Hello All,
VPN get down by itself time to time, XG85 (SFOS 17.0.9 MR-9).. VPN connection between Sophos XG85 and Fortigate 100D ..please suggest me some solution.
This thread was automatically locked due to age.
Hello All,
VPN get down by itself time to time, XG85 (SFOS 17.0.9 MR-9).. VPN connection between Sophos XG85 and Fortigate 100D ..please suggest me some solution.
our IPSec VPN is from sophos (192.168.226.179) to fortigate ( 192.168.226.1) and we have use IPSec IKEv1.
if you are looking for a log of our vpn during automatic down when we are visible of down at morning are at attachment file
1. ipsec_DC.log
2018-10-30 09:36:11 - swanctl --initiate --timeout 15 --child DC-1
initiate failed: CHILD_SA 'DC-1' not established after 15000ms
[ENC] generating QUICK_MODE request 2229622054 [ HASH SA No KE ID ID ]
[NET] sending packet: from 192.168.226.179[500] to 192.168.226.1[500] (396 bytes)
[IKE] sending retransmit 1 of request message ID 2229622054, seq 4836
[NET] sending packet: from 192.168.226.179[500] to 192.168.226.1[500] (396 bytes)
[NET] received packet: from 192.168.226.1[500] to 192.168.226.179[500] (108 bytes)
[ENC] parsed INFORMATIONAL_V1 request 3618567876 [ HASH N(DPD) ]
[NET] received packet: from 192.168.226.1[500] to 192.168.226.179[500] (108 bytes)
[ENC] parsed INFORMATIONAL_V1 request 3240572035 [ HASH N(DPD) ]
[IKE] sending retransmit 2 of request message ID 2229622054, seq 4836
[NET] sending packet: from 192.168.226.179[500] to 192.168.226.1[500] (396 bytes)
[NET] received packet: from 192.168.226.1[500] to 192.168.226.179[500] (108 bytes)
[ENC] parsed INFORMATIONAL_V1 request 1716790976 [ HASH N(DPD) ]
kill -9 32371 > /dev/null 2>&1
2018-10-30 09:36:26 - initiate timeout for DC-1
2018-10-30 09:36:26 - Operation fails status: 255
2018-10-30 09:37:43 - swanctl --initiate --timeout 15 --child DC-1
initiate failed: establishing CHILD_SA 'DC-1' failed
[NET] received packet: from 192.168.226.1[500] to 192.168.226.179[500] (380 bytes)
[ENC] invalid HASH_V1 payload length, decryption failed?
[ENC] could not decrypt payloads
[IKE] message parsing failed
[ENC] generating INFORMATIONAL_V1 request 74883465 [ HASH N(PLD_MAL) ]
[NET] sending packet: from 192.168.226.179[500] to 192.168.226.1[500] (92 bytes)
[IKE] QUICK_MODE request with message ID 1310762094 processing failed
[DMN] [GARNER-LOGGING] (child_alert) ALERT: parsing IKE message from 192.168.226.1[500] failed
[NET] received packet: from 192.168.226.1[500] to 192.168.226.179[500] (108 bytes)
[ENC] parsed INFORMATIONAL_V1 request 463114116 [ HASH N(DPD) ]
[NET] received packet: from 192.168.226.1[500] to 192.168.226.179[500] (108 bytes)
[ENC] parsed INFORMATIONAL_V1 request 1507186884 [ HASH D ]
[IKE] received DELETE for IKE_SA DC-1[682]
[IKE] deleting IKE_SA DC-1[682] between 192.168.226.179[192.168.226.179]...192.168.226.1[192.168.226.1]
kill -9 440 > /dev/null 2>&1
2018-10-30 09:37:51 - Operation fails status: 1
2018-10-31 15:43:45 - swanctl --initiate --timeout 15 --child DC-1
initiate failed: CHILD_SA 'DC-1' not established after 15000ms
[ENC] generating QUICK_MODE request 2431110743 [ HASH SA No KE ID ID ]
[NET] sending packet: from 192.168.226.179[500] to 192.168.226.1[500] (396 bytes)
[NET] received packet: from 192.168.226.1[500] to 192.168.226.179[500] (108 bytes)
[ENC] parsed INFORMATIONAL_V1 request 897358792 [ HASH N(DPD) ]
[IKE] sending retransmit 1 of request message ID 2431110743, seq 677
[NET] sending packet: from 192.168.226.179[500] to 192.168.226.1[500] (396 bytes)
[NET] received packet: from 192.168.226.1[500] to 192.168.226.179[500] (108 bytes)
[ENC] parsed INFORMATIONAL_V1 request 76166858 [ HASH N(DPD) ]
[IKE] sending retransmit 2 of request message ID 2431110743, seq 677
[NET] sending packet: from 192.168.226.179[500] to 192.168.226.1[500] (396 bytes)
[NET] received packet: from 192.168.226.1[500] to 192.168.226.179[500] (108 bytes)
[ENC] parsed INFORMATIONAL_V1 request 213784476 [ HASH N(DPD) ]
kill -9 26153 > /dev/null 2>&1
2018-10-31 15:44:01 - initiate timeout for DC-1
2018-10-31 15:44:01 - Operation fails status: 255
2.strongswan.log
[ HASH N(DPD_ACK)
2018-10-31 21:34:59 21[NET] <DC-1|1711> received packet: from 192.168.226.1[500] to 192.168.226.179[500] (108 bytes)
2018-10-31 21:34:59 21[ENC] <DC-1|1711> parsed INFORMATIONAL_V1 request 2403996211 [ HASH N(DPD) ]
2018-10-31 21:34:59 21[ENC] <DC-1|1711> generating INFORMATIONAL_V1 request 508698803 [ HASH N(DPD_ACK) ]
2018-10-31 21:34:59 21[NET] <DC-1|1711> sending packet: from 192.168.226.179[500] to 192.168.226.1[500] (108 bytes)
2018-10-31 21:35:04 32[NET] <DC-1|1711> received packet: from 192.168.226.1[500] to 192.168.226.179[500] (108 bytes)
2018-10-31 21:35:04 32[ENC] <DC-1|1711> parsed INFORMATIONAL_V1 request 849834768 [ HASH N(DPD) ]
2018-10-31 21:35:04 32[ENC] <DC-1|1711> generating INFORMATIONAL_V1 request 271583907 [ HASH N(DPD_ACK) ]
2018-10-31 21:35:04 32[NET] <DC-1|1711> sending packet: from 192.168.226.179[500] to 192.168.226.1[500] (108 bytes)
2018-10-31 21:35:09 07[NET] <DC-1|1711> received packet: from 192.168.226.1[500] to 192.168.226.179[500] (108 bytes)
2018-10-31 21:35:09 07[ENC] <DC-1|1711> parsed INFORMATIONAL_V1 request 2854016584 [ HASH N(DPD) ]
2018-10-31 21:35:09 07[ENC] <DC-1|1711> generating INFORMATIONAL_V1 request 517107434 [ HASH N(DPD_ACK) ]
2018-10-31 21:35:09 07[NET] <DC-1|1711> sending packet: from 192.168.226.179[500] to 192.168.226.1[500] (108 bytes)
2018-10-31 21:35:14 15[NET] <DC-1|1711> received packet: from 192.168.226.1[500] to 192.168.226.179[500] (108 bytes)
2018-10-31 21:35:14 15[ENC] <DC-1|1711> parsed INFORMATIONAL_V1 request 4088390690 [ HASH N(DPD) ]
2018-10-31 21:35:14 15[ENC] <DC-1|1711> generating INFORMATIONAL_V1 request 905385072 [ HASH N(DPD_ACK) ]
2018-10-31 21:35:14 15[NET] <DC-1|1711> sending packet: from 192.168.226.179[500] to 192.168.226.1[500] (108 bytes)
2018-10-31 21:35:19 30[NET] <DC-1|1711> received packet: from 192.168.226.1[500] to 192.168.226.179[500] (108 bytes)
2018-10-31 21:35:19 30[ENC] <DC-1|1711> parsed INFORMATIONAL_V1 request 142270608 [ HASH N(DPD) ]
2018-10-31 21:35:19 30[ENC] <DC-1|1711> generating INFORMATIONAL_V1 request 1195665011 [ HASH N(DPD_ACK) ]
2018-10-31 21:35:19 30[NET] <DC-1|1711> sending packet: from 192.168.226.179[500] to 192.168.226.1[500] (108 bytes)
2018-10-31 21:35:24 09[NET] <DC-1|1711> received packet: from 192.168.226.1[500] to 192.168.226.179[500] (108 bytes)
2018-10-31 21:35:24 09[ENC] <DC-1|1711> parsed INFORMATIONAL_V1 request 2547865032 [ HASH N(DPD) ]
2018-10-31 21:35:24 09[ENC] <DC-1|1711> generating INFORMATIONAL_V1 request 4134348461 [ HASH N(DPD_ACK) ]
2018-10-31 21:35:24 09[NET] <DC-1|1711> sending packet: from 192.168.226.179[500] to 192.168.226.1[500] (108 bytes)
2018-10-31 21:35:29 28[NET] <DC-1|1711> received packet: from 192.168.226.1[500] to 192.168.226.179[500] (108 bytes)
2018-10-31 21:35:29 28[ENC] <DC-1|1711> parsed INFORMATIONAL_V1 request 3752445444 [ HASH N(DPD) ]
2018-10-31 21:35:29 28[ENC] <DC-1|1711> generating INFORMATIONAL_V1 request 1877984572 [ HASH N(DPD_ACK) ]
2018-10-31 21:35:29 28[NET] <DC-1|1711> sending packet: from 192.168.226.179[500] to 192.168.226.1[500] (108 bytes)
2018-10-31 21:35:34 05[NET] <DC-1|1711> received packet: from 192.168.226.1[500] to 192.168.226.179[500] (108 bytes)
2018-10-31 21:35:34 05[ENC] <DC-1|1711> parsed INFORMATIONAL_V1 request 322305427 [ HASH N(DPD) ]
2018-10-31 21:35:34 05[ENC] <DC-1|1711> generating INFORMATIONAL_V1 request 2307441699 [ HASH N(DPD_ACK) ]
2018-10-31 21:35:34 05[NET] <DC-1|1711> sending packet: from 192.168.226.179[500] to 192.168.226.1[500] (108 bytes)
2018-10-31 21:35:39 12[NET] <DC-1|1711> received packet: from 192.168.226.1[500] to 192.168.226.179[500] (108 bytes)
2018-10-31 21:35:39 12[ENC] <DC-1|1711> parsed INFORMATIONAL_V1 request 316949986 [ HASH N(DPD) ]
2018-10-31 21:35:39 12[ENC] <DC-1|1711> generating INFORMATIONAL_V1 request 454267559 [ HASH N(DPD_ACK) ]
2018-10-31 21:35:39 12[NET] <DC-1|1711> sending packet: from 192.168.226.179[500] to 192.168.226.1[500] (108 bytes)
2018-10-31 21:35:44 31[NET] <DC-1|1711> received packet: from 192.168.226.1[500] to 192.168.226.179[500] (108 bytes)
2018-10-31 21:35:44 31[ENC] <DC-1|1711> parsed INFORMATIONAL_V1 request 1946438803 [ HASH N(DPD) ]
2018-10-31 21:35:44 31[ENC] <DC-1|1711> generating INFORMATIONAL_V1 request 3633252743 [ HASH N(DPD_ACK) ]
2018-10-31 21:35:44 31[NET] <DC-1|1711> sending packet: from 192.168.226.179[500] to 192.168.226.1[500] (108 bytes)
2018-10-31 21:35:49 23[NET] <DC-1|1711> received packet: from 192.168.226.1[500] to 192.168.226.179[500] (108 bytes)
"strongswan.log" 46400L, 5109327C 1,1 Top
2018-11-01 08:46:41 05[ENC] <DC-1|1874> parsed INFORMATIONAL_V1 request 2622333087 [ HASH N(DPD) ]
2018-11-01 08:46:46 21[NET] <DC-1|1874> received packet: from 192.168.226.1[500] to 192.168.226.179[500] (108 bytes)
2018-11-01 08:46:46 21[ENC] <DC-1|1874> parsed INFORMATIONAL_V1 request 3369364072 [ HASH N(DPD) ]
2018-11-01 08:46:51 09[NET] <DC-1|1874> received packet: from 192.168.226.1[500] to 192.168.226.179[500] (108 bytes)
2018-11-01 08:46:51 09[ENC] <DC-1|1874> parsed INFORMATIONAL_V1 request 2725459660 [ HASH N(DPD) ]
2018-11-01 08:46:56 05[NET] <DC-1|1874> received packet: from 192.168.226.1[500] to 192.168.226.179[500] (92 bytes)
2018-11-01 08:46:56 05[ENC] <DC-1|1874> parsed INFORMATIONAL_V1 request 325916731 [ HASH D ]
2018-11-01 08:46:56 05[IKE] <DC-1|1874> received DELETE for ESP CHILD_SA with SPI 9c56e1ef
2018-11-01 08:46:56 05[IKE] <DC-1|1874> closing CHILD_SA DC-1{2710} with SPIs c7f0ab19_i (0 bytes) 9c56e1ef_o (156 bytes) and TS 10.13.198.0/24 === 10.0.0.0/8
2018-11-01 08:46:56 05[APP] <DC-1|1874> [SSO] (sso_invoke_once) SSO is disabled.
2018-11-01 08:46:56 05[APP] <DC-1|1874> [COP-UPDOWN] (ref_counting) ref_count: 1 to 0 -- down -- (10.13.198.0/24#10.0.0.0/8)
2018-11-01 08:46:56 05[APP] <DC-1|1874> [COP-UPDOWN] (cop_updown_invoke_once) UID: 1874 Net: Local 192.168.226.179 Remote 192.168.226.1 Connection: DC Fullname: DC-1
2018-11-01 08:46:56 05[APP] <DC-1|1874> [COP-UPDOWN] (cop_updown_invoke_once) Tunnel: User '' Peer-IP '' my-IP '' down-client
2018-11-01 08:46:56 23[APP] [COP-UPDOWN][DB] (db_conn_info) hostname: 'DC' result --> id: '1', mode: 'ntn', tunnel_type: '0', subnet_family:'0'
2018-11-01 08:46:56 23[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) ---- exec updown -- down --
2018-11-01 08:46:56 23[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) [NTN] NTN get actual...
2018-11-01 08:46:56 14[NET] <1875> received packet: from 192.168.226.1[500] to 192.168.226.179[500] (264 bytes)
2018-11-01 08:46:56 14[ENC] <1875> parsed ID_PROT request 0 [ SA V V V V V V V V V ]
2018-11-01 08:46:56 14[IKE] <1875> received NAT-T (RFC 3947) vendor ID
2018-11-01 08:46:56 14[IKE] <1875> received draft-ietf-ipsec-nat-t-ike-03 vendor ID
2018-11-01 08:46:56 14[IKE] <1875> received draft-ietf-ipsec-nat-t-ike-02 vendor ID
2018-11-01 08:46:56 14[IKE] <1875> received draft-ietf-ipsec-nat-t-ike-02\n vendor ID
2018-11-01 08:46:56 14[ENC] <1875> received unknown vendor ID: 16:f6:ca:16:e4:a4:06:6d:83:82:1a:0f:0a:ea:a8:62
2018-11-01 08:46:56 14[IKE] <1875> received draft-ietf-ipsec-nat-t-ike-00 vendor ID
2018-11-01 08:46:56 14[IKE] <1875> received DPD vendor ID
2018-11-01 08:46:56 14[IKE] <1875> received FRAGMENTATION vendor ID
2018-11-01 08:46:56 14[ENC] <1875> received unknown vendor ID: 82:99:03:17:57:a3:60:82:c6:a6:21:de:00:05:01:24
2018-11-01 08:46:56 14[IKE] <1875> 192.168.226.1 is initiating a Main Mode IKE_SA
2018-11-01 08:46:56 14[ENC] <1875> generating ID_PROT response 0 [ SA V V V V V ]
2018-11-01 08:46:56 14[NET] <1875> sending packet: from 192.168.226.179[500] to 192.168.226.1[500] (180 bytes)
2018-11-01 08:46:56 23[APP] [COP-UPDOWN][DB] (db_query) No data retrieved from query: 'SELECT ( nath.netid || '/' || nath.netmask ) AS natedlan FROM tblvpnconnhostrel AS rel JOIN tblhost AS h ON h.hostid = rel.hostid JOIN tblhost AS nath ON rel .natedhost = nath.hostid WHERE rel.connectionid = $1 AND rel.hostlocation = 'L' AND h.netid = $2 AND h.netmask = $3 LIMIT 1;' status: 2 rows: 0
2018-11-01 08:46:56 23[APP]
2018-11-01 08:46:56 23[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) [IPSEC0] using ipsec dummy interface 'ipsec0'
2018-11-01 08:46:56 23[APP] [COP-UPDOWN][NET] (get_src_ip) source address for 10.13.198.0 is IP: 10.13.198.1
2018-11-01 08:46:56 23[APP]
2018-11-01 08:46:56 24[NET] <DC-1|1874> received packet: from 192.168.226.1[500] to 192.168.226.179[500] (108 bytes)
4
Thanks and Regards,
Govinda Chaulagain
F1soft International
System and Support Department
our IPSec VPN is from sophos (192.168.226.179) to fortigate ( 192.168.226.1) and we have use IPSec IKEv1.
if you are looking for a log of our vpn during automatic down when we are visible of down at morning are at attachment file
1. ipsec_DC.log
2018-10-30 09:36:11 - swanctl --initiate --timeout 15 --child DC-1
initiate failed: CHILD_SA 'DC-1' not established after 15000ms
[ENC] generating QUICK_MODE request 2229622054 [ HASH SA No KE ID ID ]
[NET] sending packet: from 192.168.226.179[500] to 192.168.226.1[500] (396 bytes)
[IKE] sending retransmit 1 of request message ID 2229622054, seq 4836
[NET] sending packet: from 192.168.226.179[500] to 192.168.226.1[500] (396 bytes)
[NET] received packet: from 192.168.226.1[500] to 192.168.226.179[500] (108 bytes)
[ENC] parsed INFORMATIONAL_V1 request 3618567876 [ HASH N(DPD) ]
[NET] received packet: from 192.168.226.1[500] to 192.168.226.179[500] (108 bytes)
[ENC] parsed INFORMATIONAL_V1 request 3240572035 [ HASH N(DPD) ]
[IKE] sending retransmit 2 of request message ID 2229622054, seq 4836
[NET] sending packet: from 192.168.226.179[500] to 192.168.226.1[500] (396 bytes)
[NET] received packet: from 192.168.226.1[500] to 192.168.226.179[500] (108 bytes)
[ENC] parsed INFORMATIONAL_V1 request 1716790976 [ HASH N(DPD) ]
kill -9 32371 > /dev/null 2>&1
2018-10-30 09:36:26 - initiate timeout for DC-1
2018-10-30 09:36:26 - Operation fails status: 255
2018-10-30 09:37:43 - swanctl --initiate --timeout 15 --child DC-1
initiate failed: establishing CHILD_SA 'DC-1' failed
[NET] received packet: from 192.168.226.1[500] to 192.168.226.179[500] (380 bytes)
[ENC] invalid HASH_V1 payload length, decryption failed?
[ENC] could not decrypt payloads
[IKE] message parsing failed
[ENC] generating INFORMATIONAL_V1 request 74883465 [ HASH N(PLD_MAL) ]
[NET] sending packet: from 192.168.226.179[500] to 192.168.226.1[500] (92 bytes)
[IKE] QUICK_MODE request with message ID 1310762094 processing failed
[DMN] [GARNER-LOGGING] (child_alert) ALERT: parsing IKE message from 192.168.226.1[500] failed
[NET] received packet: from 192.168.226.1[500] to 192.168.226.179[500] (108 bytes)
[ENC] parsed INFORMATIONAL_V1 request 463114116 [ HASH N(DPD) ]
[NET] received packet: from 192.168.226.1[500] to 192.168.226.179[500] (108 bytes)
[ENC] parsed INFORMATIONAL_V1 request 1507186884 [ HASH D ]
[IKE] received DELETE for IKE_SA DC-1[682]
[IKE] deleting IKE_SA DC-1[682] between 192.168.226.179[192.168.226.179]...192.168.226.1[192.168.226.1]
kill -9 440 > /dev/null 2>&1
2018-10-30 09:37:51 - Operation fails status: 1
2018-10-31 15:43:45 - swanctl --initiate --timeout 15 --child DC-1
initiate failed: CHILD_SA 'DC-1' not established after 15000ms
[ENC] generating QUICK_MODE request 2431110743 [ HASH SA No KE ID ID ]
[NET] sending packet: from 192.168.226.179[500] to 192.168.226.1[500] (396 bytes)
[NET] received packet: from 192.168.226.1[500] to 192.168.226.179[500] (108 bytes)
[ENC] parsed INFORMATIONAL_V1 request 897358792 [ HASH N(DPD) ]
[IKE] sending retransmit 1 of request message ID 2431110743, seq 677
[NET] sending packet: from 192.168.226.179[500] to 192.168.226.1[500] (396 bytes)
[NET] received packet: from 192.168.226.1[500] to 192.168.226.179[500] (108 bytes)
[ENC] parsed INFORMATIONAL_V1 request 76166858 [ HASH N(DPD) ]
[IKE] sending retransmit 2 of request message ID 2431110743, seq 677
[NET] sending packet: from 192.168.226.179[500] to 192.168.226.1[500] (396 bytes)
[NET] received packet: from 192.168.226.1[500] to 192.168.226.179[500] (108 bytes)
[ENC] parsed INFORMATIONAL_V1 request 213784476 [ HASH N(DPD) ]
kill -9 26153 > /dev/null 2>&1
2018-10-31 15:44:01 - initiate timeout for DC-1
2018-10-31 15:44:01 - Operation fails status: 255
2.strongswan.log
[ HASH N(DPD_ACK)
2018-10-31 21:34:59 21[NET] <DC-1|1711> received packet: from 192.168.226.1[500] to 192.168.226.179[500] (108 bytes)
2018-10-31 21:34:59 21[ENC] <DC-1|1711> parsed INFORMATIONAL_V1 request 2403996211 [ HASH N(DPD) ]
2018-10-31 21:34:59 21[ENC] <DC-1|1711> generating INFORMATIONAL_V1 request 508698803 [ HASH N(DPD_ACK) ]
2018-10-31 21:34:59 21[NET] <DC-1|1711> sending packet: from 192.168.226.179[500] to 192.168.226.1[500] (108 bytes)
2018-10-31 21:35:04 32[NET] <DC-1|1711> received packet: from 192.168.226.1[500] to 192.168.226.179[500] (108 bytes)
2018-10-31 21:35:04 32[ENC] <DC-1|1711> parsed INFORMATIONAL_V1 request 849834768 [ HASH N(DPD) ]
2018-10-31 21:35:04 32[ENC] <DC-1|1711> generating INFORMATIONAL_V1 request 271583907 [ HASH N(DPD_ACK) ]
2018-10-31 21:35:04 32[NET] <DC-1|1711> sending packet: from 192.168.226.179[500] to 192.168.226.1[500] (108 bytes)
2018-10-31 21:35:09 07[NET] <DC-1|1711> received packet: from 192.168.226.1[500] to 192.168.226.179[500] (108 bytes)
2018-10-31 21:35:09 07[ENC] <DC-1|1711> parsed INFORMATIONAL_V1 request 2854016584 [ HASH N(DPD) ]
2018-10-31 21:35:09 07[ENC] <DC-1|1711> generating INFORMATIONAL_V1 request 517107434 [ HASH N(DPD_ACK) ]
2018-10-31 21:35:09 07[NET] <DC-1|1711> sending packet: from 192.168.226.179[500] to 192.168.226.1[500] (108 bytes)
2018-10-31 21:35:14 15[NET] <DC-1|1711> received packet: from 192.168.226.1[500] to 192.168.226.179[500] (108 bytes)
2018-10-31 21:35:14 15[ENC] <DC-1|1711> parsed INFORMATIONAL_V1 request 4088390690 [ HASH N(DPD) ]
2018-10-31 21:35:14 15[ENC] <DC-1|1711> generating INFORMATIONAL_V1 request 905385072 [ HASH N(DPD_ACK) ]
2018-10-31 21:35:14 15[NET] <DC-1|1711> sending packet: from 192.168.226.179[500] to 192.168.226.1[500] (108 bytes)
2018-10-31 21:35:19 30[NET] <DC-1|1711> received packet: from 192.168.226.1[500] to 192.168.226.179[500] (108 bytes)
2018-10-31 21:35:19 30[ENC] <DC-1|1711> parsed INFORMATIONAL_V1 request 142270608 [ HASH N(DPD) ]
2018-10-31 21:35:19 30[ENC] <DC-1|1711> generating INFORMATIONAL_V1 request 1195665011 [ HASH N(DPD_ACK) ]
2018-10-31 21:35:19 30[NET] <DC-1|1711> sending packet: from 192.168.226.179[500] to 192.168.226.1[500] (108 bytes)
2018-10-31 21:35:24 09[NET] <DC-1|1711> received packet: from 192.168.226.1[500] to 192.168.226.179[500] (108 bytes)
2018-10-31 21:35:24 09[ENC] <DC-1|1711> parsed INFORMATIONAL_V1 request 2547865032 [ HASH N(DPD) ]
2018-10-31 21:35:24 09[ENC] <DC-1|1711> generating INFORMATIONAL_V1 request 4134348461 [ HASH N(DPD_ACK) ]
2018-10-31 21:35:24 09[NET] <DC-1|1711> sending packet: from 192.168.226.179[500] to 192.168.226.1[500] (108 bytes)
2018-10-31 21:35:29 28[NET] <DC-1|1711> received packet: from 192.168.226.1[500] to 192.168.226.179[500] (108 bytes)
2018-10-31 21:35:29 28[ENC] <DC-1|1711> parsed INFORMATIONAL_V1 request 3752445444 [ HASH N(DPD) ]
2018-10-31 21:35:29 28[ENC] <DC-1|1711> generating INFORMATIONAL_V1 request 1877984572 [ HASH N(DPD_ACK) ]
2018-10-31 21:35:29 28[NET] <DC-1|1711> sending packet: from 192.168.226.179[500] to 192.168.226.1[500] (108 bytes)
2018-10-31 21:35:34 05[NET] <DC-1|1711> received packet: from 192.168.226.1[500] to 192.168.226.179[500] (108 bytes)
2018-10-31 21:35:34 05[ENC] <DC-1|1711> parsed INFORMATIONAL_V1 request 322305427 [ HASH N(DPD) ]
2018-10-31 21:35:34 05[ENC] <DC-1|1711> generating INFORMATIONAL_V1 request 2307441699 [ HASH N(DPD_ACK) ]
2018-10-31 21:35:34 05[NET] <DC-1|1711> sending packet: from 192.168.226.179[500] to 192.168.226.1[500] (108 bytes)
2018-10-31 21:35:39 12[NET] <DC-1|1711> received packet: from 192.168.226.1[500] to 192.168.226.179[500] (108 bytes)
2018-10-31 21:35:39 12[ENC] <DC-1|1711> parsed INFORMATIONAL_V1 request 316949986 [ HASH N(DPD) ]
2018-10-31 21:35:39 12[ENC] <DC-1|1711> generating INFORMATIONAL_V1 request 454267559 [ HASH N(DPD_ACK) ]
2018-10-31 21:35:39 12[NET] <DC-1|1711> sending packet: from 192.168.226.179[500] to 192.168.226.1[500] (108 bytes)
2018-10-31 21:35:44 31[NET] <DC-1|1711> received packet: from 192.168.226.1[500] to 192.168.226.179[500] (108 bytes)
2018-10-31 21:35:44 31[ENC] <DC-1|1711> parsed INFORMATIONAL_V1 request 1946438803 [ HASH N(DPD) ]
2018-10-31 21:35:44 31[ENC] <DC-1|1711> generating INFORMATIONAL_V1 request 3633252743 [ HASH N(DPD_ACK) ]
2018-10-31 21:35:44 31[NET] <DC-1|1711> sending packet: from 192.168.226.179[500] to 192.168.226.1[500] (108 bytes)
2018-10-31 21:35:49 23[NET] <DC-1|1711> received packet: from 192.168.226.1[500] to 192.168.226.179[500] (108 bytes)
"strongswan.log" 46400L, 5109327C 1,1 Top
2018-11-01 08:46:41 05[ENC] <DC-1|1874> parsed INFORMATIONAL_V1 request 2622333087 [ HASH N(DPD) ]
2018-11-01 08:46:46 21[NET] <DC-1|1874> received packet: from 192.168.226.1[500] to 192.168.226.179[500] (108 bytes)
2018-11-01 08:46:46 21[ENC] <DC-1|1874> parsed INFORMATIONAL_V1 request 3369364072 [ HASH N(DPD) ]
2018-11-01 08:46:51 09[NET] <DC-1|1874> received packet: from 192.168.226.1[500] to 192.168.226.179[500] (108 bytes)
2018-11-01 08:46:51 09[ENC] <DC-1|1874> parsed INFORMATIONAL_V1 request 2725459660 [ HASH N(DPD) ]
2018-11-01 08:46:56 05[NET] <DC-1|1874> received packet: from 192.168.226.1[500] to 192.168.226.179[500] (92 bytes)
2018-11-01 08:46:56 05[ENC] <DC-1|1874> parsed INFORMATIONAL_V1 request 325916731 [ HASH D ]
2018-11-01 08:46:56 05[IKE] <DC-1|1874> received DELETE for ESP CHILD_SA with SPI 9c56e1ef
2018-11-01 08:46:56 05[IKE] <DC-1|1874> closing CHILD_SA DC-1{2710} with SPIs c7f0ab19_i (0 bytes) 9c56e1ef_o (156 bytes) and TS 10.13.198.0/24 === 10.0.0.0/8
2018-11-01 08:46:56 05[APP] <DC-1|1874> [SSO] (sso_invoke_once) SSO is disabled.
2018-11-01 08:46:56 05[APP] <DC-1|1874> [COP-UPDOWN] (ref_counting) ref_count: 1 to 0 -- down -- (10.13.198.0/24#10.0.0.0/8)
2018-11-01 08:46:56 05[APP] <DC-1|1874> [COP-UPDOWN] (cop_updown_invoke_once) UID: 1874 Net: Local 192.168.226.179 Remote 192.168.226.1 Connection: DC Fullname: DC-1
2018-11-01 08:46:56 05[APP] <DC-1|1874> [COP-UPDOWN] (cop_updown_invoke_once) Tunnel: User '' Peer-IP '' my-IP '' down-client
2018-11-01 08:46:56 23[APP] [COP-UPDOWN][DB] (db_conn_info) hostname: 'DC' result --> id: '1', mode: 'ntn', tunnel_type: '0', subnet_family:'0'
2018-11-01 08:46:56 23[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) ---- exec updown -- down --
2018-11-01 08:46:56 23[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) [NTN] NTN get actual...
2018-11-01 08:46:56 14[NET] <1875> received packet: from 192.168.226.1[500] to 192.168.226.179[500] (264 bytes)
2018-11-01 08:46:56 14[ENC] <1875> parsed ID_PROT request 0 [ SA V V V V V V V V V ]
2018-11-01 08:46:56 14[IKE] <1875> received NAT-T (RFC 3947) vendor ID
2018-11-01 08:46:56 14[IKE] <1875> received draft-ietf-ipsec-nat-t-ike-03 vendor ID
2018-11-01 08:46:56 14[IKE] <1875> received draft-ietf-ipsec-nat-t-ike-02 vendor ID
2018-11-01 08:46:56 14[IKE] <1875> received draft-ietf-ipsec-nat-t-ike-02\n vendor ID
2018-11-01 08:46:56 14[ENC] <1875> received unknown vendor ID: 16:f6:ca:16:e4:a4:06:6d:83:82:1a:0f:0a:ea:a8:62
2018-11-01 08:46:56 14[IKE] <1875> received draft-ietf-ipsec-nat-t-ike-00 vendor ID
2018-11-01 08:46:56 14[IKE] <1875> received DPD vendor ID
2018-11-01 08:46:56 14[IKE] <1875> received FRAGMENTATION vendor ID
2018-11-01 08:46:56 14[ENC] <1875> received unknown vendor ID: 82:99:03:17:57:a3:60:82:c6:a6:21:de:00:05:01:24
2018-11-01 08:46:56 14[IKE] <1875> 192.168.226.1 is initiating a Main Mode IKE_SA
2018-11-01 08:46:56 14[ENC] <1875> generating ID_PROT response 0 [ SA V V V V V ]
2018-11-01 08:46:56 14[NET] <1875> sending packet: from 192.168.226.179[500] to 192.168.226.1[500] (180 bytes)
2018-11-01 08:46:56 23[APP] [COP-UPDOWN][DB] (db_query) No data retrieved from query: 'SELECT ( nath.netid || '/' || nath.netmask ) AS natedlan FROM tblvpnconnhostrel AS rel JOIN tblhost AS h ON h.hostid = rel.hostid JOIN tblhost AS nath ON rel .natedhost = nath.hostid WHERE rel.connectionid = $1 AND rel.hostlocation = 'L' AND h.netid = $2 AND h.netmask = $3 LIMIT 1;' status: 2 rows: 0
2018-11-01 08:46:56 23[APP]
2018-11-01 08:46:56 23[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) [IPSEC0] using ipsec dummy interface 'ipsec0'
2018-11-01 08:46:56 23[APP] [COP-UPDOWN][NET] (get_src_ip) source address for 10.13.198.0 is IP: 10.13.198.1
2018-11-01 08:46:56 23[APP]
2018-11-01 08:46:56 24[NET] <DC-1|1874> received packet: from 192.168.226.1[500] to 192.168.226.179[500] (108 bytes)
4
Thanks and Regards,
Govinda Chaulagain
F1soft International
System and Support Department