sysSystem View: return to User View with Ctrl+Z.[Branch-LXZ]info-center enableInformation center is enabled.[Branch-LXZ]quitter mThe current terminal is enabled to display logs.ter deThe current terminal is enabled to display debugging logs.debug ike all This command is CPU intensive and might affect ongoing services. Are you sure you want to continue? [Y/N]:y*Apr 28 17:05:30:884 2021 Branch-LXZ IKE/7/EVENT: Sent config set message.debug ipsec all This command is CPU intensive and might affect ongoing services. Are you sure you want to continue? [Y/N]:y*Apr 28 17:05:42:054 2021 Branch-LXZ IPSEC/7/EVENT: Sent debug message to all nodes, message type is 0x3.reset *Apr 28 17:05:44:579 2021 Branch-LXZ IPSEC/7/PACKET: FS Check : fs sequence num in IPsec fast cache is 184, current fs sequence num is 184*Apr 28 17:05:44:579 2021 Branch-LXZ IPSEC/7/PACKET: FS Check : No Change. Tunnel index = 0, Tunnel seq = 1.*Apr 28 17:05:44:579 2021 Branch-LXZ IPSEC/7/PACKET: --- Sent packet by IPsec fast forwarding ---*Apr 28 17:05:44:579 2021 Branch-LXZ IPSEC/7/PACKET: Outbound IPsec processing: src IP = 192.168.88.1, dst IP = 192.168.10.1, SPI = 4082471212.*Apr 28 17:05:44:579 2021 Branch-LXZ IPSEC/7/PACKET: Outbound IPsec processing: ESP auth algorithm: SHA1, ESP encp algorithm: AES-CBC-128.*Apr 28 17:05:44:579 2021 Branch-LXZ IPSEC/7/PACKET: Packet will be sent to CCF for sync-encryption.*Apr 28 17:05:44:579 2021 Branch-LXZ IPSEC/7/PACKET: Outbound IPsec ESP processing: Encryption succeeded, anti-replay SN is 109.*Apr 28 17:05:44:579 2021 Branch-LXZ IPSEC/7/PACKET: Outbound IPsec processing: Packet encapsulated successfully.*Apr 28 17:05:44:584 2021 Branch-LXZ IPSEC/7/PACKET: --- Received IPsec packet from fast forwarding, Protocl : 50---*Apr 28 17:05:44:584 2021 Branch-LXZ IPSEC/7/PACKET: Inbound IPsec processing: src IP = 171.221.88.110, dst IP = 212.222.0.22, SPI = 2051047098.*Apr 28 17:05:44:584 2021 Branch-LXZ IPSEC/7/PACKET: Inbound IPsec processing: ESP auth algorithm: SHA1, ESP encp algorithm: AES-CBC-128.*Apr 28 17:05:44:584 2021 Branch-LXZ IPSEC/7/PACKET: Packet will be sent to CCF for sync-decryption.*Apr 28 17:05:44:584 2021 Branch-LXZ IPSEC/7/PACKET: Inbound fast IPsec ESP processing: Authentication succeeded.*Apr 28 17:05:44:584 2021 Branch-LXZ IPSEC/7/PACKET: Inbound fast IPsec ESP processing: Decryption succeeded.*Apr 28 17:05:44:584 2021 Branch-LXZ IPSEC/7/PACKET: IPsec processing: Tunnel mode.*Apr 28 17:05:44:584 2021 Branch-LXZ IPSEC/7/PACKET: Inbound IPsec processing: Sent packet back to IP forwarding.ipsec sa %Apr 28 17:05:47:436 2021 Branch-LXZ IPSEC/6/IPSEC_SA_TERMINATE: IPsec SA was deleted.Reason: The reset command was executed.SA information:Role: initiatorLocal address: 212.222.0.22Remote address: 171.221.88.110Sour addr: 192.168.88.0/255.255.255.0 Port: 0 Protocol: IPDest addr: 192.168.10.0/255.255.255.0 Port: 0 Protocol: IPInside VPN instance: Outside VPN instance: Outbound ESP SPI: 4082471212ACL number: 3020*Apr 28 17:05:47:437 2021 Branch-LXZ IPSEC/7/EVENT: Sent delete SA message to all nodes, message type is 0x16.*Apr 28 17:05:47:437 2021 Branch-LXZ IPSEC/7/EVENT: Deleted outbound SA from IPsec tunnel(SA index = 0, SPI = 0xf355912c).*Apr 28 17:05:47:437 2021 Branch-LXZ IPSEC/7/EVENT: SA successfully deleted in kernel.*Apr 28 17:05:47:437 2021 Branch-LXZ IPSEC/7/EVENT: SA successfully deleted in kernel.*Apr 28 17:05:47:437 2021 Branch-LXZ IPSEC/7/EVENT: SA successfully deleted in kernel.*Apr 28 17:05:47:437 2021 Branch-LXZ IPSEC/7/EVENT: SA successfully deleted in kernel.%Apr 28 17:05:47:437 2021 Branch-LXZ IPSEC/6/IPSEC_SA_TERMINATE: IPsec SA was deleted.Reason: The reset command was executed.SA information:Role: initiatorLocal address: 212.222.0.22Remote address: 171.221.88.110Sour addr: 192.168.88.0/255.255.255.0 Port: 0 Protocol: IPDest addr: 192.168.10.0/255.255.255.0 Port: 0 Protocol: IPInside VPN instance: Outside VPN instance: Inbound ESP SPI: 390326052ACL number: 3020*Apr 28 17:05:47:437 2021 Branch-LXZ IPSEC/7/EVENT: Sent delete SA message to all nodes, message type is 0x16.*Apr 28 17:05:47:437 2021 Branch-LXZ IPSEC/7/EVENT: Sent delete tunnel message to all nodes, message type is 0x14.*Apr 28 17:05:47:437 2021 Branch-LXZ IKE/7/EVENT: Received message from ipsec, message type is 4.*Apr 28 17:05:47:438 2021 Branch-LXZ IPSEC/7/EVENT: IPsec tunnel successfully deleted in kernel.*Apr 28 17:05:47:439 2021 Branch-LXZ IPSEC/7/EVENT: SA successfully deleted in kernel.*Apr 28 17:05:47:439 2021 Branch-LXZ IPSEC/7/EVENT: Deleted outbound SA from IPsec tunnel(SA index = 7, SPI = 0xd50c2e1d).*Apr 28 17:05:47:439 2021 Branch-LXZ IPSEC/7/EVENT: SA successfully deleted in kernel.%Apr 28 17:05:47:438 2021 Branch-LXZ IPSEC/6/IPSEC_SA_TERMINATE: IPsec SA was deleted.Reason: The reset command was executed.SA information:Role: initiatorLocal address: 212.222.0.22Remote address: 171.221.88.110Sour addr: 192.168.88.0/255.255.255.0 Port: 0 Protocol: IPDest addr: 192.168.17.0/255.255.255.0 Port: 0 Protocol: IPInside VPN instance: Outside VPN instance: Inbound ESP SPI: 1885651256ACL number: 3020*Apr 28 17:05:47:439 2021 Branch-LXZ IPSEC/7/EVENT: Sent delete SA message to all nodes, message type is 0x16.*Apr 28 17:05:47:439 2021 Branch-LXZ IPSEC/7/EVENT: IPsec tunnel successfully deleted in kernel.*Apr 28 17:05:47:439 2021 Branch-LXZ IPSEC/7/EVENT: Deleted outbound SA from IPsec tunnel(SA index = 8, SPI = 0xfb3b7295).*Apr 28 17:05:47:439 2021 Branch-LXZ IPSEC/7/EVENT: SA successfully deleted in kernel.*Apr 28 17:05:47:439 2021 Branch-LXZ IPSEC/7/EVENT: SA successfully deleted in kernel.*Apr 28 17:05:47:440 2021 Branch-LXZ IPSEC/7/EVENT: IPsec tunnel successfully deleted in kernel.%Apr 28 17:05:47:439 2021 Branch-LXZ IPSEC/6/IPSEC_SA_TERMINATE: IPsec SA was deleted.Reason: The reset command was executed.SA information:Role: initiatorLocal address: 212.222.0.22Remote address: 171.221.88.110Sour addr: 192.168.88.0/255.255.255.0 Port: 0 Protocol: IPDest addr: 192.168.3.0/255.255.255.0 Port: 0 Protocol: IPInside VPN instance: Outside VPN instance: Outbound ESP SPI: 4214977173ACL number: 3020*Apr 28 17:05:47:439 2021 Branch-LXZ IPSEC/7/EVENT: Sent delete tunnel message to all nodes, message type is 0x14.*Apr 28 17:05:47:439 2021 Branch-LXZ IPSEC/7/EVENT: Sent delete SA message to all nodes, message type is 0x16.*Apr 28 17:05:47:439 2021 Branch-LXZ IPSEC/7/EVENT: Sent delete tunnel message to all nodes, message type is 0x14.%Apr 28 17:05:47:446 2021 Branch-LXZ IKE/6/IKE_P2_SA_TERMINATE: The IKE phase 2 SA was deleted.Reason: All P2 SAs were deleted.SA information:Role: initiatorLocal address: 212.222.0.22Remote address: 171.221.88.110Sour addr: 192.168.88.0/255.255.255.0 Port: 0 Protocol: IPDest addr: 192.168.10.0/255.255.255.0 Port: 0 Protocol: IPInside VPN instance: Outside VPN instance: Inbound AH SPI: 0Outbound AH SPI: 0Inbound ESP SPI: 2051047098Outbound ESP SPI: 4082471212Initiator COOKIE: b8349af1de22707aResponder COOKIE: 2cfea10944c84f39Message ID: 0x518d925aConnection ID: 96Tunnel ID: 1*Apr 28 17:05:47:448 2021 Branch-LXZ IKE/7/EVENT: Begin to construct IPsec SA delete packet.*Apr 28 17:05:47:448 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500Encrypt the packet.*Apr 28 17:05:47:448 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500Construct delete payload.*Apr 28 17:05:47:448 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500Sending packet to 171.221.88.110 remote port 500, local port 500.*Apr 28 17:05:47:448 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500 I-COOKIE: b8349af1de22707a R-COOKIE: 2cfea10944c84f39 next payload: HASH version: ISAKMP Version 1.0 exchange mode: Info flags: ENCRYPT message ID: d8844981 length: 76*Apr 28 17:05:47:449 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500Sending an IPv4 packet.*Apr 28 17:05:47:449 2021 Branch-LXZ IKE/7/EVENT: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500Sent data to socket successfully.%Apr 28 17:05:47:449 2021 Branch-LXZ IKE/6/IKE_P2_SA_TERMINATE: The IKE phase 2 SA was deleted.Reason: All P2 SAs were deleted.SA information:Role: initiatorLocal address: 212.222.0.22Remote address: 171.221.88.110Sour addr: 192.168.88.0/255.255.255.0 Port: 0 Protocol: IPDest addr: 192.168.17.0/255.255.255.0 Port: 0 Protocol: IPInside VPN instance: Outside VPN instance: Inbound AH SPI: 0Outbound AH SPI: 0Inbound ESP SPI: 1885651256Outbound ESP SPI: 3574345245Initiator COOKIE: b8349af1de22707aResponder COOKIE: 2cfea10944c84f39Message ID: 0x3c143a84Connection ID: 95Tunnel ID: 1*Apr 28 17:05:47:450 2021 Branch-LXZ IKE/7/EVENT: Begin to construct IPsec SA delete packet.*Apr 28 17:05:47:450 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500Encrypt the packet.*Apr 28 17:05:47:450 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500Construct delete payload.*Apr 28 17:05:47:450 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500Sending packet to 171.221.88.110 remote port 500, local port 500.*Apr 28 17:05:47:450 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500 I-COOKIE: b8349af1de22707a R-COOKIE: 2cfea10944c84f39 next payload: HASH version: ISAKMP Version 1.0 exchange mode: Info flags: ENCRYPT message ID: 97660794 length: 76*Apr 28 17:05:47:450 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500Sending an IPv4 packet.*Apr 28 17:05:47:450 2021 Branch-LXZ IKE/7/EVENT: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500Sent data to socket successfully.%Apr 28 17:05:47:451 2021 Branch-LXZ IKE/6/IKE_P2_SA_TERMINATE: The IKE phase 2 SA was deleted.Reason: All P2 SAs were deleted.SA information:Role: initiatorLocal address: 212.222.0.22Remote address: 171.221.88.110Sour addr: 192.168.88.0/255.255.255.0 Port: 0 Protocol: IPDest addr: 192.168.3.0/255.255.255.0 Port: 0 Protocol: IPInside VPN instance: Outside VPN instance: Inbound AH SPI: 0Outbound AH SPI: 0Inbound ESP SPI: 104537885Outbound ESP SPI: 4214977173Initiator COOKIE: b8349af1de22707aResponder COOKIE: 2cfea10944c84f39Message ID: 0xb338ba29Connection ID: 94Tunnel ID: 1*Apr 28 17:05:47:459 2021 Branch-LXZ IKE/7/EVENT: Begin to construct IPsec SA delete packet.*Apr 28 17:05:47:459 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500Encrypt the packet.*Apr 28 17:05:47:459 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500Construct delete payload.*Apr 28 17:05:47:459 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500Sending packet to 171.221.88.110 remote port 500, local port 500.*Apr 28 17:05:47:459 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500 I-COOKIE: b8349af1de22707a R-COOKIE: 2cfea10944c84f39 next payload: HASH version: ISAKMP Version 1.0 exchange mode: Info flags: ENCRYPT message ID: 231e79c5 length: 76*Apr 28 17:05:47:460 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500Sending an IPv4 packet.*Apr 28 17:05:47:460 2021 Branch-LXZ IKE/7/EVENT: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500Sent data to socket successfully.%Apr 28 17:05:47:460 2021 Branch-LXZ IKE/6/IKE_P2_SA_TERMINATE: The IKE phase 2 SA was deleted.Reason: All P2 SAs were deleted.SA information:Role: initiatorLocal address: 212.222.0.22Remote address: 171.221.88.110Sour addr: 192.168.88.0/255.255.255.0 Port: 0 Protocol: IPDest addr: 192.168.10.0/255.255.255.0 Port: 0 Protocol: IPInside VPN instance: Outside VPN instance: Inbound AH SPI: 0Outbound AH SPI: 0Inbound ESP SPI: 390326052Outbound ESP SPI: 3549482947Initiator COOKIE: b8349af1de22707aResponder COOKIE: 2cfea10944c84f39Message ID: 0xa75218a5Connection ID: 93Tunnel ID: 1*Apr 28 17:05:47:460 2021 Branch-LXZ IKE/7/EVENT: Begin to construct IPsec SA delete packet.*Apr 28 17:05:47:461 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500Encrypt the packet.*Apr 28 17:05:47:461 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500Construct delete payload.*Apr 28 17:05:47:461 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500Sending packet to 171.221.88.110 remote port 500, local port 500.*Apr 28 17:05:47:461 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500 I-COOKIE: b8349af1de22707a R-COOKIE: 2cfea10944c84f39 next payload: HASH version: ISAKMP Version 1.0 exchange mode: Info flags: ENCRYPT message ID: cb51148a length: 76*Apr 28 17:05:47:461 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500Sending an IPv4 packet.*Apr 28 17:05:47:461 2021 Branch-LXZ IKE/7/EVENT: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500Sent data to socket successfully.*Apr 28 17:05:47:579 2021 Branch-LXZ IPSEC/7/PACKET: FS Check : fs sequence num in IPsec fast cache is 184, current fs sequence num is 195*Apr 28 17:05:47:579 2021 Branch-LXZ IPSEC/7/PACKET: FS Check : Get IPsec Tunnel = (null).*Apr 28 17:05:47:579 2021 Branch-LXZ IPSEC/7/PACKET: IPsec fast cache is invalid, get ipsec tunnel again.*Apr 28 17:05:47:579 2021 Branch-LXZ IPSEC/7/EVENT: Can't find block-flow node.*Apr 28 17:05:47:579 2021 Branch-LXZ IPSEC/7/PACKET: Failed to find SA by SP, SP Index = 1, SP Convert-Seq = 65536.*Apr 28 17:05:47:579 2021 Branch-LXZ IPSEC/7/ERROR: The reason of dropping packet is no available IPsec tunnel.*Apr 28 17:05:47:579 2021 Branch-LXZ IPSEC/7/PACKET: Output fastword: convert to local output process.*Apr 28 17:05:47:579 2021 Branch-LXZ IPSEC/7/EVENT: Sent SA-Acquire message : SP ID = 1*Apr 28 17:05:47:579 2021 Branch-LXZ IPSEC/7/EVENT: Received negotiatiate SA message from IPsec kernel.%Apr 28 17:05:47:579 2021 Branch-LXZ IPSEC/6/IPSEC_SA_INITIATION: Began to establish IPsec SA.SA information:Local address: 212.222.0.22Remote address: 171.221.88.110Sour addr: 192.168.88.0/255.255.255.0 Port: 0 Protocol: IPDest addr: 192.168.10.0/255.255.255.0 Port: 0 Protocol: IPInside VPN instance: Outside VPN instance: ACL number: 3020*Apr 28 17:05:47:579 2021 Branch-LXZ IPSEC/7/EVENT: Got SA time-based soft lifetime settings when filling Sp data. Configured soft lifetime buffer : 0 seconds. Configured global soft lifetime buffer : 0 seconds.*Apr 28 17:05:47:580 2021 Branch-LXZ IKE/7/EVENT: Received message from ipsec, message type is 0.*Apr 28 17:05:47:580 2021 Branch-LXZ IKE/7/EVENT: Received SA acquire message from IPsec.*Apr 28 17:05:47:580 2021 Branch-LXZ IKE/7/EVENT: IKE thread 1099324379824 processes a job.*Apr 28 17:05:47:580 2021 Branch-LXZ IKE/7/EVENT: Received SA acquire message from IPsec.*Apr 28 17:05:47:580 2021 Branch-LXZ IKE/7/EVENT: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500Set IPsec SA state to IKE_P2_STATE_INIT.*Apr 28 17:05:47:580 2021 Branch-LXZ IKE/7/EVENT: IKE thread 1099324379824 processes a job.*Apr 28 17:05:47:580 2021 Branch-LXZ IKE/7/EVENT: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500Begin Quick mode exchange.*Apr 28 17:05:47:580 2021 Branch-LXZ IKE/7/EVENT: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500IPsec SA state changed from IKE_P2_STATE_INIT to IKE_P2_STATE_GETSPI.*Apr 28 17:05:47:581 2021 Branch-LXZ IKE/7/EVENT: Received message from ipsec, message type is 9.*Apr 28 17:05:47:581 2021 Branch-LXZ IKE/7/EVENT: IKE thread 1099324379824 processes a job.*Apr 28 17:05:47:581 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500Set attributes according to phase 2 transform.*Apr 28 17:05:47:581 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500 Encapsulation mode is Tunnel.*Apr 28 17:05:47:581 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500 in seconds*Apr 28 17:05:47:581 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500 Life duration is 3600.*Apr 28 17:05:47:581 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500 in kilobytes*Apr 28 17:05:47:581 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500 Life duration is 1843200.*Apr 28 17:05:47:581 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500 Authentication algorithm is HMAC-SHA1.*Apr 28 17:05:47:581 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500 Key length is 128 bytes.*Apr 28 17:05:47:581 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500 Transform ID is AES-CBC.*Apr 28 17:05:47:581 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500Construct transform 1.*Apr 28 17:05:47:581 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500Construct IPsec proposal 1.*Apr 28 17:05:47:581 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500Construct IPsec SA payload.*Apr 28 17:05:47:581 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500Construct NONCE payload.*Apr 28 17:05:47:581 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500Construct IPsec ID payload.*Apr 28 17:05:47:581 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500Construct IPsec ID payload.*Apr 28 17:05:47:582 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500Construct HASH(1) payload.*Apr 28 17:05:47:582 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500Encrypt the packet.*Apr 28 17:05:47:582 2021 Branch-LXZ IKE/7/EVENT: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500IPsec SA state changed from IKE_P2_STATE_GETSPI to IKE_P2_STATE_SEND1.*Apr 28 17:05:47:582 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500Sending packet to 171.221.88.110 remote port 500, local port 500.*Apr 28 17:05:47:582 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500 I-COOKIE: b8349af1de22707a R-COOKIE: 2cfea10944c84f39 next payload: HASH version: ISAKMP Version 1.0 exchange mode: Quick flags: ENCRYPT message ID: a5364612 length: 172*Apr 28 17:05:47:582 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500Sending an IPv4 packet.*Apr 28 17:05:47:583 2021 Branch-LXZ IKE/7/EVENT: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500Sent data to socket successfully.*Apr 28 17:05:47:595 2021 Branch-LXZ IKE/7/EVENT: Received packet successfully.*Apr 28 17:05:47:595 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500Received packet from 171.221.88.110 source port 500 destination port 500.*Apr 28 17:05:47:595 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500 I-COOKIE: b8349af1de22707a R-COOKIE: 2cfea10944c84f39 next payload: HASH version: ISAKMP Version 1.0 exchange mode: Quick flags: ENCRYPT message ID: a5364612 length: 172*Apr 28 17:05:47:595 2021 Branch-LXZ IKE/7/EVENT: IKE thread 1099324379824 processes a job.*Apr 28 17:05:47:595 2021 Branch-LXZ IKE/7/EVENT: Phase2 process started.*Apr 28 17:05:47:595 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500Decrypt the packet.*Apr 28 17:05:47:595 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500Received ISAKMP Hash Payload.*Apr 28 17:05:47:595 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500Received ISAKMP Security Association Payload.*Apr 28 17:05:47:595 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500Received ISAKMP Nonce Payload.*Apr 28 17:05:47:596 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500Received ISAKMP Identification Payload (IPsec DOI).*Apr 28 17:05:47:596 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500Received ISAKMP Identification Payload (IPsec DOI).*Apr 28 17:05:47:596 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500Process HASH payload.*Apr 28 17:05:47:596 2021 Branch-LXZ IKE/7/EVENT: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500Validated HASH(2) successfully.*Apr 28 17:05:47:596 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500Process IPsec SA payload.*Apr 28 17:05:47:596 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500Check IPsec proposal 1.*Apr 28 17:05:47:597 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500Parse transform 1.*Apr 28 17:05:47:597 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500 Encapsulation mode is Tunnel.*Apr 28 17:05:47:597 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500 Lifetime type is in seconds.*Apr 28 17:05:47:597 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500 Life duration is 3600.*Apr 28 17:05:47:597 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500 Lifetime type is in kilobytes.*Apr 28 17:05:47:597 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500 Life duration is 1843200.*Apr 28 17:05:47:597 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500 Authentication algorithm is HMAC-SHA1.*Apr 28 17:05:47:597 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500 Key length is 128 bytes.*Apr 28 17:05:47:597 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500 Transform ID is AES-CBC.*Apr 28 17:05:47:598 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500The proposal is acceptable.*Apr 28 17:05:47:598 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500Process IPsec ID payload.*Apr 28 17:05:47:598 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500Process IPsec ID payload.*Apr 28 17:05:47:598 2021 Branch-LXZ IKE/7/EVENT: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500Install IPsec SAs.*Apr 28 17:05:47:598 2021 Branch-LXZ IKE/7/EVENT: Inbound flow: 192.168.10.0/24->192.168.88.0/24*Apr 28 17:05:47:598 2021 Branch-LXZ IKE/7/EVENT: Outbound flow: 192.168.88.0/24->192.168.10.0/24*Apr 28 17:05:47:598 2021 Branch-LXZ IKE/7/EVENT: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500 Lifetime in seconds: 3600*Apr 28 17:05:47:598 2021 Branch-LXZ IKE/7/EVENT: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500 Lifetime in kilobytes: 1843200*Apr 28 17:05:47:598 2021 Branch-LXZ IKE/7/EVENT: Protocol: 50 Inbound SPI: 0xb09f3700 Outbound SPI: 0x07cf6e34*Apr 28 17:05:47:599 2021 Branch-LXZ IPSEC/7/EVENT: Can not find IPsec tunnel in same flow hash table, and will create a new one.*Apr 28 17:05:47:599 2021 Branch-LXZ IPSEC/7/EVENT: IPsec tunnel successfully added in kernel.*Apr 28 17:05:47:600 2021 Branch-LXZ IPSEC/7/EVENT: SA successfully added in kernel.*Apr 28 17:05:47:600 2021 Branch-LXZ IPSEC/7/EVENT: SA successfully added in kernel.*Apr 28 17:05:47:599 2021 Branch-LXZ IPSEC/7/EVENT: Got default traffic-based lifetime settings for IPsec P2 SA when filling ISAKMP SA data: Role : Initiator. Default soft lifetime : 1509949440 bytes. Hard lifetime : 1887436800 bytes.*Apr 28 17:05:47:599 2021 Branch-LXZ IPSEC/7/EVENT: Got traffic-based lifetime settings for IPsec P2 SA when filling ISAKMP SA data: Role : Initiator. Configured soft lifetime buffer : 0 bytes. Configured global soft lifetime buffer : 0 bytes. Default soft lifetime : 1509949440 bytes. Hard lifetime after negotiation : 1887436800 bytes. Actual soft lifetime : 1509949440 bytes.*Apr 28 17:05:47:599 2021 Branch-LXZ IPSEC/7/EVENT: Added tunnel to kernel successfully.*Apr 28 17:05:47:599 2021 Branch-LXZ IPSEC/7/EVENT: Sent add tunnel message to all nodes, message type is 0x13.*Apr 28 17:05:47:599 2021 Branch-LXZ IPSEC/7/EVENT: Save IPsec Tunnel to DBM, tunnelIndex 2, refreshCnt 0, createTime 119244*Apr 28 17:05:47:600 2021 Branch-LXZ IPSEC/7/EVENT: Added an IPsec tunnel when adding ISAKMP SA: tunnel index = 2, tunnel sequence number = 3.*Apr 28 17:05:47:600 2021 Branch-LXZ IPSEC/7/EVENT: Added SA to kernel successfully.*Apr 28 17:05:47:600 2021 Branch-LXZ IPSEC/7/EVENT: Added ISAKMP SAs. Number of SAs added is 2.*Apr 28 17:05:47:600 2021 Branch-LXZ IPSEC/7/EVENT: No.1 SA index: 8, sequence number: 9.*Apr 28 17:05:47:600 2021 Branch-LXZ IPSEC/7/EVENT: No.2 SA index: 9, sequence number: 9.*Apr 28 17:05:47:600 2021 Branch-LXZ IPSEC/7/EVENT: Added SA context to IKE.*Apr 28 17:05:47:600 2021 Branch-LXZ IKE/7/EVENT: Received message from ipsec, message type is 11.*Apr 28 17:05:47:600 2021 Branch-LXZ IKE/7/EVENT: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500IPsec SA state changed from IKE_P2_STATE_SEND1 to IKE_P2_STATE_SA_CREATED.*Apr 28 17:05:47:600 2021 Branch-LXZ IKE/7/EVENT: IKE thread 1099324379824 processes a job.*Apr 28 17:05:47:601 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500Construct HASH(3) payload.*Apr 28 17:05:47:601 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500Encrypt the packet.*Apr 28 17:05:47:601 2021 Branch-LXZ IPSEC/7/EVENT: Updated outbound SA of IPsec tunnel(SA index = 8, SPI = 0x7cf6e34).%Apr 28 17:05:47:601 2021 Branch-LXZ IPSEC/6/IPSEC_SA_ESTABLISH: IPsec SA was established.SA information:Role: initiatorLocal address: 212.222.0.22Remote address: 171.221.88.110Sour addr: 192.168.88.0/255.255.255.0 Port: 0 Protocol: IPDest addr: 192.168.10.0/255.255.255.0 Port: 0 Protocol: IPInside VPN instance: Outside VPN instance: Inbound AH SPI: 0Outbound AH SPI: 0Inbound ESP SPI: 2963224320Outbound ESP SPI: 131034676ACL number: 3020*Apr 28 17:05:47:601 2021 Branch-LXZ IPSEC/7/EVENT: Sent switch SA message to all nodes, message type is 0x1a.*Apr 28 17:05:47:601 2021 Branch-LXZ IPSEC/7/EVENT: Switch SA and delete blockflow node. SA index : 9, SA Seq : 9.Block index : 0, Block seq : 7.*Apr 28 17:05:47:601 2021 Branch-LXZ IPSEC/7/EVENT: Switched SA successfully.*Apr 28 17:05:47:601 2021 Branch-LXZ IKE/7/EVENT: Received message from ipsec, message type is 15.*Apr 28 17:05:47:602 2021 Branch-LXZ IKE/7/EVENT: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500IPsec SA state changed from IKE_P2_STATE_SA_CREATED to IKE_P2_STATE_SA_SWITCH.*Apr 28 17:05:47:602 2021 Branch-LXZ IKE/7/EVENT: IKE thread 1099324379824 processes a job.*Apr 28 17:05:47:602 2021 Branch-LXZ IKE/7/EVENT: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500IPsec SA state changed from IKE_P2_STATE_SA_SWITCH to IKE_P2_STATE_ESTABLISHED.*Apr 28 17:05:47:602 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500Sending packet to 171.221.88.110 remote port 500, local port 500.*Apr 28 17:05:47:602 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500 I-COOKIE: b8349af1de22707a R-COOKIE: 2cfea10944c84f39 next payload: HASH version: ISAKMP Version 1.0 exchange mode: Quick flags: ENCRYPT message ID: a5364612 length: 60*Apr 28 17:05:47:602 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500Sending an IPv4 packet.*Apr 28 17:05:47:602 2021 Branch-LXZ IKE/7/EVENT: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500Sent data to socket successfully.*Apr 28 17:05:47:603 2021 Branch-LXZ IKE/7/EVENT: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500 Got time-based lifetime settings for IKE P2 SA: Role : Initiator. Configured soft lifetime buffer : 0 seconds. Hard lifetime after negotiation : 3600 seconds. Default soft lifetime : 2700 seconds. Actual soft lifetime : 2700 seconds.*Apr 28 17:05:47:603 2021 Branch-LXZ IKE/7/EVENT: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500Add P2 SA to triple successfully.reset ike sa *Apr 28 17:05:51:743 2021 Branch-LXZ IKE/7/EVENT: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500Delete tunnel, reference count is [0], tunnel [1] has been freed.*Apr 28 17:05:51:743 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500Encrypt the packet.*Apr 28 17:05:51:743 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500Construct delete payload.*Apr 28 17:05:51:744 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500Sending packet to 171.221.88.110 remote port 500, local port 500.*Apr 28 17:05:51:744 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500 I-COOKIE: b8349af1de22707a R-COOKIE: 2cfea10944c84f39 next payload: HASH version: ISAKMP Version 1.0 exchange mode: Info flags: ENCRYPT message ID: a9513b8d length: 92*Apr 28 17:05:51:744 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500Sending an IPv4 packet.*Apr 28 17:05:51:744 2021 Branch-LXZ IKE/7/EVENT: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500Sent data to socket successfully.*Apr 28 17:05:51:749 2021 Branch-LXZ IPSEC/7/EVENT: Deleted DPD in kernel(DPD ID = 0).*Apr 28 17:05:51:749 2021 Branch-LXZ IPSEC/7/EVENT: DPD successfully deleted in kernel.*Apr 28 17:05:51:750 2021 Branch-LXZ IPSEC/7/EVENT: DPD of SA successfully set in kernel.*Apr 28 17:05:51:750 2021 Branch-LXZ IPSEC/7/EVENT: DPD of SA successfully set in kernel.*Apr 28 17:05:51:749 2021 Branch-LXZ IPSEC/7/EVENT: Sent update DPD index of SA message to all nodes, message type is 0x20.*Apr 28 17:05:51:751 2021 Branch-LXZ IPSEC/7/EVENT: Sent delete DPD message to all nodes, message type is 0x1f.%Apr 28 17:05:51:751 2021 Branch-LXZ IKE/6/IKE_P1_SA_TERMINATE: The IKE phase 1 SA was deleted.Reason: All IKE SAs were deleted.SA information:Role: initiatorLocal IP: 212.222.0.22Local ID type: IPV4_ADDRLocal ID: 212.222.0.22Local port: 500Retransmissions: 0Remote IP: 171.221.88.110Remote ID type: IPV4_ADDRRemote ID: 171.221.88.110Remote port: 500Recived retransmissions: 0Inside VPN instance: Outside VPN instance: Initiator COOKIE: b8349af1de22707aResponder COOKIE: 2cfea10944c84f39Connection ID: 77Tunnel ID: 1IKE profile name: 1*Apr 28 17:05:51:752 2021 Branch-LXZ IKE/7/EVENT: Sent config reset message. *Apr 28 17:05:53:579 2021 Branch-LXZ IPSEC/7/PACKET: --- Sent IPsec packet, pkt len : 128 ---*Apr 28 17:05:53:579 2021 Branch-LXZ IPSEC/7/PACKET: Attent to match Mqc(0), ifIndex is 132, digest is 0, no result.*Apr 28 17:05:53:579 2021 Branch-LXZ IPSEC/7/PACKET: Attent to match Mqc(1), ifIndex is 132, digest is 0, no result.*Apr 28 17:05:53:579 2021 Branch-LXZ IPSEC/7/PACKET: Last dest lip is NULL.*Apr 28 17:05:53:579 2021 Branch-LXZ IPSEC/7/PACKET: Outbound IPsec processing: src IP = 192.168.88.1, dst IP = 192.168.10.1, SPI = 131034676.*Apr 28 17:05:53:579 2021 Branch-LXZ IPSEC/7/PACKET: Alloc IPsec cache: Global fs seq : 195, Private index : 2, Private seq : 3.*Apr 28 17:05:53:579 2021 Branch-LXZ IPSEC/7/EVENT: Add ip fastforward cache : ulDirtection = 2, ifIndexOut = 135*Apr 28 17:05:53:579 2021 Branch-LXZ IPSEC/7/EVENT: Added IP fast forwarding entry.*Apr 28 17:05:53:579 2021 Branch-LXZ IPSEC/7/PACKET: Outbound IPsec processing: ESP auth algorithm: SHA1, ESP encp algorithm: AES-CBC-128.*Apr 28 17:05:53:579 2021 Branch-LXZ IPSEC/7/PACKET: Packet will be sent to CCF for sync-encryption.*Apr 28 17:05:53:579 2021 Branch-LXZ IPSEC/7/PACKET: Outbound IPsec ESP processing: Encryption succeeded, anti-replay SN is 1.*Apr 28 17:05:53:579 2021 Branch-LXZ IPSEC/7/PACKET: Outbound IPsec processing: Packet encapsulated successfully.*Apr 28 17:05:53:579 2021 Branch-LXZ IPSEC/7/EVENT: Start to fill reply cache key, SrcAddr : 212.222.0.22, DstAddr : 171.221.88.110, SPI :131034676, SrcPort : 1999, DstPort : 28212.*Apr 28 17:05:53:579 2021 Branch-LXZ IPSEC/7/EVENT: Fill output IPsec packet reply cache key.*Apr 28 17:05:53:579 2021 Branch-LXZ IPSEC/7/EVENT: Find another sa, spi : 0xb09f3700, SrcPort : 45215, DstPort : 14080.*Apr 28 17:05:53:586 2021 Branch-LXZ IPSEC/7/PACKET: --- Received IPsec(ESP) packet: packet length : 200 ---*Apr 28 17:05:53:586 2021 Branch-LXZ IPSEC/7/EVENT: Enter IPsec ESP input process, Data length : 200*Apr 28 17:05:53:586 2021 Branch-LXZ IPSEC/7/PACKET: Attent to match Mqc(0), ifIndex is 135, digest is 0, no result.*Apr 28 17:05:53:586 2021 Branch-LXZ IPSEC/7/PACKET: Attent to match Mqc(1), ifIndex is 135, digest is 0, no result.*Apr 28 17:05:53:586 2021 Branch-LXZ IPSEC/7/PACKET: Last dest lip is NULL.*Apr 28 17:05:53:586 2021 Branch-LXZ IPSEC/7/PACKET: Inbound IPsec processing: src IP = 171.221.88.110, dst IP = 212.222.0.22, SPI = 2963224320.*Apr 28 17:05:53:586 2021 Branch-LXZ IPSEC/7/PACKET: Alloc IPsec cache: Global fs seq : 195, Private index : 9, Private seq : 9.*Apr 28 17:05:53:586 2021 Branch-LXZ IPSEC/7/EVENT: Add ip fastforward cache : ulDirtection = 1, ifIndexOut = 0*Apr 28 17:05:53:586 2021 Branch-LXZ IPSEC/7/EVENT: Added IP fast forwarding entry.*Apr 28 17:05:53:586 2021 Branch-LXZ IPSEC/7/PACKET: Inbound IPsec processing: ESP auth algorithm: SHA1, ESP encp algorithm: AES-CBC-128.*Apr 28 17:05:53:586 2021 Branch-LXZ IPSEC/7/PACKET: Packet will be sent to CCF for sync-decryption.*Apr 28 17:05:53:586 2021 Branch-LXZ IPSEC/7/PACKET: Inbound IPsec ESP processing: Authentication succeeded.*Apr 28 17:05:53:586 2021 Branch-LXZ IPSEC/7/PACKET: Inbound IPsec ESP processing: Decryption succeeded.*Apr 28 17:05:53:586 2021 Branch-LXZ IPSEC/7/PACKET: IPsec processing: Tunnel mode.*Apr 28 17:05:53:586 2021 Branch-LXZ IPSEC/7/PACKET: Inbound ESP IPsec processing: Sent packet back to IP forwarding. Pkt len is 128.*Apr 28 17:05:53:586 2021 Branch-LXZ IPSEC/7/PACKET: Alloc IPsec cache: Global fs seq : 195, Private index : 0, Private seq : 0.disp ike sa Connection-ID Remote Flag DOI ------------------------------------------------------------------disp*Apr 28 17:05:56:360 2021 Branch-LXZ IPSEC/7/EVENT: Can't find block-flow node.*Apr 28 17:05:56:360 2021 Branch-LXZ IPSEC/7/PACKET: Failed to find SA by SP, SP Index = 1, SP Convert-Seq = 65536.*Apr 28 17:05:56:360 2021 Branch-LXZ IPSEC/7/ERROR: The reason of dropping packet is no available IPsec tunnel.*Apr 28 17:05:56:360 2021 Branch-LXZ IPSEC/7/EVENT: Sent SA-Acquire message : SP ID = 1*Apr 28 17:05:56:360 2021 Branch-LXZ IPSEC/7/EVENT: Received negotiatiate SA message from IPsec kernel.%Apr 28 17:05:56:360 2021 Branch-LXZ IPSEC/6/IPSEC_SA_INITIATION: Began to establish IPsec SA.SA information:Local address: 212.222.0.22Remote address: 171.221.88.110Sour addr: 192.168.88.0/255.255.255.0 Port: 0 Protocol: IPDest addr: 192.168.17.0/255.255.255.0 Port: 0 Protocol: IPInside VPN instance: Outside VPN instance: ACL number: 3020*Apr 28 17:05:56:360 2021 Branch-LXZ IPSEC/7/EVENT: Got SA time-based soft lifetime settings when filling Sp data. Configured soft lifetime buffer : 0 seconds. Configured global soft lifetime buffer : 0 seconds.*Apr 28 17:05:56:361 2021 Branch-LXZ IKE/7/EVENT: Received message from ipsec, message type is 0.*Apr 28 17:05:56:361 2021 Branch-LXZ IKE/7/EVENT: Received SA acquire message from IPsec.*Apr 28 17:05:56:361 2021 Branch-LXZ IKE/7/EVENT: IKE thread 1099324379824 processes a job.*Apr 28 17:05:56:361 2021 Branch-LXZ IKE/7/EVENT: Received SA acquire message from IPsec.*Apr 28 17:05:56:361 2021 Branch-LXZ IKE/7/EVENT: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500Set IPsec SA state to IKE_P2_STATE_INIT.*Apr 28 17:05:56:361 2021 Branch-LXZ IKE/7/EVENT: IKE SA not found. Initiate IKE SA negotiation.*Apr 28 17:05:56:361 2021 Branch-LXZ IKE/7/EVENT: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500Obtained profile 1.*Apr 28 17:05:56:361 2021 Branch-LXZ IKE/7/EVENT: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500Initiator created an SA for peer 171.221.88.110, local port 500, remote port 500.*Apr 28 17:05:56:361 2021 Branch-LXZ IKE/7/EVENT: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500Set IKE SA state to IKE_P1_STATE_INIT.*Apr 28 17:05:56:361 2021 Branch-LXZ IKE/7/EVENT: IKE thread 1099324379824 processes a job.*Apr 28 17:05:56:361 2021 Branch-LXZ IKE/7/EVENT: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500Begin Main mode exchange.*Apr 28 17:05:56:361 2021 Branch-LXZ IKE/7/EVENT: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500Found pre-shared key that matches address 171.221.88.110 in keychain 1.*Apr 28 17:05:56:361 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500 Encryption algorithm is AES-CBC.*Apr 28 17:05:56:362 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500 Key length is 128 bits.*Apr 28 17:05:56:362 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500 Hash algorithm is HMAC-SHA1.*Apr 28 17:05:56:362 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500 DH group 2.*Apr 28 17:05:56:362 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500 Authentication method is Pre-shared key.*Apr 28 17:05:56:362 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500 Lifetime type is in seconds.*Apr 28 17:05:56:362 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500 Life duration is 86400.*Apr 28 17:05:56:362 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500Construct transform payload for transform 1.*Apr 28 17:05:56:362 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500 Encryption algorithm is DES-CBC.*Apr 28 17:05:56:362 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500 Hash algorithm is HMAC-SHA1.*Apr 28 17:05:56:362 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500 DH group 1.*Apr 28 17:05:56:362 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500 Authentication method is Pre-shared key.*Apr 28 17:05:56:362 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500 Lifetime type is in seconds.*Apr 28 17:05:56:362 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500 Life duration is 86400.*Apr 28 17:05:56:362 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500Construct transform payload for transform 2.*Apr 28 17:05:56:362 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500Constructed SA payload.*Apr 28 17:05:56:362 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500Construct NAT-T rfc3947 vendor ID payload.*Apr 28 17:05:56:362 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500Construct NAT-T draft3 vendor ID payload.*Apr 28 17:05:56:362 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500Construct NAT-T draft2 vendor ID payload.*Apr 28 17:05:56:362 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500Construct NAT-T draft1 vendor ID payload.*Apr 28 17:05:56:362 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500Construct XAUTH Cisco Unity 1.0 vendor ID payload.*Apr 28 17:05:56:362 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500Construct XAUTH draft6 vendor ID payload.*Apr 28 17:05:56:362 2021 Branch-LXZ IKE/7/EVENT: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500IKE SA state changed from IKE_P1_STATE_INIT to IKE_P1_STATE_SEND1.*Apr 28 17:05:56:362 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500Sending packet to 171.221.88.110 remote port 500, local port 500.*Apr 28 17:05:56:362 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500 I-COOKIE: c0e46f144a222b28 R-COOKIE: 0000000000000000 next payload: SA version: ISAKMP Version 1.0 exchange mode: Main flags: message ID: 0 length: 236*Apr 28 17:05:56:363 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500Sending an IPv4 packet.*Apr 28 17:05:56:363 2021 Branch-LXZ IKE/7/EVENT: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500Sent data to socket successfully.*Apr 28 17:05:56:368 2021 Branch-LXZ IKE/7/EVENT: Received packet successfully.*Apr 28 17:05:56:368 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500Received packet from 171.221.88.110 source port 500 destination port 500.*Apr 28 17:05:56:368 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500 I-COOKIE: c0e46f144a222b28 R-COOKIE: 0c1bb9d7e5fb3808 next payload: SA version: ISAKMP Version 1.0 exchange mode: Main flags: message ID: 0 length: 140*Apr 28 17:05:56:368 2021 Branch-LXZ IKE/7/EVENT: IKE thread 1099324379824 processes a job.*Apr 28 17:05:56:368 2021 Branch-LXZ IKE/7/EVENT: Phase1 process started.*Apr 28 17:05:56:369 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500Received ISAKMP Security Association Payload.*Apr 28 17:05:56:369 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500Received ISAKMP Vendor ID Payload.*Apr 28 17:05:56:369 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500Received ISAKMP Vendor ID Payload.*Apr 28 17:05:56:369 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500Received ISAKMP Vendor ID Payload.*Apr 28 17:05:56:369 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500Process SA payload.*Apr 28 17:05:56:369 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500Check ISAKMP transform 1.*Apr 28 17:05:56:369 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500 Encryption algorithm is AES-CBC.*Apr 28 17:05:56:369 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500 Key length is 128 bytes.*Apr 28 17:05:56:369 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500 HASH algorithm is HMAC-SHA1.*Apr 28 17:05:56:369 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500 DH group is 2.*Apr 28 17:05:56:369 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500 Authentication method is Pre-shared key.*Apr 28 17:05:56:369 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500 Lifetime type is 1.*Apr 28 17:05:56:369 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500 Life duration is 86400.*Apr 28 17:05:56:370 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500Attributes is acceptable.*Apr 28 17:05:56:370 2021 Branch-LXZ IKE/7/EVENT: Oakley transform 1 is acceptable.*Apr 28 17:05:56:370 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500Process vendor ID payload.*Apr 28 17:05:56:370 2021 Branch-LXZ IKE/7/EVENT: Vendor ID NAT-T rfc3947 is matched.*Apr 28 17:05:56:370 2021 Branch-LXZ IKE/7/EVENT: Vendor ID XAUTH Cisco Unity 1.0 is matched.*Apr 28 17:05:56:370 2021 Branch-LXZ IKE/7/EVENT: Vendor ID XAUTH draft6 is matched.*Apr 28 17:05:56:373 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500Construct KE payload.*Apr 28 17:05:56:373 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500Construct NONCE payload.*Apr 28 17:05:56:373 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500Construct NAT-D payload.*Apr 28 17:05:56:373 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500Construct DPD vendor ID payload.*Apr 28 17:05:56:374 2021 Branch-LXZ IKE/7/EVENT: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500IKE SA state changed from IKE_P1_STATE_SEND1 to IKE_P1_STATE_SEND3.*Apr 28 17:05:56:374 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500Sending packet to 171.221.88.110 remote port 500, local port 500.*Apr 28 17:05:56:374 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500 I-COOKIE: c0e46f144a222b28 R-COOKIE: 0c1bb9d7e5fb3808 next payload: KE version: ISAKMP Version 1.0 exchange mode: Main flags: message ID: 0 length: 248*Apr 28 17:05:56:374 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500Sending an IPv4 packet.*Apr 28 17:05:56:374 2021 Branch-LXZ IKE/7/EVENT: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500Sent data to socket successfully. *Apr 28 17:05:56:475 2021 Branch-LXZ IKE/7/EVENT: Received packet successfully.*Apr 28 17:05:56:475 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500Received packet from 171.221.88.110 source port 500 destination port 500.*Apr 28 17:05:56:475 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500 I-COOKIE: c0e46f144a222b28 R-COOKIE: 0c1bb9d7e5fb3808 next payload: KE version: ISAKMP Version 1.0 exchange mode: Main flags: message ID: 0 length: 248*Apr 28 17:05:56:475 2021 Branch-LXZ IKE/7/EVENT: IKE thread 1099324379824 processes a job.*Apr 28 17:05:56:475 2021 Branch-LXZ IKE/7/EVENT: Phase1 process started.*Apr 28 17:05:56:475 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500Received ISAKMP Key Exchange Payload.*Apr 28 17:05:56:475 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500Received ISAKMP Nonce Payload.*Apr 28 17:05:56:475 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500Received ISAKMP NAT-D Payload.*Apr 28 17:05:56:475 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500Received ISAKMP NAT-D Payload.*Apr 28 17:05:56:475 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500Received ISAKMP Vendor ID Payload.*Apr 28 17:05:56:475 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500Process KE payload.*Apr 28 17:05:56:476 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500Process NONCE payload.*Apr 28 17:05:56:479 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500Received 2 NAT-D payload.*Apr 28 17:05:56:479 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500Local ID type: IPV4_ADDR (1).*Apr 28 17:05:56:479 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500Local ID value: 212.222.0.22.*Apr 28 17:05:56:479 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500Construct ID payload.*Apr 28 17:05:56:480 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500HASH: 14fddd59 26e9677b c96d5ebf dd7f516d abb9241a*Apr 28 17:05:56:480 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500Construct authentication by pre-shared-key.*Apr 28 17:05:56:480 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500Construct INITIAL-CONTACT payload.*Apr 28 17:05:56:480 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500Encrypt the packet.*Apr 28 17:05:56:480 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500Process vendor ID payload.*Apr 28 17:05:56:480 2021 Branch-LXZ IKE/7/EVENT: Vendor ID DPD is matched.*Apr 28 17:05:56:480 2021 Branch-LXZ IKE/7/EVENT: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500IKE SA state changed from IKE_P1_STATE_SEND3 to IKE_P1_STATE_SEND5.*Apr 28 17:05:56:480 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500Sending packet to 171.221.88.110 remote port 500, local port 500.*Apr 28 17:05:56:480 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500 I-COOKIE: c0e46f144a222b28 R-COOKIE: 0c1bb9d7e5fb3808 next payload: ID version: ISAKMP Version 1.0 exchange mode: Main flags: ENCRYPT message ID: 0 length: 92*Apr 28 17:05:56:481 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500Sending an IPv4 packet.*Apr 28 17:05:56:481 2021 Branch-LXZ IKE/7/EVENT: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500Sent data to socket successfully.*Apr 28 17:05:56:487 2021 Branch-LXZ IKE/7/EVENT: Received packet successfully.*Apr 28 17:05:56:487 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500Received packet from 171.221.88.110 source port 500 destination port 500.*Apr 28 17:05:56:487 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500 I-COOKIE: c0e46f144a222b28 R-COOKIE: 0c1bb9d7e5fb3808 next payload: ID version: ISAKMP Version 1.0 exchange mode: Main flags: ENCRYPT message ID: 0 length: 76*Apr 28 17:05:56:487 2021 Branch-LXZ IKE/7/EVENT: IKE thread 1099324379824 processes a job.*Apr 28 17:05:56:487 2021 Branch-LXZ IKE/7/EVENT: Phase1 process started.*Apr 28 17:05:56:487 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500Decrypt the packet.*Apr 28 17:05:56:487 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500Received ISAKMP Identification Payload.*Apr 28 17:05:56:487 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500Received ISAKMP Hash Payload.*Apr 28 17:05:56:488 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500Process ID payload.*Apr 28 17:05:56:488 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500Peer ID type: IPV4_ADDR (1).*Apr 28 17:05:56:488 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500Peer ID value: address 171.221.88.110.*Apr 28 17:05:56:488 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500Verify HASH payload.*Apr 28 17:05:56:488 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500HASH: ae8947e5 3831eaea 26cf94ab b28cdba6 9c4841d1*Apr 28 17:05:56:488 2021 Branch-LXZ IKE/7/EVENT: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500HASH verification succeeded.*Apr 28 17:05:56:488 2021 Branch-LXZ IKE/7/EVENT: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500IKE SA state changed from IKE_P1_STATE_SEND5 to IKE_P1_STATE_ESTABLISHED.*Apr 28 17:05:56:488 2021 Branch-LXZ IKE/7/EVENT: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500The default soft lifetime 77760(seconds) was used for the IKE P1 SA.*Apr 28 17:05:56:489 2021 Branch-LXZ IKE/7/EVENT: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500Add tunnel, alloc new tunnel with ID [1].*Apr 28 17:05:56:489 2021 Branch-LXZ IPSEC/7/EVENT: DPD successfully added in kernel.*Apr 28 17:05:56:489 2021 Branch-LXZ IPSEC/7/EVENT: DPD of SA successfully set in kernel.*Apr 28 17:05:56:489 2021 Branch-LXZ IPSEC/7/EVENT: DPD of SA successfully set in kernel.*Apr 28 17:05:56:489 2021 Branch-LXZ IPSEC/7/EVENT: Sent add DPD message to all nodes, message type is 0x1c.*Apr 28 17:05:56:489 2021 Branch-LXZ IPSEC/7/EVENT: Sent update DPD index of SA message to all nodes, message type is 0x20.*Apr 28 17:05:56:491 2021 Branch-LXZ IKE/7/EVENT: Received message from ipsec, message type is 12.*Apr 28 17:05:56:491 2021 Branch-LXZ IKE/7/EVENT: IKE thread 1099324379824 processes a job.*Apr 28 17:05:56:492 2021 Branch-LXZ IKE/7/EVENT: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500Begin Quick mode exchange.*Apr 28 17:05:56:492 2021 Branch-LXZ IKE/7/EVENT: Received message from ipsec, message type is 9.*Apr 28 17:05:56:492 2021 Branch-LXZ IKE/7/EVENT: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500IPsec SA state changed from IKE_P2_STATE_INIT to IKE_P2_STATE_GETSPI.*Apr 28 17:05:56:492 2021 Branch-LXZ IKE/7/EVENT: IKE thread 1099324379824 processes a job.*Apr 28 17:05:56:492 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500Set attributes according to phase 2 transform.*Apr 28 17:05:56:492 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500 Encapsulation mode is Tunnel.*Apr 28 17:05:56:492 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500 in seconds*Apr 28 17:05:56:493 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500 Life duration is 3600.*Apr 28 17:05:56:493 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500 in kilobytes*Apr 28 17:05:56:493 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500 Life duration is 1843200.*Apr 28 17:05:56:493 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500 Authentication algorithm is HMAC-SHA1.*Apr 28 17:05:56:493 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500 Key length is 128 bytes.*Apr 28 17:05:56:493 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500 Transform ID is AES-CBC.*Apr 28 17:05:56:493 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500Construct transform 1.*Apr 28 17:05:56:493 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500Construct IPsec proposal 1.*Apr 28 17:05:56:493 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500Construct IPsec SA payload.*Apr 28 17:05:56:493 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500Construct NONCE payload.*Apr 28 17:05:56:493 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500Construct IPsec ID payload.*Apr 28 17:05:56:494 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500Construct IPsec ID payload.*Apr 28 17:05:56:494 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500Construct HASH(1) payload.*Apr 28 17:05:56:494 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500Encrypt the packet.*Apr 28 17:05:56:494 2021 Branch-LXZ IKE/7/EVENT: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500IPsec SA state changed from IKE_P2_STATE_GETSPI to IKE_P2_STATE_SEND1.*Apr 28 17:05:56:494 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500Sending packet to 171.221.88.110 remote port 500, local port 500.*Apr 28 17:05:56:494 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500 I-COOKIE: c0e46f144a222b28 R-COOKIE: 0c1bb9d7e5fb3808 next payload: HASH version: ISAKMP Version 1.0 exchange mode: Quick flags: ENCRYPT message ID: 43a578ab length: 172*Apr 28 17:05:56:494 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500Sending an IPv4 packet.*Apr 28 17:05:56:495 2021 Branch-LXZ IKE/7/EVENT: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500Sent data to socket successfully.*Apr 28 17:05:56:506 2021 Branch-LXZ IKE/7/EVENT: Received packet successfully.*Apr 28 17:05:56:506 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500Received packet from 171.221.88.110 source port 500 destination port 500.*Apr 28 17:05:56:506 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500 I-COOKIE: c0e46f144a222b28 R-COOKIE: 0c1bb9d7e5fb3808 next payload: HASH version: ISAKMP Version 1.0 exchange mode: Quick flags: ENCRYPT message ID: 43a578ab length: 172*Apr 28 17:05:56:506 2021 Branch-LXZ IKE/7/EVENT: IKE thread 1099324379824 processes a job.*Apr 28 17:05:56:506 2021 Branch-LXZ IKE/7/EVENT: Phase2 process started.*Apr 28 17:05:56:506 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500Decrypt the packet.*Apr 28 17:05:56:506 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500Received ISAKMP Hash Payload.*Apr 28 17:05:56:506 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500Received ISAKMP Security Association Payload.*Apr 28 17:05:56:507 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500Received ISAKMP Nonce Payload.*Apr 28 17:05:56:507 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500Received ISAKMP Identification Payload (IPsec DOI).*Apr 28 17:05:56:507 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500Received ISAKMP Identification Payload (IPsec DOI).*Apr 28 17:05:56:507 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500Process HASH payload.*Apr 28 17:05:56:507 2021 Branch-LXZ IKE/7/EVENT: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500Validated HASH(2) successfully.*Apr 28 17:05:56:507 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500Process IPsec SA payload.*Apr 28 17:05:56:508 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500Check IPsec proposal 1.*Apr 28 17:05:56:508 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500Parse transform 1.*Apr 28 17:05:56:508 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500 Encapsulation mode is Tunnel.*Apr 28 17:05:56:508 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500 Lifetime type is in seconds.*Apr 28 17:05:56:508 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500 Life duration is 3600.*Apr 28 17:05:56:508 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500 Lifetime type is in kilobytes.*Apr 28 17:05:56:508 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500 Life duration is 1843200.*Apr 28 17:05:56:509 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500 Authentication algorithm is HMAC-SHA1.*Apr 28 17:05:56:509 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500 Key length is 128 bytes.*Apr 28 17:05:56:509 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500 Transform ID is AES-CBC.*Apr 28 17:05:56:509 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500The proposal is acceptable.*Apr 28 17:05:56:509 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500Process IPsec ID payload.*Apr 28 17:05:56:509 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500Process IPsec ID payload.*Apr 28 17:05:56:509 2021 Branch-LXZ IKE/7/EVENT: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500Install IPsec SAs.*Apr 28 17:05:56:509 2021 Branch-LXZ IKE/7/EVENT: Inbound flow: 192.168.17.0/24->192.168.88.0/24*Apr 28 17:05:56:509 2021 Branch-LXZ IKE/7/EVENT: Outbound flow: 192.168.88.0/24->192.168.17.0/24*Apr 28 17:05:56:510 2021 Branch-LXZ IKE/7/EVENT: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500 Lifetime in seconds: 3600*Apr 28 17:05:56:510 2021 Branch-LXZ IKE/7/EVENT: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500 Lifetime in kilobytes: 1843200*Apr 28 17:05:56:510 2021 Branch-LXZ IKE/7/EVENT: Protocol: 50 Inbound SPI: 0x71151493 Outbound SPI: 0x1ffabbb4*Apr 28 17:05:56:510 2021 Branch-LXZ IPSEC/7/EVENT: Can not find IPsec tunnel in same flow hash table, and will create a new one.*Apr 28 17:05:56:510 2021 Branch-LXZ IPSEC/7/EVENT: IPsec tunnel successfully added in kernel.*Apr 28 17:05:56:511 2021 Branch-LXZ IPSEC/7/EVENT: SA successfully added in kernel.*Apr 28 17:05:56:511 2021 Branch-LXZ IPSEC/7/EVENT: SA successfully added in kernel.*Apr 28 17:05:56:510 2021 Branch-LXZ IPSEC/7/EVENT: Got default traffic-based lifetime settings for IPsec P2 SA when filling ISAKMP SA data: Role : Initiator. Default soft lifetime : 1509949440 bytes. Hard lifetime : 1887436800 bytes.*Apr 28 17:05:56:510 2021 Branch-LXZ IPSEC/7/EVENT: Got traffic-based lifetime settings for IPsec P2 SA when filling ISAKMP SA data: Role : Initiator. Configured soft lifetime buffer : 0 bytes. Configured global soft lifetime buffer : 0 bytes. Default soft lifetime : 1509949440 bytes. Hard lifetime after negotiation : 1887436800 bytes. Actual soft lifetime : 1509949440 bytes.*Apr 28 17:05:56:510 2021 Branch-LXZ IPSEC/7/EVENT: Added tunnel to kernel successfully.*Apr 28 17:05:56:510 2021 Branch-LXZ IPSEC/7/EVENT: Sent add tunnel message to all nodes, message type is 0x13.*Apr 28 17:05:56:510 2021 Branch-LXZ IPSEC/7/EVENT: Save IPsec Tunnel to DBM, tunnelIndex 1, refreshCnt 0, createTime 119253*Apr 28 17:05:56:511 2021 Branch-LXZ IPSEC/7/EVENT: Added an IPsec tunnel when adding ISAKMP SA: tunnel index = 1, tunnel sequence number = 3.*Apr 28 17:05:56:511 2021 Branch-LXZ IPSEC/7/EVENT: Added SA to kernel successfully.*Apr 28 17:05:56:511 2021 Branch-LXZ IPSEC/7/EVENT: Added ISAKMP SAs. Number of SAs added is 2.*Apr 28 17:05:56:511 2021 Branch-LXZ IPSEC/7/EVENT: No.1 SA index: 6, sequence number: 11.*Apr 28 17:05:56:511 2021 Branch-LXZ IPSEC/7/EVENT: No.2 SA index: 7, sequence number: 11.*Apr 28 17:05:56:511 2021 Branch-LXZ IPSEC/7/EVENT: Added SA context to IKE.*Apr 28 17:05:56:511 2021 Branch-LXZ IKE/7/EVENT: Received message from ipsec, message type is 11.*Apr 28 17:05:56:511 2021 Branch-LXZ IKE/7/EVENT: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500IPsec SA state changed from IKE_P2_STATE_SEND1 to IKE_P2_STATE_SA_CREATED.*Apr 28 17:05:56:511 2021 Branch-LXZ IKE/7/EVENT: IKE thread 1099324379824 processes a job.*Apr 28 17:05:56:512 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500Construct HASH(3) payload.*Apr 28 17:05:56:512 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500Encrypt the packet.*Apr 28 17:05:56:512 2021 Branch-LXZ IPSEC/7/EVENT: Updated outbound SA of IPsec tunnel(SA index = 6, SPI = 0x1ffabbb4).%Apr 28 17:05:56:512 2021 Branch-LXZ IPSEC/6/IPSEC_SA_ESTABLISH: IPsec SA was established.SA information:Role: initiatorLocal address: 212.222.0.22Remote address: 171.221.88.110Sour addr: 192.168.88.0/255.255.255.0 Port: 0 Protocol: IPDest addr: 192.168.17.0/255.255.255.0 Port: 0 Protocol: IPInside VPN instance: Outside VPN instance: Inbound AH SPI: 0Outbound AH SPI: 0Inbound ESP SPI: 1897206931Outbound ESP SPI: 536525748ACL number: 3020*Apr 28 17:05:56:512 2021 Branch-LXZ IPSEC/7/EVENT: Sent switch SA message to all nodes, message type is 0x1a.*Apr 28 17:05:56:512 2021 Branch-LXZ IPSEC/7/EVENT: Switch SA and delete blockflow node. SA index : 7, SA Seq : 11.Block index : 0, Block seq : 9.*Apr 28 17:05:56:512 2021 Branch-LXZ IPSEC/7/EVENT: Switched SA successfully.*Apr 28 17:05:56:512 2021 Branch-LXZ IKE/7/EVENT: Received message from ipsec, message type is 15.*Apr 28 17:05:56:513 2021 Branch-LXZ IKE/7/EVENT: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500IPsec SA state changed from IKE_P2_STATE_SA_CREATED to IKE_P2_STATE_SA_SWITCH.*Apr 28 17:05:56:513 2021 Branch-LXZ IKE/7/EVENT: IKE thread 1099324379824 processes a job.*Apr 28 17:05:56:513 2021 Branch-LXZ IKE/7/EVENT: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500IPsec SA state changed from IKE_P2_STATE_SA_SWITCH to IKE_P2_STATE_ESTABLISHED.*Apr 28 17:05:56:513 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500Sending packet to 171.221.88.110 remote port 500, local port 500.*Apr 28 17:05:56:513 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500 I-COOKIE: c0e46f144a222b28 R-COOKIE: 0c1bb9d7e5fb3808 next payload: HASH version: ISAKMP Version 1.0 exchange mode: Quick flags: ENCRYPT message ID: 43a578ab length: 60*Apr 28 17:05:56:513 2021 Branch-LXZ IKE/7/PACKET: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500Sending an IPv4 packet.*Apr 28 17:05:56:513 2021 Branch-LXZ IKE/7/EVENT: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500Sent data to socket successfully.*Apr 28 17:05:56:514 2021 Branch-LXZ IKE/7/EVENT: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500 Got time-based lifetime settings for IKE P2 SA: Role : Initiator. Configured soft lifetime buffer : 0 seconds. Hard lifetime after negotiation : 3600 seconds. Default soft lifetime : 2700 seconds. Actual soft lifetime : 2700 seconds.*Apr 28 17:05:56:514 2021 Branch-LXZ IKE/7/EVENT: vrf = 0, local = 212.222.0.22, remote = 171.221.88.110/500Add P2 SA to triple successfully.*Apr 28 17:05:56:579 2021 Branch-LXZ IPSEC/7/PACKET: FS Check : fs sequence num in IPsec fast cache is 195, current fs sequence num is 195*Apr 28 17:05:56:579 2021 Branch-LXZ IPSEC/7/PACKET: FS Check : No Change. Tunnel index = 2, Tunnel seq = 3.*Apr 28 17:05:56:579 2021 Branch-LXZ IPSEC/7/PACKET: --- Sent packet by IPsec fast forwarding ---*Apr 28 17:05:56:579 2021 Branch-LXZ IPSEC/7/PACKET: Outbound IPsec processing: src IP = 192.168.88.1, dst IP = 192.168.10.1, SPI = 131034676.*Apr 28 17:05:56:579 2021 Branch-LXZ IPSEC/7/PACKET: Outbound IPsec processing: ESP auth algorithm: SHA1, ESP encp algorithm: AES-CBC-128.*Apr 28 17:05:56:579 2021 Branch-LXZ IPSEC/7/PACKET: Packet will be sent to CCF for sync-encryption.*Apr 28 17:05:56:579 2021 Branch-LXZ IPSEC/7/PACKET: Outbound IPsec ESP processing: Encryption succeeded, anti-replay SN is 2.*Apr 28 17:05:56:579 2021 Branch-LXZ IPSEC/7/PACKET: Outbound IPsec processing: Packet encapsulated successfully.*Apr 28 17:05:56:584 2021 Branch-LXZ IPSEC/7/PACKET: --- Received IPsec packet from fast forwarding, Protocl : 50---*Apr 28 17:05:56:584 2021 Branch-LXZ IPSEC/7/PACKET: Inbound IPsec processing: src IP = 171.221.88.110, dst IP = 212.222.0.22, SPI = 2963224320.*Apr 28 17:05:56:584 2021 Branch-LXZ IPSEC/7/PACKET: Inbound IPsec processing: ESP auth algorithm: SHA1, ESP encp algorithm: AES-CBC-128.*Apr 28 17:05:56:584 2021 Branch-LXZ IPSEC/7/PACKET: Packet will be sent to CCF for sync-decryption.*Apr 28 17:05:56:584 2021 Branch-LXZ IPSEC/7/PACKET: Inbound fast IPsec ESP processing: Authentication succeeded.*Apr 28 17:05:56:584 2021 Branch-LXZ IPSEC/7/PACKET: Inbound fast IPsec ESP processing: Decryption succeeded.*Apr 28 17:05:56:584 2021 Branch-LXZ IPSEC/7/PACKET: IPsec processing: Tunnel mode.*Apr 28 17:05:56:584 2021 Branch-LXZ IPSEC/7/PACKET: Inbound IPsec processing: Sent packet back to IP forwarding.ike sa Connection-ID Remote Flag DOI ------------------------------------------------------------------ 79 171.221.88.110 RD IPsec Flags:RD--READY RL--REPLACED FD-FADING RK-REKEYdisp ipsec s*Apr 28 17:05:59:579 2021 Branch-LXZ IPSEC/7/PACKET: FS Check : fs sequence num in IPsec fast cache is 195, current fs sequence num is 195*Apr 28 17:05:59:579 2021 Branch-LXZ IPSEC/7/PACKET: FS Check : No Change. Tunnel index = 2, Tunnel seq = 3.*Apr 28 17:05:59:579 2021 Branch-LXZ IPSEC/7/PACKET: --- Sent packet by IPsec fast forwarding ---*Apr 28 17:05:59:579 2021 Branch-LXZ IPSEC/7/PACKET: Outbound IPsec processing: src IP = 192.168.88.1, dst IP = 192.168.10.1, SPI = 131034676.*Apr 28 17:05:59:579 2021 Branch-LXZ IPSEC/7/PACKET: Outbound IPsec processing: ESP auth algorithm: SHA1, ESP encp algorithm: AES-CBC-128.*Apr 28 17:05:59:579 2021 Branch-LXZ IPSEC/7/PACKET: Packet will be sent to CCF for sync-encryption.*Apr 28 17:05:59:579 2021 Branch-LXZ IPSEC/7/PACKET: Outbound IPsec ESP processing: Encryption succeeded, anti-replay SN is 3.*Apr 28 17:05:59:579 2021 Branch-LXZ IPSEC/7/PACKET: Outbound IPsec processing: Packet encapsulated successfully.*Apr 28 17:05:59:585 2021 Branch-LXZ IPSEC/7/PACKET: --- Received IPsec packet from fast forwarding, Protocl : 50---*Apr 28 17:05:59:585 2021 Branch-LXZ IPSEC/7/PACKET: Inbound IPsec processing: src IP = 171.221.88.110, dst IP = 212.222.0.22, SPI = 2963224320.*Apr 28 17:05:59:585 2021 Branch-LXZ IPSEC/7/PACKET: Inbound IPsec processing: ESP auth algorithm: SHA1, ESP encp algorithm: AES-CBC-128.*Apr 28 17:05:59:585 2021 Branch-LXZ IPSEC/7/PACKET: Packet will be sent to CCF for sync-decryption.*Apr 28 17:05:59:585 2021 Branch-LXZ IPSEC/7/PACKET: Inbound fast IPsec ESP processing: Authentication succeeded.*Apr 28 17:05:59:585 2021 Branch-LXZ IPSEC/7/PACKET: Inbound fast IPsec ESP processing: Decryption succeeded.*Apr 28 17:05:59:585 2021 Branch-LXZ IPSEC/7/PACKET: IPsec processing: Tunnel mode.*Apr 28 17:05:59:585 2021 Branch-LXZ IPSEC/7/PACKET: Inbound IPsec processing: Sent packet back to IP forwarding.a -------------------------------Interface: Dialer1------------------------------- ----------------------------- IPsec policy: 1 Sequence number: 1 Mode: ISAKMP ----------------------------- Tunnel id: 1 Encapsulation mode: tunnel Perfect Forward Secrecy: Inside VPN: Extended Sequence Numbers enable: N Traffic Flow Confidentiality enable: N Path MTU: 1420 Tunnel: local address: 212.222.0.22 remote address: 171.221.88.110 Flow: sour addr: 192.168.88.0/255.255.255.0 port: 0 protocol: ip dest addr: 192.168.17.0/255.255.255.0 port: 0 protocol: ip [Inbound ESP SAs] SPI: 1897206931 (0x71151493) Connection ID: 47244640263 Transform set: ESP-ENCRYPT-AES-CBC-128 ESP-AUTH-SHA1 SA duration (kilobytes/sec): 1843200/3600 SA remaining duration (kilobytes/sec): 1843200/3597 Max received sequence-number: 0 Anti-replay check enable: Y Anti-replay window size: 64 UDP encapsulation used for NAT traversal: N Status: Active [Outbound ESP SAs] SPI: 536525748 (0x1ffabbb4) Connection ID: 47244640262 Transform set: ESP-ENCRYPT-AES-CBC-128 ESP-AUTH-SHA1 SA duration (kilobytes/sec): 1843200/3600 SA remaining duration (kilobytes/sec): 1843200/3597 Max sent sequence-number: 0 UDP encapsulation used for NAT traversal: N Status: Active ----------------------------- IPsec policy: 1 Sequence number: 1 Mode: ISAKMP ----------------------------- Tunnel id: 2 Encapsulation mode: tunnel Perfect Forward Secrecy: Inside VPN: Extended Sequence Numbers enable: N Traffic Flow Confidentiality enable: N Path MTU: 1420 Tunnel: local address: 212.222.0.22 remote address: 171.221.88.110 Flow: sour addr: 192.168.88.0/255.255.255.0 port: 0 protocol: ip dest addr: 192.168.10.0/255.255.255.0 port: 0 protocol: ip [Inbound ESP SAs] SPI: 2963224320 (0xb09f3700) Connection ID: 38654705673 Transform set: ESP-ENCRYPT-AES-CBC-128 ESP-AUTH-SHA1 SA duration (kilobytes/sec): 1843200/3600 SA remaining duration (kilobytes/sec): 1843199/3588 Max received sequence-number: 3 Anti-replay check enable: Y Anti-replay window size: 64 UDP encapsulation used for NAT traversal: N Status: Active [Outbound ESP SAs] SPI: 131034676 (0x07cf6e34) Connection ID: 38654705672 Transform set: ESP-ENCRYPT-AES-CBC-128 ESP-AUTH-SHA1 SA duration (kilobytes/sec): 1843200/3600 SA remaining duration (kilobytes/sec): 1843199/3588 Max sent sequence-number: 3 UDP encapsulation used for NAT traversal: N Status: Active *Apr 28 17:06:02:579 2021 Branch-LXZ IPSEC/7/PACKET: FS Check : fs sequence num in IPsec fast cache is 195, current fs sequence num is 195*Apr 28 17:06:02:579 2021 Branch-LXZ IPSEC/7/PACKET: FS Check : No Change. Tunnel index = 2, Tunnel seq = 3.*Apr 28 17:06:02:579 2021 Branch-LXZ IPSEC/7/PACKET: --- Sent packet by IPsec fast forwarding ---*Apr 28 17:06:02:579 2021 Branch-LXZ IPSEC/7/PACKET: Outbound IPsec processing: src IP = 192.168.88.1, dst IP = 192.168.10.1, SPI = 131034676.*Apr 28 17:06:02:579 2021 Branch-LXZ IPSEC/7/PACKET: Outbound IPsec processing: ESP auth algorithm: SHA1, ESP encp algorithm: AES-CBC-128.*Apr 28 17:06:02:579 2021 Branch-LXZ IPSEC/7/PACKET: Packet will be sent to CCF for sync-encryption.*Apr 28 17:06:02:579 2021 Branch-LXZ IPSEC/7/PACKET: Outbound IPsec ESP processing: Encryption succeeded, anti-replay SN is 4.*Apr 28 17:06:02:579 2021 Branch-LXZ IPSEC/7/PACKET: Outbound IPsec processing: Packet encapsulated successfully.*Apr 28 17:06:02:585 2021 Branch-LXZ IPSEC/7/PACKET: --- Received IPsec packet from fast forwarding, Protocl : 50---*Apr 28 17:06:02:585 2021 Branch-LXZ IPSEC/7/PACKET: Inbound IPsec processing: src IP = 171.221.88.110, dst IP = 212.222.0.22, SPI = 2963224320.*Apr 28 17:06:02:585 2021 Branch-LXZ IPSEC/7/PACKET: Inbound IPsec processing: ESP auth algorithm: SHA1, ESP encp algorithm: AES-CBC-128.*Apr 28 17:06:02:585 2021 Branch-LXZ IPSEC/7/PACKET: Packet will be sent to CCF for sync-decryption.*Apr 28 17:06:02:585 2021 Branch-LXZ IPSEC/7/PACKET: Inbound fast IPsec ESP processing: Authentication succeeded.*Apr 28 17:06:02:585 2021 Branch-LXZ IPSEC/7/PACKET: Inbound fast IPsec ESP processing: Decryption succeeded.*Apr 28 17:06:02:585 2021 Branch-LXZ IPSEC/7/PACKET: IPsec processing: Tunnel mode.*Apr 28 17:06:02:585 2021 Branch-LXZ IPSEC/7/PACKET: Inbound IPsec processing: Sent packet back to IP forwarding.*Apr 28 17:06:05:579 2021 Branch-LXZ IPSEC/7/PACKET: FS Check : fs sequence num in IPsec fast cache is 195, current fs sequence num is 195*Apr 28 17:06:05:579 2021 Branch-LXZ IPSEC/7/PACKET: FS Check : No Change. Tunnel index = 2, Tunnel seq = 3.*Apr 28 17:06:05:579 2021 Branch-LXZ IPSEC/7/PACKET: --- Sent packet by IPsec fast forwarding ---*Apr 28 17:06:05:579 2021 Branch-LXZ IPSEC/7/PACKET: Outbound IPsec processing: src IP = 192.168.88.1, dst IP = 192.168.10.1, SPI = 131034676.*Apr 28 17:06:05:579 2021 Branch-LXZ IPSEC/7/PACKET: Outbound IPsec processing: ESP auth algorithm: SHA1, ESP encp algorithm: AES-CBC-128.*Apr 28 17:06:05:579 2021 Branch-LXZ IPSEC/7/PACKET: Packet will be sent to CCF for sync-encryption.*Apr 28 17:06:05:579 2021 Branch-LXZ IPSEC/7/PACKET: Outbound IPsec ESP processing: Encryption succeeded, anti-replay SN is 5.*Apr 28 17:06:05:579 2021 Branch-LXZ IPSEC/7/PACKET: Outbound IPsec processing: Packet encapsulated successfully.*Apr 28 17:06:05:584 2021 Branch-LXZ IPSEC/7/PACKET: --- Received IPsec packet from fast forwarding, Protocl : 50---*Apr 28 17:06:05:584 2021 Branch-LXZ IPSEC/7/PACKET: Inbound IPsec processing: src IP = 171.221.88.110, dst IP = 212.222.0.22, SPI = 2963224320.*Apr 28 17:06:05:584 2021 Branch-LXZ IPSEC/7/PACKET: Inbound IPsec processing: ESP auth algorithm: SHA1, ESP encp algorithm: AES-CBC-128.*Apr 28 17:06:05:584 2021 Branch-LXZ IPSEC/7/PACKET: Packet will be sent to CCF for sync-decryption.*Apr 28 17:06:05:584 2021 Branch-LXZ IPSEC/7/PACKET: Inbound fast IPsec ESP processing: Authentication succeeded.*Apr 28 17:06:05:584 2021 Branch-LXZ IPSEC/7/PACKET: Inbound fast IPsec ESP processing: Decryption succeeded.*Apr 28 17:06:05:584 2021 Branch-LXZ IPSEC/7/PACKET: IPsec processing: Tunnel mode.*Apr 28 17:06:05:584 2021 Branch-LXZ IPSEC/7/PACKET: Inbound IPsec processing: Sent packet back to IP forwarding.*Apr 28 17:06:06:731 2021 Branch-LXZ IPSEC/7/PACKET: --- Sent IPsec packet, pkt len : 106 ---*Apr 28 17:06:06:731 2021 Branch-LXZ IPSEC/7/PACKET: Attent to match Mqc(0), ifIndex is 134, digest is 0, no result.*Apr 28 17:06:06:731 2021 Branch-LXZ IPSEC/7/PACKET: Attent to match Mqc(1), ifIndex is 134, digest is 0, no result.*Apr 28 17:06:06:731 2021 Branch-LXZ IPSEC/7/PACKET: Last dest lip is NULL.*Apr 28 17:06:06:731 2021 Branch-LXZ IPSEC/7/PACKET: Outbound IPsec processing: src IP = 192.168.88.28, dst IP = 192.168.17.31, SPI = 536525748.*Apr 28 17:06:06:731 2021 Branch-LXZ IPSEC/7/PACKET: Alloc IPsec cache: Global fs seq : 195, Private index : 1, Private seq : 3.*Apr 28 17:06:06:731 2021 Branch-LXZ IPSEC/7/EVENT: Add ip fastforward cache : ulDirtection = 2, ifIndexOut = 135*Apr 28 17:06:06:731 2021 Branch-LXZ IPSEC/7/EVENT: Added IP fast forwarding entry.*Apr 28 17:06:06:731 2021 Branch-LXZ IPSEC/7/PACKET: Outbound IPsec processing: ESP auth algorithm: SHA1, ESP encp algorithm: AES-CBC-128.*Apr 28 17:06:06:731 2021 Branch-LXZ IPSEC/7/PACKET: Packet will be sent to CCF for sync-encryption.*Apr 28 17:06:06:731 2021 Branch-LXZ IPSEC/7/PACKET: Outbound IPsec ESP processing: Encryption succeeded, anti-replay SN is 1.*Apr 28 17:06:06:731 2021 Branch-LXZ IPSEC/7/PACKET: Outbound IPsec processing: Packet encapsulated successfully.*Apr 28 17:06:06:731 2021 Branch-LXZ IPSEC/7/EVENT: Start to fill reply cache key, SrcAddr : 212.222.0.22, DstAddr : 171.221.88.110, SPI :536525748, SrcPort : 8186, DstPort : 48052.*Apr 28 17:06:06:731 2021 Branch-LXZ IPSEC/7/EVENT: Fill output IPsec packet reply cache key.*Apr 28 17:06:06:731 2021 Branch-LXZ IPSEC/7/EVENT: Find another sa, spi : 0x71151493, SrcPort : 28949, DstPort : 5267.*Apr 28 17:06:08:579 2021 Branch-LXZ IPSEC/7/PACKET: FS Check : fs sequence num in IPsec fast cache is 195, current fs sequence num is 195*Apr 28 17:06:08:579 2021 Branch-LXZ IPSEC/7/PACKET: FS Check : No Change. Tunnel index = 2, Tunnel seq = 3.*Apr 28 17:06:08:579 2021 Branch-LXZ IPSEC/7/PACKET: --- Sent packet by IPsec fast forwarding ---*Apr 28 17:06:08:579 2021 Branch-LXZ IPSEC/7/PACKET: Outbound IPsec processing: src IP = 192.168.88.1, dst IP = 192.168.10.1, SPI = 131034676.*Apr 28 17:06:08:579 2021 Branch-LXZ IPSEC/7/PACKET: Outbound IPsec processing: ESP auth algorithm: SHA1, ESP encp algorithm: AES-CBC-128.*Apr 28 17:06:08:579 2021 Branch-LXZ IPSEC/7/PACKET: Packet will be sent to CCF for sync-encryption.*Apr 28 17:06:08:579 2021 Branch-LXZ IPSEC/7/PACKET: Outbound IPsec ESP processing: Encryption succeeded, anti-replay SN is 6.*Apr 28 17:06:08:579 2021 Branch-LXZ IPSEC/7/PACKET: Outbound IPsec processing: Packet encapsulated successfully.*Apr 28 17:06:08:585 2021 Branch-LXZ IPSEC/7/PACKET: --- Received IPsec packet from fast forwarding, Protocl : 50---*Apr 28 17:06:08:585 2021 Branch-LXZ IPSEC/7/PACKET: Inbound IPsec processing: src IP = 171.221.88.110, dst IP = 212.222.0.22, SPI = 2963224320.*Apr 28 17:06:08:585 2021 Branch-LXZ IPSEC/7/PACKET: Inbound IPsec processing: ESP auth algorithm: SHA1, ESP encp algorithm: AES-CBC-128.*Apr 28 17:06:08:585 2021 Branch-LXZ IPSEC/7/PACKET: Packet will be sent to CCF for sync-decryption.*Apr 28 17:06:08:585 2021 Branch-LXZ IPSEC/7/PACKET: Inbound fast IPsec ESP processing: Authentication succeeded.*Apr 28 17:06:08:585 2021 Branch-LXZ IPSEC/7/PACKET: Inbound fast IPsec ESP processing: Decryption succeeded.*Apr 28 17:06:08:585 2021 Branch-LXZ IPSEC/7/PACKET: IPsec processing: Tunnel mode.*Apr 28 17:06:08:585 2021 Branch-LXZ IPSEC/7/PACKET: Inbound IPsec processing: Sent packet back to IP forwarding.