wir haben hier einen 1721 der mit einem Cisco-Router in der Zentrale reden muss. Die VPN-Verbindung ist eingerichtet und es funktioniert alles. Allerdings wird die Verbinung häufig getrennt. Da es meistens nach 100 Minuten passiert, vermute ich irgendeine falsche Einstellung.
Allerdings ist mir nicht klar, auf welcher Seite (Lancom / Cisco) das Problem liegt. In Lancom ist keine aktive Trennung der Verbindung hinterlegt. Ich habe mal einen Trace angehängt. Wenn ich es richtig verstanden habe, meldet sich der Cisco-Router einfach nicht mehr und dann greift DPD? Bin aber nicht so ganz fit im Lesen der Traces...
Wäre für einen Tipp dankbar.
Gruß, Jason
Code: Alles auswählen
[TraceStarted] 2010/10/26 22:09:46,884
Used config:
# Trace config
trace + VPN-Status @ TESTHH
# Show commands
show bootlog
[ShowCmd] 2010/10/26 22:09:48,186
Result of command: "show bootlog "
Boot log (664 Bytes):
****
01/01/1900 00:00:01 System boot after power on
DEVICE: LANCOM 1721 VPN (Annex B)
HW-RELEASE: E
VERSION: 8.00.0162Rel / 16.06.2010 / 6.26b/E74.02.54
****
10/14/2010 19:47:18 System boot after manual boot request
DEVICE: LANCOM 1721 VPN (Annex B)
HW-RELEASE: E
VERSION: 8.00.0162Rel / 16.06.2010 / 6.26b/E74.02.54
****
Loader version 1.88: Next boot is boot after firmware upload
****
10/16/2010 09:04:37 System boot after manual boot request
DEVICE: LANCOM 1721 VPN (Annex B)
HW-RELEASE: E
VERSION: 8.00.0221RU2 / 07.10.2010 / 6.26b/E74.02.54
[Sysinfo] 2010/10/26 22:09:48,263
Result of command: "sysinfo"
DEVICE: LANCOM 1721 VPN (Annex B)
HW-RELEASE: E
SERIAL-NUMBER: 045620600054
MAC-ADDRESS: 00a05711492e
IP-ADDRESS: 192.168.222.12
IP-NETMASK: 255.255.255.0
INTRANET-ADDRESS: 0.0.0.0
INTRANETMASK: 0.0.0.0
VERSION: 8.00.0221RU2 / 07.10.2010 / 2.93/A27.04.14
NAME: HBSRT01
CONFIG-STATUS: 1056;0
FIRMWARE-STATUS: 1;1.9;1.3;8.00Rel.16062010.8;8.00RU2.07102010.9
LANCAPI-PORT: 75
HW-MASK: 00000000000000000000000001100011
FEATUREWORD: 00000000001000000000000100011101
REGISTERED-WORD: 00000000001000000000000100011101
FEATURE-LIST: 00/F
FEATURE-LIST: 02/F
FEATURE-LIST: 03/F
FEATURE-LIST: 04/F
FEATURE-LIST: 08/F
FEATURE-LIST: 15/F
TIME: 22094726102010
HTTP-PORT: 80
HTTPS-PORT: 443
TELNET-PORT: 23
TELNET-SSL-PORT: 992
SSH-PORT: 22
Compatible-IDs: 14:30:31;6:22:31
IKE info: NOTIFY received of type ISAKMP_NOTIFY_DPD_R_U_THERE for peer TESTHH Seq-Nr 0x16653497, expected 0x16653497
[VPN-Status] 2010/10/26 23:49:46,090 Devicetime: 2010/10/26 23:49:44,950
IKE info: ISAKMP_NOTIFY_DPD_R_U_THERE_ACK sent for Phase-1 SA to peer TESTHH, sequence nr 0x16653497
[VPN-Status] 2010/10/26 23:49:56,075 Devicetime: 2010/10/26 23:49:54,950
IKE info: NOTIFY received of type ISAKMP_NOTIFY_DPD_R_U_THERE for peer TESTHH Seq-Nr 0x16653498, expected 0x16653498
[VPN-Status] 2010/10/26 23:49:56,075 Devicetime: 2010/10/26 23:49:54,950
IKE info: ISAKMP_NOTIFY_DPD_R_U_THERE_ACK sent for Phase-1 SA to peer TESTHH, sequence nr 0x16653498
[VPN-Status] 2010/10/26 23:49:57,809 Devicetime: 2010/10/26 23:49:56,670
IKE info: The remote server 83.165.62.210:500 (UDP) peer TESTHH id <no_id> supports NAT-T in mode draft
IKE info: The remote server 83.165.62.210:500 (UDP) peer TESTHH id <no_id> supports NAT-T in mode draft
IKE info: The remote server 83.165.62.210:500 (UDP) peer TESTHH id <no_id> supports NAT-T in mode draft
[VPN-Status] 2010/10/26 23:49:57,841 Devicetime: 2010/10/26 23:49:56,670
IKE info: Phase-1 remote proposal 1 for peer TESTHH matched with local proposal 1
[VPN-Status] 2010/10/26 23:49:58,091 Devicetime: 2010/10/26 23:49:56,710
IKE info: The remote server 83.165.62.210:500 (UDP) peer TESTHH id <no_id> supports NAT-T in mode draft
IKE info: The remote server 83.165.62.210:500 (UDP) peer TESTHH id <no_id> supports draft-ietf-ipsec-isakmp-xauth
IKE info: The remote server 83.165.62.210:500 (UDP) peer TESTHH id <no_id> supports NAT-T in mode draft
IKE info: The remote server 83.165.62.210:500 (UDP) peer TESTHH id <no_id> supports NAT-T in mode draft
[VPN-Status] 2010/10/26 23:49:58,091 Devicetime: 2010/10/26 23:49:56,910
IKE info: The remote server 83.165.62.210:500 (UDP) peer TESTHH id <no_id> negotiated rfc-3706-dead-peer-detection
[VPN-Status] 2010/10/26 23:49:58,091 Devicetime: 2010/10/26 23:49:56,910
IKE info: Phase-1 [responder] for peer TESTHH between initiator id 83.165.62.210, responder id 188.111.108.110 done
IKE info: SA ISAKMP for peer TESTHH encryption 3des-cbc authentication sha1
IKE info: life time ( 8000 sec/ 0 kb)
[VPN-Status] 2010/10/26 23:49:58,091 Devicetime: 2010/10/26 23:49:56,910
IKE info: Phase-1 SA Rekeying Timeout (Soft-Event) for peer TESTHH set to 7200 seconds (Responder)
[VPN-Status] 2010/10/26 23:49:58,091 Devicetime: 2010/10/26 23:49:56,910
IKE info: Phase-1 SA Timeout (Hard-Event) for peer TESTHH set to 8000 seconds (Responder)
[VPN-Status] 2010/10/26 23:49:59,028 Devicetime: 2010/10/26 23:49:57,900
IKE info: ISAKMP_NOTIFY_DPD_R_U_THERE sent for Phase-1 SA to peer TESTHH, sequence nr 0x4030ed4a
[VPN-Status] 2010/10/26 23:50:06,091 Devicetime: 2010/10/26 23:50:04,950
IKE info: NOTIFY received of type ISAKMP_NOTIFY_DPD_R_U_THERE for peer TESTHH Seq-Nr 0x16653499, expected 0x16653499
[VPN-Status] 2010/10/26 23:50:06,091 Devicetime: 2010/10/26 23:50:04,950
IKE info: ISAKMP_NOTIFY_DPD_R_U_THERE_ACK sent for Phase-1 SA to peer TESTHH, sequence nr 0x16653499
[VPN-Status] 2010/10/26 23:50:09,091 Devicetime: 2010/10/26 23:50:07,960
IKE info: DEAD PEER DETECTION Timeout for peer TESTHH, sequence nr 0x4030ed4a: retry detection
[VPN-Status] 2010/10/26 23:50:09,091 Devicetime: 2010/10/26 23:50:07,960
IKE info: ISAKMP_NOTIFY_DPD_R_U_THERE sent for Phase-1 SA to peer TESTHH, sequence nr 0x4030ed4b
[VPN-Status] 2010/10/26 23:50:16,091 Devicetime: 2010/10/26 23:50:14,940
IKE info: NOTIFY received of type ISAKMP_NOTIFY_DPD_R_U_THERE for peer TESTHH Seq-Nr 0x1665349a, expected 0x1665349a
[VPN-Status] 2010/10/26 23:50:16,091 Devicetime: 2010/10/26 23:50:14,950
IKE info: ISAKMP_NOTIFY_DPD_R_U_THERE_ACK sent for Phase-1 SA to peer TESTHH, sequence nr 0x1665349a
[VPN-Status] 2010/10/26 23:50:19,138 Devicetime: 2010/10/26 23:50:17,960
IKE info: DEAD PEER DETECTION Timeout for peer TESTHH, sequence nr 0x4030ed4b: retry detection
[VPN-Status] 2010/10/26 23:50:19,138 Devicetime: 2010/10/26 23:50:17,960
IKE info: ISAKMP_NOTIFY_DPD_R_U_THERE sent for Phase-1 SA to peer TESTHH, sequence nr 0x4030ed4c
[VPN-Status] 2010/10/26 23:50:26,091 Devicetime: 2010/10/26 23:50:24,940
IKE info: NOTIFY received of type ISAKMP_NOTIFY_DPD_R_U_THERE for peer TESTHH Seq-Nr 0x1665349b, expected 0x1665349b
[VPN-Status] 2010/10/26 23:50:26,091 Devicetime: 2010/10/26 23:50:24,940
IKE info: ISAKMP_NOTIFY_DPD_R_U_THERE_ACK sent for Phase-1 SA to peer TESTHH, sequence nr 0x1665349b
[VPN-Status] 2010/10/26 23:50:29,169 Devicetime: 2010/10/26 23:50:27,960
IKE info: DEAD PEER DETECTION Timeout for peer TESTHH, sequence nr 0x4030ed4c: tear down connections
[VPN-Status] 2010/10/26 23:50:29,169 Devicetime: 2010/10/26 23:50:27,960
IKE info: Phase-2 SA removed: peer TESTHH rule ipsec-0-TESTHH-pr0-l0-r0 removed
IKE info: containing Protocol IPSEC_ESP, with spis [c50f9d6b ] [480ad9fe ]
[VPN-Status] 2010/10/26 23:50:29,169 Devicetime: 2010/10/26 23:50:27,960
IKE info: Phase-1 SA removed: peer TESTHH rule TESTHH removed
[VPN-Status] 2010/10/26 23:50:29,435 Devicetime: 2010/10/26 23:50:27,960
IKE info: Phase-1 SA removed: peer TESTHH rule TESTHH removed
[VPN-Status] 2010/10/26 23:50:29,435 Devicetime: 2010/10/26 23:50:27,960
policy manager error indication: TESTHH (83.165.62.210), cause: 8717
[VPN-Status] 2010/10/26 23:50:29,435 Devicetime: 2010/10/26 23:50:27,980
VPN: Error: IKE-R-DPD-Timeout (0x220d) for TESTHH (83.165.62.210)
[VPN-Status] 2010/10/26 23:50:29,435 Devicetime: 2010/10/26 23:50:27,980
VPN: TESTHH (83.165.62.210) disconnected
[VPN-Status] 2010/10/26 23:50:29,435 Devicetime: 2010/10/26 23:50:28,010
selecting next remote gateway using strategy eFirst for TESTHH
=> no remote gateway selected
[VPN-Status] 2010/10/26 23:50:29,435 Devicetime: 2010/10/26 23:50:28,010
selecting first remote gateway using strategy eFirst for TESTHH
=> CurrIdx=0, IpStr=>83.165.62.210<, IpAddr=83.165.62.210, IpTtl=0s
[VPN-Status] 2010/10/26 23:50:29,435 Devicetime: 2010/10/26 23:50:28,010
VPN: installing ruleset for TESTHH (83.165.62.210)
[VPN-Status] 2010/10/26 23:50:30,200 Devicetime: 2010/10/26 23:50:29,010
VPN: connecting to TESTHH (83.165.62.210)
[VPN-Status] 2010/10/26 23:50:30,544 Devicetime: 2010/10/26 23:50:29,030
VPN: start IKE negotiation for TESTHH (83.165.62.210)
[VPN-Status] 2010/10/26 23:50:30,544 Devicetime: 2010/10/26 23:50:29,030
IKE info: Phase-1 negotiation started for peer TESTHH rule isakmp-peer-TESTHH using MAIN mode
[VPN-Status] 2010/10/26 23:50:30,544 Devicetime: 2010/10/26 23:50:29,100
IKE info: Phase-1 remote proposal 1 for peer TESTHH matched with local proposal 1
[VPN-Status] 2010/10/26 23:50:30,544 Devicetime: 2010/10/26 23:50:29,130
IKE info: The remote server 83.165.62.210:500 (UDP) peer TESTHH id <no_id> supports draft-ietf-ipsec-isakmp-xauth
[VPN-Status] 2010/10/26 23:50:30,560 Devicetime: 2010/10/26 23:50:29,350
IKE info: The remote server 83.165.62.210:500 (UDP) peer TESTHH id <no_id> negotiated rfc-3706-dead-peer-detection
[VPN-Status] 2010/10/26 23:50:30,560 Devicetime: 2010/10/26 23:50:29,350
IKE info: Phase-1 [inititiator] for peer TESTHH between initiator id 188.111.108.110, responder id 83.165.62.210 done
IKE info: SA ISAKMP for peer TESTHH encryption 3des-cbc authentication sha1
IKE info: life time ( 8000 sec/ 0 kb)
[VPN-Status] 2010/10/26 23:50:30,560 Devicetime: 2010/10/26 23:50:29,350
IKE info: Phase-1 SA Rekeying Timeout (Soft-Event) for peer TESTHH set to 6400 seconds (Initiator)
[VPN-Status] 2010/10/26 23:50:30,560 Devicetime: 2010/10/26 23:50:29,350
IKE info: Phase-1 SA Timeout (Hard-Event) for peer TESTHH set to 8000 seconds (Initiator)
[VPN-Status] 2010/10/26 23:50:30,560 Devicetime: 2010/10/26 23:50:29,360
IKE info: Delete Notification received for Phase-1 SA isakmp-peer-TESTHH peer TESTHH cookies [4eb9309f1d668c49 29b3ffe7f0d158bf]
[VPN-Status] 2010/10/26 23:50:30,560 Devicetime: 2010/10/26 23:50:29,360
IKE info: Phase-1 SA removed: peer TESTHH rule TESTHH removed
[VPN-Status] 2010/10/26 23:50:30,560 Devicetime: 2010/10/26 23:50:29,370
VPN: TESTHH (83.165.62.210) disconnected
[VPN-Status] 2010/10/26 23:50:30,607 Devicetime: 2010/10/26 23:50:29,390
selecting next remote gateway using strategy eFirst for TESTHH
=> no remote gateway selected
[VPN-Status] 2010/10/26 23:50:30,607 Devicetime: 2010/10/26 23:50:29,390
selecting first remote gateway using strategy eFirst for TESTHH
=> CurrIdx=0, IpStr=>83.165.62.210<, IpAddr=83.165.62.210, IpTtl=0s
[VPN-Status] 2010/10/26 23:50:30,607 Devicetime: 2010/10/26 23:50:29,390
VPN: installing ruleset for TESTHH (83.165.62.210)
[VPN-Status] 2010/10/26 23:50:31,591 Devicetime: 2010/10/26 23:50:30,390
VPN: connecting to TESTHH (83.165.62.210)
[VPN-Status] 2010/10/26 23:50:31,841 Devicetime: 2010/10/26 23:50:30,410
VPN: start IKE negotiation for TESTHH (83.165.62.210)
[VPN-Status] 2010/10/26 23:50:31,841 Devicetime: 2010/10/26 23:50:30,410
IKE info: Phase-1 negotiation started for peer TESTHH rule isakmp-peer-TESTHH using MAIN mode
[VPN-Status] 2010/10/26 23:50:31,841 Devicetime: 2010/10/26 23:50:30,480
IKE info: Phase-1 remote proposal 1 for peer TESTHH matched with local proposal 1
[VPN-Status] 2010/10/26 23:50:31,841 Devicetime: 2010/10/26 23:50:30,510
IKE info: The remote server 83.165.62.210:500 (UDP) peer TESTHH id <no_id> supports draft-ietf-ipsec-isakmp-xauth
[VPN-Status] 2010/10/26 23:50:31,919 Devicetime: 2010/10/26 23:50:30,730
IKE info: The remote server 83.165.62.210:500 (UDP) peer TESTHH id <no_id> negotiated rfc-3706-dead-peer-detection
[VPN-Status] 2010/10/26 23:50:31,919 Devicetime: 2010/10/26 23:50:30,730
IKE info: Phase-1 [inititiator] for peer TESTHH between initiator id 188.111.108.110, responder id 83.165.62.210 done
IKE info: SA ISAKMP for peer TESTHH encryption 3des-cbc authentication sha1
IKE info: life time ( 8000 sec/ 0 kb)
[VPN-Status] 2010/10/26 23:50:31,919 Devicetime: 2010/10/26 23:50:30,730
IKE info: Phase-1 SA Rekeying Timeout (Soft-Event) for peer TESTHH set to 6400 seconds (Initiator)
[VPN-Status] 2010/10/26 23:50:31,919 Devicetime: 2010/10/26 23:50:30,730
IKE info: Phase-1 SA Timeout (Hard-Event) for peer TESTHH set to 8000 seconds (Initiator)
[VPN-Status] 2010/10/26 23:50:31,919 Devicetime: 2010/10/26 23:50:30,740
IKE info: Delete Notification received for Phase-1 SA isakmp-peer-TESTHH peer TESTHH cookies [af6af53b28f6d3d1 6f499e62986342af]
[VPN-Status] 2010/10/26 23:50:31,919 Devicetime: 2010/10/26 23:50:30,740
IKE info: Phase-1 SA removed: peer TESTHH rule TESTHH removed
[VPN-Status] 2010/10/26 23:50:31,919 Devicetime: 2010/10/26 23:50:30,740
VPN: TESTHH (83.165.62.210) disconnected
[VPN-Status] 2010/10/26 23:50:31,966 Devicetime: 2010/10/26 23:50:30,760
selecting next remote gateway using strategy eFirst for TESTHH
=> no remote gateway selected
[VPN-Status] 2010/10/26 23:50:31,966 Devicetime: 2010/10/26 23:50:30,760
selecting first remote gateway using strategy eFirst for TESTHH
=> CurrIdx=0, IpStr=>83.165.62.210<, IpAddr=83.165.62.210, IpTtl=0s
[VPN-Status] 2010/10/26 23:50:31,966 Devicetime: 2010/10/26 23:50:30,770
VPN: installing ruleset for TESTHH (83.165.62.210)
[VPN-Status] 2010/10/26 23:50:32,950 Devicetime: 2010/10/26 23:50:31,770
VPN: connecting to TESTHH (83.165.62.210)
[VPN-Status] 2010/10/26 23:50:33,216 Devicetime: 2010/10/26 23:50:31,790
VPN: start IKE negotiation for TESTHH (83.165.62.210)
[VPN-Status] 2010/10/26 23:50:33,216 Devicetime: 2010/10/26 23:50:31,790
IKE info: Phase-1 negotiation started for peer TESTHH rule isakmp-peer-TESTHH using MAIN mode
[VPN-Status] 2010/10/26 23:50:33,216 Devicetime: 2010/10/26 23:50:31,860
IKE info: Phase-1 remote proposal 1 for peer TESTHH matched with local proposal 1
[VPN-Status] 2010/10/26 23:50:33,216 Devicetime: 2010/10/26 23:50:31,890
IKE info: The remote server 83.165.62.210:500 (UDP) peer TESTHH id <no_id> supports draft-ietf-ipsec-isakmp-xauth
[VPN-Status] 2010/10/26 23:50:33,310 Devicetime: 2010/10/26 23:50:32,110
IKE info: The remote server 83.165.62.210:500 (UDP) peer TESTHH id <no_id> negotiated rfc-3706-dead-peer-detection
[VPN-Status] 2010/10/26 23:50:33,310 Devicetime: 2010/10/26 23:50:32,110
IKE info: Phase-1 [inititiator] for peer TESTHH between initiator id 188.111.108.110, responder id 83.165.62.210 done
IKE info: SA ISAKMP for peer TESTHH encryption 3des-cbc authentication sha1
IKE info: life time ( 8000 sec/ 0 kb)
[VPN-Status] 2010/10/26 23:50:33,310 Devicetime: 2010/10/26 23:50:32,110
IKE info: Phase-1 SA Rekeying Timeout (Soft-Event) for peer TESTHH set to 6400 seconds (Initiator)
[VPN-Status] 2010/10/26 23:50:33,310 Devicetime: 2010/10/26 23:50:32,110
IKE info: Phase-1 SA Timeout (Hard-Event) for peer TESTHH set to 8000 seconds (Initiator)
[VPN-Status] 2010/10/26 23:50:33,310 Devicetime: 2010/10/26 23:50:32,120
IKE info: Delete Notification received for Phase-1 SA isakmp-peer-TESTHH peer TESTHH cookies [4059650ccdb298c1 01f7f3c3b6307115]
[VPN-Status] 2010/10/26 23:50:33,310 Devicetime: 2010/10/26 23:50:32,120
IKE info: Phase-1 SA removed: peer TESTHH rule TESTHH removed
[VPN-Status] 2010/10/26 23:50:33,310 Devicetime: 2010/10/26 23:50:32,130
VPN: TESTHH (83.165.62.210) disconnected
[VPN-Status] 2010/10/26 23:50:33,357 Devicetime: 2010/10/26 23:50:32,150
selecting next remote gateway using strategy eFirst for TESTHH
=> no remote gateway selected
[VPN-Status] 2010/10/26 23:50:33,372 Devicetime: 2010/10/26 23:50:32,150
selecting first remote gateway using strategy eFirst for TESTHH
=> CurrIdx=0, IpStr=>83.165.62.210<, IpAddr=83.165.62.210, IpTtl=0s
[VPN-Status] 2010/10/26 23:50:33,372 Devicetime: 2010/10/26 23:50:32,150
VPN: installing ruleset for TESTHH (83.165.62.210)
[VPN-Status] 2010/10/26 23:50:34,341 Devicetime: 2010/10/26 23:50:33,150
VPN: connecting to TESTHH (83.165.62.210)
[VPN-Status] 2010/10/26 23:50:34,716 Devicetime: 2010/10/26 23:50:33,170
VPN: start IKE negotiation for TESTHH (83.165.62.210)
[VPN-Status] 2010/10/26 23:50:34,716 Devicetime: 2010/10/26 23:50:33,170
IKE info: Phase-1 negotiation started for peer TESTHH rule isakmp-peer-TESTHH using MAIN mode
[VPN-Status] 2010/10/26 23:50:34,716 Devicetime: 2010/10/26 23:50:33,240
IKE info: Phase-1 remote proposal 1 for peer TESTHH matched with local proposal 1
[VPN-Status] 2010/10/26 23:50:34,716 Devicetime: 2010/10/26 23:50:33,270
IKE info: The remote server 83.165.62.210:500 (UDP) peer TESTHH id <no_id> supports draft-ietf-ipsec-isakmp-xauth
[VPN-Status] 2010/10/26 23:50:34,935 Devicetime: 2010/10/26 23:50:33,490
IKE info: The remote server 83.165.62.210:500 (UDP) peer TESTHH id <no_id> negotiated rfc-3706-dead-peer-detection
[VPN-Status] 2010/10/26 23:50:34,935 Devicetime: 2010/10/26 23:50:33,490
IKE info: Phase-1 [inititiator] for peer TESTHH between initiator id 188.111.108.110, responder id 83.165.62.210 done
IKE info: SA ISAKMP for peer TESTHH encryption 3des-cbc authentication sha1
IKE info: life time ( 8000 sec/ 0 kb)
[VPN-Status] 2010/10/26 23:50:34,935 Devicetime: 2010/10/26 23:50:33,490
IKE info: Phase-1 SA Rekeying Timeout (Soft-Event) for peer TESTHH set to 6400 seconds (Initiator)
[VPN-Status] 2010/10/26 23:50:34,935 Devicetime: 2010/10/26 23:50:33,490
IKE info: Phase-1 SA Timeout (Hard-Event) for peer TESTHH set to 8000 seconds (Initiator)
[VPN-Status] 2010/10/26 23:50:34,935 Devicetime: 2010/10/26 23:50:33,500
IKE info: Delete Notification received for Phase-1 SA isakmp-peer-TESTHH peer TESTHH cookies [9ef7055302f7391d f37cdaba9345b200]
[VPN-Status] 2010/10/26 23:50:34,935 Devicetime: 2010/10/26 23:50:33,500
IKE info: Phase-1 SA removed: peer TESTHH rule TESTHH removed
[VPN-Status] 2010/10/26 23:50:34,935 Devicetime: 2010/10/26 23:50:33,500
VPN: TESTHH (83.165.62.210) disconnected
[VPN-Status] 2010/10/26 23:50:34,935 Devicetime: 2010/10/26 23:50:33,520
selecting next remote gateway using strategy eFirst for TESTHH
=> no remote gateway selected
[VPN-Status] 2010/10/26 23:50:34,935 Devicetime: 2010/10/26 23:50:33,520
selecting first remote gateway using strategy eFirst for TESTHH
=> CurrIdx=0, IpStr=>83.165.62.210<, IpAddr=83.165.62.210, IpTtl=0s
[VPN-Status] 2010/10/26 23:50:34,935 Devicetime: 2010/10/26 23:50:33,520
VPN: installing ruleset for TESTHH (83.165.62.210)
[VPN-Status] 2010/10/26 23:50:35,716 Devicetime: 2010/10/26 23:50:34,520
VPN: connecting to TESTHH (83.165.62.210)
[VPN-Status] 2010/10/26 23:50:36,044 Devicetime: 2010/10/26 23:50:34,540
VPN: start IKE negotiation for TESTHH (83.165.62.210)
[VPN-Status] 2010/10/26 23:50:36,044 Devicetime: 2010/10/26 23:50:34,540
IKE info: Phase-1 negotiation started for peer TESTHH rule isakmp-peer-TESTHH using MAIN mode
[VPN-Status] 2010/10/26 23:50:36,044 Devicetime: 2010/10/26 23:50:34,610
IKE info: Phase-1 remote proposal 1 for peer TESTHH matched with local proposal 1
[VPN-Status] 2010/10/26 23:50:36,044 Devicetime: 2010/10/26 23:50:34,640
IKE info: The remote server 83.165.62.210:500 (UDP) peer TESTHH id <no_id> supports draft-ietf-ipsec-isakmp-xauth
[VPN-Status] 2010/10/26 23:50:36,060 Devicetime: 2010/10/26 23:50:34,860
IKE info: The remote server 83.165.62.210:500 (UDP) peer TESTHH id <no_id> negotiated rfc-3706-dead-peer-detection
[VPN-Status] 2010/10/26 23:50:36,060 Devicetime: 2010/10/26 23:50:34,860
IKE info: Phase-1 [inititiator] for peer TESTHH between initiator id 188.111.108.110, responder id 83.165.62.210 done
IKE info: SA ISAKMP for peer TESTHH encryption 3des-cbc authentication sha1
IKE info: life time ( 8000 sec/ 0 kb)
[VPN-Status] 2010/10/26 23:50:36,060 Devicetime: 2010/10/26 23:50:34,860
IKE info: Phase-1 SA Rekeying Timeout (Soft-Event) for peer TESTHH set to 6400 seconds (Initiator)
[VPN-Status] 2010/10/26 23:50:36,060 Devicetime: 2010/10/26 23:50:34,860
IKE info: Phase-1 SA Timeout (Hard-Event) for peer TESTHH set to 8000 seconds (Initiator)
[VPN-Status] 2010/10/26 23:50:36,060 Devicetime: 2010/10/26 23:50:34,870
IKE info: Delete Notification received for Phase-1 SA isakmp-peer-TESTHH peer TESTHH cookies [a1d54ef6a091796c b4d99580b8d33b5a]
[VPN-Status] 2010/10/26 23:50:36,060 Devicetime: 2010/10/26 23:50:34,870
IKE info: Phase-1 SA removed: peer TESTHH rule TESTHH removed
[VPN-Status] 2010/10/26 23:50:36,107 Devicetime: 2010/10/26 23:50:34,870
VPN: TESTHH (83.165.62.210) disconnected
[VPN-Status] 2010/10/26 23:50:36,107 Devicetime: 2010/10/26 23:50:34,900
selecting next remote gateway using strategy eFirst for TESTHH
=> no remote gateway selected
[VPN-Status] 2010/10/26 23:50:36,107 Devicetime: 2010/10/26 23:50:34,900
selecting first remote gateway using strategy eFirst for TESTHH
=> CurrIdx=0, IpStr=>83.165.62.210<, IpAddr=83.165.62.210, IpTtl=0s
[VPN-Status] 2010/10/26 23:50:36,107 Devicetime: 2010/10/26 23:50:34,900
VPN: installing ruleset for TESTHH (83.165.62.210)
[VPN-Status] 2010/10/26 23:50:37,091 Devicetime: 2010/10/26 23:50:35,900
VPN: connecting to TESTHH (83.165.62.210)
[VPN-Status] 2010/10/26 23:50:37,341 Devicetime: 2010/10/26 23:50:35,920
VPN: start IKE negotiation for TESTHH (83.165.62.210)
[VPN-Status] 2010/10/26 23:50:37,341 Devicetime: 2010/10/26 23:50:35,920
IKE info: Phase-1 negotiation started for peer TESTHH rule isakmp-peer-TESTHH using MAIN mode
[VPN-Status] 2010/10/26 23:50:37,341 Devicetime: 2010/10/26 23:50:35,990
IKE info: Phase-1 remote proposal 1 for peer TESTHH matched with local proposal 1
[VPN-Status] 2010/10/26 23:50:37,341 Devicetime: 2010/10/26 23:50:36,020
IKE info: The remote server 83.165.62.210:500 (UDP) peer TESTHH id <no_id> supports draft-ietf-ipsec-isakmp-xauth
[VPN-Status] 2010/10/26 23:50:37,622 Devicetime: 2010/10/26 23:50:36,240
IKE info: The remote server 83.165.62.210:500 (UDP) peer TESTHH id <no_id> negotiated rfc-3706-dead-peer-detection
[VPN-Status] 2010/10/26 23:50:37,622 Devicetime: 2010/10/26 23:50:36,240
IKE info: Phase-1 [inititiator] for peer TESTHH between initiator id 188.111.108.110, responder id 83.165.62.210 done
IKE info: SA ISAKMP for peer TESTHH encryption 3des-cbc authentication sha1
IKE info: life time ( 8000 sec/ 0 kb)
[VPN-Status] 2010/10/26 23:50:37,622 Devicetime: 2010/10/26 23:50:36,240
IKE info: Phase-1 SA Rekeying Timeout (Soft-Event) for peer TESTHH set to 6400 seconds (Initiator)
[VPN-Status] 2010/10/26 23:50:37,622 Devicetime: 2010/10/26 23:50:36,240
IKE info: Phase-1 SA Timeout (Hard-Event) for peer TESTHH set to 8000 seconds (Initiator)
[VPN-Status] 2010/10/26 23:50:37,904 Devicetime: 2010/10/26 23:50:36,480
IKE info: Phase-2 SA Rekeying Timeout (Soft-Event) for peer TESTHH set to 69120 seconds (Initiator)
[VPN-Status] 2010/10/26 23:50:37,904 Devicetime: 2010/10/26 23:50:36,480
IKE info: Phase-2 SA Timeout (Hard-Event) for peer TESTHH set to 86400 seconds (Initiator)
[VPN-Status] 2010/10/26 23:50:37,904 Devicetime: 2010/10/26 23:50:36,480
IKE info: Phase-2 [inititiator] done with 2 SAS for peer TESTHH rule ipsec-0-TESTHH-pr0-l0-r0
IKE info: rule:' ipsec 192.168.222.0/255.255.255.0 <-> 192.168.50.0/255.255.255.0 '
IKE info: SA ESP [0xf8c14a86] alg 3DES keylength 192 +hmac HMAC_SHA outgoing
IKE info: SA ESP [0x394941c3] alg 3DES keylength 192 +hmac HMAC_SHA incoming
IKE info: life soft( 69120 sec/160000 kb) hard (86400 sec/200000 kb)
IKE info: tunnel between src: 188.111.108.110 dst: 83.165.62.210
[VPN-Status] 2010/10/26 23:50:38,685 Devicetime: 2010/10/26 23:50:37,480
VPN: TESTHH (83.165.62.210) connected
[VPN-Status] 2010/10/26 23:50:46,076 Devicetime: 2010/10/26 23:50:44,940
IKE info: NOTIFY received of type ISAKMP_NOTIFY_DPD_R_U_THERE for peer TESTHH Seq-Nr 0x10dd2f81, expected 0x10dd2f81
[VPN-Status] 2010/10/26 23:50:46,076 Devicetime: 2010/10/26 23:50:44,940
IKE info: ISAKMP_NOTIFY_DPD_R_U_THERE_ACK sent for Phase-1 SA to peer TESTHH, sequence nr 0x10dd2f81
[VPN-Status] 2010/10/26 23:50:56,076 Devicetime: 2010/10/26 23:50:54,940
IKE info: NOTIFY received of type ISAKMP_NOTIFY_DPD_R_U_THERE for peer TESTHH Seq-Nr 0x10dd2f82, expected 0x10dd2f82
[VPN-Status] 2010/10/26 23:50:56,076 Devicetime: 2010/10/26 23:50:54,940