Advertisement
Guest User

log

a guest
Oct 28th, 2014
343
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 9.84 KB | None | 0 0
  1. packet from 91.215.61.1:62421: received and ignored informational message
  2. packet from 91.215.61.1:56394: ignoring Vendor ID payload [MS NT5 ISAKMPOAKLEY 00000008]
  3. packet from 91.215.61.1:56394: received Vendor ID payload [RFC 3947] method set to=109
  4. packet from 91.215.61.1:56394: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] meth=106, but already using method 109
  5. packet from 91.215.61.1:56394: ignoring Vendor ID payload [FRAGMENTATION]
  6. packet from 91.215.61.1:56394: ignoring Vendor ID payload [MS-Negotiation Discovery Capable]
  7. packet from 91.215.61.1:56394: ignoring Vendor ID payload [Vid-Initial-Contact]
  8. packet from 91.215.61.1:56394: ignoring Vendor ID payload [IKE CGA version 1]
  9. "L2TP-PSK"[9] 91.215.61.1 #25: responding to Main Mode from unknown peer 91.215.61.1
  10. "L2TP-PSK"[9] 91.215.61.1 #25: OAKLEY_GROUP 20 not supported. Attribute OAKLEY_GROUP_DESCRIPTION
  11. "L2TP-PSK"[9] 91.215.61.1 #25: OAKLEY_GROUP 19 not supported. Attribute OAKLEY_GROUP_DESCRIPTION
  12. "L2TP-PSK"[9] 91.215.61.1 #25: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
  13. "L2TP-PSK"[9] 91.215.61.1 #25: STATE_MAIN_R1: sent MR1, expecting MI2
  14. "L2TP-PSK"[9] 91.215.61.1 #25: NAT-Traversal: Result using RFC 3947 (NAT-Traversal): both are NATed
  15. "L2TP-PSK"[9] 91.215.61.1 #25: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
  16. "L2TP-PSK"[9] 91.215.61.1 #25: STATE_MAIN_R2: sent MR2, expecting MI3
  17. "L2TP-PSK"[9] 91.215.61.1 #25: Main mode peer ID is ID_IPV4_ADDR: '192.168.0.101'
  18. "L2TP-PSK"[9] 91.215.61.1 #25: switched from "L2TP-PSK" to "L2TP-PSK"
  19. "L2TP-PSK"[10] 91.215.61.1 #25: deleting connection "L2TP-PSK" instance with peer 91.215.61.1 {isakmp=#0/ipsec=#0}
  20. "L2TP-PSK"[10] 91.215.61.1 #25: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
  21. "L2TP-PSK"[10] 91.215.61.1 #25: new NAT mapping for #25, was 91.215.61.1:56394, now 91.215.61.1:62124
  22. "L2TP-PSK"[10] 91.215.61.1 #25: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=aes_256 prf=oakley_sha group=modp2048}
  23. "L2TP-PSK"[10] 91.215.61.1 #25: Dead Peer Detection (RFC 3706): not enabled because peer did not advertise it
  24. "L2TP-PSK"[10] 91.215.61.1 #25: the peer proposed: 217.12.206.156/32:17/1701 -> 192.168.0.101/32:17/0
  25. "L2TP-PSK"[10] 91.215.61.1 #25: NAT-Traversal: received 2 NAT-OA. using first, ignoring others
  26. "L2TP-PSK"[10] 91.215.61.1 #26: responding to Quick Mode proposal {msgid:01000000}
  27. "L2TP-PSK"[10] 91.215.61.1 #26: us: 217.12.206.156<217.12.206.156>[+S=C]:17/1701
  28. "L2TP-PSK"[10] 91.215.61.1 #26: them: 91.215.61.1[192.168.0.101,+S=C]:17/0
  29. "L2TP-PSK"[10] 91.215.61.1 #26: transition from state STATE_QUICK_R0 to state STATE_QUICK_R1
  30. "L2TP-PSK"[10] 91.215.61.1 #26: STATE_QUICK_R1: sent QR1, inbound IPsec SA installed, expecting QI2
  31. "L2TP-PSK"[10] 91.215.61.1 #26: Dead Peer Detection (RFC 3706): not enabled because peer did not advertise it
  32. "L2TP-PSK"[10] 91.215.61.1 #26: transition from state STATE_QUICK_R1 to state STATE_QUICK_R2
  33. "L2TP-PSK"[10] 91.215.61.1 #26: STATE_QUICK_R2: IPsec SA established transport mode {ESP/NAT=>0x1c5504ab <0x2218fa22 xfrm=AES_128-HMAC_SHA1 NATOA=192.168.0.101 NATD=91.215.61.1:62124 DPD=none}
  34. "L2TP-PSK"[10] 91.215.61.1 #25: the peer proposed: 217.12.206.156/32:17/1701 -> 192.168.0.101/32:17/0
  35. "L2TP-PSK"[10] 91.215.61.1 #25: NAT-Traversal: received 2 NAT-OA. using first, ignoring others
  36. "L2TP-PSK"[10] 91.215.61.1 #27: responding to Quick Mode proposal {msgid:02000000}
  37. "L2TP-PSK"[10] 91.215.61.1 #27: us: 217.12.206.156<217.12.206.156>[+S=C]:17/1701
  38. "L2TP-PSK"[10] 91.215.61.1 #27: them: 91.215.61.1[192.168.0.101,+S=C]:17/0
  39. "L2TP-PSK"[10] 91.215.61.1 #27: keeping refhim=4294901761 during rekey
  40. "L2TP-PSK"[10] 91.215.61.1 #27: transition from state STATE_QUICK_R0 to state STATE_QUICK_R1
  41. "L2TP-PSK"[10] 91.215.61.1 #27: STATE_QUICK_R1: sent QR1, inbound IPsec SA installed, expecting QI2
  42. "L2TP-PSK"[10] 91.215.61.1 #27: Dead Peer Detection (RFC 3706): not enabled because peer did not advertise it
  43. "L2TP-PSK"[10] 91.215.61.1 #27: transition from state STATE_QUICK_R1 to state STATE_QUICK_R2
  44. "L2TP-PSK"[10] 91.215.61.1 #27: STATE_QUICK_R2: IPsec SA established transport mode {ESP/NAT=>0x4681c67c <0xc06492bf xfrm=AES_128-HMAC_SHA1 NATOA=192.168.0.101 NATD=91.215.61.1:62124 DPD=none}
  45. "L2TP-PSK"[10] 91.215.61.1 #25: received Delete SA(0x1c5504ab) payload: deleting IPSEC State #26
  46. "L2TP-PSK"[10] 91.215.61.1 #25: received and ignored informational message
  47. "L2TP-PSK"[10] 91.215.61.1 #25: the peer proposed: 217.12.206.156/32:17/1701 -> 192.168.0.101/32:17/0
  48. "L2TP-PSK"[10] 91.215.61.1 #25: NAT-Traversal: received 2 NAT-OA. using first, ignoring others
  49. "L2TP-PSK"[10] 91.215.61.1 #28: responding to Quick Mode proposal {msgid:03000000}
  50. "L2TP-PSK"[10] 91.215.61.1 #28: us: 217.12.206.156<217.12.206.156>[+S=C]:17/1701
  51. "L2TP-PSK"[10] 91.215.61.1 #28: them: 91.215.61.1[192.168.0.101,+S=C]:17/0
  52. "L2TP-PSK"[10] 91.215.61.1 #28: keeping refhim=4294901761 during rekey
  53. "L2TP-PSK"[10] 91.215.61.1 #28: transition from state STATE_QUICK_R0 to state STATE_QUICK_R1
  54. "L2TP-PSK"[10] 91.215.61.1 #28: STATE_QUICK_R1: sent QR1, inbound IPsec SA installed, expecting QI2
  55. "L2TP-PSK"[10] 91.215.61.1 #28: Dead Peer Detection (RFC 3706): not enabled because peer did not advertise it
  56. "L2TP-PSK"[10] 91.215.61.1 #28: transition from state STATE_QUICK_R1 to state STATE_QUICK_R2
  57. "L2TP-PSK"[10] 91.215.61.1 #28: STATE_QUICK_R2: IPsec SA established transport mode {ESP/NAT=>0x1b4d05e1 <0x0067fa1c xfrm=AES_128-HMAC_SHA1 NATOA=192.168.0.101 NATD=91.215.61.1:62124 DPD=none}
  58. "L2TP-PSK"[10] 91.215.61.1 #25: received Delete SA(0x4681c67c) payload: deleting IPSEC State #27
  59. "L2TP-PSK"[10] 91.215.61.1 #25: received and ignored informational message
  60. "L2TP-PSK"[10] 91.215.61.1 #25: the peer proposed: 217.12.206.156/32:17/1701 -> 192.168.0.101/32:17/0
  61. "L2TP-PSK"[10] 91.215.61.1 #25: NAT-Traversal: received 2 NAT-OA. using first, ignoring others
  62. "L2TP-PSK"[10] 91.215.61.1 #29: responding to Quick Mode proposal {msgid:04000000}
  63. "L2TP-PSK"[10] 91.215.61.1 #29: us: 217.12.206.156<217.12.206.156>[+S=C]:17/1701
  64. "L2TP-PSK"[10] 91.215.61.1 #29: them: 91.215.61.1[192.168.0.101,+S=C]:17/0
  65. "L2TP-PSK"[10] 91.215.61.1 #29: keeping refhim=4294901761 during rekey
  66. "L2TP-PSK"[10] 91.215.61.1 #29: transition from state STATE_QUICK_R0 to state STATE_QUICK_R1
  67. "L2TP-PSK"[10] 91.215.61.1 #29: STATE_QUICK_R1: sent QR1, inbound IPsec SA installed, expecting QI2
  68. "L2TP-PSK"[10] 91.215.61.1 #29: Dead Peer Detection (RFC 3706): not enabled because peer did not advertise it
  69. "L2TP-PSK"[10] 91.215.61.1 #29: transition from state STATE_QUICK_R1 to state STATE_QUICK_R2
  70. "L2TP-PSK"[10] 91.215.61.1 #29: STATE_QUICK_R2: IPsec SA established transport mode {ESP/NAT=>0x0f30ebde <0xf0d09878 xfrm=AES_128-HMAC_SHA1 NATOA=192.168.0.101 NATD=91.215.61.1:62124 DPD=none}
  71. "L2TP-PSK"[10] 91.215.61.1 #25: received Delete SA(0x1b4d05e1) payload: deleting IPSEC State #28
  72. "L2TP-PSK"[10] 91.215.61.1 #25: received and ignored informational message
  73. "L2TP-PSK"[10] 91.215.61.1 #25: the peer proposed: 217.12.206.156/32:17/1701 -> 192.168.0.101/32:17/0
  74. "L2TP-PSK"[10] 91.215.61.1 #25: NAT-Traversal: received 2 NAT-OA. using first, ignoring others
  75. "L2TP-PSK"[10] 91.215.61.1 #30: responding to Quick Mode proposal {msgid:05000000}
  76. "L2TP-PSK"[10] 91.215.61.1 #30: us: 217.12.206.156<217.12.206.156>[+S=C]:17/1701
  77. "L2TP-PSK"[10] 91.215.61.1 #30: them: 91.215.61.1[192.168.0.101,+S=C]:17/0
  78. "L2TP-PSK"[10] 91.215.61.1 #30: keeping refhim=4294901761 during rekey
  79. "L2TP-PSK"[10] 91.215.61.1 #30: transition from state STATE_QUICK_R0 to state STATE_QUICK_R1
  80. "L2TP-PSK"[10] 91.215.61.1 #30: STATE_QUICK_R1: sent QR1, inbound IPsec SA installed, expecting QI2
  81. "L2TP-PSK"[10] 91.215.61.1 #30: Dead Peer Detection (RFC 3706): not enabled because peer did not advertise it
  82. "L2TP-PSK"[10] 91.215.61.1 #30: transition from state STATE_QUICK_R1 to state STATE_QUICK_R2
  83. "L2TP-PSK"[10] 91.215.61.1 #30: STATE_QUICK_R2: IPsec SA established transport mode {ESP/NAT=>0x83ecea9e <0xab384b46 xfrm=AES_128-HMAC_SHA1 NATOA=192.168.0.101 NATD=91.215.61.1:62124 DPD=none}
  84. "L2TP-PSK"[10] 91.215.61.1 #25: received Delete SA(0x0f30ebde) payload: deleting IPSEC State #29
  85. "L2TP-PSK"[10] 91.215.61.1 #25: received and ignored informational message
  86. "L2TP-PSK"[10] 91.215.61.1 #25: the peer proposed: 217.12.206.156/32:17/1701 -> 192.168.0.101/32:17/0
  87. "L2TP-PSK"[10] 91.215.61.1 #25: NAT-Traversal: received 2 NAT-OA. using first, ignoring others
  88. "L2TP-PSK"[10] 91.215.61.1 #31: responding to Quick Mode proposal {msgid:06000000}
  89. "L2TP-PSK"[10] 91.215.61.1 #31: us: 217.12.206.156<217.12.206.156>[+S=C]:17/1701
  90. "L2TP-PSK"[10] 91.215.61.1 #31: them: 91.215.61.1[192.168.0.101,+S=C]:17/0
  91. "L2TP-PSK"[10] 91.215.61.1 #31: keeping refhim=4294901761 during rekey
  92. "L2TP-PSK"[10] 91.215.61.1 #31: transition from state STATE_QUICK_R0 to state STATE_QUICK_R1
  93. "L2TP-PSK"[10] 91.215.61.1 #31: STATE_QUICK_R1: sent QR1, inbound IPsec SA installed, expecting QI2
  94. "L2TP-PSK"[10] 91.215.61.1 #31: Dead Peer Detection (RFC 3706): not enabled because peer did not advertise it
  95. "L2TP-PSK"[10] 91.215.61.1 #31: transition from state STATE_QUICK_R1 to state STATE_QUICK_R2
  96. "L2TP-PSK"[10] 91.215.61.1 #31: STATE_QUICK_R2: IPsec SA established transport mode {ESP/NAT=>0x7c164a7c <0x75238050 xfrm=AES_128-HMAC_SHA1 NATOA=192.168.0.101 NATD=91.215.61.1:62124 DPD=none}
  97. "L2TP-PSK"[10] 91.215.61.1 #25: received Delete SA(0x83ecea9e) payload: deleting IPSEC State #30
  98. "L2TP-PSK"[10] 91.215.61.1 #25: received and ignored informational message
  99. "L2TP-PSK"[10] 91.215.61.1 #25: received Delete SA(0x7c164a7c) payload: deleting IPSEC State #31
  100. "L2TP-PSK"[10] 91.215.61.1 #25: received and ignored informational message
  101. "L2TP-PSK"[10] 91.215.61.1 #25: received Delete SA payload: deleting ISAKMP State #25
  102. "L2TP-PSK"[10] 91.215.61.1: deleting connection "L2TP-PSK" instance with peer 91.215.61.1 {isakmp=#0/ipsec=#0}
  103. packet from 91.215.61.1:62124: received and ignored informational message
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement