This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

Site-2-Site IPSec remains down after interruption and last state "Terminated"

We have a Site-2-Site from XGS 136 with SFOS 18.5 RM3 to SG Firewall 9.711-5. Connection works and we have also other XGS's connecting to that SG also without problems.

The SG is the receiving side while the XGS's are the IPSec initiator.

Quite basic stuff though.

But at this particular site we noticed  an issue after the tunnel disconnected for the first time after a problem with the WAN line. The XGS machine did not re-initiate the connection after the first failure even if configured to do so.

The events in chronological order:

03.06.2022 10:18    IPSec    Failed IKE message retransmission timed out
03.06.2022 10:27    IPSec    Terminated
03.06.2022 10:28    IPSec    Deny received IKE message with invalid SPI
07.06.2022 16:58    IPSec    Established (my manual connect)

So the tunnel was down for 4 days until manual reconnect.

After login at the XGS machine the VPN status was shown on the XGS as this:

I clicked on the red dot to reconnect

The connection has been established by the manual connect without problems.

Nothing on that VPN has been changed, enabled, or disabled on the SG firewall.

VPN Settings on XGS:

Dead Peer Detection is set to Re-initiate

Something wrong? Why did it not reconnect?



This thread was automatically locked due to age.
  • Hello there,

    Thank you for contacting the Sophos Community.

    You would need to compare the logs in the UTM at the time the XG was sending the retransmits. 

    You should see in the XG something like sending retransmit 1 of request message ID

    Regards,


     
    Emmanuel (EmmoSophos)
    Technical Team Lead, Global Community Support
    Sophos Support VideosProduct Documentation  |  @SophosSupport  | Sign up for SMS Alerts
    If a post solves your question use the 'Verify Answer' link.
  • As far as i can remember, DPD is something to reconnect, if the peer is enabled. This means, the tunnel is active. It is not a feature to "continue to connect/re-initiate a connection for ever". The Logs indicates, the tunnel was tried to be reconnected for some time. 

    How long was the UTM down/Unreachable? 

    __________________________________________________________________________________________________________________

  • Hi & thanks.

    I checked the SG logs and here they are.

    I cannot see any  incoming connections between the termination on Jun 3rd and the manual re-connect at June 7th.

    So the SG was online all the time and had other tunnels to other remote XG and XGS firewalls established without interruption.

    It just looks like the XGS decided to terminate and stop IPSec VPN as there is also nothing in between 3rd and manual re-connect on 7th.

    SG Logs

    2022:06:03-10:00:32 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_9"[14] XGS-FW-WAN-IP:4500 #398812: received Delete SA(0xce1cdcb1) payload: deleting IPSEC State #398560
    2022:06:03-10:01:05 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_64"[13] XGS-FW-WAN-IP:4500 #399504: initiating Quick Mode PUBKEY+ENCRYPT+TUNNEL+PFS to replace #398800 {using isakmp#398812}
    2022:06:03-10:01:05 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_64"[13] XGS-FW-WAN-IP:4500 #399504: sent QI2, IPsec SA established {ESP=>0xc67095dd <0x24f126fb NATOA=0.0.0.0 DPD}
    2022:06:03-10:01:40 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_16"[13] XGS-FW-WAN-IP:4500 #399514: initiating Quick Mode PUBKEY+ENCRYPT+TUNNEL+PFS to replace #398804 {using isakmp#398812}
    2022:06:03-10:01:40 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_16"[13] XGS-FW-WAN-IP:4500 #399514: sent QI2, IPsec SA established {ESP=>0xc3056c76 <0x8fb5d9ac NATOA=0.0.0.0 DPD}
    2022:06:03-10:01:44 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_52"[13] XGS-FW-WAN-IP:4500 #399518: initiating Quick Mode PUBKEY+ENCRYPT+TUNNEL+PFS to replace #398792 {using isakmp#398812}
    2022:06:03-10:01:44 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_52"[13] XGS-FW-WAN-IP:4500 #399518: sent QI2, IPsec SA established {ESP=>0xc6e987e1 <0x4c8b938d NATOA=0.0.0.0 DPD}
    2022:06:03-10:02:22 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_9"[14] XGS-FW-WAN-IP:4500 #398812: received Delete SA(0xc997b7f8) payload: deleting IPSEC State #398588
    2022:06:03-10:03:00 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_54"[13] XGS-FW-WAN-IP:4500 #399548: initiating Quick Mode PUBKEY+ENCRYPT+TUNNEL+PFS to replace #398774 {using isakmp#398812}
    2022:06:03-10:03:00 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_54"[13] XGS-FW-WAN-IP:4500 #399548: sent QI2, IPsec SA established {ESP=>0xc4f4c674 <0x0cf38a20 NATOA=0.0.0.0 DPD}
    2022:06:03-10:03:16 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_18"[13] XGS-FW-WAN-IP:4500 #399554: initiating Quick Mode PUBKEY+ENCRYPT+TUNNEL+PFS to replace #398775 {using isakmp#398812}
    2022:06:03-10:03:16 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_18"[13] XGS-FW-WAN-IP:4500 #399554: sent QI2, IPsec SA established {ESP=>0xc997b165 <0x91e769ff NATOA=0.0.0.0 DPD}
    2022:06:03-10:04:01 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_24"[13] XGS-FW-WAN-IP:4500 #399571: initiating Quick Mode PUBKEY+ENCRYPT+TUNNEL+PFS to replace #398793 {using isakmp#398812}
    2022:06:03-10:04:01 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_24"[13] XGS-FW-WAN-IP:4500 #399571: sent QI2, IPsec SA established {ESP=>0xc5af7d50 <0x4fb17045 NATOA=0.0.0.0 DPD}
    2022:06:03-10:04:29 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_9"[14] XGS-FW-WAN-IP:4500 #398812: received Delete SA(0xc61aa124) payload: deleting IPSEC State #398620
    2022:06:03-10:04:40 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_67"[13] XGS-FW-WAN-IP:4500 #399586: initiating Quick Mode PUBKEY+ENCRYPT+TUNNEL+PFS to replace #398764 {using isakmp#398812}
    2022:06:03-10:04:41 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_67"[13] XGS-FW-WAN-IP:4500 #399586: sent QI2, IPsec SA established {ESP=>0xcbdcaf00 <0x85177004 NATOA=0.0.0.0 DPD}
    2022:06:03-10:05:17 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_9"[14] XGS-FW-WAN-IP:4500 #399604: initiating Main Mode to replace #398812
    2022:06:03-10:05:17 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_9"[14] XGS-FW-WAN-IP:4500 #399604: received Vendor ID payload [XAUTH]
    2022:06:03-10:05:17 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_9"[14] XGS-FW-WAN-IP:4500 #399604: received Vendor ID payload [Dead Peer Detection]
    2022:06:03-10:05:17 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_9"[14] XGS-FW-WAN-IP:4500 #399604: ignoring Vendor ID payload [Cisco-Unity]
    2022:06:03-10:05:17 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_9"[14] XGS-FW-WAN-IP:4500 #399604: received Vendor ID payload [RFC 3947]
    2022:06:03-10:05:17 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_9"[14] XGS-FW-WAN-IP:4500 #399604: enabling possible NAT-traversal with method 3
    2022:06:03-10:05:17 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_9"[14] XGS-FW-WAN-IP:4500 #399604: NAT-Traversal: Result using RFC 3947: peer is NATed
    2022:06:03-10:05:17 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_9"[14] XGS-FW-WAN-IP:4500 #399604: we don't have a cert
    2022:06:03-10:05:17 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_9"[14] XGS-FW-WAN-IP:4500 #399604: Peer ID is ID_FQDN: 'xgfw.dummy.domain'
    2022:06:03-10:05:17 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_9"[14] XGS-FW-WAN-IP:4500 #399604: Dead Peer Detection (RFC 3706) enabled
    2022:06:03-10:05:17 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_9"[14] XGS-FW-WAN-IP:4500 #399604: ISAKMP SA established
    2022:06:03-10:05:26 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_53"[13] XGS-FW-WAN-IP:4500 #399607: initiating Quick Mode PUBKEY+ENCRYPT+TUNNEL+PFS to replace #398797 {using isakmp#399604}
    2022:06:03-10:05:26 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_53"[13] XGS-FW-WAN-IP:4500 #399607: sent QI2, IPsec SA established {ESP=>0xce429317 <0x09f7fe02 NATOA=0.0.0.0 DPD}
    2022:06:03-10:05:27 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_9"[14] XGS-FW-WAN-IP:4500 #398812: received Delete SA payload: deleting ISAKMP State #398812
    2022:06:03-10:05:41 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_55"[13] XGS-FW-WAN-IP:4500 #399615: initiating Quick Mode PUBKEY+ENCRYPT+TUNNEL+PFS to replace #398865 {using isakmp#399604}
    2022:06:03-10:05:41 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_55"[13] XGS-FW-WAN-IP:4500 #399615: sent QI2, IPsec SA established {ESP=>0xc914d350 <0xf8470dfc NATOA=0.0.0.0 DPD}
    2022:06:03-10:05:44 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_3"[12] XGS-FW-WAN-IP:4500 #399617: initiating Quick Mode PUBKEY+ENCRYPT+TUNNEL+PFS to replace #398946 {using isakmp#399604}
    2022:06:03-10:05:44 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_3"[12] XGS-FW-WAN-IP:4500 #399617: sent QI2, IPsec SA established {ESP=>0xce00bcc3 <0x0f75b890 NATOA=0.0.0.0 DPD}
    2022:06:03-10:06:27 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_61"[13] XGS-FW-WAN-IP:4500 #399635: initiating Quick Mode PUBKEY+ENCRYPT+TUNNEL+PFS to replace #398971 {using isakmp#399604}
    2022:06:03-10:06:27 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_61"[13] XGS-FW-WAN-IP:4500 #399635: sent QI2, IPsec SA established {ESP=>0xcdc76a34 <0x6b95908f NATOA=0.0.0.0 DPD}
    2022:06:03-10:06:30 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_0"[13] XGS-FW-WAN-IP:4500 #399636: initiating Quick Mode PUBKEY+ENCRYPT+TUNNEL+PFS to replace #398931 {using isakmp#399604}
    2022:06:03-10:06:31 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_0"[13] XGS-FW-WAN-IP:4500 #399636: sent QI2, IPsec SA established {ESP=>0xc1131433 <0x39f6fee9 NATOA=0.0.0.0 DPD}
    2022:06:03-10:06:57 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_14"[13] XGS-FW-WAN-IP:4500 #399648: initiating Quick Mode PUBKEY+ENCRYPT+TUNNEL+PFS to replace #398978 {using isakmp#399604}
    2022:06:03-10:06:57 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_14"[13] XGS-FW-WAN-IP:4500 #399648: sent QI2, IPsec SA established {ESP=>0xc2994d6f <0xdea90648 NATOA=0.0.0.0 DPD}
    2022:06:03-10:06:59 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_12"[13] XGS-FW-WAN-IP:4500 #399649: initiating Quick Mode PUBKEY+ENCRYPT+TUNNEL+PFS to replace #398963 {using isakmp#399604}
    2022:06:03-10:07:00 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_12"[13] XGS-FW-WAN-IP:4500 #399649: sent QI2, IPsec SA established {ESP=>0xc8b8c5fd <0xa3079923 NATOA=0.0.0.0 DPD}
    2022:06:03-10:07:03 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_33"[13] XGS-FW-WAN-IP:4500 #399653: initiating Quick Mode PUBKEY+ENCRYPT+TUNNEL+PFS to replace #398902 {using isakmp#399604}
    2022:06:03-10:07:03 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_33"[13] XGS-FW-WAN-IP:4500 #399653: sent QI2, IPsec SA established {ESP=>0xcf093bc7 <0x9d5a5ba4 NATOA=0.0.0.0 DPD}
    2022:06:03-10:07:30 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_9"[14] XGS-FW-WAN-IP:4500 #399604: received Delete SA(0xcb525105) payload: deleting IPSEC State #398655
    2022:06:03-10:07:39 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_66"[12] XGS-FW-WAN-IP:4500 #399669: initiating Quick Mode PUBKEY+ENCRYPT+TUNNEL+PFS to replace #398915 {using isakmp#399604}
    2022:06:03-10:07:40 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_66"[12] XGS-FW-WAN-IP:4500 #399669: sent QI2, IPsec SA established {ESP=>0xcf8cf3d1 <0x676f1b9a NATOA=0.0.0.0 DPD}
    2022:06:03-10:08:11 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_35"[13] XGS-FW-WAN-IP:4500 #399683: initiating Quick Mode PUBKEY+ENCRYPT+TUNNEL+PFS to replace #398845 {using isakmp#399604}
    2022:06:03-10:08:11 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_35"[13] XGS-FW-WAN-IP:4500 #399683: sent QI2, IPsec SA established {ESP=>0xce9a3e2c <0xed638e48 NATOA=0.0.0.0 DPD}
    2022:06:03-10:08:16 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_28"[13] XGS-FW-WAN-IP:4500 #399688: initiating Quick Mode PUBKEY+ENCRYPT+TUNNEL+PFS to replace #398884 {using isakmp#399604}
    2022:06:03-10:08:16 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_28"[13] XGS-FW-WAN-IP:4500 #399688: sent QI2, IPsec SA established {ESP=>0xc64052b5 <0xcb8cfd9f NATOA=0.0.0.0 DPD}
    2022:06:03-10:08:35 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_26"[13] XGS-FW-WAN-IP:4500 #399691: initiating Quick Mode PUBKEY+ENCRYPT+TUNNEL+PFS to replace #398964 {using isakmp#399604}
    2022:06:03-10:08:35 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_26"[13] XGS-FW-WAN-IP:4500 #399691: sent QI2, IPsec SA established {ESP=>0xc76f7ebb <0xa751dec5 NATOA=0.0.0.0 DPD}
    2022:06:03-10:08:41 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_51"[13] XGS-FW-WAN-IP:4500 #399696: initiating Quick Mode PUBKEY+ENCRYPT+TUNNEL+PFS to replace #398968 {using isakmp#399604}
    2022:06:03-10:08:41 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_51"[13] XGS-FW-WAN-IP:4500 #399696: sent QI2, IPsec SA established {ESP=>0xc83e0601 <0x00ff5024 NATOA=0.0.0.0 DPD}
    2022:06:03-10:09:52 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_9"[14] XGS-FW-WAN-IP:4500 #399604: ignoring Delete SA payload: PROTO_IPSEC_ESP SA(0xc907b3d2) not found (maybe expired)
    2022:06:03-10:10:45 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_4"[13] XGS-FW-WAN-IP:4500 #399749: initiating Quick Mode PUBKEY+ENCRYPT+TUNNEL+PFS to replace #398979 {using isakmp#399604}
    2022:06:03-10:10:45 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_4"[13] XGS-FW-WAN-IP:4500 #399749: sent QI2, IPsec SA established {ESP=>0xcf548c98 <0x615258ac NATOA=0.0.0.0 DPD}
    2022:06:03-10:11:27 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_9"[14] XGS-FW-WAN-IP:4500 #399604: received Delete SA(0xc7f4cf9f) payload: deleting IPSEC State #398723
    2022:06:03-10:11:44 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_59"[13] XGS-FW-WAN-IP:4500 #399775: initiating Quick Mode PUBKEY+ENCRYPT+TUNNEL+PFS to replace #398976 {using isakmp#399604}
    2022:06:03-10:11:44 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_59"[13] XGS-FW-WAN-IP:4500 #399775: sent QI2, IPsec SA established {ESP=>0xc33b4caa <0x7b262451 NATOA=0.0.0.0 DPD}
    2022:06:03-10:12:35 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_60"[13] XGS-FW-WAN-IP:4500 #399795: initiating Quick Mode PUBKEY+ENCRYPT+TUNNEL+PFS to replace #399007 {using isakmp#399604}
    2022:06:03-10:12:35 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_60"[13] XGS-FW-WAN-IP:4500 #399795: sent QI2, IPsec SA established {ESP=>0xc6c2745b <0x9c0f705e NATOA=0.0.0.0 DPD}
    2022:06:03-10:13:46 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_32"[13] XGS-FW-WAN-IP:4500 #399822: initiating Quick Mode PUBKEY+ENCRYPT+TUNNEL+PFS to replace #399003 {using isakmp#399604}
    2022:06:03-10:13:46 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_32"[13] XGS-FW-WAN-IP:4500 #399822: sent QI2, IPsec SA established {ESP=>0xc932088e <0x57b2ae09 NATOA=0.0.0.0 DPD}
    2022:06:03-10:14:08 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_63"[13] XGS-FW-WAN-IP:4500 #399832: initiating Quick Mode PUBKEY+ENCRYPT+TUNNEL+PFS to replace #399039 {using isakmp#399604}
    2022:06:03-10:14:08 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_63"[13] XGS-FW-WAN-IP:4500 #399832: sent QI2, IPsec SA established {ESP=>0xc99495d0 <0xb9e466f7 NATOA=0.0.0.0 DPD}
    2022:06:03-10:14:20 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_45"[12] XGS-FW-WAN-IP:4500 #399836: initiating Quick Mode PUBKEY+ENCRYPT+TUNNEL+PFS to replace #399014 {using isakmp#399604}
    2022:06:03-10:14:21 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_45"[12] XGS-FW-WAN-IP:4500 #399836: sent QI2, IPsec SA established {ESP=>0xce3c6008 <0x48584f6b NATOA=0.0.0.0 DPD}
    2022:06:03-10:15:37 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_9"[14] XGS-FW-WAN-IP:4500 #399604: received Delete SA(0xcef077de) payload: deleting IPSEC State #398804
    2022:06:03-10:16:05 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_65"[13] XGS-FW-WAN-IP:4500 #399880: initiating Quick Mode PUBKEY+ENCRYPT+TUNNEL+PFS to replace #399071 {using isakmp#399604}
    2022:06:03-10:16:05 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_65"[13] XGS-FW-WAN-IP:4500 #399880: sent QI2, IPsec SA established {ESP=>0xc3b9293b <0xb1ffcc80 NATOA=0.0.0.0 DPD}
    2022:06:03-10:16:08 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_17"[13] XGS-FW-WAN-IP:4500 #399882: initiating Quick Mode PUBKEY+ENCRYPT+TUNNEL+PFS to replace #398995 {using isakmp#399604}
    2022:06:03-10:16:08 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_17"[13] XGS-FW-WAN-IP:4500 #399882: sent QI2, IPsec SA established {ESP=>0xc4846f36 <0x76f42337 NATOA=0.0.0.0 DPD}
    2022:06:03-10:17:06 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_57"[13] XGS-FW-WAN-IP:4500 #399907: initiating Quick Mode PUBKEY+ENCRYPT+TUNNEL+PFS to replace #399081 {using isakmp#399604}
    2022:06:03-10:17:06 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_57"[13] XGS-FW-WAN-IP:4500 #399907: sent QI2, IPsec SA established {ESP=>0xc8315cfa <0xc377b897 NATOA=0.0.0.0 DPD}
    2022:06:03-10:18:14 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_22"[13] XGS-FW-WAN-IP:4500 #399937: initiating Quick Mode PUBKEY+ENCRYPT+TUNNEL+PFS to replace #399080 {using isakmp#399604}
    2022:06:03-10:18:52 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_41"[13] XGS-FW-WAN-IP:4500 #399951: initiating Quick Mode PUBKEY+ENCRYPT+TUNNEL+PFS to replace #399096 {using isakmp#399604}
    2022:06:03-10:18:57 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_41"[13] XGS-FW-WAN-IP:4500 #399951: sent QI2, IPsec SA established {ESP=>0xc73dfcb9 <0x85c31292 NATOA=0.0.0.0 DPD}
    2022:06:03-10:19:24 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_22"[13] XGS-FW-WAN-IP:4500 #399937: max number of retransmissions (2) reached STATE_QUICK_I1
    2022:06:03-10:19:24 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_22"[13] XGS-FW-WAN-IP:4500 #399937: starting keying attempt 2 of an unlimited number
    2022:06:03-10:19:24 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_22"[13] XGS-FW-WAN-IP:4500 #399966: initiating Quick Mode PUBKEY+ENCRYPT+TUNNEL+PFS to replace #399937 {using isakmp#399604}
    2022:06:03-10:19:57 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_37"[13] XGS-FW-WAN-IP:4500 #399980: initiating Quick Mode PUBKEY+ENCRYPT+TUNNEL+PFS to replace #399106 {using isakmp#399604}
    2022:06:03-10:19:59 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_1"[13] XGS-FW-WAN-IP:4500 #399981: initiating Quick Mode PUBKEY+ENCRYPT+TUNNEL+PFS to replace #399134 {using isakmp#399604}
    2022:06:03-10:20:09 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_9"[14] XGS-FW-WAN-IP:4500 #399604: ignoring informational payload, type PAYLOAD_MALFORMED
    2022:06:03-10:20:10 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_1"[13] XGS-FW-WAN-IP:4500 #399981: sent QI2, IPsec SA established {ESP=>0xc6426470 <0x1853eb9d NATOA=0.0.0.0 DPD}
    2022:06:03-10:20:27 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_9"[14] XGS-FW-WAN-IP:4500 #399604: ignoring informational payload, type PAYLOAD_MALFORMED
    2022:06:03-10:20:34 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_22"[13] XGS-FW-WAN-IP:4500 #399966: max number of retransmissions (2) reached STATE_QUICK_I1
    2022:06:03-10:20:34 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_22"[13] XGS-FW-WAN-IP:4500 #399966: starting keying attempt 3 of an unlimited number
    2022:06:03-10:20:34 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_22"[13] XGS-FW-WAN-IP:4500 #399995: initiating Quick Mode PUBKEY+ENCRYPT+TUNNEL+PFS to replace #399966 {using isakmp#399604}
    2022:06:03-10:20:34 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_22"[13] XGS-FW-WAN-IP:4500 #399995: sent QI2, IPsec SA established {ESP=>0xc98fe7bb <0x32b83333 NATOA=0.0.0.0 DPD}
    2022:06:03-10:20:57 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_11"[13] XGS-FW-WAN-IP:4500 #400005: initiating Quick Mode PUBKEY+ENCRYPT+TUNNEL+PFS to replace #399197 {using isakmp#399604}
    2022:06:03-10:21:07 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_37"[13] XGS-FW-WAN-IP:4500 #399980: max number of retransmissions (2) reached STATE_QUICK_I1
    2022:06:03-10:21:07 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_37"[13] XGS-FW-WAN-IP:4500 #399980: starting keying attempt 2 of an unlimited number
    2022:06:03-10:21:07 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_37"[13] XGS-FW-WAN-IP:4500 #400012: initiating Quick Mode PUBKEY+ENCRYPT+TUNNEL+PFS to replace #399980 {using isakmp#399604}
    2022:06:03-10:21:27 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_9"[14] XGS-FW-WAN-IP:4500 #399604: ignoring informational payload, type PAYLOAD_MALFORMED
    2022:06:03-10:21:31 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_37"[13] XGS-FW-WAN-IP:4500 #400012: sent QI2, IPsec SA established {ESP=>0xc91e94be <0x98a86487 NATOA=0.0.0.0 DPD}
    2022:06:03-10:21:36 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_9"[14] XGS-FW-WAN-IP:4500 #399604: received Delete SA(0xc2760fa0) payload: deleting IPSEC State #398915
    2022:06:03-10:22:06 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_68"[13] XGS-FW-WAN-IP:4500 #400020: initiating Quick Mode PUBKEY+ENCRYPT+TUNNEL+PFS to replace #399208 {using isakmp#399604}
    2022:06:03-10:22:06 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_68"[13] XGS-FW-WAN-IP:4500 #400020: sent QI2, IPsec SA established {ESP=>0xcdeb1353 <0xbe08324e NATOA=0.0.0.0 DPD}
    2022:06:03-10:22:07 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_11"[13] XGS-FW-WAN-IP:4500 #400005: max number of retransmissions (2) reached STATE_QUICK_I1
    2022:06:03-10:22:07 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_11"[13] XGS-FW-WAN-IP:4500 #400005: starting keying attempt 2 of an unlimited number
    2022:06:03-10:22:07 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_11"[13] XGS-FW-WAN-IP:4500 #400021: initiating Quick Mode PUBKEY+ENCRYPT+TUNNEL+PFS to replace #400005 {using isakmp#399604}
    2022:06:03-10:22:07 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_11"[13] XGS-FW-WAN-IP:4500 #400021: sent QI2, IPsec SA established {ESP=>0xc0a88019 <0x59758769 NATOA=0.0.0.0 DPD}
    2022:06:03-10:22:31 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_62"[13] XGS-FW-WAN-IP:4500 #400027: initiating Quick Mode PUBKEY+ENCRYPT+TUNNEL+PFS to replace #399215 {using isakmp#399604}
    2022:06:03-10:22:32 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_62"[13] XGS-FW-WAN-IP:4500 #400027: sent QI2, IPsec SA established {ESP=>0xc55a347b <0x5a262ead NATOA=0.0.0.0 DPD}
    2022:06:03-10:23:04 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_9"[14] XGS-FW-WAN-IP:4500 #399604: received Delete SA(0xc90544a2) payload: deleting IPSEC State #398946
    2022:06:03-10:23:18 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_19"[13] XGS-FW-WAN-IP:4500 #400030: initiating Quick Mode PUBKEY+ENCRYPT+TUNNEL+PFS to replace #399171 {using isakmp#399604}
    2022:06:03-10:23:18 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_19"[13] XGS-FW-WAN-IP:4500 #400030: sent QI2, IPsec SA established {ESP=>0xc65e9c63 <0xc9e0b53e NATOA=0.0.0.0 DPD}
    2022:06:03-10:23:46 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_29"[13] XGS-FW-WAN-IP:4500 #400035: initiating Quick Mode PUBKEY+ENCRYPT+TUNNEL+PFS to replace #399167 {using isakmp#399604}
    2022:06:03-10:24:32 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_38"[13] XGS-FW-WAN-IP:4500 #400040: initiating Quick Mode PUBKEY+ENCRYPT+TUNNEL+PFS to replace #399148 {using isakmp#399604}
    2022:06:03-10:24:56 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_29"[13] XGS-FW-WAN-IP:4500 #400035: max number of retransmissions (2) reached STATE_QUICK_I1
    2022:06:03-10:24:56 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_29"[13] XGS-FW-WAN-IP:4500 #400035: starting keying attempt 2 of an unlimited number
    2022:06:03-10:24:56 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_29"[13] XGS-FW-WAN-IP:4500 #400043: initiating Quick Mode PUBKEY+ENCRYPT+TUNNEL+PFS to replace #400035 {using isakmp#399604}
    2022:06:03-10:24:56 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_5"[13] XGS-FW-WAN-IP:4500 #400044: initiating Quick Mode PUBKEY+ENCRYPT+TUNNEL+PFS to replace #399218 {using isakmp#399604}
    2022:06:03-10:25:21 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_5"[13] XGS-FW-WAN-IP:4500 #400044: sent QI2, IPsec SA established {ESP=>0xc67a16da <0x7d1e81de NATOA=0.0.0.0 DPD}
    2022:06:03-10:25:23 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_46"[13] XGS-FW-WAN-IP:4500 #400045: initiating Quick Mode PUBKEY+ENCRYPT+TUNNEL+PFS to replace #399184 {using isakmp#399604}
    2022:06:03-10:25:23 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_46"[13] XGS-FW-WAN-IP:4500 #400045: sent QI2, IPsec SA established {ESP=>0xc11ecde7 <0x1ca2767b NATOA=0.0.0.0 DPD}
    2022:06:03-10:25:24 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_56"[13] XGS-FW-WAN-IP:4500 #400046: initiating Quick Mode PUBKEY+ENCRYPT+TUNNEL+PFS to replace #399173 {using isakmp#399604}
    2022:06:03-10:25:24 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_56"[13] XGS-FW-WAN-IP:4500 #400046: sent QI2, IPsec SA established {ESP=>0xc301ec24 <0xeef4a856 NATOA=0.0.0.0 DPD}
    2022:06:03-10:25:34 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_13"[13] XGS-FW-WAN-IP:4500 #400047: initiating Quick Mode PUBKEY+ENCRYPT+TUNNEL+PFS to replace #399213 {using isakmp#399604}
    2022:06:03-10:25:42 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_38"[13] XGS-FW-WAN-IP:4500 #400040: max number of retransmissions (2) reached STATE_QUICK_I1
    2022:06:03-10:25:42 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_38"[13] XGS-FW-WAN-IP:4500 #400040: starting keying attempt 2 of an unlimited number
    2022:06:03-10:25:42 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_38"[13] XGS-FW-WAN-IP:4500 #400048: initiating Quick Mode PUBKEY+ENCRYPT+TUNNEL+PFS to replace #400040 {using isakmp#399604}
    2022:06:03-10:26:06 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_29"[13] XGS-FW-WAN-IP:4500 #400043: max number of retransmissions (2) reached STATE_QUICK_I1
    2022:06:03-10:26:06 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_29"[13] XGS-FW-WAN-IP:4500 #400043: starting keying attempt 3 of an unlimited number
    2022:06:03-10:26:06 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_29"[13] XGS-FW-WAN-IP:4500 #400052: initiating Quick Mode PUBKEY+ENCRYPT+TUNNEL+PFS to replace #400043 {using isakmp#399604}
    2022:06:03-10:26:31 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_9"[14] XGS-FW-WAN-IP:4500 #399604: DPD: No response from peer - declaring peer dead
    2022:06:03-10:26:31 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_9"[14] XGS-FW-WAN-IP:4500 #399604: DPD: Terminating all SAs using this connection
    2022:06:03-10:26:31 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_9"[14] XGS-FW-WAN-IP:4500 #399604: deleting connection "S_REF_IpsSitTunnelxgs2sg_9"[14] instance with peer XGS-FW-WAN-IP {isakmp=#399604/ipsec=#399417}
    2022:06:03-10:26:31 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_67"[13] XGS-FW-WAN-IP:4500 #399586: deleting state (STATE_QUICK_I2)
    2022:06:03-10:26:31 fw-320-2 pluto[8792]: id="2204" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN down" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:03-10:26:31 fw-320-2 pluto[8792]: "S_REF_IpsSitTunnelxgs2sg_67"[13] XGS-FW-WAN-IP:4500: deleting connection "S_REF_IpsSitTunnelxgs2sg_67"[13] instance with peer XGS-FW-WAN-IP {isakmp=#0/ipsec=#0}
    2022:06:03-10:26:31 fw-320-1 pluto[8907]: id="2204" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN down" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:03-10:26:31 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_67"[13] XGS-FW-WAN-IP:4500: deleting connection "S_REF_IpsSitTunnelxgs2sg_67"[13] instance with peer XGS-FW-WAN-IP {isakmp=#0/ipsec=#0}
    2022:06:03-10:26:31 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_24"[13] XGS-FW-WAN-IP:4500 #399571: deleting state (STATE_QUICK_I2)
    2022:06:03-10:26:31 fw-320-2 pluto[8792]: id="2204" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN down" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:03-10:26:31 fw-320-2 pluto[8792]: "S_REF_IpsSitTunnelxgs2sg_24"[13] XGS-FW-WAN-IP:4500: deleting connection "S_REF_IpsSitTunnelxgs2sg_24"[13] instance with peer XGS-FW-WAN-IP {isakmp=#0/ipsec=#0}
    2022:06:03-10:26:31 fw-320-1 pluto[8907]: id="2204" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN down" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:03-10:26:31 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_24"[13] XGS-FW-WAN-IP:4500: deleting connection "S_REF_IpsSitTunnelxgs2sg_24"[13] instance with peer XGS-FW-WAN-IP {isakmp=#0/ipsec=#0}
    2022:06:03-10:26:31 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_18"[13] XGS-FW-WAN-IP:4500 #399554: deleting state (STATE_QUICK_I2)
    2022:06:03-10:26:31 fw-320-2 pluto[8792]: id="2204" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN down" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:03-10:26:31 fw-320-2 pluto[8792]: "S_REF_IpsSitTunnelxgs2sg_18"[13] XGS-FW-WAN-IP:4500: deleting connection "S_REF_IpsSitTunnelxgs2sg_18"[13] instance with peer XGS-FW-WAN-IP {isakmp=#0/ipsec=#0}
    2022:06:03-10:26:31 fw-320-1 pluto[8907]: id="2204" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN down" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:03-10:26:31 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_18"[13] XGS-FW-WAN-IP:4500: deleting connection "S_REF_IpsSitTunnelxgs2sg_18"[13] instance with peer XGS-FW-WAN-IP {isakmp=#0/ipsec=#0}
    2022:06:03-10:26:31 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_54"[13] XGS-FW-WAN-IP:4500 #399548: deleting state (STATE_QUICK_I2)
    2022:06:03-10:26:31 fw-320-2 pluto[8792]: id="2204" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN down" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:03-10:26:31 fw-320-2 pluto[8792]: "S_REF_IpsSitTunnelxgs2sg_54"[13] XGS-FW-WAN-IP:4500: deleting connection "S_REF_IpsSitTunnelxgs2sg_54"[13] instance with peer XGS-FW-WAN-IP {isakmp=#0/ipsec=#0}
    2022:06:03-10:26:31 fw-320-1 pluto[8907]: id="2204" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN down" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:03-10:26:31 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_54"[13] XGS-FW-WAN-IP:4500: deleting connection "S_REF_IpsSitTunnelxgs2sg_54"[13] instance with peer XGS-FW-WAN-IP {isakmp=#0/ipsec=#0}
    2022:06:03-10:26:31 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_52"[13] XGS-FW-WAN-IP:4500 #399518: deleting state (STATE_QUICK_I2)
    2022:06:03-10:26:31 fw-320-2 pluto[8792]: id="2204" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN down" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:03-10:26:31 fw-320-2 pluto[8792]: "S_REF_IpsSitTunnelxgs2sg_52"[13] XGS-FW-WAN-IP:4500: deleting connection "S_REF_IpsSitTunnelxgs2sg_52"[13] instance with peer XGS-FW-WAN-IP {isakmp=#0/ipsec=#0}
    2022:06:03-10:26:31 fw-320-1 pluto[8907]: id="2204" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN down" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:03-10:26:31 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_52"[13] XGS-FW-WAN-IP:4500: deleting connection "S_REF_IpsSitTunnelxgs2sg_52"[13] instance with peer XGS-FW-WAN-IP {isakmp=#0/ipsec=#0}
    2022:06:03-10:26:31 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_16"[13] XGS-FW-WAN-IP:4500 #399514: deleting state (STATE_QUICK_I2)
    2022:06:03-10:26:31 fw-320-2 pluto[8792]: id="2204" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN down" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:03-10:26:31 fw-320-1 pluto[8907]: id="2204" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN down" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:03-10:26:31 fw-320-2 pluto[8792]: "S_REF_IpsSitTunnelxgs2sg_16"[13] XGS-FW-WAN-IP:4500: deleting connection "S_REF_IpsSitTunnelxgs2sg_16"[13] instance with peer XGS-FW-WAN-IP {isakmp=#0/ipsec=#0}
    2022:06:03-10:26:31 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_16"[13] XGS-FW-WAN-IP:4500: deleting connection "S_REF_IpsSitTunnelxgs2sg_16"[13] instance with peer XGS-FW-WAN-IP {isakmp=#0/ipsec=#0}
    2022:06:03-10:26:31 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_64"[13] XGS-FW-WAN-IP:4500 #399504: deleting state (STATE_QUICK_I2)
    2022:06:03-10:26:31 fw-320-2 pluto[8792]: id="2204" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN down" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:03-10:26:31 fw-320-2 pluto[8792]: "S_REF_IpsSitTunnelxgs2sg_64"[13] XGS-FW-WAN-IP:4500: deleting connection "S_REF_IpsSitTunnelxgs2sg_64"[13] instance with peer XGS-FW-WAN-IP {isakmp=#0/ipsec=#0}
    2022:06:03-10:26:31 fw-320-1 pluto[8907]: id="2204" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN down" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:03-10:26:31 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_64"[13] XGS-FW-WAN-IP:4500: deleting connection "S_REF_IpsSitTunnelxgs2sg_64"[13] instance with peer XGS-FW-WAN-IP {isakmp=#0/ipsec=#0}
    2022:06:03-10:26:31 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_31"[13] XGS-FW-WAN-IP:4500 #399474: deleting state (STATE_QUICK_I2)
    2022:06:03-10:26:31 fw-320-2 pluto[8792]: id="2204" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN down" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:03-10:26:31 fw-320-2 pluto[8792]: "S_REF_IpsSitTunnelxgs2sg_31"[13] XGS-FW-WAN-IP:4500: deleting connection "S_REF_IpsSitTunnelxgs2sg_31"[13] instance with peer XGS-FW-WAN-IP {isakmp=#0/ipsec=#0}
    2022:06:03-10:26:31 fw-320-1 pluto[8907]: id="2204" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN down" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:03-10:26:31 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_31"[13] XGS-FW-WAN-IP:4500: deleting connection "S_REF_IpsSitTunnelxgs2sg_31"[13] instance with peer XGS-FW-WAN-IP {isakmp=#0/ipsec=#0}
    2022:06:03-10:26:31 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_21"[13] XGS-FW-WAN-IP:4500 #399462: deleting state (STATE_QUICK_I2)
    2022:06:03-10:26:31 fw-320-2 pluto[8792]: id="2204" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN down" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:03-10:26:31 fw-320-2 pluto[8792]: "S_REF_IpsSitTunnelxgs2sg_21"[13] XGS-FW-WAN-IP:4500: deleting connection "S_REF_IpsSitTunnelxgs2sg_21"[13] instance with peer XGS-FW-WAN-IP {isakmp=#0/ipsec=#0}
    2022:06:03-10:26:31 fw-320-1 pluto[8907]: id="2204" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN down" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:03-10:26:31 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_21"[13] XGS-FW-WAN-IP:4500: deleting connection "S_REF_IpsSitTunnelxgs2sg_21"[13] instance with peer XGS-FW-WAN-IP {isakmp=#0/ipsec=#0}
    2022:06:03-10:26:32 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_6"[12] XGS-FW-WAN-IP:4500 #399425: deleting state (STATE_QUICK_I2)
    2022:06:03-10:26:32 fw-320-2 pluto[8792]: id="2204" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN down" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:03-10:26:32 fw-320-2 pluto[8792]: "S_REF_IpsSitTunnelxgs2sg_6"[12] XGS-FW-WAN-IP:4500: deleting connection "S_REF_IpsSitTunnelxgs2sg_6"[12] instance with peer XGS-FW-WAN-IP {isakmp=#0/ipsec=#0}
    2022:06:03-10:26:32 fw-320-1 pluto[8907]: id="2204" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN down" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:03-10:26:32 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_6"[12] XGS-FW-WAN-IP:4500: deleting connection "S_REF_IpsSitTunnelxgs2sg_6"[12] instance with peer XGS-FW-WAN-IP {isakmp=#0/ipsec=#0}
    2022:06:03-10:26:32 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_9" #399417: deleting state (STATE_QUICK_I2)
    2022:06:03-10:26:32 fw-320-2 pluto[8792]: id="2204" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN down" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:03-10:26:32 fw-320-1 pluto[8907]: id="2204" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN down" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:03-10:26:32 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_23"[13] XGS-FW-WAN-IP:4500 #399402: deleting state (STATE_QUICK_I2)
    2022:06:03-10:26:32 fw-320-2 pluto[8792]: id="2204" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN down" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:03-10:26:32 fw-320-2 pluto[8792]: "S_REF_IpsSitTunnelxgs2sg_23"[13] XGS-FW-WAN-IP:4500: deleting connection "S_REF_IpsSitTunnelxgs2sg_23"[13] instance with peer XGS-FW-WAN-IP {isakmp=#0/ipsec=#0}
    2022:06:03-10:26:32 fw-320-1 pluto[8907]: id="2204" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN down" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:03-10:26:32 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_23"[13] XGS-FW-WAN-IP:4500: deleting connection "S_REF_IpsSitTunnelxgs2sg_23"[13] instance with peer XGS-FW-WAN-IP {isakmp=#0/ipsec=#0}
    2022:06:03-10:26:32 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_43"[13] XGS-FW-WAN-IP:4500 #399379: deleting state (STATE_QUICK_I2)
    2022:06:03-10:26:32 fw-320-2 pluto[8792]: id="2204" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN down" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:03-10:26:32 fw-320-2 pluto[8792]: "S_REF_IpsSitTunnelxgs2sg_43"[13] XGS-FW-WAN-IP:4500: deleting connection "S_REF_IpsSitTunnelxgs2sg_43"[13] instance with peer XGS-FW-WAN-IP {isakmp=#0/ipsec=#0}
    2022:06:03-10:26:32 fw-320-1 pluto[8907]: id="2204" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN down" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:03-10:26:32 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_43"[13] XGS-FW-WAN-IP:4500: deleting connection "S_REF_IpsSitTunnelxgs2sg_43"[13] instance with peer XGS-FW-WAN-IP {isakmp=#0/ipsec=#0}
    2022:06:03-10:26:32 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_8"[13] XGS-FW-WAN-IP:4500 #399374: deleting state (STATE_QUICK_I2)
    2022:06:03-10:26:32 fw-320-2 pluto[8792]: id="2204" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN down" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:03-10:26:32 fw-320-2 pluto[8792]: "S_REF_IpsSitTunnelxgs2sg_8"[13] XGS-FW-WAN-IP:4500: deleting connection "S_REF_IpsSitTunnelxgs2sg_8"[13] instance with peer XGS-FW-WAN-IP {isakmp=#0/ipsec=#0}
    2022:06:03-10:26:32 fw-320-1 pluto[8907]: id="2204" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN down" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:03-10:26:32 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_8"[13] XGS-FW-WAN-IP:4500: deleting connection "S_REF_IpsSitTunnelxgs2sg_8"[13] instance with peer XGS-FW-WAN-IP {isakmp=#0/ipsec=#0}
    2022:06:03-10:26:32 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_42"[13] XGS-FW-WAN-IP:4500 #399371: deleting state (STATE_QUICK_I2)
    2022:06:03-10:26:32 fw-320-2 pluto[8792]: id="2204" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN down" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:03-10:26:32 fw-320-2 pluto[8792]: "S_REF_IpsSitTunnelxgs2sg_42"[13] XGS-FW-WAN-IP:4500: deleting connection "S_REF_IpsSitTunnelxgs2sg_42"[13] instance with peer XGS-FW-WAN-IP {isakmp=#0/ipsec=#0}
    2022:06:03-10:26:32 fw-320-1 pluto[8907]: id="2204" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN down" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:03-10:26:32 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_42"[13] XGS-FW-WAN-IP:4500: deleting connection "S_REF_IpsSitTunnelxgs2sg_42"[13] instance with peer XGS-FW-WAN-IP {isakmp=#0/ipsec=#0}
    2022:06:03-10:26:32 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_50"[13] XGS-FW-WAN-IP:4500 #399356: deleting state (STATE_QUICK_I2)
    2022:06:03-10:26:32 fw-320-2 pluto[8792]: id="2204" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN down" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:03-10:26:32 fw-320-2 pluto[8792]: "S_REF_IpsSitTunnelxgs2sg_50"[13] XGS-FW-WAN-IP:4500: deleting connection "S_REF_IpsSitTunnelxgs2sg_50"[13] instance with peer XGS-FW-WAN-IP {isakmp=#0/ipsec=#0}
    2022:06:03-10:26:32 fw-320-1 pluto[8907]: id="2204" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN down" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:03-10:26:32 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_50"[13] XGS-FW-WAN-IP:4500: deleting connection "S_REF_IpsSitTunnelxgs2sg_50"[13] instance with peer XGS-FW-WAN-IP {isakmp=#0/ipsec=#0}
    2022:06:03-10:26:32 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_10"[13] XGS-FW-WAN-IP:4500 #399332: deleting state (STATE_QUICK_I2)
    2022:06:03-10:26:32 fw-320-2 pluto[8792]: id="2204" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN down" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:03-10:26:32 fw-320-2 pluto[8792]: "S_REF_IpsSitTunnelxgs2sg_10"[13] XGS-FW-WAN-IP:4500: deleting connection "S_REF_IpsSitTunnelxgs2sg_10"[13] instance with peer XGS-FW-WAN-IP {isakmp=#0/ipsec=#0}
    2022:06:03-10:26:32 fw-320-1 pluto[8907]: id="2204" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN down" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:03-10:26:32 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_10"[13] XGS-FW-WAN-IP:4500: deleting connection "S_REF_IpsSitTunnelxgs2sg_10"[13] instance with peer XGS-FW-WAN-IP {isakmp=#0/ipsec=#0}
    2022:06:03-10:26:32 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_27"[13] XGS-FW-WAN-IP:4500 #399330: deleting state (STATE_QUICK_I2)
    2022:06:03-10:26:32 fw-320-2 pluto[8792]: id="2204" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN down" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:03-10:26:32 fw-320-2 pluto[8792]: "S_REF_IpsSitTunnelxgs2sg_27"[13] XGS-FW-WAN-IP:4500: deleting connection "S_REF_IpsSitTunnelxgs2sg_27"[13] instance with peer XGS-FW-WAN-IP {isakmp=#0/ipsec=#0}
    2022:06:03-10:26:32 fw-320-1 pluto[8907]: id="2204" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN down" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:03-10:26:32 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_27"[13] XGS-FW-WAN-IP:4500: deleting connection "S_REF_IpsSitTunnelxgs2sg_27"[13] instance with peer XGS-FW-WAN-IP {isakmp=#0/ipsec=#0}
    2022:06:03-10:26:32 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_15"[13] XGS-FW-WAN-IP:4500 #399329: deleting state (STATE_QUICK_I2)
    2022:06:03-10:26:32 fw-320-2 pluto[8792]: id="2204" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN down" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:03-10:26:32 fw-320-2 pluto[8792]: "S_REF_IpsSitTunnelxgs2sg_15"[13] XGS-FW-WAN-IP:4500: deleting connection "S_REF_IpsSitTunnelxgs2sg_15"[13] instance with peer XGS-FW-WAN-IP {isakmp=#0/ipsec=#0}
    2022:06:03-10:26:32 fw-320-1 pluto[8907]: id="2204" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN down" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:03-10:26:32 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_15"[13] XGS-FW-WAN-IP:4500: deleting connection "S_REF_IpsSitTunnelxgs2sg_15"[13] instance with peer XGS-FW-WAN-IP {isakmp=#0/ipsec=#0}
    2022:06:03-10:26:32 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_2"[14] XGS-FW-WAN-IP:4500 #399319: deleting state (STATE_QUICK_I2)
    2022:06:03-10:26:32 fw-320-2 pluto[8792]: id="2204" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN down" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:03-10:26:32 fw-320-2 pluto[8792]: "S_REF_IpsSitTunnelxgs2sg_2"[14] XGS-FW-WAN-IP:4500: deleting connection "S_REF_IpsSitTunnelxgs2sg_2"[14] instance with peer XGS-FW-WAN-IP {isakmp=#0/ipsec=#0}
    2022:06:03-10:26:32 fw-320-1 pluto[8907]: id="2204" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN down" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:03-10:26:32 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_2"[14] XGS-FW-WAN-IP:4500: deleting connection "S_REF_IpsSitTunnelxgs2sg_2"[14] instance with peer XGS-FW-WAN-IP {isakmp=#0/ipsec=#0}
    2022:06:03-10:26:32 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_34"[13] XGS-FW-WAN-IP:4500 #399303: deleting state (STATE_QUICK_I2)
    2022:06:03-10:26:32 fw-320-2 pluto[8792]: id="2204" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN down" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:03-10:26:32 fw-320-2 pluto[8792]: "S_REF_IpsSitTunnelxgs2sg_34"[13] XGS-FW-WAN-IP:4500: deleting connection "S_REF_IpsSitTunnelxgs2sg_34"[13] instance with peer XGS-FW-WAN-IP {isakmp=#0/ipsec=#0}
    2022:06:03-10:26:32 fw-320-1 pluto[8907]: id="2204" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN down" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:03-10:26:32 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_34"[13] XGS-FW-WAN-IP:4500: deleting connection "S_REF_IpsSitTunnelxgs2sg_34"[13] instance with peer XGS-FW-WAN-IP {isakmp=#0/ipsec=#0}
    2022:06:03-10:26:32 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_47"[13] XGS-FW-WAN-IP:4500 #399302: deleting state (STATE_QUICK_I2)
    2022:06:03-10:26:32 fw-320-2 pluto[8792]: id="2204" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN down" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:03-10:26:32 fw-320-2 pluto[8792]: "S_REF_IpsSitTunnelxgs2sg_47"[13] XGS-FW-WAN-IP:4500: deleting connection "S_REF_IpsSitTunnelxgs2sg_47"[13] instance with peer XGS-FW-WAN-IP {isakmp=#0/ipsec=#0}
    2022:06:03-10:26:32 fw-320-1 pluto[8907]: id="2204" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN down" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:03-10:26:32 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_47"[13] XGS-FW-WAN-IP:4500: deleting connection "S_REF_IpsSitTunnelxgs2sg_47"[13] instance with peer XGS-FW-WAN-IP {isakmp=#0/ipsec=#0}
    2022:06:03-10:26:32 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_40"[13] XGS-FW-WAN-IP:4500 #399301: deleting state (STATE_QUICK_I2)
    2022:06:03-10:26:32 fw-320-2 pluto[8792]: id="2204" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN down" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:03-10:26:32 fw-320-2 pluto[8792]: "S_REF_IpsSitTunnelxgs2sg_40"[13] XGS-FW-WAN-IP:4500: deleting connection "S_REF_IpsSitTunnelxgs2sg_40"[13] instance with peer XGS-FW-WAN-IP {isakmp=#0/ipsec=#0}
    2022:06:03-10:26:32 fw-320-1 pluto[8907]: id="2204" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN down" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:03-10:26:32 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_40"[13] XGS-FW-WAN-IP:4500: deleting connection "S_REF_IpsSitTunnelxgs2sg_40"[13] instance with peer XGS-FW-WAN-IP {isakmp=#0/ipsec=#0}
    2022:06:03-10:26:32 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_44"[13] XGS-FW-WAN-IP:4500 #399296: deleting state (STATE_QUICK_I2)
    2022:06:03-10:26:32 fw-320-2 pluto[8792]: id="2204" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN down" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:03-10:26:32 fw-320-2 pluto[8792]: "S_REF_IpsSitTunnelxgs2sg_44"[13] XGS-FW-WAN-IP:4500: deleting connection "S_REF_IpsSitTunnelxgs2sg_44"[13] instance with peer XGS-FW-WAN-IP {isakmp=#0/ipsec=#0}
    2022:06:03-10:26:32 fw-320-1 pluto[8907]: id="2204" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN down" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:03-10:26:32 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_44"[13] XGS-FW-WAN-IP:4500: deleting connection "S_REF_IpsSitTunnelxgs2sg_44"[13] instance with peer XGS-FW-WAN-IP {isakmp=#0/ipsec=#0}
    2022:06:03-10:26:32 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_25"[13] XGS-FW-WAN-IP:4500 #399285: deleting state (STATE_QUICK_I2)
    2022:06:03-10:26:32 fw-320-2 pluto[8792]: id="2204" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN down" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:03-10:26:32 fw-320-2 pluto[8792]: "S_REF_IpsSitTunnelxgs2sg_25"[13] XGS-FW-WAN-IP:4500: deleting connection "S_REF_IpsSitTunnelxgs2sg_25"[13] instance with peer XGS-FW-WAN-IP {isakmp=#0/ipsec=#0}
    2022:06:03-10:26:32 fw-320-1 pluto[8907]: id="2204" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN down" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:03-10:26:32 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_25"[13] XGS-FW-WAN-IP:4500: deleting connection "S_REF_IpsSitTunnelxgs2sg_25"[13] instance with peer XGS-FW-WAN-IP {isakmp=#0/ipsec=#0}
    2022:06:03-10:26:32 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_58"[13] XGS-FW-WAN-IP:4500 #399283: deleting state (STATE_QUICK_I2)
    2022:06:03-10:26:32 fw-320-2 pluto[8792]: id="2204" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN down" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:03-10:26:32 fw-320-2 pluto[8792]: "S_REF_IpsSitTunnelxgs2sg_58"[13] XGS-FW-WAN-IP:4500: deleting connection "S_REF_IpsSitTunnelxgs2sg_58"[13] instance with peer XGS-FW-WAN-IP {isakmp=#0/ipsec=#0}
    2022:06:03-10:26:32 fw-320-1 pluto[8907]: id="2204" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN down" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:03-10:26:32 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_58"[13] XGS-FW-WAN-IP:4500: deleting connection "S_REF_IpsSitTunnelxgs2sg_58"[13] instance with peer XGS-FW-WAN-IP {isakmp=#0/ipsec=#0}
    2022:06:03-10:26:32 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_48"[13] XGS-FW-WAN-IP:4500 #399281: deleting state (STATE_QUICK_I2)
    2022:06:03-10:26:32 fw-320-2 pluto[8792]: id="2204" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN down" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:03-10:26:32 fw-320-2 pluto[8792]: "S_REF_IpsSitTunnelxgs2sg_48"[13] XGS-FW-WAN-IP:4500: deleting connection "S_REF_IpsSitTunnelxgs2sg_48"[13] instance with peer XGS-FW-WAN-IP {isakmp=#0/ipsec=#0}
    2022:06:03-10:26:32 fw-320-1 pluto[8907]: id="2204" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN down" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:03-10:26:32 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_48"[13] XGS-FW-WAN-IP:4500: deleting connection "S_REF_IpsSitTunnelxgs2sg_48"[13] instance with peer XGS-FW-WAN-IP {isakmp=#0/ipsec=#0}
    2022:06:03-10:26:32 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_36"[13] XGS-FW-WAN-IP:4500 #399269: deleting state (STATE_QUICK_I2)
    2022:06:03-10:26:32 fw-320-2 pluto[8792]: id="2204" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN down" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:03-10:26:32 fw-320-2 pluto[8792]: "S_REF_IpsSitTunnelxgs2sg_36"[13] XGS-FW-WAN-IP:4500: deleting connection "S_REF_IpsSitTunnelxgs2sg_36"[13] instance with peer XGS-FW-WAN-IP {isakmp=#0/ipsec=#0}
    2022:06:03-10:26:32 fw-320-1 pluto[8907]: id="2204" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN down" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:03-10:26:32 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_36"[13] XGS-FW-WAN-IP:4500: deleting connection "S_REF_IpsSitTunnelxgs2sg_36"[13] instance with peer XGS-FW-WAN-IP {isakmp=#0/ipsec=#0}
    2022:06:03-10:26:32 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_69"[13] XGS-FW-WAN-IP:4500 #399260: deleting state (STATE_QUICK_I2)
    2022:06:03-10:26:32 fw-320-2 pluto[8792]: id="2204" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN down" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:03-10:26:32 fw-320-2 pluto[8792]: "S_REF_IpsSitTunnelxgs2sg_69"[13] XGS-FW-WAN-IP:4500: deleting connection "S_REF_IpsSitTunnelxgs2sg_69"[13] instance with peer XGS-FW-WAN-IP {isakmp=#0/ipsec=#0}
    2022:06:03-10:26:32 fw-320-1 pluto[8907]: id="2204" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN down" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:03-10:26:32 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_69"[13] XGS-FW-WAN-IP:4500: deleting connection "S_REF_IpsSitTunnelxgs2sg_69"[13] instance with peer XGS-FW-WAN-IP {isakmp=#0/ipsec=#0}
    2022:06:03-10:26:32 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_39"[13] XGS-FW-WAN-IP:4500 #399259: deleting state (STATE_QUICK_I2)
    2022:06:03-10:26:32 fw-320-2 pluto[8792]: id="2204" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN down" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:03-10:26:32 fw-320-2 pluto[8792]: "S_REF_IpsSitTunnelxgs2sg_39"[13] XGS-FW-WAN-IP:4500: deleting connection "S_REF_IpsSitTunnelxgs2sg_39"[13] instance with peer XGS-FW-WAN-IP {isakmp=#0/ipsec=#0}
    2022:06:03-10:26:32 fw-320-1 pluto[8907]: id="2204" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN down" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:03-10:26:32 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_39"[13] XGS-FW-WAN-IP:4500: deleting connection "S_REF_IpsSitTunnelxgs2sg_39"[13] instance with peer XGS-FW-WAN-IP {isakmp=#0/ipsec=#0}
    2022:06:03-10:26:32 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_20"[13] XGS-FW-WAN-IP:4500 #399238: deleting state (STATE_QUICK_I2)
    2022:06:03-10:26:32 fw-320-2 pluto[8792]: id="2204" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN down" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:03-10:26:32 fw-320-2 pluto[8792]: "S_REF_IpsSitTunnelxgs2sg_20"[13] XGS-FW-WAN-IP:4500: deleting connection "S_REF_IpsSitTunnelxgs2sg_20"[13] instance with peer XGS-FW-WAN-IP {isakmp=#0/ipsec=#0}
    2022:06:03-10:26:32 fw-320-1 pluto[8907]: id="2204" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN down" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:03-10:26:32 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_20"[13] XGS-FW-WAN-IP:4500: deleting connection "S_REF_IpsSitTunnelxgs2sg_20"[13] instance with peer XGS-FW-WAN-IP {isakmp=#0/ipsec=#0}
    2022:06:03-10:26:32 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_30"[13] XGS-FW-WAN-IP:4500 #399219: deleting state (STATE_QUICK_I2)
    2022:06:03-10:26:32 fw-320-2 pluto[8792]: id="2204" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN down" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:03-10:26:32 fw-320-2 pluto[8792]: "S_REF_IpsSitTunnelxgs2sg_30"[13] XGS-FW-WAN-IP:4500: deleting connection "S_REF_IpsSitTunnelxgs2sg_30"[13] instance with peer XGS-FW-WAN-IP {isakmp=#0/ipsec=#0}
    2022:06:03-10:26:32 fw-320-1 pluto[8907]: id="2204" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN down" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:03-10:26:32 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_30"[13] XGS-FW-WAN-IP:4500: deleting connection "S_REF_IpsSitTunnelxgs2sg_30"[13] instance with peer XGS-FW-WAN-IP {isakmp=#0/ipsec=#0}
    2022:06:03-10:26:32 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_5"[13] XGS-FW-WAN-IP:4500 #399218: deleting state (STATE_QUICK_I2)
    2022:06:03-10:26:32 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_49"[13] XGS-FW-WAN-IP:4500 #399216: deleting state (STATE_QUICK_I2)
    2022:06:03-10:26:32 fw-320-2 pluto[8792]: id="2204" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN down" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:03-10:26:32 fw-320-2 pluto[8792]: "S_REF_IpsSitTunnelxgs2sg_49"[13] XGS-FW-WAN-IP:4500: deleting connection "S_REF_IpsSitTunnelxgs2sg_49"[13] instance with peer XGS-FW-WAN-IP {isakmp=#0/ipsec=#0}
    2022:06:03-10:26:32 fw-320-1 pluto[8907]: id="2204" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN down" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:03-10:26:32 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_49"[13] XGS-FW-WAN-IP:4500: deleting connection "S_REF_IpsSitTunnelxgs2sg_49"[13] instance with peer XGS-FW-WAN-IP {isakmp=#0/ipsec=#0}
    2022:06:03-10:26:32 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_62"[13] XGS-FW-WAN-IP:4500 #399215: deleting state (STATE_QUICK_I2)
    2022:06:03-10:26:32 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_13"[13] XGS-FW-WAN-IP:4500 #399213: deleting state (STATE_QUICK_I2)
    2022:06:03-10:26:32 fw-320-2 pluto[8792]: id="2204" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN down" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:03-10:26:32 fw-320-2 pluto[8792]: "S_REF_IpsSitTunnelxgs2sg_13"[13] XGS-FW-WAN-IP:4500: deleting connection "S_REF_IpsSitTunnelxgs2sg_13"[13] instance with peer XGS-FW-WAN-IP {isakmp=#0/ipsec=#0}
    2022:06:03-10:26:32 fw-320-1 pluto[8907]: id="2204" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN down" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:03-10:26:32 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_7"[13] XGS-FW-WAN-IP:4500 #399209: deleting state (STATE_QUICK_I2)
    2022:06:03-10:26:32 fw-320-1 pluto[8907]: id="2204" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN down" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:03-10:26:32 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_7"[13] XGS-FW-WAN-IP:4500: deleting connection "S_REF_IpsSitTunnelxgs2sg_7"[13] instance with peer XGS-FW-WAN-IP {isakmp=#0/ipsec=#0}
    2022:06:03-10:26:32 fw-320-2 pluto[8792]: id="2204" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN down" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:03-10:26:32 fw-320-2 pluto[8792]: "S_REF_IpsSitTunnelxgs2sg_7"[13] XGS-FW-WAN-IP:4500: deleting connection "S_REF_IpsSitTunnelxgs2sg_7"[13] instance with peer XGS-FW-WAN-IP {isakmp=#0/ipsec=#0}
    2022:06:03-10:26:32 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_68"[13] XGS-FW-WAN-IP:4500 #399208: deleting state (STATE_QUICK_I2)
    2022:06:03-10:26:32 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_11"[13] XGS-FW-WAN-IP:4500 #399197: deleting state (STATE_QUICK_I2)
    2022:06:03-10:26:32 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_46"[13] XGS-FW-WAN-IP:4500 #399184: deleting state (STATE_QUICK_I2)
    2022:06:03-10:26:32 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_56"[13] XGS-FW-WAN-IP:4500 #399173: deleting state (STATE_QUICK_I2)
    2022:06:03-10:26:32 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_19"[13] XGS-FW-WAN-IP:4500 #399171: deleting state (STATE_QUICK_I2)
    2022:06:03-10:26:32 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_29"[13] XGS-FW-WAN-IP:4500 #399167: deleting state (STATE_QUICK_I2)
    2022:06:03-10:26:32 fw-320-1 pluto[8907]: id="2204" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN down" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:03-10:26:32 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_38"[13] XGS-FW-WAN-IP:4500 #399148: deleting state (STATE_QUICK_I2)
    2022:06:03-10:26:32 fw-320-2 pluto[8792]: id="2204" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN down" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:03-10:26:32 fw-320-2 pluto[8792]: "S_REF_IpsSitTunnelxgs2sg_29"[13] XGS-FW-WAN-IP:4500: deleting connection "S_REF_IpsSitTunnelxgs2sg_29"[13] instance with peer XGS-FW-WAN-IP {isakmp=#0/ipsec=#0}
    2022:06:03-10:26:32 fw-320-1 pluto[8907]: id="2204" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN down" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:03-10:26:32 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_1"[13] XGS-FW-WAN-IP:4500 #399134: deleting state (STATE_QUICK_I2)
    2022:06:03-10:26:32 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_37"[13] XGS-FW-WAN-IP:4500 #399106: deleting state (STATE_QUICK_I2)
    2022:06:03-10:26:32 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_41"[13] XGS-FW-WAN-IP:4500 #399096: deleting state (STATE_QUICK_I2)
    2022:06:03-10:26:32 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_57"[13] XGS-FW-WAN-IP:4500 #399081: deleting state (STATE_QUICK_I2)
    2022:06:03-10:26:32 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_22"[13] XGS-FW-WAN-IP:4500 #399080: deleting state (STATE_QUICK_I2)
    2022:06:03-10:26:32 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_65"[13] XGS-FW-WAN-IP:4500 #399071: deleting state (STATE_QUICK_I2)
    2022:06:03-10:26:32 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_63"[13] XGS-FW-WAN-IP:4500 #399039: deleting state (STATE_QUICK_I2)
    2022:06:03-10:26:32 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_45"[12] XGS-FW-WAN-IP:4500 #399014: deleting state (STATE_QUICK_I2)
    2022:06:03-10:26:32 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_29"[13] XGS-FW-WAN-IP:4500 #400052: deleting state (STATE_QUICK_I1)
    2022:06:03-10:26:32 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_29"[13] XGS-FW-WAN-IP:4500: deleting connection "S_REF_IpsSitTunnelxgs2sg_29"[13] instance with peer XGS-FW-WAN-IP {isakmp=#0/ipsec=#0}
    2022:06:03-10:26:32 fw-320-2 pluto[8792]: id="2204" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN down" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:03-10:26:32 fw-320-2 pluto[8792]: "S_REF_IpsSitTunnelxgs2sg_38"[13] XGS-FW-WAN-IP:4500: deleting connection "S_REF_IpsSitTunnelxgs2sg_38"[13] instance with peer XGS-FW-WAN-IP {isakmp=#0/ipsec=#0}
    2022:06:03-10:26:32 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_38"[13] XGS-FW-WAN-IP:4500 #400048: deleting state (STATE_QUICK_I1)
    2022:06:03-10:26:32 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_38"[13] XGS-FW-WAN-IP:4500: deleting connection "S_REF_IpsSitTunnelxgs2sg_38"[13] instance with peer XGS-FW-WAN-IP {isakmp=#0/ipsec=#0}
    2022:06:03-10:26:32 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_13"[13] XGS-FW-WAN-IP:4500 #400047: deleting state (STATE_QUICK_I1)
    2022:06:03-10:26:32 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_13"[13] XGS-FW-WAN-IP:4500: deleting connection "S_REF_IpsSitTunnelxgs2sg_13"[13] instance with peer XGS-FW-WAN-IP {isakmp=#0/ipsec=#0}
    2022:06:03-10:26:32 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_56"[13] XGS-FW-WAN-IP:4500 #400046: deleting state (STATE_QUICK_I2)
    2022:06:03-10:26:32 fw-320-2 pluto[8792]: id="2204" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN down" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:03-10:26:32 fw-320-2 pluto[8792]: "S_REF_IpsSitTunnelxgs2sg_56"[13] XGS-FW-WAN-IP:4500: deleting connection "S_REF_IpsSitTunnelxgs2sg_56"[13] instance with peer XGS-FW-WAN-IP {isakmp=#0/ipsec=#0}
    2022:06:03-10:26:32 fw-320-1 pluto[8907]: id="2204" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN down" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:03-10:26:32 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_56"[13] XGS-FW-WAN-IP:4500: deleting connection "S_REF_IpsSitTunnelxgs2sg_56"[13] instance with peer XGS-FW-WAN-IP {isakmp=#0/ipsec=#0}
    2022:06:03-10:26:32 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_46"[13] XGS-FW-WAN-IP:4500 #400045: deleting state (STATE_QUICK_I2)
    2022:06:03-10:26:32 fw-320-2 pluto[8792]: id="2204" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN down" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:03-10:26:32 fw-320-2 pluto[8792]: "S_REF_IpsSitTunnelxgs2sg_46"[13] XGS-FW-WAN-IP:4500: deleting connection "S_REF_IpsSitTunnelxgs2sg_46"[13] instance with peer XGS-FW-WAN-IP {isakmp=#0/ipsec=#0}
    2022:06:03-10:26:32 fw-320-1 pluto[8907]: id="2204" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN down" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:03-10:26:32 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_46"[13] XGS-FW-WAN-IP:4500: deleting connection "S_REF_IpsSitTunnelxgs2sg_46"[13] instance with peer XGS-FW-WAN-IP {isakmp=#0/ipsec=#0}
    2022:06:03-10:26:32 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_5"[13] XGS-FW-WAN-IP:4500 #400044: deleting state (STATE_QUICK_I2)
    2022:06:03-10:26:32 fw-320-2 pluto[8792]: id="2204" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN down" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:03-10:26:32 fw-320-2 pluto[8792]: "S_REF_IpsSitTunnelxgs2sg_5"[13] XGS-FW-WAN-IP:4500: deleting connection "S_REF_IpsSitTunnelxgs2sg_5"[13] instance with peer XGS-FW-WAN-IP {isakmp=#0/ipsec=#0}
    2022:06:03-10:26:32 fw-320-1 pluto[8907]: id="2204" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN down" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:03-10:26:32 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_5"[13] XGS-FW-WAN-IP:4500: deleting connection "S_REF_IpsSitTunnelxgs2sg_5"[13] instance with peer XGS-FW-WAN-IP {isakmp=#0/ipsec=#0}
    2022:06:03-10:26:32 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_19"[13] XGS-FW-WAN-IP:4500 #400030: deleting state (STATE_QUICK_I2)
    2022:06:03-10:26:32 fw-320-2 pluto[8792]: id="2204" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN down" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:03-10:26:32 fw-320-2 pluto[8792]: "S_REF_IpsSitTunnelxgs2sg_19"[13] XGS-FW-WAN-IP:4500: deleting connection "S_REF_IpsSitTunnelxgs2sg_19"[13] instance with peer XGS-FW-WAN-IP {isakmp=#0/ipsec=#0}
    2022:06:03-10:26:32 fw-320-1 pluto[8907]: id="2204" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN down" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:03-10:26:32 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_19"[13] XGS-FW-WAN-IP:4500: deleting connection "S_REF_IpsSitTunnelxgs2sg_19"[13] instance with peer XGS-FW-WAN-IP {isakmp=#0/ipsec=#0}
    2022:06:03-10:26:32 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_62"[13] XGS-FW-WAN-IP:4500 #400027: deleting state (STATE_QUICK_I2)
    2022:06:03-10:26:32 fw-320-2 pluto[8792]: id="2204" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN down" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:03-10:26:32 fw-320-2 pluto[8792]: "S_REF_IpsSitTunnelxgs2sg_62"[13] XGS-FW-WAN-IP:4500: deleting connection "S_REF_IpsSitTunnelxgs2sg_62"[13] instance with peer XGS-FW-WAN-IP {isakmp=#0/ipsec=#0}
    2022:06:03-10:26:32 fw-320-1 pluto[8907]: id="2204" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN down" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:03-10:26:32 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_62"[13] XGS-FW-WAN-IP:4500: deleting connection "S_REF_IpsSitTunnelxgs2sg_62"[13] instance with peer XGS-FW-WAN-IP {isakmp=#0/ipsec=#0}
    2022:06:03-10:26:32 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_11"[13] XGS-FW-WAN-IP:4500 #400021: deleting state (STATE_QUICK_I2)
    2022:06:03-10:26:32 fw-320-2 pluto[8792]: id="2204" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN down" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:03-10:26:32 fw-320-2 pluto[8792]: "S_REF_IpsSitTunnelxgs2sg_11"[13] XGS-FW-WAN-IP:4500: deleting connection "S_REF_IpsSitTunnelxgs2sg_11"[13] instance with peer XGS-FW-WAN-IP {isakmp=#0/ipsec=#0}
    2022:06:03-10:26:32 fw-320-1 pluto[8907]: id="2204" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN down" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:03-10:26:32 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_11"[13] XGS-FW-WAN-IP:4500: deleting connection "S_REF_IpsSitTunnelxgs2sg_11"[13] instance with peer XGS-FW-WAN-IP {isakmp=#0/ipsec=#0}
    2022:06:03-10:26:32 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_68"[13] XGS-FW-WAN-IP:4500 #400020: deleting state (STATE_QUICK_I2)
    2022:06:03-10:26:32 fw-320-2 pluto[8792]: id="2204" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN down" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:03-10:26:32 fw-320-2 pluto[8792]: "S_REF_IpsSitTunnelxgs2sg_68"[13] XGS-FW-WAN-IP:4500: deleting connection "S_REF_IpsSitTunnelxgs2sg_68"[13] instance with peer XGS-FW-WAN-IP {isakmp=#0/ipsec=#0}
    2022:06:03-10:26:32 fw-320-1 pluto[8907]: id="2204" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN down" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:03-10:26:32 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_68"[13] XGS-FW-WAN-IP:4500: deleting connection "S_REF_IpsSitTunnelxgs2sg_68"[13] instance with peer XGS-FW-WAN-IP {isakmp=#0/ipsec=#0}
    2022:06:03-10:26:32 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_37"[13] XGS-FW-WAN-IP:4500 #400012: deleting state (STATE_QUICK_I2)
    2022:06:03-10:26:32 fw-320-2 pluto[8792]: id="2204" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN down" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:03-10:26:32 fw-320-2 pluto[8792]: "S_REF_IpsSitTunnelxgs2sg_37"[13] XGS-FW-WAN-IP:4500: deleting connection "S_REF_IpsSitTunnelxgs2sg_37"[13] instance with peer XGS-FW-WAN-IP {isakmp=#0/ipsec=#0}
    2022:06:03-10:26:32 fw-320-1 pluto[8907]: id="2204" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN down" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:03-10:26:32 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_37"[13] XGS-FW-WAN-IP:4500: deleting connection "S_REF_IpsSitTunnelxgs2sg_37"[13] instance with peer XGS-FW-WAN-IP {isakmp=#0/ipsec=#0}
    2022:06:03-10:26:32 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_22"[13] XGS-FW-WAN-IP:4500 #399995: deleting state (STATE_QUICK_I2)
    2022:06:03-10:26:32 fw-320-2 pluto[8792]: id="2204" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN down" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:03-10:26:32 fw-320-2 pluto[8792]: "S_REF_IpsSitTunnelxgs2sg_22"[13] XGS-FW-WAN-IP:4500: deleting connection "S_REF_IpsSitTunnelxgs2sg_22"[13] instance with peer XGS-FW-WAN-IP {isakmp=#0/ipsec=#0}
    2022:06:03-10:26:32 fw-320-1 pluto[8907]: id="2204" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN down" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:03-10:26:32 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_22"[13] XGS-FW-WAN-IP:4500: deleting connection "S_REF_IpsSitTunnelxgs2sg_22"[13] instance with peer XGS-FW-WAN-IP {isakmp=#0/ipsec=#0}
    2022:06:03-10:26:32 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_1"[13] XGS-FW-WAN-IP:4500 #399981: deleting state (STATE_QUICK_I2)
    2022:06:03-10:26:32 fw-320-2 pluto[8792]: id="2204" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN down" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:03-10:26:32 fw-320-2 pluto[8792]: "S_REF_IpsSitTunnelxgs2sg_1"[13] XGS-FW-WAN-IP:4500: deleting connection "S_REF_IpsSitTunnelxgs2sg_1"[13] instance with peer XGS-FW-WAN-IP {isakmp=#0/ipsec=#0}
    2022:06:03-10:26:32 fw-320-1 pluto[8907]: id="2204" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN down" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:03-10:26:32 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_1"[13] XGS-FW-WAN-IP:4500: deleting connection "S_REF_IpsSitTunnelxgs2sg_1"[13] instance with peer XGS-FW-WAN-IP {isakmp=#0/ipsec=#0}
    2022:06:03-10:26:32 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_41"[13] XGS-FW-WAN-IP:4500 #399951: deleting state (STATE_QUICK_I2)
    2022:06:03-10:26:32 fw-320-2 pluto[8792]: id="2204" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN down" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:03-10:26:32 fw-320-2 pluto[8792]: "S_REF_IpsSitTunnelxgs2sg_41"[13] XGS-FW-WAN-IP:4500: deleting connection "S_REF_IpsSitTunnelxgs2sg_41"[13] instance with peer XGS-FW-WAN-IP {isakmp=#0/ipsec=#0}
    2022:06:03-10:26:32 fw-320-1 pluto[8907]: id="2204" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN down" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:03-10:26:32 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_41"[13] XGS-FW-WAN-IP:4500: deleting connection "S_REF_IpsSitTunnelxgs2sg_41"[13] instance with peer XGS-FW-WAN-IP {isakmp=#0/ipsec=#0}
    2022:06:03-10:26:32 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_57"[13] XGS-FW-WAN-IP:4500 #399907: deleting state (STATE_QUICK_I2)
    2022:06:03-10:26:32 fw-320-2 pluto[8792]: id="2204" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN down" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:03-10:26:32 fw-320-2 pluto[8792]: "S_REF_IpsSitTunnelxgs2sg_57"[13] XGS-FW-WAN-IP:4500: deleting connection "S_REF_IpsSitTunnelxgs2sg_57"[13] instance with peer XGS-FW-WAN-IP {isakmp=#0/ipsec=#0}
    2022:06:03-10:26:32 fw-320-1 pluto[8907]: id="2204" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN down" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:03-10:26:32 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_57"[13] XGS-FW-WAN-IP:4500: deleting connection "S_REF_IpsSitTunnelxgs2sg_57"[13] instance with peer XGS-FW-WAN-IP {isakmp=#0/ipsec=#0}
    2022:06:03-10:26:32 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_17"[13] XGS-FW-WAN-IP:4500 #399882: deleting state (STATE_QUICK_I2)
    2022:06:03-10:26:32 fw-320-2 pluto[8792]: id="2204" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN down" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:03-10:26:32 fw-320-2 pluto[8792]: "S_REF_IpsSitTunnelxgs2sg_17"[13] XGS-FW-WAN-IP:4500: deleting connection "S_REF_IpsSitTunnelxgs2sg_17"[13] instance with peer XGS-FW-WAN-IP {isakmp=#0/ipsec=#0}
    2022:06:03-10:26:32 fw-320-1 pluto[8907]: id="2204" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN down" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:03-10:26:32 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_17"[13] XGS-FW-WAN-IP:4500: deleting connection "S_REF_IpsSitTunnelxgs2sg_17"[13] instance with peer XGS-FW-WAN-IP {isakmp=#0/ipsec=#0}
    2022:06:03-10:26:32 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_65"[13] XGS-FW-WAN-IP:4500 #399880: deleting state (STATE_QUICK_I2)
    2022:06:03-10:26:32 fw-320-2 pluto[8792]: id="2204" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN down" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:03-10:26:32 fw-320-2 pluto[8792]: "S_REF_IpsSitTunnelxgs2sg_65"[13] XGS-FW-WAN-IP:4500: deleting connection "S_REF_IpsSitTunnelxgs2sg_65"[13] instance with peer XGS-FW-WAN-IP {isakmp=#0/ipsec=#0}
    2022:06:03-10:26:32 fw-320-1 pluto[8907]: id="2204" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN down" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:03-10:26:32 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_65"[13] XGS-FW-WAN-IP:4500: deleting connection "S_REF_IpsSitTunnelxgs2sg_65"[13] instance with peer XGS-FW-WAN-IP {isakmp=#0/ipsec=#0}
    2022:06:03-10:26:32 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_45"[12] XGS-FW-WAN-IP:4500 #399836: deleting state (STATE_QUICK_I2)
    2022:06:03-10:26:32 fw-320-2 pluto[8792]: id="2204" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN down" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:03-10:26:32 fw-320-2 pluto[8792]: "S_REF_IpsSitTunnelxgs2sg_45"[12] XGS-FW-WAN-IP:4500: deleting connection "S_REF_IpsSitTunnelxgs2sg_45"[12] instance with peer XGS-FW-WAN-IP {isakmp=#0/ipsec=#0}
    2022:06:03-10:26:32 fw-320-1 pluto[8907]: id="2204" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN down" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:03-10:26:32 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_45"[12] XGS-FW-WAN-IP:4500: deleting connection "S_REF_IpsSitTunnelxgs2sg_45"[12] instance with peer XGS-FW-WAN-IP {isakmp=#0/ipsec=#0}
    2022:06:03-10:26:32 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_63"[13] XGS-FW-WAN-IP:4500 #399832: deleting state (STATE_QUICK_I2)
    2022:06:03-10:26:32 fw-320-2 pluto[8792]: id="2204" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN down" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:03-10:26:32 fw-320-2 pluto[8792]: "S_REF_IpsSitTunnelxgs2sg_63"[13] XGS-FW-WAN-IP:4500: deleting connection "S_REF_IpsSitTunnelxgs2sg_63"[13] instance with peer XGS-FW-WAN-IP {isakmp=#0/ipsec=#0}
    2022:06:03-10:26:32 fw-320-1 pluto[8907]: id="2204" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN down" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:03-10:26:32 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_63"[13] XGS-FW-WAN-IP:4500: deleting connection "S_REF_IpsSitTunnelxgs2sg_63"[13] instance with peer XGS-FW-WAN-IP {isakmp=#0/ipsec=#0}
    2022:06:03-10:26:32 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_32"[13] XGS-FW-WAN-IP:4500 #399822: deleting state (STATE_QUICK_I2)
    2022:06:03-10:26:32 fw-320-2 pluto[8792]: id="2204" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN down" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:03-10:26:33 fw-320-2 pluto[8792]: "S_REF_IpsSitTunnelxgs2sg_32"[13] XGS-FW-WAN-IP:4500: deleting connection "S_REF_IpsSitTunnelxgs2sg_32"[13] instance with peer XGS-FW-WAN-IP {isakmp=#0/ipsec=#0}
    2022:06:03-10:26:33 fw-320-1 pluto[8907]: id="2204" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN down" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:03-10:26:33 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_32"[13] XGS-FW-WAN-IP:4500: deleting connection "S_REF_IpsSitTunnelxgs2sg_32"[13] instance with peer XGS-FW-WAN-IP {isakmp=#0/ipsec=#0}
    2022:06:03-10:26:33 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_60"[13] XGS-FW-WAN-IP:4500 #399795: deleting state (STATE_QUICK_I2)
    2022:06:03-10:26:33 fw-320-2 pluto[8792]: id="2204" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN down" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:03-10:26:33 fw-320-2 pluto[8792]: "S_REF_IpsSitTunnelxgs2sg_60"[13] XGS-FW-WAN-IP:4500: deleting connection "S_REF_IpsSitTunnelxgs2sg_60"[13] instance with peer XGS-FW-WAN-IP {isakmp=#0/ipsec=#0}
    2022:06:03-10:26:33 fw-320-1 pluto[8907]: id="2204" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN down" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:03-10:26:33 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_60"[13] XGS-FW-WAN-IP:4500: deleting connection "S_REF_IpsSitTunnelxgs2sg_60"[13] instance with peer XGS-FW-WAN-IP {isakmp=#0/ipsec=#0}
    2022:06:03-10:26:33 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_59"[13] XGS-FW-WAN-IP:4500 #399775: deleting state (STATE_QUICK_I2)
    2022:06:03-10:26:33 fw-320-2 pluto[8792]: id="2204" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN down" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:03-10:26:33 fw-320-2 pluto[8792]: "S_REF_IpsSitTunnelxgs2sg_59"[13] XGS-FW-WAN-IP:4500: deleting connection "S_REF_IpsSitTunnelxgs2sg_59"[13] instance with peer XGS-FW-WAN-IP {isakmp=#0/ipsec=#0}
    2022:06:03-10:26:33 fw-320-1 pluto[8907]: id="2204" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN down" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:03-10:26:33 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_59"[13] XGS-FW-WAN-IP:4500: deleting connection "S_REF_IpsSitTunnelxgs2sg_59"[13] instance with peer XGS-FW-WAN-IP {isakmp=#0/ipsec=#0}
    2022:06:03-10:26:33 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_4"[13] XGS-FW-WAN-IP:4500 #399749: deleting state (STATE_QUICK_I2)
    2022:06:03-10:26:33 fw-320-2 pluto[8792]: id="2204" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN down" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:03-10:26:33 fw-320-2 pluto[8792]: "S_REF_IpsSitTunnelxgs2sg_4"[13] XGS-FW-WAN-IP:4500: deleting connection "S_REF_IpsSitTunnelxgs2sg_4"[13] instance with peer XGS-FW-WAN-IP {isakmp=#0/ipsec=#0}
    2022:06:03-10:26:33 fw-320-1 pluto[8907]: id="2204" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN down" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:03-10:26:33 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_4"[13] XGS-FW-WAN-IP:4500: deleting connection "S_REF_IpsSitTunnelxgs2sg_4"[13] instance with peer XGS-FW-WAN-IP {isakmp=#0/ipsec=#0}
    2022:06:03-10:26:33 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_51"[13] XGS-FW-WAN-IP:4500 #399696: deleting state (STATE_QUICK_I2)
    2022:06:03-10:26:33 fw-320-2 pluto[8792]: id="2204" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN down" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:03-10:26:33 fw-320-2 pluto[8792]: "S_REF_IpsSitTunnelxgs2sg_51"[13] XGS-FW-WAN-IP:4500: deleting connection "S_REF_IpsSitTunnelxgs2sg_51"[13] instance with peer XGS-FW-WAN-IP {isakmp=#0/ipsec=#0}
    2022:06:03-10:26:33 fw-320-1 pluto[8907]: id="2204" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN down" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:03-10:26:33 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_51"[13] XGS-FW-WAN-IP:4500: deleting connection "S_REF_IpsSitTunnelxgs2sg_51"[13] instance with peer XGS-FW-WAN-IP {isakmp=#0/ipsec=#0}
    2022:06:03-10:26:33 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_26"[13] XGS-FW-WAN-IP:4500 #399691: deleting state (STATE_QUICK_I2)
    2022:06:03-10:26:33 fw-320-2 pluto[8792]: id="2204" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN down" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:03-10:26:33 fw-320-2 pluto[8792]: "S_REF_IpsSitTunnelxgs2sg_26"[13] XGS-FW-WAN-IP:4500: deleting connection "S_REF_IpsSitTunnelxgs2sg_26"[13] instance with peer XGS-FW-WAN-IP {isakmp=#0/ipsec=#0}
    2022:06:03-10:26:33 fw-320-1 pluto[8907]: id="2204" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN down" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:03-10:26:33 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_26"[13] XGS-FW-WAN-IP:4500: deleting connection "S_REF_IpsSitTunnelxgs2sg_26"[13] instance with peer XGS-FW-WAN-IP {isakmp=#0/ipsec=#0}
    2022:06:03-10:26:33 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_28"[13] XGS-FW-WAN-IP:4500 #399688: deleting state (STATE_QUICK_I2)
    2022:06:03-10:26:33 fw-320-2 pluto[8792]: id="2204" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN down" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:03-10:26:33 fw-320-2 pluto[8792]: "S_REF_IpsSitTunnelxgs2sg_28"[13] XGS-FW-WAN-IP:4500: deleting connection "S_REF_IpsSitTunnelxgs2sg_28"[13] instance with peer XGS-FW-WAN-IP {isakmp=#0/ipsec=#0}
    2022:06:03-10:26:33 fw-320-1 pluto[8907]: id="2204" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN down" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:03-10:26:33 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_28"[13] XGS-FW-WAN-IP:4500: deleting connection "S_REF_IpsSitTunnelxgs2sg_28"[13] instance with peer XGS-FW-WAN-IP {isakmp=#0/ipsec=#0}
    2022:06:03-10:26:33 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_35"[13] XGS-FW-WAN-IP:4500 #399683: deleting state (STATE_QUICK_I2)
    2022:06:03-10:26:33 fw-320-2 pluto[8792]: id="2204" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN down" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:03-10:26:33 fw-320-2 pluto[8792]: "S_REF_IpsSitTunnelxgs2sg_35"[13] XGS-FW-WAN-IP:4500: deleting connection "S_REF_IpsSitTunnelxgs2sg_35"[13] instance with peer XGS-FW-WAN-IP {isakmp=#0/ipsec=#0}
    2022:06:03-10:26:33 fw-320-1 pluto[8907]: id="2204" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN down" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:03-10:26:33 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_35"[13] XGS-FW-WAN-IP:4500: deleting connection "S_REF_IpsSitTunnelxgs2sg_35"[13] instance with peer XGS-FW-WAN-IP {isakmp=#0/ipsec=#0}
    2022:06:03-10:26:33 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_66"[12] XGS-FW-WAN-IP:4500 #399669: deleting state (STATE_QUICK_I2)
    2022:06:03-10:26:33 fw-320-2 pluto[8792]: id="2204" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN down" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:03-10:26:33 fw-320-2 pluto[8792]: "S_REF_IpsSitTunnelxgs2sg_66"[12] XGS-FW-WAN-IP:4500: deleting connection "S_REF_IpsSitTunnelxgs2sg_66"[12] instance with peer XGS-FW-WAN-IP {isakmp=#0/ipsec=#0}
    2022:06:03-10:26:33 fw-320-1 pluto[8907]: id="2204" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN down" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:03-10:26:33 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_66"[12] XGS-FW-WAN-IP:4500: deleting connection "S_REF_IpsSitTunnelxgs2sg_66"[12] instance with peer XGS-FW-WAN-IP {isakmp=#0/ipsec=#0}
    2022:06:03-10:26:33 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_33"[13] XGS-FW-WAN-IP:4500 #399653: deleting state (STATE_QUICK_I2)
    2022:06:03-10:26:33 fw-320-2 pluto[8792]: id="2204" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN down" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:03-10:26:33 fw-320-2 pluto[8792]: "S_REF_IpsSitTunnelxgs2sg_33"[13] XGS-FW-WAN-IP:4500: deleting connection "S_REF_IpsSitTunnelxgs2sg_33"[13] instance with peer XGS-FW-WAN-IP {isakmp=#0/ipsec=#0}
    2022:06:03-10:26:33 fw-320-1 pluto[8907]: id="2204" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN down" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:03-10:26:33 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_33"[13] XGS-FW-WAN-IP:4500: deleting connection "S_REF_IpsSitTunnelxgs2sg_33"[13] instance with peer XGS-FW-WAN-IP {isakmp=#0/ipsec=#0}
    2022:06:03-10:26:33 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_12"[13] XGS-FW-WAN-IP:4500 #399649: deleting state (STATE_QUICK_I2)
    2022:06:03-10:26:33 fw-320-2 pluto[8792]: id="2204" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN down" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:03-10:26:33 fw-320-2 pluto[8792]: "S_REF_IpsSitTunnelxgs2sg_12"[13] XGS-FW-WAN-IP:4500: deleting connection "S_REF_IpsSitTunnelxgs2sg_12"[13] instance with peer XGS-FW-WAN-IP {isakmp=#0/ipsec=#0}
    2022:06:03-10:26:33 fw-320-1 pluto[8907]: id="2204" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN down" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:03-10:26:33 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_12"[13] XGS-FW-WAN-IP:4500: deleting connection "S_REF_IpsSitTunnelxgs2sg_12"[13] instance with peer XGS-FW-WAN-IP {isakmp=#0/ipsec=#0}
    2022:06:03-10:26:33 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_14"[13] XGS-FW-WAN-IP:4500 #399648: deleting state (STATE_QUICK_I2)
    2022:06:03-10:26:33 fw-320-2 pluto[8792]: id="2204" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN down" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:03-10:26:33 fw-320-2 pluto[8792]: "S_REF_IpsSitTunnelxgs2sg_14"[13] XGS-FW-WAN-IP:4500: deleting connection "S_REF_IpsSitTunnelxgs2sg_14"[13] instance with peer XGS-FW-WAN-IP {isakmp=#0/ipsec=#0}
    2022:06:03-10:26:33 fw-320-1 pluto[8907]: id="2204" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN down" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:03-10:26:33 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_14"[13] XGS-FW-WAN-IP:4500: deleting connection "S_REF_IpsSitTunnelxgs2sg_14"[13] instance with peer XGS-FW-WAN-IP {isakmp=#0/ipsec=#0}
    2022:06:03-10:26:33 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_0"[13] XGS-FW-WAN-IP:4500 #399636: deleting state (STATE_QUICK_I2)
    2022:06:03-10:26:33 fw-320-2 pluto[8792]: id="2204" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN down" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:03-10:26:33 fw-320-2 pluto[8792]: "S_REF_IpsSitTunnelxgs2sg_0"[13] XGS-FW-WAN-IP:4500: deleting connection "S_REF_IpsSitTunnelxgs2sg_0"[13] instance with peer XGS-FW-WAN-IP {isakmp=#0/ipsec=#0}
    2022:06:03-10:26:33 fw-320-1 pluto[8907]: id="2204" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN down" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:03-10:26:33 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_0"[13] XGS-FW-WAN-IP:4500: deleting connection "S_REF_IpsSitTunnelxgs2sg_0"[13] instance with peer XGS-FW-WAN-IP {isakmp=#0/ipsec=#0}
    2022:06:03-10:26:33 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_61"[13] XGS-FW-WAN-IP:4500 #399635: deleting state (STATE_QUICK_I2)
    2022:06:03-10:26:33 fw-320-2 pluto[8792]: id="2204" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN down" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:03-10:26:33 fw-320-2 pluto[8792]: "S_REF_IpsSitTunnelxgs2sg_61"[13] XGS-FW-WAN-IP:4500: deleting connection "S_REF_IpsSitTunnelxgs2sg_61"[13] instance with peer XGS-FW-WAN-IP {isakmp=#0/ipsec=#0}
    2022:06:03-10:26:33 fw-320-1 pluto[8907]: id="2204" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN down" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:03-10:26:33 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_61"[13] XGS-FW-WAN-IP:4500: deleting connection "S_REF_IpsSitTunnelxgs2sg_61"[13] instance with peer XGS-FW-WAN-IP {isakmp=#0/ipsec=#0}
    2022:06:03-10:26:33 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_3"[12] XGS-FW-WAN-IP:4500 #399617: deleting state (STATE_QUICK_I2)
    2022:06:03-10:26:33 fw-320-2 pluto[8792]: id="2204" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN down" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:03-10:26:33 fw-320-2 pluto[8792]: "S_REF_IpsSitTunnelxgs2sg_3"[12] XGS-FW-WAN-IP:4500: deleting connection "S_REF_IpsSitTunnelxgs2sg_3"[12] instance with peer XGS-FW-WAN-IP {isakmp=#0/ipsec=#0}
    2022:06:03-10:26:33 fw-320-1 pluto[8907]: id="2204" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN down" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:03-10:26:33 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_3"[12] XGS-FW-WAN-IP:4500: deleting connection "S_REF_IpsSitTunnelxgs2sg_3"[12] instance with peer XGS-FW-WAN-IP {isakmp=#0/ipsec=#0}
    2022:06:03-10:26:33 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_55"[13] XGS-FW-WAN-IP:4500 #399615: deleting state (STATE_QUICK_I2)
    2022:06:03-10:26:33 fw-320-2 pluto[8792]: id="2204" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN down" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:03-10:26:33 fw-320-2 pluto[8792]: "S_REF_IpsSitTunnelxgs2sg_55"[13] XGS-FW-WAN-IP:4500: deleting connection "S_REF_IpsSitTunnelxgs2sg_55"[13] instance with peer XGS-FW-WAN-IP {isakmp=#0/ipsec=#0}
    2022:06:03-10:26:33 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_55"[13] XGS-FW-WAN-IP:4500: deleting connection "S_REF_IpsSitTunnelxgs2sg_55"[13] instance with peer XGS-FW-WAN-IP {isakmp=#0/ipsec=#0}
    2022:06:03-10:26:33 fw-320-1 pluto[8907]: id="2204" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN down" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:03-10:26:33 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_53"[13] XGS-FW-WAN-IP:4500 #399607: deleting state (STATE_QUICK_I2)
    2022:06:03-10:26:33 fw-320-2 pluto[8792]: id="2204" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN down" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:03-10:26:33 fw-320-2 pluto[8792]: "S_REF_IpsSitTunnelxgs2sg_53"[13] XGS-FW-WAN-IP:4500: deleting connection "S_REF_IpsSitTunnelxgs2sg_53"[13] instance with peer XGS-FW-WAN-IP {isakmp=#0/ipsec=#0}
    2022:06:03-10:26:33 fw-320-1 pluto[8907]: id="2204" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN down" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:03-10:26:33 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_53"[13] XGS-FW-WAN-IP:4500: deleting connection "S_REF_IpsSitTunnelxgs2sg_53"[13] instance with peer XGS-FW-WAN-IP {isakmp=#0/ipsec=#0}
    2022:06:03-10:26:33 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_9" #399604: deleting state (STATE_MAIN_I4)
    2022:06:03-10:26:33 fw-320-2 pluto[8792]: "S_REF_IpsSitTunnelxgs2sg_9"[14] XGS-FW-WAN-IP:4500: deleting connection "S_REF_IpsSitTunnelxgs2sg_9"[14] instance with peer XGS-FW-WAN-IP {isakmp=#0/ipsec=#0}
    2022:06:03-10:27:35 fw-320-1 pluto[8907]: packet from XGS-FW-WAN-IP:500: received Vendor ID payload [XAUTH]
    2022:06:03-10:27:35 fw-320-1 pluto[8907]: packet from XGS-FW-WAN-IP:500: received Vendor ID payload [Dead Peer Detection]
    2022:06:03-10:27:35 fw-320-1 pluto[8907]: packet from XGS-FW-WAN-IP:500: ignoring Vendor ID payload [Cisco-Unity]
    2022:06:03-10:27:35 fw-320-1 pluto[8907]: packet from XGS-FW-WAN-IP:500: ignoring Vendor ID payload [FRAGMENTATION 80000000]
    2022:06:03-10:27:35 fw-320-1 pluto[8907]: packet from XGS-FW-WAN-IP:500: received Vendor ID payload [RFC 3947]
    2022:06:03-10:27:35 fw-320-1 pluto[8907]: packet from XGS-FW-WAN-IP:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
    2022:06:03-10:27:35 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelfamm2_9"[28] XGS-FW-WAN-IP #400062: responding to Main Mode from unknown peer XGS-FW-WAN-IP
    2022:06:03-10:27:42 fw-320-1 pluto[8907]: packet from XGS-FW-WAN-IP:500: received Vendor ID payload [XAUTH]
    2022:06:03-10:27:42 fw-320-1 pluto[8907]: packet from XGS-FW-WAN-IP:500: received Vendor ID payload [Dead Peer Detection]
    2022:06:03-10:27:42 fw-320-1 pluto[8907]: packet from XGS-FW-WAN-IP:500: ignoring Vendor ID payload [Cisco-Unity]
    2022:06:03-10:27:42 fw-320-1 pluto[8907]: packet from XGS-FW-WAN-IP:500: ignoring Vendor ID payload [FRAGMENTATION 80000000]
    2022:06:03-10:27:42 fw-320-1 pluto[8907]: packet from XGS-FW-WAN-IP:500: received Vendor ID payload [RFC 3947]
    2022:06:03-10:27:42 fw-320-1 pluto[8907]: packet from XGS-FW-WAN-IP:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
    2022:06:03-10:27:42 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelfamm2_9"[28] XGS-FW-WAN-IP #400063: responding to Main Mode from unknown peer XGS-FW-WAN-IP
    2022:06:03-10:27:55 fw-320-1 pluto[8907]: packet from XGS-FW-WAN-IP:500: received Vendor ID payload [XAUTH]
    2022:06:03-10:27:55 fw-320-1 pluto[8907]: packet from XGS-FW-WAN-IP:500: received Vendor ID payload [Dead Peer Detection]
    2022:06:03-10:27:55 fw-320-1 pluto[8907]: packet from XGS-FW-WAN-IP:500: ignoring Vendor ID payload [Cisco-Unity]
    2022:06:03-10:27:55 fw-320-1 pluto[8907]: packet from XGS-FW-WAN-IP:500: ignoring Vendor ID payload [FRAGMENTATION 80000000]
    2022:06:03-10:27:55 fw-320-1 pluto[8907]: packet from XGS-FW-WAN-IP:500: received Vendor ID payload [RFC 3947]
    2022:06:03-10:27:55 fw-320-1 pluto[8907]: packet from XGS-FW-WAN-IP:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
    2022:06:03-10:27:55 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelfamm2_9"[28] XGS-FW-WAN-IP #400064: responding to Main Mode from unknown peer XGS-FW-WAN-IP
    2022:06:03-10:28:05 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelfamm2_9"[28] XGS-FW-WAN-IP #400064: NAT-Traversal: Result using RFC 3947: peer is NATed
    2022:06:03-10:28:05 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelfamm2_9"[28] XGS-FW-WAN-IP #400064: Informational Exchange message must be encrypted
    2022:06:03-10:28:45 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelfamm2_9"[28] XGS-FW-WAN-IP #400062: max number of retransmissions (2) reached STATE_MAIN_R1
    2022:06:03-10:28:52 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelfamm2_9"[28] XGS-FW-WAN-IP #400063: max number of retransmissions (2) reached STATE_MAIN_R1
    2022:06:03-10:29:15 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelfamm2_9"[28] XGS-FW-WAN-IP #400064: max number of retransmissions (2) reached STATE_MAIN_R2
    2022:06:03-10:29:15 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelfamm2_9"[28] XGS-FW-WAN-IP: deleting connection "S_REF_IpsSitTunnelfamm2_9"[28] instance with peer XGS-FW-WAN-IP {isakmp=#0/ipsec=#0}
    
    
    
    
    
    
    
    2022:06:07-16:58:12 fw-320-1 pluto[8907]: packet from XGS-FW-WAN-IP:500: received Vendor ID payload [XAUTH]
    2022:06:07-16:58:12 fw-320-1 pluto[8907]: packet from XGS-FW-WAN-IP:500: received Vendor ID payload [Dead Peer Detection]
    2022:06:07-16:58:12 fw-320-1 pluto[8907]: packet from XGS-FW-WAN-IP:500: ignoring Vendor ID payload [Cisco-Unity]
    2022:06:07-16:58:12 fw-320-1 pluto[8907]: packet from XGS-FW-WAN-IP:500: ignoring Vendor ID payload [FRAGMENTATION 80000000]
    2022:06:07-16:58:12 fw-320-1 pluto[8907]: packet from XGS-FW-WAN-IP:500: received Vendor ID payload [RFC 3947]
    2022:06:07-16:58:12 fw-320-1 pluto[8907]: packet from XGS-FW-WAN-IP:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
    2022:06:07-16:58:12 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelfamm2_9"[33] XGS-FW-WAN-IP #481519: responding to Main Mode from unknown peer XGS-FW-WAN-IP
    2022:06:07-16:58:12 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelfamm2_9"[33] XGS-FW-WAN-IP #481519: NAT-Traversal: Result using RFC 3947: peer is NATed
    2022:06:07-16:58:13 fw-320-1 pluto[8907]: | NAT-T: new mapping XGS-FW-WAN-IP:500/4500)
    2022:06:07-16:58:13 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelfamm2_9"[33] XGS-FW-WAN-IP:4500 #481519: Peer ID is ID_FQDN: 'xgfw.dummy.domain'
    2022:06:07-16:58:13 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_9"[15] XGS-FW-WAN-IP:4500 #481519: deleting connection "S_REF_IpsSitTunnelfamm2_9"[33] instance with peer XGS-FW-WAN-IP {isakmp=#0/ipsec=#0}
    2022:06:07-16:58:13 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_9"[15] XGS-FW-WAN-IP:4500 #481519: we don't have a cert
    2022:06:07-16:58:13 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_9"[15] XGS-FW-WAN-IP:4500 #481519: Dead Peer Detection (RFC 3706) enabled
    2022:06:07-16:58:13 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_9"[15] XGS-FW-WAN-IP:4500 #481519: sent MR3, ISAKMP SA established
    2022:06:07-16:58:13 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_43"[14] XGS-FW-WAN-IP:4500 #481520: responding to Quick Mode
    2022:06:07-16:58:13 fw-320-1 pluto[8907]: id="2203" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN up" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:07-16:58:13 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_43"[14] XGS-FW-WAN-IP:4500 #481520: IPsec SA established {ESP=>0xc6da3d92 <0x795b0c86 NATOA=0.0.0.0 DPD}
    2022:06:07-16:58:13 fw-320-2 pluto[8792]: id="2203" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN up" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:07-16:58:13 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_64"[14] XGS-FW-WAN-IP:4500 #481522: responding to Quick Mode
    2022:06:07-16:58:13 fw-320-1 pluto[8907]: id="2203" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN up" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:07-16:58:13 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_64"[14] XGS-FW-WAN-IP:4500 #481522: IPsec SA established {ESP=>0xcde4862b <0x22a1935f NATOA=0.0.0.0 DPD}
    2022:06:07-16:58:14 fw-320-2 pluto[8792]: id="2203" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN up" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:07-16:58:14 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_57"[14] XGS-FW-WAN-IP:4500 #481523: responding to Quick Mode
    2022:06:07-16:58:14 fw-320-1 pluto[8907]: id="2203" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN up" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:07-16:58:14 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_57"[14] XGS-FW-WAN-IP:4500 #481523: IPsec SA established {ESP=>0xcbd99927 <0xc7cb73b7 NATOA=0.0.0.0 DPD}
    2022:06:07-16:58:14 fw-320-2 pluto[8792]: id="2203" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN up" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:07-16:58:14 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_50"[14] XGS-FW-WAN-IP:4500 #481525: responding to Quick Mode
    2022:06:07-16:58:15 fw-320-1 pluto[8907]: id="2203" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN up" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:07-16:58:15 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_50"[14] XGS-FW-WAN-IP:4500 #481525: IPsec SA established {ESP=>0xcace4bf4 <0x017f64be NATOA=0.0.0.0 DPD}
    2022:06:07-16:58:15 fw-320-2 pluto[8792]: id="2203" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN up" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:07-16:58:15 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_36"[14] XGS-FW-WAN-IP:4500 #481526: responding to Quick Mode
    2022:06:07-16:58:15 fw-320-1 pluto[8907]: id="2203" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN up" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:07-16:58:15 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_36"[14] XGS-FW-WAN-IP:4500 #481526: IPsec SA established {ESP=>0xc38ec88c <0x203848cb NATOA=0.0.0.0 DPD}
    2022:06:07-16:58:15 fw-320-2 pluto[8792]: id="2203" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN up" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:07-16:58:15 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_29"[14] XGS-FW-WAN-IP:4500 #481527: responding to Quick Mode
    2022:06:07-16:58:16 fw-320-1 pluto[8907]: id="2203" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN up" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:07-16:58:16 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_29"[14] XGS-FW-WAN-IP:4500 #481527: IPsec SA established {ESP=>0xca516ac0 <0xc06fae15 NATOA=0.0.0.0 DPD}
    2022:06:07-16:58:16 fw-320-2 pluto[8792]: id="2203" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN up" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:07-16:58:16 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_22"[14] XGS-FW-WAN-IP:4500 #481530: responding to Quick Mode
    2022:06:07-16:58:16 fw-320-1 pluto[8907]: id="2203" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN up" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:07-16:58:16 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_22"[14] XGS-FW-WAN-IP:4500 #481530: IPsec SA established {ESP=>0xcbf18ac7 <0x8d040eee NATOA=0.0.0.0 DPD}
    2022:06:07-16:58:16 fw-320-2 pluto[8792]: id="2203" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN up" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:07-16:58:16 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_15"[14] XGS-FW-WAN-IP:4500 #481532: responding to Quick Mode
    2022:06:07-16:58:17 fw-320-1 pluto[8907]: id="2203" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN up" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:07-16:58:17 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_15"[14] XGS-FW-WAN-IP:4500 #481532: IPsec SA established {ESP=>0xce5aeeb6 <0x3c73c27a NATOA=0.0.0.0 DPD}
    2022:06:07-16:58:17 fw-320-2 pluto[8792]: id="2203" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN up" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:07-16:58:17 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_8"[14] XGS-FW-WAN-IP:4500 #481534: responding to Quick Mode
    2022:06:07-16:58:17 fw-320-1 pluto[8907]: id="2203" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN up" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:07-16:58:17 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_8"[14] XGS-FW-WAN-IP:4500 #481534: IPsec SA established {ESP=>0xc674e13d <0xfae90f58 NATOA=0.0.0.0 DPD}
    2022:06:07-16:58:17 fw-320-2 pluto[8792]: id="2203" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN up" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:07-16:58:17 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_1"[14] XGS-FW-WAN-IP:4500 #481535: responding to Quick Mode
    2022:06:07-16:58:18 fw-320-1 pluto[8907]: id="2203" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN up" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:07-16:58:18 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_1"[14] XGS-FW-WAN-IP:4500 #481535: IPsec SA established {ESP=>0xcf591ca5 <0x1c20a695 NATOA=0.0.0.0 DPD}
    2022:06:07-16:58:18 fw-320-2 pluto[8792]: id="2203" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN up" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:07-16:58:18 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_47"[14] XGS-FW-WAN-IP:4500 #481536: responding to Quick Mode
    2022:06:07-16:58:18 fw-320-1 pluto[8907]: id="2203" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN up" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:07-16:58:18 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_47"[14] XGS-FW-WAN-IP:4500 #481536: IPsec SA established {ESP=>0xcf0c436d <0x4534b446 NATOA=0.0.0.0 DPD}
    2022:06:07-16:58:18 fw-320-2 pluto[8792]: id="2203" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN up" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:07-16:58:19 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_68"[14] XGS-FW-WAN-IP:4500 #481537: responding to Quick Mode
    2022:06:07-16:58:19 fw-320-1 pluto[8907]: id="2203" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN up" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:07-16:58:19 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_68"[14] XGS-FW-WAN-IP:4500 #481537: IPsec SA established {ESP=>0xc4935bf1 <0x2b4b5af5 NATOA=0.0.0.0 DPD}
    2022:06:07-16:58:19 fw-320-2 pluto[8792]: id="2203" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN up" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:07-16:58:19 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_61"[14] XGS-FW-WAN-IP:4500 #481538: responding to Quick Mode
    2022:06:07-16:58:19 fw-320-1 pluto[8907]: id="2203" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN up" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:07-16:58:19 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_61"[14] XGS-FW-WAN-IP:4500 #481538: IPsec SA established {ESP=>0xc2ee4afa <0x21530c6a NATOA=0.0.0.0 DPD}
    2022:06:07-16:58:19 fw-320-2 pluto[8792]: id="2203" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN up" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:07-16:58:20 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_54"[14] XGS-FW-WAN-IP:4500 #481539: responding to Quick Mode
    2022:06:07-16:58:20 fw-320-1 pluto[8907]: id="2203" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN up" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:07-16:58:20 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_54"[14] XGS-FW-WAN-IP:4500 #481539: IPsec SA established {ESP=>0xc05ca0f9 <0x74e7022b NATOA=0.0.0.0 DPD}
    2022:06:07-16:58:20 fw-320-2 pluto[8792]: id="2203" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN up" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:07-16:58:20 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_40"[14] XGS-FW-WAN-IP:4500 #481541: responding to Quick Mode
    2022:06:07-16:58:21 fw-320-1 pluto[8907]: id="2203" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN up" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:07-16:58:21 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_40"[14] XGS-FW-WAN-IP:4500 #481541: IPsec SA established {ESP=>0xcdb0a883 <0xffe8e7f1 NATOA=0.0.0.0 DPD}
    2022:06:07-16:58:21 fw-320-2 pluto[8792]: id="2203" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN up" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:07-16:58:21 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_33"[14] XGS-FW-WAN-IP:4500 #481542: responding to Quick Mode
    2022:06:07-16:58:21 fw-320-1 pluto[8907]: id="2203" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN up" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:07-16:58:21 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_33"[14] XGS-FW-WAN-IP:4500 #481542: IPsec SA established {ESP=>0xc22e5531 <0x9dd2b6c6 NATOA=0.0.0.0 DPD}
    2022:06:07-16:58:21 fw-320-2 pluto[8792]: id="2203" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN up" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:07-16:58:21 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_26"[14] XGS-FW-WAN-IP:4500 #481543: responding to Quick Mode
    2022:06:07-16:58:22 fw-320-1 pluto[8907]: id="2203" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN up" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:07-16:58:22 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_26"[14] XGS-FW-WAN-IP:4500 #481543: IPsec SA established {ESP=>0xc78eb4b6 <0x7b926bdd NATOA=0.0.0.0 DPD}
    2022:06:07-16:58:22 fw-320-2 pluto[8792]: id="2203" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN up" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:07-16:58:22 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_19"[14] XGS-FW-WAN-IP:4500 #481544: responding to Quick Mode
    2022:06:07-16:58:22 fw-320-1 pluto[8907]: id="2203" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN up" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:07-16:58:22 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_19"[14] XGS-FW-WAN-IP:4500 #481544: IPsec SA established {ESP=>0xc0fd7c8f <0xb8b00c19 NATOA=0.0.0.0 DPD}
    2022:06:07-16:58:22 fw-320-2 pluto[8792]: id="2203" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN up" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:07-16:58:22 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_12"[14] XGS-FW-WAN-IP:4500 #481545: responding to Quick Mode
    2022:06:07-16:58:23 fw-320-1 pluto[8907]: id="2203" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN up" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:07-16:58:23 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_12"[14] XGS-FW-WAN-IP:4500 #481545: IPsec SA established {ESP=>0xc9176416 <0x0619debf NATOA=0.0.0.0 DPD}
    2022:06:07-16:58:23 fw-320-2 pluto[8792]: id="2203" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN up" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:07-16:58:23 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_5"[14] XGS-FW-WAN-IP:4500 #481546: responding to Quick Mode
    2022:06:07-16:58:23 fw-320-1 pluto[8907]: id="2203" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN up" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:07-16:58:23 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_5"[14] XGS-FW-WAN-IP:4500 #481546: IPsec SA established {ESP=>0xcc216765 <0x5a78b619 NATOA=0.0.0.0 DPD}
    2022:06:07-16:58:23 fw-320-2 pluto[8792]: id="2203" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN up" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:07-16:58:24 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_42"[14] XGS-FW-WAN-IP:4500 #481547: responding to Quick Mode
    2022:06:07-16:58:24 fw-320-1 pluto[8907]: id="2203" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN up" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:07-16:58:24 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_42"[14] XGS-FW-WAN-IP:4500 #481547: IPsec SA established {ESP=>0xc70cdb72 <0x5c2fe488 NATOA=0.0.0.0 DPD}
    2022:06:07-16:58:24 fw-320-2 pluto[8792]: id="2203" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN up" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:07-16:58:24 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_63"[14] XGS-FW-WAN-IP:4500 #481548: responding to Quick Mode
    2022:06:07-16:58:24 fw-320-1 pluto[8907]: id="2203" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN up" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:07-16:58:24 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_63"[14] XGS-FW-WAN-IP:4500 #481548: IPsec SA established {ESP=>0xc2619217 <0xf53c1dd9 NATOA=0.0.0.0 DPD}
    2022:06:07-16:58:24 fw-320-2 pluto[8792]: id="2203" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN up" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:07-16:58:25 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_56"[14] XGS-FW-WAN-IP:4500 #481549: responding to Quick Mode
    2022:06:07-16:58:25 fw-320-1 pluto[8907]: id="2203" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN up" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:07-16:58:25 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_56"[14] XGS-FW-WAN-IP:4500 #481549: IPsec SA established {ESP=>0xce92f6a5 <0xf2e62ca1 NATOA=0.0.0.0 DPD}
    2022:06:07-16:58:25 fw-320-2 pluto[8792]: id="2203" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN up" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:07-16:58:25 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_49"[14] XGS-FW-WAN-IP:4500 #481552: responding to Quick Mode
    2022:06:07-16:58:25 fw-320-1 pluto[8907]: id="2203" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN up" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:07-16:58:25 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_49"[14] XGS-FW-WAN-IP:4500 #481552: IPsec SA established {ESP=>0xcb83cfe2 <0x2d6676f2 NATOA=0.0.0.0 DPD}
    2022:06:07-16:58:25 fw-320-2 pluto[8792]: id="2203" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN up" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:07-16:58:26 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_35"[14] XGS-FW-WAN-IP:4500 #481553: responding to Quick Mode
    2022:06:07-16:58:26 fw-320-1 pluto[8907]: id="2203" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN up" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:07-16:58:26 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_35"[14] XGS-FW-WAN-IP:4500 #481553: IPsec SA established {ESP=>0xc5d15135 <0x6239da41 NATOA=0.0.0.0 DPD}
    2022:06:07-16:58:26 fw-320-2 pluto[8792]: id="2203" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN up" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:07-16:58:26 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_28"[14] XGS-FW-WAN-IP:4500 #481554: responding to Quick Mode
    2022:06:07-16:58:27 fw-320-1 pluto[8907]: id="2203" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN up" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:07-16:58:27 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_28"[14] XGS-FW-WAN-IP:4500 #481554: IPsec SA established {ESP=>0xc8826726 <0x16ef327a NATOA=0.0.0.0 DPD}
    2022:06:07-16:58:27 fw-320-2 pluto[8792]: id="2203" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN up" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:07-16:58:27 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_21"[14] XGS-FW-WAN-IP:4500 #481556: responding to Quick Mode
    2022:06:07-16:58:27 fw-320-1 pluto[8907]: id="2203" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN up" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:07-16:58:27 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_21"[14] XGS-FW-WAN-IP:4500 #481556: IPsec SA established {ESP=>0xcb8c5cf3 <0xc95c83ba NATOA=0.0.0.0 DPD}
    2022:06:07-16:58:27 fw-320-2 pluto[8792]: id="2203" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN up" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:07-16:58:28 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_14"[14] XGS-FW-WAN-IP:4500 #481557: responding to Quick Mode
    2022:06:07-16:58:28 fw-320-1 pluto[8907]: id="2203" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN up" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:07-16:58:28 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_14"[14] XGS-FW-WAN-IP:4500 #481557: IPsec SA established {ESP=>0xc189161b <0x8c977692 NATOA=0.0.0.0 DPD}
    2022:06:07-16:58:28 fw-320-2 pluto[8792]: id="2203" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN up" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:07-16:58:28 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_7"[14] XGS-FW-WAN-IP:4500 #481558: responding to Quick Mode
    2022:06:07-16:58:28 fw-320-1 pluto[8907]: id="2203" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN up" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:07-16:58:28 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_7"[14] XGS-FW-WAN-IP:4500 #481558: IPsec SA established {ESP=>0xcbe68803 <0x9f58a8ea NATOA=0.0.0.0 DPD}
    2022:06:07-16:58:28 fw-320-2 pluto[8792]: id="2203" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN up" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:07-16:58:29 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_0"[14] XGS-FW-WAN-IP:4500 #481559: responding to Quick Mode
    2022:06:07-16:58:29 fw-320-1 pluto[8907]: id="2203" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN up" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:07-16:58:29 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_0"[14] XGS-FW-WAN-IP:4500 #481559: IPsec SA established {ESP=>0xc02d85b2 <0x99d05786 NATOA=0.0.0.0 DPD}
    2022:06:07-16:58:29 fw-320-2 pluto[8792]: id="2203" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN up" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:07-16:58:29 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_44"[14] XGS-FW-WAN-IP:4500 #481560: responding to Quick Mode
    2022:06:07-16:58:29 fw-320-1 pluto[8907]: id="2203" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN up" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:07-16:58:29 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_44"[14] XGS-FW-WAN-IP:4500 #481560: IPsec SA established {ESP=>0xcda8bffd <0x04512bf4 NATOA=0.0.0.0 DPD}
    2022:06:07-16:58:29 fw-320-2 pluto[8792]: id="2203" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN up" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:07-16:58:30 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_65"[14] XGS-FW-WAN-IP:4500 #481561: responding to Quick Mode
    2022:06:07-16:58:30 fw-320-1 pluto[8907]: id="2203" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN up" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:07-16:58:30 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_65"[14] XGS-FW-WAN-IP:4500 #481561: IPsec SA established {ESP=>0xc0d3dd3b <0xecb604c6 NATOA=0.0.0.0 DPD}
    2022:06:07-16:58:30 fw-320-2 pluto[8792]: id="2203" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN up" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:07-16:58:30 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_58"[14] XGS-FW-WAN-IP:4500 #481562: responding to Quick Mode
    2022:06:07-16:58:31 fw-320-1 pluto[8907]: id="2203" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN up" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:07-16:58:31 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_58"[14] XGS-FW-WAN-IP:4500 #481562: IPsec SA established {ESP=>0xc451f6c5 <0xa3919ff3 NATOA=0.0.0.0 DPD}
    2022:06:07-16:58:31 fw-320-2 pluto[8792]: id="2203" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN up" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:07-16:58:31 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_51"[14] XGS-FW-WAN-IP:4500 #481564: responding to Quick Mode
    2022:06:07-16:58:31 fw-320-1 pluto[8907]: id="2203" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN up" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:07-16:58:31 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_51"[14] XGS-FW-WAN-IP:4500 #481564: IPsec SA established {ESP=>0xc921667d <0x5afc8ab2 NATOA=0.0.0.0 DPD}
    2022:06:07-16:58:31 fw-320-2 pluto[8792]: id="2203" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN up" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:07-16:58:31 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_37"[14] XGS-FW-WAN-IP:4500 #481565: responding to Quick Mode
    2022:06:07-16:58:32 fw-320-1 pluto[8907]: id="2203" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN up" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:07-16:58:32 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_37"[14] XGS-FW-WAN-IP:4500 #481565: IPsec SA established {ESP=>0xcee14d16 <0xdcb05149 NATOA=0.0.0.0 DPD}
    2022:06:07-16:58:32 fw-320-2 pluto[8792]: id="2203" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN up" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:07-16:58:32 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_30"[14] XGS-FW-WAN-IP:4500 #481567: responding to Quick Mode
    2022:06:07-16:58:32 fw-320-1 pluto[8907]: id="2203" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN up" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:07-16:58:32 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_30"[14] XGS-FW-WAN-IP:4500 #481567: IPsec SA established {ESP=>0xc111be6c <0xc7c63eba NATOA=0.0.0.0 DPD}
    2022:06:07-16:58:32 fw-320-2 pluto[8792]: id="2203" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN up" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:07-16:58:33 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_23"[14] XGS-FW-WAN-IP:4500 #481568: responding to Quick Mode
    2022:06:07-16:58:33 fw-320-1 pluto[8907]: id="2203" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN up" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:07-16:58:33 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_23"[14] XGS-FW-WAN-IP:4500 #481568: IPsec SA established {ESP=>0xc8e5fb62 <0xb7f3955e NATOA=0.0.0.0 DPD}
    2022:06:07-16:58:33 fw-320-2 pluto[8792]: id="2203" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN up" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:07-16:58:33 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_16"[14] XGS-FW-WAN-IP:4500 #481569: responding to Quick Mode
    2022:06:07-16:58:33 fw-320-1 pluto[8907]: id="2203" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN up" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:07-16:58:33 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_16"[14] XGS-FW-WAN-IP:4500 #481569: IPsec SA established {ESP=>0xcbec2193 <0xaf30be71 NATOA=0.0.0.0 DPD}
    2022:06:07-16:58:34 fw-320-2 pluto[8792]: id="2203" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN up" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:07-16:58:34 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_9"[15] XGS-FW-WAN-IP:4500 #481570: responding to Quick Mode
    2022:06:07-16:58:34 fw-320-1 pluto[8907]: id="2203" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN up" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:07-16:58:34 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_9"[15] XGS-FW-WAN-IP:4500 #481570: IPsec SA established {ESP=>0xc318c860 <0x47214cc7 NATOA=0.0.0.0 DPD}
    2022:06:07-16:58:34 fw-320-2 pluto[8792]: id="2203" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN up" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:07-16:58:34 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_2"[15] XGS-FW-WAN-IP:4500 #481571: responding to Quick Mode
    2022:06:07-16:58:35 fw-320-1 pluto[8907]: id="2203" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN up" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:07-16:58:35 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_2"[15] XGS-FW-WAN-IP:4500 #481571: IPsec SA established {ESP=>0xc054c08a <0x003e26d7 NATOA=0.0.0.0 DPD}
    2022:06:07-16:58:35 fw-320-2 pluto[8792]: id="2203" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN up" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:07-16:58:35 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_46"[14] XGS-FW-WAN-IP:4500 #481573: responding to Quick Mode
    2022:06:07-16:58:35 fw-320-1 pluto[8907]: id="2203" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN up" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:07-16:58:35 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_46"[14] XGS-FW-WAN-IP:4500 #481573: IPsec SA established {ESP=>0xc1efc6bf <0x5b8b75d6 NATOA=0.0.0.0 DPD}
    2022:06:07-16:58:35 fw-320-2 pluto[8792]: id="2203" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN up" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:07-16:58:36 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_67"[14] XGS-FW-WAN-IP:4500 #481576: responding to Quick Mode
    2022:06:07-16:58:36 fw-320-1 pluto[8907]: id="2203" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN up" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:07-16:58:36 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_67"[14] XGS-FW-WAN-IP:4500 #481576: IPsec SA established {ESP=>0xc1113011 <0x791c3711 NATOA=0.0.0.0 DPD}
    2022:06:07-16:58:37 fw-320-2 pluto[8792]: id="2203" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN up" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:07-16:58:37 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_60"[14] XGS-FW-WAN-IP:4500 #481577: responding to Quick Mode
    2022:06:07-16:58:37 fw-320-1 pluto[8907]: id="2203" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN up" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:07-16:58:37 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_60"[14] XGS-FW-WAN-IP:4500 #481577: IPsec SA established {ESP=>0xcc523f06 <0x4b3ef00e NATOA=0.0.0.0 DPD}
    2022:06:07-16:58:37 fw-320-2 pluto[8792]: id="2203" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN up" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:07-16:58:37 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_53"[14] XGS-FW-WAN-IP:4500 #481578: responding to Quick Mode
    2022:06:07-16:58:38 fw-320-1 pluto[8907]: id="2203" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN up" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:07-16:58:38 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_53"[14] XGS-FW-WAN-IP:4500 #481578: IPsec SA established {ESP=>0xc5d6f79a <0x42b0c98b NATOA=0.0.0.0 DPD}
    2022:06:07-16:58:38 fw-320-2 pluto[8792]: id="2203" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN up" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:07-16:58:38 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_39"[14] XGS-FW-WAN-IP:4500 #481579: responding to Quick Mode
    2022:06:07-16:58:38 fw-320-1 pluto[8907]: id="2203" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN up" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:07-16:58:38 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_39"[14] XGS-FW-WAN-IP:4500 #481579: IPsec SA established {ESP=>0xc74d8c8b <0x307293b2 NATOA=0.0.0.0 DPD}
    2022:06:07-16:58:38 fw-320-2 pluto[8792]: id="2203" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN up" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:07-16:58:38 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_32"[14] XGS-FW-WAN-IP:4500 #481580: responding to Quick Mode
    2022:06:07-16:58:39 fw-320-1 pluto[8907]: id="2203" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN up" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:07-16:58:39 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_32"[14] XGS-FW-WAN-IP:4500 #481580: IPsec SA established {ESP=>0xc06f2d84 <0xd9895abd NATOA=0.0.0.0 DPD}
    2022:06:07-16:58:39 fw-320-2 pluto[8792]: id="2203" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN up" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:07-16:58:39 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_25"[14] XGS-FW-WAN-IP:4500 #481581: responding to Quick Mode
    2022:06:07-16:58:39 fw-320-1 pluto[8907]: id="2203" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN up" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:07-16:58:39 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_25"[14] XGS-FW-WAN-IP:4500 #481581: IPsec SA established {ESP=>0xcc9abfc8 <0xcd775cf7 NATOA=0.0.0.0 DPD}
    2022:06:07-16:58:39 fw-320-2 pluto[8792]: id="2203" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN up" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:07-16:58:40 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_18"[14] XGS-FW-WAN-IP:4500 #481582: responding to Quick Mode
    2022:06:07-16:58:40 fw-320-1 pluto[8907]: id="2203" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN up" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:07-16:58:40 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_18"[14] XGS-FW-WAN-IP:4500 #481582: IPsec SA established {ESP=>0xcce9bac6 <0xdd9ad2d1 NATOA=0.0.0.0 DPD}
    2022:06:07-16:58:40 fw-320-2 pluto[8792]: id="2203" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN up" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:07-16:58:40 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_11"[14] XGS-FW-WAN-IP:4500 #481583: responding to Quick Mode
    2022:06:07-16:58:41 fw-320-1 pluto[8907]: id="2203" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN up" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:07-16:58:41 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_11"[14] XGS-FW-WAN-IP:4500 #481583: IPsec SA established {ESP=>0xcc814dde <0x2e26359b NATOA=0.0.0.0 DPD}
    2022:06:07-16:58:41 fw-320-2 pluto[8792]: id="2203" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN up" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:07-16:58:41 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_4"[14] XGS-FW-WAN-IP:4500 #481584: responding to Quick Mode
    2022:06:07-16:58:41 fw-320-1 pluto[8907]: id="2203" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN up" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:07-16:58:41 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_4"[14] XGS-FW-WAN-IP:4500 #481584: IPsec SA established {ESP=>0xc50c98c1 <0xbde3e70d NATOA=0.0.0.0 DPD}
    2022:06:07-16:58:41 fw-320-2 pluto[8792]: id="2203" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN up" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:07-16:58:41 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_48"[14] XGS-FW-WAN-IP:4500 #481585: responding to Quick Mode
    2022:06:07-16:58:42 fw-320-1 pluto[8907]: id="2203" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN up" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:07-16:58:42 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_48"[14] XGS-FW-WAN-IP:4500 #481585: IPsec SA established {ESP=>0xc72d1d9c <0x39298da3 NATOA=0.0.0.0 DPD}
    2022:06:07-16:58:42 fw-320-2 pluto[8792]: id="2203" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN up" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:07-16:58:42 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_69"[14] XGS-FW-WAN-IP:4500 #481586: responding to Quick Mode
    2022:06:07-16:58:42 fw-320-1 pluto[8907]: id="2203" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN up" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:07-16:58:42 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_69"[14] XGS-FW-WAN-IP:4500 #481586: IPsec SA established {ESP=>0xc1e9ab6a <0xa767e25b NATOA=0.0.0.0 DPD}
    2022:06:07-16:58:42 fw-320-2 pluto[8792]: id="2203" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN up" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:07-16:58:43 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_62"[14] XGS-FW-WAN-IP:4500 #481587: responding to Quick Mode
    2022:06:07-16:58:43 fw-320-1 pluto[8907]: id="2203" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN up" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:07-16:58:43 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_62"[14] XGS-FW-WAN-IP:4500 #481587: IPsec SA established {ESP=>0xc1a0be23 <0x38d380dc NATOA=0.0.0.0 DPD}
    2022:06:07-16:58:43 fw-320-2 pluto[8792]: id="2203" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN up" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:07-16:58:43 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_55"[14] XGS-FW-WAN-IP:4500 #481588: responding to Quick Mode
    2022:06:07-16:58:43 fw-320-1 pluto[8907]: id="2203" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN up" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:07-16:58:43 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_55"[14] XGS-FW-WAN-IP:4500 #481588: IPsec SA established {ESP=>0xcc7f0c85 <0xc92350f8 NATOA=0.0.0.0 DPD}
    2022:06:07-16:58:43 fw-320-2 pluto[8792]: id="2203" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN up" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:07-16:58:44 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_41"[14] XGS-FW-WAN-IP:4500 #481589: responding to Quick Mode
    2022:06:07-16:58:44 fw-320-1 pluto[8907]: id="2203" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN up" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:07-16:58:44 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_41"[14] XGS-FW-WAN-IP:4500 #481589: IPsec SA established {ESP=>0xce98f926 <0x62494ac1 NATOA=0.0.0.0 DPD}
    2022:06:07-16:58:44 fw-320-2 pluto[8792]: id="2203" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN up" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:07-16:58:44 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_34"[14] XGS-FW-WAN-IP:4500 #481591: responding to Quick Mode
    2022:06:07-16:58:44 fw-320-1 pluto[8907]: id="2203" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN up" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:07-16:58:44 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_34"[14] XGS-FW-WAN-IP:4500 #481591: IPsec SA established {ESP=>0xcf804aa6 <0x4a10c93a NATOA=0.0.0.0 DPD}
    2022:06:07-16:58:44 fw-320-2 pluto[8792]: id="2203" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN up" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:07-16:58:45 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_27"[14] XGS-FW-WAN-IP:4500 #481592: responding to Quick Mode
    2022:06:07-16:58:45 fw-320-1 pluto[8907]: id="2203" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN up" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:07-16:58:45 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_27"[14] XGS-FW-WAN-IP:4500 #481592: IPsec SA established {ESP=>0xca29bf28 <0x28f75c9e NATOA=0.0.0.0 DPD}
    2022:06:07-16:58:45 fw-320-2 pluto[8792]: id="2203" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN up" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:07-16:58:45 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_20"[14] XGS-FW-WAN-IP:4500 #481593: responding to Quick Mode
    2022:06:07-16:58:45 fw-320-1 pluto[8907]: id="2203" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN up" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:07-16:58:45 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_20"[14] XGS-FW-WAN-IP:4500 #481593: IPsec SA established {ESP=>0xc3526d2c <0xbe47ce44 NATOA=0.0.0.0 DPD}
    2022:06:07-16:58:46 fw-320-2 pluto[8792]: id="2203" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN up" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:07-16:58:46 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_13"[14] XGS-FW-WAN-IP:4500 #481594: responding to Quick Mode
    2022:06:07-16:58:46 fw-320-1 pluto[8907]: id="2203" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN up" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:07-16:58:46 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_13"[14] XGS-FW-WAN-IP:4500 #481594: IPsec SA established {ESP=>0xcf6d638c <0x3bba3bcb NATOA=0.0.0.0 DPD}
    2022:06:07-16:58:46 fw-320-2 pluto[8792]: id="2203" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN up" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:07-16:58:46 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_6"[13] XGS-FW-WAN-IP:4500 #481596: responding to Quick Mode
    2022:06:07-16:58:47 fw-320-1 pluto[8907]: id="2203" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN up" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:07-16:58:47 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_6"[13] XGS-FW-WAN-IP:4500 #481596: IPsec SA established {ESP=>0xc473e9fb <0x0ab031ab NATOA=0.0.0.0 DPD}
    2022:06:07-16:58:47 fw-320-2 pluto[8792]: id="2203" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN up" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:07-16:58:47 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_45"[13] XGS-FW-WAN-IP:4500 #481597: responding to Quick Mode
    2022:06:07-16:58:47 fw-320-1 pluto[8907]: id="2203" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN up" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:07-16:58:47 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_45"[13] XGS-FW-WAN-IP:4500 #481597: IPsec SA established {ESP=>0xc7e5fc32 <0x3d2287fb NATOA=0.0.0.0 DPD}
    2022:06:07-16:58:47 fw-320-2 pluto[8792]: id="2203" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN up" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:07-16:58:47 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_66"[13] XGS-FW-WAN-IP:4500 #481598: responding to Quick Mode
    2022:06:07-16:58:48 fw-320-1 pluto[8907]: id="2203" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN up" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:07-16:58:48 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_66"[13] XGS-FW-WAN-IP:4500 #481598: IPsec SA established {ESP=>0xc2c7455d <0xe542c310 NATOA=0.0.0.0 DPD}
    2022:06:07-16:58:48 fw-320-2 pluto[8792]: id="2203" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN up" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:07-16:58:48 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_59"[14] XGS-FW-WAN-IP:4500 #481600: responding to Quick Mode
    2022:06:07-16:58:48 fw-320-1 pluto[8907]: id="2203" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN up" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:07-16:58:48 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_59"[14] XGS-FW-WAN-IP:4500 #481600: IPsec SA established {ESP=>0xc81907e2 <0x26103dbf NATOA=0.0.0.0 DPD}
    2022:06:07-16:58:48 fw-320-2 pluto[8792]: id="2203" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN up" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:07-16:58:49 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_52"[14] XGS-FW-WAN-IP:4500 #481602: responding to Quick Mode
    2022:06:07-16:58:49 fw-320-1 pluto[8907]: id="2203" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN up" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:07-16:58:49 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_52"[14] XGS-FW-WAN-IP:4500 #481602: IPsec SA established {ESP=>0xcd22f595 <0x9cbb7774 NATOA=0.0.0.0 DPD}
    2022:06:07-16:58:49 fw-320-2 pluto[8792]: id="2203" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN up" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:07-16:58:49 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_38"[14] XGS-FW-WAN-IP:4500 #481603: responding to Quick Mode
    2022:06:07-16:58:49 fw-320-1 pluto[8907]: id="2203" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN up" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:07-16:58:49 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_38"[14] XGS-FW-WAN-IP:4500 #481603: IPsec SA established {ESP=>0xcfa939fc <0xe9b0d112 NATOA=0.0.0.0 DPD}
    2022:06:07-16:58:49 fw-320-2 pluto[8792]: id="2203" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN up" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:07-16:58:50 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_31"[14] XGS-FW-WAN-IP:4500 #481604: responding to Quick Mode
    2022:06:07-16:58:50 fw-320-1 pluto[8907]: id="2203" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN up" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:07-16:58:50 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_31"[14] XGS-FW-WAN-IP:4500 #481604: IPsec SA established {ESP=>0xc0a24e3e <0xfa01e8a8 NATOA=0.0.0.0 DPD}
    2022:06:07-16:58:50 fw-320-2 pluto[8792]: id="2203" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN up" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:07-16:58:50 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_24"[14] XGS-FW-WAN-IP:4500 #481606: responding to Quick Mode
    2022:06:07-16:58:50 fw-320-1 pluto[8907]: id="2203" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN up" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:07-16:58:51 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_24"[14] XGS-FW-WAN-IP:4500 #481606: IPsec SA established {ESP=>0xcfbb807f <0x7f4ebe61 NATOA=0.0.0.0 DPD}
    2022:06:07-16:58:51 fw-320-2 pluto[8792]: id="2203" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN up" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:07-16:58:51 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_17"[14] XGS-FW-WAN-IP:4500 #481607: responding to Quick Mode
    2022:06:07-16:58:51 fw-320-1 pluto[8907]: id="2203" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN up" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:07-16:58:51 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_17"[14] XGS-FW-WAN-IP:4500 #481607: IPsec SA established {ESP=>0xc46c467b <0xa18ee01c NATOA=0.0.0.0 DPD}
    2022:06:07-16:58:51 fw-320-2 pluto[8792]: id="2203" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN up" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:07-16:58:51 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_10"[14] XGS-FW-WAN-IP:4500 #481608: responding to Quick Mode
    2022:06:07-16:58:52 fw-320-1 pluto[8907]: id="2203" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN up" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:07-16:58:52 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_10"[14] XGS-FW-WAN-IP:4500 #481608: IPsec SA established {ESP=>0xc72f412c <0xfbff1e8a NATOA=0.0.0.0 DPD}
    2022:06:07-16:58:52 fw-320-2 pluto[8792]: id="2203" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN up" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:07-16:58:52 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_3"[13] XGS-FW-WAN-IP:4500 #481609: responding to Quick Mode
    2022:06:07-16:58:52 fw-320-1 pluto[8907]: id="2203" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN up" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:07-16:58:52 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_3"[13] XGS-FW-WAN-IP:4500 #481609: IPsec SA established {ESP=>0xc569e193 <0x39d97a54 NATOA=0.0.0.0 DPD}
    2022:06:07-16:58:52 fw-320-2 pluto[8792]: id="2203" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN up" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:07-17:53:43 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_64"[14] XGS-FW-WAN-IP:4500 #482310: initiating Quick Mode PUBKEY+ENCRYPT+TUNNEL+PFS to replace #481522 {using isakmp#481519}
    2022:06:07-17:53:43 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_43"[14] XGS-FW-WAN-IP:4500 #482311: initiating Quick Mode PUBKEY+ENCRYPT+TUNNEL+PFS to replace #481520 {using isakmp#481519}
    2022:06:07-17:53:43 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_9"[15] XGS-FW-WAN-IP:4500 #482312: initiating Main Mode to replace #481519
    2022:06:07-17:53:43 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_9"[15] XGS-FW-WAN-IP:4500 #482312: received Vendor ID payload [XAUTH]
    2022:06:07-17:53:43 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_9"[15] XGS-FW-WAN-IP:4500 #482312: received Vendor ID payload [Dead Peer Detection]
    2022:06:07-17:53:43 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_9"[15] XGS-FW-WAN-IP:4500 #482312: ignoring Vendor ID payload [Cisco-Unity]
    2022:06:07-17:53:43 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_9"[15] XGS-FW-WAN-IP:4500 #482312: received Vendor ID payload [RFC 3947]
    2022:06:07-17:53:43 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_9"[15] XGS-FW-WAN-IP:4500 #482312: enabling possible NAT-traversal with method 3
    2022:06:07-17:53:43 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_64"[14] XGS-FW-WAN-IP:4500 #482310: sent QI2, IPsec SA established {ESP=>0xc47ff731 <0x812b4c93 NATOA=0.0.0.0 DPD}
    2022:06:07-17:53:43 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_43"[14] XGS-FW-WAN-IP:4500 #482311: sent QI2, IPsec SA established {ESP=>0xc08b00b9 <0x4499ee35 NATOA=0.0.0.0 DPD}
    2022:06:07-17:53:43 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_9"[15] XGS-FW-WAN-IP:4500 #482312: NAT-Traversal: Result using RFC 3947: peer is NATed
    2022:06:07-17:53:43 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_9"[15] XGS-FW-WAN-IP:4500 #482312: we don't have a cert
    2022:06:07-17:53:43 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_9"[15] XGS-FW-WAN-IP:4500 #482312: Peer ID is ID_FQDN: 'xgfw.dummy.domain'
    2022:06:07-17:53:43 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_9"[15] XGS-FW-WAN-IP:4500 #482312: Dead Peer Detection (RFC 3706) enabled
    2022:06:07-17:53:43 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_9"[15] XGS-FW-WAN-IP:4500 #482312: ISAKMP SA established
    2022:06:07-17:53:44 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_57"[14] XGS-FW-WAN-IP:4500 #482313: initiating Quick Mode PUBKEY+ENCRYPT+TUNNEL+PFS to replace #481523 {using isakmp#482312}
    2022:06:07-17:53:44 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_57"[14] XGS-FW-WAN-IP:4500 #482313: sent QI2, IPsec SA established {ESP=>0xc96c47b2 <0x4a9e68a8 NATOA=0.0.0.0 DPD}
    2022:06:07-17:53:45 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_36"[14] XGS-FW-WAN-IP:4500 #482315: initiating Quick Mode PUBKEY+ENCRYPT+TUNNEL+PFS to replace #481526 {using isakmp#482312}
    2022:06:07-17:53:45 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_50"[14] XGS-FW-WAN-IP:4500 #482316: initiating Quick Mode PUBKEY+ENCRYPT+TUNNEL+PFS to replace #481525 {using isakmp#482312}
    2022:06:07-17:53:45 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_36"[14] XGS-FW-WAN-IP:4500 #482315: sent QI2, IPsec SA established {ESP=>0xc64a0157 <0x991a4a2f NATOA=0.0.0.0 DPD}
    2022:06:07-17:53:45 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_50"[14] XGS-FW-WAN-IP:4500 #482316: sent QI2, IPsec SA established {ESP=>0xcb23d615 <0x161bef87 NATOA=0.0.0.0 DPD}
    2022:06:07-17:53:46 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_22"[14] XGS-FW-WAN-IP:4500 #482317: initiating Quick Mode PUBKEY+ENCRYPT+TUNNEL+PFS to replace #481530 {using isakmp#482312}
    2022:06:07-17:53:46 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_29"[14] XGS-FW-WAN-IP:4500 #482318: initiating Quick Mode PUBKEY+ENCRYPT+TUNNEL+PFS to replace #481527 {using isakmp#482312}
    2022:06:07-17:53:46 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_22"[14] XGS-FW-WAN-IP:4500 #482317: sent QI2, IPsec SA established {ESP=>0xc2f8051c <0x811fd24c NATOA=0.0.0.0 DPD}
    2022:06:07-17:53:46 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_29"[14] XGS-FW-WAN-IP:4500 #482318: sent QI2, IPsec SA established {ESP=>0xc6fc2ecc <0x9ffc788a NATOA=0.0.0.0 DPD}
    2022:06:07-17:53:47 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_8"[14] XGS-FW-WAN-IP:4500 #482320: initiating Quick Mode PUBKEY+ENCRYPT+TUNNEL+PFS to replace #481534 {using isakmp#482312}
    2022:06:07-17:53:47 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_15"[14] XGS-FW-WAN-IP:4500 #482321: initiating Quick Mode PUBKEY+ENCRYPT+TUNNEL+PFS to replace #481532 {using isakmp#482312}
    2022:06:07-17:53:47 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_8"[14] XGS-FW-WAN-IP:4500 #482320: sent QI2, IPsec SA established {ESP=>0xccea3905 <0x596aabf7 NATOA=0.0.0.0 DPD}
    2022:06:07-17:53:47 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_15"[14] XGS-FW-WAN-IP:4500 #482321: sent QI2, IPsec SA established {ESP=>0xc089b809 <0xa1060145 NATOA=0.0.0.0 DPD}
    2022:06:07-17:53:48 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_47"[14] XGS-FW-WAN-IP:4500 #482322: initiating Quick Mode PUBKEY+ENCRYPT+TUNNEL+PFS to replace #481536 {using isakmp#482312}
    2022:06:07-17:53:48 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_1"[14] XGS-FW-WAN-IP:4500 #482323: initiating Quick Mode PUBKEY+ENCRYPT+TUNNEL+PFS to replace #481535 {using isakmp#482312}
    2022:06:07-17:53:48 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_47"[14] XGS-FW-WAN-IP:4500 #482322: sent QI2, IPsec SA established {ESP=>0xcc92941d <0x1a6216dc NATOA=0.0.0.0 DPD}
    2022:06:07-17:53:48 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_1"[14] XGS-FW-WAN-IP:4500 #482323: sent QI2, IPsec SA established {ESP=>0xc171716f <0x1965b865 NATOA=0.0.0.0 DPD}
    2022:06:07-17:53:49 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_61"[14] XGS-FW-WAN-IP:4500 #482324: initiating Quick Mode PUBKEY+ENCRYPT+TUNNEL+PFS to replace #481538 {using isakmp#482312}
    2022:06:07-17:53:49 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_68"[14] XGS-FW-WAN-IP:4500 #482325: initiating Quick Mode PUBKEY+ENCRYPT+TUNNEL+PFS to replace #481537 {using isakmp#482312}
    2022:06:07-17:53:50 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_54"[14] XGS-FW-WAN-IP:4500 #482326: initiating Quick Mode PUBKEY+ENCRYPT+TUNNEL+PFS to replace #481539 {using isakmp#482312}
    2022:06:07-17:53:50 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_61"[14] XGS-FW-WAN-IP:4500 #482324: sent QI2, IPsec SA established {ESP=>0xc59d6ab8 <0x0a6e3554 NATOA=0.0.0.0 DPD}
    2022:06:07-17:53:50 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_54"[14] XGS-FW-WAN-IP:4500 #482326: sent QI2, IPsec SA established {ESP=>0xc9fb1098 <0x1826a3e7 NATOA=0.0.0.0 DPD}
    2022:06:07-17:53:51 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_33"[14] XGS-FW-WAN-IP:4500 #482327: initiating Quick Mode PUBKEY+ENCRYPT+TUNNEL+PFS to replace #481542 {using isakmp#482312}
    2022:06:07-17:53:51 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_40"[14] XGS-FW-WAN-IP:4500 #482328: initiating Quick Mode PUBKEY+ENCRYPT+TUNNEL+PFS to replace #481541 {using isakmp#482312}
    2022:06:07-17:53:51 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_33"[14] XGS-FW-WAN-IP:4500 #482327: sent QI2, IPsec SA established {ESP=>0xcfbb03d9 <0x2d91fbca NATOA=0.0.0.0 DPD}
    2022:06:07-17:53:51 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_40"[14] XGS-FW-WAN-IP:4500 #482328: sent QI2, IPsec SA established {ESP=>0xc571a8df <0xa03a273c NATOA=0.0.0.0 DPD}
    2022:06:07-17:53:52 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_19"[14] XGS-FW-WAN-IP:4500 #482330: initiating Quick Mode PUBKEY+ENCRYPT+TUNNEL+PFS to replace #481544 {using isakmp#482312}
    2022:06:07-17:53:52 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_26"[14] XGS-FW-WAN-IP:4500 #482331: initiating Quick Mode PUBKEY+ENCRYPT+TUNNEL+PFS to replace #481543 {using isakmp#482312}
    2022:06:07-17:53:52 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_19"[14] XGS-FW-WAN-IP:4500 #482330: sent QI2, IPsec SA established {ESP=>0xc61af69e <0xe616bac8 NATOA=0.0.0.0 DPD}
    2022:06:07-17:53:52 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_26"[14] XGS-FW-WAN-IP:4500 #482331: sent QI2, IPsec SA established {ESP=>0xc5ead1a5 <0x0855f8ee NATOA=0.0.0.0 DPD}
    2022:06:07-17:53:53 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_9"[15] XGS-FW-WAN-IP:4500 #481519: received Delete SA payload: deleting ISAKMP State #481519
    2022:06:07-17:53:53 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_5"[14] XGS-FW-WAN-IP:4500 #482335: initiating Quick Mode PUBKEY+ENCRYPT+TUNNEL+PFS to replace #481546 {using isakmp#482312}
    2022:06:07-17:53:53 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_12"[14] XGS-FW-WAN-IP:4500 #482336: initiating Quick Mode PUBKEY+ENCRYPT+TUNNEL+PFS to replace #481545 {using isakmp#482312}
    2022:06:07-17:53:53 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_5"[14] XGS-FW-WAN-IP:4500 #482335: sent QI2, IPsec SA established {ESP=>0xc0f59ecd <0x053b6a6a NATOA=0.0.0.0 DPD}
    2022:06:07-17:53:53 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_12"[14] XGS-FW-WAN-IP:4500 #482336: sent QI2, IPsec SA established {ESP=>0xc9aaf74f <0x03b6e940 NATOA=0.0.0.0 DPD}
    2022:06:07-17:53:54 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_63"[14] XGS-FW-WAN-IP:4500 #482338: initiating Quick Mode PUBKEY+ENCRYPT+TUNNEL+PFS to replace #481548 {using isakmp#482312}
    2022:06:07-17:53:54 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_42"[14] XGS-FW-WAN-IP:4500 #482339: initiating Quick Mode PUBKEY+ENCRYPT+TUNNEL+PFS to replace #481547 {using isakmp#482312}
    2022:06:07-17:53:55 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_63"[14] XGS-FW-WAN-IP:4500 #482338: sent QI2, IPsec SA established {ESP=>0xca481a6f <0xcb151e3d NATOA=0.0.0.0 DPD}
    2022:06:07-17:53:55 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_49"[14] XGS-FW-WAN-IP:4500 #482341: initiating Quick Mode PUBKEY+ENCRYPT+TUNNEL+PFS to replace #481552 {using isakmp#482312}
    2022:06:07-17:53:55 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_56"[14] XGS-FW-WAN-IP:4500 #482342: initiating Quick Mode PUBKEY+ENCRYPT+TUNNEL+PFS to replace #481549 {using isakmp#482312}
    2022:06:07-17:53:55 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_42"[14] XGS-FW-WAN-IP:4500 #482339: sent QI2, IPsec SA established {ESP=>0xc39821b6 <0x2d6cef46 NATOA=0.0.0.0 DPD}
    2022:06:07-17:53:55 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_49"[14] XGS-FW-WAN-IP:4500 #482341: sent QI2, IPsec SA established {ESP=>0xcf8077bb <0xe688647e NATOA=0.0.0.0 DPD}
    2022:06:07-17:53:55 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_56"[14] XGS-FW-WAN-IP:4500 #482342: sent QI2, IPsec SA established {ESP=>0xc9b73869 <0x6d9d4268 NATOA=0.0.0.0 DPD}
    2022:06:07-17:53:56 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_35"[14] XGS-FW-WAN-IP:4500 #482343: initiating Quick Mode PUBKEY+ENCRYPT+TUNNEL+PFS to replace #481553 {using isakmp#482312}
    2022:06:07-17:53:56 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_35"[14] XGS-FW-WAN-IP:4500 #482343: sent QI2, IPsec SA established {ESP=>0xc253293b <0x55d29f94 NATOA=0.0.0.0 DPD}
    2022:06:07-17:53:57 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_21"[14] XGS-FW-WAN-IP:4500 #482344: initiating Quick Mode PUBKEY+ENCRYPT+TUNNEL+PFS to replace #481556 {using isakmp#482312}
    2022:06:07-17:53:57 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_28"[14] XGS-FW-WAN-IP:4500 #482345: initiating Quick Mode PUBKEY+ENCRYPT+TUNNEL+PFS to replace #481554 {using isakmp#482312}
    2022:06:07-17:53:57 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_21"[14] XGS-FW-WAN-IP:4500 #482344: sent QI2, IPsec SA established {ESP=>0xca775dfd <0x2d499b21 NATOA=0.0.0.0 DPD}
    2022:06:07-17:53:57 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_28"[14] XGS-FW-WAN-IP:4500 #482345: sent QI2, IPsec SA established {ESP=>0xcef6c258 <0x65023e22 NATOA=0.0.0.0 DPD}
    2022:06:07-17:53:58 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_7"[14] XGS-FW-WAN-IP:4500 #482346: initiating Quick Mode PUBKEY+ENCRYPT+TUNNEL+PFS to replace #481558 {using isakmp#482312}
    2022:06:07-17:53:58 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_14"[14] XGS-FW-WAN-IP:4500 #482347: initiating Quick Mode PUBKEY+ENCRYPT+TUNNEL+PFS to replace #481557 {using isakmp#482312}
    2022:06:07-17:53:58 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_7"[14] XGS-FW-WAN-IP:4500 #482346: sent QI2, IPsec SA established {ESP=>0xc575692c <0xe9ebf6ea NATOA=0.0.0.0 DPD}
    2022:06:07-17:53:58 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_14"[14] XGS-FW-WAN-IP:4500 #482347: sent QI2, IPsec SA established {ESP=>0xcb52ea6c <0xee9eb67f NATOA=0.0.0.0 DPD}
    2022:06:07-17:53:59 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_44"[14] XGS-FW-WAN-IP:4500 #482348: initiating Quick Mode PUBKEY+ENCRYPT+TUNNEL+PFS to replace #481560 {using isakmp#482312}
    2022:06:07-17:53:59 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_0"[14] XGS-FW-WAN-IP:4500 #482349: initiating Quick Mode PUBKEY+ENCRYPT+TUNNEL+PFS to replace #481559 {using isakmp#482312}
    2022:06:07-17:53:59 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_44"[14] XGS-FW-WAN-IP:4500 #482348: sent QI2, IPsec SA established {ESP=>0xcfdb80e2 <0x59b55ce3 NATOA=0.0.0.0 DPD}
    2022:06:07-17:53:59 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_0"[14] XGS-FW-WAN-IP:4500 #482349: sent QI2, IPsec SA established {ESP=>0xcb504687 <0x85fdd9c7 NATOA=0.0.0.0 DPD}
    2022:06:07-17:54:00 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_65"[14] XGS-FW-WAN-IP:4500 #482351: initiating Quick Mode PUBKEY+ENCRYPT+TUNNEL+PFS to replace #481561 {using isakmp#482312}
    2022:06:07-17:54:00 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_9"[15] XGS-FW-WAN-IP:4500 #482312: ignoring informational payload, type PAYLOAD_MALFORMED
    2022:06:07-17:54:00 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_65"[14] XGS-FW-WAN-IP:4500 #482351: sent QI2, IPsec SA established {ESP=>0xcb05eaa7 <0x251ffe7c NATOA=0.0.0.0 DPD}
    2022:06:07-17:54:01 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_51"[14] XGS-FW-WAN-IP:4500 #482352: initiating Quick Mode PUBKEY+ENCRYPT+TUNNEL+PFS to replace #481564 {using isakmp#482312}
    2022:06:07-17:54:02 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_58"[14] XGS-FW-WAN-IP:4500 #482353: initiating Quick Mode PUBKEY+ENCRYPT+TUNNEL+PFS to replace #481562 {using isakmp#482312}
    2022:06:07-17:54:02 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_30"[14] XGS-FW-WAN-IP:4500 #482354: initiating Quick Mode PUBKEY+ENCRYPT+TUNNEL+PFS to replace #481567 {using isakmp#482312}
    2022:06:07-17:54:02 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_37"[14] XGS-FW-WAN-IP:4500 #482355: initiating Quick Mode PUBKEY+ENCRYPT+TUNNEL+PFS to replace #481565 {using isakmp#482312}
    2022:06:07-17:54:02 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_51"[14] XGS-FW-WAN-IP:4500 #482352: sent QI2, IPsec SA established {ESP=>0xc73f24b6 <0x9abce431 NATOA=0.0.0.0 DPD}
    2022:06:07-17:54:02 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_58"[14] XGS-FW-WAN-IP:4500 #482353: sent QI2, IPsec SA established {ESP=>0xc0fe4351 <0x27563952 NATOA=0.0.0.0 DPD}
    2022:06:07-17:54:02 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_30"[14] XGS-FW-WAN-IP:4500 #482354: sent QI2, IPsec SA established {ESP=>0xc65c5d67 <0x36854383 NATOA=0.0.0.0 DPD}
    2022:06:07-17:54:02 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_37"[14] XGS-FW-WAN-IP:4500 #482355: sent QI2, IPsec SA established {ESP=>0xc6b44fc1 <0x7e1c4575 NATOA=0.0.0.0 DPD}
    2022:06:07-17:54:03 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_16"[14] XGS-FW-WAN-IP:4500 #482356: initiating Quick Mode PUBKEY+ENCRYPT+TUNNEL+PFS to replace #481569 {using isakmp#482312}
    2022:06:07-17:54:03 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_23"[14] XGS-FW-WAN-IP:4500 #482357: initiating Quick Mode PUBKEY+ENCRYPT+TUNNEL+PFS to replace #481568 {using isakmp#482312}
    2022:06:07-17:54:03 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_16"[14] XGS-FW-WAN-IP:4500 #482356: sent QI2, IPsec SA established {ESP=>0xc051b170 <0x30d12296 NATOA=0.0.0.0 DPD}
    2022:06:07-17:54:03 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_23"[14] XGS-FW-WAN-IP:4500 #482357: sent QI2, IPsec SA established {ESP=>0xca3f8862 <0x6ca83cc6 NATOA=0.0.0.0 DPD}
    2022:06:07-17:54:04 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_9"[15] XGS-FW-WAN-IP:4500 #482358: initiating Quick Mode PUBKEY+ENCRYPT+TUNNEL+PFS to replace #481570 {using isakmp#482312}
    2022:06:07-17:54:05 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_9"[15] XGS-FW-WAN-IP:4500 #482358: sent QI2, IPsec SA established {ESP=>0xc221a0cb <0xda7cf3dd NATOA=0.0.0.0 DPD}
    2022:06:07-17:54:05 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_46"[14] XGS-FW-WAN-IP:4500 #482360: initiating Quick Mode PUBKEY+ENCRYPT+TUNNEL+PFS to replace #481573 {using isakmp#482312}
    2022:06:07-17:54:05 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_2"[15] XGS-FW-WAN-IP:4500 #482362: initiating Quick Mode PUBKEY+ENCRYPT+TUNNEL+PFS to replace #481571 {using isakmp#482312}
    2022:06:07-17:54:05 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_46"[14] XGS-FW-WAN-IP:4500 #482360: sent QI2, IPsec SA established {ESP=>0xc1d3b8e6 <0xa60427ec NATOA=0.0.0.0 DPD}
    2022:06:07-17:54:05 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_2"[15] XGS-FW-WAN-IP:4500 #482362: sent QI2, IPsec SA established {ESP=>0xcdabadd1 <0xdd6dc123 NATOA=0.0.0.0 DPD}
    2022:06:07-17:54:06 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_67"[14] XGS-FW-WAN-IP:4500 #482363: initiating Quick Mode PUBKEY+ENCRYPT+TUNNEL+PFS to replace #481576 {using isakmp#482312}
    2022:06:07-17:54:07 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_67"[14] XGS-FW-WAN-IP:4500 #482363: sent QI2, IPsec SA established {ESP=>0xcd8dc1f9 <0xe0097ef8 NATOA=0.0.0.0 DPD}
    2022:06:07-17:54:07 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_60"[14] XGS-FW-WAN-IP:4500 #482364: initiating Quick Mode PUBKEY+ENCRYPT+TUNNEL+PFS to replace #481577 {using isakmp#482312}
    2022:06:07-17:54:07 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_60"[14] XGS-FW-WAN-IP:4500 #482364: sent QI2, IPsec SA established {ESP=>0xc5200245 <0x152f475f NATOA=0.0.0.0 DPD}
    2022:06:07-17:54:08 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_39"[14] XGS-FW-WAN-IP:4500 #482365: initiating Quick Mode PUBKEY+ENCRYPT+TUNNEL+PFS to replace #481579 {using isakmp#482312}
    2022:06:07-17:54:08 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_53"[14] XGS-FW-WAN-IP:4500 #482366: initiating Quick Mode PUBKEY+ENCRYPT+TUNNEL+PFS to replace #481578 {using isakmp#482312}
    2022:06:07-17:54:08 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_39"[14] XGS-FW-WAN-IP:4500 #482365: sent QI2, IPsec SA established {ESP=>0xc0aed54f <0x174b1a93 NATOA=0.0.0.0 DPD}
    2022:06:07-17:54:08 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_53"[14] XGS-FW-WAN-IP:4500 #482366: sent QI2, IPsec SA established {ESP=>0xc0933051 <0x79a11976 NATOA=0.0.0.0 DPD}
    2022:06:07-17:54:09 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_25"[14] XGS-FW-WAN-IP:4500 #482368: initiating Quick Mode PUBKEY+ENCRYPT+TUNNEL+PFS to replace #481581 {using isakmp#482312}
    2022:06:07-17:54:09 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_32"[14] XGS-FW-WAN-IP:4500 #482369: initiating Quick Mode PUBKEY+ENCRYPT+TUNNEL+PFS to replace #481580 {using isakmp#482312}
    2022:06:07-17:54:09 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_25"[14] XGS-FW-WAN-IP:4500 #482368: sent QI2, IPsec SA established {ESP=>0xc060e64b <0xbc16b1ba NATOA=0.0.0.0 DPD}
    2022:06:07-17:54:09 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_32"[14] XGS-FW-WAN-IP:4500 #482369: sent QI2, IPsec SA established {ESP=>0xc93a6ee1 <0x1a5a4e4c NATOA=0.0.0.0 DPD}
    2022:06:07-17:54:10 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_18"[14] XGS-FW-WAN-IP:4500 #482370: initiating Quick Mode PUBKEY+ENCRYPT+TUNNEL+PFS to replace #481582 {using isakmp#482312}
    2022:06:07-17:54:10 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_18"[14] XGS-FW-WAN-IP:4500 #482370: sent QI2, IPsec SA established {ESP=>0xc4ace6fa <0xa42fdbee NATOA=0.0.0.0 DPD}
    2022:06:07-17:54:11 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_4"[14] XGS-FW-WAN-IP:4500 #482372: initiating Quick Mode PUBKEY+ENCRYPT+TUNNEL+PFS to replace #481584 {using isakmp#482312}
    2022:06:07-17:54:11 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_11"[14] XGS-FW-WAN-IP:4500 #482373: initiating Quick Mode PUBKEY+ENCRYPT+TUNNEL+PFS to replace #481583 {using isakmp#482312}
    2022:06:07-17:54:11 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_4"[14] XGS-FW-WAN-IP:4500 #482372: sent QI2, IPsec SA established {ESP=>0xcc2139c8 <0xe0ad226e NATOA=0.0.0.0 DPD}
    2022:06:07-17:54:11 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_11"[14] XGS-FW-WAN-IP:4500 #482373: sent QI2, IPsec SA established {ESP=>0xc73c726f <0xc19b1c87 NATOA=0.0.0.0 DPD}
    2022:06:07-17:54:12 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_69"[14] XGS-FW-WAN-IP:4500 #482374: initiating Quick Mode PUBKEY+ENCRYPT+TUNNEL+PFS to replace #481586 {using isakmp#482312}
    2022:06:07-17:54:12 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_48"[14] XGS-FW-WAN-IP:4500 #482375: initiating Quick Mode PUBKEY+ENCRYPT+TUNNEL+PFS to replace #481585 {using isakmp#482312}
    2022:06:07-17:54:12 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_69"[14] XGS-FW-WAN-IP:4500 #482374: sent QI2, IPsec SA established {ESP=>0xce723f5e <0x315a55f8 NATOA=0.0.0.0 DPD}
    2022:06:07-17:54:12 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_48"[14] XGS-FW-WAN-IP:4500 #482375: sent QI2, IPsec SA established {ESP=>0xcc362afe <0xb4a87e81 NATOA=0.0.0.0 DPD}
    2022:06:07-17:54:13 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_55"[14] XGS-FW-WAN-IP:4500 #482377: initiating Quick Mode PUBKEY+ENCRYPT+TUNNEL+PFS to replace #481588 {using isakmp#482312}
    2022:06:07-17:54:13 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_62"[14] XGS-FW-WAN-IP:4500 #482378: initiating Quick Mode PUBKEY+ENCRYPT+TUNNEL+PFS to replace #481587 {using isakmp#482312}
    2022:06:07-17:54:14 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_55"[14] XGS-FW-WAN-IP:4500 #482377: sent QI2, IPsec SA established {ESP=>0xc141bb94 <0xc9c7f7c9 NATOA=0.0.0.0 DPD}
    2022:06:07-17:54:14 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_34"[14] XGS-FW-WAN-IP:4500 #482379: initiating Quick Mode PUBKEY+ENCRYPT+TUNNEL+PFS to replace #481591 {using isakmp#482312}
    2022:06:07-17:54:14 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_41"[14] XGS-FW-WAN-IP:4500 #482380: initiating Quick Mode PUBKEY+ENCRYPT+TUNNEL+PFS to replace #481589 {using isakmp#482312}
    2022:06:07-17:54:14 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_62"[14] XGS-FW-WAN-IP:4500 #482378: sent QI2, IPsec SA established {ESP=>0xcfda634e <0xedc20c62 NATOA=0.0.0.0 DPD}
    2022:06:07-17:54:14 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_34"[14] XGS-FW-WAN-IP:4500 #482379: sent QI2, IPsec SA established {ESP=>0xc8380cfc <0x2cca8054 NATOA=0.0.0.0 DPD}
    2022:06:07-17:54:14 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_41"[14] XGS-FW-WAN-IP:4500 #482380: sent QI2, IPsec SA established {ESP=>0xcb227d0c <0xae782009 NATOA=0.0.0.0 DPD}
    2022:06:07-17:54:15 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_20"[14] XGS-FW-WAN-IP:4500 #482381: initiating Quick Mode PUBKEY+ENCRYPT+TUNNEL+PFS to replace #481593 {using isakmp#482312}
    2022:06:07-17:54:15 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_27"[14] XGS-FW-WAN-IP:4500 #482382: initiating Quick Mode PUBKEY+ENCRYPT+TUNNEL+PFS to replace #481592 {using isakmp#482312}
    2022:06:07-17:54:15 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_20"[14] XGS-FW-WAN-IP:4500 #482381: sent QI2, IPsec SA established {ESP=>0xc7dbe4fa <0xde4238de NATOA=0.0.0.0 DPD}
    2022:06:07-17:54:15 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_27"[14] XGS-FW-WAN-IP:4500 #482382: sent QI2, IPsec SA established {ESP=>0xc2aff778 <0xcf9f0cfa NATOA=0.0.0.0 DPD}
    2022:06:07-17:54:16 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_13"[14] XGS-FW-WAN-IP:4500 #482383: initiating Quick Mode PUBKEY+ENCRYPT+TUNNEL+PFS to replace #481594 {using isakmp#482312}
    2022:06:07-17:54:16 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_13"[14] XGS-FW-WAN-IP:4500 #482383: sent QI2, IPsec SA established {ESP=>0xc7c555c1 <0xfcb022b6 NATOA=0.0.0.0 DPD}
    2022:06:07-17:54:17 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_45"[13] XGS-FW-WAN-IP:4500 #482384: initiating Quick Mode PUBKEY+ENCRYPT+TUNNEL+PFS to replace #481597 {using isakmp#482312}
    2022:06:07-17:54:17 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_6"[13] XGS-FW-WAN-IP:4500 #482385: initiating Quick Mode PUBKEY+ENCRYPT+TUNNEL+PFS to replace #481596 {using isakmp#482312}
    2022:06:07-17:54:17 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_45"[13] XGS-FW-WAN-IP:4500 #482384: sent QI2, IPsec SA established {ESP=>0xc2efa505 <0x204770bb NATOA=0.0.0.0 DPD}
    2022:06:07-17:54:17 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_6"[13] XGS-FW-WAN-IP:4500 #482385: sent QI2, IPsec SA established {ESP=>0xcb63bf45 <0xe65f0c3f NATOA=0.0.0.0 DPD}
    2022:06:07-17:54:18 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_59"[14] XGS-FW-WAN-IP:4500 #482387: initiating Quick Mode PUBKEY+ENCRYPT+TUNNEL+PFS to replace #481600 {using isakmp#482312}
    2022:06:07-17:54:18 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_66"[13] XGS-FW-WAN-IP:4500 #482388: initiating Quick Mode PUBKEY+ENCRYPT+TUNNEL+PFS to replace #481598 {using isakmp#482312}
    2022:06:07-17:54:18 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_59"[14] XGS-FW-WAN-IP:4500 #482387: sent QI2, IPsec SA established {ESP=>0xcec64be6 <0x68bcfb4b NATOA=0.0.0.0 DPD}
    2022:06:07-17:54:18 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_66"[13] XGS-FW-WAN-IP:4500 #482388: sent QI2, IPsec SA established {ESP=>0xcc275278 <0x8f40596e NATOA=0.0.0.0 DPD}
    2022:06:07-17:54:19 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_38"[14] XGS-FW-WAN-IP:4500 #482389: initiating Quick Mode PUBKEY+ENCRYPT+TUNNEL+PFS to replace #481603 {using isakmp#482312}
    2022:06:07-17:54:19 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_52"[14] XGS-FW-WAN-IP:4500 #482390: initiating Quick Mode PUBKEY+ENCRYPT+TUNNEL+PFS to replace #481602 {using isakmp#482312}
    2022:06:07-17:54:19 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_38"[14] XGS-FW-WAN-IP:4500 #482389: sent QI2, IPsec SA established {ESP=>0xc71d3ce5 <0xedd5c522 NATOA=0.0.0.0 DPD}
    2022:06:07-17:54:19 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_52"[14] XGS-FW-WAN-IP:4500 #482390: sent QI2, IPsec SA established {ESP=>0xc2df02e7 <0xb3472101 NATOA=0.0.0.0 DPD}
    2022:06:07-17:54:20 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_31"[14] XGS-FW-WAN-IP:4500 #482391: initiating Quick Mode PUBKEY+ENCRYPT+TUNNEL+PFS to replace #481604 {using isakmp#482312}
    2022:06:07-17:54:20 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_9"[15] XGS-FW-WAN-IP:4500 #482312: ignoring informational payload, type PAYLOAD_MALFORMED
    2022:06:07-17:54:20 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_31"[14] XGS-FW-WAN-IP:4500 #482391: sent QI2, IPsec SA established {ESP=>0xc43b9933 <0x82749c74 NATOA=0.0.0.0 DPD}
    2022:06:07-17:54:21 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_17"[14] XGS-FW-WAN-IP:4500 #482392: initiating Quick Mode PUBKEY+ENCRYPT+TUNNEL+PFS to replace #481607 {using isakmp#482312}
    2022:06:07-17:54:21 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_24"[14] XGS-FW-WAN-IP:4500 #482393: initiating Quick Mode PUBKEY+ENCRYPT+TUNNEL+PFS to replace #481606 {using isakmp#482312}
    2022:06:07-17:54:21 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_17"[14] XGS-FW-WAN-IP:4500 #482392: sent QI2, IPsec SA established {ESP=>0xcd799346 <0x666f460a NATOA=0.0.0.0 DPD}
    2022:06:07-17:54:21 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_24"[14] XGS-FW-WAN-IP:4500 #482393: sent QI2, IPsec SA established {ESP=>0xc0181519 <0xdbd42d7b NATOA=0.0.0.0 DPD}
    2022:06:07-17:54:22 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_3"[13] XGS-FW-WAN-IP:4500 #482394: initiating Quick Mode PUBKEY+ENCRYPT+TUNNEL+PFS to replace #481609 {using isakmp#482312}
    2022:06:07-17:54:23 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_10"[14] XGS-FW-WAN-IP:4500 #482395: initiating Quick Mode PUBKEY+ENCRYPT+TUNNEL+PFS to replace #481608 {using isakmp#482312}
    2022:06:07-17:54:23 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_3"[13] XGS-FW-WAN-IP:4500 #482394: sent QI2, IPsec SA established {ESP=>0xc968fba4 <0x9d15c0f8 NATOA=0.0.0.0 DPD}
    2022:06:07-17:54:23 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_10"[14] XGS-FW-WAN-IP:4500 #482395: sent QI2, IPsec SA established {ESP=>0xcb1a5aed <0xf0b2e712 NATOA=0.0.0.0 DPD}
    2022:06:07-17:55:00 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_68"[14] XGS-FW-WAN-IP:4500 #482325: max number of retransmissions (2) reached STATE_QUICK_I1
    2022:06:07-17:55:00 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_68"[14] XGS-FW-WAN-IP:4500 #482325: starting keying attempt 2 of an unlimited number
    2022:06:07-17:55:00 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_68"[14] XGS-FW-WAN-IP:4500 #482408: initiating Quick Mode PUBKEY+ENCRYPT+TUNNEL+PFS to replace #482325 {using isakmp#482312}
    2022:06:07-17:55:00 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_68"[14] XGS-FW-WAN-IP:4500 #482408: sent QI2, IPsec SA established {ESP=>0xc359883b <0xe301a371 NATOA=0.0.0.0 DPD}
    2022:06:07-17:58:15 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_9"[15] XGS-FW-WAN-IP:4500 #482312: received Delete SA(0xcace4bf4) payload: deleting IPSEC State #481525
    2022:06:07-17:58:16 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_9"[15] XGS-FW-WAN-IP:4500 #482312: received Delete SA(0xca516ac0) payload: deleting IPSEC State #481527
    2022:06:07-17:58:17 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_9"[15] XGS-FW-WAN-IP:4500 #482312: received Delete SA(0xce5aeeb6) payload: deleting IPSEC State #481532
    2022:06:07-17:58:19 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_9"[15] XGS-FW-WAN-IP:4500 #482312: received Delete SA(0xc4935bf1) payload: deleting IPSEC State #481537
    2022:06:07-17:58:21 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_9"[15] XGS-FW-WAN-IP:4500 #482312: received Delete SA(0xcdb0a883) payload: deleting IPSEC State #481541
    2022:06:07-17:58:22 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_9"[15] XGS-FW-WAN-IP:4500 #482312: ignoring Delete SA payload: PROTO_IPSEC_ESP SA(0xc78eb4b6) not found (maybe expired)
    2022:06:07-17:58:26 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_9"[15] XGS-FW-WAN-IP:4500 #482312: received Delete SA(0xc5d15135) payload: deleting IPSEC State #481553
    2022:06:07-17:58:27 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_9"[15] XGS-FW-WAN-IP:4500 #482312: received Delete SA(0xc8826726) payload: deleting IPSEC State #481554
    2022:06:07-17:58:30 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_9"[15] XGS-FW-WAN-IP:4500 #482312: received Delete SA(0xc0d3dd3b) payload: deleting IPSEC State #481561
    2022:06:07-17:58:31 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_9"[15] XGS-FW-WAN-IP:4500 #482312: received Delete SA(0xc451f6c5) payload: deleting IPSEC State #481562
    2022:06:07-17:58:31 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_9"[15] XGS-FW-WAN-IP:4500 #482312: received Delete SA(0xc921667d) payload: deleting IPSEC State #481564
    2022:06:07-17:58:32 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_9"[15] XGS-FW-WAN-IP:4500 #482312: received Delete SA(0xcee14d16) payload: deleting IPSEC State #481565
    2022:06:07-17:58:33 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_9"[15] XGS-FW-WAN-IP:4500 #482312: received Delete SA(0xc8e5fb62) payload: deleting IPSEC State #481568
    2022:06:07-17:58:35 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_9"[15] XGS-FW-WAN-IP:4500 #482312: received Delete SA(0xc054c08a) payload: deleting IPSEC State #481571
    2022:06:07-17:58:38 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_9"[15] XGS-FW-WAN-IP:4500 #482312: received Delete SA(0xc5d6f79a) payload: deleting IPSEC State #481578
    2022:06:07-17:58:39 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_9"[15] XGS-FW-WAN-IP:4500 #482312: received Delete SA(0xc06f2d84) payload: deleting IPSEC State #481580
    2022:06:07-17:58:41 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_9"[15] XGS-FW-WAN-IP:4500 #482312: received Delete SA(0xcc814dde) payload: deleting IPSEC State #481583
    2022:06:07-17:58:46 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_9"[15] XGS-FW-WAN-IP:4500 #482312: received Delete SA(0xcf6d638c) payload: deleting IPSEC State #481594
    2022:06:07-17:58:46 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_9"[15] XGS-FW-WAN-IP:4500 #482312: received Delete SA(0xc473e9fb) payload: deleting IPSEC State #481596
    2022:06:07-17:58:47 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_9"[15] XGS-FW-WAN-IP:4500 #482312: received Delete SA(0xc7e5fc32) payload: deleting IPSEC State #481597
    2022:06:07-17:58:48 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_9"[15] XGS-FW-WAN-IP:4500 #482312: received Delete SA(0xc2c7455d) payload: deleting IPSEC State #481598
    2022:06:07-17:58:50 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_9"[15] XGS-FW-WAN-IP:4500 #482312: received Delete SA(0xcfbb807f) payload: deleting IPSEC State #481606
    2022:06:07-17:58:51 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_9"[15] XGS-FW-WAN-IP:4500 #482312: received Delete SA(0xc72f412c) payload: deleting IPSEC State #481608
    2022:06:07-17:58:52 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_9"[15] XGS-FW-WAN-IP:4500 #482312: received Delete SA(0xc569e193) payload: deleting IPSEC State #481609
    2022:06:07-18:35:54 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_64"[14] XGS-FW-WAN-IP:4500 #482839: initiating Quick Mode PUBKEY+ENCRYPT+TUNNEL+PFS to replace #482310 {using isakmp#482312}
    2022:06:07-18:35:54 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_64"[14] XGS-FW-WAN-IP:4500 #482839: sent QI2, IPsec SA established {ESP=>0xce23ec4f <0xa33af65c NATOA=0.0.0.0 DPD}
    2022:06:07-18:35:58 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_57"[14] XGS-FW-WAN-IP:4500 #482841: initiating Quick Mode PUBKEY+ENCRYPT+TUNNEL+PFS to replace #482313 {using isakmp#482312}
    2022:06:07-18:35:58 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_57"[14] XGS-FW-WAN-IP:4500 #482841: sent QI2, IPsec SA established {ESP=>0xc3299392 <0xa1989492 NATOA=0.0.0.0 DPD}
    2022:06:07-18:36:19 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_46"[14] XGS-FW-WAN-IP:4500 #482846: initiating Quick Mode PUBKEY+ENCRYPT+TUNNEL+PFS to replace #482360 {using isakmp#482312}
    2022:06:07-18:36:19 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_46"[14] XGS-FW-WAN-IP:4500 #482846: sent QI2, IPsec SA established {ESP=>0xc8245b6d <0xdf30a9ff NATOA=0.0.0.0 DPD}
    2022:06:07-18:36:27 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_22"[14] XGS-FW-WAN-IP:4500 #482847: initiating Quick Mode PUBKEY+ENCRYPT+TUNNEL+PFS to replace #482317 {using isakmp#482312}
    2022:06:07-18:36:27 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_22"[14] XGS-FW-WAN-IP:4500 #482847: sent QI2, IPsec SA established {ESP=>0xc5ee9e12 <0x45bb222c NATOA=0.0.0.0 DPD}
    2022:06:07-18:36:31 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_31"[14] XGS-FW-WAN-IP:4500 #482849: initiating Quick Mode PUBKEY+ENCRYPT+TUNNEL+PFS to replace #482391 {using isakmp#482312}
    2022:06:07-18:36:31 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_31"[14] XGS-FW-WAN-IP:4500 #482849: sent QI2, IPsec SA established {ESP=>0xca9c41f1 <0x28c03b09 NATOA=0.0.0.0 DPD}
    2022:06:07-18:36:32 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_27"[14] XGS-FW-WAN-IP:4500 #482850: initiating Quick Mode PUBKEY+ENCRYPT+TUNNEL+PFS to replace #482382 {using isakmp#482312}
    2022:06:07-18:36:33 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_27"[14] XGS-FW-WAN-IP:4500 #482850: sent QI2, IPsec SA established {ESP=>0xc0f41780 <0x4342c73e NATOA=0.0.0.0 DPD}
    2022:06:07-18:36:33 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_11"[14] XGS-FW-WAN-IP:4500 #482851: initiating Quick Mode PUBKEY+ENCRYPT+TUNNEL+PFS to replace #482373 {using isakmp#482312}
    2022:06:07-18:36:33 fw-320-2 pluto[8792]: id="2204" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN down" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:07-18:36:33 fw-320-2 pluto[8792]: id="2203" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN up" variant="ipsec" connection="REF_IpsSitTunnelxgs2sg" address="SG-FW-WAN-IP" local_net="a-local-net-IP" remote_net="a-remote-net-IP"
    2022:06:07-18:36:33 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_11"[14] XGS-FW-WAN-IP:4500 #482851: sent QI2, IPsec SA established {ESP=>0xc2f1fa40 <0xd67bf9c9 NATOA=0.0.0.0 DPD}
    2022:06:07-18:36:41 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_15"[14] XGS-FW-WAN-IP:4500 #482853: initiating Quick Mode PUBKEY+ENCRYPT+TUNNEL+PFS to replace #482321 {using isakmp#482312}
    2022:06:07-18:36:41 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_15"[14] XGS-FW-WAN-IP:4500 #482853: sent QI2, IPsec SA established {ESP=>0xcb450f82 <0xb13152a4 NATOA=0.0.0.0 DPD}
    2022:06:07-18:36:46 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_7"[14] XGS-FW-WAN-IP:4500 #482858: initiating Quick Mode PUBKEY+ENCRYPT+TUNNEL+PFS to replace #482346 {using isakmp#482312}
    2022:06:07-18:36:46 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_7"[14] XGS-FW-WAN-IP:4500 #482858: sent QI2, IPsec SA established {ESP=>0xc314d261 <0x1a5fab59 NATOA=0.0.0.0 DPD}
    2022:06:07-18:36:49 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_41"[14] XGS-FW-WAN-IP:4500 #482860: initiating Quick Mode PUBKEY+ENCRYPT+TUNNEL+PFS to replace #482380 {using isakmp#482312}
    2022:06:07-18:36:49 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_41"[14] XGS-FW-WAN-IP:4500 #482860: sent QI2, IPsec SA established {ESP=>0xc99f05b0 <0x104f1127 NATOA=0.0.0.0 DPD}
    2022:06:07-18:36:53 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_65"[14] XGS-FW-WAN-IP:4500 #482861: initiating Quick Mode PUBKEY+ENCRYPT+TUNNEL+PFS to replace #482351 {using isakmp#482312}
    2022:06:07-18:36:53 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_65"[14] XGS-FW-WAN-IP:4500 #482861: sent QI2, IPsec SA established {ESP=>0xc555696a <0x16955182 NATOA=0.0.0.0 DPD}
    2022:06:07-18:36:58 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_23"[14] XGS-FW-WAN-IP:4500 #482862: initiating Quick Mode PUBKEY+ENCRYPT+TUNNEL+PFS to replace #482357 {using isakmp#482312}
    2022:06:07-18:36:58 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_23"[14] XGS-FW-WAN-IP:4500 #482862: sent QI2, IPsec SA established {ESP=>0xc1af7163 <0x1bfd7cbf NATOA=0.0.0.0 DPD}
    2022:06:07-18:37:16 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_35"[14] XGS-FW-WAN-IP:4500 #482868: initiating Quick Mode PUBKEY+ENCRYPT+TUNNEL+PFS to replace #482343 {using isakmp#482312}
    2022:06:07-18:37:16 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_35"[14] XGS-FW-WAN-IP:4500 #482868: sent QI2, IPsec SA established {ESP=>0xc7ffa1b7 <0xd899eb69 NATOA=0.0.0.0 DPD}
    2022:06:07-18:37:25 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_66"[13] XGS-FW-WAN-IP:4500 #482870: initiating Quick Mode PUBKEY+ENCRYPT+TUNNEL+PFS to replace #482388 {using isakmp#482312}
    2022:06:07-18:37:25 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_66"[13] XGS-FW-WAN-IP:4500 #482870: sent QI2, IPsec SA established {ESP=>0xc621cc60 <0xe0c57d13 NATOA=0.0.0.0 DPD}
    2022:06:07-18:37:37 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_4"[14] XGS-FW-WAN-IP:4500 #482873: initiating Quick Mode PUBKEY+ENCRYPT+TUNNEL+PFS to replace #482372 {using isakmp#482312}
    2022:06:07-18:37:37 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_4"[14] XGS-FW-WAN-IP:4500 #482873: sent QI2, IPsec SA established {ESP=>0xc4bf934a <0xf9d3eec6 NATOA=0.0.0.0 DPD}
    2022:06:07-18:37:39 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_48"[14] XGS-FW-WAN-IP:4500 #482875: initiating Quick Mode PUBKEY+ENCRYPT+TUNNEL+PFS to replace #482375 {using isakmp#482312}
    2022:06:07-18:37:40 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_48"[14] XGS-FW-WAN-IP:4500 #482875: sent QI2, IPsec SA established {ESP=>0xc0d4e553 <0xee940052 NATOA=0.0.0.0 DPD}
    2022:06:07-18:37:46 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_62"[14] XGS-FW-WAN-IP:4500 #482876: initiating Quick Mode PUBKEY+ENCRYPT+TUNNEL+PFS to replace #482378 {using isakmp#482312}
    2022:06:07-18:37:46 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_62"[14] XGS-FW-WAN-IP:4500 #482876: sent QI2, IPsec SA established {ESP=>0xcabd8cf3 <0x3dbaee52 NATOA=0.0.0.0 DPD}
    2022:06:07-18:37:50 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_68"[14] XGS-FW-WAN-IP:4500 #482877: initiating Quick Mode PUBKEY+ENCRYPT+TUNNEL+PFS to replace #482408 {using isakmp#482312}
    2022:06:07-18:37:50 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_68"[14] XGS-FW-WAN-IP:4500 #482877: sent QI2, IPsec SA established {ESP=>0xc8db0137 <0x2bcf92f5 NATOA=0.0.0.0 DPD}
    2022:06:07-18:37:51 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_58"[14] XGS-FW-WAN-IP:4500 #482878: initiating Quick Mode PUBKEY+ENCRYPT+TUNNEL+PFS to replace #482353 {using isakmp#482312}
    2022:06:07-18:37:51 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_58"[14] XGS-FW-WAN-IP:4500 #482878: sent QI2, IPsec SA established {ESP=>0xc6e11c26 <0x80b234cd NATOA=0.0.0.0 DPD}
    2022:06:07-18:37:54 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_40"[14] XGS-FW-WAN-IP:4500 #482882: initiating Quick Mode PUBKEY+ENCRYPT+TUNNEL+PFS to replace #482328 {using isakmp#482312}
    2022:06:07-18:37:55 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_40"[14] XGS-FW-WAN-IP:4500 #482882: sent QI2, IPsec SA established {ESP=>0xc5095b33 <0xc635f342 NATOA=0.0.0.0 DPD}
    2022:06:07-18:37:58 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_28"[14] XGS-FW-WAN-IP:4500 #482885: initiating Quick Mode PUBKEY+ENCRYPT+TUNNEL+PFS to replace #482345 {using isakmp#482312}
    2022:06:07-18:37:58 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_28"[14] XGS-FW-WAN-IP:4500 #482885: sent QI2, IPsec SA established {ESP=>0xc6d6fbdb <0x4cced6cd NATOA=0.0.0.0 DPD}
    2022:06:07-18:38:03 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_34"[14] XGS-FW-WAN-IP:4500 #482886: initiating Quick Mode PUBKEY+ENCRYPT+TUNNEL+PFS to replace #482379 {using isakmp#482312}
    2022:06:07-18:38:04 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_34"[14] XGS-FW-WAN-IP:4500 #482886: sent QI2, IPsec SA established {ESP=>0xc4afa1d9 <0xb1e0a0e4 NATOA=0.0.0.0 DPD}
    2022:06:07-18:38:08 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_50"[14] XGS-FW-WAN-IP:4500 #482887: initiating Quick Mode PUBKEY+ENCRYPT+TUNNEL+PFS to replace #482316 {using isakmp#482312}
    2022:06:07-18:38:08 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_50"[14] XGS-FW-WAN-IP:4500 #482887: sent QI2, IPsec SA established {ESP=>0xc136764f <0x43f6a3d6 NATOA=0.0.0.0 DPD}
    2022:06:07-18:38:12 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_36"[14] XGS-FW-WAN-IP:4500 #482889: initiating Quick Mode PUBKEY+ENCRYPT+TUNNEL+PFS to replace #482315 {using isakmp#482312}
    2022:06:07-18:38:12 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_36"[14] XGS-FW-WAN-IP:4500 #482889: sent QI2, IPsec SA established {ESP=>0xc5e465be <0xfa8b4269 NATOA=0.0.0.0 DPD}
    2022:06:07-18:38:19 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_47"[14] XGS-FW-WAN-IP:4500 #482891: initiating Quick Mode PUBKEY+ENCRYPT+TUNNEL+PFS to replace #482322 {using isakmp#482312}
    2022:06:07-18:38:19 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_47"[14] XGS-FW-WAN-IP:4500 #482891: sent QI2, IPsec SA established {ESP=>0xc43d88f8 <0x7d34dbcb NATOA=0.0.0.0 DPD}
    2022:06:07-18:38:20 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_14"[14] XGS-FW-WAN-IP:4500 #482893: initiating Quick Mode PUBKEY+ENCRYPT+TUNNEL+PFS to replace #482347 {using isakmp#482312}
    2022:06:07-18:38:20 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_14"[14] XGS-FW-WAN-IP:4500 #482893: sent QI2, IPsec SA established {ESP=>0xca4ebf4e <0x8b0fa4fc NATOA=0.0.0.0 DPD}
    2022:06:07-18:38:26 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_16"[14] XGS-FW-WAN-IP:4500 #482894: initiating Quick Mode PUBKEY+ENCRYPT+TUNNEL+PFS to replace #482356 {using isakmp#482312}
    2022:06:07-18:38:26 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_16"[14] XGS-FW-WAN-IP:4500 #482894: sent QI2, IPsec SA established {ESP=>0xc918486f <0x5662423a NATOA=0.0.0.0 DPD}
    2022:06:07-18:38:37 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_18"[14] XGS-FW-WAN-IP:4500 #482896: initiating Quick Mode PUBKEY+ENCRYPT+TUNNEL+PFS to replace #482370 {using isakmp#482312}
    2022:06:07-18:38:37 fw-320-1 pluto[8907]: "S_REF_IpsSitTunnelxgs2sg_18"[14] XGS-FW-WAN-IP:4500 #482896: sent QI2, IPsec SA established {ESP=>0xc22a704a <0x354aeb35 NATOA=0.0.0.0 DPD}
    ...
    ...

    XGS Logs

    XGS136_XN01_SFOS 18.5.3 MR-3-Build408# grep "2022-06-03 08:" strongswan.log
    2022-06-03 08:00:00Z 16[KNL] creating rekey job for CHILD_SA ESP/xxx.xxx.xxx.xxx/SG-FW-WAN-IP
    2022-06-03 08:00:08Z 32[IKE] <tunnelname-1|57> sending DPD request
    2022-06-03 08:00:08Z 32[ENC] <tunnelname-1|57> generating INFORMATIONAL_V1 request 1123114978 [ HASH N(DPD) ]
    2022-06-03 08:00:08Z 32[NET] <tunnelname-1|57> sending packet: from XGS-FW-WAN-NAT-IP[4500] to SG-FW-WAN-IP[4500] (124 bytes)
    2022-06-03 08:00:08Z 31[NET] <tunnelname-1|57> received packet: from SG-FW-WAN-IP[4500] to XGS-FW-WAN-NAT-IP[4500] (124 bytes)
    2022-06-03 08:00:08Z 31[ENC] <tunnelname-1|57> parsed INFORMATIONAL_V1 request 1127226860 [ HASH N(DPD_ACK) ]
    2022-06-03 08:00:28Z 25[KNL] creating rekey job for CHILD_SA ESP/0xc9572c98/XGS-FW-WAN-NAT-IP
    2022-06-03 08:00:32Z 02[KNL] creating delete job for CHILD_SA ESP/0xce1cdcb1/XGS-FW-WAN-NAT-IP
    2022-06-03 08:00:32Z 06[KNL] creating delete job for CHILD_SA ESP/0x1adf2cf7/SG-FW-WAN-IP
    2022-06-03 08:00:32Z 22[IKE] <tunnelname-1|57> closing expired CHILD_SA tunnelname-63{4021} with SPIs ce1cdcb1_i 1adf2cf7_o and TS xxx.xxx.xxx.xxx/25 === xxx.xxx.xxx.xxx/24
    2022-06-03 08:00:32Z 22[IKE] <tunnelname-1|57> sending DELETE for ESP CHILD_SA with SPI ce1cdcb1
    2022-06-03 08:00:32Z 22[ENC] <tunnelname-1|57> generating INFORMATIONAL_V1 request 978183656 [ HASH D ]
    2022-06-03 08:00:32Z 22[NET] <tunnelname-1|57> sending packet: from XGS-FW-WAN-NAT-IP[4500] to SG-FW-WAN-IP[4500] (108 bytes)
    2022-06-03 08:00:32Z 14[JOB] CHILD_SA ESP/0x1adf2cf7/SG-FW-WAN-IP not found for delete
    2022-06-03 08:00:32Z 20[NET] <tunnelname-1|57> received packet: from SG-FW-WAN-IP[4500] to XGS-FW-WAN-NAT-IP[4500] (108 bytes)
    2022-06-03 08:00:32Z 20[ENC] <tunnelname-1|57> parsed INFORMATIONAL_V1 request 3393724742 [ HASH D ]
    2022-06-03 08:00:32Z 20[IKE] <tunnelname-1|57> received DELETE for ESP CHILD_SA with SPI 1adf2cf7
    2022-06-03 08:00:32Z 20[IKE] <tunnelname-1|57> CHILD_SA not found, ignored
    2022-06-03 08:00:36Z 12[KNL] creating rekey job for CHILD_SA ESP/0xce5a58a5/XGS-FW-WAN-NAT-IP
    2022-06-03 08:00:39Z 19[KNL] creating rekey job for CHILD_SA ESP/0x7b97643c/SG-FW-WAN-IP
    2022-06-03 08:00:45Z 12[NET] <tunnelname-1|57> received packet: from SG-FW-WAN-IP[4500] to XGS-FW-WAN-NAT-IP[4500] (108 bytes)
    2022-06-03 08:00:45Z 12[ENC] <tunnelname-1|57> parsed INFORMATIONAL_V1 request 3003771830 [ HASH D ]
    2022-06-03 08:00:45Z 12[IKE] <tunnelname-1|57> received DELETE for ESP CHILD_SA with SPI ac70c443
    2022-06-03 08:00:45Z 12[IKE] <tunnelname-1|57> closing CHILD_SA tunnelname-38{4022} with SPIs c388b3a0_i (0 bytes) ac70c443_o (0 bytes) and TS xxx.xxx.xxx.xxx/26 === xxx.xxx.xxx.xxx/32
    2022-06-03 08:00:49Z 19[KNL] creating rekey job for CHILD_SA ESP/0x0291b25a/SG-FW-WAN-IP
    2022-06-03 08:00:55Z 28[KNL] creating rekey job for CHILD_SA ESP/0xexxx.xxx.xxx.xxx/SG-FW-WAN-IP
    2022-06-03 08:01:01Z 25[KNL] creating rekey job for CHILD_SA ESP/xxx.xxx.xxx.xxx/SG-FW-WAN-IP
    2022-06-03 08:01:05Z 18[NET] <tunnelname-1|57> received packet: from SG-FW-WAN-IP[4500] to XGS-FW-WAN-NAT-IP[4500] (572 bytes)
    2022-06-03 08:01:05Z 18[ENC] <tunnelname-1|57> parsed QUICK_MODE request 128135090 [ HASH SA No KE ID ID ]
    2022-06-03 08:01:05Z 18[IKE] <tunnelname-1|57> ### process_request invoking quick_mode_create
    2022-06-03 08:01:05Z 18[IKE] <tunnelname-1|57> ### quick_mode_create: 0x7f757001fa00 config (nil)
    2022-06-03 08:01:05Z 18[IKE] <tunnelname-1|57> ### process_r: 0x7f757001fa00 QM_INIT
    2022-06-03 08:01:05Z 18[IKE] <tunnelname-1|57> detected rekeying of CHILD_SA tunnelname-69{4044}
    2022-06-03 08:01:05Z 18[IKE] <tunnelname-1|57> ### build_r: 0x7f757001fa00 QM_INIT
    2022-06-03 08:01:05Z 18[ENC] <tunnelname-1|57> generating QUICK_MODE response 128135090 [ HASH SA No KE ID ID ]
    2022-06-03 08:01:05Z 18[NET] <tunnelname-1|57> sending packet: from XGS-FW-WAN-NAT-IP[4500] to SG-FW-WAN-IP[4500] (604 bytes)
    2022-06-03 08:01:05Z 21[NET] <tunnelname-1|57> received packet: from SG-FW-WAN-IP[4500] to XGS-FW-WAN-NAT-IP[4500] (92 bytes)
    2022-06-03 08:01:05Z 21[ENC] <tunnelname-1|57> parsed QUICK_MODE request 128135090 [ HASH ]
    2022-06-03 08:01:05Z 21[IKE] <tunnelname-1|57> ### process_r: 0x7f757001fa00 QM_NEGOTIATED
    2022-06-03 08:01:05Z 21[CFG] <tunnelname-1|57> handling HA CHILD_SA tunnelname-69{4108} xxx.xxx.xxx.xxx/25 === xxx.xxx.xxx.xxx/32 (segment in: 1*, out: 1*)
    2022-06-03 08:01:05Z 21[IKE] <tunnelname-1|57> CHILD_SA tunnelname-69{4108} established with SPIs c67095dd_i 24f126fb_o and TS xxx.xxx.xxx.xxx/25 === xxx.xxx.xxx.xxx/32
    2022-06-03 08:01:05Z 21[IKE] <tunnelname-1|57> ### destroy: 0x7f757001fa00
    2022-06-03 08:01:12Z 28[KNL] creating rekey job for CHILD_SA ESP/0xc27e2991/XGS-FW-WAN-NAT-IP
    2022-06-03 08:01:17Z 06[KNL] creating rekey job for CHILD_SA ESP/0x6bb71eb3/SG-FW-WAN-IP
    2022-06-03 08:01:37Z 16[IKE] <tunnelname-1|57> sending DPD request
    2022-06-03 08:01:37Z 16[ENC] <tunnelname-1|57> generating INFORMATIONAL_V1 request 548221188 [ HASH N(DPD) ]
    2022-06-03 08:01:37Z 16[NET] <tunnelname-1|57> sending packet: from XGS-FW-WAN-NAT-IP[4500] to SG-FW-WAN-IP[4500] (124 bytes)
    2022-06-03 08:01:37Z 15[NET] <tunnelname-1|57> received packet: from SG-FW-WAN-IP[4500] to XGS-FW-WAN-NAT-IP[4500] (124 bytes)
    2022-06-03 08:01:37Z 15[ENC] <tunnelname-1|57> parsed INFORMATIONAL_V1 request 2762218160 [ HASH N(DPD_ACK) ]
    2022-06-03 08:01:40Z 26[NET] <tunnelname-1|57> received packet: from SG-FW-WAN-IP[4500] to XGS-FW-WAN-NAT-IP[4500] (588 bytes)
    2022-06-03 08:01:40Z 26[ENC] <tunnelname-1|57> parsed QUICK_MODE request 4155838807 [ HASH SA No KE ID ID ]
    2022-06-03 08:01:40Z 26[IKE] <tunnelname-1|57> ### process_request invoking quick_mode_create
    2022-06-03 08:01:40Z 26[IKE] <tunnelname-1|57> ### quick_mode_create: 0x7f755c003dd0 config (nil)
    2022-06-03 08:01:40Z 26[IKE] <tunnelname-1|57> ### process_r: 0x7f755c003dd0 QM_INIT
    2022-06-03 08:01:40Z 26[IKE] <tunnelname-1|57> detected rekeying of CHILD_SA tunnelname-33{4045}
    2022-06-03 08:01:40Z 26[IKE] <tunnelname-1|57> ### build_r: 0x7f755c003dd0 QM_INIT
    2022-06-03 08:01:40Z 26[ENC] <tunnelname-1|57> generating QUICK_MODE response 4155838807 [ HASH SA No KE ID ID ]
    2022-06-03 08:01:40Z 26[NET] <tunnelname-1|57> sending packet: from XGS-FW-WAN-NAT-IP[4500] to SG-FW-WAN-IP[4500] (604 bytes)
    2022-06-03 08:01:40Z 28[NET] <tunnelname-1|57> received packet: from SG-FW-WAN-IP[4500] to XGS-FW-WAN-NAT-IP[4500] (92 bytes)
    2022-06-03 08:01:40Z 28[ENC] <tunnelname-1|57> parsed QUICK_MODE request 4155838807 [ HASH ]
    2022-06-03 08:01:40Z 28[IKE] <tunnelname-1|57> ### process_r: 0x7f755c003dd0 QM_NEGOTIATED
    2022-06-03 08:01:40Z 28[CFG] <tunnelname-1|57> handling HA CHILD_SA tunnelname-33{4109} xxx.xxx.xxx.xxx/26 === xxx.xxx.xxx.xxx/24 (segment in: 1*, out: 1*)
    2022-06-03 08:01:40Z 28[IKE] <tunnelname-1|57> CHILD_SA tunnelname-33{4109} established with SPIs c3056c76_i 8fb5d9ac_o and TS xxx.xxx.xxx.xxx/26 === xxx.xxx.xxx.xxx/24
    2022-06-03 08:01:40Z 28[IKE] <tunnelname-1|57> ### destroy: 0x7f755c003dd0
    2022-06-03 08:01:44Z 24[NET] <tunnelname-1|57> received packet: from SG-FW-WAN-IP[4500] to XGS-FW-WAN-NAT-IP[4500] (572 bytes)
    2022-06-03 08:01:44Z 24[ENC] <tunnelname-1|57> parsed QUICK_MODE request 3062607757 [ HASH SA No KE ID ID ]
    2022-06-03 08:01:44Z 24[IKE] <tunnelname-1|57> ### process_request invoking quick_mode_create
    2022-06-03 08:01:44Z 24[IKE] <tunnelname-1|57> ### quick_mode_create: 0x7f7590006750 config (nil)
    2022-06-03 08:01:44Z 24[IKE] <tunnelname-1|57> ### process_r: 0x7f7590006750 QM_INIT
    2022-06-03 08:01:44Z 24[IKE] <tunnelname-1|57> detected rekeying of CHILD_SA tunnelname-7{4041}
    2022-06-03 08:01:44Z 24[IKE] <tunnelname-1|57> ### build_r: 0x7f7590006750 QM_INIT
    2022-06-03 08:01:44Z 24[ENC] <tunnelname-1|57> generating QUICK_MODE response 3062607757 [ HASH SA No KE ID ID ]
    2022-06-03 08:01:44Z 24[NET] <tunnelname-1|57> sending packet: from XGS-FW-WAN-NAT-IP[4500] to SG-FW-WAN-IP[4500] (604 bytes)
    2022-06-03 08:01:44Z 16[NET] <tunnelname-1|57> received packet: from SG-FW-WAN-IP[4500] to XGS-FW-WAN-NAT-IP[4500] (92 bytes)
    2022-06-03 08:01:44Z 16[ENC] <tunnelname-1|57> parsed QUICK_MODE request 3062607757 [ HASH ]
    2022-06-03 08:01:44Z 16[IKE] <tunnelname-1|57> ### process_r: 0x7f7590006750 QM_NEGOTIATED
    2022-06-03 08:01:44Z 16[CFG] <tunnelname-1|57> handling HA CHILD_SA tunnelname-7{4110} xxx.xxx.xxx.xxx/25 === xxx.xxx.xxx.xxx/32 (segment in: 1*, out: 1*)
    2022-06-03 08:01:44Z 16[IKE] <tunnelname-1|57> CHILD_SA tunnelname-7{4110} established with SPIs c6e987e1_i 4c8b938d_o and TS xxx.xxx.xxx.xxx/25 === xxx.xxx.xxx.xxx/32
    2022-06-03 08:01:44Z 16[IKE] <tunnelname-1|57> ### destroy: 0x7f7590006750
    2022-06-03 08:01:46Z 22[NET] <tunnelname-1|57> received packet: from SG-FW-WAN-IP[4500] to XGS-FW-WAN-NAT-IP[4500] (108 bytes)
    2022-06-03 08:01:46Z 22[ENC] <tunnelname-1|57> parsed INFORMATIONAL_V1 request 3902322564 [ HASH D ]
    2022-06-03 08:01:46Z 22[IKE] <tunnelname-1|57> received DELETE for ESP CHILD_SA with SPI 897370a8
    2022-06-03 08:01:46Z 22[IKE] <tunnelname-1|57> closing CHILD_SA tunnelname-2{4023} with SPIs c9a61b1e_i (0 bytes) 897370a8_o (0 bytes) and TS xxx.xxx.xxx.xxx/25 === xxx.xxx.xxx.xxx/32
    2022-06-03 08:02:08Z 22[NET] <tunnelname-1|57> received packet: from SG-FW-WAN-IP[4500] to XGS-FW-WAN-NAT-IP[4500] (108 bytes)
    2022-06-03 08:02:08Z 22[ENC] <tunnelname-1|57> parsed INFORMATIONAL_V1 request 1587652053 [ HASH D ]
    2022-06-03 08:02:08Z 22[IKE] <tunnelname-1|57> received DELETE for ESP CHILD_SA with SPI 8fd0a966
    2022-06-03 08:02:08Z 22[IKE] <tunnelname-1|57> closing CHILD_SA tunnelname-26{4024} with SPIs c7665a8e_i (0 bytes) 8fd0a966_o (0 bytes) and TS xxx.xxx.xxx.xxx/24 === xxx.xxx.xxx.xxx/32
    2022-06-03 08:02:22Z 21[KNL] creating delete job for CHILD_SA ESP/0xcxxx.xxx.xxx.xxx/XGS-FW-WAN-NAT-IP
    2022-06-03 08:02:22Z 17[KNL] creating delete job for CHILD_SA ESP/xxx.xxx.xxx.xxx/SG-FW-WAN-IP
    2022-06-03 08:02:22Z 19[IKE] <tunnelname-1|57> closing expired CHILD_SA tunnelname-31{4025} with SPIs c997b7f8_i 165768f1_o and TS xxx.xxx.xxx.xxx/26 === xxx.xxx.xxx.xxx/32
    2022-06-03 08:02:22Z 19[IKE] <tunnelname-1|57> sending DELETE for ESP CHILD_SA with SPI c997b7f8
    2022-06-03 08:02:22Z 19[ENC] <tunnelname-1|57> generating INFORMATIONAL_V1 request 3672079360 [ HASH D ]
    2022-06-03 08:02:22Z 19[NET] <tunnelname-1|57> sending packet: from XGS-FW-WAN-NAT-IP[4500] to SG-FW-WAN-IP[4500] (108 bytes)
    2022-06-03 08:02:22Z 24[JOB] CHILD_SA ESP/xxx.xxx.xxx.xxx/SG-FW-WAN-IP not found for delete
    2022-06-03 08:02:22Z 16[NET] <tunnelname-1|57> received packet: from SG-FW-WAN-IP[4500] to XGS-FW-WAN-NAT-IP[4500] (108 bytes)
    2022-06-03 08:02:22Z 16[ENC] <tunnelname-1|57> parsed INFORMATIONAL_V1 request 185617889 [ HASH D ]
    2022-06-03 08:02:22Z 16[IKE] <tunnelname-1|57> received DELETE for ESP CHILD_SA with SPI 165768f1
    2022-06-03 08:02:22Z 16[IKE] <tunnelname-1|57> CHILD_SA not found, ignored
    2022-06-03 08:02:28Z 32[KNL] creating rekey job for CHILD_SA ESP/0xc61aa124/XGS-FW-WAN-NAT-IP
    2022-06-03 08:02:51Z 21[IKE] <tunnelname-1|57> sending DPD request
    2022-06-03 08:02:51Z 21[ENC] <tunnelname-1|57> generating INFORMATIONAL_V1 request 1155811788 [ HASH N(DPD) ]
    2022-06-03 08:02:51Z 21[NET] <tunnelname-1|57> sending packet: from XGS-FW-WAN-NAT-IP[4500] to SG-FW-WAN-IP[4500] (124 bytes)
    2022-06-03 08:02:51Z 17[NET] <tunnelname-1|57> received packet: from SG-FW-WAN-IP[4500] to XGS-FW-WAN-NAT-IP[4500] (124 bytes)
    2022-06-03 08:02:51Z 17[ENC] <tunnelname-1|57> parsed INFORMATIONAL_V1 request 861371119 [ HASH N(DPD_ACK) ]
    2022-06-03 08:03:00Z 14[NET] <tunnelname-1|57> received packet: from SG-FW-WAN-IP[4500] to XGS-FW-WAN-NAT-IP[4500] (572 bytes)
    2022-06-03 08:03:00Z 14[ENC] <tunnelname-1|57> parsed QUICK_MODE request 2503720052 [ HASH SA No KE ID ID ]
    2022-06-03 08:03:00Z 14[IKE] <tunnelname-1|57> ### process_request invoking quick_mode_create
    2022-06-03 08:03:00Z 14[IKE] <tunnelname-1|57> ### quick_mode_create: 0x7f757800b6a0 config (nil)
    2022-06-03 08:03:00Z 14[IKE] <tunnelname-1|57> ### process_r: 0x7f757800b6a0 QM_INIT
    2022-06-03 08:03:00Z 14[IKE] <tunnelname-1|57> detected rekeying of CHILD_SA tunnelname-57{4039}
    2022-06-03 08:03:00Z 14[IKE] <tunnelname-1|57> ### build_r: 0x7f757800b6a0 QM_INIT
    2022-06-03 08:03:00Z 14[ENC] <tunnelname-1|57> generating QUICK_MODE response 2503720052 [ HASH SA No KE ID ID ]
    2022-06-03 08:03:00Z 14[NET] <tunnelname-1|57> sending packet: from XGS-FW-WAN-NAT-IP[4500] to SG-FW-WAN-IP[4500] (604 bytes)
    2022-06-03 08:03:00Z 26[NET] <tunnelname-1|57> received packet: from SG-FW-WAN-IP[4500] to XGS-FW-WAN-NAT-IP[4500] (92 bytes)
    2022-06-03 08:03:00Z 26[ENC] <tunnelname-1|57> parsed QUICK_MODE request 2503720052 [ HASH ]
    2022-06-03 08:03:00Z 26[IKE] <tunnelname-1|57> ### process_r: 0x7f757800b6a0 QM_NEGOTIATED
    2022-06-03 08:03:00Z 26[CFG] <tunnelname-1|57> handling HA CHILD_SA tunnelname-57{4111} xxx.xxx.xxx.xxx/27 === xxx.xxx.xxx.xxx/32 (segment in: 1*, out: 1*)
    2022-06-03 08:03:00Z 26[IKE] <tunnelname-1|57> CHILD_SA tunnelname-57{4111} established with SPIs c4f4c674_i 0cf38a20_o and TS xxx.xxx.xxx.xxx/27 === xxx.xxx.xxx.xxx/32
    2022-06-03 08:03:00Z 26[IKE] <tunnelname-1|57> ### destroy: 0x7f757800b6a0
    2022-06-03 08:03:16Z 06[NET] <tunnelname-1|57> received packet: from SG-FW-WAN-IP[4500] to XGS-FW-WAN-NAT-IP[4500] (588 bytes)
    2022-06-03 08:03:16Z 06[ENC] <tunnelname-1|57> parsed QUICK_MODE request 3227290636 [ HASH SA No KE ID ID ]
    2022-06-03 08:03:16Z 06[IKE] <tunnelname-1|57> ### process_request invoking quick_mode_create
    2022-06-03 08:03:16Z 06[IKE] <tunnelname-1|57> ### quick_mode_create: 0x7f75ac0096b0 config (nil)
    2022-06-03 08:03:16Z 06[IKE] <tunnelname-1|57> ### process_r: 0x7f75ac0096b0 QM_INIT
    2022-06-03 08:03:16Z 06[IKE] <tunnelname-1|57> detected rekeying of CHILD_SA tunnelname-23{4040}
    2022-06-03 08:03:16Z 06[IKE] <tunnelname-1|57> ### build_r: 0x7f75ac0096b0 QM_INIT
    2022-06-03 08:03:16Z 06[ENC] <tunnelname-1|57> generating QUICK_MODE response 3227290636 [ HASH SA No KE ID ID ]
    2022-06-03 08:03:16Z 06[NET] <tunnelname-1|57> sending packet: from XGS-FW-WAN-NAT-IP[4500] to SG-FW-WAN-IP[4500] (604 bytes)
    2022-06-03 08:03:16Z 22[NET] <tunnelname-1|57> received packet: from SG-FW-WAN-IP[4500] to XGS-FW-WAN-NAT-IP[4500] (92 bytes)
    2022-06-03 08:03:16Z 22[ENC] <tunnelname-1|57> parsed QUICK_MODE request 3227290636 [ HASH ]
    2022-06-03 08:03:16Z 22[IKE] <tunnelname-1|57> ### process_r: 0x7f75ac0096b0 QM_NEGOTIATED
    2022-06-03 08:03:16Z 22[CFG] <tunnelname-1|57> handling HA CHILD_SA tunnelname-23{4112} xxx.xxx.xxx.xxx/24 === xxx.xxx.xxx.xxx/24 (segment in: 1*, out: 1*)
    2022-06-03 08:03:16Z 22[IKE] <tunnelname-1|57> CHILD_SA tunnelname-23{4112} established with SPIs c997b165_i 91e769ff_o and TS xxx.xxx.xxx.xxx/24 === xxx.xxx.xxx.xxx/24
    2022-06-03 08:03:16Z 22[IKE] <tunnelname-1|57> ### destroy: 0x7f75ac0096b0
    2022-06-03 08:03:26Z 22[NET] <tunnelname-1|57> received packet: from SG-FW-WAN-IP[4500] to XGS-FW-WAN-NAT-IP[4500] (108 bytes)
    2022-06-03 08:03:26Z 22[ENC] <tunnelname-1|57> parsed INFORMATIONAL_V1 request 2567528598 [ HASH D ]
    2022-06-03 08:03:26Z 22[IKE] <tunnelname-1|57> received DELETE for ESP CHILD_SA with SPI 0291b25a
    2022-06-03 08:03:26Z 22[IKE] <tunnelname-1|57> closing CHILD_SA tunnelname-70{4026} with SPIs c3fb5953_i (0 bytes) 0291b25a_o (0 bytes) and TS xxx.xxx.xxx.xxx/25 === xxx.xxx.xxx.xxx/32
    2022-06-03 08:03:32Z 19[KNL] creating rekey job for CHILD_SA ESP/0x0da4eade/SG-FW-WAN-IP
    2022-06-03 08:03:54Z 24[NET] <tunnelname-1|57> received packet: from SG-FW-WAN-IP[4500] to XGS-FW-WAN-NAT-IP[4500] (108 bytes)
    2022-06-03 08:03:54Z 24[ENC] <tunnelname-1|57> parsed INFORMATIONAL_V1 request 4160722372 [ HASH D ]
    2022-06-03 08:03:54Z 24[IKE] <tunnelname-1|57> received DELETE for ESP CHILD_SA with SPI e09950c9
    2022-06-03 08:03:54Z 24[IKE] <tunnelname-1|57> closing CHILD_SA tunnelname-14{4027} with SPIs c9572c98_i (0 bytes) e09950c9_o (0 bytes) and TS XGS-FW-LAN-IP28/25 === xxx.xxx.xxx.xxx/32
    2022-06-03 08:04:01Z 21[NET] <tunnelname-1|57> received packet: from SG-FW-WAN-IP[4500] to XGS-FW-WAN-NAT-IP[4500] (572 bytes)
    2022-06-03 08:04:01Z 21[ENC] <tunnelname-1|57> parsed QUICK_MODE request 2658000587 [ HASH SA No KE ID ID ]
    2022-06-03 08:04:01Z 21[IKE] <tunnelname-1|57> ### process_request invoking quick_mode_create
    2022-06-03 08:04:01Z 21[IKE] <tunnelname-1|57> ### quick_mode_create: 0x7f7598009290 config (nil)
    2022-06-03 08:04:01Z 21[IKE] <tunnelname-1|57> ### process_r: 0x7f7598009290 QM_INIT
    2022-06-03 08:04:01Z 21[IKE] <tunnelname-1|57> detected rekeying of CHILD_SA tunnelname-4{4042}
    2022-06-03 08:04:01Z 21[IKE] <tunnelname-1|57> ### build_r: 0x7f7598009290 QM_INIT
    2022-06-03 08:04:01Z 21[ENC] <tunnelname-1|57> generating QUICK_MODE response 2658000587 [ HASH SA No KE ID ID ]
    2022-06-03 08:04:01Z 21[NET] <tunnelname-1|57> sending packet: from XGS-FW-WAN-NAT-IP[4500] to SG-FW-WAN-IP[4500] (604 bytes)
    2022-06-03 08:04:01Z 17[NET] <tunnelname-1|57> received packet: from SG-FW-WAN-IP[4500] to XGS-FW-WAN-NAT-IP[4500] (92 bytes)
    2022-06-03 08:04:01Z 17[ENC] <tunnelname-1|57> parsed QUICK_MODE request 2658000587 [ HASH ]
    2022-06-03 08:04:01Z 17[IKE] <tunnelname-1|57> ### process_r: 0x7f7598009290 QM_NEGOTIATED
    2022-06-03 08:04:01Z 17[CFG] <tunnelname-1|57> handling HA CHILD_SA tunnelname-4{4113} xxx.xxx.xxx.xxx/25 === xxx.xxx.xxx.xxx/32 (segment in: 1*, out: 1*)
    2022-06-03 08:04:01Z 17[IKE] <tunnelname-1|57> CHILD_SA tunnelname-4{4113} established with SPIs c5af7d50_i 4fb17045_o and TS xxx.xxx.xxx.xxx/25 === xxx.xxx.xxx.xxx/32
    2022-06-03 08:04:01Z 17[IKE] <tunnelname-1|57> ### destroy: 0x7f7598009290
    2022-06-03 08:04:07Z 22[NET] <tunnelname-1|57> received packet: from SG-FW-WAN-IP[4500] to XGS-FW-WAN-NAT-IP[4500] (108 bytes)
    2022-06-03 08:04:07Z 22[ENC] <tunnelname-1|57> parsed INFORMATIONAL_V1 request 984798241 [ HASH D ]
    2022-06-03 08:04:07Z 22[IKE] <tunnelname-1|57> received DELETE for ESP CHILD_SA with SPI 7b97643c
    2022-06-03 08:04:07Z 22[IKE] <tunnelname-1|57> closing CHILD_SA tunnelname-67{4028} with SPIs ce5a58a5_i (0 bytes) 7b97643c_o (0 bytes) and TS xxx.xxx.xxx.xxx/25 === xxx.xxx.xxx.xxx/32
    2022-06-03 08:04:15Z 15[KNL] creating rekey job for CHILD_SA ESP/0x5fabbe8a/SG-FW-WAN-IP
    2022-06-03 08:04:19Z 14[KNL] creating rekey job for CHILD_SA ESP/0xc83ab67b/XGS-FW-WAN-NAT-IP
    2022-06-03 08:04:29Z 31[KNL] creating delete job for CHILD_SA ESP/0xc61aa124/XGS-FW-WAN-NAT-IP
    2022-06-03 08:04:29Z 30[KNL] creating delete job for CHILD_SA ESP/0x6bb71eb3/SG-FW-WAN-IP
    2022-06-03 08:04:29Z 25[IKE] <tunnelname-1|57> closing expired CHILD_SA tunnelname-15{4029} with SPIs c61aa124_i 6bb71eb3_o and TS XGS-FW-LAN-IP28/25 === xxx.xxx.xxx.xxx/32
    2022-06-03 08:04:29Z 25[IKE] <tunnelname-1|57> sending DELETE for ESP CHILD_SA with SPI c61aa124
    2022-06-03 08:04:29Z 25[ENC] <tunnelname-1|57> generating INFORMATIONAL_V1 request 2243590980 [ HASH D ]
    2022-06-03 08:04:29Z 25[NET] <tunnelname-1|57> sending packet: from XGS-FW-WAN-NAT-IP[4500] to SG-FW-WAN-IP[4500] (108 bytes)
    2022-06-03 08:04:29Z 18[JOB] CHILD_SA ESP/0x6bb71eb3/SG-FW-WAN-IP not found for delete
    2022-06-03 08:04:29Z 21[NET] <tunnelname-1|57> received packet: from SG-FW-WAN-IP[4500] to XGS-FW-WAN-NAT-IP[4500] (108 bytes)
    2022-06-03 08:04:29Z 21[ENC] <tunnelname-1|57> parsed INFORMATIONAL_V1 request 3378993955 [ HASH D ]
    2022-06-03 08:04:29Z 21[IKE] <tunnelname-1|57> received DELETE for ESP CHILD_SA with SPI 6bb71eb3
    2022-06-03 08:04:29Z 21[IKE] <tunnelname-1|57> CHILD_SA not found, ignored
    2022-06-03 08:04:40Z 02[NET] <tunnelname-1|57> received packet: from SG-FW-WAN-IP[4500] to XGS-FW-WAN-NAT-IP[4500] (572 bytes)
    2022-06-03 08:04:40Z 02[ENC] <tunnelname-1|57> parsed QUICK_MODE request 3822261080 [ HASH SA No KE ID ID ]
    2022-06-03 08:04:40Z 02[IKE] <tunnelname-1|57> ### process_request invoking quick_mode_create
    2022-06-03 08:04:40Z 02[IKE] <tunnelname-1|57> ### quick_mode_create: 0x7f75a4008a60 config (nil)
    2022-06-03 08:04:40Z 02[IKE] <tunnelname-1|57> ### process_r: 0x7f75a4008a60 QM_INIT
    2022-06-03 08:04:40Z 02[IKE] <tunnelname-1|57> detected rekeying of CHILD_SA tunnelname-29{4038}
    2022-06-03 08:04:40Z 02[IKE] <tunnelname-1|57> ### build_r: 0x7f75a4008a60 QM_INIT
    2022-06-03 08:04:40Z 02[ENC] <tunnelname-1|57> generating QUICK_MODE response 3822261080 [ HASH SA No KE ID ID ]
    2022-06-03 08:04:40Z 02[NET] <tunnelname-1|57> sending packet: from XGS-FW-WAN-NAT-IP[4500] to SG-FW-WAN-IP[4500] (604 bytes)
    2022-06-03 08:04:41Z 06[NET] <tunnelname-1|57> received packet: from SG-FW-WAN-IP[4500] to XGS-FW-WAN-NAT-IP[4500] (92 bytes)
    2022-06-03 08:04:41Z 06[ENC] <tunnelname-1|57> parsed QUICK_MODE request 3822261080 [ HASH ]
    2022-06-03 08:04:41Z 06[IKE] <tunnelname-1|57> ### process_r: 0x7f75a4008a60 QM_NEGOTIATED
    2022-06-03 08:04:41Z 06[CFG] <tunnelname-1|57> handling HA CHILD_SA tunnelname-29{4114} xxx.xxx.xxx.xxx/24 === xxx.xxx.xxx.xxx/32 (segment in: 1*, out: 1*)
    2022-06-03 08:04:41Z 06[IKE] <tunnelname-1|57> CHILD_SA tunnelname-29{4114} established with SPIs cbdcaf00_i 85177004_o and TS xxx.xxx.xxx.xxx/24 === xxx.xxx.xxx.xxx/32
    2022-06-03 08:04:41Z 06[IKE] <tunnelname-1|57> ### destroy: 0x7f75a4008a60
    2022-06-03 08:04:42Z 20[NET] <tunnelname-1|57> received packet: from SG-FW-WAN-IP[4500] to XGS-FW-WAN-NAT-IP[4500] (108 bytes)
    2022-06-03 08:04:42Z 20[ENC] <tunnelname-1|57> parsed INFORMATIONAL_V1 request 1694363816 [ HASH D ]
    2022-06-03 08:04:42Z 20[IKE] <tunnelname-1|57> received DELETE for ESP CHILD_SA with SPI 81747274
    2022-06-03 08:04:42Z 20[IKE] <tunnelname-1|57> closing CHILD_SA tunnelname-24{4030} with SPIs c27e2991_i (0 bytes) 81747274_o (0 bytes) and TS xxx.xxx.xxx.xxx/24 === xxx.xxx.xxx.xxx/32
    2022-06-03 08:05:13Z 02[KNL] creating rekey job for CHILD_SA ESP/0xcb525105/XGS-FW-WAN-NAT-IP
    2022-06-03 08:05:15Z 14[IKE] <tunnelname-1|57> sending DPD request
    2022-06-03 08:05:15Z 14[ENC] <tunnelname-1|57> generating INFORMATIONAL_V1 request 397283496 [ HASH N(DPD) ]
    2022-06-03 08:05:15Z 14[NET] <tunnelname-1|57> sending packet: from XGS-FW-WAN-NAT-IP[4500] to SG-FW-WAN-IP[4500] (124 bytes)
    2022-06-03 08:05:15Z 32[NET] <tunnelname-1|57> received packet: from SG-FW-WAN-IP[4500] to XGS-FW-WAN-NAT-IP[4500] (124 bytes)
    2022-06-03 08:05:15Z 32[ENC] <tunnelname-1|57> parsed INFORMATIONAL_V1 request 1712958610 [ HASH N(DPD_ACK) ]
    2022-06-03 08:05:17Z 30[NET] <58> received packet: from SG-FW-WAN-IP[4500] to XGS-FW-WAN-NAT-IP[4500] (256 bytes)
    2022-06-03 08:05:17Z 30[ENC] <58> parsed ID_PROT request 0 [ SA V V V V V V V V V ]
    2022-06-03 08:05:17Z 30[IKE] <58> received strongSwan vendor ID
    2022-06-03 08:05:17Z 30[IKE] <58> received Cisco Unity vendor ID
    2022-06-03 08:05:17Z 30[IKE] <58> received XAuth vendor ID
    2022-06-03 08:05:17Z 30[IKE] <58> received DPD vendor ID
    2022-06-03 08:05:17Z 30[IKE] <58> received NAT-T (RFC 3947) vendor ID
    2022-06-03 08:05:17Z 30[IKE] <58> received draft-ietf-ipsec-nat-t-ike-03 vendor ID
    2022-06-03 08:05:17Z 30[IKE] <58> received draft-ietf-ipsec-nat-t-ike-02 vendor ID
    2022-06-03 08:05:17Z 30[IKE] <58> received draft-ietf-ipsec-nat-t-ike-02\n vendor ID
    2022-06-03 08:05:17Z 30[IKE] <58> received draft-ietf-ipsec-nat-t-ike-00 vendor ID
    2022-06-03 08:05:17Z 30[IKE] <58> SG-FW-WAN-IP is initiating a Main Mode IKE_SA
    2022-06-03 08:05:17Z 30[ENC] <58> generating ID_PROT response 0 [ SA V V V V ]
    2022-06-03 08:05:17Z 30[NET] <58> sending packet: from XGS-FW-WAN-NAT-IP[4500] to SG-FW-WAN-IP[4500] (156 bytes)
    2022-06-03 08:05:17Z 25[NET] <58> received packet: from SG-FW-WAN-IP[4500] to XGS-FW-WAN-NAT-IP[4500] (540 bytes)
    2022-06-03 08:05:17Z 25[ENC] <58> parsed ID_PROT request 0 [ KE No NAT-D NAT-D ]
    2022-06-03 08:05:17Z 25[IKE] <58> local host is behind NAT, sending keep alives
    2022-06-03 08:05:17Z 25[ENC] <58> generating ID_PROT response 0 [ KE No NAT-D NAT-D ]
    2022-06-03 08:05:17Z 25[NET] <58> sending packet: from XGS-FW-WAN-NAT-IP[4500] to SG-FW-WAN-IP[4500] (556 bytes)
    2022-06-03 08:05:17Z 18[NET] <58> received packet: from SG-FW-WAN-IP[4500] to XGS-FW-WAN-NAT-IP[4500] (300 bytes)
    2022-06-03 08:05:17Z 18[ENC] <58> parsed ID_PROT request 0 [ ID SIG ]
    2022-06-03 08:05:17Z 18[CFG] <58> looking for RSA signature peer configs matching XGS-FW-WAN-NAT-IP...SG-FW-WAN-IP[SG-FW-WAN-IP]
    2022-06-03 08:05:17Z 18[CFG] <58> selected peer config "tunnelname-1"
    2022-06-03 08:05:17Z 18[CFG] <tunnelname-1|58>   using trusted certificate "SG-FW-WAN-IP"
    2022-06-03 08:05:17Z 18[IKE] <tunnelname-1|58> authentication of 'SG-FW-WAN-IP' with RSA_EMSA_PKCS1_NULL successful
    2022-06-03 08:05:17Z 18[IKE] <tunnelname-1|58> authentication of 'xgfw.dummy.domain' (myself) successful
    2022-06-03 08:05:17Z 18[IKE] <tunnelname-1|58> IKE_SA tunnelname-1[58] established between XGS-FW-WAN-NAT-IP[xgfw.dummy.domain]...SG-FW-WAN-IP[SG-FW-WAN-IP]
    2022-06-03 08:05:17Z 18[IKE] <tunnelname-1|58> scheduling rekeying in 3372s
    2022-06-03 08:05:17Z 18[IKE] <tunnelname-1|58> maximum IKE_SA lifetime 3492s
    2022-06-03 08:05:17Z 18[ENC] <tunnelname-1|58> generating ID_PROT response 0 [ ID SIG ]
    2022-06-03 08:05:17Z 18[NET] <tunnelname-1|58> sending packet: from XGS-FW-WAN-NAT-IP[4500] to SG-FW-WAN-IP[4500] (332 bytes)
    2022-06-03 08:05:17Z 10[IKE] <tunnelname-1|57> detected reauth of existing IKE_SA, adopting 84 children, 0 child tasks, and 0 virtual IPs
    2022-06-03 08:05:17Z 10[IKE] <tunnelname-1|58> ike tunnelname-1[58] adopted 0 children in REKEYING state
    2022-06-03 08:05:26Z 25[NET] <tunnelname-1|58> received packet: from SG-FW-WAN-IP[4500] to XGS-FW-WAN-NAT-IP[4500] (572 bytes)
    2022-06-03 08:05:26Z 25[ENC] <tunnelname-1|58> parsed QUICK_MODE request 3767008757 [ HASH SA No KE ID ID ]
    2022-06-03 08:05:26Z 25[IKE] <tunnelname-1|58> ### process_request invoking quick_mode_create
    2022-06-03 08:05:26Z 25[IKE] <tunnelname-1|58> ### quick_mode_create: 0x7f7588009c40 config (nil)
    2022-06-03 08:05:26Z 25[IKE] <tunnelname-1|58> ### process_r: 0x7f7588009c40 QM_INIT
    2022-06-03 08:05:26Z 25[IKE] <tunnelname-1|58> detected rekeying of CHILD_SA tunnelname-27{4043}
    2022-06-03 08:05:26Z 25[IKE] <tunnelname-1|58> ### build_r: 0x7f7588009c40 QM_INIT
    2022-06-03 08:05:26Z 25[ENC] <tunnelname-1|58> generating QUICK_MODE response 3767008757 [ HASH SA No KE ID ID ]
    2022-06-03 08:05:26Z 25[NET] <tunnelname-1|58> sending packet: from XGS-FW-WAN-NAT-IP[4500] to SG-FW-WAN-IP[4500] (604 bytes)
    2022-06-03 08:05:26Z 18[NET] <tunnelname-1|58> received packet: from SG-FW-WAN-IP[4500] to XGS-FW-WAN-NAT-IP[4500] (92 bytes)
    2022-06-03 08:05:26Z 18[ENC] <tunnelname-1|58> parsed QUICK_MODE request 3767008757 [ HASH ]
    2022-06-03 08:05:26Z 18[IKE] <tunnelname-1|58> ### process_r: 0x7f7588009c40 QM_NEGOTIATED
    2022-06-03 08:05:26Z 18[CFG] <tunnelname-1|58> handling HA CHILD_SA tunnelname-27{4115} xxx.xxx.xxx.xxx/24 === xxx.xxx.xxx.xxx/32 (segment in: 1*, out: 1*)
    2022-06-03 08:05:26Z 18[IKE] <tunnelname-1|58> CHILD_SA tunnelname-27{4115} established with SPIs ce429317_i 09f7fe02_o and TS xxx.xxx.xxx.xxx/24 === xxx.xxx.xxx.xxx/32
    2022-06-03 08:05:26Z 18[IKE] <tunnelname-1|58> ### destroy: 0x7f7588009c40
    2022-06-03 08:05:27Z 26[IKE] <tunnelname-1|57> deleting IKE_SA tunnelname-1[57] between XGS-FW-WAN-NAT-IP[xgfw.dummy.domain]...SG-FW-WAN-IP[SG-FW-WAN-IP]
    2022-06-03 08:05:27Z 26[IKE] <tunnelname-1|57> sending DELETE for IKE_SA tunnelname-1[57]
    2022-06-03 08:05:27Z 26[ENC] <tunnelname-1|57> generating INFORMATIONAL_V1 request 3279848655 [ HASH D ]
    2022-06-03 08:05:27Z 26[NET] <tunnelname-1|57> sending packet: from XGS-FW-WAN-NAT-IP[4500] to SG-FW-WAN-IP[4500] (124 bytes)
    2022-06-03 08:05:27Z 21[DMN] [GARNER-LOGGING] (child_alert) ALERT: received IKE message with invalid SPI (D43CB87D) from other side
    2022-06-03 08:05:31Z 28[KNL] creating rekey job for CHILD_SA ESP/0xc5cfc32f/XGS-FW-WAN-NAT-IP
    2022-06-03 08:05:37Z 16[KNL] creating rekey job for CHILD_SA ESP/0x7a299eca/SG-FW-WAN-IP
    2022-06-03 08:05:41Z 25[KNL] creating rekey job for CHILD_SA ESP/0xca2a377a/XGS-FW-WAN-NAT-IP
    2022-06-03 08:05:41Z 10[NET] <tunnelname-1|58> received packet: from SG-FW-WAN-IP[4500] to XGS-FW-WAN-NAT-IP[4500] (572 bytes)
    2022-06-03 08:05:41Z 10[ENC] <tunnelname-1|58> parsed QUICK_MODE request 1513969007 [ HASH SA No KE ID ID ]
    2022-06-03 08:05:41Z 10[IKE] <tunnelname-1|58> ### process_request invoking quick_mode_create
    2022-06-03 08:05:41Z 10[IKE] <tunnelname-1|58> ### quick_mode_create: 0x7f75a801c7c0 config (nil)
    2022-06-03 08:05:41Z 10[IKE] <tunnelname-1|58> ### process_r: 0x7f75a801c7c0 QM_INIT
    2022-06-03 08:05:41Z 10[IKE] <tunnelname-1|58> detected rekeying of CHILD_SA tunnelname-17{4047}
    2022-06-03 08:05:41Z 10[IKE] <tunnelname-1|58> ### build_r: 0x7f75a801c7c0 QM_INIT
    2022-06-03 08:05:41Z 10[ENC] <tunnelname-1|58> generating QUICK_MODE response 1513969007 [ HASH SA No KE ID ID ]
    2022-06-03 08:05:41Z 10[NET] <tunnelname-1|58> sending packet: from XGS-FW-WAN-NAT-IP[4500] to SG-FW-WAN-IP[4500] (604 bytes)
    2022-06-03 08:05:41Z 26[NET] <tunnelname-1|58> received packet: from SG-FW-WAN-IP[4500] to XGS-FW-WAN-NAT-IP[4500] (92 bytes)
    2022-06-03 08:05:41Z 26[ENC] <tunnelname-1|58> parsed QUICK_MODE request 1513969007 [ HASH ]
    2022-06-03 08:05:41Z 26[IKE] <tunnelname-1|58> ### process_r: 0x7f75a801c7c0 QM_NEGOTIATED
    2022-06-03 08:05:41Z 26[CFG] <tunnelname-1|58> handling HA CHILD_SA tunnelname-17{4116} XGS-FW-LAN-IP28/25 === xxx.xxx.xxx.xxx/32 (segment in: 1*, out: 1*)
    2022-06-03 08:05:41Z 26[IKE] <tunnelname-1|58> CHILD_SA tunnelname-17{4116} established with SPIs c914d350_i f8470dfc_o and TS XGS-FW-LAN-IP28/25 === xxx.xxx.xxx.xxx/32
    2022-06-03 08:05:41Z 26[IKE] <tunnelname-1|58> ### destroy: 0x7f75a801c7c0
    2022-06-03 08:05:44Z 24[NET] <tunnelname-1|58> received packet: from SG-FW-WAN-IP[4500] to XGS-FW-WAN-NAT-IP[4500] (572 bytes)
    2022-06-03 08:05:44Z 24[ENC] <tunnelname-1|58> parsed QUICK_MODE request 3599825736 [ HASH SA No KE ID ID ]
    2022-06-03 08:05:44Z 24[IKE] <tunnelname-1|58> ### process_request invoking quick_mode_create
    2022-06-03 08:05:44Z 24[IKE] <tunnelname-1|58> ### quick_mode_create: 0x7f759000d830 config (nil)
    2022-06-03 08:05:44Z 24[IKE] <tunnelname-1|58> ### process_r: 0x7f759000d830 QM_INIT
    2022-06-03 08:05:44Z 24[IKE] <tunnelname-1|58> detected rekeying of CHILD_SA tunnelname-1{4052}
    2022-06-03 08:05:44Z 24[IKE] <tunnelname-1|58> ### build_r: 0x7f759000d830 QM_INIT
    2022-06-03 08:05:44Z 24[ENC] <tunnelname-1|58> generating QUICK_MODE response 3599825736 [ HASH SA No KE ID ID ]
    2022-06-03 08:05:44Z 24[NET] <tunnelname-1|58> sending packet: from XGS-FW-WAN-NAT-IP[4500] to SG-FW-WAN-IP[4500] (604 bytes)
    2022-06-03 08:05:44Z 16[NET] <tunnelname-1|58> received packet: from SG-FW-WAN-IP[4500] to XGS-FW-WAN-NAT-IP[4500] (92 bytes)
    2022-06-03 08:05:44Z 16[ENC] <tunnelname-1|58> parsed QUICK_MODE request 3599825736 [ HASH ]
    2022-06-03 08:05:44Z 16[IKE] <tunnelname-1|58> ### process_r: 0x7f759000d830 QM_NEGOTIATED
    2022-06-03 08:05:44Z 16[CFG] <tunnelname-1|58> handling HA CHILD_SA tunnelname-1{4117} xxx.xxx.xxx.xxx/25 === xxx.xxx.xxx.xxx/32 (segment in: 1*, out: 1*)
    2022-06-03 08:05:44Z 16[IKE] <tunnelname-1|58> CHILD_SA tunnelname-1{4117} established with SPIs ce00bcc3_i 0f75b890_o and TS xxx.xxx.xxx.xxx/25 === xxx.xxx.xxx.xxx/32
    2022-06-03 08:05:44Z 16[IKE] <tunnelname-1|58> ### destroy: 0x7f759000d830
    2022-06-03 08:06:14Z 19[IKE] <tunnelname-1|58> sending DPD request
    2022-06-03 08:06:14Z 19[ENC] <tunnelname-1|58> generating INFORMATIONAL_V1 request 3704501556 [ HASH N(DPD) ]
    2022-06-03 08:06:14Z 19[NET] <tunnelname-1|58> sending packet: from XGS-FW-WAN-NAT-IP[4500] to SG-FW-WAN-IP[4500] (124 bytes)
    2022-06-03 08:06:14Z 24[NET] <tunnelname-1|58> received packet: from SG-FW-WAN-IP[4500] to XGS-FW-WAN-NAT-IP[4500] (124 bytes)
    2022-06-03 08:06:14Z 24[ENC] <tunnelname-1|58> parsed INFORMATIONAL_V1 request 351814111 [ HASH N(DPD_ACK) ]
    2022-06-03 08:06:15Z 11[CFG] <tunnelname-1|58> HA 43 spis in tunnelname-1 CHILD ADD resync list
    2022-06-03 08:06:27Z 06[NET] <tunnelname-1|58> received packet: from SG-FW-WAN-IP[4500] to XGS-FW-WAN-NAT-IP[4500] (572 bytes)
    2022-06-03 08:06:27Z 06[ENC] <tunnelname-1|58> parsed QUICK_MODE request 152949676 [ HASH SA No KE ID ID ]
    2022-06-03 08:06:27Z 06[IKE] <tunnelname-1|58> ### process_request invoking quick_mode_create
    2022-06-03 08:06:27Z 06[IKE] <tunnelname-1|58> ### quick_mode_create: 0x7f75ac0096b0 config (nil)
    2022-06-03 08:06:27Z 06[IKE] <tunnelname-1|58> ### process_r: 0x7f75ac0096b0 QM_INIT
    2022-06-03 08:06:27Z 06[IKE] <tunnelname-1|58> detected rekeying of CHILD_SA tunnelname-58{4056}
    2022-06-03 08:06:27Z 06[IKE] <tunnelname-1|58> ### build_r: 0x7f75ac0096b0 QM_INIT
    2022-06-03 08:06:27Z 06[ENC] <tunnelname-1|58> generating QUICK_MODE response 152949676 [ HASH SA No KE ID ID ]
    2022-06-03 08:06:27Z 06[NET] <tunnelname-1|58> sending packet: from XGS-FW-WAN-NAT-IP[4500] to SG-FW-WAN-IP[4500] (604 bytes)
    2022-06-03 08:06:27Z 22[NET] <tunnelname-1|58> received packet: from SG-FW-WAN-IP[4500] to XGS-FW-WAN-NAT-IP[4500] (92 bytes)
    2022-06-03 08:06:27Z 22[ENC] <tunnelname-1|58> parsed QUICK_MODE request 152949676 [ HASH ]
    2022-06-03 08:06:27Z 22[IKE] <tunnelname-1|58> ### process_r: 0x7f75ac0096b0 QM_NEGOTIATED
    2022-06-03 08:06:27Z 22[CFG] <tunnelname-1|58> handling HA CHILD_SA tunnelname-58{4118} xxx.xxx.xxx.xxx/27 === xxx.xxx.xxx.xxx/32 (segment in: 1*, out: 1*)
    2022-06-03 08:06:27Z 22[IKE] <tunnelname-1|58> CHILD_SA tunnelname-58{4118} established with SPIs cdc76a34_i 6b95908f_o and TS xxx.xxx.xxx.xxx/27 === xxx.xxx.xxx.xxx/32
    2022-06-03 08:06:27Z 22[IKE] <tunnelname-1|58> ### destroy: 0x7f75ac0096b0
    2022-06-03 08:06:28Z 02[KNL] creating rekey job for CHILD_SA ESP/0xbxxx.xxx.xxx.xxx/SG-FW-WAN-IP
    2022-06-03 08:06:30Z 21[NET] <tunnelname-1|58> received packet: from SG-FW-WAN-IP[4500] to XGS-FW-WAN-NAT-IP[4500] (572 bytes)
    2022-06-03 08:06:30Z 21[ENC] <tunnelname-1|58> parsed QUICK_MODE request 1523993535 [ HASH SA No KE ID ID ]
    2022-06-03 08:06:30Z 21[IKE] <tunnelname-1|58> ### process_request invoking quick_mode_create
    2022-06-03 08:06:30Z 21[IKE] <tunnelname-1|58> ### quick_mode_create: 0x7f7598008c30 config (nil)
    2022-06-03 08:06:30Z 21[IKE] <tunnelname-1|58> ### process_r: 0x7f7598008c30 QM_INIT
    2022-06-03 08:06:31Z 21[IKE] <tunnelname-1|58> detected rekeying of CHILD_SA tunnelname-41{4051}
    2022-06-03 08:06:31Z 21[IKE] <tunnelname-1|58> ### build_r: 0x7f7598008c30 QM_INIT
    2022-06-03 08:06:31Z 21[ENC] <tunnelname-1|58> generating QUICK_MODE response 1523993535 [ HASH SA No KE ID ID ]
    2022-06-03 08:06:31Z 21[NET] <tunnelname-1|58> sending packet: from XGS-FW-WAN-NAT-IP[4500] to SG-FW-WAN-IP[4500] (604 bytes)
    2022-06-03 08:06:31Z 17[NET] <tunnelname-1|58> received packet: from SG-FW-WAN-IP[4500] to XGS-FW-WAN-NAT-IP[4500] (92 bytes)
    2022-06-03 08:06:31Z 17[ENC] <tunnelname-1|58> parsed QUICK_MODE request 1523993535 [ HASH ]
    2022-06-03 08:06:31Z 17[IKE] <tunnelname-1|58> ### process_r: 0x7f7598008c30 QM_NEGOTIATED
    2022-06-03 08:06:31Z 17[CFG] <tunnelname-1|58> handling HA CHILD_SA tunnelname-41{4119} xxx.xxx.xxx.xxx/27 === xxx.xxx.xxx.xxx/32 (segment in: 1*, out: 1*)
    2022-06-03 08:06:31Z 17[IKE] <tunnelname-1|58> CHILD_SA tunnelname-41{4119} established with SPIs c1131433_i 39f6fee9_o and TS xxx.xxx.xxx.xxx/27 === xxx.xxx.xxx.xxx/32
    2022-06-03 08:06:31Z 17[IKE] <tunnelname-1|58> ### destroy: 0x7f7598008c30
    2022-06-03 08:06:46Z 12[KNL] creating rekey job for CHILD_SA ESP/0x0ec4e6c8/SG-FW-WAN-IP
    2022-06-03 08:06:57Z 20[NET] <tunnelname-1|58> received packet: from SG-FW-WAN-IP[4500] to XGS-FW-WAN-NAT-IP[4500] (588 bytes)
    2022-06-03 08:06:57Z 20[ENC] <tunnelname-1|58> parsed QUICK_MODE request 616418364 [ HASH SA No KE ID ID ]
    2022-06-03 08:06:57Z 20[IKE] <tunnelname-1|58> ### process_request invoking quick_mode_create
    2022-06-03 08:06:57Z 20[IKE] <tunnelname-1|58> ### quick_mode_create: 0x7f7564007870 config (nil)
    2022-06-03 08:06:57Z 20[IKE] <tunnelname-1|58> ### process_r: 0x7f7564007870 QM_INIT
    2022-06-03 08:06:57Z 20[IKE] <tunnelname-1|58> detected rekeying of CHILD_SA tunnelname-43{4058}
    2022-06-03 08:06:57Z 20[IKE] <tunnelname-1|58> ### build_r: 0x7f7564007870 QM_INIT
    2022-06-03 08:06:57Z 20[ENC] <tunnelname-1|58> generating QUICK_MODE response 616418364 [ HASH SA No KE ID ID ]
    2022-06-03 08:06:57Z 20[NET] <tunnelname-1|58> sending packet: from XGS-FW-WAN-NAT-IP[4500] to SG-FW-WAN-IP[4500] (604 bytes)
    2022-06-03 08:06:57Z 14[NET] <tunnelname-1|58> received packet: from SG-FW-WAN-IP[4500] to XGS-FW-WAN-NAT-IP[4500] (92 bytes)
    2022-06-03 08:06:57Z 14[ENC] <tunnelname-1|58> parsed QUICK_MODE request 616418364 [ HASH ]
    2022-06-03 08:06:57Z 14[IKE] <tunnelname-1|58> ### process_r: 0x7f7564007870 QM_NEGOTIATED
    2022-06-03 08:06:57Z 14[CFG] <tunnelname-1|58> handling HA CHILD_SA tunnelname-43{4120} xxx.xxx.xxx.xxx/27 === xxx.xxx.xxx.xxx/24 (segment in: 1*, out: 1*)
    2022-06-03 08:06:57Z 14[IKE] <tunnelname-1|58> CHILD_SA tunnelname-43{4120} established with SPIs c2994d6f_i dea90648_o and TS xxx.xxx.xxx.xxx/27 === xxx.xxx.xxx.xxx/24
    2022-06-03 08:06:57Z 14[IKE] <tunnelname-1|58> ### destroy: 0x7f7564007870
    2022-06-03 08:06:59Z 31[NET] <tunnelname-1|58> received packet: from SG-FW-WAN-IP[4500] to XGS-FW-WAN-NAT-IP[4500] (572 bytes)
    2022-06-03 08:06:59Z 31[ENC] <tunnelname-1|58> parsed QUICK_MODE request 2403903418 [ HASH SA No KE ID ID ]
    2022-06-03 08:06:59Z 31[IKE] <tunnelname-1|58> ### process_request invoking quick_mode_create
    2022-06-03 08:06:59Z 31[IKE] <tunnelname-1|58> ### quick_mode_create: 0x7f757400ceb0 config (nil)
    2022-06-03 08:06:59Z 31[IKE] <tunnelname-1|58> ### process_r: 0x7f757400ceb0 QM_INIT
    2022-06-03 08:07:00Z 31[IKE] <tunnelname-1|58> detected rekeying of CHILD_SA tunnelname-52{4053}
    2022-06-03 08:07:00Z 31[IKE] <tunnelname-1|58> ### build_r: 0x7f757400ceb0 QM_INIT
    2022-06-03 08:07:00Z 31[ENC] <tunnelname-1|58> generating QUICK_MODE response 2403903418 [ HASH SA No KE ID ID ]
    2022-06-03 08:07:00Z 31[NET] <tunnelname-1|58> sending packet: from XGS-FW-WAN-NAT-IP[4500] to SG-FW-WAN-IP[4500] (604 bytes)
    2022-06-03 08:07:00Z 25[NET] <tunnelname-1|58> received packet: from SG-FW-WAN-IP[4500] to XGS-FW-WAN-NAT-IP[4500] (92 bytes)
    2022-06-03 08:07:00Z 25[ENC] <tunnelname-1|58> parsed QUICK_MODE request 2403903418 [ HASH ]
    2022-06-03 08:07:00Z 25[IKE] <tunnelname-1|58> ### process_r: 0x7f757400ceb0 QM_NEGOTIATED
    2022-06-03 08:07:00Z 25[CFG] <tunnelname-1|58> handling HA CHILD_SA tunnelname-52{4121} xxx.xxx.xxx.xxx/27 === xxx.xxx.xxx.xxx/32 (segment in: 1*, out: 1*)
    2022-06-03 08:07:00Z 25[IKE] <tunnelname-1|58> CHILD_SA tunnelname-52{4121} established with SPIs c8b8c5fd_i a3079923_o and TS xxx.xxx.xxx.xxx/27 === xxx.xxx.xxx.xxx/32
    2022-06-03 08:07:00Z 25[IKE] <tunnelname-1|58> ### destroy: 0x7f757400ceb0
    2022-06-03 08:07:00Z 30[NET] <tunnelname-1|58> received packet: from SG-FW-WAN-IP[4500] to XGS-FW-WAN-NAT-IP[4500] (108 bytes)
    2022-06-03 08:07:00Z 30[ENC] <tunnelname-1|58> parsed INFORMATIONAL_V1 request 2345038882 [ HASH D ]
    2022-06-03 08:07:00Z 30[IKE] <tunnelname-1|58> received DELETE for ESP CHILD_SA with SPI 0da4eade
    2022-06-03 08:07:00Z 30[IKE] <tunnelname-1|58> closing CHILD_SA tunnelname-50{4031} with SPIs c83ab67b_i (0 bytes) 0da4eade_o (0 bytes) and TS xxx.xxx.xxx.xxx/27 === xxx.xxx.xxx.xxx/32
    2022-06-03 08:07:03Z 12[NET] <tunnelname-1|58> received packet: from SG-FW-WAN-IP[4500] to XGS-FW-WAN-NAT-IP[4500] (572 bytes)
    2022-06-03 08:07:03Z 12[ENC] <tunnelname-1|58> parsed QUICK_MODE request 2002847276 [ HASH SA No KE ID ID ]
    2022-06-03 08:07:03Z 12[IKE] <tunnelname-1|58> ### process_request invoking quick_mode_create
    2022-06-03 08:07:03Z 12[IKE] <tunnelname-1|58> ### quick_mode_create: 0x7f75d0008830 config (nil)
    2022-06-03 08:07:03Z 12[IKE] <tunnelname-1|58> ### process_r: 0x7f75d0008830 QM_INIT
    2022-06-03 08:07:03Z 12[IKE] <tunnelname-1|58> detected rekeying of CHILD_SA tunnelname-55{4049}
    2022-06-03 08:07:03Z 12[IKE] <tunnelname-1|58> ### build_r: 0x7f75d0008830 QM_INIT
    2022-06-03 08:07:03Z 12[ENC] <tunnelname-1|58> generating QUICK_MODE response 2002847276 [ HASH SA No KE ID ID ]
    2022-06-03 08:07:03Z 12[NET] <tunnelname-1|58> sending packet: from XGS-FW-WAN-NAT-IP[4500] to SG-FW-WAN-IP[4500] (604 bytes)
    2022-06-03 08:07:03Z 20[NET] <tunnelname-1|58> received packet: from SG-FW-WAN-IP[4500] to XGS-FW-WAN-NAT-IP[4500] (92 bytes)
    2022-06-03 08:07:03Z 20[ENC] <tunnelname-1|58> parsed QUICK_MODE request 2002847276 [ HASH ]
    2022-06-03 08:07:03Z 20[IKE] <tunnelname-1|58> ### process_r: 0x7f75d0008830 QM_NEGOTIATED
    2022-06-03 08:07:03Z 20[CFG] <tunnelname-1|58> handling HA CHILD_SA tunnelname-55{4122} xxx.xxx.xxx.xxx/27 === xxx.xxx.xxx.xxx/32 (segment in: 1*, out: 1*)
    2022-06-03 08:07:03Z 20[IKE] <tunnelname-1|58> CHILD_SA tunnelname-55{4122} established with SPIs cf093bc7_i 9d5a5ba4_o and TS xxx.xxx.xxx.xxx/27 === xxx.xxx.xxx.xxx/32
    2022-06-03 08:07:03Z 20[IKE] <tunnelname-1|58> ### destroy: 0x7f75d0008830
    2022-06-03 08:07:30Z 10[KNL] creating delete job for CHILD_SA ESP/0xcb525105/XGS-FW-WAN-NAT-IP
    2022-06-03 08:07:30Z 18[KNL] creating delete job for CHILD_SA ESP/0x5fabbe8a/SG-FW-WAN-IP
    2022-06-03 08:07:30Z 26[IKE] <tunnelname-1|58> closing expired CHILD_SA tunnelname-62{4032} with SPIs cb525105_i 5fabbe8a_o and TS xxx.xxx.xxx.xxx/25 === xxx.xxx.xxx.xxx/32
    2022-06-03 08:07:30Z 26[IKE] <tunnelname-1|58> sending DELETE for ESP CHILD_SA with SPI cb525105
    2022-06-03 08:07:30Z 26[ENC] <tunnelname-1|58> generating INFORMATIONAL_V1 request 2334813192 [ HASH D ]
    2022-06-03 08:07:30Z 26[NET] <tunnelname-1|58> sending packet: from XGS-FW-WAN-NAT-IP[4500] to SG-FW-WAN-IP[4500] (108 bytes)
    2022-06-03 08:07:30Z 18[JOB] CHILD_SA ESP/0x5fabbe8a/SG-FW-WAN-IP not found for delete
    2022-06-03 08:07:30Z 21[NET] <tunnelname-1|58> received packet: from SG-FW-WAN-IP[4500] to XGS-FW-WAN-NAT-IP[4500] (108 bytes)
    2022-06-03 08:07:30Z 21[ENC] <tunnelname-1|58> parsed INFORMATIONAL_V1 request 1514138435 [ HASH D ]
    2022-06-03 08:07:30Z 21[IKE] <tunnelname-1|58> received DELETE for ESP CHILD_SA with SPI 5fabbe8a
    2022-06-03 08:07:30Z 21[IKE] <tunnelname-1|58> CHILD_SA not found, ignored
    2022-06-03 08:07:40Z 21[NET] <tunnelname-1|58> received packet: from SG-FW-WAN-IP[4500] to XGS-FW-WAN-NAT-IP[4500] (572 bytes)
    2022-06-03 08:07:40Z 21[ENC] <tunnelname-1|58> parsed QUICK_MODE request 4094176470 [ HASH SA No KE ID ID ]
    2022-06-03 08:07:40Z 21[IKE] <tunnelname-1|58> ### process_request invoking quick_mode_create
    2022-06-03 08:07:40Z 21[IKE] <tunnelname-1|58> ### quick_mode_create: 0x7f7598008a50 config (nil)
    2022-06-03 08:07:40Z 21[IKE] <tunnelname-1|58> ### process_r: 0x7f7598008a50 QM_INIT
    2022-06-03 08:07:40Z 21[IKE] <tunnelname-1|58> detected rekeying of CHILD_SA tunnelname-9{4050}
    2022-06-03 08:07:40Z 21[IKE] <tunnelname-1|58> ### build_r: 0x7f7598008a50 QM_INIT
    2022-06-03 08:07:40Z 21[ENC] <tunnelname-1|58> generating QUICK_MODE response 4094176470 [ HASH SA No KE ID ID ]
    2022-06-03 08:07:40Z 21[NET] <tunnelname-1|58> sending packet: from XGS-FW-WAN-NAT-IP[4500] to SG-FW-WAN-IP[4500] (604 bytes)
    2022-06-03 08:07:40Z 19[NET] <tunnelname-1|58> received packet: from SG-FW-WAN-IP[4500] to XGS-FW-WAN-NAT-IP[4500] (92 bytes)
    2022-06-03 08:07:40Z 19[ENC] <tunnelname-1|58> parsed QUICK_MODE request 4094176470 [ HASH ]
    2022-06-03 08:07:40Z 19[IKE] <tunnelname-1|58> ### process_r: 0x7f7598008a50 QM_NEGOTIATED
    2022-06-03 08:07:40Z 19[CFG] <tunnelname-1|58> handling HA CHILD_SA tunnelname-9{4123} xxx.xxx.xxx.xxx/25 === xxx.xxx.xxx.xxx/32 (segment in: 1*, out: 1*)
    2022-06-03 08:07:40Z 19[IKE] <tunnelname-1|58> CHILD_SA tunnelname-9{4123} established with SPIs cf8cf3d1_i 676f1b9a_o and TS xxx.xxx.xxx.xxx/25 === xxx.xxx.xxx.xxx/32
    2022-06-03 08:07:40Z 19[IKE] <tunnelname-1|58> ### destroy: 0x7f7598008a50
    2022-06-03 08:07:46Z 26[KNL] creating rekey job for CHILD_SA ESP/0xcxxx.xxx.xxx.xxx/XGS-FW-WAN-NAT-IP
    2022-06-03 08:08:11Z 06[NET] <tunnelname-1|58> received packet: from SG-FW-WAN-IP[4500] to XGS-FW-WAN-NAT-IP[4500] (572 bytes)
    2022-06-03 08:08:11Z 06[ENC] <tunnelname-1|58> parsed QUICK_MODE request 2336490488 [ HASH SA No KE ID ID ]
    2022-06-03 08:08:11Z 06[IKE] <tunnelname-1|58> ### process_request invoking quick_mode_create
    2022-06-03 08:08:11Z 06[IKE] <tunnelname-1|58> ### quick_mode_create: 0x7f75ac0096b0 config (nil)
    2022-06-03 08:08:11Z 06[IKE] <tunnelname-1|58> ### process_r: 0x7f75ac0096b0 QM_INIT
    2022-06-03 08:08:11Z 06[IKE] <tunnelname-1|58> detected rekeying of CHILD_SA tunnelname-46{4046}
    2022-06-03 08:08:11Z 06[IKE] <tunnelname-1|58> ### build_r: 0x7f75ac0096b0 QM_INIT
    2022-06-03 08:08:11Z 06[ENC] <tunnelname-1|58> generating QUICK_MODE response 2336490488 [ HASH SA No KE ID ID ]
    2022-06-03 08:08:11Z 06[NET] <tunnelname-1|58> sending packet: from XGS-FW-WAN-NAT-IP[4500] to SG-FW-WAN-IP[4500] (604 bytes)
    2022-06-03 08:08:11Z 02[NET] <tunnelname-1|58> received packet: from SG-FW-WAN-IP[4500] to XGS-FW-WAN-NAT-IP[4500] (92 bytes)
    2022-06-03 08:08:11Z 02[ENC] <tunnelname-1|58> parsed QUICK_MODE request 2336490488 [ HASH ]
    2022-06-03 08:08:11Z 02[IKE] <tunnelname-1|58> ### process_r: 0x7f75ac0096b0 QM_NEGOTIATED
    2022-06-03 08:08:11Z 02[CFG] <tunnelname-1|58> handling HA CHILD_SA tunnelname-46{4124} xxx.xxx.xxx.xxx/27 === xxx.xxx.xxx.xxx/32 (segment in: 1*, out: 1*)
    2022-06-03 08:08:11Z 02[IKE] <tunnelname-1|58> CHILD_SA tunnelname-46{4124} established with SPIs ce9a3e2c_i ed638e48_o and TS xxx.xxx.xxx.xxx/27 === xxx.xxx.xxx.xxx/32
    2022-06-03 08:08:11Z 02[IKE] <tunnelname-1|58> ### destroy: 0x7f75ac0096b0
    2022-06-03 08:08:13Z 31[KNL] creating rekey job for CHILD_SA ESP/xxx.xxx.xxx.xxx/SG-FW-WAN-IP
    2022-06-03 08:08:16Z 21[NET] <tunnelname-1|58> received packet: from SG-FW-WAN-IP[4500] to XGS-FW-WAN-NAT-IP[4500] (572 bytes)
    2022-06-03 08:08:16Z 21[ENC] <tunnelname-1|58> parsed QUICK_MODE request 3370311910 [ HASH SA No KE ID ID ]
    2022-06-03 08:08:16Z 21[IKE] <tunnelname-1|58> ### process_request invoking quick_mode_create
    2022-06-03 08:08:16Z 21[IKE] <tunnelname-1|58> ### quick_mode_create: 0x7f7598004410 config (nil)
    2022-06-03 08:08:16Z 21[IKE] <tunnelname-1|58> ### process_r: 0x7f7598004410 QM_INIT
    2022-06-03 08:08:16Z 21[IKE] <tunnelname-1|58> detected rekeying of CHILD_SA tunnelname-45{4048}
    2022-06-03 08:08:16Z 21[IKE] <tunnelname-1|58> ### build_r: 0x7f7598004410 QM_INIT
    2022-06-03 08:08:16Z 21[ENC] <tunnelname-1|58> generating QUICK_MODE response 3370311910 [ HASH SA No KE ID ID ]
    2022-06-03 08:08:16Z 21[NET] <tunnelname-1|58> sending packet: from XGS-FW-WAN-NAT-IP[4500] to SG-FW-WAN-IP[4500] (604 bytes)
    2022-06-03 08:08:16Z 15[NET] <tunnelname-1|58> received packet: from SG-FW-WAN-IP[4500] to XGS-FW-WAN-NAT-IP[4500] (92 bytes)
    2022-06-03 08:08:16Z 15[ENC] <tunnelname-1|58> parsed QUICK_MODE request 3370311910 [ HASH ]
    2022-06-03 08:08:16Z 15[IKE] <tunnelname-1|58> ### process_r: 0x7f7598004410 QM_NEGOTIATED
    2022-06-03 08:08:16Z 15[CFG] <tunnelname-1|58> handling HA CHILD_SA tunnelname-45{4125} xxx.xxx.xxx.xxx/27 === xxx.xxx.xxx.xxx/32 (segment in: 1*, out: 1*)
    2022-06-03 08:08:16Z 15[IKE] <tunnelname-1|58> CHILD_SA tunnelname-45{4125} established with SPIs c64052b5_i cb8cfd9f_o and TS xxx.xxx.xxx.xxx/27 === xxx.xxx.xxx.xxx/32
    2022-06-03 08:08:16Z 15[IKE] <tunnelname-1|58> ### destroy: 0x7f7598004410
    2022-06-03 08:08:26Z 21[KNL] creating rekey job for CHILD_SA ESP/0xc7f4cf9f/XGS-FW-WAN-NAT-IP
    2022-06-03 08:08:31Z 25[NET] <tunnelname-1|58> received packet: from SG-FW-WAN-IP[4500] to XGS-FW-WAN-NAT-IP[4500] (108 bytes)
    2022-06-03 08:08:31Z 25[ENC] <tunnelname-1|58> parsed INFORMATIONAL_V1 request 376245808 [ HASH D ]
    2022-06-03 08:08:31Z 25[IKE] <tunnelname-1|58> received DELETE for ESP CHILD_SA with SPI 7a299eca
    2022-06-03 08:08:31Z 25[IKE] <tunnelname-1|58> closing CHILD_SA tunnelname-32{4033} with SPIs ca2a377a_i (0 bytes) 7a299eca_o (0 bytes) and TS xxx.xxx.xxx.xxx/26 === xxx.xxx.xxx.xxx/32
    2022-06-03 08:08:35Z 19[NET] <tunnelname-1|58> received packet: from SG-FW-WAN-IP[4500] to XGS-FW-WAN-NAT-IP[4500] (572 bytes)
    2022-06-03 08:08:35Z 19[ENC] <tunnelname-1|58> parsed QUICK_MODE request 226646867 [ HASH SA No KE ID ID ]
    2022-06-03 08:08:35Z 19[IKE] <tunnelname-1|58> ### process_request invoking quick_mode_create
    2022-06-03 08:08:35Z 19[IKE] <tunnelname-1|58> ### quick_mode_create: 0x7f759400dca0 config (nil)
    2022-06-03 08:08:35Z 19[IKE] <tunnelname-1|58> ### process_r: 0x7f759400dca0 QM_INIT
    2022-06-03 08:08:35Z 19[IKE] <tunnelname-1|58> detected rekeying of CHILD_SA tunnelname-54{4054}
    2022-06-03 08:08:35Z 19[IKE] <tunnelname-1|58> ### build_r: 0x7f759400dca0 QM_INIT
    2022-06-03 08:08:35Z 19[ENC] <tunnelname-1|58> generating QUICK_MODE response 226646867 [ HASH SA No KE ID ID ]
    2022-06-03 08:08:35Z 19[NET] <tunnelname-1|58> sending packet: from XGS-FW-WAN-NAT-IP[4500] to SG-FW-WAN-IP[4500] (604 bytes)
    2022-06-03 08:08:35Z 21[NET] <tunnelname-1|58> received packet: from SG-FW-WAN-IP[4500] to XGS-FW-WAN-NAT-IP[4500] (92 bytes)
    2022-06-03 08:08:35Z 21[ENC] <tunnelname-1|58> parsed QUICK_MODE request 226646867 [ HASH ]
    2022-06-03 08:08:35Z 21[IKE] <tunnelname-1|58> ### process_r: 0x7f759400dca0 QM_NEGOTIATED
    2022-06-03 08:08:35Z 21[CFG] <tunnelname-1|58> handling HA CHILD_SA tunnelname-54{4126} xxx.xxx.xxx.xxx/27 === xxx.xxx.xxx.xxx/32 (segment in: 1*, out: 1*)
    2022-06-03 08:08:35Z 21[IKE] <tunnelname-1|58> CHILD_SA tunnelname-54{4126} established with SPIs c76f7ebb_i a751dec5_o and TS xxx.xxx.xxx.xxx/27 === xxx.xxx.xxx.xxx/32
    2022-06-03 08:08:35Z 21[IKE] <tunnelname-1|58> ### destroy: 0x7f759400dca0
    2022-06-03 08:08:41Z 17[NET] <tunnelname-1|58> received packet: from SG-FW-WAN-IP[4500] to XGS-FW-WAN-NAT-IP[4500] (572 bytes)
    2022-06-03 08:08:41Z 17[ENC] <tunnelname-1|58> parsed QUICK_MODE request 854397014 [ HASH SA No KE ID ID ]
    2022-06-03 08:08:41Z 17[IKE] <tunnelname-1|58> ### process_request invoking quick_mode_create
    2022-06-03 08:08:41Z 17[IKE] <tunnelname-1|58> ### quick_mode_create: 0x7f75a0008680 config (nil)
    2022-06-03 08:08:41Z 17[IKE] <tunnelname-1|58> ### process_r: 0x7f75a0008680 QM_INIT
    2022-06-03 08:08:41Z 17[IKE] <tunnelname-1|58> detected rekeying of CHILD_SA tunnelname-37{4055}
    2022-06-03 08:08:41Z 17[IKE] <tunnelname-1|58> ### build_r: 0x7f75a0008680 QM_INIT
    2022-06-03 08:08:41Z 17[ENC] <tunnelname-1|58> generating QUICK_MODE response 854397014 [ HASH SA No KE ID ID ]
    2022-06-03 08:08:41Z 17[NET] <tunnelname-1|58> sending packet: from XGS-FW-WAN-NAT-IP[4500] to SG-FW-WAN-IP[4500] (604 bytes)
    2022-06-03 08:08:41Z 26[NET] <tunnelname-1|58> received packet: from SG-FW-WAN-IP[4500] to XGS-FW-WAN-NAT-IP[4500] (92 bytes)
    2022-06-03 08:08:41Z 26[ENC] <tunnelname-1|58> parsed QUICK_MODE request 854397014 [ HASH ]
    2022-06-03 08:08:41Z 26[IKE] <tunnelname-1|58> ### process_r: 0x7f75a0008680 QM_NEGOTIATED
    2022-06-03 08:08:41Z 26[CFG] <tunnelname-1|58> handling HA CHILD_SA tunnelname-37{4127} xxx.xxx.xxx.xxx/26 === xxx.xxx.xxx.xxx/32 (segment in: 1*, out: 1*)
    2022-06-03 08:08:41Z 26[IKE] <tunnelname-1|58> CHILD_SA tunnelname-37{4127} established with SPIs c83e0601_i 00ff5024_o and TS xxx.xxx.xxx.xxx/26 === xxx.xxx.xxx.xxx/32
    2022-06-03 08:08:41Z 26[IKE] <tunnelname-1|58> ### destroy: 0x7f75a0008680
    2022-06-03 08:09:00Z 22[NET] <tunnelname-1|58> received packet: from SG-FW-WAN-IP[4500] to XGS-FW-WAN-NAT-IP[4500] (108 bytes)
    2022-06-03 08:09:00Z 22[ENC] <tunnelname-1|58> parsed INFORMATIONAL_V1 request 420419334 [ HASH D ]
    2022-06-03 08:09:00Z 22[IKE] <tunnelname-1|58> received DELETE for ESP CHILD_SA with SPI 0ec4e6c8
    2022-06-03 08:09:00Z 22[IKE] <tunnelname-1|58> closing CHILD_SA tunnelname-44{4034} with SPIs c5cfc32f_i (0 bytes) 0ec4e6c8_o (0 bytes) and TS xxx.xxx.xxx.xxx/27 === xxx.xxx.xxx.xxx/32
    2022-06-03 08:09:38Z 18[IKE] <tunnelname-1|58> sending DPD request
    2022-06-03 08:09:38Z 18[ENC] <tunnelname-1|58> generating INFORMATIONAL_V1 request 1093052757 [ HASH N(DPD) ]
    2022-06-03 08:09:38Z 18[NET] <tunnelname-1|58> sending packet: from XGS-FW-WAN-NAT-IP[4500] to SG-FW-WAN-IP[4500] (124 bytes)
    2022-06-03 08:09:38Z 19[NET] <tunnelname-1|58> received packet: from SG-FW-WAN-IP[4500] to XGS-FW-WAN-NAT-IP[4500] (124 bytes)
    2022-06-03 08:09:38Z 19[ENC] <tunnelname-1|58> parsed INFORMATIONAL_V1 request 1514235859 [ HASH N(DPD_ACK) ]
    2022-06-03 08:09:52Z 14[KNL] creating delete job for CHILD_SA ESP/0xcxxx.xxx.xxx.xxx/XGS-FW-WAN-NAT-IP
    2022-06-03 08:09:52Z 32[KNL] creating delete job for CHILD_SA ESP/0xbxxx.xxx.xxx.xxx/SG-FW-WAN-IP
    2022-06-03 08:09:52Z 20[IKE] <tunnelname-1|58> closing expired CHILD_SA tunnelname-11{4035} with SPIs c907b3d2_i b7f1b5e0_o and TS XGS-FW-LAN-IP28/25 === xxx.xxx.xxx.xxx/32
    2022-06-03 08:09:52Z 20[IKE] <tunnelname-1|58> sending DELETE for ESP CHILD_SA with SPI c907b3d2
    2022-06-03 08:09:52Z 20[ENC] <tunnelname-1|58> generating INFORMATIONAL_V1 request 2586346827 [ HASH D ]
    2022-06-03 08:09:52Z 20[NET] <tunnelname-1|58> sending packet: from XGS-FW-WAN-NAT-IP[4500] to SG-FW-WAN-IP[4500] (108 bytes)
    2022-06-03 08:09:52Z 32[JOB] CHILD_SA ESP/0xbxxx.xxx.xxx.xxx/SG-FW-WAN-IP not found for delete
    2022-06-03 08:09:52Z 02[NET] <tunnelname-1|58> received packet: from SG-FW-WAN-IP[4500] to XGS-FW-WAN-NAT-IP[4500] (108 bytes)
    2022-06-03 08:09:52Z 02[ENC] <tunnelname-1|58> parsed INFORMATIONAL_V1 request 3107414305 [ HASH D ]
    2022-06-03 08:09:52Z 02[IKE] <tunnelname-1|58> received DELETE for ESP CHILD_SA with SPI b7f1b5e0
    2022-06-03 08:09:52Z 02[IKE] <tunnelname-1|58> CHILD_SA not found, ignored
    2022-06-03 08:10:01Z 31[KNL] creating rekey job for CHILD_SA ESP/0xc6bd4239/XGS-FW-WAN-NAT-IP
    2022-06-03 08:10:22Z 32[IKE] <tunnelname-1|58> sending DPD request
    2022-06-03 08:10:22Z 32[ENC] <tunnelname-1|58> generating INFORMATIONAL_V1 request 1221604148 [ HASH N(DPD) ]
    2022-06-03 08:10:22Z 32[NET] <tunnelname-1|58> sending packet: from XGS-FW-WAN-NAT-IP[4500] to SG-FW-WAN-IP[4500] (124 bytes)
    2022-06-03 08:10:22Z 02[NET] <tunnelname-1|58> received packet: from SG-FW-WAN-IP[4500] to XGS-FW-WAN-NAT-IP[4500] (124 bytes)
    2022-06-03 08:10:22Z 02[ENC] <tunnelname-1|58> parsed INFORMATIONAL_V1 request 2500160914 [ HASH N(DPD_ACK) ]
    2022-06-03 08:10:36Z 30[KNL] creating rekey job for CHILD_SA ESP/0xbebadb2d/SG-FW-WAN-IP
    2022-06-03 08:10:45Z 02[NET] <tunnelname-1|58> received packet: from SG-FW-WAN-IP[4500] to XGS-FW-WAN-NAT-IP[4500] (572 bytes)
    2022-06-03 08:10:45Z 02[ENC] <tunnelname-1|58> parsed QUICK_MODE request 1004928474 [ HASH SA No KE ID ID ]
    2022-06-03 08:10:45Z 02[IKE] <tunnelname-1|58> ### process_request invoking quick_mode_create
    2022-06-03 08:10:45Z 02[IKE] <tunnelname-1|58> ### quick_mode_create: 0x7f75a4004da0 config (nil)
    2022-06-03 08:10:45Z 02[IKE] <tunnelname-1|58> ### process_r: 0x7f75a4004da0 QM_INIT
    2022-06-03 08:10:45Z 02[IKE] <tunnelname-1|58> detected rekeying of CHILD_SA tunnelname-21{4059}
    2022-06-03 08:10:45Z 02[IKE] <tunnelname-1|58> ### build_r: 0x7f75a4004da0 QM_INIT
    2022-06-03 08:10:45Z 02[ENC] <tunnelname-1|58> generating QUICK_MODE response 1004928474 [ HASH SA No KE ID ID ]
    2022-06-03 08:10:45Z 02[NET] <tunnelname-1|58> sending packet: from XGS-FW-WAN-NAT-IP[4500] to SG-FW-WAN-IP[4500] (604 bytes)
    2022-06-03 08:10:45Z 10[NET] <tunnelname-1|58> received packet: from SG-FW-WAN-IP[4500] to XGS-FW-WAN-NAT-IP[4500] (92 bytes)
    2022-06-03 08:10:45Z 10[ENC] <tunnelname-1|58> parsed QUICK_MODE request 1004928474 [ HASH ]
    2022-06-03 08:10:45Z 10[IKE] <tunnelname-1|58> ### process_r: 0x7f75a4004da0 QM_NEGOTIATED
    2022-06-03 08:10:45Z 10[CFG] <tunnelname-1|58> handling HA CHILD_SA tunnelname-21{4128} xxx.xxx.xxx.xxx/24 === xxx.xxx.xxx.xxx/32 (segment in: 1*, out: 1*)
    2022-06-03 08:10:45Z 10[IKE] <tunnelname-1|58> CHILD_SA tunnelname-21{4128} established with SPIs cf548c98_i 615258ac_o and TS xxx.xxx.xxx.xxx/24 === xxx.xxx.xxx.xxx/32
    2022-06-03 08:10:45Z 10[IKE] <tunnelname-1|58> ### destroy: 0x7f75a4004da0
    2022-06-03 08:10:53Z 25[KNL] creating rekey job for CHILD_SA ESP/0xc44d641a/XGS-FW-WAN-NAT-IP
    2022-06-03 08:10:55Z 26[KNL] creating rekey job for CHILD_SA ESP/0xc4d15eec/XGS-FW-WAN-NAT-IP
    2022-06-03 08:11:03Z 25[KNL] creating rekey job for CHILD_SA ESP/0x1d2be6f8/SG-FW-WAN-IP
    2022-06-03 08:11:16Z 19[KNL] creating rekey job for CHILD_SA ESP/0xcxxx.xxx.xxx.xxx/XGS-FW-WAN-NAT-IP
    2022-06-03 08:11:18Z 12[IKE] <tunnelname-1|58> sending DPD request
    2022-06-03 08:11:18Z 12[ENC] <tunnelname-1|58> generating INFORMATIONAL_V1 request 1294100783 [ HASH N(DPD) ]
    2022-06-03 08:11:18Z 12[NET] <tunnelname-1|58> sending packet: from XGS-FW-WAN-NAT-IP[4500] to SG-FW-WAN-IP[4500] (124 bytes)
    2022-06-03 08:11:18Z 06[NET] <tunnelname-1|58> received packet: from SG-FW-WAN-IP[4500] to XGS-FW-WAN-NAT-IP[4500] (124 bytes)
    2022-06-03 08:11:18Z 06[ENC] <tunnelname-1|58> parsed INFORMATIONAL_V1 request 2437636154 [ HASH N(DPD_ACK) ]
    2022-06-03 08:11:27Z 15[KNL] creating delete job for CHILD_SA ESP/0xc7f4cf9f/XGS-FW-WAN-NAT-IP
    2022-06-03 08:11:27Z 06[KNL] creating delete job for CHILD_SA ESP/xxx.xxx.xxx.xxx/SG-FW-WAN-IP
    2022-06-03 08:11:27Z 12[IKE] <tunnelname-1|58> closing expired CHILD_SA tunnelname-5{4036} with SPIs c7f4cf9f_i 93b287f5_o and TS xxx.xxx.xxx.xxx/25 === xxx.xxx.xxx.xxx/32
    2022-06-03 08:11:27Z 12[IKE] <tunnelname-1|58> sending DELETE for ESP CHILD_SA with SPI c7f4cf9f
    2022-06-03 08:11:27Z 12[ENC] <tunnelname-1|58> generating INFORMATIONAL_V1 request 3233125959 [ HASH D ]
    2022-06-03 08:11:27Z 12[NET] <tunnelname-1|58> sending packet: from XGS-FW-WAN-NAT-IP[4500] to SG-FW-WAN-IP[4500] (108 bytes)
    2022-06-03 08:11:27Z 06[JOB] CHILD_SA ESP/xxx.xxx.xxx.xxx/SG-FW-WAN-IP not found for delete
    2022-06-03 08:11:27Z 14[NET] <tunnelname-1|58> received packet: from SG-FW-WAN-IP[4500] to XGS-FW-WAN-NAT-IP[4500] (108 bytes)
    2022-06-03 08:11:27Z 14[ENC] <tunnelname-1|58> parsed INFORMATIONAL_V1 request 1369537007 [ HASH D ]
    2022-06-03 08:11:27Z 14[IKE] <tunnelname-1|58> received DELETE for ESP CHILD_SA with SPI 93b287f5
    2022-06-03 08:11:27Z 14[IKE] <tunnelname-1|58> CHILD_SA not found, ignored
    2022-06-03 08:11:38Z 06[KNL] creating rekey job for CHILD_SA ESP/0xcc70c44d/SG-FW-WAN-IP
    2022-06-03 08:11:39Z 28[KNL] creating rekey job for CHILD_SA ESP/0x9eee432c/SG-FW-WAN-IP
    2022-06-03 08:11:44Z 27[NET] <tunnelname-1|58> received packet: from SG-FW-WAN-IP[4500] to XGS-FW-WAN-NAT-IP[4500] (572 bytes)
    2022-06-03 08:11:44Z 27[ENC] <tunnelname-1|58> parsed QUICK_MODE request 2842231140 [ HASH SA No KE ID ID ]
    2022-06-03 08:11:44Z 27[IKE] <tunnelname-1|58> ### process_request invoking quick_mode_create
    2022-06-03 08:11:44Z 27[IKE] <tunnelname-1|58> ### quick_mode_create: 0x7f757c010340 config (nil)
    2022-06-03 08:11:44Z 27[IKE] <tunnelname-1|58> ### process_r: 0x7f757c010340 QM_INIT
    2022-06-03 08:11:44Z 27[IKE] <tunnelname-1|58> detected rekeying of CHILD_SA tunnelname-8{4057}
    2022-06-03 08:11:44Z 27[IKE] <tunnelname-1|58> ### build_r: 0x7f757c010340 QM_INIT
    2022-06-03 08:11:44Z 27[ENC] <tunnelname-1|58> generating QUICK_MODE response 2842231140 [ HASH SA No KE ID ID ]
    2022-06-03 08:11:44Z 27[NET] <tunnelname-1|58> sending packet: from XGS-FW-WAN-NAT-IP[4500] to SG-FW-WAN-IP[4500] (604 bytes)
    2022-06-03 08:11:44Z 12[NET] <tunnelname-1|58> received packet: from SG-FW-WAN-IP[4500] to XGS-FW-WAN-NAT-IP[4500] (92 bytes)
    2022-06-03 08:11:44Z 12[ENC] <tunnelname-1|58> parsed QUICK_MODE request 2842231140 [ HASH ]
    2022-06-03 08:11:44Z 12[IKE] <tunnelname-1|58> ### process_r: 0x7f757c010340 QM_NEGOTIATED
    2022-06-03 08:11:44Z 12[CFG] <tunnelname-1|58> handling HA CHILD_SA tunnelname-8{4129} xxx.xxx.xxx.xxx/25 === xxx.xxx.xxx.xxx/32 (segment in: 1*, out: 1*)
    2022-06-03 08:11:44Z 12[IKE] <tunnelname-1|58> CHILD_SA tunnelname-8{4129} established with SPIs c33b4caa_i 7b262451_o and TS xxx.xxx.xxx.xxx/25 === xxx.xxx.xxx.xxx/32
    2022-06-03 08:11:44Z 12[IKE] <tunnelname-1|58> ### destroy: 0x7f757c010340
    2022-06-03 08:11:48Z 24[KNL] creating rekey job for CHILD_SA ESP/0xc616cdfa/XGS-FW-WAN-NAT-IP
    2022-06-03 08:11:53Z 06[KNL] creating rekey job for CHILD_SA ESP/0xca972d5b/XGS-FW-WAN-NAT-IP
    2022-06-03 08:12:00Z 17[KNL] creating rekey job for CHILD_SA ESP/0x3c8b6abd/SG-FW-WAN-IP
    2022-06-03 08:12:09Z 10[KNL] creating rekey job for CHILD_SA ESP/0xcef077de/XGS-FW-WAN-NAT-IP
    2022-06-03 08:12:11Z 06[KNL] creating rekey job for CHILD_SA ESP/0xc0adcd33/XGS-FW-WAN-NAT-IP
    2022-06-03 08:12:17Z 10[KNL] creating rekey job for CHILD_SA ESP/xxx.xxx.xxx.xxx/SG-FW-WAN-IP
    2022-06-03 08:12:18Z 18[IKE] <tunnelname-1|58> sending DPD request
    2022-06-03 08:12:18Z 18[ENC] <tunnelname-1|58> generating INFORMATIONAL_V1 request 1465973797 [ HASH N(DPD) ]
    2022-06-03 08:12:18Z 18[NET] <tunnelname-1|58> sending packet: from XGS-FW-WAN-NAT-IP[4500] to SG-FW-WAN-IP[4500] (124 bytes)
    2022-06-03 08:12:18Z 26[NET] <tunnelname-1|58> received packet: from SG-FW-WAN-IP[4500] to XGS-FW-WAN-NAT-IP[4500] (124 bytes)
    2022-06-03 08:12:18Z 26[ENC] <tunnelname-1|58> parsed INFORMATIONAL_V1 request 2191208327 [ HASH N(DPD_ACK) ]
    2022-06-03 08:12:19Z 19[KNL] creating rekey job for CHILD_SA ESP/0xxxx.xxx.xxx.xxx/SG-FW-WAN-IP
    2022-06-03 08:12:25Z 17[KNL] creating rekey job for CHILD_SA ESP/0xca2cb4fd/XGS-FW-WAN-NAT-IP
    2022-06-03 08:12:34Z 32[KNL] creating rekey job for CHILD_SA ESP/0x500e3ef4/SG-FW-WAN-IP
    2022-06-03 08:12:35Z 26[NET] <tunnelname-1|58> received packet: from SG-FW-WAN-IP[4500] to XGS-FW-WAN-NAT-IP[4500] (572 bytes)
    2022-06-03 08:12:35Z 26[ENC] <tunnelname-1|58> parsed QUICK_MODE request 4061774326 [ HASH SA No KE ID ID ]
    2022-06-03 08:12:35Z 26[IKE] <tunnelname-1|58> ### process_request invoking quick_mode_create
    2022-06-03 08:12:35Z 26[IKE] <tunnelname-1|58> ### quick_mode_create: 0x7f755c007110 config (nil)
    2022-06-03 08:12:35Z 26[IKE] <tunnelname-1|58> ### process_r: 0x7f755c007110 QM_INIT
    2022-06-03 08:12:35Z 26[IKE] <tunnelname-1|58> detected rekeying of CHILD_SA tunnelname-28{4062}
    2022-06-03 08:12:35Z 26[IKE] <tunnelname-1|58> ### build_r: 0x7f755c007110 QM_INIT
    2022-06-03 08:12:35Z 26[ENC] <tunnelname-1|58> generating QUICK_MODE response 4061774326 [ HASH SA No KE ID ID ]
    2022-06-03 08:12:35Z 26[NET] <tunnelname-1|58> sending packet: from XGS-FW-WAN-NAT-IP[4500] to SG-FW-WAN-IP[4500] (604 bytes)
    2022-06-03 08:12:35Z 16[NET] <tunnelname-1|58> received packet: from SG-FW-WAN-IP[4500] to XGS-FW-WAN-NAT-IP[4500] (92 bytes)
    2022-06-03 08:12:35Z 16[ENC] <tunnelname-1|58> parsed QUICK_MODE request 4061774326 [ HASH ]
    2022-06-03 08:12:35Z 16[IKE] <tunnelname-1|58> ### process_r: 0x7f755c007110 QM_NEGOTIATED
    2022-06-03 08:12:35Z 16[CFG] <tunnelname-1|58> handling HA CHILD_SA tunnelname-28{4130} xxx.xxx.xxx.xxx/24 === xxx.xxx.xxx.xxx/32 (segment in: 1*, out: 1*)
    2022-06-03 08:12:35Z 16[IKE] <tunnelname-1|58> CHILD_SA tunnelname-28{4130} established with SPIs c6c2745b_i 9c0f705e_o and TS xxx.xxx.xxx.xxx/24 === xxx.xxx.xxx.xxx/32
    2022-06-03 08:12:35Z 16[IKE] <tunnelname-1|58> ### destroy: 0x7f755c007110
    2022-06-03 08:12:40Z 06[KNL] creating rekey job for CHILD_SA ESP/0xb9a21deb/SG-FW-WAN-IP
    2022-06-03 08:13:06Z 26[IKE] <tunnelname-1|58> sending DPD request
    2022-06-03 08:13:06Z 26[ENC] <tunnelname-1|58> generating INFORMATIONAL_V1 request 1130935337 [ HASH N(DPD) ]
    2022-06-03 08:13:06Z 26[NET] <tunnelname-1|58> sending packet: from XGS-FW-WAN-NAT-IP[4500] to SG-FW-WAN-IP[4500] (124 bytes)
    2022-06-03 08:13:06Z 16[NET] <tunnelname-1|58> received packet: from SG-FW-WAN-IP[4500] to XGS-FW-WAN-NAT-IP[4500] (124 bytes)
    2022-06-03 08:13:06Z 16[ENC] <tunnelname-1|58> parsed INFORMATIONAL_V1 request 2661128298 [ HASH N(DPD_ACK) ]
    2022-06-03 08:13:36Z 17[IKE] <tunnelname-1|58> sending DPD request
    2022-06-03 08:13:36Z 17[ENC] <tunnelname-1|58> generating INFORMATIONAL_V1 request 691896911 [ HASH N(DPD) ]
    2022-06-03 08:13:36Z 17[NET] <tunnelname-1|58> sending packet: from XGS-FW-WAN-NAT-IP[4500] to SG-FW-WAN-IP[4500] (124 bytes)
    2022-06-03 08:13:36Z 30[NET] <tunnelname-1|58> received packet: from SG-FW-WAN-IP[4500] to XGS-FW-WAN-NAT-IP[4500] (124 bytes)
    2022-06-03 08:13:36Z 30[ENC] <tunnelname-1|58> parsed INFORMATIONAL_V1 request 3465013507 [ HASH N(DPD_ACK) ]
    2022-06-03 08:13:42Z 02[NET] <tunnelname-1|58> received packet: from SG-FW-WAN-IP[4500] to XGS-FW-WAN-NAT-IP[4500] (108 bytes)
    2022-06-03 08:13:42Z 02[ENC] <tunnelname-1|58> parsed INFORMATIONAL_V1 request 2592667136 [ HASH D ]
    2022-06-03 08:13:42Z 02[IKE] <tunnelname-1|58> received DELETE for ESP CHILD_SA with SPI 1d2be6f8
    2022-06-03 08:13:42Z 02[IKE] <tunnelname-1|58> closing CHILD_SA tunnelname-34{4037} with SPIs c6bd4239_i (0 bytes) 1d2be6f8_o (0 bytes) and TS xxx.xxx.xxx.xxx/26 === xxx.xxx.xxx.xxx/32
    2022-06-03 08:13:46Z 10[NET] <tunnelname-1|58> received packet: from SG-FW-WAN-IP[4500] to XGS-FW-WAN-NAT-IP[4500] (572 bytes)
    2022-06-03 08:13:46Z 10[ENC] <tunnelname-1|58> parsed QUICK_MODE request 2688472205 [ HASH SA No KE ID ID ]
    2022-06-03 08:13:46Z 10[IKE] <tunnelname-1|58> ### process_request invoking quick_mode_create
    2022-06-03 08:13:46Z 10[IKE] <tunnelname-1|58> ### quick_mode_create: 0x7f75a801c440 config (nil)
    2022-06-03 08:13:46Z 10[IKE] <tunnelname-1|58> ### process_r: 0x7f75a801c440 QM_INIT
    2022-06-03 08:13:46Z 10[IKE] <tunnelname-1|58> detected rekeying of CHILD_SA tunnelname-25{4061}
    2022-06-03 08:13:46Z 10[IKE] <tunnelname-1|58> ### build_r: 0x7f75a801c440 QM_INIT
    2022-06-03 08:13:46Z 10[ENC] <tunnelname-1|58> generating QUICK_MODE response 2688472205 [ HASH SA No KE ID ID ]
    2022-06-03 08:13:46Z 10[NET] <tunnelname-1|58> sending packet: from XGS-FW-WAN-NAT-IP[4500] to SG-FW-WAN-IP[4500] (604 bytes)
    2022-06-03 08:13:46Z 30[NET] <tunnelname-1|58> received packet: from SG-FW-WAN-IP[4500] to XGS-FW-WAN-NAT-IP[4500] (92 bytes)
    2022-06-03 08:13:46Z 30[ENC] <tunnelname-1|58> parsed QUICK_MODE request 2688472205 [ HASH ]
    2022-06-03 08:13:46Z 30[IKE] <tunnelname-1|58> ### process_r: 0x7f75a801c440 QM_NEGOTIATED
    2022-06-03 08:13:46Z 30[CFG] <tunnelname-1|58> handling HA CHILD_SA tunnelname-25{4131} xxx.xxx.xxx.xxx/24 === xxx.xxx.xxx.xxx/32 (segment in: 1*, out: 1*)
    2022-06-03 08:13:46Z 30[IKE] <tunnelname-1|58> CHILD_SA tunnelname-25{4131} established with SPIs c932088e_i 57b2ae09_o and TS xxx.xxx.xxx.xxx/24 === xxx.xxx.xxx.xxx/32
    2022-06-03 08:13:46Z 30[IKE] <tunnelname-1|58> ### destroy: 0x7f75a801c440
    2022-06-03 08:13:47Z 18[NET] <tunnelname-1|58> received packet: from SG-FW-WAN-IP[4500] to XGS-FW-WAN-NAT-IP[4500] (108 bytes)
    2022-06-03 08:13:47Z 18[ENC] <tunnelname-1|58> parsed INFORMATIONAL_V1 request 1860243427 [ HASH D ]
    2022-06-03 08:13:47Z 18[IKE] <tunnelname-1|58> received DELETE for ESP CHILD_SA with SPI 9eee432c
    2022-06-03 08:13:47Z 18[IKE] <tunnelname-1|58> closing CHILD_SA tunnelname-29{4038} with SPIs c44d641a_i (0 bytes) 9eee432c_o (0 bytes) and TS xxx.xxx.xxx.xxx/24 === xxx.xxx.xxx.xxx/32
    2022-06-03 08:13:49Z 15[KNL] creating rekey job for CHILD_SA ESP/0xcd12e894/XGS-FW-WAN-NAT-IP
    2022-06-03 08:14:08Z 16[NET] <tunnelname-1|58> received packet: from SG-FW-WAN-IP[4500] to XGS-FW-WAN-NAT-IP[4500] (572 bytes)
    2022-06-03 08:14:08Z 16[ENC] <tunnelname-1|58> parsed QUICK_MODE request 456666741 [ HASH SA No KE ID ID ]
    2022-06-03 08:14:08Z 16[IKE] <tunnelname-1|58> ### process_request invoking quick_mode_create
    2022-06-03 08:14:08Z 16[IKE] <tunnelname-1|58> ### quick_mode_create: 0x7f756c0187d0 config (nil)
    2022-06-03 08:14:08Z 16[IKE] <tunnelname-1|58> ### process_r: 0x7f756c0187d0 QM_INIT
    2022-06-03 08:14:08Z 16[IKE] <tunnelname-1|58> detected rekeying of CHILD_SA tunnelname-49{4064}
    2022-06-03 08:14:08Z 16[IKE] <tunnelname-1|58> ### build_r: 0x7f756c0187d0 QM_INIT
    2022-06-03 08:14:08Z 16[ENC] <tunnelname-1|58> generating QUICK_MODE response 456666741 [ HASH SA No KE ID ID ]
    2022-06-03 08:14:08Z 16[NET] <tunnelname-1|58> sending packet: from XGS-FW-WAN-NAT-IP[4500] to SG-FW-WAN-IP[4500] (604 bytes)
    2022-06-03 08:14:08Z 19[NET] <tunnelname-1|58> received packet: from SG-FW-WAN-IP[4500] to XGS-FW-WAN-NAT-IP[4500] (92 bytes)
    2022-06-03 08:14:08Z 19[ENC] <tunnelname-1|58> parsed QUICK_MODE request 456666741 [ HASH ]
    2022-06-03 08:14:08Z 19[IKE] <tunnelname-1|58> ### process_r: 0x7f756c0187d0 QM_NEGOTIATED
    2022-06-03 08:14:08Z 19[CFG] <tunnelname-1|58> handling HA CHILD_SA tunnelname-49{4132} xxx.xxx.xxx.xxx/27 === xxx.xxx.xxx.xxx/32 (segment in: 1*, out: 1*)
    2022-06-03 08:14:08Z 19[IKE] <tunnelname-1|58> CHILD_SA tunnelname-49{4132} established with SPIs c99495d0_i b9e466f7_o and TS xxx.xxx.xxx.xxx/27 === xxx.xxx.xxx.xxx/32
    2022-06-03 08:14:08Z 19[IKE] <tunnelname-1|58> ### destroy: 0x7f756c0187d0
    2022-06-03 08:14:09Z 27[NET] <tunnelname-1|58> received packet: from SG-FW-WAN-IP[4500] to XGS-FW-WAN-NAT-IP[4500] (108 bytes)
    2022-06-03 08:14:09Z 27[ENC] <tunnelname-1|58> parsed INFORMATIONAL_V1 request 862672185 [ HASH D ]
    2022-06-03 08:14:09Z 27[IKE] <tunnelname-1|58> received DELETE for ESP CHILD_SA with SPI 3c8b6abd
    2022-06-03 08:14:09Z 27[IKE] <tunnelname-1|58> closing CHILD_SA tunnelname-57{4039} with SPIs c616cdfa_i (0 bytes) 3c8b6abd_o (0 bytes) and TS xxx.xxx.xxx.xxx/27 === xxx.xxx.xxx.xxx/32
    2022-06-03 08:14:15Z 19[NET] <tunnelname-1|58> received packet: from SG-FW-WAN-IP[4500] to XGS-FW-WAN-NAT-IP[4500] (108 bytes)
    2022-06-03 08:14:15Z 19[ENC] <tunnelname-1|58> parsed INFORMATIONAL_V1 request 1195210822 [ HASH D ]
    2022-06-03 08:14:15Z 19[IKE] <tunnelname-1|58> received DELETE for ESP CHILD_SA with SPI bebadb2d
    2022-06-03 08:14:15Z 19[IKE] <tunnelname-1|58> closing CHILD_SA tunnelname-23{4040} with SPIs c2978402_i (0 bytes) bebadb2d_o (0 bytes) and TS xxx.xxx.xxx.xxx/24 === xxx.xxx.xxx.xxx/24
    2022-06-03 08:14:20Z 17[NET] <tunnelname-1|58> received packet: from SG-FW-WAN-IP[4500] to XGS-FW-WAN-NAT-IP[4500] (572 bytes)
    2022-06-03 08:14:20Z 17[ENC] <tunnelname-1|58> parsed QUICK_MODE request 1275694545 [ HASH SA No KE ID ID ]
    2022-06-03 08:14:20Z 17[IKE] <tunnelname-1|58> ### process_request invoking quick_mode_create
    2022-06-03 08:14:20Z 17[IKE] <tunnelname-1|58> ### quick_mode_create: 0x7f75a0008680 config (nil)
    2022-06-03 08:14:20Z 17[IKE] <tunnelname-1|58> ### process_r: 0x7f75a0008680 QM_INIT
    2022-06-03 08:14:21Z 17[IKE] <tunnelname-1|58> detected rekeying of CHILD_SA tunnelname-10{4063}
    2022-06-03 08:14:21Z 17[IKE] <tunnelname-1|58> ### build_r: 0x7f75a0008680 QM_INIT
    2022-06-03 08:14:21Z 17[ENC] <tunnelname-1|58> generating QUICK_MODE response 1275694545 [ HASH SA No KE ID ID ]
    2022-06-03 08:14:21Z 17[NET] <tunnelname-1|58> sending packet: from XGS-FW-WAN-NAT-IP[4500] to SG-FW-WAN-IP[4500] (604 bytes)
    2022-06-03 08:14:21Z 10[NET] <tunnelname-1|58> received packet: from SG-FW-WAN-IP[4500] to XGS-FW-WAN-NAT-IP[4500] (92 bytes)
    2022-06-03 08:14:21Z 10[ENC] <tunnelname-1|58> parsed QUICK_MODE request 1275694545 [ HASH ]
    2022-06-03 08:14:21Z 10[IKE] <tunnelname-1|58> ### process_r: 0x7f75a0008680 QM_NEGOTIATED
    2022-06-03 08:14:21Z 10[CFG] <tunnelname-1|58> handling HA CHILD_SA tunnelname-10{4133} xxx.xxx.xxx.xxx/25 === xxx.xxx.xxx.xxx/32 (segment in: 1*, out: 1*)
    2022-06-03 08:14:21Z 10[IKE] <tunnelname-1|58> CHILD_SA tunnelname-10{4133} established with SPIs ce3c6008_i 48584f6b_o and TS xxx.xxx.xxx.xxx/25 === xxx.xxx.xxx.xxx/32
    2022-06-03 08:14:21Z 10[IKE] <tunnelname-1|58> ### destroy: 0x7f75a0008680
    2022-06-03 08:14:27Z 22[KNL] creating rekey job for CHILD_SA ESP/0x4ab4d540/SG-FW-WAN-IP
    2022-06-03 08:14:52Z 10[NET] <tunnelname-1|58> received packet: from SG-FW-WAN-IP[4500] to XGS-FW-WAN-NAT-IP[4500] (108 bytes)
    2022-06-03 08:14:52Z 10[ENC] <tunnelname-1|58> parsed INFORMATIONAL_V1 request 544108253 [ HASH D ]
    2022-06-03 08:14:52Z 10[IKE] <tunnelname-1|58> received DELETE for ESP CHILD_SA with SPI 500e3ef4
    2022-06-03 08:14:52Z 10[IKE] <tunnelname-1|58> closing CHILD_SA tunnelname-7{4041} with SPIs ca972d5b_i (0 bytes) 500e3ef4_o (0 bytes) and TS xxx.xxx.xxx.xxx/25 === xxx.xxx.xxx.xxx/32
    2022-06-03 08:14:53Z 18[NET] <tunnelname-1|58> received packet: from SG-FW-WAN-IP[4500] to XGS-FW-WAN-NAT-IP[4500] (108 bytes)
    2022-06-03 08:14:53Z 18[ENC] <tunnelname-1|58> parsed INFORMATIONAL_V1 request 3247125699 [ HASH D ]
    2022-06-03 08:14:53Z 18[IKE] <tunnelname-1|58> received DELETE for ESP CHILD_SA with SPI 3b2c7d06
    2022-06-03 08:14:53Z 18[IKE] <tunnelname-1|58> closing CHILD_SA tunnelname-4{4042} with SPIs c4d15eec_i (0 bytes) 3b2c7d06_o (0 bytes) and TS xxx.xxx.xxx.xxx/25 === xxx.xxx.xxx.xxx/32
    2022-06-03 08:14:54Z 19[KNL] creating rekey job for CHILD_SA ESP/0xc7a3cd82/SG-FW-WAN-IP
    2022-06-03 08:15:02Z 26[NET] <tunnelname-1|58> received packet: from SG-FW-WAN-IP[4500] to XGS-FW-WAN-NAT-IP[4500] (108 bytes)
    2022-06-03 08:15:02Z 26[ENC] <tunnelname-1|58> parsed INFORMATIONAL_V1 request 898181123 [ HASH D ]
    2022-06-03 08:15:02Z 26[IKE] <tunnelname-1|58> received DELETE for ESP CHILD_SA with SPI cc70c44d
    2022-06-03 08:15:02Z 26[IKE] <tunnelname-1|58> closing CHILD_SA tunnelname-27{4043} with SPIs c0adcd33_i (0 bytes) cc70c44d_o (0 bytes) and TS xxx.xxx.xxx.xxx/24 === xxx.xxx.xxx.xxx/32
    2022-06-03 08:15:09Z 06[NET] <tunnelname-1|58> received packet: from SG-FW-WAN-IP[4500] to XGS-FW-WAN-NAT-IP[4500] (108 bytes)
    2022-06-03 08:15:09Z 06[ENC] <tunnelname-1|58> parsed INFORMATIONAL_V1 request 3740550249 [ HASH D ]
    2022-06-03 08:15:09Z 06[IKE] <tunnelname-1|58> received DELETE for ESP CHILD_SA with SPI 3f175d20
    2022-06-03 08:15:09Z 06[IKE] <tunnelname-1|58> closing CHILD_SA tunnelname-69{4044} with SPIs ca2cb4fd_i (0 bytes) 3f175d20_o (0 bytes) and TS xxx.xxx.xxx.xxx/25 === xxx.xxx.xxx.xxx/32
    2022-06-03 08:15:15Z 27[KNL] creating rekey job for CHILD_SA ESP/0xcb05c595/XGS-FW-WAN-NAT-IP
    2022-06-03 08:15:37Z 22[KNL] creating delete job for CHILD_SA ESP/0xcef077de/XGS-FW-WAN-NAT-IP
    2022-06-03 08:15:37Z 14[KNL] creating delete job for CHILD_SA ESP/0xb9a21deb/SG-FW-WAN-IP
    2022-06-03 08:15:37Z 12[IKE] <tunnelname-1|58> closing expired CHILD_SA tunnelname-33{4045} with SPIs cef077de_i b9a21deb_o and TS xxx.xxx.xxx.xxx/26 === xxx.xxx.xxx.xxx/24
    2022-06-03 08:15:37Z 12[IKE] <tunnelname-1|58> sending DELETE for ESP CHILD_SA with SPI cef077de
    2022-06-03 08:15:37Z 12[ENC] <tunnelname-1|58> generating INFORMATIONAL_V1 request 3842691344 [ HASH D ]
    2022-06-03 08:15:37Z 12[NET] <tunnelname-1|58> sending packet: from XGS-FW-WAN-NAT-IP[4500] to SG-FW-WAN-IP[4500] (108 bytes)
    2022-06-03 08:15:37Z 02[JOB] CHILD_SA ESP/0xb9a21deb/SG-FW-WAN-IP not found for delete
    2022-06-03 08:15:37Z 06[NET] <tunnelname-1|58> received packet: from SG-FW-WAN-IP[4500] to XGS-FW-WAN-NAT-IP[4500] (108 bytes)
    2022-06-03 08:15:37Z 06[ENC] <tunnelname-1|58> parsed INFORMATIONAL_V1 request 3100843368 [ HASH D ]
    2022-06-03 08:15:37Z 06[IKE] <tunnelname-1|58> received DELETE for ESP CHILD_SA with SPI b9a21deb
    2022-06-03 08:15:37Z 06[IKE] <tunnelname-1|58> CHILD_SA not found, ignored
    2022-06-03 08:16:05Z 19[NET] <tunnelname-1|58> received packet: from SG-FW-WAN-IP[4500] to XGS-FW-WAN-NAT-IP[4500] (572 bytes)
    2022-06-03 08:16:05Z 19[ENC] <tunnelname-1|58> parsed QUICK_MODE request 928798644 [ HASH SA No KE ID ID ]
    2022-06-03 08:16:05Z 19[IKE] <tunnelname-1|58> ### process_request invoking quick_mode_create
    2022-06-03 08:16:05Z 19[IKE] <tunnelname-1|58> ### quick_mode_create: 0x7f75940097e0 config (nil)
    2022-06-03 08:16:05Z 19[IKE] <tunnelname-1|58> ### process_r: 0x7f75940097e0 QM_INIT
    2022-06-03 08:16:05Z 19[IKE] <tunnelname-1|58> detected rekeying of CHILD_SA tunnelname-39{4065}
    2022-06-03 08:16:05Z 19[IKE] <tunnelname-1|58> ### build_r: 0x7f75940097e0 QM_INIT
    2022-06-03 08:16:05Z 19[ENC] <tunnelname-1|58> generating QUICK_MODE response 928798644 [ HASH SA No KE ID ID ]
    2022-06-03 08:16:05Z 19[NET] <tunnelname-1|58> sending packet: from XGS-FW-WAN-NAT-IP[4500] to SG-FW-WAN-IP[4500] (604 bytes)
    2022-06-03 08:16:05Z 21[NET] <tunnelname-1|58> received packet: from SG-FW-WAN-IP[4500] to XGS-FW-WAN-NAT-IP[4500] (92 bytes)
    2022-06-03 08:16:05Z 21[ENC] <tunnelname-1|58> parsed QUICK_MODE request 928798644 [ HASH ]
    2022-06-03 08:16:05Z 21[IKE] <tunnelname-1|58> ### process_r: 0x7f75940097e0 QM_NEGOTIATED
    2022-06-03 08:16:05Z 21[CFG] <tunnelname-1|58> handling HA CHILD_SA tunnelname-39{4134} xxx.xxx.xxx.xxx/26 === xxx.xxx.xxx.xxx/32 (segment in: 1*, out: 1*)
    2022-06-03 08:16:05Z 21[IKE] <tunnelname-1|58> CHILD_SA tunnelname-39{4134} established with SPIs c3b9293b_i b1ffcc80_o and TS xxx.xxx.xxx.xxx/26 === xxx.xxx.xxx.xxx/32
    2022-06-03 08:16:05Z 21[IKE] <tunnelname-1|58> ### destroy: 0x7f75940097e0
    2022-06-03 08:16:08Z 14[NET] <tunnelname-1|58> received packet: from SG-FW-WAN-IP[4500] to XGS-FW-WAN-NAT-IP[4500] (588 bytes)
    2022-06-03 08:16:08Z 14[ENC] <tunnelname-1|58> parsed QUICK_MODE request 2962957488 [ HASH SA No KE ID ID ]
    2022-06-03 08:16:08Z 14[IKE] <tunnelname-1|58> ### process_request invoking quick_mode_create
    2022-06-03 08:16:08Z 14[IKE] <tunnelname-1|58> ### quick_mode_create: 0x7f757800b2c0 config (nil)
    2022-06-03 08:16:08Z 14[IKE] <tunnelname-1|58> ### process_r: 0x7f757800b2c0 QM_INIT
    2022-06-03 08:16:08Z 14[IKE] <tunnelname-1|58> detected rekeying of CHILD_SA tunnelname-3{4060}
    2022-06-03 08:16:08Z 14[IKE] <tunnelname-1|58> ### build_r: 0x7f757800b2c0 QM_INIT
    2022-06-03 08:16:08Z 14[ENC] <tunnelname-1|58> generating QUICK_MODE response 2962957488 [ HASH SA No KE ID ID ]
    2022-06-03 08:16:08Z 14[NET] <tunnelname-1|58> sending packet: from XGS-FW-WAN-NAT-IP[4500] to SG-FW-WAN-IP[4500] (604 bytes)
    2022-06-03 08:16:08Z 02[NET] <tunnelname-1|58> received packet: from SG-FW-WAN-IP[4500] to XGS-FW-WAN-NAT-IP[4500] (92 bytes)
    2022-06-03 08:16:08Z 02[ENC] <tunnelname-1|58> parsed QUICK_MODE request 2962957488 [ HASH ]
    2022-06-03 08:16:08Z 02[IKE] <tunnelname-1|58> ### process_r: 0x7f757800b2c0 QM_NEGOTIATED
    2022-06-03 08:16:08Z 02[CFG] <tunnelname-1|58> handling HA CHILD_SA tunnelname-3{4135} xxx.xxx.xxx.xxx/25 === xxx.xxx.xxx.xxx/24 (segment in: 1*, out: 1*)
    2022-06-03 08:16:08Z 02[IKE] <tunnelname-1|58> CHILD_SA tunnelname-3{4135} established with SPIs c4846f36_i 76f42337_o and TS xxx.xxx.xxx.xxx/25 === xxx.xxx.xxx.xxx/24
    2022-06-03 08:16:08Z 02[IKE] <tunnelname-1|58> ### destroy: 0x7f757800b2c0
    2022-06-03 08:16:37Z 22[IKE] <tunnelname-1|58> sending DPD request
    2022-06-03 08:16:37Z 22[ENC] <tunnelname-1|58> generating INFORMATIONAL_V1 request 1348224188 [ HASH N(DPD) ]
    2022-06-03 08:16:37Z 22[NET] <tunnelname-1|58> sending packet: from XGS-FW-WAN-NAT-IP[4500] to SG-FW-WAN-IP[4500] (124 bytes)
    2022-06-03 08:16:37Z 14[NET] <tunnelname-1|58> received packet: from SG-FW-WAN-IP[4500] to XGS-FW-WAN-NAT-IP[4500] (124 bytes)
    2022-06-03 08:16:37Z 14[ENC] <tunnelname-1|58> parsed INFORMATIONAL_V1 request 932991164 [ HASH N(DPD_ACK) ]
    2022-06-03 08:17:06Z 18[NET] <tunnelname-1|58> received packet: from SG-FW-WAN-IP[4500] to XGS-FW-WAN-NAT-IP[4500] (572 bytes)
    2022-06-03 08:17:06Z 18[ENC] <tunnelname-1|58> parsed QUICK_MODE request 1821501093 [ HASH SA No KE ID ID ]
    2022-06-03 08:17:06Z 18[IKE] <tunnelname-1|58> ### process_request invoking quick_mode_create
    2022-06-03 08:17:06Z 18[IKE] <tunnelname-1|58> ### quick_mode_create: 0x7f7570004250 config (nil)
    2022-06-03 08:17:06Z 18[IKE] <tunnelname-1|58> ### process_r: 0x7f7570004250 QM_INIT
    2022-06-03 08:17:06Z 18[IKE] <tunnelname-1|58> detected rekeying of CHILD_SA tunnelname-68{4067}
    2022-06-03 08:17:06Z 18[IKE] <tunnelname-1|58> ### build_r: 0x7f7570004250 QM_INIT
    2022-06-03 08:17:06Z 18[ENC] <tunnelname-1|58> generating QUICK_MODE response 1821501093 [ HASH SA No KE ID ID ]
    2022-06-03 08:17:06Z 18[NET] <tunnelname-1|58> sending packet: from XGS-FW-WAN-NAT-IP[4500] to SG-FW-WAN-IP[4500] (604 bytes)
    2022-06-03 08:17:06Z 26[NET] <tunnelname-1|58> received packet: from SG-FW-WAN-IP[4500] to XGS-FW-WAN-NAT-IP[4500] (92 bytes)
    2022-06-03 08:17:06Z 26[ENC] <tunnelname-1|58> parsed QUICK_MODE request 1821501093 [ HASH ]
    2022-06-03 08:17:06Z 26[IKE] <tunnelname-1|58> ### process_r: 0x7f7570004250 QM_NEGOTIATED
    2022-06-03 08:17:06Z 26[CFG] <tunnelname-1|58> handling HA CHILD_SA tunnelname-68{4136} xxx.xxx.xxx.xxx/25 === xxx.xxx.xxx.xxx/32 (segment in: 1*, out: 1*)
    2022-06-03 08:17:06Z 26[IKE] <tunnelname-1|58> CHILD_SA tunnelname-68{4136} established with SPIs c8315cfa_i c377b897_o and TS xxx.xxx.xxx.xxx/25 === xxx.xxx.xxx.xxx/32
    2022-06-03 08:17:06Z 26[IKE] <tunnelname-1|58> ### destroy: 0x7f7570004250
    2022-06-03 08:17:26Z 18[KNL] creating rekey job for CHILD_SA ESP/0xc3fca996/XGS-FW-WAN-NAT-IP
    2022-06-03 08:17:37Z 26[IKE] <tunnelname-1|58> sending DPD request
    2022-06-03 08:17:37Z 26[ENC] <tunnelname-1|58> generating INFORMATIONAL_V1 request 3123761700 [ HASH N(DPD) ]
    2022-06-03 08:17:37Z 26[NET] <tunnelname-1|58> sending packet: from XGS-FW-WAN-NAT-IP[4500] to SG-FW-WAN-IP[4500] (124 bytes)
    2022-06-03 08:17:37Z 16[NET] <tunnelname-1|58> received packet: from SG-FW-WAN-IP[4500] to XGS-FW-WAN-NAT-IP[4500] (124 bytes)
    2022-06-03 08:17:37Z 16[ENC] <tunnelname-1|58> parsed INFORMATIONAL_V1 request 525574293 [ HASH N(DPD_ACK) ]
    2022-06-03 08:17:45Z 32[KNL] creating rekey job for CHILD_SA ESP/0x7fdd149d/SG-FW-WAN-IP
    2022-06-03 08:17:47Z 16[KNL] creating rekey job for CHILD_SA ESP/0xc2760fa0/XGS-FW-WAN-NAT-IP
    2022-06-03 08:17:47Z 21[NET] <tunnelname-1|58> received packet: from SG-FW-WAN-IP[4500] to XGS-FW-WAN-NAT-IP[4500] (108 bytes)
    2022-06-03 08:17:47Z 21[ENC] <tunnelname-1|58> parsed INFORMATIONAL_V1 request 2415106669 [ HASH D ]
    2022-06-03 08:17:47Z 21[IKE] <tunnelname-1|58> received DELETE for ESP CHILD_SA with SPI 4ab4d540
    2022-06-03 08:17:47Z 21[IKE] <tunnelname-1|58> closing CHILD_SA tunnelname-46{4046} with SPIs cd12e894_i (0 bytes) 4ab4d540_o (0 bytes) and TS xxx.xxx.xxx.xxx/27 === xxx.xxx.xxx.xxx/32
    2022-06-03 08:17:52Z 32[KNL] creating rekey job for CHILD_SA ESP/0x2565460f/SG-FW-WAN-IP
    2022-06-03 08:18:00Z 12[KNL] creating rekey job for CHILD_SA ESP/0xc9c7cce9/XGS-FW-WAN-NAT-IP
    2022-06-03 08:18:14Z 18[NET] <tunnelname-1|58> received packet: from SG-FW-WAN-IP[4500] to XGS-FW-WAN-NAT-IP[4500] (572 bytes)
    2022-06-03 08:18:14Z 18[ENC] <tunnelname-1|58> parsed QUICK_MODE request 1413543076 [ HASH SA No KE ID ID ]
    2022-06-03 08:18:14Z 18[IKE] <tunnelname-1|58> ### process_request invoking quick_mode_create
    2022-06-03 08:18:14Z 18[IKE] <tunnelname-1|58> ### quick_mode_create: 0x7f7570004250 config (nil)
    2022-06-03 08:18:14Z 18[IKE] <tunnelname-1|58> ### process_r: 0x7f7570004250 QM_INIT
    2022-06-03 08:18:14Z 18[IKE] <tunnelname-1|58> detected rekeying of CHILD_SA tunnelname-64{4066}
    2022-06-03 08:18:14Z 18[IKE] <tunnelname-1|58> ### build_r: 0x7f7570004250 QM_INIT
    2022-06-03 08:18:14Z 18[ENC] <tunnelname-1|58> generating QUICK_MODE response 1413543076 [ HASH SA No KE ID ID ]
    2022-06-03 08:18:14Z 18[NET] <tunnelname-1|58> sending packet: from XGS-FW-WAN-NAT-IP[4500] to SG-FW-WAN-IP[4500] (604 bytes)
    2022-06-03 08:18:18Z 12[IKE] <tunnelname-1|58> sending retransmit 1 of response message ID 1413543076, seq 26
    2022-06-03 08:18:18Z 12[NET] <tunnelname-1|58> sending packet: from XGS-FW-WAN-NAT-IP[4500] to SG-FW-WAN-IP[4500] (604 bytes)
    2022-06-03 08:18:24Z 16[NET] <tunnelname-1|58> received packet: from SG-FW-WAN-IP[4500] to XGS-FW-WAN-NAT-IP[4500] (572 bytes)
    2022-06-03 08:18:24Z 16[IKE] <tunnelname-1|58> received retransmit of request with ID 1413543076, retransmitting response
    2022-06-03 08:18:24Z 16[NET] <tunnelname-1|58> sending packet: from XGS-FW-WAN-NAT-IP[4500] to SG-FW-WAN-IP[4500] (604 bytes)
    2022-06-03 08:18:25Z 21[IKE] <tunnelname-1|58> sending retransmit 2 of response message ID 1413543076, seq 26
    2022-06-03 08:18:25Z 21[NET] <tunnelname-1|58> sending packet: from XGS-FW-WAN-NAT-IP[4500] to SG-FW-WAN-IP[4500] (604 bytes)
    2022-06-03 08:18:31Z 10[NET] <tunnelname-1|58> received packet: from SG-FW-WAN-IP[4500] to XGS-FW-WAN-NAT-IP[4500] (124 bytes)
    2022-06-03 08:18:31Z 10[ENC] <tunnelname-1|58> parsed INFORMATIONAL_V1 request 1862032721 [ HASH N(DPD) ]
    2022-06-03 08:18:31Z 10[ENC] <tunnelname-1|58> generating INFORMATIONAL_V1 request 1502354688 [ HASH N(DPD_ACK) ]
    2022-06-03 08:18:31Z 10[NET] <tunnelname-1|58> sending packet: from XGS-FW-WAN-NAT-IP[4500] to SG-FW-WAN-IP[4500] (124 bytes)
    2022-06-03 08:18:37Z 14[KNL] creating rekey job for CHILD_SA ESP/0xf4bbb0f8/SG-FW-WAN-IP
    2022-06-03 08:18:38Z 22[IKE] <tunnelname-1|58> sending retransmit 3 of response message ID 1413543076, seq 26
    2022-06-03 08:18:38Z 22[NET] <tunnelname-1|58> sending packet: from XGS-FW-WAN-NAT-IP[4500] to SG-FW-WAN-IP[4500] (604 bytes)
    2022-06-03 08:18:44Z 21[NET] <tunnelname-1|58> received packet: from SG-FW-WAN-IP[4500] to XGS-FW-WAN-NAT-IP[4500] (572 bytes)
    2022-06-03 08:18:44Z 21[ENC] <tunnelname-1|58> invalid HASH_V1 payload length, decryption failed?
    2022-06-03 08:18:44Z 21[ENC] <tunnelname-1|58> could not decrypt payloads
    2022-06-03 08:18:44Z 21[IKE] <tunnelname-1|58> message parsing failed
    2022-06-03 08:18:44Z 21[ENC] <tunnelname-1|58> generating INFORMATIONAL_V1 request 2139155461 [ HASH N(PLD_MAL) ]
    2022-06-03 08:18:44Z 21[NET] <tunnelname-1|58> sending packet: from XGS-FW-WAN-NAT-IP[4500] to SG-FW-WAN-IP[4500] (108 bytes)
    2022-06-03 08:18:44Z 21[IKE] <tunnelname-1|58> QUICK_MODE request with message ID 1413543076 processing failed
    2022-06-03 08:18:44Z 21[DMN] <tunnelname-1|58> [GARNER-LOGGING] (child_alert) ALERT: parsing IKE message from SG-FW-WAN-IP[4500] failed
    2022-06-03 08:18:52Z 18[KNL] creating delete job for CHILD_SA ESP/0xcb05c595/XGS-FW-WAN-NAT-IP
    2022-06-03 08:18:52Z 19[KNL] creating delete job for CHILD_SA ESP/0xc7a3cd82/SG-FW-WAN-IP
    2022-06-03 08:18:52Z 16[IKE] <tunnelname-1|58> closing expired CHILD_SA tunnelname-17{4047} with SPIs cb05c595_i c7a3cd82_o and TS XGS-FW-LAN-IP28/25 === xxx.xxx.xxx.xxx/32
    2022-06-03 08:18:52Z 16[IKE] <tunnelname-1|58> sending DELETE for ESP CHILD_SA with SPI cb05c595
    2022-06-03 08:18:52Z 16[ENC] <tunnelname-1|58> generating INFORMATIONAL_V1 request 2761004938 [ HASH D ]
    2022-06-03 08:18:52Z 16[NET] <tunnelname-1|58> sending packet: from XGS-FW-WAN-NAT-IP[4500] to SG-FW-WAN-IP[4500] (108 bytes)
    2022-06-03 08:18:52Z 19[JOB] CHILD_SA ESP/0xc7a3cd82/SG-FW-WAN-IP not found for delete
    2022-06-03 08:18:53Z 15[NET] <tunnelname-1|58> received packet: from SG-FW-WAN-IP[4500] to XGS-FW-WAN-NAT-IP[4500] (108 bytes)
    2022-06-03 08:18:53Z 15[ENC] <tunnelname-1|58> parsed INFORMATIONAL_V1 request 3587810147 [ HASH D ]
    2022-06-03 08:18:53Z 15[IKE] <tunnelname-1|58> received DELETE for ESP CHILD_SA with SPI c7a3cd82
    2022-06-03 08:18:53Z 15[IKE] <tunnelname-1|58> CHILD_SA not found, ignored
    2022-06-03 08:18:53Z 14[NET] <tunnelname-1|58> received packet: from SG-FW-WAN-IP[4500] to XGS-FW-WAN-NAT-IP[4500] (572 bytes)
    2022-06-03 08:18:53Z 14[ENC] <tunnelname-1|58> parsed QUICK_MODE request 2260710251 [ HASH SA No KE ID ID ]
    2022-06-03 08:18:53Z 14[IKE] <tunnelname-1|58> ### process_request invoking quick_mode_create
    2022-06-03 08:18:53Z 14[IKE] <tunnelname-1|58> ### quick_mode_create: 0x7f757800b2c0 config (nil)
    2022-06-03 08:18:53Z 14[IKE] <tunnelname-1|58> ### process_r: 0x7f757800b2c0 QM_INIT
    2022-06-03 08:18:53Z 14[IKE] <tunnelname-1|58> detected rekeying of CHILD_SA tunnelname-16{4068}
    2022-06-03 08:18:53Z 14[IKE] <tunnelname-1|58> ### build_r: 0x7f757800b2c0 QM_INIT
    2022-06-03 08:18:53Z 14[ENC] <tunnelname-1|58> generating QUICK_MODE response 2260710251 [ HASH SA No KE ID ID ]
    2022-06-03 08:18:53Z 14[NET] <tunnelname-1|58> sending packet: from XGS-FW-WAN-NAT-IP[4500] to SG-FW-WAN-IP[4500] (604 bytes)
    2022-06-03 08:18:57Z 06[IKE] <tunnelname-1|58> sending retransmit 1 of response message ID 2260710251, seq 27
    2022-06-03 08:18:57Z 06[NET] <tunnelname-1|58> sending packet: from XGS-FW-WAN-NAT-IP[4500] to SG-FW-WAN-IP[4500] (604 bytes)
    2022-06-03 08:18:57Z 24[NET] <tunnelname-1|58> received packet: from SG-FW-WAN-IP[4500] to XGS-FW-WAN-NAT-IP[4500] (92 bytes)
    2022-06-03 08:18:57Z 24[ENC] <tunnelname-1|58> parsed QUICK_MODE request 2260710251 [ HASH ]
    2022-06-03 08:18:57Z 24[IKE] <tunnelname-1|58> ### process_r: 0x7f757800b2c0 QM_NEGOTIATED
    2022-06-03 08:18:57Z 24[CFG] <tunnelname-1|58> handling HA CHILD_SA tunnelname-16{4138} XGS-FW-LAN-IP28/25 === xxx.xxx.xxx.xxx/32 (segment in: 1*, out: 1*)
    2022-06-03 08:18:57Z 24[IKE] <tunnelname-1|58> CHILD_SA tunnelname-16{4138} established with SPIs c73dfcb9_i 85c31292_o and TS XGS-FW-LAN-IP28/25 === xxx.xxx.xxx.xxx/32
    2022-06-03 08:18:57Z 24[IKE] <tunnelname-1|58> ### destroy: 0x7f757800b2c0
    2022-06-03 08:19:01Z 19[NET] <tunnelname-1|58> received packet: from SG-FW-WAN-IP[4500] to XGS-FW-WAN-NAT-IP[4500] (124 bytes)
    2022-06-03 08:19:01Z 19[ENC] <tunnelname-1|58> parsed INFORMATIONAL_V1 request 3674749920 [ HASH N(DPD) ]
    2022-06-03 08:19:01Z 19[ENC] <tunnelname-1|58> generating INFORMATIONAL_V1 request 682025183 [ HASH N(DPD_ACK) ]
    2022-06-03 08:19:01Z 19[NET] <tunnelname-1|58> sending packet: from XGS-FW-WAN-NAT-IP[4500] to SG-FW-WAN-IP[4500] (124 bytes)
    2022-06-03 08:19:24Z 22[NET] <tunnelname-1|58> received packet: from SG-FW-WAN-IP[4500] to XGS-FW-WAN-NAT-IP[4500] (572 bytes)
    2022-06-03 08:19:24Z 22[ENC] <tunnelname-1|58> parsed QUICK_MODE request 3576993779 [ HASH SA No KE ID ID ]
    2022-06-03 08:19:24Z 22[IKE] <tunnelname-1|58> ### process_request invoking quick_mode_create
    2022-06-03 08:19:24Z 22[IKE] <tunnelname-1|58> ### quick_mode_create: 0x7f7568009ac0 config (nil)
    2022-06-03 08:19:24Z 22[IKE] <tunnelname-1|58> ### process_r: 0x7f7568009ac0 QM_INIT
    2022-06-03 08:19:24Z 22[IKE] <tunnelname-1|58> detected rekeying of CHILD_SA tunnelname-64{4066}
    2022-06-03 08:19:24Z 22[IKE] <tunnelname-1|58> ### build_r: 0x7f7568009ac0 QM_INIT
    2022-06-03 08:19:24Z 22[ENC] <tunnelname-1|58> generating QUICK_MODE response 3576993779 [ HASH SA No KE ID ID ]
    2022-06-03 08:19:24Z 22[NET] <tunnelname-1|58> sending packet: from XGS-FW-WAN-NAT-IP[4500] to SG-FW-WAN-IP[4500] (604 bytes)
    2022-06-03 08:19:28Z 02[IKE] <tunnelname-1|58> sending retransmit 1 of response message ID 3576993779, seq 28
    2022-06-03 08:19:28Z 02[NET] <tunnelname-1|58> sending packet: from XGS-FW-WAN-NAT-IP[4500] to SG-FW-WAN-IP[4500] (604 bytes)
    2022-06-03 08:19:31Z 27[NET] <tunnelname-1|58> received packet: from SG-FW-WAN-IP[4500] to XGS-FW-WAN-NAT-IP[4500] (124 bytes)
    2022-06-03 08:19:31Z 27[ENC] <tunnelname-1|58> parsed INFORMATIONAL_V1 request 3808731915 [ HASH N(DPD) ]
    2022-06-03 08:19:31Z 27[ENC] <tunnelname-1|58> generating INFORMATIONAL_V1 request 848497006 [ HASH N(DPD_ACK) ]
    2022-06-03 08:19:31Z 27[NET] <tunnelname-1|58> sending packet: from XGS-FW-WAN-NAT-IP[4500] to SG-FW-WAN-IP[4500] (124 bytes)
    2022-06-03 08:19:34Z 24[NET] <tunnelname-1|58> received packet: from SG-FW-WAN-IP[4500] to XGS-FW-WAN-NAT-IP[4500] (572 bytes)
    2022-06-03 08:19:34Z 24[ENC] <tunnelname-1|58> invalid HASH_V1 payload length, decryption failed?
    2022-06-03 08:19:34Z 24[ENC] <tunnelname-1|58> could not decrypt payloads
    2022-06-03 08:19:34Z 24[IKE] <tunnelname-1|58> message parsing failed
    2022-06-03 08:19:34Z 24[ENC] <tunnelname-1|58> generating INFORMATIONAL_V1 request 2977994943 [ HASH N(PLD_MAL) ]
    2022-06-03 08:19:34Z 24[NET] <tunnelname-1|58> sending packet: from XGS-FW-WAN-NAT-IP[4500] to SG-FW-WAN-IP[4500] (108 bytes)
    2022-06-03 08:19:34Z 24[IKE] <tunnelname-1|58> QUICK_MODE request with message ID 3576993779 processing failed
    2022-06-03 08:19:34Z 24[DMN] <tunnelname-1|58> [GARNER-LOGGING] (child_alert) ALERT: parsing IKE message from SG-FW-WAN-IP[4500] failed
    2022-06-03 08:19:35Z 31[IKE] <tunnelname-1|58> sending retransmit 2 of response message ID 3576993779, seq 28
    2022-06-03 08:19:35Z 31[NET] <tunnelname-1|58> sending packet: from XGS-FW-WAN-NAT-IP[4500] to SG-FW-WAN-IP[4500] (604 bytes)
    2022-06-03 08:19:46Z 24[KNL] creating rekey job for CHILD_SA ESP/0xc9f17cb7/XGS-FW-WAN-NAT-IP
    2022-06-03 08:19:48Z 30[IKE] <tunnelname-1|58> sending retransmit 3 of response message ID 3576993779, seq 28
    2022-06-03 08:19:48Z 30[NET] <tunnelname-1|58> sending packet: from XGS-FW-WAN-NAT-IP[4500] to SG-FW-WAN-IP[4500] (604 bytes)
    2022-06-03 08:19:54Z 24[NET] <tunnelname-1|58> received packet: from SG-FW-WAN-IP[4500] to XGS-FW-WAN-NAT-IP[4500] (572 bytes)
    2022-06-03 08:19:54Z 24[ENC] <tunnelname-1|58> invalid HASH_V1 payload length, decryption failed?
    2022-06-03 08:19:54Z 24[ENC] <tunnelname-1|58> could not decrypt payloads
    2022-06-03 08:19:54Z 24[IKE] <tunnelname-1|58> message parsing failed
    2022-06-03 08:19:54Z 24[ENC] <tunnelname-1|58> generating INFORMATIONAL_V1 request 3476149994 [ HASH N(PLD_MAL) ]
    2022-06-03 08:19:54Z 24[NET] <tunnelname-1|58> sending packet: from XGS-FW-WAN-NAT-IP[4500] to SG-FW-WAN-IP[4500] (108 bytes)
    2022-06-03 08:19:54Z 24[IKE] <tunnelname-1|58> QUICK_MODE request with message ID 3576993779 processing failed
    2022-06-03 08:19:54Z 24[DMN] <tunnelname-1|58> [GARNER-LOGGING] (child_alert) ALERT: parsing IKE message from SG-FW-WAN-IP[4500] failed
    2022-06-03 08:19:56Z 02[NET] <tunnelname-1|58> received packet: from SG-FW-WAN-IP[4500] to XGS-FW-WAN-NAT-IP[4500] (108 bytes)
    2022-06-03 08:19:56Z 02[ENC] <tunnelname-1|58> parsed INFORMATIONAL_V1 request 4163275253 [ HASH D ]
    2022-06-03 08:19:56Z 02[IKE] <tunnelname-1|58> received DELETE for ESP CHILD_SA with SPI 2565460f
    2022-06-03 08:19:56Z 02[IKE] <tunnelname-1|58> closing CHILD_SA tunnelname-45{4048} with SPIs c3fca996_i (0 bytes) 2565460f_o (0 bytes) and TS xxx.xxx.xxx.xxx/27 === xxx.xxx.xxx.xxx/32
    2022-06-03 08:19:57Z 25[NET] <tunnelname-1|58> received packet: from SG-FW-WAN-IP[4500] to XGS-FW-WAN-NAT-IP[4500] (572 bytes)
    2022-06-03 08:19:57Z 25[ENC] <tunnelname-1|58> parsed QUICK_MODE request 2041915930 [ HASH SA No KE ID ID ]
    2022-06-03 08:19:57Z 25[IKE] <tunnelname-1|58> ### process_request invoking quick_mode_create
    2022-06-03 08:19:57Z 25[IKE] <tunnelname-1|58> ### quick_mode_create: 0x7f7588004240 config (nil)
    2022-06-03 08:19:57Z 25[IKE] <tunnelname-1|58> ### process_r: 0x7f7588004240 QM_INIT
    2022-06-03 08:19:57Z 25[IKE] <tunnelname-1|58> detected rekeying of CHILD_SA tunnelname-36{4069}
    2022-06-03 08:19:57Z 25[IKE] <tunnelname-1|58> ### build_r: 0x7f7588004240 QM_INIT
    2022-06-03 08:19:57Z 25[ENC] <tunnelname-1|58> generating QUICK_MODE response 2041915930 [ HASH SA No KE ID ID ]
    2022-06-03 08:19:57Z 25[NET] <tunnelname-1|58> sending packet: from XGS-FW-WAN-NAT-IP[4500] to SG-FW-WAN-IP[4500] (604 bytes)
    2022-06-03 08:19:59Z 26[NET] <tunnelname-1|58> received packet: from SG-FW-WAN-IP[4500] to XGS-FW-WAN-NAT-IP[4500] (572 bytes)
    2022-06-03 08:19:59Z 26[ENC] <tunnelname-1|58> parsed QUICK_MODE request 1420105002 [ HASH SA No KE ID ID ]
    2022-06-03 08:19:59Z 26[IKE] <tunnelname-1|58> ### process_request invoking quick_mode_create
    2022-06-03 08:19:59Z 26[IKE] <tunnelname-1|58> ### quick_mode_create: 0x7f755c00b640 config (nil)
    2022-06-03 08:19:59Z 26[IKE] <tunnelname-1|58> ### process_r: 0x7f755c00b640 QM_INIT
    2022-06-03 08:19:59Z 26[IKE] <tunnelname-1|58> detected rekeying of CHILD_SA tunnelname-61{4070}
    2022-06-03 08:19:59Z 26[IKE] <tunnelname-1|58> ### build_r: 0x7f755c00b640 QM_INIT
    2022-06-03 08:19:59Z 26[ENC] <tunnelname-1|58> generating QUICK_MODE response 1420105002 [ HASH SA No KE ID ID ]
    2022-06-03 08:19:59Z 26[NET] <tunnelname-1|58> sending packet: from XGS-FW-WAN-NAT-IP[4500] to SG-FW-WAN-IP[4500] (604 bytes)
    2022-06-03 08:20:01Z 24[NET] <tunnelname-1|58> received packet: from SG-FW-WAN-IP[4500] to XGS-FW-WAN-NAT-IP[4500] (124 bytes)
    2022-06-03 08:20:01Z 24[ENC] <tunnelname-1|58> parsed INFORMATIONAL_V1 request 3806480796 [ HASH N(DPD) ]
    2022-06-03 08:20:01Z 24[ENC] <tunnelname-1|58> generating INFORMATIONAL_V1 request 2720389760 [ HASH N(DPD_ACK) ]
    2022-06-03 08:20:01Z 24[NET] <tunnelname-1|58> sending packet: from XGS-FW-WAN-NAT-IP[4500] to SG-FW-WAN-IP[4500] (124 bytes)
    2022-06-03 08:20:03Z 02[IKE] <tunnelname-1|58> sending retransmit 1 of response message ID 1420105002, seq 30
    2022-06-03 08:20:03Z 02[NET] <tunnelname-1|58> sending packet: from XGS-FW-WAN-NAT-IP[4500] to SG-FW-WAN-IP[4500] (604 bytes)
    2022-06-03 08:20:07Z 26[NET] <tunnelname-1|58> received packet: from SG-FW-WAN-IP[4500] to XGS-FW-WAN-NAT-IP[4500] (572 bytes)
    2022-06-03 08:20:07Z 26[ENC] <tunnelname-1|58> invalid HASH_V1 payload length, decryption failed?
    2022-06-03 08:20:07Z 26[ENC] <tunnelname-1|58> could not decrypt payloads
    2022-06-03 08:20:07Z 26[IKE] <tunnelname-1|58> message parsing failed
    2022-06-03 08:20:07Z 26[ENC] <tunnelname-1|58> generating INFORMATIONAL_V1 request 2423317326 [ HASH N(PLD_MAL) ]
    2022-06-03 08:20:07Z 26[NET] <tunnelname-1|58> sending packet: from XGS-FW-WAN-NAT-IP[4500] to SG-FW-WAN-IP[4500] (108 bytes)
    2022-06-03 08:20:07Z 26[IKE] <tunnelname-1|58> QUICK_MODE request with message ID 2041915930 processing failed
    2022-06-03 08:20:07Z 26[DMN] <tunnelname-1|58> [GARNER-LOGGING] (child_alert) ALERT: parsing IKE message from SG-FW-WAN-IP[4500] failed
    2022-06-03 08:20:09Z 19[NET] <tunnelname-1|58> received packet: from SG-FW-WAN-IP[4500] to XGS-FW-WAN-NAT-IP[4500] (572 bytes)
    2022-06-03 08:20:09Z 19[ENC] <tunnelname-1|58> invalid HASH_V1 payload length, decryption failed?
    2022-06-03 08:20:09Z 19[ENC] <tunnelname-1|58> could not decrypt payloads
    2022-06-03 08:20:09Z 19[IKE] <tunnelname-1|58> message parsing failed
    2022-06-03 08:20:09Z 19[ENC] <tunnelname-1|58> generating INFORMATIONAL_V1 request 874055981 [ HASH N(PLD_MAL) ]
    2022-06-03 08:20:09Z 19[NET] <tunnelname-1|58> sending packet: from XGS-FW-WAN-NAT-IP[4500] to SG-FW-WAN-IP[4500] (108 bytes)
    2022-06-03 08:20:09Z 19[IKE] <tunnelname-1|58> QUICK_MODE request with message ID 1420105002 processing failed
    2022-06-03 08:20:09Z 19[DMN] <tunnelname-1|58> [GARNER-LOGGING] (child_alert) ALERT: parsing IKE message from SG-FW-WAN-IP[4500] failed
    2022-06-03 08:20:10Z 14[IKE] <tunnelname-1|58> sending retransmit 2 of response message ID 1420105002, seq 30
    2022-06-03 08:20:10Z 14[NET] <tunnelname-1|58> sending packet: from XGS-FW-WAN-NAT-IP[4500] to SG-FW-WAN-IP[4500] (604 bytes)
    2022-06-03 08:20:10Z 15[NET] <tunnelname-1|58> received packet: from SG-FW-WAN-IP[4500] to XGS-FW-WAN-NAT-IP[4500] (92 bytes)
    2022-06-03 08:20:10Z 15[ENC] <tunnelname-1|58> parsed QUICK_MODE request 1420105002 [ HASH ]
    2022-06-03 08:20:10Z 15[IKE] <tunnelname-1|58> ### process_r: 0x7f755c00b640 QM_NEGOTIATED
    2022-06-03 08:20:10Z 15[CFG] <tunnelname-1|58> handling HA CHILD_SA tunnelname-61{4141} xxx.xxx.xxx.xxx/25 === xxx.xxx.xxx.xxx/32 (segment in: 1*, out: 1*)
    2022-06-03 08:20:10Z 15[IKE] <tunnelname-1|58> CHILD_SA tunnelname-61{4141} established with SPIs c6426470_i 1853eb9d_o and TS xxx.xxx.xxx.xxx/25 === xxx.xxx.xxx.xxx/32
    2022-06-03 08:20:10Z 15[IKE] <tunnelname-1|58> ### destroy: 0x7f755c00b640
    2022-06-03 08:20:18Z 27[KNL] creating rekey job for CHILD_SA ESP/0x453ed667/SG-FW-WAN-IP
    2022-06-03 08:20:21Z 25[KNL] creating rekey job for CHILD_SA ESP/0xcxxx.xxx.xxx.xxx/XGS-FW-WAN-NAT-IP
    2022-06-03 08:20:23Z 32[KNL] creating rekey job for CHILD_SA ESP/0x06221ca7/SG-FW-WAN-IP
    2022-06-03 08:20:25Z 27[KNL] creating rekey job for CHILD_SA ESP/0xdxxx.xxx.xxx.xxx/SG-FW-WAN-IP
    2022-06-03 08:20:26Z 22[KNL] creating rekey job for CHILD_SA ESP/0xcf5e6edd/XGS-FW-WAN-NAT-IP
    2022-06-03 08:20:27Z 24[NET] <tunnelname-1|58> received packet: from SG-FW-WAN-IP[4500] to XGS-FW-WAN-NAT-IP[4500] (572 bytes)
    2022-06-03 08:20:27Z 24[ENC] <tunnelname-1|58> invalid HASH_V1 payload length, decryption failed?
    2022-06-03 08:20:27Z 24[ENC] <tunnelname-1|58> could not decrypt payloads
    2022-06-03 08:20:27Z 24[IKE] <tunnelname-1|58> message parsing failed
    2022-06-03 08:20:27Z 24[ENC] <tunnelname-1|58> generating INFORMATIONAL_V1 request 4221961941 [ HASH N(PLD_MAL) ]
    2022-06-03 08:20:27Z 24[NET] <tunnelname-1|58> sending packet: from XGS-FW-WAN-NAT-IP[4500] to SG-FW-WAN-IP[4500] (108 bytes)
    2022-06-03 08:20:27Z 24[IKE] <tunnelname-1|58> QUICK_MODE request with message ID 2041915930 processing failed
    2022-06-03 08:20:27Z 24[DMN] <tunnelname-1|58> [GARNER-LOGGING] (child_alert) ALERT: parsing IKE message from SG-FW-WAN-IP[4500] failed
    2022-06-03 08:20:32Z 14[KNL] creating rekey job for CHILD_SA ESP/0xcbcf1f32/XGS-FW-WAN-NAT-IP
    2022-06-03 08:20:34Z 06[NET] <tunnelname-1|58> received packet: from SG-FW-WAN-IP[4500] to XGS-FW-WAN-NAT-IP[4500] (572 bytes)
    2022-06-03 08:20:34Z 06[ENC] <tunnelname-1|58> parsed QUICK_MODE request 1092079495 [ HASH SA No KE ID ID ]
    2022-06-03 08:20:34Z 06[IKE] <tunnelname-1|58> ### process_request invoking quick_mode_create
    2022-06-03 08:20:34Z 06[IKE] <tunnelname-1|58> ### quick_mode_create: 0x7f75ac0062c0 config (nil)
    2022-06-03 08:20:34Z 06[IKE] <tunnelname-1|58> ### process_r: 0x7f75ac0062c0 QM_INIT
    2022-06-03 08:20:34Z 06[IKE] <tunnelname-1|58> detected rekeying of CHILD_SA tunnelname-64{4066}
    2022-06-03 08:20:34Z 06[IKE] <tunnelname-1|58> ### build_r: 0x7f75ac0062c0 QM_INIT
    2022-06-03 08:20:34Z 06[ENC] <tunnelname-1|58> generating QUICK_MODE response 1092079495 [ HASH SA No KE ID ID ]
    2022-06-03 08:20:34Z 06[NET] <tunnelname-1|58> sending packet: from XGS-FW-WAN-NAT-IP[4500] to SG-FW-WAN-IP[4500] (604 bytes)
    2022-06-03 08:20:34Z 24[NET] <tunnelname-1|58> received packet: from SG-FW-WAN-IP[4500] to XGS-FW-WAN-NAT-IP[4500] (92 bytes)
    2022-06-03 08:20:34Z 24[ENC] <tunnelname-1|58> parsed QUICK_MODE request 1092079495 [ HASH ]
    2022-06-03 08:20:34Z 24[IKE] <tunnelname-1|58> ### process_r: 0x7f75ac0062c0 QM_NEGOTIATED
    2022-06-03 08:20:34Z 24[CFG] <tunnelname-1|58> handling HA CHILD_SA tunnelname-64{4142} xxx.xxx.xxx.xxx/25 === xxx.xxx.xxx.xxx/32 (segment in: 1*, out: 1*)
    2022-06-03 08:20:34Z 24[IKE] <tunnelname-1|58> CHILD_SA tunnelname-64{4142} established with SPIs c98fe7bb_i 32b83333_o and TS xxx.xxx.xxx.xxx/25 === xxx.xxx.xxx.xxx/32
    2022-06-03 08:20:34Z 24[IKE] <tunnelname-1|58> ### destroy: 0x7f75ac0062c0
    2022-06-03 08:20:39Z 10[KNL] creating rekey job for CHILD_SA ESP/0xef3df4c5/SG-FW-WAN-IP
    2022-06-03 08:20:50Z 18[KNL] creating delete job for CHILD_SA ESP/0xc9c7cce9/XGS-FW-WAN-NAT-IP
    2022-06-03 08:20:50Z 32[KNL] creating delete job for CHILD_SA ESP/0xf4bbb0f8/SG-FW-WAN-IP
    2022-06-03 08:20:50Z 21[IKE] <tunnelname-1|58> closing expired CHILD_SA tunnelname-55{4049} with SPIs c9c7cce9_i f4bbb0f8_o and TS xxx.xxx.xxx.xxx/27 === xxx.xxx.xxx.xxx/32
    2022-06-03 08:20:50Z 21[IKE] <tunnelname-1|58> sending DELETE for ESP CHILD_SA with SPI c9c7cce9
    2022-06-03 08:20:50Z 21[ENC] <tunnelname-1|58> generating INFORMATIONAL_V1 request 1662990727 [ HASH D ]
    2022-06-03 08:20:50Z 21[NET] <tunnelname-1|58> sending packet: from XGS-FW-WAN-NAT-IP[4500] to SG-FW-WAN-IP[4500] (108 bytes)
    2022-06-03 08:20:50Z 32[JOB] CHILD_SA ESP/0xf4bbb0f8/SG-FW-WAN-IP not found for delete
    2022-06-03 08:20:50Z 27[NET] <tunnelname-1|58> received packet: from SG-FW-WAN-IP[4500] to XGS-FW-WAN-NAT-IP[4500] (108 bytes)
    2022-06-03 08:20:50Z 27[ENC] <tunnelname-1|58> parsed INFORMATIONAL_V1 request 3917164347 [ HASH D ]
    2022-06-03 08:20:50Z 27[IKE] <tunnelname-1|58> received DELETE for ESP CHILD_SA with SPI f4bbb0f8
    2022-06-03 08:20:50Z 27[IKE] <tunnelname-1|58> CHILD_SA not found, ignored
    2022-06-03 08:20:52Z 31[KNL] creating rekey job for CHILD_SA ESP/0xbxxx.xxx.xxx.xxx/SG-FW-WAN-IP
    2022-06-03 08:20:57Z 18[NET] <tunnelname-1|58> received packet: from SG-FW-WAN-IP[4500] to XGS-FW-WAN-NAT-IP[4500] (572 bytes)
    2022-06-03 08:20:57Z 18[ENC] <tunnelname-1|58> parsed QUICK_MODE request 1713076797 [ HASH SA No KE ID ID ]
    2022-06-03 08:20:57Z 18[IKE] <tunnelname-1|58> ### process_request invoking quick_mode_create
    2022-06-03 08:20:57Z 18[IKE] <tunnelname-1|58> ### quick_mode_create: 0x7f7570008be0 config (nil)
    2022-06-03 08:20:57Z 18[IKE] <tunnelname-1|58> ### process_r: 0x7f7570008be0 QM_INIT
    2022-06-03 08:20:57Z 18[IKE] <tunnelname-1|58> detected rekeying of CHILD_SA tunnelname-22{4076}
    2022-06-03 08:20:57Z 18[IKE] <tunnelname-1|58> ### build_r: 0x7f7570008be0 QM_INIT
    2022-06-03 08:20:57Z 18[ENC] <tunnelname-1|58> generating QUICK_MODE response 1713076797 [ HASH SA No KE ID ID ]
    2022-06-03 08:20:57Z 18[NET] <tunnelname-1|58> sending packet: from XGS-FW-WAN-NAT-IP[4500] to SG-FW-WAN-IP[4500] (604 bytes)
    2022-06-03 08:20:59Z 27[KNL] creating delete job for CHILD_SA ESP/0xc03a56af/XGS-FW-WAN-NAT-IP
    2022-06-03 08:20:59Z 16[JOB] CHILD_SA ESP/0xc03a56af/XGS-FW-WAN-NAT-IP not found for delete
    2022-06-03 08:21:01Z 12[IKE] <tunnelname-1|58> sending retransmit 1 of response message ID 1713076797, seq 32
    2022-06-03 08:21:01Z 12[NET] <tunnelname-1|58> sending packet: from XGS-FW-WAN-NAT-IP[4500] to SG-FW-WAN-IP[4500] (604 bytes)
    2022-06-03 08:21:07Z 21[NET] <tunnelname-1|58> received packet: from SG-FW-WAN-IP[4500] to XGS-FW-WAN-NAT-IP[4500] (572 bytes)
    2022-06-03 08:21:07Z 21[IKE] <tunnelname-1|58> received retransmit of request with ID 1713076797, retransmitting response
    2022-06-03 08:21:07Z 21[NET] <tunnelname-1|58> sending packet: from XGS-FW-WAN-NAT-IP[4500] to SG-FW-WAN-IP[4500] (604 bytes)
    2022-06-03 08:21:07Z 32[NET] <tunnelname-1|58> received packet: from SG-FW-WAN-IP[4500] to XGS-FW-WAN-NAT-IP[4500] (572 bytes)
    2022-06-03 08:21:07Z 32[ENC] <tunnelname-1|58> parsed QUICK_MODE request 1898824916 [ HASH SA No KE ID ID ]
    2022-06-03 08:21:07Z 32[IKE] <tunnelname-1|58> ### process_request invoking quick_mode_create
    2022-06-03 08:21:07Z 32[IKE] <tunnelname-1|58> ### quick_mode_create: 0x2013710 config (nil)
    2022-06-03 08:21:07Z 32[IKE] <tunnelname-1|58> ### process_r: 0x2013710 QM_INIT
    2022-06-03 08:21:07Z 32[IKE] <tunnelname-1|58> detected rekeying of CHILD_SA tunnelname-36{4069}
    2022-06-03 08:21:07Z 32[IKE] <tunnelname-1|58> ### build_r: 0x2013710 QM_INIT
    2022-06-03 08:21:07Z 32[ENC] <tunnelname-1|58> generating QUICK_MODE response 1898824916 [ HASH SA No KE ID ID ]
    2022-06-03 08:21:07Z 32[NET] <tunnelname-1|58> sending packet: from XGS-FW-WAN-NAT-IP[4500] to SG-FW-WAN-IP[4500] (604 bytes)
    2022-06-03 08:21:10Z 28[KNL] creating rekey job for CHILD_SA ESP/0xd14b73e1/SG-FW-WAN-IP
    2022-06-03 08:21:11Z 26[IKE] <tunnelname-1|58> sending retransmit 1 of response message ID 1898824916, seq 33
    2022-06-03 08:21:11Z 26[NET] <tunnelname-1|58> sending packet: from XGS-FW-WAN-NAT-IP[4500] to SG-FW-WAN-IP[4500] (604 bytes)
    2022-06-03 08:21:11Z 19[KNL] creating rekey job for CHILD_SA ESP/xxx.xxx.xxx.xxx/SG-FW-WAN-IP
    2022-06-03 08:21:17Z 28[NET] <tunnelname-1|58> received packet: from SG-FW-WAN-IP[4500] to XGS-FW-WAN-NAT-IP[4500] (572 bytes)
    2022-06-03 08:21:17Z 28[IKE] <tunnelname-1|58> received retransmit of request with ID 1898824916, retransmitting response
    2022-06-03 08:21:17Z 28[NET] <tunnelname-1|58> sending packet: from XGS-FW-WAN-NAT-IP[4500] to SG-FW-WAN-IP[4500] (604 bytes)
    2022-06-03 08:21:18Z 06[IKE] <tunnelname-1|58> sending retransmit 2 of response message ID 1898824916, seq 33
    2022-06-03 08:21:18Z 06[NET] <tunnelname-1|58> sending packet: from XGS-FW-WAN-NAT-IP[4500] to SG-FW-WAN-IP[4500] (604 bytes)
    2022-06-03 08:21:27Z 22[NET] <tunnelname-1|58> received packet: from SG-FW-WAN-IP[4500] to XGS-FW-WAN-NAT-IP[4500] (572 bytes)
    2022-06-03 08:21:27Z 22[ENC] <tunnelname-1|58> invalid HASH_V1 payload length, decryption failed?
    2022-06-03 08:21:27Z 22[ENC] <tunnelname-1|58> could not decrypt payloads
    2022-06-03 08:21:27Z 22[IKE] <tunnelname-1|58> message parsing failed
    2022-06-03 08:21:27Z 22[ENC] <tunnelname-1|58> generating INFORMATIONAL_V1 request 211820257 [ HASH N(PLD_MAL) ]
    2022-06-03 08:21:27Z 22[NET] <tunnelname-1|58> sending packet: from XGS-FW-WAN-NAT-IP[4500] to SG-FW-WAN-IP[4500] (108 bytes)
    2022-06-03 08:21:27Z 22[IKE] <tunnelname-1|58> QUICK_MODE request with message ID 1713076797 processing failed
    2022-06-03 08:21:27Z 22[DMN] <tunnelname-1|58> [GARNER-LOGGING] (child_alert) ALERT: parsing IKE message from SG-FW-WAN-IP[4500] failed
    2022-06-03 08:21:30Z 17[KNL] creating rekey job for CHILD_SA ESP/0xcefff049/XGS-FW-WAN-NAT-IP
    2022-06-03 08:21:31Z 02[NET] <tunnelname-1|58> received packet: from SG-FW-WAN-IP[4500] to XGS-FW-WAN-NAT-IP[4500] (124 bytes)
    2022-06-03 08:21:31Z 02[ENC] <tunnelname-1|58> parsed INFORMATIONAL_V1 request 4025617500 [ HASH N(DPD) ]
    2022-06-03 08:21:31Z 02[ENC] <tunnelname-1|58> generating INFORMATIONAL_V1 request 1490711358 [ HASH N(DPD_ACK) ]
    2022-06-03 08:21:31Z 02[NET] <tunnelname-1|58> sending packet: from XGS-FW-WAN-NAT-IP[4500] to SG-FW-WAN-IP[4500] (124 bytes)
    2022-06-03 08:21:31Z 16[IKE] <tunnelname-1|58> sending retransmit 3 of response message ID 1898824916, seq 33
    2022-06-03 08:21:31Z 16[NET] <tunnelname-1|58> sending packet: from XGS-FW-WAN-NAT-IP[4500] to SG-FW-WAN-IP[4500] (604 bytes)
    2022-06-03 08:21:31Z 14[NET] <tunnelname-1|58> received packet: from SG-FW-WAN-IP[4500] to XGS-FW-WAN-NAT-IP[4500] (92 bytes)
    2022-06-03 08:21:31Z 14[ENC] <tunnelname-1|58> parsed QUICK_MODE request 1898824916 [ HASH ]
    2022-06-03 08:21:31Z 14[IKE] <tunnelname-1|58> ### process_r: 0x2013710 QM_NEGOTIATED
    2022-06-03 08:21:31Z 14[CFG] <tunnelname-1|58> handling HA CHILD_SA tunnelname-36{4144} xxx.xxx.xxx.xxx/26 === xxx.xxx.xxx.xxx/32 (segment in: 1*, out: 1*)
    2022-06-03 08:21:31Z 14[IKE] <tunnelname-1|58> CHILD_SA tunnelname-36{4144} established with SPIs c91e94be_i 98a86487_o and TS xxx.xxx.xxx.xxx/26 === xxx.xxx.xxx.xxx/32
    2022-06-03 08:21:31Z 14[IKE] <tunnelname-1|58> ### destroy: 0x2013710
    2022-06-03 08:21:36Z 06[KNL] creating delete job for CHILD_SA ESP/0xc2760fa0/XGS-FW-WAN-NAT-IP
    2022-06-03 08:21:36Z 31[KNL] creating delete job for CHILD_SA ESP/0x7fdd149d/SG-FW-WAN-IP
    2022-06-03 08:21:36Z 17[IKE] <tunnelname-1|58> closing expired CHILD_SA tunnelname-9{4050} with SPIs c2760fa0_i 7fdd149d_o and TS xxx.xxx.xxx.xxx/25 === xxx.xxx.xxx.xxx/32
    2022-06-03 08:21:36Z 17[IKE] <tunnelname-1|58> sending DELETE for ESP CHILD_SA with SPI c2760fa0
    2022-06-03 08:21:36Z 17[ENC] <tunnelname-1|58> generating INFORMATIONAL_V1 request 2334118626 [ HASH D ]
    2022-06-03 08:21:36Z 17[NET] <tunnelname-1|58> sending packet: from XGS-FW-WAN-NAT-IP[4500] to SG-FW-WAN-IP[4500] (108 bytes)
    2022-06-03 08:21:36Z 20[JOB] CHILD_SA ESP/0x7fdd149d/SG-FW-WAN-IP not found for delete
    2022-06-03 08:21:36Z 02[NET] <tunnelname-1|58> received packet: from SG-FW-WAN-IP[4500] to XGS-FW-WAN-NAT-IP[4500] (108 bytes)
    2022-06-03 08:21:36Z 02[ENC] <tunnelname-1|58> parsed INFORMATIONAL_V1 request 1390602584 [ HASH D ]
    2022-06-03 08:21:36Z 02[IKE] <tunnelname-1|58> received DELETE for ESP CHILD_SA with SPI 7fdd149d
    2022-06-03 08:21:36Z 02[IKE] <tunnelname-1|58> CHILD_SA not found, ignored
    2022-06-03 08:21:50Z 18[KNL] creating rekey job for CHILD_SA ESP/0xc0bc1491/XGS-FW-WAN-NAT-IP
    2022-06-03 08:22:02Z 12[KNL] creating rekey job for CHILD_SA ESP/xxx.xxx.xxx.xxx/SG-FW-WAN-IP
    2022-06-03 08:22:06Z 02[NET] <tunnelname-1|58> received packet: from SG-FW-WAN-IP[4500] to XGS-FW-WAN-NAT-IP[4500] (572 bytes)
    2022-06-03 08:22:06Z 02[ENC] <tunnelname-1|58> parsed QUICK_MODE request 3881500991 [ HASH SA No KE ID ID ]
    2022-06-03 08:22:06Z 02[IKE] <tunnelname-1|58> ### process_request invoking quick_mode_create
    2022-06-03 08:22:06Z 02[IKE] <tunnelname-1|58> ### quick_mode_create: 0x7f75a4009b50 config (nil)
    2022-06-03 08:22:06Z 02[IKE] <tunnelname-1|58> ### process_r: 0x7f75a4009b50 QM_INIT
    2022-06-03 08:22:06Z 02[IKE] <tunnelname-1|58> detected rekeying of CHILD_SA tunnelname-59{4077}
    2022-06-03 08:22:06Z 02[IKE] <tunnelname-1|58> ### build_r: 0x7f75a4009b50 QM_INIT
    2022-06-03 08:22:06Z 02[ENC] <tunnelname-1|58> generating QUICK_MODE response 3881500991 [ HASH SA No KE ID ID ]
    2022-06-03 08:22:06Z 02[NET] <tunnelname-1|58> sending packet: from XGS-FW-WAN-NAT-IP[4500] to SG-FW-WAN-IP[4500] (604 bytes)
    2022-06-03 08:22:06Z 30[NET] <tunnelname-1|58> received packet: from SG-FW-WAN-IP[4500] to XGS-FW-WAN-NAT-IP[4500] (92 bytes)
    2022-06-03 08:22:06Z 30[ENC] <tunnelname-1|58> parsed QUICK_MODE request 3881500991 [ HASH ]
    2022-06-03 08:22:06Z 30[IKE] <tunnelname-1|58> ### process_r: 0x7f75a4009b50 QM_NEGOTIATED
    2022-06-03 08:22:06Z 30[CFG] <tunnelname-1|58> handling HA CHILD_SA tunnelname-59{4145} xxx.xxx.xxx.xxx/27 === xxx.xxx.xxx.xxx/32 (segment in: 1*, out: 1*)
    2022-06-03 08:22:06Z 30[IKE] <tunnelname-1|58> CHILD_SA tunnelname-59{4145} established with SPIs cdeb1353_i be08324e_o and TS xxx.xxx.xxx.xxx/27 === xxx.xxx.xxx.xxx/32
    2022-06-03 08:22:06Z 30[IKE] <tunnelname-1|58> ### destroy: 0x7f75a4009b50
    2022-06-03 08:22:07Z 18[NET] <tunnelname-1|58> received packet: from SG-FW-WAN-IP[4500] to XGS-FW-WAN-NAT-IP[4500] (572 bytes)
    2022-06-03 08:22:07Z 18[ENC] <tunnelname-1|58> parsed QUICK_MODE request 2557815962 [ HASH SA No KE ID ID ]
    2022-06-03 08:22:07Z 18[IKE] <tunnelname-1|58> ### process_request invoking quick_mode_create
    2022-06-03 08:22:07Z 18[IKE] <tunnelname-1|58> ### quick_mode_create: 0x7f757001eec0 config (nil)
    2022-06-03 08:22:07Z 18[IKE] <tunnelname-1|58> ### process_r: 0x7f757001eec0 QM_INIT
    2022-06-03 08:22:07Z 18[IKE] <tunnelname-1|58> detected rekeying of CHILD_SA tunnelname-22{4076}
    2022-06-03 08:22:07Z 18[IKE] <tunnelname-1|58> ### build_r: 0x7f757001eec0 QM_INIT
    2022-06-03 08:22:07Z 18[ENC] <tunnelname-1|58> generating QUICK_MODE response 2557815962 [ HASH SA No KE ID ID ]
    2022-06-03 08:22:07Z 18[NET] <tunnelname-1|58> sending packet: from XGS-FW-WAN-NAT-IP[4500] to SG-FW-WAN-IP[4500] (604 bytes)
    2022-06-03 08:22:07Z 26[NET] <tunnelname-1|58> received packet: from SG-FW-WAN-IP[4500] to XGS-FW-WAN-NAT-IP[4500] (92 bytes)
    2022-06-03 08:22:07Z 26[ENC] <tunnelname-1|58> parsed QUICK_MODE request 2557815962 [ HASH ]
    2022-06-03 08:22:07Z 26[IKE] <tunnelname-1|58> ### process_r: 0x7f757001eec0 QM_NEGOTIATED
    2022-06-03 08:22:07Z 26[CFG] <tunnelname-1|58> handling HA CHILD_SA tunnelname-22{4146} xxx.xxx.xxx.xxx/24 === xxx.xxx.xxx.xxx/32 (segment in: 1*, out: 1*)
    2022-06-03 08:22:07Z 26[IKE] <tunnelname-1|58> CHILD_SA tunnelname-22{4146} established with SPIs c0a88019_i 59758769_o and TS xxx.xxx.xxx.xxx/24 === xxx.xxx.xxx.xxx/32
    2022-06-03 08:22:07Z 26[IKE] <tunnelname-1|58> ### destroy: 0x7f757001eec0
    2022-06-03 08:22:09Z 21[KNL] creating rekey job for CHILD_SA ESP/0xb6574de2/SG-FW-WAN-IP
    2022-06-03 08:22:09Z 16[KNL] creating delete job for CHILD_SA ESP/0xcxxx.xxx.xxx.xxx/XGS-FW-WAN-NAT-IP
    2022-06-03 08:22:09Z 14[JOB] CHILD_SA ESP/0xcxxx.xxx.xxx.xxx/XGS-FW-WAN-NAT-IP not found for delete
    2022-06-03 08:22:09Z 15[KNL] creating rekey job for CHILD_SA ESP/0xcb93cf6d/XGS-FW-WAN-NAT-IP
    2022-06-03 08:22:13Z 21[KNL] creating rekey job for CHILD_SA ESP/0xc5ee64ca/XGS-FW-WAN-NAT-IP
    2022-06-03 08:22:27Z 15[KNL] creating rekey job for CHILD_SA ESP/0xxxx.xxx.xxx.xxx/SG-FW-WAN-IP
    2022-06-03 08:22:31Z 32[NET] <tunnelname-1|58> received packet: from SG-FW-WAN-IP[4500] to XGS-FW-WAN-NAT-IP[4500] (572 bytes)
    2022-06-03 08:22:31Z 32[ENC] <tunnelname-1|58> parsed QUICK_MODE request 2477888802 [ HASH SA No KE ID ID ]
    2022-06-03 08:22:31Z 32[IKE] <tunnelname-1|58> ### process_request invoking quick_mode_create
    2022-06-03 08:22:31Z 32[IKE] <tunnelname-1|58> ### quick_mode_create: 0x2013710 config (nil)
    2022-06-03 08:22:31Z 32[IKE] <tunnelname-1|58> ### process_r: 0x2013710 QM_INIT
    2022-06-03 08:22:32Z 32[IKE] <tunnelname-1|58> detected rekeying of CHILD_SA tunnelname-18{4080}
    2022-06-03 08:22:32Z 32[IKE] <tunnelname-1|58> ### build_r: 0x2013710 QM_INIT
    2022-06-03 08:22:32Z 32[ENC] <tunnelname-1|58> generating QUICK_MODE response 2477888802 [ HASH SA No KE ID ID ]
    2022-06-03 08:22:32Z 32[NET] <tunnelname-1|58> sending packet: from XGS-FW-WAN-NAT-IP[4500] to SG-FW-WAN-IP[4500] (604 bytes)
    2022-06-03 08:22:32Z 21[NET] <tunnelname-1|58> received packet: from SG-FW-WAN-IP[4500] to XGS-FW-WAN-NAT-IP[4500] (92 bytes)
    2022-06-03 08:22:32Z 21[ENC] <tunnelname-1|58> parsed QUICK_MODE request 2477888802 [ HASH ]
    2022-06-03 08:22:32Z 21[IKE] <tunnelname-1|58> ### process_r: 0x2013710 QM_NEGOTIATED
    2022-06-03 08:22:32Z 21[CFG] <tunnelname-1|58> handling HA CHILD_SA tunnelname-18{4147} XGS-FW-LAN-IP28/25 === xxx.xxx.xxx.xxx/32 (segment in: 1*, out: 1*)
    2022-06-03 08:22:32Z 21[IKE] <tunnelname-1|58> CHILD_SA tunnelname-18{4147} established with SPIs c55a347b_i 5a262ead_o and TS XGS-FW-LAN-IP28/25 === xxx.xxx.xxx.xxx/32
    2022-06-03 08:22:32Z 21[IKE] <tunnelname-1|58> ### destroy: 0x2013710
    2022-06-03 08:22:32Z 19[NET] <tunnelname-1|58> received packet: from SG-FW-WAN-IP[4500] to XGS-FW-WAN-NAT-IP[4500] (108 bytes)
    2022-06-03 08:22:32Z 19[ENC] <tunnelname-1|58> parsed INFORMATIONAL_V1 request 1109340372 [ HASH D ]
    2022-06-03 08:22:32Z 19[IKE] <tunnelname-1|58> received DELETE for ESP CHILD_SA with SPI d217f138
    2022-06-03 08:22:32Z 19[IKE] <tunnelname-1|58> closing CHILD_SA tunnelname-41{4051} with SPIs c9f17cb7_i (0 bytes) d217f138_o (0 bytes) and TS xxx.xxx.xxx.xxx/27 === xxx.xxx.xxx.xxx/32
    2022-06-03 08:22:42Z 16[KNL] creating rekey job for CHILD_SA ESP/0xcc47899c/XGS-FW-WAN-NAT-IP
    2022-06-03 08:22:42Z 27[KNL] creating delete job for CHILD_SA ESP/0xc81379dd/XGS-FW-WAN-NAT-IP
    2022-06-03 08:22:42Z 27[JOB] CHILD_SA ESP/0xc81379dd/XGS-FW-WAN-NAT-IP not found for delete
    2022-06-03 08:22:50Z 30[KNL] creating rekey job for CHILD_SA ESP/0xc1d0a87e/XGS-FW-WAN-NAT-IP
    2022-06-03 08:23:04Z 27[KNL] creating rekey job for CHILD_SA ESP/0xbf5828fa/SG-FW-WAN-IP
    2022-06-03 08:23:04Z 22[KNL] creating delete job for CHILD_SA ESP/0xcxxx.xxx.xxx.xxx/XGS-FW-WAN-NAT-IP
    2022-06-03 08:23:04Z 24[KNL] creating delete job for CHILD_SA ESP/0x06221ca7/SG-FW-WAN-IP
    2022-06-03 08:23:04Z 28[IKE] <tunnelname-1|58> closing expired CHILD_SA tunnelname-1{4052} with SPIs c90544a2_i 06221ca7_o and TS xxx.xxx.xxx.xxx/25 === xxx.xxx.xxx.xxx/32
    2022-06-03 08:23:04Z 28[IKE] <tunnelname-1|58> sending DELETE for ESP CHILD_SA with SPI c90544a2
    2022-06-03 08:23:04Z 28[ENC] <tunnelname-1|58> generating INFORMATIONAL_V1 request 1538354569 [ HASH D ]
    2022-06-03 08:23:04Z 28[NET] <tunnelname-1|58> sending packet: from XGS-FW-WAN-NAT-IP[4500] to SG-FW-WAN-IP[4500] (108 bytes)
    2022-06-03 08:23:04Z 06[JOB] CHILD_SA ESP/0x06221ca7/SG-FW-WAN-IP not found for delete
    2022-06-03 08:23:04Z 31[NET] <tunnelname-1|58> received packet: from SG-FW-WAN-IP[4500] to XGS-FW-WAN-NAT-IP[4500] (108 bytes)
    2022-06-03 08:23:04Z 31[ENC] <tunnelname-1|58> parsed INFORMATIONAL_V1 request 2344979254 [ HASH D ]
    2022-06-03 08:23:04Z 31[IKE] <tunnelname-1|58> received DELETE for ESP CHILD_SA with SPI 06221ca7
    2022-06-03 08:23:04Z 31[IKE] <tunnelname-1|58> CHILD_SA not found, ignored
    2022-06-03 08:23:05Z 17[KNL] creating rekey job for CHILD_SA ESP/0x88480cdc/SG-FW-WAN-IP
    2022-06-03 08:23:08Z 10[KNL] creating rekey job for CHILD_SA ESP/0x9373c18c/SG-FW-WAN-IP
    2022-06-03 08:23:17Z 26[KNL] creating rekey job for CHILD_SA ESP/0xcxxx.xxx.xxx.xxx/XGS-FW-WAN-NAT-IP
    2022-06-03 08:23:18Z 19[NET] <tunnelname-1|58> received packet: from SG-FW-WAN-IP[4500] to XGS-FW-WAN-NAT-IP[4500] (588 bytes)
    2022-06-03 08:23:18Z 19[ENC] <tunnelname-1|58> parsed QUICK_MODE request 160215582 [ HASH SA No KE ID ID ]
    2022-06-03 08:23:18Z 19[IKE] <tunnelname-1|58> ### process_request invoking quick_mode_create
    2022-06-03 08:23:18Z 19[IKE] <tunnelname-1|58> ### quick_mode_create: 0x7f759400db60 config (nil)
    2022-06-03 08:23:18Z 19[IKE] <tunnelname-1|58> ### process_r: 0x7f759400db60 QM_INIT
    2022-06-03 08:23:18Z 19[IKE] <tunnelname-1|58> detected rekeying of CHILD_SA tunnelname-53{4073}
    2022-06-03 08:23:18Z 19[IKE] <tunnelname-1|58> ### build_r: 0x7f759400db60 QM_INIT
    2022-06-03 08:23:18Z 19[ENC] <tunnelname-1|58> generating QUICK_MODE response 160215582 [ HASH SA No KE ID ID ]
    2022-06-03 08:23:18Z 19[NET] <tunnelname-1|58> sending packet: from XGS-FW-WAN-NAT-IP[4500] to SG-FW-WAN-IP[4500] (604 bytes)
    2022-06-03 08:23:18Z 16[NET] <tunnelname-1|58> received packet: from SG-FW-WAN-IP[4500] to XGS-FW-WAN-NAT-IP[4500] (92 bytes)
    2022-06-03 08:23:18Z 16[ENC] <tunnelname-1|58> parsed QUICK_MODE request 160215582 [ HASH ]
    2022-06-03 08:23:18Z 16[IKE] <tunnelname-1|58> ### process_r: 0x7f759400db60 QM_NEGOTIATED
    2022-06-03 08:23:18Z 16[CFG] <tunnelname-1|58> handling HA CHILD_SA tunnelname-53{4148} xxx.xxx.xxx.xxx/27 === xxx.xxx.xxx.xxx/24 (segment in: 1*, out: 1*)
    2022-06-03 08:23:18Z 16[IKE] <tunnelname-1|58> CHILD_SA tunnelname-53{4148} established with SPIs c65e9c63_i c9e0b53e_o and TS xxx.xxx.xxx.xxx/27 === xxx.xxx.xxx.xxx/24
    2022-06-03 08:23:18Z 16[IKE] <tunnelname-1|58> ### destroy: 0x7f759400db60
    2022-06-03 08:23:25Z 10[KNL] creating rekey job for CHILD_SA ESP/0xc6e80a1e/XGS-FW-WAN-NAT-IP
    2022-06-03 08:23:42Z 30[KNL] creating delete job for CHILD_SA ESP/0xc62fde3a/XGS-FW-WAN-NAT-IP
    2022-06-03 08:23:42Z 02[JOB] CHILD_SA ESP/0xc62fde3a/XGS-FW-WAN-NAT-IP not found for delete
    2022-06-03 08:23:46Z 21[NET] <tunnelname-1|58> received packet: from SG-FW-WAN-IP[4500] to XGS-FW-WAN-NAT-IP[4500] (572 bytes)
    2022-06-03 08:23:46Z 21[ENC] <tunnelname-1|58> parsed QUICK_MODE request 2321676325 [ HASH SA No KE ID ID ]
    2022-06-03 08:23:46Z 21[IKE] <tunnelname-1|58> ### process_request invoking quick_mode_create
    2022-06-03 08:23:46Z 21[IKE] <tunnelname-1|58> ### quick_mode_create: 0x7f7598010570 config (nil)
    2022-06-03 08:23:46Z 21[IKE] <tunnelname-1|58> ### process_r: 0x7f7598010570 QM_INIT
    2022-06-03 08:23:46Z 21[IKE] <tunnelname-1|58> detected rekeying of CHILD_SA tunnelname-65{4072}
    2022-06-03 08:23:46Z 21[IKE] <tunnelname-1|58> ### build_r: 0x7f7598010570 QM_INIT
    2022-06-03 08:23:46Z 21[ENC] <tunnelname-1|58> generating QUICK_MODE response 2321676325 [ HASH SA No KE ID ID ]
    2022-06-03 08:23:46Z 21[NET] <tunnelname-1|58> sending packet: from XGS-FW-WAN-NAT-IP[4500] to SG-FW-WAN-IP[4500] (604 bytes)
    2022-06-03 08:23:50Z 15[IKE] <tunnelname-1|58> sending retransmit 1 of response message ID 2321676325, seq 38
    2022-06-03 08:23:50Z 15[NET] <tunnelname-1|58> sending packet: from XGS-FW-WAN-NAT-IP[4500] to SG-FW-WAN-IP[4500] (604 bytes)
    2022-06-03 08:23:56Z 19[NET] <tunnelname-1|58> received packet: from SG-FW-WAN-IP[4500] to XGS-FW-WAN-NAT-IP[4500] (572 bytes)
    2022-06-03 08:23:56Z 19[IKE] <tunnelname-1|58> received retransmit of request with ID 2321676325, retransmitting response
    2022-06-03 08:23:56Z 19[NET] <tunnelname-1|58> sending packet: from XGS-FW-WAN-NAT-IP[4500] to SG-FW-WAN-IP[4500] (604 bytes)
    2022-06-03 08:23:57Z 14[IKE] <tunnelname-1|58> sending retransmit 2 of response message ID 2321676325, seq 38
    2022-06-03 08:23:57Z 14[NET] <tunnelname-1|58> sending packet: from XGS-FW-WAN-NAT-IP[4500] to SG-FW-WAN-IP[4500] (604 bytes)
    2022-06-03 08:24:03Z 18[KNL] creating rekey job for CHILD_SA ESP/xxx.xxx.xxx.xxx/SG-FW-WAN-IP
    2022-06-03 08:24:05Z 32[KNL] creating delete job for CHILD_SA ESP/0xcbcf1f32/XGS-FW-WAN-NAT-IP
    2022-06-03 08:24:05Z 16[KNL] creating delete job for CHILD_SA ESP/xxx.xxx.xxx.xxx/SG-FW-WAN-IP
    2022-06-03 08:24:05Z 19[IKE] <tunnelname-1|58> closing expired CHILD_SA tunnelname-52{4053} with SPIs cbcf1f32_i 274c9b97_o and TS xxx.xxx.xxx.xxx/27 === xxx.xxx.xxx.xxx/32
    2022-06-03 08:24:05Z 19[IKE] <tunnelname-1|58> sending DELETE for ESP CHILD_SA with SPI cbcf1f32
    2022-06-03 08:24:05Z 19[ENC] <tunnelname-1|58> generating INFORMATIONAL_V1 request 4112746966 [ HASH D ]
    2022-06-03 08:24:05Z 19[NET] <tunnelname-1|58> sending packet: from XGS-FW-WAN-NAT-IP[4500] to SG-FW-WAN-IP[4500] (108 bytes)
    2022-06-03 08:24:05Z 14[JOB] CHILD_SA ESP/xxx.xxx.xxx.xxx/SG-FW-WAN-IP not found for delete
    2022-06-03 08:24:05Z 15[KNL] creating rekey job for CHILD_SA ESP/0xc49d6003/XGS-FW-WAN-NAT-IP
    2022-06-03 08:24:06Z 27[NET] <tunnelname-1|58> received packet: from SG-FW-WAN-IP[4500] to XGS-FW-WAN-NAT-IP[4500] (108 bytes)
    2022-06-03 08:24:06Z 27[ENC] <tunnelname-1|58> parsed INFORMATIONAL_V1 request 2980186000 [ HASH D ]
    2022-06-03 08:24:06Z 27[IKE] <tunnelname-1|58> received DELETE for ESP CHILD_SA with SPI 274c9b97
    2022-06-03 08:24:06Z 27[IKE] <tunnelname-1|58> CHILD_SA not found, ignored
    2022-06-03 08:24:06Z 24[KNL] creating delete job for CHILD_SA ESP/0xc0bc1491/XGS-FW-WAN-NAT-IP
    2022-06-03 08:24:06Z 31[KNL] creating delete job for CHILD_SA ESP/xxx.xxx.xxx.xxx/SG-FW-WAN-IP
    2022-06-03 08:24:06Z 20[IKE] <tunnelname-1|58> closing expired CHILD_SA tunnelname-54{4054} with SPIs c0bc1491_i 37174821_o and TS xxx.xxx.xxx.xxx/27 === xxx.xxx.xxx.xxx/32
    2022-06-03 08:24:06Z 20[IKE] <tunnelname-1|58> sending DELETE for ESP CHILD_SA with SPI c0bc1491
    2022-06-03 08:24:06Z 20[ENC] <tunnelname-1|58> generating INFORMATIONAL_V1 request 4396560 [ HASH D ]
    2022-06-03 08:24:06Z 20[NET] <tunnelname-1|58> sending packet: from XGS-FW-WAN-NAT-IP[4500] to SG-FW-WAN-IP[4500] (108 bytes)
    2022-06-03 08:24:06Z 28[JOB] CHILD_SA ESP/xxx.xxx.xxx.xxx/SG-FW-WAN-IP not found for delete
    2022-06-03 08:24:07Z 17[NET] <tunnelname-1|58> received packet: from SG-FW-WAN-IP[4500] to XGS-FW-WAN-NAT-IP[4500] (108 bytes)
    2022-06-03 08:24:07Z 17[ENC] <tunnelname-1|58> parsed INFORMATIONAL_V1 request 2337148724 [ HASH D ]
    2022-06-03 08:24:07Z 17[IKE] <tunnelname-1|58> received DELETE for ESP CHILD_SA with SPI 37174821
    2022-06-03 08:24:07Z 17[IKE] <tunnelname-1|58> CHILD_SA not found, ignored
    2022-06-03 08:24:09Z 25[NET] <tunnelname-1|58> received packet: from SG-FW-WAN-IP[4500] to XGS-FW-WAN-NAT-IP[4500] (108 bytes)
    2022-06-03 08:24:09Z 25[ENC] <tunnelname-1|58> parsed INFORMATIONAL_V1 request 2763178848 [ HASH D ]
    2022-06-03 08:24:09Z 25[IKE] <tunnelname-1|58> received DELETE for ESP CHILD_SA with SPI 453ed667
    2022-06-03 08:24:09Z 25[IKE] <tunnelname-1|58> closing CHILD_SA tunnelname-37{4055} with SPIs cf5e6edd_i (0 bytes) 453ed667_o (0 bytes) and TS xxx.xxx.xxx.xxx/26 === xxx.xxx.xxx.xxx/32
    2022-06-03 08:24:16Z 30[NET] <tunnelname-1|58> received packet: from SG-FW-WAN-IP[4500] to XGS-FW-WAN-NAT-IP[4500] (572 bytes)
    2022-06-03 08:24:16Z 30[ENC] <tunnelname-1|58> invalid HASH_V1 payload length, decryption failed?
    2022-06-03 08:24:16Z 30[ENC] <tunnelname-1|58> could not decrypt payloads
    2022-06-03 08:24:16Z 30[IKE] <tunnelname-1|58> message parsing failed
    2022-06-03 08:24:16Z 30[ENC] <tunnelname-1|58> generating INFORMATIONAL_V1 request 3979895082 [ HASH N(PLD_MAL) ]
    2022-06-03 08:24:16Z 30[NET] <tunnelname-1|58> sending packet: from XGS-FW-WAN-NAT-IP[4500] to SG-FW-WAN-IP[4500] (108 bytes)
    2022-06-03 08:24:16Z 30[IKE] <tunnelname-1|58> QUICK_MODE request with message ID 2321676325 processing failed
    2022-06-03 08:24:16Z 30[DMN] <tunnelname-1|58> [GARNER-LOGGING] (child_alert) ALERT: parsing IKE message from SG-FW-WAN-IP[4500] failed
    2022-06-03 08:24:26Z 17[KNL] creating delete job for CHILD_SA ESP/0xc5ee64ca/XGS-FW-WAN-NAT-IP
    2022-06-03 08:24:26Z 30[KNL] creating delete job for CHILD_SA ESP/0xef3df4c5/SG-FW-WAN-IP
    2022-06-03 08:24:26Z 02[IKE] <tunnelname-1|58> closing expired CHILD_SA tunnelname-58{4056} with SPIs c5ee64ca_i ef3df4c5_o and TS xxx.xxx.xxx.xxx/27 === xxx.xxx.xxx.xxx/32
    2022-06-03 08:24:26Z 02[IKE] <tunnelname-1|58> sending DELETE for ESP CHILD_SA with SPI c5ee64ca
    2022-06-03 08:24:26Z 02[ENC] <tunnelname-1|58> generating INFORMATIONAL_V1 request 4155774920 [ HASH D ]
    2022-06-03 08:24:26Z 02[NET] <tunnelname-1|58> sending packet: from XGS-FW-WAN-NAT-IP[4500] to SG-FW-WAN-IP[4500] (108 bytes)
    2022-06-03 08:24:26Z 25[JOB] CHILD_SA ESP/0xef3df4c5/SG-FW-WAN-IP not found for delete
    2022-06-03 08:24:26Z 26[NET] <tunnelname-1|58> received packet: from SG-FW-WAN-IP[4500] to XGS-FW-WAN-NAT-IP[4500] (108 bytes)
    2022-06-03 08:24:26Z 26[ENC] <tunnelname-1|58> parsed INFORMATIONAL_V1 request 1693240866 [ HASH D ]
    2022-06-03 08:24:26Z 26[IKE] <tunnelname-1|58> received DELETE for ESP CHILD_SA with SPI ef3df4c5
    2022-06-03 08:24:26Z 26[IKE] <tunnelname-1|58> CHILD_SA not found, ignored
    2022-06-03 08:24:28Z 21[KNL] creating rekey job for CHILD_SA ESP/0xc755ef6c/XGS-FW-WAN-NAT-IP
    2022-06-03 08:24:31Z 17[NET] <tunnelname-1|58> received packet: from SG-FW-WAN-IP[4500] to XGS-FW-WAN-NAT-IP[4500] (124 bytes)
    2022-06-03 08:24:31Z 17[ENC] <tunnelname-1|58> parsed INFORMATIONAL_V1 request 20411311 [ HASH N(DPD) ]
    2022-06-03 08:24:31Z 17[ENC] <tunnelname-1|58> generating INFORMATIONAL_V1 request 3595424947 [ HASH N(DPD_ACK) ]
    2022-06-03 08:24:31Z 17[NET] <tunnelname-1|58> sending packet: from XGS-FW-WAN-NAT-IP[4500] to SG-FW-WAN-IP[4500] (124 bytes)
    2022-06-03 08:24:32Z 02[NET] <tunnelname-1|58> received packet: from SG-FW-WAN-IP[4500] to XGS-FW-WAN-NAT-IP[4500] (572 bytes)
    2022-06-03 08:24:32Z 02[ENC] <tunnelname-1|58> parsed QUICK_MODE request 3646122286 [ HASH SA No KE ID ID ]
    2022-06-03 08:24:32Z 02[IKE] <tunnelname-1|58> ### process_request invoking quick_mode_create
    2022-06-03 08:24:32Z 02[IKE] <tunnelname-1|58> ### quick_mode_create: 0x7f75a4009b50 config (nil)
    2022-06-03 08:24:32Z 02[IKE] <tunnelname-1|58> ### process_r: 0x7f75a4009b50 QM_INIT
    2022-06-03 08:24:32Z 02[IKE] <tunnelname-1|58> detected rekeying of CHILD_SA tunnelname-6{4071}
    2022-06-03 08:24:32Z 02[IKE] <tunnelname-1|58> ### build_r: 0x7f75a4009b50 QM_INIT
    2022-06-03 08:24:32Z 02[ENC] <tunnelname-1|58> generating QUICK_MODE response 3646122286 [ HASH SA No KE ID ID ]
    2022-06-03 08:24:32Z 02[NET] <tunnelname-1|58> sending packet: from XGS-FW-WAN-NAT-IP[4500] to SG-FW-WAN-IP[4500] (604 bytes)
    2022-06-03 08:24:33Z 18[NET] <tunnelname-1|58> received packet: from SG-FW-WAN-IP[4500] to XGS-FW-WAN-NAT-IP[4500] (108 bytes)
    2022-06-03 08:24:33Z 18[ENC] <tunnelname-1|58> parsed INFORMATIONAL_V1 request 3289592168 [ HASH D ]
    2022-06-03 08:24:33Z 18[IKE] <tunnelname-1|58> received DELETE for ESP CHILD_SA with SPI d14b73e1
    2022-06-03 08:24:33Z 18[IKE] <tunnelname-1|58> closing CHILD_SA tunnelname-8{4057} with SPIs cb93cf6d_i (0 bytes) d14b73e1_o (0 bytes) and TS xxx.xxx.xxx.xxx/25 === xxx.xxx.xxx.xxx/32
    2022-06-03 08:24:42Z 25[NET] <tunnelname-1|58> received packet: from SG-FW-WAN-IP[4500] to XGS-FW-WAN-NAT-IP[4500] (572 bytes)
    2022-06-03 08:24:42Z 25[ENC] <tunnelname-1|58> invalid HASH_V1 payload length, decryption failed?
    2022-06-03 08:24:42Z 25[ENC] <tunnelname-1|58> could not decrypt payloads
    2022-06-03 08:24:42Z 25[IKE] <tunnelname-1|58> message parsing failed
    2022-06-03 08:24:42Z 25[ENC] <tunnelname-1|58> generating INFORMATIONAL_V1 request 554997217 [ HASH N(PLD_MAL) ]
    2022-06-03 08:24:42Z 25[NET] <tunnelname-1|58> sending packet: from XGS-FW-WAN-NAT-IP[4500] to SG-FW-WAN-IP[4500] (108 bytes)
    2022-06-03 08:24:42Z 25[IKE] <tunnelname-1|58> QUICK_MODE request with message ID 3646122286 processing failed
    2022-06-03 08:24:42Z 25[DMN] <tunnelname-1|58> [GARNER-LOGGING] (child_alert) ALERT: parsing IKE message from SG-FW-WAN-IP[4500] failed
    2022-06-03 08:24:44Z 10[KNL] creating delete job for CHILD_SA ESP/0xcefff049/XGS-FW-WAN-NAT-IP
    2022-06-03 08:24:44Z 32[KNL] creating delete job for CHILD_SA ESP/0xbxxx.xxx.xxx.xxx/SG-FW-WAN-IP
    2022-06-03 08:24:44Z 21[IKE] <tunnelname-1|58> closing expired CHILD_SA tunnelname-43{4058} with SPIs cefff049_i b6382284_o and TS xxx.xxx.xxx.xxx/27 === xxx.xxx.xxx.xxx/24
    2022-06-03 08:24:44Z 21[IKE] <tunnelname-1|58> sending DELETE for ESP CHILD_SA with SPI cefff049
    2022-06-03 08:24:44Z 21[ENC] <tunnelname-1|58> generating INFORMATIONAL_V1 request 4272402697 [ HASH D ]
    2022-06-03 08:24:44Z 21[NET] <tunnelname-1|58> sending packet: from XGS-FW-WAN-NAT-IP[4500] to SG-FW-WAN-IP[4500] (108 bytes)
    2022-06-03 08:24:44Z 16[JOB] CHILD_SA ESP/0xbxxx.xxx.xxx.xxx/SG-FW-WAN-IP not found for delete
    2022-06-03 08:24:44Z 14[NET] <tunnelname-1|58> received packet: from SG-FW-WAN-IP[4500] to XGS-FW-WAN-NAT-IP[4500] (108 bytes)
    2022-06-03 08:24:44Z 14[ENC] <tunnelname-1|58> parsed INFORMATIONAL_V1 request 3928491335 [ HASH D ]
    2022-06-03 08:24:44Z 14[IKE] <tunnelname-1|58> received DELETE for ESP CHILD_SA with SPI b6382284
    2022-06-03 08:24:44Z 14[IKE] <tunnelname-1|58> CHILD_SA not found, ignored
    2022-06-03 08:24:50Z 06[KNL] creating delete job for CHILD_SA ESP/0xcc47899c/XGS-FW-WAN-NAT-IP
    2022-06-03 08:24:50Z 28[KNL] creating delete job for CHILD_SA ESP/0xb6574de2/SG-FW-WAN-IP
    2022-06-03 08:24:50Z 20[IKE] <tunnelname-1|58> closing expired CHILD_SA tunnelname-21{4059} with SPIs cc47899c_i b6574de2_o and TS xxx.xxx.xxx.xxx/24 === xxx.xxx.xxx.xxx/32
    2022-06-03 08:24:50Z 20[IKE] <tunnelname-1|58> sending DELETE for ESP CHILD_SA with SPI cc47899c
    2022-06-03 08:24:50Z 20[ENC] <tunnelname-1|58> generating INFORMATIONAL_V1 request 3697633738 [ HASH D ]
    2022-06-03 08:24:50Z 20[NET] <tunnelname-1|58> sending packet: from XGS-FW-WAN-NAT-IP[4500] to SG-FW-WAN-IP[4500] (108 bytes)
    2022-06-03 08:24:50Z 31[JOB] CHILD_SA ESP/0xb6574de2/SG-FW-WAN-IP not found for delete
    2022-06-03 08:24:50Z 02[NET] <tunnelname-1|58> received packet: from SG-FW-WAN-IP[4500] to XGS-FW-WAN-NAT-IP[4500] (108 bytes)
    2022-06-03 08:24:50Z 02[ENC] <tunnelname-1|58> parsed INFORMATIONAL_V1 request 1710916096 [ HASH D ]
    2022-06-03 08:24:50Z 02[IKE] <tunnelname-1|58> received DELETE for ESP CHILD_SA with SPI b6574de2
    2022-06-03 08:24:50Z 02[IKE] <tunnelname-1|58> CHILD_SA not found, ignored
    2022-06-03 08:24:56Z 06[NET] <tunnelname-1|58> received packet: from SG-FW-WAN-IP[4500] to XGS-FW-WAN-NAT-IP[4500] (572 bytes)
    2022-06-03 08:24:56Z 06[ENC] <tunnelname-1|58> parsed QUICK_MODE request 3802739611 [ HASH SA No KE ID ID ]
    2022-06-03 08:24:56Z 06[IKE] <tunnelname-1|58> ### process_request invoking quick_mode_create
    2022-06-03 08:24:56Z 06[IKE] <tunnelname-1|58> ### quick_mode_create: 0x7f75ac00c5b0 config (nil)
    2022-06-03 08:24:56Z 06[IKE] <tunnelname-1|58> ### process_r: 0x7f75ac00c5b0 QM_INIT
    2022-06-03 08:24:56Z 06[IKE] <tunnelname-1|58> detected rekeying of CHILD_SA tunnelname-65{4072}
    2022-06-03 08:24:56Z 06[IKE] <tunnelname-1|58> ### build_r: 0x7f75ac00c5b0 QM_INIT
    2022-06-03 08:24:56Z 06[ENC] <tunnelname-1|58> generating QUICK_MODE response 3802739611 [ HASH SA No KE ID ID ]
    2022-06-03 08:24:56Z 06[NET] <tunnelname-1|58> sending packet: from XGS-FW-WAN-NAT-IP[4500] to SG-FW-WAN-IP[4500] (604 bytes)
    2022-06-03 08:24:56Z 28[NET] <tunnelname-1|58> received packet: from SG-FW-WAN-IP[4500] to XGS-FW-WAN-NAT-IP[4500] (572 bytes)
    2022-06-03 08:24:56Z 28[ENC] <tunnelname-1|58> parsed QUICK_MODE request 2831029222 [ HASH SA No KE ID ID ]
    2022-06-03 08:24:56Z 28[IKE] <tunnelname-1|58> ### process_request invoking quick_mode_create
    2022-06-03 08:24:56Z 28[IKE] <tunnelname-1|58> ### quick_mode_create: 0x7f7560015720 config (nil)
    2022-06-03 08:24:56Z 28[IKE] <tunnelname-1|58> ### process_r: 0x7f7560015720 QM_INIT
    2022-06-03 08:24:56Z 28[IKE] <tunnelname-1|58> detected rekeying of CHILD_SA tunnelname-51{4082}
    2022-06-03 08:24:56Z 28[IKE] <tunnelname-1|58> ### build_r: 0x7f7560015720 QM_INIT
    2022-06-03 08:24:56Z 28[ENC] <tunnelname-1|58> generating QUICK_MODE response 2831029222 [ HASH SA No KE ID ID ]
    2022-06-03 08:24:56Z 28[NET] <tunnelname-1|58> sending packet: from XGS-FW-WAN-NAT-IP[4500] to SG-FW-WAN-IP[4500] (604 bytes)
    2022-06-03 08:25:00Z 18[IKE] <tunnelname-1|58> sending retransmit 1 of response message ID 2831029222, seq 41
    2022-06-03 08:25:00Z 18[NET] <tunnelname-1|58> sending packet: from XGS-FW-WAN-NAT-IP[4500] to SG-FW-WAN-IP[4500] (604 bytes)
    2022-06-03 08:25:01Z 25[NET] <tunnelname-1|58> received packet: from SG-FW-WAN-IP[4500] to XGS-FW-WAN-NAT-IP[4500] (124 bytes)
    2022-06-03 08:25:01Z 25[ENC] <tunnelname-1|58> parsed INFORMATIONAL_V1 request 3382724417 [ HASH N(DPD) ]
    2022-06-03 08:25:01Z 25[ENC] <tunnelname-1|58> generating INFORMATIONAL_V1 request 2306838399 [ HASH N(DPD_ACK) ]
    2022-06-03 08:25:01Z 25[NET] <tunnelname-1|58> sending packet: from XGS-FW-WAN-NAT-IP[4500] to SG-FW-WAN-IP[4500] (124 bytes)
    2022-06-03 08:25:02Z 27[NET] <tunnelname-1|58> received packet: from SG-FW-WAN-IP[4500] to XGS-FW-WAN-NAT-IP[4500] (572 bytes)
    2022-06-03 08:25:02Z 27[ENC] <tunnelname-1|58> invalid HASH_V1 payload length, decryption failed?
    2022-06-03 08:25:02Z 27[ENC] <tunnelname-1|58> could not decrypt payloads
    2022-06-03 08:25:02Z 27[IKE] <tunnelname-1|58> message parsing failed
    2022-06-03 08:25:02Z 27[ENC] <tunnelname-1|58> generating INFORMATIONAL_V1 request 489377832 [ HASH N(PLD_MAL) ]
    2022-06-03 08:25:02Z 27[NET] <tunnelname-1|58> sending packet: from XGS-FW-WAN-NAT-IP[4500] to SG-FW-WAN-IP[4500] (108 bytes)
    2022-06-03 08:25:02Z 27[IKE] <tunnelname-1|58> QUICK_MODE request with message ID 3646122286 processing failed
    2022-06-03 08:25:02Z 27[DMN] <tunnelname-1|58> [GARNER-LOGGING] (child_alert) ALERT: parsing IKE message from SG-FW-WAN-IP[4500] failed
    2022-06-03 08:25:06Z 17[NET] <tunnelname-1|58> received packet: from SG-FW-WAN-IP[4500] to XGS-FW-WAN-NAT-IP[4500] (572 bytes)
    2022-06-03 08:25:06Z 17[ENC] <tunnelname-1|58> invalid HASH_V1 payload length, decryption failed?
    2022-06-03 08:25:06Z 17[ENC] <tunnelname-1|58> could not decrypt payloads
    2022-06-03 08:25:06Z 17[IKE] <tunnelname-1|58> message parsing failed
    2022-06-03 08:25:06Z 17[ENC] <tunnelname-1|58> generating INFORMATIONAL_V1 request 311039253 [ HASH N(PLD_MAL) ]
    2022-06-03 08:25:06Z 17[NET] <tunnelname-1|58> sending packet: from XGS-FW-WAN-NAT-IP[4500] to SG-FW-WAN-IP[4500] (108 bytes)
    2022-06-03 08:25:06Z 17[IKE] <tunnelname-1|58> QUICK_MODE request with message ID 2831029222 processing failed
    2022-06-03 08:25:06Z 17[DMN] <tunnelname-1|58> [GARNER-LOGGING] (child_alert) ALERT: parsing IKE message from SG-FW-WAN-IP[4500] failed
    2022-06-03 08:25:06Z 02[NET] <tunnelname-1|58> received packet: from SG-FW-WAN-IP[4500] to XGS-FW-WAN-NAT-IP[4500] (572 bytes)
    2022-06-03 08:25:06Z 02[ENC] <tunnelname-1|58> invalid HASH_V1 payload length, decryption failed?
    2022-06-03 08:25:06Z 02[ENC] <tunnelname-1|58> could not decrypt payloads
    2022-06-03 08:25:06Z 02[IKE] <tunnelname-1|58> message parsing failed
    2022-06-03 08:25:06Z 02[ENC] <tunnelname-1|58> generating INFORMATIONAL_V1 request 3676971293 [ HASH N(PLD_MAL) ]
    2022-06-03 08:25:06Z 02[NET] <tunnelname-1|58> sending packet: from XGS-FW-WAN-NAT-IP[4500] to SG-FW-WAN-IP[4500] (108 bytes)
    2022-06-03 08:25:06Z 02[IKE] <tunnelname-1|58> QUICK_MODE request with message ID 3802739611 processing failed
    2022-06-03 08:25:06Z 02[DMN] <tunnelname-1|58> [GARNER-LOGGING] (child_alert) ALERT: parsing IKE message from SG-FW-WAN-IP[4500] failed
    2022-06-03 08:25:08Z 18[IKE] <tunnelname-1|58> sending retransmit 2 of response message ID 2831029222, seq 41
    2022-06-03 08:25:08Z 18[NET] <tunnelname-1|58> sending packet: from XGS-FW-WAN-NAT-IP[4500] to SG-FW-WAN-IP[4500] (604 bytes)
    2022-06-03 08:25:20Z 10[IKE] <tunnelname-1|58> sending retransmit 3 of response message ID 2831029222, seq 41
    2022-06-03 08:25:20Z 10[NET] <tunnelname-1|58> sending packet: from XGS-FW-WAN-NAT-IP[4500] to SG-FW-WAN-IP[4500] (604 bytes)
    2022-06-03 08:25:21Z 21[NET] <tunnelname-1|58> received packet: from SG-FW-WAN-IP[4500] to XGS-FW-WAN-NAT-IP[4500] (92 bytes)
    2022-06-03 08:25:21Z 21[ENC] <tunnelname-1|58> parsed QUICK_MODE request 2831029222 [ HASH ]
    2022-06-03 08:25:21Z 21[IKE] <tunnelname-1|58> ### process_r: 0x7f7560015720 QM_NEGOTIATED
    2022-06-03 08:25:21Z 21[CFG] <tunnelname-1|58> handling HA CHILD_SA tunnelname-51{4152} xxx.xxx.xxx.xxx/27 === xxx.xxx.xxx.xxx/32 (segment in: 1*, out: 1*)
    2022-06-03 08:25:21Z 21[IKE] <tunnelname-1|58> CHILD_SA tunnelname-51{4152} established with SPIs c67a16da_i 7d1e81de_o and TS xxx.xxx.xxx.xxx/27 === xxx.xxx.xxx.xxx/32
    2022-06-03 08:25:21Z 21[IKE] <tunnelname-1|58> ### destroy: 0x7f7560015720
    2022-06-03 08:25:23Z 31[NET] <tunnelname-1|58> received packet: from SG-FW-WAN-IP[4500] to XGS-FW-WAN-NAT-IP[4500] (572 bytes)
    2022-06-03 08:25:23Z 31[ENC] <tunnelname-1|58> parsed QUICK_MODE request 2683445588 [ HASH SA No KE ID ID ]
    2022-06-03 08:25:23Z 31[IKE] <tunnelname-1|58> ### process_request invoking quick_mode_create
    2022-06-03 08:25:23Z 31[IKE] <tunnelname-1|58> ### quick_mode_create: 0x7f757400ceb0 config (nil)
    2022-06-03 08:25:23Z 31[IKE] <tunnelname-1|58> ### process_r: 0x7f757400ceb0 QM_INIT
    2022-06-03 08:25:23Z 31[IKE] <tunnelname-1|58> detected rekeying of CHILD_SA tunnelname-30{4075}
    2022-06-03 08:25:23Z 31[IKE] <tunnelname-1|58> ### build_r: 0x7f757400ceb0 QM_INIT
    2022-06-03 08:25:23Z 31[ENC] <tunnelname-1|58> generating QUICK_MODE response 2683445588 [ HASH SA No KE ID ID ]
    2022-06-03 08:25:23Z 31[NET] <tunnelname-1|58> sending packet: from XGS-FW-WAN-NAT-IP[4500] to SG-FW-WAN-IP[4500] (604 bytes)
    2022-06-03 08:25:23Z 17[NET] <tunnelname-1|58> received packet: from SG-FW-WAN-IP[4500] to XGS-FW-WAN-NAT-IP[4500] (92 bytes)
    2022-06-03 08:25:23Z 17[ENC] <tunnelname-1|58> parsed QUICK_MODE request 2683445588 [ HASH ]
    2022-06-03 08:25:23Z 17[IKE] <tunnelname-1|58> ### process_r: 0x7f757400ceb0 QM_NEGOTIATED
    2022-06-03 08:25:23Z 17[CFG] <tunnelname-1|58> handling HA CHILD_SA tunnelname-30{4153} xxx.xxx.xxx.xxx/24 === xxx.xxx.xxx.xxx/32 (segment in: 1*, out: 1*)
    2022-06-03 08:25:23Z 17[IKE] <tunnelname-1|58> CHILD_SA tunnelname-30{4153} established with SPIs c11ecde7_i 1ca2767b_o and TS xxx.xxx.xxx.xxx/24 === xxx.xxx.xxx.xxx/32
    2022-06-03 08:25:23Z 17[IKE] <tunnelname-1|58> ### destroy: 0x7f757400ceb0
    2022-06-03 08:25:24Z 30[NET] <tunnelname-1|58> received packet: from SG-FW-WAN-IP[4500] to XGS-FW-WAN-NAT-IP[4500] (572 bytes)
    2022-06-03 08:25:24Z 30[ENC] <tunnelname-1|58> parsed QUICK_MODE request 3894224738 [ HASH SA No KE ID ID ]
    2022-06-03 08:25:24Z 30[IKE] <tunnelname-1|58> ### process_request invoking quick_mode_create
    2022-06-03 08:25:24Z 30[IKE] <tunnelname-1|58> ### quick_mode_create: 0x7f755400b1f0 config (nil)
    2022-06-03 08:25:24Z 30[IKE] <tunnelname-1|58> ### process_r: 0x7f755400b1f0 QM_INIT
    2022-06-03 08:25:24Z 30[IKE] <tunnelname-1|58> detected rekeying of CHILD_SA tunnelname-48{4074}
    2022-06-03 08:25:24Z 30[IKE] <tunnelname-1|58> ### build_r: 0x7f755400b1f0 QM_INIT
    2022-06-03 08:25:24Z 30[ENC] <tunnelname-1|58> generating QUICK_MODE response 3894224738 [ HASH SA No KE ID ID ]
    2022-06-03 08:25:24Z 30[NET] <tunnelname-1|58> sending packet: from XGS-FW-WAN-NAT-IP[4500] to SG-FW-WAN-IP[4500] (604 bytes)
    2022-06-03 08:25:24Z 18[NET] <tunnelname-1|58> received packet: from SG-FW-WAN-IP[4500] to XGS-FW-WAN-NAT-IP[4500] (92 bytes)
    2022-06-03 08:25:24Z 18[ENC] <tunnelname-1|58> parsed QUICK_MODE request 3894224738 [ HASH ]
    2022-06-03 08:25:24Z 18[IKE] <tunnelname-1|58> ### process_r: 0x7f755400b1f0 QM_NEGOTIATED
    2022-06-03 08:25:24Z 18[CFG] <tunnelname-1|58> handling HA CHILD_SA tunnelname-48{4154} xxx.xxx.xxx.xxx/27 === xxx.xxx.xxx.xxx/32 (segment in: 1*, out: 1*)
    2022-06-03 08:25:24Z 18[IKE] <tunnelname-1|58> CHILD_SA tunnelname-48{4154} established with SPIs c301ec24_i eef4a856_o and TS xxx.xxx.xxx.xxx/27 === xxx.xxx.xxx.xxx/32
    2022-06-03 08:25:24Z 18[IKE] <tunnelname-1|58> ### destroy: 0x7f755400b1f0
    2022-06-03 08:25:26Z 26[NET] <tunnelname-1|58> received packet: from SG-FW-WAN-IP[4500] to XGS-FW-WAN-NAT-IP[4500] (572 bytes)
    2022-06-03 08:25:26Z 26[ENC] <tunnelname-1|58> invalid HASH_V1 payload length, decryption failed?
    2022-06-03 08:25:26Z 26[ENC] <tunnelname-1|58> could not decrypt payloads
    2022-06-03 08:25:26Z 26[IKE] <tunnelname-1|58> message parsing failed
    2022-06-03 08:25:26Z 26[ENC] <tunnelname-1|58> generating INFORMATIONAL_V1 request 1467107121 [ HASH N(PLD_MAL) ]
    2022-06-03 08:25:26Z 26[NET] <tunnelname-1|58> sending packet: from XGS-FW-WAN-NAT-IP[4500] to SG-FW-WAN-IP[4500] (108 bytes)
    2022-06-03 08:25:26Z 26[IKE] <tunnelname-1|58> QUICK_MODE request with message ID 3802739611 processing failed
    2022-06-03 08:25:26Z 26[DMN] <tunnelname-1|58> [GARNER-LOGGING] (child_alert) ALERT: parsing IKE message from SG-FW-WAN-IP[4500] failed
    2022-06-03 08:25:36Z 10[KNL] creating delete job for CHILD_SA ESP/0xcxxx.xxx.xxx.xxx/XGS-FW-WAN-NAT-IP
    2022-06-03 08:25:36Z 19[KNL] creating delete job for CHILD_SA ESP/0x9373c18c/SG-FW-WAN-IP
    2022-06-03 08:25:36Z 21[IKE] <tunnelname-1|58> closing expired CHILD_SA tunnelname-3{4060} with SPIs c446f120_i 9373c18c_o and TS xxx.xxx.xxx.xxx/25 === xxx.xxx.xxx.xxx/24
    2022-06-03 08:25:36Z 21[IKE] <tunnelname-1|58> sending DELETE for ESP CHILD_SA with SPI c446f120
    2022-06-03 08:25:36Z 21[ENC] <tunnelname-1|58> generating INFORMATIONAL_V1 request 269419791 [ HASH D ]
    2022-06-03 08:25:36Z 21[NET] <tunnelname-1|58> sending packet: from XGS-FW-WAN-NAT-IP[4500] to SG-FW-WAN-IP[4500] (108 bytes)
    2022-06-03 08:25:36Z 16[JOB] CHILD_SA ESP/0x9373c18c/SG-FW-WAN-IP not found for delete
    2022-06-03 08:25:50Z 22[KNL] creating rekey job for CHILD_SA ESP/0xcf123fd7/XGS-FW-WAN-NAT-IP
    2022-06-03 08:26:01Z 30[IKE] <tunnelname-1|58> sending DPD request
    2022-06-03 08:26:01Z 30[ENC] <tunnelname-1|58> generating INFORMATIONAL_V1 request 941881948 [ HASH N(DPD) ]
    2022-06-03 08:26:01Z 30[NET] <tunnelname-1|58> sending packet: from XGS-FW-WAN-NAT-IP[4500] to SG-FW-WAN-IP[4500] (124 bytes)
    2022-06-03 08:26:08Z 14[KNL] creating rekey job for CHILD_SA ESP/0xbfccf119/SG-FW-WAN-IP
    2022-06-03 08:26:17Z 16[KNL] creating delete job for CHILD_SA ESP/0xc1d0a87e/XGS-FW-WAN-NAT-IP
    2022-06-03 08:26:17Z 15[KNL] creating delete job for CHILD_SA ESP/0xbf5828fa/SG-FW-WAN-IP
    2022-06-03 08:26:17Z 14[IKE] <tunnelname-1|58> closing expired CHILD_SA tunnelname-25{4061} with SPIs c1d0a87e_i bf5828fa_o and TS xxx.xxx.xxx.xxx/24 === xxx.xxx.xxx.xxx/32
    2022-06-03 08:26:17Z 14[IKE] <tunnelname-1|58> sending DELETE for ESP CHILD_SA with SPI c1d0a87e
    2022-06-03 08:26:17Z 14[ENC] <tunnelname-1|58> generating INFORMATIONAL_V1 request 1627779017 [ HASH D ]
    2022-06-03 08:26:17Z 14[NET] <tunnelname-1|58> sending packet: from XGS-FW-WAN-NAT-IP[4500] to SG-FW-WAN-IP[4500] (108 bytes)
    2022-06-03 08:26:17Z 15[JOB] CHILD_SA ESP/0xbf5828fa/SG-FW-WAN-IP not found for delete
    2022-06-03 08:26:22Z 32[KNL] creating delete job for CHILD_SA ESP/0xc6e80a1e/XGS-FW-WAN-NAT-IP
    2022-06-03 08:26:22Z 19[KNL] creating delete job for CHILD_SA ESP/0xxxx.xxx.xxx.xxx/SG-FW-WAN-IP
    2022-06-03 08:26:22Z 10[IKE] <tunnelname-1|58> closing expired CHILD_SA tunnelname-28{4062} with SPIs c6e80a1e_i 28a4e2b3_o and TS xxx.xxx.xxx.xxx/24 === xxx.xxx.xxx.xxx/32
    2022-06-03 08:26:22Z 10[IKE] <tunnelname-1|58> sending DELETE for ESP CHILD_SA with SPI c6e80a1e
    2022-06-03 08:26:22Z 10[ENC] <tunnelname-1|58> generating INFORMATIONAL_V1 request 1461467342 [ HASH D ]
    2022-06-03 08:26:22Z 10[NET] <tunnelname-1|58> sending packet: from XGS-FW-WAN-NAT-IP[4500] to SG-FW-WAN-IP[4500] (108 bytes)
    2022-06-03 08:26:22Z 21[JOB] CHILD_SA ESP/0xxxx.xxx.xxx.xxx/SG-FW-WAN-IP not found for delete
    2022-06-03 08:26:25Z 22[KNL] creating rekey job for CHILD_SA ESP/0x0eee8192/SG-FW-WAN-IP
    2022-06-03 08:26:31Z 18[KNL] creating delete job for CHILD_SA ESP/0xcb24d1a2/XGS-FW-WAN-NAT-IP
    2022-06-03 08:26:31Z 17[JOB] CHILD_SA ESP/0xcb24d1a2/XGS-FW-WAN-NAT-IP not found for delete
    2022-06-03 08:26:31Z 30[KNL] creating delete job for CHILD_SA ESP/0xc755ef6c/XGS-FW-WAN-NAT-IP
    2022-06-03 08:26:31Z 26[KNL] creating delete job for CHILD_SA ESP/0x88480cdc/SG-FW-WAN-IP
    2022-06-03 08:26:31Z 25[IKE] <tunnelname-1|58> closing expired CHILD_SA tunnelname-10{4063} with SPIs c755ef6c_i 88480cdc_o and TS xxx.xxx.xxx.xxx/25 === xxx.xxx.xxx.xxx/32
    2022-06-03 08:26:31Z 25[IKE] <tunnelname-1|58> sending DELETE for ESP CHILD_SA with SPI c755ef6c
    2022-06-03 08:26:31Z 25[ENC] <tunnelname-1|58> generating INFORMATIONAL_V1 request 4119712419 [ HASH D ]
    2022-06-03 08:26:31Z 25[NET] <tunnelname-1|58> sending packet: from XGS-FW-WAN-NAT-IP[4500] to SG-FW-WAN-IP[4500] (108 bytes)
    2022-06-03 08:26:31Z 32[JOB] CHILD_SA ESP/0x88480cdc/SG-FW-WAN-IP not found for delete
    2022-06-03 08:26:31Z 06[KNL] creating rekey job for CHILD_SA ESP/0xa31f50e1/SG-FW-WAN-IP
    2022-06-03 08:26:31Z 31[IKE] <tunnelname-1|58> sending DPD request
    2022-06-03 08:26:31Z 31[ENC] <tunnelname-1|58> generating INFORMATIONAL_V1 request 2677101160 [ HASH N(DPD) ]
    2022-06-03 08:26:31Z 31[NET] <tunnelname-1|58> sending packet: from XGS-FW-WAN-NAT-IP[4500] to SG-FW-WAN-IP[4500] (124 bytes)
    2022-06-03 08:27:01Z 16[IKE] <tunnelname-1|58> sending DPD request
    2022-06-03 08:27:01Z 16[ENC] <tunnelname-1|58> generating INFORMATIONAL_V1 request 929387677 [ HASH N(DPD) ]
    2022-06-03 08:27:01Z 16[NET] <tunnelname-1|58> sending packet: from XGS-FW-WAN-NAT-IP[4500] to SG-FW-WAN-IP[4500] (124 bytes)
    2022-06-03 08:27:17Z 28[KNL] creating delete job for CHILD_SA ESP/0xce984931/XGS-FW-WAN-NAT-IP
    2022-06-03 08:27:17Z 31[JOB] CHILD_SA ESP/0xce984931/XGS-FW-WAN-NAT-IP not found for delete
    2022-06-03 08:27:21Z 30[KNL] creating rekey job for CHILD_SA ESP/0xca0f4047/XGS-FW-WAN-NAT-IP
    2022-06-03 08:27:31Z 21[JOB] <tunnelname-1|58> DPD check timed out, enforcing DPD action
    2022-06-03 08:27:31Z 21[DMN] <tunnelname-1|58> [GARNER-LOGGING] (child_alert) ALERT: IKE message retransmission timed out
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (ref_counting) ref_count: 1 to 0 -- down -- (xxx.xxx.xxx.xxx/24#xxx.xxx.xxx.xxx/32)
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (ref_counting_remote) ref_count_remote: 70 to 69 -- down -- (XGS-FW-WAN-NAT-IP#SG-FW-WAN-IP)
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (cop_updown_invoke_once) UID: 58 Net: Local XGS-FW-WAN-NAT-IP Remote SG-FW-WAN-IP Connection: tunnelname Fullname: tunnelname-1
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (cop_updown_invoke_once) Tunnel: User '' Peer-IP '' my-IP '' down-client
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (ref_counting) ref_count: 1 to 0 -- down -- (xxx.xxx.xxx.xxx/25#xxx.xxx.xxx.xxx/32)
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (ref_counting_remote) ref_count_remote: 69 to 68 -- down -- (XGS-FW-WAN-NAT-IP#SG-FW-WAN-IP)
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (cop_updown_invoke_once) UID: 58 Net: Local XGS-FW-WAN-NAT-IP Remote SG-FW-WAN-IP Connection: tunnelname Fullname: tunnelname-1
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (cop_updown_invoke_once) Tunnel: User '' Peer-IP '' my-IP '' down-client
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (ref_counting) ref_count: 1 to 0 -- down -- (xxx.xxx.xxx.xxx/24#xxx.xxx.xxx.xxx/24)
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (ref_counting_remote) ref_count_remote: 68 to 67 -- down -- (XGS-FW-WAN-NAT-IP#SG-FW-WAN-IP)
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (cop_updown_invoke_once) UID: 58 Net: Local XGS-FW-WAN-NAT-IP Remote SG-FW-WAN-IP Connection: tunnelname Fullname: tunnelname-1
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (cop_updown_invoke_once) Tunnel: User '' Peer-IP '' my-IP '' down-client
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (ref_counting) ref_count: 1 to 0 -- down -- (xxx.xxx.xxx.xxx/27#xxx.xxx.xxx.xxx/32)
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (ref_counting_remote) ref_count_remote: 67 to 66 -- down -- (XGS-FW-WAN-NAT-IP#SG-FW-WAN-IP)
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (cop_updown_invoke_once) UID: 58 Net: Local XGS-FW-WAN-NAT-IP Remote SG-FW-WAN-IP Connection: tunnelname Fullname: tunnelname-1
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (cop_updown_invoke_once) Tunnel: User '' Peer-IP '' my-IP '' down-client
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (ref_counting) ref_count: 1 to 0 -- down -- (xxx.xxx.xxx.xxx/25#xxx.xxx.xxx.xxx/32)
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (ref_counting_remote) ref_count_remote: 66 to 65 -- down -- (XGS-FW-WAN-NAT-IP#SG-FW-WAN-IP)
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (cop_updown_invoke_once) UID: 58 Net: Local XGS-FW-WAN-NAT-IP Remote SG-FW-WAN-IP Connection: tunnelname Fullname: tunnelname-1
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (cop_updown_invoke_once) Tunnel: User '' Peer-IP '' my-IP '' down-client
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (ref_counting) ref_count: 1 to 0 -- down -- (xxx.xxx.xxx.xxx/26#xxx.xxx.xxx.xxx/24)
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (ref_counting_remote) ref_count_remote: 65 to 64 -- down -- (XGS-FW-WAN-NAT-IP#SG-FW-WAN-IP)
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (cop_updown_invoke_once) UID: 58 Net: Local XGS-FW-WAN-NAT-IP Remote SG-FW-WAN-IP Connection: tunnelname Fullname: tunnelname-1
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (cop_updown_invoke_once) Tunnel: User '' Peer-IP '' my-IP '' down-client
    2022-06-03 08:27:31Z 27[APP] [COP-UPDOWN][DB] (db_conn_info) hostname: 'tunnelname' result --> id: '1', mode: 'ntn', tunnel_type: '0', subnet_family:'0'
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (ref_counting) ref_count: 1 to 0 -- down -- (xxx.xxx.xxx.xxx/25#xxx.xxx.xxx.xxx/32)
    2022-06-03 08:27:31Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) !!SKIP!! IPsec IKE for remotes (XGS-FW-WAN-NAT-IP to SG-FW-WAN-IP) already set up
    2022-06-03 08:27:31Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) ---- exec subnet updown -- down --
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (ref_counting_remote) ref_count_remote: 64 to 63 -- down -- (XGS-FW-WAN-NAT-IP#SG-FW-WAN-IP)
    2022-06-03 08:27:31Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) [NTN] NTN get actual...
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (cop_updown_invoke_once) UID: 58 Net: Local XGS-FW-WAN-NAT-IP Remote SG-FW-WAN-IP Connection: tunnelname Fullname: tunnelname-1
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (cop_updown_invoke_once) Tunnel: User '' Peer-IP '' my-IP '' down-client
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (ref_counting) ref_count: 1 to 0 -- down -- (xxx.xxx.xxx.xxx/25#xxx.xxx.xxx.xxx/32)
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (ref_counting_remote) ref_count_remote: 63 to 62 -- down -- (XGS-FW-WAN-NAT-IP#SG-FW-WAN-IP)
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (cop_updown_invoke_once) UID: 58 Net: Local XGS-FW-WAN-NAT-IP Remote SG-FW-WAN-IP Connection: tunnelname Fullname: tunnelname-1
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (cop_updown_invoke_once) Tunnel: User '' Peer-IP '' my-IP '' down-client
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (ref_counting) ref_count: 1 to 0 -- down -- (xxx.xxx.xxx.xxx/27#xxx.xxx.xxx.xxx/32)
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (ref_counting_remote) ref_count_remote: 62 to 61 -- down -- (XGS-FW-WAN-NAT-IP#SG-FW-WAN-IP)
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (cop_updown_invoke_once) UID: 58 Net: Local XGS-FW-WAN-NAT-IP Remote SG-FW-WAN-IP Connection: tunnelname Fullname: tunnelname-1
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (cop_updown_invoke_once) Tunnel: User '' Peer-IP '' my-IP '' down-client
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (ref_counting) ref_count: 1 to 0 -- down -- (XGS-FW-LAN-IP28/25#xxx.xxx.xxx.xxx/32)
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (ref_counting_remote) ref_count_remote: 61 to 60 -- down -- (XGS-FW-WAN-NAT-IP#SG-FW-WAN-IP)
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (cop_updown_invoke_once) UID: 58 Net: Local XGS-FW-WAN-NAT-IP Remote SG-FW-WAN-IP Connection: tunnelname Fullname: tunnelname-1
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (cop_updown_invoke_once) Tunnel: User '' Peer-IP '' my-IP '' down-client
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (ref_counting) ref_count: 1 to 0 -- down -- (xxx.xxx.xxx.xxx/26#xxx.xxx.xxx.xxx/32)
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (ref_counting_remote) ref_count_remote: 60 to 59 -- down -- (XGS-FW-WAN-NAT-IP#SG-FW-WAN-IP)
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (cop_updown_invoke_once) UID: 58 Net: Local XGS-FW-WAN-NAT-IP Remote SG-FW-WAN-IP Connection: tunnelname Fullname: tunnelname-1
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (cop_updown_invoke_once) Tunnel: User '' Peer-IP '' my-IP '' down-client
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (ref_counting) ref_count: 1 to 0 -- down -- (xxx.xxx.xxx.xxx/26#xxx.xxx.xxx.xxx/32)
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (ref_counting_remote) ref_count_remote: 59 to 58 -- down -- (XGS-FW-WAN-NAT-IP#SG-FW-WAN-IP)
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (cop_updown_invoke_once) UID: 58 Net: Local XGS-FW-WAN-NAT-IP Remote SG-FW-WAN-IP Connection: tunnelname Fullname: tunnelname-1
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (cop_updown_invoke_once) Tunnel: User '' Peer-IP '' my-IP '' down-client
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (ref_counting) ref_count: 1 to 0 -- down -- (xxx.xxx.xxx.xxx/25#xxx.xxx.xxx.xxx/32)
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (ref_counting_remote) ref_count_remote: 58 to 57 -- down -- (XGS-FW-WAN-NAT-IP#SG-FW-WAN-IP)
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (cop_updown_invoke_once) UID: 58 Net: Local XGS-FW-WAN-NAT-IP Remote SG-FW-WAN-IP Connection: tunnelname Fullname: tunnelname-1
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (cop_updown_invoke_once) Tunnel: User '' Peer-IP '' my-IP '' down-client
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (ref_counting) ref_count: 1 to 0 -- down -- (xxx.xxx.xxx.xxx/25#xxx.xxx.xxx.xxx/32)
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (ref_counting_remote) ref_count_remote: 57 to 56 -- down -- (XGS-FW-WAN-NAT-IP#SG-FW-WAN-IP)
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (cop_updown_invoke_once) UID: 58 Net: Local XGS-FW-WAN-NAT-IP Remote SG-FW-WAN-IP Connection: tunnelname Fullname: tunnelname-1
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (cop_updown_invoke_once) Tunnel: User '' Peer-IP '' my-IP '' down-client
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (ref_counting) ref_count: 1 to 0 -- down -- (xxx.xxx.xxx.xxx/27#xxx.xxx.xxx.xxx/32)
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (ref_counting_remote) ref_count_remote: 56 to 55 -- down -- (XGS-FW-WAN-NAT-IP#SG-FW-WAN-IP)
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (cop_updown_invoke_once) UID: 58 Net: Local XGS-FW-WAN-NAT-IP Remote SG-FW-WAN-IP Connection: tunnelname Fullname: tunnelname-1
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (cop_updown_invoke_once) Tunnel: User '' Peer-IP '' my-IP '' down-client
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (ref_counting) ref_count: 1 to 0 -- down -- (xxx.xxx.xxx.xxx/25#xxx.xxx.xxx.xxx/32)
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (ref_counting_remote) ref_count_remote: 55 to 54 -- down -- (XGS-FW-WAN-NAT-IP#SG-FW-WAN-IP)
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (cop_updown_invoke_once) UID: 58 Net: Local XGS-FW-WAN-NAT-IP Remote SG-FW-WAN-IP Connection: tunnelname Fullname: tunnelname-1
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (cop_updown_invoke_once) Tunnel: User '' Peer-IP '' my-IP '' down-client
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (ref_counting) ref_count: 1 to 0 -- down -- (xxx.xxx.xxx.xxx/25#xxx.xxx.xxx.xxx/32)
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (ref_counting_remote) ref_count_remote: 54 to 53 -- down -- (XGS-FW-WAN-NAT-IP#SG-FW-WAN-IP)
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (cop_updown_invoke_once) UID: 58 Net: Local XGS-FW-WAN-NAT-IP Remote SG-FW-WAN-IP Connection: tunnelname Fullname: tunnelname-1
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (cop_updown_invoke_once) Tunnel: User '' Peer-IP '' my-IP '' down-client
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (ref_counting) ref_count: 1 to 0 -- down -- (XGS-FW-LAN-IP28/25#xxx.xxx.xxx.xxx/32)
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (ref_counting_remote) ref_count_remote: 53 to 52 -- down -- (XGS-FW-WAN-NAT-IP#SG-FW-WAN-IP)
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (cop_updown_invoke_once) UID: 58 Net: Local XGS-FW-WAN-NAT-IP Remote SG-FW-WAN-IP Connection: tunnelname Fullname: tunnelname-1
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (cop_updown_invoke_once) Tunnel: User '' Peer-IP '' my-IP '' down-client
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (ref_counting) ref_count: 1 to 0 -- down -- (xxx.xxx.xxx.xxx/25#xxx.xxx.xxx.xxx/24)
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (ref_counting_remote) ref_count_remote: 52 to 51 -- down -- (XGS-FW-WAN-NAT-IP#SG-FW-WAN-IP)
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (cop_updown_invoke_once) UID: 58 Net: Local XGS-FW-WAN-NAT-IP Remote SG-FW-WAN-IP Connection: tunnelname Fullname: tunnelname-1
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (cop_updown_invoke_once) Tunnel: User '' Peer-IP '' my-IP '' down-client
    2022-06-03 08:27:31Z 27[APP] [COP-UPDOWN][DB] (db_query) No data retrieved from query: 'SELECT ( nath.netid  || '/'  || nath.netmask ) AS natedlan FROM   tblvpnconnhostrel AS rel    JOIN tblhost AS h  ON h.hostid = rel.hostid    JOIN tblhost AS nath  ON rel .natedhost = nath.hostid WHERE  rel.connectionid = $1    AND rel.hostlocation = 'L'    AND h.netid = $2    AND h.netmask = $3 LIMIT  1;' status: 2 rows: 0
    2022-06-03 08:27:31Z 27[APP]  
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (ref_counting) ref_count: 1 to 0 -- down -- (xxx.xxx.xxx.xxx/26#xxx.xxx.xxx.xxx/32)
    2022-06-03 08:27:31Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) [IPSEC0] using ipsec dummy interface 'ipsec0'
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (ref_counting_remote) ref_count_remote: 51 to 50 -- down -- (XGS-FW-WAN-NAT-IP#SG-FW-WAN-IP)
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (cop_updown_invoke_once) UID: 58 Net: Local XGS-FW-WAN-NAT-IP Remote SG-FW-WAN-IP Connection: tunnelname Fullname: tunnelname-1
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (cop_updown_invoke_once) Tunnel: User '' Peer-IP '' my-IP '' down-client
    2022-06-03 08:27:31Z 27[APP] [COP-UPDOWN][NET] (get_src_ip) source address for xxx.xxx.xxx.xxx is IP: XGS-FW-WAN-NAT-IP 
    2022-06-03 08:27:31Z 27[APP] 
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (ref_counting) ref_count: 1 to 0 -- down -- (XGS-FW-LAN-IP28/25#xxx.xxx.xxx.xxx/32)
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (ref_counting_remote) ref_count_remote: 50 to 49 -- down -- (XGS-FW-WAN-NAT-IP#SG-FW-WAN-IP)
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (cop_updown_invoke_once) UID: 58 Net: Local XGS-FW-WAN-NAT-IP Remote SG-FW-WAN-IP Connection: tunnelname Fullname: tunnelname-1
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (cop_updown_invoke_once) Tunnel: User '' Peer-IP '' my-IP '' down-client
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (ref_counting) ref_count: 1 to 0 -- down -- (xxx.xxx.xxx.xxx/27#xxx.xxx.xxx.xxx/32)
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (ref_counting_remote) ref_count_remote: 49 to 48 -- down -- (XGS-FW-WAN-NAT-IP#SG-FW-WAN-IP)
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (cop_updown_invoke_once) UID: 58 Net: Local XGS-FW-WAN-NAT-IP Remote SG-FW-WAN-IP Connection: tunnelname Fullname: tunnelname-1
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (cop_updown_invoke_once) Tunnel: User '' Peer-IP '' my-IP '' down-client
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (ref_counting) ref_count: 1 to 0 -- down -- (xxx.xxx.xxx.xxx/27#xxx.xxx.xxx.xxx/32)
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (ref_counting_remote) ref_count_remote: 48 to 47 -- down -- (XGS-FW-WAN-NAT-IP#SG-FW-WAN-IP)
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (cop_updown_invoke_once) UID: 58 Net: Local XGS-FW-WAN-NAT-IP Remote SG-FW-WAN-IP Connection: tunnelname Fullname: tunnelname-1
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (cop_updown_invoke_once) Tunnel: User '' Peer-IP '' my-IP '' down-client
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (ref_counting) ref_count: 1 to 0 -- down -- (xxx.xxx.xxx.xxx/26#xxx.xxx.xxx.xxx/32)
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (ref_counting_remote) ref_count_remote: 47 to 46 -- down -- (XGS-FW-WAN-NAT-IP#SG-FW-WAN-IP)
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (cop_updown_invoke_once) UID: 58 Net: Local XGS-FW-WAN-NAT-IP Remote SG-FW-WAN-IP Connection: tunnelname Fullname: tunnelname-1
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (cop_updown_invoke_once) Tunnel: User '' Peer-IP '' my-IP '' down-client
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (ref_counting) ref_count: 1 to 0 -- down -- (xxx.xxx.xxx.xxx/24#xxx.xxx.xxx.xxx/32)
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (ref_counting_remote) ref_count_remote: 46 to 45 -- down -- (XGS-FW-WAN-NAT-IP#SG-FW-WAN-IP)
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (cop_updown_invoke_once) UID: 58 Net: Local XGS-FW-WAN-NAT-IP Remote SG-FW-WAN-IP Connection: tunnelname Fullname: tunnelname-1
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (cop_updown_invoke_once) Tunnel: User '' Peer-IP '' my-IP '' down-client
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (ref_counting) ref_count: 1 to 0 -- down -- (xxx.xxx.xxx.xxx/26#xxx.xxx.xxx.xxx/32)
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (ref_counting_remote) ref_count_remote: 45 to 44 -- down -- (XGS-FW-WAN-NAT-IP#SG-FW-WAN-IP)
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (cop_updown_invoke_once) UID: 58 Net: Local XGS-FW-WAN-NAT-IP Remote SG-FW-WAN-IP Connection: tunnelname Fullname: tunnelname-1
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (cop_updown_invoke_once) Tunnel: User '' Peer-IP '' my-IP '' down-client
    2022-06-03 08:27:31Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route del xxx.xxx.xxx.xxx/32 dev ipsec0 src XGS-FW-WAN-NAT-IP table 220': success 0
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (ref_counting) ref_count: 1 to 0 -- down -- (XGS-FW-LAN-IP28/25#xxx.xxx.xxx.xxx/32)
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (ref_counting_remote) ref_count_remote: 44 to 43 -- down -- (XGS-FW-WAN-NAT-IP#SG-FW-WAN-IP)
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (cop_updown_invoke_once) UID: 58 Net: Local XGS-FW-WAN-NAT-IP Remote SG-FW-WAN-IP Connection: tunnelname Fullname: tunnelname-1
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (cop_updown_invoke_once) Tunnel: User '' Peer-IP '' my-IP '' down-client
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (ref_counting) ref_count: 1 to 0 -- down -- (xxx.xxx.xxx.xxx/25#xxx.xxx.xxx.xxx/32)
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (ref_counting_remote) ref_count_remote: 43 to 42 -- down -- (XGS-FW-WAN-NAT-IP#SG-FW-WAN-IP)
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (cop_updown_invoke_once) UID: 58 Net: Local XGS-FW-WAN-NAT-IP Remote SG-FW-WAN-IP Connection: tunnelname Fullname: tunnelname-1
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (cop_updown_invoke_once) Tunnel: User '' Peer-IP '' my-IP '' down-client
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (ref_counting) ref_count: 1 to 0 -- down -- (XGS-FW-LAN-IP28/25#xxx.xxx.xxx.xxx/32)
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (ref_counting_remote) ref_count_remote: 42 to 41 -- down -- (XGS-FW-WAN-NAT-IP#SG-FW-WAN-IP)
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (cop_updown_invoke_once) UID: 58 Net: Local XGS-FW-WAN-NAT-IP Remote SG-FW-WAN-IP Connection: tunnelname Fullname: tunnelname-1
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (cop_updown_invoke_once) Tunnel: User '' Peer-IP '' my-IP '' down-client
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (ref_counting) ref_count: 1 to 0 -- down -- (xxx.xxx.xxx.xxx/24#xxx.xxx.xxx.xxx/32)
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (ref_counting_remote) ref_count_remote: 41 to 40 -- down -- (XGS-FW-WAN-NAT-IP#SG-FW-WAN-IP)
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (cop_updown_invoke_once) UID: 58 Net: Local XGS-FW-WAN-NAT-IP Remote SG-FW-WAN-IP Connection: tunnelname Fullname: tunnelname-1
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (cop_updown_invoke_once) Tunnel: User '' Peer-IP '' my-IP '' down-client
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (ref_counting) ref_count: 1 to 0 -- down -- (XGS-FW-LAN-IP28/25#xxx.xxx.xxx.xxx/24)
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (ref_counting_remote) ref_count_remote: 40 to 39 -- down -- (XGS-FW-WAN-NAT-IP#SG-FW-WAN-IP)
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (cop_updown_invoke_once) UID: 58 Net: Local XGS-FW-WAN-NAT-IP Remote SG-FW-WAN-IP Connection: tunnelname Fullname: tunnelname-1
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (cop_updown_invoke_once) Tunnel: User '' Peer-IP '' my-IP '' down-client
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (ref_counting) ref_count: 1 to 0 -- down -- (xxx.xxx.xxx.xxx/26#xxx.xxx.xxx.xxx/32)
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (ref_counting_remote) ref_count_remote: 39 to 38 -- down -- (XGS-FW-WAN-NAT-IP#SG-FW-WAN-IP)
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (cop_updown_invoke_once) UID: 58 Net: Local XGS-FW-WAN-NAT-IP Remote SG-FW-WAN-IP Connection: tunnelname Fullname: tunnelname-1
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (cop_updown_invoke_once) Tunnel: User '' Peer-IP '' my-IP '' down-client
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (ref_counting) ref_count: 1 to 0 -- down -- (xxx.xxx.xxx.xxx/27#xxx.xxx.xxx.xxx/32)
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (ref_counting_remote) ref_count_remote: 38 to 37 -- down -- (XGS-FW-WAN-NAT-IP#SG-FW-WAN-IP)
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (cop_updown_invoke_once) UID: 58 Net: Local XGS-FW-WAN-NAT-IP Remote SG-FW-WAN-IP Connection: tunnelname Fullname: tunnelname-1
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (cop_updown_invoke_once) Tunnel: User '' Peer-IP '' my-IP '' down-client
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (ref_counting) ref_count: 1 to 0 -- down -- (XGS-FW-LAN-IP28/25#xxx.xxx.xxx.xxx/32)
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (ref_counting_remote) ref_count_remote: 37 to 36 -- down -- (XGS-FW-WAN-NAT-IP#SG-FW-WAN-IP)
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (cop_updown_invoke_once) UID: 58 Net: Local XGS-FW-WAN-NAT-IP Remote SG-FW-WAN-IP Connection: tunnelname Fullname: tunnelname-1
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (cop_updown_invoke_once) Tunnel: User '' Peer-IP '' my-IP '' down-client
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (ref_counting) ref_count: 1 to 0 -- down -- (xxx.xxx.xxx.xxx/27#xxx.xxx.xxx.xxx/32)
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (ref_counting_remote) ref_count_remote: 36 to 35 -- down -- (XGS-FW-WAN-NAT-IP#SG-FW-WAN-IP)
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (cop_updown_invoke_once) UID: 58 Net: Local XGS-FW-WAN-NAT-IP Remote SG-FW-WAN-IP Connection: tunnelname Fullname: tunnelname-1
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (cop_updown_invoke_once) Tunnel: User '' Peer-IP '' my-IP '' down-client
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (ref_counting) ref_count: 1 to 0 -- down -- (xxx.xxx.xxx.xxx/25#xxx.xxx.xxx.xxx/32)
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (ref_counting_remote) ref_count_remote: 35 to 34 -- down -- (XGS-FW-WAN-NAT-IP#SG-FW-WAN-IP)
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (cop_updown_invoke_once) UID: 58 Net: Local XGS-FW-WAN-NAT-IP Remote SG-FW-WAN-IP Connection: tunnelname Fullname: tunnelname-1
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (cop_updown_invoke_once) Tunnel: User '' Peer-IP '' my-IP '' down-client
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (ref_counting) ref_count: 1 to 0 -- down -- (xxx.xxx.xxx.xxx/25#xxx.xxx.xxx.xxx/32)
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (ref_counting_remote) ref_count_remote: 34 to 33 -- down -- (XGS-FW-WAN-NAT-IP#SG-FW-WAN-IP)
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (cop_updown_invoke_once) UID: 58 Net: Local XGS-FW-WAN-NAT-IP Remote SG-FW-WAN-IP Connection: tunnelname Fullname: tunnelname-1
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (cop_updown_invoke_once) Tunnel: User '' Peer-IP '' my-IP '' down-client
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (ref_counting) ref_count: 1 to 0 -- down -- (xxx.xxx.xxx.xxx/24#xxx.xxx.xxx.xxx/32)
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (ref_counting_remote) ref_count_remote: 33 to 32 -- down -- (XGS-FW-WAN-NAT-IP#SG-FW-WAN-IP)
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (cop_updown_invoke_once) UID: 58 Net: Local XGS-FW-WAN-NAT-IP Remote SG-FW-WAN-IP Connection: tunnelname Fullname: tunnelname-1
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (cop_updown_invoke_once) Tunnel: User '' Peer-IP '' my-IP '' down-client
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (ref_counting) ref_count: 1 to 0 -- down -- (XGS-FW-LAN-IP28/25#xxx.xxx.xxx.xxx/32)
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (ref_counting_remote) ref_count_remote: 32 to 31 -- down -- (XGS-FW-WAN-NAT-IP#SG-FW-WAN-IP)
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (cop_updown_invoke_once) UID: 58 Net: Local XGS-FW-WAN-NAT-IP Remote SG-FW-WAN-IP Connection: tunnelname Fullname: tunnelname-1
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (cop_updown_invoke_once) Tunnel: User '' Peer-IP '' my-IP '' down-client
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (ref_counting) ref_count: 1 to 0 -- down -- (xxx.xxx.xxx.xxx/25#xxx.xxx.xxx.xxx/32)
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (ref_counting_remote) ref_count_remote: 31 to 30 -- down -- (XGS-FW-WAN-NAT-IP#SG-FW-WAN-IP)
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (cop_updown_invoke_once) UID: 58 Net: Local XGS-FW-WAN-NAT-IP Remote SG-FW-WAN-IP Connection: tunnelname Fullname: tunnelname-1
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (cop_updown_invoke_once) Tunnel: User '' Peer-IP '' my-IP '' down-client
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (ref_counting) ref_count: 1 to 0 -- down -- (xxx.xxx.xxx.xxx/27#xxx.xxx.xxx.xxx/32)
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (ref_counting_remote) ref_count_remote: 30 to 29 -- down -- (XGS-FW-WAN-NAT-IP#SG-FW-WAN-IP)
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (cop_updown_invoke_once) UID: 58 Net: Local XGS-FW-WAN-NAT-IP Remote SG-FW-WAN-IP Connection: tunnelname Fullname: tunnelname-1
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (cop_updown_invoke_once) Tunnel: User '' Peer-IP '' my-IP '' down-client
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (ref_counting) ref_count: 1 to 0 -- down -- (xxx.xxx.xxx.xxx/27#xxx.xxx.xxx.xxx/32)
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (ref_counting_remote) ref_count_remote: 29 to 28 -- down -- (XGS-FW-WAN-NAT-IP#SG-FW-WAN-IP)
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (cop_updown_invoke_once) UID: 58 Net: Local XGS-FW-WAN-NAT-IP Remote SG-FW-WAN-IP Connection: tunnelname Fullname: tunnelname-1
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (cop_updown_invoke_once) Tunnel: User '' Peer-IP '' my-IP '' down-client
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (ref_counting) ref_count: 1 to 0 -- down -- (xxx.xxx.xxx.xxx/27#xxx.xxx.xxx.xxx/24)
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (ref_counting_remote) ref_count_remote: 28 to 27 -- down -- (XGS-FW-WAN-NAT-IP#SG-FW-WAN-IP)
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (cop_updown_invoke_once) UID: 58 Net: Local XGS-FW-WAN-NAT-IP Remote SG-FW-WAN-IP Connection: tunnelname Fullname: tunnelname-1
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (cop_updown_invoke_once) Tunnel: User '' Peer-IP '' my-IP '' down-client
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (ref_counting) ref_count: 1 to 0 -- down -- (xxx.xxx.xxx.xxx/27#xxx.xxx.xxx.xxx/32)
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (ref_counting_remote) ref_count_remote: 27 to 26 -- down -- (XGS-FW-WAN-NAT-IP#SG-FW-WAN-IP)
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (cop_updown_invoke_once) UID: 58 Net: Local XGS-FW-WAN-NAT-IP Remote SG-FW-WAN-IP Connection: tunnelname Fullname: tunnelname-1
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (cop_updown_invoke_once) Tunnel: User '' Peer-IP '' my-IP '' down-client
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (ref_counting) ref_count: 1 to 0 -- down -- (xxx.xxx.xxx.xxx/27#xxx.xxx.xxx.xxx/32)
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (ref_counting_remote) ref_count_remote: 26 to 25 -- down -- (XGS-FW-WAN-NAT-IP#SG-FW-WAN-IP)
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (cop_updown_invoke_once) UID: 58 Net: Local XGS-FW-WAN-NAT-IP Remote SG-FW-WAN-IP Connection: tunnelname Fullname: tunnelname-1
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (cop_updown_invoke_once) Tunnel: User '' Peer-IP '' my-IP '' down-client
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (ref_counting) ref_count: 1 to 0 -- down -- (xxx.xxx.xxx.xxx/25#xxx.xxx.xxx.xxx/32)
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (ref_counting_remote) ref_count_remote: 25 to 24 -- down -- (XGS-FW-WAN-NAT-IP#SG-FW-WAN-IP)
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (cop_updown_invoke_once) UID: 58 Net: Local XGS-FW-WAN-NAT-IP Remote SG-FW-WAN-IP Connection: tunnelname Fullname: tunnelname-1
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (cop_updown_invoke_once) Tunnel: User '' Peer-IP '' my-IP '' down-client
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (ref_counting) ref_count: 1 to 0 -- down -- (xxx.xxx.xxx.xxx/27#xxx.xxx.xxx.xxx/32)
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (ref_counting_remote) ref_count_remote: 24 to 23 -- down -- (XGS-FW-WAN-NAT-IP#SG-FW-WAN-IP)
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (cop_updown_invoke_once) UID: 58 Net: Local XGS-FW-WAN-NAT-IP Remote SG-FW-WAN-IP Connection: tunnelname Fullname: tunnelname-1
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (cop_updown_invoke_once) Tunnel: User '' Peer-IP '' my-IP '' down-client
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (ref_counting) ref_count: 1 to 0 -- down -- (xxx.xxx.xxx.xxx/27#xxx.xxx.xxx.xxx/32)
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (ref_counting_remote) ref_count_remote: 23 to 22 -- down -- (XGS-FW-WAN-NAT-IP#SG-FW-WAN-IP)
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (cop_updown_invoke_once) UID: 58 Net: Local XGS-FW-WAN-NAT-IP Remote SG-FW-WAN-IP Connection: tunnelname Fullname: tunnelname-1
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (cop_updown_invoke_once) Tunnel: User '' Peer-IP '' my-IP '' down-client
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (ref_counting) ref_count: 1 to 0 -- down -- (xxx.xxx.xxx.xxx/27#xxx.xxx.xxx.xxx/32)
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (ref_counting_remote) ref_count_remote: 22 to 21 -- down -- (XGS-FW-WAN-NAT-IP#SG-FW-WAN-IP)
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (cop_updown_invoke_once) UID: 58 Net: Local XGS-FW-WAN-NAT-IP Remote SG-FW-WAN-IP Connection: tunnelname Fullname: tunnelname-1
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (cop_updown_invoke_once) Tunnel: User '' Peer-IP '' my-IP '' down-client
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (ref_counting) ref_count: 1 to 0 -- down -- (xxx.xxx.xxx.xxx/26#xxx.xxx.xxx.xxx/32)
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (ref_counting_remote) ref_count_remote: 21 to 20 -- down -- (XGS-FW-WAN-NAT-IP#SG-FW-WAN-IP)
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (cop_updown_invoke_once) UID: 58 Net: Local XGS-FW-WAN-NAT-IP Remote SG-FW-WAN-IP Connection: tunnelname Fullname: tunnelname-1
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (cop_updown_invoke_once) Tunnel: User '' Peer-IP '' my-IP '' down-client
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (ref_counting) ref_count: 1 to 0 -- down -- (xxx.xxx.xxx.xxx/24#xxx.xxx.xxx.xxx/32)
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (ref_counting_remote) ref_count_remote: 20 to 19 -- down -- (XGS-FW-WAN-NAT-IP#SG-FW-WAN-IP)
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (cop_updown_invoke_once) UID: 58 Net: Local XGS-FW-WAN-NAT-IP Remote SG-FW-WAN-IP Connection: tunnelname Fullname: tunnelname-1
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (cop_updown_invoke_once) Tunnel: User '' Peer-IP '' my-IP '' down-client
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (ref_counting) ref_count: 1 to 0 -- down -- (xxx.xxx.xxx.xxx/25#xxx.xxx.xxx.xxx/32)
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (ref_counting_remote) ref_count_remote: 19 to 18 -- down -- (XGS-FW-WAN-NAT-IP#SG-FW-WAN-IP)
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (cop_updown_invoke_once) UID: 58 Net: Local XGS-FW-WAN-NAT-IP Remote SG-FW-WAN-IP Connection: tunnelname Fullname: tunnelname-1
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (cop_updown_invoke_once) Tunnel: User '' Peer-IP '' my-IP '' down-client
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (ref_counting) ref_count: 1 to 0 -- down -- (xxx.xxx.xxx.xxx/24#xxx.xxx.xxx.xxx/32)
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (ref_counting_remote) ref_count_remote: 18 to 17 -- down -- (XGS-FW-WAN-NAT-IP#SG-FW-WAN-IP)
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (cop_updown_invoke_once) UID: 58 Net: Local XGS-FW-WAN-NAT-IP Remote SG-FW-WAN-IP Connection: tunnelname Fullname: tunnelname-1
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (cop_updown_invoke_once) Tunnel: User '' Peer-IP '' my-IP '' down-client
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (ref_counting) ref_count: 1 to 0 -- down -- (xxx.xxx.xxx.xxx/24#xxx.xxx.xxx.xxx/32)
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (ref_counting_remote) ref_count_remote: 17 to 16 -- down -- (XGS-FW-WAN-NAT-IP#SG-FW-WAN-IP)
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (cop_updown_invoke_once) UID: 58 Net: Local XGS-FW-WAN-NAT-IP Remote SG-FW-WAN-IP Connection: tunnelname Fullname: tunnelname-1
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (cop_updown_invoke_once) Tunnel: User '' Peer-IP '' my-IP '' down-client
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (ref_counting) ref_count: 1 to 0 -- down -- (xxx.xxx.xxx.xxx/27#xxx.xxx.xxx.xxx/32)
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (ref_counting_remote) ref_count_remote: 16 to 15 -- down -- (XGS-FW-WAN-NAT-IP#SG-FW-WAN-IP)
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (cop_updown_invoke_once) UID: 58 Net: Local XGS-FW-WAN-NAT-IP Remote SG-FW-WAN-IP Connection: tunnelname Fullname: tunnelname-1
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (cop_updown_invoke_once) Tunnel: User '' Peer-IP '' my-IP '' down-client
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (ref_counting) ref_count: 1 to 0 -- down -- (xxx.xxx.xxx.xxx/25#xxx.xxx.xxx.xxx/32)
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (ref_counting_remote) ref_count_remote: 15 to 14 -- down -- (XGS-FW-WAN-NAT-IP#SG-FW-WAN-IP)
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (cop_updown_invoke_once) UID: 58 Net: Local XGS-FW-WAN-NAT-IP Remote SG-FW-WAN-IP Connection: tunnelname Fullname: tunnelname-1
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (cop_updown_invoke_once) Tunnel: User '' Peer-IP '' my-IP '' down-client
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (ref_counting) ref_count: 1 to 0 -- down -- (xxx.xxx.xxx.xxx/26#xxx.xxx.xxx.xxx/32)
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (ref_counting_remote) ref_count_remote: 14 to 13 -- down -- (XGS-FW-WAN-NAT-IP#SG-FW-WAN-IP)
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (cop_updown_invoke_once) UID: 58 Net: Local XGS-FW-WAN-NAT-IP Remote SG-FW-WAN-IP Connection: tunnelname Fullname: tunnelname-1
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (cop_updown_invoke_once) Tunnel: User '' Peer-IP '' my-IP '' down-client
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (ref_counting) ref_count: 1 to 0 -- down -- (xxx.xxx.xxx.xxx/25#xxx.xxx.xxx.xxx/24)
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (ref_counting_remote) ref_count_remote: 13 to 12 -- down -- (XGS-FW-WAN-NAT-IP#SG-FW-WAN-IP)
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (cop_updown_invoke_once) UID: 58 Net: Local XGS-FW-WAN-NAT-IP Remote SG-FW-WAN-IP Connection: tunnelname Fullname: tunnelname-1
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (cop_updown_invoke_once) Tunnel: User '' Peer-IP '' my-IP '' down-client
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (ref_counting) ref_count: 1 to 0 -- down -- (xxx.xxx.xxx.xxx/25#xxx.xxx.xxx.xxx/32)
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (ref_counting_remote) ref_count_remote: 12 to 11 -- down -- (XGS-FW-WAN-NAT-IP#SG-FW-WAN-IP)
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (cop_updown_invoke_once) UID: 58 Net: Local XGS-FW-WAN-NAT-IP Remote SG-FW-WAN-IP Connection: tunnelname Fullname: tunnelname-1
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (cop_updown_invoke_once) Tunnel: User '' Peer-IP '' my-IP '' down-client
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (ref_counting) ref_count: 1 to 0 -- down -- (XGS-FW-LAN-IP28/25#xxx.xxx.xxx.xxx/32)
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (ref_counting_remote) ref_count_remote: 11 to 10 -- down -- (XGS-FW-WAN-NAT-IP#SG-FW-WAN-IP)
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (cop_updown_invoke_once) UID: 58 Net: Local XGS-FW-WAN-NAT-IP Remote SG-FW-WAN-IP Connection: tunnelname Fullname: tunnelname-1
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (cop_updown_invoke_once) Tunnel: User '' Peer-IP '' my-IP '' down-client
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (ref_counting) ref_count: 1 to 0 -- down -- (xxx.xxx.xxx.xxx/25#xxx.xxx.xxx.xxx/32)
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (ref_counting_remote) ref_count_remote: 10 to 9 -- down -- (XGS-FW-WAN-NAT-IP#SG-FW-WAN-IP)
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (cop_updown_invoke_once) UID: 58 Net: Local XGS-FW-WAN-NAT-IP Remote SG-FW-WAN-IP Connection: tunnelname Fullname: tunnelname-1
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (cop_updown_invoke_once) Tunnel: User '' Peer-IP '' my-IP '' down-client
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (ref_counting) ref_count: 1 to 0 -- down -- (xxx.xxx.xxx.xxx/25#xxx.xxx.xxx.xxx/32)
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (ref_counting_remote) ref_count_remote: 9 to 8 -- down -- (XGS-FW-WAN-NAT-IP#SG-FW-WAN-IP)
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (cop_updown_invoke_once) UID: 58 Net: Local XGS-FW-WAN-NAT-IP Remote SG-FW-WAN-IP Connection: tunnelname Fullname: tunnelname-1
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (cop_updown_invoke_once) Tunnel: User '' Peer-IP '' my-IP '' down-client
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (ref_counting) ref_count: 1 to 0 -- down -- (xxx.xxx.xxx.xxx/26#xxx.xxx.xxx.xxx/32)
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (ref_counting_remote) ref_count_remote: 8 to 7 -- down -- (XGS-FW-WAN-NAT-IP#SG-FW-WAN-IP)
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (cop_updown_invoke_once) UID: 58 Net: Local XGS-FW-WAN-NAT-IP Remote SG-FW-WAN-IP Connection: tunnelname Fullname: tunnelname-1
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (cop_updown_invoke_once) Tunnel: User '' Peer-IP '' my-IP '' down-client
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (ref_counting) ref_count: 1 to 0 -- down -- (xxx.xxx.xxx.xxx/27#xxx.xxx.xxx.xxx/32)
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (ref_counting_remote) ref_count_remote: 7 to 6 -- down -- (XGS-FW-WAN-NAT-IP#SG-FW-WAN-IP)
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (cop_updown_invoke_once) UID: 58 Net: Local XGS-FW-WAN-NAT-IP Remote SG-FW-WAN-IP Connection: tunnelname Fullname: tunnelname-1
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (cop_updown_invoke_once) Tunnel: User '' Peer-IP '' my-IP '' down-client
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (ref_counting) ref_count: 1 to 0 -- down -- (xxx.xxx.xxx.xxx/24#xxx.xxx.xxx.xxx/32)
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (ref_counting_remote) ref_count_remote: 6 to 5 -- down -- (XGS-FW-WAN-NAT-IP#SG-FW-WAN-IP)
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (cop_updown_invoke_once) UID: 58 Net: Local XGS-FW-WAN-NAT-IP Remote SG-FW-WAN-IP Connection: tunnelname Fullname: tunnelname-1
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (cop_updown_invoke_once) Tunnel: User '' Peer-IP '' my-IP '' down-client
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (ref_counting) ref_count: 1 to 0 -- down -- (XGS-FW-LAN-IP28/25#xxx.xxx.xxx.xxx/32)
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (ref_counting_remote) ref_count_remote: 5 to 4 -- down -- (XGS-FW-WAN-NAT-IP#SG-FW-WAN-IP)
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (cop_updown_invoke_once) UID: 58 Net: Local XGS-FW-WAN-NAT-IP Remote SG-FW-WAN-IP Connection: tunnelname Fullname: tunnelname-1
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (cop_updown_invoke_once) Tunnel: User '' Peer-IP '' my-IP '' down-client
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (ref_counting) ref_count: 1 to 0 -- down -- (xxx.xxx.xxx.xxx/27#xxx.xxx.xxx.xxx/24)
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (ref_counting_remote) ref_count_remote: 4 to 3 -- down -- (XGS-FW-WAN-NAT-IP#SG-FW-WAN-IP)
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (cop_updown_invoke_once) UID: 58 Net: Local XGS-FW-WAN-NAT-IP Remote SG-FW-WAN-IP Connection: tunnelname Fullname: tunnelname-1
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (cop_updown_invoke_once) Tunnel: User '' Peer-IP '' my-IP '' down-client
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (ref_counting) ref_count: 1 to 0 -- down -- (xxx.xxx.xxx.xxx/27#xxx.xxx.xxx.xxx/32)
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (ref_counting_remote) ref_count_remote: 3 to 2 -- down -- (XGS-FW-WAN-NAT-IP#SG-FW-WAN-IP)
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (cop_updown_invoke_once) UID: 58 Net: Local XGS-FW-WAN-NAT-IP Remote SG-FW-WAN-IP Connection: tunnelname Fullname: tunnelname-1
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (cop_updown_invoke_once) Tunnel: User '' Peer-IP '' my-IP '' down-client
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (ref_counting) ref_count: 1 to 0 -- down -- (xxx.xxx.xxx.xxx/24#xxx.xxx.xxx.xxx/32)
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (ref_counting_remote) ref_count_remote: 2 to 1 -- down -- (XGS-FW-WAN-NAT-IP#SG-FW-WAN-IP)
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (cop_updown_invoke_once) UID: 58 Net: Local XGS-FW-WAN-NAT-IP Remote SG-FW-WAN-IP Connection: tunnelname Fullname: tunnelname-1
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (cop_updown_invoke_once) Tunnel: User '' Peer-IP '' my-IP '' down-client
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (ref_counting) ref_count: 1 to 0 -- down -- (xxx.xxx.xxx.xxx/27#xxx.xxx.xxx.xxx/32)
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (ref_counting_remote) ref_count_remote: 1 to 0 -- down -- (XGS-FW-WAN-NAT-IP#SG-FW-WAN-IP)
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (cop_updown_invoke_once) UID: 58 Net: Local XGS-FW-WAN-NAT-IP Remote SG-FW-WAN-IP Connection: tunnelname Fullname: tunnelname-1
    2022-06-03 08:27:31Z 21[APP] <tunnelname-1|58> [COP-UPDOWN] (cop_updown_invoke_once) Tunnel: User '' Peer-IP '' my-IP '' down-client
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> restarting CHILD_SA tunnelname-29
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### queue_child invoking quick_mode_create
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### quick_mode_create: 0x7f7598023bf0 config 0x7f75840013e0
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> initiating Main Mode IKE_SA tunnelname-1[59] to SG-FW-WAN-IP
    2022-06-03 08:27:31Z 21[ENC] <tunnelname-1|58> generating ID_PROT request 0 [ SA V V V V V V ]
    2022-06-03 08:27:31Z 21[NET] <tunnelname-1|58> sending packet: from XGS-FW-WAN-NAT-IP[500] to SG-FW-WAN-IP[500] (260 bytes)
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> restarting CHILD_SA tunnelname-4
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### queue_child invoking quick_mode_create
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### quick_mode_create: 0x7f7598025ea0 config 0x7f7560001dd0
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> restarting CHILD_SA tunnelname-23
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### queue_child invoking quick_mode_create
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### quick_mode_create: 0x7f7598024ba0 config 0x7f7584001be0
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> restarting CHILD_SA tunnelname-57
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### queue_child invoking quick_mode_create
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### quick_mode_create: 0x7f75980240c0 config 0x7f756c000d70
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> restarting CHILD_SA tunnelname-7
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### queue_child invoking quick_mode_create
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### quick_mode_create: 0x7f7598025840 config 0x7f75900021d0
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> restarting CHILD_SA tunnelname-33
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### queue_child invoking quick_mode_create
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### quick_mode_create: 0x7f7598023d50 config 0x7f75d0001440
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> restarting CHILD_SA tunnelname-69
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### queue_child invoking quick_mode_create
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### quick_mode_create: 0x7f7598023e90 config 0x7f759c0031e0
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> restarting CHILD_SA tunnelname-5
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### queue_child invoking quick_mode_create
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### quick_mode_create: 0x7f7598024ea0 config 0x7f7588003f00
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> restarting CHILD_SA tunnelname-44
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### queue_child invoking quick_mode_create
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### quick_mode_create: 0x7f7598024fe0 config 0x7f7590002890
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> restarting CHILD_SA tunnelname-11
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### queue_child invoking quick_mode_create
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### quick_mode_create: 0x7f7598025120 config 0x7f7594001b10
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> restarting CHILD_SA tunnelname-32
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### queue_child invoking quick_mode_create
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### quick_mode_create: 0x7f7598025260 config 0x7f7598001710
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> restarting CHILD_SA tunnelname-34
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### queue_child invoking quick_mode_create
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### quick_mode_create: 0x7f7598026600 config 0x7f7588002cb0
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> restarting CHILD_SA tunnelname-70
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### queue_child invoking quick_mode_create
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### quick_mode_create: 0x7f7598026740 config 0x7f758c002c80
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> restarting CHILD_SA tunnelname-62
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### queue_child invoking quick_mode_create
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### quick_mode_create: 0x7f7598026880 config 0x7f756c002ef0
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> restarting CHILD_SA tunnelname-50
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### queue_child invoking quick_mode_create
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### quick_mode_create: 0x7f75980269c0 config 0x7f7574002e30
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> restarting CHILD_SA tunnelname-67
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### queue_child invoking quick_mode_create
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### quick_mode_create: 0x7f7598026b00 config 0x7f7578003510
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> restarting CHILD_SA tunnelname-2
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### queue_child invoking quick_mode_create
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### quick_mode_create: 0x7f7598026c40 config 0x7f7554001b10
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> restarting CHILD_SA tunnelname-14
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### queue_child invoking quick_mode_create
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### quick_mode_create: 0x7f7598026d80 config 0x7f7580001b10
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> restarting CHILD_SA tunnelname-63
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### queue_child invoking quick_mode_create
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### quick_mode_create: 0x7f7598026ec0 config 0x7f75700036f0
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> restarting CHILD_SA tunnelname-31
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### queue_child invoking quick_mode_create
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### quick_mode_create: 0x7f7598027000 config 0x7f7570003b70
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> restarting CHILD_SA tunnelname-15
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### queue_child invoking quick_mode_create
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### quick_mode_create: 0x7f7598027140 config 0x7f75a80040d0
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> restarting CHILD_SA tunnelname-60
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### queue_child invoking quick_mode_create
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### quick_mode_create: 0x7f7598027280 config 0x7f7580003080
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> restarting CHILD_SA tunnelname-56
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### queue_child invoking quick_mode_create
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### quick_mode_create: 0x7f75980273c0 config 0x200fec0
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> restarting CHILD_SA tunnelname-40
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### queue_child invoking quick_mode_create
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### quick_mode_create: 0x7f7598027500 config 0x7f755c002890
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> restarting CHILD_SA tunnelname-24
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### queue_child invoking quick_mode_create
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### quick_mode_create: 0x7f7598027640 config 0x7f757c001c70
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> restarting CHILD_SA tunnelname-38
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### queue_child invoking quick_mode_create
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### quick_mode_create: 0x7f7598027780 config 0x7f759c002890
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> restarting CHILD_SA tunnelname-20
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### queue_child invoking quick_mode_create
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### quick_mode_create: 0x7f75980278c0 config 0x7f7578002990
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> restarting CHILD_SA tunnelname-66
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### queue_child invoking quick_mode_create
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### quick_mode_create: 0x7f7598027a00 config 0x7f7560002b50
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> restarting CHILD_SA tunnelname-19
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### queue_child invoking quick_mode_create
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### quick_mode_create: 0x7f7598027b40 config 0x7f755c001b10
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> restarting CHILD_SA tunnelname-26
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### queue_child invoking quick_mode_create
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### quick_mode_create: 0x7f7598027c80 config 0x7f7578001de0
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> restarting CHILD_SA tunnelname-13
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### queue_child invoking quick_mode_create
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### quick_mode_create: 0x7f7598027dc0 config 0x7f7588001b10
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> restarting CHILD_SA tunnelname-35
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### queue_child invoking quick_mode_create
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### quick_mode_create: 0x7f7598027f00 config 0x7f7574001870
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> restarting CHILD_SA tunnelname-51
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### queue_child invoking quick_mode_create
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### quick_mode_create: 0x7f7598028040 config 0x7f75780014c0
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> restarting CHILD_SA tunnelname-47
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### queue_child invoking quick_mode_create
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### quick_mode_create: 0x7f7598028180 config 0x7f7594002e60
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> restarting CHILD_SA tunnelname-18
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### queue_child invoking quick_mode_create
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### quick_mode_create: 0x7f75980282c0 config 0x7f758c000a00
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> restarting CHILD_SA tunnelname-12
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### queue_child invoking quick_mode_create
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### quick_mode_create: 0x7f7598028400 config 0x7f758c001a80
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> restarting CHILD_SA tunnelname-42
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### queue_child invoking quick_mode_create
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### quick_mode_create: 0x7f7598028540 config 0x7f75a0001ea0
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> restarting CHILD_SA tunnelname-59
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### queue_child invoking quick_mode_create
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### quick_mode_create: 0x7f7598028680 config 0x7f759c002e60
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> restarting CHILD_SA tunnelname-22
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### queue_child invoking quick_mode_create
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### quick_mode_create: 0x7f75980287c0 config 0x7f7598001c70
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> restarting CHILD_SA tunnelname-30
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### queue_child invoking quick_mode_create
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### quick_mode_create: 0x7f7598028900 config 0x7f7554002890
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> restarting CHILD_SA tunnelname-48
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### queue_child invoking quick_mode_create
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### quick_mode_create: 0x7f7598028a40 config 0x7f75a0001b80
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> restarting CHILD_SA tunnelname-53
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### queue_child invoking quick_mode_create
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### quick_mode_create: 0x7f7598028b80 config 0x7f7598002cd0
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> restarting CHILD_SA tunnelname-65
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### queue_child invoking quick_mode_create
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### quick_mode_create: 0x7f7598028cc0 config 0x7f7590002b70
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> restarting CHILD_SA tunnelname-6
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### queue_child invoking quick_mode_create
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### quick_mode_create: 0x7f7598028e00 config 0x7f7584002550
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> restarting CHILD_SA tunnelname-61
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### queue_child invoking quick_mode_create
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### quick_mode_create: 0x7f7598028f40 config 0x7f755c002c30
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> restarting CHILD_SA tunnelname-36
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### queue_child invoking quick_mode_create
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### quick_mode_create: 0x7f7598029080 config 0x7f7554002b70
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> restarting CHILD_SA tunnelname-16
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### queue_child invoking quick_mode_create
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### quick_mode_create: 0x7f75980291c0 config 0x7f7570001a80
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> restarting CHILD_SA tunnelname-68
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### queue_child invoking quick_mode_create
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### quick_mode_create: 0x7f7598029300 config 0x7f756c0034a0
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> restarting CHILD_SA tunnelname-64
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### queue_child invoking quick_mode_create
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### quick_mode_create: 0x7f7598029440 config 0x7f7568002890
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> restarting CHILD_SA tunnelname-39
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### queue_child invoking quick_mode_create
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### quick_mode_create: 0x7f7598029580 config 0x7f7590001b10
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> restarting CHILD_SA tunnelname-49
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### queue_child invoking quick_mode_create
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### quick_mode_create: 0x7f75980296c0 config 0x7f758c003030
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> restarting CHILD_SA tunnelname-27
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### queue_child invoking quick_mode_create
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### quick_mode_create: 0x7f7598029800 config 0x7f7594002890
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> restarting CHILD_SA tunnelname-17
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### queue_child invoking quick_mode_create
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### quick_mode_create: 0x7f7598029940 config 0x7f7564001b10
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> restarting CHILD_SA tunnelname-1
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### queue_child invoking quick_mode_create
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### quick_mode_create: 0x7f7598029a80 config 0x7f75a8003140
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> restarting CHILD_SA tunnelname-58
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### queue_child invoking quick_mode_create
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### quick_mode_create: 0x7f7598029bc0 config 0x7f75a8005b60
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> restarting CHILD_SA tunnelname-41
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### queue_child invoking quick_mode_create
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### quick_mode_create: 0x7f7598029d00 config 0x7f7570003ef0
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> restarting CHILD_SA tunnelname-43
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### queue_child invoking quick_mode_create
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### quick_mode_create: 0x7f7598029e40 config 0x7f7568001b10
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> restarting CHILD_SA tunnelname-52
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### queue_child invoking quick_mode_create
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### quick_mode_create: 0x7f7598024720 config 0x7f7564002cb0
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> restarting CHILD_SA tunnelname-55
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### queue_child invoking quick_mode_create
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### quick_mode_create: 0x7f7598029f80 config 0x7f757c0029f0
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> restarting CHILD_SA tunnelname-9
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### queue_child invoking quick_mode_create
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### quick_mode_create: 0x7f759802a0c0 config 0x7f75a0002fc0
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> restarting CHILD_SA tunnelname-46
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### queue_child invoking quick_mode_create
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### quick_mode_create: 0x7f759802a200 config 0x7f75540032e0
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> restarting CHILD_SA tunnelname-45
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### queue_child invoking quick_mode_create
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### quick_mode_create: 0x7f759802a340 config 0x7f7580002c30
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> restarting CHILD_SA tunnelname-54
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### queue_child invoking quick_mode_create
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### quick_mode_create: 0x7f759802a480 config 0x7f75d0002980
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> restarting CHILD_SA tunnelname-37
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### queue_child invoking quick_mode_create
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### quick_mode_create: 0x7f759802a5c0 config 0x7f7594003510
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> restarting CHILD_SA tunnelname-21
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### queue_child invoking quick_mode_create
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### quick_mode_create: 0x7f759802a700 config 0x7f7570000a00
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> restarting CHILD_SA tunnelname-8
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### queue_child invoking quick_mode_create
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### quick_mode_create: 0x7f759802a840 config 0x7f7554001530
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> restarting CHILD_SA tunnelname-28
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### queue_child invoking quick_mode_create
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### quick_mode_create: 0x7f759802a980 config 0x7f75d0001c00
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> restarting CHILD_SA tunnelname-25
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### queue_child invoking quick_mode_create
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### quick_mode_create: 0x7f759802aac0 config 0x7f7574001dd0
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> restarting CHILD_SA tunnelname-49
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### queue_child invoking quick_mode_create
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### quick_mode_create: 0x7f759802ac00 config 0x7f758c003030
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> found queued QUICK_MODE task with identical child config
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### destroy: 0x7f75980296c0
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> restarting CHILD_SA tunnelname-10
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### queue_child invoking quick_mode_create
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### quick_mode_create: 0x7f75980296c0 config 0x7f759c001b10
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> restarting CHILD_SA tunnelname-39
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### queue_child invoking quick_mode_create
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### quick_mode_create: 0x7f759802ad40 config 0x7f7590001b10
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> found queued QUICK_MODE task with identical child config
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### destroy: 0x7f7598029580
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> restarting CHILD_SA tunnelname-3
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### queue_child invoking quick_mode_create
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### quick_mode_create: 0x7f7598029580 config 0x7f7580002890
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> restarting CHILD_SA tunnelname-68
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### queue_child invoking quick_mode_create
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### quick_mode_create: 0x7f759802ae80 config 0x7f756c0034a0
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> found queued QUICK_MODE task with identical child config
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### destroy: 0x7f7598029300
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> restarting CHILD_SA tunnelname-16
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### queue_child invoking quick_mode_create
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### quick_mode_create: 0x7f7598029300 config 0x7f7570001a80
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> found queued QUICK_MODE task with identical child config
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### destroy: 0x7f75980291c0
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> restarting CHILD_SA tunnelname-61
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### queue_child invoking quick_mode_create
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### quick_mode_create: 0x7f75980291c0 config 0x7f755c002c30
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> found queued QUICK_MODE task with identical child config
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### destroy: 0x7f7598028f40
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> restarting CHILD_SA tunnelname-64
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### queue_child invoking quick_mode_create
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### quick_mode_create: 0x7f7598028f40 config 0x7f7568002890
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> found queued QUICK_MODE task with identical child config
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### destroy: 0x7f7598029440
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> restarting CHILD_SA tunnelname-36
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### queue_child invoking quick_mode_create
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### quick_mode_create: 0x7f7598029440 config 0x7f7554002b70
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> found queued QUICK_MODE task with identical child config
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### destroy: 0x7f7598029080
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> restarting CHILD_SA tunnelname-59
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### queue_child invoking quick_mode_create
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### quick_mode_create: 0x7f7598029080 config 0x7f759c002e60
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> found queued QUICK_MODE task with identical child config
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### destroy: 0x7f7598028680
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> restarting CHILD_SA tunnelname-22
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### queue_child invoking quick_mode_create
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### quick_mode_create: 0x7f7598028680 config 0x7f7598001c70
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> found queued QUICK_MODE task with identical child config
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### destroy: 0x7f75980287c0
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> restarting CHILD_SA tunnelname-18
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### queue_child invoking quick_mode_create
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### quick_mode_create: 0x7f75980287c0 config 0x7f758c000a00
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> found queued QUICK_MODE task with identical child config
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### destroy: 0x7f75980282c0
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> restarting CHILD_SA tunnelname-53
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### queue_child invoking quick_mode_create
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### quick_mode_create: 0x7f75980282c0 config 0x7f7598002cd0
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> found queued QUICK_MODE task with identical child config
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### destroy: 0x7f7598028b80
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> restarting CHILD_SA tunnelname-51
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### queue_child invoking quick_mode_create
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### quick_mode_create: 0x7f7598028b80 config 0x7f75780014c0
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> found queued QUICK_MODE task with identical child config
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### destroy: 0x7f7598028040
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> restarting CHILD_SA tunnelname-30
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### queue_child invoking quick_mode_create
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### quick_mode_create: 0x7f7598028040 config 0x7f7554002890
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> found queued QUICK_MODE task with identical child config
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### destroy: 0x7f7598028900
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> restarting CHILD_SA tunnelname-48
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### queue_child invoking quick_mode_create
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### quick_mode_create: 0x7f7598028900 config 0x7f75a0001b80
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> found queued QUICK_MODE task with identical child config
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### destroy: 0x7f7598028a40
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### destroy: 0x7f75ac00c5b0
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### destroy: 0x7f75a4009b50
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### destroy: 0x7f7598010570
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### destroy: 0x7f7570008be0
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### destroy: 0x7f7588004240
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### destroy: 0x7f7568009ac0
    2022-06-03 08:27:31Z 21[IKE] <tunnelname-1|58> ### destroy: 0x7f7570004250
    2022-06-03 08:27:31Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:31Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': success 0
    2022-06-03 08:27:31Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:31Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': success 0
    2022-06-03 08:27:31Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:31Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': success 0
    2022-06-03 08:27:31Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route flush cache': success 0
    2022-06-03 08:27:31Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route flush cache': success 0
    2022-06-03 08:27:31Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) '/bin/service fwm:vpn_connection_chains -t json -s nosync -b '{"me":"XGS-FW-WAN-NAT-IP","peer":"SG-FW-WAN-IP","mynet":"xxx.xxx.xxx.xxx/24","peernet":"xxx.xxx.xxx.xxx/32","connop":"0","iface":"unknown","myproto":"0","myport":"0","peerproto":"0","peerport":"0","conntype":"ntn","actnet":"","compress":"0","conn_id":"1"}'': success 0
    2022-06-03 08:27:31Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --not-protonum=6 --inzone-outzone=2': error returned 1
    2022-06-03 08:27:31Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --not-protonum=6 --inzone-outzone=5': success 0
    2022-06-03 08:27:31Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --protonum=50': error returned 1
    2022-06-03 08:27:31Z 27[APP] [COP-UPDOWN][DB] (db_conn_info) hostname: 'tunnelname' result --> id: '1', mode: 'ntn', tunnel_type: '0', subnet_family:'0'
    2022-06-03 08:27:31Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) !!SKIP!! IPsec IKE for remotes (XGS-FW-WAN-NAT-IP to SG-FW-WAN-IP) already set up
    2022-06-03 08:27:31Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) ---- exec subnet updown -- down --
    2022-06-03 08:27:31Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) [NTN] NTN get actual...
    2022-06-03 08:27:31Z 27[APP] [COP-UPDOWN][DB] (db_query) No data retrieved from query: 'SELECT ( nath.netid  || '/'  || nath.netmask ) AS natedlan FROM   tblvpnconnhostrel AS rel    JOIN tblhost AS h  ON h.hostid = rel.hostid    JOIN tblhost AS nath  ON rel .natedhost = nath.hostid WHERE  rel.connectionid = $1    AND rel.hostlocation = 'L'    AND h.netid = $2    AND h.netmask = $3 LIMIT  1;' status: 2 rows: 0
    2022-06-03 08:27:31Z 27[APP]  
    2022-06-03 08:27:31Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) [IPSEC0] using ipsec dummy interface 'ipsec0'
    2022-06-03 08:27:31Z 27[APP] [COP-UPDOWN][NET] (get_src_ip) source address for XGS-FW-LAN-NET is IP: XGS-FW-LAN-IP 
    2022-06-03 08:27:31Z 27[APP] 
    2022-06-03 08:27:31Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route del xxx.xxx.xxx.xxx/32 dev ipsec0 src XGS-FW-LAN-IP table 220': error returned 2
    2022-06-03 08:27:31Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:31Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:31Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:31Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:31Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:31Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:31Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route flush cache': success 0
    2022-06-03 08:27:31Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route flush cache': success 0
    2022-06-03 08:27:32Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) '/bin/service fwm:vpn_connection_chains -t json -s nosync -b '{"me":"XGS-FW-WAN-NAT-IP","peer":"SG-FW-WAN-IP","mynet":"xxx.xxx.xxx.xxx/25","peernet":"xxx.xxx.xxx.xxx/32","connop":"0","iface":"unknown","myproto":"0","myport":"0","peerproto":"0","peerport":"0","conntype":"ntn","actnet":"","compress":"0","conn_id":"1"}'': success 0
    2022-06-03 08:27:32Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --not-protonum=6 --inzone-outzone=2': error returned 1
    2022-06-03 08:27:32Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --not-protonum=6 --inzone-outzone=5': error returned 1
    2022-06-03 08:27:32Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --protonum=50': error returned 1
    2022-06-03 08:27:32Z 27[APP] [COP-UPDOWN][DB] (db_conn_info) hostname: 'tunnelname' result --> id: '1', mode: 'ntn', tunnel_type: '0', subnet_family:'0'
    2022-06-03 08:27:32Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) !!SKIP!! IPsec IKE for remotes (XGS-FW-WAN-NAT-IP to SG-FW-WAN-IP) already set up
    2022-06-03 08:27:32Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) ---- exec subnet updown -- down --
    2022-06-03 08:27:32Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) [NTN] NTN get actual...
    2022-06-03 08:27:32Z 27[APP] [COP-UPDOWN][DB] (db_query) No data retrieved from query: 'SELECT ( nath.netid  || '/'  || nath.netmask ) AS natedlan FROM   tblvpnconnhostrel AS rel    JOIN tblhost AS h  ON h.hostid = rel.hostid    JOIN tblhost AS nath  ON rel .natedhost = nath.hostid WHERE  rel.connectionid = $1    AND rel.hostlocation = 'L'    AND h.netid = $2    AND h.netmask = $3 LIMIT  1;' status: 2 rows: 0
    2022-06-03 08:27:32Z 27[APP]  
    2022-06-03 08:27:32Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) [IPSEC0] using ipsec dummy interface 'ipsec0'
    2022-06-03 08:27:32Z 27[APP] [COP-UPDOWN][NET] (get_src_ip) source address for xxx.xxx.xxx.xxx is IP: XGS-FW-WAN-NAT-IP 
    2022-06-03 08:27:32Z 27[APP] 
    2022-06-03 08:27:32Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route del xxx.xxx.xxx.xxx/24 dev ipsec0 src XGS-FW-WAN-NAT-IP table 220': success 0
    2022-06-03 08:27:32Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:32Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:32Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:32Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:32Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:32Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:32Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route flush cache': success 0
    2022-06-03 08:27:32Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route flush cache': success 0
    2022-06-03 08:27:32Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) '/bin/service fwm:vpn_connection_chains -t json -s nosync -b '{"me":"XGS-FW-WAN-NAT-IP","peer":"SG-FW-WAN-IP","mynet":"xxx.xxx.xxx.xxx/24","peernet":"xxx.xxx.xxx.xxx/24","connop":"0","iface":"unknown","myproto":"0","myport":"0","peerproto":"0","peerport":"0","conntype":"ntn","actnet":"","compress":"0","conn_id":"1"}'': success 0
    2022-06-03 08:27:32Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --not-protonum=6 --inzone-outzone=2': error returned 1
    2022-06-03 08:27:32Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --not-protonum=6 --inzone-outzone=5': error returned 1
    2022-06-03 08:27:32Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --protonum=50': error returned 1
    2022-06-03 08:27:32Z 27[APP] [COP-UPDOWN][DB] (db_conn_info) hostname: 'tunnelname' result --> id: '1', mode: 'ntn', tunnel_type: '0', subnet_family:'0'
    2022-06-03 08:27:32Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) !!SKIP!! IPsec IKE for remotes (XGS-FW-WAN-NAT-IP to SG-FW-WAN-IP) already set up
    2022-06-03 08:27:32Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) ---- exec subnet updown -- down --
    2022-06-03 08:27:32Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) [NTN] NTN get actual...
    2022-06-03 08:27:32Z 27[APP] [COP-UPDOWN][DB] (db_query) No data retrieved from query: 'SELECT ( nath.netid  || '/'  || nath.netmask ) AS natedlan FROM   tblvpnconnhostrel AS rel    JOIN tblhost AS h  ON h.hostid = rel.hostid    JOIN tblhost AS nath  ON rel .natedhost = nath.hostid WHERE  rel.connectionid = $1    AND rel.hostlocation = 'L'    AND h.netid = $2    AND h.netmask = $3 LIMIT  1;' status: 2 rows: 0
    2022-06-03 08:27:32Z 27[APP]  
    2022-06-03 08:27:32Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) [IPSEC0] using ipsec dummy interface 'ipsec0'
    2022-06-03 08:27:32Z 27[APP] [COP-UPDOWN][NET] (get_src_ip) source address for xxx.xxx.xxx.xxx is IP: XGS-FW-WAN-NAT-IP 
    2022-06-03 08:27:32Z 27[APP] 
    2022-06-03 08:27:32Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route del xxx.xxx.xxx.xxx/32 dev ipsec0 src XGS-FW-WAN-NAT-IP table 220': success 0
    2022-06-03 08:27:32Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:32Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:32Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:32Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:32Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:32Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:32Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route flush cache': success 0
    2022-06-03 08:27:32Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route flush cache': success 0
    2022-06-03 08:27:32Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) '/bin/service fwm:vpn_connection_chains -t json -s nosync -b '{"me":"XGS-FW-WAN-NAT-IP","peer":"SG-FW-WAN-IP","mynet":"xxx.xxx.xxx.xxx/27","peernet":"xxx.xxx.xxx.xxx/32","connop":"0","iface":"unknown","myproto":"0","myport":"0","peerproto":"0","peerport":"0","conntype":"ntn","actnet":"","compress":"0","conn_id":"1"}'': success 0
    2022-06-03 08:27:32Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --not-protonum=6 --inzone-outzone=2': error returned 1
    2022-06-03 08:27:32Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --not-protonum=6 --inzone-outzone=5': error returned 1
    2022-06-03 08:27:32Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --protonum=50': error returned 1
    2022-06-03 08:27:32Z 27[APP] [COP-UPDOWN][DB] (db_conn_info) hostname: 'tunnelname' result --> id: '1', mode: 'ntn', tunnel_type: '0', subnet_family:'0'
    2022-06-03 08:27:32Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) !!SKIP!! IPsec IKE for remotes (XGS-FW-WAN-NAT-IP to SG-FW-WAN-IP) already set up
    2022-06-03 08:27:32Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) ---- exec subnet updown -- down --
    2022-06-03 08:27:32Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) [NTN] NTN get actual...
    2022-06-03 08:27:32Z 27[APP] [COP-UPDOWN][DB] (db_query) No data retrieved from query: 'SELECT ( nath.netid  || '/'  || nath.netmask ) AS natedlan FROM   tblvpnconnhostrel AS rel    JOIN tblhost AS h  ON h.hostid = rel.hostid    JOIN tblhost AS nath  ON rel .natedhost = nath.hostid WHERE  rel.connectionid = $1    AND rel.hostlocation = 'L'    AND h.netid = $2    AND h.netmask = $3 LIMIT  1;' status: 2 rows: 0
    2022-06-03 08:27:32Z 27[APP]  
    2022-06-03 08:27:32Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) [IPSEC0] using ipsec dummy interface 'ipsec0'
    2022-06-03 08:27:32Z 27[APP] [COP-UPDOWN][NET] (get_src_ip) source address for XGS-FW-LAN-NET is IP: XGS-FW-LAN-IP 
    2022-06-03 08:27:32Z 27[APP] 
    2022-06-03 08:27:32Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route del xxx.xxx.xxx.xxx/32 dev ipsec0 src XGS-FW-LAN-IP table 220': error returned 2
    2022-06-03 08:27:32Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:32Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:32Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:32Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:32Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:32Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:32Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route flush cache': success 0
    2022-06-03 08:27:32Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route flush cache': success 0
    2022-06-03 08:27:32Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) '/bin/service fwm:vpn_connection_chains -t json -s nosync -b '{"me":"XGS-FW-WAN-NAT-IP","peer":"SG-FW-WAN-IP","mynet":"xxx.xxx.xxx.xxx/25","peernet":"xxx.xxx.xxx.xxx/32","connop":"0","iface":"unknown","myproto":"0","myport":"0","peerproto":"0","peerport":"0","conntype":"ntn","actnet":"","compress":"0","conn_id":"1"}'': success 0
    2022-06-03 08:27:32Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --not-protonum=6 --inzone-outzone=2': error returned 1
    2022-06-03 08:27:32Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --not-protonum=6 --inzone-outzone=5': error returned 1
    2022-06-03 08:27:32Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --protonum=50': error returned 1
    2022-06-03 08:27:32Z 27[APP] [COP-UPDOWN][DB] (db_conn_info) hostname: 'tunnelname' result --> id: '1', mode: 'ntn', tunnel_type: '0', subnet_family:'0'
    2022-06-03 08:27:32Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) !!SKIP!! IPsec IKE for remotes (XGS-FW-WAN-NAT-IP to SG-FW-WAN-IP) already set up
    2022-06-03 08:27:32Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) ---- exec subnet updown -- down --
    2022-06-03 08:27:32Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) [NTN] NTN get actual...
    2022-06-03 08:27:32Z 27[APP] [COP-UPDOWN][DB] (db_query) No data retrieved from query: 'SELECT ( nath.netid  || '/'  || nath.netmask ) AS natedlan FROM   tblvpnconnhostrel AS rel    JOIN tblhost AS h  ON h.hostid = rel.hostid    JOIN tblhost AS nath  ON rel .natedhost = nath.hostid WHERE  rel.connectionid = $1    AND rel.hostlocation = 'L'    AND h.netid = $2    AND h.netmask = $3 LIMIT  1;' status: 2 rows: 0
    2022-06-03 08:27:32Z 27[APP]  
    2022-06-03 08:27:32Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) [IPSEC0] using ipsec dummy interface 'ipsec0'
    2022-06-03 08:27:32Z 27[APP] [COP-UPDOWN][NET] (get_src_ip) source address for xxx.xxx.xxx.xxx is IP: XGS-FW-WAN-NAT-IP 
    2022-06-03 08:27:32Z 27[APP] 
    2022-06-03 08:27:32Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route del xxx.xxx.xxx.xxx/24 dev ipsec0 src XGS-FW-WAN-NAT-IP table 220': error returned 2
    2022-06-03 08:27:32Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:32Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:32Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:32Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:32Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:32Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:32Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route flush cache': success 0
    2022-06-03 08:27:32Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route flush cache': success 0
    2022-06-03 08:27:32Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) '/bin/service fwm:vpn_connection_chains -t json -s nosync -b '{"me":"XGS-FW-WAN-NAT-IP","peer":"SG-FW-WAN-IP","mynet":"xxx.xxx.xxx.xxx/26","peernet":"xxx.xxx.xxx.xxx/24","connop":"0","iface":"unknown","myproto":"0","myport":"0","peerproto":"0","peerport":"0","conntype":"ntn","actnet":"","compress":"0","conn_id":"1"}'': success 0
    2022-06-03 08:27:32Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --not-protonum=6 --inzone-outzone=2': error returned 1
    2022-06-03 08:27:32Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --not-protonum=6 --inzone-outzone=5': error returned 1
    2022-06-03 08:27:32Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --protonum=50': error returned 1
    2022-06-03 08:27:32Z 27[APP] [COP-UPDOWN][DB] (db_conn_info) hostname: 'tunnelname' result --> id: '1', mode: 'ntn', tunnel_type: '0', subnet_family:'0'
    2022-06-03 08:27:32Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) !!SKIP!! IPsec IKE for remotes (XGS-FW-WAN-NAT-IP to SG-FW-WAN-IP) already set up
    2022-06-03 08:27:32Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) ---- exec subnet updown -- down --
    2022-06-03 08:27:32Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) [NTN] NTN get actual...
    2022-06-03 08:27:32Z 27[APP] [COP-UPDOWN][DB] (db_query) No data retrieved from query: 'SELECT ( nath.netid  || '/'  || nath.netmask ) AS natedlan FROM   tblvpnconnhostrel AS rel    JOIN tblhost AS h  ON h.hostid = rel.hostid    JOIN tblhost AS nath  ON rel .natedhost = nath.hostid WHERE  rel.connectionid = $1    AND rel.hostlocation = 'L'    AND h.netid = $2    AND h.netmask = $3 LIMIT  1;' status: 2 rows: 0
    2022-06-03 08:27:32Z 27[APP]  
    2022-06-03 08:27:32Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) [IPSEC0] using ipsec dummy interface 'ipsec0'
    2022-06-03 08:27:32Z 27[APP] [COP-UPDOWN][NET] (get_src_ip) source address for xxx.xxx.xxx.xxx is IP: XGS-FW-WAN-NAT-IP 
    2022-06-03 08:27:32Z 27[APP] 
    2022-06-03 08:27:32Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route del xxx.xxx.xxx.xxx/32 dev ipsec0 src XGS-FW-WAN-NAT-IP table 220': error returned 2
    2022-06-03 08:27:32Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:32Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:32Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:32Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:32Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:32Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:32Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route flush cache': success 0
    2022-06-03 08:27:32Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route flush cache': success 0
    2022-06-03 08:27:32Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) '/bin/service fwm:vpn_connection_chains -t json -s nosync -b '{"me":"XGS-FW-WAN-NAT-IP","peer":"SG-FW-WAN-IP","mynet":"xxx.xxx.xxx.xxx/25","peernet":"xxx.xxx.xxx.xxx/32","connop":"0","iface":"unknown","myproto":"0","myport":"0","peerproto":"0","peerport":"0","conntype":"ntn","actnet":"","compress":"0","conn_id":"1"}'': success 0
    2022-06-03 08:27:32Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --not-protonum=6 --inzone-outzone=2': error returned 1
    2022-06-03 08:27:32Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --not-protonum=6 --inzone-outzone=5': error returned 1
    2022-06-03 08:27:32Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --protonum=50': error returned 1
    2022-06-03 08:27:32Z 27[APP] [COP-UPDOWN][DB] (db_conn_info) hostname: 'tunnelname' result --> id: '1', mode: 'ntn', tunnel_type: '0', subnet_family:'0'
    2022-06-03 08:27:32Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) !!SKIP!! IPsec IKE for remotes (XGS-FW-WAN-NAT-IP to SG-FW-WAN-IP) already set up
    2022-06-03 08:27:32Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) ---- exec subnet updown -- down --
    2022-06-03 08:27:32Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) [NTN] NTN get actual...
    2022-06-03 08:27:32Z 27[APP] [COP-UPDOWN][DB] (db_query) No data retrieved from query: 'SELECT ( nath.netid  || '/'  || nath.netmask ) AS natedlan FROM   tblvpnconnhostrel AS rel    JOIN tblhost AS h  ON h.hostid = rel.hostid    JOIN tblhost AS nath  ON rel .natedhost = nath.hostid WHERE  rel.connectionid = $1    AND rel.hostlocation = 'L'    AND h.netid = $2    AND h.netmask = $3 LIMIT  1;' status: 2 rows: 0
    2022-06-03 08:27:32Z 27[APP]  
    2022-06-03 08:27:32Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) [IPSEC0] using ipsec dummy interface 'ipsec0'
    2022-06-03 08:27:32Z 27[APP] [COP-UPDOWN][NET] (get_src_ip) source address for XGS-FW-LAN-NET is IP: XGS-FW-LAN-IP 
    2022-06-03 08:27:32Z 27[APP] 
    2022-06-03 08:27:32Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route del xxx.xxx.xxx.xxx/32 dev ipsec0 src XGS-FW-LAN-IP table 220': error returned 2
    2022-06-03 08:27:32Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:32Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:32Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:32Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:32Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:32Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:32Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route flush cache': success 0
    2022-06-03 08:27:32Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route flush cache': success 0
    2022-06-03 08:27:33Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) '/bin/service fwm:vpn_connection_chains -t json -s nosync -b '{"me":"XGS-FW-WAN-NAT-IP","peer":"SG-FW-WAN-IP","mynet":"xxx.xxx.xxx.xxx/25","peernet":"xxx.xxx.xxx.xxx/32","connop":"0","iface":"unknown","myproto":"0","myport":"0","peerproto":"0","peerport":"0","conntype":"ntn","actnet":"","compress":"0","conn_id":"1"}'': success 0
    2022-06-03 08:27:33Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --not-protonum=6 --inzone-outzone=2': error returned 1
    2022-06-03 08:27:33Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --not-protonum=6 --inzone-outzone=5': error returned 1
    2022-06-03 08:27:33Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --protonum=50': error returned 1
    2022-06-03 08:27:33Z 27[APP] [COP-UPDOWN][DB] (db_conn_info) hostname: 'tunnelname' result --> id: '1', mode: 'ntn', tunnel_type: '0', subnet_family:'0'
    2022-06-03 08:27:33Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) !!SKIP!! IPsec IKE for remotes (XGS-FW-WAN-NAT-IP to SG-FW-WAN-IP) already set up
    2022-06-03 08:27:33Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) ---- exec subnet updown -- down --
    2022-06-03 08:27:33Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) [NTN] NTN get actual...
    2022-06-03 08:27:33Z 27[APP] [COP-UPDOWN][DB] (db_query) No data retrieved from query: 'SELECT ( nath.netid  || '/'  || nath.netmask ) AS natedlan FROM   tblvpnconnhostrel AS rel    JOIN tblhost AS h  ON h.hostid = rel.hostid    JOIN tblhost AS nath  ON rel .natedhost = nath.hostid WHERE  rel.connectionid = $1    AND rel.hostlocation = 'L'    AND h.netid = $2    AND h.netmask = $3 LIMIT  1;' status: 2 rows: 0
    2022-06-03 08:27:33Z 27[APP]  
    2022-06-03 08:27:33Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) [IPSEC0] using ipsec dummy interface 'ipsec0'
    2022-06-03 08:27:33Z 27[APP] [COP-UPDOWN][NET] (get_src_ip) source address for xxx.xxx.xxx.xxx is IP: XGS-FW-WAN-NAT-IP 
    2022-06-03 08:27:33Z 27[APP] 
    2022-06-03 08:27:33Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route del xxx.xxx.xxx.xxx/32 dev ipsec0 src XGS-FW-WAN-NAT-IP table 220': success 0
    2022-06-03 08:27:33Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:33Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:33Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:33Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:33Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:33Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:33Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route flush cache': success 0
    2022-06-03 08:27:33Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route flush cache': success 0
    2022-06-03 08:27:33Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) '/bin/service fwm:vpn_connection_chains -t json -s nosync -b '{"me":"XGS-FW-WAN-NAT-IP","peer":"SG-FW-WAN-IP","mynet":"xxx.xxx.xxx.xxx/27","peernet":"xxx.xxx.xxx.xxx/32","connop":"0","iface":"unknown","myproto":"0","myport":"0","peerproto":"0","peerport":"0","conntype":"ntn","actnet":"","compress":"0","conn_id":"1"}'': success 0
    2022-06-03 08:27:33Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --not-protonum=6 --inzone-outzone=2': error returned 1
    2022-06-03 08:27:33Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --not-protonum=6 --inzone-outzone=5': error returned 1
    2022-06-03 08:27:33Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --protonum=50': error returned 1
    2022-06-03 08:27:33Z 27[APP] [COP-UPDOWN][DB] (db_conn_info) hostname: 'tunnelname' result --> id: '1', mode: 'ntn', tunnel_type: '0', subnet_family:'0'
    2022-06-03 08:27:33Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) !!SKIP!! IPsec IKE for remotes (XGS-FW-WAN-NAT-IP to SG-FW-WAN-IP) already set up
    2022-06-03 08:27:33Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) ---- exec subnet updown -- down --
    2022-06-03 08:27:33Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) [NTN] NTN get actual...
    2022-06-03 08:27:33Z 27[APP] [COP-UPDOWN][DB] (db_query) No data retrieved from query: 'SELECT ( nath.netid  || '/'  || nath.netmask ) AS natedlan FROM   tblvpnconnhostrel AS rel    JOIN tblhost AS h  ON h.hostid = rel.hostid    JOIN tblhost AS nath  ON rel .natedhost = nath.hostid WHERE  rel.connectionid = $1    AND rel.hostlocation = 'L'    AND h.netid = $2    AND h.netmask = $3 LIMIT  1;' status: 2 rows: 0
    2022-06-03 08:27:33Z 27[APP]  
    2022-06-03 08:27:33Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) [IPSEC0] using ipsec dummy interface 'ipsec0'
    2022-06-03 08:27:33Z 27[APP] [COP-UPDOWN][NET] (get_src_ip) source address for XGS-FW-LAN-IP28 is IP: XGS-FW-WAN-NAT-IP 
    2022-06-03 08:27:33Z 27[APP] 
    2022-06-03 08:27:33Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route del xxx.xxx.xxx.xxx/32 dev ipsec0 src XGS-FW-WAN-NAT-IP table 220': error returned 2
    2022-06-03 08:27:33Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:33Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:33Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:33Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:33Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:33Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:33Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route flush cache': success 0
    2022-06-03 08:27:33Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route flush cache': success 0
    2022-06-03 08:27:33Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) '/bin/service fwm:vpn_connection_chains -t json -s nosync -b '{"me":"XGS-FW-WAN-NAT-IP","peer":"SG-FW-WAN-IP","mynet":"XGS-FW-LAN-IP28/25","peernet":"xxx.xxx.xxx.xxx/32","connop":"0","iface":"unknown","myproto":"0","myport":"0","peerproto":"0","peerport":"0","conntype":"ntn","actnet":"","compress":"0","conn_id":"1"}'': success 0
    2022-06-03 08:27:33Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --not-protonum=6 --inzone-outzone=2': error returned 1
    2022-06-03 08:27:33Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --not-protonum=6 --inzone-outzone=5': error returned 1
    2022-06-03 08:27:33Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --protonum=50': error returned 1
    2022-06-03 08:27:33Z 27[APP] [COP-UPDOWN][DB] (db_conn_info) hostname: 'tunnelname' result --> id: '1', mode: 'ntn', tunnel_type: '0', subnet_family:'0'
    2022-06-03 08:27:33Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) !!SKIP!! IPsec IKE for remotes (XGS-FW-WAN-NAT-IP to SG-FW-WAN-IP) already set up
    2022-06-03 08:27:33Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) ---- exec subnet updown -- down --
    2022-06-03 08:27:33Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) [NTN] NTN get actual...
    2022-06-03 08:27:33Z 27[APP] [COP-UPDOWN][DB] (db_query) No data retrieved from query: 'SELECT ( nath.netid  || '/'  || nath.netmask ) AS natedlan FROM   tblvpnconnhostrel AS rel    JOIN tblhost AS h  ON h.hostid = rel.hostid    JOIN tblhost AS nath  ON rel .natedhost = nath.hostid WHERE  rel.connectionid = $1    AND rel.hostlocation = 'L'    AND h.netid = $2    AND h.netmask = $3 LIMIT  1;' status: 2 rows: 0
    2022-06-03 08:27:33Z 27[APP]  
    2022-06-03 08:27:33Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) [IPSEC0] using ipsec dummy interface 'ipsec0'
    2022-06-03 08:27:33Z 27[APP] [COP-UPDOWN][NET] (get_src_ip) source address for xxx.xxx.xxx.xxx is IP: XGS-FW-WAN-NAT-IP 
    2022-06-03 08:27:33Z 27[APP] 
    2022-06-03 08:27:33Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route del xxx.xxx.xxx.xxx/32 dev ipsec0 src XGS-FW-WAN-NAT-IP table 220': success 0
    2022-06-03 08:27:33Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:33Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:33Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:33Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:33Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:33Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:33Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route flush cache': success 0
    2022-06-03 08:27:33Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route flush cache': success 0
    2022-06-03 08:27:33Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) '/bin/service fwm:vpn_connection_chains -t json -s nosync -b '{"me":"XGS-FW-WAN-NAT-IP","peer":"SG-FW-WAN-IP","mynet":"xxx.xxx.xxx.xxx/26","peernet":"xxx.xxx.xxx.xxx/32","connop":"0","iface":"unknown","myproto":"0","myport":"0","peerproto":"0","peerport":"0","conntype":"ntn","actnet":"","compress":"0","conn_id":"1"}'': success 0
    2022-06-03 08:27:33Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --not-protonum=6 --inzone-outzone=2': error returned 1
    2022-06-03 08:27:33Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --not-protonum=6 --inzone-outzone=5': error returned 1
    2022-06-03 08:27:33Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --protonum=50': error returned 1
    2022-06-03 08:27:33Z 27[APP] [COP-UPDOWN][DB] (db_conn_info) hostname: 'tunnelname' result --> id: '1', mode: 'ntn', tunnel_type: '0', subnet_family:'0'
    2022-06-03 08:27:33Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) !!SKIP!! IPsec IKE for remotes (XGS-FW-WAN-NAT-IP to SG-FW-WAN-IP) already set up
    2022-06-03 08:27:33Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) ---- exec subnet updown -- down --
    2022-06-03 08:27:33Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) [NTN] NTN get actual...
    2022-06-03 08:27:33Z 27[APP] [COP-UPDOWN][DB] (db_query) No data retrieved from query: 'SELECT ( nath.netid  || '/'  || nath.netmask ) AS natedlan FROM   tblvpnconnhostrel AS rel    JOIN tblhost AS h  ON h.hostid = rel.hostid    JOIN tblhost AS nath  ON rel .natedhost = nath.hostid WHERE  rel.connectionid = $1    AND rel.hostlocation = 'L'    AND h.netid = $2    AND h.netmask = $3 LIMIT  1;' status: 2 rows: 0
    2022-06-03 08:27:33Z 27[APP]  
    2022-06-03 08:27:33Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) [IPSEC0] using ipsec dummy interface 'ipsec0'
    2022-06-03 08:27:33Z 27[APP] [COP-UPDOWN][NET] (get_src_ip) source address for xxx.xxx.xxx.xxx is IP: XGS-FW-WAN-NAT-IP 
    2022-06-03 08:27:33Z 27[APP] 
    2022-06-03 08:27:33Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route del xxx.xxx.xxx.xxx/32 dev ipsec0 src XGS-FW-WAN-NAT-IP table 220': error returned 2
    2022-06-03 08:27:33Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:33Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:33Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:33Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:33Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:33Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:33Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route flush cache': success 0
    2022-06-03 08:27:33Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route flush cache': success 0
    2022-06-03 08:27:33Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) '/bin/service fwm:vpn_connection_chains -t json -s nosync -b '{"me":"XGS-FW-WAN-NAT-IP","peer":"SG-FW-WAN-IP","mynet":"xxx.xxx.xxx.xxx/26","peernet":"xxx.xxx.xxx.xxx/32","connop":"0","iface":"unknown","myproto":"0","myport":"0","peerproto":"0","peerport":"0","conntype":"ntn","actnet":"","compress":"0","conn_id":"1"}'': success 0
    2022-06-03 08:27:33Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --not-protonum=6 --inzone-outzone=2': error returned 1
    2022-06-03 08:27:33Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --not-protonum=6 --inzone-outzone=5': error returned 1
    2022-06-03 08:27:33Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --protonum=50': error returned 1
    2022-06-03 08:27:33Z 27[APP] [COP-UPDOWN][DB] (db_conn_info) hostname: 'tunnelname' result --> id: '1', mode: 'ntn', tunnel_type: '0', subnet_family:'0'
    2022-06-03 08:27:33Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) !!SKIP!! IPsec IKE for remotes (XGS-FW-WAN-NAT-IP to SG-FW-WAN-IP) already set up
    2022-06-03 08:27:33Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) ---- exec subnet updown -- down --
    2022-06-03 08:27:33Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) [NTN] NTN get actual...
    2022-06-03 08:27:33Z 27[APP] [COP-UPDOWN][DB] (db_query) No data retrieved from query: 'SELECT ( nath.netid  || '/'  || nath.netmask ) AS natedlan FROM   tblvpnconnhostrel AS rel    JOIN tblhost AS h  ON h.hostid = rel.hostid    JOIN tblhost AS nath  ON rel .natedhost = nath.hostid WHERE  rel.connectionid = $1    AND rel.hostlocation = 'L'    AND h.netid = $2    AND h.netmask = $3 LIMIT  1;' status: 2 rows: 0
    2022-06-03 08:27:33Z 27[APP]  
    2022-06-03 08:27:33Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) [IPSEC0] using ipsec dummy interface 'ipsec0'
    2022-06-03 08:27:33Z 27[APP] [COP-UPDOWN][NET] (get_src_ip) source address for xxx.xxx.xxx.xxx is IP: XGS-FW-WAN-NAT-IP 
    2022-06-03 08:27:33Z 27[APP] 
    2022-06-03 08:27:33Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route del xxx.xxx.xxx.xxx/32 dev ipsec0 src XGS-FW-WAN-NAT-IP table 220': error returned 2
    2022-06-03 08:27:33Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:33Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:33Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:33Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:33Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:33Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:33Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route flush cache': success 0
    2022-06-03 08:27:33Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route flush cache': success 0
    2022-06-03 08:27:33Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) '/bin/service fwm:vpn_connection_chains -t json -s nosync -b '{"me":"XGS-FW-WAN-NAT-IP","peer":"SG-FW-WAN-IP","mynet":"xxx.xxx.xxx.xxx/25","peernet":"xxx.xxx.xxx.xxx/32","connop":"0","iface":"unknown","myproto":"0","myport":"0","peerproto":"0","peerport":"0","conntype":"ntn","actnet":"","compress":"0","conn_id":"1"}'': success 0
    2022-06-03 08:27:33Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --not-protonum=6 --inzone-outzone=2': error returned 1
    2022-06-03 08:27:33Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --not-protonum=6 --inzone-outzone=5': error returned 1
    2022-06-03 08:27:33Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --protonum=50': error returned 1
    2022-06-03 08:27:33Z 27[APP] [COP-UPDOWN][DB] (db_conn_info) hostname: 'tunnelname' result --> id: '1', mode: 'ntn', tunnel_type: '0', subnet_family:'0'
    2022-06-03 08:27:33Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) !!SKIP!! IPsec IKE for remotes (XGS-FW-WAN-NAT-IP to SG-FW-WAN-IP) already set up
    2022-06-03 08:27:33Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) ---- exec subnet updown -- down --
    2022-06-03 08:27:33Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) [NTN] NTN get actual...
    2022-06-03 08:27:33Z 27[APP] [COP-UPDOWN][DB] (db_query) No data retrieved from query: 'SELECT ( nath.netid  || '/'  || nath.netmask ) AS natedlan FROM   tblvpnconnhostrel AS rel    JOIN tblhost AS h  ON h.hostid = rel.hostid    JOIN tblhost AS nath  ON rel .natedhost = nath.hostid WHERE  rel.connectionid = $1    AND rel.hostlocation = 'L'    AND h.netid = $2    AND h.netmask = $3 LIMIT  1;' status: 2 rows: 0
    2022-06-03 08:27:33Z 27[APP]  
    2022-06-03 08:27:33Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) [IPSEC0] using ipsec dummy interface 'ipsec0'
    2022-06-03 08:27:33Z 27[APP] [COP-UPDOWN][NET] (get_src_ip) source address for xxx.xxx.xxx.xxx is IP: XGS-FW-WAN-NAT-IP 
    2022-06-03 08:27:33Z 27[APP] 
    2022-06-03 08:27:33Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route del xxx.xxx.xxx.xxx/32 dev ipsec0 src XGS-FW-WAN-NAT-IP table 220': error returned 2
    2022-06-03 08:27:33Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:33Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:33Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:33Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:33Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:33Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:33Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route flush cache': success 0
    2022-06-03 08:27:33Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route flush cache': success 0
    2022-06-03 08:27:34Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) '/bin/service fwm:vpn_connection_chains -t json -s nosync -b '{"me":"XGS-FW-WAN-NAT-IP","peer":"SG-FW-WAN-IP","mynet":"xxx.xxx.xxx.xxx/25","peernet":"xxx.xxx.xxx.xxx/32","connop":"0","iface":"unknown","myproto":"0","myport":"0","peerproto":"0","peerport":"0","conntype":"ntn","actnet":"","compress":"0","conn_id":"1"}'': success 0
    2022-06-03 08:27:34Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --not-protonum=6 --inzone-outzone=2': error returned 1
    2022-06-03 08:27:34Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --not-protonum=6 --inzone-outzone=5': error returned 1
    2022-06-03 08:27:34Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --protonum=50': error returned 1
    2022-06-03 08:27:34Z 27[APP] [COP-UPDOWN][DB] (db_conn_info) hostname: 'tunnelname' result --> id: '1', mode: 'ntn', tunnel_type: '0', subnet_family:'0'
    2022-06-03 08:27:34Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) !!SKIP!! IPsec IKE for remotes (XGS-FW-WAN-NAT-IP to SG-FW-WAN-IP) already set up
    2022-06-03 08:27:34Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) ---- exec subnet updown -- down --
    2022-06-03 08:27:34Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) [NTN] NTN get actual...
    2022-06-03 08:27:34Z 27[APP] [COP-UPDOWN][DB] (db_query) No data retrieved from query: 'SELECT ( nath.netid  || '/'  || nath.netmask ) AS natedlan FROM   tblvpnconnhostrel AS rel    JOIN tblhost AS h  ON h.hostid = rel.hostid    JOIN tblhost AS nath  ON rel .natedhost = nath.hostid WHERE  rel.connectionid = $1    AND rel.hostlocation = 'L'    AND h.netid = $2    AND h.netmask = $3 LIMIT  1;' status: 2 rows: 0
    2022-06-03 08:27:34Z 27[APP]  
    2022-06-03 08:27:34Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) [IPSEC0] using ipsec dummy interface 'ipsec0'
    2022-06-03 08:27:34Z 27[APP] [COP-UPDOWN][NET] (get_src_ip) source address for xxx.xxx.xxx.xxx is IP: XGS-FW-WAN-NAT-IP 
    2022-06-03 08:27:34Z 27[APP] 
    2022-06-03 08:27:34Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route del xxx.xxx.xxx.xxx/32 dev ipsec0 src XGS-FW-WAN-NAT-IP table 220': error returned 2
    2022-06-03 08:27:34Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:34Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:34Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:34Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:34Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:34Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:34Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route flush cache': success 0
    2022-06-03 08:27:34Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route flush cache': success 0
    2022-06-03 08:27:34Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) '/bin/service fwm:vpn_connection_chains -t json -s nosync -b '{"me":"XGS-FW-WAN-NAT-IP","peer":"SG-FW-WAN-IP","mynet":"xxx.xxx.xxx.xxx/27","peernet":"xxx.xxx.xxx.xxx/32","connop":"0","iface":"unknown","myproto":"0","myport":"0","peerproto":"0","peerport":"0","conntype":"ntn","actnet":"","compress":"0","conn_id":"1"}'': success 0
    2022-06-03 08:27:34Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --not-protonum=6 --inzone-outzone=2': error returned 1
    2022-06-03 08:27:34Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --not-protonum=6 --inzone-outzone=5': error returned 1
    2022-06-03 08:27:34Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --protonum=50': error returned 1
    2022-06-03 08:27:34Z 27[APP] [COP-UPDOWN][DB] (db_conn_info) hostname: 'tunnelname' result --> id: '1', mode: 'ntn', tunnel_type: '0', subnet_family:'0'
    2022-06-03 08:27:34Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) !!SKIP!! IPsec IKE for remotes (XGS-FW-WAN-NAT-IP to SG-FW-WAN-IP) already set up
    2022-06-03 08:27:34Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) ---- exec subnet updown -- down --
    2022-06-03 08:27:34Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) [NTN] NTN get actual...
    2022-06-03 08:27:34Z 27[APP] [COP-UPDOWN][DB] (db_query) No data retrieved from query: 'SELECT ( nath.netid  || '/'  || nath.netmask ) AS natedlan FROM   tblvpnconnhostrel AS rel    JOIN tblhost AS h  ON h.hostid = rel.hostid    JOIN tblhost AS nath  ON rel .natedhost = nath.hostid WHERE  rel.connectionid = $1    AND rel.hostlocation = 'L'    AND h.netid = $2    AND h.netmask = $3 LIMIT  1;' status: 2 rows: 0
    2022-06-03 08:27:34Z 27[APP]  
    2022-06-03 08:27:34Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) [IPSEC0] using ipsec dummy interface 'ipsec0'
    2022-06-03 08:27:34Z 27[APP] [COP-UPDOWN][NET] (get_src_ip) source address for xxx.xxx.xxx.xxx is IP: XGS-FW-WAN-NAT-IP 
    2022-06-03 08:27:34Z 27[APP] 
    2022-06-03 08:27:34Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route del xxx.xxx.xxx.xxx/32 dev ipsec0 src XGS-FW-WAN-NAT-IP table 220': error returned 2
    2022-06-03 08:27:34Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:34Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:34Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:34Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:34Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:34Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:34Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route flush cache': success 0
    2022-06-03 08:27:34Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route flush cache': success 0
    2022-06-03 08:27:34Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) '/bin/service fwm:vpn_connection_chains -t json -s nosync -b '{"me":"XGS-FW-WAN-NAT-IP","peer":"SG-FW-WAN-IP","mynet":"xxx.xxx.xxx.xxx/25","peernet":"xxx.xxx.xxx.xxx/32","connop":"0","iface":"unknown","myproto":"0","myport":"0","peerproto":"0","peerport":"0","conntype":"ntn","actnet":"","compress":"0","conn_id":"1"}'': success 0
    2022-06-03 08:27:34Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --not-protonum=6 --inzone-outzone=2': error returned 1
    2022-06-03 08:27:34Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --not-protonum=6 --inzone-outzone=5': error returned 1
    2022-06-03 08:27:34Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --protonum=50': error returned 1
    2022-06-03 08:27:34Z 27[APP] [COP-UPDOWN][DB] (db_conn_info) hostname: 'tunnelname' result --> id: '1', mode: 'ntn', tunnel_type: '0', subnet_family:'0'
    2022-06-03 08:27:34Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) !!SKIP!! IPsec IKE for remotes (XGS-FW-WAN-NAT-IP to SG-FW-WAN-IP) already set up
    2022-06-03 08:27:34Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) ---- exec subnet updown -- down --
    2022-06-03 08:27:34Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) [NTN] NTN get actual...
    2022-06-03 08:27:34Z 27[APP] [COP-UPDOWN][DB] (db_query) No data retrieved from query: 'SELECT ( nath.netid  || '/'  || nath.netmask ) AS natedlan FROM   tblvpnconnhostrel AS rel    JOIN tblhost AS h  ON h.hostid = rel.hostid    JOIN tblhost AS nath  ON rel .natedhost = nath.hostid WHERE  rel.connectionid = $1    AND rel.hostlocation = 'L'    AND h.netid = $2    AND h.netmask = $3 LIMIT  1;' status: 2 rows: 0
    2022-06-03 08:27:34Z 27[APP]  
    2022-06-03 08:27:34Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) [IPSEC0] using ipsec dummy interface 'ipsec0'
    2022-06-03 08:27:34Z 27[APP] [COP-UPDOWN][NET] (get_src_ip) source address for XGS-FW-LAN-NET is IP: XGS-FW-LAN-IP 
    2022-06-03 08:27:34Z 27[APP] 
    2022-06-03 08:27:34Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route del xxx.xxx.xxx.xxx/32 dev ipsec0 src XGS-FW-LAN-IP table 220': error returned 2
    2022-06-03 08:27:34Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:34Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:34Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:34Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:34Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:34Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:34Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route flush cache': success 0
    2022-06-03 08:27:34Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route flush cache': success 0
    2022-06-03 08:27:34Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) '/bin/service fwm:vpn_connection_chains -t json -s nosync -b '{"me":"XGS-FW-WAN-NAT-IP","peer":"SG-FW-WAN-IP","mynet":"xxx.xxx.xxx.xxx/25","peernet":"xxx.xxx.xxx.xxx/32","connop":"0","iface":"unknown","myproto":"0","myport":"0","peerproto":"0","peerport":"0","conntype":"ntn","actnet":"","compress":"0","conn_id":"1"}'': success 0
    2022-06-03 08:27:34Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --not-protonum=6 --inzone-outzone=2': error returned 1
    2022-06-03 08:27:34Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --not-protonum=6 --inzone-outzone=5': error returned 1
    2022-06-03 08:27:34Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --protonum=50': error returned 1
    2022-06-03 08:27:34Z 27[APP] [COP-UPDOWN][DB] (db_conn_info) hostname: 'tunnelname' result --> id: '1', mode: 'ntn', tunnel_type: '0', subnet_family:'0'
    2022-06-03 08:27:34Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) !!SKIP!! IPsec IKE for remotes (XGS-FW-WAN-NAT-IP to SG-FW-WAN-IP) already set up
    2022-06-03 08:27:34Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) ---- exec subnet updown -- down --
    2022-06-03 08:27:34Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) [NTN] NTN get actual...
    2022-06-03 08:27:34Z 27[APP] [COP-UPDOWN][DB] (db_query) No data retrieved from query: 'SELECT ( nath.netid  || '/'  || nath.netmask ) AS natedlan FROM   tblvpnconnhostrel AS rel    JOIN tblhost AS h  ON h.hostid = rel.hostid    JOIN tblhost AS nath  ON rel .natedhost = nath.hostid WHERE  rel.connectionid = $1    AND rel.hostlocation = 'L'    AND h.netid = $2    AND h.netmask = $3 LIMIT  1;' status: 2 rows: 0
    2022-06-03 08:27:34Z 27[APP]  
    2022-06-03 08:27:34Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) [IPSEC0] using ipsec dummy interface 'ipsec0'
    2022-06-03 08:27:34Z 27[APP] [COP-UPDOWN][NET] (get_src_ip) source address for XGS-FW-LAN-IP28 is IP: XGS-FW-WAN-NAT-IP 
    2022-06-03 08:27:34Z 27[APP] 
    2022-06-03 08:27:34Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route del xxx.xxx.xxx.xxx/32 dev ipsec0 src XGS-FW-WAN-NAT-IP table 220': error returned 2
    2022-06-03 08:27:34Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:34Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:34Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:34Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:34Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:34Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:34Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route flush cache': success 0
    2022-06-03 08:27:34Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route flush cache': success 0
    2022-06-03 08:27:34Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) '/bin/service fwm:vpn_connection_chains -t json -s nosync -b '{"me":"XGS-FW-WAN-NAT-IP","peer":"SG-FW-WAN-IP","mynet":"XGS-FW-LAN-IP28/25","peernet":"xxx.xxx.xxx.xxx/32","connop":"0","iface":"unknown","myproto":"0","myport":"0","peerproto":"0","peerport":"0","conntype":"ntn","actnet":"","compress":"0","conn_id":"1"}'': success 0
    2022-06-03 08:27:34Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --not-protonum=6 --inzone-outzone=2': error returned 1
    2022-06-03 08:27:34Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --not-protonum=6 --inzone-outzone=5': error returned 1
    2022-06-03 08:27:34Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --protonum=50': error returned 1
    2022-06-03 08:27:34Z 27[APP] [COP-UPDOWN][DB] (db_conn_info) hostname: 'tunnelname' result --> id: '1', mode: 'ntn', tunnel_type: '0', subnet_family:'0'
    2022-06-03 08:27:34Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) !!SKIP!! IPsec IKE for remotes (XGS-FW-WAN-NAT-IP to SG-FW-WAN-IP) already set up
    2022-06-03 08:27:34Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) ---- exec subnet updown -- down --
    2022-06-03 08:27:34Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) [NTN] NTN get actual...
    2022-06-03 08:27:34Z 27[APP] [COP-UPDOWN][DB] (db_query) No data retrieved from query: 'SELECT ( nath.netid  || '/'  || nath.netmask ) AS natedlan FROM   tblvpnconnhostrel AS rel    JOIN tblhost AS h  ON h.hostid = rel.hostid    JOIN tblhost AS nath  ON rel .natedhost = nath.hostid WHERE  rel.connectionid = $1    AND rel.hostlocation = 'L'    AND h.netid = $2    AND h.netmask = $3 LIMIT  1;' status: 2 rows: 0
    2022-06-03 08:27:34Z 27[APP]  
    2022-06-03 08:27:34Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) [IPSEC0] using ipsec dummy interface 'ipsec0'
    2022-06-03 08:27:34Z 27[APP] [COP-UPDOWN][NET] (get_src_ip) source address for xxx.xxx.xxx.xxx is IP: XGS-FW-WAN-NAT-IP 
    2022-06-03 08:27:34Z 27[APP] 
    2022-06-03 08:27:34Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route del xxx.xxx.xxx.xxx/24 dev ipsec0 src XGS-FW-WAN-NAT-IP table 220': error returned 2
    2022-06-03 08:27:34Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:34Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:34Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:34Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:34Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:34Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:34Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route flush cache': success 0
    2022-06-03 08:27:34Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route flush cache': success 0
    2022-06-03 08:27:34Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) '/bin/service fwm:vpn_connection_chains -t json -s nosync -b '{"me":"XGS-FW-WAN-NAT-IP","peer":"SG-FW-WAN-IP","mynet":"xxx.xxx.xxx.xxx/25","peernet":"xxx.xxx.xxx.xxx/24","connop":"0","iface":"unknown","myproto":"0","myport":"0","peerproto":"0","peerport":"0","conntype":"ntn","actnet":"","compress":"0","conn_id":"1"}'': success 0
    2022-06-03 08:27:34Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --not-protonum=6 --inzone-outzone=2': error returned 1
    2022-06-03 08:27:34Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --not-protonum=6 --inzone-outzone=5': error returned 1
    2022-06-03 08:27:34Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --protonum=50': error returned 1
    2022-06-03 08:27:34Z 27[APP] [COP-UPDOWN][DB] (db_conn_info) hostname: 'tunnelname' result --> id: '1', mode: 'ntn', tunnel_type: '0', subnet_family:'0'
    2022-06-03 08:27:34Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) !!SKIP!! IPsec IKE for remotes (XGS-FW-WAN-NAT-IP to SG-FW-WAN-IP) already set up
    2022-06-03 08:27:34Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) ---- exec subnet updown -- down --
    2022-06-03 08:27:34Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) [NTN] NTN get actual...
    2022-06-03 08:27:34Z 27[APP] [COP-UPDOWN][DB] (db_query) No data retrieved from query: 'SELECT ( nath.netid  || '/'  || nath.netmask ) AS natedlan FROM   tblvpnconnhostrel AS rel    JOIN tblhost AS h  ON h.hostid = rel.hostid    JOIN tblhost AS nath  ON rel .natedhost = nath.hostid WHERE  rel.connectionid = $1    AND rel.hostlocation = 'L'    AND h.netid = $2    AND h.netmask = $3 LIMIT  1;' status: 2 rows: 0
    2022-06-03 08:27:34Z 27[APP]  
    2022-06-03 08:27:34Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) [IPSEC0] using ipsec dummy interface 'ipsec0'
    2022-06-03 08:27:34Z 27[APP] [COP-UPDOWN][NET] (get_src_ip) source address for xxx.xxx.xxx.xxx is IP: XGS-FW-WAN-NAT-IP 
    2022-06-03 08:27:34Z 27[APP] 
    2022-06-03 08:27:34Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route del xxx.xxx.xxx.xxx/32 dev ipsec0 src XGS-FW-WAN-NAT-IP table 220': error returned 2
    2022-06-03 08:27:34Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:34Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:34Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:34Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:34Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:34Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:34Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route flush cache': success 0
    2022-06-03 08:27:34Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route flush cache': success 0
    2022-06-03 08:27:35Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) '/bin/service fwm:vpn_connection_chains -t json -s nosync -b '{"me":"XGS-FW-WAN-NAT-IP","peer":"SG-FW-WAN-IP","mynet":"xxx.xxx.xxx.xxx/26","peernet":"xxx.xxx.xxx.xxx/32","connop":"0","iface":"unknown","myproto":"0","myport":"0","peerproto":"0","peerport":"0","conntype":"ntn","actnet":"","compress":"0","conn_id":"1"}'': success 0
    2022-06-03 08:27:35Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --not-protonum=6 --inzone-outzone=2': error returned 1
    2022-06-03 08:27:35Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --not-protonum=6 --inzone-outzone=5': error returned 1
    2022-06-03 08:27:35Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --protonum=50': error returned 1
    2022-06-03 08:27:35Z 27[APP] [COP-UPDOWN][DB] (db_conn_info) hostname: 'tunnelname' result --> id: '1', mode: 'ntn', tunnel_type: '0', subnet_family:'0'
    2022-06-03 08:27:35Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) !!SKIP!! IPsec IKE for remotes (XGS-FW-WAN-NAT-IP to SG-FW-WAN-IP) already set up
    2022-06-03 08:27:35Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) ---- exec subnet updown -- down --
    2022-06-03 08:27:35Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) [NTN] NTN get actual...
    2022-06-03 08:27:35Z 27[APP] [COP-UPDOWN][DB] (db_query) No data retrieved from query: 'SELECT ( nath.netid  || '/'  || nath.netmask ) AS natedlan FROM   tblvpnconnhostrel AS rel    JOIN tblhost AS h  ON h.hostid = rel.hostid    JOIN tblhost AS nath  ON rel .natedhost = nath.hostid WHERE  rel.connectionid = $1    AND rel.hostlocation = 'L'    AND h.netid = $2    AND h.netmask = $3 LIMIT  1;' status: 2 rows: 0
    2022-06-03 08:27:35Z 27[APP]  
    2022-06-03 08:27:35Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) [IPSEC0] using ipsec dummy interface 'ipsec0'
    2022-06-03 08:27:35Z 27[APP] [COP-UPDOWN][NET] (get_src_ip) source address for XGS-FW-LAN-IP28 is IP: XGS-FW-WAN-NAT-IP 
    2022-06-03 08:27:35Z 27[APP] 
    2022-06-03 08:27:35Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route del xxx.xxx.xxx.xxx/32 dev ipsec0 src XGS-FW-WAN-NAT-IP table 220': success 0
    2022-06-03 08:27:35Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:35Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:35Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:35Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:35Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:35Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:35Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route flush cache': success 0
    2022-06-03 08:27:35Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route flush cache': success 0
    2022-06-03 08:27:35Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) '/bin/service fwm:vpn_connection_chains -t json -s nosync -b '{"me":"XGS-FW-WAN-NAT-IP","peer":"SG-FW-WAN-IP","mynet":"XGS-FW-LAN-IP28/25","peernet":"xxx.xxx.xxx.xxx/32","connop":"0","iface":"unknown","myproto":"0","myport":"0","peerproto":"0","peerport":"0","conntype":"ntn","actnet":"","compress":"0","conn_id":"1"}'': success 0
    2022-06-03 08:27:35Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --not-protonum=6 --inzone-outzone=2': error returned 1
    2022-06-03 08:27:35Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --not-protonum=6 --inzone-outzone=5': error returned 1
    2022-06-03 08:27:35Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --protonum=50': error returned 1
    2022-06-03 08:27:35Z 27[APP] [COP-UPDOWN][DB] (db_conn_info) hostname: 'tunnelname' result --> id: '1', mode: 'ntn', tunnel_type: '0', subnet_family:'0'
    2022-06-03 08:27:35Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) !!SKIP!! IPsec IKE for remotes (XGS-FW-WAN-NAT-IP to SG-FW-WAN-IP) already set up
    2022-06-03 08:27:35Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) ---- exec subnet updown -- down --
    2022-06-03 08:27:35Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) [NTN] NTN get actual...
    2022-06-03 08:27:35Z 27[APP] [COP-UPDOWN][DB] (db_query) No data retrieved from query: 'SELECT ( nath.netid  || '/'  || nath.netmask ) AS natedlan FROM   tblvpnconnhostrel AS rel    JOIN tblhost AS h  ON h.hostid = rel.hostid    JOIN tblhost AS nath  ON rel .natedhost = nath.hostid WHERE  rel.connectionid = $1    AND rel.hostlocation = 'L'    AND h.netid = $2    AND h.netmask = $3 LIMIT  1;' status: 2 rows: 0
    2022-06-03 08:27:35Z 27[APP]  
    2022-06-03 08:27:35Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) [IPSEC0] using ipsec dummy interface 'ipsec0'
    2022-06-03 08:27:35Z 27[APP] [COP-UPDOWN][NET] (get_src_ip) source address for xxx.xxx.xxx.xxx is IP: XGS-FW-WAN-NAT-IP 
    2022-06-03 08:27:35Z 27[APP] 
    2022-06-03 08:27:35Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route del xxx.xxx.xxx.xxx/32 dev ipsec0 src XGS-FW-WAN-NAT-IP table 220': error returned 2
    2022-06-03 08:27:35Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:35Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:35Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:35Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:35Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:35Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:35Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route flush cache': success 0
    2022-06-03 08:27:35Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route flush cache': success 0
    2022-06-03 08:27:35Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) '/bin/service fwm:vpn_connection_chains -t json -s nosync -b '{"me":"XGS-FW-WAN-NAT-IP","peer":"SG-FW-WAN-IP","mynet":"xxx.xxx.xxx.xxx/27","peernet":"xxx.xxx.xxx.xxx/32","connop":"0","iface":"unknown","myproto":"0","myport":"0","peerproto":"0","peerport":"0","conntype":"ntn","actnet":"","compress":"0","conn_id":"1"}'': success 0
    2022-06-03 08:27:35Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --not-protonum=6 --inzone-outzone=2': error returned 1
    2022-06-03 08:27:35Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --not-protonum=6 --inzone-outzone=5': error returned 1
    2022-06-03 08:27:35Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --protonum=50': error returned 1
    2022-06-03 08:27:35Z 27[APP] [COP-UPDOWN][DB] (db_conn_info) hostname: 'tunnelname' result --> id: '1', mode: 'ntn', tunnel_type: '0', subnet_family:'0'
    2022-06-03 08:27:35Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) !!SKIP!! IPsec IKE for remotes (XGS-FW-WAN-NAT-IP to SG-FW-WAN-IP) already set up
    2022-06-03 08:27:35Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) ---- exec subnet updown -- down --
    2022-06-03 08:27:35Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) [NTN] NTN get actual...
    2022-06-03 08:27:35Z 27[APP] [COP-UPDOWN][DB] (db_query) No data retrieved from query: 'SELECT ( nath.netid  || '/'  || nath.netmask ) AS natedlan FROM   tblvpnconnhostrel AS rel    JOIN tblhost AS h  ON h.hostid = rel.hostid    JOIN tblhost AS nath  ON rel .natedhost = nath.hostid WHERE  rel.connectionid = $1    AND rel.hostlocation = 'L'    AND h.netid = $2    AND h.netmask = $3 LIMIT  1;' status: 2 rows: 0
    2022-06-03 08:27:35Z 27[APP]  
    2022-06-03 08:27:35Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) [IPSEC0] using ipsec dummy interface 'ipsec0'
    2022-06-03 08:27:35Z 27[APP] [COP-UPDOWN][NET] (get_src_ip) source address for xxx.xxx.xxx.xxx is IP: XGS-FW-WAN-NAT-IP 
    2022-06-03 08:27:35Z 27[APP] 
    2022-06-03 08:27:35Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route del xxx.xxx.xxx.xxx/32 dev ipsec0 src XGS-FW-WAN-NAT-IP table 220': success 0
    2022-06-03 08:27:35Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:35Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:35Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:35Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:35Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:35Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:35Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route flush cache': success 0
    2022-06-03 08:27:35Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route flush cache': success 0
    2022-06-03 08:27:35Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) '/bin/service fwm:vpn_connection_chains -t json -s nosync -b '{"me":"XGS-FW-WAN-NAT-IP","peer":"SG-FW-WAN-IP","mynet":"xxx.xxx.xxx.xxx/27","peernet":"xxx.xxx.xxx.xxx/32","connop":"0","iface":"unknown","myproto":"0","myport":"0","peerproto":"0","peerport":"0","conntype":"ntn","actnet":"","compress":"0","conn_id":"1"}'': success 0
    2022-06-03 08:27:35Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --not-protonum=6 --inzone-outzone=2': error returned 1
    2022-06-03 08:27:35Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --not-protonum=6 --inzone-outzone=5': error returned 1
    2022-06-03 08:27:35Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --protonum=50': error returned 1
    2022-06-03 08:27:35Z 27[APP] [COP-UPDOWN][DB] (db_conn_info) hostname: 'tunnelname' result --> id: '1', mode: 'ntn', tunnel_type: '0', subnet_family:'0'
    2022-06-03 08:27:35Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) !!SKIP!! IPsec IKE for remotes (XGS-FW-WAN-NAT-IP to SG-FW-WAN-IP) already set up
    2022-06-03 08:27:35Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) ---- exec subnet updown -- down --
    2022-06-03 08:27:35Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) [NTN] NTN get actual...
    2022-06-03 08:27:35Z 27[APP] [COP-UPDOWN][DB] (db_query) No data retrieved from query: 'SELECT ( nath.netid  || '/'  || nath.netmask ) AS natedlan FROM   tblvpnconnhostrel AS rel    JOIN tblhost AS h  ON h.hostid = rel.hostid    JOIN tblhost AS nath  ON rel .natedhost = nath.hostid WHERE  rel.connectionid = $1    AND rel.hostlocation = 'L'    AND h.netid = $2    AND h.netmask = $3 LIMIT  1;' status: 2 rows: 0
    2022-06-03 08:27:35Z 27[APP]  
    2022-06-03 08:27:35Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) [IPSEC0] using ipsec dummy interface 'ipsec0'
    2022-06-03 08:27:35Z 27[APP] [COP-UPDOWN][NET] (get_src_ip) source address for xxx.xxx.xxx.xxx is IP: XGS-FW-WAN-NAT-IP 
    2022-06-03 08:27:35Z 27[APP] 
    2022-06-03 08:27:35Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route del xxx.xxx.xxx.xxx/32 dev ipsec0 src XGS-FW-WAN-NAT-IP table 220': error returned 2
    2022-06-03 08:27:35Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:35Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:35Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:35Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:35Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:35Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:35Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route flush cache': success 0
    2022-06-03 08:27:35Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route flush cache': success 0
    2022-06-03 08:27:35Z 20[IKE] <tunnelname-1|59> sending retransmit 1 of request message ID 0, seq 1
    2022-06-03 08:27:35Z 20[NET] <tunnelname-1|59> sending packet: from XGS-FW-WAN-NAT-IP[500] to SG-FW-WAN-IP[500] (260 bytes)
    2022-06-03 08:27:35Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) '/bin/service fwm:vpn_connection_chains -t json -s nosync -b '{"me":"XGS-FW-WAN-NAT-IP","peer":"SG-FW-WAN-IP","mynet":"xxx.xxx.xxx.xxx/26","peernet":"xxx.xxx.xxx.xxx/32","connop":"0","iface":"unknown","myproto":"0","myport":"0","peerproto":"0","peerport":"0","conntype":"ntn","actnet":"","compress":"0","conn_id":"1"}'': success 0
    2022-06-03 08:27:35Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --not-protonum=6 --inzone-outzone=2': error returned 1
    2022-06-03 08:27:35Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --not-protonum=6 --inzone-outzone=5': error returned 1
    2022-06-03 08:27:35Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --protonum=50': error returned 1
    2022-06-03 08:27:35Z 27[APP] [COP-UPDOWN][DB] (db_conn_info) hostname: 'tunnelname' result --> id: '1', mode: 'ntn', tunnel_type: '0', subnet_family:'0'
    2022-06-03 08:27:35Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) !!SKIP!! IPsec IKE for remotes (XGS-FW-WAN-NAT-IP to SG-FW-WAN-IP) already set up
    2022-06-03 08:27:35Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) ---- exec subnet updown -- down --
    2022-06-03 08:27:35Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) [NTN] NTN get actual...
    2022-06-03 08:27:35Z 27[APP] [COP-UPDOWN][DB] (db_query) No data retrieved from query: 'SELECT ( nath.netid  || '/'  || nath.netmask ) AS natedlan FROM   tblvpnconnhostrel AS rel    JOIN tblhost AS h  ON h.hostid = rel.hostid    JOIN tblhost AS nath  ON rel .natedhost = nath.hostid WHERE  rel.connectionid = $1    AND rel.hostlocation = 'L'    AND h.netid = $2    AND h.netmask = $3 LIMIT  1;' status: 2 rows: 0
    2022-06-03 08:27:35Z 27[APP]  
    2022-06-03 08:27:35Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) [IPSEC0] using ipsec dummy interface 'ipsec0'
    2022-06-03 08:27:35Z 27[APP] [COP-UPDOWN][NET] (get_src_ip) source address for xxx.xxx.xxx.xxx is IP: XGS-FW-WAN-NAT-IP 
    2022-06-03 08:27:35Z 27[APP] 
    2022-06-03 08:27:35Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route del xxx.xxx.xxx.xxx/32 dev ipsec0 src XGS-FW-WAN-NAT-IP table 220': error returned 2
    2022-06-03 08:27:35Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:35Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:35Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:35Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:35Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:35Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:35Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route flush cache': success 0
    2022-06-03 08:27:35Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route flush cache': success 0
    2022-06-03 08:27:35Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) '/bin/service fwm:vpn_connection_chains -t json -s nosync -b '{"me":"XGS-FW-WAN-NAT-IP","peer":"SG-FW-WAN-IP","mynet":"xxx.xxx.xxx.xxx/24","peernet":"xxx.xxx.xxx.xxx/32","connop":"0","iface":"unknown","myproto":"0","myport":"0","peerproto":"0","peerport":"0","conntype":"ntn","actnet":"","compress":"0","conn_id":"1"}'': success 0
    2022-06-03 08:27:35Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --not-protonum=6 --inzone-outzone=2': error returned 1
    2022-06-03 08:27:36Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --not-protonum=6 --inzone-outzone=5': error returned 1
    2022-06-03 08:27:36Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --protonum=50': error returned 1
    2022-06-03 08:27:36Z 27[APP] [COP-UPDOWN][DB] (db_conn_info) hostname: 'tunnelname' result --> id: '1', mode: 'ntn', tunnel_type: '0', subnet_family:'0'
    2022-06-03 08:27:36Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) !!SKIP!! IPsec IKE for remotes (XGS-FW-WAN-NAT-IP to SG-FW-WAN-IP) already set up
    2022-06-03 08:27:36Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) ---- exec subnet updown -- down --
    2022-06-03 08:27:36Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) [NTN] NTN get actual...
    2022-06-03 08:27:36Z 27[APP] [COP-UPDOWN][DB] (db_query) No data retrieved from query: 'SELECT ( nath.netid  || '/'  || nath.netmask ) AS natedlan FROM   tblvpnconnhostrel AS rel    JOIN tblhost AS h  ON h.hostid = rel.hostid    JOIN tblhost AS nath  ON rel .natedhost = nath.hostid WHERE  rel.connectionid = $1    AND rel.hostlocation = 'L'    AND h.netid = $2    AND h.netmask = $3 LIMIT  1;' status: 2 rows: 0
    2022-06-03 08:27:36Z 27[APP]  
    2022-06-03 08:27:36Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) [IPSEC0] using ipsec dummy interface 'ipsec0'
    2022-06-03 08:27:36Z 27[APP] [COP-UPDOWN][NET] (get_src_ip) source address for xxx.xxx.xxx.xxx is IP: XGS-FW-WAN-NAT-IP 
    2022-06-03 08:27:36Z 27[APP] 
    2022-06-03 08:27:36Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route del xxx.xxx.xxx.xxx/32 dev ipsec0 src XGS-FW-WAN-NAT-IP table 220': success 0
    2022-06-03 08:27:36Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:36Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:36Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:36Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:36Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:36Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:36Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route flush cache': success 0
    2022-06-03 08:27:36Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route flush cache': success 0
    2022-06-03 08:27:36Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) '/bin/service fwm:vpn_connection_chains -t json -s nosync -b '{"me":"XGS-FW-WAN-NAT-IP","peer":"SG-FW-WAN-IP","mynet":"xxx.xxx.xxx.xxx/26","peernet":"xxx.xxx.xxx.xxx/32","connop":"0","iface":"unknown","myproto":"0","myport":"0","peerproto":"0","peerport":"0","conntype":"ntn","actnet":"","compress":"0","conn_id":"1"}'': success 0
    2022-06-03 08:27:36Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --not-protonum=6 --inzone-outzone=2': error returned 1
    2022-06-03 08:27:36Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --not-protonum=6 --inzone-outzone=5': error returned 1
    2022-06-03 08:27:36Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --protonum=50': error returned 1
    2022-06-03 08:27:36Z 27[APP] [COP-UPDOWN][DB] (db_conn_info) hostname: 'tunnelname' result --> id: '1', mode: 'ntn', tunnel_type: '0', subnet_family:'0'
    2022-06-03 08:27:36Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) !!SKIP!! IPsec IKE for remotes (XGS-FW-WAN-NAT-IP to SG-FW-WAN-IP) already set up
    2022-06-03 08:27:36Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) ---- exec subnet updown -- down --
    2022-06-03 08:27:36Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) [NTN] NTN get actual...
    2022-06-03 08:27:36Z 27[APP] [COP-UPDOWN][DB] (db_query) No data retrieved from query: 'SELECT ( nath.netid  || '/'  || nath.netmask ) AS natedlan FROM   tblvpnconnhostrel AS rel    JOIN tblhost AS h  ON h.hostid = rel.hostid    JOIN tblhost AS nath  ON rel .natedhost = nath.hostid WHERE  rel.connectionid = $1    AND rel.hostlocation = 'L'    AND h.netid = $2    AND h.netmask = $3 LIMIT  1;' status: 2 rows: 0
    2022-06-03 08:27:36Z 27[APP]  
    2022-06-03 08:27:36Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) [IPSEC0] using ipsec dummy interface 'ipsec0'
    2022-06-03 08:27:36Z 27[APP] [COP-UPDOWN][NET] (get_src_ip) source address for XGS-FW-LAN-IP28 is IP: XGS-FW-WAN-NAT-IP 
    2022-06-03 08:27:36Z 27[APP] 
    2022-06-03 08:27:36Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route del xxx.xxx.xxx.xxx/32 dev ipsec0 src XGS-FW-WAN-NAT-IP table 220': error returned 2
    2022-06-03 08:27:36Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:36Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:36Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:36Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:36Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:36Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:36Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route flush cache': success 0
    2022-06-03 08:27:36Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route flush cache': success 0
    2022-06-03 08:27:36Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) '/bin/service fwm:vpn_connection_chains -t json -s nosync -b '{"me":"XGS-FW-WAN-NAT-IP","peer":"SG-FW-WAN-IP","mynet":"XGS-FW-LAN-IP28/25","peernet":"xxx.xxx.xxx.xxx/32","connop":"0","iface":"unknown","myproto":"0","myport":"0","peerproto":"0","peerport":"0","conntype":"ntn","actnet":"","compress":"0","conn_id":"1"}'': success 0
    2022-06-03 08:27:36Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --not-protonum=6 --inzone-outzone=2': error returned 1
    2022-06-03 08:27:36Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --not-protonum=6 --inzone-outzone=5': error returned 1
    2022-06-03 08:27:36Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --protonum=50': error returned 1
    2022-06-03 08:27:36Z 27[APP] [COP-UPDOWN][DB] (db_conn_info) hostname: 'tunnelname' result --> id: '1', mode: 'ntn', tunnel_type: '0', subnet_family:'0'
    2022-06-03 08:27:36Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) !!SKIP!! IPsec IKE for remotes (XGS-FW-WAN-NAT-IP to SG-FW-WAN-IP) already set up
    2022-06-03 08:27:36Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) ---- exec subnet updown -- down --
    2022-06-03 08:27:36Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) [NTN] NTN get actual...
    2022-06-03 08:27:36Z 27[APP] [COP-UPDOWN][DB] (db_query) No data retrieved from query: 'SELECT ( nath.netid  || '/'  || nath.netmask ) AS natedlan FROM   tblvpnconnhostrel AS rel    JOIN tblhost AS h  ON h.hostid = rel.hostid    JOIN tblhost AS nath  ON rel .natedhost = nath.hostid WHERE  rel.connectionid = $1    AND rel.hostlocation = 'L'    AND h.netid = $2    AND h.netmask = $3 LIMIT  1;' status: 2 rows: 0
    2022-06-03 08:27:36Z 27[APP]  
    2022-06-03 08:27:36Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) [IPSEC0] using ipsec dummy interface 'ipsec0'
    2022-06-03 08:27:36Z 27[APP] [COP-UPDOWN][NET] (get_src_ip) source address for xxx.xxx.xxx.xxx is IP: XGS-FW-WAN-NAT-IP 
    2022-06-03 08:27:36Z 27[APP] 
    2022-06-03 08:27:36Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route del xxx.xxx.xxx.xxx/32 dev ipsec0 src XGS-FW-WAN-NAT-IP table 220': error returned 2
    2022-06-03 08:27:36Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:36Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:36Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:36Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:36Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:36Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:36Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route flush cache': success 0
    2022-06-03 08:27:36Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route flush cache': success 0
    2022-06-03 08:27:36Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) '/bin/service fwm:vpn_connection_chains -t json -s nosync -b '{"me":"XGS-FW-WAN-NAT-IP","peer":"SG-FW-WAN-IP","mynet":"xxx.xxx.xxx.xxx/25","peernet":"xxx.xxx.xxx.xxx/32","connop":"0","iface":"unknown","myproto":"0","myport":"0","peerproto":"0","peerport":"0","conntype":"ntn","actnet":"","compress":"0","conn_id":"1"}'': success 0
    2022-06-03 08:27:36Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --not-protonum=6 --inzone-outzone=2': error returned 1
    2022-06-03 08:27:36Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --not-protonum=6 --inzone-outzone=5': error returned 1
    2022-06-03 08:27:36Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --protonum=50': error returned 1
    2022-06-03 08:27:36Z 27[APP] [COP-UPDOWN][DB] (db_conn_info) hostname: 'tunnelname' result --> id: '1', mode: 'ntn', tunnel_type: '0', subnet_family:'0'
    2022-06-03 08:27:36Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) !!SKIP!! IPsec IKE for remotes (XGS-FW-WAN-NAT-IP to SG-FW-WAN-IP) already set up
    2022-06-03 08:27:36Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) ---- exec subnet updown -- down --
    2022-06-03 08:27:36Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) [NTN] NTN get actual...
    2022-06-03 08:27:36Z 27[APP] [COP-UPDOWN][DB] (db_query) No data retrieved from query: 'SELECT ( nath.netid  || '/'  || nath.netmask ) AS natedlan FROM   tblvpnconnhostrel AS rel    JOIN tblhost AS h  ON h.hostid = rel.hostid    JOIN tblhost AS nath  ON rel .natedhost = nath.hostid WHERE  rel.connectionid = $1    AND rel.hostlocation = 'L'    AND h.netid = $2    AND h.netmask = $3 LIMIT  1;' status: 2 rows: 0
    2022-06-03 08:27:36Z 27[APP]  
    2022-06-03 08:27:36Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) [IPSEC0] using ipsec dummy interface 'ipsec0'
    2022-06-03 08:27:36Z 27[APP] [COP-UPDOWN][NET] (get_src_ip) source address for XGS-FW-LAN-IP28 is IP: XGS-FW-WAN-NAT-IP 
    2022-06-03 08:27:36Z 27[APP] 
    2022-06-03 08:27:36Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route del xxx.xxx.xxx.xxx/32 dev ipsec0 src XGS-FW-WAN-NAT-IP table 220': error returned 2
    2022-06-03 08:27:36Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:36Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:36Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:36Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:36Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:36Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:36Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route flush cache': success 0
    2022-06-03 08:27:36Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route flush cache': success 0
    2022-06-03 08:27:36Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) '/bin/service fwm:vpn_connection_chains -t json -s nosync -b '{"me":"XGS-FW-WAN-NAT-IP","peer":"SG-FW-WAN-IP","mynet":"XGS-FW-LAN-IP28/25","peernet":"xxx.xxx.xxx.xxx/32","connop":"0","iface":"unknown","myproto":"0","myport":"0","peerproto":"0","peerport":"0","conntype":"ntn","actnet":"","compress":"0","conn_id":"1"}'': success 0
    2022-06-03 08:27:36Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --not-protonum=6 --inzone-outzone=2': error returned 1
    2022-06-03 08:27:36Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --not-protonum=6 --inzone-outzone=5': error returned 1
    2022-06-03 08:27:36Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --protonum=50': error returned 1
    2022-06-03 08:27:36Z 27[APP] [COP-UPDOWN][DB] (db_conn_info) hostname: 'tunnelname' result --> id: '1', mode: 'ntn', tunnel_type: '0', subnet_family:'0'
    2022-06-03 08:27:36Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) !!SKIP!! IPsec IKE for remotes (XGS-FW-WAN-NAT-IP to SG-FW-WAN-IP) already set up
    2022-06-03 08:27:36Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) ---- exec subnet updown -- down --
    2022-06-03 08:27:36Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) [NTN] NTN get actual...
    2022-06-03 08:27:36Z 27[APP] [COP-UPDOWN][DB] (db_query) No data retrieved from query: 'SELECT ( nath.netid  || '/'  || nath.netmask ) AS natedlan FROM   tblvpnconnhostrel AS rel    JOIN tblhost AS h  ON h.hostid = rel.hostid    JOIN tblhost AS nath  ON rel .natedhost = nath.hostid WHERE  rel.connectionid = $1    AND rel.hostlocation = 'L'    AND h.netid = $2    AND h.netmask = $3 LIMIT  1;' status: 2 rows: 0
    2022-06-03 08:27:36Z 27[APP]  
    2022-06-03 08:27:36Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) [IPSEC0] using ipsec dummy interface 'ipsec0'
    2022-06-03 08:27:36Z 27[APP] [COP-UPDOWN][NET] (get_src_ip) source address for xxx.xxx.xxx.xxx is IP: XGS-FW-WAN-NAT-IP 
    2022-06-03 08:27:36Z 27[APP] 
    2022-06-03 08:27:36Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route del xxx.xxx.xxx.xxx/32 dev ipsec0 src XGS-FW-WAN-NAT-IP table 220': error returned 2
    2022-06-03 08:27:36Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:36Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:36Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:36Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:36Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:36Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:36Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route flush cache': success 0
    2022-06-03 08:27:36Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route flush cache': success 0
    2022-06-03 08:27:36Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) '/bin/service fwm:vpn_connection_chains -t json -s nosync -b '{"me":"XGS-FW-WAN-NAT-IP","peer":"SG-FW-WAN-IP","mynet":"xxx.xxx.xxx.xxx/24","peernet":"xxx.xxx.xxx.xxx/32","connop":"0","iface":"unknown","myproto":"0","myport":"0","peerproto":"0","peerport":"0","conntype":"ntn","actnet":"","compress":"0","conn_id":"1"}'': success 0
    2022-06-03 08:27:36Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --not-protonum=6 --inzone-outzone=2': error returned 1
    2022-06-03 08:27:36Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --not-protonum=6 --inzone-outzone=5': error returned 1
    2022-06-03 08:27:36Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --protonum=50': error returned 1
    2022-06-03 08:27:36Z 27[APP] [COP-UPDOWN][DB] (db_conn_info) hostname: 'tunnelname' result --> id: '1', mode: 'ntn', tunnel_type: '0', subnet_family:'0'
    2022-06-03 08:27:36Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) !!SKIP!! IPsec IKE for remotes (XGS-FW-WAN-NAT-IP to SG-FW-WAN-IP) already set up
    2022-06-03 08:27:36Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) ---- exec subnet updown -- down --
    2022-06-03 08:27:36Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) [NTN] NTN get actual...
    2022-06-03 08:27:36Z 27[APP] [COP-UPDOWN][DB] (db_query) No data retrieved from query: 'SELECT ( nath.netid  || '/'  || nath.netmask ) AS natedlan FROM   tblvpnconnhostrel AS rel    JOIN tblhost AS h  ON h.hostid = rel.hostid    JOIN tblhost AS nath  ON rel .natedhost = nath.hostid WHERE  rel.connectionid = $1    AND rel.hostlocation = 'L'    AND h.netid = $2    AND h.netmask = $3 LIMIT  1;' status: 2 rows: 0
    2022-06-03 08:27:36Z 27[APP]  
    2022-06-03 08:27:36Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) [IPSEC0] using ipsec dummy interface 'ipsec0'
    2022-06-03 08:27:36Z 27[APP] [COP-UPDOWN][NET] (get_src_ip) source address for XGS-FW-LAN-IP28 is IP: XGS-FW-WAN-NAT-IP 
    2022-06-03 08:27:36Z 27[APP] 
    2022-06-03 08:27:36Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route del xxx.xxx.xxx.xxx/24 dev ipsec0 src XGS-FW-WAN-NAT-IP table 220': error returned 2
    2022-06-03 08:27:36Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:36Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:36Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:36Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:36Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:36Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:36Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route flush cache': success 0
    2022-06-03 08:27:36Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route flush cache': success 0
    2022-06-03 08:27:37Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) '/bin/service fwm:vpn_connection_chains -t json -s nosync -b '{"me":"XGS-FW-WAN-NAT-IP","peer":"SG-FW-WAN-IP","mynet":"XGS-FW-LAN-IP28/25","peernet":"xxx.xxx.xxx.xxx/24","connop":"0","iface":"unknown","myproto":"0","myport":"0","peerproto":"0","peerport":"0","conntype":"ntn","actnet":"","compress":"0","conn_id":"1"}'': success 0
    2022-06-03 08:27:37Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --not-protonum=6 --inzone-outzone=2': error returned 1
    2022-06-03 08:27:37Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --not-protonum=6 --inzone-outzone=5': error returned 1
    2022-06-03 08:27:37Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --protonum=50': error returned 1
    2022-06-03 08:27:37Z 27[APP] [COP-UPDOWN][DB] (db_conn_info) hostname: 'tunnelname' result --> id: '1', mode: 'ntn', tunnel_type: '0', subnet_family:'0'
    2022-06-03 08:27:37Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) !!SKIP!! IPsec IKE for remotes (XGS-FW-WAN-NAT-IP to SG-FW-WAN-IP) already set up
    2022-06-03 08:27:37Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) ---- exec subnet updown -- down --
    2022-06-03 08:27:37Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) [NTN] NTN get actual...
    2022-06-03 08:27:37Z 27[APP] [COP-UPDOWN][DB] (db_query) No data retrieved from query: 'SELECT ( nath.netid  || '/'  || nath.netmask ) AS natedlan FROM   tblvpnconnhostrel AS rel    JOIN tblhost AS h  ON h.hostid = rel.hostid    JOIN tblhost AS nath  ON rel .natedhost = nath.hostid WHERE  rel.connectionid = $1    AND rel.hostlocation = 'L'    AND h.netid = $2    AND h.netmask = $3 LIMIT  1;' status: 2 rows: 0
    2022-06-03 08:27:37Z 27[APP]  
    2022-06-03 08:27:37Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) [IPSEC0] using ipsec dummy interface 'ipsec0'
    2022-06-03 08:27:37Z 27[APP] [COP-UPDOWN][NET] (get_src_ip) source address for xxx.xxx.xxx.xxx is IP: XGS-FW-WAN-NAT-IP 
    2022-06-03 08:27:37Z 27[APP] 
    2022-06-03 08:27:37Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route del xxx.xxx.xxx.xxx/32 dev ipsec0 src XGS-FW-WAN-NAT-IP table 220': error returned 2
    2022-06-03 08:27:37Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:37Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:37Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:37Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:37Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:37Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:37Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route flush cache': success 0
    2022-06-03 08:27:37Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route flush cache': success 0
    2022-06-03 08:27:37Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) '/bin/service fwm:vpn_connection_chains -t json -s nosync -b '{"me":"XGS-FW-WAN-NAT-IP","peer":"SG-FW-WAN-IP","mynet":"xxx.xxx.xxx.xxx/26","peernet":"xxx.xxx.xxx.xxx/32","connop":"0","iface":"unknown","myproto":"0","myport":"0","peerproto":"0","peerport":"0","conntype":"ntn","actnet":"","compress":"0","conn_id":"1"}'': success 0
    2022-06-03 08:27:37Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --not-protonum=6 --inzone-outzone=2': error returned 1
    2022-06-03 08:27:37Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --not-protonum=6 --inzone-outzone=5': error returned 1
    2022-06-03 08:27:37Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --protonum=50': error returned 1
    2022-06-03 08:27:37Z 27[APP] [COP-UPDOWN][DB] (db_conn_info) hostname: 'tunnelname' result --> id: '1', mode: 'ntn', tunnel_type: '0', subnet_family:'0'
    2022-06-03 08:27:37Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) !!SKIP!! IPsec IKE for remotes (XGS-FW-WAN-NAT-IP to SG-FW-WAN-IP) already set up
    2022-06-03 08:27:37Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) ---- exec subnet updown -- down --
    2022-06-03 08:27:37Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) [NTN] NTN get actual...
    2022-06-03 08:27:37Z 27[APP] [COP-UPDOWN][DB] (db_query) No data retrieved from query: 'SELECT ( nath.netid  || '/'  || nath.netmask ) AS natedlan FROM   tblvpnconnhostrel AS rel    JOIN tblhost AS h  ON h.hostid = rel.hostid    JOIN tblhost AS nath  ON rel .natedhost = nath.hostid WHERE  rel.connectionid = $1    AND rel.hostlocation = 'L'    AND h.netid = $2    AND h.netmask = $3 LIMIT  1;' status: 2 rows: 0
    2022-06-03 08:27:37Z 27[APP]  
    2022-06-03 08:27:37Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) [IPSEC0] using ipsec dummy interface 'ipsec0'
    2022-06-03 08:27:37Z 27[APP] [COP-UPDOWN][NET] (get_src_ip) source address for xxx.xxx.xxx.xxx is IP: XGS-FW-WAN-NAT-IP 
    2022-06-03 08:27:37Z 27[APP] 
    2022-06-03 08:27:37Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route del xxx.xxx.xxx.xxx/32 dev ipsec0 src XGS-FW-WAN-NAT-IP table 220': error returned 2
    2022-06-03 08:27:37Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:37Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:37Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:37Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:37Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:37Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:37Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route flush cache': success 0
    2022-06-03 08:27:37Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route flush cache': success 0
    2022-06-03 08:27:37Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) '/bin/service fwm:vpn_connection_chains -t json -s nosync -b '{"me":"XGS-FW-WAN-NAT-IP","peer":"SG-FW-WAN-IP","mynet":"xxx.xxx.xxx.xxx/27","peernet":"xxx.xxx.xxx.xxx/32","connop":"0","iface":"unknown","myproto":"0","myport":"0","peerproto":"0","peerport":"0","conntype":"ntn","actnet":"","compress":"0","conn_id":"1"}'': success 0
    2022-06-03 08:27:37Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --not-protonum=6 --inzone-outzone=2': error returned 1
    2022-06-03 08:27:37Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --not-protonum=6 --inzone-outzone=5': error returned 1
    2022-06-03 08:27:37Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --protonum=50': error returned 1
    2022-06-03 08:27:37Z 27[APP] [COP-UPDOWN][DB] (db_conn_info) hostname: 'tunnelname' result --> id: '1', mode: 'ntn', tunnel_type: '0', subnet_family:'0'
    2022-06-03 08:27:37Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) !!SKIP!! IPsec IKE for remotes (XGS-FW-WAN-NAT-IP to SG-FW-WAN-IP) already set up
    2022-06-03 08:27:37Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) ---- exec subnet updown -- down --
    2022-06-03 08:27:37Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) [NTN] NTN get actual...
    2022-06-03 08:27:37Z 27[APP] [COP-UPDOWN][DB] (db_query) No data retrieved from query: 'SELECT ( nath.netid  || '/'  || nath.netmask ) AS natedlan FROM   tblvpnconnhostrel AS rel    JOIN tblhost AS h  ON h.hostid = rel.hostid    JOIN tblhost AS nath  ON rel .natedhost = nath.hostid WHERE  rel.connectionid = $1    AND rel.hostlocation = 'L'    AND h.netid = $2    AND h.netmask = $3 LIMIT  1;' status: 2 rows: 0
    2022-06-03 08:27:37Z 27[APP]  
    2022-06-03 08:27:37Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) [IPSEC0] using ipsec dummy interface 'ipsec0'
    2022-06-03 08:27:37Z 27[APP] [COP-UPDOWN][NET] (get_src_ip) source address for XGS-FW-LAN-IP28 is IP: XGS-FW-WAN-NAT-IP 
    2022-06-03 08:27:37Z 27[APP] 
    2022-06-03 08:27:37Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route del xxx.xxx.xxx.xxx/32 dev ipsec0 src XGS-FW-WAN-NAT-IP table 220': error returned 2
    2022-06-03 08:27:37Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:37Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:37Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:37Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:37Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:37Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:37Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route flush cache': success 0
    2022-06-03 08:27:37Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route flush cache': success 0
    2022-06-03 08:27:37Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) '/bin/service fwm:vpn_connection_chains -t json -s nosync -b '{"me":"XGS-FW-WAN-NAT-IP","peer":"SG-FW-WAN-IP","mynet":"XGS-FW-LAN-IP28/25","peernet":"xxx.xxx.xxx.xxx/32","connop":"0","iface":"unknown","myproto":"0","myport":"0","peerproto":"0","peerport":"0","conntype":"ntn","actnet":"","compress":"0","conn_id":"1"}'': success 0
    2022-06-03 08:27:37Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --not-protonum=6 --inzone-outzone=2': error returned 1
    2022-06-03 08:27:37Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --not-protonum=6 --inzone-outzone=5': error returned 1
    2022-06-03 08:27:37Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --protonum=50': error returned 1
    2022-06-03 08:27:37Z 27[APP] [COP-UPDOWN][DB] (db_conn_info) hostname: 'tunnelname' result --> id: '1', mode: 'ntn', tunnel_type: '0', subnet_family:'0'
    2022-06-03 08:27:37Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) !!SKIP!! IPsec IKE for remotes (XGS-FW-WAN-NAT-IP to SG-FW-WAN-IP) already set up
    2022-06-03 08:27:37Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) ---- exec subnet updown -- down --
    2022-06-03 08:27:37Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) [NTN] NTN get actual...
    2022-06-03 08:27:37Z 27[APP] [COP-UPDOWN][DB] (db_query) No data retrieved from query: 'SELECT ( nath.netid  || '/'  || nath.netmask ) AS natedlan FROM   tblvpnconnhostrel AS rel    JOIN tblhost AS h  ON h.hostid = rel.hostid    JOIN tblhost AS nath  ON rel .natedhost = nath.hostid WHERE  rel.connectionid = $1    AND rel.hostlocation = 'L'    AND h.netid = $2    AND h.netmask = $3 LIMIT  1;' status: 2 rows: 0
    2022-06-03 08:27:37Z 27[APP]  
    2022-06-03 08:27:37Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) [IPSEC0] using ipsec dummy interface 'ipsec0'
    2022-06-03 08:27:37Z 27[APP] [COP-UPDOWN][NET] (get_src_ip) source address for xxx.xxx.xxx.xxx is IP: XGS-FW-WAN-NAT-IP 
    2022-06-03 08:27:37Z 27[APP] 
    2022-06-03 08:27:37Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route del xxx.xxx.xxx.xxx/32 dev ipsec0 src XGS-FW-WAN-NAT-IP table 220': error returned 2
    2022-06-03 08:27:37Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:37Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:37Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:37Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:37Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:37Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:37Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route flush cache': success 0
    2022-06-03 08:27:37Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route flush cache': success 0
    2022-06-03 08:27:37Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) '/bin/service fwm:vpn_connection_chains -t json -s nosync -b '{"me":"XGS-FW-WAN-NAT-IP","peer":"SG-FW-WAN-IP","mynet":"xxx.xxx.xxx.xxx/27","peernet":"xxx.xxx.xxx.xxx/32","connop":"0","iface":"unknown","myproto":"0","myport":"0","peerproto":"0","peerport":"0","conntype":"ntn","actnet":"","compress":"0","conn_id":"1"}'': success 0
    2022-06-03 08:27:37Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --not-protonum=6 --inzone-outzone=2': error returned 1
    2022-06-03 08:27:37Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --not-protonum=6 --inzone-outzone=5': error returned 1
    2022-06-03 08:27:37Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --protonum=50': error returned 1
    2022-06-03 08:27:37Z 27[APP] [COP-UPDOWN][DB] (db_conn_info) hostname: 'tunnelname' result --> id: '1', mode: 'ntn', tunnel_type: '0', subnet_family:'0'
    2022-06-03 08:27:37Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) !!SKIP!! IPsec IKE for remotes (XGS-FW-WAN-NAT-IP to SG-FW-WAN-IP) already set up
    2022-06-03 08:27:37Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) ---- exec subnet updown -- down --
    2022-06-03 08:27:37Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) [NTN] NTN get actual...
    2022-06-03 08:27:37Z 27[APP] [COP-UPDOWN][DB] (db_query) No data retrieved from query: 'SELECT ( nath.netid  || '/'  || nath.netmask ) AS natedlan FROM   tblvpnconnhostrel AS rel    JOIN tblhost AS h  ON h.hostid = rel.hostid    JOIN tblhost AS nath  ON rel .natedhost = nath.hostid WHERE  rel.connectionid = $1    AND rel.hostlocation = 'L'    AND h.netid = $2    AND h.netmask = $3 LIMIT  1;' status: 2 rows: 0
    2022-06-03 08:27:37Z 27[APP]  
    2022-06-03 08:27:37Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) [IPSEC0] using ipsec dummy interface 'ipsec0'
    2022-06-03 08:27:37Z 27[APP] [COP-UPDOWN][NET] (get_src_ip) source address for xxx.xxx.xxx.xxx is IP: XGS-FW-WAN-NAT-IP 
    2022-06-03 08:27:37Z 27[APP] 
    2022-06-03 08:27:37Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route del xxx.xxx.xxx.xxx/32 dev ipsec0 src XGS-FW-WAN-NAT-IP table 220': error returned 2
    2022-06-03 08:27:37Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:37Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:37Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:37Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:37Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:37Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:37Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route flush cache': success 0
    2022-06-03 08:27:37Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route flush cache': success 0
    2022-06-03 08:27:37Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) '/bin/service fwm:vpn_connection_chains -t json -s nosync -b '{"me":"XGS-FW-WAN-NAT-IP","peer":"SG-FW-WAN-IP","mynet":"xxx.xxx.xxx.xxx/25","peernet":"xxx.xxx.xxx.xxx/32","connop":"0","iface":"unknown","myproto":"0","myport":"0","peerproto":"0","peerport":"0","conntype":"ntn","actnet":"","compress":"0","conn_id":"1"}'': success 0
    2022-06-03 08:27:37Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --not-protonum=6 --inzone-outzone=2': error returned 1
    2022-06-03 08:27:37Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --not-protonum=6 --inzone-outzone=5': error returned 1
    2022-06-03 08:27:37Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --protonum=50': error returned 1
    2022-06-03 08:27:37Z 27[APP] [COP-UPDOWN][DB] (db_conn_info) hostname: 'tunnelname' result --> id: '1', mode: 'ntn', tunnel_type: '0', subnet_family:'0'
    2022-06-03 08:27:37Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) !!SKIP!! IPsec IKE for remotes (XGS-FW-WAN-NAT-IP to SG-FW-WAN-IP) already set up
    2022-06-03 08:27:37Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) ---- exec subnet updown -- down --
    2022-06-03 08:27:37Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) [NTN] NTN get actual...
    2022-06-03 08:27:37Z 27[APP] [COP-UPDOWN][DB] (db_query) No data retrieved from query: 'SELECT ( nath.netid  || '/'  || nath.netmask ) AS natedlan FROM   tblvpnconnhostrel AS rel    JOIN tblhost AS h  ON h.hostid = rel.hostid    JOIN tblhost AS nath  ON rel .natedhost = nath.hostid WHERE  rel.connectionid = $1    AND rel.hostlocation = 'L'    AND h.netid = $2    AND h.netmask = $3 LIMIT  1;' status: 2 rows: 0
    2022-06-03 08:27:37Z 27[APP]  
    2022-06-03 08:27:37Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) [IPSEC0] using ipsec dummy interface 'ipsec0'
    2022-06-03 08:27:37Z 27[APP] [COP-UPDOWN][NET] (get_src_ip) source address for XGS-FW-LAN-NET is IP: XGS-FW-LAN-IP 
    2022-06-03 08:27:37Z 27[APP] 
    2022-06-03 08:27:37Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route del xxx.xxx.xxx.xxx/32 dev ipsec0 src XGS-FW-LAN-IP table 220': error returned 2
    2022-06-03 08:27:37Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:37Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:37Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:37Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:37Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:37Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:37Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route flush cache': success 0
    2022-06-03 08:27:37Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route flush cache': success 0
    2022-06-03 08:27:38Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) '/bin/service fwm:vpn_connection_chains -t json -s nosync -b '{"me":"XGS-FW-WAN-NAT-IP","peer":"SG-FW-WAN-IP","mynet":"xxx.xxx.xxx.xxx/25","peernet":"xxx.xxx.xxx.xxx/32","connop":"0","iface":"unknown","myproto":"0","myport":"0","peerproto":"0","peerport":"0","conntype":"ntn","actnet":"","compress":"0","conn_id":"1"}'': success 0
    2022-06-03 08:27:38Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --not-protonum=6 --inzone-outzone=2': error returned 1
    2022-06-03 08:27:38Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --not-protonum=6 --inzone-outzone=5': error returned 1
    2022-06-03 08:27:38Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --protonum=50': error returned 1
    2022-06-03 08:27:38Z 27[APP] [COP-UPDOWN][DB] (db_conn_info) hostname: 'tunnelname' result --> id: '1', mode: 'ntn', tunnel_type: '0', subnet_family:'0'
    2022-06-03 08:27:38Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) !!SKIP!! IPsec IKE for remotes (XGS-FW-WAN-NAT-IP to SG-FW-WAN-IP) already set up
    2022-06-03 08:27:38Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) ---- exec subnet updown -- down --
    2022-06-03 08:27:38Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) [NTN] NTN get actual...
    2022-06-03 08:27:38Z 27[APP] [COP-UPDOWN][DB] (db_query) No data retrieved from query: 'SELECT ( nath.netid  || '/'  || nath.netmask ) AS natedlan FROM   tblvpnconnhostrel AS rel    JOIN tblhost AS h  ON h.hostid = rel.hostid    JOIN tblhost AS nath  ON rel .natedhost = nath.hostid WHERE  rel.connectionid = $1    AND rel.hostlocation = 'L'    AND h.netid = $2    AND h.netmask = $3 LIMIT  1;' status: 2 rows: 0
    2022-06-03 08:27:38Z 27[APP]  
    2022-06-03 08:27:38Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) [IPSEC0] using ipsec dummy interface 'ipsec0'
    2022-06-03 08:27:38Z 27[APP] [COP-UPDOWN][NET] (get_src_ip) source address for xxx.xxx.xxx.xxx is IP: XGS-FW-WAN-NAT-IP 
    2022-06-03 08:27:38Z 27[APP] 
    2022-06-03 08:27:38Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route del xxx.xxx.xxx.xxx/32 dev ipsec0 src XGS-FW-WAN-NAT-IP table 220': error returned 2
    2022-06-03 08:27:38Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:38Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:38Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:38Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:38Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:38Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:38Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route flush cache': success 0
    2022-06-03 08:27:38Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route flush cache': success 0
    2022-06-03 08:27:38Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) '/bin/service fwm:vpn_connection_chains -t json -s nosync -b '{"me":"XGS-FW-WAN-NAT-IP","peer":"SG-FW-WAN-IP","mynet":"xxx.xxx.xxx.xxx/24","peernet":"xxx.xxx.xxx.xxx/32","connop":"0","iface":"unknown","myproto":"0","myport":"0","peerproto":"0","peerport":"0","conntype":"ntn","actnet":"","compress":"0","conn_id":"1"}'': success 0
    2022-06-03 08:27:38Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --not-protonum=6 --inzone-outzone=2': error returned 1
    2022-06-03 08:27:38Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --not-protonum=6 --inzone-outzone=5': error returned 1
    2022-06-03 08:27:38Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --protonum=50': error returned 1
    2022-06-03 08:27:38Z 27[APP] [COP-UPDOWN][DB] (db_conn_info) hostname: 'tunnelname' result --> id: '1', mode: 'ntn', tunnel_type: '0', subnet_family:'0'
    2022-06-03 08:27:38Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) !!SKIP!! IPsec IKE for remotes (XGS-FW-WAN-NAT-IP to SG-FW-WAN-IP) already set up
    2022-06-03 08:27:38Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) ---- exec subnet updown -- down --
    2022-06-03 08:27:38Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) [NTN] NTN get actual...
    2022-06-03 08:27:38Z 27[APP] [COP-UPDOWN][DB] (db_query) No data retrieved from query: 'SELECT ( nath.netid  || '/'  || nath.netmask ) AS natedlan FROM   tblvpnconnhostrel AS rel    JOIN tblhost AS h  ON h.hostid = rel.hostid    JOIN tblhost AS nath  ON rel .natedhost = nath.hostid WHERE  rel.connectionid = $1    AND rel.hostlocation = 'L'    AND h.netid = $2    AND h.netmask = $3 LIMIT  1;' status: 2 rows: 0
    2022-06-03 08:27:38Z 27[APP]  
    2022-06-03 08:27:38Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) [IPSEC0] using ipsec dummy interface 'ipsec0'
    2022-06-03 08:27:38Z 27[APP] [COP-UPDOWN][NET] (get_src_ip) source address for XGS-FW-LAN-IP28 is IP: XGS-FW-WAN-NAT-IP 
    2022-06-03 08:27:38Z 27[APP] 
    2022-06-03 08:27:38Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route del xxx.xxx.xxx.xxx/32 dev ipsec0 src XGS-FW-WAN-NAT-IP table 220': error returned 2
    2022-06-03 08:27:38Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:38Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:38Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:38Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:38Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:38Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:38Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route flush cache': success 0
    2022-06-03 08:27:38Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route flush cache': success 0
    2022-06-03 08:27:38Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) '/bin/service fwm:vpn_connection_chains -t json -s nosync -b '{"me":"XGS-FW-WAN-NAT-IP","peer":"SG-FW-WAN-IP","mynet":"XGS-FW-LAN-IP28/25","peernet":"xxx.xxx.xxx.xxx/32","connop":"0","iface":"unknown","myproto":"0","myport":"0","peerproto":"0","peerport":"0","conntype":"ntn","actnet":"","compress":"0","conn_id":"1"}'': success 0
    2022-06-03 08:27:38Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --not-protonum=6 --inzone-outzone=2': error returned 1
    2022-06-03 08:27:38Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --not-protonum=6 --inzone-outzone=5': error returned 1
    2022-06-03 08:27:38Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --protonum=50': error returned 1
    2022-06-03 08:27:38Z 27[APP] [COP-UPDOWN][DB] (db_conn_info) hostname: 'tunnelname' result --> id: '1', mode: 'ntn', tunnel_type: '0', subnet_family:'0'
    2022-06-03 08:27:38Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) !!SKIP!! IPsec IKE for remotes (XGS-FW-WAN-NAT-IP to SG-FW-WAN-IP) already set up
    2022-06-03 08:27:38Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) ---- exec subnet updown -- down --
    2022-06-03 08:27:38Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) [NTN] NTN get actual...
    2022-06-03 08:27:38Z 27[APP] [COP-UPDOWN][DB] (db_query) No data retrieved from query: 'SELECT ( nath.netid  || '/'  || nath.netmask ) AS natedlan FROM   tblvpnconnhostrel AS rel    JOIN tblhost AS h  ON h.hostid = rel.hostid    JOIN tblhost AS nath  ON rel .natedhost = nath.hostid WHERE  rel.connectionid = $1    AND rel.hostlocation = 'L'    AND h.netid = $2    AND h.netmask = $3 LIMIT  1;' status: 2 rows: 0
    2022-06-03 08:27:38Z 27[APP]  
    2022-06-03 08:27:38Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) [IPSEC0] using ipsec dummy interface 'ipsec0'
    2022-06-03 08:27:38Z 27[APP] [COP-UPDOWN][NET] (get_src_ip) source address for XGS-FW-LAN-NET is IP: XGS-FW-LAN-IP 
    2022-06-03 08:27:38Z 27[APP] 
    2022-06-03 08:27:38Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route del xxx.xxx.xxx.xxx/32 dev ipsec0 src XGS-FW-LAN-IP table 220': success 0
    2022-06-03 08:27:38Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:38Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:38Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:38Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:38Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:38Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:38Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route flush cache': success 0
    2022-06-03 08:27:38Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route flush cache': success 0
    2022-06-03 08:27:38Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) '/bin/service fwm:vpn_connection_chains -t json -s nosync -b '{"me":"XGS-FW-WAN-NAT-IP","peer":"SG-FW-WAN-IP","mynet":"xxx.xxx.xxx.xxx/25","peernet":"xxx.xxx.xxx.xxx/32","connop":"0","iface":"unknown","myproto":"0","myport":"0","peerproto":"0","peerport":"0","conntype":"ntn","actnet":"","compress":"0","conn_id":"1"}'': success 0
    2022-06-03 08:27:38Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --not-protonum=6 --inzone-outzone=2': error returned 1
    2022-06-03 08:27:38Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --not-protonum=6 --inzone-outzone=5': error returned 1
    2022-06-03 08:27:38Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --protonum=50': error returned 1
    2022-06-03 08:27:38Z 27[APP] [COP-UPDOWN][DB] (db_conn_info) hostname: 'tunnelname' result --> id: '1', mode: 'ntn', tunnel_type: '0', subnet_family:'0'
    2022-06-03 08:27:38Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) !!SKIP!! IPsec IKE for remotes (XGS-FW-WAN-NAT-IP to SG-FW-WAN-IP) already set up
    2022-06-03 08:27:38Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) ---- exec subnet updown -- down --
    2022-06-03 08:27:38Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) [NTN] NTN get actual...
    2022-06-03 08:27:38Z 27[APP] [COP-UPDOWN][DB] (db_query) No data retrieved from query: 'SELECT ( nath.netid  || '/'  || nath.netmask ) AS natedlan FROM   tblvpnconnhostrel AS rel    JOIN tblhost AS h  ON h.hostid = rel.hostid    JOIN tblhost AS nath  ON rel .natedhost = nath.hostid WHERE  rel.connectionid = $1    AND rel.hostlocation = 'L'    AND h.netid = $2    AND h.netmask = $3 LIMIT  1;' status: 2 rows: 0
    2022-06-03 08:27:38Z 27[APP]  
    2022-06-03 08:27:38Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) [IPSEC0] using ipsec dummy interface 'ipsec0'
    2022-06-03 08:27:38Z 27[APP] [COP-UPDOWN][NET] (get_src_ip) source address for xxx.xxx.xxx.xxx is IP: XGS-FW-WAN-NAT-IP 
    2022-06-03 08:27:38Z 27[APP] 
    2022-06-03 08:27:38Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route del xxx.xxx.xxx.xxx/32 dev ipsec0 src XGS-FW-WAN-NAT-IP table 220': error returned 2
    2022-06-03 08:27:38Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:38Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:38Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:38Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:38Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:38Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:38Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route flush cache': success 0
    2022-06-03 08:27:38Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route flush cache': success 0
    2022-06-03 08:27:38Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) '/bin/service fwm:vpn_connection_chains -t json -s nosync -b '{"me":"XGS-FW-WAN-NAT-IP","peer":"SG-FW-WAN-IP","mynet":"xxx.xxx.xxx.xxx/27","peernet":"xxx.xxx.xxx.xxx/32","connop":"0","iface":"unknown","myproto":"0","myport":"0","peerproto":"0","peerport":"0","conntype":"ntn","actnet":"","compress":"0","conn_id":"1"}'': success 0
    2022-06-03 08:27:38Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --not-protonum=6 --inzone-outzone=2': error returned 1
    2022-06-03 08:27:38Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --not-protonum=6 --inzone-outzone=5': error returned 1
    2022-06-03 08:27:38Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --protonum=50': error returned 1
    2022-06-03 08:27:38Z 27[APP] [COP-UPDOWN][DB] (db_conn_info) hostname: 'tunnelname' result --> id: '1', mode: 'ntn', tunnel_type: '0', subnet_family:'0'
    2022-06-03 08:27:38Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) !!SKIP!! IPsec IKE for remotes (XGS-FW-WAN-NAT-IP to SG-FW-WAN-IP) already set up
    2022-06-03 08:27:38Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) ---- exec subnet updown -- down --
    2022-06-03 08:27:38Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) [NTN] NTN get actual...
    2022-06-03 08:27:38Z 27[APP] [COP-UPDOWN][DB] (db_query) No data retrieved from query: 'SELECT ( nath.netid  || '/'  || nath.netmask ) AS natedlan FROM   tblvpnconnhostrel AS rel    JOIN tblhost AS h  ON h.hostid = rel.hostid    JOIN tblhost AS nath  ON rel .natedhost = nath.hostid WHERE  rel.connectionid = $1    AND rel.hostlocation = 'L'    AND h.netid = $2    AND h.netmask = $3 LIMIT  1;' status: 2 rows: 0
    2022-06-03 08:27:38Z 27[APP]  
    2022-06-03 08:27:38Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) [IPSEC0] using ipsec dummy interface 'ipsec0'
    2022-06-03 08:27:38Z 27[APP] [COP-UPDOWN][NET] (get_src_ip) source address for xxx.xxx.xxx.xxx is IP: XGS-FW-WAN-NAT-IP 
    2022-06-03 08:27:38Z 27[APP] 
    2022-06-03 08:27:38Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route del xxx.xxx.xxx.xxx/32 dev ipsec0 src XGS-FW-WAN-NAT-IP table 220': error returned 2
    2022-06-03 08:27:38Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:38Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:38Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:38Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:38Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:38Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:38Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route flush cache': success 0
    2022-06-03 08:27:38Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route flush cache': success 0
    2022-06-03 08:27:38Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) '/bin/service fwm:vpn_connection_chains -t json -s nosync -b '{"me":"XGS-FW-WAN-NAT-IP","peer":"SG-FW-WAN-IP","mynet":"xxx.xxx.xxx.xxx/27","peernet":"xxx.xxx.xxx.xxx/32","connop":"0","iface":"unknown","myproto":"0","myport":"0","peerproto":"0","peerport":"0","conntype":"ntn","actnet":"","compress":"0","conn_id":"1"}'': success 0
    2022-06-03 08:27:38Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --not-protonum=6 --inzone-outzone=2': error returned 1
    2022-06-03 08:27:38Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --not-protonum=6 --inzone-outzone=5': error returned 1
    2022-06-03 08:27:38Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --protonum=50': error returned 1
    2022-06-03 08:27:38Z 27[APP] [COP-UPDOWN][DB] (db_conn_info) hostname: 'tunnelname' result --> id: '1', mode: 'ntn', tunnel_type: '0', subnet_family:'0'
    2022-06-03 08:27:38Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) !!SKIP!! IPsec IKE for remotes (XGS-FW-WAN-NAT-IP to SG-FW-WAN-IP) already set up
    2022-06-03 08:27:38Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) ---- exec subnet updown -- down --
    2022-06-03 08:27:38Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) [NTN] NTN get actual...
    2022-06-03 08:27:38Z 27[APP] [COP-UPDOWN][DB] (db_query) No data retrieved from query: 'SELECT ( nath.netid  || '/'  || nath.netmask ) AS natedlan FROM   tblvpnconnhostrel AS rel    JOIN tblhost AS h  ON h.hostid = rel.hostid    JOIN tblhost AS nath  ON rel .natedhost = nath.hostid WHERE  rel.connectionid = $1    AND rel.hostlocation = 'L'    AND h.netid = $2    AND h.netmask = $3 LIMIT  1;' status: 2 rows: 0
    2022-06-03 08:27:38Z 27[APP]  
    2022-06-03 08:27:38Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) [IPSEC0] using ipsec dummy interface 'ipsec0'
    2022-06-03 08:27:38Z 27[APP] [COP-UPDOWN][NET] (get_src_ip) source address for xxx.xxx.xxx.xxx is IP: XGS-FW-WAN-NAT-IP 
    2022-06-03 08:27:38Z 27[APP] 
    2022-06-03 08:27:38Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route del xxx.xxx.xxx.xxx/24 dev ipsec0 src XGS-FW-WAN-NAT-IP table 220': error returned 2
    2022-06-03 08:27:38Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:38Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:38Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:38Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:38Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:38Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:38Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route flush cache': success 0
    2022-06-03 08:27:38Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route flush cache': success 0
    2022-06-03 08:27:39Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) '/bin/service fwm:vpn_connection_chains -t json -s nosync -b '{"me":"XGS-FW-WAN-NAT-IP","peer":"SG-FW-WAN-IP","mynet":"xxx.xxx.xxx.xxx/27","peernet":"xxx.xxx.xxx.xxx/24","connop":"0","iface":"unknown","myproto":"0","myport":"0","peerproto":"0","peerport":"0","conntype":"ntn","actnet":"","compress":"0","conn_id":"1"}'': success 0
    2022-06-03 08:27:39Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --not-protonum=6 --inzone-outzone=2': error returned 1
    2022-06-03 08:27:39Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --not-protonum=6 --inzone-outzone=5': error returned 1
    2022-06-03 08:27:39Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --protonum=50': error returned 1
    2022-06-03 08:27:39Z 27[APP] [COP-UPDOWN][DB] (db_conn_info) hostname: 'tunnelname' result --> id: '1', mode: 'ntn', tunnel_type: '0', subnet_family:'0'
    2022-06-03 08:27:39Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) !!SKIP!! IPsec IKE for remotes (XGS-FW-WAN-NAT-IP to SG-FW-WAN-IP) already set up
    2022-06-03 08:27:39Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) ---- exec subnet updown -- down --
    2022-06-03 08:27:39Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) [NTN] NTN get actual...
    2022-06-03 08:27:39Z 27[APP] [COP-UPDOWN][DB] (db_query) No data retrieved from query: 'SELECT ( nath.netid  || '/'  || nath.netmask ) AS natedlan FROM   tblvpnconnhostrel AS rel    JOIN tblhost AS h  ON h.hostid = rel.hostid    JOIN tblhost AS nath  ON rel .natedhost = nath.hostid WHERE  rel.connectionid = $1    AND rel.hostlocation = 'L'    AND h.netid = $2    AND h.netmask = $3 LIMIT  1;' status: 2 rows: 0
    2022-06-03 08:27:39Z 27[APP]  
    2022-06-03 08:27:39Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) [IPSEC0] using ipsec dummy interface 'ipsec0'
    2022-06-03 08:27:39Z 27[APP] [COP-UPDOWN][NET] (get_src_ip) source address for xxx.xxx.xxx.xxx is IP: XGS-FW-WAN-NAT-IP 
    2022-06-03 08:27:39Z 27[APP] 
    2022-06-03 08:27:39Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route del xxx.xxx.xxx.xxx/32 dev ipsec0 src XGS-FW-WAN-NAT-IP table 220': error returned 2
    2022-06-03 08:27:39Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:39Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:39Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:39Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:39Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:39Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:39Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route flush cache': success 0
    2022-06-03 08:27:39Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route flush cache': success 0
    2022-06-03 08:27:39Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) '/bin/service fwm:vpn_connection_chains -t json -s nosync -b '{"me":"XGS-FW-WAN-NAT-IP","peer":"SG-FW-WAN-IP","mynet":"xxx.xxx.xxx.xxx/27","peernet":"xxx.xxx.xxx.xxx/32","connop":"0","iface":"unknown","myproto":"0","myport":"0","peerproto":"0","peerport":"0","conntype":"ntn","actnet":"","compress":"0","conn_id":"1"}'': success 0
    2022-06-03 08:27:39Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --not-protonum=6 --inzone-outzone=2': error returned 1
    2022-06-03 08:27:39Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --not-protonum=6 --inzone-outzone=5': error returned 1
    2022-06-03 08:27:39Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --protonum=50': error returned 1
    2022-06-03 08:27:39Z 27[APP] [COP-UPDOWN][DB] (db_conn_info) hostname: 'tunnelname' result --> id: '1', mode: 'ntn', tunnel_type: '0', subnet_family:'0'
    2022-06-03 08:27:39Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) !!SKIP!! IPsec IKE for remotes (XGS-FW-WAN-NAT-IP to SG-FW-WAN-IP) already set up
    2022-06-03 08:27:39Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) ---- exec subnet updown -- down --
    2022-06-03 08:27:39Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) [NTN] NTN get actual...
    2022-06-03 08:27:39Z 27[APP] [COP-UPDOWN][DB] (db_query) No data retrieved from query: 'SELECT ( nath.netid  || '/'  || nath.netmask ) AS natedlan FROM   tblvpnconnhostrel AS rel    JOIN tblhost AS h  ON h.hostid = rel.hostid    JOIN tblhost AS nath  ON rel .natedhost = nath.hostid WHERE  rel.connectionid = $1    AND rel.hostlocation = 'L'    AND h.netid = $2    AND h.netmask = $3 LIMIT  1;' status: 2 rows: 0
    2022-06-03 08:27:39Z 27[APP]  
    2022-06-03 08:27:39Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) [IPSEC0] using ipsec dummy interface 'ipsec0'
    2022-06-03 08:27:39Z 27[APP] [COP-UPDOWN][NET] (get_src_ip) source address for xxx.xxx.xxx.xxx is IP: XGS-FW-WAN-NAT-IP 
    2022-06-03 08:27:39Z 27[APP] 
    2022-06-03 08:27:39Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route del xxx.xxx.xxx.xxx/32 dev ipsec0 src XGS-FW-WAN-NAT-IP table 220': error returned 2
    2022-06-03 08:27:39Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:39Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:39Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:39Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:39Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:39Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:39Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route flush cache': success 0
    2022-06-03 08:27:39Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route flush cache': success 0
    2022-06-03 08:27:39Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) '/bin/service fwm:vpn_connection_chains -t json -s nosync -b '{"me":"XGS-FW-WAN-NAT-IP","peer":"SG-FW-WAN-IP","mynet":"xxx.xxx.xxx.xxx/27","peernet":"xxx.xxx.xxx.xxx/32","connop":"0","iface":"unknown","myproto":"0","myport":"0","peerproto":"0","peerport":"0","conntype":"ntn","actnet":"","compress":"0","conn_id":"1"}'': success 0
    2022-06-03 08:27:39Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --not-protonum=6 --inzone-outzone=2': error returned 1
    2022-06-03 08:27:39Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --not-protonum=6 --inzone-outzone=5': error returned 1
    2022-06-03 08:27:39Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --protonum=50': error returned 1
    2022-06-03 08:27:39Z 27[APP] [COP-UPDOWN][DB] (db_conn_info) hostname: 'tunnelname' result --> id: '1', mode: 'ntn', tunnel_type: '0', subnet_family:'0'
    2022-06-03 08:27:39Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) !!SKIP!! IPsec IKE for remotes (XGS-FW-WAN-NAT-IP to SG-FW-WAN-IP) already set up
    2022-06-03 08:27:39Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) ---- exec subnet updown -- down --
    2022-06-03 08:27:39Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) [NTN] NTN get actual...
    2022-06-03 08:27:39Z 27[APP] [COP-UPDOWN][DB] (db_query) No data retrieved from query: 'SELECT ( nath.netid  || '/'  || nath.netmask ) AS natedlan FROM   tblvpnconnhostrel AS rel    JOIN tblhost AS h  ON h.hostid = rel.hostid    JOIN tblhost AS nath  ON rel .natedhost = nath.hostid WHERE  rel.connectionid = $1    AND rel.hostlocation = 'L'    AND h.netid = $2    AND h.netmask = $3 LIMIT  1;' status: 2 rows: 0
    2022-06-03 08:27:39Z 27[APP]  
    2022-06-03 08:27:39Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) [IPSEC0] using ipsec dummy interface 'ipsec0'
    2022-06-03 08:27:39Z 27[APP] [COP-UPDOWN][NET] (get_src_ip) source address for XGS-FW-LAN-NET is IP: XGS-FW-LAN-IP 
    2022-06-03 08:27:39Z 27[APP] 
    2022-06-03 08:27:39Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route del xxx.xxx.xxx.xxx/32 dev ipsec0 src XGS-FW-LAN-IP table 220': error returned 2
    2022-06-03 08:27:39Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:39Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:39Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:39Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:39Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:39Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:39Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route flush cache': success 0
    2022-06-03 08:27:39Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route flush cache': success 0
    2022-06-03 08:27:39Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) '/bin/service fwm:vpn_connection_chains -t json -s nosync -b '{"me":"XGS-FW-WAN-NAT-IP","peer":"SG-FW-WAN-IP","mynet":"xxx.xxx.xxx.xxx/25","peernet":"xxx.xxx.xxx.xxx/32","connop":"0","iface":"unknown","myproto":"0","myport":"0","peerproto":"0","peerport":"0","conntype":"ntn","actnet":"","compress":"0","conn_id":"1"}'': success 0
    2022-06-03 08:27:39Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --not-protonum=6 --inzone-outzone=2': error returned 1
    2022-06-03 08:27:39Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --not-protonum=6 --inzone-outzone=5': error returned 1
    2022-06-03 08:27:39Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --protonum=50': error returned 1
    2022-06-03 08:27:39Z 27[APP] [COP-UPDOWN][DB] (db_conn_info) hostname: 'tunnelname' result --> id: '1', mode: 'ntn', tunnel_type: '0', subnet_family:'0'
    2022-06-03 08:27:39Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) !!SKIP!! IPsec IKE for remotes (XGS-FW-WAN-NAT-IP to SG-FW-WAN-IP) already set up
    2022-06-03 08:27:39Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) ---- exec subnet updown -- down --
    2022-06-03 08:27:39Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) [NTN] NTN get actual...
    2022-06-03 08:27:39Z 27[APP] [COP-UPDOWN][DB] (db_query) No data retrieved from query: 'SELECT ( nath.netid  || '/'  || nath.netmask ) AS natedlan FROM   tblvpnconnhostrel AS rel    JOIN tblhost AS h  ON h.hostid = rel.hostid    JOIN tblhost AS nath  ON rel .natedhost = nath.hostid WHERE  rel.connectionid = $1    AND rel.hostlocation = 'L'    AND h.netid = $2    AND h.netmask = $3 LIMIT  1;' status: 2 rows: 0
    2022-06-03 08:27:39Z 27[APP]  
    2022-06-03 08:27:39Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) [IPSEC0] using ipsec dummy interface 'ipsec0'
    2022-06-03 08:27:39Z 27[APP] [COP-UPDOWN][NET] (get_src_ip) source address for xxx.xxx.xxx.xxx is IP: XGS-FW-WAN-NAT-IP 
    2022-06-03 08:27:39Z 27[APP] 
    2022-06-03 08:27:39Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route del xxx.xxx.xxx.xxx/32 dev ipsec0 src XGS-FW-WAN-NAT-IP table 220': error returned 2
    2022-06-03 08:27:39Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:39Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:39Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:39Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:39Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:39Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:39Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route flush cache': success 0
    2022-06-03 08:27:39Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route flush cache': success 0
    2022-06-03 08:27:39Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) '/bin/service fwm:vpn_connection_chains -t json -s nosync -b '{"me":"XGS-FW-WAN-NAT-IP","peer":"SG-FW-WAN-IP","mynet":"xxx.xxx.xxx.xxx/27","peernet":"xxx.xxx.xxx.xxx/32","connop":"0","iface":"unknown","myproto":"0","myport":"0","peerproto":"0","peerport":"0","conntype":"ntn","actnet":"","compress":"0","conn_id":"1"}'': success 0
    2022-06-03 08:27:39Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --not-protonum=6 --inzone-outzone=2': error returned 1
    2022-06-03 08:27:39Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --not-protonum=6 --inzone-outzone=5': error returned 1
    2022-06-03 08:27:39Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --protonum=50': error returned 1
    2022-06-03 08:27:39Z 27[APP] [COP-UPDOWN][DB] (db_conn_info) hostname: 'tunnelname' result --> id: '1', mode: 'ntn', tunnel_type: '0', subnet_family:'0'
    2022-06-03 08:27:39Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) !!SKIP!! IPsec IKE for remotes (XGS-FW-WAN-NAT-IP to SG-FW-WAN-IP) already set up
    2022-06-03 08:27:39Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) ---- exec subnet updown -- down --
    2022-06-03 08:27:39Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) [NTN] NTN get actual...
    2022-06-03 08:27:39Z 27[APP] [COP-UPDOWN][DB] (db_query) No data retrieved from query: 'SELECT ( nath.netid  || '/'  || nath.netmask ) AS natedlan FROM   tblvpnconnhostrel AS rel    JOIN tblhost AS h  ON h.hostid = rel.hostid    JOIN tblhost AS nath  ON rel .natedhost = nath.hostid WHERE  rel.connectionid = $1    AND rel.hostlocation = 'L'    AND h.netid = $2    AND h.netmask = $3 LIMIT  1;' status: 2 rows: 0
    2022-06-03 08:27:39Z 27[APP]  
    2022-06-03 08:27:39Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) [IPSEC0] using ipsec dummy interface 'ipsec0'
    2022-06-03 08:27:39Z 27[APP] [COP-UPDOWN][NET] (get_src_ip) source address for xxx.xxx.xxx.xxx is IP: XGS-FW-WAN-NAT-IP 
    2022-06-03 08:27:39Z 27[APP] 
    2022-06-03 08:27:39Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route del xxx.xxx.xxx.xxx/32 dev ipsec0 src XGS-FW-WAN-NAT-IP table 220': error returned 2
    2022-06-03 08:27:39Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:39Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:39Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:39Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:39Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:39Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:39Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route flush cache': success 0
    2022-06-03 08:27:39Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route flush cache': success 0
    2022-06-03 08:27:40Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) '/bin/service fwm:vpn_connection_chains -t json -s nosync -b '{"me":"XGS-FW-WAN-NAT-IP","peer":"SG-FW-WAN-IP","mynet":"xxx.xxx.xxx.xxx/27","peernet":"xxx.xxx.xxx.xxx/32","connop":"0","iface":"unknown","myproto":"0","myport":"0","peerproto":"0","peerport":"0","conntype":"ntn","actnet":"","compress":"0","conn_id":"1"}'': success 0
    2022-06-03 08:27:40Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --not-protonum=6 --inzone-outzone=2': error returned 1
    2022-06-03 08:27:40Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --not-protonum=6 --inzone-outzone=5': error returned 1
    2022-06-03 08:27:40Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --protonum=50': error returned 1
    2022-06-03 08:27:40Z 27[APP] [COP-UPDOWN][DB] (db_conn_info) hostname: 'tunnelname' result --> id: '1', mode: 'ntn', tunnel_type: '0', subnet_family:'0'
    2022-06-03 08:27:40Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) !!SKIP!! IPsec IKE for remotes (XGS-FW-WAN-NAT-IP to SG-FW-WAN-IP) already set up
    2022-06-03 08:27:40Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) ---- exec subnet updown -- down --
    2022-06-03 08:27:40Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) [NTN] NTN get actual...
    2022-06-03 08:27:40Z 27[APP] [COP-UPDOWN][DB] (db_query) No data retrieved from query: 'SELECT ( nath.netid  || '/'  || nath.netmask ) AS natedlan FROM   tblvpnconnhostrel AS rel    JOIN tblhost AS h  ON h.hostid = rel.hostid    JOIN tblhost AS nath  ON rel .natedhost = nath.hostid WHERE  rel.connectionid = $1    AND rel.hostlocation = 'L'    AND h.netid = $2    AND h.netmask = $3 LIMIT  1;' status: 2 rows: 0
    2022-06-03 08:27:40Z 27[APP]  
    2022-06-03 08:27:40Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) [IPSEC0] using ipsec dummy interface 'ipsec0'
    2022-06-03 08:27:40Z 27[APP] [COP-UPDOWN][NET] (get_src_ip) source address for xxx.xxx.xxx.xxx is IP: XGS-FW-WAN-NAT-IP 
    2022-06-03 08:27:40Z 27[APP] 
    2022-06-03 08:27:40Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route del xxx.xxx.xxx.xxx/32 dev ipsec0 src XGS-FW-WAN-NAT-IP table 220': error returned 2
    2022-06-03 08:27:40Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:40Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:40Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:40Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:40Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:40Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:40Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route flush cache': success 0
    2022-06-03 08:27:40Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route flush cache': success 0
    2022-06-03 08:27:40Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) '/bin/service fwm:vpn_connection_chains -t json -s nosync -b '{"me":"XGS-FW-WAN-NAT-IP","peer":"SG-FW-WAN-IP","mynet":"xxx.xxx.xxx.xxx/27","peernet":"xxx.xxx.xxx.xxx/32","connop":"0","iface":"unknown","myproto":"0","myport":"0","peerproto":"0","peerport":"0","conntype":"ntn","actnet":"","compress":"0","conn_id":"1"}'': success 0
    2022-06-03 08:27:40Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --not-protonum=6 --inzone-outzone=2': error returned 1
    2022-06-03 08:27:40Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --not-protonum=6 --inzone-outzone=5': error returned 1
    2022-06-03 08:27:40Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --protonum=50': error returned 1
    2022-06-03 08:27:40Z 27[APP] [COP-UPDOWN][DB] (db_conn_info) hostname: 'tunnelname' result --> id: '1', mode: 'ntn', tunnel_type: '0', subnet_family:'0'
    2022-06-03 08:27:40Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) !!SKIP!! IPsec IKE for remotes (XGS-FW-WAN-NAT-IP to SG-FW-WAN-IP) already set up
    2022-06-03 08:27:40Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) ---- exec subnet updown -- down --
    2022-06-03 08:27:40Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) [NTN] NTN get actual...
    2022-06-03 08:27:40Z 27[APP] [COP-UPDOWN][DB] (db_query) No data retrieved from query: 'SELECT ( nath.netid  || '/'  || nath.netmask ) AS natedlan FROM   tblvpnconnhostrel AS rel    JOIN tblhost AS h  ON h.hostid = rel.hostid    JOIN tblhost AS nath  ON rel .natedhost = nath.hostid WHERE  rel.connectionid = $1    AND rel.hostlocation = 'L'    AND h.netid = $2    AND h.netmask = $3 LIMIT  1;' status: 2 rows: 0
    2022-06-03 08:27:40Z 27[APP]  
    2022-06-03 08:27:40Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) [IPSEC0] using ipsec dummy interface 'ipsec0'
    2022-06-03 08:27:40Z 27[APP] [COP-UPDOWN][NET] (get_src_ip) source address for xxx.xxx.xxx.xxx is IP: XGS-FW-WAN-NAT-IP 
    2022-06-03 08:27:40Z 27[APP] 
    2022-06-03 08:27:40Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route del xxx.xxx.xxx.xxx/32 dev ipsec0 src XGS-FW-WAN-NAT-IP table 220': error returned 2
    2022-06-03 08:27:40Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:40Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:40Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:40Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:40Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:40Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:40Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route flush cache': success 0
    2022-06-03 08:27:40Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route flush cache': success 0
    2022-06-03 08:27:40Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) '/bin/service fwm:vpn_connection_chains -t json -s nosync -b '{"me":"XGS-FW-WAN-NAT-IP","peer":"SG-FW-WAN-IP","mynet":"xxx.xxx.xxx.xxx/26","peernet":"xxx.xxx.xxx.xxx/32","connop":"0","iface":"unknown","myproto":"0","myport":"0","peerproto":"0","peerport":"0","conntype":"ntn","actnet":"","compress":"0","conn_id":"1"}'': success 0
    2022-06-03 08:27:40Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --not-protonum=6 --inzone-outzone=2': error returned 1
    2022-06-03 08:27:40Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --not-protonum=6 --inzone-outzone=5': error returned 1
    2022-06-03 08:27:40Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --protonum=50': error returned 1
    2022-06-03 08:27:40Z 27[APP] [COP-UPDOWN][DB] (db_conn_info) hostname: 'tunnelname' result --> id: '1', mode: 'ntn', tunnel_type: '0', subnet_family:'0'
    2022-06-03 08:27:40Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) !!SKIP!! IPsec IKE for remotes (XGS-FW-WAN-NAT-IP to SG-FW-WAN-IP) already set up
    2022-06-03 08:27:40Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) ---- exec subnet updown -- down --
    2022-06-03 08:27:40Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) [NTN] NTN get actual...
    2022-06-03 08:27:40Z 27[APP] [COP-UPDOWN][DB] (db_query) No data retrieved from query: 'SELECT ( nath.netid  || '/'  || nath.netmask ) AS natedlan FROM   tblvpnconnhostrel AS rel    JOIN tblhost AS h  ON h.hostid = rel.hostid    JOIN tblhost AS nath  ON rel .natedhost = nath.hostid WHERE  rel.connectionid = $1    AND rel.hostlocation = 'L'    AND h.netid = $2    AND h.netmask = $3 LIMIT  1;' status: 2 rows: 0
    2022-06-03 08:27:40Z 27[APP]  
    2022-06-03 08:27:40Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) [IPSEC0] using ipsec dummy interface 'ipsec0'
    2022-06-03 08:27:40Z 27[APP] [COP-UPDOWN][NET] (get_src_ip) source address for xxx.xxx.xxx.xxx is IP: XGS-FW-WAN-NAT-IP 
    2022-06-03 08:27:40Z 27[APP] 
    2022-06-03 08:27:40Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route del xxx.xxx.xxx.xxx/32 dev ipsec0 src XGS-FW-WAN-NAT-IP table 220': error returned 2
    2022-06-03 08:27:40Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:40Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:40Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:40Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:40Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:40Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:40Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route flush cache': success 0
    2022-06-03 08:27:40Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route flush cache': success 0
    2022-06-03 08:27:40Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) '/bin/service fwm:vpn_connection_chains -t json -s nosync -b '{"me":"XGS-FW-WAN-NAT-IP","peer":"SG-FW-WAN-IP","mynet":"xxx.xxx.xxx.xxx/24","peernet":"xxx.xxx.xxx.xxx/32","connop":"0","iface":"unknown","myproto":"0","myport":"0","peerproto":"0","peerport":"0","conntype":"ntn","actnet":"","compress":"0","conn_id":"1"}'': success 0
    2022-06-03 08:27:40Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --not-protonum=6 --inzone-outzone=2': error returned 1
    2022-06-03 08:27:40Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --not-protonum=6 --inzone-outzone=5': error returned 1
    2022-06-03 08:27:40Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --protonum=50': error returned 1
    2022-06-03 08:27:40Z 27[APP] [COP-UPDOWN][DB] (db_conn_info) hostname: 'tunnelname' result --> id: '1', mode: 'ntn', tunnel_type: '0', subnet_family:'0'
    2022-06-03 08:27:40Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) !!SKIP!! IPsec IKE for remotes (XGS-FW-WAN-NAT-IP to SG-FW-WAN-IP) already set up
    2022-06-03 08:27:40Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) ---- exec subnet updown -- down --
    2022-06-03 08:27:40Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) [NTN] NTN get actual...
    2022-06-03 08:27:40Z 27[APP] [COP-UPDOWN][DB] (db_query) No data retrieved from query: 'SELECT ( nath.netid  || '/'  || nath.netmask ) AS natedlan FROM   tblvpnconnhostrel AS rel    JOIN tblhost AS h  ON h.hostid = rel.hostid    JOIN tblhost AS nath  ON rel .natedhost = nath.hostid WHERE  rel.connectionid = $1    AND rel.hostlocation = 'L'    AND h.netid = $2    AND h.netmask = $3 LIMIT  1;' status: 2 rows: 0
    2022-06-03 08:27:40Z 27[APP]  
    2022-06-03 08:27:40Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) [IPSEC0] using ipsec dummy interface 'ipsec0'
    2022-06-03 08:27:40Z 27[APP] [COP-UPDOWN][NET] (get_src_ip) source address for XGS-FW-LAN-NET is IP: XGS-FW-LAN-IP 
    2022-06-03 08:27:40Z 27[APP] 
    2022-06-03 08:27:40Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route del xxx.xxx.xxx.xxx/32 dev ipsec0 src XGS-FW-LAN-IP table 220': error returned 2
    2022-06-03 08:27:40Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:40Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:40Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:40Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:40Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:40Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:40Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route flush cache': success 0
    2022-06-03 08:27:40Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route flush cache': success 0
    2022-06-03 08:27:40Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) '/bin/service fwm:vpn_connection_chains -t json -s nosync -b '{"me":"XGS-FW-WAN-NAT-IP","peer":"SG-FW-WAN-IP","mynet":"xxx.xxx.xxx.xxx/25","peernet":"xxx.xxx.xxx.xxx/32","connop":"0","iface":"unknown","myproto":"0","myport":"0","peerproto":"0","peerport":"0","conntype":"ntn","actnet":"","compress":"0","conn_id":"1"}'': success 0
    2022-06-03 08:27:40Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --not-protonum=6 --inzone-outzone=2': error returned 1
    2022-06-03 08:27:40Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --not-protonum=6 --inzone-outzone=5': error returned 1
    2022-06-03 08:27:40Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --protonum=50': error returned 1
    2022-06-03 08:27:40Z 27[APP] [COP-UPDOWN][DB] (db_conn_info) hostname: 'tunnelname' result --> id: '1', mode: 'ntn', tunnel_type: '0', subnet_family:'0'
    2022-06-03 08:27:40Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) !!SKIP!! IPsec IKE for remotes (XGS-FW-WAN-NAT-IP to SG-FW-WAN-IP) already set up
    2022-06-03 08:27:40Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) ---- exec subnet updown -- down --
    2022-06-03 08:27:40Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) [NTN] NTN get actual...
    2022-06-03 08:27:40Z 27[APP] [COP-UPDOWN][DB] (db_query) No data retrieved from query: 'SELECT ( nath.netid  || '/'  || nath.netmask ) AS natedlan FROM   tblvpnconnhostrel AS rel    JOIN tblhost AS h  ON h.hostid = rel.hostid    JOIN tblhost AS nath  ON rel .natedhost = nath.hostid WHERE  rel.connectionid = $1    AND rel.hostlocation = 'L'    AND h.netid = $2    AND h.netmask = $3 LIMIT  1;' status: 2 rows: 0
    2022-06-03 08:27:40Z 27[APP]  
    2022-06-03 08:27:40Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) [IPSEC0] using ipsec dummy interface 'ipsec0'
    2022-06-03 08:27:40Z 27[APP] [COP-UPDOWN][NET] (get_src_ip) source address for xxx.xxx.xxx.xxx is IP: XGS-FW-WAN-NAT-IP 
    2022-06-03 08:27:40Z 27[APP] 
    2022-06-03 08:27:40Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route del xxx.xxx.xxx.xxx/32 dev ipsec0 src XGS-FW-WAN-NAT-IP table 220': error returned 2
    2022-06-03 08:27:40Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:40Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:40Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:40Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:40Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:40Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:40Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route flush cache': success 0
    2022-06-03 08:27:40Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route flush cache': success 0
    2022-06-03 08:27:40Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) '/bin/service fwm:vpn_connection_chains -t json -s nosync -b '{"me":"XGS-FW-WAN-NAT-IP","peer":"SG-FW-WAN-IP","mynet":"xxx.xxx.xxx.xxx/24","peernet":"xxx.xxx.xxx.xxx/32","connop":"0","iface":"unknown","myproto":"0","myport":"0","peerproto":"0","peerport":"0","conntype":"ntn","actnet":"","compress":"0","conn_id":"1"}'': success 0
    2022-06-03 08:27:40Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --not-protonum=6 --inzone-outzone=2': error returned 1
    2022-06-03 08:27:40Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --not-protonum=6 --inzone-outzone=5': error returned 1
    2022-06-03 08:27:40Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --protonum=50': error returned 1
    2022-06-03 08:27:40Z 27[APP] [COP-UPDOWN][DB] (db_conn_info) hostname: 'tunnelname' result --> id: '1', mode: 'ntn', tunnel_type: '0', subnet_family:'0'
    2022-06-03 08:27:40Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) !!SKIP!! IPsec IKE for remotes (XGS-FW-WAN-NAT-IP to SG-FW-WAN-IP) already set up
    2022-06-03 08:27:40Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) ---- exec subnet updown -- down --
    2022-06-03 08:27:40Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) [NTN] NTN get actual...
    2022-06-03 08:27:40Z 27[APP] [COP-UPDOWN][DB] (db_query) No data retrieved from query: 'SELECT ( nath.netid  || '/'  || nath.netmask ) AS natedlan FROM   tblvpnconnhostrel AS rel    JOIN tblhost AS h  ON h.hostid = rel.hostid    JOIN tblhost AS nath  ON rel .natedhost = nath.hostid WHERE  rel.connectionid = $1    AND rel.hostlocation = 'L'    AND h.netid = $2    AND h.netmask = $3 LIMIT  1;' status: 2 rows: 0
    2022-06-03 08:27:40Z 27[APP]  
    2022-06-03 08:27:40Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) [IPSEC0] using ipsec dummy interface 'ipsec0'
    2022-06-03 08:27:40Z 27[APP] [COP-UPDOWN][NET] (get_src_ip) source address for xxx.xxx.xxx.xxx is IP: XGS-FW-WAN-NAT-IP 
    2022-06-03 08:27:40Z 27[APP] 
    2022-06-03 08:27:40Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route del xxx.xxx.xxx.xxx/32 dev ipsec0 src XGS-FW-WAN-NAT-IP table 220': error returned 2
    2022-06-03 08:27:40Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:40Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:40Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:40Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:40Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:40Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:40Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route flush cache': success 0
    2022-06-03 08:27:40Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route flush cache': success 0
    2022-06-03 08:27:41Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) '/bin/service fwm:vpn_connection_chains -t json -s nosync -b '{"me":"XGS-FW-WAN-NAT-IP","peer":"SG-FW-WAN-IP","mynet":"xxx.xxx.xxx.xxx/24","peernet":"xxx.xxx.xxx.xxx/32","connop":"0","iface":"unknown","myproto":"0","myport":"0","peerproto":"0","peerport":"0","conntype":"ntn","actnet":"","compress":"0","conn_id":"1"}'': success 0
    2022-06-03 08:27:41Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --not-protonum=6 --inzone-outzone=2': error returned 1
    2022-06-03 08:27:41Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --not-protonum=6 --inzone-outzone=5': error returned 1
    2022-06-03 08:27:41Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --protonum=50': error returned 1
    2022-06-03 08:27:41Z 27[APP] [COP-UPDOWN][DB] (db_conn_info) hostname: 'tunnelname' result --> id: '1', mode: 'ntn', tunnel_type: '0', subnet_family:'0'
    2022-06-03 08:27:41Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) !!SKIP!! IPsec IKE for remotes (XGS-FW-WAN-NAT-IP to SG-FW-WAN-IP) already set up
    2022-06-03 08:27:41Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) ---- exec subnet updown -- down --
    2022-06-03 08:27:41Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) [NTN] NTN get actual...
    2022-06-03 08:27:41Z 27[APP] [COP-UPDOWN][DB] (db_query) No data retrieved from query: 'SELECT ( nath.netid  || '/'  || nath.netmask ) AS natedlan FROM   tblvpnconnhostrel AS rel    JOIN tblhost AS h  ON h.hostid = rel.hostid    JOIN tblhost AS nath  ON rel .natedhost = nath.hostid WHERE  rel.connectionid = $1    AND rel.hostlocation = 'L'    AND h.netid = $2    AND h.netmask = $3 LIMIT  1;' status: 2 rows: 0
    2022-06-03 08:27:41Z 27[APP]  
    2022-06-03 08:27:41Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) [IPSEC0] using ipsec dummy interface 'ipsec0'
    2022-06-03 08:27:41Z 27[APP] [COP-UPDOWN][NET] (get_src_ip) source address for xxx.xxx.xxx.xxx is IP: XGS-FW-WAN-NAT-IP 
    2022-06-03 08:27:41Z 27[APP] 
    2022-06-03 08:27:41Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route del xxx.xxx.xxx.xxx/32 dev ipsec0 src XGS-FW-WAN-NAT-IP table 220': error returned 2
    2022-06-03 08:27:41Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:41Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:41Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:41Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:41Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:41Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:41Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route flush cache': success 0
    2022-06-03 08:27:41Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route flush cache': success 0
    2022-06-03 08:27:41Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) '/bin/service fwm:vpn_connection_chains -t json -s nosync -b '{"me":"XGS-FW-WAN-NAT-IP","peer":"SG-FW-WAN-IP","mynet":"xxx.xxx.xxx.xxx/27","peernet":"xxx.xxx.xxx.xxx/32","connop":"0","iface":"unknown","myproto":"0","myport":"0","peerproto":"0","peerport":"0","conntype":"ntn","actnet":"","compress":"0","conn_id":"1"}'': success 0
    2022-06-03 08:27:41Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --not-protonum=6 --inzone-outzone=2': error returned 1
    2022-06-03 08:27:41Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --not-protonum=6 --inzone-outzone=5': error returned 1
    2022-06-03 08:27:41Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --protonum=50': error returned 1
    2022-06-03 08:27:41Z 27[APP] [COP-UPDOWN][DB] (db_conn_info) hostname: 'tunnelname' result --> id: '1', mode: 'ntn', tunnel_type: '0', subnet_family:'0'
    2022-06-03 08:27:41Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) !!SKIP!! IPsec IKE for remotes (XGS-FW-WAN-NAT-IP to SG-FW-WAN-IP) already set up
    2022-06-03 08:27:41Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) ---- exec subnet updown -- down --
    2022-06-03 08:27:41Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) [NTN] NTN get actual...
    2022-06-03 08:27:41Z 27[APP] [COP-UPDOWN][DB] (db_query) No data retrieved from query: 'SELECT ( nath.netid  || '/'  || nath.netmask ) AS natedlan FROM   tblvpnconnhostrel AS rel    JOIN tblhost AS h  ON h.hostid = rel.hostid    JOIN tblhost AS nath  ON rel .natedhost = nath.hostid WHERE  rel.connectionid = $1    AND rel.hostlocation = 'L'    AND h.netid = $2    AND h.netmask = $3 LIMIT  1;' status: 2 rows: 0
    2022-06-03 08:27:41Z 27[APP]  
    2022-06-03 08:27:41Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) [IPSEC0] using ipsec dummy interface 'ipsec0'
    2022-06-03 08:27:41Z 27[APP] [COP-UPDOWN][NET] (get_src_ip) source address for XGS-FW-LAN-NET is IP: XGS-FW-LAN-IP 
    2022-06-03 08:27:41Z 27[APP] 
    2022-06-03 08:27:41Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route del xxx.xxx.xxx.xxx/32 dev ipsec0 src XGS-FW-LAN-IP table 220': success 0
    2022-06-03 08:27:41Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:41Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:41Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:41Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:41Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:41Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:41Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route flush cache': success 0
    2022-06-03 08:27:41Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route flush cache': success 0
    2022-06-03 08:27:41Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) '/bin/service fwm:vpn_connection_chains -t json -s nosync -b '{"me":"XGS-FW-WAN-NAT-IP","peer":"SG-FW-WAN-IP","mynet":"xxx.xxx.xxx.xxx/25","peernet":"xxx.xxx.xxx.xxx/32","connop":"0","iface":"unknown","myproto":"0","myport":"0","peerproto":"0","peerport":"0","conntype":"ntn","actnet":"","compress":"0","conn_id":"1"}'': success 0
    2022-06-03 08:27:41Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --not-protonum=6 --inzone-outzone=2': error returned 1
    2022-06-03 08:27:41Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --not-protonum=6 --inzone-outzone=5': error returned 1
    2022-06-03 08:27:41Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --protonum=50': error returned 1
    2022-06-03 08:27:41Z 27[APP] [COP-UPDOWN][DB] (db_conn_info) hostname: 'tunnelname' result --> id: '1', mode: 'ntn', tunnel_type: '0', subnet_family:'0'
    2022-06-03 08:27:41Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) !!SKIP!! IPsec IKE for remotes (XGS-FW-WAN-NAT-IP to SG-FW-WAN-IP) already set up
    2022-06-03 08:27:41Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) ---- exec subnet updown -- down --
    2022-06-03 08:27:41Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) [NTN] NTN get actual...
    2022-06-03 08:27:41Z 27[APP] [COP-UPDOWN][DB] (db_query) No data retrieved from query: 'SELECT ( nath.netid  || '/'  || nath.netmask ) AS natedlan FROM   tblvpnconnhostrel AS rel    JOIN tblhost AS h  ON h.hostid = rel.hostid    JOIN tblhost AS nath  ON rel .natedhost = nath.hostid WHERE  rel.connectionid = $1    AND rel.hostlocation = 'L'    AND h.netid = $2    AND h.netmask = $3 LIMIT  1;' status: 2 rows: 0
    2022-06-03 08:27:41Z 27[APP]  
    2022-06-03 08:27:41Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) [IPSEC0] using ipsec dummy interface 'ipsec0'
    2022-06-03 08:27:41Z 27[APP] [COP-UPDOWN][NET] (get_src_ip) source address for xxx.xxx.xxx.xxx is IP: XGS-FW-WAN-NAT-IP 
    2022-06-03 08:27:41Z 27[APP] 
    2022-06-03 08:27:41Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route del xxx.xxx.xxx.xxx/32 dev ipsec0 src XGS-FW-WAN-NAT-IP table 220': error returned 2
    2022-06-03 08:27:41Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:41Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:41Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:41Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:41Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:41Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:41Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route flush cache': success 0
    2022-06-03 08:27:41Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route flush cache': success 0
    2022-06-03 08:27:41Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) '/bin/service fwm:vpn_connection_chains -t json -s nosync -b '{"me":"XGS-FW-WAN-NAT-IP","peer":"SG-FW-WAN-IP","mynet":"xxx.xxx.xxx.xxx/26","peernet":"xxx.xxx.xxx.xxx/32","connop":"0","iface":"unknown","myproto":"0","myport":"0","peerproto":"0","peerport":"0","conntype":"ntn","actnet":"","compress":"0","conn_id":"1"}'': success 0
    2022-06-03 08:27:41Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --not-protonum=6 --inzone-outzone=2': error returned 1
    2022-06-03 08:27:41Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --not-protonum=6 --inzone-outzone=5': error returned 1
    2022-06-03 08:27:41Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --protonum=50': error returned 1
    2022-06-03 08:27:41Z 27[APP] [COP-UPDOWN][DB] (db_conn_info) hostname: 'tunnelname' result --> id: '1', mode: 'ntn', tunnel_type: '0', subnet_family:'0'
    2022-06-03 08:27:41Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) !!SKIP!! IPsec IKE for remotes (XGS-FW-WAN-NAT-IP to SG-FW-WAN-IP) already set up
    2022-06-03 08:27:41Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) ---- exec subnet updown -- down --
    2022-06-03 08:27:41Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) [NTN] NTN get actual...
    2022-06-03 08:27:41Z 27[APP] [COP-UPDOWN][DB] (db_query) No data retrieved from query: 'SELECT ( nath.netid  || '/'  || nath.netmask ) AS natedlan FROM   tblvpnconnhostrel AS rel    JOIN tblhost AS h  ON h.hostid = rel.hostid    JOIN tblhost AS nath  ON rel .natedhost = nath.hostid WHERE  rel.connectionid = $1    AND rel.hostlocation = 'L'    AND h.netid = $2    AND h.netmask = $3 LIMIT  1;' status: 2 rows: 0
    2022-06-03 08:27:41Z 27[APP]  
    2022-06-03 08:27:41Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) [IPSEC0] using ipsec dummy interface 'ipsec0'
    2022-06-03 08:27:41Z 27[APP] [COP-UPDOWN][NET] (get_src_ip) source address for XGS-FW-LAN-NET is IP: XGS-FW-LAN-IP 
    2022-06-03 08:27:41Z 27[APP] 
    2022-06-03 08:27:41Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route del xxx.xxx.xxx.xxx/24 dev ipsec0 src XGS-FW-LAN-IP table 220': error returned 2
    2022-06-03 08:27:41Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:41Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:41Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:41Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:41Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:41Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:41Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route flush cache': success 0
    2022-06-03 08:27:41Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route flush cache': success 0
    2022-06-03 08:27:41Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) '/bin/service fwm:vpn_connection_chains -t json -s nosync -b '{"me":"XGS-FW-WAN-NAT-IP","peer":"SG-FW-WAN-IP","mynet":"xxx.xxx.xxx.xxx/25","peernet":"xxx.xxx.xxx.xxx/24","connop":"0","iface":"unknown","myproto":"0","myport":"0","peerproto":"0","peerport":"0","conntype":"ntn","actnet":"","compress":"0","conn_id":"1"}'': success 0
    2022-06-03 08:27:41Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --not-protonum=6 --inzone-outzone=2': error returned 1
    2022-06-03 08:27:41Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --not-protonum=6 --inzone-outzone=5': error returned 1
    2022-06-03 08:27:41Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --protonum=50': error returned 1
    2022-06-03 08:27:41Z 27[APP] [COP-UPDOWN][DB] (db_conn_info) hostname: 'tunnelname' result --> id: '1', mode: 'ntn', tunnel_type: '0', subnet_family:'0'
    2022-06-03 08:27:41Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) !!SKIP!! IPsec IKE for remotes (XGS-FW-WAN-NAT-IP to SG-FW-WAN-IP) already set up
    2022-06-03 08:27:41Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) ---- exec subnet updown -- down --
    2022-06-03 08:27:41Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) [NTN] NTN get actual...
    2022-06-03 08:27:41Z 27[APP] [COP-UPDOWN][DB] (db_query) No data retrieved from query: 'SELECT ( nath.netid  || '/'  || nath.netmask ) AS natedlan FROM   tblvpnconnhostrel AS rel    JOIN tblhost AS h  ON h.hostid = rel.hostid    JOIN tblhost AS nath  ON rel .natedhost = nath.hostid WHERE  rel.connectionid = $1    AND rel.hostlocation = 'L'    AND h.netid = $2    AND h.netmask = $3 LIMIT  1;' status: 2 rows: 0
    2022-06-03 08:27:41Z 27[APP]  
    2022-06-03 08:27:41Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) [IPSEC0] using ipsec dummy interface 'ipsec0'
    2022-06-03 08:27:41Z 27[APP] [COP-UPDOWN][NET] (get_src_ip) source address for xxx.xxx.xxx.xxx is IP: XGS-FW-WAN-NAT-IP 
    2022-06-03 08:27:41Z 27[APP] 
    2022-06-03 08:27:41Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route del xxx.xxx.xxx.xxx/32 dev ipsec0 src XGS-FW-WAN-NAT-IP table 220': error returned 2
    2022-06-03 08:27:41Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:41Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:41Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:41Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:41Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:41Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:41Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route flush cache': success 0
    2022-06-03 08:27:41Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route flush cache': success 0
    2022-06-03 08:27:41Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) '/bin/service fwm:vpn_connection_chains -t json -s nosync -b '{"me":"XGS-FW-WAN-NAT-IP","peer":"SG-FW-WAN-IP","mynet":"xxx.xxx.xxx.xxx/25","peernet":"xxx.xxx.xxx.xxx/32","connop":"0","iface":"unknown","myproto":"0","myport":"0","peerproto":"0","peerport":"0","conntype":"ntn","actnet":"","compress":"0","conn_id":"1"}'': success 0
    2022-06-03 08:27:41Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --not-protonum=6 --inzone-outzone=2': error returned 1
    2022-06-03 08:27:41Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --not-protonum=6 --inzone-outzone=5': error returned 1
    2022-06-03 08:27:41Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --protonum=50': error returned 1
    2022-06-03 08:27:41Z 27[APP] [COP-UPDOWN][DB] (db_conn_info) hostname: 'tunnelname' result --> id: '1', mode: 'ntn', tunnel_type: '0', subnet_family:'0'
    2022-06-03 08:27:41Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) !!SKIP!! IPsec IKE for remotes (XGS-FW-WAN-NAT-IP to SG-FW-WAN-IP) already set up
    2022-06-03 08:27:41Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) ---- exec subnet updown -- down --
    2022-06-03 08:27:41Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) [NTN] NTN get actual...
    2022-06-03 08:27:41Z 27[APP] [COP-UPDOWN][DB] (db_query) No data retrieved from query: 'SELECT ( nath.netid  || '/'  || nath.netmask ) AS natedlan FROM   tblvpnconnhostrel AS rel    JOIN tblhost AS h  ON h.hostid = rel.hostid    JOIN tblhost AS nath  ON rel .natedhost = nath.hostid WHERE  rel.connectionid = $1    AND rel.hostlocation = 'L'    AND h.netid = $2    AND h.netmask = $3 LIMIT  1;' status: 2 rows: 0
    2022-06-03 08:27:41Z 27[APP]  
    2022-06-03 08:27:41Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) [IPSEC0] using ipsec dummy interface 'ipsec0'
    2022-06-03 08:27:41Z 27[APP] [COP-UPDOWN][NET] (get_src_ip) source address for XGS-FW-LAN-IP28 is IP: XGS-FW-WAN-NAT-IP 
    2022-06-03 08:27:41Z 27[APP] 
    2022-06-03 08:27:41Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route del xxx.xxx.xxx.xxx/32 dev ipsec0 src XGS-FW-WAN-NAT-IP table 220': error returned 2
    2022-06-03 08:27:41Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:41Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:41Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:41Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:41Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:41Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:41Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route flush cache': success 0
    2022-06-03 08:27:41Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route flush cache': success 0
    2022-06-03 08:27:42Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) '/bin/service fwm:vpn_connection_chains -t json -s nosync -b '{"me":"XGS-FW-WAN-NAT-IP","peer":"SG-FW-WAN-IP","mynet":"XGS-FW-LAN-IP28/25","peernet":"xxx.xxx.xxx.xxx/32","connop":"0","iface":"unknown","myproto":"0","myport":"0","peerproto":"0","peerport":"0","conntype":"ntn","actnet":"","compress":"0","conn_id":"1"}'': success 0
    2022-06-03 08:27:42Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --not-protonum=6 --inzone-outzone=2': error returned 1
    2022-06-03 08:27:42Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --not-protonum=6 --inzone-outzone=5': error returned 1
    2022-06-03 08:27:42Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --protonum=50': error returned 1
    2022-06-03 08:27:42Z 27[APP] [COP-UPDOWN][DB] (db_conn_info) hostname: 'tunnelname' result --> id: '1', mode: 'ntn', tunnel_type: '0', subnet_family:'0'
    2022-06-03 08:27:42Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) !!SKIP!! IPsec IKE for remotes (XGS-FW-WAN-NAT-IP to SG-FW-WAN-IP) already set up
    2022-06-03 08:27:42Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) ---- exec subnet updown -- down --
    2022-06-03 08:27:42Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) [NTN] NTN get actual...
    2022-06-03 08:27:42Z 27[APP] [COP-UPDOWN][DB] (db_query) No data retrieved from query: 'SELECT ( nath.netid  || '/'  || nath.netmask ) AS natedlan FROM   tblvpnconnhostrel AS rel    JOIN tblhost AS h  ON h.hostid = rel.hostid    JOIN tblhost AS nath  ON rel .natedhost = nath.hostid WHERE  rel.connectionid = $1    AND rel.hostlocation = 'L'    AND h.netid = $2    AND h.netmask = $3 LIMIT  1;' status: 2 rows: 0
    2022-06-03 08:27:42Z 27[APP]  
    2022-06-03 08:27:42Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) [IPSEC0] using ipsec dummy interface 'ipsec0'
    2022-06-03 08:27:42Z 27[APP] [COP-UPDOWN][NET] (get_src_ip) source address for xxx.xxx.xxx.xxx is IP: XGS-FW-WAN-NAT-IP 
    2022-06-03 08:27:42Z 27[APP] 
    2022-06-03 08:27:42Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route del xxx.xxx.xxx.xxx/32 dev ipsec0 src XGS-FW-WAN-NAT-IP table 220': error returned 2
    2022-06-03 08:27:42Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:42Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:42Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:42Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:42Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:42Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:42Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route flush cache': success 0
    2022-06-03 08:27:42Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route flush cache': success 0
    2022-06-03 08:27:42Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) '/bin/service fwm:vpn_connection_chains -t json -s nosync -b '{"me":"XGS-FW-WAN-NAT-IP","peer":"SG-FW-WAN-IP","mynet":"xxx.xxx.xxx.xxx/25","peernet":"xxx.xxx.xxx.xxx/32","connop":"0","iface":"unknown","myproto":"0","myport":"0","peerproto":"0","peerport":"0","conntype":"ntn","actnet":"","compress":"0","conn_id":"1"}'': success 0
    2022-06-03 08:27:42Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --not-protonum=6 --inzone-outzone=2': error returned 1
    2022-06-03 08:27:42Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --not-protonum=6 --inzone-outzone=5': error returned 1
    2022-06-03 08:27:42Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --protonum=50': error returned 1
    2022-06-03 08:27:42Z 27[APP] [COP-UPDOWN][DB] (db_conn_info) hostname: 'tunnelname' result --> id: '1', mode: 'ntn', tunnel_type: '0', subnet_family:'0'
    2022-06-03 08:27:42Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) !!SKIP!! IPsec IKE for remotes (XGS-FW-WAN-NAT-IP to SG-FW-WAN-IP) already set up
    2022-06-03 08:27:42Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) ---- exec subnet updown -- down --
    2022-06-03 08:27:42Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) [NTN] NTN get actual...
    2022-06-03 08:27:42Z 27[APP] [COP-UPDOWN][DB] (db_query) No data retrieved from query: 'SELECT ( nath.netid  || '/'  || nath.netmask ) AS natedlan FROM   tblvpnconnhostrel AS rel    JOIN tblhost AS h  ON h.hostid = rel.hostid    JOIN tblhost AS nath  ON rel .natedhost = nath.hostid WHERE  rel.connectionid = $1    AND rel.hostlocation = 'L'    AND h.netid = $2    AND h.netmask = $3 LIMIT  1;' status: 2 rows: 0
    2022-06-03 08:27:42Z 27[APP]  
    2022-06-03 08:27:42Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) [IPSEC0] using ipsec dummy interface 'ipsec0'
    2022-06-03 08:27:42Z 27[APP] [COP-UPDOWN][NET] (get_src_ip) source address for xxx.xxx.xxx.xxx is IP: XGS-FW-WAN-NAT-IP 
    2022-06-03 08:27:42Z 27[APP] 
    2022-06-03 08:27:42Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route del xxx.xxx.xxx.xxx/32 dev ipsec0 src XGS-FW-WAN-NAT-IP table 220': error returned 2
    2022-06-03 08:27:42Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:42Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:42Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:42Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:42Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:42Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:42Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route flush cache': success 0
    2022-06-03 08:27:42Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route flush cache': success 0
    2022-06-03 08:27:42Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) '/bin/service fwm:vpn_connection_chains -t json -s nosync -b '{"me":"XGS-FW-WAN-NAT-IP","peer":"SG-FW-WAN-IP","mynet":"xxx.xxx.xxx.xxx/25","peernet":"xxx.xxx.xxx.xxx/32","connop":"0","iface":"unknown","myproto":"0","myport":"0","peerproto":"0","peerport":"0","conntype":"ntn","actnet":"","compress":"0","conn_id":"1"}'': success 0
    2022-06-03 08:27:42Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --not-protonum=6 --inzone-outzone=2': error returned 1
    2022-06-03 08:27:42Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --not-protonum=6 --inzone-outzone=5': error returned 1
    2022-06-03 08:27:42Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --protonum=50': error returned 1
    2022-06-03 08:27:42Z 27[APP] [COP-UPDOWN][DB] (db_conn_info) hostname: 'tunnelname' result --> id: '1', mode: 'ntn', tunnel_type: '0', subnet_family:'0'
    2022-06-03 08:27:42Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) !!SKIP!! IPsec IKE for remotes (XGS-FW-WAN-NAT-IP to SG-FW-WAN-IP) already set up
    2022-06-03 08:27:42Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) ---- exec subnet updown -- down --
    2022-06-03 08:27:42Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) [NTN] NTN get actual...
    2022-06-03 08:27:42Z 27[APP] [COP-UPDOWN][DB] (db_query) No data retrieved from query: 'SELECT ( nath.netid  || '/'  || nath.netmask ) AS natedlan FROM   tblvpnconnhostrel AS rel    JOIN tblhost AS h  ON h.hostid = rel.hostid    JOIN tblhost AS nath  ON rel .natedhost = nath.hostid WHERE  rel.connectionid = $1    AND rel.hostlocation = 'L'    AND h.netid = $2    AND h.netmask = $3 LIMIT  1;' status: 2 rows: 0
    2022-06-03 08:27:42Z 27[APP]  
    2022-06-03 08:27:42Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) [IPSEC0] using ipsec dummy interface 'ipsec0'
    2022-06-03 08:27:42Z 27[APP] [COP-UPDOWN][NET] (get_src_ip) source address for xxx.xxx.xxx.xxx is IP: XGS-FW-WAN-NAT-IP 
    2022-06-03 08:27:42Z 27[APP] 
    2022-06-03 08:27:42Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route del xxx.xxx.xxx.xxx/32 dev ipsec0 src XGS-FW-WAN-NAT-IP table 220': error returned 2
    2022-06-03 08:27:42Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:42Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:42Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:42Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:42Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:42Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:42Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route flush cache': success 0
    2022-06-03 08:27:42Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route flush cache': success 0
    2022-06-03 08:27:42Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) '/bin/service fwm:vpn_connection_chains -t json -s nosync -b '{"me":"XGS-FW-WAN-NAT-IP","peer":"SG-FW-WAN-IP","mynet":"xxx.xxx.xxx.xxx/26","peernet":"xxx.xxx.xxx.xxx/32","connop":"0","iface":"unknown","myproto":"0","myport":"0","peerproto":"0","peerport":"0","conntype":"ntn","actnet":"","compress":"0","conn_id":"1"}'': success 0
    2022-06-03 08:27:42Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --not-protonum=6 --inzone-outzone=2': error returned 1
    2022-06-03 08:27:42Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --not-protonum=6 --inzone-outzone=5': error returned 1
    2022-06-03 08:27:42Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --protonum=50': error returned 1
    2022-06-03 08:27:42Z 27[APP] [COP-UPDOWN][DB] (db_conn_info) hostname: 'tunnelname' result --> id: '1', mode: 'ntn', tunnel_type: '0', subnet_family:'0'
    2022-06-03 08:27:42Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) !!SKIP!! IPsec IKE for remotes (XGS-FW-WAN-NAT-IP to SG-FW-WAN-IP) already set up
    2022-06-03 08:27:42Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) ---- exec subnet updown -- down --
    2022-06-03 08:27:42Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) [NTN] NTN get actual...
    2022-06-03 08:27:42Z 27[APP] [COP-UPDOWN][DB] (db_query) No data retrieved from query: 'SELECT ( nath.netid  || '/'  || nath.netmask ) AS natedlan FROM   tblvpnconnhostrel AS rel    JOIN tblhost AS h  ON h.hostid = rel.hostid    JOIN tblhost AS nath  ON rel .natedhost = nath.hostid WHERE  rel.connectionid = $1    AND rel.hostlocation = 'L'    AND h.netid = $2    AND h.netmask = $3 LIMIT  1;' status: 2 rows: 0
    2022-06-03 08:27:42Z 27[APP]  
    2022-06-03 08:27:42Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) [IPSEC0] using ipsec dummy interface 'ipsec0'
    2022-06-03 08:27:42Z 27[APP] [COP-UPDOWN][NET] (get_src_ip) source address for xxx.xxx.xxx.xxx is IP: XGS-FW-WAN-NAT-IP 
    2022-06-03 08:27:42Z 27[APP] 
    2022-06-03 08:27:42Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route del xxx.xxx.xxx.xxx/32 dev ipsec0 src XGS-FW-WAN-NAT-IP table 220': error returned 2
    2022-06-03 08:27:42Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:42Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:42Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:42Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:42Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:42Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:42Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route flush cache': success 0
    2022-06-03 08:27:42Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route flush cache': success 0
    2022-06-03 08:27:42Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) '/bin/service fwm:vpn_connection_chains -t json -s nosync -b '{"me":"XGS-FW-WAN-NAT-IP","peer":"SG-FW-WAN-IP","mynet":"xxx.xxx.xxx.xxx/27","peernet":"xxx.xxx.xxx.xxx/32","connop":"0","iface":"unknown","myproto":"0","myport":"0","peerproto":"0","peerport":"0","conntype":"ntn","actnet":"","compress":"0","conn_id":"1"}'': success 0
    2022-06-03 08:27:42Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --not-protonum=6 --inzone-outzone=2': error returned 1
    2022-06-03 08:27:42Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --not-protonum=6 --inzone-outzone=5': error returned 1
    2022-06-03 08:27:42Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --protonum=50': error returned 1
    2022-06-03 08:27:42Z 27[APP] [COP-UPDOWN][DB] (db_conn_info) hostname: 'tunnelname' result --> id: '1', mode: 'ntn', tunnel_type: '0', subnet_family:'0'
    2022-06-03 08:27:42Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) !!SKIP!! IPsec IKE for remotes (XGS-FW-WAN-NAT-IP to SG-FW-WAN-IP) already set up
    2022-06-03 08:27:42Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) ---- exec subnet updown -- down --
    2022-06-03 08:27:42Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) [NTN] NTN get actual...
    2022-06-03 08:27:42Z 27[APP] [COP-UPDOWN][DB] (db_query) No data retrieved from query: 'SELECT ( nath.netid  || '/'  || nath.netmask ) AS natedlan FROM   tblvpnconnhostrel AS rel    JOIN tblhost AS h  ON h.hostid = rel.hostid    JOIN tblhost AS nath  ON rel .natedhost = nath.hostid WHERE  rel.connectionid = $1    AND rel.hostlocation = 'L'    AND h.netid = $2    AND h.netmask = $3 LIMIT  1;' status: 2 rows: 0
    2022-06-03 08:27:42Z 27[APP]  
    2022-06-03 08:27:42Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) [IPSEC0] using ipsec dummy interface 'ipsec0'
    2022-06-03 08:27:42Z 27[APP] [COP-UPDOWN][NET] (get_src_ip) source address for xxx.xxx.xxx.xxx is IP: XGS-FW-WAN-NAT-IP 
    2022-06-03 08:27:42Z 27[APP] 
    2022-06-03 08:27:42Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route del xxx.xxx.xxx.xxx/32 dev ipsec0 src XGS-FW-WAN-NAT-IP table 220': error returned 2
    2022-06-03 08:27:42Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:42Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:42Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:42Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:42Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:42Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:42Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route flush cache': success 0
    2022-06-03 08:27:42Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route flush cache': success 0
    2022-06-03 08:27:42Z 10[IKE] <tunnelname-1|59> sending retransmit 2 of request message ID 0, seq 1
    2022-06-03 08:27:42Z 10[NET] <tunnelname-1|59> sending packet: from XGS-FW-WAN-NAT-IP[500] to SG-FW-WAN-IP[500] (260 bytes)
    2022-06-03 08:27:42Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) '/bin/service fwm:vpn_connection_chains -t json -s nosync -b '{"me":"XGS-FW-WAN-NAT-IP","peer":"SG-FW-WAN-IP","mynet":"xxx.xxx.xxx.xxx/24","peernet":"xxx.xxx.xxx.xxx/32","connop":"0","iface":"unknown","myproto":"0","myport":"0","peerproto":"0","peerport":"0","conntype":"ntn","actnet":"","compress":"0","conn_id":"1"}'': success 0
    2022-06-03 08:27:42Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --not-protonum=6 --inzone-outzone=2': error returned 1
    2022-06-03 08:27:42Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --not-protonum=6 --inzone-outzone=5': error returned 1
    2022-06-03 08:27:42Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --protonum=50': error returned 1
    2022-06-03 08:27:42Z 27[APP] [COP-UPDOWN][DB] (db_conn_info) hostname: 'tunnelname' result --> id: '1', mode: 'ntn', tunnel_type: '0', subnet_family:'0'
    2022-06-03 08:27:42Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) !!SKIP!! IPsec IKE for remotes (XGS-FW-WAN-NAT-IP to SG-FW-WAN-IP) already set up
    2022-06-03 08:27:42Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) ---- exec subnet updown -- down --
    2022-06-03 08:27:42Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) [NTN] NTN get actual...
    2022-06-03 08:27:42Z 27[APP] [COP-UPDOWN][DB] (db_query) No data retrieved from query: 'SELECT ( nath.netid  || '/'  || nath.netmask ) AS natedlan FROM   tblvpnconnhostrel AS rel    JOIN tblhost AS h  ON h.hostid = rel.hostid    JOIN tblhost AS nath  ON rel .natedhost = nath.hostid WHERE  rel.connectionid = $1    AND rel.hostlocation = 'L'    AND h.netid = $2    AND h.netmask = $3 LIMIT  1;' status: 2 rows: 0
    2022-06-03 08:27:42Z 27[APP]  
    2022-06-03 08:27:42Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) [IPSEC0] using ipsec dummy interface 'ipsec0'
    2022-06-03 08:27:42Z 27[APP] [COP-UPDOWN][NET] (get_src_ip) source address for XGS-FW-LAN-IP28 is IP: XGS-FW-WAN-NAT-IP 
    2022-06-03 08:27:42Z 27[APP] 
    2022-06-03 08:27:43Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route del xxx.xxx.xxx.xxx/32 dev ipsec0 src XGS-FW-WAN-NAT-IP table 220': error returned 2
    2022-06-03 08:27:43Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:43Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:43Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:43Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:43Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:43Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:43Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route flush cache': success 0
    2022-06-03 08:27:43Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route flush cache': success 0
    2022-06-03 08:27:43Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) '/bin/service fwm:vpn_connection_chains -t json -s nosync -b '{"me":"XGS-FW-WAN-NAT-IP","peer":"SG-FW-WAN-IP","mynet":"XGS-FW-LAN-IP28/25","peernet":"xxx.xxx.xxx.xxx/32","connop":"0","iface":"unknown","myproto":"0","myport":"0","peerproto":"0","peerport":"0","conntype":"ntn","actnet":"","compress":"0","conn_id":"1"}'': success 0
    2022-06-03 08:27:43Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --not-protonum=6 --inzone-outzone=2': error returned 1
    2022-06-03 08:27:43Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --not-protonum=6 --inzone-outzone=5': error returned 1
    2022-06-03 08:27:43Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --protonum=50': error returned 1
    2022-06-03 08:27:43Z 27[APP] [COP-UPDOWN][DB] (db_conn_info) hostname: 'tunnelname' result --> id: '1', mode: 'ntn', tunnel_type: '0', subnet_family:'0'
    2022-06-03 08:27:43Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) !!SKIP!! IPsec IKE for remotes (XGS-FW-WAN-NAT-IP to SG-FW-WAN-IP) already set up
    2022-06-03 08:27:43Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) ---- exec subnet updown -- down --
    2022-06-03 08:27:43Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) [NTN] NTN get actual...
    2022-06-03 08:27:43Z 27[APP] [COP-UPDOWN][DB] (db_query) No data retrieved from query: 'SELECT ( nath.netid  || '/'  || nath.netmask ) AS natedlan FROM   tblvpnconnhostrel AS rel    JOIN tblhost AS h  ON h.hostid = rel.hostid    JOIN tblhost AS nath  ON rel .natedhost = nath.hostid WHERE  rel.connectionid = $1    AND rel.hostlocation = 'L'    AND h.netid = $2    AND h.netmask = $3 LIMIT  1;' status: 2 rows: 0
    2022-06-03 08:27:43Z 27[APP]  
    2022-06-03 08:27:43Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) [IPSEC0] using ipsec dummy interface 'ipsec0'
    2022-06-03 08:27:43Z 27[APP] [COP-UPDOWN][NET] (get_src_ip) source address for xxx.xxx.xxx.xxx is IP: XGS-FW-WAN-NAT-IP 
    2022-06-03 08:27:43Z 27[APP] 
    2022-06-03 08:27:43Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route del xxx.xxx.xxx.xxx/24 dev ipsec0 src XGS-FW-WAN-NAT-IP table 220': error returned 2
    2022-06-03 08:27:43Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:43Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:43Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:43Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:43Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:43Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:43Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route flush cache': success 0
    2022-06-03 08:27:43Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route flush cache': success 0
    2022-06-03 08:27:43Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) '/bin/service fwm:vpn_connection_chains -t json -s nosync -b '{"me":"XGS-FW-WAN-NAT-IP","peer":"SG-FW-WAN-IP","mynet":"xxx.xxx.xxx.xxx/27","peernet":"xxx.xxx.xxx.xxx/24","connop":"0","iface":"unknown","myproto":"0","myport":"0","peerproto":"0","peerport":"0","conntype":"ntn","actnet":"","compress":"0","conn_id":"1"}'': success 0
    2022-06-03 08:27:43Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --not-protonum=6 --inzone-outzone=2': error returned 1
    2022-06-03 08:27:43Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --not-protonum=6 --inzone-outzone=5': error returned 1
    2022-06-03 08:27:43Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --protonum=50': error returned 1
    2022-06-03 08:27:43Z 27[APP] [COP-UPDOWN][DB] (db_conn_info) hostname: 'tunnelname' result --> id: '1', mode: 'ntn', tunnel_type: '0', subnet_family:'0'
    2022-06-03 08:27:43Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) !!SKIP!! IPsec IKE for remotes (XGS-FW-WAN-NAT-IP to SG-FW-WAN-IP) already set up
    2022-06-03 08:27:43Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) ---- exec subnet updown -- down --
    2022-06-03 08:27:43Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) [NTN] NTN get actual...
    2022-06-03 08:27:43Z 27[APP] [COP-UPDOWN][DB] (db_query) No data retrieved from query: 'SELECT ( nath.netid  || '/'  || nath.netmask ) AS natedlan FROM   tblvpnconnhostrel AS rel    JOIN tblhost AS h  ON h.hostid = rel.hostid    JOIN tblhost AS nath  ON rel .natedhost = nath.hostid WHERE  rel.connectionid = $1    AND rel.hostlocation = 'L'    AND h.netid = $2    AND h.netmask = $3 LIMIT  1;' status: 2 rows: 0
    2022-06-03 08:27:43Z 27[APP]  
    2022-06-03 08:27:43Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) [IPSEC0] using ipsec dummy interface 'ipsec0'
    2022-06-03 08:27:43Z 27[APP] [COP-UPDOWN][NET] (get_src_ip) source address for xxx.xxx.xxx.xxx is IP: XGS-FW-WAN-NAT-IP 
    2022-06-03 08:27:43Z 27[APP] 
    2022-06-03 08:27:43Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route del xxx.xxx.xxx.xxx/32 dev ipsec0 src XGS-FW-WAN-NAT-IP table 220': error returned 2
    2022-06-03 08:27:43Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:43Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:43Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:43Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:43Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:43Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:43Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route flush cache': success 0
    2022-06-03 08:27:43Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route flush cache': success 0
    2022-06-03 08:27:43Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) '/bin/service fwm:vpn_connection_chains -t json -s nosync -b '{"me":"XGS-FW-WAN-NAT-IP","peer":"SG-FW-WAN-IP","mynet":"xxx.xxx.xxx.xxx/27","peernet":"xxx.xxx.xxx.xxx/32","connop":"0","iface":"unknown","myproto":"0","myport":"0","peerproto":"0","peerport":"0","conntype":"ntn","actnet":"","compress":"0","conn_id":"1"}'': success 0
    2022-06-03 08:27:43Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --not-protonum=6 --inzone-outzone=2': error returned 1
    2022-06-03 08:27:43Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --not-protonum=6 --inzone-outzone=5': error returned 1
    2022-06-03 08:27:43Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --protonum=50': error returned 1
    2022-06-03 08:27:43Z 27[APP] [COP-UPDOWN][DB] (db_conn_info) hostname: 'tunnelname' result --> id: '1', mode: 'ntn', tunnel_type: '0', subnet_family:'0'
    2022-06-03 08:27:43Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) !!SKIP!! IPsec IKE for remotes (XGS-FW-WAN-NAT-IP to SG-FW-WAN-IP) already set up
    2022-06-03 08:27:43Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) ---- exec subnet updown -- down --
    2022-06-03 08:27:43Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) [NTN] NTN get actual...
    2022-06-03 08:27:43Z 27[APP] [COP-UPDOWN][DB] (db_query) No data retrieved from query: 'SELECT ( nath.netid  || '/'  || nath.netmask ) AS natedlan FROM   tblvpnconnhostrel AS rel    JOIN tblhost AS h  ON h.hostid = rel.hostid    JOIN tblhost AS nath  ON rel .natedhost = nath.hostid WHERE  rel.connectionid = $1    AND rel.hostlocation = 'L'    AND h.netid = $2    AND h.netmask = $3 LIMIT  1;' status: 2 rows: 0
    2022-06-03 08:27:43Z 27[APP]  
    2022-06-03 08:27:43Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) [IPSEC0] using ipsec dummy interface 'ipsec0'
    2022-06-03 08:27:43Z 27[APP] [COP-UPDOWN][NET] (get_src_ip) source address for xxx.xxx.xxx.xxx is IP: XGS-FW-WAN-NAT-IP 
    2022-06-03 08:27:43Z 27[APP] 
    2022-06-03 08:27:43Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route del xxx.xxx.xxx.xxx/32 dev ipsec0 src XGS-FW-WAN-NAT-IP table 220': error returned 2
    2022-06-03 08:27:43Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:43Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:43Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:43Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:43Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:43Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:43Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route flush cache': success 0
    2022-06-03 08:27:43Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route flush cache': success 0
    2022-06-03 08:27:43Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) '/bin/service fwm:vpn_connection_chains -t json -s nosync -b '{"me":"XGS-FW-WAN-NAT-IP","peer":"SG-FW-WAN-IP","mynet":"xxx.xxx.xxx.xxx/24","peernet":"xxx.xxx.xxx.xxx/32","connop":"0","iface":"unknown","myproto":"0","myport":"0","peerproto":"0","peerport":"0","conntype":"ntn","actnet":"","compress":"0","conn_id":"1"}'': success 0
    2022-06-03 08:27:43Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --not-protonum=6 --inzone-outzone=2': error returned 1
    2022-06-03 08:27:43Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --not-protonum=6 --inzone-outzone=5': error returned 1
    2022-06-03 08:27:43Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --protonum=50': error returned 1
    2022-06-03 08:27:43Z 27[APP] [COP-UPDOWN][DB] (db_conn_info) hostname: 'tunnelname' result --> id: '1', mode: 'ntn', tunnel_type: '0', subnet_family:'0'
    2022-06-03 08:27:43Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) ---- exec remote updown -- down --
    2022-06-03 08:27:43Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) '/bin/service fwm:vpn_gateway_chains -t json -s nosync -b '{"local_server":"XGS-FW-WAN-NAT-IP","remote_server":"SG-FW-WAN-IP","action":"disable","family":"0","conntype":"ntn","compress":"0"}'': success 0
    2022-06-03 08:27:43Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) ---- exec subnet updown -- down --
    2022-06-03 08:27:43Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) [NTN] NTN get actual...
    2022-06-03 08:27:43Z 27[APP] [COP-UPDOWN][DB] (db_query) No data retrieved from query: 'SELECT ( nath.netid  || '/'  || nath.netmask ) AS natedlan FROM   tblvpnconnhostrel AS rel    JOIN tblhost AS h  ON h.hostid = rel.hostid    JOIN tblhost AS nath  ON rel .natedhost = nath.hostid WHERE  rel.connectionid = $1    AND rel.hostlocation = 'L'    AND h.netid = $2    AND h.netmask = $3 LIMIT  1;' status: 2 rows: 0
    2022-06-03 08:27:43Z 27[APP]  
    2022-06-03 08:27:43Z 27[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) [IPSEC0] using ipsec dummy interface 'ipsec0'
    2022-06-03 08:27:43Z 27[APP] [COP-UPDOWN][NET] (get_src_ip) source address for xxx.xxx.xxx.xxx is IP: XGS-FW-WAN-NAT-IP 
    2022-06-03 08:27:43Z 27[APP] 
    2022-06-03 08:27:43Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route del xxx.xxx.xxx.xxx/32 dev ipsec0 src XGS-FW-WAN-NAT-IP table 220': error returned 2
    2022-06-03 08:27:43Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:43Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:43Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:43Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:43Z 27[APP] [COP-UPDOWN] (add_routes) [tunnelname][ipsec0] route del xxx.xxx.xxx.xxx 255.255.255.0
    2022-06-03 08:27:43Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'route del -net xxx.xxx.xxx.xxx netmask 255.255.255.0 dev ipsec0': error returned 1
    2022-06-03 08:27:43Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route flush cache': success 0
    2022-06-03 08:27:43Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route flush cache': success 0
    2022-06-03 08:27:43Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) '/bin/service fwm:vpn_connection_chains -t json -s nosync -b '{"me":"XGS-FW-WAN-NAT-IP","peer":"SG-FW-WAN-IP","mynet":"xxx.xxx.xxx.xxx/27","peernet":"xxx.xxx.xxx.xxx/32","connop":"0","iface":"unknown","myproto":"0","myport":"0","peerproto":"0","peerport":"0","conntype":"ntn","actnet":"","compress":"0","conn_id":"1"}'': success 0
    2022-06-03 08:27:43Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --not-protonum=6 --inzone-outzone=2': error returned 1
    2022-06-03 08:27:44Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --not-protonum=6 --inzone-outzone=5': error returned 1
    2022-06-03 08:27:44Z 27[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --protonum=50': error returned 1
    2022-06-03 08:27:55Z 27[IKE] <tunnelname-1|59> sending retransmit 3 of request message ID 0, seq 1
    2022-06-03 08:27:55Z 27[NET] <tunnelname-1|59> sending packet: from XGS-FW-WAN-NAT-IP[500] to SG-FW-WAN-IP[500] (260 bytes)
    2022-06-03 08:28:05Z 10[NET] <tunnelname-1|59> received packet: from SG-FW-WAN-IP[500] to XGS-FW-WAN-NAT-IP[500] (176 bytes)
    2022-06-03 08:28:05Z 10[ENC] <tunnelname-1|59> parsed ID_PROT response 0 [ SA V V V V V ]
    2022-06-03 08:28:05Z 10[IKE] <tunnelname-1|59> received strongSwan vendor ID
    2022-06-03 08:28:05Z 10[IKE] <tunnelname-1|59> received Cisco Unity vendor ID
    2022-06-03 08:28:05Z 10[IKE] <tunnelname-1|59> received XAuth vendor ID
    2022-06-03 08:28:05Z 10[IKE] <tunnelname-1|59> received DPD vendor ID
    2022-06-03 08:28:05Z 10[IKE] <tunnelname-1|59> received NAT-T (RFC 3947) vendor ID
    2022-06-03 08:28:05Z 10[ENC] <tunnelname-1|59> generating ID_PROT request 0 [ KE No NAT-D NAT-D ]
    2022-06-03 08:28:05Z 10[NET] <tunnelname-1|59> sending packet: from XGS-FW-WAN-NAT-IP[500] to SG-FW-WAN-IP[500] (556 bytes)
    2022-06-03 08:28:05Z 19[NET] <tunnelname-1|59> received packet: from SG-FW-WAN-IP[500] to XGS-FW-WAN-NAT-IP[500] (176 bytes)
    2022-06-03 08:28:05Z 19[ENC] <tunnelname-1|59> parsed ID_PROT response 0 [ SA V V V V V ]
    2022-06-03 08:28:05Z 19[IKE] <tunnelname-1|59> received strongSwan vendor ID
    2022-06-03 08:28:05Z 19[IKE] <tunnelname-1|59> received Cisco Unity vendor ID
    2022-06-03 08:28:05Z 19[IKE] <tunnelname-1|59> received XAuth vendor ID
    2022-06-03 08:28:05Z 19[IKE] <tunnelname-1|59> received DPD vendor ID
    2022-06-03 08:28:05Z 19[IKE] <tunnelname-1|59> received NAT-T (RFC 3947) vendor ID
    2022-06-03 08:28:05Z 19[IKE] <tunnelname-1|59> KE payload missing in message
    2022-06-03 08:28:05Z 19[ENC] <tunnelname-1|59> generating INFORMATIONAL_V1 request 2369901150 [ N(CRIT) ]
    2022-06-03 08:28:05Z 19[NET] <tunnelname-1|59> sending packet: from XGS-FW-WAN-NAT-IP[500] to SG-FW-WAN-IP[500] (56 bytes)
    2022-06-03 08:28:05Z 19[IKE] <tunnelname-1|59> ### destroy: 0x7f7598028900
    2022-06-03 08:28:05Z 19[IKE] <tunnelname-1|59> ### destroy: 0x7f7598028040
    2022-06-03 08:28:05Z 19[IKE] <tunnelname-1|59> ### destroy: 0x7f7598028b80
    2022-06-03 08:28:05Z 19[IKE] <tunnelname-1|59> ### destroy: 0x7f75980282c0
    2022-06-03 08:28:05Z 19[IKE] <tunnelname-1|59> ### destroy: 0x7f75980287c0
    2022-06-03 08:28:05Z 19[IKE] <tunnelname-1|59> ### destroy: 0x7f7598028680
    2022-06-03 08:28:05Z 19[IKE] <tunnelname-1|59> ### destroy: 0x7f7598029080
    2022-06-03 08:28:05Z 19[IKE] <tunnelname-1|59> ### destroy: 0x7f7598029440
    2022-06-03 08:28:05Z 19[IKE] <tunnelname-1|59> ### destroy: 0x7f7598028f40
    2022-06-03 08:28:05Z 19[IKE] <tunnelname-1|59> ### destroy: 0x7f75980291c0
    2022-06-03 08:28:05Z 19[IKE] <tunnelname-1|59> ### destroy: 0x7f7598029300
    2022-06-03 08:28:05Z 19[IKE] <tunnelname-1|59> ### destroy: 0x7f759802ae80
    2022-06-03 08:28:05Z 19[IKE] <tunnelname-1|59> ### destroy: 0x7f7598029580
    2022-06-03 08:28:05Z 19[IKE] <tunnelname-1|59> ### destroy: 0x7f759802ad40
    2022-06-03 08:28:05Z 19[IKE] <tunnelname-1|59> ### destroy: 0x7f75980296c0
    2022-06-03 08:28:05Z 19[IKE] <tunnelname-1|59> ### destroy: 0x7f759802ac00
    2022-06-03 08:28:05Z 19[IKE] <tunnelname-1|59> ### destroy: 0x7f759802aac0
    2022-06-03 08:28:05Z 19[IKE] <tunnelname-1|59> ### destroy: 0x7f759802a980
    2022-06-03 08:28:05Z 19[IKE] <tunnelname-1|59> ### destroy: 0x7f759802a840
    2022-06-03 08:28:05Z 19[IKE] <tunnelname-1|59> ### destroy: 0x7f759802a700
    2022-06-03 08:28:05Z 19[IKE] <tunnelname-1|59> ### destroy: 0x7f759802a5c0
    2022-06-03 08:28:05Z 19[IKE] <tunnelname-1|59> ### destroy: 0x7f759802a480
    2022-06-03 08:28:05Z 19[IKE] <tunnelname-1|59> ### destroy: 0x7f759802a340
    2022-06-03 08:28:05Z 19[IKE] <tunnelname-1|59> ### destroy: 0x7f759802a200
    2022-06-03 08:28:05Z 19[IKE] <tunnelname-1|59> ### destroy: 0x7f759802a0c0
    2022-06-03 08:28:05Z 19[IKE] <tunnelname-1|59> ### destroy: 0x7f7598029f80
    2022-06-03 08:28:05Z 19[IKE] <tunnelname-1|59> ### destroy: 0x7f7598024720
    2022-06-03 08:28:05Z 19[IKE] <tunnelname-1|59> ### destroy: 0x7f7598029e40
    2022-06-03 08:28:05Z 19[IKE] <tunnelname-1|59> ### destroy: 0x7f7598029d00
    2022-06-03 08:28:05Z 19[IKE] <tunnelname-1|59> ### destroy: 0x7f7598029bc0
    2022-06-03 08:28:05Z 19[IKE] <tunnelname-1|59> ### destroy: 0x7f7598029a80
    2022-06-03 08:28:05Z 19[IKE] <tunnelname-1|59> ### destroy: 0x7f7598029940
    2022-06-03 08:28:05Z 19[IKE] <tunnelname-1|59> ### destroy: 0x7f7598029800
    2022-06-03 08:28:05Z 19[IKE] <tunnelname-1|59> ### destroy: 0x7f7598028e00
    2022-06-03 08:28:05Z 19[IKE] <tunnelname-1|59> ### destroy: 0x7f7598028cc0
    2022-06-03 08:28:05Z 19[IKE] <tunnelname-1|59> ### destroy: 0x7f7598028540
    2022-06-03 08:28:05Z 19[IKE] <tunnelname-1|59> ### destroy: 0x7f7598028400
    2022-06-03 08:28:05Z 19[IKE] <tunnelname-1|59> ### destroy: 0x7f7598028180
    2022-06-03 08:28:05Z 19[IKE] <tunnelname-1|59> ### destroy: 0x7f7598027f00
    2022-06-03 08:28:05Z 19[IKE] <tunnelname-1|59> ### destroy: 0x7f7598027dc0
    2022-06-03 08:28:05Z 19[IKE] <tunnelname-1|59> ### destroy: 0x7f7598027c80
    2022-06-03 08:28:05Z 19[IKE] <tunnelname-1|59> ### destroy: 0x7f7598027b40
    2022-06-03 08:28:05Z 19[IKE] <tunnelname-1|59> ### destroy: 0x7f7598027a00
    2022-06-03 08:28:05Z 19[IKE] <tunnelname-1|59> ### destroy: 0x7f75980278c0
    2022-06-03 08:28:05Z 19[IKE] <tunnelname-1|59> ### destroy: 0x7f7598027780
    2022-06-03 08:28:05Z 19[IKE] <tunnelname-1|59> ### destroy: 0x7f7598027640
    2022-06-03 08:28:05Z 19[IKE] <tunnelname-1|59> ### destroy: 0x7f7598027500
    2022-06-03 08:28:05Z 19[IKE] <tunnelname-1|59> ### destroy: 0x7f75980273c0
    2022-06-03 08:28:05Z 19[IKE] <tunnelname-1|59> ### destroy: 0x7f7598027280
    2022-06-03 08:28:05Z 19[IKE] <tunnelname-1|59> ### destroy: 0x7f7598027140
    2022-06-03 08:28:05Z 19[IKE] <tunnelname-1|59> ### destroy: 0x7f7598027000
    2022-06-03 08:28:05Z 19[IKE] <tunnelname-1|59> ### destroy: 0x7f7598026ec0
    2022-06-03 08:28:05Z 19[IKE] <tunnelname-1|59> ### destroy: 0x7f7598026d80
    2022-06-03 08:28:05Z 19[IKE] <tunnelname-1|59> ### destroy: 0x7f7598026c40
    2022-06-03 08:28:05Z 19[IKE] <tunnelname-1|59> ### destroy: 0x7f7598026b00
    2022-06-03 08:28:05Z 19[IKE] <tunnelname-1|59> ### destroy: 0x7f75980269c0
    2022-06-03 08:28:05Z 19[IKE] <tunnelname-1|59> ### destroy: 0x7f7598026880
    2022-06-03 08:28:05Z 19[IKE] <tunnelname-1|59> ### destroy: 0x7f7598026740
    2022-06-03 08:28:05Z 19[IKE] <tunnelname-1|59> ### destroy: 0x7f7598026600
    2022-06-03 08:28:05Z 19[IKE] <tunnelname-1|59> ### destroy: 0x7f7598025260
    2022-06-03 08:28:05Z 19[IKE] <tunnelname-1|59> ### destroy: 0x7f7598025120
    2022-06-03 08:28:05Z 19[IKE] <tunnelname-1|59> ### destroy: 0x7f7598024fe0
    2022-06-03 08:28:05Z 19[IKE] <tunnelname-1|59> ### destroy: 0x7f7598024ea0
    2022-06-03 08:28:05Z 19[IKE] <tunnelname-1|59> ### destroy: 0x7f7598023e90
    2022-06-03 08:28:05Z 19[IKE] <tunnelname-1|59> ### destroy: 0x7f7598023d50
    2022-06-03 08:28:05Z 19[IKE] <tunnelname-1|59> ### destroy: 0x7f7598025840
    2022-06-03 08:28:05Z 19[IKE] <tunnelname-1|59> ### destroy: 0x7f75980240c0
    2022-06-03 08:28:05Z 19[IKE] <tunnelname-1|59> ### destroy: 0x7f7598024ba0
    2022-06-03 08:28:05Z 19[IKE] <tunnelname-1|59> ### destroy: 0x7f7598025ea0
    2022-06-03 08:28:05Z 19[IKE] <tunnelname-1|59> ### destroy: 0x7f7598023bf0
    2022-06-03 08:28:05Z 14[DMN] [GARNER-LOGGING] (child_alert) ALERT: received IKE message with invalid SPI (D7A8E280) from other side
    2022-06-03 08:28:12Z 10[DMN] [GARNER-LOGGING] (child_alert) ALERT: received IKE message with invalid SPI (D7A8E280) from other side
    2022-06-03 08:28:15Z 14[DMN] [GARNER-LOGGING] (child_alert) ALERT: received IKE message with invalid SPI (D7A8E280) from other side
    2022-06-03 08:28:35Z 27[DMN] [GARNER-LOGGING] (child_alert) ALERT: received IKE message with invalid SPI (D7A8E280) from other side
    XGS136_XN01_SFOS 18.5.3 MR-3-Build408# 
    XGS136_XN01_SFOS 18.5.3 MR-3-Build408#
    
    XGS136_XN01_SFOS 18.5.3 MR-3-Build408# grep "2022-06-04" /log/strongswan.log |more
    XGS136_XN01_SFOS 18.5.3 MR-3-Build408# grep "2022-06-05" /log/strongswan.log |more
    XGS136_XN01_SFOS 18.5.3 MR-3-Build408# grep "2022-06-06" /log/strongswan.log |more
    2022-06-06 07:29:26Z 10[KNL] interface spq deleted
    XGS136_XN01_SFOS 18.5.3 MR-3-Build408# grep "2022-06-07" /log/strongswan.log |more
    2022-06-07 11:30:34Z 31[KNL] interface spq deleted
    2022-06-07 14:58:12Z 14[CFG] rereading secrets
    2022-06-07 14:58:12Z 14[CFG] loading secrets from '/_conf/ipsec/ipsec.secrets'
    2022-06-07 14:58:12Z 14[CFG] get_nsg_context tblvpnconnection:ipsec
    2022-06-07 14:58:12Z 14[CFG] loading secrets from '/_conf/ipsec/connections/tunnelname.secrets'
    2022-06-07 14:58:12Z 14[CFG] get_nsg_context tblvpnconnection:tunnelname
    2022-06-07 14:58:12Z 14[CFG]   loaded RSA private key from '/cfs/ipsec.privatekey'
    2022-06-07 14:58:12Z 18[CFG] rereading ca certificates from '/_conf/ipsec/ipsec.d/cacerts'
    2022-06-07 14:58:12Z 27[CFG] vici initiate 'tunnelname-70'
    2022-06-07 14:58:12Z 19[IKE] <tunnelname-1|60> ### queue_child invoking quick_mode_create
    2022-06-07 14:58:12Z 19[IKE] <tunnelname-1|60> ### quick_mode_create: 0x7f7594006b00 config 0x7f758c002c80
    2022-06-07 14:58:12Z 19[IKE] <tunnelname-1|60> initiating Main Mode IKE_SA tunnelname-1[60] to SG-FW-WAN-IP
    2022-06-07 14:58:12Z 19[ENC] <tunnelname-1|60> generating ID_PROT request 0 [ SA V V V V V V ]
    2022-06-07 14:58:12Z 19[NET] <tunnelname-1|60> sending packet: from XGS-FW-WAN-NAT-IP[500] to SG-FW-WAN-IP[500] (260 bytes)
    2022-06-07 14:58:12Z 10[NET] <tunnelname-1|60> received packet: from SG-FW-WAN-IP[500] to XGS-FW-WAN-NAT-IP[500] (176 bytes)
    2022-06-07 14:58:12Z 10[ENC] <tunnelname-1|60> parsed ID_PROT response 0 [ SA V V V V V ]
    2022-06-07 14:58:12Z 10[IKE] <tunnelname-1|60> received strongSwan vendor ID
    2022-06-07 14:58:12Z 10[IKE] <tunnelname-1|60> received Cisco Unity vendor ID
    2022-06-07 14:58:12Z 10[IKE] <tunnelname-1|60> received XAuth vendor ID
    2022-06-07 14:58:12Z 10[IKE] <tunnelname-1|60> received DPD vendor ID
    ...
    ...

  • the issue happened again. Tunnel went down over the weekend and did not came up again. XGS is online and can be managed remotely.

    Time,Log comp,Status,Username,Message,Message ID,
    2022-06-13 09:25:37,IPSec ,Successful,,IPSec tunnel up notification mail sent successfully for Connection tunnelname between ...
    2022-06-13 09:25:17,IPSec ,Established,,tunnelname-1 - IPSec Connection tunnelname-1 between ...
    ...
    ...
    2022-06-13 09:24:37,IPSec ,Established,,tunnelname-1 - IPSec Connection tunnelname-1 between ...
    tunnel manually started
    2022-06-11 12:36:25,IPSec ,Failed,,IKE message (D0003E10) retransmission to SG-FW-WAN-GW timed out,18055,
    2022-06-11 12:33:33,IPSec ,Deny,,received IKE message with invalid SPI (BD0484C7) from other side,18050,
    2022-06-11 12:33:23,IPSec ,Deny,,received IKE message with invalid SPI (BD0484C7) from other side,18050,
    2022-06-11 12:33:22,IPSec ,Deny,,received IKE message with invalid SPI (BD0484C7) from other side,18050,
    2022-06-11 12:33:02,IPSec ,Deny,,received IKE message with invalid SPI (BD0484C7) from other side,18050,
    2022-06-11 12:32:52,IPSec ,Deny,,received IKE message with invalid SPI (BD0484C7) from other side,18050,
    2022-06-11 12:32:31,IPSec ,Successful,,IPSec tunnel down notification mail sent successfully for Connection tunnelname between ...
    2022-06-11 12:32:12,IPSec ,Deny,,received IKE message with invalid SPI (B9F61442) from other side,18050,
    2022-06-11 12:31:31,IPSec ,Terminated,,tunnelname-1 - IPSec Connection tunnelname-1 between ...
    2022-06-11 12:31:31,IPSec ,Terminated,,tunnelname-1 - IPSec Connection tunnelname-1 between ...
    ...
    ...
    2022-06-11 12:31:31,IPSec ,Terminated,,tunnelname-1 - IPSec Connection tunnelname-1 between ...
    2022-06-11 12:31:31,IPSec ,Terminated,,tunnelname-1 - IPSec Connection tunnelname-1 between ...
    2022-06-11 12:31:31,IPSec ,Failed,,tunnelname-1 - IKE message retransmission timed out (Remote: SG-FW-WAN-GW),18055,
    2022-06-11 12:31:31,IPSec ,Failed,,tunnelname-1 - IKE message retransmission timed out (Remote: SG-FW-WAN-GW),18055,
    ...
    ...
    2022-06-11 12:31:31,IPSec ,Failed,,tunnelname-1 - IKE message retransmission timed out (Remote: SG-FW-WAN-GW),18055,
    2022-06-11 12:31:31,IPSec ,Failed,,tunnelname-1 - IKE message retransmission timed out (Remote: SG-FW-WAN-GW),18055,
    2022-06-11 12:29:26,IPSec ,Failed,,tunnelname-1 - parsing IKE message from SG-FW-WAN-GW[4500] failed (Remote: SG-FW-WAN-GW),18052,
    2022-06-11 12:29:26,IPSec ,Failed,,tunnelname-1 - parsing IKE message from SG-FW-WAN-GW[4500] failed (Remote: SG-FW-WAN-GW),18052,
    ...
    ...
    2022-06-11 12:20:11,IPSec ,Failed,,tunnelname-1 - parsing IKE message from SG-FW-WAN-GW[4500] failed (Remote: SG-FW-WAN-GW),18052,
    2022-06-11 12:20:11,IPSec ,Failed,,tunnelname-1 - parsing IKE message from SG-FW-WAN-GW[4500] failed (Remote: SG-FW-WAN-GW),18052,
    2022-06-11 11:59:23,IPSec ,Deny,,received IKE message with invalid SPI (93EAD82B) from other side,18050,
    2022-06-11 11:16:37,IPSec ,Deny,,received IKE message with invalid SPI (77C84437) from other side,18050,
    ...
    ...
    2022-06-11 02:40:20,IPSec ,Deny,,received IKE message with invalid SPI (E3D174F3) from other side,18050,
    2022-06-11 01:52:03,IPSec ,Deny,,received IKE message with invalid SPI (10C1EBA8) from other side,18050,
    2022-06-11 01:05:25,IPSec ,Deny,,received IKE message with invalid SPI (F5746F19) from other side,18050,
    2022-06-11 00:19:51,IPSec ,Deny,,received IKE message with invalid SPI (1641E110) from other side,18050,
    2022-06-10 23:36:46,IPSec ,Deny,,received IKE message with invalid SPI (5C414B92) from other side,18050,
    ...
    ...
    2022-06-10 04:23:17,IPSec ,Deny,,received IKE message with invalid SPI (17F724EC) from other side,18050,
    2022-06-10 03:33:48,IPSec ,Deny,,received IKE message with invalid SPI (386A0BAA) from other side,18050,
    2022-06-10 02:46:12,IPSec ,Deny,,received IKE message with invalid SPI (1B365F1E) from other side,18050,
    2022-06-10 01:56:54,IPSec ,Deny,,received IKE message with invalid SPI (7E536162) from other side,18050,
    2022-06-10 01:08:20,IPSec ,Deny,,received IKE message with invalid SPI (B12D4C8B) from other side,18050,
    2022-06-10 00:24:59,IPSec ,Deny,,received IKE message with invalid SPI (9737CEB0) from other side,18050,
    2022-06-09 23:35:42,IPSec ,Deny,,received IKE message with invalid SPI (691CA2E9) from other side,18050,
    2022-06-09 22:45:53,IPSec ,Deny,,received IKE message with invalid SPI (74C01EA7) from other side,18050,
    ...
    ...
    2022-06-09 03:53:51,IPSec ,Deny,,received IKE message with invalid SPI (75A6DDEC) from other side,18050,
    2022-06-09 03:06:41,IPSec ,Deny,,received IKE message with invalid SPI (4AFE4D5) from other side,18050,
    2022-06-09 02:18:42,IPSec ,Deny,,received IKE message with invalid SPI (7C46C17) from other side,18050,
    2022-06-09 01:31:05,IPSec ,Deny,,received IKE message with invalid SPI (167FD14) from other side,18050,
    2022-06-09 00:44:27,IPSec ,Deny,,received IKE message with invalid SPI (863CB467) from other side,18050,
    2022-06-09 00:00:25,IPSec ,Deny,,received IKE message with invalid SPI (4FD7AB14) from other side,18050,
    2022-06-08 23:17:54,IPSec ,Deny,,received IKE message with invalid SPI (53BFD2CE) from other side,18050,
    2022-06-08 22:33:33,IPSec ,Deny,,received IKE message with invalid SPI (D5E04A6E) from other side,18050,
    2022-06-08 21:50:24,IPSec ,Deny,,received IKE message with invalid SPI (BFB1B60B) from other side,18050,
    2022-06-08 21:00:14,IPSec ,Deny,,received IKE message with invalid SPI (FA8DCF5B) from other side,18050,
    ...
    ...
    2022-06-08 10:08:45,IPSec ,Deny,,received IKE message with invalid SPI (9AB0E757) from other side,18050,
    2022-06-08 09:17:53,IPSec ,Deny,,received IKE message with invalid SPI (8ADE3A3E) from other side,18050,
    2022-06-08 08:29:30,IPSec ,Deny,,received IKE message with invalid SPI (C51323F6) from other side,18050,
    2022-06-08 07:40:08,IPSec ,Deny,,received IKE message with invalid SPI (4ABDC244) from other side,18050,
    2022-06-08 07:12:19,IPSec ,Failed,,tunnelname-1 - parsing IKE message from SG-FW-WAN-GW[4500] failed (Remote: SG-FW-WAN-GW),18052,
    2022-06-08 07:12:19,IPSec ,Failed,,tunnelname-1 - parsing IKE message from SG-FW-WAN-GW[4500] failed (Remote: SG-FW-WAN-GW),18052,
    2022-06-08 07:12:19,IPSec ,Failed,,tunnelname-1 - parsing IKE message from SG-FW-WAN-GW[4500] failed (Remote: SG-FW-WAN-GW),18052,
    ...
    ...
    2022-06-08 07:11:59,IPSec ,Failed,,tunnelname-1 - parsing IKE message from SG-FW-WAN-GW[4500] failed (Remote: SG-FW-WAN-GW),18052,
    2022-06-08 07:11:59,IPSec ,Failed,,tunnelname-1 - parsing IKE message from SG-FW-WAN-GW[4500] failed (Remote: SG-FW-WAN-GW),18052,
    2022-06-08 07:11:59,IPSec ,Failed,,tunnelname-1 - parsing IKE message from SG-FW-WAN-GW[4500] failed (Remote: SG-FW-WAN-GW),18052,
    2022-06-08 06:53:26,IPSec ,Deny,,received IKE message with invalid SPI (840F6761) from other side,18050,
    ...
    ...
    2022-06-07 19:33:30,IPSec ,Deny,,received IKE message with invalid SPI (550ED1D0) from other side,18050,
    2022-06-07 18:44:17,IPSec ,Deny,,received IKE message with invalid SPI (F781FA0E) from other side,18050,
    2022-06-07 17:54:20,IPSec ,Failed,,tunnelname-1 - parsing IKE message from SG-FW-WAN-GW[4500] failed (Remote: SG-FW-WAN-GW),18052,
    2022-06-07 17:54:20,IPSec ,Failed,,tunnelname-1 - parsing IKE message from SG-FW-WAN-GW[4500] failed (Remote: SG-FW-WAN-GW),18052,
    ...
    ...
    2022-06-07 17:54:00,IPSec ,Failed,,tunnelname-1 - parsing IKE message from SG-FW-WAN-GW[4500] failed (Remote: SG-FW-WAN-GW),18052,
    2022-06-07 17:54:00,IPSec ,Failed,,tunnelname-1 - parsing IKE message from SG-FW-WAN-GW[4500] failed (Remote: SG-FW-WAN-GW),18052,
    2022-06-07 17:53:53,IPSec ,Deny,,received IKE message with invalid SPI (64CFB028) from other side,18050,
    2022-06-07 16:58:52,IPSec ,Established,,tunnelname-1 - IPSec Connection tunnelname-1 between ...
    2022-06-07 16:58:51,IPSec ,Established,,tunnelname-1 - IPSec Connection tunnelname-1 between ...
    2022-06-07 16:58:51,IPSec ,Established,,tunnelname-1 - IPSec Connection tunnelname-1 between ...
    2022-06-07 16:58:50,IPSec ,Established,,tunnelname-1 - IPSec Connection tunnelname-1 between ...
    2022-06-07 16:58:50,IPSec ,Established,,tunnelname-1 - IPSec Connection tunnelname-1 between ...
    2022-06-07 16:58:49,IPSec ,Established,,tunnelname-1 - IPSec Connection tunnelname-1 between ...
    2022-06-07 16:58:49,IPSec ,Established,,tunnelname-1 - IPSec Connection tunnelname-1 between ...
    2022-06-07 16:58:48,IPSec ,Established,,tunnelname-1 - IPSec Connection tunnelname-1 between ...
    Tunnel manually started
    

    Any idea on that issue?

  • Looks like the appliance tried it but could not build up the tunnel. Take a look at both ipsec logs on CLI to see the actual output. 

    __________________________________________________________________________________________________________________

  • I'll see if I can find somethin interesting. But I don't expect so.

    If there was some "real" issue, I'd expect it would also fail to connect the tunnel when I click on the red dot to connect manually.

  • It was the same behaviour as last time. The initiating XGS stopped any re-connects to the SG firewall after some time. Absolutlely no incomming connections on the SG side from this XGS.

    I reviewed the policy with other XGS VPN that have tunnels to the SG and on this XGS firewall the compression "pass data in compressed format" was not enabled. This setting fixed many issues on the other remote locations so I enabled it. Will probably need to wait for about 3 days to see if it helped something.

  • enabling "pass data in compressed format" on the remote XGS seems to have fixed the issue.

    no interruptions and disconnected VPN since enabling it.

    btw: I did not enable compression on the SG to where the XGS connects to.