Community discussions

MikroTik App
 
aaronw
just joined
Topic Author
Posts: 13
Joined: Thu Feb 26, 2009 7:30 am

Problems with IPSec and Android

Sat Dec 12, 2015 1:14 pm

Hi all,

I have been struggling to get IPSec to work between my Android devices and my Mikrotik router which is now running 6.33.3. I have followed the directions on the IPSEC wiki page without any luck as well as this page:

http://www.firstdigest.com/2015/01/mikr ... e-clients/

I have tried using both L2TP with a pre-shared key as well as xauth with a pre-shared key. I'm not getting anywhere with either mode.

Here are all of my IPSec settings:

/ip ipsec proposal> print
Flags: X - disabled, * - default
0 * name="default" auth-algorithms=sha1,sha256,sha512 enc-algorithms=3des,aes-128-cbc,aes-256-cbc
lifetime=1h pfs-group=none

1 name="l2tp-ipsec-proposal" auth-algorithms=sha1 enc-algorithms=3des,aes-128-cbc lifetime=1h
pfs-group=none

2 name="ipsec-modp1024" auth-algorithms=sha1,sha256,sha512
enc-algorithms=3des,aes-128-cbc,aes-256-cbc lifetime=30m pfs-group=modp1024

/ip ipsec peer> print
Flags: X - disabled, D - dynamic
0 address=0.0.0.0/0 local-address=0.0.0.0 passive=yes port=500 auth-method=pre-shared-key-xauth
secret="xxxxxxxx" xauth-login="aaronw" xauth-password="yyyyyyyyyy"
generate-policy=port-strict policy-template-group=default exchange-mode=main
send-initial-contact=yes nat-traversal=yes proposal-check=obey hash-algorithm=sha1
enc-algorithm=3des,aes-128,aes-256 dh-group=modp1024 lifetime=1d lifebytes=0
dpd-interval=2m dpd-maximum-failures=5

1 address=0.0.0.0/32 local-address=0.0.0.0 passive=yes port=500 auth-method=pre-shared-key
secret="xxxxxxxxxxxx" generate-policy=port-override policy-template-group=default
exchange-mode=main-l2tp mode-config=ipsec-config send-initial-contact=yes nat-traversal=yes
hash-algorithm=sha1 enc-algorithm=3des,aes-256 dh-group=modp1024 lifetime=1d
dpd-interval=2m dpd-maximum-failures=5

/ip ipsec> policy print
Flags: T - template, X - disabled, D - dynamic, I - inactive, * - default
0 T * group=default src-address=::/0 dst-address=::/0 protocol=all proposal=l2tp-ipsec-proposal
template=yes

1 T group=default src-address=::/0 dst-address=::/0 protocol=all proposal=default template=yes
/ip ipsec> user print
# NAME PASSWORD ADDRESS
0 aaron *********

With xauth authentication I get the error: unknown Informational exchange received.

02:32:46 ipsec,debug,packet ==========
02:32:46 ipsec,debug,packet 476 bytes message received from 70.214.6.78[12476] to xxx.yyy.zzz.89[500]
02:32:46 ipsec,debug,packet 49b17bd7 28fb043c 00000000 00000000 01100200 00000000 000001dc 0d000124
02:32:46 ipsec,debug,packet 00000001 00000001 00000118 01010008 03000024 01010000 800b0001 800c7080
02:32:46 ipsec,debug,packet 80010007 800e0100 8003fde9 80020002 80040002 03000024 02010000 800b0001
02:32:46 ipsec,debug,packet 800c7080 80010007 800e0100 8003fde9 80020001 80040002 03000024 03010000
02:32:46 ipsec,debug,packet 800b0001 800c7080 80010007 800e0080 8003fde9 80020002 80040002 03000024
02:32:46 ipsec,debug,packet 04010000 800b0001 800c7080 80010007 800e0080 8003fde9 80020001 80040002
02:32:46 ipsec,debug,packet 03000020 05010000 800b0001 800c7080 80010005 8003fde9 80020002 80040002
02:32:46 ipsec,debug,packet 03000020 06010000 800b0001 800c7080 80010005 8003fde9 80020001 80040002
02:32:46 ipsec,debug,packet 03000020 07010000 800b0001 800c7080 80010001 8003fde9 80020002 80040002
02:32:46 ipsec,debug,packet 00000020 08010000 800b0001 800c7080 80010001 8003fde9 80020001 80040002
02:32:46 ipsec,debug,packet 0d000014 4a131c81 07035845 5c5728f2 0e95452f 0d000014 cd604643 35df21f8
02:32:46 ipsec,debug,packet 7cfdb2fc 68b6a448 0d000014 90cb8091 3ebb696e 086381b5 ec427b1f 0d000014
02:32:46 ipsec,debug,packet 4485152d 18b6bbcd 0be8a846 9579ddcc 0d00000c 09002689 dfd6b712 0d000014
02:32:46 ipsec,debug,packet 12f5f28c 457168a9 702d9fe2 74cc0100 0d000018 4048b7d5 6ebce885 25e7de7f
02:32:46 ipsec,debug,packet 00d6c2d3 80000000 00000014 afcad713 68a1f1c9 6b8696fc 77570100
02:32:46 ipsec,debug,packet ===
02:32:46 ipsec,debug,packet begin.
02:32:46 ipsec,debug,packet seen nptype=1(sa)
02:32:46 ipsec,debug,packet seen nptype=13(vid)
02:32:46 ipsec,debug,packet seen nptype=13(vid)
02:32:46 ipsec,debug,packet seen nptype=13(vid)
02:32:46 ipsec,debug,packet seen nptype=13(vid)
02:32:46 ipsec,debug,packet seen nptype=13(vid)
02:32:46 ipsec,debug,packet seen nptype=13(vid)
02:32:46 ipsec,debug,packet seen nptype=13(vid)
02:32:46 ipsec,debug,packet seen nptype=13(vid)
02:32:46 ipsec,debug,packet succeed.
02:32:46 ipsec,debug received Vendor ID: RFC 3947
02:32:46 ipsec,debug received Vendor ID: draft-ietf-ipsec-nat-t-ike-02
02:32:46 ipsec,debug received Vendor ID: draft-ietf-ipsec-nat-t-ike-02
02:32:46 ipsec,debug
02:32:46 ipsec,debug received Vendor ID: draft-ietf-ipsec-nat-t-ike-00
02:32:46 ipsec,debug received Vendor ID: draft-ietf-ipsra-isakmp-xauth-06.txt
02:32:46 ipsec,debug received Vendor ID: CISCO-UNITY
02:32:46 ipsec,debug received broken Microsoft ID: FRAGMENTATION
02:32:46 ipsec,debug received Vendor ID: DPD
02:32:46 ipsec,debug,packet remote supports DPD
02:32:46 ipsec,debug Selected NAT-T version: RFC 3947
02:32:46 ipsec,debug,packet total SA len=288
02:32:46 ipsec,debug,packet 00000001 00000001 00000118 01010008 03000024 01010000 800b0001 800c7080
02:32:46 ipsec,debug,packet 80010007 800e0100 8003fde9 80020002 80040002 03000024 02010000 800b0001
02:32:46 ipsec,debug,packet 800c7080 80010007 800e0100 8003fde9 80020001 80040002 03000024 03010000
02:32:46 ipsec,debug,packet 800b0001 800c7080 80010007 800e0080 8003fde9 80020002 80040002 03000024
02:32:46 ipsec,debug,packet 04010000 800b0001 800c7080 80010007 800e0080 8003fde9 80020001 80040002
02:32:46 ipsec,debug,packet 03000020 05010000 800b0001 800c7080 80010005 8003fde9 80020002 80040002
02:32:46 ipsec,debug,packet 03000020 06010000 800b0001 800c7080 80010005 8003fde9 80020001 80040002
02:32:46 ipsec,debug,packet 03000020 07010000 800b0001 800c7080 80010001 8003fde9 80020002 80040002
02:32:46 ipsec,debug,packet 00000020 08010000 800b0001 800c7080 80010001 8003fde9 80020001 80040002
02:32:46 ipsec,debug,packet begin.
02:32:46 ipsec,debug,packet seen nptype=2(prop)
02:32:46 ipsec,debug,packet succeed.
02:32:46 ipsec,debug,packet proposal #1 len=280
02:32:46 ipsec,debug,packet begin.
02:32:46 ipsec,debug,packet seen nptype=3(trns)
02:32:46 ipsec,debug,packet seen nptype=3(trns)
02:32:46 ipsec,debug,packet seen nptype=3(trns)
02:32:46 ipsec,debug,packet seen nptype=3(trns)
02:32:46 ipsec,debug,packet seen nptype=3(trns)
02:32:46 ipsec,debug,packet seen nptype=3(trns)
02:32:46 ipsec,debug,packet seen nptype=3(trns)
02:32:46 ipsec,debug,packet seen nptype=3(trns)
02:32:46 ipsec,debug,packet succeed.
02:32:46 ipsec,debug,packet transform #1 len=36
02:32:46 ipsec,debug,packet type=Life Type, flag=0x8000, lorv=seconds
02:32:46 ipsec,debug,packet type=Life Duration, flag=0x8000, lorv=28800
02:32:46 ipsec,debug,packet type=Encryption Algorithm, flag=0x8000, lorv=AES-CBC
02:32:46 ipsec,debug,packet encryption(aes)
02:32:46 ipsec,debug,packet type=Key Length, flag=0x8000, lorv=256
02:32:46 ipsec,debug,packet type=Authentication Method, flag=0x8000, lorv=GSS-API on Kerberos 5
02:32:46 ipsec,debug,packet type=Hash Algorithm, flag=0x8000, lorv=SHA
02:32:46 ipsec,debug,packet hash(sha1)
02:32:46 ipsec,debug,packet type=Group Description, flag=0x8000, lorv=1024-bit MODP group
02:32:46 ipsec,debug,packet dh(modp1024)
02:32:46 ipsec,debug,packet transform #2 len=36
02:32:46 ipsec,debug,packet type=Life Type, flag=0x8000, lorv=seconds
02:32:46 ipsec,debug,packet type=Life Duration, flag=0x8000, lorv=28800
02:32:46 ipsec,debug,packet type=Encryption Algorithm, flag=0x8000, lorv=AES-CBC
02:32:46 ipsec,debug,packet encryption(aes)
02:32:46 ipsec,debug,packet type=Key Length, flag=0x8000, lorv=256
02:32:46 ipsec,debug,packet type=Authentication Method, flag=0x8000, lorv=GSS-API on Kerberos 5
02:32:46 ipsec,debug,packet type=Hash Algorithm, flag=0x8000, lorv=MD5
02:32:46 ipsec,debug,packet hash(md5)
02:32:46 ipsec,debug,packet type=Group Description, flag=0x8000, lorv=1024-bit MODP group
02:32:46 ipsec,debug,packet dh(modp1024)
02:32:46 ipsec,debug,packet transform #3 len=36
02:32:46 ipsec,debug,packet type=Life Type, flag=0x8000, lorv=seconds
02:32:46 ipsec,debug,packet type=Life Duration, flag=0x8000, lorv=28800
02:32:46 ipsec,debug,packet type=Encryption Algorithm, flag=0x8000, lorv=AES-CBC
02:32:46 ipsec,debug,packet encryption(aes)
02:32:46 ipsec,debug,packet type=Key Length, flag=0x8000, lorv=128
02:32:46 ipsec,debug,packet type=Authentication Method, flag=0x8000, lorv=GSS-API on Kerberos 5
02:32:46 ipsec,debug,packet type=Hash Algorithm, flag=0x8000, lorv=SHA
02:32:46 ipsec,debug,packet hash(sha1)
02:32:46 ipsec,debug,packet type=Group Description, flag=0x8000, lorv=1024-bit MODP group
02:32:46 ipsec,debug,packet dh(modp1024)
02:32:46 ipsec,debug,packet transform #4 len=36
02:32:46 ipsec,debug,packet type=Life Type, flag=0x8000, lorv=seconds
02:32:46 ipsec,debug,packet type=Life Duration, flag=0x8000, lorv=28800
02:32:46 ipsec,debug,packet type=Encryption Algorithm, flag=0x8000, lorv=AES-CBC
02:32:46 ipsec,debug,packet encryption(aes)
02:32:46 ipsec,debug,packet type=Key Length, flag=0x8000, lorv=128
02:32:46 ipsec,debug,packet type=Authentication Method, flag=0x8000, lorv=GSS-API on Kerberos 5
02:32:46 ipsec,debug,packet type=Hash Algorithm, flag=0x8000, lorv=MD5
02:32:46 ipsec,debug,packet hash(md5)
02:32:46 ipsec,debug,packet type=Group Description, flag=0x8000, lorv=1024-bit MODP group
02:32:46 ipsec,debug,packet dh(modp1024)
02:32:46 ipsec,debug,packet transform #5 len=32
02:32:46 ipsec,debug,packet type=Life Type, flag=0x8000, lorv=seconds
02:32:46 ipsec,debug,packet type=Life Duration, flag=0x8000, lorv=28800
02:32:46 ipsec,debug,packet type=Encryption Algorithm, flag=0x8000, lorv=3DES-CBC
02:32:46 ipsec,debug,packet encryption(3des)
02:32:46 ipsec,debug,packet type=Authentication Method, flag=0x8000, lorv=GSS-API on Kerberos 5
02:32:46 ipsec,debug,packet type=Hash Algorithm, flag=0x8000, lorv=SHA
02:32:46 ipsec,debug,packet hash(sha1)
02:32:46 ipsec,debug,packet type=Group Description, flag=0x8000, lorv=1024-bit MODP group
02:32:46 ipsec,debug,packet dh(modp1024)
02:32:46 ipsec,debug,packet transform #6 len=32
02:32:46 ipsec,debug,packet type=Life Type, flag=0x8000, lorv=seconds
02:32:46 ipsec,debug,packet type=Life Duration, flag=0x8000, lorv=28800
02:32:46 ipsec,debug,packet type=Encryption Algorithm, flag=0x8000, lorv=3DES-CBC
02:32:46 ipsec,debug,packet encryption(3des)
02:32:46 ipsec,debug,packet type=Authentication Method, flag=0x8000, lorv=GSS-API on Kerberos 5
02:32:46 ipsec,debug,packet type=Hash Algorithm, flag=0x8000, lorv=MD5
02:32:46 ipsec,debug,packet hash(md5)
02:32:46 ipsec,debug,packet type=Group Description, flag=0x8000, lorv=1024-bit MODP group
02:32:46 ipsec,debug,packet dh(modp1024)
02:32:46 ipsec,debug,packet transform #7 len=32
02:32:46 ipsec,debug,packet type=Life Type, flag=0x8000, lorv=seconds
02:32:46 ipsec,debug,packet type=Life Duration, flag=0x8000, lorv=28800
02:32:46 ipsec,debug,packet type=Encryption Algorithm, flag=0x8000, lorv=DES-CBC
02:32:46 ipsec,debug,packet encryption(des)
02:32:46 ipsec,debug,packet type=Authentication Method, flag=0x8000, lorv=GSS-API on Kerberos 5
02:32:46 ipsec,debug,packet type=Hash Algorithm, flag=0x8000, lorv=SHA
02:32:46 ipsec,debug,packet hash(sha1)
02:32:46 ipsec,debug,packet type=Group Description, flag=0x8000, lorv=1024-bit MODP group
02:32:46 ipsec,debug,packet dh(modp1024)
02:32:46 ipsec,debug,packet transform #8 len=32
02:32:46 ipsec,debug,packet type=Life Type, flag=0x8000, lorv=seconds
02:32:46 ipsec,debug,packet type=Life Duration, flag=0x8000, lorv=28800
02:32:46 ipsec,debug,packet type=Encryption Algorithm, flag=0x8000, lorv=DES-CBC
02:32:46 ipsec,debug,packet encryption(des)
02:32:46 ipsec,debug,packet type=Authentication Method, flag=0x8000, lorv=GSS-API on Kerberos 5
02:32:46 ipsec,debug,packet type=Hash Algorithm, flag=0x8000, lorv=MD5
02:32:46 ipsec,debug,packet hash(md5)
02:32:46 ipsec,debug,packet type=Group Description, flag=0x8000, lorv=1024-bit MODP group
02:32:46 ipsec,debug,packet dh(modp1024)
02:32:46 ipsec,debug,packet pair 1:
02:32:46 ipsec,debug,packet 0x47e2f0: next=(nil) tnext=0x47d278
02:32:46 ipsec,debug,packet 0x47d278: next=(nil) tnext=0x47a980
02:32:46 ipsec,debug,packet 0x47a980: next=(nil) tnext=0x47ea88
02:32:46 ipsec,debug,packet 0x47ea88: next=(nil) tnext=0x478948
02:32:46 ipsec,debug,packet 0x478948: next=(nil) tnext=0x47e6d8
02:32:46 ipsec,debug,packet 0x47e6d8: next=(nil) tnext=0x4793e0
02:32:46 ipsec,debug,packet 0x4793e0: next=(nil) tnext=0x478df8
02:32:46 ipsec,debug,packet 0x478df8: next=(nil) tnext=(nil)
02:32:46 ipsec,debug,packet proposal #1: 8 transform
02:32:46 ipsec,debug,packet prop#=1, prot-id=ISAKMP, spi-size=0, #trns=8
02:32:46 ipsec,debug,packet trns#=1, trns-id=IKE
02:32:46 ipsec,debug,packet type=Life Type, flag=0x8000, lorv=seconds
02:32:46 ipsec,debug,packet type=Life Duration, flag=0x8000, lorv=28800
02:32:46 ipsec,debug,packet type=Encryption Algorithm, flag=0x8000, lorv=AES-CBC
02:32:46 ipsec,debug,packet type=Key Length, flag=0x8000, lorv=256
02:32:46 ipsec,debug,packet type=Authentication Method, flag=0x8000, lorv=GSS-API on Kerberos 5
02:32:46 ipsec,debug,packet type=Hash Algorithm, flag=0x8000, lorv=SHA
02:32:46 ipsec,debug,packet type=Group Description, flag=0x8000, lorv=1024-bit MODP group
02:32:46 ipsec,debug,packet Compared: Local:Peer
02:32:46 ipsec,debug,packet (lifetime = 86400:28800)
02:32:46 ipsec,debug,packet (lifebyte = 0:0)
02:32:46 ipsec,debug,packet enctype = 3DES-CBC:AES-CBC
02:32:46 ipsec,debug,packet (encklen = 0:256)
02:32:46 ipsec,debug,packet hashtype = SHA:SHA
02:32:46 ipsec,debug,packet authmethod = XAuth pskey server:GSS-API on Kerberos 5
02:32:46 ipsec,debug,packet dh_group = 1024-bit MODP group:1024-bit MODP group
02:32:46 ipsec,debug,packet Compared: Local:Peer
02:32:46 ipsec,debug,packet (lifetime = 86400:28800)
02:32:46 ipsec,debug,packet (lifebyte = 0:0)
02:32:46 ipsec,debug,packet enctype = AES-CBC:AES-CBC
02:32:46 ipsec,debug,packet (encklen = 128:256)
02:32:46 ipsec,debug,packet hashtype = SHA:SHA
02:32:46 ipsec,debug,packet authmethod = XAuth pskey server:GSS-API on Kerberos 5
02:32:46 ipsec,debug,packet dh_group = 1024-bit MODP group:1024-bit MODP group
02:32:46 ipsec,debug,packet Compared: Local:Peer
02:32:46 ipsec,debug,packet (lifetime = 86400:28800)
02:32:46 ipsec,debug,packet (lifebyte = 0:0)
02:32:46 ipsec,debug,packet enctype = AES-CBC:AES-CBC
02:32:46 ipsec,debug,packet (encklen = 256:256)
02:32:46 ipsec,debug,packet hashtype = SHA:SHA
02:32:46 ipsec,debug,packet authmethod = XAuth pskey server:GSS-API on Kerberos 5
02:32:46 ipsec,debug,packet dh_group = 1024-bit MODP group:1024-bit MODP group
02:32:46 ipsec,debug,packet an acceptable proposal found.
02:32:46 ipsec,debug,packet dh(modp1024)
02:32:46 ipsec,debug,packet agreed on XAuth pskey server auth.
02:32:46 ipsec,debug,packet ===
02:32:46 ipsec,debug,packet new cookie:
02:32:46 ipsec,debug,packet cd04a71fc5f28c32
02:32:46 ipsec,debug Adding xauth VID payload.
02:32:46 ipsec,debug,packet add payload of len 52, next type 13
02:32:46 ipsec,debug,packet add payload of len 16, next type 13
02:32:46 ipsec,debug,packet add payload of len 8, next type 13
02:32:46 ipsec,debug,packet add payload of len 16, next type 13
02:32:46 ipsec,debug,packet add payload of len 16, next type 13
02:32:46 ipsec,debug,packet add payload of len 20, next type 0
02:32:46 ipsec,debug,packet 180 bytes from xxx.yyy.zzz.89[500] to 70.214.6.78[12476]
02:32:46 ipsec,debug,packet sockname xxx.yyy.zzz.89[500]
02:32:46 ipsec,debug,packet send packet from xxx.yyy.zzz.89[500]
02:32:46 ipsec,debug,packet send packet to 70.214.6.78[12476]
02:32:46 ipsec,debug,packet src4 xxx.yyy.zzz.89[500]
02:32:46 ipsec,debug,packet dst4 70.214.6.78[12476]
02:32:46 ipsec,debug,packet 1 times of 180 bytes message will be sent to 70.214.6.78[12476]
02:32:46 ipsec,debug,packet 49b17bd7 28fb043c cd04a71f c5f28c32 01100200 00000000 000000b4 0d000038
02:32:46 ipsec,debug,packet 00000001 00000001 0000002c 01010001 00000024 01010000 800b0001 800c7080
02:32:46 ipsec,debug,packet 80010007 800e0100 8003fde9 80020002 80040002 0d000014 4a131c81 07035845
02:32:46 ipsec,debug,packet 5c5728f2 0e95452f 0d00000c 09002689 dfd6b712 0d000014 12f5f28c 457168a9
02:32:46 ipsec,debug,packet 702d9fe2 74cc0100 0d000014 afcad713 68a1f1c9 6b8696fc 77570100 00000018
02:32:46 ipsec,debug,packet 4048b7d5 6ebce885 25e7de7f 00d6c2d3 80000000
02:32:46 ipsec,debug sent phase1 packet xxx.yyy.zzz.89[500]<=>70.214.6.78[12476] 49b17bd728fb043c:cd04a71fc5f28c32
02:32:46 ipsec,debug,packet ==========
02:32:46 ipsec,debug,packet 228 bytes message received from 70.214.6.78[12476] to xxx.yyy.zzz.89[500]
02:32:46 ipsec,debug,packet 49b17bd7 28fb043c cd04a71f c5f28c32 04100200 00000000 000000e4 0a000084
02:32:46 ipsec,debug,packet ecb1d8a3 47185c1a 0fa4cfbc 7709387d f58b43e5 5c1b9118 6a1ab1fd 62a8dc4a
02:32:46 ipsec,debug,packet 1495eb8a 223e5f92 ea78bb85 929bd322 98e31d49 103b648d 603f516b b6b1c0ea
02:32:46 ipsec,debug,packet c1865b04 10c1d477 e9b3c8a1 5fe4a9a2 2dc517a3 f6d72ec7 c80b6d53 9512ee76
02:32:46 ipsec,debug,packet ec6d5e4c d5777143 7627e888 add0a211 314a07d8 64f4335e 432cb13c ebbd9a31
02:32:46 ipsec,debug,packet 14000014 c35d2053 bbade84c 6d054e02 03cb53b3 14000018 5bfad9bb 6871c8f5
02:32:46 ipsec,debug,packet f6b289cc 7b0a0124 f8081d1e 00000018 4c870d81 30e89b10 e9298023 23038cbf
02:32:46 ipsec,debug,packet 71e3366d
02:32:46 ipsec,debug,packet begin.
02:32:46 ipsec,debug,packet seen nptype=4(ke)
02:32:46 ipsec,debug,packet seen nptype=10(nonce)
02:32:46 ipsec,debug,packet seen nptype=20(nat-d)
02:32:46 ipsec,debug,packet seen nptype=20(nat-d)
02:32:46 ipsec,debug,packet succeed.
02:32:46 ipsec,debug Hashing xxx.yyy.zzz.89[500] with algo #2
02:32:46 ipsec,debug,packet hash(sha1)
02:32:46 ipsec,debug NAT-D payload #0 verified
02:32:46 ipsec,debug Hashing 70.214.6.78[12476] with algo #2
02:32:46 ipsec,debug,packet hash(sha1)
02:32:46 ipsec,debug NAT-D payload #1 doesn't match
02:32:46 ipsec,debug NAT detected: PEER
02:32:46 ipsec,debug,packet ===
02:32:46 ipsec,debug,packet compute DH's private.
02:32:46 ipsec,debug,packet 4ec0be0a 2180abf2 5d3c0d9e ef5ce6fa c35b7333 f3a890e8 d81a56eb f24e6074
02:32:46 ipsec,debug,packet 235292ec ffcf246c 6047dc61 10043bc9 53fb0064 52d8f160 67a683f6 d2153d64
02:32:46 ipsec,debug,packet 514b4bb1 b1a3fccd 470beb02 27d9f59a 256d2728 95361307 040551e1 f014d33e
02:32:46 ipsec,debug,packet b7d419e9 02385ba9 644568c7 0c88c5af 163f7366 f7933452 ef965390 1de4cac0
02:32:46 ipsec,debug,packet compute DH's public.
02:32:46 ipsec,debug,packet ece09981 3d11cb33 d0e7007b be724d1a 9a35c80f 798fa5bc 8c19c845 029b094a
02:32:46 ipsec,debug,packet a7529344 3966552f 3690c43c 3bc6fae4 28121b5d ed63353b 076c5bb4 03dafa38
02:32:46 ipsec,debug,packet 9dff8127 538b8e89 b92fa345 68e03314 7fcbb95b 5d4ad70c df195b90 57bea5c2
02:32:46 ipsec,debug,packet ee81a20a 8f153890 14fcb697 41b76f7b 690433d8 04ddc602 8b711ceb d24792bf
02:32:46 ipsec,debug Hashing 70.214.6.78[12476] with algo #2
02:32:46 ipsec,debug,packet hash(sha1)
02:32:46 ipsec,debug Hashing xxx.yyy.zzz.89[500] with algo #2
02:32:46 ipsec,debug,packet hash(sha1)
02:32:46 ipsec,debug Adding remote and local NAT-D payloads.
02:32:46 ipsec,debug,packet add payload of len 128, next type 10
02:32:46 ipsec,debug,packet add payload of len 24, next type 20
02:32:46 ipsec,debug,packet add payload of len 20, next type 20
02:32:46 ipsec,debug,packet add payload of len 20, next type 0
02:32:46 ipsec,debug,packet 236 bytes from xxx.yyy.zzz.89[500] to 70.214.6.78[12476]
02:32:46 ipsec,debug,packet sockname xxx.yyy.zzz.89[500]
02:32:46 ipsec,debug,packet send packet from xxx.yyy.zzz.89[500]
02:32:46 ipsec,debug,packet send packet to 70.214.6.78[12476]
02:32:46 ipsec,debug,packet src4 xxx.yyy.zzz.89[500]
02:32:46 ipsec,debug,packet dst4 70.214.6.78[12476]
02:32:46 ipsec,debug,packet 1 times of 236 bytes message will be sent to 70.214.6.78[12476]
02:32:46 ipsec,debug,packet 49b17bd7 28fb043c cd04a71f c5f28c32 04100200 00000000 000000ec 0a000084
02:32:46 ipsec,debug,packet ece09981 3d11cb33 d0e7007b be724d1a 9a35c80f 798fa5bc 8c19c845 029b094a
02:32:46 ipsec,debug,packet a7529344 3966552f 3690c43c 3bc6fae4 28121b5d ed63353b 076c5bb4 03dafa38
02:32:46 ipsec,debug,packet 9dff8127 538b8e89 b92fa345 68e03314 7fcbb95b 5d4ad70c df195b90 57bea5c2
02:32:46 ipsec,debug,packet ee81a20a 8f153890 14fcb697 41b76f7b 690433d8 04ddc602 8b711ceb d24792bf
02:32:46 ipsec,debug,packet 1400001c cb5896b7 e35026d3 565f216f 220ff71f 49de615f 4129cb22 14000018
02:32:46 ipsec,debug,packet 681b7645 8434e4da b62c038a 808f2d87 ecf78642 00000018 5bfad9bb 6871c8f5
02:32:46 ipsec,debug,packet f6b289cc 7b0a0124 f8081d1e
02:32:46 ipsec,debug sent phase1 packet xxx.yyy.zzz.89[500]<=>70.214.6.78[12476] 49b17bd728fb043c:cd04a71fc5f28c32
02:32:46 ipsec,debug,packet compute DH's shared.
02:32:46 ipsec,debug,packet
02:32:46 ipsec,debug,packet 01b2c7d9 828b798e 6ce55187 adc3a35b 93927a54 e1171fb9 41329ace babe0c9d
02:32:46 ipsec,debug,packet c019d0ea 9462d869 84188cfc 41c0f39f 1a4c28b2 51bb4a74 8e01b4d6 0cd69e65
02:32:46 ipsec,debug,packet 9b393be7 13a429be fe28c92a ad366d71 3b4c168b a36e4eb1 a240349e 6771f739
02:32:46 ipsec,debug,packet f77032ed 2b68b9c7 b7a186d9 44078f25 7cc53649 bba2d1f2 d266a2a0 fdae720c
02:32:46 ipsec,debug,packet the psk found.
02:32:46 ipsec,debug,packet nonce 1:
02:32:46 ipsec,debug,packet c35d2053 bbade84c 6d054e02 03cb53b3
02:32:46 ipsec,debug,packet nonce 2:
02:32:46 ipsec,debug,packet cb5896b7 e35026d3 565f216f 220ff71f 49de615f 4129cb22
02:32:46 ipsec,debug,packet hmac(hmac_sha1)
02:32:46 ipsec,debug,packet SKEYID computed:
02:32:46 ipsec,debug,packet d69630c6 7041cca4 7707206b 1b539bd5 c9f1771b
02:32:46 ipsec,debug,packet hmac(hmac_sha1)
02:32:46 ipsec,debug,packet SKEYID_d computed:
02:32:46 ipsec,debug,packet f9e766c3 a335a352 a24a1088 7f0623f1 426771c1
02:32:46 ipsec,debug,packet hmac(hmac_sha1)
02:32:46 ipsec,debug,packet SKEYID_a computed:
02:32:46 ipsec,debug,packet 1ec405ec 35df0596 66be3b43 8248f021 91876d2b
02:32:46 ipsec,debug,packet hmac(hmac_sha1)
02:32:46 ipsec,debug,packet SKEYID_e computed:
02:32:46 ipsec,debug,packet 5619b8aa 8d11063e 8e5ef5f2 8a4fc694 5b125d06
02:32:46 ipsec,debug,packet encryption(aes)
02:32:46 ipsec,debug,packet hash(sha1)
02:32:46 ipsec,debug,packet len(SKEYID_e) < len(Ka) (20 < 32), generating long key (Ka = K1 | K2 | ...)
02:32:46 ipsec,debug,packet hmac(hmac_sha1)
02:32:46 ipsec,debug,packet compute intermediate encryption key K1
02:32:46 ipsec,debug,packet 00
02:32:46 ipsec,debug,packet b8a8ff50 e3256cd5 4f148014 aff2f2c6 a1c0686d
02:32:46 ipsec,debug,packet hmac(hmac_sha1)
02:32:46 ipsec,debug,packet compute intermediate encryption key K2
02:32:46 ipsec,debug,packet b8a8ff50 e3256cd5 4f148014 aff2f2c6 a1c0686d
02:32:46 ipsec,debug,packet e7a156da 614e8f01 fc674099 a792b50e d4db9732
02:32:46 ipsec,debug,packet final encryption key computed:
02:32:46 ipsec,debug,packet b8a8ff50 e3256cd5 4f148014 aff2f2c6 a1c0686d e7a156da 614e8f01 fc674099
02:32:46 ipsec,debug,packet hash(sha1)
02:32:46 ipsec,debug,packet encryption(aes)
02:32:46 ipsec,debug,packet IV computed:
02:32:46 ipsec,debug,packet f286e1b1 051ec4ba 34fab461 b05a6cfc
02:32:46 ipsec,debug,packet ==========
02:32:46 ipsec,debug,packet 92 bytes message received from 70.214.6.78[12473] to xxx.yyy.zzz.89[4500]
02:32:46 ipsec,debug,packet 49b17bd7 28fb043c cd04a71f c5f28c32 05100201 00000000 0000005c d6afb828
02:32:46 ipsec,debug,packet 4569b161 bfe1f1c7 7a55bcec d7cf3f4f 0bb09173 e82520c4 3bd9397b 258b35fd
02:32:46 ipsec,debug,packet 92436934 c7cb8bf2 d9bf72b8 d4753df0 b3168d46 ad9a6bf8 adc3e5d5
02:32:46 ipsec,debug NAT-T: ports changed to: 70.214.6.78[12473]<=>xxx.yyy.zzz.89[4500]
02:32:46 ipsec,debug KA list add: xxx.yyy.zzz.89[4500]->70.214.6.78[12473]
02:32:46 ipsec,debug,packet encryption(aes)
02:32:46 ipsec,debug,packet IV was saved for next processing:
02:32:46 ipsec,debug,packet d4753df0 b3168d46 ad9a6bf8 adc3e5d5
02:32:46 ipsec,debug,packet encryption(aes)
02:32:46 ipsec,debug,packet with key:
02:32:46 ipsec,debug,packet b8a8ff50 e3256cd5 4f148014 aff2f2c6 a1c0686d e7a156da 614e8f01 fc674099
02:32:46 ipsec,debug,packet decrypted payload by IV:
02:32:46 ipsec,debug,packet f286e1b1 051ec4ba 34fab461 b05a6cfc
02:32:46 ipsec,debug,packet decrypted payload, but not trimed.
02:32:46 ipsec,debug,packet 0800000c 011101f4 644909fd 00000018 5e2a2c13 0f497c94 abaa17c7 07fbb135
02:32:46 ipsec,debug,packet 486d8e0d a9a5f881 f9ddafbe ffebeb8f d795c3de 81eaf8b0 97ffa287 9f8fae1b
02:32:46 ipsec,debug,packet padding len=28
02:32:46 ipsec,debug,packet skip to trim padding.
02:32:46 ipsec,debug,packet decrypted.
02:32:46 ipsec,debug,packet 49b17bd7 28fb043c cd04a71f c5f28c32 05100201 00000000 0000005c 0800000c
02:32:46 ipsec,debug,packet 011101f4 644909fd 00000018 5e2a2c13 0f497c94 abaa17c7 07fbb135 486d8e0d
02:32:46 ipsec,debug,packet a9a5f881 f9ddafbe ffebeb8f d795c3de 81eaf8b0 97ffa287 9f8fae1b
02:32:46 ipsec,debug,packet begin.
02:32:46 ipsec,debug,packet seen nptype=5(id)
02:32:46 ipsec,debug,packet seen nptype=8(hash)
02:32:46 ipsec,debug,packet succeed.
02:32:46 ipsec,debug,packet HASH received:
02:32:46 ipsec,debug,packet 5e2a2c13 0f497c94 abaa17c7 07fbb135 486d8e0d
02:32:46 ipsec,debug,packet HASH with:
02:32:46 ipsec,debug,packet ecb1d8a3 47185c1a 0fa4cfbc 7709387d f58b43e5 5c1b9118 6a1ab1fd 62a8dc4a
02:32:46 ipsec,debug,packet 1495eb8a 223e5f92 ea78bb85 929bd322 98e31d49 103b648d 603f516b b6b1c0ea
02:32:46 ipsec,debug,packet c1865b04 10c1d477 e9b3c8a1 5fe4a9a2 2dc517a3 f6d72ec7 c80b6d53 9512ee76
02:32:46 ipsec,debug,packet ec6d5e4c d5777143 7627e888 add0a211 314a07d8 64f4335e 432cb13c ebbd9a31
02:32:46 ipsec,debug,packet ece09981 3d11cb33 d0e7007b be724d1a 9a35c80f 798fa5bc 8c19c845 029b094a
02:32:46 ipsec,debug,packet a7529344 3966552f 3690c43c 3bc6fae4 28121b5d ed63353b 076c5bb4 03dafa38
02:32:46 ipsec,debug,packet 9dff8127 538b8e89 b92fa345 68e03314 7fcbb95b 5d4ad70c df195b90 57bea5c2
02:32:46 ipsec,debug,packet ee81a20a 8f153890 14fcb697 41b76f7b 690433d8 04ddc602 8b711ceb d24792bf
02:32:46 ipsec,debug,packet 49b17bd7 28fb043c cd04a71f c5f28c32 00000001 00000001 00000118 01010008
02:32:46 ipsec,debug,packet 03000024 01010000 800b0001 800c7080 80010007 800e0100 8003fde9 80020002
02:32:46 ipsec,debug,packet 80040002 03000024 02010000 800b0001 800c7080 80010007 800e0100 8003fde9
02:32:46 ipsec,debug,packet 80020001 80040002 03000024 03010000 800b0001 800c7080 80010007 800e0080
02:32:46 ipsec,debug,packet 8003fde9 80020002 80040002 03000024 04010000 800b0001 800c7080 80010007
02:32:46 ipsec,debug,packet 800e0080 8003fde9 80020001 80040002 03000020 05010000 800b0001 800c7080
02:32:46 ipsec,debug,packet 80010005 8003fde9 80020002 80040002 03000020 06010000 800b0001 800c7080
02:32:46 ipsec,debug,packet 80010005 8003fde9 80020001 80040002 03000020 07010000 800b0001 800c7080
02:32:46 ipsec,debug,packet 80010001 8003fde9 80020002 80040002 00000020 08010000 800b0001 800c7080
02:32:46 ipsec,debug,packet 80010001 8003fde9 80020001 80040002 011101f4 644909fd
02:32:46 ipsec,debug,packet hmac(hmac_sha1)
02:32:46 ipsec,debug,packet HASH computed:
02:32:46 ipsec,debug,packet 5e2a2c13 0f497c94 abaa17c7 07fbb135 486d8e0d
02:32:46 ipsec,debug,packet HASH for PSK validated.
02:32:46 ipsec,debug,packet peer's ID
02:32:46 ipsec,debug,packet 011101f4 644909fd
02:32:46 ipsec,debug,packet ===
02:32:46 ipsec,debug,packet use ID type of IPv4_address
02:32:46 ipsec,debug,packet generate HASH_R
02:32:46 ipsec,debug,packet HASH with:
02:32:46 ipsec,debug,packet ece09981 3d11cb33 d0e7007b be724d1a 9a35c80f 798fa5bc 8c19c845 029b094a
02:32:46 ipsec,debug,packet a7529344 3966552f 3690c43c 3bc6fae4 28121b5d ed63353b 076c5bb4 03dafa38
02:32:46 ipsec,debug,packet 9dff8127 538b8e89 b92fa345 68e03314 7fcbb95b 5d4ad70c df195b90 57bea5c2
02:32:46 ipsec,debug,packet ee81a20a 8f153890 14fcb697 41b76f7b 690433d8 04ddc602 8b711ceb d24792bf
02:32:46 ipsec,debug,packet ecb1d8a3 47185c1a 0fa4cfbc 7709387d f58b43e5 5c1b9118 6a1ab1fd 62a8dc4a
02:32:46 ipsec,debug,packet 1495eb8a 223e5f92 ea78bb85 929bd322 98e31d49 103b648d 603f516b b6b1c0ea
02:32:46 ipsec,debug,packet c1865b04 10c1d477 e9b3c8a1 5fe4a9a2 2dc517a3 f6d72ec7 c80b6d53 9512ee76
02:32:46 ipsec,debug,packet ec6d5e4c d5777143 7627e888 add0a211 314a07d8 64f4335e 432cb13c ebbd9a31
02:32:46 ipsec,debug,packet cd04a71f c5f28c32 49b17bd7 28fb043c 00000001 00000001 00000118 01010008
02:32:46 ipsec,debug,packet 03000024 01010000 800b0001 800c7080 80010007 800e0100 8003fde9 80020002
02:32:46 ipsec,debug,packet 80040002 03000024 02010000 800b0001 800c7080 80010007 800e0100 8003fde9
02:32:46 ipsec,debug,packet 80020001 80040002 03000024 03010000 800b0001 800c7080 80010007 800e0080
02:32:46 ipsec,debug,packet 8003fde9 80020002 80040002 03000024 04010000 800b0001 800c7080 80010007
02:32:46 ipsec,debug,packet 800e0080 8003fde9 80020001 80040002 03000020 05010000 800b0001 800c7080
02:32:46 ipsec,debug,packet 80010005 8003fde9 80020002 80040002 03000020 06010000 800b0001 800c7080
02:32:46 ipsec,debug,packet 80010005 8003fde9 80020001 80040002 03000020 07010000 800b0001 800c7080
02:32:46 ipsec,debug,packet 80010001 8003fde9 80020002 80040002 00000020 08010000 800b0001 800c7080
02:32:46 ipsec,debug,packet 80010001 8003fde9 80020001 80040002 011101f4 ad08ac59
02:32:46 ipsec,debug,packet hmac(hmac_sha1)
02:32:46 ipsec,debug,packet HASH computed:
02:32:46 ipsec,debug,packet 67a8d948 0af28c8a 9d1da84d f9c12327 2e182595
02:32:46 ipsec,debug,packet add payload of len 8, next type 8
02:32:46 ipsec,debug,packet add payload of len 20, next type 0
02:32:46 ipsec,debug,packet begin encryption.
02:32:46 ipsec,debug,packet encryption(aes)
02:32:46 ipsec,debug,packet pad length = 12
02:32:46 ipsec,debug,packet 0800000c 011101f4 ad08ac59 00000018 67a8d948 0af28c8a 9d1da84d f9c12327
02:32:46 ipsec,debug,packet 2e182595 efff0f18 794419e2 3fad960b
02:32:46 ipsec,debug,packet encryption(aes)
02:32:46 ipsec,debug,packet with key:
02:32:46 ipsec,debug,packet b8a8ff50 e3256cd5 4f148014 aff2f2c6 a1c0686d e7a156da 614e8f01 fc674099
02:32:46 ipsec,debug,packet encrypted payload by IV:
02:32:46 ipsec,debug,packet d4753df0 b3168d46 ad9a6bf8 adc3e5d5
02:32:46 ipsec,debug,packet save IV for next:
02:32:46 ipsec,debug,packet 7db761da a4a7062a c5891db2 a04efc53
02:32:46 ipsec,debug,packet encrypted.
02:32:46 ipsec,debug,packet Adding NON-ESP marker
02:32:46 ipsec,debug,packet 80 bytes from xxx.yyy.zzz.89[4500] to 70.214.6.78[12473]
02:32:46 ipsec,debug,packet sockname xxx.yyy.zzz.89[4500]
02:32:46 ipsec,debug,packet send packet from xxx.yyy.zzz.89[4500]
02:32:46 ipsec,debug,packet send packet to 70.214.6.78[12473]
02:32:46 ipsec,debug,packet src4 xxx.yyy.zzz.89[4500]
02:32:46 ipsec,debug,packet dst4 70.214.6.78[12473]
02:32:46 ipsec,debug,packet 1 times of 80 bytes message will be sent to 70.214.6.78[12473]
02:32:46 ipsec,debug,packet 00000000 49b17bd7 28fb043c cd04a71f c5f28c32 05100201 00000000 0000004c
02:32:46 ipsec,debug,packet 4e004608 ca088620 3fb3fade f3563021 c2409a4e 4b3ccbb0 e657ab52 deaa1176
02:32:46 ipsec,debug,packet 7db761da a4a7062a c5891db2 a04efc53
02:32:46 ipsec,debug Sending Xauth request
02:32:46 ipsec,debug,packet compute IV for phase2
02:32:46 ipsec,debug,packet phase1 last IV:
02:32:46 ipsec,debug,packet 7db761da a4a7062a c5891db2 a04efc53 f312b11e
02:32:46 ipsec,debug,packet hash(sha1)
02:32:46 ipsec,debug,packet encryption(aes)
02:32:46 ipsec,debug,packet phase2 IV computed:
02:32:46 ipsec,debug,packet 21ad162a 20d445d3 dea6fafb e24c87ed
02:32:46 ipsec,debug,packet HASH with:
02:32:46 ipsec,debug,packet f312b11e 00000014 0100f1e0 c0880000 40890000 408a0000
02:32:46 ipsec,debug,packet hmac(hmac_sha1)
02:32:46 ipsec,debug,packet HASH computed:
02:32:46 ipsec,debug,packet f87f65b7 e33df066 439c8361 97a10dea eab919e2
02:32:46 ipsec,debug,packet MODE_CFG packet to send
02:32:46 ipsec,debug,packet 49b17bd7 28fb043c cd04a71f c5f28c32 08100601 f312b11e 00000048 0e000018
02:32:46 ipsec,debug,packet f87f65b7 e33df066 439c8361 97a10dea eab919e2 00000014 0100f1e0 c0880000
02:32:46 ipsec,debug,packet 40890000 408a0000
02:32:46 ipsec,debug,packet begin encryption.
02:32:46 ipsec,debug,packet encryption(aes)
02:32:46 ipsec,debug,packet pad length = 4
02:32:46 ipsec,debug,packet 0e000018 f87f65b7 e33df066 439c8361 97a10dea eab919e2 00000014 0100f1e0
02:32:46 ipsec,debug,packet c0880000 40890000 408a0000 0e3f6903
02:32:46 ipsec,debug,packet encryption(aes)
02:32:46 ipsec,debug,packet with key:
02:32:46 ipsec,debug,packet b8a8ff50 e3256cd5 4f148014 aff2f2c6 a1c0686d e7a156da 614e8f01 fc674099
02:32:46 ipsec,debug,packet encrypted payload by IV:
02:32:46 ipsec,debug,packet 21ad162a 20d445d3 dea6fafb e24c87ed
02:32:46 ipsec,debug,packet save IV for next:
02:32:46 ipsec,debug,packet b343408c 64723704 cc703425 e29b98b3
02:32:46 ipsec,debug,packet encrypted.
02:32:46 ipsec,debug,packet Adding NON-ESP marker
02:32:46 ipsec,debug,packet 80 bytes from xxx.yyy.zzz.89[4500] to 70.214.6.78[12473]
02:32:46 ipsec,debug,packet sockname xxx.yyy.zzz.89[4500]
02:32:46 ipsec,debug,packet send packet from xxx.yyy.zzz.89[4500]
02:32:46 ipsec,debug,packet send packet to 70.214.6.78[12473]
02:32:46 ipsec,debug,packet src4 xxx.yyy.zzz.89[4500]
02:32:46 ipsec,debug,packet dst4 70.214.6.78[12473]
02:32:46 ipsec,debug,packet 1 times of 80 bytes message will be sent to 70.214.6.78[12473]
02:32:46 ipsec,debug,packet 00000000 49b17bd7 28fb043c cd04a71f c5f28c32 08100601 f312b11e 0000004c
02:32:46 ipsec,debug,packet d2525a8c 82eb723a 0434801f 5580836c 0576b1fa fbb8ae28 1396d235 44771f81
02:32:46 ipsec,debug,packet b343408c 64723704 cc703425 e29b98b3
02:32:46 ipsec,debug,packet sendto mode config 14.
02:32:46 ipsec,debug ISAKMP-SA established xxx.yyy.zzz.89[4500]-70.214.6.78[12473] spi:49b17bd728fb043c:cd04a71fc5f28c32
02:32:46 ipsec,debug,packet ===
02:32:46 ipsec,debug,packet ==========
02:32:46 ipsec,debug,packet 108 bytes message received from 70.214.6.78[12473] to xxx.yyy.zzz.89[4500]
02:32:46 ipsec,debug,packet 49b17bd7 28fb043c cd04a71f c5f28c32 08100501 d0d7d9a0 0000006c 6bb71aa5
02:32:46 ipsec,debug,packet 3d90b355 c8a33c75 9076ef24 f70dbda4 71a2b9d7 b89acdd5 b6a7e281 922b3e2c
02:32:46 ipsec,debug,packet b81c838a f56a8019 b10761c2 4de2f8ac 02b26238 42fd4378 369b0141 803067de
02:32:46 ipsec,debug,packet 44c9d04d 7a628689 e891df5d
02:32:46 ipsec,debug,packet receive Information.
02:32:46 ipsec,debug,packet compute IV for phase2
02:32:46 ipsec,debug,packet phase1 last IV:
02:32:46 ipsec,debug,packet 7db761da a4a7062a c5891db2 a04efc53 d0d7d9a0
02:32:46 ipsec,debug,packet hash(sha1)
02:32:46 ipsec,debug,packet encryption(aes)
02:32:46 ipsec,debug,packet phase2 IV computed:
02:32:46 ipsec,debug,packet a7fad2f8 776a7cfa e0213f1e c5087a82
02:32:46 ipsec,debug,packet encryption(aes)
02:32:46 ipsec,debug,packet IV was saved for next processing:
02:32:46 ipsec,debug,packet 803067de 44c9d04d 7a628689 e891df5d
02:32:46 ipsec,debug,packet encryption(aes)
02:32:46 ipsec,debug,packet with key:
02:32:46 ipsec,debug,packet b8a8ff50 e3256cd5 4f148014 aff2f2c6 a1c0686d e7a156da 614e8f01 fc674099
02:32:46 ipsec,debug,packet decrypted payload by IV:
02:32:46 ipsec,debug,packet a7fad2f8 776a7cfa e0213f1e c5087a82
02:32:46 ipsec,debug,packet decrypted payload, but not trimed.
02:32:46 ipsec,debug,packet 0b000018 439a6c0e 4bb8e716 79acd32a 6ac178b8 33c5f129 0000001c 00000001
02:32:46 ipsec,debug,packet 01106002 49b17bd7 28fb043c cd04a71f c5f28c32 a4a8b0b4 c0949de2 a2f398c3
02:32:46 ipsec,debug,packet d9fbe4a1 aedbf5ab 98e8ecae d4c6991b
02:32:46 ipsec,debug,packet padding len=28
02:32:46 ipsec,debug,packet skip to trim padding.
02:32:46 ipsec,debug,packet decrypted.
02:32:46 ipsec,debug,packet 49b17bd7 28fb043c cd04a71f c5f28c32 08100501 d0d7d9a0 0000006c 0b000018
02:32:46 ipsec,debug,packet 439a6c0e 4bb8e716 79acd32a 6ac178b8 33c5f129 0000001c 00000001 01106002
02:32:46 ipsec,debug,packet 49b17bd7 28fb043c cd04a71f c5f28c32 a4a8b0b4 c0949de2 a2f398c3 d9fbe4a1
02:32:46 ipsec,debug,packet aedbf5ab 98e8ecae d4c6991b
02:32:46 ipsec,debug,packet HASH with:
02:32:46 ipsec,debug,packet d0d7d9a0 0000001c 00000001 01106002 49b17bd7 28fb043c cd04a71f c5f28c32
02:32:46 ipsec,debug,packet hmac(hmac_sha1)
02:32:46 ipsec,debug,packet HASH computed:
02:32:46 ipsec,debug,packet 439a6c0e 4bb8e716 79acd32a 6ac178b8 33c5f129
02:32:46 ipsec,debug,packet hash validated.
02:32:46 ipsec,debug,packet begin.
02:32:46 ipsec,debug,packet seen nptype=8(hash)
02:32:46 ipsec,debug,packet seen nptype=11(notify)
02:32:46 ipsec,debug,packet succeed.
02:32:46 ipsec,debug,packet ==========
02:32:46 ipsec,debug,packet 108 bytes message received from 70.214.6.78[12473] to xxx.yyy.zzz.89[4500]
02:32:46 ipsec,debug,packet 49b17bd7 28fb043c cd04a71f c5f28c32 08100601 f312b11e 0000006c 6c124e71
02:32:46 ipsec,debug,packet caf82981 c3d44fd7 f57f59c3 f8b79092 72787636 d7604c0f 55154ffa c807099a
02:32:46 ipsec,debug,packet d59947f7 36daf22a 97c18c3f 1f6bcacf 7952639b 76878111 a3cd6f0b b2d468ce
02:32:46 ipsec,debug,packet 6063e0b5 6ccb80b8 199977c4
02:32:46 ipsec,debug,packet encryption(aes)
02:32:46 ipsec,debug,packet IV was saved for next processing:
02:32:46 ipsec,debug,packet b2d468ce 6063e0b5 6ccb80b8 199977c4
02:32:46 ipsec,debug,packet encryption(aes)
02:32:46 ipsec,debug,packet with key:
02:32:46 ipsec,debug,packet b8a8ff50 e3256cd5 4f148014 aff2f2c6 a1c0686d e7a156da 614e8f01 fc674099
02:32:46 ipsec,debug,packet decrypted payload by IV:
02:32:46 ipsec,debug,packet b343408c 64723704 cc703425 e29b98b3
02:32:46 ipsec,debug,packet decrypted payload, but not trimed.
02:32:46 ipsec,debug,packet 0e000018 e3caaeda e938cd61 4cf4ad48 7fafb399 ed35c144 00000024 0200f1e0
02:32:46 ipsec,debug,packet c0880000 40890006 6161726f 6e77408a 000a7433 73744950 53334300 a2e2f0e6
02:32:46 ipsec,debug,packet aad6f4b2 f1b0d0eb fde5d2de b4b0aa13
02:32:46 ipsec,debug,packet padding len=20
02:32:46 ipsec,debug,packet skip to trim padding.
02:32:46 ipsec,debug,packet decrypted.
02:32:46 ipsec,debug,packet 49b17bd7 28fb043c cd04a71f c5f28c32 08100601 f312b11e 0000006c 0e000018
02:32:46 ipsec,debug,packet e3caaeda e938cd61 4cf4ad48 7fafb399 ed35c144 00000024 0200f1e0 c0880000
02:32:46 ipsec,debug,packet 40890006 6161726f 6e77408a 000a7433 73744950 53334300 a2e2f0e6 aad6f4b2
02:32:46 ipsec,debug,packet f1b0d0eb fde5d2de b4b0aa13
02:32:46 ipsec,debug,packet MODE_CFG packet
02:32:46 ipsec,debug,packet 49b17bd7 28fb043c cd04a71f c5f28c32 08100601 f312b11e 0000006c 0e000018
02:32:46 ipsec,debug,packet e3caaeda e938cd61 4cf4ad48 7fafb399 ed35c144 00000024 0200f1e0 c0880000
02:32:46 ipsec,debug,packet 40890006 6161726f 6e77408a 000a7433 73744950 53334300 a2e2f0e6 aad6f4b2
02:32:46 ipsec,debug,packet f1b0d0eb fde5d2de b4b0aa13
02:32:46 ipsec,debug,packet Seen payload 8
02:32:46 ipsec,debug,packet 0e000018 e3caaeda e938cd61 4cf4ad48 7fafb399 ed35c144
02:32:46 ipsec,debug,packet HASH with:
02:32:46 ipsec,debug,packet f312b11e 00000024 0200f1e0 c0880000 40890006 6161726f 6e77408a 000a7433
02:32:46 ipsec,debug,packet 73744950 53334300
02:32:46 ipsec,debug,packet hmac(hmac_sha1)
02:32:46 ipsec,debug,packet HASH computed:
02:32:46 ipsec,debug,packet e3caaeda e938cd61 4cf4ad48 7fafb399 ed35c144
02:32:46 ipsec,debug,packet Seen payload 14
02:32:46 ipsec,debug,packet 00000024 0200f1e0 c0880000 40890006 6161726f 6e77408a 000a7433 73744950
02:32:46 ipsec,debug,packet 53334300
02:32:46 ipsec,debug,packet Configuration exchange type mode config REPLY
02:32:46 ipsec,debug,packet Short attribute XAUTH_TYPE = 0
02:32:46 ipsec,debug,packet Attribute XAUTH_USER_NAME, len 6
02:32:46 ipsec,debug,packet Attribute XAUTH_USER_PASSWORD, len 10
02:32:46 ipsec,debug,packet compute IV for phase2
02:32:46 ipsec,debug,packet phase1 last IV:
02:32:46 ipsec,debug,packet 7db761da a4a7062a c5891db2 a04efc53 863518e1
02:32:46 ipsec,debug,packet hash(sha1)
02:32:46 ipsec,debug,packet encryption(aes)
02:32:46 ipsec,debug,packet phase2 IV computed:
02:32:46 ipsec,debug,packet b2ccc33b 91f12883 127996aa 846b21fc
02:32:46 ipsec,debug,packet HASH with:
02:32:46 ipsec,debug,packet 863518e1 0000000c 0300f1e0 c08f0000
02:32:46 ipsec,debug,packet hmac(hmac_sha1)
02:32:46 ipsec,debug,packet HASH computed:
02:32:46 ipsec,debug,packet 2856180d 71f159ef 0684b3d3 151ce736 83ec6412
02:32:46 ipsec,debug,packet MODE_CFG packet to send
02:32:46 ipsec,debug,packet 49b17bd7 28fb043c cd04a71f c5f28c32 08100601 863518e1 00000040 0e000018
02:32:46 ipsec,debug,packet 2856180d 71f159ef 0684b3d3 151ce736 83ec6412 0000000c 0300f1e0 c08f0000
02:32:46 ipsec,debug,packet begin encryption.
02:32:46 ipsec,debug,packet encryption(aes)
02:32:46 ipsec,debug,packet pad length = 12
02:32:46 ipsec,debug,packet 0e000018 2856180d 71f159ef 0684b3d3 151ce736 83ec6412 0000000c 0300f1e0
02:32:46 ipsec,debug,packet c08f0000 31d9338a b7b8d974 e895170b
02:32:46 ipsec,debug,packet encryption(aes)
02:32:46 ipsec,debug,packet with key:
02:32:46 ipsec,debug,packet b8a8ff50 e3256cd5 4f148014 aff2f2c6 a1c0686d e7a156da 614e8f01 fc674099
02:32:46 ipsec,debug,packet encrypted payload by IV:
02:32:46 ipsec,debug,packet b2ccc33b 91f12883 127996aa 846b21fc
02:32:46 ipsec,debug,packet save IV for next:
02:32:46 ipsec,debug,packet d64f3694 6fb3d35a b016d239 e7304ad1
02:32:46 ipsec,debug,packet encrypted.
02:32:46 ipsec,debug,packet Adding NON-ESP marker
02:32:46 ipsec,debug,packet 80 bytes from xxx.yyy.zzz.89[4500] to 70.214.6.78[12473]
02:32:46 ipsec,debug,packet sockname xxx.yyy.zzz.89[4500]
02:32:46 ipsec,debug,packet send packet from xxx.yyy.zzz.89[4500]
02:32:46 ipsec,debug,packet send packet to 70.214.6.78[12473]
02:32:46 ipsec,debug,packet src4 xxx.yyy.zzz.89[4500]
02:32:46 ipsec,debug,packet dst4 70.214.6.78[12473]
02:32:46 ipsec,debug,packet 1 times of 80 bytes message will be sent to 70.214.6.78[12473]
02:32:46 ipsec,debug,packet 00000000 49b17bd7 28fb043c cd04a71f c5f28c32 08100601 863518e1 0000004c
02:32:46 ipsec,debug,packet 4bb008ca e90157b3 e2dcd2f2 8cecd224 a2fba726 25015615 860b511a 30daa88b
02:32:46 ipsec,debug,packet d64f3694 6fb3d35a b016d239 e7304ad1
02:32:46 ipsec,debug,packet sendto mode config 14.
02:32:46 ipsec,debug,packet compute IV for phase2
02:32:46 ipsec,debug,packet phase1 last IV:
02:32:46 ipsec,debug,packet 7db761da a4a7062a c5891db2 a04efc53 ff9b7b19
02:32:46 ipsec,debug,packet hash(sha1)
02:32:46 ipsec,debug,packet encryption(aes)
02:32:46 ipsec,debug,packet phase2 IV computed:
02:32:46 ipsec,debug,packet 71b0172a 7afc1d65 49b9348b 11b62b37
02:32:46 ipsec,debug,packet HASH with:
02:32:46 ipsec,debug,packet ff9b7b19 0000001c 00000001 01100001 49b17bd7 28fb043c cd04a71f c5f28c32
02:32:46 ipsec,debug,packet hmac(hmac_sha1)
02:32:46 ipsec,debug,packet HASH computed:
02:32:46 ipsec,debug,packet bed16e3d 9acd616a a5980c03 38b2898e e88238cb
02:32:46 ipsec,debug,packet begin encryption.
02:32:46 ipsec,debug,packet encryption(aes)
02:32:46 ipsec,debug,packet pad length = 12
02:32:46 ipsec,debug,packet 0c000018 bed16e3d 9acd616a a5980c03 38b2898e e88238cb 0000001c 00000001
02:32:46 ipsec,debug,packet 01100001 49b17bd7 28fb043c cd04a71f c5f28c32 a0e8803a ad46d8d7 becd240b
02:32:46 ipsec,debug,packet encryption(aes)
02:32:46 ipsec,debug,packet with key:
02:32:46 ipsec,debug,packet b8a8ff50 e3256cd5 4f148014 aff2f2c6 a1c0686d e7a156da 614e8f01 fc674099
02:32:46 ipsec,debug,packet encrypted payload by IV:
02:32:46 ipsec,debug,packet 71b0172a 7afc1d65 49b9348b 11b62b37
02:32:46 ipsec,debug,packet save IV for next:
02:32:46 ipsec,debug,packet 62b87597 288f573e 66b4e7b4 f7301b5c
02:32:46 ipsec,debug,packet encrypted.
02:32:46 ipsec,debug,packet Adding NON-ESP marker
02:32:46 ipsec,debug,packet 96 bytes from xxx.yyy.zzz.89[4500] to 70.214.6.78[12473]
02:32:46 ipsec,debug,packet sockname xxx.yyy.zzz.89[4500]
02:32:46 ipsec,debug,packet send packet from xxx.yyy.zzz.89[4500]
02:32:46 ipsec,debug,packet send packet to 70.214.6.78[12473]
02:32:46 ipsec,debug,packet src4 xxx.yyy.zzz.89[4500]
02:32:46 ipsec,debug,packet dst4 70.214.6.78[12473]
02:32:46 ipsec,debug,packet 1 times of 96 bytes message will be sent to 70.214.6.78[12473]
02:32:46 ipsec,debug,packet 00000000 49b17bd7 28fb043c cd04a71f c5f28c32 08100501 ff9b7b19 0000005c
02:32:46 ipsec,debug,packet 14555697 7b2574b6 68ff5e68 a8e16f54 11494e93 e7f1cce4 3a085ccc d14da6f4
02:32:46 ipsec,debug,packet abd02316 3ae20e52 8293b6b0 e2e8dd2a 62b87597 288f573e 66b4e7b4 f7301b5c
02:32:46 ipsec,debug,packet sendto Information delete.
02:32:46 ipsec,debug KA remove: xxx.yyy.zzz.89[4500]->70.214.6.78[12473]
02:32:46 ipsec,debug,packet KA tree dump: xxx.yyy.zzz.89[4500]->70.214.6.78[12473] (in_use=1)
02:32:46 ipsec,debug,packet KA removing this one...
02:32:46 ipsec,debug,packet an undead schedule has been deleted.
02:32:46 ipsec,debug,packet an undead schedule has been deleted.
02:32:47 ipsec,debug,packet ==========
02:32:47 ipsec,debug,packet 92 bytes message received from 70.214.6.78[12473] to xxx.yyy.zzz.89[4500]
02:32:47 ipsec,debug,packet 49b17bd7 28fb043c cd04a71f c5f28c32 08100601 863518e1 0000005c a75d6ae1
02:32:47 ipsec,debug,packet a6ed9d24 ee9d0768 6fe8b262 e48e6eee 74f97706 685b73b3 65b1d25f 7a4fc60a
02:32:47 ipsec,debug,packet 933a4655 d37c852f 2911c9fa 14cae5d9 b391c107 5e8864c3 c83e1fb0
02:32:47 ipsec,debug mode config 6 from 70.214.6.78[12473], but we have no ISAKMP-SA.
02:32:47 ipsec,debug,packet ==========
02:32:47 ipsec,debug,packet 108 bytes message received from 70.214.6.78[12473] to xxx.yyy.zzz.89[4500]
02:32:47 ipsec,debug,packet 49b17bd7 28fb043c cd04a71f c5f28c32 08100501 e0aba29b 0000006c b7f49b0b
02:32:47 ipsec,debug,packet 102235e2 578c9e9f fed667d2 45ddf763 37186371 9591026d 0e76920b b0a9701a
02:32:47 ipsec,debug,packet 3b3dec0c f71fb26e 8c6da93f 4497936d 785ef2fa 81933729 67f90bca 4f84c34e
02:32:47 ipsec,debug,packet 27cee8ac 53bc5417 c342e5a5
02:32:47 ipsec,debug unknown Informational exchange received.

When I try L2TP I get no suitable proposal found.

02:55:48 ipsec,debug,packet type=Life Duration, flag=0x8000, lorv=28800
02:55:48 ipsec,debug,packet type=Encryption Algorithm, flag=0x8000, lorv=3DES-CBC
02:55:48 ipsec,debug,packet encryption(3des)
02:55:48 ipsec,debug,packet type=Authentication Method, flag=0x8000, lorv=pre-shared key
02:55:48 ipsec,debug,packet type=Hash Algorithm, flag=0x8000, lorv=MD5
02:55:48 ipsec,debug,packet hash(md5)
02:55:48 ipsec,debug,packet type=Group Description, flag=0x8000, lorv=1024-bit MODP group
02:55:48 ipsec,debug,packet dh(modp1024)
02:55:48 ipsec,debug,packet transform #7 len=32
02:55:48 ipsec,debug,packet type=Life Type, flag=0x8000, lorv=seconds
02:55:48 ipsec,debug,packet type=Life Duration, flag=0x8000, lorv=28800
02:55:48 ipsec,debug,packet type=Encryption Algorithm, flag=0x8000, lorv=DES-CBC
02:55:48 ipsec,debug,packet encryption(des)
02:55:48 ipsec,debug,packet type=Authentication Method, flag=0x8000, lorv=pre-shared key
02:55:48 ipsec,debug,packet type=Hash Algorithm, flag=0x8000, lorv=SHA
02:55:48 ipsec,debug,packet hash(sha1)
02:55:48 ipsec,debug,packet type=Group Description, flag=0x8000, lorv=1024-bit MODP group
02:55:48 ipsec,debug,packet dh(modp1024)
02:55:48 ipsec,debug,packet transform #8 len=32
02:55:48 ipsec,debug,packet type=Life Type, flag=0x8000, lorv=seconds
02:55:48 ipsec,debug,packet type=Life Duration, flag=0x8000, lorv=28800
02:55:48 ipsec,debug,packet type=Encryption Algorithm, flag=0x8000, lorv=DES-CBC
02:55:48 ipsec,debug,packet encryption(des)
02:55:48 ipsec,debug,packet type=Authentication Method, flag=0x8000, lorv=pre-shared key
02:55:48 ipsec,debug,packet type=Hash Algorithm, flag=0x8000, lorv=MD5
02:55:48 ipsec,debug,packet hash(md5)
02:55:48 ipsec,debug,packet type=Group Description, flag=0x8000, lorv=1024-bit MODP group
02:55:48 ipsec,debug,packet dh(modp1024)
02:55:48 ipsec,debug,packet pair 1:
02:55:48 ipsec,debug,packet 0x47ae80: next=(nil) tnext=0x47e6d8
02:55:48 ipsec,debug,packet 0x47e6d8: next=(nil) tnext=0x478948
02:55:48 ipsec,debug,packet 0x478948: next=(nil) tnext=0x479330
02:55:48 ipsec,debug,packet 0x479330: next=(nil) tnext=0x47f4d8
02:55:48 ipsec,debug,packet 0x47f4d8: next=(nil) tnext=0x47bba0
02:55:48 ipsec,debug,packet 0x47bba0: next=(nil) tnext=0x47e368
02:55:48 ipsec,debug,packet 0x47e368: next=(nil) tnext=0x47e380
02:55:48 ipsec,debug,packet 0x47e380: next=(nil) tnext=(nil)
02:55:48 ipsec,debug,packet proposal #1: 8 transform
02:55:48 ipsec,debug,packet prop#=1, prot-id=ISAKMP, spi-size=0, #trns=8
02:55:48 ipsec,debug,packet trns#=1, trns-id=IKE
02:55:48 ipsec,debug,packet type=Life Type, flag=0x8000, lorv=seconds
02:55:48 ipsec,debug,packet type=Life Duration, flag=0x8000, lorv=28800
02:55:48 ipsec,debug,packet type=Encryption Algorithm, flag=0x8000, lorv=AES-CBC
02:55:48 ipsec,debug,packet type=Key Length, flag=0x8000, lorv=256
02:55:48 ipsec,debug,packet type=Authentication Method, flag=0x8000, lorv=pre-shared key
02:55:48 ipsec,debug,packet type=Hash Algorithm, flag=0x8000, lorv=SHA
02:55:48 ipsec,debug,packet type=Group Description, flag=0x8000, lorv=1024-bit MODP group
02:55:48 ipsec,debug,packet Compared: Local:Peer
02:55:48 ipsec,debug,packet (lifetime = 86400:28800)
02:55:48 ipsec,debug,packet (lifebyte = 0:0)
02:55:48 ipsec,debug,packet enctype = 3DES-CBC:AES-CBC
02:55:48 ipsec,debug,packet (encklen = 0:256)
02:55:48 ipsec,debug,packet hashtype = SHA:SHA
02:55:48 ipsec,debug,packet authmethod = XAuth pskey server:pre-shared key
02:55:48 ipsec,debug,packet dh_group = 1024-bit MODP group:1024-bit MODP group
02:55:48 ipsec,debug,packet Compared: Local:Peer
02:55:48 ipsec,debug,packet (lifetime = 86400:28800)
02:55:48 ipsec,debug,packet (lifebyte = 0:0)
02:55:48 ipsec,debug,packet enctype = AES-CBC:AES-CBC
02:55:48 ipsec,debug,packet (encklen = 128:256)
02:55:48 ipsec,debug,packet hashtype = SHA:SHA
02:55:48 ipsec,debug,packet authmethod = XAuth pskey server:pre-shared key
02:55:48 ipsec,debug,packet dh_group = 1024-bit MODP group:1024-bit MODP group
02:55:48 ipsec,debug,packet Compared: Local:Peer
02:55:48 ipsec,debug,packet (lifetime = 86400:28800)
02:55:48 ipsec,debug,packet (lifebyte = 0:0)
02:55:48 ipsec,debug,packet enctype = AES-CBC:AES-CBC
02:55:48 ipsec,debug,packet (encklen = 256:256)
02:55:48 ipsec,debug,packet hashtype = SHA:SHA
02:55:48 ipsec,debug,packet authmethod = XAuth pskey server:pre-shared key
02:55:48 ipsec,debug,packet dh_group = 1024-bit MODP group:1024-bit MODP group
02:55:48 ipsec,debug,packet prop#=1, prot-id=ISAKMP, spi-size=0, #trns=8
02:55:48 ipsec,debug,packet trns#=2, trns-id=IKE
02:55:48 ipsec,debug,packet type=Life Type, flag=0x8000, lorv=seconds
02:55:48 ipsec,debug,packet type=Life Duration, flag=0x8000, lorv=28800
02:55:48 ipsec,debug,packet type=Encryption Algorithm, flag=0x8000, lorv=AES-CBC
02:55:48 ipsec,debug,packet type=Key Length, flag=0x8000, lorv=256
02:55:48 ipsec,debug,packet type=Authentication Method, flag=0x8000, lorv=pre-shared key
02:55:48 ipsec,debug,packet type=Hash Algorithm, flag=0x8000, lorv=MD5
02:55:48 ipsec,debug,packet type=Group Description, flag=0x8000, lorv=1024-bit MODP group
02:55:48 ipsec,debug,packet Compared: Local:Peer
02:55:48 ipsec,debug,packet (lifetime = 86400:28800)
02:55:48 ipsec,debug,packet (lifebyte = 0:0)
02:55:48 ipsec,debug,packet enctype = 3DES-CBC:AES-CBC
02:55:48 ipsec,debug,packet (encklen = 0:256)
02:55:48 ipsec,debug,packet hashtype = SHA:MD5
02:55:48 ipsec,debug,packet authmethod = XAuth pskey server:pre-shared key
02:55:48 ipsec,debug,packet dh_group = 1024-bit MODP group:1024-bit MODP group
02:55:48 ipsec,debug,packet Compared: Local:Peer
02:55:48 ipsec,debug,packet (lifetime = 86400:28800)
02:55:48 ipsec,debug,packet (lifebyte = 0:0)
02:55:48 ipsec,debug,packet enctype = AES-CBC:AES-CBC
02:55:48 ipsec,debug,packet (encklen = 128:256)
02:55:48 ipsec,debug,packet hashtype = SHA:MD5
02:55:48 ipsec,debug,packet authmethod = XAuth pskey server:pre-shared key
02:55:48 ipsec,debug,packet dh_group = 1024-bit MODP group:1024-bit MODP group
02:55:48 ipsec,debug,packet Compared: Local:Peer
02:55:48 ipsec,debug,packet (lifetime = 86400:28800)
02:55:48 ipsec,debug,packet (lifebyte = 0:0)
02:55:48 ipsec,debug,packet enctype = AES-CBC:AES-CBC
02:55:48 ipsec,debug,packet (encklen = 256:256)
02:55:48 ipsec,debug,packet hashtype = SHA:MD5
02:55:48 ipsec,debug,packet authmethod = XAuth pskey server:pre-shared key
02:55:48 ipsec,debug,packet dh_group = 1024-bit MODP group:1024-bit MODP group
02:55:48 ipsec,debug,packet prop#=1, prot-id=ISAKMP, spi-size=0, #trns=8
02:55:48 ipsec,debug,packet trns#=3, trns-id=IKE
02:55:48 ipsec,debug,packet type=Life Type, flag=0x8000, lorv=seconds
02:55:48 ipsec,debug,packet type=Life Duration, flag=0x8000, lorv=28800
02:55:48 ipsec,debug,packet type=Encryption Algorithm, flag=0x8000, lorv=AES-CBC
02:55:48 ipsec,debug,packet type=Key Length, flag=0x8000, lorv=128
02:55:48 ipsec,debug,packet type=Authentication Method, flag=0x8000, lorv=pre-shared key
02:55:48 ipsec,debug,packet type=Hash Algorithm, flag=0x8000, lorv=SHA
02:55:48 ipsec,debug,packet type=Group Description, flag=0x8000, lorv=1024-bit MODP group
02:55:48 ipsec,debug,packet Compared: Local:Peer
02:55:48 ipsec,debug,packet (lifetime = 86400:28800)
02:55:48 ipsec,debug,packet (lifebyte = 0:0)
02:55:48 ipsec,debug,packet enctype = 3DES-CBC:AES-CBC
02:55:48 ipsec,debug,packet (encklen = 0:128)
02:55:48 ipsec,debug,packet hashtype = SHA:SHA
02:55:48 ipsec,debug,packet authmethod = XAuth pskey server:pre-shared key
02:55:48 ipsec,debug,packet dh_group = 1024-bit MODP group:1024-bit MODP group
02:55:48 ipsec,debug,packet Compared: Local:Peer
02:55:48 ipsec,debug,packet (lifetime = 86400:28800)
02:55:48 ipsec,debug,packet (lifebyte = 0:0)
02:55:48 ipsec,debug,packet enctype = AES-CBC:AES-CBC
02:55:48 ipsec,debug,packet (encklen = 128:128)
02:55:48 ipsec,debug,packet hashtype = SHA:SHA
02:55:48 ipsec,debug,packet authmethod = XAuth pskey server:pre-shared key
02:55:48 ipsec,debug,packet dh_group = 1024-bit MODP group:1024-bit MODP group
02:55:48 ipsec,debug,packet Compared: Local:Peer
02:55:48 ipsec,debug,packet (lifetime = 86400:28800)
02:55:48 ipsec,debug,packet (lifebyte = 0:0)
02:55:48 ipsec,debug,packet enctype = AES-CBC:AES-CBC
02:55:48 ipsec,debug,packet (encklen = 256:128)
02:55:48 ipsec,debug,packet hashtype = SHA:SHA
02:55:48 ipsec,debug,packet authmethod = XAuth pskey server:pre-shared key
02:55:48 ipsec,debug,packet dh_group = 1024-bit MODP group:1024-bit MODP group
02:55:48 ipsec,debug,packet prop#=1, prot-id=ISAKMP, spi-size=0, #trns=8
02:55:48 ipsec,debug,packet trns#=4, trns-id=IKE
02:55:48 ipsec,debug,packet type=Life Type, flag=0x8000, lorv=seconds
02:55:48 ipsec,debug,packet type=Life Duration, flag=0x8000, lorv=28800
02:55:48 ipsec,debug,packet type=Encryption Algorithm, flag=0x8000, lorv=AES-CBC
02:55:48 ipsec,debug,packet type=Key Length, flag=0x8000, lorv=128
02:55:48 ipsec,debug,packet type=Authentication Method, flag=0x8000, lorv=pre-shared key
02:55:48 ipsec,debug,packet type=Hash Algorithm, flag=0x8000, lorv=MD5
02:55:48 ipsec,debug,packet type=Group Description, flag=0x8000, lorv=1024-bit MODP group
02:55:48 ipsec,debug,packet Compared: Local:Peer
02:55:48 ipsec,debug,packet (lifetime = 86400:28800)
02:55:48 ipsec,debug,packet (lifebyte = 0:0)
02:55:48 ipsec,debug,packet enctype = 3DES-CBC:AES-CBC
02:55:48 ipsec,debug,packet (encklen = 0:128)
02:55:48 ipsec,debug,packet hashtype = SHA:MD5
02:55:48 ipsec,debug,packet authmethod = XAuth pskey server:pre-shared key
02:55:48 ipsec,debug,packet dh_group = 1024-bit MODP group:1024-bit MODP group
02:55:48 ipsec,debug,packet Compared: Local:Peer
02:55:48 ipsec,debug,packet (lifetime = 86400:28800)
02:55:48 ipsec,debug,packet (lifebyte = 0:0)
02:55:48 ipsec,debug,packet enctype = AES-CBC:AES-CBC
02:55:48 ipsec,debug,packet (encklen = 128:128)
02:55:48 ipsec,debug,packet hashtype = SHA:MD5
02:55:48 ipsec,debug,packet authmethod = XAuth pskey server:pre-shared key
02:55:48 ipsec,debug,packet dh_group = 1024-bit MODP group:1024-bit MODP group
02:55:48 ipsec,debug,packet Compared: Local:Peer
02:55:48 ipsec,debug,packet (lifetime = 86400:28800)
02:55:48 ipsec,debug,packet (lifebyte = 0:0)
02:55:48 ipsec,debug,packet enctype = AES-CBC:AES-CBC
02:55:48 ipsec,debug,packet (encklen = 256:128)
02:55:48 ipsec,debug,packet hashtype = SHA:MD5
02:55:48 ipsec,debug,packet authmethod = XAuth pskey server:pre-shared key
02:55:48 ipsec,debug,packet dh_group = 1024-bit MODP group:1024-bit MODP group
02:55:48 ipsec,debug,packet prop#=1, prot-id=ISAKMP, spi-size=0, #trns=8
02:55:48 ipsec,debug,packet trns#=5, trns-id=IKE
02:55:48 ipsec,debug,packet type=Life Type, flag=0x8000, lorv=seconds
02:55:48 ipsec,debug,packet type=Life Duration, flag=0x8000, lorv=28800
02:55:48 ipsec,debug,packet type=Encryption Algorithm, flag=0x8000, lorv=3DES-CBC
02:55:48 ipsec,debug,packet type=Authentication Method, flag=0x8000, lorv=pre-shared key
02:55:48 ipsec,debug,packet type=Hash Algorithm, flag=0x8000, lorv=SHA
02:55:48 ipsec,debug,packet type=Group Description, flag=0x8000, lorv=1024-bit MODP group
02:55:48 ipsec,debug,packet Compared: Local:Peer
02:55:48 ipsec,debug,packet (lifetime = 86400:28800)
02:55:48 ipsec,debug,packet (lifebyte = 0:0)
02:55:48 ipsec,debug,packet enctype = 3DES-CBC:3DES-CBC
02:55:48 ipsec,debug,packet (encklen = 0:0)
02:55:48 ipsec,debug,packet hashtype = SHA:SHA
02:55:48 ipsec,debug,packet authmethod = XAuth pskey server:pre-shared key
02:55:48 ipsec,debug,packet dh_group = 1024-bit MODP group:1024-bit MODP group
02:55:48 ipsec,debug,packet Compared: Local:Peer
02:55:48 ipsec,debug,packet (lifetime = 86400:28800)
02:55:48 ipsec,debug,packet (lifebyte = 0:0)
02:55:48 ipsec,debug,packet enctype = AES-CBC:3DES-CBC
02:55:48 ipsec,debug,packet (encklen = 128:0)
02:55:48 ipsec,debug,packet hashtype = SHA:SHA
02:55:48 ipsec,debug,packet authmethod = XAuth pskey server:pre-shared key
02:55:48 ipsec,debug,packet dh_group = 1024-bit MODP group:1024-bit MODP group
02:55:48 ipsec,debug,packet Compared: Local:Peer
02:55:48 ipsec,debug,packet (lifetime = 86400:28800)
02:55:48 ipsec,debug,packet (lifebyte = 0:0)
02:55:48 ipsec,debug,packet enctype = AES-CBC:3DES-CBC
02:55:48 ipsec,debug,packet (encklen = 256:0)
02:55:48 ipsec,debug,packet hashtype = SHA:SHA
02:55:48 ipsec,debug,packet authmethod = XAuth pskey server:pre-shared key
02:55:48 ipsec,debug,packet dh_group = 1024-bit MODP group:1024-bit MODP group
02:55:48 ipsec,debug,packet prop#=1, prot-id=ISAKMP, spi-size=0, #trns=8
02:55:48 ipsec,debug,packet trns#=6, trns-id=IKE
02:55:48 ipsec,debug,packet type=Life Type, flag=0x8000, lorv=seconds
02:55:48 ipsec,debug,packet type=Life Duration, flag=0x8000, lorv=28800
02:55:48 ipsec,debug,packet type=Encryption Algorithm, flag=0x8000, lorv=3DES-CBC
02:55:48 ipsec,debug,packet type=Authentication Method, flag=0x8000, lorv=pre-shared key
02:55:48 ipsec,debug,packet type=Hash Algorithm, flag=0x8000, lorv=MD5
02:55:48 ipsec,debug,packet type=Group Description, flag=0x8000, lorv=1024-bit MODP group
02:55:48 ipsec,debug,packet Compared: Local:Peer
02:55:48 ipsec,debug,packet (lifetime = 86400:28800)
02:55:48 ipsec,debug,packet (lifebyte = 0:0)
02:55:48 ipsec,debug,packet enctype = 3DES-CBC:3DES-CBC
02:55:48 ipsec,debug,packet (encklen = 0:0)
02:55:48 ipsec,debug,packet hashtype = SHA:MD5
02:55:48 ipsec,debug,packet authmethod = XAuth pskey server:pre-shared key
02:55:48 ipsec,debug,packet dh_group = 1024-bit MODP group:1024-bit MODP group
02:55:48 ipsec,debug,packet Compared: Local:Peer
02:55:48 ipsec,debug,packet (lifetime = 86400:28800)
02:55:48 ipsec,debug,packet (lifebyte = 0:0)
02:55:48 ipsec,debug,packet enctype = AES-CBC:3DES-CBC
02:55:48 ipsec,debug,packet (encklen = 128:0)
02:55:48 ipsec,debug,packet hashtype = SHA:MD5
02:55:48 ipsec,debug,packet authmethod = XAuth pskey server:pre-shared key
02:55:48 ipsec,debug,packet dh_group = 1024-bit MODP group:1024-bit MODP group
02:55:48 ipsec,debug,packet Compared: Local:Peer
02:55:48 ipsec,debug,packet (lifetime = 86400:28800)
02:55:48 ipsec,debug,packet (lifebyte = 0:0)
02:55:48 ipsec,debug,packet enctype = AES-CBC:3DES-CBC
02:55:48 ipsec,debug,packet (encklen = 256:0)
02:55:48 ipsec,debug,packet hashtype = SHA:MD5
02:55:48 ipsec,debug,packet authmethod = XAuth pskey server:pre-shared key
02:55:48 ipsec,debug,packet dh_group = 1024-bit MODP group:1024-bit MODP group
02:55:48 ipsec,debug,packet prop#=1, prot-id=ISAKMP, spi-size=0, #trns=8
02:55:48 ipsec,debug,packet trns#=7, trns-id=IKE
02:55:48 ipsec,debug,packet type=Life Type, flag=0x8000, lorv=seconds
02:55:48 ipsec,debug,packet type=Life Duration, flag=0x8000, lorv=28800
02:55:48 ipsec,debug,packet type=Encryption Algorithm, flag=0x8000, lorv=DES-CBC
02:55:48 ipsec,debug,packet type=Authentication Method, flag=0x8000, lorv=pre-shared key
02:55:48 ipsec,debug,packet type=Hash Algorithm, flag=0x8000, lorv=SHA
02:55:48 ipsec,debug,packet type=Group Description, flag=0x8000, lorv=1024-bit MODP group
02:55:48 ipsec,debug,packet Compared: Local:Peer
02:55:48 ipsec,debug,packet (lifetime = 86400:28800)
02:55:48 ipsec,debug,packet (lifebyte = 0:0)
02:55:48 ipsec,debug,packet enctype = 3DES-CBC:DES-CBC
02:55:48 ipsec,debug,packet (encklen = 0:0)
02:55:48 ipsec,debug,packet hashtype = SHA:SHA
02:55:48 ipsec,debug,packet authmethod = XAuth pskey server:pre-shared key
02:55:48 ipsec,debug,packet dh_group = 1024-bit MODP group:1024-bit MODP group
02:55:48 ipsec,debug,packet Compared: Local:Peer
02:55:48 ipsec,debug,packet (lifetime = 86400:28800)
02:55:48 ipsec,debug,packet (lifebyte = 0:0)
02:55:48 ipsec,debug,packet enctype = AES-CBC:DES-CBC
02:55:48 ipsec,debug,packet (encklen = 128:0)
02:55:48 ipsec,debug,packet hashtype = SHA:SHA
02:55:48 ipsec,debug,packet authmethod = XAuth pskey server:pre-shared key
02:55:48 ipsec,debug,packet dh_group = 1024-bit MODP group:1024-bit MODP group
02:55:48 ipsec,debug,packet Compared: Local:Peer
02:55:48 ipsec,debug,packet (lifetime = 86400:28800)
02:55:48 ipsec,debug,packet (lifebyte = 0:0)
02:55:48 ipsec,debug,packet enctype = AES-CBC:DES-CBC
02:55:48 ipsec,debug,packet (encklen = 256:0)
02:55:48 ipsec,debug,packet hashtype = SHA:SHA
02:55:48 ipsec,debug,packet authmethod = XAuth pskey server:pre-shared key
02:55:48 ipsec,debug,packet dh_group = 1024-bit MODP group:1024-bit MODP group
02:55:48 ipsec,debug,packet prop#=1, prot-id=ISAKMP, spi-size=0, #trns=8
02:55:48 ipsec,debug,packet trns#=8, trns-id=IKE
02:55:48 ipsec,debug,packet type=Life Type, flag=0x8000, lorv=seconds
02:55:48 ipsec,debug,packet type=Life Duration, flag=0x8000, lorv=28800
02:55:48 ipsec,debug,packet type=Encryption Algorithm, flag=0x8000, lorv=DES-CBC
02:55:48 ipsec,debug,packet type=Authentication Method, flag=0x8000, lorv=pre-shared key
02:55:48 ipsec,debug,packet type=Hash Algorithm, flag=0x8000, lorv=MD5
02:55:48 ipsec,debug,packet type=Group Description, flag=0x8000, lorv=1024-bit MODP group
02:55:48 ipsec,debug,packet Compared: Local:Peer
02:55:48 ipsec,debug,packet (lifetime = 86400:28800)
02:55:48 ipsec,debug,packet (lifebyte = 0:0)
02:55:48 ipsec,debug,packet enctype = 3DES-CBC:DES-CBC
02:55:48 ipsec,debug,packet (encklen = 0:0)
02:55:48 ipsec,debug,packet hashtype = SHA:MD5
02:55:48 ipsec,debug,packet authmethod = XAuth pskey server:pre-shared key
02:55:48 ipsec,debug,packet dh_group = 1024-bit MODP group:1024-bit MODP group
02:55:48 ipsec,debug,packet Compared: Local:Peer
02:55:48 ipsec,debug,packet (lifetime = 86400:28800)
02:55:48 ipsec,debug,packet (lifebyte = 0:0)
02:55:48 ipsec,debug,packet enctype = AES-CBC:DES-CBC
02:55:48 ipsec,debug,packet (encklen = 128:0)
02:55:48 ipsec,debug,packet hashtype = SHA:MD5
02:55:48 ipsec,debug,packet authmethod = XAuth pskey server:pre-shared key
02:55:48 ipsec,debug,packet dh_group = 1024-bit MODP group:1024-bit MODP group
02:55:48 ipsec,debug,packet Compared: Local:Peer
02:55:48 ipsec,debug,packet (lifetime = 86400:28800)
02:55:48 ipsec,debug,packet (lifebyte = 0:0)
02:55:48 ipsec,debug,packet enctype = AES-CBC:DES-CBC
02:55:48 ipsec,debug,packet (encklen = 256:0)
02:55:48 ipsec,debug,packet hashtype = SHA:MD5
02:55:48 ipsec,debug,packet authmethod = XAuth pskey server:pre-shared key
02:55:48 ipsec,debug,packet dh_group = 1024-bit MODP group:1024-bit MODP group
02:55:48 ipsec,debug,packet type=Life Type, flag=0x8000, lorv=seconds
02:55:48 ipsec,debug,packet type=Life Duration, flag=0x8000, lorv=28800
02:55:48 ipsec,debug,packet type=Encryption Algorithm, flag=0x8000, lorv=AES-CBC
02:55:48 ipsec,debug,packet type=Key Length, flag=0x8000, lorv=256
02:55:48 ipsec,debug,packet type=Authentication Method, flag=0x8000, lorv=pre-shared key
02:55:48 ipsec,debug,packet type=Hash Algorithm, flag=0x8000, lorv=SHA
02:55:48 ipsec,debug,packet type=Group Description, flag=0x8000, lorv=1024-bit MODP group
02:55:48 ipsec,debug rejected enctype: DB(prop#1:trns#1):Peer(prop#1:trns#1) = 3DES-CBC:AES-CBC
02:55:48 ipsec,debug rejected authmethod: DB(prop#1:trns#1):Peer(prop#1:trns#1) = XAuth pskey server:pre-shared key
02:55:48 ipsec,debug rejected authmethod: DB(prop#1:trns#2):Peer(prop#1:trns#1) = XAuth pskey server:pre-shared key
02:55:48 ipsec,debug rejected authmethod: DB(prop#1:trns#3):Peer(prop#1:trns#1) = XAuth pskey server:pre-shared key
02:55:48 ipsec,debug,packet type=Life Type, flag=0x8000, lorv=seconds
02:55:48 ipsec,debug,packet type=Life Duration, flag=0x8000, lorv=28800
02:55:48 ipsec,debug,packet type=Encryption Algorithm, flag=0x8000, lorv=AES-CBC
02:55:48 ipsec,debug,packet type=Key Length, flag=0x8000, lorv=256
02:55:48 ipsec,debug,packet type=Authentication Method, flag=0x8000, lorv=pre-shared key
02:55:48 ipsec,debug,packet type=Hash Algorithm, flag=0x8000, lorv=MD5
02:55:48 ipsec,debug,packet type=Group Description, flag=0x8000, lorv=1024-bit MODP group
02:55:48 ipsec,debug rejected enctype: DB(prop#1:trns#1):Peer(prop#1:trns#2) = 3DES-CBC:AES-CBC
02:55:48 ipsec,debug rejected authmethod: DB(prop#1:trns#1):Peer(prop#1:trns#2) = XAuth pskey server:pre-shared key
02:55:48 ipsec,debug rejected hashtype: DB(prop#1:trns#1):Peer(prop#1:trns#2) = SHA:MD5
02:55:48 ipsec,debug rejected authmethod: DB(prop#1:trns#2):Peer(prop#1:trns#2) = XAuth pskey server:pre-shared key
02:55:48 ipsec,debug rejected hashtype: DB(prop#1:trns#2):Peer(prop#1:trns#2) = SHA:MD5
02:55:48 ipsec,debug rejected authmethod: DB(prop#1:trns#3):Peer(prop#1:trns#2) = XAuth pskey server:pre-shared key
02:55:48 ipsec,debug rejected hashtype: DB(prop#1:trns#3):Peer(prop#1:trns#2) = SHA:MD5
02:55:48 ipsec,debug,packet type=Life Type, flag=0x8000, lorv=seconds
02:55:48 ipsec,debug,packet type=Life Duration, flag=0x8000, lorv=28800
02:55:48 ipsec,debug,packet type=Encryption Algorithm, flag=0x8000, lorv=AES-CBC
02:55:48 ipsec,debug,packet type=Key Length, flag=0x8000, lorv=128
02:55:48 ipsec,debug,packet type=Authentication Method, flag=0x8000, lorv=pre-shared key
02:55:48 ipsec,debug,packet type=Hash Algorithm, flag=0x8000, lorv=SHA
02:55:48 ipsec,debug,packet type=Group Description, flag=0x8000, lorv=1024-bit MODP group
02:55:48 ipsec,debug rejected enctype: DB(prop#1:trns#1):Peer(prop#1:trns#3) = 3DES-CBC:AES-CBC
02:55:48 ipsec,debug rejected authmethod: DB(prop#1:trns#1):Peer(prop#1:trns#3) = XAuth pskey server:pre-shared key
02:55:48 ipsec,debug rejected authmethod: DB(prop#1:trns#2):Peer(prop#1:trns#3) = XAuth pskey server:pre-shared key
02:55:48 ipsec,debug rejected authmethod: DB(prop#1:trns#3):Peer(prop#1:trns#3) = XAuth pskey server:pre-shared key
02:55:48 ipsec,debug,packet type=Life Type, flag=0x8000, lorv=seconds
02:55:48 ipsec,debug,packet type=Life Duration, flag=0x8000, lorv=28800
02:55:48 ipsec,debug,packet type=Encryption Algorithm, flag=0x8000, lorv=AES-CBC
02:55:48 ipsec,debug,packet type=Key Length, flag=0x8000, lorv=128
02:55:48 ipsec,debug,packet type=Authentication Method, flag=0x8000, lorv=pre-shared key
02:55:48 ipsec,debug,packet type=Hash Algorithm, flag=0x8000, lorv=MD5
02:55:48 ipsec,debug,packet type=Group Description, flag=0x8000, lorv=1024-bit MODP group
02:55:48 ipsec,debug rejected enctype: DB(prop#1:trns#1):Peer(prop#1:trns#4) = 3DES-CBC:AES-CBC
02:55:48 ipsec,debug rejected authmethod: DB(prop#1:trns#1):Peer(prop#1:trns#4) = XAuth pskey server:pre-shared key
02:55:48 ipsec,debug rejected hashtype: DB(prop#1:trns#1):Peer(prop#1:trns#4) = SHA:MD5
02:55:48 ipsec,debug rejected authmethod: DB(prop#1:trns#2):Peer(prop#1:trns#4) = XAuth pskey server:pre-shared key
02:55:48 ipsec,debug rejected hashtype: DB(prop#1:trns#2):Peer(prop#1:trns#4) = SHA:MD5
02:55:48 ipsec,debug rejected authmethod: DB(prop#1:trns#3):Peer(prop#1:trns#4) = XAuth pskey server:pre-shared key
02:55:48 ipsec,debug rejected hashtype: DB(prop#1:trns#3):Peer(prop#1:trns#4) = SHA:MD5
02:55:48 ipsec,debug,packet type=Life Type, flag=0x8000, lorv=seconds
02:55:48 ipsec,debug,packet type=Life Duration, flag=0x8000, lorv=28800
02:55:48 ipsec,debug,packet type=Encryption Algorithm, flag=0x8000, lorv=3DES-CBC
02:55:48 ipsec,debug,packet type=Authentication Method, flag=0x8000, lorv=pre-shared key
02:55:48 ipsec,debug,packet type=Hash Algorithm, flag=0x8000, lorv=SHA
02:55:48 ipsec,debug,packet type=Group Description, flag=0x8000, lorv=1024-bit MODP group
02:55:48 ipsec,debug rejected authmethod: DB(prop#1:trns#1):Peer(prop#1:trns#5) = XAuth pskey server:pre-shared key
02:55:48 ipsec,debug rejected enctype: DB(prop#1:trns#2):Peer(prop#1:trns#5) = AES-CBC:3DES-CBC
02:55:48 ipsec,debug rejected authmethod: DB(prop#1:trns#2):Peer(prop#1:trns#5) = XAuth pskey server:pre-shared key
02:55:48 ipsec,debug rejected enctype: DB(prop#1:trns#3):Peer(prop#1:trns#5) = AES-CBC:3DES-CBC
02:55:48 ipsec,debug rejected authmethod: DB(prop#1:trns#3):Peer(prop#1:trns#5) = XAuth pskey server:pre-shared key
02:55:48 ipsec,debug,packet type=Life Type, flag=0x8000, lorv=seconds
02:55:48 ipsec,debug,packet type=Life Duration, flag=0x8000, lorv=28800
02:55:48 ipsec,debug,packet type=Encryption Algorithm, flag=0x8000, lorv=3DES-CBC
02:55:48 ipsec,debug,packet type=Authentication Method, flag=0x8000, lorv=pre-shared key
02:55:48 ipsec,debug,packet type=Hash Algorithm, flag=0x8000, lorv=MD5
02:55:48 ipsec,debug,packet type=Group Description, flag=0x8000, lorv=1024-bit MODP group
02:55:48 ipsec,debug rejected authmethod: DB(prop#1:trns#1):Peer(prop#1:trns#6) = XAuth pskey server:pre-shared key
02:55:48 ipsec,debug rejected hashtype: DB(prop#1:trns#1):Peer(prop#1:trns#6) = SHA:MD5
02:55:48 ipsec,debug rejected enctype: DB(prop#1:trns#2):Peer(prop#1:trns#6) = AES-CBC:3DES-CBC
02:55:48 ipsec,debug rejected authmethod: DB(prop#1:trns#2):Peer(prop#1:trns#6) = XAuth pskey server:pre-shared key
02:55:48 ipsec,debug rejected hashtype: DB(prop#1:trns#2):Peer(prop#1:trns#6) = SHA:MD5
02:55:48 ipsec,debug rejected enctype: DB(prop#1:trns#3):Peer(prop#1:trns#6) = AES-CBC:3DES-CBC
02:55:48 ipsec,debug rejected authmethod: DB(prop#1:trns#3):Peer(prop#1:trns#6) = XAuth pskey server:pre-shared key
02:55:48 ipsec,debug rejected hashtype: DB(prop#1:trns#3):Peer(prop#1:trns#6) = SHA:MD5
02:55:48 ipsec,debug,packet type=Life Type, flag=0x8000, lorv=seconds
02:55:48 ipsec,debug,packet type=Life Duration, flag=0x8000, lorv=28800
02:55:48 ipsec,debug,packet type=Encryption Algorithm, flag=0x8000, lorv=DES-CBC
02:55:48 ipsec,debug,packet type=Authentication Method, flag=0x8000, lorv=pre-shared key
02:55:48 ipsec,debug,packet type=Hash Algorithm, flag=0x8000, lorv=SHA
02:55:48 ipsec,debug,packet type=Group Description, flag=0x8000, lorv=1024-bit MODP group
02:55:48 ipsec,debug rejected enctype: DB(prop#1:trns#1):Peer(prop#1:trns#7) = 3DES-CBC:DES-CBC
02:55:48 ipsec,debug rejected authmethod: DB(prop#1:trns#1):Peer(prop#1:trns#7) = XAuth pskey server:pre-shared key
02:55:48 ipsec,debug rejected enctype: DB(prop#1:trns#2):Peer(prop#1:trns#7) = AES-CBC:DES-CBC
02:55:48 ipsec,debug rejected authmethod: DB(prop#1:trns#2):Peer(prop#1:trns#7) = XAuth pskey server:pre-shared key
02:55:48 ipsec,debug rejected enctype: DB(prop#1:trns#3):Peer(prop#1:trns#7) = AES-CBC:DES-CBC
02:55:48 ipsec,debug rejected authmethod: DB(prop#1:trns#3):Peer(prop#1:trns#7) = XAuth pskey server:pre-shared key
02:55:48 ipsec,debug,packet type=Life Type, flag=0x8000, lorv=seconds
02:55:48 ipsec,debug,packet type=Life Duration, flag=0x8000, lorv=28800
02:55:48 ipsec,debug,packet type=Encryption Algorithm, flag=0x8000, lorv=DES-CBC
02:55:48 ipsec,debug,packet type=Authentication Method, flag=0x8000, lorv=pre-shared key
02:55:48 ipsec,debug,packet type=Hash Algorithm, flag=0x8000, lorv=MD5
02:55:48 ipsec,debug,packet type=Group Description, flag=0x8000, lorv=1024-bit MODP group
02:55:48 ipsec,debug rejected enctype: DB(prop#1:trns#1):Peer(prop#1:trns#8) = 3DES-CBC:DES-CBC
02:55:48 ipsec,debug rejected authmethod: DB(prop#1:trns#1):Peer(prop#1:trns#8) = XAuth pskey server:pre-shared key
02:55:48 ipsec,debug rejected hashtype: DB(prop#1:trns#1):Peer(prop#1:trns#8) = SHA:MD5
02:55:48 ipsec,debug rejected enctype: DB(prop#1:trns#2):Peer(prop#1:trns#8) = AES-CBC:DES-CBC
02:55:48 ipsec,debug rejected authmethod: DB(prop#1:trns#2):Peer(prop#1:trns#8) = XAuth pskey server:pre-shared key
02:55:48 ipsec,debug rejected hashtype: DB(prop#1:trns#2):Peer(prop#1:trns#8) = SHA:MD5
02:55:48 ipsec,debug rejected enctype: DB(prop#1:trns#3):Peer(prop#1:trns#8) = AES-CBC:DES-CBC
02:55:48 ipsec,debug rejected authmethod: DB(prop#1:trns#3):Peer(prop#1:trns#8) = XAuth pskey server:pre-shared key
02:55:48 ipsec,debug rejected hashtype: DB(prop#1:trns#3):Peer(prop#1:trns#8) = SHA:MD5
02:55:48 ipsec,debug no suitable proposal found.
02:55:51 ipsec,debug,packet ==========
02:55:51 ipsec,debug,packet 444 bytes message received from 70.214.6.78[12474] to 173.8.172.89[500]
02:55:51 ipsec,debug,packet c15c59c8 da02ef0b 00000000 00000000 01100200 00000000 000001bc 0d000124
02:55:51 ipsec,debug,packet 00000001 00000001 00000118 01010008 03000024 01010000 800b0001 800c7080
02:55:51 ipsec,debug,packet 80010007 800e0100 80030001 80020002 80040002 03000024 02010000 800b0001
02:55:51 ipsec,debug,packet 800c7080 80010007 800e0100 80030001 80020001 80040002 03000024 03010000
02:55:51 ipsec,debug,packet 800b0001 800c7080 80010007 800e0080 80030001 80020002 80040002 03000024
02:55:51 ipsec,debug,packet 04010000 800b0001 800c7080 80010007 800e0080 80030001 80020001 80040002
02:55:51 ipsec,debug,packet 03000020 05010000 800b0001 800c7080 80010005 80030001 80020002 80040002
02:55:51 ipsec,debug,packet 03000020 06010000 800b0001 800c7080 80010005 80030001 80020001 80040002
02:55:51 ipsec,debug,packet 03000020 07010000 800b0001 800c7080 80010001 80030001 80020002 80040002
02:55:51 ipsec,debug,packet 00000020 08010000 800b0001 800c7080 80010001 80030001 80020001 80040002
02:55:51 ipsec,debug,packet 0d000014 4a131c81 07035845 5c5728f2 0e95452f 0d000014 cd604643 35df21f8
02:55:51 ipsec,debug,packet 7cfdb2fc 68b6a448 0d000014 90cb8091 3ebb696e 086381b5 ec427b1f 0d000014
02:55:51 ipsec,debug,packet 4485152d 18b6bbcd 0be8a846 9579ddcc 0d000018 4048b7d5 6ebce885 25e7de7f
02:55:51 ipsec,debug,packet 00d6c2d3 80000000 00000014 afcad713 68a1f1c9 6b8696fc 77570100
02:55:51 ipsec,debug,packet ===
02:55:51 ipsec,debug,packet begin.
02:55:51 ipsec,debug,packet seen nptype=1(sa)
02:55:51 ipsec,debug,packet seen nptype=13(vid)
02:55:51 ipsec,debug,packet seen nptype=13(vid)
02:55:51 ipsec,debug,packet seen nptype=13(vid)
02:55:51 ipsec,debug,packet seen nptype=13(vid)
02:55:51 ipsec,debug,packet seen nptype=13(vid)
02:55:51 ipsec,debug,packet seen nptype=13(vid)
02:55:51 ipsec,debug,packet succeed.
02:55:51 ipsec,debug received Vendor ID: RFC 3947
02:55:51 ipsec,debug received Vendor ID: draft-ietf-ipsec-nat-t-ike-02
02:55:51 ipsec,debug received Vendor ID: draft-ietf-ipsec-nat-t-ike-02
02:55:51 ipsec,debug
02:55:51 ipsec,debug received Vendor ID: draft-ietf-ipsec-nat-t-ike-00
02:55:51 ipsec,debug received broken Microsoft ID: FRAGMENTATION
02:55:51 ipsec,debug received Vendor ID: DPD
02:55:51 ipsec,debug,packet remote supports DPD
02:55:51 ipsec,debug Selected NAT-T version: RFC 3947
02:55:51 ipsec,debug,packet total SA len=288
02:55:51 ipsec,debug,packet 00000001 00000001 00000118 01010008 03000024 01010000 800b0001 800c7080
02:55:51 ipsec,debug,packet 80010007 800e0100 80030001 80020002 80040002 03000024 02010000 800b0001
02:55:51 ipsec,debug,packet 800c7080 80010007 800e0100 80030001 80020001 80040002 03000024 03010000
02:55:51 ipsec,debug,packet 800b0001 800c7080 80010007 800e0080 80030001 80020002 80040002 03000024
02:55:51 ipsec,debug,packet 04010000 800b0001 800c7080 80010007 800e0080 80030001 80020001 80040002
02:55:51 ipsec,debug,packet 03000020 05010000 800b0001 800c7080 80010005 80030001 80020002 80040002
02:55:51 ipsec,debug,packet 03000020 06010000 800b0001 800c7080 80010005 80030001 80020001 80040002
02:55:51 ipsec,debug,packet 03000020 07010000 800b0001 800c7080 80010001 80030001 80020002 80040002
02:55:51 ipsec,debug,packet 00000020 08010000 800b0001 800c7080 80010001 80030001 80020001 80040002
02:55:51 ipsec,debug,packet begin.
02:55:51 ipsec,debug,packet seen nptype=2(prop)
02:55:51 ipsec,debug,packet succeed.
02:55:51 ipsec,debug,packet proposal #1 len=280
02:55:51 ipsec,debug,packet begin.
02:55:51 ipsec,debug,packet seen nptype=3(trns)
02:55:51 ipsec,debug,packet seen nptype=3(trns)
02:55:51 ipsec,debug,packet seen nptype=3(trns)
02:55:51 ipsec,debug,packet seen nptype=3(trns)
02:55:51 ipsec,debug,packet seen nptype=3(trns)
02:55:51 ipsec,debug,packet seen nptype=3(trns)
02:55:51 ipsec,debug,packet seen nptype=3(trns)
02:55:51 ipsec,debug,packet seen nptype=3(trns)
02:55:51 ipsec,debug,packet succeed.
02:55:51 ipsec,debug,packet transform #1 len=36
02:55:51 ipsec,debug,packet type=Life Type, flag=0x8000, lorv=seconds
02:55:51 ipsec,debug,packet type=Life Duration, flag=0x8000, lorv=28800
02:55:51 ipsec,debug,packet type=Encryption Algorithm, flag=0x8000, lorv=AES-CBC
02:55:51 ipsec,debug,packet encryption(aes)
02:55:51 ipsec,debug,packet type=Key Length, flag=0x8000, lorv=256
02:55:51 ipsec,debug,packet type=Authentication Method, flag=0x8000, lorv=pre-shared key
02:55:51 ipsec,debug,packet type=Hash Algorithm, flag=0x8000, lorv=SHA
02:55:51 ipsec,debug,packet hash(sha1)
02:55:51 ipsec,debug,packet type=Group Description, flag=0x8000, lorv=1024-bit MODP group
02:55:51 ipsec,debug,packet dh(modp1024)
02:55:51 ipsec,debug,packet transform #2 len=36
02:55:51 ipsec,debug,packet type=Life Type, flag=0x8000, lorv=seconds
02:55:51 ipsec,debug,packet type=Life Duration, flag=0x8000, lorv=28800
02:55:51 ipsec,debug,packet type=Encryption Algorithm, flag=0x8000, lorv=AES-CBC
02:55:51 ipsec,debug,packet encryption(aes)
02:55:51 ipsec,debug,packet type=Key Length, flag=0x8000, lorv=256
02:55:51 ipsec,debug,packet type=Authentication Method, flag=0x8000, lorv=pre-shared key
02:55:51 ipsec,debug,packet type=Hash Algorithm, flag=0x8000, lorv=MD5
02:55:51 ipsec,debug,packet hash(md5)
02:55:51 ipsec,debug,packet type=Group Description, flag=0x8000, lorv=1024-bit MODP group
02:55:51 ipsec,debug,packet dh(modp1024)
02:55:51 ipsec,debug,packet transform #3 len=36
02:55:51 ipsec,debug,packet type=Life Type, flag=0x8000, lorv=seconds
02:55:51 ipsec,debug,packet type=Life Duration, flag=0x8000, lorv=28800
02:55:51 ipsec,debug,packet type=Encryption Algorithm, flag=0x8000, lorv=AES-CBC
02:55:51 ipsec,debug,packet encryption(aes)
02:55:51 ipsec,debug,packet type=Key Length, flag=0x8000, lorv=128
02:55:51 ipsec,debug,packet type=Authentication Method, flag=0x8000, lorv=pre-shared key
02:55:51 ipsec,debug,packet type=Hash Algorithm, flag=0x8000, lorv=SHA
02:55:51 ipsec,debug,packet hash(sha1)
02:55:51 ipsec,debug,packet type=Group Description, flag=0x8000, lorv=1024-bit MODP group
02:55:51 ipsec,debug,packet dh(modp1024)
02:55:51 ipsec,debug,packet transform #4 len=36
02:55:51 ipsec,debug,packet type=Life Type, flag=0x8000, lorv=seconds
02:55:51 ipsec,debug,packet type=Life Duration, flag=0x8000, lorv=28800
02:55:51 ipsec,debug,packet type=Encryption Algorithm, flag=0x8000, lorv=AES-CBC
02:55:51 ipsec,debug,packet encryption(aes)
02:55:51 ipsec,debug,packet type=Key Length, flag=0x8000, lorv=128
02:55:51 ipsec,debug,packet type=Authentication Method, flag=0x8000, lorv=pre-shared key
02:55:51 ipsec,debug,packet type=Hash Algorithm, flag=0x8000, lorv=MD5
02:55:51 ipsec,debug,packet hash(md5)
02:55:51 ipsec,debug,packet type=Group Description, flag=0x8000, lorv=1024-bit MODP group
02:55:51 ipsec,debug,packet dh(modp1024)
02:55:51 ipsec,debug,packet transform #5 len=32
02:55:51 ipsec,debug,packet type=Life Type, flag=0x8000, lorv=seconds
02:55:51 ipsec,debug,packet type=Life Duration, flag=0x8000, lorv=28800
02:55:51 ipsec,debug,packet type=Encryption Algorithm, flag=0x8000, lorv=3DES-CBC
02:55:51 ipsec,debug,packet encryption(3des)
02:55:51 ipsec,debug,packet type=Authentication Method, flag=0x8000, lorv=pre-shared key
02:55:51 ipsec,debug,packet type=Hash Algorithm, flag=0x8000, lorv=SHA
02:55:51 ipsec,debug,packet hash(sha1)
02:55:51 ipsec,debug,packet type=Group Description, flag=0x8000, lorv=1024-bit MODP group
02:55:51 ipsec,debug,packet dh(modp1024)
02:55:51 ipsec,debug,packet transform #6 len=32
02:55:51 ipsec,debug,packet type=Life Type, flag=0x8000, lorv=seconds
02:55:51 ipsec,debug,packet type=Life Duration, flag=0x8000, lorv=28800
02:55:51 ipsec,debug,packet type=Encryption Algorithm, flag=0x8000, lorv=3DES-CBC
02:55:51 ipsec,debug,packet encryption(3des)
02:55:51 ipsec,debug,packet type=Authentication Method, flag=0x8000, lorv=pre-shared key
02:55:51 ipsec,debug,packet type=Hash Algorithm, flag=0x8000, lorv=MD5
02:55:51 ipsec,debug,packet hash(md5)
02:55:51 ipsec,debug,packet type=Group Description, flag=0x8000, lorv=1024-bit MODP group
02:55:51 ipsec,debug,packet dh(modp1024)
02:55:51 ipsec,debug,packet transform #7 len=32
02:55:51 ipsec,debug,packet type=Life Type, flag=0x8000, lorv=seconds
02:55:51 ipsec,debug,packet type=Life Duration, flag=0x8000, lorv=28800
02:55:51 ipsec,debug,packet type=Encryption Algorithm, flag=0x8000, lorv=DES-CBC
02:55:51 ipsec,debug,packet encryption(des)
02:55:51 ipsec,debug,packet type=Authentication Method, flag=0x8000, lorv=pre-shared key
02:55:51 ipsec,debug,packet type=Hash Algorithm, flag=0x8000, lorv=SHA
02:55:51 ipsec,debug,packet hash(sha1)
02:55:51 ipsec,debug,packet type=Group Description, flag=0x8000, lorv=1024-bit MODP group
02:55:51 ipsec,debug,packet dh(modp1024)
02:55:51 ipsec,debug,packet transform #8 len=32
02:55:51 ipsec,debug,packet type=Life Type, flag=0x8000, lorv=seconds
02:55:51 ipsec,debug,packet type=Life Duration, flag=0x8000, lorv=28800
02:55:51 ipsec,debug,packet type=Encryption Algorithm, flag=0x8000, lorv=DES-CBC
02:55:51 ipsec,debug,packet encryption(des)
02:55:51 ipsec,debug,packet type=Authentication Method, flag=0x8000, lorv=pre-shared key
02:55:51 ipsec,debug,packet type=Hash Algorithm, flag=0x8000, lorv=MD5
02:55:51 ipsec,debug,packet hash(md5)
02:55:51 ipsec,debug,packet type=Group Description, flag=0x8000, lorv=1024-bit MODP group
02:55:51 ipsec,debug,packet dh(modp1024)
02:55:51 ipsec,debug,packet pair 1:
02:55:51 ipsec,debug,packet 0x47cca8: next=(nil) tnext=0x478948
02:55:51 ipsec,debug,packet 0x478948: next=(nil) tnext=0x47e6d8
02:55:51 ipsec,debug,packet 0x47e6d8: next=(nil) tnext=0x47bba0
02:55:51 ipsec,debug,packet 0x47bba0: next=(nil) tnext=0x47f4d8
02:55:51 ipsec,debug,packet 0x47f4d8: next=(nil) tnext=0x479330
02:55:51 ipsec,debug,packet 0x479330: next=(nil) tnext=0x47e368
02:55:51 ipsec,debug,packet 0x47e368: next=(nil) tnext=0x47e380
02:55:51 ipsec,debug,packet 0x47e380: next=(nil) tnext=(nil)
02:55:51 ipsec,debug,packet proposal #1: 8 transform
02:55:51 ipsec,debug,packet prop#=1, prot-id=ISAKMP, spi-size=0, #trns=8
02:55:51 ipsec,debug,packet trns#=1, trns-id=IKE
02:55:51 ipsec,debug,packet type=Life Type, flag=0x8000, lorv=seconds
02:55:51 ipsec,debug,packet type=Life Duration, flag=0x8000, lorv=28800
02:55:51 ipsec,debug,packet type=Encryption Algorithm, flag=0x8000, lorv=AES-CBC
02:55:51 ipsec,debug,packet type=Key Length, flag=0x8000, lorv=256
02:55:51 ipsec,debug,packet type=Authentication Method, flag=0x8000, lorv=pre-shared key
02:55:51 ipsec,debug,packet type=Hash Algorithm, flag=0x8000, lorv=SHA
02:55:51 ipsec,debug,packet type=Group Description, flag=0x8000, lorv=1024-bit MODP group
02:55:51 ipsec,debug,packet Compared: Local:Peer
02:55:51 ipsec,debug,packet (lifetime = 86400:28800)
02:55:51 ipsec,debug,packet (lifebyte = 0:0)
02:55:51 ipsec,debug,packet enctype = 3DES-CBC:AES-CBC
02:55:51 ipsec,debug,packet (encklen = 0:256)
02:55:51 ipsec,debug,packet hashtype = SHA:SHA
02:55:51 ipsec,debug,packet authmethod = XAuth pskey server:pre-shared key
02:55:51 ipsec,debug,packet dh_group = 1024-bit MODP group:1024-bit MODP group
02:55:51 ipsec,debug,packet Compared: Local:Peer
02:55:51 ipsec,debug,packet (lifetime = 86400:28800)
02:55:51 ipsec,debug,packet (lifebyte = 0:0)
02:55:51 ipsec,debug,packet enctype = AES-CBC:AES-CBC
02:55:51 ipsec,debug,packet (encklen = 128:256)
02:55:51 ipsec,debug,packet hashtype = SHA:SHA
02:55:51 ipsec,debug,packet authmethod = XAuth pskey server:pre-shared key
02:55:51 ipsec,debug,packet dh_group = 1024-bit MODP group:1024-bit MODP group
02:55:51 ipsec,debug,packet Compared: Local:Peer
02:55:51 ipsec,debug,packet (lifetime = 86400:28800)
02:55:51 ipsec,debug,packet (lifebyte = 0:0)
02:55:51 ipsec,debug,packet enctype = AES-CBC:AES-CBC
02:55:51 ipsec,debug,packet (encklen = 256:256)
02:55:51 ipsec,debug,packet hashtype = SHA:SHA
02:55:51 ipsec,debug,packet authmethod = XAuth pskey server:pre-shared key
02:55:51 ipsec,debug,packet dh_group = 1024-bit MODP group:1024-bit MODP group
02:55:51 ipsec,debug,packet prop#=1, prot-id=ISAKMP, spi-size=0, #trns=8
02:55:51 ipsec,debug,packet trns#=2, trns-id=IKE
02:55:51 ipsec,debug,packet type=Life Type, flag=0x8000, lorv=seconds
02:55:51 ipsec,debug,packet type=Life Duration, flag=0x8000, lorv=28800
02:55:51 ipsec,debug,packet type=Encryption Algorithm, flag=0x8000, lorv=AES-CBC
02:55:51 ipsec,debug,packet type=Key Length, flag=0x8000, lorv=256
02:55:51 ipsec,debug,packet type=Authentication Method, flag=0x8000, lorv=pre-shared key
02:55:51 ipsec,debug,packet type=Hash Algorithm, flag=0x8000, lorv=MD5
02:55:51 ipsec,debug,packet type=Group Description, flag=0x8000, lorv=1024-bit MODP group
02:55:51 ipsec,debug,packet Compared: Local:Peer
02:55:51 ipsec,debug,packet (lifetime = 86400:28800)
02:55:51 ipsec,debug,packet (lifebyte = 0:0)
02:55:51 ipsec,debug,packet enctype = 3DES-CBC:AES-CBC
02:55:51 ipsec,debug,packet (encklen = 0:256)
02:55:51 ipsec,debug,packet hashtype = SHA:MD5
02:55:51 ipsec,debug,packet authmethod = XAuth pskey server:pre-shared key
02:55:51 ipsec,debug,packet dh_group = 1024-bit MODP group:1024-bit MODP group
02:55:51 ipsec,debug,packet Compared: Local:Peer
02:55:51 ipsec,debug,packet (lifetime = 86400:28800)
02:55:51 ipsec,debug,packet (lifebyte = 0:0)
02:55:51 ipsec,debug,packet enctype = AES-CBC:AES-CBC
02:55:51 ipsec,debug,packet (encklen = 128:256)
02:55:51 ipsec,debug,packet hashtype = SHA:MD5
02:55:51 ipsec,debug,packet authmethod = XAuth pskey server:pre-shared key
02:55:51 ipsec,debug,packet dh_group = 1024-bit MODP group:1024-bit MODP group
02:55:51 ipsec,debug,packet Compared: Local:Peer
02:55:51 ipsec,debug,packet (lifetime = 86400:28800)
02:55:51 ipsec,debug,packet (lifebyte = 0:0)
02:55:51 ipsec,debug,packet enctype = AES-CBC:AES-CBC
02:55:51 ipsec,debug,packet (encklen = 256:256)
02:55:51 ipsec,debug,packet hashtype = SHA:MD5
02:55:51 ipsec,debug,packet authmethod = XAuth pskey server:pre-shared key
02:55:51 ipsec,debug,packet dh_group = 1024-bit MODP group:1024-bit MODP group
02:55:51 ipsec,debug,packet prop#=1, prot-id=ISAKMP, spi-size=0, #trns=8
02:55:51 ipsec,debug,packet trns#=3, trns-id=IKE
02:55:51 ipsec,debug,packet type=Life Type, flag=0x8000, lorv=seconds
02:55:51 ipsec,debug,packet type=Life Duration, flag=0x8000, lorv=28800
02:55:51 ipsec,debug,packet type=Encryption Algorithm, flag=0x8000, lorv=AES-CBC
02:55:51 ipsec,debug,packet type=Key Length, flag=0x8000, lorv=128
02:55:51 ipsec,debug,packet type=Authentication Method, flag=0x8000, lorv=pre-shared key
02:55:51 ipsec,debug,packet type=Hash Algorithm, flag=0x8000, lorv=SHA
02:55:51 ipsec,debug,packet type=Group Description, flag=0x8000, lorv=1024-bit MODP group
02:55:51 ipsec,debug,packet Compared: Local:Peer
02:55:51 ipsec,debug,packet (lifetime = 86400:28800)
02:55:51 ipsec,debug,packet (lifebyte = 0:0)
02:55:51 ipsec,debug,packet enctype = 3DES-CBC:AES-CBC
02:55:51 ipsec,debug,packet (encklen = 0:128)
02:55:51 ipsec,debug,packet hashtype = SHA:SHA
02:55:51 ipsec,debug,packet authmethod = XAuth pskey server:pre-shared key
02:55:51 ipsec,debug,packet dh_group = 1024-bit MODP group:1024-bit MODP group
02:55:51 ipsec,debug,packet Compared: Local:Peer
02:55:51 ipsec,debug,packet (lifetime = 86400:28800)
02:55:51 ipsec,debug,packet (lifebyte = 0:0)
02:55:51 ipsec,debug,packet enctype = AES-CBC:AES-CBC
02:55:51 ipsec,debug,packet (encklen = 128:128)
02:55:51 ipsec,debug,packet hashtype = SHA:SHA
02:55:51 ipsec,debug,packet authmethod = XAuth pskey server:pre-shared key
02:55:51 ipsec,debug,packet dh_group = 1024-bit MODP group:1024-bit MODP group
02:55:51 ipsec,debug,packet Compared: Local:Peer
02:55:51 ipsec,debug,packet (lifetime = 86400:28800)
02:55:51 ipsec,debug,packet (lifebyte = 0:0)
02:55:51 ipsec,debug,packet enctype = AES-CBC:AES-CBC
02:55:51 ipsec,debug,packet (encklen = 256:128)
02:55:51 ipsec,debug,packet hashtype = SHA:SHA
02:55:51 ipsec,debug,packet authmethod = XAuth pskey server:pre-shared key
02:55:51 ipsec,debug,packet dh_group = 1024-bit MODP group:1024-bit MODP group
02:55:51 ipsec,debug,packet prop#=1, prot-id=ISAKMP, spi-size=0, #trns=8
02:55:51 ipsec,debug,packet trns#=4, trns-id=IKE
02:55:51 ipsec,debug,packet type=Life Type, flag=0x8000, lorv=seconds
02:55:51 ipsec,debug,packet type=Life Duration, flag=0x8000, lorv=28800
02:55:51 ipsec,debug,packet type=Encryption Algorithm, flag=0x8000, lorv=AES-CBC
02:55:51 ipsec,debug,packet type=Key Length, flag=0x8000, lorv=128
02:55:51 ipsec,debug,packet type=Authentication Method, flag=0x8000, lorv=pre-shared key
02:55:51 ipsec,debug,packet type=Hash Algorithm, flag=0x8000, lorv=MD5
02:55:51 ipsec,debug,packet type=Group Description, flag=0x8000, lorv=1024-bit MODP group
02:55:51 ipsec,debug,packet Compared: Local:Peer
02:55:51 ipsec,debug,packet (lifetime = 86400:28800)
02:55:51 ipsec,debug,packet (lifebyte = 0:0)
02:55:51 ipsec,debug,packet enctype = 3DES-CBC:AES-CBC
02:55:51 ipsec,debug,packet (encklen = 0:128)
02:55:51 ipsec,debug,packet hashtype = SHA:MD5
02:55:51 ipsec,debug,packet authmethod = XAuth pskey server:pre-shared key
02:55:51 ipsec,debug,packet dh_group = 1024-bit MODP group:1024-bit MODP group
02:55:51 ipsec,debug,packet Compared: Local:Peer
02:55:51 ipsec,debug,packet (lifetime = 86400:28800)
02:55:51 ipsec,debug,packet (lifebyte = 0:0)
02:55:51 ipsec,debug,packet enctype = AES-CBC:AES-CBC
02:55:51 ipsec,debug,packet (encklen = 128:128)
02:55:51 ipsec,debug,packet hashtype = SHA:MD5
02:55:51 ipsec,debug,packet authmethod = XAuth pskey server:pre-shared key
02:55:51 ipsec,debug,packet dh_group = 1024-bit MODP group:1024-bit MODP group
02:55:51 ipsec,debug,packet Compared: Local:Peer
02:55:51 ipsec,debug,packet (lifetime = 86400:28800)
02:55:51 ipsec,debug,packet (lifebyte = 0:0)
02:55:51 ipsec,debug,packet enctype = AES-CBC:AES-CBC
02:55:51 ipsec,debug,packet (encklen = 256:128)
02:55:51 ipsec,debug,packet hashtype = SHA:MD5
02:55:51 ipsec,debug,packet authmethod = XAuth pskey server:pre-shared key
02:55:51 ipsec,debug,packet dh_group = 1024-bit MODP group:1024-bit MODP group
02:55:51 ipsec,debug,packet prop#=1, prot-id=ISAKMP, spi-size=0, #trns=8
02:55:51 ipsec,debug,packet trns#=5, trns-id=IKE
02:55:51 ipsec,debug,packet type=Life Type, flag=0x8000, lorv=seconds
02:55:51 ipsec,debug,packet type=Life Duration, flag=0x8000, lorv=28800
02:55:51 ipsec,debug,packet type=Encryption Algorithm, flag=0x8000, lorv=3DES-CBC
02:55:51 ipsec,debug,packet type=Authentication Method, flag=0x8000, lorv=pre-shared key
02:55:51 ipsec,debug,packet type=Hash Algorithm, flag=0x8000, lorv=SHA
02:55:51 ipsec,debug,packet type=Group Description, flag=0x8000, lorv=1024-bit MODP group
02:55:51 ipsec,debug,packet Compared: Local:Peer
02:55:51 ipsec,debug,packet (lifetime = 86400:28800)
02:55:51 ipsec,debug,packet (lifebyte = 0:0)
02:55:51 ipsec,debug,packet enctype = 3DES-CBC:3DES-CBC
02:55:51 ipsec,debug,packet (encklen = 0:0)
02:55:51 ipsec,debug,packet hashtype = SHA:SHA
02:55:51 ipsec,debug,packet authmethod = XAuth pskey server:pre-shared key
02:55:51 ipsec,debug,packet dh_group = 1024-bit MODP group:1024-bit MODP group
02:55:51 ipsec,debug,packet Compared: Local:Peer
02:55:51 ipsec,debug,packet (lifetime = 86400:28800)
02:55:51 ipsec,debug,packet (lifebyte = 0:0)
02:55:51 ipsec,debug,packet enctype = AES-CBC:3DES-CBC
02:55:51 ipsec,debug,packet (encklen = 128:0)
02:55:51 ipsec,debug,packet hashtype = SHA:SHA
02:55:51 ipsec,debug,packet authmethod = XAuth pskey server:pre-shared key
02:55:51 ipsec,debug,packet dh_group = 1024-bit MODP group:1024-bit MODP group
02:55:51 ipsec,debug,packet Compared: Local:Peer
02:55:51 ipsec,debug,packet (lifetime = 86400:28800)
02:55:51 ipsec,debug,packet (lifebyte = 0:0)
02:55:51 ipsec,debug,packet enctype = AES-CBC:3DES-CBC
02:55:51 ipsec,debug,packet (encklen = 256:0)
02:55:51 ipsec,debug,packet hashtype = SHA:SHA
02:55:51 ipsec,debug,packet authmethod = XAuth pskey server:pre-shared key
02:55:51 ipsec,debug,packet dh_group = 1024-bit MODP group:1024-bit MODP group
02:55:51 ipsec,debug,packet prop#=1, prot-id=ISAKMP, spi-size=0, #trns=8
02:55:51 ipsec,debug,packet trns#=6, trns-id=IKE
02:55:51 ipsec,debug,packet type=Life Type, flag=0x8000, lorv=seconds
02:55:51 ipsec,debug,packet type=Life Duration, flag=0x8000, lorv=28800
02:55:51 ipsec,debug,packet type=Encryption Algorithm, flag=0x8000, lorv=3DES-CBC
02:55:51 ipsec,debug,packet type=Authentication Method, flag=0x8000, lorv=pre-shared key
02:55:51 ipsec,debug,packet type=Hash Algorithm, flag=0x8000, lorv=MD5
02:55:51 ipsec,debug,packet type=Group Description, flag=0x8000, lorv=1024-bit MODP group
02:55:51 ipsec,debug,packet Compared: Local:Peer
02:55:51 ipsec,debug,packet (lifetime = 86400:28800)
02:55:51 ipsec,debug,packet (lifebyte = 0:0)
02:55:51 ipsec,debug,packet enctype = 3DES-CBC:3DES-CBC
02:55:51 ipsec,debug,packet (encklen = 0:0)
02:55:51 ipsec,debug,packet hashtype = SHA:MD5
02:55:51 ipsec,debug,packet authmethod = XAuth pskey server:pre-shared key
02:55:51 ipsec,debug,packet dh_group = 1024-bit MODP group:1024-bit MODP group
02:55:51 ipsec,debug,packet Compared: Local:Peer
02:55:51 ipsec,debug,packet (lifetime = 86400:28800)
02:55:51 ipsec,debug,packet (lifebyte = 0:0)
02:55:51 ipsec,debug,packet enctype = AES-CBC:3DES-CBC
02:55:51 ipsec,debug,packet (encklen = 128:0)
02:55:51 ipsec,debug,packet hashtype = SHA:MD5
02:55:51 ipsec,debug,packet authmethod = XAuth pskey server:pre-shared key
02:55:51 ipsec,debug,packet dh_group = 1024-bit MODP group:1024-bit MODP group
02:55:51 ipsec,debug,packet Compared: Local:Peer
02:55:51 ipsec,debug,packet (lifetime = 86400:28800)
02:55:51 ipsec,debug,packet (lifebyte = 0:0)
02:55:51 ipsec,debug,packet enctype = AES-CBC:3DES-CBC
02:55:51 ipsec,debug,packet (encklen = 256:0)
02:55:51 ipsec,debug,packet hashtype = SHA:MD5
02:55:51 ipsec,debug,packet authmethod = XAuth pskey server:pre-shared key
02:55:51 ipsec,debug,packet dh_group = 1024-bit MODP group:1024-bit MODP group
02:55:51 ipsec,debug,packet prop#=1, prot-id=ISAKMP, spi-size=0, #trns=8
02:55:51 ipsec,debug,packet trns#=7, trns-id=IKE
02:55:51 ipsec,debug,packet type=Life Type, flag=0x8000, lorv=seconds
02:55:51 ipsec,debug,packet type=Life Duration, flag=0x8000, lorv=28800
02:55:51 ipsec,debug,packet type=Encryption Algorithm, flag=0x8000, lorv=DES-CBC
02:55:51 ipsec,debug,packet type=Authentication Method, flag=0x8000, lorv=pre-shared key
02:55:51 ipsec,debug,packet type=Hash Algorithm, flag=0x8000, lorv=SHA
02:55:51 ipsec,debug,packet type=Group Description, flag=0x8000, lorv=1024-bit MODP group
02:55:51 ipsec,debug,packet Compared: Local:Peer
02:55:51 ipsec,debug,packet (lifetime = 86400:28800)
02:55:51 ipsec,debug,packet (lifebyte = 0:0)
02:55:51 ipsec,debug,packet enctype = 3DES-CBC:DES-CBC
02:55:51 ipsec,debug,packet (encklen = 0:0)
02:55:51 ipsec,debug,packet hashtype = SHA:SHA
02:55:51 ipsec,debug,packet authmethod = XAuth pskey server:pre-shared key
02:55:51 ipsec,debug,packet dh_group = 1024-bit MODP group:1024-bit MODP group
02:55:51 ipsec,debug,packet Compared: Local:Peer
02:55:51 ipsec,debug,packet (lifetime = 86400:28800)
02:55:51 ipsec,debug,packet (lifebyte = 0:0)
02:55:51 ipsec,debug,packet enctype = AES-CBC:DES-CBC
02:55:51 ipsec,debug,packet (encklen = 128:0)
02:55:51 ipsec,debug,packet hashtype = SHA:SHA
02:55:51 ipsec,debug,packet authmethod = XAuth pskey server:pre-shared key
02:55:51 ipsec,debug,packet dh_group = 1024-bit MODP group:1024-bit MODP group
02:55:51 ipsec,debug,packet Compared: Local:Peer
02:55:51 ipsec,debug,packet (lifetime = 86400:28800)
02:55:51 ipsec,debug,packet (lifebyte = 0:0)
02:55:51 ipsec,debug,packet enctype = AES-CBC:DES-CBC
02:55:51 ipsec,debug,packet (encklen = 256:0)
02:55:51 ipsec,debug,packet hashtype = SHA:SHA
02:55:51 ipsec,debug,packet authmethod = XAuth pskey server:pre-shared key
02:55:51 ipsec,debug,packet dh_group = 1024-bit MODP group:1024-bit MODP group
02:55:51 ipsec,debug,packet prop#=1, prot-id=ISAKMP, spi-size=0, #trns=8
02:55:51 ipsec,debug,packet trns#=8, trns-id=IKE
02:55:51 ipsec,debug,packet type=Life Type, flag=0x8000, lorv=seconds
02:55:51 ipsec,debug,packet type=Life Duration, flag=0x8000, lorv=28800
02:55:51 ipsec,debug,packet type=Encryption Algorithm, flag=0x8000, lorv=DES-CBC
02:55:51 ipsec,debug,packet type=Authentication Method, flag=0x8000, lorv=pre-shared key
02:55:51 ipsec,debug,packet type=Hash Algorithm, flag=0x8000, lorv=MD5
02:55:51 ipsec,debug,packet type=Group Description, flag=0x8000, lorv=1024-bit MODP group
02:55:51 ipsec,debug,packet Compared: Local:Peer
02:55:51 ipsec,debug,packet (lifetime = 86400:28800)
02:55:51 ipsec,debug,packet (lifebyte = 0:0)
02:55:51 ipsec,debug,packet enctype = 3DES-CBC:DES-CBC
02:55:51 ipsec,debug,packet (encklen = 0:0)
02:55:51 ipsec,debug,packet hashtype = SHA:MD5
02:55:51 ipsec,debug,packet authmethod = XAuth pskey server:pre-shared key
02:55:51 ipsec,debug,packet dh_group = 1024-bit MODP group:1024-bit MODP group
02:55:51 ipsec,debug,packet Compared: Local:Peer
02:55:51 ipsec,debug,packet (lifetime = 86400:28800)
02:55:51 ipsec,debug,packet (lifebyte = 0:0)
02:55:51 ipsec,debug,packet enctype = AES-CBC:DES-CBC
02:55:51 ipsec,debug,packet (encklen = 128:0)
02:55:51 ipsec,debug,packet hashtype = SHA:MD5
02:55:51 ipsec,debug,packet authmethod = XAuth pskey server:pre-shared key
02:55:51 ipsec,debug,packet dh_group = 1024-bit MODP group:1024-bit MODP group
02:55:51 ipsec,debug,packet Compared: Local:Peer
02:55:51 ipsec,debug,packet (lifetime = 86400:28800)
02:55:51 ipsec,debug,packet (lifebyte = 0:0)
02:55:51 ipsec,debug,packet enctype = AES-CBC:DES-CBC
02:55:51 ipsec,debug,packet (encklen = 256:0)
02:55:51 ipsec,debug,packet hashtype = SHA:MD5
02:55:51 ipsec,debug,packet authmethod = XAuth pskey server:pre-shared key
02:55:51 ipsec,debug,packet dh_group = 1024-bit MODP group:1024-bit MODP group
02:55:51 ipsec,debug,packet type=Life Type, flag=0x8000, lorv=seconds
02:55:51 ipsec,debug,packet type=Life Duration, flag=0x8000, lorv=28800
02:55:51 ipsec,debug,packet type=Encryption Algorithm, flag=0x8000, lorv=AES-CBC
02:55:51 ipsec,debug,packet type=Key Length, flag=0x8000, lorv=256
02:55:51 ipsec,debug,packet type=Authentication Method, flag=0x8000, lorv=pre-shared key
02:55:51 ipsec,debug,packet type=Hash Algorithm, flag=0x8000, lorv=SHA
02:55:51 ipsec,debug,packet type=Group Description, flag=0x8000, lorv=1024-bit MODP group
02:55:51 ipsec,debug rejected enctype: DB(prop#1:trns#1):Peer(prop#1:trns#1) = 3DES-CBC:AES-CBC
02:55:51 ipsec,debug rejected authmethod: DB(prop#1:trns#1):Peer(prop#1:trns#1) = XAuth pskey server:pre-shared key
02:55:51 ipsec,debug rejected authmethod: DB(prop#1:trns#2):Peer(prop#1:trns#1) = XAuth pskey server:pre-shared key
02:55:51 ipsec,debug rejected authmethod: DB(prop#1:trns#3):Peer(prop#1:trns#1) = XAuth pskey server:pre-shared key
02:55:51 ipsec,debug,packet type=Life Type, flag=0x8000, lorv=seconds
02:55:51 ipsec,debug,packet type=Life Duration, flag=0x8000, lorv=28800
02:55:51 ipsec,debug,packet type=Encryption Algorithm, flag=0x8000, lorv=AES-CBC
02:55:51 ipsec,debug,packet type=Key Length, flag=0x8000, lorv=256
02:55:51 ipsec,debug,packet type=Authentication Method, flag=0x8000, lorv=pre-shared key
02:55:51 ipsec,debug,packet type=Hash Algorithm, flag=0x8000, lorv=MD5
02:55:51 ipsec,debug,packet type=Group Description, flag=0x8000, lorv=1024-bit MODP group
02:55:51 ipsec,debug rejected enctype: DB(prop#1:trns#1):Peer(prop#1:trns#2) = 3DES-CBC:AES-CBC
02:55:51 ipsec,debug rejected authmethod: DB(prop#1:trns#1):Peer(prop#1:trns#2) = XAuth pskey server:pre-shared key
02:55:51 ipsec,debug rejected hashtype: DB(prop#1:trns#1):Peer(prop#1:trns#2) = SHA:MD5
02:55:51 ipsec,debug rejected authmethod: DB(prop#1:trns#2):Peer(prop#1:trns#2) = XAuth pskey server:pre-shared key
02:55:51 ipsec,debug rejected hashtype: DB(prop#1:trns#2):Peer(prop#1:trns#2) = SHA:MD5
02:55:51 ipsec,debug rejected authmethod: DB(prop#1:trns#3):Peer(prop#1:trns#2) = XAuth pskey server:pre-shared key
02:55:51 ipsec,debug rejected hashtype: DB(prop#1:trns#3):Peer(prop#1:trns#2) = SHA:MD5
02:55:51 ipsec,debug,packet type=Life Type, flag=0x8000, lorv=seconds
02:55:51 ipsec,debug,packet type=Life Duration, flag=0x8000, lorv=28800
02:55:51 ipsec,debug,packet type=Encryption Algorithm, flag=0x8000, lorv=AES-CBC
02:55:51 ipsec,debug,packet type=Key Length, flag=0x8000, lorv=128
02:55:51 ipsec,debug,packet type=Authentication Method, flag=0x8000, lorv=pre-shared key
02:55:51 ipsec,debug,packet type=Hash Algorithm, flag=0x8000, lorv=SHA
02:55:51 ipsec,debug,packet type=Group Description, flag=0x8000, lorv=1024-bit MODP group
02:55:51 ipsec,debug rejected enctype: DB(prop#1:trns#1):Peer(prop#1:trns#3) = 3DES-CBC:AES-CBC
02:55:51 ipsec,debug rejected authmethod: DB(prop#1:trns#1):Peer(prop#1:trns#3) = XAuth pskey server:pre-shared key
02:55:51 ipsec,debug rejected authmethod: DB(prop#1:trns#2):Peer(prop#1:trns#3) = XAuth pskey server:pre-shared key
02:55:51 ipsec,debug rejected authmethod: DB(prop#1:trns#3):Peer(prop#1:trns#3) = XAuth pskey server:pre-shared key
02:55:51 ipsec,debug,packet type=Life Type, flag=0x8000, lorv=seconds
02:55:51 ipsec,debug,packet type=Life Duration, flag=0x8000, lorv=28800
02:55:51 ipsec,debug,packet type=Encryption Algorithm, flag=0x8000, lorv=AES-CBC
02:55:51 ipsec,debug,packet type=Key Length, flag=0x8000, lorv=128
02:55:51 ipsec,debug,packet type=Authentication Method, flag=0x8000, lorv=pre-shared key
02:55:51 ipsec,debug,packet type=Hash Algorithm, flag=0x8000, lorv=MD5
02:55:51 ipsec,debug,packet type=Group Description, flag=0x8000, lorv=1024-bit MODP group
02:55:51 ipsec,debug rejected enctype: DB(prop#1:trns#1):Peer(prop#1:trns#4) = 3DES-CBC:AES-CBC
02:55:51 ipsec,debug rejected authmethod: DB(prop#1:trns#1):Peer(prop#1:trns#4) = XAuth pskey server:pre-shared key
02:55:51 ipsec,debug rejected hashtype: DB(prop#1:trns#1):Peer(prop#1:trns#4) = SHA:MD5
02:55:51 ipsec,debug rejected authmethod: DB(prop#1:trns#2):Peer(prop#1:trns#4) = XAuth pskey server:pre-shared key
02:55:51 ipsec,debug rejected hashtype: DB(prop#1:trns#2):Peer(prop#1:trns#4) = SHA:MD5
02:55:51 ipsec,debug rejected authmethod: DB(prop#1:trns#3):Peer(prop#1:trns#4) = XAuth pskey server:pre-shared key
02:55:51 ipsec,debug rejected hashtype: DB(prop#1:trns#3):Peer(prop#1:trns#4) = SHA:MD5
02:55:51 ipsec,debug,packet type=Life Type, flag=0x8000, lorv=seconds
02:55:51 ipsec,debug,packet type=Life Duration, flag=0x8000, lorv=28800
02:55:51 ipsec,debug,packet type=Encryption Algorithm, flag=0x8000, lorv=3DES-CBC
02:55:51 ipsec,debug,packet type=Authentication Method, flag=0x8000, lorv=pre-shared key
02:55:51 ipsec,debug,packet type=Hash Algorithm, flag=0x8000, lorv=SHA
02:55:51 ipsec,debug,packet type=Group Description, flag=0x8000, lorv=1024-bit MODP group
02:55:51 ipsec,debug rejected authmethod: DB(prop#1:trns#1):Peer(prop#1:trns#5) = XAuth pskey server:pre-shared key
02:55:51 ipsec,debug rejected enctype: DB(prop#1:trns#2):Peer(prop#1:trns#5) = AES-CBC:3DES-CBC
02:55:51 ipsec,debug rejected authmethod: DB(prop#1:trns#2):Peer(prop#1:trns#5) = XAuth pskey server:pre-shared key
02:55:51 ipsec,debug rejected enctype: DB(prop#1:trns#3):Peer(prop#1:trns#5) = AES-CBC:3DES-CBC
02:55:51 ipsec,debug rejected authmethod: DB(prop#1:trns#3):Peer(prop#1:trns#5) = XAuth pskey server:pre-shared key
02:55:51 ipsec,debug,packet type=Life Type, flag=0x8000, lorv=seconds
02:55:51 ipsec,debug,packet type=Life Duration, flag=0x8000, lorv=28800
02:55:51 ipsec,debug,packet type=Encryption Algorithm, flag=0x8000, lorv=3DES-CBC
02:55:51 ipsec,debug,packet type=Authentication Method, flag=0x8000, lorv=pre-shared key
02:55:51 ipsec,debug,packet type=Hash Algorithm, flag=0x8000, lorv=MD5
02:55:51 ipsec,debug,packet type=Group Description, flag=0x8000, lorv=1024-bit MODP group
02:55:51 ipsec,debug rejected authmethod: DB(prop#1:trns#1):Peer(prop#1:trns#6) = XAuth pskey server:pre-shared key
02:55:51 ipsec,debug rejected hashtype: DB(prop#1:trns#1):Peer(prop#1:trns#6) = SHA:MD5
02:55:51 ipsec,debug rejected enctype: DB(prop#1:trns#2):Peer(prop#1:trns#6) = AES-CBC:3DES-CBC
02:55:51 ipsec,debug rejected authmethod: DB(prop#1:trns#2):Peer(prop#1:trns#6) = XAuth pskey server:pre-shared key
02:55:51 ipsec,debug rejected hashtype: DB(prop#1:trns#2):Peer(prop#1:trns#6) = SHA:MD5
02:55:51 ipsec,debug rejected enctype: DB(prop#1:trns#3):Peer(prop#1:trns#6) = AES-CBC:3DES-CBC
02:55:51 ipsec,debug rejected authmethod: DB(prop#1:trns#3):Peer(prop#1:trns#6) = XAuth pskey server:pre-shared key
02:55:51 ipsec,debug rejected hashtype: DB(prop#1:trns#3):Peer(prop#1:trns#6) = SHA:MD5
02:55:51 ipsec,debug,packet type=Life Type, flag=0x8000, lorv=seconds
02:55:51 ipsec,debug,packet type=Life Duration, flag=0x8000, lorv=28800
02:55:51 ipsec,debug,packet type=Encryption Algorithm, flag=0x8000, lorv=DES-CBC
02:55:51 ipsec,debug,packet type=Authentication Method, flag=0x8000, lorv=pre-shared key
02:55:51 ipsec,debug,packet type=Hash Algorithm, flag=0x8000, lorv=SHA
02:55:51 ipsec,debug,packet type=Group Description, flag=0x8000, lorv=1024-bit MODP group
02:55:51 ipsec,debug rejected enctype: DB(prop#1:trns#1):Peer(prop#1:trns#7) = 3DES-CBC:DES-CBC
02:55:51 ipsec,debug rejected authmethod: DB(prop#1:trns#1):Peer(prop#1:trns#7) = XAuth pskey server:pre-shared key
02:55:51 ipsec,debug rejected enctype: DB(prop#1:trns#2):Peer(prop#1:trns#7) = AES-CBC:DES-CBC
02:55:51 ipsec,debug rejected authmethod: DB(prop#1:trns#2):Peer(prop#1:trns#7) = XAuth pskey server:pre-shared key
02:55:51 ipsec,debug rejected enctype: DB(prop#1:trns#3):Peer(prop#1:trns#7) = AES-CBC:DES-CBC
02:55:51 ipsec,debug rejected authmethod: DB(prop#1:trns#3):Peer(prop#1:trns#7) = XAuth pskey server:pre-shared key
02:55:51 ipsec,debug,packet type=Life Type, flag=0x8000, lorv=seconds
02:55:51 ipsec,debug,packet type=Life Duration, flag=0x8000, lorv=28800
02:55:51 ipsec,debug,packet type=Encryption Algorithm, flag=0x8000, lorv=DES-CBC
02:55:51 ipsec,debug,packet type=Authentication Method, flag=0x8000, lorv=pre-shared key
02:55:51 ipsec,debug,packet type=Hash Algorithm, flag=0x8000, lorv=MD5
02:55:51 ipsec,debug,packet type=Group Description, flag=0x8000, lorv=1024-bit MODP group
02:55:51 ipsec,debug rejected enctype: DB(prop#1:trns#1):Peer(prop#1:trns#8) = 3DES-CBC:DES-CBC
02:55:51 ipsec,debug rejected authmethod: DB(prop#1:trns#1):Peer(prop#1:trns#8) = XAuth pskey server:pre-shared key
02:55:51 ipsec,debug rejected hashtype: DB(prop#1:trns#1):Peer(prop#1:trns#8) = SHA:MD5
02:55:51 ipsec,debug rejected enctype: DB(prop#1:trns#2):Peer(prop#1:trns#8) = AES-CBC:DES-CBC
02:55:51 ipsec,debug rejected authmethod: DB(prop#1:trns#2):Peer(prop#1:trns#8) = XAuth pskey server:pre-shared key
02:55:51 ipsec,debug rejected hashtype: DB(prop#1:trns#2):Peer(prop#1:trns#8) = SHA:MD5
02:55:51 ipsec,debug rejected enctype: DB(prop#1:trns#3):Peer(prop#1:trns#8) = AES-CBC:DES-CBC
02:55:51 ipsec,debug rejected authmethod: DB(prop#1:trns#3):Peer(prop#1:trns#8) = XAuth pskey server:pre-shared key
02:55:51 ipsec,debug rejected hashtype: DB(prop#1:trns#3):Peer(prop#1:trns#8) = SHA:MD5
02:55:51 ipsec,debug no suitable proposal found.
02:55:54 l2tp,debug,packet l2tp: rcvd control message from 70.214.6.78:12450 to 173.8.172.89:1701
02:55:54 l2tp,debug,packet l2tp: tunnel-id=0, session-id=0, ns=0, nr=0
02:55:54 l2tp,debug,packet l2tp: (M) Message-Type=SCCRQ
02:55:54 l2tp,debug,packet l2tp: (M) Protocol-Version=0x01:00
02:55:54 l2tp,debug,packet l2tp: (M) Host-Name="anonymous"
02:55:54 l2tp,debug,packet l2tp: (M) Framing-Capabilities=0x3
02:55:54 l2tp,debug,packet l2tp: (M) Assigned-Tunnel-ID=21606
02:55:54 l2tp,debug,packet l2tp: (M) Receive-Window-Size=1
02:55:54 l2tp,debug l2tp: tunnel 14 entering state: wait-ctl-conn
02:55:54 l2tp,debug,packet l2tp: sent control message to 70.214.6.78:12450 from 173.8.172.89:1701
02:55:54 l2tp,debug,packet l2tp: tunnel-id=21606, session-id=0, ns=0, nr=1
02:55:54 l2tp,debug,packet l2tp: (M) Message-Type=SCCRP
02:55:54 l2tp,debug,packet l2tp: (M) Protocol-Version=0x01:00
02:55:54 l2tp,debug,packet l2tp: (M) Framing-Capabilities=0x1
02:55:54 l2tp,debug,packet l2tp: (M) Bearer-Capabilities=0x0
02:55:54 l2tp,debug,packet l2tp: Firmware-Revision=0x1
02:55:54 l2tp,debug,packet l2tp: (M) Host-Name="firewall"
02:55:54 l2tp,debug,packet l2tp: Vendor-Name="MikroTik"
02:55:54 l2tp,debug,packet l2tp: (M) Assigned-Tunnel-ID=14
02:55:54 l2tp,debug,packet l2tp: (M) Receive-Window-Size=4
02:55:54 l2tp,debug,packet l2tp: rcvd control message from 70.214.6.78:12450 to 173.8.172.89:1701
02:55:54 l2tp,debug,packet l2tp: tunnel-id=0, session-id=0, ns=1, nr=0
02:55:54 l2tp,debug,packet l2tp: (M) Message-Type=StopCCN
02:55:54 l2tp,debug,packet l2tp: (M) Assigned-Tunnel-ID=21606
02:55:54 l2tp,debug,packet l2tp: (M) Result-Code=6
02:55:54 l2tp,debug l2tp: received message with wrong tunnel id, ignoring
02:55:55 l2tp,debug,packet l2tp: sent control message to 70.214.6.78:12450 from 173.8.172.89:1701
02:55:55 l2tp,debug,packet l2tp: tunnel-id=21606, session-id=0, ns=0, nr=1
02:55:55 l2tp,debug,packet l2tp: (M) Message-Type=SCCRP
02:55:55 l2tp,debug,packet l2tp: (M) Protocol-Version=0x01:00
02:55:55 l2tp,debug,packet l2tp: (M) Framing-Capabilities=0x1
02:55:55 l2tp,debug,packet l2tp: (M) Bearer-Capabilities=0x0
02:55:55 l2tp,debug,packet l2tp: Firmware-Revision=0x1
02:55:55 l2tp,debug,packet l2tp: (M) Host-Name="firewall"
02:55:55 l2tp,debug,packet l2tp: Vendor-Name="MikroTik"
02:55:55 l2tp,debug,packet l2tp: (M) Assigned-Tunnel-ID=14
02:55:55 l2tp,debug,packet l2tp: (M) Receive-Window-Size=4
02:55:56 l2tp,debug,packet l2tp: sent control message to 70.214.6.78:12450 from 173.8.172.89:1701
02:55:56 l2tp,debug,packet l2tp: tunnel-id=21606, session-id=0, ns=0, nr=1
02:55:56 l2tp,debug,packet l2tp: (M) Message-Type=SCCRP
02:55:56 l2tp,debug,packet l2tp: (M) Protocol-Version=0x01:00
02:55:56 l2tp,debug,packet l2tp: (M) Framing-Capabilities=0x1
02:55:56 l2tp,debug,packet l2tp: (M) Bearer-Capabilities=0x0
02:55:56 l2tp,debug,packet l2tp: Firmware-Revision=0x1
02:55:56 l2tp,debug,packet l2tp: (M) Host-Name="firewall"
02:55:56 l2tp,debug,packet l2tp: Vendor-Name="MikroTik"
02:55:56 l2tp,debug,packet l2tp: (M) Assigned-Tunnel-ID=14
02:55:56 l2tp,debug,packet l2tp: (M) Receive-Window-Size=4
02:55:58 l2tp,debug,packet l2tp: sent control message to 70.214.6.78:12450 from 173.8.172.89:1701
02:55:58 l2tp,debug,packet l2tp: tunnel-id=21606, session-id=0, ns=0, nr=1
02:55:58 l2tp,debug,packet l2tp: (M) Message-Type=SCCRP
02:55:58 l2tp,debug,packet l2tp: (M) Protocol-Version=0x01:00
02:55:58 l2tp,debug,packet l2tp: (M) Framing-Capabilities=0x1
02:55:58 l2tp,debug,packet l2tp: (M) Bearer-Capabilities=0x0
02:55:58 l2tp,debug,packet l2tp: Firmware-Revision=0x1
02:55:58 l2tp,debug,packet l2tp: (M) Host-Name="firewall"
02:55:58 l2tp,debug,packet l2tp: Vendor-Name="MikroTik"
02:55:58 l2tp,debug,packet l2tp: (M) Assigned-Tunnel-ID=14
02:55:58 l2tp,debug,packet l2tp: (M) Receive-Window-Size=4
02:56:02 l2tp,debug,packet l2tp: sent control message to 70.214.6.78:12450 from 173.8.172.89:1701
02:56:02 l2tp,debug,packet l2tp: tunnel-id=21606, session-id=0, ns=0, nr=1
02:56:02 l2tp,debug,packet l2tp: (M) Message-Type=SCCRP
02:56:02 l2tp,debug,packet l2tp: (M) Protocol-Version=0x01:00
02:56:02 l2tp,debug,packet l2tp: (M) Framing-Capabilities=0x1
02:56:02 l2tp,debug,packet l2tp: (M) Bearer-Capabilities=0x0
02:56:02 l2tp,debug,packet l2tp: Firmware-Revision=0x1
02:56:02 l2tp,debug,packet l2tp: (M) Host-Name="firewall"
02:56:02 l2tp,debug,packet l2tp: Vendor-Name="MikroTik"
02:56:02 l2tp,debug,packet l2tp: (M) Assigned-Tunnel-ID=14
02:56:02 l2tp,debug,packet l2tp: (M) Receive-Window-Size=4
02:56:10 l2tp,debug,packet l2tp: sent control message to 70.214.6.78:12450 from 173.8.172.89:1701
02:56:10 l2tp,debug,packet l2tp: tunnel-id=21606, session-id=0, ns=0, nr=1
02:56:10 l2tp,debug,packet l2tp: (M) Message-Type=SCCRP
02:56:10 l2tp,debug,packet l2tp: (M) Protocol-Version=0x01:00
02:56:10 l2tp,debug,packet l2tp: (M) Framing-Capabilities=0x1
02:56:10 l2tp,debug,packet l2tp: (M) Bearer-Capabilities=0x0
02:56:10 l2tp,debug,packet l2tp: Firmware-Revision=0x1
02:56:10 l2tp,debug,packet l2tp: (M) Host-Name="firewall"
02:56:10 l2tp,debug,packet l2tp: Vendor-Name="MikroTik"
02:56:10 l2tp,debug,packet l2tp: (M) Assigned-Tunnel-ID=14
02:56:10 l2tp,debug,packet l2tp: (M) Receive-Window-Size=4
02:56:18 l2tp,debug l2tp: tunnel 14 received no replies, disconnecting
02:56:18 l2tp,debug l2tp: tunnel 14 entering state: dead
 
jaytcsd
Member Candidate
Member Candidate
Posts: 295
Joined: Wed Dec 29, 2004 9:50 am
Location: Pittsboro IN
Contact:

Re: Problems with IPSec and Android

Sun Dec 20, 2015 11:12 am

My droid works fine on 6.23 with these settings. Firewall is set to allow udp 500, 1701 and 4500, plus 50 ipsec-esp.

/ppp secret> pr de
Flags: X - disabled
# NAME SERVICE CALLER-ID PASSWORD PROFILE REMOTE-ADDRESS
0 name="me" service=l2tp caller-id="" password="pissoff" profile=default-encryption local-address=192.168.100.151
remote-address=192.168.100.152 routes="" limit-bytes-in=0 limit-bytes-out=0 last-logged-out=dec/14/2015 00:36:10


/ppp profile> pr de
Flags: * - default
0 * name="default" use-mpls=default use-compression=default use-vj-compression=default use-encryption=default only-one=default
change-tcp-mss=yes address-list=""

1 * name="default-encryption" use-mpls=default use-compression=default use-vj-compression=default use-encryption=required only-one=no
change-tcp-mss=yes address-list=""

/ip ipsec policy> pr det
Flags: T - template, X - disabled, D - dynamic, I - inactive, * - default
0 T * group=default src-address=0.0.0.0/0 dst-address=0.0.0.0/0 protocol=all proposal=default template=yes


/ip ipsec peer> pr det
Flags: X - disabled, D - dynamic
0 address=0.0.0.0/0 local-address=0.0.0.0 passive=no port=500
auth-method=pre-shared-key secret="canttellyou"
generate-policy=port-override policy-template-group=default
exchange-mode=main-l2tp send-initial-contact=yes nat-traversal=yes
hash-algorithm=sha1 enc-algorithm=3des dh-group=modp1024 lifetime=1d
dpd-interval=disable-dpd dpd-maximum-failures=5

/ip ipsec proposal> pr det
Flags: X - disabled, * - default
0 * name="default" auth-algorithms=sha1 enc-algorithms=3des lifetime=30m
pfs-group=modp1024

The droid uses L2TP/IPsec PSK, no advanced settings.
 
kacian
just joined
Posts: 1
Joined: Fri Sep 09, 2016 4:01 pm

Re: Problems with IPSec and Android

Fri Sep 09, 2016 4:41 pm

Did You set l2tp password?
 /ppp l2tp-secret> print                                  
 # ADDRESS            SECRET                                                                                                                                                                                                                         
 0 0.0.0.0/0          secretpassword
 
 
User avatar
mrz
MikroTik Support
MikroTik Support
Posts: 6111
Joined: Wed Feb 07, 2007 12:45 pm
Location: Latvia
Contact:

Re: Problems with IPSec and Android

Fri Sep 09, 2016 4:51 pm

Turn off xauth in l2tp/ipsec setup.

Who is online

Users browsing this forum: Baidu [Spider], Google [Bot] and 89 guests