I think the below log snapshot should be enough, as it just keeps repeating the same information over and over:
Oct 25 08:05:24 THW-LNS-01 clear-log[13082]: logfile cleared
Oct 25 08:05:45.457872 load: AVP Header: type = message, length = 8, flags = M ~H
Oct 25 08:05:45.457900 load: AVP Header: type = protocolVersion, length = 8, flags = M ~H
Oct 25 08:05:45.457914 load: AVP Header: type = firmwareRevision, length = 8, flags = ~M ~H
Oct 25 08:05:45.457927 load: AVP Header: type = hostName, length = 10, flags = M ~H
Oct 25 08:05:45.457940 load: AVP Header: type = vendorName, length = 25, flags = ~M ~H
Oct 25 08:05:45.457953 load: AVP Header: type = receiveWindowSize, length = 8, flags = M ~H
Oct 25 08:05:45.457965 load: AVP Header: type = challenge, length = 22, flags = M ~H
Oct 25 08:05:45.457977 load: AVP Header: type = assignedTunnelId, length = 8, flags = M ~H
Oct 25 08:05:45.457992 load: AVP Header: type = message, length = 8, flags = M ~H
Oct 25 08:05:45.458004 load: AVP Header: type = protocolVersion, length = 8, flags = M ~H
Oct 25 08:05:45.458017 load: AVP Header: type = firmwareRevision, length = 8, flags = ~M ~H
Oct 25 08:05:45.458029 load: AVP Header: type = hostName, length = 10, flags = M ~H
Oct 25 08:05:45.458041 load: AVP Header: type = vendorName, length = 25, flags = ~M ~H
Oct 25 08:05:45.458053 load: AVP Header: type = receiveWindowSize, length = 8, flags = M ~H
Oct 25 08:05:45.458065 load: AVP Header: type = challenge, length = 22, flags = M ~H
Oct 25 08:05:45.458077 load: AVP Header: type = assignedTunnelId, length = 8, flags = M ~H
Oct 25 08:05:45.458089 load: AVP Header: type = framingCapabilities, length = 10, flags = M ~H
Oct 25 08:05:45.458102 load: AVP Header: type = bearerCapabilities, length = 10, flags = M ~H
Oct 25 08:05:45.458115 load: AVP Header: type = vendor (0x0009) type (0x006e), length = 6, flags = ~M ~H
Oct 25 08:05:45.458134 receive: Creating dynamic tunnel for incoming sccrq from 1 0x0 195.80.0.18 - attempt to start already existing tunnel
Oct 25 08:05:45.458164 allocateLocalTunnelId: got localTunnelId 13883
Oct 25 08:05:45.458293 updateIpTransport: Update IP transport config: local address = 195.80.0.17, remote address = 195.80.0.18
Oct 25 08:05:45.458312 updateActiveFpTunnels: Peer Resync Mechanism changed From: not configured, To: not configured
Oct 25 08:05:45.458329 checkpointMsOper: L2tpTunnel 0xce, LocalTunnelId 0x363b, Changing tunnel checkpointMsOper from c1(connecting) to c1(connecting)
Oct 25 08:05:45.458384 updateAdminState: L2tpTunnel 0xce, LocalTunnelId 0x363b, Changing tunnel effective adminState from disabled to enabled
Oct 25 08:05:45.458403 run: tunnel: state = closeDown, event = open, next state = openDown
Oct 25 08:05:45.458417 run: SM tunnel, L2tpTunnel 0xce, enter State closeDown, exit State openDown, current event open
Oct 25 08:05:45.458431 run: tunnelRecovery: state = closeDown, event = open, next state = openDown
Oct 25 08:05:45.458444 run: SM tunnelRecovery, L2tpTunnel 0xce, enter State closeDown, exit State openDown, current event open
Oct 25 08:05:45.458461 setIfOperStatus: L2tpTunnel 0xce, LocalTunnelId 0x363b, Changing tunnel ifOperStatus from LowerLayerDown to Down
Oct 25 08:05:45.458476 run: tunnel: state = openDown, event = upPassive, next state = idle
Oct 25 08:05:45.458489 run: SM tunnel, L2tpTunnel 0xce, enter State openDown, exit State idle, current event upPassive
Oct 25 08:05:45.458503 run: tunnelRecovery: state = openDown, event = up, next state = idle
Oct 25 08:05:45.458517 run: SM tunnelRecovery, L2tpTunnel 0xce, enter State openDown, exit State idle, current event up
Oct 25 08:05:45.458535 receive: received L2TP packet type sccrq, from remote address 195.80.0.18, remote port 1701, for local address 195.80.0.17, local port 1701, tunnel Id 0x0, session Id 0x0
Oct 25 08:05:45.458555 receive: Processing incoming in-sequence sccrq from 1 0x0 195.80.0.18 - controlHeader.Ns = 0, nextReceiveNs = 0
Oct 25 08:05:45.458569 load: AVP Header: type = message, length = 8, flags = M ~H
Oct 25 08:05:45.458583 load: AVP Header: type = protocolVersion, length = 8, flags = M ~H
Oct 25 08:05:45.458595 load: AVP Header: type = firmwareRevision, length = 8, flags = ~M ~H
Oct 25 08:05:45.458654 load: AVP Header: type = hostName, length = 10, flags = M ~H
Oct 25 08:05:45.458669 checkHostName: rxRemoteHostName 21CN, isHostProfileRequired() true, isConfigRemoteHostName() false
Oct 25 08:05:45.458686 setHostProfile: remoteHostName 21CN, multilink = 0
Oct 25 08:05:45.458701 updateIpTransport: Update IP transport config: local address = 195.80.0.17, remote address = 195.80.0.18
Oct 25 08:05:45.458715 updateActiveFpTunnels: Peer Resync Mechanism changed From: not configured, To: failover protocol fallback to silent failover
Oct 25 08:05:45.458729 load: AVP Header: type = protocolVersion, length = 8, flags = M ~H
Oct 25 08:05:45.458742 load: AVP Header: type = firmwareRevision, length = 8, flags = ~M ~H
Oct 25 08:05:45.458755 load: AVP Header: type = hostName, length = 10, flags = M ~H
Oct 25 08:05:45.458768 load: AVP Header: type = vendorName, length = 25, flags = ~M ~H
Oct 25 08:05:45.458781 load: AVP Header: type = receiveWindowSize, length = 8, flags = M ~H
Oct 25 08:05:45.458794 load: AVP Header: type = challenge, length = 22, flags = M ~H
Oct 25 08:05:45.458807 load: AVP Header: type = assignedTunnelId, length = 8, flags = M ~H
Oct 25 08:05:45.458821 load: AVP Header: type = framingCapabilities, length = 10, flags = M ~H
Oct 25 08:05:45.458834 load: AVP Header: type = bearerCapabilities, length = 10, flags = M ~H
Oct 25 08:05:45.458849 load: AVP Header: type = vendor (0x0009) type (0x006e), length = 6, flags = ~M ~H
Oct 25 08:05:45.458866 calculateChallengeResponse: secretString testing123, secretString len 10, challengeLength 16
Oct 25 08:05:45.458884 run: tunnel: state = idle, event = sccrq, next state = txSccrp
Oct 25 08:05:45.458898 run: SM tunnel, L2tpTunnel 0xce, enter State idle, exit State txSccrp, current event sccrq
Oct 25 08:05:45.458934 store: AVP Header: type = message, length = 8, flags = M ~H
Oct 25 08:05:45.458948 store: AVP Header: type = protocolVersion, length = 8, flags = M ~H
Oct 25 08:05:45.458969 store: AVP Header: type = hostName, length = 16, flags = M ~H
Oct 25 08:05:45.458982 store: AVP Header: type = framingCapabilities, length = 10, flags = M ~H
Oct 25 08:05:45.458995 store: AVP Header: type = assignedTunnelId, length = 8, flags = M ~H
Oct 25 08:05:45.459007 store: AVP Header: type = challenge, length = 25, flags = M ~H
Oct 25 08:05:45.459019 store: AVP Header: type = challengeResponse, length = 22, flags = M ~H
Oct 25 08:05:45.459032 store: AVP Header: type = firmwareRevision, length = 8, flags = ~M ~H
Oct 25 08:05:45.459044 store: AVP Header: type = vendorName, length = 27, flags = ~M ~H
Oct 25 08:05:45.459063 send: send L2TP packet type sccrp, for remote address 195.80.0.18, remote port 1701, from local address 195.80.0.17, local port 1701, L2tpTunnel 0xce, tunnel Id 53283, session Id 0, Ns 0, Nr 1, re-tries 0
Oct 25 08:05:45.459115 setMibState: L2tpTunnel 0xce, LocalTunnelId 0x363b, Changing tunnel mibState from idle to connecting
Oct 25 08:05:45.461381 receive: received L2TP packet type scccn, from remote address 195.80.0.18, remote port 1701, for local address 195.80.0.17, local port 1701, tunnel Id 0x13883, session Id 0x0
Oct 25 08:05:45.461410 run: tunnel: state = txSccrp, event = txComplete, next state = waitCtlConn
Oct 25 08:05:45.461427 run: SM tunnel, L2tpTunnel 0xce, enter State txSccrp, exit State waitCtlConn, current event txComplete
Oct 25 08:05:45.461446 receive: Processing incoming in-sequence scccn from 1 0x0 195.80.0.18 - controlHeader.Ns = 1, nextReceiveNs = 1
Oct 25 08:05:45.461460 load: AVP Header: type = message, length = 8, flags = M ~H
Oct 25 08:05:45.461474 load: AVP Header: type = challengeResponse, length = 22, flags = M ~H
Oct 25 08:05:45.461490 calculateChallengeResponse: secretString testing123, secretString len 10, challengeLength 19
Oct 25 08:05:45.461502 checkChallengeResponse, challenge.getLen() 19
Oct 25 08:05:45.461515 run: tunnel: state = waitCtlConn, event = scccn, next state = established
Oct 25 08:05:45.461528 run: SM tunnel, L2tpTunnel 0xce, enter State waitCtlConn, exit State established, current event scccn
Oct 25 08:05:45.461544 setIfOperStatus: L2tpTunnel 0xce, LocalTunnelId 0x363b, Changing tunnel ifOperStatus from Down to Up
Oct 25 08:05:45.461567 updateActiveFpTunnels: Peer Resync Mechanism changed From: failover protocol fallback to silent failover, To: silent failover
Oct 25 08:05:45.461655 checkpointMsOper: L2tpTunnel 0xce, LocalTunnelId 0x363b, Changing tunnel checkpointMsOper from c1(connecting) to c2(upTriggered)
Oct 25 08:05:45.461785 addModifySfTunnelInfo: returning err = 17
Oct 25 08:05:45.461805 addTunnelInfo: cannot addModifySfTunnelInfo gencfg err = 17 op = \x01
Oct 25 08:05:45.461873 addModifySfTunnelInfo: returning err = 0
Oct 25 08:05:45.461895 addTunnelInfo: error = 0 No error: 0 genCfgKey/index = 0x0/0x0 genCfgKey/index =0/0
Oct 25 08:05:45.461912 tunnelUp: skipping rtslib addTunnel for inline LNS destination.
Oct 25 08:05:45.461927 buildL2tpLongRoutePrefix: lac long route formulated prefixLen =136
Oct 25 08:05:45.461943 195.80.0.17.195.80.0.18.17.6.165.6.165.0.0.0.0
Oct 25 08:05:45.461976 getL2tpCtrlRouteParams: rttId = 0, localAddr = 195.80.0.17
Oct 25 08:05:45.462025 getL2tpCtrlRouteParams: successfully retrieved the IF route for rttId = 0, localAddr = 195.80.0.17, ifl-id = 0, nh-id = 593, rtm_nhifidx = 0, rt_flags = 0x10080, rtm_nhflags = 0x0
Oct 25 08:05:45.462044 addCtrlDiscardRoute: getL2tpCtrlRouteParams for rttId = 0, localAddr = 195.80.0.17, requested ifl-id = 0, requested nh-id = 593, paramsRet = 1
Oct 25 08:05:45.462119 addCtrlDiscardRoute: lac-ctrl route add succeeded for rttId = 0, localAddr = 195.80.0.17, remoteAddr = 195.80.0.18, requested ifl-id = 0, requested nh-id = 593, err = 0
Oct 25 08:05:45.462188 addCtrlDiscardRoute: lac-discard route add succeeded for rttId = 0, localAddr = 195.80.0.17, remoteAddr = 195.80.0.18
Oct 25 08:05:45.462211 addModifyL2tpCtrlDiscardRoute: L2tpTunnel 0xce, LocalTunnelId 0x363b, Add/Modify L2tp control discard route for peer to the ctrlDiscardRouteTable = rttId = 0 local Addr = 195.80.0.17 remoteAddr = 195.80.0.18
Oct 25 08:05:45.462227 checkpointMsOper: L2tpTunnel 0xce, LocalTunnelId 0x363b, Changing tunnel checkpointMsOper from c2(upTriggered) to c3(up)
Oct 25 08:05:45.462279 setMibState: L2tpTunnel 0xce, LocalTunnelId 0x363b, Changing tunnel mibState from connecting to established
Oct 25 08:05:45.462318 receive: received L2TP packet type icrq, from remote address 195.80.0.18, remote port 1701, for local address 195.80.0.17, local port 1701, tunnel Id 0x13883, session Id 0x0
Oct 25 08:05:45.462338 receive: Processing incoming in-sequence icrq from 1 0x0 195.80.0.18 - controlHeader.Ns = 2, nextReceiveNs = 2
Oct 25 08:05:45.462352 load: AVP Header: type = message, length = 8, flags = M ~H
Oct 25 08:05:45.462366 load: AVP Header: type = callSerialNumber, length = 10, flags = M ~H
Oct 25 08:05:45.462383 load: AVP Header: type = assignedSessionId, length = 8, flags = M ~H
Oct 25 08:05:45.462400 createResponderSession: sessionTable.size = 2, deadSessions.size = 2
Oct 25 08:05:45.462412 allocateLocalSessionId: got localSessionId 1045
Oct 25 08:05:45.462494 L2tpSession: connectSpeedUpdates 0 #687
Oct 25 08:05:45.462519 checkpointMsOper: L2tpSession 0xd0, LocalSessionId 0x415, L2tpTunnel 0xce, LocalTunnelId 0x363b, Changing session checkpointMsOper from c1(connecting) to c1(connecting)
Oct 25 08:05:45.462562 setSession: adding session id L2tpSession 0xd0, to sessionTable
Oct 25 08:05:45.462583 incrementSessionCount: Host Profile 21CN Session Count 1
Oct 25 08:05:45.462598 enableSession: inserted session in sessionLocalSidTable, session UID L2tpSession 0xd0, sid: 1045, size: 1
Oct 25 08:05:45.462612 setIfOperStatus: Changing ifOperStatus from LowerLayerDown to Down
Oct 25 08:05:45.462626 setIfOperStatus: L2tpSession 0xd0, LocalSessionId 0x415, L2tpTunnel 0xce, LocalTunnelId 0x363b, Changing session ifOperStatus from LowerLayerDown to Down
Oct 25 08:05:45.462643 run: lnsIncomingSession: state = closeDown, event = up, next state = closed
Oct 25 08:05:45.462656 run: SM lnsIncomingSession, L2tpSession 0xd0, enter State closeDown, exit State closed, current event up
Oct 25 08:05:45.462670 updateAdminState: Changing effective adminState from disabled to enabled
Oct 25 08:05:45.462692 updateAdminState: L2tpSession 0xd0, LocalSessionId 0x415, L2tpTunnel 0xce, LocalTunnelId 0x363b, Changing session effective adminState from disabled to enabled
Oct 25 08:05:45.462707 run: lnsIncomingSession: state = closed, event = open, next state = idle
Oct 25 08:05:45.462720 run: SM lnsIncomingSession, L2tpSession 0xd0, enter State closed, exit State idle, current event open
Oct 25 08:05:45.462738 load: AVP Header: type = callSerialNumber, length = 10, flags = M ~H
Oct 25 08:05:45.462752 load: AVP Header: type = assignedSessionId, length = 8, flags = M ~H
Oct 25 08:05:45.462766 load: AVP Header: type = bearerType, length = 10, flags = M ~H
Oct 25 08:05:45.462780 load: AVP Header: type = vendor (0x0009) type (0x0064), length = 17, flags = ~M ~H
Oct 25 08:05:45.462798 receiveIcrq: Error in incoming icrq from 1 0x0 195.80.0.18 - invalid non-mandatory AVP (131343)
Oct 25 08:05:45.462813 run: lnsIncomingSession: state = idle, event = icrq, next state = txIcrp
Oct 25 08:05:45.462826 run: SM lnsIncomingSession, L2tpSession 0xd0, enter State idle, exit State txIcrp, current event icrq
Oct 25 08:05:45.462843 store: AVP Header: type = message, length = 8, flags = M ~H
Oct 25 08:05:45.462856 store: AVP Header: type = assignedSessionId, length = 8, flags = M ~H
Oct 25 08:05:45.462874 send: send L2TP packet type icrp, for remote address 195.80.0.18, remote port 1701, from local address 195.80.0.17, local port 1701, L2tpTunnel 0xce, tunnel Id 53283, session Id 13904, Ns 1, Nr 3, re-tries 0
Oct 25 08:05:45.462916 setMibState: Changing mibState from idle to connecting
Oct 25 08:05:45.462935 setMibState: L2tpSession 0xd0, LocalSessionId 0x415, L2tpTunnel 0xce, LocalTunnelId 0x363b, Changing session mibState from idle to connecting
Oct 25 08:05:45.462949 run: lnsIncomingSession: state = txIcrp, event = txStarted, next state = waitConnected
Oct 25 08:05:45.462962 run: SM lnsIncomingSession, L2tpSession 0xd0, enter State txIcrp, exit State waitConnected, current event txStarted
Oct 25 08:05:45.464622 receive: received L2TP packet type iccn, from remote address 195.80.0.18, remote port 1701, for local address 195.80.0.17, local port 1701, tunnel Id 0x13883, session Id 0x1045
Oct 25 08:05:45.464648 receive: Processing incoming in-sequence iccn from 1 0x0 195.80.0.18 - controlHeader.Ns = 3, nextReceiveNs = 3
Oct 25 08:05:45.464663 load: AVP Header: type = message, length = 8, flags = M ~H
Oct 25 08:05:45.464678 load: AVP Header: type = connectSpeed, length = 10, flags = M ~H
Oct 25 08:05:45.464695 load: AVP Header: type = framingType, length = 10, flags = M ~H
Oct 25 08:05:45.464708 load: AVP Header: type = lastSentLcpConfReq, length = 16, flags = ~M ~H
Oct 25 08:05:45.464722 load: AVP Header: type = lastReceivedLcpConfReq, length = 12, flags = ~M ~H
Oct 25 08:05:45.464735 load: AVP Header: type = proxyAuthenId, length = 8, flags = ~M ~H
Oct 25 08:05:45.464749 load: AVP Header: type = proxyAuthenName, length = 26, flags = ~M ~H
Oct 25 08:05:45.464762 load: AVP Header: type = proxyAuthenResponse, length = 16, flags = ~M ~H
Oct 25 08:05:45.464775 load: AVP Header: type = proxyAuthenType, length = 8, flags = ~M ~H
Oct 25 08:05:45.464792 receiveIccn: Discarding proxy LCP data in incoming iccn from 1 0x0 195.80.0.18 - proxy LCP disabled
Oct 25 08:05:45.464806 run: lnsIncomingSession: state = waitConnected, event = iccn, next state = established
Oct 25 08:05:45.464821 run: SM lnsIncomingSession, L2tpSession 0xd0, enter State waitConnected, exit State established, current event iccn
Oct 25 08:05:45.464834 setIfOperStatus: Changing ifOperStatus from Down to Up
Oct 25 08:05:45.464848 setIfOperStatus: L2tpSession 0xd0, LocalSessionId 0x415, L2tpTunnel 0xce, LocalTunnelId 0x363b, Changing session ifOperStatus from Down to Up
Oct 25 08:05:45.464867 mirrorConnectSpeedUpdateEnabled: isConnectSpeedUpdates false
Oct 25 08:05:45.464882 checkpointMsOper: L2tpSession 0xd0, LocalSessionId 0x415, L2tpTunnel 0xce, LocalTunnelId 0x363b, Changing session checkpointMsOper from c1(connecting) to c2(upTriggered)
Oct 25 08:05:45.464939 getLnsDynamicProfileName: found tunnel group dyn profile dyn-lns-profile
Oct 25 08:05:45.464956 sessionUp Setting the dynamic Profile dyn-lns-profile
Oct 25 08:05:45.464968 sessionDbCreateClientLns: entered
Oct 25 08:05:45.464981 getNextServiceInterface: Returned interface: si-1/2/0 totalRequests: 208
Oct 25 08:05:45.464994 getPoolNextUpServiceInterface: Selected service interface: si-1/2/0 from pool: lns
Oct 25 08:05:45.465038 sessionDbCreateClientLns: setAttribute CallingStationId not set for IFL Index P0 SessionID 1045
Oct 25 08:05:45.465061 liblic_subs_limit_valid 682 total subs:0 state:0x0 limit valid
Oct 25 08:05:45.465150 state:0 to index:2
Oct 25 08:05:45.465164 sdb_summary_counter_increment: sdb counter for index:2 changed to:1
Oct 25 08:05:45.465174 sdb_summary_counter_increment: sdb counter for index:8 changed to:1
Oct 25 08:05:45.465184 sdb_create_extended_client_session 10525: incremented counter for state:0 for sid:208
Oct 25 08:05:45.465194 client type:0 to index:17
Oct 25 08:05:45.465204 sdb_summary_counter_increment: sdb counter for index:17 changed to:1
Oct 25 08:05:45.465213 sdb_summary_counter_increment: sdb counter for index:26 changed to:1
Oct 25 08:05:45.465223 sdb_summary_counter_increment: sdb counter for index:0 changed to:1
Oct 25 08:05:45.465232 sdb_create_extended_client_session 10550: incremented total counter for sid:208
Oct 25 08:05:45.465242 sdb_summary_counter_increment: sdb counter for index:1 changed to:1
Oct 25 08:05:45.465251 sdb_create_extended_client_session 10565: incremented counter for legacy for session id 208
Oct 25 08:05:45.465274 sessionDbCreateClientLns: Session create returned success for IFL index 0 SessionID 1045 session entry ID is 208
Oct 25 08:05:45.465303 sessionDbCreateClientLns: pppAccessProfile l2tp-group-profile tunnel.getOperLocalAddress 195.80.0.17 tunnel.getLocalTunnelId 13883 session.getLocalSessionId 1045 tunnel.getRemoteAddress 195.80.0.18 tunnel.getRemoteTunnelId() 53283 session.getRemoteSessionId 13904 tunnel group ID 1 tunnelRttId 0 riName set is default aaaAccessProfileName set is none
Oct 25 08:05:45.465329 instantiateDynamicProfile: profileName = dyn-lns-profile: config bits = 0x3 0 0 0 0 0
Oct 25 08:05:45.465361 instantiateDynamicProfile: profileName = dyn-lns-profile: instantiation failed result = 107, errno = 1
Oct 25 08:05:45.465377 sessionUp: profile Activate failed sessionId L2tpSession 0xd0
Oct 25 08:05:45.465393 deleteSession: Unable to delete session while in use
Oct 25 08:05:45.465406 sessionUp deleteSession Failed. Error = session in use sessionId = L2tpSession 0xd0
Oct 25 08:05:45.465568 state:0 to index:2
Oct 25 08:05:45.465585 sdb_summary_counter_decrement: sdb counter for index:2 changed from:1
Oct 25 08:05:45.465595 sdb_summary_counter_decrement: sdb counter for index:8 changed from:1
Oct 25 08:05:45.465605 sdb_remove_bundled_client_session: decremented counter for client sid:208 for state:0
Oct 25 08:05:45.465615 client type:0 to index:17
Oct 25 08:05:45.465625 sdb_summary_counter_decrement: sdb counter for index:17 changed from:1
Oct 25 08:05:45.465634 sdb_summary_counter_decrement: sdb counter for index:26 changed from:1
Oct 25 08:05:45.465644 sdb_summary_counter_decrement: sdb counter for index:0 changed from:1
Oct 25 08:05:45.465654 sdb_remove_bundled_client_session: decremented total summary counter for sid:208
Oct 25 08:05:45.465663 sdb_summary_counter_decrement: sdb counter for index:1 changed from:1
Oct 25 08:05:45.465673 sdb_remove_bundled_client_session: decremented legacy summ count for client:208
Oct 25 08:05:45.465702 sessionUp Removed SDB entry. sdbId = 208
Oct 25 08:05:45.465717 sessionUp: l2tpProgramPic = 1: sessionType = 2: addSession status = dynamic Profile Instantion failed
Oct 25 08:05:45.465731 setMibState: Changing mibState from connecting to established
Oct 25 08:05:45.465747 setMibState: L2tpSession 0xd0, LocalSessionId 0x415, L2tpTunnel 0xce, LocalTunnelId 0x363b, Changing session mibState from connecting to established
Oct 25 08:05:45.465760 run: lnsIncomingSession: state = established, event = terminate, next state = txCdnOpen
Oct 25 08:05:45.465779 run: SM lnsIncomingSession, L2tpSession 0xd0, enter State established, exit State txCdnOpen, current event terminate
Oct 25 08:05:45.465799 store: AVP Header: type = message, length = 8, flags = M ~H
Oct 25 08:05:45.465812 store: AVP Header: type = assignedSessionId, length = 8, flags = M ~H
Oct 25 08:05:45.465825 store: AVP Header: type = resultCode, length = 10, flags = M ~H
Oct 25 08:05:45.465844 send: send L2TP packet type cdn, for remote address 195.80.0.18, remote port 1701, from local address 195.80.0.17, local port 1701, L2tpTunnel 0xce, tunnel Id 53283, session Id 13904, Ns 2, Nr 4, re-tries 0
Oct 25 08:05:45.465894 recordSessionDownTime: sdbId 208, session end time 585885.514698
Oct 25 08:05:45.465911 setIfOperStatus: Changing ifOperStatus from Up to Down
Oct 25 08:05:45.465926 setIfOperStatus: L2tpSession 0xd0, LocalSessionId 0x415, L2tpTunnel 0xce, LocalTunnelId 0x363b, Changing session ifOperStatus from Up to Down
Oct 25 08:05:45.465943 checkpointMsOper: L2tpSession 0xd0, LocalSessionId 0x415, L2tpTunnel 0xce, LocalTunnelId 0x363b, Changing session checkpointMsOper from c2(upTriggered) to c4(downTriggered)
Oct 25 08:05:45.465996 deInstantiateDynamicProfile: sdbId = 208: L2tpSession 0xd0: profileName = dyn-lns-profile: config bits = 0xe238807f 0x2 0 0 0 0
Oct 25 08:05:45.466029 deInstantiateDynamicProfile: sdbId = 208: L2tpSession 0xd0: profileName = dyn-lns-profile: instantion failed result = 107, errno = 1
Oct 25 08:05:45.466045 sessionDown: dynamic profile desinstantiation failed for sdbId = 208IflInfo is NULL
Oct 25 08:05:45.466059 sessionDown: l2tpProgramPic = 1 deleteSession returned status = normal, successful completion
Oct 25 08:05:45.466074 checkpointMsOper: L2tpSession 0xd0, LocalSessionId 0x415, L2tpTunnel 0xce, LocalTunnelId 0x363b, Changing session checkpointMsOper from c4(downTriggered) to c5(down)
Oct 25 08:05:45.466116 setMibState: Changing mibState from established to disconnecting
Oct 25 08:05:45.466135 setMibState: L2tpSession 0xd0, LocalSessionId 0x415, L2tpTunnel 0xce, LocalTunnelId 0x363b, Changing session mibState from established to disconnecting
Oct 25 08:05:45.466149 run: lnsIncomingSession: state = txCdnOpen, event = terminate, next state = txCdnOpen
Oct 25 08:05:45.466162 run: SM lnsIncomingSession, L2tpSession 0xd0, enter State txCdnOpen, exit State txCdnOpen, current event terminate
Oct 25 08:05:45.466175 run: lnsIncomingSession: state = txCdnOpen, event = reset, next state = txCdnOpen
Oct 25 08:05:45.466189 run: SM lnsIncomingSession, L2tpSession 0xd0, enter State txCdnOpen, exit State txCdnOpen, current event reset
Oct 25 08:05:45.468958 receive: received L2TP packet type zlb, from remote address 195.80.0.18, remote port 1701, for local address 195.80.0.17, local port 1701, tunnel Id 0x13883, session Id 0x0
Oct 25 08:05:45.468980 run: lnsIncomingSession: state = txCdnOpen, event = txComplete, next state = resetIdle
Oct 25 08:05:45.468995 run: SM lnsIncomingSession, L2tpSession 0xd0, enter State txCdnOpen, exit State resetIdle, current event txComplete
Oct 25 08:05:45.469009 run: lnsIncomingSession: state = resetIdle, event = reset, next state = idle
Oct 25 08:05:45.469022 run: SM lnsIncomingSession, L2tpSession 0xd0, enter State resetIdle, exit State idle, current event reset
Oct 25 08:05:45.469037 disableSession : erased session from sessionLocalSidTable, session L2tpSession 0xd0, size: 0
Oct 25 08:05:45.469051 decrementSessionCount: Host Profile 21CN Session Count 0
Oct 25 08:05:45.469064 setMibState: Changing mibState from disconnecting to idle
Oct 25 08:05:45.469078 setMibState: L2tpSession 0xd0, LocalSessionId 0x415, L2tpTunnel 0xce, LocalTunnelId 0x363b, Changing session mibState from disconnecting to idle
Oct 25 08:05:45.469091 run: lnsIncomingSession: state = idle, event = dying, next state = dying
Oct 25 08:05:45.469104 run: SM lnsIncomingSession, L2tpSession 0xd0, enter State idle, exit State dying, current event dying
Oct 25 08:05:45.469120 checkpointMsOper: L2tpSession 0xd0, LocalSessionId 0x415, L2tpTunnel 0xce, LocalTunnelId 0x363b, Changing session checkpointMsOper from c5(down) to c6(dying)
Oct 25 08:05:45.469174 run: lnsIncomingSession: state = dying, event = dead, next state = dead
Oct 25 08:05:45.469193 run: SM lnsIncomingSession, L2tpSession 0xd0, enter State dying, exit State dead, current event dead
Oct 25 08:05:45.469206 dead: starting destruct timer
Oct 25 08:06:00.466370 receive: received L2TP packet type stopCcn, from remote address 195.80.0.18, remote port 1701, for local address 195.80.0.17, local port 1701, tunnel Id 0x13883, session Id 0x0
Oct 25 08:06:00.466408 receive: Processing incoming in-sequence stopCcn from 1 0x0 195.80.0.18 - controlHeader.Ns = 4, nextReceiveNs = 4
Oct 25 08:06:00.466425 load: AVP Header: type = message, length = 8, flags = M ~H
Oct 25 08:06:00.466440 load: AVP Header: type = resultCode, length = 10, flags = M ~H
Oct 25 08:06:00.466454 load: AVP Header: type = assignedTunnelId, length = 8, flags = M ~H
Oct 25 08:06:00.466470 receiveStopCcn: Received stopCcn from 1 0x0 195.80.0.18 - result code = clearChannel
Oct 25 08:06:00.466487 run: tunnel: state = established, event = stopCcn, next state = disconnecting
Oct 25 08:06:00.466502 run: SM tunnel, L2tpTunnel 0xce, enter State established, exit State disconnecting, current event stopCcn
Oct 25 08:06:00.466519 run: tunnelRecovery: state = idle, event = terminate, next state = idle
Oct 25 08:06:00.466532 run: SM tunnelRecovery, L2tpTunnel 0xce, enter State idle, exit State idle, current event terminate
Oct 25 08:06:00.466547 setIfOperStatus: L2tpTunnel 0xce, LocalTunnelId 0x363b, Changing tunnel ifOperStatus from Up to Down
Oct 25 08:06:00.466566 checkpointMsOper: L2tpTunnel 0xce, LocalTunnelId 0x363b, Changing tunnel checkpointMsOper from c3(up) to c4(downTriggered)
Oct 25 08:06:00.466652 tunnelDown: skipping rtslib deleteTunnel for inline LNS destination.
Oct 25 08:06:00.466673 buildL2tpLongRoutePrefix: lac long route formulated prefixLen =136
Oct 25 08:06:00.466693 195.80.0.17.195.80.0.18.17.6.165.6.165.0.0.0.0
Oct 25 08:06:00.466770 deleteCtrlDiscardRoute: lac-ctrl route delete succeeded for rttId = 0, localAddr = 195.80.0.17, remoteAddr = 0x195.80.0.18, err = 0
Oct 25 08:06:00.466826 deleteCtrlDiscardRoute: lac-discard route delete succeeded for rttId = 0, localAddr = 195.80.0.17, remoteAddr = 195.80.0.18, err = 0
Oct 25 08:06:00.466846 checkpointMsOper: L2tpTunnel 0xce, LocalTunnelId 0x363b, Changing tunnel checkpointMsOper from c4(downTriggered) to c5(down)
Oct 25 08:06:00.466955 addModifySfTunnelInfo: returning err = 0
Oct 25 08:06:00.466981 deleteTunnelInfo: error = 0 No error: 0 genCfgKey/index = 0x0/0x0 genCfgKey/index =0/0
Oct 25 08:06:00.466998 setMibState: L2tpTunnel 0xce, LocalTunnelId 0x363b, Changing tunnel mibState from established to disconnecting
Oct 25 08:06:00.467014 removePrivateData: sdb_remove_app_defined_data for sdb table type tunnel, rx remote host name, uid L2tpTunnel 0xce
Oct 25 08:06:00.467068 removePrivateData: getSdbTableType failed, uidL2tpTunnel 0xce #16435
Oct 25 08:06:00.467088 removePrivateData: sdb_remove_app_defined_data for sdb table type tunnel, rx remote vendor name, uid L2tpTunnel 0xce
Oct 25 08:06:00.467133 removePrivateData: getSdbTableType failed, uidL2tpTunnel 0xce #16435
Oct 25 08:06:00.467194 sendZLB: send L2TP packet type zlb, for remote address 195.80.0.18, remote port 1701, from local address 195.80.0.17, local port 1701, L2tpTunnel 0xce, tunnel Id 53283, session Id 0, Ns 3, Nr 5
Oct 25 08:06:31.512530 run: tunnel: state = disconnecting, event = controlChannelDrained, next state = idle
Oct 25 08:06:31.512582 run: SM tunnel, L2tpTunnel 0xce, enter State disconnecting, exit State idle, current event controlChannelDrained
Oct 25 08:06:31.512610 checkpointMsOper: L2tpTunnel 0xce, LocalTunnelId 0x363b, Changing tunnel checkpointMsOper from c5(down) to c6(dying)
Oct 25 08:06:31.512700 setMibState: L2tpTunnel 0xce, LocalTunnelId 0x363b, Changing tunnel mibState from disconnecting to idle
Oct 25 08:06:31.512720 run: tunnel: state = idle, event = dying, next state = dying
Oct 25 08:06:31.512744 run: SM tunnel, L2tpTunnel 0xce, enter State idle, exit State dying, current event dying
Oct 25 08:07:37.637927 load: AVP Header: type = message, length = 8, flags = M ~H
Oct 25 08:07:37.637959 load: AVP Header: type = protocolVersion, length = 8, flags = M ~H
Oct 25 08:07:37.637973 load: AVP Header: type = firmwareRevision, length = 8, flags = ~M ~H
Oct 25 08:07:37.637986 load: AVP Header: type = hostName, length = 10, flags = M ~H
Oct 25 08:07:37.637999 load: AVP Header: type = vendorName, length = 25, flags = ~M ~H
Oct 25 08:07:37.638012 load: AVP Header: type = receiveWindowSize, length = 8, flags = M ~H
Oct 25 08:07:37.638025 load: AVP Header: type = challenge, length = 22, flags = M ~H
Oct 25 08:07:37.638037 load: AVP Header: type = assignedTunnelId, length = 8, flags = M ~H
Oct 25 08:07:37.638052 load: AVP Header: type = message, length = 8, flags = M ~H
Oct 25 08:07:37.638064 load: AVP Header: type = protocolVersion, length = 8, flags = M ~H
Oct 25 08:07:37.638077 load: AVP Header: type = firmwareRevision, length = 8, flags = ~M ~H
Oct 25 08:07:37.638089 load: AVP Header: type = hostName, length = 10, flags = M ~H
Oct 25 08:07:37.638102 load: AVP Header: type = vendorName, length = 25, flags = ~M ~H
Oct 25 08:07:37.638114 load: AVP Header: type = receiveWindowSize, length = 8, flags = M ~H
Oct 25 08:07:37.638126 load: AVP Header: type = challenge, length = 22, flags = M ~H
Oct 25 08:07:37.638139 load: AVP Header: type = assignedTunnelId, length = 8, flags = M ~H
Oct 25 08:07:37.638151 load: AVP Header: type = framingCapabilities, length = 10, flags = M ~H
Oct 25 08:07:37.638163 load: AVP Header: type = bearerCapabilities, length = 10, flags = M ~H
Oct 25 08:07:37.638177 load: AVP Header: type = vendor (0x0009) type (0x006e), length = 6, flags = ~M ~H
Oct 25 08:07:37.638196 receive: Creating dynamic tunnel for incoming sccrq from 1 0x0 195.80.0.18 - attempt to start already existing tunnel