Hello, and thank you, i updated the router and bellow is the log for ipsec.
The only thing that pop-up was: 16:43:48 ipsec no IKEv1 peer config for 25.2.198.15
dec/ 2/2019 16:54:50 by RouterOS 6.45.7
software id = GLDH-AY03
16:43:20 ipsec,debug seen nptype=8(hash) len=24
16:43:20 ipsec,debug succeed.
16:43:20 ipsec,debug HASH received:
16:43:20 ipsec,debug 1b17fa92 876eed4c 3b0130bf 2b5d282b a0a8c53c
16:43:20 ipsec,debug HASH for PSK validated.
16:43:20 ipsec,debug 25.2.198.15 peer’s ID:
16:43:20 ipsec,debug 01000000 524d3e18
16:43:20 ipsec,debug ===
16:43:20 ipsec policy installed for connected peer, creating ph2
16:43:20 ipsec,debug (proto_id=ESP spisize=4 spi=00000000 spi_p=00000000 encmode=Tunnel reqid=0:0)
16:43:20 ipsec,debug (trns_id=AES-CBC encklen=256 authtype=hmac-sha512)
16:43:20 ipsec,debug (trns_id=AES-CBC encklen=256 authtype=hmac-sha256)
16:43:20 ipsec,debug (trns_id=AES-CBC encklen=256 authtype=hmac-sha1)
16:43:20 ipsec,debug (trns_id=AES-CBC encklen=256 authtype=hmac-md5)
16:43:20 ipsec,debug (trns_id=AES-CBC encklen=256 authtype=254)
16:43:20 ipsec,debug (trns_id=AES-CTR encklen=256 authtype=hmac-sha512)
16:43:20 ipsec,debug (trns_id=AES-CTR encklen=288 authtype=hmac-sha512)
16:43:20 ipsec,debug (trns_id=AES-CTR encklen=256 authtype=hmac-sha256)
16:43:20 ipsec,debug (trns_id=AES-CTR encklen=288 authtype=hmac-sha256)
16:43:20 ipsec,debug (trns_id=AES-CTR encklen=256 authtype=hmac-sha1)
16:43:20 ipsec,debug (trns_id=AES-CTR encklen=288 authtype=hmac-sha1)
16:43:20 ipsec,debug (trns_id=AES-CTR encklen=256 authtype=hmac-md5)
16:43:20 ipsec,debug (trns_id=AES-CTR encklen=288 authtype=hmac-md5)
16:43:20 ipsec,debug (trns_id=AES-CTR encklen=256 authtype=254)
16:43:20 ipsec,debug (trns_id=AES-CTR encklen=288 authtype=254)
16:43:20 ipsec,debug (trns_id=AES-GCM-ICV16 encklen=256 authtype=254)
16:43:20 ipsec,debug (trns_id=AES-GCM-ICV16 encklen=288 authtype=254)
16:43:20 ipsec,debug (trns_id=CAMELLIA encklen=256 authtype=hmac-sha512)
16:43:20 ipsec,debug (trns_id=CAMELLIA encklen=256 authtype=hmac-sha256)
16:43:20 ipsec,debug (trns_id=CAMELLIA encklen=256 authtype=hmac-sha1)
16:43:20 ipsec,debug (trns_id=CAMELLIA encklen=256 authtype=hmac-md5)
16:43:20 ipsec,debug (trns_id=CAMELLIA encklen=256 authtype=254)
16:43:20 ipsec,debug (trns_id=AES-CBC encklen=192 authtype=hmac-sha512)
16:43:20 ipsec,debug (trns_id=AES-CBC encklen=192 authtype=hmac-sha256)
16:43:20 ipsec,debug (trns_id=AES-CBC encklen=192 authtype=hmac-sha1)
16:43:20 ipsec,debug (trns_id=AES-CBC encklen=192 authtype=hmac-md5)
16:43:20 ipsec,debug (trns_id=AES-CBC encklen=192 authtype=254)
16:43:20 ipsec,debug (trns_id=AES-CTR encklen=192 authtype=hmac-sha512)
16:43:20 ipsec,debug (trns_id=AES-CTR encklen=224 authtype=hmac-sha512)
16:43:20 ipsec,debug (trns_id=AES-CTR encklen=192 authtype=hmac-sha256)
16:43:20 ipsec,debug (trns_id=AES-CTR encklen=224 authtype=hmac-sha256)
16:43:20 ipsec,debug (trns_id=AES-CTR encklen=192 authtype=hmac-sha1)
16:43:20 ipsec,debug (trns_id=AES-CTR encklen=224 authtype=hmac-sha1)
16:43:20 ipsec,debug (trns_id=AES-CTR encklen=192 authtype=hmac-md5)
16:43:20 ipsec,debug (trns_id=AES-CTR encklen=224 authtype=hmac-md5)
16:43:20 ipsec,debug (trns_id=AES-CTR encklen=192 authtype=254)
16:43:20 ipsec,debug (trns_id=AES-CTR encklen=224 authtype=254)
16:43:20 ipsec,debug (trns_id=AES-GCM-ICV16 encklen=192 authtype=254)
16:43:20 ipsec,debug (trns_id=AES-GCM-ICV16 encklen=224 authtype=254)
16:43:20 ipsec,debug (trns_id=CAMELLIA encklen=192 authtype=hmac-sha512)
16:43:20 ipsec,debug (trns_id=CAMELLIA encklen=192 authtype=hmac-sha256)
16:43:20 ipsec,debug (trns_id=CAMELLIA encklen=192 authtype=hmac-sha1)
16:43:20 ipsec,debug (trns_id=CAMELLIA encklen=192 authtype=hmac-md5)
16:43:20 ipsec,debug (trns_id=CAMELLIA encklen=192 authtype=254)
16:43:20 ipsec,debug (trns_id=AES-CBC encklen=128 authtype=hmac-sha512)
16:43:20 ipsec,debug (trns_id=AES-CBC encklen=128 authtype=hmac-sha256)
16:43:20 ipsec,debug (trns_id=AES-CBC encklen=128 authtype=hmac-sha1)
16:43:20 ipsec,debug (trns_id=AES-CBC encklen=128 authtype=hmac-md5)
16:43:20 ipsec,debug (trns_id=AES-CBC encklen=128 authtype=254)
16:43:20 ipsec,debug (trns_id=AES-CTR encklen=128 authtype=hmac-sha512)
16:43:20 ipsec,debug (trns_id=AES-CTR encklen=160 authtype=hmac-sha512)
16:43:20 ipsec,debug (trns_id=AES-CTR encklen=128 authtype=hmac-sha256)
16:43:20 ipsec,debug (trns_id=AES-CTR encklen=160 authtype=hmac-sha256)
16:43:20 ipsec,debug (trns_id=AES-CTR encklen=128 authtype=hmac-sha1)
16:43:20 ipsec,debug (trns_id=AES-CTR encklen=160 authtype=hmac-sha1)
16:43:20 ipsec,debug (trns_id=AES-CTR encklen=128 authtype=hmac-md5)
16:43:20 ipsec,debug (trns_id=AES-CTR encklen=160 authtype=hmac-md5)
16:43:20 ipsec,debug (trns_id=AES-CTR encklen=128 authtype=254)
16:43:20 ipsec,debug (trns_id=AES-CTR encklen=160 authtype=254)
16:43:20 ipsec,debug (trns_id=AES-GCM-ICV16 encklen=128 authtype=254)
16:43:20 ipsec,debug (trns_id=AES-GCM-ICV16 encklen=160 authtype=254)
16:43:20 ipsec,debug (trns_id=CAMELLIA encklen=0 authtype=hmac-sha512)
16:43:20 ipsec,debug (trns_id=CAMELLIA encklen=0 authtype=hmac-sha256)
16:43:20 ipsec,debug (trns_id=CAMELLIA encklen=0 authtype=hmac-sha1)
16:43:20 ipsec,debug (trns_id=CAMELLIA encklen=0 authtype=hmac-md5)
16:43:20 ipsec,debug (trns_id=CAMELLIA encklen=0 authtype=254)
16:43:20 ipsec,debug (trns_id=3DES encklen=0 authtype=hmac-sha512)
16:43:20 ipsec,debug (trns_id=3DES encklen=0 authtype=hmac-sha256)
16:43:20 ipsec,debug (trns_id=3DES encklen=0 authtype=hmac-sha1)
16:43:20 ipsec,debug (trns_id=3DES encklen=0 authtype=hmac-md5)
16:43:20 ipsec,debug (trns_id=3DES encklen=0 authtype=254)
16:43:20 ipsec,debug (trns_id=BLOWFISH encklen=128 authtype=hmac-sha512)
16:43:20 ipsec,debug (trns_id=BLOWFISH encklen=128 authtype=hmac-sha256)
16:43:20 ipsec,debug (trns_id=BLOWFISH encklen=128 authtype=hmac-sha1)
16:43:20 ipsec,debug (trns_id=BLOWFISH encklen=128 authtype=hmac-md5)
16:43:20 ipsec,debug (trns_id=BLOWFISH encklen=128 authtype=254)
16:43:20 ipsec,debug (trns_id=TWOFISH encklen=128 authtype=hmac-sha512)
16:43:20 ipsec,debug (trns_id=TWOFISH encklen=128 authtype=hmac-sha256)
16:43:20 ipsec,debug (trns_id=TWOFISH encklen=128 authtype=hmac-sha1)
16:43:20 ipsec,debug (trns_id=TWOFISH encklen=128 authtype=hmac-md5)
16:43:20 ipsec,debug (trns_id=TWOFISH encklen=128 authtype=254)
16:43:20 ipsec,debug (trns_id=DES encklen=0 authtype=hmac-sha512)
16:43:20 ipsec,debug (trns_id=DES encklen=0 authtype=hmac-sha256)
16:43:20 ipsec,debug (trns_id=DES encklen=0 authtype=hmac-sha1)
16:43:20 ipsec,debug (trns_id=DES encklen=0 authtype=hmac-md5)
16:43:20 ipsec,debug (trns_id=DES encklen=0 authtype=254)
16:43:20 ipsec,debug (trns_id=NULL encklen=0 authtype=hmac-sha512)
16:43:20 ipsec,debug (trns_id=NULL encklen=0 authtype=hmac-sha256)
16:43:20 ipsec,debug (trns_id=NULL encklen=0 authtype=hmac-sha1)
16:43:20 ipsec,debug (trns_id=NULL encklen=0 authtype=hmac-md5)
16:43:20 ipsec,debug (trns_id=NULL encklen=0 authtype=254)
16:43:20 ipsec,debug begin QUICK mode.
16:43:20 ipsec,debug ===
16:43:20 ipsec,debug begin QUICK mode.
16:43:20 ipsec initiate new phase 2 negotiation: 192.77.63.18[500]<=>25.2.198.15[500]
16:43:20 ipsec,debug hash(sha1)
16:43:20 ipsec,debug call pfkey_send_getspi 17
16:43:20 ipsec,debug pfkey GETSPI sent: ESP/Tunnel 25.2.198.15[500]->192.77.63.18[500]
16:43:20 ipsec,debug pfkey getspi sent.
16:43:20 ipsec,debug dh(modp768)
16:43:20 ipsec,debug dh(modp768)
16:43:20 ipsec,debug dh(modp768)
16:43:20 ipsec,debug dh(modp768)
16:43:20 ipsec,debug dh(modp768)
16:43:20 ipsec,debug dh(modp768)
16:43:20 ipsec,debug dh(modp768)
16:43:20 ipsec,debug dh(modp768)
16:43:20 ipsec,debug dh(modp768)
16:43:20 ipsec,debug dh(modp768)
16:43:20 ipsec,debug dh(modp768)
16:43:20 ipsec,debug dh(modp768)
16:43:20 ipsec,debug dh(modp768)
16:43:20 ipsec,debug dh(modp768)
16:43:20 ipsec,debug dh(modp768)
16:43:20 ipsec,debug dh(modp768)
16:43:20 ipsec,debug dh(modp768)
16:43:20 ipsec,debug dh(modp768)
16:43:20 ipsec,debug dh(modp768)
16:43:20 ipsec,debug dh(modp768)
16:43:20 ipsec,debug dh(modp768)
16:43:20 ipsec,debug dh(modp768)
16:43:20 ipsec,debug dh(modp768)
16:43:20 ipsec,debug dh(modp768)
16:43:20 ipsec,debug dh(modp768)
16:43:20 ipsec,debug dh(modp768)
16:43:20 ipsec,debug dh(modp768)
16:43:20 ipsec,debug dh(modp768)
16:43:20 ipsec,debug dh(modp768)
16:43:20 ipsec,debug dh(modp768)
16:43:20 ipsec,debug dh(modp768)
16:43:20 ipsec,debug dh(modp768)
16:43:20 ipsec,debug dh(modp768)
16:43:20 ipsec,debug dh(modp768)
16:43:20 ipsec,debug dh(modp768)
16:43:20 ipsec,debug dh(modp768)
16:43:20 ipsec,debug dh(modp768)
16:43:20 ipsec,debug dh(modp768)
16:43:20 ipsec,debug dh(modp768)
16:43:20 ipsec,debug dh(modp768)
16:43:20 ipsec,debug dh(modp768)
16:43:20 ipsec,debug dh(modp768)
16:43:20 ipsec,debug dh(modp768)
16:43:20 ipsec,debug dh(modp768)
16:43:20 ipsec,debug dh(modp768)
16:43:20 ipsec,debug dh(modp768)
16:43:20 ipsec,debug dh(modp768)
16:43:20 ipsec,debug dh(modp768)
16:43:20 ipsec,debug dh(modp768)
16:43:20 ipsec,debug dh(modp768)
16:43:20 ipsec,debug dh(modp768)
16:43:20 ipsec,debug dh(modp768)
16:43:20 ipsec,debug dh(modp768)
16:43:20 ipsec,debug dh(modp768)
16:43:20 ipsec,debug dh(modp768)
16:43:20 ipsec,debug dh(modp768)
16:43:20 ipsec,debug dh(modp768)
16:43:20 ipsec,debug dh(modp768)
16:43:20 ipsec,debug dh(modp768)
16:43:20 ipsec,debug dh(modp768)
16:43:20 ipsec,debug dh(modp768)
16:43:20 ipsec,debug dh(modp768)
16:43:20 ipsec,debug dh(modp768)
16:43:20 ipsec,debug dh(modp768)
16:43:20 ipsec,debug dh(modp768)
16:43:20 ipsec,debug dh(modp768)
16:43:20 ipsec,debug dh(modp768)
16:43:20 ipsec,debug dh(modp768)
16:43:20 ipsec,debug dh(modp768)
16:43:20 ipsec,debug dh(modp768)
16:43:20 ipsec,debug dh(modp768)
16:43:20 ipsec,debug dh(modp768)
16:43:20 ipsec,debug dh(modp768)
16:43:20 ipsec,debug dh(modp768)
16:43:20 ipsec,debug dh(modp768)
16:43:20 ipsec,debug dh(modp768)
16:43:20 ipsec,debug dh(modp768)
16:43:20 ipsec,debug dh(modp768)
16:43:20 ipsec,debug dh(modp768)
16:43:20 ipsec,debug dh(modp768)
16:43:20 ipsec,debug dh(modp768)
16:43:20 ipsec,debug dh(modp768)
16:43:20 ipsec,debug dh(modp768)
16:43:20 ipsec,debug dh(modp768)
16:43:20 ipsec,debug dh(modp768)
16:43:20 ipsec,debug dh(modp768)
16:43:20 ipsec,debug dh(modp768)
16:43:20 ipsec,debug dh(modp768)
16:43:20 ipsec,debug dh(modp768)
16:43:20 ipsec,debug dh(modp768)
16:43:20 ipsec,debug dh(modp768)
16:43:20 ipsec,debug dh(modp768)
16:43:20 ipsec,debug dh(modp768)
16:43:20 ipsec,debug dh(modp768)
16:43:20 ipsec,debug dh(modp768)
16:43:20 ipsec,debug dh(modp768)
16:43:20 ipsec,debug dh(modp768)
16:43:20 ipsec,debug dh(modp768)
16:43:20 ipsec,debug dh(modp768)
16:43:20 ipsec,debug dh(modp768)
16:43:20 ipsec,debug dh(modp768)
16:43:20 ipsec,debug dh(modp768)
16:43:20 ipsec,debug dh(modp768)
16:43:20 ipsec,debug dh(modp768)
16:43:20 ipsec,debug dh(modp768)
16:43:20 ipsec,debug dh(modp768)
16:43:20 ipsec,debug dh(modp768)
16:43:20 ipsec,debug dh(modp768)
16:43:20 ipsec,debug dh(modp768)
16:43:20 ipsec,debug dh(modp768)
16:43:20 ipsec,debug dh(modp768)
16:43:20 ipsec,debug dh(modp768)
16:43:20 ipsec,debug dh(modp768)
16:43:20 ipsec,debug dh(modp768)
16:43:20 ipsec,debug dh(modp768)
16:43:20 ipsec,debug dh(modp768)
16:43:20 ipsec,debug dh(modp768)
16:43:20 ipsec,debug dh(modp768)
16:43:20 ipsec,debug dh(modp768)
16:43:20 ipsec,debug dh(modp768)
16:43:20 ipsec,debug dh(modp768)
16:43:20 ipsec,debug dh(modp768)
16:43:20 ipsec,debug dh(modp768)
16:43:20 ipsec,debug dh(modp768)
16:43:20 ipsec,debug dh(modp768)
16:43:20 ipsec,debug dh(modp768)
16:43:20 ipsec,debug dh(modp768)
16:43:20 ipsec,debug dh(modp768)
16:43:20 ipsec,debug dh(modp768)
16:43:20 ipsec,debug dh(modp768)
16:43:20 ipsec,debug dh(modp768)
16:43:20 ipsec,debug dh(modp768)
16:43:20 ipsec,debug dh(modp768)
16:43:20 ipsec,debug dh(modp768)
16:43:20 ipsec,debug dh(modp768)
16:43:20 ipsec,debug dh(modp768)
16:43:20 ipsec,debug dh(modp768)
16:43:20 ipsec,debug dh(modp768)
16:43:20 ipsec,debug dh(modp768)
16:43:20 ipsec,debug dh(modp768)
16:43:20 ipsec,debug dh(modp768)
16:43:20 ipsec,debug dh(modp768)
16:43:20 ipsec,debug dh(modp768)
16:43:20 ipsec,debug dh(modp768)
16:43:20 ipsec,debug dh(modp768)
16:43:20 ipsec,debug dh(modp768)
16:43:20 ipsec,debug dh(modp768)
16:43:20 ipsec,debug dh(modp768)
16:43:20 ipsec,debug dh(modp768)
16:43:20 ipsec,debug dh(modp768)
16:43:20 ipsec,debug dh(modp768)
16:43:20 ipsec,debug dh(modp768)
16:43:20 ipsec,debug dh(modp768)
16:43:20 ipsec,debug dh(modp768)
16:43:20 ipsec,debug dh(modp768)
16:43:20 ipsec,debug dh(modp768)
16:43:20 ipsec,debug dh(modp768)
16:43:20 ipsec,debug dh(modp768)
16:43:20 ipsec,debug dh(modp768)
16:43:20 ipsec,debug dh(modp768)
16:43:20 ipsec,debug dh(modp768)
16:43:20 ipsec,debug dh(modp768)
16:43:20 ipsec,debug dh(modp768)
16:43:20 ipsec,debug dh(modp768)
16:43:20 ipsec,debug dh(modp768)
16:43:20 ipsec,debug dh(modp768)
16:43:20 ipsec,debug dh(modp768)
16:43:20 ipsec,debug dh(modp768)
16:43:20 ipsec,debug dh(modp768)
16:43:20 ipsec,debug dh(modp768)
16:43:20 ipsec,debug dh(modp768)
16:43:20 ipsec,debug dh(modp768)
16:43:20 ipsec,debug dh(modp768)
16:43:20 ipsec,debug dh(modp768)
16:43:20 ipsec,debug dh(modp768)
16:43:20 ipsec,debug dh(modp768)
16:43:20 ipsec,debug dh(modp768)
16:43:20 ipsec,debug dh(modp768)
16:43:20 ipsec,debug dh(modp768)
16:43:20 ipsec,debug dh(modp768)
16:43:20 ipsec,debug dh(modp768)
16:43:20 ipsec,debug use local ID type IPv4_subnet
16:43:20 ipsec,debug use remote ID type IPv4_subnet
16:43:20 ipsec,debug IDci:
16:43:20 ipsec,debug 04000000 c0a80100 ffffff00
16:43:20 ipsec,debug IDcr:
16:43:20 ipsec,debug 04000000 c0a80600 ffffff00
16:43:20 ipsec,debug add payload of len 2736, next type 10
16:43:20 ipsec,debug add payload of len 24, next type 4
16:43:20 ipsec,debug add payload of len 96, next type 5
16:43:20 ipsec,debug add payload of len 12, next type 5
16:43:20 ipsec,debug add payload of len 12, next type 0
16:43:20 ipsec,debug add payload of len 20, next type 1
16:43:20 ipsec,debug 2956 bytes from 82.77.63.24[500] to 82.77.62.24[500]
16:43:20 ipsec,debug 1 times of 2956 bytes message will be sent to 25.2.198.15[500]
16:43:20 ipsec sent phase2 packet 192.77.63.18[500]<=>25.2.198.15[500] 54bb406253f04cf7:a21d7bac23586a6f:0000a11e
16:43:20 ipsec,info ISAKMP-SA established 192.77.63.18[500]-25.2.198.15[500] spi:54bb406253f04cf7:a21d7bac23586a6f
16:43:20 ipsec,debug ===
16:43:30 ipsec,debug 2956 bytes from 192.77.63.18[500] to 25.2.198.15[500]
16:43:30 ipsec,debug 1 times of 2956 bytes message will be sent to 25.2.198.15[500]
16:43:30 ipsec resent phase2 packet 192.77.63.18[500]<=>25.2.198.15[500] 54bb406253f04cf7:a21d7bac23586a6f:0000a11e
16:43:40 ipsec,debug 2956 bytes from 192.77.63.18[500] to 25.2.198.15[500]
16:43:40 ipsec,debug 1 times of 2956 bytes message will be sent to 25.2.198.15[500]
16:43:40 ipsec resent phase2 packet 192.77.63.18[500]<=>25.2.198.15[500] 54bb406253f04cf7:a21d7bac23586a6f:0000a11e
16:43:48 ipsec,debug ===== received 92 bytes from 25.2.198.15[500] to 192.77.63.18[500]
16:43:48 ipsec,debug receive Information.
16:43:48 ipsec,debug hash(sha1)
16:43:48 ipsec,debug hash validated.
16:43:48 ipsec,debug begin.
16:43:48 ipsec,debug seen nptype=8(hash) len=24
16:43:48 ipsec,debug seen nptype=12(delete) len=28
16:43:48 ipsec,debug succeed.
16:43:48 ipsec,debug 25.2.198.15 delete payload for protocol ISAKMP
16:43:48 ipsec,info purging ISAKMP-SA 192.77.63.18[500]<=>25.2.198.15[500] spi=54bb406253f04cf7:a21d7bac23586a6f.
16:43:48 ipsec purged ISAKMP-SA 192.77.63.18[500]<=>25.2.198.15[500] spi=54bb406253f04cf7:a21d7bac23586a6f.
16:43:48 ipsec,debug purged SAs.
16:43:48 ipsec,info ISAKMP-SA deleted 192.77.63.18[500]-25.2.198.15[500] spi:54bb406253f04cf7:a21d7bac23586a6f rekey:1
16:43:48 ipsec,debug ===== received 236 bytes from 25.2.198.15[500] to 192.77.63.18[500]
16:43:48 ipsec no IKEv1 peer config for 25.2.198.15
16:43:50 ipsec,debug ===
16:43:50 ipsec,info initiate new phase 1 (Identity Protection): 192.77.63.18[500]<=>25.2.198.15[500]
16:43:50 ipsec,debug new cookie:
16:43:50 ipsec,debug ea04183c7081318c\01
16:43:50 ipsec,debug add payload of len 1552, next type 13
16:43:50 ipsec,debug add payload of len 16, next type 13
16:43:50 ipsec,debug add payload of len 16, next type 13
16:43:50 ipsec,debug add payload of len 16, next type 13
16:43:50 ipsec,debug add payload of len 16, next type 13
16:43:50 ipsec,debug add payload of len 16, next type 13
16:43:50 ipsec,debug add payload of len 16, next type 13
16:43:50 ipsec,debug add payload of len 16, next type 13
16:43:50 ipsec,debug add payload of len 16, next type 13
16:43:50 ipsec,debug add payload of len 16, next type 13
16:43:50 ipsec,debug add payload of len 16, next type 13
16:43:50 ipsec,debug add payload of len 16, next type 13
16:43:50 ipsec,debug add payload of len 16, next type 13
16:43:50 ipsec,debug add payload of len 16, next type 0
16:43:50 ipsec,debug 1844 bytes from 192.77.63.18[500] to 25.2.198.15[500]
16:43:50 ipsec,debug 1 times of 1844 bytes message will be sent to 25.2.198.15[500]
16:43:50 ipsec sent phase1 packet 192.77.63.18[500]<=>25.2.198.15[500] ea04183c7081318c:0000000000000000
16:43:50 ipsec,debug ===== received 108 bytes from 25.2.198.15[500] to 192.77.63.18[500]
16:43:50 ipsec,debug begin.
16:43:50 ipsec,debug seen nptype=1(sa) len=60
16:43:50 ipsec,debug seen nptype=13(vid) len=20
16:43:50 ipsec,debug succeed.
16:43:50 ipsec received Vendor ID: DPD
16:43:50 ipsec,debug remote supports DPD
16:43:50 ipsec,debug total SA len=56
16:43:50 ipsec,debug 00000001 00000001 00000030 01010001 00000028 18010000 800b0001 000c0004
16:43:50 ipsec,debug 00015180 80010007 800e0080 80030001 80020002 80040001
16:43:50 ipsec,debug begin.
16:43:50 ipsec,debug seen nptype=2(prop) len=48
16:43:50 ipsec,debug succeed.
16:43:50 ipsec,debug proposal #1 len=48
16:43:50 ipsec,debug begin.
16:43:50 ipsec,debug seen nptype=3(trns) len=40
16:43:50 ipsec,debug succeed.
16:43:50 ipsec,debug transform #24 len=40
16:43:50 ipsec,debug type=Life Type, flag=0x8000, lorv=seconds
16:43:50 ipsec,debug type=Life Duration, flag=0x0000, lorv=4
16:43:50 ipsec,debug type=Encryption Algorithm, flag=0x8000, lorv=AES-CBC
16:43:50 ipsec,debug type=Key Length, flag=0x8000, lorv=128
16:43:50 ipsec,debug type=Authentication Method, flag=0x8000, lorv=pre-shared key
16:43:50 ipsec,debug type=Hash Algorithm, flag=0x8000, lorv=SHA
16:43:50 ipsec,debug hash(sha1)
16:43:50 ipsec,debug type=Group Description, flag=0x8000, lorv=768-bit MODP group
16:43:50 ipsec,debug dh(modp768)
16:43:50 ipsec,debug pair 1:
16:43:50 ipsec,debug 0x983f8: next=(nil) tnext=(nil)
16:43:50 ipsec,debug proposal #1: 1 transform
16:43:50 ipsec,debug -checking with pre-shared key auth-
16:43:50 ipsec,debug prop#=1, prot-id=ISAKMP, spi-size=0, #trns=1
16:43:50 ipsec,debug trns#=24, trns-id=IKE
16:43:50 ipsec,debug type=Life Type, flag=0x8000, lorv=seconds
16:43:50 ipsec,debug type=Life Duration, flag=0x0000, lorv=4
16:43:50 ipsec,debug type=Encryption Algorithm, flag=0x8000, lorv=AES-CBC
16:43:50 ipsec,debug type=Key Length, flag=0x8000, lorv=128
16:43:50 ipsec,debug type=Authentication Method, flag=0x8000, lorv=pre-shared key
16:43:50 ipsec,debug type=Hash Algorithm, flag=0x8000, lorv=SHA
16:43:50 ipsec,debug type=Group Description, flag=0x8000, lorv=768-bit MODP group
16:43:50 ipsec,debug -compare proposal #1: Local:Peer
16:43:50 ipsec,debug (lifetime = 86400:86400)
16:43:50 ipsec,debug (lifebyte = 0:0)
16:43:50 ipsec,debug enctype = AES-CBC:AES-CBC
16:43:50 ipsec,debug (encklen = 256:128)
16:43:50 ipsec,debug hashtype = SHA:SHA
16:43:50 ipsec,debug authmethod = pre-shared key:pre-shared key
16:43:50 ipsec,debug dh_group = 8192-bit MODP group:768-bit MODP group
16:43:50 ipsec,debug -compare proposal #2: Local:Peer
16:43:50 ipsec,debug (lifetime = 86400:86400)
16:43:50 ipsec,debug (lifebyte = 0:0)
16:43:50 ipsec,debug enctype = AES-CBC:AES-CBC
16:43:50 ipsec,debug (encklen = 256:128)
16:43:50 ipsec,debug hashtype = SHA:SHA
16:43:50 ipsec,debug authmethod = pre-shared key:pre-shared key
16:43:50 ipsec,debug dh_group = 6144-bit MODP group:768-bit MODP group
16:43:50 ipsec,debug -compare proposal #3: Local:Peer
16:43:50 ipsec,debug (lifetime = 86400:86400)
16:43:50 ipsec,debug (lifebyte = 0:0)
16:43:50 ipsec,debug enctype = AES-CBC:AES-CBC
16:43:50 ipsec,debug (encklen = 256:128)
16:43:50 ipsec,debug hashtype = SHA:SHA
16:43:50 ipsec,debug authmethod = pre-shared key:pre-shared key
16:43:50 ipsec,debug dh_group = 4096-bit MODP group:768-bit MODP group
16:43:50 ipsec,debug -compare proposal #4: Local:Peer
16:43:50 ipsec,debug (lifetime = 86400:86400)
16:43:50 ipsec,debug (lifebyte = 0:0)
16:43:50 ipsec,debug enctype = AES-CBC:AES-CBC
16:43:50 ipsec,debug (encklen = 256:128)
16:43:50 ipsec,debug hashtype = SHA:SHA
16:43:50 ipsec,debug authmethod = pre-shared key:pre-shared key
16:43:50 ipsec,debug dh_group = 3072-bit MODP group:768-bit MODP group
16:43:50 ipsec,debug -compare proposal #5: Local:Peer
16:43:50 ipsec,debug (lifetime = 86400:86400)
16:43:50 ipsec,debug (lifebyte = 0:0)
16:43:50 ipsec,debug enctype = AES-CBC:AES-CBC
16:43:50 ipsec,debug (encklen = 256:128)
16:43:50 ipsec,debug hashtype = SHA:SHA
16:43:50 ipsec,debug authmethod = pre-shared key:pre-shared key
16:43:50 ipsec,debug dh_group = 2048-bit MODP group:768-bit MODP group
16:43:50 ipsec,debug -compare proposal #6: Local:Peer
16:43:50 ipsec,debug (lifetime = 86400:86400)
16:43:50 ipsec,debug (lifebyte = 0:0)
16:43:50 ipsec,debug enctype = AES-CBC:AES-CBC
16:43:50 ipsec,debug (encklen = 256:128)
16:43:50 ipsec,debug hashtype = SHA:SHA
16:43:50 ipsec,debug authmethod = pre-shared key:pre-shared key
16:43:50 ipsec,debug dh_group = 1536-bit MODP group:768-bit MODP group
16:43:50 ipsec,debug -compare proposal #7: Local:Peer
16:43:50 ipsec,debug (lifetime = 86400:86400)
16:43:50 ipsec,debug (lifebyte = 0:0)
16:43:50 ipsec,debug enctype = AES-CBC:AES-CBC
16:43:50 ipsec,debug (encklen = 256:128)
16:43:50 ipsec,debug hashtype = SHA:SHA
16:43:50 ipsec,debug authmethod = pre-shared key:pre-shared key
16:43:50 ipsec,debug dh_group = 1024-bit MODP group:768-bit MODP group
16:43:50 ipsec,debug -compare proposal #8: Local:Peer
16:43:50 ipsec,debug (lifetime = 86400:86400)
16:43:50 ipsec,debug (lifebyte = 0:0)
16:43:50 ipsec,debug enctype = AES-CBC:AES-CBC
16:43:50 ipsec,debug (encklen = 256:128)
16:43:50 ipsec,debug hashtype = SHA:SHA
16:43:50 ipsec,debug authmethod = pre-shared key:pre-shared key
16:43:50 ipsec,debug dh_group = 768-bit MODP group:768-bit MODP group
16:43:50 ipsec,debug -compare proposal #9: Local:Peer
16:43:50 ipsec,debug (lifetime = 86400:86400)
16:43:50 ipsec,debug (lifebyte = 0:0)
16:43:50 ipsec,debug enctype = AES-CBC:AES-CBC
16:43:50 ipsec,debug (encklen = 192:128)
16:43:50 ipsec,debug hashtype = SHA:SHA
16:43:50 ipsec,debug authmethod = pre-shared key:pre-shared key
16:43:50 ipsec,debug dh_group = 8192-bit MODP group:768-bit MODP group
16:43:50 ipsec,debug -compare proposal #10: Local:Peer
16:43:50 ipsec,debug (lifetime = 86400:86400)
16:43:50 ipsec,debug (lifebyte = 0:0)
16:43:50 ipsec,debug enctype = AES-CBC:AES-CBC
16:43:50 ipsec,debug (encklen = 192:128)
16:43:50 ipsec,debug hashtype = SHA:SHA
16:43:50 ipsec,debug authmethod = pre-shared key:pre-shared key
16:43:50 ipsec,debug dh_group = 6144-bit MODP group:768-bit MODP group
16:43:50 ipsec,debug -compare proposal #11: Local:Peer
16:43:50 ipsec,debug (lifetime = 86400:86400)
16:43:50 ipsec,debug (lifebyte = 0:0)
16:43:50 ipsec,debug enctype = AES-CBC:AES-CBC
16:43:50 ipsec,debug (encklen = 192:128)
16:43:50 ipsec,debug hashtype = SHA:SHA
16:43:50 ipsec,debug authmethod = pre-shared key:pre-shared key
16:43:50 ipsec,debug dh_group = 4096-bit MODP group:768-bit MODP group
16:43:50 ipsec,debug -compare proposal #12: Local:Peer
16:43:50 ipsec,debug (lifetime = 86400:86400)
16:43:50 ipsec,debug (lifebyte = 0:0)
16:43:50 ipsec,debug enctype = AES-CBC:AES-CBC
16:43:50 ipsec,debug (encklen = 192:128)
16:43:50 ipsec,debug hashtype = SHA:SHA
16:43:50 ipsec,debug authmethod = pre-shared key:pre-shared key
16:43:50 ipsec,debug dh_group = 3072-bit MODP group:768-bit MODP group
16:43:50 ipsec,debug -compare proposal #13: Local:Peer
16:43:50 ipsec,debug (lifetime = 86400:86400)
16:43:50 ipsec,debug (lifebyte = 0:0)
16:43:50 ipsec,debug enctype = AES-CBC:AES-CBC
16:43:50 ipsec,debug (encklen = 192:128)
16:43:50 ipsec,debug hashtype = SHA:SHA
16:43:50 ipsec,debug authmethod = pre-shared key:pre-shared key
16:43:50 ipsec,debug dh_group = 2048-bit MODP group:768-bit MODP group
16:43:50 ipsec,debug -compare proposal #14: Local:Peer
16:43:50 ipsec,debug (lifetime = 86400:86400)
16:43:50 ipsec,debug (lifebyte = 0:0)
16:43:50 ipsec,debug enctype = AES-CBC:AES-CBC
16:43:50 ipsec,debug (encklen = 192:128)
16:43:50 ipsec,debug hashtype = SHA:SHA
16:43:50 ipsec,debug authmethod = pre-shared key:pre-shared key
16:43:50 ipsec,debug dh_group = 1536-bit MODP group:768-bit MODP group
16:43:50 ipsec,debug -compare proposal #15: Local:Peer
16:43:50 ipsec,debug (lifetime = 86400:86400)
16:43:50 ipsec,debug (lifebyte = 0:0)
16:43:50 ipsec,debug enctype = AES-CBC:AES-CBC
16:43:50 ipsec,debug (encklen = 192:128)
16:43:50 ipsec,debug hashtype = SHA:SHA
16:43:50 ipsec,debug authmethod = pre-shared key:pre-shared key
16:43:50 ipsec,debug dh_group = 1024-bit MODP group:768-bit MODP group
16:43:50 ipsec,debug -compare proposal #16: Local:Peer
16:43:50 ipsec,debug (lifetime = 86400:86400)
16:43:50 ipsec,debug (lifebyte = 0:0)
16:43:50 ipsec,debug enctype = AES-CBC:AES-CBC
16:43:50 ipsec,debug (encklen = 192:128)
16:43:50 ipsec,debug hashtype = SHA:SHA
16:43:50 ipsec,debug authmethod = pre-shared key:pre-shared key
16:43:50 ipsec,debug dh_group = 768-bit MODP group:768-bit MODP group
16:43:50 ipsec,debug -compare proposal #17: Local:Peer
16:43:50 ipsec,debug (lifetime = 86400:86400)
16:43:50 ipsec,debug (lifebyte = 0:0)
16:43:50 ipsec,debug enctype = AES-CBC:AES-CBC
16:43:50 ipsec,debug (encklen = 128:128)
16:43:50 ipsec,debug hashtype = SHA:SHA
16:43:50 ipsec,debug authmethod = pre-shared key:pre-shared key
16:43:50 ipsec,debug dh_group = 8192-bit MODP group:768-bit MODP group
16:43:50 ipsec,debug -compare proposal #18: Local:Peer
16:43:50 ipsec,debug (lifetime = 86400:86400)
16:43:50 ipsec,debug (lifebyte = 0:0)
16:43:50 ipsec,debug enctype = AES-CBC:AES-CBC
16:43:50 ipsec,debug (encklen = 128:128)
16:43:50 ipsec,debug hashtype = SHA:SHA
16:43:50 ipsec,debug authmethod = pre-shared key:pre-shared key
16:43:50 ipsec,debug dh_group = 6144-bit MODP group:768-bit MODP group
16:43:50 ipsec,debug -compare proposal #19: Local:Peer
16:43:50 ipsec,debug (lifetime = 86400:86400)
16:43:50 ipsec,debug (lifebyte = 0:0)
16:43:50 ipsec,debug enctype = AES-CBC:AES-CBC
16:43:50 ipsec,debug (encklen = 128:128)
16:43:50 ipsec,debug hashtype = SHA:SHA
16:43:50 ipsec,debug authmethod = pre-shared key:pre-shared key
16:43:50 ipsec,debug dh_group = 4096-bit MODP group:768-bit MODP group
16:43:50 ipsec,debug -compare proposal #20: Local:Peer
16:43:50 ipsec,debug (lifetime = 86400:86400)
16:43:50 ipsec,debug (lifebyte = 0:0)
16:43:50 ipsec,debug enctype = AES-CBC:AES-CBC
16:43:50 ipsec,debug (encklen = 128:128)
16:43:50 ipsec,debug hashtype = SHA:SHA
16:43:50 ipsec,debug authmethod = pre-shared key:pre-shared key
16:43:50 ipsec,debug dh_group = 3072-bit MODP group:768-bit MODP group
16:43:50 ipsec,debug -compare proposal #21: Local:Peer
16:43:50 ipsec,debug (lifetime = 86400:86400)
16:43:50 ipsec,debug (lifebyte = 0:0)
16:43:50 ipsec,debug enctype = AES-CBC:AES-CBC
16:43:50 ipsec,debug (encklen = 128:128)
16:43:50 ipsec,debug hashtype = SHA:SHA
16:43:50 ipsec,debug authmethod = pre-shared key:pre-shared key
16:43:50 ipsec,debug dh_group = 2048-bit MODP group:768-bit MODP group
16:43:50 ipsec,debug -compare proposal #22: Local:Peer
16:43:50 ipsec,debug (lifetime = 86400:86400)
16:43:50 ipsec,debug (lifebyte = 0:0)
16:43:50 ipsec,debug enctype = AES-CBC:AES-CBC
16:43:50 ipsec,debug (encklen = 128:128)
16:43:50 ipsec,debug hashtype = SHA:SHA
16:43:50 ipsec,debug authmethod = pre-shared key:pre-shared key
16:43:50 ipsec,debug dh_group = 1536-bit MODP group:768-bit MODP group
16:43:50 ipsec,debug -compare proposal #23: Local:Peer
16:43:50 ipsec,debug (lifetime = 86400:86400)
16:43:50 ipsec,debug (lifebyte = 0:0)
16:43:50 ipsec,debug enctype = AES-CBC:AES-CBC
16:43:50 ipsec,debug (encklen = 128:128)
16:43:50 ipsec,debug hashtype = SHA:SHA
16:43:50 ipsec,debug authmethod = pre-shared key:pre-shared key
16:43:50 ipsec,debug dh_group = 1024-bit MODP group:768-bit MODP group
16:43:50 ipsec,debug -compare proposal #24: Local:Peer
16:43:50 ipsec,debug (lifetime = 86400:86400)
16:43:50 ipsec,debug (lifebyte = 0:0)
16:43:50 ipsec,debug enctype = AES-CBC:AES-CBC
16:43:50 ipsec,debug (encklen = 128:128)
16:43:50 ipsec,debug hashtype = SHA:SHA
16:43:50 ipsec,debug authmethod = pre-shared key:pre-shared key
16:43:50 ipsec,debug dh_group = 768-bit MODP group:768-bit MODP group
16:43:50 ipsec,debug -an acceptable proposal found-
16:43:50 ipsec,debug dh(modp768)
16:43:50 ipsec,debug -agreed on pre-shared key auth-
16:43:50 ipsec,debug ===
16:43:50 ipsec,debug dh(modp768)
16:43:50 ipsec,debug add payload of len 96, next type 10
16:43:50 ipsec,debug add payload of len 24, next type 0
16:43:50 ipsec,debug 156 bytes from 192.77.63.18[500] to 25.2.198.15[500]
16:43:50 ipsec,debug 1 times of 156 bytes message will be sent to 25.2.198.15[500]
16:43:50 ipsec sent phase1 packet 192.77.63.18[500]<=>25.2.198.15[500] ea04183c7081318c:cda276ae7e791301
16:43:50 ipsec,debug ===== received 148 bytes from 25.2.198.15[500] to 192.77.63.18[500]
16:43:50 ipsec,debug begin.
16:43:50 ipsec,debug seen nptype=4(ke) len=100
16:43:50 ipsec,debug seen nptype=10(nonce) len=20
16:43:50 ipsec,debug succeed.
16:43:50 ipsec,debug ===
16:43:50 ipsec,debug dh(modp768)
16:43:50 ipsec,debug nonce 1:
16:43:50 ipsec,debug b4d36683 b4ade57d 021f3a52 89817b34 ab95ac7c 8872f7f5
16:43:50 ipsec,debug nonce 2:
16:43:50 ipsec,debug 0627b6a0 a5728e36 73df3668 7ca5ad35
16:43:50 ipsec,debug SKEYID computed:
16:43:50 ipsec,debug 5c16a33e 96896bde ae443df4 738a5d34 2fc63e26
16:43:50 ipsec,debug SKEYID_d computed:
16:43:50 ipsec,debug 89b3db53 8a156108 dee88ff6 0b66dddf e61c3115
16:43:50 ipsec,debug SKEYID_a computed:
16:43:50 ipsec,debug a42138b3 071dec66 5387cb52 6e01b4fb e023b543
16:43:50 ipsec,debug SKEYID_e computed:
16:43:50 ipsec,debug a2e21ef8 81ac3025 43006304 52d9914c 011e47c3
16:43:50 ipsec,debug hash(sha1)
16:43:50 ipsec,debug final encryption key computed:
16:43:50 ipsec,debug a2e21ef8 81ac3025 43006304 52d9914c
16:43:50 ipsec,debug hash(sha1)
16:43:50 ipsec,debug IV computed:
16:43:50 ipsec,debug aa78f3b3 0668e8a7 3ebcbb53 5eee222d
16:43:50 ipsec,debug use ID type of IPv4_address
16:43:50 ipsec,debug add payload of len 8, next type 8
16:43:50 ipsec,debug add payload of len 20, next type 0
16:43:50 ipsec,debug 76 bytes from 192.77.63.18[500] to 25.2.198.15[500]
16:43:50 ipsec,debug 1 times of 76 bytes message will be sent to 25.2.198.15[500]
16:43:50 ipsec sent phase1 packet 192.77.63.18[500]<=>25.2.198.15[500] ea04183c7081318c:cda276ae7e791301
16:43:50 ipsec IPsec-SA expired: ESP/Tunnel 25.2.198.15[500]->192.77.63.18[500] spi=0x10d839a
16:43:50 ipsec,debug ===== received 76 bytes from 25.2.198.15[500] to 192.77.63.18[500]