Apr 16, 03:04:04: initiated rekey Apr 16, 03:04:04: IPSEC_keyInitiate srcaddr c0a864d0 destaddr c0644077 Apr 16, 03:04:04: Start ike event acquire Apr 16, 03:04:04: call send event (453806.0)(pid:1226) time:2026-04-16 03:04:04 Acquire 0.0.0.0~255.255.255.255 < 192.168.100.208 192.100.64.119 << 174.167.86.131 Apr 16, 03:04:04: Initialize IKE SA calling XchangeOut from EventInfo2 Quick Initiator 1 --> Apr 16, 03:04:04: OutSa(v1-dwPeerAddr:c0644077): Entered Apr 16, 03:04:04: OutTfm2(v1-peerAddr:c0644077):oTfmId:0 wAuthAlgo:0 wKeyLen:0 ESP-AES 256-BITS HMAC-SHA1 ESP-AES 256-BITS HMAC-SHA2-256 ESP-AES 256-BITS HMAC-SHA2-384 ESP-AES 256-BITS HMAC-MD5 ESP-AES 256-BITS AES-XCBC-MAC ESP-3DES 0-BITS HMAC-SHA1 ESP-3DES 0-BITS HMAC-SHA2-256 ESP-3DES 0-BITS HMAC-SHA2-384 ESP-3DES 0-BITS HMAC-MD5 ESP-3DES 0-BITS AES-XCBC-MAC Proposal #1: ESP[10] spi=bc949e00 IDci: 192.168.100.208 IDcr: 0.0.0.0/0.0.0.0 HASH(1) cd e6 d6 cd 5f 40 d4 bd f0 82 c0 59 99 5f f4 6c e5 e4 75 27 cookies={29eceabdd74089c9 f4ffe275f573b01b} np=HASH exchange=Quick* msgid=029975a9 len=384 #SEND 400 bytes to 192.100.64.119[4500] (453806.0)(pid:1226) time:2026-04-16 03:04:04 Apr 16, 03:04:04: call send event returned 0 #RECV 160 bytes from 192.100.64.119[4500] (453806.0)(pid:1226) time:2026-04-16 03:04:04 cookies={29eceabdd74089c9 f4ffe275f573b01b} np=HASH exchange=Quick* msgid=029975a9 len=156 Quick Initiator 2 <-- HASH(2) b6 18 26 4b 96 e2 2c 3c 50 8a 46 4b 94 a9 53 1d 19 05 a8 0a Proposal #1: ESP[1] spi=e94ecb00 Transform #1: ESP-AES 256-BITS 7200-SECONDS UDP-TUNNEL HMAC-SHA1 Quick Initiator 2 --> HASH(3) 90 a3 f9 90 96 82 96 c5 5b be 9e 38 b0 ec de 43 6f 6a 45 6d Apr 16, 03:04:04: current SA state is 12 #SEND 64 bytes to 192.100.64.119[4500] (453806.0)(pid:1226) time:2026-04-16 03:04:04 IKE_addIPsecKey(isakmp=283bb1c3) Apr 16, 03:04:04: Add new key to the driver for ipsec Apr 16, 03:04:04: arubaIPSecSetKeys(): src:174.167. 86.131:49153 dst:192.100. 64.119:4500 IPSEC-lifetime 7200 Rekey-interval 5400 ESP spi=e94ecb00 192.100.64.119 << 174.167.86.131 udp-enc spd=1[0] exp=7200 secs auth=sha1 encr=aes Apr 16, 03:04:04: Add new key to the driver for ipsec Apr 16, 03:04:04: arubaIPSecSetKeys(): src:174.167. 86.131:49153 dst:192.100. 64.119:4500 IPSEC-lifetime 7200 Rekey-interval 5400 ESP spi=bc949e00 174.167.86.131 << 192.100.64.119 udp-enc spd=1[0] exp=7200 secs auth=sha1 encr=aes Apr 16, 03:04:04: IKE_SAMPLE_ikeStatHdlr(CHILD_SA): dwPeerAddr:c0644077 index:0 mPeerType:0 Apr 16, 03:04:04: CHILD_SA [v1 I] created. Apr 16, 03:04:04: ipsectokernel() done (453806.0)(pid:1226) time:2026-04-16 03:04:04 (453806.0)(pid:1226) time:2026-04-16 03:04:04 Apr 16, 03:04:09: The current state is 13 calling XchangeOut from UpdateSadp2 Apr 16, 03:04:14: The current state is 11 calling XchangeOut from UpdateSadp2 Apr 16, 03:04:19: The current state is 10 calling XchangeOut from UpdateSadp2 Apr 16, 03:04:24: The current state is 9 calling XchangeOut from UpdateSadp2 Apr 16, 04:34:07: IKE_updateSadb(peerAddr:c0644077): IPSEC SA Created:453806000 timedlt:5402000 rekey:5400000 - START IPSEC REKEY Apr 16, 04:34:07: initiated rekey Apr 16, 04:34:07: IPSEC_keyInitiate srcaddr c0a864d0 destaddr c0644077 Apr 16, 04:34:07: Start ike event acquire Apr 16, 04:34:07: call send event (459208.0)(pid:1226) time:2026-04-16 04:34:07 Acquire 0.0.0.0~255.255.255.255 < 192.168.100.208 192.100.64.119 << 174.167.86.131 Apr 16, 04:34:07: Initialize IKE SA calling XchangeOut from EventInfo2 Quick Initiator 1 --> Apr 16, 04:34:07: OutSa(v1-dwPeerAddr:c0644077): Entered Apr 16, 04:34:07: OutTfm2(v1-peerAddr:c0644077):oTfmId:0 wAuthAlgo:0 wKeyLen:0 ESP-AES 256-BITS HMAC-SHA1 ESP-AES 256-BITS HMAC-SHA2-256 ESP-AES 256-BITS HMAC-SHA2-384 ESP-AES 256-BITS HMAC-MD5 ESP-AES 256-BITS AES-XCBC-MAC ESP-3DES 0-BITS HMAC-SHA1 ESP-3DES 0-BITS HMAC-SHA2-256 ESP-3DES 0-BITS HMAC-SHA2-384 ESP-3DES 0-BITS HMAC-MD5 ESP-3DES 0-BITS AES-XCBC-MAC Proposal #1: ESP[10] spi=fe63ac00 IDci: 192.168.100.208 IDcr: 0.0.0.0/0.0.0.0 HASH(1) 7d 05 5a be c7 fb b9 aa 65 6b 37 4e f9 cb c3 6c 95 5f ba 76 cookies={29eceabdd74089c9 f4ffe275f573b01b} np=HASH exchange=Quick* msgid=faaeaa24 len=384 #SEND 400 bytes to 192.100.64.119[4500] (459208.0)(pid:1226) time:2026-04-16 04:34:07 Apr 16, 04:34:07: call send event returned 0 #RECV 160 bytes from 192.100.64.119[4500] (459208.0)(pid:1226) time:2026-04-16 04:34:07 cookies={29eceabdd74089c9 f4ffe275f573b01b} np=HASH exchange=Quick* msgid=faaeaa24 len=156 Quick Initiator 2 <-- HASH(2) f8 32 db e1 11 63 fd 24 be 72 d4 8c 05 00 c7 ee a5 35 02 6d Proposal #1: ESP[1] spi=3653d100 Transform #1: ESP-AES 256-BITS 7200-SECONDS UDP-TUNNEL HMAC-SHA1 Quick Initiator 2 --> HASH(3) 7c 59 14 8c c9 d9 8a 81 8e 8b 21 f7 fe f6 76 b8 a1 ff dc 44 Apr 16, 04:34:07: current SA state is 12 #SEND 64 bytes to 192.100.64.119[4500] (459208.0)(pid:1226) time:2026-04-16 04:34:07 IKE_addIPsecKey(isakmp=283bb1c3) Apr 16, 04:34:07: Add new key to the driver for ipsec Apr 16, 04:34:07: arubaIPSecSetKeys(): src:174.167. 86.131:49153 dst:192.100. 64.119:4500 IPSEC-lifetime 7200 Rekey-interval 5400 ESP spi=3653d100 192.100.64.119 << 174.167.86.131 udp-enc spd=1[0] exp=7200 secs auth=sha1 encr=aes Apr 16, 04:34:07: Add new key to the driver for ipsec Apr 16, 04:34:07: arubaIPSecSetKeys(): src:174.167. 86.131:49153 dst:192.100. 64.119:4500 IPSEC-lifetime 7200 Rekey-interval 5400 ESP spi=fe63ac00 174.167.86.131 << 192.100.64.119 udp-enc spd=1[0] exp=7200 secs auth=sha1 encr=aes Apr 16, 04:34:07: IKE_SAMPLE_ikeStatHdlr(CHILD_SA): dwPeerAddr:c0644077 index:0 mPeerType:0 Apr 16, 04:34:07: CHILD_SA [v1 I] created. Apr 16, 04:34:07: ipsectokernel() done (459208.0)(pid:1226) time:2026-04-16 04:34:07 (459208.0)(pid:1226) time:2026-04-16 04:34:07 Apr 16, 04:34:12: The current state is 13 calling XchangeOut from UpdateSadp2 Apr 16, 04:34:17: The current state is 11 calling XchangeOut from UpdateSadp2 Apr 16, 04:34:22: The current state is 10 calling XchangeOut from UpdateSadp2 Apr 16, 04:34:27: The current state is 9 calling XchangeOut from UpdateSadp2 Timer ID: 1 Initialized Apr 16, 05:22:13: IKE_newSa(peerAddr:0xc0644077): IKE_SA-lifetime:28000 calling XchangeOut from UpdateSadb4 Main Initiator 1 --> Apr 16, 05:22:13: OutSa(v1-dwPeerAddr:c0644077): Entered Apr 16, 05:22:13: Calling OutTfm(v1-peerAddr:c0644077) AUTH: PRESHARED-KEY-XAUTH-INIT GROUP: MODP1024 HASH: SHA1 ENCR: AES 256-BITS AUTH: PRESHARED-KEY-XAUTH-INIT GROUP: MODP1024 HASH: MD5 ENCR: AES 256-BITS AUTH: PRESHARED-KEY-XAUTH-INIT GROUP: MODP1024 HASH: SHA2-256 ENCR: AES 256-BITS AUTH: PRESHARED-KEY-XAUTH-INIT GROUP: MODP768 HASH: SHA1 ENCR: AES 256-BITS AUTH: PRESHARED-KEY-XAUTH-INIT GROUP: MODP768 HASH: MD5 ENCR: AES 256-BITS AUTH: PRESHARED-KEY-XAUTH-INIT GROUP: MODP768 HASH: SHA2-256 ENCR: AES 256-BITS AUTH: PRESHARED-KEY-XAUTH-INIT GROUP: MODP2048 HASH: SHA1 ENCR: AES 256-BITS AUTH: PRESHARED-KEY-XAUTH-INIT GROUP: MODP2048 HASH: MD5 ENCR: AES 256-BITS AUTH: PRESHARED-KEY-XAUTH-INIT GROUP: MODP2048 HASH: SHA2-256 ENCR: AES 256-BITS Apr 16, 05:22:13: RAPPER_ERROR_FILE doesn't exist Apr 16, 05:22:13: RAPPER_ERROR_FILE doesn't exist Apr 16, 05:22:13: RAPPER_ERROR_FILE doesn't exist Apr 16, 05:22:13: RAPPER_ERROR_FILE doesn't exist cookies={5f25f2cf4190427a 0000000000000000} np=SA exchange=Main len=618 #SEND 622 bytes to 192.100.64.119[4500] (462094.0)(pid:1226) time:2026-04-16 05:22:13 #RECV 248 bytes from 192.100.64.119[4500] (462094.0)(pid:1226) time:2026-04-16 05:22:13 cookies={5f25f2cf4190427a 019a79dc265f5d5a} np=SA exchange=Main len=244 Main Initiator 2 <-- Proposal #1: IKE[1] Transform #1: KEY-IKE PRESHARED-KEY-XAUTH-INIT MODP1024 SHA1 AES 28000-SECONDS 256-BITS Apr 16, 05:22:13: Setting to XAUTH recvdauth: VID: draft-ietf-ipsec-nat-t-ike-00 VID: draft-ietf-ipsec-nat-t-ike-02\n VID: Dead Peer Detection 1.0 VID: XAUTH VID: 12 f5 f2 8c 45 71 68 a9 70 2d 9f e2 74 cc 01 00 VID: 3c 8e 70 bd f9 c7 d7 4a dd 53 e4 10 09 15 dc 2e 4b b5 12 74 VID: 82 bb 8b 16 d2 1c 45 3a da 66 25 3e 0e a6 4b ca a0 79 fc 91 VID: IKE Fragmentation Support Apr 16, 05:22:13: IKE_frag support from peer Main Initiator 2 --> NAT-D (peer): 82 aa 6a b8 36 93 2a 16 c7 75 63 a0 10 3b 56 0d 54 4a ac b0 NAT-D (us): af 5b 61 b6 6f db e1 f7 7f 4a 0d 0f 15 83 fe 92 0d be 9e 56 #SEND 232 bytes to 192.100.64.119[4500] (462094.0)(pid:1226) time:2026-04-16 05:22:13 #RECV 232 bytes from 192.100.64.119[4500] (462094.0)(pid:1226) time:2026-04-16 05:22:13 cookies={5f25f2cf4190427a 019a79dc265f5d5a} np=KE exchange=Main len=228 Apr 16, 05:22:13: IKE_fragCheckFragment: next payload is 4 Main Initiator 3 <-- NAT-D (us): af 5b 61 b6 6f db e1 f7 7f 4a 0d 0f 15 83 fe 92 0d be 9e 56 NAT-D (us/NAT): 55 0e 09 12 90 11 05 8b 43 8a 1f e8 a5 7e 5c 89 5c 82 d5 fb Initialization vector: 6c 7a da 5a c9 ab db 3e d0 12 e3 1e d5 22 3a 0a Main Initiator 3 --> Apr 16, 05:22:13: OutId: wBodyLen = 17 poIdData = 00:0B:86:E0:72:90, idtype 11 HASH_I 62 b8 13 d6 4c 06 5f 59 94 72 8a 46 56 c5 38 19 28 3b 3d 33 Initialization vector: 93 f0 ed a9 25 99 e9 cc ff e7 80 50 1c 27 b6 f5 #SEND 96 bytes to 192.100.64.119[4500] (462095.0)(pid:1226) time:2026-04-16 05:22:13 #RECV 80 bytes from 192.100.64.119[4500] (462095.0)(pid:1226) time:2026-04-16 05:22:13 cookies={5f25f2cf4190427a 019a79dc265f5d5a} np=ID exchange=Main* len=76 Apr 16, 05:22:13: IKE_fragCheckFragment: next payload is 5 Main Initiator 4 <-- cookies={5f25f2cf4190427a 019a79dc265f5d5a} np=ID exchange=Main* len=76 print length info 12Bodylen 4 HASH_R 07 45 9b 62 ee 05 73 de 2a 0a 5a 21 a1 1b 3e 99 33 42 6f 13 Initialization vector: 30 ad 77 bd dd b2 ce 5b 35 5c 5a 89 8d 41 c9 2f Apr 16, 05:22:13: IKE_SAMPLE_ikeStatHdlr(SA): dwPeerAddr:c0644077 index:0 mPeerType:0 Apr 16, 05:22:13: IKE_SA [v1 I] (id=0x283bb1c4) (flags:0x300d) (state:5) mode:Tunnel created. (462095.0)(pid:1226) time:2026-04-16 05:22:13 (462095.0)(pid:1226) time:2026-04-16 05:22:13 Timer ID: 1 Deleted calling XchangeOut from DelSa N/D --> Deleted: 1 ISAKMP SA IKE_delSa(peer=192.100.64.119 cookies={29eceabdd74089c9 f4ffe275f573b01b}) HASH(1) fb e3 8d 49 a9 e9 3f 35 a3 11 63 a6 57 81 68 92 fe a2 83 75 #SEND 96 bytes to 192.100.64.119[4500] (462095.0)(pid:1226) time:2026-04-16 05:22:13 Apr 16, 05:22:13: IKE_SAMPLE_ikeStatHdlr(SA): dwPeerAddr:c0644077 index:0 mPeerType:0 Apr 16, 05:22:13: IKE_SA (id=0x283bb1c3) deleted Apr 16, 05:22:13: IKE SA deleted reason = STATUS_IKE_REKEY, errorcode = -8981 Apr 16, 06:04:09: IKE_updateSadb(peerAddr:c0644077): IPSEC SA Created:459208000 timedlt:5402000 rekey:5400000 - START IPSEC REKEY Apr 16, 06:04:09: initiated rekey Apr 16, 06:04:09: IPSEC_keyInitiate srcaddr c0a864d0 destaddr c0644077 Apr 16, 06:04:09: Start ike event acquire Apr 16, 06:04:09: call send event (464610.0)(pid:1226) time:2026-04-16 06:04:09 Acquire 0.0.0.0~255.255.255.255 < 192.168.100.208 192.100.64.119 << 174.167.86.131 Apr 16, 06:04:09: Initialize IKE SA calling XchangeOut from EventInfo2 Quick Initiator 1 --> Apr 16, 06:04:09: OutSa(v1-dwPeerAddr:c0644077): Entered Apr 16, 06:04:09: OutTfm2(v1-peerAddr:c0644077):oTfmId:0 wAuthAlgo:0 wKeyLen:0 ESP-AES 256-BITS HMAC-SHA1 ESP-AES 256-BITS HMAC-SHA2-256 ESP-AES 256-BITS HMAC-SHA2-384 ESP-AES 256-BITS HMAC-MD5 ESP-AES 256-BITS AES-XCBC-MAC ESP-3DES 0-BITS HMAC-SHA1 ESP-3DES 0-BITS HMAC-SHA2-256 ESP-3DES 0-BITS HMAC-SHA2-384 ESP-3DES 0-BITS HMAC-MD5 ESP-3DES 0-BITS AES-XCBC-MAC Proposal #1: ESP[10] spi=7238b200 IDci: 192.168.100.208 IDcr: 0.0.0.0/0.0.0.0 HASH(1) 06 80 f2 9f 1a 93 e0 1e 9d 9b df 6e 16 35 c6 8c 75 25 ca 55 cookies={5f25f2cf4190427a 019a79dc265f5d5a} np=HASH exchange=Quick* msgid=a5663ccb len=384 #SEND 400 bytes to 192.100.64.119[4500] (464610.0)(pid:1226) time:2026-04-16 06:04:09 Apr 16, 06:04:09: call send event returned 0 #RECV 160 bytes from 192.100.64.119[4500] (464610.0)(pid:1226) time:2026-04-16 06:04:09 cookies={5f25f2cf4190427a 019a79dc265f5d5a} np=HASH exchange=Quick* msgid=a5663ccb len=156 Quick Initiator 2 <-- HASH(2) f7 2a 10 6d 80 72 58 91 40 be 2c 16 64 92 00 32 58 c5 50 d6 Proposal #1: ESP[1] spi=9a5ed000 Transform #1: ESP-AES 256-BITS 7200-SECONDS UDP-TUNNEL HMAC-SHA1 Quick Initiator 2 --> HASH(3) 74 85 46 3b 48 70 e6 6c cb b9 53 77 23 ec 30 38 65 c1 ad 01 Apr 16, 06:04:09: current SA state is 12 #SEND 64 bytes to 192.100.64.119[4500] (464610.0)(pid:1226) time:2026-04-16 06:04:09 IKE_addIPsecKey(isakmp=283bb1c4) Apr 16, 06:04:09: Add new key to the driver for ipsec Apr 16, 06:04:09: arubaIPSecSetKeys(): src:174.167. 86.131:49153 dst:192.100. 64.119:4500 IPSEC-lifetime 7200 Rekey-interval 5400 ESP spi=9a5ed000 192.100.64.119 << 174.167.86.131 udp-enc spd=1[0] exp=7200 secs auth=sha1 encr=aes Apr 16, 06:04:09: Add new key to the driver for ipsec Apr 16, 06:04:09: arubaIPSecSetKeys(): src:174.167. 86.131:49153 dst:192.100. 64.119:4500 IPSEC-lifetime 7200 Rekey-interval 5400 ESP spi=7238b200 174.167.86.131 << 192.100.64.119 udp-enc spd=1[0] exp=7200 secs auth=sha1 encr=aes Apr 16, 06:04:09: IKE_SAMPLE_ikeStatHdlr(CHILD_SA): dwPeerAddr:c0644077 index:0 mPeerType:0 Apr 16, 06:04:09: CHILD_SA [v1 I] created. Apr 16, 06:04:09: ipsectokernel() done (464610.0)(pid:1226) time:2026-04-16 06:04:09 (464610.0)(pid:1226) time:2026-04-16 06:04:09 Apr 16, 06:04:14: The current state is 13 calling XchangeOut from UpdateSadp2 Apr 16, 06:04:19: The current state is 11 calling XchangeOut from UpdateSadp2 Apr 16, 06:04:24: The current state is 10 calling XchangeOut from UpdateSadp2 Apr 16, 06:04:29: The current state is 9 calling XchangeOut from UpdateSadp2 Apr 16, 07:34:12: IKE_updateSadb(peerAddr:c0644077): IPSEC SA Created:464610000 timedlt:5403000 rekey:5400000 - START IPSEC REKEY Apr 16, 07:34:12: initiated rekey Apr 16, 07:34:12: IPSEC_keyInitiate srcaddr c0a864d0 destaddr c0644077 Apr 16, 07:34:12: Start ike event acquire Apr 16, 07:34:12: call send event (470013.0)(pid:1226) time:2026-04-16 07:34:12 Acquire 0.0.0.0~255.255.255.255 < 192.168.100.208 192.100.64.119 << 174.167.86.131 Apr 16, 07:34:12: Initialize IKE SA calling XchangeOut from EventInfo2 Quick Initiator 1 --> Apr 16, 07:34:12: OutSa(v1-dwPeerAddr:c0644077): Entered Apr 16, 07:34:12: OutTfm2(v1-peerAddr:c0644077):oTfmId:0 wAuthAlgo:0 wKeyLen:0 ESP-AES 256-BITS HMAC-SHA1 ESP-AES 256-BITS HMAC-SHA2-256 ESP-AES 256-BITS HMAC-SHA2-384 ESP-AES 256-BITS HMAC-MD5 ESP-AES 256-BITS AES-XCBC-MAC ESP-3DES 0-BITS HMAC-SHA1 ESP-3DES 0-BITS HMAC-SHA2-256 ESP-3DES 0-BITS HMAC-SHA2-384 ESP-3DES 0-BITS HMAC-MD5 ESP-3DES 0-BITS AES-XCBC-MAC Proposal #1: ESP[10] spi=717ffe00 IDci: 192.168.100.208 IDcr: 0.0.0.0/0.0.0.0 HASH(1) 71 1b ed ca aa 83 de ca 21 f8 4d 24 19 7c 11 01 b2 57 62 8a cookies={5f25f2cf4190427a 019a79dc265f5d5a} np=HASH exchange=Quick* msgid=66e0abb1 len=384 #SEND 400 bytes to 192.100.64.119[4500] (470013.0)(pid:1226) time:2026-04-16 07:34:12 Apr 16, 07:34:12: call send event returned 0 #RECV 160 bytes from 192.100.64.119[4500] (470013.0)(pid:1226) time:2026-04-16 07:34:12 cookies={5f25f2cf4190427a 019a79dc265f5d5a} np=HASH exchange=Quick* msgid=66e0abb1 len=156 Quick Initiator 2 <-- HASH(2) a8 50 e7 f7 16 e1 5c 4c 8e 0a 45 e3 60 43 fc df 37 24 fb d1 Proposal #1: ESP[1] spi=31763900 Transform #1: ESP-AES 256-BITS 7200-SECONDS UDP-TUNNEL HMAC-SHA1 Quick Initiator 2 --> HASH(3) 0d e9 3b 2b 75 0e 2b 78 37 b8 ec af 34 1d 38 58 c1 3b 09 50 Apr 16, 07:34:12: current SA state is 12 #SEND 64 bytes to 192.100.64.119[4500] (470013.0)(pid:1226) time:2026-04-16 07:34:12 IKE_addIPsecKey(isakmp=283bb1c4) Apr 16, 07:34:12: Add new key to the driver for ipsec Apr 16, 07:34:12: arubaIPSecSetKeys(): src:174.167. 86.131:49153 dst:192.100. 64.119:4500 IPSEC-lifetime 7200 Rekey-interval 5400 ESP spi=31763900 192.100.64.119 << 174.167.86.131 udp-enc spd=1[0] exp=7200 secs auth=sha1 encr=aes Apr 16, 07:34:12: Add new key to the driver for ipsec Apr 16, 07:34:12: arubaIPSecSetKeys(): src:174.167. 86.131:49153 dst:192.100. 64.119:4500 IPSEC-lifetime 7200 Rekey-interval 5400 ESP spi=717ffe00 174.167.86.131 << 192.100.64.119 udp-enc spd=1[0] exp=7200 secs auth=sha1 encr=aes Apr 16, 07:34:12: IKE_SAMPLE_ikeStatHdlr(CHILD_SA): dwPeerAddr:c0644077 index:0 mPeerType:0 Apr 16, 07:34:12: CHILD_SA [v1 I] created. Apr 16, 07:34:12: ipsectokernel() done (470013.0)(pid:1226) time:2026-04-16 07:34:12 (470013.0)(pid:1226) time:2026-04-16 07:34:12 Apr 16, 07:34:17: The current state is 13 calling XchangeOut from UpdateSadp2 Apr 16, 07:34:22: The current state is 11 calling XchangeOut from UpdateSadp2 Apr 16, 07:34:27: The current state is 10 calling XchangeOut from UpdateSadp2 Apr 16, 07:34:32: The current state is 9 calling XchangeOut from UpdateSadp2