Мар 18 20:49:26ndmCore::Syslog: the system log has been cleared.Мар 18 20:49:29ndmIpSec::Manager: service enabled.Мар 18 20:49:29ndmIpSec::Manager: crypto ike proposal "VirtualIPServer" removed.Мар 18 20:49:29ndmIpSec::Manager: crypto ike policy "VirtualIPServer" removed.Мар 18 20:49:29ndmIpSec::Manager: crypto ipsec transform-set "VirtualIPServer" removed.Мар 18 20:49:29ndmIpSec::Manager: crypto ipsec profile "VirtualIPServer" removed.Мар 18 20:49:29ndmNetwork::Acl: "_WEBADMIN_IPSEC_VirtualIPServer" access list removed.Мар 18 20:49:29ndmNetwork::Acl: rule accepted.Мар 18 20:49:29ndmIpSec::Manager: "VirtualIPServer": crypto ike proposal successfully created.Мар 18 20:49:29ndmIpSec::Manager: "VirtualIPServer": crypto ike policy successfully created.Мар 18 20:49:29ndmIpSec::Manager: "VirtualIPServer": crypto ipsec transform-set successfully created.Мар 18 20:49:29ndmIpSec::Manager: "VirtualIPServer": crypto ipsec profile successfully created.Мар 18 20:49:29ndmIpSec::Manager: Virtual IP server successfully enabled.Мар 18 20:49:29ndmCore::ConfigurationSaver: saving configuration...Мар 18 20:49:31ndmIpSec::Manager: create IPsec reconfiguration transaction...Мар 18 20:49:31ndmIpSec::Manager: add config for crypto map "VirtualIPServer".Мар 18 20:49:31ndmIpSec::Manager: IPsec reconfiguration transaction was created.Мар 18 20:49:31ndmIpSec::Configurator: start applying IPsec configuration.Мар 18 20:49:31ndmIpSec::Configurator: IPsec configuration applying is done.Мар 18 20:49:31ndmIpSec::IpSecNetfilter: start reloading netfilter configuration...Мар 18 20:49:31ndmIpSec::IpSecNetfilter: netfilter configuration reloading is done.Мар 18 20:49:33ndmCore::ConfigurationSaver: configuration saved.Мар 18 20:49:33ipsecStarting strongSwan 5.6.1 IPsec [starter]...Мар 18 20:49:33ipsec00[DMN] Starting IKE charon daemon (strongSwan 5.6.1, Linux 3.4.113, mips)Мар 18 20:49:33ipsec00[CFG] loading secretsМар 18 20:49:33ipsec00[CFG] loaded IKE secret for @mykeenetic.netМар 18 20:49:33ipsec00[CFG] loaded (5) secret for adminМар 18 20:49:33ipsec00[CFG] starting system time check, interval: 10sМар 18 20:49:33ipsec00[LIB] loaded plugins: charon random nonce openssl hmac attr kernel-netlink socket-default stroke updown eap-mschapv2 eap-dynamic xauth-generic xauth-eap error-notify systime-fix unityМар 18 20:49:33ipsec00[LIB] dropped capabilities, running as uid 65534, gid 65534Мар 18 20:49:33ipsec04[CFG] received stroke: add connection 'VirtualIPServer'Мар 18 20:49:33ipsec04[CFG] adding virtual IP address pool 20.0.0.1-20.0.0.65Мар 18 20:49:33ipsec
Мар 18 20:56:54ndmCore::Syslog: the system log has been cleared.Мар 18 20:56:56ipsec08[IKE] received NAT-T (RFC 3947) vendor IDМар 18 20:56:56ipsec08[IKE] received draft-ietf-ipsec-nat-t-ike-02 vendor IDМар 18 20:56:56ipsec08[IKE] received draft-ietf-ipsec-nat-t-ike-02\n vendor IDМар 18 20:56:56ipsec08[IKE] received draft-ietf-ipsec-nat-t-ike-00 vendor IDМар 18 20:56:56ipsec08[IKE] received FRAGMENTATION vendor IDМар 18 20:56:56ipsec08[IKE] received DPD vendor IDМар 18 20:56:56ipsec08[IKE] 213.87.225.135 is initiating a Main Mode IKE_SAМар 18 20:56:56ipsec08[CFG] received proposals: IKE:AES_CBC=256/HMAC_SHA2_384_192/PRF_HMAC_SHA2_384/MODP_1024/#, IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024/#, IKE:AES_CBC=256/HMAC_SHA2_512_256/PRF_HMAC_SHA2_512/MODP_1024/#, IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024/#, IKE:AES_CBC=256/HMAC_MD5_96/PRF_HMAC_MD5/MODP_1024/#, IKE:AES_CBC=128/HMAC_SHA2_512_256/PRF_HMAC_SHA2_512/MODP_1024/#, IKE:AES_CBC=128/HMAC_SHA2_384_192/PRF_HMAC_SHA2_384/MODP_1024/#, IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024/#, IKE:AES_CBC=128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024/#, IKE:AES_CBC=128/HMAC_MD5_96/PRF_HMAC_MD5/MODP_1024/#, IKE:3DES_CBC/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024/#, IKE:3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024/#, IKE:3DES_CBC/HMAC_MD5_96/PRF_HMAC_MD5/MODP_1024/#, IKE:DES_CBC/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024/#, IKE:DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024/#, IKE:DES_CBC/HMAC_MD5_96/PRF_HMAC_MD5/MODP_1024/#Мар 18 20:56:56ipsec08[CFG] configured proposals: IKE:AES_CBC=128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024/#, IKE:AES_CBC=128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_2048/#, IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024/#, IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_2048/#Мар 18 20:56:56ipsec08[CFG] selected proposal: IKE:AES_CBC=128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024/#Мар 18 20:56:56ipsec08[IKE] sending XAuth vendor IDМар 18 20:56:56ipsec08[IKE] sending DPD vendor IDМар 18 20:56:56ipsec08[IKE] sending Cisco Unity vendor IDМар 18 20:56:56ipsec08[IKE] sending FRAGMENTATION vendor IDМар 18 20:56:56ipsec08[IKE] sending NAT-T (RFC 3947) vendor IDМар 18 20:56:59ndmUPnP::Manager: redirect and forward rules deleted: udp 61603.Мар 18 20:56:59ndmUPnP::Manager: redirect and forward rules deleted: tcp 61603.Мар 18 20:56:59ipsec10[IKE] received retransmit of request with ID 0, retransmitting responseМар 18 20:57:02ipsec12[IKE] received retransmit of request with ID 0, retransmitting responseМар 18 20:57:05ipsec04[IKE] received retransmit of request with ID 0, retransmitting responseМар 18 20:57:08ipsec06[IKE] received retransmit of request with ID 0, retransmitting responseМар 18 20:57:11ipsec08[IKE] received retransmit of request with ID 0, retransmitting responseМар 18 20:57:14ipsec11[IKE] received retransmit of request with ID 0, retransmitting responseМар 18 20:57:17ipsec13[IKE] received retransmit of request with ID 0, retransmitting responseМар 18 20:57:20ipsec06[IKE] received retransmit of request with ID 0, retransmitting responseМар 18 20:57:23ipsec08[IKE] received retransmit of request with ID 0, retransmitting responseМар 18 20:57:26ipsec11[JOB] deleting half open IKE_SA with 213.87.225.135 after timeout