tuanhoangth1603 commented on issue #8566:
URL: https://github.com/apache/cloudstack/issues/8566#issuecomment-1909336028

   There is the log I got from the VR
   ```
   Jan 25 04:22:22 r-443-VM charon[4019]: 15[NET] received packet: from 
102.119.162.40[23171] to 102.119.162.26[4500] (444 bytes)
   Jan 25 04:22:22 r-443-VM charon[4019]: 15[ENC] parsed QUICK_MODE request 3 [ 
HASH SA No ID ID NAT-OA NAT-OA ]
   Jan 25 04:22:22 r-443-VM charon[4019]: 15[CFG] selected proposal: 
ESP:AES_CBC_256/HMAC_SHA1_96/NO_EXT_SEQ
   Jan 25 04:22:22 r-443-VM charon[4019]: 15[IKE] received 3600s lifetime, 
configured 0s
   Jan 25 04:22:22 r-443-VM charon[4019]: 15[IKE] received 250000000 lifebytes, 
configured 0
   Jan 25 04:22:22 r-443-VM charon[4019]: 15[IKE] detected rekeying of CHILD_SA 
L2TP-PSK{647}
   Jan 25 04:22:22 r-443-VM charon[4019]: 15[ENC] generating QUICK_MODE 
response 3 [ HASH SA No ID ID NAT-OA NAT-OA ]
   Jan 25 04:22:22 r-443-VM charon[4019]: 15[NET] sending packet: from 
102.119.162.26[4500] to 102.119.162.40[23171] (204 bytes)
   Jan 25 04:22:22 r-443-VM charon[4019]: 12[NET] received packet: from 
102.119.162.40[23171] to 102.119.162.26[4500] (76 bytes)
   Jan 25 04:22:22 r-443-VM charon[4019]: 12[ENC] parsed INFORMATIONAL_V1 
request 3468119228 [ HASH D ]
   Jan 25 04:22:22 r-443-VM charon[4019]: 12[IKE] received DELETE for ESP 
CHILD_SA with SPI 5af7e8ae
   Jan 25 04:22:22 r-443-VM charon[4019]: 12[IKE] closing CHILD_SA 
L2TP-PSK{647} with SPIs c8f197ae_i (132 bytes) 5af7e8ae_o (100 bytes) and TS 
102.119.162.26/32[udp/l2f] === 102.119.162.40/32[udp/l2f]
   Jan 25 04:22:22 r-443-VM charon[4019]: 12[IKE] closing CHILD_SA 
L2TP-PSK{647} with SPIs c8f197ae_i (132 bytes) 5af7e8ae_o (100 bytes) and TS 
102.119.162.26/32[udp/l2f] === 102.119.162.40/32[udp/l2f]
   Jan 25 04:22:22 r-443-VM vpn[199474]: - 172.16.10.4 102.119.162.40 -- 
102.119.162.26
   Jan 25 04:22:22 r-443-VM charon[4019]: 14[NET] received packet: from 
102.119.162.40[23171] to 102.119.162.26[4500] (60 bytes)
   Jan 25 04:22:22 r-443-VM charon[4019]: 14[ENC] parsed QUICK_MODE request 3 [ 
HASH ]
   Jan 25 04:22:22 r-443-VM charon[4019]: 14[IKE] CHILD_SA L2TP-PSK{649} 
established with SPIs c1c4921c_i 979b6bb8_o and TS 102.119.162.26/32[udp/l2f] 
=== 102.119.162.40/32[udp/l2f]
   Jan 25 04:22:22 r-443-VM charon[4019]: 14[IKE] CHILD_SA L2TP-PSK{649} 
established with SPIs c1c4921c_i 979b6bb8_o and TS 102.119.162.26/32[udp/l2f] 
=== 102.119.162.40/32[udp/l2f]
   Jan 25 04:22:22 r-443-VM vpn[199481]: + 172.16.10.4 102.119.162.40 -- 
102.119.162.26
   Jan 25 04:22:31 r-443-VM CRON[199415]: pam_unix(cron:session): session 
closed for user root
   Jan 25 04:22:32 r-443-VM xl2tpd[4033]: Maximum retries exceeded for tunnel 
9071.  Closing.
   Jan 25 04:22:32 r-443-VM xl2tpd[4033]: Terminating pppd: sending TERM signal 
to pid 197893
   Jan 25 04:22:32 r-443-VM xl2tpd[4033]: Connection 5 closed to 
102.119.162.40, port 1701 (Timeout)
   Jan 25 04:22:32 r-443-VM pppd[197893]: Terminating on signal 15
   Jan 25 04:22:32 r-443-VM pppd[197893]: Connect time 7.5 minutes.
   Jan 25 04:22:32 r-443-VM pppd[197893]: Sent 0 bytes, received 2007 bytes.
   Jan 25 04:22:32 r-443-VM charon[4019]: 09[KNL] interface ppp1 deactivated
   Jan 25 04:22:32 r-443-VM charon[4019]: 07[KNL] 10.1.2.1 disappeared from ppp1
   Jan 25 04:22:32 r-443-VM pppd[197893]: Script /etc/ppp/ip-down started (pid 
199492)
   Jan 25 04:22:32 r-443-VM pppd[197893]: Overriding mtu 1500 to 1410
   Jan 25 04:22:32 r-443-VM pppd[197893]: PPPoL2TP options: lnsmode tid 9071 
sid 35337 debugmask 0
   Jan 25 04:22:32 r-443-VM pppd[197893]: Overriding mru 1500 to mtu value 1410
   Jan 25 04:22:32 r-443-VM pppd[197893]: sent [LCP TermReq id=0x4 "User 
request"]
   Jan 25 04:22:32 r-443-VM pppd[197893]: rcvd [LCP TermAck id=0x4 "User 
request"]
   Jan 25 04:22:32 r-443-VM pppd[197893]: Connection terminated.
   Jan 25 04:22:32 r-443-VM charon[4019]: 12[KNL] interface ppp1 deleted
   Jan 25 04:22:32 r-443-VM pppd[197893]: Waiting for 1 child processes...
   Jan 25 04:22:32 r-443-VM pppd[197893]:   script /etc/ppp/ip-down, pid 199492
   Jan 25 04:22:32 r-443-VM pppd[197893]: Script /etc/ppp/ip-down finished (pid 
199492), status = 0x0
   Jan 25 04:22:32 r-443-VM pppd[197893]: Exit.
   Jan 25 04:22:33 r-443-VM xl2tpd[4033]: get_call: can't find call 35337 in 
tunnel 9071
                                           (ref=0/0)
   Jan 25 04:22:33 r-443-VM xl2tpd[4033]: control_finish: Connection closed to 
102.119.162.40, port 1701 (), Local: 9071, Remote: 5
   Jan 25 04:22:33 r-443-VM charon[4019]: 13[NET] received packet: from 
102.119.162.40[23171] to 102.119.162.26[4500] (76 bytes)
   Jan 25 04:22:33 r-443-VM ipsec[4019]: 15[NET] sending packet: from 
102.119.162.26[4500] to 102.119.162.40[1242] (204 bytes)
   Jan 25 04:22:33 r-443-VM ipsec[4019]: 16[NET] received packet: from 
102.119.162.40[1242] to 102.119.162.26[4500] (60 bytes)
   Jan 25 04:22:33 r-443-VM ipsec[4019]: 16[ENC] parsed QUICK_MODE request 1 [ 
HASH ]
   Jan 25 04:22:33 r-443-VM ipsec[4019]: 16[IKE] CHILD_SA L2TP-PSK{646} 
established with SPIs c1d4c52d_i b80e7c46_o and TS 102.119.162.26/32[udp/l2f] 
=== 102.119.162.40/32[udp/l2f]
   Jan 25 04:22:33 r-443-VM ipsec[4019]: 11[NET] received packet: from 
102.119.162.40[23171] to 102.119.162.26[4500] (444 bytes)
   Jan 25 04:22:33 r-443-VM ipsec[4019]: 11[ENC] parsed QUICK_MODE request 2 [ 
HASH SA No ID ID NAT-OA NAT-OA ]
   Jan 25 04:22:33 r-443-VM ipsec[4019]: 11[CFG] selected proposal: 
ESP:AES_CBC_256/HMAC_SHA1_96/NO_EXT_SEQ
   Jan 25 04:22:33 r-443-VM ipsec[4019]: 11[IKE] received 3600s lifetime, 
configured 0s
   Jan 25 04:22:33 r-443-VM ipsec[4019]: 11[IKE] received 250000000 lifebytes, 
configured 0
   Jan 25 04:22:33 r-443-VM ipsec[4019]: 11[IKE] detected rekeying of CHILD_SA 
L2TP-PSK{645}
   Jan 25 04:22:33 r-443-VM ipsec[4019]: 11[ENC] generating QUICK_MODE response 
2 [ HASH SA No ID ID NAT-OA NAT-OA ]
   Jan 25 04:22:33 r-443-VM ipsec[4019]: 11[NET] sending packet: from 
102.119.162.26[4500] to 102.119.162.40[23171] (204 bytes)
   Jan 25 04:22:33 r-443-VM ipsec[4019]: 09[NET] received packet: from 
102.119.162.40[23171] to 102.119.162.26[4500] (76 bytes)
   Jan 25 04:22:33 r-443-VM ipsec[4019]: 09[ENC] parsed INFORMATIONAL_V1 
request 2287742730 [ HASH D ]
   Jan 25 04:22:33 r-443-VM ipsec[4019]: 09[IKE] received DELETE for ESP 
CHILD_SA with SPI 45472b16
   Jan 25 04:22:33 r-443-VM ipsec[4019]: 09[IKE] closing CHILD_SA L2TP-PSK{645} 
with SPIs cac9101c_i (3643 bytes) 45472b16_o (1203 bytes) and TS 
102.119.162.26/32[udp/l2f] === 102.119.162.40/32[udp/l2f]
   Jan 25 04:22:33 r-443-VM ipsec[4019]: 10[NET] received packet: from 
102.119.162.40[23171] to 102.119.162.26[4500] (60 bytes)
   Jan 25 04:22:33 r-443-VM ipsec[4019]: 10[ENC] parsed QUICK_MODE request 2 [ 
HASH ]
   Jan 25 04:22:33 r-443-VM ipsec[4019]: 10[IKE] CHILD_SA L2TP-PSK{647} 
established with SPIs c8f197ae_i 5af7e8ae_o and TS 102.119.162.26/32[udp/l2f] 
=== 102.119.162.40/32[udp/l2f]
   Jan 25 04:22:33 r-443-VM ipsec[4019]: 11[NET] received packet: from 
102.119.162.40[1242] to 102.119.162.26[4500] (444 bytes)
   Jan 25 04:22:33 r-443-VM ipsec[4019]: 11[ENC] parsed QUICK_MODE request 2 [ 
HASH SA No ID ID NAT-OA NAT-OA ]
   Jan 25 04:22:33 r-443-VM ipsec[4019]: 11[CFG] selected proposal: 
ESP:AES_CBC_256/HMAC_SHA1_96/NO_EXT_SEQ
   Jan 25 04:22:33 r-443-VM ipsec[4019]: 11[IKE] received 3600s lifetime, 
configured 0s
   Jan 25 04:22:33 r-443-VM ipsec[4019]: 11[IKE] received 250000000 lifebytes, 
configured 0
   Jan 25 04:22:33 r-443-VM ipsec[4019]: 11[IKE] detected rekeying of CHILD_SA 
L2TP-PSK{646}
   Jan 25 04:22:33 r-443-VM ipsec[4019]: 11[ENC] generating QUICK_MODE response 
2 [ HASH SA No ID ID NAT-OA NAT-OA ]
   Jan 25 04:22:33 r-443-VM ipsec[4019]: 11[NET] sending packet: from 
102.119.162.26[4500] to 102.119.162.40[1242] (204 bytes)
   Jan 25 04:22:33 r-443-VM ipsec[4019]: 07[NET] received packet: from 
102.119.162.40[1242] to 102.119.162.26[4500] (60 bytes)
   Jan 25 04:22:33 r-443-VM ipsec[4019]: 07[ENC] parsed QUICK_MODE request 2 [ 
HASH ]
   Jan 25 04:22:33 r-443-VM ipsec[4019]: 07[IKE] CHILD_SA L2TP-PSK{648} 
established with SPIs cbe14f75_i 2ea41a5a_o and TS 102.119.162.26/32[udp/l2f] 
=== 102.119.162.40/32[udp/l2f]
   Jan 25 04:22:33 r-443-VM ipsec[4019]: 09[NET] received packet: from 
102.119.162.40[1242] to 102.119.162.26[4500] (76 bytes)
   Jan 25 04:22:33 r-443-VM ipsec[4019]: 09[ENC] parsed INFORMATIONAL_V1 
request 535906467 [ HASH D ]
   Jan 25 04:22:33 r-443-VM ipsec[4019]: 09[IKE] received DELETE for ESP 
CHILD_SA with SPI b80e7c46
   Jan 25 04:22:33 r-443-VM ipsec[4019]: 09[IKE] closing CHILD_SA L2TP-PSK{646} 
with SPIs c1d4c52d_i (288 bytes) b80e7c46_o (94 bytes) and TS 
102.119.162.26/32[udp/l2f] === 102.119.162.40/32[udp/l2f]
   Jan 25 04:22:33 r-443-VM ipsec[4019]: 15[NET] received packet: from 
102.119.162.40[23171] to 102.119.162.26[4500] (444 bytes)
   Jan 25 04:22:33 r-443-VM ipsec[4019]: 15[ENC] parsed QUICK_MODE request 3 [ 
HASH SA No ID ID NAT-OA NAT-OA ]
   Jan 25 04:22:33 r-443-VM ipsec[4019]: 15[CFG] selected proposal: 
ESP:AES_CBC_256/HMAC_SHA1_96/NO_EXT_SEQ
   Jan 25 04:22:33 r-443-VM ipsec[4019]: 15[IKE] received 3600s lifetime, 
configured 0s
   Jan 25 04:22:33 r-443-VM ipsec[4019]: 15[IKE] received 250000000 lifebytes, 
configured 0
   Jan 25 04:22:33 r-443-VM ipsec[4019]: 15[IKE] detected rekeying of CHILD_SA 
L2TP-PSK{647}
   Jan 25 04:22:33 r-443-VM ipsec[4019]: 15[ENC] generating QUICK_MODE response 
3 [ HASH SA No ID ID NAT-OA NAT-OA ]
   Jan 25 04:22:33 r-443-VM ipsec[4019]: 15[NET] sending packet: from 
102.119.162.26[4500] to 102.119.162.40[23171] (204 bytes)
   Jan 25 04:22:33 r-443-VM ipsec[4019]: 12[NET] received packet: from 
102.119.162.40[23171] to 102.119.162.26[4500] (76 bytes)
   Jan 25 04:22:33 r-443-VM ipsec[4019]: 12[ENC] parsed INFORMATIONAL_V1 
request 3468119228 [ HASH D ]
   Jan 25 04:22:33 r-443-VM ipsec[4019]: 12[IKE] received DELETE for ESP 
CHILD_SA with SPI 5af7e8ae
   Jan 25 04:22:33 r-443-VM ipsec[4019]: 12[IKE] closing CHILD_SA L2TP-PSK{647} 
with SPIs c8f197ae_i (132 bytes) 5af7e8ae_o (100 bytes) and TS 
102.119.162.26/32[udp/l2f] === 102.119.162.40/32[udp/l2f]
   Jan 25 04:22:33 r-443-VM ipsec[4019]: 14[NET] received packet: from 
102.119.162.40[23171] to 102.119.162.26[4500] (60 bytes)
   Jan 25 04:22:33 r-443-VM ipsec[4019]: 14[ENC] parsed QUICK_MODE request 3 [ 
HASH ]
   Jan 25 04:22:33 r-443-VM ipsec[4019]: 14[IKE] CHILD_SA L2TP-PSK{649} 
established with SPIs c1c4921c_i 979b6bb8_o and TS 102.119.162.26/32[udp/l2f] 
=== 102.119.162.40/32[udp/l2f]
   Jan 25 04:22:33 r-443-VM ipsec[4019]: 09[KNL] interface ppp1 deactivated
   Jan 25 04:22:33 r-443-VM ipsec[4019]: 07[KNL] 10.1.2.1 disappeared from ppp1
   Jan 25 04:22:33 r-443-VM ipsec[4019]: 12[KNL] interface ppp1 deleted
   Jan 25 04:22:33 r-443-VM ipsec[4019]: 13[NET] received packet: from 
102.119.162.40[23171] to 102.119.162.26[4500] (76 bytes)
   Jan 25 04:22:33 r-443-VM ipsec[4019]: 13[ENC] parsed INFORMATIONAL_V1 
request 1154710835 [ HASH D ]
   Jan 25 04:22:33 r-443-VM charon[4019]: 13[ENC] parsed INFORMATIONAL_V1 
request 1154710835 [ HASH D ]
   Jan 25 04:22:33 r-443-VM charon[4019]: 13[IKE] received DELETE for ESP 
CHILD_SA with SPI 979b6bb8
   Jan 25 04:22:33 r-443-VM charon[4019]: 13[IKE] closing CHILD_SA 
L2TP-PSK{649} with SPIs c1c4921c_i (128 bytes) 979b6bb8_o (180 bytes) and TS 
102.119.162.26/32[udp/l2f] === 102.119.162.40/32[udp/l2f]
   Jan 25 04:22:33 r-443-VM charon[4019]: 13[IKE] closing CHILD_SA 
L2TP-PSK{649} with SPIs c1c4921c_i (128 bytes) 979b6bb8_o (180 bytes) and TS 
102.119.162.26/32[udp/l2f] === 102.119.162.40/32[udp/l2f]
   Jan 25 04:22:33 r-443-VM vpn[199507]: - 172.16.10.4 102.119.162.40 -- 
102.119.162.26
   Jan 25 04:22:33 r-443-VM charon[4019]: 05[NET] received packet: from 
102.119.162.40[23171] to 102.119.162.26[4500] (92 bytes)
   Jan 25 04:22:33 r-443-VM charon[4019]: 05[ENC] parsed INFORMATIONAL_V1 
request 2884890289 [ HASH D ]
   Jan 25 04:22:33 r-443-VM charon[4019]: 05[IKE] received DELETE for IKE_SA 
L2TP-PSK[371]
   Jan 25 04:22:33 r-443-VM charon[4019]: 05[IKE] deleting IKE_SA L2TP-PSK[371] 
between 102.119.162.26[102.119.162.26]...102.119.162.40[172.16.10.4]
   Jan 25 04:22:33 r-443-VM charon[4019]: 05[IKE] deleting IKE_SA L2TP-PSK[371] 
between 102.119.162.26[102.119.162.26]...102.119.162.40[172.16.10.4]
   ```


-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: commits-unsubscr...@cloudstack.apache.org

For queries about this service, please contact Infrastructure at:
us...@infra.apache.org

Reply via email to