phase2localid { ipnet { ipaddr = 192.168.1.0; mask = 255.255.255.0; } } phase2remoteid { ipnet { ipaddr = 192.168.65.0; mask = 255.255.255.0; } } phase2ss = "esp-aes256-3des-sha/ah-no/comp-lzs-no/pfs"; accesslist = "permit ip any 192.168.65.0 255.255.255.0";
firewall: change order of shaper delay parameter to prevent parser errors firewall: fix multiple PHP warnings regarding category additions firewall: fix icon toggle for block and reject (contributed by ElJeffe) interfaces: unhide primary IPv6 in overview page interfaces: fix IPv6 misalignment in get_interfaces_info() reporting: fix sidebar menu collapse for NetFlow link (contributed by Maurice Walker) captive portal: validate that static IP address exists when writing the configuration firmware: add product status backend for upcoming firmware page redesign firmware: opnsense-code will now check out the default release branch firmware: opnsense-update adds “-R” option for major release selection firmware: opnsense-update will now update repositories if out of sync firmware: opnsense-update will attempt to recover from fatal pkg behaviour firmware: opnsense-update now correctly redirects stderr on major upgrades firmware: opnsense-update now retains vital flag on faulty release type transition intrusion detection: clean up rule based additions to prevent collisions with the new policies monit: minor bugfixes and UI changes (contributed by Manuel Faux) unbound: update documentation URL (contributed by xorbital) ui: format packet count with toLocaleString() in interface statistics widget (contributed by bleetsheep) ui: add compatibility for JS replaceAll() function rc: support reading JSON metadata from plugin version files plugins: provide JSON metadata in plugin version files plugins: os-dyndns GratisDNS apex domain fix (contributed by Fredrik Rambris) plugins: os-nginx upstream TLS verification fix (contributed by kulikov-a) plugins: os-theme-cicada 1.26 (contributed by Team Rebellion) plugins: os-theme-vicuna 1.2 (contributed by Team Rebellion) src: panic when destroying VNET and epair simultaneously [1] src: uninitialized file system kernel stack leaks [2] src: Xen guest-triggered out of memory [3] src: update timezone database information [4] ports: dnsmasq 2.84 [5] ports: lighttpd 1.4.59 [6] ports: krb5 1.19 [7] ports: monit 5.27.2 [8] ports: perl 5.32.1 [9] ports: sqlite 3.34.1 [10]
2021-02-11T08:25:49 charon[60476] 04[IKE] <con1|2> CHILD_SA con1{4} established with SPIs cf64b319_i 1efd240e_o and TS 192.168.65.0/24 === 192.168.1.0/24
2021-02-11T08:32:14 charon[60476] 15[IKE] <con1|5> CHILD_SA not found, ignored 2021-02-11T08:32:14 charon[60476] 15[IKE] <con1|5> received DELETE for ESP CHILD_SA with SPI c8b996b3 2021-02-11T08:32:14 charon[60476] 15[ENC] <con1|5> parsed INFORMATIONAL_V1 request 2250304101 [ HASH D ] 2021-02-11T08:32:14 charon[60476] 15[NET] <con1|5> received packet: from 80.144.xxx.xxx[500] to 87.123.xxx.xxx[500] (124 bytes) 2021-02-11T08:32:14 charon[60476] 05[IKE] <con1|5> CHILD_SA not found, ignored 2021-02-11T08:32:14 charon[60476] 05[IKE] <con1|5> received DELETE for ESP CHILD_SA with SPI c5ebd422 2021-02-11T08:32:14 charon[60476] 05[ENC] <con1|5> parsed INFORMATIONAL_V1 request 3905009298 [ HASH D ] 2021-02-11T08:32:14 charon[60476] 05[NET] <con1|5> received packet: from 80.144.xxx.xxx[500] to 87.123.xxx.xxx1[500] (124 bytes) 2021-02-11T08:32:14 charon[60476] 05[IKE] <con1|5> CHILD_SA not found, ignored 2021-02-11T08:32:14 charon[60476] 05[IKE] <con1|5> received DELETE for ESP CHILD_SA with SPI cc920895 2021-02-11T08:32:14 charon[60476] 05[ENC] <con1|5> parsed INFORMATIONAL_V1 request 2279568483 [ HASH D ] 2021-02-11T08:32:14 charon[60476] 05[NET] <con1|5> received packet: from 80.144.xxx.xxx[500] to 87.123.xxx.xxx[500] (124 bytes) 2021-02-11T08:32:14 charon[60476] 05[IKE] <con1|5> CHILD_SA not found, ignored 2021-02-11T08:32:14 charon[60476] 05[IKE] <con1|5> received DELETE for ESP CHILD_SA with SPI 0d39f175 2021-02-11T08:32:14 charon[60476] 05[ENC] <con1|5> parsed INFORMATIONAL_V1 request 1055777905 [ HASH D ] 2021-02-11T08:32:14 charon[60476] 05[NET] <con1|5> received packet: from 80.144.xxx.xxx[500] to 87.123.xxx.xxx[500] (124 bytes) 2021-02-11T08:32:14 charon[60476] 05[NET] <con1|5> sending packet: from 87.123.xxx.xxx[500] to 80.144.xxx.xxx[500] (652 bytes)