Всем привет. Может сможете помочь или направить куда-нибудь) Клиенты жалуются на обрыв VPN, как правило переподключение помогало, но иногда только перезагрузка компа. ОС Windows 10, 11. За один час было 29 out of memory
МодельGiga SE (KN-2410) EAEU
Сервисный код723-653-283-165-046
Версия ОС4.1.7
[I] Nov 11 15:43:46 ipsec: 12[CFG] received proposals: ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:NULL/HMAC_SHA1_96/NO_EXT_SEQ
[I] Nov 11 15:43:46 ipsec: 12[CFG] configured proposals: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA2_256_128/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA2_256_128/NO_EXT_SEQ
[I] Nov 11 15:43:46 ipsec: 12[CFG] selected proposal: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ
[I] Nov 11 15:43:46 ipsec: 12[IKE] CHILD_SA VirtualIPServerIKE2{4934} established with SPIs cb531478_i 843647be_o and TS 0.0.0.0/0 === 172.20.8.1/32
[E] Nov 11 15:43:46 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": unable to find client "metodist5" @ "192.168.0.4" from "95.55.35.180".
[C] Nov 11 15:43:46 ndm: IpSec::Configurator: "VirtualIPServerIKE2": out of memory [0xcffe0dcc].
[I] Nov 11 15:43:47 ndm: IpSec::Netfilter: start reloading netfilter configuration...
[I] Nov 11 15:43:47 ndm: IpSec::Netfilter: netfilter configuration reloading is done.
[I] Nov 11 15:43:47 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had disassociated by STA (reason: STA is leaving or has left BSS).
[I] Nov 11 15:43:50 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had associated.
[I] Nov 11 15:43:55 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had disassociated by STA (reason: STA is leaving or has left BSS).
[I] Nov 11 15:43:57 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had associated.
[I] Nov 11 15:44:02 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had disassociated by STA (reason: STA is leaving or has left BSS).
[I] Nov 11 15:44:08 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had associated.
[I] Nov 11 15:44:08 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) set key done in WPA2/WPA2PSK.
[I] Nov 11 15:44:08 ndhcps: DHCPREQUEST received (STATE_INIT) for 172.16.1.217 from e8:2a:44:8c:f6:77.
[I] Nov 11 15:44:08 ndhcps: sending ACK of 172.16.1.217 to e8:2a:44:8c:f6:77.
[I] Nov 11 15:44:14 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had re-associated from 50:ff:20:62:07:5c.
[I] Nov 11 15:44:19 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had disassociated by STA (reason: STA is leaving or has left BSS).
[I] Nov 11 15:44:19 ipsec: 08[IKE] received MS NT5 ISAKMPOAKLEY v9 vendor ID
[I] Nov 11 15:44:19 ipsec: 08[IKE] received MS-Negotiation Discovery Capable vendor ID
[I] Nov 11 15:44:19 ipsec: 08[IKE] received Vid-Initial-Contact vendor ID
[I] Nov 11 15:44:19 ipsec: 08[IKE] 81.211.81.53 is initiating an IKE_SA
[I] Nov 11 15:44:19 ipsec: 08[CFG] received proposals: IKE:3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:3DES_CBC/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:3DES_CBC/HMAC_SHA2_384_192/PRF_HMAC_SHA2_384/MODP_1024, IKE:AES_CBC=128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_CBC=128/HMAC_SHA2_384_192/PRF_HMAC_SHA2_384/MODP_1024, IKE:AES_CBC=192/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC=192/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_CBC=192/HMAC_SHA2_384_192/PRF_HMAC_SHA2_384/MODP_1024, IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_CBC=256/HMAC_SHA2_384_192/PRF_HMAC_SHA2_384/MODP_1024, IKE:AES_GCM_16=128/PRF_HMAC_SHA1/MODP_1024, IKE:AES_GCM_16=128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_GCM_16=128/PRF_HMAC_SHA2_384/MODP_1024, IKE:AES_GCM_16=256/PRF_HMAC_SHA1/MODP_1024, IKE:AES_GCM_16=256/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_GCM_16=256/ [...]
[I] Nov 11 15:44:19 ipsec: 08[CFG] configured proposals: IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_2048, IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/ECP_384, IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/ECP_256, IKE:AES_CBC=128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC=128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_2048, IKE:AES_CBC=128/HMAC_SHA1_96/PRF_HMAC_SHA1/ECP_384, IKE:AES_CBC=128/HMAC_SHA1_96/PRF_HMAC_SHA1/ECP_256, IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_2048, IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/ECP_384, IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/ECP_256, IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_2048, IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/ECP_384, IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/ECP_256
[I] Nov 11 15:44:19 ipsec: 08[CFG] selected proposal: IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
[I] Nov 11 15:44:19 ipsec: 08[IKE] remote host is behind NAT
[I] Nov 11 15:44:20 ipsec: 12[IKE] received 73 cert requests for an unknown ca
[I] Nov 11 15:44:20 ipsec: 12[CFG] looking for peer configs matching 213.33.195.46[%any]...81.211.81.53[192.168.1.98]
[I] Nov 11 15:44:20 ipsec: 12[CFG] selected peer config 'VirtualIPServerIKE2'
[I] Nov 11 15:44:20 ipsec: 12[IKE] initiating EAP_IDENTITY method (id 0x00)
[I] Nov 11 15:44:20 ipsec: 12[IKE] peer supports MOBIKE, but disabled in config
[I] Nov 11 15:44:20 ipsec: 12[IKE] authentication of 'sakdjfwelfwe.keenetic.link' (myself) with RSA signature successful
[I] Nov 11 15:44:20 ipsec: 12[IKE] sending end entity cert "CN=sakdjfwelfwe.keenetic.link"
[I] Nov 11 15:44:20 ipsec: 12[IKE] sending issuer cert "C=US, O=Let's Encrypt, CN=R10"
[I] Nov 11 15:44:20 ipsec: 03[IKE] received EAP identity 'buh'
[I] Nov 11 15:44:20 ipsec: 03[IKE] initiating EAP_MSCHAPV2 method (id 0x69)
[I] Nov 11 15:44:20 ipsec: 14[IKE] EAP method EAP_MSCHAPV2 succeeded, MSK established
[I] Nov 11 15:44:20 ipsec: 10[IKE] authentication of '192.168.1.98' with EAP successful
[I] Nov 11 15:44:20 ipsec: 10[IKE] authentication of 'sakdjfwelfwe.keenetic.link' (myself) with EAP
[I] Nov 11 15:44:20 ipsec: 10[IKE] IKE_SA VirtualIPServerIKE2[1520] established between 213.33.195.46[sakdjfwelfwe.keenetic.link]...81.211.81.53[192.168.1.98]
[I] Nov 11 15:44:20 ipsec: 10[IKE] peer requested virtual IP %any
[I] Nov 11 15:44:20 ndm: Core::Server: started Session /var/run/ndm.core.socket.
[I] Nov 11 15:44:20 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": allocated address "172.20.8.1" for user "buh" @ "192.168.1.98" from "81.211.81.53".
[I] Nov 11 15:44:20 ndm: Core::Session: client disconnected.
[I] Nov 11 15:44:20 ipsec: 10[IKE] assigning virtual IP 172.20.8.1 to peer 'buh'
[I] Nov 11 15:44:20 ipsec: 10[IKE] peer requested virtual IP %any6
[I] Nov 11 15:44:20 ipsec: 10[IKE] no virtual IP found for %any6 requested by 'buh'
[I] Nov 11 15:44:20 ipsec: 10[CFG] received proposals: ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:NULL/HMAC_SHA1_96/NO_EXT_SEQ
[I] Nov 11 15:44:20 ipsec: 10[CFG] configured proposals: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA2_256_128/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA2_256_128/NO_EXT_SEQ
[I] Nov 11 15:44:20 ipsec: 10[CFG] selected proposal: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ
[I] Nov 11 15:44:20 ipsec: 10[IKE] CHILD_SA VirtualIPServerIKE2{4935} established with SPIs c2bd530b_i 640bbb26_o and TS 0.0.0.0/0 === 172.20.8.1/32
[W] Nov 11 15:44:20 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": crypto map is up: remote client "buh" @ "192.168.1.98" with IP "172.20.8.1" connected.
[I] Nov 11 15:44:20 ipsec: 10[CFG] scheduling RADIUS Interim-Updates every 5s
[I] Nov 11 15:44:20 ndm: IpSec::Netfilter: start reloading netfilter configuration...
[I] Nov 11 15:44:20 ndm: IpSec::Netfilter: netfilter configuration reloading is done.
[I] Nov 11 15:44:21 ipsec: 12[IKE] retransmit 1 of request with message ID 14
[I] Nov 11 15:44:22 ndhcps: DHCPINFORM received for 172.20.8.1 from 00:00:00:00:00:00.
[I] Nov 11 15:44:22 ndhcps: sending INFORM to 00:00:00:00:00:00.
[I] Nov 11 15:44:22 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had associated.
[I] Nov 11 15:44:22 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) set key done in WPA2/WPA2PSK.
[I] Nov 11 15:44:23 ndhcps: DHCPREQUEST received (STATE_INIT) for 172.16.1.217 from e8:2a:44:8c:f6:77.
[I] Nov 11 15:44:23 ndhcps: sending ACK of 172.16.1.217 to e8:2a:44:8c:f6:77.
[I] Nov 11 15:44:29 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had re-associated from 50:ff:20:62:07:5c.
[I] Nov 11 15:44:35 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had disassociated by STA (reason: STA is leaving or has left BSS).
[I] Nov 11 15:44:38 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had associated.
[I] Nov 11 15:44:38 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) set key done in WPA2/WPA2PSK.
[I] Nov 11 15:44:38 ndhcps: DHCPREQUEST received (STATE_INIT) for 172.16.1.217 from e8:2a:44:8c:f6:77.
[I] Nov 11 15:44:38 ndhcps: sending ACK of 172.16.1.217 to e8:2a:44:8c:f6:77.
[I] Nov 11 15:44:40 ndhcps: DHCPREQUEST received (STATE_INIT) for 172.16.1.217 from e8:2a:44:8c:f6:77.
[I] Nov 11 15:44:41 ndhcps: sending ACK of 172.16.1.217 to e8:2a:44:8c:f6:77.
[I] Nov 11 15:44:44 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had re-associated from 50:ff:20:62:07:5c.
[I] Nov 11 15:44:44 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had re-associated from 50:ff:20:62:07:5c.
[I] Nov 11 15:44:49 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had disassociated by STA (reason: STA is leaving or has left BSS).
[I] Nov 11 15:44:52 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had associated.
[I] Nov 11 15:44:52 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) set key done in WPA2/WPA2PSK.
[I] Nov 11 15:44:52 ndhcps: DHCPREQUEST received (STATE_INIT) for 172.16.1.217 from e8:2a:44:8c:f6:77.
[I] Nov 11 15:44:53 ipsec: 07[IKE] received DELETE for ESP CHILD_SA with SPI d57d5006
[I] Nov 11 15:44:53 ipsec: 07[IKE] closing CHILD_SA VirtualIPServerIKE2{4931} with SPIs cbf57ebb_i (289136 bytes) d57d5006_o (1228259 bytes) and TS 0.0.0.0/0 === 172.20.8.5/32
[I] Nov 11 15:44:53 ipsec: 07[IKE] sending DELETE for ESP CHILD_SA with SPI cbf57ebb
[I] Nov 11 15:44:53 ipsec: 07[IKE] CHILD_SA closed
[I] Nov 11 15:44:53 ndhcps: sending ACK of 172.16.1.217 to e8:2a:44:8c:f6:77.
[I] Nov 11 15:44:53 ndm: IpSec::Netfilter: start reloading netfilter configuration...
[I] Nov 11 15:44:53 ndm: IpSec::Netfilter: netfilter configuration reloading is done.
[I] Nov 11 15:44:59 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had re-associated from 50:ff:20:62:07:5c.
[I] Nov 11 15:45:03 ipsec: 05[CFG] received proposals: ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:NULL/HMAC_SHA1_96/NO_EXT_SEQ
[I] Nov 11 15:45:03 ipsec: 05[CFG] configured proposals: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA2_256_128/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA2_256_128/NO_EXT_SEQ
[I] Nov 11 15:45:03 ipsec: 05[CFG] selected proposal: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ
[I] Nov 11 15:45:03 ipsec: 05[IKE] CHILD_SA VirtualIPServerIKE2{4936} established with SPIs ca9477e2_i c50521e8_o and TS 0.0.0.0/0 === 172.20.8.5/32
[E] Nov 11 15:45:03 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": unable to find client "urist" @ "192.168.1.43" from "81.211.81.53".
[C] Nov 11 15:45:03 ndm: IpSec::Configurator: "VirtualIPServerIKE2": out of memory [0xcffe0dcc].
[I] Nov 11 15:45:03 ndm: IpSec::Netfilter: start reloading netfilter configuration...
[I] Nov 11 15:45:03 ndm: IpSec::Netfilter: netfilter configuration reloading is done.
[I] Nov 11 15:45:04 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had disassociated by STA (reason: STA is leaving or has left BSS).
[I] Nov 11 15:45:07 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had associated.
[I] Nov 11 15:45:12 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had disassociated by STA (reason: STA is leaving or has left BSS).
[I] Nov 11 15:45:13 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had associated.
[I] Nov 11 15:45:13 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had associated.
[I] Nov 11 15:45:18 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had disassociated by STA (reason: STA is leaving or has left BSS).
[I] Nov 11 15:45:23 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had associated.
[I] Nov 11 15:45:23 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had associated.
[I] Nov 11 15:45:24 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) set key done in WPA2/WPA2PSK.
[I] Nov 11 15:45:24 ndhcps: DHCPREQUEST received (STATE_INIT) for 172.16.1.217 from e8:2a:44:8c:f6:77.
[I] Nov 11 15:45:24 ndhcps: sending ACK of 172.16.1.217 to e8:2a:44:8c:f6:77.
[I] Nov 11 15:45:30 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had re-associated from 50:ff:20:62:07:5c.
[I] Nov 11 15:45:30 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) set key done in WPA2/WPA2PSK.
[I] Nov 11 15:45:30 ndhcps: DHCPREQUEST received (STATE_INIT) for 172.16.1.217 from e8:2a:44:8c:f6:77.
[I] Nov 11 15:45:30 ndhcps: sending ACK of 172.16.1.217 to e8:2a:44:8c:f6:77.
[I] Nov 11 15:45:34 ipsec: 06[CFG] received proposals: ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:NULL/HMAC_SHA1_96/NO_EXT_SEQ
[I] Nov 11 15:45:34 ipsec: 06[CFG] configured proposals: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA2_256_128/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA2_256_128/NO_EXT_SEQ
[I] Nov 11 15:45:34 ipsec: 06[CFG] selected proposal: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ
[I] Nov 11 15:45:34 ipsec: 06[IKE] inbound CHILD_SA VirtualIPServerIKE2{4937} established with SPIs c6c2447a_i 218b3d1e_o and TS 0.0.0.0/0 === 172.20.8.2/32
[E] Nov 11 15:45:34 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": unable to find client "urist2" @ "192.168.1.100" from "81.211.81.53".
[C] Nov 11 15:45:34 ndm: IpSec::Configurator: "VirtualIPServerIKE2": out of memory [0xcffe0dcc].
[I] Nov 11 15:45:34 ipsec: 07[IKE] received DELETE for ESP CHILD_SA with SPI f8421fd6
[I] Nov 11 15:45:34 ipsec: 07[IKE] closing CHILD_SA VirtualIPServerIKE2{4910} with SPIs cff5fd09_i (64628 bytes) f8421fd6_o (23185 bytes) and TS 0.0.0.0/0 === 172.20.8.2/32
[I] Nov 11 15:45:34 ipsec: 07[IKE] sending DELETE for ESP CHILD_SA with SPI cff5fd09
[I] Nov 11 15:45:34 ipsec: 07[IKE] CHILD_SA closed
[I] Nov 11 15:45:34 ipsec: 07[IKE] outbound CHILD_SA VirtualIPServerIKE2{4937} established with SPIs c6c2447a_i 218b3d1e_o and TS 0.0.0.0/0 === 172.20.8.2/32
[I] Nov 11 15:45:34 ndm: IpSec::Netfilter: start reloading netfilter configuration...
[I] Nov 11 15:45:34 ndm: IpSec::Netfilter: netfilter configuration reloading is done.
[I] Nov 11 15:45:36 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had re-associated from 50:ff:20:62:07:5c.
[I] Nov 11 15:45:36 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had re-associated from 50:ff:20:62:07:5c.
[I] Nov 11 15:45:41 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had disassociated by STA (reason: STA is leaving or has left BSS).
[I] Nov 11 15:45:44 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had associated.
[I] Nov 11 15:45:44 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) set key done in WPA2/WPA2PSK.
[I] Nov 11 15:45:44 ndhcps: DHCPREQUEST received (STATE_INIT) for 172.16.1.217 from e8:2a:44:8c:f6:77.
[I] Nov 11 15:45:45 ndhcps: sending ACK of 172.16.1.217 to e8:2a:44:8c:f6:77.
[I] Nov 11 15:45:52 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had re-associated from 50:ff:20:62:07:5c.
[I] Nov 11 15:45:52 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) set key done in WPA2/WPA2PSK.
[I] Nov 11 15:45:52 ndhcps: DHCPREQUEST received (STATE_INIT) for 172.16.1.217 from e8:2a:44:8c:f6:77.
[I] Nov 11 15:45:53 ndhcps: sending ACK of 172.16.1.217 to e8:2a:44:8c:f6:77.
[I] Nov 11 15:46:02 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had re-associated from 50:ff:20:62:07:5c.
[I] Nov 11 15:46:02 ndm: Core::Syslog: last message repeated 5 times.
[I] Nov 11 15:46:03 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) set key done in WPA2/WPA2PSK.
[I] Nov 11 15:46:03 ndhcps: DHCPREQUEST received (STATE_INIT) for 172.16.1.217 from e8:2a:44:8c:f6:77.
[I] Nov 11 15:46:04 ndhcps: sending ACK of 172.16.1.217 to e8:2a:44:8c:f6:77.
[I] Nov 11 15:46:08 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had re-associated from 50:ff:20:62:07:5c.
[I] Nov 11 15:46:08 ndm: Core::Syslog: last message repeated 2 times.
[I] Nov 11 15:46:13 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had disassociated by STA (reason: STA is leaving or has left BSS).
[I] Nov 11 15:46:17 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had associated.
[I] Nov 11 15:46:17 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) set key done in WPA2/WPA2PSK.
[I] Nov 11 15:46:17 ndhcps: DHCPREQUEST received (STATE_INIT) for 172.16.1.217 from e8:2a:44:8c:f6:77.
[I] Nov 11 15:46:17 ndhcps: sending ACK of 172.16.1.217 to e8:2a:44:8c:f6:77.
[I] Nov 11 15:46:24 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had re-associated from 50:ff:20:62:07:5c.
[I] Nov 11 15:46:25 ndm: Core::Syslog: last message repeated 5 times.
[I] Nov 11 15:46:26 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) set key done in WPA2/WPA2PSK.
[I] Nov 11 15:46:26 ndhcps: DHCPREQUEST received (STATE_INIT) for 172.16.1.217 from e8:2a:44:8c:f6:77.
[I] Nov 11 15:46:26 ndhcps: sending ACK of 172.16.1.217 to e8:2a:44:8c:f6:77.
[I] Nov 11 15:46:32 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had re-associated from 50:ff:20:62:07:5c.
[I] Nov 11 15:46:37 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had disassociated by STA (reason: STA is leaving or has left BSS).
[I] Nov 11 15:46:41 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had associated.
[I] Nov 11 15:46:46 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had disassociated by STA (reason: STA is leaving or has left BSS).
[I] Nov 11 15:46:47 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had associated.
[I] Nov 11 15:46:52 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had disassociated by STA (reason: STA is leaving or has left BSS).
[I] Nov 11 15:46:58 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had associated.
[I] Nov 11 15:46:58 ndhcps: DHCPREQUEST received (STATE_INIT) for 172.16.1.217 from e8:2a:44:8c:f6:77.
[I] Nov 11 15:46:58 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) set key done in WPA2/WPA2PSK.
[I] Nov 11 15:46:58 ndhcps: sending ACK of 172.16.1.217 to e8:2a:44:8c:f6:77.
[I] Nov 11 15:47:04 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had re-associated from 50:ff:20:62:07:5c.
[I] Nov 11 15:47:04 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had re-associated from 50:ff:20:62:07:5c.
[I] Nov 11 15:47:09 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had disassociated by STA (reason: STA is leaving or has left BSS).
[I] Nov 11 15:47:12 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had associated.
[I] Nov 11 15:47:17 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had disassociated by STA (reason: STA is leaving or has left BSS).
[I] Nov 11 15:47:18 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had associated.
[I] Nov 11 15:47:23 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had disassociated by STA (reason: STA is leaving or has left BSS).
[I] Nov 11 15:47:30 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had associated.
[I] Nov 11 15:47:30 ndm: Core::Syslog: last message repeated 2 times.
[I] Nov 11 15:47:31 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) set key done in WPA2/WPA2PSK.
[I] Nov 11 15:47:31 ndhcps: DHCPREQUEST received (STATE_INIT) for 172.16.1.217 from e8:2a:44:8c:f6:77.
[I] Nov 11 15:47:31 ndhcps: sending ACK of 172.16.1.217 to e8:2a:44:8c:f6:77.
[I] Nov 11 15:47:37 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had re-associated from 50:ff:20:62:07:5c.
[I] Nov 11 15:47:37 ndm: Core::Syslog: last message repeated 2 times.
[I] Nov 11 15:47:42 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had disassociated by STA (reason: STA is leaving or has left BSS).
[I] Nov 11 15:47:45 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had associated.
[I] Nov 11 15:47:45 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) set key done in WPA2/WPA2PSK.
[I] Nov 11 15:47:45 ndhcps: DHCPREQUEST received (STATE_INIT) for 172.16.1.217 from e8:2a:44:8c:f6:77.
[I] Nov 11 15:47:45 ndhcps: sending ACK of 172.16.1.217 to e8:2a:44:8c:f6:77.
[I] Nov 11 15:47:51 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had re-associated from 50:ff:20:62:07:5c.
[I] Nov 11 15:47:56 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had disassociated by STA (reason: STA is leaving or has left BSS).
[I] Nov 11 15:47:59 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had associated.
[I] Nov 11 15:48:04 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had disassociated by STA (reason: STA is leaving or has left BSS).
[I] Nov 11 15:48:05 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had associated.
[I] Nov 11 15:48:05 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had associated.
[I] Nov 11 15:48:10 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had disassociated by STA (reason: STA is leaving or has left BSS).
[I] Nov 11 15:48:16 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had associated.
[I] Nov 11 15:48:16 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) set key done in WPA2/WPA2PSK.
[I] Nov 11 15:48:16 ndhcps: DHCPREQUEST received (STATE_INIT) for 172.16.1.217 from e8:2a:44:8c:f6:77.
[I] Nov 11 15:48:17 ndhcps: sending ACK of 172.16.1.217 to e8:2a:44:8c:f6:77.
[I] Nov 11 15:48:22 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had re-associated from 50:ff:20:62:07:5c.
[I] Nov 11 15:48:22 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) set key done in WPA2/WPA2PSK.
[I] Nov 11 15:48:22 ndhcps: DHCPREQUEST received (STATE_INIT) for 172.16.1.217 from e8:2a:44:8c:f6:77.
[I] Nov 11 15:48:23 ndhcps: sending ACK of 172.16.1.217 to e8:2a:44:8c:f6:77.
[I] Nov 11 15:48:26 ipsec: 08[IKE] received DELETE for ESP CHILD_SA with SPI d6426d2e
[I] Nov 11 15:48:26 ipsec: 08[IKE] closing CHILD_SA VirtualIPServerIKE2{4932} with SPIs cc2c7542_i (17587 bytes) d6426d2e_o (2137 bytes) and TS 0.0.0.0/0 === 172.20.8.1/32
[I] Nov 11 15:48:26 ipsec: 08[IKE] sending DELETE for ESP CHILD_SA with SPI cc2c7542
[I] Nov 11 15:48:26 ipsec: 08[IKE] CHILD_SA closed
[I] Nov 11 15:48:26 ndm: IpSec::Netfilter: start reloading netfilter configuration...
[I] Nov 11 15:48:26 ndm: IpSec::Netfilter: netfilter configuration reloading is done.
[I] Nov 11 15:48:28 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had re-associated from 50:ff:20:62:07:5c.
[I] Nov 11 15:48:28 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) set key done in WPA2/WPA2PSK.
[I] Nov 11 15:48:28 ndhcps: DHCPREQUEST received (STATE_INIT) for 172.16.1.217 from e8:2a:44:8c:f6:77.
[I] Nov 11 15:48:29 ndhcps: sending ACK of 172.16.1.217 to e8:2a:44:8c:f6:77.
[I] Nov 11 15:48:29 ipsec: 07[CFG] received proposals: ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:NULL/HMAC_SHA1_96/NO_EXT_SEQ
[I] Nov 11 15:48:29 ipsec: 07[CFG] configured proposals: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA2_256_128/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA2_256_128/NO_EXT_SEQ
[I] Nov 11 15:48:29 ipsec: 07[CFG] selected proposal: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ
[I] Nov 11 15:48:29 ipsec: 07[IKE] CHILD_SA VirtualIPServerIKE2{4938} established with SPIs c1740e0a_i 04231192_o and TS 0.0.0.0/0 === 172.20.8.1/32
[E] Nov 11 15:48:29 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": unable to find client "metodist" @ "192.168.1.149" from "188.64.164.33".
[C] Nov 11 15:48:29 ndm: IpSec::Configurator: "VirtualIPServerIKE2": out of memory [0xcffe0dcc].
[I] Nov 11 15:48:29 ndm: IpSec::Netfilter: start reloading netfilter configuration...
[I] Nov 11 15:48:29 ndm: IpSec::Netfilter: netfilter configuration reloading is done.
[I] Nov 11 15:48:34 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had re-associated from 50:ff:20:62:07:5c.
[I] Nov 11 15:48:34 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had re-associated from 50:ff:20:62:07:5c.
[I] Nov 11 15:48:34 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) set key done in WPA2/WPA2PSK.
[I] Nov 11 15:48:35 ndhcps: DHCPREQUEST received (STATE_INIT) for 172.16.1.217 from e8:2a:44:8c:f6:77.
[I] Nov 11 15:48:35 ndhcps: sending ACK of 172.16.1.217 to e8:2a:44:8c:f6:77.
[I] Nov 11 15:48:40 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had re-associated from 50:ff:20:62:07:5c.
[I] Nov 11 15:48:45 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had disassociated by STA (reason: STA is leaving or has left BSS).
[I] Nov 11 15:48:49 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had associated.
[I] Nov 11 15:48:49 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) set key done in WPA2/WPA2PSK.
[I] Nov 11 15:48:49 ndhcps: DHCPREQUEST received (STATE_INIT) for 172.16.1.217 from e8:2a:44:8c:f6:77.
[I] Nov 11 15:48:49 ndhcps: sending ACK of 172.16.1.217 to e8:2a:44:8c:f6:77.
[I] Nov 11 15:48:54 ipsec: 14[IKE] received DELETE for ESP CHILD_SA with SPI 843647be
[I] Nov 11 15:48:54 ipsec: 14[IKE] closing CHILD_SA VirtualIPServerIKE2{4934} with SPIs cb531478_i (10213 bytes) 843647be_o (170 bytes) and TS 0.0.0.0/0 === 172.20.8.1/32
[I] Nov 11 15:48:54 ipsec: 14[IKE] sending DELETE for ESP CHILD_SA with SPI cb531478
[I] Nov 11 15:48:54 ipsec: 14[IKE] CHILD_SA closed
[I] Nov 11 15:48:54 ndm: IpSec::Netfilter: start reloading netfilter configuration...
[I] Nov 11 15:48:54 ndm: IpSec::Netfilter: netfilter configuration reloading is done.
[I] Nov 11 15:48:55 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had re-associated from 50:ff:20:62:07:5c.
[I] Nov 11 15:48:55 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) set key done in WPA2/WPA2PSK.
[I] Nov 11 15:48:55 ndhcps: DHCPREQUEST received (STATE_INIT) for 172.16.1.217 from e8:2a:44:8c:f6:77.
[I] Nov 11 15:48:55 ndhcps: sending ACK of 172.16.1.217 to e8:2a:44:8c:f6:77.
[I] Nov 11 15:49:01 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had re-associated from 50:ff:20:62:07:5c.
[I] Nov 11 15:49:06 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had disassociated by STA (reason: STA is leaving or has left BSS).
[I] Nov 11 15:49:08 ipsec: 07[CFG] received proposals: ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:NULL/HMAC_SHA1_96/NO_EXT_SEQ
[I] Nov 11 15:49:08 ipsec: 07[CFG] configured proposals: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA2_256_128/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA2_256_128/NO_EXT_SEQ
[I] Nov 11 15:49:08 ipsec: 07[CFG] selected proposal: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ
[I] Nov 11 15:49:08 ipsec: 07[IKE] CHILD_SA VirtualIPServerIKE2{4939} established with SPIs cda7bdf0_i 21105fb4_o and TS 0.0.0.0/0 === 172.20.8.1/32
[E] Nov 11 15:49:08 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": unable to find client "metodist5" @ "192.168.0.4" from "95.55.35.180".
[C] Nov 11 15:49:08 ndm: IpSec::Configurator: "VirtualIPServerIKE2": out of memory [0xcffe0dcc].
[I] Nov 11 15:49:08 ndm: IpSec::Netfilter: start reloading netfilter configuration...
[I] Nov 11 15:49:08 ndm: IpSec::Netfilter: netfilter configuration reloading is done.
[I] Nov 11 15:49:10 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had associated.
[I] Nov 11 15:49:15 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had disassociated by STA (reason: STA is leaving or has left BSS).
[I] Nov 11 15:49:15 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had associated.
[I] Nov 11 15:49:20 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had disassociated by STA (reason: STA is leaving or has left BSS).
[I] Nov 11 15:49:26 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had associated.
[I] Nov 11 15:49:26 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) set key done in WPA2/WPA2PSK.
[I] Nov 11 15:49:27 ndhcps: DHCPREQUEST received (STATE_INIT) for 172.16.1.217 from e8:2a:44:8c:f6:77.
[I] Nov 11 15:49:27 ndhcps: sending ACK of 172.16.1.217 to e8:2a:44:8c:f6:77.
[I] Nov 11 15:49:32 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had re-associated from 50:ff:20:62:07:5c.
[I] Nov 11 15:49:33 ndm: Core::Syslog: last message repeated 4 times.
[I] Nov 11 15:49:34 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) set key done in WPA2/WPA2PSK.
[I] Nov 11 15:49:34 ndhcps: DHCPREQUEST received (STATE_INIT) for 172.16.1.217 from e8:2a:44:8c:f6:77.
[I] Nov 11 15:49:34 ndhcps: sending ACK of 172.16.1.217 to e8:2a:44:8c:f6:77.
[I] Nov 11 15:49:40 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had re-associated from 50:ff:20:62:07:5c.
[I] Nov 11 15:49:40 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) set key done in WPA2/WPA2PSK.
[I] Nov 11 15:49:40 ndhcps: DHCPREQUEST received (STATE_INIT) for 172.16.1.217 from e8:2a:44:8c:f6:77.
[I] Nov 11 15:49:40 ndhcps: sending ACK of 172.16.1.217 to e8:2a:44:8c:f6:77.
[I] Nov 11 15:49:46 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had re-associated from 50:ff:20:62:07:5c.
[I] Nov 11 15:49:46 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) set key done in WPA2/WPA2PSK.
[I] Nov 11 15:49:46 ndhcps: DHCPREQUEST received (STATE_INIT) for 172.16.1.217 from e8:2a:44:8c:f6:77.
[I] Nov 11 15:49:46 ndhcps: sending ACK of 172.16.1.217 to e8:2a:44:8c:f6:77.
[I] Nov 11 15:49:52 ipsec: 14[IKE] received DELETE for ESP CHILD_SA with SPI 7e7fb176
[I] Nov 11 15:49:52 ipsec: 14[IKE] closing CHILD_SA VirtualIPServerIKE2{4933} with SPIs cfdac811_i (147104 bytes) 7e7fb176_o (511055 bytes) and TS 0.0.0.0/0 === 172.20.8.5/32
[I] Nov 11 15:49:52 ipsec: 14[IKE] sending DELETE for ESP CHILD_SA with SPI cfdac811
[I] Nov 11 15:49:52 ipsec: 14[IKE] CHILD_SA closed
[I] Nov 11 15:49:53 ndm: IpSec::Netfilter: start reloading netfilter configuration...
[I] Nov 11 15:49:53 ndm: IpSec::Netfilter: netfilter configuration reloading is done.
[I] Nov 11 15:49:53 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had re-associated from 50:ff:20:62:07:5c.
[I] Nov 11 15:49:53 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had re-associated from 50:ff:20:62:07:5c.
[I] Nov 11 15:49:53 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) set key done in WPA2/WPA2PSK.
[I] Nov 11 15:49:53 ndhcps: DHCPREQUEST received (STATE_INIT) for 172.16.1.217 from e8:2a:44:8c:f6:77.
[I] Nov 11 15:49:53 ndhcps: sending ACK of 172.16.1.217 to e8:2a:44:8c:f6:77.
[I] Nov 11 15:49:56 ipsec: 06[CFG] received proposals: ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:NULL/HMAC_SHA1_96/NO_EXT_SEQ
[I] Nov 11 15:49:56 ipsec: 06[CFG] configured proposals: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA2_256_128/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA2_256_128/NO_EXT_SEQ
[I] Nov 11 15:49:56 ipsec: 06[CFG] selected proposal: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ
[I] Nov 11 15:49:56 ipsec: 06[IKE] CHILD_SA VirtualIPServerIKE2{4940} established with SPIs cffd2a8c_i ed21425c_o and TS 0.0.0.0/0 === 172.20.8.5/32
[E] Nov 11 15:49:56 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": unable to find client "urist3" @ "192.168.1.75" from "81.211.81.53".
[C] Nov 11 15:49:56 ndm: IpSec::Configurator: "VirtualIPServerIKE2": out of memory [0xcffe0dcc].
[I] Nov 11 15:49:56 ndm: IpSec::Netfilter: start reloading netfilter configuration...
[I] Nov 11 15:49:56 ndm: IpSec::Netfilter: netfilter configuration reloading is done.
[I] Nov 11 15:49:59 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had re-associated from 50:ff:20:62:07:5c.
[I] Nov 11 15:50:04 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had disassociated by STA (reason: STA is leaving or has left BSS).
[I] Nov 11 15:50:11 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had associated.
[I] Nov 11 15:50:11 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) set key done in WPA2/WPA2PSK.
[I] Nov 11 15:50:11 ndhcps: DHCPREQUEST received (STATE_INIT) for 172.16.1.217 from e8:2a:44:8c:f6:77.
[I] Nov 11 15:50:11 ndhcps: sending ACK of 172.16.1.217 to e8:2a:44:8c:f6:77.
[I] Nov 11 15:52:25 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster1/AccessPoint0": STA(52:eb:a4:8d:5e:55) had been aged-out and disassociated (idle silence).
[I] Nov 11 15:53:28 ipsec: 10[IKE] received DELETE for ESP CHILD_SA with SPI 640bbb26
[I] Nov 11 15:53:28 ipsec: 10[IKE] closing CHILD_SA VirtualIPServerIKE2{4935} with SPIs c2bd530b_i (80059 bytes) 640bbb26_o (78360 bytes) and TS 0.0.0.0/0 === 172.20.8.1/32
[I] Nov 11 15:53:28 ipsec: 10[IKE] sending DELETE for ESP CHILD_SA with SPI c2bd530b
[I] Nov 11 15:53:28 ipsec: 10[IKE] CHILD_SA closed
[I] Nov 11 15:53:28 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": active CHILD SAs for user "buh".
[W] Nov 11 15:53:28 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": crypto map remote client "buh" @ "192.168.1.98" from "81.211.81.53" disconnected.
[I] Nov 11 15:53:28 ndm: IpSec::Netfilter: start reloading netfilter configuration...
[I] Nov 11 15:53:28 ndm: IpSec::Netfilter: netfilter configuration reloading is done.
[I] Nov 11 15:53:30 ipsec: 06[IKE] received DELETE for ESP CHILD_SA with SPI 04231192
[I] Nov 11 15:53:30 ipsec: 06[IKE] closing CHILD_SA VirtualIPServerIKE2{4938} with SPIs c1740e0a_i (22866 bytes) 04231192_o (125 bytes) and TS 0.0.0.0/0 === 172.20.8.1/32
[I] Nov 11 15:53:30 ipsec: 06[IKE] sending DELETE for ESP CHILD_SA with SPI c1740e0a
[I] Nov 11 15:53:30 ipsec: 06[IKE] CHILD_SA closed
[I] Nov 11 15:53:30 ndm: IpSec::Netfilter: start reloading netfilter configuration...
[I] Nov 11 15:53:30 ndm: IpSec::Netfilter: netfilter configuration reloading is done.
[I] Nov 11 15:53:31 ipsec: 07[CFG] received proposals: ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:NULL/HMAC_SHA1_96/NO_EXT_SEQ
[I] Nov 11 15:53:31 ipsec: 07[CFG] configured proposals: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA2_256_128/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA2_256_128/NO_EXT_SEQ
[I] Nov 11 15:53:31 ipsec: 07[CFG] selected proposal: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ
[I] Nov 11 15:53:31 ipsec: 07[IKE] CHILD_SA VirtualIPServerIKE2{4941} established with SPIs c4096ac8_i cc6741d6_o and TS 0.0.0.0/0 === 172.20.8.1/32
[E] Nov 11 15:53:31 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": unable to find client "metodist" @ "192.168.1.149" from "188.64.164.33".
[C] Nov 11 15:53:31 ndm: IpSec::Configurator: "VirtualIPServerIKE2": out of memory [0xcffe0dcc].
[I] Nov 11 15:53:31 ndm: IpSec::Netfilter: start reloading netfilter configuration...
[I] Nov 11 15:53:31 ndm: IpSec::Netfilter: netfilter configuration reloading is done.
[I] Nov 11 15:53:33 ipsec: 11[CFG] received proposals: ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:NULL/HMAC_SHA1_96/NO_EXT_SEQ
[I] Nov 11 15:53:33 ipsec: 11[CFG] configured proposals: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA2_256_128/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA2_256_128/NO_EXT_SEQ
[I] Nov 11 15:53:33 ipsec: 11[CFG] selected proposal: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ
[I] Nov 11 15:53:33 ipsec: 11[IKE] CHILD_SA VirtualIPServerIKE2{4942} established with SPIs c02510b9_i ac92dcca_o and TS 0.0.0.0/0 === 172.20.8.1/32
[I] Nov 11 15:53:33 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": active CHILD SAs for user "buh".
[I] Nov 11 15:53:33 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": "0" = "3223654585".
[I] Nov 11 15:53:33 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": "1" = "2895305930".
[W] Nov 11 15:53:33 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": crypto map is up: remote client "buh" @ "192.168.1.98" with IP "172.20.8.1" connected.
[I] Nov 11 15:53:33 ndm: IpSec::Netfilter: start reloading netfilter configuration...
[I] Nov 11 15:53:33 ndm: IpSec::Netfilter: netfilter configuration reloading is done.
[I] Nov 11 15:54:54 ipsec: 13[IKE] received DELETE for ESP CHILD_SA with SPI c50521e8
[I] Nov 11 15:54:54 ipsec: 13[IKE] closing CHILD_SA VirtualIPServerIKE2{4936} with SPIs ca9477e2_i (394580 bytes) c50521e8_o (1449747 bytes) and TS 0.0.0.0/0 === 172.20.8.5/32
[I] Nov 11 15:54:54 ipsec: 13[IKE] sending DELETE for ESP CHILD_SA with SPI ca9477e2
[I] Nov 11 15:54:54 ipsec: 13[IKE] CHILD_SA closed
[I] Nov 11 15:54:55 ndm: IpSec::Netfilter: start reloading netfilter configuration...
[I] Nov 11 15:54:55 ndm: IpSec::Netfilter: netfilter configuration reloading is done.
[I] Nov 11 15:55:03 ipsec: 11[CFG] received proposals: ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:NULL/HMAC_SHA1_96/NO_EXT_SEQ
[I] Nov 11 15:55:03 ipsec: 11[CFG] configured proposals: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA2_256_128/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA2_256_128/NO_EXT_SEQ
[I] Nov 11 15:55:03 ipsec: 11[CFG] selected proposal: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ
[I] Nov 11 15:55:03 ipsec: 11[IKE] CHILD_SA VirtualIPServerIKE2{4943} established with SPIs ceb06920_i 256efb8c_o and TS 0.0.0.0/0 === 172.20.8.5/32
[E] Nov 11 15:55:03 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": unable to find client "urist" @ "192.168.1.43" from "81.211.81.53".
[C] Nov 11 15:55:03 ndm: IpSec::Configurator: "VirtualIPServerIKE2": out of memory [0xcffe0dcc].
[I] Nov 11 15:55:03 ndm: IpSec::Netfilter: start reloading netfilter configuration...
[I] Nov 11 15:55:03 ndm: IpSec::Netfilter: netfilter configuration reloading is done.
[I] Nov 11 15:55:50 ipsec: 11[IKE] received retransmit of request with ID 19, retransmitting response
[I] Nov 11 15:58:06 ipsec: 06[IKE] received DELETE for ESP CHILD_SA with SPI 21105fb4
[I] Nov 11 15:58:06 ipsec: 06[IKE] closing CHILD_SA VirtualIPServerIKE2{4939} with SPIs cda7bdf0_i (22956 bytes) 21105fb4_o (4164 bytes) and TS 0.0.0.0/0 === 172.20.8.1/32
[I] Nov 11 15:58:06 ipsec: 06[IKE] sending DELETE for ESP CHILD_SA with SPI cda7bdf0
[I] Nov 11 15:58:06 ipsec: 06[IKE] CHILD_SA closed
[I] Nov 11 15:58:06 ndm: IpSec::Netfilter: start reloading netfilter configuration...
[I] Nov 11 15:58:07 ndm: IpSec::Netfilter: netfilter configuration reloading is done.
[I] Nov 11 15:58:14 ipsec: 13[CFG] received proposals: ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:NULL/HMAC_SHA1_96/NO_EXT_SEQ
[I] Nov 11 15:58:14 ipsec: 13[CFG] configured proposals: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA2_256_128/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA2_256_128/NO_EXT_SEQ
[I] Nov 11 15:58:14 ipsec: 13[CFG] selected proposal: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ
[I] Nov 11 15:58:14 ipsec: 13[IKE] CHILD_SA VirtualIPServerIKE2{4944} established with SPIs cd7db2f2_i 76a60e46_o and TS 0.0.0.0/0 === 172.20.8.1/32
[E] Nov 11 15:58:14 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": unable to find client "metodist5" @ "192.168.0.4" from "95.55.35.180".
[C] Nov 11 15:58:14 ndm: IpSec::Configurator: "VirtualIPServerIKE2": out of memory [0xcffe0dcc].
[I] Nov 11 15:58:15 ndm: IpSec::Netfilter: start reloading netfilter configuration...
[I] Nov 11 15:58:15 ndm: IpSec::Netfilter: netfilter configuration reloading is done.
[I] Nov 11 15:58:33 ipsec: 09[IKE] received DELETE for ESP CHILD_SA with SPI cc6741d6
[I] Nov 11 15:58:33 ipsec: 09[IKE] closing CHILD_SA VirtualIPServerIKE2{4941} with SPIs c4096ac8_i (17522 bytes) cc6741d6_o (305 bytes) and TS 0.0.0.0/0 === 172.20.8.1/32
[I] Nov 11 15:58:33 ipsec: 09[IKE] sending DELETE for ESP CHILD_SA with SPI c4096ac8
[I] Nov 11 15:58:33 ipsec: 09[IKE] CHILD_SA closed
[I] Nov 11 15:58:33 ndm: IpSec::Netfilter: start reloading netfilter configuration...
[I] Nov 11 15:58:33 ndm: IpSec::Netfilter: netfilter configuration reloading is done.
[I] Nov 11 15:58:34 ipsec: 15[CFG] received proposals: ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:NULL/HMAC_SHA1_96/NO_EXT_SEQ
[I] Nov 11 15:58:34 ipsec: 15[CFG] configured proposals: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA2_256_128/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA2_256_128/NO_EXT_SEQ
[I] Nov 11 15:58:34 ipsec: 15[CFG] selected proposal: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ
[I] Nov 11 15:58:34 ipsec: 15[IKE] CHILD_SA VirtualIPServerIKE2{4945} established with SPIs ce5635ef_i 64b33500_o and TS 0.0.0.0/0 === 172.20.8.1/32
[E] Nov 11 15:58:34 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": unable to find client "metodist" @ "192.168.1.149" from "188.64.164.33".
[C] Nov 11 15:58:34 ndm: IpSec::Configurator: "VirtualIPServerIKE2": out of memory [0xcffe0dcc].
[I] Nov 11 15:58:34 ndm: IpSec::Netfilter: start reloading netfilter configuration...
[I] Nov 11 15:58:34 ndm: IpSec::Netfilter: netfilter configuration reloading is done.
[I] Nov 11 15:59:57 ipsec: 06[IKE] received DELETE for ESP CHILD_SA with SPI ed21425c
[I] Nov 11 15:59:57 ipsec: 06[IKE] closing CHILD_SA VirtualIPServerIKE2{4940} with SPIs cffd2a8c_i (41828 bytes) ed21425c_o (20953 bytes) and TS 0.0.0.0/0 === 172.20.8.5/32
[I] Nov 11 15:59:57 ipsec: 06[IKE] sending DELETE for ESP CHILD_SA with SPI cffd2a8c
[I] Nov 11 15:59:57 ipsec: 06[IKE] CHILD_SA closed
[I] Nov 11 15:59:57 ndm: IpSec::Netfilter: start reloading netfilter configuration...
[I] Nov 11 15:59:57 ndm: IpSec::Netfilter: netfilter configuration reloading is done.
[I] Nov 11 16:00:00 ipsec: 06[CFG] received proposals: ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:NULL/HMAC_SHA1_96/NO_EXT_SEQ
[I] Nov 11 16:00:00 ipsec: 06[CFG] configured proposals: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA2_256_128/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA2_256_128/NO_EXT_SEQ
[I] Nov 11 16:00:00 ipsec: 06[CFG] selected proposal: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ
[I] Nov 11 16:00:00 ipsec: 06[IKE] CHILD_SA VirtualIPServerIKE2{4946} established with SPIs c25e54e2_i 44a0130a_o and TS 0.0.0.0/0 === 172.20.8.5/32
[E] Nov 11 16:00:01 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": unable to find client "urist3" @ "192.168.1.75" from "81.211.81.53".
[C] Nov 11 16:00:01 ndm: IpSec::Configurator: "VirtualIPServerIKE2": out of memory [0xcffe0dcc].
[I] Nov 11 16:00:01 ndm: IpSec::Netfilter: start reloading netfilter configuration...
[I] Nov 11 16:00:01 ndm: IpSec::Netfilter: netfilter configuration reloading is done.
[I] Nov 11 16:01:30 ndhcps: DHCPREQUEST received (STATE_RENEWING) for 172.16.1.215 from 3c:a6:f6:70:85:3f.
[I] Nov 11 16:01:30 ndhcps: sending ACK of 172.16.1.215 to 3c:a6:f6:70:85:3f.
[I] Nov 11 16:01:45 ipsec: 10[IKE] received DELETE for ESP CHILD_SA with SPI 256efb8c
[I] Nov 11 16:01:45 ipsec: 10[IKE] closing CHILD_SA VirtualIPServerIKE2{4943} with SPIs ceb06920_i (538173 bytes) 256efb8c_o (1818325 bytes) and TS 0.0.0.0/0 === 172.20.8.5/32
[I] Nov 11 16:01:45 ipsec: 10[IKE] sending DELETE for ESP CHILD_SA with SPI ceb06920
[I] Nov 11 16:01:45 ipsec: 10[IKE] CHILD_SA closed
[I] Nov 11 16:01:45 ipsec: 13[IKE] received DELETE for IKE_SA VirtualIPServerIKE2[1518]
[I] Nov 11 16:01:45 ipsec: 13[IKE] deleting IKE_SA VirtualIPServerIKE2[1518] between 213.33.195.46[sakdjfwelfwe.keenetic.link]...81.211.81.53[192.168.1.43]
[I] Nov 11 16:01:45 ipsec: 13[IKE] IKE_SA deleted
[I] Nov 11 16:01:45 ndm: IpSec::Netfilter: start reloading netfilter configuration...
[I] Nov 11 16:01:45 ndm: IpSec::Netfilter: netfilter configuration reloading is done.
[I] Nov 11 16:01:48 ipsec: 09[IKE] received MS NT5 ISAKMPOAKLEY v9 vendor ID
[I] Nov 11 16:01:48 ipsec: 09[IKE] received MS-Negotiation Discovery Capable vendor ID
[I] Nov 11 16:01:48 ipsec: 09[IKE] received Vid-Initial-Contact vendor ID
[I] Nov 11 16:01:48 ipsec: 09[IKE] 81.211.81.53 is initiating an IKE_SA
[I] Nov 11 16:01:48 ipsec: 09[CFG] received proposals: IKE:3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:3DES_CBC/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:3DES_CBC/HMAC_SHA2_384_192/PRF_HMAC_SHA2_384/MODP_1024, IKE:AES_CBC=128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_CBC=128/HMAC_SHA2_384_192/PRF_HMAC_SHA2_384/MODP_1024, IKE:AES_CBC=192/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC=192/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_CBC=192/HMAC_SHA2_384_192/PRF_HMAC_SHA2_384/MODP_1024, IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_CBC=256/HMAC_SHA2_384_192/PRF_HMAC_SHA2_384/MODP_1024, IKE:AES_GCM_16=128/PRF_HMAC_SHA1/MODP_1024, IKE:AES_GCM_16=128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_GCM_16=128/PRF_HMAC_SHA2_384/MODP_1024, IKE:AES_GCM_16=256/PRF_HMAC_SHA1/MODP_1024, IKE:AES_GCM_16=256/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_GCM_16=256/ [...]
[I] Nov 11 16:01:48 ipsec: 09[CFG] configured proposals: IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_2048, IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/ECP_384, IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/ECP_256, IKE:AES_CBC=128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC=128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_2048, IKE:AES_CBC=128/HMAC_SHA1_96/PRF_HMAC_SHA1/ECP_384, IKE:AES_CBC=128/HMAC_SHA1_96/PRF_HMAC_SHA1/ECP_256, IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_2048, IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/ECP_384, IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/ECP_256, IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_2048, IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/ECP_384, IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/ECP_256
[I] Nov 11 16:01:48 ipsec: 09[CFG] selected proposal: IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
[I] Nov 11 16:01:48 ipsec: 09[IKE] remote host is behind NAT
[I] Nov 11 16:01:48 ipsec: 11[IKE] received 80 cert requests for an unknown ca
[I] Nov 11 16:01:48 ipsec: 11[CFG] looking for peer configs matching 213.33.195.46[%any]...81.211.81.53[192.168.1.43]
[I] Nov 11 16:01:48 ipsec: 11[CFG] selected peer config 'VirtualIPServerIKE2'
[I] Nov 11 16:01:48 ipsec: 11[IKE] initiating EAP_IDENTITY method (id 0x00)
[I] Nov 11 16:01:48 ipsec: 11[IKE] peer supports MOBIKE, but disabled in config
[I] Nov 11 16:01:48 ipsec: 11[IKE] authentication of 'sakdjfwelfwe.keenetic.link' (myself) with RSA signature successful
[I] Nov 11 16:01:48 ipsec: 11[IKE] sending end entity cert "CN=sakdjfwelfwe.keenetic.link"
[I] Nov 11 16:01:48 ipsec: 11[IKE] sending issuer cert "C=US, O=Let's Encrypt, CN=R10"
[I] Nov 11 16:01:48 ipsec: 10[IKE] received EAP identity 'urist'
[I] Nov 11 16:01:48 ipsec: 10[IKE] initiating EAP_MSCHAPV2 method (id 0xBA)
[I] Nov 11 16:01:48 ipsec: 11[IKE] EAP method EAP_MSCHAPV2 succeeded, MSK established
[I] Nov 11 16:01:48 ipsec: 15[IKE] authentication of '192.168.1.43' with EAP successful
[I] Nov 11 16:01:48 ipsec: 15[IKE] authentication of 'sakdjfwelfwe.keenetic.link' (myself) with EAP
[I] Nov 11 16:01:48 ipsec: 15[IKE] IKE_SA VirtualIPServerIKE2[1521] established between 213.33.195.46[sakdjfwelfwe.keenetic.link]...81.211.81.53[192.168.1.43]
[I] Nov 11 16:01:48 ipsec: 15[IKE] peer requested virtual IP %any
[I] Nov 11 16:01:48 ndm: Core::Server: started Session /var/run/ndm.core.socket.
[I] Nov 11 16:01:48 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": allocated address "172.20.8.2" for user "urist" @ "192.168.1.43" from "81.211.81.53".
[I] Nov 11 16:01:48 ipsec: 15[IKE] assigning virtual IP 172.20.8.2 to peer 'urist'
[I] Nov 11 16:01:48 ipsec: 15[IKE] peer requested virtual IP %any6
[I] Nov 11 16:01:48 ipsec: 15[IKE] no virtual IP found for %any6 requested by 'urist'
[I] Nov 11 16:01:48 ndm: Core::Session: client disconnected.
[I] Nov 11 16:01:48 ipsec: 15[CFG] received proposals: ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:NULL/HMAC_SHA1_96/NO_EXT_SEQ
[I] Nov 11 16:01:48 ipsec: 15[CFG] configured proposals: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA2_256_128/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA2_256_128/NO_EXT_SEQ
[I] Nov 11 16:01:48 ipsec: 15[CFG] selected proposal: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ
[I] Nov 11 16:01:48 ipsec: 15[IKE] CHILD_SA VirtualIPServerIKE2{4947} established with SPIs ccf9c8c6_i 61c3e888_o and TS 0.0.0.0/0 === 172.20.8.2/32
[W] Nov 11 16:01:48 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": crypto map is up: remote client "urist" @ "192.168.1.43" with IP "172.20.8.2" connected.
[I] Nov 11 16:01:49 ipsec: 15[CFG] scheduling RADIUS Interim-Updates every 5s
[I] Nov 11 16:01:49 ndm: IpSec::Netfilter: start reloading netfilter configuration...
[I] Nov 11 16:01:49 ndm: IpSec::Netfilter: netfilter configuration reloading is done.
[I] Nov 11 16:01:50 ndhcps: DHCPINFORM received for 172.20.8.2 from 00:00:00:00:00:00.
[I] Nov 11 16:01:50 ndhcps: sending INFORM to 00:00:00:00:00:00.
[I] Nov 11 16:03:07 ipsec: 03[IKE] received DELETE for ESP CHILD_SA with SPI ac92dcca
[I] Nov 11 16:03:07 ipsec: 03[IKE] closing CHILD_SA VirtualIPServerIKE2{4942} with SPIs c02510b9_i (19660 bytes) ac92dcca_o (12229 bytes) and TS 0.0.0.0/0 === 172.20.8.1/32
[I] Nov 11 16:03:07 ipsec: 03[IKE] sending DELETE for ESP CHILD_SA with SPI c02510b9
[I] Nov 11 16:03:07 ipsec: 03[IKE] CHILD_SA closed
[I] Nov 11 16:03:07 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": active CHILD SAs for user "buh".
[I] Nov 11 16:03:07 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": "0" = "3223654585".
[I] Nov 11 16:03:07 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": "1" = "2895305930".
[W] Nov 11 16:03:07 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": crypto map remote client "buh" @ "192.168.1.98" from "81.211.81.53" disconnected.
[I] Nov 11 16:03:07 ndm: IpSec::Netfilter: start reloading netfilter configuration...
[I] Nov 11 16:03:07 ndm: IpSec::Netfilter: netfilter configuration reloading is done.
[I] Nov 11 16:03:19 ipsec: 10[CFG] received proposals: ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:NULL/HMAC_SHA1_96/NO_EXT_SEQ
[I] Nov 11 16:03:19 ipsec: 10[CFG] configured proposals: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA2_256_128/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA2_256_128/NO_EXT_SEQ
[I] Nov 11 16:03:19 ipsec: 10[CFG] selected proposal: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ
[I] Nov 11 16:03:19 ipsec: 10[IKE] CHILD_SA VirtualIPServerIKE2{4948} established with SPIs c0832d3f_i 3279f1d4_o and TS 0.0.0.0/0 === 172.20.8.1/32
[I] Nov 11 16:03:19 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": active CHILD SAs for user "buh".
[I] Nov 11 16:03:19 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": "0" = "3229822271".
[I] Nov 11 16:03:19 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": "1" = "846852564".
[W] Nov 11 16:03:19 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": crypto map is up: remote client "buh" @ "192.168.1.98" with IP "172.20.8.1" connected.
[I] Nov 11 16:03:19 ndm: IpSec::Netfilter: start reloading netfilter configuration...
[I] Nov 11 16:03:19 ndm: IpSec::Netfilter: netfilter configuration reloading is done.
[I] Nov 11 16:03:33 ipsec: 11[IKE] received DELETE for ESP CHILD_SA with SPI 76a60e46
[I] Nov 11 16:03:33 ipsec: 11[IKE] closing CHILD_SA VirtualIPServerIKE2{4944} with SPIs cd7db2f2_i (19430 bytes) 76a60e46_o (890 bytes) and TS 0.0.0.0/0 === 172.20.8.1/32
[I] Nov 11 16:03:33 ipsec: 11[IKE] sending DELETE for ESP CHILD_SA with SPI cd7db2f2
[I] Nov 11 16:03:33 ipsec: 11[IKE] CHILD_SA closed
[I] Nov 11 16:03:33 ndm: IpSec::Netfilter: start reloading netfilter configuration...
[I] Nov 11 16:03:33 ndm: IpSec::Netfilter: netfilter configuration reloading is done.
[I] Nov 11 16:03:35 ipsec: 03[CFG] received proposals: ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:NULL/HMAC_SHA1_96/NO_EXT_SEQ
[I] Nov 11 16:03:35 ipsec: 03[CFG] configured proposals: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA2_256_128/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA2_256_128/NO_EXT_SEQ
[I] Nov 11 16:03:35 ipsec: 03[CFG] selected proposal: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ
[I] Nov 11 16:03:35 ipsec: 03[IKE] CHILD_SA VirtualIPServerIKE2{4949} established with SPIs cc955732_i 3f7a2bb6_o and TS 0.0.0.0/0 === 172.20.8.1/32
[E] Nov 11 16:03:35 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": unable to find client "metodist5" @ "192.168.0.4" from "95.55.35.180".
[C] Nov 11 16:03:35 ndm: IpSec::Configurator: "VirtualIPServerIKE2": out of memory [0xcffe0dcc].
[I] Nov 11 16:03:35 ndm: IpSec::Netfilter: start reloading netfilter configuration...
[I] Nov 11 16:03:35 ndm: IpSec::Netfilter: netfilter configuration reloading is done.
[I] Nov 11 16:04:01 ndhcps: DHCPREQUEST received (STATE_RENEWING) for 172.16.1.229 from 30:07:4d:70:2d:ed.
[I] Nov 11 16:04:01 ndhcps: sending ACK of 172.16.1.229 to 30:07:4d:70:2d:ed.
[I] Nov 11 16:04:23 ndhcps: DHCPREQUEST received (STATE_RENEWING) for 172.16.1.160 from 00:17:c8:ba:be:b4.
[I] Nov 11 16:04:23 ndhcps: sending ACK of 172.16.1.160 to 00:17:c8:ba:be:b4.
[I] Nov 11 16:05:47 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster1/AccessPoint0": STA(6a:b4:23:20:41:85) had been aged-out and disassociated (idle silence).
[I] Nov 11 16:06:09 ndhcps: DHCPREQUEST received (STATE_RENEWING) for 172.16.1.227 from 62:b2:12:d5:da:d2.
[I] Nov 11 16:06:10 ndhcps: sending ACK of 172.16.1.227 to 62:b2:12:d5:da:d2.
[I] Nov 11 16:06:33 ipsec: 06[IKE] received DELETE for ESP CHILD_SA with SPI 218b3d1e
[I] Nov 11 16:06:33 ipsec: 06[IKE] closing CHILD_SA VirtualIPServerIKE2{4937} with SPIs c6c2447a_i (29114 bytes) 218b3d1e_o (5943 bytes) and TS 0.0.0.0/0 === 172.20.8.2/32
[I] Nov 11 16:06:33 ipsec: 06[IKE] sending DELETE for ESP CHILD_SA with SPI c6c2447a
[I] Nov 11 16:06:33 ipsec: 06[IKE] CHILD_SA closed
[I] Nov 11 16:06:33 ndm: IpSec::Netfilter: start reloading netfilter configuration...
[I] Nov 11 16:06:33 ndm: IpSec::Netfilter: netfilter configuration reloading is done.
[I] Nov 11 16:06:43 ndhcps: DHCPREQUEST received (STATE_RENEWING) for 172.16.1.239 from 98:ee:cb:c3:a2:53.
[I] Nov 11 16:06:43 ndhcps: sending ACK of 172.16.1.239 to 98:ee:cb:c3:a2:53.
[I] Nov 11 16:06:57 ipsec: 11[CFG] received proposals: ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:NULL/HMAC_SHA1_96/NO_EXT_SEQ
[I] Nov 11 16:06:57 ipsec: 11[CFG] configured proposals: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA2_256_128/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA2_256_128/NO_EXT_SEQ
[I] Nov 11 16:06:57 ipsec: 11[CFG] selected proposal: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ
[I] Nov 11 16:06:57 ipsec: 11[IKE] CHILD_SA VirtualIPServerIKE2{4950} established with SPIs cf29f19b_i e3523ed4_o and TS 0.0.0.0/0 === 172.20.8.2/32
[E] Nov 11 16:06:57 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": unable to find client "urist2" @ "192.168.1.100" from "81.211.81.53".
[C] Nov 11 16:06:57 ndm: IpSec::Configurator: "VirtualIPServerIKE2": out of memory [0xcffe0dcc].
[I] Nov 11 16:06:57 ndm: IpSec::Netfilter: start reloading netfilter configuration...
[I] Nov 11 16:06:57 ndm: IpSec::Netfilter: netfilter configuration reloading is done.
[I] Nov 11 16:07:18 ndhcps: DHCPREQUEST received (STATE_RENEWING) for 172.16.1.183 from 00:0b:82:97:12:32.
[I] Nov 11 16:07:18 ndhcps: sending ACK of 172.16.1.183 to 00:0b:82:97:12:32.
[I] Nov 11 16:08:07 ipsec: 15[IKE] received DELETE for ESP CHILD_SA with SPI 3279f1d4
[I] Nov 11 16:08:07 ipsec: 15[IKE] closing CHILD_SA VirtualIPServerIKE2{4948} with SPIs c0832d3f_i (25401 bytes) 3279f1d4_o (9754 bytes) and TS 0.0.0.0/0 === 172.20.8.1/32
[I] Nov 11 16:08:07 ipsec: 15[IKE] sending DELETE for ESP CHILD_SA with SPI c0832d3f
[I] Nov 11 16:08:07 ipsec: 15[IKE] CHILD_SA closed
[I] Nov 11 16:08:07 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": active CHILD SAs for user "buh".
[I] Nov 11 16:08:07 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": "0" = "3229822271".
[I] Nov 11 16:08:07 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": "1" = "846852564".
[W] Nov 11 16:08:07 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": crypto map remote client "buh" @ "192.168.1.98" from "81.211.81.53" disconnected.
[I] Nov 11 16:08:07 ipsec: 10[IKE] received DELETE for IKE_SA VirtualIPServerIKE2[1520]
[I] Nov 11 16:08:07 ipsec: 10[IKE] deleting IKE_SA VirtualIPServerIKE2[1520] between 213.33.195.46[sakdjfwelfwe.keenetic.link]...81.211.81.53[192.168.1.98]
[I] Nov 11 16:08:07 ipsec: 10[IKE] IKE_SA deleted
[I] Nov 11 16:08:07 ndm: IpSec::Netfilter: start reloading netfilter configuration...
[I] Nov 11 16:08:07 ndm: IpSec::Netfilter: netfilter configuration reloading is done.
[I] Nov 11 16:08:10 ipsec: 06[IKE] received MS NT5 ISAKMPOAKLEY v9 vendor ID
[I] Nov 11 16:08:10 ipsec: 06[IKE] received MS-Negotiation Discovery Capable vendor ID
[I] Nov 11 16:08:10 ipsec: 06[IKE] received Vid-Initial-Contact vendor ID
[I] Nov 11 16:08:10 ipsec: 06[IKE] 81.211.81.53 is initiating an IKE_SA
[I] Nov 11 16:08:10 ipsec: 06[CFG] received proposals: IKE:3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:3DES_CBC/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:3DES_CBC/HMAC_SHA2_384_192/PRF_HMAC_SHA2_384/MODP_1024, IKE:AES_CBC=128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_CBC=128/HMAC_SHA2_384_192/PRF_HMAC_SHA2_384/MODP_1024, IKE:AES_CBC=192/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC=192/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_CBC=192/HMAC_SHA2_384_192/PRF_HMAC_SHA2_384/MODP_1024, IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_CBC=256/HMAC_SHA2_384_192/PRF_HMAC_SHA2_384/MODP_1024, IKE:AES_GCM_16=128/PRF_HMAC_SHA1/MODP_1024, IKE:AES_GCM_16=128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_GCM_16=128/PRF_HMAC_SHA2_384/MODP_1024, IKE:AES_GCM_16=256/PRF_HMAC_SHA1/MODP_1024, IKE:AES_GCM_16=256/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_GCM_16=256/ [...]
[I] Nov 11 16:08:10 ipsec: 06[CFG] configured proposals: IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_2048, IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/ECP_384, IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/ECP_256, IKE:AES_CBC=128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC=128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_2048, IKE:AES_CBC=128/HMAC_SHA1_96/PRF_HMAC_SHA1/ECP_384, IKE:AES_CBC=128/HMAC_SHA1_96/PRF_HMAC_SHA1/ECP_256, IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_2048, IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/ECP_384, IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/ECP_256, IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_2048, IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/ECP_384, IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/ECP_256
[I] Nov 11 16:08:10 ipsec: 06[CFG] selected proposal: IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
[I] Nov 11 16:08:10 ipsec: 06[IKE] remote host is behind NAT
[I] Nov 11 16:08:10 ipsec: 08[IKE] received 73 cert requests for an unknown ca
[I] Nov 11 16:08:10 ipsec: 08[CFG] looking for peer configs matching 213.33.195.46[%any]...81.211.81.53[192.168.1.98]
[I] Nov 11 16:08:10 ipsec: 08[CFG] selected peer config 'VirtualIPServerIKE2'
[I] Nov 11 16:08:10 ipsec: 08[IKE] initiating EAP_IDENTITY method (id 0x00)
[I] Nov 11 16:08:10 ipsec: 08[IKE] peer supports MOBIKE, but disabled in config
[I] Nov 11 16:08:10 ipsec: 08[IKE] authentication of 'sakdjfwelfwe.keenetic.link' (myself) with RSA signature successful
[I] Nov 11 16:08:10 ipsec: 08[IKE] sending end entity cert "CN=sakdjfwelfwe.keenetic.link"
[I] Nov 11 16:08:10 ipsec: 08[IKE] sending issuer cert "C=US, O=Let's Encrypt, CN=R10"
[I] Nov 11 16:08:10 ipsec: 05[IKE] received EAP identity 'buh'
[I] Nov 11 16:08:10 ipsec: 05[IKE] initiating EAP_MSCHAPV2 method (id 0xB9)
[I] Nov 11 16:08:10 ipsec: 12[IKE] EAP method EAP_MSCHAPV2 succeeded, MSK established
[I] Nov 11 16:08:10 ipsec: 15[IKE] authentication of '192.168.1.98' with EAP successful
[I] Nov 11 16:08:10 ipsec: 15[IKE] authentication of 'sakdjfwelfwe.keenetic.link' (myself) with EAP
[I] Nov 11 16:08:10 ipsec: 15[IKE] IKE_SA VirtualIPServerIKE2[1522] established between 213.33.195.46[sakdjfwelfwe.keenetic.link]...81.211.81.53[192.168.1.98]
[I] Nov 11 16:08:10 ipsec: 15[IKE] peer requested virtual IP %any
[I] Nov 11 16:08:10 ndm: Core::Server: started Session /var/run/ndm.core.socket.
[I] Nov 11 16:08:10 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": allocated address "172.20.8.1" for user "buh" @ "192.168.1.98" from "81.211.81.53".
[I] Nov 11 16:08:10 ndm: Core::Session: client disconnected.
[I] Nov 11 16:08:10 ipsec: 15[IKE] assigning virtual IP 172.20.8.1 to peer 'buh'
[I] Nov 11 16:08:10 ipsec: 15[IKE] peer requested virtual IP %any6
[I] Nov 11 16:08:10 ipsec: 15[IKE] no virtual IP found for %any6 requested by 'buh'
[I] Nov 11 16:08:10 ipsec: 15[CFG] received proposals: ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:NULL/HMAC_SHA1_96/NO_EXT_SEQ
[I] Nov 11 16:08:10 ipsec: 15[CFG] configured proposals: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA2_256_128/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA2_256_128/NO_EXT_SEQ
[I] Nov 11 16:08:10 ipsec: 15[CFG] selected proposal: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ
[I] Nov 11 16:08:10 ipsec: 15[IKE] CHILD_SA VirtualIPServerIKE2{4951} established with SPIs ca70fd17_i a65a68c0_o and TS 0.0.0.0/0 === 172.20.8.1/32
[W] Nov 11 16:08:10 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": crypto map is up: remote client "buh" @ "192.168.1.98" with IP "172.20.8.1" connected.
[I] Nov 11 16:08:10 ipsec: 15[CFG] scheduling RADIUS Interim-Updates every 5s
[I] Nov 11 16:08:10 ndm: IpSec::Netfilter: start reloading netfilter configuration...
[I] Nov 11 16:08:10 ndm: IpSec::Netfilter: netfilter configuration reloading is done.
[I] Nov 11 16:08:12 ndhcps: DHCPINFORM received for 172.20.8.1 from 00:00:00:00:00:00.
[I] Nov 11 16:08:12 ndhcps: sending INFORM to 00:00:00:00:00:00.
[I] Nov 11 16:08:13 ipsec: 10[IKE] received DELETE for ESP CHILD_SA with SPI 64b33500
[I] Nov 11 16:08:13 ipsec: 10[IKE] closing CHILD_SA VirtualIPServerIKE2{4945} with SPIs ce5635ef_i (26505 bytes) 64b33500_o (6233 bytes) and TS 0.0.0.0/0 === 172.20.8.1/32
[I] Nov 11 16:08:13 ipsec: 10[IKE] sending DELETE for ESP CHILD_SA with SPI ce5635ef
[I] Nov 11 16:08:13 ipsec: 10[IKE] CHILD_SA closed
[I] Nov 11 16:08:13 ndm: IpSec::Netfilter: start reloading netfilter configuration...
[I] Nov 11 16:08:13 ndm: IpSec::Netfilter: netfilter configuration reloading is done.
[I] Nov 11 16:08:21 ipsec: 13[IKE] received MS NT5 ISAKMPOAKLEY v9 vendor ID
[I] Nov 11 16:08:21 ipsec: 13[IKE] received MS-Negotiation Discovery Capable vendor ID
[I] Nov 11 16:08:21 ipsec: 13[IKE] received Vid-Initial-Contact vendor ID
[I] Nov 11 16:08:21 ipsec: 13[IKE] 37.122.20.103 is initiating an IKE_SA
[I] Nov 11 16:08:21 ipsec: 13[CFG] received proposals: IKE:3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:3DES_CBC/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:3DES_CBC/HMAC_SHA2_384_192/PRF_HMAC_SHA2_384/MODP_1024, IKE:AES_CBC=128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_CBC=128/HMAC_SHA2_384_192/PRF_HMAC_SHA2_384/MODP_1024, IKE:AES_CBC=192/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC=192/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_CBC=192/HMAC_SHA2_384_192/PRF_HMAC_SHA2_384/MODP_1024, IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_CBC=256/HMAC_SHA2_384_192/PRF_HMAC_SHA2_384/MODP_1024, IKE:AES_GCM_16=128/PRF_HMAC_SHA1/MODP_1024, IKE:AES_GCM_16=128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_GCM_16=128/PRF_HMAC_SHA2_384/MODP_1024, IKE:AES_GCM_16=256/PRF_HMAC_SHA1/MODP_1024, IKE:AES_GCM_16=256/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_GCM_16=256/ [...]
[I] Nov 11 16:08:21 ipsec: 13[CFG] configured proposals: IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_2048, IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/ECP_384, IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/ECP_256, IKE:AES_CBC=128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC=128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_2048, IKE:AES_CBC=128/HMAC_SHA1_96/PRF_HMAC_SHA1/ECP_384, IKE:AES_CBC=128/HMAC_SHA1_96/PRF_HMAC_SHA1/ECP_256, IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_2048, IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/ECP_384, IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/ECP_256, IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_2048, IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/ECP_384, IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/ECP_256
[I] Nov 11 16:08:21 ipsec: 13[CFG] selected proposal: IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
[I] Nov 11 16:08:21 ipsec: 13[IKE] remote host is behind NAT
[I] Nov 11 16:08:22 ipsec: 15[IKE] received 279 cert requests for an unknown ca
[I] Nov 11 16:08:22 ipsec: 15[CFG] looking for peer configs matching 213.33.195.46[%any]...37.122.20.103[192.168.0.32]
[I] Nov 11 16:08:22 ipsec: 15[CFG] selected peer config 'VirtualIPServerIKE2'
[I] Nov 11 16:08:22 ipsec: 15[IKE] initiating EAP_IDENTITY method (id 0x00)
[I] Nov 11 16:08:22 ipsec: 15[IKE] peer supports MOBIKE, but disabled in config
[I] Nov 11 16:08:22 ipsec: 15[IKE] authentication of 'sakdjfwelfwe.keenetic.link' (myself) with RSA signature successful
[I] Nov 11 16:08:22 ipsec: 15[IKE] sending end entity cert "CN=sakdjfwelfwe.keenetic.link"
[I] Nov 11 16:08:22 ipsec: 15[IKE] sending issuer cert "C=US, O=Let's Encrypt, CN=R10"
[I] Nov 11 16:08:50 ipsec: 03[CFG] received proposals: ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:NULL/HMAC_SHA1_96/NO_EXT_SEQ
[I] Nov 11 16:08:50 ipsec: 03[CFG] configured proposals: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA2_256_128/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA2_256_128/NO_EXT_SEQ
[I] Nov 11 16:08:50 ipsec: 03[CFG] selected proposal: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ
[I] Nov 11 16:08:50 ipsec: 03[IKE] CHILD_SA VirtualIPServerIKE2{4952} established with SPIs c3bf492b_i d62cf4f8_o and TS 0.0.0.0/0 === 172.20.8.1/32
[E] Nov 11 16:08:50 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": unable to find client "metodist" @ "192.168.1.149" from "188.64.164.33".
[C] Nov 11 16:08:50 ndm: IpSec::Configurator: "VirtualIPServerIKE2": out of memory [0xcffe0dcc].
[I] Nov 11 16:08:50 ndm: IpSec::Netfilter: start reloading netfilter configuration...
[I] Nov 11 16:08:50 ndm: IpSec::Netfilter: netfilter configuration reloading is done.
[I] Nov 11 16:08:51 ipsec: 15[JOB] deleting half open IKE_SA with 37.122.20.103 after timeout
[I] Nov 11 16:11:55 ndhcps: DHCPREQUEST received (STATE_RENEWING) for 172.16.1.216 from 98:ee:cb:c3:a4:51.
[I] Nov 11 16:11:55 ndhcps: sending ACK of 172.16.1.216 to 98:ee:cb:c3:a4:51.
[I] Nov 11 16:11:58 ipsec: 11[IKE] received DELETE for ESP CHILD_SA with SPI 61c3e888
[I] Nov 11 16:11:58 ipsec: 11[IKE] closing CHILD_SA VirtualIPServerIKE2{4947} with SPIs ccf9c8c6_i (18132 bytes) 61c3e888_o (14350 bytes) and TS 0.0.0.0/0 === 172.20.8.2/32
[I] Nov 11 16:11:58 ipsec: 11[IKE] sending DELETE for ESP CHILD_SA with SPI ccf9c8c6
[I] Nov 11 16:11:58 ipsec: 11[IKE] CHILD_SA closed
[I] Nov 11 16:11:58 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": active CHILD SAs for user "urist".
[W] Nov 11 16:11:58 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": crypto map remote client "urist" @ "192.168.1.43" from "81.211.81.53" disconnected.
[I] Nov 11 16:11:58 ndm: IpSec::Netfilter: start reloading netfilter configuration...
[I] Nov 11 16:11:58 ndm: IpSec::Netfilter: netfilter configuration reloading is done.
[I] Nov 11 16:12:05 ipsec: 15[CFG] received proposals: ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:NULL/HMAC_SHA1_96/NO_EXT_SEQ
[I] Nov 11 16:12:05 ipsec: 15[CFG] configured proposals: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA2_256_128/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA2_256_128/NO_EXT_SEQ
[I] Nov 11 16:12:05 ipsec: 15[CFG] selected proposal: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ
[I] Nov 11 16:12:05 ipsec: 15[IKE] CHILD_SA VirtualIPServerIKE2{4953} established with SPIs cf7ac52f_i 95038c86_o and TS 0.0.0.0/0 === 172.20.8.2/32
[I] Nov 11 16:12:05 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": active CHILD SAs for user "urist".
[I] Nov 11 16:12:05 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": "0" = "3480929583".
[I] Nov 11 16:12:05 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": "1" = "2500037766".
[W] Nov 11 16:12:05 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": crypto map is up: remote client "urist" @ "192.168.1.43" with IP "172.20.8.2" connected.
[I] Nov 11 16:12:05 ndm: IpSec::Netfilter: start reloading netfilter configuration...
[I] Nov 11 16:12:05 ndm: IpSec::Netfilter: netfilter configuration reloading is done.
[I] Nov 11 16:12:33 ndhcps: DHCPREQUEST received (STATE_RENEWING) for 172.16.1.214 from 0a:f3:57:79:4b:d0.
[I] Nov 11 16:12:34 ndhcps: sending ACK of 172.16.1.214 to 0a:f3:57:79:4b:d0.
[I] Nov 11 16:13:06 ipsec: 15[IKE] received DELETE for ESP CHILD_SA with SPI 3f7a2bb6
[I] Nov 11 16:13:06 ipsec: 15[IKE] closing CHILD_SA VirtualIPServerIKE2{4949} with SPIs cc955732_i (29353 bytes) 3f7a2bb6_o (9144 bytes) and TS 0.0.0.0/0 === 172.20.8.1/32
[I] Nov 11 16:13:06 ipsec: 15[IKE] sending DELETE for ESP CHILD_SA with SPI cc955732
[I] Nov 11 16:13:06 ipsec: 15[IKE] CHILD_SA closed
[I] Nov 11 16:13:06 ndm: IpSec::Netfilter: start reloading netfilter configuration...
[I] Nov 11 16:13:06 ndm: IpSec::Netfilter: netfilter configuration reloading is done.
[I] Nov 11 16:13:23 ipsec: 13[CFG] received proposals: ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:NULL/HMAC_SHA1_96/NO_EXT_SEQ
[I] Nov 11 16:13:23 ipsec: 13[CFG] configured proposals: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA2_256_128/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA2_256_128/NO_EXT_SEQ
[I] Nov 11 16:13:23 ipsec: 13[CFG] selected proposal: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ
[I] Nov 11 16:13:23 ipsec: 13[IKE] CHILD_SA VirtualIPServerIKE2{4954} established with SPIs cf723d42_i 2e05af2e_o and TS 0.0.0.0/0 === 172.20.8.1/32
[E] Nov 11 16:13:23 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": unable to find client "metodist5" @ "192.168.0.4" from "95.55.35.180".
[C] Nov 11 16:13:23 ndm: IpSec::Configurator: "VirtualIPServerIKE2": out of memory [0xcffe0dcc].
[I] Nov 11 16:13:24 ndm: IpSec::Netfilter: start reloading netfilter configuration...
[I] Nov 11 16:13:24 ndm: IpSec::Netfilter: netfilter configuration reloading is done.
[I] Nov 11 16:13:46 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster1/AccessPoint0": STA(52:eb:a4:8d:5e:55) had associated (has FT caps).
[I] Nov 11 16:13:46 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster1/AccessPoint0": STA(52:eb:a4:8d:5e:55) set key done in WPA2/WPA2PSK.
[I] Nov 11 16:13:46 ndhcps: DHCPREQUEST received (STATE_INIT) for 172.16.1.251 from 52:eb:a4:8d:5e:55.
[I] Nov 11 16:13:46 ndhcps: sending ACK of 172.16.1.251 to 52:eb:a4:8d:5e:55.
[I] Nov 11 16:13:47 ndhcps: DHCPREQUEST received (STATE_INIT) for 172.16.1.251 from 52:eb:a4:8d:5e:55.
[I] Nov 11 16:13:48 ndhcps: sending ACK of 172.16.1.251 to 52:eb:a4:8d:5e:55.
[I] Nov 11 16:13:50 ipsec: 06[IKE] received DELETE for ESP CHILD_SA with SPI a65a68c0
[I] Nov 11 16:13:50 ipsec: 06[IKE] closing CHILD_SA VirtualIPServerIKE2{4951} with SPIs ca70fd17_i (63189 bytes) a65a68c0_o (166515 bytes) and TS 0.0.0.0/0 === 172.20.8.1/32
[I] Nov 11 16:13:50 ipsec: 06[IKE] sending DELETE for ESP CHILD_SA with SPI ca70fd17
[I] Nov 11 16:13:50 ipsec: 06[IKE] CHILD_SA closed
[I] Nov 11 16:13:50 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": active CHILD SAs for user "buh".
[W] Nov 11 16:13:50 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": crypto map remote client "buh" @ "192.168.1.98" from "81.211.81.53" disconnected.
[I] Nov 11 16:13:50 ndm: IpSec::Netfilter: start reloading netfilter configuration...
[I] Nov 11 16:13:50 ndm: IpSec::Netfilter: netfilter configuration reloading is done.
[I] Nov 11 16:13:52 ipsec: 07[CFG] received proposals: ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:NULL/HMAC_SHA1_96/NO_EXT_SEQ
[I] Nov 11 16:13:52 ipsec: 07[CFG] configured proposals: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA2_256_128/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA2_256_128/NO_EXT_SEQ
[I] Nov 11 16:13:52 ipsec: 07[CFG] selected proposal: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ
[I] Nov 11 16:13:52 ipsec: 07[IKE] CHILD_SA VirtualIPServerIKE2{4955} established with SPIs c0ff9576_i e8296596_o and TS 0.0.0.0/0 === 172.20.8.1/32
[I] Nov 11 16:13:52 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": active CHILD SAs for user "buh".
[I] Nov 11 16:13:52 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": "0" = "3237975414".
[I] Nov 11 16:13:52 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": "1" = "3895027094".
[W] Nov 11 16:13:52 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": crypto map is up: remote client "buh" @ "192.168.1.98" with IP "172.20.8.1" connected.
[I] Nov 11 16:13:52 ndm: IpSec::Netfilter: start reloading netfilter configuration...
[I] Nov 11 16:13:52 ndm: IpSec::Netfilter: netfilter configuration reloading is done.
[I] Nov 11 16:14:11 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster1/AccessPoint0": STA(52:eb:a4:8d:5e:55) had deauthenticated by STA (reason: STA is leaving or has left BSS).
[I] Nov 11 16:15:54 ipsec: 03[IKE] received DELETE for ESP CHILD_SA with SPI e3523ed4
[I] Nov 11 16:15:54 ipsec: 03[IKE] closing CHILD_SA VirtualIPServerIKE2{4950} with SPIs cf29f19b_i (6372 bytes) e3523ed4_o (2702 bytes) and TS 0.0.0.0/0 === 172.20.8.2/32
[I] Nov 11 16:15:54 ipsec: 03[IKE] sending DELETE for ESP CHILD_SA with SPI cf29f19b
[I] Nov 11 16:15:54 ipsec: 03[IKE] CHILD_SA closed
[I] Nov 11 16:15:54 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster1/AccessPoint0": STA(e6:29:c0:f6:d9:c9) had associated (has FT caps).
[I] Nov 11 16:15:54 ndm: IpSec::Netfilter: start reloading netfilter configuration...
[I] Nov 11 16:15:54 ndm: IpSec::Netfilter: netfilter configuration reloading is done.
[I] Nov 11 16:15:54 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster1/AccessPoint0": STA(e6:29:c0:f6:d9:c9) set key done in WPA2/WPA2PSK.
[I] Nov 11 16:15:54 ndhcps: DHCPREQUEST received (STATE_INIT) for 172.16.1.207 from e6:29:c0:f6:d9:c9.
[I] Nov 11 16:15:55 ndhcps: sending ACK of 172.16.1.207 to e6:29:c0:f6:d9:c9.
[I] Nov 11 16:15:56 dropbear: Child connection from 92.255.85.253:61202
[E] Nov 11 16:15:58 dropbear: Login attempt for nonexistent user 'user'
[I] Nov 11 16:15:59 ipsec: 11[CFG] received proposals: ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:NULL/HMAC_SHA1_96/NO_EXT_SEQ
[I] Nov 11 16:15:59 ipsec: 11[CFG] configured proposals: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA2_256_128/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA2_256_128/NO_EXT_SEQ
[I] Nov 11 16:15:59 ipsec: 11[CFG] selected proposal: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ
[I] Nov 11 16:15:59 ipsec: 11[IKE] inbound CHILD_SA VirtualIPServerIKE2{4956} established with SPIs c318f629_i 79d589cc_o and TS 0.0.0.0/0 === 172.20.8.4/32
[E] Nov 11 16:15:59 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": unable to find client "metodist2" @ "192.168.1.70" from "79.139.193.172".
[C] Nov 11 16:15:59 ndm: IpSec::Configurator: "VirtualIPServerIKE2": out of memory [0xcffe0dcc].
[I] Nov 11 16:15:59 ipsec: 13[IKE] received DELETE for ESP CHILD_SA with SPI 90131018
[I] Nov 11 16:15:59 ipsec: 13[IKE] closing CHILD_SA VirtualIPServerIKE2{4925} with SPIs cb989fc1_i (103449 bytes) 90131018_o (36898 bytes) and TS 0.0.0.0/0 === 172.20.8.4/32
[I] Nov 11 16:15:59 ipsec: 13[IKE] sending DELETE for ESP CHILD_SA with SPI cb989fc1
[I] Nov 11 16:15:59 ipsec: 13[IKE] CHILD_SA closed
[I] Nov 11 16:15:59 ipsec: 13[IKE] outbound CHILD_SA VirtualIPServerIKE2{4956} established with SPIs c318f629_i 79d589cc_o and TS 0.0.0.0/0 === 172.20.8.4/32
[I] Nov 11 16:15:59 ndm: IpSec::Netfilter: start reloading netfilter configuration...
[I] Nov 11 16:15:59 ndm: IpSec::Netfilter: netfilter configuration reloading is done.
[I] Nov 11 16:16:00 dropbear: Exit before auth from <92.255.85.253:61202>: Error reading: Connection reset by peer
[I] Nov 11 16:16:22 ipsec: 12[CFG] received proposals: ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:NULL/HMAC_SHA1_96/NO_EXT_SEQ
[I] Nov 11 16:16:22 ipsec: 12[CFG] configured proposals: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA2_256_128/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA2_256_128/NO_EXT_SEQ
[I] Nov 11 16:16:22 ipsec: 12[CFG] selected proposal: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ
[I] Nov 11 16:16:22 ipsec: 12[IKE] CHILD_SA VirtualIPServerIKE2{4957} established with SPIs cae8b6a3_i 6c6afcbc_o and TS 0.0.0.0/0 === 172.20.8.2/32
[E] Nov 11 16:16:23 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": unable to find client "urist2" @ "192.168.1.100" from "81.211.81.53".
[C] Nov 11 16:16:23 ndm: IpSec::Configurator: "VirtualIPServerIKE2": out of memory [0xcffe0dcc].
[I] Nov 11 16:16:23 ndm: IpSec::Netfilter: start reloading netfilter configuration...
[I] Nov 11 16:16:23 ndm: IpSec::Netfilter: netfilter configuration reloading is done.
[I] Nov 11 16:18:20 ipsec: 14[IKE] received DELETE for ESP CHILD_SA with SPI d62cf4f8
[I] Nov 11 16:18:20 ipsec: 14[IKE] closing CHILD_SA VirtualIPServerIKE2{4952} with SPIs c3bf492b_i (709268 bytes) d62cf4f8_o (4561643 bytes) and TS 0.0.0.0/0 === 172.20.8.1/32
[I] Nov 11 16:18:20 ipsec: 14[IKE] sending DELETE for ESP CHILD_SA with SPI c3bf492b
[I] Nov 11 16:18:20 ipsec: 14[IKE] CHILD_SA closed
[I] Nov 11 16:18:20 ndm: IpSec::Netfilter: start reloading netfilter configuration...
[I] Nov 11 16:18:20 ndm: IpSec::Netfilter: netfilter configuration reloading is done.
[I] Nov 11 16:18:21 ipsec: 03[CFG] received proposals: ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:NULL/HMAC_SHA1_96/NO_EXT_SEQ
[I] Nov 11 16:18:21 ipsec: 03[CFG] configured proposals: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA2_256_128/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA2_256_128/NO_EXT_SEQ
[I] Nov 11 16:18:21 ipsec: 03[CFG] selected proposal: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ
[I] Nov 11 16:18:21 ipsec: 03[IKE] CHILD_SA VirtualIPServerIKE2{4958} established with SPIs cb91fb1a_i a7348cb0_o and TS 0.0.0.0/0 === 172.20.8.1/32
[E] Nov 11 16:18:21 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": unable to find client "metodist" @ "192.168.1.149" from "188.64.164.33".
[C] Nov 11 16:18:21 ndm: IpSec::Configurator: "VirtualIPServerIKE2": out of memory [0xcffe0dcc].
[I] Nov 11 16:18:21 ndm: IpSec::Netfilter: start reloading netfilter configuration...
[I] Nov 11 16:18:21 ndm: IpSec::Netfilter: netfilter configuration reloading is done.
[I] Nov 11 16:18:32 ipsec: 05[IKE] received DELETE for ESP CHILD_SA with SPI 2e05af2e
[I] Nov 11 16:18:32 ipsec: 05[IKE] closing CHILD_SA VirtualIPServerIKE2{4954} with SPIs cf723d42_i (19891 bytes) 2e05af2e_o (250 bytes) and TS 0.0.0.0/0 === 172.20.8.1/32
[I] Nov 11 16:18:32 ipsec: 05[IKE] sending DELETE for ESP CHILD_SA with SPI cf723d42
[I] Nov 11 16:18:32 ipsec: 05[IKE] CHILD_SA closed
[I] Nov 11 16:18:32 ndm: IpSec::Netfilter: start reloading netfilter configuration...
[I] Nov 11 16:18:32 ndm: IpSec::Netfilter: netfilter configuration reloading is done.
[I] Nov 11 16:18:32 ipsec: 14[CFG] received proposals: ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:NULL/HMAC_SHA1_96/NO_EXT_SEQ
[I] Nov 11 16:18:32 ipsec: 14[CFG] configured proposals: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA2_256_128/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA2_256_128/NO_EXT_SEQ
[I] Nov 11 16:18:32 ipsec: 14[CFG] selected proposal: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ
[I] Nov 11 16:18:32 ipsec: 14[IKE] CHILD_SA VirtualIPServerIKE2{4959} established with SPIs c67588c6_i b157dcc8_o and TS 0.0.0.0/0 === 172.20.8.1/32
[E] Nov 11 16:18:32 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": unable to find client "metodist5" @ "192.168.0.4" from "95.55.35.180".
[C] Nov 11 16:18:32 ndm: IpSec::Configurator: "VirtualIPServerIKE2": out of memory [0xcffe0dcc].
[I] Nov 11 16:18:32 ndm: IpSec::Netfilter: start reloading netfilter configuration...
[I] Nov 11 16:18:32 ndm: IpSec::Netfilter: netfilter configuration reloading is done.
[I] Nov 11 16:19:13 ipsec: 09[IKE] received DELETE for ESP CHILD_SA with SPI b157dcc8
[I] Nov 11 16:19:13 ipsec: 09[IKE] closing CHILD_SA VirtualIPServerIKE2{4959} with SPIs c67588c6_i (322 bytes) b157dcc8_o (681 bytes) and TS 0.0.0.0/0 === 172.20.8.1/32
[I] Nov 11 16:19:13 ipsec: 09[IKE] sending DELETE for ESP CHILD_SA with SPI c67588c6
[I] Nov 11 16:19:13 ipsec: 09[IKE] CHILD_SA closed
[I] Nov 11 16:19:13 ndm: IpSec::Netfilter: start reloading netfilter configuration...
[I] Nov 11 16:19:13 ipsec: 11[IKE] received DELETE for IKE_SA VirtualIPServerIKE2[1506]
[I] Nov 11 16:19:13 ipsec: 11[IKE] deleting IKE_SA VirtualIPServerIKE2[1506] between 213.33.195.46[sakdjfwelfwe.keenetic.link]...95.55.35.180[192.168.0.4]
[I] Nov 11 16:19:13 ipsec: 11[IKE] IKE_SA deleted
[I] Nov 11 16:19:13 ndm: IpSec::Netfilter: netfilter configuration reloading is done.
[I] Nov 11 16:19:16 ipsec: 08[IKE] received MS NT5 ISAKMPOAKLEY v9 vendor ID
[I] Nov 11 16:19:16 ipsec: 08[IKE] received MS-Negotiation Discovery Capable vendor ID
[I] Nov 11 16:19:16 ipsec: 08[IKE] received Vid-Initial-Contact vendor ID
[I] Nov 11 16:19:16 ipsec: 08[IKE] 95.55.35.180 is initiating an IKE_SA
[I] Nov 11 16:19:16 ipsec: 08[CFG] received proposals: IKE:3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:3DES_CBC/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:3DES_CBC/HMAC_SHA2_384_192/PRF_HMAC_SHA2_384/MODP_1024, IKE:AES_CBC=128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_CBC=128/HMAC_SHA2_384_192/PRF_HMAC_SHA2_384/MODP_1024, IKE:AES_CBC=192/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC=192/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_CBC=192/HMAC_SHA2_384_192/PRF_HMAC_SHA2_384/MODP_1024, IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_CBC=256/HMAC_SHA2_384_192/PRF_HMAC_SHA2_384/MODP_1024, IKE:AES_GCM_16=128/PRF_HMAC_SHA1/MODP_1024, IKE:AES_GCM_16=128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_GCM_16=128/PRF_HMAC_SHA2_384/MODP_1024, IKE:AES_GCM_16=256/PRF_HMAC_SHA1/MODP_1024, IKE:AES_GCM_16=256/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_GCM_16=256/ [...]
[I] Nov 11 16:19:16 ipsec: 08[CFG] configured proposals: IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_2048, IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/ECP_384, IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/ECP_256, IKE:AES_CBC=128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC=128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_2048, IKE:AES_CBC=128/HMAC_SHA1_96/PRF_HMAC_SHA1/ECP_384, IKE:AES_CBC=128/HMAC_SHA1_96/PRF_HMAC_SHA1/ECP_256, IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_2048, IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/ECP_384, IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/ECP_256, IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_2048, IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/ECP_384, IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/ECP_256
[I] Nov 11 16:19:16 ipsec: 08[CFG] selected proposal: IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
[I] Nov 11 16:19:16 ipsec: 08[IKE] remote host is behind NAT
[I] Nov 11 16:19:17 ipsec: 10[IKE] received 46 cert requests for an unknown ca
[I] Nov 11 16:19:17 ipsec: 10[CFG] looking for peer configs matching 213.33.195.46[%any]...95.55.35.180[192.168.0.4]
[I] Nov 11 16:19:17 ipsec: 10[CFG] selected peer config 'VirtualIPServerIKE2'
[I] Nov 11 16:19:17 ipsec: 10[IKE] initiating EAP_IDENTITY method (id 0x00)
[I] Nov 11 16:19:17 ipsec: 10[IKE] peer supports MOBIKE, but disabled in config
[I] Nov 11 16:19:17 ipsec: 10[IKE] authentication of 'sakdjfwelfwe.keenetic.link' (myself) with RSA signature successful
[I] Nov 11 16:19:17 ipsec: 10[IKE] sending end entity cert "CN=sakdjfwelfwe.keenetic.link"
[I] Nov 11 16:19:17 ipsec: 10[IKE] sending issuer cert "C=US, O=Let's Encrypt, CN=R10"
[I] Nov 11 16:19:17 ipsec: 15[IKE] received EAP identity 'metodist5'
[I] Nov 11 16:19:17 ipsec: 15[IKE] initiating EAP_MSCHAPV2 method (id 0xA0)
[I] Nov 11 16:19:17 ipsec: 12[IKE] EAP method EAP_MSCHAPV2 succeeded, MSK established
[I] Nov 11 16:19:17 ipsec: 14[IKE] authentication of '192.168.0.4' with EAP successful
[I] Nov 11 16:19:17 ipsec: 14[IKE] authentication of 'sakdjfwelfwe.keenetic.link' (myself) with EAP
[I] Nov 11 16:19:17 ipsec: 14[IKE] IKE_SA VirtualIPServerIKE2[1524] established between 213.33.195.46[sakdjfwelfwe.keenetic.link]...95.55.35.180[192.168.0.4]
[I] Nov 11 16:19:17 ipsec: 14[IKE] peer requested virtual IP %any
[I] Nov 11 16:19:17 ndm: Core::Server: started Session /var/run/ndm.core.socket.
[I] Nov 11 16:19:17 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": allocated address "172.20.8.3" for user "metodist5" @ "192.168.0.4" from "95.55.35.180".
[I] Nov 11 16:19:17 ndm: Core::Session: client disconnected.
[I] Nov 11 16:19:17 ipsec: 14[IKE] assigning virtual IP 172.20.8.3 to peer 'metodist5'
[I] Nov 11 16:19:17 ipsec: 14[IKE] peer requested virtual IP %any6
[I] Nov 11 16:19:17 ipsec: 14[IKE] no virtual IP found for %any6 requested by 'metodist5'
[I] Nov 11 16:19:17 ipsec: 14[CFG] received proposals: ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:NULL/HMAC_SHA1_96/NO_EXT_SEQ
[I] Nov 11 16:19:17 ipsec: 14[CFG] configured proposals: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA2_256_128/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA2_256_128/NO_EXT_SEQ
[I] Nov 11 16:19:17 ipsec: 14[CFG] selected proposal: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ
[I] Nov 11 16:19:17 ipsec: 14[IKE] CHILD_SA VirtualIPServerIKE2{4960} established with SPIs c08babca_i bcfd1b78_o and TS 0.0.0.0/0 === 172.20.8.3/32
[W] Nov 11 16:19:17 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": crypto map is up: remote client "metodist5" @ "192.168.0.4" with IP "172.20.8.3" connected.
[I] Nov 11 16:19:17 ipsec: 14[CFG] scheduling RADIUS Interim-Updates every 5s
[I] Nov 11 16:19:17 ndm: IpSec::Netfilter: start reloading netfilter configuration...
[I] Nov 11 16:19:17 ndm: IpSec::Netfilter: netfilter configuration reloading is done.
[I] Nov 11 16:19:19 ndhcps: DHCPINFORM received for 172.20.8.3 from 00:00:00:00:00:00.
[I] Nov 11 16:19:19 ndhcps: sending INFORM to 00:00:00:00:00:00.
[I] Nov 11 16:19:58 ipsec: 13[IKE] received DELETE for ESP CHILD_SA with SPI bcfd1b78
[I] Nov 11 16:19:58 ipsec: 13[IKE] closing CHILD_SA VirtualIPServerIKE2{4960} with SPIs c08babca_i (18933 bytes) bcfd1b78_o (4151 bytes) and TS 0.0.0.0/0 === 172.20.8.3/32
[I] Nov 11 16:19:58 ipsec: 13[IKE] sending DELETE for ESP CHILD_SA with SPI c08babca
[I] Nov 11 16:19:58 ipsec: 13[IKE] CHILD_SA closed
[I] Nov 11 16:19:58 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": active CHILD SAs for user "metodist5".
[W] Nov 11 16:19:58 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": crypto map remote client "metodist5" @ "192.168.0.4" from "95.55.35.180" disconnected.
[I] Nov 11 16:19:58 ndm: IpSec::Netfilter: start reloading netfilter configuration...
[I] Nov 11 16:19:58 ipsec: 06[IKE] received DELETE for IKE_SA VirtualIPServerIKE2[1524]
[I] Nov 11 16:19:58 ipsec: 06[IKE] deleting IKE_SA VirtualIPServerIKE2[1524] between 213.33.195.46[sakdjfwelfwe.keenetic.link]...95.55.35.180[192.168.0.4]
[I] Nov 11 16:19:58 ipsec: 06[IKE] IKE_SA deleted
[I] Nov 11 16:19:58 ndm: IpSec::Netfilter: netfilter configuration reloading is done.
[I] Nov 11 16:20:19 ipsec: 06[IKE] received DELETE for ESP CHILD_SA with SPI e8296596
[I] Nov 11 16:20:19 ipsec: 06[IKE] closing CHILD_SA VirtualIPServerIKE2{4955} with SPIs c0ff9576_i (52411 bytes) e8296596_o (42263 bytes) and TS 0.0.0.0/0 === 172.20.8.1/32
[I] Nov 11 16:20:19 ipsec: 06[IKE] sending DELETE for ESP CHILD_SA with SPI c0ff9576
[I] Nov 11 16:20:19 ipsec: 06[IKE] CHILD_SA closed
[I] Nov 11 16:20:19 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": active CHILD SAs for user "buh".
[I] Nov 11 16:20:19 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": "0" = "3237975414".
[I] Nov 11 16:20:19 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": "1" = "3895027094".
[W] Nov 11 16:20:19 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": crypto map remote client "buh" @ "192.168.1.98" from "81.211.81.53" disconnected.
[I] Nov 11 16:20:19 ipsec: 03[IKE] received DELETE for IKE_SA VirtualIPServerIKE2[1522]
[I] Nov 11 16:20:19 ipsec: 03[IKE] deleting IKE_SA VirtualIPServerIKE2[1522] between 213.33.195.46[sakdjfwelfwe.keenetic.link]...81.211.81.53[192.168.1.98]
[I] Nov 11 16:20:19 ipsec: 03[IKE] IKE_SA deleted
[I] Nov 11 16:20:19 ndm: IpSec::Netfilter: start reloading netfilter configuration...
[I] Nov 11 16:20:19 ndm: IpSec::Netfilter: netfilter configuration reloading is done.
[I] Nov 11 16:20:21 ipsec: 13[IKE] received MS NT5 ISAKMPOAKLEY v9 vendor ID
[I] Nov 11 16:20:21 ipsec: 13[IKE] received MS-Negotiation Discovery Capable vendor ID
[I] Nov 11 16:20:21 ipsec: 13[IKE] received Vid-Initial-Contact vendor ID
[I] Nov 11 16:20:21 ipsec: 13[IKE] 81.211.81.53 is initiating an IKE_SA
[I] Nov 11 16:20:21 ipsec: 13[CFG] received proposals: IKE:3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:3DES_CBC/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:3DES_CBC/HMAC_SHA2_384_192/PRF_HMAC_SHA2_384/MODP_1024, IKE:AES_CBC=128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_CBC=128/HMAC_SHA2_384_192/PRF_HMAC_SHA2_384/MODP_1024, IKE:AES_CBC=192/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC=192/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_CBC=192/HMAC_SHA2_384_192/PRF_HMAC_SHA2_384/MODP_1024, IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_CBC=256/HMAC_SHA2_384_192/PRF_HMAC_SHA2_384/MODP_1024, IKE:AES_GCM_16=128/PRF_HMAC_SHA1/MODP_1024, IKE:AES_GCM_16=128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_GCM_16=128/PRF_HMAC_SHA2_384/MODP_1024, IKE:AES_GCM_16=256/PRF_HMAC_SHA1/MODP_1024, IKE:AES_GCM_16=256/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_GCM_16=256/ [...]
[I] Nov 11 16:20:21 ipsec: 13[CFG] configured proposals: IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_2048, IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/ECP_384, IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/ECP_256, IKE:AES_CBC=128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC=128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_2048, IKE:AES_CBC=128/HMAC_SHA1_96/PRF_HMAC_SHA1/ECP_384, IKE:AES_CBC=128/HMAC_SHA1_96/PRF_HMAC_SHA1/ECP_256, IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_2048, IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/ECP_384, IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/ECP_256, IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_2048, IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/ECP_384, IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/ECP_256
[I] Nov 11 16:20:21 ipsec: 13[CFG] selected proposal: IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
[I] Nov 11 16:20:21 ipsec: 13[IKE] remote host is behind NAT
[I] Nov 11 16:20:22 ipsec: 15[IKE] received 73 cert requests for an unknown ca
[I] Nov 11 16:20:22 ipsec: 15[CFG] looking for peer configs matching 213.33.195.46[%any]...81.211.81.53[192.168.1.98]
[I] Nov 11 16:20:22 ipsec: 15[CFG] selected peer config 'VirtualIPServerIKE2'
[I] Nov 11 16:20:22 ipsec: 15[IKE] initiating EAP_IDENTITY method (id 0x00)
[I] Nov 11 16:20:22 ipsec: 15[IKE] peer supports MOBIKE, but disabled in config
[I] Nov 11 16:20:22 ipsec: 15[IKE] authentication of 'sakdjfwelfwe.keenetic.link' (myself) with RSA signature successful
[I] Nov 11 16:20:22 ipsec: 15[IKE] sending end entity cert "CN=sakdjfwelfwe.keenetic.link"
[I] Nov 11 16:20:22 ipsec: 15[IKE] sending issuer cert "C=US, O=Let's Encrypt, CN=R10"
[I] Nov 11 16:20:22 ipsec: 03[IKE] received EAP identity 'buh'
[I] Nov 11 16:20:22 ipsec: 03[IKE] initiating EAP_MSCHAPV2 method (id 0xEC)
[I] Nov 11 16:20:22 ipsec: 11[IKE] EAP method EAP_MSCHAPV2 succeeded, MSK established
[I] Nov 11 16:20:22 ipsec: 07[IKE] authentication of '192.168.1.98' with EAP successful
[I] Nov 11 16:20:22 ipsec: 07[IKE] authentication of 'sakdjfwelfwe.keenetic.link' (myself) with EAP
[I] Nov 11 16:20:22 ipsec: 07[IKE] IKE_SA VirtualIPServerIKE2[1525] established between 213.33.195.46[sakdjfwelfwe.keenetic.link]...81.211.81.53[192.168.1.98]
[I] Nov 11 16:20:22 ipsec: 07[IKE] peer requested virtual IP %any
[I] Nov 11 16:20:22 ndm: Core::Server: started Session /var/run/ndm.core.socket.
[I] Nov 11 16:20:22 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": allocated address "172.20.8.1" for user "buh" @ "192.168.1.98" from "81.211.81.53".
[I] Nov 11 16:20:22 ndm: Core::Session: client disconnected.
[I] Nov 11 16:20:22 ipsec: 07[IKE] assigning virtual IP 172.20.8.1 to peer 'buh'
[I] Nov 11 16:20:22 ipsec: 07[IKE] peer requested virtual IP %any6
[I] Nov 11 16:20:22 ipsec: 07[IKE] no virtual IP found for %any6 requested by 'buh'
[I] Nov 11 16:20:22 ipsec: 07[CFG] received proposals: ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:NULL/HMAC_SHA1_96/NO_EXT_SEQ
[I] Nov 11 16:20:22 ipsec: 07[CFG] configured proposals: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA2_256_128/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA2_256_128/NO_EXT_SEQ
[I] Nov 11 16:20:22 ipsec: 07[CFG] selected proposal: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ
[I] Nov 11 16:20:22 ipsec: 07[IKE] CHILD_SA VirtualIPServerIKE2{4961} established with SPIs cf51480a_i 1a6ef356_o and TS 0.0.0.0/0 === 172.20.8.1/32
[W] Nov 11 16:20:22 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": crypto map is up: remote client "buh" @ "192.168.1.98" with IP "172.20.8.1" connected.
[I] Nov 11 16:20:22 ipsec: 07[CFG] scheduling RADIUS Interim-Updates every 5s
[I] Nov 11 16:20:22 ndm: IpSec::Netfilter: start reloading netfilter configuration...
[I] Nov 11 16:20:22 ndm: IpSec::Netfilter: netfilter configuration reloading is done.
[I] Nov 11 16:20:25 ndhcps: DHCPINFORM received for 172.20.8.1 from 00:00:00:00:00:00.
[I] Nov 11 16:20:25 ndhcps: sending INFORM to 00:00:00:00:00:00.
[I] Nov 11 16:20:59 ipsec: 05[IKE] received MS NT5 ISAKMPOAKLEY v9 vendor ID
[I] Nov 11 16:20:59 ipsec: 05[IKE] received MS-Negotiation Discovery Capable vendor ID
[I] Nov 11 16:20:59 ipsec: 05[IKE] received Vid-Initial-Contact vendor ID
[I] Nov 11 16:20:59 ipsec: 05[IKE] 95.55.35.180 is initiating an IKE_SA
[I] Nov 11 16:20:59 ipsec: 05[CFG] received proposals: IKE:3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:3DES_CBC/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:3DES_CBC/HMAC_SHA2_384_192/PRF_HMAC_SHA2_384/MODP_1024, IKE:AES_CBC=128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_CBC=128/HMAC_SHA2_384_192/PRF_HMAC_SHA2_384/MODP_1024, IKE:AES_CBC=192/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC=192/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_CBC=192/HMAC_SHA2_384_192/PRF_HMAC_SHA2_384/MODP_1024, IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_CBC=256/HMAC_SHA2_384_192/PRF_HMAC_SHA2_384/MODP_1024, IKE:AES_GCM_16=128/PRF_HMAC_SHA1/MODP_1024, IKE:AES_GCM_16=128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_GCM_16=128/PRF_HMAC_SHA2_384/MODP_1024, IKE:AES_GCM_16=256/PRF_HMAC_SHA1/MODP_1024, IKE:AES_GCM_16=256/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_GCM_16=256/ [...]
[I] Nov 11 16:20:59 ipsec: 05[CFG] configured proposals: IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_2048, IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/ECP_384, IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/ECP_256, IKE:AES_CBC=128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC=128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_2048, IKE:AES_CBC=128/HMAC_SHA1_96/PRF_HMAC_SHA1/ECP_384, IKE:AES_CBC=128/HMAC_SHA1_96/PRF_HMAC_SHA1/ECP_256, IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_2048, IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/ECP_384, IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/ECP_256, IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_2048, IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/ECP_384, IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/ECP_256
[I] Nov 11 16:20:59 ipsec: 05[CFG] selected proposal: IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
[I] Nov 11 16:20:59 ipsec: 05[IKE] remote host is behind NAT
[I] Nov 11 16:20:59 ipsec: 09[IKE] received 46 cert requests for an unknown ca
[I] Nov 11 16:20:59 ipsec: 09[CFG] looking for peer configs matching 213.33.195.46[%any]...95.55.35.180[192.168.0.4]
[I] Nov 11 16:20:59 ipsec: 09[CFG] selected peer config 'VirtualIPServerIKE2'
[I] Nov 11 16:20:59 ipsec: 09[IKE] initiating EAP_IDENTITY method (id 0x00)
[I] Nov 11 16:20:59 ipsec: 09[IKE] peer supports MOBIKE, but disabled in config
[I] Nov 11 16:20:59 ipsec: 09[IKE] authentication of 'sakdjfwelfwe.keenetic.link' (myself) with RSA signature successful
[I] Nov 11 16:20:59 ipsec: 09[IKE] sending end entity cert "CN=sakdjfwelfwe.keenetic.link"
[I] Nov 11 16:20:59 ipsec: 09[IKE] sending issuer cert "C=US, O=Let's Encrypt, CN=R10"
[I] Nov 11 16:21:00 ipsec: 11[IKE] received EAP identity 'metodist5'
[I] Nov 11 16:21:00 ipsec: 11[IKE] initiating EAP_MSCHAPV2 method (id 0x29)
[I] Nov 11 16:21:00 ipsec: 05[IKE] EAP method EAP_MSCHAPV2 succeeded, MSK established
[I] Nov 11 16:21:00 ipsec: 14[IKE] authentication of '192.168.0.4' with EAP successful
[I] Nov 11 16:21:00 ipsec: 14[IKE] authentication of 'sakdjfwelfwe.keenetic.link' (myself) with EAP
[I] Nov 11 16:21:00 ipsec: 14[IKE] IKE_SA VirtualIPServerIKE2[1526] established between 213.33.195.46[sakdjfwelfwe.keenetic.link]...95.55.35.180[192.168.0.4]
[I] Nov 11 16:21:00 ipsec: 14[IKE] peer requested virtual IP %any
[I] Nov 11 16:21:00 ndm: Core::Server: started Session /var/run/ndm.core.socket.
[I] Nov 11 16:21:00 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": allocated address "172.20.8.3" for user "metodist5" @ "192.168.0.4" from "95.55.35.180".
[I] Nov 11 16:21:00 ndm: Core::Session: client disconnected.
[I] Nov 11 16:21:00 ipsec: 14[IKE] assigning virtual IP 172.20.8.3 to peer 'metodist5'
[I] Nov 11 16:21:00 ipsec: 14[IKE] peer requested virtual IP %any6
[I] Nov 11 16:21:00 ipsec: 14[IKE] no virtual IP found for %any6 requested by 'metodist5'
[I] Nov 11 16:21:00 ipsec: 14[CFG] received proposals: ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:NULL/HMAC_SHA1_96/NO_EXT_SEQ
[I] Nov 11 16:21:00 ipsec: 14[CFG] configured proposals: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA2_256_128/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA2_256_128/NO_EXT_SEQ
[I] Nov 11 16:21:00 ipsec: 14[CFG] selected proposal: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ
[I] Nov 11 16:21:00 ipsec: 14[IKE] CHILD_SA VirtualIPServerIKE2{4962} established with SPIs c6e50121_i 7ac03e24_o and TS 0.0.0.0/0 === 172.20.8.3/32
[W] Nov 11 16:21:00 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": crypto map is up: remote client "metodist5" @ "192.168.0.4" with IP "172.20.8.3" connected.
[I] Nov 11 16:21:00 ipsec: 14[CFG] scheduling RADIUS Interim-Updates every 5s
[I] Nov 11 16:21:00 ndm: IpSec::Netfilter: start reloading netfilter configuration...
[I] Nov 11 16:21:00 ndm: IpSec::Netfilter: netfilter configuration reloading is done.
[I] Nov 11 16:21:02 ndhcps: DHCPINFORM received for 172.20.8.3 from 00:00:00:00:00:00.
[I] Nov 11 16:21:02 ndhcps: sending INFORM to 00:00:00:00:00:00.
[I] Nov 11 16:21:22 ipsec: 12[IKE] received DELETE for ESP CHILD_SA with SPI 95038c86
[I] Nov 11 16:21:22 ipsec: 12[IKE] closing CHILD_SA VirtualIPServerIKE2{4953} with SPIs cf7ac52f_i (80979 bytes) 95038c86_o (393204 bytes) and TS 0.0.0.0/0 === 172.20.8.2/32
[I] Nov 11 16:21:22 ipsec: 12[IKE] sending DELETE for ESP CHILD_SA with SPI cf7ac52f
[I] Nov 11 16:21:22 ipsec: 12[IKE] CHILD_SA closed
[I] Nov 11 16:21:22 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": active CHILD SAs for user "urist".
[I] Nov 11 16:21:22 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": "0" = "3480929583".
[I] Nov 11 16:21:22 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": "1" = "2500037766".
[W] Nov 11 16:21:22 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": crypto map remote client "urist" @ "192.168.1.43" from "81.211.81.53" disconnected.
[I] Nov 11 16:21:22 ndm: IpSec::Netfilter: start reloading netfilter configuration...
[I] Nov 11 16:21:22 ndm: IpSec::Netfilter: netfilter configuration reloading is done.
[I] Nov 11 16:21:23 ndhcps: DHCPREQUEST received (STATE_RENEWING) for 172.16.1.188 from 80:e8:2c:f5:64:35.
[I] Nov 11 16:21:23 ndhcps: sending ACK of 172.16.1.188 to 80:e8:2c:f5:64:35.
[I] Nov 11 16:21:28 ipsec: 03[CFG] received proposals: ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:NULL/HMAC_SHA1_96/NO_EXT_SEQ
[I] Nov 11 16:21:28 ipsec: 03[CFG] configured proposals: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA2_256_128/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA2_256_128/NO_EXT_SEQ
[I] Nov 11 16:21:28 ipsec: 03[CFG] selected proposal: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ
[I] Nov 11 16:21:28 ipsec: 03[IKE] CHILD_SA VirtualIPServerIKE2{4963} established with SPIs c6c4af17_i fb6aa2fc_o and TS 0.0.0.0/0 === 172.20.8.2/32
[I] Nov 11 16:21:28 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": active CHILD SAs for user "urist".
[I] Nov 11 16:21:28 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": "0" = "3334778647".
[I] Nov 11 16:21:28 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": "1" = "4218069756".
[W] Nov 11 16:21:28 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": crypto map is up: remote client "urist" @ "192.168.1.43" with IP "172.20.8.2" connected.
[I] Nov 11 16:21:28 ndm: IpSec::Netfilter: start reloading netfilter configuration...
[I] Nov 11 16:21:28 ndm: IpSec::Netfilter: netfilter configuration reloading is done.
[I] Nov 11 16:22:14 dropbear: Child connection from 81.161.238.160:56178
[I] Nov 11 16:22:18 ndm: Core::Server: started Session /var/run/ndm.core.socket.
[E] Nov 11 16:22:18 ndm: Core::Authenticator: access to "cli" denied for user "root".
[E] Nov 11 16:22:18 ndm: Core::Authenticator: access to "sftp" denied for user "root".
[W] Nov 11 16:22:18 dropbear: Bad password attempt for 'root' from 81.161.238.160:56178
[I] Nov 11 16:22:18 ndm: Core::Session: client disconnected.
[I] Nov 11 16:22:19 ipsec: 09[IKE] received MS NT5 ISAKMPOAKLEY v9 vendor ID
[I] Nov 11 16:22:19 ipsec: 09[IKE] received MS-Negotiation Discovery Capable vendor ID
[I] Nov 11 16:22:19 ipsec: 09[IKE] received Vid-Initial-Contact vendor ID
[I] Nov 11 16:22:19 ipsec: 09[IKE] 37.122.20.103 is initiating an IKE_SA
[I] Nov 11 16:22:19 ipsec: 09[CFG] received proposals: IKE:3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:3DES_CBC/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:3DES_CBC/HMAC_SHA2_384_192/PRF_HMAC_SHA2_384/MODP_1024, IKE:AES_CBC=128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_CBC=128/HMAC_SHA2_384_192/PRF_HMAC_SHA2_384/MODP_1024, IKE:AES_CBC=192/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC=192/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_CBC=192/HMAC_SHA2_384_192/PRF_HMAC_SHA2_384/MODP_1024, IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_CBC=256/HMAC_SHA2_384_192/PRF_HMAC_SHA2_384/MODP_1024, IKE:AES_GCM_16=128/PRF_HMAC_SHA1/MODP_1024, IKE:AES_GCM_16=128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_GCM_16=128/PRF_HMAC_SHA2_384/MODP_1024, IKE:AES_GCM_16=256/PRF_HMAC_SHA1/MODP_1024, IKE:AES_GCM_16=256/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_GCM_16=256/ [...]
[I] Nov 11 16:22:19 ipsec: 09[CFG] configured proposals: IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_2048, IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/ECP_384, IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/ECP_256, IKE:AES_CBC=128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC=128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_2048, IKE:AES_CBC=128/HMAC_SHA1_96/PRF_HMAC_SHA1/ECP_384, IKE:AES_CBC=128/HMAC_SHA1_96/PRF_HMAC_SHA1/ECP_256, IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_2048, IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/ECP_384, IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/ECP_256, IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_2048, IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/ECP_384, IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/ECP_256
[I] Nov 11 16:22:19 ipsec: 09[CFG] selected proposal: IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
[I] Nov 11 16:22:19 ipsec: 09[IKE] remote host is behind NAT
[I] Nov 11 16:22:19 dropbear: Exit before auth from <81.161.238.160:56178>: (user 'root', 1 fails): Exited normally
[I] Nov 11 16:22:19 ipsec: 08[IKE] received 279 cert requests for an unknown ca
[I] Nov 11 16:22:19 ipsec: 08[CFG] looking for peer configs matching 213.33.195.46[%any]...37.122.20.103[192.168.0.32]
[I] Nov 11 16:22:19 ipsec: 08[CFG] selected peer config 'VirtualIPServerIKE2'
[I] Nov 11 16:22:19 ipsec: 08[IKE] initiating EAP_IDENTITY method (id 0x00)
[I] Nov 11 16:22:19 ipsec: 08[IKE] peer supports MOBIKE, but disabled in config
[I] Nov 11 16:22:19 ipsec: 08[IKE] authentication of 'sakdjfwelfwe.keenetic.link' (myself) with RSA signature successful
[I] Nov 11 16:22:19 ipsec: 08[IKE] sending end entity cert "CN=sakdjfwelfwe.keenetic.link"
[I] Nov 11 16:22:19 ipsec: 08[IKE] sending issuer cert "C=US, O=Let's Encrypt, CN=R10"
[I] Nov 11 16:22:49 ipsec: 08[JOB] deleting half open IKE_SA with 37.122.20.103 after timeout
[I] Nov 11 16:23:02 ipsec: 11[IKE] retransmit 1 of request with message ID 16
[I] Nov 11 16:25:22 ipsec: 03[IKE] received DELETE for ESP CHILD_SA with SPI a7348cb0
[I] Nov 11 16:25:22 ipsec: 03[IKE] closing CHILD_SA VirtualIPServerIKE2{4958} with SPIs cb91fb1a_i (32994 bytes) a7348cb0_o (16185 bytes) and TS 0.0.0.0/0 === 172.20.8.1/32
[I] Nov 11 16:25:22 ipsec: 03[IKE] sending DELETE for ESP CHILD_SA with SPI cb91fb1a
[I] Nov 11 16:25:22 ipsec: 03[IKE] CHILD_SA closed
[I] Nov 11 16:25:22 ndm: IpSec::Netfilter: start reloading netfilter configuration...
[I] Nov 11 16:25:22 ipsec: 12[CFG] received proposals: ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:NULL/HMAC_SHA1_96/NO_EXT_SEQ
[I] Nov 11 16:25:22 ipsec: 12[CFG] configured proposals: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA2_256_128/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA2_256_128/NO_EXT_SEQ
[I] Nov 11 16:25:22 ipsec: 12[CFG] selected proposal: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ
[I] Nov 11 16:25:22 ipsec: 12[IKE] CHILD_SA VirtualIPServerIKE2{4964} established with SPIs c25a3303_i d6e03dd8_o and TS 0.0.0.0/0 === 172.20.8.1/32
[I] Nov 11 16:25:22 ndm: IpSec::Netfilter: netfilter configuration reloading is done.
[E] Nov 11 16:25:22 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": unable to find client "metodist" @ "192.168.1.149" from "188.64.164.33".
[C] Nov 11 16:25:22 ndm: IpSec::Configurator: "VirtualIPServerIKE2": out of memory [0xcffe0dcc].
[I] Nov 11 16:25:22 ndm: IpSec::Netfilter: start reloading netfilter configuration...
[I] Nov 11 16:25:22 ndm: IpSec::Netfilter: netfilter configuration reloading is done.
[I] Nov 11 16:25:28 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(32:5c:4a:56:a2:9d) had associated (has FT caps).
[I] Nov 11 16:25:28 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(32:5c:4a:56:a2:9d) set key done in WPA2/WPA2PSK.
[I] Nov 11 16:25:28 ndhcps: DHCPREQUEST received (STATE_INIT) for 172.16.1.197 from 32:5c:4a:56:a2:9d.
[I] Nov 11 16:25:29 ndhcps: sending ACK of 172.16.1.197 to 32:5c:4a:56:a2:9d.
[I] Nov 11 16:26:24 ipsec: 13[IKE] received DELETE for ESP CHILD_SA with SPI 6c6afcbc
[I] Nov 11 16:26:24 ipsec: 13[IKE] closing CHILD_SA VirtualIPServerIKE2{4957} with SPIs cae8b6a3_i (12211 bytes) 6c6afcbc_o (10349 bytes) and TS 0.0.0.0/0 === 172.20.8.2/32
[I] Nov 11 16:26:24 ipsec: 13[IKE] sending DELETE for ESP CHILD_SA with SPI cae8b6a3
[I] Nov 11 16:26:24 ipsec: 13[IKE] CHILD_SA closed
[I] Nov 11 16:26:24 ndm: IpSec::Netfilter: start reloading netfilter configuration...
[I] Nov 11 16:26:24 ndm: IpSec::Netfilter: netfilter configuration reloading is done.
[I] Nov 11 16:26:24 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster1/AccessPoint0": STA(32:5c:4a:56:a2:9d) FT authenticated successfully.
[I] Nov 11 16:26:24 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster1/AccessPoint0": STA(32:5c:4a:56:a2:9d) had re-associated from 50:ff:20:62:07:5c (FT roam).
[I] Nov 11 16:26:32 ipsec: 07[CFG] received proposals: ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:NULL/HMAC_SHA1_96/NO_EXT_SEQ
[I] Nov 11 16:26:32 ipsec: 07[CFG] configured proposals: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA2_256_128/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA2_256_128/NO_EXT_SEQ
[I] Nov 11 16:26:32 ipsec: 07[CFG] selected proposal: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ
[I] Nov 11 16:26:32 ipsec: 07[IKE] CHILD_SA VirtualIPServerIKE2{4965} established with SPIs cc6398fb_i 5199c94c_o and TS 0.0.0.0/0 === 172.20.8.2/32
[E] Nov 11 16:26:33 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": unable to find client "urist2" @ "192.168.1.100" from "81.211.81.53".
[C] Nov 11 16:26:33 ndm: IpSec::Configurator: "VirtualIPServerIKE2": out of memory [0xcffe0dcc].
[I] Nov 11 16:26:33 ndm: IpSec::Netfilter: start reloading netfilter configuration...
[I] Nov 11 16:26:33 ndm: IpSec::Netfilter: netfilter configuration reloading is done.
[I] Nov 11 16:28:06 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(7e:fb:25:d2:79:ed) FT authenticated successfully.
[I] Nov 11 16:28:06 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(7e:fb:25:d2:79:ed) had re-associated from 50:ff:20:62:07:5c (FT roam).
[I] Nov 11 16:30:00 ipsec: 13[IKE] received DELETE for ESP CHILD_SA with SPI 1a6ef356
[I] Nov 11 16:30:00 ipsec: 13[IKE] closing CHILD_SA VirtualIPServerIKE2{4961} with SPIs cf51480a_i (116055 bytes) 1a6ef356_o (318045 bytes) and TS 0.0.0.0/0 === 172.20.8.1/32
[I] Nov 11 16:30:00 ipsec: 13[IKE] sending DELETE for ESP CHILD_SA with SPI cf51480a
[I] Nov 11 16:30:00 ipsec: 13[IKE] CHILD_SA closed
[I] Nov 11 16:30:00 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": active CHILD SAs for user "buh".
[W] Nov 11 16:30:00 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": crypto map remote client "buh" @ "192.168.1.98" from "81.211.81.53" disconnected.
[I] Nov 11 16:30:00 ndm: IpSec::Netfilter: start reloading netfilter configuration...
[I] Nov 11 16:30:00 ndm: IpSec::Netfilter: netfilter configuration reloading is done.
[I] Nov 11 16:30:24 ipsec: 10[CFG] received proposals: ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:NULL/HMAC_SHA1_96/NO_EXT_SEQ
[I] Nov 11 16:30:24 ipsec: 10[CFG] configured proposals: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA2_256_128/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA2_256_128/NO_EXT_SEQ
[I] Nov 11 16:30:24 ipsec: 10[CFG] selected proposal: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ
[I] Nov 11 16:30:24 ipsec: 10[IKE] CHILD_SA VirtualIPServerIKE2{4966} established with SPIs cbaf5ba8_i 3da76c7a_o and TS 0.0.0.0/0 === 172.20.8.1/32
[I] Nov 11 16:30:24 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": active CHILD SAs for user "buh".
[I] Nov 11 16:30:24 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": "0" = "3417267112".
[I] Nov 11 16:30:24 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": "1" = "1034382458".
[W] Nov 11 16:30:24 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": crypto map is up: remote client "buh" @ "192.168.1.98" with IP "172.20.8.1" connected.
[I] Nov 11 16:30:24 ndm: IpSec::Netfilter: start reloading netfilter configuration...
[I] Nov 11 16:30:24 ndm: IpSec::Netfilter: netfilter configuration reloading is done.
[I] Nov 11 16:30:32 ipsec: 07[IKE] retransmit 1 of request with message ID 1
[I] Nov 11 16:31:23 ipsec: 10[IKE] received DELETE for ESP CHILD_SA with SPI fb6aa2fc
[I] Nov 11 16:31:23 ipsec: 10[IKE] closing CHILD_SA VirtualIPServerIKE2{4963} with SPIs c6c4af17_i (4611 bytes) fb6aa2fc_o (6392 bytes) and TS 0.0.0.0/0 === 172.20.8.2/32
[I] Nov 11 16:31:23 ipsec: 10[IKE] sending DELETE for ESP CHILD_SA with SPI c6c4af17
[I] Nov 11 16:31:23 ipsec: 10[IKE] CHILD_SA closed
[I] Nov 11 16:31:23 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": active CHILD SAs for user "urist".
[I] Nov 11 16:31:23 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": "0" = "3334778647".
[I] Nov 11 16:31:23 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": "1" = "4218069756".
[W] Nov 11 16:31:23 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": crypto map remote client "urist" @ "192.168.1.43" from "81.211.81.53" disconnected.
[I] Nov 11 16:31:23 ndm: IpSec::Netfilter: start reloading netfilter configuration...
[I] Nov 11 16:31:23 ndm: IpSec::Netfilter: netfilter configuration reloading is done.
[I] Nov 11 16:31:33 ipsec: 13[CFG] received proposals: ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:NULL/HMAC_SHA1_96/NO_EXT_SEQ
[I] Nov 11 16:31:33 ipsec: 13[CFG] configured proposals: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA2_256_128/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA2_256_128/NO_EXT_SEQ
[I] Nov 11 16:31:33 ipsec: 13[CFG] selected proposal: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ
[I] Nov 11 16:31:33 ipsec: 13[IKE] CHILD_SA VirtualIPServerIKE2{4967} established with SPIs c8faa1e0_i eddb3678_o and TS 0.0.0.0/0 === 172.20.8.2/32
[I] Nov 11 16:31:33 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": active CHILD SAs for user "urist".
[I] Nov 11 16:31:33 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": "0" = "3371868640".
[I] Nov 11 16:31:33 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": "1" = "3990566520".
[W] Nov 11 16:31:33 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": crypto map is up: remote client "urist" @ "192.168.1.43" with IP "172.20.8.2" connected.
[I] Nov 11 16:31:33 ndm: IpSec::Netfilter: start reloading netfilter configuration...
[I] Nov 11 16:31:33 ndm: IpSec::Netfilter: netfilter configuration reloading is done.
[I] Nov 11 16:32:06 ndhcps: DHCPREQUEST received (STATE_RENEWING) for 172.16.1.156 from 98:ee:cb:c3:a4:7b.
[I] Nov 11 16:32:06 ndhcps: sending ACK of 172.16.1.156 to 98:ee:cb:c3:a4:7b.
[I] Nov 11 16:33:46 ipsec: 11[IKE] retransmit 1 of request with message ID 2
[I] Nov 11 16:35:00 ipsec: 05[IKE] received DELETE for ESP CHILD_SA with SPI d6e03dd8
[I] Nov 11 16:35:00 ipsec: 05[IKE] closing CHILD_SA VirtualIPServerIKE2{4964} with SPIs c25a3303_i (15566 bytes) d6e03dd8_o (1940 bytes) and TS 0.0.0.0/0 === 172.20.8.1/32
[I] Nov 11 16:35:00 ipsec: 05[IKE] sending DELETE for ESP CHILD_SA with SPI c25a3303
[I] Nov 11 16:35:00 ipsec: 05[IKE] CHILD_SA closed
[I] Nov 11 16:35:00 ndm: IpSec::Netfilter: start reloading netfilter configuration...
[I] Nov 11 16:35:00 ndm: IpSec::Netfilter: netfilter configuration reloading is done.
[I] Nov 11 16:35:15 ipsec: 08[IKE] retransmit 1 of request with message ID 3
[I] Nov 11 16:35:16 ipsec: 06[CFG] received proposals: ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:NULL/HMAC_SHA1_96/NO_EXT_SEQ
[I] Nov 11 16:35:16 ipsec: 06[CFG] configured proposals: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA2_256_128/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA2_256_128/NO_EXT_SEQ
[I] Nov 11 16:35:16 ipsec: 06[CFG] selected proposal: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ
[I] Nov 11 16:35:16 ipsec: 06[IKE] CHILD_SA VirtualIPServerIKE2{4968} established with SPIs c5c9473b_i c813308e_o and TS 0.0.0.0/0 === 172.20.8.1/32
[E] Nov 11 16:35:16 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": unable to find client "metodist" @ "192.168.1.149" from "188.64.164.33".
[C] Nov 11 16:35:16 ndm: IpSec::Configurator: "VirtualIPServerIKE2": out of memory [0xcffe0dcc].
[I] Nov 11 16:35:16 ndm: IpSec::Netfilter: start reloading netfilter configuration...
[I] Nov 11 16:35:16 ndm: IpSec::Netfilter: netfilter configuration reloading is done.
[I] Nov 11 16:35:33 bndstrg: band steering: send BTM request to 7e:fb:25:d2:79:ed for roam to 5GHz band
[I] Nov 11 16:35:34 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(7e:fb:25:d2:79:ed) had associated (has FT caps).
[I] Nov 11 16:35:34 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(7e:fb:25:d2:79:ed) set key done in WPA2/WPA2PSK.
[I] Nov 11 16:35:34 ndhcps: DHCPREQUEST received (STATE_INIT) for 172.16.1.174 from 7e:fb:25:d2:79:ed.
[I] Nov 11 16:35:35 ndhcps: sending ACK of 172.16.1.174 to 7e:fb:25:d2:79:ed.
[I] Nov 11 16:36:04 bndstrg: band steering: send BTM request to 7e:fb:25:d2:79:ed for roam to 5GHz band
[I] Nov 11 16:36:05 bndstrg: band steering: WNM client 7e:fb:25:d2:79:ed accepted 5GHz band
[I] Nov 11 16:36:05 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster1/AccessPoint0": STA(7e:fb:25:d2:79:ed) FT authenticated successfully.
[I] Nov 11 16:36:05 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster1/AccessPoint0": STA(7e:fb:25:d2:79:ed) had re-associated from 52:ff:20:82:07:5c (FT roam).
[I] Nov 11 16:36:15 ipsec: 05[IKE] received DELETE for ESP CHILD_SA with SPI 5199c94c
[I] Nov 11 16:36:15 ipsec: 05[IKE] closing CHILD_SA VirtualIPServerIKE2{4965} with SPIs cc6398fb_i (11259 bytes) 5199c94c_o (6535 bytes) and TS 0.0.0.0/0 === 172.20.8.2/32
[I] Nov 11 16:36:15 ipsec: 05[IKE] sending DELETE for ESP CHILD_SA with SPI cc6398fb
[I] Nov 11 16:36:15 ipsec: 05[IKE] CHILD_SA closed
[I] Nov 11 16:36:16 ndm: IpSec::Netfilter: start reloading netfilter configuration...
[I] Nov 11 16:36:16 ndm: IpSec::Netfilter: netfilter configuration reloading is done.
[I] Nov 11 16:36:25 ipsec: 12[CFG] received proposals: ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:NULL/HMAC_SHA1_96/NO_EXT_SEQ
[I] Nov 11 16:36:25 ipsec: 12[CFG] configured proposals: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA2_256_128/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA2_256_128/NO_EXT_SEQ
[I] Nov 11 16:36:25 ipsec: 12[CFG] selected proposal: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ
[I] Nov 11 16:36:25 ipsec: 12[IKE] CHILD_SA VirtualIPServerIKE2{4969} established with SPIs c5d66e6f_i 16ee5a36_o and TS 0.0.0.0/0 === 172.20.8.2/32
[E] Nov 11 16:36:25 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": unable to find client "urist2" @ "192.168.1.100" from "81.211.81.53".
[C] Nov 11 16:36:25 ndm: IpSec::Configurator: "VirtualIPServerIKE2": out of memory [0xcffe0dcc].
[I] Nov 11 16:36:25 ndm: IpSec::Netfilter: start reloading netfilter configuration...
[I] Nov 11 16:36:25 ndm: IpSec::Netfilter: netfilter configuration reloading is done.
[I] Nov 11 16:36:39 ipsec: 12[IKE] received DELETE for ESP CHILD_SA with SPI 3da76c7a
[I] Nov 11 16:36:39 ipsec: 12[IKE] closing CHILD_SA VirtualIPServerIKE2{4966} with SPIs cbaf5ba8_i (22735 bytes) 3da76c7a_o (9064 bytes) and TS 0.0.0.0/0 === 172.20.8.1/32
[I] Nov 11 16:36:39 ipsec: 12[IKE] sending DELETE for ESP CHILD_SA with SPI cbaf5ba8
[I] Nov 11 16:36:39 ipsec: 12[IKE] CHILD_SA closed
[I] Nov 11 16:36:39 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": active CHILD SAs for user "buh".
[I] Nov 11 16:36:39 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": "0" = "3417267112".
[I] Nov 11 16:36:39 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": "1" = "1034382458".
[W] Nov 11 16:36:39 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": crypto map remote client "buh" @ "192.168.1.98" from "81.211.81.53" disconnected.
[I] Nov 11 16:36:40 ndm: IpSec::Netfilter: start reloading netfilter configuration...
[I] Nov 11 16:36:40 ipsec: 10[IKE] received DELETE for IKE_SA VirtualIPServerIKE2[1525]
[I] Nov 11 16:36:40 ipsec: 10[IKE] deleting IKE_SA VirtualIPServerIKE2[1525] between 213.33.195.46[sakdjfwelfwe.keenetic.link]...81.211.81.53[192.168.1.98]
[I] Nov 11 16:36:40 ipsec: 10[IKE] IKE_SA deleted
[I] Nov 11 16:36:40 ndm: IpSec::Netfilter: netfilter configuration reloading is done.
[I] Nov 11 16:36:41 ipsec: 12[IKE] received MS NT5 ISAKMPOAKLEY v9 vendor ID
[I] Nov 11 16:36:41 ipsec: 12[IKE] received MS-Negotiation Discovery Capable vendor ID
[I] Nov 11 16:36:41 ipsec: 12[IKE] received Vid-Initial-Contact vendor ID
[I] Nov 11 16:36:41 ipsec: 12[IKE] 81.211.81.53 is initiating an IKE_SA
[I] Nov 11 16:36:41 ipsec: 12[CFG] received proposals: IKE:3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:3DES_CBC/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:3DES_CBC/HMAC_SHA2_384_192/PRF_HMAC_SHA2_384/MODP_1024, IKE:AES_CBC=128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_CBC=128/HMAC_SHA2_384_192/PRF_HMAC_SHA2_384/MODP_1024, IKE:AES_CBC=192/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC=192/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_CBC=192/HMAC_SHA2_384_192/PRF_HMAC_SHA2_384/MODP_1024, IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_CBC=256/HMAC_SHA2_384_192/PRF_HMAC_SHA2_384/MODP_1024, IKE:AES_GCM_16=128/PRF_HMAC_SHA1/MODP_1024, IKE:AES_GCM_16=128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_GCM_16=128/PRF_HMAC_SHA2_384/MODP_1024, IKE:AES_GCM_16=256/PRF_HMAC_SHA1/MODP_1024, IKE:AES_GCM_16=256/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_GCM_16=256/ [...]
[I] Nov 11 16:36:41 ipsec: 12[CFG] configured proposals: IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_2048, IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/ECP_384, IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/ECP_256, IKE:AES_CBC=128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC=128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_2048, IKE:AES_CBC=128/HMAC_SHA1_96/PRF_HMAC_SHA1/ECP_384, IKE:AES_CBC=128/HMAC_SHA1_96/PRF_HMAC_SHA1/ECP_256, IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_2048, IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/ECP_384, IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/ECP_256, IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_2048, IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/ECP_384, IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/ECP_256
[I] Nov 11 16:36:41 ipsec: 12[CFG] selected proposal: IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
[I] Nov 11 16:36:41 ipsec: 12[IKE] remote host is behind NAT
[I] Nov 11 16:36:41 ipsec: 15[IKE] received 73 cert requests for an unknown ca
[I] Nov 11 16:36:41 ipsec: 15[CFG] looking for peer configs matching 213.33.195.46[%any]...81.211.81.53[192.168.1.98]
[I] Nov 11 16:36:41 ipsec: 15[CFG] selected peer config 'VirtualIPServerIKE2'
[I] Nov 11 16:36:41 ipsec: 15[IKE] initiating EAP_IDENTITY method (id 0x00)
[I] Nov 11 16:36:41 ipsec: 15[IKE] peer supports MOBIKE, but disabled in config
[I] Nov 11 16:36:41 ipsec: 15[IKE] authentication of 'sakdjfwelfwe.keenetic.link' (myself) with RSA signature successful
[I] Nov 11 16:36:41 ipsec: 15[IKE] sending end entity cert "CN=sakdjfwelfwe.keenetic.link"
[I] Nov 11 16:36:41 ipsec: 15[IKE] sending issuer cert "C=US, O=Let's Encrypt, CN=R10"
[I] Nov 11 16:36:41 ipsec: 09[IKE] received EAP identity 'buh'
[I] Nov 11 16:36:41 ipsec: 09[IKE] initiating EAP_MSCHAPV2 method (id 0xFD)
[I] Nov 11 16:36:41 ipsec: 06[IKE] EAP method EAP_MSCHAPV2 succeeded, MSK established
[I] Nov 11 16:36:41 ipsec: 12[IKE] authentication of '192.168.1.98' with EAP successful
[I] Nov 11 16:36:41 ipsec: 12[IKE] authentication of 'sakdjfwelfwe.keenetic.link' (myself) with EAP
[I] Nov 11 16:36:41 ipsec: 12[IKE] IKE_SA VirtualIPServerIKE2[1528] established between 213.33.195.46[sakdjfwelfwe.keenetic.link]...81.211.81.53[192.168.1.98]
[I] Nov 11 16:36:41 ipsec: 12[IKE] peer requested virtual IP %any
[I] Nov 11 16:36:41 ndm: Core::Server: started Session /var/run/ndm.core.socket.
[I] Nov 11 16:36:41 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": allocated address "172.20.8.1" for user "buh" @ "192.168.1.98" from "81.211.81.53".
[I] Nov 11 16:36:41 ipsec: 12[IKE] assigning virtual IP 172.20.8.1 to peer 'buh'
[I] Nov 11 16:36:41 ipsec: 12[IKE] peer requested virtual IP %any6
[I] Nov 11 16:36:41 ipsec: 12[IKE] no virtual IP found for %any6 requested by 'buh'
[I] Nov 11 16:36:41 ipsec: 12[CFG] received proposals: ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:NULL/HMAC_SHA1_96/NO_EXT_SEQ
[I] Nov 11 16:36:41 ipsec: 12[CFG] configured proposals: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA2_256_128/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA2_256_128/NO_EXT_SEQ
[I] Nov 11 16:36:41 ipsec: 12[CFG] selected proposal: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ
[I] Nov 11 16:36:41 ndm: Core::Session: client disconnected.
[I] Nov 11 16:36:41 ipsec: 12[IKE] CHILD_SA VirtualIPServerIKE2{4970} established with SPIs cdcc2325_i 7865b3d4_o and TS 0.0.0.0/0 === 172.20.8.1/32
[W] Nov 11 16:36:41 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": crypto map is up: remote client "buh" @ "192.168.1.98" with IP "172.20.8.1" connected.
[I] Nov 11 16:36:41 ipsec: 12[CFG] scheduling RADIUS Interim-Updates every 5s
[I] Nov 11 16:36:41 ndm: IpSec::Netfilter: start reloading netfilter configuration...
[I] Nov 11 16:36:41 ndm: IpSec::Netfilter: netfilter configuration reloading is done.
[I] Nov 11 16:36:44 ndhcps: DHCPINFORM received for 172.20.8.1 from 00:00:00:00:00:00.
[I] Nov 11 16:36:44 ndhcps: sending INFORM to 00:00:00:00:00:00.
[I] Nov 11 16:37:49 ipsec: 12[IKE] retransmit 1 of request with message ID 6
[I] Nov 11 16:39:44 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster1/AccessPoint0": STA(32:5c:4a:56:a2:9d) had been aged-out and disassociated (idle silence).
[I] Nov 11 16:41:19 ipsec: 14[IKE] received DELETE for ESP CHILD_SA with SPI eddb3678
[I] Nov 11 16:41:19 ipsec: 14[IKE] closing CHILD_SA VirtualIPServerIKE2{4967} with SPIs c8faa1e0_i (10920 bytes) eddb3678_o (10443 bytes) and TS 0.0.0.0/0 === 172.20.8.2/32
[I] Nov 11 16:41:19 ipsec: 14[IKE] sending DELETE for ESP CHILD_SA with SPI c8faa1e0
[I] Nov 11 16:41:19 ipsec: 14[IKE] CHILD_SA closed
[I] Nov 11 16:41:19 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": active CHILD SAs for user "urist".
[I] Nov 11 16:41:19 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": "0" = "3371868640".
[I] Nov 11 16:41:19 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": "1" = "3990566520".
[W] Nov 11 16:41:19 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": crypto map remote client "urist" @ "192.168.1.43" from "81.211.81.53" disconnected.
[I] Nov 11 16:41:19 ndm: IpSec::Netfilter: start reloading netfilter configuration...
[I] Nov 11 16:41:19 ndm: IpSec::Netfilter: netfilter configuration reloading is done.
[I] Nov 11 16:41:26 ipsec: 03[IKE] retransmit 1 of request with message ID 469
[I] Nov 11 16:41:32 ipsec: 12[IKE] received DELETE for ESP CHILD_SA with SPI c813308e
[I] Nov 11 16:41:32 ipsec: 12[IKE] closing CHILD_SA VirtualIPServerIKE2{4968} with SPIs c5c9473b_i (15237 bytes) c813308e_o (798 bytes) and TS 0.0.0.0/0 === 172.20.8.1/32
[I] Nov 11 16:41:32 ipsec: 12[IKE] sending DELETE for ESP CHILD_SA with SPI c5c9473b
[I] Nov 11 16:41:32 ipsec: 12[IKE] CHILD_SA closed
[I] Nov 11 16:41:33 ndm: IpSec::Netfilter: start reloading netfilter configuration...
[I] Nov 11 16:41:33 ndm: IpSec::Netfilter: netfilter configuration reloading is done.
[I] Nov 11 16:41:38 ipsec: 07[CFG] received proposals: ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:NULL/HMAC_SHA1_96/NO_EXT_SEQ
[I] Nov 11 16:41:38 ipsec: 07[CFG] configured proposals: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA2_256_128/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA2_256_128/NO_EXT_SEQ
[I] Nov 11 16:41:38 ipsec: 07[CFG] selected proposal: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ
[I] Nov 11 16:41:38 ipsec: 07[IKE] CHILD_SA VirtualIPServerIKE2{4971} established with SPIs c1ec8967_i 85654b80_o and TS 0.0.0.0/0 === 172.20.8.2/32
[I] Nov 11 16:41:38 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": active CHILD SAs for user "urist".
[I] Nov 11 16:41:38 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": "0" = "3253504359".
[I] Nov 11 16:41:38 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": "1" = "2238008192".
[W] Nov 11 16:41:38 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": crypto map is up: remote client "urist" @ "192.168.1.43" with IP "172.20.8.2" connected.
[I] Nov 11 16:41:39 ndm: IpSec::Netfilter: start reloading netfilter configuration...
[I] Nov 11 16:41:39 ndm: IpSec::Netfilter: netfilter configuration reloading is done.
[I] Nov 11 16:41:44 ipsec: 11[CFG] received proposals: ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:NULL/HMAC_SHA1_96/NO_EXT_SEQ
[I] Nov 11 16:41:44 ipsec: 11[CFG] configured proposals: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA2_256_128/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA2_256_128/NO_EXT_SEQ
[I] Nov 11 16:41:44 ipsec: 11[CFG] selected proposal: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ
[I] Nov 11 16:41:44 ipsec: 11[IKE] CHILD_SA VirtualIPServerIKE2{4972} established with SPIs cd70d6d3_i 3b3d16fa_o and TS 0.0.0.0/0 === 172.20.8.1/32
[E] Nov 11 16:41:44 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": unable to find client "metodist" @ "192.168.1.149" from "188.64.164.33".
[C] Nov 11 16:41:44 ndm: IpSec::Configurator: "VirtualIPServerIKE2": out of memory [0xcffe0dcc].
[I] Nov 11 16:41:44 ndm: IpSec::Netfilter: start reloading netfilter configuration...