38 ike_encode_packet: Start, SA = { 0xa5393dff 1506c8dd - 8aef651a ed15620c } / 392e50f7, nego = 2 Jan 30 16:34:38 ike_send_packet: Start, send SA = { a5393dff 1506c8dd - 8aef651a ed15620c}, nego = 2, src = 87.233.229.66:4500, dst = 83.163.4.48:54126, routing table id = 0 Jan 30 16:34:38 ike_get_sa: Start, SA = { a5393dff 1506c8dd - 8aef651a ed15620c } / 392e50f7, remote = 83.163.4.48:54126 Jan 30 16:34:38 ike_sa_find: Found SA = { a5393dff 1506c8dd - 8aef651a ed15620c } Jan 30 16:34:38 ike_decode_packet: Start Jan 30 16:34:38 ike_decode_packet: Start, SA = { a5393dff 1506c8dd - 8aef651a ed15620c} / 392e50f7, nego = 2 Jan 30 16:34:38 ike_st_i_encrypt: Check that packet was encrypted succeeded Jan 30 16:34:38 ike_st_i_qm_hash_3: Start, hash[0..20] = 9b7d2495 1c289a90 ... Jan 30 16:34:38 ike_st_i_private: Start Jan 30 16:34:38 87.233.229.66:4500 (Responder) <-> 83.163.4.48:54126 { a5393dff 1506c8dd - 8aef651a ed15620c [2] / 0x392e50f7 } QM; MESSAGE: Phase 2 connection succeeded, Using PFS, group = 2 Jan 30 16:34:38 ike_qm_call_callback: MESSAGE: Phase 2 connection succeeded, Using PFS, group = 2 Jan 30 16:34:38 87.233.229.66:4500 (Responder) <-> 83.163.4.48:54126 { a5393dff 1506c8dd - 8aef651a ed15620c [2] / 0x392e50f7 } QM; MESSAGE: SA[0][0] = ESP 3des, life = 0 kB/3600 sec, group = 2, udp-tunnel, hmac-sha1-96, key len = 0, key rounds = 0 Jan 30 16:34:38 ike_qm_call_callback: MESSAGE: SA[0][0] = ESP 3des, life = 0 kB/3600 sec, group = 2, udp-tunnel, hmac-sha1-96, key len = 0, key rounds = 0 Jan 30 16:34:38 Added (spi=2676492186, protocol=ESP dst=87.233.229.66) entry to the dynamic sa spi hash table Jan 30 16:34:38 Added (spi=2676492186, protocol=ESP) entry to the inbound spi hash table Jan 30 16:34:38 Added (spi=2676492186, protocol=ESP dst=87.233.229.66) entry to the peer hash table Jan 30 16:34:38 Added (spi=2528333416, protocol=ESP dst=83.163.4.48) entry to the dynamic sa spi hash table Jan 30 16:34:38 Added (spi=2528333416, protocol=ESP dst=83.163.4.48) entry to the peer hash table Jan 30 16:34:38 Phase-2 [responder] done for p1_local=ipv4(udp:0,[0..3]=87.233.229.66) p1_remote=ipv4(udp:500,[0..3]=192.168.1.50) p2_local=ipv4_subnet(any:0,[0..7]=0.0.0.0/0) p2_remote=ipv4_subnet(any:0,[0..7]=0.0.0.0/0) Jan 30 16:34:38 Hardlife timer started for inbound ipsec-gw-SBS1 with 3600 seconds/0 kilobytes Jan 30 16:34:38 Softlife timer started for inbound ipsec-gw-SBS1 with 3022 seconds/0 kilobytes Jan 30 16:34:38 In iked_ipsec_sa_pair_add Jan 30 16:34:38 In iked_ipsec_sa_pair_add Adding GENCFG msg with key; Tunnel = 131074;SPI-In = 9f88079a Jan 30 16:34:38 Added dependency on SA config blob with tunnelid = 131074 Jan 30 16:34:38 Successfully added ipsec SA PAIR Jan 30 16:34:38 KMD_VPN_UP_ALARM_USER: VPN ipsec-gw-SBS1 from 83.163.4.48 is up. Jan 30 16:34:38 KMD_VPN_UP_ALARM_USER: VPN ipsec-gw-SBS1 from 83.163.4.48 is up. Jan 30 16:34:38 ike_st_o_qm_wait_done: Marking for waiting for done Jan 30 16:34:38 ike_send_notify: Connected, SA = { a5393dff 1506c8dd - 8aef651a ed15620c}, nego = 2