1
|
Jun 16 18:13:28 racoon: [Self]: INFO: IPsec-SA established: ESP 68.109.226.37[500]->174.231.68.139[500] spi=44713849(0x2aa4779)
|
2
|
Jun 16 18:13:28 racoon: [Self]: INFO: IPsec-SA established: ESP 68.109.226.37[500]->174.231.68.139[500] spi=49539060(0x2f3e7f4)
|
3
|
Jun 16 18:13:28 racoon: INFO: Adjusting peer's encmode UDP-Tunnel(3)->Tunnel(1)
|
4
|
Jun 16 18:13:28 racoon: INFO: Adjusting my encmode UDP-Tunnel->Tunnel
|
5
|
Jun 16 18:13:28 racoon: INFO: Update the generated policy : 10.123.13.1/32[0] 10.123.12.0/24[0] proto=any dir=in
|
6
|
Jun 16 18:13:28 racoon: [Self]: INFO: respond new phase 2 negotiation: 68.109.226.37[4500]<=>174.231.68.139[64636]
|
7
|
Jun 16 18:13:27 racoon: WARNING: Ignored attribute 28683
|
8
|
Jun 16 18:13:27 racoon: WARNING: Ignored attribute INTERNAL_ADDRESS_EXPIRY
|
9
|
Jun 16 18:13:27 racoon: INFO: login succeeded for user "rmh1"
|
10
|
Jun 16 18:13:27 racoon: INFO: Using port 0
|
11
|
Jun 16 18:13:26 racoon: [Self]: INFO: ISAKMP-SA established 68.109.226.37[4500]-174.231.68.139[64636] spi:bb8359d6e0e4afe3:31710d0f0a1cc37a
|
12
|
Jun 16 18:13:26 racoon: INFO: Sending Xauth request
|
13
|
Jun 16 18:13:26 racoon: INFO: NAT detected: ME PEER
|
14
|
Jun 16 18:13:26 racoon: [174.231.68.139] ERROR: notification INITIAL-CONTACT received in aggressive exchange.
|
15
|
Jun 16 18:13:26 racoon: INFO: NAT-D payload #1 doesn't match
|
16
|
Jun 16 18:13:26 racoon: INFO: NAT-D payload #0 doesn't match
|
17
|
Jun 16 18:13:26 racoon: [Self]: INFO: NAT-T: ports changed to: 174.231.68.139[64636]<->68.109.226.37[4500]
|
18
|
Jun 16 18:13:26 racoon: INFO: Adding xauth VID payload.
|
19
|
Jun 16 18:13:26 racoon: [Self]: [68.109.226.37] INFO: Hashing 68.109.226.37[500] with algo #2 (NAT-T forced)
|
20
|
Jun 16 18:13:26 racoon: [174.231.68.139] INFO: Hashing 174.231.68.139[22508] with algo #2 (NAT-T forced)
|
21
|
Jun 16 18:13:26 racoon: INFO: Adding remote and local NAT-D payloads.
|
22
|
Jun 16 18:13:26 racoon: [174.231.68.139] INFO: Selected NAT-T version: RFC 3947
|
23
|
Jun 16 18:13:26 racoon: INFO: received Vendor ID: DPD
|
24
|
Jun 16 18:13:26 racoon: INFO: received Vendor ID: CISCO-UNITY
|
25
|
Jun 16 18:13:26 racoon: INFO: received Vendor ID: draft-ietf-ipsra-isakmp-xauth-06.txt
|
26
|
Jun 16 18:13:26 racoon: INFO: received Vendor ID: draft-ietf-ipsec-nat-t-ike-02
|
27
|
Jun 16 18:13:26 racoon: INFO: received Vendor ID: draft-ietf-ipsec-nat-t-ike-02
|
28
|
Jun 16 18:13:26 racoon: INFO: received Vendor ID: draft-ietf-ipsec-nat-t-ike-03
|
29
|
Jun 16 18:13:26 racoon: INFO: received Vendor ID: draft-ietf-ipsec-nat-t-ike-04
|
30
|
Jun 16 18:13:26 racoon: INFO: received Vendor ID: draft-ietf-ipsec-nat-t-ike-05
|
31
|
Jun 16 18:13:26 racoon: INFO: received Vendor ID: draft-ietf-ipsec-nat-t-ike-06
|
32
|
Jun 16 18:13:26 racoon: INFO: received Vendor ID: draft-ietf-ipsec-nat-t-ike-07
|
33
|
Jun 16 18:13:26 racoon: INFO: received Vendor ID: draft-ietf-ipsec-nat-t-ike-08
|
34
|
Jun 16 18:13:26 racoon: INFO: received Vendor ID: RFC 3947
|
35
|
Jun 16 18:13:26 racoon: INFO: received broken Microsoft ID: FRAGMENTATION
|
36
|
Jun 16 18:13:26 racoon: INFO: begin Aggressive mode.
|
37
|
Jun 16 18:13:26 racoon: [Self]: INFO: respond new phase 1 negotiation: 68.109.226.37[500]<=>174.231.68.139[22508]
|
38
|
|