Netgate SG-1000 microFirewall

Author Topic: Mobile ipsec VPN traffic stops after 15 min 2.4.1  (Read 48 times)

0 Members and 1 Guest are viewing this topic.

Offline kapara

  • Hero Member
  • *****
  • Posts: 934
  • Karma: +15/-0
    • View Profile
Mobile ipsec VPN traffic stops after 15 min 2.4.1
« on: December 05, 2017, 01:07:37 pm »
Having an issue with Mobile ipsec vpn IKEv2 with Windows 10 PC's.  VPN connects but after about 15 min connection stays up but no traffic able to pass and I have to disconnect and reconnect VPN client to get data to pass again.  I have checked the config against another unit which is working fine running 2.3.2.  Problem unit is running 2.4.1

Just upgraded to 2.4.2 hoping it will resolve the issue.

Code: [Select]
Dec 5 10:44:58 charon 08[IKE] <41236> no shared key found for 50.196.xxx.xxx - 204.8.xxx.xxx
Dec 5 10:44:58 charon 08[IKE] <41236> queueing INFORMATIONAL task
Dec 5 10:44:58 charon 08[IKE] <41236> activating new tasks
Dec 5 10:44:58 charon 08[IKE] <41236> activating INFORMATIONAL task
Dec 5 10:44:58 charon 08[ENC] <41236> generating INFORMATIONAL_V1 request 801045126 [ N(INVAL_KE) ]
Dec 5 10:44:58 charon 08[NET] <41236> sending packet: from 50.196.xxx.xxx[500] to 204.8.xxx.xxx[500] (56 bytes)
Dec 5 10:44:58 charon 08[IKE] <41236> IKE_SA (unnamed)[41236] state change: CONNECTING => DESTROYING
Dec 5 10:45:57 charon 11[NET] <41237> received packet: from 204.8.xxx.xxx[500] to 50.196.xxx.xxx[500] (128 bytes)
Dec 5 10:45:57 charon 11[ENC] <41237> parsed ID_PROT request 0 [ SA V ]
Dec 5 10:45:57 charon 11[CFG] <41237> looking for an ike config for 50.196.xxx.xxx...204.8.xxx.xxx
Dec 5 10:45:57 charon 11[CFG] <41237> candidate: %any...%any, prio 24
Dec 5 10:45:57 charon 11[CFG] <41237> found matching ike config: %any...%any with prio 24
Dec 5 10:45:57 charon 11[ENC] <41237> received unknown vendor ID: f4:ed:19:e0:c1:14:eb:51:6f:aa:ac:0e:e3:7d:af:28:07:b4:38:1f:00:00:00:01:00:00:13:8d:5a:26:e9:65:00:00:00:00:18:20:00:00
Dec 5 10:45:57 charon 11[IKE] <41237> 204.8.xxx.xxx is initiating a Main Mode IKE_SA
Dec 5 10:45:57 charon 11[IKE] <41237> IKE_SA (unnamed)[41237] state change: CREATED => CONNECTING
Dec 5 10:45:57 charon 11[CFG] <41237> selecting proposal:
Dec 5 10:45:57 charon 11[CFG] <41237> no acceptable ENCRYPTION_ALGORITHM found
Dec 5 10:45:57 charon 11[CFG] <41237> selecting proposal:
Dec 5 10:45:57 charon 11[CFG] <41237> proposal matches
Dec 5 10:45:57 charon 11[CFG] <41237> received proposals: IKE:3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024
Dec 5 10:45:57 charon 11[CFG] <41237> configured proposals: IKE:AES_CBC_128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/CURVE_25519, IKE:AES_CBC_128/AES_CBC_192/AES_CBC_256/CAMELLIA_CBC_128/CAMELLIA_CBC_192/CAMELLIA_CBC_256/3DES_CBC/HMAC_SHA2_256_128/HMAC_SHA2_384_192/HMAC_SHA2_512_256/HMAC_MD5_96/HMAC_SHA1_96/AES_XCBC_96/AES_CMAC_96/PRF_HMAC_SHA2_256/PRF_HMAC_SHA2_384/PRF_HMAC_SHA2_512/PRF_AES128_XCBC/PRF_AES128_CMAC/PRF_HMAC_MD5/PRF_HMAC_SHA1/ECP_256/ECP_384/ECP_521/ECP_256_BP/ECP_384_BP/ECP_512_BP/CURVE_25519/MODP_3072/MODP_4096/MODP_8192/MODP_2048/MODP_1024, IKE:AES_GCM_16_128/AES_GCM_16_192/AES_GCM_16_256/AES_GCM_12_128/AES_GCM_12_192/AES_GCM_12_256/AES_GCM_8_128/AES_GCM_8_192/AES_GCM_8_256/PRF_HMAC_SHA2_256/PRF_HMAC_SHA2_384/PRF_HMAC_SHA2_512/PRF_AES128_XCBC/PRF_AES128_CMAC/PRF_HMAC_MD5/PRF_HMAC_SHA1/ECP_256/ECP_384/ECP_521/ECP_256_BP/ECP_384_BP/ECP_512_BP/CURVE_25519/MODP_3072/MODP_4096/MODP_8192/MODP_2048/MODP_1024
Dec 5 10:45:57 charon 11[CFG] <41237> selected proposal: IKE:3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024
Dec 5 10:45:57 charon 11[IKE] <41237> sending XAuth vendor ID
Dec 5 10:45:57 charon 11[IKE] <41237> sending DPD vendor ID
Dec 5 10:45:57 charon 11[ENC] <41237> generating ID_PROT response 0 [ SA V V ]
Dec 5 10:45:57 charon 11[NET] <41237> sending packet: from 50.196.xxx.xxx[500] to 204.8.xxx.xxx[500] (116 bytes)
Dec 5 10:45:58 charon 01[NET] <41237> received packet: from 204.8.xxx.xxx[500] to 50.196.xxx.xxx[500] (184 bytes)
Dec 5 10:45:58 charon 01[ENC] <41237> parsed ID_PROT request 0 [ KE No ]
Dec 5 10:45:58 charon 01[CFG] <41237> candidate "bypasslan", match: 1/1/24 (me/other/ike)
Dec 5 10:45:58 charon 01[IKE] <41237> no shared key found for 50.196.xxx.xxx - 204.8.xxx.xxx
Dec 5 10:45:58 charon 01[IKE] <41237> queueing INFORMATIONAL task
Dec 5 10:45:58 charon 01[IKE] <41237> activating new tasks
Dec 5 10:45:58 charon 01[IKE] <41237> activating INFORMATIONAL task
Dec 5 10:45:58 charon 01[ENC] <41237> generating INFORMATIONAL_V1 request 1419433026 [ N(INVAL_KE) ]
Dec 5 10:45:58 charon 01[NET] <41237> sending packet: from 50.196.xxx.xxx[500] to 204.8.xxx.xxx[500] (56 bytes)
Dec 5 10:45:58 charon 01[IKE] <41237> IKE_SA (unnamed)[41237] state change: CONNECTING => DESTROYING
Dec 5 10:46:57 charon 01[NET] <41238> received packet: from 204.8.xxx.xxx[500] to 50.196.xxx.xxx[500] (128 bytes)
Dec 5 10:46:57 charon 01[ENC] <41238> parsed ID_PROT request 0 [ SA V ]
Dec 5 10:46:57 charon 01[CFG] <41238> looking for an ike config for 50.196.xxx.xxx...204.8.xxx.xxx
Dec 5 10:46:57 charon 01[CFG] <41238> candidate: %any...%any, prio 24
Dec 5 10:46:57 charon 01[CFG] <41238> found matching ike config: %any...%any with prio 24
Dec 5 10:46:57 charon 01[ENC] <41238> received unknown vendor ID: f4:ed:19:e0:c1:14:eb:51:6f:aa:ac:0e:e3:7d:af:28:07:b4:38:1f:00:00:00:01:00:00:13:8d:5a:26:e9:a1:00:00:00:00:18:20:00:00
Dec 5 10:46:57 charon 01[IKE] <41238> 204.8.xxx.xxx is initiating a Main Mode IKE_SA
Dec 5 10:46:57 charon 01[IKE] <41238> IKE_SA (unnamed)[41238] state change: CREATED => CONNECTING
Dec 5 10:46:57 charon 01[CFG] <41238> selecting proposal:
Dec 5 10:46:57 charon 01[CFG] <41238> no acceptable ENCRYPTION_ALGORITHM found
Dec 5 10:46:57 charon 01[CFG] <41238> selecting proposal:
Dec 5 10:46:57 charon 01[CFG] <41238> proposal matches
Dec 5 10:46:57 charon 01[CFG] <41238> received proposals: IKE:3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024
Dec 5 10:46:57 charon 01[CFG] <41238> configured proposals: IKE:AES_CBC_128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/CURVE_25519, IKE:AES_CBC_128/AES_CBC_192/AES_CBC_256/CAMELLIA_CBC_128/CAMELLIA_CBC_192/CAMELLIA_CBC_256/3DES_CBC/HMAC_SHA2_256_128/HMAC_SHA2_384_192/HMAC_SHA2_512_256/HMAC_MD5_96/HMAC_SHA1_96/AES_XCBC_96/AES_CMAC_96/PRF_HMAC_SHA2_256/PRF_HMAC_SHA2_384/PRF_HMAC_SHA2_512/PRF_AES128_XCBC/PRF_AES128_CMAC/PRF_HMAC_MD5/PRF_HMAC_SHA1/ECP_256/ECP_384/ECP_521/ECP_256_BP/ECP_384_BP/ECP_512_BP/CURVE_25519/MODP_3072/MODP_4096/MODP_8192/MODP_2048/MODP_1024, IKE:AES_GCM_16_128/AES_GCM_16_192/AES_GCM_16_256/AES_GCM_12_128/AES_GCM_12_192/AES_GCM_12_256/AES_GCM_8_128/AES_GCM_8_192/AES_GCM_8_256/PRF_HMAC_SHA2_256/PRF_HMAC_SHA2_384/PRF_HMAC_SHA2_512/PRF_AES128_XCBC/PRF_AES128_CMAC/PRF_HMAC_MD5/PRF_HMAC_SHA1/ECP_256/ECP_384/ECP_521/ECP_256_BP/ECP_384_BP/ECP_512_BP/CURVE_25519/MODP_3072/MODP_4096/MODP_8192/MODP_2048/MODP_1024
Dec 5 10:46:57 charon 01[CFG] <41238> selected proposal: IKE:3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024
Dec 5 10:46:57 charon 01[IKE] <41238> sending XAuth vendor ID
Dec 5 10:46:57 charon 01[IKE] <41238> sending DPD vendor ID
Dec 5 10:46:57 charon 01[ENC] <41238> generating ID_PROT response 0 [ SA V V ]
Dec 5 10:46:57 charon 01[NET] <41238> sending packet: from 50.196.xxx.xxx[500] to 204.8.xxx.xxx[500] (116 bytes)
Dec 5 10:46:58 charon 01[NET] <41238> received packet: from 204.8.xxx.xxx[500] to 50.196.xxx.xxx[500] (184 bytes)
Dec 5 10:46:58 charon 01[ENC] <41238> parsed ID_PROT request 0 [ KE No ]
Dec 5 10:46:58 charon 01[CFG] <41238> candidate "bypasslan", match: 1/1/24 (me/other/ike)
Dec 5 10:46:58 charon 01[IKE] <41238> no shared key found for 50.196.xxx.xxx - 204.8.xxx.xxx
Dec 5 10:46:58 charon 01[IKE] <41238> queueing INFORMATIONAL task
Dec 5 10:46:58 charon 01[IKE] <41238> activating new tasks
Dec 5 10:46:58 charon 01[IKE] <41238> activating INFORMATIONAL task
Dec 5 10:46:58 charon 01[ENC] <41238> generating INFORMATIONAL_V1 request 35916766 [ N(INVAL_KE) ]
Dec 5 10:46:58 charon 01[NET] <41238> sending packet: from 50.196.xxx.xxx[500] to 204.8.xxx.xxx[500] (56 bytes)
Dec 5 10:46:58 charon 01[IKE] <41238> IKE_SA (unnamed)[41238] state change: CONNECTING => DESTROYING
Dec 5 10:47:57 charon 07[NET] <41239> received packet: from 204.8.xxx.xxx[500] to 50.196.xxx.xxx[500] (128 bytes)
Dec 5 10:47:57 charon 07[ENC] <41239> parsed ID_PROT request 0 [ SA V ]
Dec 5 10:47:57 charon 07[CFG] <41239> looking for an ike config for 50.196.xxx.xxx...204.8.xxx.xxx
Dec 5 10:47:57 charon 07[CFG] <41239> candidate: %any...%any, prio 24
Dec 5 10:47:57 charon 07[CFG] <41239> found matching ike config: %any...%any with prio 24
Dec 5 10:47:57 charon 07[ENC] <41239> received unknown vendor ID: f4:ed:19:e0:c1:14:eb:51:6f:aa:ac:0e:e3:7d:af:28:07:b4:38:1f:00:00:00:01:00:00:13:8d:5a:26:e9:dd:00:00:00:00:18:20:00:00
Dec 5 10:47:57 charon 07[IKE] <41239> 204.8.xxx.xxx is initiating a Main Mode IKE_SA
Dec 5 10:47:57 charon 07[IKE] <41239> IKE_SA (unnamed)[41239] state change: CREATED => CONNECTING
Dec 5 10:47:57 charon 07[CFG] <41239> selecting proposal:
Dec 5 10:47:57 charon 07[CFG] <41239> no acceptable ENCRYPTION_ALGORITHM found
Dec 5 10:47:57 charon 07[CFG] <41239> selecting proposal:
Dec 5 10:47:57 charon 07[CFG] <41239> proposal matches
Dec 5 10:47:57 charon 07[CFG] <41239> received proposals: IKE:3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024
Dec 5 10:47:57 charon 07[CFG] <41239> configured proposals: IKE:AES_CBC_128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/CURVE_25519, IKE:AES_CBC_128/AES_CBC_192/AES_CBC_256/CAMELLIA_CBC_128/CAMELLIA_CBC_192/CAMELLIA_CBC_256/3DES_CBC/HMAC_SHA2_256_128/HMAC_SHA2_384_192/HMAC_SHA2_512_256/HMAC_MD5_96/HMAC_SHA1_96/AES_XCBC_96/AES_CMAC_96/PRF_HMAC_SHA2_256/PRF_HMAC_SHA2_384/PRF_HMAC_SHA2_512/PRF_AES128_XCBC/PRF_AES128_CMAC/PRF_HMAC_MD5/PRF_HMAC_SHA1/ECP_256/ECP_384/ECP_521/ECP_256_BP/ECP_384_BP/ECP_512_BP/CURVE_25519/MODP_3072/MODP_4096/MODP_8192/MODP_2048/MODP_1024, IKE:AES_GCM_16_128/AES_GCM_16_192/AES_GCM_16_256/AES_GCM_12_128/AES_GCM_12_192/AES_GCM_12_256/AES_GCM_8_128/AES_GCM_8_192/AES_GCM_8_256/PRF_HMAC_SHA2_256/PRF_HMAC_SHA2_384/PRF_HMAC_SHA2_512/PRF_AES128_XCBC/PRF_AES128_CMAC/PRF_HMAC_MD5/PRF_HMAC_SHA1/ECP_256/ECP_384/ECP_521/ECP_256_BP/ECP_384_BP/ECP_512_BP/CURVE_25519/MODP_3072/MODP_4096/MODP_8192/MODP_2048/MODP_1024
Dec 5 10:47:57 charon 07[CFG] <41239> selected proposal: IKE:3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024
Dec 5 10:47:57 charon 07[IKE] <41239> sending XAuth vendor ID
Dec 5 10:47:57 charon 07[IKE] <41239> sending DPD vendor ID
Dec 5 10:47:57 charon 07[ENC] <41239> generating ID_PROT response 0 [ SA V V ]
Dec 5 10:47:57 charon 07[NET] <41239> sending packet: from 50.196.xxx.xxx[500] to 204.8.xxx.xxx[500] (116 bytes)
Dec 5 10:47:58 charon 14[NET] <41239> received packet: from 204.8.xxx.xxx[500] to 50.196.xxx.xxx[500] (184 bytes)
Dec 5 10:47:58 charon 14[ENC] <41239> parsed ID_PROT request 0 [ KE No ]
Dec 5 10:47:58 charon 14[CFG] <41239> candidate "bypasslan", match: 1/1/24 (me/other/ike)
Dec 5 10:47:58 charon 14[IKE] <41239> no shared key found for 50.196.xxx.xxx - 204.8.xxx.xxx
Dec 5 10:47:58 charon 14[IKE] <41239> queueing INFORMATIONAL task
Dec 5 10:47:58 charon 14[IKE] <41239> activating new tasks
Dec 5 10:47:58 charon 14[IKE] <41239> activating INFORMATIONAL task
Dec 5 10:47:58 charon 14[ENC] <41239> generating INFORMATIONAL_V1 request 2055981543 [ N(INVAL_KE) ]
Dec 5 10:47:58 charon 14[NET] <41239> sending packet: from 50.196.xxx.xxx[500] to 204.8.xxx.xxx[500] (56 bytes)
Dec 5 10:47:58 charon 14[IKE] <41239> IKE_SA (unnamed)[41239] state change: CONNECTING => DESTROYING
Dec 5 10:48:57 charon 14[NET] <41240> received packet: from 204.8.xxx.xxx[500] to 50.196.xxx.xxx[500] (128 bytes)
Dec 5 10:48:57 charon 14[ENC] <41240> parsed ID_PROT request 0 [ SA V ]
Dec 5 10:48:57 charon 14[CFG] <41240> looking for an ike config for 50.196.xxx.xxx...204.8.xxx.xxx
Dec 5 10:48:57 charon 14[CFG] <41240> candidate: %any...%any, prio 24
Dec 5 10:48:57 charon 14[CFG] <41240> found matching ike config: %any...%any with prio 24
Dec 5 10:48:57 charon 14[ENC] <41240> received unknown vendor ID: f4:ed:19:e0:c1:14:eb:51:6f:aa:ac:0e:e3:7d:af:28:07:b4:38:1f:00:00:00:01:00:00:13:8d:5a:26:ea:19:00:00:00:00:18:20:00:00
Dec 5 10:48:57 charon 14[IKE] <41240> 204.8.xxx.xxx is initiating a Main Mode IKE_SA
Dec 5 10:48:57 charon 14[IKE] <41240> IKE_SA (unnamed)[41240] state change: CREATED => CONNECTING
Dec 5 10:48:57 charon 14[CFG] <41240> selecting proposal:
Dec 5 10:48:57 charon 14[CFG] <41240> no acceptable ENCRYPTION_ALGORITHM found
Dec 5 10:48:57 charon 14[CFG] <41240> selecting proposal:
Dec 5 10:48:57 charon 14[CFG] <41240> proposal matches
Dec 5 10:48:57 charon 14[CFG] <41240> received proposals: IKE:3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024
Dec 5 10:48:57 charon 14[CFG] <41240> configured proposals: IKE:AES_CBC_128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/CURVE_25519, IKE:AES_CBC_128/AES_CBC_192/AES_CBC_256/CAMELLIA_CBC_128/CAMELLIA_CBC_192/CAMELLIA_CBC_256/3DES_CBC/HMAC_SHA2_256_128/HMAC_SHA2_384_192/HMAC_SHA2_512_256/HMAC_MD5_96/HMAC_SHA1_96/AES_XCBC_96/AES_CMAC_96/PRF_HMAC_SHA2_256/PRF_HMAC_SHA2_384/PRF_HMAC_SHA2_512/PRF_AES128_XCBC/PRF_AES128_CMAC/PRF_HMAC_MD5/PRF_HMAC_SHA1/ECP_256/ECP_384/ECP_521/ECP_256_BP/ECP_384_BP/ECP_512_BP/CURVE_25519/MODP_3072/MODP_4096/MODP_8192/MODP_2048/MODP_1024, IKE:AES_GCM_16_128/AES_GCM_16_192/AES_GCM_16_256/AES_GCM_12_128/AES_GCM_12_192/AES_GCM_12_256/AES_GCM_8_128/AES_GCM_8_192/AES_GCM_8_256/PRF_HMAC_SHA2_256/PRF_HMAC_SHA2_384/PRF_HMAC_SHA2_512/PRF_AES128_XCBC/PRF_AES128_CMAC/PRF_HMAC_MD5/PRF_HMAC_SHA1/ECP_256/ECP_384/ECP_521/ECP_256_BP/ECP_384_BP/ECP_512_BP/CURVE_25519/MODP_3072/MODP_4096/MODP_8192/MODP_2048/MODP_1024
Dec 5 10:48:57 charon 14[CFG] <41240> selected proposal: IKE:3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024
Dec 5 10:48:57 charon 14[IKE] <41240> sending XAuth vendor ID
Dec 5 10:48:57 charon 14[IKE] <41240> sending DPD vendor ID
Dec 5 10:48:57 charon 14[ENC] <41240> generating ID_PROT response 0 [ SA V V ]
Dec 5 10:48:57 charon 14[NET] <41240> sending packet: from 50.196.xxx.xxx[500] to 204.8.xxx.xxx[500] (116 bytes)
Dec 5 10:48:58 charon 15[NET] <41240> received packet: from 204.8.xxx.xxx[500] to 50.196.xxx.xxx[500] (184 bytes)
Dec 5 10:48:58 charon 15[ENC] <41240> parsed ID_PROT request 0 [ KE No ]
Dec 5 10:48:58 charon 15[CFG] <41240> candidate "bypasslan", match: 1/1/24 (me/other/ike)
Dec 5 10:48:58 charon 15[IKE] <41240> no shared key found for 50.196.xxx.xxx - 204.8.xxx.xxx
Dec 5 10:48:58 charon 15[IKE] <41240> queueing INFORMATIONAL task
Dec 5 10:48:58 charon 15[IKE] <41240> activating new tasks
Dec 5 10:48:58 charon 15[IKE] <41240> activating INFORMATIONAL task
Dec 5 10:48:58 charon 15[ENC] <41240> generating INFORMATIONAL_V1 request 3386256376 [ N(INVAL_KE) ]
Dec 5 10:48:58 charon 15[NET] <41240> sending packet: from 50.196.xxx.xxx[500] to 204.8.xxx.xxx[500] (56 bytes)
Dec 5 10:48:58 charon 15[IKE] <41240> IKE_SA (unnamed)[41240] state change: CONNECTING => DESTROYING
Dec 5 10:49:57 charon 06[NET] <41241> received packet: from 204.8.xxx.xxx[500] to 50.196.xxx.xxx[500] (128 bytes)
Dec 5 10:49:57 charon 06[ENC] <41241> parsed ID_PROT request 0 [ SA V ]
Dec 5 10:49:57 charon 06[CFG] <41241> looking for an ike config for 50.196.xxx.xxx...204.8.xxx.xxx
Dec 5 10:49:57 charon 06[CFG] <41241> candidate: %any...%any, prio 24
Dec 5 10:49:57 charon 06[CFG] <41241> found matching ike config: %any...%any with prio 24
Dec 5 10:49:57 charon 06[ENC] <41241> received unknown vendor ID: f4:ed:19:e0:c1:14:eb:51:6f:aa:ac:0e:e3:7d:af:28:07:b4:38:1f:00:00:00:01:00:00:13:8d:5a:26:ea:55:00:00:00:00:18:20:00:00
Dec 5 10:49:57 charon 06[IKE] <41241> 204.8.xxx.xxx is initiating a Main Mode IKE_SA
Dec 5 10:49:57 charon 06[IKE] <41241> IKE_SA (unnamed)[41241] state change: CREATED => CONNECTING
Dec 5 10:49:57 charon 06[CFG] <41241> selecting proposal:
Dec 5 10:49:57 charon 06[CFG] <41241> no acceptable ENCRYPTION_ALGORITHM found
Dec 5 10:49:57 charon 06[CFG] <41241> selecting proposal:
Dec 5 10:49:57 charon 06[CFG] <41241> proposal matches
Dec 5 10:49:57 charon 06[CFG] <41241> received proposals: IKE:3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024
Dec 5 10:49:57 charon 06[CFG] <41241> configured proposals: IKE:AES_CBC_128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/CURVE_25519, IKE:AES_CBC_128/AES_CBC_192/AES_CBC_256/CAMELLIA_CBC_128/CAMELLIA_CBC_192/CAMELLIA_CBC_256/3DES_CBC/HMAC_SHA2_256_128/HMAC_SHA2_384_192/HMAC_SHA2_512_256/HMAC_MD5_96/HMAC_SHA1_96/AES_XCBC_96/AES_CMAC_96/PRF_HMAC_SHA2_256/PRF_HMAC_SHA2_384/PRF_HMAC_SHA2_512/PRF_AES128_XCBC/PRF_AES128_CMAC/PRF_HMAC_MD5/PRF_HMAC_SHA1/ECP_256/ECP_384/ECP_521/ECP_256_BP/ECP_384_BP/ECP_512_BP/CURVE_25519/MODP_3072/MODP_4096/MODP_8192/MODP_2048/MODP_1024, IKE:AES_GCM_16_128/AES_GCM_16_192/AES_GCM_16_256/AES_GCM_12_128/AES_GCM_12_192/AES_GCM_12_256/AES_GCM_8_128/AES_GCM_8_192/AES_GCM_8_256/PRF_HMAC_SHA2_256/PRF_HMAC_SHA2_384/PRF_HMAC_SHA2_512/PRF_AES128_XCBC/PRF_AES128_CMAC/PRF_HMAC_MD5/PRF_HMAC_SHA1/ECP_256/ECP_384/ECP_521/ECP_256_BP/ECP_384_BP/ECP_512_BP/CURVE_25519/MODP_3072/MODP_4096/MODP_8192/MODP_2048/MODP_1024
Dec 5 10:49:57 charon 06[CFG] <41241> selected proposal: IKE:3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024
Dec 5 10:49:57 charon 06[IKE] <41241> sending XAuth vendor ID
Dec 5 10:49:57 charon 06[IKE] <41241> sending DPD vendor ID
Dec 5 10:49:57 charon 06[ENC] <41241> generating ID_PROT response 0 [ SA V V ]
Dec 5 10:49:57 charon 06[NET] <41241> sending packet: from 50.196.xxx.xxx[500] to 204.8.xxx.xxx[500] (116 bytes)
Dec 5 10:49:58 charon 06[NET] <41241> received packet: from 204.8.xxx.xxx[500] to 50.196.xxx.xxx[500] (184 bytes)
Dec 5 10:49:58 charon 06[ENC] <41241> parsed ID_PROT request 0 [ KE No ]
Dec 5 10:49:58 charon 06[CFG] <41241> candidate "bypasslan", match: 1/1/24 (me/other/ike)
Dec 5 10:49:58 charon 06[IKE] <41241> no shared key found for 50.196.xxx.xxx - 204.8.xxx.xxx
Dec 5 10:49:58 charon 06[IKE] <41241> queueing INFORMATIONAL task
Dec 5 10:49:58 charon 06[IKE] <41241> activating new tasks
Dec 5 10:49:58 charon 06[IKE] <41241> activating INFORMATIONAL task
Dec 5 10:49:58 charon 06[ENC] <41241> generating INFORMATIONAL_V1 request 3777671848 [ N(INVAL_KE) ]
Dec 5 10:49:58 charon 06[NET] <41241> sending packet: from 50.196.xxx.xxx[500] to 204.8.xxx.xxx[500] (56 bytes)
Dec 5 10:49:58 charon 06[IKE] <41241> IKE_SA (unnamed)[41241] state change: CONNECTING => DESTROYING
Dec 5 10:50:57 charon 05[NET] <41242> received packet: from 204.8.xxx.xxx[500] to 50.196.xxx.xxx[500] (128 bytes)
Dec 5 10:50:57 charon 05[ENC] <41242> parsed ID_PROT request 0 [ SA V ]
Dec 5 10:50:57 charon 05[CFG] <41242> looking for an ike config for 50.196.xxx.xxx...204.8.xxx.xxx
Dec 5 10:50:57 charon 05[CFG] <41242> candidate: %any...%any, prio 24
Dec 5 10:50:57 charon 05[CFG] <41242> found matching ike config: %any...%any with prio 24
Dec 5 10:50:57 charon 05[ENC] <41242> received unknown vendor ID: f4:ed:19:e0:c1:14:eb:51:6f:aa:ac:0e:e3:7d:af:28:07:b4:38:1f:00:00:00:01:00:00:13:8d:5a:26:ea:91:00:00:00:00:18:20:00:00
Dec 5 10:50:57 charon 05[IKE] <41242> 204.8.xxx.xxx is initiating a Main Mode IKE_SA
Dec 5 10:50:57 charon 05[IKE] <41242> IKE_SA (unnamed)[41242] state change: CREATED => CONNECTING
Dec 5 10:50:57 charon 05[CFG] <41242> selecting proposal:
Dec 5 10:50:57 charon 05[CFG] <41242> no acceptable ENCRYPTION_ALGORITHM found
Dec 5 10:50:57 charon 05[CFG] <41242> selecting proposal:
Dec 5 10:50:57 charon 05[CFG] <41242> proposal matches
Dec 5 10:50:57 charon 05[CFG] <41242> received proposals: IKE:3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024
Dec 5 10:50:57 charon 05[CFG] <41242> configured proposals: IKE:AES_CBC_128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/CURVE_25519, IKE:AES_CBC_128/AES_CBC_192/AES_CBC_256/CAMELLIA_CBC_128/CAMELLIA_CBC_192/CAMELLIA_CBC_256/3DES_CBC/HMAC_SHA2_256_128/HMAC_SHA2_384_192/HMAC_SHA2_512_256/HMAC_MD5_96/HMAC_SHA1_96/AES_XCBC_96/AES_CMAC_96/PRF_HMAC_SHA2_256/PRF_HMAC_SHA2_384/PRF_HMAC_SHA2_512/PRF_AES128_XCBC/PRF_AES128_CMAC/PRF_HMAC_MD5/PRF_HMAC_SHA1/ECP_256/ECP_384/ECP_521/ECP_256_BP/ECP_384_BP/ECP_512_BP/CURVE_25519/MODP_3072/MODP_4096/MODP_8192/MODP_2048/MODP_1024, IKE:AES_GCM_16_128/AES_GCM_16_192/AES_GCM_16_256/AES_GCM_12_128/AES_GCM_12_192/AES_GCM_12_256/AES_GCM_8_128/AES_GCM_8_192/AES_GCM_8_256/PRF_HMAC_SHA2_256/PRF_HMAC_SHA2_384/PRF_HMAC_SHA2_512/PRF_AES128_XCBC/PRF_AES128_CMAC/PRF_HMAC_MD5/PRF_HMAC_SHA1/ECP_256/ECP_384/ECP_521/ECP_256_BP/ECP_384_BP/ECP_512_BP/CURVE_25519/MODP_3072/MODP_4096/MODP_8192/MODP_2048/MODP_1024
Dec 5 10:50:57 charon 05[CFG] <41242> selected proposal: IKE:3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024
Dec 5 10:50:57 charon 05[IKE] <41242> sending XAuth vendor ID
Dec 5 10:50:57 charon 05[IKE] <41242> sending DPD vendor ID
Dec 5 10:50:57 charon 05[ENC] <41242> generating ID_PROT response 0 [ SA V V ]
Dec 5 10:50:57 charon 05[NET] <41242> sending packet: from 50.196.xxx.xxx[500] to 204.8.xxx.xxx[500] (116 bytes)
Dec 5 10:50:58 charon 05[NET] <41242> received packet: from 204.8.xxx.xxx[500] to 50.196.xxx.xxx[500] (184 bytes)
Dec 5 10:50:58 charon 05[ENC] <41242> parsed ID_PROT request 0 [ KE No ]
Dec 5 10:50:58 charon 05[CFG] <41242> candidate "bypasslan", match: 1/1/24 (me/other/ike)
Dec 5 10:50:58 charon 05[IKE] <41242> no shared key found for 50.196.xxx.xxx - 204.8.xxx.xxx
Dec 5 10:50:58 charon 05[IKE] <41242> queueing INFORMATIONAL task
Dec 5 10:50:58 charon 05[IKE] <41242> activating new tasks
Dec 5 10:50:58 charon 05[IKE] <41242> activating INFORMATIONAL task
Dec 5 10:50:58 charon 05[ENC] <41242> generating INFORMATIONAL_V1 request 2321872894 [ N(INVAL_KE) ]
Dec 5 10:50:58 charon 05[NET] <41242> sending packet: from 50.196.xxx.xxx[500] to 204.8.xxx.xxx[500] (56 bytes)
Dec 5 10:50:58 charon 05[IKE] <41242> IKE_SA (unnamed)[41242] state change: CONNECTING => DESTROYING
Dec 5 10:51:57 charon 13[NET] <41243> received packet: from 204.8.xxx.xxx[500] to 50.196.xxx.xxx[500] (128 bytes)
Dec 5 10:51:57 charon 13[ENC] <41243> parsed ID_PROT request 0 [ SA V ]
Dec 5 10:51:57 charon 13[CFG] <41243> looking for an ike config for 50.196.xxx.xxx...204.8.xxx.xxx
Dec 5 10:51:57 charon 13[CFG] <41243> candidate: %any...%any, prio 24
Dec 5 10:51:57 charon 13[CFG] <41243> found matching ike config: %any...%any with prio 24
Dec 5 10:51:57 charon 13[ENC] <41243> received unknown vendor ID: f4:ed:19:e0:c1:14:eb:51:6f:aa:ac:0e:e3:7d:af:28:07:b4:38:1f:00:00:00:01:00:00:13:8d:5a:26:ea:cd:00:00:00:00:18:20:00:00
Dec 5 10:51:57 charon 13[IKE] <41243> 204.8.xxx.xxx is initiating a Main Mode IKE_SA
Dec 5 10:51:57 charon 13[IKE] <41243> IKE_SA (unnamed)[41243] state change: CREATED => CONNECTING
Dec 5 10:51:57 charon 13[CFG] <41243> selecting proposal:
Dec 5 10:51:57 charon 13[CFG] <41243> no acceptable ENCRYPTION_ALGORITHM found
Dec 5 10:51:57 charon 13[CFG] <41243> selecting proposal:
Dec 5 10:51:57 charon 13[CFG] <41243> proposal matches
Dec 5 10:51:57 charon 13[CFG] <41243> received proposals: IKE:3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024
Dec 5 10:51:57 charon 13[CFG] <41243> configured proposals: IKE:AES_CBC_128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/CURVE_25519, IKE:AES_CBC_128/AES_CBC_192/AES_CBC_256/CAMELLIA_CBC_128/CAMELLIA_CBC_192/CAMELLIA_CBC_256/3DES_CBC/HMAC_SHA2_256_128/HMAC_SHA2_384_192/HMAC_SHA2_512_256/HMAC_MD5_96/HMAC_SHA1_96/AES_XCBC_96/AES_CMAC_96/PRF_HMAC_SHA2_256/PRF_HMAC_SHA2_384/PRF_HMAC_SHA2_512/PRF_AES128_XCBC/PRF_AES128_CMAC/PRF_HMAC_MD5/PRF_HMAC_SHA1/ECP_256/ECP_384/ECP_521/ECP_256_BP/ECP_384_BP/ECP_512_BP/CURVE_25519/MODP_3072/MODP_4096/MODP_8192/MODP_2048/MODP_1024, IKE:AES_GCM_16_128/AES_GCM_16_192/AES_GCM_16_256/AES_GCM_12_128/AES_GCM_12_192/AES_GCM_12_256/AES_GCM_8_128/AES_GCM_8_192/AES_GCM_8_256/PRF_HMAC_SHA2_256/PRF_HMAC_SHA2_384/PRF_HMAC_SHA2_512/PRF_AES128_XCBC/PRF_AES128_CMAC/PRF_HMAC_MD5/PRF_HMAC_SHA1/ECP_256/ECP_384/ECP_521/ECP_256_BP/ECP_384_BP/ECP_512_BP/CURVE_25519/MODP_3072/MODP_4096/MODP_8192/MODP_2048/MODP_1024
Dec 5 10:51:57 charon 13[CFG] <41243> selected proposal: IKE:3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024
Dec 5 10:51:57 charon 13[IKE] <41243> sending XAuth vendor ID
Dec 5 10:51:57 charon 13[IKE] <41243> sending DPD vendor ID
Dec 5 10:51:57 charon 13[ENC] <41243> generating ID_PROT response 0 [ SA V V ]
Dec 5 10:51:57 charon 13[NET] <41243> sending packet: from 50.196.xxx.xxx[500] to 204.8.xxx.xxx[500] (116 bytes)
Dec 5 10:51:58 charon 13[NET] <41243> received packet: from 204.8.xxx.xxx[500] to 50.196.xxx.xxx[500] (184 bytes)
Dec 5 10:51:58 charon 13[ENC] <41243> parsed ID_PROT request 0 [ KE No ]
Dec 5 10:51:58 charon 13[CFG] <41243> candidate "bypasslan", match: 1/1/24 (me/other/ike)
Dec 5 10:51:58 charon 13[IKE] <41243> no shared key found for 50.196.xxx.xxx - 204.8.xxx.xxx
Dec 5 10:51:58 charon 13[IKE] <41243> queueing INFORMATIONAL task
Dec 5 10:51:58 charon 13[IKE] <41243> activating new tasks
Dec 5 10:51:58 charon 13[IKE] <41243> activating INFORMATIONAL task
Dec 5 10:51:58 charon 13[ENC] <41243> generating INFORMATIONAL_V1 request 2058809334 [ N(INVAL_KE) ]
Dec 5 10:51:58 charon 13[NET] <41243> sending packet: from 50.196.xxx.xxx[500] to 204.8.xxx.xxx[500] (56 bytes)
Dec 5 10:51:58 charon 13[IKE] <41243> IKE_SA (unnamed)[41243] state change: CONNECTING => DESTROYING
Dec 5 10:52:57 charon 10[NET] <41244> received packet: from 204.8.xxx.xxx[500] to 50.196.xxx.xxx[500] (128 bytes)
Dec 5 10:52:57 charon 10[ENC] <41244> parsed ID_PROT request 0 [ SA V ]
Dec 5 10:52:57 charon 10[CFG] <41244> looking for an ike config for 50.196.xxx.xxx...204.8.xxx.xxx
Dec 5 10:52:57 charon 10[CFG] <41244> candidate: %any...%any, prio 24
Dec 5 10:52:57 charon 10[CFG] <41244> found matching ike config: %any...%any with prio 24
Dec 5 10:52:57 charon 10[ENC] <41244> received unknown vendor ID: f4:ed:19:e0:c1:14:eb:51:6f:aa:ac:0e:e3:7d:af:28:07:b4:38:1f:00:00:00:01:00:00:13:8d:5a:26:eb:09:00:00:00:00:18:20:00:00
Dec 5 10:52:57 charon 10[IKE] <41244> 204.8.xxx.xxx is initiating a Main Mode IKE_SA
Dec 5 10:52:57 charon 10[IKE] <41244> IKE_SA (unnamed)[41244] state change: CREATED => CONNECTING
Dec 5 10:52:57 charon 10[CFG] <41244> selecting proposal:
Dec 5 10:52:57 charon 10[CFG] <41244> no acceptable ENCRYPTION_ALGORITHM found
Dec 5 10:52:57 charon 10[CFG] <41244> selecting proposal:
Dec 5 10:52:57 charon 10[CFG] <41244> proposal matches
Dec 5 10:52:57 charon 10[CFG] <41244> received proposals: IKE:3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024
Dec 5 10:52:57 charon 10[CFG] <41244> configured proposals: IKE:AES_CBC_128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/CURVE_25519, IKE:AES_CBC_128/AES_CBC_192/AES_CBC_256/CAMELLIA_CBC_128/CAMELLIA_CBC_192/CAMELLIA_CBC_256/3DES_CBC/HMAC_SHA2_256_128/HMAC_SHA2_384_192/HMAC_SHA2_512_256/HMAC_MD5_96/HMAC_SHA1_96/AES_XCBC_96/AES_CMAC_96/PRF_HMAC_SHA2_256/PRF_HMAC_SHA2_384/PRF_HMAC_SHA2_512/PRF_AES128_XCBC/PRF_AES128_CMAC/PRF_HMAC_MD5/PRF_HMAC_SHA1/ECP_256/ECP_384/ECP_521/ECP_256_BP/ECP_384_BP/ECP_512_BP/CURVE_25519/MODP_3072/MODP_4096/MODP_8192/MODP_2048/MODP_1024, IKE:AES_GCM_16_128/AES_GCM_16_192/AES_GCM_16_256/AES_GCM_12_128/AES_GCM_12_192/AES_GCM_12_256/AES_GCM_8_128/AES_GCM_8_192/AES_GCM_8_256/PRF_HMAC_SHA2_256/PRF_HMAC_SHA2_384/PRF_HMAC_SHA2_512/PRF_AES128_XCBC/PRF_AES128_CMAC/PRF_HMAC_MD5/PRF_HMAC_SHA1/ECP_256/ECP_384/ECP_521/ECP_256_BP/ECP_384_BP/ECP_512_BP/CURVE_25519/MODP_3072/MODP_4096/MODP_8192/MODP_2048/MODP_1024
Dec 5 10:52:57 charon 10[CFG] <41244> selected proposal: IKE:3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024
Dec 5 10:52:57 charon 10[IKE] <41244> sending XAuth vendor ID
Dec 5 10:52:57 charon 10[IKE] <41244> sending DPD vendor ID
Dec 5 10:52:57 charon 10[ENC] <41244> generating ID_PROT response 0 [ SA V V ]
Dec 5 10:52:57 charon 10[NET] <41244> sending packet: from 50.196.xxx.xxx[500] to 204.8.xxx.xxx[500] (116 bytes)
Dec 5 10:52:58 charon 10[NET] <41244> received packet: from 204.8.xxx.xxx[500] to 50.196.xxx.xxx[500] (184 bytes)
Dec 5 10:52:58 charon 10[ENC] <41244> parsed ID_PROT request 0 [ KE No ]
Dec 5 10:52:58 charon 10[CFG] <41244> candidate "bypasslan", match: 1/1/24 (me/other/ike)
Dec 5 10:52:58 charon 10[IKE] <41244> no shared key found for 50.196.xxx.xxx - 204.8.xxx.xxx
Dec 5 10:52:58 charon 10[IKE] <41244> queueing INFORMATIONAL task
Dec 5 10:52:58 charon 10[IKE] <41244> activating new tasks
Dec 5 10:52:58 charon 10[IKE] <41244> activating INFORMATIONAL task
Dec 5 10:52:58 charon 10[ENC] <41244> generating INFORMATIONAL_V1 request 1109804636 [ N(INVAL_KE) ]
Dec 5 10:52:58 charon 10[NET] <41244> sending packet: from 50.196.xxx.xxx[500] to 204.8.xxx.xxx[500] (56 bytes)
Dec 5 10:52:58 charon 10[IKE] <41244> IKE_SA (unnamed)[41244] state change: CONNECTING => DESTROYING
Dec 5 10:53:57 charon 10[NET] <41245> received packet: from 204.8.xxx.xxx[500] to 50.196.xxx.xxx[500] (128 bytes)
Dec 5 10:53:57 charon 10[ENC] <41245> parsed ID_PROT request 0 [ SA V ]
Dec 5 10:53:57 charon 10[CFG] <41245> looking for an ike config for 50.196.xxx.xxx...204.8.xxx.xxx
Dec 5 10:53:57 charon 10[CFG] <41245> candidate: %any...%any, prio 24
Dec 5 10:53:57 charon 10[CFG] <41245> found matching ike config: %any...%any with prio 24
Dec 5 10:53:57 charon 10[ENC] <41245> received unknown vendor ID: f4:ed:19:e0:c1:14:eb:51:6f:aa:ac:0e:e3:7d:af:28:07:b4:38:1f:00:00:00:01:00:00:13:8d:5a:26:eb:45:00:00:00:00:18:20:00:00
Dec 5 10:53:57 charon 10[IKE] <41245> 204.8.xxx.xxx is initiating a Main Mode IKE_SA
Dec 5 10:53:57 charon 10[IKE] <41245> IKE_SA (unnamed)[41245] state change: CREATED => CONNECTING
Dec 5 10:53:57 charon 10[CFG] <41245> selecting proposal:
Dec 5 10:53:57 charon 10[CFG] <41245> no acceptable ENCRYPTION_ALGORITHM found
Dec 5 10:53:57 charon 10[CFG] <41245> selecting proposal:
Dec 5 10:53:57 charon 10[CFG] <41245> proposal matches
Dec 5 10:53:57 charon 10[CFG] <41245> received proposals: IKE:3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024
Dec 5 10:53:57 charon 10[CFG] <41245> configured proposals: IKE:AES_CBC_128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/CURVE_25519, IKE:AES_CBC_128/AES_CBC_192/AES_CBC_256/CAMELLIA_CBC_128/CAMELLIA_CBC_192/CAMELLIA_CBC_256/3DES_CBC/HMAC_SHA2_256_128/HMAC_SHA2_384_192/HMAC_SHA2_512_256/HMAC_MD5_96/HMAC_SHA1_96/AES_XCBC_96/AES_CMAC_96/PRF_HMAC_SHA2_256/PRF_HMAC_SHA2_384/PRF_HMAC_SHA2_512/PRF_AES128_XCBC/PRF_AES128_CMAC/PRF_HMAC_MD5/PRF_HMAC_SHA1/ECP_256/ECP_384/ECP_521/ECP_256_BP/ECP_384_BP/ECP_512_BP/CURVE_25519/MODP_3072/MODP_4096/MODP_8192/MODP_2048/MODP_1024, IKE:AES_GCM_16_128/AES_GCM_16_192/AES_GCM_16_256/AES_GCM_12_128/AES_GCM_12_192/AES_GCM_12_256/AES_GCM_8_128/AES_GCM_8_192/AES_GCM_8_256/PRF_HMAC_SHA2_256/PRF_HMAC_SHA2_384/PRF_HMAC_SHA2_512/PRF_AES128_XCBC/PRF_AES128_CMAC/PRF_HMAC_MD5/PRF_HMAC_SHA1/ECP_256/ECP_384/ECP_521/ECP_256_BP/ECP_384_BP/ECP_512_BP/CURVE_25519/MODP_3072/MODP_4096/MODP_8192/MODP_2048/MODP_1024
Dec 5 10:53:57 charon 10[CFG] <41245> selected proposal: IKE:3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024
Dec 5 10:53:57 charon 10[IKE] <41245> sending XAuth vendor ID
Dec 5 10:53:57 charon 10[IKE] <41245> sending DPD vendor ID
Dec 5 10:53:57 charon 10[ENC] <41245> generating ID_PROT response 0 [ SA V V ]
Dec 5 10:53:57 charon 10[NET] <41245> sending packet: from 50.196.xxx.xxx[500] to 204.8.xxx.xxx[500] (116 bytes)
Dec 5 10:53:58 charon 09[NET] <41245> received packet: from 204.8.xxx.xxx[500] to 50.196.xxx.xxx[500] (184 bytes)
Dec 5 10:53:58 charon 09[ENC] <41245> parsed ID_PROT request 0 [ KE No ]
Dec 5 10:53:58 charon 09[CFG] <41245> candidate "bypasslan", match: 1/1/24 (me/other/ike)
Dec 5 10:53:58 charon 09[IKE] <41245> no shared key found for 50.196.xxx.xxx - 204.8.xxx.xxx
Dec 5 10:53:58 charon 09[IKE] <41245> queueing INFORMATIONAL task
Dec 5 10:53:58 charon 09[IKE] <41245> activating new tasks
Dec 5 10:53:58 charon 09[IKE] <41245> activating INFORMATIONAL task
Dec 5 10:53:58 charon 09[ENC] <41245> generating INFORMATIONAL_V1 request 2161395145 [ N(INVAL_KE) ]
Dec 5 10:53:58 charon 09[NET] <41245> sending packet: from 50.196.xxx.xxx[500] to 204.8.xxx.xxx[500] (56 bytes)
Dec 5 10:53:58 charon 09[IKE] <41245> IKE_SA (unnamed)[41245] state change: CONNECTING => DESTROYING
Dec 5 10:54:57 charon 09[NET] <41246> received packet: from 204.8.xxx.xxx[500] to 50.196.xxx.xxx[500] (128 bytes)
Dec 5 10:54:57 charon 09[ENC] <41246> parsed ID_PROT request 0 [ SA V ]
Dec 5 10:54:57 charon 09[CFG] <41246> looking for an ike config for 50.196.xxx.xxx...204.8.xxx.xxx
Dec 5 10:54:57 charon 09[CFG] <41246> candidate: %any...%any, prio 24
Dec 5 10:54:57 charon 09[CFG] <41246> found matching ike config: %any...%any with prio 24
Dec 5 10:54:57 charon 09[ENC] <41246> received unknown vendor ID: f4:ed:19:e0:c1:14:eb:51:6f:aa:ac:0e:e3:7d:af:28:07:b4:38:1f:00:00:00:01:00:00:13:8d:5a:26:eb:81:00:00:00:00:18:20:00:00
Dec 5 10:54:57 charon 09[IKE] <41246> 204.8.xxx.xxx is initiating a Main Mode IKE_SA
Dec 5 10:54:57 charon 09[IKE] <41246> IKE_SA (unnamed)[41246] state change: CREATED => CONNECTING
Dec 5 10:54:57 charon 09[CFG] <41246> selecting proposal:
Dec 5 10:54:57 charon 09[CFG] <41246> no acceptable ENCRYPTION_ALGORITHM found
Dec 5 10:54:57 charon 09[CFG] <41246> selecting proposal:
Dec 5 10:54:57 charon 09[CFG] <41246> proposal matches
Dec 5 10:54:57 charon 09[CFG] <41246> received proposals: IKE:3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024
Dec 5 10:54:57 charon 09[CFG] <41246> configured proposals: IKE:AES_CBC_128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/CURVE_25519, IKE:AES_CBC_128/AES_CBC_192/AES_CBC_256/CAMELLIA_CBC_128/CAMELLIA_CBC_192/CAMELLIA_CBC_256/3DES_CBC/HMAC_SHA2_256_128/HMAC_SHA2_384_192/HMAC_SHA2_512_256/HMAC_MD5_96/HMAC_SHA1_96/AES_XCBC_96/AES_CMAC_96/PRF_HMAC_SHA2_256/PRF_HMAC_SHA2_384/PRF_HMAC_SHA2_512/PRF_AES128_XCBC/PRF_AES128_CMAC/PRF_HMAC_MD5/PRF_HMAC_SHA1/ECP_256/ECP_384/ECP_521/ECP_256_BP/ECP_384_BP/ECP_512_BP/CURVE_25519/MODP_3072/MODP_4096/MODP_8192/MODP_2048/MODP_1024, IKE:AES_GCM_16_128/AES_GCM_16_192/AES_GCM_16_256/AES_GCM_12_128/AES_GCM_12_192/AES_GCM_12_256/AES_GCM_8_128/AES_GCM_8_192/AES_GCM_8_256/PRF_HMAC_SHA2_256/PRF_HMAC_SHA2_384/PRF_HMAC_SHA2_512/PRF_AES128_XCBC/PRF_AES128_CMAC/PRF_HMAC_MD5/PRF_HMAC_SHA1/ECP_256/ECP_384/ECP_521/ECP_256_BP/ECP_384_BP/ECP_512_BP/CURVE_25519/MODP_3072/MODP_4096/MODP_8192/MODP_2048/MODP_1024
Dec 5 10:54:57 charon 09[CFG] <41246> selected proposal: IKE:3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024
Dec 5 10:54:57 charon 09[IKE] <41246> sending XAuth vendor ID
Dec 5 10:54:57 charon 09[IKE] <41246> sending DPD vendor ID
Dec 5 10:54:57 charon 09[ENC] <41246> generating ID_PROT response 0 [ SA V V ]
Dec 5 10:54:57 charon 09[NET] <41246> sending packet: from 50.196.xxx.xxx[500] to 204.8.xxx.xxx[500] (116 bytes)
Dec 5 10:54:58 charon 12[NET] <41246> received packet: from 204.8.xxx.xxx[500] to 50.196.xxx.xxx[500] (184 bytes)
Dec 5 10:54:58 charon 12[ENC] <41246> parsed ID_PROT request 0 [ KE No ]
Dec 5 10:54:58 charon 12[CFG] <41246> candidate "bypasslan", match: 1/1/24 (me/other/ike)
Dec 5 10:54:58 charon 12[IKE] <41246> no shared key found for 50.196.xxx.xxx - 204.8.xxx.xxx
Dec 5 10:54:58 charon 12[IKE] <41246> queueing INFORMATIONAL task
Dec 5 10:54:58 charon 12[IKE] <41246> activating new tasks
Dec 5 10:54:58 charon 12[IKE] <41246> activating INFORMATIONAL task
Dec 5 10:54:58 charon 12[ENC] <41246> generating INFORMATIONAL_V1 request 1752077790 [ N(INVAL_KE) ]
Dec 5 10:54:58 charon 12[NET] <41246> sending packet: from 50.196.xxx.xxx[500] to 204.8.xxx.xxx[500] (56 bytes)
Dec 5 10:54:58 charon 12[IKE] <41246> IKE_SA (unnamed)[41246] state change: CONNECTING => DESTROYING
Dec 5 10:55:57 charon 12[NET] <41247> received packet: from 204.8.xxx.xxx[500] to 50.196.xxx.xxx[500] (128 bytes)
Dec 5 10:55:57 charon 12[ENC] <41247> parsed ID_PROT request 0 [ SA V ]
Dec 5 10:55:57 charon 12[CFG] <41247> looking for an ike config for 50.196.xxx.xxx...204.8.xxx.xxx
Dec 5 10:55:57 charon 12[CFG] <41247> candidate: %any...%any, prio 24
Dec 5 10:55:57 charon 12[CFG] <41247> found matching ike config: %any...%any with prio 24
Dec 5 10:55:57 charon 12[ENC] <41247> received unknown vendor ID: f4:ed:19:e0:c1:14:eb:51:6f:aa:ac:0e:e3:7d:af:28:07:b4:38:1f:00:00:00:01:00:00:13:8d:5a:26:eb:bd:00:00:00:00:18:20:00:00
Dec 5 10:55:57 charon 12[IKE] <41247> 204.8.xxx.xxx is initiating a Main Mode IKE_SA
Dec 5 10:55:57 charon 12[IKE] <41247> IKE_SA (unnamed)[41247] state change: CREATED => CONNECTING
Dec 5 10:55:57 charon 12[CFG] <41247> selecting proposal:
Dec 5 10:55:57 charon 12[CFG] <41247> no acceptable ENCRYPTION_ALGORITHM found
Dec 5 10:55:57 charon 12[CFG] <41247> selecting proposal:
Dec 5 10:55:57 charon 12[CFG] <41247> proposal matches
Dec 5 10:55:57 charon 12[CFG] <41247> received proposals: IKE:3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024
Dec 5 10:55:57 charon 12[CFG] <41247> configured proposals: IKE:AES_CBC_128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/CURVE_25519, IKE:AES_CBC_128/AES_CBC_192/AES_CBC_256/CAMELLIA_CBC_128/CAMELLIA_CBC_192/CAMELLIA_CBC_256/3DES_CBC/HMAC_SHA2_256_128/HMAC_SHA2_384_192/HMAC_SHA2_512_256/HMAC_MD5_96/HMAC_SHA1_96/AES_XCBC_96/AES_CMAC_96/PRF_HMAC_SHA2_256/PRF_HMAC_SHA2_384/PRF_HMAC_SHA2_512/PRF_AES128_XCBC/PRF_AES128_CMAC/PRF_HMAC_MD5/PRF_HMAC_SHA1/ECP_256/ECP_384/ECP_521/ECP_256_BP/ECP_384_BP/ECP_512_BP/CURVE_25519/MODP_3072/MODP_4096/MODP_8192/MODP_2048/MODP_1024, IKE:AES_GCM_16_128/AES_GCM_16_192/AES_GCM_16_256/AES_GCM_12_128/AES_GCM_12_192/AES_GCM_12_256/AES_GCM_8_128/AES_GCM_8_192/AES_GCM_8_256/PRF_HMAC_SHA2_256/PRF_HMAC_SHA2_384/PRF_HMAC_SHA2_512/PRF_AES128_XCBC/PRF_AES128_CMAC/PRF_HMAC_MD5/PRF_HMAC_SHA1/ECP_256/ECP_384/ECP_521/ECP_256_BP/ECP_384_BP/ECP_512_BP/CURVE_25519/MODP_3072/MODP_4096/MODP_8192/MODP_2048/MODP_1024
Dec 5 10:55:57 charon 12[CFG] <41247> selected proposal: IKE:3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024
Dec 5 10:55:57 charon 12[IKE] <41247> sending XAuth vendor ID
Dec 5 10:55:57 charon 12[IKE] <41247> sending DPD vendor ID
Dec 5 10:55:57 charon 12[ENC] <41247> generating ID_PROT response 0 [ SA V V ]
Dec 5 10:55:57 charon 12[NET] <41247> sending packet: from 50.196.xxx.xxx[500] to 204.8.xxx.xxx[500] (116 bytes)
Dec 5 10:55:58 charon 08[NET] <41247> received packet: from 204.8.xxx.xxx[500] to 50.196.xxx.xxx[500] (184 bytes)
Dec 5 10:55:58 charon 08[ENC] <41247> parsed ID_PROT request 0 [ KE No ]
Dec 5 10:55:58 charon 08[CFG] <41247> candidate "bypasslan", match: 1/1/24 (me/other/ike)
Dec 5 10:55:58 charon 08[IKE] <41247> no shared key found for 50.196.xxx.xxx - 204.8.xxx.xxx
Dec 5 10:55:58 charon 08[IKE] <41247> queueing INFORMATIONAL task
Dec 5 10:55:58 charon 08[IKE] <41247> activating new tasks
Dec 5 10:55:58 charon 08[IKE] <41247> activating INFORMATIONAL task
Dec 5 10:55:58 charon 08[ENC] <41247> generating INFORMATIONAL_V1 request 244472465 [ N(INVAL_KE) ]
Dec 5 10:55:58 charon 08[NET] <41247> sending packet: from 50.196.xxx.xxx[500] to 204.8.xxx.xxx[500] (56 bytes)
Dec 5 10:55:58 charon 08[IKE] <41247> IKE_SA (unnamed)[41247] state change: CONNECTING => DESTROYING
Dec 5 10:56:57 charon 08[NET] <41248> received packet: from 204.8.xxx.xxx[500] to 50.196.xxx.xxx[500] (128 bytes)
Dec 5 10:56:57 charon 08[ENC] <41248> parsed ID_PROT request 0 [ SA V ]
Dec 5 10:56:57 charon 08[CFG] <41248> looking for an ike config for 50.196.xxx.xxx...204.8.xxx.xxx
Dec 5 10:56:57 charon 08[CFG] <41248> candidate: %any...%any, prio 24
Dec 5 10:56:57 charon 08[CFG] <41248> found matching ike config: %any...%any with prio 24
Dec 5 10:56:57 charon 08[ENC] <41248> received unknown vendor ID: f4:ed:19:e0:c1:14:eb:51:6f:aa:ac:0e:e3:7d:af:28:07:b4:38:1f:00:00:00:01:00:00:13:8d:5a:26:eb:f9:00:00:00:00:18:20:00:00
Dec 5 10:56:57 charon 08[IKE] <41248> 204.8.xxx.xxx is initiating a Main Mode IKE_SA
Dec 5 10:56:57 charon 08[IKE] <41248> IKE_SA (unnamed)[41248] state change: CREATED => CONNECTING
Dec 5 10:56:57 charon 08[CFG] <41248> selecting proposal:
Dec 5 10:56:57 charon 08[CFG] <41248> no acceptable ENCRYPTION_ALGORITHM found
Dec 5 10:56:57 charon 08[CFG] <41248> selecting proposal:
Dec 5 10:56:57 charon 08[CFG] <41248> proposal matches
Dec 5 10:56:57 charon 08[CFG] <41248> received proposals: IKE:3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024
Dec 5 10:56:57 charon 08[CFG] <41248> configured proposals: IKE:AES_CBC_128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/CURVE_25519, IKE:AES_CBC_128/AES_CBC_192/AES_CBC_256/CAMELLIA_CBC_128/CAMELLIA_CBC_192/CAMELLIA_CBC_256/3DES_CBC/HMAC_SHA2_256_128/HMAC_SHA2_384_192/HMAC_SHA2_512_256/HMAC_MD5_96/HMAC_SHA1_96/AES_XCBC_96/AES_CMAC_96/PRF_HMAC_SHA2_256/PRF_HMAC_SHA2_384/PRF_HMAC_SHA2_512/PRF_AES128_XCBC/PRF_AES128_CMAC/PRF_HMAC_MD5/PRF_HMAC_SHA1/ECP_256/ECP_384/ECP_521/ECP_256_BP/ECP_384_BP/ECP_512_BP/CURVE_25519/MODP_3072/MODP_4096/MODP_8192/MODP_2048/MODP_1024, IKE:AES_GCM_16_128/AES_GCM_16_192/AES_GCM_16_256/AES_GCM_12_128/AES_GCM_12_192/AES_GCM_12_256/AES_GCM_8_128/AES_GCM_8_192/AES_GCM_8_256/PRF_HMAC_SHA2_256/PRF_HMAC_SHA2_384/PRF_HMAC_SHA2_512/PRF_AES128_XCBC/PRF_AES128_CMAC/PRF_HMAC_MD5/PRF_HMAC_SHA1/ECP_256/ECP_384/ECP_521/ECP_256_BP/ECP_384_BP/ECP_512_BP/CURVE_25519/MODP_3072/MODP_4096/MODP_8192/MODP_2048/MODP_1024
Dec 5 10:56:57 charon 08[CFG] <41248> selected proposal: IKE:3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024
Dec 5 10:56:57 charon 08[IKE] <41248> sending XAuth vendor ID
Dec 5 10:56:57 charon 08[IKE] <41248> sending DPD vendor ID
Dec 5 10:56:57 charon 08[ENC] <41248> generating ID_PROT response 0 [ SA V V ]
Dec 5 10:56:57 charon 08[NET] <41248> sending packet: from 50.196.xxx.xxx[500] to 204.8.xxx.xxx[500] (116 bytes)
Dec 5 10:56:58 charon 11[NET] <41248> received packet: from 204.8.xxx.xxx[500] to 50.196.xxx.xxx[500] (184 bytes)
Dec 5 10:56:58 charon 11[ENC] <41248> parsed ID_PROT request 0 [ KE No ]
Dec 5 10:56:58 charon 11[CFG] <41248> candidate "bypasslan", match: 1/1/24 (me/other/ike)
Dec 5 10:56:58 charon 11[IKE] <41248> no shared key found for 50.196.xxx.xxx - 204.8.xxx.xxx
Dec 5 10:56:58 charon 11[IKE] <41248> queueing INFORMATIONAL task
Dec 5 10:56:58 charon 11[IKE] <41248> activating new tasks
Dec 5 10:56:58 charon 11[IKE] <41248> activating INFORMATIONAL task
Dec 5 10:56:58 charon 11[ENC] <41248> generating INFORMATIONAL_V1 request 495435906 [ N(INVAL_KE) ]
Dec 5 10:56:58 charon 11[NET] <41248> sending packet: from 50.196.xxx.xxx[500] to 204.8.xxx.xxx[500] (56 bytes)
Dec 5 10:56:58 charon 11[IKE] <41248> IKE_SA (unnamed)[41248] state change: CONNECTING => DESTROYING
Dec 5 10:57:57 charon 01[NET] <41249> received packet: from 204.8.xxx.xxx[500] to 50.196.xxx.xxx[500] (128 bytes)
Dec 5 10:57:57 charon 01[ENC] <41249> parsed ID_PROT request 0 [ SA V ]
Dec 5 10:57:57 charon 01[CFG] <41249> looking for an ike config for 50.196.xxx.xxx...204.8.xxx.xxx
Dec 5 10:57:57 charon 01[CFG] <41249> candidate: %any...%any, prio 24
Dec 5 10:57:57 charon 01[CFG] <41249> found matching ike config: %any...%any with prio 24
Dec 5 10:57:57 charon 01[ENC] <41249> received unknown vendor ID: f4:ed:19:e0:c1:14:eb:51:6f:aa:ac:0e:e3:7d:af:28:07:b4:38:1f:00:00:00:01:00:00:13:8d:5a:26:ec:35:00:00:00:00:18:20:00:00
Dec 5 10:57:57 charon 01[IKE] <41249> 204.8.xxx.xxx is initiating a Main Mode IKE_SA
Dec 5 10:57:57 charon 01[IKE] <41249> IKE_SA (unnamed)[41249] state change: CREATED => CONNECTING
Dec 5 10:57:57 charon 01[CFG] <41249> selecting proposal:
Dec 5 10:57:57 charon 01[CFG] <41249> no acceptable ENCRYPTION_ALGORITHM found
Dec 5 10:57:57 charon 01[CFG] <41249> selecting proposal:
Dec 5 10:57:57 charon 01[CFG] <41249> proposal matches
Dec 5 10:57:57 charon 01[CFG] <41249> received proposals: IKE:3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024
Dec 5 10:57:57 charon 01[CFG] <41249> configured proposals: IKE:AES_CBC_128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/CURVE_25519, IKE:AES_CBC_128/AES_CBC_192/AES_CBC_256/CAMELLIA_CBC_128/CAMELLIA_CBC_192/CAMELLIA_CBC_256/3DES_CBC/HMAC_SHA2_256_128/HMAC_SHA2_384_192/HMAC_SHA2_512_256/HMAC_MD5_96/HMAC_SHA1_96/AES_XCBC_96/AES_CMAC_96/PRF_HMAC_SHA2_256/PRF_HMAC_SHA2_384/PRF_HMAC_SHA2_512/PRF_AES128_XCBC/PRF_AES128_CMAC/PRF_HMAC_MD5/PRF_HMAC_SHA1/ECP_256/ECP_384/ECP_521/ECP_256_BP/ECP_384_BP/ECP_512_BP/CURVE_25519/MODP_3072/MODP_4096/MODP_8192/MODP_2048/MODP_1024, IKE:AES_GCM_16_128/AES_GCM_16_192/AES_GCM_16_256/AES_GCM_12_128/AES_GCM_12_192/AES_GCM_12_256/AES_GCM_8_128/AES_GCM_8_192/AES_GCM_8_256/PRF_HMAC_SHA2_256/PRF_HMAC_SHA2_384/PRF_HMAC_SHA2_512/PRF_AES128_XCBC/PRF_AES128_CMAC/PRF_HMAC_MD5/PRF_HMAC_SHA1/ECP_256/ECP_384/ECP_521/ECP_256_BP/ECP_384_BP/ECP_512_BP/CURVE_25519/MODP_3072/MODP_4096/MODP_8192/MODP_2048/MODP_1024
Dec 5 10:57:57 charon 01[CFG] <41249> selected proposal: IKE:3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024
Dec 5 10:57:57 charon 01[IKE] <41249> sending XAuth vendor ID
Dec 5 10:57:57 charon 01[IKE] <41249> sending DPD vendor ID
Dec 5 10:57:57 charon 01[ENC] <41249> generating ID_PROT response 0 [ SA V V ]
Dec 5 10:57:57 charon 01[NET] <41249> sending packet: from 50.196.xxx.xxx[500] to 204.8.xxx.xxx[500] (116 bytes)
Dec 5 10:57:58 charon 01[NET] <41249> received packet: from 204.8.xxx.xxx[500] to 50.196.xxx.xxx[500] (184 bytes)
Dec 5 10:57:58 charon 01[ENC] <41249> parsed ID_PROT request 0 [ KE No ]
Dec 5 10:57:58 charon 01[CFG] <41249> candidate "bypasslan", match: 1/1/24 (me/other/ike)
Dec 5 10:57:58 charon 01[IKE] <41249> no shared key found for 50.196.xxx.xxx - 204.8.xxx.xxx
Dec 5 10:57:58 charon 01[IKE] <41249> queueing INFORMATIONAL task
Dec 5 10:57:58 charon 01[IKE] <41249> activating new tasks
Dec 5 10:57:58 charon 01[IKE] <41249> activating INFORMATIONAL task
Dec 5 10:57:58 charon 01[ENC] <41249> generating INFORMATIONAL_V1 request 3399047929 [ N(INVAL_KE) ]
Dec 5 10:57:58 charon 01[NET] <41249> sending packet: from 50.196.xxx.xxx[500] to 204.8.xxx.xxx[500] (56 bytes)
Dec 5 10:57:58 charon 01[IKE] <41249> IKE_SA (unnamed)[41249] state change: CONNECTING => DESTROYING
Dec 5 10:58:57 charon 01[NET] <41250> received packet: from 204.8.xxx.xxx[500] to 50.196.xxx.xxx[500] (128 bytes)
Dec 5 10:58:57 charon 01[ENC] <41250> parsed ID_PROT request 0 [ SA V ]
Dec 5 10:58:57 charon 01[CFG] <41250> looking for an ike config for 50.196.xxx.xxx...204.8.xxx.xxx
Dec 5 10:58:57 charon 01[CFG] <41250> candidate: %any...%any, prio 24
Dec 5 10:58:57 charon 01[CFG] <41250> found matching ike config: %any...%any with prio 24
Dec 5 10:58:57 charon 01[ENC] <41250> received unknown vendor ID: f4:ed:19:e0:c1:14:eb:51:6f:aa:ac:0e:e3:7d:af:28:07:b4:38:1f:00:00:00:01:00:00:13:8d:5a:26:ec:71:00:00:00:00:18:20:00:00
Dec 5 10:58:57 charon 01[IKE] <41250> 204.8.xxx.xxx is initiating a Main Mode IKE_SA
Dec 5 10:58:57 charon 01[IKE] <41250> IKE_SA (unnamed)[41250] state change: CREATED => CONNECTING
Dec 5 10:58:57 charon 01[CFG] <41250> selecting proposal:
Dec 5 10:58:57 charon 01[CFG] <41250> no acceptable ENCRYPTION_ALGORITHM found
Dec 5 10:58:57 charon 01[CFG] <41250> selecting proposal:
Dec 5 10:58:57 charon 01[CFG] <41250> proposal matches
Dec 5 10:58:57 charon 01[CFG] <41250> received proposals: IKE:3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024
Dec 5 10:58:57 charon 01[CFG] <41250> configured proposals: IKE:AES_CBC_128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/CURVE_25519, IKE:AES_CBC_128/AES_CBC_192/AES_CBC_256/CAMELLIA_CBC_128/CAMELLIA_CBC_192/CAMELLIA_CBC_256/3DES_CBC/HMAC_SHA2_256_128/HMAC_SHA2_384_192/HMAC_SHA2_512_256/HMAC_MD5_96/HMAC_SHA1_96/AES_XCBC_96/AES_CMAC_96/PRF_HMAC_SHA2_256/PRF_HMAC_SHA2_384/PRF_HMAC_SHA2_512/PRF_AES128_XCBC/PRF_AES128_CMAC/PRF_HMAC_MD5/PRF_HMAC_SHA1/ECP_256/ECP_384/ECP_521/ECP_256_BP/ECP_384_BP/ECP_512_BP/CURVE_25519/MODP_3072/MODP_4096/MODP_8192/MODP_2048/MODP_1024, IKE:AES_GCM_16_128/AES_GCM_16_192/AES_GCM_16_256/AES_GCM_12_128/AES_GCM_12_192/AES_GCM_12_256/AES_GCM_8_128/AES_GCM_8_192/AES_GCM_8_256/PRF_HMAC_SHA2_256/PRF_HMAC_SHA2_384/PRF_HMAC_SHA2_512/PRF_AES128_XCBC/PRF_AES128_CMAC/PRF_HMAC_MD5/PRF_HMAC_SHA1/ECP_256/ECP_384/ECP_521/ECP_256_BP/ECP_384_BP/ECP_512_BP/CURVE_25519/MODP_3072/MODP_4096/MODP_8192/MODP_2048/MODP_1024
Dec 5 10:58:57 charon 01[CFG] <41250> selected proposal: IKE:3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024
Dec 5 10:58:57 charon 01[IKE] <41250> sending XAuth vendor ID
Dec 5 10:58:57 charon 01[IKE] <41250> sending DPD vendor ID
Dec 5 10:58:57 charon 01[ENC] <41250> generating ID_PROT response 0 [ SA V V ]
Dec 5 10:58:57 charon 01[NET] <41250> sending packet: from 50.196.xxx.xxx[500] to 204.8.xxx.xxx[500] (116 bytes)
Dec 5 10:58:58 charon 07[NET] <41250> received packet: from 204.8.xxx.xxx[500] to 50.196.xxx.xxx[500] (184 bytes)
Dec 5 10:58:58 charon 07[ENC] <41250> parsed ID_PROT request 0 [ KE No ]
Dec 5 10:58:58 charon 07[CFG] <41250> candidate "bypasslan", match: 1/1/24 (me/other/ike)
Dec 5 10:58:58 charon 07[IKE] <41250> no shared key found for 50.196.xxx.xxx - 204.8.xxx.xxx
Dec 5 10:58:58 charon 07[IKE] <41250> queueing INFORMATIONAL task
Dec 5 10:58:58 charon 07[IKE] <41250> activating new tasks
Dec 5 10:58:58 charon 07[IKE] <41250> activating INFORMATIONAL task
Dec 5 10:58:58 charon 07[ENC] <41250> generating INFORMATIONAL_V1 request 60851277 [ N(INVAL_KE) ]
Dec 5 10:58:58 charon 07[NET] <41250> sending packet: from 50.196.xxx.xxx[500] to 204.8.xxx.xxx[500] (56 bytes)
Dec 5 10:58:58 charon 07[IKE] <41250> IKE_SA (unnamed)[41250] state change: CONNECTING => DESTROYING
Dec 5 10:59:58 charon 07[NET] <41251> received packet: from 204.8.xxx.xxx[500] to 50.196.xxx.xxx[500] (128 bytes)
Dec 5 10:59:58 charon 07[ENC] <41251> parsed ID_PROT request 0 [ SA V ]
Dec 5 10:59:58 charon 07[CFG] <41251> looking for an ike config for 50.196.xxx.xxx...204.8.xxx.xxx
Dec 5 10:59:58 charon 07[CFG] <41251> candidate: %any...%any, prio 24
Dec 5 10:59:58 charon 07[CFG] <41251> found matching ike config: %any...%any with prio 24
Dec 5 10:59:58 charon 07[ENC] <41251> received unknown vendor ID: f4:ed:19:e0:c1:14:eb:51:6f:aa:ac:0e:e3:7d:af:28:07:b4:38:1f:00:00:00:01:00:00:13:8d:5a:26:ec:ad:00:00:00:00:18:20:00:00
Dec 5 10:59:58 charon 07[IKE] <41251> 204.8.xxx.xxx is initiating a Main Mode IKE_SA
Dec 5 10:59:58 charon 07[IKE] <41251> IKE_SA (unnamed)[41251] state change: CREATED => CONNECTING
Dec 5 10:59:58 charon 07[CFG] <41251> selecting proposal:
Dec 5 10:59:58 charon 07[CFG] <41251> no acceptable ENCRYPTION_ALGORITHM found
Dec 5 10:59:58 charon 07[CFG] <41251> selecting proposal:
Dec 5 10:59:58 charon 07[CFG] <41251> proposal matches
Dec 5 10:59:58 charon 07[CFG] <41251> received proposals: IKE:3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024
Dec 5 10:59:58 charon 07[CFG] <41251> configured proposals: IKE:AES_CBC_128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/CURVE_25519, IKE:AES_CBC_128/AES_CBC_192/AES_CBC_256/CAMELLIA_CBC_128/CAMELLIA_CBC_192/CAMELLIA_CBC_256/3DES_CBC/HMAC_SHA2_256_128/HMAC_SHA2_384_192/HMAC_SHA2_512_256/HMAC_MD5_96/HMAC_SHA1_96/AES_XCBC_96/AES_CMAC_96/PRF_HMAC_SHA2_256/PRF_HMAC_SHA2_384/PRF_HMAC_SHA2_512/PRF_AES128_XCBC/PRF_AES128_CMAC/PRF_HMAC_MD5/PRF_HMAC_SHA1/ECP_256/ECP_384/ECP_521/ECP_256_BP/ECP_384_BP/ECP_512_BP/CURVE_25519/MODP_3072/MODP_4096/MODP_8192/MODP_2048/MODP_1024, IKE:AES_GCM_16_128/AES_GCM_16_192/AES_GCM_16_256/AES_GCM_12_128/AES_GCM_12_192/AES_GCM_12_256/AES_GCM_8_128/AES_GCM_8_192/AES_GCM_8_256/PRF_HMAC_SHA2_256/PRF_HMAC_SHA2_384/PRF_HMAC_SHA2_512/PRF_AES128_XCBC/PRF_AES128_CMAC/PRF_HMAC_MD5/PRF_HMAC_SHA1/ECP_256/ECP_384/ECP_521/ECP_256_BP/ECP_384_BP/ECP_512_BP/CURVE_25519/MODP_3072/MODP_4096/MODP_8192/MODP_2048/MODP_1024
Dec 5 10:59:58 charon 07[CFG] <41251> selected proposal: IKE:3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024
Dec 5 10:59:58 charon 07[IKE] <41251> sending XAuth vendor ID
Dec 5 10:59:58 charon 07[IKE] <41251> sending DPD vendor ID
Dec 5 10:59:58 charon 07[ENC] <41251> generating ID_PROT response 0 [ SA V V ]
Dec 5 10:59:58 charon 07[NET] <41251> sending packet: from 50.196.xxx.xxx[500] to 204.8.xxx.xxx[500] (116 bytes)
Dec 5 10:59:58 charon 07[NET] <41251> received packet: from 204.8.xxx.xxx[500] to 50.196.xxx.xxx[500] (184 bytes)
Dec 5 10:59:58 charon 07[ENC] <41251> parsed ID_PROT request 0 [ KE No ]
Dec 5 10:59:58 charon 07[CFG] <41251> candidate "bypasslan", match: 1/1/24 (me/other/ike)
Dec 5 10:59:58 charon 07[IKE] <41251> no shared key found for 50.196.xxx.xxx - 204.8.xxx.xxx
Dec 5 10:59:58 charon 07[IKE] <41251> queueing INFORMATIONAL task
Dec 5 10:59:58 charon 07[IKE] <41251> activating new tasks
Dec 5 10:59:58 charon 07[IKE] <41251> activating INFORMATIONAL task
Dec 5 10:59:58 charon 07[ENC] <41251> generating INFORMATIONAL_V1 request 1430056241 [ N(INVAL_KE) ]
Dec 5 10:59:58 charon 07[NET] <41251> sending packet: from 50.196.xxx.xxx[500] to 204.8.xxx.xxx[500] (56 bytes)
Dec 5 10:59:58 charon 07[IKE] <41251> IKE_SA (unnamed)[41251] state change: CONNECTING => DESTROYING
Dec 5 11:00:57 charon 14[NET] <41252> received packet: from 204.8.xxx.xxx[500] to 50.196.xxx.xxx[500] (128 bytes)
Dec 5 11:00:57 charon 14[ENC] <41252> parsed ID_PROT request 0 [ SA V ]
Dec 5 11:00:57 charon 14[CFG] <41252> looking for an ike config for 50.196.xxx.xxx...204.8.xxx.xxx
Dec 5 11:00:57 charon 14[CFG] <41252> candidate: %any...%any, prio 24
Dec 5 11:00:57 charon 14[CFG] <41252> found matching ike config: %any...%any with prio 24
Dec 5 11:00:57 charon 14[ENC] <41252> received unknown vendor ID: f4:ed:19:e0:c1:14:eb:51:6f:aa:ac:0e:e3:7d:af:28:07:b4:38:1f:00:00:00:01:00:00:13:8d:5a:26:ec:e9:00:00:00:00:18:20:00:00
Dec 5 11:00:57 charon 14[IKE] <41252> 204.8.xxx.xxx is initiating a Main Mode IKE_SA
Dec 5 11:00:57 charon 14[IKE] <41252> IKE_SA (unnamed)[41252] state change: CREATED => CONNECTING
Dec 5 11:00:57 charon 14[CFG] <41252> selecting proposal:
Dec 5 11:00:57 charon 14[CFG] <41252> no acceptable ENCRYPTION_ALGORITHM found
Dec 5 11:00:57 charon 14[CFG] <41252> selecting proposal:
Dec 5 11:00:57 charon 14[CFG] <41252> proposal matches
Dec 5 11:00:57 charon 14[CFG] <41252> received proposals: IKE:3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024
Dec 5 11:00:57 charon 14[CFG] <41252> configured proposals: IKE:AES_CBC_128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/CURVE_25519, IKE:AES_CBC_128/AES_CBC_192/AES_CBC_256/CAMELLIA_CBC_128/CAMELLIA_CBC_192/CAMELLIA_CBC_256/3DES_CBC/HMAC_SHA2_256_128/HMAC_SHA2_384_192/HMAC_SHA2_512_256/HMAC_MD5_96/HMAC_SHA1_96/AES_XCBC_96/AES_CMAC_96/PRF_HMAC_SHA2_256/PRF_HMAC_SHA2_384/PRF_HMAC_SHA2_512/PRF_AES128_XCBC/PRF_AES128_CMAC/PRF_HMAC_MD5/PRF_HMAC_SHA1/ECP_256/ECP_384/ECP_521/ECP_256_BP/ECP_384_BP/ECP_512_BP/CURVE_25519/MODP_3072/MODP_4096/MODP_8192/MODP_2048/MODP_1024, IKE:AES_GCM_16_128/AES_GCM_16_192/AES_GCM_16_256/AES_GCM_12_128/AES_GCM_12_192/AES_GCM_12_256/AES_GCM_8_128/AES_GCM_8_192/AES_GCM_8_256/PRF_HMAC_SHA2_256/PRF_HMAC_SHA2_384/PRF_HMAC_SHA2_512/PRF_AES128_XCBC/PRF_AES128_CMAC/PRF_HMAC_MD5/PRF_HMAC_SHA1/ECP_256/ECP_384/ECP_521/ECP_256_BP/ECP_384_BP/ECP_512_BP/CURVE_25519/MODP_3072/MODP_4096/MODP_8192/MODP_2048/MODP_1024
Dec 5 11:00:57 charon 14[CFG] <41252> selected proposal: IKE:3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024
Dec 5 11:00:57 charon 14[IKE] <41252> sending XAuth vendor ID
Dec 5 11:00:57 charon 14[IKE] <41252> sending DPD vendor ID
Dec 5 11:00:57 charon 14[ENC] <41252> generating ID_PROT response 0 [ SA V V ]
Dec 5 11:00:57 charon 14[NET] <41252> sending packet: from 50.196.xxx.xxx[500] to 204.8.xxx.xxx[500] (116 bytes)
Dec 5 11:00:58 charon 15[NET] <41252> received packet: from 204.8.xxx.xxx[500] to 50.196.xxx.xxx[500] (184 bytes)
Dec 5 11:00:58 charon 15[ENC] <41252> parsed ID_PROT request 0 [ KE No ]
Dec 5 11:00:58 charon 15[CFG] <41252> candidate "bypasslan", match: 1/1/24 (me/other/ike)
Dec 5 11:00:58 charon 15[IKE] <41252> no shared key found for 50.196.xxx.xxx - 204.8.xxx.xxx
Dec 5 11:00:58 charon 15[IKE] <41252> queueing INFORMATIONAL task
Dec 5 11:00:58 charon 15[IKE] <41252> activating new tasks
Dec 5 11:00:58 charon 15[IKE] <41252> activating INFORMATIONAL task
Dec 5 11:00:58 charon 15[ENC] <41252> generating INFORMATIONAL_V1 request 1030399365 [ N(INVAL_KE) ]
Dec 5 11:00:58 charon 15[NET] <41252> sending packet: from 50.196.xxx.xxx[500] to 204.8.xxx.xxx[500] (56 bytes)
Dec 5 11:00:58 charon 15[IKE] <41252> IKE_SA (unnamed)[41252] state change: CONNECTING => DESTROYING
Dec 5 11:01:57 charon 15[NET] <41253> received packet: from 204.8.xxx.xxx[500] to 50.196.xxx.xxx[500] (128 bytes)
Dec 5 11:01:57 charon 15[ENC] <41253> parsed ID_PROT request 0 [ SA V ]
Dec 5 11:01:57 charon 15[CFG] <41253> looking for an ike config for 50.196.xxx.xxx...204.8.xxx.xxx
Dec 5 11:01:57 charon 15[CFG] <41253> candidate: %any...%any, prio 24
Dec 5 11:01:57 charon 15[CFG] <41253> found matching ike config: %any...%any with prio 24
Dec 5 11:01:57 charon 15[ENC] <41253> received unknown vendor ID: f4:ed:19:e0:c1:14:eb:51:6f:aa:ac:0e:e3:7d:af:28:07:b4:38:1f:00:00:00:01:00:00:13:8d:5a:26:ed:25:00:00:00:00:18:20:00:00
Dec 5 11:01:57 charon 15[IKE] <41253> 204.8.xxx.xxx is initiating a Main Mode IKE_SA
Dec 5 11:01:57 charon 15[IKE] <41253> IKE_SA (unnamed)[41253] state change: CREATED => CONNECTING
Dec 5 11:01:57 charon 15[CFG] <41253> selecting proposal:
Dec 5 11:01:57 charon 15[CFG] <41253> no acceptable ENCRYPTION_ALGORITHM found
Dec 5 11:01:57 charon 15[CFG] <41253> selecting proposal:
Dec 5 11:01:57 charon 15[CFG] <41253> proposal matches
Dec 5 11:01:57 charon 15[CFG] <41253> received proposals: IKE:3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024
Dec 5 11:01:57 charon 15[CFG] <41253> configured proposals: IKE:AES_CBC_128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/CURVE_25519, IKE:AES_CBC_128/AES_CBC_192/AES_CBC_256/CAMELLIA_CBC_128/CAMELLIA_CBC_192/CAMELLIA_CBC_256/3DES_CBC/HMAC_SHA2_256_128/HMAC_SHA2_384_192/HMAC_SHA2_512_256/HMAC_MD5_96/HMAC_SHA1_96/AES_XCBC_96/AES_CMAC_96/PRF_HMAC_SHA2_256/PRF_HMAC_SHA2_384/PRF_HMAC_SHA2_512/PRF_AES128_XCBC/PRF_AES128_CMAC/PRF_HMAC_MD5/PRF_HMAC_SHA1/ECP_256/ECP_384/ECP_521/ECP_256_BP/ECP_384_BP/ECP_512_BP/CURVE_25519/MODP_3072/MODP_4096/MODP_8192/MODP_2048/MODP_1024, IKE:AES_GCM_16_128/AES_GCM_16_192/AES_GCM_16_256/AES_GCM_12_128/AES_GCM_12_192/AES_GCM_12_256/AES_GCM_8_128/AES_GCM_8_192/AES_GCM_8_256/PRF_HMAC_SHA2_256/PRF_HMAC_SHA2_384/PRF_HMAC_SHA2_512/PRF_AES128_XCBC/PRF_AES128_CMAC/PRF_HMAC_MD5/PRF_HMAC_SHA1/ECP_256/ECP_384/ECP_521/ECP_256_BP/ECP_384_BP/ECP_512_BP/CURVE_25519/MODP_3072/MODP_4096/MODP_8192/MODP_2048/MODP_1024
Dec 5 11:01:57 charon 15[CFG] <41253> selected proposal: IKE:3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024
Dec 5 11:01:57 charon 15[IKE] <41253> sending XAuth vendor ID
Dec 5 11:01:57 charon 15[IKE] <41253> sending DPD vendor ID
Dec 5 11:01:57 charon 15[ENC] <41253> generating ID_PROT response 0 [ SA V V ]
Dec 5 11:01:57 charon 15[NET] <41253> sending packet: from 50.196.xxx.xxx[500] to 204.8.xxx.xxx[500] (116 bytes)
Dec 5 11:01:58 charon 15[NET] <41253> received packet: from 204.8.xxx.xxx[500] to 50.196.xxx.xxx[500] (184 bytes)
Dec 5 11:01:58 charon 15[ENC] <41253> parsed ID_PROT request 0 [ KE No ]
Dec 5 11:01:58 charon 15[CFG] <41253> candidate "bypasslan", match: 1/1/24 (me/other/ike)
Dec 5 11:01:58 charon 15[IKE] <41253> no shared key found for 50.196.xxx.xxx - 204.8.xxx.xxx
Dec 5 11:01:58 charon 15[IKE] <41253> queueing INFORMATIONAL task
Dec 5 11:01:58 charon 15[IKE] <41253> activating new tasks
Dec 5 11:01:58 charon 15[IKE] <41253> activating INFORMATIONAL task
Dec 5 11:01:58 charon 15[ENC] <41253> generating INFORMATIONAL_V1 request 344791920 [ N(INVAL_KE) ]
Dec 5 11:01:58 charon 15[NET] <41253> sending packet: from 50.196.xxx.xxx[500] to 204.8.xxx.xxx[500] (56 bytes)
Dec 5 11:01:58 charon 15[IKE] <41253> IKE_SA (unnamed)[41253] state change: CONNECTING => DESTROYING
« Last Edit: December 05, 2017, 01:11:37 pm by kapara »
Skype ID:  Marinhd