hEX Lite RB750r2 as L2TP client to Microsoft VPN Server

Hello,
i’m trying to configure hEX Lite RB750r2 6.37.5 as L2TP (with PSK) VPN client to Microsoft VPN Server (2016) with default settings.
The configuration of Mikrotik:

[admin@MikroTik] /ip ipsec proposal> print 
Flags: X - disabled, * - default 
 0    name="IPsec" auth-algorithms=sha256,sha1 enc-algorithms=aes-128-cbc,3des lifetime=16h pfs-group=none



[admin@MikroTik] /interface l2tp-client> print 
Flags: X - disabled, R - running 
 0 X  name="l2tp-out1" max-mtu=1450 max-mru=1450 mrru=1600 connect-to=10.254.1.8 user="domain\username" password="***************" profile=IPsec 
      keepalive-timeout=60 use-ipsec=yes ipsec-secret="***************************" allow-fast-path=no add-default-route=no dial-on-demand=no 
      allow=mschap2



[admin@MikroTik] /ppp profile> print 
Flags: * - default 
 0 * name="default" use-mpls=default use-compression=default use-encryption=default only-one=default change-tcp-mss=yes use-upnp=default address-list="" 
     on-up="" on-down="" 
 1   name="IPsec" use-mpls=default use-compression=default use-encryption=default only-one=default change-tcp-mss=default use-upnp=default address-list="" 
     on-up="" on-down="" 
 2 * name="default-encryption" use-mpls=default use-compression=default use-encryption=yes only-one=default change-tcp-mss=yes use-upnp=default 
     address-list="" on-up="" on-down=""

but during connection i’m getting errors:

12:28:59 system,info device changed by admin 
12:28:59 l2tp,ppp,info l2tp-out1: initializing... 
12:28:59 l2tp,ppp,info l2tp-out1: connecting... 
12:28:59 ipsec,debug 192.168.88.1[500] used as isakmp port (fd=18) 
12:28:59 ipsec,debug 192.168.88.1[4500] used as isakmp port with NAT-T (fd=20) 
12:28:59 ipsec,debug 10.254.1.46[500] used as isakmp port (fd=21) 
12:28:59 ipsec,debug 10.254.1.46[4500] used as isakmp port with NAT-T (fd=22) 
12:28:59 ipsec,error Policy install failed: proposal disabled: ipsec proposal default 
12:28:59 ipsec,debug,packet === 
12:28:59 ipsec,debug initiate new phase 1 negotiation: 10.254.1.46[500]<=>10.254.1.8[500] 
12:28:59 ipsec,debug begin Identity Protection mode. 
12:28:59 ipsec,debug,packet new cookie: 
12:28:59 ipsec,debug,packet b8c828e6dc0e1422  
12:28:59 ipsec,debug,packet add payload of len 172, next type 13 
12:28:59 ipsec,debug,packet add payload of len 16, next type 13 
12:28:59 ipsec,debug,packet add payload of len 16, next type 13 
12:28:59 ipsec,debug,packet add payload of len 16, next type 13 
12:28:59 ipsec,debug,packet add payload of len 16, next type 13 
12:28:59 ipsec,debug,packet add payload of len 16, next type 13 
12:28:59 ipsec,debug,packet add payload of len 16, next type 13 
12:28:59 ipsec,debug,packet add payload of len 16, next type 13 
12:28:59 ipsec,debug,packet add payload of len 16, next type 13 
12:28:59 ipsec,debug,packet add payload of len 16, next type 13 
12:28:59 ipsec,debug,packet add payload of len 16, next type 13 
12:28:59 ipsec,debug,packet add payload of len 16, next type 13 
12:28:59 ipsec,debug,packet add payload of len 16, next type 13 
12:28:59 ipsec,debug,packet add payload of len 16, next type 0 
12:28:59 ipsec,debug,packet 464 bytes from 10.254.1.46[500] to 10.254.1.8[500] 
12:28:59 ipsec,debug,packet sockname 10.254.1.46[500] 
12:28:59 ipsec,debug,packet send packet from 10.254.1.46[500] 
12:28:59 ipsec,debug,packet send packet to 10.254.1.8[500] 
12:28:59 ipsec,debug,packet src4 10.254.1.46[500] 
12:28:59 ipsec,debug,packet dst4 10.254.1.8[500] 
12:28:59 ipsec,debug,packet 1 times of 464 bytes message will be sent to 10.254.1.8[500] 
12:28:59 ipsec,debug,packet b8c828e6 dc0e1422 00000000 00000000 01100200 00000000 000001d0 0d0000b0 
12:28:59 ipsec,debug,packet 00000001 00000001 000000a4 01010004 03000028 01010000 800b0001 000c0004 
12:28:59 ipsec,debug,packet 00015180 80010007 800e0100 80030001 80020002 80040002 03000028 02010000 
12:28:59 ipsec,debug,packet 800b0001 000c0004 00015180 80010007 800e00c0 80030001 80020002 80040002 
12:28:59 ipsec,debug,packet 03000028 03010000 800b0001 000c0004 00015180 80010007 800e0080 80030001 
12:28:59 ipsec,debug,packet 80020002 80040002 00000024 04010000 800b0001 000c0004 00015180 80010005 
12:28:59 ipsec,debug,packet 80030001 80020002 80040002 0d000014 4a131c81 07035845 5c5728f2 0e95452f 
12:28:59 ipsec,debug,packet 0d000014 8f8d8382 6d246b6f c7a8a6a4 28c11de8 0d000014 439b59f8 ba676c4c 
12:28:59 ipsec,debug,packet 7737ae22 eab8f582 0d000014 4d1e0e13 6deafa34 c4f3ea9f 02ec7285 0d000014 
12:28:59 ipsec,debug,packet 80d0bb3d ef54565e e84645d4 c85ce3ee 0d000014 9909b64e ed937c65 73de52ac 
12:28:59 ipsec,debug,packet e952fa6b 0d000014 7d9419a6 5310ca6f 2c179d92 15529d56 0d000014 cd604643 
12:28:59 ipsec,debug,packet 35df21f8 7cfdb2fc 68b6a448 0d000014 90cb8091 3ebb696e 086381b5 ec427b1f 
12:28:59 ipsec,debug,packet 0d000014 16f6ca16 e4a4066d 83821a0f 0aeaa862 0d000014 4485152d 18b6bbcd 
12:28:59 ipsec,debug,packet 0be8a846 9579ddcc 0d000014 12f5f28c 457168a9 702d9fe2 74cc0100 00000014 
12:28:59 ipsec,debug,packet afcad713 68a1f1c9 6b8696fc 77570100 
12:28:59 ipsec,debug sent phase1 packet 10.254.1.46[500]<=>10.254.1.8[500] b8c828e6dc0e1422:0000000000000000 
12:28:59 ipsec,debug,packet ========== 
12:28:59 ipsec,debug,packet 208 bytes message received from 10.254.1.8[500] to 10.254.1.46[500] 
12:28:59 ipsec,debug,packet b8c828e6 dc0e1422 75d0433c 626168c2 01100200 00000000 000000d0 0d000038 
12:28:59 ipsec,debug,packet 00000001 00000001 0000002c 01010001 00000024 04010000 80010005 80020002 
12:28:59 ipsec,debug,packet 80040002 80030001 800b0001 000c0004 00015180 0d000018 1e2b5169 05991c7d 
12:28:59 ipsec,debug,packet 7c96fcbf b587e461 00000009 0d000014 4a131c81 07035845 5c5728f2 0e95452f 
12:28:59 ipsec,debug,packet 0d000014 90cb8091 3ebb696e 086381b5 ec427b1f 0d000014 4048b7d5 6ebce885 
12:28:59 ipsec,debug,packet 25e7de7f 00d6c2d3 0d000014 fb1de3cd f341b7ea 16b7e5be 0855f120 00000014 
12:28:59 ipsec,debug,packet e3a5966a 76379fe7 07228231 e5ce8652 
12:28:59 ipsec,debug,packet begin. 
12:28:59 ipsec,debug,packet seen nptype=1(sa) len=56 
12:28:59 ipsec,debug,packet seen nptype=13(vid) len=24 
12:28:59 ipsec,debug,packet seen nptype=13(vid) len=20 
12:28:59 ipsec,debug,packet seen nptype=13(vid) len=20 
12:28:59 ipsec,debug,packet seen nptype=13(vid) len=20 
12:28:59 ipsec,debug,packet seen nptype=13(vid) len=20 
12:28:59 ipsec,debug,packet seen nptype=13(vid) len=20 
12:28:59 ipsec,debug,packet succeed. 
12:28:59 ipsec,debug received long Microsoft ID: MS NT5 ISAKMPOAKLEY 
12:28:59 ipsec,debug received Vendor ID: RFC 3947 
12:28:59 ipsec,debug received Vendor ID: draft-ietf-ipsec-nat-t-ike-02 
12:28:59 ipsec,debug 
12:28:59 ipsec,debug received Vendor ID: FRAGMENTATION 
12:28:59 ipsec,debug,packet received unknown Vendor ID 
12:28:59 ipsec,debug,packet fb1de3cd f341b7ea 16b7e5be 0855f120 
12:28:59 ipsec,debug,packet received unknown Vendor ID 
12:28:59 ipsec,debug,packet e3a5966a 76379fe7 07228231 e5ce8652 
12:28:59 ipsec,debug 10.254.1.8 Selected NAT-T version: RFC 3947 
12:28:59 ipsec,debug,packet total SA len=52 
12:28:59 ipsec,debug,packet 00000001 00000001 0000002c 01010001 00000024 04010000 80010005 80020002 
12:28:59 ipsec,debug,packet 80040002 80030001 800b0001 000c0004 00015180 
12:28:59 ipsec,debug,packet begin. 
12:28:59 ipsec,debug,packet seen nptype=2(prop) len=44 
12:28:59 ipsec,debug,packet succeed. 
12:28:59 ipsec,debug,packet proposal #1 len=44 
12:28:59 ipsec,debug,packet begin. 
12:28:59 ipsec,debug,packet seen nptype=3(trns) len=36 
12:28:59 ipsec,debug,packet succeed. 
12:28:59 ipsec,debug,packet transform #4 len=36 
12:28:59 ipsec,debug,packet type=Encryption Algorithm, flag=0x8000, lorv=3DES-CBC 
12:28:59 ipsec,debug,packet encryption(3des) 
12:28:59 ipsec,debug,packet type=Hash Algorithm, flag=0x8000, lorv=SHA 
12:28:59 ipsec,debug,packet hash(sha1) 
12:28:59 ipsec,debug,packet type=Group Description, flag=0x8000, lorv=1024-bit MODP group 
12:28:59 ipsec,debug,packet dh(modp1024) 
12:28:59 ipsec,debug,packet type=Authentication Method, flag=0x8000, lorv=pre-shared key 
12:28:59 ipsec,debug,packet type=Life Type, flag=0x8000, lorv=seconds 
12:28:59 ipsec,debug,packet type=Life Duration, flag=0x0000, lorv=4 
12:28:59 ipsec,debug,packet pair 1: 
12:28:59 ipsec,debug,packet  0x4779f0: next=(nil) tnext=(nil) 
12:28:59 ipsec,debug,packet proposal #1: 1 transform 
12:28:59 ipsec,debug,packet prop#=1, prot-id=ISAKMP, spi-size=0, #trns=1 
12:28:59 ipsec,debug,packet trns#=4, trns-id=IKE 
12:28:59 ipsec,debug,packet type=Encryption Algorithm, flag=0x8000, lorv=3DES-CBC 
12:28:59 ipsec,debug,packet type=Hash Algorithm, flag=0x8000, lorv=SHA 
12:28:59 ipsec,debug,packet type=Group Description, flag=0x8000, lorv=1024-bit MODP group 
12:28:59 ipsec,debug,packet type=Authentication Method, flag=0x8000, lorv=pre-shared key 
12:28:59 ipsec,debug,packet type=Life Type, flag=0x8000, lorv=seconds 
12:28:59 ipsec,debug,packet type=Life Duration, flag=0x0000, lorv=4 
12:28:59 ipsec,debug,packet Compared: Local:Peer 
12:28:59 ipsec,debug,packet (lifetime = 86400:86400) 
12:28:59 ipsec,debug,packet (lifebyte = 0:0) 
12:28:59 ipsec,debug,packet enctype = AES-CBC:3DES-CBC 
12:28:59 ipsec,debug,packet (encklen = 256:0) 
12:28:59 ipsec,debug,packet hashtype = SHA:SHA 
12:28:59 ipsec,debug,packet authmethod = pre-shared key:pre-shared key 
12:28:59 ipsec,debug,packet dh_group = 1024-bit MODP group:1024-bit MODP group 
12:28:59 ipsec,debug,packet Compared: Local:Peer 
12:28:59 ipsec,debug,packet (lifetime = 86400:86400) 
12:28:59 ipsec,debug,packet (lifebyte = 0:0) 
12:28:59 ipsec,debug,packet enctype = AES-CBC:3DES-CBC 
12:28:59 ipsec,debug,packet (encklen = 192:0) 
12:28:59 ipsec,debug,packet hashtype = SHA:SHA 
12:28:59 ipsec,debug,packet authmethod = pre-shared key:pre-shared key 
12:28:59 ipsec,debug,packet dh_group = 1024-bit MODP group:1024-bit MODP group 
12:28:59 ipsec,debug,packet Compared: Local:Peer 
12:28:59 ipsec,debug,packet (lifetime = 86400:86400) 
12:28:59 ipsec,debug,packet (lifebyte = 0:0) 
12:28:59 ipsec,debug,packet enctype = AES-CBC:3DES-CBC 
12:28:59 ipsec,debug,packet (encklen = 128:0) 
12:28:59 ipsec,debug,packet hashtype = SHA:SHA 
12:28:59 ipsec,debug,packet authmethod = pre-shared key:pre-shared key 
12:28:59 ipsec,debug,packet dh_group = 1024-bit MODP group:1024-bit MODP group 
12:28:59 ipsec,debug,packet Compared: Local:Peer 
12:28:59 ipsec,debug,packet (lifetime = 86400:86400) 
12:28:59 ipsec,debug,packet (lifebyte = 0:0) 
12:28:59 ipsec,debug,packet enctype = 3DES-CBC:3DES-CBC 
12:28:59 ipsec,debug,packet (encklen = 0:0) 
12:28:59 ipsec,debug,packet hashtype = SHA:SHA 
12:28:59 ipsec,debug,packet authmethod = pre-shared key:pre-shared key 
12:28:59 ipsec,debug,packet dh_group = 1024-bit MODP group:1024-bit MODP group 
12:28:59 ipsec,debug,packet an acceptable proposal found. 
12:28:59 ipsec,debug,packet dh(modp1024) 
12:28:59 ipsec,debug,packet agreed on pre-shared key auth. 
12:28:59 ipsec,debug,packet === 
12:28:59 ipsec,debug,packet dh(modp1024) 
12:28:59 ipsec,debug,packet compute DH's private. 
12:28:59 ipsec,debug,packet 7dba78d6 451ae302 9e320319 e8f930ff c04645ba c4652472 23a31c85 c756a93e 
12:28:59 ipsec,debug,packet ab619d12 e2527e2d 6ceabc3c b0d2f42e 84fb9b42 ad690e91 954a1fbf b3520fb6 
12:28:59 ipsec,debug,packet b390cb1c a260bb55 9b868283 37650e8d b95bc189 f800090b f5fde757 d2ce9b8b 
12:28:59 ipsec,debug,packet 235303df 136dd7c3 4d74ab66 80937db9 274bec69 2b6acaae 1fb2c27e ad231b42 
12:28:59 ipsec,debug,packet compute DH's public. 
12:28:59 ipsec,debug,packet 56593bce 478284ef 52ccc6d5 2155d9c6 7dfd0f7b c2bbc1e2 b2b89380 abe0f496 
12:28:59 ipsec,debug,packet 9765b446 7409b05b 9def6b96 689026e5 4ba150ab 602c7b59 f7940f6c b3671dc3 
12:28:59 ipsec,debug,packet 7fa6278d 41e3bac7 0cda9864 ba67d433 fdc1372f 1008eccd 1683d244 5e7d9df8 
12:28:59 ipsec,debug,packet 5bc6e0fd 09b6c162 83d7ee77 9ed1fe64 13457d14 5c4b967d fe62aa00 246a90d2 
12:28:59 ipsec,debug 10.254.1.8 Hashing 10.254.1.8[500] with algo #2  
12:28:59 ipsec,debug,packet hash(sha1) 
12:28:59 ipsec,debug 10.254.1.46 Hashing 10.254.1.46[500] with algo #2  
12:28:59 ipsec,debug,packet hash(sha1) 
12:28:59 ipsec,debug Adding remote and local NAT-D payloads. 
12:28:59 ipsec,debug,packet add payload of len 128, next type 10 
12:28:59 ipsec,debug,packet add payload of len 24, next type 20 
12:28:59 ipsec,debug,packet add payload of len 20, next type 20 
12:28:59 ipsec,debug,packet add payload of len 20, next type 0 
12:28:59 ipsec,debug,packet 236 bytes from 10.254.1.46[500] to 10.254.1.8[500] 
12:28:59 ipsec,debug,packet sockname 10.254.1.46[500] 
12:28:59 ipsec,debug,packet send packet from 10.254.1.46[500] 
12:28:59 ipsec,debug,packet send packet to 10.254.1.8[500] 
12:28:59 ipsec,debug,packet src4 10.254.1.46[500] 
12:28:59 ipsec,debug,packet dst4 10.254.1.8[500] 
12:28:59 ipsec,debug,packet 1 times of 236 bytes message will be sent to 10.254.1.8[500] 
12:28:59 ipsec,debug,packet b8c828e6 dc0e1422 75d0433c 626168c2 04100200 00000000 000000ec 0a000084 
12:28:59 ipsec,debug,packet 56593bce 478284ef 52ccc6d5 2155d9c6 7dfd0f7b c2bbc1e2 b2b89380 abe0f496 
12:28:59 ipsec,debug,packet 9765b446 7409b05b 9def6b96 689026e5 4ba150ab 602c7b59 f7940f6c b3671dc3 
12:28:59 ipsec,debug,packet 7fa6278d 41e3bac7 0cda9864 ba67d433 fdc1372f 1008eccd 1683d244 5e7d9df8 
12:28:59 ipsec,debug,packet 5bc6e0fd 09b6c162 83d7ee77 9ed1fe64 13457d14 5c4b967d fe62aa00 246a90d2 
12:28:59 ipsec,debug,packet 1400001c c70e1e71 74bc9886 9a88d27e a947d62d d0feba12 f3d1cdb9 14000018 
12:28:59 ipsec,debug,packet dd553fca 67955100 c4be3d8b 8eee9529 79162556 00000018 977914bd e270c1a3 
12:28:59 ipsec,debug,packet 225d2bc3 8b751694 03eaa58b 
12:28:59 ipsec,debug sent phase1 packet 10.254.1.46[500]<=>10.254.1.8[500] b8c828e6dc0e1422:75d0433c626168c2 
12:28:59 ipsec,debug,packet ========== 
12:28:59 ipsec,debug,packet 260 bytes message received from 10.254.1.8[500] to 10.254.1.46[500] 
12:28:59 ipsec,debug,packet b8c828e6 dc0e1422 75d0433c 626168c2 04100200 00000000 00000104 0a000084 
12:28:59 ipsec,debug,packet 65f8422c cf034658 43f8e44a 1992e6d4 8ada99db 4cd35de7 2b5fbb9c d1307391 
12:28:59 ipsec,debug,packet 04103743 7b223f41 d66316b0 42afe269 f4fc5f4b 1d6a9291 d39bc0dc 1c2191b4 
12:28:59 ipsec,debug,packet 93412b3d 6e73bbf7 133981dc 24f91bb6 e00764cc 116c65d6 d8a0c354 56969871 
12:28:59 ipsec,debug,packet 9bd1328a a6a6647c e8c7689d a4c10f6d a337b14b dbb7f80f 128507e3 e4a08fd4 
12:28:59 ipsec,debug,packet 14000034 962c3c9c 2a85108a f34590e8 076294f8 002c7235 cc11d89c 9eefe080 
12:28:59 ipsec,debug,packet 0be3454d 78226fd5 980ff376 8dcc05f4 6f83580a 14000018 977914bd e270c1a3 
12:28:59 ipsec,debug,packet 225d2bc3 8b751694 03eaa58b 00000018 dd553fca 67955100 c4be3d8b 8eee9529 
12:28:59 ipsec,debug,packet 79162556 
12:28:59 ipsec,debug,packet begin. 
12:28:59 ipsec,debug,packet seen nptype=4(ke) len=132 
12:28:59 ipsec,debug,packet seen nptype=10(nonce) len=52 
12:28:59 ipsec,debug,packet seen nptype=20(nat-d) len=24 
12:28:59 ipsec,debug,packet seen nptype=20(nat-d) len=24 
12:28:59 ipsec,debug,packet succeed. 
12:28:59 ipsec,debug 10.254.1.46 Hashing 10.254.1.46[500] with algo #2  
12:28:59 ipsec,debug,packet hash(sha1) 
12:28:59 ipsec,debug NAT-D payload #0 verified 
12:28:59 ipsec,debug 10.254.1.8 Hashing 10.254.1.8[500] with algo #2  
12:28:59 ipsec,debug,packet hash(sha1) 
12:28:59 ipsec,debug NAT-D payload #1 verified 
12:28:59 ipsec,debug NAT not detected  
12:28:59 ipsec,debug,packet === 
12:28:59 ipsec,debug,packet dh(modp1024) 
12:28:59 ipsec,debug,packet compute DH's shared. 
12:28:59 ipsec,debug,packet 
12:28:59 ipsec,debug,packet 9b2fbd12 43bf1e19 f6db1655 719dd9db 1d863f38 63edb007 74ceb4f9 93c89b68 
12:28:59 ipsec,debug,packet 24a6201e 9cc1a04b 22e0ff08 4254ee13 ee91505b b845864e d32080a0 38ab8bd8 
12:28:59 ipsec,debug,packet e216189c 46e7122c 42f96e70 45dfedc0 9d877428 0a8f0f5f eca4a124 0b412e86 
12:28:59 ipsec,debug,packet 4673adb1 b9c9dce7 a0319c7f ac4d9d74 5ed47ad3 23f9798e 536640b3 865dba87 
12:28:59 ipsec,debug,packet the psk found. 
12:28:59 ipsec,debug,packet nonce 1:  
12:28:59 ipsec,debug,packet c70e1e71 74bc9886 9a88d27e a947d62d d0feba12 f3d1cdb9 
12:28:59 ipsec,debug,packet nonce 2:  
12:28:59 ipsec,debug,packet 962c3c9c 2a85108a f34590e8 076294f8 002c7235 cc11d89c 9eefe080 0be3454d 
12:28:59 ipsec,debug,packet 78226fd5 980ff376 8dcc05f4 6f83580a 
12:28:59 ipsec,debug,packet hmac(hmac_sha1) 
12:28:59 ipsec,debug,packet SKEYID computed: 
12:28:59 ipsec,debug,packet 49a85c5b e8588b0a 172d429c 179482f3 8a0f53d3 
12:28:59 ipsec,debug,packet hmac(hmac_sha1) 
12:28:59 ipsec,debug,packet SKEYID_d computed: 
12:28:59 ipsec,debug,packet 4e929dc7 64456752 c688a998 4c53bcc1 afa9756d 
12:28:59 ipsec,debug,packet hmac(hmac_sha1) 
12:28:59 ipsec,debug,packet SKEYID_a computed: 
12:28:59 ipsec,debug,packet 050ef70e c96c99e6 38b644d9 a258622b b9ddcf80 
12:28:59 ipsec,debug,packet hmac(hmac_sha1) 
12:28:59 ipsec,debug,packet SKEYID_e computed: 
12:28:59 ipsec,debug,packet 8f759b56 7dc658bd d2cf1093 71ff5134 771ac1e2 
12:28:59 ipsec,debug,packet encryption(3des) 
12:28:59 ipsec,debug,packet hash(sha1) 
12:28:59 ipsec,debug,packet len(SKEYID_e) < len(Ka) (20 < 24), generating long key (Ka = K1 | K2 | ...) 
12:28:59 ipsec,debug,packet hmac(hmac_sha1) 
12:28:59 ipsec,debug,packet compute intermediate encryption key K1 
12:28:59 ipsec,debug,packet 00 
12:28:59 ipsec,debug,packet 599d8e11 5a16f166 943b9bab 603ef452 c3ee0b9f 
12:28:59 ipsec,debug,packet hmac(hmac_sha1) 
12:28:59 ipsec,debug,packet compute intermediate encryption key K2 
12:28:59 ipsec,debug,packet 599d8e11 5a16f166 943b9bab 603ef452 c3ee0b9f 
12:28:59 ipsec,debug,packet e82a3fd1 fe0f194f 09b6658b 2c7ca31f bea23f87 
12:28:59 ipsec,debug,packet final encryption key computed: 
12:28:59 ipsec,debug,packet 599d8e11 5a16f166 943b9bab 603ef452 c3ee0b9f e82a3fd1 
12:28:59 ipsec,debug,packet hash(sha1) 
12:28:59 ipsec,debug,packet encryption(3des) 
12:28:59 ipsec,debug,packet IV computed: 
12:28:59 ipsec,debug,packet 8676939e d9252620 
12:28:59 ipsec,debug,packet use ID type of IPv4_address 
12:28:59 ipsec,debug,packet HASH with: 
12:28:59 ipsec,debug,packet 56593bce 478284ef 52ccc6d5 2155d9c6 7dfd0f7b c2bbc1e2 b2b89380 abe0f496 
12:28:59 ipsec,debug,packet 9765b446 7409b05b 9def6b96 689026e5 4ba150ab 602c7b59 f7940f6c b3671dc3 
12:28:59 ipsec,debug,packet 7fa6278d 41e3bac7 0cda9864 ba67d433 fdc1372f 1008eccd 1683d244 5e7d9df8 
12:28:59 ipsec,debug,packet 5bc6e0fd 09b6c162 83d7ee77 9ed1fe64 13457d14 5c4b967d fe62aa00 246a90d2 
12:28:59 ipsec,debug,packet 65f8422c cf034658 43f8e44a 1992e6d4 8ada99db 4cd35de7 2b5fbb9c d1307391 
12:28:59 ipsec,debug,packet 04103743 7b223f41 d66316b0 42afe269 f4fc5f4b 1d6a9291 d39bc0dc 1c2191b4 
12:28:59 ipsec,debug,packet 93412b3d 6e73bbf7 133981dc 24f91bb6 e00764cc 116c65d6 d8a0c354 56969871 
12:28:59 ipsec,debug,packet 9bd1328a a6a6647c e8c7689d a4c10f6d a337b14b dbb7f80f 128507e3 e4a08fd4 
12:28:59 ipsec,debug,packet b8c828e6 dc0e1422 75d0433c 626168c2 00000001 00000001 000000a4 01010004 
12:28:59 ipsec,debug,packet 03000028 01010000 800b0001 000c0004 00015180 80010007 800e0100 80030001 
12:28:59 ipsec,debug,packet 80020002 80040002 03000028 02010000 800b0001 000c0004 00015180 80010007 
12:28:59 ipsec,debug,packet 800e00c0 80030001 80020002 80040002 03000028 03010000 800b0001 000c0004 
12:28:59 ipsec,debug,packet 00015180 80010007 800e0080 80030001 80020002 80040002 00000024 04010000 
12:28:59 ipsec,debug,packet 800b0001 000c0004 00015180 80010005 80030001 80020002 80040002 011101f4 
12:28:59 ipsec,debug,packet 0afe012e 
12:28:59 ipsec,debug,packet hmac(hmac_sha1) 
12:28:59 ipsec,debug,packet HASH computed: 
12:28:59 ipsec,debug,packet 2eda0ceb 82f99487 c53c2239 0d8448aa aa1595ef 
12:28:59 ipsec,debug,packet add payload of len 8, next type 8 
12:28:59 ipsec,debug,packet add payload of len 20, next type 0 
12:28:59 ipsec,debug,packet begin encryption. 
12:28:59 ipsec,debug,packet encryption(3des) 
12:28:59 ipsec,debug,packet pad length = 4 
12:28:59 ipsec,debug,packet 0800000c 011101f4 0afe012e 00000018 2eda0ceb 82f99487 c53c2239 0d8448aa 
12:28:59 ipsec,debug,packet aa1595ef 1231e203 
12:28:59 ipsec,debug,packet encryption(3des) 
12:28:59 ipsec,debug,packet with key: 
12:28:59 ipsec,debug,packet 599d8e11 5a16f166 943b9bab 603ef452 c3ee0b9f e82a3fd1 
12:28:59 ipsec,debug,packet encrypted payload by IV: 
12:28:59 ipsec,debug,packet 8676939e d9252620 
12:28:59 ipsec,debug,packet save IV for next: 
12:28:59 ipsec,debug,packet db139be3 c7b167d5 
12:28:59 ipsec,debug,packet encrypted. 
12:28:59 ipsec,debug,packet 68 bytes from 10.254.1.46[500] to 10.254.1.8[500] 
12:28:59 ipsec,debug,packet sockname 10.254.1.46[500] 
12:28:59 ipsec,debug,packet send packet from 10.254.1.46[500] 
12:28:59 ipsec,debug,packet send packet to 10.254.1.8[500] 
12:28:59 ipsec,debug,packet src4 10.254.1.46[500] 
12:28:59 ipsec,debug,packet dst4 10.254.1.8[500] 
12:28:59 ipsec,debug,packet 1 times of 68 bytes message will be sent to 10.254.1.8[500] 
12:28:59 ipsec,debug,packet b8c828e6 dc0e1422 75d0433c 626168c2 05100201 00000000 00000044 0e85416e 
12:28:59 ipsec,debug,packet 8863a3b3 29104958 62879929 2f293c1e b123635e adafba55 2ee78908 db139be3 
12:28:59 ipsec,debug,packet c7b167d5 
12:28:59 ipsec,debug sent phase1 packet 10.254.1.46[500]<=>10.254.1.8[500] b8c828e6dc0e1422:75d0433c626168c2 
12:28:59 ipsec,debug,packet ========== 
12:28:59 ipsec,debug,packet 68 bytes message received from 10.254.1.8[500] to 10.254.1.46[500] 
12:28:59 ipsec,debug,packet b8c828e6 dc0e1422 75d0433c 626168c2 05100201 00000000 00000044 d641e000 
12:28:59 ipsec,debug,packet f43f64cb f0510906 ece58bbb 362930e1 634cd95a 35b025c2 cdc28943 bb7deaa8 
12:28:59 ipsec,debug,packet ea00173b 
12:28:59 ipsec,debug,packet encryption(3des) 
12:28:59 ipsec,debug,packet IV was saved for next processing: 
12:28:59 ipsec,debug,packet bb7deaa8 ea00173b 
12:28:59 ipsec,debug,packet encryption(3des) 
12:28:59 ipsec,debug,packet with key: 
12:28:59 ipsec,debug,packet 599d8e11 5a16f166 943b9bab 603ef452 c3ee0b9f e82a3fd1 
12:28:59 ipsec,debug,packet decrypted payload by IV: 
12:28:59 ipsec,debug,packet db139be3 c7b167d5 
12:28:59 ipsec,debug,packet decrypted payload, but not trimed. 
12:28:59 ipsec,debug,packet 0800000c 01000000 0afe0108 00000018 5a902909 e8233985 b0547b7e 4bd383fe 
12:28:59 ipsec,debug,packet 8f1dbadc 00000000 
12:28:59 ipsec,debug,packet padding len=1 
12:28:59 ipsec,debug,packet skip to trim padding. 
12:28:59 ipsec,debug,packet decrypted. 
12:28:59 ipsec,debug,packet b8c828e6 dc0e1422 75d0433c 626168c2 05100201 00000000 00000044 0800000c 
12:28:59 ipsec,debug,packet 01000000 0afe0108 00000018 5a902909 e8233985 b0547b7e 4bd383fe 8f1dbadc 
12:28:59 ipsec,debug,packet 00000000 
12:28:59 ipsec,debug,packet begin. 
12:28:59 ipsec,debug,packet seen nptype=5(id) len=12 
12:28:59 ipsec,debug,packet seen nptype=8(hash) len=24 
12:28:59 ipsec,debug,packet succeed. 
12:28:59 ipsec,debug,packet HASH received: 
12:28:59 ipsec,debug,packet 5a902909 e8233985 b0547b7e 4bd383fe 8f1dbadc 
12:28:59 ipsec,debug,packet HASH with: 
12:28:59 ipsec,debug,packet 65f8422c cf034658 43f8e44a 1992e6d4 8ada99db 4cd35de7 2b5fbb9c d1307391 
12:28:59 ipsec,debug,packet 04103743 7b223f41 d66316b0 42afe269 f4fc5f4b 1d6a9291 d39bc0dc 1c2191b4 
12:28:59 ipsec,debug,packet 93412b3d 6e73bbf7 133981dc 24f91bb6 e00764cc 116c65d6 d8a0c354 56969871 
12:28:59 ipsec,debug,packet 9bd1328a a6a6647c e8c7689d a4c10f6d a337b14b dbb7f80f 128507e3 e4a08fd4 
12:28:59 ipsec,debug,packet 56593bce 478284ef 52ccc6d5 2155d9c6 7dfd0f7b c2bbc1e2 b2b89380 abe0f496 
12:28:59 ipsec,debug,packet 9765b446 7409b05b 9def6b96 689026e5 4ba150ab 602c7b59 f7940f6c b3671dc3 
12:28:59 ipsec,debug,packet 7fa6278d 41e3bac7 0cda9864 ba67d433 fdc1372f 1008eccd 1683d244 5e7d9df8 
12:28:59 ipsec,debug,packet 5bc6e0fd 09b6c162 83d7ee77 9ed1fe64 13457d14 5c4b967d fe62aa00 246a90d2 
12:28:59 ipsec,debug,packet 75d0433c 626168c2 b8c828e6 dc0e1422 00000001 00000001 000000a4 01010004 
12:28:59 ipsec,debug,packet 03000028 01010000 800b0001 000c0004 00015180 80010007 800e0100 80030001 
12:28:59 ipsec,debug,packet 80020002 80040002 03000028 02010000 800b0001 000c0004 00015180 80010007 
12:28:59 ipsec,debug,packet 800e00c0 80030001 80020002 80040002 03000028 03010000 800b0001 000c0004 
12:28:59 ipsec,debug,packet 00015180 80010007 800e0080 80030001 80020002 80040002 00000024 04010000 
12:28:59 ipsec,debug,packet 800b0001 000c0004 00015180 80010005 80030001 80020002 80040002 01000000 
12:28:59 ipsec,debug,packet 0afe0108 
12:28:59 ipsec,debug,packet hmac(hmac_sha1) 
12:28:59 ipsec,debug,packet HASH computed: 
12:28:59 ipsec,debug,packet 5a902909 e8233985 b0547b7e 4bd383fe 8f1dbadc 
12:28:59 ipsec,debug,packet HASH for PSK validated. 
12:28:59 ipsec,debug,packet 10.254.1.8 peer's ID: 
12:28:59 ipsec,debug,packet 01000000 0afe0108 
12:28:59 ipsec,debug,packet === 
12:28:59 ipsec,debug,packet compute IV for phase2 
12:28:59 ipsec,debug,packet phase1 last IV: 
12:28:59 ipsec,debug,packet bb7deaa8 ea00173b 871b4f5e 
12:28:59 ipsec,debug,packet hash(sha1) 
12:28:59 ipsec,debug,packet encryption(3des) 
12:28:59 ipsec,debug,packet phase2 IV computed: 
12:28:59 ipsec,debug,packet 3e70dd79 965e87dd 
12:28:59 ipsec,debug,packet HASH with: 
12:28:59 ipsec,debug,packet 871b4f5e 0000001c 00000001 01106002 b8c828e6 dc0e1422 75d0433c 626168c2 
12:28:59 ipsec,debug,packet hmac(hmac_sha1) 
12:28:59 ipsec,debug,packet HASH computed: 
12:28:59 ipsec,debug,packet 57ff0d0d 6c62a39c fe693533 d2ba252e 88fa6ca2 
12:28:59 ipsec,debug,packet begin encryption. 
12:28:59 ipsec,debug,packet encryption(3des) 
12:28:59 ipsec,debug,packet pad length = 4 
12:28:59 ipsec,debug,packet 0b000018 57ff0d0d 6c62a39c fe693533 d2ba252e 88fa6ca2 0000001c 00000001 
12:28:59 ipsec,debug,packet 01106002 b8c828e6 dc0e1422 75d0433c 626168c2 ad095203 
12:28:59 ipsec,debug,packet encryption(3des) 
12:28:59 ipsec,debug,packet with key: 
12:28:59 ipsec,debug,packet 599d8e11 5a16f166 943b9bab 603ef452 c3ee0b9f e82a3fd1 
12:28:59 ipsec,debug,packet encrypted payload by IV: 
12:28:59 ipsec,debug,packet 3e70dd79 965e87dd 
12:28:59 ipsec,debug,packet save IV for next: 
12:28:59 ipsec,debug,packet 37429623 c39cb57e 
12:28:59 ipsec,debug,packet encrypted. 
12:28:59 ipsec,debug,packet 84 bytes from 10.254.1.46[500] to 10.254.1.8[500] 
12:28:59 ipsec,debug,packet sockname 10.254.1.46[500] 
12:28:59 ipsec,debug,packet send packet from 10.254.1.46[500] 
12:28:59 ipsec,debug,packet send packet to 10.254.1.8[500] 
12:28:59 ipsec,debug,packet src4 10.254.1.46[500] 
12:28:59 ipsec,debug,packet dst4 10.254.1.8[500] 
12:28:59 ipsec,debug,packet 1 times of 84 bytes message will be sent to 10.254.1.8[500] 
12:28:59 ipsec,debug,packet b8c828e6 dc0e1422 75d0433c 626168c2 08100501 871b4f5e 00000054 2f3f97aa 
12:28:59 ipsec,debug,packet 5a5fe12f f99dc727 1e9ff981 9ce5d5ff 49ab8d3a c43cb67d 16eb1f97 6d659c1d 
12:28:59 ipsec,debug,packet a2991a73 ae1955a2 f4bceb7e 37429623 c39cb57e 
12:28:59 ipsec,debug,packet sendto Information notify. 
12:28:59 ipsec,debug ISAKMP-SA established 10.254.1.46[500]-10.254.1.8[500] spi:b8c828e6dc0e1422:75d0433c626168c2 
12:28:59 ipsec,debug,packet === 
12:29:23 l2tp,ppp,info l2tp-out1: terminating... - session closed 
12:29:23 l2tp,ppp,info l2tp-out1: disconnected 
12:29:23 l2tp,ppp,info l2tp-out1: initializing... 
12:29:23 l2tp,ppp,info l2tp-out1: connecting... 
12:29:23 l2tp,ppp,info l2tp-out1: terminating... - old tunnel is not closed yet 
12:29:23 l2tp,ppp,info l2tp-out1: disconnected 
12:29:23 l2tp,ppp,info l2tp-out1: initializing... 
12:29:23 l2tp,ppp,info l2tp-out1: connecting... 
12:29:47 l2tp,ppp,info l2tp-out1: terminating... - session closed 
12:29:47 l2tp,ppp,info l2tp-out1: disconnected 
12:29:48 l2tp,ppp,info l2tp-out1: initializing... 
12:29:48 l2tp,ppp,info l2tp-out1: connecting... 
12:30:12 l2tp,ppp,info l2tp-out1: terminating... - session closed 
12:30:12 l2tp,ppp,info l2tp-out1: disconnected 
12:30:13 ipsec,debug,packet Removing PH1... 
12:30:13 ipsec,debug,packet compute IV for phase2 
12:30:13 ipsec,debug,packet phase1 last IV: 
12:30:13 ipsec,debug,packet bb7deaa8 ea00173b f36267f8 
12:30:13 ipsec,debug,packet hash(sha1) 
12:30:13 ipsec,debug,packet encryption(3des) 
12:30:13 ipsec,debug,packet phase2 IV computed: 
12:30:13 ipsec,debug,packet 62b4d4f9 866c2abe 
12:30:13 ipsec,debug,packet HASH with: 
12:30:13 ipsec,debug,packet f36267f8 0000001c 00000001 01100001 b8c828e6 dc0e1422 75d0433c 626168c2 
12:30:13 ipsec,debug,packet hmac(hmac_sha1) 
12:30:13 ipsec,debug,packet HASH computed: 
12:30:13 ipsec,debug,packet 80df8508 132959d8 dab0f642 914a9a9b 0307013d 
12:30:13 ipsec,debug,packet begin encryption. 
12:30:13 ipsec,debug,packet encryption(3des) 
12:30:13 ipsec,debug,packet pad length = 4 
12:30:13 ipsec,debug,packet 0c000018 80df8508 132959d8 dab0f642 914a9a9b 0307013d 0000001c 00000001 
12:30:13 ipsec,debug,packet 01100001 b8c828e6 dc0e1422 75d0433c 626168c2 adc86603 
12:30:13 ipsec,debug,packet encryption(3des) 
12:30:13 ipsec,debug,packet with key: 
12:30:13 ipsec,debug,packet 599d8e11 5a16f166 943b9bab 603ef452 c3ee0b9f e82a3fd1 
12:30:13 ipsec,debug,packet encrypted payload by IV: 
12:30:13 ipsec,debug,packet 62b4d4f9 866c2abe 
12:30:13 ipsec,debug,packet save IV for next: 
12:30:13 ipsec,debug,packet 4a3e740f d3a6c5c5 
12:30:13 ipsec,debug,packet encrypted. 
12:30:13 ipsec,debug,packet 84 bytes from 10.254.1.46[500] to 10.254.1.8[500] 
12:30:13 ipsec,debug,packet sockname 10.254.1.46[500] 
12:30:13 ipsec,debug,packet send packet from 10.254.1.46[500] 
12:30:13 ipsec,debug,packet send packet to 10.254.1.8[500] 
12:30:13 ipsec,debug,packet src4 10.254.1.46[500] 
12:30:13 ipsec,debug,packet dst4 10.254.1.8[500] 
12:30:13 ipsec,debug,packet 1 times of 84 bytes message will be sent to 10.254.1.8[500] 
12:30:13 ipsec,debug,packet b8c828e6 dc0e1422 75d0433c 626168c2 08100501 f36267f8 00000054 07037d07 
12:30:13 ipsec,debug,packet 6a62241c fd8041d4 289d3e16 c802efa4 53445630 b42e191b c61b00e0 06ae780b 
12:30:13 ipsec,debug,packet 1aa1ac48 80f06e69 7921e4b0 4a3e740f d3a6c5c5 
12:30:13 ipsec,debug,packet sendto Information delete. 
12:30:13 ipsec,debug ISAKMP-SA deleted 10.254.1.46[500]-10.254.1.8[500] spi:b8c828e6dc0e1422:75d0433c626168c2 rekey:1 
12:30:13 ipsec,debug flushing active SAs due to setup change.. 
12:30:13 ipsec,debug unbind ::ffff:192.168.88.1 
12:30:13 ipsec,debug unbind ::ffff:10.254.1.46 
12:30:14 l2tp,ppp,info l2tp-out1: initializing... 
12:30:14 l2tp,ppp,info l2tp-out1: connecting... 
12:30:14 ipsec,debug 192.168.88.1[500] used as isakmp port (fd=18) 
12:30:14 ipsec,debug 192.168.88.1[4500] used as isakmp port with NAT-T (fd=20) 
12:30:14 ipsec,debug 10.254.1.46[500] used as isakmp port (fd=21) 
12:30:14 ipsec,debug 10.254.1.46[4500] used as isakmp port with NAT-T (fd=22) 
12:30:14 ipsec,error Policy install failed: proposal disabled: ipsec proposal default 
12:30:14 ipsec,debug,packet === 
12:30:14 ipsec,debug initiate new phase 1 negotiation: 10.254.1.46[500]<=>10.254.1.8[500] 
12:30:14 ipsec,debug begin Identity Protection mode. 
12:30:14 ipsec,debug,packet new cookie: 
12:30:14 ipsec,debug,packet 767678e8d330de73  
12:30:14 ipsec,debug,packet add payload of len 172, next type 13 
12:30:14 ipsec,debug,packet add payload of len 16, next type 13 
12:30:14 ipsec,debug,packet add payload of len 16, next type 13 
12:30:14 ipsec,debug,packet add payload of len 16, next type 13 
12:30:14 ipsec,debug,packet add payload of len 16, next type 13 
12:30:14 ipsec,debug,packet add payload of len 16, next type 13 
12:30:14 ipsec,debug,packet add payload of len 16, next type 13 
12:30:14 ipsec,debug,packet add payload of len 16, next type 13 
12:30:14 ipsec,debug,packet add payload of len 16, next type 13 
12:30:14 ipsec,debug,packet add payload of len 16, next type 13 
12:30:14 ipsec,debug,packet add payload of len 16, next type 13 
12:30:14 ipsec,debug,packet add payload of len 16, next type 13 
12:30:14 ipsec,debug,packet add payload of len 16, next type 13 
12:30:14 ipsec,debug,packet add payload of len 16, next type 0 
12:30:14 ipsec,debug,packet 464 bytes from 10.254.1.46[500] to 10.254.1.8[500] 
12:30:14 ipsec,debug,packet sockname 10.254.1.46[500] 
12:30:14 ipsec,debug,packet send packet from 10.254.1.46[500] 
12:30:14 ipsec,debug,packet send packet to 10.254.1.8[500] 
12:30:14 ipsec,debug,packet src4 10.254.1.46[500] 
12:30:14 ipsec,debug,packet dst4 10.254.1.8[500] 
12:30:14 ipsec,debug,packet 1 times of 464 bytes message will be sent to 10.254.1.8[500] 
12:30:14 ipsec,debug,packet 767678e8 d330de73 00000000 00000000 01100200 00000000 000001d0 0d0000b0 
12:30:14 ipsec,debug,packet 00000001 00000001 000000a4 01010004 03000028 01010000 800b0001 000c0004 
12:30:14 ipsec,debug,packet 00015180 80010007 800e0100 80030001 80020002 80040002 03000028 02010000 
12:30:14 ipsec,debug,packet 800b0001 000c0004 00015180 80010007 800e00c0 80030001 80020002 80040002 
12:30:14 ipsec,debug,packet 03000028 03010000 800b0001 000c0004 00015180 80010007 800e0080 80030001 
12:30:14 ipsec,debug,packet 80020002 80040002 00000024 04010000 800b0001 000c0004 00015180 80010005 
12:30:14 ipsec,debug,packet 80030001 80020002 80040002 0d000014 4a131c81 07035845 5c5728f2 0e95452f 
12:30:14 ipsec,debug,packet 0d000014 8f8d8382 6d246b6f c7a8a6a4 28c11de8 0d000014 439b59f8 ba676c4c 
12:30:14 ipsec,debug,packet 7737ae22 eab8f582 0d000014 4d1e0e13 6deafa34 c4f3ea9f 02ec7285 0d000014 
12:30:14 ipsec,debug,packet 80d0bb3d ef54565e e84645d4 c85ce3ee 0d000014 9909b64e ed937c65 73de52ac 
12:30:14 ipsec,debug,packet e952fa6b 0d000014 7d9419a6 5310ca6f 2c179d92 15529d56 0d000014 cd604643 
12:30:14 ipsec,debug,packet 35df21f8 7cfdb2fc 68b6a448 0d000014 90cb8091 3ebb696e 086381b5 ec427b1f 
12:30:14 ipsec,debug,packet 0d000014 16f6ca16 e4a4066d 83821a0f 0aeaa862 0d000014 4485152d 18b6bbcd 
12:30:14 ipsec,debug,packet 0be8a846 9579ddcc 0d000014 12f5f28c 457168a9 702d9fe2 74cc0100 00000014 
12:30:14 ipsec,debug,packet afcad713 68a1f1c9 6b8696fc 77570100 
12:30:14 ipsec,debug sent phase1 packet 10.254.1.46[500]<=>10.254.1.8[500] 767678e8d330de73:0000000000000000 
12:30:14 ipsec,debug,packet ========== 
12:30:14 ipsec,debug,packet 208 bytes message received from 10.254.1.8[500] to 10.254.1.46[500] 
12:30:14 ipsec,debug,packet 767678e8 d330de73 dccd3194 573c1e18 01100200 00000000 000000d0 0d000038 
12:30:14 ipsec,debug,packet 00000001 00000001 0000002c 01010001 00000024 04010000 80010005 80020002 
12:30:14 ipsec,debug,packet 80040002 80030001 800b0001 000c0004 00015180 0d000018 1e2b5169 05991c7d 
12:30:14 ipsec,debug,packet 7c96fcbf b587e461 00000009 0d000014 4a131c81 07035845 5c5728f2 0e95452f 
12:30:14 ipsec,debug,packet 0d000014 90cb8091 3ebb696e 086381b5 ec427b1f 0d000014 4048b7d5 6ebce885 
12:30:14 ipsec,debug,packet 25e7de7f 00d6c2d3 0d000014 fb1de3cd f341b7ea 16b7e5be 0855f120 00000014 
12:30:14 ipsec,debug,packet e3a5966a 76379fe7 07228231 e5ce8652 
12:30:14 ipsec,debug,packet begin. 
12:30:14 ipsec,debug,packet seen nptype=1(sa) len=56 
12:30:14 ipsec,debug,packet seen nptype=13(vid) len=24 
12:30:14 ipsec,debug,packet seen nptype=13(vid) len=20 
12:30:14 ipsec,debug,packet seen nptype=13(vid) len=20 
12:30:14 ipsec,debug,packet seen nptype=13(vid) len=20 
12:30:14 ipsec,debug,packet seen nptype=13(vid) len=20 
12:30:14 ipsec,debug,packet seen nptype=13(vid) len=20 
12:30:14 ipsec,debug,packet succeed. 
12:30:14 ipsec,debug received long Microsoft ID: MS NT5 ISAKMPOAKLEY 
12:30:14 ipsec,debug received Vendor ID: RFC 3947 
12:30:14 ipsec,debug received Vendor ID: draft-ietf-ipsec-nat-t-ike-02 
12:30:14 ipsec,debug 
12:30:14 ipsec,debug received Vendor ID: FRAGMENTATION 
12:30:14 ipsec,debug,packet received unknown Vendor ID 
12:30:14 ipsec,debug,packet fb1de3cd f341b7ea 16b7e5be 0855f120 
12:30:14 ipsec,debug,packet received unknown Vendor ID 
12:30:14 ipsec,debug,packet e3a5966a 76379fe7 07228231 e5ce8652 
12:30:14 ipsec,debug 10.254.1.8 Selected NAT-T version: RFC 3947 
12:30:14 ipsec,debug,packet total SA len=52 
12:30:14 ipsec,debug,packet 00000001 00000001 0000002c 01010001 00000024 04010000 80010005 80020002 
12:30:14 ipsec,debug,packet 80040002 80030001 800b0001 000c0004 00015180 
12:30:14 ipsec,debug,packet begin. 
12:30:14 ipsec,debug,packet seen nptype=2(prop) len=44 
12:30:14 ipsec,debug,packet succeed. 
12:30:14 ipsec,debug,packet proposal #1 len=44 
12:30:14 ipsec,debug,packet begin. 
12:30:14 ipsec,debug,packet seen nptype=3(trns) len=36 
12:30:14 ipsec,debug,packet succeed. 
12:30:14 ipsec,debug,packet transform #4 len=36 
12:30:14 ipsec,debug,packet type=Encryption Algorithm, flag=0x8000, lorv=3DES-CBC 
12:30:14 ipsec,debug,packet encryption(3des) 
12:30:14 ipsec,debug,packet type=Hash Algorithm, flag=0x8000, lorv=SHA 
12:30:14 ipsec,debug,packet hash(sha1) 
12:30:14 ipsec,debug,packet type=Group Description, flag=0x8000, lorv=1024-bit MODP group 
12:30:14 ipsec,debug,packet dh(modp1024) 
12:30:14 ipsec,debug,packet type=Authentication Method, flag=0x8000, lorv=pre-shared key 
12:30:14 ipsec,debug,packet type=Life Type, flag=0x8000, lorv=seconds 
12:30:14 ipsec,debug,packet type=Life Duration, flag=0x0000, lorv=4 
12:30:14 ipsec,debug,packet pair 1: 
12:30:14 ipsec,debug,packet  0x479728: next=(nil) tnext=(nil) 
12:30:14 ipsec,debug,packet proposal #1: 1 transform 
12:30:14 ipsec,debug,packet prop#=1, prot-id=ISAKMP, spi-size=0, #trns=1 
12:30:14 ipsec,debug,packet trns#=4, trns-id=IKE 
12:30:14 ipsec,debug,packet type=Encryption Algorithm, flag=0x8000, lorv=3DES-CBC 
12:30:14 ipsec,debug,packet type=Hash Algorithm, flag=0x8000, lorv=SHA 
12:30:14 ipsec,debug,packet type=Group Description, flag=0x8000, lorv=1024-bit MODP group 
12:30:14 ipsec,debug,packet type=Authentication Method, flag=0x8000, lorv=pre-shared key 
12:30:14 ipsec,debug,packet type=Life Type, flag=0x8000, lorv=seconds 
12:30:14 ipsec,debug,packet type=Life Duration, flag=0x0000, lorv=4 
12:30:14 ipsec,debug,packet Compared: Local:Peer 
12:30:14 ipsec,debug,packet (lifetime = 86400:86400) 
12:30:14 ipsec,debug,packet (lifebyte = 0:0) 
12:30:14 ipsec,debug,packet enctype = AES-CBC:3DES-CBC 
12:30:14 ipsec,debug,packet (encklen = 256:0) 
12:30:14 ipsec,debug,packet hashtype = SHA:SHA 
12:30:14 ipsec,debug,packet authmethod = pre-shared key:pre-shared key 
12:30:14 ipsec,debug,packet dh_group = 1024-bit MODP group:1024-bit MODP group 
12:30:14 ipsec,debug,packet Compared: Local:Peer 
12:30:14 ipsec,debug,packet (lifetime = 86400:86400) 
12:30:14 ipsec,debug,packet (lifebyte = 0:0) 
12:30:14 ipsec,debug,packet enctype = AES-CBC:3DES-CBC 
12:30:14 ipsec,debug,packet (encklen = 192:0) 
12:30:14 ipsec,debug,packet hashtype = SHA:SHA 
12:30:14 ipsec,debug,packet authmethod = pre-shared key:pre-shared key 
12:30:14 ipsec,debug,packet dh_group = 1024-bit MODP group:1024-bit MODP group 
12:30:14 ipsec,debug,packet Compared: Local:Peer 
12:30:14 ipsec,debug,packet (lifetime = 86400:86400) 
12:30:14 ipsec,debug,packet (lifebyte = 0:0) 
12:30:14 ipsec,debug,packet enctype = AES-CBC:3DES-CBC 
12:30:14 ipsec,debug,packet (encklen = 128:0) 
12:30:14 ipsec,debug,packet hashtype = SHA:SHA 
12:30:14 ipsec,debug,packet authmethod = pre-shared key:pre-shared key 
12:30:14 ipsec,debug,packet dh_group = 1024-bit MODP group:1024-bit MODP group 
12:30:14 ipsec,debug,packet Compared: Local:Peer 
12:30:14 ipsec,debug,packet (lifetime = 86400:86400) 
12:30:14 ipsec,debug,packet (lifebyte = 0:0) 
12:30:14 ipsec,debug,packet enctype = 3DES-CBC:3DES-CBC 
12:30:14 ipsec,debug,packet (encklen = 0:0) 
12:30:14 ipsec,debug,packet hashtype = SHA:SHA 
12:30:14 ipsec,debug,packet authmethod = pre-shared key:pre-shared key 
12:30:14 ipsec,debug,packet dh_group = 1024-bit MODP group:1024-bit MODP group 
12:30:14 ipsec,debug,packet an acceptable proposal found. 
12:30:14 ipsec,debug,packet dh(modp1024) 
12:30:14 ipsec,debug,packet agreed on pre-shared key auth. 
12:30:14 ipsec,debug,packet === 
12:30:14 ipsec,debug,packet dh(modp1024) 
12:30:14 ipsec,debug,packet compute DH's private. 
12:30:14 ipsec,debug,packet 62ca1f64 7e3c1c92 dd8cff1f 50aa970c b7ffc5d3 4b70f1ec 70469801 81d2a648 
12:30:14 ipsec,debug,packet cd086793 79ec772e 754579e0 dc78bd18 b38d1528 e3637422 22f3c071 0cf3dcd7 
12:30:14 ipsec,debug,packet 66cf74d3 6ef2ef07 4b37fdc8 40f03442 bd0da983 a2d97fc6 c51aa9ad 7bf59814 
12:30:14 ipsec,debug,packet e16e3987 2a85ba90 a71c941d c365aab9 3f35d0fb d0783f73 180e251c 582123b6 
12:30:14 ipsec,debug,packet compute DH's public. 
12:30:14 ipsec,debug,packet 18971e2f d150b4b5 32d0aecf 13362720 a6394dac e1cfb95b 54d3ffba 00acff87 
12:30:14 ipsec,debug,packet 816f1ab0 2fac99d7 0057be4c d1dcd5ee 1edef010 c86ae89c d257c295 6650ca80 
12:30:14 ipsec,debug,packet 67e6ea82 d490b5e3 4d5b138c 540605db 9e1ca7a2 6dd2d6ae b00c52ec f4db171a 
12:30:14 ipsec,debug,packet b64b3765 effd9ca9 9ad780b6 e576a841 1f7c9e2a cdc7995c 11c2512c 51c9799b 
12:30:14 ipsec,debug 10.254.1.8 Hashing 10.254.1.8[500] with algo #2  
12:30:14 ipsec,debug,packet hash(sha1) 
12:30:14 ipsec,debug 10.254.1.46 Hashing 10.254.1.46[500] with algo #2  
12:30:14 ipsec,debug,packet hash(sha1) 
12:30:14 ipsec,debug Adding remote and local NAT-D payloads. 
12:30:14 ipsec,debug,packet add payload of len 128, next type 10 
12:30:14 ipsec,debug,packet add payload of len 24, next type 20 
12:30:14 ipsec,debug,packet add payload of len 20, next type 20 
12:30:14 ipsec,debug,packet add payload of len 20, next type 0 
12:30:14 ipsec,debug,packet 236 bytes from 10.254.1.46[500] to 10.254.1.8[500] 
12:30:14 ipsec,debug,packet sockname 10.254.1.46[500] 
12:30:14 ipsec,debug,packet send packet from 10.254.1.46[500] 
12:30:14 ipsec,debug,packet send packet to 10.254.1.8[500] 
12:30:14 ipsec,debug,packet src4 10.254.1.46[500] 
12:30:14 ipsec,debug,packet dst4 10.254.1.8[500] 
12:30:14 ipsec,debug,packet 1 times of 236 bytes message will be sent to 10.254.1.8[500] 
12:30:14 ipsec,debug,packet 767678e8 d330de73 dccd3194 573c1e18 04100200 00000000 000000ec 0a000084 
12:30:14 ipsec,debug,packet 18971e2f d150b4b5 32d0aecf 13362720 a6394dac e1cfb95b 54d3ffba 00acff87 
12:30:14 ipsec,debug,packet 816f1ab0 2fac99d7 0057be4c d1dcd5ee 1edef010 c86ae89c d257c295 6650ca80 
12:30:14 ipsec,debug,packet 67e6ea82 d490b5e3 4d5b138c 540605db 9e1ca7a2 6dd2d6ae b00c52ec f4db171a 
12:30:14 ipsec,debug,packet b64b3765 effd9ca9 9ad780b6 e576a841 1f7c9e2a cdc7995c 11c2512c 51c9799b 
12:30:14 ipsec,debug,packet 1400001c d966ad44 98ce62e4 f0a10f77 abeac19a fd6a27d8 d9a13c8c 14000018 
12:30:14 ipsec,debug,packet 319254ef 6c23f1de 543c59be 40bb1878 22536b62 00000018 cada46dc ffad244a 
12:30:14 ipsec,debug,packet b6ec1202 b5032b2e 71f6bbbe 
12:30:14 ipsec,debug sent phase1 packet 10.254.1.46[500]<=>10.254.1.8[500] 767678e8d330de73:dccd3194573c1e18 
12:30:14 ipsec,debug,packet ========== 
12:30:14 ipsec,debug,packet 260 bytes message received from 10.254.1.8[500] to 10.254.1.46[500] 
12:30:14 ipsec,debug,packet 767678e8 d330de73 dccd3194 573c1e18 04100200 00000000 00000104 0a000084 
12:30:14 ipsec,debug,packet 17523ce6 14a8d77f 539dd337 09fd286e b766f74c f62a26d0 8ec7f791 aacfb6aa 
12:30:14 ipsec,debug,packet 964e8a5d 88bd5223 0f976499 cc4eb74f 1f31e03e b3306125 9729a42c e2a79f19 
12:30:14 ipsec,debug,packet a72bc449 875f07ff d96899e5 5c55015c 50c0c679 bac67f5b cce2c0c2 4d729924 
12:30:14 ipsec,debug,packet d422b50f 354d5eca a5e3deac d3feaaca 20ca715a a955d1a0 cce19e2e 35c3669f 
12:30:14 ipsec,debug,packet 14000034 57346f25 646c780f e8fe9794 887de978 c14f7d84 3b492bdb e830f42a 
12:30:14 ipsec,debug,packet 5638016c c1676521 6fe303de 54122515 1a047906 14000018 cada46dc ffad244a 
12:30:14 ipsec,debug,packet b6ec1202 b5032b2e 71f6bbbe 00000018 319254ef 6c23f1de 543c59be 40bb1878 
12:30:14 ipsec,debug,packet 22536b62 
12:30:14 ipsec,debug,packet begin. 
12:30:14 ipsec,debug,packet seen nptype=4(ke) len=132 
12:30:14 ipsec,debug,packet seen nptype=10(nonce) len=52 
12:30:14 ipsec,debug,packet seen nptype=20(nat-d) len=24 
12:30:14 ipsec,debug,packet seen nptype=20(nat-d) len=24 
12:30:14 ipsec,debug,packet succeed. 
12:30:14 ipsec,debug 10.254.1.46 Hashing 10.254.1.46[500] with algo #2  
12:30:14 ipsec,debug,packet hash(sha1) 
12:30:14 ipsec,debug NAT-D payload #0 verified 
12:30:14 ipsec,debug 10.254.1.8 Hashing 10.254.1.8[500] with algo #2  
12:30:14 ipsec,debug,packet hash(sha1) 
12:30:14 ipsec,debug NAT-D payload #1 verified 
12:30:14 ipsec,debug NAT not detected  
12:30:14 ipsec,debug,packet === 
12:30:14 ipsec,debug,packet dh(modp1024) 
12:30:14 ipsec,debug,packet compute DH's shared. 
12:30:14 ipsec,debug,packet 
12:30:14 ipsec,debug,packet c997912d 2385bdda 829d5236 ee21c3b0 cf5ad78c 2b3f01f1 26beea84 df6574ce 
12:30:14 ipsec,debug,packet c6105af9 cb2bf248 81248de3 b3a8ab5f 16242060 a2cba255 94a8f848 abbc140e 
12:30:14 ipsec,debug,packet 0df86d3c 1e277d72 50361ae6 8adca755 b19ae307 4a81b42b 540aaa84 49279333 
12:30:14 ipsec,debug,packet 4db5153c cd7deb55 8ca1aae3 ba70c300 933a6a5d 1e8d0410 e5ddbb46 64768b83 
12:30:14 ipsec,debug,packet the psk found. 
12:30:14 ipsec,debug,packet nonce 1:  
12:30:14 ipsec,debug,packet d966ad44 98ce62e4 f0a10f77 abeac19a fd6a27d8 d9a13c8c 
12:30:14 ipsec,debug,packet nonce 2:  
12:30:14 ipsec,debug,packet 57346f25 646c780f e8fe9794 887de978 c14f7d84 3b492bdb e830f42a 5638016c 
12:30:14 ipsec,debug,packet c1676521 6fe303de 54122515 1a047906 
12:30:14 ipsec,debug,packet hmac(hmac_sha1) 
12:30:14 ipsec,debug,packet SKEYID computed: 
12:30:14 ipsec,debug,packet 4799b442 7daefd1e b88a2f03 34cdb229 1e14b218 
12:30:14 ipsec,debug,packet hmac(hmac_sha1) 
12:30:14 ipsec,debug,packet SKEYID_d computed: 
12:30:14 ipsec,debug,packet c2bfe321 892107ff 97ae6415 71bc3f87 88cc80f6 
12:30:14 ipsec,debug,packet hmac(hmac_sha1) 
12:30:14 ipsec,debug,packet SKEYID_a computed: 
12:30:14 ipsec,debug,packet 4c241668 154587a1 b7159e55 de732312 0e359e8f 
12:30:14 ipsec,debug,packet hmac(hmac_sha1) 
12:30:14 ipsec,debug,packet SKEYID_e computed: 
12:30:14 ipsec,debug,packet 0aef16d6 90cd4843 f0f8dce7 bda25b23 f16c5f91 
12:30:14 ipsec,debug,packet encryption(3des) 
12:30:14 ipsec,debug,packet hash(sha1) 
12:30:14 ipsec,debug,packet len(SKEYID_e) < len(Ka) (20 < 24), generating long key (Ka = K1 | K2 | ...) 
12:30:14 ipsec,debug,packet hmac(hmac_sha1) 
12:30:14 ipsec,debug,packet compute intermediate encryption key K1 
12:30:14 ipsec,debug,packet 00 
12:30:14 ipsec,debug,packet cb5b50a2 bbcb8767 88e6a66a 0fe3e500 dc421fb3 
12:30:14 ipsec,debug,packet hmac(hmac_sha1) 
12:30:14 ipsec,debug,packet compute intermediate encryption key K2 
12:30:14 ipsec,debug,packet cb5b50a2 bbcb8767 88e6a66a 0fe3e500 dc421fb3 
12:30:14 ipsec,debug,packet bcdd1586 421b53dc dddf3a8d 2a0e3a7c 572e51a0 
12:30:14 ipsec,debug,packet final encryption key computed: 
12:30:14 ipsec,debug,packet cb5b50a2 bbcb8767 88e6a66a 0fe3e500 dc421fb3 bcdd1586 
12:30:14 ipsec,debug,packet hash(sha1) 
12:30:14 ipsec,debug,packet encryption(3des) 
12:30:14 ipsec,debug,packet IV computed: 
12:30:14 ipsec,debug,packet 180d4a3e 90f67541 
12:30:14 ipsec,debug,packet use ID type of IPv4_address 
12:30:14 ipsec,debug,packet HASH with: 
12:30:14 ipsec,debug,packet 18971e2f d150b4b5 32d0aecf 13362720 a6394dac e1cfb95b 54d3ffba 00acff87 
12:30:14 ipsec,debug,packet 816f1ab0 2fac99d7 0057be4c d1dcd5ee 1edef010 c86ae89c d257c295 6650ca80 
12:30:14 ipsec,debug,packet 67e6ea82 d490b5e3 4d5b138c 540605db 9e1ca7a2 6dd2d6ae b00c52ec f4db171a 
12:30:14 ipsec,debug,packet b64b3765 effd9ca9 9ad780b6 e576a841 1f7c9e2a cdc7995c 11c2512c 51c9799b 
12:30:14 ipsec,debug,packet 17523ce6 14a8d77f 539dd337 09fd286e b766f74c f62a26d0 8ec7f791 aacfb6aa 
12:30:14 ipsec,debug,packet 964e8a5d 88bd5223 0f976499 cc4eb74f 1f31e03e b3306125 9729a42c e2a79f19 
12:30:14 ipsec,debug,packet a72bc449 875f07ff d96899e5 5c55015c 50c0c679 bac67f5b cce2c0c2 4d729924 
12:30:14 ipsec,debug,packet d422b50f 354d5eca a5e3deac d3feaaca 20ca715a a955d1a0 cce19e2e 35c3669f 
12:30:14 ipsec,debug,packet 767678e8 d330de73 dccd3194 573c1e18 00000001 00000001 000000a4 01010004 
12:30:14 ipsec,debug,packet 03000028 01010000 800b0001 000c0004 00015180 80010007 800e0100 80030001 
12:30:14 ipsec,debug,packet 80020002 80040002 03000028 02010000 800b0001 000c0004 00015180 80010007 
12:30:14 ipsec,debug,packet 800e00c0 80030001 80020002 80040002 03000028 03010000 800b0001 000c0004 
12:30:14 ipsec,debug,packet 00015180 80010007 800e0080 80030001 80020002 80040002 00000024 04010000 
12:30:14 ipsec,debug,packet 800b0001 000c0004 00015180 80010005 80030001 80020002 80040002 011101f4 
12:30:14 ipsec,debug,packet 0afe012e 
12:30:14 ipsec,debug,packet hmac(hmac_sha1) 
12:30:14 ipsec,debug,packet HASH computed: 
12:30:14 ipsec,debug,packet ca31e5ca e6b049f9 67da98c4 1ba310cd 6a999309 
12:30:14 ipsec,debug,packet add payload of len 8, next type 8 
12:30:14 ipsec,debug,packet add payload of len 20, next type 0 
12:30:14 ipsec,debug,packet begin encryption. 
12:30:14 ipsec,debug,packet encryption(3des) 
12:30:14 ipsec,debug,packet pad length = 4 
12:30:14 ipsec,debug,packet 0800000c 011101f4 0afe012e 00000018 ca31e5ca e6b049f9 67da98c4 1ba310cd 
12:30:14 ipsec,debug,packet 6a999309 5bc7a403 
12:30:14 ipsec,debug,packet encryption(3des) 
12:30:14 ipsec,debug,packet with key: 
12:30:14 ipsec,debug,packet cb5b50a2 bbcb8767 88e6a66a 0fe3e500 dc421fb3 bcdd1586 
12:30:14 ipsec,debug,packet encrypted payload by IV: 
12:30:14 ipsec,debug,packet 180d4a3e 90f67541 
12:30:14 ipsec,debug,packet save IV for next: 
12:30:14 ipsec,debug,packet 7eed2b72 f6fc7909 
12:30:14 ipsec,debug,packet encrypted. 
12:30:14 ipsec,debug,packet 68 bytes from 10.254.1.46[500] to 10.254.1.8[500] 
12:30:14 ipsec,debug,packet sockname 10.254.1.46[500] 
12:30:14 ipsec,debug,packet send packet from 10.254.1.46[500] 
12:30:14 ipsec,debug,packet send packet to 10.254.1.8[500] 
12:30:14 ipsec,debug,packet src4 10.254.1.46[500] 
12:30:14 ipsec,debug,packet dst4 10.254.1.8[500] 
12:30:14 ipsec,debug,packet 1 times of 68 bytes message will be sent to 10.254.1.8[500] 
12:30:14 ipsec,debug,packet 767678e8 d330de73 dccd3194 573c1e18 05100201 00000000 00000044 6d2c60c8 
12:30:14 ipsec,debug,packet dc7f034b 1320915b 6458fd21 02552be1 65abe353 0f05202e 4bae7f52 7eed2b72 
12:30:14 ipsec,debug,packet f6fc7909 
12:30:14 ipsec,debug sent phase1 packet 10.254.1.46[500]<=>10.254.1.8[500] 767678e8d330de73:dccd3194573c1e18 
12:30:14 ipsec,debug,packet ========== 
12:30:14 ipsec,debug,packet 68 bytes message received from 10.254.1.8[500] to 10.254.1.46[500] 
12:30:14 ipsec,debug,packet 767678e8 d330de73 dccd3194 573c1e18 05100201 00000000 00000044 15eb54fa 
12:30:14 ipsec,debug,packet ab8ea38b b8353ea0 341a96db ec4ac27d afcfb115 a7bb75da c109e7ba 996f59a7 
12:30:14 ipsec,debug,packet 85d7c595 
12:30:14 ipsec,debug,packet encryption(3des) 
12:30:14 ipsec,debug,packet IV was saved for next processing: 
12:30:14 ipsec,debug,packet 996f59a7 85d7c595 
12:30:14 ipsec,debug,packet encryption(3des) 
12:30:14 ipsec,debug,packet with key: 
12:30:14 ipsec,debug,packet cb5b50a2 bbcb8767 88e6a66a 0fe3e500 dc421fb3 bcdd1586 
12:30:14 ipsec,debug,packet decrypted payload by IV: 
12:30:14 ipsec,debug,packet 7eed2b72 f6fc7909 
12:30:14 ipsec,debug,packet decrypted payload, but not trimed. 
12:30:14 ipsec,debug,packet 0800000c 01000000 0afe0108 00000018 229776cd 4e9f38f6 e73b9c5b 60f16a96 
12:30:14 ipsec,debug,packet b085660d 00000000 
12:30:14 ipsec,debug,packet padding len=1 
12:30:14 ipsec,debug,packet skip to trim padding. 
12:30:14 ipsec,debug,packet decrypted. 
12:30:14 ipsec,debug,packet 767678e8 d330de73 dccd3194 573c1e18 05100201 00000000 00000044 0800000c 
12:30:14 ipsec,debug,packet 01000000 0afe0108 00000018 229776cd 4e9f38f6 e73b9c5b 60f16a96 b085660d 
12:30:14 ipsec,debug,packet 00000000 
12:30:14 ipsec,debug,packet begin. 
12:30:14 ipsec,debug,packet seen nptype=5(id) len=12 
12:30:14 ipsec,debug,packet seen nptype=8(hash) len=24 
12:30:14 ipsec,debug,packet succeed. 
12:30:14 ipsec,debug,packet HASH received: 
12:30:14 ipsec,debug,packet 229776cd 4e9f38f6 e73b9c5b 60f16a96 b085660d 
12:30:14 ipsec,debug,packet HASH with: 
12:30:14 ipsec,debug,packet 17523ce6 14a8d77f 539dd337 09fd286e b766f74c f62a26d0 8ec7f791 aacfb6aa 
12:30:14 ipsec,debug,packet 964e8a5d 88bd5223 0f976499 cc4eb74f 1f31e03e b3306125 9729a42c e2a79f19 
12:30:14 ipsec,debug,packet a72bc449 875f07ff d96899e5 5c55015c 50c0c679 bac67f5b cce2c0c2 4d729924 
12:30:14 ipsec,debug,packet d422b50f 354d5eca a5e3deac d3feaaca 20ca715a a955d1a0 cce19e2e 35c3669f 
12:30:14 ipsec,debug,packet 18971e2f d150b4b5 32d0aecf 13362720 a6394dac e1cfb95b 54d3ffba 00acff87 
12:30:14 ipsec,debug,packet 816f1ab0 2fac99d7 0057be4c d1dcd5ee 1edef010 c86ae89c d257c295 6650ca80 
12:30:14 ipsec,debug,packet 67e6ea82 d490b5e3 4d5b138c 540605db 9e1ca7a2 6dd2d6ae b00c52ec f4db171a 
12:30:14 ipsec,debug,packet b64b3765 effd9ca9 9ad780b6 e576a841 1f7c9e2a cdc7995c 11c2512c 51c9799b 
12:30:14 ipsec,debug,packet dccd3194 573c1e18 767678e8 d330de73 00000001 00000001 000000a4 01010004 
12:30:14 ipsec,debug,packet 03000028 01010000 800b0001 000c0004 00015180 80010007 800e0100 80030001 
12:30:14 ipsec,debug,packet 80020002 80040002 03000028 02010000 800b0001 000c0004 00015180 80010007 
12:30:14 ipsec,debug,packet 800e00c0 80030001 80020002 80040002 03000028 03010000 800b0001 000c0004 
12:30:14 ipsec,debug,packet 00015180 80010007 800e0080 80030001 80020002 80040002 00000024 04010000 
12:30:14 ipsec,debug,packet 800b0001 000c0004 00015180 80010005 80030001 80020002 80040002 01000000 
12:30:14 ipsec,debug,packet 0afe0108 
12:30:14 ipsec,debug,packet hmac(hmac_sha1) 
12:30:14 ipsec,debug,packet HASH computed: 
12:30:14 ipsec,debug,packet 229776cd 4e9f38f6 e73b9c5b 60f16a96 b085660d 
12:30:14 ipsec,debug,packet HASH for PSK validated. 
12:30:14 ipsec,debug,packet 10.254.1.8 peer's ID: 
12:30:14 ipsec,debug,packet 01000000 0afe0108 
12:30:14 ipsec,debug,packet === 
12:30:14 ipsec,debug ISAKMP-SA established 10.254.1.46[500]-10.254.1.8[500] spi:767678e8d330de73:dccd3194573c1e18 
12:30:14 ipsec,debug,packet === 
12:30:17 l2tp,ppp,info l2tp-out1: terminating... 
12:30:17 l2tp,ppp,info l2tp-out1: disabled 
12:30:17 system,info device changed by admin 
12:30:18 ipsec,debug,packet Removing PH1... 
12:30:18 ipsec,debug,packet compute IV for phase2 
12:30:18 ipsec,debug,packet phase1 last IV: 
12:30:18 ipsec,debug,packet 996f59a7 85d7c595 db908758 
12:30:18 ipsec,debug,packet hash(sha1) 
12:30:18 ipsec,debug,packet encryption(3des) 
12:30:18 ipsec,debug,packet phase2 IV computed: 
12:30:18 ipsec,debug,packet 343e9a26 d4b7034f 
12:30:18 ipsec,debug,packet HASH with: 
12:30:18 ipsec,debug,packet db908758 0000001c 00000001 01100001 767678e8 d330de73 dccd3194 573c1e18 
12:30:18 ipsec,debug,packet hmac(hmac_sha1) 
12:30:18 ipsec,debug,packet HASH computed: 
12:30:18 ipsec,debug,packet 4f7b0726 073d2d8a b7d6864f 38bb5895 1a3f3c4c 
12:30:18 ipsec,debug,packet begin encryption. 
12:30:18 ipsec,debug,packet encryption(3des) 
12:30:18 ipsec,debug,packet pad length = 4 
12:30:18 ipsec,debug,packet 0c000018 4f7b0726 073d2d8a b7d6864f 38bb5895 1a3f3c4c 0000001c 00000001 
12:30:18 ipsec,debug,packet 01100001 767678e8 d330de73 dccd3194 573c1e18 1737e303 
12:30:18 ipsec,debug,packet encryption(3des) 
12:30:18 ipsec,debug,packet with key: 
12:30:18 ipsec,debug,packet cb5b50a2 bbcb8767 88e6a66a 0fe3e500 dc421fb3 bcdd1586 
12:30:18 ipsec,debug,packet encrypted payload by IV: 
12:30:18 ipsec,debug,packet 343e9a26 d4b7034f 
12:30:18 ipsec,debug,packet save IV for next: 
12:30:18 ipsec,debug,packet 96d5771f a78ac88a 
12:30:18 ipsec,debug,packet encrypted. 
12:30:18 ipsec,debug,packet 84 bytes from 10.254.1.46[500] to 10.254.1.8[500] 
12:30:18 ipsec,debug,packet sockname 10.254.1.46[500] 
12:30:18 ipsec,debug,packet send packet from 10.254.1.46[500] 
12:30:18 ipsec,debug,packet send packet to 10.254.1.8[500] 
12:30:18 ipsec,debug,packet src4 10.254.1.46[500] 
12:30:18 ipsec,debug,packet dst4 10.254.1.8[500] 
12:30:18 ipsec,debug,packet 1 times of 84 bytes message will be sent to 10.254.1.8[500] 
12:30:18 ipsec,debug,packet 767678e8 d330de73 dccd3194 573c1e18 08100501 db908758 00000054 e4658a6e 
12:30:18 ipsec,debug,packet 5cd18f56 eb954f0a 76413b78 95b643ba 7665894c e8ef088c c7f123cf 6c712ae5 
12:30:18 ipsec,debug,packet 95cb4ab9 b1384108 5e0e0e4e 96d5771f a78ac88a 
12:30:18 ipsec,debug,packet sendto Information delete. 
12:30:18 ipsec,debug ISAKMP-SA deleted 10.254.1.46[500]-10.254.1.8[500] spi:767678e8d330de73:dccd3194573c1e18 rekey:1 
12:30:18 ipsec,debug flushing active SAs due to setup change.. 
12:30:18 ipsec,debug unbind ::ffff:192.168.88.1 
12:30:18 ipsec,debug unbind ::ffff:10.254.1.46

on Windows Server 2016 i have found this error:

IPsec dropped an inbound clear text packet that should have been secured. If the remote computer is configured with a Request Outbound IPsec policy, this might be benign and expected.  This can also be caused by the remote computer changing its IPsec policy without informing this computer. This could also be a spoofing attack attempt. 

Remote Network Address:   10.254.1.46 
Inbound SA SPI:      0

How can i configure Mikrotik as L2TP client to Windows Server VPN ?

Thank you!

Any ideas? Did anybody configure L2TP client on MK to RRAS VPN?