Este documento es una configuración de muestra para el soporte de Cisco IOS® de la característica de Transparencia de Traducción de la Dirección (NAT) de la red IPsec. Introduce el soporte para que el tráfico IPSec viaje a través de NAT o Point Address Translation (PAT) en la red solucionando muchas incompatibilidades sabidas entre NAT e IPSec.
No hay requisitos específicos para este documento.
La información que contiene este documento se basa en las siguientes versiones de software y hardware.
Router Cisco 2621 12.2.13.7T1 y posterior
Cisco VPN Client 3.6.3 (no se muestra la configuración)
The information in this document was created from the devices in a specific lab environment. All of the devices used in this document started with a cleared (default) configuration. If your network is live, make sure that you understand the potential impact of any command.
En esta sección encontrará la información para configurar las funciones descritas en este documento.
Nota: Use la Command Lookup Tool (sólo clientes registrados) para obtener más información sobre los comandos utilizados en este documento.
En este documento, se utiliza esta configuración de red:
Complete estos pasos:
Ejecute el comando show version para mostrar la versión de software que ejecuta el switch.
2621#show version Cisco Internetwork Operating System Software IOS (tm) C2600 Software (C2600-IK9O3S3-M), Version 12.2(13.7)T1, MAINTENANCE INTERIM SOFTWARE TAC Support: http://www.cisco.com/tac Copyright (c) 1986-2002 by cisco Systems, Inc. Compiled Sat 21-Dec-02 14:10 by ccai Image text-base: 0x80008098, data-base: 0x818B6330 ROM: System Bootstrap, Version 11.3(2)XA4, RELEASE SOFTWARE (fc1) ROM: C2600 Software (C2600-IK9O3S3-M), Version 12.2(13.7)T1, MAINTENANCE INTERIM SOFTWARE 2621 uptime is 33 minutes System returned to ROM by reload System image file is "flash:c2600-ik9o3s3-mz.122-13.7.T1" cisco 2621 (MPC860) processor (revision 0x102) with 60416K/5120K bytes of memory. Processor board ID JAB0407020V (2751454139) M860 processor: part number 0, mask 49 Bridging software. X.25 software, Version 3.0.0. Primary Rate ISDN software, Version 1.1. 2 FastEthernet/IEEE 802.3 interface(s) 2 Channelized T1/PRI port(s) 32K bytes of non-volatile configuration memory. 16384K bytes of processor board System flash (Read/Write) Configuration register is 0x2102
Ejecute el comando show run.
2621#show run Building configuration... Current configuration : 2899 bytes ! version 12.2 service timestamps debug datetime msec localtime service timestamps log datetime msec localtime no service password-encryption ! hostname 2621 ! boot system flash logging queue-limit 100 enable secret 5 $1$dGFC$VA28yOWzxlCKyj1dq8SkE/ ! username cisco password 0 cisco123 username client password 0 testclient aaa new-model ! ! aaa authentication login userauthen local aaa authorization network foo local aaa session-id common ip subnet-zero ip cef ! ! no ip domain lookup ip domain name cisco.com ! ! ! ! crypto isakmp policy 20 encr 3des hash md5 authentication pre-share group 2 crypto isakmp keepalive 40 5 !--- Allows an IPsec node to send NAT keepalive !--- packets every 20 seconds. crypto isakmp nat keepalive 20 ! crypto isakmp client configuration group cisco key test1234 pool test acl 120 ! ! !--- Transform set "test" which uses Triple DES !--- encryptions and MD5 (HMAC variant) !--- for data packet authentication: crypto ipsec transform-set test esp-3des esp-md5-hmac crypto ipsec transform-set foo esp-3des esp-sha-hmac ! crypto ipsec profile greprotect ! ! !--- Dynamic crypto map. crypto dynamic-map dynmap 1 set transform-set foo match address 199 ! ! crypto map test client authentication list userauthen crypto map test isakmp authorization list foo crypto map test client configuration address respond !--- Adds a dynamic crypto map set to a static crypto map set. crypto map test 20 ipsec-isakmp dynamic dynmap ! ! ! voice call carrier capacity active ! ! ! ! ! ! ! no voice hpi capture buffer no voice hpi capture destination ! ! mta receive maximum-recipients 0 ! ! controller T1 0/0 framing sf linecode ami ! controller T1 0/1 framing sf linecode ami ! ! ! interface Loopback0 ip address 10.100.100.1 255.255.255.0 ip nat inside ! interface FastEthernet0/0 ip address 172.16.142.191 255.255.255.0 ip nat outside no ip route-cache no ip mroute-cache duplex auto speed auto !--- Applies a crypto map set to an interface. crypto map test ! interface FastEthernet0/1 ip address 10.130.13.13 255.255.0.0 duplex auto speed auto ! ip local pool test 192.168.1.1 192.168.1.250 ip nat inside source route-map nonat interface FastEthernet0/0 overload no ip http server no ip http secure-server ip classless ip route 0.0.0.0 0.0.0.0 172.16.142.1 ! ip pim bidir-enable ! ! access-list 101 permit ip any any access-list 101 permit esp any any access-list 101 permit udp any any eq isakmp access-list 101 permit ip 192.168.0.0 0.0.255.255 10.100.100.0 0.0.0.255 access-list 111 permit ip 10.100.100.0 0.0.0.255 10.10.10.0 0.0.0.255 access-list 112 deny ip 10.100.100.0 0.0.0.255 10.10.10.0 0.0.0.255 access-list 112 deny ip 10.100.100.0 0.0.0.255 192.168.1.0 0.0.0.255 access-list 112 permit ip 10.100.100.0 0.0.0.255 any access-list 120 permit ip 10.100.100.0 0.0.0.255 192.168.1.0 0.0.0.255 !--- IPsec access list defines which traffic to protect. access-list 199 permit ip 10.100.100.0 0.0.0.255 192.168.1.0 0.0.0.255 access-list 199 permit ip host 172.16.142.191 192.168.1.0 0.0.0.255 ! route-map nonat permit 10 match ip address 112 ! radius-server authorization permit missing Service-Type call rsvp-sync ! ! mgcp profile default ! dial-peer cor custom ! ! ! ! ! line con 0 exec-timeout 0 0 line aux 0 line vty 0 4 password cisco ! ! end 2621#
Use esta sección para confirmar que su configuración funciona correctamente.
La herramienta Output Interpreter Tool (clientes registrados solamente) (OIT) soporta ciertos comandos show. Utilice la OIT para ver un análisis del resultado del comando show.
show crypto isakmp sa —Muestra todas las asociaciones de seguridad (SA) actuales de Intercambio de claves de Internet (IKE) en un par.
2621#show crypto isakmp sa f_vrf/i_vrf dst src state conn-id slot / 172.16.142.191 171.69.89.82 QM_IDLE 4 0
show crypto ipsec sa — Muestra la configuración actual utilizada por las SA actuales
2621#show crypto ipsec sa interface: FastEthernet0/0 Crypto map tag: test, local addr. 172.16.142.191 protected vrf: local ident (addr/mask/prot/port): (10.100.100.0/255.255.255.0/0/0) !--- Subnet behind local VPN router. remote ident (addr/mask/prot/port): (192.168.1.3/255.255.255.255/0/0) !--- Subnet behind remote VPN router. current_peer: 171.69.89.82:4500 PERMIT, flags={} #pkts encaps: 11, #pkts encrypt: 11, #pkts digest 11 #pkts decaps: 11, #pkts decrypt: 11, #pkts verify 11 #pkts compressed: 0, #pkts decompressed: 0 #pkts not compressed: 0, #pkts compr. failed: 0 #pkts not decompressed: 0, #pkts decompress failed: 0 #send errors 0, #recv errors 0 local crypto endpt.: 172.16.142.191, remote crypto endpt.: 171.69.89.82 !--- IP address of Encapsulating Security Payload (ESP) endpoints. path mtu 1500, media mtu 1500 current outbound spi: 9A12903F inbound esp sas: spi: 0xD44C2AFE(3561761534) !--- SPI inbound (ESP tunnel). transform: esp-3des esp-sha-hmac , in use settings ={Tunnel UDP-Encaps, } slot: 0, conn id: 2002, flow_id: 3, crypto map: test sa timing: remaining key lifetime (k/sec): (4513510/3476) IV size: 8 bytes replay detection support: Y inbound ah sas: inbound pcp sas: outbound esp sas: spi: 0x9A12903F(2584907839) !--- Security parameter index (SPI) outbound (ESP tunnel). transform: esp-3des esp-sha-hmac , in use settings ={Tunnel UDP-Encaps, } slot: 0, conn id: 2003, flow_id: 4, crypto map: test sa timing: remaining key lifetime (k/sec): (4513511/3476) IV size: 8 bytes replay detection support: Y outbound ah sas: outbound pcp sas: protected vrf: local ident (addr/mask/prot/port): (172.16.142.191/255.255.255.255/0/0) !--- Next tunnel. remote ident (addr/mask/prot/port): (192.168.1.3/255.255.255.255/0/0) current_peer: 171.69.89.82:4500 PERMIT, flags={} #pkts encaps: 0, #pkts encrypt: 0, #pkts digest 0 #pkts decaps: 0, #pkts decrypt: 0, #pkts verify 0 #pkts compressed: 0, #pkts decompressed: 0 #pkts not compressed: 0, #pkts compr. failed: 0 #pkts not decompressed: 0, #pkts decompress failed: 0 #send errors 0, #recv errors 0 local crypto endpt.: 172.16.142.191, remote crypto endpt.: 171.69.89.82 path mtu 1500, media mtu 1500 current outbound spi: 1CD14C06 inbound esp sas: spi: 0x1EAC399E(514603422) transform: esp-3des esp-sha-hmac , in use settings ={Tunnel UDP-Encaps, } slot: 0, conn id: 2000, flow_id: 1, crypto map: test sa timing: remaining key lifetime (k/sec): (4434590/3471) IV size: 8 bytes replay detection support: Y inbound ah sas: inbound pcp sas: outbound esp sas: spi: 0x1CD14C06(483478534) transform: esp-3des esp-sha-hmac , in use settings ={Tunnel UDP-Encaps, } slot: 0, conn id: 2001, flow_id: 2, crypto map: test sa timing: remaining key lifetime (k/sec): (4434590/3469) IV size: 8 bytes replay detection support: Y outbound ah sas: outbound pcp sas:
show crypyo engine connection active: muestra las estadísticas del motor de criptografía. Esto muestra los recuentos de paquetes.
2621#show crypyo engine connection active ID Interface IP-Address State Algorithm Encrypt Decrypt 4 FastEthernet0/0 172.16.142.191 set HMAC_MD5+3DES_56_C 0 0 2000 FastEthernet0/0 172.16.142.191 set HMAC_SHA+3DES_56_C 0 0 2001 FastEthernet0/0 172.16.142.191 set HMAC_SHA+3DES_56_C 0 0 2002 FastEthernet0/0 172.16.142.191 set HMAC_SHA+3DES_56_C 0 11 2003 FastEthernet0/0 172.16.142.191 set HMAC_SHA+3DES_56_C 11 0
show crypto engine [brief | configuration]: muestra un resumen de la información de configuración de los motores criptográficos. Utilice este comando en el modo EXEC privilegiado. Este comando muestra todos los motores criptográficos y el nombre del producto AIM-VPN.
2621#show crypto engine configuration crypto engine name: unknown !--- Name of the crypto engine as assigned with the !--- key-name argument in the crypto key generate dss command. crypto engine type: software !--- If "software" is listed, the crypto engine resides in either !--- the Route Switch Processor (RSP) (the Cisco IOS crypto engine) or !--- in a second-generation Versatile Interface Processor (VIP2). serial number: A3FFDBBB crypto engine state: installed !--- The state "installed" indicates that a crypto engine is located !--- in the given slot, but is not configured for encryption. crypto engine in slot: N/A platform: Cisco Software Crypto Engine Encryption Process Info: input queue size: 500 input queue top: 34 input queue bot: 34 input queue count: 0 Crypto Adjacency Counts: Lock Count: 0 Unlock Count: 0 crypto lib version: 14.0.0 ipsec lib version: 2.0.0
show crypto isakmp sa detail nat —Muestra los detalles de ISAKMP SA NAT.
2621#show crypto isakmp sa detail nat Codes: C - IKE configuration mode, D - Dead Peer Detection K - Keepalives, N - NAT-traversal X - IKE Extended Authentication psk - Preshared key, rsig - RSA signature renc - RSA encryption f_vrf/i_vrf Conn id Local Remote Encr Hash Auth DH Lifetime Capabilities / 4 172.16.142.191 171.69.89.82 3des md5 2 23:56:43 CDXN NAT keepalive(sec) 20 In local 172.16.142.191:4500 remote cisco:4500
f_vrf/i_vrf: ruteo y reenvío virtual de la puerta delantera (F_VRF) y VRF interno (I_VRF) de IKE SA. Si el FVRF es global, el resultado muestra f_vrf como un campo vacío.
Use esta sección para resolver problemas de configuración.
La herramienta Output Interpreter Tool (clientes registrados solamente) (OIT) soporta ciertos comandos show. Utilice la OIT para ver un análisis del resultado del comando show.
Para obtener información adicional sobre la solución de problemas, consulte Solución de problemas de seguridad IP - Comprensión y uso de los comandos debug.
Nota: Consulte Información Importante sobre Comandos Debug antes de utilizar los comandos debug.
Esta configuración recibe señales de mantenimiento de NAT cada 20 segundos según la configuración.
debug crypto ipsec — Muestra los IPSec Negotiations de la Fase 2.
debug crypto isakmp — Muestra las negociaciones ISAKMP para la fase 1.
debug crypto engine —Muestra el tráfico cifrado.
2621# 2621# *Mar 1 00:32:03.171: ISAKMP (0:4): received packet from 171.69.89.82 dport 4500 sport 4500 Global (R) QM_IDLE *Mar 1 00:32:03.171: ISAKMP: set new node 1489874950 to QM_IDLE *Mar 1 00:32:03.175: ISAKMP (0:4): processing HASH payload. message ID = 1489874950 *Mar 1 00:32:03.175: ISAKMP (0:4): processing NOTIFY unknown protocol 1 spi 0, message ID = 1489874950, sa = 82443410 *Mar 1 00:32:03.175: ISAKMP (0:4): deleting node 1489874950 error FALSE reason "informational (in) state 1" *Mar 1 00:32:03.175: ISAKMP (0:4): Input = IKE_MESG_FROM_PEER, IKE_INFO_NOTIFY *Mar 1 00:32:03.175: ISAKMP (0:4): Old State = IKE_P1_COMPLETE New State = IKE_P1_COMPLETE *Mar 1 00:32:13.115: ISAKMP (0:4): purging node 428915319 *Mar 1 00:32:23.199: ISAKMP (0:4): received packet from 171.69.89.82 dport 4500 sport 4500 Global (R) QM_IDLE *Mar 1 00:32:23.199: ISAKMP: set new node -1483946735 to QM_IDLE *Mar 1 00:32:23.203: ISAKMP (0:4): processing HASH payload. message ID = -1483946735 *Mar 1 00:32:23.203: ISAKMP (0:4): processing NOTIFY unknown protocol 1 spi 0, message ID = -1483946735, sa = 82443410 *Mar 1 00:32:23.203: ISAKMP (0:4): deleting node -1483946735 error FALSE reason "informational (in) state 1" *Mar 1 00:32:23.203: ISAKMP (0:4): Input = IKE_MESG_FROM_PEER, IKE_INFO_NOTIFY *Mar 1 00:32:23.203: ISAKMP (0:4): Old State = IKE_P1_COMPLETE New State = IKE_P1_COMPLETE *Mar 1 00:32:33.147: ISAKMP (0:4): purging node -1677054470
debug ip packet [detail]: muestra la información general de depuración IP y las transacciones de seguridad de la opción de seguridad IP (IPSO).
debug ip icmp: muestra información sobre las transacciones del protocolo de mensajes de control interno (ICMP).
Generic IP: ICMP packet debugging is on IP packet debugging is on (detailed) *Mar 1 00:38:43.735: IP: s=171.69.89.82 (FastEthernet0/0), d=172.16.142.191 (FastEthernet0/0), len 108, rcvd 3 *Mar 1 00:38:43.735: UDP src=4500, dst=4500 *Mar 1 00:38:48.863: IP: s=192.168.1.3 (FastEthernet0/0), d=10.100.100.1, len 60, rcvd 4 *Mar 1 00:38:48.863: ICMP type=8, code=0 *Mar 1 00:38:48.863: ICMP: echo reply sent, src 10.100.100.1, dst 192.168.1.3 *Mar 1 00:38:48.867: IP: s=10.100.100.1 (local), d=192.168.1.3 (FastEthernet0/0), len 60, sending *Mar 1 00:38:48.867: ICMP type=0, code=0 *Mar 1 00:38:49.863: IP: s=192.168.1.3 (FastEthernet0/0), d=10.100.100.1, len 60, rcvd 4 *Mar 1 00:38:49.863: ICMP type=8, code=0 *Mar 1 00:38:49.863: ICMP: echo reply sent, src 10.100.100.1, dst 192.168.1.3 *Mar 1 00:38:49.863: IP: s=10.100.100.1 (local), d=192.168.1.3 (FastEthernet0/0), len 60, sending *Mar 1 00:38:49.867: ICMP type=0, code=0 *Mar 1 00:38:50.863: IP: s=192.168.1.3 (FastEthernet0/0), d=10.100.100.1, len 60, rcvd 4 *Mar 1 00:38:50.867: ICMP type=8, code=0 *Mar 1 00:38:50.867: ICMP: echo reply sent, src 10.100.100.1, dst 192.168.1.3 *Mar 1 00:38:50.867: IP: s=10.100.100.1 (local), d=192.168.1.3 (FastEthernet0/0), len 60, sending *Mar 1 00:38:50.867: ICMP type=0, code=0 *Mar 1 00:38:51.867: IP: s=192.168.1.3 (FastEthernet0/0), d=10.100.100.1, len 60, rcvd 4 *Mar 1 00:38:51.867: ICMP type=8, code=0 *Mar 1 00:38:51.867: ICMP: echo reply sent, src 10.100.100.1, dst 192.168.1.3
debug crypto ipsec — Muestra los IPSec Negotiations de la Fase 2.
debug crypto isakmp — Muestra las negociaciones ISAKMP para la fase 1.
debug crypto engine: muestra el tráfico cifrado.
2621# 2621# 2621# 2621# *Mar 1 00:27:54.735: ISAKMP (0:0): received packet from 171.69.89.82 dport 500 sport 500 Global (N) NEW SA *Mar 1 00:27:54.739: ISAKMP: Created a peer struct for 171.69.89.82, peer port 500 *Mar 1 00:27:54.739: ISAKMP: Locking peer struct 0x82C88D44, IKE refcount 1 for crypto_ikmp_config_initialize_sa *Mar 1 00:27:54.739: ISAKMP (0:0): Setting client config settings 82A819DC *Mar 1 00:27:54.739: ISAKMP (0:0): (Re)Setting client xauth list and state *Mar 1 00:27:54.739: ISAKMP: local port 500, remote port 500 *Mar 1 00:27:54.743: ISAKMP: Find a dup sa in the avl tree during calling isadb_insert sa = 82443410 *Mar 1 00:27:54.743: ISAKMP (0:4): processing SA payload. message ID = 0 *Mar 1 00:27:54.743: ISAKMP (0:4): processing ID payload. message ID = 0 *Mar 1 00:27:54.743: ISAKMP (0:4): peer matches *none* of the profiles *Mar 1 00:27:54.743: ISAKMP (0:4): processing vendor id payload *Mar 1 00:27:54.743: ISAKMP (0:4): vendor ID seems Unity/DPD but major 215 mismatch *Mar 1 00:27:54.747: ISAKMP (0:4): vendor ID is XAUTH *Mar 1 00:27:54.747: ISAKMP (0:4): processing vendor id payload *Mar 1 00:27:54.747: ISAKMP (0:4): vendor ID is DPD *Mar 1 00:27:54.747: ISAKMP (0:4): processing vendor id payload *Mar 1 00:27:54.747: ISAKMP (0:4): vendor ID seems Unity/DPD but major 123 mismatch *Mar 1 00:27:54.747: ISAKMP (0:4): vendor ID is NAT-T v2 *Mar 1 00:27:54.747: ISAKMP (0:4): processing vendor id payload *Mar 1 00:27:54.747: ISAKMP (0:4): vendor ID seems Unity/DPD but major 194 mismatch *Mar 1 00:27:54.751: ISAKMP (0:4): processing vendor id payload *Mar 1 00:27:54.751: ISAKMP (0:4): vendor ID is Unity *Mar 1 00:27:54.751: ISAKMP (0:4) Authentication by xauth preshared *Mar 1 00:27:54.751: ISAKMP (0:4): Checking ISAKMP transform 1 against priority 20 policy *Mar 1 00:27:54.751: ISAKMP: encryption AES-CBC *Mar 1 00:27:54.751: ISAKMP: hash SHA *Mar 1 00:27:54.751: ISAKMP: default group 2 *Mar 1 00:27:54.751: ISAKMP: auth XAUTHInitPreShared *Mar 1 00:27:54.751: ISAKMP: life type in seconds *Mar 1 00:27:54.751: ISAKMP: life duration (VPI) of 0x0 0x20 0xC4 0x9B *Mar 1 00:27:54.755: ISAKMP: keylength of 256 *Mar 1 00:27:54.755: ISAKMP (0:4): Encryption algorithm offered does not match policy! *Mar 1 00:27:54.755: ISAKMP (0:4): atts are not acceptable. Next payload is 3 *Mar 1 00:27:54.755: ISAKMP (0:4): Checking ISAKMP transform 2 against priority 20 policy *Mar 1 00:27:54.755: ISAKMP: encryption AES-CBC *Mar 1 00:27:54.755: ISAKMP: hash MD5 *Mar 1 00:27:54.755: ISAKMP: default group 2 *Mar 1 00:27:54.755: ISAKMP: auth XAUTHInitPreShared *Mar 1 00:27:54.755: ISAKMP: life type in seconds *Mar 1 00:27:54.755: ISAKMP: life duration (VPI) of 0x0 0x20 0xC4 0x9B *Mar 1 00:27:54.759: ISAKMP: keylength of 256 *Mar 1 00:27:54.759: ISAKMP (0:4): Encryption algorithm offered does not match policy! *Mar 1 00:27:54.759: ISAKMP (0:4): atts are not acceptable. Next payload is 3 *Mar 1 00:27:54.759: ISAKMP (0:4): Checking ISAKMP transform 3 against priority 20 policy *Mar 1 00:27:54.759: ISAKMP: encryption AES-CBC *Mar 1 00:27:54.759: ISAKMP: hash SHA *Mar 1 00:27:54.759: ISAKMP: default group 2 *Mar 1 00:27:54.759: ISAKMP: auth pre-share *Mar 1 00:27:54.759: ISAKMP: life type in seconds *Mar 1 00:27:54.759: ISAKMP: life duration (VPI) of 0x0 0x20 0xC4 0x9B *Mar 1 00:27:54.759: ISAKMP: keylength of 256 *Mar 1 00:27:54.763: ISAKMP (0:4): Encryption algorithm offered does not match policy! *Mar 1 00:27:54.763: ISAKMP (0:4): atts are not acceptable. Next payload is 3 *Mar 1 00:27:54.763: ISAKMP (0:4): Checking ISAKMP transform 4 against priority 20 policy *Mar 1 00:27:54.763: ISAKMP: encryption AES-CBC *Mar 1 00:27:54.763: ISAKMP: hash MD5 *Mar 1 00:27:54.763: ISAKMP: default group 2 *Mar 1 00:27:54.763: ISAKMP: auth pre-share *Mar 1 00:27:54.763: ISAKMP: life type in seconds *Mar 1 00:27:54.763: ISAKMP: life duration (VPI) of 0x0 0x20 0xC4 0x9B *Mar 1 00:27:54.763: ISAKMP: keylength of 256 *Mar 1 00:27:54.763: ISAKMP (0:4): Encryption algorithm offered does not match policy! *Mar 1 00:27:54.767: ISAKMP (0:4): atts are not acceptable. Next payload is 3 *Mar 1 00:27:54.767: ISAKMP (0:4): Checking ISAKMP transform 5 against priority 20 policy *Mar 1 00:27:54.767: ISAKMP: encryption AES-CBC *Mar 1 00:27:54.767: ISAKMP: hash SHA *Mar 1 00:27:54.767: ISAKMP: default group 2 *Mar 1 00:27:54.767: ISAKMP: auth XAUTHInitPreShared *Mar 1 00:27:54.767: ISAKMP: life type in seconds *Mar 1 00:27:54.767: ISAKMP: life duration (VPI) of 0x0 0x20 0xC4 0x9B *Mar 1 00:27:54.767: ISAKMP: keylength of 192 *Mar 1 00:27:54.767: ISAKMP (0:4): Encryption algorithm offered does not match policy! *Mar 1 00:27:54.771: ISAKMP (0:4): atts are not acceptable. Next payload is 3 *Mar 1 00:27:54.771: ISAKMP (0:4): Checking ISAKMP transform 6 against priority 20 policy *Mar 1 00:27:54.771: ISAKMP: encryption AES-CBC *Mar 1 00:27:54.771: ISAKMP: hash MD5 *Mar 1 00:27:54.771: ISAKMP: default group 2 *Mar 1 00:27:54.771: ISAKMP: auth XAUTHInitPreShared *Mar 1 00:27:54.771: ISAKMP: life type in seconds *Mar 1 00:27:54.771: ISAKMP: life duration (VPI) of 0x0 0x20 0xC4 0x9B *Mar 1 00:27:54.771: ISAKMP: keylength of 192 *Mar 1 00:27:54.771: ISAKMP (0:4): Encryption algorithm offered does not match policy! *Mar 1 00:27:54.771: ISAKMP (0:4): atts are not acceptable. Next payload is 3 *Mar 1 00:27:54.775: ISAKMP (0:4): Checking ISAKMP transform 7 against priority 20 policy *Mar 1 00:27:54.775: ISAKMP: encryption AES-CBC *Mar 1 00:27:54.775: ISAKMP: hash SHA *Mar 1 00:27:54.775: ISAKMP: default group 2 *Mar 1 00:27:54.775: ISAKMP: auth pre-share *Mar 1 00:27:54.775: ISAKMP: life type in seconds *Mar 1 00:27:54.775: ISAKMP: life duration (VPI) of 0x0 0x20 0xC4 0x9B *Mar 1 00:27:54.775: ISAKMP: keylength of 192 *Mar 1 00:27:54.775: ISAKMP (0:4): Encryption algorithm 1 00:27:54.783: ISAKMP: hash SHAoffered does not match policy! *Mar 1 00:27:54.775: ISAKMP (0:4): atts are not acceptable. Next payload is 3 *Mar 1 00:27:54.775: ISAKMP (0:4): Checking ISAKMP transform 8 against priority 20 policy *Mar 1 00:27:54.779: ISAKMP: encryption AES-CBC *Mar 1 00:27:54.779: ISAKMP: hash MD5 *Mar 1 00:27:54.779: ISAKMP: default group 2 *Mar 1 00:27:54.779: ISAKMP: auth pre-share *Mar 1 00:27:54.779: ISAKMP: life type in seconds *Mar 1 00:27:54.779: ISAKMP: life duration (VPI) of 0x0 0x20 0xC4 0x9B *Mar 1 00:27:54.779: ISAKMP: keylength of 192 *Mar 1 00:27:54.779: ISAKMP (0:4): Encryption algorithm offered does not match policy! *Mar 1 00:27:54.779: ISAKMP (0:4): atts are not acceptable. Next payload is 3 *Mar 1 00:27:54.779: ISAKMP (0:4): Checking ISAKMP transform 9 against priority 20 policy *Mar 1 00:27:54.783: ISAKMP: encryption AES-CBC *Mar *Mar 1 00:27:54.783: ISAKMP: default group 2 *Mar 1 00:27:54.783: ISAKMP: auth XAUTHInitPreShared *Mar 1 00:27:54.783: ISAKMP: life type in seconds *Mar 1 00:27:54.783: ISAKMP: life duration (VPI) of 0x0 0x20 0xC4 0x9B *Mar 1 00:27:54.783: ISAKMP: keylength of 128 *Mar 1 00:27:54.783: ISAKMP (0:4): Encryption algorithm offered does not match policy! *Mar 1 00:27:54.783: ISAKMP (0:4): atts are not acceptable. Next payload is 3 *Mar 1 00:27:54.783: ISAKMP (0:4): Checking ISAKMP transform 10 against priority 20 policy *Mar 1 00:27:54.783: ISAKMP: encryption AES-CBC *Mar 1 00:27:54.787: ISAKMP: hash MD5 *Mar 1 00:27:54.787: ISAKMP: default group 2 *Mar 1 00:27:54.787: ISAKMP: auth XAUTHInitPreShared *Mar 1 00:27:54.787: ISAKMP: life type in seconds *Mar 1 00:27:54.787: ISAKMP: life duration (VPI) of 0x0 0x20 0xC4 0x9B *Mar 1 00:27:54.787: ISAKMP: keylength of 128 *Mar 1 00:27:54.787: ISAKMP (0:4): Encryption algorithm offered does not match policy! *Mar 1 00:27:54.787: ISAKMP (0:4): atts are not acceptable. Next payload is 3 *Mar 1 00:27:54.787: ISAKMP (0:4): Checking ISAKMP transform 11 against priority 20 policy *Mar 1 00:27:54.787: ISAKMP: encryption AES-CBC *Mar 1 00:27:54.787: ISAKMP: hash SHA *Mar 1 00:27:54.791: ISAKMP: default group 2 *Mar 1 00:27:54.791: ISAKMP: auth pre-share *Mar 1 00:27:54.791: ISAKMP: life type in seconds *Mar 1 00:27:54.791: ISAKMP: life duration (VPI) of 0x0 0x20 0xC4 0x9B *Mar 1 00:27:54.791: ISAKMP: keylength of 128 *Mar 1 00:27:54.791: ISAKMP (0:4): Encryption algorithm offered does not match policy! *Mar 1 00:27:54.791: ISAKMP (0:4): atts are not acceptable. Next payload is 3 *Mar 1 00:27:54.791: ISAKMP (0:4): Checking ISAKMP transform 12 against priority 20 policy *Mar 1 00:27:54.791: ISAKMP: encryption AES-CBC *Mar 1 00:27:54.791: ISAKMP: hash MD5 *Mar 1 00:27:54.791: ISAKMP: default group 2 *Mar 1 00:27:54.795: ISAKMP: auth pre-share *Mar 1 00:27:54.795: ISAKMP: life type in seconds *Mar 1 00:27:54.795: ISAKMP: life duration (VPI) of 0x0 0x20 0xC4 0x9B *Mar 1 00:27:54.795: ISAKMP: keylength of 128 *Mar 1 00:27:54.795: ISAKMP (0:4): Encryption algorithm offered does not match policy! *Mar 1 00:27:54.795: ISAKMP (0:4): atts are not acceptable. Next payload 7:54.795: ISAKMP: hash SHAis 3 *Mar 1 00:27:54.795: ISAKMP (0:4): Checking ISAKMP transform 13 against priority 20 policy *Mar 1 00:27:54.795: ISAKMP: encryption 3DES-CBC *Mar 1 00:2 *Mar 1 00:27:54.795: ISAKMP: default group 2 *Mar 1 00:27:54.795: ISAKMP: auth XAUTHInitPreShared *Mar 1 00:27:54.799: ISAKMP: life type in seconds *Mar 1 00:27:54.799: ISAKMP: life duration (VPI) of 0x0 0x20 0xC4 0x9B *Mar 1 00:27:54.799: ISAKMP (0:4): Hash algorithm offered does not match policy! *Mar 1 00:27:54.799: ISAKMP (0:4): atts are not acceptable. Next payload is 3 *Mar 1 00:27:54.799: ISAKMP (0:4): Checking ISAKMP transform 14 against priority 20 policy *Mar 1 00:27:54.799: ISAKMP: encryption 3DES-CBC *Mar 1 00:27:54.799: ISAKMP: hash MD5 *Mar 1 00:27:54.799: ISAKMP: default group 2 *Mar 1 00:27:54.799: ISAKMP: auth XAUTHInitPreShared *Mar 1 00:27:54.799: ISAKMP: life type in seconds *Mar 1 00:27:54.803: ISAKMP: life duration (VPI) of 0x0 0x20 0xC4 0x9B *Mar 1 00:27:54.803: ISAKMP (0:4): atts are acceptable. Next payload is 3 *Mar 1 00:27:55.015: ISAKMP (0:4): processing KE payload. message ID = 0 *Mar 1 00:27:55.287: ISAKMP (0:4): processing NONCE payload. message ID = 0 *Mar 1 00:27:55.287: ISAKMP (0:4): vendor ID is NAT-T v2 *Mar 1 00:27:55.287: ISAKMP (0:4): Input = IKE_MESG_FROM_PEER, IKE_AM_EXCH *Mar 1 00:27:55.291: ISAKMP (0:4): Old State = IKE_READY New State = IKE_R_AM_AAA_AWAIT *Mar 1 00:27:55.291: ISAKMP: got callback 1 *Mar 1 00:27:55.295: ISAKMP (0:4): SKEYID state generated *Mar 1 00:27:55.299: ISAKMP (0:4): constructed NAT-T vendor-02 ID *Mar 1 00:27:55.299: ISAKMP (0:4): SA is doing pre-shared key authentication plus XAUTH using id type ID_IPV4_ADDR *Mar 1 00:27:55.299: ISAKMP (4): ID payload next-payload : 10 type : 1 addr : 172.16.142.191 protocol : 17 port : 0 length : 8 *Mar 1 00:27:55.299: ISAKMP (4): Total payload length: 12 *Mar 1 00:27:55.303: ISAKMP (0:4): constructed HIS NAT-D *Mar 1 00:27:55.303: ISAKMP (0:4): constructed MINE NAT-D *Mar 1 00:27:55.303: ISAKMP (0:4): sending packet to 171.69.89.82 my_port 500 peer_port 500 (R) AG_INIT_EXCH *Mar 1 00:27:55.303: ISAKMP (0:4): Input = IKE_MESG_FROM_AAA, PRESHARED_KEY_REPLY *Mar 1 00:27:55.303: ISAKMP (0:4): Old State = IKE_R_AM_AAA_AWAIT New State = IKE_R_AM2 *Mar 1 00:27:55.391: ISAKMP (0:4): received packet from 171.69.89.82 dport 4500 sport 4500 Global (R) AG_INIT_EXCH *Mar 1 00:27:55.395: ISAKMP (0:4): processing HASH payload. message ID = 0 *Mar 1 00:27:55.395: ISAKMP (0:4): processing NOTIFY INITIAL_CONTACT protocol 1 spi 0, message ID = 0, sa = 82443410 *Mar 1 00:27:55.399: ISAKMP (0:4): Process initial contact, bring down existing phase 1 and 2 SA's with local 172.16.142.191 remote 171.69.89.82 remote port 4500 *Mar 1 00:27:55.399: ISAKMP (0:4): returning IP addr to the address pool *Mar 1 00:27:55.399: ISAKMP:received payload type 17 *Mar 1 00:27:55.399: ISAKMP (0:4): Detected NAT-D payload *Mar 1 00:27:55.399: ISAKMP (0:4): recalc my hash for NAT-D *Mar 1 00:27:55.399: ISAKMP (0:4): NAT match MINE hash *Mar 1 00:27:55.399: ISAKMP:received payload type 17 *Mar 1 00:27:55.399: ISAKMP (0:4): Detected NAT-D payload *Mar 1 00:27:55.399: ISAKMP (0:4): recalc his hash for NAT-D *Mar 1 00:27:55.403: ISAKMP (0:4): NAT does not match HIS hash *Mar 1 00:27:55.403: hash received: 93 31 EB 5E 30 E2 A0 C4 D3 6F 3E B1 B7 F AE C3 *Mar 1 00:27:55.403: his nat hash : 14 64 77 EC E8 DC 78 B9 F9 DC 2B 46 CB E8 1D 4 *Mar 1 00:27:55.403: ISAKMP (0:4): SA has been authenticated with 171.69.89.82 *Mar 1 00:27:55.407: ISAKMP (0:4): Detected port floating to port = 4500 *Mar 1 00:27:55.407: ISAKMP: Trying to insert a peer 171.69.89.82/4500/, and inserted successfully. *Mar 1 00:27:55.407: ISAKMP (0:4): IKE_DPD is enabled, initializing timers *Mar 1 00:27:55.407: ISAKMP: set new node 772423690 to CONF_XAUTH *Mar 1 00:27:55.411: ISAKMP (0:4): sending packet to 171.69.89.82 my_port 4500 peer_port 4500 (R) QM_IDLE *Mar 1 00:27:55.411: ISAKMP (0:4): purging node 772423690 *Mar 1 00:27:55.411: ISAKMP: Sending phase 1 responder lifetime 86400 *Mar 1 00:27:55.411: ISAKMP (0:4): peer matches *none* of the profiles *Mar 1 00:27:55.411: ISAKMP (0:4): Input = IKE_MESG_FROM_PEER, IKE_AM_EXCH *Mar 1 00:27:55.411: ISAKMP (0:4): Old State = IKE_R_AM2 New State = IKE_P1_COMPLETE *Mar 1 00:27:55.415: IPSEC(key_engine): got a queue event... *Mar 1 00:27:55.415: ISAKMP (0:4): Need XAUTH *Mar 1 00:27:55.415: ISAKMP (0:4): Input = IKE_MESG_INTERNAL, IKE_PHASE1_COMPLETE *Mar 1 00:27:55.415: ISAKMP (0:4): Old State = IKE_P1_COMPLETE New State = IKE_XAUTH_AAA_START_LOGIN_AWAIT *Mar 1 00:27:55.419: ISAKMP: got callback 1 *Mar 1 00:27:55.419: ISAKMP: set new node -266369278 to CONF_XAUTH *Mar 1 00:27:55.419: ISAKMP/xauth: request attribute XAUTH_USER_NAME_V2 *Mar 1 00:27:55.419: ISAKMP/xauth: request attribute XAUTH_USER_PASSWORD_V2 *Mar 1 00:27:55.419: ISAKMP (0:4): initiating peer config to 171.69.89.82. ID = -266369278 *Mar 1 00:27:55.423: ISAKMP (0:4): sending packet to 171.69.89.82 my_port 4500 peer_port 4500 (R) CONF_XAUTH *Mar 1 00:27:55.423: ISAKMP (0:4): Input = IKE_MESG_FROM_AAA, IKE_AAA_START_LOGIN *Mar 1 00:27:55.423: ISAKMP (0:4): Old State = IKE_XAUTH_AAA_START_LOGIN_AWAIT New State = IKE_XAUTH_REQ_SENT *Mar 1 00:27:55.959: ISAKMP (0:3): purging node 1153289263 *Mar 1 00:28:00.423: ISAKMP (0:4): retransmitting phase 2 CONF_XAUTH -266369278 ... *Mar 1 00:28:00.423: ISAKMP (0:4): incrementing error counter on sa: retransmit phase 2 *Mar 1 00:28:00.423: ISAKMP (0:4): incrementing error counter on sa: retransmit phase 2 *Mar 1 00:28:00.423: ISAKMP (0:4): retransmitting phase 2 -266369278 CONF_XAUTH *Mar 1 00:28:00.423: ISAKMP (0:4): sending packet to 171.69.89.82 my_port 4500 peer_port 4500 (R) CONF_XAUTH *Mar 1 00:28:02.635: ISAKMP (0:4): received packet from 171.69.89.82 dport 4500 sport 4500 Global (R) CONF_XAUTH *Mar 1 00:28:02.635: ISAKMP (0:4): processing transaction payload from 171.69.89.82. message ID = -266369278 *Mar 1 00:28:02.639: ISAKMP: Config payload REPLY *Mar 1 00:28:02.639: ISAKMP/xauth: reply attribute XAUTH_USER_NAME_V2 *Mar 1 00:28:02.639: ISAKMP/xauth: reply attribute XAUTH_USER_PASSWORD_V2 *Mar 1 00:28:02.639: ISAKMP (0:4): deleting node -266369278 error FALSE reason "done with xauth request/reply exchange" *Mar 1 00:28:02.639: ISAKMP (0:4): Input = IKE_MESG_FROM_PEER, IKE_CFG_REPLY *Mar 1 00:28:02.639: ISAKMP (0:4): Old State = IKE_XAUTH_REQ_SENT New State = IKE_XAUTH_AAA_CONT_LOGIN_AWAIT *Mar 1 00:28:02.643: ISAKMP: got callback 1 *Mar 1 00:28:02.643: ISAKMP: set new node -1548124746 to CONF_XAUTH *Mar 1 00:28:02.643: ISAKMP (0:4): initiating peer config to 171.69.89.82. ID = -1548124746 *Mar 1 00:28:02.647: ISAKMP (0:4): sending packet to 171.69.89.82 my_port 4500 peer_port 4500 (R) CONF_XAUTH *Mar 1 00:28:02.647: ISAKMP (0:4): Input = IKE_MESG_FROM_AAA, IKE_AAA_CONT_LOGIN *Mar 1 00:28:02.647: ISAKMP (0:4): Old State = IKE_XAUTH_AAA_CONT_LOGIN_AWAIT New State = IKE_XAUTH_SET_SENT *Mar 1 00:28:02.663: ISAKMP (0:4): received packet from 171.69.89.82 dport 4500 sport 4500 Global (R) CONF_XAUTH *Mar 1 00:28:02.663: ISAKMP (0:4): processing transaction payload from 171.69.89.82. message ID = -1548124746 *Mar 1 00:28:02.663: ISAKMP: Config payload ACK *Mar 1 00:28:02.663: ISAKMP (0:4): XAUTH ACK Processed *Mar 1 00:28:02.667: ISAKMP (0:4): deleting node -1548124746 error FALSE reason "done with transaction" *Mar 1 00:28:02.667: ISAKMP (0:4): Input = IKE_MESG_FROM_PEER, IKE_CFG_ACK *Mar 1 00:28:02.667: ISAKMP (0:4): Old State = IKE_XAUTH_SET_SENT New State = IKE_P1_COMPLETE *Mar 1 00:28:02.667: ISAKMP (0:4): Input = IKE_MESG_INTERNAL, IKE_PHASE1_COMPLETE *Mar 1 00:28:02.667: ISAKMP (0:4): Old State = IKE_P1_COMPLETE New State = IKE_P1_COMPLETE *Mar 1 00:28:02.675: ISAKMP (0:4): received packet from 171.69.89.82 dport 4500 sport 4500 Global (R) QM_IDLE *Mar 1 00:28:02.675: ISAKMP: set new node 1973520613 to QM_IDLE *Mar 1 00:28:02.679: ISAKMP (0:4): processing transaction payload from 171.69.89.82. message ID = 1973520613 *Mar 1 00:28:02.679: ISAKMP: Config payload REQUEST *Mar 1 00:28:02.679: ISAKMP (0:4): checking request: *Mar 1 00:28:02.679: ISAKMP: IP4_ADDRESS *Mar 1 00:28:02.679: ISAKMP: IP4_NETMASK *Mar 1 00:28:02.679: ISAKMP: IP4_DNS *Mar 1 00:28:02.683: ISAKMP: IP4_NBNS *Mar 1 00:28:02.683: ISAKMP: ADDRESS_EXPIRY *Mar 1 00:28:02.683: ISAKMP: APPLICATION_VERSION *Mar 1 00:28:02.683: ISAKMP: UNKNOWN Unknown Attr: 0x7000 *Mar 1 00:28:02.683: ISAKMP: UNKNOWN Unknown Attr: 0x7001 *Mar 1 00:28:02.683: ISAKMP: DEFAULT_DOMAIN *Mar 1 00:28:02.683: ISAKMP: SPLIT_INCLUDE *Mar 1 00:28:02.683: ISAKMP: UNKNOWN Unknown Attr: 0x7003 *Mar 1 00:28:02.683: ISAKMP: UNKNOWN Unknown Attr: 0x7007 *Mar 1 00:28:02.683: ISAKMP: UNKNOWN Unknown Attr: 0x7008 *Mar 1 00:28:02.683: ISAKMP: UNKNOWN Unknown Attr: 0x7009 *Mar 1 00:28:02.687: ISAKMP: UNKNOWN Unknown Attr: 0x700A *Mar 1 00:28:02.687: ISAKMP (0:4): Input = IKE_MESG_FROM_PEER, IKE_CFG_REQUEST *Mar 1 00:28:02.687: ISAKMP (0:4): Old State = IKE_P1_COMPLETE New State = IKE_CONFIG_AUTHOR_AAA_AWAIT *Mar 1 00:28:02.691: ISAKMP: got callback 1 *Mar 1 00:28:02.695: ISAKMP (0:4): attributes sent in message: *Mar 1 00:28:02.695: Address: 0.2.0.0 *Mar 1 00:28:02.695: ISAKMP (0:4): allocating address 192.168.1.3 *Mar 1 00:28:02.695: ISAKMP: Sending private address: 192.168.1.3 *Mar 1 00:28:02.695: ISAKMP: Sending ADDRESS_EXPIRY seconds left to use the address: 86392 *Mar 1 00:28:02.695: ISAKMP: Sending APPLICATION_VERSION string: Cisco Internetwork Operating System Software IOS (tm) C2600 Software (C2600-IK9O3S3-M), Version 12.2(13.7)T1, MAINTENANCE INTERIM SOFTWARE TAC Support: http://www.cisco.com/tac Copyright (c) 1986-2002 by cisco Systems, Inc. Compiled Sat 21-Dec-02 14:10 by ccai *Mar 1 00:28:02.699: ISAKMP (0/4): Unknown Attr: UNKNOWN (0x7000) *Mar 1 00:28:02.699: ISAKMP (0/4): Unknown Attr: UNKNOWN (0x7001) *Mar 1 00:28:02.699: ISAKMP: Sending split include name 120 network 10.100.100.0 mask 255.255.255.0 protocol 0, src port 0, dst port 0 *Mar 1 00:28:02.699: ISAKMP (0/4): Unknown Attr: UNKNOWN (0x7003) *Mar 1 00:28:02.699: ISAKMP (0/4): Unknown Attr: UNKNOWN (0x7007) *Mar 1 00:28:02.699: ISAKMP (0/4): Unknown Attr: UNKNOWN (0x7008) *Mar 1 00:28:02.699: ISAKMP (0/4): Unknown Attr: UNKNOWN (0x7009) *Mar 1 00:28:02.699: ISAKMP (0/4): Unknown Attr: UNKNOWN (0x700A) *Mar 1 00:28:02.703: ISAKMP (0:4): responding to peer config from 171.69.89.82. ID = 1973520613 *Mar 1 00:28:02.703: ISAKMP (0:4): sending packet to 171.69.89.82 my_port 4500 peer_port 4500 (R) CONF_ADDR *Mar 1 00:28:02.707: ISAKMP (0:4): deleting node 1973520613 error FALSE reason "" *Mar 1 00:28:02.707: ISAKMP (0:4): Input = IKE_MESG_FROM_AAA, IKE_AAA_GROUP_ATTR *Mar 1 00:28:02.707: ISAKMP (0:4): Old State = IKE_CONFIG_AUTHOR_AAA_AWAIT New State = IKE_P1_COMPLETE *Mar 1 00:28:02.775: ISAKMP (0:4): received packet from 171.69.89.82 dport 4500 sport 4500 Global (R) QM_IDLE *Mar 1 00:28:02.775: ISAKMP: set new node 1783469429 to QM_IDLE *Mar 1 00:28:02.787: ISAKMP (0:4): processing HASH payload. message ID = 1783469429 *Mar 1 00:28:02.787: ISAKMP (0:4): processing SA payload. message ID = 1783469429 *Mar 1 00:28:02.787: ISAKMP (0:4): Checking IPSec proposal 1 *Mar 1 00:28:02.787: ISAKMP: transform 1, ESP_AES *Mar 1 00:28:02.787: ISAKMP: attributes in transform: *Mar 1 00:28:02.787: ISAKMP: authenticator is HMAC-MD5 *Mar 1 00:28:02.787: ISAKMP: encaps is 61443 *Mar 1 00:28:02.791: ISAKMP: key length is 256 *Mar 1 00:28:02.791: ISAKMP: SA life type in seconds *Mar 1 00:28:02.791: ISAKMP: SA life duration (VPI) of 0x0 0x20 0xC4 0x9B *Mar 1 00:28:02.791: ISAKMP (0:4): atts are acceptable. *Mar 1 00:28:02.791: ISAKMP (0:4): Checking IPSec proposal 1 *Mar 1 00:28:02.791: ISAKMP (0:4): transform 1, IPPCP LZS *Mar 1 00:28:02.791: ISAKMP: attributes in transform: *Mar 1 00:28:02.791: ISAKMP: encaps is 61443 *Mar 1 00:28:02.795: ISAKMP: SA life type in seconds *Mar 1 00:28:02.795: ISAKMP: SA life duration (VPI) of 0x0 0x20 0xC4 0x9B *Mar 1 00:28:02.795: ISAKMP (0:4): atts are acceptable. *Mar 1 00:28:02.795: IPSEC(validate_proposal_request): proposal part #1, (key eng. msg.) INBOUND local= 172.16.142.191, remote= 171.69.89.82, local_proxy= 172.16.142.191/255.255.255.255/0/0 (type=1), remote_proxy= 192.168.1.3/255.255.255.255/0/0 (type=1), protocol= ESP, transform= esp-aes 256 esp-md5-hmac , lifedur= 0s and 0kb, spi= 0x0(0), conn_id= 0, keysize= 256, flags= 0x400 *Mar 1 00:28:02.799: IPSEC(validate_proposal_request): proposal part #2, (key eng. msg.) INBOUND local= 172.16.142.191, remote= 171.69.89.82, local_proxy= 172.16.142.191/255.255.255.255/0/0 (type=1), remote_proxy= 192.168.1.3/255.255.255.255/0/0 (type=1), protocol= PCP, transform= comp-lzs , lifedur= 0s and 0kb, spi= 0x0(0), conn_id= 0, keysize= 0, flags= 0x400 *Mar 1 00:28:02.799: IPSEC(kei_proxy): head = test, map->ivrf = , kei->ivrf = *Mar 1 00:28:02.799: IPSEC(validate_transform_proposal): no IPSEC cryptomap exists for local address 172.16.142.191 *Mar 1 00:28:02.799: ISAKMP (0:4): IPSec policy invalidated proposal *Mar 1 00:28:02.803: ISAKMP (0:4): Checking IPSec proposal 2 *Mar 1 00:28:02.803: ISAKMP: transform 1, ESP_AES *Mar 1 00:28:02.803: ISAKMP: attributes in transform: *Mar 1 00:28:02.803: ISAKMP: authenticator is HMAC-SHA *Mar 1 00:28:02.803: ISAKMP: encaps is 61443 *Mar 1 00:28:02.803: ISAKMP: key length is 256 *Mar 1 00:28:02.803: ISAKMP: SA life type in seconds *Mar 1 00:28:02.803: ISAKMP: SA life duration (VPI) of 0x0 0x20 0xC4 0x9B *Mar 1 00:28:02.803: ISAKMP (0:4): atts are acceptable. *Mar 1 00:28:02.807: ISAKMP (0:4): Checking IPSec proposal 2 *Mar 1 00:28:02.807: ISAKMP (0:4): transform 1, IPPCP LZS *Mar 1 00:28:02.807: ISAKMP: attributes in transform: *Mar 1 00:28:02.807: ISAKMP: encaps is 61443 *Mar 1 00:28:02.807: ISAKMP: SA life type in seconds *Mar 1 00:28:02.807: ISAKMP: SA life duration (VPI) of 0x0 0x20 0xC4 0x9B *Mar 1 00:28:02.807: ISAKMP (0:4): atts are acceptable. *Mar 1 00:28:02.807: IPSEC(validate_proposal_request): proposal part #1, (key eng. msg.) INBOUND local= 172.16.142.191, remote= 171.69.89.82, local_proxy= 172.16.142.191/255.255.255.255/0/0 (type=1), remote_proxy= 192.168.1.3/255.255.255.255/0/0 (type=1), protocol= ESP, transform= esp-aes 256 esp-sha-hmac , lifedur= 0s and 0kb, spi= 0x0(0), conn_id= 0, keysize= 256, flags= 0x400 *Mar 1 00:28:02.811: IPSEC(validate_proposal_request): proposal part #2, (key eng. msg.) INBOUND local= 172.16.142.191, remote= 171.69.89.82, local_proxy= 172.16.142.191/255.255.255.255/0/0 (type=1), remote_proxy= 192.168.1.3/255.255.255.255/0/0 (type=1), protocol= PCP, transform= comp-lzs , lifedur= 0s and 0kb, spi= 0x0(0), conn_id= 0, keysize= 0, flags= 0x400 *Mar 1 00:28:02.815: IPSEC(kei_proxy): head = test, map->ivrf = , kei->ivrf = *Mar 1 00:28:02.815: IPSEC(validate_transform_proposal): no IPSEC cryptomap exists for local address 172.16.142.191 *Mar 1 00:28:02.815: ISAKMP (0:4): IPSec policy invalidated proposal *Mar 1 00:28:02.815: ISAKMP (0:4): Checking IPSec proposal 3 *Mar 1 00:28:02.815: ISAKMP: transform 1, ESP_AES *Mar 1 00:28:02.815: ISAKMP: attributes in transform: *Mar 1 00:28:02.815: ISAKMP: authenticator is HMAC-MD5 *Mar 1 00:28:02.815: ISAKMP: encaps is 61443 *Mar 1 00:28:02.815: ISAKMP: key length is 128 *Mar 1 00:28:02.819: ISAKMP: SA life type in seconds *Mar 1 00:28:02.819: ISAKMP: SA life duration (VPI) of 0x0 0x20 0xC4 0x9B *Mar 1 00:28:02.819: ISAKMP (0:4): atts are acceptable. *Mar 1 00:28:02.819: ISAKMP (0:4): Checking IPSec proposal 3 *Mar 1 00:28:02.819: ISAKMP (0:4): transform 1, IPPCP LZS *Mar 1 00:28:02.819: ISAKMP: attributes in transform: *Mar 1 00:28:02.819: ISAKMP: encaps is 61443 *Mar 1 00:28:02.819: ISAKMP: SA life type in seconds *Mar 1 00:28:02.823: ISAKMP: SA life duration (VPI) of 0x0 0x20 0xC4 0x9B *Mar 1 00:28:02.823: ISAKMP (0:4): atts are acceptable. *Mar 1 00:28:02.823: IPSEC(validate_proposal_request): proposal part #1, (key eng. msg.) INBOUND local= 172.16.142.191, remote= 171.69.89.82, local_proxy= 172.16.142.191/255.255.255.255/0/0 (type=1), remote_proxy= 192.168.1.3/255.255.255.255/0/0 (type=1), protocol= ESP, transform= esp-aes esp-md5-hmac , lifedur= 0s and 0kb, spi= 0x0(0), conn_id= 0, keysize= 128, flags= 0x400 *Mar 1 00:28:02.827: IPSEC(validate_proposal_request): proposal part #2, (key eng. msg.) INBOUND local= 172.16.142.191, remote= 171.69.89.82, local_proxy= 172.16.142.191/255.255.255.255/0/0 (type=1), remote_proxy= 192.168.1.3/255.255.255.255/0/0 (type=1), protocol= PCP, transform= comp-lzs , lifedur= 0s and 0kb, spi= 0x0(0), conn_id= 0, keysize= 0, flags= 0x400 *Mar 1 00:28:02.827: IPSEC(kei_proxy): head = test, map->ivrf = , kei->ivrf = *Mar 1 00:28:02.827: IPSEC(validate_transform_proposal): no IPSEC cryptomap exists for local address 172.16.142.191 *Mar 1 00:28:02.827: ISAKMP (0:4): IPSec policy invalidated proposal *Mar 1 00:28:02.831: ISAKMP (0:4): Checking IPSec proposal 4 *Mar 1 00:28:02.831: ISAKMP: transform 1, ESP_AES *Mar 1 00:28:02.831: ISAKMP: attributes in transform: *Mar 1 00:28:02.831: ISAKMP: authenticator is HMAC-SHA *Mar 1 00:28:02.831: ISAKMP: encaps is 61443 *Mar 1 00:28:02.831: ISAKMP: key length is 128 *Mar 1 00:28:02.831: ISAKMP: SA life type in seconds *Mar 1 00:28:02.831: ISAKMP: SA life duration (VPI) of 0x0 0x20 0xC4 0x9B *Mar 1 00:28:02.831: ISAKMP (0:4): atts are acceptable. *Mar 1 00:28:02.835: ISAKMP (0:4): Checking IPSec proposal 4 *Mar 1 00:28:02.835: ISAKMP (0:4): transform 1, IPPCP LZS *Mar 1 00:28:02.835: ISAKMP: attributes in transform: *Mar 1 00:28:02.835: ISAKMP: encaps is 61443 *Mar 1 00:28:02.835: ISAKMP: SA life type in seconds *Mar 1 00:28:02.835: ISAKMP: SA life duration (VPI) of 0x0 0x20 0xC4 0x9B *Mar 1 00:28:02.835: ISAKMP (0:4): atts are acceptable. *Mar 1 00:28:02.835: IPSEC(validate_proposal_request): proposal part #1, (key eng. msg.) INBOUND local= 172.16.142.191, remote= 171.69.89.82, local_proxy= 172.16.142.191/255.255.255.255/0/0 (type=1), remote_proxy= 192.168.1.3/255.255.255.255/0/0 (type=1), protocol= ESP, transform= esp-aes esp-sha-hmac , lifedur= 0s and 0kb, spi= 0x0(0), conn_id= 0, keysize= 128, flags= 0x400 *Mar 1 00:28:02.839: IPSEC(validate_proposal_request): proposal part #2, (key eng. msg.) INBOUND local= 172.16.142.191, remote= 171.69.89.82, local_proxy= 172.16.142.191/255.255.255.255/0/0 (type=1), remote_proxy= 192.168.1.3/255.255.255.255/0/0 (type=1), protocol= PCP, transform= comp-lzs , lifedur= 0s and 0kb, spi= 0x0(0), conn_id= 0, keysize= 0, flags= 0x400 *Mar 1 00:28:02.843: IPSEC(kei_proxy): head = test, map->ivrf = , kei->ivrf = *Mar 1 00:28:02.843: IPSEC(validate_transform_proposal): no IPSEC cryptomap exists for local address 172.16.142.191 *Mar 1 00:28:02.843: ISAKMP (0:4): IPSec policy invalidated proposal *Mar 1 00:28:02.843: ISAKMP (0:4): Checking IPSec proposal 5 *Mar 1 00:28:02.843: ISAKMP: transform 1, ESP_AES *Mar 1 00:28:02.843: ISAKMP: attributes in transform: *Mar 1 00:28:02.843: ISAKMP: authenticator is HMAC-MD5 *Mar 1 00:28:02.843: ISAKMP: encaps is 61443 *Mar 1 00:28:02.843: ISAKMP: key length is 256 *Mar 1 00:28:02.847: ISAKMP: SA life type in seconds *Mar 1 00:28:02.847: ISAKMP: SA life duration (VPI) of 0x0 0x20 0xC4 0x9B *Mar 1 00:28:02.847: ISAKMP (0:4): atts are acceptable. *Mar 1 00:28:02.847: IPSEC(validate_proposal_request): proposal part #1, (key eng. msg.) INBOUND local= 172.16.142.191, remote= 171.69.89.82, local_proxy= 172.16.142.191/255.255.255.255/0/0 (type=1), remote_proxy= 192.168.1.3/255.255.255.255/0/0 (type=1), protocol= ESP, transform= esp-aes 256 esp-md5-hmac , lifedur= 0s and 0kb, spi= 0x0(0), conn_id= 0, keysize= 256, flags= 0x400 *Mar 1 00:28:02.851: IPSEC(kei_proxy): head = test, map->ivrf = , kei->ivrf = *Mar 1 00:28:02.851: IPSEC(validate_transform_proposal): no IPSEC cryptomap exists for local address 172.16.142.191 *Mar 1 00:28:02.851: ISAKMP (0:4): IPSec policy invalidated proposal *Mar 1 00:28:02.851: ISAKMP (0:4): Checking IPSec proposal 6 *Mar 1 00:28:02.851: ISAKMP: transform 1, ESP_AES *Mar 1 00:28:02.851: ISAKMP: attributes in transform: *Mar 1 00:28:02.851: ISAKMP: authenticator is HMAC-SHA *Mar 1 00:28:02.855: ISAKMP: encaps is 61443 *Mar 1 00:28:02.855: ISAKMP: key length is 256 *Mar 1 00:28:02.855: ISAKMP: SA life type in seconds *Mar 1 00:28:02.855: ISAKMP: SA life duration (VPI) of 0x0 0x20 0xC4 0x9B *Mar 1 00:28:02.855: ISAKMP (0:4): atts are acceptable. *Mar 1 00:28:02.855: IPSEC(validate_proposal_request): proposal part #1, (key eng. msg.) INBOUND local= 172.16.142.191, remote= 171.69.89.82, local_proxy= 172.16.142.191/255.255.255.255/0/0 (type=1), remote_proxy= 192.168.1.3/255.255.255.255/0/0 (type=1), protocol= ESP, transform= esp-aes 256 esp-sha-hmac , lifedur= 0s and 0kb, spi= 0x0(0), conn_id= 0, keysize= 256, flags= 0x400 *Mar 1 00:28:02.859: IPSEC(kei_proxy): head = test, map->ivrf = , kei->ivrf = *Mar 1 00:28:02.859: IPSEC(validate_transform_proposal): no IPSEC cryptomap exists for local address 172.16.142.191 *Mar 1 00:28:02.859: ISAKMP (0:4): IPSec policy invalidated proposal *Mar 1 00:28:02.859: ISAKMP (0:4): Checking IPSec proposal 7 *Mar 1 00:28:02.859: ISAKMP: transform 1, ESP_AES *Mar 1 00:28:02.863: ISAKMP: attributes in transform: *Mar 1 00:28:02.863: ISAKMP: authenticator is HMAC-MD5 *Mar 1 00:28:02.863: ISAKMP: encaps is 61443 *Mar 1 00:28:02.863: ISAKMP: key length is 128 *Mar 1 00:28:02.863: ISAKMP: SA life type in seconds *Mar 1 00:28:02.863: ISAKMP: SA life duration (VPI) of 0x0 0x20 0xC4 0x9B *Mar 1 00:28:02.863: ISAKMP (0:4): atts are acceptable. *Mar 1 00:28:02.863: IPSEC(validate_proposal_request): proposal part #1, (key eng. msg.) INBOUND local= 172.16.142.191, remote= 171.69.89.82, local_proxy= 172.16.142.191/255.255.255.255/0/0 (type=1), remote_proxy= 192.168.1.3/255.255.255.255/0/0 (type=1), protocol= ESP, transform= esp-aes esp-md5-hmac , lifedur= 0s and 0kb, spi= 0x0(0), conn_id= 0, keysize= 128, flags= 0x400 *Mar 1 00:28:02.867: IPSEC(kei_proxy): head = test, map->ivrf = , kei->ivrf = *Mar 1 00:28:02.867: IPSEC(validate_transform_proposal): no IPSEC cryptomap exists for local address 172.16.142.191 *Mar 1 00:28:02.867: ISAKMP (0:4): IPSec policy invalidated proposal *Mar 1 00:28:02.867: ISAKMP (0:4): Checking IPSec proposal 8 *Mar 1 00:28:02.871: ISAKMP: transform 1, ESP_AES *Mar 1 00:28:02.871: ISAKMP: attributes in transform: *Mar 1 00:28:02.871: ISAKMP: authenticator is HMAC-SHA *Mar 1 00:28:02.871: ISAKMP: encaps is 61443 *Mar 1 00:28:02.871: ISAKMP: key length is 128 *Mar 1 00:28:02.871: ISAKMP: SA life type in seconds *Mar 1 00:28:02.871: ISAKMP: SA life duration (VPI) of 0x0 0x20 0xC4 0x9B *Mar 1 00:28:02.871: ISAKMP (0:4): atts are acceptable. *Mar 1 00:28:02.875: IPSEC(validate_proposal_request): proposal part #1, (key eng. msg.) INBOUND local= 172.16.142.191, remote= 171.69.89.82, local_proxy= 172.16.142.191/255.255.255.255/0/0 (type=1), remote_proxy= 192.168.1.3/255.255.255.255/0/0 (type=1), protocol= ESP, transform= esp-aes esp-sha-hmac , lifedur= 0s and 0kb, spi= 0x0(0), conn_id= 0, keysize= 128, flags= 0x400 *Mar 1 00:28:02.875: IPSEC(kei_proxy): head = test, map->ivrf = , kei->ivrf = *Mar 1 00:28:02.875: IPSEC(validate_transform_proposal): no IPSEC cryptomap exists for local address 172.16.142.191 *Mar 1 00:28:02.879: ISAKMP (0:4): IPSec policy invalidated proposal *Mar 1 00:28:02.879: ISAKMP (0:4): Checking IPSec proposal 9 *Mar 1 00:28:02.879: ISAKMP: transform 1, ESP_3DES *Mar 1 00:28:02.879: ISAKMP: attributes in transform: *Mar 1 00:28:02.879: ISAKMP: authenticator is HMAC-MD5 *Mar 1 00:28:02.879: ISAKMP: encaps is 61443 *Mar 1 00:28:02.879: ISAKMP: SA life type in seconds *Mar 1 00:28:02.879: ISAKMP: SA life duration (VPI) of 0x0 0x20 0xC4 0x9B *Mar 1 00:28:02.879: ISAKMP (0:4): atts are acceptable. *Mar 1 00:28:02.883: ISAKMP (0:4): Checking IPSec proposal 9 *Mar 1 00:28:02.883: ISAKMP (0:4): transform 1, IPPCP LZS *Mar 1 00:28:02.883: ISAKMP: attributes in transform: *Mar 1 00:28:02.883: ISAKMP: encaps is 61443 *Mar 1 00:28:02.883: ISAKMP: SA life type in seconds *Mar 1 00:28:02.883: ISAKMP: SA life duration (VPI) of 0x0 0x20 0xC4 0x9B *Mar 1 00:28:02.883: ISAKMP (0:4): atts are acceptable. *Mar 1 00:28:02.883: IPSEC(validate_proposal_request): proposal part #1, (key eng. msg.) INBOUND local= 172.16.142.191, remote= 171.69.89.82, local_proxy= 172.16.142.191/255.255.255.255/0/0 (type=1), remote_proxy= 192.168.1.3/255.255.255.255/0/0 (type=1), protocol= ESP, transform= esp-3des esp-md5-hmac , lifedur= 0s and 0kb, spi= 0x0(0), conn_id= 0, keysize= 0, flags= 0x400 *Mar 1 00:28:02.887: IPSEC(validate_proposal_request): proposal part #2, (key eng. msg.) INBOUND local= 172.16.142.191, remote= 171.69.89.82, local_proxy= 172.16.142.191/255.255.255.255/0/0 (type=1), remote_proxy= 192.168.1.3/255.255.255.255/0/0 (type=1), protocol= PCP, transform= comp-lzs , lifedur= 0s and 0kb, spi= 0x0(0), conn_id= 0, keysize= 0, flags= 0x400 *Mar 1 00:28:02.891: IPSEC(kei_proxy): head = test, map->ivrf = , kei->ivrf = *Mar 1 00:28:02.891: IPSEC(validate_transform_proposal): no IPSEC cryptomap exists for local address 172.16.142.191 *Mar 1 00:28:02.891: ISAKMP (0:4): IPSec policy invalidated proposal *Mar 1 00:28:02.891: ISAKMP (0:4): Checking IPSec proposal 10 *Mar 1 00:28:02.891: ISAKMP: transform 1, ESP_3DES *Mar 1 00:28:02.891: ISAKMP: attributes in transform: *Mar 1 00:28:02.891: ISAKMP: authenticator is HMAC-SHA *Mar 1 00:28:02.891: ISAKMP: encaps is 61443 *Mar 1 00:28:02.891: ISAKMP: SA life type in seconds *Mar 1 00:28:02.891: ISAKMP: SA life duration (VPI) of 0x0 0x20 0xC4 0x9B *Mar 1 00:28:02.895: ISAKMP (0:4): atts are acceptable. *Mar 1 00:28:02.895: ISAKMP (0:4): Checking IPSec proposal 10 *Mar 1 00:28:02.895: ISAKMP (0:4): transform 1, IPPCP LZS *Mar 1 00:28:02.895: ISAKMP: attributes in transform: *Mar 1 00:28:02.895: ISAKMP: encaps is 61443 *Mar 1 00:28:02.895: ISAKMP: SA life type in seconds *Mar 1 00:28:02.895: ISAKMP: SA life duration (VPI) of 0x0 0x20 0xC4 0x9B *Mar 1 00:28:02.899: ISAKMP (0:4): atts are acceptable. *Mar 1 00:28:02.899: IPSEC(validate_proposal_request): proposal part #1, (key eng. msg.) INBOUND local= 172.16.142.191, remote= 171.69.89.82, local_proxy= 172.16.142.191/255.255.255.255/0/0 (type=1), remote_proxy= 192.168.1.3/255.255.255.255/0/0 (type=1), protocol= ESP, transform= esp-3des esp-sha-hmac , lifedur= 0s and 0kb, spi= 0x0(0), conn_id= 0, keysize= 0, flags= 0x400 *Mar 1 00:28:02.899: IPSEC(validate_proposal_request): proposal part #2 *Mar 1 00:28:02.923: ISAKMP (0:4): asking for 1 spis from ipsec *Mar 1 00:28:02.923: ISAKMP (0:4): Node 1783469429, Input = IKE_MESG_FROM_PEER, IKE_QM_EXCH *Mar 1 00:28:02.923: ISAKMP (0:4): Old State = IKE_QM_READY New State = IKE_QM_SPI_STARVE *Mar 1 00:28:02.923: IPSEC(key_engine): got a queue event... *Mar 1 00:28:02.923: IPSEC(spi_response): getting spi 514603422 for SA from 172.16.142.191 to 171.69.89.82 for prot 3 *Mar 1 00:28:02.927: ISAKMP: received ke message (2/1) *Mar 1 00:28:03.175: ISAKMP (0:4): sending packet to 171.69.89.82 my_port 4500 peer_port 4500 (R) QM_IDLE *Mar 1 00:28:03.179: ISAKMP (0:4): Node 1783469429, Input = IKE_MESG_FROM_IPSEC, IKE_SPI_REPLY *Mar 1 00:28:03.179: ISAKMP (0:4): Old State = IKE_QM_SPI_STARVE New State = IKE_QM_R_QM2 *Mar 1 00:28:03.239: ISAKMP (0:4): received packet from 171.69.89.82 dport 4500 sport 4500 Global (R) QM_IDLE *Mar 1 00:28:03.247: ISAKMP: Locking peer struct 0x82C88D44, IPSEC refcount 1 for for stuff_ke *Mar 1 00:28:03.247: ISAKMP (0:4): Creating IPSec SAs *Mar 1 00:28:03.251: inbound SA from 171.69.89.82 to 172.16.142.191 (f/i) 0/ 0 (proxy 192.168.1.3 to 172.16.142.191) *Mar 1 00:28:03.251: has spi 0x1EAC399E and conn_id 2000 and flags 400 *Mar 1 00:28:03.263: IPSEC(create_sa): sa created, (sa) sa_dest= 171.69.89.82, sa_prot= 50, sa_spi= 0x1CD14C06(483478534), sa_trans= esp-3des esp-sha-hmac , sa_conn_id= 2001 *Mar 1 00:28:06.675: ISAKMP (0:4): received packet from 171.69.89.82 dport 4500 sport 4500 Global (R) QM_IDLE *Mar 1 00:28:06.679: ISAKMP: set new node -2064779316 to QM_IDLE *Mar 1 00:28:06.687: ISAKMP (0:4): processing HASH payload. message ID = -2064779316 *Mar 1 00:28:06.687: ISAKMP (0:4): processing SA payload. message ID = -2064779316 *Mar 1 00:28:06.687: ISAKMP (0:4): Checking IPSec proposal 1 *Mar 1 00:28:06.687: ISAKMP: transform 1, ESP_AES *Mar 1 00:28:06.687: ISAKMP: attributes in transform: *Mar 1 00:28:06.691: ISAKMP: authenticator is HMAC-MD5 *Mar 1 00:28:06.691: ISAKMP: encaps is 61443 *Mar 1 00:28:06.691: ISAKMP: key length is 256 *Mar 1 00:28:06.691: ISAKMP: SA life type in seconds *Mar 1 00:28:06.691: ISAKMP: SA life duration (VPI) of 0x0 0x20 0xC4 0x9B *Mar 1 00:28:06.691: ISAKMP (0:4): atts are acceptable. *Mar 1 00:28:06.691: ISAKMP (0:4): Checking IPSec proposal 1 *Mar 1 00:28:06.691: ISAKMP (0:4): transform 1, IPPCP LZS *Mar 1 00:28:06.691: ISAKMP: attributes in transform: *Mar 1 00:28:06.695: ISAKMP: encaps is 61443 *Mar 1 00:28:06.695: ISAKMP: SA life type in seconds *Mar 1 00:28:06.695: ISAKMP: SA life duration (VPI) of 0x0 0x20 0xC4 0x9B *Mar 1 00:28:06.695: ISAKMP (0:4): atts are acceptable. *Mar 1 00:28:06.835: IPSEC(spi_response): getting spi 3561761534 for SA from 172.16.142.191 to 171.69.89.82 for prot 3 *Mar 1 00:28:06.835: ISAKMP: received ke message (2/1) *Mar 1 00:28:07.127: ISAKMP (0:4): sending packet to 171.69.89.82 my_port 4500 peer_port 4500 (R) QM_IDLE *Mar 1 00:28:07.127: ISAKMP (0:4): Node -2064779316, Input = IKE_MESG_FROM_IPSEC, IKE_SPI_REPLY *Mar 1 00:28:07.127: ISAKMP (0:4): Old State = IKE_QM_SPI_STARVE New State = IKE_QM_R_QM2 *Mar 1 00:28:07.143: ISAKMP (0:4): received packet from 171.69.89.82 dport 4500 sport 4500 Global (R) QM_IDLE *Mar 1 00:28:07.151: ISAKMP: Locking peer struct 0x82C88D44, IPSEC refcount 2 for for stuff_ke *Mar 1 00:28:07.151: ISAKMP (0:4): Creating IPSec SAs *Mar 1 00:28:07.151: inbound SA from 171.69.89.82 to 172.16.142.191 (f/i) 0/ 0 (proxy 192.168.1.3 to 10.100.100.0) *Mar 1 00:28:07.151: has spi 0xD44C2AFE and conn_id 2002 and flags 400 *Mar 1 00:28:07.151: lifetime of 2147483 seconds *Mar 1 00:28:07.151: has client flags 0x10 *Mar 1 00:28:07.151: outbound SA from 172.16.142.191 to 171.69.89.82 (f/i) 0/ 0 (proxy 10.100.100.0 to 192.168.1.3 ), (sa) sa_dest= 171.69.89.82, sa_prot= 50, sa_spi= 0x9A12903F(2584907839), sa_trans= esp-3des esp-sha-hmac , sa_conn_id= 2003 *Mar 1 00:28:15.983: ISAKMP (0:3): purging node -457362469 *Mar 1 00:28:22.863: ISAKMP (0:4): received packet from 171.69.89.82 dport 4500 sport 4500 Global (R) QM_IDLE *Mar 1 00:28:22.863: ISAKMP: set new node 442126453 to QM_IDLE *Mar 1 00:28:22.867: ISAKMP (0:4): processing HASH payload. message ID = 442126453 *Mar 1 00:28:22.867: ISAKMP (0:4): processing NOTIFY unknown protocol 1 spi 0, message ID = 442126453, sa = 82443410 *Mar 1 00:28:22.867: ISAKMP (0:4): deleting node 442126453 error FALSE reason "informational (in) state 1" *Mar 1 00:28:22.867: ISAKMP (0:4): Input = IKE_MESG_FROM_PEER, IKE_INFO_NOTIFY *Mar 1 00:28:22.867: ISAKMP (0:4): Old State = IKE_P1_COMPLETE New State = IKE_P1_COMPLETE *Mar 1 00:28:28.643: ISAKMP (0:3): purging node -118562945 *Mar 1 00:28:28.651: ISAKMP (0:3): purging node 24622273 *Mar 1 00:28:28.659: ISAKMP (0:3): purging node -1276758667 *Mar 1 00:28:38.667: ISAKMP (0:3): purging SA., sa=8242A5AC, delme=8242A5AC *Mar 1 00:28:38.667: ISAKMP (0:3): purging node 452292968 *Mar 1 00:28:38.667: ISAKMP (0:3): purging node 1331016929 *Mar 1 00:28:38.667: ISAKMP (0:3): returning address 192.168.1.2 to pool *Mar 1 00:28:38.667: ISAKMP: Unlocking IKE struct 0x827CBB44 for declare_sa_dead(), count 0 *Mar 1 00:28:42.891: ISAKMP (0:4): received packet from 171.69.89.82 dport 4500 sport 4500 Global (R) QM_IDLE *Mar 1 00:28:42.891: ISAKMP: set new node 505402511 to QM_IDLE *Mar 1 00:28:42.895: ISAKMP (0:4): processing HASH payload. message ID = 505402511 *Mar 1 00:28:42.895: ISAKMP (0:4): processing NOTIFY unknown protocol 1 spi 0, message ID = 505402511, sa = 82443410 *Mar 1 00:28:42.895: ISAKMP (0:4): deleting node 505402511 error FALSE reason "informational (in) state 1" *Mar 1 00:28:42.895: ISAKMP (0:4): Input = IKE_MESG_FROM_PEER, IKE_INFO_NOTIFY *Mar 1 00:28:42.895: ISAKMP (0:4): Old State = IKE_P1_COMPLETE New State = IKE_P1_COMPLETE *Mar 1 00:28:52.707: ISAKMP (0:4): purging node 1973520613 *Mar 1 00:28:53.255: ISAKMP (0:4): purging node 1783469429 *Mar 1 00:28:57.155: ISAKMP (0:4): purging node -2064779316 *Mar 1 00:29:02.919: ISAKMP (0:4): received packet from 171.69.89.82 dport 4500 sport 4500 Global (R) QM_IDLE *Mar 1 00:29:02.919: ISAKMP: set new node -526976638 to QM_IDLE *Mar 1 00:29:02.923: ISAKMP (0:4): processing HASH payload. message ID = -526976638 *Mar 1 00:29:02.923: ISAKMP (0:4): processing NOTIFY unknown protocol 1 spi 0, message ID = -526976638, sa = 82443410 *Mar 1 00:29:02.923: ISAKMP (0:4): deleting node -526976638 error FALSE reason "informational (in) state 1" *Mar 1 00:29:02.923: ISAKMP (0:4): Input = IKE_MESG_FROM_PEER, IKE_INFO_NOTIFY *Mar 1 00:29:02.923: ISAKMP (0:4): Old State = IKE_P1_COMPLETE New State = IKE_P1_COMPLETE *Mar 1 00:29:12.867: ISAKMP (0:4): purging node 442126453 *Mar 1 00:29:22.951: ISAKMP (0:4): received packet from 171.69.89.82 dport 4500 sport 4500 Global (R) QM_IDLE *Mar 1 00:29:22.955: ISAKMP: set new node 1718060095 to QM_IDLE *Mar 1 00:29:22.955: ISAKMP (0:4): processing HASH payload. message ID = 1718060095 *Mar 1 00:29:22.955: ISAKMP (0:4): processing NOTIFY unknown protocol 1 spi 0, message ID = 1718060095, sa = 82443410 *Mar 1 00:29:22.955: ISAKMP (0:4): deleting node 1718060095 error FALSE reason "informational (in) state 1" *Mar 1 00:29:22.959: ISAKMP (0:4): Input = IKE_MESG_FROM_PEER, IKE_INFO_NOTIFY *Mar 1 00:29:22.959: ISAKMP (0:4): Old State = IKE_P1_COMPLETE New State = IKE_P1_COMPLETE