You are on page 1of 8

=============================================================================

System Event Log (Current system time: Wed, 7 May 2014 17:39:53)
=============================================================================
Date
Time Module level Type Description
2014-05-07 17:37:46 system info 00536 IKE 114.124.37.185: XAuth login was
passed for gateway Dialup_GW, username manager1, retry: 0, Client IP Addr 192.16
8.20.5, IPPool name: Remote_Pool, Session-Timeout: 0s, Idle-Timeout: 0s.
2014-05-07 17:37:46 system info 00536 IKE114.124.37.185: XAuth login was t
erminated because the user logged in again. Previous gateway: 114.124.38.220. Us
ername: manager1 at 192.168.20.5/0.0.0.0.
2014-05-07 17:37:46 system info 00536 IKE 114.124.37.185 Phase 1: Complete
d Aggressive mode negotiations with a 28800-second lifetime.
2014-05-07 17:37:46 system info 00536 IKE 114.124.37.185 Phase 1: Complete
d for user client.mitratel.vpn.
2014-05-07 17:37:46 system info 00536 IKE<114.124.37.185> Phase 1: IKE res
ponder has detected NAT in front of the remote device.
2014-05-07 17:37:46 system info 00536 IKE<114.124.37.185> Phase 1: IKE res
ponder has detected NAT in front of the local device.
2014-05-07 17:37:42 system info 00536 IKE 114.124.38.220 phase 1:The symme
tric crypto key has been generated successfully.
2014-05-07 17:37:42 system info 00536 IKE 114.124.38.220 Phase 1: Responde
r starts AGGRESSIVE mode negotiations.
2014-05-07 17:35:09 system info 00536 IKE 114.124.38.220: XAuth login was
passed for gateway Dialup_GW, username manager1, retry: 0, Client IP Addr 192.16
8.20.5, IPPool name: Remote_Pool, Session-Timeout: 0s, Idle-Timeout: 0s.
2014-05-07 17:35:08 system info 00536 IKE 114.124.38.220: XAuth login was
refreshed for username manager1 at 192.168.20.5/255.255.255.255.
2014-05-07 17:35:08 system info 00536 Rejected an IKE packet on ethernet0/
0 from 114.124.38.220:47364 to 180.243.40.86:4500 with cookies 7d239951222a42fc
and ce3b3d272a124b8c because A Phase 2 packet arrived while XAuth was still pend
ing.
2014-05-07 17:35:08 system info 00536 IKE 114.124.38.220 Phase 1: Complete
d Aggressive mode negotiations with a 28800-second lifetime.
2014-05-07 17:35:08 system info 00536 IKE 114.124.38.220 Phase 1: Complete
d for user client.mitratel.vpn.
2014-05-07 17:35:08 system info 00536 IKE<114.124.38.220> Phase 1: IKE res
ponder has detected NAT in front of the remote device.
2014-05-07 17:35:08 system info 00536 IKE<114.124.38.220> Phase 1: IKE res
ponder has detected NAT in front of the local device.
2014-05-07 17:35:08 system info 00536 IKE 114.124.38.220 phase 1:The symme
tric crypto key has been generated successfully.
2014-05-07 17:35:08 system info 00536 IKE 114.124.38.220 Phase 1: Responde
r starts AGGRESSIVE mode negotiations.
2014-05-07 17:34:07 system info 00536 IKE 114.124.38.220: XAuth login was
passed for gateway Dialup_GW, username manager1, retry: 0, Client IP Addr 192.16
8.20.5, IPPool name: Remote_Pool, Session-Timeout: 0s, Idle-Timeout: 0s.
2014-05-07 17:33:46 system info 00536 IKE114.124.38.220: XAuth login was t
erminated because the user logged in again. Previous gateway: 114.121.164.174. U
sername: manager1 at 192.168.20.5/0.0.0.0.
2014-05-07 17:33:40 system info 00536 IKE 114.124.38.220 Phase 1: Complete
d Aggressive mode negotiations with a 28800-second lifetime.
2014-05-07 17:33:40 system info 00536 IKE 114.124.38.220 Phase 1: Complete
d for user client.mitratel.vpn.
2014-05-07 17:33:40 system info 00536 IKE<114.124.38.220> Phase 1: IKE res
ponder has detected NAT in front of the remote device.
2014-05-07 17:33:40 system info 00536 IKE<114.124.38.220> Phase 1: IKE res
ponder has detected NAT in front of the local device.
2014-05-07 17:33:35 system info 00536 IKE 114.124.38.220 phase 1:The symme
tric crypto key has been generated successfully.

2014-05-07 17:33:35 system info 00536 IKE 114.124.38.220 Phase 1: Responde


r starts AGGRESSIVE mode negotiations.
2014-05-07 17:32:06 system info 00536 IKE 114.121.164.174: XAuth login was
passed for gateway Dialup_GW, username manager1, retry: 0, Client IP Addr 192.1
68.20.5, IPPool name: Remote_Pool, Session-Timeout: 0s, Idle-Timeout: 0s.
2014-05-07 17:32:06 system info 00536 IKE 114.121.164.174: XAuth login was
refreshed for username manager1 at 192.168.20.5/255.255.255.255.
2014-05-07 17:32:06 system info 00536 Rejected an IKE packet on ethernet0/
0 from 114.121.164.174:2610 to 180.243.40.86:4500 with cookies 12472b6b35d73f30
and 610cdca884e05fcf because A Phase 2 packet arrived while XAuth was still pend
ing.
2014-05-07 17:32:06 system info 00536 IKE 114.121.164.174 Phase 1: Complet
ed Aggressive mode negotiations with a 28800-second lifetime.
2014-05-07 17:32:06 system info 00536 IKE 114.121.164.174 Phase 1: Complet
ed for user client.mitratel.vpn.
2014-05-07 17:32:06 system info 00536 IKE<114.121.164.174> Phase 1: IKE re
sponder has detected NAT in front of the remote device.
2014-05-07 17:32:06 system info 00536 IKE<114.121.164.174> Phase 1: IKE re
sponder has detected NAT in front of the local device.
2014-05-07 17:32:05 system info 00536 IKE 114.121.164.174 phase 1:The symm
etric crypto key has been generated successfully.
2014-05-07 17:32:05 system info 00536 IKE 114.121.164.174 Phase 1: Respond
er starts AGGRESSIVE mode negotiations.
2014-05-07 17:31:22 system info 00536 IKE 114.121.164.174: XAuth login was
passed for gateway Dialup_GW, username manager1, retry: 0, Client IP Addr 192.1
68.20.5, IPPool name: Remote_Pool, Session-Timeout: 0s, Idle-Timeout: 0s.
2014-05-07 17:31:22 system info 00536 IKE114.121.164.174: XAuth login was
terminated because the user logged in again. Previous gateway: 39.253.73.16. Use
rname: manager1 at 192.168.20.5/0.0.0.0.
2014-05-07 17:31:22 system info 00536 Rejected an IKE packet on ethernet0/
0 from 114.121.164.174:2610 to 180.243.40.86:4500 with cookies 0dde79035e6aac95
and 42fd3ab3a5ba80ca because A Phase 2 packet arrived while XAuth was still pend
ing.
2014-05-07 17:31:22 system info 00536 IKE 114.121.164.174 Phase 1: Complet
ed Aggressive mode negotiations with a 28800-second lifetime.
2014-05-07 17:31:22 system info 00536 IKE 114.121.164.174 Phase 1: Complet
ed for user client.mitratel.vpn.
2014-05-07 17:31:22 system info 00536 IKE<114.121.164.174> Phase 1: IKE re
sponder has detected NAT in front of the remote device.
2014-05-07 17:31:22 system info 00536 IKE<114.121.164.174> Phase 1: IKE re
sponder has detected NAT in front of the local device.
2014-05-07 17:31:22 system info 00536 IKE 114.121.164.174 phase 1:The symm
etric crypto key has been generated successfully.
2014-05-07 17:31:22 system info 00536 IKE 114.121.164.174 Phase 1: Respond
er starts AGGRESSIVE mode negotiations.
2014-05-07 17:29:25 system info 00536 IKE 39.253.73.16 Phase 2 msg ID 7561
c714: Completed negotiations with SPI f39a85ed, tunnel ID 32771, and lifetime 36
00 seconds/0 KB.
2014-05-07 17:29:25 system info 00536 IKE 39.253.73.16 Phase 2 msg-id 7561
c714: Completed for user client.mitratel.vpn.
2014-05-07 17:29:25 system info 00536 IKE 39.253.73.16 phase 2:The symmetr
ic crypto key has been generated successfully.
2014-05-07 17:29:25 system info 00536 IKE 39.253.73.16 Phase 2 msg ID 7561
c714: Responded to the peer's first message from user client.mitratel.vpn.
2014-05-07 17:29:20 system info 00536 IKE 39.253.73.16: XAuth login was pa
ssed for gateway Dialup_GW, username manager1, retry: 0, Client IP Addr 192.168.
20.5, IPPool name: Remote_Pool, Session-Timeout: 0s, Idle-Timeout: 0s.
2014-05-07 17:29:20 system info 00536 IKE 39.253.73.16: XAuth login was re
freshed for username manager1 at 192.168.20.5/255.255.255.255.
2014-05-07 17:29:20 system info 00536 IKE 39.253.73.16 Phase 2 msg ID 7561

c714: Negotiations have failed.


2014-05-07 17:29:20 system info 00536 IKE 39.253.73.16 Phase 2 msg ID 7561
c714: Negotiations have failed for user client.mitratel.vpn.
2014-05-07 17:29:20 system info 00536 Rejected an IKE packet on ethernet0/
0 from 39.253.73.16:4500 to 180.243.40.86:4500 with cookies 11fc044e0d8f2280 and
cb33d2a08ac0d9f6 because A Phase 2 packet arrived while XAuth was still pending
.
2014-05-07 17:29:20 system info 00536 IKE 39.253.73.16 Phase 2 msg ID 7561
c714: Responded to the peer's first message from user client.mitratel.vpn.
2014-05-07 17:29:20 system info 00536 IKE 39.253.73.16 Phase 1: Completed
Aggressive mode negotiations with a 28800-second lifetime.
2014-05-07 17:29:20 system info 00536 IKE 39.253.73.16 Phase 1: Completed
for user client.mitratel.vpn.
2014-05-07 17:29:20 system info 00536 IKE<39.253.73.16> Phase 1: IKE respo
nder has detected NAT in front of the remote device.
2014-05-07 17:29:20 system info 00536 IKE 39.253.73.16 phase 1:The symmetr
ic crypto key has been generated successfully.
2014-05-07 17:29:20 system info 00536 IKE 39.253.73.16 Phase 1: Responder
starts AGGRESSIVE mode negotiations.
2014-05-07 17:29:16 system info 00536 IKE 39.253.73.16: XAuth login was pa
ssed for gateway Dialup_GW, username manager1, retry: 0, Client IP Addr 192.168.
20.5, IPPool name: Remote_Pool, Session-Timeout: 0s, Idle-Timeout: 0s.
2014-05-07 17:29:15 system info 00536 IKE39.253.73.16: XAuth login was ter
minated because the user logged in again. Previous gateway: 114.121.163.45. User
name: manager1 at 192.168.20.3/0.0.0.0.
2014-05-07 17:29:15 system info 00536 Rejected an IKE packet on ethernet0/
0 from 39.253.73.16:4500 to 180.243.40.86:4500 with cookies ace9d10340f18df5 and
b8a9b36fa9e0f5e7 because A Phase 2 packet arrived while XAuth was still pending
.
2014-05-07 17:29:15 system info 00536 IKE 39.253.73.16 Phase 1: Completed
Aggressive mode negotiations with a 28800-second lifetime.
2014-05-07 17:29:15 system info 00536 IKE 39.253.73.16 Phase 1: Completed
for user client.mitratel.vpn.
2014-05-07 17:29:15 system info 00536 IKE<39.253.73.16> Phase 1: IKE respo
nder has detected NAT in front of the remote device.
2014-05-07 17:29:15 system info 00536 IKE<39.253.73.16> Phase 1: IKE respo
nder has detected NAT in front of the local device.
2014-05-07 17:29:15 system info 00536 IKE 39.253.73.16 phase 1:The symmetr
ic crypto key has been generated successfully.
2014-05-07 17:29:15 system info 00536 IKE 39.253.73.16 Phase 1: Responder
starts AGGRESSIVE mode negotiations.
2014-05-07 17:23:49 system info 00536 IKE 114.121.165.61: XAuth login was
passed for gateway Dialup_GW, username manager2, retry: 0, Client IP Addr 192.16
8.20.4, IPPool name: Remote_Pool, Session-Timeout: 0s, Idle-Timeout: 0s.
2014-05-07 17:23:49 system info 00536 IKE114.121.165.61: XAuth login was t
erminated because the user logged in again. Previous gateway: 114.121.160.142. U
sername: manager2 at 192.168.20.2/0.0.0.0.
2014-05-07 17:23:49 system info 00536 Rejected an IKE packet on ethernet0/
0 from 114.121.165.61:60849 to 180.243.40.86:4500 with cookies 30f2fe8d6216ce64
and c7c74767b9f397b6 because A Phase 2 packet arrived while XAuth was still pend
ing.
2014-05-07 17:23:49 system info 00536 IKE 114.121.165.61 Phase 1: Complete
d Aggressive mode negotiations with a 28800-second lifetime.
2014-05-07 17:23:49 system info 00536 IKE 114.121.165.61 Phase 1: Complete
d for user client.mitratel.vpn.
2014-05-07 17:23:49 system info 00536 IKE<114.121.165.61> Phase 1: IKE res
ponder has detected NAT in front of the remote device.
2014-05-07 17:23:49 system info 00536 IKE<114.121.165.61> Phase 1: IKE res
ponder has detected NAT in front of the local device.
2014-05-07 17:23:48 system info 00536 IKE 114.121.165.61 phase 1:The symme

tric crypto key has been generated successfully.


2014-05-07 17:23:48 system info 00536 IKE 114.121.165.61 Phase 1: Responde
r starts AGGRESSIVE mode negotiations.
2014-05-07 17:23:37 system info 00536 IKE 114.121.163.45: XAuth login was
passed for gateway Dialup_GW, username manager1, retry: 0, Client IP Addr 192.16
8.20.3, IPPool name: Remote_Pool, Session-Timeout: 0s, Idle-Timeout: 0s.
2014-05-07 17:23:37 system info 00536 IKE114.121.163.45: XAuth login was t
erminated because the user logged in again. Previous gateway: 114.121.161.218. U
sername: manager1 at 192.168.20.1/0.0.0.0.
2014-05-07 17:23:37 system info 00536 IKE 114.121.163.45 Phase 1: Complete
d Aggressive mode negotiations with a 28800-second lifetime.
2014-05-07 17:23:37 system info 00536 IKE 114.121.163.45 Phase 1: Complete
d for user client.mitratel.vpn.
2014-05-07 17:23:37 system info 00536 IKE<114.121.163.45> Phase 1: IKE res
ponder has detected NAT in front of the remote device.
2014-05-07 17:23:37 system info 00536 IKE<114.121.163.45> Phase 1: IKE res
ponder has detected NAT in front of the local device.
2014-05-07 17:23:32 system info 00536 IKE 114.121.165.61 phase 1:The symme
tric crypto key has been generated successfully.
2014-05-07 17:23:32 system info 00536 IKE 114.121.165.61 Phase 1: Responde
r starts AGGRESSIVE mode negotiations.
2014-05-07 17:14:44 system warn 00519 Admin user "netscreen" logged in for
Web(http) management (port 80) from 192.168.1.10:49910
2014-05-07 17:14:44 system info 00519 ADM: Local admin authentication succ
essful for login name netscreen
2014-05-07 17:01:32 system info 00536 IKE 114.121.160.142 Phase 2 msg ID a
c0fe6ff: Completed negotiations with SPI f39a85ec, tunnel ID 32770, and lifetime
3600 seconds/0 KB.
2014-05-07 17:01:32 system info 00536 IKE 114.121.160.142 Phase 2 msg-id a
c0fe6ff: Completed for user client.mitratel.vpn.
2014-05-07 17:01:32 system info 00536 IKE 114.121.160.142 phase 2:The symm
etric crypto key has been generated successfully.
2014-05-07 17:01:32 system info 00536 IKE 114.121.160.142 Phase 2 msg ID a
c0fe6ff: Responded to the peer's first message from user client.mitratel.vpn.
2014-05-07 16:59:15 system warn 00519 Admin user "netscreen" logged in for
Web(http) management (port 80) from 192.168.1.10:49724
2014-05-07 16:59:15 system info 00519 ADM: Local admin authentication succ
essful for login name netscreen
2014-05-07 16:59:12 system info 00536 IKE 114.121.160.142: XAuth login was
passed for gateway Dialup_GW, username manager2, retry: 0, Client IP Addr 192.1
68.20.2, IPPool name: Remote_Pool, Session-Timeout: 0s, Idle-Timeout: 0s.
2014-05-07 16:59:11 system info 00536 Rejected an IKE packet on ethernet0/
0 from 114.121.160.142:41993 to 180.243.40.86:4500 with cookies af4de72c274c25a1
and 6035388a596e3652 because A Phase 2 packet arrived while XAuth was still pen
ding.
2014-05-07 16:59:11 system info 00536 IKE 114.121.160.142 Phase 1: Complet
ed Aggressive mode negotiations with a 28800-second lifetime.
2014-05-07 16:59:11 system info 00536 IKE 114.121.160.142 Phase 1: Complet
ed for user client.mitratel.vpn.
2014-05-07 16:59:11 system info 00536 IKE<114.121.160.142> Phase 1: IKE re
sponder has detected NAT in front of the remote device.
2014-05-07 16:59:11 system info 00536 IKE<114.121.160.142> Phase 1: IKE re
sponder has detected NAT in front of the local device.
2014-05-07 16:59:11 system info 00536 IKE 114.121.160.142 phase 1:The symm
etric crypto key has been generated successfully.
2014-05-07 16:59:11 system info 00536 IKE 114.121.160.142 Phase 1: Respond
er starts AGGRESSIVE mode negotiations.
2014-05-07 16:46:02 system warn 00515 Admin user "netscreen" has been forc
ed to log out of the serial console session.
2014-05-07 16:46:02 system info 00767 Lock configuration ended by task cmd

.
2014-05-07 16:46:02 system warn 00515 Management session via serial consol
e for admin netscreen has timed out
2014-05-07 16:45:34 system info 00536 IKE 114.121.161.218 Phase 2 msg ID c
63b30b5: Completed negotiations with SPI f39a85eb, tunnel ID 32769, and lifetime
3600 seconds/0 KB.
2014-05-07 16:45:34 system info 00536 IKE 114.121.161.218 Phase 2 msg-id c
63b30b5: Completed for user client.mitratel.vpn.
2014-05-07 16:45:34 system info 00536 IKE 114.121.161.218 phase 2:The symm
etric crypto key has been generated successfully.
2014-05-07 16:45:25 system info 00536 IKE 114.121.161.218 Phase 2 msg ID c
63b30b5: Responded to the peer's first message from user client.mitratel.vpn.
2014-05-07 16:43:47 system info 00536 IKE 114.121.161.218: XAuth login was
passed for gateway Dialup_GW, username manager1, retry: 0, Client IP Addr 192.1
68.20.1, IPPool name: Remote_Pool, Session-Timeout: 0s, Idle-Timeout: 0s.
2014-05-07 16:43:47 system info 00536 IKE 114.121.161.218 Phase 1: Complet
ed Aggressive mode negotiations with a 28800-second lifetime.
2014-05-07 16:43:47 system info 00536 IKE 114.121.161.218 Phase 1: Complet
ed for user client.mitratel.vpn.
2014-05-07 16:43:47 system info 00536 IKE<114.121.161.218> Phase 1: IKE re
sponder has detected NAT in front of the remote device.
2014-05-07 16:43:47 system info 00536 IKE<114.121.161.218> Phase 1: IKE re
sponder has detected NAT in front of the local device.
2014-05-07 16:43:40 system info 00536 IKE 114.121.160.142 phase 1:The symm
etric crypto key has been generated successfully.
2014-05-07 16:43:40 system info 00536 IKE 114.121.160.142 Phase 1: Respond
er starts AGGRESSIVE mode negotiations.
2014-05-07 16:42:18 system info 00536 Rejected an IKE packet on ethernet0/
0 from 114.121.160.142:42964 to 180.243.40.86:500 with cookies 8a3d0f7dc4b63aca
and 0000000000000000 because an initial Phase 1 packet arrived from an unrecogni
zed peer gateway.
2014-05-07 16:42:08 system info 00536 Rejected an IKE packet on ethernet0/
0 from 114.121.160.142:42964 to 180.243.40.86:500 with cookies 8a3d0f7dc4b63aca
and 0000000000000000 because an initial Phase 1 packet arrived from an unrecogni
zed peer gateway.
2014-05-07 16:42:05 system info 00536 Rejected an IKE packet on ethernet0/
0 from 114.121.160.142:42964 to 180.243.40.86:500 with cookies 8a3d0f7dc4b63aca
and 0000000000000000 because an initial Phase 1 packet arrived from an unrecogni
zed peer gateway.
2014-05-07 16:34:40 system notif 00018 Policy (2, Untrust->Trust, Dial-Up V
PN->Server_Kantor,ANY, Tunnel) was added by netscreen via cmd.
2014-05-07 16:20:00 system notif 00017 VPN dialup_vpn with gateway Dialup_G
W and P2 proposal g2-esp-3des-md5 has been added by netscreen via cmd.
2014-05-07 16:11:00 system notif 00017 Gateway Dialup_GW at 0.0.0.0 in aggr
essive mode with ID [default peer id] has been added by netscreen via cmd.
2014-05-07 16:09:44 system info 00767 System configuration saved by netscr
een via web from host 192.168.1.10 to 192.168.1.1:80 by netscreen.
2014-05-07 16:09:44 system notif 00017 Gateway Dialup_GW at 0.0.0.0 in aggr
essive mode with ID [default peer id] has been deleted by netscreen via web from
host 192.168.1.10 to 192.168.1.1:80.
2014-05-07 16:09:27 system notif 00017 Gateway Dialup_GW at 0.0.0.0 in aggr
essive mode with ID [default peer id] has been added by netscreen via cmd.
2014-05-07 16:01:45 system info 00767 System configuration saved by netscr
een via web from host 192.168.1.10 to 192.168.1.1:80 by netscreen.
2014-05-07 16:00:46 system info 00767 System configuration saved by netscr
een via web from host 192.168.1.10 to 192.168.1.1:80 by netscreen.
2014-05-07 15:39:53 system info 00767 System configuration saved by netscr
een via web from host 192.168.1.10 to 192.168.1.1:80 by netscreen.
2014-05-07 15:38:50 system info 00767 System configuration saved by netscr
een via web from host 192.168.1.10 to 192.168.1.1:80 by netscreen.

2014-05-07 15:30:04 system notif 00017 IP address pool Remote_Pool with ran
ge 192.168.20.1 - 192.168.20.10 was created by netscreen via cmd.
2014-05-07 15:25:34 system info 00767 System configuration saved by netscr
een via web from host 192.168.1.10 to 192.168.1.1:80 by netscreen.
2014-05-07 15:25:34 system notif 00017 IP address pool Remote_Pool with ran
ge 192.168.20.1 - 192.168.20.10 was removed by netscreen via web from host 192.1
68.1.10 to 192.168.1.1:80.
2014-05-07 15:23:48 system notif 00001 Address Server_Kantor for IP address
192.168.1.0/255.255.255.0 in zone Trust has been added by netscreen via cmd ses
sion.
2014-05-07 15:21:32 system info 00767 System configuration saved by netscr
een via web from host 192.168.1.10 to 192.168.1.1:80 by netscreen.
2014-05-07 15:21:32 system notif 00001 Address Server_Kantor for IP address
192.168.1.0/255.255.255.5 in zone Trust has been deleted by netscreen via web f
rom host 192.168.1.10 to 192.168.1.1:80 session.
2014-05-07 15:17:53 system notif 00001 Address Server_Kantor for IP address
192.168.1.0/255.255.255.5 in zone Trust has been added by netscreen via cmd ses
sion.
2014-05-07 15:16:08 system info 00767 System configuration saved by netscr
een via web from host 192.168.1.10 to 192.168.1.1:80 by netscreen.
2014-05-07 15:16:08 system notif 00001 Address Server_Kantor for IP address
192.168.1.0/255.255.255.0 in zone Trust has been deleted by netscreen via web f
rom host 192.168.1.10 to 192.168.1.1:80 session.
2014-05-07 15:15:28 system notif 00001 Address Server_Kantor for IP address
192.168.1.0/255.255.255.0 in zone Trust has been added by netscreen via cmd ses
sion.
2014-05-07 15:12:32 system info 00767 System configuration saved by netscr
een via web from host 192.168.1.10 to 192.168.1.1:80 by netscreen.
2014-05-07 15:12:32 system notif 00001 Address Server_Kantor for IP address
192.168.1.0/255.255.255.0 in zone Trust has been deleted by netscreen via web f
rom host 192.168.1.10 to 192.168.1.1:80 session.
2014-05-07 15:11:57 system notif 00001 Address Server_Kantor for IP address
192.168.1.0/255.255.255.0 in zone Trust has been added by netscreen via cmd ses
sion.
2014-05-07 15:11:50 system info 00767 System configuration saved by netscr
een via web from host 192.168.1.10 to 192.168.1.1:80 by netscreen.
2014-05-07 15:11:50 system notif 00001 Address Server_Kantor for IP address
192.168.1.0/255.255.255.0 in zone Trust has been deleted by netscreen via web f
rom host 192.168.1.10 to 192.168.1.1:80 session.
2014-05-07 15:11:05 system info 00767 System configuration saved by netscr
een via web from host 192.168.1.10 to 192.168.1.1:80 by netscreen.
2014-05-07 15:11:05 system notif 00001 Address Server_Kantor for IP address
192.168.1.0/255.255.255.0 in zone Trust has been added by netscreen via web fro
m host 192.168.1.10 to 192.168.1.1:80 session.
2014-05-07 15:09:42 system info 00767 System configuration saved by netscr
een via web from host 192.168.1.10 to 192.168.1.1:80 by netscreen.
2014-05-07 15:09:42 system notif 00001 Address Server_Kantor for IP address
192.168.1.0/255.255.255.0 in zone Trust has been deleted by netscreen via web f
rom host 192.168.1.10 to 192.168.1.1:80 session.
2014-05-07 15:09:37 system info 00767 System configuration saved by netscr
een via web from host 192.168.1.10 to 192.168.1.1:80 by netscreen.
2014-05-07 15:09:37 system notif 00001 Address Server for IP address 192.16
8.1.0/255.255.255.0 in zone Trust has been deleted by netscreen via web from hos
t 192.168.1.10 to 192.168.1.1:80 session.
2014-05-07 15:09:06 system notif 00001 Address Server_Kantor for IP address
192.168.1.0/255.255.255.0 in zone Trust has been added by netscreen via cmd ses
sion.
2014-05-07 15:03:42 system info 00767 System configuration saved by netscr
een via web from host 192.168.1.10 to 192.168.1.1:80 by netscreen.
2014-05-07 15:02:02 system notif 00001 Address Server for IP address 192.16

8.1.0/255.255.255.0 in zone Trust has been added by netscreen via cmd session.
2014-05-07 14:57:08 system info 00767 System configuration saved by netscr
een via web from host 192.168.1.10 to 192.168.1.1:80 by netscreen.
2014-05-07 14:56:29 system info 00767 System configuration saved by netscr
een via web from host 192.168.1.10 to 192.168.1.1:80 by netscreen.
2014-05-07 14:56:23 system info 00767 System configuration saved by netscr
een via web from host 192.168.1.10 to 192.168.1.1:80 by netscreen.
2014-05-07 14:56:23 system notif 00017 IP address pool Remote_Pool with ran
ge 192.168.20.1 - 192.168.20.10 was created by netscreen via web from host 192.1
68.1.10 to 192.168.1.1:80.
2014-05-07 14:52:03 system info 00767 System configuration saved by netscr
een via web from host 192.168.1.10 to 192.168.1.1:80 by netscreen.
2014-05-07 14:52:01 system info 00767 System configuration saved by netscr
een via web from host 192.168.1.10 to 192.168.1.1:80 by netscreen.
2014-05-07 14:51:57 system info 00767 System configuration saved by netscr
een via web from host 192.168.1.10 to 192.168.1.1:80 by netscreen.
2014-05-07 14:51:50 system info 00767 System configuration saved by netscr
een via web from host 192.168.1.10 to 192.168.1.1:80 by netscreen.
2014-05-07 14:51:39 system info 00767 System configuration saved by netscr
een via web from host 192.168.1.10 to 192.168.1.1:80 by netscreen.
2014-05-07 14:49:19 system info 00767 System configuration saved by netscr
een via web from host 192.168.1.10 to 192.168.1.1:80 by netscreen.
2014-05-07 14:33:53 system info 00767 System configuration saved by netscr
een via web from host 192.168.1.10 to 192.168.1.1:80 by netscreen.
2014-05-07 14:23:01 system warn 00519 Admin user "netscreen" logged in for
Web(http) management (port 80) from 192.168.1.10:49167
2014-05-07 14:23:01 system info 00519 ADM: Local admin authentication succ
essful for login name netscreen
2014-05-07 14:22:46 system notif 00513 The physical state of interface ethe
rnet0/1 has changed to Up.
2014-05-07 14:22:46 system notif 00612 Switch event: the status of ethernet
port ethernet0/1 changed to link up, duplex full, speed 100M.
2014-05-07 14:22:23 system notif 00029 DNS has been refreshed.
2014-05-07 14:22:23 system notif 00767 Trial keys are available to download
to enable advanced features.
To find out, please visit http://ww
w.juniper.net/products/subscription/trial/.
2014-05-07 14:22:22 system warn 00515 Admin user netscreen has logged on v
ia the console
2014-05-07 14:22:22 system info 00519 ADM: Local admin authentication succ
essful for login name netscreen
2014-05-07 14:22:02 system warn 00515 Login attempt to system by admin n v
ia the console has failed
2014-05-07 14:21:56 system warn 00518 ADM: Local admin authentication fail
ed for login name n: invalid login name
2014-05-07 14:21:39 system notif 00029 DNS has been refreshed.
2014-05-07 14:21:39 system info 00004 DNS entries have been refreshed by H
A.
2014-05-07 14:21:28 system info 00551 Rapid Deployment cannot start becaus
e gateway has undergone configuration changes.
2014-05-07 14:21:28 system notif 00767 System was reset at 2014-05-06 18:35
:17 by netscreen
2014-05-07 14:21:28 system notif 00767 System is operational.
2014-05-07 14:21:24 system notif 00029 DNS has been refreshed.
2014-05-07 14:21:24 system info 00004 DNS entries have been refreshed as r
esult of DNS server address change.
2014-05-07 14:21:24 system notif 00029 DNS has been refreshed.
2014-05-07 14:21:24 system info 00004 DNS entries have been refreshed as r
esult of external event.
2014-05-07 14:21:24 system notif 00034 Point-to-Point Protocol over Etherne
t (PPPoE) settings changed.

2014-05-07 14:21:24 system


lished.
2014-05-07 14:21:24 system
} DNS server IP address has
2014-05-07 14:21:24 system
} DNS server IP address has
2014-05-07 14:21:23 system
e PPPOE: local authenticated
2014-05-07 14:21:23 system
2014-05-07 14:21:23 system
oup3, state change to down.
2014-05-07 14:21:23 system
oup2, state change to down.
2014-05-07 14:21:23 system
oup1, state change to down.
2014-05-07 14:21:23 system
oup0, state change to down.
2014-05-07 14:21:23 system
et0/4 link up.
2014-05-07 14:21:23 system
et0/3 link up.
2014-05-07 14:21:23 system
et0/2 link up.
2014-05-07 14:21:23 system
et0/1 link up.
2014-05-07 14:21:20 system
rnet0/0 has changed to Up.
2014-05-07 14:21:20 system
2014-05-07 14:21:18 system
port ethernet0/0 changed to
2014-05-07 14:21:18 system

notif 00537 PPPoE session was successfully estab


notif 00004 The { primary | secondary | tertiary
been changed.
notif 00004 The { primary | secondary | tertiary
been changed.
notif 00572 PPP authentication state on interfac
itself successfully.
notif 00572 PPP LCP on interface PPPOE is UP.
notif 00612 bgroup event: bring up interface bgr
notif 00612 bgroup event: bring up interface bgr
notif 00612 bgroup event: bring up interface bgr
notif 00612 bgroup event: bring up interface bgr
notif 00612 Switch setting: set interface ethern
notif 00612 Switch setting: set interface ethern
notif 00612 Switch setting: set interface ethern
notif 00612 Switch setting: set interface ethern
notif 00513 The physical state of interface ethe
notif 00537 PPPoE session started negotiations.
notif 00612 Switch event: the status of ethernet
link up, duplex full, speed 100M.
notif 00767 Fcb pool size is 4096.

=============================================================================
End of System Event Log
=============================================================================