Jump to content

Dale

Forum Members
  • Posts

    104
  • Joined

  • Last visited

Posts posted by Dale

  1. 39 минут назад, Infy сказал:

    Прикрепите self-test с ретранслятора.
    Выглядит так, как будто у вас в гостевом сегменте ретранслятор по какой-то причине не получает адрес.
    Соответственно не срабатывает и обнаружение alias'ов.

    У меня гостевой сегмент вообще выключен. Прикрепляю письмом ниже селфтест с ретранслятора. На всякий случай - у меня ретранслятор подключен не по кабелю, а по Wi-Fi

    image.png.89b6cc05cbeae66763099a43b7f3907c.png

    image.thumb.png.3904bae91c2bce7072b74b6d0496da24.png

  2. В 20.07.2023 в 22:46, Dale сказал:

    Всем добрый день!

    После обновления связки Ultra II + Buddy 5 на прошивку 4.0.1 в списке зарегистрированных клиентов появился ретранслятор (контроль доступа к беспроводной сети включен в режиме белого списка). Если его удалить, то доступ к ретранслятору пропадает. Возможно, но не уверен, что в 4.0.0 было тоже самое (по крайней мере в конфиге от 4.0.0 запись Buddy-V присутствует, а в конфиге от 3.9 ее точно нет)

    image.thumb.png.a810db6000fe1211f5ae5c92278a030d.png

    4.0.2 проблема по прежнему не исправлена! В списке ЗАРЕГИСТРИРОВАННЫХ устройств по прежнему наблюдается ретранслятор!

    • Need more info 1
  3. Всем добрый день!

    После обновления связки Ultra II + Buddy 5 на прошивку 4.0.1 в списке зарегистрированных клиентов появился ретранслятор (контроль доступа к беспроводной сети включен в режиме белого списка). Если его удалить, то доступ к ретранслятору пропадает. Возможно, но не уверен, что в 4.0.0 было тоже самое (по крайней мере в конфиге от 4.0.0 запись Buddy-V присутствует, а в конфиге от 3.9 ее точно нет)

    image.thumb.png.a810db6000fe1211f5ae5c92278a030d.png

    • Upvote 1
  4. А тут, например, https://support.purevpn.com/android-openvpn-manual-configuration смотрели? В этой статье есть линк на скачивание конфигов OpenVPN (архив приложен к сообщению). Но я бы рекомендовал Вам использовать IPsec соединение, там шифрование ускоряется аппаратно и никаких конфигов не надо. Что-то вроде такого:

    image.png.f260fc01ad15956d21cfbc76c2513d82.png

     

    Recommended-CA2.zip

  5. 1 час назад, meine12 сказал:

    <p><u>https://synology.xxx.keenetic.pro:443/transmission/rpc</u></p>Hostname synology.xxx.keenetic.pro not verified:
        certificate: sha1/l4cXL237VRYsN8U9db/omN6LLVQ=
        DN: CN=keenetic.pro
        subjectAltNames: [*.keenetic.pro, keenetic.pro]

     

    подскажите куда копать?

     

    У меня в SAN стоит *.xxx.keenetic.pro, xxx.keenetic.pro и все работает нормально. Возможно, у Вас сертификат криво выдался?

  6. 2 часа назад, Odyssey сказал:

    Важно! Число клиентских подключений ограничивается выделенным служебным размером раздела памяти объемом 24 Кбайта для хранения VPN-конфигураций. Особенно это актуально для OpenVPN-соединений, т.к. суммарный размер их конфигураций не должен превышать 24 Кбайта.

     

    Как обстоит с этим в моделях KN-2610 (Giant), KN-2710 (Peak)

     

    Был уже раньше такой вопрос, в этой теме https://forum.keenetic.net/topic/9108-35-количество-соединений-vpn/ и был такой ответ:

    В 12.07.2020 в 13:34, Le ecureuil сказал:
     

    На всех новых моделях (начиная с 3010 и XX11) везде от 512 Кбайт до 2 Мбайт.

  7. Решение проблемы в моем случае оказалось таким: после ручной установки времени жизни ключей через interface IKE0 ipsec proposal lifetime меньше, чем фактически используемый сервером интервал, клиентом инициируется процедура rekey и она проходит штатно, без разрывов соединения такого рода, как описаны в шапке. Кто был виновником проблемы - клиент или сервер, установить не удалось. Единственный баг, который очень хотелось бы, чтобы пофиксили разработчики ( @Le ecureuil, это возможно?) - сбрасывается время соединения, хотя фактически оно не разрывалось, а происходил rekey по инициативе клиента (при прохождении процедуры rekey по инициативе сервера время не сбрасывается, все работает штатно).

     

    • Thanks 1
  8. Возможно, имеется в виду, что Keenetic по умолчанию не раздает по DHCP опцию 42, а указанные устройства своих настроек на NTP сервера не имеют или они не настроены? Тогда в CLI надо подать команду вроде

    ip dhcp pool _WEBADMIN option 42 time.google.com
    system configuration save

    Имя нужного DHCP пула можно посмотреть командой show ip dhcp pool

     

  9. Недавно пришлось перейти к другому VPN провайдеру, потому что старый перестал поддерживать L2TP/IPSec и PPTP соединения, у нового наблюдаю такую ситуацию: устанавливается соединение, например в 01:34, проходит какое-то количество времени, успешно проходит rekey в 04:25, а в 07:16, когда казалось бы должен произойти второй rekey, вместо него вижу в логе:

    [I] Nov 15 07:16:38 ipsec: 08[IKE] integrity check failed
    [I] Nov 15 07:16:38 ipsec: 08[IKE] CREATE_CHILD_SA request with message ID 0 processing failed
    [E] Nov 15 07:16:38 ndm: IpSec::Configurator: IKE message parsing error for crypto map "IKE0".
    [W] Nov 15 07:16:38 ndm: IpSec::Configurator: (possibly because of wrong pre-shared key).
    [I] Nov 15 07:16:38 ndm: IpSec::CryptoMapInfo: "IKE0": crypto map active IKE SA: 0, active CHILD SA: 0.
    [W] Nov 15 07:16:38 ndm: IpSec::Configurator: fallback peer is not defined for crypto map "IKE0", retry.
    [I] Nov 15 07:16:38 ndm: IpSec::Configurator: "IKE0": schedule reconnect for crypto map.
    [I] Nov 15 07:16:38 ndm: IpSec::Interface::Ike: "IKE0": IPsec layer is down, shutdown.

    И соединение разрывается.

    Полный кусок лога приведен ниже:

    Скрытый текст
    
    [I] Nov 15 01:34:25 ndm: Network::Interface::Tunnel: "IKE0": resolved destination 178.170.146.1 (de1.pointtoserver.com).
    [I] Nov 15 01:34:25 ndm: Network::Interface::Ip: "IKE0": IP address cleared.
    [I] Nov 15 01:34:25 ndm: Network::Interface::Tunnel: "IKE0": resolved source 93.100.188.xxx.
    [I] Nov 15 01:34:25 ndm: Network::Interface::Tunnel: "IKE0": added host route to tunnel destination endpoint 178.170.146.1 via 93.100.176.1.
    [I] Nov 15 01:34:25 ndm: IpSec::Interface::Ike: "IKE0": updating client IP secure configuration.
    [I] Nov 15 01:34:25 ndm: IpSec::Manager: "IKE0": IP secure connection was added.
    [I] Nov 15 01:34:26 ndm: Core::ConfigurationSaver: configuration saved.
    [I] Nov 15 01:34:27 ndm: IpSec::Manager: create IPsec reconfiguration transaction...
    [I] Nov 15 01:34:27 ndm: IpSec::Manager: "VirtualIPServer": crypto map administratively disabled, skipping.
    [I] Nov 15 01:34:27 ndm: IpSec::Manager: add config for crypto map "VPNL2TPServer".
    [I] Nov 15 01:34:27 ndm: IpSec::Manager: add config for crypto map "IKE0".
    [I] Nov 15 01:34:27 ndm: IpSec::Manager: IPsec reconfiguration transaction was created.
    [I] Nov 15 01:34:28 ndm: IpSec::Configurator: start applying IPsec configuration.
    [I] Nov 15 01:34:28 ndm: IpSec::Configurator: IPsec configuration applying is done.
    [I] Nov 15 01:34:28 ndm: IpSec::Configurator: start reloading IKE keys task.
    [I] Nov 15 01:34:28 ipsec: 08[CFG] rereading secrets
    [I] Nov 15 01:34:28 ipsec: 08[CFG] loading secrets
    [I] Nov 15 01:34:28 ipsec: 08[CFG] loaded IKE secret for %any
    [I] Nov 15 01:34:28 ipsec: 08[CFG] loaded IKE secret for @mykeenetic.net
    [I] Nov 15 01:34:28 ipsec: 08[CFG] loaded EAP secret for purevpn0sxxxxxx
    [I] Nov 15 01:34:28 ipsec: 08[CFG] loaded NTLM secret for xxxxxx
    [I] Nov 15 01:34:28 ipsec: 08[CFG] rereading ca certificates from '/tmp/ipsec/ipsec.d/cacerts'
    [I] Nov 15 01:34:28 ndm: IpSec::Configurator: reloading IKE keys task done.
    [I] Nov 15 01:34:28 ndm: IpSec::Configurator: start reloading IPsec config task.
    [I] Nov 15 01:34:28 ipsec: 14[CFG] received stroke: delete connection 'VPNL2TPServer'
    [I] Nov 15 01:34:28 ipsec: 14[CFG] deleted connection 'VPNL2TPServer'
    [I] Nov 15 01:34:28 ipsec: 00[DMN] signal of type SIGHUP received. Reloading configuration
    [I] Nov 15 01:34:28 ipsec: 11[CFG] received stroke: add connection 'VPNL2TPServer'
    [I] Nov 15 01:34:28 ipsec: 00[CFG] loaded 0 entries for attr plugin configuration
    [I] Nov 15 01:34:28 ipsec: 11[CFG] added configuration 'VPNL2TPServer'
    [I] Nov 15 01:34:28 ipsec: 15[CFG] received stroke: add connection 'IKE0'
    [I] Nov 15 01:34:28 ipsec: 00[CFG] loaded 1 RADIUS server configuration
    [I] Nov 15 01:34:28 ipsec: 15[CFG] added configuration 'IKE0'
    [I] Nov 15 01:34:28 ndm: IpSec::IpSecNetfilter: start reloading netfilter configuration...
    [I] Nov 15 01:34:28 ndm: IpSec::IpSecNetfilter: netfilter configuration reloading is done.
    [I] Nov 15 01:34:28 ndm: IpSec::Configurator: reloading IPsec config task done.
    [I] Nov 15 01:34:28 ipsec: 12[CFG] received stroke: initiate 'IKE0'
    [I] Nov 15 01:34:28 ndm: IpSec::Configurator: "IKE0": crypto map initialized.
    [I] Nov 15 01:34:28 ipsec: 03[IKE] initiating IKE_SA IKE0[13] to 178.170.146.1
    [I] Nov 15 01:34:28 ipsec: 10[IKE] received MS NT5 ISAKMPOAKLEY v9 vendor ID
    [I] Nov 15 01:34:28 ipsec: 10[IKE] received MS-Negotiation Discovery Capable vendor ID
    [I] Nov 15 01:34:28 ipsec: 10[CFG] received proposals: IKE:3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024
    [I] Nov 15 01:34:28 ipsec: 10[CFG] configured proposals: IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:3DES_CBC/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/ECP_384, IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_2048, IKE:AES_CBC=128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC=128/HMAC_SHA1_96/PRF_HMAC_SHA1/ECP_256, IKE:3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_2048, IKE:3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1536, IKE:3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024
    [I] Nov 15 01:34:28 ipsec: 10[CFG] selected proposal: IKE:3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024
    [I] Nov 15 01:34:28 ipsec: 10[IKE] faking NAT situation to enforce UDP encapsulation
    [I] Nov 15 01:34:28 ipsec: 10[CFG] no IDi configured, fall back on IP address
    [I] Nov 15 01:34:28 ipsec: 10[IKE] establishing CHILD_SA IKE0{11}
    [I] Nov 15 01:34:29 ipsec: 06[IKE] received end entity cert "CN=*.pointtoserver.com"
    [I] Nov 15 01:34:29 ipsec: 06[IKE] received issuer cert "C=GB, ST=Greater Manchester, L=Salford, O=Sectigo Limited, CN=Sectigo RSA Domain Validation Secure Server CA"
    [I] Nov 15 01:34:29 ipsec: 06[IKE] received issuer cert "C=US, ST=New Jersey, L=Jersey City, O=The USERTRUST Network, CN=USERTrust RSA Certification Authority"
    [I] Nov 15 01:34:29 ipsec: 06[CFG] using certificate "CN=*.pointtoserver.com"
    [I] Nov 15 01:34:29 ipsec: 06[CFG] using untrusted intermediate certificate "C=GB, ST=Greater Manchester, L=Salford, O=Sectigo Limited, CN=Sectigo RSA Domain Validation Secure Server CA"
    [I] Nov 15 01:34:29 ipsec: 06[CFG] system time out of sync, skipping certificate lifetime check
    [I] Nov 15 01:34:29 ipsec: 06[CFG] using trusted ca certificate "C=US, ST=New Jersey, L=Jersey City, O=The USERTRUST Network, CN=USERTrust RSA Certification Authority"
    [I] Nov 15 01:34:29 ipsec: 06[CFG] system time out of sync, skipping certificate lifetime check
    [I] Nov 15 01:34:29 ipsec: 06[CFG] system time out of sync, skipping certificate lifetime check
    [I] Nov 15 01:34:29 ipsec: 06[CFG] reached self-signed root ca with a path length of 1
    [I] Nov 15 01:34:29 ipsec: 06[IKE] authentication of 'CN=*.pointtoserver.com' with RSA signature successful
    [I] Nov 15 01:34:29 ipsec: 06[IKE] server requested EAP_IDENTITY (id 0x00), sending 'purevpn0sxxxxxx'
    [I] Nov 15 01:34:29 ipsec: 11[IKE] server requested EAP_MSCHAPV2 authentication (id 0x01)
    [I] Nov 15 01:34:29 ipsec: 04[IKE] EAP-MS-CHAPv2 succeeded: '(null)'
    [I] Nov 15 01:34:30 ipsec: 15[IKE] EAP method EAP_MSCHAPV2 succeeded, MSK established
    [I] Nov 15 01:34:30 ipsec: 15[IKE] authentication of '93.100.188.xxx' (myself) with EAP
    [I] Nov 15 01:34:30 ipsec: 13[IKE] authentication of 'CN=*.pointtoserver.com' with EAP successful
    [I] Nov 15 01:34:30 ipsec: 13[IKE] IKE_SA IKE0[13] established between 93.100.188.xxx[93.100.188.xxx]...178.170.146.1[CN=*.pointtoserver.com]
    [I] Nov 15 01:34:30 ipsec: 13[IKE] scheduling reauthentication in 28770s
    [I] Nov 15 01:34:30 ipsec: 13[IKE] maximum IKE_SA lifetime 28790s
    [I] Nov 15 01:34:30 ndm: IpSec::CryptoMapInfo: "IKE0": crypto map active IKE SA: 1, active CHILD SA: 0.
    [I] Nov 15 01:34:30 ipsec: 13[IKE] installing new virtual IP 178.170.146.95
    [I] Nov 15 01:34:30 ipsec: 13[CFG] received proposals: ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ
    [I] Nov 15 01:34:30 ipsec: 13[CFG] configured proposals: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA2_256_128/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA2_256_128/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA2_256_128/NO_EXT_SEQ
    [I] Nov 15 01:34:30 ipsec: 13[CFG] selected proposal: ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ
    [I] Nov 15 01:34:30 ipsec: 13[IKE] CHILD_SA IKE0{11} established with SPIs c15a04de_i c466b7aa_o and TS 178.170.146.95/32 === 0.0.0.0/0
    [W] Nov 15 01:34:30 ndm: IpSec::Configurator: crypto map "IKE0" is up.
    [I] Nov 15 01:34:30 ndm: IpSec::CryptoMapInfo: "IKE0": crypto map active IKE SA: 1, active CHILD SA: 1.
    [I] Nov 15 01:34:30 ipsec: 08[CFG] rereading aa certificates from '/tmp/ipsec/ipsec.d/aacerts'
    [I] Nov 15 01:34:30 ipsec: 08[CFG] rereading ocsp signer certificates from '/tmp/ipsec/ipsec.d/ocspcerts'
    [I] Nov 15 01:34:30 ipsec: 08[CFG] rereading attribute certificates from '/tmp/ipsec/ipsec.d/acerts'
    [I] Nov 15 01:34:30 ipsec: 08[CFG] rereading crls from '/tmp/ipsec/ipsec.d/crls'
    [I] Nov 15 01:34:30 ndm: IpSec::IpSecNetfilter: start reloading netfilter configuration...
    [I] Nov 15 01:34:30 ndm: IpSec::Interface::Ike: "IKE0": IPsec client layer is up.
    [I] Nov 15 01:34:30 ndm: Network::Interface::Ip: "IKE0": IP address is 178.170.146.95/32.
    [I] Nov 15 01:34:30 ndm: IpSec::Interface::Ike: "IKE0": adding nameserver 178.170.146.3.
    [I] Nov 15 01:34:30 ndm: Dns::Manager: name server 178.170.146.3 added, domain (default).
    [I] Nov 15 01:34:30 ndm: IpSec::Interface::Ike: "IKE0": add route to nameserver 178.170.146.3 via IKE0.
    [I] Nov 15 01:34:30 ndm: IpSec::Interface::Ike: "IKE0": interface "IKE0" is global, priority 61481.
    [I] Nov 15 01:34:30 ndm: IpSec::Interface::Ike: "IKE0": adding default route via IKE0.
    [I] Nov 15 01:34:30 ndm: IpSec::Interface::Ike: "IKE0": secured tunnel is ready.
    [I] Nov 15 01:34:30 ndm: IpSec::IpSecNetfilter: netfilter configuration reloading is done.
    [I] Nov 15 01:34:30 coalagent: updating configuration...
    [I] Nov 15 01:34:31 ndm: Network::InterfaceFlusher: flushed GigabitEthernet1 conntrack and route cache.
    [I] Nov 15 01:34:31 ndm: Http::Nginx: loaded SSL certificate for "xxx.keenetic.io".
    [I] Nov 15 01:34:31 ndm: Http::Nginx: loaded SSL certificate for "xxx.keenetic.pro".
    [I] Nov 15 01:34:31 ndm: Http::Nginx: activated proxy modem.xxx.keenetic.pro to http://192.168.99.1:80.
    [I] Nov 15 01:34:32 ndm: Core::Server: started Session /var/run/ndm.core.socket.
    [I] Nov 15 01:34:32 ndm: Core::Session: client disconnected.
    [I] Nov 15 01:34:32 ndm: Http::Manager: updated configuration.
    [I] Nov 15 01:34:32 ndm: Core::Server: started Session /var/run/ndm.core.socket.
    [I] Nov 15 01:34:32 ndm: Dns::Manager: deleted record "xxx.keenetic.pro", address 78.47.125.180.
    [I] Nov 15 01:34:32 ndm: Dns::Manager: added static record for "xxx.keenetic.pro", address 78.47.125.180.
    [I] Nov 15 01:34:32 ndm: Core::Session: client disconnected.
    [I] Nov 15 01:34:33 ndm: IpSec::Manager: create IPsec reconfiguration transaction...
    [I] Nov 15 01:34:33 ndm: IpSec::Manager: "VirtualIPServer": crypto map administratively disabled, skipping.
    [I] Nov 15 01:34:33 ndm: IpSec::Manager: add config for crypto map "VPNL2TPServer".
    [I] Nov 15 01:34:33 ndm: IpSec::Manager: add config for crypto map "IKE0".
    [I] Nov 15 01:34:33 ndm: IpSec::Manager: IPsec reconfiguration transaction was created.
    [I] Nov 15 01:34:33 ndm: IpSec::Configurator: start applying IPsec configuration.
    [I] Nov 15 01:34:33 ndm: IpSec::Configurator: IPsec configuration applying is done.
    [I] Nov 15 01:34:33 ndm: IpSec::Configurator: start reloading IPsec config task.
    [I] Nov 15 01:34:33 ipsec: 11[CFG] received stroke: delete connection 'VPNL2TPServer'
    [I] Nov 15 01:34:33 ipsec: 11[CFG] deleted connection 'VPNL2TPServer'
    [I] Nov 15 01:34:33 ipsec: 12[CFG] received stroke: delete connection 'IKE0'
    [I] Nov 15 01:34:33 ipsec: 12[CFG] deleted connection 'IKE0'
    [I] Nov 15 01:34:33 ipsec: 00[DMN] signal of type SIGHUP received. Reloading configuration
    [I] Nov 15 01:34:33 ipsec: 13[CFG] received stroke: add connection 'VPNL2TPServer'
    [I] Nov 15 01:34:33 ipsec: 00[CFG] loaded 0 entries for attr plugin configuration
    [I] Nov 15 01:34:33 ipsec: 00[CFG] loaded 1 RADIUS server configuration
    [I] Nov 15 01:34:33 ipsec: 13[CFG] added configuration 'VPNL2TPServer'
    [I] Nov 15 01:34:33 ipsec: 08[CFG] received stroke: add connection 'IKE0'
    [I] Nov 15 01:34:33 ipsec: 08[CFG] added configuration 'IKE0'
    [I] Nov 15 01:34:33 ndm: IpSec::Configurator: reloading IPsec config task done.
    [I] Nov 15 01:34:33 ndm: IpSec::IpSecNetfilter: start reloading netfilter configuration...
    [I] Nov 15 01:34:33 ndm: IpSec::IpSecNetfilter: netfilter configuration reloading is done.
    [I] Nov 15 01:34:38 coalagent: updating configuration...
    [I] Nov 15 01:34:48 ndm: Core::System::Clock: system time has been changed.
    [I] Nov 15 01:34:48 ndm: Ntp::Client: time synchronized with "time.google.com".
    [I] Nov 15 01:54:04 ndm: Netfilter::Util::Conntrack: flushed 1 IPv4 connections for 192.168.1.57.
    [I] Nov 15 01:54:16 coalagent: updating configuration...
    [I] Nov 15 01:57:46 ndhcpc: GigabitEthernet1: received ACK for 93.100.188.xxx from 93.100.176.1 lease 3600 sec.
    [I] Nov 15 02:09:43 ndm: Netfilter::Util::Conntrack: flushed 7 IPv4 connections for 192.168.1.84.
    [I] Nov 15 02:10:14 coalagent: updating configuration...
    [I] Nov 15 02:27:47 ndhcpc: GigabitEthernet1: received ACK for 93.100.188.xxx from 93.100.176.1 lease 3600 sec.
    [I] Nov 15 02:34:48 ndm: Core::System::Clock: system time has been changed.
    [I] Nov 15 02:34:48 ndm: Ntp::Client: time synchronized with "time.google.com".
    [I] Nov 15 02:57:47 ndhcpc: GigabitEthernet1: received ACK for 93.100.188.xxx from 93.100.176.1 lease 3600 sec.
    [I] Nov 15 03:27:47 ndhcpc: GigabitEthernet1: received ACK for 93.100.188.xxx from 93.100.176.1 lease 3600 sec.
    [I] Nov 15 03:34:48 ndm: Core::System::Clock: system time has been changed.
    [I] Nov 15 03:34:48 ndm: Ntp::Client: time synchronized with "time.google.com".
    [I] Nov 15 03:57:47 ndhcpc: GigabitEthernet1: received ACK for 93.100.188.xxx from 93.100.176.1 lease 3600 sec.
    [I] Nov 15 04:25:38 ipsec: 13[IKE] 178.170.146.1 is initiating an IKE_SA
    [I] Nov 15 04:25:38 ipsec: 13[CFG] received proposals: IKE:3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:3DES_CBC/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:3DES_CBC/HMAC_SHA2_384_192/PRF_HMAC_SHA2_384/MODP_1024, IKE:AES_CBC=128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_CBC=128/HMAC_SHA2_384_192/PRF_HMAC_SHA2_384/MODP_1024, IKE:AES_CBC=192/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC=192/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_CBC=192/HMAC_SHA2_384_192/PRF_HMAC_SHA2_384/MODP_1024, IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_CBC=256/HMAC_SHA2_384_192/PRF_HMAC_SHA2_384/MODP_1024
    [I] Nov 15 04:25:38 ipsec: 13[CFG] configured proposals: IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:3DES_CBC/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/ECP_384, IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_2048, IKE:AES_CBC=128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC=128/HMAC_SHA1_96/PRF_HMAC_SHA1/ECP_256, IKE:3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_2048, IKE:3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1536, IKE:3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024
    [I] Nov 15 04:25:38 ipsec: 13[CFG] selected proposal: IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
    [I] Nov 15 04:25:39 ipsec: 13[IKE] scheduling reauthentication in 28770s
    [I] Nov 15 04:25:39 ipsec: 13[IKE] maximum IKE_SA lifetime 28790s
    [I] Nov 15 04:25:39 ipsec: 13[IKE] IKE_SA IKE0[14] rekeyed between 93.100.188.xxx[93.100.188.xxx]...178.170.146.1[CN=*.pointtoserver.com]
    [I] Nov 15 04:25:39 ipsec: 13[IKE] rescheduling reauthentication in 18501s after rekeying, lifetime reduced to 18521s
    [I] Nov 15 04:25:39 ipsec: 07[IKE] received DELETE for IKE_SA IKE0[13]
    [I] Nov 15 04:25:39 ipsec: 07[IKE] deleting IKE_SA IKE0[13] between 93.100.188.xxx[93.100.188.xxx]...178.170.146.1[CN=*.pointtoserver.com]
    [I] Nov 15 04:25:39 ipsec: 07[IKE] IKE_SA deleted
    [I] Nov 15 04:27:47 ndhcpc: GigabitEthernet1: received ACK for 93.100.188.xxx from 93.100.176.1 lease 3600 sec.
    [I] Nov 15 04:34:48 ndm: Core::System::Clock: system time has been changed.
    [I] Nov 15 04:34:48 ndm: Ntp::Client: time synchronized with "time.google.com".
    [I] Nov 15 04:57:47 ndhcpc: GigabitEthernet1: received ACK for 93.100.188.xxx from 93.100.176.1 lease 3600 sec.
    [I] Nov 15 05:27:47 ndhcpc: GigabitEthernet1: received ACK for 93.100.188.xxx from 93.100.176.1 lease 3600 sec.
    [I] Nov 15 05:32:22 ndm: Netfilter::Util::Conntrack: flushed 4 IPv4 connections for 192.168.1.84.
    [I] Nov 15 05:34:48 ndm: Core::System::Clock: system time has been changed.
    [I] Nov 15 05:34:48 ndm: Ntp::Client: time synchronized with "time.google.com".
    [I] Nov 15 05:57:47 ndhcpc: GigabitEthernet1: received ACK for 93.100.188.xxx from 93.100.176.1 lease 3600 sec.
    [I] Nov 15 06:27:47 ndhcpc: GigabitEthernet1: received ACK for 93.100.188.xxx from 93.100.176.1 lease 3600 sec.
    [I] Nov 15 06:34:48 ndm: Core::System::Clock: system time has been changed.
    [I] Nov 15 06:34:48 ndm: Ntp::Client: time synchronized with "time.google.com".
    [I] Nov 15 06:52:09 ndm: Netfilter::Util::Conntrack: flushed 2 IPv4 connections for 192.168.1.57.
    [I] Nov 15 06:52:49 coalagent: updating configuration...
    [I] Nov 15 06:57:47 ndhcpc: GigabitEthernet1: received ACK for 93.100.188.xxx from 93.100.176.1 lease 3600 sec.
    [I] Nov 15 07:16:38 ipsec: 08[IKE] integrity check failed
    [I] Nov 15 07:16:38 ipsec: 08[IKE] CREATE_CHILD_SA request with message ID 0 processing failed
    [E] Nov 15 07:16:38 ndm: IpSec::Configurator: IKE message parsing error for crypto map "IKE0".
    [W] Nov 15 07:16:38 ndm: IpSec::Configurator: (possibly because of wrong pre-shared key).
    [I] Nov 15 07:16:38 ndm: IpSec::CryptoMapInfo: "IKE0": crypto map active IKE SA: 0, active CHILD SA: 0.
    [W] Nov 15 07:16:38 ndm: IpSec::Configurator: fallback peer is not defined for crypto map "IKE0", retry.
    [I] Nov 15 07:16:38 ndm: IpSec::Configurator: "IKE0": schedule reconnect for crypto map.
    [I] Nov 15 07:16:38 ndm: IpSec::Interface::Ike: "IKE0": IPsec layer is down, shutdown.
    [I] Nov 15 07:16:38 ndm: Network::Interface::Ip: "IKE0": IP address cleared.
    [I] Nov 15 07:16:38 ndm: IpSec::Manager: "IKE0": IP secure connection and keys was deleted.
    [I] Nov 15 07:16:38 ndm: Network::InterfaceFlusher: flushed IKE0 conntrack and route cache.
    [I] Nov 15 07:16:39 ndm: Http::Nginx: loaded SSL certificate for "xxx.keenetic.io".
    [I] Nov 15 07:16:39 ndm: Http::Nginx: loaded SSL certificate for "xxx.keenetic.pro".
    [I] Nov 15 07:16:39 ipsec: 10[IKE] integrity check failed
    [I] Nov 15 07:16:39 ipsec: 10[IKE] CREATE_CHILD_SA request with message ID 0 processing failed
    [I] Nov 15 07:16:39 ndm: Http::Nginx: activated proxy modem.xxx.keenetic.pro to http://192.168.99.1:80.
    [E] Nov 15 07:16:39 ndm: IpSec::Configurator: IKE message parsing error for crypto map "IKE0".
    [W] Nov 15 07:16:39 ndm: IpSec::Configurator: (possibly because of wrong pre-shared key).
    [I] Nov 15 07:16:39 ndm: IpSec::CryptoMapInfo: "IKE0": crypto map active IKE SA: 0, active CHILD SA: 0.
    [W] Nov 15 07:16:39 ndm: IpSec::Configurator: fallback peer is not defined for crypto map "IKE0", retry.
    [I] Nov 15 07:16:39 ndm: IpSec::Configurator: "IKE0": schedule reconnect for crypto map.
    [I] Nov 15 07:16:39 ndm: Core::Server: started Session /var/run/ndm.core.socket.
    [I] Nov 15 07:16:39 ndm: Core::Session: client disconnected.
    [I] Nov 15 07:16:39 ndm: Http::Manager: updated configuration.
    [I] Nov 15 07:16:39 ndm: IpSec::Interface::Ike: "IKE0": IPsec layer is down, shutdown.
    [I] Nov 15 07:16:39 ndm: Network::Interface::Ip: "IKE0": IP address cleared.
    [I] Nov 15 07:16:39 ndm: Core::Server: started Session /var/run/ndm.core.socket.
    [I] Nov 15 07:16:39 ndm: Core::Session: client disconnected.
    [I] Nov 15 07:16:40 ipsec: 15[IKE] integrity check failed
    [I] Nov 15 07:16:40 ipsec: 15[IKE] CREATE_CHILD_SA request with message ID 0 processing failed
    [E] Nov 15 07:16:40 ndm: IpSec::Configurator: IKE message parsing error for crypto map "IKE0".
    [W] Nov 15 07:16:40 ndm: IpSec::Configurator: (possibly because of wrong pre-shared key).
    [I] Nov 15 07:16:40 ndm: IpSec::CryptoMapInfo: "IKE0": crypto map active IKE SA: 0, active CHILD SA: 0.
    [W] Nov 15 07:16:40 ndm: IpSec::Configurator: fallback peer is not defined for crypto map "IKE0", retry.
    [I] Nov 15 07:16:40 ndm: IpSec::Interface::Ike: "IKE0": IPsec layer is down, shutdown.
    [I] Nov 15 07:16:40 ndm: IpSec::Configurator: "IKE0": schedule reconnect for crypto map.
    [I] Nov 15 07:16:40 ndm: Network::Interface::Ip: "IKE0": IP address cleared.
    [I] Nov 15 07:16:40 ndm: IpSec::Manager: create IPsec reconfiguration transaction...
    [I] Nov 15 07:16:40 ndm: IpSec::Manager: "VirtualIPServer": crypto map administratively disabled, skipping.
    [I] Nov 15 07:16:40 ndm: IpSec::Manager: add config for crypto map "VPNL2TPServer".
    [I] Nov 15 07:16:40 ndm: IpSec::Manager: IPsec reconfiguration transaction was created.
    [I] Nov 15 07:16:40 ndm: IpSec::Configurator: start applying IPsec configuration.
    [I] Nov 15 07:16:40 ndm: IpSec::Configurator: IPsec configuration applying is done.
    [I] Nov 15 07:16:40 ndm: IpSec::Configurator: start reloading IKE keys task.
    [I] Nov 15 07:16:40 ipsec: 04[CFG] rereading secrets
    [I] Nov 15 07:16:40 ipsec: 04[CFG] loading secrets
    [I] Nov 15 07:16:40 ipsec: 04[CFG] loaded IKE secret for %any
    [I] Nov 15 07:16:40 ipsec: 04[CFG] loaded IKE secret for @mykeenetic.net
    [I] Nov 15 07:16:40 ipsec: 04[CFG] loaded NTLM secret for xxx
    [I] Nov 15 07:16:40 ndm: IpSec::Configurator: reloading IKE keys task done.
    [I] Nov 15 07:16:40 ipsec: 04[CFG] rereading ca certificates from '/tmp/ipsec/ipsec.d/cacerts'
    [I] Nov 15 07:16:40 ndm: IpSec::Configurator: start reloading IPsec config task.
    [I] Nov 15 07:16:40 ipsec: 13[CFG] received stroke: delete connection 'VPNL2TPServer'
    [I] Nov 15 07:16:40 ipsec: 13[CFG] deleted connection 'VPNL2TPServer'
    [I] Nov 15 07:16:40 ipsec: 07[CFG] received stroke: delete connection 'IKE0'
    [I] Nov 15 07:16:40 ipsec: 07[CFG] deleted connection 'IKE0'
    [I] Nov 15 07:16:41 ipsec: 00[DMN] signal of type SIGHUP received. Reloading configuration
    [I] Nov 15 07:16:41 ipsec: 11[CFG] received stroke: add connection 'VPNL2TPServer'
    [I] Nov 15 07:16:41 ipsec: 00[CFG] loaded 0 entries for attr plugin configuration
    [I] Nov 15 07:16:41 ipsec: 11[CFG] added configuration 'VPNL2TPServer'
    [I] Nov 15 07:16:41 ipsec: 00[CFG] loaded 1 RADIUS server configuration
    [I] Nov 15 07:16:41 ndm: IpSec::IpSecNetfilter: start reloading netfilter configuration...
    [I] Nov 15 07:16:41 ndm: IpSec::IpSecNetfilter: netfilter configuration reloading is done.
    [I] Nov 15 07:16:41 ndm: IpSec::Configurator: reloading IPsec config task done.
    [I] Nov 15 07:16:41 ndm: IpSec::Configurator: crypto map "IKE0" shutdown started.
    [I] Nov 15 07:16:41 ipsec: 09[CFG] received stroke: unroute 'IKE0'
    [I] Nov 15 07:16:41 ipsec: 12[CFG] received stroke: terminate 'IKE0{*}'
    [I] Nov 15 07:16:41 ipsec: 03[IKE] closing CHILD_SA IKE0{11} with SPIs c15a04de_i (807197010 bytes) c466b7aa_o (224120198 bytes) and TS 178.170.146.95/32 === 0.0.0.0/0
    [I] Nov 15 07:16:41 ipsec: 03[IKE] sending DELETE for ESP CHILD_SA with SPI c15a04de
    [I] Nov 15 07:16:41 ipsec: 06[CFG] received stroke: terminate 'IKE0[*]'
    [I] Nov 15 07:16:41 ndm: IpSec::Configurator: crypto map "IKE0" shutdown complete.
    [I] Nov 15 07:16:43 ipsec: 04[CFG] rereading aa certificates from '/tmp/ipsec/ipsec.d/aacerts'
    [I] Nov 15 07:16:43 ipsec: 04[CFG] rereading ocsp signer certificates from '/tmp/ipsec/ipsec.d/ocspcerts'
    [I] Nov 15 07:16:43 ipsec: 04[CFG] rereading attribute certificates from '/tmp/ipsec/ipsec.d/acerts'
    [I] Nov 15 07:16:43 ipsec: 04[CFG] rereading crls from '/tmp/ipsec/ipsec.d/crls'
    [I] Nov 15 07:16:43 ipsec: 13[IKE] integrity check failed
    [I] Nov 15 07:16:43 ipsec: 13[IKE] CREATE_CHILD_SA request with message ID 0 processing failed
    [I] Nov 15 07:16:43 ndm: IpSec::Interface::Ike: "IKE0": secure tunnel is down: retry to resolve remote endpoint.
    [I] Nov 15 07:16:45 ndm: Network::Interface::Tunnel: "IKE0": resolved destination 172.94.13.1 (de1.pointtoserver.com).
    [I] Nov 15 07:16:45 ndm: Network::Interface::Ip: "IKE0": IP address cleared.
    [I] Nov 15 07:16:45 ndm: Network::Interface::Tunnel: "IKE0": resolved source 93.100.188.xxx.
    [I] Nov 15 07:16:46 ndm: Network::Interface::Tunnel: "IKE0": added host route to tunnel destination endpoint 172.94.13.1 via 93.100.176.1.
    [I] Nov 15 07:16:46 ndm: IpSec::Manager: "IKE0": IP secure connection was added.
    [I] Nov 15 07:16:46 ndm: IpSec::Interface::Ike: "IKE0": updating client IP secure configuration.
    [I] Nov 15 07:16:48 ndm: IpSec::Manager: create IPsec reconfiguration transaction...
    [I] Nov 15 07:16:48 ndm: IpSec::Manager: "VirtualIPServer": crypto map administratively disabled, skipping.
    [I] Nov 15 07:16:48 ndm: IpSec::Manager: add config for crypto map "VPNL2TPServer".
    [I] Nov 15 07:16:48 ndm: IpSec::Manager: add config for crypto map "IKE0".
    [I] Nov 15 07:16:48 ndm: IpSec::Manager: IPsec reconfiguration transaction was created.
    [I] Nov 15 07:16:48 ndm: IpSec::Configurator: start applying IPsec configuration.
    [I] Nov 15 07:16:48 ndm: IpSec::Configurator: IPsec configuration applying is done.
    [I] Nov 15 07:16:48 ndm: IpSec::Configurator: start reloading IKE keys task.
    [I] Nov 15 07:16:48 ipsec: 11[CFG] rereading secrets
    [I] Nov 15 07:16:48 ipsec: 11[CFG] loading secrets
    [I] Nov 15 07:16:48 ipsec: 11[CFG] loaded IKE secret for %any
    [I] Nov 15 07:16:48 ipsec: 11[CFG] loaded IKE secret for @mykeenetic.net
    [I] Nov 15 07:16:48 ndm: IpSec::Configurator: reloading IKE keys task done.
    [I] Nov 15 07:16:48 ipsec: 11[CFG] loaded EAP secret for purevpn0sxxxxxx
    [I] Nov 15 07:16:48 ipsec: 11[CFG] loaded NTLM secret for xxx
    [I] Nov 15 07:16:48 ipsec: 11[CFG] rereading ca certificates from '/tmp/ipsec/ipsec.d/cacerts'
    [I] Nov 15 07:16:48 ndm: IpSec::Configurator: start reloading IPsec config task.
    [I] Nov 15 07:16:48 ipsec: 14[CFG] received stroke: delete connection 'VPNL2TPServer'
    [I] Nov 15 07:16:48 ipsec: 14[CFG] deleted connection 'VPNL2TPServer'
    [I] Nov 15 07:16:48 ipsec: 00[DMN] signal of type SIGHUP received. Reloading configuration
    [I] Nov 15 07:16:48 ipsec: 08[CFG] received stroke: add connection 'VPNL2TPServer'
    [I] Nov 15 07:16:48 ipsec: 00[CFG] loaded 0 entries for attr plugin configuration
    [I] Nov 15 07:16:48 ipsec: 08[CFG] added configuration 'VPNL2TPServer'
    [I] Nov 15 07:16:48 ipsec: 00[CFG] loaded 1 RADIUS server configuration
    [I] Nov 15 07:16:48 ipsec: 03[CFG] received stroke: add connection 'IKE0'
    [I] Nov 15 07:16:48 ipsec: 03[CFG] added configuration 'IKE0'
    [I] Nov 15 07:16:48 ndm: IpSec::IpSecNetfilter: start reloading netfilter configuration...
    [I] Nov 15 07:16:48 ndm: IpSec::IpSecNetfilter: netfilter configuration reloading is done.
    [I] Nov 15 07:16:48 ndm: IpSec::Configurator: reloading IPsec config task done.
    [I] Nov 15 07:16:48 ipsec: 07[CFG] received stroke: initiate 'IKE0'
    [I] Nov 15 07:16:48 ndm: IpSec::Configurator: "IKE0": crypto map initialized.
    [I] Nov 15 07:16:48 ipsec: 15[IKE] initiating IKE_SA IKE0[15] to 172.94.13.1
    [I] Nov 15 07:16:48 ipsec: 08[IKE] received MS NT5 ISAKMPOAKLEY v9 vendor ID
    [I] Nov 15 07:16:48 ipsec: 08[IKE] received MS-Negotiation Discovery Capable vendor ID
    [I] Nov 15 07:16:48 ipsec: 08[CFG] received proposals: IKE:3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024
    [I] Nov 15 07:16:48 ipsec: 08[CFG] configured proposals: IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:3DES_CBC/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/ECP_384, IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_2048, IKE:AES_CBC=128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC=128/HMAC_SHA1_96/PRF_HMAC_SHA1/ECP_256, IKE:3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_2048, IKE:3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1536, IKE:3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024
    [I] Nov 15 07:16:48 ipsec: 08[CFG] selected proposal: IKE:3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024
    [I] Nov 15 07:16:48 ipsec: 08[IKE] faking NAT situation to enforce UDP encapsulation
    [I] Nov 15 07:16:48 ipsec: 08[CFG] no IDi configured, fall back on IP address
    [I] Nov 15 07:16:48 ipsec: 08[IKE] establishing CHILD_SA IKE0{12}
    [I] Nov 15 07:16:49 ipsec: 03[IKE] retransmit 1 of request with message ID 0
    [I] Nov 15 07:16:50 ipsec: 11[CFG] rereading aa certificates from '/tmp/ipsec/ipsec.d/aacerts'
    [I] Nov 15 07:16:50 ipsec: 11[CFG] rereading ocsp signer certificates from '/tmp/ipsec/ipsec.d/ocspcerts'
    [I] Nov 15 07:16:50 ipsec: 11[CFG] rereading attribute certificates from '/tmp/ipsec/ipsec.d/acerts'
    [I] Nov 15 07:16:50 ipsec: 11[CFG] rereading crls from '/tmp/ipsec/ipsec.d/crls'
    [I] Nov 15 07:16:50 ipsec: 08[IKE] integrity check failed
    [I] Nov 15 07:16:50 ipsec: 08[IKE] CREATE_CHILD_SA request with message ID 0 processing failed
    [E] Nov 15 07:16:50 ndm: IpSec::Configurator: IKE message parsing error for crypto map "IKE0".
    [W] Nov 15 07:16:50 ndm: IpSec::Configurator: (possibly because of wrong pre-shared key).
    [I] Nov 15 07:16:50 ndm: IpSec::CryptoMapInfo: "IKE0": crypto map active IKE SA: 0, active CHILD SA: 0.
    [W] Nov 15 07:16:50 ndm: IpSec::Configurator: fallback peer is not defined for crypto map "IKE0", retry.
    [I] Nov 15 07:16:50 ndm: IpSec::Configurator: "IKE0": schedule reconnect for crypto map.
    [I] Nov 15 07:16:50 ndm: IpSec::Interface::Ike: "IKE0": IPsec layer is down, shutdown.
    [I] Nov 15 07:16:50 ndm: Network::Interface::Ip: "IKE0": IP address cleared.
    [I] Nov 15 07:16:50 ndm: IpSec::Manager: "IKE0": IP secure connection and keys was deleted.
    [I] Nov 15 07:16:50 ipsec: 11[IKE] received end entity cert "CN=*.pointtoserver.com"
    [I] Nov 15 07:16:50 ipsec: 11[IKE] received issuer cert "C=GB, ST=Greater Manchester, L=Salford, O=Sectigo Limited, CN=Sectigo RSA Domain Validation Secure Server CA"
    [I] Nov 15 07:16:50 ipsec: 11[CFG] using certificate "CN=*.pointtoserver.com"
    [I] Nov 15 07:16:50 ipsec: 11[CFG] using untrusted intermediate certificate "C=GB, ST=Greater Manchester, L=Salford, O=Sectigo Limited, CN=Sectigo RSA Domain Validation Secure Server CA"
    [I] Nov 15 07:16:50 ipsec: 11[CFG] system time out of sync, skipping certificate lifetime check
    [I] Nov 15 07:16:50 ipsec: 11[CFG] using trusted ca certificate "C=US, ST=New Jersey, L=Jersey City, O=The USERTRUST Network, CN=USERTrust RSA Certification Authority"
    [I] Nov 15 07:16:50 ipsec: 11[CFG] system time out of sync, skipping certificate lifetime check
    [I] Nov 15 07:16:50 ipsec: 11[CFG] system time out of sync, skipping certificate lifetime check
    [I] Nov 15 07:16:50 ipsec: 11[CFG] reached self-signed root ca with a path length of 1
    [I] Nov 15 07:16:50 ipsec: 11[IKE] authentication of 'CN=*.pointtoserver.com' with RSA signature successful
    [I] Nov 15 07:16:50 ipsec: 11[IKE] server requested EAP_IDENTITY (id 0x00), sending 'purevpn0sxxxxxx'
    [I] Nov 15 07:16:50 ipsec: 11[IKE] server requested EAP_MSCHAPV2 authentication (id 0x01)
    [I] Nov 15 07:16:50 ipsec: 11[IKE] EAP-MS-CHAPv2 succeeded: '(null)'
    [I] Nov 15 07:16:51 ipsec: 03[IKE] EAP method EAP_MSCHAPV2 succeeded, MSK established
    [I] Nov 15 07:16:51 ipsec: 03[IKE] authentication of '93.100.188.xxx' (myself) with EAP
    [I] Nov 15 07:16:51 ipsec: 14[IKE] authentication of 'CN=*.pointtoserver.com' with EAP successful
    [I] Nov 15 07:16:51 ipsec: 14[IKE] IKE_SA IKE0[15] established between 93.100.188.xxx[93.100.188.xxx]...172.94.13.1[CN=*.pointtoserver.com]
    [I] Nov 15 07:16:51 ipsec: 14[IKE] scheduling reauthentication in 28768s
    [I] Nov 15 07:16:51 ipsec: 14[IKE] maximum IKE_SA lifetime 28788s
    [I] Nov 15 07:16:51 ndm: IpSec::CryptoMapInfo: "IKE0": crypto map active IKE SA: 1, active CHILD SA: 0.
    [I] Nov 15 07:16:51 ipsec: 14[IKE] installing new virtual IP 172.94.13.59
    [I] Nov 15 07:16:51 ipsec: 14[CFG] received proposals: ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ
    [I] Nov 15 07:16:51 ipsec: 14[CFG] configured proposals: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA2_256_128/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA2_256_128/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA2_256_128/NO_EXT_SEQ
    [I] Nov 15 07:16:51 ipsec: 14[CFG] selected proposal: ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ
    [I] Nov 15 07:16:51 ipsec: 14[IKE] CHILD_SA IKE0{12} established with SPIs caf5bd1b_i 93d1e7d4_o and TS 172.94.13.59/32 === 0.0.0.0/0
    [W] Nov 15 07:16:51 ndm: IpSec::Configurator: crypto map "IKE0" is up.
    [I] Nov 15 07:16:51 ndm: IpSec::Configurator: reconnection for crypto map "IKE0" was cancelled.
    [I] Nov 15 07:16:51 ndm: IpSec::CryptoMapInfo: "IKE0": crypto map active IKE SA: 1, active CHILD SA: 1.
    [I] Nov 15 07:16:51 ndm: IpSec::Interface::Ike: "IKE0": IPsec client layer is up.
    [I] Nov 15 07:16:51 ndm: Network::Interface::Ip: "IKE0": IP address is 172.94.13.59/32.
    [I] Nov 15 07:16:51 ndm: IpSec::Interface::Ike: "IKE0": adding nameserver 172.94.13.3.
    [I] Nov 15 07:16:51 ndm: Dns::Manager: name server 172.94.13.3 added, domain (default).
    [I] Nov 15 07:16:51 ndm: IpSec::Interface::Ike: "IKE0": add route to nameserver 172.94.13.3 via IKE0.
    [I] Nov 15 07:16:51 ndm: IpSec::Interface::Ike: "IKE0": interface "IKE0" is global, priority 61481.
    [I] Nov 15 07:16:51 ndm: IpSec::Interface::Ike: "IKE0": adding default route via IKE0.
    [I] Nov 15 07:16:51 ndm: IpSec::Interface::Ike: "IKE0": secured tunnel is ready.
    [I] Nov 15 07:16:51 ndm: IpSec::IpSecNetfilter: start reloading netfilter configuration...
    [W] Nov 15 07:16:51 kernel: nikecli0: Local routing loop detected!
    [I] Nov 15 07:16:51 ndm: IpSec::IpSecNetfilter: netfilter configuration reloading is done.
    [W] Nov 15 07:16:51 kernel: nikecli0: Local routing loop detected!
    [I] Nov 15 07:16:52 ndm: Network::InterfaceFlusher: flushed GigabitEthernet1 conntrack and route cache.
    [W] Nov 15 07:16:52 kernel: nikecli0: Local routing loop detected!
    [I] Nov 15 07:16:52 ndm: Http::Nginx: loaded SSL certificate for "xxx.keenetic.io".
    [I] Nov 15 07:16:52 ndm: Http::Nginx: loaded SSL certificate for "xxx.keenetic.pro".
    [I] Nov 15 07:16:52 ndm: Http::Nginx: activated proxy modem.xxx.keenetic.pro to http://192.168.99.1:80.
    [I] Nov 15 07:16:52 ndm: Core::Server: started Session /var/run/ndm.core.socket.
    [I] Nov 15 07:16:52 ndm: Core::Session: client disconnected.
    [I] Nov 15 07:16:52 ndm: Http::Manager: updated configuration.
    [I] Nov 15 07:16:52 ndm: Core::Server: started Session /var/run/ndm.core.socket.
    [I] Nov 15 07:16:52 ndm: Core::Session: client disconnected.
    [I] Nov 15 07:16:54 ndm: IpSec::Manager: create IPsec reconfiguration transaction...
    [I] Nov 15 07:16:54 ndm: IpSec::Manager: "VirtualIPServer": crypto map administratively disabled, skipping.
    [I] Nov 15 07:16:54 ndm: IpSec::Manager: add config for crypto map "VPNL2TPServer".
    [I] Nov 15 07:16:54 ndm: IpSec::Manager: IPsec reconfiguration transaction was created.
    [I] Nov 15 07:16:54 ndm: IpSec::Configurator: start applying IPsec configuration.
    [I] Nov 15 07:16:54 ndm: IpSec::Configurator: IPsec configuration applying is done.
    [I] Nov 15 07:16:54 ndm: IpSec::Configurator: start reloading IKE keys task.
    [I] Nov 15 07:16:54 ndm: IpSec::Interface::Ike: "IKE0": IPsec layer is down, shutdown.
    [I] Nov 15 07:16:54 ipsec: 08[CFG] rereading secrets
    [I] Nov 15 07:16:54 ipsec: 08[CFG] loading secrets
    [I] Nov 15 07:16:54 ipsec: 08[CFG] loaded IKE secret for %any
    [I] Nov 15 07:16:54 ipsec: 08[CFG] loaded IKE secret for @mykeenetic.net
    [I] Nov 15 07:16:54 ipsec: 08[CFG] loaded NTLM secret for xxxxxx
    [I] Nov 15 07:16:54 ndm: IpSec::Configurator: reloading IKE keys task done.
    [I] Nov 15 07:16:54 ipsec: 08[CFG] rereading ca certificates from '/tmp/ipsec/ipsec.d/cacerts'
    [I] Nov 15 07:16:54 ndm: Network::Interface::Ip: "IKE0": IP address cleared.
    [I] Nov 15 07:16:54 ndm: IpSec::Configurator: start reloading IPsec config task.
    [I] Nov 15 07:16:54 ipsec: 11[CFG] received stroke: delete connection 'VPNL2TPServer'
    [I] Nov 15 07:16:54 ipsec: 11[CFG] deleted connection 'VPNL2TPServer'
    [I] Nov 15 07:16:54 ipsec: 09[CFG] received stroke: delete connection 'IKE0'
    [I] Nov 15 07:16:54 ipsec: 09[CFG] deleted connection 'IKE0'
    [I] Nov 15 07:16:54 ipsec: 00[DMN] signal of type SIGHUP received. Reloading configuration
    [I] Nov 15 07:16:54 ipsec: 13[CFG] received stroke: add connection 'VPNL2TPServer'
    [I] Nov 15 07:16:54 ipsec: 00[CFG] loaded 0 entries for attr plugin configuration
    [I] Nov 15 07:16:54 ipsec: 00[CFG] loaded 1 RADIUS server configuration
    [I] Nov 15 07:16:54 ipsec: 13[CFG] added configuration 'VPNL2TPServer'
    [I] Nov 15 07:16:54 ndm: IpSec::IpSecNetfilter: start reloading netfilter configuration...
    [I] Nov 15 07:16:54 ndm: IpSec::IpSecNetfilter: netfilter configuration reloading is done.
    [I] Nov 15 07:16:54 ndm: IpSec::Configurator: reloading IPsec config task done.
    [I] Nov 15 07:16:54 ndm: Network::InterfaceFlusher: flushed IKE0 conntrack and route cache.
    [I] Nov 15 07:16:54 ndm: IpSec::Configurator: crypto map "IKE0" shutdown started.
    [I] Nov 15 07:16:54 ipsec: 07[CFG] received stroke: unroute 'IKE0'
    [I] Nov 15 07:16:54 ipsec: 11[CFG] received stroke: terminate 'IKE0{*}'
    [I] Nov 15 07:16:54 ipsec: 04[IKE] closing CHILD_SA IKE0{12} with SPIs caf5bd1b_i (12618 bytes) 93d1e7d4_o (5322 bytes) and TS 172.94.13.59/32 === 0.0.0.0/0
    [I] Nov 15 07:16:54 ipsec: 04[IKE] sending DELETE for ESP CHILD_SA with SPI caf5bd1b
    [I] Nov 15 07:16:54 ipsec: 09[IKE] received DELETE for ESP CHILD_SA with SPI 93d1e7d4
    [I] Nov 15 07:16:54 ipsec: 09[IKE] CHILD_SA closed
    [I] Nov 15 07:16:54 ndm: IpSec::Configurator: crypto map "IKE0" shutdown complete.
    [I] Nov 15 07:16:55 ndm: IpSec::IpSecNetfilter: start reloading netfilter configuration...
    [I] Nov 15 07:16:55 ndm: IpSec::IpSecNetfilter: netfilter configuration reloading is done.
    [I] Nov 15 07:16:55 ndm: Http::Nginx: loaded SSL certificate for "xxx.keenetic.io".
    [I] Nov 15 07:16:55 ndm: Http::Nginx: loaded SSL certificate for "xxx.keenetic.pro".
    [I] Nov 15 07:16:55 ndm: Http::Nginx: activated proxy modem.xxx.keenetic.pro to http://192.168.99.1:80.
    [I] Nov 15 07:16:55 ndm: Core::Server: started Session /var/run/ndm.core.socket.
    [I] Nov 15 07:16:55 ndm: Core::Session: client disconnected.
    [I] Nov 15 07:16:55 ndm: Http::Manager: updated configuration.
    [I] Nov 15 07:16:55 ndm: IpSec::Interface::Ike: "IKE0": secure tunnel is down: retry to resolve remote endpoint.
    [I] Nov 15 07:16:55 ndm: Core::Server: started Session /var/run/ndm.core.socket.
    [I] Nov 15 07:16:55 ipsec: 14[IKE] traffic selectors 0.0.0.0/0 ::/0 === 0.0.0.0/0 ::/0 unacceptable
    [I] Nov 15 07:16:55 ndm: Core::Session: client disconnected.
    [I] Nov 15 07:16:55 ipsec: 14[IKE] failed to establish CHILD_SA, keeping IKE_SA
    [I] Nov 15 07:16:56 ndm: IpSec::Manager: create IPsec reconfiguration transaction...
    [I] Nov 15 07:16:56 ndm: IpSec::Manager: "VirtualIPServer": crypto map administratively disabled, skipping.
    [I] Nov 15 07:16:56 ndm: IpSec::Manager: add config for crypto map "VPNL2TPServer".
    [I] Nov 15 07:16:56 ndm: IpSec::Manager: IPsec reconfiguration transaction was created.
    [I] Nov 15 07:16:56 ndm: IpSec::Configurator: start applying IPsec configuration.
    [I] Nov 15 07:16:56 ndm: IpSec::Configurator: IPsec configuration applying is done.
    [I] Nov 15 07:16:56 ndm: IpSec::Configurator: start reloading IPsec config task.
    [I] Nov 15 07:16:56 ipsec: 08[CFG] rereading aa certificates from '/tmp/ipsec/ipsec.d/aacerts'
    [I] Nov 15 07:16:56 ipsec: 08[CFG] rereading ocsp signer certificates from '/tmp/ipsec/ipsec.d/ocspcerts'
    [I] Nov 15 07:16:56 ipsec: 08[CFG] rereading attribute certificates from '/tmp/ipsec/ipsec.d/acerts'
    [I] Nov 15 07:16:56 ipsec: 08[CFG] rereading crls from '/tmp/ipsec/ipsec.d/crls'
    [I] Nov 15 07:16:56 ipsec: 15[CFG] received stroke: terminate 'IKE0[*]'
    [I] Nov 15 07:16:56 ipsec: 14[IKE] deleting IKE_SA IKE0[15] between 93.100.188.xxx[93.100.188.xxx]...172.94.13.1[CN=*.pointtoserver.com]
    [I] Nov 15 07:16:56 ipsec: 14[IKE] sending DELETE for IKE_SA IKE0[15]
    [I] Nov 15 07:16:56 ipsec: 04[IKE] IKE_SA deleted
    [I] Nov 15 07:16:57 ndm: IpSec::Configurator: reloading IPsec config task done.
    [I] Nov 15 07:16:57 ndm: IpSec::IpSecNetfilter: start reloading netfilter configuration...
    [I] Nov 15 07:16:57 ndm: IpSec::IpSecNetfilter: netfilter configuration reloading is done.
    [I] Nov 15 07:16:57 ndm: Network::Interface::Tunnel: "IKE0": resolved destination 172.94.23.1 (de1.pointtoserver.com).
    [I] Nov 15 07:16:57 ndm: Network::Interface::Ip: "IKE0": IP address cleared.
    [I] Nov 15 07:16:57 ndm: Network::Interface::Tunnel: "IKE0": resolved source 93.100.188.xxx.
    [I] Nov 15 07:16:58 ndm: Network::Interface::Tunnel: "IKE0": added host route to tunnel destination endpoint 172.94.23.1 via 93.100.176.1.
    [I] Nov 15 07:16:58 ndm: IpSec::Interface::Ike: "IKE0": updating client IP secure configuration.
    [I] Nov 15 07:16:58 ndm: IpSec::Manager: "IKE0": IP secure connection was added.
    [I] Nov 15 07:16:58 ipsec: 13[IKE] retransmit 2 of request with message ID 0
    [I] Nov 15 07:17:00 ndm: IpSec::Manager: create IPsec reconfiguration transaction...
    [I] Nov 15 07:17:00 ndm: IpSec::Manager: "VirtualIPServer": crypto map administratively disabled, skipping.
    [I] Nov 15 07:17:00 ndm: IpSec::Manager: add config for crypto map "VPNL2TPServer".
    [I] Nov 15 07:17:00 ndm: IpSec::Manager: add config for crypto map "IKE0".
    [I] Nov 15 07:17:00 ndm: IpSec::Manager: IPsec reconfiguration transaction was created.
    [I] Nov 15 07:17:00 ndm: IpSec::Configurator: start applying IPsec configuration.
    [I] Nov 15 07:17:00 ndm: IpSec::Configurator: IPsec configuration applying is done.
    [I] Nov 15 07:17:00 ndm: IpSec::Configurator: start reloading IKE keys task.
    [I] Nov 15 07:17:00 ndm: IpSec::Configurator: reloading IKE keys task done.
    [I] Nov 15 07:17:00 ndm: IpSec::Configurator: start reloading IPsec config task.
    [I] Nov 15 07:17:00 ndm: IpSec::IpSecNetfilter: start reloading netfilter configuration...
    [I] Nov 15 07:17:00 ndm: IpSec::IpSecNetfilter: netfilter configuration reloading is done.
    [I] Nov 15 07:17:00 ndm: IpSec::Configurator: reloading IPsec config task done.
    [I] Nov 15 07:17:01 ndm: IpSec::Configurator: "IKE0": crypto map initialized.
    [I] Nov 15 07:17:04 ipsec: 13[IKE] integrity check failed
    [I] Nov 15 07:17:04 ipsec: 13[IKE] CREATE_CHILD_SA request with message ID 0 processing failed
    [E] Nov 15 07:17:04 ndm: IpSec::Configurator: IKE message parsing error for crypto map "IKE0".
    [W] Nov 15 07:17:04 ndm: IpSec::Configurator: (possibly because of wrong pre-shared key).
    [I] Nov 15 07:17:04 ndm: IpSec::CryptoMapInfo: "IKE0": crypto map active IKE SA: 0, active CHILD SA: 0.
    [W] Nov 15 07:17:04 ndm: IpSec::Configurator: fallback peer is not defined for crypto map "IKE0", retry.
    [I] Nov 15 07:17:04 ndm: IpSec::Interface::Ike: "IKE0": IPsec layer is down, shutdown.
    [I] Nov 15 07:17:04 ndm: IpSec::Configurator: "IKE0": schedule reconnect for crypto map.
    [I] Nov 15 07:17:04 ndm: Network::Interface::Ip: "IKE0": IP address cleared.
    [I] Nov 15 07:17:04 ndm: IpSec::Manager: "IKE0": IP secure connection and keys was deleted.
    [I] Nov 15 07:17:06 ndm: IpSec::Manager: create IPsec reconfiguration transaction...
    [I] Nov 15 07:17:06 ndm: IpSec::Manager: "VirtualIPServer": crypto map administratively disabled, skipping.
    [I] Nov 15 07:17:06 ndm: IpSec::Manager: add config for crypto map "VPNL2TPServer".
    [I] Nov 15 07:17:06 ndm: IpSec::Manager: IPsec reconfiguration transaction was created.
    [I] Nov 15 07:17:06 ndm: IpSec::Configurator: start applying IPsec configuration.
    [I] Nov 15 07:17:06 ndm: IpSec::Configurator: IPsec configuration applying is done.
    [I] Nov 15 07:17:06 ndm: IpSec::Configurator: start reloading IKE keys task.
    [I] Nov 15 07:17:06 ndm: IpSec::Configurator: reloading IKE keys task done.
    [I] Nov 15 07:17:06 ndm: IpSec::Configurator: start reloading IPsec config task.
    [I] Nov 15 07:17:06 ndm: IpSec::IpSecNetfilter: start reloading netfilter configuration...
    [I] Nov 15 07:17:06 ndm: IpSec::IpSecNetfilter: netfilter configuration reloading is done.
    [I] Nov 15 07:17:07 ndm: IpSec::Configurator: reloading IPsec config task done.
    [I] Nov 15 07:17:07 ndm: IpSec::Configurator: crypto map "IKE0" shutdown started.
    [I] Nov 15 07:17:07 ndm: IpSec::Configurator: crypto map "IKE0" shutdown complete.
    [I] Nov 15 07:17:08 ipsec: 03[IKE] retransmit 3 of request with message ID 0
    [I] Nov 15 07:17:09 ndm: IpSec::Interface::Ike: "IKE0": secure tunnel is down: retry to resolve remote endpoint.
    [I] Nov 15 07:17:11 ndm: Network::Interface::Tunnel: "IKE0": resolved destination 172.94.24.1 (de1.pointtoserver.com).
    [I] Nov 15 07:17:11 ndm: Network::Interface::Ip: "IKE0": IP address cleared.
    [I] Nov 15 07:17:11 ndm: Network::Interface::Tunnel: "IKE0": resolved source 93.100.188.xxx.
    [I] Nov 15 07:17:11 ndm: Network::Interface::Tunnel: "IKE0": added host route to tunnel destination endpoint 172.94.24.1 via 93.100.176.1.
    [I] Nov 15 07:17:11 ndm: IpSec::Manager: "IKE0": IP secure connection was added.
    [I] Nov 15 07:17:11 ndm: IpSec::Interface::Ike: "IKE0": updating client IP secure configuration.
    [I] Nov 15 07:17:13 ndm: IpSec::Manager: create IPsec reconfiguration transaction...
    [I] Nov 15 07:17:13 ndm: IpSec::Manager: "VirtualIPServer": crypto map administratively disabled, skipping.
    [I] Nov 15 07:17:13 ndm: IpSec::Manager: add config for crypto map "VPNL2TPServer".
    [I] Nov 15 07:17:13 ndm: IpSec::Manager: add config for crypto map "IKE0".
    [I] Nov 15 07:17:13 ndm: IpSec::Manager: IPsec reconfiguration transaction was created.
    [I] Nov 15 07:17:13 ndm: IpSec::Configurator: start applying IPsec configuration.
    [I] Nov 15 07:17:13 ndm: IpSec::Configurator: IPsec configuration applying is done.
    [I] Nov 15 07:17:13 ndm: IpSec::Configurator: start reloading IKE keys task.
    [I] Nov 15 07:17:13 ndm: IpSec::Configurator: reloading IKE keys task done.
    [I] Nov 15 07:17:13 ndm: IpSec::Configurator: start reloading IPsec config task.
    [I] Nov 15 07:17:13 ndm: IpSec::IpSecNetfilter: start reloading netfilter configuration...
    [I] Nov 15 07:17:13 ndm: IpSec::IpSecNetfilter: netfilter configuration reloading is done.
    [I] Nov 15 07:17:14 ndm: IpSec::Configurator: reloading IPsec config task done.
    [I] Nov 15 07:17:14 ndm: IpSec::Configurator: "IKE0": crypto map initialized.
    [I] Nov 15 07:17:18 ipsec: 04[IKE] retransmit 4 of request with message ID 0
    [I] Nov 15 07:17:29 ndm: Dns::Manager: deleted record "xxx.keenetic.pro", address 78.47.125.180.
    [I] Nov 15 07:17:29 ndm: Dns::Manager: added static record for "xxx.keenetic.pro", address 78.47.125.180.
    [I] Nov 15 07:17:30 ipsec: 14[IKE] retransmit 5 of request with message ID 0
    [I] Nov 15 07:17:32 ipsec: 14[IKE] integrity check failed
    [I] Nov 15 07:17:32 ipsec: 14[IKE] CREATE_CHILD_SA request with message ID 0 processing failed
    [E] Nov 15 07:17:32 ndm: IpSec::Configurator: IKE message parsing error for crypto map "IKE0".
    [W] Nov 15 07:17:32 ndm: IpSec::Configurator: (possibly because of wrong pre-shared key).
    [I] Nov 15 07:17:32 ndm: IpSec::CryptoMapInfo: "IKE0": crypto map active IKE SA: 0, active CHILD SA: 0.
    [W] Nov 15 07:17:32 ndm: IpSec::Configurator: fallback peer is not defined for crypto map "IKE0", retry.
    [I] Nov 15 07:17:32 ndm: IpSec::Interface::Ike: "IKE0": IPsec layer is down, shutdown.
    [I] Nov 15 07:17:32 ndm: IpSec::Configurator: "IKE0": schedule reconnect for crypto map.
    [I] Nov 15 07:17:32 ndm: Network::Interface::Ip: "IKE0": IP address cleared.
    [I] Nov 15 07:17:32 ndm: IpSec::Manager: "IKE0": IP secure connection and keys was deleted.
    [I] Nov 15 07:17:34 ndm: IpSec::Manager: create IPsec reconfiguration transaction...
    [I] Nov 15 07:17:34 ndm: IpSec::Manager: "VirtualIPServer": crypto map administratively disabled, skipping.
    [I] Nov 15 07:17:34 ndm: IpSec::Manager: add config for crypto map "VPNL2TPServer".
    [I] Nov 15 07:17:34 ndm: IpSec::Manager: IPsec reconfiguration transaction was created.
    [I] Nov 15 07:17:34 ndm: IpSec::Configurator: start applying IPsec configuration.
    [I] Nov 15 07:17:34 ndm: IpSec::Configurator: IPsec configuration applying is done.
    [I] Nov 15 07:17:34 ndm: IpSec::Configurator: start reloading IKE keys task.
    [I] Nov 15 07:17:34 ndm: IpSec::Configurator: reloading IKE keys task done.
    [I] Nov 15 07:17:34 ndm: IpSec::Configurator: start reloading IPsec config task.
    [I] Nov 15 07:17:34 ndm: IpSec::IpSecNetfilter: start reloading netfilter configuration...
    [I] Nov 15 07:17:34 ndm: IpSec::IpSecNetfilter: netfilter configuration reloading is done.
    [I] Nov 15 07:17:35 ndm: IpSec::Configurator: reloading IPsec config task done.
    [I] Nov 15 07:17:35 ndm: IpSec::Configurator: crypto map "IKE0" shutdown started.
    [C] Nov 15 07:17:36 ndm: IpSec::Configurator: system failed [0xcffd00a5].
    [C] Nov 15 07:17:36 ndm: IpSec::Configurator: system failed [0xcffd00aa], code = -1.
    [C] Nov 15 07:17:36 ndm: IpSec::Configurator: system failed [0xcffd00a5].
    [C] Nov 15 07:17:36 ndm: IpSec::Configurator: system failed [0xcffd00aa], code = -1.
    [I] Nov 15 07:17:36 ndm: IpSec::Configurator: crypto map "IKE0" shutdown complete.
    [I] Nov 15 07:17:37 ndm: IpSec::Interface::Ike: "IKE0": secure tunnel is down: retry to resolve remote endpoint.
    [I] Nov 15 07:17:39 ndm: Network::Interface::Tunnel: "IKE0": resolved destination 172.94.23.1 (de1.pointtoserver.com).
    [I] Nov 15 07:17:39 ndm: Network::Interface::Ip: "IKE0": IP address cleared.
    [I] Nov 15 07:17:39 ndm: Network::Interface::Tunnel: "IKE0": resolved source 93.100.188.xxx.
    [I] Nov 15 07:17:40 ndm: Network::Interface::Tunnel: "IKE0": added host route to tunnel destination endpoint 172.94.23.1 via 93.100.176.1.
    [I] Nov 15 07:17:40 ndm: IpSec::Interface::Ike: "IKE0": updating client IP secure configuration.
    [I] Nov 15 07:17:40 ndm: IpSec::Manager: "IKE0": IP secure connection was added.
    [I] Nov 15 07:17:42 ndm: IpSec::Manager: create IPsec reconfiguration transaction...
    [I] Nov 15 07:17:42 ndm: IpSec::Manager: "VirtualIPServer": crypto map administratively disabled, skipping.
    [I] Nov 15 07:17:42 ndm: IpSec::Manager: add config for crypto map "VPNL2TPServer".
    [I] Nov 15 07:17:42 ndm: IpSec::Manager: add config for crypto map "IKE0".
    [I] Nov 15 07:17:42 ndm: IpSec::Manager: IPsec reconfiguration transaction was created.
    [I] Nov 15 07:17:42 ndm: IpSec::Configurator: start applying IPsec configuration.
    [I] Nov 15 07:17:42 ndm: IpSec::Configurator: IPsec configuration applying is done.
    [I] Nov 15 07:17:42 ndm: IpSec::Configurator: start reloading IKE keys task.
    [C] Nov 15 07:17:43 ndm: IpSec::Configurator: system failed [0xcffd00a5].
    [C] Nov 15 07:17:43 ndm: IpSec::Configurator: system failed [0xcffd00aa], code = -1.
    [I] Nov 15 07:17:43 ndm: IpSec::Configurator: reloading IKE keys task done.
    [I] Nov 15 07:17:43 ndm: IpSec::IpSecNetfilter: start reloading netfilter configuration...
    [I] Nov 15 07:17:43 ndm: IpSec::Configurator: start reloading IPsec config task.
    [I] Nov 15 07:17:43 ndm: IpSec::IpSecNetfilter: netfilter configuration reloading is done.
    [I] Nov 15 07:17:43 ipsec: 10[IKE] retransmit 6 of request with message ID 0
    [I] Nov 15 07:17:43 ndm: IpSec::Configurator: reloading IPsec config task done.
    [C] Nov 15 07:17:44 ndm: IpSec::Configurator: system failed [0xcffd00a5].
    [C] Nov 15 07:17:44 ndm: IpSec::Configurator: system failed [0xcffd00aa], code = -1.
    [C] Nov 15 07:17:44 ndm: IpSec::Configurator: "IKE0": system failed [0xcffd05b3].
    [I] Nov 15 07:17:44 ndm: IpSec::Configurator: "IKE0": crypto map initialized.
    [I] Nov 15 07:17:57 ipsec: 09[IKE] retransmit 7 of request with message ID 0
    [I] Nov 15 07:18:13 ipsec: 09[IKE] retransmit 8 of request with message ID 0
    [I] Nov 15 07:18:29 ipsec: 07[IKE] integrity check failed
    [I] Nov 15 07:18:29 ipsec: 07[IKE] CREATE_CHILD_SA request with message ID 0 processing failed
    [E] Nov 15 07:18:29 ndm: IpSec::Configurator: IKE message parsing error for crypto map "IKE0".
    [W] Nov 15 07:18:29 ndm: IpSec::Configurator: (possibly because of wrong pre-shared key).
    [I] Nov 15 07:18:29 ndm: IpSec::CryptoMapInfo: "IKE0": crypto map active IKE SA: 0, active CHILD SA: 0.
    [W] Nov 15 07:18:29 ndm: IpSec::Configurator: fallback peer is not defined for crypto map "IKE0", retry.
    [I] Nov 15 07:18:29 ndm: IpSec::Configurator: "IKE0": schedule reconnect for crypto map.
    [I] Nov 15 07:18:29 ndm: IpSec::Interface::Ike: "IKE0": IPsec layer is down, shutdown.
    [I] Nov 15 07:18:29 ndm: Network::Interface::Ip: "IKE0": IP address cleared.
    [I] Nov 15 07:18:29 ndm: IpSec::Manager: "IKE0": IP secure connection and keys was deleted.
    [I] Nov 15 07:18:30 ipsec: 09[IKE] giving up after 8 retransmits
    [E] Nov 15 07:18:30 ndm: IpSec::Configurator: remote peer of crypto map "IKE0" is down.
    [I] Nov 15 07:18:30 ndm: IpSec::CryptoMapInfo: "IKE0": crypto map active IKE SA: 0, active CHILD SA: 0.
    [W] Nov 15 07:18:30 ndm: IpSec::Configurator: fallback peer is not defined for crypto map "IKE0", retry.
    [I] Nov 15 07:18:30 ndm: IpSec::Interface::Ike: "IKE0": IPsec layer is down, shutdown.
    [I] Nov 15 07:18:30 ndm: IpSec::Configurator: "IKE0": schedule reconnect for crypto map.
    [I] Nov 15 07:18:30 ndm: Network::Interface::Ip: "IKE0": IP address cleared.
    [I] Nov 15 07:18:30 ipsec: 09[IKE] installing new virtual IP 178.170.146.95
    [I] Nov 15 07:18:30 ipsec: 09[IKE] restarting CHILD_SA IKE0
    [I] Nov 15 07:18:30 ipsec: 09[IKE] initiating IKE_SA IKE0[16] to 178.170.146.1
    [I] Nov 15 07:18:30 ndm: IpSec::CryptoMapInfo: "IKE0": crypto map active IKE SA: 0, active CHILD SA: 0.
    [I] Nov 15 07:18:30 ndm: IpSec::CryptoMapInfo: "IKE0": crypto map active IKE SA: 0, active CHILD SA: 0.
    [I] Nov 15 07:18:30 ipsec: 04[CFG] received stroke: delete connection 'VPNL2TPServer'
    [I] Nov 15 07:18:30 ipsec: 14[IKE] received MS NT5 ISAKMPOAKLEY v9 vendor ID
    [I] Nov 15 07:18:30 ipsec: 14[IKE] received MS-Negotiation Discovery Capable vendor ID
    [I] Nov 15 07:18:30 ipsec: 11[CFG] rereading secrets
    [I] Nov 15 07:18:30 ipsec: 10[CFG] received stroke: initiate 'IKE0'
    [I] Nov 15 07:18:30 ipsec: 15[CFG] rereading secrets
    [I] Nov 15 07:18:30 ipsec: 04[CFG] deleted connection 'VPNL2TPServer'
    [I] Nov 15 07:18:30 ipsec: 15[CFG] loading secrets
    [I] Nov 15 07:18:30 ipsec: 15[CFG] loaded IKE secret for %any
    [I] Nov 15 07:18:30 ipsec: 15[CFG] loaded IKE secret for @mykeenetic.net
    [I] Nov 15 07:18:30 ipsec: 15[CFG] loaded EAP secret for purevpn0sxxxxxx
    [I] Nov 15 07:18:30 ipsec: 15[CFG] loaded NTLM secret for xxxxxx
    [I] Nov 15 07:18:30 ipsec: 15[CFG] rereading ca certificates from '/tmp/ipsec/ipsec.d/cacerts'
    [I] Nov 15 07:18:30 ipsec: 11[CFG] loading secrets
    [I] Nov 15 07:18:30 ipsec: 00[DMN] signal of type SIGHUP received. Reloading configuration
    [I] Nov 15 07:18:30 ipsec: 11[CFG] loaded IKE secret for %any
    [I] Nov 15 07:18:30 ipsec: 14[CFG] received proposals: IKE:3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024
    [I] Nov 15 07:18:30 ipsec: 11[CFG] loaded IKE secret for @mykeenetic.net
    [I] Nov 15 07:18:30 ipsec: 11[CFG] loaded EAP secret for purevpn0sxxxxxx
    [I] Nov 15 07:18:30 ipsec: 11[CFG] loaded NTLM secret for xxxxxx
    [I] Nov 15 07:18:30 ipsec: 10[CFG] no config named 'IKE0'
    [I] Nov 15 07:18:30 ipsec: 11[CFG] rereading ca certificates from '/tmp/ipsec/ipsec.d/cacerts'
    [I] Nov 15 07:18:30 ipsec: 12[CFG] received stroke: terminate 'IKE0{*}'
    [I] Nov 15 07:18:30 ipsec: 13[CFG] received stroke: unroute 'IKE0'
    [I] Nov 15 07:18:30 ipsec: 08[CFG] received stroke: terminate 'IKE0[*]'
    [I] Nov 15 07:18:30 ipsec: 14[CFG] configured proposals: IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:3DES_CBC/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/ECP_384, IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_2048, IKE:AES_CBC=128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC=128/HMAC_SHA1_96/PRF_HMAC_SHA1/ECP_256, IKE:3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_2048, IKE:3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1536, IKE:3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024
    [I] Nov 15 07:18:30 ipsec: 14[CFG] selected proposal: IKE:3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024
    [I] Nov 15 07:18:30 ipsec: 00[CFG] loaded 0 entries for attr plugin configuration
    [I] Nov 15 07:18:30 ipsec: 00[CFG] loaded 1 RADIUS server configuration
    [I] Nov 15 07:18:30 ndm: IpSec::CryptoMapInfo: "IKE0": crypto map active IKE SA: 0, active CHILD SA: 0.
    [I] Nov 15 07:18:30 ndm: IpSec::IpSecNetfilter: start reloading netfilter configuration...
    [I] Nov 15 07:18:30 ndm: IpSec::IpSecNetfilter: netfilter configuration reloading is done.
    [I] Nov 15 07:18:30 ndm: IpSec::CryptoMapInfo: "IKE0": crypto map active IKE SA: 0, active CHILD SA: 0.
    [I] Nov 15 07:18:30 ipsec: 14[IKE] faking NAT situation to enforce UDP encapsulation
    [I] Nov 15 07:18:30 ipsec: 14[CFG] no IDi configured, fall back on IP address
    [I] Nov 15 07:18:30 ipsec: 14[IKE] establishing CHILD_SA IKE0{13} reqid 9
    [I] Nov 15 07:18:30 ipsec: 12[CFG] no CHILD_SA named 'IKE0' found
    [I] Nov 15 07:18:30 ipsec: 13[IKE] destroying IKE_SA in state CONNECTING without notification
    [I] Nov 15 07:18:30 ipsec: 07[CFG] rereading secrets
    [I] Nov 15 07:18:30 ipsec: 07[CFG] loading secrets
    [I] Nov 15 07:18:30 ipsec: 07[CFG] loaded IKE secret for %any
    [I] Nov 15 07:18:30 ipsec: 07[CFG] loaded IKE secret for @mykeenetic.net
    [I] Nov 15 07:18:30 ipsec: 07[CFG] loaded EAP secret for purevpn0sxxxxxx
    [I] Nov 15 07:18:30 ipsec: 07[CFG] loaded NTLM secret for xxx
    [I] Nov 15 07:18:30 ipsec: 07[CFG] rereading ca certificates from '/tmp/ipsec/ipsec.d/cacerts'
    [I] Nov 15 07:18:30 ipsec: 04[CFG] received stroke: initiate 'IKE0'
    [I] Nov 15 07:18:30 ipsec: 04[CFG] no config named 'IKE0'
    [I] Nov 15 07:18:30 ipsec: 09[CFG] rereading secrets
    [I] Nov 15 07:18:30 ipsec: 09[CFG] loading secrets
    [I] Nov 15 07:18:30 ipsec: 09[CFG] loaded IKE secret for %any
    [I] Nov 15 07:18:30 ipsec: 09[CFG] loaded IKE secret for @mykeenetic.net
    [I] Nov 15 07:18:30 ipsec: 09[CFG] loaded EAP secret for purevpn0sxxxxxx
    [I] Nov 15 07:18:30 ipsec: 09[CFG] loaded NTLM secret for xxxxxx
    [I] Nov 15 07:18:30 ipsec: 09[CFG] rereading ca certificates from '/tmp/ipsec/ipsec.d/cacerts'
    [I] Nov 15 07:18:31 ndm: IpSec::Manager: create IPsec reconfiguration transaction...
    [I] Nov 15 07:18:31 ndm: IpSec::Manager: "VirtualIPServer": crypto map administratively disabled, skipping.
    [I] Nov 15 07:18:31 ndm: IpSec::Manager: add config for crypto map "VPNL2TPServer".
    [I] Nov 15 07:18:31 ndm: IpSec::Manager: IPsec reconfiguration transaction was created.
    [I] Nov 15 07:18:31 ndm: IpSec::Configurator: start applying IPsec configuration.
    [I] Nov 15 07:18:31 ndm: IpSec::Configurator: IPsec configuration applying is done.
    [I] Nov 15 07:18:31 ndm: IpSec::Configurator: start reloading IKE keys task.
    [I] Nov 15 07:18:31 ndm: IpSec::Configurator: reloading IKE keys task done.
    [I] Nov 15 07:18:31 ndm: IpSec::Configurator: start reloading IPsec config task.
    [I] Nov 15 07:18:32 ndm: IpSec::IpSecNetfilter: start reloading netfilter configuration...
    [I] Nov 15 07:18:32 ndm: IpSec::IpSecNetfilter: netfilter configuration reloading is done.
    [I] Nov 15 07:18:32 ndm: IpSec::Configurator: reloading IPsec config task done.
    [I] Nov 15 07:18:32 ndm: IpSec::Configurator: crypto map "IKE0" shutdown started.
    [I] Nov 15 07:18:32 ndm: IpSec::Configurator: crypto map "IKE0" shutdown complete.
    [I] Nov 15 07:18:33 ipsec: 15[CFG] rereading aa certificates from '/tmp/ipsec/ipsec.d/aacerts'
    [I] Nov 15 07:18:33 ipsec: 15[CFG] rereading ocsp signer certificates from '/tmp/ipsec/ipsec.d/ocspcerts'
    [I] Nov 15 07:18:33 ipsec: 15[CFG] rereading attribute certificates from '/tmp/ipsec/ipsec.d/acerts'
    [I] Nov 15 07:18:33 ipsec: 15[CFG] rereading crls from '/tmp/ipsec/ipsec.d/crls'
    [I] Nov 15 07:18:33 ipsec: 08[CFG] received stroke: unroute 'IKE0'
    [I] Nov 15 07:18:33 ipsec: 04[CFG] received stroke: add connection 'VPNL2TPServer'
    [I] Nov 15 07:18:33 ipsec: 04[CFG] added configuration 'VPNL2TPServer'
    [I] Nov 15 07:18:33 ipsec: 03[CFG] rereading secrets
    [I] Nov 15 07:18:33 ipsec: 03[CFG] loading secrets
    [I] Nov 15 07:18:33 ipsec: 03[CFG] loaded IKE secret for %any
    [I] Nov 15 07:18:33 ipsec: 03[CFG] loaded IKE secret for @mykeenetic.net
    [I] Nov 15 07:18:33 ipsec: 03[CFG] loaded NTLM secret for xxxxxx
    [I] Nov 15 07:18:33 ipsec: 03[CFG] rereading ca certificates from '/tmp/ipsec/ipsec.d/cacerts'
    [I] Nov 15 07:18:33 ipsec: 11[CFG] rereading aa certificates from '/tmp/ipsec/ipsec.d/aacerts'
    [I] Nov 15 07:18:33 ipsec: 11[CFG] rereading ocsp signer certificates from '/tmp/ipsec/ipsec.d/ocspcerts'
    [I] Nov 15 07:18:33 ipsec: 11[CFG] rereading attribute certificates from '/tmp/ipsec/ipsec.d/acerts'
    [I] Nov 15 07:18:33 ipsec: 11[CFG] rereading crls from '/tmp/ipsec/ipsec.d/crls'
    [I] Nov 15 07:18:33 ipsec: 13[CFG] received stroke: unroute 'IKE0'
    [I] Nov 15 07:18:33 ipsec: 06[CFG] received stroke: terminate 'IKE0{*}'
    [I] Nov 15 07:18:33 ipsec: 06[CFG] no CHILD_SA named 'IKE0' found
    [I] Nov 15 07:18:33 ipsec: 08[CFG] received stroke: terminate 'IKE0[*]'
    [I] Nov 15 07:18:33 ipsec: 08[CFG] no IKE_SA named 'IKE0' found
    [I] Nov 15 07:18:33 ipsec: 04[CFG] received stroke: add connection 'IKE0'
    [I] Nov 15 07:18:33 ipsec: 04[CFG] added configuration 'IKE0'
    [I] Nov 15 07:18:33 ipsec: 12[CFG] received stroke: delete connection 'VPNL2TPServer'
    [I] Nov 15 07:18:33 ipsec: 12[CFG] deleted connection 'VPNL2TPServer'
    [I] Nov 15 07:18:33 ipsec: 15[CFG] received stroke: delete connection 'IKE0'
    [I] Nov 15 07:18:33 ipsec: 15[CFG] deleted connection 'IKE0'
    [I] Nov 15 07:18:33 ipsec: 00[DMN] signal of type SIGHUP received. Reloading configuration
    [I] Nov 15 07:18:33 ipsec: 10[CFG] received stroke: add connection 'VPNL2TPServer'
    [I] Nov 15 07:18:33 ipsec: 10[CFG] added configuration 'VPNL2TPServer'
    [I] Nov 15 07:18:33 ipsec: 00[CFG] loaded 0 entries for attr plugin configuration
    [I] Nov 15 07:18:33 ipsec: 00[CFG] loaded 1 RADIUS server configuration
    [I] Nov 15 07:18:33 ipsec: 09[CFG] rereading aa certificates from '/tmp/ipsec/ipsec.d/aacerts'
    [I] Nov 15 07:18:33 ipsec: 09[CFG] rereading ocsp signer certificates from '/tmp/ipsec/ipsec.d/ocspcerts'
    [I] Nov 15 07:18:33 ipsec: 09[CFG] rereading attribute certificates from '/tmp/ipsec/ipsec.d/acerts'
    [I] Nov 15 07:18:33 ipsec: 09[CFG] rereading crls from '/tmp/ipsec/ipsec.d/crls'
    [I] Nov 15 07:18:33 ipsec: 07[CFG] rereading aa certificates from '/tmp/ipsec/ipsec.d/aacerts'
    [I] Nov 15 07:18:33 ipsec: 07[CFG] rereading ocsp signer certificates from '/tmp/ipsec/ipsec.d/ocspcerts'
    [I] Nov 15 07:18:33 ipsec: 07[CFG] rereading attribute certificates from '/tmp/ipsec/ipsec.d/acerts'
    [I] Nov 15 07:18:33 ipsec: 07[CFG] rereading crls from '/tmp/ipsec/ipsec.d/crls'
    [I] Nov 15 07:18:34 ndm: IpSec::Interface::Ike: "IKE0": secure tunnel is down: retry to resolve remote endpoint.
    [I] Nov 15 07:18:35 ipsec: 03[CFG] rereading aa certificates from '/tmp/ipsec/ipsec.d/aacerts'
    [I] Nov 15 07:18:35 ipsec: 03[CFG] rereading ocsp signer certificates from '/tmp/ipsec/ipsec.d/ocspcerts'
    [I] Nov 15 07:18:35 ipsec: 03[CFG] rereading attribute certificates from '/tmp/ipsec/ipsec.d/acerts'
    [I] Nov 15 07:18:35 ipsec: 03[CFG] rereading crls from '/tmp/ipsec/ipsec.d/crls'
    [I] Nov 15 07:18:36 ndm: Network::Interface::Tunnel: "IKE0": resolved destination 172.94.13.1 (de1.pointtoserver.com).
    [I] Nov 15 07:18:36 ndm: Network::Interface::Ip: "IKE0": IP address cleared.
    [I] Nov 15 07:18:36 ndm: Network::Interface::Tunnel: "IKE0": resolved source 93.100.188.xxx.
    [I] Nov 15 07:18:36 ndm: Network::Interface::Tunnel: "IKE0": added host route to tunnel destination endpoint 172.94.13.1 via 93.100.176.1.
    [I] Nov 15 07:18:36 ndm: IpSec::Manager: "IKE0": IP secure connection was added.
    [I] Nov 15 07:18:36 ndm: IpSec::Interface::Ike: "IKE0": updating client IP secure configuration.
    [I] Nov 15 07:18:38 ndm: IpSec::Manager: create IPsec reconfiguration transaction...
    [I] Nov 15 07:18:38 ndm: IpSec::Manager: "VirtualIPServer": crypto map administratively disabled, skipping.
    [I] Nov 15 07:18:38 ndm: IpSec::Manager: add config for crypto map "VPNL2TPServer".
    [I] Nov 15 07:18:38 ndm: IpSec::Manager: add config for crypto map "IKE0".
    [I] Nov 15 07:18:38 ndm: IpSec::Manager: IPsec reconfiguration transaction was created.
    [I] Nov 15 07:18:38 ndm: IpSec::Configurator: start applying IPsec configuration. xxxxxx

     

    Селфтест с этими событиями приложен сообщением ниже. Это можно как-то починить с моей стороны? Роутер Ultra II, прошивка 3.5.2.

    PS Есть заявка в техподдержке 517114

  10. После перехода на 3.4 перестала работать ext3 флешка в модеме ZTE MF825 (перепрошитый МТС 830FT), устройство определяется и видится все, что было записано раньше, но записать ничего невозможно, даже после переформатирования на компьютере. Внешний жесткий диск, также отформатированный в ext3 и подключенный рядом, работает нормально.

  11. Любая попытка посмотреть IP телевидение используя udpxy server при подключении к роутеру через соединение с L2TP/IPsec сервером приводит к перезагрузке роутера с диагностикой в лог при старте: "ndm: kernel: SoC power status: Watchdog reset occured". При использовании PPTP сервера такого не наблюдается. Лог роутера по понятным причинам недоступен, но на внешний syslog server он успевает отослать примерно следующее:

    Spoiler
    
    15.01.2018 13:33:00.895	Info	l2tp2:********: session started over l2tp session 64652-3, 26592-1
    15.01.2018 13:33:00.914	Warning	IpSec::Configurator: ""VPNL2TPServer"": L2TP/IPsec client ""********"" connected with address ""172.16.2.33"" (from ""84.204.*.*"").
    15.01.2018 13:33:00.967	Info	sending INFORM to 00:00:00:00:00:00.
    15.01.2018 13:33:00.967	Info	DHCPINFORM received for 172.16.2.33 from 00:00:00:00:00:00.
    15.01.2018 13:33:58.223	Notice	Echo Reply received.
    15.01.2018 13:34:44.497	Notice	Added client: pid=[962], maddr=[239.239.1.64],mport=[5239], saddr=[172.16.2.33], sport=[45323]
    15.01.2018 13:35:55.876	Debug	Core::Syslog: last message repeated 27 times.
    15.01.2018 13:35:55.923	Debug	Core::Syslog: last message repeated 28 times.
    15.01.2018 13:35:55.970	Debug	Core::Syslog: last message repeated 29 times.
    15.01.2018 13:35:55.986	Debug	Core::Syslog: last message repeated 30 times.
    15.01.2018 13:35:56.516	Debug	Core::Syslog: last message repeated 38 times.
    15.01.2018 13:35:56.610	Warning	kernel: net_ratelimit: 12 callbacks suppressed
    15.01.2018 13:35:56.734	Debug	Discarded non-LCP packet when LCP not open
    15.01.2018 13:35:56.781	Debug	Discarded non-LCP packet when LCP not open
    15.01.2018 13:35:56.797	Debug	Core::Syslog: last message repeated 3 times.
    15.01.2018 13:35:56.812	Debug	Core::Syslog: last message repeated 4 times.
    15.01.2018 13:35:56.844	Debug	Core::Syslog: last message repeated 5 times.
    15.01.2018 13:35:56.859	Debug	Core::Syslog: last message repeated 6 times.
    15.01.2018 13:35:56.890	Debug	Core::Syslog: last message repeated 7 times.
    [...]
    15.01.2018 13:35:57.780	Debug	Discarded non-LCP packet when LCP not open
    15.01.2018 13:35:57.951	Debug	Core::Syslog: last message repeated 9 times.															
    

     

    И так далее с вариациями, потом начинают уже идти строки лога инициализации роутера. Селфтест и конфиг постом ниже. Роутер Ultra II, прошивка 2.11.B.0.0-0

    • Thanks 1
  12. On 12/12/2017 at 2:47 PM, 4e.Guevara said:

    Обновился на 2.10.C.0.0-4 (Keenetic Giga II) и начались проблемы с доступом к HDD, подключенным в USB роутера. С внутренней сетки еще кое-как захожу на винт, и даже скорость обмена данными около 30 Мб/с (поднят гиг), только вот через несколько секунд наблюдается отвал, переподключение и опять нормальная скорость.

    Подтверждаю, на Ultra II похожая ситуация, последний раз наблюдал при копировании ночью с 14.12 на 15.12, только отвал происходит через случайный промежуток времени, а скорость копирования по сети 55-60 Мб/c. В логах ничего нет, селфтест прилагаю сообщением ниже.

  13. 4 hours ago, Le ecureuil said:

    У вас стоит опция

    
    interface PPTP0
        ipcp name-servers

    Потому вы получаете DNS от удаленной стороны, это она вам их присылает.

    Спасибо, слона-то я как раз не заметил. :D

  14. Перешел с глобальных DNS 8.8.8.8 и 8.8.4.4 на 80.80.80.80 и 80.80.81.81. Несмотря на отсутствие в конфиге гугловских DNS, при соединении по PPTP, они упоминаются в логе, хотя в свойствах установлены DNS 209.222.18.*, а глобально  80.80.*.* Роутер перезагружал. Упоминания про гуглоDNS в настройках отсутствуют, поэтому теряюсь в догадках, врядли их отдает VPN провайдер в настройках соединения, когда у него есть свои собственные 209.222.18.* Селфтест постом ниже, прошивка 2.09.C.0.0-5

    Spoiler
    
    Sep 04 12:41:29 pppd_PPTP0 local IP address 10.1.1.10
    Sep 04 12:41:29 pppd_PPTP0 remote IP address 10.1.1.1
    Sep 04 12:41:29 pppd_PPTP0 primary DNS address 8.8.8.8
    Sep 04 12:41:29 pppd_PPTP0 secondary DNS address 8.8.4.4
    

     

     

  15. 9 hours ago, ndm said:

    Не понял, конечно. 1) Роутер и так прекрасно видится 2) Но нужна функция мастер-браузера. (зачем-то)

    Менеджерам нужна формулировка. User Story. Без этого нет понимания проблемы.

    Из того, что пока мы сами видели – открываешь сетевое окружение Windows 10, нажимаешь на кинетик, и он не открывается. Не открывается, потому что нет ответа на multicast DNS. Решение = делаем ответ на multicast DNS. Но это не Master Browser.

    Писали же уже про это не один раз. Функция мастер браузера на роутере нужна из-за того, что это - самое редко отключаемое устройство, кому, как не ему вести список NetBIOS устройств домашней сети, где, как правило, отсутствуют круглосуточно работающие сервера. Типичная проблема в домашней сети - после выключения компьютера, который был мастером, список устройств в локальной сети еще достаточно долгое время выводится либо непозволительно долго, либо не выводится вообще. Да, конечно, NetBIOS и все, что с ним связано - вещь устаревшая, но во вкладке "сеть" используется, и без стабильно работающего master browser'а часто глючит. Проблема с Windows 10 - совсем другая история, к топику отношения не имеющая.

    • Upvote 6
  16. 1 hour ago, ndm said:

    Предвидится в 2.11. Мы её отложили в тот момент, когда стало понятно, что просят "Master Browser", а нужно другое. Нужно, чтобы кинетик был виден в сетевом окружении и открывался по имени в винде. Для этого нужно, чтобы он откликался на LLMNR.

    (@iggo Давайте еще разок. Вы об этом вспомнили, когда в очередной раз столкнулись с.. чем?)

    Уважаемый @ndm, боюсь, что Вы поняли неправильно. Нужна именно функция Master Browser'а. В сетевом окружении роутер и так прекрасно видится по имени, есть же настройка соответствующая в #usb.cifs. 2.09.C.0.0-5:

     

    image.png.a8ad9bcc8e28d89cf3815903040577a4.png

  17. После обновления прошивки уже два раза столкнулся с завианием роутера с одинаковыми симптомами. При полном отсутствии каких-либо предварительных сообщений роутер внезапно зависает, при этом syslog серверу он успевает отправить вот такое:

    Spoiler
    
    18.06.2017 10:50,Info,192.168.1.1,PingCheck::Profile: interface ISP connection check failed.
    18.06.2017 10:50,Error,192.168.1.1,Opkg::Manager: /opt/etc/ndm/wan.d/port.sh: timed out.
    18.06.2017 10:50,Error,192.168.1.1,kernel: INFO: rcu_sched self-detected stall on CPU { 0}  (t=15000 jiffies)
    18.06.2017 10:50,Warning,192.168.1.1,kernel: Call Trace:
    18.06.2017 10:50,Warning,192.168.1.1,kernel: [<802d9060>] dump_stack+0x8/0x34
    18.06.2017 10:50,Warning,192.168.1.1,kernel: [<8007af9c>] __rcu_pending+0x1e0/0x544
    18.06.2017 10:50,Warning,192.168.1.1,kernel: [<8007be44>] rcu_check_callbacks+0x78/0x180
    18.06.2017 10:50,Warning,192.168.1.1,kernel: [<80035b40>] update_process_times+0x48/0x74
    18.06.2017 10:50,Warning,192.168.1.1,kernel: [<80067a6c>] tick_sched_timer+0x7c/0x34c
    18.06.2017 10:50,Warning,192.168.1.1,kernel: [<8004c308>] __run_hrtimer.isra.5+0x68/0x138
    18.06.2017 10:50,Warning,192.168.1.1,kernel: [<8004cdc4>] hrtimer_interrupt+0x1b4/0x4dc
    18.06.2017 10:50,Warning,192.168.1.1,kernel: [<800119f0>] c0_compare_interrupt+0x64/0x90
    18.06.2017 10:50,Warning,192.168.1.1,kernel: [<800742ac>] handle_irq_event_percpu+0x70/0x1fc
    18.06.2017 10:50,Warning,192.168.1.1,kernel: [<80077eec>] handle_percpu_irq+0x8c/0xbc
    18.06.2017 10:50,Warning,192.168.1.1,kernel: [<80073908>] generic_handle_irq+0x3c/0x54
    18.06.2017 10:50,Warning,192.168.1.1,kernel: [<8000cb4c>] do_IRQ+0x18/0x2c
    18.06.2017 10:50,Warning,192.168.1.1,kernel: [<8000af70>] ret_from_irq+0x0/0x4
    18.06.2017 10:50,Warning,192.168.1.1,kernel: [<802dd364>] _raw_read_unlock_bh+0xb4/0xd0
    18.06.2017 10:50,Warning,192.168.1.1,kernel: 
    18.06.2017 10:50,Notice,192.168.1.1,closing control connection due to missing echo reply
    18.06.2017 10:50,Notice,192.168.1.1,Sent control packet type is 12 'Call-Clear-Request' 
    18.06.2017 10:50,Notice,192.168.1.1,Closing PPTP connection
    18.06.2017 10:50,Notice,192.168.1.1,Sent control packet type is 3 'Stop-Control-Connection-Request' 
    18.06.2017 10:50,Notice,192.168.1.1,Closing connection (call state)
    18.06.2017 10:51,Error,192.168.1.1,kernel: INFO: rcu_bh detected stalls on CPUs/tasks: { 0} (detected by 1, t=15004 jiffies)
    18.06.2017 10:51,Error,192.168.1.1,kernel: INFO: Stall ended before state dump start
    

     

    После чего остается только делать reset. Call trace каждый раз один и тот же. Селфтест по понятным причинам привести не могу, конфиг в скрытом сообщении ниже.

    • Thanks 1
  18. 1 hour ago, Le ecureuil said:

    Изначальный план у нас на встраивание CA/PEM внутрь конфига. Пока встраивание нужно делать руками, возможно потом это станет делать web, но суть все равно едина.

    То есть сейчас PEM уже поддерживается? Какой для него нужно ставить тег, <pem></pem>? auth-user-pass, как я понял, пока не поддерживается?

  19. Подтверждаю, тоже наблюдал такое на 2.09.A.7.0-0. Поскольку логов с причиной не сохранилось, т.к. перезагрузки заметил только по Uptime, то тему не открывал. Откатился на 2.09.A.6.0-2 - там самопроизвольных перезагрузок не наблюдаю и не наблюдал раньше. Электричество точно не отключалось.

  20. 15 minutes ago, AndreBA said:

    На GIGA III и EXTRA II, все работает. Ничего не поломалось.

    Проверил у себя с внешних адресов на Ultra II 2.09.A.7.0-0 - облачный лоступ через KeenDNS и через приложение My.Keenetic работает.

  21. Периодически вижу, что при выводе сообщений transmission в лог сбивается форматирование. Его сообщения начинают выводиться вот в таком виде:

    Transmission1.png.32eaf90e8245a475e72afa4a389f608a.png

    Дальнейшее наблюдение показало, что подобным образом искажаются все сообщения, длина имени источника которых достаточно большая:

    Transmission3.png.c4cbc0ff75cffcc31dcd73f9398800c8.png

    Переход по разным пунктам настройки, заход на IP роутера или имя, насколько я заметил, не помогают исправить ситуацию. Проблема появляется, когда справа появляется полоска скроллинга, если очистить лог, то форматирование восстанавливается до ее появления:

    Transmission2.png.4f63eed45e9b6a7305239c3792de1641.png

    Наблюдал на прошиках 2.09.A.6.0-0 и 2.09.A.6.0-1 в браузерах Firefox, Chrome и IE. Поправьте, пожалуйста.

  22. 12 minutes ago, Le ecureuil said:

    Нет идей. Может быть все, что угодно.

    Это случается чаще под нагрузкой, или и в простое с такой же частотой?

    Жаль :( От нагрузки, по моим наблюдениям, не зависит, к тому же через этот интерфейс работает transmission, долгий простой исключен. Если включить debug на этом интерфейсе, это может как-то прояснить картину?

×
×
  • Create New...