This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

LT2PoverIPSEC and no Internet

Hi all

I configure IPSEC/LT2P on my SG115 FW and it works fine, means i can sucessfully connect. But from within the VPN I don't have Internet Access (see Screenshots), even I added a Rule to allow this (see also Screenshots). What I'm doing wrong?

Thanks for your help

Realtime Log of the IPSec Traffic shows that the connection could be established

Live Log: IPsec VPN
Filter:  
  Autoscroll
Reload
2019:04:06-20:20:55 fw01 pluto[5757]: | emitting 4 raw bytes of delete payload into ISAKMP Delete Payload
2019:04:06-20:20:55 fw01 pluto[5757]: | delete payload c4 0e ab ce
2019:04:06-20:20:55 fw01 pluto[5757]: | emitting length of ISAKMP Delete Payload: 16
2019:04:06-20:20:55 fw01 pluto[5757]: | emitting 8 zero bytes of encryption padding into ISAKMP Message
2019:04:06-20:20:55 fw01 pluto[5757]: | emitting length of ISAKMP Message: 76
2019:04:06-20:20:55 fw01 pluto[5757]: | delete esp.5e7001aa@192.168.1.45
2019:04:06-20:20:55 fw01 pluto[5757]: | delete esp.c40eabce@62.2.208.170
2019:04:06-20:20:55 fw01 pluto[5757]: | del: 5e 70 01 aa
2019:04:06-20:20:55 fw01 pluto[5757]: | next event EVENT_REINIT_SECRET in 3103 seconds
2019:04:06-20:21:03 fw01 openl2tpd[21772]: PROTO: tunl 2225: HELLO received from peer 27
2019:04:06-20:21:18 fw01 pppd-l2tp[25340]: rcvd [LCP TermReq id=0x9 ")\367N\324\000<\315t\000\000\000\000"]
2019:04:06-20:21:18 fw01 pppd-l2tp[25340]: LCP terminated by peer ()\xF7N\xD4^@<\xCDt^@^@^@^@)
2019:04:06-20:21:18 fw01 pppd-l2tp[25340]: Connect time 4.4 minutes.
2019:04:06-20:21:18 fw01 pppd-l2tp[25340]: Sent 0 bytes, received 78405 bytes.
2019:04:06-20:21:18 fw01 pppd-l2tp[25340]: Script /etc/ppp/ip-down started (pid 26304)
2019:04:06-20:21:18 fw01 pppd-l2tp[25340]: Overriding mtu 1500 to 1380
2019:04:06-20:21:18 fw01 pppd-l2tp[25340]: PPPoL2TP options: lnsmode tid 2225 sid 50727 debugmask 0
2019:04:06-20:21:18 fw01 pppd-l2tp[25340]: Overriding mru 1500 to mtu value 1380
2019:04:06-20:21:18 fw01 pppd-l2tp[25340]: sent [LCP TermAck id=0x9]
2019:04:06-20:21:18 fw01 openl2tpd[21772]: PROTO: tunl 2225/50727: CDN received from peer 27
2019:04:06-20:21:18 fw01 pppd-l2tp[25340]: Terminating on signal 15
2019:04:06-20:21:18 fw01 openl2tpd[21772]: PROTO: tunl 2225: STOPCCN received
2019:04:06-20:21:18 fw01 openl2tpd[21772]: PROTO: tunl 2225: STOPCCN error 6/0: Requester is being shut down
2019:04:06-20:21:18 fw01 openl2tpd[21772]: FSM: CCE(2225) event STOPCCN in state ESTABLISHED
2019:04:06-20:21:18 fw01 openl2tpd[21772]: FUNC: tunl 2225 down
2019:04:06-20:21:18 fw01 openl2tpd[21772]: FSM: CCE(2225) state change: ESTABLISHED --> CLOSING
2019:04:06-20:21:18 fw01 openl2tpd[21772]: tunl 2225: tunnel close acknowledged by peer
2019:04:06-20:21:18 fw01 pluto[5757]: |
2019:04:06-20:21:18 fw01 pluto[5757]: | *received 76 bytes from 192.168.1.45:500 on eth1
2019:04:06-20:21:18 fw01 pluto[5757]: | **parse ISAKMP Message:
2019:04:06-20:21:18 fw01 pluto[5757]: | initiator cookie:
2019:04:06-20:21:18 fw01 pluto[5757]: | 5e 08 ce 72 8d 12 fa 58
2019:04:06-20:21:18 fw01 pluto[5757]: | responder cookie:
2019:04:06-20:21:18 fw01 pluto[5757]: | 88 65 c3 5e 73 23 24 96
2019:04:06-20:21:18 fw01 pluto[5757]: | next payload type: ISAKMP_NEXT_HASH
2019:04:06-20:21:18 fw01 pluto[5757]: | ISAKMP version: ISAKMP Version 1.0
2019:04:06-20:21:18 fw01 pluto[5757]: | exchange type: ISAKMP_XCHG_INFO
2019:04:06-20:21:18 fw01 pluto[5757]: | flags: ISAKMP_FLAG_ENCRYPTION
2019:04:06-20:21:18 fw01 pluto[5757]: | message ID: ff 89 ec 25
2019:04:06-20:21:18 fw01 pluto[5757]: | length: 76
2019:04:06-20:21:18 fw01 pluto[5757]: | ICOOKIE: 5e 08 ce 72 8d 12 fa 58
2019:04:06-20:21:18 fw01 pluto[5757]: | RCOOKIE: 88 65 c3 5e 73 23 24 96
2019:04:06-20:21:18 fw01 pluto[5757]: | peer: c0 a8 01 2d
2019:04:06-20:21:18 fw01 pluto[5757]: | state hash entry 13
2019:04:06-20:21:18 fw01 pluto[5757]: | state object #63 found, in STATE_MAIN_R3
2019:04:06-20:21:18 fw01 pluto[5757]: | ***parse ISAKMP Hash Payload:
2019:04:06-20:21:18 fw01 pluto[5757]: | next payload type: ISAKMP_NEXT_D
2019:04:06-20:21:18 fw01 pluto[5757]: | length: 24
2019:04:06-20:21:18 fw01 pluto[5757]: | ***parse ISAKMP Delete Payload:
2019:04:06-20:21:18 fw01 pluto[5757]: | next payload type: ISAKMP_NEXT_NONE
2019:04:06-20:21:18 fw01 pluto[5757]: | length: 16
2019:04:06-20:21:18 fw01 pluto[5757]: | DOI: ISAKMP_DOI_IPSEC
2019:04:06-20:21:18 fw01 pluto[5757]: | protocol ID: 3
2019:04:06-20:21:18 fw01 pluto[5757]: | SPI size: 4
2019:04:06-20:21:18 fw01 pluto[5757]: | number of SPIs: 1
2019:04:06-20:21:18 fw01 pluto[5757]: | removing 8 bytes of padding
2019:04:06-20:21:18 fw01 pluto[5757]: "L_for vpn"[18] 192.168.1.45 #63: received Delete SA(0xb5586318) payload: deleting IPSEC State #70
2019:04:06-20:21:18 fw01 pluto[5757]: | **emit ISAKMP Message:
2019:04:06-20:21:18 fw01 pluto[5757]: | initiator cookie:
2019:04:06-20:21:18 fw01 pluto[5757]: | 5e 08 ce 72 8d 12 fa 58
2019:04:06-20:21:18 fw01 pluto[5757]: | responder cookie:
2019:04:06-20:21:18 fw01 pluto[5757]: | 88 65 c3 5e 73 23 24 96
2019:04:06-20:21:18 fw01 pluto[5757]: | next payload type: ISAKMP_NEXT_HASH
2019:04:06-20:21:18 fw01 pluto[5757]: | ISAKMP version: ISAKMP Version 1.0
2019:04:06-20:21:18 fw01 pluto[5757]: | exchange type: ISAKMP_XCHG_INFO
2019:04:06-20:21:18 fw01 pluto[5757]: | flags: ISAKMP_FLAG_ENCRYPTION
2019:04:06-20:21:18 fw01 pluto[5757]: | message ID: 55 bf 46 f5
2019:04:06-20:21:18 fw01 pluto[5757]: | ***emit ISAKMP Hash Payload:
2019:04:06-20:21:18 fw01 pluto[5757]: | next payload type: ISAKMP_NEXT_D
2019:04:06-20:21:18 fw01 pluto[5757]: | emitting 20 zero bytes of HASH(1) into ISAKMP Hash Payload
2019:04:06-20:21:18 fw01 pluto[5757]: | emitting length of ISAKMP Hash Payload: 24
2019:04:06-20:21:18 fw01 pluto[5757]: | ***emit ISAKMP Delete Payload:
2019:04:06-20:21:18 fw01 pluto[5757]: | next payload type: ISAKMP_NEXT_NONE
2019:04:06-20:21:18 fw01 pluto[5757]: | DOI: ISAKMP_DOI_IPSEC
2019:04:06-20:21:18 fw01 pluto[5757]: | protocol ID: 3
2019:04:06-20:21:18 fw01 pluto[5757]: | SPI size: 4
2019:04:06-20:21:18 fw01 pluto[5757]: | number of SPIs: 1
2019:04:06-20:21:18 fw01 pluto[5757]: | emitting 4 raw bytes of delete payload into ISAKMP Delete Payload
2019:04:06-20:21:18 fw01 pluto[5757]: | delete payload d1 21 65 f5
2019:04:06-20:21:18 fw01 pluto[5757]: | emitting length of ISAKMP Delete Payload: 16
2019:04:06-20:21:18 fw01 pluto[5757]: | emitting 8 zero bytes of encryption padding into ISAKMP Message
2019:04:06-20:21:18 fw01 pluto[5757]: | emitting length of ISAKMP Message: 76
2019:04:06-20:21:18 fw01 pluto[5757]: | ICOOKIE: 5e 08 ce 72 8d 12 fa 58
2019:04:06-20:21:18 fw01 pluto[5757]: | RCOOKIE: 88 65 c3 5e 73 23 24 96
2019:04:06-20:21:18 fw01 pluto[5757]: | peer: c0 a8 01 2d
2019:04:06-20:21:18 fw01 pluto[5757]: | state hash entry 13
2019:04:06-20:21:18 fw01 pluto[5757]: | executing down-host: 2>&1 PLUTO_VERSION='1.1' PLUTO_VERB='down-host' PLUTO_CONNECTION='L_for vpn' PLUTO_NEXT_HOP='192.168.1.45' PLUTO_INTERFACE='eth1' PLUTO_REQID='16533' PLUTO_ME='62.2.208.170' PLUTO_MY_ID='62.2.208.170' PLUTO_MY_CLIENT='62.2.208.170/32' PLUTO_MY_CLIENT_NET='62.2.208.170' PLUTO_MY_CLIENT_MASK='255.255.255.255' PLUTO_MY_PORT='1701' PLUTO_MY_PROTOCOL='17' PLUTO_PEER='192.168.1.45' PLUTO_PEER_ID='192.168.1.45' PLUTO_PEER_CLIENT='192.168.1.45/32' PLUTO_PEER_CLIENT_NET='192.168.1.45' PLUTO_PEER_CLIENT_MASK='255.255.255.255' PLUTO_PEER_PORT='500' PLUTO_PEER_PROTOCOL='17' PLUTO_PEER_CA='' /usr/libexec/ipsec/updown strict
2019:04:06-20:21:18 fw01 pluto[5757]: | delete eroute 192.168.1.45/32:1701 -> 62.2.208.170/32:1701 => int.0@62.2.208.170:0
2019:04:06-20:21:18 fw01 pluto[5757]: | eroute_connection delete eroute 62.2.208.170/32:1701 -> 192.168.1.45/32:1701 => int.0@0.0.0.0:17
2019:04:06-20:21:18 fw01 pluto[5757]: | route owner of "L_for vpn"[18] 192.168.1.45 unrouted: NULL
2019:04:06-20:21:18 fw01 pluto[5757]: | executing unroute-host: 2>&1 PLUTO_VERSION='1.1' PLUTO_VERB='unroute-host' PLUTO_CONNECTION='L_for vpn' PLUTO_NEXT_HOP='192.168.1.45' PLUTO_INTERFACE='eth1' PLUTO_REQID='16533' PLUTO_ME='62.2.208.170' PLUTO_MY_ID='62.2.208.170' PLUTO_MY_CLIENT='62.2.208.170/32' PLUTO_MY_CLIENT_NET='62.2.208.170' PLUTO_MY_CLIENT_MASK='255.255.255.255' PLUTO_MY_PORT='1701' PLUTO_MY_PROTOCOL='17' PLUTO_PEER='192.168.1.45' PLUTO_PEER_ID='192.168.1.45' PLUTO_PEER_CLIENT='192.168.1.45/32' PLUTO_PEER_CLIENT_NET='192.168.1.45' PLUTO_PEER_CLIENT_MASK='255.255.255.255' PLUTO_PEER_PORT='500' PLUTO_PEER_PROTOCOL='17' PLUTO_PEER_CA='' /usr/libexec/ipsec/updown strict
2019:04:06-20:21:18 fw01 pluto[5757]: | delete esp.b5586318@192.168.1.45
2019:04:06-20:21:18 fw01 pluto[5757]: | route owner of "L_for vpn"[18] 192.168.1.45 unrouted: NULL; eroute owner: NULL
2019:04:06-20:21:18 fw01 pluto[5757]: | delete inbound eroute 192.168.1.45/32:1701 -> 62.2.208.170/32:1701 => unk255.10000@62.2.208.170:17
2019:04:06-20:21:18 fw01 pluto[5757]: | delete esp.d12165f5@62.2.208.170
2019:04:06-20:21:18 fw01 pluto[5757]: "L_for vpn"[18] 192.168.1.45 #63: deleting connection "L_for vpn"[18] instance with peer 192.168.1.45 {isakmp=#0/ipsec=#0}
2019:04:06-20:21:18 fw01 pluto[5757]: | certs and keys locked by 'delete_connection'
2019:04:06-20:21:18 fw01 pluto[5757]: | certs and keys unlocked by 'delete_connection'
2019:04:06-20:21:18 fw01 pluto[5757]: | del: b5 58 63 18
2019:04:06-20:21:18 fw01 pluto[5757]: | next event EVENT_REINIT_SECRET in 3080 seconds
2019:04:06-20:21:18 fw01 pluto[5757]: |
2019:04:06-20:21:18 fw01 pluto[5757]: | *received 92 bytes from 192.168.1.45:500 on eth1
2019:04:06-20:21:18 fw01 pluto[5757]: | **parse ISAKMP Message:
2019:04:06-20:21:18 fw01 pluto[5757]: | initiator cookie:
2019:04:06-20:21:18 fw01 pluto[5757]: | 5e 08 ce 72 8d 12 fa 58
2019:04:06-20:21:18 fw01 pluto[5757]: | responder cookie:
2019:04:06-20:21:18 fw01 pluto[5757]: | 88 65 c3 5e 73 23 24 96
2019:04:06-20:21:18 fw01 pluto[5757]: | next payload type: ISAKMP_NEXT_HASH
2019:04:06-20:21:18 fw01 pluto[5757]: | ISAKMP version: ISAKMP Version 1.0
2019:04:06-20:21:18 fw01 pluto[5757]: | exchange type: ISAKMP_XCHG_INFO
2019:04:06-20:21:18 fw01 pluto[5757]: | flags: ISAKMP_FLAG_ENCRYPTION
2019:04:06-20:21:18 fw01 pluto[5757]: | message ID: 20 ef 20 5f
2019:04:06-20:21:18 fw01 pluto[5757]: | length: 92
2019:04:06-20:21:18 fw01 pluto[5757]: | ICOOKIE: 5e 08 ce 72 8d 12 fa 58
2019:04:06-20:21:18 fw01 pluto[5757]: | RCOOKIE: 88 65 c3 5e 73 23 24 96
2019:04:06-20:21:18 fw01 pluto[5757]: | peer: c0 a8 01 2d
2019:04:06-20:21:18 fw01 pluto[5757]: | state hash entry 13
2019:04:06-20:21:18 fw01 pluto[5757]: | state object #63 found, in STATE_MAIN_R3
2019:04:06-20:21:18 fw01 pluto[5757]: | ***parse ISAKMP Hash Payload:
2019:04:06-20:21:18 fw01 pluto[5757]: | next payload type: ISAKMP_NEXT_D
2019:04:06-20:21:18 fw01 pluto[5757]: | length: 24
2019:04:06-20:21:18 fw01 pluto[5757]: | ***parse ISAKMP Delete Payload:
2019:04:06-20:21:18 fw01 pluto[5757]: | next payload type: ISAKMP_NEXT_NONE
2019:04:06-20:21:18 fw01 pluto[5757]: | length: 28
2019:04:06-20:21:18 fw01 pluto[5757]: | DOI: ISAKMP_DOI_IPSEC
2019:04:06-20:21:18 fw01 pluto[5757]: | protocol ID: 1
2019:04:06-20:21:18 fw01 pluto[5757]: | SPI size: 16
2019:04:06-20:21:18 fw01 pluto[5757]: | number of SPIs: 1
2019:04:06-20:21:18 fw01 pluto[5757]: | removing 12 bytes of padding
2019:04:06-20:21:18 fw01 pluto[5757]: | ICOOKIE: 5e 08 ce 72 8d 12 fa 58
2019:04:06-20:21:18 fw01 pluto[5757]: | RCOOKIE: 88 65 c3 5e 73 23 24 96
2019:04:06-20:21:18 fw01 pluto[5757]: | peer: c0 a8 01 2d
2019:04:06-20:21:18 fw01 pluto[5757]: | state hash entry 13
2019:04:06-20:21:18 fw01 pluto[5757]: | state object #63 found, in STATE_MAIN_R3
2019:04:06-20:21:18 fw01 pluto[5757]: "L_for vpn"[18] 192.168.1.45 #63: received Delete SA payload: deleting ISAKMP State #63
2019:04:06-20:21:18 fw01 pluto[5757]: | **emit ISAKMP Message:
2019:04:06-20:21:18 fw01 pluto[5757]: | initiator cookie:
2019:04:06-20:21:18 fw01 pluto[5757]: | 5e 08 ce 72 8d 12 fa 58
2019:04:06-20:21:18 fw01 pluto[5757]: | responder cookie:
2019:04:06-20:21:18 fw01 pluto[5757]: | 88 65 c3 5e 73 23 24 96
2019:04:06-20:21:18 fw01 pluto[5757]: | next payload type: ISAKMP_NEXT_HASH
2019:04:06-20:21:18 fw01 pluto[5757]: | ISAKMP version: ISAKMP Version 1.0
2019:04:06-20:21:18 fw01 pluto[5757]: | exchange type: ISAKMP_XCHG_INFO
2019:04:06-20:21:18 fw01 pluto[5757]: | flags: ISAKMP_FLAG_ENCRYPTION
2019:04:06-20:21:18 fw01 pluto[5757]: | message ID: 2e fd 60 90
2019:04:06-20:21:18 fw01 pluto[5757]: | ***emit ISAKMP Hash Payload:
2019:04:06-20:21:18 fw01 pluto[5757]: | next payload type: ISAKMP_NEXT_D
2019:04:06-20:21:18 fw01 pluto[5757]: | emitting 20 zero bytes of HASH(1) into ISAKMP Hash Payload
2019:04:06-20:21:18 fw01 pluto[5757]: | emitting length of ISAKMP Hash Payload: 24
2019:04:06-20:21:18 fw01 pluto[5757]: | ***emit ISAKMP Delete Payload:
2019:04:06-20:21:18 fw01 pluto[5757]: | next payload type: ISAKMP_NEXT_NONE
2019:04:06-20:21:18 fw01 pluto[5757]: | DOI: ISAKMP_DOI_IPSEC
2019:04:06-20:21:18 fw01 pluto[5757]: | protocol ID: 1
2019:04:06-20:21:18 fw01 pluto[5757]: | SPI size: 16
2019:04:06-20:21:18 fw01 pluto[5757]: | number of SPIs: 1
2019:04:06-20:21:18 fw01 pluto[5757]: | emitting 16 raw bytes of delete payload into ISAKMP Delete Payload
2019:04:06-20:21:18 fw01 pluto[5757]: | delete payload 5e 08 ce 72 8d 12 fa 58 88 65 c3 5e 73 23 24 96
2019:04:06-20:21:18 fw01 pluto[5757]: | emitting length of ISAKMP Delete Payload: 28
2019:04:06-20:21:18 fw01 pluto[5757]: | emitting 12 zero bytes of encryption padding into ISAKMP Message
2019:04:06-20:21:18 fw01 pluto[5757]: | emitting length of ISAKMP Message: 92
2019:04:06-20:21:18 fw01 pluto[5757]: | ICOOKIE: 5e 08 ce 72 8d 12 fa 58
2019:04:06-20:21:18 fw01 pluto[5757]: | RCOOKIE: 88 65 c3 5e 73 23 24 96
2019:04:06-20:21:18 fw01 pluto[5757]: | peer: c0 a8 01 2d
2019:04:06-20:21:18 fw01 pluto[5757]: | state hash entry 13
2019:04:06-20:21:18 fw01 pluto[5757]: "L_for vpn"[18] 192.168.1.45: deleting connection "L_for vpn"[18] instance with peer 192.168.1.45 {isakmp=#0/ipsec=#0}
2019:04:06-20:21:18 fw01 pluto[5757]: | certs and keys locked by 'delete_connection'
2019:04:06-20:21:18 fw01 pluto[5757]: | certs and keys unlocked by 'delete_connection'
2019:04:06-20:21:18 fw01 pluto[5757]: | del: 5e 08 ce 72 8d 12 fa 58 88 65 c3 5e 73 23 24 96
2019:04:06-20:21:18 fw01 pluto[5757]: | next event EVENT_REINIT_SECRET in 3080 seconds
2019:04:06-20:21:18 fw01 pppd-l2tp[25340]: id="2202" severity="info" sys="SecureNet" sub="vpn" event="Connection terminated" username="vpn" variant="l2tp" srcip="192.168.1.45" virtual_ip="62.2.208.170"
2019:04:06-20:21:18 fw01 pppd-l2tp[25340]: Script /etc/ppp/ip-down finished (pid 26304), status = 0x0
2019:04:06-20:21:20 fw01 openl2tpd[21772]: FUNC: tunl 2225 deleted
2019:04:06-20:21:20 fw01 openl2tpd[21772]: FUNC: tunl 2225: deleting context
2019:04:06-20:21:20 fw01 pluto[5757]: |
2019:04:06-20:21:20 fw01 pluto[5757]: | *received 408 bytes from 192.168.1.45:500 on eth1
2019:04:06-20:21:20 fw01 pluto[5757]: | **parse ISAKMP Message:
2019:04:06-20:21:20 fw01 pluto[5757]: | initiator cookie:
2019:04:06-20:21:20 fw01 pluto[5757]: | 0d 6a b7 e0 76 33 aa 57
2019:04:06-20:21:20 fw01 pluto[5757]: | responder cookie:
2019:04:06-20:21:20 fw01 pluto[5757]: | 00 00 00 00 00 00 00 00
2019:04:06-20:21:20 fw01 pluto[5757]: | next payload type: ISAKMP_NEXT_SA
2019:04:06-20:21:20 fw01 pluto[5757]: | ISAKMP version: ISAKMP Version 1.0
2019:04:06-20:21:20 fw01 pluto[5757]: | exchange type: ISAKMP_XCHG_IDPROT
2019:04:06-20:21:20 fw01 pluto[5757]: | flags: none
2019:04:06-20:21:20 fw01 pluto[5757]: | message ID: 00 00 00 00
2019:04:06-20:21:20 fw01 pluto[5757]: | length: 408
2019:04:06-20:21:20 fw01 pluto[5757]: | ***parse ISAKMP Security Association Payload:
2019:04:06-20:21:20 fw01 pluto[5757]: | next payload type: ISAKMP_NEXT_VID
2019:04:06-20:21:20 fw01 pluto[5757]: | length: 212
2019:04:06-20:21:20 fw01 pluto[5757]: | DOI: ISAKMP_DOI_IPSEC
2019:04:06-20:21:20 fw01 pluto[5757]: | ***parse ISAKMP Vendor ID Payload:
2019:04:06-20:21:20 fw01 pluto[5757]: | next payload type: ISAKMP_NEXT_VID
2019:04:06-20:21:20 fw01 pluto[5757]: | length: 24
2019:04:06-20:21:20 fw01 pluto[5757]: | ***parse ISAKMP Vendor ID Payload:
2019:04:06-20:21:20 fw01 pluto[5757]: | next payload type: ISAKMP_NEXT_VID
2019:04:06-20:21:20 fw01 pluto[5757]: | length: 24
2019:04:06-20:21:20 fw01 pluto[5757]: | ***parse ISAKMP Vendor ID Payload:
2019:04:06-20:21:20 fw01 pluto[5757]: | next payload type: ISAKMP_NEXT_VID
2019:04:06-20:21:20 fw01 pluto[5757]: | length: 20
2019:04:06-20:21:20 fw01 pluto[5757]: | ***parse ISAKMP Vendor ID Payload:
2019:04:06-20:21:20 fw01 pluto[5757]: | next payload type: ISAKMP_NEXT_VID
2019:04:06-20:21:20 fw01 pluto[5757]: | length: 20
2019:04:06-20:21:20 fw01 pluto[5757]: | ***parse ISAKMP Vendor ID Payload:
2019:04:06-20:21:20 fw01 pluto[5757]: | next payload type: ISAKMP_NEXT_VID
2019:04:06-20:21:20 fw01 pluto[5757]: | length: 20
2019:04:06-20:21:20 fw01 pluto[5757]: | ***parse ISAKMP Vendor ID Payload:
2019:04:06-20:21:20 fw01 pluto[5757]: | next payload type: ISAKMP_NEXT_VID
2019:04:06-20:21:20 fw01 pluto[5757]: | length: 20
2019:04:06-20:21:20 fw01 pluto[5757]: | ***parse ISAKMP Vendor ID Payload:
2019:04:06-20:21:20 fw01 pluto[5757]: | next payload type: ISAKMP_NEXT_VID
2019:04:06-20:21:20 fw01 pluto[5757]: | length: 20
2019:04:06-20:21:20 fw01 pluto[5757]: | ***parse ISAKMP Vendor ID Payload:
2019:04:06-20:21:20 fw01 pluto[5757]: | next payload type: ISAKMP_NEXT_NONE
2019:04:06-20:21:20 fw01 pluto[5757]: | length: 20
2019:04:06-20:21:20 fw01 pluto[5757]: packet from 192.168.1.45:500: ignoring Vendor ID payload [01528bbbc00696121849ab9a1c5b2a5100000001]
2019:04:06-20:21:20 fw01 pluto[5757]: packet from 192.168.1.45:500: received Vendor ID payload [MS NT5 ISAKMPOAKLEY 00000009]
2019:04:06-20:21:20 fw01 pluto[5757]: packet from 192.168.1.45:500: received Vendor ID payload [RFC 3947]
2019:04:06-20:21:20 fw01 pluto[5757]: packet from 192.168.1.45:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
2019:04:06-20:21:20 fw01 pluto[5757]: packet from 192.168.1.45:500: ignoring Vendor ID payload [FRAGMENTATION]
2019:04:06-20:21:20 fw01 pluto[5757]: packet from 192.168.1.45:500: ignoring Vendor ID payload [MS-Negotiation Discovery Capable]
2019:04:06-20:21:20 fw01 pluto[5757]: packet from 192.168.1.45:500: ignoring Vendor ID payload [Vid-Initial-Contact]
2019:04:06-20:21:20 fw01 pluto[5757]: packet from 192.168.1.45:500: ignoring Vendor ID payload [IKE CGA version 1]
2019:04:06-20:21:20 fw01 pluto[5757]: | ****parse IPsec DOI SIT:
2019:04:06-20:21:20 fw01 pluto[5757]: | IPsec DOI SIT: SIT_IDENTITY_ONLY
2019:04:06-20:21:20 fw01 pluto[5757]: | ****parse ISAKMP Proposal Payload:
2019:04:06-20:21:20 fw01 pluto[5757]: | next payload type: ISAKMP_NEXT_NONE
2019:04:06-20:21:20 fw01 pluto[5757]: | length: 200
2019:04:06-20:21:20 fw01 pluto[5757]: | proposal number: 1
2019:04:06-20:21:20 fw01 pluto[5757]: | protocol ID: PROTO_ISAKMP
2019:04:06-20:21:20 fw01 pluto[5757]: | SPI size: 0
2019:04:06-20:21:20 fw01 pluto[5757]: | number of transforms: 5
2019:04:06-20:21:20 fw01 pluto[5757]: | *****parse ISAKMP Transform Payload (ISAKMP):
2019:04:06-20:21:20 fw01 pluto[5757]: | next payload type: ISAKMP_NEXT_T
2019:04:06-20:21:20 fw01 pluto[5757]: | length: 40
2019:04:06-20:21:20 fw01 pluto[5757]: | transform number: 1
2019:04:06-20:21:20 fw01 pluto[5757]: | transform ID: KEY_IKE
2019:04:06-20:21:20 fw01 pluto[5757]: | ******parse ISAKMP Oakley attribute:
2019:04:06-20:21:20 fw01 pluto[5757]: | af+type: OAKLEY_ENCRYPTION_ALGORITHM
2019:04:06-20:21:20 fw01 pluto[5757]: | length/value: 7
2019:04:06-20:21:20 fw01 pluto[5757]: | ******parse ISAKMP Oakley attribute:
2019:04:06-20:21:20 fw01 pluto[5757]: | af+type: OAKLEY_KEY_LENGTH
2019:04:06-20:21:20 fw01 pluto[5757]: | length/value: 256
2019:04:06-20:21:20 fw01 pluto[5757]: | ******parse ISAKMP Oakley attribute:
2019:04:06-20:21:20 fw01 pluto[5757]: | af+type: OAKLEY_HASH_ALGORITHM
2019:04:06-20:21:20 fw01 pluto[5757]: | length/value: 2
2019:04:06-20:21:20 fw01 pluto[5757]: | ******parse ISAKMP Oakley attribute:
2019:04:06-20:21:20 fw01 pluto[5757]: | af+type: OAKLEY_GROUP_DESCRIPTION
2019:04:06-20:21:20 fw01 pluto[5757]: | length/value: 20
2019:04:06-20:21:20 fw01 pluto[5757]: | ******parse ISAKMP Oakley attribute:
2019:04:06-20:21:20 fw01 pluto[5757]: | af+type: OAKLEY_AUTHENTICATION_METHOD
2019:04:06-20:21:20 fw01 pluto[5757]: | length/value: 1
2019:04:06-20:21:20 fw01 pluto[5757]: | ******parse ISAKMP Oakley attribute:
2019:04:06-20:21:20 fw01 pluto[5757]: | af+type: OAKLEY_LIFE_TYPE
2019:04:06-20:21:20 fw01 pluto[5757]: | length/value: 1
2019:04:06-20:21:20 fw01 pluto[5757]: | ******parse ISAKMP Oakley attribute:
2019:04:06-20:21:20 fw01 pluto[5757]: | af+type: OAKLEY_LIFE_DURATION (variable length)
2019:04:06-20:21:20 fw01 pluto[5757]: | length/value: 4
2019:04:06-20:21:20 fw01 pluto[5757]: | *****parse ISAKMP Transform Payload (ISAKMP):
2019:04:06-20:21:20 fw01 pluto[5757]: | next payload type: ISAKMP_NEXT_T
2019:04:06-20:21:20 fw01 pluto[5757]: | length: 40
2019:04:06-20:21:20 fw01 pluto[5757]: | transform number: 2
2019:04:06-20:21:20 fw01 pluto[5757]: | transform ID: KEY_IKE
2019:04:06-20:21:20 fw01 pluto[5757]: | ******parse ISAKMP Oakley attribute:
2019:04:06-20:21:20 fw01 pluto[5757]: | af+type: OAKLEY_ENCRYPTION_ALGORITHM
2019:04:06-20:21:20 fw01 pluto[5757]: | length/value: 7
2019:04:06-20:21:20 fw01 pluto[5757]: | ******parse ISAKMP Oakley attribute:
2019:04:06-20:21:20 fw01 pluto[5757]: | af+type: OAKLEY_KEY_LENGTH
2019:04:06-20:21:20 fw01 pluto[5757]: | length/value: 128
2019:04:06-20:21:20 fw01 pluto[5757]: | ******parse ISAKMP Oakley attribute:
2019:04:06-20:21:20 fw01 pluto[5757]: | af+type: OAKLEY_HASH_ALGORITHM
2019:04:06-20:21:20 fw01 pluto[5757]: | length/value: 2
2019:04:06-20:21:20 fw01 pluto[5757]: | ******parse ISAKMP Oakley attribute:
2019:04:06-20:21:20 fw01 pluto[5757]: | af+type: OAKLEY_GROUP_DESCRIPTION
2019:04:06-20:21:20 fw01 pluto[5757]: | length/value: 19
2019:04:06-20:21:20 fw01 pluto[5757]: | ******parse ISAKMP Oakley attribute:
2019:04:06-20:21:20 fw01 pluto[5757]: | af+type: OAKLEY_AUTHENTICATION_METHOD
2019:04:06-20:21:20 fw01 pluto[5757]: | length/value: 1
2019:04:06-20:21:20 fw01 pluto[5757]: | ******parse ISAKMP Oakley attribute:
2019:04:06-20:21:20 fw01 pluto[5757]: | af+type: OAKLEY_LIFE_TYPE
2019:04:06-20:21:20 fw01 pluto[5757]: | length/value: 1
2019:04:06-20:21:20 fw01 pluto[5757]: | ******parse ISAKMP Oakley attribute:
2019:04:06-20:21:20 fw01 pluto[5757]: | af+type: OAKLEY_LIFE_DURATION (variable length)
2019:04:06-20:21:20 fw01 pluto[5757]: | length/value: 4
2019:04:06-20:21:20 fw01 pluto[5757]: | *****parse ISAKMP Transform Payload (ISAKMP):
2019:04:06-20:21:20 fw01 pluto[5757]: | next payload type: ISAKMP_NEXT_T
2019:04:06-20:21:20 fw01 pluto[5757]: | length: 40
2019:04:06-20:21:20 fw01 pluto[5757]: | transform number: 3
2019:04:06-20:21:20 fw01 pluto[5757]: | transform ID: KEY_IKE
2019:04:06-20:21:20 fw01 pluto[5757]: | ******parse ISAKMP Oakley attribute:
2019:04:06-20:21:20 fw01 pluto[5757]: | af+type: OAKLEY_ENCRYPTION_ALGORITHM
2019:04:06-20:21:20 fw01 pluto[5757]: | length/value: 7
2019:04:06-20:21:20 fw01 pluto[5757]: | ******parse ISAKMP Oakley attribute:
2019:04:06-20:21:20 fw01 pluto[5757]: | af+type: OAKLEY_KEY_LENGTH
2019:04:06-20:21:20 fw01 pluto[5757]: | length/value: 256
2019:04:06-20:21:20 fw01 pluto[5757]: | ******parse ISAKMP Oakley attribute:
2019:04:06-20:21:20 fw01 pluto[5757]: | af+type: OAKLEY_HASH_ALGORITHM
2019:04:06-20:21:20 fw01 pluto[5757]: | length/value: 2
2019:04:06-20:21:20 fw01 pluto[5757]: | ******parse ISAKMP Oakley attribute:
2019:04:06-20:21:20 fw01 pluto[5757]: | af+type: OAKLEY_GROUP_DESCRIPTION
2019:04:06-20:21:20 fw01 pluto[5757]: | length/value: 14
2019:04:06-20:21:20 fw01 pluto[5757]: | ******parse ISAKMP Oakley attribute:
2019:04:06-20:21:20 fw01 pluto[5757]: | af+type: OAKLEY_AUTHENTICATION_METHOD
2019:04:06-20:21:20 fw01 pluto[5757]: | length/value: 1
2019:04:06-20:21:20 fw01 pluto[5757]: | ******parse ISAKMP Oakley attribute:
2019:04:06-20:21:20 fw01 pluto[5757]: | af+type: OAKLEY_LIFE_TYPE
2019:04:06-20:21:20 fw01 pluto[5757]: | length/value: 1
2019:04:06-20:21:20 fw01 pluto[5757]: | ******parse ISAKMP Oakley attribute:
2019:04:06-20:21:20 fw01 pluto[5757]: | af+type: OAKLEY_LIFE_DURATION (variable length)
2019:04:06-20:21:20 fw01 pluto[5757]: | length/value: 4
2019:04:06-20:21:20 fw01 pluto[5757]: | *****parse ISAKMP Transform Payload (ISAKMP):
2019:04:06-20:21:20 fw01 pluto[5757]: | next payload type: ISAKMP_NEXT_T
2019:04:06-20:21:20 fw01 pluto[5757]: | length: 36
2019:04:06-20:21:20 fw01 pluto[5757]: | transform number: 4
2019:04:06-20:21:20 fw01 pluto[5757]: | transform ID: KEY_IKE
2019:04:06-20:21:20 fw01 pluto[5757]: | ******parse ISAKMP Oakley attribute:
2019:04:06-20:21:20 fw01 pluto[5757]: | af+type: OAKLEY_ENCRYPTION_ALGORITHM
2019:04:06-20:21:20 fw01 pluto[5757]: | length/value: 5
2019:04:06-20:21:20 fw01 pluto[5757]: | ******parse ISAKMP Oakley attribute:
2019:04:06-20:21:20 fw01 pluto[5757]: | af+type: OAKLEY_HASH_ALGORITHM
2019:04:06-20:21:20 fw01 pluto[5757]: | length/value: 2
2019:04:06-20:21:20 fw01 pluto[5757]: | ******parse ISAKMP Oakley attribute:
2019:04:06-20:21:20 fw01 pluto[5757]: | af+type: OAKLEY_GROUP_DESCRIPTION
2019:04:06-20:21:20 fw01 pluto[5757]: | length/value: 14
2019:04:06-20:21:20 fw01 pluto[5757]: | ******parse ISAKMP Oakley attribute:
2019:04:06-20:21:20 fw01 pluto[5757]: | af+type: OAKLEY_AUTHENTICATION_METHOD
2019:04:06-20:21:20 fw01 pluto[5757]: | length/value: 1
2019:04:06-20:21:20 fw01 pluto[5757]: | ******parse ISAKMP Oakley attribute:
2019:04:06-20:21:20 fw01 pluto[5757]: | af+type: OAKLEY_LIFE_TYPE
2019:04:06-20:21:20 fw01 pluto[5757]: | length/value: 1
2019:04:06-20:21:20 fw01 pluto[5757]: | ******parse ISAKMP Oakley attribute:
2019:04:06-20:21:20 fw01 pluto[5757]: | af+type: OAKLEY_LIFE_DURATION (variable length)
2019:04:06-20:21:20 fw01 pluto[5757]: | length/value: 4
2019:04:06-20:21:20 fw01 pluto[5757]: | *****parse ISAKMP Transform Payload (ISAKMP):
2019:04:06-20:21:20 fw01 pluto[5757]: | next payload type: ISAKMP_NEXT_NONE
2019:04:06-20:21:20 fw01 pluto[5757]: | length: 36
2019:04:06-20:21:20 fw01 pluto[5757]: | transform number: 5
2019:04:06-20:21:20 fw01 pluto[5757]: | transform ID: KEY_IKE
2019:04:06-20:21:20 fw01 pluto[5757]: | ******parse ISAKMP Oakley attribute:
2019:04:06-20:21:20 fw01 pluto[5757]: | af+type: OAKLEY_ENCRYPTION_ALGORITHM
2019:04:06-20:21:20 fw01 pluto[5757]: | length/value: 5
2019:04:06-20:21:20 fw01 pluto[5757]: | ******parse ISAKMP Oakley attribute:
2019:04:06-20:21:20 fw01 pluto[5757]: | af+type: OAKLEY_HASH_ALGORITHM
2019:04:06-20:21:20 fw01 pluto[5757]: | length/value: 2
2019:04:06-20:21:20 fw01 pluto[5757]: | ******parse ISAKMP Oakley attribute:
2019:04:06-20:21:20 fw01 pluto[5757]: | af+type: OAKLEY_GROUP_DESCRIPTION
2019:04:06-20:21:20 fw01 pluto[5757]: | length/value: 2
2019:04:06-20:21:20 fw01 pluto[5757]: | ******parse ISAKMP Oakley attribute:
2019:04:06-20:21:20 fw01 pluto[5757]: | af+type: OAKLEY_AUTHENTICATION_METHOD
2019:04:06-20:21:20 fw01 pluto[5757]: | length/value: 1
2019:04:06-20:21:20 fw01 pluto[5757]: | ******parse ISAKMP Oakley attribute:
2019:04:06-20:21:20 fw01 pluto[5757]: | af+type: OAKLEY_LIFE_TYPE
2019:04:06-20:21:20 fw01 pluto[5757]: | length/value: 1
2019:04:06-20:21:20 fw01 pluto[5757]: | ******parse ISAKMP Oakley attribute:
2019:04:06-20:21:20 fw01 pluto[5757]: | af+type: OAKLEY_LIFE_DURATION (variable length)
2019:04:06-20:21:20 fw01 pluto[5757]: | length/value: 4
2019:04:06-20:21:20 fw01 pluto[5757]: | preparse_isakmp_policy: peer requests PSK authentication
2019:04:06-20:21:20 fw01 pluto[5757]: | instantiated "L_for vpn" for 192.168.1.45
2019:04:06-20:21:20 fw01 pluto[5757]: | creating state object #71 at 0x895b938
2019:04:06-20:21:20 fw01 pluto[5757]: | ICOOKIE: 0d 6a b7 e0 76 33 aa 57
2019:04:06-20:21:20 fw01 pluto[5757]: | RCOOKIE: 94 4e e5 86 35 85 46 6e
2019:04:06-20:21:20 fw01 pluto[5757]: | peer: c0 a8 01 2d
2019:04:06-20:21:20 fw01 pluto[5757]: | state hash entry 13
2019:04:06-20:21:20 fw01 pluto[5757]: | inserting event EVENT_SO_DISCARD, timeout in 0 seconds for #71
2019:04:06-20:21:20 fw01 pluto[5757]: "L_for vpn"[19] 192.168.1.45 #71: responding to Main Mode from unknown peer 192.168.1.45
2019:04:06-20:21:20 fw01 pluto[5757]: | **emit ISAKMP Message:
2019:04:06-20:21:20 fw01 pluto[5757]: | initiator cookie:
2019:04:06-20:21:20 fw01 pluto[5757]: | 0d 6a b7 e0 76 33 aa 57
2019:04:06-20:21:20 fw01 pluto[5757]: | responder cookie:
2019:04:06-20:21:20 fw01 pluto[5757]: | 94 4e e5 86 35 85 46 6e
2019:04:06-20:21:20 fw01 pluto[5757]: | next payload type: ISAKMP_NEXT_SA
2019:04:06-20:21:20 fw01 pluto[5757]: | ISAKMP version: ISAKMP Version 1.0
2019:04:06-20:21:20 fw01 pluto[5757]: | exchange type: ISAKMP_XCHG_IDPROT
2019:04:06-20:21:20 fw01 pluto[5757]: | flags: none
2019:04:06-20:21:20 fw01 pluto[5757]: | message ID: 00 00 00 00
2019:04:06-20:21:20 fw01 pluto[5757]: | ***emit ISAKMP Security Association Payload:
2019:04:06-20:21:20 fw01 pluto[5757]: | next payload type: ISAKMP_NEXT_VID
2019:04:06-20:21:20 fw01 pluto[5757]: | DOI: ISAKMP_DOI_IPSEC
2019:04:06-20:21:20 fw01 pluto[5757]: | *****parse ISAKMP Transform Payload (ISAKMP):
2019:04:06-20:21:20 fw01 pluto[5757]: | next payload type: ISAKMP_NEXT_T
2019:04:06-20:21:20 fw01 pluto[5757]: | length: 40
2019:04:06-20:21:20 fw01 pluto[5757]: | transform number: 1
2019:04:06-20:21:20 fw01 pluto[5757]: | transform ID: KEY_IKE
2019:04:06-20:21:20 fw01 pluto[5757]: | ******parse ISAKMP Oakley attribute:
2019:04:06-20:21:20 fw01 pluto[5757]: | af+type: OAKLEY_ENCRYPTION_ALGORITHM
2019:04:06-20:21:20 fw01 pluto[5757]: | length/value: 7
2019:04:06-20:21:20 fw01 pluto[5757]: | [7 is AES_CBC]
2019:04:06-20:21:20 fw01 pluto[5757]: | ******parse ISAKMP Oakley attribute:
2019:04:06-20:21:20 fw01 pluto[5757]: | af+type: OAKLEY_KEY_LENGTH
2019:04:06-20:21:20 fw01 pluto[5757]: | length/value: 256
2019:04:06-20:21:20 fw01 pluto[5757]: | ******parse ISAKMP Oakley attribute:
2019:04:06-20:21:20 fw01 pluto[5757]: | af+type: OAKLEY_HASH_ALGORITHM
2019:04:06-20:21:20 fw01 pluto[5757]: | length/value: 2
2019:04:06-20:21:20 fw01 pluto[5757]: | [2 is HMAC_SHA1]
2019:04:06-20:21:20 fw01 pluto[5757]: | ******parse ISAKMP Oakley attribute:
2019:04:06-20:21:20 fw01 pluto[5757]: | af+type: OAKLEY_GROUP_DESCRIPTION
2019:04:06-20:21:20 fw01 pluto[5757]: | length/value: 20
2019:04:06-20:21:20 fw01 pluto[5757]: | [20 is ECP_384]
2019:04:06-20:21:20 fw01 pluto[5757]: "L_for vpn"[19] 192.168.1.45 #71: ECP_384 is not supported. Attribute OAKLEY_GROUP_DESCRIPTION
2019:04:06-20:21:20 fw01 pluto[5757]: | *****parse ISAKMP Transform Payload (ISAKMP):
2019:04:06-20:21:20 fw01 pluto[5757]: | next payload type: ISAKMP_NEXT_T
2019:04:06-20:21:20 fw01 pluto[5757]: | length: 40
2019:04:06-20:21:20 fw01 pluto[5757]: | transform number: 2
2019:04:06-20:21:20 fw01 pluto[5757]: | transform ID: KEY_IKE
2019:04:06-20:21:20 fw01 pluto[5757]: | ******parse ISAKMP Oakley attribute:
2019:04:06-20:21:20 fw01 pluto[5757]: | af+type: OAKLEY_ENCRYPTION_ALGORITHM
2019:04:06-20:21:20 fw01 pluto[5757]: | length/value: 7
2019:04:06-20:21:20 fw01 pluto[5757]: | [7 is AES_CBC]
2019:04:06-20:21:20 fw01 pluto[5757]: | ******parse ISAKMP Oakley attribute:
2019:04:06-20:21:20 fw01 pluto[5757]: | af+type: OAKLEY_KEY_LENGTH
2019:04:06-20:21:20 fw01 pluto[5757]: | length/value: 128
2019:04:06-20:21:20 fw01 pluto[5757]: | ******parse ISAKMP Oakley attribute:
2019:04:06-20:21:20 fw01 pluto[5757]: | af+type: OAKLEY_HASH_ALGORITHM
2019:04:06-20:21:20 fw01 pluto[5757]: | length/value: 2
2019:04:06-20:21:20 fw01 pluto[5757]: | [2 is HMAC_SHA1]
2019:04:06-20:21:20 fw01 pluto[5757]: | ******parse ISAKMP Oakley attribute:
2019:04:06-20:21:20 fw01 pluto[5757]: | af+type: OAKLEY_GROUP_DESCRIPTION
2019:04:06-20:21:20 fw01 pluto[5757]: | length/value: 19
2019:04:06-20:21:20 fw01 pluto[5757]: | [19 is ECP_256]
2019:04:06-20:21:20 fw01 pluto[5757]: "L_for vpn"[19] 192.168.1.45 #71: ECP_256 is not supported. Attribute OAKLEY_GROUP_DESCRIPTION
2019:04:06-20:21:20 fw01 pluto[5757]: | *****parse ISAKMP Transform Payload (ISAKMP):
2019:04:06-20:21:20 fw01 pluto[5757]: | next payload type: ISAKMP_NEXT_T
2019:04:06-20:21:20 fw01 pluto[5757]: | length: 40
2019:04:06-20:21:20 fw01 pluto[5757]: | transform number: 3
2019:04:06-20:21:20 fw01 pluto[5757]: | transform ID: KEY_IKE
2019:04:06-20:21:20 fw01 pluto[5757]: | ******parse ISAKMP Oakley attribute:
2019:04:06-20:21:20 fw01 pluto[5757]: | af+type: OAKLEY_ENCRYPTION_ALGORITHM
2019:04:06-20:21:20 fw01 pluto[5757]: | length/value: 7
2019:04:06-20:21:20 fw01 pluto[5757]: | [7 is AES_CBC]
2019:04:06-20:21:20 fw01 pluto[5757]: | ******parse ISAKMP Oakley attribute:
2019:04:06-20:21:20 fw01 pluto[5757]: | af+type: OAKLEY_KEY_LENGTH
2019:04:06-20:21:20 fw01 pluto[5757]: | length/value: 256
2019:04:06-20:21:20 fw01 pluto[5757]: | ******parse ISAKMP Oakley attribute:
2019:04:06-20:21:20 fw01 pluto[5757]: | af+type: OAKLEY_HASH_ALGORITHM
2019:04:06-20:21:20 fw01 pluto[5757]: | length/value: 2
2019:04:06-20:21:20 fw01 pluto[5757]: | [2 is HMAC_SHA1]
2019:04:06-20:21:20 fw01 pluto[5757]: | ******parse ISAKMP Oakley attribute:
2019:04:06-20:21:20 fw01 pluto[5757]: | af+type: OAKLEY_GROUP_DESCRIPTION
2019:04:06-20:21:20 fw01 pluto[5757]: | length/value: 14
2019:04:06-20:21:20 fw01 pluto[5757]: | [14 is MODP_2048]
2019:04:06-20:21:20 fw01 pluto[5757]: | ******parse ISAKMP Oakley attribute:
2019:04:06-20:21:20 fw01 pluto[5757]: | af+type: OAKLEY_AUTHENTICATION_METHOD
2019:04:06-20:21:20 fw01 pluto[5757]: | length/value: 1
2019:04:06-20:21:20 fw01 pluto[5757]: | [1 is pre-shared key]
2019:04:06-20:21:20 fw01 pluto[5757]: | ******parse ISAKMP Oakley attribute:
2019:04:06-20:21:20 fw01 pluto[5757]: | af+type: OAKLEY_LIFE_TYPE
2019:04:06-20:21:20 fw01 pluto[5757]: | length/value: 1
2019:04:06-20:21:20 fw01 pluto[5757]: | [1 is OAKLEY_LIFE_SECONDS]
2019:04:06-20:21:20 fw01 pluto[5757]: | ******parse ISAKMP Oakley attribute:
2019:04:06-20:21:20 fw01 pluto[5757]: | af+type: OAKLEY_LIFE_DURATION (variable length)
2019:04:06-20:21:20 fw01 pluto[5757]: | length/value: 4
2019:04:06-20:21:20 fw01 pluto[5757]: | long duration: 28800
2019:04:06-20:21:20 fw01 pluto[5757]: | Oakley Transform 3 accepted
2019:04:06-20:21:20 fw01 pluto[5757]: | ****emit IPsec DOI SIT:
2019:04:06-20:21:20 fw01 pluto[5757]: | IPsec DOI SIT: SIT_IDENTITY_ONLY
2019:04:06-20:21:20 fw01 pluto[5757]: | ****emit ISAKMP Proposal Payload:
2019:04:06-20:21:20 fw01 pluto[5757]: | next payload type: ISAKMP_NEXT_NONE
2019:04:06-20:21:20 fw01 pluto[5757]: | proposal number: 1
2019:04:06-20:21:20 fw01 pluto[5757]: | protocol ID: PROTO_ISAKMP
2019:04:06-20:21:20 fw01 pluto[5757]: | SPI size: 0
2019:04:06-20:21:20 fw01 pluto[5757]: | number of transforms: 1
2019:04:06-20:21:20 fw01 pluto[5757]: | *****emit ISAKMP Transform Payload (ISAKMP):
2019:04:06-20:21:20 fw01 pluto[5757]: | next payload type: ISAKMP_NEXT_NONE
2019:04:06-20:21:20 fw01 pluto[5757]: | transform number: 3
2019:04:06-20:21:20 fw01 pluto[5757]: | transform ID: KEY_IKE
2019:04:06-20:21:20 fw01 pluto[5757]: | emitting 32 raw bytes of attributes into ISAKMP Transform Payload (ISAKMP)
2019:04:06-20:21:20 fw01 pluto[5757]: | attributes 80 01 00 07 80 0e 01 00 80 02 00 02 80 04 00 0e
2019:04:06-20:21:20 fw01 pluto[5757]: | 80 03 00 01 80 0b 00 01 00 0c 00 04 00 00 70 80
2019:04:06-20:21:20 fw01 pluto[5757]: | emitting length of ISAKMP Transform Payload (ISAKMP): 40
2019:04:06-20:21:20 fw01 pluto[5757]: | emitting length of ISAKMP Proposal Payload: 48
2019:04:06-20:21:20 fw01 pluto[5757]: | emitting length of ISAKMP Security Association Payload: 60
2019:04:06-20:21:20 fw01 pluto[5757]: | out_vendorid(): sending [strongSwan]
2019:04:06-20:21:20 fw01 pluto[5757]: | ***emit ISAKMP Vendor ID Payload:
2019:04:06-20:21:20 fw01 pluto[5757]: | next payload type: ISAKMP_NEXT_VID
2019:04:06-20:21:20 fw01 pluto[5757]: | emitting 16 raw bytes of V_ID into ISAKMP Vendor ID Payload
2019:04:06-20:21:20 fw01 pluto[5757]: | V_ID 88 2f e5 6d 6f d2 0d bc 22 51 61 3b 2e be 5b eb
2019:04:06-20:21:20 fw01 pluto[5757]: | emitting length of ISAKMP Vendor ID Payload: 20
2019:04:06-20:21:20 fw01 pluto[5757]: | out_vendorid(): sending [Cisco-Unity]
2019:04:06-20:21:20 fw01 pluto[5757]: | ***emit ISAKMP Vendor ID Payload:
2019:04:06-20:21:20 fw01 pluto[5757]: | next payload type: ISAKMP_NEXT_VID
2019:04:06-20:21:20 fw01 pluto[5757]: | emitting 16 raw bytes of V_ID into ISAKMP Vendor ID Payload
2019:04:06-20:21:20 fw01 pluto[5757]: | V_ID 12 f5 f2 8c 45 71 68 a9 70 2d 9f e2 74 cc 01 00
2019:04:06-20:21:20 fw01 pluto[5757]: | emitting length of ISAKMP Vendor ID Payload: 20
2019:04:06-20:21:20 fw01 pluto[5757]: | out_vendorid(): sending [XAUTH]
2019:04:06-20:21:20 fw01 pluto[5757]: | ***emit ISAKMP Vendor ID Payload:
2019:04:06-20:21:20 fw01 pluto[5757]: | next payload type: ISAKMP_NEXT_VID
2019:04:06-20:21:20 fw01 pluto[5757]: | emitting 8 raw bytes of V_ID into ISAKMP Vendor ID Payload
2019:04:06-20:21:20 fw01 pluto[5757]: | V_ID 09 00 26 89 df d6 b7 12
2019:04:06-20:21:20 fw01 pluto[5757]: | emitting length of ISAKMP Vendor ID Payload: 12
2019:04:06-20:21:20 fw01 pluto[5757]: | out_vendorid(): sending [Dead Peer Detection]
2019:04:06-20:21:20 fw01 pluto[5757]: | ***emit ISAKMP Vendor ID Payload:
2019:04:06-20:21:20 fw01 pluto[5757]: | next payload type: ISAKMP_NEXT_VID
2019:04:06-20:21:20 fw01 pluto[5757]: | emitting 16 raw bytes of V_ID into ISAKMP Vendor ID Payload
2019:04:06-20:21:20 fw01 pluto[5757]: | V_ID af ca d7 13 68 a1 f1 c9 6b 86 96 fc 77 57 01 00
2019:04:06-20:21:20 fw01 pluto[5757]: | emitting length of ISAKMP Vendor ID Payload: 20
2019:04:06-20:21:20 fw01 pluto[5757]: | out_vendorid(): sending [RFC 3947]
2019:04:06-20:21:20 fw01 pluto[5757]: | ***emit ISAKMP Vendor ID Payload:
2019:04:06-20:21:20 fw01 pluto[5757]: | next payload type: ISAKMP_NEXT_NONE
2019:04:06-20:21:20 fw01 pluto[5757]: | emitting 16 raw bytes of V_ID into ISAKMP Vendor ID Payload
2019:04:06-20:21:20 fw01 pluto[5757]: | V_ID 4a 13 1c 81 07 03 58 45 5c 57 28 f2 0e 95 45 2f
2019:04:06-20:21:20 fw01 pluto[5757]: | emitting length of ISAKMP Vendor ID Payload: 20
2019:04:06-20:21:20 fw01 pluto[5757]: | emitting length of ISAKMP Message: 180
2019:04:06-20:21:20 fw01 pluto[5757]: | inserting event EVENT_RETRANSMIT, timeout in 10 seconds for #71
2019:04:06-20:21:20 fw01 pluto[5757]: | next event EVENT_RETRANSMIT in 10 seconds for #71
2019:04:06-20:21:20 fw01 pluto[5757]: |
2019:04:06-20:21:20 fw01 pluto[5757]: | *received 388 bytes from 192.168.1.45:500 on eth1
2019:04:06-20:21:20 fw01 pluto[5757]: | **parse ISAKMP Message:
2019:04:06-20:21:20 fw01 pluto[5757]: | initiator cookie:
2019:04:06-20:21:20 fw01 pluto[5757]: | 0d 6a b7 e0 76 33 aa 57
2019:04:06-20:21:20 fw01 pluto[5757]: | responder cookie:
2019:04:06-20:21:20 fw01 pluto[5757]: | 94 4e e5 86 35 85 46 6e
2019:04:06-20:21:20 fw01 pluto[5757]: | next payload type: ISAKMP_NEXT_KE
2019:04:06-20:21:20 fw01 pluto[5757]: | ISAKMP version: ISAKMP Version 1.0
2019:04:06-20:21:20 fw01 pluto[5757]: | exchange type: ISAKMP_XCHG_IDPROT
2019:04:06-20:21:20 fw01 pluto[5757]: | flags: none
2019:04:06-20:21:20 fw01 pluto[5757]: | message ID: 00 00 00 00
2019:04:06-20:21:20 fw01 pluto[5757]: | length: 388
2019:04:06-20:21:20 fw01 pluto[5757]: | ICOOKIE: 0d 6a b7 e0 76 33 aa 57
2019:04:06-20:21:20 fw01 pluto[5757]: | RCOOKIE: 94 4e e5 86 35 85 46 6e
2019:04:06-20:21:20 fw01 pluto[5757]: | peer: c0 a8 01 2d
2019:04:06-20:21:20 fw01 pluto[5757]: | state hash entry 13
2019:04:06-20:21:20 fw01 pluto[5757]: | state object #71 found, in STATE_MAIN_R1
2019:04:06-20:21:20 fw01 pluto[5757]: | ***parse ISAKMP Key Exchange Payload:
2019:04:06-20:21:20 fw01 pluto[5757]: | next payload type: ISAKMP_NEXT_NONCE
2019:04:06-20:21:20 fw01 pluto[5757]: | length: 260
2019:04:06-20:21:20 fw01 pluto[5757]: | ***parse ISAKMP Nonce Payload:
2019:04:06-20:21:20 fw01 pluto[5757]: | next payload type: ISAKMP_NEXT_NAT-D
2019:04:06-20:21:20 fw01 pluto[5757]: | length: 52
2019:04:06-20:21:20 fw01 pluto[5757]: | ***parse ISAKMP NAT-D Payload:
2019:04:06-20:21:20 fw01 pluto[5757]: | next payload type: ISAKMP_NEXT_NAT-D
2019:04:06-20:21:20 fw01 pluto[5757]: | length: 24
2019:04:06-20:21:20 fw01 pluto[5757]: | ***parse ISAKMP NAT-D Payload:
2019:04:06-20:21:20 fw01 pluto[5757]: | next payload type: ISAKMP_NEXT_NONE
2019:04:06-20:21:20 fw01 pluto[5757]: | length: 24
2019:04:06-20:21:20 fw01 pluto[5757]: | **emit ISAKMP Message:
2019:04:06-20:21:20 fw01 pluto[5757]: | initiator cookie:
2019:04:06-20:21:20 fw01 pluto[5757]: | 0d 6a b7 e0 76 33 aa 57
2019:04:06-20:21:20 fw01 pluto[5757]: | responder cookie:
2019:04:06-20:21:20 fw01 pluto[5757]: | 94 4e e5 86 35 85 46 6e
2019:04:06-20:21:20 fw01 pluto[5757]: | next payload type: ISAKMP_NEXT_KE
2019:04:06-20:21:20 fw01 pluto[5757]: | ISAKMP version: ISAKMP Version 1.0
2019:04:06-20:21:20 fw01 pluto[5757]: | exchange type: ISAKMP_XCHG_IDPROT
2019:04:06-20:21:20 fw01 pluto[5757]: | flags: none
2019:04:06-20:21:20 fw01 pluto[5757]: | message ID: 00 00 00 00
2019:04:06-20:21:20 fw01 pluto[5757]: "L_for vpn"[19] 192.168.1.45 #71: NAT-Traversal: Result using RFC 3947: no NAT detected
2019:04:06-20:21:20 fw01 pluto[5757]: | inserting event EVENT_NAT_T_KEEPALIVE, timeout in 60 seconds
2019:04:06-20:21:20 fw01 pluto[5757]: | size of DH secret exponent: 2046 bits
2019:04:06-20:21:20 fw01 pluto[5757]: | ***emit ISAKMP Key Exchange Payload:
2019:04:06-20:21:20 fw01 pluto[5757]: | next payload type: ISAKMP_NEXT_NONCE
2019:04:06-20:21:20 fw01 pluto[5757]: | emitting 256 raw bytes of keyex value into ISAKMP Key Exchange Payload
2019:04:06-20:21:20 fw01 pluto[5757]: | keyex value c5 c9 fb 2d 62 2d 48 97 cc 37 60 0a d9 0c 9a e5
2019:04:06-20:21:20 fw01 pluto[5757]: | 75 4c 2b 92 b7 2b 23 33 da c4 d0 96 79 fc 95 a0
2019:04:06-20:21:20 fw01 pluto[5757]: | 72 ce 31 3c 86 05 77 70 1f 7c 79 d3 74 8a 11 9f
2019:04:06-20:21:20 fw01 pluto[5757]: | d7 2f bc 0f 3f 7b ee 94 e6 b1 8b 2b 0f c9 ca 07
2019:04:06-20:21:20 fw01 pluto[5757]: | 6f 36 07 9b cf 45 81 9f 99 93 88 d2 a7 46 79 b4
2019:04:06-20:21:20 fw01 pluto[5757]: | eb 88 fc 4d dd fb c7 36 7e 9f f8 d3 77 c1 ed 6f
2019:04:06-20:21:20 fw01 pluto[5757]: | 47 60 27 2e 7f 1d 9c 48 17 7b 6a ba 7f 11 39 ac
2019:04:06-20:21:20 fw01 pluto[5757]: | 1c 9d 9a a2 bd 01 f4 99 da 24 59 aa 26 71 0b da
2019:04:06-20:21:20 fw01 pluto[5757]: | eb b1 a8 93 fc 99 38 bd f1 39 7e bb 43 3f 4e 90
2019:04:06-20:21:20 fw01 pluto[5757]: | d2 81 dd 84 19 87 07 1c b8 ce 77 db 5f 2c a1 3a
2019:04:06-20:21:20 fw01 pluto[5757]: | 28 48 a6 17 e0 90 17 15 34 fd b5 d1 c1 2c 12 1e
2019:04:06-20:21:20 fw01 pluto[5757]: | e8 96 c6 a0 45 c3 24 8e cb 5b 36 aa c6 99 13 be
2019:04:06-20:21:20 fw01 pluto[5757]: | 53 ed 0d c9 c3 54 8a 9b 40 d2 27 79 a2 68 df d3
2019:04:06-20:21:20 fw01 pluto[5757]: | 87 7e ed 9d a4 26 b8 51 0a a5 2b 64 13 13 a7 52
2019:04:06-20:21:20 fw01 pluto[5757]: | b6 0b 8d dd 21 b9 3e 2c f9 8e 1a 4b 3e 9c 2f e1
2019:04:06-20:21:20 fw01 pluto[5757]: | 80 09 d9 46 7f 4d 10 cb 3d da 60 1f e0 26 63 a6
2019:04:06-20:21:20 fw01 pluto[5757]: | emitting length of ISAKMP Key Exchange Payload: 260
2019:04:06-20:21:20 fw01 pluto[5757]: | ***emit ISAKMP Nonce Payload:
2019:04:06-20:21:20 fw01 pluto[5757]: | next payload type: ISAKMP_NEXT_NAT-D
2019:04:06-20:21:20 fw01 pluto[5757]: | emitting 16 raw bytes of Nr into ISAKMP Nonce Payload
2019:04:06-20:21:20 fw01 pluto[5757]: | Nr a0 b8 1e e7 b7 3a 90 e9 40 1f b4 34 b6 a5 bf 8e
2019:04:06-20:21:20 fw01 pluto[5757]: | emitting length of ISAKMP Nonce Payload: 20
2019:04:06-20:21:20 fw01 pluto[5757]: | sending NATD payloads
2019:04:06-20:21:20 fw01 pluto[5757]: | ***emit ISAKMP NAT-D Payload:
2019:04:06-20:21:20 fw01 pluto[5757]: | next payload type: ISAKMP_NEXT_NAT-D
2019:04:06-20:21:20 fw01 pluto[5757]: | emitting 20 raw bytes of NAT-D into ISAKMP NAT-D Payload
2019:04:06-20:21:20 fw01 pluto[5757]: | NAT-D 70 3f c9 de 96 71 56 8a 79 fe 46 53 e2 9f ab e9
2019:04:06-20:21:20 fw01 pluto[5757]: | 19 0f 37 77
2019:04:06-20:21:20 fw01 pluto[5757]: | emitting length of ISAKMP NAT-D Payload: 24
2019:04:06-20:21:20 fw01 pluto[5757]: | ***emit ISAKMP NAT-D Payload:
2019:04:06-20:21:20 fw01 pluto[5757]: | next payload type: ISAKMP_NEXT_NONE
2019:04:06-20:21:20 fw01 pluto[5757]: | emitting 20 raw bytes of NAT-D into ISAKMP NAT-D Payload
2019:04:06-20:21:20 fw01 pluto[5757]: | NAT-D 3f 5a c2 5e 4a ca d7 a0 aa 4f e1 be 24 a7 b9 be
2019:04:06-20:21:20 fw01 pluto[5757]: | 26 5f 40 93
2019:04:06-20:21:20 fw01 pluto[5757]: | emitting length of ISAKMP NAT-D Payload: 24
2019:04:06-20:21:20 fw01 pluto[5757]: | emitting length of ISAKMP Message: 356
2019:04:06-20:21:20 fw01 pluto[5757]: | inserting event EVENT_RETRANSMIT, timeout in 10 seconds for #71
2019:04:06-20:21:20 fw01 pluto[5757]: | next event EVENT_RETRANSMIT in 10 seconds for #71
2019:04:06-20:21:20 fw01 pluto[5757]: |
2019:04:06-20:21:20 fw01 pluto[5757]: | *received 76 bytes from 192.168.1.45:500 on eth1
2019:04:06-20:21:20 fw01 pluto[5757]: | **parse ISAKMP Message:
2019:04:06-20:21:20 fw01 pluto[5757]: | initiator cookie:
2019:04:06-20:21:20 fw01 pluto[5757]: | 0d 6a b7 e0 76 33 aa 57
2019:04:06-20:21:20 fw01 pluto[5757]: | responder cookie:
2019:04:06-20:21:20 fw01 pluto[5757]: | 94 4e e5 86 35 85 46 6e
2019:04:06-20:21:20 fw01 pluto[5757]: | next payload type: ISAKMP_NEXT_ID
2019:04:06-20:21:20 fw01 pluto[5757]: | ISAKMP version: ISAKMP Version 1.0
2019:04:06-20:21:20 fw01 pluto[5757]: | exchange type: ISAKMP_XCHG_IDPROT
2019:04:06-20:21:20 fw01 pluto[5757]: | flags: ISAKMP_FLAG_ENCRYPTION
2019:04:06-20:21:20 fw01 pluto[5757]: | message ID: 00 00 00 00
2019:04:06-20:21:20 fw01 pluto[5757]: | length: 76
2019:04:06-20:21:20 fw01 pluto[5757]: | ICOOKIE: 0d 6a b7 e0 76 33 aa 57
2019:04:06-20:21:20 fw01 pluto[5757]: | RCOOKIE: 94 4e e5 86 35 85 46 6e
2019:04:06-20:21:20 fw01 pluto[5757]: | peer: c0 a8 01 2d
2019:04:06-20:21:20 fw01 pluto[5757]: | state hash entry 13
2019:04:06-20:21:20 fw01 pluto[5757]: | state object #71 found, in STATE_MAIN_R2
2019:04:06-20:21:20 fw01 pluto[5757]: | ***parse ISAKMP Identification Payload:
2019:04:06-20:21:20 fw01 pluto[5757]: | next payload type: ISAKMP_NEXT_HASH
2019:04:06-20:21:20 fw01 pluto[5757]: | length: 12
2019:04:06-20:21:20 fw01 pluto[5757]: | ID type: ID_IPV4_ADDR
2019:04:06-20:21:20 fw01 pluto[5757]: | DOI specific A: 0
2019:04:06-20:21:20 fw01 pluto[5757]: | DOI specific B: 0
2019:04:06-20:21:20 fw01 pluto[5757]: | ***parse ISAKMP Hash Payload:
2019:04:06-20:21:20 fw01 pluto[5757]: | next payload type: ISAKMP_NEXT_NONE
2019:04:06-20:21:20 fw01 pluto[5757]: | length: 24
2019:04:06-20:21:20 fw01 pluto[5757]: | removing 12 bytes of padding
2019:04:06-20:21:20 fw01 pluto[5757]: "L_for vpn"[19] 192.168.1.45 #71: Peer ID is ID_IPV4_ADDR: '192.168.1.45'
2019:04:06-20:21:20 fw01 pluto[5757]: | peer CA: %none
2019:04:06-20:21:20 fw01 pluto[5757]: | current connection is a full match -- no need to look further
2019:04:06-20:21:20 fw01 pluto[5757]: | offered CA: %none
2019:04:06-20:21:20 fw01 pluto[5757]: | **emit ISAKMP Message:
2019:04:06-20:21:20 fw01 pluto[5757]: | initiator cookie:
2019:04:06-20:21:20 fw01 pluto[5757]: | 0d 6a b7 e0 76 33 aa 57
2019:04:06-20:21:20 fw01 pluto[5757]: | responder cookie:
2019:04:06-20:21:20 fw01 pluto[5757]: | 94 4e e5 86 35 85 46 6e
2019:04:06-20:21:20 fw01 pluto[5757]: | next payload type: ISAKMP_NEXT_ID
2019:04:06-20:21:20 fw01 pluto[5757]: | ISAKMP version: ISAKMP Version 1.0
2019:04:06-20:21:20 fw01 pluto[5757]: | exchange type: ISAKMP_XCHG_IDPROT
2019:04:06-20:21:20 fw01 pluto[5757]: | flags: ISAKMP_FLAG_ENCRYPTION
2019:04:06-20:21:20 fw01 pluto[5757]: | message ID: 00 00 00 00
2019:04:06-20:21:20 fw01 pluto[5757]: | ***emit ISAKMP Identification Payload (IPsec DOI):
2019:04:06-20:21:20 fw01 pluto[5757]: | next payload type: ISAKMP_NEXT_HASH
2019:04:06-20:21:20 fw01 pluto[5757]: | ID type: ID_IPV4_ADDR
2019:04:06-20:21:20 fw01 pluto[5757]: | Protocol ID: 0
2019:04:06-20:21:20 fw01 pluto[5757]: | port: 0
2019:04:06-20:21:20 fw01 pluto[5757]: | emitting 4 raw bytes of my identity into ISAKMP Identification Payload (IPsec DOI)
2019:04:06-20:21:20 fw01 pluto[5757]: | my identity 3e 02 d0 aa
2019:04:06-20:21:20 fw01 pluto[5757]: | emitting length of ISAKMP Identification Payload (IPsec DOI): 12
2019:04:06-20:21:20 fw01 pluto[5757]: | ***emit ISAKMP Hash Payload:
2019:04:06-20:21:20 fw01 pluto[5757]: | next payload type: ISAKMP_NEXT_NONE
2019:04:06-20:21:20 fw01 pluto[5757]: | emitting 20 raw bytes of HASH_R into ISAKMP Hash Payload
2019:04:06-20:21:20 fw01 pluto[5757]: | HASH_R aa 05 c3 16 df 97 d4 d2 98 f0 cf dc 58 a7 cb f6
2019:04:06-20:21:20 fw01 pluto[5757]: | 20 55 16 c4
2019:04:06-20:21:20 fw01 pluto[5757]: | emitting length of ISAKMP Hash Payload: 24
2019:04:06-20:21:20 fw01 pluto[5757]: | emitting 12 zero bytes of encryption padding into ISAKMP Message
2019:04:06-20:21:20 fw01 pluto[5757]: | emitting length of ISAKMP Message: 76
2019:04:06-20:21:20 fw01 pluto[5757]: | inserting event EVENT_SA_EXPIRE, timeout in 28800 seconds for #71
2019:04:06-20:21:20 fw01 pluto[5757]: "L_for vpn"[19] 192.168.1.45 #71: sent MR3, ISAKMP SA established
2019:04:06-20:21:20 fw01 pluto[5757]: | next event EVENT_NAT_T_KEEPALIVE in 60 seconds
2019:04:06-20:21:20 fw01 pluto[5757]: |
2019:04:06-20:21:20 fw01 pluto[5757]: | *received 316 bytes from 192.168.1.45:500 on eth1
2019:04:06-20:21:20 fw01 pluto[5757]: | **parse ISAKMP Message:
2019:04:06-20:21:20 fw01 pluto[5757]: | initiator cookie:
2019:04:06-20:21:20 fw01 pluto[5757]: | 0d 6a b7 e0 76 33 aa 57
2019:04:06-20:21:20 fw01 pluto[5757]: | responder cookie:
2019:04:06-20:21:20 fw01 pluto[5757]: | 94 4e e5 86 35 85 46 6e
2019:04:06-20:21:20 fw01 pluto[5757]: | next payload type: ISAKMP_NEXT_HASH
2019:04:06-20:21:20 fw01 pluto[5757]: | ISAKMP version: ISAKMP Version 1.0
2019:04:06-20:21:20 fw01 pluto[5757]: | exchange type: ISAKMP_XCHG_QUICK
2019:04:06-20:21:20 fw01 pluto[5757]: | flags: ISAKMP_FLAG_ENCRYPTION
2019:04:06-20:21:20 fw01 pluto[5757]: | message ID: 00 00 00 01
2019:04:06-20:21:20 fw01 pluto[5757]: | length: 316
2019:04:06-20:21:20 fw01 pluto[5757]: | ICOOKIE: 0d 6a b7 e0 76 33 aa 57
2019:04:06-20:21:20 fw01 pluto[5757]: | RCOOKIE: 94 4e e5 86 35 85 46 6e
2019:04:06-20:21:20 fw01 pluto[5757]: | peer: c0 a8 01 2d
2019:04:06-20:21:20 fw01 pluto[5757]: | state hash entry 13
2019:04:06-20:21:20 fw01 pluto[5757]: | state object not found
2019:04:06-20:21:20 fw01 pluto[5757]: | ICOOKIE: 0d 6a b7 e0 76 33 aa 57
2019:04:06-20:21:20 fw01 pluto[5757]: | RCOOKIE: 94 4e e5 86 35 85 46 6e
2019:04:06-20:21:20 fw01 pluto[5757]: | peer: c0 a8 01 2d
2019:04:06-20:21:20 fw01 pluto[5757]: | state hash entry 13
2019:04:06-20:21:20 fw01 pluto[5757]: | state object #71 found, in STATE_MAIN_R3
2019:04:06-20:21:20 fw01 pluto[5757]: | ***parse ISAKMP Hash Payload:
2019:04:06-20:21:20 fw01 pluto[5757]: | next payload type: ISAKMP_NEXT_SA
2019:04:06-20:21:20 fw01 pluto[5757]: | length: 24
2019:04:06-20:21:20 fw01 pluto[5757]: | ***parse ISAKMP Security Association Payload:
2019:04:06-20:21:20 fw01 pluto[5757]: | next payload type: ISAKMP_NEXT_NONCE
2019:04:06-20:21:20 fw01 pluto[5757]: | length: 172
2019:04:06-20:21:20 fw01 pluto[5757]: | DOI: ISAKMP_DOI_IPSEC
2019:04:06-20:21:20 fw01 pluto[5757]: | ***parse ISAKMP Nonce Payload:
2019:04:06-20:21:20 fw01 pluto[5757]: | next payload type: ISAKMP_NEXT_ID
2019:04:06-20:21:20 fw01 pluto[5757]: | length: 52
2019:04:06-20:21:20 fw01 pluto[5757]: | ***parse ISAKMP Identification Payload (IPsec DOI):
2019:04:06-20:21:20 fw01 pluto[5757]: | next payload type: ISAKMP_NEXT_ID
2019:04:06-20:21:20 fw01 pluto[5757]: | length: 12
2019:04:06-20:21:20 fw01 pluto[5757]: | ID type: ID_IPV4_ADDR
2019:04:06-20:21:20 fw01 pluto[5757]: | Protocol ID: 17
2019:04:06-20:21:20 fw01 pluto[5757]: | port: 1701
2019:04:06-20:21:20 fw01 pluto[5757]: | ***parse ISAKMP Identification Payload (IPsec DOI):
2019:04:06-20:21:20 fw01 pluto[5757]: | next payload type: ISAKMP_NEXT_NONE
2019:04:06-20:21:20 fw01 pluto[5757]: | length: 12
2019:04:06-20:21:20 fw01 pluto[5757]: | ID type: ID_IPV4_ADDR
2019:04:06-20:21:20 fw01 pluto[5757]: | Protocol ID: 17
2019:04:06-20:21:20 fw01 pluto[5757]: | port: 1701
2019:04:06-20:21:20 fw01 pluto[5757]: | removing 16 bytes of padding
2019:04:06-20:21:20 fw01 pluto[5757]: | peer client is 192.168.1.45
2019:04:06-20:21:20 fw01 pluto[5757]: | peer client protocol/port is 17/1701
2019:04:06-20:21:20 fw01 pluto[5757]: | our client is 62.2.208.170
2019:04:06-20:21:20 fw01 pluto[5757]: | our client protocol/port is 17/1701
2019:04:06-20:21:20 fw01 pluto[5757]: | find_client_connection starting with L_for vpn
2019:04:06-20:21:20 fw01 pluto[5757]: | looking for 62.2.208.170/32:17/1701 -> 192.168.1.45/32:17/500
2019:04:06-20:21:20 fw01 pluto[5757]: | concrete checking against sr#0 62.2.208.170/32 -> 0.0.0.0/0
2019:04:06-20:21:20 fw01 pluto[5757]: | fc_try concluding with none [0]
2019:04:06-20:21:20 fw01 pluto[5757]: | fc_try L_for vpn gives none
2019:04:06-20:21:20 fw01 pluto[5757]: | checking hostpair 62.2.208.170/32 -> 0.0.0.0/0 is found
2019:04:06-20:21:20 fw01 pluto[5757]: | fc_try trying L_for vpn:62.2.208.170/32:17/0 -> 192.168.1.45/32:17/0 vs L_for vpn:62.2.208.170/32:17/1701 -> 0.0.0.0/0:17/0
2019:04:06-20:21:20 fw01 pluto[5757]: | fc_try concluding with L_for vpn [16]
2019:04:06-20:21:20 fw01 pluto[5757]: | concluding with d = L_for vpn
2019:04:06-20:21:20 fw01 pluto[5757]: | instantiated "L_for vpn" for 192.168.1.45
2019:04:06-20:21:20 fw01 pluto[5757]: | using connection "L_for vpn"
2019:04:06-20:21:20 fw01 pluto[5757]: | duplicating state object #71
2019:04:06-20:21:20 fw01 pluto[5757]: | creating state object #72 at 0x895ca40
2019:04:06-20:21:20 fw01 pluto[5757]: | ICOOKIE: 0d 6a b7 e0 76 33 aa 57
2019:04:06-20:21:20 fw01 pluto[5757]: | RCOOKIE: 94 4e e5 86 35 85 46 6e
2019:04:06-20:21:20 fw01 pluto[5757]: | peer: c0 a8 01 2d
2019:04:06-20:21:20 fw01 pluto[5757]: | state hash entry 13
2019:04:06-20:21:20 fw01 pluto[5757]: | inserting event EVENT_SO_DISCARD, timeout in 0 seconds for #72
2019:04:06-20:21:20 fw01 pluto[5757]: | **emit ISAKMP Message:
2019:04:06-20:21:20 fw01 pluto[5757]: | initiator cookie:
2019:04:06-20:21:20 fw01 pluto[5757]: | 0d 6a b7 e0 76 33 aa 57
2019:04:06-20:21:20 fw01 pluto[5757]: | responder cookie:
2019:04:06-20:21:20 fw01 pluto[5757]: | 94 4e e5 86 35 85 46 6e
2019:04:06-20:21:20 fw01 pluto[5757]: | next payload type: ISAKMP_NEXT_HASH
2019:04:06-20:21:20 fw01 pluto[5757]: | ISAKMP version: ISAKMP Version 1.0
2019:04:06-20:21:20 fw01 pluto[5757]: | exchange type: ISAKMP_XCHG_QUICK
2019:04:06-20:21:20 fw01 pluto[5757]: | flags: ISAKMP_FLAG_ENCRYPTION
2019:04:06-20:21:20 fw01 pluto[5757]: | message ID: 00 00 00 01
2019:04:06-20:21:20 fw01 pluto[5757]: | ***emit ISAKMP Hash Payload:
2019:04:06-20:21:20 fw01 pluto[5757]: | next payload type: ISAKMP_NEXT_SA
2019:04:06-20:21:20 fw01 pluto[5757]: | emitting 20 zero bytes of HASH into ISAKMP Hash Payload
2019:04:06-20:21:20 fw01 pluto[5757]: | emitting length of ISAKMP Hash Payload: 24
2019:04:06-20:21:20 fw01 pluto[5757]: | ***emit ISAKMP Security Association Payload:
2019:04:06-20:21:20 fw01 pluto[5757]: | next payload type: ISAKMP_NEXT_NONCE
2019:04:06-20:21:20 fw01 pluto[5757]: | DOI: ISAKMP_DOI_IPSEC
2019:04:06-20:21:20 fw01 pluto[5757]: | ****parse IPsec DOI SIT:
2019:04:06-20:21:20 fw01 pluto[5757]: | IPsec DOI SIT: SIT_IDENTITY_ONLY
2019:04:06-20:21:20 fw01 pluto[5757]: | ****parse ISAKMP Proposal Payload:
2019:04:06-20:21:20 fw01 pluto[5757]: | next payload type: ISAKMP_NEXT_P
2019:04:06-20:21:20 fw01 pluto[5757]: | length: 56
2019:04:06-20:21:20 fw01 pluto[5757]: | proposal number: 1
2019:04:06-20:21:20 fw01 pluto[5757]: | protocol ID: PROTO_IPSEC_ESP
2019:04:06-20:21:20 fw01 pluto[5757]: | SPI size: 4
2019:04:06-20:21:20 fw01 pluto[5757]: | number of transforms: 1
2019:04:06-20:21:20 fw01 pluto[5757]: | parsing 4 raw bytes of ISAKMP Proposal Payload into SPI
2019:04:06-20:21:20 fw01 pluto[5757]: | SPI 29 fe 7d 62
2019:04:06-20:21:20 fw01 pluto[5757]: | ****parse ISAKMP Proposal Payload:
2019:04:06-20:21:20 fw01 pluto[5757]: | next payload type: ISAKMP_NEXT_P
2019:04:06-20:21:20 fw01 pluto[5757]: | length: 52
2019:04:06-20:21:20 fw01 pluto[5757]: | proposal number: 2
2019:04:06-20:21:20 fw01 pluto[5757]: | protocol ID: PROTO_IPSEC_ESP
2019:04:06-20:21:20 fw01 pluto[5757]: | SPI size: 4
2019:04:06-20:21:20 fw01 pluto[5757]: | number of transforms: 1
2019:04:06-20:21:20 fw01 pluto[5757]: | *****parse ISAKMP Transform Payload (ESP):
2019:04:06-20:21:20 fw01 pluto[5757]: | next payload type: ISAKMP_NEXT_NONE
2019:04:06-20:21:20 fw01 pluto[5757]: | length: 44
2019:04:06-20:21:20 fw01 pluto[5757]: | transform number: 1
2019:04:06-20:21:20 fw01 pluto[5757]: | transform ID: AES_CBC
2019:04:06-20:21:20 fw01 pluto[5757]: | ******parse ISAKMP IPsec DOI attribute:
2019:04:06-20:21:20 fw01 pluto[5757]: | af+type: ENCAPSULATION_MODE
2019:04:06-20:21:20 fw01 pluto[5757]: | length/value: 2
2019:04:06-20:21:20 fw01 pluto[5757]: | [2 is ENCAPSULATION_MODE_TRANSPORT]
2019:04:06-20:21:20 fw01 pluto[5757]: | ******parse ISAKMP IPsec DOI attribute:
2019:04:06-20:21:20 fw01 pluto[5757]: | af+type: KEY_LENGTH
2019:04:06-20:21:20 fw01 pluto[5757]: | length/value: 128
2019:04:06-20:21:20 fw01 pluto[5757]: | ******parse ISAKMP IPsec DOI attribute:
2019:04:06-20:21:20 fw01 pluto[5757]: | af+type: AUTH_ALGORITHM
2019:04:06-20:21:20 fw01 pluto[5757]: | length/value: 2
2019:04:06-20:21:20 fw01 pluto[5757]: | [2 is HMAC_SHA1]
2019:04:06-20:21:20 fw01 pluto[5757]: | ******parse ISAKMP IPsec DOI attribute:
2019:04:06-20:21:20 fw01 pluto[5757]: | af+type: SA_LIFE_TYPE
2019:04:06-20:21:20 fw01 pluto[5757]: | length/value: 1
2019:04:06-20:21:20 fw01 pluto[5757]: | [1 is SA_LIFE_TYPE_SECONDS]
2019:04:06-20:21:20 fw01 pluto[5757]: | ******parse ISAKMP IPsec DOI attribute:
2019:04:06-20:21:20 fw01 pluto[5757]: | af+type: SA_LIFE_DURATION (variable length)
2019:04:06-20:21:20 fw01 pluto[5757]: | length/value: 4
2019:04:06-20:21:20 fw01 pluto[5757]: | long duration: 3600
2019:04:06-20:21:20 fw01 pluto[5757]: | ******parse ISAKMP IPsec DOI attribute:
2019:04:06-20:21:20 fw01 pluto[5757]: | af+type: SA_LIFE_TYPE
2019:04:06-20:21:20 fw01 pluto[5757]: | length/value: 2
2019:04:06-20:21:20 fw01 pluto[5757]: | [2 is SA_LIFE_TYPE_KBYTES]
2019:04:06-20:21:20 fw01 pluto[5757]: | ******parse ISAKMP IPsec DOI attribute:
2019:04:06-20:21:20 fw01 pluto[5757]: | af+type: SA_LIFE_DURATION (variable length)
2019:04:06-20:21:20 fw01 pluto[5757]: | length/value: 4
2019:04:06-20:21:20 fw01 pluto[5757]: | long duration: 250000
2019:04:06-20:21:20 fw01 pluto[5757]: | kernel_alg_esp_enc_ok(12,128): alg_id=12, alg_ivlen=8, alg_minbits=128, alg_maxbits=256, res=0, ret=1
2019:04:06-20:21:20 fw01 pluto[5757]: | ****emit IPsec DOI SIT:
2019:04:06-20:21:20 fw01 pluto[5757]: | IPsec DOI SIT: SIT_IDENTITY_ONLY
2019:04:06-20:21:20 fw01 pluto[5757]: | ****emit ISAKMP Proposal Payload:
2019:04:06-20:21:20 fw01 pluto[5757]: | next payload type: ISAKMP_NEXT_NONE
2019:04:06-20:21:20 fw01 pluto[5757]: | proposal number: 1
2019:04:06-20:21:20 fw01 pluto[5757]: | protocol ID: PROTO_IPSEC_ESP
2019:04:06-20:21:20 fw01 pluto[5757]: | SPI size: 4
2019:04:06-20:21:20 fw01 pluto[5757]: | number of transforms: 1
2019:04:06-20:21:20 fw01 pluto[5757]: | netlink_get_spi: allocated 0x3421a682 for esp.0@62.2.208.170
2019:04:06-20:21:20 fw01 pluto[5757]: | emitting 4 raw bytes of SPI into ISAKMP Proposal Payload
2019:04:06-20:21:20 fw01 pluto[5757]: | SPI 34 21 a6 82
2019:04:06-20:21:20 fw01 pluto[5757]: | *****emit ISAKMP Transform Payload (ESP):
2019:04:06-20:21:20 fw01 pluto[5757]: | next payload type: ISAKMP_NEXT_NONE
2019:04:06-20:21:20 fw01 pluto[5757]: | transform number: 1
2019:04:06-20:21:20 fw01 pluto[5757]: | transform ID: AES_CBC
2019:04:06-20:21:20 fw01 pluto[5757]: | emitting 36 raw bytes of attributes into ISAKMP Transform Payload (ESP)
2019:04:06-20:21:20 fw01 pluto[5757]: | attributes 80 04 00 02 80 06 00 80 80 05 00 02 80 01 00 01
2019:04:06-20:21:20 fw01 pluto[5757]: | 00 02 00 04 00 00 0e 10 80 01 00 02 00 02 00 04
2019:04:06-20:21:20 fw01 pluto[5757]: | 00 03 d0 90
2019:04:06-20:21:20 fw01 pluto[5757]: | emitting length of ISAKMP Transform Payload (ESP): 44
2019:04:06-20:21:20 fw01 pluto[5757]: | emitting length of ISAKMP Proposal Payload: 56
2019:04:06-20:21:20 fw01 pluto[5757]: | emitting length of ISAKMP Security Association Payload: 68
2019:04:06-20:21:20 fw01 pluto[5757]: "L_for vpn"[19] 192.168.1.45 #72: responding to Quick Mode
2019:04:06-20:21:20 fw01 pluto[5757]: | ***emit ISAKMP Nonce Payload:
2019:04:06-20:21:20 fw01 pluto[5757]: | next payload type: ISAKMP_NEXT_ID
2019:04:06-20:21:20 fw01 pluto[5757]: | emitting 16 raw bytes of Nr into ISAKMP Nonce Payload
2019:04:06-20:21:20 fw01 pluto[5757]: | Nr 21 37 d4 ca a3 a7 66 0d ab aa e1 ab ac ea 89 e1
2019:04:06-20:21:20 fw01 pluto[5757]: | emitting length of ISAKMP Nonce Payload: 20
2019:04:06-20:21:20 fw01 pluto[5757]: | emitting 12 raw bytes of IDci into ISAKMP Message
2019:04:06-20:21:20 fw01 pluto[5757]: | IDci 05 00 00 0c 01 11 06 a5 c0 a8 01 2d
2019:04:06-20:21:20 fw01 pluto[5757]: | emitting 12 raw bytes of IDcr into ISAKMP Message
2019:04:06-20:21:20 fw01 pluto[5757]: | IDcr 00 00 00 0c 01 11 06 a5 3e 02 d0 aa
2019:04:06-20:21:20 fw01 pluto[5757]: | kernel_alg_esp_enc_keylen(): alg_id=12, keylen=16
2019:04:06-20:21:20 fw01 pluto[5757]: | kernel_alg_esp_auth_keylen(auth=2, sadb_aalg=3): a_keylen=20
2019:04:06-20:21:20 fw01 pluto[5757]: | emitting 8 zero bytes of encryption padding into ISAKMP Message
2019:04:06-20:21:20 fw01 pluto[5757]: | emitting length of ISAKMP Message: 172
2019:04:06-20:21:20 fw01 pluto[5757]: | inserting event EVENT_RETRANSMIT, timeout in 10 seconds for #72
2019:04:06-20:21:20 fw01 pluto[5757]: | next event EVENT_RETRANSMIT in 10 seconds for #72
2019:04:06-20:21:20 fw01 pluto[5757]: |
2019:04:06-20:21:20 fw01 pluto[5757]: | *received 60 bytes from 192.168.1.45:500 on eth1
2019:04:06-20:21:20 fw01 pluto[5757]: | **parse ISAKMP Message:
2019:04:06-20:21:20 fw01 pluto[5757]: | initiator cookie:
2019:04:06-20:21:20 fw01 pluto[5757]: | 0d 6a b7 e0 76 33 aa 57
2019:04:06-20:21:20 fw01 pluto[5757]: | responder cookie:
2019:04:06-20:21:20 fw01 pluto[5757]: | 94 4e e5 86 35 85 46 6e
2019:04:06-20:21:20 fw01 pluto[5757]: | next payload type: ISAKMP_NEXT_HASH
2019:04:06-20:21:20 fw01 pluto[5757]: | ISAKMP version: ISAKMP Version 1.0
2019:04:06-20:21:20 fw01 pluto[5757]: | exchange type: ISAKMP_XCHG_QUICK
2019:04:06-20:21:20 fw01 pluto[5757]: | flags: ISAKMP_FLAG_ENCRYPTION
2019:04:06-20:21:20 fw01 pluto[5757]: | message ID: 00 00 00 01
2019:04:06-20:21:20 fw01 pluto[5757]: | length: 60
2019:04:06-20:21:20 fw01 pluto[5757]: | ICOOKIE: 0d 6a b7 e0 76 33 aa 57
2019:04:06-20:21:20 fw01 pluto[5757]: | RCOOKIE: 94 4e e5 86 35 85 46 6e
2019:04:06-20:21:20 fw01 pluto[5757]: | peer: c0 a8 01 2d
2019:04:06-20:21:20 fw01 pluto[5757]: | state hash entry 13
2019:04:06-20:21:20 fw01 pluto[5757]: | state object #72 found, in STATE_QUICK_R1
2019:04:06-20:21:20 fw01 pluto[5757]: | ***parse ISAKMP Hash Payload:
2019:04:06-20:21:20 fw01 pluto[5757]: | next payload type: ISAKMP_NEXT_NONE
2019:04:06-20:21:20 fw01 pluto[5757]: | length: 24
2019:04:06-20:21:20 fw01 pluto[5757]: | removing 8 bytes of padding
2019:04:06-20:21:20 fw01 pluto[5757]: | install_ipsec_sas() for #72: inbound and outbound
2019:04:06-20:21:20 fw01 pluto[5757]: | route owner of "L_for vpn"[19] 192.168.1.45 unrouted: NULL; eroute owner: NULL
2019:04:06-20:21:20 fw01 pluto[5757]: | kernel_alg_esp_info():transid=12, auth=2, ei=0x80e0a48, enckeylen=32, authkeylen=20, encryptalg=12, authalg=3
2019:04:06-20:21:20 fw01 pluto[5757]: | kernel_alg_esp_info():transid=12, auth=2, ei=0x80e0a48, enckeylen=32, authkeylen=20, encryptalg=12, authalg=3
2019:04:06-20:21:20 fw01 pluto[5757]: | add inbound eroute 192.168.1.45/32:1701 -> 62.2.208.170/32:1701 => tun.10000@62.2.208.170:17
2019:04:06-20:21:20 fw01 pluto[5757]: | sr for #72: unrouted
2019:04:06-20:21:20 fw01 pluto[5757]: | route owner of "L_for vpn"[19] 192.168.1.45 unrouted: NULL; eroute owner: NULL
2019:04:06-20:21:20 fw01 pluto[5757]: | route_and_eroute with c: L_for vpn (next: none) ero:null esr:{(nil)} ro:null rosr:{(nil)} and state: 72
2019:04:06-20:21:20 fw01 pluto[5757]: | eroute_connection add eroute 62.2.208.170/32:1701 -> 192.168.1.45/32:1701 => esp.29fe7d62@192.168.1.45:17
2019:04:06-20:21:20 fw01 pluto[5757]: | executing up-host: 2>&1 PLUTO_VERSION='1.1' PLUTO_VERB='up-host' PLUTO_CONNECTION='L_for vpn' PLUTO_NEXT_HOP='192.168.1.45' PLUTO_INTERFACE='eth1' PLUTO_REQID='16541' PLUTO_ME='62.2.208.170' PLUTO_MY_ID='62.2.208.170' PLUTO_MY_CLIENT='62.2.208.170/32' PLUTO_MY_CLIENT_NET='62.2.208.170' PLUTO_MY_CLIENT_MASK='255.255.255.255' PLUTO_MY_PORT='1701' PLUTO_MY_PROTOCOL='17' PLUTO_PEER='192.168.1.45' PLUTO_PEER_ID='192.168.1.45' PLUTO_PEER_CLIENT='192.168.1.45/32' PLUTO_PEER_CLIENT_NET='192.168.1.45' PLUTO_PEER_CLIENT_MASK='255.255.255.255' PLUTO_PEER_PORT='500' PLUTO_PEER_PROTOCOL='17' PLUTO_PEER_CA='' /usr/libexec/ipsec/updown strict
2019:04:06-20:21:20 fw01 pluto[5757]: | route_and_eroute: firewall_notified: true
2019:04:06-20:21:20 fw01 pluto[5757]: | executing prepare-host: 2>&1 PLUTO_VERSION='1.1' PLUTO_VERB='prepare-host' PLUTO_CONNECTION='L_for vpn' PLUTO_NEXT_HOP='192.168.1.45' PLUTO_INTERFACE='eth1' PLUTO_REQID='16541' PLUTO_ME='62.2.208.170' PLUTO_MY_ID='62.2.208.170' PLUTO_MY_CLIENT='62.2.208.170/32' PLUTO_MY_CLIENT_NET='62.2.208.170' PLUTO_MY_CLIENT_MASK='255.255.255.255' PLUTO_MY_PORT='1701' PLUTO_MY_PROTOCOL='17' PLUTO_PEER='192.168.1.45' PLUTO_PEER_ID='192.168.1.45' PLUTO_PEER_CLIENT='192.168.1.45/32' PLUTO_PEER_CLIENT_NET='192.168.1.45' PLUTO_PEER_CLIENT_MASK='255.255.255.255' PLUTO_PEER_PORT='500' PLUTO_PEER_PROTOCOL='17' PLUTO_PEER_CA='' /usr/libexec/ipsec/updown strict
2019:04:06-20:21:20 fw01 pluto[5757]: | executing route-host: 2>&1 PLUTO_VERSION='1.1' PLUTO_VERB='route-host' PLUTO_CONNECTION='L_for vpn' PLUTO_NEXT_HOP='192.168.1.45' PLUTO_INTERFACE='eth1' PLUTO_REQID='16541' PLUTO_ME='62.2.208.170' PLUTO_MY_ID='62.2.208.170' PLUTO_MY_CLIENT='62.2.208.170/32' PLUTO_MY_CLIENT_NET='62.2.208.170' PLUTO_MY_CLIENT_MASK='255.255.255.255' PLUTO_MY_PORT='1701' PLUTO_MY_PROTOCOL='17' PLUTO_PEER='192.168.1.45' PLUTO_PEER_ID='192.168.1.45' PLUTO_PEER_CLIENT='192.168.1.45/32' PLUTO_PEER_CLIENT_NET='192.168.1.45' PLUTO_PEER_CLIENT_MASK='255.255.255.255' PLUTO_PEER_PORT='500' PLUTO_PEER_PROTOCOL='17' PLUTO_PEER_CA='' /usr/libexec/ipsec/updown strict
2019:04:06-20:21:20 fw01 pluto[5757]: updown: called /usr/local/bin/ct -D -s 62.2.208.170/32 -d 192.168.1.45/32 --sport 1701 --dport 500 (0)
2019:04:06-20:21:20 fw01 pluto[5757]: | route_and_eroute: instance "L_for vpn"[19] 192.168.1.45, setting eroute_owner {spd=0x895c700,sr=0x895c700} to #72 (was #0) (newest_ipsec_sa=#0)
2019:04:06-20:21:20 fw01 pluto[5757]: | inI2: instance L_for vpn[19], setting newest_ipsec_sa to #72 (was #0) (spd.eroute=#72)
2019:04:06-20:21:20 fw01 pluto[5757]: | ICOOKIE: 0d 6a b7 e0 76 33 aa 57
2019:04:06-20:21:20 fw01 pluto[5757]: | RCOOKIE: 94 4e e5 86 35 85 46 6e
2019:04:06-20:21:20 fw01 pluto[5757]: | peer: c0 a8 01 2d
2019:04:06-20:21:20 fw01 pluto[5757]: | state hash entry 13
2019:04:06-20:21:20 fw01 pluto[5757]: | state object #71 found, in STATE_MAIN_R3
2019:04:06-20:21:20 fw01 pluto[5757]: | inserting event EVENT_SA_EXPIRE, timeout in 3600 seconds for #72
2019:04:06-20:21:20 fw01 pluto[5757]: "L_for vpn"[19] 192.168.1.45 #72: IPsec SA established {ESP=>0x29fe7d62 <0x3421a682}
2019:04:06-20:21:20 fw01 pluto[5757]: | next event EVENT_NAT_T_KEEPALIVE in 60 seconds
2019:04:06-20:21:21 fw01 pppd-l2tp[25340]: Connection terminated.
2019:04:06-20:21:21 fw01 pppd-l2tp[25340]: Modem hangup
2019:04:06-20:21:21 fw01 pppd-l2tp[25340]: Exit.
2019:04:06-20:21:21 fw01 openl2tpd[21772]: FUNC: tunl 50066: allocated context using profile 'default', created by network request
2019:04:06-20:21:21 fw01 openl2tpd[21772]: PROTO: tunl 50066: SCCRQ received from peer 28
2019:04:06-20:21:21 fw01 openl2tpd[21772]: FSM: CCE(50066) event SCCRQ_ACCEPT in state IDLE
2019:04:06-20:21:21 fw01 openl2tpd[21772]: PROTO: tunl 50066: adjust tx_window_size: peer=8, ours=10
2019:04:06-20:21:21 fw01 openl2tpd[21772]: PROTO: tunl 50066: sending SCCRP to peer 28
2019:04:06-20:21:21 fw01 openl2tpd[21772]: FSM: CCE(50066) state change: IDLE --> WAITCTLCONN
2019:04:06-20:21:21 fw01 openl2tpd[21772]: PROTO: tunl 50066: SCCCN received from peer 28
2019:04:06-20:21:21 fw01 openl2tpd[21772]: FSM: CCE(50066) event SCCCN_ACCEPT in state WAITCTLCONN
2019:04:06-20:21:21 fw01 openl2tpd[21772]: FUNC: tunl 50066 up
2019:04:06-20:21:21 fw01 openl2tpd[21772]: FSM: CCE(50066) state change: WAITCTLCONN --> ESTABLISHED
2019:04:06-20:21:21 fw01 openl2tpd[21772]: PROTO: tunl 50066/0: ICRQ received from peer 28
2019:04:06-20:21:21 fw01 openl2tpd[21772]: PROTO: tunl 50066/39443: sending ICRP to peer 28/1
2019:04:06-20:21:21 fw01 openl2tpd[21772]: PROTO: tunl 50066/39443: ICCN received from peer 28
2019:04:06-20:21:21 fw01 pppd-l2tp[26403]: Plugin aua.so loaded.
2019:04:06-20:21:21 fw01 pppd-l2tp[26403]: AUA plugin initialized.
2019:04:06-20:21:21 fw01 pppd-l2tp[26403]: Plugin ippool.so loaded.
2019:04:06-20:21:21 fw01 pppd-l2tp[26403]: Plugin pppol2tp.so loaded.
2019:04:06-20:21:21 fw01 pppd-l2tp[26403]: pppd 2.4.7 started by (unknown), uid 0
2019:04:06-20:21:21 fw01 pppd-l2tp[26403]: using channel 19
2019:04:06-20:21:21 fw01 pppd-l2tp[26403]: Using interface ppp0
2019:04:06-20:21:21 fw01 pppd-l2tp[26403]: Connect: ppp0 <-->
2019:04:06-20:21:21 fw01 pppd-l2tp[26403]: Overriding mtu 1500 to 1380
2019:04:06-20:21:21 fw01 pppd-l2tp[26403]: PPPoL2TP options: lnsmode tid 50066 sid 39443 debugmask 0
2019:04:06-20:21:21 fw01 pppd-l2tp[26403]: Overriding mru 1500 to mtu value 1380
2019:04:06-20:21:21 fw01 pppd-l2tp[26403]: sent [LCP ConfReq id=0x1 <mru 1380> <asyncmap 0x0> <auth chap MS-v2> <magic 0x754ae56>]
2019:04:06-20:21:21 fw01 pppd-l2tp[26403]: rcvd [LCP ConfReq id=0x0 <mru 1400> <magic 0x30793881> <pcomp> <accomp> <callback CBCP>]
2019:04:06-20:21:21 fw01 pppd-l2tp[26403]: sent [LCP ConfRej id=0x0 <callback CBCP>]
2019:04:06-20:21:21 fw01 pppd-l2tp[26403]: rcvd [LCP ConfReq id=0x1 <mru 1400> <magic 0x30793881> <pcomp> <accomp>]
2019:04:06-20:21:21 fw01 pppd-l2tp[26403]: sent [LCP ConfAck id=0x1 <mru 1400> <magic 0x30793881> <pcomp> <accomp>]

Connection Details of the PPP Tunnel Device on Windows Machine:

---------------------------------------------------------------------------

Verbindungsspezifisches DNS-Suffix:
Beschreibung: test
Physische Adresse: ‎
DHCP-aktiviert: Nein
IPv4-Adresse: 62.2.208.170
IPv4-Subnetzmaske: 255.255.255.255
IPv4-Standardgateway:
IPv4-DNS-Server: 8.8.8.8, 192.168.1.2
IPv4-WINS-Server:
NetBIOS über TCPIP aktiviert: Ja

Microsoft Windows [Version 10.0.17763.379]
(c) 2018 Microsoft Corporation. Alle Rechte vorbehalten.
but if I ping for example www.search.ch

"C:\Users\Elvis Altherr>ping www.search.ch"

I get a timeout

"Ping wird ausgeführt für www.search.ch [195.141.85.90] mit 32 Bytes Daten:
Zeitüberschreitung der Anforderung."

This occurs to all Internet Adresses and i'm wondering that the DNS Resolution seems to work, but not the Internet Access. I tried also a static route but this dosen't help.

Remark: I activated also the internal DHCP Server on the FW and 2 clients within the internal 192.168.1.0/24 Network aquired a IP but not the PC connected via the VPN Tunnel.



This thread was automatically locked due to age.
  • Hallo Elvis,

    This could be several things.  Do you learn anything from doing #1 in Rulz?  Read through #2, paying special attention to the part about the 'ICMP' tab.  Do you see any of your web traffic in the Web Filtering log?

    I don't recommend using the same subnet for L2TP/IPsec clients and any other local subnet - let the UTM's L2TP/IPsec server assign IPs out of the standard, unchanged "VPN Pool (L2TP)" subnet.

    Cheers - Bob
    PS Going forward, turn off debug when creating IPsec logs.  I've not seen one problem solved by a debug log in over 12 years here.

     
    Sophos UTM Community Moderator
    Sophos Certified Architect - UTM
    Sophos Certified Engineer - XG
    Gold Solution Partner since 2005
    MediaSoft, Inc. USA