Uploaded by ctlr_v

ipsec remote

advertisement
FortiGate-VM64-KVM # id=20085 trace_id=1 func=print_pkt_detail line=5460 msg="vd-root:0 received a packet(proto=17, 192.168.77.7:500->192.168.77.2:500) from port2. "
ike 0: comes 192.168.77.7:500->192.168.77.2:500,ifindex=4....
ike 0: IKEv1 exchange=Aggressive id=78f1e6e0206a3d27/0000000000000000 len=564
ike 0: in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
id=20085 trace_id=1 func=init_ip_session_common line=5625 msg="allocate a new session-00000b1d"
ike 0:78f1e6e0206a3d27/0000000000000000:15: responder: aggressive mode get 1st message...
ike 0:78f1e6e0206a3d27/0000000000000000:15: VID CISCO-UNITY 12F5F28C457168A9702D9FE274CC0100
ike 0:78f1e6e0206a3d27/0000000000000000:15: VID RFC 3947 4A131C81070358455C5728F20E95452F
ike 0:78f1e6e0206a3d27/0000000000000000:15: VID draft-ietf-ipsec-nat-t-ike-02 CD60464335DF21F87CFDB2FC68B6A448
id=20085 trace_id=1 func=vf_ip_route_input_common line=2596 msg="find a route: flag=84000000 gw-192.168.77.2 via root"
ike 0:78f1e6e0206a3d27/0000000000000000:15: VID draft-ietf-ipsec-nat-t-ike-02\n 90CB80913EBB696E086381B5EC427B1F
ike 0:78f1e6e0206a3d27/0000000000000000:15: VID draft-ietf-ipsra-isakmp-xauth-06.txt 09002689DFD6B712
ike 0:78f1e6e0206a3d27/0000000000000000:15: VID DPD AFCAD71368A1F1C96B8696FC77570100
ike 0:78f1e6e0206a3d27/0000000000000000:15: VID forticlient connect license 4C53427B6D465D1B337BB755A37A7FEF
ike 0:78f1e6e0206a3d27/0000000000000000:15: VID Fortinet Endpoint Control B4F01CA951E9DA8D0BAFBBD34AD3044E
ike 0::15: peer identifier IPV4_ADDR 192.168.77.7
ike 0: cache rebuild start
ike 0:student1: cached as dynamic
ike 0: cache rebuild done
ike 0: IKEv1 Aggressive, comes 192.168.77.7:500->192.168.77.2 4
ike 0:78f1e6e0206a3d27/0000000000000000:15: negotiation result
ike 0:78f1e6e0206a3d27/0000000000000000:15: proposal id = 1:
ike 0:78f1e6e0206a3d27/0000000000000000:15: protocol id = ISAKMP:
ike 0:78f1e6e0206a3d27/0000000000000000:15: trans_id = KEY_IKE.
ike 0:78f1e6e0206a3d27/0000000000000000:15: encapsulation = IKE/none
ike 0:78f1e6e0206a3d27/0000000000000000:15: type=OAKLEY_ENCRYPT_ALG, val=DES_CBC.
ike 0:78f1e6e0206a3d27/0000000000000000:15: type=OAKLEY_HASH_ALG, val=SHA2_256.
ike 0:78f1e6e0206a3d27/0000000000000000:15: type=AUTH_METHOD, val=PRESHARED_KEY.
ike 0:78f1e6e0206a3d27/0000000000000000:15: type=OAKLEY_GROUP, val=MODP2048.
ike 0:78f1e6e0206a3d27/0000000000000000:15: ISAKMP SA lifetime=86400
ike 0:78f1e6e0206a3d27/0000000000000000:15: SA proposal chosen, matched gateway student1
ike 0:student1: created connection: 0xd97fb40 4 192.168.77.2->192.168.77.7:500.
ike 0:student1: HA L3 state 1/0
ike 0:student1:15: DPD negotiated
ike 0:student1:15: peer supports UNITY
ike 0:student1:15: enable FortiClient license check
ike 0:student1:15: enable FortiClient endpoint compliance check, use 10.0.0.1
ike 0:student1:15: selected NAT-T version: RFC 3947
ike 0:student1:15: cookie 78f1e6e0206a3d27/f0ff843c0b363296
ike 0:student1:15: ISAKMP SA 78f1e6e0206a3d27/f0ff843c0b363296 key 8:73D9B45B5B4FB86E
ike 0:student1:15: out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
id=20085 trace_id=2 func=print_pkt_detail line=5460 msg="vd-root:0 received a packet(proto=17, 192.168.77.2:500->192.168.77.7:500) from local. "
ike 0:student1:15: sent IKE msg (agg_r1send): 192.168.77.2:500->192.168.77.7:500, len=620, id=78f1e6e0206a3d27/f0ff843c0b363296
id=20085 trace_id=2 func=resolve_ip_tuple_fast line=5540 msg="Find an existing session, id-00000b1d, reply direction"
ike 0: comes 192.168.77.7:500->192.168.77.2:500,ifindex=4....
ike 0: IKEv1 exchange=Aggressive id=78f1e6e0206a3d27/f0ff843c0b363296 len=172
id=20085 trace_id=3 func=print_pkt_detail line=5460 msg="vd-root:0 received a packet(proto=17, 192.168.77.7:500->192.168.77.2:500) from port2. "
id=20085 trace_id=3 func=resolve_ip_tuple_fast line=5540 msg="Find an existing session, id-00000b1d, original direction"
ike 0: in 78F1E6E0206A3D27F0FF843C0B3632960810040100000000000000ACCF379914984F00176A325D60D3A8F5B7BC836C46CE0BF92869A753768843B6042D760169342C083364367A3B55BBFEE24C77EB888A583B8BF2B667430772317528F71ED929BDD9C302A8C893E0B2BA2758C9B7AD5CCE9AABDEFD055E7721F7FFE06D5BD01B7AD702BC433796ED93A702EE446249F76603E3B32F8DEE55CC86CFE127FDCB336AD4DD50EE91E05493132A
ike 0:student1:15: responder: aggressive mode get 2nd response...
ike 0:student1:15: dec 78F1E6E0206A3D27F0FF843C0B3632960810040100000000000000AC140000244734BD8843F7FF4F7432F5B35669A1E760BD17A988B01666A4123335A5BC39D51400002472731BBD36BB4CD4853DA5EB0DC01F643DAB6D110A6A373BA9F21921E15E5F3A0B000024031206C19BBE77A96E8F52E291008F4D99769AEF4BA1F17A17D600BCB6D292920000001C000000010110600278F1E6E0206A3D27F0FF843C0B3632968796B7A8B2F7A707
ike 0:student1:15: received NAT-D payload type 20
ike 0:student1:15: received NAT-D payload type 20
ike 0:student1:15: received p1 notify type INITIAL-CONTACT
ike 0:student1:15: PSK authentication succeeded
ike 0:student1:15: authentication OK
ike 0:student1:15: NAT not detected
ike 0:student1: adding new dynamic tunnel for 192.168.77.7:500
ike 0:student1_0: added new dynamic tunnel for 192.168.77.7:500
ike 0:student1_0: add connected route 10.0.0.1 -> 10.0.0.1
ike 0:student1_0:15: established IKE SA 78f1e6e0206a3d27/f0ff843c0b363296
ike 0:student1_0:15: processing INITIAL-CONTACT
ike 0:student1_0: flushing
ike 0:student1_0: flushed
ike 0:student1_0:15: processed INITIAL-CONTACT
ike 0:student1_0:15: no pending Quick-Mode negotiations
ike 0:student1: IP 10.0.0.1 added
id=20085 trace_id=4 func=print_pkt_detail line=5460 msg="vd-root:0 received a packet(proto=17, 192.168.77.7:500->192.168.77.2:500) from port2. "
ike 0: comes 192.168.77.7:500->192.168.77.2:500,ifindex=4....
ike 0: IKEv1 exchange=Quick id=78f1e6e0206a3d27/f0ff843c0b363296:fef20d8b len=764
ike 0: in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
id=20085 trace_id=4 func=resolve_ip_tuple_fast line=5540 msg="Find an existing session, id-00000b1d, original direction"
id=20085 trace_id=4 func=vf_ip_route_input_common line=2596 msg="find a route: flag=84000000 gw-192.168.77.2 via root"
ike 0:student1_0:15:188: responder received first quick-mode message
ike 0:student1_0:15: dec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
ike 0:student1_0:15: received p1 notify type FORTICLIENT-CONNECT
ike 0:student1_0:15:188: FORTICLIENT-CONNECT received, license status = 4
ike 0:student1_0:15:188: FCC request len = 239, data = 'VER=1
FCTVER=6.4.1.1519
UID=AC73E490CD1A400CB4A4CED4D62E6376
IP=192.168.77.7
MAC=54-70-ff-b2-16-0d;00-0c-29-f9-16-6f;
HOST=WIN-2TJSV7QC29B
USER=u
OSVER=Microsoft Windows 7 Ultimate Edition, 32-bit Service Pack 1 (build 7601)
REG_STATUS=0
'
ike 0:student1_0:15:188: FCC reply len = 14, data = 'VER=1
CODE=0
'
ike 0:student1_0:15:188: peer proposal is: peer:17:192.168.77.7-192.168.77.7:68, me:17:0.0.0.0-255.255.255.255:67
ike 0:student1_0:15:student1:188: trying
ike 0:student1_0:15:student1:188: matched phase2
ike 0:student1_0:15:student1:188: dynamic client
ike 0:student1_0:15:student1:188: my proposal:
ike 0:student1_0:15:student1:188: proposal id = 1:
ike 0:student1_0:15:student1:188: protocol id = IPSEC_ESP:
ike 0:student1_0:15:student1:188: PFS DH group = 14
ike 0:student1_0:15:student1:188: trans_id = ESP_DES
ike 0:student1_0:15:student1:188: encapsulation = ENCAPSULATION_MODE_TUNNEL
ike 0:student1_0:15:student1:188: type = AUTH_ALG, val=SHA2_512
ike 0:student1_0:15:student1:188: trans_id = ESP_DES
ike 0:student1_0:15:student1:188: encapsulation = ENCAPSULATION_MODE_TUNNEL
ike 0:student1_0:15:student1:188: type = AUTH_ALG, val=SHA2_256
ike 0:student1_0:15:student1:188: incoming proposal:
ike 0:student1_0:15:student1:188: proposal id = 1:
ike 0:student1_0:15:student1:188: protocol id = IPSEC_ESP:
ike 0:student1_0:15:student1:188: PFS DH group = 14
ike 0:student1_0:15:student1:188: trans_id = ESP_DES
ike 0:student1_0:15:student1:188: encapsulation = ENCAPSULATION_MODE_TUNNEL
ike 0:student1_0:15:student1:188: type = AUTH_ALG, val=SHA2_256
ike 0:student1_0:15:student1:188: trans_id = ESP_DES
ike 0:student1_0:15:student1:188: encapsulation = ENCAPSULATION_MODE_TUNNEL
ike 0:student1_0:15:student1:188: type = AUTH_ALG, val=SHA2_512
ike 0:student1_0:15:student1:188: trans_id = ESP_DES
ike 0:student1_0:15:student1:188: encapsulation = ENCAPSULATION_MODE_TUNNEL
ike 0:student1_0:15:student1:188: type = AUTH_ALG, val=SHA2_256
ike 0:student1_0:15:student1:188: trans_id = ESP_DES
ike 0:student1_0:15:student1:188: encapsulation = ENCAPSULATION_MODE_TUNNEL
ike 0:student1_0:15:student1:188: type = AUTH_ALG, val=SHA2_512
ike 0:student1_0:15:student1:188: negotiation result
ike 0:student1_0:15:student1:188: proposal id = 1:
ike 0:student1_0:15:student1:188: protocol id = IPSEC_ESP:
ike 0:student1_0:15:student1:188: PFS DH group = 14
ike 0:student1_0:15:student1:188: trans_id = ESP_DES
ike 0:student1_0:15:student1:188: encapsulation = ENCAPSULATION_MODE_TUNNEL
ike 0:student1_0:15:student1:188: type = AUTH_ALG, val=SHA2_256
ike 0:student1_0:15:student1:188: set pfs=MODP2048
ike 0:student1_0:15:student1:188: using tunnel mode.
ike 0:student1_0:15:student1:188: replay protection enabled
ike 0:student1_0:15:student1:188: SA life soft seconds=43187.
ike 0:student1_0:15:student1:188: SA life hard seconds=43200.
ike 0:student1_0:15:student1:188: IPsec SA selectors #src=1 #dst=1
ike 0:student1_0:15:student1:188: src 0 7 17:0.0.0.0-255.255.255.255:67
ike 0:student1_0:15:student1:188: dst 0 7 17:192.168.77.7-192.168.77.7:68
ike 0:student1_0:15:student1:188: add dynamic IPsec SA selectors
ike 0:student1_0:188: add route 192.168.77.7/255.255.255.255 gw 192.168.77.7 oif student1_0(19) metric 15 priority 0
ike 0:student1_0:15:student1:188: tunnel 1 of VDOM limit 0/0
ike 0:student1_0:15:student1:188: add IPsec SA: SPIs=ca7e97ad/2ba892ad
ike 0:student1_0:15:student1:188: IPsec SA dec spi ca7e97ad key 8:A83646B5CDD345B8 auth 32:7DCE79FFE09757C9F3E8A5B4F54544458841B7C75057227F10759B2E63EA4428
ike 0:student1_0:15:student1:188: IPsec SA enc spi 2ba892ad key 8:73F10AA6423E982A auth 32:DCA87D612901BF275C4A45843F9F948D004823B9270A64277E324C082C546EBB
ike 0:student1_0:15:student1:188: added IPsec SA: SPIs=ca7e97ad/2ba892ad
ike 0:student1_0:15:student1:188: sending SNMP tunnel UP trap
ike 0:student1_0:15: enc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
ike 0:student1_0:15: out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
id=20085 trace_id=5 func=print_pkt_detail line=5460 msg="vd-root:0 received a packet(proto=17, 192.168.77.2:500->192.168.77.7:500) from local. "
ike 0:student1_0:15: sent IKE msg (quick_r1send): 192.168.77.2:500->192.168.77.7:500, len=444, id=78f1e6e0206a3d27/f0ff843c0b363296:fef20d8b
ike 0: comes 192.168.77.7:500->192.168.77.2:500,ifindex=4....
ike 0: IKEv1 exchange=Quick id=78f1e6e0206a3d27/f0ff843c0b363296:fef20d8b len=68
ike 0: in 78F1E6E0206A3D27F0FF843C0B36329608102001FEF20D8B000000446158C35334D3752FDC259BBDE2D3B7E1268A9481001CCA847BA7963117F096F2016AB88D2757F649
id=20085 trace_id=5 func=resolve_ip_tuple_fast line=5540 msg="Find an existing session, id-00000b1d, reply direction"
ike 0:student1_0:15: dec 78F1E6E0206A3D27F0FF843C0B36329608102001FEF20D8B000000440000002407598390A59C8166D148D676DCD8578D44E206A8E9D1F03F9FBB601879676E4898A0AC03
ike 0:student1_0:15: enc 78F1E6E0206A3D27F0FF843C0B36329608102001FEF20D8B0000005A0B0000249C162A4A3E80BBB5EDF458E894EF4EDB9E81C21EAC920E7C596B3519FC19F5A00000001A0000000101007DF75645523D310A434F44453D300A00
ike 0:student1_0:15: out 78F1E6E0206A3D27F0FF843C0B36329608102001FEF20D8B0000005C0F2EBC01F3827D210EC1BF6153B393AA38254D5D3EF9FBF92643BB0F6656B53B75E811B99682A31C9863E5D084685067EF82B9964A5920B2870D077FBAE97AD1
id=20085 trace_id=6 func=print_pkt_detail line=5460 msg="vd-root:0 received a packet(proto=17, 192.168.77.7:500->192.168.77.2:500) from port2. "
id=20085 trace_id=6 func=resolve_ip_tuple_fast line=5540 msg="Find an existing session, id-00000b1d, original direction"
ike 0:student1_0:15: sent IKE msg (quick_r2send): 192.168.77.2:500->192.168.77.7:500, len=92, id=78f1e6e0206a3d27/f0ff843c0b363296:fef20d8b
ike 0:student1_0:student1:188: send SA_DONE SPI 0x2ba892ad
id=20085 trace_id=6 func=vf_ip_route_input_common line=2596 msg="find a route: flag=84000000 gw-192.168.77.2 via root"
id=20085 trace_id=7 func=print_pkt_detail line=5460 msg="vd-root:0 received a packet(proto=17, 192.168.77.2:500->192.168.77.7:500) from local. "
id=20085 trace_id=7 func=resolve_ip_tuple_fast line=5540 msg="Find an existing session, id-00000b1d, reply direction"
id=20085 trace_id=8 func=print_pkt_detail line=5460 msg="vd-root:0 received a packet(proto=17, 192.168.77.7:500->192.168.77.2:500) from port2. "
ike 0: comes 192.168.77.7:500->192.168.77.2:500,ifindex=4....
ike 0: IKEv1 exchange=Informational id=78f1e6e0206a3d27/f0ff843c0b363296:bdcc19af len=84
ike 0: in 78F1E6E0206A3D27F0FF843C0B36329608100501BDCC19AF00000054191D9F97E7CE7477901B43040D3AF7CB0AAF668F2694326778A85BC5471E679047DF1509F77F4DD261E8A25A7063CADB7A2969AA4702918B
id=20085 trace_id=8 func=resolve_ip_tuple_fast line=5540 msg="Find an existing session, id-00000b1d, original direction"
ike 0:student1_0:15: dec 78F1E6E0206A3D27F0FF843C0B36329608100501BDCC19AF000000540C00002472CC04717E91019A0BB44C2394114249D4CD6419C2AA2D88B3CA6D05362D3C0A0000001000000001030400012BA892ADB3E5C803
ike 0:student1_0:15: recv IPsec SA delete, spi count 1
ike 0:student1_0: deleting IPsec SA with SPI 2ba892ad
ike 0:student1_0:student1: deleted IPsec SA with SPI 2ba892ad, SA count: 0
ike 0:student1_0:188: del route 192.168.77.7/255.255.255.255 oif student1_0(19) metric 15 priority 0
id=20085 trace_id=9 func=print_pkt_detail line=5460 msg="vd-root:0 received a packet(proto=17, 192.168.77.7:500->192.168.77.2:500) from port2. "
ike 0:student1_0: sending SNMP tunnel DOWN trap for student1
ike 0:student1_0:student1: delete
ike 0: comes 192.168.77.7:500->192.168.77.2:500,ifindex=4....
ike 0: IKEv1 exchange=Quick id=78f1e6e0206a3d27/f0ff843c0b363296:ce9720a9 len=516
ike 0: in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
id=20085 trace_id=9 func=resolve_ip_tuple_fast line=5540 msg="Find an existing session, id-00000b1d, original direction"
ike 0:student1_0:15:189: responder received first quick-mode message
ike 0:student1_0:15: dec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
ike 0:student1_0:15:189: peer proposal is: peer:0:10.0.0.11-10.0.0.11:0, me:0:0.0.0.0-255.255.255.255:0
ike 0:student1_0:15:student1:189: trying
ike 0:student1_0:15:student1:189: matched phase2
ike 0:student1_0:15:student1:189: dynamic client
ike 0:student1_0:15:student1:189: my proposal:
ike 0:student1_0:15:student1:189: proposal id = 1:
ike 0:student1_0:15:student1:189: protocol id = IPSEC_ESP:
ike 0:student1_0:15:student1:189: PFS DH group = 14
ike 0:student1_0:15:student1:189: trans_id = ESP_DES
ike 0:student1_0:15:student1:189: encapsulation = ENCAPSULATION_MODE_TUNNEL
ike 0:student1_0:15:student1:189: type = AUTH_ALG, val=SHA2_512
ike 0:student1_0:15:student1:189: trans_id = ESP_DES
ike 0:student1_0:15:student1:189: encapsulation = ENCAPSULATION_MODE_TUNNEL
ike 0:student1_0:15:student1:189: type = AUTH_ALG, val=SHA2_256
ike 0:student1_0:15:student1:189: incoming proposal:
ike 0:student1_0:15:student1:189: proposal id = 1:
ike 0:student1_0:15:student1:189: protocol id = IPSEC_ESP:
ike 0:student1_0:15:student1:189: PFS DH group = 14
ike 0:student1_0:15:student1:189: trans_id = ESP_DES
ike 0:student1_0:15:student1:189: encapsulation = ENCAPSULATION_MODE_TUNNEL
ike 0:student1_0:15:student1:189: type = AUTH_ALG, val=SHA2_256
ike 0:student1_0:15:student1:189: trans_id = ESP_DES
ike 0:student1_0:15:student1:189: encapsulation = ENCAPSULATION_MODE_TUNNEL
ike 0:student1_0:15:student1:189: type = AUTH_ALG, val=SHA2_512
ike 0:student1_0:15:student1:189: trans_id = ESP_DES
ike 0:student1_0:15:student1:189: encapsulation = ENCAPSULATION_MODE_TUNNEL
ike 0:student1_0:15:student1:189: type = AUTH_ALG, val=SHA2_256
ike 0:student1_0:15:student1:189: trans_id = ESP_DES
ike 0:student1_0:15:student1:189: encapsulation = ENCAPSULATION_MODE_TUNNEL
ike 0:student1_0:15:student1:189: type = AUTH_ALG, val=SHA2_512
ike 0:student1_0:15:student1:189: negotiation result
ike 0:student1_0:15:student1:189: proposal id = 1:
ike 0:student1_0:15:student1:189: protocol id = IPSEC_ESP:
ike 0:student1_0:15:student1:189: PFS DH group = 14
ike 0:student1_0:15:student1:189: trans_id = ESP_DES
ike 0:student1_0:15:student1:189: encapsulation = ENCAPSULATION_MODE_TUNNEL
ike 0:student1_0:15:student1:189: type = AUTH_ALG, val=SHA2_256
ike 0:student1_0:15:student1:189: set pfs=MODP2048
ike 0:student1_0:15:student1:189: using tunnel mode.
ike 0:student1_0:15:student1:189: replay protection enabled
ike 0:student1_0:15:student1:189: SA life soft seconds=43186.
ike 0:student1_0:15:student1:189: SA life hard seconds=43200.
ike 0:student1_0:15:student1:189: IPsec SA selectors #src=1 #dst=1
ike 0:student1_0:15:student1:189: src 0 7 0:0.0.0.0-255.255.255.255:0
ike 0:student1_0:15:student1:189: dst 0 7 0:10.0.0.11-10.0.0.11:0
ike 0:student1_0:15:student1:189: add dynamic IPsec SA selectors
ike 0:student1_0:189: add route 10.0.0.11/255.255.255.255 gw 192.168.77.7 oif student1_0(19) metric 15 priority 0
ike 0:student1_0:15:student1:189: add IPsec SA: SPIs=ca7e97ae/2ba892ae
ike 0:student1_0:15:student1:189: IPsec SA dec spi ca7e97ae key 8:B5EAC7E9EC07D8E6 auth 32:239D814D5B3F8B882CA7C9F443AC0B60124B20705C5403C6018C424790459917
ike 0:student1_0:15:student1:189: IPsec SA enc spi 2ba892ae key 8:C947D9C2801A8B5E auth 32:920E01B63FFC806310F089A7CF8B6618F9AD76ABE324A61BE2E78BBBB4AAB00B
ike 0:student1_0:15:student1:189: added IPsec SA: SPIs=ca7e97ae/2ba892ae
ike 0:student1_0:15:student1:189: sending SNMP tunnel UP trap
ike 0:student1_0:15: enc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
ike 0:student1_0:15: out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
id=20085 trace_id=10 func=print_pkt_detail line=5460 msg="vd-root:0 received a packet(proto=17, 192.168.77.2:500->192.168.77.7:500) from local. "
ike 0:student1_0:15: sent IKE msg (quick_r1send): 192.168.77.2:500->192.168.77.7:500, len=444, id=78f1e6e0206a3d27/f0ff843c0b363296:ce9720a9
ike 0: comes 192.168.77.7:500->192.168.77.2:500,ifindex=4....
ike 0: IKEv1 exchange=Quick id=78f1e6e0206a3d27/f0ff843c0b363296:ce9720a9 len=68
ike 0: in 78F1E6E0206A3D27F0FF843C0B36329608102001CE9720A900000044610F5F2A630BD428BF352295E0FBB04A283A58E53EC094FAD830BF843F2F5C301E20BBE8A32A3813
id=20085 trace_id=10 func=resolve_ip_tuple_fast line=5540 msg="Find an existing session, id-00000b1d, reply direction"
ike 0:student1_0:15: dec 78F1E6E0206A3D27F0FF843C0B36329608102001CE9720A90000004400000024DF191DB3E87927FCCE14B8FB2A2A05D3EB595944530D4D7E6DCB44758C9B739282E1B003
ike 0:student1_0:student1:189: send SA_DONE SPI 0x2ba892ae
id=20085 trace_id=11 func=print_pkt_detail line=5460 msg="vd-root:0 received a packet(proto=17, 192.168.77.7:500->192.168.77.2:500) from port2. "
id=20085 trace_id=11 func=resolve_ip_tuple_fast line=5540 msg="Find an existing session, id-00000b1d, original direction"
id=20085 trace_id=11 func=vf_ip_route_input_common line=2596 msg="find a route: flag=84000000 gw-192.168.77.2 via root"
id=20085 trace_id=12 func=print_pkt_detail line=5460 msg="vd-root:0 received a packet(proto=17, 192.168.77.7:500->192.168.77.2:500) from port2. "
ike 0: comes 192.168.77.7:500->192.168.77.2:500,ifindex=4....
ike 0: IKEv1 exchange=Informational id=78f1e6e0206a3d27/f0ff843c0b363296:a7669b29 len=100
ike 0: in 78F1E6E0206A3D27F0FF843C0B36329608100501A7669B2900000064E74DC6FCFC10D6EA1BD530930DFC2D866848F51DB7AFD49B9FBBD7BCA6186633915CF1E907158B7CF6FD71763EF8C5D83FF225B825E446D1FAFCFB8B186D36656B85F522B0A4A330
id=20085 trace_id=12 func=resolve_ip_tuple_fast line=5540 msg="Find an existing session, id-00000b1d, original direction"
ike 0:student1_0:15: dec 78F1E6E0206A3D27F0FF843C0B36329608100501A7669B29000000640B000024D645A7377252E449EC9BA7DAFE74085ED43C79D5D1F4B5AE76F5E8C295A9B93A000000200000000101108D2878F1E6E0206A3D27F0FF843C0B363296000007B5BFD7A703
ike 0:student1_0:15: notify msg received: R-U-THERE
ike 0:student1_0:15: enc 78F1E6E0206A3D27F0FF843C0B3632960810050168AFE43D000000600B00002442A7962BEC6076F5361A9B3E6C748F6B8419F71C570EF68F013BA3234FB4DE9C000000200000000101108D2978F1E6E0206A3D27F0FF843C0B363296000007B5
ike 0:student1_0:15: out 78F1E6E0206A3D27F0FF843C0B3632960810050168AFE43D00000064CB8ED80F8A6219316899B558F1529FF5E872BE556CB3F35417F74697272CFC45749DA12BA28AB84569CEF61FB59922375F4732CE81B0F553E064F81827D491FF6DFA9C4238906EE5
id=20085 trace_id=13 func=print_pkt_detail line=5460 msg="vd-root:0 received a packet(proto=17, 192.168.77.2:500->192.168.77.7:500) from local. "
ike 0:student1_0:15: sent IKE msg (R-U-THERE-ACK): 192.168.77.2:500->192.168.77.7:500, len=100, id=78f1e6e0206a3d27/f0ff843c0b363296:68afe43d
id=20085 trace_id=13 func=resolve_ip_tuple_fast line=5540 msg="Find an existing session, id-00000b1d, reply direction"
ike shrank heap by 159744 bytes
id=20085 trace_id=14 func=print_pkt_detail line=5460 msg="vd-root:0 received a packet(proto=17, 192.168.77.7:500->192.168.77.2:500) from port2. "
ike 0: comes 192.168.77.7:500->192.168.77.2:500,ifindex=4....
ike 0: IKEv1 exchange=Informational id=78f1e6e0206a3d27/f0ff843c0b363296:fcede0bf len=100
ike 0: in 78F1E6E0206A3D27F0FF843C0B36329608100501FCEDE0BF000000641ED3466A87590C417A9F9436D9785E3E4BDF62E196D13EDAB374B68183833675038BD98A6EE6666A78F31214EAF6741A0E92CA4089674F7882D5634A98E6066F102380D47756E125
id=20085 trace_id=14 func=resolve_ip_tuple_fast line=5540 msg="Find an existing session, id-00000b1d, original direction"
ike 0:student1_0:15: dec 78F1E6E0206A3D27F0FF843C0B36329608100501FCEDE0BF000000640B000024F9F65DFC769741A50C50DEA5301B8CAFE3E3B9AAF3FA1B81A882434C1FD970EF000000200000000101108D2878F1E6E0206A3D27F0FF843C0B363296000007B6A8DEFD03
ike 0:student1_0:15: notify msg received: R-U-THERE
ike 0:student1_0:15: enc 78F1E6E0206A3D27F0FF843C0B363296081005018765A230000000600B000024B27E0D83164BFED687C9BECCD2EAF5BCA051649936028C44477E55F64FB08152000000200000000101108D2978F1E6E0206A3D27F0FF843C0B363296000007B6
ike 0:student1_0:15: out 78F1E6E0206A3D27F0FF843C0B363296081005018765A23000000064BB76A0C12ABB10263D9EF869F52E07EBF651D196218CA59A6D62D355C01E62357A531518F3031973AEC874B008DA9E2E6D74659C6619A3C3ABFAA8BADB06B7EED211A79154186139
id=20085 trace_id=15 func=print_pkt_detail line=5460 msg="vd-root:0 received a packet(proto=17, 192.168.77.2:500->192.168.77.7:500) from local. "
ike 0:student1_0:15: sent IKE msg (R-U-THERE-ACK): 192.168.77.2:500->192.168.77.7:500, len=100, id=78f1e6e0206a3d27/f0ff843c0b363296:8765a230
id=20085 trace_id=15 func=resolve_ip_tuple_fast line=5540 msg="Find an existing session, id-00000b1d, reply direction"
id=20085 trace_id=16 func=print_pkt_detail line=5460 msg="vd-root:0 received a packet(proto=17, 192.168.77.7:500->192.168.77.2:500) from port2. "
ike 0: comes 192.168.77.7:500->192.168.77.2:500,ifindex=4....
ike 0: IKEv1 exchange=Informational id=78f1e6e0206a3d27/f0ff843c0b363296:bb472f4c len=100
ike 0: in 78F1E6E0206A3D27F0FF843C0B36329608100501BB472F4C00000064DF9FC3C2CD18D8F6CBB7FA8A40C2DEA440CAFBD98E319905FECB97B845F2FE76161B11AD82DCFCA10966B30352EF766CAFCA582590F6279729278E0F44C0C2B9972E9E47E2BF1F6D
ike 0:student1_0:15: dec 78F1E6E0206A3D27F0FF843C0B36329608100501BB472F4C000000640B000024CDD8B7B4191756AF078F15474F6E0D6FEBA71043CEED571E24442BF953D02CFD000000200000000101108D2878F1E6E0206A3D27F0FF843C0B363296000007B7819DA803
id=20085 trace_id=16 func=resolve_ip_tuple_fast line=5540 msg="Find an existing session, id-00000b1d, original direction"
ike 0:student1_0:15: notify msg received: R-U-THERE
ike 0:student1_0:15: enc 78F1E6E0206A3D27F0FF843C0B363296081005017346AB91000000600B000024FCAAF30B2087D32C6371DEC9BFAC3EA2A901FF913EDFC28467A91DC73851C2D7000000200000000101108D2978F1E6E0206A3D27F0FF843C0B363296000007B7
ike 0:student1_0:15: out 78F1E6E0206A3D27F0FF843C0B363296081005017346AB91000000649BF4188F51CC370127C7E8817875EA27541C05D1B9303B1D971E5B69864B631A1313AD928C98B7784DD2162C881FC0AC7A34191B529EC1027D78F6DBF5E311A4FCEA4F8F71BA3782
id=20085 trace_id=17 func=print_pkt_detail line=5460 msg="vd-root:0 received a packet(proto=17, 192.168.77.2:500->192.168.77.7:500) from local. "
ike 0:student1_0:15: sent IKE msg (R-U-THERE-ACK): 192.168.77.2:500->192.168.77.7:500, len=100, id=78f1e6e0206a3d27/f0ff843c0b363296:7346ab91
id=20085 trace_id=17 func=resolve_ip_tuple_fast line=5540 msg="Find an existing session, id-00000b1d, reply direction"
id=20085 trace_id=18 func=print_pkt_detail line=5460 msg="vd-root:0 received a packet(proto=17, 192.168.77.7:500->192.168.77.2:500) from port2. "
ike 0: comes 192.168.77.7:500->192.168.77.2:500,ifindex=4....
ike 0: IKEv1 exchange=Informational id=78f1e6e0206a3d27/f0ff843c0b363296:e720763d len=100
ike 0: in 78F1E6E0206A3D27F0FF843C0B36329608100501E720763D00000064C58F16BD3575B0443B4F5AB31A2FA93F51F7830517F8AE9C75820FE5BFC9E54F970D0A2640D3F98E31396FCECFD15DA9B7736EBB318F93EAF195A23CB3249DD3D0537041F9E14E39
ike 0:student1_0:15: dec 78F1E6E0206A3D27F0FF843C0B36329608100501E720763D000000640B0000247A68D11146C92DA68910EC533028B324FB22833ED5B5141EE5420710C4BE2316000000200000000101108D2878F1E6E0206A3D27F0FF843C0B363296000007B8DC93F903
ike 0:student1_0:15: notify msg received: R-U-THERE
ike 0:student1_0:15: enc 78F1E6E0206A3D27F0FF843C0B3632960810050155C07D85000000600B000024E3E25F991E82F1554D16F5B6173523B74D3B75ABD429B406ACE5E00C20FC7F89000000200000000101108D2978F1E6E0206A3D27F0FF843C0B363296000007B8
id=20085 trace_id=18 func=resolve_ip_tuple_fast line=5540 msg="Find an existing session, id-00000b1d, original direction"
ike 0:student1_0:15: out 78F1E6E0206A3D27F0FF843C0B3632960810050155C07D8500000064E09455F477B68CD794B7D35AF8F644E9F5D8F3C8404956CAFBCD748521D3712B2929D6BF99B69644A979EBCFEFC44074C48EBDCFD75297D4FEA36E624BB56D915A4E00617829AE86
id=20085 trace_id=19 func=print_pkt_detail line=5460 msg="vd-root:0 received a packet(proto=17, 192.168.77.2:500->192.168.77.7:500) from local. "
ike 0:student1_0:15: sent IKE msg (R-U-THERE-ACK): 192.168.77.2:500->192.168.77.7:500, len=100, id=78f1e6e0206a3d27/f0ff843c0b363296:55c07d85
id=20085 trace_id=19 func=resolve_ip_tuple_fast line=5540 msg="Find an existing session, id-00000b1d, reply direction"
id=20085 trace_id=20 func=print_pkt_detail line=5460 msg="vd-root:0 received a packet(proto=17, 192.168.77.7:500->192.168.77.2:500) from port2. "
ike 0: comes 192.168.77.7:500->192.168.77.2:500,ifindex=4....
ike 0: IKEv1 exchange=Informational id=78f1e6e0206a3d27/f0ff843c0b363296:d5fb1087 len=100
ike 0: in 78F1E6E0206A3D27F0FF843C0B36329608100501D5FB1087000000649E397C632AEC52E0B0F8411338C7DAB3D1184BF866F53C3AA29B8B47CC2170FA9B525AE2237BB34A46588C80EDC06D705D1592BCBEEDA6878479924EEB2CC51F6AFE24A92F28A9EC
ike 0:student1_0:15: dec 78F1E6E0206A3D27F0FF843C0B36329608100501D5FB1087000000640B00002466270E31EE12B43F5B5C7A9EC7F0AD9E8014453D152603B0BCCC07F85B120422000000200000000101108D2878F1E6E0206A3D27F0FF843C0B363296000007B9FE8AD003
id=20085 trace_id=20 func=resolve_ip_tuple_fast line=5540 msg="Find an existing session, id-00000b1d, original direction"
ike 0:student1_0:15: notify msg received: R-U-THERE
ike 0:student1_0:15: enc 78F1E6E0206A3D27F0FF843C0B363296081005018D028BAE000000600B000024563DD89C55255A992D7CEAE4B7299E13CA9003618CE8EE440CB9668ED0FDC1A0000000200000000101108D2978F1E6E0206A3D27F0FF843C0B363296000007B9
ike 0:student1_0:15: out 78F1E6E0206A3D27F0FF843C0B363296081005018D028BAE00000064D86B3086C1E9DA6821741F8DB1942E51F0EE55785E2CAFD5ADCDD9020DD67B517753BF16FED5C134BF6CBCF4E61A56D3C7EF19DADE6223C5DC4A35D0A6D54187631B66C284917292
id=20085 trace_id=21 func=print_pkt_detail line=5460 msg="vd-root:0 received a packet(proto=17, 192.168.77.2:500->192.168.77.7:500) from local. "
ike 0:student1_0:15: sent IKE msg (R-U-THERE-ACK): 192.168.77.2:500->192.168.77.7:500, len=100, id=78f1e6e0206a3d27/f0ff843c0b363296:8d028bae
id=20085 trace_id=21 func=resolve_ip_tuple_fast line=5540 msg="Find an existing session, id-00000b1d, reply direction"
id=20085 trace_id=22 func=print_pkt_detail line=5460 msg="vd-root:0 received a packet(proto=17, 192.168.77.7:500->192.168.77.2:500) from port2. "
ike 0: comes 192.168.77.7:500->192.168.77.2:500,ifindex=4....
ike 0: IKEv1 exchange=Informational id=78f1e6e0206a3d27/f0ff843c0b363296:f95c924e len=100
ike 0: in 78F1E6E0206A3D27F0FF843C0B36329608100501F95C924E00000064CA613D7B17BFB5AEF8C5BF010C42689AA4ECA9DFFA3A36ECCD3FC36E01DC29632D2260B130CF8D52DB36D0BC455D74AD92ADC3B6E7DA42E12141DF672AC6A88430F0E846DF058FCF
ike 0:student1_0:15: dec 78F1E6E0206A3D27F0FF843C0B36329608100501F95C924E000000640B00002477FD24E724BDD3C103023E1B706631AFB3D83D725984A393B605BF25536E7741000000200000000101108D2878F1E6E0206A3D27F0FF843C0B363296000007BA91F59503
id=20085 trace_id=22 func=resolve_ip_tuple_fast line=5540 msg="Find an existing session, id-00000b1d, original direction"
ike 0:student1_0:15: notify msg received: R-U-THERE
ike 0:student1_0:15: enc 78F1E6E0206A3D27F0FF843C0B36329608100501431167D9000000600B000024A505E9C7B6DAA3559A6C3AD46FF2D52362CE7FFA9AA1649687268ED1D246AD39000000200000000101108D2978F1E6E0206A3D27F0FF843C0B363296000007BA
ike 0:student1_0:15: out 78F1E6E0206A3D27F0FF843C0B36329608100501431167D900000064D4918C3E06E61996DF19185898EC0124661C49E1A59389E980CBC4E76045AE71D8DBF557EAE4F8D7DB4686483CB1F87C43928AB50EED72CA6C932DD0D8E22706231F373DD47A9DB7
id=20085 trace_id=23 func=print_pkt_detail line=5460 msg="vd-root:0 received a packet(proto=17, 192.168.77.2:500->192.168.77.7:500) from local. "
ike 0:student1_0:15: sent IKE msg (R-U-THERE-ACK): 192.168.77.2:500->192.168.77.7:500, len=100, id=78f1e6e0206a3d27/f0ff843c0b363296:431167d9
id=20085 trace_id=23 func=resolve_ip_tuple_fast line=5540 msg="Find an existing session, id-00000b1d, reply direction"
id=20085 trace_id=24 func=print_pkt_detail line=5460 msg="vd-root:0 received a packet(proto=17, 192.168.77.7:500->192.168.77.2:500) from port2. "
ike 0: comes 192.168.77.7:500->192.168.77.2:500,ifindex=4....
ike 0: IKEv1 exchange=Informational id=78f1e6e0206a3d27/f0ff843c0b363296:b3727bfa len=100
ike 0: in 78F1E6E0206A3D27F0FF843C0B36329608100501B3727BFA000000641D83B6B390260FD77D0298F3AA936AB472898E498EAC7B63B7B7E534CE51D4398679ACFBB541CAF2123498B503FDCB6C0FD544031B8D61DB2D44C2356A453CC0F0ACB899D6F9B4EC
ike 0:student1_0:15: dec 78F1E6E0206A3D27F0FF843C0B36329608100501B3727BFA000000640B0000247F72E29B2572AC1B9AB7008A74BF2426FDB03F0F893E03764A39E5514BD5DB12000000200000000101108D2878F1E6E0206A3D27F0FF843C0B363296000007BB8CE1EF03
id=20085 trace_id=24 func=resolve_ip_tuple_fast line=5540 msg="Find an existing session, id-00000b1d, original direction"
ike 0:student1_0:15: notify msg received: R-U-THERE
ike 0:student1_0:15: enc 78F1E6E0206A3D27F0FF843C0B3632960810050106FAE52D000000600B000024743AFC24ECC2B393E5CD2212C8DEACEBE788A5575F6F8DD580352F3215F0D89B000000200000000101108D2978F1E6E0206A3D27F0FF843C0B363296000007BB
ike 0:student1_0:15: out 78F1E6E0206A3D27F0FF843C0B3632960810050106FAE52D00000064858EF0669D19781E405FDE75CF74EAB6E0970C3336ED5A1A13E9CBA41983C7689335C34B555653357061C526C3640D488DA93D05EF475DDCDE996D5E21B257CC2615579A5C85F76F
id=20085 trace_id=25 func=print_pkt_detail line=5460 msg="vd-root:0 received a packet(proto=17, 192.168.77.2:500->192.168.77.7:500) from local. "
ike 0:student1_0:15: sent IKE msg (R-U-THERE-ACK): 192.168.77.2:500->192.168.77.7:500, len=100, id=78f1e6e0206a3d27/f0ff843c0b363296:06fae52d
id=20085 trace_id=25 func=resolve_ip_tuple_fast line=5540 msg="Find an existing session, id-00000b1d, reply direction"
ike 0: comes 192.168.77.7:500->192.168.77.2:500,ifindex=4....
id=20085 trace_id=26 func=print_pkt_detail line=5460 msg="vd-root:0 received a packet(proto=17, 192.168.77.7:500->192.168.77.2:500) from port2. "
ike 0: IKEv1 exchange=Informational id=78f1e6e0206a3d27/f0ff843c0b363296:9a6cf1ba len=100
ike 0: in 78F1E6E0206A3D27F0FF843C0B363296081005019A6CF1BA000000642D0561DEF7FE99E4C8BC2C2D5813443D71FAB4A9932681821D1A4C2C69D39CFB55C6818241DE247B1C236555B1E9D20072C21E714A434CB58B311C60CCE709EAA3DF39B1A6177A9E
ike 0:student1_0:15: dec 78F1E6E0206A3D27F0FF843C0B363296081005019A6CF1BA000000640B000024D5AC88A311D7DA9A61EA56A4B9F281D45B0C5E4425F7E227C7003CF8F30FE180000000200000000101108D2878F1E6E0206A3D27F0FF843C0B363296000007BCF0D3C103
id=20085 trace_id=26 func=resolve_ip_tuple_fast line=5540 msg="Find an existing session, id-00000b1d, original direction"
ike 0:student1_0:15: notify msg received: R-U-THERE
ike 0:student1_0:15: enc 78F1E6E0206A3D27F0FF843C0B363296081005012A929EDE000000600B00002480EF810C9C524F97CB631E1BB3C8E75605C938C2B419EB354F085975D7D06C71000000200000000101108D2978F1E6E0206A3D27F0FF843C0B363296000007BC
ike 0:student1_0:15: out 78F1E6E0206A3D27F0FF843C0B363296081005012A929EDE00000064A7881F76FE85B179C909F0BF38C75F722D0F5933BC8BDB0EBA5AC142EE2B6F2DE1295F6F2812BC7F4CBB2F0CDAD010046818678EB53F8EC731A03873F4185FA917E8FB45E272E32F
id=20085 trace_id=27 func=print_pkt_detail line=5460 msg="vd-root:0 received a packet(proto=17, 192.168.77.2:500->192.168.77.7:500) from local. "
ike 0:student1_0:15: sent IKE msg (R-U-THERE-ACK): 192.168.77.2:500->192.168.77.7:500, len=100, id=78f1e6e0206a3d27/f0ff843c0b363296:2a929ede
id=20085 trace_id=27 func=resolve_ip_tuple_fast line=5540 msg="Find an existing session, id-00000b1d, reply direction"
id=20085 trace_id=28 func=print_pkt_detail line=5460 msg="vd-root:0 received a packet(proto=17, 192.168.77.7:500->192.168.77.2:500) from port2. "
ike 0: comes 192.168.77.7:500->192.168.77.2:500,ifindex=4....
ike 0: IKEv1 exchange=Informational id=78f1e6e0206a3d27/f0ff843c0b363296:d5ace76a len=100
ike 0: in 78F1E6E0206A3D27F0FF843C0B36329608100501D5ACE76A0000006439078F30C1971F7F7A02E768223EE654DF0FB84D563C96EF694D9084E697EA2A933AF75F2A041CF66A5BC4E3B8A21FEEB12538C3141187F7F9DE8847FCABEFFF444AFF610A822261
ike 0:student1_0:15: dec 78F1E6E0206A3D27F0FF843C0B36329608100501D5ACE76A000000640B000024B024D672BFF1C43F4534DC4980017FFF55D6CAD2D11DEB108320BD7B3E82B47D000000200000000101108D2878F1E6E0206A3D27F0FF843C0B363296000007BDDBBD8403
id=20085 trace_id=28 func=resolve_ip_tuple_fast line=5540 msg="Find an existing session, id-00000b1d, original direction"
ike 0:student1_0:15: notify msg received: R-U-THERE
ike 0:student1_0:15: enc 78F1E6E0206A3D27F0FF843C0B36329608100501F99DD8FA000000600B0000243CF10D51737F966900A0A191DF698EF010C64F063D02444A92FE4C28FEC1CF32000000200000000101108D2978F1E6E0206A3D27F0FF843C0B363296000007BD
ike 0:student1_0:15: out 78F1E6E0206A3D27F0FF843C0B36329608100501F99DD8FA0000006418525B8A28E9DFDCACC966D09EF079326FCFF4E0832C73A5A1B0FD9482BDADDD72FDCA87C75F6A17FFED5D650DEEEF63DB1F8924C0C4164F644401FE6942966D315DF3F7DC41B8C5
id=20085 trace_id=29 func=print_pkt_detail line=5460 msg="vd-root:0 received a packet(proto=17, 192.168.77.2:500->192.168.77.7:500) from local. "
ike 0:student1_0:15: sent IKE msg (R-U-THERE-ACK): 192.168.77.2:500->192.168.77.7:500, len=100, id=78f1e6e0206a3d27/f0ff843c0b363296:f99dd8fa
id=20085 trace_id=29 func=resolve_ip_tuple_fast line=5540 msg="Find an existing session, id-00000b1d, reply direction"
FortiGate-VM64-KVM # id=20085 trace_id=30 func=print_pkt_detail line=5460 msg="vd-root:0 received a packet(proto=17, 192.168.77.7:500->192.168.77.2:500) from port2. "
ike 0: comes 192.168.77.7:500->192.168.77.2:500,ifindex=4....
ike 0: IKEv1 exchange=Informational id=78f1e6e0206a3d27/f0ff843c0b363296:c87938cc len=100
ike 0: in 78F1E6E0206A3D27F0FF843C0B36329608100501C87938CC00000064CD06BB7AB4E932506196A60371F2617D5ECA6573A3904B5803EA357D55813D493947D1C810F2AF4ACDD3CE17E77A05E2E6611F6B954311E4C8C6A763E3CD449E188295085FAFEB13
ike 0:student1_0:15: dec 78F1E6E0206A3D27F0FF843C0B36329608100501C87938CC000000640B000024AFA2008B6BF3D6B08E752B418E03E2CC29E227AA4E68CB29874797877A22B8E7000000200000000101108D2878F1E6E0206A3D27F0FF843C0B363296000007BED59DBE03
id=20085 trace_id=30 func=resolve_ip_tuple_fast line=5540 msg="Find an existing session, id-00000b1d, original direction"
ike 0:student1_0:15: notify msg received: R-U-THERE
ike 0:student1_0:15: enc 78F1E6E0206A3D27F0FF843C0B363296081005013FCCD273000000600B00002443A74D8A390904E7A296AE01601626BA72359E526FC8B199060AB05A0B606B69000000200000000101108D2978F1E6E0206A3D27F0FF843C0B363296000007BE
ike 0:student1_0:15: out 78F1E6E0206A3D27F0FF843C0B363296081005013FCCD273000000647EE9E69B66545A8D39379E3CCF1234D90B1398D78CBBCEA76F36B46C07092DE4084466B55D3F2E48CB4C063B9D21C807045AD0873DDB863064B06431CE69B5D90E660164CEA5361A
id=20085 trace_id=31 func=print_pkt_detail line=5460 msg="vd-root:0 received a packet(proto=17, 192.168.77.2:500->192.168.77.7:500) from local. "
ike 0:student1_0:15: sent IKE msg (R-U-THERE-ACK): 192.168.77.2:500->192.168.77.7:500, len=100, id=78f1e6e0206a3d27/f0ff843c0b363296:3fccd273
id=20085 trace_id=31 func=resolve_ip_tuple_fast line=5540 msg="Find an existing session, id-00000b1d, reply direction"
FortiGate-VM64-KVM # did=20085 trace_id=32 func=print_pkt_detail line=5460 msg="vd-root:0 received a packet(proto=17, 192.168.77.7:500->192.168.77.2:500) from port2. "
ike 0: comes 192.168.77.7:500->192.168.77.2:500,ifindex=4....
ike 0: IKEv1 exchange=Informational id=78f1e6e0206a3d27/f0ff843c0b363296:c9e0fd6a len=100
ike 0: in 78F1E6E0206A3D27F0FF843C0B36329608100501C9E0FD6A00000064DFD3C794C5C0A77033101DB5B261F454E99BEB5C6358E77507E72C91458FB904204A57CD40A43D18A1F9079AA397C083BA5D35E3C90F41E0DD0CA89CEF5183DAD98FC54E60D00670
id=20085 trace_id=32 func=resolve_ip_tuple_fast line=5540 msg="Find an existing session, id-00000b1d, original direction"
ike 0:student1_0:15: dec 78F1E6E0206A3D27F0FF843C0B36329608100501C9E0FD6A000000640B000024CFCAFBCE8B873967999CC4F9ADE2AF7A7B1B41A492056E10DC72F60FEAC4F15F000000200000000101108D2878F1E6E0206A3D27F0FF843C0B363296000007BFA2CA9603
ike 0:student1_0:15: notify msg received: R-U-THERE
ike 0:student1_0:15: enc 78F1E6E0206A3D27F0FF843C0B363296081005018A85BE72000000600B0000247145FC1608A5C4D55EB0B3147BFCECA93246A740B90EB3B6AFE3F081A3C899DC000000200000000101108D2978F1E6E0206A3D27F0FF843C0B363296000007BF
ike 0:student1_0:15: out 78F1E6E0206A3D27F0FF843C0B363296081005018A85BE7200000064B3520D7AFBEF29715B2F2EAE76784F5E365FBDAE32E33C860087194547E4146AF401777B0FA728FB7BFC91D4BAE5F16AEF17BE53ED888C134D746C2A8A3590D7340B3FD3357B1802
id=20085 trace_id=33 func=print_pkt_detail line=5460 msg="vd-root:0 received a packet(proto=17, 192.168.77.2:500->192.168.77.7:500) from local. "
ike 0:student1_0:15: sent IKE msg (R-U-THERE-ACK): 192.168.77.2:500->192.168.77.7:500, len=100, id=78f1e6e0206a3d27/f0ff843c0b363296:8a85be72
id=20085 trace_id=33 func=resolve_ip_tuple_fast line=5540 msg="Find an existing session, id-00000b1d, reply direction"
iagnose debug id=20085 trace_id=34 func=print_pkt_detail line=5460 msg="vd-root:0 received a packet(proto=17, 192.168.77.7:500->192.168.77.2:500) from port2. "
ike 0: comes 192.168.77.7:500->192.168.77.2:500,ifindex=4....
ike 0: IKEv1 exchange=Informational id=78f1e6e0206a3d27/f0ff843c0b363296:dddcee3f len=100
ike 0: in 78F1E6E0206A3D27F0FF843C0B36329608100501DDDCEE3F000000649B2B7BAFCAC74D5F9EDEBAAC30AE8BF19DDAB34A1BF858E4EA157FCE58DA88159CB2ED108A14A86146284DBE2CBAFB6B866AD902972C20AA01E6265CD634D81CA0D1626799597B92
id=20085 trace_id=34 func=resolve_ip_tuple_fast line=5540 msg="Find an existing session, id-00000b1d, original direction"
ike 0:student1_0:15: dec 78F1E6E0206A3D27F0FF843C0B36329608100501DDDCEE3F000000640B000024C37F26660C7F6895E42C0CC1C77AB79685D8729497711DD7D4DAAF1A5265EFBB000000200000000101108D2878F1E6E0206A3D27F0FF843C0B363296000007C0908AAB03
ike 0:student1_0:15: notify msg received: R-U-THERE
ike 0:student1_0:15: enc 78F1E6E0206A3D27F0FF843C0B3632960810050138B6B446000000600B000024C92774402D0D9A4C5D3DAF30AED71A9D60579BAE1A0405D35DA759C7A9E9DB69000000200000000101108D2978F1E6E0206A3D27F0FF843C0B363296000007C0
ike 0:student1_0:15: out 78F1E6E0206A3D27F0FF843C0B3632960810050138B6B44600000064C7F35183932B4D4F23231B1790B151D732165CB34DCD14BADC1F7A44A7C6917C817F55FE24662DFA92AE4047CB154B00838AE3D1F385F26CC5FAB38936BAA56DD763ED88CC285499
id=20085 trace_id=35 func=print_pkt_detail line=5460 msg="vd-root:0 received a packet(proto=17, 192.168.77.2:500->192.168.77.7:500) from local. "
ike 0:student1_0:15: sent IKE msg (R-U-THERE-ACK): 192.168.77.2:500->192.168.77.7:500, len=100, id=78f1e6e0206a3d27/f0ff843c0b363296:38b6b446
id=20085 trace_id=35 func=resolve_ip_tuple_fast line=5540 msg="Find an existing session, id-00000b1d, reply direction"
Download