0% found this document useful (0 votes)
12 views

Log

Uploaded by

johnnitro
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
12 views

Log

Uploaded by

johnnitro
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
You are on page 1/ 104

[I] Jan 1 00:00:04 kernel: Linux version 4.9-ndm-5 (developers@keenetic.

com) (gcc
version 11.3.0 (crosstool-NG 1.24.0-rc2-ndm-27-0 - NDMS Toolkit 1.0.0) ) #0 SMP Tue
May 2 16:33:23 2023
[I] Jan 1 00:00:04 kernel: MediaTek SoC: MT7621A, RevID: 0103, RAM: DDR3, XTAL:
40MHz
[I] Jan 1 00:00:04 kernel: CPU/OCP/SYS frequency: 880/293/220 MHz
[I] Jan 1 00:00:04 kernel: SoC power status: power-on reset
[I] Jan 1 00:00:04 kernel: bootconsole [early0] enabled
[I] Jan 1 00:00:04 kernel: CPU0 revision is: 0001992f (MIPS 1004Kc)
[I] Jan 1 00:00:04 kernel: Determined physical RAM map:
[I] Jan 1 00:00:04 kernel: memory: 08000000 @ 00000000 (usable)
[I] Jan 1 00:00:04 kernel: VPE topology {2,2} total 4
[I] Jan 1 00:00:04 kernel: Primary instruction cache 32kB, VIPT, 4-way, linesize
32 bytes.
[I] Jan 1 00:00:04 kernel: Primary data cache 32kB, 4-way, PIPT, no aliases,
linesize 32 bytes
[I] Jan 1 00:00:04 kernel: MIPS secondary cache 256kB, 8-way, linesize 32 bytes.
[I] Jan 1 00:00:04 kernel: Zone ranges:
[I] Jan 1 00:00:04 kernel: DMA [mem 0x0000000000000000-0x0000000000ffffff]
[I] Jan 1 00:00:04 kernel: Normal [mem 0x0000000001000000-0x0000000007ffffff]
[I] Jan 1 00:00:04 kernel: Movable zone start for each node
[I] Jan 1 00:00:04 kernel: Early memory node ranges
[I] Jan 1 00:00:04 kernel: node 0: [mem 0x0000000000000000-0x0000000007ffffff]
[I] Jan 1 00:00:04 kernel: Initmem setup node 0 [mem 0x0000000000000000-
0x0000000007ffffff]
[I] Jan 1 00:00:04 kernel: On node 0 totalpages: 32768
[I] Jan 1 00:00:04 kernel: free_area_init_node: node 0, pgdat 814d9660,
node_mem_map 81528000
[I] Jan 1 00:00:04 kernel: DMA zone: 32 pages used for memmap
[I] Jan 1 00:00:04 kernel: DMA zone: 0 pages reserved
[I] Jan 1 00:00:04 kernel: DMA zone: 4096 pages, LIFO batch:0
[I] Jan 1 00:00:04 kernel: Normal zone: 224 pages used for memmap
[I] Jan 1 00:00:04 kernel: Normal zone: 28672 pages, LIFO batch:7
[I] Jan 1 00:00:04 kernel: percpu: Embedded 12 pages/cpu s18448 r8192 d22512
u49152
[I] Jan 1 00:00:04 kernel: pcpu-alloc: s18448 r8192 d22512 u49152 alloc=12*4096
[I] Jan 1 00:00:04 kernel: pcpu-alloc: [0] 0 [0] 1 [0] 2 [0] 3
[I] Jan 1 00:00:04 kernel: Built 1 zonelists in Zone order, mobility grouping on.
Total pages: 32512
[I] Jan 1 00:00:04 kernel: Kernel command line: console=ttyS0,57600n8
[I] Jan 1 00:00:04 kernel: log_buf_len individual max cpu contribution: 4096 bytes
[I] Jan 1 00:00:04 kernel: log_buf_len total cpu_extra contributions: 12288 bytes
[I] Jan 1 00:00:04 kernel: log_buf_len min size: 16384 bytes
[I] Jan 1 00:00:04 kernel: log_buf_len: 32768 bytes
[I] Jan 1 00:00:04 kernel: early log buf free: 14144(86%)
[I] Jan 1 00:00:04 kernel: PID hash table entries: 512 (order: -1, 2048 bytes)
[I] Jan 1 00:00:04 kernel: Dentry cache hash table entries: 16384 (order: 4, 65536
bytes)
[I] Jan 1 00:00:04 kernel: Inode-cache hash table entries: 8192 (order: 3, 32768
bytes)
[I] Jan 1 00:00:04 kernel: Writing ErrCtl register=00005008
[I] Jan 1 00:00:04 kernel: Readback ErrCtl register=00005008
[I] Jan 1 00:00:04 kernel: Memory: 124408K/131072K available (3940K kernel code,
323K rwdata, 692K rodata, 216K init, 91K bss, 6664K reserved, 0K cma-reserved)
[I] Jan 1 00:00:04 kernel: Hierarchical RCU implementation.
[I] Jan 1 00:00:04 kernel: Build-time adjustment of leaf fanout to 32.
[I] Jan 1 00:00:04 kernel: NR_IRQS:79
[I] Jan 1 00:00:04 kernel: MIPS GIC RevID: 3.0
[I] Jan 1 00:00:04 kernel: clocksource: MIPS: mask: 0xffffffff max_cycles:
0xffffffff, max_idle_ns: 4343773742 ns
[I] Jan 1 00:00:04 kernel: sched_clock: 32 bits at 440MHz, resolution 2ns, wraps
every 4880645118ns
[I] Jan 1 00:00:04 kernel: console [ttyS0] enabled
[I] Jan 1 00:00:04 kernel: bootconsole [early0] disabled
[I] Jan 1 00:00:04 kernel: Calibrating delay loop... 583.68 BogoMIPS (lpj=1167360)
[I] Jan 1 00:00:04 kernel: pid_max: default: 32768 minimum: 301
[I] Jan 1 00:00:04 kernel: Mount-cache hash table entries: 1024 (order: 0, 4096
bytes)
[I] Jan 1 00:00:04 kernel: Mountpoint-cache hash table entries: 1024 (order: 0,
4096 bytes)
[I] Jan 1 00:00:04 kernel: Primary instruction cache 32kB, VIPT, 4-way, linesize
32 bytes.
[I] Jan 1 00:00:04 kernel: Primary data cache 32kB, 4-way, PIPT, no aliases,
linesize 32 bytes
[I] Jan 1 00:00:04 kernel: MIPS secondary cache 256kB, 8-way, linesize 32 bytes.
[I] Jan 1 00:00:04 kernel: CPU1 revision is: 0001992f (MIPS 1004Kc)
[I] Jan 1 00:00:04 kernel: Synchronize counters for CPU 1: done.
[I] Jan 1 00:00:04 kernel: Primary instruction cache 32kB, VIPT, 4-way, linesize
32 bytes.
[I] Jan 1 00:00:04 kernel: Primary data cache 32kB, 4-way, PIPT, no aliases,
linesize 32 bytes
[I] Jan 1 00:00:04 kernel: MIPS secondary cache 256kB, 8-way, linesize 32 bytes.
[I] Jan 1 00:00:04 kernel: CPU2 revision is: 0001992f (MIPS 1004Kc)
[I] Jan 1 00:00:04 kernel: Synchronize counters for CPU 2: done.
[I] Jan 1 00:00:04 kernel: Primary instruction cache 32kB, VIPT, 4-way, linesize
32 bytes.
[I] Jan 1 00:00:04 kernel: Primary data cache 32kB, 4-way, PIPT, no aliases,
linesize 32 bytes
[I] Jan 1 00:00:04 kernel: MIPS secondary cache 256kB, 8-way, linesize 32 bytes.
[I] Jan 1 00:00:04 kernel: CPU3 revision is: 0001992f (MIPS 1004Kc)
[I] Jan 1 00:00:04 kernel: Synchronize counters for CPU 3: done.
[I] Jan 1 00:00:04 kernel: Brought up 4 CPUs
[I] Jan 1 00:00:04 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles:
0xffffffff, max_idle_ns: 7645041785100000 ns
[I] Jan 1 00:00:04 kernel: futex hash table entries: 1024 (order: 3, 32768 bytes)
[I] Jan 1 00:00:04 kernel: NET: Registered protocol family 16
[I] Jan 1 00:00:04 kernel: PCI host bridge to bus 0000:00
[I] Jan 1 00:00:04 kernel: pci_bus 0000:00: root bus resource [mem 0x60000000-
0x6fffffff]
[I] Jan 1 00:00:04 kernel: pci_bus 0000:00: root bus resource [io 0x1e160000-
0x1e16ffff]
[I] Jan 1 00:00:04 kernel: pci_bus 0000:00: root bus resource [??? 0x00000000
flags 0x0]
[I] Jan 1 00:00:04 kernel: pci_bus 0000:00: No busn resource found for root bus,
will use [bus 00-ff]
[I] Jan 1 00:00:04 kernel: pci 0000:00:00.0: [0e8d:0801] type 01 class 0x060400
[I] Jan 1 00:00:04 kernel: pci 0000:00:00.0: reg 0x10: [mem 0x00000000-0x7fffffff]
[I] Jan 1 00:00:04 kernel: pci 0000:00:00.0: supports D1
[I] Jan 1 00:00:04 kernel: pci 0000:00:00.0: PME# supported from D0 D1 D3hot
[I] Jan 1 00:00:04 kernel: pci 0000:00:00.0: bridge configuration invalid ([bus
00-00]), reconfiguring
[I] Jan 1 00:00:04 kernel: pci 0000:01:00.0: [14c3:7615] type 00 class 0x000280
[I] Jan 1 00:00:04 kernel: pci 0000:01:00.0: reg 0x10: [mem 0x00000000-0x000fffff
64bit]
[I] Jan 1 00:00:04 kernel: pci_bus 0000:01: busn_res: [bus 01-ff] end is updated
to 01
[I] Jan 1 00:00:04 kernel: pci_bus 0000:00: busn_res: [bus 00-ff] end is updated
to 01
[I] Jan 1 00:00:04 kernel: pci 0000:00:00.0: BAR 0: no space for [mem size
0x80000000]
[I] Jan 1 00:00:04 kernel: pci 0000:00:00.0: BAR 0: failed to assign [mem size
0x80000000]
[I] Jan 1 00:00:04 kernel: pci 0000:00:00.0: BAR 8: assigned [mem 0x60000000-
0x600fffff]
[I] Jan 1 00:00:04 kernel: pci 0000:01:00.0: BAR 0: assigned [mem 0x60000000-
0x600fffff 64bit]
[I] Jan 1 00:00:04 kernel: pci 0000:00:00.0: PCI bridge to [bus 01]
[I] Jan 1 00:00:04 kernel: pci 0000:00:00.0: bridge window [mem 0x60000000-
0x600fffff]
[I] Jan 1 00:00:04 kernel: clocksource: Switched to clocksource MIPS
[I] Jan 1 00:00:04 kernel: NET: Registered protocol family 2
[I] Jan 1 00:00:04 kernel: IP idents hash table entries: 2048 (order: 2, 16384
bytes)
[I] Jan 1 00:00:04 kernel: TCP established hash table entries: 4096 (order: 2,
16384 bytes)
[I] Jan 1 00:00:04 kernel: TCP bind hash table entries: 4096 (order: 3, 32768
bytes)
[I] Jan 1 00:00:04 kernel: TCP: Hash tables configured (established 4096 bind
4096)
[I] Jan 1 00:00:04 kernel: UDP hash table entries: 256 (order: 1, 8192 bytes)
[I] Jan 1 00:00:04 kernel: UDP-Lite hash table entries: 256 (order: 1, 8192 bytes)
[I] Jan 1 00:00:04 kernel: NET: Registered protocol family 1
[I] Jan 1 00:00:04 kernel: PCI: CLS 0 bytes, default 32
[I] Jan 1 00:00:04 kernel: workingset: timestamp_bits=29 max_order=15
bucket_order=0
[I] Jan 1 00:00:04 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher
[I] Jan 1 00:00:04 kernel: io scheduler noop registered (default)
[I] Jan 1 00:00:04 kernel: PCI: Enabling device 0000:00:00.0 (0000 -> 0002)
[I] Jan 1 00:00:04 kernel: Serial: 8250/16550 driver, 1 ports, IRQ sharing
disabled
[I] Jan 1 00:00:04 kernel: serial8250: ttyS0 at MMIO 0x1e000c00 (irq = 41,
base_baud = 3125000) is a 16550A
[I] Jan 1 00:00:04 kernel: ndmpart: registering the NDM partition parser...
[I] Jan 1 00:00:04 kernel: MediaTek NAND driver init, version v2.1
[I] Jan 1 00:00:04 kernel: MTK NFI: NAND ID [98 F1, 80 15 F2 16]
[I] Jan 1 00:00:04 kernel: MTK NFI: NAND chip found in the MTK table: TC58BVG0S3H
[I] Jan 1 00:00:04 kernel: nand: device found, Manufacturer ID: 0x98, Chip ID:
0xf1
[I] Jan 1 00:00:04 kernel: nand: Toshiba NAND 128MiB 3,3V 8-bit
[I] Jan 1 00:00:04 kernel: nand: 128 MiB, SLC, erase size: 128 KiB, page size:
2048, OOB size: 64
[I] Jan 1 00:00:04 kernel: Scanning device for bad blocks
[W] Jan 1 00:00:04 kernel: Bad eraseblock 768 at 0x000006000000
[I] Jan 1 00:00:04 kernel: MTK NFI: success load FACT_BBT from block 1023
[I] Jan 1 00:00:04 kernel: ndmpart: U-Boot partition is up to date
[I] Jan 1 00:00:04 kernel: ndmpart: di: active = 1, backup = 2, current = 1
[I] Jan 1 00:00:04 kernel: 17 ndmpart partitions found on MTD device MT7621-NAND
[I] Jan 1 00:00:04 kernel: mtd: creating 17 MTD partitions on "MT7621-NAND":
[I] Jan 1 00:00:04 kernel: 0x000000000000-0x000000080000 : "U-Boot"
[I] Jan 1 00:00:04 kernel: 0x000000080000-0x000000100000 : "U-Config"
[I] Jan 1 00:00:04 kernel: 0x000000100000-0x000000180000 : "RF-EEPROM"
[I] Jan 1 00:00:04 kernel: 0x000000180000-0x000000360000 : "Kernel_1"
[I] Jan 1 00:00:04 kernel: 0x000000360000-0x000001d40000 : "RootFS_1"
[I] Jan 1 00:00:04 kernel: mtd: device 4 (RootFS_1) set to be root filesystem
[I] Jan 1 00:00:04 kernel: 0x000000180000-0x000001d40000 : "Firmware_1"
[I] Jan 1 00:00:04 kernel: 0x000001d40000-0x000001dc0000 : "Config_1"
[I] Jan 1 00:00:04 kernel: 0x000001dc0000-0x000001fc0000 : "Storage_Legacy"
[I] Jan 1 00:00:04 kernel: 0x000001fc0000-0x000002000000 : "Dump"
[I] Jan 1 00:00:04 kernel: 0x000002000000-0x000003fc0000 : "Storage_A"
[I] Jan 1 00:00:04 kernel: 0x000003fc0000-0x000004040000 : "U-State"
[I] Jan 1 00:00:04 kernel: 0x000004040000-0x0000040c0000 : "U-Config_res"
[I] Jan 1 00:00:04 kernel: 0x0000040c0000-0x000004140000 : "RF-EEPROM_res"
[I] Jan 1 00:00:04 kernel: 0x000004140000-0x000005d00000 : "Firmware_2"
[I] Jan 1 00:00:04 kernel: 0x000005d00000-0x000005d80000 : "Config_2"
[I] Jan 1 00:00:04 kernel: 0x000005d80000-0x000007f80000 : "Storage_B"
[I] Jan 1 00:00:04 kernel: 0x000000000000-0x000007f80000 : "Full"
[I] Jan 1 00:00:04 kernel: tun: Universal TUN/TAP device driver, 1.6
[I] Jan 1 00:00:04 kernel: tun: (C) 1999-2004 Max Krasnyansky <[email protected]>
[I] Jan 1 00:00:04 kernel: PPP generic driver version 2.4.2
[I] Jan 1 00:00:04 kernel: PPP MPPE Compression module registered
[I] Jan 1 00:00:04 kernel: NET: Registered protocol family 24
[I] Jan 1 00:00:04 kernel: PPTP driver version 0.8.5
[I] Jan 1 00:00:04 kernel: mips_wdt: watchdog timer activated with 30 second delay
[I] Jan 1 00:00:04 kernel: Netfilter messages via NETLINK v0.30.
[I] Jan 1 00:00:04 kernel: nf_conntrack version 0.5.0 (16384 buckets, 49152 max)
[I] Jan 1 00:00:04 kernel: ctnetlink v0.93: registering with nfnetlink.
[I] Jan 1 00:00:04 kernel: Fast NAT loaded
[I] Jan 1 00:00:04 kernel: ip_set: protocol 6
[I] Jan 1 00:00:04 kernel: ipip: IPv4 and MPLS over IPv4 tunneling driver
[I] Jan 1 00:00:04 kernel: gre: GRE over IPv4 demultiplexor driver
[I] Jan 1 00:00:04 kernel: ip_tables: (C) 2000-2006 Netfilter Core Team
[I] Jan 1 00:00:04 kernel: NET: Registered protocol family 10
[I] Jan 1 00:00:04 kernel: ip6_tables: (C) 2000-2006 Netfilter Core Team
[I] Jan 1 00:00:04 kernel: NET: Registered protocol family 17
[I] Jan 1 00:00:04 kernel: ubridge: Tiny bridge driver, 1.2
[I] Jan 1 00:00:04 kernel: 8021q: 802.1Q VLAN Support v1.8
[I] Jan 1 00:00:04 kernel: VFS: Mounted root (squashfs filesystem) readonly on
device 31:4.
[I] Jan 1 00:00:04 kernel: Freeing unused kernel memory: 216K
[I] Jan 1 00:00:04 kernel: This architecture does not have kernel memory
protection.
[I] Jan 1 00:00:04 kernel: RNG reseed started
[I] Jan 1 00:00:04 kernel: random: crng init done
[I] Jan 1 00:00:04 ndm: Core::Main: ***
[I] Jan 1 00:00:04 ndm: Core::Main: *** Network Device Manager 3.09.C.8.0-0.
[I] Jan 1 00:00:04 ndm: Core::Main: *** Built May 2 2023 16:33:23.
[I] Jan 1 00:00:04 ndm: Core::Main: ***
[I] Jan 1 00:00:06 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/xfrm4_tunnel.ko.
[I] Jan 1 00:00:06 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/xfrm_algo.ko.
[I] Jan 1 00:00:06 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/nf_nat_proto_gre.ko.
[I] Jan 1 00:00:06 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/sit.ko.
[I] Jan 1 00:00:06 kernel: sit: IPv6, IPv4 and MPLS over IPv4 tunneling driver
[I] Jan 1 00:00:06 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/usb-common.ko.
[I] Jan 1 00:00:06 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/drbg.ko.
[I] Jan 1 00:00:06 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/tsmb.ko.
[W] Jan 1 00:00:06 kernel: tsmb: loading out-of-tree module taints kernel.
[W] Jan 1 00:00:06 kernel: tsmb: module license 'Proprietary' taints kernel.
[W] Jan 1 00:00:06 kernel: Disabling lock debugging due to kernel taint
[I] Jan 1 00:00:07 kernel: Loading TSMB module version 3020.9.24.13.
[I] Jan 1 00:00:07 kernel: Built against headers 4.9-ndm-5 SMP mips
[I] Jan 1 00:00:07 kernel: Running on kernel 4.9-ndm-5 #0 SMP Tue May 2 16:33:23
2023 mips
[I] Jan 1 00:00:07 kernel: TSMB module version 3020.9.24.13 loaded.
[I] Jan 1 00:00:07 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/cbc.ko.
[I] Jan 1 00:00:07 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/xfrm4_mode_transport.ko.
[I] Jan 1 00:00:07 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/crypto_null.ko.
[I] Jan 1 00:00:07 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/udp_tunnel.ko.
[I] Jan 1 00:00:07 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/scsi_mod.ko.
[I] Jan 1 00:00:07 kernel: SCSI subsystem initialized
[I] Jan 1 00:00:07 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/veth.ko.
[I] Jan 1 00:00:07 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/md5.ko.
[I] Jan 1 00:00:07 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/xfrm4_mode_tunnel.ko.
[I] Jan 1 00:00:07 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/crc16.ko.
[I] Jan 1 00:00:07 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/zlib_inflate.ko.
[I] Jan 1 00:00:07 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/ip_gre.ko.
[I] Jan 1 00:00:07 kernel: ip_gre: GRE over IPv4 tunneling driver
[I] Jan 1 00:00:07 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/ndm_storage.ko.
[I] Jan 1 00:00:07 kernel: Searching for suitable storage partitions...
[I] Jan 1 00:00:07 kernel: Found 1st storage partition of size 33292288 bytes
[I] Jan 1 00:00:07 kernel: Found 2nd storage partition of size 35651584 bytes
[I] Jan 1 00:00:07 kernel: Registering UBI data partitions parser
[W] Jan 1 00:00:07 kernel: Concatenating MTD devices:
[W] Jan 1 00:00:07 kernel: (0): "Storage_A"
[W] Jan 1 00:00:07 kernel: (1): "Storage_B"
[W] Jan 1 00:00:07 kernel: into device "NDM combined UBI partition"
[I] Jan 1 00:00:07 kernel: 1 ndmubipart partitions found on MTD device NDM
combined UBI partition
[I] Jan 1 00:00:07 kernel: mtd: creating 1 MTD partitions on "NDM combined UBI
partition":
[I] Jan 1 00:00:07 kernel: 0x000000000000-0x0000041c0000 : "Storage"
[I] Jan 1 00:00:07 kernel: Merging storage partitions OK
[I] Jan 1 00:00:07 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/xt_policy.ko.
[I] Jan 1 00:00:07 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/nf_conntrack_rtsp.ko.
[I] Jan 1 00:00:07 kernel: nf_conntrack_rtsp v0.7 loading
[I] Jan 1 00:00:07 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/mbcache.ko.
[I] Jan 1 00:00:07 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/phr.ko.
[I] Jan 1 00:00:07 kernel: phr: NDM I/O Peripheral Driver, v2.4.14
[I] Jan 1 00:00:07 kernel: phr: "KN-1910" profile driver loaded
[I] Jan 1 00:00:07 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/nf_conntrack_proto_gre.ko.
[I] Jan 1 00:00:07 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/sch_cake.ko.
[I] Jan 1 00:00:07 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/xxhash.ko.
[I] Jan 1 00:00:07 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/poly1305_generic.ko.
[I] Jan 1 00:00:07 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/ip6_udp_tunnel.ko.
[I] Jan 1 00:00:07 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/nls_base.ko.
[I] Jan 1 00:00:07 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/nat46.ko.
[W] Jan 1 00:00:07 kernel: nat46: module (version 1.0.1) loaded.
[I] Jan 1 00:00:07 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/jbd2.ko.
[I] Jan 1 00:00:07 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/zlib_deflate.ko.
[I] Jan 1 00:00:07 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/chacha_generic.ko.
[I] Jan 1 00:00:07 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/xt_esp.ko.
[I] Jan 1 00:00:07 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/nf_conntrack_h323.ko.
[I] Jan 1 00:00:07 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/gf128mul.ko.
[I] Jan 1 00:00:07 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/jitterentropy_rng.ko.
[I] Jan 1 00:00:07 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/ctr.ko.
[I] Jan 1 00:00:07 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/ansi_cprng.ko.
[I] Jan 1 00:00:07 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/mtdoops_proc.ko.
[I] Jan 1 00:00:07 kernel: mtdoops_proc: Attached to MTD device 8
[I] Jan 1 00:00:07 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/des_generic.ko.
[I] Jan 1 00:00:07 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/hmac.ko.
[I] Jan 1 00:00:07 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/resetnds.ko.
[I] Jan 1 00:00:07 kernel: resetnds: Module loaded.
[I] Jan 1 00:00:07 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/tunnel6.ko.
[I] Jan 1 00:00:07 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/cdrom.ko.
[I] Jan 1 00:00:07 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/crc32c_generic.ko.
[I] Jan 1 00:00:07 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/wireguard.ko.
[I] Jan 1 00:00:07 kernel: wireguard: WireGuard 1.0.20200623 loaded. See
www.wireguard.com for information.
[I] Jan 1 00:00:07 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld
<[email protected]>. All Rights Reserved.
[I] Jan 1 00:00:07 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/nf_conntrack_pptp.ko.
[I] Jan 1 00:00:07 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/usbcore.ko.
[I] Jan 1 00:00:07 kernel: usbcore: registered new interface driver usbfs
[I] Jan 1 00:00:07 kernel: usbcore: registered new interface driver hub
[I] Jan 1 00:00:07 kernel: usbcore: registered new device driver usb
[I] Jan 1 00:00:07 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/nf_nat_h323.ko.
[I] Jan 1 00:00:07 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/nf_nat_pptp.ko.
[I] Jan 1 00:00:07 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/usbserial.ko.
[I] Jan 1 00:00:07 kernel: usbcore: registered new interface driver usbserial
[I] Jan 1 00:00:07 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/aead.ko.
[I] Jan 1 00:00:07 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/zstd_compress.ko.
[I] Jan 1 00:00:07 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/l2tp_core.ko.
[I] Jan 1 00:00:08 kernel: l2tp_core: L2TP core driver, V2.0
[I] Jan 1 00:00:08 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/ghash-generic.ko.
[I] Jan 1 00:00:08 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/cdc-wdm.ko.
[I] Jan 1 00:00:08 kernel: usbcore: registered new interface driver cdc_wdm
[I] Jan 1 00:00:08 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/jffs2.ko.
[I] Jan 1 00:00:08 kernel: jffs2: version 2.2. (NAND) (c) 2001-2006 Red Hat, Inc.
[I] Jan 1 00:00:08 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/af_key.ko.
[I] Jan 1 00:00:08 kernel: NET: Registered protocol family 15
[I] Jan 1 00:00:08 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/tntfs.ko.
[I] Jan 1 00:00:08 kernel: Tuxera NTFS driver 3021.4.23.18 [Flags: R/W MODULE].
[I] Jan 1 00:00:08 kernel: Built against headers 4.9-ndm-5 SMP mips
[I] Jan 1 00:00:08 kernel: Running on kernel 4.9-ndm-5 #0 SMP Tue May 2 16:33:23
2023 mips
[I] Jan 1 00:00:08 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/echainiv.ko.
[I] Jan 1 00:00:08 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/chacha20poly1305.ko.
[I] Jan 1 00:00:08 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/nls_cp866.ko.
[I] Jan 1 00:00:08 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/deflate.ko.
[I] Jan 1 00:00:08 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/xfrm_user.ko.
[I] Jan 1 00:00:08 kernel: Initializing XFRM netlink socket
[I] Jan 1 00:00:08 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/zstd_decompress.ko.
[I] Jan 1 00:00:08 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/tfat.ko.
[I] Jan 1 00:00:08 kernel: Tuxera FAT 12/16/32 driver version 3021.3.22.24 [Flags:
R/W MODULE].
[I] Jan 1 00:00:08 kernel: Built against headers 4.9-ndm-5 SMP mips
[I] Jan 1 00:00:08 kernel: Running on kernel 4.9-ndm-5 #0 SMP Tue May 2 16:33:23
2023 mips
[I] Jan 1 00:00:08 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/ext4.ko.
[I] Jan 1 00:00:08 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/usbnet.ko.
[I] Jan 1 00:00:08 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/sg.ko.
[I] Jan 1 00:00:08 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/sierra.ko.
[I] Jan 1 00:00:08 kernel: usbcore: registered new interface driver sierra
[I] Jan 1 00:00:08 kernel: usbserial: USB Serial support registered for Sierra USB
modem
[I] Jan 1 00:00:08 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/nls_cp437.ko.
[I] Jan 1 00:00:08 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/sr_mod.ko.
[I] Jan 1 00:00:08 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/sd_mod.ko.
[I] Jan 1 00:00:08 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/usblp.ko.
[I] Jan 1 00:00:08 kernel: usbcore: registered new interface driver usblp
[I] Jan 1 00:00:08 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/l2tp_ppp.ko.
[I] Jan 1 00:00:08 kernel: l2tp_ppp: PPPoL2TP kernel driver, V2.0
[I] Jan 1 00:00:08 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/cdc-acm.ko.
[I] Jan 1 00:00:08 kernel: usbcore: registered new interface driver cdc_acm
[I] Jan 1 00:00:08 kernel: cdc_acm: USB Abstract Control Model driver for USB
modems and ISDN adapters
[I] Jan 1 00:00:08 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/usb-storage.ko.
[I] Jan 1 00:00:09 kernel: usbcore: registered new interface driver usb-storage
[I] Jan 1 00:00:09 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/nls_cp1251.ko.
[I] Jan 1 00:00:09 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/nf_nat_rtsp.ko.
[I] Jan 1 00:00:09 kernel: nf_nat_rtsp v0.7 loading
[I] Jan 1 00:00:09 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/thfsplus.ko.
[I] Jan 1 00:00:09 kernel: Tuxera HFS+ driver 3021.12.17
[I] Jan 1 00:00:09 kernel: Built against headers 4.9-ndm-5 SMP mips
[I] Jan 1 00:00:09 kernel: Running on kernel 4.9-ndm-5 #0 SMP Tue May 2 16:33:23
2023 mips
[I] Jan 1 00:00:09 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/kalmia.ko.
[I] Jan 1 00:00:09 kernel: usbcore: registered new interface driver kalmia
[I] Jan 1 00:00:09 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/ip6_tunnel.ko.
[I] Jan 1 00:00:09 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/zstd.ko.
[I] Jan 1 00:00:09 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/esp4.ko.
[I] Jan 1 00:00:09 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/nls_utf8.ko.
[I] Jan 1 00:00:09 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/authenc.ko.
[I] Jan 1 00:00:09 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/seqiv.ko.
[I] Jan 1 00:00:09 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/gcm.ko.
[I] Jan 1 00:00:09 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/usbextras.ko.
[I] Jan 1 00:00:09 kernel: usbextras: loaded
[I] Jan 1 00:00:09 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/usb_wwan.ko.
[I] Jan 1 00:00:09 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/ccm.ko.
[I] Jan 1 00:00:09 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/cdc_ncm.ko.
[I] Jan 1 00:00:09 kernel: usbcore: registered new interface driver cdc_ncm
[I] Jan 1 00:00:09 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/option.ko.
[I] Jan 1 00:00:09 kernel: usbcore: registered new interface driver option
[I] Jan 1 00:00:09 kernel: usbserial: USB Serial support registered for GSM modem
(1-port)
[I] Jan 1 00:00:09 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/huawei_cdc_ncm.ko.
[I] Jan 1 00:00:09 kernel: usbcore: registered new interface driver huawei_cdc_ncm
[I] Jan 1 00:00:09 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/cdc_ether.ko.
[I] Jan 1 00:00:09 kernel: usbcore: registered new interface driver cdc_ether
[I] Jan 1 00:00:09 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/rndis_host.ko.
[I] Jan 1 00:00:09 kernel: usbcore: registered new interface driver rndis_host
[I] Jan 1 00:00:09 ndm: Core::System::Mtd::Table: current firmware image index is
1.
[I] Jan 1 00:00:09 ndm: Core::FileSystem::Temp: mounting /var/...
[I] Jan 1 00:00:09 ndm: Core::Authenticator: MD5 generator created.
[I] Jan 1 00:00:09 ndm: Core::Authenticator: NT generator created.
[I] Jan 1 00:00:09 ndm: Core::Authenticator: "readonly" tag registered.
[I] Jan 1 00:00:09 ndm: Core::FileSystem::Dynamic: "ndm:": registered "log" node.
[I] Jan 1 00:00:09 ndm: Core::FileSystem::Dynamic: "ndm:": registered "running-
config" node.
[I] Jan 1 00:00:09 ndm: Core::FileSystem::Dynamic: "ndm:": registered "sharing-
config" node.
[I] Jan 1 00:00:09 ndm: Core::FileSystem::Dynamic: "ndm:": registered "self-test"
node.
[I] Jan 1 00:00:09 ndm: Core::System::Hostname: the host name set.
[I] Jan 1 00:00:09 ndm: Core::System::Timezone: building a timezone list...
[I] Jan 1 00:00:09 ndm: Core::System::Timezone: scanning done, 249 localities
available.
[I] Jan 1 03:00:09 ndm: Core::System::Timezone: "Europe/Istanbul" locality set as
default.
[I] Jan 1 03:00:09 ndm: Telnet::Server: bruteforce detection is enabled.
[I] Jan 1 03:00:09 ndm: Ntp::Client: configuration reset.
[I] Jan 1 03:00:09 ndm: Ntp::Client: configuration reset.
[I] Jan 1 03:00:09 ndm: Http::Manager: bruteforce detection is enabled.
[I] Jan 1 03:00:09 ndm: Core::Authenticator: "http" tag registered.
[I] Jan 1 03:00:09 ndm: Core::Authenticator: "http-proxy" tag registered.
[I] Jan 1 03:00:10 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/nacct.ko.
[I] Jan 1 03:00:10 kernel: nacct: init, v 2.5
[I] Jan 1 03:00:10 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/mt7621_eth.ko.
[I] Jan 1 03:00:10 kernel: mt7621_eth: NDM Ethernet Switch Driver for MediaTek
MT7621, v1.3.23-5
[I] Jan 1 03:00:10 kernel: mt7621_eth: MT7621 SoC, TX/RX descriptors: 1024/1024,
NAPI weight 64
[I] Jan 1 03:00:10 kernel: mt7621_eth: eth2 created for GMAC1 (50:ff:20:29:9c:1e
address, 4 EPHY ports)
[I] Jan 1 03:00:10 kernel: mt7621_eth: eth3 created for GMAC2 (50:ff:20:29:9c:1f
address, 1 EPHY port)
[I] Jan 1 03:00:10 kernel: mt7621_eth: MT7530 switch initialized
[I] Jan 1 03:00:10 ndm: Network::Interface::Base: "GigabitEthernet0": interface is
down.
[I] Jan 1 03:00:10 ndm: Network::Interface::Mac: "GigabitEthernet0": backed up the
default address 50:ff:20:29:9c:1e of "GigabitEthernet0" before changing.
[I] Jan 1 03:00:10 ndm: Network::Interface::Repository: "GigabitEthernet0"
interface created.
[I] Jan 1 03:00:10 ndm: Network::Interface::Base: "GigabitEthernet0/0": interface
is down.
[I] Jan 1 03:00:10 ndm: Network::Interface::Repository: "GigabitEthernet0/0"
interface created.
[I] Jan 1 03:00:10 ndm: Network::Interface::Base: "GigabitEthernet0/1": interface
is down.
[I] Jan 1 03:00:10 ndm: Network::Interface::Repository: "GigabitEthernet0/1"
interface created.
[I] Jan 1 03:00:10 ndm: Network::Interface::Base: "GigabitEthernet0/2": interface
is down.
[I] Jan 1 03:00:10 ndm: Network::Interface::Repository: "GigabitEthernet0/2"
interface created.
[I] Jan 1 03:00:10 ndm: Network::Interface::Base: "GigabitEthernet0/3": interface
is down.
[I] Jan 1 03:00:10 ndm: Network::Interface::Repository: "GigabitEthernet0/3"
interface created.
[I] Jan 1 03:00:10 ndm: Network::Interface::Base: "GigabitEthernet1": interface is
down.
[I] Jan 1 03:00:10 ndm: Network::Interface::Base: "GigabitEthernet1": network MTU
reset to default.
[I] Jan 1 03:00:10 ndm: Network::Interface::Repository: "GigabitEthernet1"
interface created.
[I] Jan 1 03:00:10 ndm: Network::Interface::Base: "GigabitEthernet1/0": interface
is down.
[I] Jan 1 03:00:10 ndm: Network::Interface::Repository: "GigabitEthernet1/0"
interface created.
[I] Jan 1 03:00:10 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/xhci-hcd.ko.
[I] Jan 1 03:00:10 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/xhci-mtk.ko.
[I] Jan 1 03:00:10 kernel: xhci-mtk xhci-mtk: xHCI Host Controller
[I] Jan 1 03:00:10 kernel: xhci-mtk xhci-mtk: new USB bus registered, assigned bus
number 1
[I] Jan 1 03:00:10 kernel: U2PHY P0 set SRCTRL calibration value: 3
[I] Jan 1 03:00:10 kernel: U2PHY P1 set SRCTRL calibration value: 3
[I] Jan 1 03:00:10 kernel: xhci-mtk xhci-mtk: hcc params 0x01401198 hci version
0x96 quirks 0x00294810
[I] Jan 1 03:00:10 kernel: xhci-mtk xhci-mtk: irq 37, io mem 0x1e1c0000
[I] Jan 1 03:00:10 kernel: usb usb1: New USB device found, idVendor=1d6b,
idProduct=0002, bcdDevice= 4.09
[I] Jan 1 03:00:10 kernel: usb usb1: New USB device strings: Mfr=3, Product=2,
SerialNumber=1
[I] Jan 1 03:00:10 kernel: usb usb1: Product: xHCI Host Controller
[I] Jan 1 03:00:10 kernel: usb usb1: Manufacturer: Linux 4.9-ndm-5 xhci-hcd
[I] Jan 1 03:00:10 kernel: usb usb1: SerialNumber: xhci-mtk
[I] Jan 1 03:00:10 kernel: hub 1-0:1.0: USB hub found
[I] Jan 1 03:00:10 kernel: hub 1-0:1.0: 2 ports detected
[I] Jan 1 03:00:10 kernel: xhci-mtk xhci-mtk: xHCI Host Controller
[I] Jan 1 03:00:10 kernel: xhci-mtk xhci-mtk: new USB bus registered, assigned bus
number 2
[I] Jan 1 03:00:10 kernel: usb usb2: New USB device found, idVendor=1d6b,
idProduct=0003, bcdDevice= 4.09
[I] Jan 1 03:00:10 kernel: usb usb2: New USB device strings: Mfr=3, Product=2,
SerialNumber=1
[I] Jan 1 03:00:10 kernel: usb usb2: Product: xHCI Host Controller
[I] Jan 1 03:00:10 kernel: usb usb2: Manufacturer: Linux 4.9-ndm-5 xhci-hcd
[I] Jan 1 03:00:10 kernel: usb usb2: SerialNumber: xhci-mtk
[I] Jan 1 03:00:10 kernel: hub 2-0:1.0: USB hub found
[I] Jan 1 03:00:10 kernel: hub 2-0:1.0: 1 port detected
[I] Jan 1 03:00:10 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/ubi.ko.
[I] Jan 1 03:00:10 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/ubifs.ko.
[W] Jan 1 03:00:10 kernel: ubi0: attaching mtd17
[W] Jan 1 03:00:11 kernel: ubi0: scanning is finished
[W] Jan 1 03:00:11 kernel: ubi0: attached mtd17 (name "Storage", size 65 MiB)
[W] Jan 1 03:00:11 kernel: ubi0: PEB size: 131072 bytes (128 KiB), LEB size:
126976 bytes
[W] Jan 1 03:00:11 kernel: ubi0: min./max. I/O unit sizes: 2048/2048, sub-page
size 2048
[W] Jan 1 03:00:11 kernel: ubi0: VID header offset: 2048 (aligned 2048), data
offset: 4096
[W] Jan 1 03:00:11 kernel: ubi0: good PEBs: 525, bad PEBs: 1, corrupted PEBs: 0
[W] Jan 1 03:00:11 kernel: ubi0: user volume: 1, internal volumes: 1, max. volumes
count: 128
[W] Jan 1 03:00:11 kernel: ubi0: max/mean erase counter: 2/1, WL threshold: 2048,
image sequence number: 763062735
[W] Jan 1 03:00:11 kernel: ubi0: available PEBs: 0, total reserved PEBs: 525, PEBs
reserved for bad PEB handling: 12
[W] Jan 1 03:00:11 kernel: ubi0: background thread "ubi_bgt0d" started, PID 472
[W] Jan 1 03:00:11 kernel: UBIFS (ubi0:0): background thread "ubifs_bgt0_0"
started, PID 473
[W] Jan 1 03:00:11 kernel: UBIFS (ubi0:0): recovery needed
[W] Jan 1 03:00:11 kernel: UBIFS (ubi0:0): recovery completed
[W] Jan 1 03:00:11 kernel: UBIFS (ubi0:0): UBIFS: mounted UBI device 0, volume 0,
name "storage"
[W] Jan 1 03:00:11 kernel: UBIFS (ubi0:0): LEB size: 126976 bytes (124 KiB),
min./max. I/O unit sizes: 2048 bytes/2048 bytes
[W] Jan 1 03:00:11 kernel: UBIFS (ubi0:0): FS size: 63361024 bytes (60 MiB, 499
LEBs), journal size 3174400 bytes (3 MiB, 25 LEBs)
[W] Jan 1 03:00:11 kernel: UBIFS (ubi0:0): reserved for root: 2992697 bytes (2922
KiB)
[W] Jan 1 03:00:11 kernel: UBIFS (ubi0:0): media format: w4/r0 (latest is w4/r0),
UUID 4BF7F289-24E2-4783-BD86-40075CD321B1, small LPT model
[I] Jan 1 03:00:11 ndm: Core::Authenticator: "printers" tag registered.
[I] Jan 1 03:00:11 ndm: Core::Authenticator: "cifs" tag registered.
[I] Jan 1 03:00:11 ndm: Cloud::Agent: "cloud" component registered.
[I] Jan 1 03:00:11 ndm: Cloud::Agent: "ndns" TTP component registered.
[I] Jan 1 03:00:11 ndm: Cloud::Agent: "ndns" component registered.
[I] Jan 1 03:00:11 ndm: Cloud::Agent: "ndmp" component registered.
[I] Jan 1 03:00:11 ndm: Core::Authenticator: "vpn-dlna" tag registered.
[I] Jan 1 03:00:11 ndm: Dns::Filter::Public: loaded 17 presets (version 10).
[I] Jan 1 03:00:11 ndm: Dns::Manager: DNS-over-HTTPS support initialized.
[I] Jan 1 03:00:11 ndm: Dns::Manager: DNS-over-TLS support initialized.
[I] Jan 1 03:00:11 ndm: Network::InternetChecker: gateway checking enabled.
[I] Jan 1 03:00:11 ndm: Ftp::Server: bruteforce detection is enabled.
[I] Jan 1 03:00:11 ndm: Core::Authenticator: "ftp" tag registered.
[I] Jan 1 03:00:11 kernel: IPv6: ADDRCONF(NETDEV_UP): tunl0: link is not ready
[I] Jan 1 03:00:11 kernel: IPv6: ADDRCONF(NETDEV_UP): sit0: link is not ready
[I] Jan 1 03:00:11 kernel: IPv6: ADDRCONF(NETDEV_UP): gre0: link is not ready
[I] Jan 1 03:00:11 kernel: IPv6: ADDRCONF(NETDEV_UP): gretap0: link is not ready
[I] Jan 1 03:00:11 kernel: IPv6: ADDRCONF(NETDEV_UP): ethoip0: link is not ready
[I] Jan 1 03:00:11 kernel: IPv6: ADDRCONF(NETDEV_UP): ip6tnl0: link is not ready
[I] Jan 1 03:00:11 kernel: IPv6: ADDRCONF(NETDEV_UP): ezcfg0: link is not ready
[I] Jan 1 03:00:11 kernel: IPv6: ADDRCONF(NETDEV_UP): eth2: link is not ready
[I] Jan 1 03:00:11 kernel: IPv6: ADDRCONF(NETDEV_UP): eth3: link is not ready
[I] Jan 1 03:00:11 ndm: Core::Authenticator: "ipsec-xauth" tag registered.
[I] Jan 1 03:00:11 ndm: Core::Authenticator: "ipsec-l2tp" tag registered.
[I] Jan 1 03:00:11 ndm: Network::Interface::Rtx::Sku: main EU profile applied.
[I] Jan 1 03:00:11 ndm: Network::Interface::Rtx::Sku: beamforming EU profile
applied.
[I] Jan 1 03:00:11 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/mt7615_ap.ko.
[I] Jan 1 03:00:12 kernel: PCI: Enabling device 0000:01:00.0 (0000 -> 0002)
[I] Jan 1 03:00:12 kernel: MT7615 AP Driver version: 5.1.0.1
[I] Jan 1 03:00:12 ndm: Network::Interface::Rtx::WifiMaster: "WifiMaster1": PHY
mode set.
[I] Jan 1 03:00:12 ndm: Network::Interface::Rtx::WifiMaster: "WifiMaster1":
channel bandwidth settings reset to default.
[I] Jan 1 03:00:12 ndm: Network::Interface::Base: "WifiMaster1": interface is
down.
[I] Jan 1 03:00:12 kernel: MT7615 CPU 0 patch info:
[I] Jan 1 03:00:12 kernel: Built date: 20180518100604a
[I] Jan 1 03:00:12 kernel: MT7615 CPU 0 firmware info:
[I] Jan 1 03:00:12 kernel: Chip ID: 0x04
[I] Jan 1 03:00:12 kernel: Eco version: 0x00
[I] Jan 1 03:00:12 kernel: Built date: 20210224182030
[I] Jan 1 03:00:12 kernel: MT7615 CPU 1 firmware info:
[I] Jan 1 03:00:12 kernel: Chip ID: 0x04
[I] Jan 1 03:00:12 kernel: Eco version: 0x00
[I] Jan 1 03:00:12 kernel: Built date: 20190415154149
[I] Jan 1 03:00:13 ndm: Network::Interface::Repository: "WifiMaster1" interface
created.
[I] Jan 1 03:00:13 ndm: Network::Interface::Rtx::WifiMaster: "WifiMaster0": PHY
mode set.
[I] Jan 1 03:00:13 ndm: Network::Interface::Rtx::WifiMaster: "WifiMaster0":
channel bandwidth settings reset to default.
[I] Jan 1 03:00:13 ndm: Network::Interface::Base: "WifiMaster0": interface is
down.
[I] Jan 1 03:00:13 ndm: Network::Interface::Repository: "WifiMaster0" interface
created.
[I] Jan 1 03:00:13 ndm: Network::Interface::Wireless: "WifiMaster1/AccessPoint1":
SSID saved.
[I] Jan 1 03:00:13 ndm: Network::Interface::Rtx::AccessPoint:
"WifiMaster1/AccessPoint1": SSID reset.
[I] Jan 1 03:00:13 ndm: Network::Interface::Base: "WifiMaster1/AccessPoint1":
interface is down.
[I] Jan 1 03:00:13 ndm: Network::Interface::Base: "WifiMaster1/AccessPoint1":
network MTU reset to default.
[I] Jan 1 03:00:13 ndm: Network::Interface::Repository: "WifiMaster1/AccessPoint1"
interface created.
[I] Jan 1 03:00:13 ndm: Network::Interface::Wireless: "WifiMaster0/AccessPoint3":
SSID saved.
[I] Jan 1 03:00:13 ndm: Network::Interface::Rtx::AccessPoint:
"WifiMaster0/AccessPoint3": SSID reset.
[I] Jan 1 03:00:13 ndm: Network::Interface::Base: "WifiMaster0/AccessPoint3":
interface is down.
[I] Jan 1 03:00:13 ndm: Network::Interface::Base: "WifiMaster0/AccessPoint3":
network MTU reset to default.
[I] Jan 1 03:00:13 ndm: Network::Interface::Repository: "WifiMaster0/AccessPoint3"
interface created.
[I] Jan 1 03:00:13 ndm: Network::Interface::Wireless: "WifiMaster0/AccessPoint0":
SSID saved.
[I] Jan 1 03:00:13 ndm: Network::Interface::Rtx::AccessPoint:
"WifiMaster0/AccessPoint0": SSID reset.
[I] Jan 1 03:00:13 ndm: Network::Interface::Base: "WifiMaster0/AccessPoint0":
interface is down.
[I] Jan 1 03:00:13 ndm: Network::Interface::Base: "WifiMaster0/AccessPoint0":
network MTU reset to default.
[I] Jan 1 03:00:13 ndm: Network::Interface::Repository: "WifiMaster0/AccessPoint0"
interface created.
[I] Jan 1 03:00:13 ndm: Network::Interface::Wireless: "WifiMaster1/AccessPoint2":
SSID saved.
[I] Jan 1 03:00:13 ndm: Network::Interface::Rtx::AccessPoint:
"WifiMaster1/AccessPoint2": SSID reset.
[I] Jan 1 03:00:13 ndm: Network::Interface::Base: "WifiMaster1/AccessPoint2":
interface is down.
[I] Jan 1 03:00:13 ndm: Network::Interface::Base: "WifiMaster1/AccessPoint2":
network MTU reset to default.
[I] Jan 1 03:00:13 ndm: Network::Interface::Repository: "WifiMaster1/AccessPoint2"
interface created.
[I] Jan 1 03:00:13 ndm: Network::Interface::Wireless: "WifiMaster0/AccessPoint1":
SSID saved.
[I] Jan 1 03:00:13 ndm: Network::Interface::Rtx::AccessPoint:
"WifiMaster0/AccessPoint1": SSID reset.
[I] Jan 1 03:00:13 ndm: Network::Interface::Base: "WifiMaster0/AccessPoint1":
interface is down.
[I] Jan 1 03:00:13 ndm: Network::Interface::Base: "WifiMaster0/AccessPoint1":
network MTU reset to default.
[I] Jan 1 03:00:13 ndm: Network::Interface::Repository: "WifiMaster0/AccessPoint1"
interface created.
[I] Jan 1 03:00:13 ndm: Network::Interface::Wireless: "WifiMaster1/AccessPoint3":
SSID saved.
[I] Jan 1 03:00:13 ndm: Network::Interface::Rtx::AccessPoint:
"WifiMaster1/AccessPoint3": SSID reset.
[I] Jan 1 03:00:13 ndm: Network::Interface::Base: "WifiMaster1/AccessPoint3":
interface is down.
[I] Jan 1 03:00:13 ndm: Network::Interface::Base: "WifiMaster1/AccessPoint3":
network MTU reset to default.
[I] Jan 1 03:00:13 ndm: Network::Interface::Repository: "WifiMaster1/AccessPoint3"
interface created.
[I] Jan 1 03:00:13 ndm: Network::Interface::Wireless: "WifiMaster1/AccessPoint0":
SSID saved.
[I] Jan 1 03:00:13 ndm: Network::Interface::Rtx::AccessPoint:
"WifiMaster1/AccessPoint0": SSID reset.
[I] Jan 1 03:00:13 ndm: Network::Interface::Base: "WifiMaster1/AccessPoint0":
interface is down.
[I] Jan 1 03:00:13 ndm: Network::Interface::Base: "WifiMaster1/AccessPoint0":
network MTU reset to default.
[I] Jan 1 03:00:13 ndm: Network::Interface::Repository: "WifiMaster1/AccessPoint0"
interface created.
[I] Jan 1 03:00:13 ndm: Network::Interface::Wireless: "WifiMaster0/AccessPoint2":
SSID saved.
[I] Jan 1 03:00:13 ndm: Network::Interface::Rtx::AccessPoint:
"WifiMaster0/AccessPoint2": SSID reset.
[I] Jan 1 03:00:13 ndm: Network::Interface::Base: "WifiMaster0/AccessPoint2":
interface is down.
[I] Jan 1 03:00:13 ndm: Network::Interface::Base: "WifiMaster0/AccessPoint2":
network MTU reset to default.
[I] Jan 1 03:00:13 ndm: Network::Interface::Repository: "WifiMaster0/AccessPoint2"
interface created.
[I] Jan 1 03:00:13 ndm: Network::Interface::Base: "WifiMaster0/WifiStation0":
interface is down.
[I] Jan 1 03:00:13 ndm: Network::Interface::Base: "WifiMaster0/WifiStation0":
network MTU reset to default.
[I] Jan 1 03:00:13 ndm: Network::Interface::Repository: "WifiMaster0/WifiStation0"
interface created.
[I] Jan 1 03:00:13 ndm: Network::Interface::Base: "WifiMaster1/WifiStation0":
interface is down.
[I] Jan 1 03:00:13 ndm: Network::Interface::Base: "WifiMaster1/WifiStation0":
network MTU reset to default.
[I] Jan 1 03:00:13 ndm: Network::Interface::Repository: "WifiMaster1/WifiStation0"
interface created.
[I] Jan 1 03:00:13 ndm: Network::Interface::Rtx::WifiMonitor: added system name
for "WifiMaster0/Backhaul0".
[I] Jan 1 03:00:13 ndm: Network::Interface::Rtx::WifiMonitor: added system name
for "WifiMaster1/Backhaul0".
[I] Jan 1 03:00:13 ndm: Core::FileSystem::Dynamic: "ndm:": registered "wifi-
configuration.dat" node.
[I] Jan 1 03:00:13 ndm: Network::Interface::Rtx::WifiController: backhaul STP
disabled.
[I] Jan 1 03:00:13 ndm: Network::Interface::Rtx::WifiController:
"WifiMaster0/Backhaul0": set metric 1.
[I] Jan 1 03:00:14 ndm: Network::Interface::Rtx::WifiController:
"WifiMaster0/Backhaul0": activated.
[I] Jan 1 03:00:14 ndm: Network::Interface::Rtx::WifiController:
"WifiMaster1/Backhaul0": set metric 1.
[I] Jan 1 03:00:14 ndm: Network::Interface::Rtx::WifiController:
"WifiMaster1/Backhaul0": activated.
[I] Jan 1 03:00:14 ndm: Network::Interface::Rtx::WifiController: backhaul
activated.
[I] Jan 1 03:00:14 ndm: PingCheck::Profile: "default": update interval is changed
to 10 seconds.
[I] Jan 1 03:00:14 ndm: PingCheck::Profile: "default": uses tls mode.
[I] Jan 1 03:00:14 ndm: PingCheck::Profile: "default": uses port 443 for testing.
[I] Jan 1 03:00:14 ndm: PingCheck::Profile: "default": add host
"captive.keenetic.net" for testing.
[I] Jan 1 03:00:14 ndm: Core::Authenticator: "torrent" tag registered.
[I] Jan 1 03:00:14 ndm: Network::Interface::Ip: "WifiMaster1/AccessPoint1":
security level set to "private".
[I] Jan 1 03:00:15 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/ntc.ko.
[I] Jan 1 03:00:15 ndnproxy: NDM DNS Proxy, v1.3.0b55-1.
[I] Jan 1 03:00:15 ndnproxy: PID file: /var/ndnproxymain.pid.
[I] Jan 1 03:00:15 ndnproxy: stats. file: /var/ndnproxymain.stat.
[I] Jan 1 03:00:15 kernel: ntc: NDM Traffic Control Module, v7.0.3
[I] Jan 1 03:00:15 ndm: Network::Interface::Ip: "WifiMaster0/AccessPoint3":
security level set to "private".
[I] Jan 1 03:00:15 ndm: Module::Manager: loaded 49 modules.
[I] Jan 1 03:00:15 ndm: Network::Interface::Ip: "WifiMaster1/AccessPoint2":
security level set to "private".
[I] Jan 1 03:00:15 ndm: Network::Interface::Ip: "WifiMaster0/AccessPoint1":
security level set to "private".
[I] Jan 1 03:00:15 ndm: Network::Interface::Ip: "WifiMaster1/AccessPoint3":
security level set to "private".
[I] Jan 1 03:00:15 ndm: Network::Interface::Ip: "WifiMaster0/AccessPoint2":
security level set to "private".
[I] May 22 21:03:41 ndm: Core::System::Clock: system time has been changed.
[I] May 22 21:03:41 ndm: Core::FileSystem::Proc: system setting saved.
[I] May 22 21:03:41 ndm: Core::Syslog: last message repeated 14 times.
[I] May 22 21:03:41 ndm: Core::Peripheral::Manager: "FN1/double-click" handler set.
[I] May 22 21:03:41 ndm: Core::Peripheral::Manager: "FN2/double-click" handler set.

[I] May 22 22:03:41 ndm: Core::System::Timezone: timezone set to "Asia/Baku".


[I] May 22 22:03:41 ndm: Core::System::Domainname: the system domain name set.
[I] May 22 22:03:41 ndm: Core::System::Hostname: the host name set.
[I] May 22 22:03:41 ndm: Core::System::Caption: template set to default.
[I] May 22 22:03:41 ndm: Core::Ndss: dump-reporting disabled.
[I] May 22 22:03:41 ndm: Ntp::Client: server "0.pool.ntp.org" has been added.
[I] May 22 22:03:41 ndm: Ntp::Client: server "1.pool.ntp.org" has been added.
[I] May 22 22:03:41 ndm: Ntp::Client: server "2.pool.ntp.org" has been added.
[I] May 22 22:03:41 ndm: Ntp::Client: server "3.pool.ntp.org" has been added.
[I] May 22 22:03:41 ndm: Core::KnownHosts: new host "wiregurd" has been created.
[I] May 22 22:03:41 ndm: Core::KnownHosts: new host "debguard" has been created.
[I] May 22 22:03:41 ndm: Core::KnownHosts: new host "newminecraft" has been
created.
[I] May 22 22:03:41 ndm: Core::KnownHosts: new host "openvpn" has been created.
[I] May 22 22:03:41 ndm: Core::KnownHosts: new host "sinplays" has been created.
[I] May 22 22:03:41 ndm: Core::KnownHosts: new host "Daymarus-" has been created.
[I] May 22 22:03:41 ndm: Core::KnownHosts: new host "Daymarus" has been created.
[I] May 22 22:03:41 ndm: Core::KnownHosts: new host "TL-C20-V5" has been created.
[I] May 22 22:03:41 ndm: Core::KnownHosts: new host "Archer C20" has been created.
[I] May 22 22:03:41 ndm: Core::KnownHosts: new host "Durimarus" has been created.
[I] May 22 22:03:41 ndm: Core::KnownHosts: new host "meiphoneX" has been created.
[I] May 22 22:03:41 ndm: Core::KnownHosts: new host "iPhone" has been created.
[I] May 22 22:03:41 ndm: Core::KnownHosts: new host "Eda" has been created.
[I] May 22 22:03:41 ndm: Core::KnownHosts: new host "papi4" has been created.
[I] May 22 22:03:41 ndm: Core::KnownHosts: new host "iphoneX" has been created.
[I] May 22 22:03:41 ndm: Core::KnownHosts: new host "RedmiNote8-RedmiNote" has been
created.
[I] May 22 22:03:41 ndm: Core::KnownHosts: new host "123123" has been created.
[I] May 22 22:03:41 ndm: Core::KnownHosts: new host "iPhone-X" has been created.
[I] May 22 22:03:41 ndm: Core::KnownHosts: new host "miboxS" has been created.
[I] May 22 22:03:41 ndm: Core::KnownHosts: new host "13promax" has been created.
[I] May 22 22:03:41 ndm: Network::Acl: "_WEBADMIN_IPSEC_ionline_EY" access list
created.
[I] May 22 22:03:41 ndm: Network::Acl: rule accepted.
[I] May 22 22:03:41 ndm: Network::Acl: "_WEBADMIN_ISP" access list created.
[I] May 22 22:03:41 ndm: Network::Acl: rule accepted.
[I] May 22 22:03:41 ndm: Network::Acl: deny rule disabled.
[I] May 22 22:03:41 ndm: Network::Acl: deny rule description set to "ping".
[I] May 22 22:03:41 ndm: Network::Acl: enabled auto-deletion for "_WEBADMIN_ISP"
access group.
[I] May 22 22:03:41 ndm: Netfilter::Manager: private networks isolated.
[I] May 22 22:03:41 ndm: Core::Authenticator: password has been set for user
"admin".
[I] May 22 22:03:41 ndm: Core::Authenticator: password has been set for user
"admin".
[I] May 22 22:03:41 ndm: Core::Authenticator: user "admin" tagged with "cli".
[I] May 22 22:03:41 ndm: Core::Authenticator: user "admin" tagged with "http".
[I] May 22 22:03:41 ndm: Core::Authenticator: user "admin" tagged with "ftp".
[I] May 22 22:03:41 ndm: Core::Authenticator: user "admin" tagged with "cifs".
[I] May 22 22:03:41 ndm: Core::Authenticator: user "admin" tagged with "printers".
[I] May 22 22:03:41 ndm: Core::Authenticator: user "admin" tagged with "torrent".
[I] May 22 22:03:41 ndm: Network::Interface::Base: "GigabitEthernet0": interface is
up.
[I] May 22 22:03:41 ndm: Network::Interface::Base: "GigabitEthernet0/0": renamed to
"1".
[I] May 22 22:03:41 ndm: Network::Interface::Switch: "GigabitEthernet0/0": access
mode enabled.
[I] May 22 22:03:41 ndm: Network::Interface::Switch: "GigabitEthernet0/0": set
access VLAN ID: 1.
[I] May 22 22:03:41 ndm: Network::Interface::Base: "GigabitEthernet0/0": interface
is up.
[I] May 22 22:03:41 ndm: Network::Interface::Base: "GigabitEthernet0/1": renamed to
"2".
[I] May 22 22:03:41 ndm: Network::Interface::Switch: "GigabitEthernet0/1": access
mode enabled.
[I] May 22 22:03:41 ndm: Network::Interface::Switch: "GigabitEthernet0/1": set
access VLAN ID: 1.
[I] May 22 22:03:41 ndm: Network::Interface::Base: "GigabitEthernet0/1": interface
is up.
[I] May 22 22:03:41 ndm: Network::Interface::Base: "GigabitEthernet0/2": renamed to
"3".
[I] May 22 22:03:41 ndm: Network::Interface::Switch: "GigabitEthernet0/2": access
mode enabled.
[I] May 22 22:03:41 ndm: Network::Interface::Switch: "GigabitEthernet0/2": set
access VLAN ID: 1.
[I] May 22 22:03:41 ndm: Network::Interface::Base: "GigabitEthernet0/2": interface
is up.
[I] May 22 22:03:41 ndm: Network::Interface::Base: "GigabitEthernet0/3": renamed to
"4".
[I] May 22 22:03:41 ndm: Network::Interface::Switch: "GigabitEthernet0/3": access
mode enabled.
[I] May 22 22:03:41 ndm: Network::Interface::Switch: "GigabitEthernet0/3": trunk
mode enabled.
[I] May 22 22:03:41 ndm: Network::Interface::Switch: "GigabitEthernet0/3": set
trunk VLAN ID: 18.
[I] May 22 22:03:41 ndm: Network::Interface::Base: "GigabitEthernet0/3": interface
is up.
[I] May 22 22:03:41 ndm: Network::Interface::Base: "GigabitEthernet0/Vlan1":
interface is down.
[I] May 22 22:03:41 ndm: Network::Interface::Base: "GigabitEthernet0/Vlan1":
network MTU reset to default.
[I] May 22 22:03:41 ndm: Network::Interface::Repository: "GigabitEthernet0/Vlan1"
interface created.
[I] May 22 22:03:42 ndm: Network::Interface::Base: "GigabitEthernet0/Vlan1":
description saved.
[I] May 22 22:03:42 ndm: Network::Interface::Ip: "GigabitEthernet0/Vlan1": security
level set to "private".
[I] May 22 22:03:42 ndm: Dhcp::Client: GigabitEthernet0/Vlan1 DHCP client DNS host
routes are enabled.
[I] May 22 22:03:42 ndm: Dhcp::Client: GigabitEthernet0/Vlan1 DHCP name servers are
enabled.
[I] May 22 22:03:42 ndm: Network::Interface::Base: "GigabitEthernet0/Vlan1":
interface is up.
[I] May 22 22:03:42 ndm: Network::Interface::Base: "GigabitEthernet0/Vlan3":
interface is down.
[I] May 22 22:03:42 ndm: Network::Interface::Base: "GigabitEthernet0/Vlan3":
network MTU reset to default.
[I] May 22 22:03:42 ndm: Network::Interface::Repository: "GigabitEthernet0/Vlan3"
interface created.
[I] May 22 22:03:43 ndm: Network::Interface::Ip: "GigabitEthernet0/Vlan3": security
level set to "public".
[I] May 22 22:03:43 ndm: Dhcp::Client: GigabitEthernet0/Vlan3 DHCP client DNS host
routes are enabled.
[I] May 22 22:03:43 ndm: Dhcp::Client: GigabitEthernet0/Vlan3 DHCP name servers are
enabled.
[I] May 22 22:03:43 ndm: Network::Interface::Base: "GigabitEthernet0/Vlan3":
interface is up.
[I] May 22 22:03:43 ndm: Network::Interface::Base: "GigabitEthernet0/Vlan18":
interface is down.
[I] May 22 22:03:43 ndm: Network::Interface::Base: "GigabitEthernet0/Vlan18":
network MTU reset to default.
[I] May 22 22:03:43 ndm: Network::Interface::Repository: "GigabitEthernet0/Vlan18"
interface created.
[I] May 22 22:03:44 ndm: Network::Interface::Ip: "GigabitEthernet0/Vlan18":
security level set to "public".
[I] May 22 22:03:44 ndm: Dhcp::Client: GigabitEthernet0/Vlan18 DHCP client DNS host
routes are enabled.
[I] May 22 22:03:44 ndm: Dhcp::Client: GigabitEthernet0/Vlan18 DHCP name servers
are enabled.
[I] May 22 22:03:44 ndm: Network::Interface::Base: "GigabitEthernet0/Vlan18":
interface is up.
[I] May 22 22:03:44 ndm: Network::Interface::Base: "GigabitEthernet1": renamed to
"ISP".
[I] May 22 22:03:44 ndm: Network::Interface::Base: "GigabitEthernet1": description
saved.
[I] May 22 22:03:44 ndm: Network::Interface::Mac: "GigabitEthernet1": backed up the
default address 50:ff:20:29:9c:1f of "ISP" before changing.
[I] May 22 22:03:44 ndm: Network::Interface::Mac: "GigabitEthernet1": MAC address
is 14:eb:b6:d0:19:de.
[I] May 22 22:03:44 ndm: Network::Interface::Ip: "GigabitEthernet1": security level
set to "public".
[I] May 22 22:03:44 ndm: Dhcp::Client: started DHCP client on GigabitEthernet1.
[I] May 22 22:03:44 ndm: Dhcp::Client: GigabitEthernet1 DHCP client hostname is set
to Keenetic_Viva.
[I] May 22 22:03:44 ndm: Dhcp::Client: GigabitEthernet1 DHCP client DNS host routes
are enabled.
[I] May 22 22:03:44 ndm: Dhcp::Client: GigabitEthernet1 DHCP name servers are
disabled.
[I] May 22 22:03:44 ndm: Network::Interface::Base: "GigabitEthernet1": static MTU
is 1500.
[I] May 22 22:03:44 ndm: Network::Acl: input "_WEBADMIN_ISP" access list added to
"GigabitEthernet1".
[I] May 22 22:03:44 ndm: Network::Interface::L3Base: "GigabitEthernet1": global
priority is 63507.
[I] May 22 22:03:44 ndm: Igmp::Proxy: upstream role assigned to GigabitEthernet1.
[I] May 22 22:03:44 ndm: Network::Interface::Base: "GigabitEthernet1": interface is
up.
[I] May 22 22:03:44 ndm: Network::Interface::Base: "GigabitEthernet1/0": renamed to
"0".
[I] May 22 22:03:44 ndm: Network::Interface::Base: "GigabitEthernet1/0": interface
is up.
[I] May 22 22:03:44 ndm: Network::Interface::Rtx::WifiMaster: "WifiMaster0": PHY
mode set.
[I] May 22 22:03:44 ndm: Network::Interface::Rtx::WifiMaster: "WifiMaster0":
channel bandwidth setting applied.
[I] May 22 22:03:44 ndm: Network::Interface::Rtx::WifiMaster: "WifiMaster0": TX
burst enabled.
[I] May 22 22:03:44 ndm: Network::Interface::Rtx::WifiMaster: "WifiMaster0": rekey
interval is 3600 sec.
[I] May 22 22:03:44 ndm: Network::Interface::Rtx::WifiMaster: "WifiMaster0": VHT
enabled.
[I] May 22 22:03:44 ndm: Network::Interface::Base: "WifiMaster0": interface is up.
[I] May 22 22:03:44 ndm: Network::Interface::Base: "WifiMaster0/AccessPoint0":
renamed to "AccessPoint".
[I] May 22 22:03:44 ndm: Network::Interface::Base: "WifiMaster0/AccessPoint0":
description saved.
[I] May 22 22:03:44 ndm: Network::Interface::EthernetIp:
"WifiMaster0/AccessPoint0": ACL type unchanged.
[I] May 22 22:03:44 ndm: Network::Interface::Ip: "WifiMaster0/AccessPoint0":
security level set to "private".
[I] May 22 22:03:44 ndm: Network::Interface::Wifi: "WifiMaster0/AccessPoint0": WPA
PSK set.
[I] May 22 22:03:44 ndm: Network::Interface::Rtx::AccessPoint:
"WifiMaster0/AccessPoint0": wireless encryption enabled.
[I] May 22 22:03:44 ndm: Network::Interface::Rtx::AccessPoint:
"WifiMaster0/AccessPoint0": WPA2 enabled.
[I] May 22 22:03:44 ndm: Dhcp::Client: WifiMaster0/AccessPoint0 DHCP client DNS
host routes are enabled.
[I] May 22 22:03:44 ndm: Dhcp::Client: WifiMaster0/AccessPoint0 DHCP name servers
are enabled.
[I] May 22 22:03:44 ndm: Network::Interface::Wireless: "WifiMaster0/AccessPoint0":
SSID saved.
[I] May 22 22:03:44 ndm: Network::Interface::Rtx::AccessPoint:
"WifiMaster0/AccessPoint0": WMM extensions enabled.
[I] May 22 22:03:44 ndm: Network::Interface::Rtx::AccessPoint:
"WifiMaster0/AccessPoint0": RRM enabled.
[I] May 22 22:03:44 ndm: Network::Interface::Rtx::AccessPoint:
"WifiMaster0/AccessPoint0": BTM enabled.
[I] May 22 22:03:44 ndm: Network::Interface::Base: "WifiMaster0/AccessPoint0":
interface is up.
[I] May 22 22:03:44 ndm: Network::Interface::Base: "WifiMaster0/AccessPoint1":
renamed to "GuestWiFi".
[I] May 22 22:03:44 ndm: Network::Interface::Base: "WifiMaster0/AccessPoint1":
description saved.
[I] May 22 22:03:44 ndm: Network::Interface::EthernetIp:
"WifiMaster0/AccessPoint1": ACL type unchanged.
[I] May 22 22:03:44 ndm: Network::Interface::Ip: "WifiMaster0/AccessPoint1":
security level set to "private".
[I] May 22 22:03:44 ndm: Dhcp::Client: WifiMaster0/AccessPoint1 DHCP client DNS
host routes are enabled.
[I] May 22 22:03:44 ndm: Dhcp::Client: WifiMaster0/AccessPoint1 DHCP name servers
are enabled.
[I] May 22 22:03:44 ndm: Network::Interface::Wireless: "WifiMaster0/AccessPoint1":
SSID saved.
[I] May 22 22:03:44 ndm: Network::Interface::Rtx::AccessPoint:
"WifiMaster0/AccessPoint1": WMM extensions enabled.
[I] May 22 22:03:44 ndm: Network::Interface::Base: "WifiMaster0/AccessPoint1":
interface is down.
[I] May 22 22:03:44 ndm: Network::Interface::EthernetIp:
"WifiMaster0/AccessPoint2": ACL type unchanged.
[I] May 22 22:03:44 ndm: Network::Interface::Ip: "WifiMaster0/AccessPoint2":
security level set to "private".
[I] May 22 22:03:44 ndm: Dhcp::Client: WifiMaster0/AccessPoint2 DHCP client DNS
host routes are enabled.
[I] May 22 22:03:44 ndm: Dhcp::Client: WifiMaster0/AccessPoint2 DHCP name servers
are enabled.
[I] May 22 22:03:44 ndm: Network::Interface::Base: "WifiMaster0/AccessPoint2":
interface is down.
[I] May 22 22:03:44 ndm: Network::Interface::EthernetIp:
"WifiMaster0/AccessPoint3": ACL type unchanged.
[I] May 22 22:03:44 ndm: Network::Interface::Ip: "WifiMaster0/AccessPoint3":
security level set to "private".
[I] May 22 22:03:44 ndm: Dhcp::Client: WifiMaster0/AccessPoint3 DHCP client DNS
host routes are enabled.
[I] May 22 22:03:44 ndm: Dhcp::Client: WifiMaster0/AccessPoint3 DHCP name servers
are enabled.
[I] May 22 22:03:44 ndm: Network::Interface::Base: "WifiMaster0/AccessPoint3":
interface is down.
[I] May 22 22:03:44 ndm: Network::Interface::Ip: "WifiMaster0/WifiStation0":
security level set to "public".
[I] May 22 22:03:44 ndm: Network::Interface::Rtx::WifiStation:
"WifiMaster0/WifiStation0": wireless encryption disabled.
[I] May 22 22:03:44 ndm: Dhcp::Client: WifiMaster0/WifiStation0 DHCP client DNS
host routes are enabled.
[I] May 22 22:03:44 ndm: Dhcp::Client: WifiMaster0/WifiStation0 DHCP name servers
are enabled.
[I] May 22 22:03:44 ndm: Network::Interface::Base: "WifiMaster0/WifiStation0":
interface is down.
[I] May 22 22:03:44 ndm: Network::Interface::Rtx::WifiMaster: "WifiMaster1": PHY
mode set.
[I] May 22 22:03:44 ndm: Network::Interface::Rtx::WifiMaster: "WifiMaster1":
channel set to 44.
[I] May 22 22:03:44 ndm: Network::Interface::Rtx::WifiMaster: "WifiMaster1":
channel bandwidth setting applied.
[I] May 22 22:03:44 ndm: Network::Interface::Rtx::WifiMaster: "WifiMaster1": TX
burst enabled.
[I] May 22 22:03:44 ndm: Network::Interface::Rtx::WifiMaster: "WifiMaster1": rekey
interval is 3600 sec.
[I] May 22 22:03:44 ndm: Network::Interface::Rtx::WifiMaster: "WifiMaster1": band
steering enabled.
[I] May 22 22:03:44 ndm: Network::Interface::Rtx::WifiMaster: "WifiMaster1": band
steering preference is 5 GHz.
[I] May 22 22:03:44 ndm: Network::Interface::Rtx::WifiMaster: "WifiMaster1":
explicit beamforming enabled.
[I] May 22 22:03:44 ndm: Network::Interface::Rtx::WifiMaster: "WifiMaster1":
11ac/ax downlink-mumimo enabled.
[I] May 22 22:03:44 ndm: Network::Interface::Base: "WifiMaster1": interface is up.
[I] May 22 22:03:44 ndm: Network::Interface::Base: "WifiMaster1/AccessPoint0":
renamed to "AccessPoint_5G".
[I] May 22 22:03:44 ndm: Network::Interface::Base: "WifiMaster1/AccessPoint0":
description saved.
[I] May 22 22:03:44 ndm: Network::Interface::EthernetIp:
"WifiMaster1/AccessPoint0": ACL type unchanged.
[I] May 22 22:03:44 ndm: Network::Interface::Ip: "WifiMaster1/AccessPoint0":
security level set to "private".
[I] May 22 22:03:44 ndm: Network::Interface::Wifi: "WifiMaster1/AccessPoint0": WPA
PSK set.
[I] May 22 22:03:44 ndm: Network::Interface::Rtx::AccessPoint:
"WifiMaster1/AccessPoint0": wireless encryption enabled.
[I] May 22 22:03:44 ndm: Network::Interface::Rtx::AccessPoint:
"WifiMaster1/AccessPoint0": WPA2 enabled.
[I] May 22 22:03:44 ndm: Dhcp::Client: WifiMaster1/AccessPoint0 DHCP client DNS
host routes are enabled.
[I] May 22 22:03:44 ndm: Dhcp::Client: WifiMaster1/AccessPoint0 DHCP name servers
are enabled.
[I] May 22 22:03:44 ndm: Network::Interface::Wireless: "WifiMaster1/AccessPoint0":
SSID saved.
[I] May 22 22:03:44 ndm: Network::Interface::Rtx::AccessPoint:
"WifiMaster1/AccessPoint0": WMM extensions enabled.
[I] May 22 22:03:44 ndm: Network::Interface::Rtx::AccessPoint:
"WifiMaster1/AccessPoint0": RRM enabled.
[I] May 22 22:03:44 ndm: Network::Interface::Rtx::AccessPoint:
"WifiMaster1/AccessPoint0": BTM enabled.
[I] May 22 22:03:45 kernel: IPv6: ADDRCONF(NETDEV_UP): ra0: link is not ready
[I] May 22 22:03:45 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): ra0: link becomes ready
[I] May 22 22:03:44 ndm: Network::Interface::Base: "WifiMaster1/AccessPoint0":
interface is up.
[I] May 22 22:03:44 ndm: Network::Interface::EthernetIp:
"WifiMaster1/AccessPoint1": ACL type unchanged.
[I] May 22 22:03:44 ndm: Network::Interface::Ip: "WifiMaster1/AccessPoint1":
security level set to "private".
[I] May 22 22:03:44 ndm: Dhcp::Client: WifiMaster1/AccessPoint1 DHCP client DNS
host routes are enabled.
[I] May 22 22:03:44 ndm: Dhcp::Client: WifiMaster1/AccessPoint1 DHCP name servers
are enabled.
[I] May 22 22:03:44 ndm: Network::Interface::Base: "WifiMaster1/AccessPoint1":
interface is down.
[I] May 22 22:03:44 ndm: Network::Interface::EthernetIp:
"WifiMaster1/AccessPoint2": ACL type unchanged.
[I] May 22 22:03:44 ndm: Network::Interface::Ip: "WifiMaster1/AccessPoint2":
security level set to "private".
[I] May 22 22:03:44 ndm: Dhcp::Client: WifiMaster1/AccessPoint2 DHCP client DNS
host routes are enabled.
[I] May 22 22:03:44 ndm: Dhcp::Client: WifiMaster1/AccessPoint2 DHCP name servers
are enabled.
[I] May 22 22:03:44 ndm: Network::Interface::Base: "WifiMaster1/AccessPoint2":
interface is down.
[I] May 22 22:03:44 ndm: Network::Interface::EthernetIp:
"WifiMaster1/AccessPoint3": ACL type unchanged.
[I] May 22 22:03:45 ndm: Network::Interface::Ip: "WifiMaster1/AccessPoint3":
security level set to "private".
[I] May 22 22:03:45 ndm: Dhcp::Client: WifiMaster1/AccessPoint3 DHCP client DNS
host routes are enabled.
[I] May 22 22:03:45 ndm: Dhcp::Client: WifiMaster1/AccessPoint3 DHCP name servers
are enabled.
[I] May 22 22:03:45 ndm: Network::Interface::Base: "WifiMaster1/AccessPoint3":
interface is down.
[I] May 22 22:03:45 ndm: Network::Interface::Ip: "WifiMaster1/WifiStation0":
security level set to "public".
[I] May 22 22:03:45 ndm: Network::Interface::Rtx::WifiStation:
"WifiMaster1/WifiStation0": wireless encryption disabled.
[I] May 22 22:03:45 ndm: Dhcp::Client: WifiMaster1/WifiStation0 DHCP client DNS
host routes are enabled.
[I] May 22 22:03:45 ndm: Dhcp::Client: WifiMaster1/WifiStation0 DHCP name servers
are enabled.
[I] May 22 22:03:45 ndm: Network::Interface::Base: "WifiMaster1/WifiStation0":
interface is down.
[I] May 22 22:03:45 ndm: Network::Interface::Base: "Bridge0": interface is down.
[I] May 22 22:03:45 ndm: Network::Interface::Base: "Bridge0": network MTU reset to
default.
[I] May 22 22:03:45 ndm: Network::Interface::Base: "Bridge0": interface is up.
[I] May 22 22:03:45 ndm: Network::Interface::Repository: "Bridge0" interface
created.
[I] May 22 22:03:46 ndm: Network::Interface::Base: "Bridge0": renamed to "Home".
[I] May 22 22:03:46 ndm: Network::Interface::Base: "Bridge0": description saved.
[I] May 22 22:03:46 kernel: br0: port 1(eth2.1) entered blocking state
[I] May 22 22:03:46 kernel: br0: port 1(eth2.1) entered disabled state
[I] May 22 22:03:46 kernel: device eth2.1 entered promiscuous mode
[I] May 22 22:03:46 kernel: device eth2 entered promiscuous mode
[I] May 22 22:03:46 kernel: br0: port 1(eth2.1) entered blocking state
[I] May 22 22:03:46 kernel: br0: port 1(eth2.1) entered forwarding state
[I] May 22 22:03:46 kernel: br0: disabled STP choke for port 1(eth2.1)
[I] May 22 22:03:46 ndm: Network::Interface::Base: "Bridge0": interface is up.
[I] May 22 22:03:46 ndm: Network::Interface::L3Base: "Bridge0": global priority
unchanged.
[I] May 22 22:03:46 ndm: Network::Interface::L3Base: "Bridge0": global priority
cleared.
[I] May 22 22:03:46 ndm: Network::Interface::Ip: "Bridge0": IP address cleared.
[I] May 22 22:03:46 ndm: Network::Interface::Ip: "Bridge0": IP address cleared.
[I] May 22 22:03:46 ndm: Network::Interface::Mac: "Bridge0": backed up the default
address 50:ff:20:29:9c:1e of "Home" before changing.
[I] May 22 22:03:46 kernel: br0: port 1(eth2.1) entered disabled state
[I] May 22 22:03:46 kernel: br0: port 1(eth2.1) entered blocking state
[I] May 22 22:03:46 kernel: br0: port 1(eth2.1) entered forwarding state
[I] May 22 22:03:46 ndm: Network::Interface::Mac: "Bridge0": MAC address is
50:ff:20:29:9c:1e.
[I] May 22 22:03:46 ndm: Network::Interface::Bridge: "Bridge0":
GigabitEthernet0/Vlan1 inherited in Bridge0.
[I] May 22 22:03:46 kernel: br0: port 2(ra5) entered blocking state
[I] May 22 22:03:46 kernel: br0: port 2(ra5) entered disabled state
[I] May 22 22:03:46 kernel: device ra5 entered promiscuous mode
[I] May 22 22:03:46 kernel: br0: port 2(ra5) entered blocking state
[I] May 22 22:03:46 kernel: br0: port 2(ra5) entered forwarding state
[I] May 22 22:03:47 kernel: br0: disabled STP choke for port 2(ra5)
[I] May 22 22:03:47 kernel: br0: port 2(ra5) entered disabled state
[I] May 22 22:03:47 kernel: br0: port 1(eth2.1) entered disabled state
[I] May 22 22:03:47 kernel: br0: port 2(ra5) entered blocking state
[I] May 22 22:03:47 kernel: br0: port 2(ra5) entered forwarding state
[I] May 22 22:03:47 kernel: br0: port 1(eth2.1) entered blocking state
[I] May 22 22:03:47 kernel: br0: port 1(eth2.1) entered forwarding state
[I] May 22 22:03:47 ndm: Network::Interface::Bridge: "Bridge0": AccessPoint
included.
[I] May 22 22:03:47 kernel: br0: port 3(ra0) entered blocking state
[I] May 22 22:03:47 kernel: br0: port 3(ra0) entered disabled state
[I] May 22 22:03:47 kernel: device ra0 entered promiscuous mode
[I] May 22 22:03:47 kernel: br0: port 3(ra0) entered blocking state
[I] May 22 22:03:47 kernel: br0: port 3(ra0) entered forwarding state
[I] May 22 22:03:47 kernel: br0: disabled STP choke for port 3(ra0)
[I] May 22 22:03:47 kernel: br0: port 3(ra0) entered disabled state
[I] May 22 22:03:47 kernel: br0: port 2(ra5) entered disabled state
[I] May 22 22:03:47 kernel: br0: port 1(eth2.1) entered disabled state
[I] May 22 22:03:47 kernel: br0: port 3(ra0) entered blocking state
[I] May 22 22:03:47 kernel: br0: port 3(ra0) entered forwarding state
[I] May 22 22:03:47 kernel: br0: port 2(ra5) entered blocking state
[I] May 22 22:03:47 kernel: br0: port 2(ra5) entered forwarding state
[I] May 22 22:03:47 kernel: br0: port 1(eth2.1) entered blocking state
[I] May 22 22:03:47 kernel: br0: port 1(eth2.1) entered forwarding state
[I] May 22 22:03:47 ndm: Network::Interface::Bridge: "Bridge0": AccessPoint_5G
included.
[I] May 22 22:03:47 ndm: Network::Interface::EthernetIp: "Bridge0": ACL type
unchanged.
[I] May 22 22:03:47 ndm: Network::Interface::Rtx::MacBand: "Bridge0": bound
d4:5e:ec:6e:1d:13 to 5 GHz.
[I] May 22 22:03:47 ndm: Network::Interface::Rtx::MacBand: "Bridge0": bound
70:3e:ac:58:a6:c7 to 5 GHz.
[I] May 22 22:03:47 ndm: Network::Interface::Rtx::MacBand: "Bridge0": bound
c4:98:80:b7:11:34 to 5 GHz.
[I] May 22 22:03:47 ndm: Network::Interface::Rtx::MacBand: "Bridge0": bound
22:fd:90:7a:6f:12 to 5 GHz.
[I] May 22 22:03:47 ndm: Network::Interface::Ip: "Bridge0": security level set to
"private".
[I] May 22 22:03:47 ndm: Network::Interface::Ip: "Bridge0": IP address is
192.168.1.1/24.
[I] May 22 22:03:47 ndm: Dhcp::Client: Bridge0 DHCP client DNS host routes are
enabled.
[I] May 22 22:03:47 ndm: Dhcp::Client: Bridge0 DHCP name servers are enabled.
[I] May 22 22:03:47 ndm: Igmp::Proxy: added downstream interface Bridge0.
[I] May 22 22:03:47 ndm: Network::Interface::Base: "Bridge0": interface is up.
[I] May 22 22:03:47 ndm: Network::Interface::Base: "Bridge1": interface is down.
[I] May 22 22:03:47 ndm: Network::Interface::Base: "Bridge1": network MTU reset to
default.
[I] May 22 22:03:47 ndm: Network::Interface::Base: "Bridge1": interface is up.
[I] May 22 22:03:47 ndm: Network::Interface::Repository: "Bridge1" interface
created.
[I] May 22 22:03:48 ndm: Network::Interface::Base: "Bridge1": renamed to "Guest".
[I] May 22 22:03:48 ndm: Network::Interface::Base: "Bridge1": description saved.
[I] May 22 22:03:48 ndm: TrafficControl::Manager: "Bridge1" interface rate limited
to 5120 kbit/s.
[I] May 22 22:03:48 kernel: br1: port 1(eth2.3) entered blocking state
[I] May 22 22:03:48 kernel: br1: port 1(eth2.3) entered disabled state
[I] May 22 22:03:48 kernel: device eth2.3 entered promiscuous mode
[I] May 22 22:03:48 kernel: br1: port 1(eth2.3) entered blocking state
[I] May 22 22:03:48 kernel: br1: port 1(eth2.3) entered forwarding state
[I] May 22 22:03:48 kernel: br1: disabled STP choke for port 1(eth2.3)
[I] May 22 22:03:48 ndm: Network::Interface::Bridge: "Bridge1":
GigabitEthernet0/Vlan3 included.
[I] May 22 22:03:48 kernel: br1: port 2(ra6) entered blocking state
[I] May 22 22:03:48 kernel: br1: port 2(ra6) entered disabled state
[I] May 22 22:03:48 kernel: device ra6 entered promiscuous mode
[I] May 22 22:03:48 kernel: br1: disabled STP choke for port 2(ra6)
[I] May 22 22:03:48 ndm: Network::Interface::Bridge: "Bridge1": GuestWiFi included.

[I] May 22 22:03:48 ndm: Network::Interface::EthernetIp: "Bridge1": ACL type


unchanged.
[I] May 22 22:03:48 ndm: Network::Interface::Ip: "Bridge1": security level set to
"protected".
[I] May 22 22:03:48 ndm: Network::Interface::Bridge: "Bridge1": set enhanced
address "52:ff:20:29:9c:1d".
[I] May 22 22:03:48 ndm: Network::Interface::Mac: "GigabitEthernet0/Vlan3": backed
up the default address 50:ff:20:29:9c:1e of "GigabitEthernet0/Vlan3" before
changing.
[I] May 22 22:03:48 kernel: br1: port 1(eth2.3) entered disabled state
[I] May 22 22:03:48 kernel: br1: port 1(eth2.3) entered blocking state
[I] May 22 22:03:48 kernel: br1: port 1(eth2.3) entered forwarding state
[I] May 22 22:03:48 ndm: Network::Interface::Mac: "Bridge1": backed up the default
address 52:ff:20:29:9c:1d of "Guest" before changing.
[I] May 22 22:03:48 kernel: br1: port 1(eth2.3) entered disabled state
[I] May 22 22:03:48 kernel: br1: port 1(eth2.3) entered blocking state
[I] May 22 22:03:48 kernel: br1: port 1(eth2.3) entered forwarding state
[I] May 22 22:03:48 ndm: Network::Interface::Mac: "Bridge1": MAC address is
52:ff:20:29:9c:1d.
[I] May 22 22:03:48 ndm: Network::Interface::Ip: "Bridge1": IP address is
10.1.30.1/24.
[I] May 22 22:03:48 ndm: Dhcp::Client: Bridge1 DHCP client DNS host routes are
enabled.
[I] May 22 22:03:48 ndm: Dhcp::Client: Bridge1 DHCP name servers are enabled.
[I] May 22 22:03:48 ndm: Network::Interface::Base: "Bridge1": interface is up.
[I] May 22 22:03:48 ndm: Network::Interface::Base: "Bridge2": interface is down.
[I] May 22 22:03:48 ndm: Network::Interface::Base: "Bridge2": network MTU reset to
default.
[I] May 22 22:03:48 ndm: Network::Interface::Base: "Bridge2": interface is up.
[I] May 22 22:03:48 ndm: Network::Interface::Repository: "Bridge2" interface
created.
[I] May 22 22:03:49 ndm: Network::Interface::Base: "Bridge2": description saved.
[I] May 22 22:03:49 kernel: br2: port 1(eth2.18) entered blocking state
[I] May 22 22:03:49 kernel: br2: port 1(eth2.18) entered disabled state
[I] May 22 22:03:49 kernel: device eth2.18 entered promiscuous mode
[I] May 22 22:03:49 kernel: br2: port 1(eth2.18) entered blocking state
[I] May 22 22:03:49 kernel: br2: port 1(eth2.18) entered forwarding state
[I] May 22 22:03:49 kernel: br2: disabled STP choke for port 1(eth2.18)
[I] May 22 22:03:49 ndm: Network::Interface::Bridge: "Bridge2":
GigabitEthernet0/Vlan18 included.
[I] May 22 22:03:49 ndm: Network::Interface::EthernetIp: "Bridge2": ACL type
unchanged.
[I] May 22 22:03:49 ndm: Network::Interface::Ip: "Bridge2": security level set to
"protected".
[I] May 22 22:03:49 ndm: Network::Interface::Bridge: "Bridge2": set enhanced
address "52:ff:20:29:9c:1c".
[I] May 22 22:03:49 ndm: Network::Interface::Mac: "GigabitEthernet0/Vlan18": backed
up the default address 50:ff:20:29:9c:1e of "GigabitEthernet0/Vlan18" before
changing.
[I] May 22 22:03:49 kernel: br2: port 1(eth2.18) entered disabled state
[I] May 22 22:03:49 kernel: br2: port 1(eth2.18) entered blocking state
[I] May 22 22:03:49 kernel: br2: port 1(eth2.18) entered forwarding state
[I] May 22 22:03:49 ndm: Network::Interface::Mac: "Bridge2": backed up the default
address 52:ff:20:29:9c:1c of "Bridge2" before changing.
[I] May 22 22:03:49 kernel: br2: port 1(eth2.18) entered disabled state
[I] May 22 22:03:49 kernel: br2: port 1(eth2.18) entered blocking state
[I] May 22 22:03:49 kernel: br2: port 1(eth2.18) entered forwarding state
[I] May 22 22:03:49 ndm: Network::Interface::Mac: "Bridge2": MAC address is
52:ff:20:29:9c:1c.
[I] May 22 22:03:49 ndm: Network::Interface::Ip: "Bridge2": IP address is
10.18.18.0/24.
[I] May 22 22:03:49 ndm: Dhcp::Client: Bridge2 DHCP client DNS host routes are
enabled.
[I] May 22 22:03:49 ndm: Dhcp::Client: Bridge2 DHCP name servers are enabled.
[I] May 22 22:03:49 ndm: Network::Interface::Base: "Bridge2": interface is up.
[I] May 22 22:03:49 ndm: Dhcp::Pool: "_WEBADMIN": assigned IP address range
192.168.1.33 to 192.168.1.152.
[I] May 22 22:03:49 ndm: Dhcp::Server: pool "_WEBADMIN" bound to interface Home.
[I] May 22 22:03:49 ndm: Dhcp::Server: pool "_WEBADMIN" is enabled.
[I] May 22 22:03:49 ndm: Dhcp::Pool: "_WEBADMIN_GUEST_AP": assigned IP address
range 10.1.30.33 to 10.1.30.52.
[I] May 22 22:03:49 ndm: Dhcp::Server: pool "_WEBADMIN_GUEST_AP" bound to interface
Guest.
[I] May 22 22:03:49 ndm: Dhcp::Server: pool "_WEBADMIN_GUEST_AP" is enabled.
[I] May 22 22:03:49 ndm: Dhcp::Server: pool "_WEBADMIN_BRIDGE2" has been created.
[I] May 22 22:03:49 ndm: Dhcp::Pool: "_WEBADMIN_BRIDGE2": assigned IP address range
10.18.18.2 to 10.18.18.41.
[I] May 22 22:03:49 ndm: Dhcp::Pool: "_WEBADMIN_BRIDGE2": set lease time: 25200
seconds.
[I] May 22 22:03:49 ndm: Dhcp::Server: pool "_WEBADMIN_BRIDGE2" bound to interface
Bridge2.
[I] May 22 22:03:49 ndm: Dhcp::Server: pool "_WEBADMIN_BRIDGE2" is enabled.
[I] May 22 22:03:49 ndm: Dhcp::Host: host "00:71:cc:59:fd:73" IP address has been
changed.
[I] May 22 22:03:49 ndm: Dhcp::Server: assigned address 192.168.1.132 to host
"00:71:cc:59:fd:73".
[I] May 22 22:03:49 ndm: Dhcp::Host: host "18:c0:4d:8a:8f:a4" IP address has been
changed.
[I] May 22 22:03:49 ndm: Dhcp::Server: assigned address 192.168.1.111 to host
"18:c0:4d:8a:8f:a4".
[I] May 22 22:03:49 ndm: Dhcp::Host: host "04:42:1a:26:ee:e6" IP address has been
changed.
[I] May 22 22:03:49 ndm: Dhcp::Server: assigned address 192.168.1.11 to host
"04:42:1a:26:ee:e6".
[I] May 22 22:03:49 ndm: Dhcp::Host: host "14:eb:b6:d0:19:dd" IP address has been
changed.
[I] May 22 22:03:49 ndm: Dhcp::Server: assigned address 192.168.1.110 to host
"14:eb:b6:d0:19:dd".
[I] May 22 22:03:49 ndm: Http::Manager: port unchanged.
[I] May 22 22:03:49 ndm: Http::Manager: security level set to private.
[I] May 22 22:03:49 ndm: Http::Manager: bruteforce detection is enabled.
[I] May 22 22:03:49 ndm: Http::Manager: bruteforce detection is reconfigured.
[I] May 22 22:03:49 ndm: Http::Manager: enabled SSL redirect.
[I] May 22 22:03:49 ndm: Network::Nat: a NAT rule added.
[I] May 22 22:03:49 ndm: Core::Syslog: last message repeated 2 times.
[I] May 22 22:03:49 ndm: Network::StaticNat: static NAT rule has been added.
[I] May 22 22:03:49 ndm: Network::StaticNat: static NAT rule disabled.
[I] May 22 22:03:49 ndm: Network::StaticNat: static NAT rule has been added.
[I] May 22 22:03:49 ndm: Network::StaticNat: static NAT rule disabled.
[I] May 22 22:03:49 ndm: Network::StaticNat: static NAT rule has been added.
[I] May 22 22:03:49 ndm: Network::StaticNat: static NAT rule has been added.
[I] May 22 22:03:49 ndm: Telnet::Server: port changed to 1337.
[I] May 22 22:03:49 ndm: Telnet::Server: security level unchanged.
[I] May 22 22:03:49 ndm: Telnet::Server: bruteforce detection is reconfigured.
[I] May 22 22:03:49 ndm: Ftp::Server: port unchanged.
[I] May 22 22:03:49 ndm: Ftp::Server: security level changed to public.
[I] May 22 22:03:49 ndm: Ftp::Server: bruteforce detection is reconfigured.
[I] May 22 22:03:49 ndm: Hotspot::Manager: policy "permit" applied to interface
"Home".
[I] May 22 22:03:49 ndm: Hotspot::Manager: policy "permit" applied to interface
"Guest".
[I] May 22 22:03:49 ndm: Hotspot::Manager: policy "permit" applied to interface
"Bridge2".
[I] May 22 22:03:49 ndm: Hotspot::Manager: rule "permit" applied to host
"ba:e1:8a:58:42:27".
[I] May 22 22:03:49 ndm: Hotspot::Manager: rule "permit" applied to host
"22:fd:90:7a:6f:12".
[I] May 22 22:03:49 ndm: Hotspot::Manager: applied priority "6" to host
"22:fd:90:7a:6f:12".
[I] May 22 22:03:49 ndm: Hotspot::Manager: rule "permit" applied to host
"e2:22:12:8d:52:40".
[I] May 22 22:03:49 ndm: Hotspot::Manager: rule "permit" applied to host
"00:e0:4c:36:02:d4".
[I] May 22 22:03:49 ndm: Hotspot::Manager: rule "permit" applied to host
"18:c0:4d:8a:8f:a4".
[I] May 22 22:03:49 ndm: Hotspot::Manager: applied priority "1" to host
"18:c0:4d:8a:8f:a4".
[I] May 22 22:03:49 ndm: Hotspot::Manager: rule "permit" applied to host
"8e:72:f4:b3:4c:3e".
[I] May 22 22:03:49 ndm: Hotspot::Manager: rule "permit" applied to host
"a4:4b:d5:f3:e4:9f".
[I] May 22 22:03:50 ndm: Hotspot::Manager: rule "permit" applied to host
"70:3e:ac:58:a6:c7".
[I] May 22 22:03:50 ndm: Hotspot::Manager: rule "permit" applied to host
"c4:98:80:b7:11:34".
[I] May 22 22:03:50 ndm: Hotspot::Manager: rule "permit" applied to host
"9a:2e:ea:0a:ec:7a".
[I] May 22 22:03:50 ndm: Hotspot::Manager: rule "permit" applied to host
"d4:5e:ec:6e:1d:13".
[I] May 22 22:03:50 ndm: Hotspot::Manager: applied priority "6" to host
"d4:5e:ec:6e:1d:13".
[I] May 22 22:03:50 ndm: Hotspot::Manager: rule "permit" applied to host
"90:06:28:55:76:af".
[I] May 22 22:03:50 ndm: Hotspot::Manager: rule "permit" applied to host
"00:71:cc:59:fd:73".
[I] May 22 22:03:50 ndm: Hotspot::Manager: rule "permit" applied to host
"04:42:1a:26:ee:e6".
[I] May 22 22:03:50 ndm: Hotspot::Manager: applied priority "6" to host
"04:42:1a:26:ee:e6".
[I] May 22 22:03:50 ndm: Hotspot::Manager: rule "permit" applied to host
"16:eb:b6:d0:19:dd".
[I] May 22 22:03:50 ndm: Hotspot::Manager: rule "permit" applied to host
"00:0c:29:2f:2b:55".
[I] May 22 22:03:50 ndm: Hotspot::Manager: rule "permit" applied to host
"00:0c:29:37:2e:50".
[I] May 22 22:03:50 ndm: Hotspot::Manager: rule "permit" applied to host
"00:0c:29:35:b4:6f".
[I] May 22 22:03:50 ndm: Hotspot::Manager: rule "permit" applied to host
"00:0c:29:d6:7e:3d".
[I] May 22 22:03:50 ndm: Hotspot::Manager: rule "permit" applied to host
"14:eb:b6:d0:19:dd".
[I] May 22 22:03:50 ndm: Hotspot::Manager: applied priority "6" to host
"14:eb:b6:d0:19:dd".
[I] May 22 22:03:50 ndm: Network::Ip6::Subnets: created subnet "Default".
[I] May 22 22:03:50 ndm: Network::Ip6::Subnets: interface "Home" bound to subnet
"Default".
[I] May 22 22:03:50 ndm: Network::Ip6::Subnets: subnet "Default" enabled as SLAAC.
[I] May 22 22:03:50 ndm: Ip6::Firewall: enabled.
[I] May 22 22:03:50 ndm: Network::Interface::Rtx::Ppe: software PPE enabled.
[I] May 22 22:03:50 ndm: Network::Interface::Rtx::Ppe: hardware PPE enabled.
[I] May 22 22:03:50 ndm: Network::Interface::Rtx::Ppe: hardware-ipv6 PPE enabled.
[I] May 22 22:03:50 ndm: UPnP::Manager: using LAN interface: Bridge0.
[I] May 22 22:03:50 ndm: Torrent::Client: RPC port unchanged.
[I] May 22 22:03:50 ndm: Torrent::Client: peer port unchanged.
[I] May 22 22:03:50 ndm: Torrent::Client: peer port changed to 51413.
[I] May 22 22:03:50 ndm: IpSec::CryptoEngineManager: IPsec crypto engine set to
"hardware".
[I] May 22 22:03:50 ndm: IpSec::Manager: "ionline_EY": crypto ike key successfully
added.
[I] May 22 22:03:50 ndm: IpSec::Manager: "ionline_EY": crypto ike proposal
successfully created.
[I] May 22 22:03:50 ndm: IpSec::Manager: "ionline_EY": crypto ike proposal
encryption algorithm "aes-cbc-256" added.
[I] May 22 22:03:50 ndm: IpSec::Manager: "ionline_EY": crypto ike proposal DH group
"2" successfully added.
[I] May 22 22:03:50 ndm: IpSec::Manager: "ionline_EY": crypto ike proposal
integrity algorithm "sha256" successfully added.
[I] May 22 22:03:50 ndm: IpSec::Manager: "ionline_EY": crypto ike policy
successfully created.
[I] May 22 22:03:50 ndm: IpSec::Manager: "ionline_EY": crypto ike proposal
"ionline_EY" successfully added.
[I] May 22 22:03:50 ndm: IpSec::Manager: "ionline_EY": crypto ike policy lifetime
set to 3600 s.
[I] May 22 22:03:50 ndm: IpSec::Manager: "ionline_EY": crypto ike policy mode set
to "ikev2".
[I] May 22 22:03:50 ndm: IpSec::Manager: "ionline_EY": crypto ipsec transform-set
successfully created.
[I] May 22 22:03:50 ndm: IpSec::Manager: "ionline_EY": crypto ipsec transform-set
lifetime set to 3600 s.
[I] May 22 22:03:50 ndm: IpSec::Manager: "ionline_EY": crypto ipsec transform-set
cypher "esp-aes-256" successfully added.
[I] May 22 22:03:50 ndm: IpSec::Manager: "ionline_EY": crypto ipsec transform-set
hmac "esp-sha256-hmac" successfully added.
[I] May 22 22:03:50 ndm: IpSec::Manager: "ionline_EY": crypto ipsec transform-set
dh-group "2" successfully added.
[I] May 22 22:03:50 ndm: IpSec::Manager: "ionline_EY": crypto ipsec profile
successfully created.
[I] May 22 22:03:50 ndm: IpSec::Manager: "ionline_EY": crypto ipsec profile dpd-
interval is set to 30 s.
[I] May 22 22:03:50 ndm: IpSec::Manager: "ionline_EY": crypto ipsec profile
identity-local is set to "7thsorrow.keenetic.pro" with type "fqdn".
[I] May 22 22:03:50 ndm: IpSec::Manager: "ionline_EY": crypto ipsec profile match-
identity-remote is set to "46.32.170.109" with type "address".
[I] May 22 22:03:50 ndm: IpSec::Manager: "ionline_EY": crypto ipsec profile
authentication-local type "pre-share" is set.
[I] May 22 22:03:50 ndm: IpSec::Manager: "ionline_EY": crypto ipsec profile mode
set to "tunnel".
[I] May 22 22:03:50 ndm: IpSec::Manager: "ionline_EY": crypto ipsec profile policy
set to "ionline_EY".
[I] May 22 22:03:50 ndm: IpSec::Manager: MTU is set to auto.
[I] May 22 22:03:50 ndm: IpSec::Manager: "ionline_EY": crypto map successfully
created.
[I] May 22 22:03:50 ndm: IpSec::Manager: "ionline_EY": crypto map primary remote
peer is set to "46.32.170.109".
[I] May 22 22:03:50 ndm: IpSec::Manager: "ionline_EY": crypto map ipsec profile is
set to "ionline_EY".
[I] May 22 22:03:50 ndm: IpSec::Manager: "ionline_EY": crypto map ipsec transform-
set is set to "ionline_EY".
[I] May 22 22:03:50 ndm: IpSec::Manager: "ionline_EY": crypto map match-address set
to "_WEBADMIN_IPSEC_ionline_EY".
[I] May 22 22:03:50 ndm: IpSec::Manager: "ionline_EY": crypto map tcpmss set to
pmtu.
[I] May 22 22:03:50 ndm: IpSec::Manager: "ionline_EY": crypto map autoconnect
enabled.
[I] May 22 22:03:50 ndm: IpSec::Manager: "ionline_EY": crypto map SA renegotiation
enabled.
[I] May 22 22:03:50 ndm: IpSec::Manager: "ionline_EY": crypto map SA passive
reauthentication enabled.
[I] May 22 22:03:50 ndm: IpSec::Manager: "ionline_EY": crypto map Virtual IP mode
disabled.
[I] May 22 22:03:50 ndm: IpSec::ManagerL2tp: "ionline_EY": crypto map L2TP/IPsec
server set LCP echo to "30" : "3".
[I] May 22 22:03:50 ndm: IpSec::ManagerL2tp: "ionline_EY": crypto map L2TP/IPsec
server disabled.
[I] May 22 22:03:50 ndm: IpSec::Manager: "ionline_EY": crypto map enabled.
[I] May 22 22:03:50 ndm: Dhcp::Server: service enabled.
[I] May 22 22:03:50 ndm: Dns::Manager: DNS proxy enabled.
[I] May 22 22:03:50 ndm: Igmp::Proxy: IGMP proxy enabled.
[I] May 22 22:03:50 ndm: Http::Manager: HTTP service was enabled.
[I] May 22 22:03:50 ndm: Telnet::Server: telnet server enabled.
[I] May 22 22:03:50 ndm: Ntp::Server: enabled.
[I] May 22 22:03:50 ndm: Ntp::Client: NTP service enabled.
[I] May 22 22:03:50 ndm: IpSec::Manager: service enabled.
[I] May 22 22:03:50 ndm: Cifs::ServerTsmb: added share "590E-2EB2".
[I] May 22 22:03:50 ndm: Cifs::ServerTsmb: automount enabled.
[I] May 22 22:03:50 ndm: Cifs::ServerTsmb: permissive mode enabled.
[I] May 22 22:03:50 ndm: Dns::Manager: enabled rebind protection.
[I] May 22 22:03:50 ndm: Dns::Secure::ManagerDoh: DNS-over-HTTPS name server
"https://dns.google/dns-query" (dnsm) added.
[I] May 22 22:03:50 ndm: Dns::Filter::Public: associated host "d4:5e:ec:6e:1d:13"
with preset "cloudflare-unfiltered".
[I] May 22 22:03:50 ndm: Dns::Filter::Public: associated host "70:3e:ac:58:a6:c7"
with preset "adguard-default".
[I] May 22 22:03:50 ndm: Dns::Filter::Public: associated host "a4:4b:d5:f3:e4:9f"
with preset "adguard-default".
[I] May 22 22:03:50 ndm: Dns::Filter::Public: associated host "c4:98:80:b7:11:34"
with preset "adguard-default".
[I] May 22 22:03:50 ndm: Dns::Filter::Public: associated host "9a:2e:ea:0a:ec:7a"
with preset "adguard-default".
[I] May 22 22:03:50 ndm: Dns::Filter::Public: associated host "90:06:28:55:76:af"
with preset "adguard-default".
[I] May 22 22:03:50 ndm: Dns::Filter::Public: associated host "ba:e1:8a:58:42:27"
with preset "adguard-default".
[I] May 22 22:03:50 ndm: Dns::Filter::Public: associated host "22:fd:90:7a:6f:12"
with preset "adguard-default".
[I] May 22 22:03:50 ndm: Dns::Manager: enable DNS filter engine "public".
[I] May 22 22:03:50 ndm: Dns::Manager: proxy reload.
[I] May 22 22:03:50 ndm: Dns::Filter::Public: enabled.
[I] May 22 22:03:50 ndm: Mdns::Manager: reflector disabled.
[I] May 22 22:03:50 ndm: Network::InternetChecker: a new check period set to 15
seconds.
[I] May 22 22:03:50 ndm: Network::InternetChecker: a new maximum fail count set to
4.
[I] May 22 22:03:50 ndm: Network::InternetChecker: "google.com" name added.
[I] May 22 22:03:50 ndm: Network::InternetChecker: "facebook.com" name added.
[I] May 22 22:03:50 ndm: Network::InternetChecker: "yahoo.com" name added.
[I] May 22 22:03:50 ndm: EasyConfig::Manager: disabled.
[I] May 22 22:03:50 ndm: Components::Manager: auto-update channel is "stable".
[I] May 22 22:03:50 ndm: CloudControl2::Agent: security level unchanged.
[I] May 22 22:03:50 ndm: Core::Server: system ready, core startup time is 25
seconds.
[I] May 22 22:03:50 ndm: Network::Interface::Switch: "GigabitEthernet0/0": switch
link up at port 1 (100FD/AN).
[I] May 22 22:03:50 ndm: Dns::Secure::DohConfigurator: fallback to built-in DNS to
resolve "dns.google".
[I] May 22 22:03:50 ndm: Network::Interface::Switch: "GigabitEthernet0/2": switch
link up at port 3 (1000FD/AN).
[I] May 22 22:03:52 ndm: Ntp::Client: unable to communicate with "1.pool.ntp.org".
[I] May 22 22:03:52 ndm: Dns::Secure::DohConfigurator: unable to obtain addresses
for "dns.google".
[I] May 22 22:03:52 ndm: Dns::Secure::DohConfigurator: "System": skip service
"https://dns.google/dns-query", wait for bootstrap.
[I] May 22 22:03:52 kernel: br0: port 4(ra9.1) entered blocking state
[I] May 22 22:03:52 kernel: br0: port 4(ra9.1) entered disabled state
[I] May 22 22:03:52 kernel: device ra9.1 entered promiscuous mode
[I] May 22 22:03:52 kernel: device ra9 entered promiscuous mode
[I] May 22 22:03:52 kernel: br0: port 4(ra9.1) entered blocking state
[I] May 22 22:03:52 kernel: br0: port 4(ra9.1) entered forwarding state
[I] May 22 22:03:52 kernel: br0: port 5(ra4.1) entered blocking state
[I] May 22 22:03:52 kernel: br0: port 5(ra4.1) entered disabled state
[I] May 22 22:03:52 kernel: device ra4.1 entered promiscuous mode
[I] May 22 22:03:52 kernel: device ra4 entered promiscuous mode
[I] May 22 22:03:52 kernel: br0: port 5(ra4.1) entered blocking state
[I] May 22 22:03:52 kernel: br0: port 5(ra4.1) entered forwarding state
[I] May 22 22:03:52 ndm: Network::Interface::Rtx::AccessPoint:
"WifiMaster0/AccessPoint0": peer isolation disabled.
[I] May 22 22:03:52 ndm: Network::Interface::Base: "WifiMaster1/AccessPoint0":
schedule cleared.
[I] May 22 22:03:52 ndm: Network::Interface::Wireless: "WifiMaster1/AccessPoint0":
SSID saved.
[I] May 22 22:03:52 ndm: Network::Interface::Rtx::AccessPoint:
"WifiMaster1/AccessPoint0": SSID broadcasting enabled.
[I] May 22 22:03:52 ndm: Network::Interface::Wifi: "WifiMaster1/AccessPoint0": WPA
PSK set.
[I] May 22 22:03:52 ndm: Network::Interface::Rtx::AccessPoint:
"WifiMaster1/AccessPoint0": wireless encryption enabled.
[I] May 22 22:03:52 ndm: Network::Interface::Rtx::AccessPoint:
"WifiMaster1/AccessPoint0": WPA disabled.
[I] May 22 22:03:52 ndm: Network::Interface::Rtx::AccessPoint:
"WifiMaster1/AccessPoint0": WPA2 enabled.
[I] May 22 22:03:52 ndm: Network::Interface::Rtx::AccessPoint:
"WifiMaster1/AccessPoint0": WPA3 disabled.
[I] May 22 22:03:52 ndm: Network::Interface::Rtx::AccessPoint:
"WifiMaster1/AccessPoint0": OWE disabled.
[I] May 22 22:03:52 ndm: Network::Interface::Rtx::AccessPoint:
"WifiMaster1/AccessPoint0": RRM enabled.
[I] May 22 22:03:52 ndm: Network::Interface::Rtx::AccessPoint:
"WifiMaster1/AccessPoint0": BTM enabled.
[I] May 22 22:03:52 ndm: Network::Interface::Rtx::AccessPoint:
"WifiMaster1/AccessPoint0": fast transition disabled.
[I] May 22 22:03:52 ndm: Network::Interface::Rtx::AccessPoint:
"WifiMaster1/AccessPoint0": fast transition MDID reset to default.
[I] May 22 22:03:52 ndm: Network::Interface::Rtx::AccessPoint:
"WifiMaster1/AccessPoint0": peer isolation disabled.
[I] May 22 22:03:52 telnetd: waiting for connections...
[I] May 22 22:03:52 radvd[498]: version 2.15 started
[I] May 22 22:03:53 kernel: br1: port 3(ra9.2) entered blocking state
[I] May 22 22:03:53 kernel: br1: port 3(ra9.2) entered disabled state
[I] May 22 22:03:53 kernel: device ra9.2 entered promiscuous mode
[I] May 22 22:03:53 kernel: br1: port 3(ra9.2) entered blocking state
[I] May 22 22:03:53 kernel: br1: port 3(ra9.2) entered forwarding state
[I] May 22 22:03:53 kernel: br1: port 4(ra4.2) entered blocking state
[I] May 22 22:03:53 kernel: br1: port 4(ra4.2) entered disabled state
[I] May 22 22:03:53 kernel: device ra4.2 entered promiscuous mode
[I] May 22 22:03:53 kernel: br1: port 4(ra4.2) entered blocking state
[I] May 22 22:03:53 kernel: br1: port 4(ra4.2) entered forwarding state
[I] May 22 22:03:53 ndm: Network::Interface::Rtx::AccessPoint:
"WifiMaster0/AccessPoint1": peer isolation disabled.
[I] May 22 22:03:53 kernel: br2: port 2(ra9.3) entered blocking state
[I] May 22 22:03:53 kernel: br2: port 2(ra9.3) entered disabled state
[I] May 22 22:03:53 kernel: device ra9.3 entered promiscuous mode
[I] May 22 22:03:53 kernel: br2: port 2(ra9.3) entered blocking state
[I] May 22 22:03:53 kernel: br2: port 2(ra9.3) entered forwarding state
[I] May 22 22:03:53 kernel: br2: port 3(ra4.3) entered blocking state
[I] May 22 22:03:53 kernel: br2: port 3(ra4.3) entered disabled state
[I] May 22 22:03:53 kernel: device ra4.3 entered promiscuous mode
[I] May 22 22:03:53 kernel: br2: port 3(ra4.3) entered blocking state
[I] May 22 22:03:53 kernel: br2: port 3(ra4.3) entered forwarding state
[I] May 22 22:03:53 ndm: Hotspot::Discovery::Explorer: "Bridge0": Interface Bridge0
IPv4 neighbour explorer started.
[I] May 22 22:03:53 ndm: Hotspot::Discovery::Explorer: "Bridge1": Interface Bridge1
IPv4 neighbour explorer started.
[I] May 22 22:03:53 ndm: Usb::Hotplug::Manager: scanning hardware...
[I] May 22 22:03:53 ndm: Usb::Hotplug::Manager: scanning hardware: done.
[I] May 22 22:03:53 ndm: Http::Manager: disabled NDMP passthrough.
[I] May 22 22:03:53 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/igmpsn.ko.
[I] May 22 22:03:53 kernel: igmpsn: NDM IGMP Switch Snooping Module, v4.3.3
[I] May 22 22:03:53 ndm: Ip6::Discovery::Explorer: "Bridge0": Interface Bridge0
IPv6 neighbour explorer started.
[I] May 22 22:03:53 ndm: Ip6::Discovery::Explorer: "Bridge1": Interface Bridge1
IPv6 neighbour explorer started.
[I] May 22 22:03:53 ndm: Network::Interface::Rtx::WifiMaster: "WifiMaster0": auto
channel mode set.
[I] May 22 22:03:54 ndm: Http::Nginx: loaded SSL certificate for
"a571102056c5831e867aaef8.keenetic.io".
[I] May 22 22:03:54 bndstrg: band steering control daemon v1.0-29 started
[I] May 22 22:03:54 ndm: Http::Nginx: loaded SSL certificate for
"7thsorrow.keenetic.pro".
[I] May 22 22:03:54 ndm: Dns::Secure::DotConfigurator: fallback to built-in DNS to
resolve "dns.adguard-dns.com".
[I] May 22 22:03:55 coalagent: version 0.4.51 starting on 192.168.1.1.
[I] May 22 22:03:55 wind: version 1.0.2 started on br0.
[I] May 22 22:03:55 ndm: Core::Server: started Session /var/run/ndm.core.socket.
[I] May 22 22:03:55 ndm: Core::Session: client disconnected.
[I] May 22 22:03:55 ndm: Http::Manager: updated configuration.
[I] May 22 22:03:55 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/hw_nat.ko.
[I] May 22 22:03:55 kernel: Ralink/MTK HW NAT 5.0.5.0-28 Module Enabled, FoE Size:
16384
[I] May 22 22:03:55 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/fastvpn.ko.
[I] May 22 22:03:55 ndhcps: NDM DHCP Server, v3.2.51.
[I] May 22 22:03:55 kernel: fastvpn: sizeof(bind) = 264
[I] May 22 22:03:55 kernel: fastvpn: sizeof(hashent) = 88
[I] May 22 22:03:55 kernel: fastvpn: registered
[I] May 22 22:03:55 kernel: fastvpn: enabled
[I] May 22 22:03:55 kernel: fastvpn: Fast VPN init, v6.0-14-1
[I] May 22 22:03:55 kernel: fastvpn: PPPoE/IPoE LAN software acceleration is
disabled
[I] May 22 22:03:55 ndhcps: NDM DHCP Server, v3.2.51.
[I] May 22 22:03:55 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/nf_conntrack_sip.ko.
[I] May 22 22:03:55 ndm: Core::Server: started Session /var/run/ndm.core.socket.
[I] May 22 22:03:55 ndhcps: NDM DHCP Server, v3.2.51.
[I] May 22 22:03:55 ndm: Core::Session: client disconnected.
[I] May 22 22:03:55 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/nf_nat_sip.ko.
[I] May 22 22:03:55 coalagent: updating configuration...
[I] May 22 22:03:55 ndm: Core::Server: started Session /var/run/ndm.core.socket.
[I] May 22 22:03:55 ndm: Core::Session: client disconnected.
[I] May 22 22:03:55 ndm: Core::Server: started Session /var/run/ndm.core.socket.
[I] May 22 22:03:55 ndm: Core::Session: client disconnected.
[I] May 22 22:03:55 nimproxy: NDM IGMP/Multicast Proxy, v0.0.36.
[I] May 22 22:03:55 ndm: Ntp::Client: unable to communicate with "2.pool.ntp.org".
[I] May 22 22:03:55 avahi-daemon[521]: avahi-daemon 0.8 starting up.
[I] May 22 22:03:55 kernel: br0: port 3(ra0) entered disabled state
[I] May 22 22:03:56 kernel: br0: port 2(ra5) entered disabled state
[I] May 22 22:03:56 ndm: Dns::Secure::DotConfigurator: unable to obtain addresses
for "dns.adguard-dns.com".
[I] May 22 22:03:56 ndm: Dns::Secure::DotConfigurator: "System": skip service
"dns.adguard-dns.com:853", wait for bootstrap.
[I] May 22 22:03:56 ndm: Dns::Secure::DotConfigurator: fallback to built-in DNS to
resolve "cloudflare-dns.com".
[I] May 22 22:03:56 ndm: IpSec::CryptoEngineManager: start load hardware crypto
processing.
[I] May 22 22:03:56 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/eip93_cryptoapi.ko.
[I] May 22 22:03:57 kernel: EIP93: AES acceleration registered
[I] May 22 22:03:57 kernel: EIP93: DES/3DES acceleration registered
[I] May 22 22:03:57 kernel: EIP93: CryptoAPI started (v 0.11, ring size: 256)
[I] May 22 22:03:57 ndm: IpSec::CryptoEngineManager: hardware crypto processing was
enabled.
[I] May 22 22:03:57 ndm: IpSec::Manager: create IPsec reconfiguration transaction.
[I] May 22 22:03:57 ndm: IpSec::Manager: reconfiguration transaction was created
#1.
[I] May 22 22:03:57 kernel: br0: port 2(ra5) entered blocking state
[I] May 22 22:03:57 kernel: br0: port 2(ra5) entered forwarding state
[I] May 22 22:03:57 kernel: IPv6: ADDRCONF(NETDEV_UP): ra0: link is not ready
[I] May 22 22:03:57 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): ra0: link becomes ready
[I] May 22 22:03:57 kernel: br0: port 3(ra0) entered blocking state
[I] May 22 22:03:57 kernel: br0: port 3(ra0) entered forwarding state
[I] May 22 22:03:57 kernel: IPv6: ADDRCONF(NETDEV_UP): ra9: link is not ready
[I] May 22 22:03:57 kernel: IPv6: ADDRCONF(NETDEV_UP): ra4: link is not ready
[I] May 22 22:03:58 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): ra9: link becomes ready
[I] May 22 22:03:58 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): ra4: link becomes ready
[I] May 22 22:03:58 ndm: Dns::Secure::DotConfigurator: unable to obtain addresses
for "cloudflare-dns.com".
[I] May 22 22:03:58 ndm: Dns::Secure::DotConfigurator: "System": skip service
"cloudflare-dns.com:853", wait for bootstrap.
[I] May 22 22:03:58 ndm: Dns::Secure::DohConfigurator: fallback to built-in DNS to
resolve "dns.google".
[I] May 22 22:04:00 ndm: Dns::Secure::DohConfigurator: unable to obtain addresses
for "dns.google".
[I] May 22 22:04:00 ndm: Dns::Secure::DohConfigurator: "System": skip service
"https://dns.google/dns-query", wait for bootstrap.
[I] May 22 22:04:00 ndm: Dns::Secure::DohConfigurator: fallback to built-in DNS to
resolve "dns.adguard-dns.com".
[I] May 22 22:04:02 ndm: Dns::Secure::DohConfigurator: unable to obtain addresses
for "dns.adguard-dns.com".
[I] May 22 22:04:02 ndm: Dns::Secure::DohConfigurator: "System": skip service
"https://dns.adguard-dns.com/dns-query", wait for bootstrap.
[I] May 22 22:04:02 ndm: Dns::Secure::DohConfigurator: fallback to built-in DNS to
resolve "cloudflare-dns.com".
[I] May 22 22:04:03 kernel: ACS result: Primary Channel 7, Min Channel Busy = 14,
BW = 20
[I] May 22 22:04:03 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster0/AccessPoint0": BSS(ra5) channel switched to 7.
[I] May 22 22:04:04 ndm: Dns::Secure::DohConfigurator: unable to obtain addresses
for "cloudflare-dns.com".
[I] May 22 22:04:04 ndm: Dns::Secure::DohConfigurator: "System": skip service
"https://cloudflare-dns.com/dns-query", wait for bootstrap.
[I] May 22 22:04:04 ndnproxy: stopped.
[I] May 22 22:04:04 ndm: Dns::Secure::DotConfigurator: fallback to built-in DNS to
resolve "dns.adguard-dns.com".
[I] May 22 22:04:04 ndm: Core::Server: started Session /var/run/ndm.core.socket.
[I] May 22 22:04:04 ndm: Core::Session: client disconnected.
[I] May 22 22:04:05 kernel: capability: warning: `nginx' uses 32-bit capabilities
(legacy support in use)
[I] May 22 22:04:05 ndm: Ntp::Client: unable to communicate with "3.pool.ntp.org".
[I] May 22 22:04:06 ndm: Dns::Secure::DotConfigurator: unable to obtain addresses
for "dns.adguard-dns.com".
[I] May 22 22:04:06 ndm: Dns::Secure::DotConfigurator: fallback to built-in DNS to
resolve "cloudflare-dns.com".
[I] May 22 22:04:06 ndnproxy: NDM DNS Proxy, v1.3.0b55-1.
[I] May 22 22:04:06 ndnproxy: PID file: /var/ndnproxymain.pid.
[I] May 22 22:04:06 ndnproxy: stats. file: /var/ndnproxymain.stat.
[I] May 22 22:04:08 ndm: Dns::Secure::DotConfigurator: unable to obtain addresses
for "cloudflare-dns.com".
[I] May 22 22:04:08 ndm: Dns::Manager: rescheduling DNS-over-TLS bootstrap.
[I] May 22 22:04:08 ndm: Dns::Secure::DohConfigurator: fallback to built-in DNS to
resolve "dns.google".
[I] May 22 22:04:10 ndm: Dns::Secure::DohConfigurator: unable to obtain addresses
for "dns.google".
[I] May 22 22:04:10 ndm: Dns::Secure::DohConfigurator: fallback to built-in DNS to
resolve "dns.adguard-dns.com".
[I] May 22 22:04:12 ndm: Dns::Secure::DohConfigurator: unable to obtain addresses
for "dns.adguard-dns.com".
[I] May 22 22:04:12 ndm: Dns::Secure::DohConfigurator: fallback to built-in DNS to
resolve "cloudflare-dns.com".
[I] May 22 22:04:14 ndm: Dns::Secure::DohConfigurator: unable to obtain addresses
for "cloudflare-dns.com".
[I] May 22 22:04:14 ndm: Dns::Manager: rescheduling DNS-over-HTTPS bootstrap.
[I] May 22 22:04:14 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/nf_conntrack_ftp.ko.
[I] May 22 22:04:14 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/nf_nat_ftp.ko.
[I] May 22 22:04:14 bndstrg: band steering: finished
[I] May 22 22:04:15 ndm: Network::Interface::Base: "WifiMaster1/AccessPoint0":
schedule cleared.
[I] May 22 22:04:15 ndm: Network::Interface::Wireless: "WifiMaster1/AccessPoint0":
SSID saved.
[I] May 22 22:04:15 ndm: Network::Interface::Rtx::AccessPoint:
"WifiMaster1/AccessPoint0": SSID broadcasting enabled.
[I] May 22 22:04:15 ndm: Network::Interface::Wifi: "WifiMaster1/AccessPoint0": WPA
PSK set.
[I] May 22 22:04:15 ndm: Network::Interface::Rtx::AccessPoint:
"WifiMaster1/AccessPoint0": wireless encryption enabled.
[I] May 22 22:04:15 ndm: Network::Interface::Rtx::AccessPoint:
"WifiMaster1/AccessPoint0": WPA disabled.
[I] May 22 22:04:15 ndm: Network::Interface::Rtx::AccessPoint:
"WifiMaster1/AccessPoint0": WPA2 enabled.
[I] May 22 22:04:15 ndm: Network::Interface::Rtx::AccessPoint:
"WifiMaster1/AccessPoint0": WPA3 disabled.
[I] May 22 22:04:15 ndm: Network::Interface::Rtx::AccessPoint:
"WifiMaster1/AccessPoint0": OWE disabled.
[I] May 22 22:04:15 ndm: Network::Interface::Rtx::AccessPoint:
"WifiMaster1/AccessPoint0": RRM enabled.
[I] May 22 22:04:15 ndm: Network::Interface::Rtx::AccessPoint:
"WifiMaster1/AccessPoint0": BTM enabled.
[I] May 22 22:04:15 ndm: Network::Interface::Rtx::AccessPoint:
"WifiMaster1/AccessPoint0": fast transition disabled.
[I] May 22 22:04:15 ndm: Network::Interface::Rtx::AccessPoint:
"WifiMaster1/AccessPoint0": fast transition MDID reset to default.
[I] May 22 22:04:15 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(14:eb:b6:d0:19:de) had associated successfully.
[I] May 22 22:04:15 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(14:eb:b6:d0:19:de) set key done in WPA2/WPA2PSK.
[I] May 22 22:04:16 ndm: IpSec::Manager: create IPsec reconfiguration transaction.
[I] May 22 22:04:17 ndm: IpSec::Manager: "ionline_EY": add crypto map config.
[I] May 22 22:04:17 ndm: IpSec::Manager: reconfiguration transaction was created
#1.
[I] May 22 22:04:17 bndstrg: band steering control daemon v1.0-29 started
[I] May 22 22:04:17 ndm: IpSec::Configurator: start applying configuration #1.
[I] May 22 22:04:17 ndm: IpSec::CryptoMapInfo: "ionline_EY": initialized runtime
info #11.
[I] May 22 22:04:17 ndm: IpSec::Configurator: configuration applied #1.
[I] May 22 22:04:17 ndm: IpSec::IpSecNetfilter: start reloading netfilter
configuration...
[I] May 22 22:04:17 ndm: IpSec::IpSecNetfilter: netfilter configuration reloading
is done.
[I] May 22 22:04:17 ndhcps: DHCPDISCOVER received from 14:eb:b6:d0:19:dd.
[I] May 22 22:04:17 ndhcps: making OFFER of 192.168.1.110 to 14:eb:b6:d0:19:dd.
[I] May 22 22:04:17 ndhcps: DHCPREQUEST received (STATE_SELECTING) for
192.168.1.110 from 14:eb:b6:d0:19:dd.
[I] May 22 22:04:17 ndm: Ntp::Client: unable to communicate with "0.pool.ntp.org".
[I] May 22 22:04:18 ndhcps: sending ACK of 192.168.1.110 to 14:eb:b6:d0:19:dd.
[I] May 22 22:04:18 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had associated successfully.
[I] May 22 22:04:18 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 22 22:04:18 ndhcps: DHCPREQUEST received (STATE_INIT) for 192.168.1.35 from
22:fd:90:7a:6f:12.
[I] May 22 22:04:18 ndhcps: sending ACK of 192.168.1.35 to 22:fd:90:7a:6f:12.
[I] May 22 22:04:19 bndstrg: band steering: enabled
[I] May 22 22:04:19 ipsec: Starting strongSwan 5.9.7 IPsec [starter]...
[I] May 22 22:04:19 ipsec: 00[DMN] Starting IKE charon daemon (strongSwan 5.9.7,
Linux 4.9-ndm-5, mips)
[I] May 22 22:04:19 ipsec: 00[LIB] providers loaded by OpenSSL: legacy default
[I] May 22 22:04:19 ipsec: 00[CFG] loading secrets
[I] May 22 22:04:19 ipsec: 00[CFG] loaded 1 RADIUS server configuration
[I] May 22 22:04:19 ipsec: 00[CFG] enabling systime-fix, threshold: Tue Jan 1
00:00:00 2030
[I] May 22 22:04:19 ipsec: 00[CFG]
[I] May 22 22:04:19 ipsec: 00[CFG] starting system time check, interval: 10s
[I] May 22 22:04:19 ipsec: 00[LIB] loaded plugins: charon ndm-pem random save-keys
nonce x509 pubkey pkcs7 pem openssl pkcs8 xcbc cmac hmac ctr attr kernel-netlink
resolve socket-default stroke vici updown eap-identity eap-md5 eap-mschapv2 eap-
dynamic eap-radius eap-peap xauth-generic xauth-eap error-notify systime-fix unity
counters
[I] May 22 22:04:19 ipsec: 00[LIB] dropped capabilities, running as uid 65534, gid
65534
[I] May 22 22:04:19 ndm: Io::UnixStreamSocket: connected after 6 retries.
[I] May 22 22:04:19 ipsec: 15[CFG] loaded IKE shared key with id 'ionline_EY-PSK'
for: '7thsorrow.keenetic.pro', '46.32.170.109'
[I] May 22 22:04:19 ipsec: 09[CFG] loaded 0 entries for attr plugin configuration
[I] May 22 22:04:19 ipsec: 09[CFG] loaded 1 RADIUS server configuration
[I] May 22 22:04:19 ipsec: 15[CFG] added vici connection: ionline_EY
[I] May 22 22:04:19 ipsec: 15[CFG] initiating 'ionline_EY'
[I] May 22 22:04:19 ipsec: 15[IKE] initiating IKE_SA ionline_EY[1] to 46.32.170.109

[I] May 22 22:04:19 ipsec: 15[IKE] unable to determine source address, faking NAT
situation
[I] May 22 22:04:20 ndm: Network::Interface::Ethernet: "GigabitEthernet1": link up
(100FD/AN).
[I] May 22 22:04:20 ndm: Dns::Secure::DotConfigurator: fallback to built-in DNS to
resolve "dns.adguard-dns.com".
[I] May 22 22:04:22 ndhcpc: GigabitEthernet1: NDM DHCP Client, v3.2.51.
[I] May 22 22:04:22 ndhcpc: GigabitEthernet1: created PID file "/var/run/ndhcpc-
eth3.pid".
[I] May 22 22:04:22 ndm: Dns::Secure::DotConfigurator: unable to obtain addresses
for "dns.adguard-dns.com".
[I] May 22 22:04:22 ndm: Dns::Secure::DotConfigurator: fallback to built-in DNS to
resolve "cloudflare-dns.com".
[I] May 22 22:04:24 ndm: Dns::Secure::DotConfigurator: unable to obtain addresses
for "cloudflare-dns.com".
[I] May 22 22:04:24 ndm: Dns::Manager: rescheduling DNS-over-TLS bootstrap.
[I] May 22 22:04:24 ndm: Dns::Secure::DohConfigurator: fallback to built-in DNS to
resolve "dns.google".
[I] May 22 22:04:26 ndm: Dns::Secure::DohConfigurator: unable to obtain addresses
for "dns.google".
[I] May 22 22:04:26 ndm: Dns::Secure::DohConfigurator: fallback to built-in DNS to
resolve "dns.adguard-dns.com".
[I] May 22 22:04:27 ipsec: 03[IKE] retransmit 1 of request with message ID 0
[I] May 22 22:04:28 ndm: Dns::Secure::DohConfigurator: unable to obtain addresses
for "dns.adguard-dns.com".
[I] May 22 22:04:28 ndm: Dns::Secure::DohConfigurator: fallback to built-in DNS to
resolve "cloudflare-dns.com".
[I] May 22 22:04:30 ndm: Dns::Secure::DohConfigurator: unable to obtain addresses
for "cloudflare-dns.com".
[I] May 22 22:04:30 ndm: Dns::Manager: rescheduling DNS-over-HTTPS bootstrap.
[I] May 22 22:04:36 ndm: Dns::Secure::DotConfigurator: fallback to built-in DNS to
resolve "dns.adguard-dns.com".
[I] May 22 22:04:38 ndm: Dns::Secure::DotConfigurator: unable to obtain addresses
for "dns.adguard-dns.com".
[I] May 22 22:04:38 ndm: Dns::Secure::DotConfigurator: fallback to built-in DNS to
resolve "cloudflare-dns.com".
[I] May 22 22:04:39 ipsec: 08[IKE] retransmit 2 of request with message ID 0
[I] May 22 22:04:40 ndm: Dns::Secure::DotConfigurator: unable to obtain addresses
for "cloudflare-dns.com".
[I] May 22 22:04:40 ndm: Dns::Manager: rescheduling DNS-over-TLS bootstrap.
[I] May 22 22:04:40 ndm: Dns::Secure::DohConfigurator: fallback to built-in DNS to
resolve "dns.google".
[I] May 22 22:04:42 ndm: Dns::Secure::DohConfigurator: unable to obtain addresses
for "dns.google".
[I] May 22 22:04:42 ndm: Dns::Secure::DohConfigurator: fallback to built-in DNS to
resolve "dns.adguard-dns.com".
[I] May 22 22:04:44 ndm: Dns::Secure::DohConfigurator: unable to obtain addresses
for "dns.adguard-dns.com".
[I] May 22 22:04:44 ndm: Dns::Secure::DohConfigurator: fallback to built-in DNS to
resolve "cloudflare-dns.com".
[I] May 22 22:04:46 ndm: Dns::Secure::DohConfigurator: unable to obtain addresses
for "cloudflare-dns.com".
[I] May 22 22:04:46 ndm: Dns::Manager: rescheduling DNS-over-HTTPS bootstrap.
[I] May 22 22:04:49 ipsec: 05[IKE] retransmit 3 of request with message ID 0
[I] May 22 22:04:52 ndm: Dns::Secure::DotConfigurator: fallback to built-in DNS to
resolve "dns.adguard-dns.com".
[I] May 22 22:04:54 ndm: Dns::Secure::DotConfigurator: unable to obtain addresses
for "dns.adguard-dns.com".
[I] May 22 22:04:54 ndm: Dns::Secure::DotConfigurator: fallback to built-in DNS to
resolve "cloudflare-dns.com".
[I] May 22 22:04:56 ndm: Dns::Secure::DotConfigurator: unable to obtain addresses
for "cloudflare-dns.com".
[I] May 22 22:04:56 ndm: Dns::Manager: rescheduling DNS-over-TLS bootstrap.
[I] May 22 22:04:56 ndm: Dns::Secure::DohConfigurator: fallback to built-in DNS to
resolve "dns.google".
[I] May 22 22:04:58 ndm: Dns::Secure::DohConfigurator: unable to obtain addresses
for "dns.google".
[I] May 22 22:04:58 ndm: Dns::Secure::DohConfigurator: fallback to built-in DNS to
resolve "dns.adguard-dns.com".
[I] May 22 22:04:59 ndm: Network::Interface::Switch: "GigabitEthernet0/2": switch
link down at port 3.
[I] May 22 22:05:00 ipsec: 03[IKE] retransmit 4 of request with message ID 0
[I] May 22 22:05:00 ndm: Dns::Secure::DohConfigurator: unable to obtain addresses
for "dns.adguard-dns.com".
[I] May 22 22:05:00 ndm: Dns::Secure::DohConfigurator: fallback to built-in DNS to
resolve "cloudflare-dns.com".
[I] May 22 22:05:02 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had disassociated by STA
(reason: STA is leaving or has left BSS).
[I] May 22 22:05:02 ndm: Dns::Secure::DohConfigurator: unable to obtain addresses
for "cloudflare-dns.com".
[I] May 22 22:05:02 ndm: Dns::Manager: rescheduling DNS-over-HTTPS bootstrap.
[I] May 22 22:05:04 ndm: Network::Interface::Switch: "GigabitEthernet0/2": switch
link up at port 3 (1000FD/AN).
[I] May 22 22:05:04 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster0/AccessPoint0": STA(c8:3d:dc:ae:52:77) had associated successfully.
[I] May 22 22:05:05 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster0/AccessPoint0": STA(c8:3d:dc:ae:52:77) set key done in WPA2/WPA2PSK.
[I] May 22 22:05:05 ndhcps: DHCPDISCOVER received from c8:3d:dc:ae:52:77.
[I] May 22 22:05:05 ndhcps: making OFFER of 192.168.1.88 to c8:3d:dc:ae:52:77.
[I] May 22 22:05:05 ndhcps: DHCPREQUEST received (STATE_SELECTING) for 192.168.1.88
from c8:3d:dc:ae:52:77.
[I] May 22 22:05:05 ndhcps: sending ACK of 192.168.1.88 to c8:3d:dc:ae:52:77.
[I] May 22 22:05:08 ndm: Dns::Secure::DotConfigurator: fallback to built-in DNS to
resolve "dns.adguard-dns.com".
[I] May 22 22:05:10 ndm: Dns::Secure::DotConfigurator: unable to obtain addresses
for "dns.adguard-dns.com".
[I] May 22 22:05:10 ndm: Dns::Secure::DotConfigurator: fallback to built-in DNS to
resolve "cloudflare-dns.com".
[I] May 22 22:05:11 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(a4:4b:d5:f3:e4:9f) had associated successfully.
[I] May 22 22:05:11 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(a4:4b:d5:f3:e4:9f) set key done in WPA2/WPA2PSK.
[I] May 22 22:05:11 ndhcps: DHCPDISCOVER received from a4:4b:d5:f3:e4:9f.
[I] May 22 22:05:11 ipsec: 03[IKE] retransmit 5 of request with message ID 0
[I] May 22 22:05:12 ndhcps: making OFFER of 192.168.1.80 to a4:4b:d5:f3:e4:9f.
[I] May 22 22:05:12 ndhcps: DHCPREQUEST received (STATE_SELECTING) for 192.168.1.80
from a4:4b:d5:f3:e4:9f.
[I] May 22 22:05:12 ndhcps: sending ACK of 192.168.1.80 to a4:4b:d5:f3:e4:9f.
[I] May 22 22:05:12 ndm: Dns::Secure::DotConfigurator: unable to obtain addresses
for "cloudflare-dns.com".
[I] May 22 22:05:12 ndm: Dns::Manager: rescheduling DNS-over-TLS bootstrap.
[I] May 22 22:05:12 ndm: Dns::Secure::DohConfigurator: fallback to built-in DNS to
resolve "dns.google".
[I] May 22 22:05:14 ndm: Dns::Secure::DohConfigurator: unable to obtain addresses
for "dns.google".
[I] May 22 22:05:14 ndm: Dns::Secure::DohConfigurator: fallback to built-in DNS to
resolve "dns.adguard-dns.com".
[I] May 22 22:05:16 ndm: Dns::Secure::DohConfigurator: unable to obtain addresses
for "dns.adguard-dns.com".
[I] May 22 22:05:16 ndm: Dns::Secure::DohConfigurator: fallback to built-in DNS to
resolve "cloudflare-dns.com".
[I] May 22 22:05:17 ndm: Network::Interface::Switch: "GigabitEthernet0/2": switch
link down at port 3.
[I] May 22 22:05:18 ndm: Dns::Secure::DohConfigurator: unable to obtain addresses
for "cloudflare-dns.com".
[I] May 22 22:05:18 ndm: Dns::Manager: rescheduling DNS-over-HTTPS bootstrap.
[I] May 22 22:05:20 ndm: Network::Interface::Switch: "GigabitEthernet0/2": switch
link up at port 3 (1000FD/AN).
[I] May 22 22:05:21 ndhcps: DHCPREQUEST received (STATE_INIT) for 192.168.1.11 from
04:42:1a:26:ee:e6.
[I] May 22 22:05:21 ndhcps: sending ACK of 192.168.1.11 to 04:42:1a:26:ee:e6.
[I] May 22 22:05:24 ipsec: 09[IKE] retransmit 6 of request with message ID 0
[I] May 22 22:05:24 ndm: Dns::Secure::DotConfigurator: fallback to built-in DNS to
resolve "dns.adguard-dns.com".
[I] May 22 22:05:26 ndm: Dns::Secure::DotConfigurator: unable to obtain addresses
for "dns.adguard-dns.com".
[I] May 22 22:05:26 ndm: Dns::Secure::DotConfigurator: fallback to built-in DNS to
resolve "cloudflare-dns.com".
[I] May 22 22:05:28 ndm: Dns::Secure::DotConfigurator: unable to obtain addresses
for "cloudflare-dns.com".
[I] May 22 22:05:28 ndm: Dns::Manager: rescheduling DNS-over-TLS bootstrap.
[I] May 22 22:05:28 ndm: Dns::Secure::DohConfigurator: fallback to built-in DNS to
resolve "dns.google".
[I] May 22 22:05:30 ndm: Dns::Secure::DohConfigurator: unable to obtain addresses
for "dns.google".
[I] May 22 22:05:30 ndm: Dns::Secure::DohConfigurator: fallback to built-in DNS to
resolve "dns.adguard-dns.com".
[I] May 22 22:05:32 ndm: Dns::Secure::DohConfigurator: unable to obtain addresses
for "dns.adguard-dns.com".
[I] May 22 22:05:32 ndm: Dns::Secure::DohConfigurator: fallback to built-in DNS to
resolve "cloudflare-dns.com".
[I] May 22 22:05:34 ndm: Dns::Secure::DohConfigurator: unable to obtain addresses
for "cloudflare-dns.com".
[I] May 22 22:05:34 ndm: Dns::Manager: rescheduling DNS-over-HTTPS bootstrap.
[I] May 22 22:05:39 ipsec: 14[IKE] retransmit 7 of request with message ID 0
[I] May 22 22:05:40 ndm: Dns::Secure::DotConfigurator: fallback to built-in DNS to
resolve "dns.adguard-dns.com".
[I] May 22 22:05:42 ndm: Dns::Secure::DotConfigurator: unable to obtain addresses
for "dns.adguard-dns.com".
[I] May 22 22:05:42 ndm: Dns::Secure::DotConfigurator: fallback to built-in DNS to
resolve "cloudflare-dns.com".
[I] May 22 22:05:44 ndm: Dns::Secure::DotConfigurator: unable to obtain addresses
for "cloudflare-dns.com".
[I] May 22 22:05:44 ndm: Dns::Manager: rescheduling DNS-over-TLS bootstrap.
[I] May 22 22:05:44 ndm: Dns::Secure::DohConfigurator: fallback to built-in DNS to
resolve "dns.google".
[I] May 22 22:05:46 ndm: Dns::Secure::DohConfigurator: unable to obtain addresses
for "dns.google".
[I] May 22 22:05:46 ndm: Dns::Secure::DohConfigurator: fallback to built-in DNS to
resolve "dns.adguard-dns.com".
[I] May 22 22:05:48 ndm: Dns::Secure::DohConfigurator: unable to obtain addresses
for "dns.adguard-dns.com".
[I] May 22 22:05:48 ndm: Dns::Secure::DohConfigurator: fallback to built-in DNS to
resolve "cloudflare-dns.com".
[I] May 22 22:05:50 ndm: Dns::Secure::DohConfigurator: unable to obtain addresses
for "cloudflare-dns.com".
[I] May 22 22:05:50 ndm: Dns::Manager: rescheduling DNS-over-HTTPS bootstrap.
[E] May 22 22:05:53 ndm: Core::Ndss: [669] no internet connection.
[I] May 22 22:05:54 ipsec: 11[IKE] retransmit 8 of request with message ID 0
[I] May 22 22:05:56 ndm: Dns::Secure::DotConfigurator: fallback to built-in DNS to
resolve "dns.adguard-dns.com".
[I] May 22 22:05:58 ndm: Dns::Secure::DotConfigurator: unable to obtain addresses
for "dns.adguard-dns.com".
[I] May 22 22:05:58 ndm: Dns::Secure::DotConfigurator: fallback to built-in DNS to
resolve "cloudflare-dns.com".
[I] May 22 22:06:00 ndm: Dns::Secure::DotConfigurator: unable to obtain addresses
for "cloudflare-dns.com".
[I] May 22 22:06:00 ndm: Dns::Manager: rescheduling DNS-over-TLS bootstrap.
[I] May 22 22:06:00 ndm: Dns::Secure::DohConfigurator: fallback to built-in DNS to
resolve "dns.google".
[I] May 22 22:06:02 ndm: Dns::Secure::DohConfigurator: unable to obtain addresses
for "dns.google".
[I] May 22 22:06:02 ndm: Dns::Secure::DohConfigurator: fallback to built-in DNS to
resolve "dns.adguard-dns.com".
[I] May 22 22:06:04 ndm: Dns::Secure::DohConfigurator: unable to obtain addresses
for "dns.adguard-dns.com".
[I] May 22 22:06:04 ndm: Dns::Secure::DohConfigurator: fallback to built-in DNS to
resolve "cloudflare-dns.com".
[I] May 22 22:06:06 ndm: Dns::Secure::DohConfigurator: unable to obtain addresses
for "cloudflare-dns.com".
[I] May 22 22:06:06 ndm: Dns::Manager: rescheduling DNS-over-HTTPS bootstrap.
[I] May 22 22:06:11 ipsec: 09[IKE] giving up after 8 retransmits
[E] May 22 22:06:11 ndm: IpSec::Configurator: "ionline_EY": remote peer is down.
[I] May 22 22:06:11 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 0, active CHILD SA: 0, down.
[W] May 22 22:06:11 ndm: IpSec::Configurator: "ionline_EY": fallback peer is not
defined, retry.
[I] May 22 22:06:11 ndm: IpSec::Configurator: "ionline_EY": schedule reconnect.
[I] May 22 22:06:11 ipsec: 09[IKE] establishing IKE_SA failed, peer not responding
[I] May 22 22:06:12 ndm: Dns::Secure::DotConfigurator: fallback to built-in DNS to
resolve "dns.adguard-dns.com".
[I] May 22 22:06:14 ndm: Dns::Secure::DotConfigurator: unable to obtain addresses
for "dns.adguard-dns.com".
[I] May 22 22:06:14 ndm: Dns::Secure::DotConfigurator: fallback to built-in DNS to
resolve "cloudflare-dns.com".
[I] May 22 22:06:16 ndm: Dns::Secure::DotConfigurator: unable to obtain addresses
for "cloudflare-dns.com".
[I] May 22 22:06:16 ndm: Dns::Manager: rescheduling DNS-over-TLS bootstrap.
[I] May 22 22:06:16 ndm: Dns::Secure::DohConfigurator: fallback to built-in DNS to
resolve "dns.google".
[I] May 22 22:06:18 ndm: Dns::Secure::DohConfigurator: unable to obtain addresses
for "dns.google".
[I] May 22 22:06:18 ndm: Dns::Secure::DohConfigurator: fallback to built-in DNS to
resolve "dns.adguard-dns.com".
[I] May 22 22:06:20 ndm: Dns::Secure::DohConfigurator: unable to obtain addresses
for "dns.adguard-dns.com".
[I] May 22 22:06:20 ndm: Dns::Secure::DohConfigurator: fallback to built-in DNS to
resolve "cloudflare-dns.com".
[I] May 22 22:06:22 ndm: Dns::Secure::DohConfigurator: unable to obtain addresses
for "cloudflare-dns.com".
[I] May 22 22:06:22 ndm: Dns::Manager: rescheduling DNS-over-HTTPS bootstrap.
[I] May 22 22:06:28 ndm: Dns::Secure::DotConfigurator: fallback to built-in DNS to
resolve "dns.adguard-dns.com".
[I] May 22 22:06:30 ndm: Dns::Secure::DotConfigurator: unable to obtain addresses
for "dns.adguard-dns.com".
[I] May 22 22:06:30 ndm: Dns::Secure::DotConfigurator: fallback to built-in DNS to
resolve "cloudflare-dns.com".
[I] May 22 22:06:32 ndm: Dns::Secure::DotConfigurator: unable to obtain addresses
for "cloudflare-dns.com".
[I] May 22 22:06:32 ndm: Dns::Manager: rescheduling DNS-over-TLS bootstrap.
[I] May 22 22:06:32 ndm: Dns::Secure::DohConfigurator: fallback to built-in DNS to
resolve "dns.google".
[I] May 22 22:06:33 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster0/AccessPoint0": STA(c8:3d:dc:ae:52:77) had deauthenticated by STA
(reason: STA is leaving or has left BSS).
[I] May 22 22:06:34 ndm: Dns::Secure::DohConfigurator: unable to obtain addresses
for "dns.google".
[I] May 22 22:06:34 ndm: Dns::Secure::DohConfigurator: fallback to built-in DNS to
resolve "dns.adguard-dns.com".
[I] May 22 22:06:36 ndhcpc: GigabitEthernet1: received OFFER for 78.109.53.15 from
37.26.63.129.
[I] May 22 22:06:36 ndm: Dns::Secure::DohConfigurator: unable to obtain addresses
for "dns.adguard-dns.com".
[I] May 22 22:06:36 ndm: Dns::Secure::DohConfigurator: fallback to built-in DNS to
resolve "cloudflare-dns.com".
[I] May 22 22:06:38 ndm: Dns::Secure::DohConfigurator: unable to obtain addresses
for "cloudflare-dns.com".
[I] May 22 22:06:38 ndm: Dns::Manager: rescheduling DNS-over-HTTPS bootstrap.
[I] May 22 22:06:44 ndm: Dns::Secure::DotConfigurator: fallback to built-in DNS to
resolve "dns.adguard-dns.com".
[I] May 22 22:06:46 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 22 22:06:46 ndm: Dhcp::Client: configuring interface ISP.
[I] May 22 22:06:46 ndm: Network::Interface::Ip: "GigabitEthernet1": IP address is
78.109.53.15/26.
[I] May 22 22:06:46 ndm: Dhcp::Client: obtained IP address 78.109.53.15/26.
[I] May 22 22:06:46 ndm: Dhcp::Client: interface "ISP" is global, priority 63507.
[I] May 22 22:06:46 ndm: Dhcp::Client: adding a default route via 78.109.53.1.
[I] May 22 22:06:46 ndm: Dns::Secure::DotConfigurator: unable to obtain addresses
for "dns.adguard-dns.com".
[I] May 22 22:06:46 ndm: Dns::Secure::DotConfigurator: fallback to built-in DNS to
resolve "cloudflare-dns.com".
[I] May 22 22:06:46 ndm: Dns::Manager: rescheduling DNS-over-TLS bootstrap.
[I] May 22 22:06:46 ndm: Dns::Secure::DohConfigurator: fallback to built-in DNS to
resolve "dns.google".
[I] May 22 22:06:47 ndm: Dns::Secure::DohConfigurator: fallback to built-in DNS to
resolve "dns.adguard-dns.com".
[I] May 22 22:06:47 ndm: Dns::Secure::DohConfigurator: fallback to built-in DNS to
resolve "cloudflare-dns.com".
[I] May 22 22:06:47 ndm: Dns::Manager: updating DNS-over-HTTPS servers addresses.
[I] May 22 22:06:47 ndm: Dns::Secure::DohConfigurator: "System": using
"dns.google:443:8.8.4.4,8.8.8.8" as upstream.
[I] May 22 22:06:47 ndm: Dns::Secure::DohConfigurator: "System": using
"dns.adguard-dns.com:443:94.140.14.14,94.140.15.15" as upstream.
[I] May 22 22:06:47 ndm: Dns::Secure::DohConfigurator: "System": using "cloudflare-
dns.com:443:104.16.248.249,104.16.249.249" as upstream.
[I] May 22 22:06:47 ndm: Dhcp::Client: name server 81.21.80.23 is ignored.
[I] May 22 22:06:47 ndm: Dhcp::Client: name server 81.21.80.26 is ignored.
[I] May 22 22:06:47 nimproxy: NDM IGMP/Multicast proxy stopped (exit status: 0).
[I] May 22 22:06:47 ndm: Network::InterfaceFlusher: flushed conntrack and route
cache.
[I] May 22 22:06:47 ndm: Dns::Secure::DotConfigurator: fallback to built-in DNS to
resolve "dns.adguard-dns.com".
[I] May 22 22:06:47 ndm: Dns::Secure::DotConfigurator: "System": using
"dns.adguard-dns.com:853:94.140.14.14,94.140.15.15" as upstream.
[I] May 22 22:06:47 ndm: Dns::Secure::DotConfigurator: "System": using "cloudflare-
dns.com:853:104.16.248.249,104.16.249.249" as upstream.
[I] May 22 22:06:47 ndm: Dns::Secure::DohConfigurator: "System": using
"dns.google:443:8.8.4.4,8.8.8.8" as upstream.
[I] May 22 22:06:47 ndm: Dns::Secure::DohConfigurator: "System": using
"dns.adguard-dns.com:443:94.140.14.14,94.140.15.15" as upstream.
[I] May 22 22:06:47 ndm: Dns::Secure::DohConfigurator: "System": using "cloudflare-
dns.com:443:104.16.248.249,104.16.249.249" as upstream.
[I] May 22 22:06:47 ndnproxy: answer from wrong socket, ignore.
[I] May 22 22:06:48 ndm: Http::Nginx: loaded SSL certificate for
"a571102056c5831e867aaef8.keenetic.io".
[I] May 22 22:06:48 ndm: Http::Nginx: loaded SSL certificate for
"7thsorrow.keenetic.pro".
[I] May 22 22:06:48 ndm: Core::Server: started Session /var/run/ndm.core.socket.
[I] May 22 22:06:48 ndm: Core::Session: client disconnected.
[I] May 22 22:06:48 ndm: Http::Manager: updated configuration.
[I] May 22 22:06:48 ndm: Core::Server: started Session /var/run/ndm.core.socket.
[I] May 22 22:06:48 ndm: Core::Session: client disconnected.
[I] May 22 22:06:49 nimproxy: NDM IGMP/Multicast Proxy, v0.0.36.
[I] May 22 22:06:49 stubby: starting Stubby 0.4.0
[I] May 22 22:06:49 stubby: starting Stubby 0.4.0
[I] May 22 22:06:51 ndm: Core::Server: started Session /var/run/ndm.core.socket.
[I] May 22 22:06:51 upnp: HTTP listening on port 1900
[I] May 22 22:06:51 upnp: Listening for NAT-PMP/PCP traffic on port 5351
[I] May 22 22:06:51 ndm: Network::InternetChecker: Internet access detected.
[I] May 22 22:06:52 ndnproxy: answer from wrong socket, ignore.
[I] May 24 18:34:32 ndm: Core::System::Clock: system time has been changed.
[I] May 24 18:34:32 ndm: Ntp::Client: time synchronized with "0.pool.ntp.org".
[I] May 24 18:34:32 ndm: Dns::Secure::DotConfigurator: "System": using
"dns.adguard-dns.com:853:94.140.14.14,94.140.15.15" as upstream.
[I] May 24 18:34:32 ndm: Dns::Secure::DotConfigurator: "System": using "cloudflare-
dns.com:853:104.16.248.249,104.16.249.249" as upstream.
[I] May 24 18:34:32 https-dns-proxy: Shutting down gracefully. To force exit, send
signal again.
[I] May 24 18:34:32 https-dns-proxy: Core::Syslog: last message repeated 2 times.
[I] May 24 18:34:32 ndm: Dns::Secure::DohConfigurator: "System": using
"dns.google:443:8.8.4.4,8.8.8.8" as upstream.
[I] May 24 18:34:32 ndm: Dns::Secure::DohConfigurator: "System": using
"dns.adguard-dns.com:443:94.140.14.14,94.140.15.15" as upstream.
[I] May 24 18:34:32 ndm: Dns::Secure::DohConfigurator: "System": using "cloudflare-
dns.com:443:104.16.248.249,104.16.249.249" as upstream.
[I] May 24 18:34:33 ndm: Dns::Secure::DotConfigurator: fallback to built-in DNS to
resolve "dns.adguard-dns.com".
[I] May 24 18:34:33 ndm: Dns::Secure::DotConfigurator: fallback to built-in DNS to
resolve "cloudflare-dns.com".
[I] May 24 18:34:33 ndnproxy: answer from wrong socket, ignore.
[I] May 24 18:34:33 ndm: Dns::Secure::DohConfigurator: fallback to built-in DNS to
resolve "dns.google".
[I] May 24 18:34:33 ndm: Dns::Secure::DohConfigurator: fallback to built-in DNS to
resolve "dns.adguard-dns.com".
[E] May 24 18:34:33 ndnproxy: Proxy loop detected: 127.0.0.1 <-> 127.0.0.1, request
dropped.
[I] May 24 18:34:33 ndm: Dns::Secure::DohConfigurator: fallback to built-in DNS to
resolve "cloudflare-dns.com".
[I] May 24 18:34:34 stubby: starting Stubby 0.4.0
[I] May 24 18:34:34 stubby: starting Stubby 0.4.0
[I] May 24 18:34:34 ndnproxy: answer from wrong socket, ignore.
[E] May 24 18:34:34 ndm: Cloud::Agent: cannot connect to the cloud server.
[I] May 24 18:34:34 ndnproxy: answer from wrong socket, ignore.
[I] May 24 18:34:39 ipsec: 06[CFG] system time jump detected from 1684778809s to
1684938879s, initiate SA rekeying
[I] May 24 18:34:42 ndm: Dns::Manager: added static record for
"a571102056c5831e867aaef8.keenetic.io", address 78.47.125.180.
[I] May 24 18:34:43 ndm: Http::Nginx: loaded SSL certificate for
"a571102056c5831e867aaef8.keenetic.io".
[I] May 24 18:34:43 ndm: Http::Nginx: loaded SSL certificate for
"7thsorrow.keenetic.pro".
[I] May 24 18:34:43 ndm: Core::Server: started Session /var/run/ndm.core.socket.
[I] May 24 18:34:43 ndm: Core::Session: client disconnected.
[I] May 24 18:34:43 ndm: Http::Manager: updated configuration.
[I] May 24 18:34:43 ndm: Core::Server: started Session /var/run/ndm.core.socket.
[I] May 24 18:34:43 ndm: Core::Session: client disconnected.
[I] May 24 18:34:55 ndm: IpSec::Configurator: "ionline_EY": reconnecting.
[I] May 24 18:34:55 ipsec: 03[CFG] vici initiate CHILD_SA 'ionline_EY'
[I] May 24 18:34:55 ipsec: 14[IKE] initiating IKE_SA ionline_EY[2] to 46.32.170.109

[I] May 24 18:34:55 ipsec: 11[CFG] received proposals:


IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
[I] May 24 18:34:55 ipsec: 11[CFG] configured proposals:
IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
[I] May 24 18:34:55 ipsec: 11[CFG] selected proposal:
IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
[I] May 24 18:34:56 ipsec: 11[IKE] linked key for crypto map 'ionline_EY' is not
found, still searching
[I] May 24 18:34:56 ipsec: 11[IKE] authentication of '7thsorrow.keenetic.pro'
(myself) with pre-shared key
[I] May 24 18:34:56 ipsec: 11[IKE] establishing CHILD_SA ionline_EY{1}
[I] May 24 18:34:56 ipsec: 14[IKE] linked key for crypto map 'ionline_EY' is not
found, still searching
[I] May 24 18:34:56 ipsec: 14[IKE] authentication of '46.32.170.109' with pre-
shared key successful
[I] May 24 18:34:56 ipsec: 14[IKE] IKE_SA ionline_EY[2] established between
78.109.53.15[7thsorrow.keenetic.pro]...46.32.170.109[46.32.170.109]
[I] May 24 18:34:56 ipsec: 14[IKE] scheduling rekeying in 3580s
[I] May 24 18:34:56 ipsec: 14[IKE] maximum IKE_SA lifetime 3600s
[I] May 24 18:34:56 ipsec: 14[IKE] received ESP_TFC_PADDING_NOT_SUPPORTED, not
using ESPv3 TFC padding
[I] May 24 18:34:56 ipsec: 14[CFG] received proposals:
ESP:AES_CBC=256/HMAC_SHA2_256_128/NO_EXT_SEQ
[I] May 24 18:34:56 ipsec: 14[CFG] configured proposals:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 24 18:34:56 ipsec: 14[CFG] selected proposal:
ESP:AES_CBC=256/HMAC_SHA2_256_128/NO_EXT_SEQ
[I] May 24 18:34:56 ipsec: 14[IKE] CHILD_SA ionline_EY{1} established with SPIs
c773dc41_i cba9efe2_o and TS 192.168.1.0/24 === 172.16.102.0/24
[I] May 24 18:34:56 ndm: IpSec::Configurator: "ionline_EY": crypto map started.
[W] May 24 18:34:56 ndm: IpSec::Configurator: "ionline_EY": crypto map is up.
[I] May 24 18:34:56 ndm: IpSec::Configurator: "ionline_EY": reconnection for crypto
map was cancelled.
[I] May 24 18:34:56 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 1, active CHILD SA: 0.
[I] May 24 18:34:56 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 1, active CHILD SA: 1, state up.
[I] May 24 18:34:56 ndm: IpSec::IpSecNetfilter: start reloading netfilter
configuration...
[I] May 24 18:34:56 ndm: IpSec::IpSecNetfilter: netfilter configuration reloading
is done.
[I] May 24 18:35:01 ndnproxy: answer from wrong socket, ignore.
[I] May 24 18:35:02 ndm: Http::Nginx: loaded SSL certificate for
"a571102056c5831e867aaef8.keenetic.io".
[I] May 24 18:35:02 ndm: Http::Nginx: loaded SSL certificate for
"7thsorrow.keenetic.pro".
[I] May 24 18:35:02 ndm: Core::Server: started Session /var/run/ndm.core.socket.
[I] May 24 18:35:02 ndm: Core::Session: client disconnected.
[I] May 24 18:35:02 ndm: Http::Manager: updated configuration.
[I] May 24 18:35:02 ndm: Core::Server: started Session /var/run/ndm.core.socket.
[I] May 24 18:35:02 ndm: Core::Session: client disconnected.
[I] May 24 18:35:17 ndm: Network::Interface::Switch: "GigabitEthernet0/0": switch
link down at port 1.
[I] May 24 18:35:19 ndm: Network::Interface::Switch: "GigabitEthernet0/0": switch
link up at port 1 (100FD/AN).
[I] May 24 18:35:25 ndnproxy: answer from wrong socket, ignore.
[I] May 24 18:36:31 ndnproxy: Core::Syslog: last message repeated 2 times.
[I] May 24 18:36:39 coalagent: updating configuration...
[I] May 24 18:36:41 coalagent: updating configuration...
[I] May 24 18:36:46 ndnproxy: answer from wrong socket, ignore.
[I] May 24 18:41:40 ndnproxy: Core::Syslog: last message repeated 4 times.
[I] May 24 18:42:30 ipsec: 14[IKE] message verification failed
[I] May 24 18:42:30 ipsec: 14[IKE] IKE_SA_INIT request with message ID 0 processing
failed
[I] May 24 18:44:21 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster0/AccessPoint0": STA(c8:3d:dc:ae:52:77) had associated successfully.
[I] May 24 18:44:21 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster0/AccessPoint0": STA(c8:3d:dc:ae:52:77) set key done in WPA2/WPA2PSK.
[I] May 24 18:44:21 ndhcps: DHCPDISCOVER received from c8:3d:dc:ae:52:77.
[I] May 24 18:44:21 ndhcps: making OFFER of 192.168.1.88 to c8:3d:dc:ae:52:77.
[I] May 24 18:44:21 ndhcps: DHCPREQUEST received (STATE_SELECTING) for 192.168.1.88
from c8:3d:dc:ae:52:77.
[I] May 24 18:44:21 ndhcps: sending ACK of 192.168.1.88 to c8:3d:dc:ae:52:77.
[I] May 24 18:44:22 ndnproxy: answer from wrong socket, ignore.
[I] May 24 18:47:01 ndnproxy: Core::Syslog: last message repeated 4 times.
[I] May 24 18:49:27 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 24 18:50:16 ndnproxy: answer from wrong socket, ignore.
[I] May 24 18:52:07 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(d4:5e:ec:6e:1d:13) had associated successfully.
[I] May 24 18:52:07 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(d4:5e:ec:6e:1d:13) set key done in WPA2/WPA2PSK.
[I] May 24 18:52:07 ndhcps: DHCPDISCOVER received from d4:5e:ec:6e:1d:13.
[I] May 24 18:52:08 ndhcps: making OFFER of 192.168.1.84 to d4:5e:ec:6e:1d:13.
[I] May 24 18:52:08 ndhcps: DHCPREQUEST received (STATE_SELECTING) for 192.168.1.84
from d4:5e:ec:6e:1d:13.
[I] May 24 18:52:08 ndhcps: sending ACK of 192.168.1.84 to d4:5e:ec:6e:1d:13.
[I] May 24 18:52:17 ndnproxy: answer from wrong socket, ignore.
[I] May 24 19:01:50 ndnproxy: Core::Syslog: last message repeated 14 times.
[I] May 24 19:04:27 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 24 19:05:28 ndnproxy: answer from wrong socket, ignore.
[I] May 24 19:17:21 ndnproxy: Core::Syslog: last message repeated 6 times.
[I] May 24 19:19:27 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 24 19:23:19 ndnproxy: answer from wrong socket, ignore.
[I] May 24 19:23:45 ndnproxy: answer from wrong socket, ignore.
[I] May 24 19:24:13 ipsec: 03[IKE] received ESP_TFC_PADDING_NOT_SUPPORTED, not
using ESPv3 TFC padding
[I] May 24 19:24:13 ipsec: 03[CFG] received proposals:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 24 19:24:13 ipsec: 03[CFG] configured proposals:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 24 19:24:13 ipsec: 03[CFG] selected proposal:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 24 19:24:13 ipsec: 03[IKE] inbound CHILD_SA ionline_EY{2} established with
SPIs cf4acc10_i c0d13cd6_o and TS 192.168.1.0/24 === 172.16.102.0/24
[I] May 24 19:24:13 ndm: IpSec::Configurator: "ionline_EY": crypto map was
renegotiated.
[I] May 24 19:24:13 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 1, active CHILD SA: 0.
[I] May 24 19:24:13 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 1, active CHILD SA: 1, state up.
[I] May 24 19:24:13 ipsec: 07[IKE] received DELETE for ESP CHILD_SA with SPI
cba9efe2
[I] May 24 19:24:13 ipsec: 07[IKE] closing CHILD_SA ionline_EY{1} with SPIs
c773dc41_i (0 bytes) cba9efe2_o (0 bytes) and TS 192.168.1.0/24 === 172.16.102.0/24

[I] May 24 19:24:13 ipsec: 07[IKE] sending DELETE for ESP CHILD_SA with SPI
c773dc41
[I] May 24 19:24:13 ipsec: 07[IKE] CHILD_SA closed
[I] May 24 19:24:13 ipsec: 07[IKE] outbound CHILD_SA ionline_EY{2} established with
SPIs cf4acc10_i c0d13cd6_o and TS 192.168.1.0/24 === 172.16.102.0/24
[I] May 24 19:24:13 ndm: IpSec::IpSecNetfilter: start reloading netfilter
configuration...
[I] May 24 19:24:13 ndm: IpSec::IpSecNetfilter: netfilter configuration reloading
is done.
[I] May 24 19:24:23 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 1, active CHILD SA: 1.
[I] May 24 19:24:23 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 1, active CHILD SA: 1.
[I] May 24 19:29:17 ndnproxy: answer from wrong socket, ignore.
[I] May 24 19:31:00 ndnproxy: answer from wrong socket, ignore.
[I] May 24 19:33:05 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(14:eb:b6:d0:19:de) GTK rekey done, group cipher
AES.
[I] May 24 19:33:05 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(d4:5e:ec:6e:1d:13) GTK rekey done, group cipher
AES.
[I] May 24 19:33:05 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(a4:4b:d5:f3:e4:9f) GTK rekey done, group cipher
AES.
[I] May 24 19:33:11 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster0/AccessPoint0": STA(c8:3d:dc:ae:52:77) GTK rekey done, group cipher
AES.
[I] May 24 19:34:27 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 24 19:34:36 ipsec: 06[IKE] initiating IKE_SA ionline_EY[4] to 46.32.170.109

[I] May 24 19:34:36 ipsec: 03[CFG] received proposals:


IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
[I] May 24 19:34:36 ipsec: 03[CFG] configured proposals:
IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
[I] May 24 19:34:36 ipsec: 03[CFG] selected proposal:
IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
[I] May 24 19:34:36 ipsec: 03[IKE] scheduling rekeying in 3570s
[I] May 24 19:34:36 ipsec: 03[IKE] maximum IKE_SA lifetime 3590s
[I] May 24 19:34:36 ipsec: 03[IKE] IKE_SA ionline_EY[4] rekeyed between
78.109.53.15[7thsorrow.keenetic.pro]...46.32.170.109[46.32.170.109]
[I] May 24 19:34:36 ipsec: 03[IKE] deleting IKE_SA ionline_EY[2] between
78.109.53.15[7thsorrow.keenetic.pro]...46.32.170.109[46.32.170.109]
[I] May 24 19:34:36 ipsec: 03[IKE] sending DELETE for IKE_SA ionline_EY[2]
[I] May 24 19:34:36 ipsec: 13[IKE] IKE_SA deleted
[I] May 24 19:38:21 ndnproxy: answer from wrong socket, ignore.
[I] May 24 19:38:55 ndnproxy: Core::Syslog: last message repeated 4 times.
[I] May 24 19:39:32 ndhcps: DHCPREQUEST received (STATE_INIT) for 192.168.1.94 from
00:e0:4c:36:02:d4.
[I] May 24 19:39:32 ndhcps: sending ACK of 192.168.1.94 to 00:e0:4c:36:02:d4.
[I] May 24 19:40:39 ndnproxy: answer from wrong socket, ignore.
[I] May 24 19:46:43 ndnproxy: Core::Syslog: last message repeated 6 times.
[I] May 24 19:46:58 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had associated successfully.
[I] May 24 19:46:58 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 24 19:46:58 ndhcps: DHCPREQUEST received (STATE_INIT) for 192.168.1.35 from
22:fd:90:7a:6f:12.
[I] May 24 19:46:58 ndhcps: sending ACK of 192.168.1.35 to 22:fd:90:7a:6f:12.
[I] May 24 19:47:00 ndnproxy: answer from wrong socket, ignore.
[I] May 24 19:49:15 ndnproxy: Core::Syslog: last message repeated 2 times.
[I] May 24 19:49:27 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 24 19:52:15 ndnproxy: answer from wrong socket, ignore.
[I] May 24 20:02:24 ndnproxy: Core::Syslog: last message repeated 10 times.
[I] May 24 20:02:35 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 24 20:02:36 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 24 20:02:36 ndnproxy: answer from wrong socket, ignore.
[I] May 24 20:03:14 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 24 20:03:14 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 24 20:04:27 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 24 20:04:30 ndnproxy: answer from wrong socket, ignore.
[I] May 24 20:12:13 ndnproxy: Core::Syslog: last message repeated 9 times.
[I] May 24 20:12:30 ndm: Network::Interface::Switch: "GigabitEthernet0/0": switch
link down at port 1.
[I] May 24 20:12:32 ndhcps: DHCPREQUEST received (STATE_INIT) for 192.168.1.111
from 18:c0:4d:8a:8f:a4.
[I] May 24 20:12:32 ndhcps: sending ACK of 192.168.1.111 to 18:c0:4d:8a:8f:a4.
[I] May 24 20:12:33 ndm: Network::Interface::Switch: "GigabitEthernet0/0": switch
link up at port 1 (1000FD/AN).
[I] May 24 20:12:55 ndnproxy: answer from wrong socket, ignore.
[I] May 24 20:13:27 ndnproxy: answer from wrong socket, ignore.
[I] May 24 20:13:45 ipsec: 05[IKE] received ESP_TFC_PADDING_NOT_SUPPORTED, not
using ESPv3 TFC padding
[I] May 24 20:13:45 ipsec: 05[CFG] received proposals:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 24 20:13:45 ipsec: 05[CFG] configured proposals:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 24 20:13:45 ipsec: 05[CFG] selected proposal:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 24 20:13:45 ipsec: 05[IKE] inbound CHILD_SA ionline_EY{3} established with
SPIs c2433435_i c7614193_o and TS 192.168.1.0/24 === 172.16.102.0/24
[I] May 24 20:13:45 ndm: IpSec::Configurator: "ionline_EY": crypto map was
renegotiated.
[I] May 24 20:13:45 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 1, active CHILD SA: 0.
[I] May 24 20:13:45 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 2, active CHILD SA: 1, state up.
[I] May 24 20:13:45 ipsec: 13[IKE] received DELETE for ESP CHILD_SA with SPI
c0d13cd6
[I] May 24 20:13:45 ipsec: 13[IKE] closing CHILD_SA ionline_EY{2} with SPIs
cf4acc10_i (0 bytes) c0d13cd6_o (0 bytes) and TS 192.168.1.0/24 === 172.16.102.0/24
[I] May 24 20:13:45 ipsec: 13[IKE] sending DELETE for ESP CHILD_SA with SPI
cf4acc10
[I] May 24 20:13:45 ipsec: 13[IKE] CHILD_SA closed
[I] May 24 20:13:45 ipsec: 13[IKE] outbound CHILD_SA ionline_EY{3} established with
SPIs c2433435_i c7614193_o and TS 192.168.1.0/24 === 172.16.102.0/24
[I] May 24 20:13:45 ndm: IpSec::IpSecNetfilter: start reloading netfilter
configuration...
[I] May 24 20:13:45 ndm: IpSec::IpSecNetfilter: netfilter configuration reloading
is done.
[I] May 24 20:13:55 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 2, active CHILD SA: 1.
[I] May 24 20:13:55 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 2, active CHILD SA: 1.
[I] May 24 20:15:51 ndnproxy: answer from wrong socket, ignore.
[I] May 24 20:17:13 ndnproxy: Core::Syslog: last message repeated 6 times.
[I] May 24 20:19:27 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 24 20:19:47 ndnproxy: answer from wrong socket, ignore.
[I] May 24 20:34:00 ndnproxy: Core::Syslog: last message repeated 7 times.
[I] May 24 20:34:06 ipsec: 07[IKE] initiating IKE_SA ionline_EY[5] to 46.32.170.109

[I] May 24 20:34:06 ipsec: 12[CFG] received proposals:


IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
[I] May 24 20:34:06 ipsec: 12[CFG] configured proposals:
IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
[I] May 24 20:34:06 ipsec: 12[CFG] selected proposal:
IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
[I] May 24 20:34:06 ipsec: 12[IKE] scheduling rekeying in 3576s
[I] May 24 20:34:06 ipsec: 12[IKE] maximum IKE_SA lifetime 3596s
[I] May 24 20:34:06 ipsec: 12[IKE] IKE_SA ionline_EY[5] rekeyed between
78.109.53.15[7thsorrow.keenetic.pro]...46.32.170.109[46.32.170.109]
[I] May 24 20:34:06 ipsec: 12[IKE] deleting IKE_SA ionline_EY[4] between
78.109.53.15[7thsorrow.keenetic.pro]...46.32.170.109[46.32.170.109]
[I] May 24 20:34:06 ipsec: 12[IKE] sending DELETE for IKE_SA ionline_EY[4]
[I] May 24 20:34:06 ipsec: 06[IKE] IKE_SA deleted
[I] May 24 20:34:28 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 24 20:34:33 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(d4:5e:ec:6e:1d:13) GTK rekey done, group cipher
AES.
[I] May 24 20:34:33 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(14:eb:b6:d0:19:de) GTK rekey done, group cipher
AES.
[I] May 24 20:34:33 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) GTK rekey done, group cipher
AES.
[I] May 24 20:34:34 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(a4:4b:d5:f3:e4:9f) GTK rekey done, group cipher
AES.
[I] May 24 20:34:39 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster0/AccessPoint0": STA(c8:3d:dc:ae:52:77) GTK rekey done, group cipher
AES.
[I] May 24 20:34:47 ndnproxy: answer from wrong socket, ignore.
[I] May 24 20:35:30 ndnproxy: Core::Syslog: last message repeated 3 times.
[E] May 24 20:38:39 stubby: "cloudflare-dns.com": too many failed requests, try to
reload process
[E] May 24 20:38:39 ndm: Service: "DoT "System" proxy #1": unexpectedly stopped.
[I] May 24 20:38:42 stubby: starting Stubby 0.4.0
[I] May 24 20:39:37 ndnproxy: answer from wrong socket, ignore.
[I] May 24 20:47:59 ndnproxy: Core::Syslog: last message repeated 3 times.
[I] May 24 20:49:28 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 24 20:50:17 ndnproxy: answer from wrong socket, ignore.
[I] May 24 20:56:43 ndnproxy: Core::Syslog: last message repeated 4 times.
[I] May 24 21:02:25 ipsec: 03[IKE] received ESP_TFC_PADDING_NOT_SUPPORTED, not
using ESPv3 TFC padding
[I] May 24 21:02:25 ipsec: 03[CFG] received proposals:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 24 21:02:25 ipsec: 03[CFG] configured proposals:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 24 21:02:25 ipsec: 03[CFG] selected proposal:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 24 21:02:25 ipsec: 03[IKE] inbound CHILD_SA ionline_EY{4} established with
SPIs c066b5a5_i cf97ea80_o and TS 192.168.1.0/24 === 172.16.102.0/24
[I] May 24 21:02:25 ndm: IpSec::Configurator: "ionline_EY": crypto map was
renegotiated.
[I] May 24 21:02:25 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 2, active CHILD SA: 0.
[I] May 24 21:02:25 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 3, active CHILD SA: 1, state up.
[I] May 24 21:02:25 ipsec: 05[IKE] received DELETE for ESP CHILD_SA with SPI
c7614193
[I] May 24 21:02:25 ipsec: 05[IKE] closing CHILD_SA ionline_EY{3} with SPIs
c2433435_i (0 bytes) c7614193_o (0 bytes) and TS 192.168.1.0/24 === 172.16.102.0/24

[I] May 24 21:02:25 ipsec: 05[IKE] sending DELETE for ESP CHILD_SA with SPI
c2433435
[I] May 24 21:02:25 ipsec: 05[IKE] CHILD_SA closed
[I] May 24 21:02:25 ipsec: 05[IKE] outbound CHILD_SA ionline_EY{4} established with
SPIs c066b5a5_i cf97ea80_o and TS 192.168.1.0/24 === 172.16.102.0/24
[I] May 24 21:02:25 ndm: IpSec::IpSecNetfilter: start reloading netfilter
configuration...
[I] May 24 21:02:25 ndm: IpSec::IpSecNetfilter: netfilter configuration reloading
is done.
[I] May 24 21:02:35 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 3, active CHILD SA: 1.
[I] May 24 21:02:35 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 3, active CHILD SA: 1.
[I] May 24 21:04:19 ndnproxy: answer from wrong socket, ignore.
[E] May 24 21:04:23 ndnproxy: unable to send request: operation not permitted.
[I] May 24 21:04:26 ndnproxy: answer from wrong socket, ignore.
[I] May 24 21:04:29 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 24 21:04:54 ndnproxy: answer from wrong socket, ignore.
[I] May 24 21:06:48 ndnproxy: Core::Syslog: last message repeated 2 times.
[I] May 24 21:12:10 ndm: Network::Interface::Switch: "GigabitEthernet0/0": switch
link down at port 1.
[I] May 24 21:12:13 ndm: Network::Interface::Switch: "GigabitEthernet0/0": switch
link up at port 1 (1000FD/AN).
[I] May 24 21:12:14 ndhcps: DHCPREQUEST received (STATE_INIT) for 192.168.1.111
from 18:c0:4d:8a:8f:a4.
[I] May 24 21:12:15 ndhcps: sending ACK of 192.168.1.111 to 18:c0:4d:8a:8f:a4.
[I] May 24 21:12:30 ndm: Network::Interface::Switch: "GigabitEthernet0/0": switch
link down at port 1.
[I] May 24 21:12:32 ndm: Network::Interface::Switch: "GigabitEthernet0/0": switch
link up at port 1 (1000FD/AN).
[I] May 24 21:12:32 ndhcps: DHCPREQUEST received (STATE_INIT) for 192.168.1.111
from 18:c0:4d:8a:8f:a4.
[I] May 24 21:12:33 ndhcps: sending ACK of 192.168.1.111 to 18:c0:4d:8a:8f:a4.
[I] May 24 21:13:45 ndnproxy: answer from wrong socket, ignore.
[I] May 24 21:18:30 ndnproxy: Core::Syslog: last message repeated 8 times.
[I] May 24 21:19:29 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 24 21:20:42 ndnproxy: answer from wrong socket, ignore.
[I] May 24 21:32:04 ndnproxy: Core::Syslog: last message repeated 12 times.
[I] May 24 21:33:42 ipsec: 12[IKE] initiating IKE_SA ionline_EY[6] to 46.32.170.109

[I] May 24 21:33:42 ipsec: 05[CFG] received proposals:


IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
[I] May 24 21:33:42 ipsec: 05[CFG] configured proposals:
IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
[I] May 24 21:33:42 ipsec: 05[CFG] selected proposal:
IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
[I] May 24 21:33:42 ipsec: 05[IKE] scheduling rekeying in 3570s
[I] May 24 21:33:42 ipsec: 05[IKE] maximum IKE_SA lifetime 3590s
[I] May 24 21:33:42 ipsec: 05[IKE] IKE_SA ionline_EY[6] rekeyed between
78.109.53.15[7thsorrow.keenetic.pro]...46.32.170.109[46.32.170.109]
[I] May 24 21:33:42 ipsec: 05[IKE] deleting IKE_SA ionline_EY[5] between
78.109.53.15[7thsorrow.keenetic.pro]...46.32.170.109[46.32.170.109]
[I] May 24 21:33:42 ipsec: 05[IKE] sending DELETE for IKE_SA ionline_EY[5]
[I] May 24 21:33:42 ipsec: 10[IKE] IKE_SA deleted
[I] May 24 21:34:15 ndnproxy: answer from wrong socket, ignore.
[I] May 24 21:34:19 ndm: Network::Interface::Switch: "GigabitEthernet0/0": switch
link down at port 1.
[I] May 24 21:34:24 ndm: Network::Interface::Switch: "GigabitEthernet0/0": switch
link up at port 1 (10FD/AN).
[I] May 24 21:34:29 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 24 21:36:02 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(14:eb:b6:d0:19:de) GTK rekey done, group cipher
AES.
[I] May 24 21:36:02 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) GTK rekey done, group cipher
AES.
[I] May 24 21:36:02 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(d4:5e:ec:6e:1d:13) GTK rekey done, group cipher
AES.
[I] May 24 21:36:02 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(a4:4b:d5:f3:e4:9f) GTK rekey done, group cipher
AES.
[I] May 24 21:36:08 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster0/AccessPoint0": STA(c8:3d:dc:ae:52:77) GTK rekey done, group cipher
AES.
[I] May 24 21:41:33 ndnproxy: answer from wrong socket, ignore.
[I] May 24 21:48:00 ndnproxy: Core::Syslog: last message repeated 5 times.
[I] May 24 21:49:29 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 24 21:50:03 ndnproxy: answer from wrong socket, ignore.
[I] May 24 21:51:14 ndnproxy: answer from wrong socket, ignore.
[I] May 24 21:53:28 ipsec: 15[IKE] received ESP_TFC_PADDING_NOT_SUPPORTED, not
using ESPv3 TFC padding
[I] May 24 21:53:28 ipsec: 15[CFG] received proposals:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 24 21:53:28 ipsec: 15[CFG] configured proposals:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 24 21:53:28 ipsec: 15[CFG] selected proposal:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 24 21:53:28 ipsec: 15[IKE] inbound CHILD_SA ionline_EY{5} established with
SPIs c0aa6073_i c7dbd24f_o and TS 192.168.1.0/24 === 172.16.102.0/24
[I] May 24 21:53:28 ndm: IpSec::Configurator: "ionline_EY": crypto map was
renegotiated.
[I] May 24 21:53:28 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 3, active CHILD SA: 0.
[I] May 24 21:53:28 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 4, active CHILD SA: 1, state up.
[I] May 24 21:53:28 ipsec: 07[IKE] received DELETE for ESP CHILD_SA with SPI
cf97ea80
[I] May 24 21:53:28 ipsec: 07[IKE] closing CHILD_SA ionline_EY{4} with SPIs
c066b5a5_i (0 bytes) cf97ea80_o (0 bytes) and TS 192.168.1.0/24 === 172.16.102.0/24

[I] May 24 21:53:28 ipsec: 07[IKE] sending DELETE for ESP CHILD_SA with SPI
c066b5a5
[I] May 24 21:53:28 ipsec: 07[IKE] CHILD_SA closed
[I] May 24 21:53:28 ipsec: 07[IKE] outbound CHILD_SA ionline_EY{5} established with
SPIs c0aa6073_i c7dbd24f_o and TS 192.168.1.0/24 === 172.16.102.0/24
[I] May 24 21:53:29 ndm: IpSec::IpSecNetfilter: start reloading netfilter
configuration...
[I] May 24 21:53:29 ndm: IpSec::IpSecNetfilter: netfilter configuration reloading
is done.
[I] May 24 21:53:39 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 4, active CHILD SA: 1.
[I] May 24 21:53:39 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 4, active CHILD SA: 1.
[I] May 24 21:53:53 ndnproxy: answer from wrong socket, ignore.
[I] May 24 22:00:00 ndnproxy: Core::Syslog: last message repeated 4 times.
[I] May 24 22:01:57 ndhcps: DHCPREQUEST received (STATE_RENEWING) for 192.168.1.110
from 14:eb:b6:d0:19:dd.
[I] May 24 22:01:57 ndhcps: received ARP reply from 14:eb:b6:d0:19:de, not our
client.
[I] May 24 22:01:58 ndhcps: sending ACK of 192.168.1.110 to 14:eb:b6:d0:19:dd.
[I] May 24 22:02:52 ndhcps: DHCPREQUEST received (STATE_RENEWING) for 192.168.1.80
from a4:4b:d5:f3:e4:9f.
[I] May 24 22:02:52 ndhcps: sending ACK of 192.168.1.80 to a4:4b:d5:f3:e4:9f.
[I] May 24 22:03:01 ndhcps: DHCPREQUEST received (STATE_RENEWING) for 192.168.1.11
from 04:42:1a:26:ee:e6.
[I] May 24 22:03:01 ndhcps: sending ACK of 192.168.1.11 to 04:42:1a:26:ee:e6.
[I] May 24 22:04:01 ndnproxy: answer from wrong socket, ignore.
[I] May 24 22:04:29 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 24 22:06:23 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 24 22:06:24 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 24 22:06:58 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 24 22:06:59 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 24 22:08:15 ipsec: 06[IKE] received retransmit of request with ID 206,
retransmitting response
[I] May 24 22:09:59 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 24 22:10:00 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 24 22:10:53 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 24 22:10:54 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 24 22:11:45 ndnproxy: answer from wrong socket, ignore.
[I] May 24 22:13:21 ndnproxy: answer from wrong socket, ignore.
[I] May 24 22:13:55 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 24 22:13:55 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 24 22:15:26 ndhcps: DHCPREQUEST received (STATE_RENEWING) for 192.168.1.88
from c8:3d:dc:ae:52:77.
[I] May 24 22:15:27 ndhcps: sending ACK of 192.168.1.88 to c8:3d:dc:ae:52:77.
[I] May 24 22:18:47 ndnproxy: answer from wrong socket, ignore.
[I] May 24 22:19:30 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 24 22:20:00 ndnproxy: answer from wrong socket, ignore.
[I] May 24 22:20:34 ndnproxy: answer from wrong socket, ignore.
[E] May 24 22:21:17 stubby: "cloudflare-dns.com": too many failed requests, try to
reload process
[E] May 24 22:21:17 ndm: Service: "DoT "System" proxy #1": unexpectedly stopped.
[I] May 24 22:21:20 stubby: starting Stubby 0.4.0
[I] May 24 22:22:08 ndhcps: DHCPREQUEST received (STATE_RENEWING) for 192.168.1.84
from d4:5e:ec:6e:1d:13.
[I] May 24 22:22:08 ndhcps: sending ACK of 192.168.1.84 to d4:5e:ec:6e:1d:13.
[I] May 24 22:22:25 ndnproxy: answer from wrong socket, ignore.
[I] May 24 22:31:45 ndnproxy: Core::Syslog: last message repeated 8 times.
[I] May 24 22:33:12 ipsec: 08[IKE] initiating IKE_SA ionline_EY[7] to 46.32.170.109

[I] May 24 22:33:12 ipsec: 05[CFG] received proposals:


IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
[I] May 24 22:33:12 ipsec: 05[CFG] configured proposals:
IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
[I] May 24 22:33:12 ipsec: 05[CFG] selected proposal:
IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
[I] May 24 22:33:12 ipsec: 05[IKE] scheduling rekeying in 3580s
[I] May 24 22:33:12 ipsec: 05[IKE] maximum IKE_SA lifetime 3600s
[I] May 24 22:33:12 ipsec: 05[IKE] IKE_SA ionline_EY[7] rekeyed between
78.109.53.15[7thsorrow.keenetic.pro]...46.32.170.109[46.32.170.109]
[I] May 24 22:33:12 ipsec: 05[IKE] deleting IKE_SA ionline_EY[6] between
78.109.53.15[7thsorrow.keenetic.pro]...46.32.170.109[46.32.170.109]
[I] May 24 22:33:12 ipsec: 05[IKE] sending DELETE for IKE_SA ionline_EY[6]
[I] May 24 22:33:12 ipsec: 15[IKE] IKE_SA deleted
[I] May 24 22:33:44 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 24 22:33:44 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 24 22:34:30 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 24 22:36:45 ndnproxy: answer from wrong socket, ignore.
[I] May 24 22:37:30 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) GTK rekey done, group cipher
AES.
[I] May 24 22:37:30 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(14:eb:b6:d0:19:de) GTK rekey done, group cipher
AES.
[I] May 24 22:37:30 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(d4:5e:ec:6e:1d:13) GTK rekey done, group cipher
AES.
[I] May 24 22:37:30 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(a4:4b:d5:f3:e4:9f) GTK rekey done, group cipher
AES.
[I] May 24 22:37:36 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster0/AccessPoint0": STA(c8:3d:dc:ae:52:77) GTK rekey done, group cipher
AES.
[I] May 24 22:38:15 ndnproxy: answer from wrong socket, ignore.
[I] May 24 22:41:15 ndnproxy: Core::Syslog: last message repeated 2 times.
[I] May 24 22:43:40 ipsec: 12[IKE] received ESP_TFC_PADDING_NOT_SUPPORTED, not
using ESPv3 TFC padding
[I] May 24 22:43:40 ipsec: 12[CFG] received proposals:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 24 22:43:40 ipsec: 12[CFG] configured proposals:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 24 22:43:40 ipsec: 12[CFG] selected proposal:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 24 22:43:40 ipsec: 12[IKE] inbound CHILD_SA ionline_EY{6} established with
SPIs cddce412_i c7f881d8_o and TS 192.168.1.0/24 === 172.16.102.0/24
[I] May 24 22:43:40 ndm: IpSec::Configurator: "ionline_EY": crypto map was
renegotiated.
[I] May 24 22:43:40 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 4, active CHILD SA: 0.
[I] May 24 22:43:40 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 5, active CHILD SA: 1, state up.
[I] May 24 22:43:40 ipsec: 11[IKE] received DELETE for ESP CHILD_SA with SPI
c7dbd24f
[I] May 24 22:43:40 ipsec: 11[IKE] closing CHILD_SA ionline_EY{5} with SPIs
c0aa6073_i (0 bytes) c7dbd24f_o (0 bytes) and TS 192.168.1.0/24 === 172.16.102.0/24

[I] May 24 22:43:40 ipsec: 11[IKE] sending DELETE for ESP CHILD_SA with SPI
c0aa6073
[I] May 24 22:43:40 ipsec: 11[IKE] CHILD_SA closed
[I] May 24 22:43:40 ipsec: 11[IKE] outbound CHILD_SA ionline_EY{6} established with
SPIs cddce412_i c7f881d8_o and TS 192.168.1.0/24 === 172.16.102.0/24
[I] May 24 22:43:40 ndm: IpSec::IpSecNetfilter: start reloading netfilter
configuration...
[I] May 24 22:43:40 ndm: IpSec::IpSecNetfilter: netfilter configuration reloading
is done.
[I] May 24 22:43:50 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 5, active CHILD SA: 1.
[I] May 24 22:43:50 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 5, active CHILD SA: 1.
[I] May 24 22:46:34 ndnproxy: answer from wrong socket, ignore.
[I] May 24 22:47:36 ndnproxy: answer from wrong socket, ignore.
[I] May 24 22:49:30 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 24 22:55:37 ndnproxy: answer from wrong socket, ignore.
[I] May 24 22:58:08 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(d4:5e:ec:6e:1d:13) had been aged-out and
disassociated (idle silence).
[I] May 24 22:59:06 ndnproxy: answer from wrong socket, ignore.
[I] May 24 22:59:54 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 24 22:59:54 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 24 23:01:03 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 24 23:01:03 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 24 23:01:13 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 24 23:01:13 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 24 23:03:18 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 24 23:03:18 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 24 23:03:56 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 24 23:03:56 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 24 23:04:06 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 24 23:04:06 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 24 23:04:25 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 24 23:04:25 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 24 23:04:30 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 24 23:09:45 ndnproxy: answer from wrong socket, ignore.
[I] May 24 23:12:00 ndnproxy: Core::Syslog: last message repeated 2 times.
[I] May 24 23:12:35 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 24 23:12:37 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) replay counter differs in key
handshaking (msg 2 of 4-way).
[I] May 24 23:12:37 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 24 23:13:17 ndnproxy: answer from wrong socket, ignore.
[I] May 24 23:17:20 ndnproxy: Core::Syslog: last message repeated 2 times.
[I] May 24 23:17:34 ndhcps: DHCPREQUEST received (STATE_RENEWING) for 192.168.1.35
from 22:fd:90:7a:6f:12.
[I] May 24 23:17:34 ndhcps: sending ACK of 192.168.1.35 to 22:fd:90:7a:6f:12.
[I] May 24 23:18:08 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 24 23:18:08 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 24 23:19:31 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 24 23:21:27 ndnproxy: answer from wrong socket, ignore.
[I] May 24 23:26:45 ndnproxy: Core::Syslog: last message repeated 3 times.
[I] May 24 23:29:14 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 24 23:29:14 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 24 23:32:52 ipsec: 13[IKE] initiating IKE_SA ionline_EY[8] to 46.32.170.109

[I] May 24 23:32:52 ipsec: 03[CFG] received proposals:


IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
[I] May 24 23:32:52 ipsec: 03[CFG] configured proposals:
IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
[I] May 24 23:32:52 ipsec: 03[CFG] selected proposal:
IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
[I] May 24 23:32:52 ipsec: 03[IKE] scheduling rekeying in 3573s
[I] May 24 23:32:52 ipsec: 03[IKE] maximum IKE_SA lifetime 3593s
[I] May 24 23:32:52 ipsec: 03[IKE] IKE_SA ionline_EY[8] rekeyed between
78.109.53.15[7thsorrow.keenetic.pro]...46.32.170.109[46.32.170.109]
[I] May 24 23:32:52 ipsec: 03[IKE] deleting IKE_SA ionline_EY[7] between
78.109.53.15[7thsorrow.keenetic.pro]...46.32.170.109[46.32.170.109]
[I] May 24 23:32:52 ipsec: 03[IKE] sending DELETE for IKE_SA ionline_EY[7]
[I] May 24 23:32:52 ipsec: 08[IKE] IKE_SA deleted
[I] May 24 23:34:26 ipsec: 09[IKE] received ESP_TFC_PADDING_NOT_SUPPORTED, not
using ESPv3 TFC padding
[I] May 24 23:34:26 ipsec: 09[CFG] received proposals:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 24 23:34:26 ipsec: 09[CFG] configured proposals:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 24 23:34:26 ipsec: 09[CFG] selected proposal:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 24 23:34:26 ipsec: 09[IKE] inbound CHILD_SA ionline_EY{7} established with
SPIs c2225425_i c9358630_o and TS 192.168.1.0/24 === 172.16.102.0/24
[I] May 24 23:34:26 ndm: IpSec::Configurator: "ionline_EY": crypto map was
renegotiated.
[I] May 24 23:34:26 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 5, active CHILD SA: 0.
[I] May 24 23:34:26 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 6, active CHILD SA: 1, state up.
[I] May 24 23:34:26 ipsec: 11[IKE] received DELETE for ESP CHILD_SA with SPI
c7f881d8
[I] May 24 23:34:26 ipsec: 11[IKE] closing CHILD_SA ionline_EY{6} with SPIs
cddce412_i (0 bytes) c7f881d8_o (0 bytes) and TS 192.168.1.0/24 === 172.16.102.0/24

[I] May 24 23:34:26 ipsec: 11[IKE] sending DELETE for ESP CHILD_SA with SPI
cddce412
[I] May 24 23:34:26 ipsec: 11[IKE] CHILD_SA closed
[I] May 24 23:34:26 ipsec: 11[IKE] outbound CHILD_SA ionline_EY{7} established with
SPIs c2225425_i c9358630_o and TS 192.168.1.0/24 === 172.16.102.0/24
[I] May 24 23:34:26 ndm: IpSec::IpSecNetfilter: start reloading netfilter
configuration...
[I] May 24 23:34:26 ndm: IpSec::IpSecNetfilter: netfilter configuration reloading
is done.
[I] May 24 23:34:31 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 24 23:34:36 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 6, active CHILD SA: 1.
[I] May 24 23:34:36 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 6, active CHILD SA: 1.
[I] May 24 23:38:58 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(14:eb:b6:d0:19:de) GTK rekey done, group cipher
AES.
[I] May 24 23:38:58 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) GTK rekey done, group cipher
AES.
[I] May 24 23:38:59 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(a4:4b:d5:f3:e4:9f) GTK rekey done, group cipher
AES.
[I] May 24 23:39:04 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster0/AccessPoint0": STA(c8:3d:dc:ae:52:77) GTK rekey done, group cipher
AES.
[I] May 24 23:40:30 ndnproxy: answer from wrong socket, ignore.
[I] May 24 23:44:15 ndnproxy: Core::Syslog: last message repeated 2 times.
[I] May 24 23:45:17 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 24 23:45:17 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 24 23:49:31 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 24 23:54:00 ndnproxy: answer from wrong socket, ignore.
[I] May 24 23:56:27 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 24 23:56:28 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 24 23:58:34 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 24 23:58:34 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 24 23:59:14 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 24 23:59:14 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 00:00:41 ndnproxy: answer from wrong socket, ignore.
[I] May 25 00:01:56 ndnproxy: Core::Syslog: last message repeated 2 times.
[I] May 25 00:02:10 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 00:02:10 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 00:04:32 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 25 00:05:15 ndnproxy: answer from wrong socket, ignore.
[I] May 25 00:12:27 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 00:12:27 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 00:12:39 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 00:12:39 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 00:14:41 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 00:14:41 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 00:15:19 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 00:15:19 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 00:16:01 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 00:16:01 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 00:19:32 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 25 00:24:14 ndnproxy: answer from wrong socket, ignore.
[I] May 25 00:24:22 ipsec: 08[IKE] received ESP_TFC_PADDING_NOT_SUPPORTED, not
using ESPv3 TFC padding
[I] May 25 00:24:22 ipsec: 08[CFG] received proposals:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 25 00:24:22 ipsec: 08[CFG] configured proposals:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 25 00:24:22 ipsec: 08[CFG] selected proposal:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 25 00:24:22 ipsec: 08[IKE] inbound CHILD_SA ionline_EY{8} established with
SPIs cf5235d5_i c7c698c3_o and TS 192.168.1.0/24 === 172.16.102.0/24
[I] May 25 00:24:22 ndm: IpSec::Configurator: "ionline_EY": crypto map was
renegotiated.
[I] May 25 00:24:22 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 6, active CHILD SA: 0.
[I] May 25 00:24:22 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 6, active CHILD SA: 1, state up.
[I] May 25 00:24:22 ipsec: 15[IKE] received DELETE for ESP CHILD_SA with SPI
c9358630
[I] May 25 00:24:22 ipsec: 15[IKE] closing CHILD_SA ionline_EY{7} with SPIs
c2225425_i (0 bytes) c9358630_o (0 bytes) and TS 192.168.1.0/24 === 172.16.102.0/24

[I] May 25 00:24:22 ipsec: 15[IKE] sending DELETE for ESP CHILD_SA with SPI
c2225425
[I] May 25 00:24:22 ipsec: 15[IKE] CHILD_SA closed
[I] May 25 00:24:22 ipsec: 15[IKE] outbound CHILD_SA ionline_EY{8} established with
SPIs cf5235d5_i c7c698c3_o and TS 192.168.1.0/24 === 172.16.102.0/24
[I] May 25 00:24:23 ndm: IpSec::IpSecNetfilter: start reloading netfilter
configuration...
[I] May 25 00:24:23 ndm: IpSec::IpSecNetfilter: netfilter configuration reloading
is done.
[I] May 25 00:24:32 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 6, active CHILD SA: 1.
[I] May 25 00:24:32 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 6, active CHILD SA: 1.
[I] May 25 00:25:59 ndnproxy: answer from wrong socket, ignore.
[I] May 25 00:26:51 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 00:26:51 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 00:27:29 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 00:27:30 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 00:27:40 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 00:27:40 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 00:28:39 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 00:28:40 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 00:32:25 ipsec: 10[IKE] initiating IKE_SA ionline_EY[9] to 46.32.170.109

[I] May 25 00:32:25 ipsec: 07[CFG] received proposals:


IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
[I] May 25 00:32:25 ipsec: 07[CFG] configured proposals:
IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
[I] May 25 00:32:25 ipsec: 07[CFG] selected proposal:
IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
[I] May 25 00:32:25 ipsec: 07[IKE] scheduling rekeying in 3577s
[I] May 25 00:32:25 ipsec: 07[IKE] maximum IKE_SA lifetime 3597s
[I] May 25 00:32:25 ipsec: 07[IKE] IKE_SA ionline_EY[9] rekeyed between
78.109.53.15[7thsorrow.keenetic.pro]...46.32.170.109[46.32.170.109]
[I] May 25 00:32:25 ipsec: 07[IKE] deleting IKE_SA ionline_EY[8] between
78.109.53.15[7thsorrow.keenetic.pro]...46.32.170.109[46.32.170.109]
[I] May 25 00:32:25 ipsec: 07[IKE] sending DELETE for IKE_SA ionline_EY[8]
[I] May 25 00:32:25 ipsec: 13[IKE] IKE_SA deleted
[I] May 25 00:32:59 ndnproxy: answer from wrong socket, ignore.
[I] May 25 00:33:46 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 00:33:46 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 00:34:32 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 25 00:34:48 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 00:34:48 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 00:35:11 ndnproxy: answer from wrong socket, ignore.
[I] May 25 00:38:05 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 00:38:06 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 00:38:43 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 00:38:44 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 00:38:54 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 00:38:54 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 00:39:30 ndnproxy: answer from wrong socket, ignore.
[I] May 25 00:39:32 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 00:39:32 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 00:39:33 ndnproxy: answer from wrong socket, ignore.
[I] May 25 00:39:43 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 00:39:43 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 00:40:21 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 00:40:21 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 00:40:27 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(14:eb:b6:d0:19:de) GTK rekey done, group cipher
AES.
[I] May 25 00:40:27 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(a4:4b:d5:f3:e4:9f) GTK rekey done, group cipher
AES.
[I] May 25 00:40:31 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 00:40:31 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 00:40:33 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster0/AccessPoint0": STA(c8:3d:dc:ae:52:77) GTK rekey done, group cipher
AES.
[I] May 25 00:41:09 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 00:41:09 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 00:42:52 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 00:42:52 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 00:45:02 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 00:45:02 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 00:45:14 ndnproxy: answer from wrong socket, ignore.
[I] May 25 00:45:22 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 00:45:22 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 00:45:38 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 00:45:39 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 00:46:30 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 00:46:30 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 00:47:11 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 00:47:11 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 00:47:31 ndnproxy: answer from wrong socket, ignore.
[I] May 25 00:47:49 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 00:47:49 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 00:48:09 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had associated successfully.
[I] May 25 00:48:09 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 00:48:09 ndhcps: DHCPREQUEST received (STATE_INIT) for 192.168.1.35 from
22:fd:90:7a:6f:12.
[I] May 25 00:48:09 ndhcps: sending ACK of 192.168.1.35 to 22:fd:90:7a:6f:12.
[I] May 25 00:48:21 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 00:48:21 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 00:48:33 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 00:48:33 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 00:48:43 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 00:48:44 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 00:49:23 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 00:49:23 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 00:49:32 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 25 00:49:35 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 00:49:35 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 00:49:47 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 00:49:47 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 00:49:58 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 00:49:58 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 00:50:36 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 00:50:36 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 00:50:48 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 00:50:48 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 00:51:00 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 00:51:00 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 00:51:12 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 00:51:12 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 00:51:24 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 00:51:24 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 00:51:37 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 00:51:37 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 00:51:49 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 00:51:49 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 00:52:01 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 00:52:03 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 00:52:12 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 00:52:12 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 00:52:48 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 00:52:48 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 00:54:58 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 00:54:58 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 00:55:09 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 00:55:10 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 00:55:15 ndnproxy: answer from wrong socket, ignore.
[I] May 25 00:56:02 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 00:56:02 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 00:56:40 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 00:56:40 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 00:56:51 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 00:56:51 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 00:57:00 ndnproxy: answer from wrong socket, ignore.
[I] May 25 00:58:15 ndnproxy: Core::Syslog: last message repeated 2 times.
[I] May 25 00:59:37 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 00:59:37 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 00:59:39 ndnproxy: answer from wrong socket, ignore.
[I] May 25 00:59:47 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 00:59:47 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 01:00:26 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 01:00:26 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 01:00:37 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 01:00:37 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 01:01:17 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 01:01:17 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 01:03:00 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 01:03:00 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 01:03:36 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 01:03:36 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 01:04:14 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 01:04:14 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 01:04:26 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 01:04:26 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 01:04:32 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 25 01:04:37 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 01:04:37 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 01:05:13 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 01:05:14 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 01:05:50 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 01:05:50 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 01:06:28 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 01:06:28 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 01:06:30 ndnproxy: answer from wrong socket, ignore.
[I] May 25 01:06:38 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 01:06:38 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 01:07:15 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 01:07:15 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 01:07:51 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 01:07:51 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 01:08:27 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 01:08:28 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 01:08:35 ndnproxy: answer from wrong socket, ignore.
[I] May 25 01:09:05 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 01:09:06 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 01:09:16 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 01:09:16 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 01:09:54 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 01:09:54 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 01:10:05 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 01:10:05 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 01:10:05 ndnproxy: answer from wrong socket, ignore.
[I] May 25 01:10:06 ndnproxy: answer from wrong socket, ignore.
[I] May 25 01:10:41 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 01:10:41 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 01:13:02 ipsec: 07[IKE] received ESP_TFC_PADDING_NOT_SUPPORTED, not
using ESPv3 TFC padding
[I] May 25 01:13:02 ipsec: 07[CFG] received proposals:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 25 01:13:02 ipsec: 07[CFG] configured proposals:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 25 01:13:02 ipsec: 07[CFG] selected proposal:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 25 01:13:02 ipsec: 07[IKE] inbound CHILD_SA ionline_EY{9} established with
SPIs c42c592d_i c6db2e8e_o and TS 192.168.1.0/24 === 172.16.102.0/24
[I] May 25 01:13:02 ndm: IpSec::Configurator: "ionline_EY": crypto map was
renegotiated.
[I] May 25 01:13:03 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 6, active CHILD SA: 0.
[I] May 25 01:13:03 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 7, active CHILD SA: 1, state up.
[I] May 25 01:13:03 ipsec: 03[IKE] received DELETE for ESP CHILD_SA with SPI
c7c698c3
[I] May 25 01:13:03 ipsec: 03[IKE] closing CHILD_SA ionline_EY{8} with SPIs
cf5235d5_i (0 bytes) c7c698c3_o (0 bytes) and TS 192.168.1.0/24 === 172.16.102.0/24
[I] May 25 01:13:03 ipsec: 03[IKE] sending DELETE for ESP CHILD_SA with SPI
cf5235d5
[I] May 25 01:13:03 ipsec: 03[IKE] CHILD_SA closed
[I] May 25 01:13:03 ipsec: 03[IKE] outbound CHILD_SA ionline_EY{9} established with
SPIs c42c592d_i c6db2e8e_o and TS 192.168.1.0/24 === 172.16.102.0/24
[I] May 25 01:13:03 ndm: IpSec::IpSecNetfilter: start reloading netfilter
configuration...
[I] May 25 01:13:03 ndm: IpSec::IpSecNetfilter: netfilter configuration reloading
is done.
[I] May 25 01:13:13 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 7, active CHILD SA: 1.
[I] May 25 01:13:13 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 7, active CHILD SA: 1.
[I] May 25 01:13:30 ndnproxy: answer from wrong socket, ignore.
[I] May 25 01:16:34 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 01:16:34 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 01:16:46 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 01:16:46 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 01:16:58 ndnproxy: answer from wrong socket, ignore.
[I] May 25 01:19:32 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 25 01:20:45 ndnproxy: answer from wrong socket, ignore.
[I] May 25 01:21:14 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 01:21:14 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 01:21:26 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 01:21:26 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 01:21:38 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 01:21:38 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 01:21:58 ndnproxy: answer from wrong socket, ignore.
[I] May 25 01:23:33 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 01:23:33 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 01:23:43 ndnproxy: answer from wrong socket, ignore.
[I] May 25 01:23:43 ndnproxy: answer from wrong socket, ignore.
[I] May 25 01:24:48 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 01:24:49 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) replay counter differs in key
handshaking (msg 2 of 4-way).
[I] May 25 01:24:49 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 01:29:15 ndnproxy: answer from wrong socket, ignore.
[I] May 25 01:29:18 ndnproxy: answer from wrong socket, ignore.
[I] May 25 01:30:09 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 01:30:09 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 01:30:45 ndnproxy: answer from wrong socket, ignore.
[I] May 25 01:31:57 ndhcps: DHCPREQUEST received (STATE_RENEWING) for 192.168.1.110
from 14:eb:b6:d0:19:dd.
[I] May 25 01:31:58 ndhcps: received ARP reply from 14:eb:b6:d0:19:de, not our
client.
[I] May 25 01:31:58 ndhcps: sending ACK of 192.168.1.110 to 14:eb:b6:d0:19:dd.
[I] May 25 01:32:02 ipsec: 15[IKE] initiating IKE_SA ionline_EY[10] to
46.32.170.109
[I] May 25 01:32:02 ipsec: 08[CFG] received proposals:
IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
[I] May 25 01:32:02 ipsec: 08[CFG] configured proposals:
IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
[I] May 25 01:32:02 ipsec: 08[CFG] selected proposal:
IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
[I] May 25 01:32:02 ipsec: 08[IKE] scheduling rekeying in 3573s
[I] May 25 01:32:02 ipsec: 08[IKE] maximum IKE_SA lifetime 3593s
[I] May 25 01:32:02 ipsec: 08[IKE] IKE_SA ionline_EY[10] rekeyed between
78.109.53.15[7thsorrow.keenetic.pro]...46.32.170.109[46.32.170.109]
[I] May 25 01:32:02 ipsec: 08[IKE] deleting IKE_SA ionline_EY[9] between
78.109.53.15[7thsorrow.keenetic.pro]...46.32.170.109[46.32.170.109]
[I] May 25 01:32:02 ipsec: 08[IKE] sending DELETE for IKE_SA ionline_EY[9]
[I] May 25 01:32:02 ipsec: 12[IKE] IKE_SA deleted
[I] May 25 01:32:22 ndnproxy: answer from wrong socket, ignore.
[I] May 25 01:32:52 ndhcps: DHCPREQUEST received (STATE_RENEWING) for 192.168.1.80
from a4:4b:d5:f3:e4:9f.
[I] May 25 01:32:53 ndhcps: sending ACK of 192.168.1.80 to a4:4b:d5:f3:e4:9f.
[I] May 25 01:33:00 ndhcps: DHCPREQUEST received (STATE_RENEWING) for 192.168.1.11
from 04:42:1a:26:ee:e6.
[I] May 25 01:33:01 ndhcps: sending ACK of 192.168.1.11 to 04:42:1a:26:ee:e6.
[I] May 25 01:33:41 ndnproxy: answer from wrong socket, ignore.
[I] May 25 01:34:32 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 25 01:40:16 ndnproxy: answer from wrong socket, ignore.
[I] May 25 01:40:53 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 01:40:53 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 01:41:55 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(14:eb:b6:d0:19:de) GTK rekey done, group cipher
AES.
[I] May 25 01:41:55 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(a4:4b:d5:f3:e4:9f) GTK rekey done, group cipher
AES.
[I] May 25 01:41:56 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) GTK rekey done, group cipher
AES.
[I] May 25 01:42:02 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster0/AccessPoint0": STA(c8:3d:dc:ae:52:77) GTK rekey done, group cipher
AES.
[I] May 25 01:43:54 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 01:43:54 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 01:45:45 ndnproxy: answer from wrong socket, ignore.
[I] May 25 01:46:04 ndhcps: DHCPREQUEST received (STATE_RENEWING) for 192.168.1.88
from c8:3d:dc:ae:52:77.
[I] May 25 01:46:04 ndhcps: sending ACK of 192.168.1.88 to c8:3d:dc:ae:52:77.
[I] May 25 01:48:00 ndnproxy: answer from wrong socket, ignore.
[I] May 25 01:49:33 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 25 02:00:15 ndnproxy: answer from wrong socket, ignore.
[E] May 25 02:01:45 ndnproxy: unable to send request: operation not permitted.
[I] May 25 02:01:50 ndnproxy: answer from wrong socket, ignore.
[I] May 25 02:02:20 ndnproxy: answer from wrong socket, ignore.
[I] May 25 02:04:04 ipsec: 07[IKE] received ESP_TFC_PADDING_NOT_SUPPORTED, not
using ESPv3 TFC padding
[I] May 25 02:04:04 ipsec: 07[CFG] received proposals:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 25 02:04:04 ipsec: 07[CFG] configured proposals:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 25 02:04:04 ipsec: 07[CFG] selected proposal:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 25 02:04:04 ipsec: 07[IKE] inbound CHILD_SA ionline_EY{10} established with
SPIs cb58a999_i cd91ef26_o and TS 192.168.1.0/24 === 172.16.102.0/24
[I] May 25 02:04:04 ndm: IpSec::Configurator: "ionline_EY": crypto map was
renegotiated.
[I] May 25 02:04:04 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 7, active CHILD SA: 0.
[I] May 25 02:04:04 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 8, active CHILD SA: 1, state up.
[I] May 25 02:04:04 ipsec: 10[IKE] received DELETE for ESP CHILD_SA with SPI
c6db2e8e
[I] May 25 02:04:04 ipsec: 10[IKE] closing CHILD_SA ionline_EY{9} with SPIs
c42c592d_i (0 bytes) c6db2e8e_o (0 bytes) and TS 192.168.1.0/24 === 172.16.102.0/24

[I] May 25 02:04:04 ipsec: 10[IKE] sending DELETE for ESP CHILD_SA with SPI
c42c592d
[I] May 25 02:04:04 ipsec: 10[IKE] CHILD_SA closed
[I] May 25 02:04:04 ipsec: 10[IKE] outbound CHILD_SA ionline_EY{10} established
with SPIs cb58a999_i cd91ef26_o and TS 192.168.1.0/24 === 172.16.102.0/24
[I] May 25 02:04:04 ndm: IpSec::IpSecNetfilter: start reloading netfilter
configuration...
[I] May 25 02:04:04 ndm: IpSec::IpSecNetfilter: netfilter configuration reloading
is done.
[I] May 25 02:04:14 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 8, active CHILD SA: 1.
[I] May 25 02:04:14 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 8, active CHILD SA: 1.
[I] May 25 02:04:33 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 25 02:08:05 ndnproxy: answer from wrong socket, ignore.
[I] May 25 02:18:58 ndnproxy: Core::Syslog: last message repeated 3 times.
[I] May 25 02:19:33 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 25 02:25:35 ndnproxy: answer from wrong socket, ignore.
[I] May 25 02:30:50 ndnproxy: answer from wrong socket, ignore.
[I] May 25 02:31:35 ipsec: 03[IKE] initiating IKE_SA ionline_EY[11] to
46.32.170.109
[I] May 25 02:31:35 ipsec: 09[CFG] received proposals:
IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
[I] May 25 02:31:35 ipsec: 09[CFG] configured proposals:
IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
[I] May 25 02:31:35 ipsec: 09[CFG] selected proposal:
IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
[I] May 25 02:31:36 ipsec: 09[IKE] scheduling rekeying in 3571s
[I] May 25 02:31:36 ipsec: 09[IKE] maximum IKE_SA lifetime 3591s
[I] May 25 02:31:36 ipsec: 09[IKE] IKE_SA ionline_EY[11] rekeyed between
78.109.53.15[7thsorrow.keenetic.pro]...46.32.170.109[46.32.170.109]
[I] May 25 02:31:36 ipsec: 09[IKE] deleting IKE_SA ionline_EY[10] between
78.109.53.15[7thsorrow.keenetic.pro]...46.32.170.109[46.32.170.109]
[I] May 25 02:31:36 ipsec: 09[IKE] sending DELETE for IKE_SA ionline_EY[10]
[I] May 25 02:31:36 ipsec: 13[IKE] IKE_SA deleted
[I] May 25 02:32:05 ndnproxy: answer from wrong socket, ignore.
[I] May 25 02:34:33 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 25 02:43:20 ndnproxy: answer from wrong socket, ignore.
[I] May 25 02:43:24 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(14:eb:b6:d0:19:de) GTK rekey done, group cipher
AES.
[I] May 25 02:43:24 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(a4:4b:d5:f3:e4:9f) GTK rekey done, group cipher
AES.
[I] May 25 02:43:25 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) GTK rekey done, group cipher
AES.
[I] May 25 02:43:30 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster0/AccessPoint0": STA(c8:3d:dc:ae:52:77) GTK rekey done, group cipher
AES.
[I] May 25 02:49:33 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 25 02:53:24 ipsec: 06[IKE] received ESP_TFC_PADDING_NOT_SUPPORTED, not
using ESPv3 TFC padding
[I] May 25 02:53:24 ipsec: 06[CFG] received proposals:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 25 02:53:24 ipsec: 06[CFG] configured proposals:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 25 02:53:24 ipsec: 06[CFG] selected proposal:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 25 02:53:24 ipsec: 06[IKE] inbound CHILD_SA ionline_EY{11} established with
SPIs c375651b_i c3fa6ce9_o and TS 192.168.1.0/24 === 172.16.102.0/24
[I] May 25 02:53:24 ndm: IpSec::Configurator: "ionline_EY": crypto map was
renegotiated.
[I] May 25 02:53:24 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 8, active CHILD SA: 0.
[I] May 25 02:53:24 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 9, active CHILD SA: 1, state up.
[I] May 25 02:53:24 ipsec: 07[IKE] received DELETE for ESP CHILD_SA with SPI
cd91ef26
[I] May 25 02:53:24 ipsec: 07[IKE] closing CHILD_SA ionline_EY{10} with SPIs
cb58a999_i (0 bytes) cd91ef26_o (0 bytes) and TS 192.168.1.0/24 === 172.16.102.0/24

[I] May 25 02:53:24 ipsec: 07[IKE] sending DELETE for ESP CHILD_SA with SPI
cb58a999
[I] May 25 02:53:24 ipsec: 07[IKE] CHILD_SA closed
[I] May 25 02:53:24 ipsec: 07[IKE] outbound CHILD_SA ionline_EY{11} established
with SPIs c375651b_i c3fa6ce9_o and TS 192.168.1.0/24 === 172.16.102.0/24
[I] May 25 02:53:25 ndm: IpSec::IpSecNetfilter: start reloading netfilter
configuration...
[I] May 25 02:53:25 ndm: IpSec::IpSecNetfilter: netfilter configuration reloading
is done.
[I] May 25 02:53:33 ndnproxy: answer from wrong socket, ignore.
[I] May 25 02:53:35 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 9, active CHILD SA: 1.
[I] May 25 02:53:35 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 9, active CHILD SA: 1.
[I] May 25 02:57:05 ndnproxy: answer from wrong socket, ignore.
[I] May 25 03:03:35 ndnproxy: Core::Syslog: last message repeated 2 times.
[I] May 25 03:04:33 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 25 03:06:11 ipsec: 07[IKE] message verification failed
[I] May 25 03:06:11 ipsec: 07[IKE] IKE_SA_INIT request with message ID 0 processing
failed
[I] May 25 03:08:56 ndnproxy: answer from wrong socket, ignore.
[I] May 25 03:11:20 ndnproxy: Core::Syslog: last message repeated 2 times.
[I] May 25 03:12:50 ipsec: 05[IKE] message verification failed
[I] May 25 03:12:50 ipsec: 05[IKE] IKE_SA_INIT request with message ID 0 processing
failed
[I] May 25 03:17:53 ndnproxy: answer from wrong socket, ignore.
[I] May 25 03:19:33 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 25 03:20:20 ndnproxy: answer from wrong socket, ignore.
[I] May 25 03:28:20 ndnproxy: Core::Syslog: last message repeated 3 times.
[I] May 25 03:31:07 ipsec: 07[IKE] initiating IKE_SA ionline_EY[14] to
46.32.170.109
[I] May 25 03:31:07 ipsec: 10[CFG] received proposals:
IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
[I] May 25 03:31:07 ipsec: 10[CFG] configured proposals:
IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
[I] May 25 03:31:07 ipsec: 10[CFG] selected proposal:
IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
[I] May 25 03:31:07 ipsec: 10[IKE] scheduling rekeying in 3571s
[I] May 25 03:31:07 ipsec: 10[IKE] maximum IKE_SA lifetime 3591s
[I] May 25 03:31:07 ipsec: 10[IKE] IKE_SA ionline_EY[14] rekeyed between
78.109.53.15[7thsorrow.keenetic.pro]...46.32.170.109[46.32.170.109]
[I] May 25 03:31:07 ipsec: 10[IKE] deleting IKE_SA ionline_EY[11] between
78.109.53.15[7thsorrow.keenetic.pro]...46.32.170.109[46.32.170.109]
[I] May 25 03:31:07 ipsec: 10[IKE] sending DELETE for IKE_SA ionline_EY[11]
[I] May 25 03:31:07 ipsec: 05[IKE] IKE_SA deleted
[I] May 25 03:33:31 ndnproxy: answer from wrong socket, ignore.
[I] May 25 03:34:33 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 25 03:35:31 ndnproxy: answer from wrong socket, ignore.
[I] May 25 03:40:20 ndnproxy: Core::Syslog: last message repeated 2 times.
[I] May 25 03:41:24 ipsec: 08[IKE] no IKE config found for
78.109.53.15...167.94.138.50, sending NO_PROPOSAL_CHOSEN
[I] May 25 03:41:24 ipsec: 14[IKE] no IKE config found for
78.109.53.15...167.94.138.50, sending NO_PROPOSAL_CHOSEN
[I] May 25 03:41:50 ndnproxy: answer from wrong socket, ignore.
[I] May 25 03:42:02 ipsec: 13[IKE] received ESP_TFC_PADDING_NOT_SUPPORTED, not
using ESPv3 TFC padding
[I] May 25 03:42:02 ipsec: 13[CFG] received proposals:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 25 03:42:02 ipsec: 13[CFG] configured proposals:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 25 03:42:02 ipsec: 13[CFG] selected proposal:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 25 03:42:02 ipsec: 13[IKE] inbound CHILD_SA ionline_EY{12} established with
SPIs cb86befd_i c4ce6e73_o and TS 192.168.1.0/24 === 172.16.102.0/24
[I] May 25 03:42:02 ndm: IpSec::Configurator: "ionline_EY": crypto map was
renegotiated.
[I] May 25 03:42:02 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 9, active CHILD SA: 0.
[I] May 25 03:42:02 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 10, active CHILD SA: 1, state up.
[I] May 25 03:42:02 ipsec: 14[IKE] received DELETE for ESP CHILD_SA with SPI
c3fa6ce9
[I] May 25 03:42:02 ipsec: 14[IKE] closing CHILD_SA ionline_EY{11} with SPIs
c375651b_i (0 bytes) c3fa6ce9_o (0 bytes) and TS 192.168.1.0/24 === 172.16.102.0/24

[I] May 25 03:42:02 ipsec: 14[IKE] sending DELETE for ESP CHILD_SA with SPI
c375651b
[I] May 25 03:42:02 ipsec: 14[IKE] CHILD_SA closed
[I] May 25 03:42:02 ipsec: 14[IKE] outbound CHILD_SA ionline_EY{12} established
with SPIs cb86befd_i c4ce6e73_o and TS 192.168.1.0/24 === 172.16.102.0/24
[I] May 25 03:42:02 ndm: IpSec::IpSecNetfilter: start reloading netfilter
configuration...
[I] May 25 03:42:02 ndm: IpSec::IpSecNetfilter: netfilter configuration reloading
is done.
[I] May 25 03:42:12 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 10, active CHILD SA: 1.
[I] May 25 03:42:12 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 10, active CHILD SA: 1.
[I] May 25 03:44:52 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(14:eb:b6:d0:19:de) GTK rekey done, group cipher
AES.
[I] May 25 03:44:52 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(a4:4b:d5:f3:e4:9f) GTK rekey done, group cipher
AES.
[I] May 25 03:44:52 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) GTK rekey done, group cipher
AES.
[I] May 25 03:44:58 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster0/AccessPoint0": STA(c8:3d:dc:ae:52:77) GTK rekey done, group cipher
AES.
[I] May 25 03:45:20 ndnproxy: answer from wrong socket, ignore.
[I] May 25 03:49:05 ndnproxy: Core::Syslog: last message repeated 2 times.
[I] May 25 03:49:33 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 25 03:51:12 ndnproxy: answer from wrong socket, ignore.
[I] May 25 03:56:50 ndnproxy: Core::Syslog: last message repeated 3 times.
[I] May 25 04:04:34 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 25 04:06:05 ndnproxy: answer from wrong socket, ignore.
[I] May 25 04:19:34 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 25 04:21:35 ndnproxy: answer from wrong socket, ignore.
[I] May 25 04:23:58 ndhcps: DHCPREQUEST received (STATE_RENEWING) for 192.168.1.35
from 22:fd:90:7a:6f:12.
[I] May 25 04:23:59 ndhcps: sending ACK of 192.168.1.35 to 22:fd:90:7a:6f:12.
[I] May 25 04:27:19 ipsec: 15[IKE] message verification failed
[I] May 25 04:27:19 ipsec: 15[IKE] IKE_SA_INIT request with message ID 0 processing
failed
[I] May 25 04:28:20 ndnproxy: answer from wrong socket, ignore.
[I] May 25 04:30:38 ipsec: 10[IKE] initiating IKE_SA ionline_EY[18] to
46.32.170.109
[I] May 25 04:30:38 ipsec: 13[CFG] received proposals:
IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
[I] May 25 04:30:38 ipsec: 13[CFG] configured proposals:
IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
[I] May 25 04:30:38 ipsec: 13[CFG] selected proposal:
IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
[I] May 25 04:30:38 ipsec: 13[IKE] scheduling rekeying in 3565s
[I] May 25 04:30:38 ipsec: 13[IKE] maximum IKE_SA lifetime 3585s
[I] May 25 04:30:38 ipsec: 13[IKE] IKE_SA ionline_EY[18] rekeyed between
78.109.53.15[7thsorrow.keenetic.pro]...46.32.170.109[46.32.170.109]
[I] May 25 04:30:38 ipsec: 13[IKE] deleting IKE_SA ionline_EY[14] between
78.109.53.15[7thsorrow.keenetic.pro]...46.32.170.109[46.32.170.109]
[I] May 25 04:30:38 ipsec: 13[IKE] sending DELETE for IKE_SA ionline_EY[14]
[I] May 25 04:30:38 ipsec: 14[IKE] IKE_SA deleted
[I] May 25 04:30:58 ndnproxy: answer from wrong socket, ignore.
[I] May 25 04:32:59 ndnproxy: answer from wrong socket, ignore.
[I] May 25 04:34:03 ipsec: 06[IKE] received ESP_TFC_PADDING_NOT_SUPPORTED, not
using ESPv3 TFC padding
[I] May 25 04:34:03 ipsec: 06[CFG] received proposals:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 25 04:34:03 ipsec: 06[CFG] configured proposals:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 25 04:34:03 ipsec: 06[CFG] selected proposal:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 25 04:34:03 ipsec: 06[IKE] inbound CHILD_SA ionline_EY{13} established with
SPIs c31d3f93_i cc585d3a_o and TS 192.168.1.0/24 === 172.16.102.0/24
[I] May 25 04:34:03 ndm: IpSec::Configurator: "ionline_EY": crypto map was
renegotiated.
[I] May 25 04:34:03 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 10, active CHILD SA: 0.
[I] May 25 04:34:03 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 11, active CHILD SA: 1, state up.
[I] May 25 04:34:03 ipsec: 12[IKE] received DELETE for ESP CHILD_SA with SPI
c4ce6e73
[I] May 25 04:34:03 ipsec: 12[IKE] closing CHILD_SA ionline_EY{12} with SPIs
cb86befd_i (0 bytes) c4ce6e73_o (0 bytes) and TS 192.168.1.0/24 === 172.16.102.0/24

[I] May 25 04:34:03 ipsec: 12[IKE] sending DELETE for ESP CHILD_SA with SPI
cb86befd
[I] May 25 04:34:03 ipsec: 12[IKE] CHILD_SA closed
[I] May 25 04:34:03 ipsec: 12[IKE] outbound CHILD_SA ionline_EY{13} established
with SPIs c31d3f93_i cc585d3a_o and TS 192.168.1.0/24 === 172.16.102.0/24
[I] May 25 04:34:03 ndm: IpSec::IpSecNetfilter: start reloading netfilter
configuration...
[I] May 25 04:34:03 ndm: IpSec::IpSecNetfilter: netfilter configuration reloading
is done.
[I] May 25 04:34:13 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 11, active CHILD SA: 1.
[I] May 25 04:34:13 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 11, active CHILD SA: 1.
[I] May 25 04:34:35 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 25 04:38:05 ndnproxy: answer from wrong socket, ignore.
[I] May 25 04:38:45 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 04:38:46 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 04:39:00 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 04:39:01 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 04:39:14 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 04:39:15 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 04:39:28 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 04:39:29 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 04:39:42 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 04:39:43 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 04:39:57 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 04:39:57 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 04:40:11 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 04:40:12 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 04:40:25 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 04:40:25 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 04:43:22 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 04:43:23 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 04:45:20 ndnproxy: answer from wrong socket, ignore.
[I] May 25 04:46:21 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(14:eb:b6:d0:19:de) GTK rekey done, group cipher
AES.
[I] May 25 04:46:21 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(a4:4b:d5:f3:e4:9f) GTK rekey done, group cipher
AES.
[I] May 25 04:46:21 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) GTK rekey done, group cipher
AES.
[I] May 25 04:46:27 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster0/AccessPoint0": STA(c8:3d:dc:ae:52:77) GTK rekey done, group cipher
AES.
[I] May 25 04:48:17 ipsec: 05[IKE] message verification failed
[I] May 25 04:48:17 ipsec: 05[IKE] IKE_SA_INIT request with message ID 0 processing
failed
[I] May 25 04:49:36 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 25 04:49:50 ndnproxy: answer from wrong socket, ignore.
[I] May 25 04:54:58 ndnproxy: Core::Syslog: last message repeated 2 times.
[I] May 25 04:56:25 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 04:56:26 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 04:56:35 ndnproxy: answer from wrong socket, ignore.
[I] May 25 05:01:57 ndhcps: DHCPREQUEST received (STATE_RENEWING) for 192.168.1.110
from 14:eb:b6:d0:19:dd.
[I] May 25 05:01:58 ndhcps: received ARP reply from 14:eb:b6:d0:19:de, not our
client.
[I] May 25 05:01:58 ndhcps: sending ACK of 192.168.1.110 to 14:eb:b6:d0:19:dd.
[I] May 25 05:02:20 ipsec: 15[IKE] message verification failed
[I] May 25 05:02:20 ipsec: 15[IKE] IKE_SA_INIT request with message ID 0 processing
failed
[I] May 25 05:02:54 ndhcps: DHCPREQUEST received (STATE_RENEWING) for 192.168.1.80
from a4:4b:d5:f3:e4:9f.
[I] May 25 05:02:54 ndhcps: sending ACK of 192.168.1.80 to a4:4b:d5:f3:e4:9f.
[I] May 25 05:03:01 ndhcps: DHCPREQUEST received (STATE_RENEWING) for 192.168.1.11
from 04:42:1a:26:ee:e6.
[I] May 25 05:03:01 ndhcps: sending ACK of 192.168.1.11 to 04:42:1a:26:ee:e6.
[I] May 25 05:04:38 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 25 05:05:13 ndnproxy: answer from wrong socket, ignore.
[W] May 25 05:06:16 https-dns-proxy: EA4E: "https://dns.adguard-dns.com/dns-query":
CURLINFO_SSL_VERIFYRESULT: Error (unable to establish TLS connection)
[I] May 25 05:07:15 ipsec: 05[IKE] no IKE config found for
78.109.53.15...194.187.178.179, sending NO_PROPOSAL_CHOSEN
[I] May 25 05:07:16 ipsec: 08[IKE] no IKE config found for
78.109.53.15...45.83.66.237, sending NO_PROPOSAL_CHOSEN
[I] May 25 05:07:56 ndnproxy: answer from wrong socket, ignore.
[I] May 25 05:16:05 ndnproxy: answer from wrong socket, ignore.
[I] May 25 05:16:06 ndhcps: DHCPREQUEST received (STATE_RENEWING) for 192.168.1.88
from c8:3d:dc:ae:52:77.
[I] May 25 05:16:07 ndhcps: sending ACK of 192.168.1.88 to c8:3d:dc:ae:52:77.
[I] May 25 05:16:20 ndnproxy: answer from wrong socket, ignore.
[I] May 25 05:17:04 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 05:17:05 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 05:18:20 ndnproxy: answer from wrong socket, ignore.
[I] May 25 05:19:38 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 25 05:20:17 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 05:20:17 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 05:20:31 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 05:20:31 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 05:22:03 ipsec: 08[IKE] received ESP_TFC_PADDING_NOT_SUPPORTED, not
using ESPv3 TFC padding
[I] May 25 05:22:03 ipsec: 08[CFG] received proposals:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 25 05:22:03 ipsec: 08[CFG] configured proposals:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 25 05:22:03 ipsec: 08[CFG] selected proposal:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 25 05:22:03 ipsec: 08[IKE] inbound CHILD_SA ionline_EY{14} established with
SPIs c5547b54_i cdc1379c_o and TS 192.168.1.0/24 === 172.16.102.0/24
[I] May 25 05:22:03 ndm: IpSec::Configurator: "ionline_EY": crypto map was
renegotiated.
[I] May 25 05:22:03 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 11, active CHILD SA: 0.
[I] May 25 05:22:03 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 11, active CHILD SA: 1, state up.
[I] May 25 05:22:03 ipsec: 03[IKE] received DELETE for ESP CHILD_SA with SPI
cc585d3a
[I] May 25 05:22:03 ipsec: 03[IKE] closing CHILD_SA ionline_EY{13} with SPIs
c31d3f93_i (0 bytes) cc585d3a_o (0 bytes) and TS 192.168.1.0/24 === 172.16.102.0/24

[I] May 25 05:22:03 ipsec: 03[IKE] sending DELETE for ESP CHILD_SA with SPI
c31d3f93
[I] May 25 05:22:03 ipsec: 03[IKE] CHILD_SA closed
[I] May 25 05:22:03 ipsec: 03[IKE] outbound CHILD_SA ionline_EY{14} established
with SPIs c5547b54_i cdc1379c_o and TS 192.168.1.0/24 === 172.16.102.0/24
[I] May 25 05:22:03 ndm: IpSec::IpSecNetfilter: start reloading netfilter
configuration...
[I] May 25 05:22:03 ndm: IpSec::IpSecNetfilter: netfilter configuration reloading
is done.
[I] May 25 05:22:13 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 11, active CHILD SA: 1.
[I] May 25 05:22:13 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 11, active CHILD SA: 1.
[I] May 25 05:23:05 ndnproxy: answer from wrong socket, ignore.
[I] May 25 05:30:03 ipsec: 09[IKE] initiating IKE_SA ionline_EY[23] to
46.32.170.109
[I] May 25 05:30:03 ipsec: 06[CFG] received proposals:
IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
[I] May 25 05:30:03 ipsec: 06[CFG] configured proposals:
IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
[I] May 25 05:30:03 ipsec: 06[CFG] selected proposal:
IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
[I] May 25 05:30:03 ipsec: 06[IKE] scheduling rekeying in 3571s
[I] May 25 05:30:03 ipsec: 06[IKE] maximum IKE_SA lifetime 3591s
[I] May 25 05:30:03 ipsec: 06[IKE] IKE_SA ionline_EY[23] rekeyed between
78.109.53.15[7thsorrow.keenetic.pro]...46.32.170.109[46.32.170.109]
[I] May 25 05:30:03 ipsec: 06[IKE] deleting IKE_SA ionline_EY[18] between
78.109.53.15[7thsorrow.keenetic.pro]...46.32.170.109[46.32.170.109]
[I] May 25 05:30:03 ipsec: 06[IKE] sending DELETE for IKE_SA ionline_EY[18]
[I] May 25 05:30:03 ipsec: 08[IKE] IKE_SA deleted
[I] May 25 05:32:50 ndnproxy: answer from wrong socket, ignore.
[I] May 25 05:34:38 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 25 05:36:20 ndnproxy: answer from wrong socket, ignore.
[I] May 25 05:45:46 ndnproxy: Core::Syslog: last message repeated 5 times.
[I] May 25 05:47:49 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(14:eb:b6:d0:19:de) GTK rekey done, group cipher
AES.
[I] May 25 05:47:49 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(a4:4b:d5:f3:e4:9f) GTK rekey done, group cipher
AES.
[I] May 25 05:47:50 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) GTK rekey done, group cipher
AES.
[I] May 25 05:47:55 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster0/AccessPoint0": STA(c8:3d:dc:ae:52:77) GTK rekey done, group cipher
AES.
[I] May 25 05:48:02 ndnproxy: answer from wrong socket, ignore.
[I] May 25 05:48:20 ndnproxy: answer from wrong socket, ignore.
[I] May 25 05:49:38 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 25 06:00:32 ndnproxy: answer from wrong socket, ignore.
[I] May 25 06:04:39 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 25 06:05:20 ndnproxy: answer from wrong socket, ignore.
[I] May 25 06:08:39 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 06:08:39 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 06:08:50 ndnproxy: answer from wrong socket, ignore.
[I] May 25 06:08:54 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 06:08:55 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 06:11:20 ndnproxy: answer from wrong socket, ignore.
[I] May 25 06:13:31 ipsec: 12[IKE] received ESP_TFC_PADDING_NOT_SUPPORTED, not
using ESPv3 TFC padding
[I] May 25 06:13:31 ipsec: 12[CFG] received proposals:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 25 06:13:31 ipsec: 12[CFG] configured proposals:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 25 06:13:31 ipsec: 12[CFG] selected proposal:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 25 06:13:31 ipsec: 12[IKE] inbound CHILD_SA ionline_EY{15} established with
SPIs cf6d6972_i c64aeede_o and TS 192.168.1.0/24 === 172.16.102.0/24
[I] May 25 06:13:31 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 12, active CHILD SA: 2, state up.
[I] May 25 06:13:31 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 12, active CHILD SA: 1.
[I] May 25 06:13:31 ndm: IpSec::Configurator: "ionline_EY": crypto map was
renegotiated.
[I] May 25 06:13:31 ipsec: 09[IKE] received DELETE for ESP CHILD_SA with SPI
cdc1379c
[I] May 25 06:13:31 ipsec: 09[IKE] closing CHILD_SA ionline_EY{14} with SPIs
c5547b54_i (0 bytes) cdc1379c_o (0 bytes) and TS 192.168.1.0/24 === 172.16.102.0/24

[I] May 25 06:13:31 ipsec: 09[IKE] sending DELETE for ESP CHILD_SA with SPI
c5547b54
[I] May 25 06:13:31 ipsec: 09[IKE] CHILD_SA closed
[I] May 25 06:13:31 ipsec: 09[IKE] outbound CHILD_SA ionline_EY{15} established
with SPIs cf6d6972_i c64aeede_o and TS 192.168.1.0/24 === 172.16.102.0/24
[I] May 25 06:13:32 ndm: IpSec::IpSecNetfilter: start reloading netfilter
configuration...
[I] May 25 06:13:32 ndm: IpSec::IpSecNetfilter: netfilter configuration reloading
is done.
[I] May 25 06:13:41 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 12, active CHILD SA: 1.
[I] May 25 06:13:41 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 12, active CHILD SA: 1.
[I] May 25 06:19:30 ndnproxy: answer from wrong socket, ignore.
[I] May 25 06:19:39 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 25 06:20:40 ndnproxy: answer from wrong socket, ignore.
[I] May 25 06:23:57 ndnproxy: Core::Syslog: last message repeated 3 times.
[I] May 25 06:29:34 ipsec: 11[IKE] initiating IKE_SA ionline_EY[24] to
46.32.170.109
[I] May 25 06:29:34 ipsec: 05[CFG] received proposals:
IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
[I] May 25 06:29:34 ipsec: 05[CFG] configured proposals:
IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
[I] May 25 06:29:34 ipsec: 05[CFG] selected proposal:
IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
[I] May 25 06:29:34 ipsec: 05[IKE] scheduling rekeying in 3561s
[I] May 25 06:29:34 ipsec: 05[IKE] maximum IKE_SA lifetime 3581s
[I] May 25 06:29:34 ipsec: 05[IKE] IKE_SA ionline_EY[24] rekeyed between
78.109.53.15[7thsorrow.keenetic.pro]...46.32.170.109[46.32.170.109]
[I] May 25 06:29:34 ipsec: 05[IKE] deleting IKE_SA ionline_EY[23] between
78.109.53.15[7thsorrow.keenetic.pro]...46.32.170.109[46.32.170.109]
[I] May 25 06:29:34 ipsec: 05[IKE] sending DELETE for IKE_SA ionline_EY[23]
[I] May 25 06:29:34 ipsec: 08[IKE] IKE_SA deleted
[I] May 25 06:31:50 ndnproxy: answer from wrong socket, ignore.
[I] May 25 06:34:30 ndnproxy: answer from wrong socket, ignore.
[I] May 25 06:34:33 ndm: Dns::Secure::DotConfigurator: fallback to built-in DNS to
resolve "dns.adguard-dns.com".
[I] May 25 06:34:33 ndm: Dns::Secure::DotConfigurator: fallback to built-in DNS to
resolve "cloudflare-dns.com".
[I] May 25 06:34:33 ndm: Dns::Secure::DohConfigurator: fallback to built-in DNS to
resolve "dns.google".
[I] May 25 06:34:33 ndm: Dns::Secure::DohConfigurator: fallback to built-in DNS to
resolve "dns.adguard-dns.com".
[I] May 25 06:34:33 ndm: Dns::Secure::DohConfigurator: fallback to built-in DNS to
resolve "cloudflare-dns.com".
[I] May 25 06:34:39 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 25 06:35:57 ndnproxy: answer from wrong socket, ignore.
[I] May 25 06:47:36 ndnproxy: Core::Syslog: last message repeated 7 times.
[I] May 25 06:47:49 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 06:47:49 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 06:48:35 ndnproxy: answer from wrong socket, ignore.
[I] May 25 06:49:18 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(14:eb:b6:d0:19:de) GTK rekey done, group cipher
AES.
[I] May 25 06:49:18 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(a4:4b:d5:f3:e4:9f) GTK rekey done, group cipher
AES.
[I] May 25 06:49:18 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) GTK rekey done, group cipher
AES.
[I] May 25 06:49:24 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster0/AccessPoint0": STA(c8:3d:dc:ae:52:77) GTK rekey done, group cipher
AES.
[I] May 25 06:49:37 ipsec: 15[IKE] message verification failed
[I] May 25 06:49:37 ipsec: 15[IKE] IKE_SA_INIT request with message ID 0 processing
failed
[I] May 25 06:49:39 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 25 06:49:50 ndnproxy: answer from wrong socket, ignore.
[I] May 25 06:56:28 ndnproxy: answer from wrong socket, ignore.
[I] May 25 06:57:02 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 06:57:03 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 07:00:02 ndnproxy: answer from wrong socket, ignore.
[I] May 25 07:01:24 ipsec: 13[IKE] message verification failed
[I] May 25 07:01:24 ipsec: 13[IKE] IKE_SA_INIT request with message ID 0 processing
failed
[I] May 25 07:03:27 ipsec: 07[IKE] received ESP_TFC_PADDING_NOT_SUPPORTED, not
using ESPv3 TFC padding
[I] May 25 07:03:27 ipsec: 07[CFG] received proposals:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 25 07:03:27 ipsec: 07[CFG] configured proposals:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 25 07:03:27 ipsec: 07[CFG] selected proposal:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 25 07:03:27 ipsec: 07[IKE] inbound CHILD_SA ionline_EY{16} established with
SPIs c31cadd4_i c5a9fd39_o and TS 192.168.1.0/24 === 172.16.102.0/24
[I] May 25 07:03:27 ndm: IpSec::Configurator: "ionline_EY": crypto map was
renegotiated.
[I] May 25 07:03:27 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 12, active CHILD SA: 0.
[I] May 25 07:03:27 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 13, active CHILD SA: 1, state up.
[I] May 25 07:03:27 ipsec: 03[IKE] received DELETE for ESP CHILD_SA with SPI
c64aeede
[I] May 25 07:03:27 ipsec: 03[IKE] closing CHILD_SA ionline_EY{15} with SPIs
cf6d6972_i (0 bytes) c64aeede_o (0 bytes) and TS 192.168.1.0/24 === 172.16.102.0/24

[I] May 25 07:03:27 ipsec: 03[IKE] sending DELETE for ESP CHILD_SA with SPI
cf6d6972
[I] May 25 07:03:27 ipsec: 03[IKE] CHILD_SA closed
[I] May 25 07:03:27 ipsec: 03[IKE] outbound CHILD_SA ionline_EY{16} established
with SPIs c31cadd4_i c5a9fd39_o and TS 192.168.1.0/24 === 172.16.102.0/24
[I] May 25 07:03:27 ndm: IpSec::IpSecNetfilter: start reloading netfilter
configuration...
[I] May 25 07:03:27 ndm: IpSec::IpSecNetfilter: netfilter configuration reloading
is done.
[I] May 25 07:03:37 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 13, active CHILD SA: 1.
[I] May 25 07:03:37 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 13, active CHILD SA: 1.
[I] May 25 07:03:53 ndnproxy: answer from wrong socket, ignore.
[I] May 25 07:04:39 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 25 07:05:11 ndnproxy: answer from wrong socket, ignore.
[I] May 25 07:10:05 ndnproxy: Core::Syslog: last message repeated 3 times.
[I] May 25 07:19:40 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 25 07:20:47 ndnproxy: answer from wrong socket, ignore.
[I] May 25 07:21:37 ndnproxy: Core::Syslog: last message repeated 5 times.
[I] May 25 07:26:47 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 07:26:47 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 07:27:01 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 07:27:02 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 07:27:21 ndnproxy: answer from wrong socket, ignore.
[I] May 25 07:27:43 ndnproxy: Core::Syslog: last message repeated 3 times.
[I] May 25 07:28:52 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 07:28:52 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 07:28:55 ipsec: 07[IKE] initiating IKE_SA ionline_EY[27] to
46.32.170.109
[I] May 25 07:28:55 ipsec: 15[CFG] received proposals:
IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
[I] May 25 07:28:55 ipsec: 15[CFG] configured proposals:
IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
[I] May 25 07:28:55 ipsec: 15[CFG] selected proposal:
IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
[I] May 25 07:28:55 ipsec: 15[IKE] scheduling rekeying in 3569s
[I] May 25 07:28:55 ipsec: 15[IKE] maximum IKE_SA lifetime 3589s
[I] May 25 07:28:55 ipsec: 15[IKE] IKE_SA ionline_EY[27] rekeyed between
78.109.53.15[7thsorrow.keenetic.pro]...46.32.170.109[46.32.170.109]
[I] May 25 07:28:55 ipsec: 15[IKE] deleting IKE_SA ionline_EY[24] between
78.109.53.15[7thsorrow.keenetic.pro]...46.32.170.109[46.32.170.109]
[I] May 25 07:28:55 ipsec: 15[IKE] sending DELETE for IKE_SA ionline_EY[24]
[I] May 25 07:28:55 ipsec: 14[IKE] IKE_SA deleted
[I] May 25 07:29:05 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 07:29:06 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 07:29:22 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 07:29:22 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 07:29:59 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 07:29:59 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 07:31:02 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 07:31:02 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 07:31:13 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 07:31:13 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 07:31:29 ndnproxy: answer from wrong socket, ignore.
[I] May 25 07:31:31 ndnproxy: Core::Syslog: last message repeated 2 times.
[I] May 25 07:31:54 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 07:31:54 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 07:32:05 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 07:32:05 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 07:32:23 ndnproxy: answer from wrong socket, ignore.
[I] May 25 07:32:42 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 07:32:42 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 07:34:40 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 25 07:37:35 ndnproxy: answer from wrong socket, ignore.
[I] May 25 07:37:48 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 07:37:48 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 07:38:06 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 07:38:06 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 07:38:45 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 07:38:45 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 07:39:21 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 07:39:21 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 07:39:57 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 07:39:57 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 07:40:34 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 07:40:34 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 07:41:13 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 07:41:14 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 07:44:00 ndnproxy: answer from wrong socket, ignore.
[I] May 25 07:44:40 ndhcps: DHCPDISCOVER received for 192.168.1.94 from
00:e0:4c:36:02:d4.
[I] May 25 07:44:40 ndhcps: making OFFER of 192.168.1.94 to 00:e0:4c:36:02:d4.
[I] May 25 07:44:40 ndhcps: DHCPREQUEST received (STATE_SELECTING) for 192.168.1.94
from 00:e0:4c:36:02:d4.
[I] May 25 07:44:41 ndhcps: sending ACK of 192.168.1.94 to 00:e0:4c:36:02:d4.
[I] May 25 07:44:42 ipsec: 15[IKE] received retransmit of request with ID 93,
retransmitting response
[I] May 25 07:44:54 ndnproxy: answer from wrong socket, ignore.
[I] May 25 07:48:20 ndnproxy: answer from wrong socket, ignore.
[I] May 25 07:49:40 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 25 07:50:46 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(14:eb:b6:d0:19:de) GTK rekey done, group cipher
AES.
[I] May 25 07:50:46 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(a4:4b:d5:f3:e4:9f) GTK rekey done, group cipher
AES.
[I] May 25 07:50:47 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) GTK rekey done, group cipher
AES.
[I] May 25 07:50:52 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster0/AccessPoint0": STA(c8:3d:dc:ae:52:77) GTK rekey done, group cipher
AES.
[I] May 25 07:52:40 ndnproxy: answer from wrong socket, ignore.
[I] May 25 07:53:50 ipsec: 12[IKE] received ESP_TFC_PADDING_NOT_SUPPORTED, not
using ESPv3 TFC padding
[I] May 25 07:53:50 ipsec: 12[CFG] received proposals:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 25 07:53:50 ipsec: 12[CFG] configured proposals:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 25 07:53:50 ipsec: 12[CFG] selected proposal:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 25 07:53:50 ipsec: 12[IKE] inbound CHILD_SA ionline_EY{17} established with
SPIs c5be374a_i c99bf574_o and TS 192.168.1.0/24 === 172.16.102.0/24
[I] May 25 07:53:50 ndm: IpSec::Configurator: "ionline_EY": crypto map was
renegotiated.
[I] May 25 07:53:50 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 13, active CHILD SA: 0.
[I] May 25 07:53:50 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 14, active CHILD SA: 1, state up.
[I] May 25 07:53:50 ipsec: 06[IKE] received DELETE for ESP CHILD_SA with SPI
c5a9fd39
[I] May 25 07:53:50 ipsec: 06[IKE] closing CHILD_SA ionline_EY{16} with SPIs
c31cadd4_i (0 bytes) c5a9fd39_o (0 bytes) and TS 192.168.1.0/24 === 172.16.102.0/24

[I] May 25 07:53:50 ipsec: 06[IKE] sending DELETE for ESP CHILD_SA with SPI
c31cadd4
[I] May 25 07:53:50 ipsec: 06[IKE] CHILD_SA closed
[I] May 25 07:53:50 ipsec: 06[IKE] outbound CHILD_SA ionline_EY{17} established
with SPIs c5be374a_i c99bf574_o and TS 192.168.1.0/24 === 172.16.102.0/24
[I] May 25 07:53:50 ndm: IpSec::IpSecNetfilter: start reloading netfilter
configuration...
[I] May 25 07:53:50 ndm: IpSec::IpSecNetfilter: netfilter configuration reloading
is done.
[I] May 25 07:53:58 ndhcps: DHCPREQUEST received (STATE_RENEWING) for 192.168.1.35
from 22:fd:90:7a:6f:12.
[I] May 25 07:53:59 ndhcps: sending ACK of 192.168.1.35 to 22:fd:90:7a:6f:12.
[I] May 25 07:54:00 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 14, active CHILD SA: 1.
[I] May 25 07:54:00 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 14, active CHILD SA: 1.
[I] May 25 07:55:03 ndnproxy: answer from wrong socket, ignore.
[I] May 25 08:01:54 ndnproxy: Core::Syslog: last message repeated 2 times.
[I] May 25 08:03:10 ipsec: 15[IKE] message verification failed
[I] May 25 08:03:10 ipsec: 15[IKE] IKE_SA_INIT request with message ID 0 processing
failed
[I] May 25 08:03:34 ipsec: 06[IKE] message verification failed
[I] May 25 08:03:34 ipsec: 06[IKE] IKE_SA_INIT request with message ID 0 processing
failed
[I] May 25 08:03:40 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 08:03:40 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 08:04:40 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 25 08:05:05 ndnproxy: answer from wrong socket, ignore.
[I] May 25 08:17:35 ndnproxy: answer from wrong socket, ignore.
[I] May 25 08:18:13 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had been aged-out and
disassociated (idle silence).
[I] May 25 08:19:40 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 25 08:24:05 ndnproxy: answer from wrong socket, ignore.
[I] May 25 08:26:20 ndnproxy: answer from wrong socket, ignore.
[I] May 25 08:28:24 ipsec: 12[IKE] initiating IKE_SA ionline_EY[30] to
46.32.170.109
[I] May 25 08:28:24 ipsec: 06[CFG] received proposals:
IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
[I] May 25 08:28:24 ipsec: 06[CFG] configured proposals:
IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
[I] May 25 08:28:24 ipsec: 06[CFG] selected proposal:
IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
[I] May 25 08:28:24 ipsec: 06[IKE] scheduling rekeying in 3562s
[I] May 25 08:28:24 ipsec: 06[IKE] maximum IKE_SA lifetime 3582s
[I] May 25 08:28:24 ipsec: 06[IKE] IKE_SA ionline_EY[30] rekeyed between
78.109.53.15[7thsorrow.keenetic.pro]...46.32.170.109[46.32.170.109]
[I] May 25 08:28:24 ipsec: 06[IKE] deleting IKE_SA ionline_EY[27] between
78.109.53.15[7thsorrow.keenetic.pro]...46.32.170.109[46.32.170.109]
[I] May 25 08:28:24 ipsec: 06[IKE] sending DELETE for IKE_SA ionline_EY[27]
[I] May 25 08:28:24 ipsec: 07[IKE] IKE_SA deleted
[I] May 25 08:28:35 ndnproxy: answer from wrong socket, ignore.
[I] May 25 08:31:57 ndhcps: DHCPREQUEST received (STATE_RENEWING) for 192.168.1.110
from 14:eb:b6:d0:19:dd.
[I] May 25 08:31:58 ndhcps: received ARP reply from 14:eb:b6:d0:19:de, not our
client.
[I] May 25 08:31:58 ndhcps: sending ACK of 192.168.1.110 to 14:eb:b6:d0:19:dd.
[I] May 25 08:32:54 ndhcps: DHCPREQUEST received (STATE_RENEWING) for 192.168.1.80
from a4:4b:d5:f3:e4:9f.
[I] May 25 08:32:55 ndhcps: sending ACK of 192.168.1.80 to a4:4b:d5:f3:e4:9f.
[I] May 25 08:33:01 ndhcps: DHCPREQUEST received (STATE_RENEWING) for 192.168.1.11
from 04:42:1a:26:ee:e6.
[I] May 25 08:33:02 ndhcps: sending ACK of 192.168.1.11 to 04:42:1a:26:ee:e6.
[I] May 25 08:33:57 ndnproxy: answer from wrong socket, ignore.
[I] May 25 08:34:33 ndnproxy: answer from wrong socket, ignore.
[I] May 25 08:34:40 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 25 08:42:31 ndnproxy: answer from wrong socket, ignore.
[I] May 25 08:42:36 ndnproxy: Core::Syslog: last message repeated 3 times.
[I] May 25 08:44:46 ipsec: 06[IKE] received ESP_TFC_PADDING_NOT_SUPPORTED, not
using ESPv3 TFC padding
[I] May 25 08:44:46 ipsec: 06[CFG] received proposals:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 25 08:44:46 ipsec: 06[CFG] configured proposals:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 25 08:44:46 ipsec: 06[CFG] selected proposal:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 25 08:44:47 ipsec: 06[IKE] inbound CHILD_SA ionline_EY{18} established with
SPIs c2f0da8e_i c53b53e1_o and TS 192.168.1.0/24 === 172.16.102.0/24
[I] May 25 08:44:47 ndm: IpSec::Configurator: "ionline_EY": crypto map was
renegotiated.
[I] May 25 08:44:47 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 14, active CHILD SA: 0.
[I] May 25 08:44:47 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 15, active CHILD SA: 1, state up.
[I] May 25 08:44:47 ipsec: 11[IKE] received DELETE for ESP CHILD_SA with SPI
c99bf574
[I] May 25 08:44:47 ipsec: 11[IKE] closing CHILD_SA ionline_EY{17} with SPIs
c5be374a_i (0 bytes) c99bf574_o (0 bytes) and TS 192.168.1.0/24 === 172.16.102.0/24

[I] May 25 08:44:47 ipsec: 11[IKE] sending DELETE for ESP CHILD_SA with SPI
c5be374a
[I] May 25 08:44:47 ipsec: 11[IKE] CHILD_SA closed
[I] May 25 08:44:47 ipsec: 11[IKE] outbound CHILD_SA ionline_EY{18} established
with SPIs c2f0da8e_i c53b53e1_o and TS 192.168.1.0/24 === 172.16.102.0/24
[I] May 25 08:44:47 ndm: IpSec::IpSecNetfilter: start reloading netfilter
configuration...
[I] May 25 08:44:47 ndm: IpSec::IpSecNetfilter: netfilter configuration reloading
is done.
[I] May 25 08:44:57 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 15, active CHILD SA: 1.
[I] May 25 08:44:57 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 15, active CHILD SA: 1.
[I] May 25 08:45:20 ndnproxy: answer from wrong socket, ignore.
[I] May 25 08:46:07 ndhcps: DHCPREQUEST received (STATE_RENEWING) for 192.168.1.88
from c8:3d:dc:ae:52:77.
[I] May 25 08:46:07 ndhcps: sending ACK of 192.168.1.88 to c8:3d:dc:ae:52:77.
[I] May 25 08:47:59 ndnproxy: answer from wrong socket, ignore.
[I] May 25 08:49:40 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 25 08:52:14 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(14:eb:b6:d0:19:de) GTK rekey done, group cipher
AES.
[I] May 25 08:52:15 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(a4:4b:d5:f3:e4:9f) GTK rekey done, group cipher
AES.
[I] May 25 08:52:20 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster0/AccessPoint0": STA(c8:3d:dc:ae:52:77) GTK rekey done, group cipher
AES.
[I] May 25 08:52:28 ndnproxy: answer from wrong socket, ignore.
[I] May 25 09:04:35 ndnproxy: Core::Syslog: last message repeated 5 times.
[I] May 25 09:04:40 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 25 09:05:02 ndnproxy: answer from wrong socket, ignore.
[I] May 25 09:06:15 ndnproxy: answer from wrong socket, ignore.
[I] May 25 09:06:24 ipsec: 03[IKE] received retransmit of request with ID 227,
retransmitting response
[I] May 25 09:11:49 ndnproxy: answer from wrong socket, ignore.
[I] May 25 09:15:35 ndnproxy: Core::Syslog: last message repeated 3 times.
[I] May 25 09:16:30 ipsec: 10[IKE] no IKE config found for
78.109.53.15...74.82.47.20, sending NO_PROPOSAL_CHOSEN
[I] May 25 09:19:00 ndnproxy: answer from wrong socket, ignore.
[I] May 25 09:19:40 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 25 09:23:23 ipsec: 14[IKE] message verification failed
[I] May 25 09:23:23 ipsec: 14[IKE] IKE_SA_INIT request with message ID 0 processing
failed
[I] May 25 09:24:20 ndnproxy: answer from wrong socket, ignore.
[I] May 25 09:27:33 ndnproxy: Core::Syslog: last message repeated 4 times.
[I] May 25 09:27:46 ipsec: 13[IKE] initiating IKE_SA ionline_EY[33] to
46.32.170.109
[I] May 25 09:27:46 ipsec: 14[CFG] received proposals:
IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
[I] May 25 09:27:46 ipsec: 14[CFG] configured proposals:
IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
[I] May 25 09:27:46 ipsec: 14[CFG] selected proposal:
IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
[I] May 25 09:27:46 ipsec: 14[IKE] scheduling rekeying in 3571s
[I] May 25 09:27:46 ipsec: 14[IKE] maximum IKE_SA lifetime 3591s
[I] May 25 09:27:46 ipsec: 14[IKE] IKE_SA ionline_EY[33] rekeyed between
78.109.53.15[7thsorrow.keenetic.pro]...46.32.170.109[46.32.170.109]
[I] May 25 09:27:46 ipsec: 14[IKE] deleting IKE_SA ionline_EY[30] between
78.109.53.15[7thsorrow.keenetic.pro]...46.32.170.109[46.32.170.109]
[I] May 25 09:27:46 ipsec: 14[IKE] sending DELETE for IKE_SA ionline_EY[30]
[I] May 25 09:27:46 ipsec: 09[IKE] IKE_SA deleted
[I] May 25 09:30:27 ndnproxy: answer from wrong socket, ignore.
[I] May 25 09:32:58 ipsec: 09[IKE] received ESP_TFC_PADDING_NOT_SUPPORTED, not
using ESPv3 TFC padding
[I] May 25 09:32:58 ipsec: 09[CFG] received proposals:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 25 09:32:58 ipsec: 09[CFG] configured proposals:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 25 09:32:58 ipsec: 09[CFG] selected proposal:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 25 09:32:58 ipsec: 09[IKE] inbound CHILD_SA ionline_EY{19} established with
SPIs c1b56a9c_i cba3c307_o and TS 192.168.1.0/24 === 172.16.102.0/24
[I] May 25 09:32:58 ndm: IpSec::Configurator: "ionline_EY": crypto map was
renegotiated.
[I] May 25 09:32:58 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 15, active CHILD SA: 0.
[I] May 25 09:32:58 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 16, active CHILD SA: 1, state up.
[I] May 25 09:32:58 ipsec: 05[IKE] received DELETE for ESP CHILD_SA with SPI
c53b53e1
[I] May 25 09:32:58 ipsec: 05[IKE] closing CHILD_SA ionline_EY{18} with SPIs
c2f0da8e_i (0 bytes) c53b53e1_o (0 bytes) and TS 192.168.1.0/24 === 172.16.102.0/24

[I] May 25 09:32:58 ipsec: 05[IKE] sending DELETE for ESP CHILD_SA with SPI
c2f0da8e
[I] May 25 09:32:58 ipsec: 05[IKE] CHILD_SA closed
[I] May 25 09:32:58 ipsec: 05[IKE] outbound CHILD_SA ionline_EY{19} established
with SPIs c1b56a9c_i cba3c307_o and TS 192.168.1.0/24 === 172.16.102.0/24
[I] May 25 09:32:58 ndm: IpSec::IpSecNetfilter: start reloading netfilter
configuration...
[I] May 25 09:32:58 ndm: IpSec::IpSecNetfilter: netfilter configuration reloading
is done.
[I] May 25 09:33:00 ndnproxy: answer from wrong socket, ignore.
[I] May 25 09:33:08 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 16, active CHILD SA: 1.
[I] May 25 09:33:08 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 16, active CHILD SA: 1.
[I] May 25 09:33:38 ndnproxy: answer from wrong socket, ignore.
[I] May 25 09:34:41 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 25 09:38:15 ndnproxy: answer from wrong socket, ignore.
[I] May 25 09:47:54 ndnproxy: Core::Syslog: last message repeated 2 times.
[I] May 25 09:49:41 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 25 09:53:43 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(14:eb:b6:d0:19:de) GTK rekey done, group cipher
AES.
[I] May 25 09:53:43 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(a4:4b:d5:f3:e4:9f) GTK rekey done, group cipher
AES.
[I] May 25 09:53:49 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster0/AccessPoint0": STA(c8:3d:dc:ae:52:77) GTK rekey done, group cipher
AES.
[I] May 25 09:55:50 ndnproxy: answer from wrong socket, ignore.
[I] May 25 09:56:17 ipsec: 13[IKE] message verification failed
[I] May 25 09:56:17 ipsec: 13[IKE] IKE_SA_INIT request with message ID 0 processing
failed
[I] May 25 09:59:05 ndnproxy: answer from wrong socket, ignore.
[I] May 25 10:01:07 ndnproxy: Core::Syslog: last message repeated 2 times.
[I] May 25 10:04:41 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 25 10:04:50 ndnproxy: answer from wrong socket, ignore.
[I] May 25 10:05:09 ndnproxy: answer from wrong socket, ignore.
[I] May 25 10:06:47 ipsec: 15[IKE] received retransmit of request with ID 234,
retransmitting response
[I] May 25 10:08:35 ndnproxy: answer from wrong socket, ignore.
[I] May 25 10:17:50 ndnproxy: Core::Syslog: last message repeated 3 times.
[I] May 25 10:19:41 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 25 10:22:05 ndnproxy: answer from wrong socket, ignore.
[I] May 25 10:22:08 ipsec: 06[IKE] received ESP_TFC_PADDING_NOT_SUPPORTED, not
using ESPv3 TFC padding
[I] May 25 10:22:08 ipsec: 06[CFG] received proposals:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 25 10:22:08 ipsec: 06[CFG] configured proposals:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 25 10:22:08 ipsec: 06[CFG] selected proposal:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 25 10:22:08 ipsec: 06[IKE] inbound CHILD_SA ionline_EY{20} established with
SPIs c61cb13c_i c0f26b46_o and TS 192.168.1.0/24 === 172.16.102.0/24
[I] May 25 10:22:08 ndm: IpSec::Configurator: "ionline_EY": crypto map was
renegotiated.
[I] May 25 10:22:08 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 16, active CHILD SA: 0.
[I] May 25 10:22:08 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 16, active CHILD SA: 1, state up.
[I] May 25 10:22:08 ipsec: 14[IKE] received DELETE for ESP CHILD_SA with SPI
cba3c307
[I] May 25 10:22:08 ipsec: 14[IKE] closing CHILD_SA ionline_EY{19} with SPIs
c1b56a9c_i (0 bytes) cba3c307_o (0 bytes) and TS 192.168.1.0/24 === 172.16.102.0/24

[I] May 25 10:22:08 ipsec: 14[IKE] sending DELETE for ESP CHILD_SA with SPI
c1b56a9c
[I] May 25 10:22:08 ipsec: 14[IKE] CHILD_SA closed
[I] May 25 10:22:08 ipsec: 14[IKE] outbound CHILD_SA ionline_EY{20} established
with SPIs c61cb13c_i c0f26b46_o and TS 192.168.1.0/24 === 172.16.102.0/24
[I] May 25 10:22:08 ndm: IpSec::IpSecNetfilter: start reloading netfilter
configuration...
[I] May 25 10:22:08 ndm: IpSec::IpSecNetfilter: netfilter configuration reloading
is done.
[I] May 25 10:22:10 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster0/AccessPoint0": STA(a4:4b:d5:f3:e4:9f) had re-associated successfully.
[I] May 25 10:22:10 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster0/AccessPoint0": STA(a4:4b:d5:f3:e4:9f) set key done in WPA2/WPA2PSK.
[I] May 25 10:22:18 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 16, active CHILD SA: 1.
[I] May 25 10:22:18 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 16, active CHILD SA: 1.
[I] May 25 10:24:50 ndnproxy: answer from wrong socket, ignore.
[I] May 25 10:26:34 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster0/AccessPoint0": STA(a4:4b:d5:f3:e4:9f) had associated successfully.
[I] May 25 10:26:34 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster0/AccessPoint0": STA(a4:4b:d5:f3:e4:9f) had associated successfully.
[I] May 25 10:26:39 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster0/AccessPoint0": STA(a4:4b:d5:f3:e4:9f) pairwise key handshaking timeout
(msg 1 of 4-way).
[I] May 25 10:26:39 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster0/AccessPoint0": STA(a4:4b:d5:f3:e4:9f) had deauthenticated by AP
(reason: PTK 4-way handshake timeout).
[I] May 25 10:27:17 ipsec: 13[IKE] initiating IKE_SA ionline_EY[35] to
46.32.170.109
[I] May 25 10:27:17 ipsec: 07[CFG] received proposals:
IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
[I] May 25 10:27:17 ipsec: 07[CFG] configured proposals:
IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
[I] May 25 10:27:17 ipsec: 07[CFG] selected proposal:
IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
[I] May 25 10:27:17 ipsec: 07[IKE] scheduling rekeying in 3574s
[I] May 25 10:27:17 ipsec: 07[IKE] maximum IKE_SA lifetime 3594s
[I] May 25 10:27:17 ipsec: 07[IKE] IKE_SA ionline_EY[35] rekeyed between
78.109.53.15[7thsorrow.keenetic.pro]...46.32.170.109[46.32.170.109]
[I] May 25 10:27:17 ipsec: 07[IKE] deleting IKE_SA ionline_EY[33] between
78.109.53.15[7thsorrow.keenetic.pro]...46.32.170.109[46.32.170.109]
[I] May 25 10:27:17 ipsec: 07[IKE] sending DELETE for IKE_SA ionline_EY[33]
[I] May 25 10:27:17 ipsec: 14[IKE] IKE_SA deleted
[I] May 25 10:29:47 ndnproxy: answer from wrong socket, ignore.
[I] May 25 10:32:50 ndnproxy: Core::Syslog: last message repeated 3 times.
[I] May 25 10:32:54 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster0/AccessPoint0": STA(a4:4b:d5:f3:e4:9f) had associated successfully.
[I] May 25 10:32:54 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster0/AccessPoint0": STA(a4:4b:d5:f3:e4:9f) set key done in WPA2/WPA2PSK.
[I] May 25 10:32:54 ndhcps: DHCPDISCOVER received from a4:4b:d5:f3:e4:9f.
[I] May 25 10:32:54 ndhcps: making OFFER of 192.168.1.80 to a4:4b:d5:f3:e4:9f.
[I] May 25 10:32:54 ndhcps: DHCPREQUEST received (STATE_SELECTING) for 192.168.1.80
from a4:4b:d5:f3:e4:9f.
[I] May 25 10:32:55 ndhcps: sending ACK of 192.168.1.80 to a4:4b:d5:f3:e4:9f.
[I] May 25 10:33:17 ndnproxy: answer from wrong socket, ignore.
[I] May 25 10:34:33 ndnproxy: answer from wrong socket, ignore.
[I] May 25 10:34:41 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 25 10:37:52 ndnproxy: answer from wrong socket, ignore.
[I] May 25 10:46:05 ndnproxy: Core::Syslog: last message repeated 3 times.
[I] May 25 10:46:37 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster0/AccessPoint0": STA(a4:4b:d5:f3:e4:9f) had been aged-out and
disassociated (idle silence).
[I] May 25 10:47:50 ndnproxy: answer from wrong socket, ignore.
[I] May 25 10:48:38 ndnproxy: answer from wrong socket, ignore.
[I] May 25 10:49:41 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 25 10:55:11 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(14:eb:b6:d0:19:de) GTK rekey done, group cipher
AES.
[I] May 25 10:55:18 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster0/AccessPoint0": STA(c8:3d:dc:ae:52:77) GTK rekey done, group cipher
AES.
[I] May 25 11:00:19 ndnproxy: answer from wrong socket, ignore.
[I] May 25 11:02:32 ipsec: 03[IKE] message verification failed
[I] May 25 11:02:32 ipsec: 03[IKE] IKE_SA_INIT request with message ID 0 processing
failed
[I] May 25 11:04:41 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 25 11:04:46 ipsec: 12[IKE] no IKE config found for
78.109.53.15...169.228.66.212, sending NO_PROPOSAL_CHOSEN
[I] May 25 11:04:46 ipsec: 15[IKE] no IKE config found for
78.109.53.15...169.228.66.212, sending NO_PROPOSAL_CHOSEN
[I] May 25 11:11:42 ndnproxy: answer from wrong socket, ignore.
[I] May 25 11:11:44 ndnproxy: answer from wrong socket, ignore.
[I] May 25 11:14:01 ipsec: 13[IKE] received ESP_TFC_PADDING_NOT_SUPPORTED, not
using ESPv3 TFC padding
[I] May 25 11:14:01 ipsec: 13[CFG] received proposals:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 25 11:14:01 ipsec: 13[CFG] configured proposals:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 25 11:14:01 ipsec: 13[CFG] selected proposal:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 25 11:14:01 ipsec: 13[IKE] inbound CHILD_SA ionline_EY{21} established with
SPIs cca3dce1_i cc3edf37_o and TS 192.168.1.0/24 === 172.16.102.0/24
[I] May 25 11:14:01 ndm: IpSec::Configurator: "ionline_EY": crypto map was
renegotiated.
[I] May 25 11:14:02 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 16, active CHILD SA: 0.
[I] May 25 11:14:02 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 17, active CHILD SA: 1, state up.
[I] May 25 11:14:02 ipsec: 05[IKE] received DELETE for ESP CHILD_SA with SPI
c0f26b46
[I] May 25 11:14:02 ipsec: 05[IKE] closing CHILD_SA ionline_EY{20} with SPIs
c61cb13c_i (0 bytes) c0f26b46_o (0 bytes) and TS 192.168.1.0/24 === 172.16.102.0/24

[I] May 25 11:14:02 ipsec: 05[IKE] sending DELETE for ESP CHILD_SA with SPI
c61cb13c
[I] May 25 11:14:02 ipsec: 05[IKE] CHILD_SA closed
[I] May 25 11:14:02 ipsec: 05[IKE] outbound CHILD_SA ionline_EY{21} established
with SPIs cca3dce1_i cc3edf37_o and TS 192.168.1.0/24 === 172.16.102.0/24
[I] May 25 11:14:02 ndm: IpSec::IpSecNetfilter: start reloading netfilter
configuration...
[I] May 25 11:14:02 ndm: IpSec::IpSecNetfilter: netfilter configuration reloading
is done.
[I] May 25 11:14:12 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 17, active CHILD SA: 1.
[I] May 25 11:14:12 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 17, active CHILD SA: 1.
[I] May 25 11:19:44 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 25 11:22:01 ipsec: 10[IKE] message verification failed
[I] May 25 11:22:01 ipsec: 10[IKE] IKE_SA_INIT request with message ID 0 processing
failed
[I] May 25 11:24:20 ndnproxy: answer from wrong socket, ignore.
[I] May 25 11:25:05 ndnproxy: answer from wrong socket, ignore.
[I] May 25 11:26:51 ipsec: 05[IKE] initiating IKE_SA ionline_EY[40] to
46.32.170.109
[I] May 25 11:26:52 ipsec: 12[CFG] received proposals:
IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
[I] May 25 11:26:52 ipsec: 12[CFG] configured proposals:
IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
[I] May 25 11:26:52 ipsec: 12[CFG] selected proposal:
IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
[I] May 25 11:26:52 ipsec: 12[IKE] scheduling rekeying in 3573s
[I] May 25 11:26:52 ipsec: 12[IKE] maximum IKE_SA lifetime 3593s
[I] May 25 11:26:52 ipsec: 12[IKE] IKE_SA ionline_EY[40] rekeyed between
78.109.53.15[7thsorrow.keenetic.pro]...46.32.170.109[46.32.170.109]
[I] May 25 11:26:52 ipsec: 12[IKE] deleting IKE_SA ionline_EY[35] between
78.109.53.15[7thsorrow.keenetic.pro]...46.32.170.109[46.32.170.109]
[I] May 25 11:26:52 ipsec: 12[IKE] sending DELETE for IKE_SA ionline_EY[35]
[I] May 25 11:26:52 ipsec: 03[IKE] IKE_SA deleted
[I] May 25 11:28:04 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster0/AccessPoint0": STA(c8:3d:dc:ae:52:77) had associated successfully.
[I] May 25 11:28:04 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster0/AccessPoint0": STA(c8:3d:dc:ae:52:77) set key done in WPA2/WPA2PSK.
[I] May 25 11:28:04 ndhcps: DHCPDISCOVER received from c8:3d:dc:ae:52:77.
[I] May 25 11:28:04 ndhcps: making OFFER of 192.168.1.88 to c8:3d:dc:ae:52:77.
[I] May 25 11:28:04 ndhcps: DHCPREQUEST received (STATE_SELECTING) for 192.168.1.88
from c8:3d:dc:ae:52:77.
[I] May 25 11:28:05 ndhcps: sending ACK of 192.168.1.88 to c8:3d:dc:ae:52:77.
[I] May 25 11:28:47 ndnproxy: answer from wrong socket, ignore.
[I] May 25 11:33:54 ndnproxy: Core::Syslog: last message repeated 5 times.
[I] May 25 11:34:45 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 25 11:41:15 ndnproxy: answer from wrong socket, ignore.
[I] May 25 11:46:08 ndnproxy: Core::Syslog: last message repeated 4 times.
[I] May 25 11:49:47 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 25 11:50:51 ndnproxy: answer from wrong socket, ignore.
[I] May 25 11:53:52 ndnproxy: Core::Syslog: last message repeated 5 times.
[I] May 25 11:56:40 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(14:eb:b6:d0:19:de) GTK rekey done, group cipher
AES.
[I] May 25 11:56:46 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster0/AccessPoint0": STA(c8:3d:dc:ae:52:77) GTK rekey done, group cipher
AES.
[I] May 25 12:01:12 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster0/AccessPoint0": STA(a4:4b:d5:f3:e4:9f) had associated successfully.
[I] May 25 12:01:12 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster0/AccessPoint0": STA(a4:4b:d5:f3:e4:9f) set key done in WPA2/WPA2PSK.
[I] May 25 12:01:12 ndhcps: DHCPDISCOVER received from a4:4b:d5:f3:e4:9f.
[I] May 25 12:01:12 ndhcps: making OFFER of 192.168.1.80 to a4:4b:d5:f3:e4:9f.
[I] May 25 12:01:12 ndhcps: DHCPREQUEST received (STATE_SELECTING) for 192.168.1.80
from a4:4b:d5:f3:e4:9f.
[I] May 25 12:01:12 ndhcps: sending ACK of 192.168.1.80 to a4:4b:d5:f3:e4:9f.
[I] May 25 12:01:41 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(a4:4b:d5:f3:e4:9f) had re-associated successfully.
[I] May 25 12:01:41 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(a4:4b:d5:f3:e4:9f) set key done in WPA2/WPA2PSK.
[I] May 25 12:01:50 ndnproxy: answer from wrong socket, ignore.
[I] May 25 12:01:57 ndhcps: DHCPREQUEST received (STATE_RENEWING) for 192.168.1.110
from 14:eb:b6:d0:19:dd.
[I] May 25 12:01:58 ndhcps: received ARP reply from 14:eb:b6:d0:19:de, not our
client.
[I] May 25 12:01:58 ndhcps: sending ACK of 192.168.1.110 to 14:eb:b6:d0:19:dd.
[I] May 25 12:02:54 ipsec: 07[IKE] received ESP_TFC_PADDING_NOT_SUPPORTED, not
using ESPv3 TFC padding
[I] May 25 12:02:54 ipsec: 07[CFG] received proposals:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 25 12:02:54 ipsec: 07[CFG] configured proposals:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 25 12:02:54 ipsec: 07[CFG] selected proposal:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 25 12:02:54 ipsec: 07[IKE] inbound CHILD_SA ionline_EY{22} established with
SPIs cd2d1e9f_i c26d5882_o and TS 192.168.1.0/24 === 172.16.102.0/24
[I] May 25 12:02:54 ndm: IpSec::Configurator: "ionline_EY": crypto map was
renegotiated.
[I] May 25 12:02:54 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 17, active CHILD SA: 0.
[I] May 25 12:02:54 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 18, active CHILD SA: 1, state up.
[I] May 25 12:02:54 ipsec: 05[IKE] received DELETE for ESP CHILD_SA with SPI
cc3edf37
[I] May 25 12:02:54 ipsec: 05[IKE] closing CHILD_SA ionline_EY{21} with SPIs
cca3dce1_i (0 bytes) cc3edf37_o (0 bytes) and TS 192.168.1.0/24 === 172.16.102.0/24

[I] May 25 12:02:54 ipsec: 05[IKE] sending DELETE for ESP CHILD_SA with SPI
cca3dce1
[I] May 25 12:02:54 ipsec: 05[IKE] CHILD_SA closed
[I] May 25 12:02:54 ipsec: 05[IKE] outbound CHILD_SA ionline_EY{22} established
with SPIs cd2d1e9f_i c26d5882_o and TS 192.168.1.0/24 === 172.16.102.0/24
[I] May 25 12:02:54 ndm: IpSec::IpSecNetfilter: start reloading netfilter
configuration...
[I] May 25 12:02:54 ndm: IpSec::IpSecNetfilter: netfilter configuration reloading
is done.
[I] May 25 12:03:01 ndhcps: DHCPREQUEST received (STATE_RENEWING) for 192.168.1.11
from 04:42:1a:26:ee:e6.
[I] May 25 12:03:01 ndhcps: sending ACK of 192.168.1.11 to 04:42:1a:26:ee:e6.
[I] May 25 12:03:04 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 18, active CHILD SA: 1.
[I] May 25 12:03:04 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 18, active CHILD SA: 1.
[I] May 25 12:03:59 ndnproxy: answer from wrong socket, ignore.
[I] May 25 12:04:03 ndnproxy: answer from wrong socket, ignore.
[I] May 25 12:04:47 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 25 12:08:18 ndnproxy: answer from wrong socket, ignore.
[I] May 25 12:12:00 ipsec: 09[IKE] message verification failed
[I] May 25 12:12:00 ipsec: 09[IKE] IKE_SA_INIT request with message ID 0 processing
failed
[I] May 25 12:13:59 ndnproxy: answer from wrong socket, ignore.
[I] May 25 12:18:20 ndnproxy: answer from wrong socket, ignore.
[I] May 25 12:19:47 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 25 12:21:13 ndnproxy: answer from wrong socket, ignore.
[I] May 25 12:26:18 ndnproxy: answer from wrong socket, ignore.
[I] May 25 12:26:25 ipsec: 14[IKE] initiating IKE_SA ionline_EY[42] to
46.32.170.109
[I] May 25 12:26:25 ipsec: 12[CFG] received proposals:
IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
[I] May 25 12:26:25 ipsec: 12[CFG] configured proposals:
IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
[I] May 25 12:26:25 ipsec: 12[CFG] selected proposal:
IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
[I] May 25 12:26:25 ipsec: 12[IKE] scheduling rekeying in 3571s
[I] May 25 12:26:25 ipsec: 12[IKE] maximum IKE_SA lifetime 3591s
[I] May 25 12:26:25 ipsec: 12[IKE] IKE_SA ionline_EY[42] rekeyed between
78.109.53.15[7thsorrow.keenetic.pro]...46.32.170.109[46.32.170.109]
[I] May 25 12:26:25 ipsec: 12[IKE] deleting IKE_SA ionline_EY[40] between
78.109.53.15[7thsorrow.keenetic.pro]...46.32.170.109[46.32.170.109]
[I] May 25 12:26:25 ipsec: 12[IKE] sending DELETE for IKE_SA ionline_EY[40]
[I] May 25 12:26:25 ipsec: 06[IKE] IKE_SA deleted
[I] May 25 12:26:34 ipsec: 14[IKE] message verification failed
[I] May 25 12:26:34 ipsec: 14[IKE] IKE_SA_INIT request with message ID 0 processing
failed
[I] May 25 12:27:26 ndnproxy: answer from wrong socket, ignore.
[I] May 25 12:32:20 ndnproxy: Core::Syslog: last message repeated 4 times.
[I] May 25 12:34:47 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 25 12:35:19 ndnproxy: answer from wrong socket, ignore.
[I] May 25 12:49:24 ndnproxy: Core::Syslog: last message repeated 6 times.
[I] May 25 12:49:47 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 25 12:49:48 ndnproxy: answer from wrong socket, ignore.
[I] May 25 12:49:50 ndnproxy: answer from wrong socket, ignore.
[I] May 25 12:51:57 ipsec: 11[IKE] received ESP_TFC_PADDING_NOT_SUPPORTED, not
using ESPv3 TFC padding
[I] May 25 12:51:57 ipsec: 11[CFG] received proposals:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 25 12:51:57 ipsec: 11[CFG] configured proposals:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 25 12:51:57 ipsec: 11[CFG] selected proposal:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 25 12:51:57 ipsec: 11[IKE] inbound CHILD_SA ionline_EY{23} established with
SPIs c30e4ba9_i c4a3e1cd_o and TS 192.168.1.0/24 === 172.16.102.0/24
[I] May 25 12:51:57 ndm: IpSec::Configurator: "ionline_EY": crypto map was
renegotiated.
[I] May 25 12:51:57 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 18, active CHILD SA: 0.
[I] May 25 12:51:57 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 19, active CHILD SA: 1, state up.
[I] May 25 12:51:57 ipsec: 03[IKE] received DELETE for ESP CHILD_SA with SPI
c26d5882
[I] May 25 12:51:57 ipsec: 03[IKE] closing CHILD_SA ionline_EY{22} with SPIs
cd2d1e9f_i (0 bytes) c26d5882_o (0 bytes) and TS 192.168.1.0/24 === 172.16.102.0/24

[I] May 25 12:51:57 ipsec: 03[IKE] sending DELETE for ESP CHILD_SA with SPI
cd2d1e9f
[I] May 25 12:51:57 ipsec: 03[IKE] CHILD_SA closed
[I] May 25 12:51:57 ipsec: 03[IKE] outbound CHILD_SA ionline_EY{23} established
with SPIs c30e4ba9_i c4a3e1cd_o and TS 192.168.1.0/24 === 172.16.102.0/24
[I] May 25 12:51:57 ndm: IpSec::IpSecNetfilter: start reloading netfilter
configuration...
[I] May 25 12:51:57 ndm: IpSec::IpSecNetfilter: netfilter configuration reloading
is done.
[I] May 25 12:52:07 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 19, active CHILD SA: 1.
[I] May 25 12:52:07 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 19, active CHILD SA: 1.
[I] May 25 12:52:12 ndnproxy: answer from wrong socket, ignore.
[I] May 25 12:56:59 ndnproxy: Core::Syslog: last message repeated 6 times.
[I] May 25 12:58:08 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(14:eb:b6:d0:19:de) GTK rekey done, group cipher
AES.
[I] May 25 12:58:08 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(a4:4b:d5:f3:e4:9f) GTK rekey done, group cipher
AES.
[I] May 25 12:58:14 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster0/AccessPoint0": STA(c8:3d:dc:ae:52:77) GTK rekey done, group cipher
AES.
[I] May 25 13:02:40 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(d4:5e:ec:6e:1d:13) had associated successfully.
[I] May 25 13:02:40 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(d4:5e:ec:6e:1d:13) set key done in WPA2/WPA2PSK.
[I] May 25 13:02:40 ndhcps: DHCPDISCOVER received from d4:5e:ec:6e:1d:13.
[I] May 25 13:02:41 ndhcps: making OFFER of 192.168.1.84 to d4:5e:ec:6e:1d:13.
[I] May 25 13:02:41 ndhcps: DHCPREQUEST received (STATE_SELECTING) for 192.168.1.84
from d4:5e:ec:6e:1d:13.
[I] May 25 13:02:41 ndhcps: sending ACK of 192.168.1.84 to d4:5e:ec:6e:1d:13.
[I] May 25 13:02:51 ndnproxy: answer from wrong socket, ignore.
[I] May 25 13:03:47 ndnproxy: Core::Syslog: last message repeated 8 times.
[I] May 25 13:04:47 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 25 13:04:48 ndnproxy: answer from wrong socket, ignore.
[I] May 25 13:19:19 ndnproxy: Core::Syslog: last message repeated 4 times.
[I] May 25 13:19:47 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 25 13:25:56 ipsec: 06[IKE] initiating IKE_SA ionline_EY[44] to
46.32.170.109
[I] May 25 13:25:56 ipsec: 13[CFG] received proposals:
IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
[I] May 25 13:25:56 ipsec: 13[CFG] configured proposals:
IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
[I] May 25 13:25:56 ipsec: 13[CFG] selected proposal:
IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
[I] May 25 13:25:56 ipsec: 13[IKE] scheduling rekeying in 3576s
[I] May 25 13:25:56 ipsec: 13[IKE] maximum IKE_SA lifetime 3596s
[I] May 25 13:25:56 ipsec: 13[IKE] IKE_SA ionline_EY[44] rekeyed between
78.109.53.15[7thsorrow.keenetic.pro]...46.32.170.109[46.32.170.109]
[I] May 25 13:25:56 ipsec: 13[IKE] deleting IKE_SA ionline_EY[42] between
78.109.53.15[7thsorrow.keenetic.pro]...46.32.170.109[46.32.170.109]
[I] May 25 13:25:56 ipsec: 13[IKE] sending DELETE for IKE_SA ionline_EY[42]
[I] May 25 13:25:56 ipsec: 11[IKE] IKE_SA deleted
[I] May 25 13:26:13 ndnproxy: answer from wrong socket, ignore.
[I] May 25 13:33:34 ndnproxy: Core::Syslog: last message repeated 3 times.
[I] May 25 13:34:48 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 25 13:36:01 ndnproxy: answer from wrong socket, ignore.
[I] May 25 13:42:40 ipsec: 05[IKE] received ESP_TFC_PADDING_NOT_SUPPORTED, not
using ESPv3 TFC padding
[I] May 25 13:42:40 ipsec: 05[CFG] received proposals:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 25 13:42:40 ipsec: 05[CFG] configured proposals:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 25 13:42:40 ipsec: 05[CFG] selected proposal:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 25 13:42:40 ipsec: 05[IKE] inbound CHILD_SA ionline_EY{24} established with
SPIs cd66489a_i cb897492_o and TS 192.168.1.0/24 === 172.16.102.0/24
[I] May 25 13:42:40 ndm: IpSec::Configurator: "ionline_EY": crypto map was
renegotiated.
[I] May 25 13:42:40 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 19, active CHILD SA: 0.
[I] May 25 13:42:40 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 20, active CHILD SA: 1, state up.
[I] May 25 13:42:40 ipsec: 03[IKE] received DELETE for ESP CHILD_SA with SPI
c4a3e1cd
[I] May 25 13:42:40 ipsec: 03[IKE] closing CHILD_SA ionline_EY{23} with SPIs
c30e4ba9_i (0 bytes) c4a3e1cd_o (0 bytes) and TS 192.168.1.0/24 === 172.16.102.0/24

[I] May 25 13:42:40 ipsec: 03[IKE] sending DELETE for ESP CHILD_SA with SPI
c30e4ba9
[I] May 25 13:42:40 ipsec: 03[IKE] CHILD_SA closed
[I] May 25 13:42:40 ipsec: 03[IKE] outbound CHILD_SA ionline_EY{24} established
with SPIs cd66489a_i cb897492_o and TS 192.168.1.0/24 === 172.16.102.0/24
[I] May 25 13:42:41 ndm: IpSec::IpSecNetfilter: start reloading netfilter
configuration...
[I] May 25 13:42:41 ndm: IpSec::IpSecNetfilter: netfilter configuration reloading
is done.
[I] May 25 13:42:50 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 20, active CHILD SA: 1.
[I] May 25 13:42:51 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 20, active CHILD SA: 1.
[I] May 25 13:46:19 ndnproxy: answer from wrong socket, ignore.
[I] May 25 13:49:41 ndnproxy: Core::Syslog: last message repeated 2 times.
[I] May 25 13:49:48 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[E] May 25 13:54:29 stubby: "cloudflare-dns.com": too many failed requests, try to
reload process
[E] May 25 13:54:29 ndm: Service: "DoT "System" proxy #1": unexpectedly stopped.
[I] May 25 13:54:32 stubby: starting Stubby 0.4.0
[I] May 25 13:59:37 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(14:eb:b6:d0:19:de) GTK rekey done, group cipher
AES.
[I] May 25 13:59:37 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(d4:5e:ec:6e:1d:13) GTK rekey done, group cipher
AES.
[I] May 25 13:59:37 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(a4:4b:d5:f3:e4:9f) GTK rekey done, group cipher
AES.
[I] May 25 13:59:43 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster0/AccessPoint0": STA(c8:3d:dc:ae:52:77) GTK rekey done, group cipher
AES.
[I] May 25 14:01:02 ndnproxy: answer from wrong socket, ignore.
[I] May 25 14:04:26 ndnproxy: answer from wrong socket, ignore.
[I] May 25 14:04:48 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 25 14:09:04 ndnproxy: answer from wrong socket, ignore.
[I] May 25 14:12:19 ndnproxy: answer from wrong socket, ignore.
[I] May 25 14:13:07 ipsec: 09[IKE] no IKE config found for
78.109.53.15...43.163.219.230, sending NO_PROPOSAL_CHOSEN
[I] May 25 14:13:57 ndnproxy: answer from wrong socket, ignore.
[I] May 25 14:16:01 ndnproxy: Core::Syslog: last message repeated 2 times.
[I] May 25 14:19:48 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 25 14:25:11 ndnproxy: answer from wrong socket, ignore.
[I] May 25 14:25:32 ipsec: 11[IKE] initiating IKE_SA ionline_EY[46] to
46.32.170.109
[I] May 25 14:25:32 ipsec: 09[CFG] received proposals:
IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
[I] May 25 14:25:32 ipsec: 09[CFG] configured proposals:
IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
[I] May 25 14:25:32 ipsec: 09[CFG] selected proposal:
IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
[I] May 25 14:25:32 ipsec: 09[IKE] scheduling rekeying in 3576s
[I] May 25 14:25:32 ipsec: 09[IKE] maximum IKE_SA lifetime 3596s
[I] May 25 14:25:32 ipsec: 09[IKE] IKE_SA ionline_EY[46] rekeyed between
78.109.53.15[7thsorrow.keenetic.pro]...46.32.170.109[46.32.170.109]
[I] May 25 14:25:32 ipsec: 09[IKE] deleting IKE_SA ionline_EY[44] between
78.109.53.15[7thsorrow.keenetic.pro]...46.32.170.109[46.32.170.109]
[I] May 25 14:25:32 ipsec: 09[IKE] sending DELETE for IKE_SA ionline_EY[44]
[I] May 25 14:25:32 ipsec: 15[IKE] IKE_SA deleted
[I] May 25 14:29:34 ndnproxy: answer from wrong socket, ignore.
[I] May 25 14:30:17 ipsec: 05[IKE] received retransmit of request with ID 27,
retransmitting response
[I] May 25 14:30:19 ndnproxy: answer from wrong socket, ignore.
[I] May 25 14:30:58 ipsec: 15[IKE] received ESP_TFC_PADDING_NOT_SUPPORTED, not
using ESPv3 TFC padding
[I] May 25 14:30:58 ipsec: 15[CFG] received proposals:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 25 14:30:58 ipsec: 15[CFG] configured proposals:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 25 14:30:58 ipsec: 15[CFG] selected proposal:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 25 14:30:58 ipsec: 15[IKE] inbound CHILD_SA ionline_EY{25} established with
SPIs c95f32b4_i c90c0123_o and TS 192.168.1.0/24 === 172.16.102.0/24
[I] May 25 14:30:58 ndm: IpSec::Configurator: "ionline_EY": crypto map was
renegotiated.
[I] May 25 14:30:58 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 20, active CHILD SA: 0.
[I] May 25 14:30:58 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 21, active CHILD SA: 1, state up.
[I] May 25 14:30:58 ipsec: 09[IKE] received DELETE for ESP CHILD_SA with SPI
cb897492
[I] May 25 14:30:58 ipsec: 09[IKE] closing CHILD_SA ionline_EY{24} with SPIs
cd66489a_i (0 bytes) cb897492_o (0 bytes) and TS 192.168.1.0/24 === 172.16.102.0/24

[I] May 25 14:30:58 ipsec: 09[IKE] sending DELETE for ESP CHILD_SA with SPI
cd66489a
[I] May 25 14:30:58 ipsec: 09[IKE] CHILD_SA closed
[I] May 25 14:30:58 ipsec: 09[IKE] outbound CHILD_SA ionline_EY{25} established
with SPIs c95f32b4_i c90c0123_o and TS 192.168.1.0/24 === 172.16.102.0/24
[I] May 25 14:30:58 ndm: IpSec::IpSecNetfilter: start reloading netfilter
configuration...
[I] May 25 14:30:58 ndm: IpSec::IpSecNetfilter: netfilter configuration reloading
is done.
[I] May 25 14:31:02 ipsec: 15[IKE] received retransmit of request with ID 33,
retransmitting response
[I] May 25 14:31:08 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 21, active CHILD SA: 1.
[I] May 25 14:31:08 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 21, active CHILD SA: 1.
[I] May 25 14:34:48 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 25 14:36:06 ndnproxy: answer from wrong socket, ignore.
[I] May 25 14:48:30 ndnproxy: Core::Syslog: last message repeated 4 times.
[I] May 25 14:49:48 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 25 14:50:02 ndnproxy: answer from wrong socket, ignore.
[I] May 25 14:50:40 ndnproxy: answer from wrong socket, ignore.
[I] May 25 14:58:07 ndhcps: DHCPREQUEST received (STATE_RENEWING) for 192.168.1.88
from c8:3d:dc:ae:52:77.
[I] May 25 14:58:07 ndhcps: sending ACK of 192.168.1.88 to c8:3d:dc:ae:52:77.
[I] May 25 14:58:41 ndnproxy: answer from wrong socket, ignore.
[I] May 25 15:01:05 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(14:eb:b6:d0:19:de) GTK rekey done, group cipher
AES.
[I] May 25 15:01:05 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(d4:5e:ec:6e:1d:13) GTK rekey done, group cipher
AES.
[I] May 25 15:01:05 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(a4:4b:d5:f3:e4:9f) GTK rekey done, group cipher
AES.
[I] May 25 15:01:11 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster0/AccessPoint0": STA(c8:3d:dc:ae:52:77) GTK rekey done, group cipher
AES.
[I] May 25 15:03:59 ndnproxy: answer from wrong socket, ignore.
[I] May 25 15:04:48 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 25 15:07:33 ndnproxy: answer from wrong socket, ignore.
[I] May 25 15:13:14 ndnproxy: Core::Syslog: last message repeated 2 times.
[I] May 25 15:15:12 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(d4:5e:ec:6e:1d:13) had been aged-out and
disassociated (idle silence).
[I] May 25 15:18:36 ndnproxy: answer from wrong socket, ignore.
[I] May 25 15:18:59 ndnproxy: answer from wrong socket, ignore.
[I] May 25 15:19:26 ndhcps: DHCPDISCOVER received for 192.168.1.94 from
00:e0:4c:36:02:d4.
[I] May 25 15:19:27 ndhcps: making OFFER of 192.168.1.94 to 00:e0:4c:36:02:d4.
[I] May 25 15:19:27 ndhcps: DHCPREQUEST received (STATE_SELECTING) for 192.168.1.94
from 00:e0:4c:36:02:d4.
[I] May 25 15:19:27 ndhcps: sending ACK of 192.168.1.94 to 00:e0:4c:36:02:d4.
[I] May 25 15:19:48 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 25 15:22:09 ipsec: 15[IKE] received ESP_TFC_PADDING_NOT_SUPPORTED, not
using ESPv3 TFC padding
[I] May 25 15:22:09 ipsec: 15[CFG] received proposals:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 25 15:22:09 ipsec: 15[CFG] configured proposals:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 25 15:22:09 ipsec: 15[CFG] selected proposal:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 25 15:22:09 ipsec: 15[IKE] inbound CHILD_SA ionline_EY{26} established with
SPIs c366e589_i c420e2ee_o and TS 192.168.1.0/24 === 172.16.102.0/24
[I] May 25 15:22:09 ndm: IpSec::Configurator: "ionline_EY": crypto map was
renegotiated.
[I] May 25 15:22:09 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 21, active CHILD SA: 0.
[I] May 25 15:22:09 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 21, active CHILD SA: 1, state up.
[I] May 25 15:22:09 ipsec: 10[IKE] received DELETE for ESP CHILD_SA with SPI
c90c0123
[I] May 25 15:22:09 ipsec: 10[IKE] closing CHILD_SA ionline_EY{25} with SPIs
c95f32b4_i (0 bytes) c90c0123_o (0 bytes) and TS 192.168.1.0/24 === 172.16.102.0/24

[I] May 25 15:22:09 ipsec: 10[IKE] sending DELETE for ESP CHILD_SA with SPI
c95f32b4
[I] May 25 15:22:09 ipsec: 10[IKE] CHILD_SA closed
[I] May 25 15:22:09 ipsec: 10[IKE] outbound CHILD_SA ionline_EY{26} established
with SPIs c366e589_i c420e2ee_o and TS 192.168.1.0/24 === 172.16.102.0/24
[I] May 25 15:22:10 ndm: IpSec::IpSecNetfilter: start reloading netfilter
configuration...
[I] May 25 15:22:10 ndm: IpSec::IpSecNetfilter: netfilter configuration reloading
is done.
[I] May 25 15:22:20 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 21, active CHILD SA: 1.
[I] May 25 15:22:20 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 21, active CHILD SA: 1.
[I] May 25 15:25:08 ipsec: 09[IKE] initiating IKE_SA ionline_EY[47] to
46.32.170.109
[I] May 25 15:25:08 ipsec: 03[CFG] received proposals:
IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
[I] May 25 15:25:08 ipsec: 03[CFG] configured proposals:
IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
[I] May 25 15:25:08 ipsec: 03[CFG] selected proposal:
IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
[I] May 25 15:25:08 ipsec: 03[IKE] scheduling rekeying in 3564s
[I] May 25 15:25:08 ipsec: 03[IKE] maximum IKE_SA lifetime 3584s
[I] May 25 15:25:08 ipsec: 03[IKE] IKE_SA ionline_EY[47] rekeyed between
78.109.53.15[7thsorrow.keenetic.pro]...46.32.170.109[46.32.170.109]
[I] May 25 15:25:08 ipsec: 03[IKE] deleting IKE_SA ionline_EY[46] between
78.109.53.15[7thsorrow.keenetic.pro]...46.32.170.109[46.32.170.109]
[I] May 25 15:25:08 ipsec: 03[IKE] sending DELETE for IKE_SA ionline_EY[46]
[I] May 25 15:25:08 ipsec: 05[IKE] IKE_SA deleted
[I] May 25 15:28:19 ndnproxy: answer from wrong socket, ignore.
[I] May 25 15:30:43 ndnproxy: answer from wrong socket, ignore.
[I] May 25 15:31:13 ndhcps: DHCPREQUEST received (STATE_RENEWING) for 192.168.1.80
from a4:4b:d5:f3:e4:9f.
[I] May 25 15:31:13 ndhcps: sending ACK of 192.168.1.80 to a4:4b:d5:f3:e4:9f.
[I] May 25 15:31:16 ndnproxy: answer from wrong socket, ignore.
[I] May 25 15:31:28 ndnproxy: Core::Syslog: last message repeated 3 times.
[I] May 25 15:31:58 ndhcps: DHCPREQUEST received (STATE_RENEWING) for 192.168.1.110
from 14:eb:b6:d0:19:dd.
[I] May 25 15:31:58 ndhcps: received ARP reply from 14:eb:b6:d0:19:de, not our
client.
[I] May 25 15:31:58 ndhcps: sending ACK of 192.168.1.110 to 14:eb:b6:d0:19:dd.
[I] May 25 15:33:00 ndhcps: DHCPREQUEST received (STATE_RENEWING) for 192.168.1.11
from 04:42:1a:26:ee:e6.
[I] May 25 15:33:00 ndhcps: sending ACK of 192.168.1.11 to 04:42:1a:26:ee:e6.
[I] May 25 15:33:29 ndnproxy: answer from wrong socket, ignore.
[I] May 25 15:34:48 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 25 15:36:49 ndnproxy: answer from wrong socket, ignore.
[I] May 25 15:43:34 ndnproxy: Core::Syslog: last message repeated 5 times.
[I] May 25 15:49:49 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 25 15:50:29 ndnproxy: answer from wrong socket, ignore.
[I] May 25 16:00:49 ndnproxy: Core::Syslog: last message repeated 4 times.
[I] May 25 16:02:34 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(14:eb:b6:d0:19:de) GTK rekey done, group cipher
AES.
[I] May 25 16:02:34 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(a4:4b:d5:f3:e4:9f) GTK rekey done, group cipher
AES.
[I] May 25 16:02:40 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster0/AccessPoint0": STA(c8:3d:dc:ae:52:77) GTK rekey done, group cipher
AES.
[I] May 25 16:04:49 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 25 16:05:20 ndnproxy: answer from wrong socket, ignore.
[I] May 25 16:07:19 ndnproxy: Core::Syslog: last message repeated 3 times.
[I] May 25 16:10:22 ipsec: 03[IKE] received ESP_TFC_PADDING_NOT_SUPPORTED, not
using ESPv3 TFC padding
[I] May 25 16:10:22 ipsec: 03[CFG] received proposals:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 25 16:10:22 ipsec: 03[CFG] configured proposals:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 25 16:10:22 ipsec: 03[CFG] selected proposal:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 25 16:10:22 ipsec: 03[IKE] inbound CHILD_SA ionline_EY{27} established with
SPIs c6e12056_i c1b2527b_o and TS 192.168.1.0/24 === 172.16.102.0/24
[I] May 25 16:10:22 ndm: IpSec::Configurator: "ionline_EY": crypto map was
renegotiated.
[I] May 25 16:10:22 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 21, active CHILD SA: 0.
[I] May 25 16:10:22 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 22, active CHILD SA: 1, state up.
[I] May 25 16:10:22 ipsec: 13[IKE] received DELETE for ESP CHILD_SA with SPI
c420e2ee
[I] May 25 16:10:22 ipsec: 13[IKE] closing CHILD_SA ionline_EY{26} with SPIs
c366e589_i (0 bytes) c420e2ee_o (0 bytes) and TS 192.168.1.0/24 === 172.16.102.0/24

[I] May 25 16:10:22 ipsec: 13[IKE] sending DELETE for ESP CHILD_SA with SPI
c366e589
[I] May 25 16:10:22 ipsec: 13[IKE] CHILD_SA closed
[I] May 25 16:10:22 ipsec: 13[IKE] outbound CHILD_SA ionline_EY{27} established
with SPIs c6e12056_i c1b2527b_o and TS 192.168.1.0/24 === 172.16.102.0/24
[I] May 25 16:10:23 ndm: IpSec::IpSecNetfilter: start reloading netfilter
configuration...
[I] May 25 16:10:23 ndm: IpSec::IpSecNetfilter: netfilter configuration reloading
is done.
[I] May 25 16:10:32 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 22, active CHILD SA: 1.
[I] May 25 16:10:33 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 22, active CHILD SA: 1.
[I] May 25 16:13:11 ndnproxy: answer from wrong socket, ignore.
[I] May 25 16:17:20 ndnproxy: answer from wrong socket, ignore.
[I] May 25 16:19:49 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 25 16:19:57 ndnproxy: answer from wrong socket, ignore.
[I] May 25 16:24:32 ipsec: 07[IKE] initiating IKE_SA ionline_EY[48] to
46.32.170.109
[I] May 25 16:24:32 ipsec: 06[CFG] received proposals:
IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
[I] May 25 16:24:32 ipsec: 06[CFG] configured proposals:
IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
[I] May 25 16:24:32 ipsec: 06[CFG] selected proposal:
IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
[I] May 25 16:24:32 ipsec: 06[IKE] scheduling rekeying in 3573s
[I] May 25 16:24:32 ipsec: 06[IKE] maximum IKE_SA lifetime 3593s
[I] May 25 16:24:32 ipsec: 06[IKE] IKE_SA ionline_EY[48] rekeyed between
78.109.53.15[7thsorrow.keenetic.pro]...46.32.170.109[46.32.170.109]
[I] May 25 16:24:32 ipsec: 06[IKE] deleting IKE_SA ionline_EY[47] between
78.109.53.15[7thsorrow.keenetic.pro]...46.32.170.109[46.32.170.109]
[I] May 25 16:24:32 ipsec: 06[IKE] sending DELETE for IKE_SA ionline_EY[47]
[I] May 25 16:24:32 ipsec: 15[IKE] IKE_SA deleted
[I] May 25 16:28:15 ndnproxy: answer from wrong socket, ignore.
[I] May 25 16:32:49 ndnproxy: Core::Syslog: last message repeated 3 times.
[I] May 25 16:34:49 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 25 16:35:22 ndnproxy: answer from wrong socket, ignore.
[I] May 25 16:46:34 ndnproxy: Core::Syslog: last message repeated 5 times.
[I] May 25 16:49:49 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 25 16:52:34 ndnproxy: answer from wrong socket, ignore.
[I] May 25 16:58:59 ndnproxy: Core::Syslog: last message repeated 2 times.
[I] May 25 16:59:55 ipsec: 10[IKE] received ESP_TFC_PADDING_NOT_SUPPORTED, not
using ESPv3 TFC padding
[I] May 25 16:59:55 ipsec: 10[CFG] received proposals:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 25 16:59:55 ipsec: 10[CFG] configured proposals:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 25 16:59:55 ipsec: 10[CFG] selected proposal:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 25 16:59:55 ipsec: 10[IKE] inbound CHILD_SA ionline_EY{28} established with
SPIs ce0a17bd_i c62c1d4c_o and TS 192.168.1.0/24 === 172.16.102.0/24
[I] May 25 16:59:55 ndm: IpSec::Configurator: "ionline_EY": crypto map was
renegotiated.
[I] May 25 16:59:55 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 22, active CHILD SA: 0.
[I] May 25 16:59:55 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 23, active CHILD SA: 1, state up.
[I] May 25 16:59:55 ipsec: 05[IKE] received DELETE for ESP CHILD_SA with SPI
c1b2527b
[I] May 25 16:59:55 ipsec: 05[IKE] closing CHILD_SA ionline_EY{27} with SPIs
c6e12056_i (0 bytes) c1b2527b_o (0 bytes) and TS 192.168.1.0/24 === 172.16.102.0/24

[I] May 25 16:59:55 ipsec: 05[IKE] sending DELETE for ESP CHILD_SA with SPI
c6e12056
[I] May 25 16:59:55 ipsec: 05[IKE] CHILD_SA closed
[I] May 25 16:59:55 ipsec: 05[IKE] outbound CHILD_SA ionline_EY{28} established
with SPIs ce0a17bd_i c62c1d4c_o and TS 192.168.1.0/24 === 172.16.102.0/24
[I] May 25 16:59:55 ndm: IpSec::IpSecNetfilter: start reloading netfilter
configuration...
[I] May 25 16:59:55 ndm: IpSec::IpSecNetfilter: netfilter configuration reloading
is done.
[I] May 25 17:00:05 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 23, active CHILD SA: 1.
[I] May 25 17:00:05 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 23, active CHILD SA: 1.
[I] May 25 17:02:06 ndm: Network::Interface::Switch: "GigabitEthernet0/2": switch
link down at port 3.
[I] May 25 17:02:09 ndm: Network::Interface::Switch: "GigabitEthernet0/2": switch
link up at port 3 (1000FD/AN).
[I] May 25 17:04:02 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(14:eb:b6:d0:19:de) GTK rekey done, group cipher
AES.
[I] May 25 17:04:02 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(a4:4b:d5:f3:e4:9f) GTK rekey done, group cipher
AES.
[I] May 25 17:04:08 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster0/AccessPoint0": STA(c8:3d:dc:ae:52:77) GTK rekey done, group cipher
AES.
[I] May 25 17:04:49 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 25 17:09:05 ndnproxy: answer from wrong socket, ignore.
[I] May 25 17:11:11 ipsec: 03[IKE] received retransmit of request with ID 279,
retransmitting response
[I] May 25 17:18:19 ndnproxy: answer from wrong socket, ignore.
[I] May 25 17:18:34 ndnproxy: answer from wrong socket, ignore.
[I] May 25 17:19:49 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 25 17:22:57 ndnproxy: answer from wrong socket, ignore.
[I] May 25 17:24:05 ipsec: 15[IKE] initiating IKE_SA ionline_EY[49] to
46.32.170.109
[I] May 25 17:24:05 ipsec: 08[CFG] received proposals:
IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
[I] May 25 17:24:05 ipsec: 08[CFG] configured proposals:
IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
[I] May 25 17:24:05 ipsec: 08[CFG] selected proposal:
IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
[I] May 25 17:24:05 ipsec: 08[IKE] scheduling rekeying in 3563s
[I] May 25 17:24:05 ipsec: 08[IKE] maximum IKE_SA lifetime 3583s
[I] May 25 17:24:05 ipsec: 08[IKE] IKE_SA ionline_EY[49] rekeyed between
78.109.53.15[7thsorrow.keenetic.pro]...46.32.170.109[46.32.170.109]
[I] May 25 17:24:05 ipsec: 08[IKE] deleting IKE_SA ionline_EY[48] between
78.109.53.15[7thsorrow.keenetic.pro]...46.32.170.109[46.32.170.109]
[I] May 25 17:24:05 ipsec: 08[IKE] sending DELETE for IKE_SA ionline_EY[48]
[I] May 25 17:24:05 ipsec: 13[IKE] IKE_SA deleted
[I] May 25 17:31:55 ndnproxy: answer from wrong socket, ignore.
[I] May 25 17:32:19 ndnproxy: answer from wrong socket, ignore.
[I] May 25 17:34:49 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 25 17:36:25 ndhcps: DHCPREQUEST received (STATE_INIT) for 192.168.1.94 from
00:e0:4c:36:02:d4.
[I] May 25 17:36:26 ndhcps: sending ACK of 192.168.1.94 to 00:e0:4c:36:02:d4.
[I] May 25 17:46:13 ipsec: 13[IKE] received retransmit of request with ID 131,
retransmitting response
[I] May 25 17:48:38 ipsec: 03[IKE] received retransmit of request with ID 145,
retransmitting response
[I] May 25 17:48:55 ipsec: 07[IKE] received ESP_TFC_PADDING_NOT_SUPPORTED, not
using ESPv3 TFC padding
[I] May 25 17:48:55 ipsec: 07[CFG] received proposals:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 25 17:48:55 ipsec: 07[CFG] configured proposals:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 25 17:48:55 ipsec: 07[CFG] selected proposal:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 25 17:48:55 ipsec: 07[IKE] inbound CHILD_SA ionline_EY{29} established with
SPIs c60bae07_i ccaf4f5c_o and TS 192.168.1.0/24 === 172.16.102.0/24
[I] May 25 17:48:55 ndm: IpSec::Configurator: "ionline_EY": crypto map was
renegotiated.
[I] May 25 17:48:56 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 23, active CHILD SA: 0.
[I] May 25 17:48:56 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 24, active CHILD SA: 1, state up.
[I] May 25 17:48:56 ipsec: 06[IKE] received DELETE for ESP CHILD_SA with SPI
c62c1d4c
[I] May 25 17:48:56 ipsec: 06[IKE] closing CHILD_SA ionline_EY{28} with SPIs
ce0a17bd_i (0 bytes) c62c1d4c_o (0 bytes) and TS 192.168.1.0/24 === 172.16.102.0/24

[I] May 25 17:48:56 ipsec: 06[IKE] sending DELETE for ESP CHILD_SA with SPI
ce0a17bd
[I] May 25 17:48:56 ipsec: 06[IKE] CHILD_SA closed
[I] May 25 17:48:56 ipsec: 06[IKE] outbound CHILD_SA ionline_EY{29} established
with SPIs c60bae07_i ccaf4f5c_o and TS 192.168.1.0/24 === 172.16.102.0/24
[I] May 25 17:48:56 ndm: IpSec::IpSecNetfilter: start reloading netfilter
configuration...
[I] May 25 17:48:56 ndm: IpSec::IpSecNetfilter: netfilter configuration reloading
is done.
[I] May 25 17:49:06 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 24, active CHILD SA: 1.
[I] May 25 17:49:06 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 24, active CHILD SA: 1.
[I] May 25 17:49:49 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 25 17:53:40 ipsec: 08[IKE] received retransmit of request with ID 176,
retransmitting response
[I] May 25 17:56:31 ndnproxy: answer from wrong socket, ignore.
[I] May 25 17:58:05 ipsec: 05[IKE] received retransmit of request with ID 202,
retransmitting response
[I] May 25 17:59:08 ndnproxy: answer from wrong socket, ignore.
[I] May 25 18:04:04 ndnproxy: Core::Syslog: last message repeated 5 times.
[I] May 25 18:04:50 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 25 18:05:01 ndnproxy: answer from wrong socket, ignore.
[I] May 25 18:05:30 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(14:eb:b6:d0:19:de) GTK rekey done, group cipher
AES.
[I] May 25 18:05:31 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(a4:4b:d5:f3:e4:9f) GTK rekey done, group cipher
AES.
[I] May 25 18:05:37 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster0/AccessPoint0": STA(c8:3d:dc:ae:52:77) GTK rekey done, group cipher
AES.
[I] May 25 18:06:29 ndnproxy: answer from wrong socket, ignore.
[I] May 25 18:14:09 ndnproxy: Core::Syslog: last message repeated 4 times.
[I] May 25 18:14:53 ipsec: 11[IKE] no IKE config found for
78.109.53.15...167.248.133.160, sending NO_PROPOSAL_CHOSEN
[I] May 25 18:14:53 ipsec: 07[IKE] no IKE config found for
78.109.53.15...167.248.133.35, sending NO_PROPOSAL_CHOSEN
[I] May 25 18:14:53 ipsec: 08[IKE] no IKE config found for
78.109.53.15...167.248.133.35, sending NO_PROPOSAL_CHOSEN
[I] May 25 18:19:50 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 25 18:21:55 ndnproxy: answer from wrong socket, ignore.
[I] May 25 18:23:28 ipsec: 06[IKE] initiating IKE_SA ionline_EY[53] to
46.32.170.109
[I] May 25 18:23:28 ipsec: 09[CFG] received proposals:
IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
[I] May 25 18:23:28 ipsec: 09[CFG] configured proposals:
IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
[I] May 25 18:23:28 ipsec: 09[CFG] selected proposal:
IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
[I] May 25 18:23:28 ipsec: 09[IKE] scheduling rekeying in 3574s
[I] May 25 18:23:28 ipsec: 09[IKE] maximum IKE_SA lifetime 3594s
[I] May 25 18:23:28 ipsec: 09[IKE] IKE_SA ionline_EY[53] rekeyed between
78.109.53.15[7thsorrow.keenetic.pro]...46.32.170.109[46.32.170.109]
[I] May 25 18:23:28 ipsec: 09[IKE] deleting IKE_SA ionline_EY[49] between
78.109.53.15[7thsorrow.keenetic.pro]...46.32.170.109[46.32.170.109]
[I] May 25 18:23:28 ipsec: 09[IKE] sending DELETE for IKE_SA ionline_EY[49]
[I] May 25 18:23:28 ipsec: 15[IKE] IKE_SA deleted
[I] May 25 18:24:53 ndnproxy: answer from wrong socket, ignore.
[I] May 25 18:27:53 ndnproxy: Core::Syslog: last message repeated 2 times.
[I] May 25 18:28:07 ndhcps: DHCPREQUEST received (STATE_RENEWING) for 192.168.1.88
from c8:3d:dc:ae:52:77.
[I] May 25 18:28:07 ndhcps: sending ACK of 192.168.1.88 to c8:3d:dc:ae:52:77.
[I] May 25 18:28:12 ndnproxy: answer from wrong socket, ignore.
[I] May 25 18:28:22 ndnproxy: Core::Syslog: last message repeated 2 times.
[I] May 25 18:29:43 ipsec: 12[IKE] received retransmit of request with ID 36,
retransmitting response
[I] May 25 18:32:40 ndnproxy: answer from wrong socket, ignore.
[I] May 25 18:34:04 ndnproxy: Core::Syslog: last message repeated 2 times.
[I] May 25 18:34:33 ndm: Dns::Secure::DotConfigurator: fallback to built-in DNS to
resolve "dns.adguard-dns.com".
[I] May 25 18:34:33 ndm: Dns::Secure::DotConfigurator: fallback to built-in DNS to
resolve "cloudflare-dns.com".
[I] May 25 18:34:33 ndnproxy: answer from wrong socket, ignore.
[I] May 25 18:34:33 ndm: Dns::Secure::DohConfigurator: fallback to built-in DNS to
resolve "dns.google".
[I] May 25 18:34:33 ndm: Dns::Secure::DohConfigurator: fallback to built-in DNS to
resolve "dns.adguard-dns.com".
[I] May 25 18:34:33 ndm: Dns::Secure::DohConfigurator: fallback to built-in DNS to
resolve "cloudflare-dns.com".
[I] May 25 18:34:50 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 25 18:38:21 ipsec: 07[IKE] received ESP_TFC_PADDING_NOT_SUPPORTED, not
using ESPv3 TFC padding
[I] May 25 18:38:21 ipsec: 07[CFG] received proposals:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 25 18:38:21 ipsec: 07[CFG] configured proposals:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 25 18:38:21 ipsec: 07[CFG] selected proposal:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 25 18:38:21 ipsec: 07[IKE] inbound CHILD_SA ionline_EY{30} established with
SPIs c0ba5ee1_i c93550d4_o and TS 192.168.1.0/24 === 172.16.102.0/24
[I] May 25 18:38:21 ndm: IpSec::Configurator: "ionline_EY": crypto map was
renegotiated.
[I] May 25 18:38:21 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 24, active CHILD SA: 0.
[I] May 25 18:38:21 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 25, active CHILD SA: 1, state up.
[I] May 25 18:38:21 ipsec: 09[IKE] received DELETE for ESP CHILD_SA with SPI
ccaf4f5c
[I] May 25 18:38:21 ipsec: 09[IKE] closing CHILD_SA ionline_EY{29} with SPIs
c60bae07_i (0 bytes) ccaf4f5c_o (0 bytes) and TS 192.168.1.0/24 === 172.16.102.0/24

[I] May 25 18:38:21 ipsec: 09[IKE] sending DELETE for ESP CHILD_SA with SPI
c60bae07
[I] May 25 18:38:21 ipsec: 09[IKE] CHILD_SA closed
[I] May 25 18:38:21 ipsec: 09[IKE] outbound CHILD_SA ionline_EY{30} established
with SPIs c0ba5ee1_i c93550d4_o and TS 192.168.1.0/24 === 172.16.102.0/24
[I] May 25 18:38:21 ndm: IpSec::IpSecNetfilter: start reloading netfilter
configuration...
[I] May 25 18:38:21 ndm: IpSec::IpSecNetfilter: netfilter configuration reloading
is done.
[I] May 25 18:38:31 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 25, active CHILD SA: 1.
[I] May 25 18:38:31 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 25, active CHILD SA: 1.
[I] May 25 18:41:32 ndnproxy: answer from wrong socket, ignore.
[I] May 25 18:46:24 ndnproxy: answer from wrong socket, ignore.
[I] May 25 18:49:50 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 25 18:51:34 ndnproxy: answer from wrong socket, ignore.
[I] May 25 19:01:00 ndnproxy: Core::Syslog: last message repeated 7 times.
[I] May 25 19:01:15 ndhcps: DHCPREQUEST received (STATE_RENEWING) for 192.168.1.80
from a4:4b:d5:f3:e4:9f.
[I] May 25 19:01:15 ndhcps: sending ACK of 192.168.1.80 to a4:4b:d5:f3:e4:9f.
[I] May 25 19:01:58 ndhcps: DHCPREQUEST received (STATE_RENEWING) for 192.168.1.110
from 14:eb:b6:d0:19:dd.
[I] May 25 19:01:58 ndhcps: received ARP reply from 14:eb:b6:d0:19:de, not our
client.
[I] May 25 19:01:58 ndhcps: sending ACK of 192.168.1.110 to 14:eb:b6:d0:19:dd.
[I] May 25 19:02:54 ndnproxy: answer from wrong socket, ignore.
[I] May 25 19:04:41 ndnproxy: answer from wrong socket, ignore.
[I] May 25 19:04:50 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 25 19:06:59 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(14:eb:b6:d0:19:de) GTK rekey done, group cipher
AES.
[I] May 25 19:06:59 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(a4:4b:d5:f3:e4:9f) GTK rekey done, group cipher
AES.
[I] May 25 19:07:05 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster0/AccessPoint0": STA(c8:3d:dc:ae:52:77) GTK rekey done, group cipher
AES.
[I] May 25 19:08:23 ndnproxy: answer from wrong socket, ignore.
[I] May 25 19:11:15 ndnproxy: Core::Syslog: last message repeated 2 times.
[I] May 25 19:17:01 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(d4:5e:ec:6e:1d:13) had associated successfully.
[I] May 25 19:17:01 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(d4:5e:ec:6e:1d:13) set key done in WPA2/WPA2PSK.
[I] May 25 19:17:02 ndhcps: DHCPDISCOVER received from d4:5e:ec:6e:1d:13.
[I] May 25 19:17:02 ndhcps: making OFFER of 192.168.1.84 to d4:5e:ec:6e:1d:13.
[I] May 25 19:17:02 ndhcps: DHCPREQUEST received (STATE_SELECTING) for 192.168.1.84
from d4:5e:ec:6e:1d:13.
[I] May 25 19:17:02 ndhcps: sending ACK of 192.168.1.84 to d4:5e:ec:6e:1d:13.
[I] May 25 19:17:17 ndnproxy: answer from wrong socket, ignore.
[I] May 25 19:19:32 ndnproxy: Core::Syslog: last message repeated 7 times.
[I] May 25 19:19:50 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 25 19:19:59 ndnproxy: answer from wrong socket, ignore.
[I] May 25 19:22:41 ndnproxy: Core::Syslog: last message repeated 9 times.
[I] May 25 19:23:02 ipsec: 08[IKE] initiating IKE_SA ionline_EY[54] to
46.32.170.109
[I] May 25 19:23:02 ipsec: 14[CFG] received proposals:
IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
[I] May 25 19:23:02 ipsec: 14[CFG] configured proposals:
IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
[I] May 25 19:23:02 ipsec: 14[CFG] selected proposal:
IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
[I] May 25 19:23:03 ipsec: 14[IKE] scheduling rekeying in 3564s
[I] May 25 19:23:03 ipsec: 14[IKE] maximum IKE_SA lifetime 3584s
[I] May 25 19:23:03 ipsec: 14[IKE] IKE_SA ionline_EY[54] rekeyed between
78.109.53.15[7thsorrow.keenetic.pro]...46.32.170.109[46.32.170.109]
[I] May 25 19:23:03 ipsec: 14[IKE] deleting IKE_SA ionline_EY[53] between
78.109.53.15[7thsorrow.keenetic.pro]...46.32.170.109[46.32.170.109]
[I] May 25 19:23:03 ipsec: 14[IKE] sending DELETE for IKE_SA ionline_EY[53]
[I] May 25 19:23:03 ipsec: 12[IKE] IKE_SA deleted
[I] May 25 19:26:09 ndm: Network::Interface::Switch: "GigabitEthernet0/2": switch
link down at port 3.
[I] May 25 19:26:12 ndm: Network::Interface::Switch: "GigabitEthernet0/2": switch
link up at port 3 (1000FD/AN).
[I] May 25 19:26:21 ndm: Network::Interface::Switch: "GigabitEthernet0/2": switch
link down at port 3.
[I] May 25 19:26:22 ndhcps: DHCPREQUEST received (STATE_INIT) for 192.168.1.11 from
04:42:1a:26:ee:e6.
[I] May 25 19:26:22 ndhcps: sending ACK of 192.168.1.11 to 04:42:1a:26:ee:e6.
[I] May 25 19:26:24 ndm: Network::Interface::Switch: "GigabitEthernet0/2": switch
link up at port 3 (1000FD/AN).
[I] May 25 19:26:36 ndnproxy: answer from wrong socket, ignore.
[I] May 25 19:26:38 ndnproxy: answer from wrong socket, ignore.
[I] May 25 19:27:43 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had associated successfully.
[I] May 25 19:27:43 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 19:27:45 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had disassociated by STA
(reason: STA is leaving or has left BSS).
[I] May 25 19:28:01 ndnproxy: answer from wrong socket, ignore.
[I] May 25 19:28:07 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had associated successfully.
[I] May 25 19:28:07 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 19:28:07 ndhcps: DHCPDISCOVER received from 22:fd:90:7a:6f:12.
[I] May 25 19:28:07 ndhcps: making OFFER of 192.168.1.35 to 22:fd:90:7a:6f:12.
[I] May 25 19:28:07 ndhcps: DHCPDISCOVER received from 22:fd:90:7a:6f:12.
[I] May 25 19:28:07 ndhcps: making OFFER of 192.168.1.35 to 22:fd:90:7a:6f:12.
[I] May 25 19:28:07 ndhcps: DHCPDISCOVER received from 22:fd:90:7a:6f:12.
[I] May 25 19:28:07 ndhcps: making OFFER of 192.168.1.35 to 22:fd:90:7a:6f:12.
[I] May 25 19:28:08 ndhcps: DHCPREQUEST received (STATE_SELECTING) for 192.168.1.35
from 22:fd:90:7a:6f:12.
[I] May 25 19:28:08 ndhcps: sending ACK of 192.168.1.35 to 22:fd:90:7a:6f:12.
[I] May 25 19:28:12 ndnproxy: answer from wrong socket, ignore.
[E] May 25 19:28:41 stubby: "cloudflare-dns.com": too many failed requests, try to
reload process
[E] May 25 19:28:41 ndm: Service: "DoT "System" proxy #1": unexpectedly stopped.
[I] May 25 19:28:44 stubby: starting Stubby 0.4.0
[I] May 25 19:29:51 ipsec: 12[IKE] received ESP_TFC_PADDING_NOT_SUPPORTED, not
using ESPv3 TFC padding
[I] May 25 19:29:51 ipsec: 12[CFG] received proposals:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 25 19:29:51 ipsec: 12[CFG] configured proposals:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 25 19:29:51 ipsec: 12[CFG] selected proposal:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 25 19:29:51 ipsec: 12[IKE] inbound CHILD_SA ionline_EY{31} established with
SPIs c0a9835d_i ce7e1926_o and TS 192.168.1.0/24 === 172.16.102.0/24
[I] May 25 19:29:51 ndm: IpSec::Configurator: "ionline_EY": crypto map was
renegotiated.
[I] May 25 19:29:51 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 25, active CHILD SA: 0.
[I] May 25 19:29:51 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 26, active CHILD SA: 1, state up.
[I] May 25 19:29:51 ipsec: 03[IKE] received DELETE for ESP CHILD_SA with SPI
c93550d4
[I] May 25 19:29:51 ipsec: 03[IKE] closing CHILD_SA ionline_EY{30} with SPIs
c0ba5ee1_i (0 bytes) c93550d4_o (0 bytes) and TS 192.168.1.0/24 === 172.16.102.0/24

[I] May 25 19:29:51 ipsec: 03[IKE] sending DELETE for ESP CHILD_SA with SPI
c0ba5ee1
[I] May 25 19:29:51 ipsec: 03[IKE] CHILD_SA closed
[I] May 25 19:29:51 ipsec: 03[IKE] outbound CHILD_SA ionline_EY{31} established
with SPIs c0a9835d_i ce7e1926_o and TS 192.168.1.0/24 === 172.16.102.0/24
[I] May 25 19:29:51 ndm: IpSec::IpSecNetfilter: start reloading netfilter
configuration...
[I] May 25 19:29:51 ndm: IpSec::IpSecNetfilter: netfilter configuration reloading
is done.
[I] May 25 19:30:01 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 26, active CHILD SA: 1.
[I] May 25 19:30:01 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 26, active CHILD SA: 1.
[I] May 25 19:31:17 ndnproxy: answer from wrong socket, ignore.
[I] May 25 19:34:19 ndnproxy: answer from wrong socket, ignore.
[I] May 25 19:34:50 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 25 19:34:53 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 19:34:53 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 19:45:14 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 19:45:14 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 19:45:19 ndnproxy: answer from wrong socket, ignore.
[I] May 25 19:46:21 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 19:46:22 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 19:47:43 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 19:47:44 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 19:47:56 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 19:47:57 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 19:49:51 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 25 19:51:24 ndnproxy: answer from wrong socket, ignore.
[I] May 25 20:02:45 ndnproxy: Core::Syslog: last message repeated 4 times.
[I] May 25 20:03:29 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 20:03:29 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 20:04:52 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 25 20:07:49 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 20:07:49 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 20:08:05 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 20:08:05 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 20:08:06 ndnproxy: answer from wrong socket, ignore.
[I] May 25 20:08:15 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 20:08:16 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 20:08:27 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(14:eb:b6:d0:19:de) GTK rekey done, group cipher
AES.
[I] May 25 20:08:27 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(d4:5e:ec:6e:1d:13) GTK rekey done, group cipher
AES.
[I] May 25 20:08:27 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(a4:4b:d5:f3:e4:9f) GTK rekey done, group cipher
AES.
[I] May 25 20:08:28 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) GTK rekey done, group cipher
AES.
[I] May 25 20:08:34 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster0/AccessPoint0": STA(c8:3d:dc:ae:52:77) GTK rekey done, group cipher
AES.
[I] May 25 20:09:07 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 20:09:08 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 20:09:57 ndnproxy: answer from wrong socket, ignore.
[I] May 25 20:10:02 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 20:10:03 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 20:10:28 ndnproxy: answer from wrong socket, ignore.
[I] May 25 20:12:24 ndnproxy: answer from wrong socket, ignore.
[I] May 25 20:13:18 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 20:13:19 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 20:15:34 ndnproxy: answer from wrong socket, ignore.
[I] May 25 20:16:04 ndnproxy: answer from wrong socket, ignore.
[I] May 25 20:18:11 ndm: Network::Interface::Switch: "GigabitEthernet0/0": switch
link down at port 1.
[I] May 25 20:18:14 ndm: Network::Interface::Switch: "GigabitEthernet0/0": switch
link up at port 1 (1000FD/AN).
[I] May 25 20:18:20 ipsec: 06[IKE] received ESP_TFC_PADDING_NOT_SUPPORTED, not
using ESPv3 TFC padding
[I] May 25 20:18:20 ipsec: 06[CFG] received proposals:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 25 20:18:20 ipsec: 06[CFG] configured proposals:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 25 20:18:20 ipsec: 06[CFG] selected proposal:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 25 20:18:20 ipsec: 06[IKE] inbound CHILD_SA ionline_EY{32} established with
SPIs c2771037_i c193dc99_o and TS 192.168.1.0/24 === 172.16.102.0/24
[I] May 25 20:18:20 ndm: IpSec::Configurator: "ionline_EY": crypto map was
renegotiated.
[I] May 25 20:18:20 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 26, active CHILD SA: 0.
[I] May 25 20:18:20 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 26, active CHILD SA: 1, state up.
[I] May 25 20:18:21 ipsec: 09[IKE] received DELETE for ESP CHILD_SA with SPI
ce7e1926
[I] May 25 20:18:21 ipsec: 09[IKE] closing CHILD_SA ionline_EY{31} with SPIs
c0a9835d_i (0 bytes) ce7e1926_o (0 bytes) and TS 192.168.1.0/24 === 172.16.102.0/24

[I] May 25 20:18:21 ipsec: 09[IKE] sending DELETE for ESP CHILD_SA with SPI
c0a9835d
[I] May 25 20:18:21 ipsec: 09[IKE] CHILD_SA closed
[I] May 25 20:18:21 ipsec: 09[IKE] outbound CHILD_SA ionline_EY{32} established
with SPIs c2771037_i c193dc99_o and TS 192.168.1.0/24 === 172.16.102.0/24
[I] May 25 20:18:21 ndm: IpSec::IpSecNetfilter: start reloading netfilter
configuration...
[I] May 25 20:18:21 ndm: IpSec::IpSecNetfilter: netfilter configuration reloading
is done.
[I] May 25 20:18:31 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 26, active CHILD SA: 1.
[I] May 25 20:18:31 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 26, active CHILD SA: 1.
[I] May 25 20:18:34 ndm: Network::Interface::Switch: "GigabitEthernet0/0": switch
link down at port 1.
[I] May 25 20:18:36 ndhcps: DHCPDISCOVER received for 192.168.1.111 from
18:c0:4d:8a:8f:a4.
[I] May 25 20:18:36 ndhcps: making OFFER of 192.168.1.111 to 18:c0:4d:8a:8f:a4.
[I] May 25 20:18:36 ndhcps: DHCPREQUEST received (STATE_SELECTING) for
192.168.1.111 from 18:c0:4d:8a:8f:a4.
[I] May 25 20:18:36 ndhcps: sending ACK of 192.168.1.111 to 18:c0:4d:8a:8f:a4.
[I] May 25 20:18:37 ndm: Network::Interface::Switch: "GigabitEthernet0/0": switch
link up at port 1 (1000FD/AN).
[I] May 25 20:18:37 ndnproxy: answer from wrong socket, ignore.
[I] May 25 20:19:19 ndnproxy: Core::Syslog: last message repeated 2 times.
[I] May 25 20:19:52 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 25 20:21:06 ndnproxy: answer from wrong socket, ignore.
[I] May 25 20:21:09 ndnproxy: answer from wrong socket, ignore.
[I] May 25 20:21:42 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 20:21:42 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 20:21:54 ndnproxy: answer from wrong socket, ignore.
[I] May 25 20:22:27 ipsec: 13[IKE] initiating IKE_SA ionline_EY[55] to
46.32.170.109
[I] May 25 20:22:27 ipsec: 05[CFG] received proposals:
IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
[I] May 25 20:22:27 ipsec: 05[CFG] configured proposals:
IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
[I] May 25 20:22:27 ipsec: 05[CFG] selected proposal:
IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
[I] May 25 20:22:27 ipsec: 05[IKE] scheduling rekeying in 3564s
[I] May 25 20:22:27 ipsec: 05[IKE] maximum IKE_SA lifetime 3584s
[I] May 25 20:22:27 ipsec: 05[IKE] IKE_SA ionline_EY[55] rekeyed between
78.109.53.15[7thsorrow.keenetic.pro]...46.32.170.109[46.32.170.109]
[I] May 25 20:22:27 ipsec: 05[IKE] deleting IKE_SA ionline_EY[54] between
78.109.53.15[7thsorrow.keenetic.pro]...46.32.170.109[46.32.170.109]
[I] May 25 20:22:27 ipsec: 05[IKE] sending DELETE for IKE_SA ionline_EY[54]
[I] May 25 20:22:27 ipsec: 09[IKE] IKE_SA deleted
[I] May 25 20:22:29 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 20:22:30 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 20:24:19 ndnproxy: answer from wrong socket, ignore.
[I] May 25 20:25:21 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 20:25:22 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 20:25:45 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 20:25:45 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 20:26:23 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 20:26:23 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 20:27:09 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 20:27:10 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 20:27:30 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 20:27:30 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 20:29:04 ndnproxy: answer from wrong socket, ignore.
[I] May 25 20:33:33 ndnproxy: Core::Syslog: last message repeated 4 times.
[I] May 25 20:34:14 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 20:34:14 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 20:34:24 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 20:34:24 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 20:34:52 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 25 20:34:52 ndnproxy: answer from wrong socket, ignore.
[I] May 25 20:35:02 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 20:35:02 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 20:35:13 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 20:35:14 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 20:35:27 ndnproxy: answer from wrong socket, ignore.
[I] May 25 20:38:22 ndnproxy: Core::Syslog: last message repeated 5 times.
[I] May 25 20:38:57 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 20:38:58 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 20:39:04 ndnproxy: answer from wrong socket, ignore.
[I] May 25 20:39:11 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 20:39:11 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 20:39:23 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 20:39:23 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 20:39:39 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 20:39:40 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 20:43:10 ndnproxy: answer from wrong socket, ignore.
[I] May 25 20:48:30 ndnproxy: Core::Syslog: last message repeated 11 times.
[I] May 25 20:49:52 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 25 20:49:59 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 20:50:00 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 20:50:49 ndnproxy: answer from wrong socket, ignore.
[I] May 25 20:53:00 ndnproxy: Core::Syslog: last message repeated 5 times.
[I] May 25 20:53:03 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 20:53:04 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 20:55:34 ndnproxy: answer from wrong socket, ignore.
[I] May 25 20:55:58 ndnproxy: answer from wrong socket, ignore.
[I] May 25 20:56:10 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 20:56:10 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 20:56:22 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 20:56:23 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 20:57:22 ndnproxy: answer from wrong socket, ignore.
[I] May 25 21:01:30 ndnproxy: Core::Syslog: last message repeated 3 times.
[I] May 25 21:01:50 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 21:01:50 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 21:02:00 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 21:02:00 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[E] May 25 21:02:03 stubby: "cloudflare-dns.com": too many failed requests, try to
reload process
[E] May 25 21:02:03 ndm: Service: "DoT "System" proxy #1": unexpectedly stopped.
[I] May 25 21:02:06 stubby: starting Stubby 0.4.0
[I] May 25 21:03:49 ndnproxy: answer from wrong socket, ignore.
[I] May 25 21:04:22 ndnproxy: answer from wrong socket, ignore.
[I] May 25 21:04:52 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 25 21:05:09 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 21:05:09 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 21:05:19 ndnproxy: answer from wrong socket, ignore.
[I] May 25 21:05:21 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 21:05:21 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 21:05:33 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 21:05:34 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 21:05:55 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 21:05:55 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 21:06:50 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 21:06:50 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 21:07:08 ndnproxy: answer from wrong socket, ignore.
[I] May 25 21:07:37 ndnproxy: Core::Syslog: last message repeated 2 times.
[I] May 25 21:07:41 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 21:07:42 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 21:07:56 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 21:07:56 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 21:08:41 ipsec: 11[IKE] received ESP_TFC_PADDING_NOT_SUPPORTED, not
using ESPv3 TFC padding
[I] May 25 21:08:41 ipsec: 11[CFG] received proposals:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 25 21:08:41 ipsec: 11[CFG] configured proposals:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 25 21:08:41 ipsec: 11[CFG] selected proposal:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 25 21:08:41 ipsec: 11[IKE] inbound CHILD_SA ionline_EY{33} established with
SPIs c3a62188_i c104c48e_o and TS 192.168.1.0/24 === 172.16.102.0/24
[I] May 25 21:08:41 ndm: IpSec::Configurator: "ionline_EY": crypto map was
renegotiated.
[I] May 25 21:08:41 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 26, active CHILD SA: 0.
[I] May 25 21:08:41 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 27, active CHILD SA: 1, state up.
[I] May 25 21:08:41 ipsec: 05[IKE] received DELETE for ESP CHILD_SA with SPI
c193dc99
[I] May 25 21:08:41 ipsec: 05[IKE] closing CHILD_SA ionline_EY{32} with SPIs
c2771037_i (37500067 bytes) c193dc99_o (2242600 bytes) and TS 192.168.1.0/24 ===
172.16.102.0/24
[I] May 25 21:08:41 ipsec: 05[IKE] sending DELETE for ESP CHILD_SA with SPI
c2771037
[I] May 25 21:08:41 ipsec: 05[IKE] CHILD_SA closed
[I] May 25 21:08:41 ipsec: 05[IKE] outbound CHILD_SA ionline_EY{33} established
with SPIs c3a62188_i c104c48e_o and TS 192.168.1.0/24 === 172.16.102.0/24
[I] May 25 21:08:41 ndm: IpSec::IpSecNetfilter: start reloading netfilter
configuration...
[I] May 25 21:08:41 ndm: IpSec::IpSecNetfilter: netfilter configuration reloading
is done.
[I] May 25 21:08:51 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 27, active CHILD SA: 1.
[I] May 25 21:08:51 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 27, active CHILD SA: 1.
[I] May 25 21:09:09 ndnproxy: answer from wrong socket, ignore.
[I] May 25 21:09:56 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(14:eb:b6:d0:19:de) GTK rekey done, group cipher
AES.
[I] May 25 21:09:56 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(d4:5e:ec:6e:1d:13) GTK rekey done, group cipher
AES.
[I] May 25 21:09:56 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) GTK rekey done, group cipher
AES.
[I] May 25 21:09:57 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(a4:4b:d5:f3:e4:9f) GTK rekey done, group cipher
AES.
[I] May 25 21:10:02 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster0/AccessPoint0": STA(c8:3d:dc:ae:52:77) GTK rekey done, group cipher
AES.
[I] May 25 21:11:23 ndnproxy: answer from wrong socket, ignore.
[I] May 25 21:12:34 ndnproxy: answer from wrong socket, ignore.
[I] May 25 21:12:43 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 21:12:44 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 21:12:58 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 21:12:59 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 21:13:14 ndnproxy: answer from wrong socket, ignore.
[I] May 25 21:18:19 ndnproxy: Core::Syslog: last message repeated 5 times.
[I] May 25 21:19:52 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 25 21:21:37 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 21:21:37 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 21:21:47 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 21:21:48 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 21:21:49 ndnproxy: answer from wrong socket, ignore.
[I] May 25 21:21:51 ipsec: 08[IKE] initiating IKE_SA ionline_EY[56] to
46.32.170.109
[I] May 25 21:21:51 ipsec: 06[CFG] received proposals:
IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
[I] May 25 21:21:51 ipsec: 06[CFG] configured proposals:
IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
[I] May 25 21:21:51 ipsec: 06[CFG] selected proposal:
IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
[I] May 25 21:21:51 ipsec: 06[IKE] scheduling rekeying in 3575s
[I] May 25 21:21:51 ipsec: 06[IKE] maximum IKE_SA lifetime 3595s
[I] May 25 21:21:51 ipsec: 06[IKE] IKE_SA ionline_EY[56] rekeyed between
78.109.53.15[7thsorrow.keenetic.pro]...46.32.170.109[46.32.170.109]
[I] May 25 21:21:51 ipsec: 06[IKE] deleting IKE_SA ionline_EY[55] between
78.109.53.15[7thsorrow.keenetic.pro]...46.32.170.109[46.32.170.109]
[I] May 25 21:21:51 ipsec: 06[IKE] sending DELETE for IKE_SA ionline_EY[55]
[I] May 25 21:21:51 ipsec: 11[IKE] IKE_SA deleted
[I] May 25 21:22:07 ndnproxy: answer from wrong socket, ignore.
[I] May 25 21:22:16 ndnproxy: answer from wrong socket, ignore.
[I] May 25 21:22:48 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 21:22:48 ndnproxy: answer from wrong socket, ignore.
[I] May 25 21:22:49 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 21:23:02 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 21:23:02 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 21:24:51 ndnproxy: answer from wrong socket, ignore.
[I] May 25 21:28:13 ndnproxy: Core::Syslog: last message repeated 9 times.
[I] May 25 21:29:17 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 21:29:17 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 21:29:26 ndnproxy: answer from wrong socket, ignore.
[I] May 25 21:29:29 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 21:29:30 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 21:30:02 ndnproxy: answer from wrong socket, ignore.
[I] May 25 21:33:56 ndnproxy: Core::Syslog: last message repeated 3 times.
[I] May 25 21:34:29 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 21:34:30 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 21:34:42 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 21:34:43 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 21:34:48 ndnproxy: answer from wrong socket, ignore.
[I] May 25 21:34:53 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 25 21:35:00 ndnproxy: answer from wrong socket, ignore.
[I] May 25 21:39:12 ndnproxy: Core::Syslog: last message repeated 5 times.
[I] May 25 21:39:21 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 21:39:22 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 21:42:24 ndnproxy: answer from wrong socket, ignore.
[I] May 25 21:42:45 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had associated successfully.
[I] May 25 21:42:45 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 21:42:45 ndhcps: DHCPREQUEST received (STATE_INIT) for 192.168.1.35 from
22:fd:90:7a:6f:12.
[I] May 25 21:42:45 ndhcps: sending ACK of 192.168.1.35 to 22:fd:90:7a:6f:12.
[I] May 25 21:42:46 ndhcps: DHCPREQUEST received (STATE_INIT) for 192.168.1.35 from
22:fd:90:7a:6f:12.
[I] May 25 21:42:46 ndhcps: sending ACK of 192.168.1.35 to 22:fd:90:7a:6f:12.
[I] May 25 21:42:56 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 21:42:56 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 21:42:58 ndnproxy: answer from wrong socket, ignore.
[I] May 25 21:46:04 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 21:46:05 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 21:47:04 ndnproxy: answer from wrong socket, ignore.
[I] May 25 21:48:52 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 21:48:53 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 21:49:03 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 21:49:03 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 21:49:29 ndnproxy: answer from wrong socket, ignore.
[I] May 25 21:49:53 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 25 21:51:42 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 21:51:42 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 21:51:50 ndnproxy: answer from wrong socket, ignore.
[I] May 25 21:51:52 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 21:51:52 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 21:54:18 ndnproxy: answer from wrong socket, ignore.
[I] May 25 21:55:33 ndnproxy: Core::Syslog: last message repeated 5 times.
[I] May 25 21:58:08 ndhcps: DHCPREQUEST received (STATE_RENEWING) for 192.168.1.88
from c8:3d:dc:ae:52:77.
[I] May 25 21:58:09 ndhcps: sending ACK of 192.168.1.88 to c8:3d:dc:ae:52:77.
[I] May 25 22:01:37 ipsec: 09[IKE] received ESP_TFC_PADDING_NOT_SUPPORTED, not
using ESPv3 TFC padding
[I] May 25 22:01:37 ipsec: 09[CFG] received proposals:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 25 22:01:37 ipsec: 09[CFG] configured proposals:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 25 22:01:37 ipsec: 09[CFG] selected proposal:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 25 22:01:37 ipsec: 09[IKE] inbound CHILD_SA ionline_EY{34} established with
SPIs c649f05b_i c9f739e8_o and TS 192.168.1.0/24 === 172.16.102.0/24
[I] May 25 22:01:37 ndm: IpSec::Configurator: "ionline_EY": crypto map was
renegotiated.
[I] May 25 22:01:37 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 27, active CHILD SA: 0.
[I] May 25 22:01:38 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 28, active CHILD SA: 1, state up.
[I] May 25 22:01:38 ipsec: 03[IKE] received DELETE for ESP CHILD_SA with SPI
c104c48e
[I] May 25 22:01:38 ipsec: 03[IKE] closing CHILD_SA ionline_EY{33} with SPIs
c3a62188_i (0 bytes) c104c48e_o (0 bytes) and TS 192.168.1.0/24 === 172.16.102.0/24

[I] May 25 22:01:38 ipsec: 03[IKE] sending DELETE for ESP CHILD_SA with SPI
c3a62188
[I] May 25 22:01:38 ipsec: 03[IKE] CHILD_SA closed
[I] May 25 22:01:38 ipsec: 03[IKE] outbound CHILD_SA ionline_EY{34} established
with SPIs c649f05b_i c9f739e8_o and TS 192.168.1.0/24 === 172.16.102.0/24
[I] May 25 22:01:38 ndm: IpSec::IpSecNetfilter: start reloading netfilter
configuration...
[I] May 25 22:01:38 ndm: IpSec::IpSecNetfilter: netfilter configuration reloading
is done.
[I] May 25 22:01:48 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 28, active CHILD SA: 1.
[I] May 25 22:01:48 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 28, active CHILD SA: 1.
[I] May 25 22:04:50 ndnproxy: answer from wrong socket, ignore.
[I] May 25 22:04:53 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 25 22:05:19 ndnproxy: answer from wrong socket, ignore.
[I] May 25 22:07:16 ndnproxy: answer from wrong socket, ignore.
[I] May 25 22:10:58 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 22:10:58 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 22:11:24 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(14:eb:b6:d0:19:de) GTK rekey done, group cipher
AES.
[I] May 25 22:11:24 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(d4:5e:ec:6e:1d:13) GTK rekey done, group cipher
AES.
[I] May 25 22:11:24 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(a4:4b:d5:f3:e4:9f) GTK rekey done, group cipher
AES.
[I] May 25 22:11:25 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) GTK rekey done, group cipher
AES.
[I] May 25 22:11:30 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster0/AccessPoint0": STA(c8:3d:dc:ae:52:77) GTK rekey done, group cipher
AES.
[I] May 25 22:11:34 ndnproxy: answer from wrong socket, ignore.
[I] May 25 22:11:58 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 22:11:58 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 22:12:21 ndnproxy: answer from wrong socket, ignore.
[I] May 25 22:12:45 ndnproxy: Core::Syslog: last message repeated 3 times.
[I] May 25 22:12:48 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 22:12:48 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 22:12:58 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 22:12:59 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 22:13:43 ndnproxy: answer from wrong socket, ignore.
[I] May 25 22:18:56 ndnproxy: Core::Syslog: last message repeated 13 times.
[I] May 25 22:19:53 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 25 22:20:28 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 22:20:29 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 22:21:26 ipsec: 09[IKE] initiating IKE_SA ionline_EY[57] to
46.32.170.109
[I] May 25 22:21:26 ipsec: 05[CFG] received proposals:
IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
[I] May 25 22:21:26 ipsec: 05[CFG] configured proposals:
IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
[I] May 25 22:21:26 ipsec: 05[CFG] selected proposal:
IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
[I] May 25 22:21:26 ipsec: 05[IKE] scheduling rekeying in 3578s
[I] May 25 22:21:26 ipsec: 05[IKE] maximum IKE_SA lifetime 3598s
[I] May 25 22:21:26 ipsec: 05[IKE] IKE_SA ionline_EY[57] rekeyed between
78.109.53.15[7thsorrow.keenetic.pro]...46.32.170.109[46.32.170.109]
[I] May 25 22:21:26 ipsec: 05[IKE] deleting IKE_SA ionline_EY[56] between
78.109.53.15[7thsorrow.keenetic.pro]...46.32.170.109[46.32.170.109]
[I] May 25 22:21:26 ipsec: 05[IKE] sending DELETE for IKE_SA ionline_EY[56]
[I] May 25 22:21:26 ipsec: 06[IKE] IKE_SA deleted
[I] May 25 22:21:34 ndnproxy: answer from wrong socket, ignore.
[I] May 25 22:23:19 ndnproxy: Core::Syslog: last message repeated 5 times.
[I] May 25 22:23:48 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 22:23:48 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 22:23:48 ndnproxy: answer from wrong socket, ignore.
[I] May 25 22:24:00 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 22:24:01 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 22:24:19 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 22:24:20 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 22:24:33 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 22:24:34 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 22:25:06 ndnproxy: answer from wrong socket, ignore.
[I] May 25 22:27:09 ndnproxy: Core::Syslog: last message repeated 3 times.
[I] May 25 22:27:41 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 22:27:42 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 22:28:00 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 22:28:01 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 22:28:40 ndnproxy: answer from wrong socket, ignore.
[I] May 25 22:30:55 ndnproxy: Core::Syslog: last message repeated 2 times.
[I] May 25 22:31:15 ndhcps: DHCPREQUEST received (STATE_RENEWING) for 192.168.1.80
from a4:4b:d5:f3:e4:9f.
[I] May 25 22:31:15 ndhcps: sending ACK of 192.168.1.80 to a4:4b:d5:f3:e4:9f.
[I] May 25 22:31:28 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 22:31:29 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 22:31:58 ndhcps: DHCPREQUEST received (STATE_RENEWING) for 192.168.1.110
from 14:eb:b6:d0:19:dd.
[I] May 25 22:31:58 ndhcps: received ARP reply from 14:eb:b6:d0:19:de, not our
client.
[I] May 25 22:31:58 ndhcps: sending ACK of 192.168.1.110 to 14:eb:b6:d0:19:dd.
[I] May 25 22:33:50 ndnproxy: answer from wrong socket, ignore.
[I] May 25 22:34:07 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 22:34:07 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 22:34:53 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 25 22:35:08 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 22:35:09 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 22:35:50 ndnproxy: answer from wrong socket, ignore.

You might also like