Jan 16 20:41:34 charon: 12[CFG] lease ZZ.ZZ.ZZZ.1 by 'YYYYY' went offlineJan 16 20:41:34 charon: 12[IKE] deleting IKE_SA con1[38] between XXX.XXX.XXX.254[XXX.XXX.XXX.254]...XXX.XXX.XXX.36[XXX.XXX.XXX.36]Jan 16 20:41:34 charon: 12[IKE] deleting IKE_SA con1[38] between XXX.XXX.XXX.254[XXX.XXX.XXX.254]...XXX.XXX.XXX.36[XXX.XXX.XXX.36]Jan 16 20:41:34 charon: 12[IKE] received DELETE for IKE_SA con1[38]Jan 16 20:41:34 charon: 12[ENC] parsed INFORMATIONAL_V1 request 2241599222 [ HASH D ]Jan 16 20:41:34 charon: 12[NET] received packet: from XXX.XXX.XXX.36[500] to XXX.XXX.XXX.254[500] (92 bytes)Jan 16 20:41:34 charon: 12[IKE] received ATTRIBUTES_NOT_SUPPORTED error notifyJan 16 20:41:34 charon: 12[ENC] parsed INFORMATIONAL_V1 request 588732055 [ HASH N(ATTR_UNSUP) ]Jan 16 20:41:34 charon: 12[NET] received packet: from XXX.XXX.XXX.36[500] to XXX.XXX.XXX.254[500] (76 bytes)Jan 16 20:41:34 charon: 12[NET] sending packet: from XXX.XXX.XXX.254[500] to XXX.XXX.XXX.36[500] (172 bytes)Jan 16 20:41:34 charon: 12[ENC] generating QUICK_MODE response 2582074704 [ HASH SA No ID ID ]Jan 16 20:41:34 charon: 12[IKE] received 3600s lifetime, configured 0sJan 16 20:41:34 charon: 12[ENC] parsed QUICK_MODE request 2582074704 [ HASH SA No ID ID ]Jan 16 20:41:34 charon: 12[NET] received packet: from XXX.XXX.XXX.36[500] to XXX.XXX.XXX.254[500] (300 bytes)Jan 16 20:41:34 charon: 15[NET] sending packet: from XXX.XXX.XXX.254[500] to XXX.XXX.XXX.36[500] (92 bytes)Jan 16 20:41:34 charon: 15[ENC] generating TRANSACTION response 254410319 [ HASH CPRP(ADDR SUBNET) ]Jan 16 20:41:34 charon: 15[IKE] assigning virtual IP ZZ.ZZ.ZZZ.1 to peer 'YYYYY'Jan 16 20:41:34 charon: 15[CFG] reassigning offline lease to 'YYYYY'
Jan 20 22:43:32 charon: 05[JOB] deleting half open IKE_SA with CLIENT_IP after timeoutJan 20 22:43:26 charon: 05[NET] sending packet: from FIREWALL_IP[500] to CLIENT_IP[10977] (429 bytes)Jan 20 22:43:26 charon: 05[IKE] sending retransmit 3 of response message ID 0, seq 1Jan 20 22:43:13 charon: 05[NET] sending packet: from FIREWALL_IP[500] to CLIENT_IP[10977] (429 bytes)Jan 20 22:43:13 charon: 05[IKE] sending retransmit 2 of response message ID 0, seq 1Jan 20 22:43:06 charon: 05[NET] sending packet: from FIREWALL_IP[500] to CLIENT_IP[10977] (429 bytes)Jan 20 22:43:06 charon: 05[IKE] sending retransmit 1 of response message ID 0, seq 1Jan 20 22:43:02 charon: 05[NET] sending packet: from FIREWALL_IP[500] to CLIENT_IP[10977] (429 bytes)Jan 20 22:43:02 charon: 05[ENC] generating AGGRESSIVE response 0 [ SA KE No ID V V V V NAT-D NAT-D HASH ]Jan 20 22:43:02 charon: 05[CFG] selected peer config "con1"Jan 20 22:43:02 charon: 05[CFG] looking for XAuthInitPSK peer configs matching FIREWALL_IP...CLIENT_IP[groupname@domain.com]Jan 20 22:43:02 charon: 05[IKE] CLIENT_IP is initiating a Aggressive Mode IKE_SAJan 20 22:43:02 charon: 05[IKE] CLIENT_IP is initiating a Aggressive Mode IKE_SAJan 20 22:43:02 charon: 05[IKE] received DPD vendor IDJan 20 22:43:02 charon: 05[IKE] received Cisco Unity vendor IDJan 20 22:43:02 charon: 05[IKE] received XAuth vendor IDJan 20 22:43:02 charon: 05[IKE] received draft-ietf-ipsec-nat-t-ike-02\n vendor IDJan 20 22:43:02 charon: 05[IKE] received draft-ietf-ipsec-nat-t-ike-02 vendor IDJan 20 22:43:02 charon: 05[IKE] received draft-ietf-ipsec-nat-t-ike-03 vendor IDJan 20 22:43:02 charon: 05[IKE] received draft-ietf-ipsec-nat-t-ike-04 vendor IDJan 20 22:43:02 charon: 05[IKE] received draft-ietf-ipsec-nat-t-ike-05 vendor IDJan 20 22:43:02 charon: 05[IKE] received draft-ietf-ipsec-nat-t-ike-06 vendor IDJan 20 22:43:02 charon: 05[IKE] received draft-ietf-ipsec-nat-t-ike-07 vendor IDJan 20 22:43:02 charon: 05[IKE] received draft-ietf-ipsec-nat-t-ike-08 vendor IDJan 20 22:43:02 charon: 05[IKE] received draft-ietf-ipsec-nat-t-ike vendor IDJan 20 22:43:02 charon: 05[IKE] received NAT-T (RFC 3947) vendor IDJan 20 22:43:02 charon: 05[IKE] received FRAGMENTATION vendor IDJan 20 22:43:02 charon: 05[ENC] parsed AGGRESSIVE request 0 [ SA KE No ID V V V V V V V V V V V V V V ]Jan 20 22:43:02 charon: 05[NET] received packet: from CLIENT_IP[10977] to FIREWALL_IP[500] (777 bytes)Jan 20 22:43:01 charon: 05[NET] sending packet: from FIREWALL_IP[500] to CLIENT_IP[10977] (56 bytes)Jan 20 22:43:01 charon: 05[ENC] generating INFORMATIONAL_V1 request 1178221751 [ N(NO_PROP) ]Jan 20 22:43:01 charon: 05[IKE] no proposal foundJan 20 22:43:01 charon: 05[CFG] configured proposals: IKE:AES_CBC_256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024Jan 20 22:43:01 charon: 05[CFG] received proposals: IKE:AES_CBC_256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_2048, IKE:AES_CBC_256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_2048, IKE:AES_CBC_256/HMAC_MD5_96/PRF_HMAC_MD5/MODP_2048, IKE:AES_CBC_256/HMAC_SHA2_512_256/PRF_HMAC_SHA2_512/MODP_2048Jan 20 22:43:01 charon: 05[IKE] CLIENT_IP is initiating a Aggressive Mode IKE_SAJan 20 22:43:01 charon: 05[IKE] CLIENT_IP is initiating a Aggressive Mode IKE_SAJan 20 22:43:01 charon: 05[IKE] received DPD vendor IDJan 20 22:43:01 charon: 05[IKE] received Cisco Unity vendor IDJan 20 22:43:01 charon: 05[IKE] received XAuth vendor IDJan 20 22:43:01 charon: 05[IKE] received draft-ietf-ipsec-nat-t-ike-02\n vendor IDJan 20 22:43:01 charon: 05[IKE] received draft-ietf-ipsec-nat-t-ike-02 vendor IDJan 20 22:43:01 charon: 05[IKE] received draft-ietf-ipsec-nat-t-ike-03 vendor IDJan 20 22:43:01 charon: 05[IKE] received draft-ietf-ipsec-nat-t-ike-04 vendor IDJan 20 22:43:01 charon: 05[IKE] received draft-ietf-ipsec-nat-t-ike-05 vendor IDJan 20 22:43:01 charon: 05[IKE] received draft-ietf-ipsec-nat-t-ike-06 vendor IDJan 20 22:43:01 charon: 05[IKE] received draft-ietf-ipsec-nat-t-ike-07 vendor IDJan 20 22:43:01 charon: 05[IKE] received draft-ietf-ipsec-nat-t-ike-08 vendor IDJan 20 22:43:01 charon: 05[IKE] received draft-ietf-ipsec-nat-t-ike vendor IDJan 20 22:43:01 charon: 05[IKE] received NAT-T (RFC 3947) vendor IDJan 20 22:43:01 charon: 05[IKE] received FRAGMENTATION vendor ID
Sep 23 18:22:41 charon: 12[KNL] fe80::1:1 appeared on igb3Sep 23 18:22:41 charon: 01[KNL] fe80::1:1 disappeared from igb3Sep 23 18:22:40 charon: 01[CFG] added configuration 'con1'Sep 23 18:22:40 charon: 01[CFG] reusing virtual IP address pool 10.10.90.0/28Sep 23 18:22:40 charon: 01[CFG] received stroke: add connection 'con1'Sep 23 18:22:40 charon: 12[CFG] deleted connection 'con1'Sep 23 18:22:40 charon: 12[CFG] received stroke: delete connection 'con1'Sep 23 18:22:40 charon: 01[CFG] rereading crls from '/usr/local/etc/ipsec.d/crls'Sep 23 18:22:40 charon: 01[CFG] rereading attribute certificates from '/usr/local/etc/ipsec.d/acerts'Sep 23 18:22:40 charon: 01[CFG] rereading ocsp signer certificates from '/usr/local/etc/ipsec.d/ocspcerts'Sep 23 18:22:40 charon: 01[CFG] rereading aa certificates from '/usr/local/etc/ipsec.d/aacerts'Sep 23 18:22:40 charon: 01[CFG] rereading ca certificates from '/usr/local/etc/ipsec.d/cacerts'Sep 23 18:22:40 charon: 01[CFG] loaded IKE secret for XXX.XXX.XXX.XXX %anySep 23 18:22:40 charon: 01[CFG] loading secrets from '/usr/local/etc/ipsec.secrets'Sep 23 18:22:40 charon: 01[CFG] rereading secrets