2018:12:07-12:40:08 krohtofw ipsec_starter[21690]: Starting strongSwan 4.4.1git20100610 IPsec [starter]... 2018:12:07-12:40:08 krohtofw pluto[21712]: Starting IKEv1 pluto daemon (strongSwan 4.4.1git20100610) THREADS VENDORID CISCO_QUIRKS 2018:12:07-12:40:08 krohtofw ipsec_starter[21696]: pluto (21712) started after 60 ms 2018:12:07-12:40:08 krohtofw pluto[21712]: loaded plugins: curl ldap aes des blowfish serpent twofish sha1 sha2 md5 random x509 pubkey pkcs1 pgp dnskey pem sqlite hmac gmp xauth attr attr-sql resolve 2018:12:07-12:40:08 krohtofw pluto[21712]: including NAT-Traversal patch (Version 0.6c) 2018:12:07-12:40:08 krohtofw pluto[21712]: Using Linux 2.6 IPsec interface code 2018:12:07-12:40:08 krohtofw pluto[21712]: loading ca certificates from '/etc/ipsec.d/cacerts' 2018:12:07-12:40:08 krohtofw pluto[21712]: loaded ca certificate from '/etc/ipsec.d/cacerts/REF_CaSigVpnSigniCa.pem' 2018:12:07-12:40:08 krohtofw pluto[21712]: loading aa certificates from '/etc/ipsec.d/aacerts' 2018:12:07-12:40:08 krohtofw pluto[21712]: loading ocsp certificates from '/etc/ipsec.d/ocspcerts' 2018:12:07-12:40:08 krohtofw pluto[21712]: Changing to directory '/etc/ipsec.d/crls' 2018:12:07-12:40:08 krohtofw pluto[21712]: loading attribute certificates from '/etc/ipsec.d/acerts' 2018:12:07-12:40:08 krohtofw pluto[21712]: adding interface tun0/tun0 10.242.2.1:500 2018:12:07-12:40:08 krohtofw pluto[21712]: adding interface tun0/tun0 10.242.2.1:4500 2018:12:07-12:40:08 krohtofw pluto[21712]: adding interface eth1/eth1 207.159.187.26:500 2018:12:07-12:40:08 krohtofw pluto[21712]: adding interface eth1/eth1 207.159.187.26:4500 2018:12:07-12:40:08 krohtofw pluto[21712]: adding interface eth0/eth0 10.10.1.1:500 2018:12:07-12:40:08 krohtofw pluto[21712]: adding interface eth0/eth0 10.10.1.1:4500 2018:12:07-12:40:08 krohtofw pluto[21712]: adding interface lo/lo 127.0.0.1:500 2018:12:07-12:40:08 krohtofw pluto[21712]: adding interface lo/lo 127.0.0.1:4500 2018:12:07-12:40:08 krohtofw pluto[21712]: adding interface lo/lo ::1:500 2018:12:07-12:40:08 krohtofw pluto[21712]: loading secrets from "/etc/ipsec.secrets" 2018:12:07-12:40:08 krohtofw pluto[21712]: loaded PSK secret for 207.159.187.26 73.38.217.69 2018:12:07-12:40:08 krohtofw pluto[21712]: listening for IKE messages 2018:12:07-12:40:08 krohtofw pluto[21712]: added connection description "S_REF_IpsSitDormtohome_0" 2018:12:07-12:40:08 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #1: initiating Main Mode 2018:12:07-12:40:08 krohtofw pluto[21712]: added connection description "S_REF_IpsSitDormtohome_1" 2018:12:07-12:53:19 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #1: max number of retransmissions (20) reached STATE_MAIN_I1. No response (or no acceptable response) to our first IKE message 2018:12:07-12:53:19 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #1: starting keying attempt 2 of an unlimited number 2018:12:07-12:53:19 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #2: initiating Main Mode to replace #1 2018:12:07-13:06:30 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #2: max number of retransmissions (20) reached STATE_MAIN_I1. No response (or no acceptable response) to our first IKE message 2018:12:07-13:06:30 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #2: starting keying attempt 3 of an unlimited number 2018:12:07-13:06:30 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #3: initiating Main Mode to replace #2 2018:12:07-13:19:41 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #3: max number of retransmissions (20) reached STATE_MAIN_I1. No response (or no acceptable response) to our first IKE message 2018:12:07-13:19:41 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #3: starting keying attempt 4 of an unlimited number 2018:12:07-13:19:41 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #4: initiating Main Mode to replace #3 2018:12:07-13:32:52 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #4: max number of retransmissions (20) reached STATE_MAIN_I1. No response (or no acceptable response) to our first IKE message 2018:12:07-13:32:52 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #4: starting keying attempt 5 of an unlimited number 2018:12:07-13:32:52 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #5: initiating Main Mode to replace #4 2018:12:07-13:46:02 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #5: max number of retransmissions (20) reached STATE_MAIN_I1. No response (or no acceptable response) to our first IKE message 2018:12:07-13:46:02 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #5: starting keying attempt 6 of an unlimited number 2018:12:07-13:46:02 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #6: initiating Main Mode to replace #5 2018:12:07-13:59:12 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #6: max number of retransmissions (20) reached STATE_MAIN_I1. No response (or no acceptable response) to our first IKE message 2018:12:07-13:59:12 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #6: starting keying attempt 7 of an unlimited number 2018:12:07-13:59:12 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #7: initiating Main Mode to replace #6 2018:12:07-14:12:24 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #7: max number of retransmissions (20) reached STATE_MAIN_I1. No response (or no acceptable response) to our first IKE message 2018:12:07-14:12:24 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #7: starting keying attempt 8 of an unlimited number 2018:12:07-14:12:24 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #8: initiating Main Mode to replace #7 2018:12:07-14:25:34 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #8: max number of retransmissions (20) reached STATE_MAIN_I1. No response (or no acceptable response) to our first IKE message 2018:12:07-14:25:34 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #8: starting keying attempt 9 of an unlimited number 2018:12:07-14:25:34 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #9: initiating Main Mode to replace #8 2018:12:07-14:38:45 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #9: max number of retransmissions (20) reached STATE_MAIN_I1. No response (or no acceptable response) to our first IKE message 2018:12:07-14:38:45 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #9: starting keying attempt 10 of an unlimited number 2018:12:07-14:38:45 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #10: initiating Main Mode to replace #9 2018:12:07-14:51:56 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #10: max number of retransmissions (20) reached STATE_MAIN_I1. No response (or no acceptable response) to our first IKE message 2018:12:07-14:51:56 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #10: starting keying attempt 11 of an unlimited number 2018:12:07-14:51:56 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #11: initiating Main Mode to replace #10 2018:12:07-15:05:07 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #11: max number of retransmissions (20) reached STATE_MAIN_I1. No response (or no acceptable response) to our first IKE message 2018:12:07-15:05:07 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #11: starting keying attempt 12 of an unlimited number 2018:12:07-15:05:07 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #12: initiating Main Mode to replace #11 2018:12:07-15:18:17 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #12: max number of retransmissions (20) reached STATE_MAIN_I1. No response (or no acceptable response) to our first IKE message 2018:12:07-15:18:17 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #12: starting keying attempt 13 of an unlimited number 2018:12:07-15:18:17 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #13: initiating Main Mode to replace #12 2018:12:07-15:31:28 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #13: max number of retransmissions (20) reached STATE_MAIN_I1. No response (or no acceptable response) to our first IKE message 2018:12:07-15:31:28 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #13: starting keying attempt 14 of an unlimited number 2018:12:07-15:31:28 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #14: initiating Main Mode to replace #13 2018:12:07-15:44:38 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #14: max number of retransmissions (20) reached STATE_MAIN_I1. No response (or no acceptable response) to our first IKE message 2018:12:07-15:44:38 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #14: starting keying attempt 15 of an unlimited number 2018:12:07-15:44:38 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #15: initiating Main Mode to replace #14 2018:12:07-15:57:48 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #15: max number of retransmissions (20) reached STATE_MAIN_I1. No response (or no acceptable response) to our first IKE message 2018:12:07-15:57:48 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #15: starting keying attempt 16 of an unlimited number 2018:12:07-15:57:48 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #16: initiating Main Mode to replace #15 2018:12:07-16:10:59 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #16: max number of retransmissions (20) reached STATE_MAIN_I1. No response (or no acceptable response) to our first IKE message 2018:12:07-16:10:59 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #16: starting keying attempt 17 of an unlimited number 2018:12:07-16:10:59 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #17: initiating Main Mode to replace #16 2018:12:07-16:24:10 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #17: max number of retransmissions (20) reached STATE_MAIN_I1. No response (or no acceptable response) to our first IKE message 2018:12:07-16:24:10 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #17: starting keying attempt 18 of an unlimited number 2018:12:07-16:24:10 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #18: initiating Main Mode to replace #17 2018:12:07-16:25:20 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #18: received Vendor ID payload [strongSwan] 2018:12:07-16:25:20 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #18: ignoring Vendor ID payload [Cisco-Unity] 2018:12:07-16:25:20 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #18: received Vendor ID payload [XAUTH] 2018:12:07-16:25:20 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #18: received Vendor ID payload [Dead Peer Detection] 2018:12:07-16:25:20 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #18: received Vendor ID payload [RFC 3947] 2018:12:07-16:25:20 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #18: enabling possible NAT-traversal with method 3 2018:12:07-16:25:20 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #18: NAT-Traversal: Result using RFC 3947: no NAT detected 2018:12:07-16:25:20 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #18: Peer ID is ID_IPV4_ADDR: '73.38.217.69' 2018:12:07-16:25:20 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #18: Dead Peer Detection (RFC 3706) enabled 2018:12:07-16:25:20 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #18: ISAKMP SA established 2018:12:07-16:25:20 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #19: initiating Quick Mode PSK+ENCRYPT+TUNNEL+UP {using isakmp#18} 2018:12:07-16:25:20 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #20: initiating Quick Mode PSK+ENCRYPT+TUNNEL+UP {using isakmp#18} 2018:12:07-16:25:20 krohtofw pluto[21712]: id="2203" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN up" variant="ipsec" connection="REF_IpsSitDormtohome" address="207.159.187.26" local_net="10.10.1.0/24" remote_net="192.168.1.0/24" 2018:12:07-16:25:20 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #19: sent QI2, IPsec SA established {ESP=>0x7658f073 <0x69bf5dc1 DPD} 2018:12:07-16:25:20 krohtofw pluto[21712]: id="2203" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN up" variant="ipsec" connection="REF_IpsSitDormtohome" address="207.159.187.26" local_net="10.80.1.0/24" remote_net="192.168.1.0/24" 2018:12:07-16:25:20 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #20: sent QI2, IPsec SA established {ESP=>0x1d57bf8e <0x0f41e0fc DPD} 2018:12:07-16:25:30 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #20: retransmitting in response to duplicate packet; already STATE_QUICK_I2 2018:12:07-16:25:50 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #20: retransmitting in response to duplicate packet; already STATE_QUICK_I2 2018:12:07-16:26:30 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #18: received Delete SA payload: replace IPSEC State #20 in 10 seconds 2018:12:07-16:26:40 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #21: initiating Quick Mode PSK+ENCRYPT+TUNNEL+UP to replace #20 {using isakmp#18} 2018:12:07-16:26:40 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #21: sent QI2, IPsec SA established {ESP=>0x169d3347 <0x0b5f5336 DPD} 2018:12:07-16:26:50 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #21: retransmitting in response to duplicate packet; already STATE_QUICK_I2 2018:12:07-16:27:10 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #21: retransmitting in response to duplicate packet; already STATE_QUICK_I2 2018:12:07-16:27:50 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #18: received Delete SA payload: replace IPSEC State #21 in 10 seconds 2018:12:07-16:28:00 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #22: initiating Quick Mode PSK+ENCRYPT+TUNNEL+UP to replace #21 {using isakmp#18} 2018:12:07-16:28:00 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #22: sent QI2, IPsec SA established {ESP=>0xbd2f8031 <0xf1f29551 DPD} 2018:12:07-16:28:10 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #22: retransmitting in response to duplicate packet; already STATE_QUICK_I2 2018:12:07-16:28:30 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #22: retransmitting in response to duplicate packet; already STATE_QUICK_I2 2018:12:07-16:29:10 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #18: received Delete SA payload: replace IPSEC State #22 in 10 seconds 2018:12:07-16:29:20 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #23: initiating Quick Mode PSK+ENCRYPT+TUNNEL+UP to replace #22 {using isakmp#18} 2018:12:07-16:29:20 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #23: sent QI2, IPsec SA established {ESP=>0x5c34d43a <0xc10ed637 DPD} 2018:12:07-16:29:22 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #18: received Delete SA payload: replace IPSEC State #23 in 10 seconds 2018:12:07-16:29:22 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #18: received Delete SA payload: replace IPSEC State #19 in 10 seconds 2018:12:07-16:29:22 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #18: received Delete SA payload: deleting ISAKMP State #18 2018:12:07-16:29:28 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #19: DPD: Could not find newest phase 1 state 2018:12:07-16:29:28 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #19: DPD: No response from peer - declaring peer dead 2018:12:07-16:29:28 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #19: DPD: Restarting all connections of peer 2018:12:07-16:29:28 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #19: DPD: Terminating all SAs using this connection 2018:12:07-16:29:28 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #23: deleting state (STATE_QUICK_I2) 2018:12:07-16:29:28 krohtofw pluto[21712]: id="2204" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN down" variant="ipsec" connection="REF_IpsSitDormtohome" address="207.159.187.26" local_net="10.80.1.0/24" remote_net="192.168.1.0/24" 2018:12:07-16:29:28 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #22: deleting state (STATE_QUICK_I2) 2018:12:07-16:29:28 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #19: DPD: Restarting connection "S_REF_IpsSitDormtohome_0" 2018:12:07-16:29:28 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #19: DPD: Terminating all SAs using this connection 2018:12:07-16:29:28 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #19: deleting state (STATE_QUICK_I2) 2018:12:07-16:29:28 krohtofw pluto[21712]: id="2204" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN down" variant="ipsec" connection="REF_IpsSitDormtohome" address="207.159.187.26" local_net="10.10.1.0/24" remote_net="192.168.1.0/24" 2018:12:07-16:29:28 krohtofw pluto[21712]: DPD: Restarting connection "S_REF_IpsSitDormtohome_1" 2018:12:07-16:29:28 krohtofw pluto[21712]: updown: /sbin/ip -4 route del 192.168.1.0/24 dev eth1 table main src 10.10.1.1 proto ipsec metric 0 failed with status 2: 2018:12:07-16:29:28 krohtofw pluto[21712]: updown: RTNETLINK answers: No such process 2018:12:07-16:29:28 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #24: initiating Main Mode 2018:12:07-16:29:28 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #24: received Vendor ID payload [strongSwan] 2018:12:07-16:29:28 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #24: ignoring Vendor ID payload [Cisco-Unity] 2018:12:07-16:29:28 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #24: received Vendor ID payload [XAUTH] 2018:12:07-16:29:28 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #24: received Vendor ID payload [Dead Peer Detection] 2018:12:07-16:29:28 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #24: received Vendor ID payload [RFC 3947] 2018:12:07-16:29:28 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #24: enabling possible NAT-traversal with method 3 2018:12:07-16:29:28 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #24: NAT-Traversal: Result using RFC 3947: no NAT detected 2018:12:07-16:29:28 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #24: Peer ID is ID_IPV4_ADDR: '73.38.217.69' 2018:12:07-16:29:28 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #24: Dead Peer Detection (RFC 3706) enabled 2018:12:07-16:29:28 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #24: ISAKMP SA established 2018:12:07-16:29:28 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #25: initiating Quick Mode PSK+ENCRYPT+TUNNEL+UP {using isakmp#24} 2018:12:07-16:29:28 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #26: initiating Quick Mode PSK+ENCRYPT+TUNNEL+UP {using isakmp#24} 2018:12:07-16:29:28 krohtofw pluto[21712]: id="2203" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN up" variant="ipsec" connection="REF_IpsSitDormtohome" address="207.159.187.26" local_net="10.10.1.0/24" remote_net="192.168.1.0/24" 2018:12:07-16:29:28 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #25: sent QI2, IPsec SA established {ESP=>0x08c9e19e <0x761aa40c DPD} 2018:12:07-16:29:28 krohtofw pluto[21712]: id="2203" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN up" variant="ipsec" connection="REF_IpsSitDormtohome" address="207.159.187.26" local_net="10.80.1.0/24" remote_net="192.168.1.0/24" 2018:12:07-16:29:28 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #26: sent QI2, IPsec SA established {ESP=>0x1eb725d6 <0xa8b5e07e DPD} 2018:12:07-16:29:38 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #26: retransmitting in response to duplicate packet; already STATE_QUICK_I2 2018:12:07-16:29:58 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #26: retransmitting in response to duplicate packet; already STATE_QUICK_I2 2018:12:07-16:30:38 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #24: received Delete SA payload: replace IPSEC State #26 in 10 seconds 2018:12:07-16:30:48 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #27: initiating Quick Mode PSK+ENCRYPT+TUNNEL+UP to replace #26 {using isakmp#24} 2018:12:07-16:30:48 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #27: sent QI2, IPsec SA established {ESP=>0xc59f1763 <0xa8d08305 DPD} 2018:12:07-16:30:58 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #27: retransmitting in response to duplicate packet; already STATE_QUICK_I2 2018:12:07-16:31:18 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #27: retransmitting in response to duplicate packet; already STATE_QUICK_I2 2018:12:07-16:31:44 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #24: received Delete SA payload: replace IPSEC State #27 in 10 seconds 2018:12:07-16:31:44 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #24: received Delete SA payload: replace IPSEC State #25 in 10 seconds 2018:12:07-16:31:44 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #24: received Delete SA payload: deleting ISAKMP State #24 2018:12:07-16:31:54 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #28: initiating Main Mode 2018:12:07-16:31:54 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #28: received Vendor ID payload [strongSwan] 2018:12:07-16:31:54 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #28: ignoring Vendor ID payload [Cisco-Unity] 2018:12:07-16:31:54 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #28: received Vendor ID payload [XAUTH] 2018:12:07-16:31:54 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #28: received Vendor ID payload [Dead Peer Detection] 2018:12:07-16:31:54 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #28: Peer ID is ID_IPV4_ADDR: '73.38.217.69' 2018:12:07-16:31:54 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #28: Dead Peer Detection (RFC 3706) enabled 2018:12:07-16:31:54 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #28: ISAKMP SA established 2018:12:07-16:31:54 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #29: initiating Quick Mode PSK+ENCRYPT+TUNNEL+UP to replace #27 {using isakmp#28} 2018:12:07-16:31:54 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #30: initiating Quick Mode PSK+ENCRYPT+TUNNEL+UP {using isakmp#28} 2018:12:07-16:31:54 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #29: sent QI2, IPsec SA established {ESP=>0xab1ca5f3 <0x6813ba6d DPD} 2018:12:07-16:31:54 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #30: sent QI2, IPsec SA established {ESP=>0x5aa30301 <0x56009468 DPD} 2018:12:07-16:32:04 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #29: retransmitting in response to duplicate packet; already STATE_QUICK_I2 2018:12:07-16:32:24 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #29: retransmitting in response to duplicate packet; already STATE_QUICK_I2 2018:12:07-16:32:54 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #28: received Delete SA payload: replace IPSEC State #29 in 10 seconds 2018:12:07-16:32:54 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #28: received Delete SA payload: replace IPSEC State #30 in 10 seconds 2018:12:07-16:32:54 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #28: received Delete SA payload: deleting ISAKMP State #28 2018:12:07-16:33:04 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #31: initiating Main Mode 2018:12:07-16:33:04 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #31: received Vendor ID payload [strongSwan] 2018:12:07-16:33:04 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #31: ignoring Vendor ID payload [Cisco-Unity] 2018:12:07-16:33:04 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #31: received Vendor ID payload [XAUTH] 2018:12:07-16:33:04 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #31: received Vendor ID payload [Dead Peer Detection] 2018:12:07-16:33:04 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #31: received Vendor ID payload [RFC 3947] 2018:12:07-16:33:04 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #31: enabling possible NAT-traversal with method 3 2018:12:07-16:33:04 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #31: NAT-Traversal: Result using RFC 3947: no NAT detected 2018:12:07-16:33:04 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #31: Peer ID is ID_IPV4_ADDR: '73.38.217.69' 2018:12:07-16:33:04 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #31: Dead Peer Detection (RFC 3706) enabled 2018:12:07-16:33:04 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #31: ISAKMP SA established 2018:12:07-16:33:04 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #32: initiating Quick Mode PSK+ENCRYPT+TUNNEL+UP to replace #29 {using isakmp#31} 2018:12:07-16:33:04 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #33: initiating Quick Mode PSK+ENCRYPT+TUNNEL+UP {using isakmp#31} 2018:12:07-16:33:04 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #32: sent QI2, IPsec SA established {ESP=>0xde8eaa1e <0x8cb01f3a DPD} 2018:12:07-16:33:04 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #33: sent QI2, IPsec SA established {ESP=>0xc8b5191d <0x2c99cf74 DPD} 2018:12:07-16:33:14 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #32: retransmitting in response to duplicate packet; already STATE_QUICK_I2 2018:12:07-16:33:34 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #32: retransmitting in response to duplicate packet; already STATE_QUICK_I2 2018:12:07-16:34:14 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #31: received Delete SA payload: replace IPSEC State #32 in 10 seconds 2018:12:07-16:34:24 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #34: initiating Quick Mode PSK+ENCRYPT+TUNNEL+UP to replace #32 {using isakmp#31} 2018:12:07-16:34:24 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #34: sent QI2, IPsec SA established {ESP=>0x5234006f <0x0f62ffed DPD} 2018:12:07-16:34:34 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #34: retransmitting in response to duplicate packet; already STATE_QUICK_I2 2018:12:07-16:34:54 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #34: retransmitting in response to duplicate packet; already STATE_QUICK_I2 2018:12:07-16:35:34 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #31: received Delete SA payload: replace IPSEC State #34 in 10 seconds 2018:12:07-16:35:44 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #35: initiating Quick Mode PSK+ENCRYPT+TUNNEL+UP to replace #34 {using isakmp#31} 2018:12:07-16:35:44 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #35: sent QI2, IPsec SA established {ESP=>0x965286ed <0x0a6fdcf1 DPD} 2018:12:07-16:35:54 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #35: retransmitting in response to duplicate packet; already STATE_QUICK_I2 2018:12:07-16:36:14 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #35: retransmitting in response to duplicate packet; already STATE_QUICK_I2 2018:12:07-16:36:54 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #31: received Delete SA payload: replace IPSEC State #35 in 10 seconds 2018:12:07-16:37:04 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #36: initiating Quick Mode PSK+ENCRYPT+TUNNEL+UP to replace #35 {using isakmp#31} 2018:12:07-16:37:04 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #36: sent QI2, IPsec SA established {ESP=>0xc61a77a9 <0x361e4dd3 DPD} 2018:12:07-16:37:12 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #31: received Delete SA payload: replace IPSEC State #36 in 10 seconds 2018:12:07-16:37:12 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #31: received Delete SA payload: replace IPSEC State #33 in 10 seconds 2018:12:07-16:37:12 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #31: received Delete SA payload: deleting ISAKMP State #31 2018:12:07-16:37:22 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #37: initiating Main Mode 2018:12:07-16:37:22 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #37: received Vendor ID payload [strongSwan] 2018:12:07-16:37:22 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #37: ignoring Vendor ID payload [Cisco-Unity] 2018:12:07-16:37:22 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #37: received Vendor ID payload [XAUTH] 2018:12:07-16:37:22 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #37: received Vendor ID payload [Dead Peer Detection] 2018:12:07-16:37:22 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #37: received Vendor ID payload [RFC 3947] 2018:12:07-16:37:22 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #37: enabling possible NAT-traversal with method 3 2018:12:07-16:37:22 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #37: NAT-Traversal: Result using RFC 3947: no NAT detected 2018:12:07-16:37:22 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #37: Peer ID is ID_IPV4_ADDR: '73.38.217.69' 2018:12:07-16:37:22 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #37: Dead Peer Detection (RFC 3706) enabled 2018:12:07-16:37:22 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #37: ISAKMP SA established 2018:12:07-16:37:22 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #38: initiating Quick Mode PSK+ENCRYPT+TUNNEL+UP to replace #36 {using isakmp#37} 2018:12:07-16:37:22 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #39: initiating Quick Mode PSK+ENCRYPT+TUNNEL+UP {using isakmp#37} 2018:12:07-16:37:22 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #38: sent QI2, IPsec SA established {ESP=>0x18de9811 <0x404f7964 DPD} 2018:12:07-16:37:22 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #39: sent QI2, IPsec SA established {ESP=>0xa65ef0f8 <0xdec63817 DPD} 2018:12:07-16:37:32 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #38: retransmitting in response to duplicate packet; already STATE_QUICK_I2 2018:12:07-16:37:52 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #38: retransmitting in response to duplicate packet; already STATE_QUICK_I2 2018:12:07-16:38:32 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #37: received Delete SA payload: replace IPSEC State #38 in 10 seconds 2018:12:07-16:38:42 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #40: initiating Quick Mode PSK+ENCRYPT+TUNNEL+UP to replace #38 {using isakmp#37} 2018:12:07-16:38:42 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #40: sent QI2, IPsec SA established {ESP=>0xb17a1e6b <0xabc9bc2c DPD} 2018:12:07-16:38:52 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #40: retransmitting in response to duplicate packet; already STATE_QUICK_I2 2018:12:07-16:39:12 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #40: retransmitting in response to duplicate packet; already STATE_QUICK_I2 2018:12:07-16:39:52 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #37: received Delete SA payload: replace IPSEC State #40 in 10 seconds 2018:12:07-16:40:02 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #41: initiating Quick Mode PSK+ENCRYPT+TUNNEL+UP to replace #40 {using isakmp#37} 2018:12:07-16:40:02 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #41: sent QI2, IPsec SA established {ESP=>0x2ecee85c <0x8c4e270a DPD} 2018:12:07-16:40:12 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #41: retransmitting in response to duplicate packet; already STATE_QUICK_I2 2018:12:07-16:40:32 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #41: retransmitting in response to duplicate packet; already STATE_QUICK_I2 2018:12:07-16:41:05 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #37: received Delete SA payload: replace IPSEC State #41 in 10 seconds 2018:12:07-16:41:05 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #37: received Delete SA payload: replace IPSEC State #39 in 10 seconds 2018:12:07-16:41:05 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #37: received Delete SA payload: deleting ISAKMP State #37 2018:12:07-16:41:11 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #41: DPD: Could not find newest phase 1 state 2018:12:07-16:41:11 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #41: DPD: No response from peer - declaring peer dead 2018:12:07-16:41:11 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #41: DPD: Restarting all connections of peer 2018:12:07-16:41:11 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #41: DPD: Terminating all SAs using this connection 2018:12:07-16:41:11 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #39: deleting state (STATE_QUICK_I2) 2018:12:07-16:41:11 krohtofw pluto[21712]: id="2204" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN down" variant="ipsec" connection="REF_IpsSitDormtohome" address="207.159.187.26" local_net="10.10.1.0/24" remote_net="192.168.1.0/24" 2018:12:07-16:41:11 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #41: DPD: Restarting connection "S_REF_IpsSitDormtohome_1" 2018:12:07-16:41:11 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #41: DPD: Terminating all SAs using this connection 2018:12:07-16:41:11 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #41: deleting state (STATE_QUICK_I2) 2018:12:07-16:41:11 krohtofw pluto[21712]: id="2204" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN down" variant="ipsec" connection="REF_IpsSitDormtohome" address="207.159.187.26" local_net="10.80.1.0/24" remote_net="192.168.1.0/24" 2018:12:07-16:41:11 krohtofw pluto[21712]: DPD: Restarting connection "S_REF_IpsSitDormtohome_0" 2018:12:07-16:41:12 krohtofw pluto[21712]: updown: /sbin/ip -4 route del 192.168.1.0/24 dev eth1 table main src 10.10.1.1 proto ipsec metric 0 failed with status 2: 2018:12:07-16:41:12 krohtofw pluto[21712]: updown: RTNETLINK answers: No such process 2018:12:07-16:41:12 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #42: initiating Main Mode 2018:12:07-16:41:12 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #42: received Vendor ID payload [strongSwan] 2018:12:07-16:41:12 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #42: ignoring Vendor ID payload [Cisco-Unity] 2018:12:07-16:41:12 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #42: received Vendor ID payload [XAUTH] 2018:12:07-16:41:12 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #42: received Vendor ID payload [Dead Peer Detection] 2018:12:07-16:41:12 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #42: received Vendor ID payload [RFC 3947] 2018:12:07-16:41:12 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #42: enabling possible NAT-traversal with method 3 2018:12:07-16:41:12 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #42: NAT-Traversal: Result using RFC 3947: no NAT detected 2018:12:07-16:41:12 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #42: Peer ID is ID_IPV4_ADDR: '73.38.217.69' 2018:12:07-16:41:12 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #42: Dead Peer Detection (RFC 3706) enabled 2018:12:07-16:41:12 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #42: ISAKMP SA established 2018:12:07-16:41:12 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #43: initiating Quick Mode PSK+ENCRYPT+TUNNEL+UP {using isakmp#42} 2018:12:07-16:41:12 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #44: initiating Quick Mode PSK+ENCRYPT+TUNNEL+UP {using isakmp#42} 2018:12:07-16:41:12 krohtofw pluto[21712]: id="2203" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN up" variant="ipsec" connection="REF_IpsSitDormtohome" address="207.159.187.26" local_net="10.80.1.0/24" remote_net="192.168.1.0/24" 2018:12:07-16:41:12 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #43: sent QI2, IPsec SA established {ESP=>0x5ee271b2 <0x2cc99619 DPD} 2018:12:07-16:41:12 krohtofw pluto[21712]: id="2203" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN up" variant="ipsec" connection="REF_IpsSitDormtohome" address="207.159.187.26" local_net="10.10.1.0/24" remote_net="192.168.1.0/24" 2018:12:07-16:41:12 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #44: sent QI2, IPsec SA established {ESP=>0xbc645a9d <0x816a1afa DPD} 2018:12:07-16:42:55 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #42: received Delete SA payload: replace IPSEC State #43 in 10 seconds 2018:12:07-16:42:56 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #42: received Delete SA payload: replace IPSEC State #44 in 10 seconds 2018:12:07-16:42:56 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #42: received Delete SA payload: deleting ISAKMP State #42 2018:12:07-16:43:02 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #44: DPD: Could not find newest phase 1 state 2018:12:07-16:43:02 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #44: DPD: No response from peer - declaring peer dead 2018:12:07-16:43:02 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #44: DPD: Restarting all connections of peer 2018:12:07-16:43:02 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #44: DPD: Terminating all SAs using this connection 2018:12:07-16:43:02 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #44: deleting state (STATE_QUICK_I2) 2018:12:07-16:43:02 krohtofw pluto[21712]: id="2204" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN down" variant="ipsec" connection="REF_IpsSitDormtohome" address="207.159.187.26" local_net="10.10.1.0/24" remote_net="192.168.1.0/24" 2018:12:07-16:43:02 krohtofw pluto[21712]: DPD: Restarting connection "S_REF_IpsSitDormtohome_1" 2018:12:07-16:43:02 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0": DPD: Terminating all SAs using this connection 2018:12:07-16:43:02 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #43: deleting state (STATE_QUICK_I2) 2018:12:07-16:43:02 krohtofw pluto[21712]: id="2204" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN down" variant="ipsec" connection="REF_IpsSitDormtohome" address="207.159.187.26" local_net="10.80.1.0/24" remote_net="192.168.1.0/24" 2018:12:07-16:43:02 krohtofw pluto[21712]: DPD: Restarting connection "S_REF_IpsSitDormtohome_0" 2018:12:07-16:43:02 krohtofw pluto[21712]: updown: /sbin/ip -4 route del 192.168.1.0/24 dev eth1 table main src 10.10.1.1 proto ipsec metric 0 failed with status 2: 2018:12:07-16:43:02 krohtofw pluto[21712]: updown: RTNETLINK answers: No such process 2018:12:07-16:43:02 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #45: initiating Main Mode 2018:12:07-16:43:02 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #45: received Vendor ID payload [strongSwan] 2018:12:07-16:43:02 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #45: ignoring Vendor ID payload [Cisco-Unity] 2018:12:07-16:43:02 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #45: received Vendor ID payload [XAUTH] 2018:12:07-16:43:02 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #45: received Vendor ID payload [Dead Peer Detection] 2018:12:07-16:43:02 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #45: received Vendor ID payload [RFC 3947] 2018:12:07-16:43:02 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #45: enabling possible NAT-traversal with method 3 2018:12:07-16:43:02 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #45: NAT-Traversal: Result using RFC 3947: no NAT detected 2018:12:07-16:43:02 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #45: Peer ID is ID_IPV4_ADDR: '73.38.217.69' 2018:12:07-16:43:02 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #45: Dead Peer Detection (RFC 3706) enabled 2018:12:07-16:43:02 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #45: ISAKMP SA established 2018:12:07-16:43:02 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #46: initiating Quick Mode PSK+ENCRYPT+TUNNEL+UP {using isakmp#45} 2018:12:07-16:43:02 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #47: initiating Quick Mode PSK+ENCRYPT+TUNNEL+UP {using isakmp#45} 2018:12:07-16:43:02 krohtofw pluto[21712]: id="2203" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN up" variant="ipsec" connection="REF_IpsSitDormtohome" address="207.159.187.26" local_net="10.80.1.0/24" remote_net="192.168.1.0/24" 2018:12:07-16:43:02 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #46: sent QI2, IPsec SA established {ESP=>0x4dfca84b <0xdf119742 DPD} 2018:12:07-16:43:02 krohtofw pluto[21712]: id="2203" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN up" variant="ipsec" connection="REF_IpsSitDormtohome" address="207.159.187.26" local_net="10.10.1.0/24" remote_net="192.168.1.0/24" 2018:12:07-16:43:02 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #47: sent QI2, IPsec SA established {ESP=>0x75d4a3ff <0x858ee79a DPD} 2018:12:07-17:33:28 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #48: initiating Quick Mode PSK+ENCRYPT+TUNNEL+UP to replace #47 {using isakmp#45} 2018:12:07-17:33:28 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #48: sent QI2, IPsec SA established {ESP=>0xcf99cbe9 <0x852ee312 DPD} 2018:12:07-17:33:52 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #49: initiating Quick Mode PSK+ENCRYPT+TUNNEL+UP to replace #46 {using isakmp#45} 2018:12:07-17:33:52 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #49: sent QI2, IPsec SA established {ESP=>0x0c760200 <0xa4c5ade7 DPD} 2018:12:07-17:43:02 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #45: received Delete SA(0x4dfca84b) payload: deleting IPSEC State #46 2018:12:07-17:43:02 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #45: ignoring Delete SA payload: PROTO_IPSEC_ESP SA(0x75d4a3ff) not found (maybe expired) 2018:12:07-18:15:44 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #50: initiating Quick Mode PSK+ENCRYPT+TUNNEL+UP to replace #48 {using isakmp#45} 2018:12:07-18:15:44 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #50: sent QI2, IPsec SA established {ESP=>0x5bf2ad93 <0x2d2a6cc1 DPD} 2018:12:07-18:17:13 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #51: initiating Quick Mode PSK+ENCRYPT+TUNNEL+UP to replace #49 {using isakmp#45} 2018:12:07-18:17:13 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #51: sent QI2, IPsec SA established {ESP=>0xdcad7f0e <0xd05fd638 DPD} 2018:12:07-18:25:16 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #45: received Delete SA payload: replace IPSEC State #51 in 10 seconds 2018:12:07-18:25:16 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #45: received Delete SA(0x0c760200) payload: deleting IPSEC State #49 2018:12:07-18:25:16 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #45: received Delete SA payload: replace IPSEC State #50 in 10 seconds 2018:12:07-18:25:16 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #45: received Delete SA(0xcf99cbe9) payload: deleting IPSEC State #48 2018:12:07-18:25:16 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #45: received Delete SA payload: deleting ISAKMP State #45 2018:12:07-18:25:26 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #52: initiating Main Mode 2018:12:07-18:25:26 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #52: received Vendor ID payload [strongSwan] 2018:12:07-18:25:26 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #52: ignoring Vendor ID payload [Cisco-Unity] 2018:12:07-18:25:26 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #52: received Vendor ID payload [XAUTH] 2018:12:07-18:25:26 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #52: received Vendor ID payload [Dead Peer Detection] 2018:12:07-18:25:27 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #52: Peer ID is ID_IPV4_ADDR: '73.38.217.69' 2018:12:07-18:25:27 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #52: Dead Peer Detection (RFC 3706) enabled 2018:12:07-18:25:27 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #52: ISAKMP SA established 2018:12:07-18:25:27 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #53: initiating Quick Mode PSK+ENCRYPT+TUNNEL+UP to replace #51 {using isakmp#52} 2018:12:07-18:25:27 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #54: initiating Quick Mode PSK+ENCRYPT+TUNNEL+UP {using isakmp#52} 2018:12:07-18:25:27 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #53: sent QI2, IPsec SA established {ESP=>0x79e264b6 <0x491bc9f5 DPD} 2018:12:07-18:25:27 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #54: sent QI2, IPsec SA established {ESP=>0xe069a11b <0x26aaf906 DPD} 2018:12:07-18:27:03 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #52: received Delete SA payload: replace IPSEC State #53 in 10 seconds 2018:12:07-18:27:03 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #52: received Delete SA payload: replace IPSEC State #54 in 10 seconds 2018:12:07-18:27:03 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #52: received Delete SA payload: deleting ISAKMP State #52 2018:12:07-18:27:13 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #55: initiating Main Mode 2018:12:07-18:27:13 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #55: received Vendor ID payload [strongSwan] 2018:12:07-18:27:13 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #55: ignoring Vendor ID payload [Cisco-Unity] 2018:12:07-18:27:13 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #55: received Vendor ID payload [XAUTH] 2018:12:07-18:27:13 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #55: received Vendor ID payload [Dead Peer Detection] 2018:12:07-18:27:13 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #55: received Vendor ID payload [RFC 3947] 2018:12:07-18:27:13 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #55: enabling possible NAT-traversal with method 3 2018:12:07-18:27:13 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #55: NAT-Traversal: Result using RFC 3947: no NAT detected 2018:12:07-18:27:13 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #55: Peer ID is ID_IPV4_ADDR: '73.38.217.69' 2018:12:07-18:27:13 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #55: Dead Peer Detection (RFC 3706) enabled 2018:12:07-18:27:13 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #55: ISAKMP SA established 2018:12:07-18:27:13 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #56: initiating Quick Mode PSK+ENCRYPT+TUNNEL+UP to replace #53 {using isakmp#55} 2018:12:07-18:27:13 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #57: initiating Quick Mode PSK+ENCRYPT+TUNNEL+UP {using isakmp#55} 2018:12:07-18:27:13 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #56: sent QI2, IPsec SA established {ESP=>0x0428bd16 <0x772d5f96 DPD} 2018:12:07-18:27:13 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #57: sent QI2, IPsec SA established {ESP=>0xc6df7a06 <0x2925e971 DPD} 2018:12:07-18:28:39 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #55: received Delete SA payload: replace IPSEC State #56 in 10 seconds 2018:12:07-18:28:39 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #55: received Delete SA payload: replace IPSEC State #57 in 10 seconds 2018:12:07-18:28:39 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #55: received Delete SA payload: deleting ISAKMP State #55 2018:12:07-18:28:47 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #57: DPD: Could not find newest phase 1 state 2018:12:07-18:28:47 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #57: DPD: No response from peer - declaring peer dead 2018:12:07-18:28:47 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #57: DPD: Restarting all connections of peer 2018:12:07-18:28:47 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #57: DPD: Terminating all SAs using this connection 2018:12:07-18:28:47 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #57: deleting state (STATE_QUICK_I2) 2018:12:07-18:28:47 krohtofw pluto[21712]: id="2204" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN down" variant="ipsec" connection="REF_IpsSitDormtohome" address="207.159.187.26" local_net="10.10.1.0/24" remote_net="192.168.1.0/24" 2018:12:07-18:28:47 krohtofw pluto[21712]: DPD: Restarting connection "S_REF_IpsSitDormtohome_1" 2018:12:07-18:28:47 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0": DPD: Terminating all SAs using this connection 2018:12:07-18:28:47 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #56: deleting state (STATE_QUICK_I2) 2018:12:07-18:28:47 krohtofw pluto[21712]: id="2204" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN down" variant="ipsec" connection="REF_IpsSitDormtohome" address="207.159.187.26" local_net="10.80.1.0/24" remote_net="192.168.1.0/24" 2018:12:07-18:28:47 krohtofw pluto[21712]: DPD: Restarting connection "S_REF_IpsSitDormtohome_0" 2018:12:07-18:28:47 krohtofw pluto[21712]: updown: /sbin/ip -4 route del 192.168.1.0/24 dev eth1 table main src 10.10.1.1 proto ipsec metric 0 failed with status 2: 2018:12:07-18:28:47 krohtofw pluto[21712]: updown: RTNETLINK answers: No such process 2018:12:07-18:28:47 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #58: initiating Main Mode 2018:12:07-18:29:17 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #58: received Vendor ID payload [strongSwan] 2018:12:07-18:29:17 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #58: ignoring Vendor ID payload [Cisco-Unity] 2018:12:07-18:29:17 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #58: received Vendor ID payload [XAUTH] 2018:12:07-18:29:17 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #58: received Vendor ID payload [Dead Peer Detection] 2018:12:07-18:29:17 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #58: received Vendor ID payload [RFC 3947] 2018:12:07-18:29:17 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #58: enabling possible NAT-traversal with method 3 2018:12:07-18:29:18 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #58: NAT-Traversal: Result using RFC 3947: no NAT detected 2018:12:07-18:29:18 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #58: Peer ID is ID_IPV4_ADDR: '73.38.217.69' 2018:12:07-18:29:18 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #58: Dead Peer Detection (RFC 3706) enabled 2018:12:07-18:29:18 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #58: ISAKMP SA established 2018:12:07-18:29:18 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #59: initiating Quick Mode PSK+ENCRYPT+TUNNEL+UP {using isakmp#58} 2018:12:07-18:29:18 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #60: initiating Quick Mode PSK+ENCRYPT+TUNNEL+UP {using isakmp#58} 2018:12:07-18:29:18 krohtofw pluto[21712]: id="2203" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN up" variant="ipsec" connection="REF_IpsSitDormtohome" address="207.159.187.26" local_net="10.80.1.0/24" remote_net="192.168.1.0/24" 2018:12:07-18:29:18 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #59: sent QI2, IPsec SA established {ESP=>0xf93b8d25 <0xa64b50b6 DPD} 2018:12:07-18:29:18 krohtofw pluto[21712]: id="2203" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN up" variant="ipsec" connection="REF_IpsSitDormtohome" address="207.159.187.26" local_net="10.10.1.0/24" remote_net="192.168.1.0/24" 2018:12:07-18:29:18 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #60: sent QI2, IPsec SA established {ESP=>0x2c26330d <0x1f7e694c DPD} 2018:12:07-18:38:55 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #58: received Delete SA payload: replace IPSEC State #59 in 10 seconds 2018:12:07-18:38:55 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #58: received Delete SA payload: replace IPSEC State #60 in 10 seconds 2018:12:07-18:38:55 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #58: received Delete SA payload: deleting ISAKMP State #58 2018:12:07-18:38:57 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #60: DPD: Could not find newest phase 1 state 2018:12:07-18:38:57 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #60: DPD: No response from peer - declaring peer dead 2018:12:07-18:38:57 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #60: DPD: Restarting all connections of peer 2018:12:07-18:38:57 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #60: DPD: Terminating all SAs using this connection 2018:12:07-18:38:57 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #60: deleting state (STATE_QUICK_I2) 2018:12:07-18:38:57 krohtofw pluto[21712]: id="2204" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN down" variant="ipsec" connection="REF_IpsSitDormtohome" address="207.159.187.26" local_net="10.10.1.0/24" remote_net="192.168.1.0/24" 2018:12:07-18:38:57 krohtofw pluto[21712]: DPD: Restarting connection "S_REF_IpsSitDormtohome_1" 2018:12:07-18:38:57 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0": DPD: Terminating all SAs using this connection 2018:12:07-18:38:57 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #59: deleting state (STATE_QUICK_I2) 2018:12:07-18:38:57 krohtofw pluto[21712]: id="2204" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN down" variant="ipsec" connection="REF_IpsSitDormtohome" address="207.159.187.26" local_net="10.80.1.0/24" remote_net="192.168.1.0/24" 2018:12:07-18:38:57 krohtofw pluto[21712]: DPD: Restarting connection "S_REF_IpsSitDormtohome_0" 2018:12:07-18:38:57 krohtofw pluto[21712]: updown: /sbin/ip -4 route del 192.168.1.0/24 dev eth1 table main src 10.10.1.1 proto ipsec metric 0 failed with status 2: 2018:12:07-18:38:57 krohtofw pluto[21712]: updown: RTNETLINK answers: No such process 2018:12:07-18:38:57 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #61: initiating Main Mode 2018:12:07-18:40:07 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #61: received Vendor ID payload [strongSwan] 2018:12:07-18:40:07 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #61: ignoring Vendor ID payload [Cisco-Unity] 2018:12:07-18:40:07 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #61: received Vendor ID payload [XAUTH] 2018:12:07-18:40:07 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #61: received Vendor ID payload [Dead Peer Detection] 2018:12:07-18:40:07 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #61: received Vendor ID payload [RFC 3947] 2018:12:07-18:40:07 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #61: enabling possible NAT-traversal with method 3 2018:12:07-18:40:07 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #61: NAT-Traversal: Result using RFC 3947: no NAT detected 2018:12:07-18:40:07 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #61: Peer ID is ID_IPV4_ADDR: '73.38.217.69' 2018:12:07-18:40:07 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #61: Dead Peer Detection (RFC 3706) enabled 2018:12:07-18:40:07 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #61: ISAKMP SA established 2018:12:07-18:40:07 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #62: initiating Quick Mode PSK+ENCRYPT+TUNNEL+UP {using isakmp#61} 2018:12:07-18:40:07 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #63: initiating Quick Mode PSK+ENCRYPT+TUNNEL+UP {using isakmp#61} 2018:12:07-18:40:07 krohtofw pluto[21712]: id="2203" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN up" variant="ipsec" connection="REF_IpsSitDormtohome" address="207.159.187.26" local_net="10.80.1.0/24" remote_net="192.168.1.0/24" 2018:12:07-18:40:08 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #62: sent QI2, IPsec SA established {ESP=>0xd9890270 <0x50d3b5ff DPD} 2018:12:07-18:40:08 krohtofw pluto[21712]: id="2203" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN up" variant="ipsec" connection="REF_IpsSitDormtohome" address="207.159.187.26" local_net="10.10.1.0/24" remote_net="192.168.1.0/24" 2018:12:07-18:40:08 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #63: sent QI2, IPsec SA established {ESP=>0xb36f4d88 <0x05262594 DPD} 2018:12:07-19:17:59 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #61: received Delete SA payload: replace IPSEC State #62 in 10 seconds 2018:12:07-19:17:59 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #61: received Delete SA payload: replace IPSEC State #63 in 10 seconds 2018:12:07-19:18:00 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #61: received Delete SA payload: deleting ISAKMP State #61 2018:12:07-19:18:03 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #62: DPD: Could not find newest phase 1 state 2018:12:07-19:18:03 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #62: DPD: No response from peer - declaring peer dead 2018:12:07-19:18:03 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #62: DPD: Restarting all connections of peer 2018:12:07-19:18:03 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #62: DPD: Terminating all SAs using this connection 2018:12:07-19:18:03 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #63: deleting state (STATE_QUICK_I2) 2018:12:07-19:18:03 krohtofw pluto[21712]: id="2204" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN down" variant="ipsec" connection="REF_IpsSitDormtohome" address="207.159.187.26" local_net="10.10.1.0/24" remote_net="192.168.1.0/24" 2018:12:07-19:18:03 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #62: DPD: Restarting connection "S_REF_IpsSitDormtohome_1" 2018:12:07-19:18:03 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #62: DPD: Terminating all SAs using this connection 2018:12:07-19:18:03 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #62: deleting state (STATE_QUICK_I2) 2018:12:07-19:18:03 krohtofw pluto[21712]: id="2204" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN down" variant="ipsec" connection="REF_IpsSitDormtohome" address="207.159.187.26" local_net="10.80.1.0/24" remote_net="192.168.1.0/24" 2018:12:07-19:18:03 krohtofw pluto[21712]: DPD: Restarting connection "S_REF_IpsSitDormtohome_0" 2018:12:07-19:18:03 krohtofw pluto[21712]: updown: /sbin/ip -4 route del 192.168.1.0/24 dev eth1 table main src 10.10.1.1 proto ipsec metric 0 failed with status 2: 2018:12:07-19:18:03 krohtofw pluto[21712]: updown: RTNETLINK answers: No such process 2018:12:07-19:18:03 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #64: initiating Main Mode 2018:12:07-19:18:13 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #64: received Vendor ID payload [strongSwan] 2018:12:07-19:18:13 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #64: ignoring Vendor ID payload [Cisco-Unity] 2018:12:07-19:18:13 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #64: received Vendor ID payload [XAUTH] 2018:12:07-19:18:13 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #64: received Vendor ID payload [Dead Peer Detection] 2018:12:07-19:18:13 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #64: received Vendor ID payload [RFC 3947] 2018:12:07-19:18:13 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #64: enabling possible NAT-traversal with method 3 2018:12:07-19:18:13 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #64: NAT-Traversal: Result using RFC 3947: no NAT detected 2018:12:07-19:18:13 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #64: Peer ID is ID_IPV4_ADDR: '73.38.217.69' 2018:12:07-19:18:13 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #64: Dead Peer Detection (RFC 3706) enabled 2018:12:07-19:18:13 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #64: ISAKMP SA established 2018:12:07-19:18:13 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #65: initiating Quick Mode PSK+ENCRYPT+TUNNEL+UP {using isakmp#64} 2018:12:07-19:18:13 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #66: initiating Quick Mode PSK+ENCRYPT+TUNNEL+UP {using isakmp#64} 2018:12:07-19:18:13 krohtofw pluto[21712]: id="2203" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN up" variant="ipsec" connection="REF_IpsSitDormtohome" address="207.159.187.26" local_net="10.80.1.0/24" remote_net="192.168.1.0/24" 2018:12:07-19:18:13 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #65: sent QI2, IPsec SA established {ESP=>0xaea07f61 <0xa9b4a80a DPD} 2018:12:07-19:18:13 krohtofw pluto[21712]: id="2203" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN up" variant="ipsec" connection="REF_IpsSitDormtohome" address="207.159.187.26" local_net="10.10.1.0/24" remote_net="192.168.1.0/24" 2018:12:07-19:18:13 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #66: sent QI2, IPsec SA established {ESP=>0x20af2f0b <0x014112fc DPD} 2018:12:07-20:00:55 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #67: initiating Quick Mode PSK+ENCRYPT+TUNNEL+UP to replace #65 {using isakmp#64} 2018:12:07-20:00:55 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #67: sent QI2, IPsec SA established {ESP=>0x6c05ce8a <0xfbcf8d0d DPD} 2018:12:07-20:01:54 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #68: initiating Quick Mode PSK+ENCRYPT+TUNNEL+UP to replace #66 {using isakmp#64} 2018:12:07-20:01:54 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #68: sent QI2, IPsec SA established {ESP=>0xdfa65e14 <0xf1acee65 DPD} 2018:12:07-20:18:13 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #64: ignoring Delete SA payload: PROTO_IPSEC_ESP SA(0xaea07f61) not found (maybe expired) 2018:12:07-20:18:13 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #64: ignoring Delete SA payload: PROTO_IPSEC_ESP SA(0x20af2f0b) not found (maybe expired) 2018:12:07-20:43:44 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #69: initiating Quick Mode PSK+ENCRYPT+TUNNEL+UP to replace #67 {using isakmp#64} 2018:12:07-20:43:44 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #69: sent QI2, IPsec SA established {ESP=>0xf76f1274 <0xa2f5f4ac DPD} 2018:12:07-20:50:58 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #70: initiating Quick Mode PSK+ENCRYPT+TUNNEL+UP to replace #68 {using isakmp#64} 2018:12:07-20:50:58 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #70: sent QI2, IPsec SA established {ESP=>0xd55ae38e <0x948143e1 DPD} 2018:12:07-21:00:55 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #64: received Delete SA(0x6c05ce8a) payload: deleting IPSEC State #67 2018:12:07-21:01:54 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #64: received Delete SA(0xdfa65e14) payload: deleting IPSEC State #68 2018:12:07-21:11:30 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #71: initiating Main Mode to replace #64 2018:12:07-21:11:30 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #71: received Vendor ID payload [strongSwan] 2018:12:07-21:11:30 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #71: ignoring Vendor ID payload [Cisco-Unity] 2018:12:07-21:11:30 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #71: received Vendor ID payload [XAUTH] 2018:12:07-21:11:30 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #71: received Vendor ID payload [Dead Peer Detection] 2018:12:07-21:11:30 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #71: received Vendor ID payload [RFC 3947] 2018:12:07-21:11:30 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #71: enabling possible NAT-traversal with method 3 2018:12:07-21:11:30 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #71: NAT-Traversal: Result using RFC 3947: no NAT detected 2018:12:07-21:11:30 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #71: Peer ID is ID_IPV4_ADDR: '73.38.217.69' 2018:12:07-21:11:30 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #71: Dead Peer Detection (RFC 3706) enabled 2018:12:07-21:11:30 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #71: ISAKMP SA established 2018:12:07-21:23:43 krohtofw pluto[21712]: packet from 73.38.217.69:500: received Vendor ID payload [strongSwan] 2018:12:07-21:23:43 krohtofw pluto[21712]: packet from 73.38.217.69:500: ignoring Vendor ID payload [Cisco-Unity] 2018:12:07-21:23:43 krohtofw pluto[21712]: packet from 73.38.217.69:500: received Vendor ID payload [XAUTH] 2018:12:07-21:23:43 krohtofw pluto[21712]: packet from 73.38.217.69:500: received Vendor ID payload [Dead Peer Detection] 2018:12:07-21:23:43 krohtofw pluto[21712]: packet from 73.38.217.69:500: received Vendor ID payload [RFC 3947] 2018:12:07-21:23:43 krohtofw pluto[21712]: packet from 73.38.217.69:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03] 2018:12:07-21:23:43 krohtofw pluto[21712]: packet from 73.38.217.69:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02] 2018:12:07-21:23:43 krohtofw pluto[21712]: packet from 73.38.217.69:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] 2018:12:07-21:23:43 krohtofw pluto[21712]: packet from 73.38.217.69:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00] 2018:12:07-21:23:43 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #72: responding to Main Mode 2018:12:07-21:23:43 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #72: NAT-Traversal: Result using RFC 3947: no NAT detected 2018:12:07-21:23:43 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #72: Peer ID is ID_IPV4_ADDR: '73.38.217.69' 2018:12:07-21:23:43 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #72: Dead Peer Detection (RFC 3706) enabled 2018:12:07-21:23:43 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #72: sent MR3, ISAKMP SA established 2018:12:07-21:26:28 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #73: initiating Quick Mode PSK+ENCRYPT+TUNNEL+UP to replace #69 {using isakmp#72} 2018:12:07-21:26:28 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #73: sent QI2, IPsec SA established {ESP=>0x1a56e295 <0x69d10bab DPD} 2018:12:07-21:28:13 krohtofw pluto[21712]: packet from 73.38.217.69:500: Informational Exchange is for an unknown (expired?) SA 2018:12:07-21:34:03 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #74: initiating Quick Mode PSK+ENCRYPT+TUNNEL+UP to replace #70 {using isakmp#72} 2018:12:07-21:34:03 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #74: sent QI2, IPsec SA established {ESP=>0x0cb4c295 <0x4a69ea82 DPD} 2018:12:07-21:43:44 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #72: ignoring Delete SA payload: PROTO_IPSEC_ESP SA(0xf76f1274) not found (maybe expired) 2018:12:07-21:44:43 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #72: received Delete SA payload: replace IPSEC State #73 in 10 seconds 2018:12:07-21:44:43 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #72: received Delete SA(0xd55ae38e) payload: deleting IPSEC State #70 2018:12:07-21:44:43 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #71: received Delete SA payload: deleting ISAKMP State #71 2018:12:07-21:44:43 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #72: received Delete SA payload: replace IPSEC State #74 in 10 seconds 2018:12:07-21:44:43 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #72: received Delete SA payload: deleting ISAKMP State #72 2018:12:07-21:44:51 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #73: DPD: Could not find newest phase 1 state 2018:12:07-21:44:51 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #73: DPD: No response from peer - declaring peer dead 2018:12:07-21:44:51 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #73: DPD: Restarting all connections of peer 2018:12:07-21:44:51 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #73: DPD: Terminating all SAs using this connection 2018:12:07-21:44:51 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #74: deleting state (STATE_QUICK_I2) 2018:12:07-21:44:51 krohtofw pluto[21712]: id="2204" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN down" variant="ipsec" connection="REF_IpsSitDormtohome" address="207.159.187.26" local_net="10.10.1.0/24" remote_net="192.168.1.0/24" 2018:12:07-21:44:51 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #73: DPD: Restarting connection "S_REF_IpsSitDormtohome_1" 2018:12:07-21:44:51 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #73: DPD: Terminating all SAs using this connection 2018:12:07-21:44:51 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #73: deleting state (STATE_QUICK_I2) 2018:12:07-21:44:51 krohtofw pluto[21712]: id="2204" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN down" variant="ipsec" connection="REF_IpsSitDormtohome" address="207.159.187.26" local_net="10.80.1.0/24" remote_net="192.168.1.0/24" 2018:12:07-21:44:51 krohtofw pluto[21712]: DPD: Restarting connection "S_REF_IpsSitDormtohome_0" 2018:12:07-21:44:51 krohtofw pluto[21712]: updown: /sbin/ip -4 route del 192.168.1.0/24 dev eth1 table main src 10.10.1.1 proto ipsec metric 0 failed with status 2: 2018:12:07-21:44:51 krohtofw pluto[21712]: updown: RTNETLINK answers: No such process 2018:12:07-21:44:51 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #75: initiating Main Mode 2018:12:07-21:45:22 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #75: received Vendor ID payload [strongSwan] 2018:12:07-21:45:22 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #75: ignoring Vendor ID payload [Cisco-Unity] 2018:12:07-21:45:22 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #75: received Vendor ID payload [XAUTH] 2018:12:07-21:45:22 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #75: received Vendor ID payload [Dead Peer Detection] 2018:12:07-21:45:22 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #75: received Vendor ID payload [RFC 3947] 2018:12:07-21:45:22 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #75: enabling possible NAT-traversal with method 3 2018:12:07-21:45:22 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #75: NAT-Traversal: Result using RFC 3947: no NAT detected 2018:12:07-21:45:22 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #75: Peer ID is ID_IPV4_ADDR: '73.38.217.69' 2018:12:07-21:45:22 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #75: Dead Peer Detection (RFC 3706) enabled 2018:12:07-21:45:22 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #75: ISAKMP SA established 2018:12:07-21:45:22 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #76: initiating Quick Mode PSK+ENCRYPT+TUNNEL+UP {using isakmp#75} 2018:12:07-21:45:22 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #77: initiating Quick Mode PSK+ENCRYPT+TUNNEL+UP {using isakmp#75} 2018:12:07-21:45:22 krohtofw pluto[21712]: id="2203" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN up" variant="ipsec" connection="REF_IpsSitDormtohome" address="207.159.187.26" local_net="10.80.1.0/24" remote_net="192.168.1.0/24" 2018:12:07-21:45:22 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #76: sent QI2, IPsec SA established {ESP=>0xefb9b710 <0xfc638662 DPD} 2018:12:07-21:45:22 krohtofw pluto[21712]: id="2203" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN up" variant="ipsec" connection="REF_IpsSitDormtohome" address="207.159.187.26" local_net="10.10.1.0/24" remote_net="192.168.1.0/24" 2018:12:07-21:45:22 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #77: sent QI2, IPsec SA established {ESP=>0x9aed1121 <0xc5332437 DPD} 2018:12:07-22:31:22 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #78: initiating Quick Mode PSK+ENCRYPT+TUNNEL+UP to replace #76 {using isakmp#75} 2018:12:07-22:31:22 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #78: sent QI2, IPsec SA established {ESP=>0xc039f49e <0x52fece80 DPD} 2018:12:07-22:34:51 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #79: initiating Quick Mode PSK+ENCRYPT+TUNNEL+UP to replace #77 {using isakmp#75} 2018:12:07-22:34:51 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #79: sent QI2, IPsec SA established {ESP=>0xeebfe14e <0x07216c8c DPD} 2018:12:07-22:45:22 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #75: received Delete SA(0xefb9b710) payload: deleting IPSEC State #76 2018:12:07-22:45:22 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #75: ignoring Delete SA payload: PROTO_IPSEC_ESP SA(0x9aed1121) not found (maybe expired) 2018:12:07-23:02:06 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #75: received Delete SA payload: replace IPSEC State #78 in 10 seconds 2018:12:07-23:02:06 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #75: received Delete SA payload: replace IPSEC State #79 in 10 seconds 2018:12:07-23:02:06 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #75: received Delete SA payload: deleting ISAKMP State #75 2018:12:07-23:02:10 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #79: DPD: Could not find newest phase 1 state 2018:12:07-23:02:10 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #79: DPD: No response from peer - declaring peer dead 2018:12:07-23:02:10 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #79: DPD: Restarting all connections of peer 2018:12:07-23:02:10 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #79: DPD: Terminating all SAs using this connection 2018:12:07-23:02:10 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #79: deleting state (STATE_QUICK_I2) 2018:12:07-23:02:10 krohtofw pluto[21712]: id="2204" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN down" variant="ipsec" connection="REF_IpsSitDormtohome" address="207.159.187.26" local_net="10.10.1.0/24" remote_net="192.168.1.0/24" 2018:12:07-23:02:10 krohtofw pluto[21712]: DPD: Restarting connection "S_REF_IpsSitDormtohome_1" 2018:12:07-23:02:10 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0": DPD: Terminating all SAs using this connection 2018:12:07-23:02:10 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #78: deleting state (STATE_QUICK_I2) 2018:12:07-23:02:10 krohtofw pluto[21712]: id="2204" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN down" variant="ipsec" connection="REF_IpsSitDormtohome" address="207.159.187.26" local_net="10.80.1.0/24" remote_net="192.168.1.0/24" 2018:12:07-23:02:10 krohtofw pluto[21712]: DPD: Restarting connection "S_REF_IpsSitDormtohome_0" 2018:12:07-23:02:10 krohtofw pluto[21712]: updown: /sbin/ip -4 route del 192.168.1.0/24 dev eth1 table main src 10.10.1.1 proto ipsec metric 0 failed with status 2: 2018:12:07-23:02:10 krohtofw pluto[21712]: updown: RTNETLINK answers: No such process 2018:12:07-23:02:10 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #80: initiating Main Mode 2018:12:07-23:04:00 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #80: received Vendor ID payload [strongSwan] 2018:12:07-23:04:00 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #80: ignoring Vendor ID payload [Cisco-Unity] 2018:12:07-23:04:00 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #80: received Vendor ID payload [XAUTH] 2018:12:07-23:04:00 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #80: received Vendor ID payload [Dead Peer Detection] 2018:12:07-23:04:00 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #80: received Vendor ID payload [RFC 3947] 2018:12:07-23:04:00 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #80: enabling possible NAT-traversal with method 3 2018:12:07-23:04:01 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #80: NAT-Traversal: Result using RFC 3947: no NAT detected 2018:12:07-23:04:01 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #80: Peer ID is ID_IPV4_ADDR: '73.38.217.69' 2018:12:07-23:04:01 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #80: Dead Peer Detection (RFC 3706) enabled 2018:12:07-23:04:01 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #80: ISAKMP SA established 2018:12:07-23:04:01 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #81: initiating Quick Mode PSK+ENCRYPT+TUNNEL+UP {using isakmp#80} 2018:12:07-23:04:01 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #82: initiating Quick Mode PSK+ENCRYPT+TUNNEL+UP {using isakmp#80} 2018:12:07-23:04:01 krohtofw pluto[21712]: id="2203" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN up" variant="ipsec" connection="REF_IpsSitDormtohome" address="207.159.187.26" local_net="10.80.1.0/24" remote_net="192.168.1.0/24" 2018:12:07-23:04:01 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #81: sent QI2, IPsec SA established {ESP=>0xf22e0c64 <0x76afa9de DPD} 2018:12:07-23:04:01 krohtofw pluto[21712]: id="2203" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN up" variant="ipsec" connection="REF_IpsSitDormtohome" address="207.159.187.26" local_net="10.10.1.0/24" remote_net="192.168.1.0/24" 2018:12:07-23:04:01 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #82: sent QI2, IPsec SA established {ESP=>0x4d5590be <0x3cc6c508 DPD} 2018:12:07-23:48:17 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #83: initiating Quick Mode PSK+ENCRYPT+TUNNEL+UP to replace #82 {using isakmp#80} 2018:12:07-23:48:17 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_1" #83: sent QI2, IPsec SA established {ESP=>0x841f60ef <0xd0bcfb28 DPD} 2018:12:07-23:48:52 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #84: initiating Quick Mode PSK+ENCRYPT+TUNNEL+UP to replace #81 {using isakmp#80} 2018:12:07-23:48:52 krohtofw pluto[21712]: "S_REF_IpsSitDormtohome_0" #84: sent QI2, IPsec SA established {ESP=>0x23a51125 <0x22dd26bb DPD}