daily pastebin goal
91%
SHARE
TWEET

Untitled

a guest Jun 19th, 2017 48 Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
  1. Jun 19 20:59:53 ip-10-49-43-10.sa-east-1.compute.internal charon[11260]: 16[NET] received packet: from 201.55.56.30[4500] to 10.49.43.10[4500] (92 bytes)
  2. Jun 19 20:59:53 ip-10-49-43-10.sa-east-1.compute.internal charon[11260]: 16[ENC] parsed INFORMATIONAL_V1 request 376847856 [ HASH N(DPD) ]
  3. Jun 19 20:59:53 ip-10-49-43-10.sa-east-1.compute.internal charon[11260]: 16[IKE] queueing ISAKMP_DPD task
  4. Jun 19 20:59:53 ip-10-49-43-10.sa-east-1.compute.internal charon[11260]: 16[IKE] delaying task initiation, TRANSACTION exchange in progress
  5. Jun 19 20:59:55 ip-10-49-43-10.sa-east-1.compute.internal charon[11260]: 06[NET] received packet: from 201.55.56.30[4500] to 10.49.43.10[4500] (92 bytes)
  6. Jun 19 20:59:55 ip-10-49-43-10.sa-east-1.compute.internal charon[11260]: 06[ENC] parsed INFORMATIONAL_V1 request 10268772 [ HASH N(DPD) ]
  7. Jun 19 20:59:55 ip-10-49-43-10.sa-east-1.compute.internal charon[11260]: 06[IKE] queueing ISAKMP_DPD task
  8. Jun 19 20:59:55 ip-10-49-43-10.sa-east-1.compute.internal charon[11260]: 06[IKE] delaying task initiation, TRANSACTION exchange in progress
  9. Jun 19 20:59:57 ip-10-49-43-10.sa-east-1.compute.internal charon[11260]: 15[NET] received packet: from 201.55.56.30[4500] to 10.49.43.10[4500] (92 bytes)
  10. Jun 19 20:59:57 ip-10-49-43-10.sa-east-1.compute.internal charon[11260]: 15[ENC] parsed INFORMATIONAL_V1 request 3817526243 [ HASH N(DPD) ]
  11. Jun 19 20:59:57 ip-10-49-43-10.sa-east-1.compute.internal charon[11260]: 15[IKE] queueing ISAKMP_DPD task
  12. Jun 19 20:59:57 ip-10-49-43-10.sa-east-1.compute.internal charon[11260]: 15[IKE] delaying task initiation, TRANSACTION exchange in progress
  13. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal charon[11260]: 08[NET] received packet: from 201.55.56.30[4500] to 10.49.43.10[4500] (92 bytes)
  14. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal charon[11260]: 08[ENC] parsed INFORMATIONAL_V1 request 1645450177 [ HASH D ]
  15. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal charon[11260]: 08[IKE] received DELETE for IKE_SA ciscoios[6]
  16. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal charon[11260]: 08[IKE] deleting IKE_SA ciscoios[6] between 10.49.43.10[54.233.194.186]...201.55.56.30[201.55.56.30]
  17. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal charon[11260]: 08[IKE] deleting IKE_SA ciscoios[6] between 10.49.43.10[54.233.194.186]...201.55.56.30[201.55.56.30]
  18. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal charon[11260]: 08[IKE] IKE_SA ciscoios[6] state change: ESTABLISHED => DELETING
  19. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal charon[11260]: 08[IKE] queueing ISAKMP_VENDOR task
  20. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal charon[11260]: 08[IKE] queueing ISAKMP_CERT_PRE task
  21. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal charon[11260]: 08[IKE] queueing MAIN_MODE task
  22. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal charon[11260]: 08[IKE] queueing ISAKMP_CERT_POST task
  23. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal charon[11260]: 08[IKE] queueing ISAKMP_NATD task
  24. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal charon[11260]: 08[IKE] activating new tasks
  25. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal charon[11260]: 08[IKE]   activating ISAKMP_VENDOR task
  26. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal charon[11260]: 08[IKE]   activating ISAKMP_CERT_PRE task
  27. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal charon[11260]: 08[IKE]   activating MAIN_MODE task
  28. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal charon[11260]: 08[IKE]   activating ISAKMP_CERT_POST task
  29. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal charon[11260]: 08[IKE]   activating ISAKMP_NATD task
  30. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal charon[11260]: 08[IKE] sending strongSwan vendor ID
  31. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal charon[11260]: 08[IKE] sending XAuth vendor ID
  32. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal charon[11260]: 08[IKE] sending DPD vendor ID
  33. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal charon[11260]: 08[IKE] sending NAT-T (RFC 3947) vendor ID
  34. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal charon[11260]: 08[IKE] sending draft-ietf-ipsec-nat-t-ike-02\n vendor ID
  35. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal charon[11260]: 08[IKE] initiating Main Mode IKE_SA ciscoios[7] to 201.55.56.30
  36. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal charon[11260]: 08[IKE] initiating Main Mode IKE_SA ciscoios[7] to 201.55.56.30
  37. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal charon[11260]: 08[IKE] IKE_SA ciscoios[7] state change: CREATED => CONNECTING
  38. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal charon[11260]: 08[CFG] configured proposals: IKE:AES_CBC_128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC_128/AES_CBC_192/AES_CBC_256/CAMELLIA_CBC_128/CAMELLIA_CBC_192/CAMELLIA_CBC_256/AES_CTR_128/AES_CTR_192/AES_CTR_256/CAMELLIA_CTR_128/CAMELLIA_CTR_192/CAMELLIA_CTR_256/3DES_CBC/HMAC_SHA2_256_128/HMAC_SHA2_384_192/HMAC_SHA2_512_256/HMAC_MD5_96/HMAC_SHA1_96/AES_XCBC_96/AES_CMAC_96/PRF_HMAC_SHA2_256/PRF_HMAC_SHA2_384/PRF_HMAC_SHA2_512/PRF_AES128_XCBC/PRF_AES128_CMAC/PRF_HMAC_MD5/PRF_HMAC_SHA1/ECP_256/ECP_384/ECP_521/ECP_256_BP/ECP_384_BP/ECP_512_BP/MODP_3072/MODP_4096/MODP_8192/ECP_224/ECP_192/ECP_224_BP/MODP_2048/MODP_2048_224/MODP_2048_256/MODP_1536/MODP_1024/MODP_1024_160, IKE:AES_GCM_16_128/AES_GCM_16_192/AES_GCM_16_256/AES_CCM_16_128/AES_CCM_16_192/AES_CCM_16_256/CAMELLIA_CCM_16_128/CAMELLIA_CCM_16_192/CAMELLIA_CCM_16_256/AES_GCM_12_128/AES_GCM_12_192/AES_GCM_12_256/AES_GCM_8_128/AES_GCM_8_192/AES_GCM_8_256/AES_CCM_8_128/AES_CCM_8_192/AES_CCM_8_256/AES_CCM_12_128/AES_CCM_12_192/AES_CCM_12_256/CAMELLIA_CCM_8_128/CAMELLIA_CCM_8_192/CAMELLIA_CCM_8_256/CAMELLIA_CCM_12_128/CAMELLIA_CCM_12_192/CAMELLIA_CCM_12_256/PRF_HMAC_SHA2_256/PRF_HMAC_SHA2_384/PRF_HMAC_SHA2_512/PRF_AES128_XCBC/PRF_AES128_CMAC/PRF_HMAC_MD5/PRF_HMAC_SHA1/ECP_256/ECP_384/ECP_521/ECP_256_BP/ECP_384_BP/ECP_512_BP/MODP_3072/MODP_4096/MODP_8192/ECP_224/ECP_192/ECP_224_BP/MODP_2048/MODP_2048_224/MODP_2048_256/MODP_1536/MODP_1024/MODP_1024_160
  39. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal charon[11260]: 08[ENC] generating ID_PROT request 0 [ SA V V V V V ]
  40. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal charon[11260]: 08[NET] sending packet: from 10.49.43.10[500] to 201.55.56.30[500] (236 bytes)
  41. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal charon[11260]: 08[IKE] IKE_SA ciscoios[6] state change: DELETING => DELETING
  42. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal charon[11260]: 08[IKE] IKE_SA ciscoios[6] state change: DELETING => DESTROYING
  43. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal charon[11260]: 08[CFG] lease 10.61.21.17 by '201.55.56.30' went offline
  44. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal charon[11260]: 11[NET] received packet: from 201.55.56.30[500] to 10.49.43.10[500] (128 bytes)
  45. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal strongswan[11249]: 11[IKE] queueing MODE_CONFIG task
  46. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal strongswan[11249]: 11[IKE] activating new tasks
  47. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal strongswan[11249]: 11[IKE]   activating MODE_CONFIG task
  48. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal strongswan[11249]: 11[CFG] reassigning offline lease to '201.55.56.30'
  49. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal strongswan[11249]: 11[IKE] assigning virtual IP 10.61.21.17 to peer '201.55.56.30'
  50. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal strongswan[11249]: 11[ENC] generating TRANSACTION request 141141966 [ HASH CPS(ADDR) ]
  51. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal strongswan[11249]: 11[NET] sending packet: from 10.49.43.10[4500] to 201.55.56.30[4500] (76 bytes)
  52. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal strongswan[11249]: 11[IKE] delaying task initiation, TRANSACTION exchange in progress
  53. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal strongswan[11249]: 16[NET] received packet: from 201.55.56.30[4500] to 10.49.43.10[4500] (92 bytes)
  54. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal strongswan[11249]: 16[ENC] parsed INFORMATIONAL_V1 request 376847856 [ HASH N(DPD) ]
  55. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal strongswan[11249]: 16[IKE] queueing ISAKMP_DPD task
  56. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal strongswan[11249]: 16[IKE] delaying task initiation, TRANSACTION exchange in progress
  57. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal strongswan[11249]: 06[NET] received packet: from 201.55.56.30[4500] to 10.49.43.10[4500] (92 bytes)
  58. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal strongswan[11249]: 06[ENC] parsed INFORMATIONAL_V1 request 10268772 [ HASH N(DPD) ]
  59. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal strongswan[11249]: 06[IKE] queueing ISAKMP_DPD task
  60. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal strongswan[11249]: 06[IKE] delaying task initiation, TRANSACTION exchange in progress
  61. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal strongswan[11249]: 15[NET] received packet: from 201.55.56.30[4500] to 10.49.43.10[4500] (92 bytes)
  62. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal strongswan[11249]: 15[ENC] parsed INFORMATIONAL_V1 request 3817526243 [ HASH N(DPD) ]
  63. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal strongswan[11249]: 15[IKE] queueing ISAKMP_DPD task
  64. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal strongswan[11249]: 15[IKE] delaying task initiation, TRANSACTION exchange in progress
  65. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal strongswan[11249]: 08[NET] received packet: from 201.55.56.30[4500] to 10.49.43.10[4500] (92 bytes)
  66. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal strongswan[11249]: 08[ENC] parsed INFORMATIONAL_V1 request 1645450177 [ HASH D ]
  67. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal strongswan[11249]: 08[IKE] received DELETE for IKE_SA ciscoios[6]
  68. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal strongswan[11249]: 08[IKE] deleting IKE_SA ciscoios[6] between 10.49.43.10[54.233.194.186]...201.55.56.30[201.55.56.30]
  69. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal strongswan[11249]: 08[IKE] IKE_SA ciscoios[6] state change: ESTABLISHED => DELETING
  70. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal strongswan[11249]: 08[IKE] queueing ISAKMP_VENDOR task
  71. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal strongswan[11249]: 08[IKE] queueing ISAKMP_CERT_PRE task
  72. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal strongswan[11249]: 08[IKE] queueing MAIN_MODE task
  73. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal strongswan[11249]: 08[IKE] queueing ISAKMP_CERT_POST task
  74. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal strongswan[11249]: 08[IKE] queueing ISAKMP_NATD task
  75. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal strongswan[11249]: 08[IKE] activating new tasks
  76. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal strongswan[11249]: 08[IKE]   activating ISAKMP_VENDOR task
  77. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal strongswan[11249]: 08[IKE]   activating ISAKMP_CERT_PRE task
  78. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal strongswan[11249]: 08[IKE]   activating MAIN_MODE task
  79. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal strongswan[11249]: 08[IKE]   activating ISAKMP_CERT_POST task
  80. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal strongswan[11249]: 08[IKE]   activating ISAKMP_NATD task
  81. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal strongswan[11249]: 08[IKE] sending strongSwan vendor ID
  82. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal strongswan[11249]: 08[IKE] sending XAuth vendor ID
  83. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal strongswan[11249]: 08[IKE] sending DPD vendor ID
  84. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal charon[11260]: 11[ENC] parsed ID_PROT response 0 [ SA V V ]
  85. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal strongswan[11249]: 08[IKE] sending NAT-T (RFC 3947) vendor ID
  86. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal strongswan[11249]: 08[IKE] sending draft-ietf-ipsec-nat-t-ike-02\n vendor ID
  87. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal strongswan[11249]: 08[IKE] initiating Main Mode IKE_SA ciscoios[7] to 201.55.56.30
  88. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal strongswan[11249]: 08[IKE] IKE_SA ciscoios[7] state change: CREATED => CONNECTING
  89. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal strongswan[11249]: 08[CFG] configured proposals: IKE:AES_CBC_128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC_128/AES_CBC_192/AES_CBC_256/CAMELLIA_CBC_128/CAMELLIA_CBC_192/CAMELLIA_CBC_256/AES_CTR_128/AES_CTR_192/AES_CTR_256/CAMELLIA_CTR_128/CAMELLIA_CTR_192/CAMELLIA_CTR_256/3DES_CBC/HMAC_SHA2_256_128/HMAC_SHA2_384_192/HMAC_SHA2_512_256/HMAC_MD5_96/HMAC_SHA1_96/AES_XCBC_96/AES_CMAC_96/PRF_HMAC_SHA2_256/PRF_HMAC_SHA2_384/PRF_HMAC_SHA2_512/PRF_AES128_XCBC/PRF_AES128_CMAC/PRF_HMAC_MD5/PRF_HMAC_SHA1/ECP_256/ECP_384/ECP_521/ECP_256_BP/ECP_384_BP/ECP_512_BP/MODP_3072/MODP_4096/MODP_8192/ECP_224/ECP_192/ECP_224_BP/MODP_2048/MODP_2048_224/MODP_2048_256/MODP_1536/MODP_1024/MODP_1024_160, IKE:AES_GCM_16_128/AES_GCM_16_192/AES_GCM_16_256/AES_CCM_16_128/AES_CCM_16_192/AES_CCM_16_256/CAMELLIA_CCM_16_128/CAMELLIA_CCM_16_192/CAMELLIA_CCM_16_256/AES_GCM_12_128/AES_GCM_12_192/AES_GCM_12_256/AES_GCM_8_128/AES_GCM_8_192/AES_GCM_8_256/AES_CCM_8_128/AES_CCM_8_192/AES_CCM_8_256/AES_CCM_12_128/AES_CCM_12_192/AES_CCM_12_256/CAMELLIA_CCM_8_128/CAMELLIA_CCM_8_192/CAMELLIA_CCM_8_256/CAMELLIA_CCM_12_128/CAMELLIA_CCM_12_192/CAMELLIA_CCM_12_256/PRF_HMAC_SHA2_256/PRF_HMAC_SHA2_384/PRF_HMAC_SHA2_512/PRF_AES128_XCBC/PRF_AES128_CMAC/PRF_HMAC_MD5/PRF_HMAC_SHA1/ECP_256/ECP_384/ECP_521/ECP_256_BP/ECP_384_BP/ECP_512_BP/MODP_3072/MODP_4096/MODP_8192/ECP_224/ECP_192/ECP_224_BP/MODP_2048/MODP_2048_224/MODP_2048_256/MODP_1536/MODP_1024/MODP_1024_160
  90. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal strongswan[11249]: 08[ENC] generating ID_PROT request 0 [ SA V V V V V ]
  91. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal strongswan[11249]: 08[NET] sending packet: from 10.49.43.10[500] to 201.55.56.30[500] (236 bytes)
  92. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal strongswan[11249]: 08[IKE] IKE_SA ciscoios[6] state change: DELETING => DELETING
  93. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal strongswan[11249]: 08[IKE] IKE_SA ciscoios[6] state change: DELETING => DESTROYING
  94. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal strongswan[11249]: 08[CFG] lease 10.61.21.17 by '201.55.56.30' went offline
  95. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal strongswan[11249]: 11[NET] received packet: from 201.55.56.30[500] to 10.49.43.10[500] (128 bytes)
  96. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal charon[11260]: 11[IKE] received NAT-T (RFC 3947) vendor ID
  97. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal charon[11260]: 11[IKE] received FRAGMENTATION vendor ID
  98. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal charon[11260]: 11[CFG] selecting proposal:
  99. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal charon[11260]: 11[CFG]   proposal matches
  100. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal charon[11260]: 11[CFG] received proposals: IKE:AES_CBC_128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024
  101. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal charon[11260]: 11[CFG] configured proposals: IKE:AES_CBC_128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC_128/AES_CBC_192/AES_CBC_256/CAMELLIA_CBC_128/CAMELLIA_CBC_192/CAMELLIA_CBC_256/AES_CTR_128/AES_CTR_192/AES_CTR_256/CAMELLIA_CTR_128/CAMELLIA_CTR_192/CAMELLIA_CTR_256/3DES_CBC/HMAC_SHA2_256_128/HMAC_SHA2_384_192/HMAC_SHA2_512_256/HMAC_MD5_96/HMAC_SHA1_96/AES_XCBC_96/AES_CMAC_96/PRF_HMAC_SHA2_256/PRF_HMAC_SHA2_384/PRF_HMAC_SHA2_512/PRF_AES128_XCBC/PRF_AES128_CMAC/PRF_HMAC_MD5/PRF_HMAC_SHA1/ECP_256/ECP_384/ECP_521/ECP_256_BP/ECP_384_BP/ECP_512_BP/MODP_3072/MODP_4096/MODP_8192/ECP_224/ECP_192/ECP_224_BP/MODP_2048/MODP_2048_224/MODP_2048_256/MODP_1536/MODP_1024/MODP_1024_160, IKE:AES_GCM_16_128/AES_GCM_16_192/AES_GCM_16_256/AES_CCM_16_128/AES_CCM_16_192/AES_CCM_16_256/CAMELLIA_CCM_16_128/CAMELLIA_CCM_16_192/CAMELLIA_CCM_16_256/AES_GCM_12_128/AES_GCM_12_192/AES_GCM_12_256/AES_GCM_8_128/AES_GCM_8_192/AES_GCM_8_256/AES_CCM_8_128/AES_CCM_8_192/AES_CCM_8_256/AES_CCM_12_128/AES_CCM_12_192/AES_CCM_12_256/CAMELLIA_CCM_8_128/CAMELLIA_CCM_8_192/CAMELLIA_CCM_8_256/CAMELLIA_CCM_12_128/CAMELLIA_CCM_12_192/CAMELLIA_CCM_12_256/PRF_HMAC_SHA2_256/PRF_HMAC_SHA2_384/PRF_HMAC_SHA2_512/PRF_AES128_XCBC/PRF_AES128_CMAC/PRF_HMAC_MD5/PRF_HMAC_SHA1/ECP_256/ECP_384/ECP_521/ECP_256_BP/ECP_384_BP/ECP_512_BP/MODP_3072/MODP_4096/MODP_8192/ECP_224/ECP_192/ECP_224_BP/MODP_2048/MODP_2048_224/MODP_2048_256/MODP_1536/MODP_1024/MODP_1024_160
  102. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal charon[11260]: 11[CFG] selected proposal: IKE:AES_CBC_128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024
  103. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal charon[11260]: 11[IKE] reinitiating already active tasks
  104. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal charon[11260]: 11[IKE]   ISAKMP_VENDOR task
  105. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal charon[11260]: 11[IKE]   MAIN_MODE task
  106. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal charon[11260]: 11[ENC] generating ID_PROT request 0 [ KE No NAT-D NAT-D ]
  107. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal charon[11260]: 11[NET] sending packet: from 10.49.43.10[500] to 201.55.56.30[500] (244 bytes)
  108. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal charon[11260]: 05[NET] received packet: from 201.55.56.30[500] to 10.49.43.10[500] (304 bytes)
  109. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal charon[11260]: 05[ENC] parsed ID_PROT response 0 [ KE No V V V V NAT-D NAT-D ]
  110. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal charon[11260]: 05[IKE] received Cisco Unity vendor ID
  111. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal charon[11260]: 05[IKE] received XAuth vendor ID
  112. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal charon[11260]: 05[ENC] received unknown vendor ID: 5d:4e:bb:12:ab:d2:0f:59:ff:8a:26:3f:a6:9e:66:88
  113. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal charon[11260]: 05[ENC] received unknown vendor ID: 1f:07:f7:0e:aa:65:14:d3:b0:fa:96:54:2a:50:01:00
  114. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal charon[11260]: 05[IKE] local host is behind NAT, sending keep alives
  115. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal charon[11260]: 05[IKE] reinitiating already active tasks
  116. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal charon[11260]: 05[IKE]   ISAKMP_VENDOR task
  117. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal charon[11260]: 05[IKE]   MAIN_MODE task
  118. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal charon[11260]: 05[ENC] generating ID_PROT request 0 [ ID HASH N(INITIAL_CONTACT) ]
  119. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal charon[11260]: 05[NET] sending packet: from 10.49.43.10[4500] to 201.55.56.30[4500] (108 bytes)
  120. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal charon[11260]: 10[NET] received packet: from 201.55.56.30[4500] to 10.49.43.10[4500] (92 bytes)
  121. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal charon[11260]: 10[ENC] parsed ID_PROT response 0 [ ID HASH V ]
  122. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal charon[11260]: 10[IKE] received DPD vendor ID
  123. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal charon[11260]: 10[IKE] IKE_SA ciscoios[7] established between 10.49.43.10[54.233.194.186]...201.55.56.30[201.55.56.30]
  124. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal charon[11260]: 10[IKE] IKE_SA ciscoios[7] established between 10.49.43.10[54.233.194.186]...201.55.56.30[201.55.56.30]
  125. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal charon[11260]: 10[IKE] IKE_SA ciscoios[7] state change: CONNECTING => ESTABLISHED
  126. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal charon[11260]: 10[IKE] scheduling reauthentication in 28457s
  127. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal charon[11260]: 10[IKE] maximum IKE_SA lifetime 28637s
  128. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal charon[11260]: 10[IKE] queueing MODE_CONFIG task
  129. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal charon[11260]: 10[IKE] activating new tasks
  130. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal charon[11260]: 10[IKE]   activating MODE_CONFIG task
  131. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal charon[11260]: 10[CFG] reassigning offline lease to '201.55.56.30'
  132. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal charon[11260]: 10[IKE] assigning virtual IP 10.61.21.17 to peer '201.55.56.30'
  133. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal charon[11260]: 10[ENC] generating TRANSACTION request 3396608126 [ HASH CPS(ADDR) ]
  134. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal charon[11260]: 10[NET] sending packet: from 10.49.43.10[4500] to 201.55.56.30[4500] (76 bytes)
  135. Jun 19 20:59:59 ip-10-49-43-10.sa-east-1.compute.internal charon[11260]: 10[IKE] delaying task initiation, TRANSACTION exchange in progress
RAW Paste Data
We use cookies for various purposes including analytics. By continuing to use Pastebin, you agree to our use of cookies as described in the Cookies Policy. OK, I Understand
 
Top