Weird L2TP/IPSec problem, please help!

Hi there!

I’ve a weird problem with the Mikrotik L2TP server. The L2TP server is connected via ether-1 to an LTE modem. I can connect from my home network with all devices, but I can’t connect with my iPhone via LTE. I can however connect to different L2TP servers on different networks. I’m using the same LTE provider as the servers LTE connection. I’m stuck. Please help me.
Hardware: 951G-2HnD
Firmware: 3.33
ROS: 6.38.5

The ROS config

/interface bridge
add mtu=1500 name=bridge-local
/interface ethernet
set [ find default-name=ether1 ] comment="WAN - Drei"
set [ find default-name=ether2 ] comment="WAN - A1"
set [ find default-name=ether3 ] comment="Local bridge"
set [ find default-name=ether4 ] comment="Local bridge"
set [ find default-name=ether5 ] comment="Local bridge"
/ip ipsec proposal
set [ find default=yes ] enc-algorithms=aes-256-cbc,aes-192-cbc,aes-128-cbc,3des pfs-group=none
/ip pool
add name=dhcp_pool1 ranges=192.168.0.116-192.168.0.199
add name=dhcp_vpn_pool ranges=192.168.0.200-192.168.0.219
/ip dhcp-server
add address-pool=dhcp_pool1 authoritative=yes disabled=no interface=bridge-local lease-time=1w name=dhcp1
/ppp profile
add dns-server=192.168.0.252 local-address=192.168.0.252 name=VPN-Profile only-one=no remote-address=dhcp_vpn_pool
/system logging action
set 0 memory-lines=10000
/interface bridge port
add bridge=bridge-local interface=ether3
add bridge=bridge-local interface=ether4
add bridge=bridge-local interface=ether5
/interface l2tp-server server
set authentication=mschap1,mschap2 default-profile=VPN-Profile enabled=yes ipsec-secret=XXXXXXXXXXXXX max-mru=1460 max-mtu=1460 use-ipsec=yes
/interface pptp-server server
set default-profile=VPN-Profile
/ip address
add address=192.168.0.252/24 interface=bridge-local network=192.168.0.0
/ip dhcp-client
add default-route-distance=10 dhcp-options=hostname,clientid disabled=no interface=ether1
add default-route-distance=11 dhcp-options=hostname,clientid disabled=no interface=ether2
/ip dhcp-server lease
add address=192.168.0.80 mac-address=A0:8C:FD:16:57:76 server=dhcp1
/ip dhcp-server network
add address=192.168.0.0/24 dns-server=192.168.0.252 gateway=192.168.0.252 ntp-server=192.168.0.252
/ip dns
set allow-remote-requests=yes servers=8.8.4.4,8.8.8.8
/ip firewall address-list
add address=10.0.0.0/8 list=bogons
add address=0.0.0.0/8 comment="Self-Identification [RFC 3330]" list=bogons
add address=127.0.0.0/16 comment="Loopback [RFC 3330]" list=bogons
add address=169.254.0.0/16 comment="Link Local [RFC 3330]" list=bogons
add address=172.16.0.0/12 comment="Private[RFC 1918] - CLASS B # Check if you need this subnet before enable it" list=bogons
add address=192.168.0.0/24 comment="interner IP Kreis" list=support
add address=192.0.2.0/24 comment="Reserved - IANA - TestNet1" list=bogons
add address=192.88.99.0/24 comment="6to4 Relay Anycast [RFC 3068]" list=bogons
add address=198.18.0.0/15 comment="NIDB Testing" list=bogons
add address=198.51.100.0/24 comment="Reserved - IANA - TestNet2" list=bogons
add address=203.0.113.0/24 comment="Reserved - IANA - TestNet3" list=bogons
add address=224.0.0.0/4 comment="MC, Class D, IANA # Check if you need this subnet before enable it" list=bogons
add address=AAA.BBB.CCC.DDD comment=„XXXXXXX Support" list=support
/ip firewall filter
add action=accept chain=input comment="Allow L2TP-VPN" in-interface=ether1 log=yes protocol=ipsec-esp
add action=accept chain=input comment="Allow L2TP-VPN" connection-state=new in-interface=ether1 log=yes protocol=udp src-port=500,1701,4500
add action=drop chain=input comment="Drop invalid connections" connection-state=invalid
add action=drop chain=input comment="Drop blacklist connections" connection-state=new log-prefix=BLACKLIST src-address-list=blacklist
add action=add-src-to-address-list address-list=spammers address-list-timeout=1d chain=input comment="Limit incoming connections to 100" connection-limit=100,32 log=yes log-prefix="DROP TOO MANY CONNECTIONS" protocol=tcp
add action=tarpit chain=input comment="Tarpit spammers" connection-limit=3,32 protocol=tcp src-address-list=spammers
add action=jump chain=forward comment="Jump for icmp forward flow" jump-target=ICMP protocol=icmp
add action=add-src-to-address-list address-list=Syn_Flooder address-list-timeout=30m chain=input comment="Add Syn Flood IP to the list" connection-limit=30,32 protocol=tcp tcp-flags=syn
add action=drop chain=input comment="Drop to syn flood list" src-address-list=Syn_Flooder
add action=accept chain=input comment="Full access to SUPPORT address list" src-address-list=support
add action=add-src-to-address-list address-list=Port_Scanner address-list-timeout=1w chain=input comment="Port Scanner Detect" protocol=tcp psd=21,3s,3,1
add action=drop chain=input comment="Drop to port scan list" src-address-list=Port_Scanner
add action=jump chain=input comment="Jump for icmp input flow" jump-target=ICMP protocol=icmp
add action=drop chain=forward comment="Drop to bogon list" dst-address-list=bogons
add action=add-src-to-address-list address-list=spammers address-list-timeout=3h chain=forward comment="Add Spammers to the list for 3 hours" connection-limit=30,32 dst-port=25,587 limit=30/1m,0:packet protocol=tcp
add action=drop chain=forward comment="Avoid spammers action" dst-port=25,587 protocol=tcp src-address-list=spammers
add action=accept chain=input comment="Allow limited pings" limit=50/5s,2:packet protocol=icmp
add action=drop chain=input comment="Drop excess pings" protocol=icmp
add action=accept chain=input comment="Accept to established connections" connection-state=established
add action=drop chain=input comment="drop all traffic brute force attack sources" src-address-list=service-blacklist
add action=add-src-to-address-list address-list=service-blacklist address-list-timeout=1w chain=input comment="7day to service-blacklist" connection-state=new dst-port=8728,8291,2022 log=yes log-prefix=SERVICE-BLACKLIST protocol=tcp src-address-list=service-darkgreylist
add action=add-src-to-address-list address-list=service-darkgreylist address-list-timeout=1m chain=input comment="add new failed service to darkgreylist" connection-state=new dst-port=8728,8291,2022 protocol=tcp src-address-list=service-greylist
add action=add-src-to-address-list address-list=service-greylist address-list-timeout=1m chain=input comment="add new failed service-lightgreylist to service-greylist" connection-state=new dst-port=8728,8291,2022 protocol=tcp src-address-list=service-lightgreylist
add action=add-src-to-address-list address-list=service-lightgreylist address-list-timeout=1m chain=input comment="new connections to service-lightgreylist" connection-state=new dst-port=8728,8291,2022 protocol=tcp
add action=accept chain=input comment="Accept to related connections" connection-state=related
add action=accept chain=input comment="Allow remote access to router" dst-port=8728,8291,2022 log=yes protocol=tcp
add action=drop chain=input comment="Drop anything else!"
add action=accept chain=ICMP comment="Echo request - Avoiding Ping Flood" icmp-options=8:0 limit=1,5:packet protocol=icmp
add action=accept chain=ICMP comment="Echo reply" icmp-options=0:0 protocol=icmp
add action=accept chain=ICMP comment="Time Exceeded" icmp-options=11:0 protocol=icmp
add action=accept chain=ICMP comment="Destination unreachable" icmp-options=3:0-1 protocol=icmp
add action=accept chain=ICMP comment=PMTUD icmp-options=3:4 protocol=icmp
add action=drop chain=ICMP comment="Drop to the other ICMPs" protocol=icmp
add action=jump chain=output comment="Jump for icmp output" jump-target=ICMP protocol=icmp
/ip firewall nat
add action=masquerade chain=srcnat out-interface=ether1
add action=masquerade chain=srcnat out-interface=ether2
add action=masquerade chain=srcnat comment="Masquerade L2TP" dst-address=!192.168.0.200-192.168.0.219 src-address=192.168.0.200-192.168.0.219
add action=dst-nat chain=dstnat comment=RDP-Drei dst-port=3389 in-interface=ether1 protocol=tcp to-addresses=192.168.0.1
add action=dst-nat chain=dstnat comment=RDP-A1 dst-port=3389 in-interface=ether2 protocol=tcp to-addresses=192.168.0.1
/ip ipsec peer
add address=0.0.0.0/0 dh-group=ec2n185,modp2048,modp1024 enc-algorithm=aes-256,aes-192,aes-128,3des exchange-mode=main-l2tp generate-policy=port-override secret=XXXXXXXXXXX
add enc-algorithm=aes-256,aes-192,aes-128,3des exchange-mode=main-l2tp generate-policy=port-override passive=yes secret=XXXXXXXXXXX
/ip service
set telnet disabled=yes
set ftp disabled=yes
set www address=192.168.0.0/24
set ssh port=2022
set api-ssl disabled=yes
/ip upnp
set enabled=yes
/ip upnp interfaces
add interface=bridge-local type=internal
add interface=ether1 type=external
/ppp secret
add name=VPN-User password=XXXXXXXXXXXXX profile=VPN-Profile service=l2tp
/system clock
set time-zone-name=Europe/Vienna
/system identity
set name=XXXXXXXXX
/system logging
add disabled=yes prefix="IPsec-LOG: " topics=ipsec
/system ntp client
set enabled=yes primary-ntp=178.189.127.148 secondary-ntp=178.189.127.149
/system routerboard settings
set init-delay=0s silent-boot=yes
/system scheduler
add comment="Download openbl list" interval=1w name=DownloadOpenBL_List on-event=DownloadOpenBL policy=ftp,reboot,read,write,policy,test,password,sniff,sensitive start-date=may/11/2016 start-time=02:05:00
add comment="Apply openbl List" interval=1w name=InstallOpenBL_List on-event=ReplaceOpenBL policy=ftp,reboot,read,write,policy,test,password,sniff,sensitive start-date=may/11/2016 start-time=02:20:00
add comment="Download spamnaus list" interval=1w name=DownloadSpamhausList on-event=DownloadSpamhaus policy=ftp,reboot,read,write,policy,test,password,sniff,sensitive start-date=may/11/2016 start-time=02:10:00
add comment="Apply spamnaus List" interval=1w name=InstallSpamhausList on-event=ReplaceSpamhaus policy=ftp,reboot,read,write,policy,test,password,sniff,sensitive start-date=may/11/2016 start-time=02:25:00
add comment="Download dshield list" interval=1w name=DownloadDShieldList on-event=Download_dshield policy=ftp,reboot,read,write,policy,test,password,sniff,sensitive start-date=may/11/2016 start-time=02:00:00
add comment="Apply dshield List" interval=1w name=InstallDShieldList on-event=Replace_dshield policy=ftp,reboot,read,write,policy,test,password,sniff,sensitive start-date=may/11/2016 start-time=02:15:00
add comment=RemoveBlacklistFiles interval=1w name=remove_Blacklist_files on-event=RemoveBlacklistFiles policy=ftp,reboot,read,write,policy,test,password,sniff,sensitive start-date=may/11/2016 start-time=02:30:00
/system script
add name=DownloadOpenBL owner=admin policy=ftp,reboot,read,write,policy,test,password,sniff,sensitive source="\
    \n/tool fetch url=\"http://joshaven.com/openbl.rsc\" mode=http;\
    \n:log info \"Downloaded openbl.rsc from Joshaven.com\";\
    \n"
add name=ReplaceOpenBL owner=admin policy=ftp,reboot,read,write,policy,test,password,sniff,sensitive source="\
    \n/ip firewall address-list remove [find where comment=\"OpenBL\"]\
    \n/import file-name=openbl.rsc;\
    \n:log info \"Removed old OpenBL records and imported new list\";\
    \n"
add name=DownloadSpamhaus owner=admin policy=ftp,reboot,read,write,policy,test,password,sniff,sensitive source="\
    \n/tool fetch url=\"http://joshaven.com/spamhaus.rsc\" mode=http;\
    \n:log info \"Downloaded spamhaus.rsc from Joshaven.com\";\
    \n"
add name=ReplaceSpamhaus owner=admin policy=ftp,reboot,read,write,policy,test,password,sniff,sensitive source="\
    \n/ip firewall address-list remove [find where comment=\"SpamHaus\"]\
    \n/import file-name=spamhaus.rsc;\
    \n:log info \"Removed old Spamhaus records and imported new list\";\
    \n"
add name=Download_dshield owner=admin policy=ftp,reboot,read,write,policy,test,password,sniff,sensitive source="\
    \n/tool fetch url=\"http://joshaven.com/dshield.rsc\" mode=http;\
    \n:log info \"Downloaded dshield.rsc from Joshaven.com\";\
    \n"
add name=Replace_dshield owner=admin policy=ftp,reboot,read,write,policy,test,password,sniff,sensitive source="\
    \n/ip firewall address-list remove [find where comment=\"DShield\"]\
    \n/import file-name=dshield.rsc;\
    \n:log info \"Removed old dshield records and imported new list\";\
    \n"
add name=RemoveBlacklistFiles owner=admin policy=ftp,reboot,read,write,policy,test,password,sniff,sensitive source="\r\
    \n/file remove dshield.rsc\r\
    \n/file remove openbl.rsc\r\
    \n/file remove spamhaus.rsc"
/system watchdog
set automatic-supout=no watch-address=192.168.0.1 watchdog-timer=no

IPSec log

11:00:25 ipsec,debug IPsec-LOG: : ===== received 788 bytes from 178.114.143.232[500] to 77.119.245.215[500] 
11:00:25 ipsec,debug,packet IPsec-LOG: : fd6aaed7 f127f924 00000000 00000000 01100200 00000000 00000314 0d000204 
11:00:25 ipsec,debug,packet IPsec-LOG: : 00000001 00000001 000001f8 0101000e 03000024 01010000 800b0001 800c0e10 
11:00:25 ipsec,debug,packet IPsec-LOG: : 80010007 800e0100 80030001 80020004 8004000e 03000024 02010000 800b0001 
11:00:25 ipsec,debug,packet IPsec-LOG: : 800c0e10 80010007 800e0100 80030001 80020002 8004000e 03000024 03010000 
11:00:25 ipsec,debug,packet IPsec-LOG: : 800b0001 800c0e10 80010007 800e0100 80030001 80020001 8004000e 03000024 
11:00:25 ipsec,debug,packet IPsec-LOG: : 04010000 800b0001 800c0e10 80010007 800e0100 80030001 80020006 8004000e 
11:00:25 ipsec,debug,packet IPsec-LOG: : 03000024 05010000 800b0001 800c0e10 80010007 800e0100 80030001 80020004 
11:00:25 ipsec,debug,packet IPsec-LOG: : 80040005 03000024 06010000 800b0001 800c0e10 80010007 800e0100 80030001 
11:00:25 ipsec,debug,packet IPsec-LOG: : 80020002 80040005 03000024 07010000 800b0001 800c0e10 80010007 800e0100 
11:00:25 ipsec,debug,packet IPsec-LOG: : 80030001 80020001 80040005 03000024 08010000 800b0001 800c0e10 80010007 
11:00:25 ipsec,debug,packet IPsec-LOG: : 800e0100 80030001 80020004 80040002 03000024 09010000 800b0001 800c0e10 
11:00:25 ipsec,debug,packet IPsec-LOG: : 80010007 800e0100 80030001 80020002 80040002 03000024 0a010000 800b0001 
11:00:25 ipsec,debug,packet IPsec-LOG: : 800c0e10 80010007 800e0100 80030001 80020001 80040002 03000024 0b010000 
11:00:25 ipsec,debug,packet IPsec-LOG: : 800b0001 800c0e10 80010007 800e0080 80030001 80020002 80040002 03000024 
11:00:25 ipsec,debug,packet IPsec-LOG: : 0c010000 800b0001 800c0e10 80010007 800e0080 80030001 80020001 80040002 
11:00:25 ipsec,debug,packet IPsec-LOG: : 03000020 0d010000 800b0001 800c0e10 80010005 80030001 80020002 80040002 
11:00:25 ipsec,debug,packet IPsec-LOG: : 00000020 0e010000 800b0001 800c0e10 80010005 80030001 80020001 80040002 
11:00:25 ipsec,debug,packet IPsec-LOG: : 0d000014 4a131c81 07035845 5c5728f2 0e95452f 0d000014 4df37928 e9fc4fd1 
11:00:25 ipsec,debug,packet IPsec-LOG: : b3262170 d515c662 0d000014 8f8d8382 6d246b6f c7a8a6a4 28c11de8 0d000014 
11:00:25 ipsec,debug,packet IPsec-LOG: : 439b59f8 ba676c4c 7737ae22 eab8f582 0d000014 4d1e0e13 6deafa34 c4f3ea9f 
11:00:25 ipsec,debug,packet IPsec-LOG: : 02ec7285 0d000014 80d0bb3d ef54565e e84645d4 c85ce3ee 0d000014 9909b64e 
11:00:25 ipsec,debug,packet IPsec-LOG: : ed937c65 73de52ac e952fa6b 0d000014 7d9419a6 5310ca6f 2c179d92 15529d56 
11:00:25 ipsec,debug,packet IPsec-LOG: : 0d000014 cd604643 35df21f8 7cfdb2fc 68b6a448 0d000014 90cb8091 3ebb696e 
11:00:25 ipsec,debug,packet IPsec-LOG: : 086381b5 ec427b1f 0d000018 4048b7d5 6ebce885 25e7de7f 00d6c2d3 80000000 
11:00:25 ipsec,debug,packet IPsec-LOG: : 00000014 afcad713 68a1f1c9 6b8696fc 77570100 
11:00:25 ipsec,debug IPsec-LOG: : === 
11:00:25 ipsec,info IPsec-LOG: : respond new phase 1 (Identity Protection): 77.119.245.215[500]<=>178.114.143.232[500] 
11:00:25 ipsec,debug IPsec-LOG: : begin. 
11:00:25 ipsec,debug IPsec-LOG: : seen nptype=1(sa) len=516 
11:00:25 ipsec,debug IPsec-LOG: : seen nptype=13(vid) len=20 
11:00:25 ipsec,debug IPsec-LOG: : seen nptype=13(vid) len=20 
11:00:25 ipsec,debug IPsec-LOG: : seen nptype=13(vid) len=20 
11:00:25 ipsec,debug IPsec-LOG: : seen nptype=13(vid) len=20 
11:00:25 ipsec,debug IPsec-LOG: : seen nptype=13(vid) len=20 
11:00:25 ipsec,debug IPsec-LOG: : seen nptype=13(vid) len=20 
11:00:25 ipsec,debug IPsec-LOG: : seen nptype=13(vid) len=20 
11:00:25 ipsec,debug IPsec-LOG: : seen nptype=13(vid) len=20 
11:00:25 ipsec,debug IPsec-LOG: : seen nptype=13(vid) len=20 
11:00:25 ipsec,debug IPsec-LOG: : seen nptype=13(vid) len=20 
11:00:25 ipsec,debug IPsec-LOG: : seen nptype=13(vid) len=24 
11:00:25 ipsec,debug IPsec-LOG: : seen nptype=13(vid) len=20 
11:00:25 ipsec,debug IPsec-LOG: : succeed. 
11:00:25 ipsec IPsec-LOG: : received Vendor ID: RFC 3947 
11:00:25 ipsec,debug IPsec-LOG: : received unknown Vendor ID 
11:00:25 ipsec,debug IPsec-LOG: : 4df37928 e9fc4fd1 b3262170 d515c662 
11:00:25 ipsec IPsec-LOG: : received Vendor ID: draft-ietf-ipsec-nat-t-ike-08 
11:00:25 ipsec IPsec-LOG: : received Vendor ID: draft-ietf-ipsec-nat-t-ike-07 
11:00:25 ipsec IPsec-LOG: : received Vendor ID: draft-ietf-ipsec-nat-t-ike-06 
11:00:25 ipsec IPsec-LOG: : received Vendor ID: draft-ietf-ipsec-nat-t-ike-05 
11:00:25 ipsec IPsec-LOG: : received Vendor ID: draft-ietf-ipsec-nat-t-ike-04 
11:00:25 ipsec IPsec-LOG: : received Vendor ID: draft-ietf-ipsec-nat-t-ike-03 
11:00:25 ipsec IPsec-LOG: : received Vendor ID: draft-ietf-ipsec-nat-t-ike-02 
11:00:25 ipsec IPsec-LOG: : received Vendor ID: draft-ietf-ipsec-nat-t-ike-02 
11:00:25 ipsec IPsec-LOG: :  
11:00:25 ipsec IPsec-LOG: : received long Microsoft ID: FRAGMENTATION 
11:00:25 ipsec IPsec-LOG: : Fragmentation enabled 
11:00:25 ipsec IPsec-LOG: : received Vendor ID: DPD 
11:00:25 ipsec,debug IPsec-LOG: : remote supports DPD 
11:00:25 ipsec IPsec-LOG: : 178.114.143.232 Selected NAT-T version: RFC 3947 
11:00:25 ipsec,debug IPsec-LOG: : total SA len=512 
11:00:25 ipsec,debug IPsec-LOG: : 00000001 00000001 000001f8 0101000e 03000024 01010000 800b0001 800c0e10 
11:00:25 ipsec,debug IPsec-LOG: : 80010007 800e0100 80030001 80020004 8004000e 03000024 02010000 800b0001 
11:00:25 ipsec,debug IPsec-LOG: : 800c0e10 80010007 800e0100 80030001 80020002 8004000e 03000024 03010000 
11:00:25 ipsec,debug IPsec-LOG: : 800b0001 800c0e10 80010007 800e0100 80030001 80020001 8004000e 03000024 
11:00:25 ipsec,debug IPsec-LOG: : 04010000 800b0001 800c0e10 80010007 800e0100 80030001 80020006 8004000e 
11:00:25 ipsec,debug IPsec-LOG: : 03000024 05010000 800b0001 800c0e10 80010007 800e0100 80030001 80020004 
11:00:25 ipsec,debug IPsec-LOG: : 80040005 03000024 06010000 800b0001 800c0e10 80010007 800e0100 80030001 
11:00:25 ipsec,debug IPsec-LOG: : 80020002 80040005 03000024 07010000 800b0001 800c0e10 80010007 800e0100 
11:00:25 ipsec,debug IPsec-LOG: : 80030001 80020001 80040005 03000024 08010000 800b0001 800c0e10 80010007 
11:00:25 ipsec,debug IPsec-LOG: : 800e0100 80030001 80020004 80040002 03000024 09010000 800b0001 800c0e10 
11:00:25 ipsec,debug IPsec-LOG: : 80010007 800e0100 80030001 80020002 80040002 03000024 0a010000 800b0001 
11:00:25 ipsec,debug IPsec-LOG: : 800c0e10 80010007 800e0100 80030001 80020001 80040002 03000024 0b010000 
11:00:25 ipsec,debug IPsec-LOG: : 800b0001 800c0e10 80010007 800e0080 80030001 80020002 80040002 03000024 
11:00:25 ipsec,debug IPsec-LOG: : 0c010000 800b0001 800c0e10 80010007 800e0080 80030001 80020001 80040002 
11:00:25 ipsec,debug IPsec-LOG: : 03000020 0d010000 800b0001 800c0e10 80010005 80030001 80020002 80040002 
11:00:25 ipsec,debug IPsec-LOG: : 00000020 0e010000 800b0001 800c0e10 80010005 80030001 80020001 80040002 
11:00:25 ipsec,debug IPsec-LOG: : begin. 
11:00:25 ipsec,debug IPsec-LOG: : seen nptype=2(prop) len=504 
11:00:25 ipsec,debug IPsec-LOG: : succeed. 
11:00:25 ipsec,debug IPsec-LOG: : proposal #1 len=504 
11:00:25 ipsec,debug IPsec-LOG: : begin. 
11:00:25 ipsec,debug IPsec-LOG: : seen nptype=3(trns) len=36 
11:00:25 ipsec,debug IPsec-LOG: : seen nptype=3(trns) len=36 
11:00:25 ipsec,debug IPsec-LOG: : seen nptype=3(trns) len=36 
11:00:25 ipsec,debug IPsec-LOG: : seen nptype=3(trns) len=36 
11:00:25 ipsec,debug IPsec-LOG: : seen nptype=3(trns) len=36 
11:00:25 ipsec,debug IPsec-LOG: : seen nptype=3(trns) len=36 
11:00:25 ipsec,debug IPsec-LOG: : seen nptype=3(trns) len=36 
11:00:25 ipsec,debug IPsec-LOG: : seen nptype=3(trns) len=36 
11:00:25 ipsec,debug IPsec-LOG: : seen nptype=3(trns) len=36 
11:00:25 ipsec,debug IPsec-LOG: : seen nptype=3(trns) len=36 
11:00:25 ipsec,debug IPsec-LOG: : seen nptype=3(trns) len=36 
11:00:25 ipsec,debug IPsec-LOG: : seen nptype=3(trns) len=36 
11:00:25 ipsec,debug IPsec-LOG: : seen nptype=3(trns) len=32 
11:00:25 ipsec,debug IPsec-LOG: : seen nptype=3(trns) len=32 
11:00:25 ipsec,debug IPsec-LOG: : succeed. 
11:00:25 ipsec,debug IPsec-LOG: : transform #1 len=36 
11:00:25 ipsec,debug IPsec-LOG: : type=Life Type, flag=0x8000, lorv=seconds 
11:00:25 ipsec,debug IPsec-LOG: : type=Life Duration, flag=0x8000, lorv=3600 
11:00:25 ipsec,debug IPsec-LOG: : type=Encryption Algorithm, flag=0x8000, lorv=AES-CBC 
11:00:25 ipsec,debug IPsec-LOG: : encryption(aes) 
11:00:25 ipsec,debug IPsec-LOG: : type=Key Length, flag=0x8000, lorv=256 
11:00:25 ipsec,debug IPsec-LOG: : type=Authentication Method, flag=0x8000, lorv=pre-shared key 
11:00:25 ipsec,debug IPsec-LOG: : type=Hash Algorithm, flag=0x8000, lorv=4 
11:00:25 ipsec,debug IPsec-LOG: : hash(sha2_256) 
11:00:25 ipsec,debug IPsec-LOG: : type=Group Description, flag=0x8000, lorv=2048-bit MODP group 
11:00:25 ipsec,debug IPsec-LOG: : dh(modp2048) 
11:00:25 ipsec,debug IPsec-LOG: : transform #2 len=36 
11:00:25 ipsec,debug IPsec-LOG: : type=Life Type, flag=0x8000, lorv=seconds 
11:00:25 ipsec,debug IPsec-LOG: : type=Life Duration, flag=0x8000, lorv=3600 
11:00:25 ipsec,debug IPsec-LOG: : type=Encryption Algorithm, flag=0x8000, lorv=AES-CBC 
11:00:25 ipsec,debug IPsec-LOG: : encryption(aes) 
11:00:25 ipsec,debug IPsec-LOG: : type=Key Length, flag=0x8000, lorv=256 
11:00:25 ipsec,debug IPsec-LOG: : type=Authentication Method, flag=0x8000, lorv=pre-shared key 
11:00:25 ipsec,debug IPsec-LOG: : type=Hash Algorithm, flag=0x8000, lorv=SHA 
11:00:25 ipsec,debug IPsec-LOG: : hash(sha1) 
11:00:25 ipsec,debug IPsec-LOG: : type=Group Description, flag=0x8000, lorv=2048-bit MODP group 
11:00:25 ipsec,debug IPsec-LOG: : dh(modp2048) 
11:00:25 ipsec,debug IPsec-LOG: : transform #3 len=36 
11:00:25 ipsec,debug IPsec-LOG: : type=Life Type, flag=0x8000, lorv=seconds 
11:00:25 ipsec,debug IPsec-LOG: : type=Life Duration, flag=0x8000, lorv=3600 
11:00:25 ipsec,debug IPsec-LOG: : type=Encryption Algorithm, flag=0x8000, lorv=AES-CBC 
11:00:25 ipsec,debug IPsec-LOG: : encryption(aes) 
11:00:25 ipsec,debug IPsec-LOG: : type=Key Length, flag=0x8000, lorv=256 
11:00:25 ipsec,debug IPsec-LOG: : type=Authentication Method, flag=0x8000, lorv=pre-shared key 
11:00:25 ipsec,debug IPsec-LOG: : type=Hash Algorithm, flag=0x8000, lorv=MD5 
11:00:25 ipsec,debug IPsec-LOG: : hash(md5) 
11:00:25 ipsec,debug IPsec-LOG: : type=Group Description, flag=0x8000, lorv=2048-bit MODP group 
11:00:25 ipsec,debug IPsec-LOG: : dh(modp2048) 
11:00:25 ipsec,debug IPsec-LOG: : transform #4 len=36 
11:00:25 ipsec,debug IPsec-LOG: : type=Life Type, flag=0x8000, lorv=seconds 
11:00:25 ipsec,debug IPsec-LOG: : type=Life Duration, flag=0x8000, lorv=3600 
11:00:25 ipsec,debug IPsec-LOG: : type=Encryption Algorithm, flag=0x8000, lorv=AES-CBC 
11:00:25 ipsec,debug IPsec-LOG: : encryption(aes) 
11:00:25 ipsec,debug IPsec-LOG: : type=Key Length, flag=0x8000, lorv=256 
11:00:25 ipsec,debug IPsec-LOG: : type=Authentication Method, flag=0x8000, lorv=pre-shared key 
11:00:25 ipsec,debug IPsec-LOG: : type=Hash Algorithm, flag=0x8000, lorv=6 
11:00:25 ipsec,debug IPsec-LOG: : hash(sha2_512) 
11:00:25 ipsec,debug IPsec-LOG: : type=Group Description, flag=0x8000, lorv=2048-bit MODP group 
11:00:25 ipsec,debug IPsec-LOG: : dh(modp2048) 
11:00:25 ipsec,debug IPsec-LOG: : transform #5 len=36 
11:00:25 ipsec,debug IPsec-LOG: : type=Life Type, flag=0x8000, lorv=seconds 
11:00:25 ipsec,debug IPsec-LOG: : type=Life Duration, flag=0x8000, lorv=3600 
11:00:25 ipsec,debug IPsec-LOG: : type=Encryption Algorithm, flag=0x8000, lorv=AES-CBC 
11:00:25 ipsec,debug IPsec-LOG: : encryption(aes) 
11:00:25 ipsec,debug IPsec-LOG: : type=Key Length, flag=0x8000, lorv=256 
11:00:25 ipsec,debug IPsec-LOG: : type=Authentication Method, flag=0x8000, lorv=pre-shared key 
11:00:25 ipsec,debug IPsec-LOG: : type=Hash Algorithm, flag=0x8000, lorv=4 
11:00:25 ipsec,debug IPsec-LOG: : hash(sha2_256) 
11:00:25 ipsec,debug IPsec-LOG: : type=Group Description, flag=0x8000, lorv=1536-bit MODP group 
11:00:25 ipsec,debug IPsec-LOG: : dh(modp1536) 
11:00:25 ipsec,debug IPsec-LOG: : transform #6 len=36 
11:00:25 ipsec,debug IPsec-LOG: : type=Life Type, flag=0x8000, lorv=seconds 
11:00:25 ipsec,debug IPsec-LOG: : type=Life Duration, flag=0x8000, lorv=3600 
11:00:25 ipsec,debug IPsec-LOG: : type=Encryption Algorithm, flag=0x8000, lorv=AES-CBC 
11:00:25 ipsec,debug IPsec-LOG: : encryption(aes) 
11:00:25 ipsec,debug IPsec-LOG: : type=Key Length, flag=0x8000, lorv=256 
11:00:25 ipsec,debug IPsec-LOG: : type=Authentication Method, flag=0x8000, lorv=pre-shared key 
11:00:25 ipsec,debug IPsec-LOG: : type=Hash Algorithm, flag=0x8000, lorv=SHA 
11:00:25 ipsec,debug IPsec-LOG: : hash(sha1) 
11:00:25 ipsec,debug IPsec-LOG: : type=Group Description, flag=0x8000, lorv=1536-bit MODP group 
11:00:25 ipsec,debug IPsec-LOG: : dh(modp1536) 
11:00:25 ipsec,debug IPsec-LOG: : transform #7 len=36 
11:00:25 ipsec,debug IPsec-LOG: : type=Life Type, flag=0x8000, lorv=seconds 
11:00:25 ipsec,debug IPsec-LOG: : type=Life Duration, flag=0x8000, lorv=3600 
11:00:25 ipsec,debug IPsec-LOG: : type=Encryption Algorithm, flag=0x8000, lorv=AES-CBC 
11:00:25 ipsec,debug IPsec-LOG: : encryption(aes) 
11:00:25 ipsec,debug IPsec-LOG: : type=Key Length, flag=0x8000, lorv=256 
11:00:25 ipsec,debug IPsec-LOG: : type=Authentication Method, flag=0x8000, lorv=pre-shared key 
11:00:25 ipsec,debug IPsec-LOG: : type=Hash Algorithm, flag=0x8000, lorv=MD5 
11:00:25 ipsec,debug IPsec-LOG: : hash(md5) 
11:00:25 ipsec,debug IPsec-LOG: : type=Group Description, flag=0x8000, lorv=1536-bit MODP group 
11:00:25 ipsec,debug IPsec-LOG: : dh(modp1536) 
11:00:25 ipsec,debug IPsec-LOG: : transform #8 len=36 
11:00:25 ipsec,debug IPsec-LOG: : type=Life Type, flag=0x8000, lorv=seconds 
11:00:25 ipsec,debug IPsec-LOG: : type=Life Duration, flag=0x8000, lorv=3600 
11:00:25 ipsec,debug IPsec-LOG: : type=Encryption Algorithm, flag=0x8000, lorv=AES-CBC 
11:00:25 ipsec,debug IPsec-LOG: : encryption(aes) 
11:00:25 ipsec,debug IPsec-LOG: : type=Key Length, flag=0x8000, lorv=256 
11:00:25 ipsec,debug IPsec-LOG: : type=Authentication Method, flag=0x8000, lorv=pre-shared key 
11:00:25 ipsec,debug IPsec-LOG: : type=Hash Algorithm, flag=0x8000, lorv=4 
11:00:25 ipsec,debug IPsec-LOG: : hash(sha2_256) 
11:00:25 ipsec,debug IPsec-LOG: : type=Group Description, flag=0x8000, lorv=1024-bit MODP group 
11:00:25 ipsec,debug IPsec-LOG: : dh(modp1024) 
11:00:25 ipsec,debug IPsec-LOG: : transform #9 len=36 
11:00:25 ipsec,debug IPsec-LOG: : type=Life Type, flag=0x8000, lorv=seconds 
11:00:25 ipsec,debug IPsec-LOG: : type=Life Duration, flag=0x8000, lorv=3600 
11:00:25 ipsec,debug IPsec-LOG: : type=Encryption Algorithm, flag=0x8000, lorv=AES-CBC 
11:00:25 ipsec,debug IPsec-LOG: : encryption(aes) 
11:00:25 ipsec,debug IPsec-LOG: : type=Key Length, flag=0x8000, lorv=256 
11:00:25 ipsec,debug IPsec-LOG: : type=Authentication Method, flag=0x8000, lorv=pre-shared key 
11:00:25 ipsec,debug IPsec-LOG: : type=Hash Algorithm, flag=0x8000, lorv=SHA 
11:00:25 ipsec,debug IPsec-LOG: : hash(sha1) 
11:00:25 ipsec,debug IPsec-LOG: : type=Group Description, flag=0x8000, lorv=1024-bit MODP group 
11:00:25 ipsec,debug IPsec-LOG: : dh(modp1024) 
11:00:25 ipsec,debug IPsec-LOG: : transform #10 len=36 
11:00:25 ipsec,debug IPsec-LOG: : type=Life Type, flag=0x8000, lorv=seconds 
11:00:25 ipsec,debug IPsec-LOG: : type=Life Duration, flag=0x8000, lorv=3600 
11:00:25 ipsec,debug IPsec-LOG: : type=Encryption Algorithm, flag=0x8000, lorv=AES-CBC 
11:00:25 ipsec,debug IPsec-LOG: : encryption(aes) 
11:00:25 ipsec,debug IPsec-LOG: : type=Key Length, flag=0x8000, lorv=256 
11:00:25 ipsec,debug IPsec-LOG: : type=Authentication Method, flag=0x8000, lorv=pre-shared key 
11:00:25 ipsec,debug IPsec-LOG: : type=Hash Algorithm, flag=0x8000, lorv=MD5 
11:00:25 ipsec,debug IPsec-LOG: : hash(md5) 
11:00:25 ipsec,debug IPsec-LOG: : type=Group Description, flag=0x8000, lorv=1024-bit MODP group 
11:00:25 ipsec,debug IPsec-LOG: : dh(modp1024) 
11:00:25 ipsec,debug IPsec-LOG: : transform #11 len=36 
11:00:25 ipsec,debug IPsec-LOG: : type=Life Type, flag=0x8000, lorv=seconds 
11:00:25 ipsec,debug IPsec-LOG: : type=Life Duration, flag=0x8000, lorv=3600 
11:00:25 ipsec,debug IPsec-LOG: : type=Encryption Algorithm, flag=0x8000, lorv=AES-CBC 
11:00:25 ipsec,debug IPsec-LOG: : encryption(aes) 
11:00:25 ipsec,debug IPsec-LOG: : type=Key Length, flag=0x8000, lorv=128 
11:00:25 ipsec,debug IPsec-LOG: : type=Authentication Method, flag=0x8000, lorv=pre-shared key 
11:00:25 ipsec,debug IPsec-LOG: : type=Hash Algorithm, flag=0x8000, lorv=SHA 
11:00:25 ipsec,debug IPsec-LOG: : hash(sha1) 
11:00:25 ipsec,debug IPsec-LOG: : type=Group Description, flag=0x8000, lorv=1024-bit MODP group 
11:00:25 ipsec,debug IPsec-LOG: : dh(modp1024) 
11:00:25 ipsec,debug IPsec-LOG: : transform #12 len=36 
11:00:25 ipsec,debug IPsec-LOG: : type=Life Type, flag=0x8000, lorv=seconds 
11:00:25 ipsec,debug IPsec-LOG: : type=Life Duration, flag=0x8000, lorv=3600 
11:00:25 ipsec,debug IPsec-LOG: : type=Encryption Algorithm, flag=0x8000, lorv=AES-CBC 
11:00:25 ipsec,debug IPsec-LOG: : encryption(aes) 
11:00:25 ipsec,debug IPsec-LOG: : type=Key Length, flag=0x8000, lorv=128 
11:00:25 ipsec,debug IPsec-LOG: : type=Authentication Method, flag=0x8000, lorv=pre-shared key 
11:00:25 ipsec,debug IPsec-LOG: : type=Hash Algorithm, flag=0x8000, lorv=MD5 
11:00:25 ipsec,debug IPsec-LOG: : hash(md5) 
11:00:25 ipsec,debug IPsec-LOG: : type=Group Description, flag=0x8000, lorv=1024-bit MODP group 
11:00:25 ipsec,debug IPsec-LOG: : dh(modp1024) 
11:00:25 ipsec,debug IPsec-LOG: : transform #13 len=32 
11:00:25 ipsec,debug IPsec-LOG: : type=Life Type, flag=0x8000, lorv=seconds 
11:00:25 ipsec,debug IPsec-LOG: : type=Life Duration, flag=0x8000, lorv=3600 
11:00:25 ipsec,debug IPsec-LOG: : type=Encryption Algorithm, flag=0x8000, lorv=3DES-CBC 
11:00:25 ipsec,debug IPsec-LOG: : encryption(3des) 
11:00:25 ipsec,debug IPsec-LOG: : type=Authentication Method, flag=0x8000, lorv=pre-shared key 
11:00:25 ipsec,debug IPsec-LOG: : type=Hash Algorithm, flag=0x8000, lorv=SHA 
11:00:25 ipsec,debug IPsec-LOG: : hash(sha1) 
11:00:25 ipsec,debug IPsec-LOG: : type=Group Description, flag=0x8000, lorv=1024-bit MODP group 
11:00:25 ipsec,debug IPsec-LOG: : dh(modp1024) 
11:00:25 ipsec,debug IPsec-LOG: : transform #14 len=32 
11:00:25 ipsec,debug IPsec-LOG: : type=Life Type, flag=0x8000, lorv=seconds 
11:00:25 ipsec,debug IPsec-LOG: : type=Life Duration, flag=0x8000, lorv=3600 
11:00:25 ipsec,debug IPsec-LOG: : type=Encryption Algorithm, flag=0x8000, lorv=3DES-CBC 
11:00:25 ipsec,debug IPsec-LOG: : encryption(3des) 
11:00:25 ipsec,debug IPsec-LOG: : type=Authentication Method, flag=0x8000, lorv=pre-shared key 
11:00:25 ipsec,debug IPsec-LOG: : type=Hash Algorithm, flag=0x8000, lorv=MD5 
11:00:25 ipsec,debug IPsec-LOG: : hash(md5) 
11:00:25 ipsec,debug IPsec-LOG: : type=Group Description, flag=0x8000, lorv=1024-bit MODP group 
11:00:25 ipsec,debug IPsec-LOG: : dh(modp1024) 
11:00:25 ipsec,debug IPsec-LOG: : pair 1: 
11:00:25 ipsec,debug IPsec-LOG: :  0x488ab8: next=(nil) tnext=0x48d9e8 
11:00:25 ipsec,debug IPsec-LOG: :   0x48d9e8: next=(nil) tnext=0x4898b8 
11:00:25 ipsec,debug IPsec-LOG: :    0x4898b8: next=(nil) tnext=0x48e130 
11:00:25 ipsec,debug IPsec-LOG: :     0x48e130: next=(nil) tnext=0x490400 
11:00:25 ipsec,debug IPsec-LOG: :      0x490400: next=(nil) tnext=0x4899d8 
11:00:25 ipsec,debug IPsec-LOG: :       0x4899d8: next=(nil) tnext=0x48c488 
11:00:25 ipsec,debug IPsec-LOG: :        0x48c488: next=(nil) tnext=0x4903b0 
11:00:25 ipsec,debug IPsec-LOG: :         0x4903b0: next=(nil) tnext=0x488448 
11:00:25 ipsec,debug IPsec-LOG: :          0x488448: next=(nil) tnext=0x48dcc8 
11:00:25 ipsec,debug IPsec-LOG: :           0x48dcc8: next=(nil) tnext=0x492518 
11:00:25 ipsec,debug IPsec-LOG: :            0x492518: next=(nil) tnext=0x48eda8 
11:00:25 ipsec,debug IPsec-LOG: :             0x48eda8: next=(nil) tnext=0x48fa70 
11:00:25 ipsec,debug IPsec-LOG: :              0x48fa70: next=(nil) tnext=0x4883f0 
11:00:25 ipsec,debug IPsec-LOG: :               0x4883f0: next=(nil) tnext=(nil) 
11:00:25 ipsec,debug IPsec-LOG: : proposal #1: 14 transform 
11:00:25 ipsec,debug IPsec-LOG: : prop#=1, prot-id=ISAKMP, spi-size=0, #trns=14 
11:00:25 ipsec,debug IPsec-LOG: : trns#=1, trns-id=IKE 
11:00:25 ipsec,debug IPsec-LOG: : type=Life Type, flag=0x8000, lorv=seconds 
11:00:25 ipsec,debug IPsec-LOG: : type=Life Duration, flag=0x8000, lorv=3600 
11:00:25 ipsec,debug IPsec-LOG: : type=Encryption Algorithm, flag=0x8000, lorv=AES-CBC 
11:00:25 ipsec,debug IPsec-LOG: : type=Key Length, flag=0x8000, lorv=256 
11:00:25 ipsec,debug IPsec-LOG: : type=Authentication Method, flag=0x8000, lorv=pre-shared key 
11:00:25 ipsec,debug IPsec-LOG: : type=Hash Algorithm, flag=0x8000, lorv=4 
11:00:25 ipsec,debug IPsec-LOG: : type=Group Description, flag=0x8000, lorv=2048-bit MODP group 
11:00:25 ipsec,debug IPsec-LOG: : Compared: Local:Peer 
11:00:25 ipsec,debug IPsec-LOG: : (lifetime = 86400:3600) 
11:00:25 ipsec,debug IPsec-LOG: : (lifebyte = 0:0) 
11:00:25 ipsec,debug IPsec-LOG: : enctype = AES-CBC:AES-CBC 
11:00:25 ipsec,debug IPsec-LOG: : (encklen = 256:256) 
11:00:25 ipsec,debug IPsec-LOG: : hashtype = SHA:4 
11:00:25 ipsec,debug IPsec-LOG: : authmethod = pre-shared key:pre-shared key 
11:00:25 ipsec,debug IPsec-LOG: : dh_group = EC2N group on GP[2^185]:2048-bit MODP group 
11:00:25 ipsec,debug IPsec-LOG: : Compared: Local:Peer 
11:00:25 ipsec,debug IPsec-LOG: : (lifetime = 86400:3600) 
11:00:25 ipsec,debug IPsec-LOG: : (lifebyte = 0:0) 
11:00:25 ipsec,debug IPsec-LOG: : enctype = AES-CBC:AES-CBC 
11:00:25 ipsec,debug IPsec-LOG: : (encklen = 256:256) 
11:00:25 ipsec,debug IPsec-LOG: : hashtype = SHA:4 
11:00:25 ipsec,debug IPsec-LOG: : authmethod = pre-shared key:pre-shared key 
11:00:25 ipsec,debug IPsec-LOG: : dh_group = 2048-bit MODP group:2048-bit MODP group 
11:00:25 ipsec,debug IPsec-LOG: : Compared: Local:Peer 
11:00:25 ipsec,debug IPsec-LOG: : (lifetime = 86400:3600) 
11:00:25 ipsec,debug IPsec-LOG: : (lifebyte = 0:0) 
11:00:25 ipsec,debug IPsec-LOG: : enctype = AES-CBC:AES-CBC 
11:00:25 ipsec,debug IPsec-LOG: : (encklen = 256:256) 
11:00:25 ipsec,debug IPsec-LOG: : hashtype = SHA:4 
11:00:25 ipsec,debug IPsec-LOG: : authmethod = pre-shared key:pre-shared key 
11:00:25 ipsec,debug IPsec-LOG: : dh_group = 1024-bit MODP group:2048-bit MODP group 
11:00:25 ipsec,debug IPsec-LOG: : Compared: Local:Peer 
11:00:25 ipsec,debug IPsec-LOG: : (lifetime = 86400:3600) 
11:00:25 ipsec,debug IPsec-LOG: : (lifebyte = 0:0) 
11:00:25 ipsec,debug IPsec-LOG: : enctype = AES-CBC:AES-CBC 
11:00:25 ipsec,debug IPsec-LOG: : (encklen = 192:256) 
11:00:25 ipsec,debug IPsec-LOG: : hashtype = SHA:4 
11:00:25 ipsec,debug IPsec-LOG: : authmethod = pre-shared key:pre-shared key 
11:00:25 ipsec,debug IPsec-LOG: : dh_group = EC2N group on GP[2^185]:2048-bit MODP group 
11:00:25 ipsec,debug IPsec-LOG: : Compared: Local:Peer 
11:00:25 ipsec,debug IPsec-LOG: : (lifetime = 86400:3600) 
11:00:25 ipsec,debug IPsec-LOG: : (lifebyte = 0:0) 
11:00:25 ipsec,debug IPsec-LOG: : enctype = AES-CBC:AES-CBC 
11:00:25 ipsec,debug IPsec-LOG: : (encklen = 192:256) 
11:00:25 ipsec,debug IPsec-LOG: : hashtype = SHA:4 
11:00:25 ipsec,debug IPsec-LOG: : authmethod = pre-shared key:pre-shared key 
11:00:25 ipsec,debug IPsec-LOG: : dh_group = 2048-bit MODP group:2048-bit MODP group 
11:00:25 ipsec,debug IPsec-LOG: : Compared: Local:Peer 
11:00:25 ipsec,debug IPsec-LOG: : (lifetime = 86400:3600) 
11:00:25 ipsec,debug IPsec-LOG: : (lifebyte = 0:0) 
11:00:25 ipsec,debug IPsec-LOG: : enctype = AES-CBC:AES-CBC 
11:00:25 ipsec,debug IPsec-LOG: : (encklen = 192:256) 
11:00:25 ipsec,debug IPsec-LOG: : hashtype = SHA:4 
11:00:25 ipsec,debug IPsec-LOG: : authmethod = pre-shared key:pre-shared key 
11:00:25 ipsec,debug IPsec-LOG: : dh_group = 1024-bit MODP group:2048-bit MODP group 
11:00:25 ipsec,debug IPsec-LOG: : Compared: Local:Peer 
11:00:25 ipsec,debug IPsec-LOG: : (lifetime = 86400:3600) 
11:00:25 ipsec,debug IPsec-LOG: : (lifebyte = 0:0) 
11:00:25 ipsec,debug IPsec-LOG: : enctype = AES-CBC:AES-CBC 
11:00:25 ipsec,debug IPsec-LOG: : (encklen = 128:256) 
11:00:25 ipsec,debug IPsec-LOG: : hashtype = SHA:4 
11:00:25 ipsec,debug IPsec-LOG: : authmethod = pre-shared key:pre-shared key 
11:00:25 ipsec,debug IPsec-LOG: : dh_group = EC2N group on GP[2^185]:2048-bit MODP group 
11:00:25 ipsec,debug IPsec-LOG: : Compared: Local:Peer 
11:00:25 ipsec,debug IPsec-LOG: : (lifetime = 86400:3600) 
11:00:25 ipsec,debug IPsec-LOG: : (lifebyte = 0:0) 
11:00:25 ipsec,debug IPsec-LOG: : enctype = AES-CBC:AES-CBC 
11:00:25 ipsec,debug IPsec-LOG: : (encklen = 128:256) 
11:00:25 ipsec,debug IPsec-LOG: : hashtype = SHA:4 
11:00:25 ipsec,debug IPsec-LOG: : authmethod = pre-shared key:pre-shared key 
11:00:25 ipsec,debug IPsec-LOG: : dh_group = 2048-bit MODP group:2048-bit MODP group 
11:00:25 ipsec,debug IPsec-LOG: : Compared: Local:Peer 
11:00:25 ipsec,debug IPsec-LOG: : (lifetime = 86400:3600) 
11:00:25 ipsec,debug IPsec-LOG: : (lifebyte = 0:0) 
11:00:25 ipsec,debug IPsec-LOG: : enctype = AES-CBC:AES-CBC 
11:00:25 ipsec,debug IPsec-LOG: : (encklen = 128:256) 
11:00:25 ipsec,debug IPsec-LOG: : hashtype = SHA:4 
11:00:25 ipsec,debug IPsec-LOG: : authmethod = pre-shared key:pre-shared key 
11:00:25 ipsec,debug IPsec-LOG: : dh_group = 1024-bit MODP group:2048-bit MODP group 
11:00:25 ipsec,debug IPsec-LOG: : Compared: Local:Peer 
11:00:25 ipsec,debug IPsec-LOG: : (lifetime = 86400:3600) 
11:00:25 ipsec,debug IPsec-LOG: : (lifebyte = 0:0) 
11:00:25 ipsec,debug IPsec-LOG: : enctype = 3DES-CBC:AES-CBC 
11:00:25 ipsec,debug IPsec-LOG: : (encklen = 0:256) 
11:00:25 ipsec,debug IPsec-LOG: : hashtype = SHA:4 
11:00:25 ipsec,debug IPsec-LOG: : authmethod = pre-shared key:pre-shared key 
11:00:25 ipsec,debug IPsec-LOG: : dh_group = EC2N group on GP[2^185]:2048-bit MODP group 
11:00:25 ipsec,debug IPsec-LOG: : Compared: Local:Peer 
11:00:25 ipsec,debug IPsec-LOG: : (lifetime = 86400:3600) 
11:00:25 ipsec,debug IPsec-LOG: : (lifebyte = 0:0) 
11:00:25 ipsec,debug IPsec-LOG: : enctype = 3DES-CBC:AES-CBC 
11:00:25 ipsec,debug IPsec-LOG: : (encklen = 0:256) 
11:00:25 ipsec,debug IPsec-LOG: : hashtype = SHA:4 
11:00:25 ipsec,debug IPsec-LOG: : authmethod = pre-shared key:pre-shared key 
11:00:25 ipsec,debug IPsec-LOG: : dh_group = 2048-bit MODP group:2048-bit MODP group 
11:00:25 ipsec,debug IPsec-LOG: : Compared: Local:Peer 
11:00:25 ipsec,debug IPsec-LOG: : (lifetime = 86400:3600) 
11:00:25 ipsec,debug IPsec-LOG: : (lifebyte = 0:0) 
11:00:25 ipsec,debug IPsec-LOG: : enctype = 3DES-CBC:AES-CBC 
11:00:25 ipsec,debug IPsec-LOG: : (encklen = 0:256) 
11:00:25 ipsec,debug IPsec-LOG: : hashtype = SHA:4 
11:00:25 ipsec,debug IPsec-LOG: : authmethod = pre-shared key:pre-shared key 
11:00:25 ipsec,debug IPsec-LOG: : dh_group = 1024-bit MODP group:2048-bit MODP group 
11:00:25 ipsec,debug IPsec-LOG: : prop#=1, prot-id=ISAKMP, spi-size=0, #trns=14 
11:00:25 ipsec,debug IPsec-LOG: : trns#=2, trns-id=IKE 
11:00:25 ipsec,debug IPsec-LOG: : type=Life Type, flag=0x8000, lorv=seconds 
11:00:25 ipsec,debug IPsec-LOG: : type=Life Duration, flag=0x8000, lorv=3600 
11:00:25 ipsec,debug IPsec-LOG: : type=Encryption Algorithm, flag=0x8000, lorv=AES-CBC 
11:00:25 ipsec,debug IPsec-LOG: : type=Key Length, flag=0x8000, lorv=256 
11:00:25 ipsec,debug IPsec-LOG: : type=Authentication Method, flag=0x8000, lorv=pre-shared key 
11:00:25 ipsec,debug IPsec-LOG: : type=Hash Algorithm, flag=0x8000, lorv=SHA 
11:00:25 ipsec,debug IPsec-LOG: : type=Group Description, flag=0x8000, lorv=2048-bit MODP group 
11:00:25 ipsec,debug IPsec-LOG: : Compared: Local:Peer 
11:00:25 ipsec,debug IPsec-LOG: : (lifetime = 86400:3600) 
11:00:25 ipsec,debug IPsec-LOG: : (lifebyte = 0:0) 
11:00:25 ipsec,debug IPsec-LOG: : enctype = AES-CBC:AES-CBC 
11:00:25 ipsec,debug IPsec-LOG: : (encklen = 256:256) 
11:00:25 ipsec,debug IPsec-LOG: : hashtype = SHA:SHA 
11:00:25 ipsec,debug IPsec-LOG: : authmethod = pre-shared key:pre-shared key 
11:00:25 ipsec,debug IPsec-LOG: : dh_group = EC2N group on GP[2^185]:2048-bit MODP group 
11:00:25 ipsec,debug IPsec-LOG: : Compared: Local:Peer 
11:00:25 ipsec,debug IPsec-LOG: : (lifetime = 86400:3600) 
11:00:25 ipsec,debug IPsec-LOG: : (lifebyte = 0:0) 
11:00:25 ipsec,debug IPsec-LOG: : enctype = AES-CBC:AES-CBC 
11:00:25 ipsec,debug IPsec-LOG: : (encklen = 256:256) 
11:00:25 ipsec,debug IPsec-LOG: : hashtype = SHA:SHA 
11:00:25 ipsec,debug IPsec-LOG: : authmethod = pre-shared key:pre-shared key 
11:00:25 ipsec,debug IPsec-LOG: : dh_group = 2048-bit MODP group:2048-bit MODP group 
11:00:25 ipsec,debug IPsec-LOG: : an acceptable proposal found. 
11:00:25 ipsec,debug IPsec-LOG: : dh(modp2048) 
11:00:25 ipsec,debug IPsec-LOG: : agreed on pre-shared key auth. 
11:00:25 ipsec,debug IPsec-LOG: : === 
11:00:25 ipsec,debug IPsec-LOG: : new cookie: 
11:00:25 ipsec,debug IPsec-LOG: : 9a2bd742c795fc5e  
11:00:25 ipsec,debug IPsec-LOG: : add payload of len 52, next type 13 
11:00:25 ipsec,debug IPsec-LOG: : add payload of len 16, next type 13 
11:00:25 ipsec,debug IPsec-LOG: : add payload of len 16, next type 13 
11:00:25 ipsec,debug IPsec-LOG: : add payload of len 20, next type 0 
11:00:25 ipsec,debug IPsec-LOG: : 148 bytes from 77.119.245.215[500] to 178.114.143.232[500] 
11:00:25 ipsec,debug IPsec-LOG: : 1 times of 148 bytes message will be sent to 178.114.143.232[500] 
11:00:25 ipsec,debug,packet IPsec-LOG: : fd6aaed7 f127f924 9a2bd742 c795fc5e 01100200 00000000 00000094 0d000038 
11:00:25 ipsec,debug,packet IPsec-LOG: : 00000001 00000001 0000002c 01010001 00000024 02010000 800b0001 800c0e10 
11:00:25 ipsec,debug,packet IPsec-LOG: : 80010007 800e0100 80030001 80020002 8004000e 0d000014 4a131c81 07035845 
11:00:25 ipsec,debug,packet IPsec-LOG: : 5c5728f2 0e95452f 0d000014 afcad713 68a1f1c9 6b8696fc 77570100 00000018 
11:00:25 ipsec,debug,packet IPsec-LOG: : 4048b7d5 6ebce885 25e7de7f 00d6c2d3 80000000 
11:00:25 ipsec IPsec-LOG: : sent phase1 packet 77.119.245.215[500]<=>178.114.143.232[500] fd6aaed7f127f924:9a2bd742c795fc5e 
11:00:26 ipsec,debug IPsec-LOG: : ===== received 356 bytes from 178.114.143.232[500] to 77.119.245.215[500] 
11:00:26 ipsec,debug,packet IPsec-LOG: : fd6aaed7 f127f924 9a2bd742 c795fc5e 04100200 00000000 00000164 0a000104 
11:00:26 ipsec,debug,packet IPsec-LOG: : 9cd71d47 6fdf2aa8 778133ea 9198f8e6 e82f35d2 a4c3cf93 25513d66 19d691e6 
11:00:26 ipsec,debug,packet IPsec-LOG: : 1952287e 6dca91a2 d59bbc94 d3cde1ce eb4d5b05 707a40cb efd3f28d 6e38131f 
11:00:26 ipsec,debug,packet IPsec-LOG: : db4986c6 0d65bcdf 3ce44978 7e155729 94375be9 a07adbed c27ae48e 998d44ef 
11:00:26 ipsec,debug,packet IPsec-LOG: : 62ea75b3 1e0f3bcb 91621c73 f8e54d28 3aa45a13 67a8daeb 7471dd5d 508027ab 
11:00:26 ipsec,debug,packet IPsec-LOG: : 69dd4185 ac099acc 6177eb0e e7e00888 c1e58354 c336c40e 96c4c016 ac206561 
11:00:26 ipsec,debug,packet IPsec-LOG: : 40fc5859 a7442965 a59df67d 2aed8edb 40533e21 8e6b612c 6e3b50f8 3c19490d 
11:00:26 ipsec,debug,packet IPsec-LOG: : 5f687995 a90cc9c3 3402fc14 1814dd24 4d87f9c5 c69addb4 cdac54e0 9610f325 
11:00:26 ipsec,debug,packet IPsec-LOG: : 57f60712 e008c4c8 c4fcfe91 c1b4768d 61102e77 9f103927 b98bb6bf 30286387 
11:00:26 ipsec,debug,packet IPsec-LOG: : 14000014 704fa83d da7de519 a8f2d7fd 96fedbfe 14000018 308faa0e d6dc9199 
11:00:26 ipsec,debug,packet IPsec-LOG: : adfc7c6d 0116346b fc659953 00000018 7594302f b8548c37 1ee37076 d78a4262 
11:00:26 ipsec,debug,packet IPsec-LOG: : 53bcb630 
11:00:26 ipsec,debug IPsec-LOG: : begin. 
11:00:26 ipsec,debug IPsec-LOG: : seen nptype=4(ke) len=260 
11:00:26 ipsec,debug IPsec-LOG: : seen nptype=10(nonce) len=20 
11:00:26 ipsec,debug IPsec-LOG: : seen nptype=20(nat-d) len=24 
11:00:26 ipsec,debug IPsec-LOG: : seen nptype=20(nat-d) len=24 
11:00:26 ipsec,debug IPsec-LOG: : succeed. 
11:00:26 ipsec IPsec-LOG: : 77.119.245.215 Hashing 77.119.245.215[500] with algo #2  
11:00:26 ipsec,debug IPsec-LOG: : hash(sha1) 
11:00:26 ipsec IPsec-LOG: : NAT-D payload #0 verified 
11:00:26 ipsec IPsec-LOG: : 178.114.143.232 Hashing 178.114.143.232[500] with algo #2  
11:00:26 ipsec,debug IPsec-LOG: : hash(sha1) 
11:00:26 ipsec IPsec-LOG: : NAT-D payload #1 verified 
11:00:26 ipsec IPsec-LOG: : NAT not detected  
11:00:26 ipsec,debug IPsec-LOG: : === 
11:00:26 ipsec,debug IPsec-LOG: : dh(modp2048) 
11:00:26 ipsec,debug IPsec-LOG: : compute DH's private. 
11:00:26 ipsec,debug IPsec-LOG: : 5e821170 e336987f 95e27e07 d0f482f4 c50a1e86 8378238f bc7cd506 34ed74e5 
11:00:26 ipsec,debug IPsec-LOG: : 6ec4cf18 516bc71f 1479a40d 14e68586 d0887f33 3a98ff50 773af49f c7a09a24 
11:00:26 ipsec,debug IPsec-LOG: : 718aa7a8 d23800d2 4336ba0d 315ee872 6b3cd636 5999dd55 95bef752 cbf0e027 
11:00:26 ipsec,debug IPsec-LOG: : 5b2cb3e3 cab108fa 2302431e 474e4076 358f012f 10466fae 1b0dda79 696d87c6 
11:00:26 ipsec,debug IPsec-LOG: : c1492278 a484532c f67ecf7f fd3ac054 9e14376d f58ce303 710734f2 29724782 
11:00:26 ipsec,debug IPsec-LOG: : db066ec2 d494408b 280e510d 6dacb229 2a1ca140 1a788434 dc3f3d52 c600985b 
11:00:26 ipsec,debug IPsec-LOG: : be163c0e 47b24d82 07f8d10f 1ec635c1 ae06d987 4f4a43d4 7888fed1 c552d1d1 
11:00:26 ipsec,debug IPsec-LOG: : daf31f35 bfe0b935 0433a4b5 ca6ba409 c63b8d0c 5ac7dc38 158027a4 dc905c65 
11:00:26 ipsec,debug IPsec-LOG: : compute DH's public. 
11:00:26 ipsec,debug IPsec-LOG: : fcdb57bc 9a684d5d 608fb2f7 0255c30d 12e86ac0 2795c31a d537b855 d0904c02 
11:00:26 ipsec,debug IPsec-LOG: : d463cff6 432a5fd2 dd5c1f01 187c4dfa b67f133e 5913aeba cbaf9cd9 55b53631 
11:00:26 ipsec,debug IPsec-LOG: : ebffd117 2e9a564a 11be9bc9 e6ffd2e7 393cfb72 0829bc7f fbfedfbc b4163872 
11:00:26 ipsec,debug IPsec-LOG: : 3015af2c 41259e8b b1702a85 9bfe033c 6057f601 ebf38bf7 8c688647 a7916088 
11:00:26 ipsec,debug IPsec-LOG: : baa3fa17 5a9bcda7 f8cb2cff 85dc7833 adb5a464 f4fe33ef 01dbdb40 f179b0c3 
11:00:26 ipsec,debug IPsec-LOG: : 66ff91a6 14c3dbd3 15bf7033 db6e587b c8d4c960 bfa166d0 ec005ff1 f2de0890 
11:00:26 ipsec,debug IPsec-LOG: : 0f77a7e1 2b93fa06 fa92f185 7e23dbca 9449adaf f5ba0a7f 7baecae2 c1ab57c1 
11:00:26 ipsec,debug IPsec-LOG: : 9c89753c 2408d3a4 91bc5298 a39daffe a505c219 62e2bb57 ca92b228 2d0de265 
11:00:26 ipsec IPsec-LOG: : 178.114.143.232 Hashing 178.114.143.232[500] with algo #2  
11:00:26 ipsec,debug IPsec-LOG: : hash(sha1) 
11:00:26 ipsec IPsec-LOG: : 77.119.245.215 Hashing 77.119.245.215[500] with algo #2  
11:00:26 ipsec,debug IPsec-LOG: : hash(sha1) 
11:00:26 ipsec IPsec-LOG: : Adding remote and local NAT-D payloads. 
11:00:26 ipsec,debug IPsec-LOG: : add payload of len 256, next type 10 
11:00:26 ipsec,debug IPsec-LOG: : add payload of len 24, next type 20 
11:00:26 ipsec,debug IPsec-LOG: : add payload of len 20, next type 20 
11:00:26 ipsec,debug IPsec-LOG: : add payload of len 20, next type 0 
11:00:26 ipsec,debug IPsec-LOG: : 364 bytes from 77.119.245.215[500] to 178.114.143.232[500] 
11:00:26 ipsec,debug IPsec-LOG: : 1 times of 364 bytes message will be sent to 178.114.143.232[500] 
11:00:26 ipsec,debug,packet IPsec-LOG: : fd6aaed7 f127f924 9a2bd742 c795fc5e 04100200 00000000 0000016c 0a000104 
11:00:26 ipsec,debug,packet IPsec-LOG: : fcdb57bc 9a684d5d 608fb2f7 0255c30d 12e86ac0 2795c31a d537b855 d0904c02 
11:00:26 ipsec,debug,packet IPsec-LOG: : d463cff6 432a5fd2 dd5c1f01 187c4dfa b67f133e 5913aeba cbaf9cd9 55b53631 
11:00:26 ipsec,debug,packet IPsec-LOG: : ebffd117 2e9a564a 11be9bc9 e6ffd2e7 393cfb72 0829bc7f fbfedfbc b4163872 
11:00:26 ipsec,debug,packet IPsec-LOG: : 3015af2c 41259e8b b1702a85 9bfe033c 6057f601 ebf38bf7 8c688647 a7916088 
11:00:26 ipsec,debug,packet IPsec-LOG: : baa3fa17 5a9bcda7 f8cb2cff 85dc7833 adb5a464 f4fe33ef 01dbdb40 f179b0c3 
11:00:26 ipsec,debug,packet IPsec-LOG: : 66ff91a6 14c3dbd3 15bf7033 db6e587b c8d4c960 bfa166d0 ec005ff1 f2de0890 
11:00:26 ipsec,debug,packet IPsec-LOG: : 0f77a7e1 2b93fa06 fa92f185 7e23dbca 9449adaf f5ba0a7f 7baecae2 c1ab57c1 
11:00:26 ipsec,debug,packet IPsec-LOG: : 9c89753c 2408d3a4 91bc5298 a39daffe a505c219 62e2bb57 ca92b228 2d0de265 
11:00:26 ipsec,debug,packet IPsec-LOG: : 1400001c 82016158 b6655ae6 ce889cc7 a67913ce f2f0cb53 938b68de 14000018 
11:00:26 ipsec,debug,packet IPsec-LOG: : 7594302f b8548c37 1ee37076 d78a4262 53bcb630 00000018 308faa0e d6dc9199 
11:00:26 ipsec,debug,packet IPsec-LOG: : adfc7c6d 0116346b fc659953 
11:00:26 ipsec IPsec-LOG: : sent phase1 packet 77.119.245.215[500]<=>178.114.143.232[500] fd6aaed7f127f924:9a2bd742c795fc5e 
11:00:26 ipsec,debug IPsec-LOG: : dh(modp2048) 
11:00:27 ipsec,debug IPsec-LOG: : compute DH's shared. 
11:00:27 ipsec,debug IPsec-LOG: :  
11:00:27 ipsec,debug IPsec-LOG: : 8df6c2f3 da9a1830 f0988bea fa992670 a4dfaff8 fdd95c47 fe5bf997 4f6a1490 
11:00:27 ipsec,debug IPsec-LOG: : e7ff4a9f 78db824b 0676f434 1ff2fea0 2db65144 62ec2acd 4e13b597 584a31fb 
11:00:27 ipsec,debug IPsec-LOG: : 0d78cc68 959c3ad1 46778554 095f26ca 83372077 7420a433 e2e0b383 165dfb79 
11:00:27 ipsec,debug IPsec-LOG: : d3ad847b 7189cba0 ca12819c c89ed291 bba05596 8a8aaa69 94478e4a fe723433 
11:00:27 ipsec,debug IPsec-LOG: : 6117db23 6fe5b19a 3e2f3c1a 93379af6 555ef4da c99fa3db 558d3aa7 e9d06fd8 
11:00:27 ipsec,debug IPsec-LOG: : 95a9b48f 870ccfbc 9ecde154 6c9b138c 9650bb26 3362e787 9840034d 6184ab17 
11:00:27 ipsec,debug IPsec-LOG: : a29e4257 eadc282b 42b1b1f8 1a20dc03 1739b869 1614c80f ba0c9d34 6d8ae6ec 
11:00:27 ipsec,debug IPsec-LOG: : c4e4f9dd 90772d03 93f10372 deb1e017 78647296 3f1a1a24 1818242d 37bce193 
11:00:27 ipsec,debug IPsec-LOG: : nonce 1:  
11:00:27 ipsec,debug IPsec-LOG: : 704fa83d da7de519 a8f2d7fd 96fedbfe 
11:00:27 ipsec,debug IPsec-LOG: : nonce 2:  
11:00:27 ipsec,debug IPsec-LOG: : 82016158 b6655ae6 ce889cc7 a67913ce f2f0cb53 938b68de 
11:00:27 ipsec,debug IPsec-LOG: : hmac(hmac_sha1) 
11:00:27 ipsec,debug IPsec-LOG: : SKEYID computed: 
11:00:27 ipsec,debug IPsec-LOG: : b3d3d580 ef42cfc4 c36082a3 5bc36bbf 66340aca 
11:00:27 ipsec,debug IPsec-LOG: : hmac(hmac_sha1) 
11:00:27 ipsec,debug IPsec-LOG: : SKEYID_d computed: 
11:00:27 ipsec,debug IPsec-LOG: : e4d51c64 7f126c3d a8b62dc8 7ece86f2 499531e4 
11:00:27 ipsec,debug IPsec-LOG: : hmac(hmac_sha1) 
11:00:27 ipsec,debug IPsec-LOG: : SKEYID_a computed: 
11:00:27 ipsec,debug IPsec-LOG: : 5d5e8d2c 06b915f7 ae5c7161 4e987871 6ddd2d5b 
11:00:27 ipsec,debug IPsec-LOG: : hmac(hmac_sha1) 
11:00:27 ipsec,debug IPsec-LOG: : SKEYID_e computed: 
11:00:27 ipsec,debug IPsec-LOG: : 2bf821b2 e19658a3 9665a53b a8114a7f 1cb04964 
11:00:27 ipsec,debug IPsec-LOG: : encryption(aes) 
11:00:27 ipsec,debug IPsec-LOG: : hash(sha1) 
11:00:27 ipsec,debug IPsec-LOG: : len(SKEYID_e) < len(Ka) (20 < 32), generating long key (Ka = K1 | K2 | ...) 
11:00:27 ipsec,debug IPsec-LOG: : hmac(hmac_sha1) 
11:00:27 ipsec,debug IPsec-LOG: : compute intermediate encryption key K1 
11:00:27 ipsec,debug IPsec-LOG: : 00 
11:00:27 ipsec,debug IPsec-LOG: : 446efbd0 a14ce3d2 c4f1f8d6 4fca42a5 5c533828 
11:00:27 ipsec,debug IPsec-LOG: : hmac(hmac_sha1) 
11:00:27 ipsec,debug IPsec-LOG: : compute intermediate encryption key K2 
11:00:27 ipsec,debug IPsec-LOG: : 446efbd0 a14ce3d2 c4f1f8d6 4fca42a5 5c533828 
11:00:27 ipsec,debug IPsec-LOG: : 6ce700c0 3011bcc9 221c3821 efd61073 71fe3d9b 
11:00:27 ipsec,debug IPsec-LOG: : final encryption key computed: 
11:00:27 ipsec,debug IPsec-LOG: : 446efbd0 a14ce3d2 c4f1f8d6 4fca42a5 5c533828 6ce700c0 3011bcc9 221c3821 
11:00:27 ipsec,debug IPsec-LOG: : hash(sha1) 
11:00:27 ipsec,debug IPsec-LOG: : encryption(aes) 
11:00:27 ipsec,debug IPsec-LOG: : IV computed: 
11:00:27 ipsec,debug IPsec-LOG: : a7fcbcde 163910fb 4f00c5b4 b944f10f 
11:00:27 ipsec,debug IPsec-LOG: : ===== received 108 bytes from 178.114.143.232[500] to 77.119.245.215[500] 
11:00:27 ipsec,debug,packet IPsec-LOG: : fd6aaed7 f127f924 9a2bd742 c795fc5e 05100201 00000000 0000006c f909e313 
11:00:27 ipsec,debug,packet IPsec-LOG: : 06a780b9 d02d66ba db8bfc9e 917755d6 7e2ea909 c699b644 8325eda8 0a9b3b0b 
11:00:27 ipsec,debug,packet IPsec-LOG: : 93279620 bcf6e72a ad631e0d 2dd68612 b8c8e6ec 1ad5da64 aa83aa7d 984a7cee 
11:00:27 ipsec,debug,packet IPsec-LOG: : 33fc318f ea4a9c40 349b6004 
11:00:27 ipsec,debug IPsec-LOG: : encryption(aes) 
11:00:27 ipsec,debug IPsec-LOG: : IV was saved for next processing: 
11:00:27 ipsec,debug IPsec-LOG: : 984a7cee 33fc318f ea4a9c40 349b6004 
11:00:27 ipsec,debug IPsec-LOG: : encryption(aes) 
11:00:27 ipsec,debug IPsec-LOG: : with key: 
11:00:27 ipsec,debug IPsec-LOG: : 446efbd0 a14ce3d2 c4f1f8d6 4fca42a5 5c533828 6ce700c0 3011bcc9 221c3821 
11:00:27 ipsec,debug IPsec-LOG: : decrypted payload by IV: 
11:00:27 ipsec,debug IPsec-LOG: : a7fcbcde 163910fb 4f00c5b4 b944f10f 
11:00:27 ipsec,debug IPsec-LOG: : decrypted payload, but not trimed. 
11:00:27 ipsec,debug IPsec-LOG: : 0800000c 011101f4 b2728fe8 0b000018 570a9031 48476f8a 4dd4450b 27d04cb2 
11:00:27 ipsec,debug IPsec-LOG: : 5350424c 0000001c 00000001 01106002 fd6aaed7 f127f924 9a2bd742 c795fc5e 
11:00:27 ipsec,debug IPsec-LOG: : 00000000 00000000 00000000 00000010 
11:00:27 ipsec,debug IPsec-LOG: : padding len=17 
11:00:27 ipsec,debug IPsec-LOG: : skip to trim padding. 
11:00:27 ipsec,debug IPsec-LOG: : decrypted. 
11:00:27 ipsec,debug IPsec-LOG: : fd6aaed7 f127f924 9a2bd742 c795fc5e 05100201 00000000 0000006c 0800000c 
11:00:27 ipsec,debug IPsec-LOG: : 011101f4 b2728fe8 0b000018 570a9031 48476f8a 4dd4450b 27d04cb2 5350424c 
11:00:27 ipsec,debug IPsec-LOG: : 0000001c 00000001 01106002 fd6aaed7 f127f924 9a2bd742 c795fc5e 00000000 
11:00:27 ipsec,debug IPsec-LOG: : 00000000 00000000 00000010 
11:00:27 ipsec,debug IPsec-LOG: : begin. 
11:00:27 ipsec,debug IPsec-LOG: : seen nptype=5(id) len=12 
11:00:27 ipsec,debug IPsec-LOG: : seen nptype=8(hash) len=24 
11:00:27 ipsec,debug IPsec-LOG: : seen nptype=11(notify) len=28 
11:00:27 ipsec,debug IPsec-LOG: : succeed. 
11:00:27 ipsec,debug IPsec-LOG: : 178.114.143.232 Notify Message received 
11:00:27 ipsec IPsec-LOG: : 178.114.143.232 ignore INITIAL-CONTACT notification, because it is only accepted after phase1. 
11:00:27 ipsec,debug IPsec-LOG: : HASH received: 
11:00:27 ipsec,debug IPsec-LOG: : 570a9031 48476f8a 4dd4450b 27d04cb2 5350424c 
11:00:27 ipsec,debug IPsec-LOG: : HASH with: 
11:00:27 ipsec,debug IPsec-LOG: : 9cd71d47 6fdf2aa8 778133ea 9198f8e6 e82f35d2 a4c3cf93 25513d66 19d691e6 
11:00:27 ipsec,debug IPsec-LOG: : 1952287e 6dca91a2 d59bbc94 d3cde1ce eb4d5b05 707a40cb efd3f28d 6e38131f 
11:00:27 ipsec,debug IPsec-LOG: : db4986c6 0d65bcdf 3ce44978 7e155729 94375be9 a07adbed c27ae48e 998d44ef 
11:00:27 ipsec,debug IPsec-LOG: : 62ea75b3 1e0f3bcb 91621c73 f8e54d28 3aa45a13 67a8daeb 7471dd5d 508027ab 
11:00:27 ipsec,debug IPsec-LOG: : 69dd4185 ac099acc 6177eb0e e7e00888 c1e58354 c336c40e 96c4c016 ac206561 
11:00:27 ipsec,debug IPsec-LOG: : 40fc5859 a7442965 a59df67d 2aed8edb 40533e21 8e6b612c 6e3b50f8 3c19490d 
11:00:27 ipsec,debug IPsec-LOG: : 5f687995 a90cc9c3 3402fc14 1814dd24 4d87f9c5 c69addb4 cdac54e0 9610f325 
11:00:27 ipsec,debug IPsec-LOG: : 57f60712 e008c4c8 c4fcfe91 c1b4768d 61102e77 9f103927 b98bb6bf 30286387 
11:00:27 ipsec,debug IPsec-LOG: : fcdb57bc 9a684d5d 608fb2f7 0255c30d 12e86ac0 2795c31a d537b855 d0904c02 
11:00:27 ipsec,debug IPsec-LOG: : d463cff6 432a5fd2 dd5c1f01 187c4dfa b67f133e 5913aeba cbaf9cd9 55b53631 
11:00:27 ipsec,debug IPsec-LOG: : ebffd117 2e9a564a 11be9bc9 e6ffd2e7 393cfb72 0829bc7f fbfedfbc b4163872 
11:00:27 ipsec,debug IPsec-LOG: : 3015af2c 41259e8b b1702a85 9bfe033c 6057f601 ebf38bf7 8c688647 a7916088 
11:00:27 ipsec,debug IPsec-LOG: : baa3fa17 5a9bcda7 f8cb2cff 85dc7833 adb5a464 f4fe33ef 01dbdb40 f179b0c3 
11:00:27 ipsec,debug IPsec-LOG: : 66ff91a6 14c3dbd3 15bf7033 db6e587b c8d4c960 bfa166d0 ec005ff1 f2de0890 
11:00:27 ipsec,debug IPsec-LOG: : 0f77a7e1 2b93fa06 fa92f185 7e23dbca 9449adaf f5ba0a7f 7baecae2 c1ab57c1 
11:00:27 ipsec,debug IPsec-LOG: : 9c89753c 2408d3a4 91bc5298 a39daffe a505c219 62e2bb57 ca92b228 2d0de265 
11:00:27 ipsec,debug IPsec-LOG: : fd6aaed7 f127f924 9a2bd742 c795fc5e 00000001 00000001 000001f8 0101000e 
11:00:27 ipsec,debug IPsec-LOG: : 03000024 01010000 800b0001 800c0e10 80010007 800e0100 80030001 80020004 
11:00:27 ipsec,debug IPsec-LOG: : 8004000e 03000024 02010000 800b0001 800c0e10 80010007 800e0100 80030001 
11:00:27 ipsec,debug IPsec-LOG: : 80020002 8004000e 03000024 03010000 800b0001 800c0e10 80010007 800e0100 
11:00:27 ipsec,debug IPsec-LOG: : 80030001 80020001 8004000e 03000024 04010000 800b0001 800c0e10 80010007 
11:00:27 ipsec,debug IPsec-LOG: : 800e0100 80030001 80020006 8004000e 03000024 05010000 800b0001 800c0e10 
11:00:27 ipsec,debug IPsec-LOG: : 80010007 800e0100 80030001 80020004 80040005 03000024 06010000 800b0001 
11:00:27 ipsec,debug IPsec-LOG: : 800c0e10 80010007 800e0100 80030001 80020002 80040005 03000024 07010000 
11:00:27 ipsec,debug IPsec-LOG: : 800b0001 800c0e10 80010007 800e0100 80030001 80020001 80040005 03000024 
11:00:27 ipsec,debug IPsec-LOG: : 08010000 800b0001 800c0e10 80010007 800e0100 80030001 80020004 80040002 
11:00:27 ipsec,debug IPsec-LOG: : 03000024 09010000 800b0001 800c0e10 80010007 800e0100 80030001 80020002 
11:00:27 ipsec,debug IPsec-LOG: : 80040002 03000024 0a010000 800b0001 800c0e10 80010007 800e0100 80030001 
11:00:27 ipsec,debug IPsec-LOG: : 80020001 80040002 03000024 0b010000 800b0001 800c0e10 80010007 800e0080 
11:00:27 ipsec,debug IPsec-LOG: : 80030001 80020002 80040002 03000024 0c010000 800b0001 800c0e10 80010007 
11:00:27 ipsec,debug IPsec-LOG: : 800e0080 80030001 80020001 80040002 03000020 0d010000 800b0001 800c0e10 
11:00:27 ipsec,debug IPsec-LOG: : 80010005 80030001 80020002 80040002 00000020 0e010000 800b0001 800c0e10 
11:00:27 ipsec,debug IPsec-LOG: : 80010005 80030001 80020001 80040002 011101f4 b2728fe8 
11:00:27 ipsec,debug IPsec-LOG: : hmac(hmac_sha1) 
11:00:27 ipsec,debug IPsec-LOG: : HASH computed: 
11:00:27 ipsec,debug IPsec-LOG: : 570a9031 48476f8a 4dd4450b 27d04cb2 5350424c 
11:00:27 ipsec,debug IPsec-LOG: : HASH for PSK validated. 
11:00:27 ipsec,debug IPsec-LOG: : 178.114.143.232 peer's ID 
11:00:27 ipsec,debug IPsec-LOG: : 011101f4 b2728fe8 
11:00:27 ipsec,debug IPsec-LOG: : === 
11:00:27 ipsec,debug IPsec-LOG: : use ID type of IPv4_address 
11:00:27 ipsec,debug IPsec-LOG: : generate HASH_R 
11:00:27 ipsec,debug IPsec-LOG: : HASH with: 
11:00:27 ipsec,debug IPsec-LOG: : fcdb57bc 9a684d5d 608fb2f7 0255c30d 12e86ac0 2795c31a d537b855 d0904c02 
11:00:27 ipsec,debug IPsec-LOG: : d463cff6 432a5fd2 dd5c1f01 187c4dfa b67f133e 5913aeba cbaf9cd9 55b53631 
11:00:27 ipsec,debug IPsec-LOG: : ebffd117 2e9a564a 11be9bc9 e6ffd2e7 393cfb72 0829bc7f fbfedfbc b4163872 
11:00:27 ipsec,debug IPsec-LOG: : 3015af2c 41259e8b b1702a85 9bfe033c 6057f601 ebf38bf7 8c688647 a7916088 
11:00:27 ipsec,debug IPsec-LOG: : baa3fa17 5a9bcda7 f8cb2cff 85dc7833 adb5a464 f4fe33ef 01dbdb40 f179b0c3 
11:00:27 ipsec,debug IPsec-LOG: : 66ff91a6 14c3dbd3 15bf7033 db6e587b c8d4c960 bfa166d0 ec005ff1 f2de0890 
11:00:27 ipsec,debug IPsec-LOG: : 0f77a7e1 2b93fa06 fa92f185 7e23dbca 9449adaf f5ba0a7f 7baecae2 c1ab57c1 
11:00:27 ipsec,debug IPsec-LOG: : 9c89753c 2408d3a4 91bc5298 a39daffe a505c219 62e2bb57 ca92b228 2d0de265 
11:00:27 ipsec,debug IPsec-LOG: : 9cd71d47 6fdf2aa8 778133ea 9198f8e6 e82f35d2 a4c3cf93 25513d66 19d691e6 
11:00:27 ipsec,debug IPsec-LOG: : 1952287e 6dca91a2 d59bbc94 d3cde1ce eb4d5b05 707a40cb efd3f28d 6e38131f 
11:00:27 ipsec,debug IPsec-LOG: : db4986c6 0d65bcdf 3ce44978 7e155729 94375be9 a07adbed c27ae48e 998d44ef 
11:00:27 ipsec,debug IPsec-LOG: : 62ea75b3 1e0f3bcb 91621c73 f8e54d28 3aa45a13 67a8daeb 7471dd5d 508027ab 
11:00:27 ipsec,debug IPsec-LOG: : 69dd4185 ac099acc 6177eb0e e7e00888 c1e58354 c336c40e 96c4c016 ac206561 
11:00:27 ipsec,debug IPsec-LOG: : 40fc5859 a7442965 a59df67d 2aed8edb 40533e21 8e6b612c 6e3b50f8 3c19490d 
11:00:27 ipsec,debug IPsec-LOG: : 5f687995 a90cc9c3 3402fc14 1814dd24 4d87f9c5 c69addb4 cdac54e0 9610f325 
11:00:27 ipsec,debug IPsec-LOG: : 57f60712 e008c4c8 c4fcfe91 c1b4768d 61102e77 9f103927 b98bb6bf 30286387 
11:00:27 ipsec,debug IPsec-LOG: : 9a2bd742 c795fc5e fd6aaed7 f127f924 00000001 00000001 000001f8 0101000e 
11:00:27 ipsec,debug IPsec-LOG: : 03000024 01010000 800b0001 800c0e10 80010007 800e0100 80030001 80020004 
11:00:27 ipsec,debug IPsec-LOG: : 8004000e 03000024 02010000 800b0001 800c0e10 80010007 800e0100 80030001 
11:00:27 ipsec,debug IPsec-LOG: : 80020002 8004000e 03000024 03010000 800b0001 800c0e10 80010007 800e0100 
11:00:27 ipsec,debug IPsec-LOG: : 80030001 80020001 8004000e 03000024 04010000 800b0001 800c0e10 80010007 
11:00:27 ipsec,debug IPsec-LOG: : 800e0100 80030001 80020006 8004000e 03000024 05010000 800b0001 800c0e10 
11:00:27 ipsec,debug IPsec-LOG: : 80010007 800e0100 80030001 80020004 80040005 03000024 06010000 800b0001 
11:00:27 ipsec,debug IPsec-LOG: : 800c0e10 80010007 800e0100 80030001 80020002 80040005 03000024 07010000 
11:00:27 ipsec,debug IPsec-LOG: : 800b0001 800c0e10 80010007 800e0100 80030001 80020001 80040005 03000024 
11:00:27 ipsec,debug IPsec-LOG: : 08010000 800b0001 800c0e10 80010007 800e0100 80030001 80020004 80040002 
11:00:27 ipsec,debug IPsec-LOG: : 03000024 09010000 800b0001 800c0e10 80010007 800e0100 80030001 80020002 
11:00:27 ipsec,debug IPsec-LOG: : 80040002 03000024 0a010000 800b0001 800c0e10 80010007 800e0100 80030001 
11:00:27 ipsec,debug IPsec-LOG: : 80020001 80040002 03000024 0b010000 800b0001 800c0e10 80010007 800e0080 
11:00:27 ipsec,debug IPsec-LOG: : 80030001 80020002 80040002 03000024 0c010000 800b0001 800c0e10 80010007 
11:00:27 ipsec,debug IPsec-LOG: : 800e0080 80030001 80020001 80040002 03000020 0d010000 800b0001 800c0e10 
11:00:27 ipsec,debug IPsec-LOG: : 80010005 80030001 80020002 80040002 00000020 0e010000 800b0001 800c0e10 
11:00:27 ipsec,debug IPsec-LOG: : 80010005 80030001 80020001 80040002 011101f4 4d77f5d7 
11:00:27 ipsec,debug IPsec-LOG: : hmac(hmac_sha1) 
11:00:27 ipsec,debug IPsec-LOG: : HASH computed: 
11:00:27 ipsec,debug IPsec-LOG: : 830337ef d0f70b29 381f788a 84c049af 29c1a06b 
11:00:27 ipsec,debug IPsec-LOG: : add payload of len 8, next type 8 
11:00:27 ipsec,debug IPsec-LOG: : add payload of len 20, next type 0 
11:00:27 ipsec,debug IPsec-LOG: : begin encryption. 
11:00:27 ipsec,debug IPsec-LOG: : encryption(aes) 
11:00:27 ipsec,debug IPsec-LOG: : pad length = 12 
11:00:27 ipsec,debug IPsec-LOG: : 0800000c 011101f4 4d77f5d7 00000018 830337ef d0f70b29 381f788a 84c049af 
11:00:27 ipsec,debug IPsec-LOG: : 29c1a06b 2994fadc 8435b0cb 20dc2a0b 
11:00:27 ipsec,debug IPsec-LOG: : encryption(aes) 
11:00:27 ipsec,debug IPsec-LOG: : with key: 
11:00:27 ipsec,debug IPsec-LOG: : 446efbd0 a14ce3d2 c4f1f8d6 4fca42a5 5c533828 6ce700c0 3011bcc9 221c3821 
11:00:27 ipsec,debug IPsec-LOG: : encrypted payload by IV: 
11:00:27 ipsec,debug IPsec-LOG: : 984a7cee 33fc318f ea4a9c40 349b6004 
11:00:27 ipsec,debug IPsec-LOG: : save IV for next: 
11:00:27 ipsec,debug IPsec-LOG: : b8e82f6f f6d7eae5 e718a5b7 ac76490e 
11:00:27 ipsec,debug IPsec-LOG: : encrypted. 
11:00:27 ipsec,debug IPsec-LOG: : 76 bytes from 77.119.245.215[500] to 178.114.143.232[500] 
11:00:27 ipsec,debug IPsec-LOG: : 1 times of 76 bytes message will be sent to 178.114.143.232[500] 
11:00:27 ipsec,debug,packet IPsec-LOG: : fd6aaed7 f127f924 9a2bd742 c795fc5e 05100201 00000000 0000004c a5505f8d 
11:00:27 ipsec,debug,packet IPsec-LOG: : 2bbde794 1a086f4d 2935f301 504a6aba 40678d1c 7bc9dbfd 00123d5d b8e82f6f 
11:00:27 ipsec,debug,packet IPsec-LOG: : f6d7eae5 e718a5b7 ac76490e 
11:00:27 ipsec,info IPsec-LOG: : ISAKMP-SA established 77.119.245.215[500]-178.114.143.232[500] spi:fd6aaed7f127f924:9a2bd742c795fc5e 
11:00:27 ipsec,debug IPsec-LOG: : === 
11:00:28 ipsec,debug IPsec-LOG: : ===== received 284 bytes from 178.114.143.232[500] to 77.119.245.215[500] 
11:00:28 ipsec,debug,packet IPsec-LOG: : fd6aaed7 f127f924 9a2bd742 c795fc5e 08102001 cddf6c84 0000011c 364cc385 
11:00:28 ipsec,debug,packet IPsec-LOG: : 0b778a29 7ef61c0c 0fa0a00d a317eb62 3e4afb4d 614fe992 c57a2487 9b59e041 
11:00:28 ipsec,debug,packet IPsec-LOG: : 1a9cf473 fc8c0682 504e3596 cfafbe88 7f82a4f9 89819c87 5aa94929 fa11e9c4 
11:00:28 ipsec,debug,packet IPsec-LOG: : 279ec1e9 6abb07fb 493bc37c 017c39f0 124705cf f778abf2 86b05e2a 789f0218 
11:00:28 ipsec,debug,packet IPsec-LOG: : f07d27dd 5b40cef9 c8cbdf53 c161e294 2225fea1 945ec947 7d32ea7c 4e1e581c 
11:00:28 ipsec,debug,packet IPsec-LOG: : 61e95b75 30b3e546 a1b7f3f0 b3d107f2 b6906ba4 61109e8f 78bf1986 fa912d5a 
11:00:28 ipsec,debug,packet IPsec-LOG: : be7eaa49 349a8384 641eef1f dff5276b c2b1144b d776e073 e526c5b1 54ab8c6e 
11:00:28 ipsec,debug,packet IPsec-LOG: : 7c441be9 9e756f2b 7cbfe9c2 115a9c9f e0980524 1e8303d4 e25fb8ae 45937e7d 
11:00:28 ipsec,debug,packet IPsec-LOG: : 6ea3a9f9 345c5c0d ed89d9dc 32c709ee 10e6b07a f88be572 8998dc76 
11:00:28 ipsec,debug IPsec-LOG: : compute IV for phase2 
11:00:28 ipsec,debug IPsec-LOG: : phase1 last IV: 
11:00:28 ipsec,debug IPsec-LOG: : b8e82f6f f6d7eae5 e718a5b7 ac76490e cddf6c84 
11:00:28 ipsec,debug IPsec-LOG: : hash(sha1) 
11:00:28 ipsec,debug IPsec-LOG: : encryption(aes) 
11:00:28 ipsec,debug IPsec-LOG: : phase2 IV computed: 
11:00:28 ipsec,debug IPsec-LOG: : a1495b08 7352fc4c 478f5d48 85e1263d 
11:00:28 ipsec,debug IPsec-LOG: : === 
11:00:28 ipsec IPsec-LOG: : respond new phase 2 negotiation: 77.119.245.215[500]<=>178.114.143.232[500] 
11:00:28 ipsec,debug IPsec-LOG: : encryption(aes) 
11:00:28 ipsec,debug IPsec-LOG: : IV was saved for next processing: 
11:00:28 ipsec,debug IPsec-LOG: : 32c709ee 10e6b07a f88be572 8998dc76 
11:00:28 ipsec,debug IPsec-LOG: : encryption(aes) 
11:00:28 ipsec,debug IPsec-LOG: : with key: 
11:00:28 ipsec,debug IPsec-LOG: : 446efbd0 a14ce3d2 c4f1f8d6 4fca42a5 5c533828 6ce700c0 3011bcc9 221c3821 
11:00:28 ipsec,debug IPsec-LOG: : decrypted payload by IV: 
11:00:28 ipsec,debug IPsec-LOG: : a1495b08 7352fc4c 478f5d48 85e1263d 
11:00:28 ipsec,debug IPsec-LOG: : decrypted payload, but not trimed. 
11:00:28 ipsec,debug IPsec-LOG: : 01000018 99af6efb 808abe2c cae220b9 f751b877 3390db43 0a0000b8 00000001 
11:00:28 ipsec,debug IPsec-LOG: : 00000001 000000ac 01030406 0b6899cd 0300001c 010c0000 80010001 80020e10 
11:00:28 ipsec,debug IPsec-LOG: : 80040002 80060100 80050002 0300001c 020c0000 80010001 80020e10 80040002 
11:00:28 ipsec,debug IPsec-LOG: : 80060100 80050001 0300001c 030c0000 80010001 80020e10 80040002 80060080 
11:00:28 ipsec,debug IPsec-LOG: : 80050002 0300001c 040c0000 80010001 80020e10 80040002 80060080 80050001 
11:00:28 ipsec,debug IPsec-LOG: : 03000018 05030000 80010001 80020e10 80040002 80050002 00000018 06030000 
11:00:28 ipsec,debug IPsec-LOG: : 80010001 80020e10 80040002 80050001 05000014 aed8f8bb 3a4fffd1 685a62df 
11:00:28 ipsec,debug IPsec-LOG: : c80f3597 0500000c 0111cf8c b2728fe8 0000000c 011106a5 4d77f5d7 00000004 
11:00:28 ipsec,debug IPsec-LOG: : padding len=5 
11:00:28 ipsec,debug IPsec-LOG: : skip to trim padding. 
11:00:28 ipsec,debug IPsec-LOG: : decrypted. 
11:00:28 ipsec,debug IPsec-LOG: : fd6aaed7 f127f924 9a2bd742 c795fc5e 08102001 cddf6c84 0000011c 01000018 
11:00:28 ipsec,debug IPsec-LOG: : 99af6efb 808abe2c cae220b9 f751b877 3390db43 0a0000b8 00000001 00000001 
11:00:28 ipsec,debug IPsec-LOG: : 000000ac 01030406 0b6899cd 0300001c 010c0000 80010001 80020e10 80040002 
11:00:28 ipsec,debug IPsec-LOG: : 80060100 80050002 0300001c 020c0000 80010001 80020e10 80040002 80060100 
11:00:28 ipsec,debug IPsec-LOG: : 80050001 0300001c 030c0000 80010001 80020e10 80040002 80060080 80050002 
11:00:28 ipsec,debug IPsec-LOG: : 0300001c 040c0000 80010001 80020e10 80040002 80060080 80050001 03000018 
11:00:28 ipsec,debug IPsec-LOG: : 05030000 80010001 80020e10 80040002 80050002 00000018 06030000 80010001 
11:00:28 ipsec,debug IPsec-LOG: : 80020e10 80040002 80050001 05000014 aed8f8bb 3a4fffd1 685a62df c80f3597 
11:00:28 ipsec,debug IPsec-LOG: : 0500000c 0111cf8c b2728fe8 0000000c 011106a5 4d77f5d7 00000004 
11:00:28 ipsec,debug IPsec-LOG: : begin. 
11:00:28 ipsec,debug IPsec-LOG: : seen nptype=8(hash) len=24 
11:00:28 ipsec,debug IPsec-LOG: : seen nptype=1(sa) len=184 
11:00:28 ipsec,debug IPsec-LOG: : seen nptype=10(nonce) len=20 
11:00:28 ipsec,debug IPsec-LOG: : seen nptype=5(id) len=12 
11:00:28 ipsec,debug IPsec-LOG: : seen nptype=5(id) len=12 
11:00:28 ipsec,debug IPsec-LOG: : succeed. 
11:00:28 ipsec,debug IPsec-LOG: : received IDci2: 
11:00:28 ipsec,debug IPsec-LOG: : 0111cf8c b2728fe8 
11:00:28 ipsec,debug IPsec-LOG: : received IDcr2: 
11:00:28 ipsec,debug IPsec-LOG: : 011106a5 4d77f5d7 
11:00:28 ipsec,debug IPsec-LOG: : HASH(1) validate: 
11:00:28 ipsec,debug IPsec-LOG: : 99af6efb 808abe2c cae220b9 f751b877 3390db43 
11:00:28 ipsec,debug IPsec-LOG: : HASH with: 
11:00:28 ipsec,debug IPsec-LOG: : cddf6c84 0a0000b8 00000001 00000001 000000ac 01030406 0b6899cd 0300001c 
11:00:28 ipsec,debug IPsec-LOG: : 010c0000 80010001 80020e10 80040002 80060100 80050002 0300001c 020c0000 
11:00:28 ipsec,debug IPsec-LOG: : 80010001 80020e10 80040002 80060100 80050001 0300001c 030c0000 80010001 
11:00:28 ipsec,debug IPsec-LOG: : 80020e10 80040002 80060080 80050002 0300001c 040c0000 80010001 80020e10 
11:00:28 ipsec,debug IPsec-LOG: : 80040002 80060080 80050001 03000018 05030000 80010001 80020e10 80040002 
11:00:28 ipsec,debug IPsec-LOG: : 80050002 00000018 06030000 80010001 80020e10 80040002 80050001 05000014 
11:00:28 ipsec,debug IPsec-LOG: : aed8f8bb 3a4fffd1 685a62df c80f3597 0500000c 0111cf8c b2728fe8 0000000c 
11:00:28 ipsec,debug IPsec-LOG: : 011106a5 4d77f5d7 
11:00:28 ipsec,debug IPsec-LOG: : hmac(hmac_sha1) 
11:00:28 ipsec,debug IPsec-LOG: : HASH computed: 
11:00:28 ipsec,debug IPsec-LOG: : 99af6efb 808abe2c cae220b9 f751b877 3390db43 
11:00:28 ipsec,debug IPsec-LOG: : total SA len=180 
11:00:28 ipsec,debug IPsec-LOG: : 00000001 00000001 000000ac 01030406 0b6899cd 0300001c 010c0000 80010001 
11:00:28 ipsec,debug IPsec-LOG: : 80020e10 80040002 80060100 80050002 0300001c 020c0000 80010001 80020e10 
11:00:28 ipsec,debug IPsec-LOG: : 80040002 80060100 80050001 0300001c 030c0000 80010001 80020e10 80040002 
11:00:28 ipsec,debug IPsec-LOG: : 80060080 80050002 0300001c 040c0000 80010001 80020e10 80040002 80060080 
11:00:28 ipsec,debug IPsec-LOG: : 80050001 03000018 05030000 80010001 80020e10 80040002 80050002 00000018 
11:00:28 ipsec,debug IPsec-LOG: : 06030000 80010001 80020e10 80040002 80050001 
11:00:28 ipsec,debug IPsec-LOG: : begin. 
11:00:28 ipsec,debug IPsec-LOG: : seen nptype=2(prop) len=172 
11:00:28 ipsec,debug IPsec-LOG: : succeed. 
11:00:28 ipsec,debug IPsec-LOG: : proposal #1 len=172 
11:00:28 ipsec,debug IPsec-LOG: : begin. 
11:00:28 ipsec,debug IPsec-LOG: : seen nptype=3(trns) len=28 
11:00:28 ipsec,debug IPsec-LOG: : seen nptype=3(trns) len=28 
11:00:28 ipsec,debug IPsec-LOG: : seen nptype=3(trns) len=28 
11:00:28 ipsec,debug IPsec-LOG: : seen nptype=3(trns) len=28 
11:00:28 ipsec,debug IPsec-LOG: : seen nptype=3(trns) len=24 
11:00:28 ipsec,debug IPsec-LOG: : seen nptype=3(trns) len=24 
11:00:28 ipsec,debug IPsec-LOG: : succeed. 
11:00:28 ipsec,debug IPsec-LOG: : transform #1 len=28 
11:00:28 ipsec,debug IPsec-LOG: : type=SA Life Type, flag=0x8000, lorv=seconds 
11:00:28 ipsec,debug IPsec-LOG: : type=SA Life Duration, flag=0x8000, lorv=3600 
11:00:28 ipsec,debug IPsec-LOG: : life duration was in TLV. 
11:00:28 ipsec,debug IPsec-LOG: : type=Encryption Mode, flag=0x8000, lorv=Transport 
11:00:28 ipsec,debug IPsec-LOG: : type=Key Length, flag=0x8000, lorv=256 
11:00:28 ipsec,debug IPsec-LOG: : type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha1 
11:00:28 ipsec,debug IPsec-LOG: : transform #2 len=28 
11:00:28 ipsec,debug IPsec-LOG: : type=SA Life Type, flag=0x8000, lorv=seconds 
11:00:28 ipsec,debug IPsec-LOG: : type=SA Life Duration, flag=0x8000, lorv=3600 
11:00:28 ipsec,debug IPsec-LOG: : life duration was in TLV. 
11:00:28 ipsec,debug IPsec-LOG: : type=Encryption Mode, flag=0x8000, lorv=Transport 
11:00:28 ipsec,debug IPsec-LOG: : type=Key Length, flag=0x8000, lorv=256 
11:00:28 ipsec,debug IPsec-LOG: : type=Authentication Algorithm, flag=0x8000, lorv=hmac-md5 
11:00:28 ipsec,debug IPsec-LOG: : transform #3 len=28 
11:00:28 ipsec,debug IPsec-LOG: : type=SA Life Type, flag=0x8000, lorv=seconds 
11:00:28 ipsec,debug IPsec-LOG: : type=SA Life Duration, flag=0x8000, lorv=3600 
11:00:28 ipsec,debug IPsec-LOG: : life duration was in TLV. 
11:00:28 ipsec,debug IPsec-LOG: : type=Encryption Mode, flag=0x8000, lorv=Transport 
11:00:28 ipsec,debug IPsec-LOG: : type=Key Length, flag=0x8000, lorv=128 
11:00:28 ipsec,debug IPsec-LOG: : type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha1 
11:00:28 ipsec,debug IPsec-LOG: : transform #4 len=28 
11:00:28 ipsec,debug IPsec-LOG: : type=SA Life Type, flag=0x8000, lorv=seconds 
11:00:28 ipsec,debug IPsec-LOG: : type=SA Life Duration, flag=0x8000, lorv=3600 
11:00:28 ipsec,debug IPsec-LOG: : life duration was in TLV. 
11:00:28 ipsec,debug IPsec-LOG: : type=Encryption Mode, flag=0x8000, lorv=Transport 
11:00:28 ipsec,debug IPsec-LOG: : type=Key Length, flag=0x8000, lorv=128 
11:00:28 ipsec,debug IPsec-LOG: : type=Authentication Algorithm, flag=0x8000, lorv=hmac-md5 
11:00:28 ipsec,debug IPsec-LOG: : transform #5 len=24 
11:00:28 ipsec,debug IPsec-LOG: : type=SA Life Type, flag=0x8000, lorv=seconds 
11:00:28 ipsec,debug IPsec-LOG: : type=SA Life Duration, flag=0x8000, lorv=3600 
11:00:28 ipsec,debug IPsec-LOG: : life duration was in TLV. 
11:00:28 ipsec,debug IPsec-LOG: : type=Encryption Mode, flag=0x8000, lorv=Transport 
11:00:28 ipsec,debug IPsec-LOG: : type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha1 
11:00:28 ipsec,debug IPsec-LOG: : transform #6 len=24 
11:00:28 ipsec,debug IPsec-LOG: : type=SA Life Type, flag=0x8000, lorv=seconds 
11:00:28 ipsec,debug IPsec-LOG: : type=SA Life Duration, flag=0x8000, lorv=3600 
11:00:28 ipsec,debug IPsec-LOG: : life duration was in TLV. 
11:00:28 ipsec,debug IPsec-LOG: : type=Encryption Mode, flag=0x8000, lorv=Transport 
11:00:28 ipsec,debug IPsec-LOG: : type=Authentication Algorithm, flag=0x8000, lorv=hmac-md5 
11:00:28 ipsec,debug IPsec-LOG: : pair 1: 
11:00:28 ipsec,debug IPsec-LOG: :  0x490830: next=(nil) tnext=0x48eed8 
11:00:28 ipsec,debug IPsec-LOG: :   0x48eed8: next=(nil) tnext=0x48eef0 
11:00:28 ipsec,debug IPsec-LOG: :    0x48eef0: next=(nil) tnext=0x491990 
11:00:28 ipsec,debug IPsec-LOG: :     0x491990: next=(nil) tnext=0x4919a8 
11:00:28 ipsec,debug IPsec-LOG: :      0x4919a8: next=(nil) tnext=0x490160 
11:00:28 ipsec,debug IPsec-LOG: :       0x490160: next=(nil) tnext=(nil) 
11:00:28 ipsec,debug IPsec-LOG: : proposal #1: 6 transform 
11:00:28 ipsec,debug IPsec-LOG: : got the peer address from ID payload anonymous prefixlen=0 ul_proto=17 
11:00:28 ipsec,debug IPsec-LOG: : got the local address from ID payload 77.119.245.215[1701] prefixlen=32 ul_proto=17 
11:00:28 ipsec,debug IPsec-LOG: : updating policy address because of NAT in transport mode 
11:00:28 ipsec IPsec-LOG: : searching for policy 
11:00:28 ipsec IPsec-LOG: : template lookup for selector: 77.119.245.215:1701 ip-proto:17 <=> 178.114.143.232:53132 ip-proto:17 
11:00:28 ipsec IPsec-LOG: : generating policy 
11:00:28 ipsec,debug IPsec-LOG: :  (proto_id=ESP spisize=4 spi=00000000 spi_p=00000000 encmode=Transport reqid=25:25) 
11:00:28 ipsec,debug IPsec-LOG: :   (trns_id=AES-CBC encklen=256 authtype=hmac-sha1) 
11:00:28 ipsec,debug IPsec-LOG: :   (trns_id=AES-CBC encklen=192 authtype=hmac-sha1) 
11:00:28 ipsec,debug IPsec-LOG: :   (trns_id=AES-CBC encklen=128 authtype=hmac-sha1) 
11:00:28 ipsec,debug IPsec-LOG: :   (trns_id=3DES encklen=0 authtype=hmac-sha1) 
11:00:28 ipsec,debug IPsec-LOG: : begin compare proposals. 
11:00:28 ipsec,debug IPsec-LOG: : pair[1]: 0x490830 
11:00:28 ipsec,debug IPsec-LOG: :  0x490830: next=(nil) tnext=0x48eed8 
11:00:28 ipsec,debug IPsec-LOG: :   0x48eed8: next=(nil) tnext=0x48eef0 
11:00:28 ipsec,debug IPsec-LOG: :    0x48eef0: next=(nil) tnext=0x491990 
11:00:28 ipsec,debug IPsec-LOG: :     0x491990: next=(nil) tnext=0x4919a8 
11:00:28 ipsec,debug IPsec-LOG: :      0x4919a8: next=(nil) tnext=0x490160 
11:00:28 ipsec,debug IPsec-LOG: :       0x490160: next=(nil) tnext=(nil) 
11:00:28 ipsec,debug IPsec-LOG: : prop#=1 prot-id=ESP spi-size=4 #trns=6 trns#=1 trns-id=AES-CBC 
11:00:28 ipsec,debug IPsec-LOG: : type=SA Life Type, flag=0x8000, lorv=seconds 
11:00:28 ipsec,debug IPsec-LOG: : type=SA Life Duration, flag=0x8000, lorv=3600 
11:00:28 ipsec,debug IPsec-LOG: : type=Encryption Mode, flag=0x8000, lorv=Transport 
11:00:28 ipsec,debug IPsec-LOG: : type=Key Length, flag=0x8000, lorv=256 
11:00:28 ipsec,debug IPsec-LOG: : type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha1 
11:00:28 ipsec,debug IPsec-LOG: : prop#=1 prot-id=ESP spi-size=4 #trns=6 trns#=2 trns-id=AES-CBC 
11:00:28 ipsec,debug IPsec-LOG: : type=SA Life Type, flag=0x8000, lorv=seconds 
11:00:28 ipsec,debug IPsec-LOG: : type=SA Life Duration, flag=0x8000, lorv=3600 
11:00:28 ipsec,debug IPsec-LOG: : type=Encryption Mode, flag=0x8000, lorv=Transport 
11:00:28 ipsec,debug IPsec-LOG: : type=Key Length, flag=0x8000, lorv=256 
11:00:28 ipsec,debug IPsec-LOG: : type=Authentication Algorithm, flag=0x8000, lorv=hmac-md5 
11:00:28 ipsec,debug IPsec-LOG: : prop#=1 prot-id=ESP spi-size=4 #trns=6 trns#=3 trns-id=AES-CBC 
11:00:28 ipsec,debug IPsec-LOG: : type=SA Life Type, flag=0x8000, lorv=seconds 
11:00:28 ipsec,debug IPsec-LOG: : type=SA Life Duration, flag=0x8000, lorv=3600 
11:00:28 ipsec,debug IPsec-LOG: : type=Encryption Mode, flag=0x8000, lorv=Transport 
11:00:28 ipsec,debug IPsec-LOG: : type=Key Length, flag=0x8000, lorv=128 
11:00:28 ipsec,debug IPsec-LOG: : type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha1 
11:00:28 ipsec,debug IPsec-LOG: : prop#=1 prot-id=ESP spi-size=4 #trns=6 trns#=4 trns-id=AES-CBC 
11:00:28 ipsec,debug IPsec-LOG: : type=SA Life Type, flag=0x8000, lorv=seconds 
11:00:28 ipsec,debug IPsec-LOG: : type=SA Life Duration, flag=0x8000, lorv=3600 
11:00:28 ipsec,debug IPsec-LOG: : type=Encryption Mode, flag=0x8000, lorv=Transport 
11:00:28 ipsec,debug IPsec-LOG: : type=Key Length, flag=0x8000, lorv=128 
11:00:28 ipsec,debug IPsec-LOG: : type=Authentication Algorithm, flag=0x8000, lorv=hmac-md5 
11:00:28 ipsec,debug IPsec-LOG: : prop#=1 prot-id=ESP spi-size=4 #trns=6 trns#=5 trns-id=3DES 
11:00:28 ipsec,debug IPsec-LOG: : type=SA Life Type, flag=0x8000, lorv=seconds 
11:00:28 ipsec,debug IPsec-LOG: : type=SA Life Duration, flag=0x8000, lorv=3600 
11:00:28 ipsec,debug IPsec-LOG: : type=Encryption Mode, flag=0x8000, lorv=Transport 
11:00:28 ipsec,debug IPsec-LOG: : type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha1 
11:00:28 ipsec,debug IPsec-LOG: : prop#=1 prot-id=ESP spi-size=4 #trns=6 trns#=6 trns-id=3DES 
11:00:28 ipsec,debug IPsec-LOG: : type=SA Life Type, flag=0x8000, lorv=seconds 
11:00:28 ipsec,debug IPsec-LOG: : type=SA Life Duration, flag=0x8000, lorv=3600 
11:00:28 ipsec,debug IPsec-LOG: : type=Encryption Mode, flag=0x8000, lorv=Transport 
11:00:28 ipsec,debug IPsec-LOG: : type=Authentication Algorithm, flag=0x8000, lorv=hmac-md5 
11:00:28 ipsec,debug IPsec-LOG: : peer's single bundle: 
11:00:28 ipsec,debug IPsec-LOG: :  (proto_id=ESP spisize=4 spi=0b6899cd spi_p=00000000 encmode=Transport reqid=0:0) 
11:00:28 ipsec,debug IPsec-LOG: :   (trns_id=AES-CBC encklen=256 authtype=hmac-sha1) 
11:00:28 ipsec,debug IPsec-LOG: :   (trns_id=AES-CBC encklen=256 authtype=hmac-md5) 
11:00:28 ipsec,debug IPsec-LOG: :   (trns_id=AES-CBC encklen=128 authtype=hmac-sha1) 
11:00:28 ipsec,debug IPsec-LOG: :   (trns_id=AES-CBC encklen=128 authtype=hmac-md5) 
11:00:28 ipsec,debug IPsec-LOG: :   (trns_id=3DES encklen=0 authtype=hmac-sha1) 
11:00:28 ipsec,debug IPsec-LOG: :   (trns_id=3DES encklen=0 authtype=hmac-md5) 
11:00:28 ipsec,debug IPsec-LOG: : my single bundle: 
11:00:28 ipsec,debug IPsec-LOG: :  (proto_id=ESP spisize=4 spi=00000000 spi_p=00000000 encmode=Transport reqid=25:25) 
11:00:28 ipsec,debug IPsec-LOG: :   (trns_id=AES-CBC encklen=256 authtype=hmac-sha1) 
11:00:28 ipsec,debug IPsec-LOG: :   (trns_id=AES-CBC encklen=192 authtype=hmac-sha1) 
11:00:28 ipsec,debug IPsec-LOG: :   (trns_id=AES-CBC encklen=128 authtype=hmac-sha1) 
11:00:28 ipsec,debug IPsec-LOG: :   (trns_id=3DES encklen=0 authtype=hmac-sha1) 
11:00:28 ipsec,debug IPsec-LOG: : matched 
11:00:28 ipsec,debug IPsec-LOG: : === 
11:00:28 ipsec,debug IPsec-LOG: : call pfkey_send_getspi 83e8c470 
11:00:28 ipsec,debug IPsec-LOG: : pfkey GETSPI sent: ESP/Transport 178.114.143.232[500]->77.119.245.215[500]  
11:00:28 ipsec,debug IPsec-LOG: : pfkey getspi sent. 
11:00:28 ipsec,debug IPsec-LOG: : total SA len=48 
11:00:28 ipsec,debug IPsec-LOG: : 00000001 00000001 00000028 01030401 00000000 0000001c 010c0000 80010001 
11:00:28 ipsec,debug IPsec-LOG: : 80020e10 80040002 80060100 80050002 
11:00:28 ipsec,debug IPsec-LOG: : begin. 
11:00:28 ipsec,debug IPsec-LOG: : seen nptype=2(prop) len=40 
11:00:28 ipsec,debug IPsec-LOG: : succeed. 
11:00:28 ipsec,debug IPsec-LOG: : proposal #1 len=40 
11:00:28 ipsec,debug IPsec-LOG: : begin. 
11:00:28 ipsec,debug IPsec-LOG: : seen nptype=3(trns) len=28 
11:00:28 ipsec,debug IPsec-LOG: : succeed. 
11:00:28 ipsec,debug IPsec-LOG: : transform #1 len=28 
11:00:28 ipsec,debug IPsec-LOG: : type=SA Life Type, flag=0x8000, lorv=seconds 
11:00:28 ipsec,debug IPsec-LOG: : type=SA Life Duration, flag=0x8000, lorv=3600 
11:00:28 ipsec,debug IPsec-LOG: : life duration was in TLV. 
11:00:28 ipsec,debug IPsec-LOG: : type=Encryption Mode, flag=0x8000, lorv=Transport 
11:00:28 ipsec,debug IPsec-LOG: : type=Key Length, flag=0x8000, lorv=256 
11:00:28 ipsec,debug IPsec-LOG: : type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha1 
11:00:28 ipsec,debug IPsec-LOG: : pair 1: 
11:00:28 ipsec,debug IPsec-LOG: :  0x490160: next=(nil) tnext=(nil) 
11:00:28 ipsec,debug IPsec-LOG: : proposal #1: 1 transform 
11:00:28 ipsec,debug IPsec-LOG: : add payload of len 48, next type 10 
11:00:28 ipsec,debug IPsec-LOG: : add payload of len 24, next type 5 
11:00:28 ipsec,debug IPsec-LOG: : add payload of len 8, next type 5 
11:00:28 ipsec,debug IPsec-LOG: : add payload of len 8, next type 0 
11:00:28 ipsec,debug IPsec-LOG: : HASH with: 
11:00:28 ipsec,debug IPsec-LOG: : cddf6c84 aed8f8bb 3a4fffd1 685a62df c80f3597 0a000034 00000001 00000001 
11:00:28 ipsec,debug IPsec-LOG: : 00000028 01030401 06e14e7b 0000001c 010c0000 80010001 80020e10 80040002 
11:00:28 ipsec,debug IPsec-LOG: : 80060100 80050002 0500001c dec99646 d9c15f80 86f1fa68 1f361941 9bf3cf2b 
11:00:28 ipsec,debug IPsec-LOG: : 0e109558 0500000c 0111cf8c b2728fe8 0000000c 011106a5 4d77f5d7 
11:00:28 ipsec,debug IPsec-LOG: : hmac(hmac_sha1) 
11:00:28 ipsec,debug IPsec-LOG: : HASH computed: 
11:00:28 ipsec,debug IPsec-LOG: : 76668108 ad14fbd6 43f0c823 6fc7427a 3b0ec84f 
11:00:28 ipsec,debug IPsec-LOG: : add payload of len 20, next type 1 
11:00:28 ipsec,debug IPsec-LOG: : begin encryption. 
11:00:28 ipsec,debug IPsec-LOG: : encryption(aes) 
11:00:28 ipsec,debug IPsec-LOG: : pad length = 16 
11:00:28 ipsec,debug IPsec-LOG: : 01000018 76668108 ad14fbd6 43f0c823 6fc7427a 3b0ec84f 0a000034 00000001 
11:00:28 ipsec,debug IPsec-LOG: : 00000001 00000028 01030401 06e14e7b 0000001c 010c0000 80010001 80020e10 
11:00:28 ipsec,debug IPsec-LOG: : 80040002 80060100 80050002 0500001c dec99646 d9c15f80 86f1fa68 1f361941 
11:00:28 ipsec,debug IPsec-LOG: : 9bf3cf2b 0e109558 0500000c 0111cf8c b2728fe8 0000000c 011106a5 4d77f5d7 
11:00:28 ipsec,debug IPsec-LOG: : 01d9178a 09b3f9db 471ae623 c9fdd20f 
11:00:28 ipsec,debug IPsec-LOG: : encryption(aes) 
11:00:28 ipsec,debug IPsec-LOG: : with key: 
11:00:28 ipsec,debug IPsec-LOG: : 446efbd0 a14ce3d2 c4f1f8d6 4fca42a5 5c533828 6ce700c0 3011bcc9 221c3821 
11:00:28 ipsec,debug IPsec-LOG: : encrypted payload by IV: 
11:00:28 ipsec,debug IPsec-LOG: : 32c709ee 10e6b07a f88be572 8998dc76 
11:00:28 ipsec,debug IPsec-LOG: : save IV for next: 
11:00:28 ipsec,debug IPsec-LOG: : 94e56302 aaf2eaf5 651b7040 5c0d8849 
11:00:28 ipsec,debug IPsec-LOG: : encrypted. 
11:00:28 ipsec,debug IPsec-LOG: : 172 bytes from 77.119.245.215[500] to 178.114.143.232[500] 
11:00:28 ipsec,debug IPsec-LOG: : 1 times of 172 bytes message will be sent to 178.114.143.232[500] 
11:00:28 ipsec,debug,packet IPsec-LOG: : fd6aaed7 f127f924 9a2bd742 c795fc5e 08102001 cddf6c84 000000ac f5f20ae2 
11:00:28 ipsec,debug,packet IPsec-LOG: : 5b0ac18a dbd27534 6e3e3a9e 15c21139 ed042c9c e7020904 838a9741 e958dc41 
11:00:28 ipsec,debug,packet IPsec-LOG: : 758c3385 9c53edce d1fa04f8 ef640ba0 71db9b6b 64560077 997132c7 dd659c98 
11:00:28 ipsec,debug,packet IPsec-LOG: : 6968fa4e ce38250e 436acb11 98c98f95 5034102b 700b5f36 5a71388c 61740ebf 
11:00:28 ipsec,debug,packet IPsec-LOG: : 7f1b92b3 f109bb85 0793294d 76153c1c 317c71b8 a5404499 48f7d684 94e56302 
11:00:28 ipsec,debug,packet IPsec-LOG: : aaf2eaf5 651b7040 5c0d8849 
11:00:28 ipsec IPsec-LOG: : sent phase2 packet 77.119.245.215[500]<=>178.114.143.232[500] fd6aaed7f127f924:9a2bd742c795fc5e:cddf6c84 
11:00:28 ipsec,debug IPsec-LOG: : ===== received 60 bytes from 178.114.143.232[500] to 77.119.245.215[500] 
11:00:28 ipsec,debug,packet IPsec-LOG: : fd6aaed7 f127f924 9a2bd742 c795fc5e 08102001 cddf6c84 0000003c 45525e5f 
11:00:28 ipsec,debug,packet IPsec-LOG: : 9e5714ec bb0052de 1dcbcb37 6486d3a6 11757e5a 0b4e765d 10ccec62 
11:00:28 ipsec,debug IPsec-LOG: : encryption(aes) 
11:00:28 ipsec,debug IPsec-LOG: : IV was saved for next processing: 
11:00:28 ipsec,debug IPsec-LOG: : 6486d3a6 11757e5a 0b4e765d 10ccec62 
11:00:28 ipsec,debug IPsec-LOG: : encryption(aes) 
11:00:28 ipsec,debug IPsec-LOG: : with key: 
11:00:28 ipsec,debug IPsec-LOG: : 446efbd0 a14ce3d2 c4f1f8d6 4fca42a5 5c533828 6ce700c0 3011bcc9 221c3821 
11:00:28 ipsec,debug IPsec-LOG: : decrypted payload by IV: 
11:00:28 ipsec,debug IPsec-LOG: : 94e56302 aaf2eaf5 651b7040 5c0d8849 
11:00:28 ipsec,debug IPsec-LOG: : decrypted payload, but not trimed. 
11:00:28 ipsec,debug IPsec-LOG: : 00000018 2c1cdf3b 90be7fb1 feed8b1c cbd1b2a7 f665b0c2 00000000 00000008 
11:00:28 ipsec,debug IPsec-LOG: : padding len=9 
11:00:28 ipsec,debug IPsec-LOG: : skip to trim padding. 
11:00:28 ipsec,debug IPsec-LOG: : decrypted. 
11:00:28 ipsec,debug IPsec-LOG: : fd6aaed7 f127f924 9a2bd742 c795fc5e 08102001 cddf6c84 0000003c 00000018 
11:00:28 ipsec,debug IPsec-LOG: : 2c1cdf3b 90be7fb1 feed8b1c cbd1b2a7 f665b0c2 00000000 00000008 
11:00:28 ipsec,debug IPsec-LOG: : begin. 
11:00:28 ipsec,debug IPsec-LOG: : seen nptype=8(hash) len=24 
11:00:28 ipsec,debug IPsec-LOG: : succeed. 
11:00:28 ipsec,debug IPsec-LOG: : HASH(3) validate: 
11:00:28 ipsec,debug IPsec-LOG: : 2c1cdf3b 90be7fb1 feed8b1c cbd1b2a7 f665b0c2 
11:00:28 ipsec,debug IPsec-LOG: : HASH with:  
11:00:28 ipsec,debug IPsec-LOG: : 00cddf6c 84aed8f8 bb3a4fff d1685a62 dfc80f35 97dec996 46d9c15f 8086f1fa 
11:00:28 ipsec,debug IPsec-LOG: : 681f3619 419bf3cf 2b0e1095 58 
11:00:28 ipsec,debug IPsec-LOG: : hmac(hmac_sha1) 
11:00:28 ipsec,debug IPsec-LOG: : HASH computed: 
11:00:28 ipsec,debug IPsec-LOG: : 2c1cdf3b 90be7fb1 feed8b1c cbd1b2a7 f665b0c2 
11:00:28 ipsec,debug IPsec-LOG: : === 
11:00:28 ipsec,debug IPsec-LOG: : KEYMAT compute with 
11:00:28 ipsec,debug IPsec-LOG: : 0306e14e 7baed8f8 bb3a4fff d1685a62 dfc80f35 97dec996 46d9c15f 8086f1fa 
11:00:28 ipsec,debug IPsec-LOG: : 681f3619 419bf3cf 2b0e1095 58 
11:00:28 ipsec,debug IPsec-LOG: : hmac(hmac_sha1) 
11:00:28 ipsec,debug IPsec-LOG: : encryption(aes-cbc) 
11:00:28 ipsec,debug IPsec-LOG: : hmac(sha1) 
11:00:28 ipsec,debug IPsec-LOG: : encklen=256 authklen=160 
11:00:28 ipsec,debug IPsec-LOG: : generating 640 bits of key (dupkeymat=4) 
11:00:28 ipsec,debug IPsec-LOG: : generating K1...K4 for KEYMAT. 
11:00:28 ipsec,debug IPsec-LOG: : hmac(hmac_sha1) 
11:00:28 ipsec,debug IPsec-LOG: : hmac(hmac_sha1) 
11:00:28 ipsec,debug IPsec-LOG: : hmac(hmac_sha1) 
11:00:28 ipsec,debug IPsec-LOG: : e7eef71d 382ffd23 d1bb24dd eebeb6ac 9f5bbb6a a0f50ae2 1025bf6f 63b839eb 
11:00:28 ipsec,debug IPsec-LOG: : d227a535 9ae4503c ae29c985 ea344ce9 ddc8f9bf adc18922 804e6251 a5dc2789 
11:00:28 ipsec,debug IPsec-LOG: : 04510ebf 013596fb a5c68b08 86e45ac4 
11:00:28 ipsec,debug IPsec-LOG: : KEYMAT compute with 
11:00:28 ipsec,debug IPsec-LOG: : 030b6899 cdaed8f8 bb3a4fff d1685a62 dfc80f35 97dec996 46d9c15f 8086f1fa 
11:00:28 ipsec,debug IPsec-LOG: : 681f3619 419bf3cf 2b0e1095 58 
11:00:28 ipsec,debug IPsec-LOG: : hmac(hmac_sha1) 
11:00:28 ipsec,debug IPsec-LOG: : encryption(aes-cbc) 
11:00:28 ipsec,debug IPsec-LOG: : hmac(sha1) 
11:00:28 ipsec,debug IPsec-LOG: : encklen=256 authklen=160 
11:00:28 ipsec,debug IPsec-LOG: : generating 640 bits of key (dupkeymat=4) 
11:00:28 ipsec,debug IPsec-LOG: : generating K1...K4 for KEYMAT. 
11:00:28 ipsec,debug IPsec-LOG: : hmac(hmac_sha1) 
11:00:28 ipsec,debug IPsec-LOG: : hmac(hmac_sha1) 
11:00:28 ipsec,debug IPsec-LOG: : hmac(hmac_sha1) 
11:00:28 ipsec,debug IPsec-LOG: : e7912dda 4f540498 067c4f30 6201c7bc 31ad5f07 04c135ec 411b0780 12e3d029 
11:00:28 ipsec,debug IPsec-LOG: : e84dc499 9d4466fc 6a27153c 8731bba1 431c9214 7507f79b 74e1a4f6 7733c4b6 
11:00:28 ipsec,debug IPsec-LOG: : 19e152c6 fde2bea4 5af47547 d5b72c11 
11:00:28 ipsec,debug IPsec-LOG: : KEYMAT computed. 
11:00:28 ipsec,debug IPsec-LOG: : call pk_sendupdate 
11:00:28 ipsec,debug IPsec-LOG: : encryption(aes-cbc) 
11:00:28 ipsec,debug IPsec-LOG: : hmac(sha1) 
11:00:28 ipsec,debug IPsec-LOG: : call pfkey_send_update_nat 
11:00:28 ipsec IPsec-LOG: : IPsec-SA established: ESP/Transport 178.114.143.232[500]->77.119.245.215[500] spi=0x6e14e7b 
11:00:28 ipsec,debug IPsec-LOG: : pfkey update sent. 
11:00:28 ipsec,debug IPsec-LOG: : encryption(aes-cbc) 
11:00:28 ipsec,debug IPsec-LOG: : hmac(sha1) 
11:00:28 ipsec,debug IPsec-LOG: : call pfkey_send_add_nat 
11:00:28 ipsec IPsec-LOG: : IPsec-SA established: ESP/Transport 77.119.245.215[500]->178.114.143.232[500] spi=0xb6899cd 
11:00:28 ipsec,debug IPsec-LOG: : pfkey add sent. 
11:00:48 ipsec,debug IPsec-LOG: : ===== received 76 bytes from 178.114.143.232[500] to 77.119.245.215[500] 
11:00:48 ipsec,debug,packet IPsec-LOG: : fd6aaed7 f127f924 9a2bd742 c795fc5e 08100501 116f602e 0000004c 4a2af0f5 
11:00:48 ipsec,debug,packet IPsec-LOG: : e7a4ae8a 2b0a497b 969c141f b235f273 18e34864 d13fe413 8c4608a7 e835238c 
11:00:48 ipsec,debug,packet IPsec-LOG: : 7ca1a540 1a5e927a be8b0e6e 
11:00:48 ipsec IPsec-LOG: : receive Information. 
11:00:48 ipsec,debug IPsec-LOG: : compute IV for phase2 
11:00:48 ipsec,debug IPsec-LOG: : phase1 last IV: 
11:00:48 ipsec,debug IPsec-LOG: : b8e82f6f f6d7eae5 e718a5b7 ac76490e 116f602e 
11:00:48 ipsec,debug IPsec-LOG: : hash(sha1) 
11:00:48 ipsec,debug IPsec-LOG: : encryption(aes) 
11:00:48 ipsec,debug IPsec-LOG: : phase2 IV computed: 
11:00:48 ipsec,debug IPsec-LOG: : 3c837c22 b05bafc8 b9b76086 28c1d6ea 
11:00:48 ipsec,debug IPsec-LOG: : encryption(aes) 
11:00:48 ipsec,debug IPsec-LOG: : IV was saved for next processing: 
11:00:48 ipsec,debug IPsec-LOG: : e835238c 7ca1a540 1a5e927a be8b0e6e 
11:00:48 ipsec,debug IPsec-LOG: : encryption(aes) 
11:00:48 ipsec,debug IPsec-LOG: : with key: 
11:00:48 ipsec,debug IPsec-LOG: : 446efbd0 a14ce3d2 c4f1f8d6 4fca42a5 5c533828 6ce700c0 3011bcc9 221c3821 
11:00:48 ipsec,debug IPsec-LOG: : decrypted payload by IV: 
11:00:48 ipsec,debug IPsec-LOG: : 3c837c22 b05bafc8 b9b76086 28c1d6ea 
11:00:48 ipsec,debug IPsec-LOG: : decrypted payload, but not trimed. 
11:00:48 ipsec,debug IPsec-LOG: : 0c000018 5f2ca690 fa4425b4 c3062298 464335e8 2e9419be 00000010 00000001 
11:00:48 ipsec,debug IPsec-LOG: : 03040001 0b6899cd 00000000 00000008 
11:00:48 ipsec,debug IPsec-LOG: : padding len=9 
11:00:48 ipsec,debug IPsec-LOG: : skip to trim padding. 
11:00:48 ipsec,debug IPsec-LOG: : decrypted. 
11:00:48 ipsec,debug IPsec-LOG: : fd6aaed7 f127f924 9a2bd742 c795fc5e 08100501 116f602e 0000004c 0c000018 
11:00:48 ipsec,debug IPsec-LOG: : 5f2ca690 fa4425b4 c3062298 464335e8 2e9419be 00000010 00000001 03040001 
11:00:48 ipsec,debug IPsec-LOG: : 0b6899cd 00000000 00000008 
11:00:48 ipsec,debug IPsec-LOG: : HASH with: 
11:00:48 ipsec,debug IPsec-LOG: : 116f602e 00000010 00000001 03040001 0b6899cd 
11:00:48 ipsec,debug IPsec-LOG: : hmac(hmac_sha1) 
11:00:48 ipsec,debug IPsec-LOG: : HASH computed: 
11:00:48 ipsec,debug IPsec-LOG: : 5f2ca690 fa4425b4 c3062298 464335e8 2e9419be 
11:00:48 ipsec,debug IPsec-LOG: : hash validated. 
11:00:48 ipsec,debug IPsec-LOG: : begin. 
11:00:48 ipsec,debug IPsec-LOG: : seen nptype=8(hash) len=24 
11:00:48 ipsec,debug IPsec-LOG: : seen nptype=12(delete) len=16 
11:00:48 ipsec,debug IPsec-LOG: : succeed. 
11:00:48 ipsec,debug IPsec-LOG: : 178.114.143.232 delete payload for protocol ESP 
11:00:48 ipsec IPsec-LOG: : purged IPsec-SA proto_id=ESP spi=0xb6899cd 
11:00:48 ipsec IPsec-LOG: : purged IPsec-SA proto_id=ESP spi=0x6e14e7b 
11:00:48 ipsec,debug IPsec-LOG: : an undead schedule has been deleted. 
11:00:48 ipsec IPsec-LOG: : removing generated policy 
11:00:48 ipsec,debug IPsec-LOG: : purged SAs. 
11:00:48 ipsec,debug IPsec-LOG: : ===== received 92 bytes from 178.114.143.232[500] to 77.119.245.215[500] 
11:00:48 ipsec,debug,packet IPsec-LOG: : fd6aaed7 f127f924 9a2bd742 c795fc5e 08100501 42bb9705 0000005c 4e40b1b6 
11:00:48 ipsec,debug,packet IPsec-LOG: : 1d092df6 d84f88e1 f238d112 65def46f cbb57499 5dcb79e7 2003a510 48f3306f 
11:00:48 ipsec,debug,packet IPsec-LOG: : ee3c85a1 f3687146 2acb855b ea34c1dc 659991ed c178d8ff ce229a1b 
11:00:48 ipsec IPsec-LOG: : receive Information. 
11:00:48 ipsec,debug IPsec-LOG: : compute IV for phase2 
11:00:48 ipsec,debug IPsec-LOG: : phase1 last IV: 
11:00:48 ipsec,debug IPsec-LOG: : b8e82f6f f6d7eae5 e718a5b7 ac76490e 42bb9705 
11:00:48 ipsec,debug IPsec-LOG: : hash(sha1) 
11:00:48 ipsec,debug IPsec-LOG: : encryption(aes) 
11:00:48 ipsec,debug IPsec-LOG: : phase2 IV computed: 
11:00:48 ipsec,debug IPsec-LOG: : b8b8b117 f8b942f2 7ad53879 ac2869a6 
11:00:48 ipsec,debug IPsec-LOG: : encryption(aes) 
11:00:48 ipsec,debug IPsec-LOG: : IV was saved for next processing: 
11:00:48 ipsec,debug IPsec-LOG: : ea34c1dc 659991ed c178d8ff ce229a1b 
11:00:48 ipsec,debug IPsec-LOG: : encryption(aes) 
11:00:48 ipsec,debug IPsec-LOG: : with key: 
11:00:48 ipsec,debug IPsec-LOG: : 446efbd0 a14ce3d2 c4f1f8d6 4fca42a5 5c533828 6ce700c0 3011bcc9 221c3821 
11:00:48 ipsec,debug IPsec-LOG: : decrypted payload by IV: 
11:00:48 ipsec,debug IPsec-LOG: : b8b8b117 f8b942f2 7ad53879 ac2869a6 
11:00:48 ipsec,debug IPsec-LOG: : decrypted payload, but not trimed. 
11:00:48 ipsec,debug IPsec-LOG: : 0c000018 d63f5be6 87ad4297 733f1631 3631ce26 79d9ead6 0000001c 00000001 
11:00:48 ipsec,debug IPsec-LOG: : 01100001 fd6aaed7 f127f924 9a2bd742 c795fc5e 00000000 00000000 0000000c 
11:00:48 ipsec,debug IPsec-LOG: : padding len=13 
11:00:48 ipsec,debug IPsec-LOG: : skip to trim padding. 
11:00:48 ipsec,debug IPsec-LOG: : decrypted. 
11:00:48 ipsec,debug IPsec-LOG: : fd6aaed7 f127f924 9a2bd742 c795fc5e 08100501 42bb9705 0000005c 0c000018 
11:00:48 ipsec,debug IPsec-LOG: : d63f5be6 87ad4297 733f1631 3631ce26 79d9ead6 0000001c 00000001 01100001 
11:00:48 ipsec,debug IPsec-LOG: : fd6aaed7 f127f924 9a2bd742 c795fc5e 00000000 00000000 0000000c 
11:00:48 ipsec,debug IPsec-LOG: : HASH with: 
11:00:48 ipsec,debug IPsec-LOG: : 42bb9705 0000001c 00000001 01100001 fd6aaed7 f127f924 9a2bd742 c795fc5e 
11:00:48 ipsec,debug IPsec-LOG: : hmac(hmac_sha1) 
11:00:48 ipsec,debug IPsec-LOG: : HASH computed: 
11:00:48 ipsec,debug IPsec-LOG: : d63f5be6 87ad4297 733f1631 3631ce26 79d9ead6 
11:00:48 ipsec,debug IPsec-LOG: : hash validated. 
11:00:48 ipsec,debug IPsec-LOG: : begin. 
11:00:48 ipsec,debug IPsec-LOG: : seen nptype=8(hash) len=24 
11:00:48 ipsec,debug IPsec-LOG: : seen nptype=12(delete) len=28 
11:00:48 ipsec,debug IPsec-LOG: : succeed. 
11:00:48 ipsec,debug IPsec-LOG: : 178.114.143.232 delete payload for protocol ISAKMP 
11:00:48 ipsec,info IPsec-LOG: : purging ISAKMP-SA 77.119.245.215[500]<=>178.114.143.232[500] spi=fd6aaed7f127f924:9a2bd742c795fc5e. 
11:00:48 ipsec IPsec-LOG: : purged ISAKMP-SA 77.119.245.215[500]<=>178.114.143.232[500] spi=fd6aaed7f127f924:9a2bd742c795fc5e. 
11:00:48 ipsec,debug IPsec-LOG: : purged SAs. 
11:00:49 ipsec,info IPsec-LOG: : ISAKMP-SA deleted 77.119.245.215[500]-178.114.143.232[500] spi:fd6aaed7f127f924:9a2bd742c795fc5e rekey:1 
11:00:49 ipsec,debug IPsec-LOG: : an undead schedule has been deleted.

According to logs, tunnel is established successfully and then right after that client sends to delete SAs and tunnel closes. You should check on the client side where the problem is.

My client is an iPhone 7 with iOS 10.3.1. When the iPhone is connected to my LAN via WiFi, I can connect to the server. When I use LTE/3G I get this error. I am also unable to establish a connection from my MacBook when I’m using the mobile hotspot on my iPhone. Could this mean that there is a problem with the iPhone or could this be a problem of the LTE/3g service provider (Drei)?

look in macbook logs to see why it closes connection.

This is all I get…

Wed Apr  5 12:07:51 2017 : publish_entry SCDSet() failed: Success!
Wed Apr  5 12:07:51 2017 : publish_entry SCDSet() failed: Success!
Wed Apr  5 12:07:51 2017 : l2tp_get_router_address
Wed Apr  5 12:07:51 2017 : l2tp_get_router_address 172.20.10.1 from dict 1
Wed Apr  5 12:07:51 2017 : L2TP connecting to server '77.119.245.215' (77.119.245.215)...
Wed Apr  5 12:07:51 2017 : IPSec connection started
Wed Apr  5 12:07:51 2017 : IPSec phase 1 client started
Wed Apr  5 12:07:51 2017 : IPSec phase 1 server replied
Wed Apr  5 12:08:21 2017 : IPSec connection failed

I have also tried a different iPhone with a SIM card from a different mobile provider (T-Mobile) as hotspot. The result is the same. I’m also unable to establish a VPN connection directly on the both iPhones (Drei and T-Mobile)
From my pov, it’s either is an error in iOS 10 or there is a weird error in my configuration or there is something wrong in ROS. Do you have anymore ideas?

  1. Turn on NAT Traversal for the peer (/ip ipsec peer) that is being hit by the device.
  2. Like above, you are almost certainly being NAT’d by the carrier to get to the IPv4 Internet when on LTE. The T-Mobile device should for sure be on IPv6 only w/some form of NAT to get you to the IPv4 Internet. Even with NAT-T enabled you may still need to use a DNS A record to get to your IPv4 public address (to pass through a NAT64 / DNS64 device).
  3. An alternative and exactly what I am doing more and more, ditch NAT, NAT-T, and all of it’s headaches. Enable IPv6 if it is not on your edge, if you can’t get native IPv6 from your upstream get a tunnel, and connect your VPN up to the IPv6 peer.

3 is the best option, it is the most stable solution when looking into the future and relies on fewer hopes and dreams to keep working.

NAT-T is on

The T-Mobile device was just a private device for the test. The main carrier is Hutchinson-Austria (Drei), they do not offer any form of IPv6 at the moment.

Do you mean I should reconfigure the whole network of my client to IPv6?

Thanks for the quick reply. The reason I asked about NAT-T is the configuration you posted doesn’t have it set and the default is “no.” You may want to triple check that.

Do you mean I should reconfigure the whole network of my client to IPv6?

This is actually a common misunderstanding with how to deploy IPv6. What is super cool in my mind is we can use the tunneling technologies we are all so familiar to move our networks around over IPv6 tunnels. In other words the tunnel is done in and over IPv6 while the traffic being encapsulated is all IPv4. This typically means IPv6 only has to be deployed to a very small amount of devices starting at the Internet edge.

Hmm, you are right. It’s not in the config, but it’s on winbox. I’ll recreate it tomorrow via terminal. Tomorrow I will also put the L2TP configuration at another clients router, who has the same LTE provider, to check if there is an error on the providers side or if this is an general thing there.

Do you mean I should reconfigure the whole network of my client to IPv6?


This sounds very interesting. Can you please tell me, or point me in the right direction, where I can inform myself quickly on how to understand this, so I can put this in good use?

No worries, let me know what you find w/the NAT-T setting.

As far as IPv4 over / through IPv6 I can’t think of any single point of documentation but I can tell you that it works just fine. I use GRE with IPSec over IPv6 where the GRE tunnel has an IPv4 RFC1918 address but connects via IPv6. Start simple without encryption and the variables it introduces.

When using GRE to encapsulate the IPv4 packets you can run IPSec in either tunnel or transport mode. I recommend transport mode to save the 40 bytes that are basically duplicated. If you use IPSec to encapsulate the packets you will need to run tunnel mode to allow it to layer an IPv6 header on top of the encapsulated IPv4 packet.

Here is a very simple drawing of how you could connect 2 sites and transport IPv4 over an IPv6 GRE tunnel.
MikroTik Forums IPv4 over IPv6 - GRE.png
A challenge for me would be to setup a road-warrior VPN like you are trying to do but use IPv6 in tunnel mode and deliver IPv4 to the remote client. Sounds like I have a project for tonight.