Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Jul 29 19:54:36 charon 11[MGR] checkin and destroy of IKE_SA successful
- Jul 29 19:54:36 charon 11[IKE] <262> IKE_SA (unnamed)[262] state change: CONNECTING => DESTROYING
- Jul 29 19:54:36 charon 11[MGR] <262> checkin and destroy IKE_SA (unnamed)[262]
- Jul 29 19:54:36 charon 11[JOB] <262> deleting half open IKE_SA with <CLIENT IP ADDRESS> after timeout
- Jul 29 19:54:36 charon 11[MGR] IKE_SA (unnamed)[262] successfully checked out
- Jul 29 19:54:36 charon 11[MGR] checkout IKEv2 SA with SPIs 942c09ac63da0942_i 033dc936e796a289_r
- Jul 29 19:54:06 charon 11[MGR] <262> checkin of IKE_SA successful
- Jul 29 19:54:06 charon 11[MGR] <262> checkin IKE_SA (unnamed)[262]
- Jul 29 19:54:06 charon 11[NET] <262> sending packet: from <PFSENSE IP ADDRESS>[500] to <CLIENT IP ADDRESS>[500] (481 bytes)
- Jul 29 19:54:06 charon 11[ENC] <262> generating IKE_SA_INIT response 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) CERTREQ N(FRAG_SUP) N(CHDLESS_SUP) N(MULT_AUTH) ]
- Jul 29 19:54:06 charon 11[IKE] <262> sending cert request for "CN=<PFSENSE IP ADDRESS>"
- Jul 29 19:54:06 charon 11[IKE] <262> remote host is behind NAT
- Jul 29 19:54:06 charon 11[LIB] <262> size of DH secret exponent: 2047 bits
- Jul 29 19:54:06 charon 11[CFG] <262> selected proposal: IKE:AES_CBC_256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_2048
- Jul 29 19:54:06 charon 11[CFG] <262> configured proposals: IKE:AES_CBC_256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_2048
- Jul 29 19:54:06 charon 11[CFG] <262> received proposals: IKE:AES_CBC_256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_2048, IKE:AES_CBC_256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_2048, IKE:AES_CBC_256/HMAC_SHA2_384_192/PRF_HMAC_SHA2_384/MODP_2048
- Jul 29 19:54:06 charon 11[CFG] <262> proposal matches
- Jul 29 19:54:06 charon 11[CFG] <262> selecting proposal:
- Jul 29 19:54:06 charon 11[CFG] <262> no acceptable INTEGRITY_ALGORITHM found
- Jul 29 19:54:06 charon 11[CFG] <262> selecting proposal:
- Jul 29 19:54:06 charon 11[IKE] <262> IKE_SA (unnamed)[262] state change: CREATED => CONNECTING
- Jul 29 19:54:06 charon 11[IKE] <262> <CLIENT IP ADDRESS> is initiating an IKE_SA
- Jul 29 19:54:06 charon 11[ENC] <262> received unknown vendor ID: 01:52:8b:bb:c0:06:96:12:18:49:ab:9a:1c:5b:2a:51:00:00:00:02
- Jul 29 19:54:06 charon 11[IKE] <262> received Vid-Initial-Contact vendor ID
- Jul 29 19:54:06 charon 11[IKE] <262> received MS-Negotiation Discovery Capable vendor ID
- Jul 29 19:54:06 charon 11[IKE] <262> received MS NT5 ISAKMPOAKLEY v9 vendor ID
- Jul 29 19:54:06 charon 11[CFG] <262> found matching ike config: <PFSENSE IP ADDRESS>...%any with prio 1052
- Jul 29 19:54:06 charon 11[CFG] <262> candidate: <PFSENSE IP ADDRESS>...%any, prio 1052
- Jul 29 19:54:06 charon 11[CFG] <262> candidate: %any...%any, prio 24
- Jul 29 19:54:06 charon 11[CFG] <262> looking for an IKEv2 config for <PFSENSE IP ADDRESS>...<CLIENT IP ADDRESS>
- Jul 29 19:54:06 charon 11[ENC] <262> parsed IKE_SA_INIT request 0 [ SA KE No N(FRAG_SUP) N(NATD_S_IP) N(NATD_D_IP) V V V V ]
- Jul 29 19:54:06 charon 11[NET] <262> received packet: from <CLIENT IP ADDRESS>[500] to <PFSENSE IP ADDRESS>[500] (632 bytes)
- Jul 29 19:54:06 charon 11[MGR] created IKE_SA (unnamed)[262]
- Jul 29 19:54:06 charon 11[MGR] checkout IKEv2 SA by message with SPIs 942c09ac63da0942_i 0000000000000000_r
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement