Advertisement
Guest User

Untitled

a guest
Jun 19th, 2017
74
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 21.20 KB | None | 0 0
  1. Jun 19 20:59:53 ip-10-49-43-10.sa-east-1.compute.internal charon[11260]: 16[NET] received packet: from 201.55.56.30[4500] to 10.49.43.10[4500] (92 bytes)
  2. Jun 19 20:59:53 ip-10-49-43-10.sa-east-1.compute.internal charon[11260]: 16[ENC] parsed INFORMATIONAL_V1 request 376847856 [ HASH N(DPD) ]
  3. Jun 19 20:59:53 ip-10-49-43-10.sa-east-1.compute.internal charon[11260]: 16[IKE] queueing ISAKMP_DPD task
  4. Jun 19 20:59:53 ip-10-49-43-10.sa-east-1.compute.internal charon[11260]: 16[IKE] delaying task initiation, TRANSACTION exchange in progress
  5. Jun 19 20:59:55 ip-10-49-43-10.sa-east-1.compute.internal charon[11260]: 06[NET] received packet: from 201.55.56.30[4500] to 10.49.43.10[4500] (92 bytes)
  6. Jun 19 20:59:55 ip-10-49-43-10.sa-east-1.compute.internal charon[11260]: 06[ENC] parsed INFORMATIONAL_V1 request 10268772 [ HASH N(DPD) ]
  7. Jun 19 20:59:55 ip-10-49-43-10.sa-east-1.compute.internal charon[11260]: 06[IKE] queueing ISAKMP_DPD task
  8. Jun 19 20:59:55 ip-10-49-43-10.sa-east-1.compute.internal charon[11260]: 06[IKE] delaying task initiation, TRANSACTION exchange in progress
  9. Jun 19 20:59:57 ip-10-49-43-10.sa-east-1.compute.internal charon[11260]: 15[NET] received packet: from 201.55.56.30[4500] to 10.49.43.10[4500] (92 bytes)
  10. Jun 19 20:59:57 ip-10-49-43-10.sa-east-1.compute.internal charon[11260]: 15[ENC] parsed INFORMATIONAL_V1 request 3817526243 [ HASH N(DPD) ]
  11. Jun 19 20:59:57 ip-10-49-43-10.sa-east-1.compute.internal charon[11260]: 15[IKE] queueing ISAKMP_DPD task
  12. Jun 19 20:59:57 ip-10-49-43-10.sa-east-1.compute.internal charon[11260]: 15[IKE] delaying task initiation, TRANSACTION exchange in progress
  13. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal charon[11260]: 08[NET] received packet: from 201.55.56.30[4500] to 10.49.43.10[4500] (92 bytes)
  14. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal charon[11260]: 08[ENC] parsed INFORMATIONAL_V1 request 1645450177 [ HASH D ]
  15. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal charon[11260]: 08[IKE] received DELETE for IKE_SA ciscoios[6]
  16. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal charon[11260]: 08[IKE] deleting IKE_SA ciscoios[6] between 10.49.43.10[54.233.194.186]...201.55.56.30[201.55.56.30]
  17. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal charon[11260]: 08[IKE] deleting IKE_SA ciscoios[6] between 10.49.43.10[54.233.194.186]...201.55.56.30[201.55.56.30]
  18. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal charon[11260]: 08[IKE] IKE_SA ciscoios[6] state change: ESTABLISHED => DELETING
  19. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal charon[11260]: 08[IKE] queueing ISAKMP_VENDOR task
  20. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal charon[11260]: 08[IKE] queueing ISAKMP_CERT_PRE task
  21. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal charon[11260]: 08[IKE] queueing MAIN_MODE task
  22. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal charon[11260]: 08[IKE] queueing ISAKMP_CERT_POST task
  23. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal charon[11260]: 08[IKE] queueing ISAKMP_NATD task
  24. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal charon[11260]: 08[IKE] activating new tasks
  25. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal charon[11260]: 08[IKE] activating ISAKMP_VENDOR task
  26. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal charon[11260]: 08[IKE] activating ISAKMP_CERT_PRE task
  27. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal charon[11260]: 08[IKE] activating MAIN_MODE task
  28. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal charon[11260]: 08[IKE] activating ISAKMP_CERT_POST task
  29. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal charon[11260]: 08[IKE] activating ISAKMP_NATD task
  30. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal charon[11260]: 08[IKE] sending strongSwan vendor ID
  31. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal charon[11260]: 08[IKE] sending XAuth vendor ID
  32. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal charon[11260]: 08[IKE] sending DPD vendor ID
  33. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal charon[11260]: 08[IKE] sending NAT-T (RFC 3947) vendor ID
  34. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal charon[11260]: 08[IKE] sending draft-ietf-ipsec-nat-t-ike-02\n vendor ID
  35. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal charon[11260]: 08[IKE] initiating Main Mode IKE_SA ciscoios[7] to 201.55.56.30
  36. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal charon[11260]: 08[IKE] initiating Main Mode IKE_SA ciscoios[7] to 201.55.56.30
  37. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal charon[11260]: 08[IKE] IKE_SA ciscoios[7] state change: CREATED => CONNECTING
  38. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal charon[11260]: 08[CFG] configured proposals: IKE:AES_CBC_128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC_128/AES_CBC_192/AES_CBC_256/CAMELLIA_CBC_128/CAMELLIA_CBC_192/CAMELLIA_CBC_256/AES_CTR_128/AES_CTR_192/AES_CTR_256/CAMELLIA_CTR_128/CAMELLIA_CTR_192/CAMELLIA_CTR_256/3DES_CBC/HMAC_SHA2_256_128/HMAC_SHA2_384_192/HMAC_SHA2_512_256/HMAC_MD5_96/HMAC_SHA1_96/AES_XCBC_96/AES_CMAC_96/PRF_HMAC_SHA2_256/PRF_HMAC_SHA2_384/PRF_HMAC_SHA2_512/PRF_AES128_XCBC/PRF_AES128_CMAC/PRF_HMAC_MD5/PRF_HMAC_SHA1/ECP_256/ECP_384/ECP_521/ECP_256_BP/ECP_384_BP/ECP_512_BP/MODP_3072/MODP_4096/MODP_8192/ECP_224/ECP_192/ECP_224_BP/MODP_2048/MODP_2048_224/MODP_2048_256/MODP_1536/MODP_1024/MODP_1024_160, IKE:AES_GCM_16_128/AES_GCM_16_192/AES_GCM_16_256/AES_CCM_16_128/AES_CCM_16_192/AES_CCM_16_256/CAMELLIA_CCM_16_128/CAMELLIA_CCM_16_192/CAMELLIA_CCM_16_256/AES_GCM_12_128/AES_GCM_12_192/AES_GCM_12_256/AES_GCM_8_128/AES_GCM_8_192/AES_GCM_8_256/AES_CCM_8_128/AES_CCM_8_192/AES_CCM_8_256/AES_CCM_12_128/AES_CCM_12_192/AES_CCM_12_256/CAMELLIA_CCM_8_128/CAMELLIA_CCM_8_192/CAMELLIA_CCM_8_256/CAMELLIA_CCM_12_128/CAMELLIA_CCM_12_192/CAMELLIA_CCM_12_256/PRF_HMAC_SHA2_256/PRF_HMAC_SHA2_384/PRF_HMAC_SHA2_512/PRF_AES128_XCBC/PRF_AES128_CMAC/PRF_HMAC_MD5/PRF_HMAC_SHA1/ECP_256/ECP_384/ECP_521/ECP_256_BP/ECP_384_BP/ECP_512_BP/MODP_3072/MODP_4096/MODP_8192/ECP_224/ECP_192/ECP_224_BP/MODP_2048/MODP_2048_224/MODP_2048_256/MODP_1536/MODP_1024/MODP_1024_160
  39. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal charon[11260]: 08[ENC] generating ID_PROT request 0 [ SA V V V V V ]
  40. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal charon[11260]: 08[NET] sending packet: from 10.49.43.10[500] to 201.55.56.30[500] (236 bytes)
  41. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal charon[11260]: 08[IKE] IKE_SA ciscoios[6] state change: DELETING => DELETING
  42. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal charon[11260]: 08[IKE] IKE_SA ciscoios[6] state change: DELETING => DESTROYING
  43. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal charon[11260]: 08[CFG] lease 10.61.21.17 by '201.55.56.30' went offline
  44. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal charon[11260]: 11[NET] received packet: from 201.55.56.30[500] to 10.49.43.10[500] (128 bytes)
  45. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal strongswan[11249]: 11[IKE] queueing MODE_CONFIG task
  46. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal strongswan[11249]: 11[IKE] activating new tasks
  47. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal strongswan[11249]: 11[IKE] activating MODE_CONFIG task
  48. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal strongswan[11249]: 11[CFG] reassigning offline lease to '201.55.56.30'
  49. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal strongswan[11249]: 11[IKE] assigning virtual IP 10.61.21.17 to peer '201.55.56.30'
  50. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal strongswan[11249]: 11[ENC] generating TRANSACTION request 141141966 [ HASH CPS(ADDR) ]
  51. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal strongswan[11249]: 11[NET] sending packet: from 10.49.43.10[4500] to 201.55.56.30[4500] (76 bytes)
  52. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal strongswan[11249]: 11[IKE] delaying task initiation, TRANSACTION exchange in progress
  53. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal strongswan[11249]: 16[NET] received packet: from 201.55.56.30[4500] to 10.49.43.10[4500] (92 bytes)
  54. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal strongswan[11249]: 16[ENC] parsed INFORMATIONAL_V1 request 376847856 [ HASH N(DPD) ]
  55. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal strongswan[11249]: 16[IKE] queueing ISAKMP_DPD task
  56. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal strongswan[11249]: 16[IKE] delaying task initiation, TRANSACTION exchange in progress
  57. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal strongswan[11249]: 06[NET] received packet: from 201.55.56.30[4500] to 10.49.43.10[4500] (92 bytes)
  58. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal strongswan[11249]: 06[ENC] parsed INFORMATIONAL_V1 request 10268772 [ HASH N(DPD) ]
  59. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal strongswan[11249]: 06[IKE] queueing ISAKMP_DPD task
  60. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal strongswan[11249]: 06[IKE] delaying task initiation, TRANSACTION exchange in progress
  61. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal strongswan[11249]: 15[NET] received packet: from 201.55.56.30[4500] to 10.49.43.10[4500] (92 bytes)
  62. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal strongswan[11249]: 15[ENC] parsed INFORMATIONAL_V1 request 3817526243 [ HASH N(DPD) ]
  63. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal strongswan[11249]: 15[IKE] queueing ISAKMP_DPD task
  64. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal strongswan[11249]: 15[IKE] delaying task initiation, TRANSACTION exchange in progress
  65. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal strongswan[11249]: 08[NET] received packet: from 201.55.56.30[4500] to 10.49.43.10[4500] (92 bytes)
  66. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal strongswan[11249]: 08[ENC] parsed INFORMATIONAL_V1 request 1645450177 [ HASH D ]
  67. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal strongswan[11249]: 08[IKE] received DELETE for IKE_SA ciscoios[6]
  68. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal strongswan[11249]: 08[IKE] deleting IKE_SA ciscoios[6] between 10.49.43.10[54.233.194.186]...201.55.56.30[201.55.56.30]
  69. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal strongswan[11249]: 08[IKE] IKE_SA ciscoios[6] state change: ESTABLISHED => DELETING
  70. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal strongswan[11249]: 08[IKE] queueing ISAKMP_VENDOR task
  71. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal strongswan[11249]: 08[IKE] queueing ISAKMP_CERT_PRE task
  72. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal strongswan[11249]: 08[IKE] queueing MAIN_MODE task
  73. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal strongswan[11249]: 08[IKE] queueing ISAKMP_CERT_POST task
  74. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal strongswan[11249]: 08[IKE] queueing ISAKMP_NATD task
  75. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal strongswan[11249]: 08[IKE] activating new tasks
  76. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal strongswan[11249]: 08[IKE] activating ISAKMP_VENDOR task
  77. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal strongswan[11249]: 08[IKE] activating ISAKMP_CERT_PRE task
  78. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal strongswan[11249]: 08[IKE] activating MAIN_MODE task
  79. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal strongswan[11249]: 08[IKE] activating ISAKMP_CERT_POST task
  80. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal strongswan[11249]: 08[IKE] activating ISAKMP_NATD task
  81. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal strongswan[11249]: 08[IKE] sending strongSwan vendor ID
  82. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal strongswan[11249]: 08[IKE] sending XAuth vendor ID
  83. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal strongswan[11249]: 08[IKE] sending DPD vendor ID
  84. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal charon[11260]: 11[ENC] parsed ID_PROT response 0 [ SA V V ]
  85. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal strongswan[11249]: 08[IKE] sending NAT-T (RFC 3947) vendor ID
  86. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal strongswan[11249]: 08[IKE] sending draft-ietf-ipsec-nat-t-ike-02\n vendor ID
  87. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal strongswan[11249]: 08[IKE] initiating Main Mode IKE_SA ciscoios[7] to 201.55.56.30
  88. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal strongswan[11249]: 08[IKE] IKE_SA ciscoios[7] state change: CREATED => CONNECTING
  89. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal strongswan[11249]: 08[CFG] configured proposals: IKE:AES_CBC_128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC_128/AES_CBC_192/AES_CBC_256/CAMELLIA_CBC_128/CAMELLIA_CBC_192/CAMELLIA_CBC_256/AES_CTR_128/AES_CTR_192/AES_CTR_256/CAMELLIA_CTR_128/CAMELLIA_CTR_192/CAMELLIA_CTR_256/3DES_CBC/HMAC_SHA2_256_128/HMAC_SHA2_384_192/HMAC_SHA2_512_256/HMAC_MD5_96/HMAC_SHA1_96/AES_XCBC_96/AES_CMAC_96/PRF_HMAC_SHA2_256/PRF_HMAC_SHA2_384/PRF_HMAC_SHA2_512/PRF_AES128_XCBC/PRF_AES128_CMAC/PRF_HMAC_MD5/PRF_HMAC_SHA1/ECP_256/ECP_384/ECP_521/ECP_256_BP/ECP_384_BP/ECP_512_BP/MODP_3072/MODP_4096/MODP_8192/ECP_224/ECP_192/ECP_224_BP/MODP_2048/MODP_2048_224/MODP_2048_256/MODP_1536/MODP_1024/MODP_1024_160, IKE:AES_GCM_16_128/AES_GCM_16_192/AES_GCM_16_256/AES_CCM_16_128/AES_CCM_16_192/AES_CCM_16_256/CAMELLIA_CCM_16_128/CAMELLIA_CCM_16_192/CAMELLIA_CCM_16_256/AES_GCM_12_128/AES_GCM_12_192/AES_GCM_12_256/AES_GCM_8_128/AES_GCM_8_192/AES_GCM_8_256/AES_CCM_8_128/AES_CCM_8_192/AES_CCM_8_256/AES_CCM_12_128/AES_CCM_12_192/AES_CCM_12_256/CAMELLIA_CCM_8_128/CAMELLIA_CCM_8_192/CAMELLIA_CCM_8_256/CAMELLIA_CCM_12_128/CAMELLIA_CCM_12_192/CAMELLIA_CCM_12_256/PRF_HMAC_SHA2_256/PRF_HMAC_SHA2_384/PRF_HMAC_SHA2_512/PRF_AES128_XCBC/PRF_AES128_CMAC/PRF_HMAC_MD5/PRF_HMAC_SHA1/ECP_256/ECP_384/ECP_521/ECP_256_BP/ECP_384_BP/ECP_512_BP/MODP_3072/MODP_4096/MODP_8192/ECP_224/ECP_192/ECP_224_BP/MODP_2048/MODP_2048_224/MODP_2048_256/MODP_1536/MODP_1024/MODP_1024_160
  90. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal strongswan[11249]: 08[ENC] generating ID_PROT request 0 [ SA V V V V V ]
  91. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal strongswan[11249]: 08[NET] sending packet: from 10.49.43.10[500] to 201.55.56.30[500] (236 bytes)
  92. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal strongswan[11249]: 08[IKE] IKE_SA ciscoios[6] state change: DELETING => DELETING
  93. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal strongswan[11249]: 08[IKE] IKE_SA ciscoios[6] state change: DELETING => DESTROYING
  94. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal strongswan[11249]: 08[CFG] lease 10.61.21.17 by '201.55.56.30' went offline
  95. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal strongswan[11249]: 11[NET] received packet: from 201.55.56.30[500] to 10.49.43.10[500] (128 bytes)
  96. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal charon[11260]: 11[IKE] received NAT-T (RFC 3947) vendor ID
  97. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal charon[11260]: 11[IKE] received FRAGMENTATION vendor ID
  98. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal charon[11260]: 11[CFG] selecting proposal:
  99. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal charon[11260]: 11[CFG] proposal matches
  100. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal charon[11260]: 11[CFG] received proposals: IKE:AES_CBC_128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024
  101. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal charon[11260]: 11[CFG] configured proposals: IKE:AES_CBC_128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC_128/AES_CBC_192/AES_CBC_256/CAMELLIA_CBC_128/CAMELLIA_CBC_192/CAMELLIA_CBC_256/AES_CTR_128/AES_CTR_192/AES_CTR_256/CAMELLIA_CTR_128/CAMELLIA_CTR_192/CAMELLIA_CTR_256/3DES_CBC/HMAC_SHA2_256_128/HMAC_SHA2_384_192/HMAC_SHA2_512_256/HMAC_MD5_96/HMAC_SHA1_96/AES_XCBC_96/AES_CMAC_96/PRF_HMAC_SHA2_256/PRF_HMAC_SHA2_384/PRF_HMAC_SHA2_512/PRF_AES128_XCBC/PRF_AES128_CMAC/PRF_HMAC_MD5/PRF_HMAC_SHA1/ECP_256/ECP_384/ECP_521/ECP_256_BP/ECP_384_BP/ECP_512_BP/MODP_3072/MODP_4096/MODP_8192/ECP_224/ECP_192/ECP_224_BP/MODP_2048/MODP_2048_224/MODP_2048_256/MODP_1536/MODP_1024/MODP_1024_160, IKE:AES_GCM_16_128/AES_GCM_16_192/AES_GCM_16_256/AES_CCM_16_128/AES_CCM_16_192/AES_CCM_16_256/CAMELLIA_CCM_16_128/CAMELLIA_CCM_16_192/CAMELLIA_CCM_16_256/AES_GCM_12_128/AES_GCM_12_192/AES_GCM_12_256/AES_GCM_8_128/AES_GCM_8_192/AES_GCM_8_256/AES_CCM_8_128/AES_CCM_8_192/AES_CCM_8_256/AES_CCM_12_128/AES_CCM_12_192/AES_CCM_12_256/CAMELLIA_CCM_8_128/CAMELLIA_CCM_8_192/CAMELLIA_CCM_8_256/CAMELLIA_CCM_12_128/CAMELLIA_CCM_12_192/CAMELLIA_CCM_12_256/PRF_HMAC_SHA2_256/PRF_HMAC_SHA2_384/PRF_HMAC_SHA2_512/PRF_AES128_XCBC/PRF_AES128_CMAC/PRF_HMAC_MD5/PRF_HMAC_SHA1/ECP_256/ECP_384/ECP_521/ECP_256_BP/ECP_384_BP/ECP_512_BP/MODP_3072/MODP_4096/MODP_8192/ECP_224/ECP_192/ECP_224_BP/MODP_2048/MODP_2048_224/MODP_2048_256/MODP_1536/MODP_1024/MODP_1024_160
  102. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal charon[11260]: 11[CFG] selected proposal: IKE:AES_CBC_128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024
  103. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal charon[11260]: 11[IKE] reinitiating already active tasks
  104. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal charon[11260]: 11[IKE] ISAKMP_VENDOR task
  105. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal charon[11260]: 11[IKE] MAIN_MODE task
  106. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal charon[11260]: 11[ENC] generating ID_PROT request 0 [ KE No NAT-D NAT-D ]
  107. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal charon[11260]: 11[NET] sending packet: from 10.49.43.10[500] to 201.55.56.30[500] (244 bytes)
  108. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal charon[11260]: 05[NET] received packet: from 201.55.56.30[500] to 10.49.43.10[500] (304 bytes)
  109. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal charon[11260]: 05[ENC] parsed ID_PROT response 0 [ KE No V V V V NAT-D NAT-D ]
  110. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal charon[11260]: 05[IKE] received Cisco Unity vendor ID
  111. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal charon[11260]: 05[IKE] received XAuth vendor ID
  112. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal charon[11260]: 05[ENC] received unknown vendor ID: 5d:4e:bb:12:ab:d2:0f:59:ff:8a:26:3f:a6:9e:66:88
  113. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal charon[11260]: 05[ENC] received unknown vendor ID: 1f:07:f7:0e:aa:65:14:d3:b0:fa:96:54:2a:50:01:00
  114. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal charon[11260]: 05[IKE] local host is behind NAT, sending keep alives
  115. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal charon[11260]: 05[IKE] reinitiating already active tasks
  116. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal charon[11260]: 05[IKE] ISAKMP_VENDOR task
  117. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal charon[11260]: 05[IKE] MAIN_MODE task
  118. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal charon[11260]: 05[ENC] generating ID_PROT request 0 [ ID HASH N(INITIAL_CONTACT) ]
  119. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal charon[11260]: 05[NET] sending packet: from 10.49.43.10[4500] to 201.55.56.30[4500] (108 bytes)
  120. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal charon[11260]: 10[NET] received packet: from 201.55.56.30[4500] to 10.49.43.10[4500] (92 bytes)
  121. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal charon[11260]: 10[ENC] parsed ID_PROT response 0 [ ID HASH V ]
  122. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal charon[11260]: 10[IKE] received DPD vendor ID
  123. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal charon[11260]: 10[IKE] IKE_SA ciscoios[7] established between 10.49.43.10[54.233.194.186]...201.55.56.30[201.55.56.30]
  124. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal charon[11260]: 10[IKE] IKE_SA ciscoios[7] established between 10.49.43.10[54.233.194.186]...201.55.56.30[201.55.56.30]
  125. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal charon[11260]: 10[IKE] IKE_SA ciscoios[7] state change: CONNECTING => ESTABLISHED
  126. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal charon[11260]: 10[IKE] scheduling reauthentication in 28457s
  127. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal charon[11260]: 10[IKE] maximum IKE_SA lifetime 28637s
  128. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal charon[11260]: 10[IKE] queueing MODE_CONFIG task
  129. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal charon[11260]: 10[IKE] activating new tasks
  130. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal charon[11260]: 10[IKE] activating MODE_CONFIG task
  131. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal charon[11260]: 10[CFG] reassigning offline lease to '201.55.56.30'
  132. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal charon[11260]: 10[IKE] assigning virtual IP 10.61.21.17 to peer '201.55.56.30'
  133. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal charon[11260]: 10[ENC] generating TRANSACTION request 3396608126 [ HASH CPS(ADDR) ]
  134. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal charon[11260]: 10[NET] sending packet: from 10.49.43.10[4500] to 201.55.56.30[4500] (76 bytes)
  135. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal charon[11260]: 10[IKE] delaying task initiation, TRANSACTION exchange in progress
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement