1;4/2/2020 15:53;info;DHCP;Sending ACK to 10.0.0.133;;;DHCP ACK 2;4/2/2020 15:53;info;IKE;ISAKMP SA [VPN-IPsek_QH] is disconnected;46.170.5.146:500;80.55.43.62:500;IKE_LOG 3;4/2/2020 15:53;info;IKE;The cookie pair is : 0x278bba35c18ad63f / 0x0000000000000000;46.170.5.146:500;80.55.43.62:500;IKE_LOG 4;4/2/2020 15:53;notice;Security Policy Control;"Match default rule, DROP";121.52.154.216:55381;46.170.5.146:3389;ACCESS BLOCK 5;4/2/2020 15:53;notice;Security Policy Control;"priority:4, from WAN to ZyWALL, UDP, service VPN_Tunels, ACCEPT [count=3]";202.52.146.14:80;46.170.5.146:53;ACCESS FORWARD 6;4/2/2020 15:53;notice;Security Policy Control;"Match default rule, DROP";139.162.72.65:32488;46.170.5.146:60741;ACCESS BLOCK 7;4/2/2020 15:53;notice;Security Policy Control;"Match default rule, DROP";74.207.241.132:32073;46.170.5.146:60741;ACCESS BLOCK 8;4/2/2020 15:53;notice;Security Policy Control;"Match default rule, DROP";176.58.96.231:35665;46.170.5.146:60741;ACCESS BLOCK 9;4/2/2020 15:53;info;IKE;Send:[HASH][NOTIFY:R_U_THERE_ACK];46.170.5.146:4500;94.42.136.198:4500;IKE_LOG 10;4/2/2020 15:53;info;IKE;The cookie pair is : 0xabe28acf851eb5a2 / 0xfb703793cf0be682;46.170.5.146:4500;94.42.136.198:4500;IKE_LOG 11;4/2/2020 15:53;info;IKE;Recv:[HASH][NOTIFY:R_U_THERE];94.42.136.198:4500;46.170.5.146:4500;IKE_LOG 12;4/2/2020 15:53;info;IKE;The cookie pair is : 0xfb703793cf0be682 / 0xabe28acf851eb5a2;94.42.136.198:4500;46.170.5.146:4500;IKE_LOG 13;4/2/2020 15:53;info;IKE;Phase 1 IKE SA process done;46.170.5.146:500;80.55.43.62:500;IKE_LOG 14;4/2/2020 15:53;info;IKE;Send:[ID][HASH];46.170.5.146:500;80.55.43.62:500;IKE_LOG 15;4/2/2020 15:53;info;IKE;Recv:[ID][HASH];80.55.43.62:500;46.170.5.146:500;IKE_LOG 16;4/2/2020 15:53;info;IKE;Send:[KE][NONCE][PRV][PRV];46.170.5.146:500;80.55.43.62:500;IKE_LOG 17;4/2/2020 15:53;info;IKE;Recv:[KE][NONCE][PRV][PRV];80.55.43.62:500;46.170.5.146:500;IKE_LOG 18;4/2/2020 15:53;info;IKE;Send:[SA][VID][VID][VID][VID][VID][VID][VID][VID][VID];46.170.5.146:500;80.55.43.62:500;IKE_LOG 19;4/2/2020 15:53;info;IKE;The cookie pair is : 0x1cf9af6b11b34de9 / 0x4f795d7b6e348e49 [count=4];46.170.5.146:500;80.55.43.62:500;IKE_LOG 20;4/2/2020 15:53;info;IKE;"Recv IKE sa: SA([0] protocol = IKE (1), AES CBC key len = 192, HMAC-SHA1 PRF, HMAC-SHA1-96, 1024 bit MODP; [1] protocol = IKE (1), AES CBC key len = 256, HMAC-SHA1 PRF, HMAC-SHA1-96, 1024 bit MODP; [2] protocol = IKE (1), AES CBC key len = 192, HMAC-SHA1";80.55.43.62:500;46.170.5.146:500;IKE_LOG 21;4/2/2020 15:53;info;IKE;Recv:[SA][VID][VID][VID][VID][VID][VID][VID][VID][VID];80.55.43.62:500;46.170.5.146:500;IKE_LOG 22;4/2/2020 15:53;info;IKE;The cookie pair is : 0x4f795d7b6e348e49 / 0x1cf9af6b11b34de9 [count=3];80.55.43.62:500;46.170.5.146:500;IKE_LOG 23;4/2/2020 15:53;info;IKE;Recv Main Mode request from [80.55.43.62];80.55.43.62:500;46.170.5.146:500;IKE_LOG 24;4/2/2020 15:53;info;IKE;The cookie pair is : 0x1cf9af6b11b34de9 / 0x0000000000000000;80.55.43.62:500;46.170.5.146:500;IKE_LOG 25;4/2/2020 15:53;info;IKE;ISAKMP SA [VPN-IPsek_QH] is disconnected;46.170.5.146:500;80.55.43.62:500;IKE_LOG 26;4/2/2020 15:53;info;IKE;Send:[HASH][DEL] [count=3];46.170.5.146:500;80.55.43.62:500;IKE_LOG 27;4/2/2020 15:53;info;IKE;The cookie pair is : 0x15afd2f98d3f615f / 0xa9a396e355c8b087 [count=4];46.170.5.146:500;80.55.43.62:500;IKE_LOG 28;4/2/2020 15:53;notice;Security Policy Control;"priority:4, from WAN to ZyWALL, UDP, service VPN_Tunels, ACCEPT";202.52.146.14:80;46.170.5.146:53;ACCESS FORWARD 29;4/2/2020 15:53;notice;Security Policy Control;"Match default rule, DROP";10.0.0.1;224.0.0.1;ACCESS BLOCK 30;4/2/2020 15:53;notice;Security Policy Control;"priority:4, from WAN to ZyWALL, UDP, service VPN_Tunels, ACCEPT [count=2]";202.52.146.14:80;46.170.5.146:53;ACCESS FORWARD