bejhan
asked on
No Longer Able to Connect to IPSec VPN (FortiClient)
I connect to my work IPSec VPN network with FortiClient.
I had no problems until I recently moved, and now have a hitron CGNM-2250 as my router/modem.
Now when I attempt to connect, FortiClient indicates that the VPN connection failed.
FortiClient debug logs:
I configured port forwarding in the hitron for ports 500 and 4500 to the computer I use to connect to VPN, with no result.
I configured DMZ in the hitron for the computer I use to connect to VPN, with no result.
Nothing has changed on my computer or on the VPN server so I can only deduce it is the hitron.
I had no problems until I recently moved, and now have a hitron CGNM-2250 as my router/modem.
Now when I attempt to connect, FortiClient indicates that the VPN connection failed.
FortiClient debug logs:
8/15/2015 1:44:14 PM Warning Console id=96870 user=VPN msg="Logs were cleared"
8/15/2015 1:44:16 PM Notice VPN id=96573 user=VPN msg="VPN before logon was disabled" vpntype=ipsec
8/15/2015 1:44:16 PM Notice ESNAC id=96951 user=VPN msg="Endpoint control policy synchronization was enabled"
8/15/2015 1:44:16 PM Notice Console id=96880 user=VPN msg="User disabled WAN Acceleration"
8/15/2015 1:44:16 PM Warning SSOMA id=96982 user=VPN msg="Single Sign-On Mobility Agent was disabled"
8/15/2015 1:44:16 PM Warning Console id=96840 user=VPN msg="Fortiproxy is disabled"
8/15/2015 1:44:16 PM Debug Scheduler GUI change event
8/15/2015 1:44:17 PM Debug Scheduler (repeated 1 times in last 2 sec) GUI change event
8/15/2015 1:44:18 PM Debug Config ImportConfig: tag <log_events> has an invalid value clientmanager. Was ignored.
8/15/2015 1:44:18 PM Debug ESNAC PIPEMSG_CMD_ESNAC_STATUS_RELOAD_CONFIG
8/15/2015 1:44:18 PM Debug ESNAC PIPEMSG_CMD_ESNAC_STATUS_UPDATE_PREFERRED_FGT
8/15/2015 1:44:20 PM Debug Scheduler GUI change event
8/15/2015 1:44:20 PM Debug Update Update task is called with dwSession=-1
8/15/2015 1:44:20 PM Debug Update forticlient.fortinet.net
8/15/2015 1:44:20 PM Debug Update start_update_thread() called
8/15/2015 1:44:20 PM Debug Update Impersonated=0
8/15/2015 1:44:20 PM Debug Update update started...
8/15/2015 1:44:20 PM Debug Update update process sending request: 00000000FSCI00000000000000000000
8/15/2015 1:44:20 PM Debug Update update process sending request: 00000000FDNI00000000000000000000
8/15/2015 1:44:20 PM Debug Update update process sending request: 01000000FECT00000000000000000000
8/15/2015 1:44:20 PM Debug Update update process sending request: 05002000FVEN00800052039999999999
8/15/2015 1:44:20 PM Debug Update update process sending request: 05002000FCBN00000000009999999999
8/15/2015 1:44:20 PM Debug Update updatetask get virus info file failed
8/15/2015 1:44:20 PM Debug Update update process received object(1 of 3): FCPR
8/15/2015 1:44:20 PM Debug Update update process received object(2 of 3): FDNI
8/15/2015 1:44:20 PM Debug Update update process received object(3 of 3): FECT
8/15/2015 1:44:20 PM Debug Update update done
8/15/2015 1:44:20 PM Debug Update update thread exit
8/15/2015 1:44:20 PM Debug Scheduler FortiTrayApp : Received WM_USER_UPDATE_SUCCESS message, lParam=0x1
8/15/2015 1:44:20 PM Debug Update No update is available.
8/15/2015 1:44:22 PM Debug Scheduler GUI change event
8/15/2015 1:44:24 PM Debug Scheduler handle_processtermination() called
8/15/2015 1:44:24 PM Debug Scheduler child process terminates normally
8/15/2015 1:44:24 PM Debug Scheduler handle_processtermination() called
8/15/2015 1:44:24 PM Debug Scheduler child process terminates normally
8/15/2015 1:44:24 PM Debug Scheduler GUI change event
8/15/2015 1:44:28 PM Debug Scheduler (repeated 2 times in last 4 sec) GUI change event
8/15/2015 1:44:31 PM Debug Scheduler handle_processtermination() called
8/15/2015 1:44:31 PM Debug Scheduler child process terminates normally
8/15/2015 1:44:31 PM Debug Scheduler handle_processtermination() called
8/15/2015 1:44:31 PM Debug Scheduler child process terminates normally
8/15/2015 1:44:31 PM Debug Scheduler GUI change event
8/15/2015 1:44:33 PM Debug VPN hmac(modp1536)
8/15/2015 1:44:32 PM Debug VPN (repeated 1 times in last 0 sec) hmac(modp1536)
8/15/2015 1:44:33 PM Debug ESNAC IP Table Change
8/15/2015 1:44:33 PM Debug VPN configuration found for 96.53.114.130.
8/15/2015 1:44:33 PM Debug VPN IPsec-SA request for 96.53.114.130[500] queued due to no phase1 found.
8/15/2015 1:44:33 PM Debug VPN ===
8/15/2015 1:44:33 PM Debug VPN initiate new phase 1 negotiation: 192.168.0.185[500]<=>96.53.114.130[500]
8/15/2015 1:44:33 PM Debug VPN begin Aggressive mode.
8/15/2015 1:44:33 PM Debug VPN new cookie: 9e36c7a2f3e010dd
8/15/2015 1:44:33 PM Debug VPN use ID type of IPv4_address
8/15/2015 1:44:33 PM Debug VPN compute DH's private.
8/15/2015 1:44:33 PM Debug VPN 7ef905eb e3c6ae1d a33b8735 412128cd a2c09f81 599a4cc8 986fc099 44669b22 810be417 ed9f36c2 92ad0877 e43a7fb4 b1e5550a 7c94560d 1461e46b 1bc2c205 aeccdba5 33908199 7b3b8b29 c8f5e26f 8a77c3bd f6f54e8b 2fb0b4e3 9c4dff11 769a18fc 33d9d4c4 aca9f200 cfb9a0fe fa14391f 188fff1f d4d1b906 6d3dccd5 cfd1d5ae 27f471b1 7763277f 3dd5fc47 a4189a7b 3e2b9d3e 5a5c6332 dce12647 5d5909a7 de67554c 95e73ecd b629ecb7 4cd74bc1 19483147 af110510 bc0b6d69
8/15/2015 1:44:33 PM Debug VPN compute DH's public.
8/15/2015 1:44:33 PM Debug VPN 9f73e9b6 a4b5bfba 86a50de1 5b764ac0 4f8bf7b8 c1865351 64b6496e ff660a40 d152f137 b07c4315 e588df1b 02204f96 0f26b8bc b697b813 bcd2a757 f8f4d1e5 03913f1c 30093119 18f0a135 81d09bec a33fc40e bfc859cd 80898157 4004248a 4e705b03 05d61a67 c6ef870f df70588b 980b4ede 658c840e 4be628f4 8cc7bcd5 306dbe6f ba722232 d8543495 f3cbac64 1a4073c0 fdeb71e8 02e0b391 f82fb058 f8d3c1ce 09a127e7 0aeb9233 702cb56d d521ea2f 1d91c0ac d128cff6 7ea7125b
8/15/2015 1:44:33 PM Debug VPN authmethod is pre-shared key
8/15/2015 1:44:33 PM Debug VPN add payload of len 96, next type 4
8/15/2015 1:44:33 PM Debug VPN add payload of len 192, next type 10
8/15/2015 1:44:33 PM Debug VPN add payload of len 16, next type 5
8/15/2015 1:44:33 PM Debug VPN add payload of len 8, next type 13
8/15/2015 1:44:33 PM Debug VPN add payload of len 16, next type 13
8/15/2015 1:44:33 PM Debug VPN (repeated 3 times in last 0 sec) add payload of len 16, next type 13
8/15/2015 1:44:33 PM Debug VPN add payload of len 8, next type 13
8/15/2015 1:44:33 PM Debug VPN add payload of len 16, next type 13
8/15/2015 1:44:33 PM Debug VPN (repeated 1 times in last 0 sec) add payload of len 16, next type 13
8/15/2015 1:44:33 PM Debug VPN add payload of len 16, next type 0
8/15/2015 1:44:33 PM Debug VPN 508 bytes from 192.168.0.185[500] to 96.53.114.130[500]
8/15/2015 1:44:33 PM Debug VPN sockname 0.0.0.0[500]
8/15/2015 1:44:33 PM Debug VPN send packet from 192.168.0.185[500]
8/15/2015 1:44:33 PM Debug VPN send packet to 96.53.114.130[500]
8/15/2015 1:44:33 PM Debug VPN 1 times of 508 bytes message will be sent to 96.53.114.130[500]
8/15/2015 1:44:33 PM Debug VPN 9e36c7a2 f3e010dd 00000000 00000000 01100400 00000000 000001fc 04000064 00000001 00000001 00000058 01010002 03000028 01010000 800b0001 000c0004 00015180 80010007 800e0080 80030001 80020002 80040005 00000028 02010000 800b0001 000c0004 00015180 80010007 800e0100 80030001 80020004 80040005 0a0000c4 9f73e9b6 a4b5bfba 86a50de1 5b764ac0 4f8bf7b8 c1865351 64b6496e ff660a40 d152f137 b07c4315 e588df1b 02204f96 0f26b8bc b697b813 bcd2a757 f8f4d1e5 03913f1c 30093119 18f0a135 81d09bec a33fc40e bfc859cd 80898157 4004248a 4e705b03 05d61a67 c6ef870f df70588b 980b4ede 658c840e 4be628f4 8cc7bcd5 306dbe6f ba722232 d8543495 f3cbac64 1a4073c0 fdeb71e8 02e0b391 f82fb058 f8d3c1ce 09a127e7 0aeb9233 702cb56d d521ea2f 1d91c0ac d128cff6 7ea7125b 05000014 be273795 27920211 cb4fb742 b326fd06 0d00000c 01000000 c0a800b9 0d000014 12f5f28c 457168a9 702d9fe2 74cc0100 0d000014 4a131c81 07035845 5c5728f2 0e95452f 0d000014 cd604643 35df21f8 7cfdb2fc 68b6a448 0d000014 90cb8091 3ebb696e 086381b5 ec427b1f 0d00000c 09002689 dfd6b712 0d000014 afcad
8/15/2015 1:44:33 PM Debug VPN resend phase1 packet 9e36c7a2f3e010dd:0000000000000000
8/15/2015 1:44:33 PM Notice VPN id=96566 msg="negotiation information, loc_ip=192.168.0.185 loc_port=500 rem_ip=96.53.114.130 rem_port=500 out_if=0 vpn_tunnel=Willowglen action=negotiate init=local mode=aggressive stage=1 dir=outbound status=success Initiator: sent 96.53.114.130 aggressive mode message #1" vpntunnel=Willowglen vpntype=ipsec
8/15/2015 1:44:33 PM Debug VPN ===
8/15/2015 1:44:33 PM Debug VPN 500 bytes message received from 96.53.114.130[500] to 192.168.0.185[500]
8/15/2015 1:44:33 PM Debug VPN 9e36c7a2 f3e010dd 7e55b5f0 6c94cf2d 01100400 00000000 000001f4 0400003c 00000001 00000001 00000030 01010001 00000028 01010000 800b0001 000c0004 00015180 80010007 800e0080 80030001 80020002 80040005 0a0000c4 e86a9b53 9b438650 cb96499a 70f8e279 208bba89 ab4e5bc7 c096e1a4 a71977d2 0f0e37d5 b6c2e509 cff7e197 ed1ac3fd 82f0e98e 9ba20b64 750f48ef fa9ecd9f c4a682f1 38894c39 457fb32b 8548ddfd f7644575 fa4969e3 33814fe3 a3e39894 134f8770 1da7127b 6ba2805d 1cae79d6 68cfa70e dd7b008e 38117512 6af6162c 383c2b68 7c406c61 c1663397 d0644334 c09c43a5 8980204d f7d10ea3 55378be0 803ccd36 c677f22b 3fc63ef4 7340f50b 94b2df93 3584f41b a3ebc508 c2d5e7b7 05000014 2791316f c1755ba2 ab931f97 e1f76422 0800000c 01000000 60357282 0d000018 4abf4ff8 eca14630 9306a0c3 ca65c8dc fb2e7539 14000014 4a131c81 07035845 5c5728f2 0e95452f 14000018 bdea4f19 95328f9f a852b7c7 6d570813 677f2924 0d000018 8529ad60 9f7136ff 94a9be13 de1488d2 b98920ed 0d000014 afcad713 68a1f1c9 6b8696fc 77570100 0d00000c 09002689 dfd6b712 0d000014 12f5f28c 457168a9 702d9
8/15/2015 1:44:33 PM Debug VPN begin.
8/15/2015 1:44:33 PM Debug VPN seen nptype=1(sa)
8/15/2015 1:44:33 PM Debug VPN seen nptype=4(ke)
8/15/2015 1:44:33 PM Debug VPN seen nptype=10(nonce)
8/15/2015 1:44:33 PM Debug VPN seen nptype=5(id)
8/15/2015 1:44:33 PM Debug VPN seen nptype=8(hash)
8/15/2015 1:44:33 PM Debug VPN seen nptype=13(vid)
8/15/2015 1:44:33 PM Debug VPN seen nptype=20(nat-d)
8/15/2015 1:44:33 PM Debug VPN (repeated 1 times in last 0 sec) seen nptype=20(nat-d)
8/15/2015 1:44:33 PM Debug VPN seen nptype=13(vid)
8/15/2015 1:44:33 PM Debug VPN (repeated 4 times in last 0 sec) seen nptype=13(vid)
8/15/2015 1:44:33 PM Debug VPN succeed.
8/15/2015 1:44:33 PM Debug VPN received Vendor ID: RFC 3947
8/15/2015 1:44:33 PM Debug VPN received Vendor ID: DPD
8/15/2015 1:44:33 PM Debug VPN remote supports DPD
8/15/2015 1:44:33 PM Debug VPN received Vendor ID: draft-ietf-ipsra-isakmp-xauth-06.txt
8/15/2015 1:44:33 PM Debug VPN received unknown Vendor ID
8/15/2015 1:44:33 PM Debug VPN received Vendor ID: forticlient connect license
8/15/2015 1:44:33 PM Debug VPN remote supports FCC
8/15/2015 1:44:33 PM Debug VPN received unknown Vendor ID
8/15/2015 1:44:33 PM Debug VPN total SA len=56
8/15/2015 1:44:33 PM Debug VPN 00000001 00000001 00000030 01010001 00000028 01010000 800b0001 000c0004 00015180 80010007 800e0080 80030001 80020002 80040005
8/15/2015 1:44:33 PM Debug VPN begin.
8/15/2015 1:44:33 PM Debug VPN seen nptype=2(prop)
8/15/2015 1:44:33 PM Debug VPN succeed.
8/15/2015 1:44:33 PM Debug VPN proposal #1 len=48
8/15/2015 1:44:33 PM Debug VPN begin.
8/15/2015 1:44:33 PM Debug VPN seen nptype=3(trns)
8/15/2015 1:44:33 PM Debug VPN succeed.
8/15/2015 1:44:33 PM Debug VPN transform #1 len=40
8/15/2015 1:44:33 PM Debug VPN type=Life Type, flag=0x8000, lorv=seconds
8/15/2015 1:44:33 PM Debug VPN type=Life Duration, flag=0x0000, lorv=4
8/15/2015 1:44:33 PM Debug VPN type=Encryption Algorithm, flag=0x8000, lorv=AES-CBC
8/15/2015 1:44:33 PM Debug VPN encryption(aes128)
8/15/2015 1:44:33 PM Debug VPN type=Key Length, flag=0x8000, lorv=128
8/15/2015 1:44:33 PM Debug VPN type=Authentication Method, flag=0x8000, lorv=pre-shared key
8/15/2015 1:44:33 PM Debug VPN type=Hash Algorithm, flag=0x8000, lorv=SHA
8/15/2015 1:44:33 PM Debug VPN hash(sha1)
8/15/2015 1:44:33 PM Debug VPN type=Group Description, flag=0x8000, lorv=1536-bit MODP group
8/15/2015 1:44:33 PM Debug VPN hmac(modp1536)
8/15/2015 1:44:33 PM Debug VPN pair 1:
8/15/2015 1:44:33 PM Debug VPN 00493D28: next=00000000 tnext=00000000
8/15/2015 1:44:33 PM Debug VPN proposal #1: 1 transform
8/15/2015 1:44:33 PM Debug VPN prop#=1, prot-id=ISAKMP, spi-size=0, #trns=1
8/15/2015 1:44:33 PM Debug VPN trns#=1, trns-id=IKE
8/15/2015 1:44:33 PM Debug VPN type=Life Type, flag=0x8000, lorv=seconds
8/15/2015 1:44:33 PM Debug VPN type=Life Duration, flag=0x0000, lorv=4
8/15/2015 1:44:33 PM Debug VPN type=Encryption Algorithm, flag=0x8000, lorv=AES-CBC
8/15/2015 1:44:33 PM Debug VPN type=Key Length, flag=0x8000, lorv=128
8/15/2015 1:44:33 PM Debug VPN type=Authentication Method, flag=0x8000, lorv=pre-shared key
8/15/2015 1:44:33 PM Debug VPN type=Hash Algorithm, flag=0x8000, lorv=SHA
8/15/2015 1:44:33 PM Debug VPN type=Group Description, flag=0x8000, lorv=1536-bit MODP group
8/15/2015 1:44:33 PM Debug VPN Compared: DB:Peer
8/15/2015 1:44:33 PM Debug VPN (lifetime = 86400:86400)
8/15/2015 1:44:33 PM Debug VPN (lifebyte = zu:zu)
8/15/2015 1:44:33 PM Debug VPN enctype = AES-CBC:AES-CBC
8/15/2015 1:44:33 PM Debug VPN (encklen = 128:128)
8/15/2015 1:44:33 PM Debug VPN hashtype = SHA:SHA
8/15/2015 1:44:33 PM Debug VPN authmethod = pre-shared key:pre-shared key
8/15/2015 1:44:33 PM Debug VPN dh_group = 1536-bit MODP group:1536-bit MODP group
8/15/2015 1:44:33 PM Debug VPN an acceptable proposal found.
8/15/2015 1:44:33 PM Debug VPN hmac(modp1536)
8/15/2015 1:44:33 PM Debug VPN Selected NAT-T version: RFC 3947
8/15/2015 1:44:33 PM Debug VPN Hashing 192.168.0.185[500] with algo #2
8/15/2015 1:44:33 PM Debug VPN hash(sha1)
8/15/2015 1:44:33 PM Debug VPN NAT-D payload #-1 doesn't match
8/15/2015 1:44:33 PM Debug VPN Hashing 96.53.114.130[500] with algo #2
8/15/2015 1:44:33 PM Debug VPN hash(sha1)
8/15/2015 1:44:33 PM Debug VPN NAT-D payload #0 verified
8/15/2015 1:44:33 PM Debug VPN NAT detected: ME
8/15/2015 1:44:33 PM Debug VPN compute DH's shared.
8/15/2015 1:44:33 PM Debug VPN 8655ca90 159bc2d4 7ff7ffbd 8cbbaadf b15cf9bf a80e9230 c9a27700 9c3fdc54 8f9197e7 1af86d6d 2da4d03b be4385b7 9cf7d461 f38ee0cc 2806ddd9 39231085 1702215a 9bd943cb 13ecae16 169bca03 d28e5da3 d8b5ec89 894d3a24 f996f685 dba0293d 3fdf943e 8835bcd0 70447b3a 23ae1a42 efd4e950 ef7b6081 55cf9d54 bb1c3b10 a6ba3005 5c0b90ff f31fa9c9 b5219e0a 19a877ee 1220de54 da75eaa2 645c4d05 71effefc 6f79e7d2 11d99bcd 1c600f7f bba8e0d2 8594f296 8793b56f
8/15/2015 1:44:33 PM Debug VPN the psk found.
8/15/2015 1:44:33 PM Debug VPN psk:
8/15/2015 1:44:33 PM Debug VPN 2d303957 676c654e 21402377 696c6c6f 77676c65 6e
8/15/2015 1:44:33 PM Debug VPN nonce 1:
8/15/2015 1:44:33 PM Debug VPN be273795 27920211 cb4fb742 b326fd06
8/15/2015 1:44:33 PM Debug VPN nonce 2:
8/15/2015 1:44:33 PM Debug VPN 2791316f c1755ba2 ab931f97 e1f76422
8/15/2015 1:44:33 PM Debug VPN hmac(hmac_sha1)
8/15/2015 1:44:33 PM Debug VPN SKEYID computed:
8/15/2015 1:44:33 PM Debug VPN 359293e1 c717038d 65e8f09f eb829af7 5b770f06
8/15/2015 1:44:33 PM Debug VPN hmac(hmac_sha1)
8/15/2015 1:44:33 PM Debug VPN SKEYID_d computed:
8/15/2015 1:44:33 PM Debug VPN a2a3754e eb4c5e1e 1bc0f6d8 b82afe9b fb09ba42
8/15/2015 1:44:33 PM Debug VPN hmac(hmac_sha1)
8/15/2015 1:44:33 PM Debug VPN SKEYID_a computed:
8/15/2015 1:44:33 PM Debug VPN e3317dc4 fe02f601 3557bad3 6d78d3e7 152afe66
8/15/2015 1:44:33 PM Debug VPN hmac(hmac_sha1)
8/15/2015 1:44:33 PM Debug VPN SKEYID_e computed:
8/15/2015 1:44:33 PM Debug VPN d097c0fa 4697fe00 50df4059 187dbf38 a7eef9ea
8/15/2015 1:44:33 PM Debug VPN encryption(aes128)
8/15/2015 1:44:33 PM Debug VPN hash(sha1)
8/15/2015 1:44:33 PM Debug VPN final encryption key computed:
8/15/2015 1:44:33 PM Debug VPN ISAKMP-SA established 192.168.0.185[4500]-96.53.114.130[4500] spi:9e36c7a2f3e010dd:7e55b5f06c94cf2d
8/15/2015 1:44:33 PM Debug VPN ===
8/15/2015 1:44:33 PM Debug VPN (repeated 1 times in last 0 sec) ===
8/15/2015 1:44:34 PM Debug VPN 108 bytes message received from 96.53.114.130[4500] to 192.168.0.185[4500]
8/15/2015 1:44:34 PM Debug VPN 9e36c7a2 f3e010dd 7e55b5f0 6c94cf2d 08100501 6fe4a203 0000006c af1430d8 a39aa30d fb119f32 50805c2e 82f657dd 79b5b88d 350fd2a6 287520d1 1c2f4039 b8d5e049 7e42504e 2d9cd9a5 22c7cd57 72e7e2e5 daff3406 70e46133 c96b30a9 87d4b738 f90a5148 ff82e6bf
8/15/2015 1:44:34 PM Debug VPN receive Information.
8/15/2015 1:44:34 PM Debug VPN compute IV for phase2
8/15/2015 1:44:34 PM Debug VPN phase1 last IV:
8/15/2015 1:44:34 PM Debug VPN 685a83d2 d77c963f 34b254ec 26d619c8 6fe4a203
8/15/2015 1:44:34 PM Debug VPN hash(sha1)
8/15/2015 1:44:34 PM Debug VPN encryption(aes128)
8/15/2015 1:44:34 PM Debug VPN phase2 IV computed:
8/15/2015 1:44:34 PM Debug VPN 89d3aef9 f134a053 c25145a0 bbacba3d
8/15/2015 1:44:34 PM Debug VPN begin decryption.
8/15/2015 1:44:34 PM Debug VPN encryption(aes128)
8/15/2015 1:44:34 PM Debug VPN IV was saved for next processing:
8/15/2015 1:44:34 PM Debug VPN c96b30a9 87d4b738 f90a5148 ff82e6bf
8/15/2015 1:44:34 PM Debug VPN encryption(aes128)
8/15/2015 1:44:34 PM Debug VPN with key:
8/15/2015 1:44:34 PM Debug VPN d097c0fa 4697fe00 50df4059 187dbf38
8/15/2015 1:44:34 PM Debug VPN decrypted payload by IV:
8/15/2015 1:44:34 PM Debug VPN 89d3aef9 f134a053 c25145a0 bbacba3d
8/15/2015 1:44:34 PM Debug VPN decrypted payload, but not trimed.
8/15/2015 1:44:34 PM Debug VPN 0b000018 da6d0713 25543ca9 ff2982c3 86923c88 31d3493b 00000028 00000001 01106000 9e36c7a2 f3e010dd 7e55b5f0 6c94cf2d 800b0001 000c0004 00007080 f35688f9 efcf6662 0195e669 e589340f
8/15/2015 1:44:34 PM Debug VPN padding len=16
8/15/2015 1:44:34 PM Debug VPN skip to trim padding.
8/15/2015 1:44:34 PM Debug VPN decrypted.
8/15/2015 1:44:34 PM Debug VPN 9e36c7a2 f3e010dd 7e55b5f0 6c94cf2d 08100501 6fe4a203 0000006c 0b000018 da6d0713 25543ca9 ff2982c3 86923c88 31d3493b 00000028 00000001 01106000 9e36c7a2 f3e010dd 7e55b5f0 6c94cf2d 800b0001 000c0004 00007080 f35688f9 efcf6662 0195e669 e589340f
8/15/2015 1:44:34 PM Debug VPN HASH with:
8/15/2015 1:44:34 PM Debug VPN 6fe4a203 00000028 00000001 01106000 9e36c7a2 f3e010dd 7e55b5f0 6c94cf2d 800b0001 000c0004 00007080
8/15/2015 1:44:34 PM Debug VPN hmac(hmac_sha1)
8/15/2015 1:44:34 PM Debug VPN HASH computed:
8/15/2015 1:44:34 PM Debug VPN da6d0713 25543ca9 ff2982c3 86923c88 31d3493b
8/15/2015 1:44:34 PM Debug VPN hash validated.
8/15/2015 1:44:34 PM Debug VPN begin.
8/15/2015 1:44:34 PM Debug VPN seen nptype=8(hash)
8/15/2015 1:44:34 PM Debug VPN seen nptype=11(notify)
8/15/2015 1:44:34 PM Debug VPN succeed.
8/15/2015 1:44:34 PM Debug VPN notification message 24576:RESPONDER-LIFETIME, doi=1 proto_id=1 spi=9e36c7a2f3e010dd 7e55b5f06c94cf2d (size=16).
8/15/2015 1:44:34 PM Debug VPN ===
8/15/2015 1:44:34 PM Debug VPN 76 bytes message received from 96.53.114.130[4500] to 192.168.0.185[4500]
8/15/2015 1:44:34 PM Debug VPN 9e36c7a2 f3e010dd 7e55b5f0 6c94cf2d 08100601 1470d0ed 0000004c a190e897 a4a1ba96 48492451 6dd9647e eed4f7e8 ee90f6c4 44c76394 e937609c 15212b63 5868c216 a540edac 9c42f032
8/15/2015 1:44:34 PM Debug VPN compute IV for phase2
8/15/2015 1:44:34 PM Debug VPN phase1 last IV:
8/15/2015 1:44:34 PM Debug VPN 685a83d2 d77c963f 34b254ec 26d619c8 1470d0ed
8/15/2015 1:44:34 PM Debug VPN hash(sha1)
8/15/2015 1:44:34 PM Debug VPN encryption(aes128)
8/15/2015 1:44:34 PM Debug VPN phase2 IV computed:
8/15/2015 1:44:34 PM Debug VPN 875882be 75866236 57c4993f 02d6e539
8/15/2015 1:44:34 PM Debug VPN begin decryption.
8/15/2015 1:44:34 PM Debug VPN encryption(aes128)
8/15/2015 1:44:34 PM Debug VPN IV was saved for next processing:
8/15/2015 1:44:34 PM Debug VPN 15212b63 5868c216 a540edac 9c42f032
8/15/2015 1:44:34 PM Debug VPN encryption(aes128)
8/15/2015 1:44:34 PM Debug VPN with key:
8/15/2015 1:44:34 PM Debug VPN d097c0fa 4697fe00 50df4059 187dbf38
8/15/2015 1:44:34 PM Debug VPN decrypted payload by IV:
8/15/2015 1:44:34 PM Debug VPN 875882be 75866236 57c4993f 02d6e539
8/15/2015 1:44:34 PM Debug VPN decrypted payload, but not trimed.
8/15/2015 1:44:34 PM Debug VPN 0e000018 d6b8e5ea f624c487 e0e95368 94843c4d c41a9ef7 00000014 01007b84 c0880000 40890000 408a0000 c5b23c03
8/15/2015 1:44:34 PM Debug VPN padding len=4
8/15/2015 1:44:34 PM Debug VPN skip to trim padding.
8/15/2015 1:44:34 PM Debug VPN decrypted.
8/15/2015 1:44:34 PM Debug VPN 9e36c7a2 f3e010dd 7e55b5f0 6c94cf2d 08100601 1470d0ed 0000004c 0e000018 d6b8e5ea f624c487 e0e95368 94843c4d c41a9ef7 00000014 01007b84 c0880000 40890000 408a0000 c5b23c03
8/15/2015 1:44:34 PM Debug VPN MODE_CFG packet
8/15/2015 1:44:34 PM Debug VPN 9e36c7a2 f3e010dd 7e55b5f0 6c94cf2d 08100601 1470d0ed 0000004c 0e000018 d6b8e5ea f624c487 e0e95368 94843c4d c41a9ef7 00000014 01007b84 c0880000 40890000 408a0000 c5b23c03
8/15/2015 1:44:34 PM Debug VPN Seen payload 8
8/15/2015 1:44:34 PM Debug VPN 0e000018 d6b8e5ea f624c487 e0e95368 94843c4d c41a9ef7
8/15/2015 1:44:34 PM Debug VPN HASH with:
8/15/2015 1:44:34 PM Debug VPN 1470d0ed 00000014 01007b84 c0880000 40890000 408a0000
8/15/2015 1:44:34 PM Debug VPN hmac(hmac_sha1)
8/15/2015 1:44:34 PM Debug VPN HASH computed:
8/15/2015 1:44:34 PM Debug VPN d6b8e5ea f624c487 e0e95368 94843c4d c41a9ef7
8/15/2015 1:44:34 PM Debug VPN Seen payload 14
8/15/2015 1:44:34 PM Debug VPN 00000014 01007b84 c0880000 40890000 408a0000
8/15/2015 1:44:34 PM Debug VPN Short attribute 16520 = 0
8/15/2015 1:44:34 PM Debug VPN Attribute 16521, len 0
8/15/2015 1:44:34 PM Debug VPN Attribute 16522, len 0
8/15/2015 1:44:34 PM Debug VPN HASH with:
8/15/2015 1:44:34 PM Debug VPN 1470d0ed 00000026 02007b84 c0880000 40890007 622e6a65 74686140 8a000b2a 4368696c 69646f67 362a
8/15/2015 1:44:34 PM Debug VPN hmac(hmac_sha1)
8/15/2015 1:44:34 PM Debug VPN HASH computed:
8/15/2015 1:44:34 PM Debug VPN 58190ba0 447f81c0 6b5e0592 3c799170 56c7bf44
8/15/2015 1:44:34 PM Debug VPN MODE_CFG packet to send
8/15/2015 1:44:34 PM Debug VPN 9e36c7a2 f3e010dd 7e55b5f0 6c94cf2d 08100601 1470d0ed 0000005a 0e000018 58190ba0 447f81c0 6b5e0592 3c799170 56c7bf44 00000026 02007b84 c0880000 40890007 622e6a65 74686140 8a000b2a 4368696c 69646f67 362a
8/15/2015 1:44:34 PM Debug VPN begin encryption.
8/15/2015 1:44:34 PM Debug VPN encryption(aes128)
8/15/2015 1:44:34 PM Debug VPN pad length = 2
8/15/2015 1:44:34 PM Debug VPN 0e000018 58190ba0 447f81c0 6b5e0592 3c799170 56c7bf44 00000026 02007b84 c0880000 40890007 622e6a65 74686140 8a000b2a 4368696c 69646f67 362a9201
8/15/2015 1:44:34 PM Debug VPN encryption(aes128)
8/15/2015 1:44:34 PM Debug VPN with key:
8/15/2015 1:44:34 PM Debug VPN d097c0fa 4697fe00 50df4059 187dbf38
8/15/2015 1:44:34 PM Debug VPN encrypted payload by IV:
8/15/2015 1:44:34 PM Debug VPN 15212b63 5868c216 a540edac 9c42f032
8/15/2015 1:44:34 PM Debug VPN save IV for next:
8/15/2015 1:44:34 PM Debug VPN 7d6a8d2a bb49494f e34ed6e2 5e71e3c8
8/15/2015 1:44:34 PM Debug VPN encrypted.
8/15/2015 1:44:34 PM Debug VPN sendto mode config attr.
8/15/2015 1:44:34 PM Debug VPN Adding NON-ESP marker
8/15/2015 1:44:34 PM Debug VPN 96 bytes from 192.168.0.185[4500] to 96.53.114.130[4500]
8/15/2015 1:44:34 PM Debug VPN sockname 192.168.0.185[4500]
8/15/2015 1:44:34 PM Debug VPN send packet from 192.168.0.185[4500]
8/15/2015 1:44:34 PM Debug VPN send packet to 96.53.114.130[4500]
8/15/2015 1:44:34 PM Debug VPN 1 times of 96 bytes message will be sent to 96.53.114.130[4500]
8/15/2015 1:44:34 PM Debug VPN 00000000 9e36c7a2 f3e010dd 7e55b5f0 6c94cf2d 08100601 1470d0ed 0000005c 060134ed 56d44072 481bc075 13a035a4 ab761bbe dda0ed03 78c783b6 cc4c6d07 2fac010a 96de2f4e 8c6fa983 5e122582 7d6a8d2a bb49494f e34ed6e2 5e71e3c8
8/15/2015 1:44:34 PM Notice VPN id=96566 msg="negotiation information, loc_ip=192.168.0.185 loc_port=4500 rem_ip=96.53.114.130 rem_port=4500 out_if=0 vpn_tunnel=Willowglen action=negotiate init=remote mode=xauth_client stage=0 dir=inbound status=success Responder: parsed 96.53.114.130 xauth_client mode me" vpntunnel=Willowglen vpntype=ipsec
8/15/2015 1:44:34 PM Debug VPN ===
8/15/2015 1:44:34 PM Debug VPN 76 bytes message received from 96.53.114.130[4500] to 192.168.0.185[4500]
8/15/2015 1:44:34 PM Debug VPN 9e36c7a2 f3e010dd 7e55b5f0 6c94cf2d 08100601 9ebf98cd 0000004c bce5a6ba 05dbf3d5 cd943651 b72451b6 a6d03b7b 443aa2c6 0f3e9e73 85f0e514 ccf4b994 bb3f9a31 f275f20d 872e5d22
8/15/2015 1:44:34 PM Debug VPN compute IV for phase2
8/15/2015 1:44:34 PM Debug VPN phase1 last IV:
8/15/2015 1:44:34 PM Debug VPN 685a83d2 d77c963f 34b254ec 26d619c8 9ebf98cd
8/15/2015 1:44:34 PM Debug VPN hash(sha1)
8/15/2015 1:44:34 PM Debug VPN encryption(aes128)
8/15/2015 1:44:34 PM Debug VPN phase2 IV computed:
8/15/2015 1:44:34 PM Debug VPN de2dfd23 185ed2f1 fd8be4b1 e2bffec8
8/15/2015 1:44:34 PM Debug VPN begin decryption.
8/15/2015 1:44:34 PM Debug VPN encryption(aes128)
8/15/2015 1:44:34 PM Debug VPN IV was saved for next processing:
8/15/2015 1:44:34 PM Debug VPN ccf4b994 bb3f9a31 f275f20d 872e5d22
8/15/2015 1:44:34 PM Debug VPN encryption(aes128)
8/15/2015 1:44:34 PM Debug VPN with key:
8/15/2015 1:44:34 PM Debug VPN d097c0fa 4697fe00 50df4059 187dbf38
8/15/2015 1:44:34 PM Debug VPN decrypted payload by IV:
8/15/2015 1:44:34 PM Debug VPN de2dfd23 185ed2f1 fd8be4b1 e2bffec8
8/15/2015 1:44:34 PM Debug VPN decrypted payload, but not trimed.
8/15/2015 1:44:34 PM Debug VPN 0e000018 fa1d6beb b7c1650e 6a449e0b 2bc27891 10a5cd24 0000000c 03007b84 c08f0001 8136b53f a750d5af 73722d0b
8/15/2015 1:44:34 PM Debug VPN padding len=12
8/15/2015 1:44:34 PM Debug VPN skip to trim padding.
8/15/2015 1:44:34 PM Debug VPN decrypted.
8/15/2015 1:44:34 PM Debug VPN 9e36c7a2 f3e010dd 7e55b5f0 6c94cf2d 08100601 9ebf98cd 0000004c 0e000018 fa1d6beb b7c1650e 6a449e0b 2bc27891 10a5cd24 0000000c 03007b84 c08f0001 8136b53f a750d5af 73722d0b
8/15/2015 1:44:34 PM Debug VPN MODE_CFG packet
8/15/2015 1:44:34 PM Debug VPN 9e36c7a2 f3e010dd 7e55b5f0 6c94cf2d 08100601 9ebf98cd 0000004c 0e000018 fa1d6beb b7c1650e 6a449e0b 2bc27891 10a5cd24 0000000c 03007b84 c08f0001 8136b53f a750d5af 73722d0b
8/15/2015 1:44:34 PM Debug VPN Seen payload 8
8/15/2015 1:44:34 PM Debug VPN 0e000018 fa1d6beb b7c1650e 6a449e0b 2bc27891 10a5cd24
8/15/2015 1:44:34 PM Debug VPN HASH with:
8/15/2015 1:44:34 PM Debug VPN 9ebf98cd 0000000c 03007b84 c08f0001
8/15/2015 1:44:34 PM Debug VPN hmac(hmac_sha1)
8/15/2015 1:44:34 PM Debug VPN HASH computed:
8/15/2015 1:44:34 PM Debug VPN fa1d6beb b7c1650e 6a449e0b 2bc27891 10a5cd24
8/15/2015 1:44:34 PM Debug VPN Seen payload 14
8/15/2015 1:44:34 PM Debug VPN 0000000c 03007b84 c08f0001
8/15/2015 1:44:34 PM Notice VPN id=96566 msg="negotiation information, loc_ip=192.168.0.185 loc_port=4500 rem_ip=96.53.114.130 rem_port=4500 out_if=0 vpn_tunnel=Willowglen action=negotiate init=remote mode=xauth_client stage=2 dir=inbound status=success Responder: parsed 96.53.114.130 xauth_client mode me" vpntunnel=Willowglen vpntype=ipsec
8/15/2015 1:44:34 PM Notice VPN id=96566 msg="negotiation information, loc_ip=192.168.0.185 loc_port=4500 rem_ip=96.53.114.130 rem_port=4500 out_if=0 vpn_tunnel=Willowglen action=negotiate init=local mode=xauth_client stage=0 dir=inbound status=success Initiator: parsed 96.53.114.130 xauth_client mode mes" vpntunnel=Willowglen vpntype=ipsec
8/15/2015 1:44:34 PM Debug VPN Sending MODE_CFG ACK
8/15/2015 1:44:34 PM Debug VPN HASH with:
8/15/2015 1:44:34 PM Debug VPN 9ebf98cd 00000008 04007b84
8/15/2015 1:44:34 PM Debug VPN hmac(hmac_sha1)
8/15/2015 1:44:35 PM Debug VPN HASH computed:
8/15/2015 1:44:35 PM Debug VPN 6f591aa2 c1436428 47572904 06b55d1f 7ebef336
8/15/2015 1:44:35 PM Debug VPN MODE_CFG packet to send
8/15/2015 1:44:35 PM Debug VPN 9e36c7a2 f3e010dd 7e55b5f0 6c94cf2d 08100601 9ebf98cd 0000003c 0e000018 6f591aa2 c1436428 47572904 06b55d1f 7ebef336 00000008 04007b84
8/15/2015 1:44:35 PM Debug VPN begin encryption.
8/15/2015 1:44:35 PM Debug VPN encryption(aes128)
8/15/2015 1:44:35 PM Debug VPN pad length = 16
8/15/2015 1:44:35 PM Debug VPN 0e000018 6f591aa2 c1436428 47572904 06b55d1f 7ebef336 00000008 04007b84 81bfa090 ce8bccb0 d8ffacd0 dbc1cb0f
8/15/2015 1:44:35 PM Debug VPN encryption(aes128)
8/15/2015 1:44:35 PM Debug VPN with key:
8/15/2015 1:44:35 PM Debug VPN d097c0fa 4697fe00 50df4059 187dbf38
8/15/2015 1:44:35 PM Debug VPN encrypted payload by IV:
8/15/2015 1:44:35 PM Debug VPN ccf4b994 bb3f9a31 f275f20d 872e5d22
8/15/2015 1:44:35 PM Debug VPN save IV for next:
8/15/2015 1:44:35 PM Debug VPN 3f4569df 8a0113f9 b6ba57c0 69c70162
8/15/2015 1:44:35 PM Debug VPN encrypted.
8/15/2015 1:44:35 PM Debug VPN sendto mode config attr.
8/15/2015 1:44:35 PM Debug VPN Adding NON-ESP marker
8/15/2015 1:44:35 PM Debug VPN 80 bytes from 192.168.0.185[4500] to 96.53.114.130[4500]
8/15/2015 1:44:35 PM Debug VPN sockname 192.168.0.185[4500]
8/15/2015 1:44:35 PM Debug VPN send packet from 192.168.0.185[4500]
8/15/2015 1:44:35 PM Debug VPN send packet to 96.53.114.130[4500]
8/15/2015 1:44:35 PM Debug VPN 1 times of 80 bytes message will be sent to 96.53.114.130[4500]
8/15/2015 1:44:35 PM Debug VPN 00000000 9e36c7a2 f3e010dd 7e55b5f0 6c94cf2d 08100601 9ebf98cd 0000004c 63322c3b 362a67e2 9ceb8013 5bb9903b db785cc5 38bbc877 801d4dd0 d671fe24 3f4569df 8a0113f9 b6ba57c0 69c70162
8/15/2015 1:44:35 PM Notice VPN id=96566 msg="negotiation information, loc_ip=192.168.0.185 loc_port=4500 rem_ip=96.53.114.130 rem_port=4500 out_if=0 vpn_tunnel=Willowglen action=negotiate init=remote mode=xauth_client stage=0 dir=inbound status=success Responder: parsed 96.53.114.130 xauth_client mode me" vpntunnel=Willowglen vpntype=ipsec
8/15/2015 1:44:35 PM Debug VPN Sending MODE_CFG REQUEST
8/15/2015 1:44:35 PM Debug VPN compute IV for phase2
8/15/2015 1:44:35 PM Debug VPN phase1 last IV:
8/15/2015 1:44:35 PM Debug VPN 685a83d2 d77c963f 34b254ec 26d619c8 b0bb4905
8/15/2015 1:44:35 PM Debug VPN hash(sha1)
8/15/2015 1:44:35 PM Debug VPN encryption(aes128)
8/15/2015 1:44:35 PM Debug VPN phase2 IV computed:
8/15/2015 1:44:35 PM Debug VPN 022521f1 af7add06 0651984a 358603e3
8/15/2015 1:44:35 PM Debug VPN HASH with:
8/15/2015 1:44:35 PM Debug VPN b0bb4905 00000040 0100d2b9 00010000 00020000 00030000 00040000 000d0000 70000000 70020000 70030000 70040000 70060000 70010000 d40a0000 d40b0000 00070000
8/15/2015 1:44:35 PM Debug VPN hmac(hmac_sha1)
8/15/2015 1:44:35 PM Debug VPN HASH computed:
8/15/2015 1:44:35 PM Debug VPN 05367dfe 8aada21d 6dd32dbb ab18fcb7 00ec07b8
8/15/2015 1:44:35 PM Debug VPN MODE_CFG packet to send
8/15/2015 1:44:35 PM Debug VPN 9e36c7a2 f3e010dd 7e55b5f0 6c94cf2d 08100601 b0bb4905 00000074 0e000018 05367dfe 8aada21d 6dd32dbb ab18fcb7 00ec07b8 00000040 0100d2b9 00010000 00020000 00030000 00040000 000d0000 70000000 70020000 70030000 70040000 70060000 70010000 d40a0000 d40b0000 00070000
8/15/2015 1:44:35 PM Debug VPN begin encryption.
8/15/2015 1:44:35 PM Debug VPN encryption(aes128)
8/15/2015 1:44:35 PM Debug VPN pad length = 8
8/15/2015 1:44:35 PM Debug VPN 0e000018 05367dfe 8aada21d 6dd32dbb ab18fcb7 00ec07b8 00000040 0100d2b9 00010000 00020000 00030000 00040000 000d0000 70000000 70020000 70030000 70040000 70060000 70010000 d40a0000 d40b0000 00070000 e1c1acd5 c79edd07
8/15/2015 1:44:35 PM Debug VPN encryption(aes128)
8/15/2015 1:44:35 PM Debug VPN with key:
8/15/2015 1:44:35 PM Debug VPN d097c0fa 4697fe00 50df4059 187dbf38
8/15/2015 1:44:35 PM Debug VPN encrypted payload by IV:
8/15/2015 1:44:35 PM Debug VPN 022521f1 af7add06 0651984a 358603e3
8/15/2015 1:44:35 PM Debug VPN save IV for next:
8/15/2015 1:44:35 PM Debug VPN 2cf9f87b 5dfd2013 25eb3c62 59f9e6e6
8/15/2015 1:44:35 PM Debug VPN encrypted.
8/15/2015 1:44:35 PM Debug VPN sendto mode config attr.
8/15/2015 1:44:35 PM Debug VPN Adding NON-ESP marker
8/15/2015 1:44:35 PM Debug VPN 128 bytes from 192.168.0.185[4500] to 96.53.114.130[4500]
8/15/2015 1:44:35 PM Debug VPN sockname 192.168.0.185[4500]
8/15/2015 1:44:35 PM Debug VPN send packet from 192.168.0.185[4500]
8/15/2015 1:44:35 PM Debug VPN send packet to 96.53.114.130[4500]
8/15/2015 1:44:36 PM Debug VPN Mode configuration not completed
8/15/2015 1:44:36 PM Debug VPN CHKPH1THERE: no established ph1 handler found
8/15/2015 1:44:37 PM Debug VPN Mode configuration not completed
8/15/2015 1:44:37 PM Debug VPN CHKPH1THERE: no established ph1 handler found
8/15/2015 1:44:38 PM Debug VPN Adding NON-ESP marker
8/15/2015 1:44:38 PM Debug VPN 132 bytes from 192.168.0.185[4500] to 96.53.114.130[4500]
8/15/2015 1:44:38 PM Debug VPN sockname 192.168.0.185[4500]
8/15/2015 1:44:38 PM Debug VPN send packet from 192.168.0.185[4500]
8/15/2015 1:44:38 PM Debug VPN send packet to 96.53.114.130[4500]
8/15/2015 1:44:38 PM Debug VPN 1 times of 132 bytes message will be sent to 96.53.114.130[4500]
8/15/2015 1:44:38 PM Debug VPN 00000000 00000000 9e36c7a2 f3e010dd 7e55b5f0 6c94cf2d 08100601 b0bb4905 0000007c 12f42f1d c3a0eac0 338713bd 0ea45f11 5a183ae8 667e337a 8c33081e ff15436d a6e04efd eed1713a 824a1e27 e34721dc 400e1aa6 d106e7bd bd72bf0d 3ea13b06 5f70b588 61f4fb2c 51536829 3596c58f 2cf9f87b 5dfd2013 25eb3c62 59f9e6e6
8/15/2015 1:44:38 PM Debug VPN resend phase1 packet 9e36c7a2f3e010dd:7e55b5f06c94cf2d:00009ebf
8/15/2015 1:44:38 PM Debug VPN Mode configuration not completed
8/15/2015 1:44:38 PM Debug VPN CHKPH1THERE: no established ph1 handler found
8/15/2015 1:44:39 PM Debug VPN DPD monitoring....
8/15/2015 1:44:39 PM Debug VPN compute IV for phase2
8/15/2015 1:44:39 PM Debug VPN phase1 last IV:
8/15/2015 1:44:39 PM Debug VPN 685a83d2 d77c963f 34b254ec 26d619c8 fec0504d
8/15/2015 1:44:39 PM Debug VPN hash(sha1)
8/15/2015 1:44:39 PM Debug VPN encryption(aes128)
8/15/2015 1:44:39 PM Debug VPN phase2 IV computed:
8/15/2015 1:44:39 PM Debug VPN 89a0d5d1 94e1aabe 3facd8de cf9ef62e
8/15/2015 1:44:39 PM Debug VPN HASH with:
8/15/2015 1:44:39 PM Debug VPN fec0504d 00000020 00000001 01108d28 9e36c7a2 f3e010dd 7e55b5f0 6c94cf2d 000006ad
8/15/2015 1:44:39 PM Debug VPN hmac(hmac_sha1)
8/15/2015 1:44:39 PM Debug VPN HASH computed:
8/15/2015 1:44:39 PM Debug VPN 80e48e98 3809aa45 51abec3a b9cbdf7c ca54a2ad
8/15/2015 1:44:39 PM Debug VPN begin encryption.
8/15/2015 1:44:39 PM Debug VPN encryption(aes128)
8/15/2015 1:44:39 PM Debug VPN pad length = 8
8/15/2015 1:44:39 PM Debug VPN 0b000018 80e48e98 3809aa45 51abec3a b9cbdf7c ca54a2ad 00000020 00000001 01108d28 9e36c7a2 f3e010dd 7e55b5f0 6c94cf2d 000006ad afe6b1e6 c5ec9907
8/15/2015 1:44:39 PM Debug VPN encryption(aes128)
8/15/2015 1:44:39 PM Debug VPN with key:
8/15/2015 1:44:39 PM Debug VPN d097c0fa 4697fe00 50df4059 187dbf38
8/15/2015 1:44:39 PM Debug VPN encrypted payload by IV:
8/15/2015 1:44:39 PM Debug VPN 89a0d5d1 94e1aabe 3facd8de cf9ef62e
8/15/2015 1:44:39 PM Debug VPN save IV for next:
8/15/2015 1:44:39 PM Debug VPN 734e40da 7581ac9c 677ef07b fafd8444
8/15/2015 1:44:39 PM Debug VPN encrypted.
8/15/2015 1:44:39 PM Debug VPN Adding NON-ESP marker
8/15/2015 1:44:39 PM Debug VPN 96 bytes from 192.168.0.185[4500] to 96.53.114.130[4500]
8/15/2015 1:44:39 PM Debug VPN sockname 192.168.0.185[4500]
8/15/2015 1:44:39 PM Debug VPN send packet from 192.168.0.185[4500]
8/15/2015 1:44:39 PM Debug VPN send packet to 96.53.114.130[4500]
8/15/2015 1:44:39 PM Debug VPN 1 times of 96 bytes message will be sent to 96.53.114.130[4500]
8/15/2015 1:44:39 PM Debug VPN 00000000 9e36c7a2 f3e010dd 7e55b5f0 6c94cf2d 08100501 fec0504d 0000005c 2b1a7052 e9638e71 1101b623 2d8314fd 704c641f c1565e30 bd6fd935 518efe78 6c4d5f30 9d0a5e3e 0359012c 8c1000e8 734e40da 7581ac9c 677ef07b fafd8444
8/15/2015 1:44:39 PM Debug VPN sendto Information notify.
8/15/2015 1:44:39 PM Debug VPN DPD R-U-There sent (0)
8/15/2015 1:44:39 PM Debug VPN rescheduling send_r_u (5).
8/15/2015 1:44:39 PM Debug VPN Mode configuration not completed
8/15/2015 1:44:39 PM Debug VPN CHKPH1THERE: no established ph1 handler found
8/15/2015 1:44:39 PM Debug ESNAC Timeout in select in SocketConnect
8/15/2015 1:44:39 PM Debug VPN ===
8/15/2015 1:44:39 PM Debug VPN 92 bytes message received from 96.53.114.130[4500] to 192.168.0.185[4500]
8/15/2015 1:44:39 PM Debug VPN 9e36c7a2 f3e010dd 7e55b5f0 6c94cf2d 08100501 35a8abe6 0000005c 0fe94b5e 4f8a91ac 9ceb4c96 67a97748 ab9fd307 7e628c38 a537d5c9 17b2c9e0 e51bebce c2b90067 7db52551 abc6cd5d 13efd4e6 1523497b 57e96d85 92ec9b94
8/15/2015 1:44:39 PM Debug VPN receive Information.
8/15/2015 1:44:39 PM Debug VPN compute IV for phase2
8/15/2015 1:44:39 PM Debug VPN phase1 last IV:
8/15/2015 1:44:39 PM Debug VPN 685a83d2 d77c963f 34b254ec 26d619c8 35a8abe6
8/15/2015 1:44:39 PM Debug VPN hash(sha1)
8/15/2015 1:44:39 PM Debug VPN encryption(aes128)
8/15/2015 1:44:39 PM Debug VPN phase2 IV computed:
8/15/2015 1:44:39 PM Debug VPN 61b23a87 7422f0a4 eae84937 a7d5ec33
8/15/2015 1:44:39 PM Debug VPN begin decryption.
8/15/2015 1:44:39 PM Debug VPN encryption(aes128)
8/15/2015 1:44:39 PM Debug VPN IV was saved for next processing:
8/15/2015 1:44:39 PM Debug VPN 13efd4e6 1523497b 57e96d85 92ec9b94
8/15/2015 1:44:39 PM Debug VPN encryption(aes128)
8/15/2015 1:44:39 PM Debug VPN with key:
8/15/2015 1:44:39 PM Debug VPN d097c0fa 4697fe00 50df4059 187dbf38
8/15/2015 1:44:39 PM Debug VPN decrypted payload by IV:
8/15/2015 1:44:39 PM Debug VPN 61b23a87 7422f0a4 eae84937 a7d5ec33
8/15/2015 1:44:39 PM Debug VPN decrypted payload, but not trimed.
8/15/2015 1:44:39 PM Debug VPN 0b000018 7e54c307 5ed3889c b59b9852 6acef300 c7589cc8 00000020 00000001 01108d29 9e36c7a2 f3e010dd 7e55b5f0 6c94cf2d 000006ad 922f0932 1eb76407
8/15/2015 1:44:39 PM Debug VPN padding len=8
8/15/2015 1:44:39 PM Debug VPN skip to trim padding.
8/15/2015 1:44:39 PM Debug VPN decrypted.
8/15/2015 1:44:39 PM Debug VPN 9e36c7a2 f3e010dd 7e55b5f0 6c94cf2d 08100501 35a8abe6 0000005c 0b000018 7e54c307 5ed3889c b59b9852 6acef300 c7589cc8 00000020 00000001 01108d29 9e36c7a2 f3e010dd 7e55b5f0 6c94cf2d 000006ad 922f0932 1eb76407
8/15/2015 1:44:39 PM Debug VPN HASH with:
8/15/2015 1:44:39 PM Debug VPN 35a8abe6 00000020 00000001 01108d29 9e36c7a2 f3e010dd 7e55b5f0 6c94cf2d 000006ad
8/15/2015 1:44:39 PM Debug VPN hmac(hmac_sha1)
8/15/2015 1:44:39 PM Debug VPN HASH computed:
8/15/2015 1:44:39 PM Debug VPN 7e54c307 5ed3889c b59b9852 6acef300 c7589cc8
8/15/2015 1:44:39 PM Debug VPN hash validated.
8/15/2015 1:44:39 PM Debug VPN begin.
8/15/2015 1:44:39 PM Debug VPN seen nptype=8(hash)
8/15/2015 1:44:39 PM Debug VPN seen nptype=11(notify)
8/15/2015 1:44:39 PM Debug VPN succeed.
8/15/2015 1:44:39 PM Debug VPN DPD R-U-There-Ack received
8/15/2015 1:44:39 PM Debug VPN received an R-U-THERE-ACK
8/15/2015 1:44:39 PM Debug VPN notification message 36137:R-U-THERE-ACK, doi=1 proto_id=1 spi=9e36c7a2f3e010dd 7e55b5f06c94cf2d (size=16).
8/15/2015 1:44:39 PM Debug ESNAC dwSilentReg false
8/15/2015 1:44:39 PM Debug ESNAC Start searching for FGT
8/15/2015 1:44:40 PM Debug VPN Mode configuration not completed
8/15/2015 1:44:40 PM Debug VPN CHKPH1THERE: no established ph1 handler found
8/15/2015 1:44:40 PM Debug ESNAC IP Table Change
8/15/2015 1:44:40 PM Debug ESNAC Timeout in select in SocketConnect
8/15/2015 1:44:40 PM Debug ESNAC Socket connect failed
8/15/2015 1:44:40 PM Debug ESNAC 192.168.0.1:8010
8/15/2015 1:44:40 PM Debug ESNAC End searching for FGT
8/15/2015 1:44:41 PM Debug VPN Adding NON-ESP marker
8/15/2015 1:44:41 PM Debug VPN 136 bytes from 192.168.0.185[4500] to 96.53.114.130[4500]
8/15/2015 1:44:41 PM Debug VPN sockname 192.168.0.185[4500]
8/15/2015 1:44:41 PM Debug VPN send packet from 192.168.0.185[4500]
8/15/2015 1:44:41 PM Debug VPN send packet to 96.53.114.130[4500]
8/15/2015 1:44:41 PM Debug VPN 1 times of 136 bytes message will be sent to 96.53.114.130[4500]
8/15/2015 1:44:41 PM Debug VPN 00000000 00000000 00000000 9e36c7a2 f3e010dd 7e55b5f0 6c94cf2d 08100601 b0bb4905 0000007c 12f42f1d c3a0eac0 338713bd 0ea45f11 5a183ae8 667e337a 8c33081e ff15436d a6e04efd eed1713a 824a1e27 e34721dc 400e1aa6 d106e7bd bd72bf0d 3ea13b06 5f70b588 61f4fb2c 51536829 3596c58f 2cf9f87b 5dfd2013 25eb3c62 59f9e6e6
8/15/2015 1:44:41 PM Debug VPN resend phase1 packet 9e36c7a2f3e010dd:7e55b5f06c94cf2d:00009ebf
8/15/2015 1:44:41 PM Debug VPN Mode configuration not completed
8/15/2015 1:44:41 PM Debug VPN CHKPH1THERE: no established ph1 handler found
8/15/2015 1:44:41 PM Debug VPN Mode configuration not completed
8/15/2015 1:44:41 PM Debug VPN CHKPH1THERE: no established ph1 handler found
8/15/2015 1:44:43 PM Debug VPN Mode configuration not completed
8/15/2015 1:44:43 PM Debug VPN CHKPH1THERE: no established ph1 handler found
8/15/2015 1:44:44 PM Debug VPN DPD monitoring....
8/15/2015 1:44:44 PM Debug VPN compute IV for phase2
8/15/2015 1:44:44 PM Debug VPN phase1 last IV:
8/15/2015 1:44:44 PM Debug VPN 685a83d2 d77c963f 34b254ec 26d619c8 8b04c137
8/15/2015 1:44:44 PM Debug VPN hash(sha1)
8/15/2015 1:44:44 PM Debug VPN encryption(aes128)
8/15/2015 1:44:44 PM Debug VPN phase2 IV computed:
8/15/2015 1:44:44 PM Debug VPN c5859c26 57cbc3d7 1ca27f8c ef7d4439
8/15/2015 1:44:44 PM Debug VPN HASH with:
8/15/2015 1:44:44 PM Debug VPN 8b04c137 00000020 00000001 01108d28 9e36c7a2 f3e010dd 7e55b5f0 6c94cf2d 000006ae
8/15/2015 1:44:44 PM Debug VPN hmac(hmac_sha1)
8/15/2015 1:44:44 PM Debug VPN HASH computed:
8/15/2015 1:44:44 PM Debug VPN ddbf95d2 ef173e7e d533ba87 e7d19a5f cdb06c9f
8/15/2015 1:44:44 PM Debug VPN begin encryption.
8/15/2015 1:44:44 PM Debug VPN encryption(aes128)
8/15/2015 1:44:44 PM Debug VPN pad length = 8
8/15/2015 1:44:44 PM Debug VPN 0b000018 ddbf95d2 ef173e7e d533ba87 e7d19a5f cdb06c9f 00000020 00000001 01108d28 9e36c7a2 f3e010dd 7e55b5f0 6c94cf2d 000006ae aef2c8c4 adcf9407
8/15/2015 1:44:44 PM Debug VPN encryption(aes128)
8/15/2015 1:44:44 PM Debug VPN with key:
8/15/2015 1:44:44 PM Debug VPN d097c0fa 4697fe00 50df4059 187dbf38
8/15/2015 1:44:44 PM Debug VPN encrypted payload by IV:
8/15/2015 1:44:44 PM Debug VPN c5859c26 57cbc3d7 1ca27f8c ef7d4439
8/15/2015 1:44:44 PM Debug VPN save IV for next:
8/15/2015 1:44:44 PM Debug VPN ce620c6c bd68e20a fd5c8be6 fdb5b53c
8/15/2015 1:44:44 PM Debug VPN encrypted.
8/15/2015 1:44:44 PM Debug VPN Adding NON-ESP marker
8/15/2015 1:44:44 PM Debug VPN 96 bytes from 192.168.0.185[4500] to 96.53.114.130[4500]
8/15/2015 1:44:44 PM Debug VPN sockname 192.168.0.185[4500]
8/15/2015 1:44:44 PM Debug VPN send packet from 192.168.0.185[4500]
8/15/2015 1:44:44 PM Debug VPN send packet to 96.53.114.130[4500]
8/15/2015 1:44:44 PM Debug VPN 1 times of 96 bytes message will be sent to 96.53.114.130[4500]
8/15/2015 1:44:44 PM Debug VPN 00000000 9e36c7a2 f3e010dd 7e55b5f0 6c94cf2d 08100501 8b04c137 0000005c 9a51605e bc829f5b 39ced818 9f97ab89 e914bd4f 15d61660 98c6b9bd 66819f62 51113204 b8241aeb 9b4183f0 c6d22f6d ce620c6c bd68e20a fd5c8be6 fdb5b53c
8/15/2015 1:44:44 PM Debug VPN sendto Information notify.
8/15/2015 1:44:44 PM Debug VPN DPD R-U-There sent (0)
8/15/2015 1:44:44 PM Debug VPN rescheduling send_r_u (5).
8/15/2015 1:44:44 PM Debug VPN Adding NON-ESP marker
8/15/2015 1:44:44 PM Debug VPN 140 bytes from 192.168.0.185[4500] to 96.53.114.130[4500]
8/15/2015 1:44:44 PM Debug VPN sockname 192.168.0.185[4500]
8/15/2015 1:44:44 PM Debug VPN send packet from 192.168.0.185[4500]
8/15/2015 1:44:44 PM Debug VPN send packet to 96.53.114.130[4500]
8/15/2015 1:44:44 PM Debug VPN 1 times of 140 bytes message will be sent to 96.53.114.130[4500]
8/15/2015 1:44:44 PM Debug VPN 00000000 00000000 00000000 00000000 9e36c7a2 f3e010dd 7e55b5f0 6c94cf2d 08100601 b0bb4905 0000007c 12f42f1d c3a0eac0 338713bd 0ea45f11 5a183ae8 667e337a 8c33081e ff15436d a6e04efd eed1713a 824a1e27 e34721dc 400e1aa6 d106e7bd bd72bf0d 3ea13b06 5f70b588 61f4fb2c 51536829 3596c58f 2cf9f87b 5dfd2013 25eb3c62 59f9e6e6
8/15/2015 1:44:44 PM Debug VPN resend phase1 packet 9e36c7a2f3e010dd:7e55b5f06c94cf2d:00009ebf
8/15/2015 1:44:44 PM Debug VPN Mode configuration not completed
8/15/2015 1:44:44 PM Debug VPN CHKPH1THERE: no established ph1 handler found
8/15/2015 1:44:44 PM Debug VPN ===
8/15/2015 1:44:44 PM Debug VPN 92 bytes message received from 96.53.114.130[4500] to 192.168.0.185[4500]
8/15/2015 1:44:44 PM Debug VPN 9e36c7a2 f3e010dd 7e55b5f0 6c94cf2d 08100501 82763667 0000005c 9a65bc6c cff0498f e69959c7 dec4cbe1 4a2d49f6 faea4c95 45186c4b f460cd00 e8134000 dcb5ef1c 1c51994a 59a6e14c a922cd2a 1d10e3bc 66c8c346 95f13625
8/15/2015 1:44:44 PM Debug VPN receive Information.
8/15/2015 1:44:44 PM Debug VPN compute IV for phase2
8/15/2015 1:44:44 PM Debug VPN phase1 last IV:
8/15/2015 1:44:44 PM Debug VPN 685a83d2 d77c963f 34b254ec 26d619c8 82763667
8/15/2015 1:44:44 PM Debug VPN hash(sha1)
8/15/2015 1:44:44 PM Debug VPN encryption(aes128)
8/15/2015 1:44:44 PM Debug VPN phase2 IV computed:
8/15/2015 1:44:44 PM Debug VPN 809dd200 48b16fca 10bfefa4 cfdbb9c4
8/15/2015 1:44:44 PM Debug VPN begin decryption.
8/15/2015 1:44:44 PM Debug VPN encryption(aes128)
8/15/2015 1:44:44 PM Debug VPN IV was saved for next processing:
8/15/2015 1:44:44 PM Debug VPN a922cd2a 1d10e3bc 66c8c346 95f13625
8/15/2015 1:44:44 PM Debug VPN encryption(aes128)
8/15/2015 1:44:44 PM Debug VPN with key:
8/15/2015 1:44:44 PM Debug VPN d097c0fa 4697fe00 50df4059 187dbf38
8/15/2015 1:44:44 PM Debug VPN decrypted payload by IV:
8/15/2015 1:44:44 PM Debug VPN 809dd200 48b16fca 10bfefa4 cfdbb9c4
8/15/2015 1:44:44 PM Debug VPN decrypted payload, but not trimed.
8/15/2015 1:44:44 PM Debug VPN 0b000018 4a3cf978 62494d13 9e29baea 77333182 1b8410dd 00000020 00000001 01108d28 9e36c7a2 f3e010dd 7e55b5f0 6c94cf2d 00000001 55168a79 8463ca07
8/15/2015 1:44:44 PM Debug VPN padding len=8
8/15/2015 1:44:44 PM Debug VPN skip to trim padding.
8/15/2015 1:44:44 PM Debug VPN decrypted.
8/15/2015 1:44:44 PM Debug VPN 9e36c7a2 f3e010dd 7e55b5f0 6c94cf2d 08100501 82763667 0000005c 0b000018 4a3cf978 62494d13 9e29baea 77333182 1b8410dd 00000020 00000001 01108d28 9e36c7a2 f3e010dd 7e55b5f0 6c94cf2d 00000001 55168a79 8463ca07
8/15/2015 1:44:44 PM Debug VPN HASH with:
8/15/2015 1:44:44 PM Debug VPN 82763667 00000020 00000001 01108d28 9e36c7a2 f3e010dd 7e55b5f0 6c94cf2d 00000001
8/15/2015 1:44:44 PM Debug VPN hmac(hmac_sha1)
8/15/2015 1:44:44 PM Debug VPN HASH computed:
8/15/2015 1:44:44 PM Debug VPN 4a3cf978 62494d13 9e29baea 77333182 1b8410dd
8/15/2015 1:44:44 PM Debug VPN hash validated.
8/15/2015 1:44:44 PM Debug VPN begin.
8/15/2015 1:44:44 PM Debug VPN seen nptype=8(hash)
8/15/2015 1:44:44 PM Debug VPN seen nptype=11(notify)
8/15/2015 1:44:44 PM Debug VPN succeed.
8/15/2015 1:44:44 PM Debug VPN DPD R-U-There received
8/15/2015 1:44:44 PM Debug VPN compute IV for phase2
8/15/2015 1:44:44 PM Debug VPN phase1 last IV:
8/15/2015 1:44:44 PM Debug VPN 685a83d2 d77c963f 34b254ec 26d619c8 a3cfac00
8/15/2015 1:44:44 PM Debug VPN hash(sha1)
8/15/2015 1:44:44 PM Debug VPN encryption(aes128)
8/15/2015 1:44:44 PM Debug VPN phase2 IV computed:
8/15/2015 1:44:44 PM Debug VPN 080dfee4 d35db42d 64ecc279 df0f2a97
8/15/2015 1:44:44 PM Debug VPN HASH with:
8/15/2015 1:44:44 PM Debug VPN a3cfac00 00000020 00000001 01108d29 9e36c7a2 f3e010dd 7e55b5f0 6c94cf2d 00000001
8/15/2015 1:44:44 PM Debug VPN hmac(hmac_sha1)
8/15/2015 1:44:44 PM Debug VPN HASH computed:
8/15/2015 1:44:44 PM Debug VPN ca6e8a57 a8d3f05b 9b5a66fd 61c450c0 778da938
8/15/2015 1:44:44 PM Debug VPN begin encryption.
8/15/2015 1:44:44 PM Debug VPN encryption(aes128)
8/15/2015 1:44:44 PM Debug VPN pad length = 8
8/15/2015 1:44:44 PM Debug VPN 0b000018 ca6e8a57 a8d3f05b 9b5a66fd 61c450c0 778da938 00000020 00000001 01108d29 9e36c7a2 f3e010dd 7e55b5f0 6c94cf2d 00000001 88da8d86 8393d707
8/15/2015 1:44:44 PM Debug VPN encryption(aes128)
8/15/2015 1:44:44 PM Debug VPN with key:
8/15/2015 1:44:44 PM Debug VPN d097c0fa 4697fe00 50df4059 187dbf38
8/15/2015 1:44:44 PM Debug VPN encrypted payload by IV:
8/15/2015 1:44:44 PM Debug VPN 080dfee4 d35db42d 64ecc279 df0f2a97
8/15/2015 1:44:44 PM Debug VPN save IV for next:
8/15/2015 1:44:44 PM Debug VPN 41cde66f bbc4d41b 029c7ba5 d3186f93
8/15/2015 1:44:44 PM Debug VPN encrypted.
8/15/2015 1:44:44 PM Debug VPN Adding NON-ESP marker
8/15/2015 1:44:44 PM Debug VPN 96 bytes from 192.168.0.185[4500] to 96.53.114.130[4500]
8/15/2015 1:44:44 PM Debug VPN sockname 192.168.0.185[4500]
8/15/2015 1:44:44 PM Debug VPN send packet from 192.168.0.185[4500]
8/15/2015 1:44:44 PM Debug VPN send packet to 96.53.114.130[4500]
8/15/2015 1:44:44 PM Debug VPN 1 times of 96 bytes message will be sent to 96.53.114.130[4500]
8/15/2015 1:44:44 PM Debug VPN 00000000 9e36c7a2 f3e010dd 7e55b5f0 6c94cf2d 08100501 a3cfac00 0000005c 0dfaa979 9b08539e 57bca3ac 53d3d1f6 e427064e 83c38d71 0fa75fd2 66412643 b4587269 b90a879c febfe570 9ea3dd8d 41cde66f bbc4d41b 029c7ba5 d3186f93
8/15/2015 1:44:44 PM Debug VPN sendto Information notify.
8/15/2015 1:44:44 PM Debug VPN received a valid R-U-THERE, ACK sent
8/15/2015 1:44:44 PM Debug VPN notification message 36136:R-U-THERE, doi=1 proto_id=1 spi=9e36c7a2f3e010dd 7e55b5f06c94cf2d (size=16).
8/15/2015 1:44:44 PM Debug VPN ===
8/15/2015 1:44:44 PM Debug VPN 92 bytes message received from 96.53.114.130[4500] to 192.168.0.185[4500]
8/15/2015 1:44:44 PM Debug VPN 9e36c7a2 f3e010dd 7e55b5f0 6c94cf2d 08100501 7658eab1 0000005c 2c7b0ec3 6a326fc7 c65ac66d b15c0da5 6039d102 3dd4c9a5 5a170998 f5f37afe 25f4260d a74e688c 0b3e3d1d c95cd42f 918986ec 56dbefbe 31e09645 457931ea
8/15/2015 1:44:44 PM Debug VPN receive Information.
8/15/2015 1:44:44 PM Debug VPN compute IV for phase2
8/15/2015 1:44:44 PM Debug VPN phase1 last IV:
8/15/2015 1:44:44 PM Debug VPN 685a83d2 d77c963f 34b254ec 26d619c8 7658eab1
8/15/2015 1:44:44 PM Debug VPN hash(sha1)
8/15/2015 1:44:44 PM Debug VPN encryption(aes128)
8/15/2015 1:44:44 PM Debug VPN phase2 IV computed:
8/15/2015 1:44:44 PM Debug VPN 11f08afa 82dcd9b2 14300e94 458d0ba9
8/15/2015 1:44:44 PM Debug VPN begin decryption.
8/15/2015 1:44:44 PM Debug VPN encryption(aes128)
8/15/2015 1:44:44 PM Debug VPN IV was saved for next processing:
8/15/2015 1:44:44 PM Debug VPN 918986ec 56dbefbe 31e09645 457931ea
8/15/2015 1:44:44 PM Debug VPN encryption(aes128)
8/15/2015 1:44:44 PM Debug VPN with key:
8/15/2015 1:44:44 PM Debug VPN d097c0fa 4697fe00 50df4059 187dbf38
8/15/2015 1:44:44 PM Debug VPN decrypted payload by IV:
8/15/2015 1:44:44 PM Debug VPN 11f08afa 82dcd9b2 14300e94 458d0ba9
8/15/2015 1:44:44 PM Debug VPN decrypted payload, but not trimed.
8/15/2015 1:44:44 PM Debug VPN 0b000018 b67152fa c3a425b1 59f05203 83af0d6c b1fb947a 00000020 00000001 01108d29 9e36c7a2 f3e010dd 7e55b5f0 6c94cf2d 000006ae 65bf2798 00907307
8/15/2015 1:44:44 PM Debug VPN padding len=8
8/15/2015 1:44:44 PM Debug VPN skip to trim padding.
8/15/2015 1:44:44 PM Debug VPN decrypted.
8/15/2015 1:44:44 PM Debug VPN 9e36c7a2 f3e010dd 7e55b5f0 6c94cf2d 08100501 7658eab1 0000005c 0b000018 b67152fa c3a425b1 59f05203 83af0d6c b1fb947a 00000020 00000001 01108d29 9e36c7a2 f3e010dd 7e55b5f0 6c94cf2d 000006ae 65bf2798 00907307
8/15/2015 1:44:44 PM Debug VPN HASH with:
8/15/2015 1:44:44 PM Debug VPN 7658eab1 00000020 00000001 01108d29 9e36c7a2 f3e010dd 7e55b5f0 6c94cf2d 000006ae
8/15/2015 1:44:44 PM Debug VPN hmac(hmac_sha1)
8/15/2015 1:44:44 PM Debug VPN HASH computed:
8/15/2015 1:44:44 PM Debug VPN b67152fa c3a425b1 59f05203 83af0d6c b1fb947a
8/15/2015 1:44:44 PM Debug VPN hash validated.
8/15/2015 1:44:44 PM Debug VPN begin.
8/15/2015 1:44:44 PM Debug VPN seen nptype=8(hash)
8/15/2015 1:44:44 PM Debug VPN seen nptype=11(notify)
8/15/2015 1:44:44 PM Debug VPN succeed.
8/15/2015 1:44:44 PM Debug VPN DPD R-U-There-Ack received
8/15/2015 1:44:44 PM Debug VPN received an R-U-THERE-ACK
8/15/2015 1:44:44 PM Debug VPN notification message 36137:R-U-THERE-ACK, doi=1 proto_id=1 spi=9e36c7a2f3e010dd 7e55b5f06c94cf2d (size=16).
8/15/2015 1:44:45 PM Debug VPN Mode configuration not completed
8/15/2015 1:44:45 PM Debug VPN CHKPH1THERE: no established ph1 handler found
8/15/2015 1:44:46 PM Debug VPN Mode configuration not completed
8/15/2015 1:44:46 PM Debug VPN CHKPH1THERE: no established ph1 handler found
8/15/2015 1:44:46 PM Debug VPN phase1 negotiation failed due to time up. 9e36c7a2f3e010dd:7e55b5f06c94cf2d:00009ebf
8/15/2015 1:44:46 PM Warning VPN id=96561 msg="locip=192.168.0.185 locport=4500 remip=96.53.114.130 remport=4500 outif=0 vpntunnel=Willowglen status=negotiate_error No response from the peer, phase1 retransmit reaches maximum count..." vpntunnel=Willowglen vpntype=ipsec
8/15/2015 1:44:46 PM Debug VPN an undead schedule has been deleted.
8/15/2015 1:44:46 PM Debug VPN compute IV for phase2
8/15/2015 1:44:46 PM Debug VPN phase1 last IV:
8/15/2015 1:44:46 PM Debug VPN 685a83d2 d77c963f 34b254ec 26d619c8 e5f247de
8/15/2015 1:44:46 PM Debug VPN hash(sha1)
8/15/2015 1:44:46 PM Debug VPN encryption(aes128)
8/15/2015 1:44:46 PM Debug VPN phase2 IV computed:
8/15/2015 1:44:46 PM Debug VPN fe59c290 fc42b929 94c93f37 4f6dfb6c
8/15/2015 1:44:46 PM Debug VPN HASH with:
8/15/2015 1:44:46 PM Debug VPN e5f247de 0000001c 00000001 01100001 9e36c7a2 f3e010dd 7e55b5f0 6c94cf2d
8/15/2015 1:44:46 PM Debug VPN hmac(hmac_sha1)
8/15/2015 1:44:46 PM Debug VPN HASH computed:
8/15/2015 1:44:46 PM Debug VPN 339cc023 89ca1bd3 3e630fa5 f3e650cc 28f6cea4
8/15/2015 1:44:46 PM Debug VPN begin encryption.
8/15/2015 1:44:46 PM Debug VPN encryption(aes128)
8/15/2015 1:44:46 PM Debug VPN pad length = 12
8/15/2015 1:44:46 PM Debug VPN 0c000018 339cc023 89ca1bd3 3e630fa5 f3e650cc 28f6cea4 0000001c 00000001 01100001 9e36c7a2 f3e010dd 7e55b5f0 6c94cf2d acd7eb8b cce4f9c1 c7e7fe0b
8/15/2015 1:44:46 PM Debug VPN encryption(aes128)
8/15/2015 1:44:46 PM Debug VPN with key:
8/15/2015 1:44:46 PM Debug VPN d097c0fa 4697fe00 50df4059 187dbf38
8/15/2015 1:44:46 PM Debug VPN encrypted payload by IV:
8/15/2015 1:44:46 PM Debug VPN fe59c290 fc42b929 94c93f37 4f6dfb6c
8/15/2015 1:44:46 PM Debug VPN save IV for next:
8/15/2015 1:44:46 PM Debug VPN e3c4bf65 1123c83a 11869b6e c813ded5
8/15/2015 1:44:46 PM Debug VPN encrypted.
8/15/2015 1:44:46 PM Debug VPN Adding NON-ESP marker
8/15/2015 1:44:46 PM Debug VPN 96 bytes from 192.168.0.185[4500] to 96.53.114.130[4500]
8/15/2015 1:44:46 PM Debug VPN sockname 192.168.0.185[4500]
8/15/2015 1:44:46 PM Debug VPN send packet from 192.168.0.185[4500]
8/15/2015 1:44:46 PM Debug VPN send packet to 96.53.114.130[4500]
8/15/2015 1:44:46 PM Debug VPN 1 times of 96 bytes message will be sent to 96.53.114.130[4500]
8/15/2015 1:44:46 PM Debug VPN 00000000 9e36c7a2 f3e010dd 7e55b5f0 6c94cf2d 08100501 e5f247de 0000005c 1e1f3864 085048be 2466ef03 22645c49 53f22b33 d01c0a96 b2765ceb e088198d b1302963 2ae4cd0e cfd8c76e 75f188ed e3c4bf65 1123c83a 11869b6e c813ded5
8/15/2015 1:44:46 PM Debug VPN sendto Information delete.
8/15/2015 1:44:49 PM Debug Scheduler handle_processtermination() called
8/15/2015 1:44:49 PM Debug Scheduler child process terminates normally
8/15/2015 1:44:51 PM Debug ESNAC Timeout in select in SocketConnect
I configured port forwarding in the hitron for ports 500 and 4500 to the computer I use to connect to VPN, with no result.
I configured DMZ in the hitron for the computer I use to connect to VPN, with no result.
Nothing has changed on my computer or on the VPN server so I can only deduce it is the hitron.
ASKER CERTIFIED SOLUTION
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
See couple of below trace that may be of interest
8/15/2015 1:44:33 PM Debug VPN Selected NAT-T version: RFC 3947
8/15/2015 1:44:33 PM Debug VPN Hashing 192.168.0.185[500] with algo #2
8/15/2015 1:44:33 PM Debug VPN hash(sha1)
8/15/2015 1:44:33 PM Debug VPN NAT-D payload #-1 doesn't match
8/15/2015 1:44:33 PM Debug VPN Hashing 96.53.114.130[500] with algo #2
8/15/2015 1:44:33 PM Debug VPN hash(sha1)
8/15/2015 1:44:33 PM Debug VPN NAT-D payload #0 verified
8/15/2015 1:44:33 PM Debug VPN NAT detected: ME
8/15/2015 1:44:40 PM Debug ESNAC IP Table ChangeBut I see this more leading signs on couple of timeout instance as above per se
8/15/2015 1:44:40 PM Debug ESNAC Timeout in select in SocketConnect
8/15/2015 1:44:40 PM Debug ESNAC Socket connect failed
8/15/2015 1:44:40 PM Debug ESNAC 192.168.0.1:8010
8/15/2015 1:44:40 PM Debug ESNAC End searching for FGT
8/15/2015 1:44:46 PM Warning VPN id=96561 msg="locip=192.168.0.185 locport=4500 remip=96.53.114.130 remport=4500 outif=0 vpntunnel=Willowglen status=negotiate_error No response from the peer, phase1 retransmit reaches maximum count..." vpntunnel=Willowglen vpntype=ipsechave to look at the FW log at the remote end as well on any failure or warning per se around those period
ASKER
As per btan's comment, I do not think the hitron supports NAT-T.
I contacted Shaw for an alternative device but it is out of stock.
When I get home from work, I will try IP passthrough on the hitron and use my old D-Link router.
Hopefully that will solve the issue.
I contacted Shaw for an alternative device but it is out of stock.
When I get home from work, I will try IP passthrough on the hitron and use my old D-Link router.
Hopefully that will solve the issue.
ASKER
IP passthrough on the hitron did not work as desired. Ended up swapping the hitron for a Cisco DPC3825 (which I had at my old place before I moved). This device features an option for IPSec VPN passthrough, which solves my issue.
It's also possible that you're encountering a black-hole MTU problem, where small packets arrive at the destination and larger packets do not. You can try adjusting your MTU on your workstation to test this. It's a registry setting for the network adapter you're using, but I don't recall the path offhand.