Перейти к содержанию

Рекомендуемые сообщения

Опубликовано

Всем привет. Может сможете помочь или направить куда-нибудь) Клиенты жалуются на обрыв VPN, как правило переподключение помогало, но иногда только перезагрузка компа. ОС Windows 10, 11. За один час было 29  out of memory

  • МодельGiga SE (KN-2410) EAEU
  • Сервисный код723-653-283-165-046
  • Версия ОС4.1.7
[I] Nov 11 15:43:46 ipsec: 12[CFG] received proposals: ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:NULL/HMAC_SHA1_96/NO_EXT_SEQ 
[I] Nov 11 15:43:46 ipsec: 12[CFG] configured proposals: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA2_256_128/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA2_256_128/NO_EXT_SEQ 
[I] Nov 11 15:43:46 ipsec: 12[CFG] selected proposal: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ 
[I] Nov 11 15:43:46 ipsec: 12[IKE] CHILD_SA VirtualIPServerIKE2{4934} established with SPIs cb531478_i 843647be_o and TS 0.0.0.0/0 === 172.20.8.1/32 
[E] Nov 11 15:43:46 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": unable to find client "metodist5" @ "192.168.0.4" from "95.55.35.180". 
[C] Nov 11 15:43:46 ndm: IpSec::Configurator: "VirtualIPServerIKE2": out of memory [0xcffe0dcc]. 
[I] Nov 11 15:43:47 ndm: IpSec::Netfilter: start reloading netfilter configuration... 
[I] Nov 11 15:43:47 ndm: IpSec::Netfilter: netfilter configuration reloading is done. 
[I] Nov 11 15:43:47 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had disassociated by STA (reason: STA is leaving or has left BSS). 
[I] Nov 11 15:43:50 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had associated. 
[I] Nov 11 15:43:55 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had disassociated by STA (reason: STA is leaving or has left BSS). 
[I] Nov 11 15:43:57 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had associated. 
[I] Nov 11 15:44:02 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had disassociated by STA (reason: STA is leaving or has left BSS). 
[I] Nov 11 15:44:08 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had associated. 
[I] Nov 11 15:44:08 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) set key done in WPA2/WPA2PSK. 
[I] Nov 11 15:44:08 ndhcps: DHCPREQUEST received (STATE_INIT) for 172.16.1.217 from e8:2a:44:8c:f6:77. 
[I] Nov 11 15:44:08 ndhcps: sending ACK of 172.16.1.217 to e8:2a:44:8c:f6:77. 
[I] Nov 11 15:44:14 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had re-associated from 50:ff:20:62:07:5c. 
[I] Nov 11 15:44:19 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had disassociated by STA (reason: STA is leaving or has left BSS). 
[I] Nov 11 15:44:19 ipsec: 08[IKE] received MS NT5 ISAKMPOAKLEY v9 vendor ID 
[I] Nov 11 15:44:19 ipsec: 08[IKE] received MS-Negotiation Discovery Capable vendor ID 
[I] Nov 11 15:44:19 ipsec: 08[IKE] received Vid-Initial-Contact vendor ID 
[I] Nov 11 15:44:19 ipsec: 08[IKE] 81.211.81.53 is initiating an IKE_SA 
[I] Nov 11 15:44:19 ipsec: 08[CFG] received proposals: IKE:3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:3DES_CBC/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:3DES_CBC/HMAC_SHA2_384_192/PRF_HMAC_SHA2_384/MODP_1024, IKE:AES_CBC=128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_CBC=128/HMAC_SHA2_384_192/PRF_HMAC_SHA2_384/MODP_1024, IKE:AES_CBC=192/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC=192/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_CBC=192/HMAC_SHA2_384_192/PRF_HMAC_SHA2_384/MODP_1024, IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_CBC=256/HMAC_SHA2_384_192/PRF_HMAC_SHA2_384/MODP_1024, IKE:AES_GCM_16=128/PRF_HMAC_SHA1/MODP_1024, IKE:AES_GCM_16=128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_GCM_16=128/PRF_HMAC_SHA2_384/MODP_1024, IKE:AES_GCM_16=256/PRF_HMAC_SHA1/MODP_1024, IKE:AES_GCM_16=256/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_GCM_16=256/ [...]
[I] Nov 11 15:44:19 ipsec: 08[CFG] configured proposals: IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_2048, IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/ECP_384, IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/ECP_256, IKE:AES_CBC=128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC=128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_2048, IKE:AES_CBC=128/HMAC_SHA1_96/PRF_HMAC_SHA1/ECP_384, IKE:AES_CBC=128/HMAC_SHA1_96/PRF_HMAC_SHA1/ECP_256, IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_2048, IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/ECP_384, IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/ECP_256, IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_2048, IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/ECP_384, IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/ECP_256 
[I] Nov 11 15:44:19 ipsec: 08[CFG] selected proposal: IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024 
[I] Nov 11 15:44:19 ipsec: 08[IKE] remote host is behind NAT 
[I] Nov 11 15:44:20 ipsec: 12[IKE] received 73 cert requests for an unknown ca 
[I] Nov 11 15:44:20 ipsec: 12[CFG] looking for peer configs matching 213.33.195.46[%any]...81.211.81.53[192.168.1.98] 
[I] Nov 11 15:44:20 ipsec: 12[CFG] selected peer config 'VirtualIPServerIKE2' 
[I] Nov 11 15:44:20 ipsec: 12[IKE] initiating EAP_IDENTITY method (id 0x00) 
[I] Nov 11 15:44:20 ipsec: 12[IKE] peer supports MOBIKE, but disabled in config 
[I] Nov 11 15:44:20 ipsec: 12[IKE] authentication of 'sakdjfwelfwe.keenetic.link' (myself) with RSA signature successful 
[I] Nov 11 15:44:20 ipsec: 12[IKE] sending end entity cert "CN=sakdjfwelfwe.keenetic.link" 
[I] Nov 11 15:44:20 ipsec: 12[IKE] sending issuer cert "C=US, O=Let's Encrypt, CN=R10" 
[I] Nov 11 15:44:20 ipsec: 03[IKE] received EAP identity 'buh' 
[I] Nov 11 15:44:20 ipsec: 03[IKE] initiating EAP_MSCHAPV2 method (id 0x69) 
[I] Nov 11 15:44:20 ipsec: 14[IKE] EAP method EAP_MSCHAPV2 succeeded, MSK established 
[I] Nov 11 15:44:20 ipsec: 10[IKE] authentication of '192.168.1.98' with EAP successful 
[I] Nov 11 15:44:20 ipsec: 10[IKE] authentication of 'sakdjfwelfwe.keenetic.link' (myself) with EAP 
[I] Nov 11 15:44:20 ipsec: 10[IKE] IKE_SA VirtualIPServerIKE2[1520] established between 213.33.195.46[sakdjfwelfwe.keenetic.link]...81.211.81.53[192.168.1.98] 
[I] Nov 11 15:44:20 ipsec: 10[IKE] peer requested virtual IP %any 
[I] Nov 11 15:44:20 ndm: Core::Server: started Session /var/run/ndm.core.socket. 
[I] Nov 11 15:44:20 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": allocated address "172.20.8.1" for user "buh" @ "192.168.1.98" from "81.211.81.53". 
[I] Nov 11 15:44:20 ndm: Core::Session: client disconnected. 
[I] Nov 11 15:44:20 ipsec: 10[IKE] assigning virtual IP 172.20.8.1 to peer 'buh' 
[I] Nov 11 15:44:20 ipsec: 10[IKE] peer requested virtual IP %any6 
[I] Nov 11 15:44:20 ipsec: 10[IKE] no virtual IP found for %any6 requested by 'buh' 
[I] Nov 11 15:44:20 ipsec: 10[CFG] received proposals: ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:NULL/HMAC_SHA1_96/NO_EXT_SEQ 
[I] Nov 11 15:44:20 ipsec: 10[CFG] configured proposals: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA2_256_128/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA2_256_128/NO_EXT_SEQ 
[I] Nov 11 15:44:20 ipsec: 10[CFG] selected proposal: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ 
[I] Nov 11 15:44:20 ipsec: 10[IKE] CHILD_SA VirtualIPServerIKE2{4935} established with SPIs c2bd530b_i 640bbb26_o and TS 0.0.0.0/0 === 172.20.8.1/32 
[W] Nov 11 15:44:20 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": crypto map is up: remote client "buh" @ "192.168.1.98" with IP "172.20.8.1" connected. 
[I] Nov 11 15:44:20 ipsec: 10[CFG] scheduling RADIUS Interim-Updates every 5s 
[I] Nov 11 15:44:20 ndm: IpSec::Netfilter: start reloading netfilter configuration... 
[I] Nov 11 15:44:20 ndm: IpSec::Netfilter: netfilter configuration reloading is done. 
[I] Nov 11 15:44:21 ipsec: 12[IKE] retransmit 1 of request with message ID 14 
[I] Nov 11 15:44:22 ndhcps: DHCPINFORM received for 172.20.8.1 from 00:00:00:00:00:00. 
[I] Nov 11 15:44:22 ndhcps: sending INFORM to 00:00:00:00:00:00. 
[I] Nov 11 15:44:22 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had associated. 
[I] Nov 11 15:44:22 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) set key done in WPA2/WPA2PSK. 
[I] Nov 11 15:44:23 ndhcps: DHCPREQUEST received (STATE_INIT) for 172.16.1.217 from e8:2a:44:8c:f6:77. 
[I] Nov 11 15:44:23 ndhcps: sending ACK of 172.16.1.217 to e8:2a:44:8c:f6:77. 
[I] Nov 11 15:44:29 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had re-associated from 50:ff:20:62:07:5c. 
[I] Nov 11 15:44:35 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had disassociated by STA (reason: STA is leaving or has left BSS). 
[I] Nov 11 15:44:38 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had associated. 
[I] Nov 11 15:44:38 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) set key done in WPA2/WPA2PSK. 
[I] Nov 11 15:44:38 ndhcps: DHCPREQUEST received (STATE_INIT) for 172.16.1.217 from e8:2a:44:8c:f6:77. 
[I] Nov 11 15:44:38 ndhcps: sending ACK of 172.16.1.217 to e8:2a:44:8c:f6:77. 
[I] Nov 11 15:44:40 ndhcps: DHCPREQUEST received (STATE_INIT) for 172.16.1.217 from e8:2a:44:8c:f6:77. 
[I] Nov 11 15:44:41 ndhcps: sending ACK of 172.16.1.217 to e8:2a:44:8c:f6:77. 
[I] Nov 11 15:44:44 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had re-associated from 50:ff:20:62:07:5c. 
[I] Nov 11 15:44:44 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had re-associated from 50:ff:20:62:07:5c. 
[I] Nov 11 15:44:49 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had disassociated by STA (reason: STA is leaving or has left BSS). 
[I] Nov 11 15:44:52 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had associated. 
[I] Nov 11 15:44:52 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) set key done in WPA2/WPA2PSK. 
[I] Nov 11 15:44:52 ndhcps: DHCPREQUEST received (STATE_INIT) for 172.16.1.217 from e8:2a:44:8c:f6:77. 
[I] Nov 11 15:44:53 ipsec: 07[IKE] received DELETE for ESP CHILD_SA with SPI d57d5006 
[I] Nov 11 15:44:53 ipsec: 07[IKE] closing CHILD_SA VirtualIPServerIKE2{4931} with SPIs cbf57ebb_i (289136 bytes) d57d5006_o (1228259 bytes) and TS 0.0.0.0/0 === 172.20.8.5/32 
[I] Nov 11 15:44:53 ipsec: 07[IKE] sending DELETE for ESP CHILD_SA with SPI cbf57ebb 
[I] Nov 11 15:44:53 ipsec: 07[IKE] CHILD_SA closed 
[I] Nov 11 15:44:53 ndhcps: sending ACK of 172.16.1.217 to e8:2a:44:8c:f6:77. 
[I] Nov 11 15:44:53 ndm: IpSec::Netfilter: start reloading netfilter configuration... 
[I] Nov 11 15:44:53 ndm: IpSec::Netfilter: netfilter configuration reloading is done. 
[I] Nov 11 15:44:59 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had re-associated from 50:ff:20:62:07:5c. 
[I] Nov 11 15:45:03 ipsec: 05[CFG] received proposals: ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:NULL/HMAC_SHA1_96/NO_EXT_SEQ 
[I] Nov 11 15:45:03 ipsec: 05[CFG] configured proposals: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA2_256_128/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA2_256_128/NO_EXT_SEQ 
[I] Nov 11 15:45:03 ipsec: 05[CFG] selected proposal: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ 
[I] Nov 11 15:45:03 ipsec: 05[IKE] CHILD_SA VirtualIPServerIKE2{4936} established with SPIs ca9477e2_i c50521e8_o and TS 0.0.0.0/0 === 172.20.8.5/32 
[E] Nov 11 15:45:03 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": unable to find client "urist" @ "192.168.1.43" from "81.211.81.53". 
[C] Nov 11 15:45:03 ndm: IpSec::Configurator: "VirtualIPServerIKE2": out of memory [0xcffe0dcc]. 
[I] Nov 11 15:45:03 ndm: IpSec::Netfilter: start reloading netfilter configuration... 
[I] Nov 11 15:45:03 ndm: IpSec::Netfilter: netfilter configuration reloading is done. 
[I] Nov 11 15:45:04 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had disassociated by STA (reason: STA is leaving or has left BSS). 
[I] Nov 11 15:45:07 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had associated. 
[I] Nov 11 15:45:12 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had disassociated by STA (reason: STA is leaving or has left BSS). 
[I] Nov 11 15:45:13 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had associated. 
[I] Nov 11 15:45:13 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had associated. 
[I] Nov 11 15:45:18 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had disassociated by STA (reason: STA is leaving or has left BSS). 
[I] Nov 11 15:45:23 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had associated. 
[I] Nov 11 15:45:23 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had associated. 
[I] Nov 11 15:45:24 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) set key done in WPA2/WPA2PSK. 
[I] Nov 11 15:45:24 ndhcps: DHCPREQUEST received (STATE_INIT) for 172.16.1.217 from e8:2a:44:8c:f6:77. 
[I] Nov 11 15:45:24 ndhcps: sending ACK of 172.16.1.217 to e8:2a:44:8c:f6:77. 
[I] Nov 11 15:45:30 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had re-associated from 50:ff:20:62:07:5c. 
[I] Nov 11 15:45:30 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) set key done in WPA2/WPA2PSK. 
[I] Nov 11 15:45:30 ndhcps: DHCPREQUEST received (STATE_INIT) for 172.16.1.217 from e8:2a:44:8c:f6:77. 
[I] Nov 11 15:45:30 ndhcps: sending ACK of 172.16.1.217 to e8:2a:44:8c:f6:77. 
[I] Nov 11 15:45:34 ipsec: 06[CFG] received proposals: ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:NULL/HMAC_SHA1_96/NO_EXT_SEQ 
[I] Nov 11 15:45:34 ipsec: 06[CFG] configured proposals: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA2_256_128/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA2_256_128/NO_EXT_SEQ 
[I] Nov 11 15:45:34 ipsec: 06[CFG] selected proposal: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ 
[I] Nov 11 15:45:34 ipsec: 06[IKE] inbound CHILD_SA VirtualIPServerIKE2{4937} established with SPIs c6c2447a_i 218b3d1e_o and TS 0.0.0.0/0 === 172.20.8.2/32 
[E] Nov 11 15:45:34 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": unable to find client "urist2" @ "192.168.1.100" from "81.211.81.53". 
[C] Nov 11 15:45:34 ndm: IpSec::Configurator: "VirtualIPServerIKE2": out of memory [0xcffe0dcc]. 
[I] Nov 11 15:45:34 ipsec: 07[IKE] received DELETE for ESP CHILD_SA with SPI f8421fd6 
[I] Nov 11 15:45:34 ipsec: 07[IKE] closing CHILD_SA VirtualIPServerIKE2{4910} with SPIs cff5fd09_i (64628 bytes) f8421fd6_o (23185 bytes) and TS 0.0.0.0/0 === 172.20.8.2/32 
[I] Nov 11 15:45:34 ipsec: 07[IKE] sending DELETE for ESP CHILD_SA with SPI cff5fd09 
[I] Nov 11 15:45:34 ipsec: 07[IKE] CHILD_SA closed 
[I] Nov 11 15:45:34 ipsec: 07[IKE] outbound CHILD_SA VirtualIPServerIKE2{4937} established with SPIs c6c2447a_i 218b3d1e_o and TS 0.0.0.0/0 === 172.20.8.2/32 
[I] Nov 11 15:45:34 ndm: IpSec::Netfilter: start reloading netfilter configuration... 
[I] Nov 11 15:45:34 ndm: IpSec::Netfilter: netfilter configuration reloading is done. 
[I] Nov 11 15:45:36 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had re-associated from 50:ff:20:62:07:5c. 
[I] Nov 11 15:45:36 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had re-associated from 50:ff:20:62:07:5c. 
[I] Nov 11 15:45:41 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had disassociated by STA (reason: STA is leaving or has left BSS). 
[I] Nov 11 15:45:44 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had associated. 
[I] Nov 11 15:45:44 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) set key done in WPA2/WPA2PSK. 
[I] Nov 11 15:45:44 ndhcps: DHCPREQUEST received (STATE_INIT) for 172.16.1.217 from e8:2a:44:8c:f6:77. 
[I] Nov 11 15:45:45 ndhcps: sending ACK of 172.16.1.217 to e8:2a:44:8c:f6:77. 
[I] Nov 11 15:45:52 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had re-associated from 50:ff:20:62:07:5c. 
[I] Nov 11 15:45:52 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) set key done in WPA2/WPA2PSK. 
[I] Nov 11 15:45:52 ndhcps: DHCPREQUEST received (STATE_INIT) for 172.16.1.217 from e8:2a:44:8c:f6:77. 
[I] Nov 11 15:45:53 ndhcps: sending ACK of 172.16.1.217 to e8:2a:44:8c:f6:77. 
[I] Nov 11 15:46:02 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had re-associated from 50:ff:20:62:07:5c. 
[I] Nov 11 15:46:02 ndm: Core::Syslog: last message repeated 5 times.
[I] Nov 11 15:46:03 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) set key done in WPA2/WPA2PSK. 
[I] Nov 11 15:46:03 ndhcps: DHCPREQUEST received (STATE_INIT) for 172.16.1.217 from e8:2a:44:8c:f6:77. 
[I] Nov 11 15:46:04 ndhcps: sending ACK of 172.16.1.217 to e8:2a:44:8c:f6:77. 
[I] Nov 11 15:46:08 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had re-associated from 50:ff:20:62:07:5c. 
[I] Nov 11 15:46:08 ndm: Core::Syslog: last message repeated 2 times.
[I] Nov 11 15:46:13 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had disassociated by STA (reason: STA is leaving or has left BSS). 
[I] Nov 11 15:46:17 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had associated. 
[I] Nov 11 15:46:17 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) set key done in WPA2/WPA2PSK. 
[I] Nov 11 15:46:17 ndhcps: DHCPREQUEST received (STATE_INIT) for 172.16.1.217 from e8:2a:44:8c:f6:77. 
[I] Nov 11 15:46:17 ndhcps: sending ACK of 172.16.1.217 to e8:2a:44:8c:f6:77. 
[I] Nov 11 15:46:24 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had re-associated from 50:ff:20:62:07:5c. 
[I] Nov 11 15:46:25 ndm: Core::Syslog: last message repeated 5 times.
[I] Nov 11 15:46:26 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) set key done in WPA2/WPA2PSK. 
[I] Nov 11 15:46:26 ndhcps: DHCPREQUEST received (STATE_INIT) for 172.16.1.217 from e8:2a:44:8c:f6:77. 
[I] Nov 11 15:46:26 ndhcps: sending ACK of 172.16.1.217 to e8:2a:44:8c:f6:77. 
[I] Nov 11 15:46:32 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had re-associated from 50:ff:20:62:07:5c. 
[I] Nov 11 15:46:37 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had disassociated by STA (reason: STA is leaving or has left BSS). 
[I] Nov 11 15:46:41 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had associated. 
[I] Nov 11 15:46:46 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had disassociated by STA (reason: STA is leaving or has left BSS). 
[I] Nov 11 15:46:47 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had associated. 
[I] Nov 11 15:46:52 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had disassociated by STA (reason: STA is leaving or has left BSS). 
[I] Nov 11 15:46:58 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had associated. 
[I] Nov 11 15:46:58 ndhcps: DHCPREQUEST received (STATE_INIT) for 172.16.1.217 from e8:2a:44:8c:f6:77. 
[I] Nov 11 15:46:58 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) set key done in WPA2/WPA2PSK. 
[I] Nov 11 15:46:58 ndhcps: sending ACK of 172.16.1.217 to e8:2a:44:8c:f6:77. 
[I] Nov 11 15:47:04 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had re-associated from 50:ff:20:62:07:5c. 
[I] Nov 11 15:47:04 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had re-associated from 50:ff:20:62:07:5c. 
[I] Nov 11 15:47:09 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had disassociated by STA (reason: STA is leaving or has left BSS). 
[I] Nov 11 15:47:12 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had associated. 
[I] Nov 11 15:47:17 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had disassociated by STA (reason: STA is leaving or has left BSS). 
[I] Nov 11 15:47:18 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had associated. 
[I] Nov 11 15:47:23 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had disassociated by STA (reason: STA is leaving or has left BSS). 
[I] Nov 11 15:47:30 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had associated. 
[I] Nov 11 15:47:30 ndm: Core::Syslog: last message repeated 2 times.
[I] Nov 11 15:47:31 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) set key done in WPA2/WPA2PSK. 
[I] Nov 11 15:47:31 ndhcps: DHCPREQUEST received (STATE_INIT) for 172.16.1.217 from e8:2a:44:8c:f6:77. 
[I] Nov 11 15:47:31 ndhcps: sending ACK of 172.16.1.217 to e8:2a:44:8c:f6:77. 
[I] Nov 11 15:47:37 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had re-associated from 50:ff:20:62:07:5c. 
[I] Nov 11 15:47:37 ndm: Core::Syslog: last message repeated 2 times.
[I] Nov 11 15:47:42 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had disassociated by STA (reason: STA is leaving or has left BSS). 
[I] Nov 11 15:47:45 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had associated. 
[I] Nov 11 15:47:45 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) set key done in WPA2/WPA2PSK. 
[I] Nov 11 15:47:45 ndhcps: DHCPREQUEST received (STATE_INIT) for 172.16.1.217 from e8:2a:44:8c:f6:77. 
[I] Nov 11 15:47:45 ndhcps: sending ACK of 172.16.1.217 to e8:2a:44:8c:f6:77. 
[I] Nov 11 15:47:51 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had re-associated from 50:ff:20:62:07:5c. 
[I] Nov 11 15:47:56 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had disassociated by STA (reason: STA is leaving or has left BSS). 
[I] Nov 11 15:47:59 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had associated. 
[I] Nov 11 15:48:04 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had disassociated by STA (reason: STA is leaving or has left BSS). 
[I] Nov 11 15:48:05 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had associated. 
[I] Nov 11 15:48:05 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had associated. 
[I] Nov 11 15:48:10 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had disassociated by STA (reason: STA is leaving or has left BSS). 
[I] Nov 11 15:48:16 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had associated. 
[I] Nov 11 15:48:16 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) set key done in WPA2/WPA2PSK. 
[I] Nov 11 15:48:16 ndhcps: DHCPREQUEST received (STATE_INIT) for 172.16.1.217 from e8:2a:44:8c:f6:77. 
[I] Nov 11 15:48:17 ndhcps: sending ACK of 172.16.1.217 to e8:2a:44:8c:f6:77. 
[I] Nov 11 15:48:22 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had re-associated from 50:ff:20:62:07:5c. 
[I] Nov 11 15:48:22 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) set key done in WPA2/WPA2PSK. 
[I] Nov 11 15:48:22 ndhcps: DHCPREQUEST received (STATE_INIT) for 172.16.1.217 from e8:2a:44:8c:f6:77. 
[I] Nov 11 15:48:23 ndhcps: sending ACK of 172.16.1.217 to e8:2a:44:8c:f6:77. 
[I] Nov 11 15:48:26 ipsec: 08[IKE] received DELETE for ESP CHILD_SA with SPI d6426d2e 
[I] Nov 11 15:48:26 ipsec: 08[IKE] closing CHILD_SA VirtualIPServerIKE2{4932} with SPIs cc2c7542_i (17587 bytes) d6426d2e_o (2137 bytes) and TS 0.0.0.0/0 === 172.20.8.1/32 
[I] Nov 11 15:48:26 ipsec: 08[IKE] sending DELETE for ESP CHILD_SA with SPI cc2c7542 
[I] Nov 11 15:48:26 ipsec: 08[IKE] CHILD_SA closed 
[I] Nov 11 15:48:26 ndm: IpSec::Netfilter: start reloading netfilter configuration... 
[I] Nov 11 15:48:26 ndm: IpSec::Netfilter: netfilter configuration reloading is done. 
[I] Nov 11 15:48:28 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had re-associated from 50:ff:20:62:07:5c. 
[I] Nov 11 15:48:28 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) set key done in WPA2/WPA2PSK. 
[I] Nov 11 15:48:28 ndhcps: DHCPREQUEST received (STATE_INIT) for 172.16.1.217 from e8:2a:44:8c:f6:77. 
[I] Nov 11 15:48:29 ndhcps: sending ACK of 172.16.1.217 to e8:2a:44:8c:f6:77. 
[I] Nov 11 15:48:29 ipsec: 07[CFG] received proposals: ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:NULL/HMAC_SHA1_96/NO_EXT_SEQ 
[I] Nov 11 15:48:29 ipsec: 07[CFG] configured proposals: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA2_256_128/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA2_256_128/NO_EXT_SEQ 
[I] Nov 11 15:48:29 ipsec: 07[CFG] selected proposal: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ 
[I] Nov 11 15:48:29 ipsec: 07[IKE] CHILD_SA VirtualIPServerIKE2{4938} established with SPIs c1740e0a_i 04231192_o and TS 0.0.0.0/0 === 172.20.8.1/32 
[E] Nov 11 15:48:29 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": unable to find client "metodist" @ "192.168.1.149" from "188.64.164.33". 
[C] Nov 11 15:48:29 ndm: IpSec::Configurator: "VirtualIPServerIKE2": out of memory [0xcffe0dcc]. 
[I] Nov 11 15:48:29 ndm: IpSec::Netfilter: start reloading netfilter configuration... 
[I] Nov 11 15:48:29 ndm: IpSec::Netfilter: netfilter configuration reloading is done. 
[I] Nov 11 15:48:34 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had re-associated from 50:ff:20:62:07:5c. 
[I] Nov 11 15:48:34 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had re-associated from 50:ff:20:62:07:5c. 
[I] Nov 11 15:48:34 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) set key done in WPA2/WPA2PSK. 
[I] Nov 11 15:48:35 ndhcps: DHCPREQUEST received (STATE_INIT) for 172.16.1.217 from e8:2a:44:8c:f6:77. 
[I] Nov 11 15:48:35 ndhcps: sending ACK of 172.16.1.217 to e8:2a:44:8c:f6:77. 
[I] Nov 11 15:48:40 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had re-associated from 50:ff:20:62:07:5c. 
[I] Nov 11 15:48:45 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had disassociated by STA (reason: STA is leaving or has left BSS). 
[I] Nov 11 15:48:49 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had associated. 
[I] Nov 11 15:48:49 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) set key done in WPA2/WPA2PSK. 
[I] Nov 11 15:48:49 ndhcps: DHCPREQUEST received (STATE_INIT) for 172.16.1.217 from e8:2a:44:8c:f6:77. 
[I] Nov 11 15:48:49 ndhcps: sending ACK of 172.16.1.217 to e8:2a:44:8c:f6:77. 
[I] Nov 11 15:48:54 ipsec: 14[IKE] received DELETE for ESP CHILD_SA with SPI 843647be 
[I] Nov 11 15:48:54 ipsec: 14[IKE] closing CHILD_SA VirtualIPServerIKE2{4934} with SPIs cb531478_i (10213 bytes) 843647be_o (170 bytes) and TS 0.0.0.0/0 === 172.20.8.1/32 
[I] Nov 11 15:48:54 ipsec: 14[IKE] sending DELETE for ESP CHILD_SA with SPI cb531478 
[I] Nov 11 15:48:54 ipsec: 14[IKE] CHILD_SA closed 
[I] Nov 11 15:48:54 ndm: IpSec::Netfilter: start reloading netfilter configuration... 
[I] Nov 11 15:48:54 ndm: IpSec::Netfilter: netfilter configuration reloading is done. 
[I] Nov 11 15:48:55 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had re-associated from 50:ff:20:62:07:5c. 
[I] Nov 11 15:48:55 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) set key done in WPA2/WPA2PSK. 
[I] Nov 11 15:48:55 ndhcps: DHCPREQUEST received (STATE_INIT) for 172.16.1.217 from e8:2a:44:8c:f6:77. 
[I] Nov 11 15:48:55 ndhcps: sending ACK of 172.16.1.217 to e8:2a:44:8c:f6:77. 
[I] Nov 11 15:49:01 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had re-associated from 50:ff:20:62:07:5c. 
[I] Nov 11 15:49:06 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had disassociated by STA (reason: STA is leaving or has left BSS). 
[I] Nov 11 15:49:08 ipsec: 07[CFG] received proposals: ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:NULL/HMAC_SHA1_96/NO_EXT_SEQ 
[I] Nov 11 15:49:08 ipsec: 07[CFG] configured proposals: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA2_256_128/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA2_256_128/NO_EXT_SEQ 
[I] Nov 11 15:49:08 ipsec: 07[CFG] selected proposal: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ 
[I] Nov 11 15:49:08 ipsec: 07[IKE] CHILD_SA VirtualIPServerIKE2{4939} established with SPIs cda7bdf0_i 21105fb4_o and TS 0.0.0.0/0 === 172.20.8.1/32 
[E] Nov 11 15:49:08 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": unable to find client "metodist5" @ "192.168.0.4" from "95.55.35.180". 
[C] Nov 11 15:49:08 ndm: IpSec::Configurator: "VirtualIPServerIKE2": out of memory [0xcffe0dcc]. 
[I] Nov 11 15:49:08 ndm: IpSec::Netfilter: start reloading netfilter configuration... 
[I] Nov 11 15:49:08 ndm: IpSec::Netfilter: netfilter configuration reloading is done. 
[I] Nov 11 15:49:10 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had associated. 
[I] Nov 11 15:49:15 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had disassociated by STA (reason: STA is leaving or has left BSS). 
[I] Nov 11 15:49:15 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had associated. 
[I] Nov 11 15:49:20 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had disassociated by STA (reason: STA is leaving or has left BSS). 
[I] Nov 11 15:49:26 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had associated. 
[I] Nov 11 15:49:26 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) set key done in WPA2/WPA2PSK. 
[I] Nov 11 15:49:27 ndhcps: DHCPREQUEST received (STATE_INIT) for 172.16.1.217 from e8:2a:44:8c:f6:77. 
[I] Nov 11 15:49:27 ndhcps: sending ACK of 172.16.1.217 to e8:2a:44:8c:f6:77. 
[I] Nov 11 15:49:32 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had re-associated from 50:ff:20:62:07:5c. 
[I] Nov 11 15:49:33 ndm: Core::Syslog: last message repeated 4 times.
[I] Nov 11 15:49:34 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) set key done in WPA2/WPA2PSK. 
[I] Nov 11 15:49:34 ndhcps: DHCPREQUEST received (STATE_INIT) for 172.16.1.217 from e8:2a:44:8c:f6:77. 
[I] Nov 11 15:49:34 ndhcps: sending ACK of 172.16.1.217 to e8:2a:44:8c:f6:77. 
[I] Nov 11 15:49:40 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had re-associated from 50:ff:20:62:07:5c. 
[I] Nov 11 15:49:40 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) set key done in WPA2/WPA2PSK. 
[I] Nov 11 15:49:40 ndhcps: DHCPREQUEST received (STATE_INIT) for 172.16.1.217 from e8:2a:44:8c:f6:77. 
[I] Nov 11 15:49:40 ndhcps: sending ACK of 172.16.1.217 to e8:2a:44:8c:f6:77. 
[I] Nov 11 15:49:46 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had re-associated from 50:ff:20:62:07:5c. 
[I] Nov 11 15:49:46 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) set key done in WPA2/WPA2PSK. 
[I] Nov 11 15:49:46 ndhcps: DHCPREQUEST received (STATE_INIT) for 172.16.1.217 from e8:2a:44:8c:f6:77. 
[I] Nov 11 15:49:46 ndhcps: sending ACK of 172.16.1.217 to e8:2a:44:8c:f6:77. 
[I] Nov 11 15:49:52 ipsec: 14[IKE] received DELETE for ESP CHILD_SA with SPI 7e7fb176 
[I] Nov 11 15:49:52 ipsec: 14[IKE] closing CHILD_SA VirtualIPServerIKE2{4933} with SPIs cfdac811_i (147104 bytes) 7e7fb176_o (511055 bytes) and TS 0.0.0.0/0 === 172.20.8.5/32 
[I] Nov 11 15:49:52 ipsec: 14[IKE] sending DELETE for ESP CHILD_SA with SPI cfdac811 
[I] Nov 11 15:49:52 ipsec: 14[IKE] CHILD_SA closed 
[I] Nov 11 15:49:53 ndm: IpSec::Netfilter: start reloading netfilter configuration... 
[I] Nov 11 15:49:53 ndm: IpSec::Netfilter: netfilter configuration reloading is done. 
[I] Nov 11 15:49:53 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had re-associated from 50:ff:20:62:07:5c. 
[I] Nov 11 15:49:53 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had re-associated from 50:ff:20:62:07:5c. 
[I] Nov 11 15:49:53 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) set key done in WPA2/WPA2PSK. 
[I] Nov 11 15:49:53 ndhcps: DHCPREQUEST received (STATE_INIT) for 172.16.1.217 from e8:2a:44:8c:f6:77. 
[I] Nov 11 15:49:53 ndhcps: sending ACK of 172.16.1.217 to e8:2a:44:8c:f6:77. 
[I] Nov 11 15:49:56 ipsec: 06[CFG] received proposals: ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:NULL/HMAC_SHA1_96/NO_EXT_SEQ 
[I] Nov 11 15:49:56 ipsec: 06[CFG] configured proposals: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA2_256_128/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA2_256_128/NO_EXT_SEQ 
[I] Nov 11 15:49:56 ipsec: 06[CFG] selected proposal: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ 
[I] Nov 11 15:49:56 ipsec: 06[IKE] CHILD_SA VirtualIPServerIKE2{4940} established with SPIs cffd2a8c_i ed21425c_o and TS 0.0.0.0/0 === 172.20.8.5/32 
[E] Nov 11 15:49:56 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": unable to find client "urist3" @ "192.168.1.75" from "81.211.81.53". 
[C] Nov 11 15:49:56 ndm: IpSec::Configurator: "VirtualIPServerIKE2": out of memory [0xcffe0dcc]. 
[I] Nov 11 15:49:56 ndm: IpSec::Netfilter: start reloading netfilter configuration... 
[I] Nov 11 15:49:56 ndm: IpSec::Netfilter: netfilter configuration reloading is done. 
[I] Nov 11 15:49:59 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had re-associated from 50:ff:20:62:07:5c. 
[I] Nov 11 15:50:04 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had disassociated by STA (reason: STA is leaving or has left BSS). 
[I] Nov 11 15:50:11 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) had associated. 
[I] Nov 11 15:50:11 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(e8:2a:44:8c:f6:77) set key done in WPA2/WPA2PSK. 
[I] Nov 11 15:50:11 ndhcps: DHCPREQUEST received (STATE_INIT) for 172.16.1.217 from e8:2a:44:8c:f6:77. 
[I] Nov 11 15:50:11 ndhcps: sending ACK of 172.16.1.217 to e8:2a:44:8c:f6:77. 
[I] Nov 11 15:52:25 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster1/AccessPoint0": STA(52:eb:a4:8d:5e:55) had been aged-out and disassociated (idle silence). 
[I] Nov 11 15:53:28 ipsec: 10[IKE] received DELETE for ESP CHILD_SA with SPI 640bbb26 
[I] Nov 11 15:53:28 ipsec: 10[IKE] closing CHILD_SA VirtualIPServerIKE2{4935} with SPIs c2bd530b_i (80059 bytes) 640bbb26_o (78360 bytes) and TS 0.0.0.0/0 === 172.20.8.1/32 
[I] Nov 11 15:53:28 ipsec: 10[IKE] sending DELETE for ESP CHILD_SA with SPI c2bd530b 
[I] Nov 11 15:53:28 ipsec: 10[IKE] CHILD_SA closed 
[I] Nov 11 15:53:28 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": active CHILD SAs for user "buh". 
[W] Nov 11 15:53:28 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": crypto map remote client "buh" @ "192.168.1.98" from "81.211.81.53" disconnected. 
[I] Nov 11 15:53:28 ndm: IpSec::Netfilter: start reloading netfilter configuration... 
[I] Nov 11 15:53:28 ndm: IpSec::Netfilter: netfilter configuration reloading is done. 
[I] Nov 11 15:53:30 ipsec: 06[IKE] received DELETE for ESP CHILD_SA with SPI 04231192 
[I] Nov 11 15:53:30 ipsec: 06[IKE] closing CHILD_SA VirtualIPServerIKE2{4938} with SPIs c1740e0a_i (22866 bytes) 04231192_o (125 bytes) and TS 0.0.0.0/0 === 172.20.8.1/32 
[I] Nov 11 15:53:30 ipsec: 06[IKE] sending DELETE for ESP CHILD_SA with SPI c1740e0a 
[I] Nov 11 15:53:30 ipsec: 06[IKE] CHILD_SA closed 
[I] Nov 11 15:53:30 ndm: IpSec::Netfilter: start reloading netfilter configuration... 
[I] Nov 11 15:53:30 ndm: IpSec::Netfilter: netfilter configuration reloading is done. 
[I] Nov 11 15:53:31 ipsec: 07[CFG] received proposals: ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:NULL/HMAC_SHA1_96/NO_EXT_SEQ 
[I] Nov 11 15:53:31 ipsec: 07[CFG] configured proposals: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA2_256_128/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA2_256_128/NO_EXT_SEQ 
[I] Nov 11 15:53:31 ipsec: 07[CFG] selected proposal: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ 
[I] Nov 11 15:53:31 ipsec: 07[IKE] CHILD_SA VirtualIPServerIKE2{4941} established with SPIs c4096ac8_i cc6741d6_o and TS 0.0.0.0/0 === 172.20.8.1/32 
[E] Nov 11 15:53:31 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": unable to find client "metodist" @ "192.168.1.149" from "188.64.164.33". 
[C] Nov 11 15:53:31 ndm: IpSec::Configurator: "VirtualIPServerIKE2": out of memory [0xcffe0dcc]. 
[I] Nov 11 15:53:31 ndm: IpSec::Netfilter: start reloading netfilter configuration... 
[I] Nov 11 15:53:31 ndm: IpSec::Netfilter: netfilter configuration reloading is done. 
[I] Nov 11 15:53:33 ipsec: 11[CFG] received proposals: ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:NULL/HMAC_SHA1_96/NO_EXT_SEQ 
[I] Nov 11 15:53:33 ipsec: 11[CFG] configured proposals: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA2_256_128/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA2_256_128/NO_EXT_SEQ 
[I] Nov 11 15:53:33 ipsec: 11[CFG] selected proposal: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ 
[I] Nov 11 15:53:33 ipsec: 11[IKE] CHILD_SA VirtualIPServerIKE2{4942} established with SPIs c02510b9_i ac92dcca_o and TS 0.0.0.0/0 === 172.20.8.1/32 
[I] Nov 11 15:53:33 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": active CHILD SAs for user "buh". 
[I] Nov 11 15:53:33 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": "0" = "3223654585". 
[I] Nov 11 15:53:33 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": "1" = "2895305930". 
[W] Nov 11 15:53:33 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": crypto map is up: remote client "buh" @ "192.168.1.98" with IP "172.20.8.1" connected. 
[I] Nov 11 15:53:33 ndm: IpSec::Netfilter: start reloading netfilter configuration... 
[I] Nov 11 15:53:33 ndm: IpSec::Netfilter: netfilter configuration reloading is done. 
[I] Nov 11 15:54:54 ipsec: 13[IKE] received DELETE for ESP CHILD_SA with SPI c50521e8 
[I] Nov 11 15:54:54 ipsec: 13[IKE] closing CHILD_SA VirtualIPServerIKE2{4936} with SPIs ca9477e2_i (394580 bytes) c50521e8_o (1449747 bytes) and TS 0.0.0.0/0 === 172.20.8.5/32 
[I] Nov 11 15:54:54 ipsec: 13[IKE] sending DELETE for ESP CHILD_SA with SPI ca9477e2 
[I] Nov 11 15:54:54 ipsec: 13[IKE] CHILD_SA closed 
[I] Nov 11 15:54:55 ndm: IpSec::Netfilter: start reloading netfilter configuration... 
[I] Nov 11 15:54:55 ndm: IpSec::Netfilter: netfilter configuration reloading is done. 
[I] Nov 11 15:55:03 ipsec: 11[CFG] received proposals: ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:NULL/HMAC_SHA1_96/NO_EXT_SEQ 
[I] Nov 11 15:55:03 ipsec: 11[CFG] configured proposals: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA2_256_128/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA2_256_128/NO_EXT_SEQ 
[I] Nov 11 15:55:03 ipsec: 11[CFG] selected proposal: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ 
[I] Nov 11 15:55:03 ipsec: 11[IKE] CHILD_SA VirtualIPServerIKE2{4943} established with SPIs ceb06920_i 256efb8c_o and TS 0.0.0.0/0 === 172.20.8.5/32 
[E] Nov 11 15:55:03 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": unable to find client "urist" @ "192.168.1.43" from "81.211.81.53". 
[C] Nov 11 15:55:03 ndm: IpSec::Configurator: "VirtualIPServerIKE2": out of memory [0xcffe0dcc]. 
[I] Nov 11 15:55:03 ndm: IpSec::Netfilter: start reloading netfilter configuration... 
[I] Nov 11 15:55:03 ndm: IpSec::Netfilter: netfilter configuration reloading is done. 
[I] Nov 11 15:55:50 ipsec: 11[IKE] received retransmit of request with ID 19, retransmitting response 
[I] Nov 11 15:58:06 ipsec: 06[IKE] received DELETE for ESP CHILD_SA with SPI 21105fb4 
[I] Nov 11 15:58:06 ipsec: 06[IKE] closing CHILD_SA VirtualIPServerIKE2{4939} with SPIs cda7bdf0_i (22956 bytes) 21105fb4_o (4164 bytes) and TS 0.0.0.0/0 === 172.20.8.1/32 
[I] Nov 11 15:58:06 ipsec: 06[IKE] sending DELETE for ESP CHILD_SA with SPI cda7bdf0 
[I] Nov 11 15:58:06 ipsec: 06[IKE] CHILD_SA closed 
[I] Nov 11 15:58:06 ndm: IpSec::Netfilter: start reloading netfilter configuration... 
[I] Nov 11 15:58:07 ndm: IpSec::Netfilter: netfilter configuration reloading is done. 
[I] Nov 11 15:58:14 ipsec: 13[CFG] received proposals: ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:NULL/HMAC_SHA1_96/NO_EXT_SEQ 
[I] Nov 11 15:58:14 ipsec: 13[CFG] configured proposals: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA2_256_128/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA2_256_128/NO_EXT_SEQ 
[I] Nov 11 15:58:14 ipsec: 13[CFG] selected proposal: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ 
[I] Nov 11 15:58:14 ipsec: 13[IKE] CHILD_SA VirtualIPServerIKE2{4944} established with SPIs cd7db2f2_i 76a60e46_o and TS 0.0.0.0/0 === 172.20.8.1/32 
[E] Nov 11 15:58:14 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": unable to find client "metodist5" @ "192.168.0.4" from "95.55.35.180". 
[C] Nov 11 15:58:14 ndm: IpSec::Configurator: "VirtualIPServerIKE2": out of memory [0xcffe0dcc]. 
[I] Nov 11 15:58:15 ndm: IpSec::Netfilter: start reloading netfilter configuration... 
[I] Nov 11 15:58:15 ndm: IpSec::Netfilter: netfilter configuration reloading is done. 
[I] Nov 11 15:58:33 ipsec: 09[IKE] received DELETE for ESP CHILD_SA with SPI cc6741d6 
[I] Nov 11 15:58:33 ipsec: 09[IKE] closing CHILD_SA VirtualIPServerIKE2{4941} with SPIs c4096ac8_i (17522 bytes) cc6741d6_o (305 bytes) and TS 0.0.0.0/0 === 172.20.8.1/32 
[I] Nov 11 15:58:33 ipsec: 09[IKE] sending DELETE for ESP CHILD_SA with SPI c4096ac8 
[I] Nov 11 15:58:33 ipsec: 09[IKE] CHILD_SA closed 
[I] Nov 11 15:58:33 ndm: IpSec::Netfilter: start reloading netfilter configuration... 
[I] Nov 11 15:58:33 ndm: IpSec::Netfilter: netfilter configuration reloading is done. 
[I] Nov 11 15:58:34 ipsec: 15[CFG] received proposals: ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:NULL/HMAC_SHA1_96/NO_EXT_SEQ 
[I] Nov 11 15:58:34 ipsec: 15[CFG] configured proposals: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA2_256_128/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA2_256_128/NO_EXT_SEQ 
[I] Nov 11 15:58:34 ipsec: 15[CFG] selected proposal: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ 
[I] Nov 11 15:58:34 ipsec: 15[IKE] CHILD_SA VirtualIPServerIKE2{4945} established with SPIs ce5635ef_i 64b33500_o and TS 0.0.0.0/0 === 172.20.8.1/32 
[E] Nov 11 15:58:34 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": unable to find client "metodist" @ "192.168.1.149" from "188.64.164.33". 
[C] Nov 11 15:58:34 ndm: IpSec::Configurator: "VirtualIPServerIKE2": out of memory [0xcffe0dcc]. 
[I] Nov 11 15:58:34 ndm: IpSec::Netfilter: start reloading netfilter configuration... 
[I] Nov 11 15:58:34 ndm: IpSec::Netfilter: netfilter configuration reloading is done. 
[I] Nov 11 15:59:57 ipsec: 06[IKE] received DELETE for ESP CHILD_SA with SPI ed21425c 
[I] Nov 11 15:59:57 ipsec: 06[IKE] closing CHILD_SA VirtualIPServerIKE2{4940} with SPIs cffd2a8c_i (41828 bytes) ed21425c_o (20953 bytes) and TS 0.0.0.0/0 === 172.20.8.5/32 
[I] Nov 11 15:59:57 ipsec: 06[IKE] sending DELETE for ESP CHILD_SA with SPI cffd2a8c 
[I] Nov 11 15:59:57 ipsec: 06[IKE] CHILD_SA closed 
[I] Nov 11 15:59:57 ndm: IpSec::Netfilter: start reloading netfilter configuration... 
[I] Nov 11 15:59:57 ndm: IpSec::Netfilter: netfilter configuration reloading is done. 
[I] Nov 11 16:00:00 ipsec: 06[CFG] received proposals: ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:NULL/HMAC_SHA1_96/NO_EXT_SEQ 
[I] Nov 11 16:00:00 ipsec: 06[CFG] configured proposals: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA2_256_128/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA2_256_128/NO_EXT_SEQ 
[I] Nov 11 16:00:00 ipsec: 06[CFG] selected proposal: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ 
[I] Nov 11 16:00:00 ipsec: 06[IKE] CHILD_SA VirtualIPServerIKE2{4946} established with SPIs c25e54e2_i 44a0130a_o and TS 0.0.0.0/0 === 172.20.8.5/32 
[E] Nov 11 16:00:01 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": unable to find client "urist3" @ "192.168.1.75" from "81.211.81.53". 
[C] Nov 11 16:00:01 ndm: IpSec::Configurator: "VirtualIPServerIKE2": out of memory [0xcffe0dcc]. 
[I] Nov 11 16:00:01 ndm: IpSec::Netfilter: start reloading netfilter configuration... 
[I] Nov 11 16:00:01 ndm: IpSec::Netfilter: netfilter configuration reloading is done. 
[I] Nov 11 16:01:30 ndhcps: DHCPREQUEST received (STATE_RENEWING) for 172.16.1.215 from 3c:a6:f6:70:85:3f. 
[I] Nov 11 16:01:30 ndhcps: sending ACK of 172.16.1.215 to 3c:a6:f6:70:85:3f. 
[I] Nov 11 16:01:45 ipsec: 10[IKE] received DELETE for ESP CHILD_SA with SPI 256efb8c 
[I] Nov 11 16:01:45 ipsec: 10[IKE] closing CHILD_SA VirtualIPServerIKE2{4943} with SPIs ceb06920_i (538173 bytes) 256efb8c_o (1818325 bytes) and TS 0.0.0.0/0 === 172.20.8.5/32 
[I] Nov 11 16:01:45 ipsec: 10[IKE] sending DELETE for ESP CHILD_SA with SPI ceb06920 
[I] Nov 11 16:01:45 ipsec: 10[IKE] CHILD_SA closed 
[I] Nov 11 16:01:45 ipsec: 13[IKE] received DELETE for IKE_SA VirtualIPServerIKE2[1518] 
[I] Nov 11 16:01:45 ipsec: 13[IKE] deleting IKE_SA VirtualIPServerIKE2[1518] between 213.33.195.46[sakdjfwelfwe.keenetic.link]...81.211.81.53[192.168.1.43] 
[I] Nov 11 16:01:45 ipsec: 13[IKE] IKE_SA deleted 
[I] Nov 11 16:01:45 ndm: IpSec::Netfilter: start reloading netfilter configuration... 
[I] Nov 11 16:01:45 ndm: IpSec::Netfilter: netfilter configuration reloading is done. 
[I] Nov 11 16:01:48 ipsec: 09[IKE] received MS NT5 ISAKMPOAKLEY v9 vendor ID 
[I] Nov 11 16:01:48 ipsec: 09[IKE] received MS-Negotiation Discovery Capable vendor ID 
[I] Nov 11 16:01:48 ipsec: 09[IKE] received Vid-Initial-Contact vendor ID 
[I] Nov 11 16:01:48 ipsec: 09[IKE] 81.211.81.53 is initiating an IKE_SA 
[I] Nov 11 16:01:48 ipsec: 09[CFG] received proposals: IKE:3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:3DES_CBC/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:3DES_CBC/HMAC_SHA2_384_192/PRF_HMAC_SHA2_384/MODP_1024, IKE:AES_CBC=128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_CBC=128/HMAC_SHA2_384_192/PRF_HMAC_SHA2_384/MODP_1024, IKE:AES_CBC=192/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC=192/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_CBC=192/HMAC_SHA2_384_192/PRF_HMAC_SHA2_384/MODP_1024, IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_CBC=256/HMAC_SHA2_384_192/PRF_HMAC_SHA2_384/MODP_1024, IKE:AES_GCM_16=128/PRF_HMAC_SHA1/MODP_1024, IKE:AES_GCM_16=128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_GCM_16=128/PRF_HMAC_SHA2_384/MODP_1024, IKE:AES_GCM_16=256/PRF_HMAC_SHA1/MODP_1024, IKE:AES_GCM_16=256/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_GCM_16=256/ [...]
[I] Nov 11 16:01:48 ipsec: 09[CFG] configured proposals: IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_2048, IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/ECP_384, IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/ECP_256, IKE:AES_CBC=128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC=128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_2048, IKE:AES_CBC=128/HMAC_SHA1_96/PRF_HMAC_SHA1/ECP_384, IKE:AES_CBC=128/HMAC_SHA1_96/PRF_HMAC_SHA1/ECP_256, IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_2048, IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/ECP_384, IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/ECP_256, IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_2048, IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/ECP_384, IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/ECP_256 
[I] Nov 11 16:01:48 ipsec: 09[CFG] selected proposal: IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024 
[I] Nov 11 16:01:48 ipsec: 09[IKE] remote host is behind NAT 
[I] Nov 11 16:01:48 ipsec: 11[IKE] received 80 cert requests for an unknown ca 
[I] Nov 11 16:01:48 ipsec: 11[CFG] looking for peer configs matching 213.33.195.46[%any]...81.211.81.53[192.168.1.43] 
[I] Nov 11 16:01:48 ipsec: 11[CFG] selected peer config 'VirtualIPServerIKE2' 
[I] Nov 11 16:01:48 ipsec: 11[IKE] initiating EAP_IDENTITY method (id 0x00) 
[I] Nov 11 16:01:48 ipsec: 11[IKE] peer supports MOBIKE, but disabled in config 
[I] Nov 11 16:01:48 ipsec: 11[IKE] authentication of 'sakdjfwelfwe.keenetic.link' (myself) with RSA signature successful 
[I] Nov 11 16:01:48 ipsec: 11[IKE] sending end entity cert "CN=sakdjfwelfwe.keenetic.link" 
[I] Nov 11 16:01:48 ipsec: 11[IKE] sending issuer cert "C=US, O=Let's Encrypt, CN=R10" 
[I] Nov 11 16:01:48 ipsec: 10[IKE] received EAP identity 'urist' 
[I] Nov 11 16:01:48 ipsec: 10[IKE] initiating EAP_MSCHAPV2 method (id 0xBA) 
[I] Nov 11 16:01:48 ipsec: 11[IKE] EAP method EAP_MSCHAPV2 succeeded, MSK established 
[I] Nov 11 16:01:48 ipsec: 15[IKE] authentication of '192.168.1.43' with EAP successful 
[I] Nov 11 16:01:48 ipsec: 15[IKE] authentication of 'sakdjfwelfwe.keenetic.link' (myself) with EAP 
[I] Nov 11 16:01:48 ipsec: 15[IKE] IKE_SA VirtualIPServerIKE2[1521] established between 213.33.195.46[sakdjfwelfwe.keenetic.link]...81.211.81.53[192.168.1.43] 
[I] Nov 11 16:01:48 ipsec: 15[IKE] peer requested virtual IP %any 
[I] Nov 11 16:01:48 ndm: Core::Server: started Session /var/run/ndm.core.socket. 
[I] Nov 11 16:01:48 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": allocated address "172.20.8.2" for user "urist" @ "192.168.1.43" from "81.211.81.53". 
[I] Nov 11 16:01:48 ipsec: 15[IKE] assigning virtual IP 172.20.8.2 to peer 'urist' 
[I] Nov 11 16:01:48 ipsec: 15[IKE] peer requested virtual IP %any6 
[I] Nov 11 16:01:48 ipsec: 15[IKE] no virtual IP found for %any6 requested by 'urist' 
[I] Nov 11 16:01:48 ndm: Core::Session: client disconnected. 
[I] Nov 11 16:01:48 ipsec: 15[CFG] received proposals: ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:NULL/HMAC_SHA1_96/NO_EXT_SEQ 
[I] Nov 11 16:01:48 ipsec: 15[CFG] configured proposals: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA2_256_128/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA2_256_128/NO_EXT_SEQ 
[I] Nov 11 16:01:48 ipsec: 15[CFG] selected proposal: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ 
[I] Nov 11 16:01:48 ipsec: 15[IKE] CHILD_SA VirtualIPServerIKE2{4947} established with SPIs ccf9c8c6_i 61c3e888_o and TS 0.0.0.0/0 === 172.20.8.2/32 
[W] Nov 11 16:01:48 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": crypto map is up: remote client "urist" @ "192.168.1.43" with IP "172.20.8.2" connected. 
[I] Nov 11 16:01:49 ipsec: 15[CFG] scheduling RADIUS Interim-Updates every 5s 
[I] Nov 11 16:01:49 ndm: IpSec::Netfilter: start reloading netfilter configuration... 
[I] Nov 11 16:01:49 ndm: IpSec::Netfilter: netfilter configuration reloading is done. 
[I] Nov 11 16:01:50 ndhcps: DHCPINFORM received for 172.20.8.2 from 00:00:00:00:00:00. 
[I] Nov 11 16:01:50 ndhcps: sending INFORM to 00:00:00:00:00:00. 
[I] Nov 11 16:03:07 ipsec: 03[IKE] received DELETE for ESP CHILD_SA with SPI ac92dcca 
[I] Nov 11 16:03:07 ipsec: 03[IKE] closing CHILD_SA VirtualIPServerIKE2{4942} with SPIs c02510b9_i (19660 bytes) ac92dcca_o (12229 bytes) and TS 0.0.0.0/0 === 172.20.8.1/32 
[I] Nov 11 16:03:07 ipsec: 03[IKE] sending DELETE for ESP CHILD_SA with SPI c02510b9 
[I] Nov 11 16:03:07 ipsec: 03[IKE] CHILD_SA closed 
[I] Nov 11 16:03:07 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": active CHILD SAs for user "buh". 
[I] Nov 11 16:03:07 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": "0" = "3223654585". 
[I] Nov 11 16:03:07 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": "1" = "2895305930". 
[W] Nov 11 16:03:07 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": crypto map remote client "buh" @ "192.168.1.98" from "81.211.81.53" disconnected. 
[I] Nov 11 16:03:07 ndm: IpSec::Netfilter: start reloading netfilter configuration... 
[I] Nov 11 16:03:07 ndm: IpSec::Netfilter: netfilter configuration reloading is done. 
[I] Nov 11 16:03:19 ipsec: 10[CFG] received proposals: ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:NULL/HMAC_SHA1_96/NO_EXT_SEQ 
[I] Nov 11 16:03:19 ipsec: 10[CFG] configured proposals: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA2_256_128/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA2_256_128/NO_EXT_SEQ 
[I] Nov 11 16:03:19 ipsec: 10[CFG] selected proposal: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ 
[I] Nov 11 16:03:19 ipsec: 10[IKE] CHILD_SA VirtualIPServerIKE2{4948} established with SPIs c0832d3f_i 3279f1d4_o and TS 0.0.0.0/0 === 172.20.8.1/32 
[I] Nov 11 16:03:19 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": active CHILD SAs for user "buh". 
[I] Nov 11 16:03:19 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": "0" = "3229822271". 
[I] Nov 11 16:03:19 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": "1" = "846852564". 
[W] Nov 11 16:03:19 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": crypto map is up: remote client "buh" @ "192.168.1.98" with IP "172.20.8.1" connected. 
[I] Nov 11 16:03:19 ndm: IpSec::Netfilter: start reloading netfilter configuration... 
[I] Nov 11 16:03:19 ndm: IpSec::Netfilter: netfilter configuration reloading is done. 
[I] Nov 11 16:03:33 ipsec: 11[IKE] received DELETE for ESP CHILD_SA with SPI 76a60e46 
[I] Nov 11 16:03:33 ipsec: 11[IKE] closing CHILD_SA VirtualIPServerIKE2{4944} with SPIs cd7db2f2_i (19430 bytes) 76a60e46_o (890 bytes) and TS 0.0.0.0/0 === 172.20.8.1/32 
[I] Nov 11 16:03:33 ipsec: 11[IKE] sending DELETE for ESP CHILD_SA with SPI cd7db2f2 
[I] Nov 11 16:03:33 ipsec: 11[IKE] CHILD_SA closed 
[I] Nov 11 16:03:33 ndm: IpSec::Netfilter: start reloading netfilter configuration... 
[I] Nov 11 16:03:33 ndm: IpSec::Netfilter: netfilter configuration reloading is done. 
[I] Nov 11 16:03:35 ipsec: 03[CFG] received proposals: ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:NULL/HMAC_SHA1_96/NO_EXT_SEQ 
[I] Nov 11 16:03:35 ipsec: 03[CFG] configured proposals: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA2_256_128/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA2_256_128/NO_EXT_SEQ 
[I] Nov 11 16:03:35 ipsec: 03[CFG] selected proposal: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ 
[I] Nov 11 16:03:35 ipsec: 03[IKE] CHILD_SA VirtualIPServerIKE2{4949} established with SPIs cc955732_i 3f7a2bb6_o and TS 0.0.0.0/0 === 172.20.8.1/32 
[E] Nov 11 16:03:35 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": unable to find client "metodist5" @ "192.168.0.4" from "95.55.35.180". 
[C] Nov 11 16:03:35 ndm: IpSec::Configurator: "VirtualIPServerIKE2": out of memory [0xcffe0dcc]. 
[I] Nov 11 16:03:35 ndm: IpSec::Netfilter: start reloading netfilter configuration... 
[I] Nov 11 16:03:35 ndm: IpSec::Netfilter: netfilter configuration reloading is done. 
[I] Nov 11 16:04:01 ndhcps: DHCPREQUEST received (STATE_RENEWING) for 172.16.1.229 from 30:07:4d:70:2d:ed. 
[I] Nov 11 16:04:01 ndhcps: sending ACK of 172.16.1.229 to 30:07:4d:70:2d:ed. 
[I] Nov 11 16:04:23 ndhcps: DHCPREQUEST received (STATE_RENEWING) for 172.16.1.160 from 00:17:c8:ba:be:b4. 
[I] Nov 11 16:04:23 ndhcps: sending ACK of 172.16.1.160 to 00:17:c8:ba:be:b4. 
[I] Nov 11 16:05:47 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster1/AccessPoint0": STA(6a:b4:23:20:41:85) had been aged-out and disassociated (idle silence). 
[I] Nov 11 16:06:09 ndhcps: DHCPREQUEST received (STATE_RENEWING) for 172.16.1.227 from 62:b2:12:d5:da:d2. 
[I] Nov 11 16:06:10 ndhcps: sending ACK of 172.16.1.227 to 62:b2:12:d5:da:d2. 
[I] Nov 11 16:06:33 ipsec: 06[IKE] received DELETE for ESP CHILD_SA with SPI 218b3d1e 
[I] Nov 11 16:06:33 ipsec: 06[IKE] closing CHILD_SA VirtualIPServerIKE2{4937} with SPIs c6c2447a_i (29114 bytes) 218b3d1e_o (5943 bytes) and TS 0.0.0.0/0 === 172.20.8.2/32 
[I] Nov 11 16:06:33 ipsec: 06[IKE] sending DELETE for ESP CHILD_SA with SPI c6c2447a 
[I] Nov 11 16:06:33 ipsec: 06[IKE] CHILD_SA closed 
[I] Nov 11 16:06:33 ndm: IpSec::Netfilter: start reloading netfilter configuration... 
[I] Nov 11 16:06:33 ndm: IpSec::Netfilter: netfilter configuration reloading is done. 
[I] Nov 11 16:06:43 ndhcps: DHCPREQUEST received (STATE_RENEWING) for 172.16.1.239 from 98:ee:cb:c3:a2:53. 
[I] Nov 11 16:06:43 ndhcps: sending ACK of 172.16.1.239 to 98:ee:cb:c3:a2:53. 
[I] Nov 11 16:06:57 ipsec: 11[CFG] received proposals: ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:NULL/HMAC_SHA1_96/NO_EXT_SEQ 
[I] Nov 11 16:06:57 ipsec: 11[CFG] configured proposals: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA2_256_128/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA2_256_128/NO_EXT_SEQ 
[I] Nov 11 16:06:57 ipsec: 11[CFG] selected proposal: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ 
[I] Nov 11 16:06:57 ipsec: 11[IKE] CHILD_SA VirtualIPServerIKE2{4950} established with SPIs cf29f19b_i e3523ed4_o and TS 0.0.0.0/0 === 172.20.8.2/32 
[E] Nov 11 16:06:57 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": unable to find client "urist2" @ "192.168.1.100" from "81.211.81.53". 
[C] Nov 11 16:06:57 ndm: IpSec::Configurator: "VirtualIPServerIKE2": out of memory [0xcffe0dcc]. 
[I] Nov 11 16:06:57 ndm: IpSec::Netfilter: start reloading netfilter configuration... 
[I] Nov 11 16:06:57 ndm: IpSec::Netfilter: netfilter configuration reloading is done. 
[I] Nov 11 16:07:18 ndhcps: DHCPREQUEST received (STATE_RENEWING) for 172.16.1.183 from 00:0b:82:97:12:32. 
[I] Nov 11 16:07:18 ndhcps: sending ACK of 172.16.1.183 to 00:0b:82:97:12:32. 
[I] Nov 11 16:08:07 ipsec: 15[IKE] received DELETE for ESP CHILD_SA with SPI 3279f1d4 
[I] Nov 11 16:08:07 ipsec: 15[IKE] closing CHILD_SA VirtualIPServerIKE2{4948} with SPIs c0832d3f_i (25401 bytes) 3279f1d4_o (9754 bytes) and TS 0.0.0.0/0 === 172.20.8.1/32 
[I] Nov 11 16:08:07 ipsec: 15[IKE] sending DELETE for ESP CHILD_SA with SPI c0832d3f 
[I] Nov 11 16:08:07 ipsec: 15[IKE] CHILD_SA closed 
[I] Nov 11 16:08:07 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": active CHILD SAs for user "buh". 
[I] Nov 11 16:08:07 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": "0" = "3229822271". 
[I] Nov 11 16:08:07 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": "1" = "846852564". 
[W] Nov 11 16:08:07 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": crypto map remote client "buh" @ "192.168.1.98" from "81.211.81.53" disconnected. 
[I] Nov 11 16:08:07 ipsec: 10[IKE] received DELETE for IKE_SA VirtualIPServerIKE2[1520] 
[I] Nov 11 16:08:07 ipsec: 10[IKE] deleting IKE_SA VirtualIPServerIKE2[1520] between 213.33.195.46[sakdjfwelfwe.keenetic.link]...81.211.81.53[192.168.1.98] 
[I] Nov 11 16:08:07 ipsec: 10[IKE] IKE_SA deleted 
[I] Nov 11 16:08:07 ndm: IpSec::Netfilter: start reloading netfilter configuration... 
[I] Nov 11 16:08:07 ndm: IpSec::Netfilter: netfilter configuration reloading is done. 
[I] Nov 11 16:08:10 ipsec: 06[IKE] received MS NT5 ISAKMPOAKLEY v9 vendor ID 
[I] Nov 11 16:08:10 ipsec: 06[IKE] received MS-Negotiation Discovery Capable vendor ID 
[I] Nov 11 16:08:10 ipsec: 06[IKE] received Vid-Initial-Contact vendor ID 
[I] Nov 11 16:08:10 ipsec: 06[IKE] 81.211.81.53 is initiating an IKE_SA 
[I] Nov 11 16:08:10 ipsec: 06[CFG] received proposals: IKE:3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:3DES_CBC/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:3DES_CBC/HMAC_SHA2_384_192/PRF_HMAC_SHA2_384/MODP_1024, IKE:AES_CBC=128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_CBC=128/HMAC_SHA2_384_192/PRF_HMAC_SHA2_384/MODP_1024, IKE:AES_CBC=192/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC=192/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_CBC=192/HMAC_SHA2_384_192/PRF_HMAC_SHA2_384/MODP_1024, IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_CBC=256/HMAC_SHA2_384_192/PRF_HMAC_SHA2_384/MODP_1024, IKE:AES_GCM_16=128/PRF_HMAC_SHA1/MODP_1024, IKE:AES_GCM_16=128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_GCM_16=128/PRF_HMAC_SHA2_384/MODP_1024, IKE:AES_GCM_16=256/PRF_HMAC_SHA1/MODP_1024, IKE:AES_GCM_16=256/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_GCM_16=256/ [...]
[I] Nov 11 16:08:10 ipsec: 06[CFG] configured proposals: IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_2048, IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/ECP_384, IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/ECP_256, IKE:AES_CBC=128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC=128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_2048, IKE:AES_CBC=128/HMAC_SHA1_96/PRF_HMAC_SHA1/ECP_384, IKE:AES_CBC=128/HMAC_SHA1_96/PRF_HMAC_SHA1/ECP_256, IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_2048, IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/ECP_384, IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/ECP_256, IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_2048, IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/ECP_384, IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/ECP_256 
[I] Nov 11 16:08:10 ipsec: 06[CFG] selected proposal: IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024 
[I] Nov 11 16:08:10 ipsec: 06[IKE] remote host is behind NAT 
[I] Nov 11 16:08:10 ipsec: 08[IKE] received 73 cert requests for an unknown ca 
[I] Nov 11 16:08:10 ipsec: 08[CFG] looking for peer configs matching 213.33.195.46[%any]...81.211.81.53[192.168.1.98] 
[I] Nov 11 16:08:10 ipsec: 08[CFG] selected peer config 'VirtualIPServerIKE2' 
[I] Nov 11 16:08:10 ipsec: 08[IKE] initiating EAP_IDENTITY method (id 0x00) 
[I] Nov 11 16:08:10 ipsec: 08[IKE] peer supports MOBIKE, but disabled in config 
[I] Nov 11 16:08:10 ipsec: 08[IKE] authentication of 'sakdjfwelfwe.keenetic.link' (myself) with RSA signature successful 
[I] Nov 11 16:08:10 ipsec: 08[IKE] sending end entity cert "CN=sakdjfwelfwe.keenetic.link" 
[I] Nov 11 16:08:10 ipsec: 08[IKE] sending issuer cert "C=US, O=Let's Encrypt, CN=R10" 
[I] Nov 11 16:08:10 ipsec: 05[IKE] received EAP identity 'buh' 
[I] Nov 11 16:08:10 ipsec: 05[IKE] initiating EAP_MSCHAPV2 method (id 0xB9) 
[I] Nov 11 16:08:10 ipsec: 12[IKE] EAP method EAP_MSCHAPV2 succeeded, MSK established 
[I] Nov 11 16:08:10 ipsec: 15[IKE] authentication of '192.168.1.98' with EAP successful 
[I] Nov 11 16:08:10 ipsec: 15[IKE] authentication of 'sakdjfwelfwe.keenetic.link' (myself) with EAP 
[I] Nov 11 16:08:10 ipsec: 15[IKE] IKE_SA VirtualIPServerIKE2[1522] established between 213.33.195.46[sakdjfwelfwe.keenetic.link]...81.211.81.53[192.168.1.98] 
[I] Nov 11 16:08:10 ipsec: 15[IKE] peer requested virtual IP %any 
[I] Nov 11 16:08:10 ndm: Core::Server: started Session /var/run/ndm.core.socket. 
[I] Nov 11 16:08:10 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": allocated address "172.20.8.1" for user "buh" @ "192.168.1.98" from "81.211.81.53". 
[I] Nov 11 16:08:10 ndm: Core::Session: client disconnected. 
[I] Nov 11 16:08:10 ipsec: 15[IKE] assigning virtual IP 172.20.8.1 to peer 'buh' 
[I] Nov 11 16:08:10 ipsec: 15[IKE] peer requested virtual IP %any6 
[I] Nov 11 16:08:10 ipsec: 15[IKE] no virtual IP found for %any6 requested by 'buh' 
[I] Nov 11 16:08:10 ipsec: 15[CFG] received proposals: ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:NULL/HMAC_SHA1_96/NO_EXT_SEQ 
[I] Nov 11 16:08:10 ipsec: 15[CFG] configured proposals: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA2_256_128/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA2_256_128/NO_EXT_SEQ 
[I] Nov 11 16:08:10 ipsec: 15[CFG] selected proposal: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ 
[I] Nov 11 16:08:10 ipsec: 15[IKE] CHILD_SA VirtualIPServerIKE2{4951} established with SPIs ca70fd17_i a65a68c0_o and TS 0.0.0.0/0 === 172.20.8.1/32 
[W] Nov 11 16:08:10 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": crypto map is up: remote client "buh" @ "192.168.1.98" with IP "172.20.8.1" connected. 
[I] Nov 11 16:08:10 ipsec: 15[CFG] scheduling RADIUS Interim-Updates every 5s 
[I] Nov 11 16:08:10 ndm: IpSec::Netfilter: start reloading netfilter configuration... 
[I] Nov 11 16:08:10 ndm: IpSec::Netfilter: netfilter configuration reloading is done. 
[I] Nov 11 16:08:12 ndhcps: DHCPINFORM received for 172.20.8.1 from 00:00:00:00:00:00. 
[I] Nov 11 16:08:12 ndhcps: sending INFORM to 00:00:00:00:00:00. 
[I] Nov 11 16:08:13 ipsec: 10[IKE] received DELETE for ESP CHILD_SA with SPI 64b33500 
[I] Nov 11 16:08:13 ipsec: 10[IKE] closing CHILD_SA VirtualIPServerIKE2{4945} with SPIs ce5635ef_i (26505 bytes) 64b33500_o (6233 bytes) and TS 0.0.0.0/0 === 172.20.8.1/32 
[I] Nov 11 16:08:13 ipsec: 10[IKE] sending DELETE for ESP CHILD_SA with SPI ce5635ef 
[I] Nov 11 16:08:13 ipsec: 10[IKE] CHILD_SA closed 
[I] Nov 11 16:08:13 ndm: IpSec::Netfilter: start reloading netfilter configuration... 
[I] Nov 11 16:08:13 ndm: IpSec::Netfilter: netfilter configuration reloading is done. 
[I] Nov 11 16:08:21 ipsec: 13[IKE] received MS NT5 ISAKMPOAKLEY v9 vendor ID 
[I] Nov 11 16:08:21 ipsec: 13[IKE] received MS-Negotiation Discovery Capable vendor ID 
[I] Nov 11 16:08:21 ipsec: 13[IKE] received Vid-Initial-Contact vendor ID 
[I] Nov 11 16:08:21 ipsec: 13[IKE] 37.122.20.103 is initiating an IKE_SA 
[I] Nov 11 16:08:21 ipsec: 13[CFG] received proposals: IKE:3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:3DES_CBC/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:3DES_CBC/HMAC_SHA2_384_192/PRF_HMAC_SHA2_384/MODP_1024, IKE:AES_CBC=128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_CBC=128/HMAC_SHA2_384_192/PRF_HMAC_SHA2_384/MODP_1024, IKE:AES_CBC=192/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC=192/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_CBC=192/HMAC_SHA2_384_192/PRF_HMAC_SHA2_384/MODP_1024, IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_CBC=256/HMAC_SHA2_384_192/PRF_HMAC_SHA2_384/MODP_1024, IKE:AES_GCM_16=128/PRF_HMAC_SHA1/MODP_1024, IKE:AES_GCM_16=128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_GCM_16=128/PRF_HMAC_SHA2_384/MODP_1024, IKE:AES_GCM_16=256/PRF_HMAC_SHA1/MODP_1024, IKE:AES_GCM_16=256/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_GCM_16=256/ [...]
[I] Nov 11 16:08:21 ipsec: 13[CFG] configured proposals: IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_2048, IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/ECP_384, IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/ECP_256, IKE:AES_CBC=128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC=128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_2048, IKE:AES_CBC=128/HMAC_SHA1_96/PRF_HMAC_SHA1/ECP_384, IKE:AES_CBC=128/HMAC_SHA1_96/PRF_HMAC_SHA1/ECP_256, IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_2048, IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/ECP_384, IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/ECP_256, IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_2048, IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/ECP_384, IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/ECP_256 
[I] Nov 11 16:08:21 ipsec: 13[CFG] selected proposal: IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024 
[I] Nov 11 16:08:21 ipsec: 13[IKE] remote host is behind NAT 
[I] Nov 11 16:08:22 ipsec: 15[IKE] received 279 cert requests for an unknown ca 
[I] Nov 11 16:08:22 ipsec: 15[CFG] looking for peer configs matching 213.33.195.46[%any]...37.122.20.103[192.168.0.32] 
[I] Nov 11 16:08:22 ipsec: 15[CFG] selected peer config 'VirtualIPServerIKE2' 
[I] Nov 11 16:08:22 ipsec: 15[IKE] initiating EAP_IDENTITY method (id 0x00) 
[I] Nov 11 16:08:22 ipsec: 15[IKE] peer supports MOBIKE, but disabled in config 
[I] Nov 11 16:08:22 ipsec: 15[IKE] authentication of 'sakdjfwelfwe.keenetic.link' (myself) with RSA signature successful 
[I] Nov 11 16:08:22 ipsec: 15[IKE] sending end entity cert "CN=sakdjfwelfwe.keenetic.link" 
[I] Nov 11 16:08:22 ipsec: 15[IKE] sending issuer cert "C=US, O=Let's Encrypt, CN=R10" 
[I] Nov 11 16:08:50 ipsec: 03[CFG] received proposals: ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:NULL/HMAC_SHA1_96/NO_EXT_SEQ 
[I] Nov 11 16:08:50 ipsec: 03[CFG] configured proposals: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA2_256_128/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA2_256_128/NO_EXT_SEQ 
[I] Nov 11 16:08:50 ipsec: 03[CFG] selected proposal: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ 
[I] Nov 11 16:08:50 ipsec: 03[IKE] CHILD_SA VirtualIPServerIKE2{4952} established with SPIs c3bf492b_i d62cf4f8_o and TS 0.0.0.0/0 === 172.20.8.1/32 
[E] Nov 11 16:08:50 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": unable to find client "metodist" @ "192.168.1.149" from "188.64.164.33". 
[C] Nov 11 16:08:50 ndm: IpSec::Configurator: "VirtualIPServerIKE2": out of memory [0xcffe0dcc]. 
[I] Nov 11 16:08:50 ndm: IpSec::Netfilter: start reloading netfilter configuration... 
[I] Nov 11 16:08:50 ndm: IpSec::Netfilter: netfilter configuration reloading is done. 
[I] Nov 11 16:08:51 ipsec: 15[JOB] deleting half open IKE_SA with 37.122.20.103 after timeout 
[I] Nov 11 16:11:55 ndhcps: DHCPREQUEST received (STATE_RENEWING) for 172.16.1.216 from 98:ee:cb:c3:a4:51. 
[I] Nov 11 16:11:55 ndhcps: sending ACK of 172.16.1.216 to 98:ee:cb:c3:a4:51. 
[I] Nov 11 16:11:58 ipsec: 11[IKE] received DELETE for ESP CHILD_SA with SPI 61c3e888 
[I] Nov 11 16:11:58 ipsec: 11[IKE] closing CHILD_SA VirtualIPServerIKE2{4947} with SPIs ccf9c8c6_i (18132 bytes) 61c3e888_o (14350 bytes) and TS 0.0.0.0/0 === 172.20.8.2/32 
[I] Nov 11 16:11:58 ipsec: 11[IKE] sending DELETE for ESP CHILD_SA with SPI ccf9c8c6 
[I] Nov 11 16:11:58 ipsec: 11[IKE] CHILD_SA closed 
[I] Nov 11 16:11:58 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": active CHILD SAs for user "urist". 
[W] Nov 11 16:11:58 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": crypto map remote client "urist" @ "192.168.1.43" from "81.211.81.53" disconnected. 
[I] Nov 11 16:11:58 ndm: IpSec::Netfilter: start reloading netfilter configuration... 
[I] Nov 11 16:11:58 ndm: IpSec::Netfilter: netfilter configuration reloading is done. 
[I] Nov 11 16:12:05 ipsec: 15[CFG] received proposals: ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:NULL/HMAC_SHA1_96/NO_EXT_SEQ 
[I] Nov 11 16:12:05 ipsec: 15[CFG] configured proposals: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA2_256_128/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA2_256_128/NO_EXT_SEQ 
[I] Nov 11 16:12:05 ipsec: 15[CFG] selected proposal: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ 
[I] Nov 11 16:12:05 ipsec: 15[IKE] CHILD_SA VirtualIPServerIKE2{4953} established with SPIs cf7ac52f_i 95038c86_o and TS 0.0.0.0/0 === 172.20.8.2/32 
[I] Nov 11 16:12:05 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": active CHILD SAs for user "urist". 
[I] Nov 11 16:12:05 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": "0" = "3480929583". 
[I] Nov 11 16:12:05 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": "1" = "2500037766". 
[W] Nov 11 16:12:05 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": crypto map is up: remote client "urist" @ "192.168.1.43" with IP "172.20.8.2" connected. 
[I] Nov 11 16:12:05 ndm: IpSec::Netfilter: start reloading netfilter configuration... 
[I] Nov 11 16:12:05 ndm: IpSec::Netfilter: netfilter configuration reloading is done. 
[I] Nov 11 16:12:33 ndhcps: DHCPREQUEST received (STATE_RENEWING) for 172.16.1.214 from 0a:f3:57:79:4b:d0. 
[I] Nov 11 16:12:34 ndhcps: sending ACK of 172.16.1.214 to 0a:f3:57:79:4b:d0. 
[I] Nov 11 16:13:06 ipsec: 15[IKE] received DELETE for ESP CHILD_SA with SPI 3f7a2bb6 
[I] Nov 11 16:13:06 ipsec: 15[IKE] closing CHILD_SA VirtualIPServerIKE2{4949} with SPIs cc955732_i (29353 bytes) 3f7a2bb6_o (9144 bytes) and TS 0.0.0.0/0 === 172.20.8.1/32 
[I] Nov 11 16:13:06 ipsec: 15[IKE] sending DELETE for ESP CHILD_SA with SPI cc955732 
[I] Nov 11 16:13:06 ipsec: 15[IKE] CHILD_SA closed 
[I] Nov 11 16:13:06 ndm: IpSec::Netfilter: start reloading netfilter configuration... 
[I] Nov 11 16:13:06 ndm: IpSec::Netfilter: netfilter configuration reloading is done. 
[I] Nov 11 16:13:23 ipsec: 13[CFG] received proposals: ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:NULL/HMAC_SHA1_96/NO_EXT_SEQ 
[I] Nov 11 16:13:23 ipsec: 13[CFG] configured proposals: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA2_256_128/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA2_256_128/NO_EXT_SEQ 
[I] Nov 11 16:13:23 ipsec: 13[CFG] selected proposal: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ 
[I] Nov 11 16:13:23 ipsec: 13[IKE] CHILD_SA VirtualIPServerIKE2{4954} established with SPIs cf723d42_i 2e05af2e_o and TS 0.0.0.0/0 === 172.20.8.1/32 
[E] Nov 11 16:13:23 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": unable to find client "metodist5" @ "192.168.0.4" from "95.55.35.180". 
[C] Nov 11 16:13:23 ndm: IpSec::Configurator: "VirtualIPServerIKE2": out of memory [0xcffe0dcc]. 
[I] Nov 11 16:13:24 ndm: IpSec::Netfilter: start reloading netfilter configuration... 
[I] Nov 11 16:13:24 ndm: IpSec::Netfilter: netfilter configuration reloading is done. 
[I] Nov 11 16:13:46 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster1/AccessPoint0": STA(52:eb:a4:8d:5e:55) had associated (has FT caps). 
[I] Nov 11 16:13:46 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster1/AccessPoint0": STA(52:eb:a4:8d:5e:55) set key done in WPA2/WPA2PSK. 
[I] Nov 11 16:13:46 ndhcps: DHCPREQUEST received (STATE_INIT) for 172.16.1.251 from 52:eb:a4:8d:5e:55. 
[I] Nov 11 16:13:46 ndhcps: sending ACK of 172.16.1.251 to 52:eb:a4:8d:5e:55. 
[I] Nov 11 16:13:47 ndhcps: DHCPREQUEST received (STATE_INIT) for 172.16.1.251 from 52:eb:a4:8d:5e:55. 
[I] Nov 11 16:13:48 ndhcps: sending ACK of 172.16.1.251 to 52:eb:a4:8d:5e:55. 
[I] Nov 11 16:13:50 ipsec: 06[IKE] received DELETE for ESP CHILD_SA with SPI a65a68c0 
[I] Nov 11 16:13:50 ipsec: 06[IKE] closing CHILD_SA VirtualIPServerIKE2{4951} with SPIs ca70fd17_i (63189 bytes) a65a68c0_o (166515 bytes) and TS 0.0.0.0/0 === 172.20.8.1/32 
[I] Nov 11 16:13:50 ipsec: 06[IKE] sending DELETE for ESP CHILD_SA with SPI ca70fd17 
[I] Nov 11 16:13:50 ipsec: 06[IKE] CHILD_SA closed 
[I] Nov 11 16:13:50 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": active CHILD SAs for user "buh". 
[W] Nov 11 16:13:50 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": crypto map remote client "buh" @ "192.168.1.98" from "81.211.81.53" disconnected. 
[I] Nov 11 16:13:50 ndm: IpSec::Netfilter: start reloading netfilter configuration... 
[I] Nov 11 16:13:50 ndm: IpSec::Netfilter: netfilter configuration reloading is done. 
[I] Nov 11 16:13:52 ipsec: 07[CFG] received proposals: ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:NULL/HMAC_SHA1_96/NO_EXT_SEQ 
[I] Nov 11 16:13:52 ipsec: 07[CFG] configured proposals: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA2_256_128/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA2_256_128/NO_EXT_SEQ 
[I] Nov 11 16:13:52 ipsec: 07[CFG] selected proposal: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ 
[I] Nov 11 16:13:52 ipsec: 07[IKE] CHILD_SA VirtualIPServerIKE2{4955} established with SPIs c0ff9576_i e8296596_o and TS 0.0.0.0/0 === 172.20.8.1/32 
[I] Nov 11 16:13:52 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": active CHILD SAs for user "buh". 
[I] Nov 11 16:13:52 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": "0" = "3237975414". 
[I] Nov 11 16:13:52 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": "1" = "3895027094". 
[W] Nov 11 16:13:52 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": crypto map is up: remote client "buh" @ "192.168.1.98" with IP "172.20.8.1" connected. 
[I] Nov 11 16:13:52 ndm: IpSec::Netfilter: start reloading netfilter configuration... 
[I] Nov 11 16:13:52 ndm: IpSec::Netfilter: netfilter configuration reloading is done. 
[I] Nov 11 16:14:11 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster1/AccessPoint0": STA(52:eb:a4:8d:5e:55) had deauthenticated by STA (reason: STA is leaving or has left BSS). 
[I] Nov 11 16:15:54 ipsec: 03[IKE] received DELETE for ESP CHILD_SA with SPI e3523ed4 
[I] Nov 11 16:15:54 ipsec: 03[IKE] closing CHILD_SA VirtualIPServerIKE2{4950} with SPIs cf29f19b_i (6372 bytes) e3523ed4_o (2702 bytes) and TS 0.0.0.0/0 === 172.20.8.2/32 
[I] Nov 11 16:15:54 ipsec: 03[IKE] sending DELETE for ESP CHILD_SA with SPI cf29f19b 
[I] Nov 11 16:15:54 ipsec: 03[IKE] CHILD_SA closed 
[I] Nov 11 16:15:54 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster1/AccessPoint0": STA(e6:29:c0:f6:d9:c9) had associated (has FT caps). 
[I] Nov 11 16:15:54 ndm: IpSec::Netfilter: start reloading netfilter configuration... 
[I] Nov 11 16:15:54 ndm: IpSec::Netfilter: netfilter configuration reloading is done. 
[I] Nov 11 16:15:54 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster1/AccessPoint0": STA(e6:29:c0:f6:d9:c9) set key done in WPA2/WPA2PSK. 
[I] Nov 11 16:15:54 ndhcps: DHCPREQUEST received (STATE_INIT) for 172.16.1.207 from e6:29:c0:f6:d9:c9. 
[I] Nov 11 16:15:55 ndhcps: sending ACK of 172.16.1.207 to e6:29:c0:f6:d9:c9. 
[I] Nov 11 16:15:56 dropbear: Child connection from 92.255.85.253:61202 
[E] Nov 11 16:15:58 dropbear: Login attempt for nonexistent user 'user' 
[I] Nov 11 16:15:59 ipsec: 11[CFG] received proposals: ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:NULL/HMAC_SHA1_96/NO_EXT_SEQ 
[I] Nov 11 16:15:59 ipsec: 11[CFG] configured proposals: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA2_256_128/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA2_256_128/NO_EXT_SEQ 
[I] Nov 11 16:15:59 ipsec: 11[CFG] selected proposal: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ 
[I] Nov 11 16:15:59 ipsec: 11[IKE] inbound CHILD_SA VirtualIPServerIKE2{4956} established with SPIs c318f629_i 79d589cc_o and TS 0.0.0.0/0 === 172.20.8.4/32 
[E] Nov 11 16:15:59 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": unable to find client "metodist2" @ "192.168.1.70" from "79.139.193.172". 
[C] Nov 11 16:15:59 ndm: IpSec::Configurator: "VirtualIPServerIKE2": out of memory [0xcffe0dcc]. 
[I] Nov 11 16:15:59 ipsec: 13[IKE] received DELETE for ESP CHILD_SA with SPI 90131018 
[I] Nov 11 16:15:59 ipsec: 13[IKE] closing CHILD_SA VirtualIPServerIKE2{4925} with SPIs cb989fc1_i (103449 bytes) 90131018_o (36898 bytes) and TS 0.0.0.0/0 === 172.20.8.4/32 
[I] Nov 11 16:15:59 ipsec: 13[IKE] sending DELETE for ESP CHILD_SA with SPI cb989fc1 
[I] Nov 11 16:15:59 ipsec: 13[IKE] CHILD_SA closed 
[I] Nov 11 16:15:59 ipsec: 13[IKE] outbound CHILD_SA VirtualIPServerIKE2{4956} established with SPIs c318f629_i 79d589cc_o and TS 0.0.0.0/0 === 172.20.8.4/32 
[I] Nov 11 16:15:59 ndm: IpSec::Netfilter: start reloading netfilter configuration... 
[I] Nov 11 16:15:59 ndm: IpSec::Netfilter: netfilter configuration reloading is done. 
[I] Nov 11 16:16:00 dropbear: Exit before auth from <92.255.85.253:61202>: Error reading: Connection reset by peer 
[I] Nov 11 16:16:22 ipsec: 12[CFG] received proposals: ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:NULL/HMAC_SHA1_96/NO_EXT_SEQ 
[I] Nov 11 16:16:22 ipsec: 12[CFG] configured proposals: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA2_256_128/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA2_256_128/NO_EXT_SEQ 
[I] Nov 11 16:16:22 ipsec: 12[CFG] selected proposal: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ 
[I] Nov 11 16:16:22 ipsec: 12[IKE] CHILD_SA VirtualIPServerIKE2{4957} established with SPIs cae8b6a3_i 6c6afcbc_o and TS 0.0.0.0/0 === 172.20.8.2/32 
[E] Nov 11 16:16:23 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": unable to find client "urist2" @ "192.168.1.100" from "81.211.81.53". 
[C] Nov 11 16:16:23 ndm: IpSec::Configurator: "VirtualIPServerIKE2": out of memory [0xcffe0dcc]. 
[I] Nov 11 16:16:23 ndm: IpSec::Netfilter: start reloading netfilter configuration... 
[I] Nov 11 16:16:23 ndm: IpSec::Netfilter: netfilter configuration reloading is done. 
[I] Nov 11 16:18:20 ipsec: 14[IKE] received DELETE for ESP CHILD_SA with SPI d62cf4f8 
[I] Nov 11 16:18:20 ipsec: 14[IKE] closing CHILD_SA VirtualIPServerIKE2{4952} with SPIs c3bf492b_i (709268 bytes) d62cf4f8_o (4561643 bytes) and TS 0.0.0.0/0 === 172.20.8.1/32 
[I] Nov 11 16:18:20 ipsec: 14[IKE] sending DELETE for ESP CHILD_SA with SPI c3bf492b 
[I] Nov 11 16:18:20 ipsec: 14[IKE] CHILD_SA closed 
[I] Nov 11 16:18:20 ndm: IpSec::Netfilter: start reloading netfilter configuration... 
[I] Nov 11 16:18:20 ndm: IpSec::Netfilter: netfilter configuration reloading is done. 
[I] Nov 11 16:18:21 ipsec: 03[CFG] received proposals: ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:NULL/HMAC_SHA1_96/NO_EXT_SEQ 
[I] Nov 11 16:18:21 ipsec: 03[CFG] configured proposals: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA2_256_128/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA2_256_128/NO_EXT_SEQ 
[I] Nov 11 16:18:21 ipsec: 03[CFG] selected proposal: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ 
[I] Nov 11 16:18:21 ipsec: 03[IKE] CHILD_SA VirtualIPServerIKE2{4958} established with SPIs cb91fb1a_i a7348cb0_o and TS 0.0.0.0/0 === 172.20.8.1/32 
[E] Nov 11 16:18:21 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": unable to find client "metodist" @ "192.168.1.149" from "188.64.164.33". 
[C] Nov 11 16:18:21 ndm: IpSec::Configurator: "VirtualIPServerIKE2": out of memory [0xcffe0dcc]. 
[I] Nov 11 16:18:21 ndm: IpSec::Netfilter: start reloading netfilter configuration... 
[I] Nov 11 16:18:21 ndm: IpSec::Netfilter: netfilter configuration reloading is done. 
[I] Nov 11 16:18:32 ipsec: 05[IKE] received DELETE for ESP CHILD_SA with SPI 2e05af2e 
[I] Nov 11 16:18:32 ipsec: 05[IKE] closing CHILD_SA VirtualIPServerIKE2{4954} with SPIs cf723d42_i (19891 bytes) 2e05af2e_o (250 bytes) and TS 0.0.0.0/0 === 172.20.8.1/32 
[I] Nov 11 16:18:32 ipsec: 05[IKE] sending DELETE for ESP CHILD_SA with SPI cf723d42 
[I] Nov 11 16:18:32 ipsec: 05[IKE] CHILD_SA closed 
[I] Nov 11 16:18:32 ndm: IpSec::Netfilter: start reloading netfilter configuration... 
[I] Nov 11 16:18:32 ndm: IpSec::Netfilter: netfilter configuration reloading is done. 
[I] Nov 11 16:18:32 ipsec: 14[CFG] received proposals: ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:NULL/HMAC_SHA1_96/NO_EXT_SEQ 
[I] Nov 11 16:18:32 ipsec: 14[CFG] configured proposals: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA2_256_128/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA2_256_128/NO_EXT_SEQ 
[I] Nov 11 16:18:32 ipsec: 14[CFG] selected proposal: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ 
[I] Nov 11 16:18:32 ipsec: 14[IKE] CHILD_SA VirtualIPServerIKE2{4959} established with SPIs c67588c6_i b157dcc8_o and TS 0.0.0.0/0 === 172.20.8.1/32 
[E] Nov 11 16:18:32 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": unable to find client "metodist5" @ "192.168.0.4" from "95.55.35.180". 
[C] Nov 11 16:18:32 ndm: IpSec::Configurator: "VirtualIPServerIKE2": out of memory [0xcffe0dcc]. 
[I] Nov 11 16:18:32 ndm: IpSec::Netfilter: start reloading netfilter configuration... 
[I] Nov 11 16:18:32 ndm: IpSec::Netfilter: netfilter configuration reloading is done. 
[I] Nov 11 16:19:13 ipsec: 09[IKE] received DELETE for ESP CHILD_SA with SPI b157dcc8 
[I] Nov 11 16:19:13 ipsec: 09[IKE] closing CHILD_SA VirtualIPServerIKE2{4959} with SPIs c67588c6_i (322 bytes) b157dcc8_o (681 bytes) and TS 0.0.0.0/0 === 172.20.8.1/32 
[I] Nov 11 16:19:13 ipsec: 09[IKE] sending DELETE for ESP CHILD_SA with SPI c67588c6 
[I] Nov 11 16:19:13 ipsec: 09[IKE] CHILD_SA closed 
[I] Nov 11 16:19:13 ndm: IpSec::Netfilter: start reloading netfilter configuration... 
[I] Nov 11 16:19:13 ipsec: 11[IKE] received DELETE for IKE_SA VirtualIPServerIKE2[1506] 
[I] Nov 11 16:19:13 ipsec: 11[IKE] deleting IKE_SA VirtualIPServerIKE2[1506] between 213.33.195.46[sakdjfwelfwe.keenetic.link]...95.55.35.180[192.168.0.4] 
[I] Nov 11 16:19:13 ipsec: 11[IKE] IKE_SA deleted 
[I] Nov 11 16:19:13 ndm: IpSec::Netfilter: netfilter configuration reloading is done. 
[I] Nov 11 16:19:16 ipsec: 08[IKE] received MS NT5 ISAKMPOAKLEY v9 vendor ID 
[I] Nov 11 16:19:16 ipsec: 08[IKE] received MS-Negotiation Discovery Capable vendor ID 
[I] Nov 11 16:19:16 ipsec: 08[IKE] received Vid-Initial-Contact vendor ID 
[I] Nov 11 16:19:16 ipsec: 08[IKE] 95.55.35.180 is initiating an IKE_SA 
[I] Nov 11 16:19:16 ipsec: 08[CFG] received proposals: IKE:3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:3DES_CBC/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:3DES_CBC/HMAC_SHA2_384_192/PRF_HMAC_SHA2_384/MODP_1024, IKE:AES_CBC=128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_CBC=128/HMAC_SHA2_384_192/PRF_HMAC_SHA2_384/MODP_1024, IKE:AES_CBC=192/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC=192/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_CBC=192/HMAC_SHA2_384_192/PRF_HMAC_SHA2_384/MODP_1024, IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_CBC=256/HMAC_SHA2_384_192/PRF_HMAC_SHA2_384/MODP_1024, IKE:AES_GCM_16=128/PRF_HMAC_SHA1/MODP_1024, IKE:AES_GCM_16=128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_GCM_16=128/PRF_HMAC_SHA2_384/MODP_1024, IKE:AES_GCM_16=256/PRF_HMAC_SHA1/MODP_1024, IKE:AES_GCM_16=256/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_GCM_16=256/ [...]
[I] Nov 11 16:19:16 ipsec: 08[CFG] configured proposals: IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_2048, IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/ECP_384, IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/ECP_256, IKE:AES_CBC=128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC=128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_2048, IKE:AES_CBC=128/HMAC_SHA1_96/PRF_HMAC_SHA1/ECP_384, IKE:AES_CBC=128/HMAC_SHA1_96/PRF_HMAC_SHA1/ECP_256, IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_2048, IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/ECP_384, IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/ECP_256, IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_2048, IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/ECP_384, IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/ECP_256 
[I] Nov 11 16:19:16 ipsec: 08[CFG] selected proposal: IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024 
[I] Nov 11 16:19:16 ipsec: 08[IKE] remote host is behind NAT 
[I] Nov 11 16:19:17 ipsec: 10[IKE] received 46 cert requests for an unknown ca 
[I] Nov 11 16:19:17 ipsec: 10[CFG] looking for peer configs matching 213.33.195.46[%any]...95.55.35.180[192.168.0.4] 
[I] Nov 11 16:19:17 ipsec: 10[CFG] selected peer config 'VirtualIPServerIKE2' 
[I] Nov 11 16:19:17 ipsec: 10[IKE] initiating EAP_IDENTITY method (id 0x00) 
[I] Nov 11 16:19:17 ipsec: 10[IKE] peer supports MOBIKE, but disabled in config 
[I] Nov 11 16:19:17 ipsec: 10[IKE] authentication of 'sakdjfwelfwe.keenetic.link' (myself) with RSA signature successful 
[I] Nov 11 16:19:17 ipsec: 10[IKE] sending end entity cert "CN=sakdjfwelfwe.keenetic.link" 
[I] Nov 11 16:19:17 ipsec: 10[IKE] sending issuer cert "C=US, O=Let's Encrypt, CN=R10" 
[I] Nov 11 16:19:17 ipsec: 15[IKE] received EAP identity 'metodist5' 
[I] Nov 11 16:19:17 ipsec: 15[IKE] initiating EAP_MSCHAPV2 method (id 0xA0) 
[I] Nov 11 16:19:17 ipsec: 12[IKE] EAP method EAP_MSCHAPV2 succeeded, MSK established 
[I] Nov 11 16:19:17 ipsec: 14[IKE] authentication of '192.168.0.4' with EAP successful 
[I] Nov 11 16:19:17 ipsec: 14[IKE] authentication of 'sakdjfwelfwe.keenetic.link' (myself) with EAP 
[I] Nov 11 16:19:17 ipsec: 14[IKE] IKE_SA VirtualIPServerIKE2[1524] established between 213.33.195.46[sakdjfwelfwe.keenetic.link]...95.55.35.180[192.168.0.4] 
[I] Nov 11 16:19:17 ipsec: 14[IKE] peer requested virtual IP %any 
[I] Nov 11 16:19:17 ndm: Core::Server: started Session /var/run/ndm.core.socket. 
[I] Nov 11 16:19:17 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": allocated address "172.20.8.3" for user "metodist5" @ "192.168.0.4" from "95.55.35.180". 
[I] Nov 11 16:19:17 ndm: Core::Session: client disconnected. 
[I] Nov 11 16:19:17 ipsec: 14[IKE] assigning virtual IP 172.20.8.3 to peer 'metodist5' 
[I] Nov 11 16:19:17 ipsec: 14[IKE] peer requested virtual IP %any6 
[I] Nov 11 16:19:17 ipsec: 14[IKE] no virtual IP found for %any6 requested by 'metodist5' 
[I] Nov 11 16:19:17 ipsec: 14[CFG] received proposals: ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:NULL/HMAC_SHA1_96/NO_EXT_SEQ 
[I] Nov 11 16:19:17 ipsec: 14[CFG] configured proposals: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA2_256_128/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA2_256_128/NO_EXT_SEQ 
[I] Nov 11 16:19:17 ipsec: 14[CFG] selected proposal: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ 
[I] Nov 11 16:19:17 ipsec: 14[IKE] CHILD_SA VirtualIPServerIKE2{4960} established with SPIs c08babca_i bcfd1b78_o and TS 0.0.0.0/0 === 172.20.8.3/32 
[W] Nov 11 16:19:17 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": crypto map is up: remote client "metodist5" @ "192.168.0.4" with IP "172.20.8.3" connected. 
[I] Nov 11 16:19:17 ipsec: 14[CFG] scheduling RADIUS Interim-Updates every 5s 
[I] Nov 11 16:19:17 ndm: IpSec::Netfilter: start reloading netfilter configuration... 
[I] Nov 11 16:19:17 ndm: IpSec::Netfilter: netfilter configuration reloading is done. 
[I] Nov 11 16:19:19 ndhcps: DHCPINFORM received for 172.20.8.3 from 00:00:00:00:00:00. 
[I] Nov 11 16:19:19 ndhcps: sending INFORM to 00:00:00:00:00:00. 
[I] Nov 11 16:19:58 ipsec: 13[IKE] received DELETE for ESP CHILD_SA with SPI bcfd1b78 
[I] Nov 11 16:19:58 ipsec: 13[IKE] closing CHILD_SA VirtualIPServerIKE2{4960} with SPIs c08babca_i (18933 bytes) bcfd1b78_o (4151 bytes) and TS 0.0.0.0/0 === 172.20.8.3/32 
[I] Nov 11 16:19:58 ipsec: 13[IKE] sending DELETE for ESP CHILD_SA with SPI c08babca 
[I] Nov 11 16:19:58 ipsec: 13[IKE] CHILD_SA closed 
[I] Nov 11 16:19:58 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": active CHILD SAs for user "metodist5". 
[W] Nov 11 16:19:58 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": crypto map remote client "metodist5" @ "192.168.0.4" from "95.55.35.180" disconnected. 
[I] Nov 11 16:19:58 ndm: IpSec::Netfilter: start reloading netfilter configuration... 
[I] Nov 11 16:19:58 ipsec: 06[IKE] received DELETE for IKE_SA VirtualIPServerIKE2[1524] 
[I] Nov 11 16:19:58 ipsec: 06[IKE] deleting IKE_SA VirtualIPServerIKE2[1524] between 213.33.195.46[sakdjfwelfwe.keenetic.link]...95.55.35.180[192.168.0.4] 
[I] Nov 11 16:19:58 ipsec: 06[IKE] IKE_SA deleted 
[I] Nov 11 16:19:58 ndm: IpSec::Netfilter: netfilter configuration reloading is done. 
[I] Nov 11 16:20:19 ipsec: 06[IKE] received DELETE for ESP CHILD_SA with SPI e8296596 
[I] Nov 11 16:20:19 ipsec: 06[IKE] closing CHILD_SA VirtualIPServerIKE2{4955} with SPIs c0ff9576_i (52411 bytes) e8296596_o (42263 bytes) and TS 0.0.0.0/0 === 172.20.8.1/32 
[I] Nov 11 16:20:19 ipsec: 06[IKE] sending DELETE for ESP CHILD_SA with SPI c0ff9576 
[I] Nov 11 16:20:19 ipsec: 06[IKE] CHILD_SA closed 
[I] Nov 11 16:20:19 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": active CHILD SAs for user "buh". 
[I] Nov 11 16:20:19 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": "0" = "3237975414". 
[I] Nov 11 16:20:19 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": "1" = "3895027094". 
[W] Nov 11 16:20:19 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": crypto map remote client "buh" @ "192.168.1.98" from "81.211.81.53" disconnected. 
[I] Nov 11 16:20:19 ipsec: 03[IKE] received DELETE for IKE_SA VirtualIPServerIKE2[1522] 
[I] Nov 11 16:20:19 ipsec: 03[IKE] deleting IKE_SA VirtualIPServerIKE2[1522] between 213.33.195.46[sakdjfwelfwe.keenetic.link]...81.211.81.53[192.168.1.98] 
[I] Nov 11 16:20:19 ipsec: 03[IKE] IKE_SA deleted 
[I] Nov 11 16:20:19 ndm: IpSec::Netfilter: start reloading netfilter configuration... 
[I] Nov 11 16:20:19 ndm: IpSec::Netfilter: netfilter configuration reloading is done. 
[I] Nov 11 16:20:21 ipsec: 13[IKE] received MS NT5 ISAKMPOAKLEY v9 vendor ID 
[I] Nov 11 16:20:21 ipsec: 13[IKE] received MS-Negotiation Discovery Capable vendor ID 
[I] Nov 11 16:20:21 ipsec: 13[IKE] received Vid-Initial-Contact vendor ID 
[I] Nov 11 16:20:21 ipsec: 13[IKE] 81.211.81.53 is initiating an IKE_SA 
[I] Nov 11 16:20:21 ipsec: 13[CFG] received proposals: IKE:3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:3DES_CBC/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:3DES_CBC/HMAC_SHA2_384_192/PRF_HMAC_SHA2_384/MODP_1024, IKE:AES_CBC=128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_CBC=128/HMAC_SHA2_384_192/PRF_HMAC_SHA2_384/MODP_1024, IKE:AES_CBC=192/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC=192/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_CBC=192/HMAC_SHA2_384_192/PRF_HMAC_SHA2_384/MODP_1024, IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_CBC=256/HMAC_SHA2_384_192/PRF_HMAC_SHA2_384/MODP_1024, IKE:AES_GCM_16=128/PRF_HMAC_SHA1/MODP_1024, IKE:AES_GCM_16=128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_GCM_16=128/PRF_HMAC_SHA2_384/MODP_1024, IKE:AES_GCM_16=256/PRF_HMAC_SHA1/MODP_1024, IKE:AES_GCM_16=256/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_GCM_16=256/ [...]
[I] Nov 11 16:20:21 ipsec: 13[CFG] configured proposals: IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_2048, IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/ECP_384, IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/ECP_256, IKE:AES_CBC=128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC=128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_2048, IKE:AES_CBC=128/HMAC_SHA1_96/PRF_HMAC_SHA1/ECP_384, IKE:AES_CBC=128/HMAC_SHA1_96/PRF_HMAC_SHA1/ECP_256, IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_2048, IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/ECP_384, IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/ECP_256, IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_2048, IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/ECP_384, IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/ECP_256 
[I] Nov 11 16:20:21 ipsec: 13[CFG] selected proposal: IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024 
[I] Nov 11 16:20:21 ipsec: 13[IKE] remote host is behind NAT 
[I] Nov 11 16:20:22 ipsec: 15[IKE] received 73 cert requests for an unknown ca 
[I] Nov 11 16:20:22 ipsec: 15[CFG] looking for peer configs matching 213.33.195.46[%any]...81.211.81.53[192.168.1.98] 
[I] Nov 11 16:20:22 ipsec: 15[CFG] selected peer config 'VirtualIPServerIKE2' 
[I] Nov 11 16:20:22 ipsec: 15[IKE] initiating EAP_IDENTITY method (id 0x00) 
[I] Nov 11 16:20:22 ipsec: 15[IKE] peer supports MOBIKE, but disabled in config 
[I] Nov 11 16:20:22 ipsec: 15[IKE] authentication of 'sakdjfwelfwe.keenetic.link' (myself) with RSA signature successful 
[I] Nov 11 16:20:22 ipsec: 15[IKE] sending end entity cert "CN=sakdjfwelfwe.keenetic.link" 
[I] Nov 11 16:20:22 ipsec: 15[IKE] sending issuer cert "C=US, O=Let's Encrypt, CN=R10" 
[I] Nov 11 16:20:22 ipsec: 03[IKE] received EAP identity 'buh' 
[I] Nov 11 16:20:22 ipsec: 03[IKE] initiating EAP_MSCHAPV2 method (id 0xEC) 
[I] Nov 11 16:20:22 ipsec: 11[IKE] EAP method EAP_MSCHAPV2 succeeded, MSK established 
[I] Nov 11 16:20:22 ipsec: 07[IKE] authentication of '192.168.1.98' with EAP successful 
[I] Nov 11 16:20:22 ipsec: 07[IKE] authentication of 'sakdjfwelfwe.keenetic.link' (myself) with EAP 
[I] Nov 11 16:20:22 ipsec: 07[IKE] IKE_SA VirtualIPServerIKE2[1525] established between 213.33.195.46[sakdjfwelfwe.keenetic.link]...81.211.81.53[192.168.1.98] 
[I] Nov 11 16:20:22 ipsec: 07[IKE] peer requested virtual IP %any 
[I] Nov 11 16:20:22 ndm: Core::Server: started Session /var/run/ndm.core.socket. 
[I] Nov 11 16:20:22 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": allocated address "172.20.8.1" for user "buh" @ "192.168.1.98" from "81.211.81.53". 
[I] Nov 11 16:20:22 ndm: Core::Session: client disconnected. 
[I] Nov 11 16:20:22 ipsec: 07[IKE] assigning virtual IP 172.20.8.1 to peer 'buh' 
[I] Nov 11 16:20:22 ipsec: 07[IKE] peer requested virtual IP %any6 
[I] Nov 11 16:20:22 ipsec: 07[IKE] no virtual IP found for %any6 requested by 'buh' 
[I] Nov 11 16:20:22 ipsec: 07[CFG] received proposals: ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:NULL/HMAC_SHA1_96/NO_EXT_SEQ 
[I] Nov 11 16:20:22 ipsec: 07[CFG] configured proposals: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA2_256_128/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA2_256_128/NO_EXT_SEQ 
[I] Nov 11 16:20:22 ipsec: 07[CFG] selected proposal: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ 
[I] Nov 11 16:20:22 ipsec: 07[IKE] CHILD_SA VirtualIPServerIKE2{4961} established with SPIs cf51480a_i 1a6ef356_o and TS 0.0.0.0/0 === 172.20.8.1/32 
[W] Nov 11 16:20:22 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": crypto map is up: remote client "buh" @ "192.168.1.98" with IP "172.20.8.1" connected. 
[I] Nov 11 16:20:22 ipsec: 07[CFG] scheduling RADIUS Interim-Updates every 5s 
[I] Nov 11 16:20:22 ndm: IpSec::Netfilter: start reloading netfilter configuration... 
[I] Nov 11 16:20:22 ndm: IpSec::Netfilter: netfilter configuration reloading is done. 
[I] Nov 11 16:20:25 ndhcps: DHCPINFORM received for 172.20.8.1 from 00:00:00:00:00:00. 
[I] Nov 11 16:20:25 ndhcps: sending INFORM to 00:00:00:00:00:00. 
[I] Nov 11 16:20:59 ipsec: 05[IKE] received MS NT5 ISAKMPOAKLEY v9 vendor ID 
[I] Nov 11 16:20:59 ipsec: 05[IKE] received MS-Negotiation Discovery Capable vendor ID 
[I] Nov 11 16:20:59 ipsec: 05[IKE] received Vid-Initial-Contact vendor ID 
[I] Nov 11 16:20:59 ipsec: 05[IKE] 95.55.35.180 is initiating an IKE_SA 
[I] Nov 11 16:20:59 ipsec: 05[CFG] received proposals: IKE:3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:3DES_CBC/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:3DES_CBC/HMAC_SHA2_384_192/PRF_HMAC_SHA2_384/MODP_1024, IKE:AES_CBC=128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_CBC=128/HMAC_SHA2_384_192/PRF_HMAC_SHA2_384/MODP_1024, IKE:AES_CBC=192/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC=192/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_CBC=192/HMAC_SHA2_384_192/PRF_HMAC_SHA2_384/MODP_1024, IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_CBC=256/HMAC_SHA2_384_192/PRF_HMAC_SHA2_384/MODP_1024, IKE:AES_GCM_16=128/PRF_HMAC_SHA1/MODP_1024, IKE:AES_GCM_16=128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_GCM_16=128/PRF_HMAC_SHA2_384/MODP_1024, IKE:AES_GCM_16=256/PRF_HMAC_SHA1/MODP_1024, IKE:AES_GCM_16=256/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_GCM_16=256/ [...]
[I] Nov 11 16:20:59 ipsec: 05[CFG] configured proposals: IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_2048, IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/ECP_384, IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/ECP_256, IKE:AES_CBC=128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC=128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_2048, IKE:AES_CBC=128/HMAC_SHA1_96/PRF_HMAC_SHA1/ECP_384, IKE:AES_CBC=128/HMAC_SHA1_96/PRF_HMAC_SHA1/ECP_256, IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_2048, IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/ECP_384, IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/ECP_256, IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_2048, IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/ECP_384, IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/ECP_256 
[I] Nov 11 16:20:59 ipsec: 05[CFG] selected proposal: IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024 
[I] Nov 11 16:20:59 ipsec: 05[IKE] remote host is behind NAT 
[I] Nov 11 16:20:59 ipsec: 09[IKE] received 46 cert requests for an unknown ca 
[I] Nov 11 16:20:59 ipsec: 09[CFG] looking for peer configs matching 213.33.195.46[%any]...95.55.35.180[192.168.0.4] 
[I] Nov 11 16:20:59 ipsec: 09[CFG] selected peer config 'VirtualIPServerIKE2' 
[I] Nov 11 16:20:59 ipsec: 09[IKE] initiating EAP_IDENTITY method (id 0x00) 
[I] Nov 11 16:20:59 ipsec: 09[IKE] peer supports MOBIKE, but disabled in config 
[I] Nov 11 16:20:59 ipsec: 09[IKE] authentication of 'sakdjfwelfwe.keenetic.link' (myself) with RSA signature successful 
[I] Nov 11 16:20:59 ipsec: 09[IKE] sending end entity cert "CN=sakdjfwelfwe.keenetic.link" 
[I] Nov 11 16:20:59 ipsec: 09[IKE] sending issuer cert "C=US, O=Let's Encrypt, CN=R10" 
[I] Nov 11 16:21:00 ipsec: 11[IKE] received EAP identity 'metodist5' 
[I] Nov 11 16:21:00 ipsec: 11[IKE] initiating EAP_MSCHAPV2 method (id 0x29) 
[I] Nov 11 16:21:00 ipsec: 05[IKE] EAP method EAP_MSCHAPV2 succeeded, MSK established 
[I] Nov 11 16:21:00 ipsec: 14[IKE] authentication of '192.168.0.4' with EAP successful 
[I] Nov 11 16:21:00 ipsec: 14[IKE] authentication of 'sakdjfwelfwe.keenetic.link' (myself) with EAP 
[I] Nov 11 16:21:00 ipsec: 14[IKE] IKE_SA VirtualIPServerIKE2[1526] established between 213.33.195.46[sakdjfwelfwe.keenetic.link]...95.55.35.180[192.168.0.4] 
[I] Nov 11 16:21:00 ipsec: 14[IKE] peer requested virtual IP %any 
[I] Nov 11 16:21:00 ndm: Core::Server: started Session /var/run/ndm.core.socket. 
[I] Nov 11 16:21:00 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": allocated address "172.20.8.3" for user "metodist5" @ "192.168.0.4" from "95.55.35.180". 
[I] Nov 11 16:21:00 ndm: Core::Session: client disconnected. 
[I] Nov 11 16:21:00 ipsec: 14[IKE] assigning virtual IP 172.20.8.3 to peer 'metodist5' 
[I] Nov 11 16:21:00 ipsec: 14[IKE] peer requested virtual IP %any6 
[I] Nov 11 16:21:00 ipsec: 14[IKE] no virtual IP found for %any6 requested by 'metodist5' 
[I] Nov 11 16:21:00 ipsec: 14[CFG] received proposals: ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:NULL/HMAC_SHA1_96/NO_EXT_SEQ 
[I] Nov 11 16:21:00 ipsec: 14[CFG] configured proposals: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA2_256_128/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA2_256_128/NO_EXT_SEQ 
[I] Nov 11 16:21:00 ipsec: 14[CFG] selected proposal: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ 
[I] Nov 11 16:21:00 ipsec: 14[IKE] CHILD_SA VirtualIPServerIKE2{4962} established with SPIs c6e50121_i 7ac03e24_o and TS 0.0.0.0/0 === 172.20.8.3/32 
[W] Nov 11 16:21:00 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": crypto map is up: remote client "metodist5" @ "192.168.0.4" with IP "172.20.8.3" connected. 
[I] Nov 11 16:21:00 ipsec: 14[CFG] scheduling RADIUS Interim-Updates every 5s 
[I] Nov 11 16:21:00 ndm: IpSec::Netfilter: start reloading netfilter configuration... 
[I] Nov 11 16:21:00 ndm: IpSec::Netfilter: netfilter configuration reloading is done. 
[I] Nov 11 16:21:02 ndhcps: DHCPINFORM received for 172.20.8.3 from 00:00:00:00:00:00. 
[I] Nov 11 16:21:02 ndhcps: sending INFORM to 00:00:00:00:00:00. 
[I] Nov 11 16:21:22 ipsec: 12[IKE] received DELETE for ESP CHILD_SA with SPI 95038c86 
[I] Nov 11 16:21:22 ipsec: 12[IKE] closing CHILD_SA VirtualIPServerIKE2{4953} with SPIs cf7ac52f_i (80979 bytes) 95038c86_o (393204 bytes) and TS 0.0.0.0/0 === 172.20.8.2/32 
[I] Nov 11 16:21:22 ipsec: 12[IKE] sending DELETE for ESP CHILD_SA with SPI cf7ac52f 
[I] Nov 11 16:21:22 ipsec: 12[IKE] CHILD_SA closed 
[I] Nov 11 16:21:22 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": active CHILD SAs for user "urist". 
[I] Nov 11 16:21:22 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": "0" = "3480929583". 
[I] Nov 11 16:21:22 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": "1" = "2500037766". 
[W] Nov 11 16:21:22 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": crypto map remote client "urist" @ "192.168.1.43" from "81.211.81.53" disconnected. 
[I] Nov 11 16:21:22 ndm: IpSec::Netfilter: start reloading netfilter configuration... 
[I] Nov 11 16:21:22 ndm: IpSec::Netfilter: netfilter configuration reloading is done. 
[I] Nov 11 16:21:23 ndhcps: DHCPREQUEST received (STATE_RENEWING) for 172.16.1.188 from 80:e8:2c:f5:64:35. 
[I] Nov 11 16:21:23 ndhcps: sending ACK of 172.16.1.188 to 80:e8:2c:f5:64:35. 
[I] Nov 11 16:21:28 ipsec: 03[CFG] received proposals: ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:NULL/HMAC_SHA1_96/NO_EXT_SEQ 
[I] Nov 11 16:21:28 ipsec: 03[CFG] configured proposals: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA2_256_128/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA2_256_128/NO_EXT_SEQ 
[I] Nov 11 16:21:28 ipsec: 03[CFG] selected proposal: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ 
[I] Nov 11 16:21:28 ipsec: 03[IKE] CHILD_SA VirtualIPServerIKE2{4963} established with SPIs c6c4af17_i fb6aa2fc_o and TS 0.0.0.0/0 === 172.20.8.2/32 
[I] Nov 11 16:21:28 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": active CHILD SAs for user "urist". 
[I] Nov 11 16:21:28 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": "0" = "3334778647". 
[I] Nov 11 16:21:28 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": "1" = "4218069756". 
[W] Nov 11 16:21:28 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": crypto map is up: remote client "urist" @ "192.168.1.43" with IP "172.20.8.2" connected. 
[I] Nov 11 16:21:28 ndm: IpSec::Netfilter: start reloading netfilter configuration... 
[I] Nov 11 16:21:28 ndm: IpSec::Netfilter: netfilter configuration reloading is done. 
[I] Nov 11 16:22:14 dropbear: Child connection from 81.161.238.160:56178 
[I] Nov 11 16:22:18 ndm: Core::Server: started Session /var/run/ndm.core.socket. 
[E] Nov 11 16:22:18 ndm: Core::Authenticator: access to "cli" denied for user "root". 
[E] Nov 11 16:22:18 ndm: Core::Authenticator: access to "sftp" denied for user "root". 
[W] Nov 11 16:22:18 dropbear: Bad password attempt for 'root' from 81.161.238.160:56178 
[I] Nov 11 16:22:18 ndm: Core::Session: client disconnected. 
[I] Nov 11 16:22:19 ipsec: 09[IKE] received MS NT5 ISAKMPOAKLEY v9 vendor ID 
[I] Nov 11 16:22:19 ipsec: 09[IKE] received MS-Negotiation Discovery Capable vendor ID 
[I] Nov 11 16:22:19 ipsec: 09[IKE] received Vid-Initial-Contact vendor ID 
[I] Nov 11 16:22:19 ipsec: 09[IKE] 37.122.20.103 is initiating an IKE_SA 
[I] Nov 11 16:22:19 ipsec: 09[CFG] received proposals: IKE:3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:3DES_CBC/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:3DES_CBC/HMAC_SHA2_384_192/PRF_HMAC_SHA2_384/MODP_1024, IKE:AES_CBC=128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_CBC=128/HMAC_SHA2_384_192/PRF_HMAC_SHA2_384/MODP_1024, IKE:AES_CBC=192/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC=192/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_CBC=192/HMAC_SHA2_384_192/PRF_HMAC_SHA2_384/MODP_1024, IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_CBC=256/HMAC_SHA2_384_192/PRF_HMAC_SHA2_384/MODP_1024, IKE:AES_GCM_16=128/PRF_HMAC_SHA1/MODP_1024, IKE:AES_GCM_16=128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_GCM_16=128/PRF_HMAC_SHA2_384/MODP_1024, IKE:AES_GCM_16=256/PRF_HMAC_SHA1/MODP_1024, IKE:AES_GCM_16=256/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_GCM_16=256/ [...]
[I] Nov 11 16:22:19 ipsec: 09[CFG] configured proposals: IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_2048, IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/ECP_384, IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/ECP_256, IKE:AES_CBC=128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC=128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_2048, IKE:AES_CBC=128/HMAC_SHA1_96/PRF_HMAC_SHA1/ECP_384, IKE:AES_CBC=128/HMAC_SHA1_96/PRF_HMAC_SHA1/ECP_256, IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_2048, IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/ECP_384, IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/ECP_256, IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_2048, IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/ECP_384, IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/ECP_256 
[I] Nov 11 16:22:19 ipsec: 09[CFG] selected proposal: IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024 
[I] Nov 11 16:22:19 ipsec: 09[IKE] remote host is behind NAT 
[I] Nov 11 16:22:19 dropbear: Exit before auth from <81.161.238.160:56178>: (user 'root', 1 fails): Exited normally 
[I] Nov 11 16:22:19 ipsec: 08[IKE] received 279 cert requests for an unknown ca 
[I] Nov 11 16:22:19 ipsec: 08[CFG] looking for peer configs matching 213.33.195.46[%any]...37.122.20.103[192.168.0.32] 
[I] Nov 11 16:22:19 ipsec: 08[CFG] selected peer config 'VirtualIPServerIKE2' 
[I] Nov 11 16:22:19 ipsec: 08[IKE] initiating EAP_IDENTITY method (id 0x00) 
[I] Nov 11 16:22:19 ipsec: 08[IKE] peer supports MOBIKE, but disabled in config 
[I] Nov 11 16:22:19 ipsec: 08[IKE] authentication of 'sakdjfwelfwe.keenetic.link' (myself) with RSA signature successful 
[I] Nov 11 16:22:19 ipsec: 08[IKE] sending end entity cert "CN=sakdjfwelfwe.keenetic.link" 
[I] Nov 11 16:22:19 ipsec: 08[IKE] sending issuer cert "C=US, O=Let's Encrypt, CN=R10" 
[I] Nov 11 16:22:49 ipsec: 08[JOB] deleting half open IKE_SA with 37.122.20.103 after timeout 
[I] Nov 11 16:23:02 ipsec: 11[IKE] retransmit 1 of request with message ID 16 
[I] Nov 11 16:25:22 ipsec: 03[IKE] received DELETE for ESP CHILD_SA with SPI a7348cb0 
[I] Nov 11 16:25:22 ipsec: 03[IKE] closing CHILD_SA VirtualIPServerIKE2{4958} with SPIs cb91fb1a_i (32994 bytes) a7348cb0_o (16185 bytes) and TS 0.0.0.0/0 === 172.20.8.1/32 
[I] Nov 11 16:25:22 ipsec: 03[IKE] sending DELETE for ESP CHILD_SA with SPI cb91fb1a 
[I] Nov 11 16:25:22 ipsec: 03[IKE] CHILD_SA closed 
[I] Nov 11 16:25:22 ndm: IpSec::Netfilter: start reloading netfilter configuration... 
[I] Nov 11 16:25:22 ipsec: 12[CFG] received proposals: ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:NULL/HMAC_SHA1_96/NO_EXT_SEQ 
[I] Nov 11 16:25:22 ipsec: 12[CFG] configured proposals: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA2_256_128/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA2_256_128/NO_EXT_SEQ 
[I] Nov 11 16:25:22 ipsec: 12[CFG] selected proposal: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ 
[I] Nov 11 16:25:22 ipsec: 12[IKE] CHILD_SA VirtualIPServerIKE2{4964} established with SPIs c25a3303_i d6e03dd8_o and TS 0.0.0.0/0 === 172.20.8.1/32 
[I] Nov 11 16:25:22 ndm: IpSec::Netfilter: netfilter configuration reloading is done. 
[E] Nov 11 16:25:22 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": unable to find client "metodist" @ "192.168.1.149" from "188.64.164.33". 
[C] Nov 11 16:25:22 ndm: IpSec::Configurator: "VirtualIPServerIKE2": out of memory [0xcffe0dcc]. 
[I] Nov 11 16:25:22 ndm: IpSec::Netfilter: start reloading netfilter configuration... 
[I] Nov 11 16:25:22 ndm: IpSec::Netfilter: netfilter configuration reloading is done. 
[I] Nov 11 16:25:28 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(32:5c:4a:56:a2:9d) had associated (has FT caps). 
[I] Nov 11 16:25:28 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(32:5c:4a:56:a2:9d) set key done in WPA2/WPA2PSK. 
[I] Nov 11 16:25:28 ndhcps: DHCPREQUEST received (STATE_INIT) for 172.16.1.197 from 32:5c:4a:56:a2:9d. 
[I] Nov 11 16:25:29 ndhcps: sending ACK of 172.16.1.197 to 32:5c:4a:56:a2:9d. 
[I] Nov 11 16:26:24 ipsec: 13[IKE] received DELETE for ESP CHILD_SA with SPI 6c6afcbc 
[I] Nov 11 16:26:24 ipsec: 13[IKE] closing CHILD_SA VirtualIPServerIKE2{4957} with SPIs cae8b6a3_i (12211 bytes) 6c6afcbc_o (10349 bytes) and TS 0.0.0.0/0 === 172.20.8.2/32 
[I] Nov 11 16:26:24 ipsec: 13[IKE] sending DELETE for ESP CHILD_SA with SPI cae8b6a3 
[I] Nov 11 16:26:24 ipsec: 13[IKE] CHILD_SA closed 
[I] Nov 11 16:26:24 ndm: IpSec::Netfilter: start reloading netfilter configuration... 
[I] Nov 11 16:26:24 ndm: IpSec::Netfilter: netfilter configuration reloading is done. 
[I] Nov 11 16:26:24 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster1/AccessPoint0": STA(32:5c:4a:56:a2:9d) FT authenticated successfully. 
[I] Nov 11 16:26:24 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster1/AccessPoint0": STA(32:5c:4a:56:a2:9d) had re-associated from 50:ff:20:62:07:5c (FT roam). 
[I] Nov 11 16:26:32 ipsec: 07[CFG] received proposals: ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:NULL/HMAC_SHA1_96/NO_EXT_SEQ 
[I] Nov 11 16:26:32 ipsec: 07[CFG] configured proposals: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA2_256_128/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA2_256_128/NO_EXT_SEQ 
[I] Nov 11 16:26:32 ipsec: 07[CFG] selected proposal: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ 
[I] Nov 11 16:26:32 ipsec: 07[IKE] CHILD_SA VirtualIPServerIKE2{4965} established with SPIs cc6398fb_i 5199c94c_o and TS 0.0.0.0/0 === 172.20.8.2/32 
[E] Nov 11 16:26:33 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": unable to find client "urist2" @ "192.168.1.100" from "81.211.81.53". 
[C] Nov 11 16:26:33 ndm: IpSec::Configurator: "VirtualIPServerIKE2": out of memory [0xcffe0dcc]. 
[I] Nov 11 16:26:33 ndm: IpSec::Netfilter: start reloading netfilter configuration... 
[I] Nov 11 16:26:33 ndm: IpSec::Netfilter: netfilter configuration reloading is done. 
[I] Nov 11 16:28:06 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(7e:fb:25:d2:79:ed) FT authenticated successfully. 
[I] Nov 11 16:28:06 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(7e:fb:25:d2:79:ed) had re-associated from 50:ff:20:62:07:5c (FT roam). 
[I] Nov 11 16:30:00 ipsec: 13[IKE] received DELETE for ESP CHILD_SA with SPI 1a6ef356 
[I] Nov 11 16:30:00 ipsec: 13[IKE] closing CHILD_SA VirtualIPServerIKE2{4961} with SPIs cf51480a_i (116055 bytes) 1a6ef356_o (318045 bytes) and TS 0.0.0.0/0 === 172.20.8.1/32 
[I] Nov 11 16:30:00 ipsec: 13[IKE] sending DELETE for ESP CHILD_SA with SPI cf51480a 
[I] Nov 11 16:30:00 ipsec: 13[IKE] CHILD_SA closed 
[I] Nov 11 16:30:00 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": active CHILD SAs for user "buh". 
[W] Nov 11 16:30:00 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": crypto map remote client "buh" @ "192.168.1.98" from "81.211.81.53" disconnected. 
[I] Nov 11 16:30:00 ndm: IpSec::Netfilter: start reloading netfilter configuration... 
[I] Nov 11 16:30:00 ndm: IpSec::Netfilter: netfilter configuration reloading is done. 
[I] Nov 11 16:30:24 ipsec: 10[CFG] received proposals: ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:NULL/HMAC_SHA1_96/NO_EXT_SEQ 
[I] Nov 11 16:30:24 ipsec: 10[CFG] configured proposals: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA2_256_128/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA2_256_128/NO_EXT_SEQ 
[I] Nov 11 16:30:24 ipsec: 10[CFG] selected proposal: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ 
[I] Nov 11 16:30:24 ipsec: 10[IKE] CHILD_SA VirtualIPServerIKE2{4966} established with SPIs cbaf5ba8_i 3da76c7a_o and TS 0.0.0.0/0 === 172.20.8.1/32 
[I] Nov 11 16:30:24 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": active CHILD SAs for user "buh". 
[I] Nov 11 16:30:24 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": "0" = "3417267112". 
[I] Nov 11 16:30:24 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": "1" = "1034382458". 
[W] Nov 11 16:30:24 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": crypto map is up: remote client "buh" @ "192.168.1.98" with IP "172.20.8.1" connected. 
[I] Nov 11 16:30:24 ndm: IpSec::Netfilter: start reloading netfilter configuration... 
[I] Nov 11 16:30:24 ndm: IpSec::Netfilter: netfilter configuration reloading is done. 
[I] Nov 11 16:30:32 ipsec: 07[IKE] retransmit 1 of request with message ID 1 
[I] Nov 11 16:31:23 ipsec: 10[IKE] received DELETE for ESP CHILD_SA with SPI fb6aa2fc 
[I] Nov 11 16:31:23 ipsec: 10[IKE] closing CHILD_SA VirtualIPServerIKE2{4963} with SPIs c6c4af17_i (4611 bytes) fb6aa2fc_o (6392 bytes) and TS 0.0.0.0/0 === 172.20.8.2/32 
[I] Nov 11 16:31:23 ipsec: 10[IKE] sending DELETE for ESP CHILD_SA with SPI c6c4af17 
[I] Nov 11 16:31:23 ipsec: 10[IKE] CHILD_SA closed 
[I] Nov 11 16:31:23 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": active CHILD SAs for user "urist". 
[I] Nov 11 16:31:23 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": "0" = "3334778647". 
[I] Nov 11 16:31:23 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": "1" = "4218069756". 
[W] Nov 11 16:31:23 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": crypto map remote client "urist" @ "192.168.1.43" from "81.211.81.53" disconnected. 
[I] Nov 11 16:31:23 ndm: IpSec::Netfilter: start reloading netfilter configuration... 
[I] Nov 11 16:31:23 ndm: IpSec::Netfilter: netfilter configuration reloading is done. 
[I] Nov 11 16:31:33 ipsec: 13[CFG] received proposals: ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:NULL/HMAC_SHA1_96/NO_EXT_SEQ 
[I] Nov 11 16:31:33 ipsec: 13[CFG] configured proposals: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA2_256_128/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA2_256_128/NO_EXT_SEQ 
[I] Nov 11 16:31:33 ipsec: 13[CFG] selected proposal: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ 
[I] Nov 11 16:31:33 ipsec: 13[IKE] CHILD_SA VirtualIPServerIKE2{4967} established with SPIs c8faa1e0_i eddb3678_o and TS 0.0.0.0/0 === 172.20.8.2/32 
[I] Nov 11 16:31:33 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": active CHILD SAs for user "urist". 
[I] Nov 11 16:31:33 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": "0" = "3371868640". 
[I] Nov 11 16:31:33 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": "1" = "3990566520". 
[W] Nov 11 16:31:33 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": crypto map is up: remote client "urist" @ "192.168.1.43" with IP "172.20.8.2" connected. 
[I] Nov 11 16:31:33 ndm: IpSec::Netfilter: start reloading netfilter configuration... 
[I] Nov 11 16:31:33 ndm: IpSec::Netfilter: netfilter configuration reloading is done. 
[I] Nov 11 16:32:06 ndhcps: DHCPREQUEST received (STATE_RENEWING) for 172.16.1.156 from 98:ee:cb:c3:a4:7b. 
[I] Nov 11 16:32:06 ndhcps: sending ACK of 172.16.1.156 to 98:ee:cb:c3:a4:7b. 
[I] Nov 11 16:33:46 ipsec: 11[IKE] retransmit 1 of request with message ID 2 
[I] Nov 11 16:35:00 ipsec: 05[IKE] received DELETE for ESP CHILD_SA with SPI d6e03dd8 
[I] Nov 11 16:35:00 ipsec: 05[IKE] closing CHILD_SA VirtualIPServerIKE2{4964} with SPIs c25a3303_i (15566 bytes) d6e03dd8_o (1940 bytes) and TS 0.0.0.0/0 === 172.20.8.1/32 
[I] Nov 11 16:35:00 ipsec: 05[IKE] sending DELETE for ESP CHILD_SA with SPI c25a3303 
[I] Nov 11 16:35:00 ipsec: 05[IKE] CHILD_SA closed 
[I] Nov 11 16:35:00 ndm: IpSec::Netfilter: start reloading netfilter configuration... 
[I] Nov 11 16:35:00 ndm: IpSec::Netfilter: netfilter configuration reloading is done. 
[I] Nov 11 16:35:15 ipsec: 08[IKE] retransmit 1 of request with message ID 3 
[I] Nov 11 16:35:16 ipsec: 06[CFG] received proposals: ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:NULL/HMAC_SHA1_96/NO_EXT_SEQ 
[I] Nov 11 16:35:16 ipsec: 06[CFG] configured proposals: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA2_256_128/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA2_256_128/NO_EXT_SEQ 
[I] Nov 11 16:35:16 ipsec: 06[CFG] selected proposal: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ 
[I] Nov 11 16:35:16 ipsec: 06[IKE] CHILD_SA VirtualIPServerIKE2{4968} established with SPIs c5c9473b_i c813308e_o and TS 0.0.0.0/0 === 172.20.8.1/32 
[E] Nov 11 16:35:16 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": unable to find client "metodist" @ "192.168.1.149" from "188.64.164.33". 
[C] Nov 11 16:35:16 ndm: IpSec::Configurator: "VirtualIPServerIKE2": out of memory [0xcffe0dcc]. 
[I] Nov 11 16:35:16 ndm: IpSec::Netfilter: start reloading netfilter configuration... 
[I] Nov 11 16:35:16 ndm: IpSec::Netfilter: netfilter configuration reloading is done. 
[I] Nov 11 16:35:33 bndstrg: band steering: send BTM request to 7e:fb:25:d2:79:ed for roam to 5GHz band 
[I] Nov 11 16:35:34 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(7e:fb:25:d2:79:ed) had associated (has FT caps). 
[I] Nov 11 16:35:34 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(7e:fb:25:d2:79:ed) set key done in WPA2/WPA2PSK. 
[I] Nov 11 16:35:34 ndhcps: DHCPREQUEST received (STATE_INIT) for 172.16.1.174 from 7e:fb:25:d2:79:ed. 
[I] Nov 11 16:35:35 ndhcps: sending ACK of 172.16.1.174 to 7e:fb:25:d2:79:ed. 
[I] Nov 11 16:36:04 bndstrg: band steering: send BTM request to 7e:fb:25:d2:79:ed for roam to 5GHz band 
[I] Nov 11 16:36:05 bndstrg: band steering: WNM client 7e:fb:25:d2:79:ed accepted 5GHz band 
[I] Nov 11 16:36:05 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster1/AccessPoint0": STA(7e:fb:25:d2:79:ed) FT authenticated successfully. 
[I] Nov 11 16:36:05 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster1/AccessPoint0": STA(7e:fb:25:d2:79:ed) had re-associated from 52:ff:20:82:07:5c (FT roam). 
[I] Nov 11 16:36:15 ipsec: 05[IKE] received DELETE for ESP CHILD_SA with SPI 5199c94c 
[I] Nov 11 16:36:15 ipsec: 05[IKE] closing CHILD_SA VirtualIPServerIKE2{4965} with SPIs cc6398fb_i (11259 bytes) 5199c94c_o (6535 bytes) and TS 0.0.0.0/0 === 172.20.8.2/32 
[I] Nov 11 16:36:15 ipsec: 05[IKE] sending DELETE for ESP CHILD_SA with SPI cc6398fb 
[I] Nov 11 16:36:15 ipsec: 05[IKE] CHILD_SA closed 
[I] Nov 11 16:36:16 ndm: IpSec::Netfilter: start reloading netfilter configuration... 
[I] Nov 11 16:36:16 ndm: IpSec::Netfilter: netfilter configuration reloading is done. 
[I] Nov 11 16:36:25 ipsec: 12[CFG] received proposals: ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:NULL/HMAC_SHA1_96/NO_EXT_SEQ 
[I] Nov 11 16:36:25 ipsec: 12[CFG] configured proposals: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA2_256_128/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA2_256_128/NO_EXT_SEQ 
[I] Nov 11 16:36:25 ipsec: 12[CFG] selected proposal: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ 
[I] Nov 11 16:36:25 ipsec: 12[IKE] CHILD_SA VirtualIPServerIKE2{4969} established with SPIs c5d66e6f_i 16ee5a36_o and TS 0.0.0.0/0 === 172.20.8.2/32 
[E] Nov 11 16:36:25 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": unable to find client "urist2" @ "192.168.1.100" from "81.211.81.53". 
[C] Nov 11 16:36:25 ndm: IpSec::Configurator: "VirtualIPServerIKE2": out of memory [0xcffe0dcc]. 
[I] Nov 11 16:36:25 ndm: IpSec::Netfilter: start reloading netfilter configuration... 
[I] Nov 11 16:36:25 ndm: IpSec::Netfilter: netfilter configuration reloading is done. 
[I] Nov 11 16:36:39 ipsec: 12[IKE] received DELETE for ESP CHILD_SA with SPI 3da76c7a 
[I] Nov 11 16:36:39 ipsec: 12[IKE] closing CHILD_SA VirtualIPServerIKE2{4966} with SPIs cbaf5ba8_i (22735 bytes) 3da76c7a_o (9064 bytes) and TS 0.0.0.0/0 === 172.20.8.1/32 
[I] Nov 11 16:36:39 ipsec: 12[IKE] sending DELETE for ESP CHILD_SA with SPI cbaf5ba8 
[I] Nov 11 16:36:39 ipsec: 12[IKE] CHILD_SA closed 
[I] Nov 11 16:36:39 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": active CHILD SAs for user "buh". 
[I] Nov 11 16:36:39 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": "0" = "3417267112". 
[I] Nov 11 16:36:39 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": "1" = "1034382458". 
[W] Nov 11 16:36:39 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": crypto map remote client "buh" @ "192.168.1.98" from "81.211.81.53" disconnected. 
[I] Nov 11 16:36:40 ndm: IpSec::Netfilter: start reloading netfilter configuration... 
[I] Nov 11 16:36:40 ipsec: 10[IKE] received DELETE for IKE_SA VirtualIPServerIKE2[1525] 
[I] Nov 11 16:36:40 ipsec: 10[IKE] deleting IKE_SA VirtualIPServerIKE2[1525] between 213.33.195.46[sakdjfwelfwe.keenetic.link]...81.211.81.53[192.168.1.98] 
[I] Nov 11 16:36:40 ipsec: 10[IKE] IKE_SA deleted 
[I] Nov 11 16:36:40 ndm: IpSec::Netfilter: netfilter configuration reloading is done. 
[I] Nov 11 16:36:41 ipsec: 12[IKE] received MS NT5 ISAKMPOAKLEY v9 vendor ID 
[I] Nov 11 16:36:41 ipsec: 12[IKE] received MS-Negotiation Discovery Capable vendor ID 
[I] Nov 11 16:36:41 ipsec: 12[IKE] received Vid-Initial-Contact vendor ID 
[I] Nov 11 16:36:41 ipsec: 12[IKE] 81.211.81.53 is initiating an IKE_SA 
[I] Nov 11 16:36:41 ipsec: 12[CFG] received proposals: IKE:3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:3DES_CBC/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:3DES_CBC/HMAC_SHA2_384_192/PRF_HMAC_SHA2_384/MODP_1024, IKE:AES_CBC=128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_CBC=128/HMAC_SHA2_384_192/PRF_HMAC_SHA2_384/MODP_1024, IKE:AES_CBC=192/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC=192/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_CBC=192/HMAC_SHA2_384_192/PRF_HMAC_SHA2_384/MODP_1024, IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_CBC=256/HMAC_SHA2_384_192/PRF_HMAC_SHA2_384/MODP_1024, IKE:AES_GCM_16=128/PRF_HMAC_SHA1/MODP_1024, IKE:AES_GCM_16=128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_GCM_16=128/PRF_HMAC_SHA2_384/MODP_1024, IKE:AES_GCM_16=256/PRF_HMAC_SHA1/MODP_1024, IKE:AES_GCM_16=256/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_GCM_16=256/ [...]
[I] Nov 11 16:36:41 ipsec: 12[CFG] configured proposals: IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_2048, IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/ECP_384, IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/ECP_256, IKE:AES_CBC=128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC=128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_2048, IKE:AES_CBC=128/HMAC_SHA1_96/PRF_HMAC_SHA1/ECP_384, IKE:AES_CBC=128/HMAC_SHA1_96/PRF_HMAC_SHA1/ECP_256, IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_2048, IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/ECP_384, IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/ECP_256, IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_2048, IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/ECP_384, IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/ECP_256 
[I] Nov 11 16:36:41 ipsec: 12[CFG] selected proposal: IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024 
[I] Nov 11 16:36:41 ipsec: 12[IKE] remote host is behind NAT 
[I] Nov 11 16:36:41 ipsec: 15[IKE] received 73 cert requests for an unknown ca 
[I] Nov 11 16:36:41 ipsec: 15[CFG] looking for peer configs matching 213.33.195.46[%any]...81.211.81.53[192.168.1.98] 
[I] Nov 11 16:36:41 ipsec: 15[CFG] selected peer config 'VirtualIPServerIKE2' 
[I] Nov 11 16:36:41 ipsec: 15[IKE] initiating EAP_IDENTITY method (id 0x00) 
[I] Nov 11 16:36:41 ipsec: 15[IKE] peer supports MOBIKE, but disabled in config 
[I] Nov 11 16:36:41 ipsec: 15[IKE] authentication of 'sakdjfwelfwe.keenetic.link' (myself) with RSA signature successful 
[I] Nov 11 16:36:41 ipsec: 15[IKE] sending end entity cert "CN=sakdjfwelfwe.keenetic.link" 
[I] Nov 11 16:36:41 ipsec: 15[IKE] sending issuer cert "C=US, O=Let's Encrypt, CN=R10" 
[I] Nov 11 16:36:41 ipsec: 09[IKE] received EAP identity 'buh' 
[I] Nov 11 16:36:41 ipsec: 09[IKE] initiating EAP_MSCHAPV2 method (id 0xFD) 
[I] Nov 11 16:36:41 ipsec: 06[IKE] EAP method EAP_MSCHAPV2 succeeded, MSK established 
[I] Nov 11 16:36:41 ipsec: 12[IKE] authentication of '192.168.1.98' with EAP successful 
[I] Nov 11 16:36:41 ipsec: 12[IKE] authentication of 'sakdjfwelfwe.keenetic.link' (myself) with EAP 
[I] Nov 11 16:36:41 ipsec: 12[IKE] IKE_SA VirtualIPServerIKE2[1528] established between 213.33.195.46[sakdjfwelfwe.keenetic.link]...81.211.81.53[192.168.1.98] 
[I] Nov 11 16:36:41 ipsec: 12[IKE] peer requested virtual IP %any 
[I] Nov 11 16:36:41 ndm: Core::Server: started Session /var/run/ndm.core.socket. 
[I] Nov 11 16:36:41 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": allocated address "172.20.8.1" for user "buh" @ "192.168.1.98" from "81.211.81.53". 
[I] Nov 11 16:36:41 ipsec: 12[IKE] assigning virtual IP 172.20.8.1 to peer 'buh' 
[I] Nov 11 16:36:41 ipsec: 12[IKE] peer requested virtual IP %any6 
[I] Nov 11 16:36:41 ipsec: 12[IKE] no virtual IP found for %any6 requested by 'buh' 
[I] Nov 11 16:36:41 ipsec: 12[CFG] received proposals: ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:NULL/HMAC_SHA1_96/NO_EXT_SEQ 
[I] Nov 11 16:36:41 ipsec: 12[CFG] configured proposals: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA2_256_128/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA2_256_128/NO_EXT_SEQ 
[I] Nov 11 16:36:41 ipsec: 12[CFG] selected proposal: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ 
[I] Nov 11 16:36:41 ndm: Core::Session: client disconnected. 
[I] Nov 11 16:36:41 ipsec: 12[IKE] CHILD_SA VirtualIPServerIKE2{4970} established with SPIs cdcc2325_i 7865b3d4_o and TS 0.0.0.0/0 === 172.20.8.1/32 
[W] Nov 11 16:36:41 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": crypto map is up: remote client "buh" @ "192.168.1.98" with IP "172.20.8.1" connected. 
[I] Nov 11 16:36:41 ipsec: 12[CFG] scheduling RADIUS Interim-Updates every 5s 
[I] Nov 11 16:36:41 ndm: IpSec::Netfilter: start reloading netfilter configuration... 
[I] Nov 11 16:36:41 ndm: IpSec::Netfilter: netfilter configuration reloading is done. 
[I] Nov 11 16:36:44 ndhcps: DHCPINFORM received for 172.20.8.1 from 00:00:00:00:00:00. 
[I] Nov 11 16:36:44 ndhcps: sending INFORM to 00:00:00:00:00:00. 
[I] Nov 11 16:37:49 ipsec: 12[IKE] retransmit 1 of request with message ID 6 
[I] Nov 11 16:39:44 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster1/AccessPoint0": STA(32:5c:4a:56:a2:9d) had been aged-out and disassociated (idle silence). 
[I] Nov 11 16:41:19 ipsec: 14[IKE] received DELETE for ESP CHILD_SA with SPI eddb3678 
[I] Nov 11 16:41:19 ipsec: 14[IKE] closing CHILD_SA VirtualIPServerIKE2{4967} with SPIs c8faa1e0_i (10920 bytes) eddb3678_o (10443 bytes) and TS 0.0.0.0/0 === 172.20.8.2/32 
[I] Nov 11 16:41:19 ipsec: 14[IKE] sending DELETE for ESP CHILD_SA with SPI c8faa1e0 
[I] Nov 11 16:41:19 ipsec: 14[IKE] CHILD_SA closed 
[I] Nov 11 16:41:19 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": active CHILD SAs for user "urist". 
[I] Nov 11 16:41:19 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": "0" = "3371868640". 
[I] Nov 11 16:41:19 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": "1" = "3990566520". 
[W] Nov 11 16:41:19 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": crypto map remote client "urist" @ "192.168.1.43" from "81.211.81.53" disconnected. 
[I] Nov 11 16:41:19 ndm: IpSec::Netfilter: start reloading netfilter configuration... 
[I] Nov 11 16:41:19 ndm: IpSec::Netfilter: netfilter configuration reloading is done. 
[I] Nov 11 16:41:26 ipsec: 03[IKE] retransmit 1 of request with message ID 469 
[I] Nov 11 16:41:32 ipsec: 12[IKE] received DELETE for ESP CHILD_SA with SPI c813308e 
[I] Nov 11 16:41:32 ipsec: 12[IKE] closing CHILD_SA VirtualIPServerIKE2{4968} with SPIs c5c9473b_i (15237 bytes) c813308e_o (798 bytes) and TS 0.0.0.0/0 === 172.20.8.1/32 
[I] Nov 11 16:41:32 ipsec: 12[IKE] sending DELETE for ESP CHILD_SA with SPI c5c9473b 
[I] Nov 11 16:41:32 ipsec: 12[IKE] CHILD_SA closed 
[I] Nov 11 16:41:33 ndm: IpSec::Netfilter: start reloading netfilter configuration... 
[I] Nov 11 16:41:33 ndm: IpSec::Netfilter: netfilter configuration reloading is done. 
[I] Nov 11 16:41:38 ipsec: 07[CFG] received proposals: ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:NULL/HMAC_SHA1_96/NO_EXT_SEQ 
[I] Nov 11 16:41:38 ipsec: 07[CFG] configured proposals: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA2_256_128/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA2_256_128/NO_EXT_SEQ 
[I] Nov 11 16:41:38 ipsec: 07[CFG] selected proposal: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ 
[I] Nov 11 16:41:38 ipsec: 07[IKE] CHILD_SA VirtualIPServerIKE2{4971} established with SPIs c1ec8967_i 85654b80_o and TS 0.0.0.0/0 === 172.20.8.2/32 
[I] Nov 11 16:41:38 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": active CHILD SAs for user "urist". 
[I] Nov 11 16:41:38 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": "0" = "3253504359". 
[I] Nov 11 16:41:38 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": "1" = "2238008192". 
[W] Nov 11 16:41:38 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": crypto map is up: remote client "urist" @ "192.168.1.43" with IP "172.20.8.2" connected. 
[I] Nov 11 16:41:39 ndm: IpSec::Netfilter: start reloading netfilter configuration... 
[I] Nov 11 16:41:39 ndm: IpSec::Netfilter: netfilter configuration reloading is done. 
[I] Nov 11 16:41:44 ipsec: 11[CFG] received proposals: ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:NULL/HMAC_SHA1_96/NO_EXT_SEQ 
[I] Nov 11 16:41:44 ipsec: 11[CFG] configured proposals: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA2_256_128/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA2_256_128/NO_EXT_SEQ 
[I] Nov 11 16:41:44 ipsec: 11[CFG] selected proposal: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ 
[I] Nov 11 16:41:44 ipsec: 11[IKE] CHILD_SA VirtualIPServerIKE2{4972} established with SPIs cd70d6d3_i 3b3d16fa_o and TS 0.0.0.0/0 === 172.20.8.1/32 
[E] Nov 11 16:41:44 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": unable to find client "metodist" @ "192.168.1.149" from "188.64.164.33". 
[C] Nov 11 16:41:44 ndm: IpSec::Configurator: "VirtualIPServerIKE2": out of memory [0xcffe0dcc]. 
[I] Nov 11 16:41:44 ndm: IpSec::Netfilter: start reloading netfilter configuration...

 

Опубликовано (изменено)

Обновился до 4.2.1. посмотрим что будет. Пока жалоб не поступало) П.С. или в 4.2.1 гут быть такие же симптомы? Что-то я не нашел 4.3. Дадите ссылку?

Изменено пользователем ridervka
Опубликовано
9 часов назад, ridervka сказал:

Обновился до 4.2.1. посмотрим что будет. Пока жалоб не поступало

Оставайтесь на стабильной ветке, раз жалоб нет. На альфе могут появиться вновь

Опубликовано

Все это переделано и должно быть нормально в 4.3. Если есть возможность и желание - лучше проверять там.

В 4.2 относительно 4.1 никаких существенных изменений нет.

Опубликовано (изменено)

Ver 4.2.1 отключается пользователи metodist5  и urist. Ошибки out of memory теперь не наблюдается. Теперь перед отключением пользователей в логах такие записи
ipsec: 13[IKE] sending DELETE for ESP CHILD_SA with SPI xxxxxxxx 
ipsec: 13[IKE] CHILD_SA closed 

Не понимаю, кто инициирует закрытие соединения и почему сессии рвутся? Помогите пожалуйста разобраться

П.С. какое нужно выставлять MTU на интернетовском интерфейсе? 1500 так и оставляем? Менял на 1472

[W] Nov 13 17:38:57 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": crypto map is up: remote client "metodist5" @ "192.168.0.4" with IP "172.20.8.2" connected. 
[I] Nov 13 17:38:57 ndm: IpSec::Netfilter: start reloading netfilter configuration... 
[I] Nov 13 17:38:57 ndm: IpSec::Netfilter: netfilter configuration reloading is done. 
[I] Nov 13 17:39:25 ipsec: 08[IKE] retransmit 1 of request with message ID 70 
[I] Nov 13 17:39:48 dropbear: Child connection from 156.194.88.157:36150 
[I] Nov 13 17:39:49 dropbear: Child connection from 156.194.88.157:36774 
[I] Nov 13 17:39:50 dropbear: Exit before auth from <156.194.88.157:36150>: Exited normally 
[I] Nov 13 17:39:50 dropbear: Exit before auth from <156.194.88.157:36774>: Exited normally 
[I] Nov 13 17:39:54 dropbear: Child connection from 156.194.88.157:38936 
[I] Nov 13 17:40:25 dropbear: Child connection from 156.194.88.157:57089 
[E] Nov 13 17:40:49 dropbear: Login attempt for nonexistent user 'NL5xUDpV2xRa' 
[I] Nov 13 17:40:49 dropbear: Exit before auth from <156.194.88.157:57089>: Bad buf_getptr 
[I] Nov 13 17:41:17 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster1/AccessPoint0": STA(62:b2:12:d5:da:d2) had associated (has FT caps). 
[I] Nov 13 17:41:18 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster1/AccessPoint0": STA(62:b2:12:d5:da:d2) set key done in WPA2/WPA2PSK. 
[I] Nov 13 17:41:18 ndhcps: DHCPREQUEST received (STATE_INIT) for 172.16.1.227 from 62:b2:12:d5:da:d2. 
[I] Nov 13 17:41:18 ndhcps: sending ACK of 172.16.1.227 to 62:b2:12:d5:da:d2. 
[I] Nov 13 17:41:23 dropbear: Exit before auth from <193.111.250.12:38340>: (user 'root', 1 fails): Timeout before auth 
[I] Nov 13 17:42:19 ipsec: 07[IKE] retransmit 1 of request with message ID 73 
[I] Nov 13 17:42:26 bndstrg: band steering: send BTM request to e6:29:c0:f6:d9:c9 for roam to 2.4GHz band (Low RSSI: -81) 
[W] Nov 13 17:42:26 bndstrg: band steering: WNM client e6:29:c0:f6:d9:c9 rejected 2.4GHz band (code: 7) 
[I] Nov 13 17:42:28 ipsec: 11[IKE] retransmit 2 of request with message ID 73 
[I] Nov 13 17:42:36 bndstrg: band steering: send BTM request to e6:29:c0:f6:d9:c9 for roam to 2.4GHz band (Low RSSI: -81) 
[W] Nov 13 17:42:36 bndstrg: band steering: WNM client e6:29:c0:f6:d9:c9 rejected 2.4GHz band (code: 7) 
[I] Nov 13 17:42:38 ipsec: 13[IKE] retransmit 3 of request with message ID 73 
[I] Nov 13 17:42:48 ipsec: 06[IKE] retransmit 4 of request with message ID 73 
[I] Nov 13 17:42:56 bndstrg: band steering: send BTM request to e6:29:c0:f6:d9:c9 for roam to 2.4GHz band (Low RSSI: -81) 
[W] Nov 13 17:42:57 bndstrg: band steering: WNM client e6:29:c0:f6:d9:c9 rejected 2.4GHz band (code: 7) 
[I] Nov 13 17:43:00 ipsec: 12[IKE] retransmit 5 of request with message ID 73 
[I] Nov 13 17:43:13 ipsec: 06[IKE] retransmit 6 of request with message ID 73 
[I] Nov 13 17:43:20 ipsec: 06[IKE] received DELETE for ESP CHILD_SA with SPI ab943318 
[I] Nov 13 17:43:20 ipsec: 06[IKE] closing CHILD_SA VirtualIPServerIKE2{163} with SPIs c5e31428_i (2851 bytes) ab943318_o (1865 bytes) and TS 0.0.0.0/0 === 172.20.8.2/32 
[I] Nov 13 17:43:20 ipsec: 06[IKE] sending DELETE for ESP CHILD_SA with SPI c5e31428 
[I] Nov 13 17:43:20 ipsec: 06[IKE] CHILD_SA closed 
[W] Nov 13 17:43:20 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": crypto map remote client "urist" @ "192.168.1.43" from "81.211.81.53" disconnected. 
[I] Nov 13 17:43:20 ndm: IpSec::Netfilter: start reloading netfilter configuration... 
[I] Nov 13 17:43:20 ndm: IpSec::Netfilter: netfilter configuration reloading is done. 
[I] Nov 13 17:43:27 ipsec: 07[IKE] retransmit 7 of request with message ID 73 
[I] Nov 13 17:43:27 ipsec: 05[CFG] received proposals: ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:NULL/HMAC_SHA1_96/NO_EXT_SEQ 
[I] Nov 13 17:43:27 ipsec: 05[CFG] configured proposals: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA2_256_128/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA2_256_128/NO_EXT_SEQ 
[I] Nov 13 17:43:27 ipsec: 05[CFG] selected proposal: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ 
[I] Nov 13 17:43:27 ipsec: 05[IKE] CHILD_SA VirtualIPServerIKE2{168} established with SPIs cb043b32_i 5c00efee_o and TS 0.0.0.0/0 === 172.20.8.2/32 
[W] Nov 13 17:43:27 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": crypto map is up: remote client "urist" @ "192.168.1.43" with IP "172.20.8.2" connected. 
[I] Nov 13 17:43:28 ndm: IpSec::Netfilter: start reloading netfilter configuration... 
[I] Nov 13 17:43:28 ndm: IpSec::Netfilter: netfilter configuration reloading is done. 
[I] Nov 13 17:43:43 ipsec: 15[IKE] retransmit 8 of request with message ID 73 
[I] Nov 13 17:44:00 ipsec: 01[IKE] giving up after 8 retransmits 
[E] Nov 13 17:44:00 ndm: IpSec::Configurator: "VirtualIPServerIKE2": remote peer is down. 
[W] Nov 13 17:44:00 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": crypto map remote client "metodist" @ "192.168.1.149" from "188.64.164.33" disconnected. 
[I] Nov 13 17:44:00 ndm: IpSec::Netfilter: start reloading netfilter configuration... 
[I] Nov 13 17:44:00 ndm: IpSec::Netfilter: netfilter configuration reloading is done. 
[I] Nov 13 17:44:51 ndhcps: DHCPREQUEST received (STATE_RENEWING) for 172.16.1.226 from 1a:93:23:9b:a4:f5. 
[I] Nov 13 17:44:51 ndhcps: sending ACK of 172.16.1.226 to 1a:93:23:9b:a4:f5. 
[I] Nov 13 17:44:54 dropbear: Exit before auth from <156.194.88.157:38936>: Timeout before auth 
[I] Nov 13 17:45:38 ndm: Netfilter::Util::BfdManager: "Ssh": unban remote host 217.144.185.121. 
[I] Nov 13 17:45:38 dropbear: Child connection from 217.144.185.121:41296 
[E] Nov 13 17:45:39 dropbear: Login attempt for nonexistent user 'user' 
[I] Nov 13 17:45:39 dropbear: Exit before auth from <217.144.185.121:41296>: Exited normally 
[I] Nov 13 17:45:39 dropbear: Child connection from 217.144.185.121:41310 
[E] Nov 13 17:45:40 dropbear: Login attempt for nonexistent user 'user' 
[I] Nov 13 17:45:40 ndm: Netfilter::Util::Conntrack: flushed 899 IPv4 connections for 217.144.185.121. 
[I] Nov 13 17:45:40 ndm: Netfilter::Util::BfdManager: "Ssh": ban remote host 217.144.185.121 for 15 minutes. 
[I] Nov 13 17:48:10 ipsec: 08[IKE] received DELETE for ESP CHILD_SA with SPI 0858f1da 
[I] Nov 13 17:48:10 ipsec: 08[IKE] closing CHILD_SA VirtualIPServerIKE2{167} with SPIs cfcc5f62_i (21726 bytes) 0858f1da_o (2330 bytes) and TS 0.0.0.0/0 === 172.20.8.2/32 
[I] Nov 13 17:48:10 ipsec: 08[IKE] sending DELETE for ESP CHILD_SA with SPI cfcc5f62 
[I] Nov 13 17:48:10 ipsec: 08[IKE] CHILD_SA closed 
[W] Nov 13 17:48:10 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": crypto map remote client "metodist5" @ "192.168.0.4" from "92.100.219.255" disconnected. 
[I] Nov 13 17:48:10 ndm: IpSec::Netfilter: start reloading netfilter configuration... 
[I] Nov 13 17:48:10 ndm: IpSec::Netfilter: netfilter configuration reloading is done. 
[I] Nov 13 17:48:18 ipsec: 10[CFG] received proposals: ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:NULL/HMAC_SHA1_96/NO_EXT_SEQ 
[I] Nov 13 17:48:18 ipsec: 10[CFG] configured proposals: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA2_256_128/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA2_256_128/NO_EXT_SEQ 
[I] Nov 13 17:48:18 ipsec: 10[CFG] selected proposal: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ 
[I] Nov 13 17:48:18 ipsec: 10[IKE] CHILD_SA VirtualIPServerIKE2{169} established with SPIs cff00ae6_i 164d58b4_o and TS 0.0.0.0/0 === 172.20.8.2/32 
[W] Nov 13 17:48:18 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": crypto map is up: remote client "metodist5" @ "192.168.0.4" with IP "172.20.8.2" connected. 
[I] Nov 13 17:48:18 ndm: IpSec::Netfilter: start reloading netfilter configuration... 
[I] Nov 13 17:48:18 ndm: IpSec::Netfilter: netfilter configuration reloading is done. 
[I] Nov 13 17:49:01 bndstrg: band steering: send BTM request to dc:21:5c:61:b4:6c for roam to 2.4GHz band (Low RSSI: -93) 
[I] Nov 13 17:49:13 bndstrg: Core::Syslog: last message repeated 2 times.
[I] Nov 13 17:49:19 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster1/AccessPoint0": STA(dc:21:5c:61:b4:6c) had been aged-out and disassociated (retransmits limit reached). 
[I] Nov 13 17:50:40 dropbear: Exit before auth from <217.144.185.121:41310>: Timeout before auth 
[I] Nov 13 17:51:27 ndm: Netfilter::Util::BfdManager: "Ssh": unban remote host 193.111.250.12. 
[I] Nov 13 17:52:26 dropbear: Child connection from 92.255.85.107:44593 
[I] Nov 13 17:52:26 ndm: Core::Server: started Session /var/run/ndm.core.socket. 
[E] Nov 13 17:52:26 ndm: Core::Authenticator: user "admin": invalid password. 
[E] Nov 13 17:52:28 ndm: Core::Authenticator: access to "sftp" denied for user "admin". 
[W] Nov 13 17:52:28 dropbear: Bad password attempt for 'admin' from 92.255.85.107:44593 
[I] Nov 13 17:52:28 ndm: Core::Session: client disconnected. 
[I] Nov 13 17:52:28 dropbear: Exit before auth from <92.255.85.107:44593>: (user 'admin', 1 fails): Error reading: Connection reset by peer 
[I] Nov 13 17:52:55 ipsec: 05[IKE] received DELETE for ESP CHILD_SA with SPI ec63e890 
[I] Nov 13 17:52:55 ipsec: 05[IKE] closing CHILD_SA VirtualIPServerIKE2{166} with SPIs c3a95a55_i (37304 bytes) ec63e890_o (7919 bytes) and TS 0.0.0.0/0 === 172.20.8.3/32 
[I] Nov 13 17:52:55 ipsec: 05[IKE] sending DELETE for ESP CHILD_SA with SPI c3a95a55 
[I] Nov 13 17:52:55 ipsec: 05[IKE] CHILD_SA closed 
[W] Nov 13 17:52:55 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": crypto map remote client "buh" @ "192.168.1.98" from "81.211.81.53" disconnected. 
[I] Nov 13 17:52:55 ndm: IpSec::Netfilter: start reloading netfilter configuration... 
[I] Nov 13 17:52:55 ndm: IpSec::Netfilter: netfilter configuration reloading is done. 
[I] Nov 13 17:52:59 ipsec: 10[CFG] received proposals: ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:NULL/HMAC_SHA1_96/NO_EXT_SEQ 
[I] Nov 13 17:52:59 ipsec: 10[CFG] configured proposals: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA2_256_128/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA2_256_128/NO_EXT_SEQ 
[I] Nov 13 17:52:59 ipsec: 10[CFG] selected proposal: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ 
[I] Nov 13 17:52:59 ipsec: 10[IKE] CHILD_SA VirtualIPServerIKE2{170} established with SPIs cdfd51ca_i 533b2282_o and TS 0.0.0.0/0 === 172.20.8.3/32 
[W] Nov 13 17:52:59 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": crypto map is up: remote client "buh" @ "192.168.1.98" with IP "172.20.8.3" connected. 
[I] Nov 13 17:52:59 ndm: IpSec::Netfilter: start reloading netfilter configuration... 
[I] Nov 13 17:52:59 ndm: IpSec::Netfilter: netfilter configuration reloading is done. 
[I] Nov 13 17:53:08 ipsec: 01[IKE] received DELETE for ESP CHILD_SA with SPI 5c00efee 
[I] Nov 13 17:53:08 ipsec: 01[IKE] closing CHILD_SA VirtualIPServerIKE2{168} with SPIs cb043b32_i (141980 bytes) 5c00efee_o (3284374 bytes) and TS 0.0.0.0/0 === 172.20.8.2/32 
[I] Nov 13 17:53:08 ipsec: 01[IKE] sending DELETE for ESP CHILD_SA with SPI cb043b32 
[I] Nov 13 17:53:08 ipsec: 01[IKE] CHILD_SA closed 
[W] Nov 13 17:53:08 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": crypto map remote client "urist" @ "192.168.1.43" from "81.211.81.53" disconnected. 
[I] Nov 13 17:53:08 ndm: IpSec::Netfilter: start reloading netfilter configuration... 
[I] Nov 13 17:53:09 ndm: IpSec::Netfilter: netfilter configuration reloading is done. 
[I] Nov 13 17:54:11 ipsec: 12[CFG] received proposals: ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:NULL/HMAC_SHA1_96/NO_EXT_SEQ 
[I] Nov 13 17:54:11 ipsec: 12[CFG] configured proposals: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA2_256_128/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA2_256_128/NO_EXT_SEQ 
[I] Nov 13 17:54:11 ipsec: 12[CFG] selected proposal: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ 
[I] Nov 13 17:54:11 ipsec: 12[IKE] CHILD_SA VirtualIPServerIKE2{171} established with SPIs c648638f_i 2255a7d2_o and TS 0.0.0.0/0 === 172.20.8.2/32 
[W] Nov 13 17:54:11 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": crypto map is up: remote client "urist" @ "192.168.1.43" with IP "172.20.8.2" connected. 
[I] Nov 13 17:54:11 ndm: IpSec::Netfilter: start reloading netfilter configuration... 
[I] Nov 13 17:54:11 ndm: IpSec::Netfilter: netfilter configuration reloading is done. 
[I] Nov 13 17:57:02 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster1/AccessPoint0": STA(a6:32:ae:ea:f9:96) had been aged-out and disassociated (idle silence). 
[I] Nov 13 17:57:41 ipsec: 05[IKE] received DELETE for ESP CHILD_SA with SPI 164d58b4 
[I] Nov 13 17:57:41 ipsec: 05[IKE] closing CHILD_SA VirtualIPServerIKE2{169} with SPIs cff00ae6_i (20502 bytes) 164d58b4_o (5076 bytes) and TS 0.0.0.0/0 === 172.20.8.2/32 
[I] Nov 13 17:57:41 ipsec: 05[IKE] sending DELETE for ESP CHILD_SA with SPI cff00ae6 
[I] Nov 13 17:57:41 ipsec: 05[IKE] CHILD_SA closed 
[W] Nov 13 17:57:41 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": crypto map remote client "metodist5" @ "192.168.0.4" from "92.100.219.255" disconnected. 
[I] Nov 13 17:57:41 ndm: IpSec::Netfilter: start reloading netfilter configuration... 
[I] Nov 13 17:57:41 ndm: IpSec::Netfilter: netfilter configuration reloading is done. 
[I] Nov 13 17:57:41 ipsec: 07[CFG] received proposals: ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:NULL/HMAC_SHA1_96/NO_EXT_SEQ 
[I] Nov 13 17:57:41 ipsec: 07[CFG] configured proposals: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA2_256_128/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA2_256_128/NO_EXT_SEQ 
[I] Nov 13 17:57:41 ipsec: 07[CFG] selected proposal: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ 
[I] Nov 13 17:57:41 ipsec: 07[IKE] CHILD_SA VirtualIPServerIKE2{172} established with SPIs c0f17a7f_i 2fbce3ee_o and TS 0.0.0.0/0 === 172.20.8.2/32 
[W] Nov 13 17:57:41 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": crypto map is up: remote client "metodist5" @ "192.168.0.4" with IP "172.20.8.2" connected. 
[I] Nov 13 17:57:42 ndm: IpSec::Netfilter: start reloading netfilter configuration... 
[I] Nov 13 17:57:42 ndm: IpSec::Netfilter: netfilter configuration reloading is done. 
[I] Nov 13 17:57:59 ipsec: 10[IKE] received DELETE for ESP CHILD_SA with SPI 533b2282 
[I] Nov 13 17:57:59 ipsec: 10[IKE] closing CHILD_SA VirtualIPServerIKE2{170} with SPIs cdfd51ca_i (7052 bytes) 533b2282_o (0 bytes) and TS 0.0.0.0/0 === 172.20.8.3/32 
[I] Nov 13 17:57:59 ipsec: 10[IKE] sending DELETE for ESP CHILD_SA with SPI cdfd51ca 
[I] Nov 13 17:57:59 ipsec: 10[IKE] CHILD_SA closed 
[W] Nov 13 17:57:59 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": crypto map remote client "buh" @ "192.168.1.98" from "81.211.81.53" disconnected. 
[I] Nov 13 17:57:59 ndm: IpSec::Netfilter: start reloading netfilter configuration... 
[I] Nov 13 17:57:59 ndm: IpSec::Netfilter: netfilter configuration reloading is done. 
[I] Nov 13 17:58:03 ipsec: 11[CFG] received proposals: ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:NULL/HMAC_SHA1_96/NO_EXT_SEQ 
[I] Nov 13 17:58:03 ipsec: 11[CFG] configured proposals: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA2_256_128/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA2_256_128/NO_EXT_SEQ 
[I] Nov 13 17:58:03 ipsec: 11[CFG] selected proposal: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ 
[I] Nov 13 17:58:03 ipsec: 11[IKE] CHILD_SA VirtualIPServerIKE2{173} established with SPIs c69cc03c_i b8e4854e_o and TS 0.0.0.0/0 === 172.20.8.3/32 
[W] Nov 13 17:58:04 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": crypto map is up: remote client "buh" @ "192.168.1.98" with IP "172.20.8.3" connected. 
[I] Nov 13 17:58:04 ndm: IpSec::Netfilter: start reloading netfilter configuration... 
[I] Nov 13 17:58:04 ndm: IpSec::Netfilter: netfilter configuration reloading is done. 
[I] Nov 13 17:58:45 ipsec: 12[IKE] received DELETE for ESP CHILD_SA with SPI 3fd96792 
[I] Nov 13 17:58:45 ipsec: 12[IKE] closing CHILD_SA VirtualIPServerIKE2{162} with SPIs c4d2d504_i (190954 bytes) 3fd96792_o (1294182 bytes) and TS 0.0.0.0/0 === 172.20.8.4/32 
[I] Nov 13 17:58:45 ipsec: 12[IKE] sending DELETE for ESP CHILD_SA with SPI c4d2d504 
[I] Nov 13 17:58:45 ipsec: 12[IKE] CHILD_SA closed 
[W] Nov 13 17:58:45 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": crypto map remote client "rtk" @ "192.168.0.102" from "91.245.145.177" disconnected. 
[I] Nov 13 17:58:45 ndm: IpSec::Netfilter: start reloading netfilter configuration... 
[I] Nov 13 17:58:45 ipsec: 15[IKE] received DELETE for IKE_SA VirtualIPServerIKE2[56] 
[I] Nov 13 17:58:45 ipsec: 15[IKE] deleting IKE_SA VirtualIPServerIKE2[56] between 213.33.195.46[sakdjfwelfwe.keenetic.link]...91.245.145.177[192.168.0.102] 
[I] Nov 13 17:58:45 ipsec: 15[IKE] IKE_SA deleted 
[I] Nov 13 17:58:45 ndm: IpSec::Netfilter: netfilter configuration reloading is done. 
[I] Nov 13 17:59:11 ipsec: 13[IKE] received DELETE for ESP CHILD_SA with SPI 2255a7d2 
[I] Nov 13 17:59:11 ipsec: 13[IKE] closing CHILD_SA VirtualIPServerIKE2{171} with SPIs c648638f_i (3831 bytes) 2255a7d2_o (0 bytes) and TS 0.0.0.0/0 === 172.20.8.2/32 
[I] Nov 13 17:59:11 ipsec: 13[IKE] sending DELETE for ESP CHILD_SA with SPI c648638f 
[I] Nov 13 17:59:11 ipsec: 13[IKE] CHILD_SA closed 
[W] Nov 13 17:59:11 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": crypto map remote client "urist" @ "192.168.1.43" from "81.211.81.53" disconnected. 
[I] Nov 13 17:59:11 ndm: IpSec::Netfilter: start reloading netfilter configuration... 
[I] Nov 13 17:59:11 ndm: IpSec::Netfilter: netfilter configuration reloading is done. 
[I] Nov 13 17:59:20 ipsec: 14[CFG] received proposals: ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:NULL/HMAC_SHA1_96/NO_EXT_SEQ 
[I] Nov 13 17:59:20 ipsec: 14[CFG] configured proposals: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA2_256_128/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA2_256_128/NO_EXT_SEQ 
[I] Nov 13 17:59:20 ipsec: 14[CFG] selected proposal: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ 
[I] Nov 13 17:59:20 ipsec: 14[IKE] CHILD_SA VirtualIPServerIKE2{174} established with SPIs c1df4731_i 3d63a076_o and TS 0.0.0.0/0 === 172.20.8.2/32 
[W] Nov 13 17:59:20 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": crypto map is up: remote client "urist" @ "192.168.1.43" with IP "172.20.8.2" connected. 
[I] Nov 13 17:59:20 ndm: IpSec::Netfilter: start reloading netfilter configuration... 
[I] Nov 13 17:59:20 ndm: IpSec::Netfilter: netfilter configuration reloading is done. 
[I] Nov 13 18:00:00 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster1/AccessPoint0": STA(7e:fb:25:d2:79:ed) had been aged-out and disassociated (idle silence). 
[I] Nov 13 18:00:01 ipsec: 09[CFG] received proposals: ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:NULL/HMAC_SHA1_96/NO_EXT_SEQ 
[I] Nov 13 18:00:01 ipsec: 09[CFG] configured proposals: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA2_256_128/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA2_256_128/NO_EXT_SEQ 
[I] Nov 13 18:00:01 ipsec: 09[CFG] selected proposal: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ 
[I] Nov 13 18:00:01 ipsec: 09[IKE] inbound CHILD_SA VirtualIPServerIKE2{175} established with SPIs c7f7f636_i 05002f00_o and TS 0.0.0.0/0 === 172.20.8.7/32 
[W] Nov 13 18:00:01 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": crypto map remote client "urist3" @ "192.168.1.75" from "81.211.81.53" disconnected. 
[W] Nov 13 18:00:01 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": crypto map is up: remote client "urist3" @ "192.168.1.75" with IP "172.20.8.7" connected. 
[I] Nov 13 18:00:01 ipsec: 08[IKE] received DELETE for ESP CHILD_SA with SPI 023e626e 
[I] Nov 13 18:00:01 ipsec: 08[IKE] closing CHILD_SA VirtualIPServerIKE2{152} with SPIs c603aa50_i (1065027 bytes) 023e626e_o (2748218 bytes) and TS 0.0.0.0/0 === 172.20.8.7/32 
[I] Nov 13 18:00:01 ipsec: 08[IKE] sending DELETE for ESP CHILD_SA with SPI c603aa50 
[I] Nov 13 18:00:01 ipsec: 08[IKE] CHILD_SA closed 
[I] Nov 13 18:00:01 ipsec: 08[IKE] outbound CHILD_SA VirtualIPServerIKE2{175} established with SPIs c7f7f636_i 05002f00_o and TS 0.0.0.0/0 === 172.20.8.7/32 
[I] Nov 13 18:00:01 ndm: IpSec::Netfilter: start reloading netfilter configuration... 
[I] Nov 13 18:00:01 ndm: IpSec::Netfilter: netfilter configuration reloading is done. 
[I] Nov 13 18:00:40 ndm: Netfilter::Util::BfdManager: "Ssh": unban remote host 217.144.185.121. 
[I] Nov 13 18:00:40 dropbear: Child connection from 217.144.185.121:46890 
[E] Nov 13 18:00:41 dropbear: Login attempt for nonexistent user 'user' 
[I] Nov 13 18:00:41 dropbear: Exit before auth from <217.144.185.121:46890>: Exited normally 
[I] Nov 13 18:00:41 dropbear: Child connection from 217.144.185.121:46896 
[E] Nov 13 18:00:42 dropbear: Login attempt for nonexistent user 'user' 
[I] Nov 13 18:00:42 ndm: Netfilter::Util::Conntrack: flushed 843 IPv4 connections for 217.144.185.121. 
[I] Nov 13 18:00:42 ndm: Netfilter::Util::BfdManager: "Ssh": ban remote host 217.144.185.121 for 15 minutes. 
[I] Nov 13 18:01:47 ndhcps: DHCPREQUEST received (STATE_RENEWING) for 172.16.1.173 from 00:0b:82:96:00:d1. 
[I] Nov 13 18:01:47 ndhcps: sending ACK of 172.16.1.173 to 00:0b:82:96:00:d1. 
[I] Nov 13 18:02:02 ipsec: 09[IKE] retransmit 1 of request with message ID 13 
[I] Nov 13 18:03:04 ipsec: 08[IKE] received DELETE for ESP CHILD_SA with SPI b8e4854e 
[I] Nov 13 18:03:04 ipsec: 08[IKE] closing CHILD_SA VirtualIPServerIKE2{173} with SPIs c69cc03c_i (3545 bytes) b8e4854e_o (0 bytes) and TS 0.0.0.0/0 === 172.20.8.3/32 
[I] Nov 13 18:03:04 ipsec: 08[IKE] sending DELETE for ESP CHILD_SA with SPI c69cc03c 
[I] Nov 13 18:03:04 ipsec: 08[IKE] CHILD_SA closed 
[W] Nov 13 18:03:04 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": crypto map remote client "buh" @ "192.168.1.98" from "81.211.81.53" disconnected. 
[I] Nov 13 18:03:04 ndm: IpSec::Netfilter: start reloading netfilter configuration... 
[I] Nov 13 18:03:04 ndm: IpSec::Netfilter: netfilter configuration reloading is done. 
[I] Nov 13 18:03:06 ipsec: 13[IKE] received DELETE for ESP CHILD_SA with SPI 2fbce3ee 
[I] Nov 13 18:03:06 ipsec: 13[IKE] closing CHILD_SA VirtualIPServerIKE2{172} with SPIs c0f17a7f_i (22430 bytes) 2fbce3ee_o (4376 bytes) and TS 0.0.0.0/0 === 172.20.8.2/32 
[I] Nov 13 18:03:06 ipsec: 13[IKE] sending DELETE for ESP CHILD_SA with SPI c0f17a7f 
[I] Nov 13 18:03:06 ipsec: 13[IKE] CHILD_SA closed 
[W] Nov 13 18:03:06 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": crypto map remote client "metodist5" @ "192.168.0.4" from "92.100.219.255" disconnected. 
[I] Nov 13 18:03:06 ndm: IpSec::Netfilter: start reloading netfilter configuration... 
[I] Nov 13 18:03:06 ipsec: 09[IKE] received DELETE for IKE_SA VirtualIPServerIKE2[76] 
[I] Nov 13 18:03:06 ipsec: 09[IKE] deleting IKE_SA VirtualIPServerIKE2[76] between 213.33.195.46[sakdjfwelfwe.keenetic.link]...92.100.219.255[192.168.0.4] 
[I] Nov 13 18:03:06 ipsec: 09[IKE] IKE_SA deleted 
[I] Nov 13 18:03:06 ndm: IpSec::Netfilter: netfilter configuration reloading is done. 
[I] Nov 13 18:03:07 ipsec: 07[IKE] received MS NT5 ISAKMPOAKLEY v9 vendor ID 
[I] Nov 13 18:03:07 ipsec: 07[IKE] received MS-Negotiation Discovery Capable vendor ID 
[I] Nov 13 18:03:07 ipsec: 07[IKE] received Vid-Initial-Contact vendor ID 
[I] Nov 13 18:03:07 ipsec: 07[IKE] 92.100.219.255 is initiating an IKE_SA 
[I] Nov 13 18:03:07 ipsec: 07[CFG] received proposals: IKE:3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:3DES_CBC/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:3DES_CBC/HMAC_SHA2_384_192/PRF_HMAC_SHA2_384/MODP_1024, IKE:AES_CBC=128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_CBC=128/HMAC_SHA2_384_192/PRF_HMAC_SHA2_384/MODP_1024, IKE:AES_CBC=192/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC=192/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_CBC=192/HMAC_SHA2_384_192/PRF_HMAC_SHA2_384/MODP_1024, IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_CBC=256/HMAC_SHA2_384_192/PRF_HMAC_SHA2_384/MODP_1024, IKE:AES_GCM_16=128/PRF_HMAC_SHA1/MODP_1024, IKE:AES_GCM_16=128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_GCM_16=128/PRF_HMAC_SHA2_384/MODP_1024, IKE:AES_GCM_16=256/PRF_HMAC_SHA1/MODP_1024, IKE:AES_GCM_16=256/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_GCM_16=256/ [...]
[I] Nov 13 18:03:07 ipsec: 07[CFG] configured proposals: IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_2048, IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/ECP_384, IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/ECP_256, IKE:AES_CBC=128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC=128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_2048, IKE:AES_CBC=128/HMAC_SHA1_96/PRF_HMAC_SHA1/ECP_384, IKE:AES_CBC=128/HMAC_SHA1_96/PRF_HMAC_SHA1/ECP_256, IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_2048, IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/ECP_384, IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/ECP_256, IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_2048, IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/ECP_384, IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/ECP_256 
[I] Nov 13 18:03:07 ipsec: 07[CFG] selected proposal: IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024 
[I] Nov 13 18:03:07 ipsec: 07[IKE] remote host is behind NAT 
[I] Nov 13 18:03:07 ipsec: 01[IKE] received 46 cert requests for an unknown ca 
[I] Nov 13 18:03:07 ipsec: 01[CFG] looking for peer configs matching 213.33.195.46[%any]...92.100.219.255[192.168.0.4] 
[I] Nov 13 18:03:07 ipsec: 01[CFG] selected peer config 'VirtualIPServerIKE2' 
[I] Nov 13 18:03:07 ipsec: 01[IKE] initiating EAP_IDENTITY method (id 0x00) 
[I] Nov 13 18:03:07 ipsec: 01[IKE] peer supports MOBIKE 
[I] Nov 13 18:03:08 ipsec: 01[IKE] authentication of 'sakdjfwelfwe.keenetic.link' (myself) with RSA signature successful 
[I] Nov 13 18:03:08 ipsec: 01[IKE] sending end entity cert "CN=sakdjfwelfwe.keenetic.link" 
[I] Nov 13 18:03:08 ipsec: 01[IKE] sending issuer cert "C=US, O=Let's Encrypt, CN=R10" 
[I] Nov 13 18:03:08 ipsec: 08[IKE] received EAP identity 'metodist5' 
[I] Nov 13 18:03:08 ipsec: 08[IKE] initiating EAP_MSCHAPV2 method (id 0xF5) 
[I] Nov 13 18:03:08 ipsec: 13[IKE] EAP method EAP_MSCHAPV2 succeeded, MSK established 
[I] Nov 13 18:03:08 ipsec: 07[IKE] authentication of '192.168.0.4' with EAP successful 
[I] Nov 13 18:03:08 ipsec: 07[IKE] authentication of 'sakdjfwelfwe.keenetic.link' (myself) with EAP 
[I] Nov 13 18:03:08 ipsec: 07[IKE] IKE_SA VirtualIPServerIKE2[77] established between 213.33.195.46[sakdjfwelfwe.keenetic.link]...92.100.219.255[192.168.0.4] 
[I] Nov 13 18:03:08 ipsec: 07[IKE] peer requested virtual IP %any 
[I] Nov 13 18:03:08 ndm: Core::Server: started Session /var/run/ndm.core.socket. 
[I] Nov 13 18:03:08 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": allocated address "172.20.8.1" for user "metodist5" @ "192.168.0.4" from "92.100.219.255". 
[I] Nov 13 18:03:08 ndm: Core::Session: client disconnected. 
[I] Nov 13 18:03:08 ipsec: 07[IKE] assigning virtual IP 172.20.8.1 to peer 'metodist5' 
[I] Nov 13 18:03:08 ipsec: 07[IKE] peer requested virtual IP %any6 
[I] Nov 13 18:03:08 ipsec: 07[IKE] no virtual IP found for %any6 requested by 'metodist5' 
[I] Nov 13 18:03:08 ipsec: 07[CFG] received proposals: ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:NULL/HMAC_SHA1_96/NO_EXT_SEQ 
[I] Nov 13 18:03:08 ipsec: 07[CFG] configured proposals: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA2_256_128/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA2_256_128/NO_EXT_SEQ 
[I] Nov 13 18:03:08 ipsec: 07[CFG] selected proposal: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ 
[I] Nov 13 18:03:08 ipsec: 07[IKE] CHILD_SA VirtualIPServerIKE2{176} established with SPIs c359406a_i bcd5e168_o and TS 0.0.0.0/0 === 172.20.8.1/32 
[W] Nov 13 18:03:08 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": crypto map is up: remote client "metodist5" @ "192.168.0.4" with IP "172.20.8.1" connected. 
[I] Nov 13 18:03:08 ipsec: 07[CFG] scheduling RADIUS Interim-Updates every 5s 
[I] Nov 13 18:03:08 ndm: IpSec::Netfilter: start reloading netfilter configuration... 
[I] Nov 13 18:03:08 ndhcps: DHCPINFORM received for 172.20.8.1 from 00:00:00:00:00:00. 
[I] Nov 13 18:03:08 ndhcps: sending INFORM to 00:00:00:00:00:00. 
[I] Nov 13 18:03:08 ndm: IpSec::Netfilter: netfilter configuration reloading is done. 
[I] Nov 13 18:03:09 ipsec: 06[CFG] received proposals: ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:NULL/HMAC_SHA1_96/NO_EXT_SEQ 
[I] Nov 13 18:03:09 ipsec: 06[CFG] configured proposals: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA2_256_128/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA2_256_128/NO_EXT_SEQ 
[I] Nov 13 18:03:09 ipsec: 06[CFG] selected proposal: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ 
[I] Nov 13 18:03:09 ipsec: 06[IKE] CHILD_SA VirtualIPServerIKE2{177} established with SPIs c2ace520_i 7df09d4c_o and TS 0.0.0.0/0 === 172.20.8.3/32 
[W] Nov 13 18:03:09 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": crypto map is up: remote client "buh" @ "192.168.1.98" with IP "172.20.8.3" connected. 
[I] Nov 13 18:03:09 ndm: IpSec::Netfilter: start reloading netfilter configuration... 
[I] Nov 13 18:03:09 ndm: IpSec::Netfilter: netfilter configuration reloading is done. 
[I] Nov 13 18:05:42 dropbear: Exit before auth from <217.144.185.121:46896>: Timeout before auth 
[I] Nov 13 18:06:04 ipsec: 05[IKE] retransmit 1 of request with message ID 2 
[I] Nov 13 18:07:04 ipsec: 12[IKE] retransmit 1 of request with message ID 3 
[I] Nov 13 18:08:09 ipsec: 10[IKE] received DELETE for ESP CHILD_SA with SPI 7df09d4c 
[I] Nov 13 18:08:09 ipsec: 10[IKE] closing CHILD_SA VirtualIPServerIKE2{177} with SPIs c2ace520_i (11823 bytes) 7df09d4c_o (0 bytes) and TS 0.0.0.0/0 === 172.20.8.3/32 
[I] Nov 13 18:08:09 ipsec: 10[IKE] sending DELETE for ESP CHILD_SA with SPI c2ace520 
[I] Nov 13 18:08:09 ipsec: 10[IKE] CHILD_SA closed 
[W] Nov 13 18:08:09 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": crypto map remote client "buh" @ "192.168.1.98" from "81.211.81.53" disconnected. 
[I] Nov 13 18:08:09 ndm: IpSec::Netfilter: start reloading netfilter configuration... 
[I] Nov 13 18:08:09 ndm: IpSec::Netfilter: netfilter configuration reloading is done. 
[I] Nov 13 18:08:21 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster1/AccessPoint0": STA(30:07:4d:70:2d:ed) had been aged-out and disassociated (idle silence). 
[I] Nov 13 18:08:21 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster1/AccessPoint0": STA(e6:29:c0:f6:d9:c9) had been aged-out and disassociated (idle silence). 
[I] Nov 13 18:09:09 ipsec: 09[IKE] retransmit 1 of request with message ID 6 
[I] Nov 13 18:09:44 ipsec: 07[CFG] received proposals: ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:NULL/HMAC_SHA1_96/NO_EXT_SEQ 
[I] Nov 13 18:09:44 ipsec: 07[CFG] configured proposals: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA2_256_128/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA2_256_128/NO_EXT_SEQ 
[I] Nov 13 18:09:44 ipsec: 07[CFG] selected proposal: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ 
[I] Nov 13 18:09:44 ipsec: 07[IKE] CHILD_SA VirtualIPServerIKE2{178} established with SPIs c4315ba6_i fdea3744_o and TS 0.0.0.0/0 === 172.20.8.3/32 
[W] Nov 13 18:09:44 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": crypto map is up: remote client "buh" @ "192.168.1.98" with IP "172.20.8.3" connected. 
[I] Nov 13 18:09:44 ndm: IpSec::Netfilter: start reloading netfilter configuration... 
[I] Nov 13 18:09:44 ndm: IpSec::Netfilter: netfilter configuration reloading is done. 
[I] Nov 13 18:10:31 ipsec: 10[IKE] retransmit 1 of request with message ID 7 
[I] Nov 13 18:11:24 ipsec: 15[IKE] retransmit 1 of request with message ID 8 
[I] Nov 13 18:11:45 dropbear: Child connection from 137.184.179.251:6116 
[I] Nov 13 18:11:48 dropbear: Exit before auth from <137.184.179.251:6116>: Unexpected packet type 20, expected 21 
[I] Nov 13 18:12:18 dropbear: Child connection from 8.221.136.6:56344 
[I] Nov 13 18:12:21 dropbear: Exit before auth from <8.221.136.6:56344>: Exited normally 
[I] Nov 13 18:12:21 dropbear: Child connection from 8.221.136.6:56360 
[E] Nov 13 18:12:22 dropbear: Login attempt for nonexistent user '' 
[I] Nov 13 18:12:22 dropbear: Exit before auth from <8.221.136.6:56360>: Exited normally 
[I] Nov 13 18:13:07 ipsec: 14[IKE] received DELETE for ESP CHILD_SA with SPI 3d63a076 
[I] Nov 13 18:13:07 ipsec: 14[IKE] closing CHILD_SA VirtualIPServerIKE2{174} with SPIs c1df4731_i (4226 bytes) 3d63a076_o (4265 bytes) and TS 0.0.0.0/0 === 172.20.8.2/32 
[I] Nov 13 18:13:07 ipsec: 14[IKE] sending DELETE for ESP CHILD_SA with SPI c1df4731 
[I] Nov 13 18:13:07 ipsec: 14[IKE] CHILD_SA closed 
[W] Nov 13 18:13:07 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": crypto map remote client "urist" @ "192.168.1.43" from "81.211.81.53" disconnected. 
[I] Nov 13 18:13:08 ndm: IpSec::Netfilter: start reloading netfilter configuration... 
[I] Nov 13 18:13:08 ndm: IpSec::Netfilter: netfilter configuration reloading is done. 
[I] Nov 13 18:13:24 ipsec: 08[IKE] retransmit 1 of request with message ID 9 
[I] Nov 13 18:14:18 ipsec: 15[CFG] received proposals: ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:NULL/HMAC_SHA1_96/NO_EXT_SEQ 
[I] Nov 13 18:14:18 ipsec: 15[CFG] configured proposals: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA2_256_128/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA2_256_128/NO_EXT_SEQ 
[I] Nov 13 18:14:18 ipsec: 15[CFG] selected proposal: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ 
[I] Nov 13 18:14:18 ipsec: 15[IKE] CHILD_SA VirtualIPServerIKE2{179} established with SPIs c9591dd9_i 0afcc81e_o and TS 0.0.0.0/0 === 172.20.8.2/32 
[W] Nov 13 18:14:18 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": crypto map is up: remote client "urist" @ "192.168.1.43" with IP "172.20.8.2" connected. 
[I] Nov 13 18:14:18 ndm: IpSec::Netfilter: start reloading netfilter configuration... 
[I] Nov 13 18:14:18 ndm: IpSec::Netfilter: netfilter configuration reloading is done. 
[I] Nov 13 18:14:44 ipsec: 08[IKE] received DELETE for ESP CHILD_SA with SPI fdea3744 
[I] Nov 13 18:14:44 ipsec: 08[IKE] closing CHILD_SA VirtualIPServerIKE2{178} with SPIs c4315ba6_i (12815 bytes) fdea3744_o (0 bytes) and TS 0.0.0.0/0 === 172.20.8.3/32 
[I] Nov 13 18:14:44 ipsec: 08[IKE] sending DELETE for ESP CHILD_SA with SPI c4315ba6 
[I] Nov 13 18:14:44 ipsec: 08[IKE] CHILD_SA closed 
[W] Nov 13 18:14:44 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": crypto map remote client "buh" @ "192.168.1.98" from "81.211.81.53" disconnected. 
[I] Nov 13 18:14:44 ndm: IpSec::Netfilter: start reloading netfilter configuration... 
[I] Nov 13 18:14:44 ndm: IpSec::Netfilter: netfilter configuration reloading is done. 
[I] Nov 13 18:14:47 ipsec: 13[CFG] received proposals: ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:NULL/HMAC_SHA1_96/NO_EXT_SEQ 
[I] Nov 13 18:14:47 ipsec: 13[CFG] configured proposals: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA2_256_128/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA2_256_128/NO_EXT_SEQ 
[I] Nov 13 18:14:47 ipsec: 13[CFG] selected proposal: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ 
[I] Nov 13 18:14:47 ipsec: 13[IKE] CHILD_SA VirtualIPServerIKE2{180} established with SPIs c614e246_i 47071e16_o and TS 0.0.0.0/0 === 172.20.8.3/32 
[W] Nov 13 18:14:47 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": crypto map is up: remote client "buh" @ "192.168.1.98" with IP "172.20.8.3" connected. 
[I] Nov 13 18:14:47 ndm: IpSec::Netfilter: start reloading netfilter configuration... 
[I] Nov 13 18:14:47 ndm: IpSec::Netfilter: netfilter configuration reloading is done. 
[I] Nov 13 18:15:42 ndm: Netfilter::Util::BfdManager: "Ssh": unban remote host 217.144.185.121. 
[I] Nov 13 18:15:42 dropbear: Child connection from 217.144.185.121:52034 
[E] Nov 13 18:15:43 dropbear: Login attempt for nonexistent user 'user' 
[I] Nov 13 18:15:43 dropbear: Exit before auth from <217.144.185.121:52034>: Exited normally 
[I] Nov 13 18:15:43 dropbear: Child connection from 217.144.185.121:52036 
[E] Nov 13 18:15:44 dropbear: Login attempt for nonexistent user 'user' 
[I] Nov 13 18:15:44 ndm: Netfilter::Util::Conntrack: flushed 826 IPv4 connections for 217.144.185.121. 
[I] Nov 13 18:15:44 ndm: Netfilter::Util::BfdManager: "Ssh": ban remote host 217.144.185.121 for 15 minutes. 
[I] Nov 13 18:19:48 ipsec: 15[IKE] received DELETE for ESP CHILD_SA with SPI 47071e16 
[I] Nov 13 18:19:48 ipsec: 15[IKE] closing CHILD_SA VirtualIPServerIKE2{180} with SPIs c614e246_i (2852 bytes) 47071e16_o (0 bytes) and TS 0.0.0.0/0 === 172.20.8.3/32 
[I] Nov 13 18:19:48 ipsec: 15[IKE] sending DELETE for ESP CHILD_SA with SPI c614e246 
[I] Nov 13 18:19:48 ipsec: 15[IKE] CHILD_SA closed 
[W] Nov 13 18:19:48 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": crypto map remote client "buh" @ "192.168.1.98" from "81.211.81.53" disconnected. 
[I] Nov 13 18:19:48 ndm: IpSec::Netfilter: start reloading netfilter configuration... 
[I] Nov 13 18:19:48 ndm: IpSec::Netfilter: netfilter configuration reloading is done. 
[I] Nov 13 18:19:53 ipsec: 09[CFG] received proposals: ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:NULL/HMAC_SHA1_96/NO_EXT_SEQ 
[I] Nov 13 18:19:53 ipsec: 09[CFG] configured proposals: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA2_256_128/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA2_256_128/NO_EXT_SEQ 
[I] Nov 13 18:19:53 ipsec: 09[CFG] selected proposal: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ 
[I] Nov 13 18:19:53 ipsec: 09[IKE] CHILD_SA VirtualIPServerIKE2{181} established with SPIs cb6744af_i 27441e3e_o and TS 0.0.0.0/0 === 172.20.8.3/32 
[W] Nov 13 18:19:53 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": crypto map is up: remote client "buh" @ "192.168.1.98" with IP "172.20.8.3" connected. 
[I] Nov 13 18:19:54 ndm: IpSec::Netfilter: start reloading netfilter configuration... 
[I] Nov 13 18:19:54 ndm: IpSec::Netfilter: netfilter configuration reloading is done. 
[I] Nov 13 18:20:44 dropbear: Exit before auth from <217.144.185.121:52036>: Timeout before auth 
[I] Nov 13 18:23:05 ipsec: 09[IKE] retransmit 1 of request with message ID 22 
[I] Nov 13 18:24:54 ipsec: 09[IKE] received DELETE for ESP CHILD_SA with SPI 27441e3e 
[I] Nov 13 18:24:54 ipsec: 09[IKE] closing CHILD_SA VirtualIPServerIKE2{181} with SPIs cb6744af_i (12151 bytes) 27441e3e_o (0 bytes) and TS 0.0.0.0/0 === 172.20.8.3/32 
[I] Nov 13 18:24:54 ipsec: 09[IKE] sending DELETE for ESP CHILD_SA with SPI cb6744af 
[I] Nov 13 18:24:54 ipsec: 09[IKE] CHILD_SA closed 
[W] Nov 13 18:24:54 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": crypto map remote client "buh" @ "192.168.1.98" from "81.211.81.53" disconnected. 
[I] Nov 13 18:24:54 ndm: IpSec::Netfilter: start reloading netfilter configuration... 
[I] Nov 13 18:24:54 ndm: IpSec::Netfilter: netfilter configuration reloading is done. 
[I] Nov 13 18:25:00 ipsec: 10[CFG] received proposals: ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:NULL/HMAC_SHA1_96/NO_EXT_SEQ 
[I] Nov 13 18:25:00 ipsec: 10[CFG] configured proposals: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA2_256_128/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA2_256_128/NO_EXT_SEQ 
[I] Nov 13 18:25:00 ipsec: 10[CFG] selected proposal: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ 
[I] Nov 13 18:25:00 ipsec: 10[IKE] CHILD_SA VirtualIPServerIKE2{182} established with SPIs cc4aba3a_i 821e44b2_o and TS 0.0.0.0/0 === 172.20.8.3/32 
[W] Nov 13 18:25:00 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": crypto map is up: remote client "buh" @ "192.168.1.98" with IP "172.20.8.3" connected. 
[I] Nov 13 18:25:00 ndm: IpSec::Netfilter: start reloading netfilter configuration... 
[I] Nov 13 18:25:00 ndm: IpSec::Netfilter: netfilter configuration reloading is done. 
[I] Nov 13 18:25:53 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster1/AccessPoint0": STA(de:3d:ae:ae:55:84) had been aged-out and disassociated (idle silence). 
[I] Nov 13 18:26:41 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster1/AccessPoint0": STA(62:b2:12:d5:da:d2) had been aged-out and disassociated (idle silence). 
[I] Nov 13 18:27:52 ipsec: 15[IKE] received DELETE for IKE_SA VirtualIPServerIKE2[75] 
[I] Nov 13 18:27:52 ipsec: 15[IKE] deleting IKE_SA VirtualIPServerIKE2[75] between 213.33.195.46[sakdjfwelfwe.keenetic.link]...81.211.81.53[192.168.1.98] 
[I] Nov 13 18:27:52 ipsec: 15[IKE] IKE_SA deleted 
[W] Nov 13 18:27:52 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": crypto map remote client "buh" @ "192.168.1.98" from "81.211.81.53" disconnected. 
[I] Nov 13 18:27:52 ndm: IpSec::Netfilter: start reloading netfilter configuration... 
[I] Nov 13 18:27:52 ndm: IpSec::Netfilter: netfilter configuration reloading is done. 
[I] Nov 13 18:30:44 ndm: Netfilter::Util::BfdManager: "Ssh": unban remote host 217.144.185.121. 
[I] Nov 13 18:30:44 dropbear: Child connection from 92.255.85.253:61958 
[I] Nov 13 18:30:44 ndm: Core::Server: started Session /var/run/ndm.core.socket. 
[E] Nov 13 18:30:44 ndm: Core::Authenticator: user "admin": invalid password. 
[I] Nov 13 18:30:44 dropbear: Child connection from 217.144.185.121:46404 
[E] Nov 13 18:30:45 dropbear: Login attempt for nonexistent user 'user' 
[I] Nov 13 18:30:45 dropbear: Exit before auth from <217.144.185.121:46404>: Exited normally 
[I] Nov 13 18:30:45 dropbear: Child connection from 217.144.185.121:53362 
[E] Nov 13 18:30:45 ndm: Core::Authenticator: access to "sftp" denied for user "admin". 
[W] Nov 13 18:30:45 dropbear: Bad password attempt for 'admin' from 92.255.85.253:61958 
[E] Nov 13 18:30:46 dropbear: Login attempt for nonexistent user 'user' 
[I] Nov 13 18:30:46 ndm: Netfilter::Util::Conntrack: flushed 433 IPv4 connections for 217.144.185.121. 
[I] Nov 13 18:30:46 ndm: Netfilter::Util::BfdManager: "Ssh": ban remote host 217.144.185.121 for 15 minutes. 
[I] Nov 13 18:30:46 ndm: Core::Session: client disconnected. 
[I] Nov 13 18:30:46 dropbear: Exit before auth from <92.255.85.253:61958>: (user 'admin', 1 fails): Error reading: Connection reset by peer 
[I] Nov 13 18:31:09 dropbear: Child connection from 66.240.192.85:44171 
[I] Nov 13 18:31:10 dropbear: Exit before auth from <66.240.192.85:44171>: Error reading: Connection reset by peer 
[I] Nov 13 18:32:24 ipsec: 07[IKE] received DELETE for ESP CHILD_SA with SPI 0afcc81e 
[I] Nov 13 18:32:24 ipsec: 07[IKE] closing CHILD_SA VirtualIPServerIKE2{179} with SPIs c9591dd9_i (4329 bytes) 0afcc81e_o (5544 bytes) and TS 0.0.0.0/0 === 172.20.8.2/32 
[I] Nov 13 18:32:24 ipsec: 07[IKE] sending DELETE for ESP CHILD_SA with SPI c9591dd9 
[I] Nov 13 18:32:24 ipsec: 07[IKE] CHILD_SA closed 
[W] Nov 13 18:32:24 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": crypto map remote client "urist" @ "192.168.1.43" from "81.211.81.53" disconnected. 
[I] Nov 13 18:32:24 ndm: IpSec::Netfilter: start reloading netfilter configuration... 
[I] Nov 13 18:32:24 ndm: IpSec::Netfilter: netfilter configuration reloading is done. 
[I] Nov 13 18:32:43 dropbear: Child connection from 92.255.85.107:10454 
[I] Nov 13 18:32:43 ndm: Core::Server: started Session /var/run/ndm.core.socket. 
[E] Nov 13 18:32:43 ndm: Core::Authenticator: user "admin": invalid password. 
[E] Nov 13 18:32:44 ndm: Core::Authenticator: access to "sftp" denied for user "admin". 
[W] Nov 13 18:32:44 dropbear: Bad password attempt for 'admin' from 92.255.85.107:10454 
[I] Nov 13 18:32:45 ndm: Core::Session: client disconnected. 
[I] Nov 13 18:32:45 dropbear: Exit before auth from <92.255.85.107:10454>: (user 'admin', 1 fails): Error reading: Connection reset by peer 
[I] Nov 13 18:33:09 ipsec: 13[CFG] received proposals: ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:NULL/HMAC_SHA1_96/NO_EXT_SEQ 
[I] Nov 13 18:33:09 ipsec: 13[CFG] configured proposals: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA2_256_128/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA2_256_128/NO_EXT_SEQ 
[I] Nov 13 18:33:09 ipsec: 13[CFG] selected proposal: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ 
[I] Nov 13 18:33:09 ipsec: 13[IKE] CHILD_SA VirtualIPServerIKE2{183} established with SPIs cae7e783_i a0b79e22_o and TS 0.0.0.0/0 === 172.20.8.2/32 
[W] Nov 13 18:33:09 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": crypto map is up: remote client "urist" @ "192.168.1.43" with IP "172.20.8.2" connected. 
[I] Nov 13 18:33:09 ndm: IpSec::Netfilter: start reloading netfilter configuration... 
[I] Nov 13 18:33:09 ndm: IpSec::Netfilter: netfilter configuration reloading is done. 
[I] Nov 13 18:35:46 dropbear: Exit before auth from <217.144.185.121:53362>: Timeout before auth 
[I] Nov 13 18:38:09 ipsec: 09[IKE] received DELETE for ESP CHILD_SA with SPI a0b79e22 
[I] Nov 13 18:38:09 ipsec: 09[IKE] closing CHILD_SA VirtualIPServerIKE2{183} with SPIs cae7e783_i (1947 bytes) a0b79e22_o (0 bytes) and TS 0.0.0.0/0 === 172.20.8.2/32 
[I] Nov 13 18:38:09 ipsec: 09[IKE] sending DELETE for ESP CHILD_SA with SPI cae7e783 
[I] Nov 13 18:38:09 ipsec: 09[IKE] CHILD_SA closed 
[W] Nov 13 18:38:09 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": crypto map remote client "urist" @ "192.168.1.43" from "81.211.81.53" disconnected. 
[I] Nov 13 18:38:09 ndm: IpSec::Netfilter: start reloading netfilter configuration... 
[I] Nov 13 18:38:09 ndm: IpSec::Netfilter: netfilter configuration reloading is done. 
[I] Nov 13 18:38:21 ipsec: 15[CFG] received proposals: ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:NULL/HMAC_SHA1_96/NO_EXT_SEQ 
[I] Nov 13 18:38:21 ipsec: 15[CFG] configured proposals: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA2_256_128/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA2_256_128/NO_EXT_SEQ 
[I] Nov 13 18:38:21 ipsec: 15[CFG] selected proposal: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ 
[I] Nov 13 18:38:21 ipsec: 15[IKE] CHILD_SA VirtualIPServerIKE2{184} established with SPIs cec127c1_i 977074ba_o and TS 0.0.0.0/0 === 172.20.8.2/32 
[W] Nov 13 18:38:21 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": crypto map is up: remote client "urist" @ "192.168.1.43" with IP "172.20.8.2" connected. 
[I] Nov 13 18:38:21 ndm: IpSec::Netfilter: start reloading netfilter configuration... 
[I] Nov 13 18:38:21 ndm: IpSec::Netfilter: netfilter configuration reloading is done. 
[I] Nov 13 18:41:10 ipsec: 14[IKE] retransmit 1 of request with message ID 36 
[I] Nov 13 18:42:12 dropbear: Child connection from 81.161.238.160:50038 
[I] Nov 13 18:42:16 ndm: Core::Server: started Session /var/run/ndm.core.socket. 
[E] Nov 13 18:42:16 ndm: Core::Authenticator: access to "cli" denied for user "root". 
[E] Nov 13 18:42:16 ndm: Core::Authenticator: access to "sftp" denied for user "root". 
[W] Nov 13 18:42:16 dropbear: Bad password attempt for 'root' from 81.161.238.160:50038 
[I] Nov 13 18:42:16 ndm: Core::Session: client disconnected. 
[I] Nov 13 18:42:17 dropbear: Exit before auth from <81.161.238.160:50038>: (user 'root', 1 fails): Exited normally 
[I] Nov 13 18:43:21 ipsec: 10[IKE] received DELETE for ESP CHILD_SA with SPI 977074ba 
[I] Nov 13 18:43:21 ipsec: 10[IKE] closing CHILD_SA VirtualIPServerIKE2{184} with SPIs cec127c1_i (653 bytes) 977074ba_o (0 bytes) and TS 0.0.0.0/0 === 172.20.8.2/32 
[I] Nov 13 18:43:21 ipsec: 10[IKE] sending DELETE for ESP CHILD_SA with SPI cec127c1 
[I] Nov 13 18:43:21 ipsec: 10[IKE] CHILD_SA closed 
[W] Nov 13 18:43:21 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": crypto map remote client "urist" @ "192.168.1.43" from "81.211.81.53" disconnected. 
[I] Nov 13 18:43:21 ndm: IpSec::Netfilter: start reloading netfilter configuration... 
[I] Nov 13 18:43:21 ndm: IpSec::Netfilter: netfilter configuration reloading is done. 
[I] Nov 13 18:43:29 ipsec: 06[CFG] received proposals: ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:NULL/HMAC_SHA1_96/NO_EXT_SEQ 
[I] Nov 13 18:43:29 ipsec: 06[CFG] configured proposals: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA2_256_128/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA2_256_128/NO_EXT_SEQ 
[I] Nov 13 18:43:29 ipsec: 06[CFG] selected proposal: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ 
[I] Nov 13 18:43:29 ipsec: 06[IKE] CHILD_SA VirtualIPServerIKE2{185} established with SPIs c8c0d598_i b5f56422_o and TS 0.0.0.0/0 === 172.20.8.2/32 
[W] Nov 13 18:43:29 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": crypto map is up: remote client "urist" @ "192.168.1.43" with IP "172.20.8.2" connected. 
[I] Nov 13 18:43:29 ndm: IpSec::Netfilter: start reloading netfilter configuration... 
[I] Nov 13 18:43:29 ndm: IpSec::Netfilter: netfilter configuration reloading is done. 
[I] Nov 13 18:43:56 ndhcps: DHCPREQUEST received (STATE_RENEWING) for 172.16.1.160 from 00:17:c8:ba:be:b4. 
[I] Nov 13 18:43:57 ndhcps: sending ACK of 172.16.1.160 to 00:17:c8:ba:be:b4. 
[I] Nov 13 18:45:46 ndm: Netfilter::Util::BfdManager: "Ssh": unban remote host 217.144.185.121. 
[I] Nov 13 18:45:46 dropbear: Child connection from 217.144.185.121:42022 
[E] Nov 13 18:45:47 dropbear: Login attempt for nonexistent user 'user' 
[I] Nov 13 18:45:47 dropbear: Exit before auth from <217.144.185.121:42022>: Exited normally 
[I] Nov 13 18:45:47 dropbear: Child connection from 217.144.185.121:42038 
[E] Nov 13 18:45:48 dropbear: Login attempt for nonexistent user 'user' 
[I] Nov 13 18:45:48 ndm: Netfilter::Util::Conntrack: flushed 737 IPv4 connections for 217.144.185.121. 
[I] Nov 13 18:45:48 ndm: Netfilter::Util::BfdManager: "Ssh": ban remote host 217.144.185.121 for 15 minutes. 
[I] Nov 13 18:48:21 ipsec: 06[IKE] received DELETE for ESP CHILD_SA with SPI bcd5e168 
[I] Nov 13 18:48:21 ipsec: 06[IKE] closing CHILD_SA VirtualIPServerIKE2{176} with SPIs c359406a_i (3828380 bytes) bcd5e168_o (11686654 bytes) and TS 0.0.0.0/0 === 172.20.8.1/32 
[I] Nov 13 18:48:21 ipsec: 06[IKE] sending DELETE for ESP CHILD_SA with SPI c359406a 
[I] Nov 13 18:48:21 ipsec: 06[IKE] CHILD_SA closed 
[W] Nov 13 18:48:21 ndm: IpSec::CryptoMapInfo: "VirtualIPServerIKE2": crypto map remote client "metodist5" @ "192.168.0.4" from "92.100.219.255" disconnected. 
[I] Nov 13 18:48:21 ndm: IpSec::Netfilter: start reloading netfilter configuration... 
[I] Nov 13 18:48:21 ndm: IpSec::Netfilter: netfilter configuration reloading is done. 

 

Изменено пользователем ridervka
Опубликовано

Вам же сказано - на 4.2 искать причины бесполезно.

Впрочем если вам просто хочется попостить сюда простыни текста размером в десятки килобайт без какой-либо цели, то продолжайте.

Присоединяйтесь к обсуждению

Вы можете написать сейчас и зарегистрироваться позже. Если у вас есть аккаунт, авторизуйтесь, чтобы опубликовать от имени своего аккаунта.
Примечание: Ваш пост будет проверен модератором, прежде чем станет видимым.

Гость
Ответить в этой теме...

×   Вставлено с форматированием.   Вставить как обычный текст

  Разрешено использовать не более 75 эмодзи.

×   Ваша ссылка была автоматически встроена.   Отображать как обычную ссылку

×   Ваш предыдущий контент был восстановлен.   Очистить редактор

×   Вы не можете вставлять изображения напрямую. Загружайте или вставляйте изображения по ссылке.

  • Последние посетители   0 пользователей онлайн

    • Ни одного зарегистрированного пользователя не просматривает данную страницу
×
×
  • Создать...

Важная информация

На этом сайте используются файлы cookie. Нажимая "Я принимаю" или продолжая просмотр сайта, вы разрешаете их использование: Политика конфиденциальности.