Here log file where you can also see the ping problem.
Nov/06/2018 14:43:30 firewall,info output: in:(unknown 0) out:vrrp1, proto ICMP (type 8, code 0), [RouterOS IP]->[strongSwan IP], len 56
Nov/06/2018 14:43:30 firewall,info input: in:vrrp1 out:(unknown 0), src-mac 00:04:a7:09:8c:3a, proto ICMP (type 0, code 0), [strongSwan IP]->[RouterOS IP], len 56
Nov/06/2018 14:43:31 firewall,info output: in:(unknown 0) out:vrrp1, proto ICMP (type 8, code 0), [RouterOS IP]->[strongSwan IP], len 56
Nov/06/2018 14:43:31 firewall,info input: in:vrrp1 out:(unknown 0), src-mac 00:04:a7:09:8c:3a, proto ICMP (type 0, code 0), [strongSwan IP]->[RouterOS IP], len 56
Nov/06/2018 14:43:32 firewall,info output: in:(unknown 0) out:vrrp1, proto ICMP (type 8, code 0), [RouterOS IP]->[strongSwan IP], len 56
Nov/06/2018 14:43:32 firewall,info input: in:vrrp1 out:(unknown 0), src-mac 00:04:a7:09:8c:3a, proto ICMP (type 0, code 0), [strongSwan IP]->[RouterOS IP], len 56
Nov/06/2018 14:43:33 firewall,info output: in:(unknown 0) out:vrrp1, proto ICMP (type 8, code 0), [RouterOS IP]->[strongSwan IP], len 56
Nov/06/2018 14:43:33 firewall,info input: in:vrrp1 out:(unknown 0), src-mac 00:04:a7:09:8c:3a, proto ICMP (type 0, code 0), [strongSwan IP]->[RouterOS IP], len 56
Nov/06/2018 14:43:47 ipsec sending dpd packet
Nov/06/2018 14:43:47 ipsec <- ike2 request, exchange: INFORMATIONAL:0 [strongSwan IP][500]
Nov/06/2018 14:43:47 ipsec,debug,packet => outgoing plain packet (size 0x1c)
Nov/06/2018 14:43:47 ipsec,debug,packet 4eb16358 999296a3 9ac893ed d15770a0 00202500 00000000 0000001c
Nov/06/2018 14:43:47 ipsec adding payload: ENC
Nov/06/2018 14:43:47 ipsec,debug => (size 0x44)
Nov/06/2018 14:43:47 ipsec,debug 00000044 0c11d094 17151321 77ac35d4 c046cb61 737967ca 3c26169e bebed504
Nov/06/2018 14:43:47 ipsec,debug 61d89080 ad07d4b6 bc1456c6 492d1b29 fee03c72 35623737 65366665 30393937
Nov/06/2018 14:43:47 ipsec,debug 66353931
Nov/06/2018 14:43:47 ipsec,debug ===== sending 96 bytes from [RouterOS IP][500] to [strongSwan IP][500]
Nov/06/2018 14:43:47 ipsec,debug 1 times of 96 bytes message will be sent to [strongSwan IP][500]
Nov/06/2018 14:43:47 ipsec,debug,packet 4eb16358 999296a3 9ac893ed d15770a0 2e202500 00000000 00000060 00000044
Nov/06/2018 14:43:47 ipsec,debug,packet 0c11d094 17151321 77ac35d4 c046cb61 737967ca 3c26169e bebed504 61d89080
Nov/06/2018 14:43:47 ipsec,debug,packet ad07d4b6 bc1456c6 492d1b29 fee03c72 09225de1 70c1b6be b3d9cc50 cfe44912
Nov/06/2018 14:43:52 ipsec dpd: retransmit
Nov/06/2018 14:43:52 ipsec,debug ===== sending 96 bytes from [RouterOS IP][500] to [strongSwan IP][500]
Nov/06/2018 14:43:52 ipsec,debug 1 times of 96 bytes message will be sent to [strongSwan IP][500]
Nov/06/2018 14:43:52 ipsec,debug,packet 4eb16358 999296a3 9ac893ed d15770a0 2e202500 00000000 00000060 00000044
Nov/06/2018 14:43:52 ipsec,debug,packet 0c11d094 17151321 77ac35d4 c046cb61 737967ca 3c26169e bebed504 61d89080
Nov/06/2018 14:43:52 ipsec,debug,packet ad07d4b6 bc1456c6 492d1b29 fee03c72 09225de1 70c1b6be b3d9cc50 cfe44912
Nov/06/2018 14:43:55 ipsec,debug ===== received 736 bytes from [strongSwan IP][500] to [RouterOS IP][500]
Nov/06/2018 14:43:55 ipsec,debug,packet 4eb16358 999296a3 9ac893ed d15770a0 2e202408 00000002 000002e0 290002c4
Nov/06/2018 14:43:55 ipsec,debug,packet 97e84f2e 0af2f774 6e12b3b4 eb32c60f c756e844 d5738f99 779fdc5a 08107492
Nov/06/2018 14:43:55 ipsec,debug,packet 3860aa55 482f2daf c6ca9f62 3812a3ca e6c2aada edf306b3 c91a9f4b d48018c4
Nov/06/2018 14:43:55 ipsec,debug,packet bb1f01e7 4d8d0fd5 5dbe5792 c798c745 afddcc63 a964b356 bc1a852c de11ae0d
Nov/06/2018 14:43:55 ipsec,debug,packet 050c8c7a a509f8c3 e63e6579 bf1c4943 d0594d18 6380f37d bd5d9cc9 3afca78a
Nov/06/2018 14:43:55 ipsec,debug,packet bae541b3 8eb8e1bf 423cdf86 98256fb1 6ffccc17 bbe06d17 29f1df51 e57ff62d
Nov/06/2018 14:43:55 ipsec,debug,packet bfadcadf 586ef078 3ab8aa08 5b4c7232 792d64c9 d440f62a f623c186 76c0e309
Nov/06/2018 14:43:55 ipsec,debug,packet 409461ff 462f4753 962a84b5 bf2815d9 99d278e9 c6ba41e0 6cfafd78 52efb894
Nov/06/2018 14:43:55 ipsec,debug,packet fec7ae07 32bca5f4 93a7f8ea 4ad2f765 7f6450c4 01b28180 a4cd2fb4 38df9546
Nov/06/2018 14:43:55 ipsec,debug,packet cd01f2df ad00be46 3c44babf 131fc07d 62d96667 29ab608f b69292f7 534679ba
Nov/06/2018 14:43:55 ipsec,debug,packet f2533888 01614c41 e2c3768f fda413d4 2faa559d f1fd15e5 41298ce3 b9600ba0
Nov/06/2018 14:43:55 ipsec,debug,packet deb2f225 fa1a3826 0017d121 4b7633c0 41902887 b85c10bb a7a59beb b71a0405
Nov/06/2018 14:43:55 ipsec,debug,packet b8da931b 6ab18aa9 ed85548f 2023cdaa 7fa72b69 0788faec 41bf2003 2202ba5b
Nov/06/2018 14:43:55 ipsec,debug,packet ab7e479b 73df11a3 ef8e3648 e3d864d2 eeaedc3d e3850d74 5c24ef73 dc616036
Nov/06/2018 14:43:55 ipsec,debug,packet ffffd4c7 fb3f7772 a06595a9 88985174 4551e3e4 f96e9812 e1f5e0d1 b8afc8ff
Nov/06/2018 14:43:55 ipsec,debug,packet 2e628739 786a5f8f 13f6e90f 7a715eab a5bdbc4e bbe02bcb ff02d4f8 717e94c9
Nov/06/2018 14:43:55 ipsec,debug,packet 308695f7 631a8219 1eee4210 a32e437b 886ef9b7 9563fc6d 7eec73e4 1a0bbc3f
Nov/06/2018 14:43:55 ipsec,debug,packet c07eb481 61d78370 27399212 0de995ea 436b1bf6 a3afc5c5 94d1492d a388618f
Nov/06/2018 14:43:55 ipsec,debug,packet 532c5300 247f5b9e 311a721b 2eefb34b 6a0d9c5f 73997007 f051b71f 7eb701a4
Nov/06/2018 14:43:55 ipsec,debug,packet dc42d803 f3189e37 59deaf34 915892cc bb828f7d 8b5dc244 9043964e 5c76839e
Nov/06/2018 14:43:55 ipsec,debug,packet 8094a6bc db99273d bd93e589 f6f68c2c 3f2955b9 0603328f 4df8cbff 5c6af6b1
Nov/06/2018 14:43:55 ipsec,debug,packet c74adc69 0ef17aca 556dcc87 abdf1427 7f25ad19 8d4121c4 e7ea5582 8683f1d2
Nov/06/2018 14:43:55 ipsec,debug,packet f0e41d6b 54be9586 0afd08e2 d5fefceb e53d3608 a3b33400 89dcc918 93a2f309
Nov/06/2018 14:43:55 ipsec -> ike2 request, exchange: CREATE_CHILD_SA:2 [strongSwan IP][500]
Nov/06/2018 14:43:55 ipsec payload seen: ENC
Nov/06/2018 14:43:55 ipsec processing payload: ENC
Nov/06/2018 14:43:55 ipsec,debug => iv (size 0x10)
Nov/06/2018 14:43:55 ipsec,debug 97e84f2e 0af2f774 6e12b3b4 eb32c60f
Nov/06/2018 14:43:55 ipsec,debug decrypted
Nov/06/2018 14:43:55 ipsec,debug,packet => decrypted packet (size 0x29c)
Nov/06/2018 14:43:55 ipsec,debug,packet 2100000c 03044009 c645ee37 28000034 00000030 01030404 cb1e31d6 0300000c
Nov/06/2018 14:43:55 ipsec,debug,packet 0100000d 800e0100 03000008 0300000c 03000008 04000010 00000008 05000000
Nov/06/2018 14:43:55 ipsec,debug,packet 22000024 c102bdb3 9962fa66 8ec4a8c7 952d0cd7 03ec82ac 6e410174 83027dcf
Nov/06/2018 14:43:55 ipsec,debug,packet a7a6d34e 2c000208 00100000 c2788fec 02f8a00e 7e3c6ce2 a1b525c0 de8ef8cb
Nov/06/2018 14:43:55 ipsec,debug,packet cb76756f bc67f37b 60f1a7d2 5eedc01b bf158a3d 19808511 e98d238f 13a5e83b
Nov/06/2018 14:43:55 ipsec,debug,packet a8005860 691838f2 c8e1e329 edb604bb f38cb1e6 ffbb7afe 2e9cfd11 ba9b086e
Nov/06/2018 14:43:55 ipsec,debug,packet ebaac1f1 49252417 bfebf641 bec5e2f7 7a15dfac 42ce11cd eee3e63a 28134fe2
Nov/06/2018 14:43:55 ipsec,debug,packet 786081d0 7abf4993 9ea46a8a 443adc3c 6b01dfe8 62e66af1 05c3122e ebb7228b
Nov/06/2018 14:43:55 ipsec,debug,packet
Nov/06/2018 14:43:55 ipsec,debug,packet b2886194 b1268196 102c6fae dae58d96 32c252af b852faf4 460b4c34 c70a7dc5
Nov/06/2018 14:43:55 ipsec,debug,packet 8b1c47e9 64ced230 6a7b66df 12cd4009 08ab5c96 4e6b8cea 3915a19c 72e0189a
Nov/06/2018 14:43:55 ipsec,debug,packet 5edcbcb7 6968ef94 6b6de0f3 98d0d8e1 c33672e5 f64a9470 2cd2ff90 3c24f270
Nov/06/2018 14:43:55 ipsec,debug,packet 2cb0678e 8b94c94a 4b83f537 2c1113f6 7b42a56c 6200d635 5190bb4e 2ce7bf0b
Nov/06/2018 14:43:55 ipsec,debug,packet b3bca3c7 95e70823 e1ee3255 767f8aa1 8dbc72af 1903b552 e969afca 08c2be56
Nov/06/2018 14:43:55 ipsec,debug,packet 0ca751ca 8cd1f8bb 9ad4009c 2fd081d5 6a247094 bb0a787b 1f2343b1 4c81592e
Nov/06/2018 14:43:55 ipsec,debug,packet e9114e60 df1083c8 0fef221d 65906a22 36bdea76 f22ce16f fd5f00ea 79d2f46b
Nov/06/2018 14:43:55 ipsec,debug,packet b0610e61 a674a98d d0a022a1 1e0bc30d 49333afa 9c4580d8 e63420ce 36bf19b6
Nov/06/2018 14:43:55 ipsec,debug,packet
Nov/06/2018 14:43:55 ipsec,debug,packet 18dc129b 59b44aa1 ff2ec359 5540cc2a 6a17a5c2 ad9cfefb c075509e c77002f0
Nov/06/2018 14:43:55 ipsec,debug,packet 9ab5a7f2 2d1a40fc 2e23e0eb 7611cfd9 cebd059e 6a54c1b4 b76d254f 304aaded
Nov/06/2018 14:43:55 ipsec,debug,packet 089b83eb fd18c576 ded19128 bc4fc586 70a3c246 bb6bff4d 64910585 c43ee14e
Nov/06/2018 14:43:55 ipsec,debug,packet 27bba0dd bb60623b 1b8f33c0 2d000018 01000000 07000010 0000ffff 0a6cf304
Nov/06/2018 14:43:55 ipsec,debug,packet 0a6cf304 00000018 01000000 07000010 0000ffff 0a6d0000 0a6dffff
Nov/06/2018 14:43:55 ipsec payload seen: NOTIFY
Nov/06/2018 14:43:55 ipsec payload seen: SA
Nov/06/2018 14:43:55 ipsec payload seen: NONCE
Nov/06/2018 14:43:55 ipsec payload seen: KE
Nov/06/2018 14:43:55 ipsec payload seen: TS_I
Nov/06/2018 14:43:55 ipsec payload seen: TS_R
Nov/06/2018 14:43:55 ipsec request while waiting for dpd
Nov/06/2018 14:43:55 ipsec create child: respond
Nov/06/2018 14:43:55 ipsec processing payload: NONCE
Nov/06/2018 14:43:55 ipsec processing payloads: NOTIFY
Nov/06/2018 14:43:55 ipsec notify: REKEY_SA
Nov/06/2018 14:43:55 ipsec rekeying child SA 0xc645ee37
Nov/06/2018 14:43:55 ipsec peer wants tunnel mode
Nov/06/2018 14:43:55 ipsec processing payload: TS_R
Nov/06/2018 14:43:55 ipsec [RouterOS Network IP]/16
Nov/06/2018 14:43:55 ipsec processing payload: TS_I
Nov/06/2018 14:43:55 ipsec [strongSwan IP]
Nov/06/2018 14:43:55 ipsec processing payload: SA
Nov/06/2018 14:43:55 ipsec IKE Protocol: ESP
Nov/06/2018 14:43:55 ipsec proposal #1
Nov/06/2018 14:43:55 ipsec enc: aes256-ctr
Nov/06/2018 14:43:55 ipsec auth: sha256
Nov/06/2018 14:43:55 ipsec dh: modp4096
Nov/06/2018 14:43:55 ipsec matched proposal:
Nov/06/2018 14:43:55 ipsec proposal #1
Nov/06/2018 14:43:55 ipsec enc: aes256-ctr
Nov/06/2018 14:43:55 ipsec auth: sha256
Nov/06/2018 14:43:55 ipsec dh: modp4096
Nov/06/2018 14:43:55 ipsec processing payload: KE
Nov/06/2018 14:44:02 ipsec,debug => shared secret (first 0x100 of 0x200)
Nov/06/2018 14:44:02 ipsec,debug 9e499270 95452374 fc93b3d7 85cb1a8e 35112ae3 b6f53df0 c11939b7 4e306ec7
Nov/06/2018 14:44:02 ipsec,debug e23697bf a5b15070 193a6234 4cdcb9db b60edbbb 8e012a60 c61aa3dc 1987b468
Nov/06/2018 14:44:02 ipsec,debug 23ae0635 b8612211 033441e2 f1fd4857 f54c664e d0b69ff5 600f6fb0 2eee3c1f
Nov/06/2018 14:44:02 ipsec,debug 83d86257 b0226305 cc2f46d8 7c936ce0 e03e153a 0b3aa9a0 71c9f1e4 b0d9bb16
Nov/06/2018 14:44:02 ipsec,debug 99f2bdd5 a86418ee 2e734e09 ad280e6d a0748066 d21fdb61 9960d6cf 28a5c29f
Nov/06/2018 14:44:02 ipsec,debug 91444764 ce0ccfa1 47a8d27c c269c225 b2518c2b eaca2fee 23030890 b3f0e1a9
Nov/06/2018 14:44:02 ipsec,debug ac617882 a7796c98 d8e14fac 275aa42e 5db47f15 61ab06da 2717b092 7923f6e7
Nov/06/2018 14:44:02 ipsec,debug 7b64e347 c166384b 513c26bf e2ded00c abdb6e61 04873a6a 0c7789be d4a3570a
Nov/06/2018 14:44:02 ipsec,debug ===== received 80 bytes from [strongSwan IP][500] to [RouterOS IP][500]
Nov/06/2018 14:44:02 ipsec,debug,packet 4eb16358 999296a3 9ac893ed d15770a0 2e202528 00000000 00000050 00000034
Nov/06/2018 14:44:02 ipsec,debug,packet 75b0e9ee f49d1c93 4c55f0ca 477ca250 e9968dfa 5556dc3e a596929c f53e1a4c
Nov/06/2018 14:44:02 ipsec,debug,packet 58717270 ecca511e 6465994c 78d4d04a
Nov/06/2018 14:44:02 ipsec -> ike2 reply, exchange: INFORMATIONAL:0 [strongSwan IP][500]
Nov/06/2018 14:44:02 ipsec ignoring
Nov/06/2018 14:44:02 ipsec create child: finish
Nov/06/2018 14:44:02 ipsec adding payload: NONCE
Nov/06/2018 14:44:02 ipsec,debug => (size 0x1c)
Nov/06/2018 14:44:02 ipsec,debug 0000001c dca9937d b352dfe0 506114b0 decad88f fd0b0e67 84591355
Nov/06/2018 14:44:02 ipsec adding payload: KE
Nov/06/2018 14:44:02 ipsec,debug => (first 0x100 of 0x208)
Nov/06/2018 14:44:02 ipsec,debug 00000208 00100000 d9016095 6bcb2150 9188845c 259ef181 643641aa 180f0579
Nov/06/2018 14:44:02 ipsec,debug 0cc5a9bb 8e4ae92a 805b567e 224dd69b 0b421caa 95ac007b e5241ee5 5e094186
Nov/06/2018 14:44:02 ipsec,debug bbf404a9 fc66dddd 0bc8c657 ea34c7a0 2808a8b9 433708ab 516e1af4 bf2d07b4
Nov/06/2018 14:44:02 ipsec,debug f6f84ead 295c02d7 f8303163 39d82b17 59475a64 ff6b2b33 461dd0b2 82ebfae2
Nov/06/2018 14:44:02 ipsec,debug 82039224 d0705dc7 8b4f93dc a32a452f 7fd5e778 34cde4bf f74212d2 3ec726ee
Nov/06/2018 14:44:02 ipsec,debug 71b52e94 3738e7f8 429917e9 2de811a9 1ae22e29 8144c198 9cf2167f dde83507
Nov/06/2018 14:44:02 ipsec,debug e720393f d9c933e8 6632bf9c b2ecfb6b 120d9ea5 1123020f 16000ac0 3bfae076
Nov/06/2018 14:44:02 ipsec,debug b9c04bad 859e106f 40b2ea28 abb9a17f 39671306 2bfaf41f 3f275dcc e50a0ecd
Nov/06/2018 14:44:02 ipsec initiator selector: [strongSwan IP]
Nov/06/2018 14:44:02 ipsec adding payload: TS_I
Nov/06/2018 14:44:02 ipsec,debug => (size 0x18)
Nov/06/2018 14:44:02 ipsec,debug 00000018 01000000 07000010 0000ffff 0a6cf304 0a6cf304
Nov/06/2018 14:44:02 ipsec responder selector: [RouterOS Network IP]/16
Nov/06/2018 14:44:02 ipsec adding payload: TS_R
Nov/06/2018 14:44:02 ipsec,debug => (size 0x18)
Nov/06/2018 14:44:02 ipsec,debug 00000018 01000000 07000010 0000ffff 0a6d0000 0a6dffff
Nov/06/2018 14:44:02 ipsec adding payload: SA
Nov/06/2018 14:44:02 ipsec,debug => (size 0x34)
Nov/06/2018 14:44:02 ipsec,debug 00000034 00000030 01030404 0846a964 0300000c 0100000d 800e0100 03000008
Nov/06/2018 14:44:02 ipsec,debug 0300000c 03000008 04000010 00000008 05000000
Nov/06/2018 14:44:02 ipsec <- ike2 reply, exchange: AUTH:1 [strongSwan IP][500]
Nov/06/2018 14:44:02 ipsec,debug,packet => outgoing plain packet (size 0x2a4)
Nov/06/2018 14:44:02 ipsec,debug,packet 4eb16358 999296a3 9ac893ed d15770a0 28202320 00000001 000002a4 2200001c
Nov/06/2018 14:44:02 ipsec,debug,packet dca9937d b352dfe0 506114b0 decad88f fd0b0e67 84591355 2c000208 00100000
Nov/06/2018 14:44:02 ipsec,debug,packet d9016095 6bcb2150 9188845c 259ef181 643641aa 180f0579 0cc5a9bb 8e4ae92a
Nov/06/2018 14:44:02 ipsec,debug,packet 805b567e 224dd69b 0b421caa 95ac007b e5241ee5 5e094186 bbf404a9 fc66dddd
Nov/06/2018 14:44:02 ipsec,debug,packet 0bc8c657 ea34c7a0 2808a8b9 433708ab 516e1af4 bf2d07b4 f6f84ead 295c02d7
Nov/06/2018 14:44:02 ipsec,debug,packet f8303163 39d82b17 59475a64 ff6b2b33 461dd0b2 82ebfae2 82039224 d0705dc7
Nov/06/2018 14:44:02 ipsec,debug,packet 8b4f93dc a32a452f 7fd5e778 34cde4bf f74212d2 3ec726ee 71b52e94 3738e7f8
Nov/06/2018 14:44:02 ipsec,debug,packet 429917e9 2de811a9 1ae22e29 8144c198 9cf2167f dde83507 e720393f d9c933e8
Nov/06/2018 14:44:02 ipsec,debug,packet
Nov/06/2018 14:44:02 ipsec,debug,packet 6632bf9c b2ecfb6b 120d9ea5 1123020f 16000ac0 3bfae076 b9c04bad 859e106f
Nov/06/2018 14:44:02 ipsec,debug,packet 40b2ea28 abb9a17f 39671306 2bfaf41f 3f275dcc e50a0ecd dbee4610 1b0789ce
Nov/06/2018 14:44:02 ipsec,debug,packet 98224a7c 30451d20 81d22255 34b75fdf 2e2b1b5b 057ef422 c361e5f5 a0184e09
Nov/06/2018 14:44:02 ipsec,debug,packet d6150a9a 88694381 758011d5 153eefba fda9a718 86b99379 1b2b9275 fad17016
Nov/06/2018 14:44:02 ipsec,debug,packet ae1e0f40 b603b16d d9a2657c 8a1979e6 fa64a529 63edb9f3 857f4d96 ff78fcca
Nov/06/2018 14:44:02 ipsec,debug,packet 6e5dddba 48c0bef4 aa43a99e 44ece453 4626bcc1 087509ef 4b839e4d 94d1e898
Nov/06/2018 14:44:02 ipsec,debug,packet e0daa84c e67a6182 e0719ee4 779b0afa fc64865d 9e580cb5 304749a3 e46e01eb
Nov/06/2018 14:44:02 ipsec,debug,packet 6d75d917 a2d8dfa3 48ef9159 a5aebba6 a57ed11d 6280c70f 64fad23b 160fb681
Nov/06/2018 14:44:02 ipsec,debug,packet
Nov/06/2018 14:44:02 ipsec,debug,packet 9340132d c32e4c00 f7676c93 d1337592 0852c42e 36560be9 80a6ecfb 7bf97d14
Nov/06/2018 14:44:02 ipsec,debug,packet efd51675 b6748e43 21a4fbe8 6ca0da69 282b18b0 b22f6522 31c3991c b343affb
Nov/06/2018 14:44:02 ipsec,debug,packet 2d000018 01000000 07000010 0000ffff 0a6cf304 0a6cf304 21000018 01000000
Nov/06/2018 14:44:02 ipsec,debug,packet 07000010 0000ffff 0a6d0000 0a6dffff 00000034 00000030 01030404 0846a964
Nov/06/2018 14:44:02 ipsec,debug,packet 0300000c 0100000d 800e0100 03000008 0300000c 03000008 04000010 00000008
Nov/06/2018 14:44:02 ipsec,debug,packet 05000000
Nov/06/2018 14:44:02 ipsec adding payload: ENC
Nov/06/2018 14:44:02 ipsec,debug => (first 0x100 of 0x2e4)
Nov/06/2018 14:44:02 ipsec,debug 280002e4 e53d3608 a3b33400 89dcc918 93a2f309 b75972b6 b5faa615 3ede3517
Nov/06/2018 14:44:02 ipsec,debug 223865d9 40033f9c 3d7121a5 cde19741 ffc0f1c4 5387b7af 9abef5ee 8ab74668
Nov/06/2018 14:44:02 ipsec,debug b0f19a24 58f9ff33 af43a683 f4b4b322 f644497b eff871dc c397af07 4d22cb44
Nov/06/2018 14:44:02 ipsec,debug 9731fcf1 97790bf7 a7ef6c0d 447f5e9f 6d81fb83 0caad708 ce332609 3a949c69
Nov/06/2018 14:44:02 ipsec,debug 036245be 61c0fcab de1e95f1 e6f64954 c015b38e dadedc96 91277713 b766c7fd
Nov/06/2018 14:44:02 ipsec,debug b63558ab 6b783799 9e274f61 8a6029e5 e5e310f7 3c99037e 2e9ad43a f64d3a36
Nov/06/2018 14:44:02 ipsec,debug 3d006413 b83c593b 858dd0be d5f71773 7d1ec71e fa871a51 38d0422f 60ddcc96
Nov/06/2018 14:44:02 ipsec,debug 9bab311c 1b394135 f09504fe a1e116ef 9d18c25d 9b135158 ec5d26f2 b1660d72
Nov/06/2018 14:44:02 ipsec,debug ===== sending 768 bytes from [RouterOS IP][500] to [strongSwan IP][500]
Nov/06/2018 14:44:02 ipsec,debug 1 times of 768 bytes message will be sent to [strongSwan IP][500]
Nov/06/2018 14:44:02 ipsec,debug,packet 4eb16358 999296a3 9ac893ed d15770a0 2e202320 00000001 00000300 280002e4
Nov/06/2018 14:44:02 ipsec,debug,packet e53d3608 a3b33400 89dcc918 93a2f309 b75972b6 b5faa615 3ede3517 223865d9
Nov/06/2018 14:44:02 ipsec,debug,packet 40033f9c 3d7121a5 cde19741 ffc0f1c4 5387b7af 9abef5ee 8ab74668 b0f19a24
Nov/06/2018 14:44:02 ipsec,debug,packet 58f9ff33 af43a683 f4b4b322 f644497b eff871dc c397af07 4d22cb44 9731fcf1
Nov/06/2018 14:44:02 ipsec,debug,packet 97790bf7 a7ef6c0d 447f5e9f 6d81fb83 0caad708 ce332609 3a949c69 036245be
Nov/06/2018 14:44:02 ipsec,debug,packet 61c0fcab de1e95f1 e6f64954 c015b38e dadedc96 91277713 b766c7fd b63558ab
Nov/06/2018 14:44:02 ipsec,debug,packet 6b783799 9e274f61 8a6029e5 e5e310f7 3c99037e 2e9ad43a f64d3a36 3d006413
Nov/06/2018 14:44:02 ipsec,debug,packet b83c593b 858dd0be d5f71773 7d1ec71e fa871a51 38d0422f 60ddcc96 9bab311c
Nov/06/2018 14:44:02 ipsec,debug,packet 1b394135 f09504fe a1e116ef 9d18c25d 9b135158 ec5d26f2 b1660d72 7e8d3af6
Nov/06/2018 14:44:02 ipsec,debug,packet 848f706a 0733ac2b 7e053016 3484a600 c91f3db0 fb09e2e2 60acd51b ecc42d0c
Nov/06/2018 14:44:02 ipsec,debug,packet 9a6d5620 b0c45021 7e12b0a1 cd2b5134 12a80705 62864ef6 510cfea5 ec05cd16
Nov/06/2018 14:44:02 ipsec,debug,packet 129ffb50 90045e69 a6737c37 e19c01ec f162e852 8dc2fd67 f5796e65 0cb3df42
Nov/06/2018 14:44:02 ipsec,debug,packet 6922be65 a818ec7a 264d4b14 8c9e2a55 b98815fe 87e4e9b5 b2bb1b27 6c5d2ac2
Nov/06/2018 14:44:02 ipsec,debug,packet 571b465a 8041ac30 97fade54 ef76ff5c e328d315 8addcd82 0ee3b0a9 59f6543b
Nov/06/2018 14:44:02 ipsec,debug,packet b9d35c94 b6bde684 3c0903b7 2cdc21b7 9f581f67 e2d0f03b 05e4919b b2e254c5
Nov/06/2018 14:44:02 ipsec,debug,packet bf23f7e5 56d6b6d7 2d6f5e26 29f80694 df357068 cb351cd6 1653d6a0 4917b37b
Nov/06/2018 14:44:02 ipsec,debug,packet 254a9531 aab24a7a a50d7e44 49be8b0a dc5ac995 69bff33d 08d0ec19 1e960ea2
Nov/06/2018 14:44:02 ipsec,debug,packet 27580254 395dce4b 39e53edf a397eb02 44a8e1eb 23a1c10c 9c6a3e4f 95f4d03e
Nov/06/2018 14:44:02 ipsec,debug,packet c0218cbe f7509a49 60512fd4 2f8206cb 6de0b6b0 31ddfc07 cbf430c8 94282831
Nov/06/2018 14:44:02 ipsec,debug,packet df13f90f b5465894 ac88e171 1ea80dde 2f33e3c1 51785cf7 4d76ef0e e8d759a2
Nov/06/2018 14:44:02 ipsec,debug,packet 8deae301 f1d19364 5d259f9f 70770b20 db6f835f 8b967578 dae15094 6fb3019d
Nov/06/2018 14:44:02 ipsec,debug,packet f860a516 fcf6c63f 5ee12723 3d001c91 043ebc3a 260b5989 902e1311 8b265f58
Nov/06/2018 14:44:02 ipsec,debug,packet 757685eb 16622862 85c2cdac 6bd28edf 2fa53e13 46960bba fd51243a 6597d2bf
Nov/06/2018 14:44:02 ipsec,debug,packet f60f8eef 48573126 29a1dafb 581b8408 3fd879cd 02ebcba1 9dd99fdb 0ded768e
Nov/06/2018 14:44:02 ipsec,debug => child keymat (size 0xa0)
Nov/06/2018 14:44:02 ipsec,debug 5a2ddc4c c7a9cb5e c988bec2 081ae26e 7ab0a4a3 67cba62e 8897cf88 1a2bbcaa
Nov/06/2018 14:44:02 ipsec,debug 0528695a 800d49d2 28b5a1b9 74a7b55e c00eac10 bf4e79e9 e3be9730 fd8c18c8
Nov/06/2018 14:44:02 ipsec,debug cafe075e eb0c30a4 a9906150 ab87490a cc47ce01 fedcc986 f7b7ce4a 7f412c74
Nov/06/2018 14:44:02 ipsec,debug acf7cad4 0347c970 c0aee236 2e5c7ff7 fd58ff64 1f5beb37 b8962479 9b996a93
Nov/06/2018 14:44:02 ipsec,debug 3cdf7f4e af8a9331 d7d617a7 4b8045cb 185d985c eae77c78 1010d81c 19709666
Nov/06/2018 14:44:02 ipsec IPsec-SA established: [strongSwan IP][500]->[RouterOS IP][500] spi=0x846a964
Nov/06/2018 14:44:02 ipsec,debug ===== received 80 bytes from [strongSwan IP][500] to [RouterOS IP][500]
Nov/06/2018 14:44:02 ipsec,debug,packet 4eb16358 999296a3 9ac893ed d15770a0 2e202528 00000000 00000050 00000034
Nov/06/2018 14:44:02 ipsec,debug,packet 75b0e9ee f49d1c93 4c55f0ca 477ca250 e9968dfa 5556dc3e a596929c f53e1a4c
Nov/06/2018 14:44:02 ipsec,debug,packet 58717270 ecca511e 6465994c 78d4d04a
Nov/06/2018 14:44:02 ipsec -> ike2 reply, exchange: INFORMATIONAL:0 [strongSwan IP][500]
Nov/06/2018 14:44:02 ipsec ignoring
Nov/06/2018 14:44:02 ipsec,debug ===== received 736 bytes from [strongSwan IP][500] to [RouterOS IP][500]
Nov/06/2018 14:44:02 ipsec,debug,packet 4eb16358 999296a3 9ac893ed d15770a0 2e202408 00000002 000002e0 290002c4
Nov/06/2018 14:44:02 ipsec,debug,packet 97e84f2e 0af2f774 6e12b3b4 eb32c60f c756e844 d5738f99 779fdc5a 08107492
Nov/06/2018 14:44:02 ipsec,debug,packet 3860aa55 482f2daf c6ca9f62 3812a3ca e6c2aada edf306b3 c91a9f4b d48018c4
Nov/06/2018 14:44:02 ipsec,debug,packet bb1f01e7 4d8d0fd5 5dbe5792 c798c745 afddcc63 a964b356 bc1a852c de11ae0d
Nov/06/2018 14:44:02 ipsec,debug,packet 050c8c7a a509f8c3 e63e6579 bf1c4943 d0594d18 6380f37d bd5d9cc9 3afca78a
Nov/06/2018 14:44:02 ipsec,debug,packet bae541b3 8eb8e1bf 423cdf86 98256fb1 6ffccc17 bbe06d17 29f1df51 e57ff62d
Nov/06/2018 14:44:02 ipsec,debug,packet bfadcadf 586ef078 3ab8aa08 5b4c7232 792d64c9 d440f62a f623c186 76c0e309
Nov/06/2018 14:44:02 ipsec,debug,packet 409461ff 462f4753 962a84b5 bf2815d9 99d278e9 c6ba41e0 6cfafd78 52efb894
Nov/06/2018 14:44:02 ipsec,debug,packet fec7ae07 32bca5f4 93a7f8ea 4ad2f765 7f6450c4 01b28180 a4cd2fb4 38df9546
Nov/06/2018 14:44:02 ipsec,debug,packet cd01f2df ad00be46 3c44babf 131fc07d 62d96667 29ab608f b69292f7 534679ba
Nov/06/2018 14:44:02 ipsec,debug,packet f2533888 01614c41 e2c3768f fda413d4 2faa559d f1fd15e5 41298ce3 b9600ba0
Nov/06/2018 14:44:02 ipsec,debug,packet deb2f225 fa1a3826 0017d121 4b7633c0 41902887 b85c10bb a7a59beb b71a0405
Nov/06/2018 14:44:02 ipsec,debug,packet b8da931b 6ab18aa9 ed85548f 2023cdaa 7fa72b69 0788faec 41bf2003 2202ba5b
Nov/06/2018 14:44:02 ipsec,debug,packet ab7e479b 73df11a3 ef8e3648 e3d864d2 eeaedc3d e3850d74 5c24ef73 dc616036
Nov/06/2018 14:44:02 ipsec,debug,packet ffffd4c7 fb3f7772 a06595a9 88985174 4551e3e4 f96e9812 e1f5e0d1 b8afc8ff
Nov/06/2018 14:44:02 ipsec,debug,packet 2e628739 786a5f8f 13f6e90f 7a715eab a5bdbc4e bbe02bcb ff02d4f8 717e94c9
Nov/06/2018 14:44:02 ipsec,debug,packet 308695f7 631a8219 1eee4210 a32e437b 886ef9b7 9563fc6d 7eec73e4 1a0bbc3f
Nov/06/2018 14:44:02 ipsec,debug,packet c07eb481 61d78370 27399212 0de995ea 436b1bf6 a3afc5c5 94d1492d a388618f
Nov/06/2018 14:44:02 ipsec,debug,packet 532c5300 247f5b9e 311a721b 2eefb34b 6a0d9c5f 73997007 f051b71f 7eb701a4
Nov/06/2018 14:44:02 ipsec,debug,packet dc42d803 f3189e37 59deaf34 915892cc bb828f7d 8b5dc244 9043964e 5c76839e
Nov/06/2018 14:44:02 ipsec,debug,packet 8094a6bc db99273d bd93e589 f6f68c2c 3f2955b9 0603328f 4df8cbff 5c6af6b1
Nov/06/2018 14:44:02 ipsec,debug,packet c74adc69 0ef17aca 556dcc87 abdf1427 7f25ad19 8d4121c4 e7ea5582 8683f1d2
Nov/06/2018 14:44:02 ipsec,debug,packet f0e41d6b 54be9586 0afd08e2 d5fefceb e53d3608 a3b33400 89dcc918 93a2f309
Nov/06/2018 14:44:02 ipsec -> ike2 request, exchange: CREATE_CHILD_SA:2 [strongSwan IP][500]
Nov/06/2018 14:44:02 ipsec reply retransmission
Nov/06/2018 14:44:02 ipsec,debug ===== sending 768 bytes from [RouterOS IP][500] to [strongSwan IP][500]
Nov/06/2018 14:44:02 ipsec,debug 1 times of 768 bytes message will be sent to [strongSwan IP][500]
Nov/06/2018 14:44:02 ipsec,debug,packet 4eb16358 999296a3 9ac893ed d15770a0 2e202320 00000001 00000300 280002e4
Nov/06/2018 14:44:02 ipsec,debug,packet e53d3608 a3b33400 89dcc918 93a2f309 b75972b6 b5faa615 3ede3517 223865d9
Nov/06/2018 14:44:02 ipsec,debug,packet 40033f9c 3d7121a5 cde19741 ffc0f1c4 5387b7af 9abef5ee 8ab74668 b0f19a24
Nov/06/2018 14:44:02 ipsec,debug,packet 58f9ff33 af43a683 f4b4b322 f644497b eff871dc c397af07 4d22cb44 9731fcf1
Nov/06/2018 14:44:02 ipsec,debug,packet 97790bf7 a7ef6c0d 447f5e9f 6d81fb83 0caad708 ce332609 3a949c69 036245be
Nov/06/2018 14:44:02 ipsec,debug,packet 61c0fcab de1e95f1 e6f64954 c015b38e dadedc96 91277713 b766c7fd b63558ab
Nov/06/2018 14:44:02 ipsec,debug,packet 6b783799 9e274f61 8a6029e5 e5e310f7 3c99037e 2e9ad43a f64d3a36 3d006413
Nov/06/2018 14:44:02 ipsec,debug,packet b83c593b 858dd0be d5f71773 7d1ec71e fa871a51 38d0422f 60ddcc96 9bab311c
Nov/06/2018 14:44:02 ipsec,debug,packet 1b394135 f09504fe a1e116ef 9d18c25d 9b135158 ec5d26f2 b1660d72 7e8d3af6
Nov/06/2018 14:44:02 ipsec,debug,packet 848f706a 0733ac2b 7e053016 3484a600 c91f3db0 fb09e2e2 60acd51b ecc42d0c
Nov/06/2018 14:44:02 ipsec,debug,packet 9a6d5620 b0c45021 7e12b0a1 cd2b5134 12a80705 62864ef6 510cfea5 ec05cd16
Nov/06/2018 14:44:02 ipsec,debug,packet 129ffb50 90045e69 a6737c37 e19c01ec f162e852 8dc2fd67 f5796e65 0cb3df42
Nov/06/2018 14:44:02 ipsec,debug,packet 6922be65 a818ec7a 264d4b14 8c9e2a55 b98815fe 87e4e9b5 b2bb1b27 6c5d2ac2
Nov/06/2018 14:44:02 ipsec,debug,packet 571b465a 8041ac30 97fade54 ef76ff5c e328d315 8addcd82 0ee3b0a9 59f6543b
Nov/06/2018 14:44:02 ipsec,debug,packet b9d35c94 b6bde684 3c0903b7 2cdc21b7 9f581f67 e2d0f03b 05e4919b b2e254c5
Nov/06/2018 14:44:02 ipsec,debug,packet bf23f7e5 56d6b6d7 2d6f5e26 29f80694 df357068 cb351cd6 1653d6a0 4917b37b
Nov/06/2018 14:44:02 ipsec,debug,packet 254a9531 aab24a7a a50d7e44 49be8b0a dc5ac995 69bff33d 08d0ec19 1e960ea2
Nov/06/2018 14:44:02 ipsec,debug,packet 27580254 395dce4b 39e53edf a397eb02 44a8e1eb 23a1c10c 9c6a3e4f 95f4d03e
Nov/06/2018 14:44:02 ipsec,debug,packet c0218cbe f7509a49 60512fd4 2f8206cb 6de0b6b0 31ddfc07 cbf430c8 94282831
Nov/06/2018 14:44:02 ipsec,debug,packet df13f90f b5465894 ac88e171 1ea80dde 2f33e3c1 51785cf7 4d76ef0e e8d759a2
Nov/06/2018 14:44:02 ipsec,debug,packet 8deae301 f1d19364 5d259f9f 70770b20 db6f835f 8b967578 dae15094 6fb3019d
Nov/06/2018 14:44:02 ipsec,debug,packet f860a516 fcf6c63f 5ee12723 3d001c91 043ebc3a 260b5989 902e1311 8b265f58
Nov/06/2018 14:44:02 ipsec,debug,packet 757685eb 16622862 85c2cdac 6bd28edf 2fa53e13 46960bba fd51243a 6597d2bf
Nov/06/2018 14:44:02 ipsec,debug,packet f60f8eef 48573126 29a1dafb 581b8408 3fd879cd 02ebcba1 9dd99fdb 0ded768e
Nov/06/2018 14:44:07 ipsec,debug ===== received 736 bytes from [strongSwan IP][500] to [RouterOS IP][500]
Nov/06/2018 14:44:07 ipsec,debug,packet 4eb16358 999296a3 9ac893ed d15770a0 2e202408 00000002 000002e0 290002c4
Nov/06/2018 14:44:07 ipsec,debug,packet 97e84f2e 0af2f774 6e12b3b4 eb32c60f c756e844 d5738f99 779fdc5a 08107492
Nov/06/2018 14:44:07 ipsec,debug,packet 3860aa55 482f2daf c6ca9f62 3812a3ca e6c2aada edf306b3 c91a9f4b d48018c4
Nov/06/2018 14:44:07 ipsec,debug,packet bb1f01e7 4d8d0fd5 5dbe5792 c798c745 afddcc63 a964b356 bc1a852c de11ae0d
Nov/06/2018 14:44:07 ipsec,debug,packet 050c8c7a a509f8c3 e63e6579 bf1c4943 d0594d18 6380f37d bd5d9cc9 3afca78a
Nov/06/2018 14:44:07 ipsec,debug,packet bae541b3 8eb8e1bf 423cdf86 98256fb1 6ffccc17 bbe06d17 29f1df51 e57ff62d
Nov/06/2018 14:44:07 ipsec,debug,packet bfadcadf 586ef078 3ab8aa08 5b4c7232 792d64c9 d440f62a f623c186 76c0e309
Nov/06/2018 14:44:07 ipsec,debug,packet 409461ff 462f4753 962a84b5 bf2815d9 99d278e9 c6ba41e0 6cfafd78 52efb894
Nov/06/2018 14:44:07 ipsec,debug,packet fec7ae07 32bca5f4 93a7f8ea 4ad2f765 7f6450c4 01b28180 a4cd2fb4 38df9546
Nov/06/2018 14:44:07 ipsec,debug,packet cd01f2df ad00be46 3c44babf 131fc07d 62d96667 29ab608f b69292f7 534679ba
Nov/06/2018 14:44:07 ipsec,debug,packet f2533888 01614c41 e2c3768f fda413d4 2faa559d f1fd15e5 41298ce3 b9600ba0
Nov/06/2018 14:44:07 ipsec,debug,packet deb2f225 fa1a3826 0017d121 4b7633c0 41902887 b85c10bb a7a59beb b71a0405
Nov/06/2018 14:44:07 ipsec,debug,packet b8da931b 6ab18aa9 ed85548f 2023cdaa 7fa72b69 0788faec 41bf2003 2202ba5b
Nov/06/2018 14:44:07 ipsec,debug,packet ab7e479b 73df11a3 ef8e3648 e3d864d2 eeaedc3d e3850d74 5c24ef73 dc616036
Nov/06/2018 14:44:07 ipsec,debug,packet ffffd4c7 fb3f7772 a06595a9 88985174 4551e3e4 f96e9812 e1f5e0d1 b8afc8ff
Nov/06/2018 14:44:07 ipsec,debug,packet 2e628739 786a5f8f 13f6e90f 7a715eab a5bdbc4e bbe02bcb ff02d4f8 717e94c9
Nov/06/2018 14:44:07 ipsec,debug,packet 308695f7 631a8219 1eee4210 a32e437b 886ef9b7 9563fc6d 7eec73e4 1a0bbc3f
Nov/06/2018 14:44:07 ipsec,debug,packet c07eb481 61d78370 27399212 0de995ea 436b1bf6 a3afc5c5 94d1492d a388618f
Nov/06/2018 14:44:07 ipsec,debug,packet 532c5300 247f5b9e 311a721b 2eefb34b 6a0d9c5f 73997007 f051b71f 7eb701a4
Nov/06/2018 14:44:07 ipsec,debug,packet dc42d803 f3189e37 59deaf34 915892cc bb828f7d 8b5dc244 9043964e 5c76839e
Nov/06/2018 14:44:07 ipsec,debug,packet 8094a6bc db99273d bd93e589 f6f68c2c 3f2955b9 0603328f 4df8cbff 5c6af6b1
Nov/06/2018 14:44:07 ipsec,debug,packet c74adc69 0ef17aca 556dcc87 abdf1427 7f25ad19 8d4121c4 e7ea5582 8683f1d2
Nov/06/2018 14:44:07 ipsec,debug,packet f0e41d6b 54be9586 0afd08e2 d5fefceb e53d3608 a3b33400 89dcc918 93a2f309
Nov/06/2018 14:44:07 ipsec -> ike2 request, exchange: CREATE_CHILD_SA:2 [strongSwan IP][500]
Nov/06/2018 14:44:07 ipsec reply retransmission
Nov/06/2018 14:44:07 ipsec,debug ===== sending 768 bytes from [RouterOS IP][500] to [strongSwan IP][500]
Nov/06/2018 14:44:07 ipsec,debug 1 times of 768 bytes message will be sent to [strongSwan IP][500]
Nov/06/2018 14:44:07 ipsec,debug,packet 4eb16358 999296a3 9ac893ed d15770a0 2e202320 00000001 00000300 280002e4
Nov/06/2018 14:44:07 ipsec,debug,packet e53d3608 a3b33400 89dcc918 93a2f309 b75972b6 b5faa615 3ede3517 223865d9
Nov/06/2018 14:44:07 ipsec,debug,packet 40033f9c 3d7121a5 cde19741 ffc0f1c4 5387b7af 9abef5ee 8ab74668 b0f19a24
Nov/06/2018 14:44:07 ipsec,debug,packet 58f9ff33 af43a683 f4b4b322 f644497b eff871dc c397af07 4d22cb44 9731fcf1
Nov/06/2018 14:44:07 ipsec,debug,packet 97790bf7 a7ef6c0d 447f5e9f 6d81fb83 0caad708 ce332609 3a949c69 036245be
Nov/06/2018 14:44:07 ipsec,debug,packet 61c0fcab de1e95f1 e6f64954 c015b38e dadedc96 91277713 b766c7fd b63558ab
Nov/06/2018 14:44:07 ipsec,debug,packet 6b783799 9e274f61 8a6029e5 e5e310f7 3c99037e 2e9ad43a f64d3a36 3d006413
Nov/06/2018 14:44:07 ipsec,debug,packet b83c593b 858dd0be d5f71773 7d1ec71e fa871a51 38d0422f 60ddcc96 9bab311c
Nov/06/2018 14:44:07 ipsec,debug,packet 1b394135 f09504fe a1e116ef 9d18c25d 9b135158 ec5d26f2 b1660d72 7e8d3af6
Nov/06/2018 14:44:07 ipsec,debug,packet 848f706a 0733ac2b 7e053016 3484a600 c91f3db0 fb09e2e2 60acd51b ecc42d0c
Nov/06/2018 14:44:07 ipsec,debug,packet 9a6d5620 b0c45021 7e12b0a1 cd2b5134 12a80705 62864ef6 510cfea5 ec05cd16
Nov/06/2018 14:44:07 ipsec,debug,packet 129ffb50 90045e69 a6737c37 e19c01ec f162e852 8dc2fd67 f5796e65 0cb3df42
Nov/06/2018 14:44:07 ipsec,debug,packet 6922be65 a818ec7a 264d4b14 8c9e2a55 b98815fe 87e4e9b5 b2bb1b27 6c5d2ac2
Nov/06/2018 14:44:07 ipsec,debug,packet 571b465a 8041ac30 97fade54 ef76ff5c e328d315 8addcd82 0ee3b0a9 59f6543b
Nov/06/2018 14:44:07 ipsec,debug,packet b9d35c94 b6bde684 3c0903b7 2cdc21b7 9f581f67 e2d0f03b 05e4919b b2e254c5
Nov/06/2018 14:44:07 ipsec,debug,packet bf23f7e5 56d6b6d7 2d6f5e26 29f80694 df357068 cb351cd6 1653d6a0 4917b37b
Nov/06/2018 14:44:07 ipsec,debug,packet 254a9531 aab24a7a a50d7e44 49be8b0a dc5ac995 69bff33d 08d0ec19 1e960ea2
Nov/06/2018 14:44:07 ipsec,debug,packet 27580254 395dce4b 39e53edf a397eb02 44a8e1eb 23a1c10c 9c6a3e4f 95f4d03e
Nov/06/2018 14:44:07 ipsec,debug,packet c0218cbe f7509a49 60512fd4 2f8206cb 6de0b6b0 31ddfc07 cbf430c8 94282831
Nov/06/2018 14:44:07 ipsec,debug,packet df13f90f b5465894 ac88e171 1ea80dde 2f33e3c1 51785cf7 4d76ef0e e8d759a2
Nov/06/2018 14:44:07 ipsec,debug,packet 8deae301 f1d19364 5d259f9f 70770b20 db6f835f 8b967578 dae15094 6fb3019d
Nov/06/2018 14:44:07 ipsec,debug,packet f860a516 fcf6c63f 5ee12723 3d001c91 043ebc3a 260b5989 902e1311 8b265f58
Nov/06/2018 14:44:07 ipsec,debug,packet 757685eb 16622862 85c2cdac 6bd28edf 2fa53e13 46960bba fd51243a 6597d2bf
Nov/06/2018 14:44:07 ipsec,debug,packet f60f8eef 48573126 29a1dafb 581b8408 3fd879cd 02ebcba1 9dd99fdb 0ded768e
Nov/06/2018 14:44:07 firewall,info output: in:(unknown 0) out:vrrp1, proto ICMP (type 8, code 0), [RouterOS IP]->[strongSwan IP], len 56
Nov/06/2018 14:44:07 ipsec IPsec-SA established: [RouterOS IP][500]->[strongSwan IP][500] spi=0xcb1e31d6
Nov/06/2018 14:44:07 firewall,info input: in:vrrp1 out:(unknown 0), src-mac 00:04:a7:09:8c:3a, proto ICMP (type 0, code 0), [strongSwan IP]->[RouterOS IP], len 56
Nov/06/2018 14:44:08 firewall,info output: in:(unknown 0) out:vrrp1, proto ICMP (type 8, code 0), [RouterOS IP]->[strongSwan IP], len 56
Nov/06/2018 14:44:09 firewall,info output: in:(unknown 0) out:vrrp1, proto ICMP (type 8, code 0), [RouterOS IP]->[strongSwan IP], len 56
Nov/06/2018 14:44:10 firewall,info output: in:(unknown 0) out:vrrp1, proto ICMP (type 8, code 0), [RouterOS IP]->[strongSwan IP], len 56
Nov/06/2018 14:44:11 firewall,info output: in:(unknown 0) out:vrrp1, proto ICMP (type 8, code 0), [RouterOS IP]->[strongSwan IP], len 56
Nov/06/2018 14:44:12 firewall,info output: in:(unknown 0) out:vrrp1, proto ICMP (type 8, code 0), [RouterOS IP]->[strongSwan IP], len 56
Nov/06/2018 14:44:13 firewall,info output: in:(unknown 0) out:vrrp1, proto ICMP (type 8, code 0), [RouterOS IP]->[strongSwan IP], len 56
Nov/06/2018 14:44:14 firewall,info output: in:(unknown 0) out:vrrp1, proto ICMP (type 8, code 0), [RouterOS IP]->[strongSwan IP], len 56
Nov/06/2018 14:44:15 firewall,info output: in:(unknown 0) out:vrrp1, proto ICMP (type 8, code 0), [RouterOS IP]->[strongSwan IP], len 56
Nov/06/2018 14:44:16 firewall,info output: in:(unknown 0) out:vrrp1, proto ICMP (type 8, code 0), [RouterOS IP]->[strongSwan IP], len 56
Nov/06/2018 14:44:17 firewall,info output: in:(unknown 0) out:vrrp1, proto ICMP (type 8, code 0), [RouterOS IP]->[strongSwan IP], len 56
Nov/06/2018 14:44:18 firewall,info output: in:(unknown 0) out:vrrp1, proto ICMP (type 8, code 0), [RouterOS IP]->[strongSwan IP], len 56
Nov/06/2018 14:44:19 firewall,info output: in:(unknown 0) out:vrrp1, proto ICMP (type 8, code 0), [RouterOS IP]->[strongSwan IP], len 56
Nov/06/2018 14:44:20 ipsec,debug ===== received 736 bytes from [strongSwan IP][500] to [RouterOS IP][500]
Nov/06/2018 14:44:20 ipsec,debug,packet 4eb16358 999296a3 9ac893ed d15770a0 2e202408 00000002 000002e0 290002c4
Nov/06/2018 14:44:20 ipsec,debug,packet 97e84f2e 0af2f774 6e12b3b4 eb32c60f c756e844 d5738f99 779fdc5a 08107492
Nov/06/2018 14:44:20 ipsec,debug,packet 3860aa55 482f2daf c6ca9f62 3812a3ca e6c2aada edf306b3 c91a9f4b d48018c4
Nov/06/2018 14:44:20 ipsec,debug,packet bb1f01e7 4d8d0fd5 5dbe5792 c798c745 afddcc63 a964b356 bc1a852c de11ae0d
Nov/06/2018 14:44:20 ipsec,debug,packet 050c8c7a a509f8c3 e63e6579 bf1c4943 d0594d18 6380f37d bd5d9cc9 3afca78a
Nov/06/2018 14:44:20 ipsec,debug,packet bae541b3 8eb8e1bf 423cdf86 98256fb1 6ffccc17 bbe06d17 29f1df51 e57ff62d
Nov/06/2018 14:44:20 ipsec,debug,packet bfadcadf 586ef078 3ab8aa08 5b4c7232 792d64c9 d440f62a f623c186 76c0e309
Nov/06/2018 14:44:20 ipsec,debug,packet 409461ff 462f4753 962a84b5 bf2815d9 99d278e9 c6ba41e0 6cfafd78 52efb894
Nov/06/2018 14:44:20 ipsec,debug,packet fec7ae07 32bca5f4 93a7f8ea 4ad2f765 7f6450c4 01b28180 a4cd2fb4 38df9546
Nov/06/2018 14:44:20 ipsec,debug,packet cd01f2df ad00be46 3c44babf 131fc07d 62d96667 29ab608f b69292f7 534679ba
Nov/06/2018 14:44:20 ipsec,debug,packet f2533888 01614c41 e2c3768f fda413d4 2faa559d f1fd15e5 41298ce3 b9600ba0
Nov/06/2018 14:44:20 ipsec,debug,packet deb2f225 fa1a3826 0017d121 4b7633c0 41902887 b85c10bb a7a59beb b71a0405
Nov/06/2018 14:44:20 ipsec,debug,packet b8da931b 6ab18aa9 ed85548f 2023cdaa 7fa72b69 0788faec 41bf2003 2202ba5b
Nov/06/2018 14:44:20 ipsec,debug,packet ab7e479b 73df11a3 ef8e3648 e3d864d2 eeaedc3d e3850d74 5c24ef73 dc616036
Nov/06/2018 14:44:20 ipsec,debug,packet ffffd4c7 fb3f7772 a06595a9 88985174 4551e3e4 f96e9812 e1f5e0d1 b8afc8ff
Nov/06/2018 14:44:20 ipsec,debug,packet 2e628739 786a5f8f 13f6e90f 7a715eab a5bdbc4e bbe02bcb ff02d4f8 717e94c9
Nov/06/2018 14:44:20 ipsec,debug,packet 308695f7 631a8219 1eee4210 a32e437b 886ef9b7 9563fc6d 7eec73e4 1a0bbc3f
Nov/06/2018 14:44:20 ipsec,debug,packet c07eb481 61d78370 27399212 0de995ea 436b1bf6 a3afc5c5 94d1492d a388618f
Nov/06/2018 14:44:20 ipsec,debug,packet 532c5300 247f5b9e 311a721b 2eefb34b 6a0d9c5f 73997007 f051b71f 7eb701a4
Nov/06/2018 14:44:20 ipsec,debug,packet dc42d803 f3189e37 59deaf34 915892cc bb828f7d 8b5dc244 9043964e 5c76839e
Nov/06/2018 14:44:20 ipsec,debug,packet 8094a6bc db99273d bd93e589 f6f68c2c 3f2955b9 0603328f 4df8cbff 5c6af6b1
Nov/06/2018 14:44:20 ipsec,debug,packet c74adc69 0ef17aca 556dcc87 abdf1427 7f25ad19 8d4121c4 e7ea5582 8683f1d2
Nov/06/2018 14:44:20 ipsec,debug,packet f0e41d6b 54be9586 0afd08e2 d5fefceb e53d3608 a3b33400 89dcc918 93a2f309
Nov/06/2018 14:44:20 ipsec -> ike2 request, exchange: CREATE_CHILD_SA:2 [strongSwan IP][500]
Nov/06/2018 14:44:20 ipsec reply retransmission
Nov/06/2018 14:44:20 ipsec,debug ===== sending 768 bytes from [RouterOS IP][500] to [strongSwan IP][500]
Nov/06/2018 14:44:20 ipsec,debug 1 times of 768 bytes message will be sent to [strongSwan IP][500]
Nov/06/2018 14:44:20 ipsec,debug,packet 4eb16358 999296a3 9ac893ed d15770a0 2e202320 00000001 00000300 280002e4
Nov/06/2018 14:44:20 ipsec,debug,packet e53d3608 a3b33400 89dcc918 93a2f309 b75972b6 b5faa615 3ede3517 223865d9
Nov/06/2018 14:44:20 ipsec,debug,packet 40033f9c 3d7121a5 cde19741 ffc0f1c4 5387b7af 9abef5ee 8ab74668 b0f19a24
Nov/06/2018 14:44:20 ipsec,debug,packet 58f9ff33 af43a683 f4b4b322 f644497b eff871dc c397af07 4d22cb44 9731fcf1
Nov/06/2018 14:44:20 ipsec,debug,packet 97790bf7 a7ef6c0d 447f5e9f 6d81fb83 0caad708 ce332609 3a949c69 036245be
Nov/06/2018 14:44:20 ipsec,debug,packet 61c0fcab de1e95f1 e6f64954 c015b38e dadedc96 91277713 b766c7fd b63558ab
Nov/06/2018 14:44:20 ipsec,debug,packet 6b783799 9e274f61 8a6029e5 e5e310f7 3c99037e 2e9ad43a f64d3a36 3d006413
Nov/06/2018 14:44:20 ipsec,debug,packet b83c593b 858dd0be d5f71773 7d1ec71e fa871a51 38d0422f 60ddcc96 9bab311c
Nov/06/2018 14:44:20 ipsec,debug,packet 1b394135 f09504fe a1e116ef 9d18c25d 9b135158 ec5d26f2 b1660d72 7e8d3af6
Nov/06/2018 14:44:20 ipsec,debug,packet 848f706a 0733ac2b 7e053016 3484a600 c91f3db0 fb09e2e2 60acd51b ecc42d0c
Nov/06/2018 14:44:20 ipsec,debug,packet 9a6d5620 b0c45021 7e12b0a1 cd2b5134 12a80705 62864ef6 510cfea5 ec05cd16
Nov/06/2018 14:44:20 ipsec,debug,packet 129ffb50 90045e69 a6737c37 e19c01ec f162e852 8dc2fd67 f5796e65 0cb3df42
Nov/06/2018 14:44:20 ipsec,debug,packet 6922be65 a818ec7a 264d4b14 8c9e2a55 b98815fe 87e4e9b5 b2bb1b27 6c5d2ac2
Nov/06/2018 14:44:20 ipsec,debug,packet 571b465a 8041ac30 97fade54 ef76ff5c e328d315 8addcd82 0ee3b0a9 59f6543b
Nov/06/2018 14:44:20 ipsec,debug,packet b9d35c94 b6bde684 3c0903b7 2cdc21b7 9f581f67 e2d0f03b 05e4919b b2e254c5
Nov/06/2018 14:44:20 ipsec,debug,packet bf23f7e5 56d6b6d7 2d6f5e26 29f80694 df357068 cb351cd6 1653d6a0 4917b37b
Nov/06/2018 14:44:20 ipsec,debug,packet 254a9531 aab24a7a a50d7e44 49be8b0a dc5ac995 69bff33d 08d0ec19 1e960ea2
Nov/06/2018 14:44:20 ipsec,debug,packet 27580254 395dce4b 39e53edf a397eb02 44a8e1eb 23a1c10c 9c6a3e4f 95f4d03e
Nov/06/2018 14:44:20 ipsec,debug,packet c0218cbe f7509a49 60512fd4 2f8206cb 6de0b6b0 31ddfc07 cbf430c8 94282831
Nov/06/2018 14:44:20 ipsec,debug,packet df13f90f b5465894 ac88e171 1ea80dde 2f33e3c1 51785cf7 4d76ef0e e8d759a2
Nov/06/2018 14:44:20 ipsec,debug,packet 8deae301 f1d19364 5d259f9f 70770b20 db6f835f 8b967578 dae15094 6fb3019d
Nov/06/2018 14:44:20 ipsec,debug,packet f860a516 fcf6c63f 5ee12723 3d001c91 043ebc3a 260b5989 902e1311 8b265f58
Nov/06/2018 14:44:20 ipsec,debug,packet 757685eb 16622862 85c2cdac 6bd28edf 2fa53e13 46960bba fd51243a 6597d2bf
Nov/06/2018 14:44:20 ipsec,debug,packet f60f8eef 48573126 29a1dafb 581b8408 3fd879cd 02ebcba1 9dd99fdb 0ded768e
Nov/06/2018 14:44:20 firewall,info output: in:(unknown 0) out:vrrp1, proto ICMP (type 8, code 0), [RouterOS IP]->[strongSwan IP], len 56
Nov/06/2018 14:44:21 firewall,info output: in:(unknown 0) out:vrrp1, proto ICMP (type 8, code 0), [RouterOS IP]->[strongSwan IP], len 56
Nov/06/2018 14:44:22 firewall,info output: in:(unknown 0) out:vrrp1, proto ICMP (type 8, code 0), [RouterOS IP]->[strongSwan IP], len 56
Nov/06/2018 14:44:23 firewall,info output: in:(unknown 0) out:vrrp1, proto ICMP (type 8, code 0), [RouterOS IP]->[strongSwan IP], len 56
Nov/06/2018 14:44:24 firewall,info output: in:(unknown 0) out:vrrp1, proto ICMP (type 8, code 0), [RouterOS IP]->[strongSwan IP], len 56
Nov/06/2018 14:44:25 firewall,info output: in:(unknown 0) out:vrrp1, proto ICMP (type 8, code 0), [RouterOS IP]->[strongSwan IP], len 56
Nov/06/2018 14:44:25 ipsec sending dpd packet
Nov/06/2018 14:44:25 ipsec <- ike2 request, exchange: INFORMATIONAL:1 [strongSwan IP][500]
Nov/06/2018 14:44:25 ipsec,debug,packet => outgoing plain packet (size 0x1c)
Nov/06/2018 14:44:25 ipsec,debug,packet 4eb16358 999296a3 9ac893ed d15770a0 00202500 00000001 0000001c
Nov/06/2018 14:44:25 ipsec adding payload: ENC
Nov/06/2018 14:44:25 ipsec,debug => (size 0x74)
Nov/06/2018 14:44:25 ipsec,debug 00000074 e53d3608 a3b33400 89dcc918 93a2f309 045d84f4 46ec9914 f0d89b53
Nov/06/2018 14:44:25 ipsec,debug 2c76f0c7 29a434f6 6b20f843 ca04851d 8e022c19 b59bea64 130cba22 eb1d6eff
Nov/06/2018 14:44:25 ipsec,debug e87d642e 98dd70b2 c5bdf361 3dbb0c4b 2d07a932 090f70d2 c537b782 ae6bfd6b
Nov/06/2018 14:44:25 ipsec,debug 22415904 03000009 011a0000 10050000 00000000
Nov/06/2018 14:44:25 ipsec,debug ===== sending 144 bytes from [RouterOS IP][500] to [strongSwan IP][500]
Nov/06/2018 14:44:25 ipsec,debug 1 times of 144 bytes message will be sent to [strongSwan IP][500]
Nov/06/2018 14:44:25 ipsec,debug,packet 4eb16358 999296a3 9ac893ed d15770a0 2e202500 00000001 00000090 00000074
Nov/06/2018 14:44:25 ipsec,debug,packet e53d3608 a3b33400 89dcc918 93a2f309 045d84f4 46ec9914 f0d89b53 2c76f0c7
Nov/06/2018 14:44:25 ipsec,debug,packet 29a434f6 6b20f843 ca04851d 8e022c19 b59bea64 130cba22 eb1d6eff e87d642e
Nov/06/2018 14:44:25 ipsec,debug,packet 98dd70b2 c5bdf361 3dbb0c4b 2d07a932 090f70d2 c537b782 ae6bfd6b 22415904
Nov/06/2018 14:44:25 ipsec,debug,packet 7306ec5d e4c87e1f 731bee76 8c1f6bc9
Nov/06/2018 14:44:26 firewall,info output: in:(unknown 0) out:vrrp1, proto ICMP (type 8, code 0), [RouterOS IP]->[strongSwan IP], len 56
Nov/06/2018 14:44:27 firewall,info output: in:(unknown 0) out:vrrp1, proto ICMP (type 8, code 0), [RouterOS IP]->[strongSwan IP], len 56
Nov/06/2018 14:44:28 firewall,info output: in:(unknown 0) out:vrrp1, proto ICMP (type 8, code 0), [RouterOS IP]->[strongSwan IP], len 56
Nov/06/2018 14:44:29 firewall,info output: in:(unknown 0) out:vrrp1, proto ICMP (type 8, code 0), [RouterOS IP]->[strongSwan IP], len 56
Nov/06/2018 14:44:30 firewall,info output: in:(unknown 0) out:vrrp1, proto ICMP (type 8, code 0), [RouterOS IP]->[strongSwan IP], len 56
Nov/06/2018 14:44:30 ipsec dpd: retransmit
Nov/06/2018 14:44:30 ipsec,debug ===== sending 144 bytes from [RouterOS IP][500] to [strongSwan IP][500]
Nov/06/2018 14:44:30 ipsec,debug 1 times of 144 bytes message will be sent to [strongSwan IP][500]
Nov/06/2018 14:44:30 ipsec,debug,packet 4eb16358 999296a3 9ac893ed d15770a0 2e202500 00000001 00000090 00000074
Nov/06/2018 14:44:30 ipsec,debug,packet e53d3608 a3b33400 89dcc918 93a2f309 045d84f4 46ec9914 f0d89b53 2c76f0c7
Nov/06/2018 14:44:30 ipsec,debug,packet 29a434f6 6b20f843 ca04851d 8e022c19 b59bea64 130cba22 eb1d6eff e87d642e
Nov/06/2018 14:44:30 ipsec,debug,packet 98dd70b2 c5bdf361 3dbb0c4b 2d07a932 090f70d2 c537b782 ae6bfd6b 22415904
Nov/06/2018 14:44:30 ipsec,debug,packet 7306ec5d e4c87e1f 731bee76 8c1f6bc9
Nov/06/2018 14:44:31 firewall,info output: in:(unknown 0) out:vrrp1, proto ICMP (type 8, code 0), [RouterOS IP]->[strongSwan IP], len 56
Nov/06/2018 14:44:32 firewall,info output: in:(unknown 0) out:vrrp1, proto ICMP (type 8, code 0), [RouterOS IP]->[strongSwan IP], len 56
Nov/06/2018 14:44:33 firewall,info output: in:(unknown 0) out:vrrp1, proto ICMP (type 8, code 0), [RouterOS IP]->[strongSwan IP], len 56
Nov/06/2018 14:44:34 firewall,info output: in:(unknown 0) out:vrrp1, proto ICMP (type 8, code 0), [RouterOS IP]->[strongSwan IP], len 56
Nov/06/2018 14:44:35 firewall,info output: in:(unknown 0) out:vrrp1, proto ICMP (type 8, code 0), [RouterOS IP]->[strongSwan IP], len 56
Nov/06/2018 14:44:35 ipsec dpd: retransmit
Nov/06/2018 14:44:35 ipsec,debug ===== sending 144 bytes from [RouterOS IP][500] to [strongSwan IP][500]
Nov/06/2018 14:44:35 ipsec,debug 1 times of 144 bytes message will be sent to [strongSwan IP][500]
Nov/06/2018 14:44:35 ipsec,debug,packet 4eb16358 999296a3 9ac893ed d15770a0 2e202500 00000001 00000090 00000074
Nov/06/2018 14:44:35 ipsec,debug,packet e53d3608 a3b33400 89dcc918 93a2f309 045d84f4 46ec9914 f0d89b53 2c76f0c7
Nov/06/2018 14:44:35 ipsec,debug,packet 29a434f6 6b20f843 ca04851d 8e022c19 b59bea64 130cba22 eb1d6eff e87d642e
Nov/06/2018 14:44:35 ipsec,debug,packet 98dd70b2 c5bdf361 3dbb0c4b 2d07a932 090f70d2 c537b782 ae6bfd6b 22415904
Nov/06/2018 14:44:35 ipsec,debug,packet 7306ec5d e4c87e1f 731bee76 8c1f6bc9
Nov/06/2018 14:44:36 ipsec,debug ===== received 80 bytes from [strongSwan IP][500] to [RouterOS IP][500]
Nov/06/2018 14:44:36 ipsec,debug,packet 4eb16358 999296a3 9ac893ed d15770a0 2e202528 00000001 00000050 00000034
Nov/06/2018 14:44:36 ipsec,debug,packet 8bdc1bf3 6c3b7599 200e8237 390ce9bf 593c2d1f 6bf6a1d8 927b13db e2f23e91
Nov/06/2018 14:44:36 ipsec,debug,packet cd971c3b da1d2a92 ed9d9d12 f754841b
Nov/06/2018 14:44:36 ipsec -> ike2 reply, exchange: INFORMATIONAL:1 [strongSwan IP][500]
Nov/06/2018 14:44:36 ipsec payload seen: ENC
Nov/06/2018 14:44:36 ipsec processing payload: ENC
Nov/06/2018 14:44:36 ipsec,debug => iv (size 0x10)
Nov/06/2018 14:44:36 ipsec,debug 8bdc1bf3 6c3b7599 200e8237 390ce9bf
Nov/06/2018 14:44:36 ipsec,debug decrypted
Nov/06/2018 14:44:36 ipsec,debug,packet => decrypted packet (size 0x0)
Nov/06/2018 14:44:36 ipsec respond: info
Nov/06/2018 14:44:36 ipsec,debug reply ignored
Nov/06/2018 14:44:36 firewall,info output: in:(unknown 0) out:vrrp1, proto ICMP (type 8, code 0), [RouterOS IP]->[strongSwan IP], len 56
Nov/06/2018 14:44:37 firewall,info output: in:(unknown 0) out:vrrp1, proto ICMP (type 8, code 0), [RouterOS IP]->[strongSwan IP], len 56
Nov/06/2018 14:44:38 firewall,info output: in:(unknown 0) out:vrrp1, proto ICMP (type 8, code 0), [RouterOS IP]->[strongSwan IP], len 56
Nov/06/2018 14:44:39 firewall,info output: in:(unknown 0) out:vrrp1, proto ICMP (type 8, code 0), [RouterOS IP]->[strongSwan IP], len 56
Nov/06/2018 14:44:40 firewall,info output: in:(unknown 0) out:vrrp1, proto ICMP (type 8, code 0), [RouterOS IP]->[strongSwan IP], len 56
Nov/06/2018 14:44:41 firewall,info output: in:(unknown 0) out:vrrp1, proto ICMP (type 8, code 0), [RouterOS IP]->[strongSwan IP], len 56
Nov/06/2018 14:44:42 firewall,info output: in:(unknown 0) out:vrrp1, proto ICMP (type 8, code 0), [RouterOS IP]->[strongSwan IP], len 56
Nov/06/2018 14:44:43 ipsec,debug ===== received 736 bytes from [strongSwan IP][500] to [RouterOS IP][500]
Nov/06/2018 14:44:43 ipsec,debug,packet 4eb16358 999296a3 9ac893ed d15770a0 2e202408 00000002 000002e0 290002c4
Nov/06/2018 14:44:43 ipsec,debug,packet 97e84f2e 0af2f774 6e12b3b4 eb32c60f c756e844 d5738f99 779fdc5a 08107492
Nov/06/2018 14:44:43 ipsec,debug,packet 3860aa55 482f2daf c6ca9f62 3812a3ca e6c2aada edf306b3 c91a9f4b d48018c4
Nov/06/2018 14:44:43 ipsec,debug,packet bb1f01e7 4d8d0fd5 5dbe5792 c798c745 afddcc63 a964b356 bc1a852c de11ae0d
Nov/06/2018 14:44:43 ipsec,debug,packet 050c8c7a a509f8c3 e63e6579 bf1c4943 d0594d18 6380f37d bd5d9cc9 3afca78a
Nov/06/2018 14:44:43 ipsec,debug,packet bae541b3 8eb8e1bf 423cdf86 98256fb1 6ffccc17 bbe06d17 29f1df51 e57ff62d
Nov/06/2018 14:44:43 ipsec,debug,packet bfadcadf 586ef078 3ab8aa08 5b4c7232 792d64c9 d440f62a f623c186 76c0e309
Nov/06/2018 14:44:43 ipsec,debug,packet 409461ff 462f4753 962a84b5 bf2815d9 99d278e9 c6ba41e0 6cfafd78 52efb894
Nov/06/2018 14:44:43 ipsec,debug,packet fec7ae07 32bca5f4 93a7f8ea 4ad2f765 7f6450c4 01b28180 a4cd2fb4 38df9546
Nov/06/2018 14:44:43 ipsec,debug,packet cd01f2df ad00be46 3c44babf 131fc07d 62d96667 29ab608f b69292f7 534679ba
Nov/06/2018 14:44:43 ipsec,debug,packet f2533888 01614c41 e2c3768f fda413d4 2faa559d f1fd15e5 41298ce3 b9600ba0
Nov/06/2018 14:44:43 ipsec,debug,packet deb2f225 fa1a3826 0017d121 4b7633c0 41902887 b85c10bb a7a59beb b71a0405
Nov/06/2018 14:44:43 ipsec,debug,packet b8da931b 6ab18aa9 ed85548f 2023cdaa 7fa72b69 0788faec 41bf2003 2202ba5b
Nov/06/2018 14:44:43 ipsec,debug,packet ab7e479b 73df11a3 ef8e3648 e3d864d2 eeaedc3d e3850d74 5c24ef73 dc616036
Nov/06/2018 14:44:43 ipsec,debug,packet ffffd4c7 fb3f7772 a06595a9 88985174 4551e3e4 f96e9812 e1f5e0d1 b8afc8ff
Nov/06/2018 14:44:43 ipsec,debug,packet 2e628739 786a5f8f 13f6e90f 7a715eab a5bdbc4e bbe02bcb ff02d4f8 717e94c9
Nov/06/2018 14:44:43 ipsec,debug,packet 308695f7 631a8219 1eee4210 a32e437b 886ef9b7 9563fc6d 7eec73e4 1a0bbc3f
Nov/06/2018 14:44:43 ipsec,debug,packet c07eb481 61d78370 27399212 0de995ea 436b1bf6 a3afc5c5 94d1492d a388618f
Nov/06/2018 14:44:43 ipsec,debug,packet 532c5300 247f5b9e 311a721b 2eefb34b 6a0d9c5f 73997007 f051b71f 7eb701a4
Nov/06/2018 14:44:43 ipsec,debug,packet dc42d803 f3189e37 59deaf34 915892cc bb828f7d 8b5dc244 9043964e 5c76839e
Nov/06/2018 14:44:43 ipsec,debug,packet 8094a6bc db99273d bd93e589 f6f68c2c 3f2955b9 0603328f 4df8cbff 5c6af6b1
Nov/06/2018 14:44:43 ipsec,debug,packet c74adc69 0ef17aca 556dcc87 abdf1427 7f25ad19 8d4121c4 e7ea5582 8683f1d2
Nov/06/2018 14:44:43 ipsec,debug,packet f0e41d6b 54be9586 0afd08e2 d5fefceb e53d3608 a3b33400 89dcc918 93a2f309
Nov/06/2018 14:44:43 ipsec -> ike2 request, exchange: CREATE_CHILD_SA:2 [strongSwan IP][500]
Nov/06/2018 14:44:43 ipsec reply retransmission
Nov/06/2018 14:44:43 ipsec,debug ===== sending 768 bytes from [RouterOS IP][500] to [strongSwan IP][500]
Nov/06/2018 14:44:43 ipsec,debug 1 times of 768 bytes message will be sent to [strongSwan IP][500]
Nov/06/2018 14:44:43 ipsec,debug,packet 4eb16358 999296a3 9ac893ed d15770a0 2e202320 00000001 00000300 280002e4
Nov/06/2018 14:44:43 ipsec,debug,packet e53d3608 a3b33400 89dcc918 93a2f309 b75972b6 b5faa615 3ede3517 223865d9
Nov/06/2018 14:44:43 ipsec,debug,packet 40033f9c 3d7121a5 cde19741 ffc0f1c4 5387b7af 9abef5ee 8ab74668 b0f19a24
Nov/06/2018 14:44:43 ipsec,debug,packet 58f9ff33 af43a683 f4b4b322 f644497b eff871dc c397af07 4d22cb44 9731fcf1
Nov/06/2018 14:44:43 ipsec,debug,packet 97790bf7 a7ef6c0d 447f5e9f 6d81fb83 0caad708 ce332609 3a949c69 036245be
Nov/06/2018 14:44:43 ipsec,debug,packet 61c0fcab de1e95f1 e6f64954 c015b38e dadedc96 91277713 b766c7fd b63558ab
Nov/06/2018 14:44:43 ipsec,debug,packet 6b783799 9e274f61 8a6029e5 e5e310f7 3c99037e 2e9ad43a f64d3a36 3d006413
Nov/06/2018 14:44:43 ipsec,debug,packet b83c593b 858dd0be d5f71773 7d1ec71e fa871a51 38d0422f 60ddcc96 9bab311c
Nov/06/2018 14:44:43 ipsec,debug,packet 1b394135 f09504fe a1e116ef 9d18c25d 9b135158 ec5d26f2 b1660d72 7e8d3af6
Nov/06/2018 14:44:43 ipsec,debug,packet 848f706a 0733ac2b 7e053016 3484a600 c91f3db0 fb09e2e2 60acd51b ecc42d0c
Nov/06/2018 14:44:43 ipsec,debug,packet 9a6d5620 b0c45021 7e12b0a1 cd2b5134 12a80705 62864ef6 510cfea5 ec05cd16
Nov/06/2018 14:44:43 ipsec,debug,packet 129ffb50 90045e69 a6737c37 e19c01ec f162e852 8dc2fd67 f5796e65 0cb3df42
Nov/06/2018 14:44:43 ipsec,debug,packet 6922be65 a818ec7a 264d4b14 8c9e2a55 b98815fe 87e4e9b5 b2bb1b27 6c5d2ac2
Nov/06/2018 14:44:43 ipsec,debug,packet 571b465a 8041ac30 97fade54 ef76ff5c e328d315 8addcd82 0ee3b0a9 59f6543b
Nov/06/2018 14:44:43 ipsec,debug,packet b9d35c94 b6bde684 3c0903b7 2cdc21b7 9f581f67 e2d0f03b 05e4919b b2e254c5
Nov/06/2018 14:44:43 ipsec,debug,packet bf23f7e5 56d6b6d7 2d6f5e26 29f80694 df357068 cb351cd6 1653d6a0 4917b37b
Nov/06/2018 14:44:43 ipsec,debug,packet 254a9531 aab24a7a a50d7e44 49be8b0a dc5ac995 69bff33d 08d0ec19 1e960ea2
Nov/06/2018 14:44:43 ipsec,debug,packet 27580254 395dce4b 39e53edf a397eb02 44a8e1eb 23a1c10c 9c6a3e4f 95f4d03e
Nov/06/2018 14:44:43 ipsec,debug,packet c0218cbe f7509a49 60512fd4 2f8206cb 6de0b6b0 31ddfc07 cbf430c8 94282831
Nov/06/2018 14:44:43 ipsec,debug,packet df13f90f b5465894 ac88e171 1ea80dde 2f33e3c1 51785cf7 4d76ef0e e8d759a2
Nov/06/2018 14:44:43 ipsec,debug,packet 8deae301 f1d19364 5d259f9f 70770b20 db6f835f 8b967578 dae15094 6fb3019d
Nov/06/2018 14:44:43 ipsec,debug,packet f860a516 fcf6c63f 5ee12723 3d001c91 043ebc3a 260b5989 902e1311 8b265f58
Nov/06/2018 14:44:43 ipsec,debug,packet 757685eb 16622862 85c2cdac 6bd28edf 2fa53e13 46960bba fd51243a 6597d2bf
Nov/06/2018 14:44:43 ipsec,debug,packet f60f8eef 48573126 29a1dafb 581b8408 3fd879cd 02ebcba1 9dd99fdb 0ded768e
Nov/06/2018 14:44:43 firewall,info output: in:(unknown 0) out:vrrp1, proto ICMP (type 8, code 0), [RouterOS IP]->[strongSwan IP], len 56
Nov/06/2018 14:44:44 firewall,info output: in:(unknown 0) out:vrrp1, proto ICMP (type 8, code 0), [RouterOS IP]->[strongSwan IP], len 56
I just created a logging firewall rule that logs all icmp with ipsec policy.
Kind regards,
Sebastian