Advertisement
Guest User

Untitled

a guest
May 18th, 2017
324
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 11.31 KB | None | 0 0
  1. May 18 15:16:10 :103063: <5649> <DBUG> |ike| 10.130.18.20:53280-> pap_ikev2_auth_requests username: 34:fc:b9:c8:ab:76
  2. May 18 15:16:10 :103060: <5649> <DBUG> |ike| 10.130.18.20:53280-> mocana_interface.c:pap_ikev2_auth_requests:1402 user=34:fc:b9:c8:ab:76
  3. May 18 15:16:10 :103063: <5649> <DBUG> |ike| 10.130.18.20:53280-> pap_ikev2_auth_requests ip:10.130.18.20 cookie:2185887711 auth:3 vpn:5
  4. May 18 15:16:10 :124004: <5720> <DBUG> |authmgr| RX (sock) message of type 66, len 1024
  5. May 18 15:16:10 :124454: <5720> <DBUG> |authmgr| auth_user_query_raw: recvd request user:34:fc:b9:c8:ab:76 ip:10.130.18.20 cookie:-2109079585
  6. May 18 15:16:10 :124155: <5720> <DBUG> |authmgr| No macuser for ip 10.130.18.20, mac 00:00:00:00:00:00.
  7. May 18 15:16:10 :124150: <5720> <DBUG> |authmgr| Create ipuser and user 00:00:00:00:00:00.
  8. May 18 15:16:10 :124004: <5720> <DBUG> |authmgr| logging role event for 0x3a1a470: 0x3824480,0x2, index 0
  9. May 18 15:16:10 :124156: <5720> <DBUG> |authmgr| Called ip_user_new() for ip 10.130.18.20.
  10. May 18 15:16:10 :124004: <5720> <DBUG> |authmgr| aal_authenticate: In aal_authenticate
  11. May 18 15:16:10 :124100: <5720> <DBUG> |authmgr| Setting auth subtype 'EAP-LEAP' for user 10.130.18.20, client VPN.
  12. May 18 15:16:10 :124099: <5720> <DBUG> |authmgr| Setting auth type 'VPN' for user 10.130.18.20, client VPN.
  13. May 18 15:16:10 :124098: <5720> <DBUG> |authmgr| Setting authstate 'started' for user 10.130.18.20, client VPN.
  14. May 18 15:16:10 :124546: <5720> <DBUG> |authmgr| aal_authenticate user:34:fc:b9:c8:ab:76 vpnflags:5.
  15. May 18 15:16:10 :124004: <5720> <DBUG> |authmgr| ncfg_auth_server_group_authtype ip=10.130.18.20, method=VPN vpnflags:5
  16. May 18 15:16:10 :124004: <5720> <DBUG> |authmgr| ncfg_auth_server_group_authtype vpnflags:5 vpn-profile:default-iap
  17. May 18 15:16:10 :124004: <5720> <DBUG> |authmgr| ip=10.130.18.20, sg=default
  18. May 18 15:16:10 :124547: <5720> <DBUG> |authmgr| aal_authenticate server_group:default.
  19. May 18 15:16:10 :124004: <5720> <DBUG> |authmgr| ncfg_auth_server_group_authtype ip=10.130.18.20, method=VPN vpnflags:5
  20. May 18 15:16:10 :124004: <5720> <DBUG> |authmgr| ncfg_auth_server_group_authtype vpnflags:5 vpn-profile:default-iap
  21. May 18 15:16:10 :124004: <5720> <DBUG> |authmgr| ip=10.130.18.20, sg=default
  22. May 18 15:16:10 :124004: <5720> <DBUG> |authmgr| Select server for method=VPN, user=34:fc:b9:c8:ab:76, essid=<>, server-group=default, last_srv <>
  23. May 18 15:16:10 :124004: <5720> <DBUG> |authmgr| server=Internal, ena=1, ins=1 (1)
  24. May 18 15:16:10 :124038: <5720> <INFO> |authmgr| Selected server Internal for method=VPN; user=34:fc:b9:c8:ab:76, essid=<>, domain=<>, server-group=default
  25. May 18 15:16:10 :103063: <5649> <DBUG> |ike| 10.130.18.20:53280-> udp_encap_handle_message IKEv2 pkt status:0
  26. May 18 15:16:10 :124004: <5720> <DBUG> |authmgr| aal_authenticate (1247)(INC) : os_reqs 1, s Internal type 1 inservice 1 markedD 0
  27. May 18 15:16:10 :124004: <5720> <DBUG> |authmgr| aal_authenticate (1285)(INC) : os_auths 1, s Internal type 1 inservice 1 markedD 0 sg_name default
  28. May 18 15:16:10 :124230: <5720> <DBUG> |authmgr| Rx message 62/79, length 867 from 10.130.20.9:8344
  29. May 18 15:16:10 :124004: <5720> <DBUG> |authmgr| udb_gen_whitelist_avpairs: Added avpair name Remote-IP value 0
  30. May 18 15:16:10 :124004: <5720> <DBUG> |authmgr| udb_gen_whitelist_avpairs: Added avpair name Remote-IPv6 value ::
  31. May 18 15:16:10 :124004: <5720> <DBUG> |authmgr| udb_gen_whitelist_avpairs: Added avpair name Inner-IP value 0
  32. May 18 15:16:10 :124003: <5720> <INFO> |authmgr| Authentication result=Authentication Successful(0), method=VPN, server=Internal, user=34:fc:b9:c8:ab:76
  33. May 18 15:16:10 :124004: <5720> <DBUG> |authmgr| server_cbh (255)(DEC) : os_reqs 0, s Internal type 1 inservice 1 markedD 0
  34. May 18 15:16:10 :124607: <5720> <DBUG> |authmgr| server_cbh(): response=0 from Auth server 'Internal for client:3 proto:7 eap-type:0'.
  35. May 18 15:16:10 :124004: <5720> <DBUG> |authmgr| server_cbh (648)(DEC) : os_auths 0, s Internal type 1 inservice 1 markedD 0 sg_name default
  36. May 18 15:16:10 :124097: <5720> <DBUG> |authmgr| Setting authserver 'Internal' for user 10.130.18.20, client VPN.
  37. May 18 15:16:10 :124453: <5720> <DBUG> |authmgr| auth_user_query_resp: response user:34:fc:b9:c8:ab:76 ip:10.130.18.20 cookie:-2109079585
  38. May 18 15:16:10 :124184: <5720> <DBUG> |authmgr| {L3} Authenticating Server is Internal.
  39. May 18 15:16:10 :124004: <5720> <DBUG> |authmgr| Matching `default' rules to derive role ...
  40. May 18 15:16:10 :124004: <5720> <DBUG> |authmgr| role 'value-of'
  41. May 18 15:16:10 :124004: <5720> <DBUG> |authmgr| rule: set role condition role value-of
  42. May 18 15:16:10 :124004: <5720> <DBUG> |authmgr| match_rule Value Pair to match User-Name : 34:fc:b9:c8:ab:76
  43. May 18 15:16:10 :124004: <5720> <DBUG> |authmgr| match_rule Value Pair to match AP_Group : dummy
  44. May 18 15:16:10 :124004: <5720> <DBUG> |authmgr| match_rule Value Pair to match AP_Name : IAP-315-3
  45. May 18 15:16:10 :124004: <5720> <DBUG> |authmgr| match_rule Value Pair to match DB_Entry_State : 0
  46. May 18 15:16:10 :124004: <5720> <DBUG> |authmgr| match_rule Value Pair to match Remote-IP : 0.0.0.0
  47. May 18 15:16:10 :124004: <5720> <DBUG> |authmgr| match_rule Value Pair to match Remote-IPv6 : ::
  48. May 18 15:16:10 :124004: <5720> <DBUG> |authmgr| match_rule Value Pair to match Inner-IP : 0.0.0.0
  49. May 18 15:16:10 :124004: <5720> <DBUG> |authmgr| match_rule Value Pair to match AP_Authenticated : 0
  50. May 18 15:16:10 :124004: <5720> <DBUG> |authmgr| match_rule Value Pair to match Server-Name : Internal
  51. May 18 15:16:10 :124004: <5720> <DBUG> |authmgr| match_rule Value Pair to match Authentication-Type : 3
  52. May 18 15:16:10 :124004: <5720> <DBUG> |authmgr| match_rule Value Pair to match Authentication-Sub-Type : 7
  53. May 18 15:16:10 :124004: <5720> <DBUG> |authmgr| match_rule Value Pair to match Server-Group : default
  54. May 18 15:16:10 :124004: <5720> <DBUG> |authmgr| match_rule Value Pair to match User-Name : 34:fc:b9:c8:ab:76
  55. May 18 15:16:10 :124004: <5720> <DBUG> |authmgr| match_rule Value Pair to match fw_mode : 0
  56. May 18 15:16:10 :124004: <5720> <DBUG> |authmgr| match_rule Value Pair to match macaddr : 00:00:00:00:00:00
  57. May 18 15:16:10 :124004: <5720> <DBUG> |authmgr| match_rule Value Pair to match location : N/A
  58. May 18 15:16:10 :124004: <5720> <DBUG> |authmgr| match_rule Value Pair to match essid :
  59. May 18 15:16:10 :124441: <5720> <DBUG> |authmgr| auth_user_query_resp: vpnflags:5
  60. May 18 15:16:10 :124467: <5720> <DBUG> |authmgr| Framed IP: found 0x0 (mask 0x0)
  61. May 18 15:16:10 :124004: <5720> <DBUG> |authmgr| auth_user_query_resp: nvp->name Inner-IP
  62. May 18 15:16:10 :103063: <5649> <DBUG> |ike| ipc_ikev2_auth_recv_vpn_packet cookie:2185887711 innerip 0.0.0.0 inneripv6 ::
  63. May 18 15:16:10 :103063: <5649> <DBUG> |ike| ipc_ikev2_auth_recv_vpn_packet removing ctx 2569fb0 from auth-list. auth-cookie
  64. 2185887711
  65. May 18 15:16:10 :103063: <5649> <DBUG> |ike| *** ipc_auth_recv_packet user=34:fc:b9:c8:ab:76, pass=******, result=0 ctx:0x2569fb0, ctx-innerip::: l2tp_pool:default-l2tp-pool
  66. May 18 15:16:10 :103063: <5649> <DBUG> |ike| ipc_ikev2_auth_recv_vpn_packet rsp.cluster_rap_innerip 0.0.0.0 rsp.inner_ip 0.0.0.0
  67. May 18 15:16:10 :103063: <5649> <DBUG> |ike| get_ikev2_internal_ip Inner-ip from L2TP pool 192.168.42.173, DNS1:0.0.0.0, DNS2:0.0.0.0, WINS1:0.0.0.0, WINS2:0.0.0.0
  68. May 18 15:16:10 :103063: <5649> <DBUG> |ike| controlplaneRouteModify entered with ip:192.168.42.173/255.255.255.255
  69. May 18 15:16:10 :103060: <5649> <DBUG> |ike| ipc.c:controlplaneRouteModify:6752 4b18e8, 2, call (nil), op 0
  70. May 18 15:16:10 :103063: <5649> <DBUG> |ike| controlplaneRouteModify after socket:41 with ip:192.168.42.173
  71. May 18 15:16:10 :103063: <5649> <DBUG> |ike| controlplaneRouteModify socket:41 request:35083 dev:tsgw rtflags:1 with ip:192.168.42.173
  72. May 18 15:16:10 :103060: <5649> <DBUG> |ike| ipc.c:controlplaneRouteModify:6790 Add: Route Already Present in the Kernel
  73. May 18 15:16:10 :103063: <5649> <DBUG> |ike| controlplaneRouteModify after ioctl sock:41 with ip:192.168.42.173
  74. May 18 15:16:10 :103063: <5649> <DBUG> |ike| controlplaneRouteModify after close sock:41 with ip:192.168.42.173
  75. May 18 15:16:10 :103063: <5649> <DBUG> |ike| ipc_ikev2_auth_recv_vpn_packet calling client_auth_ip_up for InnerIP 192.168.42.173, c0a82aad, extip 10.130.18.20
  76. May 18 15:16:10 :124004: <5720> <DBUG> |authmgr| RX (sock) message of type 18, len 64
  77. May 18 15:16:10 :124458: <5720> <DBUG> |authmgr| IP UP int: 192.168.42.173, ext:10.130.18.20 flags 0x5
  78. May 18 15:16:10 :124861: <5720> <DBUG> |authmgr| Auth GSM : IP_USER delete for IP 10.130.18.20
  79. May 18 15:16:10 :124862: <5720> <DBUG> |authmgr| Auth GSM : IP_USER delete failed for IP 10.130.18.20 result error_htbl_key_not_found
  80. May 18 15:16:10 :124155: <5720> <DBUG> |authmgr| No macuser for ip 192.168.42.173, mac 00:00:00:00:00:00.
  81. May 18 15:16:10 :124150: <5720> <DBUG> |authmgr| Create ipuser and user 00:00:00:00:00:00.
  82. May 18 15:16:10 :124004: <5720> <DBUG> |authmgr| logging role event for 0x3a1b110: 0x3824480,0x2, index 0
  83. May 18 15:16:10 :124156: <5720> <DBUG> |authmgr| Called ip_user_new() for ip 192.168.42.173.
  84. May 18 15:16:10 :124861: <5720> <DBUG> |authmgr| Auth GSM : IP_USER delete for IP 192.168.42.173
  85. May 18 15:16:10 :124862: <5720> <DBUG> |authmgr| Auth GSM : IP_USER delete failed for IP 192.168.42.173 result error_htbl_key_not_found
  86. May 18 15:16:10 :124004: <5720> <DBUG> |authmgr| logging role event for 0x3a1b110: 0x2c07460,0x1150308, index 1
  87. May 18 15:16:10 :124182: <5720> <DBUG> |authmgr| {192.168.42.173} role logon for outer=10.130.18.20, count=1, auth type=3->3,
  88. subtype=7, server=Internal.
  89. May 18 15:16:10 :124004: <5720> <DBUG> |authmgr| user_download: User 192.168.42.173 Router Acl(0)
  90. May 18 15:16:10 :124163: <5720> <DBUG> |authmgr| download-L3: ip=192.168.42.173 acl=81/0 role=default-vpn-role, Ubwm=0, Dbwm=0 tunl=0x0, PA=0, HA=1, RO=0, VPN=0, MAC=00:00:00:00:00:00.
  91. May 18 15:16:10 :124234: <5720> <DBUG> |authmgr| Tx message to Sibyte, blocking with ack, Opcode = 164, msglen = 588 2 user messages bundled, actions = 18, 20
  92. May 18 15:16:10 :124004: <5720> <DBUG> |authmgr| user_download: User 10.130.18.20 Router Acl(0)
  93. May 18 15:16:10 :103082: <5649> <INFO> |ike| IKEv2 Client-Authentication succeeded for 192.168.42.173 (External 10.130.18.20)
  94. for default-vpn-role
  95. May 18 15:16:10 :124163: <5720> <DBUG> |authmgr| download-L3: ip=10.130.18.20 acl=2/0 role=logon, Ubwm=0, Dbwm=0 tunl=0x0, PA=0, HA=1, RO=0, VPN=1, MAC=00:00:00:00:00:00.
  96. May 18 15:16:10 :103063: <5649> <DBUG> |ike| IKE_useCert certchain:(nil)
  97. May 18 15:16:10 :124234: <5720> <DBUG> |authmgr| Tx message to Sibyte, blocking with ack, Opcode = 164, msglen = 588 2 user messages bundled, actions = 18, 20
  98. May 18 15:16:10 :103063: <5649> <DBUG> |ike| ikev2_server_can_use_factory_cert:3369 trying self-signed cert
  99. May 18 15:16:10 :103063: <5649> <DBUG> |ike| IKE_CUSTOM_useCert group ca-cert: bits: rsa:2048 ec:0
  100. May 18 15:16:10 :103061: <5649> <ERRS> |ike| IKE_CUSTOM_useCert: can't find Server-Cert
  101. May 18 15:16:10 :103063: <5649> <DBUG> |ike| IKE_CUSTOM_useCert: got 0 certs
  102. May 18 15:16:10 :103063: <5649> <DBUG> |ike| IKE_CUSTOM_useCert: status:-90024
  103. May 18 15:16:10 :103063: <5649> <DBUG> |ike| ipc_ikev2_auth_recv_vpn_packet rsa signature pending, skipping outstanding send
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement