No Longer Able to Connect to IPSec VPN (FortiClient)

I connect to my work IPSec VPN network with FortiClient.
I had no problems until I recently moved, and now have a hitron CGNM-2250 as my router/modem.
Now when I attempt to connect, FortiClient indicates that the VPN connection failed.

FortiClient debug logs:
8/15/2015 1:44:14 PM	Warning	Console	id=96870 user=VPN msg="Logs were cleared"
8/15/2015 1:44:16 PM	Notice	VPN	id=96573 user=VPN msg="VPN before logon was disabled" vpntype=ipsec
8/15/2015 1:44:16 PM	Notice	ESNAC	id=96951 user=VPN msg="Endpoint control policy synchronization was enabled"
8/15/2015 1:44:16 PM	Notice	Console	id=96880 user=VPN msg="User disabled WAN Acceleration"
8/15/2015 1:44:16 PM	Warning	SSOMA	id=96982 user=VPN msg="Single Sign-On Mobility Agent was disabled"
8/15/2015 1:44:16 PM	Warning	Console	id=96840 user=VPN msg="Fortiproxy is disabled"
8/15/2015 1:44:16 PM	Debug	Scheduler	GUI change event
8/15/2015 1:44:17 PM	Debug	Scheduler	(repeated 1 times in last 2 sec) GUI change event
8/15/2015 1:44:18 PM	Debug	Config	ImportConfig: tag <log_events> has an invalid value clientmanager. Was ignored.
8/15/2015 1:44:18 PM	Debug	ESNAC	PIPEMSG_CMD_ESNAC_STATUS_RELOAD_CONFIG
8/15/2015 1:44:18 PM	Debug	ESNAC	PIPEMSG_CMD_ESNAC_STATUS_UPDATE_PREFERRED_FGT
8/15/2015 1:44:20 PM	Debug	Scheduler	GUI change event
8/15/2015 1:44:20 PM	Debug	Update	Update task is called with dwSession=-1
8/15/2015 1:44:20 PM	Debug	Update	forticlient.fortinet.net
8/15/2015 1:44:20 PM	Debug	Update	start_update_thread() called
8/15/2015 1:44:20 PM	Debug	Update	Impersonated=0
8/15/2015 1:44:20 PM	Debug	Update	update started...
8/15/2015 1:44:20 PM	Debug	Update	update process sending request: 00000000FSCI00000000000000000000
8/15/2015 1:44:20 PM	Debug	Update	update process sending request: 00000000FDNI00000000000000000000
8/15/2015 1:44:20 PM	Debug	Update	update process sending request: 01000000FECT00000000000000000000
8/15/2015 1:44:20 PM	Debug	Update	update process sending request: 05002000FVEN00800052039999999999
8/15/2015 1:44:20 PM	Debug	Update	update process sending request: 05002000FCBN00000000009999999999
8/15/2015 1:44:20 PM	Debug	Update	updatetask get virus info file failed
8/15/2015 1:44:20 PM	Debug	Update	update process received object(1 of 3): FCPR
8/15/2015 1:44:20 PM	Debug	Update	update process received object(2 of 3): FDNI
8/15/2015 1:44:20 PM	Debug	Update	update process received object(3 of 3): FECT
8/15/2015 1:44:20 PM	Debug	Update	update done
8/15/2015 1:44:20 PM	Debug	Update	update thread exit
8/15/2015 1:44:20 PM	Debug	Scheduler	FortiTrayApp : Received WM_USER_UPDATE_SUCCESS message, lParam=0x1
8/15/2015 1:44:20 PM	Debug	Update	No update is available.
8/15/2015 1:44:22 PM	Debug	Scheduler	GUI change event
8/15/2015 1:44:24 PM	Debug	Scheduler	handle_processtermination() called
8/15/2015 1:44:24 PM	Debug	Scheduler	child process terminates normally
8/15/2015 1:44:24 PM	Debug	Scheduler	handle_processtermination() called
8/15/2015 1:44:24 PM	Debug	Scheduler	child process terminates normally
8/15/2015 1:44:24 PM	Debug	Scheduler	GUI change event
8/15/2015 1:44:28 PM	Debug	Scheduler	(repeated 2 times in last 4 sec) GUI change event
8/15/2015 1:44:31 PM	Debug	Scheduler	handle_processtermination() called
8/15/2015 1:44:31 PM	Debug	Scheduler	child process terminates normally
8/15/2015 1:44:31 PM	Debug	Scheduler	handle_processtermination() called
8/15/2015 1:44:31 PM	Debug	Scheduler	child process terminates normally
8/15/2015 1:44:31 PM	Debug	Scheduler	GUI change event
8/15/2015 1:44:33 PM	Debug	VPN	hmac(modp1536)
8/15/2015 1:44:32 PM	Debug	VPN	(repeated 1 times in last 0 sec) hmac(modp1536)
8/15/2015 1:44:33 PM	Debug	ESNAC	IP Table Change
8/15/2015 1:44:33 PM	Debug	VPN	configuration found for 96.53.114.130.
8/15/2015 1:44:33 PM	Debug	VPN	IPsec-SA request for 96.53.114.130[500] queued due to no phase1 found.
8/15/2015 1:44:33 PM	Debug	VPN	===
8/15/2015 1:44:33 PM	Debug	VPN	initiate new phase 1 negotiation: 192.168.0.185[500]<=>96.53.114.130[500]
8/15/2015 1:44:33 PM	Debug	VPN	begin Aggressive mode.
8/15/2015 1:44:33 PM	Debug	VPN	new cookie: 9e36c7a2f3e010dd
8/15/2015 1:44:33 PM	Debug	VPN	use ID type of IPv4_address
8/15/2015 1:44:33 PM	Debug	VPN	compute DH's private.
8/15/2015 1:44:33 PM	Debug	VPN	7ef905eb e3c6ae1d a33b8735 412128cd a2c09f81 599a4cc8 986fc099 44669b22 810be417 ed9f36c2 92ad0877 e43a7fb4 b1e5550a 7c94560d 1461e46b 1bc2c205 aeccdba5 33908199 7b3b8b29 c8f5e26f 8a77c3bd f6f54e8b 2fb0b4e3 9c4dff11 769a18fc 33d9d4c4 aca9f200 cfb9a0fe fa14391f 188fff1f d4d1b906 6d3dccd5 cfd1d5ae 27f471b1 7763277f 3dd5fc47 a4189a7b 3e2b9d3e 5a5c6332 dce12647 5d5909a7 de67554c 95e73ecd b629ecb7 4cd74bc1 19483147 af110510 bc0b6d69
8/15/2015 1:44:33 PM	Debug	VPN	compute DH's public.
8/15/2015 1:44:33 PM	Debug	VPN	9f73e9b6 a4b5bfba 86a50de1 5b764ac0 4f8bf7b8 c1865351 64b6496e ff660a40 d152f137 b07c4315 e588df1b 02204f96 0f26b8bc b697b813 bcd2a757 f8f4d1e5 03913f1c 30093119 18f0a135 81d09bec a33fc40e bfc859cd 80898157 4004248a 4e705b03 05d61a67 c6ef870f df70588b 980b4ede 658c840e 4be628f4 8cc7bcd5 306dbe6f ba722232 d8543495 f3cbac64 1a4073c0 fdeb71e8 02e0b391 f82fb058 f8d3c1ce 09a127e7 0aeb9233 702cb56d d521ea2f 1d91c0ac d128cff6 7ea7125b
8/15/2015 1:44:33 PM	Debug	VPN	authmethod is pre-shared key
8/15/2015 1:44:33 PM	Debug	VPN	add payload of len 96, next type 4
8/15/2015 1:44:33 PM	Debug	VPN	add payload of len 192, next type 10
8/15/2015 1:44:33 PM	Debug	VPN	add payload of len 16, next type 5
8/15/2015 1:44:33 PM	Debug	VPN	add payload of len 8, next type 13
8/15/2015 1:44:33 PM	Debug	VPN	add payload of len 16, next type 13
8/15/2015 1:44:33 PM	Debug	VPN	(repeated 3 times in last 0 sec) add payload of len 16, next type 13
8/15/2015 1:44:33 PM	Debug	VPN	add payload of len 8, next type 13
8/15/2015 1:44:33 PM	Debug	VPN	add payload of len 16, next type 13
8/15/2015 1:44:33 PM	Debug	VPN	(repeated 1 times in last 0 sec) add payload of len 16, next type 13
8/15/2015 1:44:33 PM	Debug	VPN	add payload of len 16, next type 0
8/15/2015 1:44:33 PM	Debug	VPN	508 bytes from 192.168.0.185[500] to 96.53.114.130[500]
8/15/2015 1:44:33 PM	Debug	VPN	sockname 0.0.0.0[500]
8/15/2015 1:44:33 PM	Debug	VPN	send packet from 192.168.0.185[500]
8/15/2015 1:44:33 PM	Debug	VPN	send packet to 96.53.114.130[500]
8/15/2015 1:44:33 PM	Debug	VPN	1 times of 508 bytes message will be sent to 96.53.114.130[500]
8/15/2015 1:44:33 PM	Debug	VPN	9e36c7a2 f3e010dd 00000000 00000000 01100400 00000000 000001fc 04000064 00000001 00000001 00000058 01010002 03000028 01010000 800b0001 000c0004 00015180 80010007 800e0080 80030001 80020002 80040005 00000028 02010000 800b0001 000c0004 00015180 80010007 800e0100 80030001 80020004 80040005 0a0000c4 9f73e9b6 a4b5bfba 86a50de1 5b764ac0 4f8bf7b8 c1865351 64b6496e ff660a40 d152f137 b07c4315 e588df1b 02204f96 0f26b8bc b697b813 bcd2a757 f8f4d1e5 03913f1c 30093119 18f0a135 81d09bec a33fc40e bfc859cd 80898157 4004248a 4e705b03 05d61a67 c6ef870f df70588b 980b4ede 658c840e 4be628f4 8cc7bcd5 306dbe6f ba722232 d8543495 f3cbac64 1a4073c0 fdeb71e8 02e0b391 f82fb058 f8d3c1ce 09a127e7 0aeb9233 702cb56d d521ea2f 1d91c0ac d128cff6 7ea7125b 05000014 be273795 27920211 cb4fb742 b326fd06 0d00000c 01000000 c0a800b9 0d000014 12f5f28c 457168a9 702d9fe2 74cc0100 0d000014 4a131c81 07035845 5c5728f2 0e95452f 0d000014 cd604643 35df21f8 7cfdb2fc 68b6a448 0d000014 90cb8091 3ebb696e 086381b5 ec427b1f 0d00000c 09002689 dfd6b712 0d000014 afcad
8/15/2015 1:44:33 PM	Debug	VPN	resend phase1 packet 9e36c7a2f3e010dd:0000000000000000
8/15/2015 1:44:33 PM	Notice	VPN	id=96566 msg="negotiation information, loc_ip=192.168.0.185 loc_port=500 rem_ip=96.53.114.130 rem_port=500 out_if=0 vpn_tunnel=Willowglen action=negotiate init=local mode=aggressive stage=1 dir=outbound status=success Initiator: sent 96.53.114.130 aggressive mode message #1" vpntunnel=Willowglen vpntype=ipsec
8/15/2015 1:44:33 PM	Debug	VPN	===
8/15/2015 1:44:33 PM	Debug	VPN	500 bytes message received from 96.53.114.130[500] to 192.168.0.185[500]
8/15/2015 1:44:33 PM	Debug	VPN	9e36c7a2 f3e010dd 7e55b5f0 6c94cf2d 01100400 00000000 000001f4 0400003c 00000001 00000001 00000030 01010001 00000028 01010000 800b0001 000c0004 00015180 80010007 800e0080 80030001 80020002 80040005 0a0000c4 e86a9b53 9b438650 cb96499a 70f8e279 208bba89 ab4e5bc7 c096e1a4 a71977d2 0f0e37d5 b6c2e509 cff7e197 ed1ac3fd 82f0e98e 9ba20b64 750f48ef fa9ecd9f c4a682f1 38894c39 457fb32b 8548ddfd f7644575 fa4969e3 33814fe3 a3e39894 134f8770 1da7127b 6ba2805d 1cae79d6 68cfa70e dd7b008e 38117512 6af6162c 383c2b68 7c406c61 c1663397 d0644334 c09c43a5 8980204d f7d10ea3 55378be0 803ccd36 c677f22b 3fc63ef4 7340f50b 94b2df93 3584f41b a3ebc508 c2d5e7b7 05000014 2791316f c1755ba2 ab931f97 e1f76422 0800000c 01000000 60357282 0d000018 4abf4ff8 eca14630 9306a0c3 ca65c8dc fb2e7539 14000014 4a131c81 07035845 5c5728f2 0e95452f 14000018 bdea4f19 95328f9f a852b7c7 6d570813 677f2924 0d000018 8529ad60 9f7136ff 94a9be13 de1488d2 b98920ed 0d000014 afcad713 68a1f1c9 6b8696fc 77570100 0d00000c 09002689 dfd6b712 0d000014 12f5f28c 457168a9 702d9
8/15/2015 1:44:33 PM	Debug	VPN	begin.
8/15/2015 1:44:33 PM	Debug	VPN	seen nptype=1(sa)
8/15/2015 1:44:33 PM	Debug	VPN	seen nptype=4(ke)
8/15/2015 1:44:33 PM	Debug	VPN	seen nptype=10(nonce)
8/15/2015 1:44:33 PM	Debug	VPN	seen nptype=5(id)
8/15/2015 1:44:33 PM	Debug	VPN	seen nptype=8(hash)
8/15/2015 1:44:33 PM	Debug	VPN	seen nptype=13(vid)
8/15/2015 1:44:33 PM	Debug	VPN	seen nptype=20(nat-d)
8/15/2015 1:44:33 PM	Debug	VPN	(repeated 1 times in last 0 sec) seen nptype=20(nat-d)
8/15/2015 1:44:33 PM	Debug	VPN	seen nptype=13(vid)
8/15/2015 1:44:33 PM	Debug	VPN	(repeated 4 times in last 0 sec) seen nptype=13(vid)
8/15/2015 1:44:33 PM	Debug	VPN	succeed.
8/15/2015 1:44:33 PM	Debug	VPN	received Vendor ID: RFC 3947
8/15/2015 1:44:33 PM	Debug	VPN	received Vendor ID: DPD
8/15/2015 1:44:33 PM	Debug	VPN	remote supports DPD
8/15/2015 1:44:33 PM	Debug	VPN	received Vendor ID: draft-ietf-ipsra-isakmp-xauth-06.txt
8/15/2015 1:44:33 PM	Debug	VPN	received unknown Vendor ID
8/15/2015 1:44:33 PM	Debug	VPN	received Vendor ID: forticlient connect license
8/15/2015 1:44:33 PM	Debug	VPN	remote supports FCC
8/15/2015 1:44:33 PM	Debug	VPN	received unknown Vendor ID
8/15/2015 1:44:33 PM	Debug	VPN	total SA len=56
8/15/2015 1:44:33 PM	Debug	VPN	00000001 00000001 00000030 01010001 00000028 01010000 800b0001 000c0004 00015180 80010007 800e0080 80030001 80020002 80040005
8/15/2015 1:44:33 PM	Debug	VPN	begin.
8/15/2015 1:44:33 PM	Debug	VPN	seen nptype=2(prop)
8/15/2015 1:44:33 PM	Debug	VPN	succeed.
8/15/2015 1:44:33 PM	Debug	VPN	proposal #1 len=48
8/15/2015 1:44:33 PM	Debug	VPN	begin.
8/15/2015 1:44:33 PM	Debug	VPN	seen nptype=3(trns)
8/15/2015 1:44:33 PM	Debug	VPN	succeed.
8/15/2015 1:44:33 PM	Debug	VPN	transform #1 len=40
8/15/2015 1:44:33 PM	Debug	VPN	type=Life Type, flag=0x8000, lorv=seconds
8/15/2015 1:44:33 PM	Debug	VPN	type=Life Duration, flag=0x0000, lorv=4
8/15/2015 1:44:33 PM	Debug	VPN	type=Encryption Algorithm, flag=0x8000, lorv=AES-CBC
8/15/2015 1:44:33 PM	Debug	VPN	encryption(aes128)
8/15/2015 1:44:33 PM	Debug	VPN	type=Key Length, flag=0x8000, lorv=128
8/15/2015 1:44:33 PM	Debug	VPN	type=Authentication Method, flag=0x8000, lorv=pre-shared key
8/15/2015 1:44:33 PM	Debug	VPN	type=Hash Algorithm, flag=0x8000, lorv=SHA
8/15/2015 1:44:33 PM	Debug	VPN	hash(sha1)
8/15/2015 1:44:33 PM	Debug	VPN	type=Group Description, flag=0x8000, lorv=1536-bit MODP group
8/15/2015 1:44:33 PM	Debug	VPN	hmac(modp1536)
8/15/2015 1:44:33 PM	Debug	VPN	pair 1:
8/15/2015 1:44:33 PM	Debug	VPN	00493D28: next=00000000 tnext=00000000
8/15/2015 1:44:33 PM	Debug	VPN	proposal #1: 1 transform
8/15/2015 1:44:33 PM	Debug	VPN	prop#=1, prot-id=ISAKMP, spi-size=0, #trns=1
8/15/2015 1:44:33 PM	Debug	VPN	trns#=1, trns-id=IKE
8/15/2015 1:44:33 PM	Debug	VPN	type=Life Type, flag=0x8000, lorv=seconds
8/15/2015 1:44:33 PM	Debug	VPN	type=Life Duration, flag=0x0000, lorv=4
8/15/2015 1:44:33 PM	Debug	VPN	type=Encryption Algorithm, flag=0x8000, lorv=AES-CBC
8/15/2015 1:44:33 PM	Debug	VPN	type=Key Length, flag=0x8000, lorv=128
8/15/2015 1:44:33 PM	Debug	VPN	type=Authentication Method, flag=0x8000, lorv=pre-shared key
8/15/2015 1:44:33 PM	Debug	VPN	type=Hash Algorithm, flag=0x8000, lorv=SHA
8/15/2015 1:44:33 PM	Debug	VPN	type=Group Description, flag=0x8000, lorv=1536-bit MODP group
8/15/2015 1:44:33 PM	Debug	VPN	Compared: DB:Peer
8/15/2015 1:44:33 PM	Debug	VPN	(lifetime = 86400:86400)
8/15/2015 1:44:33 PM	Debug	VPN	(lifebyte = zu:zu)
8/15/2015 1:44:33 PM	Debug	VPN	enctype = AES-CBC:AES-CBC
8/15/2015 1:44:33 PM	Debug	VPN	(encklen = 128:128)
8/15/2015 1:44:33 PM	Debug	VPN	hashtype = SHA:SHA
8/15/2015 1:44:33 PM	Debug	VPN	authmethod = pre-shared key:pre-shared key
8/15/2015 1:44:33 PM	Debug	VPN	dh_group = 1536-bit MODP group:1536-bit MODP group
8/15/2015 1:44:33 PM	Debug	VPN	an acceptable proposal found.
8/15/2015 1:44:33 PM	Debug	VPN	hmac(modp1536)
8/15/2015 1:44:33 PM	Debug	VPN	Selected NAT-T version: RFC 3947
8/15/2015 1:44:33 PM	Debug	VPN	Hashing 192.168.0.185[500] with algo #2
8/15/2015 1:44:33 PM	Debug	VPN	hash(sha1)
8/15/2015 1:44:33 PM	Debug	VPN	NAT-D payload #-1 doesn't match
8/15/2015 1:44:33 PM	Debug	VPN	Hashing 96.53.114.130[500] with algo #2
8/15/2015 1:44:33 PM	Debug	VPN	hash(sha1)
8/15/2015 1:44:33 PM	Debug	VPN	NAT-D payload #0 verified
8/15/2015 1:44:33 PM	Debug	VPN	NAT detected: ME
8/15/2015 1:44:33 PM	Debug	VPN	compute DH's shared.
8/15/2015 1:44:33 PM	Debug	VPN	8655ca90 159bc2d4 7ff7ffbd 8cbbaadf b15cf9bf a80e9230 c9a27700 9c3fdc54 8f9197e7 1af86d6d 2da4d03b be4385b7 9cf7d461 f38ee0cc 2806ddd9 39231085 1702215a 9bd943cb 13ecae16 169bca03 d28e5da3 d8b5ec89 894d3a24 f996f685 dba0293d 3fdf943e 8835bcd0 70447b3a 23ae1a42 efd4e950 ef7b6081 55cf9d54 bb1c3b10 a6ba3005 5c0b90ff f31fa9c9 b5219e0a 19a877ee 1220de54 da75eaa2 645c4d05 71effefc 6f79e7d2 11d99bcd 1c600f7f bba8e0d2 8594f296 8793b56f
8/15/2015 1:44:33 PM	Debug	VPN	the psk found.
8/15/2015 1:44:33 PM	Debug	VPN	psk:
8/15/2015 1:44:33 PM	Debug	VPN	2d303957 676c654e 21402377 696c6c6f 77676c65 6e
8/15/2015 1:44:33 PM	Debug	VPN	nonce 1:
8/15/2015 1:44:33 PM	Debug	VPN	be273795 27920211 cb4fb742 b326fd06
8/15/2015 1:44:33 PM	Debug	VPN	nonce 2:
8/15/2015 1:44:33 PM	Debug	VPN	2791316f c1755ba2 ab931f97 e1f76422
8/15/2015 1:44:33 PM	Debug	VPN	hmac(hmac_sha1)
8/15/2015 1:44:33 PM	Debug	VPN	SKEYID computed:
8/15/2015 1:44:33 PM	Debug	VPN	359293e1 c717038d 65e8f09f eb829af7 5b770f06
8/15/2015 1:44:33 PM	Debug	VPN	hmac(hmac_sha1)
8/15/2015 1:44:33 PM	Debug	VPN	SKEYID_d computed:
8/15/2015 1:44:33 PM	Debug	VPN	a2a3754e eb4c5e1e 1bc0f6d8 b82afe9b fb09ba42
8/15/2015 1:44:33 PM	Debug	VPN	hmac(hmac_sha1)
8/15/2015 1:44:33 PM	Debug	VPN	SKEYID_a computed:
8/15/2015 1:44:33 PM	Debug	VPN	e3317dc4 fe02f601 3557bad3 6d78d3e7 152afe66
8/15/2015 1:44:33 PM	Debug	VPN	hmac(hmac_sha1)
8/15/2015 1:44:33 PM	Debug	VPN	SKEYID_e computed:
8/15/2015 1:44:33 PM	Debug	VPN	d097c0fa 4697fe00 50df4059 187dbf38 a7eef9ea
8/15/2015 1:44:33 PM	Debug	VPN	encryption(aes128)
8/15/2015 1:44:33 PM	Debug	VPN	hash(sha1)
8/15/2015 1:44:33 PM	Debug	VPN	final encryption key computed:
8/15/2015 1:44:33 PM	Debug	VPN	ISAKMP-SA established 192.168.0.185[4500]-96.53.114.130[4500] spi:9e36c7a2f3e010dd:7e55b5f06c94cf2d
8/15/2015 1:44:33 PM	Debug	VPN	===
8/15/2015 1:44:33 PM	Debug	VPN	(repeated 1 times in last 0 sec) ===
8/15/2015 1:44:34 PM	Debug	VPN	108 bytes message received from 96.53.114.130[4500] to 192.168.0.185[4500]
8/15/2015 1:44:34 PM	Debug	VPN	9e36c7a2 f3e010dd 7e55b5f0 6c94cf2d 08100501 6fe4a203 0000006c af1430d8 a39aa30d fb119f32 50805c2e 82f657dd 79b5b88d 350fd2a6 287520d1 1c2f4039 b8d5e049 7e42504e 2d9cd9a5 22c7cd57 72e7e2e5 daff3406 70e46133 c96b30a9 87d4b738 f90a5148 ff82e6bf
8/15/2015 1:44:34 PM	Debug	VPN	receive Information.
8/15/2015 1:44:34 PM	Debug	VPN	compute IV for phase2
8/15/2015 1:44:34 PM	Debug	VPN	phase1 last IV:
8/15/2015 1:44:34 PM	Debug	VPN	685a83d2 d77c963f 34b254ec 26d619c8 6fe4a203
8/15/2015 1:44:34 PM	Debug	VPN	hash(sha1)
8/15/2015 1:44:34 PM	Debug	VPN	encryption(aes128)
8/15/2015 1:44:34 PM	Debug	VPN	phase2 IV computed:
8/15/2015 1:44:34 PM	Debug	VPN	89d3aef9 f134a053 c25145a0 bbacba3d
8/15/2015 1:44:34 PM	Debug	VPN	begin decryption.
8/15/2015 1:44:34 PM	Debug	VPN	encryption(aes128)
8/15/2015 1:44:34 PM	Debug	VPN	IV was saved for next processing:
8/15/2015 1:44:34 PM	Debug	VPN	c96b30a9 87d4b738 f90a5148 ff82e6bf
8/15/2015 1:44:34 PM	Debug	VPN	encryption(aes128)
8/15/2015 1:44:34 PM	Debug	VPN	with key:
8/15/2015 1:44:34 PM	Debug	VPN	d097c0fa 4697fe00 50df4059 187dbf38
8/15/2015 1:44:34 PM	Debug	VPN	decrypted payload by IV:
8/15/2015 1:44:34 PM	Debug	VPN	89d3aef9 f134a053 c25145a0 bbacba3d
8/15/2015 1:44:34 PM	Debug	VPN	decrypted payload, but not trimed.
8/15/2015 1:44:34 PM	Debug	VPN	0b000018 da6d0713 25543ca9 ff2982c3 86923c88 31d3493b 00000028 00000001 01106000 9e36c7a2 f3e010dd 7e55b5f0 6c94cf2d 800b0001 000c0004 00007080 f35688f9 efcf6662 0195e669 e589340f
8/15/2015 1:44:34 PM	Debug	VPN	padding len=16
8/15/2015 1:44:34 PM	Debug	VPN	skip to trim padding.
8/15/2015 1:44:34 PM	Debug	VPN	decrypted.
8/15/2015 1:44:34 PM	Debug	VPN	9e36c7a2 f3e010dd 7e55b5f0 6c94cf2d 08100501 6fe4a203 0000006c 0b000018 da6d0713 25543ca9 ff2982c3 86923c88 31d3493b 00000028 00000001 01106000 9e36c7a2 f3e010dd 7e55b5f0 6c94cf2d 800b0001 000c0004 00007080 f35688f9 efcf6662 0195e669 e589340f
8/15/2015 1:44:34 PM	Debug	VPN	HASH with:
8/15/2015 1:44:34 PM	Debug	VPN	6fe4a203 00000028 00000001 01106000 9e36c7a2 f3e010dd 7e55b5f0 6c94cf2d 800b0001 000c0004 00007080
8/15/2015 1:44:34 PM	Debug	VPN	hmac(hmac_sha1)
8/15/2015 1:44:34 PM	Debug	VPN	HASH computed:
8/15/2015 1:44:34 PM	Debug	VPN	da6d0713 25543ca9 ff2982c3 86923c88 31d3493b
8/15/2015 1:44:34 PM	Debug	VPN	hash validated.
8/15/2015 1:44:34 PM	Debug	VPN	begin.
8/15/2015 1:44:34 PM	Debug	VPN	seen nptype=8(hash)
8/15/2015 1:44:34 PM	Debug	VPN	seen nptype=11(notify)
8/15/2015 1:44:34 PM	Debug	VPN	succeed.
8/15/2015 1:44:34 PM	Debug	VPN	notification message 24576:RESPONDER-LIFETIME, doi=1 proto_id=1 spi=9e36c7a2f3e010dd 7e55b5f06c94cf2d (size=16).
8/15/2015 1:44:34 PM	Debug	VPN	===
8/15/2015 1:44:34 PM	Debug	VPN	76 bytes message received from 96.53.114.130[4500] to 192.168.0.185[4500]
8/15/2015 1:44:34 PM	Debug	VPN	9e36c7a2 f3e010dd 7e55b5f0 6c94cf2d 08100601 1470d0ed 0000004c a190e897 a4a1ba96 48492451 6dd9647e eed4f7e8 ee90f6c4 44c76394 e937609c 15212b63 5868c216 a540edac 9c42f032
8/15/2015 1:44:34 PM	Debug	VPN	compute IV for phase2
8/15/2015 1:44:34 PM	Debug	VPN	phase1 last IV:
8/15/2015 1:44:34 PM	Debug	VPN	685a83d2 d77c963f 34b254ec 26d619c8 1470d0ed
8/15/2015 1:44:34 PM	Debug	VPN	hash(sha1)
8/15/2015 1:44:34 PM	Debug	VPN	encryption(aes128)
8/15/2015 1:44:34 PM	Debug	VPN	phase2 IV computed:
8/15/2015 1:44:34 PM	Debug	VPN	875882be 75866236 57c4993f 02d6e539
8/15/2015 1:44:34 PM	Debug	VPN	begin decryption.
8/15/2015 1:44:34 PM	Debug	VPN	encryption(aes128)
8/15/2015 1:44:34 PM	Debug	VPN	IV was saved for next processing:
8/15/2015 1:44:34 PM	Debug	VPN	15212b63 5868c216 a540edac 9c42f032
8/15/2015 1:44:34 PM	Debug	VPN	encryption(aes128)
8/15/2015 1:44:34 PM	Debug	VPN	with key:
8/15/2015 1:44:34 PM	Debug	VPN	d097c0fa 4697fe00 50df4059 187dbf38
8/15/2015 1:44:34 PM	Debug	VPN	decrypted payload by IV:
8/15/2015 1:44:34 PM	Debug	VPN	875882be 75866236 57c4993f 02d6e539
8/15/2015 1:44:34 PM	Debug	VPN	decrypted payload, but not trimed.
8/15/2015 1:44:34 PM	Debug	VPN	0e000018 d6b8e5ea f624c487 e0e95368 94843c4d c41a9ef7 00000014 01007b84 c0880000 40890000 408a0000 c5b23c03
8/15/2015 1:44:34 PM	Debug	VPN	padding len=4
8/15/2015 1:44:34 PM	Debug	VPN	skip to trim padding.
8/15/2015 1:44:34 PM	Debug	VPN	decrypted.
8/15/2015 1:44:34 PM	Debug	VPN	9e36c7a2 f3e010dd 7e55b5f0 6c94cf2d 08100601 1470d0ed 0000004c 0e000018 d6b8e5ea f624c487 e0e95368 94843c4d c41a9ef7 00000014 01007b84 c0880000 40890000 408a0000 c5b23c03
8/15/2015 1:44:34 PM	Debug	VPN	MODE_CFG packet
8/15/2015 1:44:34 PM	Debug	VPN	9e36c7a2 f3e010dd 7e55b5f0 6c94cf2d 08100601 1470d0ed 0000004c 0e000018 d6b8e5ea f624c487 e0e95368 94843c4d c41a9ef7 00000014 01007b84 c0880000 40890000 408a0000 c5b23c03
8/15/2015 1:44:34 PM	Debug	VPN	Seen payload 8
8/15/2015 1:44:34 PM	Debug	VPN	0e000018 d6b8e5ea f624c487 e0e95368 94843c4d c41a9ef7
8/15/2015 1:44:34 PM	Debug	VPN	HASH with:
8/15/2015 1:44:34 PM	Debug	VPN	1470d0ed 00000014 01007b84 c0880000 40890000 408a0000
8/15/2015 1:44:34 PM	Debug	VPN	hmac(hmac_sha1)
8/15/2015 1:44:34 PM	Debug	VPN	HASH computed:
8/15/2015 1:44:34 PM	Debug	VPN	d6b8e5ea f624c487 e0e95368 94843c4d c41a9ef7
8/15/2015 1:44:34 PM	Debug	VPN	Seen payload 14
8/15/2015 1:44:34 PM	Debug	VPN	00000014 01007b84 c0880000 40890000 408a0000
8/15/2015 1:44:34 PM	Debug	VPN	Short attribute 16520 = 0
8/15/2015 1:44:34 PM	Debug	VPN	Attribute 16521, len 0
8/15/2015 1:44:34 PM	Debug	VPN	Attribute 16522, len 0
8/15/2015 1:44:34 PM	Debug	VPN	HASH with:
8/15/2015 1:44:34 PM	Debug	VPN	1470d0ed 00000026 02007b84 c0880000 40890007 622e6a65 74686140 8a000b2a 4368696c 69646f67 362a
8/15/2015 1:44:34 PM	Debug	VPN	hmac(hmac_sha1)
8/15/2015 1:44:34 PM	Debug	VPN	HASH computed:
8/15/2015 1:44:34 PM	Debug	VPN	58190ba0 447f81c0 6b5e0592 3c799170 56c7bf44
8/15/2015 1:44:34 PM	Debug	VPN	MODE_CFG packet to send
8/15/2015 1:44:34 PM	Debug	VPN	9e36c7a2 f3e010dd 7e55b5f0 6c94cf2d 08100601 1470d0ed 0000005a 0e000018 58190ba0 447f81c0 6b5e0592 3c799170 56c7bf44 00000026 02007b84 c0880000 40890007 622e6a65 74686140 8a000b2a 4368696c 69646f67 362a
8/15/2015 1:44:34 PM	Debug	VPN	begin encryption.
8/15/2015 1:44:34 PM	Debug	VPN	encryption(aes128)
8/15/2015 1:44:34 PM	Debug	VPN	pad length = 2
8/15/2015 1:44:34 PM	Debug	VPN	0e000018 58190ba0 447f81c0 6b5e0592 3c799170 56c7bf44 00000026 02007b84 c0880000 40890007 622e6a65 74686140 8a000b2a 4368696c 69646f67 362a9201
8/15/2015 1:44:34 PM	Debug	VPN	encryption(aes128)
8/15/2015 1:44:34 PM	Debug	VPN	with key:
8/15/2015 1:44:34 PM	Debug	VPN	d097c0fa 4697fe00 50df4059 187dbf38
8/15/2015 1:44:34 PM	Debug	VPN	encrypted payload by IV:
8/15/2015 1:44:34 PM	Debug	VPN	15212b63 5868c216 a540edac 9c42f032
8/15/2015 1:44:34 PM	Debug	VPN	save IV for next:
8/15/2015 1:44:34 PM	Debug	VPN	7d6a8d2a bb49494f e34ed6e2 5e71e3c8
8/15/2015 1:44:34 PM	Debug	VPN	encrypted.
8/15/2015 1:44:34 PM	Debug	VPN	sendto mode config attr.
8/15/2015 1:44:34 PM	Debug	VPN	Adding NON-ESP marker
8/15/2015 1:44:34 PM	Debug	VPN	96 bytes from 192.168.0.185[4500] to 96.53.114.130[4500]
8/15/2015 1:44:34 PM	Debug	VPN	sockname 192.168.0.185[4500]
8/15/2015 1:44:34 PM	Debug	VPN	send packet from 192.168.0.185[4500]
8/15/2015 1:44:34 PM	Debug	VPN	send packet to 96.53.114.130[4500]
8/15/2015 1:44:34 PM	Debug	VPN	1 times of 96 bytes message will be sent to 96.53.114.130[4500]
8/15/2015 1:44:34 PM	Debug	VPN	00000000 9e36c7a2 f3e010dd 7e55b5f0 6c94cf2d 08100601 1470d0ed 0000005c 060134ed 56d44072 481bc075 13a035a4 ab761bbe dda0ed03 78c783b6 cc4c6d07 2fac010a 96de2f4e 8c6fa983 5e122582 7d6a8d2a bb49494f e34ed6e2 5e71e3c8
8/15/2015 1:44:34 PM	Notice	VPN	id=96566 msg="negotiation information, loc_ip=192.168.0.185 loc_port=4500 rem_ip=96.53.114.130 rem_port=4500 out_if=0 vpn_tunnel=Willowglen action=negotiate init=remote mode=xauth_client stage=0 dir=inbound status=success Responder: parsed 96.53.114.130 xauth_client mode me" vpntunnel=Willowglen vpntype=ipsec
8/15/2015 1:44:34 PM	Debug	VPN	===
8/15/2015 1:44:34 PM	Debug	VPN	76 bytes message received from 96.53.114.130[4500] to 192.168.0.185[4500]
8/15/2015 1:44:34 PM	Debug	VPN	9e36c7a2 f3e010dd 7e55b5f0 6c94cf2d 08100601 9ebf98cd 0000004c bce5a6ba 05dbf3d5 cd943651 b72451b6 a6d03b7b 443aa2c6 0f3e9e73 85f0e514 ccf4b994 bb3f9a31 f275f20d 872e5d22
8/15/2015 1:44:34 PM	Debug	VPN	compute IV for phase2
8/15/2015 1:44:34 PM	Debug	VPN	phase1 last IV:
8/15/2015 1:44:34 PM	Debug	VPN	685a83d2 d77c963f 34b254ec 26d619c8 9ebf98cd
8/15/2015 1:44:34 PM	Debug	VPN	hash(sha1)
8/15/2015 1:44:34 PM	Debug	VPN	encryption(aes128)
8/15/2015 1:44:34 PM	Debug	VPN	phase2 IV computed:
8/15/2015 1:44:34 PM	Debug	VPN	de2dfd23 185ed2f1 fd8be4b1 e2bffec8
8/15/2015 1:44:34 PM	Debug	VPN	begin decryption.
8/15/2015 1:44:34 PM	Debug	VPN	encryption(aes128)
8/15/2015 1:44:34 PM	Debug	VPN	IV was saved for next processing:
8/15/2015 1:44:34 PM	Debug	VPN	ccf4b994 bb3f9a31 f275f20d 872e5d22
8/15/2015 1:44:34 PM	Debug	VPN	encryption(aes128)
8/15/2015 1:44:34 PM	Debug	VPN	with key:
8/15/2015 1:44:34 PM	Debug	VPN	d097c0fa 4697fe00 50df4059 187dbf38
8/15/2015 1:44:34 PM	Debug	VPN	decrypted payload by IV:
8/15/2015 1:44:34 PM	Debug	VPN	de2dfd23 185ed2f1 fd8be4b1 e2bffec8
8/15/2015 1:44:34 PM	Debug	VPN	decrypted payload, but not trimed.
8/15/2015 1:44:34 PM	Debug	VPN	0e000018 fa1d6beb b7c1650e 6a449e0b 2bc27891 10a5cd24 0000000c 03007b84 c08f0001 8136b53f a750d5af 73722d0b
8/15/2015 1:44:34 PM	Debug	VPN	padding len=12
8/15/2015 1:44:34 PM	Debug	VPN	skip to trim padding.
8/15/2015 1:44:34 PM	Debug	VPN	decrypted.
8/15/2015 1:44:34 PM	Debug	VPN	9e36c7a2 f3e010dd 7e55b5f0 6c94cf2d 08100601 9ebf98cd 0000004c 0e000018 fa1d6beb b7c1650e 6a449e0b 2bc27891 10a5cd24 0000000c 03007b84 c08f0001 8136b53f a750d5af 73722d0b
8/15/2015 1:44:34 PM	Debug	VPN	MODE_CFG packet
8/15/2015 1:44:34 PM	Debug	VPN	9e36c7a2 f3e010dd 7e55b5f0 6c94cf2d 08100601 9ebf98cd 0000004c 0e000018 fa1d6beb b7c1650e 6a449e0b 2bc27891 10a5cd24 0000000c 03007b84 c08f0001 8136b53f a750d5af 73722d0b
8/15/2015 1:44:34 PM	Debug	VPN	Seen payload 8
8/15/2015 1:44:34 PM	Debug	VPN	0e000018 fa1d6beb b7c1650e 6a449e0b 2bc27891 10a5cd24
8/15/2015 1:44:34 PM	Debug	VPN	HASH with:
8/15/2015 1:44:34 PM	Debug	VPN	9ebf98cd 0000000c 03007b84 c08f0001
8/15/2015 1:44:34 PM	Debug	VPN	hmac(hmac_sha1)
8/15/2015 1:44:34 PM	Debug	VPN	HASH computed:
8/15/2015 1:44:34 PM	Debug	VPN	fa1d6beb b7c1650e 6a449e0b 2bc27891 10a5cd24
8/15/2015 1:44:34 PM	Debug	VPN	Seen payload 14
8/15/2015 1:44:34 PM	Debug	VPN	0000000c 03007b84 c08f0001
8/15/2015 1:44:34 PM	Notice	VPN	id=96566 msg="negotiation information, loc_ip=192.168.0.185 loc_port=4500 rem_ip=96.53.114.130 rem_port=4500 out_if=0 vpn_tunnel=Willowglen action=negotiate init=remote mode=xauth_client stage=2 dir=inbound status=success Responder: parsed 96.53.114.130 xauth_client mode me" vpntunnel=Willowglen vpntype=ipsec
8/15/2015 1:44:34 PM	Notice	VPN	id=96566 msg="negotiation information, loc_ip=192.168.0.185 loc_port=4500 rem_ip=96.53.114.130 rem_port=4500 out_if=0 vpn_tunnel=Willowglen action=negotiate init=local mode=xauth_client stage=0 dir=inbound status=success Initiator: parsed 96.53.114.130 xauth_client mode mes" vpntunnel=Willowglen vpntype=ipsec
8/15/2015 1:44:34 PM	Debug	VPN	Sending MODE_CFG ACK
8/15/2015 1:44:34 PM	Debug	VPN	HASH with:
8/15/2015 1:44:34 PM	Debug	VPN	9ebf98cd 00000008 04007b84
8/15/2015 1:44:34 PM	Debug	VPN	hmac(hmac_sha1)
8/15/2015 1:44:35 PM	Debug	VPN	HASH computed:
8/15/2015 1:44:35 PM	Debug	VPN	6f591aa2 c1436428 47572904 06b55d1f 7ebef336
8/15/2015 1:44:35 PM	Debug	VPN	MODE_CFG packet to send
8/15/2015 1:44:35 PM	Debug	VPN	9e36c7a2 f3e010dd 7e55b5f0 6c94cf2d 08100601 9ebf98cd 0000003c 0e000018 6f591aa2 c1436428 47572904 06b55d1f 7ebef336 00000008 04007b84
8/15/2015 1:44:35 PM	Debug	VPN	begin encryption.
8/15/2015 1:44:35 PM	Debug	VPN	encryption(aes128)
8/15/2015 1:44:35 PM	Debug	VPN	pad length = 16
8/15/2015 1:44:35 PM	Debug	VPN	0e000018 6f591aa2 c1436428 47572904 06b55d1f 7ebef336 00000008 04007b84 81bfa090 ce8bccb0 d8ffacd0 dbc1cb0f
8/15/2015 1:44:35 PM	Debug	VPN	encryption(aes128)
8/15/2015 1:44:35 PM	Debug	VPN	with key:
8/15/2015 1:44:35 PM	Debug	VPN	d097c0fa 4697fe00 50df4059 187dbf38
8/15/2015 1:44:35 PM	Debug	VPN	encrypted payload by IV:
8/15/2015 1:44:35 PM	Debug	VPN	ccf4b994 bb3f9a31 f275f20d 872e5d22
8/15/2015 1:44:35 PM	Debug	VPN	save IV for next:
8/15/2015 1:44:35 PM	Debug	VPN	3f4569df 8a0113f9 b6ba57c0 69c70162
8/15/2015 1:44:35 PM	Debug	VPN	encrypted.
8/15/2015 1:44:35 PM	Debug	VPN	sendto mode config attr.
8/15/2015 1:44:35 PM	Debug	VPN	Adding NON-ESP marker
8/15/2015 1:44:35 PM	Debug	VPN	80 bytes from 192.168.0.185[4500] to 96.53.114.130[4500]
8/15/2015 1:44:35 PM	Debug	VPN	sockname 192.168.0.185[4500]
8/15/2015 1:44:35 PM	Debug	VPN	send packet from 192.168.0.185[4500]
8/15/2015 1:44:35 PM	Debug	VPN	send packet to 96.53.114.130[4500]
8/15/2015 1:44:35 PM	Debug	VPN	1 times of 80 bytes message will be sent to 96.53.114.130[4500]
8/15/2015 1:44:35 PM	Debug	VPN	00000000 9e36c7a2 f3e010dd 7e55b5f0 6c94cf2d 08100601 9ebf98cd 0000004c 63322c3b 362a67e2 9ceb8013 5bb9903b db785cc5 38bbc877 801d4dd0 d671fe24 3f4569df 8a0113f9 b6ba57c0 69c70162
8/15/2015 1:44:35 PM	Notice	VPN	id=96566 msg="negotiation information, loc_ip=192.168.0.185 loc_port=4500 rem_ip=96.53.114.130 rem_port=4500 out_if=0 vpn_tunnel=Willowglen action=negotiate init=remote mode=xauth_client stage=0 dir=inbound status=success Responder: parsed 96.53.114.130 xauth_client mode me" vpntunnel=Willowglen vpntype=ipsec
8/15/2015 1:44:35 PM	Debug	VPN	Sending MODE_CFG REQUEST
8/15/2015 1:44:35 PM	Debug	VPN	compute IV for phase2
8/15/2015 1:44:35 PM	Debug	VPN	phase1 last IV:
8/15/2015 1:44:35 PM	Debug	VPN	685a83d2 d77c963f 34b254ec 26d619c8 b0bb4905
8/15/2015 1:44:35 PM	Debug	VPN	hash(sha1)
8/15/2015 1:44:35 PM	Debug	VPN	encryption(aes128)
8/15/2015 1:44:35 PM	Debug	VPN	phase2 IV computed:
8/15/2015 1:44:35 PM	Debug	VPN	022521f1 af7add06 0651984a 358603e3
8/15/2015 1:44:35 PM	Debug	VPN	HASH with:
8/15/2015 1:44:35 PM	Debug	VPN	b0bb4905 00000040 0100d2b9 00010000 00020000 00030000 00040000 000d0000 70000000 70020000 70030000 70040000 70060000 70010000 d40a0000 d40b0000 00070000
8/15/2015 1:44:35 PM	Debug	VPN	hmac(hmac_sha1)
8/15/2015 1:44:35 PM	Debug	VPN	HASH computed:
8/15/2015 1:44:35 PM	Debug	VPN	05367dfe 8aada21d 6dd32dbb ab18fcb7 00ec07b8
8/15/2015 1:44:35 PM	Debug	VPN	MODE_CFG packet to send
8/15/2015 1:44:35 PM	Debug	VPN	9e36c7a2 f3e010dd 7e55b5f0 6c94cf2d 08100601 b0bb4905 00000074 0e000018 05367dfe 8aada21d 6dd32dbb ab18fcb7 00ec07b8 00000040 0100d2b9 00010000 00020000 00030000 00040000 000d0000 70000000 70020000 70030000 70040000 70060000 70010000 d40a0000 d40b0000 00070000
8/15/2015 1:44:35 PM	Debug	VPN	begin encryption.
8/15/2015 1:44:35 PM	Debug	VPN	encryption(aes128)
8/15/2015 1:44:35 PM	Debug	VPN	pad length = 8
8/15/2015 1:44:35 PM	Debug	VPN	0e000018 05367dfe 8aada21d 6dd32dbb ab18fcb7 00ec07b8 00000040 0100d2b9 00010000 00020000 00030000 00040000 000d0000 70000000 70020000 70030000 70040000 70060000 70010000 d40a0000 d40b0000 00070000 e1c1acd5 c79edd07
8/15/2015 1:44:35 PM	Debug	VPN	encryption(aes128)
8/15/2015 1:44:35 PM	Debug	VPN	with key:
8/15/2015 1:44:35 PM	Debug	VPN	d097c0fa 4697fe00 50df4059 187dbf38
8/15/2015 1:44:35 PM	Debug	VPN	encrypted payload by IV:
8/15/2015 1:44:35 PM	Debug	VPN	022521f1 af7add06 0651984a 358603e3
8/15/2015 1:44:35 PM	Debug	VPN	save IV for next:
8/15/2015 1:44:35 PM	Debug	VPN	2cf9f87b 5dfd2013 25eb3c62 59f9e6e6
8/15/2015 1:44:35 PM	Debug	VPN	encrypted.
8/15/2015 1:44:35 PM	Debug	VPN	sendto mode config attr.
8/15/2015 1:44:35 PM	Debug	VPN	Adding NON-ESP marker
8/15/2015 1:44:35 PM	Debug	VPN	128 bytes from 192.168.0.185[4500] to 96.53.114.130[4500]
8/15/2015 1:44:35 PM	Debug	VPN	sockname 192.168.0.185[4500]
8/15/2015 1:44:35 PM	Debug	VPN	send packet from 192.168.0.185[4500]
8/15/2015 1:44:35 PM	Debug	VPN	send packet to 96.53.114.130[4500]
8/15/2015 1:44:36 PM	Debug	VPN	Mode configuration not completed
8/15/2015 1:44:36 PM	Debug	VPN	CHKPH1THERE: no established ph1 handler found
8/15/2015 1:44:37 PM	Debug	VPN	Mode configuration not completed
8/15/2015 1:44:37 PM	Debug	VPN	CHKPH1THERE: no established ph1 handler found
8/15/2015 1:44:38 PM	Debug	VPN	Adding NON-ESP marker
8/15/2015 1:44:38 PM	Debug	VPN	132 bytes from 192.168.0.185[4500] to 96.53.114.130[4500]
8/15/2015 1:44:38 PM	Debug	VPN	sockname 192.168.0.185[4500]
8/15/2015 1:44:38 PM	Debug	VPN	send packet from 192.168.0.185[4500]
8/15/2015 1:44:38 PM	Debug	VPN	send packet to 96.53.114.130[4500]
8/15/2015 1:44:38 PM	Debug	VPN	1 times of 132 bytes message will be sent to 96.53.114.130[4500]
8/15/2015 1:44:38 PM	Debug	VPN	00000000 00000000 9e36c7a2 f3e010dd 7e55b5f0 6c94cf2d 08100601 b0bb4905 0000007c 12f42f1d c3a0eac0 338713bd 0ea45f11 5a183ae8 667e337a 8c33081e ff15436d a6e04efd eed1713a 824a1e27 e34721dc 400e1aa6 d106e7bd bd72bf0d 3ea13b06 5f70b588 61f4fb2c 51536829 3596c58f 2cf9f87b 5dfd2013 25eb3c62 59f9e6e6
8/15/2015 1:44:38 PM	Debug	VPN	resend phase1 packet 9e36c7a2f3e010dd:7e55b5f06c94cf2d:00009ebf
8/15/2015 1:44:38 PM	Debug	VPN	Mode configuration not completed
8/15/2015 1:44:38 PM	Debug	VPN	CHKPH1THERE: no established ph1 handler found
8/15/2015 1:44:39 PM	Debug	VPN	DPD monitoring....
8/15/2015 1:44:39 PM	Debug	VPN	compute IV for phase2
8/15/2015 1:44:39 PM	Debug	VPN	phase1 last IV:
8/15/2015 1:44:39 PM	Debug	VPN	685a83d2 d77c963f 34b254ec 26d619c8 fec0504d
8/15/2015 1:44:39 PM	Debug	VPN	hash(sha1)
8/15/2015 1:44:39 PM	Debug	VPN	encryption(aes128)
8/15/2015 1:44:39 PM	Debug	VPN	phase2 IV computed:
8/15/2015 1:44:39 PM	Debug	VPN	89a0d5d1 94e1aabe 3facd8de cf9ef62e
8/15/2015 1:44:39 PM	Debug	VPN	HASH with:
8/15/2015 1:44:39 PM	Debug	VPN	fec0504d 00000020 00000001 01108d28 9e36c7a2 f3e010dd 7e55b5f0 6c94cf2d 000006ad
8/15/2015 1:44:39 PM	Debug	VPN	hmac(hmac_sha1)
8/15/2015 1:44:39 PM	Debug	VPN	HASH computed:
8/15/2015 1:44:39 PM	Debug	VPN	80e48e98 3809aa45 51abec3a b9cbdf7c ca54a2ad
8/15/2015 1:44:39 PM	Debug	VPN	begin encryption.
8/15/2015 1:44:39 PM	Debug	VPN	encryption(aes128)
8/15/2015 1:44:39 PM	Debug	VPN	pad length = 8
8/15/2015 1:44:39 PM	Debug	VPN	0b000018 80e48e98 3809aa45 51abec3a b9cbdf7c ca54a2ad 00000020 00000001 01108d28 9e36c7a2 f3e010dd 7e55b5f0 6c94cf2d 000006ad afe6b1e6 c5ec9907
8/15/2015 1:44:39 PM	Debug	VPN	encryption(aes128)
8/15/2015 1:44:39 PM	Debug	VPN	with key:
8/15/2015 1:44:39 PM	Debug	VPN	d097c0fa 4697fe00 50df4059 187dbf38
8/15/2015 1:44:39 PM	Debug	VPN	encrypted payload by IV:
8/15/2015 1:44:39 PM	Debug	VPN	89a0d5d1 94e1aabe 3facd8de cf9ef62e
8/15/2015 1:44:39 PM	Debug	VPN	save IV for next:
8/15/2015 1:44:39 PM	Debug	VPN	734e40da 7581ac9c 677ef07b fafd8444
8/15/2015 1:44:39 PM	Debug	VPN	encrypted.
8/15/2015 1:44:39 PM	Debug	VPN	Adding NON-ESP marker
8/15/2015 1:44:39 PM	Debug	VPN	96 bytes from 192.168.0.185[4500] to 96.53.114.130[4500]
8/15/2015 1:44:39 PM	Debug	VPN	sockname 192.168.0.185[4500]
8/15/2015 1:44:39 PM	Debug	VPN	send packet from 192.168.0.185[4500]
8/15/2015 1:44:39 PM	Debug	VPN	send packet to 96.53.114.130[4500]
8/15/2015 1:44:39 PM	Debug	VPN	1 times of 96 bytes message will be sent to 96.53.114.130[4500]
8/15/2015 1:44:39 PM	Debug	VPN	00000000 9e36c7a2 f3e010dd 7e55b5f0 6c94cf2d 08100501 fec0504d 0000005c 2b1a7052 e9638e71 1101b623 2d8314fd 704c641f c1565e30 bd6fd935 518efe78 6c4d5f30 9d0a5e3e 0359012c 8c1000e8 734e40da 7581ac9c 677ef07b fafd8444
8/15/2015 1:44:39 PM	Debug	VPN	sendto Information notify.
8/15/2015 1:44:39 PM	Debug	VPN	DPD R-U-There sent (0)
8/15/2015 1:44:39 PM	Debug	VPN	rescheduling send_r_u (5).
8/15/2015 1:44:39 PM	Debug	VPN	Mode configuration not completed
8/15/2015 1:44:39 PM	Debug	VPN	CHKPH1THERE: no established ph1 handler found
8/15/2015 1:44:39 PM	Debug	ESNAC	Timeout in select in SocketConnect
8/15/2015 1:44:39 PM	Debug	VPN	===
8/15/2015 1:44:39 PM	Debug	VPN	92 bytes message received from 96.53.114.130[4500] to 192.168.0.185[4500]
8/15/2015 1:44:39 PM	Debug	VPN	9e36c7a2 f3e010dd 7e55b5f0 6c94cf2d 08100501 35a8abe6 0000005c 0fe94b5e 4f8a91ac 9ceb4c96 67a97748 ab9fd307 7e628c38 a537d5c9 17b2c9e0 e51bebce c2b90067 7db52551 abc6cd5d 13efd4e6 1523497b 57e96d85 92ec9b94
8/15/2015 1:44:39 PM	Debug	VPN	receive Information.
8/15/2015 1:44:39 PM	Debug	VPN	compute IV for phase2
8/15/2015 1:44:39 PM	Debug	VPN	phase1 last IV:
8/15/2015 1:44:39 PM	Debug	VPN	685a83d2 d77c963f 34b254ec 26d619c8 35a8abe6
8/15/2015 1:44:39 PM	Debug	VPN	hash(sha1)
8/15/2015 1:44:39 PM	Debug	VPN	encryption(aes128)
8/15/2015 1:44:39 PM	Debug	VPN	phase2 IV computed:
8/15/2015 1:44:39 PM	Debug	VPN	61b23a87 7422f0a4 eae84937 a7d5ec33
8/15/2015 1:44:39 PM	Debug	VPN	begin decryption.
8/15/2015 1:44:39 PM	Debug	VPN	encryption(aes128)
8/15/2015 1:44:39 PM	Debug	VPN	IV was saved for next processing:
8/15/2015 1:44:39 PM	Debug	VPN	13efd4e6 1523497b 57e96d85 92ec9b94
8/15/2015 1:44:39 PM	Debug	VPN	encryption(aes128)
8/15/2015 1:44:39 PM	Debug	VPN	with key:
8/15/2015 1:44:39 PM	Debug	VPN	d097c0fa 4697fe00 50df4059 187dbf38
8/15/2015 1:44:39 PM	Debug	VPN	decrypted payload by IV:
8/15/2015 1:44:39 PM	Debug	VPN	61b23a87 7422f0a4 eae84937 a7d5ec33
8/15/2015 1:44:39 PM	Debug	VPN	decrypted payload, but not trimed.
8/15/2015 1:44:39 PM	Debug	VPN	0b000018 7e54c307 5ed3889c b59b9852 6acef300 c7589cc8 00000020 00000001 01108d29 9e36c7a2 f3e010dd 7e55b5f0 6c94cf2d 000006ad 922f0932 1eb76407
8/15/2015 1:44:39 PM	Debug	VPN	padding len=8
8/15/2015 1:44:39 PM	Debug	VPN	skip to trim padding.
8/15/2015 1:44:39 PM	Debug	VPN	decrypted.
8/15/2015 1:44:39 PM	Debug	VPN	9e36c7a2 f3e010dd 7e55b5f0 6c94cf2d 08100501 35a8abe6 0000005c 0b000018 7e54c307 5ed3889c b59b9852 6acef300 c7589cc8 00000020 00000001 01108d29 9e36c7a2 f3e010dd 7e55b5f0 6c94cf2d 000006ad 922f0932 1eb76407
8/15/2015 1:44:39 PM	Debug	VPN	HASH with:
8/15/2015 1:44:39 PM	Debug	VPN	35a8abe6 00000020 00000001 01108d29 9e36c7a2 f3e010dd 7e55b5f0 6c94cf2d 000006ad
8/15/2015 1:44:39 PM	Debug	VPN	hmac(hmac_sha1)
8/15/2015 1:44:39 PM	Debug	VPN	HASH computed:
8/15/2015 1:44:39 PM	Debug	VPN	7e54c307 5ed3889c b59b9852 6acef300 c7589cc8
8/15/2015 1:44:39 PM	Debug	VPN	hash validated.
8/15/2015 1:44:39 PM	Debug	VPN	begin.
8/15/2015 1:44:39 PM	Debug	VPN	seen nptype=8(hash)
8/15/2015 1:44:39 PM	Debug	VPN	seen nptype=11(notify)
8/15/2015 1:44:39 PM	Debug	VPN	succeed.
8/15/2015 1:44:39 PM	Debug	VPN	DPD R-U-There-Ack received
8/15/2015 1:44:39 PM	Debug	VPN	received an R-U-THERE-ACK
8/15/2015 1:44:39 PM	Debug	VPN	notification message 36137:R-U-THERE-ACK, doi=1 proto_id=1 spi=9e36c7a2f3e010dd 7e55b5f06c94cf2d (size=16).
8/15/2015 1:44:39 PM	Debug	ESNAC	dwSilentReg false
8/15/2015 1:44:39 PM	Debug	ESNAC	Start searching for FGT
8/15/2015 1:44:40 PM	Debug	VPN	Mode configuration not completed
8/15/2015 1:44:40 PM	Debug	VPN	CHKPH1THERE: no established ph1 handler found
8/15/2015 1:44:40 PM	Debug	ESNAC	IP Table Change
8/15/2015 1:44:40 PM	Debug	ESNAC	Timeout in select in SocketConnect
8/15/2015 1:44:40 PM	Debug	ESNAC	Socket connect failed
8/15/2015 1:44:40 PM	Debug	ESNAC	192.168.0.1:8010
8/15/2015 1:44:40 PM	Debug	ESNAC	End searching for FGT
8/15/2015 1:44:41 PM	Debug	VPN	Adding NON-ESP marker
8/15/2015 1:44:41 PM	Debug	VPN	136 bytes from 192.168.0.185[4500] to 96.53.114.130[4500]
8/15/2015 1:44:41 PM	Debug	VPN	sockname 192.168.0.185[4500]
8/15/2015 1:44:41 PM	Debug	VPN	send packet from 192.168.0.185[4500]
8/15/2015 1:44:41 PM	Debug	VPN	send packet to 96.53.114.130[4500]
8/15/2015 1:44:41 PM	Debug	VPN	1 times of 136 bytes message will be sent to 96.53.114.130[4500]
8/15/2015 1:44:41 PM	Debug	VPN	00000000 00000000 00000000 9e36c7a2 f3e010dd 7e55b5f0 6c94cf2d 08100601 b0bb4905 0000007c 12f42f1d c3a0eac0 338713bd 0ea45f11 5a183ae8 667e337a 8c33081e ff15436d a6e04efd eed1713a 824a1e27 e34721dc 400e1aa6 d106e7bd bd72bf0d 3ea13b06 5f70b588 61f4fb2c 51536829 3596c58f 2cf9f87b 5dfd2013 25eb3c62 59f9e6e6
8/15/2015 1:44:41 PM	Debug	VPN	resend phase1 packet 9e36c7a2f3e010dd:7e55b5f06c94cf2d:00009ebf
8/15/2015 1:44:41 PM	Debug	VPN	Mode configuration not completed
8/15/2015 1:44:41 PM	Debug	VPN	CHKPH1THERE: no established ph1 handler found
8/15/2015 1:44:41 PM	Debug	VPN	Mode configuration not completed
8/15/2015 1:44:41 PM	Debug	VPN	CHKPH1THERE: no established ph1 handler found
8/15/2015 1:44:43 PM	Debug	VPN	Mode configuration not completed
8/15/2015 1:44:43 PM	Debug	VPN	CHKPH1THERE: no established ph1 handler found
8/15/2015 1:44:44 PM	Debug	VPN	DPD monitoring....
8/15/2015 1:44:44 PM	Debug	VPN	compute IV for phase2
8/15/2015 1:44:44 PM	Debug	VPN	phase1 last IV:
8/15/2015 1:44:44 PM	Debug	VPN	685a83d2 d77c963f 34b254ec 26d619c8 8b04c137
8/15/2015 1:44:44 PM	Debug	VPN	hash(sha1)
8/15/2015 1:44:44 PM	Debug	VPN	encryption(aes128)
8/15/2015 1:44:44 PM	Debug	VPN	phase2 IV computed:
8/15/2015 1:44:44 PM	Debug	VPN	c5859c26 57cbc3d7 1ca27f8c ef7d4439
8/15/2015 1:44:44 PM	Debug	VPN	HASH with:
8/15/2015 1:44:44 PM	Debug	VPN	8b04c137 00000020 00000001 01108d28 9e36c7a2 f3e010dd 7e55b5f0 6c94cf2d 000006ae
8/15/2015 1:44:44 PM	Debug	VPN	hmac(hmac_sha1)
8/15/2015 1:44:44 PM	Debug	VPN	HASH computed:
8/15/2015 1:44:44 PM	Debug	VPN	ddbf95d2 ef173e7e d533ba87 e7d19a5f cdb06c9f
8/15/2015 1:44:44 PM	Debug	VPN	begin encryption.
8/15/2015 1:44:44 PM	Debug	VPN	encryption(aes128)
8/15/2015 1:44:44 PM	Debug	VPN	pad length = 8
8/15/2015 1:44:44 PM	Debug	VPN	0b000018 ddbf95d2 ef173e7e d533ba87 e7d19a5f cdb06c9f 00000020 00000001 01108d28 9e36c7a2 f3e010dd 7e55b5f0 6c94cf2d 000006ae aef2c8c4 adcf9407
8/15/2015 1:44:44 PM	Debug	VPN	encryption(aes128)
8/15/2015 1:44:44 PM	Debug	VPN	with key:
8/15/2015 1:44:44 PM	Debug	VPN	d097c0fa 4697fe00 50df4059 187dbf38
8/15/2015 1:44:44 PM	Debug	VPN	encrypted payload by IV:
8/15/2015 1:44:44 PM	Debug	VPN	c5859c26 57cbc3d7 1ca27f8c ef7d4439
8/15/2015 1:44:44 PM	Debug	VPN	save IV for next:
8/15/2015 1:44:44 PM	Debug	VPN	ce620c6c bd68e20a fd5c8be6 fdb5b53c
8/15/2015 1:44:44 PM	Debug	VPN	encrypted.
8/15/2015 1:44:44 PM	Debug	VPN	Adding NON-ESP marker
8/15/2015 1:44:44 PM	Debug	VPN	96 bytes from 192.168.0.185[4500] to 96.53.114.130[4500]
8/15/2015 1:44:44 PM	Debug	VPN	sockname 192.168.0.185[4500]
8/15/2015 1:44:44 PM	Debug	VPN	send packet from 192.168.0.185[4500]
8/15/2015 1:44:44 PM	Debug	VPN	send packet to 96.53.114.130[4500]
8/15/2015 1:44:44 PM	Debug	VPN	1 times of 96 bytes message will be sent to 96.53.114.130[4500]
8/15/2015 1:44:44 PM	Debug	VPN	00000000 9e36c7a2 f3e010dd 7e55b5f0 6c94cf2d 08100501 8b04c137 0000005c 9a51605e bc829f5b 39ced818 9f97ab89 e914bd4f 15d61660 98c6b9bd 66819f62 51113204 b8241aeb 9b4183f0 c6d22f6d ce620c6c bd68e20a fd5c8be6 fdb5b53c
8/15/2015 1:44:44 PM	Debug	VPN	sendto Information notify.
8/15/2015 1:44:44 PM	Debug	VPN	DPD R-U-There sent (0)
8/15/2015 1:44:44 PM	Debug	VPN	rescheduling send_r_u (5).
8/15/2015 1:44:44 PM	Debug	VPN	Adding NON-ESP marker
8/15/2015 1:44:44 PM	Debug	VPN	140 bytes from 192.168.0.185[4500] to 96.53.114.130[4500]
8/15/2015 1:44:44 PM	Debug	VPN	sockname 192.168.0.185[4500]
8/15/2015 1:44:44 PM	Debug	VPN	send packet from 192.168.0.185[4500]
8/15/2015 1:44:44 PM	Debug	VPN	send packet to 96.53.114.130[4500]
8/15/2015 1:44:44 PM	Debug	VPN	1 times of 140 bytes message will be sent to 96.53.114.130[4500]
8/15/2015 1:44:44 PM	Debug	VPN	00000000 00000000 00000000 00000000 9e36c7a2 f3e010dd 7e55b5f0 6c94cf2d 08100601 b0bb4905 0000007c 12f42f1d c3a0eac0 338713bd 0ea45f11 5a183ae8 667e337a 8c33081e ff15436d a6e04efd eed1713a 824a1e27 e34721dc 400e1aa6 d106e7bd bd72bf0d 3ea13b06 5f70b588 61f4fb2c 51536829 3596c58f 2cf9f87b 5dfd2013 25eb3c62 59f9e6e6
8/15/2015 1:44:44 PM	Debug	VPN	resend phase1 packet 9e36c7a2f3e010dd:7e55b5f06c94cf2d:00009ebf
8/15/2015 1:44:44 PM	Debug	VPN	Mode configuration not completed
8/15/2015 1:44:44 PM	Debug	VPN	CHKPH1THERE: no established ph1 handler found
8/15/2015 1:44:44 PM	Debug	VPN	===
8/15/2015 1:44:44 PM	Debug	VPN	92 bytes message received from 96.53.114.130[4500] to 192.168.0.185[4500]
8/15/2015 1:44:44 PM	Debug	VPN	9e36c7a2 f3e010dd 7e55b5f0 6c94cf2d 08100501 82763667 0000005c 9a65bc6c cff0498f e69959c7 dec4cbe1 4a2d49f6 faea4c95 45186c4b f460cd00 e8134000 dcb5ef1c 1c51994a 59a6e14c a922cd2a 1d10e3bc 66c8c346 95f13625
8/15/2015 1:44:44 PM	Debug	VPN	receive Information.
8/15/2015 1:44:44 PM	Debug	VPN	compute IV for phase2
8/15/2015 1:44:44 PM	Debug	VPN	phase1 last IV:
8/15/2015 1:44:44 PM	Debug	VPN	685a83d2 d77c963f 34b254ec 26d619c8 82763667
8/15/2015 1:44:44 PM	Debug	VPN	hash(sha1)
8/15/2015 1:44:44 PM	Debug	VPN	encryption(aes128)
8/15/2015 1:44:44 PM	Debug	VPN	phase2 IV computed:
8/15/2015 1:44:44 PM	Debug	VPN	809dd200 48b16fca 10bfefa4 cfdbb9c4
8/15/2015 1:44:44 PM	Debug	VPN	begin decryption.
8/15/2015 1:44:44 PM	Debug	VPN	encryption(aes128)
8/15/2015 1:44:44 PM	Debug	VPN	IV was saved for next processing:
8/15/2015 1:44:44 PM	Debug	VPN	a922cd2a 1d10e3bc 66c8c346 95f13625
8/15/2015 1:44:44 PM	Debug	VPN	encryption(aes128)
8/15/2015 1:44:44 PM	Debug	VPN	with key:
8/15/2015 1:44:44 PM	Debug	VPN	d097c0fa 4697fe00 50df4059 187dbf38
8/15/2015 1:44:44 PM	Debug	VPN	decrypted payload by IV:
8/15/2015 1:44:44 PM	Debug	VPN	809dd200 48b16fca 10bfefa4 cfdbb9c4
8/15/2015 1:44:44 PM	Debug	VPN	decrypted payload, but not trimed.
8/15/2015 1:44:44 PM	Debug	VPN	0b000018 4a3cf978 62494d13 9e29baea 77333182 1b8410dd 00000020 00000001 01108d28 9e36c7a2 f3e010dd 7e55b5f0 6c94cf2d 00000001 55168a79 8463ca07
8/15/2015 1:44:44 PM	Debug	VPN	padding len=8
8/15/2015 1:44:44 PM	Debug	VPN	skip to trim padding.
8/15/2015 1:44:44 PM	Debug	VPN	decrypted.
8/15/2015 1:44:44 PM	Debug	VPN	9e36c7a2 f3e010dd 7e55b5f0 6c94cf2d 08100501 82763667 0000005c 0b000018 4a3cf978 62494d13 9e29baea 77333182 1b8410dd 00000020 00000001 01108d28 9e36c7a2 f3e010dd 7e55b5f0 6c94cf2d 00000001 55168a79 8463ca07
8/15/2015 1:44:44 PM	Debug	VPN	HASH with:
8/15/2015 1:44:44 PM	Debug	VPN	82763667 00000020 00000001 01108d28 9e36c7a2 f3e010dd 7e55b5f0 6c94cf2d 00000001
8/15/2015 1:44:44 PM	Debug	VPN	hmac(hmac_sha1)
8/15/2015 1:44:44 PM	Debug	VPN	HASH computed:
8/15/2015 1:44:44 PM	Debug	VPN	4a3cf978 62494d13 9e29baea 77333182 1b8410dd
8/15/2015 1:44:44 PM	Debug	VPN	hash validated.
8/15/2015 1:44:44 PM	Debug	VPN	begin.
8/15/2015 1:44:44 PM	Debug	VPN	seen nptype=8(hash)
8/15/2015 1:44:44 PM	Debug	VPN	seen nptype=11(notify)
8/15/2015 1:44:44 PM	Debug	VPN	succeed.
8/15/2015 1:44:44 PM	Debug	VPN	DPD R-U-There received
8/15/2015 1:44:44 PM	Debug	VPN	compute IV for phase2
8/15/2015 1:44:44 PM	Debug	VPN	phase1 last IV:
8/15/2015 1:44:44 PM	Debug	VPN	685a83d2 d77c963f 34b254ec 26d619c8 a3cfac00
8/15/2015 1:44:44 PM	Debug	VPN	hash(sha1)
8/15/2015 1:44:44 PM	Debug	VPN	encryption(aes128)
8/15/2015 1:44:44 PM	Debug	VPN	phase2 IV computed:
8/15/2015 1:44:44 PM	Debug	VPN	080dfee4 d35db42d 64ecc279 df0f2a97
8/15/2015 1:44:44 PM	Debug	VPN	HASH with:
8/15/2015 1:44:44 PM	Debug	VPN	a3cfac00 00000020 00000001 01108d29 9e36c7a2 f3e010dd 7e55b5f0 6c94cf2d 00000001
8/15/2015 1:44:44 PM	Debug	VPN	hmac(hmac_sha1)
8/15/2015 1:44:44 PM	Debug	VPN	HASH computed:
8/15/2015 1:44:44 PM	Debug	VPN	ca6e8a57 a8d3f05b 9b5a66fd 61c450c0 778da938
8/15/2015 1:44:44 PM	Debug	VPN	begin encryption.
8/15/2015 1:44:44 PM	Debug	VPN	encryption(aes128)
8/15/2015 1:44:44 PM	Debug	VPN	pad length = 8
8/15/2015 1:44:44 PM	Debug	VPN	0b000018 ca6e8a57 a8d3f05b 9b5a66fd 61c450c0 778da938 00000020 00000001 01108d29 9e36c7a2 f3e010dd 7e55b5f0 6c94cf2d 00000001 88da8d86 8393d707
8/15/2015 1:44:44 PM	Debug	VPN	encryption(aes128)
8/15/2015 1:44:44 PM	Debug	VPN	with key:
8/15/2015 1:44:44 PM	Debug	VPN	d097c0fa 4697fe00 50df4059 187dbf38
8/15/2015 1:44:44 PM	Debug	VPN	encrypted payload by IV:
8/15/2015 1:44:44 PM	Debug	VPN	080dfee4 d35db42d 64ecc279 df0f2a97
8/15/2015 1:44:44 PM	Debug	VPN	save IV for next:
8/15/2015 1:44:44 PM	Debug	VPN	41cde66f bbc4d41b 029c7ba5 d3186f93
8/15/2015 1:44:44 PM	Debug	VPN	encrypted.
8/15/2015 1:44:44 PM	Debug	VPN	Adding NON-ESP marker
8/15/2015 1:44:44 PM	Debug	VPN	96 bytes from 192.168.0.185[4500] to 96.53.114.130[4500]
8/15/2015 1:44:44 PM	Debug	VPN	sockname 192.168.0.185[4500]
8/15/2015 1:44:44 PM	Debug	VPN	send packet from 192.168.0.185[4500]
8/15/2015 1:44:44 PM	Debug	VPN	send packet to 96.53.114.130[4500]
8/15/2015 1:44:44 PM	Debug	VPN	1 times of 96 bytes message will be sent to 96.53.114.130[4500]
8/15/2015 1:44:44 PM	Debug	VPN	00000000 9e36c7a2 f3e010dd 7e55b5f0 6c94cf2d 08100501 a3cfac00 0000005c 0dfaa979 9b08539e 57bca3ac 53d3d1f6 e427064e 83c38d71 0fa75fd2 66412643 b4587269 b90a879c febfe570 9ea3dd8d 41cde66f bbc4d41b 029c7ba5 d3186f93
8/15/2015 1:44:44 PM	Debug	VPN	sendto Information notify.
8/15/2015 1:44:44 PM	Debug	VPN	received a valid R-U-THERE, ACK sent
8/15/2015 1:44:44 PM	Debug	VPN	notification message 36136:R-U-THERE, doi=1 proto_id=1 spi=9e36c7a2f3e010dd 7e55b5f06c94cf2d (size=16).
8/15/2015 1:44:44 PM	Debug	VPN	===
8/15/2015 1:44:44 PM	Debug	VPN	92 bytes message received from 96.53.114.130[4500] to 192.168.0.185[4500]
8/15/2015 1:44:44 PM	Debug	VPN	9e36c7a2 f3e010dd 7e55b5f0 6c94cf2d 08100501 7658eab1 0000005c 2c7b0ec3 6a326fc7 c65ac66d b15c0da5 6039d102 3dd4c9a5 5a170998 f5f37afe 25f4260d a74e688c 0b3e3d1d c95cd42f 918986ec 56dbefbe 31e09645 457931ea
8/15/2015 1:44:44 PM	Debug	VPN	receive Information.
8/15/2015 1:44:44 PM	Debug	VPN	compute IV for phase2
8/15/2015 1:44:44 PM	Debug	VPN	phase1 last IV:
8/15/2015 1:44:44 PM	Debug	VPN	685a83d2 d77c963f 34b254ec 26d619c8 7658eab1
8/15/2015 1:44:44 PM	Debug	VPN	hash(sha1)
8/15/2015 1:44:44 PM	Debug	VPN	encryption(aes128)
8/15/2015 1:44:44 PM	Debug	VPN	phase2 IV computed:
8/15/2015 1:44:44 PM	Debug	VPN	11f08afa 82dcd9b2 14300e94 458d0ba9
8/15/2015 1:44:44 PM	Debug	VPN	begin decryption.
8/15/2015 1:44:44 PM	Debug	VPN	encryption(aes128)
8/15/2015 1:44:44 PM	Debug	VPN	IV was saved for next processing:
8/15/2015 1:44:44 PM	Debug	VPN	918986ec 56dbefbe 31e09645 457931ea
8/15/2015 1:44:44 PM	Debug	VPN	encryption(aes128)
8/15/2015 1:44:44 PM	Debug	VPN	with key:
8/15/2015 1:44:44 PM	Debug	VPN	d097c0fa 4697fe00 50df4059 187dbf38
8/15/2015 1:44:44 PM	Debug	VPN	decrypted payload by IV:
8/15/2015 1:44:44 PM	Debug	VPN	11f08afa 82dcd9b2 14300e94 458d0ba9
8/15/2015 1:44:44 PM	Debug	VPN	decrypted payload, but not trimed.
8/15/2015 1:44:44 PM	Debug	VPN	0b000018 b67152fa c3a425b1 59f05203 83af0d6c b1fb947a 00000020 00000001 01108d29 9e36c7a2 f3e010dd 7e55b5f0 6c94cf2d 000006ae 65bf2798 00907307
8/15/2015 1:44:44 PM	Debug	VPN	padding len=8
8/15/2015 1:44:44 PM	Debug	VPN	skip to trim padding.
8/15/2015 1:44:44 PM	Debug	VPN	decrypted.
8/15/2015 1:44:44 PM	Debug	VPN	9e36c7a2 f3e010dd 7e55b5f0 6c94cf2d 08100501 7658eab1 0000005c 0b000018 b67152fa c3a425b1 59f05203 83af0d6c b1fb947a 00000020 00000001 01108d29 9e36c7a2 f3e010dd 7e55b5f0 6c94cf2d 000006ae 65bf2798 00907307
8/15/2015 1:44:44 PM	Debug	VPN	HASH with:
8/15/2015 1:44:44 PM	Debug	VPN	7658eab1 00000020 00000001 01108d29 9e36c7a2 f3e010dd 7e55b5f0 6c94cf2d 000006ae
8/15/2015 1:44:44 PM	Debug	VPN	hmac(hmac_sha1)
8/15/2015 1:44:44 PM	Debug	VPN	HASH computed:
8/15/2015 1:44:44 PM	Debug	VPN	b67152fa c3a425b1 59f05203 83af0d6c b1fb947a
8/15/2015 1:44:44 PM	Debug	VPN	hash validated.
8/15/2015 1:44:44 PM	Debug	VPN	begin.
8/15/2015 1:44:44 PM	Debug	VPN	seen nptype=8(hash)
8/15/2015 1:44:44 PM	Debug	VPN	seen nptype=11(notify)
8/15/2015 1:44:44 PM	Debug	VPN	succeed.
8/15/2015 1:44:44 PM	Debug	VPN	DPD R-U-There-Ack received
8/15/2015 1:44:44 PM	Debug	VPN	received an R-U-THERE-ACK
8/15/2015 1:44:44 PM	Debug	VPN	notification message 36137:R-U-THERE-ACK, doi=1 proto_id=1 spi=9e36c7a2f3e010dd 7e55b5f06c94cf2d (size=16).
8/15/2015 1:44:45 PM	Debug	VPN	Mode configuration not completed
8/15/2015 1:44:45 PM	Debug	VPN	CHKPH1THERE: no established ph1 handler found
8/15/2015 1:44:46 PM	Debug	VPN	Mode configuration not completed
8/15/2015 1:44:46 PM	Debug	VPN	CHKPH1THERE: no established ph1 handler found
8/15/2015 1:44:46 PM	Debug	VPN	phase1 negotiation failed due to time up. 9e36c7a2f3e010dd:7e55b5f06c94cf2d:00009ebf
8/15/2015 1:44:46 PM	Warning	VPN	id=96561 msg="locip=192.168.0.185 locport=4500 remip=96.53.114.130 remport=4500 outif=0 vpntunnel=Willowglen status=negotiate_error No response from the peer, phase1 retransmit reaches maximum count..." vpntunnel=Willowglen vpntype=ipsec
8/15/2015 1:44:46 PM	Debug	VPN	an undead schedule has been deleted.
8/15/2015 1:44:46 PM	Debug	VPN	compute IV for phase2
8/15/2015 1:44:46 PM	Debug	VPN	phase1 last IV:
8/15/2015 1:44:46 PM	Debug	VPN	685a83d2 d77c963f 34b254ec 26d619c8 e5f247de
8/15/2015 1:44:46 PM	Debug	VPN	hash(sha1)
8/15/2015 1:44:46 PM	Debug	VPN	encryption(aes128)
8/15/2015 1:44:46 PM	Debug	VPN	phase2 IV computed:
8/15/2015 1:44:46 PM	Debug	VPN	fe59c290 fc42b929 94c93f37 4f6dfb6c
8/15/2015 1:44:46 PM	Debug	VPN	HASH with:
8/15/2015 1:44:46 PM	Debug	VPN	e5f247de 0000001c 00000001 01100001 9e36c7a2 f3e010dd 7e55b5f0 6c94cf2d
8/15/2015 1:44:46 PM	Debug	VPN	hmac(hmac_sha1)
8/15/2015 1:44:46 PM	Debug	VPN	HASH computed:
8/15/2015 1:44:46 PM	Debug	VPN	339cc023 89ca1bd3 3e630fa5 f3e650cc 28f6cea4
8/15/2015 1:44:46 PM	Debug	VPN	begin encryption.
8/15/2015 1:44:46 PM	Debug	VPN	encryption(aes128)
8/15/2015 1:44:46 PM	Debug	VPN	pad length = 12
8/15/2015 1:44:46 PM	Debug	VPN	0c000018 339cc023 89ca1bd3 3e630fa5 f3e650cc 28f6cea4 0000001c 00000001 01100001 9e36c7a2 f3e010dd 7e55b5f0 6c94cf2d acd7eb8b cce4f9c1 c7e7fe0b
8/15/2015 1:44:46 PM	Debug	VPN	encryption(aes128)
8/15/2015 1:44:46 PM	Debug	VPN	with key:
8/15/2015 1:44:46 PM	Debug	VPN	d097c0fa 4697fe00 50df4059 187dbf38
8/15/2015 1:44:46 PM	Debug	VPN	encrypted payload by IV:
8/15/2015 1:44:46 PM	Debug	VPN	fe59c290 fc42b929 94c93f37 4f6dfb6c
8/15/2015 1:44:46 PM	Debug	VPN	save IV for next:
8/15/2015 1:44:46 PM	Debug	VPN	e3c4bf65 1123c83a 11869b6e c813ded5
8/15/2015 1:44:46 PM	Debug	VPN	encrypted.
8/15/2015 1:44:46 PM	Debug	VPN	Adding NON-ESP marker
8/15/2015 1:44:46 PM	Debug	VPN	96 bytes from 192.168.0.185[4500] to 96.53.114.130[4500]
8/15/2015 1:44:46 PM	Debug	VPN	sockname 192.168.0.185[4500]
8/15/2015 1:44:46 PM	Debug	VPN	send packet from 192.168.0.185[4500]
8/15/2015 1:44:46 PM	Debug	VPN	send packet to 96.53.114.130[4500]
8/15/2015 1:44:46 PM	Debug	VPN	1 times of 96 bytes message will be sent to 96.53.114.130[4500]
8/15/2015 1:44:46 PM	Debug	VPN	00000000 9e36c7a2 f3e010dd 7e55b5f0 6c94cf2d 08100501 e5f247de 0000005c 1e1f3864 085048be 2466ef03 22645c49 53f22b33 d01c0a96 b2765ceb e088198d b1302963 2ae4cd0e cfd8c76e 75f188ed e3c4bf65 1123c83a 11869b6e c813ded5
8/15/2015 1:44:46 PM	Debug	VPN	sendto Information delete.
8/15/2015 1:44:49 PM	Debug	Scheduler	handle_processtermination() called
8/15/2015 1:44:49 PM	Debug	Scheduler	child process terminates normally
8/15/2015 1:44:51 PM	Debug	ESNAC	Timeout in select in SocketConnect

Open in new window


I configured port forwarding in the hitron for ports 500 and 4500 to the computer I use to connect to VPN, with no result.
I configured DMZ in the hitron for the computer I use to connect to VPN, with no result.

Nothing has changed on my computer or on the VPN server so I can only deduce it is the hitron.
LVL 1
bejhanAsked:
Who is Participating?
I wear a lot of hats...

"The solutions and answers provided on Experts Exchange have been extremely helpful to me over the last few years. I wear a lot of hats - Developer, Database Administrator, Help Desk, etc., so I know a lot of things but not a lot about one thing. Experts Exchange gives me answers from people who do know a lot about one thing, in a easy to use platform." -Todd S.

btanExec ConsultantCommented:
When a device with NAT capabilities is located between two VPN peers or a VPN peer and a dialup client, that device must be NAT traversal (NAT-T) compatible for encrypted traffic to pass through the NAT device.  NAT traversal is enabled in the Phase 1 configuration, and NAT is not enabled in the security policy. If the negotiation is OK but there is no traffic, check the route. Can see this setup in
http://docs-legacy.fortinet.com/cb/html/index.html#page/FOS_Cookbook/IPSec/cb_ipsecvpn_forticlient.html

Overall for NAT traversal and setting for info
FortiGate units support NAT version 1 (encapsulate on port 500 with non-IKE marker), version 3 (encapsulate on port 4500 with non-ESP marker), and compatible versions.  

When the Nat-traversal option is enabled, outbound encrypted packets are wrapped inside a UDP IP header that contains a port number. This extra encapsulation allows NAT devices to change the port number without modifying the IPsec packet directly
Also note the NAT keepalive interval should be smaller than the session lifetime value used by the NAT device.
When a NAT device performs network address translation on a flow of packets, the NAT device determines how long the new address will remain valid if the flow of traffic stops (for example, the connected VPN peer may be idle). The device may reclaim and reuse a NAT address when a connection remains idle for too long. To work around this, when you enable NAT traversal, you can specify how often the FortiGate unit should send periodic keepalive packets through the NAT device in order to ensure that the NAT address mapping does not change during the lifetime of a session. The keepalive interval should be smaller than the session lifetime value used by the NAT device.
See the guide which can be useful in section "Monitoring and troubleshooting VPNs". Since it works before the modem, do see that the NAT may be a potential factor. The rest of prior IPSec setting will assumed already working and verified (otherwise the guide stated in that section some areas to check too). http://pub.kb.fortinet.com/ksmcontent/Fortinet-Public/current/Fortigate_v4.0MR1/fortigate-ipsec-40-mr1.pdf
0

Experts Exchange Solution brought to you by

Your issues matter to us.

Facing a tech roadblock? Get the help and guidance you need from experienced professionals who care. Ask your question anytime, anywhere, with no hassle.

Start your 7-day free trial
asavenerCommented:
I've seen misconfigurations where UDP 4500 was not allowed in at the VPN head end.  

It's also possible that you're encountering a black-hole MTU problem, where small packets arrive at the destination and larger packets do not.  You can try adjusting your MTU on your workstation to test this.  It's a registry setting for the network adapter you're using, but I don't recall the path offhand.
0
btanExec ConsultantCommented:
See couple of below trace that may be of interest
8/15/2015 1:44:33 PM      Debug      VPN      Selected NAT-T version: RFC 3947
8/15/2015 1:44:33 PM      Debug      VPN      Hashing 192.168.0.185[500] with algo #2
8/15/2015 1:44:33 PM      Debug      VPN      hash(sha1)
8/15/2015 1:44:33 PM      Debug      VPN      NAT-D payload #-1 doesn't match
8/15/2015 1:44:33 PM      Debug      VPN      Hashing 96.53.114.130[500] with algo #2
8/15/2015 1:44:33 PM      Debug      VPN      hash(sha1)
8/15/2015 1:44:33 PM      Debug      VPN      NAT-D payload #0 verified
8/15/2015 1:44:33 PM      Debug      VPN      NAT detected: ME
8/15/2015 1:44:40 PM      Debug      ESNAC      IP Table Change
8/15/2015 1:44:40 PM      Debug      ESNAC      Timeout in select in SocketConnect
8/15/2015 1:44:40 PM      Debug      ESNAC      Socket connect failed
8/15/2015 1:44:40 PM      Debug      ESNAC      192.168.0.1:8010
8/15/2015 1:44:40 PM      Debug      ESNAC      End searching for FGT
But I see this more leading signs on couple of timeout instance as above per se
8/15/2015 1:44:46 PM      Warning      VPN      id=96561 msg="locip=192.168.0.185 locport=4500 remip=96.53.114.130 remport=4500 outif=0 vpntunnel=Willowglen status=negotiate_error No response from the peer, phase1 retransmit reaches maximum count..." vpntunnel=Willowglen vpntype=ipsec
have to look at the FW log at the remote end as well on any failure or warning per se around those period
0
bejhanAuthor Commented:
As per btan's comment, I do not think the hitron supports NAT-T.
I contacted Shaw for an alternative device but it is out of stock.

When I get home from work, I will try IP passthrough on the hitron and use my old D-Link router.
Hopefully that will solve the issue.
0
bejhanAuthor Commented:
IP passthrough on the hitron did not work as desired. Ended up swapping the hitron for a Cisco DPC3825 (which I had at my old place before I moved). This device features an option for IPSec VPN passthrough, which solves my issue.
0
It's more than this solution.Get answers and train to solve all your tech problems - anytime, anywhere.Try it for free Edge Out The Competitionfor your dream job with proven skills and certifications.Get started today Stand Outas the employee with proven skills.Start learning today for free Move Your Career Forwardwith certification training in the latest technologies.Start your trial today
VPN

From novice to tech pro — start learning today.

Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.