Log

You might also like

Download as txt, pdf, or txt
Download as txt, pdf, or txt
You are on page 1of 104

[I] Jan 1 00:00:04 kernel: Linux version 4.9-ndm-5 (developers@keenetic.

com) (gcc
version 11.3.0 (crosstool-NG 1.24.0-rc2-ndm-27-0 - NDMS Toolkit 1.0.0) ) #0 SMP Tue
May 2 16:33:23 2023
[I] Jan 1 00:00:04 kernel: MediaTek SoC: MT7621A, RevID: 0103, RAM: DDR3, XTAL:
40MHz
[I] Jan 1 00:00:04 kernel: CPU/OCP/SYS frequency: 880/293/220 MHz
[I] Jan 1 00:00:04 kernel: SoC power status: power-on reset
[I] Jan 1 00:00:04 kernel: bootconsole [early0] enabled
[I] Jan 1 00:00:04 kernel: CPU0 revision is: 0001992f (MIPS 1004Kc)
[I] Jan 1 00:00:04 kernel: Determined physical RAM map:
[I] Jan 1 00:00:04 kernel: memory: 08000000 @ 00000000 (usable)
[I] Jan 1 00:00:04 kernel: VPE topology {2,2} total 4
[I] Jan 1 00:00:04 kernel: Primary instruction cache 32kB, VIPT, 4-way, linesize
32 bytes.
[I] Jan 1 00:00:04 kernel: Primary data cache 32kB, 4-way, PIPT, no aliases,
linesize 32 bytes
[I] Jan 1 00:00:04 kernel: MIPS secondary cache 256kB, 8-way, linesize 32 bytes.
[I] Jan 1 00:00:04 kernel: Zone ranges:
[I] Jan 1 00:00:04 kernel: DMA [mem 0x0000000000000000-0x0000000000ffffff]
[I] Jan 1 00:00:04 kernel: Normal [mem 0x0000000001000000-0x0000000007ffffff]
[I] Jan 1 00:00:04 kernel: Movable zone start for each node
[I] Jan 1 00:00:04 kernel: Early memory node ranges
[I] Jan 1 00:00:04 kernel: node 0: [mem 0x0000000000000000-0x0000000007ffffff]
[I] Jan 1 00:00:04 kernel: Initmem setup node 0 [mem 0x0000000000000000-
0x0000000007ffffff]
[I] Jan 1 00:00:04 kernel: On node 0 totalpages: 32768
[I] Jan 1 00:00:04 kernel: free_area_init_node: node 0, pgdat 814d9660,
node_mem_map 81528000
[I] Jan 1 00:00:04 kernel: DMA zone: 32 pages used for memmap
[I] Jan 1 00:00:04 kernel: DMA zone: 0 pages reserved
[I] Jan 1 00:00:04 kernel: DMA zone: 4096 pages, LIFO batch:0
[I] Jan 1 00:00:04 kernel: Normal zone: 224 pages used for memmap
[I] Jan 1 00:00:04 kernel: Normal zone: 28672 pages, LIFO batch:7
[I] Jan 1 00:00:04 kernel: percpu: Embedded 12 pages/cpu s18448 r8192 d22512
u49152
[I] Jan 1 00:00:04 kernel: pcpu-alloc: s18448 r8192 d22512 u49152 alloc=12*4096
[I] Jan 1 00:00:04 kernel: pcpu-alloc: [0] 0 [0] 1 [0] 2 [0] 3
[I] Jan 1 00:00:04 kernel: Built 1 zonelists in Zone order, mobility grouping on.
Total pages: 32512
[I] Jan 1 00:00:04 kernel: Kernel command line: console=ttyS0,57600n8
[I] Jan 1 00:00:04 kernel: log_buf_len individual max cpu contribution: 4096 bytes
[I] Jan 1 00:00:04 kernel: log_buf_len total cpu_extra contributions: 12288 bytes
[I] Jan 1 00:00:04 kernel: log_buf_len min size: 16384 bytes
[I] Jan 1 00:00:04 kernel: log_buf_len: 32768 bytes
[I] Jan 1 00:00:04 kernel: early log buf free: 14144(86%)
[I] Jan 1 00:00:04 kernel: PID hash table entries: 512 (order: -1, 2048 bytes)
[I] Jan 1 00:00:04 kernel: Dentry cache hash table entries: 16384 (order: 4, 65536
bytes)
[I] Jan 1 00:00:04 kernel: Inode-cache hash table entries: 8192 (order: 3, 32768
bytes)
[I] Jan 1 00:00:04 kernel: Writing ErrCtl register=00005008
[I] Jan 1 00:00:04 kernel: Readback ErrCtl register=00005008
[I] Jan 1 00:00:04 kernel: Memory: 124408K/131072K available (3940K kernel code,
323K rwdata, 692K rodata, 216K init, 91K bss, 6664K reserved, 0K cma-reserved)
[I] Jan 1 00:00:04 kernel: Hierarchical RCU implementation.
[I] Jan 1 00:00:04 kernel: Build-time adjustment of leaf fanout to 32.
[I] Jan 1 00:00:04 kernel: NR_IRQS:79
[I] Jan 1 00:00:04 kernel: MIPS GIC RevID: 3.0
[I] Jan 1 00:00:04 kernel: clocksource: MIPS: mask: 0xffffffff max_cycles:
0xffffffff, max_idle_ns: 4343773742 ns
[I] Jan 1 00:00:04 kernel: sched_clock: 32 bits at 440MHz, resolution 2ns, wraps
every 4880645118ns
[I] Jan 1 00:00:04 kernel: console [ttyS0] enabled
[I] Jan 1 00:00:04 kernel: bootconsole [early0] disabled
[I] Jan 1 00:00:04 kernel: Calibrating delay loop... 583.68 BogoMIPS (lpj=1167360)
[I] Jan 1 00:00:04 kernel: pid_max: default: 32768 minimum: 301
[I] Jan 1 00:00:04 kernel: Mount-cache hash table entries: 1024 (order: 0, 4096
bytes)
[I] Jan 1 00:00:04 kernel: Mountpoint-cache hash table entries: 1024 (order: 0,
4096 bytes)
[I] Jan 1 00:00:04 kernel: Primary instruction cache 32kB, VIPT, 4-way, linesize
32 bytes.
[I] Jan 1 00:00:04 kernel: Primary data cache 32kB, 4-way, PIPT, no aliases,
linesize 32 bytes
[I] Jan 1 00:00:04 kernel: MIPS secondary cache 256kB, 8-way, linesize 32 bytes.
[I] Jan 1 00:00:04 kernel: CPU1 revision is: 0001992f (MIPS 1004Kc)
[I] Jan 1 00:00:04 kernel: Synchronize counters for CPU 1: done.
[I] Jan 1 00:00:04 kernel: Primary instruction cache 32kB, VIPT, 4-way, linesize
32 bytes.
[I] Jan 1 00:00:04 kernel: Primary data cache 32kB, 4-way, PIPT, no aliases,
linesize 32 bytes
[I] Jan 1 00:00:04 kernel: MIPS secondary cache 256kB, 8-way, linesize 32 bytes.
[I] Jan 1 00:00:04 kernel: CPU2 revision is: 0001992f (MIPS 1004Kc)
[I] Jan 1 00:00:04 kernel: Synchronize counters for CPU 2: done.
[I] Jan 1 00:00:04 kernel: Primary instruction cache 32kB, VIPT, 4-way, linesize
32 bytes.
[I] Jan 1 00:00:04 kernel: Primary data cache 32kB, 4-way, PIPT, no aliases,
linesize 32 bytes
[I] Jan 1 00:00:04 kernel: MIPS secondary cache 256kB, 8-way, linesize 32 bytes.
[I] Jan 1 00:00:04 kernel: CPU3 revision is: 0001992f (MIPS 1004Kc)
[I] Jan 1 00:00:04 kernel: Synchronize counters for CPU 3: done.
[I] Jan 1 00:00:04 kernel: Brought up 4 CPUs
[I] Jan 1 00:00:04 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles:
0xffffffff, max_idle_ns: 7645041785100000 ns
[I] Jan 1 00:00:04 kernel: futex hash table entries: 1024 (order: 3, 32768 bytes)
[I] Jan 1 00:00:04 kernel: NET: Registered protocol family 16
[I] Jan 1 00:00:04 kernel: PCI host bridge to bus 0000:00
[I] Jan 1 00:00:04 kernel: pci_bus 0000:00: root bus resource [mem 0x60000000-
0x6fffffff]
[I] Jan 1 00:00:04 kernel: pci_bus 0000:00: root bus resource [io 0x1e160000-
0x1e16ffff]
[I] Jan 1 00:00:04 kernel: pci_bus 0000:00: root bus resource [??? 0x00000000
flags 0x0]
[I] Jan 1 00:00:04 kernel: pci_bus 0000:00: No busn resource found for root bus,
will use [bus 00-ff]
[I] Jan 1 00:00:04 kernel: pci 0000:00:00.0: [0e8d:0801] type 01 class 0x060400
[I] Jan 1 00:00:04 kernel: pci 0000:00:00.0: reg 0x10: [mem 0x00000000-0x7fffffff]
[I] Jan 1 00:00:04 kernel: pci 0000:00:00.0: supports D1
[I] Jan 1 00:00:04 kernel: pci 0000:00:00.0: PME# supported from D0 D1 D3hot
[I] Jan 1 00:00:04 kernel: pci 0000:00:00.0: bridge configuration invalid ([bus
00-00]), reconfiguring
[I] Jan 1 00:00:04 kernel: pci 0000:01:00.0: [14c3:7615] type 00 class 0x000280
[I] Jan 1 00:00:04 kernel: pci 0000:01:00.0: reg 0x10: [mem 0x00000000-0x000fffff
64bit]
[I] Jan 1 00:00:04 kernel: pci_bus 0000:01: busn_res: [bus 01-ff] end is updated
to 01
[I] Jan 1 00:00:04 kernel: pci_bus 0000:00: busn_res: [bus 00-ff] end is updated
to 01
[I] Jan 1 00:00:04 kernel: pci 0000:00:00.0: BAR 0: no space for [mem size
0x80000000]
[I] Jan 1 00:00:04 kernel: pci 0000:00:00.0: BAR 0: failed to assign [mem size
0x80000000]
[I] Jan 1 00:00:04 kernel: pci 0000:00:00.0: BAR 8: assigned [mem 0x60000000-
0x600fffff]
[I] Jan 1 00:00:04 kernel: pci 0000:01:00.0: BAR 0: assigned [mem 0x60000000-
0x600fffff 64bit]
[I] Jan 1 00:00:04 kernel: pci 0000:00:00.0: PCI bridge to [bus 01]
[I] Jan 1 00:00:04 kernel: pci 0000:00:00.0: bridge window [mem 0x60000000-
0x600fffff]
[I] Jan 1 00:00:04 kernel: clocksource: Switched to clocksource MIPS
[I] Jan 1 00:00:04 kernel: NET: Registered protocol family 2
[I] Jan 1 00:00:04 kernel: IP idents hash table entries: 2048 (order: 2, 16384
bytes)
[I] Jan 1 00:00:04 kernel: TCP established hash table entries: 4096 (order: 2,
16384 bytes)
[I] Jan 1 00:00:04 kernel: TCP bind hash table entries: 4096 (order: 3, 32768
bytes)
[I] Jan 1 00:00:04 kernel: TCP: Hash tables configured (established 4096 bind
4096)
[I] Jan 1 00:00:04 kernel: UDP hash table entries: 256 (order: 1, 8192 bytes)
[I] Jan 1 00:00:04 kernel: UDP-Lite hash table entries: 256 (order: 1, 8192 bytes)
[I] Jan 1 00:00:04 kernel: NET: Registered protocol family 1
[I] Jan 1 00:00:04 kernel: PCI: CLS 0 bytes, default 32
[I] Jan 1 00:00:04 kernel: workingset: timestamp_bits=29 max_order=15
bucket_order=0
[I] Jan 1 00:00:04 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher
[I] Jan 1 00:00:04 kernel: io scheduler noop registered (default)
[I] Jan 1 00:00:04 kernel: PCI: Enabling device 0000:00:00.0 (0000 -> 0002)
[I] Jan 1 00:00:04 kernel: Serial: 8250/16550 driver, 1 ports, IRQ sharing
disabled
[I] Jan 1 00:00:04 kernel: serial8250: ttyS0 at MMIO 0x1e000c00 (irq = 41,
base_baud = 3125000) is a 16550A
[I] Jan 1 00:00:04 kernel: ndmpart: registering the NDM partition parser...
[I] Jan 1 00:00:04 kernel: MediaTek NAND driver init, version v2.1
[I] Jan 1 00:00:04 kernel: MTK NFI: NAND ID [98 F1, 80 15 F2 16]
[I] Jan 1 00:00:04 kernel: MTK NFI: NAND chip found in the MTK table: TC58BVG0S3H
[I] Jan 1 00:00:04 kernel: nand: device found, Manufacturer ID: 0x98, Chip ID:
0xf1
[I] Jan 1 00:00:04 kernel: nand: Toshiba NAND 128MiB 3,3V 8-bit
[I] Jan 1 00:00:04 kernel: nand: 128 MiB, SLC, erase size: 128 KiB, page size:
2048, OOB size: 64
[I] Jan 1 00:00:04 kernel: Scanning device for bad blocks
[W] Jan 1 00:00:04 kernel: Bad eraseblock 768 at 0x000006000000
[I] Jan 1 00:00:04 kernel: MTK NFI: success load FACT_BBT from block 1023
[I] Jan 1 00:00:04 kernel: ndmpart: U-Boot partition is up to date
[I] Jan 1 00:00:04 kernel: ndmpart: di: active = 1, backup = 2, current = 1
[I] Jan 1 00:00:04 kernel: 17 ndmpart partitions found on MTD device MT7621-NAND
[I] Jan 1 00:00:04 kernel: mtd: creating 17 MTD partitions on "MT7621-NAND":
[I] Jan 1 00:00:04 kernel: 0x000000000000-0x000000080000 : "U-Boot"
[I] Jan 1 00:00:04 kernel: 0x000000080000-0x000000100000 : "U-Config"
[I] Jan 1 00:00:04 kernel: 0x000000100000-0x000000180000 : "RF-EEPROM"
[I] Jan 1 00:00:04 kernel: 0x000000180000-0x000000360000 : "Kernel_1"
[I] Jan 1 00:00:04 kernel: 0x000000360000-0x000001d40000 : "RootFS_1"
[I] Jan 1 00:00:04 kernel: mtd: device 4 (RootFS_1) set to be root filesystem
[I] Jan 1 00:00:04 kernel: 0x000000180000-0x000001d40000 : "Firmware_1"
[I] Jan 1 00:00:04 kernel: 0x000001d40000-0x000001dc0000 : "Config_1"
[I] Jan 1 00:00:04 kernel: 0x000001dc0000-0x000001fc0000 : "Storage_Legacy"
[I] Jan 1 00:00:04 kernel: 0x000001fc0000-0x000002000000 : "Dump"
[I] Jan 1 00:00:04 kernel: 0x000002000000-0x000003fc0000 : "Storage_A"
[I] Jan 1 00:00:04 kernel: 0x000003fc0000-0x000004040000 : "U-State"
[I] Jan 1 00:00:04 kernel: 0x000004040000-0x0000040c0000 : "U-Config_res"
[I] Jan 1 00:00:04 kernel: 0x0000040c0000-0x000004140000 : "RF-EEPROM_res"
[I] Jan 1 00:00:04 kernel: 0x000004140000-0x000005d00000 : "Firmware_2"
[I] Jan 1 00:00:04 kernel: 0x000005d00000-0x000005d80000 : "Config_2"
[I] Jan 1 00:00:04 kernel: 0x000005d80000-0x000007f80000 : "Storage_B"
[I] Jan 1 00:00:04 kernel: 0x000000000000-0x000007f80000 : "Full"
[I] Jan 1 00:00:04 kernel: tun: Universal TUN/TAP device driver, 1.6
[I] Jan 1 00:00:04 kernel: tun: (C) 1999-2004 Max Krasnyansky <maxk@qualcomm.com>
[I] Jan 1 00:00:04 kernel: PPP generic driver version 2.4.2
[I] Jan 1 00:00:04 kernel: PPP MPPE Compression module registered
[I] Jan 1 00:00:04 kernel: NET: Registered protocol family 24
[I] Jan 1 00:00:04 kernel: PPTP driver version 0.8.5
[I] Jan 1 00:00:04 kernel: mips_wdt: watchdog timer activated with 30 second delay
[I] Jan 1 00:00:04 kernel: Netfilter messages via NETLINK v0.30.
[I] Jan 1 00:00:04 kernel: nf_conntrack version 0.5.0 (16384 buckets, 49152 max)
[I] Jan 1 00:00:04 kernel: ctnetlink v0.93: registering with nfnetlink.
[I] Jan 1 00:00:04 kernel: Fast NAT loaded
[I] Jan 1 00:00:04 kernel: ip_set: protocol 6
[I] Jan 1 00:00:04 kernel: ipip: IPv4 and MPLS over IPv4 tunneling driver
[I] Jan 1 00:00:04 kernel: gre: GRE over IPv4 demultiplexor driver
[I] Jan 1 00:00:04 kernel: ip_tables: (C) 2000-2006 Netfilter Core Team
[I] Jan 1 00:00:04 kernel: NET: Registered protocol family 10
[I] Jan 1 00:00:04 kernel: ip6_tables: (C) 2000-2006 Netfilter Core Team
[I] Jan 1 00:00:04 kernel: NET: Registered protocol family 17
[I] Jan 1 00:00:04 kernel: ubridge: Tiny bridge driver, 1.2
[I] Jan 1 00:00:04 kernel: 8021q: 802.1Q VLAN Support v1.8
[I] Jan 1 00:00:04 kernel: VFS: Mounted root (squashfs filesystem) readonly on
device 31:4.
[I] Jan 1 00:00:04 kernel: Freeing unused kernel memory: 216K
[I] Jan 1 00:00:04 kernel: This architecture does not have kernel memory
protection.
[I] Jan 1 00:00:04 kernel: RNG reseed started
[I] Jan 1 00:00:04 kernel: random: crng init done
[I] Jan 1 00:00:04 ndm: Core::Main: ***
[I] Jan 1 00:00:04 ndm: Core::Main: *** Network Device Manager 3.09.C.8.0-0.
[I] Jan 1 00:00:04 ndm: Core::Main: *** Built May 2 2023 16:33:23.
[I] Jan 1 00:00:04 ndm: Core::Main: ***
[I] Jan 1 00:00:06 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/xfrm4_tunnel.ko.
[I] Jan 1 00:00:06 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/xfrm_algo.ko.
[I] Jan 1 00:00:06 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/nf_nat_proto_gre.ko.
[I] Jan 1 00:00:06 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/sit.ko.
[I] Jan 1 00:00:06 kernel: sit: IPv6, IPv4 and MPLS over IPv4 tunneling driver
[I] Jan 1 00:00:06 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/usb-common.ko.
[I] Jan 1 00:00:06 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/drbg.ko.
[I] Jan 1 00:00:06 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/tsmb.ko.
[W] Jan 1 00:00:06 kernel: tsmb: loading out-of-tree module taints kernel.
[W] Jan 1 00:00:06 kernel: tsmb: module license 'Proprietary' taints kernel.
[W] Jan 1 00:00:06 kernel: Disabling lock debugging due to kernel taint
[I] Jan 1 00:00:07 kernel: Loading TSMB module version 3020.9.24.13.
[I] Jan 1 00:00:07 kernel: Built against headers 4.9-ndm-5 SMP mips
[I] Jan 1 00:00:07 kernel: Running on kernel 4.9-ndm-5 #0 SMP Tue May 2 16:33:23
2023 mips
[I] Jan 1 00:00:07 kernel: TSMB module version 3020.9.24.13 loaded.
[I] Jan 1 00:00:07 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/cbc.ko.
[I] Jan 1 00:00:07 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/xfrm4_mode_transport.ko.
[I] Jan 1 00:00:07 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/crypto_null.ko.
[I] Jan 1 00:00:07 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/udp_tunnel.ko.
[I] Jan 1 00:00:07 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/scsi_mod.ko.
[I] Jan 1 00:00:07 kernel: SCSI subsystem initialized
[I] Jan 1 00:00:07 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/veth.ko.
[I] Jan 1 00:00:07 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/md5.ko.
[I] Jan 1 00:00:07 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/xfrm4_mode_tunnel.ko.
[I] Jan 1 00:00:07 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/crc16.ko.
[I] Jan 1 00:00:07 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/zlib_inflate.ko.
[I] Jan 1 00:00:07 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/ip_gre.ko.
[I] Jan 1 00:00:07 kernel: ip_gre: GRE over IPv4 tunneling driver
[I] Jan 1 00:00:07 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/ndm_storage.ko.
[I] Jan 1 00:00:07 kernel: Searching for suitable storage partitions...
[I] Jan 1 00:00:07 kernel: Found 1st storage partition of size 33292288 bytes
[I] Jan 1 00:00:07 kernel: Found 2nd storage partition of size 35651584 bytes
[I] Jan 1 00:00:07 kernel: Registering UBI data partitions parser
[W] Jan 1 00:00:07 kernel: Concatenating MTD devices:
[W] Jan 1 00:00:07 kernel: (0): "Storage_A"
[W] Jan 1 00:00:07 kernel: (1): "Storage_B"
[W] Jan 1 00:00:07 kernel: into device "NDM combined UBI partition"
[I] Jan 1 00:00:07 kernel: 1 ndmubipart partitions found on MTD device NDM
combined UBI partition
[I] Jan 1 00:00:07 kernel: mtd: creating 1 MTD partitions on "NDM combined UBI
partition":
[I] Jan 1 00:00:07 kernel: 0x000000000000-0x0000041c0000 : "Storage"
[I] Jan 1 00:00:07 kernel: Merging storage partitions OK
[I] Jan 1 00:00:07 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/xt_policy.ko.
[I] Jan 1 00:00:07 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/nf_conntrack_rtsp.ko.
[I] Jan 1 00:00:07 kernel: nf_conntrack_rtsp v0.7 loading
[I] Jan 1 00:00:07 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/mbcache.ko.
[I] Jan 1 00:00:07 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/phr.ko.
[I] Jan 1 00:00:07 kernel: phr: NDM I/O Peripheral Driver, v2.4.14
[I] Jan 1 00:00:07 kernel: phr: "KN-1910" profile driver loaded
[I] Jan 1 00:00:07 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/nf_conntrack_proto_gre.ko.
[I] Jan 1 00:00:07 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/sch_cake.ko.
[I] Jan 1 00:00:07 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/xxhash.ko.
[I] Jan 1 00:00:07 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/poly1305_generic.ko.
[I] Jan 1 00:00:07 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/ip6_udp_tunnel.ko.
[I] Jan 1 00:00:07 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/nls_base.ko.
[I] Jan 1 00:00:07 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/nat46.ko.
[W] Jan 1 00:00:07 kernel: nat46: module (version 1.0.1) loaded.
[I] Jan 1 00:00:07 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/jbd2.ko.
[I] Jan 1 00:00:07 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/zlib_deflate.ko.
[I] Jan 1 00:00:07 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/chacha_generic.ko.
[I] Jan 1 00:00:07 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/xt_esp.ko.
[I] Jan 1 00:00:07 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/nf_conntrack_h323.ko.
[I] Jan 1 00:00:07 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/gf128mul.ko.
[I] Jan 1 00:00:07 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/jitterentropy_rng.ko.
[I] Jan 1 00:00:07 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/ctr.ko.
[I] Jan 1 00:00:07 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/ansi_cprng.ko.
[I] Jan 1 00:00:07 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/mtdoops_proc.ko.
[I] Jan 1 00:00:07 kernel: mtdoops_proc: Attached to MTD device 8
[I] Jan 1 00:00:07 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/des_generic.ko.
[I] Jan 1 00:00:07 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/hmac.ko.
[I] Jan 1 00:00:07 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/resetnds.ko.
[I] Jan 1 00:00:07 kernel: resetnds: Module loaded.
[I] Jan 1 00:00:07 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/tunnel6.ko.
[I] Jan 1 00:00:07 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/cdrom.ko.
[I] Jan 1 00:00:07 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/crc32c_generic.ko.
[I] Jan 1 00:00:07 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/wireguard.ko.
[I] Jan 1 00:00:07 kernel: wireguard: WireGuard 1.0.20200623 loaded. See
www.wireguard.com for information.
[I] Jan 1 00:00:07 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld
<Jason@zx2c4.com>. All Rights Reserved.
[I] Jan 1 00:00:07 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/nf_conntrack_pptp.ko.
[I] Jan 1 00:00:07 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/usbcore.ko.
[I] Jan 1 00:00:07 kernel: usbcore: registered new interface driver usbfs
[I] Jan 1 00:00:07 kernel: usbcore: registered new interface driver hub
[I] Jan 1 00:00:07 kernel: usbcore: registered new device driver usb
[I] Jan 1 00:00:07 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/nf_nat_h323.ko.
[I] Jan 1 00:00:07 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/nf_nat_pptp.ko.
[I] Jan 1 00:00:07 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/usbserial.ko.
[I] Jan 1 00:00:07 kernel: usbcore: registered new interface driver usbserial
[I] Jan 1 00:00:07 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/aead.ko.
[I] Jan 1 00:00:07 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/zstd_compress.ko.
[I] Jan 1 00:00:07 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/l2tp_core.ko.
[I] Jan 1 00:00:08 kernel: l2tp_core: L2TP core driver, V2.0
[I] Jan 1 00:00:08 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/ghash-generic.ko.
[I] Jan 1 00:00:08 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/cdc-wdm.ko.
[I] Jan 1 00:00:08 kernel: usbcore: registered new interface driver cdc_wdm
[I] Jan 1 00:00:08 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/jffs2.ko.
[I] Jan 1 00:00:08 kernel: jffs2: version 2.2. (NAND) (c) 2001-2006 Red Hat, Inc.
[I] Jan 1 00:00:08 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/af_key.ko.
[I] Jan 1 00:00:08 kernel: NET: Registered protocol family 15
[I] Jan 1 00:00:08 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/tntfs.ko.
[I] Jan 1 00:00:08 kernel: Tuxera NTFS driver 3021.4.23.18 [Flags: R/W MODULE].
[I] Jan 1 00:00:08 kernel: Built against headers 4.9-ndm-5 SMP mips
[I] Jan 1 00:00:08 kernel: Running on kernel 4.9-ndm-5 #0 SMP Tue May 2 16:33:23
2023 mips
[I] Jan 1 00:00:08 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/echainiv.ko.
[I] Jan 1 00:00:08 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/chacha20poly1305.ko.
[I] Jan 1 00:00:08 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/nls_cp866.ko.
[I] Jan 1 00:00:08 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/deflate.ko.
[I] Jan 1 00:00:08 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/xfrm_user.ko.
[I] Jan 1 00:00:08 kernel: Initializing XFRM netlink socket
[I] Jan 1 00:00:08 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/zstd_decompress.ko.
[I] Jan 1 00:00:08 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/tfat.ko.
[I] Jan 1 00:00:08 kernel: Tuxera FAT 12/16/32 driver version 3021.3.22.24 [Flags:
R/W MODULE].
[I] Jan 1 00:00:08 kernel: Built against headers 4.9-ndm-5 SMP mips
[I] Jan 1 00:00:08 kernel: Running on kernel 4.9-ndm-5 #0 SMP Tue May 2 16:33:23
2023 mips
[I] Jan 1 00:00:08 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/ext4.ko.
[I] Jan 1 00:00:08 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/usbnet.ko.
[I] Jan 1 00:00:08 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/sg.ko.
[I] Jan 1 00:00:08 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/sierra.ko.
[I] Jan 1 00:00:08 kernel: usbcore: registered new interface driver sierra
[I] Jan 1 00:00:08 kernel: usbserial: USB Serial support registered for Sierra USB
modem
[I] Jan 1 00:00:08 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/nls_cp437.ko.
[I] Jan 1 00:00:08 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/sr_mod.ko.
[I] Jan 1 00:00:08 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/sd_mod.ko.
[I] Jan 1 00:00:08 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/usblp.ko.
[I] Jan 1 00:00:08 kernel: usbcore: registered new interface driver usblp
[I] Jan 1 00:00:08 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/l2tp_ppp.ko.
[I] Jan 1 00:00:08 kernel: l2tp_ppp: PPPoL2TP kernel driver, V2.0
[I] Jan 1 00:00:08 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/cdc-acm.ko.
[I] Jan 1 00:00:08 kernel: usbcore: registered new interface driver cdc_acm
[I] Jan 1 00:00:08 kernel: cdc_acm: USB Abstract Control Model driver for USB
modems and ISDN adapters
[I] Jan 1 00:00:08 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/usb-storage.ko.
[I] Jan 1 00:00:09 kernel: usbcore: registered new interface driver usb-storage
[I] Jan 1 00:00:09 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/nls_cp1251.ko.
[I] Jan 1 00:00:09 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/nf_nat_rtsp.ko.
[I] Jan 1 00:00:09 kernel: nf_nat_rtsp v0.7 loading
[I] Jan 1 00:00:09 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/thfsplus.ko.
[I] Jan 1 00:00:09 kernel: Tuxera HFS+ driver 3021.12.17
[I] Jan 1 00:00:09 kernel: Built against headers 4.9-ndm-5 SMP mips
[I] Jan 1 00:00:09 kernel: Running on kernel 4.9-ndm-5 #0 SMP Tue May 2 16:33:23
2023 mips
[I] Jan 1 00:00:09 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/kalmia.ko.
[I] Jan 1 00:00:09 kernel: usbcore: registered new interface driver kalmia
[I] Jan 1 00:00:09 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/ip6_tunnel.ko.
[I] Jan 1 00:00:09 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/zstd.ko.
[I] Jan 1 00:00:09 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/esp4.ko.
[I] Jan 1 00:00:09 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/nls_utf8.ko.
[I] Jan 1 00:00:09 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/authenc.ko.
[I] Jan 1 00:00:09 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/seqiv.ko.
[I] Jan 1 00:00:09 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/gcm.ko.
[I] Jan 1 00:00:09 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/usbextras.ko.
[I] Jan 1 00:00:09 kernel: usbextras: loaded
[I] Jan 1 00:00:09 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/usb_wwan.ko.
[I] Jan 1 00:00:09 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/ccm.ko.
[I] Jan 1 00:00:09 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/cdc_ncm.ko.
[I] Jan 1 00:00:09 kernel: usbcore: registered new interface driver cdc_ncm
[I] Jan 1 00:00:09 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/option.ko.
[I] Jan 1 00:00:09 kernel: usbcore: registered new interface driver option
[I] Jan 1 00:00:09 kernel: usbserial: USB Serial support registered for GSM modem
(1-port)
[I] Jan 1 00:00:09 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/huawei_cdc_ncm.ko.
[I] Jan 1 00:00:09 kernel: usbcore: registered new interface driver huawei_cdc_ncm
[I] Jan 1 00:00:09 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/cdc_ether.ko.
[I] Jan 1 00:00:09 kernel: usbcore: registered new interface driver cdc_ether
[I] Jan 1 00:00:09 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/rndis_host.ko.
[I] Jan 1 00:00:09 kernel: usbcore: registered new interface driver rndis_host
[I] Jan 1 00:00:09 ndm: Core::System::Mtd::Table: current firmware image index is
1.
[I] Jan 1 00:00:09 ndm: Core::FileSystem::Temp: mounting /var/...
[I] Jan 1 00:00:09 ndm: Core::Authenticator: MD5 generator created.
[I] Jan 1 00:00:09 ndm: Core::Authenticator: NT generator created.
[I] Jan 1 00:00:09 ndm: Core::Authenticator: "readonly" tag registered.
[I] Jan 1 00:00:09 ndm: Core::FileSystem::Dynamic: "ndm:": registered "log" node.
[I] Jan 1 00:00:09 ndm: Core::FileSystem::Dynamic: "ndm:": registered "running-
config" node.
[I] Jan 1 00:00:09 ndm: Core::FileSystem::Dynamic: "ndm:": registered "sharing-
config" node.
[I] Jan 1 00:00:09 ndm: Core::FileSystem::Dynamic: "ndm:": registered "self-test"
node.
[I] Jan 1 00:00:09 ndm: Core::System::Hostname: the host name set.
[I] Jan 1 00:00:09 ndm: Core::System::Timezone: building a timezone list...
[I] Jan 1 00:00:09 ndm: Core::System::Timezone: scanning done, 249 localities
available.
[I] Jan 1 03:00:09 ndm: Core::System::Timezone: "Europe/Istanbul" locality set as
default.
[I] Jan 1 03:00:09 ndm: Telnet::Server: bruteforce detection is enabled.
[I] Jan 1 03:00:09 ndm: Ntp::Client: configuration reset.
[I] Jan 1 03:00:09 ndm: Ntp::Client: configuration reset.
[I] Jan 1 03:00:09 ndm: Http::Manager: bruteforce detection is enabled.
[I] Jan 1 03:00:09 ndm: Core::Authenticator: "http" tag registered.
[I] Jan 1 03:00:09 ndm: Core::Authenticator: "http-proxy" tag registered.
[I] Jan 1 03:00:10 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/nacct.ko.
[I] Jan 1 03:00:10 kernel: nacct: init, v 2.5
[I] Jan 1 03:00:10 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/mt7621_eth.ko.
[I] Jan 1 03:00:10 kernel: mt7621_eth: NDM Ethernet Switch Driver for MediaTek
MT7621, v1.3.23-5
[I] Jan 1 03:00:10 kernel: mt7621_eth: MT7621 SoC, TX/RX descriptors: 1024/1024,
NAPI weight 64
[I] Jan 1 03:00:10 kernel: mt7621_eth: eth2 created for GMAC1 (50:ff:20:29:9c:1e
address, 4 EPHY ports)
[I] Jan 1 03:00:10 kernel: mt7621_eth: eth3 created for GMAC2 (50:ff:20:29:9c:1f
address, 1 EPHY port)
[I] Jan 1 03:00:10 kernel: mt7621_eth: MT7530 switch initialized
[I] Jan 1 03:00:10 ndm: Network::Interface::Base: "GigabitEthernet0": interface is
down.
[I] Jan 1 03:00:10 ndm: Network::Interface::Mac: "GigabitEthernet0": backed up the
default address 50:ff:20:29:9c:1e of "GigabitEthernet0" before changing.
[I] Jan 1 03:00:10 ndm: Network::Interface::Repository: "GigabitEthernet0"
interface created.
[I] Jan 1 03:00:10 ndm: Network::Interface::Base: "GigabitEthernet0/0": interface
is down.
[I] Jan 1 03:00:10 ndm: Network::Interface::Repository: "GigabitEthernet0/0"
interface created.
[I] Jan 1 03:00:10 ndm: Network::Interface::Base: "GigabitEthernet0/1": interface
is down.
[I] Jan 1 03:00:10 ndm: Network::Interface::Repository: "GigabitEthernet0/1"
interface created.
[I] Jan 1 03:00:10 ndm: Network::Interface::Base: "GigabitEthernet0/2": interface
is down.
[I] Jan 1 03:00:10 ndm: Network::Interface::Repository: "GigabitEthernet0/2"
interface created.
[I] Jan 1 03:00:10 ndm: Network::Interface::Base: "GigabitEthernet0/3": interface
is down.
[I] Jan 1 03:00:10 ndm: Network::Interface::Repository: "GigabitEthernet0/3"
interface created.
[I] Jan 1 03:00:10 ndm: Network::Interface::Base: "GigabitEthernet1": interface is
down.
[I] Jan 1 03:00:10 ndm: Network::Interface::Base: "GigabitEthernet1": network MTU
reset to default.
[I] Jan 1 03:00:10 ndm: Network::Interface::Repository: "GigabitEthernet1"
interface created.
[I] Jan 1 03:00:10 ndm: Network::Interface::Base: "GigabitEthernet1/0": interface
is down.
[I] Jan 1 03:00:10 ndm: Network::Interface::Repository: "GigabitEthernet1/0"
interface created.
[I] Jan 1 03:00:10 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/xhci-hcd.ko.
[I] Jan 1 03:00:10 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/xhci-mtk.ko.
[I] Jan 1 03:00:10 kernel: xhci-mtk xhci-mtk: xHCI Host Controller
[I] Jan 1 03:00:10 kernel: xhci-mtk xhci-mtk: new USB bus registered, assigned bus
number 1
[I] Jan 1 03:00:10 kernel: U2PHY P0 set SRCTRL calibration value: 3
[I] Jan 1 03:00:10 kernel: U2PHY P1 set SRCTRL calibration value: 3
[I] Jan 1 03:00:10 kernel: xhci-mtk xhci-mtk: hcc params 0x01401198 hci version
0x96 quirks 0x00294810
[I] Jan 1 03:00:10 kernel: xhci-mtk xhci-mtk: irq 37, io mem 0x1e1c0000
[I] Jan 1 03:00:10 kernel: usb usb1: New USB device found, idVendor=1d6b,
idProduct=0002, bcdDevice= 4.09
[I] Jan 1 03:00:10 kernel: usb usb1: New USB device strings: Mfr=3, Product=2,
SerialNumber=1
[I] Jan 1 03:00:10 kernel: usb usb1: Product: xHCI Host Controller
[I] Jan 1 03:00:10 kernel: usb usb1: Manufacturer: Linux 4.9-ndm-5 xhci-hcd
[I] Jan 1 03:00:10 kernel: usb usb1: SerialNumber: xhci-mtk
[I] Jan 1 03:00:10 kernel: hub 1-0:1.0: USB hub found
[I] Jan 1 03:00:10 kernel: hub 1-0:1.0: 2 ports detected
[I] Jan 1 03:00:10 kernel: xhci-mtk xhci-mtk: xHCI Host Controller
[I] Jan 1 03:00:10 kernel: xhci-mtk xhci-mtk: new USB bus registered, assigned bus
number 2
[I] Jan 1 03:00:10 kernel: usb usb2: New USB device found, idVendor=1d6b,
idProduct=0003, bcdDevice= 4.09
[I] Jan 1 03:00:10 kernel: usb usb2: New USB device strings: Mfr=3, Product=2,
SerialNumber=1
[I] Jan 1 03:00:10 kernel: usb usb2: Product: xHCI Host Controller
[I] Jan 1 03:00:10 kernel: usb usb2: Manufacturer: Linux 4.9-ndm-5 xhci-hcd
[I] Jan 1 03:00:10 kernel: usb usb2: SerialNumber: xhci-mtk
[I] Jan 1 03:00:10 kernel: hub 2-0:1.0: USB hub found
[I] Jan 1 03:00:10 kernel: hub 2-0:1.0: 1 port detected
[I] Jan 1 03:00:10 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/ubi.ko.
[I] Jan 1 03:00:10 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/ubifs.ko.
[W] Jan 1 03:00:10 kernel: ubi0: attaching mtd17
[W] Jan 1 03:00:11 kernel: ubi0: scanning is finished
[W] Jan 1 03:00:11 kernel: ubi0: attached mtd17 (name "Storage", size 65 MiB)
[W] Jan 1 03:00:11 kernel: ubi0: PEB size: 131072 bytes (128 KiB), LEB size:
126976 bytes
[W] Jan 1 03:00:11 kernel: ubi0: min./max. I/O unit sizes: 2048/2048, sub-page
size 2048
[W] Jan 1 03:00:11 kernel: ubi0: VID header offset: 2048 (aligned 2048), data
offset: 4096
[W] Jan 1 03:00:11 kernel: ubi0: good PEBs: 525, bad PEBs: 1, corrupted PEBs: 0
[W] Jan 1 03:00:11 kernel: ubi0: user volume: 1, internal volumes: 1, max. volumes
count: 128
[W] Jan 1 03:00:11 kernel: ubi0: max/mean erase counter: 2/1, WL threshold: 2048,
image sequence number: 763062735
[W] Jan 1 03:00:11 kernel: ubi0: available PEBs: 0, total reserved PEBs: 525, PEBs
reserved for bad PEB handling: 12
[W] Jan 1 03:00:11 kernel: ubi0: background thread "ubi_bgt0d" started, PID 472
[W] Jan 1 03:00:11 kernel: UBIFS (ubi0:0): background thread "ubifs_bgt0_0"
started, PID 473
[W] Jan 1 03:00:11 kernel: UBIFS (ubi0:0): recovery needed
[W] Jan 1 03:00:11 kernel: UBIFS (ubi0:0): recovery completed
[W] Jan 1 03:00:11 kernel: UBIFS (ubi0:0): UBIFS: mounted UBI device 0, volume 0,
name "storage"
[W] Jan 1 03:00:11 kernel: UBIFS (ubi0:0): LEB size: 126976 bytes (124 KiB),
min./max. I/O unit sizes: 2048 bytes/2048 bytes
[W] Jan 1 03:00:11 kernel: UBIFS (ubi0:0): FS size: 63361024 bytes (60 MiB, 499
LEBs), journal size 3174400 bytes (3 MiB, 25 LEBs)
[W] Jan 1 03:00:11 kernel: UBIFS (ubi0:0): reserved for root: 2992697 bytes (2922
KiB)
[W] Jan 1 03:00:11 kernel: UBIFS (ubi0:0): media format: w4/r0 (latest is w4/r0),
UUID 4BF7F289-24E2-4783-BD86-40075CD321B1, small LPT model
[I] Jan 1 03:00:11 ndm: Core::Authenticator: "printers" tag registered.
[I] Jan 1 03:00:11 ndm: Core::Authenticator: "cifs" tag registered.
[I] Jan 1 03:00:11 ndm: Cloud::Agent: "cloud" component registered.
[I] Jan 1 03:00:11 ndm: Cloud::Agent: "ndns" TTP component registered.
[I] Jan 1 03:00:11 ndm: Cloud::Agent: "ndns" component registered.
[I] Jan 1 03:00:11 ndm: Cloud::Agent: "ndmp" component registered.
[I] Jan 1 03:00:11 ndm: Core::Authenticator: "vpn-dlna" tag registered.
[I] Jan 1 03:00:11 ndm: Dns::Filter::Public: loaded 17 presets (version 10).
[I] Jan 1 03:00:11 ndm: Dns::Manager: DNS-over-HTTPS support initialized.
[I] Jan 1 03:00:11 ndm: Dns::Manager: DNS-over-TLS support initialized.
[I] Jan 1 03:00:11 ndm: Network::InternetChecker: gateway checking enabled.
[I] Jan 1 03:00:11 ndm: Ftp::Server: bruteforce detection is enabled.
[I] Jan 1 03:00:11 ndm: Core::Authenticator: "ftp" tag registered.
[I] Jan 1 03:00:11 kernel: IPv6: ADDRCONF(NETDEV_UP): tunl0: link is not ready
[I] Jan 1 03:00:11 kernel: IPv6: ADDRCONF(NETDEV_UP): sit0: link is not ready
[I] Jan 1 03:00:11 kernel: IPv6: ADDRCONF(NETDEV_UP): gre0: link is not ready
[I] Jan 1 03:00:11 kernel: IPv6: ADDRCONF(NETDEV_UP): gretap0: link is not ready
[I] Jan 1 03:00:11 kernel: IPv6: ADDRCONF(NETDEV_UP): ethoip0: link is not ready
[I] Jan 1 03:00:11 kernel: IPv6: ADDRCONF(NETDEV_UP): ip6tnl0: link is not ready
[I] Jan 1 03:00:11 kernel: IPv6: ADDRCONF(NETDEV_UP): ezcfg0: link is not ready
[I] Jan 1 03:00:11 kernel: IPv6: ADDRCONF(NETDEV_UP): eth2: link is not ready
[I] Jan 1 03:00:11 kernel: IPv6: ADDRCONF(NETDEV_UP): eth3: link is not ready
[I] Jan 1 03:00:11 ndm: Core::Authenticator: "ipsec-xauth" tag registered.
[I] Jan 1 03:00:11 ndm: Core::Authenticator: "ipsec-l2tp" tag registered.
[I] Jan 1 03:00:11 ndm: Network::Interface::Rtx::Sku: main EU profile applied.
[I] Jan 1 03:00:11 ndm: Network::Interface::Rtx::Sku: beamforming EU profile
applied.
[I] Jan 1 03:00:11 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/mt7615_ap.ko.
[I] Jan 1 03:00:12 kernel: PCI: Enabling device 0000:01:00.0 (0000 -> 0002)
[I] Jan 1 03:00:12 kernel: MT7615 AP Driver version: 5.1.0.1
[I] Jan 1 03:00:12 ndm: Network::Interface::Rtx::WifiMaster: "WifiMaster1": PHY
mode set.
[I] Jan 1 03:00:12 ndm: Network::Interface::Rtx::WifiMaster: "WifiMaster1":
channel bandwidth settings reset to default.
[I] Jan 1 03:00:12 ndm: Network::Interface::Base: "WifiMaster1": interface is
down.
[I] Jan 1 03:00:12 kernel: MT7615 CPU 0 patch info:
[I] Jan 1 03:00:12 kernel: Built date: 20180518100604a
[I] Jan 1 03:00:12 kernel: MT7615 CPU 0 firmware info:
[I] Jan 1 03:00:12 kernel: Chip ID: 0x04
[I] Jan 1 03:00:12 kernel: Eco version: 0x00
[I] Jan 1 03:00:12 kernel: Built date: 20210224182030
[I] Jan 1 03:00:12 kernel: MT7615 CPU 1 firmware info:
[I] Jan 1 03:00:12 kernel: Chip ID: 0x04
[I] Jan 1 03:00:12 kernel: Eco version: 0x00
[I] Jan 1 03:00:12 kernel: Built date: 20190415154149
[I] Jan 1 03:00:13 ndm: Network::Interface::Repository: "WifiMaster1" interface
created.
[I] Jan 1 03:00:13 ndm: Network::Interface::Rtx::WifiMaster: "WifiMaster0": PHY
mode set.
[I] Jan 1 03:00:13 ndm: Network::Interface::Rtx::WifiMaster: "WifiMaster0":
channel bandwidth settings reset to default.
[I] Jan 1 03:00:13 ndm: Network::Interface::Base: "WifiMaster0": interface is
down.
[I] Jan 1 03:00:13 ndm: Network::Interface::Repository: "WifiMaster0" interface
created.
[I] Jan 1 03:00:13 ndm: Network::Interface::Wireless: "WifiMaster1/AccessPoint1":
SSID saved.
[I] Jan 1 03:00:13 ndm: Network::Interface::Rtx::AccessPoint:
"WifiMaster1/AccessPoint1": SSID reset.
[I] Jan 1 03:00:13 ndm: Network::Interface::Base: "WifiMaster1/AccessPoint1":
interface is down.
[I] Jan 1 03:00:13 ndm: Network::Interface::Base: "WifiMaster1/AccessPoint1":
network MTU reset to default.
[I] Jan 1 03:00:13 ndm: Network::Interface::Repository: "WifiMaster1/AccessPoint1"
interface created.
[I] Jan 1 03:00:13 ndm: Network::Interface::Wireless: "WifiMaster0/AccessPoint3":
SSID saved.
[I] Jan 1 03:00:13 ndm: Network::Interface::Rtx::AccessPoint:
"WifiMaster0/AccessPoint3": SSID reset.
[I] Jan 1 03:00:13 ndm: Network::Interface::Base: "WifiMaster0/AccessPoint3":
interface is down.
[I] Jan 1 03:00:13 ndm: Network::Interface::Base: "WifiMaster0/AccessPoint3":
network MTU reset to default.
[I] Jan 1 03:00:13 ndm: Network::Interface::Repository: "WifiMaster0/AccessPoint3"
interface created.
[I] Jan 1 03:00:13 ndm: Network::Interface::Wireless: "WifiMaster0/AccessPoint0":
SSID saved.
[I] Jan 1 03:00:13 ndm: Network::Interface::Rtx::AccessPoint:
"WifiMaster0/AccessPoint0": SSID reset.
[I] Jan 1 03:00:13 ndm: Network::Interface::Base: "WifiMaster0/AccessPoint0":
interface is down.
[I] Jan 1 03:00:13 ndm: Network::Interface::Base: "WifiMaster0/AccessPoint0":
network MTU reset to default.
[I] Jan 1 03:00:13 ndm: Network::Interface::Repository: "WifiMaster0/AccessPoint0"
interface created.
[I] Jan 1 03:00:13 ndm: Network::Interface::Wireless: "WifiMaster1/AccessPoint2":
SSID saved.
[I] Jan 1 03:00:13 ndm: Network::Interface::Rtx::AccessPoint:
"WifiMaster1/AccessPoint2": SSID reset.
[I] Jan 1 03:00:13 ndm: Network::Interface::Base: "WifiMaster1/AccessPoint2":
interface is down.
[I] Jan 1 03:00:13 ndm: Network::Interface::Base: "WifiMaster1/AccessPoint2":
network MTU reset to default.
[I] Jan 1 03:00:13 ndm: Network::Interface::Repository: "WifiMaster1/AccessPoint2"
interface created.
[I] Jan 1 03:00:13 ndm: Network::Interface::Wireless: "WifiMaster0/AccessPoint1":
SSID saved.
[I] Jan 1 03:00:13 ndm: Network::Interface::Rtx::AccessPoint:
"WifiMaster0/AccessPoint1": SSID reset.
[I] Jan 1 03:00:13 ndm: Network::Interface::Base: "WifiMaster0/AccessPoint1":
interface is down.
[I] Jan 1 03:00:13 ndm: Network::Interface::Base: "WifiMaster0/AccessPoint1":
network MTU reset to default.
[I] Jan 1 03:00:13 ndm: Network::Interface::Repository: "WifiMaster0/AccessPoint1"
interface created.
[I] Jan 1 03:00:13 ndm: Network::Interface::Wireless: "WifiMaster1/AccessPoint3":
SSID saved.
[I] Jan 1 03:00:13 ndm: Network::Interface::Rtx::AccessPoint:
"WifiMaster1/AccessPoint3": SSID reset.
[I] Jan 1 03:00:13 ndm: Network::Interface::Base: "WifiMaster1/AccessPoint3":
interface is down.
[I] Jan 1 03:00:13 ndm: Network::Interface::Base: "WifiMaster1/AccessPoint3":
network MTU reset to default.
[I] Jan 1 03:00:13 ndm: Network::Interface::Repository: "WifiMaster1/AccessPoint3"
interface created.
[I] Jan 1 03:00:13 ndm: Network::Interface::Wireless: "WifiMaster1/AccessPoint0":
SSID saved.
[I] Jan 1 03:00:13 ndm: Network::Interface::Rtx::AccessPoint:
"WifiMaster1/AccessPoint0": SSID reset.
[I] Jan 1 03:00:13 ndm: Network::Interface::Base: "WifiMaster1/AccessPoint0":
interface is down.
[I] Jan 1 03:00:13 ndm: Network::Interface::Base: "WifiMaster1/AccessPoint0":
network MTU reset to default.
[I] Jan 1 03:00:13 ndm: Network::Interface::Repository: "WifiMaster1/AccessPoint0"
interface created.
[I] Jan 1 03:00:13 ndm: Network::Interface::Wireless: "WifiMaster0/AccessPoint2":
SSID saved.
[I] Jan 1 03:00:13 ndm: Network::Interface::Rtx::AccessPoint:
"WifiMaster0/AccessPoint2": SSID reset.
[I] Jan 1 03:00:13 ndm: Network::Interface::Base: "WifiMaster0/AccessPoint2":
interface is down.
[I] Jan 1 03:00:13 ndm: Network::Interface::Base: "WifiMaster0/AccessPoint2":
network MTU reset to default.
[I] Jan 1 03:00:13 ndm: Network::Interface::Repository: "WifiMaster0/AccessPoint2"
interface created.
[I] Jan 1 03:00:13 ndm: Network::Interface::Base: "WifiMaster0/WifiStation0":
interface is down.
[I] Jan 1 03:00:13 ndm: Network::Interface::Base: "WifiMaster0/WifiStation0":
network MTU reset to default.
[I] Jan 1 03:00:13 ndm: Network::Interface::Repository: "WifiMaster0/WifiStation0"
interface created.
[I] Jan 1 03:00:13 ndm: Network::Interface::Base: "WifiMaster1/WifiStation0":
interface is down.
[I] Jan 1 03:00:13 ndm: Network::Interface::Base: "WifiMaster1/WifiStation0":
network MTU reset to default.
[I] Jan 1 03:00:13 ndm: Network::Interface::Repository: "WifiMaster1/WifiStation0"
interface created.
[I] Jan 1 03:00:13 ndm: Network::Interface::Rtx::WifiMonitor: added system name
for "WifiMaster0/Backhaul0".
[I] Jan 1 03:00:13 ndm: Network::Interface::Rtx::WifiMonitor: added system name
for "WifiMaster1/Backhaul0".
[I] Jan 1 03:00:13 ndm: Core::FileSystem::Dynamic: "ndm:": registered "wifi-
configuration.dat" node.
[I] Jan 1 03:00:13 ndm: Network::Interface::Rtx::WifiController: backhaul STP
disabled.
[I] Jan 1 03:00:13 ndm: Network::Interface::Rtx::WifiController:
"WifiMaster0/Backhaul0": set metric 1.
[I] Jan 1 03:00:14 ndm: Network::Interface::Rtx::WifiController:
"WifiMaster0/Backhaul0": activated.
[I] Jan 1 03:00:14 ndm: Network::Interface::Rtx::WifiController:
"WifiMaster1/Backhaul0": set metric 1.
[I] Jan 1 03:00:14 ndm: Network::Interface::Rtx::WifiController:
"WifiMaster1/Backhaul0": activated.
[I] Jan 1 03:00:14 ndm: Network::Interface::Rtx::WifiController: backhaul
activated.
[I] Jan 1 03:00:14 ndm: PingCheck::Profile: "default": update interval is changed
to 10 seconds.
[I] Jan 1 03:00:14 ndm: PingCheck::Profile: "default": uses tls mode.
[I] Jan 1 03:00:14 ndm: PingCheck::Profile: "default": uses port 443 for testing.
[I] Jan 1 03:00:14 ndm: PingCheck::Profile: "default": add host
"captive.keenetic.net" for testing.
[I] Jan 1 03:00:14 ndm: Core::Authenticator: "torrent" tag registered.
[I] Jan 1 03:00:14 ndm: Network::Interface::Ip: "WifiMaster1/AccessPoint1":
security level set to "private".
[I] Jan 1 03:00:15 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/ntc.ko.
[I] Jan 1 03:00:15 ndnproxy: NDM DNS Proxy, v1.3.0b55-1.
[I] Jan 1 03:00:15 ndnproxy: PID file: /var/ndnproxymain.pid.
[I] Jan 1 03:00:15 ndnproxy: stats. file: /var/ndnproxymain.stat.
[I] Jan 1 03:00:15 kernel: ntc: NDM Traffic Control Module, v7.0.3
[I] Jan 1 03:00:15 ndm: Network::Interface::Ip: "WifiMaster0/AccessPoint3":
security level set to "private".
[I] Jan 1 03:00:15 ndm: Module::Manager: loaded 49 modules.
[I] Jan 1 03:00:15 ndm: Network::Interface::Ip: "WifiMaster1/AccessPoint2":
security level set to "private".
[I] Jan 1 03:00:15 ndm: Network::Interface::Ip: "WifiMaster0/AccessPoint1":
security level set to "private".
[I] Jan 1 03:00:15 ndm: Network::Interface::Ip: "WifiMaster1/AccessPoint3":
security level set to "private".
[I] Jan 1 03:00:15 ndm: Network::Interface::Ip: "WifiMaster0/AccessPoint2":
security level set to "private".
[I] May 22 21:03:41 ndm: Core::System::Clock: system time has been changed.
[I] May 22 21:03:41 ndm: Core::FileSystem::Proc: system setting saved.
[I] May 22 21:03:41 ndm: Core::Syslog: last message repeated 14 times.
[I] May 22 21:03:41 ndm: Core::Peripheral::Manager: "FN1/double-click" handler set.
[I] May 22 21:03:41 ndm: Core::Peripheral::Manager: "FN2/double-click" handler set.

[I] May 22 22:03:41 ndm: Core::System::Timezone: timezone set to "Asia/Baku".


[I] May 22 22:03:41 ndm: Core::System::Domainname: the system domain name set.
[I] May 22 22:03:41 ndm: Core::System::Hostname: the host name set.
[I] May 22 22:03:41 ndm: Core::System::Caption: template set to default.
[I] May 22 22:03:41 ndm: Core::Ndss: dump-reporting disabled.
[I] May 22 22:03:41 ndm: Ntp::Client: server "0.pool.ntp.org" has been added.
[I] May 22 22:03:41 ndm: Ntp::Client: server "1.pool.ntp.org" has been added.
[I] May 22 22:03:41 ndm: Ntp::Client: server "2.pool.ntp.org" has been added.
[I] May 22 22:03:41 ndm: Ntp::Client: server "3.pool.ntp.org" has been added.
[I] May 22 22:03:41 ndm: Core::KnownHosts: new host "wiregurd" has been created.
[I] May 22 22:03:41 ndm: Core::KnownHosts: new host "debguard" has been created.
[I] May 22 22:03:41 ndm: Core::KnownHosts: new host "newminecraft" has been
created.
[I] May 22 22:03:41 ndm: Core::KnownHosts: new host "openvpn" has been created.
[I] May 22 22:03:41 ndm: Core::KnownHosts: new host "sinplays" has been created.
[I] May 22 22:03:41 ndm: Core::KnownHosts: new host "Daymarus-" has been created.
[I] May 22 22:03:41 ndm: Core::KnownHosts: new host "Daymarus" has been created.
[I] May 22 22:03:41 ndm: Core::KnownHosts: new host "TL-C20-V5" has been created.
[I] May 22 22:03:41 ndm: Core::KnownHosts: new host "Archer C20" has been created.
[I] May 22 22:03:41 ndm: Core::KnownHosts: new host "Durimarus" has been created.
[I] May 22 22:03:41 ndm: Core::KnownHosts: new host "meiphoneX" has been created.
[I] May 22 22:03:41 ndm: Core::KnownHosts: new host "iPhone" has been created.
[I] May 22 22:03:41 ndm: Core::KnownHosts: new host "Eda" has been created.
[I] May 22 22:03:41 ndm: Core::KnownHosts: new host "papi4" has been created.
[I] May 22 22:03:41 ndm: Core::KnownHosts: new host "iphoneX" has been created.
[I] May 22 22:03:41 ndm: Core::KnownHosts: new host "RedmiNote8-RedmiNote" has been
created.
[I] May 22 22:03:41 ndm: Core::KnownHosts: new host "123123" has been created.
[I] May 22 22:03:41 ndm: Core::KnownHosts: new host "iPhone-X" has been created.
[I] May 22 22:03:41 ndm: Core::KnownHosts: new host "miboxS" has been created.
[I] May 22 22:03:41 ndm: Core::KnownHosts: new host "13promax" has been created.
[I] May 22 22:03:41 ndm: Network::Acl: "_WEBADMIN_IPSEC_ionline_EY" access list
created.
[I] May 22 22:03:41 ndm: Network::Acl: rule accepted.
[I] May 22 22:03:41 ndm: Network::Acl: "_WEBADMIN_ISP" access list created.
[I] May 22 22:03:41 ndm: Network::Acl: rule accepted.
[I] May 22 22:03:41 ndm: Network::Acl: deny rule disabled.
[I] May 22 22:03:41 ndm: Network::Acl: deny rule description set to "ping".
[I] May 22 22:03:41 ndm: Network::Acl: enabled auto-deletion for "_WEBADMIN_ISP"
access group.
[I] May 22 22:03:41 ndm: Netfilter::Manager: private networks isolated.
[I] May 22 22:03:41 ndm: Core::Authenticator: password has been set for user
"admin".
[I] May 22 22:03:41 ndm: Core::Authenticator: password has been set for user
"admin".
[I] May 22 22:03:41 ndm: Core::Authenticator: user "admin" tagged with "cli".
[I] May 22 22:03:41 ndm: Core::Authenticator: user "admin" tagged with "http".
[I] May 22 22:03:41 ndm: Core::Authenticator: user "admin" tagged with "ftp".
[I] May 22 22:03:41 ndm: Core::Authenticator: user "admin" tagged with "cifs".
[I] May 22 22:03:41 ndm: Core::Authenticator: user "admin" tagged with "printers".
[I] May 22 22:03:41 ndm: Core::Authenticator: user "admin" tagged with "torrent".
[I] May 22 22:03:41 ndm: Network::Interface::Base: "GigabitEthernet0": interface is
up.
[I] May 22 22:03:41 ndm: Network::Interface::Base: "GigabitEthernet0/0": renamed to
"1".
[I] May 22 22:03:41 ndm: Network::Interface::Switch: "GigabitEthernet0/0": access
mode enabled.
[I] May 22 22:03:41 ndm: Network::Interface::Switch: "GigabitEthernet0/0": set
access VLAN ID: 1.
[I] May 22 22:03:41 ndm: Network::Interface::Base: "GigabitEthernet0/0": interface
is up.
[I] May 22 22:03:41 ndm: Network::Interface::Base: "GigabitEthernet0/1": renamed to
"2".
[I] May 22 22:03:41 ndm: Network::Interface::Switch: "GigabitEthernet0/1": access
mode enabled.
[I] May 22 22:03:41 ndm: Network::Interface::Switch: "GigabitEthernet0/1": set
access VLAN ID: 1.
[I] May 22 22:03:41 ndm: Network::Interface::Base: "GigabitEthernet0/1": interface
is up.
[I] May 22 22:03:41 ndm: Network::Interface::Base: "GigabitEthernet0/2": renamed to
"3".
[I] May 22 22:03:41 ndm: Network::Interface::Switch: "GigabitEthernet0/2": access
mode enabled.
[I] May 22 22:03:41 ndm: Network::Interface::Switch: "GigabitEthernet0/2": set
access VLAN ID: 1.
[I] May 22 22:03:41 ndm: Network::Interface::Base: "GigabitEthernet0/2": interface
is up.
[I] May 22 22:03:41 ndm: Network::Interface::Base: "GigabitEthernet0/3": renamed to
"4".
[I] May 22 22:03:41 ndm: Network::Interface::Switch: "GigabitEthernet0/3": access
mode enabled.
[I] May 22 22:03:41 ndm: Network::Interface::Switch: "GigabitEthernet0/3": trunk
mode enabled.
[I] May 22 22:03:41 ndm: Network::Interface::Switch: "GigabitEthernet0/3": set
trunk VLAN ID: 18.
[I] May 22 22:03:41 ndm: Network::Interface::Base: "GigabitEthernet0/3": interface
is up.
[I] May 22 22:03:41 ndm: Network::Interface::Base: "GigabitEthernet0/Vlan1":
interface is down.
[I] May 22 22:03:41 ndm: Network::Interface::Base: "GigabitEthernet0/Vlan1":
network MTU reset to default.
[I] May 22 22:03:41 ndm: Network::Interface::Repository: "GigabitEthernet0/Vlan1"
interface created.
[I] May 22 22:03:42 ndm: Network::Interface::Base: "GigabitEthernet0/Vlan1":
description saved.
[I] May 22 22:03:42 ndm: Network::Interface::Ip: "GigabitEthernet0/Vlan1": security
level set to "private".
[I] May 22 22:03:42 ndm: Dhcp::Client: GigabitEthernet0/Vlan1 DHCP client DNS host
routes are enabled.
[I] May 22 22:03:42 ndm: Dhcp::Client: GigabitEthernet0/Vlan1 DHCP name servers are
enabled.
[I] May 22 22:03:42 ndm: Network::Interface::Base: "GigabitEthernet0/Vlan1":
interface is up.
[I] May 22 22:03:42 ndm: Network::Interface::Base: "GigabitEthernet0/Vlan3":
interface is down.
[I] May 22 22:03:42 ndm: Network::Interface::Base: "GigabitEthernet0/Vlan3":
network MTU reset to default.
[I] May 22 22:03:42 ndm: Network::Interface::Repository: "GigabitEthernet0/Vlan3"
interface created.
[I] May 22 22:03:43 ndm: Network::Interface::Ip: "GigabitEthernet0/Vlan3": security
level set to "public".
[I] May 22 22:03:43 ndm: Dhcp::Client: GigabitEthernet0/Vlan3 DHCP client DNS host
routes are enabled.
[I] May 22 22:03:43 ndm: Dhcp::Client: GigabitEthernet0/Vlan3 DHCP name servers are
enabled.
[I] May 22 22:03:43 ndm: Network::Interface::Base: "GigabitEthernet0/Vlan3":
interface is up.
[I] May 22 22:03:43 ndm: Network::Interface::Base: "GigabitEthernet0/Vlan18":
interface is down.
[I] May 22 22:03:43 ndm: Network::Interface::Base: "GigabitEthernet0/Vlan18":
network MTU reset to default.
[I] May 22 22:03:43 ndm: Network::Interface::Repository: "GigabitEthernet0/Vlan18"
interface created.
[I] May 22 22:03:44 ndm: Network::Interface::Ip: "GigabitEthernet0/Vlan18":
security level set to "public".
[I] May 22 22:03:44 ndm: Dhcp::Client: GigabitEthernet0/Vlan18 DHCP client DNS host
routes are enabled.
[I] May 22 22:03:44 ndm: Dhcp::Client: GigabitEthernet0/Vlan18 DHCP name servers
are enabled.
[I] May 22 22:03:44 ndm: Network::Interface::Base: "GigabitEthernet0/Vlan18":
interface is up.
[I] May 22 22:03:44 ndm: Network::Interface::Base: "GigabitEthernet1": renamed to
"ISP".
[I] May 22 22:03:44 ndm: Network::Interface::Base: "GigabitEthernet1": description
saved.
[I] May 22 22:03:44 ndm: Network::Interface::Mac: "GigabitEthernet1": backed up the
default address 50:ff:20:29:9c:1f of "ISP" before changing.
[I] May 22 22:03:44 ndm: Network::Interface::Mac: "GigabitEthernet1": MAC address
is 14:eb:b6:d0:19:de.
[I] May 22 22:03:44 ndm: Network::Interface::Ip: "GigabitEthernet1": security level
set to "public".
[I] May 22 22:03:44 ndm: Dhcp::Client: started DHCP client on GigabitEthernet1.
[I] May 22 22:03:44 ndm: Dhcp::Client: GigabitEthernet1 DHCP client hostname is set
to Keenetic_Viva.
[I] May 22 22:03:44 ndm: Dhcp::Client: GigabitEthernet1 DHCP client DNS host routes
are enabled.
[I] May 22 22:03:44 ndm: Dhcp::Client: GigabitEthernet1 DHCP name servers are
disabled.
[I] May 22 22:03:44 ndm: Network::Interface::Base: "GigabitEthernet1": static MTU
is 1500.
[I] May 22 22:03:44 ndm: Network::Acl: input "_WEBADMIN_ISP" access list added to
"GigabitEthernet1".
[I] May 22 22:03:44 ndm: Network::Interface::L3Base: "GigabitEthernet1": global
priority is 63507.
[I] May 22 22:03:44 ndm: Igmp::Proxy: upstream role assigned to GigabitEthernet1.
[I] May 22 22:03:44 ndm: Network::Interface::Base: "GigabitEthernet1": interface is
up.
[I] May 22 22:03:44 ndm: Network::Interface::Base: "GigabitEthernet1/0": renamed to
"0".
[I] May 22 22:03:44 ndm: Network::Interface::Base: "GigabitEthernet1/0": interface
is up.
[I] May 22 22:03:44 ndm: Network::Interface::Rtx::WifiMaster: "WifiMaster0": PHY
mode set.
[I] May 22 22:03:44 ndm: Network::Interface::Rtx::WifiMaster: "WifiMaster0":
channel bandwidth setting applied.
[I] May 22 22:03:44 ndm: Network::Interface::Rtx::WifiMaster: "WifiMaster0": TX
burst enabled.
[I] May 22 22:03:44 ndm: Network::Interface::Rtx::WifiMaster: "WifiMaster0": rekey
interval is 3600 sec.
[I] May 22 22:03:44 ndm: Network::Interface::Rtx::WifiMaster: "WifiMaster0": VHT
enabled.
[I] May 22 22:03:44 ndm: Network::Interface::Base: "WifiMaster0": interface is up.
[I] May 22 22:03:44 ndm: Network::Interface::Base: "WifiMaster0/AccessPoint0":
renamed to "AccessPoint".
[I] May 22 22:03:44 ndm: Network::Interface::Base: "WifiMaster0/AccessPoint0":
description saved.
[I] May 22 22:03:44 ndm: Network::Interface::EthernetIp:
"WifiMaster0/AccessPoint0": ACL type unchanged.
[I] May 22 22:03:44 ndm: Network::Interface::Ip: "WifiMaster0/AccessPoint0":
security level set to "private".
[I] May 22 22:03:44 ndm: Network::Interface::Wifi: "WifiMaster0/AccessPoint0": WPA
PSK set.
[I] May 22 22:03:44 ndm: Network::Interface::Rtx::AccessPoint:
"WifiMaster0/AccessPoint0": wireless encryption enabled.
[I] May 22 22:03:44 ndm: Network::Interface::Rtx::AccessPoint:
"WifiMaster0/AccessPoint0": WPA2 enabled.
[I] May 22 22:03:44 ndm: Dhcp::Client: WifiMaster0/AccessPoint0 DHCP client DNS
host routes are enabled.
[I] May 22 22:03:44 ndm: Dhcp::Client: WifiMaster0/AccessPoint0 DHCP name servers
are enabled.
[I] May 22 22:03:44 ndm: Network::Interface::Wireless: "WifiMaster0/AccessPoint0":
SSID saved.
[I] May 22 22:03:44 ndm: Network::Interface::Rtx::AccessPoint:
"WifiMaster0/AccessPoint0": WMM extensions enabled.
[I] May 22 22:03:44 ndm: Network::Interface::Rtx::AccessPoint:
"WifiMaster0/AccessPoint0": RRM enabled.
[I] May 22 22:03:44 ndm: Network::Interface::Rtx::AccessPoint:
"WifiMaster0/AccessPoint0": BTM enabled.
[I] May 22 22:03:44 ndm: Network::Interface::Base: "WifiMaster0/AccessPoint0":
interface is up.
[I] May 22 22:03:44 ndm: Network::Interface::Base: "WifiMaster0/AccessPoint1":
renamed to "GuestWiFi".
[I] May 22 22:03:44 ndm: Network::Interface::Base: "WifiMaster0/AccessPoint1":
description saved.
[I] May 22 22:03:44 ndm: Network::Interface::EthernetIp:
"WifiMaster0/AccessPoint1": ACL type unchanged.
[I] May 22 22:03:44 ndm: Network::Interface::Ip: "WifiMaster0/AccessPoint1":
security level set to "private".
[I] May 22 22:03:44 ndm: Dhcp::Client: WifiMaster0/AccessPoint1 DHCP client DNS
host routes are enabled.
[I] May 22 22:03:44 ndm: Dhcp::Client: WifiMaster0/AccessPoint1 DHCP name servers
are enabled.
[I] May 22 22:03:44 ndm: Network::Interface::Wireless: "WifiMaster0/AccessPoint1":
SSID saved.
[I] May 22 22:03:44 ndm: Network::Interface::Rtx::AccessPoint:
"WifiMaster0/AccessPoint1": WMM extensions enabled.
[I] May 22 22:03:44 ndm: Network::Interface::Base: "WifiMaster0/AccessPoint1":
interface is down.
[I] May 22 22:03:44 ndm: Network::Interface::EthernetIp:
"WifiMaster0/AccessPoint2": ACL type unchanged.
[I] May 22 22:03:44 ndm: Network::Interface::Ip: "WifiMaster0/AccessPoint2":
security level set to "private".
[I] May 22 22:03:44 ndm: Dhcp::Client: WifiMaster0/AccessPoint2 DHCP client DNS
host routes are enabled.
[I] May 22 22:03:44 ndm: Dhcp::Client: WifiMaster0/AccessPoint2 DHCP name servers
are enabled.
[I] May 22 22:03:44 ndm: Network::Interface::Base: "WifiMaster0/AccessPoint2":
interface is down.
[I] May 22 22:03:44 ndm: Network::Interface::EthernetIp:
"WifiMaster0/AccessPoint3": ACL type unchanged.
[I] May 22 22:03:44 ndm: Network::Interface::Ip: "WifiMaster0/AccessPoint3":
security level set to "private".
[I] May 22 22:03:44 ndm: Dhcp::Client: WifiMaster0/AccessPoint3 DHCP client DNS
host routes are enabled.
[I] May 22 22:03:44 ndm: Dhcp::Client: WifiMaster0/AccessPoint3 DHCP name servers
are enabled.
[I] May 22 22:03:44 ndm: Network::Interface::Base: "WifiMaster0/AccessPoint3":
interface is down.
[I] May 22 22:03:44 ndm: Network::Interface::Ip: "WifiMaster0/WifiStation0":
security level set to "public".
[I] May 22 22:03:44 ndm: Network::Interface::Rtx::WifiStation:
"WifiMaster0/WifiStation0": wireless encryption disabled.
[I] May 22 22:03:44 ndm: Dhcp::Client: WifiMaster0/WifiStation0 DHCP client DNS
host routes are enabled.
[I] May 22 22:03:44 ndm: Dhcp::Client: WifiMaster0/WifiStation0 DHCP name servers
are enabled.
[I] May 22 22:03:44 ndm: Network::Interface::Base: "WifiMaster0/WifiStation0":
interface is down.
[I] May 22 22:03:44 ndm: Network::Interface::Rtx::WifiMaster: "WifiMaster1": PHY
mode set.
[I] May 22 22:03:44 ndm: Network::Interface::Rtx::WifiMaster: "WifiMaster1":
channel set to 44.
[I] May 22 22:03:44 ndm: Network::Interface::Rtx::WifiMaster: "WifiMaster1":
channel bandwidth setting applied.
[I] May 22 22:03:44 ndm: Network::Interface::Rtx::WifiMaster: "WifiMaster1": TX
burst enabled.
[I] May 22 22:03:44 ndm: Network::Interface::Rtx::WifiMaster: "WifiMaster1": rekey
interval is 3600 sec.
[I] May 22 22:03:44 ndm: Network::Interface::Rtx::WifiMaster: "WifiMaster1": band
steering enabled.
[I] May 22 22:03:44 ndm: Network::Interface::Rtx::WifiMaster: "WifiMaster1": band
steering preference is 5 GHz.
[I] May 22 22:03:44 ndm: Network::Interface::Rtx::WifiMaster: "WifiMaster1":
explicit beamforming enabled.
[I] May 22 22:03:44 ndm: Network::Interface::Rtx::WifiMaster: "WifiMaster1":
11ac/ax downlink-mumimo enabled.
[I] May 22 22:03:44 ndm: Network::Interface::Base: "WifiMaster1": interface is up.
[I] May 22 22:03:44 ndm: Network::Interface::Base: "WifiMaster1/AccessPoint0":
renamed to "AccessPoint_5G".
[I] May 22 22:03:44 ndm: Network::Interface::Base: "WifiMaster1/AccessPoint0":
description saved.
[I] May 22 22:03:44 ndm: Network::Interface::EthernetIp:
"WifiMaster1/AccessPoint0": ACL type unchanged.
[I] May 22 22:03:44 ndm: Network::Interface::Ip: "WifiMaster1/AccessPoint0":
security level set to "private".
[I] May 22 22:03:44 ndm: Network::Interface::Wifi: "WifiMaster1/AccessPoint0": WPA
PSK set.
[I] May 22 22:03:44 ndm: Network::Interface::Rtx::AccessPoint:
"WifiMaster1/AccessPoint0": wireless encryption enabled.
[I] May 22 22:03:44 ndm: Network::Interface::Rtx::AccessPoint:
"WifiMaster1/AccessPoint0": WPA2 enabled.
[I] May 22 22:03:44 ndm: Dhcp::Client: WifiMaster1/AccessPoint0 DHCP client DNS
host routes are enabled.
[I] May 22 22:03:44 ndm: Dhcp::Client: WifiMaster1/AccessPoint0 DHCP name servers
are enabled.
[I] May 22 22:03:44 ndm: Network::Interface::Wireless: "WifiMaster1/AccessPoint0":
SSID saved.
[I] May 22 22:03:44 ndm: Network::Interface::Rtx::AccessPoint:
"WifiMaster1/AccessPoint0": WMM extensions enabled.
[I] May 22 22:03:44 ndm: Network::Interface::Rtx::AccessPoint:
"WifiMaster1/AccessPoint0": RRM enabled.
[I] May 22 22:03:44 ndm: Network::Interface::Rtx::AccessPoint:
"WifiMaster1/AccessPoint0": BTM enabled.
[I] May 22 22:03:45 kernel: IPv6: ADDRCONF(NETDEV_UP): ra0: link is not ready
[I] May 22 22:03:45 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): ra0: link becomes ready
[I] May 22 22:03:44 ndm: Network::Interface::Base: "WifiMaster1/AccessPoint0":
interface is up.
[I] May 22 22:03:44 ndm: Network::Interface::EthernetIp:
"WifiMaster1/AccessPoint1": ACL type unchanged.
[I] May 22 22:03:44 ndm: Network::Interface::Ip: "WifiMaster1/AccessPoint1":
security level set to "private".
[I] May 22 22:03:44 ndm: Dhcp::Client: WifiMaster1/AccessPoint1 DHCP client DNS
host routes are enabled.
[I] May 22 22:03:44 ndm: Dhcp::Client: WifiMaster1/AccessPoint1 DHCP name servers
are enabled.
[I] May 22 22:03:44 ndm: Network::Interface::Base: "WifiMaster1/AccessPoint1":
interface is down.
[I] May 22 22:03:44 ndm: Network::Interface::EthernetIp:
"WifiMaster1/AccessPoint2": ACL type unchanged.
[I] May 22 22:03:44 ndm: Network::Interface::Ip: "WifiMaster1/AccessPoint2":
security level set to "private".
[I] May 22 22:03:44 ndm: Dhcp::Client: WifiMaster1/AccessPoint2 DHCP client DNS
host routes are enabled.
[I] May 22 22:03:44 ndm: Dhcp::Client: WifiMaster1/AccessPoint2 DHCP name servers
are enabled.
[I] May 22 22:03:44 ndm: Network::Interface::Base: "WifiMaster1/AccessPoint2":
interface is down.
[I] May 22 22:03:44 ndm: Network::Interface::EthernetIp:
"WifiMaster1/AccessPoint3": ACL type unchanged.
[I] May 22 22:03:45 ndm: Network::Interface::Ip: "WifiMaster1/AccessPoint3":
security level set to "private".
[I] May 22 22:03:45 ndm: Dhcp::Client: WifiMaster1/AccessPoint3 DHCP client DNS
host routes are enabled.
[I] May 22 22:03:45 ndm: Dhcp::Client: WifiMaster1/AccessPoint3 DHCP name servers
are enabled.
[I] May 22 22:03:45 ndm: Network::Interface::Base: "WifiMaster1/AccessPoint3":
interface is down.
[I] May 22 22:03:45 ndm: Network::Interface::Ip: "WifiMaster1/WifiStation0":
security level set to "public".
[I] May 22 22:03:45 ndm: Network::Interface::Rtx::WifiStation:
"WifiMaster1/WifiStation0": wireless encryption disabled.
[I] May 22 22:03:45 ndm: Dhcp::Client: WifiMaster1/WifiStation0 DHCP client DNS
host routes are enabled.
[I] May 22 22:03:45 ndm: Dhcp::Client: WifiMaster1/WifiStation0 DHCP name servers
are enabled.
[I] May 22 22:03:45 ndm: Network::Interface::Base: "WifiMaster1/WifiStation0":
interface is down.
[I] May 22 22:03:45 ndm: Network::Interface::Base: "Bridge0": interface is down.
[I] May 22 22:03:45 ndm: Network::Interface::Base: "Bridge0": network MTU reset to
default.
[I] May 22 22:03:45 ndm: Network::Interface::Base: "Bridge0": interface is up.
[I] May 22 22:03:45 ndm: Network::Interface::Repository: "Bridge0" interface
created.
[I] May 22 22:03:46 ndm: Network::Interface::Base: "Bridge0": renamed to "Home".
[I] May 22 22:03:46 ndm: Network::Interface::Base: "Bridge0": description saved.
[I] May 22 22:03:46 kernel: br0: port 1(eth2.1) entered blocking state
[I] May 22 22:03:46 kernel: br0: port 1(eth2.1) entered disabled state
[I] May 22 22:03:46 kernel: device eth2.1 entered promiscuous mode
[I] May 22 22:03:46 kernel: device eth2 entered promiscuous mode
[I] May 22 22:03:46 kernel: br0: port 1(eth2.1) entered blocking state
[I] May 22 22:03:46 kernel: br0: port 1(eth2.1) entered forwarding state
[I] May 22 22:03:46 kernel: br0: disabled STP choke for port 1(eth2.1)
[I] May 22 22:03:46 ndm: Network::Interface::Base: "Bridge0": interface is up.
[I] May 22 22:03:46 ndm: Network::Interface::L3Base: "Bridge0": global priority
unchanged.
[I] May 22 22:03:46 ndm: Network::Interface::L3Base: "Bridge0": global priority
cleared.
[I] May 22 22:03:46 ndm: Network::Interface::Ip: "Bridge0": IP address cleared.
[I] May 22 22:03:46 ndm: Network::Interface::Ip: "Bridge0": IP address cleared.
[I] May 22 22:03:46 ndm: Network::Interface::Mac: "Bridge0": backed up the default
address 50:ff:20:29:9c:1e of "Home" before changing.
[I] May 22 22:03:46 kernel: br0: port 1(eth2.1) entered disabled state
[I] May 22 22:03:46 kernel: br0: port 1(eth2.1) entered blocking state
[I] May 22 22:03:46 kernel: br0: port 1(eth2.1) entered forwarding state
[I] May 22 22:03:46 ndm: Network::Interface::Mac: "Bridge0": MAC address is
50:ff:20:29:9c:1e.
[I] May 22 22:03:46 ndm: Network::Interface::Bridge: "Bridge0":
GigabitEthernet0/Vlan1 inherited in Bridge0.
[I] May 22 22:03:46 kernel: br0: port 2(ra5) entered blocking state
[I] May 22 22:03:46 kernel: br0: port 2(ra5) entered disabled state
[I] May 22 22:03:46 kernel: device ra5 entered promiscuous mode
[I] May 22 22:03:46 kernel: br0: port 2(ra5) entered blocking state
[I] May 22 22:03:46 kernel: br0: port 2(ra5) entered forwarding state
[I] May 22 22:03:47 kernel: br0: disabled STP choke for port 2(ra5)
[I] May 22 22:03:47 kernel: br0: port 2(ra5) entered disabled state
[I] May 22 22:03:47 kernel: br0: port 1(eth2.1) entered disabled state
[I] May 22 22:03:47 kernel: br0: port 2(ra5) entered blocking state
[I] May 22 22:03:47 kernel: br0: port 2(ra5) entered forwarding state
[I] May 22 22:03:47 kernel: br0: port 1(eth2.1) entered blocking state
[I] May 22 22:03:47 kernel: br0: port 1(eth2.1) entered forwarding state
[I] May 22 22:03:47 ndm: Network::Interface::Bridge: "Bridge0": AccessPoint
included.
[I] May 22 22:03:47 kernel: br0: port 3(ra0) entered blocking state
[I] May 22 22:03:47 kernel: br0: port 3(ra0) entered disabled state
[I] May 22 22:03:47 kernel: device ra0 entered promiscuous mode
[I] May 22 22:03:47 kernel: br0: port 3(ra0) entered blocking state
[I] May 22 22:03:47 kernel: br0: port 3(ra0) entered forwarding state
[I] May 22 22:03:47 kernel: br0: disabled STP choke for port 3(ra0)
[I] May 22 22:03:47 kernel: br0: port 3(ra0) entered disabled state
[I] May 22 22:03:47 kernel: br0: port 2(ra5) entered disabled state
[I] May 22 22:03:47 kernel: br0: port 1(eth2.1) entered disabled state
[I] May 22 22:03:47 kernel: br0: port 3(ra0) entered blocking state
[I] May 22 22:03:47 kernel: br0: port 3(ra0) entered forwarding state
[I] May 22 22:03:47 kernel: br0: port 2(ra5) entered blocking state
[I] May 22 22:03:47 kernel: br0: port 2(ra5) entered forwarding state
[I] May 22 22:03:47 kernel: br0: port 1(eth2.1) entered blocking state
[I] May 22 22:03:47 kernel: br0: port 1(eth2.1) entered forwarding state
[I] May 22 22:03:47 ndm: Network::Interface::Bridge: "Bridge0": AccessPoint_5G
included.
[I] May 22 22:03:47 ndm: Network::Interface::EthernetIp: "Bridge0": ACL type
unchanged.
[I] May 22 22:03:47 ndm: Network::Interface::Rtx::MacBand: "Bridge0": bound
d4:5e:ec:6e:1d:13 to 5 GHz.
[I] May 22 22:03:47 ndm: Network::Interface::Rtx::MacBand: "Bridge0": bound
70:3e:ac:58:a6:c7 to 5 GHz.
[I] May 22 22:03:47 ndm: Network::Interface::Rtx::MacBand: "Bridge0": bound
c4:98:80:b7:11:34 to 5 GHz.
[I] May 22 22:03:47 ndm: Network::Interface::Rtx::MacBand: "Bridge0": bound
22:fd:90:7a:6f:12 to 5 GHz.
[I] May 22 22:03:47 ndm: Network::Interface::Ip: "Bridge0": security level set to
"private".
[I] May 22 22:03:47 ndm: Network::Interface::Ip: "Bridge0": IP address is
192.168.1.1/24.
[I] May 22 22:03:47 ndm: Dhcp::Client: Bridge0 DHCP client DNS host routes are
enabled.
[I] May 22 22:03:47 ndm: Dhcp::Client: Bridge0 DHCP name servers are enabled.
[I] May 22 22:03:47 ndm: Igmp::Proxy: added downstream interface Bridge0.
[I] May 22 22:03:47 ndm: Network::Interface::Base: "Bridge0": interface is up.
[I] May 22 22:03:47 ndm: Network::Interface::Base: "Bridge1": interface is down.
[I] May 22 22:03:47 ndm: Network::Interface::Base: "Bridge1": network MTU reset to
default.
[I] May 22 22:03:47 ndm: Network::Interface::Base: "Bridge1": interface is up.
[I] May 22 22:03:47 ndm: Network::Interface::Repository: "Bridge1" interface
created.
[I] May 22 22:03:48 ndm: Network::Interface::Base: "Bridge1": renamed to "Guest".
[I] May 22 22:03:48 ndm: Network::Interface::Base: "Bridge1": description saved.
[I] May 22 22:03:48 ndm: TrafficControl::Manager: "Bridge1" interface rate limited
to 5120 kbit/s.
[I] May 22 22:03:48 kernel: br1: port 1(eth2.3) entered blocking state
[I] May 22 22:03:48 kernel: br1: port 1(eth2.3) entered disabled state
[I] May 22 22:03:48 kernel: device eth2.3 entered promiscuous mode
[I] May 22 22:03:48 kernel: br1: port 1(eth2.3) entered blocking state
[I] May 22 22:03:48 kernel: br1: port 1(eth2.3) entered forwarding state
[I] May 22 22:03:48 kernel: br1: disabled STP choke for port 1(eth2.3)
[I] May 22 22:03:48 ndm: Network::Interface::Bridge: "Bridge1":
GigabitEthernet0/Vlan3 included.
[I] May 22 22:03:48 kernel: br1: port 2(ra6) entered blocking state
[I] May 22 22:03:48 kernel: br1: port 2(ra6) entered disabled state
[I] May 22 22:03:48 kernel: device ra6 entered promiscuous mode
[I] May 22 22:03:48 kernel: br1: disabled STP choke for port 2(ra6)
[I] May 22 22:03:48 ndm: Network::Interface::Bridge: "Bridge1": GuestWiFi included.

[I] May 22 22:03:48 ndm: Network::Interface::EthernetIp: "Bridge1": ACL type


unchanged.
[I] May 22 22:03:48 ndm: Network::Interface::Ip: "Bridge1": security level set to
"protected".
[I] May 22 22:03:48 ndm: Network::Interface::Bridge: "Bridge1": set enhanced
address "52:ff:20:29:9c:1d".
[I] May 22 22:03:48 ndm: Network::Interface::Mac: "GigabitEthernet0/Vlan3": backed
up the default address 50:ff:20:29:9c:1e of "GigabitEthernet0/Vlan3" before
changing.
[I] May 22 22:03:48 kernel: br1: port 1(eth2.3) entered disabled state
[I] May 22 22:03:48 kernel: br1: port 1(eth2.3) entered blocking state
[I] May 22 22:03:48 kernel: br1: port 1(eth2.3) entered forwarding state
[I] May 22 22:03:48 ndm: Network::Interface::Mac: "Bridge1": backed up the default
address 52:ff:20:29:9c:1d of "Guest" before changing.
[I] May 22 22:03:48 kernel: br1: port 1(eth2.3) entered disabled state
[I] May 22 22:03:48 kernel: br1: port 1(eth2.3) entered blocking state
[I] May 22 22:03:48 kernel: br1: port 1(eth2.3) entered forwarding state
[I] May 22 22:03:48 ndm: Network::Interface::Mac: "Bridge1": MAC address is
52:ff:20:29:9c:1d.
[I] May 22 22:03:48 ndm: Network::Interface::Ip: "Bridge1": IP address is
10.1.30.1/24.
[I] May 22 22:03:48 ndm: Dhcp::Client: Bridge1 DHCP client DNS host routes are
enabled.
[I] May 22 22:03:48 ndm: Dhcp::Client: Bridge1 DHCP name servers are enabled.
[I] May 22 22:03:48 ndm: Network::Interface::Base: "Bridge1": interface is up.
[I] May 22 22:03:48 ndm: Network::Interface::Base: "Bridge2": interface is down.
[I] May 22 22:03:48 ndm: Network::Interface::Base: "Bridge2": network MTU reset to
default.
[I] May 22 22:03:48 ndm: Network::Interface::Base: "Bridge2": interface is up.
[I] May 22 22:03:48 ndm: Network::Interface::Repository: "Bridge2" interface
created.
[I] May 22 22:03:49 ndm: Network::Interface::Base: "Bridge2": description saved.
[I] May 22 22:03:49 kernel: br2: port 1(eth2.18) entered blocking state
[I] May 22 22:03:49 kernel: br2: port 1(eth2.18) entered disabled state
[I] May 22 22:03:49 kernel: device eth2.18 entered promiscuous mode
[I] May 22 22:03:49 kernel: br2: port 1(eth2.18) entered blocking state
[I] May 22 22:03:49 kernel: br2: port 1(eth2.18) entered forwarding state
[I] May 22 22:03:49 kernel: br2: disabled STP choke for port 1(eth2.18)
[I] May 22 22:03:49 ndm: Network::Interface::Bridge: "Bridge2":
GigabitEthernet0/Vlan18 included.
[I] May 22 22:03:49 ndm: Network::Interface::EthernetIp: "Bridge2": ACL type
unchanged.
[I] May 22 22:03:49 ndm: Network::Interface::Ip: "Bridge2": security level set to
"protected".
[I] May 22 22:03:49 ndm: Network::Interface::Bridge: "Bridge2": set enhanced
address "52:ff:20:29:9c:1c".
[I] May 22 22:03:49 ndm: Network::Interface::Mac: "GigabitEthernet0/Vlan18": backed
up the default address 50:ff:20:29:9c:1e of "GigabitEthernet0/Vlan18" before
changing.
[I] May 22 22:03:49 kernel: br2: port 1(eth2.18) entered disabled state
[I] May 22 22:03:49 kernel: br2: port 1(eth2.18) entered blocking state
[I] May 22 22:03:49 kernel: br2: port 1(eth2.18) entered forwarding state
[I] May 22 22:03:49 ndm: Network::Interface::Mac: "Bridge2": backed up the default
address 52:ff:20:29:9c:1c of "Bridge2" before changing.
[I] May 22 22:03:49 kernel: br2: port 1(eth2.18) entered disabled state
[I] May 22 22:03:49 kernel: br2: port 1(eth2.18) entered blocking state
[I] May 22 22:03:49 kernel: br2: port 1(eth2.18) entered forwarding state
[I] May 22 22:03:49 ndm: Network::Interface::Mac: "Bridge2": MAC address is
52:ff:20:29:9c:1c.
[I] May 22 22:03:49 ndm: Network::Interface::Ip: "Bridge2": IP address is
10.18.18.0/24.
[I] May 22 22:03:49 ndm: Dhcp::Client: Bridge2 DHCP client DNS host routes are
enabled.
[I] May 22 22:03:49 ndm: Dhcp::Client: Bridge2 DHCP name servers are enabled.
[I] May 22 22:03:49 ndm: Network::Interface::Base: "Bridge2": interface is up.
[I] May 22 22:03:49 ndm: Dhcp::Pool: "_WEBADMIN": assigned IP address range
192.168.1.33 to 192.168.1.152.
[I] May 22 22:03:49 ndm: Dhcp::Server: pool "_WEBADMIN" bound to interface Home.
[I] May 22 22:03:49 ndm: Dhcp::Server: pool "_WEBADMIN" is enabled.
[I] May 22 22:03:49 ndm: Dhcp::Pool: "_WEBADMIN_GUEST_AP": assigned IP address
range 10.1.30.33 to 10.1.30.52.
[I] May 22 22:03:49 ndm: Dhcp::Server: pool "_WEBADMIN_GUEST_AP" bound to interface
Guest.
[I] May 22 22:03:49 ndm: Dhcp::Server: pool "_WEBADMIN_GUEST_AP" is enabled.
[I] May 22 22:03:49 ndm: Dhcp::Server: pool "_WEBADMIN_BRIDGE2" has been created.
[I] May 22 22:03:49 ndm: Dhcp::Pool: "_WEBADMIN_BRIDGE2": assigned IP address range
10.18.18.2 to 10.18.18.41.
[I] May 22 22:03:49 ndm: Dhcp::Pool: "_WEBADMIN_BRIDGE2": set lease time: 25200
seconds.
[I] May 22 22:03:49 ndm: Dhcp::Server: pool "_WEBADMIN_BRIDGE2" bound to interface
Bridge2.
[I] May 22 22:03:49 ndm: Dhcp::Server: pool "_WEBADMIN_BRIDGE2" is enabled.
[I] May 22 22:03:49 ndm: Dhcp::Host: host "00:71:cc:59:fd:73" IP address has been
changed.
[I] May 22 22:03:49 ndm: Dhcp::Server: assigned address 192.168.1.132 to host
"00:71:cc:59:fd:73".
[I] May 22 22:03:49 ndm: Dhcp::Host: host "18:c0:4d:8a:8f:a4" IP address has been
changed.
[I] May 22 22:03:49 ndm: Dhcp::Server: assigned address 192.168.1.111 to host
"18:c0:4d:8a:8f:a4".
[I] May 22 22:03:49 ndm: Dhcp::Host: host "04:42:1a:26:ee:e6" IP address has been
changed.
[I] May 22 22:03:49 ndm: Dhcp::Server: assigned address 192.168.1.11 to host
"04:42:1a:26:ee:e6".
[I] May 22 22:03:49 ndm: Dhcp::Host: host "14:eb:b6:d0:19:dd" IP address has been
changed.
[I] May 22 22:03:49 ndm: Dhcp::Server: assigned address 192.168.1.110 to host
"14:eb:b6:d0:19:dd".
[I] May 22 22:03:49 ndm: Http::Manager: port unchanged.
[I] May 22 22:03:49 ndm: Http::Manager: security level set to private.
[I] May 22 22:03:49 ndm: Http::Manager: bruteforce detection is enabled.
[I] May 22 22:03:49 ndm: Http::Manager: bruteforce detection is reconfigured.
[I] May 22 22:03:49 ndm: Http::Manager: enabled SSL redirect.
[I] May 22 22:03:49 ndm: Network::Nat: a NAT rule added.
[I] May 22 22:03:49 ndm: Core::Syslog: last message repeated 2 times.
[I] May 22 22:03:49 ndm: Network::StaticNat: static NAT rule has been added.
[I] May 22 22:03:49 ndm: Network::StaticNat: static NAT rule disabled.
[I] May 22 22:03:49 ndm: Network::StaticNat: static NAT rule has been added.
[I] May 22 22:03:49 ndm: Network::StaticNat: static NAT rule disabled.
[I] May 22 22:03:49 ndm: Network::StaticNat: static NAT rule has been added.
[I] May 22 22:03:49 ndm: Network::StaticNat: static NAT rule has been added.
[I] May 22 22:03:49 ndm: Telnet::Server: port changed to 1337.
[I] May 22 22:03:49 ndm: Telnet::Server: security level unchanged.
[I] May 22 22:03:49 ndm: Telnet::Server: bruteforce detection is reconfigured.
[I] May 22 22:03:49 ndm: Ftp::Server: port unchanged.
[I] May 22 22:03:49 ndm: Ftp::Server: security level changed to public.
[I] May 22 22:03:49 ndm: Ftp::Server: bruteforce detection is reconfigured.
[I] May 22 22:03:49 ndm: Hotspot::Manager: policy "permit" applied to interface
"Home".
[I] May 22 22:03:49 ndm: Hotspot::Manager: policy "permit" applied to interface
"Guest".
[I] May 22 22:03:49 ndm: Hotspot::Manager: policy "permit" applied to interface
"Bridge2".
[I] May 22 22:03:49 ndm: Hotspot::Manager: rule "permit" applied to host
"ba:e1:8a:58:42:27".
[I] May 22 22:03:49 ndm: Hotspot::Manager: rule "permit" applied to host
"22:fd:90:7a:6f:12".
[I] May 22 22:03:49 ndm: Hotspot::Manager: applied priority "6" to host
"22:fd:90:7a:6f:12".
[I] May 22 22:03:49 ndm: Hotspot::Manager: rule "permit" applied to host
"e2:22:12:8d:52:40".
[I] May 22 22:03:49 ndm: Hotspot::Manager: rule "permit" applied to host
"00:e0:4c:36:02:d4".
[I] May 22 22:03:49 ndm: Hotspot::Manager: rule "permit" applied to host
"18:c0:4d:8a:8f:a4".
[I] May 22 22:03:49 ndm: Hotspot::Manager: applied priority "1" to host
"18:c0:4d:8a:8f:a4".
[I] May 22 22:03:49 ndm: Hotspot::Manager: rule "permit" applied to host
"8e:72:f4:b3:4c:3e".
[I] May 22 22:03:49 ndm: Hotspot::Manager: rule "permit" applied to host
"a4:4b:d5:f3:e4:9f".
[I] May 22 22:03:50 ndm: Hotspot::Manager: rule "permit" applied to host
"70:3e:ac:58:a6:c7".
[I] May 22 22:03:50 ndm: Hotspot::Manager: rule "permit" applied to host
"c4:98:80:b7:11:34".
[I] May 22 22:03:50 ndm: Hotspot::Manager: rule "permit" applied to host
"9a:2e:ea:0a:ec:7a".
[I] May 22 22:03:50 ndm: Hotspot::Manager: rule "permit" applied to host
"d4:5e:ec:6e:1d:13".
[I] May 22 22:03:50 ndm: Hotspot::Manager: applied priority "6" to host
"d4:5e:ec:6e:1d:13".
[I] May 22 22:03:50 ndm: Hotspot::Manager: rule "permit" applied to host
"90:06:28:55:76:af".
[I] May 22 22:03:50 ndm: Hotspot::Manager: rule "permit" applied to host
"00:71:cc:59:fd:73".
[I] May 22 22:03:50 ndm: Hotspot::Manager: rule "permit" applied to host
"04:42:1a:26:ee:e6".
[I] May 22 22:03:50 ndm: Hotspot::Manager: applied priority "6" to host
"04:42:1a:26:ee:e6".
[I] May 22 22:03:50 ndm: Hotspot::Manager: rule "permit" applied to host
"16:eb:b6:d0:19:dd".
[I] May 22 22:03:50 ndm: Hotspot::Manager: rule "permit" applied to host
"00:0c:29:2f:2b:55".
[I] May 22 22:03:50 ndm: Hotspot::Manager: rule "permit" applied to host
"00:0c:29:37:2e:50".
[I] May 22 22:03:50 ndm: Hotspot::Manager: rule "permit" applied to host
"00:0c:29:35:b4:6f".
[I] May 22 22:03:50 ndm: Hotspot::Manager: rule "permit" applied to host
"00:0c:29:d6:7e:3d".
[I] May 22 22:03:50 ndm: Hotspot::Manager: rule "permit" applied to host
"14:eb:b6:d0:19:dd".
[I] May 22 22:03:50 ndm: Hotspot::Manager: applied priority "6" to host
"14:eb:b6:d0:19:dd".
[I] May 22 22:03:50 ndm: Network::Ip6::Subnets: created subnet "Default".
[I] May 22 22:03:50 ndm: Network::Ip6::Subnets: interface "Home" bound to subnet
"Default".
[I] May 22 22:03:50 ndm: Network::Ip6::Subnets: subnet "Default" enabled as SLAAC.
[I] May 22 22:03:50 ndm: Ip6::Firewall: enabled.
[I] May 22 22:03:50 ndm: Network::Interface::Rtx::Ppe: software PPE enabled.
[I] May 22 22:03:50 ndm: Network::Interface::Rtx::Ppe: hardware PPE enabled.
[I] May 22 22:03:50 ndm: Network::Interface::Rtx::Ppe: hardware-ipv6 PPE enabled.
[I] May 22 22:03:50 ndm: UPnP::Manager: using LAN interface: Bridge0.
[I] May 22 22:03:50 ndm: Torrent::Client: RPC port unchanged.
[I] May 22 22:03:50 ndm: Torrent::Client: peer port unchanged.
[I] May 22 22:03:50 ndm: Torrent::Client: peer port changed to 51413.
[I] May 22 22:03:50 ndm: IpSec::CryptoEngineManager: IPsec crypto engine set to
"hardware".
[I] May 22 22:03:50 ndm: IpSec::Manager: "ionline_EY": crypto ike key successfully
added.
[I] May 22 22:03:50 ndm: IpSec::Manager: "ionline_EY": crypto ike proposal
successfully created.
[I] May 22 22:03:50 ndm: IpSec::Manager: "ionline_EY": crypto ike proposal
encryption algorithm "aes-cbc-256" added.
[I] May 22 22:03:50 ndm: IpSec::Manager: "ionline_EY": crypto ike proposal DH group
"2" successfully added.
[I] May 22 22:03:50 ndm: IpSec::Manager: "ionline_EY": crypto ike proposal
integrity algorithm "sha256" successfully added.
[I] May 22 22:03:50 ndm: IpSec::Manager: "ionline_EY": crypto ike policy
successfully created.
[I] May 22 22:03:50 ndm: IpSec::Manager: "ionline_EY": crypto ike proposal
"ionline_EY" successfully added.
[I] May 22 22:03:50 ndm: IpSec::Manager: "ionline_EY": crypto ike policy lifetime
set to 3600 s.
[I] May 22 22:03:50 ndm: IpSec::Manager: "ionline_EY": crypto ike policy mode set
to "ikev2".
[I] May 22 22:03:50 ndm: IpSec::Manager: "ionline_EY": crypto ipsec transform-set
successfully created.
[I] May 22 22:03:50 ndm: IpSec::Manager: "ionline_EY": crypto ipsec transform-set
lifetime set to 3600 s.
[I] May 22 22:03:50 ndm: IpSec::Manager: "ionline_EY": crypto ipsec transform-set
cypher "esp-aes-256" successfully added.
[I] May 22 22:03:50 ndm: IpSec::Manager: "ionline_EY": crypto ipsec transform-set
hmac "esp-sha256-hmac" successfully added.
[I] May 22 22:03:50 ndm: IpSec::Manager: "ionline_EY": crypto ipsec transform-set
dh-group "2" successfully added.
[I] May 22 22:03:50 ndm: IpSec::Manager: "ionline_EY": crypto ipsec profile
successfully created.
[I] May 22 22:03:50 ndm: IpSec::Manager: "ionline_EY": crypto ipsec profile dpd-
interval is set to 30 s.
[I] May 22 22:03:50 ndm: IpSec::Manager: "ionline_EY": crypto ipsec profile
identity-local is set to "7thsorrow.keenetic.pro" with type "fqdn".
[I] May 22 22:03:50 ndm: IpSec::Manager: "ionline_EY": crypto ipsec profile match-
identity-remote is set to "46.32.170.109" with type "address".
[I] May 22 22:03:50 ndm: IpSec::Manager: "ionline_EY": crypto ipsec profile
authentication-local type "pre-share" is set.
[I] May 22 22:03:50 ndm: IpSec::Manager: "ionline_EY": crypto ipsec profile mode
set to "tunnel".
[I] May 22 22:03:50 ndm: IpSec::Manager: "ionline_EY": crypto ipsec profile policy
set to "ionline_EY".
[I] May 22 22:03:50 ndm: IpSec::Manager: MTU is set to auto.
[I] May 22 22:03:50 ndm: IpSec::Manager: "ionline_EY": crypto map successfully
created.
[I] May 22 22:03:50 ndm: IpSec::Manager: "ionline_EY": crypto map primary remote
peer is set to "46.32.170.109".
[I] May 22 22:03:50 ndm: IpSec::Manager: "ionline_EY": crypto map ipsec profile is
set to "ionline_EY".
[I] May 22 22:03:50 ndm: IpSec::Manager: "ionline_EY": crypto map ipsec transform-
set is set to "ionline_EY".
[I] May 22 22:03:50 ndm: IpSec::Manager: "ionline_EY": crypto map match-address set
to "_WEBADMIN_IPSEC_ionline_EY".
[I] May 22 22:03:50 ndm: IpSec::Manager: "ionline_EY": crypto map tcpmss set to
pmtu.
[I] May 22 22:03:50 ndm: IpSec::Manager: "ionline_EY": crypto map autoconnect
enabled.
[I] May 22 22:03:50 ndm: IpSec::Manager: "ionline_EY": crypto map SA renegotiation
enabled.
[I] May 22 22:03:50 ndm: IpSec::Manager: "ionline_EY": crypto map SA passive
reauthentication enabled.
[I] May 22 22:03:50 ndm: IpSec::Manager: "ionline_EY": crypto map Virtual IP mode
disabled.
[I] May 22 22:03:50 ndm: IpSec::ManagerL2tp: "ionline_EY": crypto map L2TP/IPsec
server set LCP echo to "30" : "3".
[I] May 22 22:03:50 ndm: IpSec::ManagerL2tp: "ionline_EY": crypto map L2TP/IPsec
server disabled.
[I] May 22 22:03:50 ndm: IpSec::Manager: "ionline_EY": crypto map enabled.
[I] May 22 22:03:50 ndm: Dhcp::Server: service enabled.
[I] May 22 22:03:50 ndm: Dns::Manager: DNS proxy enabled.
[I] May 22 22:03:50 ndm: Igmp::Proxy: IGMP proxy enabled.
[I] May 22 22:03:50 ndm: Http::Manager: HTTP service was enabled.
[I] May 22 22:03:50 ndm: Telnet::Server: telnet server enabled.
[I] May 22 22:03:50 ndm: Ntp::Server: enabled.
[I] May 22 22:03:50 ndm: Ntp::Client: NTP service enabled.
[I] May 22 22:03:50 ndm: IpSec::Manager: service enabled.
[I] May 22 22:03:50 ndm: Cifs::ServerTsmb: added share "590E-2EB2".
[I] May 22 22:03:50 ndm: Cifs::ServerTsmb: automount enabled.
[I] May 22 22:03:50 ndm: Cifs::ServerTsmb: permissive mode enabled.
[I] May 22 22:03:50 ndm: Dns::Manager: enabled rebind protection.
[I] May 22 22:03:50 ndm: Dns::Secure::ManagerDoh: DNS-over-HTTPS name server
"https://dns.google/dns-query" (dnsm) added.
[I] May 22 22:03:50 ndm: Dns::Filter::Public: associated host "d4:5e:ec:6e:1d:13"
with preset "cloudflare-unfiltered".
[I] May 22 22:03:50 ndm: Dns::Filter::Public: associated host "70:3e:ac:58:a6:c7"
with preset "adguard-default".
[I] May 22 22:03:50 ndm: Dns::Filter::Public: associated host "a4:4b:d5:f3:e4:9f"
with preset "adguard-default".
[I] May 22 22:03:50 ndm: Dns::Filter::Public: associated host "c4:98:80:b7:11:34"
with preset "adguard-default".
[I] May 22 22:03:50 ndm: Dns::Filter::Public: associated host "9a:2e:ea:0a:ec:7a"
with preset "adguard-default".
[I] May 22 22:03:50 ndm: Dns::Filter::Public: associated host "90:06:28:55:76:af"
with preset "adguard-default".
[I] May 22 22:03:50 ndm: Dns::Filter::Public: associated host "ba:e1:8a:58:42:27"
with preset "adguard-default".
[I] May 22 22:03:50 ndm: Dns::Filter::Public: associated host "22:fd:90:7a:6f:12"
with preset "adguard-default".
[I] May 22 22:03:50 ndm: Dns::Manager: enable DNS filter engine "public".
[I] May 22 22:03:50 ndm: Dns::Manager: proxy reload.
[I] May 22 22:03:50 ndm: Dns::Filter::Public: enabled.
[I] May 22 22:03:50 ndm: Mdns::Manager: reflector disabled.
[I] May 22 22:03:50 ndm: Network::InternetChecker: a new check period set to 15
seconds.
[I] May 22 22:03:50 ndm: Network::InternetChecker: a new maximum fail count set to
4.
[I] May 22 22:03:50 ndm: Network::InternetChecker: "google.com" name added.
[I] May 22 22:03:50 ndm: Network::InternetChecker: "facebook.com" name added.
[I] May 22 22:03:50 ndm: Network::InternetChecker: "yahoo.com" name added.
[I] May 22 22:03:50 ndm: EasyConfig::Manager: disabled.
[I] May 22 22:03:50 ndm: Components::Manager: auto-update channel is "stable".
[I] May 22 22:03:50 ndm: CloudControl2::Agent: security level unchanged.
[I] May 22 22:03:50 ndm: Core::Server: system ready, core startup time is 25
seconds.
[I] May 22 22:03:50 ndm: Network::Interface::Switch: "GigabitEthernet0/0": switch
link up at port 1 (100FD/AN).
[I] May 22 22:03:50 ndm: Dns::Secure::DohConfigurator: fallback to built-in DNS to
resolve "dns.google".
[I] May 22 22:03:50 ndm: Network::Interface::Switch: "GigabitEthernet0/2": switch
link up at port 3 (1000FD/AN).
[I] May 22 22:03:52 ndm: Ntp::Client: unable to communicate with "1.pool.ntp.org".
[I] May 22 22:03:52 ndm: Dns::Secure::DohConfigurator: unable to obtain addresses
for "dns.google".
[I] May 22 22:03:52 ndm: Dns::Secure::DohConfigurator: "System": skip service
"https://dns.google/dns-query", wait for bootstrap.
[I] May 22 22:03:52 kernel: br0: port 4(ra9.1) entered blocking state
[I] May 22 22:03:52 kernel: br0: port 4(ra9.1) entered disabled state
[I] May 22 22:03:52 kernel: device ra9.1 entered promiscuous mode
[I] May 22 22:03:52 kernel: device ra9 entered promiscuous mode
[I] May 22 22:03:52 kernel: br0: port 4(ra9.1) entered blocking state
[I] May 22 22:03:52 kernel: br0: port 4(ra9.1) entered forwarding state
[I] May 22 22:03:52 kernel: br0: port 5(ra4.1) entered blocking state
[I] May 22 22:03:52 kernel: br0: port 5(ra4.1) entered disabled state
[I] May 22 22:03:52 kernel: device ra4.1 entered promiscuous mode
[I] May 22 22:03:52 kernel: device ra4 entered promiscuous mode
[I] May 22 22:03:52 kernel: br0: port 5(ra4.1) entered blocking state
[I] May 22 22:03:52 kernel: br0: port 5(ra4.1) entered forwarding state
[I] May 22 22:03:52 ndm: Network::Interface::Rtx::AccessPoint:
"WifiMaster0/AccessPoint0": peer isolation disabled.
[I] May 22 22:03:52 ndm: Network::Interface::Base: "WifiMaster1/AccessPoint0":
schedule cleared.
[I] May 22 22:03:52 ndm: Network::Interface::Wireless: "WifiMaster1/AccessPoint0":
SSID saved.
[I] May 22 22:03:52 ndm: Network::Interface::Rtx::AccessPoint:
"WifiMaster1/AccessPoint0": SSID broadcasting enabled.
[I] May 22 22:03:52 ndm: Network::Interface::Wifi: "WifiMaster1/AccessPoint0": WPA
PSK set.
[I] May 22 22:03:52 ndm: Network::Interface::Rtx::AccessPoint:
"WifiMaster1/AccessPoint0": wireless encryption enabled.
[I] May 22 22:03:52 ndm: Network::Interface::Rtx::AccessPoint:
"WifiMaster1/AccessPoint0": WPA disabled.
[I] May 22 22:03:52 ndm: Network::Interface::Rtx::AccessPoint:
"WifiMaster1/AccessPoint0": WPA2 enabled.
[I] May 22 22:03:52 ndm: Network::Interface::Rtx::AccessPoint:
"WifiMaster1/AccessPoint0": WPA3 disabled.
[I] May 22 22:03:52 ndm: Network::Interface::Rtx::AccessPoint:
"WifiMaster1/AccessPoint0": OWE disabled.
[I] May 22 22:03:52 ndm: Network::Interface::Rtx::AccessPoint:
"WifiMaster1/AccessPoint0": RRM enabled.
[I] May 22 22:03:52 ndm: Network::Interface::Rtx::AccessPoint:
"WifiMaster1/AccessPoint0": BTM enabled.
[I] May 22 22:03:52 ndm: Network::Interface::Rtx::AccessPoint:
"WifiMaster1/AccessPoint0": fast transition disabled.
[I] May 22 22:03:52 ndm: Network::Interface::Rtx::AccessPoint:
"WifiMaster1/AccessPoint0": fast transition MDID reset to default.
[I] May 22 22:03:52 ndm: Network::Interface::Rtx::AccessPoint:
"WifiMaster1/AccessPoint0": peer isolation disabled.
[I] May 22 22:03:52 telnetd: waiting for connections...
[I] May 22 22:03:52 radvd[498]: version 2.15 started
[I] May 22 22:03:53 kernel: br1: port 3(ra9.2) entered blocking state
[I] May 22 22:03:53 kernel: br1: port 3(ra9.2) entered disabled state
[I] May 22 22:03:53 kernel: device ra9.2 entered promiscuous mode
[I] May 22 22:03:53 kernel: br1: port 3(ra9.2) entered blocking state
[I] May 22 22:03:53 kernel: br1: port 3(ra9.2) entered forwarding state
[I] May 22 22:03:53 kernel: br1: port 4(ra4.2) entered blocking state
[I] May 22 22:03:53 kernel: br1: port 4(ra4.2) entered disabled state
[I] May 22 22:03:53 kernel: device ra4.2 entered promiscuous mode
[I] May 22 22:03:53 kernel: br1: port 4(ra4.2) entered blocking state
[I] May 22 22:03:53 kernel: br1: port 4(ra4.2) entered forwarding state
[I] May 22 22:03:53 ndm: Network::Interface::Rtx::AccessPoint:
"WifiMaster0/AccessPoint1": peer isolation disabled.
[I] May 22 22:03:53 kernel: br2: port 2(ra9.3) entered blocking state
[I] May 22 22:03:53 kernel: br2: port 2(ra9.3) entered disabled state
[I] May 22 22:03:53 kernel: device ra9.3 entered promiscuous mode
[I] May 22 22:03:53 kernel: br2: port 2(ra9.3) entered blocking state
[I] May 22 22:03:53 kernel: br2: port 2(ra9.3) entered forwarding state
[I] May 22 22:03:53 kernel: br2: port 3(ra4.3) entered blocking state
[I] May 22 22:03:53 kernel: br2: port 3(ra4.3) entered disabled state
[I] May 22 22:03:53 kernel: device ra4.3 entered promiscuous mode
[I] May 22 22:03:53 kernel: br2: port 3(ra4.3) entered blocking state
[I] May 22 22:03:53 kernel: br2: port 3(ra4.3) entered forwarding state
[I] May 22 22:03:53 ndm: Hotspot::Discovery::Explorer: "Bridge0": Interface Bridge0
IPv4 neighbour explorer started.
[I] May 22 22:03:53 ndm: Hotspot::Discovery::Explorer: "Bridge1": Interface Bridge1
IPv4 neighbour explorer started.
[I] May 22 22:03:53 ndm: Usb::Hotplug::Manager: scanning hardware...
[I] May 22 22:03:53 ndm: Usb::Hotplug::Manager: scanning hardware: done.
[I] May 22 22:03:53 ndm: Http::Manager: disabled NDMP passthrough.
[I] May 22 22:03:53 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/igmpsn.ko.
[I] May 22 22:03:53 kernel: igmpsn: NDM IGMP Switch Snooping Module, v4.3.3
[I] May 22 22:03:53 ndm: Ip6::Discovery::Explorer: "Bridge0": Interface Bridge0
IPv6 neighbour explorer started.
[I] May 22 22:03:53 ndm: Ip6::Discovery::Explorer: "Bridge1": Interface Bridge1
IPv6 neighbour explorer started.
[I] May 22 22:03:53 ndm: Network::Interface::Rtx::WifiMaster: "WifiMaster0": auto
channel mode set.
[I] May 22 22:03:54 ndm: Http::Nginx: loaded SSL certificate for
"a571102056c5831e867aaef8.keenetic.io".
[I] May 22 22:03:54 bndstrg: band steering control daemon v1.0-29 started
[I] May 22 22:03:54 ndm: Http::Nginx: loaded SSL certificate for
"7thsorrow.keenetic.pro".
[I] May 22 22:03:54 ndm: Dns::Secure::DotConfigurator: fallback to built-in DNS to
resolve "dns.adguard-dns.com".
[I] May 22 22:03:55 coalagent: version 0.4.51 starting on 192.168.1.1.
[I] May 22 22:03:55 wind: version 1.0.2 started on br0.
[I] May 22 22:03:55 ndm: Core::Server: started Session /var/run/ndm.core.socket.
[I] May 22 22:03:55 ndm: Core::Session: client disconnected.
[I] May 22 22:03:55 ndm: Http::Manager: updated configuration.
[I] May 22 22:03:55 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/hw_nat.ko.
[I] May 22 22:03:55 kernel: Ralink/MTK HW NAT 5.0.5.0-28 Module Enabled, FoE Size:
16384
[I] May 22 22:03:55 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/fastvpn.ko.
[I] May 22 22:03:55 ndhcps: NDM DHCP Server, v3.2.51.
[I] May 22 22:03:55 kernel: fastvpn: sizeof(bind) = 264
[I] May 22 22:03:55 kernel: fastvpn: sizeof(hashent) = 88
[I] May 22 22:03:55 kernel: fastvpn: registered
[I] May 22 22:03:55 kernel: fastvpn: enabled
[I] May 22 22:03:55 kernel: fastvpn: Fast VPN init, v6.0-14-1
[I] May 22 22:03:55 kernel: fastvpn: PPPoE/IPoE LAN software acceleration is
disabled
[I] May 22 22:03:55 ndhcps: NDM DHCP Server, v3.2.51.
[I] May 22 22:03:55 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/nf_conntrack_sip.ko.
[I] May 22 22:03:55 ndm: Core::Server: started Session /var/run/ndm.core.socket.
[I] May 22 22:03:55 ndhcps: NDM DHCP Server, v3.2.51.
[I] May 22 22:03:55 ndm: Core::Session: client disconnected.
[I] May 22 22:03:55 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/nf_nat_sip.ko.
[I] May 22 22:03:55 coalagent: updating configuration...
[I] May 22 22:03:55 ndm: Core::Server: started Session /var/run/ndm.core.socket.
[I] May 22 22:03:55 ndm: Core::Session: client disconnected.
[I] May 22 22:03:55 ndm: Core::Server: started Session /var/run/ndm.core.socket.
[I] May 22 22:03:55 ndm: Core::Session: client disconnected.
[I] May 22 22:03:55 nimproxy: NDM IGMP/Multicast Proxy, v0.0.36.
[I] May 22 22:03:55 ndm: Ntp::Client: unable to communicate with "2.pool.ntp.org".
[I] May 22 22:03:55 avahi-daemon[521]: avahi-daemon 0.8 starting up.
[I] May 22 22:03:55 kernel: br0: port 3(ra0) entered disabled state
[I] May 22 22:03:56 kernel: br0: port 2(ra5) entered disabled state
[I] May 22 22:03:56 ndm: Dns::Secure::DotConfigurator: unable to obtain addresses
for "dns.adguard-dns.com".
[I] May 22 22:03:56 ndm: Dns::Secure::DotConfigurator: "System": skip service
"dns.adguard-dns.com:853", wait for bootstrap.
[I] May 22 22:03:56 ndm: Dns::Secure::DotConfigurator: fallback to built-in DNS to
resolve "cloudflare-dns.com".
[I] May 22 22:03:56 ndm: IpSec::CryptoEngineManager: start load hardware crypto
processing.
[I] May 22 22:03:56 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/eip93_cryptoapi.ko.
[I] May 22 22:03:57 kernel: EIP93: AES acceleration registered
[I] May 22 22:03:57 kernel: EIP93: DES/3DES acceleration registered
[I] May 22 22:03:57 kernel: EIP93: CryptoAPI started (v 0.11, ring size: 256)
[I] May 22 22:03:57 ndm: IpSec::CryptoEngineManager: hardware crypto processing was
enabled.
[I] May 22 22:03:57 ndm: IpSec::Manager: create IPsec reconfiguration transaction.
[I] May 22 22:03:57 ndm: IpSec::Manager: reconfiguration transaction was created
#1.
[I] May 22 22:03:57 kernel: br0: port 2(ra5) entered blocking state
[I] May 22 22:03:57 kernel: br0: port 2(ra5) entered forwarding state
[I] May 22 22:03:57 kernel: IPv6: ADDRCONF(NETDEV_UP): ra0: link is not ready
[I] May 22 22:03:57 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): ra0: link becomes ready
[I] May 22 22:03:57 kernel: br0: port 3(ra0) entered blocking state
[I] May 22 22:03:57 kernel: br0: port 3(ra0) entered forwarding state
[I] May 22 22:03:57 kernel: IPv6: ADDRCONF(NETDEV_UP): ra9: link is not ready
[I] May 22 22:03:57 kernel: IPv6: ADDRCONF(NETDEV_UP): ra4: link is not ready
[I] May 22 22:03:58 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): ra9: link becomes ready
[I] May 22 22:03:58 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): ra4: link becomes ready
[I] May 22 22:03:58 ndm: Dns::Secure::DotConfigurator: unable to obtain addresses
for "cloudflare-dns.com".
[I] May 22 22:03:58 ndm: Dns::Secure::DotConfigurator: "System": skip service
"cloudflare-dns.com:853", wait for bootstrap.
[I] May 22 22:03:58 ndm: Dns::Secure::DohConfigurator: fallback to built-in DNS to
resolve "dns.google".
[I] May 22 22:04:00 ndm: Dns::Secure::DohConfigurator: unable to obtain addresses
for "dns.google".
[I] May 22 22:04:00 ndm: Dns::Secure::DohConfigurator: "System": skip service
"https://dns.google/dns-query", wait for bootstrap.
[I] May 22 22:04:00 ndm: Dns::Secure::DohConfigurator: fallback to built-in DNS to
resolve "dns.adguard-dns.com".
[I] May 22 22:04:02 ndm: Dns::Secure::DohConfigurator: unable to obtain addresses
for "dns.adguard-dns.com".
[I] May 22 22:04:02 ndm: Dns::Secure::DohConfigurator: "System": skip service
"https://dns.adguard-dns.com/dns-query", wait for bootstrap.
[I] May 22 22:04:02 ndm: Dns::Secure::DohConfigurator: fallback to built-in DNS to
resolve "cloudflare-dns.com".
[I] May 22 22:04:03 kernel: ACS result: Primary Channel 7, Min Channel Busy = 14,
BW = 20
[I] May 22 22:04:03 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster0/AccessPoint0": BSS(ra5) channel switched to 7.
[I] May 22 22:04:04 ndm: Dns::Secure::DohConfigurator: unable to obtain addresses
for "cloudflare-dns.com".
[I] May 22 22:04:04 ndm: Dns::Secure::DohConfigurator: "System": skip service
"https://cloudflare-dns.com/dns-query", wait for bootstrap.
[I] May 22 22:04:04 ndnproxy: stopped.
[I] May 22 22:04:04 ndm: Dns::Secure::DotConfigurator: fallback to built-in DNS to
resolve "dns.adguard-dns.com".
[I] May 22 22:04:04 ndm: Core::Server: started Session /var/run/ndm.core.socket.
[I] May 22 22:04:04 ndm: Core::Session: client disconnected.
[I] May 22 22:04:05 kernel: capability: warning: `nginx' uses 32-bit capabilities
(legacy support in use)
[I] May 22 22:04:05 ndm: Ntp::Client: unable to communicate with "3.pool.ntp.org".
[I] May 22 22:04:06 ndm: Dns::Secure::DotConfigurator: unable to obtain addresses
for "dns.adguard-dns.com".
[I] May 22 22:04:06 ndm: Dns::Secure::DotConfigurator: fallback to built-in DNS to
resolve "cloudflare-dns.com".
[I] May 22 22:04:06 ndnproxy: NDM DNS Proxy, v1.3.0b55-1.
[I] May 22 22:04:06 ndnproxy: PID file: /var/ndnproxymain.pid.
[I] May 22 22:04:06 ndnproxy: stats. file: /var/ndnproxymain.stat.
[I] May 22 22:04:08 ndm: Dns::Secure::DotConfigurator: unable to obtain addresses
for "cloudflare-dns.com".
[I] May 22 22:04:08 ndm: Dns::Manager: rescheduling DNS-over-TLS bootstrap.
[I] May 22 22:04:08 ndm: Dns::Secure::DohConfigurator: fallback to built-in DNS to
resolve "dns.google".
[I] May 22 22:04:10 ndm: Dns::Secure::DohConfigurator: unable to obtain addresses
for "dns.google".
[I] May 22 22:04:10 ndm: Dns::Secure::DohConfigurator: fallback to built-in DNS to
resolve "dns.adguard-dns.com".
[I] May 22 22:04:12 ndm: Dns::Secure::DohConfigurator: unable to obtain addresses
for "dns.adguard-dns.com".
[I] May 22 22:04:12 ndm: Dns::Secure::DohConfigurator: fallback to built-in DNS to
resolve "cloudflare-dns.com".
[I] May 22 22:04:14 ndm: Dns::Secure::DohConfigurator: unable to obtain addresses
for "cloudflare-dns.com".
[I] May 22 22:04:14 ndm: Dns::Manager: rescheduling DNS-over-HTTPS bootstrap.
[I] May 22 22:04:14 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/nf_conntrack_ftp.ko.
[I] May 22 22:04:14 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-
5/nf_nat_ftp.ko.
[I] May 22 22:04:14 bndstrg: band steering: finished
[I] May 22 22:04:15 ndm: Network::Interface::Base: "WifiMaster1/AccessPoint0":
schedule cleared.
[I] May 22 22:04:15 ndm: Network::Interface::Wireless: "WifiMaster1/AccessPoint0":
SSID saved.
[I] May 22 22:04:15 ndm: Network::Interface::Rtx::AccessPoint:
"WifiMaster1/AccessPoint0": SSID broadcasting enabled.
[I] May 22 22:04:15 ndm: Network::Interface::Wifi: "WifiMaster1/AccessPoint0": WPA
PSK set.
[I] May 22 22:04:15 ndm: Network::Interface::Rtx::AccessPoint:
"WifiMaster1/AccessPoint0": wireless encryption enabled.
[I] May 22 22:04:15 ndm: Network::Interface::Rtx::AccessPoint:
"WifiMaster1/AccessPoint0": WPA disabled.
[I] May 22 22:04:15 ndm: Network::Interface::Rtx::AccessPoint:
"WifiMaster1/AccessPoint0": WPA2 enabled.
[I] May 22 22:04:15 ndm: Network::Interface::Rtx::AccessPoint:
"WifiMaster1/AccessPoint0": WPA3 disabled.
[I] May 22 22:04:15 ndm: Network::Interface::Rtx::AccessPoint:
"WifiMaster1/AccessPoint0": OWE disabled.
[I] May 22 22:04:15 ndm: Network::Interface::Rtx::AccessPoint:
"WifiMaster1/AccessPoint0": RRM enabled.
[I] May 22 22:04:15 ndm: Network::Interface::Rtx::AccessPoint:
"WifiMaster1/AccessPoint0": BTM enabled.
[I] May 22 22:04:15 ndm: Network::Interface::Rtx::AccessPoint:
"WifiMaster1/AccessPoint0": fast transition disabled.
[I] May 22 22:04:15 ndm: Network::Interface::Rtx::AccessPoint:
"WifiMaster1/AccessPoint0": fast transition MDID reset to default.
[I] May 22 22:04:15 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(14:eb:b6:d0:19:de) had associated successfully.
[I] May 22 22:04:15 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(14:eb:b6:d0:19:de) set key done in WPA2/WPA2PSK.
[I] May 22 22:04:16 ndm: IpSec::Manager: create IPsec reconfiguration transaction.
[I] May 22 22:04:17 ndm: IpSec::Manager: "ionline_EY": add crypto map config.
[I] May 22 22:04:17 ndm: IpSec::Manager: reconfiguration transaction was created
#1.
[I] May 22 22:04:17 bndstrg: band steering control daemon v1.0-29 started
[I] May 22 22:04:17 ndm: IpSec::Configurator: start applying configuration #1.
[I] May 22 22:04:17 ndm: IpSec::CryptoMapInfo: "ionline_EY": initialized runtime
info #11.
[I] May 22 22:04:17 ndm: IpSec::Configurator: configuration applied #1.
[I] May 22 22:04:17 ndm: IpSec::IpSecNetfilter: start reloading netfilter
configuration...
[I] May 22 22:04:17 ndm: IpSec::IpSecNetfilter: netfilter configuration reloading
is done.
[I] May 22 22:04:17 ndhcps: DHCPDISCOVER received from 14:eb:b6:d0:19:dd.
[I] May 22 22:04:17 ndhcps: making OFFER of 192.168.1.110 to 14:eb:b6:d0:19:dd.
[I] May 22 22:04:17 ndhcps: DHCPREQUEST received (STATE_SELECTING) for
192.168.1.110 from 14:eb:b6:d0:19:dd.
[I] May 22 22:04:17 ndm: Ntp::Client: unable to communicate with "0.pool.ntp.org".
[I] May 22 22:04:18 ndhcps: sending ACK of 192.168.1.110 to 14:eb:b6:d0:19:dd.
[I] May 22 22:04:18 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had associated successfully.
[I] May 22 22:04:18 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 22 22:04:18 ndhcps: DHCPREQUEST received (STATE_INIT) for 192.168.1.35 from
22:fd:90:7a:6f:12.
[I] May 22 22:04:18 ndhcps: sending ACK of 192.168.1.35 to 22:fd:90:7a:6f:12.
[I] May 22 22:04:19 bndstrg: band steering: enabled
[I] May 22 22:04:19 ipsec: Starting strongSwan 5.9.7 IPsec [starter]...
[I] May 22 22:04:19 ipsec: 00[DMN] Starting IKE charon daemon (strongSwan 5.9.7,
Linux 4.9-ndm-5, mips)
[I] May 22 22:04:19 ipsec: 00[LIB] providers loaded by OpenSSL: legacy default
[I] May 22 22:04:19 ipsec: 00[CFG] loading secrets
[I] May 22 22:04:19 ipsec: 00[CFG] loaded 1 RADIUS server configuration
[I] May 22 22:04:19 ipsec: 00[CFG] enabling systime-fix, threshold: Tue Jan 1
00:00:00 2030
[I] May 22 22:04:19 ipsec: 00[CFG]
[I] May 22 22:04:19 ipsec: 00[CFG] starting system time check, interval: 10s
[I] May 22 22:04:19 ipsec: 00[LIB] loaded plugins: charon ndm-pem random save-keys
nonce x509 pubkey pkcs7 pem openssl pkcs8 xcbc cmac hmac ctr attr kernel-netlink
resolve socket-default stroke vici updown eap-identity eap-md5 eap-mschapv2 eap-
dynamic eap-radius eap-peap xauth-generic xauth-eap error-notify systime-fix unity
counters
[I] May 22 22:04:19 ipsec: 00[LIB] dropped capabilities, running as uid 65534, gid
65534
[I] May 22 22:04:19 ndm: Io::UnixStreamSocket: connected after 6 retries.
[I] May 22 22:04:19 ipsec: 15[CFG] loaded IKE shared key with id 'ionline_EY-PSK'
for: '7thsorrow.keenetic.pro', '46.32.170.109'
[I] May 22 22:04:19 ipsec: 09[CFG] loaded 0 entries for attr plugin configuration
[I] May 22 22:04:19 ipsec: 09[CFG] loaded 1 RADIUS server configuration
[I] May 22 22:04:19 ipsec: 15[CFG] added vici connection: ionline_EY
[I] May 22 22:04:19 ipsec: 15[CFG] initiating 'ionline_EY'
[I] May 22 22:04:19 ipsec: 15[IKE] initiating IKE_SA ionline_EY[1] to 46.32.170.109

[I] May 22 22:04:19 ipsec: 15[IKE] unable to determine source address, faking NAT
situation
[I] May 22 22:04:20 ndm: Network::Interface::Ethernet: "GigabitEthernet1": link up
(100FD/AN).
[I] May 22 22:04:20 ndm: Dns::Secure::DotConfigurator: fallback to built-in DNS to
resolve "dns.adguard-dns.com".
[I] May 22 22:04:22 ndhcpc: GigabitEthernet1: NDM DHCP Client, v3.2.51.
[I] May 22 22:04:22 ndhcpc: GigabitEthernet1: created PID file "/var/run/ndhcpc-
eth3.pid".
[I] May 22 22:04:22 ndm: Dns::Secure::DotConfigurator: unable to obtain addresses
for "dns.adguard-dns.com".
[I] May 22 22:04:22 ndm: Dns::Secure::DotConfigurator: fallback to built-in DNS to
resolve "cloudflare-dns.com".
[I] May 22 22:04:24 ndm: Dns::Secure::DotConfigurator: unable to obtain addresses
for "cloudflare-dns.com".
[I] May 22 22:04:24 ndm: Dns::Manager: rescheduling DNS-over-TLS bootstrap.
[I] May 22 22:04:24 ndm: Dns::Secure::DohConfigurator: fallback to built-in DNS to
resolve "dns.google".
[I] May 22 22:04:26 ndm: Dns::Secure::DohConfigurator: unable to obtain addresses
for "dns.google".
[I] May 22 22:04:26 ndm: Dns::Secure::DohConfigurator: fallback to built-in DNS to
resolve "dns.adguard-dns.com".
[I] May 22 22:04:27 ipsec: 03[IKE] retransmit 1 of request with message ID 0
[I] May 22 22:04:28 ndm: Dns::Secure::DohConfigurator: unable to obtain addresses
for "dns.adguard-dns.com".
[I] May 22 22:04:28 ndm: Dns::Secure::DohConfigurator: fallback to built-in DNS to
resolve "cloudflare-dns.com".
[I] May 22 22:04:30 ndm: Dns::Secure::DohConfigurator: unable to obtain addresses
for "cloudflare-dns.com".
[I] May 22 22:04:30 ndm: Dns::Manager: rescheduling DNS-over-HTTPS bootstrap.
[I] May 22 22:04:36 ndm: Dns::Secure::DotConfigurator: fallback to built-in DNS to
resolve "dns.adguard-dns.com".
[I] May 22 22:04:38 ndm: Dns::Secure::DotConfigurator: unable to obtain addresses
for "dns.adguard-dns.com".
[I] May 22 22:04:38 ndm: Dns::Secure::DotConfigurator: fallback to built-in DNS to
resolve "cloudflare-dns.com".
[I] May 22 22:04:39 ipsec: 08[IKE] retransmit 2 of request with message ID 0
[I] May 22 22:04:40 ndm: Dns::Secure::DotConfigurator: unable to obtain addresses
for "cloudflare-dns.com".
[I] May 22 22:04:40 ndm: Dns::Manager: rescheduling DNS-over-TLS bootstrap.
[I] May 22 22:04:40 ndm: Dns::Secure::DohConfigurator: fallback to built-in DNS to
resolve "dns.google".
[I] May 22 22:04:42 ndm: Dns::Secure::DohConfigurator: unable to obtain addresses
for "dns.google".
[I] May 22 22:04:42 ndm: Dns::Secure::DohConfigurator: fallback to built-in DNS to
resolve "dns.adguard-dns.com".
[I] May 22 22:04:44 ndm: Dns::Secure::DohConfigurator: unable to obtain addresses
for "dns.adguard-dns.com".
[I] May 22 22:04:44 ndm: Dns::Secure::DohConfigurator: fallback to built-in DNS to
resolve "cloudflare-dns.com".
[I] May 22 22:04:46 ndm: Dns::Secure::DohConfigurator: unable to obtain addresses
for "cloudflare-dns.com".
[I] May 22 22:04:46 ndm: Dns::Manager: rescheduling DNS-over-HTTPS bootstrap.
[I] May 22 22:04:49 ipsec: 05[IKE] retransmit 3 of request with message ID 0
[I] May 22 22:04:52 ndm: Dns::Secure::DotConfigurator: fallback to built-in DNS to
resolve "dns.adguard-dns.com".
[I] May 22 22:04:54 ndm: Dns::Secure::DotConfigurator: unable to obtain addresses
for "dns.adguard-dns.com".
[I] May 22 22:04:54 ndm: Dns::Secure::DotConfigurator: fallback to built-in DNS to
resolve "cloudflare-dns.com".
[I] May 22 22:04:56 ndm: Dns::Secure::DotConfigurator: unable to obtain addresses
for "cloudflare-dns.com".
[I] May 22 22:04:56 ndm: Dns::Manager: rescheduling DNS-over-TLS bootstrap.
[I] May 22 22:04:56 ndm: Dns::Secure::DohConfigurator: fallback to built-in DNS to
resolve "dns.google".
[I] May 22 22:04:58 ndm: Dns::Secure::DohConfigurator: unable to obtain addresses
for "dns.google".
[I] May 22 22:04:58 ndm: Dns::Secure::DohConfigurator: fallback to built-in DNS to
resolve "dns.adguard-dns.com".
[I] May 22 22:04:59 ndm: Network::Interface::Switch: "GigabitEthernet0/2": switch
link down at port 3.
[I] May 22 22:05:00 ipsec: 03[IKE] retransmit 4 of request with message ID 0
[I] May 22 22:05:00 ndm: Dns::Secure::DohConfigurator: unable to obtain addresses
for "dns.adguard-dns.com".
[I] May 22 22:05:00 ndm: Dns::Secure::DohConfigurator: fallback to built-in DNS to
resolve "cloudflare-dns.com".
[I] May 22 22:05:02 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had disassociated by STA
(reason: STA is leaving or has left BSS).
[I] May 22 22:05:02 ndm: Dns::Secure::DohConfigurator: unable to obtain addresses
for "cloudflare-dns.com".
[I] May 22 22:05:02 ndm: Dns::Manager: rescheduling DNS-over-HTTPS bootstrap.
[I] May 22 22:05:04 ndm: Network::Interface::Switch: "GigabitEthernet0/2": switch
link up at port 3 (1000FD/AN).
[I] May 22 22:05:04 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster0/AccessPoint0": STA(c8:3d:dc:ae:52:77) had associated successfully.
[I] May 22 22:05:05 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster0/AccessPoint0": STA(c8:3d:dc:ae:52:77) set key done in WPA2/WPA2PSK.
[I] May 22 22:05:05 ndhcps: DHCPDISCOVER received from c8:3d:dc:ae:52:77.
[I] May 22 22:05:05 ndhcps: making OFFER of 192.168.1.88 to c8:3d:dc:ae:52:77.
[I] May 22 22:05:05 ndhcps: DHCPREQUEST received (STATE_SELECTING) for 192.168.1.88
from c8:3d:dc:ae:52:77.
[I] May 22 22:05:05 ndhcps: sending ACK of 192.168.1.88 to c8:3d:dc:ae:52:77.
[I] May 22 22:05:08 ndm: Dns::Secure::DotConfigurator: fallback to built-in DNS to
resolve "dns.adguard-dns.com".
[I] May 22 22:05:10 ndm: Dns::Secure::DotConfigurator: unable to obtain addresses
for "dns.adguard-dns.com".
[I] May 22 22:05:10 ndm: Dns::Secure::DotConfigurator: fallback to built-in DNS to
resolve "cloudflare-dns.com".
[I] May 22 22:05:11 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(a4:4b:d5:f3:e4:9f) had associated successfully.
[I] May 22 22:05:11 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(a4:4b:d5:f3:e4:9f) set key done in WPA2/WPA2PSK.
[I] May 22 22:05:11 ndhcps: DHCPDISCOVER received from a4:4b:d5:f3:e4:9f.
[I] May 22 22:05:11 ipsec: 03[IKE] retransmit 5 of request with message ID 0
[I] May 22 22:05:12 ndhcps: making OFFER of 192.168.1.80 to a4:4b:d5:f3:e4:9f.
[I] May 22 22:05:12 ndhcps: DHCPREQUEST received (STATE_SELECTING) for 192.168.1.80
from a4:4b:d5:f3:e4:9f.
[I] May 22 22:05:12 ndhcps: sending ACK of 192.168.1.80 to a4:4b:d5:f3:e4:9f.
[I] May 22 22:05:12 ndm: Dns::Secure::DotConfigurator: unable to obtain addresses
for "cloudflare-dns.com".
[I] May 22 22:05:12 ndm: Dns::Manager: rescheduling DNS-over-TLS bootstrap.
[I] May 22 22:05:12 ndm: Dns::Secure::DohConfigurator: fallback to built-in DNS to
resolve "dns.google".
[I] May 22 22:05:14 ndm: Dns::Secure::DohConfigurator: unable to obtain addresses
for "dns.google".
[I] May 22 22:05:14 ndm: Dns::Secure::DohConfigurator: fallback to built-in DNS to
resolve "dns.adguard-dns.com".
[I] May 22 22:05:16 ndm: Dns::Secure::DohConfigurator: unable to obtain addresses
for "dns.adguard-dns.com".
[I] May 22 22:05:16 ndm: Dns::Secure::DohConfigurator: fallback to built-in DNS to
resolve "cloudflare-dns.com".
[I] May 22 22:05:17 ndm: Network::Interface::Switch: "GigabitEthernet0/2": switch
link down at port 3.
[I] May 22 22:05:18 ndm: Dns::Secure::DohConfigurator: unable to obtain addresses
for "cloudflare-dns.com".
[I] May 22 22:05:18 ndm: Dns::Manager: rescheduling DNS-over-HTTPS bootstrap.
[I] May 22 22:05:20 ndm: Network::Interface::Switch: "GigabitEthernet0/2": switch
link up at port 3 (1000FD/AN).
[I] May 22 22:05:21 ndhcps: DHCPREQUEST received (STATE_INIT) for 192.168.1.11 from
04:42:1a:26:ee:e6.
[I] May 22 22:05:21 ndhcps: sending ACK of 192.168.1.11 to 04:42:1a:26:ee:e6.
[I] May 22 22:05:24 ipsec: 09[IKE] retransmit 6 of request with message ID 0
[I] May 22 22:05:24 ndm: Dns::Secure::DotConfigurator: fallback to built-in DNS to
resolve "dns.adguard-dns.com".
[I] May 22 22:05:26 ndm: Dns::Secure::DotConfigurator: unable to obtain addresses
for "dns.adguard-dns.com".
[I] May 22 22:05:26 ndm: Dns::Secure::DotConfigurator: fallback to built-in DNS to
resolve "cloudflare-dns.com".
[I] May 22 22:05:28 ndm: Dns::Secure::DotConfigurator: unable to obtain addresses
for "cloudflare-dns.com".
[I] May 22 22:05:28 ndm: Dns::Manager: rescheduling DNS-over-TLS bootstrap.
[I] May 22 22:05:28 ndm: Dns::Secure::DohConfigurator: fallback to built-in DNS to
resolve "dns.google".
[I] May 22 22:05:30 ndm: Dns::Secure::DohConfigurator: unable to obtain addresses
for "dns.google".
[I] May 22 22:05:30 ndm: Dns::Secure::DohConfigurator: fallback to built-in DNS to
resolve "dns.adguard-dns.com".
[I] May 22 22:05:32 ndm: Dns::Secure::DohConfigurator: unable to obtain addresses
for "dns.adguard-dns.com".
[I] May 22 22:05:32 ndm: Dns::Secure::DohConfigurator: fallback to built-in DNS to
resolve "cloudflare-dns.com".
[I] May 22 22:05:34 ndm: Dns::Secure::DohConfigurator: unable to obtain addresses
for "cloudflare-dns.com".
[I] May 22 22:05:34 ndm: Dns::Manager: rescheduling DNS-over-HTTPS bootstrap.
[I] May 22 22:05:39 ipsec: 14[IKE] retransmit 7 of request with message ID 0
[I] May 22 22:05:40 ndm: Dns::Secure::DotConfigurator: fallback to built-in DNS to
resolve "dns.adguard-dns.com".
[I] May 22 22:05:42 ndm: Dns::Secure::DotConfigurator: unable to obtain addresses
for "dns.adguard-dns.com".
[I] May 22 22:05:42 ndm: Dns::Secure::DotConfigurator: fallback to built-in DNS to
resolve "cloudflare-dns.com".
[I] May 22 22:05:44 ndm: Dns::Secure::DotConfigurator: unable to obtain addresses
for "cloudflare-dns.com".
[I] May 22 22:05:44 ndm: Dns::Manager: rescheduling DNS-over-TLS bootstrap.
[I] May 22 22:05:44 ndm: Dns::Secure::DohConfigurator: fallback to built-in DNS to
resolve "dns.google".
[I] May 22 22:05:46 ndm: Dns::Secure::DohConfigurator: unable to obtain addresses
for "dns.google".
[I] May 22 22:05:46 ndm: Dns::Secure::DohConfigurator: fallback to built-in DNS to
resolve "dns.adguard-dns.com".
[I] May 22 22:05:48 ndm: Dns::Secure::DohConfigurator: unable to obtain addresses
for "dns.adguard-dns.com".
[I] May 22 22:05:48 ndm: Dns::Secure::DohConfigurator: fallback to built-in DNS to
resolve "cloudflare-dns.com".
[I] May 22 22:05:50 ndm: Dns::Secure::DohConfigurator: unable to obtain addresses
for "cloudflare-dns.com".
[I] May 22 22:05:50 ndm: Dns::Manager: rescheduling DNS-over-HTTPS bootstrap.
[E] May 22 22:05:53 ndm: Core::Ndss: [669] no internet connection.
[I] May 22 22:05:54 ipsec: 11[IKE] retransmit 8 of request with message ID 0
[I] May 22 22:05:56 ndm: Dns::Secure::DotConfigurator: fallback to built-in DNS to
resolve "dns.adguard-dns.com".
[I] May 22 22:05:58 ndm: Dns::Secure::DotConfigurator: unable to obtain addresses
for "dns.adguard-dns.com".
[I] May 22 22:05:58 ndm: Dns::Secure::DotConfigurator: fallback to built-in DNS to
resolve "cloudflare-dns.com".
[I] May 22 22:06:00 ndm: Dns::Secure::DotConfigurator: unable to obtain addresses
for "cloudflare-dns.com".
[I] May 22 22:06:00 ndm: Dns::Manager: rescheduling DNS-over-TLS bootstrap.
[I] May 22 22:06:00 ndm: Dns::Secure::DohConfigurator: fallback to built-in DNS to
resolve "dns.google".
[I] May 22 22:06:02 ndm: Dns::Secure::DohConfigurator: unable to obtain addresses
for "dns.google".
[I] May 22 22:06:02 ndm: Dns::Secure::DohConfigurator: fallback to built-in DNS to
resolve "dns.adguard-dns.com".
[I] May 22 22:06:04 ndm: Dns::Secure::DohConfigurator: unable to obtain addresses
for "dns.adguard-dns.com".
[I] May 22 22:06:04 ndm: Dns::Secure::DohConfigurator: fallback to built-in DNS to
resolve "cloudflare-dns.com".
[I] May 22 22:06:06 ndm: Dns::Secure::DohConfigurator: unable to obtain addresses
for "cloudflare-dns.com".
[I] May 22 22:06:06 ndm: Dns::Manager: rescheduling DNS-over-HTTPS bootstrap.
[I] May 22 22:06:11 ipsec: 09[IKE] giving up after 8 retransmits
[E] May 22 22:06:11 ndm: IpSec::Configurator: "ionline_EY": remote peer is down.
[I] May 22 22:06:11 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 0, active CHILD SA: 0, down.
[W] May 22 22:06:11 ndm: IpSec::Configurator: "ionline_EY": fallback peer is not
defined, retry.
[I] May 22 22:06:11 ndm: IpSec::Configurator: "ionline_EY": schedule reconnect.
[I] May 22 22:06:11 ipsec: 09[IKE] establishing IKE_SA failed, peer not responding
[I] May 22 22:06:12 ndm: Dns::Secure::DotConfigurator: fallback to built-in DNS to
resolve "dns.adguard-dns.com".
[I] May 22 22:06:14 ndm: Dns::Secure::DotConfigurator: unable to obtain addresses
for "dns.adguard-dns.com".
[I] May 22 22:06:14 ndm: Dns::Secure::DotConfigurator: fallback to built-in DNS to
resolve "cloudflare-dns.com".
[I] May 22 22:06:16 ndm: Dns::Secure::DotConfigurator: unable to obtain addresses
for "cloudflare-dns.com".
[I] May 22 22:06:16 ndm: Dns::Manager: rescheduling DNS-over-TLS bootstrap.
[I] May 22 22:06:16 ndm: Dns::Secure::DohConfigurator: fallback to built-in DNS to
resolve "dns.google".
[I] May 22 22:06:18 ndm: Dns::Secure::DohConfigurator: unable to obtain addresses
for "dns.google".
[I] May 22 22:06:18 ndm: Dns::Secure::DohConfigurator: fallback to built-in DNS to
resolve "dns.adguard-dns.com".
[I] May 22 22:06:20 ndm: Dns::Secure::DohConfigurator: unable to obtain addresses
for "dns.adguard-dns.com".
[I] May 22 22:06:20 ndm: Dns::Secure::DohConfigurator: fallback to built-in DNS to
resolve "cloudflare-dns.com".
[I] May 22 22:06:22 ndm: Dns::Secure::DohConfigurator: unable to obtain addresses
for "cloudflare-dns.com".
[I] May 22 22:06:22 ndm: Dns::Manager: rescheduling DNS-over-HTTPS bootstrap.
[I] May 22 22:06:28 ndm: Dns::Secure::DotConfigurator: fallback to built-in DNS to
resolve "dns.adguard-dns.com".
[I] May 22 22:06:30 ndm: Dns::Secure::DotConfigurator: unable to obtain addresses
for "dns.adguard-dns.com".
[I] May 22 22:06:30 ndm: Dns::Secure::DotConfigurator: fallback to built-in DNS to
resolve "cloudflare-dns.com".
[I] May 22 22:06:32 ndm: Dns::Secure::DotConfigurator: unable to obtain addresses
for "cloudflare-dns.com".
[I] May 22 22:06:32 ndm: Dns::Manager: rescheduling DNS-over-TLS bootstrap.
[I] May 22 22:06:32 ndm: Dns::Secure::DohConfigurator: fallback to built-in DNS to
resolve "dns.google".
[I] May 22 22:06:33 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster0/AccessPoint0": STA(c8:3d:dc:ae:52:77) had deauthenticated by STA
(reason: STA is leaving or has left BSS).
[I] May 22 22:06:34 ndm: Dns::Secure::DohConfigurator: unable to obtain addresses
for "dns.google".
[I] May 22 22:06:34 ndm: Dns::Secure::DohConfigurator: fallback to built-in DNS to
resolve "dns.adguard-dns.com".
[I] May 22 22:06:36 ndhcpc: GigabitEthernet1: received OFFER for 78.109.53.15 from
37.26.63.129.
[I] May 22 22:06:36 ndm: Dns::Secure::DohConfigurator: unable to obtain addresses
for "dns.adguard-dns.com".
[I] May 22 22:06:36 ndm: Dns::Secure::DohConfigurator: fallback to built-in DNS to
resolve "cloudflare-dns.com".
[I] May 22 22:06:38 ndm: Dns::Secure::DohConfigurator: unable to obtain addresses
for "cloudflare-dns.com".
[I] May 22 22:06:38 ndm: Dns::Manager: rescheduling DNS-over-HTTPS bootstrap.
[I] May 22 22:06:44 ndm: Dns::Secure::DotConfigurator: fallback to built-in DNS to
resolve "dns.adguard-dns.com".
[I] May 22 22:06:46 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 22 22:06:46 ndm: Dhcp::Client: configuring interface ISP.
[I] May 22 22:06:46 ndm: Network::Interface::Ip: "GigabitEthernet1": IP address is
78.109.53.15/26.
[I] May 22 22:06:46 ndm: Dhcp::Client: obtained IP address 78.109.53.15/26.
[I] May 22 22:06:46 ndm: Dhcp::Client: interface "ISP" is global, priority 63507.
[I] May 22 22:06:46 ndm: Dhcp::Client: adding a default route via 78.109.53.1.
[I] May 22 22:06:46 ndm: Dns::Secure::DotConfigurator: unable to obtain addresses
for "dns.adguard-dns.com".
[I] May 22 22:06:46 ndm: Dns::Secure::DotConfigurator: fallback to built-in DNS to
resolve "cloudflare-dns.com".
[I] May 22 22:06:46 ndm: Dns::Manager: rescheduling DNS-over-TLS bootstrap.
[I] May 22 22:06:46 ndm: Dns::Secure::DohConfigurator: fallback to built-in DNS to
resolve "dns.google".
[I] May 22 22:06:47 ndm: Dns::Secure::DohConfigurator: fallback to built-in DNS to
resolve "dns.adguard-dns.com".
[I] May 22 22:06:47 ndm: Dns::Secure::DohConfigurator: fallback to built-in DNS to
resolve "cloudflare-dns.com".
[I] May 22 22:06:47 ndm: Dns::Manager: updating DNS-over-HTTPS servers addresses.
[I] May 22 22:06:47 ndm: Dns::Secure::DohConfigurator: "System": using
"dns.google:443:8.8.4.4,8.8.8.8" as upstream.
[I] May 22 22:06:47 ndm: Dns::Secure::DohConfigurator: "System": using
"dns.adguard-dns.com:443:94.140.14.14,94.140.15.15" as upstream.
[I] May 22 22:06:47 ndm: Dns::Secure::DohConfigurator: "System": using "cloudflare-
dns.com:443:104.16.248.249,104.16.249.249" as upstream.
[I] May 22 22:06:47 ndm: Dhcp::Client: name server 81.21.80.23 is ignored.
[I] May 22 22:06:47 ndm: Dhcp::Client: name server 81.21.80.26 is ignored.
[I] May 22 22:06:47 nimproxy: NDM IGMP/Multicast proxy stopped (exit status: 0).
[I] May 22 22:06:47 ndm: Network::InterfaceFlusher: flushed conntrack and route
cache.
[I] May 22 22:06:47 ndm: Dns::Secure::DotConfigurator: fallback to built-in DNS to
resolve "dns.adguard-dns.com".
[I] May 22 22:06:47 ndm: Dns::Secure::DotConfigurator: "System": using
"dns.adguard-dns.com:853:94.140.14.14,94.140.15.15" as upstream.
[I] May 22 22:06:47 ndm: Dns::Secure::DotConfigurator: "System": using "cloudflare-
dns.com:853:104.16.248.249,104.16.249.249" as upstream.
[I] May 22 22:06:47 ndm: Dns::Secure::DohConfigurator: "System": using
"dns.google:443:8.8.4.4,8.8.8.8" as upstream.
[I] May 22 22:06:47 ndm: Dns::Secure::DohConfigurator: "System": using
"dns.adguard-dns.com:443:94.140.14.14,94.140.15.15" as upstream.
[I] May 22 22:06:47 ndm: Dns::Secure::DohConfigurator: "System": using "cloudflare-
dns.com:443:104.16.248.249,104.16.249.249" as upstream.
[I] May 22 22:06:47 ndnproxy: answer from wrong socket, ignore.
[I] May 22 22:06:48 ndm: Http::Nginx: loaded SSL certificate for
"a571102056c5831e867aaef8.keenetic.io".
[I] May 22 22:06:48 ndm: Http::Nginx: loaded SSL certificate for
"7thsorrow.keenetic.pro".
[I] May 22 22:06:48 ndm: Core::Server: started Session /var/run/ndm.core.socket.
[I] May 22 22:06:48 ndm: Core::Session: client disconnected.
[I] May 22 22:06:48 ndm: Http::Manager: updated configuration.
[I] May 22 22:06:48 ndm: Core::Server: started Session /var/run/ndm.core.socket.
[I] May 22 22:06:48 ndm: Core::Session: client disconnected.
[I] May 22 22:06:49 nimproxy: NDM IGMP/Multicast Proxy, v0.0.36.
[I] May 22 22:06:49 stubby: starting Stubby 0.4.0
[I] May 22 22:06:49 stubby: starting Stubby 0.4.0
[I] May 22 22:06:51 ndm: Core::Server: started Session /var/run/ndm.core.socket.
[I] May 22 22:06:51 upnp: HTTP listening on port 1900
[I] May 22 22:06:51 upnp: Listening for NAT-PMP/PCP traffic on port 5351
[I] May 22 22:06:51 ndm: Network::InternetChecker: Internet access detected.
[I] May 22 22:06:52 ndnproxy: answer from wrong socket, ignore.
[I] May 24 18:34:32 ndm: Core::System::Clock: system time has been changed.
[I] May 24 18:34:32 ndm: Ntp::Client: time synchronized with "0.pool.ntp.org".
[I] May 24 18:34:32 ndm: Dns::Secure::DotConfigurator: "System": using
"dns.adguard-dns.com:853:94.140.14.14,94.140.15.15" as upstream.
[I] May 24 18:34:32 ndm: Dns::Secure::DotConfigurator: "System": using "cloudflare-
dns.com:853:104.16.248.249,104.16.249.249" as upstream.
[I] May 24 18:34:32 https-dns-proxy: Shutting down gracefully. To force exit, send
signal again.
[I] May 24 18:34:32 https-dns-proxy: Core::Syslog: last message repeated 2 times.
[I] May 24 18:34:32 ndm: Dns::Secure::DohConfigurator: "System": using
"dns.google:443:8.8.4.4,8.8.8.8" as upstream.
[I] May 24 18:34:32 ndm: Dns::Secure::DohConfigurator: "System": using
"dns.adguard-dns.com:443:94.140.14.14,94.140.15.15" as upstream.
[I] May 24 18:34:32 ndm: Dns::Secure::DohConfigurator: "System": using "cloudflare-
dns.com:443:104.16.248.249,104.16.249.249" as upstream.
[I] May 24 18:34:33 ndm: Dns::Secure::DotConfigurator: fallback to built-in DNS to
resolve "dns.adguard-dns.com".
[I] May 24 18:34:33 ndm: Dns::Secure::DotConfigurator: fallback to built-in DNS to
resolve "cloudflare-dns.com".
[I] May 24 18:34:33 ndnproxy: answer from wrong socket, ignore.
[I] May 24 18:34:33 ndm: Dns::Secure::DohConfigurator: fallback to built-in DNS to
resolve "dns.google".
[I] May 24 18:34:33 ndm: Dns::Secure::DohConfigurator: fallback to built-in DNS to
resolve "dns.adguard-dns.com".
[E] May 24 18:34:33 ndnproxy: Proxy loop detected: 127.0.0.1 <-> 127.0.0.1, request
dropped.
[I] May 24 18:34:33 ndm: Dns::Secure::DohConfigurator: fallback to built-in DNS to
resolve "cloudflare-dns.com".
[I] May 24 18:34:34 stubby: starting Stubby 0.4.0
[I] May 24 18:34:34 stubby: starting Stubby 0.4.0
[I] May 24 18:34:34 ndnproxy: answer from wrong socket, ignore.
[E] May 24 18:34:34 ndm: Cloud::Agent: cannot connect to the cloud server.
[I] May 24 18:34:34 ndnproxy: answer from wrong socket, ignore.
[I] May 24 18:34:39 ipsec: 06[CFG] system time jump detected from 1684778809s to
1684938879s, initiate SA rekeying
[I] May 24 18:34:42 ndm: Dns::Manager: added static record for
"a571102056c5831e867aaef8.keenetic.io", address 78.47.125.180.
[I] May 24 18:34:43 ndm: Http::Nginx: loaded SSL certificate for
"a571102056c5831e867aaef8.keenetic.io".
[I] May 24 18:34:43 ndm: Http::Nginx: loaded SSL certificate for
"7thsorrow.keenetic.pro".
[I] May 24 18:34:43 ndm: Core::Server: started Session /var/run/ndm.core.socket.
[I] May 24 18:34:43 ndm: Core::Session: client disconnected.
[I] May 24 18:34:43 ndm: Http::Manager: updated configuration.
[I] May 24 18:34:43 ndm: Core::Server: started Session /var/run/ndm.core.socket.
[I] May 24 18:34:43 ndm: Core::Session: client disconnected.
[I] May 24 18:34:55 ndm: IpSec::Configurator: "ionline_EY": reconnecting.
[I] May 24 18:34:55 ipsec: 03[CFG] vici initiate CHILD_SA 'ionline_EY'
[I] May 24 18:34:55 ipsec: 14[IKE] initiating IKE_SA ionline_EY[2] to 46.32.170.109

[I] May 24 18:34:55 ipsec: 11[CFG] received proposals:


IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
[I] May 24 18:34:55 ipsec: 11[CFG] configured proposals:
IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
[I] May 24 18:34:55 ipsec: 11[CFG] selected proposal:
IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
[I] May 24 18:34:56 ipsec: 11[IKE] linked key for crypto map 'ionline_EY' is not
found, still searching
[I] May 24 18:34:56 ipsec: 11[IKE] authentication of '7thsorrow.keenetic.pro'
(myself) with pre-shared key
[I] May 24 18:34:56 ipsec: 11[IKE] establishing CHILD_SA ionline_EY{1}
[I] May 24 18:34:56 ipsec: 14[IKE] linked key for crypto map 'ionline_EY' is not
found, still searching
[I] May 24 18:34:56 ipsec: 14[IKE] authentication of '46.32.170.109' with pre-
shared key successful
[I] May 24 18:34:56 ipsec: 14[IKE] IKE_SA ionline_EY[2] established between
78.109.53.15[7thsorrow.keenetic.pro]...46.32.170.109[46.32.170.109]
[I] May 24 18:34:56 ipsec: 14[IKE] scheduling rekeying in 3580s
[I] May 24 18:34:56 ipsec: 14[IKE] maximum IKE_SA lifetime 3600s
[I] May 24 18:34:56 ipsec: 14[IKE] received ESP_TFC_PADDING_NOT_SUPPORTED, not
using ESPv3 TFC padding
[I] May 24 18:34:56 ipsec: 14[CFG] received proposals:
ESP:AES_CBC=256/HMAC_SHA2_256_128/NO_EXT_SEQ
[I] May 24 18:34:56 ipsec: 14[CFG] configured proposals:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 24 18:34:56 ipsec: 14[CFG] selected proposal:
ESP:AES_CBC=256/HMAC_SHA2_256_128/NO_EXT_SEQ
[I] May 24 18:34:56 ipsec: 14[IKE] CHILD_SA ionline_EY{1} established with SPIs
c773dc41_i cba9efe2_o and TS 192.168.1.0/24 === 172.16.102.0/24
[I] May 24 18:34:56 ndm: IpSec::Configurator: "ionline_EY": crypto map started.
[W] May 24 18:34:56 ndm: IpSec::Configurator: "ionline_EY": crypto map is up.
[I] May 24 18:34:56 ndm: IpSec::Configurator: "ionline_EY": reconnection for crypto
map was cancelled.
[I] May 24 18:34:56 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 1, active CHILD SA: 0.
[I] May 24 18:34:56 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 1, active CHILD SA: 1, state up.
[I] May 24 18:34:56 ndm: IpSec::IpSecNetfilter: start reloading netfilter
configuration...
[I] May 24 18:34:56 ndm: IpSec::IpSecNetfilter: netfilter configuration reloading
is done.
[I] May 24 18:35:01 ndnproxy: answer from wrong socket, ignore.
[I] May 24 18:35:02 ndm: Http::Nginx: loaded SSL certificate for
"a571102056c5831e867aaef8.keenetic.io".
[I] May 24 18:35:02 ndm: Http::Nginx: loaded SSL certificate for
"7thsorrow.keenetic.pro".
[I] May 24 18:35:02 ndm: Core::Server: started Session /var/run/ndm.core.socket.
[I] May 24 18:35:02 ndm: Core::Session: client disconnected.
[I] May 24 18:35:02 ndm: Http::Manager: updated configuration.
[I] May 24 18:35:02 ndm: Core::Server: started Session /var/run/ndm.core.socket.
[I] May 24 18:35:02 ndm: Core::Session: client disconnected.
[I] May 24 18:35:17 ndm: Network::Interface::Switch: "GigabitEthernet0/0": switch
link down at port 1.
[I] May 24 18:35:19 ndm: Network::Interface::Switch: "GigabitEthernet0/0": switch
link up at port 1 (100FD/AN).
[I] May 24 18:35:25 ndnproxy: answer from wrong socket, ignore.
[I] May 24 18:36:31 ndnproxy: Core::Syslog: last message repeated 2 times.
[I] May 24 18:36:39 coalagent: updating configuration...
[I] May 24 18:36:41 coalagent: updating configuration...
[I] May 24 18:36:46 ndnproxy: answer from wrong socket, ignore.
[I] May 24 18:41:40 ndnproxy: Core::Syslog: last message repeated 4 times.
[I] May 24 18:42:30 ipsec: 14[IKE] message verification failed
[I] May 24 18:42:30 ipsec: 14[IKE] IKE_SA_INIT request with message ID 0 processing
failed
[I] May 24 18:44:21 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster0/AccessPoint0": STA(c8:3d:dc:ae:52:77) had associated successfully.
[I] May 24 18:44:21 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster0/AccessPoint0": STA(c8:3d:dc:ae:52:77) set key done in WPA2/WPA2PSK.
[I] May 24 18:44:21 ndhcps: DHCPDISCOVER received from c8:3d:dc:ae:52:77.
[I] May 24 18:44:21 ndhcps: making OFFER of 192.168.1.88 to c8:3d:dc:ae:52:77.
[I] May 24 18:44:21 ndhcps: DHCPREQUEST received (STATE_SELECTING) for 192.168.1.88
from c8:3d:dc:ae:52:77.
[I] May 24 18:44:21 ndhcps: sending ACK of 192.168.1.88 to c8:3d:dc:ae:52:77.
[I] May 24 18:44:22 ndnproxy: answer from wrong socket, ignore.
[I] May 24 18:47:01 ndnproxy: Core::Syslog: last message repeated 4 times.
[I] May 24 18:49:27 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 24 18:50:16 ndnproxy: answer from wrong socket, ignore.
[I] May 24 18:52:07 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(d4:5e:ec:6e:1d:13) had associated successfully.
[I] May 24 18:52:07 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(d4:5e:ec:6e:1d:13) set key done in WPA2/WPA2PSK.
[I] May 24 18:52:07 ndhcps: DHCPDISCOVER received from d4:5e:ec:6e:1d:13.
[I] May 24 18:52:08 ndhcps: making OFFER of 192.168.1.84 to d4:5e:ec:6e:1d:13.
[I] May 24 18:52:08 ndhcps: DHCPREQUEST received (STATE_SELECTING) for 192.168.1.84
from d4:5e:ec:6e:1d:13.
[I] May 24 18:52:08 ndhcps: sending ACK of 192.168.1.84 to d4:5e:ec:6e:1d:13.
[I] May 24 18:52:17 ndnproxy: answer from wrong socket, ignore.
[I] May 24 19:01:50 ndnproxy: Core::Syslog: last message repeated 14 times.
[I] May 24 19:04:27 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 24 19:05:28 ndnproxy: answer from wrong socket, ignore.
[I] May 24 19:17:21 ndnproxy: Core::Syslog: last message repeated 6 times.
[I] May 24 19:19:27 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 24 19:23:19 ndnproxy: answer from wrong socket, ignore.
[I] May 24 19:23:45 ndnproxy: answer from wrong socket, ignore.
[I] May 24 19:24:13 ipsec: 03[IKE] received ESP_TFC_PADDING_NOT_SUPPORTED, not
using ESPv3 TFC padding
[I] May 24 19:24:13 ipsec: 03[CFG] received proposals:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 24 19:24:13 ipsec: 03[CFG] configured proposals:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 24 19:24:13 ipsec: 03[CFG] selected proposal:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 24 19:24:13 ipsec: 03[IKE] inbound CHILD_SA ionline_EY{2} established with
SPIs cf4acc10_i c0d13cd6_o and TS 192.168.1.0/24 === 172.16.102.0/24
[I] May 24 19:24:13 ndm: IpSec::Configurator: "ionline_EY": crypto map was
renegotiated.
[I] May 24 19:24:13 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 1, active CHILD SA: 0.
[I] May 24 19:24:13 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 1, active CHILD SA: 1, state up.
[I] May 24 19:24:13 ipsec: 07[IKE] received DELETE for ESP CHILD_SA with SPI
cba9efe2
[I] May 24 19:24:13 ipsec: 07[IKE] closing CHILD_SA ionline_EY{1} with SPIs
c773dc41_i (0 bytes) cba9efe2_o (0 bytes) and TS 192.168.1.0/24 === 172.16.102.0/24

[I] May 24 19:24:13 ipsec: 07[IKE] sending DELETE for ESP CHILD_SA with SPI
c773dc41
[I] May 24 19:24:13 ipsec: 07[IKE] CHILD_SA closed
[I] May 24 19:24:13 ipsec: 07[IKE] outbound CHILD_SA ionline_EY{2} established with
SPIs cf4acc10_i c0d13cd6_o and TS 192.168.1.0/24 === 172.16.102.0/24
[I] May 24 19:24:13 ndm: IpSec::IpSecNetfilter: start reloading netfilter
configuration...
[I] May 24 19:24:13 ndm: IpSec::IpSecNetfilter: netfilter configuration reloading
is done.
[I] May 24 19:24:23 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 1, active CHILD SA: 1.
[I] May 24 19:24:23 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 1, active CHILD SA: 1.
[I] May 24 19:29:17 ndnproxy: answer from wrong socket, ignore.
[I] May 24 19:31:00 ndnproxy: answer from wrong socket, ignore.
[I] May 24 19:33:05 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(14:eb:b6:d0:19:de) GTK rekey done, group cipher
AES.
[I] May 24 19:33:05 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(d4:5e:ec:6e:1d:13) GTK rekey done, group cipher
AES.
[I] May 24 19:33:05 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(a4:4b:d5:f3:e4:9f) GTK rekey done, group cipher
AES.
[I] May 24 19:33:11 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster0/AccessPoint0": STA(c8:3d:dc:ae:52:77) GTK rekey done, group cipher
AES.
[I] May 24 19:34:27 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 24 19:34:36 ipsec: 06[IKE] initiating IKE_SA ionline_EY[4] to 46.32.170.109

[I] May 24 19:34:36 ipsec: 03[CFG] received proposals:


IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
[I] May 24 19:34:36 ipsec: 03[CFG] configured proposals:
IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
[I] May 24 19:34:36 ipsec: 03[CFG] selected proposal:
IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
[I] May 24 19:34:36 ipsec: 03[IKE] scheduling rekeying in 3570s
[I] May 24 19:34:36 ipsec: 03[IKE] maximum IKE_SA lifetime 3590s
[I] May 24 19:34:36 ipsec: 03[IKE] IKE_SA ionline_EY[4] rekeyed between
78.109.53.15[7thsorrow.keenetic.pro]...46.32.170.109[46.32.170.109]
[I] May 24 19:34:36 ipsec: 03[IKE] deleting IKE_SA ionline_EY[2] between
78.109.53.15[7thsorrow.keenetic.pro]...46.32.170.109[46.32.170.109]
[I] May 24 19:34:36 ipsec: 03[IKE] sending DELETE for IKE_SA ionline_EY[2]
[I] May 24 19:34:36 ipsec: 13[IKE] IKE_SA deleted
[I] May 24 19:38:21 ndnproxy: answer from wrong socket, ignore.
[I] May 24 19:38:55 ndnproxy: Core::Syslog: last message repeated 4 times.
[I] May 24 19:39:32 ndhcps: DHCPREQUEST received (STATE_INIT) for 192.168.1.94 from
00:e0:4c:36:02:d4.
[I] May 24 19:39:32 ndhcps: sending ACK of 192.168.1.94 to 00:e0:4c:36:02:d4.
[I] May 24 19:40:39 ndnproxy: answer from wrong socket, ignore.
[I] May 24 19:46:43 ndnproxy: Core::Syslog: last message repeated 6 times.
[I] May 24 19:46:58 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had associated successfully.
[I] May 24 19:46:58 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 24 19:46:58 ndhcps: DHCPREQUEST received (STATE_INIT) for 192.168.1.35 from
22:fd:90:7a:6f:12.
[I] May 24 19:46:58 ndhcps: sending ACK of 192.168.1.35 to 22:fd:90:7a:6f:12.
[I] May 24 19:47:00 ndnproxy: answer from wrong socket, ignore.
[I] May 24 19:49:15 ndnproxy: Core::Syslog: last message repeated 2 times.
[I] May 24 19:49:27 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 24 19:52:15 ndnproxy: answer from wrong socket, ignore.
[I] May 24 20:02:24 ndnproxy: Core::Syslog: last message repeated 10 times.
[I] May 24 20:02:35 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 24 20:02:36 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 24 20:02:36 ndnproxy: answer from wrong socket, ignore.
[I] May 24 20:03:14 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 24 20:03:14 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 24 20:04:27 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 24 20:04:30 ndnproxy: answer from wrong socket, ignore.
[I] May 24 20:12:13 ndnproxy: Core::Syslog: last message repeated 9 times.
[I] May 24 20:12:30 ndm: Network::Interface::Switch: "GigabitEthernet0/0": switch
link down at port 1.
[I] May 24 20:12:32 ndhcps: DHCPREQUEST received (STATE_INIT) for 192.168.1.111
from 18:c0:4d:8a:8f:a4.
[I] May 24 20:12:32 ndhcps: sending ACK of 192.168.1.111 to 18:c0:4d:8a:8f:a4.
[I] May 24 20:12:33 ndm: Network::Interface::Switch: "GigabitEthernet0/0": switch
link up at port 1 (1000FD/AN).
[I] May 24 20:12:55 ndnproxy: answer from wrong socket, ignore.
[I] May 24 20:13:27 ndnproxy: answer from wrong socket, ignore.
[I] May 24 20:13:45 ipsec: 05[IKE] received ESP_TFC_PADDING_NOT_SUPPORTED, not
using ESPv3 TFC padding
[I] May 24 20:13:45 ipsec: 05[CFG] received proposals:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 24 20:13:45 ipsec: 05[CFG] configured proposals:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 24 20:13:45 ipsec: 05[CFG] selected proposal:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 24 20:13:45 ipsec: 05[IKE] inbound CHILD_SA ionline_EY{3} established with
SPIs c2433435_i c7614193_o and TS 192.168.1.0/24 === 172.16.102.0/24
[I] May 24 20:13:45 ndm: IpSec::Configurator: "ionline_EY": crypto map was
renegotiated.
[I] May 24 20:13:45 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 1, active CHILD SA: 0.
[I] May 24 20:13:45 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 2, active CHILD SA: 1, state up.
[I] May 24 20:13:45 ipsec: 13[IKE] received DELETE for ESP CHILD_SA with SPI
c0d13cd6
[I] May 24 20:13:45 ipsec: 13[IKE] closing CHILD_SA ionline_EY{2} with SPIs
cf4acc10_i (0 bytes) c0d13cd6_o (0 bytes) and TS 192.168.1.0/24 === 172.16.102.0/24
[I] May 24 20:13:45 ipsec: 13[IKE] sending DELETE for ESP CHILD_SA with SPI
cf4acc10
[I] May 24 20:13:45 ipsec: 13[IKE] CHILD_SA closed
[I] May 24 20:13:45 ipsec: 13[IKE] outbound CHILD_SA ionline_EY{3} established with
SPIs c2433435_i c7614193_o and TS 192.168.1.0/24 === 172.16.102.0/24
[I] May 24 20:13:45 ndm: IpSec::IpSecNetfilter: start reloading netfilter
configuration...
[I] May 24 20:13:45 ndm: IpSec::IpSecNetfilter: netfilter configuration reloading
is done.
[I] May 24 20:13:55 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 2, active CHILD SA: 1.
[I] May 24 20:13:55 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 2, active CHILD SA: 1.
[I] May 24 20:15:51 ndnproxy: answer from wrong socket, ignore.
[I] May 24 20:17:13 ndnproxy: Core::Syslog: last message repeated 6 times.
[I] May 24 20:19:27 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 24 20:19:47 ndnproxy: answer from wrong socket, ignore.
[I] May 24 20:34:00 ndnproxy: Core::Syslog: last message repeated 7 times.
[I] May 24 20:34:06 ipsec: 07[IKE] initiating IKE_SA ionline_EY[5] to 46.32.170.109

[I] May 24 20:34:06 ipsec: 12[CFG] received proposals:


IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
[I] May 24 20:34:06 ipsec: 12[CFG] configured proposals:
IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
[I] May 24 20:34:06 ipsec: 12[CFG] selected proposal:
IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
[I] May 24 20:34:06 ipsec: 12[IKE] scheduling rekeying in 3576s
[I] May 24 20:34:06 ipsec: 12[IKE] maximum IKE_SA lifetime 3596s
[I] May 24 20:34:06 ipsec: 12[IKE] IKE_SA ionline_EY[5] rekeyed between
78.109.53.15[7thsorrow.keenetic.pro]...46.32.170.109[46.32.170.109]
[I] May 24 20:34:06 ipsec: 12[IKE] deleting IKE_SA ionline_EY[4] between
78.109.53.15[7thsorrow.keenetic.pro]...46.32.170.109[46.32.170.109]
[I] May 24 20:34:06 ipsec: 12[IKE] sending DELETE for IKE_SA ionline_EY[4]
[I] May 24 20:34:06 ipsec: 06[IKE] IKE_SA deleted
[I] May 24 20:34:28 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 24 20:34:33 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(d4:5e:ec:6e:1d:13) GTK rekey done, group cipher
AES.
[I] May 24 20:34:33 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(14:eb:b6:d0:19:de) GTK rekey done, group cipher
AES.
[I] May 24 20:34:33 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) GTK rekey done, group cipher
AES.
[I] May 24 20:34:34 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(a4:4b:d5:f3:e4:9f) GTK rekey done, group cipher
AES.
[I] May 24 20:34:39 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster0/AccessPoint0": STA(c8:3d:dc:ae:52:77) GTK rekey done, group cipher
AES.
[I] May 24 20:34:47 ndnproxy: answer from wrong socket, ignore.
[I] May 24 20:35:30 ndnproxy: Core::Syslog: last message repeated 3 times.
[E] May 24 20:38:39 stubby: "cloudflare-dns.com": too many failed requests, try to
reload process
[E] May 24 20:38:39 ndm: Service: "DoT "System" proxy #1": unexpectedly stopped.
[I] May 24 20:38:42 stubby: starting Stubby 0.4.0
[I] May 24 20:39:37 ndnproxy: answer from wrong socket, ignore.
[I] May 24 20:47:59 ndnproxy: Core::Syslog: last message repeated 3 times.
[I] May 24 20:49:28 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 24 20:50:17 ndnproxy: answer from wrong socket, ignore.
[I] May 24 20:56:43 ndnproxy: Core::Syslog: last message repeated 4 times.
[I] May 24 21:02:25 ipsec: 03[IKE] received ESP_TFC_PADDING_NOT_SUPPORTED, not
using ESPv3 TFC padding
[I] May 24 21:02:25 ipsec: 03[CFG] received proposals:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 24 21:02:25 ipsec: 03[CFG] configured proposals:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 24 21:02:25 ipsec: 03[CFG] selected proposal:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 24 21:02:25 ipsec: 03[IKE] inbound CHILD_SA ionline_EY{4} established with
SPIs c066b5a5_i cf97ea80_o and TS 192.168.1.0/24 === 172.16.102.0/24
[I] May 24 21:02:25 ndm: IpSec::Configurator: "ionline_EY": crypto map was
renegotiated.
[I] May 24 21:02:25 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 2, active CHILD SA: 0.
[I] May 24 21:02:25 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 3, active CHILD SA: 1, state up.
[I] May 24 21:02:25 ipsec: 05[IKE] received DELETE for ESP CHILD_SA with SPI
c7614193
[I] May 24 21:02:25 ipsec: 05[IKE] closing CHILD_SA ionline_EY{3} with SPIs
c2433435_i (0 bytes) c7614193_o (0 bytes) and TS 192.168.1.0/24 === 172.16.102.0/24

[I] May 24 21:02:25 ipsec: 05[IKE] sending DELETE for ESP CHILD_SA with SPI
c2433435
[I] May 24 21:02:25 ipsec: 05[IKE] CHILD_SA closed
[I] May 24 21:02:25 ipsec: 05[IKE] outbound CHILD_SA ionline_EY{4} established with
SPIs c066b5a5_i cf97ea80_o and TS 192.168.1.0/24 === 172.16.102.0/24
[I] May 24 21:02:25 ndm: IpSec::IpSecNetfilter: start reloading netfilter
configuration...
[I] May 24 21:02:25 ndm: IpSec::IpSecNetfilter: netfilter configuration reloading
is done.
[I] May 24 21:02:35 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 3, active CHILD SA: 1.
[I] May 24 21:02:35 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 3, active CHILD SA: 1.
[I] May 24 21:04:19 ndnproxy: answer from wrong socket, ignore.
[E] May 24 21:04:23 ndnproxy: unable to send request: operation not permitted.
[I] May 24 21:04:26 ndnproxy: answer from wrong socket, ignore.
[I] May 24 21:04:29 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 24 21:04:54 ndnproxy: answer from wrong socket, ignore.
[I] May 24 21:06:48 ndnproxy: Core::Syslog: last message repeated 2 times.
[I] May 24 21:12:10 ndm: Network::Interface::Switch: "GigabitEthernet0/0": switch
link down at port 1.
[I] May 24 21:12:13 ndm: Network::Interface::Switch: "GigabitEthernet0/0": switch
link up at port 1 (1000FD/AN).
[I] May 24 21:12:14 ndhcps: DHCPREQUEST received (STATE_INIT) for 192.168.1.111
from 18:c0:4d:8a:8f:a4.
[I] May 24 21:12:15 ndhcps: sending ACK of 192.168.1.111 to 18:c0:4d:8a:8f:a4.
[I] May 24 21:12:30 ndm: Network::Interface::Switch: "GigabitEthernet0/0": switch
link down at port 1.
[I] May 24 21:12:32 ndm: Network::Interface::Switch: "GigabitEthernet0/0": switch
link up at port 1 (1000FD/AN).
[I] May 24 21:12:32 ndhcps: DHCPREQUEST received (STATE_INIT) for 192.168.1.111
from 18:c0:4d:8a:8f:a4.
[I] May 24 21:12:33 ndhcps: sending ACK of 192.168.1.111 to 18:c0:4d:8a:8f:a4.
[I] May 24 21:13:45 ndnproxy: answer from wrong socket, ignore.
[I] May 24 21:18:30 ndnproxy: Core::Syslog: last message repeated 8 times.
[I] May 24 21:19:29 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 24 21:20:42 ndnproxy: answer from wrong socket, ignore.
[I] May 24 21:32:04 ndnproxy: Core::Syslog: last message repeated 12 times.
[I] May 24 21:33:42 ipsec: 12[IKE] initiating IKE_SA ionline_EY[6] to 46.32.170.109

[I] May 24 21:33:42 ipsec: 05[CFG] received proposals:


IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
[I] May 24 21:33:42 ipsec: 05[CFG] configured proposals:
IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
[I] May 24 21:33:42 ipsec: 05[CFG] selected proposal:
IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
[I] May 24 21:33:42 ipsec: 05[IKE] scheduling rekeying in 3570s
[I] May 24 21:33:42 ipsec: 05[IKE] maximum IKE_SA lifetime 3590s
[I] May 24 21:33:42 ipsec: 05[IKE] IKE_SA ionline_EY[6] rekeyed between
78.109.53.15[7thsorrow.keenetic.pro]...46.32.170.109[46.32.170.109]
[I] May 24 21:33:42 ipsec: 05[IKE] deleting IKE_SA ionline_EY[5] between
78.109.53.15[7thsorrow.keenetic.pro]...46.32.170.109[46.32.170.109]
[I] May 24 21:33:42 ipsec: 05[IKE] sending DELETE for IKE_SA ionline_EY[5]
[I] May 24 21:33:42 ipsec: 10[IKE] IKE_SA deleted
[I] May 24 21:34:15 ndnproxy: answer from wrong socket, ignore.
[I] May 24 21:34:19 ndm: Network::Interface::Switch: "GigabitEthernet0/0": switch
link down at port 1.
[I] May 24 21:34:24 ndm: Network::Interface::Switch: "GigabitEthernet0/0": switch
link up at port 1 (10FD/AN).
[I] May 24 21:34:29 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 24 21:36:02 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(14:eb:b6:d0:19:de) GTK rekey done, group cipher
AES.
[I] May 24 21:36:02 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) GTK rekey done, group cipher
AES.
[I] May 24 21:36:02 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(d4:5e:ec:6e:1d:13) GTK rekey done, group cipher
AES.
[I] May 24 21:36:02 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(a4:4b:d5:f3:e4:9f) GTK rekey done, group cipher
AES.
[I] May 24 21:36:08 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster0/AccessPoint0": STA(c8:3d:dc:ae:52:77) GTK rekey done, group cipher
AES.
[I] May 24 21:41:33 ndnproxy: answer from wrong socket, ignore.
[I] May 24 21:48:00 ndnproxy: Core::Syslog: last message repeated 5 times.
[I] May 24 21:49:29 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 24 21:50:03 ndnproxy: answer from wrong socket, ignore.
[I] May 24 21:51:14 ndnproxy: answer from wrong socket, ignore.
[I] May 24 21:53:28 ipsec: 15[IKE] received ESP_TFC_PADDING_NOT_SUPPORTED, not
using ESPv3 TFC padding
[I] May 24 21:53:28 ipsec: 15[CFG] received proposals:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 24 21:53:28 ipsec: 15[CFG] configured proposals:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 24 21:53:28 ipsec: 15[CFG] selected proposal:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 24 21:53:28 ipsec: 15[IKE] inbound CHILD_SA ionline_EY{5} established with
SPIs c0aa6073_i c7dbd24f_o and TS 192.168.1.0/24 === 172.16.102.0/24
[I] May 24 21:53:28 ndm: IpSec::Configurator: "ionline_EY": crypto map was
renegotiated.
[I] May 24 21:53:28 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 3, active CHILD SA: 0.
[I] May 24 21:53:28 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 4, active CHILD SA: 1, state up.
[I] May 24 21:53:28 ipsec: 07[IKE] received DELETE for ESP CHILD_SA with SPI
cf97ea80
[I] May 24 21:53:28 ipsec: 07[IKE] closing CHILD_SA ionline_EY{4} with SPIs
c066b5a5_i (0 bytes) cf97ea80_o (0 bytes) and TS 192.168.1.0/24 === 172.16.102.0/24

[I] May 24 21:53:28 ipsec: 07[IKE] sending DELETE for ESP CHILD_SA with SPI
c066b5a5
[I] May 24 21:53:28 ipsec: 07[IKE] CHILD_SA closed
[I] May 24 21:53:28 ipsec: 07[IKE] outbound CHILD_SA ionline_EY{5} established with
SPIs c0aa6073_i c7dbd24f_o and TS 192.168.1.0/24 === 172.16.102.0/24
[I] May 24 21:53:29 ndm: IpSec::IpSecNetfilter: start reloading netfilter
configuration...
[I] May 24 21:53:29 ndm: IpSec::IpSecNetfilter: netfilter configuration reloading
is done.
[I] May 24 21:53:39 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 4, active CHILD SA: 1.
[I] May 24 21:53:39 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 4, active CHILD SA: 1.
[I] May 24 21:53:53 ndnproxy: answer from wrong socket, ignore.
[I] May 24 22:00:00 ndnproxy: Core::Syslog: last message repeated 4 times.
[I] May 24 22:01:57 ndhcps: DHCPREQUEST received (STATE_RENEWING) for 192.168.1.110
from 14:eb:b6:d0:19:dd.
[I] May 24 22:01:57 ndhcps: received ARP reply from 14:eb:b6:d0:19:de, not our
client.
[I] May 24 22:01:58 ndhcps: sending ACK of 192.168.1.110 to 14:eb:b6:d0:19:dd.
[I] May 24 22:02:52 ndhcps: DHCPREQUEST received (STATE_RENEWING) for 192.168.1.80
from a4:4b:d5:f3:e4:9f.
[I] May 24 22:02:52 ndhcps: sending ACK of 192.168.1.80 to a4:4b:d5:f3:e4:9f.
[I] May 24 22:03:01 ndhcps: DHCPREQUEST received (STATE_RENEWING) for 192.168.1.11
from 04:42:1a:26:ee:e6.
[I] May 24 22:03:01 ndhcps: sending ACK of 192.168.1.11 to 04:42:1a:26:ee:e6.
[I] May 24 22:04:01 ndnproxy: answer from wrong socket, ignore.
[I] May 24 22:04:29 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 24 22:06:23 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 24 22:06:24 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 24 22:06:58 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 24 22:06:59 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 24 22:08:15 ipsec: 06[IKE] received retransmit of request with ID 206,
retransmitting response
[I] May 24 22:09:59 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 24 22:10:00 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 24 22:10:53 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 24 22:10:54 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 24 22:11:45 ndnproxy: answer from wrong socket, ignore.
[I] May 24 22:13:21 ndnproxy: answer from wrong socket, ignore.
[I] May 24 22:13:55 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 24 22:13:55 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 24 22:15:26 ndhcps: DHCPREQUEST received (STATE_RENEWING) for 192.168.1.88
from c8:3d:dc:ae:52:77.
[I] May 24 22:15:27 ndhcps: sending ACK of 192.168.1.88 to c8:3d:dc:ae:52:77.
[I] May 24 22:18:47 ndnproxy: answer from wrong socket, ignore.
[I] May 24 22:19:30 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 24 22:20:00 ndnproxy: answer from wrong socket, ignore.
[I] May 24 22:20:34 ndnproxy: answer from wrong socket, ignore.
[E] May 24 22:21:17 stubby: "cloudflare-dns.com": too many failed requests, try to
reload process
[E] May 24 22:21:17 ndm: Service: "DoT "System" proxy #1": unexpectedly stopped.
[I] May 24 22:21:20 stubby: starting Stubby 0.4.0
[I] May 24 22:22:08 ndhcps: DHCPREQUEST received (STATE_RENEWING) for 192.168.1.84
from d4:5e:ec:6e:1d:13.
[I] May 24 22:22:08 ndhcps: sending ACK of 192.168.1.84 to d4:5e:ec:6e:1d:13.
[I] May 24 22:22:25 ndnproxy: answer from wrong socket, ignore.
[I] May 24 22:31:45 ndnproxy: Core::Syslog: last message repeated 8 times.
[I] May 24 22:33:12 ipsec: 08[IKE] initiating IKE_SA ionline_EY[7] to 46.32.170.109

[I] May 24 22:33:12 ipsec: 05[CFG] received proposals:


IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
[I] May 24 22:33:12 ipsec: 05[CFG] configured proposals:
IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
[I] May 24 22:33:12 ipsec: 05[CFG] selected proposal:
IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
[I] May 24 22:33:12 ipsec: 05[IKE] scheduling rekeying in 3580s
[I] May 24 22:33:12 ipsec: 05[IKE] maximum IKE_SA lifetime 3600s
[I] May 24 22:33:12 ipsec: 05[IKE] IKE_SA ionline_EY[7] rekeyed between
78.109.53.15[7thsorrow.keenetic.pro]...46.32.170.109[46.32.170.109]
[I] May 24 22:33:12 ipsec: 05[IKE] deleting IKE_SA ionline_EY[6] between
78.109.53.15[7thsorrow.keenetic.pro]...46.32.170.109[46.32.170.109]
[I] May 24 22:33:12 ipsec: 05[IKE] sending DELETE for IKE_SA ionline_EY[6]
[I] May 24 22:33:12 ipsec: 15[IKE] IKE_SA deleted
[I] May 24 22:33:44 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 24 22:33:44 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 24 22:34:30 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 24 22:36:45 ndnproxy: answer from wrong socket, ignore.
[I] May 24 22:37:30 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) GTK rekey done, group cipher
AES.
[I] May 24 22:37:30 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(14:eb:b6:d0:19:de) GTK rekey done, group cipher
AES.
[I] May 24 22:37:30 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(d4:5e:ec:6e:1d:13) GTK rekey done, group cipher
AES.
[I] May 24 22:37:30 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(a4:4b:d5:f3:e4:9f) GTK rekey done, group cipher
AES.
[I] May 24 22:37:36 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster0/AccessPoint0": STA(c8:3d:dc:ae:52:77) GTK rekey done, group cipher
AES.
[I] May 24 22:38:15 ndnproxy: answer from wrong socket, ignore.
[I] May 24 22:41:15 ndnproxy: Core::Syslog: last message repeated 2 times.
[I] May 24 22:43:40 ipsec: 12[IKE] received ESP_TFC_PADDING_NOT_SUPPORTED, not
using ESPv3 TFC padding
[I] May 24 22:43:40 ipsec: 12[CFG] received proposals:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 24 22:43:40 ipsec: 12[CFG] configured proposals:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 24 22:43:40 ipsec: 12[CFG] selected proposal:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 24 22:43:40 ipsec: 12[IKE] inbound CHILD_SA ionline_EY{6} established with
SPIs cddce412_i c7f881d8_o and TS 192.168.1.0/24 === 172.16.102.0/24
[I] May 24 22:43:40 ndm: IpSec::Configurator: "ionline_EY": crypto map was
renegotiated.
[I] May 24 22:43:40 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 4, active CHILD SA: 0.
[I] May 24 22:43:40 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 5, active CHILD SA: 1, state up.
[I] May 24 22:43:40 ipsec: 11[IKE] received DELETE for ESP CHILD_SA with SPI
c7dbd24f
[I] May 24 22:43:40 ipsec: 11[IKE] closing CHILD_SA ionline_EY{5} with SPIs
c0aa6073_i (0 bytes) c7dbd24f_o (0 bytes) and TS 192.168.1.0/24 === 172.16.102.0/24

[I] May 24 22:43:40 ipsec: 11[IKE] sending DELETE for ESP CHILD_SA with SPI
c0aa6073
[I] May 24 22:43:40 ipsec: 11[IKE] CHILD_SA closed
[I] May 24 22:43:40 ipsec: 11[IKE] outbound CHILD_SA ionline_EY{6} established with
SPIs cddce412_i c7f881d8_o and TS 192.168.1.0/24 === 172.16.102.0/24
[I] May 24 22:43:40 ndm: IpSec::IpSecNetfilter: start reloading netfilter
configuration...
[I] May 24 22:43:40 ndm: IpSec::IpSecNetfilter: netfilter configuration reloading
is done.
[I] May 24 22:43:50 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 5, active CHILD SA: 1.
[I] May 24 22:43:50 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 5, active CHILD SA: 1.
[I] May 24 22:46:34 ndnproxy: answer from wrong socket, ignore.
[I] May 24 22:47:36 ndnproxy: answer from wrong socket, ignore.
[I] May 24 22:49:30 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 24 22:55:37 ndnproxy: answer from wrong socket, ignore.
[I] May 24 22:58:08 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(d4:5e:ec:6e:1d:13) had been aged-out and
disassociated (idle silence).
[I] May 24 22:59:06 ndnproxy: answer from wrong socket, ignore.
[I] May 24 22:59:54 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 24 22:59:54 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 24 23:01:03 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 24 23:01:03 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 24 23:01:13 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 24 23:01:13 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 24 23:03:18 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 24 23:03:18 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 24 23:03:56 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 24 23:03:56 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 24 23:04:06 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 24 23:04:06 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 24 23:04:25 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 24 23:04:25 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 24 23:04:30 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 24 23:09:45 ndnproxy: answer from wrong socket, ignore.
[I] May 24 23:12:00 ndnproxy: Core::Syslog: last message repeated 2 times.
[I] May 24 23:12:35 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 24 23:12:37 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) replay counter differs in key
handshaking (msg 2 of 4-way).
[I] May 24 23:12:37 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 24 23:13:17 ndnproxy: answer from wrong socket, ignore.
[I] May 24 23:17:20 ndnproxy: Core::Syslog: last message repeated 2 times.
[I] May 24 23:17:34 ndhcps: DHCPREQUEST received (STATE_RENEWING) for 192.168.1.35
from 22:fd:90:7a:6f:12.
[I] May 24 23:17:34 ndhcps: sending ACK of 192.168.1.35 to 22:fd:90:7a:6f:12.
[I] May 24 23:18:08 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 24 23:18:08 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 24 23:19:31 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 24 23:21:27 ndnproxy: answer from wrong socket, ignore.
[I] May 24 23:26:45 ndnproxy: Core::Syslog: last message repeated 3 times.
[I] May 24 23:29:14 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 24 23:29:14 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 24 23:32:52 ipsec: 13[IKE] initiating IKE_SA ionline_EY[8] to 46.32.170.109

[I] May 24 23:32:52 ipsec: 03[CFG] received proposals:


IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
[I] May 24 23:32:52 ipsec: 03[CFG] configured proposals:
IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
[I] May 24 23:32:52 ipsec: 03[CFG] selected proposal:
IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
[I] May 24 23:32:52 ipsec: 03[IKE] scheduling rekeying in 3573s
[I] May 24 23:32:52 ipsec: 03[IKE] maximum IKE_SA lifetime 3593s
[I] May 24 23:32:52 ipsec: 03[IKE] IKE_SA ionline_EY[8] rekeyed between
78.109.53.15[7thsorrow.keenetic.pro]...46.32.170.109[46.32.170.109]
[I] May 24 23:32:52 ipsec: 03[IKE] deleting IKE_SA ionline_EY[7] between
78.109.53.15[7thsorrow.keenetic.pro]...46.32.170.109[46.32.170.109]
[I] May 24 23:32:52 ipsec: 03[IKE] sending DELETE for IKE_SA ionline_EY[7]
[I] May 24 23:32:52 ipsec: 08[IKE] IKE_SA deleted
[I] May 24 23:34:26 ipsec: 09[IKE] received ESP_TFC_PADDING_NOT_SUPPORTED, not
using ESPv3 TFC padding
[I] May 24 23:34:26 ipsec: 09[CFG] received proposals:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 24 23:34:26 ipsec: 09[CFG] configured proposals:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 24 23:34:26 ipsec: 09[CFG] selected proposal:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 24 23:34:26 ipsec: 09[IKE] inbound CHILD_SA ionline_EY{7} established with
SPIs c2225425_i c9358630_o and TS 192.168.1.0/24 === 172.16.102.0/24
[I] May 24 23:34:26 ndm: IpSec::Configurator: "ionline_EY": crypto map was
renegotiated.
[I] May 24 23:34:26 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 5, active CHILD SA: 0.
[I] May 24 23:34:26 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 6, active CHILD SA: 1, state up.
[I] May 24 23:34:26 ipsec: 11[IKE] received DELETE for ESP CHILD_SA with SPI
c7f881d8
[I] May 24 23:34:26 ipsec: 11[IKE] closing CHILD_SA ionline_EY{6} with SPIs
cddce412_i (0 bytes) c7f881d8_o (0 bytes) and TS 192.168.1.0/24 === 172.16.102.0/24

[I] May 24 23:34:26 ipsec: 11[IKE] sending DELETE for ESP CHILD_SA with SPI
cddce412
[I] May 24 23:34:26 ipsec: 11[IKE] CHILD_SA closed
[I] May 24 23:34:26 ipsec: 11[IKE] outbound CHILD_SA ionline_EY{7} established with
SPIs c2225425_i c9358630_o and TS 192.168.1.0/24 === 172.16.102.0/24
[I] May 24 23:34:26 ndm: IpSec::IpSecNetfilter: start reloading netfilter
configuration...
[I] May 24 23:34:26 ndm: IpSec::IpSecNetfilter: netfilter configuration reloading
is done.
[I] May 24 23:34:31 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 24 23:34:36 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 6, active CHILD SA: 1.
[I] May 24 23:34:36 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 6, active CHILD SA: 1.
[I] May 24 23:38:58 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(14:eb:b6:d0:19:de) GTK rekey done, group cipher
AES.
[I] May 24 23:38:58 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) GTK rekey done, group cipher
AES.
[I] May 24 23:38:59 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(a4:4b:d5:f3:e4:9f) GTK rekey done, group cipher
AES.
[I] May 24 23:39:04 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster0/AccessPoint0": STA(c8:3d:dc:ae:52:77) GTK rekey done, group cipher
AES.
[I] May 24 23:40:30 ndnproxy: answer from wrong socket, ignore.
[I] May 24 23:44:15 ndnproxy: Core::Syslog: last message repeated 2 times.
[I] May 24 23:45:17 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 24 23:45:17 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 24 23:49:31 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 24 23:54:00 ndnproxy: answer from wrong socket, ignore.
[I] May 24 23:56:27 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 24 23:56:28 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 24 23:58:34 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 24 23:58:34 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 24 23:59:14 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 24 23:59:14 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 00:00:41 ndnproxy: answer from wrong socket, ignore.
[I] May 25 00:01:56 ndnproxy: Core::Syslog: last message repeated 2 times.
[I] May 25 00:02:10 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 00:02:10 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 00:04:32 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 25 00:05:15 ndnproxy: answer from wrong socket, ignore.
[I] May 25 00:12:27 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 00:12:27 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 00:12:39 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 00:12:39 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 00:14:41 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 00:14:41 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 00:15:19 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 00:15:19 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 00:16:01 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 00:16:01 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 00:19:32 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 25 00:24:14 ndnproxy: answer from wrong socket, ignore.
[I] May 25 00:24:22 ipsec: 08[IKE] received ESP_TFC_PADDING_NOT_SUPPORTED, not
using ESPv3 TFC padding
[I] May 25 00:24:22 ipsec: 08[CFG] received proposals:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 25 00:24:22 ipsec: 08[CFG] configured proposals:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 25 00:24:22 ipsec: 08[CFG] selected proposal:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 25 00:24:22 ipsec: 08[IKE] inbound CHILD_SA ionline_EY{8} established with
SPIs cf5235d5_i c7c698c3_o and TS 192.168.1.0/24 === 172.16.102.0/24
[I] May 25 00:24:22 ndm: IpSec::Configurator: "ionline_EY": crypto map was
renegotiated.
[I] May 25 00:24:22 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 6, active CHILD SA: 0.
[I] May 25 00:24:22 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 6, active CHILD SA: 1, state up.
[I] May 25 00:24:22 ipsec: 15[IKE] received DELETE for ESP CHILD_SA with SPI
c9358630
[I] May 25 00:24:22 ipsec: 15[IKE] closing CHILD_SA ionline_EY{7} with SPIs
c2225425_i (0 bytes) c9358630_o (0 bytes) and TS 192.168.1.0/24 === 172.16.102.0/24

[I] May 25 00:24:22 ipsec: 15[IKE] sending DELETE for ESP CHILD_SA with SPI
c2225425
[I] May 25 00:24:22 ipsec: 15[IKE] CHILD_SA closed
[I] May 25 00:24:22 ipsec: 15[IKE] outbound CHILD_SA ionline_EY{8} established with
SPIs cf5235d5_i c7c698c3_o and TS 192.168.1.0/24 === 172.16.102.0/24
[I] May 25 00:24:23 ndm: IpSec::IpSecNetfilter: start reloading netfilter
configuration...
[I] May 25 00:24:23 ndm: IpSec::IpSecNetfilter: netfilter configuration reloading
is done.
[I] May 25 00:24:32 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 6, active CHILD SA: 1.
[I] May 25 00:24:32 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 6, active CHILD SA: 1.
[I] May 25 00:25:59 ndnproxy: answer from wrong socket, ignore.
[I] May 25 00:26:51 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 00:26:51 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 00:27:29 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 00:27:30 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 00:27:40 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 00:27:40 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 00:28:39 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 00:28:40 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 00:32:25 ipsec: 10[IKE] initiating IKE_SA ionline_EY[9] to 46.32.170.109

[I] May 25 00:32:25 ipsec: 07[CFG] received proposals:


IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
[I] May 25 00:32:25 ipsec: 07[CFG] configured proposals:
IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
[I] May 25 00:32:25 ipsec: 07[CFG] selected proposal:
IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
[I] May 25 00:32:25 ipsec: 07[IKE] scheduling rekeying in 3577s
[I] May 25 00:32:25 ipsec: 07[IKE] maximum IKE_SA lifetime 3597s
[I] May 25 00:32:25 ipsec: 07[IKE] IKE_SA ionline_EY[9] rekeyed between
78.109.53.15[7thsorrow.keenetic.pro]...46.32.170.109[46.32.170.109]
[I] May 25 00:32:25 ipsec: 07[IKE] deleting IKE_SA ionline_EY[8] between
78.109.53.15[7thsorrow.keenetic.pro]...46.32.170.109[46.32.170.109]
[I] May 25 00:32:25 ipsec: 07[IKE] sending DELETE for IKE_SA ionline_EY[8]
[I] May 25 00:32:25 ipsec: 13[IKE] IKE_SA deleted
[I] May 25 00:32:59 ndnproxy: answer from wrong socket, ignore.
[I] May 25 00:33:46 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 00:33:46 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 00:34:32 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 25 00:34:48 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 00:34:48 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 00:35:11 ndnproxy: answer from wrong socket, ignore.
[I] May 25 00:38:05 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 00:38:06 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 00:38:43 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 00:38:44 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 00:38:54 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 00:38:54 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 00:39:30 ndnproxy: answer from wrong socket, ignore.
[I] May 25 00:39:32 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 00:39:32 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 00:39:33 ndnproxy: answer from wrong socket, ignore.
[I] May 25 00:39:43 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 00:39:43 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 00:40:21 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 00:40:21 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 00:40:27 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(14:eb:b6:d0:19:de) GTK rekey done, group cipher
AES.
[I] May 25 00:40:27 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(a4:4b:d5:f3:e4:9f) GTK rekey done, group cipher
AES.
[I] May 25 00:40:31 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 00:40:31 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 00:40:33 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster0/AccessPoint0": STA(c8:3d:dc:ae:52:77) GTK rekey done, group cipher
AES.
[I] May 25 00:41:09 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 00:41:09 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 00:42:52 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 00:42:52 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 00:45:02 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 00:45:02 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 00:45:14 ndnproxy: answer from wrong socket, ignore.
[I] May 25 00:45:22 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 00:45:22 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 00:45:38 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 00:45:39 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 00:46:30 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 00:46:30 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 00:47:11 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 00:47:11 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 00:47:31 ndnproxy: answer from wrong socket, ignore.
[I] May 25 00:47:49 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 00:47:49 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 00:48:09 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had associated successfully.
[I] May 25 00:48:09 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 00:48:09 ndhcps: DHCPREQUEST received (STATE_INIT) for 192.168.1.35 from
22:fd:90:7a:6f:12.
[I] May 25 00:48:09 ndhcps: sending ACK of 192.168.1.35 to 22:fd:90:7a:6f:12.
[I] May 25 00:48:21 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 00:48:21 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 00:48:33 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 00:48:33 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 00:48:43 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 00:48:44 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 00:49:23 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 00:49:23 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 00:49:32 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 25 00:49:35 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 00:49:35 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 00:49:47 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 00:49:47 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 00:49:58 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 00:49:58 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 00:50:36 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 00:50:36 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 00:50:48 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 00:50:48 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 00:51:00 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 00:51:00 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 00:51:12 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 00:51:12 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 00:51:24 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 00:51:24 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 00:51:37 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 00:51:37 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 00:51:49 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 00:51:49 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 00:52:01 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 00:52:03 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 00:52:12 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 00:52:12 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 00:52:48 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 00:52:48 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 00:54:58 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 00:54:58 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 00:55:09 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 00:55:10 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 00:55:15 ndnproxy: answer from wrong socket, ignore.
[I] May 25 00:56:02 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 00:56:02 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 00:56:40 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 00:56:40 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 00:56:51 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 00:56:51 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 00:57:00 ndnproxy: answer from wrong socket, ignore.
[I] May 25 00:58:15 ndnproxy: Core::Syslog: last message repeated 2 times.
[I] May 25 00:59:37 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 00:59:37 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 00:59:39 ndnproxy: answer from wrong socket, ignore.
[I] May 25 00:59:47 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 00:59:47 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 01:00:26 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 01:00:26 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 01:00:37 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 01:00:37 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 01:01:17 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 01:01:17 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 01:03:00 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 01:03:00 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 01:03:36 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 01:03:36 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 01:04:14 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 01:04:14 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 01:04:26 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 01:04:26 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 01:04:32 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 25 01:04:37 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 01:04:37 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 01:05:13 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 01:05:14 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 01:05:50 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 01:05:50 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 01:06:28 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 01:06:28 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 01:06:30 ndnproxy: answer from wrong socket, ignore.
[I] May 25 01:06:38 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 01:06:38 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 01:07:15 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 01:07:15 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 01:07:51 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 01:07:51 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 01:08:27 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 01:08:28 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 01:08:35 ndnproxy: answer from wrong socket, ignore.
[I] May 25 01:09:05 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 01:09:06 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 01:09:16 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 01:09:16 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 01:09:54 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 01:09:54 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 01:10:05 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 01:10:05 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 01:10:05 ndnproxy: answer from wrong socket, ignore.
[I] May 25 01:10:06 ndnproxy: answer from wrong socket, ignore.
[I] May 25 01:10:41 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 01:10:41 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 01:13:02 ipsec: 07[IKE] received ESP_TFC_PADDING_NOT_SUPPORTED, not
using ESPv3 TFC padding
[I] May 25 01:13:02 ipsec: 07[CFG] received proposals:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 25 01:13:02 ipsec: 07[CFG] configured proposals:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 25 01:13:02 ipsec: 07[CFG] selected proposal:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 25 01:13:02 ipsec: 07[IKE] inbound CHILD_SA ionline_EY{9} established with
SPIs c42c592d_i c6db2e8e_o and TS 192.168.1.0/24 === 172.16.102.0/24
[I] May 25 01:13:02 ndm: IpSec::Configurator: "ionline_EY": crypto map was
renegotiated.
[I] May 25 01:13:03 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 6, active CHILD SA: 0.
[I] May 25 01:13:03 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 7, active CHILD SA: 1, state up.
[I] May 25 01:13:03 ipsec: 03[IKE] received DELETE for ESP CHILD_SA with SPI
c7c698c3
[I] May 25 01:13:03 ipsec: 03[IKE] closing CHILD_SA ionline_EY{8} with SPIs
cf5235d5_i (0 bytes) c7c698c3_o (0 bytes) and TS 192.168.1.0/24 === 172.16.102.0/24
[I] May 25 01:13:03 ipsec: 03[IKE] sending DELETE for ESP CHILD_SA with SPI
cf5235d5
[I] May 25 01:13:03 ipsec: 03[IKE] CHILD_SA closed
[I] May 25 01:13:03 ipsec: 03[IKE] outbound CHILD_SA ionline_EY{9} established with
SPIs c42c592d_i c6db2e8e_o and TS 192.168.1.0/24 === 172.16.102.0/24
[I] May 25 01:13:03 ndm: IpSec::IpSecNetfilter: start reloading netfilter
configuration...
[I] May 25 01:13:03 ndm: IpSec::IpSecNetfilter: netfilter configuration reloading
is done.
[I] May 25 01:13:13 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 7, active CHILD SA: 1.
[I] May 25 01:13:13 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 7, active CHILD SA: 1.
[I] May 25 01:13:30 ndnproxy: answer from wrong socket, ignore.
[I] May 25 01:16:34 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 01:16:34 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 01:16:46 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 01:16:46 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 01:16:58 ndnproxy: answer from wrong socket, ignore.
[I] May 25 01:19:32 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 25 01:20:45 ndnproxy: answer from wrong socket, ignore.
[I] May 25 01:21:14 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 01:21:14 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 01:21:26 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 01:21:26 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 01:21:38 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 01:21:38 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 01:21:58 ndnproxy: answer from wrong socket, ignore.
[I] May 25 01:23:33 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 01:23:33 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 01:23:43 ndnproxy: answer from wrong socket, ignore.
[I] May 25 01:23:43 ndnproxy: answer from wrong socket, ignore.
[I] May 25 01:24:48 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 01:24:49 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) replay counter differs in key
handshaking (msg 2 of 4-way).
[I] May 25 01:24:49 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 01:29:15 ndnproxy: answer from wrong socket, ignore.
[I] May 25 01:29:18 ndnproxy: answer from wrong socket, ignore.
[I] May 25 01:30:09 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 01:30:09 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 01:30:45 ndnproxy: answer from wrong socket, ignore.
[I] May 25 01:31:57 ndhcps: DHCPREQUEST received (STATE_RENEWING) for 192.168.1.110
from 14:eb:b6:d0:19:dd.
[I] May 25 01:31:58 ndhcps: received ARP reply from 14:eb:b6:d0:19:de, not our
client.
[I] May 25 01:31:58 ndhcps: sending ACK of 192.168.1.110 to 14:eb:b6:d0:19:dd.
[I] May 25 01:32:02 ipsec: 15[IKE] initiating IKE_SA ionline_EY[10] to
46.32.170.109
[I] May 25 01:32:02 ipsec: 08[CFG] received proposals:
IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
[I] May 25 01:32:02 ipsec: 08[CFG] configured proposals:
IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
[I] May 25 01:32:02 ipsec: 08[CFG] selected proposal:
IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
[I] May 25 01:32:02 ipsec: 08[IKE] scheduling rekeying in 3573s
[I] May 25 01:32:02 ipsec: 08[IKE] maximum IKE_SA lifetime 3593s
[I] May 25 01:32:02 ipsec: 08[IKE] IKE_SA ionline_EY[10] rekeyed between
78.109.53.15[7thsorrow.keenetic.pro]...46.32.170.109[46.32.170.109]
[I] May 25 01:32:02 ipsec: 08[IKE] deleting IKE_SA ionline_EY[9] between
78.109.53.15[7thsorrow.keenetic.pro]...46.32.170.109[46.32.170.109]
[I] May 25 01:32:02 ipsec: 08[IKE] sending DELETE for IKE_SA ionline_EY[9]
[I] May 25 01:32:02 ipsec: 12[IKE] IKE_SA deleted
[I] May 25 01:32:22 ndnproxy: answer from wrong socket, ignore.
[I] May 25 01:32:52 ndhcps: DHCPREQUEST received (STATE_RENEWING) for 192.168.1.80
from a4:4b:d5:f3:e4:9f.
[I] May 25 01:32:53 ndhcps: sending ACK of 192.168.1.80 to a4:4b:d5:f3:e4:9f.
[I] May 25 01:33:00 ndhcps: DHCPREQUEST received (STATE_RENEWING) for 192.168.1.11
from 04:42:1a:26:ee:e6.
[I] May 25 01:33:01 ndhcps: sending ACK of 192.168.1.11 to 04:42:1a:26:ee:e6.
[I] May 25 01:33:41 ndnproxy: answer from wrong socket, ignore.
[I] May 25 01:34:32 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 25 01:40:16 ndnproxy: answer from wrong socket, ignore.
[I] May 25 01:40:53 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 01:40:53 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 01:41:55 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(14:eb:b6:d0:19:de) GTK rekey done, group cipher
AES.
[I] May 25 01:41:55 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(a4:4b:d5:f3:e4:9f) GTK rekey done, group cipher
AES.
[I] May 25 01:41:56 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) GTK rekey done, group cipher
AES.
[I] May 25 01:42:02 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster0/AccessPoint0": STA(c8:3d:dc:ae:52:77) GTK rekey done, group cipher
AES.
[I] May 25 01:43:54 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 01:43:54 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 01:45:45 ndnproxy: answer from wrong socket, ignore.
[I] May 25 01:46:04 ndhcps: DHCPREQUEST received (STATE_RENEWING) for 192.168.1.88
from c8:3d:dc:ae:52:77.
[I] May 25 01:46:04 ndhcps: sending ACK of 192.168.1.88 to c8:3d:dc:ae:52:77.
[I] May 25 01:48:00 ndnproxy: answer from wrong socket, ignore.
[I] May 25 01:49:33 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 25 02:00:15 ndnproxy: answer from wrong socket, ignore.
[E] May 25 02:01:45 ndnproxy: unable to send request: operation not permitted.
[I] May 25 02:01:50 ndnproxy: answer from wrong socket, ignore.
[I] May 25 02:02:20 ndnproxy: answer from wrong socket, ignore.
[I] May 25 02:04:04 ipsec: 07[IKE] received ESP_TFC_PADDING_NOT_SUPPORTED, not
using ESPv3 TFC padding
[I] May 25 02:04:04 ipsec: 07[CFG] received proposals:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 25 02:04:04 ipsec: 07[CFG] configured proposals:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 25 02:04:04 ipsec: 07[CFG] selected proposal:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 25 02:04:04 ipsec: 07[IKE] inbound CHILD_SA ionline_EY{10} established with
SPIs cb58a999_i cd91ef26_o and TS 192.168.1.0/24 === 172.16.102.0/24
[I] May 25 02:04:04 ndm: IpSec::Configurator: "ionline_EY": crypto map was
renegotiated.
[I] May 25 02:04:04 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 7, active CHILD SA: 0.
[I] May 25 02:04:04 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 8, active CHILD SA: 1, state up.
[I] May 25 02:04:04 ipsec: 10[IKE] received DELETE for ESP CHILD_SA with SPI
c6db2e8e
[I] May 25 02:04:04 ipsec: 10[IKE] closing CHILD_SA ionline_EY{9} with SPIs
c42c592d_i (0 bytes) c6db2e8e_o (0 bytes) and TS 192.168.1.0/24 === 172.16.102.0/24

[I] May 25 02:04:04 ipsec: 10[IKE] sending DELETE for ESP CHILD_SA with SPI
c42c592d
[I] May 25 02:04:04 ipsec: 10[IKE] CHILD_SA closed
[I] May 25 02:04:04 ipsec: 10[IKE] outbound CHILD_SA ionline_EY{10} established
with SPIs cb58a999_i cd91ef26_o and TS 192.168.1.0/24 === 172.16.102.0/24
[I] May 25 02:04:04 ndm: IpSec::IpSecNetfilter: start reloading netfilter
configuration...
[I] May 25 02:04:04 ndm: IpSec::IpSecNetfilter: netfilter configuration reloading
is done.
[I] May 25 02:04:14 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 8, active CHILD SA: 1.
[I] May 25 02:04:14 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 8, active CHILD SA: 1.
[I] May 25 02:04:33 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 25 02:08:05 ndnproxy: answer from wrong socket, ignore.
[I] May 25 02:18:58 ndnproxy: Core::Syslog: last message repeated 3 times.
[I] May 25 02:19:33 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 25 02:25:35 ndnproxy: answer from wrong socket, ignore.
[I] May 25 02:30:50 ndnproxy: answer from wrong socket, ignore.
[I] May 25 02:31:35 ipsec: 03[IKE] initiating IKE_SA ionline_EY[11] to
46.32.170.109
[I] May 25 02:31:35 ipsec: 09[CFG] received proposals:
IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
[I] May 25 02:31:35 ipsec: 09[CFG] configured proposals:
IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
[I] May 25 02:31:35 ipsec: 09[CFG] selected proposal:
IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
[I] May 25 02:31:36 ipsec: 09[IKE] scheduling rekeying in 3571s
[I] May 25 02:31:36 ipsec: 09[IKE] maximum IKE_SA lifetime 3591s
[I] May 25 02:31:36 ipsec: 09[IKE] IKE_SA ionline_EY[11] rekeyed between
78.109.53.15[7thsorrow.keenetic.pro]...46.32.170.109[46.32.170.109]
[I] May 25 02:31:36 ipsec: 09[IKE] deleting IKE_SA ionline_EY[10] between
78.109.53.15[7thsorrow.keenetic.pro]...46.32.170.109[46.32.170.109]
[I] May 25 02:31:36 ipsec: 09[IKE] sending DELETE for IKE_SA ionline_EY[10]
[I] May 25 02:31:36 ipsec: 13[IKE] IKE_SA deleted
[I] May 25 02:32:05 ndnproxy: answer from wrong socket, ignore.
[I] May 25 02:34:33 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 25 02:43:20 ndnproxy: answer from wrong socket, ignore.
[I] May 25 02:43:24 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(14:eb:b6:d0:19:de) GTK rekey done, group cipher
AES.
[I] May 25 02:43:24 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(a4:4b:d5:f3:e4:9f) GTK rekey done, group cipher
AES.
[I] May 25 02:43:25 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) GTK rekey done, group cipher
AES.
[I] May 25 02:43:30 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster0/AccessPoint0": STA(c8:3d:dc:ae:52:77) GTK rekey done, group cipher
AES.
[I] May 25 02:49:33 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 25 02:53:24 ipsec: 06[IKE] received ESP_TFC_PADDING_NOT_SUPPORTED, not
using ESPv3 TFC padding
[I] May 25 02:53:24 ipsec: 06[CFG] received proposals:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 25 02:53:24 ipsec: 06[CFG] configured proposals:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 25 02:53:24 ipsec: 06[CFG] selected proposal:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 25 02:53:24 ipsec: 06[IKE] inbound CHILD_SA ionline_EY{11} established with
SPIs c375651b_i c3fa6ce9_o and TS 192.168.1.0/24 === 172.16.102.0/24
[I] May 25 02:53:24 ndm: IpSec::Configurator: "ionline_EY": crypto map was
renegotiated.
[I] May 25 02:53:24 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 8, active CHILD SA: 0.
[I] May 25 02:53:24 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 9, active CHILD SA: 1, state up.
[I] May 25 02:53:24 ipsec: 07[IKE] received DELETE for ESP CHILD_SA with SPI
cd91ef26
[I] May 25 02:53:24 ipsec: 07[IKE] closing CHILD_SA ionline_EY{10} with SPIs
cb58a999_i (0 bytes) cd91ef26_o (0 bytes) and TS 192.168.1.0/24 === 172.16.102.0/24

[I] May 25 02:53:24 ipsec: 07[IKE] sending DELETE for ESP CHILD_SA with SPI
cb58a999
[I] May 25 02:53:24 ipsec: 07[IKE] CHILD_SA closed
[I] May 25 02:53:24 ipsec: 07[IKE] outbound CHILD_SA ionline_EY{11} established
with SPIs c375651b_i c3fa6ce9_o and TS 192.168.1.0/24 === 172.16.102.0/24
[I] May 25 02:53:25 ndm: IpSec::IpSecNetfilter: start reloading netfilter
configuration...
[I] May 25 02:53:25 ndm: IpSec::IpSecNetfilter: netfilter configuration reloading
is done.
[I] May 25 02:53:33 ndnproxy: answer from wrong socket, ignore.
[I] May 25 02:53:35 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 9, active CHILD SA: 1.
[I] May 25 02:53:35 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 9, active CHILD SA: 1.
[I] May 25 02:57:05 ndnproxy: answer from wrong socket, ignore.
[I] May 25 03:03:35 ndnproxy: Core::Syslog: last message repeated 2 times.
[I] May 25 03:04:33 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 25 03:06:11 ipsec: 07[IKE] message verification failed
[I] May 25 03:06:11 ipsec: 07[IKE] IKE_SA_INIT request with message ID 0 processing
failed
[I] May 25 03:08:56 ndnproxy: answer from wrong socket, ignore.
[I] May 25 03:11:20 ndnproxy: Core::Syslog: last message repeated 2 times.
[I] May 25 03:12:50 ipsec: 05[IKE] message verification failed
[I] May 25 03:12:50 ipsec: 05[IKE] IKE_SA_INIT request with message ID 0 processing
failed
[I] May 25 03:17:53 ndnproxy: answer from wrong socket, ignore.
[I] May 25 03:19:33 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 25 03:20:20 ndnproxy: answer from wrong socket, ignore.
[I] May 25 03:28:20 ndnproxy: Core::Syslog: last message repeated 3 times.
[I] May 25 03:31:07 ipsec: 07[IKE] initiating IKE_SA ionline_EY[14] to
46.32.170.109
[I] May 25 03:31:07 ipsec: 10[CFG] received proposals:
IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
[I] May 25 03:31:07 ipsec: 10[CFG] configured proposals:
IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
[I] May 25 03:31:07 ipsec: 10[CFG] selected proposal:
IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
[I] May 25 03:31:07 ipsec: 10[IKE] scheduling rekeying in 3571s
[I] May 25 03:31:07 ipsec: 10[IKE] maximum IKE_SA lifetime 3591s
[I] May 25 03:31:07 ipsec: 10[IKE] IKE_SA ionline_EY[14] rekeyed between
78.109.53.15[7thsorrow.keenetic.pro]...46.32.170.109[46.32.170.109]
[I] May 25 03:31:07 ipsec: 10[IKE] deleting IKE_SA ionline_EY[11] between
78.109.53.15[7thsorrow.keenetic.pro]...46.32.170.109[46.32.170.109]
[I] May 25 03:31:07 ipsec: 10[IKE] sending DELETE for IKE_SA ionline_EY[11]
[I] May 25 03:31:07 ipsec: 05[IKE] IKE_SA deleted
[I] May 25 03:33:31 ndnproxy: answer from wrong socket, ignore.
[I] May 25 03:34:33 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 25 03:35:31 ndnproxy: answer from wrong socket, ignore.
[I] May 25 03:40:20 ndnproxy: Core::Syslog: last message repeated 2 times.
[I] May 25 03:41:24 ipsec: 08[IKE] no IKE config found for
78.109.53.15...167.94.138.50, sending NO_PROPOSAL_CHOSEN
[I] May 25 03:41:24 ipsec: 14[IKE] no IKE config found for
78.109.53.15...167.94.138.50, sending NO_PROPOSAL_CHOSEN
[I] May 25 03:41:50 ndnproxy: answer from wrong socket, ignore.
[I] May 25 03:42:02 ipsec: 13[IKE] received ESP_TFC_PADDING_NOT_SUPPORTED, not
using ESPv3 TFC padding
[I] May 25 03:42:02 ipsec: 13[CFG] received proposals:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 25 03:42:02 ipsec: 13[CFG] configured proposals:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 25 03:42:02 ipsec: 13[CFG] selected proposal:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 25 03:42:02 ipsec: 13[IKE] inbound CHILD_SA ionline_EY{12} established with
SPIs cb86befd_i c4ce6e73_o and TS 192.168.1.0/24 === 172.16.102.0/24
[I] May 25 03:42:02 ndm: IpSec::Configurator: "ionline_EY": crypto map was
renegotiated.
[I] May 25 03:42:02 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 9, active CHILD SA: 0.
[I] May 25 03:42:02 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 10, active CHILD SA: 1, state up.
[I] May 25 03:42:02 ipsec: 14[IKE] received DELETE for ESP CHILD_SA with SPI
c3fa6ce9
[I] May 25 03:42:02 ipsec: 14[IKE] closing CHILD_SA ionline_EY{11} with SPIs
c375651b_i (0 bytes) c3fa6ce9_o (0 bytes) and TS 192.168.1.0/24 === 172.16.102.0/24

[I] May 25 03:42:02 ipsec: 14[IKE] sending DELETE for ESP CHILD_SA with SPI
c375651b
[I] May 25 03:42:02 ipsec: 14[IKE] CHILD_SA closed
[I] May 25 03:42:02 ipsec: 14[IKE] outbound CHILD_SA ionline_EY{12} established
with SPIs cb86befd_i c4ce6e73_o and TS 192.168.1.0/24 === 172.16.102.0/24
[I] May 25 03:42:02 ndm: IpSec::IpSecNetfilter: start reloading netfilter
configuration...
[I] May 25 03:42:02 ndm: IpSec::IpSecNetfilter: netfilter configuration reloading
is done.
[I] May 25 03:42:12 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 10, active CHILD SA: 1.
[I] May 25 03:42:12 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 10, active CHILD SA: 1.
[I] May 25 03:44:52 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(14:eb:b6:d0:19:de) GTK rekey done, group cipher
AES.
[I] May 25 03:44:52 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(a4:4b:d5:f3:e4:9f) GTK rekey done, group cipher
AES.
[I] May 25 03:44:52 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) GTK rekey done, group cipher
AES.
[I] May 25 03:44:58 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster0/AccessPoint0": STA(c8:3d:dc:ae:52:77) GTK rekey done, group cipher
AES.
[I] May 25 03:45:20 ndnproxy: answer from wrong socket, ignore.
[I] May 25 03:49:05 ndnproxy: Core::Syslog: last message repeated 2 times.
[I] May 25 03:49:33 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 25 03:51:12 ndnproxy: answer from wrong socket, ignore.
[I] May 25 03:56:50 ndnproxy: Core::Syslog: last message repeated 3 times.
[I] May 25 04:04:34 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 25 04:06:05 ndnproxy: answer from wrong socket, ignore.
[I] May 25 04:19:34 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 25 04:21:35 ndnproxy: answer from wrong socket, ignore.
[I] May 25 04:23:58 ndhcps: DHCPREQUEST received (STATE_RENEWING) for 192.168.1.35
from 22:fd:90:7a:6f:12.
[I] May 25 04:23:59 ndhcps: sending ACK of 192.168.1.35 to 22:fd:90:7a:6f:12.
[I] May 25 04:27:19 ipsec: 15[IKE] message verification failed
[I] May 25 04:27:19 ipsec: 15[IKE] IKE_SA_INIT request with message ID 0 processing
failed
[I] May 25 04:28:20 ndnproxy: answer from wrong socket, ignore.
[I] May 25 04:30:38 ipsec: 10[IKE] initiating IKE_SA ionline_EY[18] to
46.32.170.109
[I] May 25 04:30:38 ipsec: 13[CFG] received proposals:
IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
[I] May 25 04:30:38 ipsec: 13[CFG] configured proposals:
IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
[I] May 25 04:30:38 ipsec: 13[CFG] selected proposal:
IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
[I] May 25 04:30:38 ipsec: 13[IKE] scheduling rekeying in 3565s
[I] May 25 04:30:38 ipsec: 13[IKE] maximum IKE_SA lifetime 3585s
[I] May 25 04:30:38 ipsec: 13[IKE] IKE_SA ionline_EY[18] rekeyed between
78.109.53.15[7thsorrow.keenetic.pro]...46.32.170.109[46.32.170.109]
[I] May 25 04:30:38 ipsec: 13[IKE] deleting IKE_SA ionline_EY[14] between
78.109.53.15[7thsorrow.keenetic.pro]...46.32.170.109[46.32.170.109]
[I] May 25 04:30:38 ipsec: 13[IKE] sending DELETE for IKE_SA ionline_EY[14]
[I] May 25 04:30:38 ipsec: 14[IKE] IKE_SA deleted
[I] May 25 04:30:58 ndnproxy: answer from wrong socket, ignore.
[I] May 25 04:32:59 ndnproxy: answer from wrong socket, ignore.
[I] May 25 04:34:03 ipsec: 06[IKE] received ESP_TFC_PADDING_NOT_SUPPORTED, not
using ESPv3 TFC padding
[I] May 25 04:34:03 ipsec: 06[CFG] received proposals:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 25 04:34:03 ipsec: 06[CFG] configured proposals:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 25 04:34:03 ipsec: 06[CFG] selected proposal:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 25 04:34:03 ipsec: 06[IKE] inbound CHILD_SA ionline_EY{13} established with
SPIs c31d3f93_i cc585d3a_o and TS 192.168.1.0/24 === 172.16.102.0/24
[I] May 25 04:34:03 ndm: IpSec::Configurator: "ionline_EY": crypto map was
renegotiated.
[I] May 25 04:34:03 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 10, active CHILD SA: 0.
[I] May 25 04:34:03 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 11, active CHILD SA: 1, state up.
[I] May 25 04:34:03 ipsec: 12[IKE] received DELETE for ESP CHILD_SA with SPI
c4ce6e73
[I] May 25 04:34:03 ipsec: 12[IKE] closing CHILD_SA ionline_EY{12} with SPIs
cb86befd_i (0 bytes) c4ce6e73_o (0 bytes) and TS 192.168.1.0/24 === 172.16.102.0/24

[I] May 25 04:34:03 ipsec: 12[IKE] sending DELETE for ESP CHILD_SA with SPI
cb86befd
[I] May 25 04:34:03 ipsec: 12[IKE] CHILD_SA closed
[I] May 25 04:34:03 ipsec: 12[IKE] outbound CHILD_SA ionline_EY{13} established
with SPIs c31d3f93_i cc585d3a_o and TS 192.168.1.0/24 === 172.16.102.0/24
[I] May 25 04:34:03 ndm: IpSec::IpSecNetfilter: start reloading netfilter
configuration...
[I] May 25 04:34:03 ndm: IpSec::IpSecNetfilter: netfilter configuration reloading
is done.
[I] May 25 04:34:13 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 11, active CHILD SA: 1.
[I] May 25 04:34:13 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 11, active CHILD SA: 1.
[I] May 25 04:34:35 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 25 04:38:05 ndnproxy: answer from wrong socket, ignore.
[I] May 25 04:38:45 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 04:38:46 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 04:39:00 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 04:39:01 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 04:39:14 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 04:39:15 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 04:39:28 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 04:39:29 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 04:39:42 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 04:39:43 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 04:39:57 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 04:39:57 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 04:40:11 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 04:40:12 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 04:40:25 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 04:40:25 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 04:43:22 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 04:43:23 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 04:45:20 ndnproxy: answer from wrong socket, ignore.
[I] May 25 04:46:21 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(14:eb:b6:d0:19:de) GTK rekey done, group cipher
AES.
[I] May 25 04:46:21 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(a4:4b:d5:f3:e4:9f) GTK rekey done, group cipher
AES.
[I] May 25 04:46:21 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) GTK rekey done, group cipher
AES.
[I] May 25 04:46:27 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster0/AccessPoint0": STA(c8:3d:dc:ae:52:77) GTK rekey done, group cipher
AES.
[I] May 25 04:48:17 ipsec: 05[IKE] message verification failed
[I] May 25 04:48:17 ipsec: 05[IKE] IKE_SA_INIT request with message ID 0 processing
failed
[I] May 25 04:49:36 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 25 04:49:50 ndnproxy: answer from wrong socket, ignore.
[I] May 25 04:54:58 ndnproxy: Core::Syslog: last message repeated 2 times.
[I] May 25 04:56:25 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 04:56:26 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 04:56:35 ndnproxy: answer from wrong socket, ignore.
[I] May 25 05:01:57 ndhcps: DHCPREQUEST received (STATE_RENEWING) for 192.168.1.110
from 14:eb:b6:d0:19:dd.
[I] May 25 05:01:58 ndhcps: received ARP reply from 14:eb:b6:d0:19:de, not our
client.
[I] May 25 05:01:58 ndhcps: sending ACK of 192.168.1.110 to 14:eb:b6:d0:19:dd.
[I] May 25 05:02:20 ipsec: 15[IKE] message verification failed
[I] May 25 05:02:20 ipsec: 15[IKE] IKE_SA_INIT request with message ID 0 processing
failed
[I] May 25 05:02:54 ndhcps: DHCPREQUEST received (STATE_RENEWING) for 192.168.1.80
from a4:4b:d5:f3:e4:9f.
[I] May 25 05:02:54 ndhcps: sending ACK of 192.168.1.80 to a4:4b:d5:f3:e4:9f.
[I] May 25 05:03:01 ndhcps: DHCPREQUEST received (STATE_RENEWING) for 192.168.1.11
from 04:42:1a:26:ee:e6.
[I] May 25 05:03:01 ndhcps: sending ACK of 192.168.1.11 to 04:42:1a:26:ee:e6.
[I] May 25 05:04:38 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 25 05:05:13 ndnproxy: answer from wrong socket, ignore.
[W] May 25 05:06:16 https-dns-proxy: EA4E: "https://dns.adguard-dns.com/dns-query":
CURLINFO_SSL_VERIFYRESULT: Error (unable to establish TLS connection)
[I] May 25 05:07:15 ipsec: 05[IKE] no IKE config found for
78.109.53.15...194.187.178.179, sending NO_PROPOSAL_CHOSEN
[I] May 25 05:07:16 ipsec: 08[IKE] no IKE config found for
78.109.53.15...45.83.66.237, sending NO_PROPOSAL_CHOSEN
[I] May 25 05:07:56 ndnproxy: answer from wrong socket, ignore.
[I] May 25 05:16:05 ndnproxy: answer from wrong socket, ignore.
[I] May 25 05:16:06 ndhcps: DHCPREQUEST received (STATE_RENEWING) for 192.168.1.88
from c8:3d:dc:ae:52:77.
[I] May 25 05:16:07 ndhcps: sending ACK of 192.168.1.88 to c8:3d:dc:ae:52:77.
[I] May 25 05:16:20 ndnproxy: answer from wrong socket, ignore.
[I] May 25 05:17:04 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 05:17:05 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 05:18:20 ndnproxy: answer from wrong socket, ignore.
[I] May 25 05:19:38 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 25 05:20:17 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 05:20:17 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 05:20:31 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 05:20:31 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 05:22:03 ipsec: 08[IKE] received ESP_TFC_PADDING_NOT_SUPPORTED, not
using ESPv3 TFC padding
[I] May 25 05:22:03 ipsec: 08[CFG] received proposals:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 25 05:22:03 ipsec: 08[CFG] configured proposals:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 25 05:22:03 ipsec: 08[CFG] selected proposal:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 25 05:22:03 ipsec: 08[IKE] inbound CHILD_SA ionline_EY{14} established with
SPIs c5547b54_i cdc1379c_o and TS 192.168.1.0/24 === 172.16.102.0/24
[I] May 25 05:22:03 ndm: IpSec::Configurator: "ionline_EY": crypto map was
renegotiated.
[I] May 25 05:22:03 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 11, active CHILD SA: 0.
[I] May 25 05:22:03 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 11, active CHILD SA: 1, state up.
[I] May 25 05:22:03 ipsec: 03[IKE] received DELETE for ESP CHILD_SA with SPI
cc585d3a
[I] May 25 05:22:03 ipsec: 03[IKE] closing CHILD_SA ionline_EY{13} with SPIs
c31d3f93_i (0 bytes) cc585d3a_o (0 bytes) and TS 192.168.1.0/24 === 172.16.102.0/24

[I] May 25 05:22:03 ipsec: 03[IKE] sending DELETE for ESP CHILD_SA with SPI
c31d3f93
[I] May 25 05:22:03 ipsec: 03[IKE] CHILD_SA closed
[I] May 25 05:22:03 ipsec: 03[IKE] outbound CHILD_SA ionline_EY{14} established
with SPIs c5547b54_i cdc1379c_o and TS 192.168.1.0/24 === 172.16.102.0/24
[I] May 25 05:22:03 ndm: IpSec::IpSecNetfilter: start reloading netfilter
configuration...
[I] May 25 05:22:03 ndm: IpSec::IpSecNetfilter: netfilter configuration reloading
is done.
[I] May 25 05:22:13 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 11, active CHILD SA: 1.
[I] May 25 05:22:13 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 11, active CHILD SA: 1.
[I] May 25 05:23:05 ndnproxy: answer from wrong socket, ignore.
[I] May 25 05:30:03 ipsec: 09[IKE] initiating IKE_SA ionline_EY[23] to
46.32.170.109
[I] May 25 05:30:03 ipsec: 06[CFG] received proposals:
IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
[I] May 25 05:30:03 ipsec: 06[CFG] configured proposals:
IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
[I] May 25 05:30:03 ipsec: 06[CFG] selected proposal:
IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
[I] May 25 05:30:03 ipsec: 06[IKE] scheduling rekeying in 3571s
[I] May 25 05:30:03 ipsec: 06[IKE] maximum IKE_SA lifetime 3591s
[I] May 25 05:30:03 ipsec: 06[IKE] IKE_SA ionline_EY[23] rekeyed between
78.109.53.15[7thsorrow.keenetic.pro]...46.32.170.109[46.32.170.109]
[I] May 25 05:30:03 ipsec: 06[IKE] deleting IKE_SA ionline_EY[18] between
78.109.53.15[7thsorrow.keenetic.pro]...46.32.170.109[46.32.170.109]
[I] May 25 05:30:03 ipsec: 06[IKE] sending DELETE for IKE_SA ionline_EY[18]
[I] May 25 05:30:03 ipsec: 08[IKE] IKE_SA deleted
[I] May 25 05:32:50 ndnproxy: answer from wrong socket, ignore.
[I] May 25 05:34:38 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 25 05:36:20 ndnproxy: answer from wrong socket, ignore.
[I] May 25 05:45:46 ndnproxy: Core::Syslog: last message repeated 5 times.
[I] May 25 05:47:49 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(14:eb:b6:d0:19:de) GTK rekey done, group cipher
AES.
[I] May 25 05:47:49 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(a4:4b:d5:f3:e4:9f) GTK rekey done, group cipher
AES.
[I] May 25 05:47:50 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) GTK rekey done, group cipher
AES.
[I] May 25 05:47:55 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster0/AccessPoint0": STA(c8:3d:dc:ae:52:77) GTK rekey done, group cipher
AES.
[I] May 25 05:48:02 ndnproxy: answer from wrong socket, ignore.
[I] May 25 05:48:20 ndnproxy: answer from wrong socket, ignore.
[I] May 25 05:49:38 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 25 06:00:32 ndnproxy: answer from wrong socket, ignore.
[I] May 25 06:04:39 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 25 06:05:20 ndnproxy: answer from wrong socket, ignore.
[I] May 25 06:08:39 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 06:08:39 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 06:08:50 ndnproxy: answer from wrong socket, ignore.
[I] May 25 06:08:54 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 06:08:55 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 06:11:20 ndnproxy: answer from wrong socket, ignore.
[I] May 25 06:13:31 ipsec: 12[IKE] received ESP_TFC_PADDING_NOT_SUPPORTED, not
using ESPv3 TFC padding
[I] May 25 06:13:31 ipsec: 12[CFG] received proposals:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 25 06:13:31 ipsec: 12[CFG] configured proposals:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 25 06:13:31 ipsec: 12[CFG] selected proposal:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 25 06:13:31 ipsec: 12[IKE] inbound CHILD_SA ionline_EY{15} established with
SPIs cf6d6972_i c64aeede_o and TS 192.168.1.0/24 === 172.16.102.0/24
[I] May 25 06:13:31 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 12, active CHILD SA: 2, state up.
[I] May 25 06:13:31 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 12, active CHILD SA: 1.
[I] May 25 06:13:31 ndm: IpSec::Configurator: "ionline_EY": crypto map was
renegotiated.
[I] May 25 06:13:31 ipsec: 09[IKE] received DELETE for ESP CHILD_SA with SPI
cdc1379c
[I] May 25 06:13:31 ipsec: 09[IKE] closing CHILD_SA ionline_EY{14} with SPIs
c5547b54_i (0 bytes) cdc1379c_o (0 bytes) and TS 192.168.1.0/24 === 172.16.102.0/24

[I] May 25 06:13:31 ipsec: 09[IKE] sending DELETE for ESP CHILD_SA with SPI
c5547b54
[I] May 25 06:13:31 ipsec: 09[IKE] CHILD_SA closed
[I] May 25 06:13:31 ipsec: 09[IKE] outbound CHILD_SA ionline_EY{15} established
with SPIs cf6d6972_i c64aeede_o and TS 192.168.1.0/24 === 172.16.102.0/24
[I] May 25 06:13:32 ndm: IpSec::IpSecNetfilter: start reloading netfilter
configuration...
[I] May 25 06:13:32 ndm: IpSec::IpSecNetfilter: netfilter configuration reloading
is done.
[I] May 25 06:13:41 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 12, active CHILD SA: 1.
[I] May 25 06:13:41 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 12, active CHILD SA: 1.
[I] May 25 06:19:30 ndnproxy: answer from wrong socket, ignore.
[I] May 25 06:19:39 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 25 06:20:40 ndnproxy: answer from wrong socket, ignore.
[I] May 25 06:23:57 ndnproxy: Core::Syslog: last message repeated 3 times.
[I] May 25 06:29:34 ipsec: 11[IKE] initiating IKE_SA ionline_EY[24] to
46.32.170.109
[I] May 25 06:29:34 ipsec: 05[CFG] received proposals:
IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
[I] May 25 06:29:34 ipsec: 05[CFG] configured proposals:
IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
[I] May 25 06:29:34 ipsec: 05[CFG] selected proposal:
IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
[I] May 25 06:29:34 ipsec: 05[IKE] scheduling rekeying in 3561s
[I] May 25 06:29:34 ipsec: 05[IKE] maximum IKE_SA lifetime 3581s
[I] May 25 06:29:34 ipsec: 05[IKE] IKE_SA ionline_EY[24] rekeyed between
78.109.53.15[7thsorrow.keenetic.pro]...46.32.170.109[46.32.170.109]
[I] May 25 06:29:34 ipsec: 05[IKE] deleting IKE_SA ionline_EY[23] between
78.109.53.15[7thsorrow.keenetic.pro]...46.32.170.109[46.32.170.109]
[I] May 25 06:29:34 ipsec: 05[IKE] sending DELETE for IKE_SA ionline_EY[23]
[I] May 25 06:29:34 ipsec: 08[IKE] IKE_SA deleted
[I] May 25 06:31:50 ndnproxy: answer from wrong socket, ignore.
[I] May 25 06:34:30 ndnproxy: answer from wrong socket, ignore.
[I] May 25 06:34:33 ndm: Dns::Secure::DotConfigurator: fallback to built-in DNS to
resolve "dns.adguard-dns.com".
[I] May 25 06:34:33 ndm: Dns::Secure::DotConfigurator: fallback to built-in DNS to
resolve "cloudflare-dns.com".
[I] May 25 06:34:33 ndm: Dns::Secure::DohConfigurator: fallback to built-in DNS to
resolve "dns.google".
[I] May 25 06:34:33 ndm: Dns::Secure::DohConfigurator: fallback to built-in DNS to
resolve "dns.adguard-dns.com".
[I] May 25 06:34:33 ndm: Dns::Secure::DohConfigurator: fallback to built-in DNS to
resolve "cloudflare-dns.com".
[I] May 25 06:34:39 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 25 06:35:57 ndnproxy: answer from wrong socket, ignore.
[I] May 25 06:47:36 ndnproxy: Core::Syslog: last message repeated 7 times.
[I] May 25 06:47:49 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 06:47:49 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 06:48:35 ndnproxy: answer from wrong socket, ignore.
[I] May 25 06:49:18 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(14:eb:b6:d0:19:de) GTK rekey done, group cipher
AES.
[I] May 25 06:49:18 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(a4:4b:d5:f3:e4:9f) GTK rekey done, group cipher
AES.
[I] May 25 06:49:18 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) GTK rekey done, group cipher
AES.
[I] May 25 06:49:24 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster0/AccessPoint0": STA(c8:3d:dc:ae:52:77) GTK rekey done, group cipher
AES.
[I] May 25 06:49:37 ipsec: 15[IKE] message verification failed
[I] May 25 06:49:37 ipsec: 15[IKE] IKE_SA_INIT request with message ID 0 processing
failed
[I] May 25 06:49:39 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 25 06:49:50 ndnproxy: answer from wrong socket, ignore.
[I] May 25 06:56:28 ndnproxy: answer from wrong socket, ignore.
[I] May 25 06:57:02 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 06:57:03 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 07:00:02 ndnproxy: answer from wrong socket, ignore.
[I] May 25 07:01:24 ipsec: 13[IKE] message verification failed
[I] May 25 07:01:24 ipsec: 13[IKE] IKE_SA_INIT request with message ID 0 processing
failed
[I] May 25 07:03:27 ipsec: 07[IKE] received ESP_TFC_PADDING_NOT_SUPPORTED, not
using ESPv3 TFC padding
[I] May 25 07:03:27 ipsec: 07[CFG] received proposals:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 25 07:03:27 ipsec: 07[CFG] configured proposals:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 25 07:03:27 ipsec: 07[CFG] selected proposal:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 25 07:03:27 ipsec: 07[IKE] inbound CHILD_SA ionline_EY{16} established with
SPIs c31cadd4_i c5a9fd39_o and TS 192.168.1.0/24 === 172.16.102.0/24
[I] May 25 07:03:27 ndm: IpSec::Configurator: "ionline_EY": crypto map was
renegotiated.
[I] May 25 07:03:27 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 12, active CHILD SA: 0.
[I] May 25 07:03:27 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 13, active CHILD SA: 1, state up.
[I] May 25 07:03:27 ipsec: 03[IKE] received DELETE for ESP CHILD_SA with SPI
c64aeede
[I] May 25 07:03:27 ipsec: 03[IKE] closing CHILD_SA ionline_EY{15} with SPIs
cf6d6972_i (0 bytes) c64aeede_o (0 bytes) and TS 192.168.1.0/24 === 172.16.102.0/24

[I] May 25 07:03:27 ipsec: 03[IKE] sending DELETE for ESP CHILD_SA with SPI
cf6d6972
[I] May 25 07:03:27 ipsec: 03[IKE] CHILD_SA closed
[I] May 25 07:03:27 ipsec: 03[IKE] outbound CHILD_SA ionline_EY{16} established
with SPIs c31cadd4_i c5a9fd39_o and TS 192.168.1.0/24 === 172.16.102.0/24
[I] May 25 07:03:27 ndm: IpSec::IpSecNetfilter: start reloading netfilter
configuration...
[I] May 25 07:03:27 ndm: IpSec::IpSecNetfilter: netfilter configuration reloading
is done.
[I] May 25 07:03:37 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 13, active CHILD SA: 1.
[I] May 25 07:03:37 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 13, active CHILD SA: 1.
[I] May 25 07:03:53 ndnproxy: answer from wrong socket, ignore.
[I] May 25 07:04:39 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 25 07:05:11 ndnproxy: answer from wrong socket, ignore.
[I] May 25 07:10:05 ndnproxy: Core::Syslog: last message repeated 3 times.
[I] May 25 07:19:40 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 25 07:20:47 ndnproxy: answer from wrong socket, ignore.
[I] May 25 07:21:37 ndnproxy: Core::Syslog: last message repeated 5 times.
[I] May 25 07:26:47 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 07:26:47 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 07:27:01 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 07:27:02 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 07:27:21 ndnproxy: answer from wrong socket, ignore.
[I] May 25 07:27:43 ndnproxy: Core::Syslog: last message repeated 3 times.
[I] May 25 07:28:52 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 07:28:52 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 07:28:55 ipsec: 07[IKE] initiating IKE_SA ionline_EY[27] to
46.32.170.109
[I] May 25 07:28:55 ipsec: 15[CFG] received proposals:
IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
[I] May 25 07:28:55 ipsec: 15[CFG] configured proposals:
IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
[I] May 25 07:28:55 ipsec: 15[CFG] selected proposal:
IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
[I] May 25 07:28:55 ipsec: 15[IKE] scheduling rekeying in 3569s
[I] May 25 07:28:55 ipsec: 15[IKE] maximum IKE_SA lifetime 3589s
[I] May 25 07:28:55 ipsec: 15[IKE] IKE_SA ionline_EY[27] rekeyed between
78.109.53.15[7thsorrow.keenetic.pro]...46.32.170.109[46.32.170.109]
[I] May 25 07:28:55 ipsec: 15[IKE] deleting IKE_SA ionline_EY[24] between
78.109.53.15[7thsorrow.keenetic.pro]...46.32.170.109[46.32.170.109]
[I] May 25 07:28:55 ipsec: 15[IKE] sending DELETE for IKE_SA ionline_EY[24]
[I] May 25 07:28:55 ipsec: 14[IKE] IKE_SA deleted
[I] May 25 07:29:05 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 07:29:06 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 07:29:22 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 07:29:22 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 07:29:59 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 07:29:59 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 07:31:02 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 07:31:02 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 07:31:13 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 07:31:13 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 07:31:29 ndnproxy: answer from wrong socket, ignore.
[I] May 25 07:31:31 ndnproxy: Core::Syslog: last message repeated 2 times.
[I] May 25 07:31:54 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 07:31:54 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 07:32:05 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 07:32:05 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 07:32:23 ndnproxy: answer from wrong socket, ignore.
[I] May 25 07:32:42 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 07:32:42 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 07:34:40 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 25 07:37:35 ndnproxy: answer from wrong socket, ignore.
[I] May 25 07:37:48 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 07:37:48 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 07:38:06 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 07:38:06 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 07:38:45 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 07:38:45 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 07:39:21 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 07:39:21 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 07:39:57 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 07:39:57 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 07:40:34 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 07:40:34 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 07:41:13 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 07:41:14 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 07:44:00 ndnproxy: answer from wrong socket, ignore.
[I] May 25 07:44:40 ndhcps: DHCPDISCOVER received for 192.168.1.94 from
00:e0:4c:36:02:d4.
[I] May 25 07:44:40 ndhcps: making OFFER of 192.168.1.94 to 00:e0:4c:36:02:d4.
[I] May 25 07:44:40 ndhcps: DHCPREQUEST received (STATE_SELECTING) for 192.168.1.94
from 00:e0:4c:36:02:d4.
[I] May 25 07:44:41 ndhcps: sending ACK of 192.168.1.94 to 00:e0:4c:36:02:d4.
[I] May 25 07:44:42 ipsec: 15[IKE] received retransmit of request with ID 93,
retransmitting response
[I] May 25 07:44:54 ndnproxy: answer from wrong socket, ignore.
[I] May 25 07:48:20 ndnproxy: answer from wrong socket, ignore.
[I] May 25 07:49:40 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 25 07:50:46 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(14:eb:b6:d0:19:de) GTK rekey done, group cipher
AES.
[I] May 25 07:50:46 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(a4:4b:d5:f3:e4:9f) GTK rekey done, group cipher
AES.
[I] May 25 07:50:47 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) GTK rekey done, group cipher
AES.
[I] May 25 07:50:52 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster0/AccessPoint0": STA(c8:3d:dc:ae:52:77) GTK rekey done, group cipher
AES.
[I] May 25 07:52:40 ndnproxy: answer from wrong socket, ignore.
[I] May 25 07:53:50 ipsec: 12[IKE] received ESP_TFC_PADDING_NOT_SUPPORTED, not
using ESPv3 TFC padding
[I] May 25 07:53:50 ipsec: 12[CFG] received proposals:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 25 07:53:50 ipsec: 12[CFG] configured proposals:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 25 07:53:50 ipsec: 12[CFG] selected proposal:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 25 07:53:50 ipsec: 12[IKE] inbound CHILD_SA ionline_EY{17} established with
SPIs c5be374a_i c99bf574_o and TS 192.168.1.0/24 === 172.16.102.0/24
[I] May 25 07:53:50 ndm: IpSec::Configurator: "ionline_EY": crypto map was
renegotiated.
[I] May 25 07:53:50 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 13, active CHILD SA: 0.
[I] May 25 07:53:50 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 14, active CHILD SA: 1, state up.
[I] May 25 07:53:50 ipsec: 06[IKE] received DELETE for ESP CHILD_SA with SPI
c5a9fd39
[I] May 25 07:53:50 ipsec: 06[IKE] closing CHILD_SA ionline_EY{16} with SPIs
c31cadd4_i (0 bytes) c5a9fd39_o (0 bytes) and TS 192.168.1.0/24 === 172.16.102.0/24

[I] May 25 07:53:50 ipsec: 06[IKE] sending DELETE for ESP CHILD_SA with SPI
c31cadd4
[I] May 25 07:53:50 ipsec: 06[IKE] CHILD_SA closed
[I] May 25 07:53:50 ipsec: 06[IKE] outbound CHILD_SA ionline_EY{17} established
with SPIs c5be374a_i c99bf574_o and TS 192.168.1.0/24 === 172.16.102.0/24
[I] May 25 07:53:50 ndm: IpSec::IpSecNetfilter: start reloading netfilter
configuration...
[I] May 25 07:53:50 ndm: IpSec::IpSecNetfilter: netfilter configuration reloading
is done.
[I] May 25 07:53:58 ndhcps: DHCPREQUEST received (STATE_RENEWING) for 192.168.1.35
from 22:fd:90:7a:6f:12.
[I] May 25 07:53:59 ndhcps: sending ACK of 192.168.1.35 to 22:fd:90:7a:6f:12.
[I] May 25 07:54:00 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 14, active CHILD SA: 1.
[I] May 25 07:54:00 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 14, active CHILD SA: 1.
[I] May 25 07:55:03 ndnproxy: answer from wrong socket, ignore.
[I] May 25 08:01:54 ndnproxy: Core::Syslog: last message repeated 2 times.
[I] May 25 08:03:10 ipsec: 15[IKE] message verification failed
[I] May 25 08:03:10 ipsec: 15[IKE] IKE_SA_INIT request with message ID 0 processing
failed
[I] May 25 08:03:34 ipsec: 06[IKE] message verification failed
[I] May 25 08:03:34 ipsec: 06[IKE] IKE_SA_INIT request with message ID 0 processing
failed
[I] May 25 08:03:40 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 08:03:40 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 08:04:40 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 25 08:05:05 ndnproxy: answer from wrong socket, ignore.
[I] May 25 08:17:35 ndnproxy: answer from wrong socket, ignore.
[I] May 25 08:18:13 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had been aged-out and
disassociated (idle silence).
[I] May 25 08:19:40 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 25 08:24:05 ndnproxy: answer from wrong socket, ignore.
[I] May 25 08:26:20 ndnproxy: answer from wrong socket, ignore.
[I] May 25 08:28:24 ipsec: 12[IKE] initiating IKE_SA ionline_EY[30] to
46.32.170.109
[I] May 25 08:28:24 ipsec: 06[CFG] received proposals:
IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
[I] May 25 08:28:24 ipsec: 06[CFG] configured proposals:
IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
[I] May 25 08:28:24 ipsec: 06[CFG] selected proposal:
IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
[I] May 25 08:28:24 ipsec: 06[IKE] scheduling rekeying in 3562s
[I] May 25 08:28:24 ipsec: 06[IKE] maximum IKE_SA lifetime 3582s
[I] May 25 08:28:24 ipsec: 06[IKE] IKE_SA ionline_EY[30] rekeyed between
78.109.53.15[7thsorrow.keenetic.pro]...46.32.170.109[46.32.170.109]
[I] May 25 08:28:24 ipsec: 06[IKE] deleting IKE_SA ionline_EY[27] between
78.109.53.15[7thsorrow.keenetic.pro]...46.32.170.109[46.32.170.109]
[I] May 25 08:28:24 ipsec: 06[IKE] sending DELETE for IKE_SA ionline_EY[27]
[I] May 25 08:28:24 ipsec: 07[IKE] IKE_SA deleted
[I] May 25 08:28:35 ndnproxy: answer from wrong socket, ignore.
[I] May 25 08:31:57 ndhcps: DHCPREQUEST received (STATE_RENEWING) for 192.168.1.110
from 14:eb:b6:d0:19:dd.
[I] May 25 08:31:58 ndhcps: received ARP reply from 14:eb:b6:d0:19:de, not our
client.
[I] May 25 08:31:58 ndhcps: sending ACK of 192.168.1.110 to 14:eb:b6:d0:19:dd.
[I] May 25 08:32:54 ndhcps: DHCPREQUEST received (STATE_RENEWING) for 192.168.1.80
from a4:4b:d5:f3:e4:9f.
[I] May 25 08:32:55 ndhcps: sending ACK of 192.168.1.80 to a4:4b:d5:f3:e4:9f.
[I] May 25 08:33:01 ndhcps: DHCPREQUEST received (STATE_RENEWING) for 192.168.1.11
from 04:42:1a:26:ee:e6.
[I] May 25 08:33:02 ndhcps: sending ACK of 192.168.1.11 to 04:42:1a:26:ee:e6.
[I] May 25 08:33:57 ndnproxy: answer from wrong socket, ignore.
[I] May 25 08:34:33 ndnproxy: answer from wrong socket, ignore.
[I] May 25 08:34:40 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 25 08:42:31 ndnproxy: answer from wrong socket, ignore.
[I] May 25 08:42:36 ndnproxy: Core::Syslog: last message repeated 3 times.
[I] May 25 08:44:46 ipsec: 06[IKE] received ESP_TFC_PADDING_NOT_SUPPORTED, not
using ESPv3 TFC padding
[I] May 25 08:44:46 ipsec: 06[CFG] received proposals:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 25 08:44:46 ipsec: 06[CFG] configured proposals:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 25 08:44:46 ipsec: 06[CFG] selected proposal:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 25 08:44:47 ipsec: 06[IKE] inbound CHILD_SA ionline_EY{18} established with
SPIs c2f0da8e_i c53b53e1_o and TS 192.168.1.0/24 === 172.16.102.0/24
[I] May 25 08:44:47 ndm: IpSec::Configurator: "ionline_EY": crypto map was
renegotiated.
[I] May 25 08:44:47 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 14, active CHILD SA: 0.
[I] May 25 08:44:47 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 15, active CHILD SA: 1, state up.
[I] May 25 08:44:47 ipsec: 11[IKE] received DELETE for ESP CHILD_SA with SPI
c99bf574
[I] May 25 08:44:47 ipsec: 11[IKE] closing CHILD_SA ionline_EY{17} with SPIs
c5be374a_i (0 bytes) c99bf574_o (0 bytes) and TS 192.168.1.0/24 === 172.16.102.0/24

[I] May 25 08:44:47 ipsec: 11[IKE] sending DELETE for ESP CHILD_SA with SPI
c5be374a
[I] May 25 08:44:47 ipsec: 11[IKE] CHILD_SA closed
[I] May 25 08:44:47 ipsec: 11[IKE] outbound CHILD_SA ionline_EY{18} established
with SPIs c2f0da8e_i c53b53e1_o and TS 192.168.1.0/24 === 172.16.102.0/24
[I] May 25 08:44:47 ndm: IpSec::IpSecNetfilter: start reloading netfilter
configuration...
[I] May 25 08:44:47 ndm: IpSec::IpSecNetfilter: netfilter configuration reloading
is done.
[I] May 25 08:44:57 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 15, active CHILD SA: 1.
[I] May 25 08:44:57 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 15, active CHILD SA: 1.
[I] May 25 08:45:20 ndnproxy: answer from wrong socket, ignore.
[I] May 25 08:46:07 ndhcps: DHCPREQUEST received (STATE_RENEWING) for 192.168.1.88
from c8:3d:dc:ae:52:77.
[I] May 25 08:46:07 ndhcps: sending ACK of 192.168.1.88 to c8:3d:dc:ae:52:77.
[I] May 25 08:47:59 ndnproxy: answer from wrong socket, ignore.
[I] May 25 08:49:40 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 25 08:52:14 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(14:eb:b6:d0:19:de) GTK rekey done, group cipher
AES.
[I] May 25 08:52:15 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(a4:4b:d5:f3:e4:9f) GTK rekey done, group cipher
AES.
[I] May 25 08:52:20 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster0/AccessPoint0": STA(c8:3d:dc:ae:52:77) GTK rekey done, group cipher
AES.
[I] May 25 08:52:28 ndnproxy: answer from wrong socket, ignore.
[I] May 25 09:04:35 ndnproxy: Core::Syslog: last message repeated 5 times.
[I] May 25 09:04:40 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 25 09:05:02 ndnproxy: answer from wrong socket, ignore.
[I] May 25 09:06:15 ndnproxy: answer from wrong socket, ignore.
[I] May 25 09:06:24 ipsec: 03[IKE] received retransmit of request with ID 227,
retransmitting response
[I] May 25 09:11:49 ndnproxy: answer from wrong socket, ignore.
[I] May 25 09:15:35 ndnproxy: Core::Syslog: last message repeated 3 times.
[I] May 25 09:16:30 ipsec: 10[IKE] no IKE config found for
78.109.53.15...74.82.47.20, sending NO_PROPOSAL_CHOSEN
[I] May 25 09:19:00 ndnproxy: answer from wrong socket, ignore.
[I] May 25 09:19:40 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 25 09:23:23 ipsec: 14[IKE] message verification failed
[I] May 25 09:23:23 ipsec: 14[IKE] IKE_SA_INIT request with message ID 0 processing
failed
[I] May 25 09:24:20 ndnproxy: answer from wrong socket, ignore.
[I] May 25 09:27:33 ndnproxy: Core::Syslog: last message repeated 4 times.
[I] May 25 09:27:46 ipsec: 13[IKE] initiating IKE_SA ionline_EY[33] to
46.32.170.109
[I] May 25 09:27:46 ipsec: 14[CFG] received proposals:
IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
[I] May 25 09:27:46 ipsec: 14[CFG] configured proposals:
IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
[I] May 25 09:27:46 ipsec: 14[CFG] selected proposal:
IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
[I] May 25 09:27:46 ipsec: 14[IKE] scheduling rekeying in 3571s
[I] May 25 09:27:46 ipsec: 14[IKE] maximum IKE_SA lifetime 3591s
[I] May 25 09:27:46 ipsec: 14[IKE] IKE_SA ionline_EY[33] rekeyed between
78.109.53.15[7thsorrow.keenetic.pro]...46.32.170.109[46.32.170.109]
[I] May 25 09:27:46 ipsec: 14[IKE] deleting IKE_SA ionline_EY[30] between
78.109.53.15[7thsorrow.keenetic.pro]...46.32.170.109[46.32.170.109]
[I] May 25 09:27:46 ipsec: 14[IKE] sending DELETE for IKE_SA ionline_EY[30]
[I] May 25 09:27:46 ipsec: 09[IKE] IKE_SA deleted
[I] May 25 09:30:27 ndnproxy: answer from wrong socket, ignore.
[I] May 25 09:32:58 ipsec: 09[IKE] received ESP_TFC_PADDING_NOT_SUPPORTED, not
using ESPv3 TFC padding
[I] May 25 09:32:58 ipsec: 09[CFG] received proposals:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 25 09:32:58 ipsec: 09[CFG] configured proposals:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 25 09:32:58 ipsec: 09[CFG] selected proposal:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 25 09:32:58 ipsec: 09[IKE] inbound CHILD_SA ionline_EY{19} established with
SPIs c1b56a9c_i cba3c307_o and TS 192.168.1.0/24 === 172.16.102.0/24
[I] May 25 09:32:58 ndm: IpSec::Configurator: "ionline_EY": crypto map was
renegotiated.
[I] May 25 09:32:58 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 15, active CHILD SA: 0.
[I] May 25 09:32:58 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 16, active CHILD SA: 1, state up.
[I] May 25 09:32:58 ipsec: 05[IKE] received DELETE for ESP CHILD_SA with SPI
c53b53e1
[I] May 25 09:32:58 ipsec: 05[IKE] closing CHILD_SA ionline_EY{18} with SPIs
c2f0da8e_i (0 bytes) c53b53e1_o (0 bytes) and TS 192.168.1.0/24 === 172.16.102.0/24

[I] May 25 09:32:58 ipsec: 05[IKE] sending DELETE for ESP CHILD_SA with SPI
c2f0da8e
[I] May 25 09:32:58 ipsec: 05[IKE] CHILD_SA closed
[I] May 25 09:32:58 ipsec: 05[IKE] outbound CHILD_SA ionline_EY{19} established
with SPIs c1b56a9c_i cba3c307_o and TS 192.168.1.0/24 === 172.16.102.0/24
[I] May 25 09:32:58 ndm: IpSec::IpSecNetfilter: start reloading netfilter
configuration...
[I] May 25 09:32:58 ndm: IpSec::IpSecNetfilter: netfilter configuration reloading
is done.
[I] May 25 09:33:00 ndnproxy: answer from wrong socket, ignore.
[I] May 25 09:33:08 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 16, active CHILD SA: 1.
[I] May 25 09:33:08 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 16, active CHILD SA: 1.
[I] May 25 09:33:38 ndnproxy: answer from wrong socket, ignore.
[I] May 25 09:34:41 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 25 09:38:15 ndnproxy: answer from wrong socket, ignore.
[I] May 25 09:47:54 ndnproxy: Core::Syslog: last message repeated 2 times.
[I] May 25 09:49:41 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 25 09:53:43 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(14:eb:b6:d0:19:de) GTK rekey done, group cipher
AES.
[I] May 25 09:53:43 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(a4:4b:d5:f3:e4:9f) GTK rekey done, group cipher
AES.
[I] May 25 09:53:49 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster0/AccessPoint0": STA(c8:3d:dc:ae:52:77) GTK rekey done, group cipher
AES.
[I] May 25 09:55:50 ndnproxy: answer from wrong socket, ignore.
[I] May 25 09:56:17 ipsec: 13[IKE] message verification failed
[I] May 25 09:56:17 ipsec: 13[IKE] IKE_SA_INIT request with message ID 0 processing
failed
[I] May 25 09:59:05 ndnproxy: answer from wrong socket, ignore.
[I] May 25 10:01:07 ndnproxy: Core::Syslog: last message repeated 2 times.
[I] May 25 10:04:41 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 25 10:04:50 ndnproxy: answer from wrong socket, ignore.
[I] May 25 10:05:09 ndnproxy: answer from wrong socket, ignore.
[I] May 25 10:06:47 ipsec: 15[IKE] received retransmit of request with ID 234,
retransmitting response
[I] May 25 10:08:35 ndnproxy: answer from wrong socket, ignore.
[I] May 25 10:17:50 ndnproxy: Core::Syslog: last message repeated 3 times.
[I] May 25 10:19:41 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 25 10:22:05 ndnproxy: answer from wrong socket, ignore.
[I] May 25 10:22:08 ipsec: 06[IKE] received ESP_TFC_PADDING_NOT_SUPPORTED, not
using ESPv3 TFC padding
[I] May 25 10:22:08 ipsec: 06[CFG] received proposals:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 25 10:22:08 ipsec: 06[CFG] configured proposals:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 25 10:22:08 ipsec: 06[CFG] selected proposal:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 25 10:22:08 ipsec: 06[IKE] inbound CHILD_SA ionline_EY{20} established with
SPIs c61cb13c_i c0f26b46_o and TS 192.168.1.0/24 === 172.16.102.0/24
[I] May 25 10:22:08 ndm: IpSec::Configurator: "ionline_EY": crypto map was
renegotiated.
[I] May 25 10:22:08 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 16, active CHILD SA: 0.
[I] May 25 10:22:08 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 16, active CHILD SA: 1, state up.
[I] May 25 10:22:08 ipsec: 14[IKE] received DELETE for ESP CHILD_SA with SPI
cba3c307
[I] May 25 10:22:08 ipsec: 14[IKE] closing CHILD_SA ionline_EY{19} with SPIs
c1b56a9c_i (0 bytes) cba3c307_o (0 bytes) and TS 192.168.1.0/24 === 172.16.102.0/24

[I] May 25 10:22:08 ipsec: 14[IKE] sending DELETE for ESP CHILD_SA with SPI
c1b56a9c
[I] May 25 10:22:08 ipsec: 14[IKE] CHILD_SA closed
[I] May 25 10:22:08 ipsec: 14[IKE] outbound CHILD_SA ionline_EY{20} established
with SPIs c61cb13c_i c0f26b46_o and TS 192.168.1.0/24 === 172.16.102.0/24
[I] May 25 10:22:08 ndm: IpSec::IpSecNetfilter: start reloading netfilter
configuration...
[I] May 25 10:22:08 ndm: IpSec::IpSecNetfilter: netfilter configuration reloading
is done.
[I] May 25 10:22:10 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster0/AccessPoint0": STA(a4:4b:d5:f3:e4:9f) had re-associated successfully.
[I] May 25 10:22:10 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster0/AccessPoint0": STA(a4:4b:d5:f3:e4:9f) set key done in WPA2/WPA2PSK.
[I] May 25 10:22:18 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 16, active CHILD SA: 1.
[I] May 25 10:22:18 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 16, active CHILD SA: 1.
[I] May 25 10:24:50 ndnproxy: answer from wrong socket, ignore.
[I] May 25 10:26:34 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster0/AccessPoint0": STA(a4:4b:d5:f3:e4:9f) had associated successfully.
[I] May 25 10:26:34 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster0/AccessPoint0": STA(a4:4b:d5:f3:e4:9f) had associated successfully.
[I] May 25 10:26:39 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster0/AccessPoint0": STA(a4:4b:d5:f3:e4:9f) pairwise key handshaking timeout
(msg 1 of 4-way).
[I] May 25 10:26:39 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster0/AccessPoint0": STA(a4:4b:d5:f3:e4:9f) had deauthenticated by AP
(reason: PTK 4-way handshake timeout).
[I] May 25 10:27:17 ipsec: 13[IKE] initiating IKE_SA ionline_EY[35] to
46.32.170.109
[I] May 25 10:27:17 ipsec: 07[CFG] received proposals:
IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
[I] May 25 10:27:17 ipsec: 07[CFG] configured proposals:
IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
[I] May 25 10:27:17 ipsec: 07[CFG] selected proposal:
IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
[I] May 25 10:27:17 ipsec: 07[IKE] scheduling rekeying in 3574s
[I] May 25 10:27:17 ipsec: 07[IKE] maximum IKE_SA lifetime 3594s
[I] May 25 10:27:17 ipsec: 07[IKE] IKE_SA ionline_EY[35] rekeyed between
78.109.53.15[7thsorrow.keenetic.pro]...46.32.170.109[46.32.170.109]
[I] May 25 10:27:17 ipsec: 07[IKE] deleting IKE_SA ionline_EY[33] between
78.109.53.15[7thsorrow.keenetic.pro]...46.32.170.109[46.32.170.109]
[I] May 25 10:27:17 ipsec: 07[IKE] sending DELETE for IKE_SA ionline_EY[33]
[I] May 25 10:27:17 ipsec: 14[IKE] IKE_SA deleted
[I] May 25 10:29:47 ndnproxy: answer from wrong socket, ignore.
[I] May 25 10:32:50 ndnproxy: Core::Syslog: last message repeated 3 times.
[I] May 25 10:32:54 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster0/AccessPoint0": STA(a4:4b:d5:f3:e4:9f) had associated successfully.
[I] May 25 10:32:54 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster0/AccessPoint0": STA(a4:4b:d5:f3:e4:9f) set key done in WPA2/WPA2PSK.
[I] May 25 10:32:54 ndhcps: DHCPDISCOVER received from a4:4b:d5:f3:e4:9f.
[I] May 25 10:32:54 ndhcps: making OFFER of 192.168.1.80 to a4:4b:d5:f3:e4:9f.
[I] May 25 10:32:54 ndhcps: DHCPREQUEST received (STATE_SELECTING) for 192.168.1.80
from a4:4b:d5:f3:e4:9f.
[I] May 25 10:32:55 ndhcps: sending ACK of 192.168.1.80 to a4:4b:d5:f3:e4:9f.
[I] May 25 10:33:17 ndnproxy: answer from wrong socket, ignore.
[I] May 25 10:34:33 ndnproxy: answer from wrong socket, ignore.
[I] May 25 10:34:41 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 25 10:37:52 ndnproxy: answer from wrong socket, ignore.
[I] May 25 10:46:05 ndnproxy: Core::Syslog: last message repeated 3 times.
[I] May 25 10:46:37 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster0/AccessPoint0": STA(a4:4b:d5:f3:e4:9f) had been aged-out and
disassociated (idle silence).
[I] May 25 10:47:50 ndnproxy: answer from wrong socket, ignore.
[I] May 25 10:48:38 ndnproxy: answer from wrong socket, ignore.
[I] May 25 10:49:41 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 25 10:55:11 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(14:eb:b6:d0:19:de) GTK rekey done, group cipher
AES.
[I] May 25 10:55:18 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster0/AccessPoint0": STA(c8:3d:dc:ae:52:77) GTK rekey done, group cipher
AES.
[I] May 25 11:00:19 ndnproxy: answer from wrong socket, ignore.
[I] May 25 11:02:32 ipsec: 03[IKE] message verification failed
[I] May 25 11:02:32 ipsec: 03[IKE] IKE_SA_INIT request with message ID 0 processing
failed
[I] May 25 11:04:41 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 25 11:04:46 ipsec: 12[IKE] no IKE config found for
78.109.53.15...169.228.66.212, sending NO_PROPOSAL_CHOSEN
[I] May 25 11:04:46 ipsec: 15[IKE] no IKE config found for
78.109.53.15...169.228.66.212, sending NO_PROPOSAL_CHOSEN
[I] May 25 11:11:42 ndnproxy: answer from wrong socket, ignore.
[I] May 25 11:11:44 ndnproxy: answer from wrong socket, ignore.
[I] May 25 11:14:01 ipsec: 13[IKE] received ESP_TFC_PADDING_NOT_SUPPORTED, not
using ESPv3 TFC padding
[I] May 25 11:14:01 ipsec: 13[CFG] received proposals:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 25 11:14:01 ipsec: 13[CFG] configured proposals:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 25 11:14:01 ipsec: 13[CFG] selected proposal:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 25 11:14:01 ipsec: 13[IKE] inbound CHILD_SA ionline_EY{21} established with
SPIs cca3dce1_i cc3edf37_o and TS 192.168.1.0/24 === 172.16.102.0/24
[I] May 25 11:14:01 ndm: IpSec::Configurator: "ionline_EY": crypto map was
renegotiated.
[I] May 25 11:14:02 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 16, active CHILD SA: 0.
[I] May 25 11:14:02 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 17, active CHILD SA: 1, state up.
[I] May 25 11:14:02 ipsec: 05[IKE] received DELETE for ESP CHILD_SA with SPI
c0f26b46
[I] May 25 11:14:02 ipsec: 05[IKE] closing CHILD_SA ionline_EY{20} with SPIs
c61cb13c_i (0 bytes) c0f26b46_o (0 bytes) and TS 192.168.1.0/24 === 172.16.102.0/24

[I] May 25 11:14:02 ipsec: 05[IKE] sending DELETE for ESP CHILD_SA with SPI
c61cb13c
[I] May 25 11:14:02 ipsec: 05[IKE] CHILD_SA closed
[I] May 25 11:14:02 ipsec: 05[IKE] outbound CHILD_SA ionline_EY{21} established
with SPIs cca3dce1_i cc3edf37_o and TS 192.168.1.0/24 === 172.16.102.0/24
[I] May 25 11:14:02 ndm: IpSec::IpSecNetfilter: start reloading netfilter
configuration...
[I] May 25 11:14:02 ndm: IpSec::IpSecNetfilter: netfilter configuration reloading
is done.
[I] May 25 11:14:12 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 17, active CHILD SA: 1.
[I] May 25 11:14:12 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 17, active CHILD SA: 1.
[I] May 25 11:19:44 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 25 11:22:01 ipsec: 10[IKE] message verification failed
[I] May 25 11:22:01 ipsec: 10[IKE] IKE_SA_INIT request with message ID 0 processing
failed
[I] May 25 11:24:20 ndnproxy: answer from wrong socket, ignore.
[I] May 25 11:25:05 ndnproxy: answer from wrong socket, ignore.
[I] May 25 11:26:51 ipsec: 05[IKE] initiating IKE_SA ionline_EY[40] to
46.32.170.109
[I] May 25 11:26:52 ipsec: 12[CFG] received proposals:
IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
[I] May 25 11:26:52 ipsec: 12[CFG] configured proposals:
IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
[I] May 25 11:26:52 ipsec: 12[CFG] selected proposal:
IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
[I] May 25 11:26:52 ipsec: 12[IKE] scheduling rekeying in 3573s
[I] May 25 11:26:52 ipsec: 12[IKE] maximum IKE_SA lifetime 3593s
[I] May 25 11:26:52 ipsec: 12[IKE] IKE_SA ionline_EY[40] rekeyed between
78.109.53.15[7thsorrow.keenetic.pro]...46.32.170.109[46.32.170.109]
[I] May 25 11:26:52 ipsec: 12[IKE] deleting IKE_SA ionline_EY[35] between
78.109.53.15[7thsorrow.keenetic.pro]...46.32.170.109[46.32.170.109]
[I] May 25 11:26:52 ipsec: 12[IKE] sending DELETE for IKE_SA ionline_EY[35]
[I] May 25 11:26:52 ipsec: 03[IKE] IKE_SA deleted
[I] May 25 11:28:04 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster0/AccessPoint0": STA(c8:3d:dc:ae:52:77) had associated successfully.
[I] May 25 11:28:04 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster0/AccessPoint0": STA(c8:3d:dc:ae:52:77) set key done in WPA2/WPA2PSK.
[I] May 25 11:28:04 ndhcps: DHCPDISCOVER received from c8:3d:dc:ae:52:77.
[I] May 25 11:28:04 ndhcps: making OFFER of 192.168.1.88 to c8:3d:dc:ae:52:77.
[I] May 25 11:28:04 ndhcps: DHCPREQUEST received (STATE_SELECTING) for 192.168.1.88
from c8:3d:dc:ae:52:77.
[I] May 25 11:28:05 ndhcps: sending ACK of 192.168.1.88 to c8:3d:dc:ae:52:77.
[I] May 25 11:28:47 ndnproxy: answer from wrong socket, ignore.
[I] May 25 11:33:54 ndnproxy: Core::Syslog: last message repeated 5 times.
[I] May 25 11:34:45 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 25 11:41:15 ndnproxy: answer from wrong socket, ignore.
[I] May 25 11:46:08 ndnproxy: Core::Syslog: last message repeated 4 times.
[I] May 25 11:49:47 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 25 11:50:51 ndnproxy: answer from wrong socket, ignore.
[I] May 25 11:53:52 ndnproxy: Core::Syslog: last message repeated 5 times.
[I] May 25 11:56:40 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(14:eb:b6:d0:19:de) GTK rekey done, group cipher
AES.
[I] May 25 11:56:46 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster0/AccessPoint0": STA(c8:3d:dc:ae:52:77) GTK rekey done, group cipher
AES.
[I] May 25 12:01:12 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster0/AccessPoint0": STA(a4:4b:d5:f3:e4:9f) had associated successfully.
[I] May 25 12:01:12 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster0/AccessPoint0": STA(a4:4b:d5:f3:e4:9f) set key done in WPA2/WPA2PSK.
[I] May 25 12:01:12 ndhcps: DHCPDISCOVER received from a4:4b:d5:f3:e4:9f.
[I] May 25 12:01:12 ndhcps: making OFFER of 192.168.1.80 to a4:4b:d5:f3:e4:9f.
[I] May 25 12:01:12 ndhcps: DHCPREQUEST received (STATE_SELECTING) for 192.168.1.80
from a4:4b:d5:f3:e4:9f.
[I] May 25 12:01:12 ndhcps: sending ACK of 192.168.1.80 to a4:4b:d5:f3:e4:9f.
[I] May 25 12:01:41 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(a4:4b:d5:f3:e4:9f) had re-associated successfully.
[I] May 25 12:01:41 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(a4:4b:d5:f3:e4:9f) set key done in WPA2/WPA2PSK.
[I] May 25 12:01:50 ndnproxy: answer from wrong socket, ignore.
[I] May 25 12:01:57 ndhcps: DHCPREQUEST received (STATE_RENEWING) for 192.168.1.110
from 14:eb:b6:d0:19:dd.
[I] May 25 12:01:58 ndhcps: received ARP reply from 14:eb:b6:d0:19:de, not our
client.
[I] May 25 12:01:58 ndhcps: sending ACK of 192.168.1.110 to 14:eb:b6:d0:19:dd.
[I] May 25 12:02:54 ipsec: 07[IKE] received ESP_TFC_PADDING_NOT_SUPPORTED, not
using ESPv3 TFC padding
[I] May 25 12:02:54 ipsec: 07[CFG] received proposals:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 25 12:02:54 ipsec: 07[CFG] configured proposals:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 25 12:02:54 ipsec: 07[CFG] selected proposal:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 25 12:02:54 ipsec: 07[IKE] inbound CHILD_SA ionline_EY{22} established with
SPIs cd2d1e9f_i c26d5882_o and TS 192.168.1.0/24 === 172.16.102.0/24
[I] May 25 12:02:54 ndm: IpSec::Configurator: "ionline_EY": crypto map was
renegotiated.
[I] May 25 12:02:54 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 17, active CHILD SA: 0.
[I] May 25 12:02:54 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 18, active CHILD SA: 1, state up.
[I] May 25 12:02:54 ipsec: 05[IKE] received DELETE for ESP CHILD_SA with SPI
cc3edf37
[I] May 25 12:02:54 ipsec: 05[IKE] closing CHILD_SA ionline_EY{21} with SPIs
cca3dce1_i (0 bytes) cc3edf37_o (0 bytes) and TS 192.168.1.0/24 === 172.16.102.0/24

[I] May 25 12:02:54 ipsec: 05[IKE] sending DELETE for ESP CHILD_SA with SPI
cca3dce1
[I] May 25 12:02:54 ipsec: 05[IKE] CHILD_SA closed
[I] May 25 12:02:54 ipsec: 05[IKE] outbound CHILD_SA ionline_EY{22} established
with SPIs cd2d1e9f_i c26d5882_o and TS 192.168.1.0/24 === 172.16.102.0/24
[I] May 25 12:02:54 ndm: IpSec::IpSecNetfilter: start reloading netfilter
configuration...
[I] May 25 12:02:54 ndm: IpSec::IpSecNetfilter: netfilter configuration reloading
is done.
[I] May 25 12:03:01 ndhcps: DHCPREQUEST received (STATE_RENEWING) for 192.168.1.11
from 04:42:1a:26:ee:e6.
[I] May 25 12:03:01 ndhcps: sending ACK of 192.168.1.11 to 04:42:1a:26:ee:e6.
[I] May 25 12:03:04 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 18, active CHILD SA: 1.
[I] May 25 12:03:04 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 18, active CHILD SA: 1.
[I] May 25 12:03:59 ndnproxy: answer from wrong socket, ignore.
[I] May 25 12:04:03 ndnproxy: answer from wrong socket, ignore.
[I] May 25 12:04:47 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 25 12:08:18 ndnproxy: answer from wrong socket, ignore.
[I] May 25 12:12:00 ipsec: 09[IKE] message verification failed
[I] May 25 12:12:00 ipsec: 09[IKE] IKE_SA_INIT request with message ID 0 processing
failed
[I] May 25 12:13:59 ndnproxy: answer from wrong socket, ignore.
[I] May 25 12:18:20 ndnproxy: answer from wrong socket, ignore.
[I] May 25 12:19:47 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 25 12:21:13 ndnproxy: answer from wrong socket, ignore.
[I] May 25 12:26:18 ndnproxy: answer from wrong socket, ignore.
[I] May 25 12:26:25 ipsec: 14[IKE] initiating IKE_SA ionline_EY[42] to
46.32.170.109
[I] May 25 12:26:25 ipsec: 12[CFG] received proposals:
IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
[I] May 25 12:26:25 ipsec: 12[CFG] configured proposals:
IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
[I] May 25 12:26:25 ipsec: 12[CFG] selected proposal:
IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
[I] May 25 12:26:25 ipsec: 12[IKE] scheduling rekeying in 3571s
[I] May 25 12:26:25 ipsec: 12[IKE] maximum IKE_SA lifetime 3591s
[I] May 25 12:26:25 ipsec: 12[IKE] IKE_SA ionline_EY[42] rekeyed between
78.109.53.15[7thsorrow.keenetic.pro]...46.32.170.109[46.32.170.109]
[I] May 25 12:26:25 ipsec: 12[IKE] deleting IKE_SA ionline_EY[40] between
78.109.53.15[7thsorrow.keenetic.pro]...46.32.170.109[46.32.170.109]
[I] May 25 12:26:25 ipsec: 12[IKE] sending DELETE for IKE_SA ionline_EY[40]
[I] May 25 12:26:25 ipsec: 06[IKE] IKE_SA deleted
[I] May 25 12:26:34 ipsec: 14[IKE] message verification failed
[I] May 25 12:26:34 ipsec: 14[IKE] IKE_SA_INIT request with message ID 0 processing
failed
[I] May 25 12:27:26 ndnproxy: answer from wrong socket, ignore.
[I] May 25 12:32:20 ndnproxy: Core::Syslog: last message repeated 4 times.
[I] May 25 12:34:47 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 25 12:35:19 ndnproxy: answer from wrong socket, ignore.
[I] May 25 12:49:24 ndnproxy: Core::Syslog: last message repeated 6 times.
[I] May 25 12:49:47 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 25 12:49:48 ndnproxy: answer from wrong socket, ignore.
[I] May 25 12:49:50 ndnproxy: answer from wrong socket, ignore.
[I] May 25 12:51:57 ipsec: 11[IKE] received ESP_TFC_PADDING_NOT_SUPPORTED, not
using ESPv3 TFC padding
[I] May 25 12:51:57 ipsec: 11[CFG] received proposals:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 25 12:51:57 ipsec: 11[CFG] configured proposals:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 25 12:51:57 ipsec: 11[CFG] selected proposal:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 25 12:51:57 ipsec: 11[IKE] inbound CHILD_SA ionline_EY{23} established with
SPIs c30e4ba9_i c4a3e1cd_o and TS 192.168.1.0/24 === 172.16.102.0/24
[I] May 25 12:51:57 ndm: IpSec::Configurator: "ionline_EY": crypto map was
renegotiated.
[I] May 25 12:51:57 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 18, active CHILD SA: 0.
[I] May 25 12:51:57 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 19, active CHILD SA: 1, state up.
[I] May 25 12:51:57 ipsec: 03[IKE] received DELETE for ESP CHILD_SA with SPI
c26d5882
[I] May 25 12:51:57 ipsec: 03[IKE] closing CHILD_SA ionline_EY{22} with SPIs
cd2d1e9f_i (0 bytes) c26d5882_o (0 bytes) and TS 192.168.1.0/24 === 172.16.102.0/24

[I] May 25 12:51:57 ipsec: 03[IKE] sending DELETE for ESP CHILD_SA with SPI
cd2d1e9f
[I] May 25 12:51:57 ipsec: 03[IKE] CHILD_SA closed
[I] May 25 12:51:57 ipsec: 03[IKE] outbound CHILD_SA ionline_EY{23} established
with SPIs c30e4ba9_i c4a3e1cd_o and TS 192.168.1.0/24 === 172.16.102.0/24
[I] May 25 12:51:57 ndm: IpSec::IpSecNetfilter: start reloading netfilter
configuration...
[I] May 25 12:51:57 ndm: IpSec::IpSecNetfilter: netfilter configuration reloading
is done.
[I] May 25 12:52:07 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 19, active CHILD SA: 1.
[I] May 25 12:52:07 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 19, active CHILD SA: 1.
[I] May 25 12:52:12 ndnproxy: answer from wrong socket, ignore.
[I] May 25 12:56:59 ndnproxy: Core::Syslog: last message repeated 6 times.
[I] May 25 12:58:08 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(14:eb:b6:d0:19:de) GTK rekey done, group cipher
AES.
[I] May 25 12:58:08 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(a4:4b:d5:f3:e4:9f) GTK rekey done, group cipher
AES.
[I] May 25 12:58:14 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster0/AccessPoint0": STA(c8:3d:dc:ae:52:77) GTK rekey done, group cipher
AES.
[I] May 25 13:02:40 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(d4:5e:ec:6e:1d:13) had associated successfully.
[I] May 25 13:02:40 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(d4:5e:ec:6e:1d:13) set key done in WPA2/WPA2PSK.
[I] May 25 13:02:40 ndhcps: DHCPDISCOVER received from d4:5e:ec:6e:1d:13.
[I] May 25 13:02:41 ndhcps: making OFFER of 192.168.1.84 to d4:5e:ec:6e:1d:13.
[I] May 25 13:02:41 ndhcps: DHCPREQUEST received (STATE_SELECTING) for 192.168.1.84
from d4:5e:ec:6e:1d:13.
[I] May 25 13:02:41 ndhcps: sending ACK of 192.168.1.84 to d4:5e:ec:6e:1d:13.
[I] May 25 13:02:51 ndnproxy: answer from wrong socket, ignore.
[I] May 25 13:03:47 ndnproxy: Core::Syslog: last message repeated 8 times.
[I] May 25 13:04:47 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 25 13:04:48 ndnproxy: answer from wrong socket, ignore.
[I] May 25 13:19:19 ndnproxy: Core::Syslog: last message repeated 4 times.
[I] May 25 13:19:47 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 25 13:25:56 ipsec: 06[IKE] initiating IKE_SA ionline_EY[44] to
46.32.170.109
[I] May 25 13:25:56 ipsec: 13[CFG] received proposals:
IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
[I] May 25 13:25:56 ipsec: 13[CFG] configured proposals:
IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
[I] May 25 13:25:56 ipsec: 13[CFG] selected proposal:
IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
[I] May 25 13:25:56 ipsec: 13[IKE] scheduling rekeying in 3576s
[I] May 25 13:25:56 ipsec: 13[IKE] maximum IKE_SA lifetime 3596s
[I] May 25 13:25:56 ipsec: 13[IKE] IKE_SA ionline_EY[44] rekeyed between
78.109.53.15[7thsorrow.keenetic.pro]...46.32.170.109[46.32.170.109]
[I] May 25 13:25:56 ipsec: 13[IKE] deleting IKE_SA ionline_EY[42] between
78.109.53.15[7thsorrow.keenetic.pro]...46.32.170.109[46.32.170.109]
[I] May 25 13:25:56 ipsec: 13[IKE] sending DELETE for IKE_SA ionline_EY[42]
[I] May 25 13:25:56 ipsec: 11[IKE] IKE_SA deleted
[I] May 25 13:26:13 ndnproxy: answer from wrong socket, ignore.
[I] May 25 13:33:34 ndnproxy: Core::Syslog: last message repeated 3 times.
[I] May 25 13:34:48 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 25 13:36:01 ndnproxy: answer from wrong socket, ignore.
[I] May 25 13:42:40 ipsec: 05[IKE] received ESP_TFC_PADDING_NOT_SUPPORTED, not
using ESPv3 TFC padding
[I] May 25 13:42:40 ipsec: 05[CFG] received proposals:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 25 13:42:40 ipsec: 05[CFG] configured proposals:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 25 13:42:40 ipsec: 05[CFG] selected proposal:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 25 13:42:40 ipsec: 05[IKE] inbound CHILD_SA ionline_EY{24} established with
SPIs cd66489a_i cb897492_o and TS 192.168.1.0/24 === 172.16.102.0/24
[I] May 25 13:42:40 ndm: IpSec::Configurator: "ionline_EY": crypto map was
renegotiated.
[I] May 25 13:42:40 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 19, active CHILD SA: 0.
[I] May 25 13:42:40 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 20, active CHILD SA: 1, state up.
[I] May 25 13:42:40 ipsec: 03[IKE] received DELETE for ESP CHILD_SA with SPI
c4a3e1cd
[I] May 25 13:42:40 ipsec: 03[IKE] closing CHILD_SA ionline_EY{23} with SPIs
c30e4ba9_i (0 bytes) c4a3e1cd_o (0 bytes) and TS 192.168.1.0/24 === 172.16.102.0/24

[I] May 25 13:42:40 ipsec: 03[IKE] sending DELETE for ESP CHILD_SA with SPI
c30e4ba9
[I] May 25 13:42:40 ipsec: 03[IKE] CHILD_SA closed
[I] May 25 13:42:40 ipsec: 03[IKE] outbound CHILD_SA ionline_EY{24} established
with SPIs cd66489a_i cb897492_o and TS 192.168.1.0/24 === 172.16.102.0/24
[I] May 25 13:42:41 ndm: IpSec::IpSecNetfilter: start reloading netfilter
configuration...
[I] May 25 13:42:41 ndm: IpSec::IpSecNetfilter: netfilter configuration reloading
is done.
[I] May 25 13:42:50 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 20, active CHILD SA: 1.
[I] May 25 13:42:51 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 20, active CHILD SA: 1.
[I] May 25 13:46:19 ndnproxy: answer from wrong socket, ignore.
[I] May 25 13:49:41 ndnproxy: Core::Syslog: last message repeated 2 times.
[I] May 25 13:49:48 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[E] May 25 13:54:29 stubby: "cloudflare-dns.com": too many failed requests, try to
reload process
[E] May 25 13:54:29 ndm: Service: "DoT "System" proxy #1": unexpectedly stopped.
[I] May 25 13:54:32 stubby: starting Stubby 0.4.0
[I] May 25 13:59:37 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(14:eb:b6:d0:19:de) GTK rekey done, group cipher
AES.
[I] May 25 13:59:37 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(d4:5e:ec:6e:1d:13) GTK rekey done, group cipher
AES.
[I] May 25 13:59:37 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(a4:4b:d5:f3:e4:9f) GTK rekey done, group cipher
AES.
[I] May 25 13:59:43 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster0/AccessPoint0": STA(c8:3d:dc:ae:52:77) GTK rekey done, group cipher
AES.
[I] May 25 14:01:02 ndnproxy: answer from wrong socket, ignore.
[I] May 25 14:04:26 ndnproxy: answer from wrong socket, ignore.
[I] May 25 14:04:48 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 25 14:09:04 ndnproxy: answer from wrong socket, ignore.
[I] May 25 14:12:19 ndnproxy: answer from wrong socket, ignore.
[I] May 25 14:13:07 ipsec: 09[IKE] no IKE config found for
78.109.53.15...43.163.219.230, sending NO_PROPOSAL_CHOSEN
[I] May 25 14:13:57 ndnproxy: answer from wrong socket, ignore.
[I] May 25 14:16:01 ndnproxy: Core::Syslog: last message repeated 2 times.
[I] May 25 14:19:48 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 25 14:25:11 ndnproxy: answer from wrong socket, ignore.
[I] May 25 14:25:32 ipsec: 11[IKE] initiating IKE_SA ionline_EY[46] to
46.32.170.109
[I] May 25 14:25:32 ipsec: 09[CFG] received proposals:
IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
[I] May 25 14:25:32 ipsec: 09[CFG] configured proposals:
IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
[I] May 25 14:25:32 ipsec: 09[CFG] selected proposal:
IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
[I] May 25 14:25:32 ipsec: 09[IKE] scheduling rekeying in 3576s
[I] May 25 14:25:32 ipsec: 09[IKE] maximum IKE_SA lifetime 3596s
[I] May 25 14:25:32 ipsec: 09[IKE] IKE_SA ionline_EY[46] rekeyed between
78.109.53.15[7thsorrow.keenetic.pro]...46.32.170.109[46.32.170.109]
[I] May 25 14:25:32 ipsec: 09[IKE] deleting IKE_SA ionline_EY[44] between
78.109.53.15[7thsorrow.keenetic.pro]...46.32.170.109[46.32.170.109]
[I] May 25 14:25:32 ipsec: 09[IKE] sending DELETE for IKE_SA ionline_EY[44]
[I] May 25 14:25:32 ipsec: 15[IKE] IKE_SA deleted
[I] May 25 14:29:34 ndnproxy: answer from wrong socket, ignore.
[I] May 25 14:30:17 ipsec: 05[IKE] received retransmit of request with ID 27,
retransmitting response
[I] May 25 14:30:19 ndnproxy: answer from wrong socket, ignore.
[I] May 25 14:30:58 ipsec: 15[IKE] received ESP_TFC_PADDING_NOT_SUPPORTED, not
using ESPv3 TFC padding
[I] May 25 14:30:58 ipsec: 15[CFG] received proposals:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 25 14:30:58 ipsec: 15[CFG] configured proposals:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 25 14:30:58 ipsec: 15[CFG] selected proposal:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 25 14:30:58 ipsec: 15[IKE] inbound CHILD_SA ionline_EY{25} established with
SPIs c95f32b4_i c90c0123_o and TS 192.168.1.0/24 === 172.16.102.0/24
[I] May 25 14:30:58 ndm: IpSec::Configurator: "ionline_EY": crypto map was
renegotiated.
[I] May 25 14:30:58 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 20, active CHILD SA: 0.
[I] May 25 14:30:58 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 21, active CHILD SA: 1, state up.
[I] May 25 14:30:58 ipsec: 09[IKE] received DELETE for ESP CHILD_SA with SPI
cb897492
[I] May 25 14:30:58 ipsec: 09[IKE] closing CHILD_SA ionline_EY{24} with SPIs
cd66489a_i (0 bytes) cb897492_o (0 bytes) and TS 192.168.1.0/24 === 172.16.102.0/24

[I] May 25 14:30:58 ipsec: 09[IKE] sending DELETE for ESP CHILD_SA with SPI
cd66489a
[I] May 25 14:30:58 ipsec: 09[IKE] CHILD_SA closed
[I] May 25 14:30:58 ipsec: 09[IKE] outbound CHILD_SA ionline_EY{25} established
with SPIs c95f32b4_i c90c0123_o and TS 192.168.1.0/24 === 172.16.102.0/24
[I] May 25 14:30:58 ndm: IpSec::IpSecNetfilter: start reloading netfilter
configuration...
[I] May 25 14:30:58 ndm: IpSec::IpSecNetfilter: netfilter configuration reloading
is done.
[I] May 25 14:31:02 ipsec: 15[IKE] received retransmit of request with ID 33,
retransmitting response
[I] May 25 14:31:08 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 21, active CHILD SA: 1.
[I] May 25 14:31:08 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 21, active CHILD SA: 1.
[I] May 25 14:34:48 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 25 14:36:06 ndnproxy: answer from wrong socket, ignore.
[I] May 25 14:48:30 ndnproxy: Core::Syslog: last message repeated 4 times.
[I] May 25 14:49:48 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 25 14:50:02 ndnproxy: answer from wrong socket, ignore.
[I] May 25 14:50:40 ndnproxy: answer from wrong socket, ignore.
[I] May 25 14:58:07 ndhcps: DHCPREQUEST received (STATE_RENEWING) for 192.168.1.88
from c8:3d:dc:ae:52:77.
[I] May 25 14:58:07 ndhcps: sending ACK of 192.168.1.88 to c8:3d:dc:ae:52:77.
[I] May 25 14:58:41 ndnproxy: answer from wrong socket, ignore.
[I] May 25 15:01:05 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(14:eb:b6:d0:19:de) GTK rekey done, group cipher
AES.
[I] May 25 15:01:05 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(d4:5e:ec:6e:1d:13) GTK rekey done, group cipher
AES.
[I] May 25 15:01:05 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(a4:4b:d5:f3:e4:9f) GTK rekey done, group cipher
AES.
[I] May 25 15:01:11 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster0/AccessPoint0": STA(c8:3d:dc:ae:52:77) GTK rekey done, group cipher
AES.
[I] May 25 15:03:59 ndnproxy: answer from wrong socket, ignore.
[I] May 25 15:04:48 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 25 15:07:33 ndnproxy: answer from wrong socket, ignore.
[I] May 25 15:13:14 ndnproxy: Core::Syslog: last message repeated 2 times.
[I] May 25 15:15:12 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(d4:5e:ec:6e:1d:13) had been aged-out and
disassociated (idle silence).
[I] May 25 15:18:36 ndnproxy: answer from wrong socket, ignore.
[I] May 25 15:18:59 ndnproxy: answer from wrong socket, ignore.
[I] May 25 15:19:26 ndhcps: DHCPDISCOVER received for 192.168.1.94 from
00:e0:4c:36:02:d4.
[I] May 25 15:19:27 ndhcps: making OFFER of 192.168.1.94 to 00:e0:4c:36:02:d4.
[I] May 25 15:19:27 ndhcps: DHCPREQUEST received (STATE_SELECTING) for 192.168.1.94
from 00:e0:4c:36:02:d4.
[I] May 25 15:19:27 ndhcps: sending ACK of 192.168.1.94 to 00:e0:4c:36:02:d4.
[I] May 25 15:19:48 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 25 15:22:09 ipsec: 15[IKE] received ESP_TFC_PADDING_NOT_SUPPORTED, not
using ESPv3 TFC padding
[I] May 25 15:22:09 ipsec: 15[CFG] received proposals:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 25 15:22:09 ipsec: 15[CFG] configured proposals:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 25 15:22:09 ipsec: 15[CFG] selected proposal:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 25 15:22:09 ipsec: 15[IKE] inbound CHILD_SA ionline_EY{26} established with
SPIs c366e589_i c420e2ee_o and TS 192.168.1.0/24 === 172.16.102.0/24
[I] May 25 15:22:09 ndm: IpSec::Configurator: "ionline_EY": crypto map was
renegotiated.
[I] May 25 15:22:09 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 21, active CHILD SA: 0.
[I] May 25 15:22:09 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 21, active CHILD SA: 1, state up.
[I] May 25 15:22:09 ipsec: 10[IKE] received DELETE for ESP CHILD_SA with SPI
c90c0123
[I] May 25 15:22:09 ipsec: 10[IKE] closing CHILD_SA ionline_EY{25} with SPIs
c95f32b4_i (0 bytes) c90c0123_o (0 bytes) and TS 192.168.1.0/24 === 172.16.102.0/24

[I] May 25 15:22:09 ipsec: 10[IKE] sending DELETE for ESP CHILD_SA with SPI
c95f32b4
[I] May 25 15:22:09 ipsec: 10[IKE] CHILD_SA closed
[I] May 25 15:22:09 ipsec: 10[IKE] outbound CHILD_SA ionline_EY{26} established
with SPIs c366e589_i c420e2ee_o and TS 192.168.1.0/24 === 172.16.102.0/24
[I] May 25 15:22:10 ndm: IpSec::IpSecNetfilter: start reloading netfilter
configuration...
[I] May 25 15:22:10 ndm: IpSec::IpSecNetfilter: netfilter configuration reloading
is done.
[I] May 25 15:22:20 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 21, active CHILD SA: 1.
[I] May 25 15:22:20 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 21, active CHILD SA: 1.
[I] May 25 15:25:08 ipsec: 09[IKE] initiating IKE_SA ionline_EY[47] to
46.32.170.109
[I] May 25 15:25:08 ipsec: 03[CFG] received proposals:
IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
[I] May 25 15:25:08 ipsec: 03[CFG] configured proposals:
IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
[I] May 25 15:25:08 ipsec: 03[CFG] selected proposal:
IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
[I] May 25 15:25:08 ipsec: 03[IKE] scheduling rekeying in 3564s
[I] May 25 15:25:08 ipsec: 03[IKE] maximum IKE_SA lifetime 3584s
[I] May 25 15:25:08 ipsec: 03[IKE] IKE_SA ionline_EY[47] rekeyed between
78.109.53.15[7thsorrow.keenetic.pro]...46.32.170.109[46.32.170.109]
[I] May 25 15:25:08 ipsec: 03[IKE] deleting IKE_SA ionline_EY[46] between
78.109.53.15[7thsorrow.keenetic.pro]...46.32.170.109[46.32.170.109]
[I] May 25 15:25:08 ipsec: 03[IKE] sending DELETE for IKE_SA ionline_EY[46]
[I] May 25 15:25:08 ipsec: 05[IKE] IKE_SA deleted
[I] May 25 15:28:19 ndnproxy: answer from wrong socket, ignore.
[I] May 25 15:30:43 ndnproxy: answer from wrong socket, ignore.
[I] May 25 15:31:13 ndhcps: DHCPREQUEST received (STATE_RENEWING) for 192.168.1.80
from a4:4b:d5:f3:e4:9f.
[I] May 25 15:31:13 ndhcps: sending ACK of 192.168.1.80 to a4:4b:d5:f3:e4:9f.
[I] May 25 15:31:16 ndnproxy: answer from wrong socket, ignore.
[I] May 25 15:31:28 ndnproxy: Core::Syslog: last message repeated 3 times.
[I] May 25 15:31:58 ndhcps: DHCPREQUEST received (STATE_RENEWING) for 192.168.1.110
from 14:eb:b6:d0:19:dd.
[I] May 25 15:31:58 ndhcps: received ARP reply from 14:eb:b6:d0:19:de, not our
client.
[I] May 25 15:31:58 ndhcps: sending ACK of 192.168.1.110 to 14:eb:b6:d0:19:dd.
[I] May 25 15:33:00 ndhcps: DHCPREQUEST received (STATE_RENEWING) for 192.168.1.11
from 04:42:1a:26:ee:e6.
[I] May 25 15:33:00 ndhcps: sending ACK of 192.168.1.11 to 04:42:1a:26:ee:e6.
[I] May 25 15:33:29 ndnproxy: answer from wrong socket, ignore.
[I] May 25 15:34:48 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 25 15:36:49 ndnproxy: answer from wrong socket, ignore.
[I] May 25 15:43:34 ndnproxy: Core::Syslog: last message repeated 5 times.
[I] May 25 15:49:49 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 25 15:50:29 ndnproxy: answer from wrong socket, ignore.
[I] May 25 16:00:49 ndnproxy: Core::Syslog: last message repeated 4 times.
[I] May 25 16:02:34 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(14:eb:b6:d0:19:de) GTK rekey done, group cipher
AES.
[I] May 25 16:02:34 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(a4:4b:d5:f3:e4:9f) GTK rekey done, group cipher
AES.
[I] May 25 16:02:40 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster0/AccessPoint0": STA(c8:3d:dc:ae:52:77) GTK rekey done, group cipher
AES.
[I] May 25 16:04:49 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 25 16:05:20 ndnproxy: answer from wrong socket, ignore.
[I] May 25 16:07:19 ndnproxy: Core::Syslog: last message repeated 3 times.
[I] May 25 16:10:22 ipsec: 03[IKE] received ESP_TFC_PADDING_NOT_SUPPORTED, not
using ESPv3 TFC padding
[I] May 25 16:10:22 ipsec: 03[CFG] received proposals:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 25 16:10:22 ipsec: 03[CFG] configured proposals:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 25 16:10:22 ipsec: 03[CFG] selected proposal:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 25 16:10:22 ipsec: 03[IKE] inbound CHILD_SA ionline_EY{27} established with
SPIs c6e12056_i c1b2527b_o and TS 192.168.1.0/24 === 172.16.102.0/24
[I] May 25 16:10:22 ndm: IpSec::Configurator: "ionline_EY": crypto map was
renegotiated.
[I] May 25 16:10:22 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 21, active CHILD SA: 0.
[I] May 25 16:10:22 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 22, active CHILD SA: 1, state up.
[I] May 25 16:10:22 ipsec: 13[IKE] received DELETE for ESP CHILD_SA with SPI
c420e2ee
[I] May 25 16:10:22 ipsec: 13[IKE] closing CHILD_SA ionline_EY{26} with SPIs
c366e589_i (0 bytes) c420e2ee_o (0 bytes) and TS 192.168.1.0/24 === 172.16.102.0/24

[I] May 25 16:10:22 ipsec: 13[IKE] sending DELETE for ESP CHILD_SA with SPI
c366e589
[I] May 25 16:10:22 ipsec: 13[IKE] CHILD_SA closed
[I] May 25 16:10:22 ipsec: 13[IKE] outbound CHILD_SA ionline_EY{27} established
with SPIs c6e12056_i c1b2527b_o and TS 192.168.1.0/24 === 172.16.102.0/24
[I] May 25 16:10:23 ndm: IpSec::IpSecNetfilter: start reloading netfilter
configuration...
[I] May 25 16:10:23 ndm: IpSec::IpSecNetfilter: netfilter configuration reloading
is done.
[I] May 25 16:10:32 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 22, active CHILD SA: 1.
[I] May 25 16:10:33 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 22, active CHILD SA: 1.
[I] May 25 16:13:11 ndnproxy: answer from wrong socket, ignore.
[I] May 25 16:17:20 ndnproxy: answer from wrong socket, ignore.
[I] May 25 16:19:49 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 25 16:19:57 ndnproxy: answer from wrong socket, ignore.
[I] May 25 16:24:32 ipsec: 07[IKE] initiating IKE_SA ionline_EY[48] to
46.32.170.109
[I] May 25 16:24:32 ipsec: 06[CFG] received proposals:
IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
[I] May 25 16:24:32 ipsec: 06[CFG] configured proposals:
IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
[I] May 25 16:24:32 ipsec: 06[CFG] selected proposal:
IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
[I] May 25 16:24:32 ipsec: 06[IKE] scheduling rekeying in 3573s
[I] May 25 16:24:32 ipsec: 06[IKE] maximum IKE_SA lifetime 3593s
[I] May 25 16:24:32 ipsec: 06[IKE] IKE_SA ionline_EY[48] rekeyed between
78.109.53.15[7thsorrow.keenetic.pro]...46.32.170.109[46.32.170.109]
[I] May 25 16:24:32 ipsec: 06[IKE] deleting IKE_SA ionline_EY[47] between
78.109.53.15[7thsorrow.keenetic.pro]...46.32.170.109[46.32.170.109]
[I] May 25 16:24:32 ipsec: 06[IKE] sending DELETE for IKE_SA ionline_EY[47]
[I] May 25 16:24:32 ipsec: 15[IKE] IKE_SA deleted
[I] May 25 16:28:15 ndnproxy: answer from wrong socket, ignore.
[I] May 25 16:32:49 ndnproxy: Core::Syslog: last message repeated 3 times.
[I] May 25 16:34:49 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 25 16:35:22 ndnproxy: answer from wrong socket, ignore.
[I] May 25 16:46:34 ndnproxy: Core::Syslog: last message repeated 5 times.
[I] May 25 16:49:49 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 25 16:52:34 ndnproxy: answer from wrong socket, ignore.
[I] May 25 16:58:59 ndnproxy: Core::Syslog: last message repeated 2 times.
[I] May 25 16:59:55 ipsec: 10[IKE] received ESP_TFC_PADDING_NOT_SUPPORTED, not
using ESPv3 TFC padding
[I] May 25 16:59:55 ipsec: 10[CFG] received proposals:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 25 16:59:55 ipsec: 10[CFG] configured proposals:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 25 16:59:55 ipsec: 10[CFG] selected proposal:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 25 16:59:55 ipsec: 10[IKE] inbound CHILD_SA ionline_EY{28} established with
SPIs ce0a17bd_i c62c1d4c_o and TS 192.168.1.0/24 === 172.16.102.0/24
[I] May 25 16:59:55 ndm: IpSec::Configurator: "ionline_EY": crypto map was
renegotiated.
[I] May 25 16:59:55 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 22, active CHILD SA: 0.
[I] May 25 16:59:55 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 23, active CHILD SA: 1, state up.
[I] May 25 16:59:55 ipsec: 05[IKE] received DELETE for ESP CHILD_SA with SPI
c1b2527b
[I] May 25 16:59:55 ipsec: 05[IKE] closing CHILD_SA ionline_EY{27} with SPIs
c6e12056_i (0 bytes) c1b2527b_o (0 bytes) and TS 192.168.1.0/24 === 172.16.102.0/24

[I] May 25 16:59:55 ipsec: 05[IKE] sending DELETE for ESP CHILD_SA with SPI
c6e12056
[I] May 25 16:59:55 ipsec: 05[IKE] CHILD_SA closed
[I] May 25 16:59:55 ipsec: 05[IKE] outbound CHILD_SA ionline_EY{28} established
with SPIs ce0a17bd_i c62c1d4c_o and TS 192.168.1.0/24 === 172.16.102.0/24
[I] May 25 16:59:55 ndm: IpSec::IpSecNetfilter: start reloading netfilter
configuration...
[I] May 25 16:59:55 ndm: IpSec::IpSecNetfilter: netfilter configuration reloading
is done.
[I] May 25 17:00:05 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 23, active CHILD SA: 1.
[I] May 25 17:00:05 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 23, active CHILD SA: 1.
[I] May 25 17:02:06 ndm: Network::Interface::Switch: "GigabitEthernet0/2": switch
link down at port 3.
[I] May 25 17:02:09 ndm: Network::Interface::Switch: "GigabitEthernet0/2": switch
link up at port 3 (1000FD/AN).
[I] May 25 17:04:02 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(14:eb:b6:d0:19:de) GTK rekey done, group cipher
AES.
[I] May 25 17:04:02 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(a4:4b:d5:f3:e4:9f) GTK rekey done, group cipher
AES.
[I] May 25 17:04:08 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster0/AccessPoint0": STA(c8:3d:dc:ae:52:77) GTK rekey done, group cipher
AES.
[I] May 25 17:04:49 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 25 17:09:05 ndnproxy: answer from wrong socket, ignore.
[I] May 25 17:11:11 ipsec: 03[IKE] received retransmit of request with ID 279,
retransmitting response
[I] May 25 17:18:19 ndnproxy: answer from wrong socket, ignore.
[I] May 25 17:18:34 ndnproxy: answer from wrong socket, ignore.
[I] May 25 17:19:49 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 25 17:22:57 ndnproxy: answer from wrong socket, ignore.
[I] May 25 17:24:05 ipsec: 15[IKE] initiating IKE_SA ionline_EY[49] to
46.32.170.109
[I] May 25 17:24:05 ipsec: 08[CFG] received proposals:
IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
[I] May 25 17:24:05 ipsec: 08[CFG] configured proposals:
IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
[I] May 25 17:24:05 ipsec: 08[CFG] selected proposal:
IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
[I] May 25 17:24:05 ipsec: 08[IKE] scheduling rekeying in 3563s
[I] May 25 17:24:05 ipsec: 08[IKE] maximum IKE_SA lifetime 3583s
[I] May 25 17:24:05 ipsec: 08[IKE] IKE_SA ionline_EY[49] rekeyed between
78.109.53.15[7thsorrow.keenetic.pro]...46.32.170.109[46.32.170.109]
[I] May 25 17:24:05 ipsec: 08[IKE] deleting IKE_SA ionline_EY[48] between
78.109.53.15[7thsorrow.keenetic.pro]...46.32.170.109[46.32.170.109]
[I] May 25 17:24:05 ipsec: 08[IKE] sending DELETE for IKE_SA ionline_EY[48]
[I] May 25 17:24:05 ipsec: 13[IKE] IKE_SA deleted
[I] May 25 17:31:55 ndnproxy: answer from wrong socket, ignore.
[I] May 25 17:32:19 ndnproxy: answer from wrong socket, ignore.
[I] May 25 17:34:49 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 25 17:36:25 ndhcps: DHCPREQUEST received (STATE_INIT) for 192.168.1.94 from
00:e0:4c:36:02:d4.
[I] May 25 17:36:26 ndhcps: sending ACK of 192.168.1.94 to 00:e0:4c:36:02:d4.
[I] May 25 17:46:13 ipsec: 13[IKE] received retransmit of request with ID 131,
retransmitting response
[I] May 25 17:48:38 ipsec: 03[IKE] received retransmit of request with ID 145,
retransmitting response
[I] May 25 17:48:55 ipsec: 07[IKE] received ESP_TFC_PADDING_NOT_SUPPORTED, not
using ESPv3 TFC padding
[I] May 25 17:48:55 ipsec: 07[CFG] received proposals:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 25 17:48:55 ipsec: 07[CFG] configured proposals:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 25 17:48:55 ipsec: 07[CFG] selected proposal:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 25 17:48:55 ipsec: 07[IKE] inbound CHILD_SA ionline_EY{29} established with
SPIs c60bae07_i ccaf4f5c_o and TS 192.168.1.0/24 === 172.16.102.0/24
[I] May 25 17:48:55 ndm: IpSec::Configurator: "ionline_EY": crypto map was
renegotiated.
[I] May 25 17:48:56 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 23, active CHILD SA: 0.
[I] May 25 17:48:56 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 24, active CHILD SA: 1, state up.
[I] May 25 17:48:56 ipsec: 06[IKE] received DELETE for ESP CHILD_SA with SPI
c62c1d4c
[I] May 25 17:48:56 ipsec: 06[IKE] closing CHILD_SA ionline_EY{28} with SPIs
ce0a17bd_i (0 bytes) c62c1d4c_o (0 bytes) and TS 192.168.1.0/24 === 172.16.102.0/24

[I] May 25 17:48:56 ipsec: 06[IKE] sending DELETE for ESP CHILD_SA with SPI
ce0a17bd
[I] May 25 17:48:56 ipsec: 06[IKE] CHILD_SA closed
[I] May 25 17:48:56 ipsec: 06[IKE] outbound CHILD_SA ionline_EY{29} established
with SPIs c60bae07_i ccaf4f5c_o and TS 192.168.1.0/24 === 172.16.102.0/24
[I] May 25 17:48:56 ndm: IpSec::IpSecNetfilter: start reloading netfilter
configuration...
[I] May 25 17:48:56 ndm: IpSec::IpSecNetfilter: netfilter configuration reloading
is done.
[I] May 25 17:49:06 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 24, active CHILD SA: 1.
[I] May 25 17:49:06 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 24, active CHILD SA: 1.
[I] May 25 17:49:49 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 25 17:53:40 ipsec: 08[IKE] received retransmit of request with ID 176,
retransmitting response
[I] May 25 17:56:31 ndnproxy: answer from wrong socket, ignore.
[I] May 25 17:58:05 ipsec: 05[IKE] received retransmit of request with ID 202,
retransmitting response
[I] May 25 17:59:08 ndnproxy: answer from wrong socket, ignore.
[I] May 25 18:04:04 ndnproxy: Core::Syslog: last message repeated 5 times.
[I] May 25 18:04:50 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 25 18:05:01 ndnproxy: answer from wrong socket, ignore.
[I] May 25 18:05:30 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(14:eb:b6:d0:19:de) GTK rekey done, group cipher
AES.
[I] May 25 18:05:31 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(a4:4b:d5:f3:e4:9f) GTK rekey done, group cipher
AES.
[I] May 25 18:05:37 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster0/AccessPoint0": STA(c8:3d:dc:ae:52:77) GTK rekey done, group cipher
AES.
[I] May 25 18:06:29 ndnproxy: answer from wrong socket, ignore.
[I] May 25 18:14:09 ndnproxy: Core::Syslog: last message repeated 4 times.
[I] May 25 18:14:53 ipsec: 11[IKE] no IKE config found for
78.109.53.15...167.248.133.160, sending NO_PROPOSAL_CHOSEN
[I] May 25 18:14:53 ipsec: 07[IKE] no IKE config found for
78.109.53.15...167.248.133.35, sending NO_PROPOSAL_CHOSEN
[I] May 25 18:14:53 ipsec: 08[IKE] no IKE config found for
78.109.53.15...167.248.133.35, sending NO_PROPOSAL_CHOSEN
[I] May 25 18:19:50 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 25 18:21:55 ndnproxy: answer from wrong socket, ignore.
[I] May 25 18:23:28 ipsec: 06[IKE] initiating IKE_SA ionline_EY[53] to
46.32.170.109
[I] May 25 18:23:28 ipsec: 09[CFG] received proposals:
IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
[I] May 25 18:23:28 ipsec: 09[CFG] configured proposals:
IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
[I] May 25 18:23:28 ipsec: 09[CFG] selected proposal:
IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
[I] May 25 18:23:28 ipsec: 09[IKE] scheduling rekeying in 3574s
[I] May 25 18:23:28 ipsec: 09[IKE] maximum IKE_SA lifetime 3594s
[I] May 25 18:23:28 ipsec: 09[IKE] IKE_SA ionline_EY[53] rekeyed between
78.109.53.15[7thsorrow.keenetic.pro]...46.32.170.109[46.32.170.109]
[I] May 25 18:23:28 ipsec: 09[IKE] deleting IKE_SA ionline_EY[49] between
78.109.53.15[7thsorrow.keenetic.pro]...46.32.170.109[46.32.170.109]
[I] May 25 18:23:28 ipsec: 09[IKE] sending DELETE for IKE_SA ionline_EY[49]
[I] May 25 18:23:28 ipsec: 15[IKE] IKE_SA deleted
[I] May 25 18:24:53 ndnproxy: answer from wrong socket, ignore.
[I] May 25 18:27:53 ndnproxy: Core::Syslog: last message repeated 2 times.
[I] May 25 18:28:07 ndhcps: DHCPREQUEST received (STATE_RENEWING) for 192.168.1.88
from c8:3d:dc:ae:52:77.
[I] May 25 18:28:07 ndhcps: sending ACK of 192.168.1.88 to c8:3d:dc:ae:52:77.
[I] May 25 18:28:12 ndnproxy: answer from wrong socket, ignore.
[I] May 25 18:28:22 ndnproxy: Core::Syslog: last message repeated 2 times.
[I] May 25 18:29:43 ipsec: 12[IKE] received retransmit of request with ID 36,
retransmitting response
[I] May 25 18:32:40 ndnproxy: answer from wrong socket, ignore.
[I] May 25 18:34:04 ndnproxy: Core::Syslog: last message repeated 2 times.
[I] May 25 18:34:33 ndm: Dns::Secure::DotConfigurator: fallback to built-in DNS to
resolve "dns.adguard-dns.com".
[I] May 25 18:34:33 ndm: Dns::Secure::DotConfigurator: fallback to built-in DNS to
resolve "cloudflare-dns.com".
[I] May 25 18:34:33 ndnproxy: answer from wrong socket, ignore.
[I] May 25 18:34:33 ndm: Dns::Secure::DohConfigurator: fallback to built-in DNS to
resolve "dns.google".
[I] May 25 18:34:33 ndm: Dns::Secure::DohConfigurator: fallback to built-in DNS to
resolve "dns.adguard-dns.com".
[I] May 25 18:34:33 ndm: Dns::Secure::DohConfigurator: fallback to built-in DNS to
resolve "cloudflare-dns.com".
[I] May 25 18:34:50 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 25 18:38:21 ipsec: 07[IKE] received ESP_TFC_PADDING_NOT_SUPPORTED, not
using ESPv3 TFC padding
[I] May 25 18:38:21 ipsec: 07[CFG] received proposals:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 25 18:38:21 ipsec: 07[CFG] configured proposals:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 25 18:38:21 ipsec: 07[CFG] selected proposal:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 25 18:38:21 ipsec: 07[IKE] inbound CHILD_SA ionline_EY{30} established with
SPIs c0ba5ee1_i c93550d4_o and TS 192.168.1.0/24 === 172.16.102.0/24
[I] May 25 18:38:21 ndm: IpSec::Configurator: "ionline_EY": crypto map was
renegotiated.
[I] May 25 18:38:21 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 24, active CHILD SA: 0.
[I] May 25 18:38:21 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 25, active CHILD SA: 1, state up.
[I] May 25 18:38:21 ipsec: 09[IKE] received DELETE for ESP CHILD_SA with SPI
ccaf4f5c
[I] May 25 18:38:21 ipsec: 09[IKE] closing CHILD_SA ionline_EY{29} with SPIs
c60bae07_i (0 bytes) ccaf4f5c_o (0 bytes) and TS 192.168.1.0/24 === 172.16.102.0/24

[I] May 25 18:38:21 ipsec: 09[IKE] sending DELETE for ESP CHILD_SA with SPI
c60bae07
[I] May 25 18:38:21 ipsec: 09[IKE] CHILD_SA closed
[I] May 25 18:38:21 ipsec: 09[IKE] outbound CHILD_SA ionline_EY{30} established
with SPIs c0ba5ee1_i c93550d4_o and TS 192.168.1.0/24 === 172.16.102.0/24
[I] May 25 18:38:21 ndm: IpSec::IpSecNetfilter: start reloading netfilter
configuration...
[I] May 25 18:38:21 ndm: IpSec::IpSecNetfilter: netfilter configuration reloading
is done.
[I] May 25 18:38:31 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 25, active CHILD SA: 1.
[I] May 25 18:38:31 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 25, active CHILD SA: 1.
[I] May 25 18:41:32 ndnproxy: answer from wrong socket, ignore.
[I] May 25 18:46:24 ndnproxy: answer from wrong socket, ignore.
[I] May 25 18:49:50 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 25 18:51:34 ndnproxy: answer from wrong socket, ignore.
[I] May 25 19:01:00 ndnproxy: Core::Syslog: last message repeated 7 times.
[I] May 25 19:01:15 ndhcps: DHCPREQUEST received (STATE_RENEWING) for 192.168.1.80
from a4:4b:d5:f3:e4:9f.
[I] May 25 19:01:15 ndhcps: sending ACK of 192.168.1.80 to a4:4b:d5:f3:e4:9f.
[I] May 25 19:01:58 ndhcps: DHCPREQUEST received (STATE_RENEWING) for 192.168.1.110
from 14:eb:b6:d0:19:dd.
[I] May 25 19:01:58 ndhcps: received ARP reply from 14:eb:b6:d0:19:de, not our
client.
[I] May 25 19:01:58 ndhcps: sending ACK of 192.168.1.110 to 14:eb:b6:d0:19:dd.
[I] May 25 19:02:54 ndnproxy: answer from wrong socket, ignore.
[I] May 25 19:04:41 ndnproxy: answer from wrong socket, ignore.
[I] May 25 19:04:50 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 25 19:06:59 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(14:eb:b6:d0:19:de) GTK rekey done, group cipher
AES.
[I] May 25 19:06:59 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(a4:4b:d5:f3:e4:9f) GTK rekey done, group cipher
AES.
[I] May 25 19:07:05 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster0/AccessPoint0": STA(c8:3d:dc:ae:52:77) GTK rekey done, group cipher
AES.
[I] May 25 19:08:23 ndnproxy: answer from wrong socket, ignore.
[I] May 25 19:11:15 ndnproxy: Core::Syslog: last message repeated 2 times.
[I] May 25 19:17:01 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(d4:5e:ec:6e:1d:13) had associated successfully.
[I] May 25 19:17:01 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(d4:5e:ec:6e:1d:13) set key done in WPA2/WPA2PSK.
[I] May 25 19:17:02 ndhcps: DHCPDISCOVER received from d4:5e:ec:6e:1d:13.
[I] May 25 19:17:02 ndhcps: making OFFER of 192.168.1.84 to d4:5e:ec:6e:1d:13.
[I] May 25 19:17:02 ndhcps: DHCPREQUEST received (STATE_SELECTING) for 192.168.1.84
from d4:5e:ec:6e:1d:13.
[I] May 25 19:17:02 ndhcps: sending ACK of 192.168.1.84 to d4:5e:ec:6e:1d:13.
[I] May 25 19:17:17 ndnproxy: answer from wrong socket, ignore.
[I] May 25 19:19:32 ndnproxy: Core::Syslog: last message repeated 7 times.
[I] May 25 19:19:50 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 25 19:19:59 ndnproxy: answer from wrong socket, ignore.
[I] May 25 19:22:41 ndnproxy: Core::Syslog: last message repeated 9 times.
[I] May 25 19:23:02 ipsec: 08[IKE] initiating IKE_SA ionline_EY[54] to
46.32.170.109
[I] May 25 19:23:02 ipsec: 14[CFG] received proposals:
IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
[I] May 25 19:23:02 ipsec: 14[CFG] configured proposals:
IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
[I] May 25 19:23:02 ipsec: 14[CFG] selected proposal:
IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
[I] May 25 19:23:03 ipsec: 14[IKE] scheduling rekeying in 3564s
[I] May 25 19:23:03 ipsec: 14[IKE] maximum IKE_SA lifetime 3584s
[I] May 25 19:23:03 ipsec: 14[IKE] IKE_SA ionline_EY[54] rekeyed between
78.109.53.15[7thsorrow.keenetic.pro]...46.32.170.109[46.32.170.109]
[I] May 25 19:23:03 ipsec: 14[IKE] deleting IKE_SA ionline_EY[53] between
78.109.53.15[7thsorrow.keenetic.pro]...46.32.170.109[46.32.170.109]
[I] May 25 19:23:03 ipsec: 14[IKE] sending DELETE for IKE_SA ionline_EY[53]
[I] May 25 19:23:03 ipsec: 12[IKE] IKE_SA deleted
[I] May 25 19:26:09 ndm: Network::Interface::Switch: "GigabitEthernet0/2": switch
link down at port 3.
[I] May 25 19:26:12 ndm: Network::Interface::Switch: "GigabitEthernet0/2": switch
link up at port 3 (1000FD/AN).
[I] May 25 19:26:21 ndm: Network::Interface::Switch: "GigabitEthernet0/2": switch
link down at port 3.
[I] May 25 19:26:22 ndhcps: DHCPREQUEST received (STATE_INIT) for 192.168.1.11 from
04:42:1a:26:ee:e6.
[I] May 25 19:26:22 ndhcps: sending ACK of 192.168.1.11 to 04:42:1a:26:ee:e6.
[I] May 25 19:26:24 ndm: Network::Interface::Switch: "GigabitEthernet0/2": switch
link up at port 3 (1000FD/AN).
[I] May 25 19:26:36 ndnproxy: answer from wrong socket, ignore.
[I] May 25 19:26:38 ndnproxy: answer from wrong socket, ignore.
[I] May 25 19:27:43 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had associated successfully.
[I] May 25 19:27:43 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 19:27:45 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had disassociated by STA
(reason: STA is leaving or has left BSS).
[I] May 25 19:28:01 ndnproxy: answer from wrong socket, ignore.
[I] May 25 19:28:07 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had associated successfully.
[I] May 25 19:28:07 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 19:28:07 ndhcps: DHCPDISCOVER received from 22:fd:90:7a:6f:12.
[I] May 25 19:28:07 ndhcps: making OFFER of 192.168.1.35 to 22:fd:90:7a:6f:12.
[I] May 25 19:28:07 ndhcps: DHCPDISCOVER received from 22:fd:90:7a:6f:12.
[I] May 25 19:28:07 ndhcps: making OFFER of 192.168.1.35 to 22:fd:90:7a:6f:12.
[I] May 25 19:28:07 ndhcps: DHCPDISCOVER received from 22:fd:90:7a:6f:12.
[I] May 25 19:28:07 ndhcps: making OFFER of 192.168.1.35 to 22:fd:90:7a:6f:12.
[I] May 25 19:28:08 ndhcps: DHCPREQUEST received (STATE_SELECTING) for 192.168.1.35
from 22:fd:90:7a:6f:12.
[I] May 25 19:28:08 ndhcps: sending ACK of 192.168.1.35 to 22:fd:90:7a:6f:12.
[I] May 25 19:28:12 ndnproxy: answer from wrong socket, ignore.
[E] May 25 19:28:41 stubby: "cloudflare-dns.com": too many failed requests, try to
reload process
[E] May 25 19:28:41 ndm: Service: "DoT "System" proxy #1": unexpectedly stopped.
[I] May 25 19:28:44 stubby: starting Stubby 0.4.0
[I] May 25 19:29:51 ipsec: 12[IKE] received ESP_TFC_PADDING_NOT_SUPPORTED, not
using ESPv3 TFC padding
[I] May 25 19:29:51 ipsec: 12[CFG] received proposals:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 25 19:29:51 ipsec: 12[CFG] configured proposals:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 25 19:29:51 ipsec: 12[CFG] selected proposal:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 25 19:29:51 ipsec: 12[IKE] inbound CHILD_SA ionline_EY{31} established with
SPIs c0a9835d_i ce7e1926_o and TS 192.168.1.0/24 === 172.16.102.0/24
[I] May 25 19:29:51 ndm: IpSec::Configurator: "ionline_EY": crypto map was
renegotiated.
[I] May 25 19:29:51 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 25, active CHILD SA: 0.
[I] May 25 19:29:51 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 26, active CHILD SA: 1, state up.
[I] May 25 19:29:51 ipsec: 03[IKE] received DELETE for ESP CHILD_SA with SPI
c93550d4
[I] May 25 19:29:51 ipsec: 03[IKE] closing CHILD_SA ionline_EY{30} with SPIs
c0ba5ee1_i (0 bytes) c93550d4_o (0 bytes) and TS 192.168.1.0/24 === 172.16.102.0/24

[I] May 25 19:29:51 ipsec: 03[IKE] sending DELETE for ESP CHILD_SA with SPI
c0ba5ee1
[I] May 25 19:29:51 ipsec: 03[IKE] CHILD_SA closed
[I] May 25 19:29:51 ipsec: 03[IKE] outbound CHILD_SA ionline_EY{31} established
with SPIs c0a9835d_i ce7e1926_o and TS 192.168.1.0/24 === 172.16.102.0/24
[I] May 25 19:29:51 ndm: IpSec::IpSecNetfilter: start reloading netfilter
configuration...
[I] May 25 19:29:51 ndm: IpSec::IpSecNetfilter: netfilter configuration reloading
is done.
[I] May 25 19:30:01 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 26, active CHILD SA: 1.
[I] May 25 19:30:01 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 26, active CHILD SA: 1.
[I] May 25 19:31:17 ndnproxy: answer from wrong socket, ignore.
[I] May 25 19:34:19 ndnproxy: answer from wrong socket, ignore.
[I] May 25 19:34:50 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 25 19:34:53 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 19:34:53 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 19:45:14 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 19:45:14 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 19:45:19 ndnproxy: answer from wrong socket, ignore.
[I] May 25 19:46:21 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 19:46:22 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 19:47:43 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 19:47:44 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 19:47:56 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 19:47:57 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 19:49:51 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 25 19:51:24 ndnproxy: answer from wrong socket, ignore.
[I] May 25 20:02:45 ndnproxy: Core::Syslog: last message repeated 4 times.
[I] May 25 20:03:29 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 20:03:29 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 20:04:52 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 25 20:07:49 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 20:07:49 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 20:08:05 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 20:08:05 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 20:08:06 ndnproxy: answer from wrong socket, ignore.
[I] May 25 20:08:15 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 20:08:16 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 20:08:27 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(14:eb:b6:d0:19:de) GTK rekey done, group cipher
AES.
[I] May 25 20:08:27 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(d4:5e:ec:6e:1d:13) GTK rekey done, group cipher
AES.
[I] May 25 20:08:27 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(a4:4b:d5:f3:e4:9f) GTK rekey done, group cipher
AES.
[I] May 25 20:08:28 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) GTK rekey done, group cipher
AES.
[I] May 25 20:08:34 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster0/AccessPoint0": STA(c8:3d:dc:ae:52:77) GTK rekey done, group cipher
AES.
[I] May 25 20:09:07 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 20:09:08 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 20:09:57 ndnproxy: answer from wrong socket, ignore.
[I] May 25 20:10:02 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 20:10:03 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 20:10:28 ndnproxy: answer from wrong socket, ignore.
[I] May 25 20:12:24 ndnproxy: answer from wrong socket, ignore.
[I] May 25 20:13:18 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 20:13:19 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 20:15:34 ndnproxy: answer from wrong socket, ignore.
[I] May 25 20:16:04 ndnproxy: answer from wrong socket, ignore.
[I] May 25 20:18:11 ndm: Network::Interface::Switch: "GigabitEthernet0/0": switch
link down at port 1.
[I] May 25 20:18:14 ndm: Network::Interface::Switch: "GigabitEthernet0/0": switch
link up at port 1 (1000FD/AN).
[I] May 25 20:18:20 ipsec: 06[IKE] received ESP_TFC_PADDING_NOT_SUPPORTED, not
using ESPv3 TFC padding
[I] May 25 20:18:20 ipsec: 06[CFG] received proposals:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 25 20:18:20 ipsec: 06[CFG] configured proposals:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 25 20:18:20 ipsec: 06[CFG] selected proposal:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 25 20:18:20 ipsec: 06[IKE] inbound CHILD_SA ionline_EY{32} established with
SPIs c2771037_i c193dc99_o and TS 192.168.1.0/24 === 172.16.102.0/24
[I] May 25 20:18:20 ndm: IpSec::Configurator: "ionline_EY": crypto map was
renegotiated.
[I] May 25 20:18:20 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 26, active CHILD SA: 0.
[I] May 25 20:18:20 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 26, active CHILD SA: 1, state up.
[I] May 25 20:18:21 ipsec: 09[IKE] received DELETE for ESP CHILD_SA with SPI
ce7e1926
[I] May 25 20:18:21 ipsec: 09[IKE] closing CHILD_SA ionline_EY{31} with SPIs
c0a9835d_i (0 bytes) ce7e1926_o (0 bytes) and TS 192.168.1.0/24 === 172.16.102.0/24

[I] May 25 20:18:21 ipsec: 09[IKE] sending DELETE for ESP CHILD_SA with SPI
c0a9835d
[I] May 25 20:18:21 ipsec: 09[IKE] CHILD_SA closed
[I] May 25 20:18:21 ipsec: 09[IKE] outbound CHILD_SA ionline_EY{32} established
with SPIs c2771037_i c193dc99_o and TS 192.168.1.0/24 === 172.16.102.0/24
[I] May 25 20:18:21 ndm: IpSec::IpSecNetfilter: start reloading netfilter
configuration...
[I] May 25 20:18:21 ndm: IpSec::IpSecNetfilter: netfilter configuration reloading
is done.
[I] May 25 20:18:31 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 26, active CHILD SA: 1.
[I] May 25 20:18:31 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 26, active CHILD SA: 1.
[I] May 25 20:18:34 ndm: Network::Interface::Switch: "GigabitEthernet0/0": switch
link down at port 1.
[I] May 25 20:18:36 ndhcps: DHCPDISCOVER received for 192.168.1.111 from
18:c0:4d:8a:8f:a4.
[I] May 25 20:18:36 ndhcps: making OFFER of 192.168.1.111 to 18:c0:4d:8a:8f:a4.
[I] May 25 20:18:36 ndhcps: DHCPREQUEST received (STATE_SELECTING) for
192.168.1.111 from 18:c0:4d:8a:8f:a4.
[I] May 25 20:18:36 ndhcps: sending ACK of 192.168.1.111 to 18:c0:4d:8a:8f:a4.
[I] May 25 20:18:37 ndm: Network::Interface::Switch: "GigabitEthernet0/0": switch
link up at port 1 (1000FD/AN).
[I] May 25 20:18:37 ndnproxy: answer from wrong socket, ignore.
[I] May 25 20:19:19 ndnproxy: Core::Syslog: last message repeated 2 times.
[I] May 25 20:19:52 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 25 20:21:06 ndnproxy: answer from wrong socket, ignore.
[I] May 25 20:21:09 ndnproxy: answer from wrong socket, ignore.
[I] May 25 20:21:42 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 20:21:42 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 20:21:54 ndnproxy: answer from wrong socket, ignore.
[I] May 25 20:22:27 ipsec: 13[IKE] initiating IKE_SA ionline_EY[55] to
46.32.170.109
[I] May 25 20:22:27 ipsec: 05[CFG] received proposals:
IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
[I] May 25 20:22:27 ipsec: 05[CFG] configured proposals:
IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
[I] May 25 20:22:27 ipsec: 05[CFG] selected proposal:
IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
[I] May 25 20:22:27 ipsec: 05[IKE] scheduling rekeying in 3564s
[I] May 25 20:22:27 ipsec: 05[IKE] maximum IKE_SA lifetime 3584s
[I] May 25 20:22:27 ipsec: 05[IKE] IKE_SA ionline_EY[55] rekeyed between
78.109.53.15[7thsorrow.keenetic.pro]...46.32.170.109[46.32.170.109]
[I] May 25 20:22:27 ipsec: 05[IKE] deleting IKE_SA ionline_EY[54] between
78.109.53.15[7thsorrow.keenetic.pro]...46.32.170.109[46.32.170.109]
[I] May 25 20:22:27 ipsec: 05[IKE] sending DELETE for IKE_SA ionline_EY[54]
[I] May 25 20:22:27 ipsec: 09[IKE] IKE_SA deleted
[I] May 25 20:22:29 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 20:22:30 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 20:24:19 ndnproxy: answer from wrong socket, ignore.
[I] May 25 20:25:21 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 20:25:22 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 20:25:45 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 20:25:45 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 20:26:23 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 20:26:23 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 20:27:09 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 20:27:10 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 20:27:30 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 20:27:30 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 20:29:04 ndnproxy: answer from wrong socket, ignore.
[I] May 25 20:33:33 ndnproxy: Core::Syslog: last message repeated 4 times.
[I] May 25 20:34:14 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 20:34:14 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 20:34:24 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 20:34:24 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 20:34:52 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 25 20:34:52 ndnproxy: answer from wrong socket, ignore.
[I] May 25 20:35:02 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 20:35:02 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 20:35:13 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 20:35:14 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 20:35:27 ndnproxy: answer from wrong socket, ignore.
[I] May 25 20:38:22 ndnproxy: Core::Syslog: last message repeated 5 times.
[I] May 25 20:38:57 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 20:38:58 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 20:39:04 ndnproxy: answer from wrong socket, ignore.
[I] May 25 20:39:11 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 20:39:11 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 20:39:23 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 20:39:23 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 20:39:39 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 20:39:40 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 20:43:10 ndnproxy: answer from wrong socket, ignore.
[I] May 25 20:48:30 ndnproxy: Core::Syslog: last message repeated 11 times.
[I] May 25 20:49:52 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 25 20:49:59 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 20:50:00 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 20:50:49 ndnproxy: answer from wrong socket, ignore.
[I] May 25 20:53:00 ndnproxy: Core::Syslog: last message repeated 5 times.
[I] May 25 20:53:03 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 20:53:04 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 20:55:34 ndnproxy: answer from wrong socket, ignore.
[I] May 25 20:55:58 ndnproxy: answer from wrong socket, ignore.
[I] May 25 20:56:10 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 20:56:10 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 20:56:22 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 20:56:23 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 20:57:22 ndnproxy: answer from wrong socket, ignore.
[I] May 25 21:01:30 ndnproxy: Core::Syslog: last message repeated 3 times.
[I] May 25 21:01:50 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 21:01:50 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 21:02:00 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 21:02:00 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[E] May 25 21:02:03 stubby: "cloudflare-dns.com": too many failed requests, try to
reload process
[E] May 25 21:02:03 ndm: Service: "DoT "System" proxy #1": unexpectedly stopped.
[I] May 25 21:02:06 stubby: starting Stubby 0.4.0
[I] May 25 21:03:49 ndnproxy: answer from wrong socket, ignore.
[I] May 25 21:04:22 ndnproxy: answer from wrong socket, ignore.
[I] May 25 21:04:52 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 25 21:05:09 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 21:05:09 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 21:05:19 ndnproxy: answer from wrong socket, ignore.
[I] May 25 21:05:21 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 21:05:21 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 21:05:33 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 21:05:34 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 21:05:55 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 21:05:55 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 21:06:50 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 21:06:50 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 21:07:08 ndnproxy: answer from wrong socket, ignore.
[I] May 25 21:07:37 ndnproxy: Core::Syslog: last message repeated 2 times.
[I] May 25 21:07:41 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 21:07:42 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 21:07:56 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 21:07:56 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 21:08:41 ipsec: 11[IKE] received ESP_TFC_PADDING_NOT_SUPPORTED, not
using ESPv3 TFC padding
[I] May 25 21:08:41 ipsec: 11[CFG] received proposals:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 25 21:08:41 ipsec: 11[CFG] configured proposals:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 25 21:08:41 ipsec: 11[CFG] selected proposal:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 25 21:08:41 ipsec: 11[IKE] inbound CHILD_SA ionline_EY{33} established with
SPIs c3a62188_i c104c48e_o and TS 192.168.1.0/24 === 172.16.102.0/24
[I] May 25 21:08:41 ndm: IpSec::Configurator: "ionline_EY": crypto map was
renegotiated.
[I] May 25 21:08:41 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 26, active CHILD SA: 0.
[I] May 25 21:08:41 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 27, active CHILD SA: 1, state up.
[I] May 25 21:08:41 ipsec: 05[IKE] received DELETE for ESP CHILD_SA with SPI
c193dc99
[I] May 25 21:08:41 ipsec: 05[IKE] closing CHILD_SA ionline_EY{32} with SPIs
c2771037_i (37500067 bytes) c193dc99_o (2242600 bytes) and TS 192.168.1.0/24 ===
172.16.102.0/24
[I] May 25 21:08:41 ipsec: 05[IKE] sending DELETE for ESP CHILD_SA with SPI
c2771037
[I] May 25 21:08:41 ipsec: 05[IKE] CHILD_SA closed
[I] May 25 21:08:41 ipsec: 05[IKE] outbound CHILD_SA ionline_EY{33} established
with SPIs c3a62188_i c104c48e_o and TS 192.168.1.0/24 === 172.16.102.0/24
[I] May 25 21:08:41 ndm: IpSec::IpSecNetfilter: start reloading netfilter
configuration...
[I] May 25 21:08:41 ndm: IpSec::IpSecNetfilter: netfilter configuration reloading
is done.
[I] May 25 21:08:51 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 27, active CHILD SA: 1.
[I] May 25 21:08:51 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 27, active CHILD SA: 1.
[I] May 25 21:09:09 ndnproxy: answer from wrong socket, ignore.
[I] May 25 21:09:56 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(14:eb:b6:d0:19:de) GTK rekey done, group cipher
AES.
[I] May 25 21:09:56 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(d4:5e:ec:6e:1d:13) GTK rekey done, group cipher
AES.
[I] May 25 21:09:56 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) GTK rekey done, group cipher
AES.
[I] May 25 21:09:57 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(a4:4b:d5:f3:e4:9f) GTK rekey done, group cipher
AES.
[I] May 25 21:10:02 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster0/AccessPoint0": STA(c8:3d:dc:ae:52:77) GTK rekey done, group cipher
AES.
[I] May 25 21:11:23 ndnproxy: answer from wrong socket, ignore.
[I] May 25 21:12:34 ndnproxy: answer from wrong socket, ignore.
[I] May 25 21:12:43 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 21:12:44 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 21:12:58 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 21:12:59 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 21:13:14 ndnproxy: answer from wrong socket, ignore.
[I] May 25 21:18:19 ndnproxy: Core::Syslog: last message repeated 5 times.
[I] May 25 21:19:52 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 25 21:21:37 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 21:21:37 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 21:21:47 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 21:21:48 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 21:21:49 ndnproxy: answer from wrong socket, ignore.
[I] May 25 21:21:51 ipsec: 08[IKE] initiating IKE_SA ionline_EY[56] to
46.32.170.109
[I] May 25 21:21:51 ipsec: 06[CFG] received proposals:
IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
[I] May 25 21:21:51 ipsec: 06[CFG] configured proposals:
IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
[I] May 25 21:21:51 ipsec: 06[CFG] selected proposal:
IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
[I] May 25 21:21:51 ipsec: 06[IKE] scheduling rekeying in 3575s
[I] May 25 21:21:51 ipsec: 06[IKE] maximum IKE_SA lifetime 3595s
[I] May 25 21:21:51 ipsec: 06[IKE] IKE_SA ionline_EY[56] rekeyed between
78.109.53.15[7thsorrow.keenetic.pro]...46.32.170.109[46.32.170.109]
[I] May 25 21:21:51 ipsec: 06[IKE] deleting IKE_SA ionline_EY[55] between
78.109.53.15[7thsorrow.keenetic.pro]...46.32.170.109[46.32.170.109]
[I] May 25 21:21:51 ipsec: 06[IKE] sending DELETE for IKE_SA ionline_EY[55]
[I] May 25 21:21:51 ipsec: 11[IKE] IKE_SA deleted
[I] May 25 21:22:07 ndnproxy: answer from wrong socket, ignore.
[I] May 25 21:22:16 ndnproxy: answer from wrong socket, ignore.
[I] May 25 21:22:48 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 21:22:48 ndnproxy: answer from wrong socket, ignore.
[I] May 25 21:22:49 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 21:23:02 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 21:23:02 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 21:24:51 ndnproxy: answer from wrong socket, ignore.
[I] May 25 21:28:13 ndnproxy: Core::Syslog: last message repeated 9 times.
[I] May 25 21:29:17 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 21:29:17 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 21:29:26 ndnproxy: answer from wrong socket, ignore.
[I] May 25 21:29:29 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 21:29:30 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 21:30:02 ndnproxy: answer from wrong socket, ignore.
[I] May 25 21:33:56 ndnproxy: Core::Syslog: last message repeated 3 times.
[I] May 25 21:34:29 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 21:34:30 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 21:34:42 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 21:34:43 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 21:34:48 ndnproxy: answer from wrong socket, ignore.
[I] May 25 21:34:53 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 25 21:35:00 ndnproxy: answer from wrong socket, ignore.
[I] May 25 21:39:12 ndnproxy: Core::Syslog: last message repeated 5 times.
[I] May 25 21:39:21 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 21:39:22 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 21:42:24 ndnproxy: answer from wrong socket, ignore.
[I] May 25 21:42:45 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had associated successfully.
[I] May 25 21:42:45 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 21:42:45 ndhcps: DHCPREQUEST received (STATE_INIT) for 192.168.1.35 from
22:fd:90:7a:6f:12.
[I] May 25 21:42:45 ndhcps: sending ACK of 192.168.1.35 to 22:fd:90:7a:6f:12.
[I] May 25 21:42:46 ndhcps: DHCPREQUEST received (STATE_INIT) for 192.168.1.35 from
22:fd:90:7a:6f:12.
[I] May 25 21:42:46 ndhcps: sending ACK of 192.168.1.35 to 22:fd:90:7a:6f:12.
[I] May 25 21:42:56 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 21:42:56 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 21:42:58 ndnproxy: answer from wrong socket, ignore.
[I] May 25 21:46:04 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 21:46:05 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 21:47:04 ndnproxy: answer from wrong socket, ignore.
[I] May 25 21:48:52 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 21:48:53 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 21:49:03 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 21:49:03 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 21:49:29 ndnproxy: answer from wrong socket, ignore.
[I] May 25 21:49:53 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 25 21:51:42 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 21:51:42 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 21:51:50 ndnproxy: answer from wrong socket, ignore.
[I] May 25 21:51:52 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 21:51:52 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 21:54:18 ndnproxy: answer from wrong socket, ignore.
[I] May 25 21:55:33 ndnproxy: Core::Syslog: last message repeated 5 times.
[I] May 25 21:58:08 ndhcps: DHCPREQUEST received (STATE_RENEWING) for 192.168.1.88
from c8:3d:dc:ae:52:77.
[I] May 25 21:58:09 ndhcps: sending ACK of 192.168.1.88 to c8:3d:dc:ae:52:77.
[I] May 25 22:01:37 ipsec: 09[IKE] received ESP_TFC_PADDING_NOT_SUPPORTED, not
using ESPv3 TFC padding
[I] May 25 22:01:37 ipsec: 09[CFG] received proposals:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 25 22:01:37 ipsec: 09[CFG] configured proposals:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 25 22:01:37 ipsec: 09[CFG] selected proposal:
ESP:AES_CBC=256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
[I] May 25 22:01:37 ipsec: 09[IKE] inbound CHILD_SA ionline_EY{34} established with
SPIs c649f05b_i c9f739e8_o and TS 192.168.1.0/24 === 172.16.102.0/24
[I] May 25 22:01:37 ndm: IpSec::Configurator: "ionline_EY": crypto map was
renegotiated.
[I] May 25 22:01:37 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 27, active CHILD SA: 0.
[I] May 25 22:01:38 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 28, active CHILD SA: 1, state up.
[I] May 25 22:01:38 ipsec: 03[IKE] received DELETE for ESP CHILD_SA with SPI
c104c48e
[I] May 25 22:01:38 ipsec: 03[IKE] closing CHILD_SA ionline_EY{33} with SPIs
c3a62188_i (0 bytes) c104c48e_o (0 bytes) and TS 192.168.1.0/24 === 172.16.102.0/24

[I] May 25 22:01:38 ipsec: 03[IKE] sending DELETE for ESP CHILD_SA with SPI
c3a62188
[I] May 25 22:01:38 ipsec: 03[IKE] CHILD_SA closed
[I] May 25 22:01:38 ipsec: 03[IKE] outbound CHILD_SA ionline_EY{34} established
with SPIs c649f05b_i c9f739e8_o and TS 192.168.1.0/24 === 172.16.102.0/24
[I] May 25 22:01:38 ndm: IpSec::IpSecNetfilter: start reloading netfilter
configuration...
[I] May 25 22:01:38 ndm: IpSec::IpSecNetfilter: netfilter configuration reloading
is done.
[I] May 25 22:01:48 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 28, active CHILD SA: 1.
[I] May 25 22:01:48 ndm: IpSec::CryptoMapInfo: "ionline_EY": crypto map active IKE
SA: 28, active CHILD SA: 1.
[I] May 25 22:04:50 ndnproxy: answer from wrong socket, ignore.
[I] May 25 22:04:53 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 25 22:05:19 ndnproxy: answer from wrong socket, ignore.
[I] May 25 22:07:16 ndnproxy: answer from wrong socket, ignore.
[I] May 25 22:10:58 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 22:10:58 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 22:11:24 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(14:eb:b6:d0:19:de) GTK rekey done, group cipher
AES.
[I] May 25 22:11:24 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(d4:5e:ec:6e:1d:13) GTK rekey done, group cipher
AES.
[I] May 25 22:11:24 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(a4:4b:d5:f3:e4:9f) GTK rekey done, group cipher
AES.
[I] May 25 22:11:25 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) GTK rekey done, group cipher
AES.
[I] May 25 22:11:30 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster0/AccessPoint0": STA(c8:3d:dc:ae:52:77) GTK rekey done, group cipher
AES.
[I] May 25 22:11:34 ndnproxy: answer from wrong socket, ignore.
[I] May 25 22:11:58 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 22:11:58 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 22:12:21 ndnproxy: answer from wrong socket, ignore.
[I] May 25 22:12:45 ndnproxy: Core::Syslog: last message repeated 3 times.
[I] May 25 22:12:48 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 22:12:48 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 22:12:58 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 22:12:59 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 22:13:43 ndnproxy: answer from wrong socket, ignore.
[I] May 25 22:18:56 ndnproxy: Core::Syslog: last message repeated 13 times.
[I] May 25 22:19:53 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 25 22:20:28 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 22:20:29 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 22:21:26 ipsec: 09[IKE] initiating IKE_SA ionline_EY[57] to
46.32.170.109
[I] May 25 22:21:26 ipsec: 05[CFG] received proposals:
IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
[I] May 25 22:21:26 ipsec: 05[CFG] configured proposals:
IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
[I] May 25 22:21:26 ipsec: 05[CFG] selected proposal:
IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
[I] May 25 22:21:26 ipsec: 05[IKE] scheduling rekeying in 3578s
[I] May 25 22:21:26 ipsec: 05[IKE] maximum IKE_SA lifetime 3598s
[I] May 25 22:21:26 ipsec: 05[IKE] IKE_SA ionline_EY[57] rekeyed between
78.109.53.15[7thsorrow.keenetic.pro]...46.32.170.109[46.32.170.109]
[I] May 25 22:21:26 ipsec: 05[IKE] deleting IKE_SA ionline_EY[56] between
78.109.53.15[7thsorrow.keenetic.pro]...46.32.170.109[46.32.170.109]
[I] May 25 22:21:26 ipsec: 05[IKE] sending DELETE for IKE_SA ionline_EY[56]
[I] May 25 22:21:26 ipsec: 06[IKE] IKE_SA deleted
[I] May 25 22:21:34 ndnproxy: answer from wrong socket, ignore.
[I] May 25 22:23:19 ndnproxy: Core::Syslog: last message repeated 5 times.
[I] May 25 22:23:48 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 22:23:48 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 22:23:48 ndnproxy: answer from wrong socket, ignore.
[I] May 25 22:24:00 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 22:24:01 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 22:24:19 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 22:24:20 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 22:24:33 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 22:24:34 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 22:25:06 ndnproxy: answer from wrong socket, ignore.
[I] May 25 22:27:09 ndnproxy: Core::Syslog: last message repeated 3 times.
[I] May 25 22:27:41 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 22:27:42 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 22:28:00 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 22:28:01 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 22:28:40 ndnproxy: answer from wrong socket, ignore.
[I] May 25 22:30:55 ndnproxy: Core::Syslog: last message repeated 2 times.
[I] May 25 22:31:15 ndhcps: DHCPREQUEST received (STATE_RENEWING) for 192.168.1.80
from a4:4b:d5:f3:e4:9f.
[I] May 25 22:31:15 ndhcps: sending ACK of 192.168.1.80 to a4:4b:d5:f3:e4:9f.
[I] May 25 22:31:28 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 22:31:29 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 22:31:58 ndhcps: DHCPREQUEST received (STATE_RENEWING) for 192.168.1.110
from 14:eb:b6:d0:19:dd.
[I] May 25 22:31:58 ndhcps: received ARP reply from 14:eb:b6:d0:19:de, not our
client.
[I] May 25 22:31:58 ndhcps: sending ACK of 192.168.1.110 to 14:eb:b6:d0:19:dd.
[I] May 25 22:33:50 ndnproxy: answer from wrong socket, ignore.
[I] May 25 22:34:07 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 22:34:07 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 22:34:53 ndhcpc: GigabitEthernet1: received ACK for 78.109.53.15 from
37.26.63.129 lease 1800 sec.
[I] May 25 22:35:08 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) had re-associated successfully.
[I] May 25 22:35:09 ndm: Network::Interface::Rtx::WifiMonitor:
"WifiMaster1/AccessPoint0": STA(22:fd:90:7a:6f:12) set key done in WPA2/WPA2PSK.
[I] May 25 22:35:50 ndnproxy: answer from wrong socket, ignore.

You might also like