<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML><HEAD>
<META HTTP-EQUIV="Content-Type" CONTENT="text/html; charset=us-ascii">
<TITLE>메시지</TITLE>
<META name=GENERATOR content="MSHTML 8.00.6001.18939"></HEAD>
<BODY><!-- Converted from text/plain format -->
<P><FONT size=2>Hello<BR><BR>Charon delete all IKE_SA airwalk[1], airwalk[2] at
Sep 7 04:44:18.<BR>I think that rekey, dpd do not make this.<BR>Why does
charon delete all IKE_SA?<BR><BR><BR>Sep 7 03:05:18 PANDORA authpriv.warn
ipsec_starter[418]: Starting strongSwan 4.3.3 IPsec [starter]...<BR>Sep 7
03:05:18 PANDORA daemon.info charon: 01[DMN] Starting IKEv2 charon daemon
(strongSwan 4.3.3)<BR>Sep 7 03:05:19 PANDORA daemon.info charon: 01[KNL]
listening on interfaces:<BR>Sep 7 03:05:19 PANDORA daemon.info charon:
01[KNL] eth0<BR>Sep 7 03:05:19 PANDORA daemon.info charon:
01[KNL] aaa.bbb.cc.dd<BR>Sep 7 03:05:19 PANDORA
daemon.info charon: 01[KNL]
xxxx::xxx:xxx:xxxx:xxxx<BR>Sep 7 03:05:19 PANDORA daemon.info charon:
01[CFG] loading ca certificates from '/etc/ipsec.d/cacerts'<BR>Sep 7
03:05:19 PANDORA daemon.info charon: 01[CFG] loading aa certificates from
'/etc/ipsec.d/aacerts'<BR>Sep 7 03:05:19 PANDORA daemon.info charon:
01[CFG] loading ocsp signer certificates from
'/etc/ipsec.d/ocspcerts'<BR>Sep 7 03:05:19 PANDORA daemon.info charon:
01[CFG] loading attribute certificates from '/etc/ipsec.d/acerts'<BR>Sep 7
03:05:19 PANDORA daemon.info charon: 01[CFG] loading crls from
'/etc/ipsec.d/crls'<BR>Sep 7 03:05:19 PANDORA daemon.info charon: 01[CFG]
loading secrets from '/etc/ipsec.secrets'<BR>Sep 7 03:05:19 PANDORA
daemon.info charon: 01[CFG] loaded IKE secret for
11.com<BR>Sep 7 03:05:19 PANDORA daemon.info charon: 01[DMN] loaded
plugins: aes des sha1 sha2 md5 fips-prf random x509 pubkey xcbc hmac gmp
kernel-netlink stroke updown attr resolv-conf<BR>Sep 7 03:05:19 PANDORA
daemon.info charon: 01[JOB] spawning 16 worker threads<BR>Sep 7 03:05:19
PANDORA authpriv.warn ipsec_starter[425]: charon (426) started after 180
ms<BR>Sep 7 03:05:19 PANDORA daemon.info charon: 05[CFG] received stroke:
add connection 'airwalk'<BR>Sep 7 03:05:19 PANDORA daemon.info charon:
05[CFG] added configuration 'airwalk'<BR>Sep 7 03:05:19 PANDORA
daemon.info charon: 05[CFG] received stroke: initiate 'airwalk'<BR>Sep 7
03:05:19 PANDORA daemon.info charon: 05[IKE] initiating IKE_SA airwalk[1] to
www.xx.yyy.zz<BR>Sep 7 03:05:19 PANDORA authpriv.info charon: 05[IKE]
initiating IKE_SA airwalk[1] to www.xx.yyy.zz<BR>Sep 7 03:05:19 PANDORA
daemon.info charon: 05[ENC] generating IKE_SA_INIT request 0 [ SA KE No
N(NATD_S_IP) N(NATD_D_IP) ]<BR>Sep 7 03:05:19 PANDORA daemon.info charon:
05[NET] sending packet: from aaa.bbb.cc.dd[500] to
www.xx.yyy.zz[500]<BR>Sep 7 03:05:19 PANDORA daemon.info charon: 16[NET]
received packet: from www.xx.yyy.zz[500] to aaa.bbb.cc.dd[500]<BR>Sep 7
03:05:19 PANDORA daemon.info charon: 16[ENC] parsed IKE_SA_INIT response 0 [ SA
KE No N(NATD_S_IP) N(NATD_D_IP) CERTREQ ]<BR>Sep 7 03:05:19 PANDORA
daemon.info charon: 16[IKE] received cert request for unknown ca with keyid
a7:00:32:d1:54:ac:72:3d:96:19:5e:fe:2c:6a:db:4d:d4:6a:9e:19<BR>Sep 7
03:05:19 PANDORA daemon.info charon: 16[IKE] authentication of 'aaa.bbb.cc.dd'
(myself) with pre-shared key<BR>Sep 7 03:05:19 PANDORA daemon.info charon:
16[IKE] establishing CHILD_SA airwalk<BR>Sep 7 03:05:19 PANDORA
authpriv.info charon: 16[IKE] establishing CHILD_SA airwalk<BR>Sep 7
03:05:19 PANDORA daemon.info charon: 16[ENC] generating IKE_AUTH request 1 [ IDi
IDr AUTH CP SA TSi TSr N(MOBIKE_SUP) N(NO_ADD_ADDR) ]<BR>Sep 7 03:05:19
PANDORA daemon.info charon: 16[NET] sending packet: from aaa.bbb.cc.dd[4500] to
www.xx.yyy.zz[4500]<BR>Sep 7 03:05:19 PANDORA daemon.info charon: 08[NET]
received packet: from www.xx.yyy.zz[4500] to aaa.bbb.cc.dd[4500]<BR>Sep 7
03:05:19 PANDORA daemon.info charon: 08[ENC] parsed IKE_AUTH response 1 [ IDr
AUTH CP SA TSi TSr ]<BR>Sep 7 03:05:19 PANDORA daemon.info charon: 08[IKE]
authentication of '11.com' with pre-shared key successful<BR>Sep 7
03:05:19 PANDORA daemon.info charon: 08[IKE] scheduling rekeying in
215903s<BR>Sep 7 03:05:19 PANDORA daemon.info charon: 08[IKE] maximum
IKE_SA lifetime 215963s<BR>Sep 7 03:05:19 PANDORA daemon.info charon:
08[IKE] IKE_SA airwalk[1] established between
aaa.bbb.cc.dd[aaa.bbb.cc.dd]...www.xx.yyy.zz[11.com]<BR>Sep 7 03:05:19
PANDORA authpriv.info charon: 08[IKE] IKE_SA airwalk[1] established between
aaa.bbb.cc.dd[aaa.bbb.cc.dd]...www.xx.yyy.zz[11.com]<BR>Sep 7 03:05:19
PANDORA daemon.info charon: 08[CFG] handling INTERNAL_IP4_NETMASK attribute
failed<BR>Sep 7 03:05:19 PANDORA daemon.info charon: 08[IKE] installing
new virtual IP 192.168.40.78<BR>Sep 7 03:05:19 PANDORA daemon.info charon:
08[IKE] CHILD_SA airwalk{1} established with SPIs c1e156b1_i 19317b0a_o and TS
192.168.40.78/32 === 192.168.50.0/24<BR>Sep 7 03:05:19 PANDORA
authpriv.info charon: 08[IKE] CHILD_SA airwalk{1} established with SPIs
c1e156b1_i 19317b0a_o and TS 192.168.40.78/32 ===
192.168.50.0/24<BR><BR><BR><BR>Sep 7 04:44:18 PANDORA daemon.info charon:
12[IKE] initiating IKE_SA airwalk[2] to www.xx.yyy.zz<BR>Sep 7 04:44:18
PANDORA authpriv.info charon: 12[IKE] initiating IKE_SA airwalk[2] to
www.xx.yyy.zz<BR>Sep 7 04:44:18 PANDORA daemon.info charon: 12[ENC]
generating CREATE_CHILD_SA request 2 [ SA No KE ]<BR>Sep 7 04:44:18
PANDORA daemon.info charon: 12[NET] sending packet: from aaa.bbb.cc.dd[4500] to
www.xx.yyy.zz[4500]<BR>Sep 7 04:44:18 PANDORA daemon.info charon: 09[NET]
received packet: from www.xx.yyy.zz[4500] to aaa.bbb.cc.dd[4500]<BR>Sep 7
04:44:18 PANDORA daemon.info charon: 09[ENC] parsed CREATE_CHILD_SA response 2 [
SA No KE ]<BR>Sep 7 04:44:18 PANDORA daemon.info charon: 09[IKE]
scheduling rekeying in 215915s<BR>Sep 7 04:44:18 PANDORA daemon.info
charon: 09[IKE] maximum IKE_SA lifetime 215975s<BR>Sep 7 04:44:18 PANDORA
daemon.info charon: 09[IKE] IKE_SA airwalk[2] established between
aaa.bbb.cc.dd[aaa.bbb.cc.dd]...www.xx.yyy.zz[11.com]<BR>Sep 7 04:44:18
PANDORA authpriv.info charon: 09[IKE] IKE_SA airwalk[2] established between
aaa.bbb.cc.dd[aaa.bbb.cc.dd]...www.xx.yyy.zz[11.com]<BR>Sep 7 04:44:18
PANDORA daemon.info charon: 09[IKE] deleting IKE_SA airwalk[1] between
aaa.bbb.cc.dd[aaa.bbb.cc.dd]...www.xx.yyy.zz[11.com]<BR>Sep 7 04:44:18
PANDORA authpriv.info charon: 09[IKE] deleting IKE_SA airwalk[1] between
aaa.bbb.cc.dd[aaa.bbb.cc.dd]...www.xx.yyy.zz[11.com]<BR>Sep 7 04:44:18
PANDORA daemon.info charon: 09[IKE] sending DELETE for IKE_SA
airwalk[1]<BR>Sep 7 04:44:18 PANDORA daemon.info charon: 09[ENC]
generating INFORMATIONAL request 3 [ D ]<BR>Sep 7 04:44:18 PANDORA
daemon.info charon: 09[NET] sending packet: from aaa.bbb.cc.dd[4500] to
www.xx.yyy.zz[4500]<BR>Sep 7 04:44:18 PANDORA daemon.info charon: 13[NET]
received packet: from www.xx.yyy.zz[4500] to aaa.bbb.cc.dd[4500]<BR>Sep 7
04:44:18 PANDORA daemon.info charon: 13[ENC] parsed INFORMATIONAL response 3 [
]<BR>Sep 7 04:44:18 PANDORA daemon.info charon: 13[IKE] IKE_SA
deleted<BR>Sep 7 04:44:18 PANDORA authpriv.info charon: 13[IKE] IKE_SA
deleted<BR>Sep 7 04:44:18 PANDORA daemon.info charon: 13[IKE] deleting
IKE_SA airwalk[2] between
aaa.bbb.cc.dd[aaa.bbb.cc.dd]...www.xx.yyy.zz[11.com]<BR>Sep 7 04:44:18
PANDORA authpriv.info charon: 13[IKE] deleting IKE_SA airwalk[2] between
aaa.bbb.cc.dd[aaa.bbb.cc.dd]...www.xx.yyy.zz[11.com]<BR>Sep 7 04:44:18
PANDORA daemon.info charon: 13[IKE] sending DELETE for IKE_SA
airwalk[2]<BR>Sep 7 04:44:18 PANDORA daemon.info charon: 13[ENC]
generating INFORMATIONAL request 0 [ D ]<BR>Sep 7 04:44:18 PANDORA
daemon.info charon: 13[NET] sending packet: from aaa.bbb.cc.dd[4500] to
www.xx.yyy.zz[4500]<BR>Sep 7 04:44:18 PANDORA daemon.info charon: 12[NET]
received packet: from www.xx.yyy.zz[4500] to aaa.bbb.cc.dd[4500]<BR>Sep 7
04:44:18 PANDORA daemon.info charon: 12[ENC] parsed INFORMATIONAL response 0 [
]<BR>Sep 7 04:44:18 PANDORA daemon.info charon: 12[IKE] IKE_SA
deleted<BR>Sep 7 04:44:18 PANDORA authpriv.info charon: 12[IKE] IKE_SA
deleted<BR><BR><BR><BR><BR><BR>Sep 7 04:45:46 PANDORA daemon.info charon:
01[DMN] signal of type SIGINT received. Shutting down<BR>Sep 7 04:45:46
PANDORA authpriv.warn ipsec_starter[425]: charon stopped after 200
ms<BR>Sep 7 04:45:46 PANDORA authpriv.warn ipsec_starter[425]: WARNING:
cannot flush IPsec state/policy database<BR>Sep 7 04:45:46 PANDORA
authpriv.warn starter[425]: ipsec starter stopped<BR>Sep 7 04:46:02
PANDORA authpriv.warn ipsec_starter[598]: Starting strongSwan 4.3.3 IPsec
[starter]...<BR>Sep 7 04:46:02 PANDORA daemon.info charon: 01[DMN]
Starting IKEv2 charon daemon (strongSwan 4.3.3)<BR>Sep 7 04:46:02 PANDORA
daemon.info charon: 01[KNL] listening on interfaces:<BR>Sep 7 04:46:02
PANDORA daemon.info charon: 01[KNL] eth0<BR>Sep 7 04:46:02
PANDORA daemon.info charon: 01[KNL]
aaa.bbb.cc.dd<BR>Sep 7 04:46:02 PANDORA daemon.info charon:
01[KNL] fe80::217:bff:fe00:2038<BR>Sep 7 04:46:02
PANDORA daemon.info charon: 01[CFG] loading ca certificates from
'/etc/ipsec.d/cacerts'<BR>Sep 7 04:46:02 PANDORA daemon.info charon:
01[CFG] loading aa certificates from '/etc/ipsec.d/aacerts'<BR>Sep 7
04:46:02 PANDORA daemon.info charon: 01[CFG] loading ocsp signer certificates
from '/etc/ipsec.d/ocspcerts'<BR>Sep 7 04:46:02 PANDORA daemon.info
charon: 01[CFG] loading attribute certificates from
'/etc/ipsec.d/acerts'<BR>Sep 7 04:46:02 PANDORA daemon.info charon:
01[CFG] loading crls from '/etc/ipsec.d/crls'<BR>Sep 7 04:46:02 PANDORA
daemon.info charon: 01[CFG] loading secrets from
'/etc/ipsec.secrets'<BR>Sep 7 04:46:02 PANDORA daemon.info charon:
01[CFG] loaded IKE secret for 11.com<BR>Sep 7 04:46:02 PANDORA
daemon.info charon: 01[DMN] loaded plugins: aes des sha1 sha2 md5 fips-prf
random x509 pubkey xcbc hmac gmp kernel-netlink stroke updown attr
resolv-conf<BR>Sep 7 04:46:02 PANDORA daemon.info charon: 01[JOB] spawning
16 worker threads<BR>Sep 7 04:46:02 PANDORA authpriv.warn
ipsec_starter[605]: charon (606) started after 60 ms<BR>Sep 7 04:46:02
PANDORA daemon.info charon: 05[CFG] received stroke: add connection
'airwalk'<BR>Sep 7 04:46:02 PANDORA daemon.info charon: 05[CFG] added
configuration 'airwalk'<BR>Sep 7 04:46:02 PANDORA daemon.info charon:
05[CFG] received stroke: initiate 'airwalk'<BR>Sep 7 04:46:02 PANDORA
daemon.info charon: 05[IKE] initiating IKE_SA airwalk[1] to
www.xx.yyy.zz<BR>Sep 7 04:46:02 PANDORA authpriv.info charon: 05[IKE]
initiating IKE_SA airwalk[1] to www.xx.yyy.zz<BR>Sep 7 04:46:02 PANDORA
daemon.info charon: 05[ENC] generating IKE_SA_INIT request 0 [ SA KE No
N(NATD_S_IP) N(NATD_D_IP) ]<BR>Sep 7 04:46:02 PANDORA daemon.info charon:
05[NET] sending packet: from aaa.bbb.cc.dd[500] to
www.xx.yyy.zz[500]<BR>Sep 7 04:46:02 PANDORA daemon.info charon: 16[NET]
received packet: from www.xx.yyy.zz[500] to aaa.bbb.cc.dd[500]<BR>Sep 7
04:46:02 PANDORA daemon.info charon: 16[ENC] parsed IKE_SA_INIT response 0 [ SA
KE No N(NATD_S_IP) N(NATD_D_IP) CERTREQ ]<BR>Sep 7 04:46:02 PANDORA
daemon.info charon: 16[IKE] received cert request for unknown ca with keyid
a7:00:32:d1:54:ac:72:3d:96:19:5e:fe:2c:6a:db:4d:d4:6a:9e:19<BR>Sep 7
04:46:02 PANDORA daemon.info charon: 16[IKE] authentication of 'aaa.bbb.cc.dd'
(myself) with pre-shared key<BR>Sep 7 04:46:02 PANDORA daemon.info charon:
16[IKE] establishing CHILD_SA airwalk<BR>Sep 7 04:46:02 PANDORA
authpriv.info charon: 16[IKE] establishing CHILD_SA airwalk<BR>Sep 7
04:46:02 PANDORA daemon.info charon: 16[ENC] generating IKE_AUTH request 1 [ IDi
IDr AUTH CP SA TSi TSr N(MOBIKE_SUP) N(NO_ADD_ADDR) ]<BR>Sep 7 04:46:02
PANDORA daemon.info charon: 16[NET] sending packet: from aaa.bbb.cc.dd[4500] to
www.xx.yyy.zz[4500]<BR>Sep 7 04:46:02 PANDORA daemon.info charon: 08[NET]
received packet: from www.xx.yyy.zz[4500] to aaa.bbb.cc.dd[4500]<BR>Sep 7
04:46:02 PANDORA daemon.info charon: 08[ENC] parsed IKE_AUTH response 1 [ IDr
AUTH CP SA TSi TSr ]<BR>Sep 7 04:46:02 PANDORA daemon.info charon: 08[IKE]
authentication of '11.com' with pre-shared key successful<BR>Sep 7
04:46:02 PANDORA daemon.info charon: 08[IKE] scheduling rekeying in
215917s<BR><BR><BR><BR>######################################################################################<BR>#
ipsec.conf - strongSwan IPsec configuration file<BR># basic
configuration<BR><BR>config setup<BR>
plutostart=no<BR> charondebug="ike
1,cfg 1,enc 1, mgr 1, chd 1, knl 1, lib 1, dmn 1"<BR><BR>conn
%default<BR>
ikelifetime=3600m<BR>
keylife=1800m<BR>
rekeymargin=3m<BR>
keyingtries=1<BR>
keyexchange=ikev2<BR>
ike=aes-sha-modp1024!<BR>
esp=aes-sha!<BR>
dpddelay=1m<BR> reauth=no<BR><BR>conn
airwalk<BR>
left=%defaultroute<BR>
leftfirewall=no<BR>
leftsourceip=%config<BR> right=
www.xx.yyy.zz<BR>
rightid=@11.com<BR>
rightsubnet=192.168.50.0/24<BR>
dpdaction=restart<BR>
authby=secret<BR>
auto=start<BR>######################################################################################</FONT>
</P></BODY></HTML>