============================================================================= System Event Log (Current system time: Thu, 22 Oct 2020 05:59:52) ============================================================================= Date Time Module level Type Description 2020-10-22 05:59:28 system info 00536 IKE 1.152.228.220 Phase 2 msg ID 3c2fa9d8: Completed negotiations with SPI edd860d5, tunnel ID 24, and lifetime 3600 seconds/0 KB. 2020-10-22 05:59:28 system info 00536 IKE 1.152.228.220 Phase 2 msg ID 469c60f8: Completed negotiations with SPI edd860d4, tunnel ID 29, and lifetime 3600 seconds/0 KB. 2020-10-22 05:59:28 system info 00536 IKE 1.152.228.220 Phase 2 msg ID 3c2fa9d8: Responded to the peer's first message. 2020-10-22 05:59:28 system info 00536 IKE 1.152.228.220 Phase 2 msg ID 469c60f8: Responded to the peer's first message. 2020-10-22 05:59:27 system info 00536 IKE 1.152.228.220: XAuth login was passed for gateway vpnclient_gateway, username support, retry: 0, Client IP Addr 192.168.2.10, IPPool name: vpnclient2, Session-Timeout: 0s, Idle-Timeout: 0s. 2020-10-22 05:59:27 system info 00536 IKE 1.152.228.220: XAuth login was refreshed for username support at 192.168.2.10/255.255.255.255. 2020-10-22 05:59:27 system info 00536 Rejected an IKE packet on ethernet0/9 from 1.152.228.220:4500 to XXX.XXX.XXX.XXX:4500 with cookies ad4139129621b79c and 6eabd696a6b0f26a because A Phase 2 packet arrived while XAuth was still pending. 2020-10-22 05:59:27 system info 00536 IKE 1.152.228.220 Phase 1: Completed Aggressive mode negotiations with a 28800-second lifetime. 2020-10-22 05:59:27 system info 00536 IKE 1.152.228.220 Phase 1: Completed for user vpnclient_ph1id. 2020-10-22 05:59:27 system info 00536 IKE<1.152.228.220> Phase 1: IKE responder has detected NAT in front of the remote device. 2020-10-22 05:59:27 system info 00536 IKE<1.152.228.220> Phase 1: IKE responder has detected NAT in front of the local device. 2020-10-22 05:59:27 system info 00536 IKE 1.152.228.220 Phase 1: Responder starts AGGRESSIVE mode negotiations. 2020-10-22 05:51:11 system info 00536 IKE 49.199.128.71: XAuth login was passed for gateway vpnclient_gateway, username support, retry: 0, Client IP Addr 192.168.2.10, IPPool name: vpnclient2, Session-Timeout: 0s, Idle-Timeout: 0s. 2020-10-22 05:51:11 system info 00536 IKE 49.199.128.71: XAuth login was refreshed for username support at 192.168.2.10/255.255.255.255. 2020-10-22 05:51:11 system info 00536 Rejected an IKE packet on ethernet0/9 from 49.199.128.71:21999 to XXX.XXX.XXX.XXX:4500 with cookies 087e6b542de0c550 and 5f154f96820211d4 because A Phase 2 packet arrived while XAuth was still pending. 2020-10-22 05:51:11 system info 00536 IKE 49.199.128.71 Phase 1: Completed Aggressive mode negotiations with a 28800-second lifetime. 2020-10-22 05:51:11 system info 00536 IKE 49.199.128.71 Phase 1: Completed for user vpnclient_ph1id. 2020-10-22 05:51:11 system info 00536 IKE<49.199.128.71> Phase 1: IKE responder has detected NAT in front of the remote device. 2020-10-22 05:51:11 system info 00536 IKE<49.199.128.71> Phase 1: IKE responder has detected NAT in front of the local device. 2020-10-22 05:51:11 system info 00536 IKE 49.199.128.71 Phase 1: Responder starts AGGRESSIVE mode negotiations. 2020-10-22 05:49:39 system info 00536 IKE 124.188.81.221: XAuth login expired and was terminated for username support at 0.0.0.0/0.0.0.0. 2020-10-22 05:49:29 system info 00536 IKE 124.188.81.221: XAuth login was aborted for gateway vpnclient_gateway, username support, retry: 1. 2020-10-22 05:49:21 system info 00536 IKE 124.188.81.221: XAuth login was passed for gateway vpnclient_gateway, username support, retry: 0, Client IP Addr 192.168.2.10, IPPool name: vpnclient2, Session-Timeout: 0s, Idle-Timeout: 0s. 2020-10-22 05:49:21 system info 00536 IKE 124.188.81.221: XAuth login was refreshed for username support at 192.168.2.10/255.255.255.255. 2020-10-22 05:49:21 system info 00536 Rejected an IKE packet on ethernet0/9 from 124.188.81.221:1024 to XXX.XXX.XXX.XXX:4500 with cookies 114348567a1db766 and 9abe687288c836cc because A Phase 2 packet arrived while XAuth was still pending. 2020-10-22 05:49:21 system info 00536 IKE 124.188.81.221 Phase 1: Completed Aggressive mode negotiations with a 28800-second lifetime. 2020-10-22 05:49:21 system info 00536 IKE 124.188.81.221 Phase 1: Completed for user vpnclient_ph1id. 2020-10-22 05:49:21 system info 00536 IKE<124.188.81.221> Phase 1: IKE responder has detected NAT in front of the remote device. 2020-10-22 05:49:21 system info 00536 IKE<124.188.81.221> Phase 1: IKE responder has detected NAT in front of the local device. 2020-10-22 05:49:21 system info 00536 IKE 124.188.81.221 Phase 1: Responder starts AGGRESSIVE mode negotiations. 2020-10-22 05:49:11 system info 00536 Rejected an IKE packet on ethernet0/9 from 124.188.81.221:1024 to XXX.XXX.XXX.XXX:4500 with cookies 6f962cd78e9bb223 and 08fef7a5fa495653 because A Phase 2 packet arrived while XAuth was still pending. 2020-10-22 05:49:11 system info 00536 IKE 124.188.81.221 Phase 1: Completed Aggressive mode negotiations with a 28800-second lifetime. 2020-10-22 05:49:11 system info 00536 IKE 124.188.81.221 Phase 1: Completed for user vpnclient_ph1id. 2020-10-22 05:49:11 system info 00536 IKE<124.188.81.221> Phase 1: IKE responder has detected NAT in front of the remote device. 2020-10-22 05:49:11 system info 00536 IKE<124.188.81.221> Phase 1: IKE responder has detected NAT in front of the local device. 2020-10-22 05:49:11 system info 00536 IKE 124.188.81.221 Phase 1: Responder starts AGGRESSIVE mode negotiations. 2020-10-22 05:47:45 system info 00536 IKE 124.188.81.221: XAuth login was passed for gateway vpnclient_gateway, username support, retry: 0, Client IP Addr 192.168.2.10, IPPool name: vpnclient2, Session-Timeout: 0s, Idle-Timeout: 0s. 2020-10-22 05:47:45 system info 00536 IKE 124.188.81.221: XAuth login was refreshed for username support at 192.168.2.10/255.255.255.255. 2020-10-22 05:47:45 system info 00536 Rejected an IKE packet on ethernet0/9 from 124.188.81.221:1024 to XXX.XXX.XXX.XXX:4500 with cookies 00749091f6ff3fb9 and d840f8355fe597ae because A Phase 2 packet arrived while XAuth was still pending. 2020-10-22 05:47:45 system info 00536 IKE 124.188.81.221 Phase 1: Completed Aggressive mode negotiations with a 28800-second lifetime. 2020-10-22 05:47:45 system info 00536 IKE 124.188.81.221 Phase 1: Completed for user vpnclient_ph1id. 2020-10-22 05:47:45 system info 00536 IKE<124.188.81.221> Phase 1: IKE responder has detected NAT in front of the remote device. 2020-10-22 05:47:45 system info 00536 IKE<124.188.81.221> Phase 1: IKE responder has detected NAT in front of the local device. 2020-10-22 05:47:45 system info 00536 IKE 124.188.81.221 Phase 1: Responder starts AGGRESSIVE mode negotiations. 2020-10-22 05:47:40 system info 00536 IKE 124.188.81.221 Phase 1: Discarded a second initial packet, which arrived within 5 seconds after the first. 2020-10-22 05:47:37 system info 00536 IKE 122.105.232.53: XAuth login was passed for gateway vpnclient_gateway, username support, retry: 0, Client IP Addr 192.168.2.10, IPPool name: vpnclient2, Session-Timeout: 0s, Idle-Timeout: 0s. 2020-10-22 05:47:37 system info 00536 IKE 122.105.232.53: XAuth login was refreshed for username support at 192.168.2.10/255.255.255.255. 2020-10-22 05:47:37 system info 00536 Rejected an IKE packet on ethernet0/9 from 122.105.232.53:4500 to XXX.XXX.XXX.XXX:4500 with cookies 09fc1a8d67c85e7b and a1fd846e8c361472 because A Phase 2 packet arrived while XAuth was still pending. 2020-10-22 05:47:37 system info 00536 IKE 122.105.232.53 Phase 1: Completed Aggressive mode negotiations with a 28800-second lifetime. 2020-10-22 05:47:37 system info 00536 IKE 122.105.232.53 Phase 1: Completed for user vpnclient_ph1id. 2020-10-22 05:47:37 system info 00536 IKE<122.105.232.53> Phase 1: IKE responder has detected NAT in front of the remote device. 2020-10-22 05:47:37 system info 00536 IKE<122.105.232.53> Phase 1: IKE responder has detected NAT in front of the local device. 2020-10-22 05:47:37 system info 00536 IKE 122.105.232.53 Phase 1: Responder starts AGGRESSIVE mode negotiations. 2020-10-22 05:44:17 system info 00536 IKE 124.188.81.221: XAuth login was passed for gateway vpnclient_gateway, username support, retry: 0, Client IP Addr 192.168.2.10, IPPool name: vpnclient2, Session-Timeout: 0s, Idle-Timeout: 0s. 2020-10-22 05:44:17 system info 00536 IKE 124.188.81.221: XAuth login was refreshed for username support at 192.168.2.10/255.255.255.255. 2020-10-22 05:44:17 system info 00536 Rejected an IKE packet on ethernet0/9 from 124.188.81.221:4500 to XXX.XXX.XXX.XXX:4500 with cookies a50292cbf1affc47 and cde8aface69e58c9 because A Phase 2 packet arrived while XAuth was still pending. 2020-10-22 05:44:17 system info 00536 IKE 124.188.81.221 Phase 1: Completed Aggressive mode negotiations with a 28800-second lifetime. 2020-10-22 05:44:17 system info 00536 IKE 124.188.81.221 Phase 1: Completed for user vpnclient_ph1id. 2020-10-22 05:44:17 system info 00536 IKE<124.188.81.221> Phase 1: IKE responder has detected NAT in front of the remote device. 2020-10-22 05:44:17 system info 00536 IKE<124.188.81.221> Phase 1: IKE responder has detected NAT in front of the local device. 2020-10-22 05:44:17 system info 00536 IKE 124.188.81.221 Phase 1: Responder starts AGGRESSIVE mode negotiations. 2020-10-22 05:12:18 system info 00536 Rejected an IKE packet on ethernet0/9 from 216.218.206.74:52643 to XXX.XXX.XXX.XXX:4500 with cookies 3e35c70729dfedef and 0000000000000000 because an initial Phase 1 packet arrived from an unrecognized peer gateway. 2020-10-22 04:42:18 system info 00536 IKE 1.152.202.136 Phase 2 msg ID 3d7e260f: Completed negotiations with SPI edd860d3, tunnel ID 24, and lifetime 3600 seconds/0 KB. 2020-10-22 04:42:18 system info 00536 IKE 1.152.202.136 Phase 2 msg ID 341f466d: Completed negotiations with SPI edd860d2, tunnel ID 29, and lifetime 3600 seconds/0 KB. 2020-10-22 04:42:18 system info 00536 IKE 1.152.202.136 Phase 2 msg ID 3d7e260f: Responded to the peer's first message. 2020-10-22 04:42:18 system info 00536 IKE 1.152.202.136 Phase 2 msg ID 341f466d: Responded to the peer's first message. 2020-10-22 04:42:17 system info 00536 IKE 1.152.202.136: XAuth login was passed for gateway vpnclient_gateway, username support, retry: 0, Client IP Addr 192.168.2.10, IPPool name: vpnclient2, Session-Timeout: 0s, Idle-Timeout: 0s. 2020-10-22 04:42:17 system info 00536 IKE 1.152.202.136: XAuth login was refreshed for username support at 192.168.2.10/255.255.255.255. 2020-10-22 04:42:17 system info 00536 Rejected an IKE packet on ethernet0/9 from 1.152.202.136:4500 to XXX.XXX.XXX.XXX:4500 with cookies b6b705304e891974 and 20c44aa08f7817f1 because A Phase 2 packet arrived while XAuth was still pending. 2020-10-22 04:42:17 system info 00536 IKE 1.152.202.136 Phase 1: Completed Aggressive mode negotiations with a 28800-second lifetime. 2020-10-22 04:42:17 system info 00536 IKE 1.152.202.136 Phase 1: Completed for user vpnclient_ph1id. 2020-10-22 04:42:17 system info 00536 IKE<1.152.202.136> Phase 1: IKE responder has detected NAT in front of the remote device. 2020-10-22 04:42:17 system info 00536 IKE<1.152.202.136> Phase 1: IKE responder has detected NAT in front of the local device. 2020-10-22 04:42:17 system info 00536 IKE 1.152.202.136 Phase 1: Responder starts AGGRESSIVE mode negotiations. 2020-10-22 01:09:38 system info 00536 IKE 122.105.232.53: XAuth login was passed for gateway vpnclient_gateway, username support, retry: 0, Client IP Addr 192.168.2.10, IPPool name: vpnclient2, Session-Timeout: 0s, Idle-Timeout: 0s. 2020-10-22 01:09:38 system info 00536 Rejected an IKE packet on ethernet0/9 from 122.105.232.53:4500 to XXX.XXX.XXX.XXX:4500 with cookies 38e72d00a2526dd3 and c2ae3bed937129e5 because A Phase 2 packet arrived while XAuth was still pending. 2020-10-22 01:09:38 system info 00536 IKE 122.105.232.53 Phase 1: Completed Aggressive mode negotiations with a 28800-second lifetime. 2020-10-22 01:09:38 system info 00536 IKE 122.105.232.53 Phase 1: Completed for user vpnclient_ph1id. 2020-10-22 01:09:38 system info 00536 IKE<122.105.232.53> Phase 1: IKE responder has detected NAT in front of the remote device. 2020-10-22 01:09:38 system info 00536 IKE<122.105.232.53> Phase 1: IKE responder has detected NAT in front of the local device. 2020-10-22 01:09:38 system info 00536 IKE 122.105.232.53 Phase 1: Responder starts AGGRESSIVE mode negotiations. 2020-10-21 06:09:33 system info 00536 Rejected an IKE packet on ethernet0/9 from 216.218.206.94:46303 to XXX.XXX.XXX.XXX:500 with cookies 3e35c70729dfedef and 0000000000000000 because an initial Phase 1 packet arrived from an unrecognized peer gateway. 2020-10-20 03:30:24 system info 00536 Rejected an IKE packet on ethernet0/9 from 216.218.206.98:49972 to XXX.XXX.XXX.XXX:500 with cookies 3e35c70729dfedef and 0000000000000000 because an initial Phase 1 packet arrived from an unrecognized peer gateway. 2020-10-19 20:35:30 system info 00536 Rejected an IKE packet on ethernet0/9 from 183.134.104.146:38726 to XXX.XXX.XXX.XXX:4500 with cookies 92c299cbea94add9 and 0000000000000000 because an initial Phase 1 packet arrived from an unrecognized peer gateway. 2020-10-19 06:44:47 system info 00536 Rejected an IKE packet on ethernet0/9 from 216.218.206.114:57278 to XXX.XXX.XXX.XXX:500 with cookies 3e35c70729dfedef and 0000000000000000 because an initial Phase 1 packet arrived from an unrecognized peer gateway. 2020-10-18 07:08:02 system info 00536 Rejected an IKE packet on ethernet0/9 from 216.218.206.98:43632 to XXX.XXX.XXX.XXX:500 with cookies 3e35c70729dfedef and 0000000000000000 because an initial Phase 1 packet arrived from an unrecognized peer gateway. 2020-10-17 06:28:58 system info 00536 Rejected an IKE packet on ethernet0/9 from 216.218.206.66:40454 to XXX.XXX.XXX.XXX:500 with cookies 3e35c70729dfedef and 0000000000000000 because an initial Phase 1 packet arrived from an unrecognized peer gateway. 2020-10-16 12:03:57 system info 00536 IKE 1.152.199.119: XAuth login expired and was terminated for username support at 192.168.2.10/255.255.255.255. 2020-10-16 04:03:48 system info 00536 IKE 1.152.199.119 Phase 2 msg ID 3fd28d43: Completed negotiations with SPI edd860d1, tunnel ID 24, and lifetime 3600 seconds/0 KB. 2020-10-16 04:03:48 system info 00536 IKE 1.152.199.119 Phase 2 msg ID 034421eb: Completed negotiations with SPI edd860d0, tunnel ID 29, and lifetime 3600 seconds/0 KB. 2020-10-16 04:03:48 system info 00536 IKE 1.152.199.119 Phase 2 msg ID 3fd28d43: Responded to the peer's first message. 2020-10-16 04:03:48 system info 00536 IKE 1.152.199.119 Phase 2 msg ID 034421eb: Responded to the peer's first message. 2020-10-16 04:03:47 system info 00536 IKE 1.152.199.119: XAuth login was passed for gateway vpnclient_gateway, username support, retry: 0, Client IP Addr 192.168.2.10, IPPool name: vpnclient2, Session-Timeout: 0s, Idle-Timeout: 0s. 2020-10-16 04:03:47 system info 00536 IKE 1.152.199.119: XAuth login was refreshed for username support at 192.168.2.10/255.255.255.255. 2020-10-16 04:03:47 system info 00536 Rejected an IKE packet on ethernet0/9 from 1.152.199.119:4500 to XXX.XXX.XXX.XXX:4500 with cookies ddb9b07a9bd25315 and cbb55e5b01e2b641 because A Phase 2 packet arrived while XAuth was still pending. 2020-10-16 04:03:47 system info 00536 IKE 1.152.199.119 Phase 1: Completed Aggressive mode negotiations with a 28800-second lifetime. 2020-10-16 04:03:47 system info 00536 IKE 1.152.199.119 Phase 1: Completed for user vpnclient_ph1id. 2020-10-16 04:03:47 system info 00536 IKE<1.152.199.119> Phase 1: IKE responder has detected NAT in front of the remote device. 2020-10-16 04:03:47 system info 00536 IKE<1.152.199.119> Phase 1: IKE responder has detected NAT in front of the local device. 2020-10-16 04:03:47 system info 00536 IKE 1.152.199.119 Phase 1: Responder starts AGGRESSIVE mode negotiations. 2020-10-16 03:49:39 system info 00536 IKE 122.105.232.53: XAuth login was passed for gateway vpnclient_gateway, username support, retry: 0, Client IP Addr 192.168.2.10, IPPool name: vpnclient2, Session-Timeout: 0s, Idle-Timeout: 0s. 2020-10-16 03:49:39 system info 00536 IKE 122.105.232.53: XAuth login was refreshed for username support at 192.168.2.10/255.255.255.255. 2020-10-16 03:49:39 system info 00536 Rejected an IKE packet on ethernet0/9 from 122.105.232.53:1024 to XXX.XXX.XXX.XXX:4500 with cookies 592fcb84501bd083 and dbf1a606ef3fa647 because A Phase 2 packet arrived while XAuth was still pending. 2020-10-16 03:49:39 system info 00536 IKE 122.105.232.53 Phase 1: Completed Aggressive mode negotiations with a 28800-second lifetime. 2020-10-16 03:49:39 system info 00536 IKE 122.105.232.53 Phase 1: Completed for user vpnclient_ph1id. 2020-10-16 03:49:39 system info 00536 IKE<122.105.232.53> Phase 1: IKE responder has detected NAT in front of the remote device. 2020-10-16 03:49:39 system info 00536 IKE<122.105.232.53> Phase 1: IKE responder has detected NAT in front of the local device. 2020-10-16 03:49:39 system info 00536 IKE 122.105.232.53 Phase 1: Responder starts AGGRESSIVE mode negotiations. 2020-10-16 03:40:00 system info 00536 IKE 122.105.232.53: XAuth login was passed for gateway vpnclient_gateway, username support, retry: 0, Client IP Addr 192.168.2.10, IPPool name: vpnclient2, Session-Timeout: 0s, Idle-Timeout: 0s. 2020-10-16 03:40:00 system info 00536 Rejected an IKE packet on ethernet0/9 from 122.105.232.53:4500 to XXX.XXX.XXX.XXX:4500 with cookies 6a469fc1307e6950 and aaa3275b6234dc03 because A Phase 2 packet arrived while XAuth was still pending. 2020-10-16 03:40:00 system info 00536 IKE 122.105.232.53 Phase 1: Completed Aggressive mode negotiations with a 28800-second lifetime. 2020-10-16 03:40:00 system info 00536 IKE 122.105.232.53 Phase 1: Completed for user vpnclient_ph1id. 2020-10-16 03:40:00 system info 00536 IKE<122.105.232.53> Phase 1: IKE responder has detected NAT in front of the remote device. 2020-10-16 03:40:00 system info 00536 IKE<122.105.232.53> Phase 1: IKE responder has detected NAT in front of the local device. 2020-10-16 03:40:00 system info 00536 IKE 122.105.232.53 Phase 1: Responder starts AGGRESSIVE mode negotiations. 2020-10-16 03:39:01 system notif 00029 DNS has been refreshed. 2020-10-16 03:39:01 system notif 00767 Trial keys are available to download to enable advanced features. To find out, please visit http://www.juniper.net/products/subscription/trial/. 2020-10-16 03:38:14 system notif 00029 DNS has been refreshed. 2020-10-16 03:38:14 system info 00004 DNS entries have been refreshed by HA. 2020-10-16 03:38:07 system info 00551 Rapid Deployment cannot start because gateway has undergone configuration changes. 2020-10-16 03:38:07 system notif 00767 System was reset at 2010-11-23 23:47:32 by netscreen 2020-10-16 03:38:07 system notif 00767 System is operational. 2020-10-16 03:38:04 system notif 00533 VIP server 172.17.2.190 is now alive. 2020-10-16 03:37:59 system notif 00513 The physical state of interface ethernet0/9 has changed to Up. 2020-10-16 03:37:59 system notif 00513 The physical state of interface ethernet0/7 has changed to Up. 2020-10-16 03:37:59 system notif 00513 The physical state of interface ethernet0/4 has changed to Up. 2020-10-16 03:37:59 system notif 00513 The physical state of interface ethernet0/0 has changed to Up. 2020-10-16 03:37:56 system alert 00062 SCCP ALG enabled on the device. 2020-10-16 03:37:56 system alert 00062 SCCP ALG registered line break to tcp-proxy. ============================================================================= End of System Event Log =============================================================================