Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Mobile ipsec VPN traffic stops after 15 min 2.4.1

    Scheduled Pinned Locked Moved IPsec
    1 Posts 1 Posters 295 Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • K
      kapara
      last edited by

      Having an issue with Mobile ipsec vpn IKEv2 with Windows 10 PC's.  VPN connects but after about 15 min connection stays up but no traffic able to pass and I have to disconnect and reconnect VPN client to get data to pass again.  I have checked the config against another unit which is working fine running 2.3.2.  Problem unit is running 2.4.1

      Just upgraded to 2.4.2 hoping it will resolve the issue.

      Dec 5 10:44:58	charon		08[IKE] <41236> no shared key found for 50.196.xxx.xxx - 204.8.xxx.xxx
      Dec 5 10:44:58	charon		08[IKE] <41236> queueing INFORMATIONAL task
      Dec 5 10:44:58	charon		08[IKE] <41236> activating new tasks
      Dec 5 10:44:58	charon		08[IKE] <41236> activating INFORMATIONAL task
      Dec 5 10:44:58	charon		08[ENC] <41236> generating INFORMATIONAL_V1 request 801045126 [ N(INVAL_KE) ]
      Dec 5 10:44:58	charon		08[NET] <41236> sending packet: from 50.196.xxx.xxx[500] to 204.8.xxx.xxx[500] (56 bytes)
      Dec 5 10:44:58	charon		08[IKE] <41236> IKE_SA (unnamed)[41236] state change: CONNECTING => DESTROYING
      Dec 5 10:45:57	charon		11[NET] <41237> received packet: from 204.8.xxx.xxx[500] to 50.196.xxx.xxx[500] (128 bytes)
      Dec 5 10:45:57	charon		11[ENC] <41237> parsed ID_PROT request 0 [ SA V ]
      Dec 5 10:45:57	charon		11[CFG] <41237> looking for an ike config for 50.196.xxx.xxx...204.8.xxx.xxx
      Dec 5 10:45:57	charon		11[CFG] <41237> candidate: %any...%any, prio 24
      Dec 5 10:45:57	charon		11[CFG] <41237> found matching ike config: %any...%any with prio 24
      Dec 5 10:45:57	charon		11[ENC] <41237> received unknown vendor ID: f4:ed:19:e0:c1:14:eb:51:6f:aa:ac:0e:e3:7d:af:28:07:b4:38:1f:00:00:00:01:00:00:13:8d:5a:26:e9:65:00:00:00:00:18:20:00:00
      Dec 5 10:45:57	charon		11[IKE] <41237> 204.8.xxx.xxx is initiating a Main Mode IKE_SA
      Dec 5 10:45:57	charon		11[IKE] <41237> IKE_SA (unnamed)[41237] state change: CREATED => CONNECTING
      Dec 5 10:45:57	charon		11[CFG] <41237> selecting proposal:
      Dec 5 10:45:57	charon		11[CFG] <41237> no acceptable ENCRYPTION_ALGORITHM found
      Dec 5 10:45:57	charon		11[CFG] <41237> selecting proposal:
      Dec 5 10:45:57	charon		11[CFG] <41237> proposal matches
      Dec 5 10:45:57	charon		11[CFG] <41237> received proposals: IKE:3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024
      Dec 5 10:45:57	charon		11[CFG] <41237> configured proposals: IKE:AES_CBC_128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/CURVE_25519, IKE:AES_CBC_128/AES_CBC_192/AES_CBC_256/CAMELLIA_CBC_128/CAMELLIA_CBC_192/CAMELLIA_CBC_256/3DES_CBC/HMAC_SHA2_256_128/HMAC_SHA2_384_192/HMAC_SHA2_512_256/HMAC_MD5_96/HMAC_SHA1_96/AES_XCBC_96/AES_CMAC_96/PRF_HMAC_SHA2_256/PRF_HMAC_SHA2_384/PRF_HMAC_SHA2_512/PRF_AES128_XCBC/PRF_AES128_CMAC/PRF_HMAC_MD5/PRF_HMAC_SHA1/ECP_256/ECP_384/ECP_521/ECP_256_BP/ECP_384_BP/ECP_512_BP/CURVE_25519/MODP_3072/MODP_4096/MODP_8192/MODP_2048/MODP_1024, IKE:AES_GCM_16_128/AES_GCM_16_192/AES_GCM_16_256/AES_GCM_12_128/AES_GCM_12_192/AES_GCM_12_256/AES_GCM_8_128/AES_GCM_8_192/AES_GCM_8_256/PRF_HMAC_SHA2_256/PRF_HMAC_SHA2_384/PRF_HMAC_SHA2_512/PRF_AES128_XCBC/PRF_AES128_CMAC/PRF_HMAC_MD5/PRF_HMAC_SHA1/ECP_256/ECP_384/ECP_521/ECP_256_BP/ECP_384_BP/ECP_512_BP/CURVE_25519/MODP_3072/MODP_4096/MODP_8192/MODP_2048/MODP_1024
      Dec 5 10:45:57	charon		11[CFG] <41237> selected proposal: IKE:3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024
      Dec 5 10:45:57	charon		11[IKE] <41237> sending XAuth vendor ID
      Dec 5 10:45:57	charon		11[IKE] <41237> sending DPD vendor ID
      Dec 5 10:45:57	charon		11[ENC] <41237> generating ID_PROT response 0 [ SA V V ]
      Dec 5 10:45:57	charon		11[NET] <41237> sending packet: from 50.196.xxx.xxx[500] to 204.8.xxx.xxx[500] (116 bytes)
      Dec 5 10:45:58	charon		01[NET] <41237> received packet: from 204.8.xxx.xxx[500] to 50.196.xxx.xxx[500] (184 bytes)
      Dec 5 10:45:58	charon		01[ENC] <41237> parsed ID_PROT request 0 [ KE No ]
      Dec 5 10:45:58	charon		01[CFG] <41237> candidate "bypasslan", match: 1/1/24 (me/other/ike)
      Dec 5 10:45:58	charon		01[IKE] <41237> no shared key found for 50.196.xxx.xxx - 204.8.xxx.xxx
      Dec 5 10:45:58	charon		01[IKE] <41237> queueing INFORMATIONAL task
      Dec 5 10:45:58	charon		01[IKE] <41237> activating new tasks
      Dec 5 10:45:58	charon		01[IKE] <41237> activating INFORMATIONAL task
      Dec 5 10:45:58	charon		01[ENC] <41237> generating INFORMATIONAL_V1 request 1419433026 [ N(INVAL_KE) ]
      Dec 5 10:45:58	charon		01[NET] <41237> sending packet: from 50.196.xxx.xxx[500] to 204.8.xxx.xxx[500] (56 bytes)
      Dec 5 10:45:58	charon		01[IKE] <41237> IKE_SA (unnamed)[41237] state change: CONNECTING => DESTROYING
      Dec 5 10:46:57	charon		01[NET] <41238> received packet: from 204.8.xxx.xxx[500] to 50.196.xxx.xxx[500] (128 bytes)
      Dec 5 10:46:57	charon		01[ENC] <41238> parsed ID_PROT request 0 [ SA V ]
      Dec 5 10:46:57	charon		01[CFG] <41238> looking for an ike config for 50.196.xxx.xxx...204.8.xxx.xxx
      Dec 5 10:46:57	charon		01[CFG] <41238> candidate: %any...%any, prio 24
      Dec 5 10:46:57	charon		01[CFG] <41238> found matching ike config: %any...%any with prio 24
      Dec 5 10:46:57	charon		01[ENC] <41238> received unknown vendor ID: f4:ed:19:e0:c1:14:eb:51:6f:aa:ac:0e:e3:7d:af:28:07:b4:38:1f:00:00:00:01:00:00:13:8d:5a:26:e9:a1:00:00:00:00:18:20:00:00
      Dec 5 10:46:57	charon		01[IKE] <41238> 204.8.xxx.xxx is initiating a Main Mode IKE_SA
      Dec 5 10:46:57	charon		01[IKE] <41238> IKE_SA (unnamed)[41238] state change: CREATED => CONNECTING
      Dec 5 10:46:57	charon		01[CFG] <41238> selecting proposal:
      Dec 5 10:46:57	charon		01[CFG] <41238> no acceptable ENCRYPTION_ALGORITHM found
      Dec 5 10:46:57	charon		01[CFG] <41238> selecting proposal:
      Dec 5 10:46:57	charon		01[CFG] <41238> proposal matches
      Dec 5 10:46:57	charon		01[CFG] <41238> received proposals: IKE:3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024
      Dec 5 10:46:57	charon		01[CFG] <41238> configured proposals: IKE:AES_CBC_128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/CURVE_25519, IKE:AES_CBC_128/AES_CBC_192/AES_CBC_256/CAMELLIA_CBC_128/CAMELLIA_CBC_192/CAMELLIA_CBC_256/3DES_CBC/HMAC_SHA2_256_128/HMAC_SHA2_384_192/HMAC_SHA2_512_256/HMAC_MD5_96/HMAC_SHA1_96/AES_XCBC_96/AES_CMAC_96/PRF_HMAC_SHA2_256/PRF_HMAC_SHA2_384/PRF_HMAC_SHA2_512/PRF_AES128_XCBC/PRF_AES128_CMAC/PRF_HMAC_MD5/PRF_HMAC_SHA1/ECP_256/ECP_384/ECP_521/ECP_256_BP/ECP_384_BP/ECP_512_BP/CURVE_25519/MODP_3072/MODP_4096/MODP_8192/MODP_2048/MODP_1024, IKE:AES_GCM_16_128/AES_GCM_16_192/AES_GCM_16_256/AES_GCM_12_128/AES_GCM_12_192/AES_GCM_12_256/AES_GCM_8_128/AES_GCM_8_192/AES_GCM_8_256/PRF_HMAC_SHA2_256/PRF_HMAC_SHA2_384/PRF_HMAC_SHA2_512/PRF_AES128_XCBC/PRF_AES128_CMAC/PRF_HMAC_MD5/PRF_HMAC_SHA1/ECP_256/ECP_384/ECP_521/ECP_256_BP/ECP_384_BP/ECP_512_BP/CURVE_25519/MODP_3072/MODP_4096/MODP_8192/MODP_2048/MODP_1024
      Dec 5 10:46:57	charon		01[CFG] <41238> selected proposal: IKE:3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024
      Dec 5 10:46:57	charon		01[IKE] <41238> sending XAuth vendor ID
      Dec 5 10:46:57	charon		01[IKE] <41238> sending DPD vendor ID
      Dec 5 10:46:57	charon		01[ENC] <41238> generating ID_PROT response 0 [ SA V V ]
      Dec 5 10:46:57	charon		01[NET] <41238> sending packet: from 50.196.xxx.xxx[500] to 204.8.xxx.xxx[500] (116 bytes)
      Dec 5 10:46:58	charon		01[NET] <41238> received packet: from 204.8.xxx.xxx[500] to 50.196.xxx.xxx[500] (184 bytes)
      Dec 5 10:46:58	charon		01[ENC] <41238> parsed ID_PROT request 0 [ KE No ]
      Dec 5 10:46:58	charon		01[CFG] <41238> candidate "bypasslan", match: 1/1/24 (me/other/ike)
      Dec 5 10:46:58	charon		01[IKE] <41238> no shared key found for 50.196.xxx.xxx - 204.8.xxx.xxx
      Dec 5 10:46:58	charon		01[IKE] <41238> queueing INFORMATIONAL task
      Dec 5 10:46:58	charon		01[IKE] <41238> activating new tasks
      Dec 5 10:46:58	charon		01[IKE] <41238> activating INFORMATIONAL task
      Dec 5 10:46:58	charon		01[ENC] <41238> generating INFORMATIONAL_V1 request 35916766 [ N(INVAL_KE) ]
      Dec 5 10:46:58	charon		01[NET] <41238> sending packet: from 50.196.xxx.xxx[500] to 204.8.xxx.xxx[500] (56 bytes)
      Dec 5 10:46:58	charon		01[IKE] <41238> IKE_SA (unnamed)[41238] state change: CONNECTING => DESTROYING
      Dec 5 10:47:57	charon		07[NET] <41239> received packet: from 204.8.xxx.xxx[500] to 50.196.xxx.xxx[500] (128 bytes)
      Dec 5 10:47:57	charon		07[ENC] <41239> parsed ID_PROT request 0 [ SA V ]
      Dec 5 10:47:57	charon		07[CFG] <41239> looking for an ike config for 50.196.xxx.xxx...204.8.xxx.xxx
      Dec 5 10:47:57	charon		07[CFG] <41239> candidate: %any...%any, prio 24
      Dec 5 10:47:57	charon		07[CFG] <41239> found matching ike config: %any...%any with prio 24
      Dec 5 10:47:57	charon		07[ENC] <41239> received unknown vendor ID: f4:ed:19:e0:c1:14:eb:51:6f:aa:ac:0e:e3:7d:af:28:07:b4:38:1f:00:00:00:01:00:00:13:8d:5a:26:e9:dd:00:00:00:00:18:20:00:00
      Dec 5 10:47:57	charon		07[IKE] <41239> 204.8.xxx.xxx is initiating a Main Mode IKE_SA
      Dec 5 10:47:57	charon		07[IKE] <41239> IKE_SA (unnamed)[41239] state change: CREATED => CONNECTING
      Dec 5 10:47:57	charon		07[CFG] <41239> selecting proposal:
      Dec 5 10:47:57	charon		07[CFG] <41239> no acceptable ENCRYPTION_ALGORITHM found
      Dec 5 10:47:57	charon		07[CFG] <41239> selecting proposal:
      Dec 5 10:47:57	charon		07[CFG] <41239> proposal matches
      Dec 5 10:47:57	charon		07[CFG] <41239> received proposals: IKE:3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024
      Dec 5 10:47:57	charon		07[CFG] <41239> configured proposals: IKE:AES_CBC_128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/CURVE_25519, IKE:AES_CBC_128/AES_CBC_192/AES_CBC_256/CAMELLIA_CBC_128/CAMELLIA_CBC_192/CAMELLIA_CBC_256/3DES_CBC/HMAC_SHA2_256_128/HMAC_SHA2_384_192/HMAC_SHA2_512_256/HMAC_MD5_96/HMAC_SHA1_96/AES_XCBC_96/AES_CMAC_96/PRF_HMAC_SHA2_256/PRF_HMAC_SHA2_384/PRF_HMAC_SHA2_512/PRF_AES128_XCBC/PRF_AES128_CMAC/PRF_HMAC_MD5/PRF_HMAC_SHA1/ECP_256/ECP_384/ECP_521/ECP_256_BP/ECP_384_BP/ECP_512_BP/CURVE_25519/MODP_3072/MODP_4096/MODP_8192/MODP_2048/MODP_1024, IKE:AES_GCM_16_128/AES_GCM_16_192/AES_GCM_16_256/AES_GCM_12_128/AES_GCM_12_192/AES_GCM_12_256/AES_GCM_8_128/AES_GCM_8_192/AES_GCM_8_256/PRF_HMAC_SHA2_256/PRF_HMAC_SHA2_384/PRF_HMAC_SHA2_512/PRF_AES128_XCBC/PRF_AES128_CMAC/PRF_HMAC_MD5/PRF_HMAC_SHA1/ECP_256/ECP_384/ECP_521/ECP_256_BP/ECP_384_BP/ECP_512_BP/CURVE_25519/MODP_3072/MODP_4096/MODP_8192/MODP_2048/MODP_1024
      Dec 5 10:47:57	charon		07[CFG] <41239> selected proposal: IKE:3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024
      Dec 5 10:47:57	charon		07[IKE] <41239> sending XAuth vendor ID
      Dec 5 10:47:57	charon		07[IKE] <41239> sending DPD vendor ID
      Dec 5 10:47:57	charon		07[ENC] <41239> generating ID_PROT response 0 [ SA V V ]
      Dec 5 10:47:57	charon		07[NET] <41239> sending packet: from 50.196.xxx.xxx[500] to 204.8.xxx.xxx[500] (116 bytes)
      Dec 5 10:47:58	charon		14[NET] <41239> received packet: from 204.8.xxx.xxx[500] to 50.196.xxx.xxx[500] (184 bytes)
      Dec 5 10:47:58	charon		14[ENC] <41239> parsed ID_PROT request 0 [ KE No ]
      Dec 5 10:47:58	charon		14[CFG] <41239> candidate "bypasslan", match: 1/1/24 (me/other/ike)
      Dec 5 10:47:58	charon		14[IKE] <41239> no shared key found for 50.196.xxx.xxx - 204.8.xxx.xxx
      Dec 5 10:47:58	charon		14[IKE] <41239> queueing INFORMATIONAL task
      Dec 5 10:47:58	charon		14[IKE] <41239> activating new tasks
      Dec 5 10:47:58	charon		14[IKE] <41239> activating INFORMATIONAL task
      Dec 5 10:47:58	charon		14[ENC] <41239> generating INFORMATIONAL_V1 request 2055981543 [ N(INVAL_KE) ]
      Dec 5 10:47:58	charon		14[NET] <41239> sending packet: from 50.196.xxx.xxx[500] to 204.8.xxx.xxx[500] (56 bytes)
      Dec 5 10:47:58	charon		14[IKE] <41239> IKE_SA (unnamed)[41239] state change: CONNECTING => DESTROYING
      Dec 5 10:48:57	charon		14[NET] <41240> received packet: from 204.8.xxx.xxx[500] to 50.196.xxx.xxx[500] (128 bytes)
      Dec 5 10:48:57	charon		14[ENC] <41240> parsed ID_PROT request 0 [ SA V ]
      Dec 5 10:48:57	charon		14[CFG] <41240> looking for an ike config for 50.196.xxx.xxx...204.8.xxx.xxx
      Dec 5 10:48:57	charon		14[CFG] <41240> candidate: %any...%any, prio 24
      Dec 5 10:48:57	charon		14[CFG] <41240> found matching ike config: %any...%any with prio 24
      Dec 5 10:48:57	charon		14[ENC] <41240> received unknown vendor ID: f4:ed:19:e0:c1:14:eb:51:6f:aa:ac:0e:e3:7d:af:28:07:b4:38:1f:00:00:00:01:00:00:13:8d:5a:26:ea:19:00:00:00:00:18:20:00:00
      Dec 5 10:48:57	charon		14[IKE] <41240> 204.8.xxx.xxx is initiating a Main Mode IKE_SA
      Dec 5 10:48:57	charon		14[IKE] <41240> IKE_SA (unnamed)[41240] state change: CREATED => CONNECTING
      Dec 5 10:48:57	charon		14[CFG] <41240> selecting proposal:
      Dec 5 10:48:57	charon		14[CFG] <41240> no acceptable ENCRYPTION_ALGORITHM found
      Dec 5 10:48:57	charon		14[CFG] <41240> selecting proposal:
      Dec 5 10:48:57	charon		14[CFG] <41240> proposal matches
      Dec 5 10:48:57	charon		14[CFG] <41240> received proposals: IKE:3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024
      Dec 5 10:48:57	charon		14[CFG] <41240> configured proposals: IKE:AES_CBC_128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/CURVE_25519, IKE:AES_CBC_128/AES_CBC_192/AES_CBC_256/CAMELLIA_CBC_128/CAMELLIA_CBC_192/CAMELLIA_CBC_256/3DES_CBC/HMAC_SHA2_256_128/HMAC_SHA2_384_192/HMAC_SHA2_512_256/HMAC_MD5_96/HMAC_SHA1_96/AES_XCBC_96/AES_CMAC_96/PRF_HMAC_SHA2_256/PRF_HMAC_SHA2_384/PRF_HMAC_SHA2_512/PRF_AES128_XCBC/PRF_AES128_CMAC/PRF_HMAC_MD5/PRF_HMAC_SHA1/ECP_256/ECP_384/ECP_521/ECP_256_BP/ECP_384_BP/ECP_512_BP/CURVE_25519/MODP_3072/MODP_4096/MODP_8192/MODP_2048/MODP_1024, IKE:AES_GCM_16_128/AES_GCM_16_192/AES_GCM_16_256/AES_GCM_12_128/AES_GCM_12_192/AES_GCM_12_256/AES_GCM_8_128/AES_GCM_8_192/AES_GCM_8_256/PRF_HMAC_SHA2_256/PRF_HMAC_SHA2_384/PRF_HMAC_SHA2_512/PRF_AES128_XCBC/PRF_AES128_CMAC/PRF_HMAC_MD5/PRF_HMAC_SHA1/ECP_256/ECP_384/ECP_521/ECP_256_BP/ECP_384_BP/ECP_512_BP/CURVE_25519/MODP_3072/MODP_4096/MODP_8192/MODP_2048/MODP_1024
      Dec 5 10:48:57	charon		14[CFG] <41240> selected proposal: IKE:3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024
      Dec 5 10:48:57	charon		14[IKE] <41240> sending XAuth vendor ID
      Dec 5 10:48:57	charon		14[IKE] <41240> sending DPD vendor ID
      Dec 5 10:48:57	charon		14[ENC] <41240> generating ID_PROT response 0 [ SA V V ]
      Dec 5 10:48:57	charon		14[NET] <41240> sending packet: from 50.196.xxx.xxx[500] to 204.8.xxx.xxx[500] (116 bytes)
      Dec 5 10:48:58	charon		15[NET] <41240> received packet: from 204.8.xxx.xxx[500] to 50.196.xxx.xxx[500] (184 bytes)
      Dec 5 10:48:58	charon		15[ENC] <41240> parsed ID_PROT request 0 [ KE No ]
      Dec 5 10:48:58	charon		15[CFG] <41240> candidate "bypasslan", match: 1/1/24 (me/other/ike)
      Dec 5 10:48:58	charon		15[IKE] <41240> no shared key found for 50.196.xxx.xxx - 204.8.xxx.xxx
      Dec 5 10:48:58	charon		15[IKE] <41240> queueing INFORMATIONAL task
      Dec 5 10:48:58	charon		15[IKE] <41240> activating new tasks
      Dec 5 10:48:58	charon		15[IKE] <41240> activating INFORMATIONAL task
      Dec 5 10:48:58	charon		15[ENC] <41240> generating INFORMATIONAL_V1 request 3386256376 [ N(INVAL_KE) ]
      Dec 5 10:48:58	charon		15[NET] <41240> sending packet: from 50.196.xxx.xxx[500] to 204.8.xxx.xxx[500] (56 bytes)
      Dec 5 10:48:58	charon		15[IKE] <41240> IKE_SA (unnamed)[41240] state change: CONNECTING => DESTROYING
      Dec 5 10:49:57	charon		06[NET] <41241> received packet: from 204.8.xxx.xxx[500] to 50.196.xxx.xxx[500] (128 bytes)
      Dec 5 10:49:57	charon		06[ENC] <41241> parsed ID_PROT request 0 [ SA V ]
      Dec 5 10:49:57	charon		06[CFG] <41241> looking for an ike config for 50.196.xxx.xxx...204.8.xxx.xxx
      Dec 5 10:49:57	charon		06[CFG] <41241> candidate: %any...%any, prio 24
      Dec 5 10:49:57	charon		06[CFG] <41241> found matching ike config: %any...%any with prio 24
      Dec 5 10:49:57	charon		06[ENC] <41241> received unknown vendor ID: f4:ed:19:e0:c1:14:eb:51:6f:aa:ac:0e:e3:7d:af:28:07:b4:38:1f:00:00:00:01:00:00:13:8d:5a:26:ea:55:00:00:00:00:18:20:00:00
      Dec 5 10:49:57	charon		06[IKE] <41241> 204.8.xxx.xxx is initiating a Main Mode IKE_SA
      Dec 5 10:49:57	charon		06[IKE] <41241> IKE_SA (unnamed)[41241] state change: CREATED => CONNECTING
      Dec 5 10:49:57	charon		06[CFG] <41241> selecting proposal:
      Dec 5 10:49:57	charon		06[CFG] <41241> no acceptable ENCRYPTION_ALGORITHM found
      Dec 5 10:49:57	charon		06[CFG] <41241> selecting proposal:
      Dec 5 10:49:57	charon		06[CFG] <41241> proposal matches
      Dec 5 10:49:57	charon		06[CFG] <41241> received proposals: IKE:3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024
      Dec 5 10:49:57	charon		06[CFG] <41241> configured proposals: IKE:AES_CBC_128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/CURVE_25519, IKE:AES_CBC_128/AES_CBC_192/AES_CBC_256/CAMELLIA_CBC_128/CAMELLIA_CBC_192/CAMELLIA_CBC_256/3DES_CBC/HMAC_SHA2_256_128/HMAC_SHA2_384_192/HMAC_SHA2_512_256/HMAC_MD5_96/HMAC_SHA1_96/AES_XCBC_96/AES_CMAC_96/PRF_HMAC_SHA2_256/PRF_HMAC_SHA2_384/PRF_HMAC_SHA2_512/PRF_AES128_XCBC/PRF_AES128_CMAC/PRF_HMAC_MD5/PRF_HMAC_SHA1/ECP_256/ECP_384/ECP_521/ECP_256_BP/ECP_384_BP/ECP_512_BP/CURVE_25519/MODP_3072/MODP_4096/MODP_8192/MODP_2048/MODP_1024, IKE:AES_GCM_16_128/AES_GCM_16_192/AES_GCM_16_256/AES_GCM_12_128/AES_GCM_12_192/AES_GCM_12_256/AES_GCM_8_128/AES_GCM_8_192/AES_GCM_8_256/PRF_HMAC_SHA2_256/PRF_HMAC_SHA2_384/PRF_HMAC_SHA2_512/PRF_AES128_XCBC/PRF_AES128_CMAC/PRF_HMAC_MD5/PRF_HMAC_SHA1/ECP_256/ECP_384/ECP_521/ECP_256_BP/ECP_384_BP/ECP_512_BP/CURVE_25519/MODP_3072/MODP_4096/MODP_8192/MODP_2048/MODP_1024
      Dec 5 10:49:57	charon		06[CFG] <41241> selected proposal: IKE:3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024
      Dec 5 10:49:57	charon		06[IKE] <41241> sending XAuth vendor ID
      Dec 5 10:49:57	charon		06[IKE] <41241> sending DPD vendor ID
      Dec 5 10:49:57	charon		06[ENC] <41241> generating ID_PROT response 0 [ SA V V ]
      Dec 5 10:49:57	charon		06[NET] <41241> sending packet: from 50.196.xxx.xxx[500] to 204.8.xxx.xxx[500] (116 bytes)
      Dec 5 10:49:58	charon		06[NET] <41241> received packet: from 204.8.xxx.xxx[500] to 50.196.xxx.xxx[500] (184 bytes)
      Dec 5 10:49:58	charon		06[ENC] <41241> parsed ID_PROT request 0 [ KE No ]
      Dec 5 10:49:58	charon		06[CFG] <41241> candidate "bypasslan", match: 1/1/24 (me/other/ike)
      Dec 5 10:49:58	charon		06[IKE] <41241> no shared key found for 50.196.xxx.xxx - 204.8.xxx.xxx
      Dec 5 10:49:58	charon		06[IKE] <41241> queueing INFORMATIONAL task
      Dec 5 10:49:58	charon		06[IKE] <41241> activating new tasks
      Dec 5 10:49:58	charon		06[IKE] <41241> activating INFORMATIONAL task
      Dec 5 10:49:58	charon		06[ENC] <41241> generating INFORMATIONAL_V1 request 3777671848 [ N(INVAL_KE) ]
      Dec 5 10:49:58	charon		06[NET] <41241> sending packet: from 50.196.xxx.xxx[500] to 204.8.xxx.xxx[500] (56 bytes)
      Dec 5 10:49:58	charon		06[IKE] <41241> IKE_SA (unnamed)[41241] state change: CONNECTING => DESTROYING
      Dec 5 10:50:57	charon		05[NET] <41242> received packet: from 204.8.xxx.xxx[500] to 50.196.xxx.xxx[500] (128 bytes)
      Dec 5 10:50:57	charon		05[ENC] <41242> parsed ID_PROT request 0 [ SA V ]
      Dec 5 10:50:57	charon		05[CFG] <41242> looking for an ike config for 50.196.xxx.xxx...204.8.xxx.xxx
      Dec 5 10:50:57	charon		05[CFG] <41242> candidate: %any...%any, prio 24
      Dec 5 10:50:57	charon		05[CFG] <41242> found matching ike config: %any...%any with prio 24
      Dec 5 10:50:57	charon		05[ENC] <41242> received unknown vendor ID: f4:ed:19:e0:c1:14:eb:51:6f:aa:ac:0e:e3:7d:af:28:07:b4:38:1f:00:00:00:01:00:00:13:8d:5a:26:ea:91:00:00:00:00:18:20:00:00
      Dec 5 10:50:57	charon		05[IKE] <41242> 204.8.xxx.xxx is initiating a Main Mode IKE_SA
      Dec 5 10:50:57	charon		05[IKE] <41242> IKE_SA (unnamed)[41242] state change: CREATED => CONNECTING
      Dec 5 10:50:57	charon		05[CFG] <41242> selecting proposal:
      Dec 5 10:50:57	charon		05[CFG] <41242> no acceptable ENCRYPTION_ALGORITHM found
      Dec 5 10:50:57	charon		05[CFG] <41242> selecting proposal:
      Dec 5 10:50:57	charon		05[CFG] <41242> proposal matches
      Dec 5 10:50:57	charon		05[CFG] <41242> received proposals: IKE:3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024
      Dec 5 10:50:57	charon		05[CFG] <41242> configured proposals: IKE:AES_CBC_128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/CURVE_25519, IKE:AES_CBC_128/AES_CBC_192/AES_CBC_256/CAMELLIA_CBC_128/CAMELLIA_CBC_192/CAMELLIA_CBC_256/3DES_CBC/HMAC_SHA2_256_128/HMAC_SHA2_384_192/HMAC_SHA2_512_256/HMAC_MD5_96/HMAC_SHA1_96/AES_XCBC_96/AES_CMAC_96/PRF_HMAC_SHA2_256/PRF_HMAC_SHA2_384/PRF_HMAC_SHA2_512/PRF_AES128_XCBC/PRF_AES128_CMAC/PRF_HMAC_MD5/PRF_HMAC_SHA1/ECP_256/ECP_384/ECP_521/ECP_256_BP/ECP_384_BP/ECP_512_BP/CURVE_25519/MODP_3072/MODP_4096/MODP_8192/MODP_2048/MODP_1024, IKE:AES_GCM_16_128/AES_GCM_16_192/AES_GCM_16_256/AES_GCM_12_128/AES_GCM_12_192/AES_GCM_12_256/AES_GCM_8_128/AES_GCM_8_192/AES_GCM_8_256/PRF_HMAC_SHA2_256/PRF_HMAC_SHA2_384/PRF_HMAC_SHA2_512/PRF_AES128_XCBC/PRF_AES128_CMAC/PRF_HMAC_MD5/PRF_HMAC_SHA1/ECP_256/ECP_384/ECP_521/ECP_256_BP/ECP_384_BP/ECP_512_BP/CURVE_25519/MODP_3072/MODP_4096/MODP_8192/MODP_2048/MODP_1024
      Dec 5 10:50:57	charon		05[CFG] <41242> selected proposal: IKE:3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024
      Dec 5 10:50:57	charon		05[IKE] <41242> sending XAuth vendor ID
      Dec 5 10:50:57	charon		05[IKE] <41242> sending DPD vendor ID
      Dec 5 10:50:57	charon		05[ENC] <41242> generating ID_PROT response 0 [ SA V V ]
      Dec 5 10:50:57	charon		05[NET] <41242> sending packet: from 50.196.xxx.xxx[500] to 204.8.xxx.xxx[500] (116 bytes)
      Dec 5 10:50:58	charon		05[NET] <41242> received packet: from 204.8.xxx.xxx[500] to 50.196.xxx.xxx[500] (184 bytes)
      Dec 5 10:50:58	charon		05[ENC] <41242> parsed ID_PROT request 0 [ KE No ]
      Dec 5 10:50:58	charon		05[CFG] <41242> candidate "bypasslan", match: 1/1/24 (me/other/ike)
      Dec 5 10:50:58	charon		05[IKE] <41242> no shared key found for 50.196.xxx.xxx - 204.8.xxx.xxx
      Dec 5 10:50:58	charon		05[IKE] <41242> queueing INFORMATIONAL task
      Dec 5 10:50:58	charon		05[IKE] <41242> activating new tasks
      Dec 5 10:50:58	charon		05[IKE] <41242> activating INFORMATIONAL task
      Dec 5 10:50:58	charon		05[ENC] <41242> generating INFORMATIONAL_V1 request 2321872894 [ N(INVAL_KE) ]
      Dec 5 10:50:58	charon		05[NET] <41242> sending packet: from 50.196.xxx.xxx[500] to 204.8.xxx.xxx[500] (56 bytes)
      Dec 5 10:50:58	charon		05[IKE] <41242> IKE_SA (unnamed)[41242] state change: CONNECTING => DESTROYING
      Dec 5 10:51:57	charon		13[NET] <41243> received packet: from 204.8.xxx.xxx[500] to 50.196.xxx.xxx[500] (128 bytes)
      Dec 5 10:51:57	charon		13[ENC] <41243> parsed ID_PROT request 0 [ SA V ]
      Dec 5 10:51:57	charon		13[CFG] <41243> looking for an ike config for 50.196.xxx.xxx...204.8.xxx.xxx
      Dec 5 10:51:57	charon		13[CFG] <41243> candidate: %any...%any, prio 24
      Dec 5 10:51:57	charon		13[CFG] <41243> found matching ike config: %any...%any with prio 24
      Dec 5 10:51:57	charon		13[ENC] <41243> received unknown vendor ID: f4:ed:19:e0:c1:14:eb:51:6f:aa:ac:0e:e3:7d:af:28:07:b4:38:1f:00:00:00:01:00:00:13:8d:5a:26:ea:cd:00:00:00:00:18:20:00:00
      Dec 5 10:51:57	charon		13[IKE] <41243> 204.8.xxx.xxx is initiating a Main Mode IKE_SA
      Dec 5 10:51:57	charon		13[IKE] <41243> IKE_SA (unnamed)[41243] state change: CREATED => CONNECTING
      Dec 5 10:51:57	charon		13[CFG] <41243> selecting proposal:
      Dec 5 10:51:57	charon		13[CFG] <41243> no acceptable ENCRYPTION_ALGORITHM found
      Dec 5 10:51:57	charon		13[CFG] <41243> selecting proposal:
      Dec 5 10:51:57	charon		13[CFG] <41243> proposal matches
      Dec 5 10:51:57	charon		13[CFG] <41243> received proposals: IKE:3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024
      Dec 5 10:51:57	charon		13[CFG] <41243> configured proposals: IKE:AES_CBC_128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/CURVE_25519, IKE:AES_CBC_128/AES_CBC_192/AES_CBC_256/CAMELLIA_CBC_128/CAMELLIA_CBC_192/CAMELLIA_CBC_256/3DES_CBC/HMAC_SHA2_256_128/HMAC_SHA2_384_192/HMAC_SHA2_512_256/HMAC_MD5_96/HMAC_SHA1_96/AES_XCBC_96/AES_CMAC_96/PRF_HMAC_SHA2_256/PRF_HMAC_SHA2_384/PRF_HMAC_SHA2_512/PRF_AES128_XCBC/PRF_AES128_CMAC/PRF_HMAC_MD5/PRF_HMAC_SHA1/ECP_256/ECP_384/ECP_521/ECP_256_BP/ECP_384_BP/ECP_512_BP/CURVE_25519/MODP_3072/MODP_4096/MODP_8192/MODP_2048/MODP_1024, IKE:AES_GCM_16_128/AES_GCM_16_192/AES_GCM_16_256/AES_GCM_12_128/AES_GCM_12_192/AES_GCM_12_256/AES_GCM_8_128/AES_GCM_8_192/AES_GCM_8_256/PRF_HMAC_SHA2_256/PRF_HMAC_SHA2_384/PRF_HMAC_SHA2_512/PRF_AES128_XCBC/PRF_AES128_CMAC/PRF_HMAC_MD5/PRF_HMAC_SHA1/ECP_256/ECP_384/ECP_521/ECP_256_BP/ECP_384_BP/ECP_512_BP/CURVE_25519/MODP_3072/MODP_4096/MODP_8192/MODP_2048/MODP_1024
      Dec 5 10:51:57	charon		13[CFG] <41243> selected proposal: IKE:3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024
      Dec 5 10:51:57	charon		13[IKE] <41243> sending XAuth vendor ID
      Dec 5 10:51:57	charon		13[IKE] <41243> sending DPD vendor ID
      Dec 5 10:51:57	charon		13[ENC] <41243> generating ID_PROT response 0 [ SA V V ]
      Dec 5 10:51:57	charon		13[NET] <41243> sending packet: from 50.196.xxx.xxx[500] to 204.8.xxx.xxx[500] (116 bytes)
      Dec 5 10:51:58	charon		13[NET] <41243> received packet: from 204.8.xxx.xxx[500] to 50.196.xxx.xxx[500] (184 bytes)
      Dec 5 10:51:58	charon		13[ENC] <41243> parsed ID_PROT request 0 [ KE No ]
      Dec 5 10:51:58	charon		13[CFG] <41243> candidate "bypasslan", match: 1/1/24 (me/other/ike)
      Dec 5 10:51:58	charon		13[IKE] <41243> no shared key found for 50.196.xxx.xxx - 204.8.xxx.xxx
      Dec 5 10:51:58	charon		13[IKE] <41243> queueing INFORMATIONAL task
      Dec 5 10:51:58	charon		13[IKE] <41243> activating new tasks
      Dec 5 10:51:58	charon		13[IKE] <41243> activating INFORMATIONAL task
      Dec 5 10:51:58	charon		13[ENC] <41243> generating INFORMATIONAL_V1 request 2058809334 [ N(INVAL_KE) ]
      Dec 5 10:51:58	charon		13[NET] <41243> sending packet: from 50.196.xxx.xxx[500] to 204.8.xxx.xxx[500] (56 bytes)
      Dec 5 10:51:58	charon		13[IKE] <41243> IKE_SA (unnamed)[41243] state change: CONNECTING => DESTROYING
      Dec 5 10:52:57	charon		10[NET] <41244> received packet: from 204.8.xxx.xxx[500] to 50.196.xxx.xxx[500] (128 bytes)
      Dec 5 10:52:57	charon		10[ENC] <41244> parsed ID_PROT request 0 [ SA V ]
      Dec 5 10:52:57	charon		10[CFG] <41244> looking for an ike config for 50.196.xxx.xxx...204.8.xxx.xxx
      Dec 5 10:52:57	charon		10[CFG] <41244> candidate: %any...%any, prio 24
      Dec 5 10:52:57	charon		10[CFG] <41244> found matching ike config: %any...%any with prio 24
      Dec 5 10:52:57	charon		10[ENC] <41244> received unknown vendor ID: f4:ed:19:e0:c1:14:eb:51:6f:aa:ac:0e:e3:7d:af:28:07:b4:38:1f:00:00:00:01:00:00:13:8d:5a:26:eb:09:00:00:00:00:18:20:00:00
      Dec 5 10:52:57	charon		10[IKE] <41244> 204.8.xxx.xxx is initiating a Main Mode IKE_SA
      Dec 5 10:52:57	charon		10[IKE] <41244> IKE_SA (unnamed)[41244] state change: CREATED => CONNECTING
      Dec 5 10:52:57	charon		10[CFG] <41244> selecting proposal:
      Dec 5 10:52:57	charon		10[CFG] <41244> no acceptable ENCRYPTION_ALGORITHM found
      Dec 5 10:52:57	charon		10[CFG] <41244> selecting proposal:
      Dec 5 10:52:57	charon		10[CFG] <41244> proposal matches
      Dec 5 10:52:57	charon		10[CFG] <41244> received proposals: IKE:3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024
      Dec 5 10:52:57	charon		10[CFG] <41244> configured proposals: IKE:AES_CBC_128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/CURVE_25519, IKE:AES_CBC_128/AES_CBC_192/AES_CBC_256/CAMELLIA_CBC_128/CAMELLIA_CBC_192/CAMELLIA_CBC_256/3DES_CBC/HMAC_SHA2_256_128/HMAC_SHA2_384_192/HMAC_SHA2_512_256/HMAC_MD5_96/HMAC_SHA1_96/AES_XCBC_96/AES_CMAC_96/PRF_HMAC_SHA2_256/PRF_HMAC_SHA2_384/PRF_HMAC_SHA2_512/PRF_AES128_XCBC/PRF_AES128_CMAC/PRF_HMAC_MD5/PRF_HMAC_SHA1/ECP_256/ECP_384/ECP_521/ECP_256_BP/ECP_384_BP/ECP_512_BP/CURVE_25519/MODP_3072/MODP_4096/MODP_8192/MODP_2048/MODP_1024, IKE:AES_GCM_16_128/AES_GCM_16_192/AES_GCM_16_256/AES_GCM_12_128/AES_GCM_12_192/AES_GCM_12_256/AES_GCM_8_128/AES_GCM_8_192/AES_GCM_8_256/PRF_HMAC_SHA2_256/PRF_HMAC_SHA2_384/PRF_HMAC_SHA2_512/PRF_AES128_XCBC/PRF_AES128_CMAC/PRF_HMAC_MD5/PRF_HMAC_SHA1/ECP_256/ECP_384/ECP_521/ECP_256_BP/ECP_384_BP/ECP_512_BP/CURVE_25519/MODP_3072/MODP_4096/MODP_8192/MODP_2048/MODP_1024
      Dec 5 10:52:57	charon		10[CFG] <41244> selected proposal: IKE:3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024
      Dec 5 10:52:57	charon		10[IKE] <41244> sending XAuth vendor ID
      Dec 5 10:52:57	charon		10[IKE] <41244> sending DPD vendor ID
      Dec 5 10:52:57	charon		10[ENC] <41244> generating ID_PROT response 0 [ SA V V ]
      Dec 5 10:52:57	charon		10[NET] <41244> sending packet: from 50.196.xxx.xxx[500] to 204.8.xxx.xxx[500] (116 bytes)
      Dec 5 10:52:58	charon		10[NET] <41244> received packet: from 204.8.xxx.xxx[500] to 50.196.xxx.xxx[500] (184 bytes)
      Dec 5 10:52:58	charon		10[ENC] <41244> parsed ID_PROT request 0 [ KE No ]
      Dec 5 10:52:58	charon		10[CFG] <41244> candidate "bypasslan", match: 1/1/24 (me/other/ike)
      Dec 5 10:52:58	charon		10[IKE] <41244> no shared key found for 50.196.xxx.xxx - 204.8.xxx.xxx
      Dec 5 10:52:58	charon		10[IKE] <41244> queueing INFORMATIONAL task
      Dec 5 10:52:58	charon		10[IKE] <41244> activating new tasks
      Dec 5 10:52:58	charon		10[IKE] <41244> activating INFORMATIONAL task
      Dec 5 10:52:58	charon		10[ENC] <41244> generating INFORMATIONAL_V1 request 1109804636 [ N(INVAL_KE) ]
      Dec 5 10:52:58	charon		10[NET] <41244> sending packet: from 50.196.xxx.xxx[500] to 204.8.xxx.xxx[500] (56 bytes)
      Dec 5 10:52:58	charon		10[IKE] <41244> IKE_SA (unnamed)[41244] state change: CONNECTING => DESTROYING
      Dec 5 10:53:57	charon		10[NET] <41245> received packet: from 204.8.xxx.xxx[500] to 50.196.xxx.xxx[500] (128 bytes)
      Dec 5 10:53:57	charon		10[ENC] <41245> parsed ID_PROT request 0 [ SA V ]
      Dec 5 10:53:57	charon		10[CFG] <41245> looking for an ike config for 50.196.xxx.xxx...204.8.xxx.xxx
      Dec 5 10:53:57	charon		10[CFG] <41245> candidate: %any...%any, prio 24
      Dec 5 10:53:57	charon		10[CFG] <41245> found matching ike config: %any...%any with prio 24
      Dec 5 10:53:57	charon		10[ENC] <41245> received unknown vendor ID: f4:ed:19:e0:c1:14:eb:51:6f:aa:ac:0e:e3:7d:af:28:07:b4:38:1f:00:00:00:01:00:00:13:8d:5a:26:eb:45:00:00:00:00:18:20:00:00
      Dec 5 10:53:57	charon		10[IKE] <41245> 204.8.xxx.xxx is initiating a Main Mode IKE_SA
      Dec 5 10:53:57	charon		10[IKE] <41245> IKE_SA (unnamed)[41245] state change: CREATED => CONNECTING
      Dec 5 10:53:57	charon		10[CFG] <41245> selecting proposal:
      Dec 5 10:53:57	charon		10[CFG] <41245> no acceptable ENCRYPTION_ALGORITHM found
      Dec 5 10:53:57	charon		10[CFG] <41245> selecting proposal:
      Dec 5 10:53:57	charon		10[CFG] <41245> proposal matches
      Dec 5 10:53:57	charon		10[CFG] <41245> received proposals: IKE:3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024
      Dec 5 10:53:57	charon		10[CFG] <41245> configured proposals: IKE:AES_CBC_128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/CURVE_25519, IKE:AES_CBC_128/AES_CBC_192/AES_CBC_256/CAMELLIA_CBC_128/CAMELLIA_CBC_192/CAMELLIA_CBC_256/3DES_CBC/HMAC_SHA2_256_128/HMAC_SHA2_384_192/HMAC_SHA2_512_256/HMAC_MD5_96/HMAC_SHA1_96/AES_XCBC_96/AES_CMAC_96/PRF_HMAC_SHA2_256/PRF_HMAC_SHA2_384/PRF_HMAC_SHA2_512/PRF_AES128_XCBC/PRF_AES128_CMAC/PRF_HMAC_MD5/PRF_HMAC_SHA1/ECP_256/ECP_384/ECP_521/ECP_256_BP/ECP_384_BP/ECP_512_BP/CURVE_25519/MODP_3072/MODP_4096/MODP_8192/MODP_2048/MODP_1024, IKE:AES_GCM_16_128/AES_GCM_16_192/AES_GCM_16_256/AES_GCM_12_128/AES_GCM_12_192/AES_GCM_12_256/AES_GCM_8_128/AES_GCM_8_192/AES_GCM_8_256/PRF_HMAC_SHA2_256/PRF_HMAC_SHA2_384/PRF_HMAC_SHA2_512/PRF_AES128_XCBC/PRF_AES128_CMAC/PRF_HMAC_MD5/PRF_HMAC_SHA1/ECP_256/ECP_384/ECP_521/ECP_256_BP/ECP_384_BP/ECP_512_BP/CURVE_25519/MODP_3072/MODP_4096/MODP_8192/MODP_2048/MODP_1024
      Dec 5 10:53:57	charon		10[CFG] <41245> selected proposal: IKE:3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024
      Dec 5 10:53:57	charon		10[IKE] <41245> sending XAuth vendor ID
      Dec 5 10:53:57	charon		10[IKE] <41245> sending DPD vendor ID
      Dec 5 10:53:57	charon		10[ENC] <41245> generating ID_PROT response 0 [ SA V V ]
      Dec 5 10:53:57	charon		10[NET] <41245> sending packet: from 50.196.xxx.xxx[500] to 204.8.xxx.xxx[500] (116 bytes)
      Dec 5 10:53:58	charon		09[NET] <41245> received packet: from 204.8.xxx.xxx[500] to 50.196.xxx.xxx[500] (184 bytes)
      Dec 5 10:53:58	charon		09[ENC] <41245> parsed ID_PROT request 0 [ KE No ]
      Dec 5 10:53:58	charon		09[CFG] <41245> candidate "bypasslan", match: 1/1/24 (me/other/ike)
      Dec 5 10:53:58	charon		09[IKE] <41245> no shared key found for 50.196.xxx.xxx - 204.8.xxx.xxx
      Dec 5 10:53:58	charon		09[IKE] <41245> queueing INFORMATIONAL task
      Dec 5 10:53:58	charon		09[IKE] <41245> activating new tasks
      Dec 5 10:53:58	charon		09[IKE] <41245> activating INFORMATIONAL task
      Dec 5 10:53:58	charon		09[ENC] <41245> generating INFORMATIONAL_V1 request 2161395145 [ N(INVAL_KE) ]
      Dec 5 10:53:58	charon		09[NET] <41245> sending packet: from 50.196.xxx.xxx[500] to 204.8.xxx.xxx[500] (56 bytes)
      Dec 5 10:53:58	charon		09[IKE] <41245> IKE_SA (unnamed)[41245] state change: CONNECTING => DESTROYING
      Dec 5 10:54:57	charon		09[NET] <41246> received packet: from 204.8.xxx.xxx[500] to 50.196.xxx.xxx[500] (128 bytes)
      Dec 5 10:54:57	charon		09[ENC] <41246> parsed ID_PROT request 0 [ SA V ]
      Dec 5 10:54:57	charon		09[CFG] <41246> looking for an ike config for 50.196.xxx.xxx...204.8.xxx.xxx
      Dec 5 10:54:57	charon		09[CFG] <41246> candidate: %any...%any, prio 24
      Dec 5 10:54:57	charon		09[CFG] <41246> found matching ike config: %any...%any with prio 24
      Dec 5 10:54:57	charon		09[ENC] <41246> received unknown vendor ID: f4:ed:19:e0:c1:14:eb:51:6f:aa:ac:0e:e3:7d:af:28:07:b4:38:1f:00:00:00:01:00:00:13:8d:5a:26:eb:81:00:00:00:00:18:20:00:00
      Dec 5 10:54:57	charon		09[IKE] <41246> 204.8.xxx.xxx is initiating a Main Mode IKE_SA
      Dec 5 10:54:57	charon		09[IKE] <41246> IKE_SA (unnamed)[41246] state change: CREATED => CONNECTING
      Dec 5 10:54:57	charon		09[CFG] <41246> selecting proposal:
      Dec 5 10:54:57	charon		09[CFG] <41246> no acceptable ENCRYPTION_ALGORITHM found
      Dec 5 10:54:57	charon		09[CFG] <41246> selecting proposal:
      Dec 5 10:54:57	charon		09[CFG] <41246> proposal matches
      Dec 5 10:54:57	charon		09[CFG] <41246> received proposals: IKE:3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024
      Dec 5 10:54:57	charon		09[CFG] <41246> configured proposals: IKE:AES_CBC_128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/CURVE_25519, IKE:AES_CBC_128/AES_CBC_192/AES_CBC_256/CAMELLIA_CBC_128/CAMELLIA_CBC_192/CAMELLIA_CBC_256/3DES_CBC/HMAC_SHA2_256_128/HMAC_SHA2_384_192/HMAC_SHA2_512_256/HMAC_MD5_96/HMAC_SHA1_96/AES_XCBC_96/AES_CMAC_96/PRF_HMAC_SHA2_256/PRF_HMAC_SHA2_384/PRF_HMAC_SHA2_512/PRF_AES128_XCBC/PRF_AES128_CMAC/PRF_HMAC_MD5/PRF_HMAC_SHA1/ECP_256/ECP_384/ECP_521/ECP_256_BP/ECP_384_BP/ECP_512_BP/CURVE_25519/MODP_3072/MODP_4096/MODP_8192/MODP_2048/MODP_1024, IKE:AES_GCM_16_128/AES_GCM_16_192/AES_GCM_16_256/AES_GCM_12_128/AES_GCM_12_192/AES_GCM_12_256/AES_GCM_8_128/AES_GCM_8_192/AES_GCM_8_256/PRF_HMAC_SHA2_256/PRF_HMAC_SHA2_384/PRF_HMAC_SHA2_512/PRF_AES128_XCBC/PRF_AES128_CMAC/PRF_HMAC_MD5/PRF_HMAC_SHA1/ECP_256/ECP_384/ECP_521/ECP_256_BP/ECP_384_BP/ECP_512_BP/CURVE_25519/MODP_3072/MODP_4096/MODP_8192/MODP_2048/MODP_1024
      Dec 5 10:54:57	charon		09[CFG] <41246> selected proposal: IKE:3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024
      Dec 5 10:54:57	charon		09[IKE] <41246> sending XAuth vendor ID
      Dec 5 10:54:57	charon		09[IKE] <41246> sending DPD vendor ID
      Dec 5 10:54:57	charon		09[ENC] <41246> generating ID_PROT response 0 [ SA V V ]
      Dec 5 10:54:57	charon		09[NET] <41246> sending packet: from 50.196.xxx.xxx[500] to 204.8.xxx.xxx[500] (116 bytes)
      Dec 5 10:54:58	charon		12[NET] <41246> received packet: from 204.8.xxx.xxx[500] to 50.196.xxx.xxx[500] (184 bytes)
      Dec 5 10:54:58	charon		12[ENC] <41246> parsed ID_PROT request 0 [ KE No ]
      Dec 5 10:54:58	charon		12[CFG] <41246> candidate "bypasslan", match: 1/1/24 (me/other/ike)
      Dec 5 10:54:58	charon		12[IKE] <41246> no shared key found for 50.196.xxx.xxx - 204.8.xxx.xxx
      Dec 5 10:54:58	charon		12[IKE] <41246> queueing INFORMATIONAL task
      Dec 5 10:54:58	charon		12[IKE] <41246> activating new tasks
      Dec 5 10:54:58	charon		12[IKE] <41246> activating INFORMATIONAL task
      Dec 5 10:54:58	charon		12[ENC] <41246> generating INFORMATIONAL_V1 request 1752077790 [ N(INVAL_KE) ]
      Dec 5 10:54:58	charon		12[NET] <41246> sending packet: from 50.196.xxx.xxx[500] to 204.8.xxx.xxx[500] (56 bytes)
      Dec 5 10:54:58	charon		12[IKE] <41246> IKE_SA (unnamed)[41246] state change: CONNECTING => DESTROYING
      Dec 5 10:55:57	charon		12[NET] <41247> received packet: from 204.8.xxx.xxx[500] to 50.196.xxx.xxx[500] (128 bytes)
      Dec 5 10:55:57	charon		12[ENC] <41247> parsed ID_PROT request 0 [ SA V ]
      Dec 5 10:55:57	charon		12[CFG] <41247> looking for an ike config for 50.196.xxx.xxx...204.8.xxx.xxx
      Dec 5 10:55:57	charon		12[CFG] <41247> candidate: %any...%any, prio 24
      Dec 5 10:55:57	charon		12[CFG] <41247> found matching ike config: %any...%any with prio 24
      Dec 5 10:55:57	charon		12[ENC] <41247> received unknown vendor ID: f4:ed:19:e0:c1:14:eb:51:6f:aa:ac:0e:e3:7d:af:28:07:b4:38:1f:00:00:00:01:00:00:13:8d:5a:26:eb:bd:00:00:00:00:18:20:00:00
      Dec 5 10:55:57	charon		12[IKE] <41247> 204.8.xxx.xxx is initiating a Main Mode IKE_SA
      Dec 5 10:55:57	charon		12[IKE] <41247> IKE_SA (unnamed)[41247] state change: CREATED => CONNECTING
      Dec 5 10:55:57	charon		12[CFG] <41247> selecting proposal:
      Dec 5 10:55:57	charon		12[CFG] <41247> no acceptable ENCRYPTION_ALGORITHM found
      Dec 5 10:55:57	charon		12[CFG] <41247> selecting proposal:
      Dec 5 10:55:57	charon		12[CFG] <41247> proposal matches
      Dec 5 10:55:57	charon		12[CFG] <41247> received proposals: IKE:3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024
      Dec 5 10:55:57	charon		12[CFG] <41247> configured proposals: IKE:AES_CBC_128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/CURVE_25519, IKE:AES_CBC_128/AES_CBC_192/AES_CBC_256/CAMELLIA_CBC_128/CAMELLIA_CBC_192/CAMELLIA_CBC_256/3DES_CBC/HMAC_SHA2_256_128/HMAC_SHA2_384_192/HMAC_SHA2_512_256/HMAC_MD5_96/HMAC_SHA1_96/AES_XCBC_96/AES_CMAC_96/PRF_HMAC_SHA2_256/PRF_HMAC_SHA2_384/PRF_HMAC_SHA2_512/PRF_AES128_XCBC/PRF_AES128_CMAC/PRF_HMAC_MD5/PRF_HMAC_SHA1/ECP_256/ECP_384/ECP_521/ECP_256_BP/ECP_384_BP/ECP_512_BP/CURVE_25519/MODP_3072/MODP_4096/MODP_8192/MODP_2048/MODP_1024, IKE:AES_GCM_16_128/AES_GCM_16_192/AES_GCM_16_256/AES_GCM_12_128/AES_GCM_12_192/AES_GCM_12_256/AES_GCM_8_128/AES_GCM_8_192/AES_GCM_8_256/PRF_HMAC_SHA2_256/PRF_HMAC_SHA2_384/PRF_HMAC_SHA2_512/PRF_AES128_XCBC/PRF_AES128_CMAC/PRF_HMAC_MD5/PRF_HMAC_SHA1/ECP_256/ECP_384/ECP_521/ECP_256_BP/ECP_384_BP/ECP_512_BP/CURVE_25519/MODP_3072/MODP_4096/MODP_8192/MODP_2048/MODP_1024
      Dec 5 10:55:57	charon		12[CFG] <41247> selected proposal: IKE:3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024
      Dec 5 10:55:57	charon		12[IKE] <41247> sending XAuth vendor ID
      Dec 5 10:55:57	charon		12[IKE] <41247> sending DPD vendor ID
      Dec 5 10:55:57	charon		12[ENC] <41247> generating ID_PROT response 0 [ SA V V ]
      Dec 5 10:55:57	charon		12[NET] <41247> sending packet: from 50.196.xxx.xxx[500] to 204.8.xxx.xxx[500] (116 bytes)
      Dec 5 10:55:58	charon		08[NET] <41247> received packet: from 204.8.xxx.xxx[500] to 50.196.xxx.xxx[500] (184 bytes)
      Dec 5 10:55:58	charon		08[ENC] <41247> parsed ID_PROT request 0 [ KE No ]
      Dec 5 10:55:58	charon		08[CFG] <41247> candidate "bypasslan", match: 1/1/24 (me/other/ike)
      Dec 5 10:55:58	charon		08[IKE] <41247> no shared key found for 50.196.xxx.xxx - 204.8.xxx.xxx
      Dec 5 10:55:58	charon		08[IKE] <41247> queueing INFORMATIONAL task
      Dec 5 10:55:58	charon		08[IKE] <41247> activating new tasks
      Dec 5 10:55:58	charon		08[IKE] <41247> activating INFORMATIONAL task
      Dec 5 10:55:58	charon		08[ENC] <41247> generating INFORMATIONAL_V1 request 244472465 [ N(INVAL_KE) ]
      Dec 5 10:55:58	charon		08[NET] <41247> sending packet: from 50.196.xxx.xxx[500] to 204.8.xxx.xxx[500] (56 bytes)
      Dec 5 10:55:58	charon		08[IKE] <41247> IKE_SA (unnamed)[41247] state change: CONNECTING => DESTROYING
      Dec 5 10:56:57	charon		08[NET] <41248> received packet: from 204.8.xxx.xxx[500] to 50.196.xxx.xxx[500] (128 bytes)
      Dec 5 10:56:57	charon		08[ENC] <41248> parsed ID_PROT request 0 [ SA V ]
      Dec 5 10:56:57	charon		08[CFG] <41248> looking for an ike config for 50.196.xxx.xxx...204.8.xxx.xxx
      Dec 5 10:56:57	charon		08[CFG] <41248> candidate: %any...%any, prio 24
      Dec 5 10:56:57	charon		08[CFG] <41248> found matching ike config: %any...%any with prio 24
      Dec 5 10:56:57	charon		08[ENC] <41248> received unknown vendor ID: f4:ed:19:e0:c1:14:eb:51:6f:aa:ac:0e:e3:7d:af:28:07:b4:38:1f:00:00:00:01:00:00:13:8d:5a:26:eb:f9:00:00:00:00:18:20:00:00
      Dec 5 10:56:57	charon		08[IKE] <41248> 204.8.xxx.xxx is initiating a Main Mode IKE_SA
      Dec 5 10:56:57	charon		08[IKE] <41248> IKE_SA (unnamed)[41248] state change: CREATED => CONNECTING
      Dec 5 10:56:57	charon		08[CFG] <41248> selecting proposal:
      Dec 5 10:56:57	charon		08[CFG] <41248> no acceptable ENCRYPTION_ALGORITHM found
      Dec 5 10:56:57	charon		08[CFG] <41248> selecting proposal:
      Dec 5 10:56:57	charon		08[CFG] <41248> proposal matches
      Dec 5 10:56:57	charon		08[CFG] <41248> received proposals: IKE:3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024
      Dec 5 10:56:57	charon		08[CFG] <41248> configured proposals: IKE:AES_CBC_128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/CURVE_25519, IKE:AES_CBC_128/AES_CBC_192/AES_CBC_256/CAMELLIA_CBC_128/CAMELLIA_CBC_192/CAMELLIA_CBC_256/3DES_CBC/HMAC_SHA2_256_128/HMAC_SHA2_384_192/HMAC_SHA2_512_256/HMAC_MD5_96/HMAC_SHA1_96/AES_XCBC_96/AES_CMAC_96/PRF_HMAC_SHA2_256/PRF_HMAC_SHA2_384/PRF_HMAC_SHA2_512/PRF_AES128_XCBC/PRF_AES128_CMAC/PRF_HMAC_MD5/PRF_HMAC_SHA1/ECP_256/ECP_384/ECP_521/ECP_256_BP/ECP_384_BP/ECP_512_BP/CURVE_25519/MODP_3072/MODP_4096/MODP_8192/MODP_2048/MODP_1024, IKE:AES_GCM_16_128/AES_GCM_16_192/AES_GCM_16_256/AES_GCM_12_128/AES_GCM_12_192/AES_GCM_12_256/AES_GCM_8_128/AES_GCM_8_192/AES_GCM_8_256/PRF_HMAC_SHA2_256/PRF_HMAC_SHA2_384/PRF_HMAC_SHA2_512/PRF_AES128_XCBC/PRF_AES128_CMAC/PRF_HMAC_MD5/PRF_HMAC_SHA1/ECP_256/ECP_384/ECP_521/ECP_256_BP/ECP_384_BP/ECP_512_BP/CURVE_25519/MODP_3072/MODP_4096/MODP_8192/MODP_2048/MODP_1024
      Dec 5 10:56:57	charon		08[CFG] <41248> selected proposal: IKE:3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024
      Dec 5 10:56:57	charon		08[IKE] <41248> sending XAuth vendor ID
      Dec 5 10:56:57	charon		08[IKE] <41248> sending DPD vendor ID
      Dec 5 10:56:57	charon		08[ENC] <41248> generating ID_PROT response 0 [ SA V V ]
      Dec 5 10:56:57	charon		08[NET] <41248> sending packet: from 50.196.xxx.xxx[500] to 204.8.xxx.xxx[500] (116 bytes)
      Dec 5 10:56:58	charon		11[NET] <41248> received packet: from 204.8.xxx.xxx[500] to 50.196.xxx.xxx[500] (184 bytes)
      Dec 5 10:56:58	charon		11[ENC] <41248> parsed ID_PROT request 0 [ KE No ]
      Dec 5 10:56:58	charon		11[CFG] <41248> candidate "bypasslan", match: 1/1/24 (me/other/ike)
      Dec 5 10:56:58	charon		11[IKE] <41248> no shared key found for 50.196.xxx.xxx - 204.8.xxx.xxx
      Dec 5 10:56:58	charon		11[IKE] <41248> queueing INFORMATIONAL task
      Dec 5 10:56:58	charon		11[IKE] <41248> activating new tasks
      Dec 5 10:56:58	charon		11[IKE] <41248> activating INFORMATIONAL task
      Dec 5 10:56:58	charon		11[ENC] <41248> generating INFORMATIONAL_V1 request 495435906 [ N(INVAL_KE) ]
      Dec 5 10:56:58	charon		11[NET] <41248> sending packet: from 50.196.xxx.xxx[500] to 204.8.xxx.xxx[500] (56 bytes)
      Dec 5 10:56:58	charon		11[IKE] <41248> IKE_SA (unnamed)[41248] state change: CONNECTING => DESTROYING
      Dec 5 10:57:57	charon		01[NET] <41249> received packet: from 204.8.xxx.xxx[500] to 50.196.xxx.xxx[500] (128 bytes)
      Dec 5 10:57:57	charon		01[ENC] <41249> parsed ID_PROT request 0 [ SA V ]
      Dec 5 10:57:57	charon		01[CFG] <41249> looking for an ike config for 50.196.xxx.xxx...204.8.xxx.xxx
      Dec 5 10:57:57	charon		01[CFG] <41249> candidate: %any...%any, prio 24
      Dec 5 10:57:57	charon		01[CFG] <41249> found matching ike config: %any...%any with prio 24
      Dec 5 10:57:57	charon		01[ENC] <41249> received unknown vendor ID: f4:ed:19:e0:c1:14:eb:51:6f:aa:ac:0e:e3:7d:af:28:07:b4:38:1f:00:00:00:01:00:00:13:8d:5a:26:ec:35:00:00:00:00:18:20:00:00
      Dec 5 10:57:57	charon		01[IKE] <41249> 204.8.xxx.xxx is initiating a Main Mode IKE_SA
      Dec 5 10:57:57	charon		01[IKE] <41249> IKE_SA (unnamed)[41249] state change: CREATED => CONNECTING
      Dec 5 10:57:57	charon		01[CFG] <41249> selecting proposal:
      Dec 5 10:57:57	charon		01[CFG] <41249> no acceptable ENCRYPTION_ALGORITHM found
      Dec 5 10:57:57	charon		01[CFG] <41249> selecting proposal:
      Dec 5 10:57:57	charon		01[CFG] <41249> proposal matches
      Dec 5 10:57:57	charon		01[CFG] <41249> received proposals: IKE:3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024
      Dec 5 10:57:57	charon		01[CFG] <41249> configured proposals: IKE:AES_CBC_128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/CURVE_25519, IKE:AES_CBC_128/AES_CBC_192/AES_CBC_256/CAMELLIA_CBC_128/CAMELLIA_CBC_192/CAMELLIA_CBC_256/3DES_CBC/HMAC_SHA2_256_128/HMAC_SHA2_384_192/HMAC_SHA2_512_256/HMAC_MD5_96/HMAC_SHA1_96/AES_XCBC_96/AES_CMAC_96/PRF_HMAC_SHA2_256/PRF_HMAC_SHA2_384/PRF_HMAC_SHA2_512/PRF_AES128_XCBC/PRF_AES128_CMAC/PRF_HMAC_MD5/PRF_HMAC_SHA1/ECP_256/ECP_384/ECP_521/ECP_256_BP/ECP_384_BP/ECP_512_BP/CURVE_25519/MODP_3072/MODP_4096/MODP_8192/MODP_2048/MODP_1024, IKE:AES_GCM_16_128/AES_GCM_16_192/AES_GCM_16_256/AES_GCM_12_128/AES_GCM_12_192/AES_GCM_12_256/AES_GCM_8_128/AES_GCM_8_192/AES_GCM_8_256/PRF_HMAC_SHA2_256/PRF_HMAC_SHA2_384/PRF_HMAC_SHA2_512/PRF_AES128_XCBC/PRF_AES128_CMAC/PRF_HMAC_MD5/PRF_HMAC_SHA1/ECP_256/ECP_384/ECP_521/ECP_256_BP/ECP_384_BP/ECP_512_BP/CURVE_25519/MODP_3072/MODP_4096/MODP_8192/MODP_2048/MODP_1024
      Dec 5 10:57:57	charon		01[CFG] <41249> selected proposal: IKE:3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024
      Dec 5 10:57:57	charon		01[IKE] <41249> sending XAuth vendor ID
      Dec 5 10:57:57	charon		01[IKE] <41249> sending DPD vendor ID
      Dec 5 10:57:57	charon		01[ENC] <41249> generating ID_PROT response 0 [ SA V V ]
      Dec 5 10:57:57	charon		01[NET] <41249> sending packet: from 50.196.xxx.xxx[500] to 204.8.xxx.xxx[500] (116 bytes)
      Dec 5 10:57:58	charon		01[NET] <41249> received packet: from 204.8.xxx.xxx[500] to 50.196.xxx.xxx[500] (184 bytes)
      Dec 5 10:57:58	charon		01[ENC] <41249> parsed ID_PROT request 0 [ KE No ]
      Dec 5 10:57:58	charon		01[CFG] <41249> candidate "bypasslan", match: 1/1/24 (me/other/ike)
      Dec 5 10:57:58	charon		01[IKE] <41249> no shared key found for 50.196.xxx.xxx - 204.8.xxx.xxx
      Dec 5 10:57:58	charon		01[IKE] <41249> queueing INFORMATIONAL task
      Dec 5 10:57:58	charon		01[IKE] <41249> activating new tasks
      Dec 5 10:57:58	charon		01[IKE] <41249> activating INFORMATIONAL task
      Dec 5 10:57:58	charon		01[ENC] <41249> generating INFORMATIONAL_V1 request 3399047929 [ N(INVAL_KE) ]
      Dec 5 10:57:58	charon		01[NET] <41249> sending packet: from 50.196.xxx.xxx[500] to 204.8.xxx.xxx[500] (56 bytes)
      Dec 5 10:57:58	charon		01[IKE] <41249> IKE_SA (unnamed)[41249] state change: CONNECTING => DESTROYING
      Dec 5 10:58:57	charon		01[NET] <41250> received packet: from 204.8.xxx.xxx[500] to 50.196.xxx.xxx[500] (128 bytes)
      Dec 5 10:58:57	charon		01[ENC] <41250> parsed ID_PROT request 0 [ SA V ]
      Dec 5 10:58:57	charon		01[CFG] <41250> looking for an ike config for 50.196.xxx.xxx...204.8.xxx.xxx
      Dec 5 10:58:57	charon		01[CFG] <41250> candidate: %any...%any, prio 24
      Dec 5 10:58:57	charon		01[CFG] <41250> found matching ike config: %any...%any with prio 24
      Dec 5 10:58:57	charon		01[ENC] <41250> received unknown vendor ID: f4:ed:19:e0:c1:14:eb:51:6f:aa:ac:0e:e3:7d:af:28:07:b4:38:1f:00:00:00:01:00:00:13:8d:5a:26:ec:71:00:00:00:00:18:20:00:00
      Dec 5 10:58:57	charon		01[IKE] <41250> 204.8.xxx.xxx is initiating a Main Mode IKE_SA
      Dec 5 10:58:57	charon		01[IKE] <41250> IKE_SA (unnamed)[41250] state change: CREATED => CONNECTING
      Dec 5 10:58:57	charon		01[CFG] <41250> selecting proposal:
      Dec 5 10:58:57	charon		01[CFG] <41250> no acceptable ENCRYPTION_ALGORITHM found
      Dec 5 10:58:57	charon		01[CFG] <41250> selecting proposal:
      Dec 5 10:58:57	charon		01[CFG] <41250> proposal matches
      Dec 5 10:58:57	charon		01[CFG] <41250> received proposals: IKE:3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024
      Dec 5 10:58:57	charon		01[CFG] <41250> configured proposals: IKE:AES_CBC_128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/CURVE_25519, IKE:AES_CBC_128/AES_CBC_192/AES_CBC_256/CAMELLIA_CBC_128/CAMELLIA_CBC_192/CAMELLIA_CBC_256/3DES_CBC/HMAC_SHA2_256_128/HMAC_SHA2_384_192/HMAC_SHA2_512_256/HMAC_MD5_96/HMAC_SHA1_96/AES_XCBC_96/AES_CMAC_96/PRF_HMAC_SHA2_256/PRF_HMAC_SHA2_384/PRF_HMAC_SHA2_512/PRF_AES128_XCBC/PRF_AES128_CMAC/PRF_HMAC_MD5/PRF_HMAC_SHA1/ECP_256/ECP_384/ECP_521/ECP_256_BP/ECP_384_BP/ECP_512_BP/CURVE_25519/MODP_3072/MODP_4096/MODP_8192/MODP_2048/MODP_1024, IKE:AES_GCM_16_128/AES_GCM_16_192/AES_GCM_16_256/AES_GCM_12_128/AES_GCM_12_192/AES_GCM_12_256/AES_GCM_8_128/AES_GCM_8_192/AES_GCM_8_256/PRF_HMAC_SHA2_256/PRF_HMAC_SHA2_384/PRF_HMAC_SHA2_512/PRF_AES128_XCBC/PRF_AES128_CMAC/PRF_HMAC_MD5/PRF_HMAC_SHA1/ECP_256/ECP_384/ECP_521/ECP_256_BP/ECP_384_BP/ECP_512_BP/CURVE_25519/MODP_3072/MODP_4096/MODP_8192/MODP_2048/MODP_1024
      Dec 5 10:58:57	charon		01[CFG] <41250> selected proposal: IKE:3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024
      Dec 5 10:58:57	charon		01[IKE] <41250> sending XAuth vendor ID
      Dec 5 10:58:57	charon		01[IKE] <41250> sending DPD vendor ID
      Dec 5 10:58:57	charon		01[ENC] <41250> generating ID_PROT response 0 [ SA V V ]
      Dec 5 10:58:57	charon		01[NET] <41250> sending packet: from 50.196.xxx.xxx[500] to 204.8.xxx.xxx[500] (116 bytes)
      Dec 5 10:58:58	charon		07[NET] <41250> received packet: from 204.8.xxx.xxx[500] to 50.196.xxx.xxx[500] (184 bytes)
      Dec 5 10:58:58	charon		07[ENC] <41250> parsed ID_PROT request 0 [ KE No ]
      Dec 5 10:58:58	charon		07[CFG] <41250> candidate "bypasslan", match: 1/1/24 (me/other/ike)
      Dec 5 10:58:58	charon		07[IKE] <41250> no shared key found for 50.196.xxx.xxx - 204.8.xxx.xxx
      Dec 5 10:58:58	charon		07[IKE] <41250> queueing INFORMATIONAL task
      Dec 5 10:58:58	charon		07[IKE] <41250> activating new tasks
      Dec 5 10:58:58	charon		07[IKE] <41250> activating INFORMATIONAL task
      Dec 5 10:58:58	charon		07[ENC] <41250> generating INFORMATIONAL_V1 request 60851277 [ N(INVAL_KE) ]
      Dec 5 10:58:58	charon		07[NET] <41250> sending packet: from 50.196.xxx.xxx[500] to 204.8.xxx.xxx[500] (56 bytes)
      Dec 5 10:58:58	charon		07[IKE] <41250> IKE_SA (unnamed)[41250] state change: CONNECTING => DESTROYING
      Dec 5 10:59:58	charon		07[NET] <41251> received packet: from 204.8.xxx.xxx[500] to 50.196.xxx.xxx[500] (128 bytes)
      Dec 5 10:59:58	charon		07[ENC] <41251> parsed ID_PROT request 0 [ SA V ]
      Dec 5 10:59:58	charon		07[CFG] <41251> looking for an ike config for 50.196.xxx.xxx...204.8.xxx.xxx
      Dec 5 10:59:58	charon		07[CFG] <41251> candidate: %any...%any, prio 24
      Dec 5 10:59:58	charon		07[CFG] <41251> found matching ike config: %any...%any with prio 24
      Dec 5 10:59:58	charon		07[ENC] <41251> received unknown vendor ID: f4:ed:19:e0:c1:14:eb:51:6f:aa:ac:0e:e3:7d:af:28:07:b4:38:1f:00:00:00:01:00:00:13:8d:5a:26:ec:ad:00:00:00:00:18:20:00:00
      Dec 5 10:59:58	charon		07[IKE] <41251> 204.8.xxx.xxx is initiating a Main Mode IKE_SA
      Dec 5 10:59:58	charon		07[IKE] <41251> IKE_SA (unnamed)[41251] state change: CREATED => CONNECTING
      Dec 5 10:59:58	charon		07[CFG] <41251> selecting proposal:
      Dec 5 10:59:58	charon		07[CFG] <41251> no acceptable ENCRYPTION_ALGORITHM found
      Dec 5 10:59:58	charon		07[CFG] <41251> selecting proposal:
      Dec 5 10:59:58	charon		07[CFG] <41251> proposal matches
      Dec 5 10:59:58	charon		07[CFG] <41251> received proposals: IKE:3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024
      Dec 5 10:59:58	charon		07[CFG] <41251> configured proposals: IKE:AES_CBC_128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/CURVE_25519, IKE:AES_CBC_128/AES_CBC_192/AES_CBC_256/CAMELLIA_CBC_128/CAMELLIA_CBC_192/CAMELLIA_CBC_256/3DES_CBC/HMAC_SHA2_256_128/HMAC_SHA2_384_192/HMAC_SHA2_512_256/HMAC_MD5_96/HMAC_SHA1_96/AES_XCBC_96/AES_CMAC_96/PRF_HMAC_SHA2_256/PRF_HMAC_SHA2_384/PRF_HMAC_SHA2_512/PRF_AES128_XCBC/PRF_AES128_CMAC/PRF_HMAC_MD5/PRF_HMAC_SHA1/ECP_256/ECP_384/ECP_521/ECP_256_BP/ECP_384_BP/ECP_512_BP/CURVE_25519/MODP_3072/MODP_4096/MODP_8192/MODP_2048/MODP_1024, IKE:AES_GCM_16_128/AES_GCM_16_192/AES_GCM_16_256/AES_GCM_12_128/AES_GCM_12_192/AES_GCM_12_256/AES_GCM_8_128/AES_GCM_8_192/AES_GCM_8_256/PRF_HMAC_SHA2_256/PRF_HMAC_SHA2_384/PRF_HMAC_SHA2_512/PRF_AES128_XCBC/PRF_AES128_CMAC/PRF_HMAC_MD5/PRF_HMAC_SHA1/ECP_256/ECP_384/ECP_521/ECP_256_BP/ECP_384_BP/ECP_512_BP/CURVE_25519/MODP_3072/MODP_4096/MODP_8192/MODP_2048/MODP_1024
      Dec 5 10:59:58	charon		07[CFG] <41251> selected proposal: IKE:3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024
      Dec 5 10:59:58	charon		07[IKE] <41251> sending XAuth vendor ID
      Dec 5 10:59:58	charon		07[IKE] <41251> sending DPD vendor ID
      Dec 5 10:59:58	charon		07[ENC] <41251> generating ID_PROT response 0 [ SA V V ]
      Dec 5 10:59:58	charon		07[NET] <41251> sending packet: from 50.196.xxx.xxx[500] to 204.8.xxx.xxx[500] (116 bytes)
      Dec 5 10:59:58	charon		07[NET] <41251> received packet: from 204.8.xxx.xxx[500] to 50.196.xxx.xxx[500] (184 bytes)
      Dec 5 10:59:58	charon		07[ENC] <41251> parsed ID_PROT request 0 [ KE No ]
      Dec 5 10:59:58	charon		07[CFG] <41251> candidate "bypasslan", match: 1/1/24 (me/other/ike)
      Dec 5 10:59:58	charon		07[IKE] <41251> no shared key found for 50.196.xxx.xxx - 204.8.xxx.xxx
      Dec 5 10:59:58	charon		07[IKE] <41251> queueing INFORMATIONAL task
      Dec 5 10:59:58	charon		07[IKE] <41251> activating new tasks
      Dec 5 10:59:58	charon		07[IKE] <41251> activating INFORMATIONAL task
      Dec 5 10:59:58	charon		07[ENC] <41251> generating INFORMATIONAL_V1 request 1430056241 [ N(INVAL_KE) ]
      Dec 5 10:59:58	charon		07[NET] <41251> sending packet: from 50.196.xxx.xxx[500] to 204.8.xxx.xxx[500] (56 bytes)
      Dec 5 10:59:58	charon		07[IKE] <41251> IKE_SA (unnamed)[41251] state change: CONNECTING => DESTROYING
      Dec 5 11:00:57	charon		14[NET] <41252> received packet: from 204.8.xxx.xxx[500] to 50.196.xxx.xxx[500] (128 bytes)
      Dec 5 11:00:57	charon		14[ENC] <41252> parsed ID_PROT request 0 [ SA V ]
      Dec 5 11:00:57	charon		14[CFG] <41252> looking for an ike config for 50.196.xxx.xxx...204.8.xxx.xxx
      Dec 5 11:00:57	charon		14[CFG] <41252> candidate: %any...%any, prio 24
      Dec 5 11:00:57	charon		14[CFG] <41252> found matching ike config: %any...%any with prio 24
      Dec 5 11:00:57	charon		14[ENC] <41252> received unknown vendor ID: f4:ed:19:e0:c1:14:eb:51:6f:aa:ac:0e:e3:7d:af:28:07:b4:38:1f:00:00:00:01:00:00:13:8d:5a:26:ec:e9:00:00:00:00:18:20:00:00
      Dec 5 11:00:57	charon		14[IKE] <41252> 204.8.xxx.xxx is initiating a Main Mode IKE_SA
      Dec 5 11:00:57	charon		14[IKE] <41252> IKE_SA (unnamed)[41252] state change: CREATED => CONNECTING
      Dec 5 11:00:57	charon		14[CFG] <41252> selecting proposal:
      Dec 5 11:00:57	charon		14[CFG] <41252> no acceptable ENCRYPTION_ALGORITHM found
      Dec 5 11:00:57	charon		14[CFG] <41252> selecting proposal:
      Dec 5 11:00:57	charon		14[CFG] <41252> proposal matches
      Dec 5 11:00:57	charon		14[CFG] <41252> received proposals: IKE:3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024
      Dec 5 11:00:57	charon		14[CFG] <41252> configured proposals: IKE:AES_CBC_128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/CURVE_25519, IKE:AES_CBC_128/AES_CBC_192/AES_CBC_256/CAMELLIA_CBC_128/CAMELLIA_CBC_192/CAMELLIA_CBC_256/3DES_CBC/HMAC_SHA2_256_128/HMAC_SHA2_384_192/HMAC_SHA2_512_256/HMAC_MD5_96/HMAC_SHA1_96/AES_XCBC_96/AES_CMAC_96/PRF_HMAC_SHA2_256/PRF_HMAC_SHA2_384/PRF_HMAC_SHA2_512/PRF_AES128_XCBC/PRF_AES128_CMAC/PRF_HMAC_MD5/PRF_HMAC_SHA1/ECP_256/ECP_384/ECP_521/ECP_256_BP/ECP_384_BP/ECP_512_BP/CURVE_25519/MODP_3072/MODP_4096/MODP_8192/MODP_2048/MODP_1024, IKE:AES_GCM_16_128/AES_GCM_16_192/AES_GCM_16_256/AES_GCM_12_128/AES_GCM_12_192/AES_GCM_12_256/AES_GCM_8_128/AES_GCM_8_192/AES_GCM_8_256/PRF_HMAC_SHA2_256/PRF_HMAC_SHA2_384/PRF_HMAC_SHA2_512/PRF_AES128_XCBC/PRF_AES128_CMAC/PRF_HMAC_MD5/PRF_HMAC_SHA1/ECP_256/ECP_384/ECP_521/ECP_256_BP/ECP_384_BP/ECP_512_BP/CURVE_25519/MODP_3072/MODP_4096/MODP_8192/MODP_2048/MODP_1024
      Dec 5 11:00:57	charon		14[CFG] <41252> selected proposal: IKE:3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024
      Dec 5 11:00:57	charon		14[IKE] <41252> sending XAuth vendor ID
      Dec 5 11:00:57	charon		14[IKE] <41252> sending DPD vendor ID
      Dec 5 11:00:57	charon		14[ENC] <41252> generating ID_PROT response 0 [ SA V V ]
      Dec 5 11:00:57	charon		14[NET] <41252> sending packet: from 50.196.xxx.xxx[500] to 204.8.xxx.xxx[500] (116 bytes)
      Dec 5 11:00:58	charon		15[NET] <41252> received packet: from 204.8.xxx.xxx[500] to 50.196.xxx.xxx[500] (184 bytes)
      Dec 5 11:00:58	charon		15[ENC] <41252> parsed ID_PROT request 0 [ KE No ]
      Dec 5 11:00:58	charon		15[CFG] <41252> candidate "bypasslan", match: 1/1/24 (me/other/ike)
      Dec 5 11:00:58	charon		15[IKE] <41252> no shared key found for 50.196.xxx.xxx - 204.8.xxx.xxx
      Dec 5 11:00:58	charon		15[IKE] <41252> queueing INFORMATIONAL task
      Dec 5 11:00:58	charon		15[IKE] <41252> activating new tasks
      Dec 5 11:00:58	charon		15[IKE] <41252> activating INFORMATIONAL task
      Dec 5 11:00:58	charon		15[ENC] <41252> generating INFORMATIONAL_V1 request 1030399365 [ N(INVAL_KE) ]
      Dec 5 11:00:58	charon		15[NET] <41252> sending packet: from 50.196.xxx.xxx[500] to 204.8.xxx.xxx[500] (56 bytes)
      Dec 5 11:00:58	charon		15[IKE] <41252> IKE_SA (unnamed)[41252] state change: CONNECTING => DESTROYING
      Dec 5 11:01:57	charon		15[NET] <41253> received packet: from 204.8.xxx.xxx[500] to 50.196.xxx.xxx[500] (128 bytes)
      Dec 5 11:01:57	charon		15[ENC] <41253> parsed ID_PROT request 0 [ SA V ]
      Dec 5 11:01:57	charon		15[CFG] <41253> looking for an ike config for 50.196.xxx.xxx...204.8.xxx.xxx
      Dec 5 11:01:57	charon		15[CFG] <41253> candidate: %any...%any, prio 24
      Dec 5 11:01:57	charon		15[CFG] <41253> found matching ike config: %any...%any with prio 24
      Dec 5 11:01:57	charon		15[ENC] <41253> received unknown vendor ID: f4:ed:19:e0:c1:14:eb:51:6f:aa:ac:0e:e3:7d:af:28:07:b4:38:1f:00:00:00:01:00:00:13:8d:5a:26:ed:25:00:00:00:00:18:20:00:00
      Dec 5 11:01:57	charon		15[IKE] <41253> 204.8.xxx.xxx is initiating a Main Mode IKE_SA
      Dec 5 11:01:57	charon		15[IKE] <41253> IKE_SA (unnamed)[41253] state change: CREATED => CONNECTING
      Dec 5 11:01:57	charon		15[CFG] <41253> selecting proposal:
      Dec 5 11:01:57	charon		15[CFG] <41253> no acceptable ENCRYPTION_ALGORITHM found
      Dec 5 11:01:57	charon		15[CFG] <41253> selecting proposal:
      Dec 5 11:01:57	charon		15[CFG] <41253> proposal matches
      Dec 5 11:01:57	charon		15[CFG] <41253> received proposals: IKE:3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024
      Dec 5 11:01:57	charon		15[CFG] <41253> configured proposals: IKE:AES_CBC_128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/CURVE_25519, IKE:AES_CBC_128/AES_CBC_192/AES_CBC_256/CAMELLIA_CBC_128/CAMELLIA_CBC_192/CAMELLIA_CBC_256/3DES_CBC/HMAC_SHA2_256_128/HMAC_SHA2_384_192/HMAC_SHA2_512_256/HMAC_MD5_96/HMAC_SHA1_96/AES_XCBC_96/AES_CMAC_96/PRF_HMAC_SHA2_256/PRF_HMAC_SHA2_384/PRF_HMAC_SHA2_512/PRF_AES128_XCBC/PRF_AES128_CMAC/PRF_HMAC_MD5/PRF_HMAC_SHA1/ECP_256/ECP_384/ECP_521/ECP_256_BP/ECP_384_BP/ECP_512_BP/CURVE_25519/MODP_3072/MODP_4096/MODP_8192/MODP_2048/MODP_1024, IKE:AES_GCM_16_128/AES_GCM_16_192/AES_GCM_16_256/AES_GCM_12_128/AES_GCM_12_192/AES_GCM_12_256/AES_GCM_8_128/AES_GCM_8_192/AES_GCM_8_256/PRF_HMAC_SHA2_256/PRF_HMAC_SHA2_384/PRF_HMAC_SHA2_512/PRF_AES128_XCBC/PRF_AES128_CMAC/PRF_HMAC_MD5/PRF_HMAC_SHA1/ECP_256/ECP_384/ECP_521/ECP_256_BP/ECP_384_BP/ECP_512_BP/CURVE_25519/MODP_3072/MODP_4096/MODP_8192/MODP_2048/MODP_1024
      Dec 5 11:01:57	charon		15[CFG] <41253> selected proposal: IKE:3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024
      Dec 5 11:01:57	charon		15[IKE] <41253> sending XAuth vendor ID
      Dec 5 11:01:57	charon		15[IKE] <41253> sending DPD vendor ID
      Dec 5 11:01:57	charon		15[ENC] <41253> generating ID_PROT response 0 [ SA V V ]
      Dec 5 11:01:57	charon		15[NET] <41253> sending packet: from 50.196.xxx.xxx[500] to 204.8.xxx.xxx[500] (116 bytes)
      Dec 5 11:01:58	charon		15[NET] <41253> received packet: from 204.8.xxx.xxx[500] to 50.196.xxx.xxx[500] (184 bytes)
      Dec 5 11:01:58	charon		15[ENC] <41253> parsed ID_PROT request 0 [ KE No ]
      Dec 5 11:01:58	charon		15[CFG] <41253> candidate "bypasslan", match: 1/1/24 (me/other/ike)
      Dec 5 11:01:58	charon		15[IKE] <41253> no shared key found for 50.196.xxx.xxx - 204.8.xxx.xxx
      Dec 5 11:01:58	charon		15[IKE] <41253> queueing INFORMATIONAL task
      Dec 5 11:01:58	charon		15[IKE] <41253> activating new tasks
      Dec 5 11:01:58	charon		15[IKE] <41253> activating INFORMATIONAL task
      Dec 5 11:01:58	charon		15[ENC] <41253> generating INFORMATIONAL_V1 request 344791920 [ N(INVAL_KE) ]
      Dec 5 11:01:58	charon		15[NET] <41253> sending packet: from 50.196.xxx.xxx[500] to 204.8.xxx.xxx[500] (56 bytes)
      Dec 5 11:01:58	charon		15[IKE] <41253> IKE_SA (unnamed)[41253] state change: CONNECTING => DESTROYING
      

      Skype ID:  Marinhd

      1 Reply Last reply Reply Quote 0
      • First post
        Last post
      Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.