このドキュメントは、IPSec ネットワーク アドレス変換(NAT)透過性機能に関する Cisco IOS® サポートの設定例です。NAT と IPSec の間に数多く存在する既知の非互換性に対処することによって、ネットワーク内での NAT や Point Address Translation(PAT)を介した IPSec トラフィックの通過がサポートされるようになります。
このドキュメントに特有の要件はありません。
このドキュメントの情報は、次のソフトウェアとハードウェアのバージョンに基づいています。
Cisco 2621 ルータ 12.2.13.7T1 以降
Cisco VPN Client 3.6.3(設定の表示なし)
このドキュメントの情報は、特定のラボ環境にあるデバイスに基づいて作成されました。このドキュメントで使用するすべてのデバイスは、初期(デフォルト)設定の状態から起動しています。対象のネットワークが実稼働中である場合には、どのようなコマンドについても、その潜在的な影響について確実に理解しておく必要があります。
ドキュメント表記の詳細は、『シスコ テクニカル ティップスの表記法』を参照してください。
このセクションでは、このドキュメントで説明する機能を設定するために必要な情報を提供しています。
注: このドキュメントで使用されているコマンドの詳細を調べるには、Command Lookup Tool(登録ユーザ専用)を使用してください。
このドキュメントでは、次のネットワーク セットアップを使用します。
次のステップを実行します。
スイッチで稼働しているソフトウェア バージョンを表示するには、show version コマンドを発行します。
2621#show version Cisco Internetwork Operating System Software IOS (tm) C2600 Software (C2600-IK9O3S3-M), Version 12.2(13.7)T1, MAINTENANCE INTERIM SOFTWARE TAC Support: http://www.cisco.com/tac Copyright (c) 1986-2002 by cisco Systems, Inc. Compiled Sat 21-Dec-02 14:10 by ccai Image text-base: 0x80008098, data-base: 0x818B6330 ROM: System Bootstrap, Version 11.3(2)XA4, RELEASE SOFTWARE (fc1) ROM: C2600 Software (C2600-IK9O3S3-M), Version 12.2(13.7)T1, MAINTENANCE INTERIM SOFTWARE 2621 uptime is 33 minutes System returned to ROM by reload System image file is "flash:c2600-ik9o3s3-mz.122-13.7.T1" cisco 2621 (MPC860) processor (revision 0x102) with 60416K/5120K bytes of memory. Processor board ID JAB0407020V (2751454139) M860 processor: part number 0, mask 49 Bridging software. X.25 software, Version 3.0.0. Primary Rate ISDN software, Version 1.1. 2 FastEthernet/IEEE 802.3 interface(s) 2 Channelized T1/PRI port(s) 32K bytes of non-volatile configuration memory. 16384K bytes of processor board System flash (Read/Write) Configuration register is 0x2102
show run コマンドを発行します。
2621#show run Building configuration... Current configuration : 2899 bytes ! version 12.2 service timestamps debug datetime msec localtime service timestamps log datetime msec localtime no service password-encryption ! hostname 2621 ! boot system flash logging queue-limit 100 enable secret 5 $1$dGFC$VA28yOWzxlCKyj1dq8SkE/ ! username cisco password 0 cisco123 username client password 0 testclient aaa new-model ! ! aaa authentication login userauthen local aaa authorization network foo local aaa session-id common ip subnet-zero ip cef ! ! no ip domain lookup ip domain name cisco.com ! ! ! ! crypto isakmp policy 20 encr 3des hash md5 authentication pre-share group 2 crypto isakmp keepalive 40 5 !--- Allows an IPsec node to send NAT keepalive !--- packets every 20 seconds. crypto isakmp nat keepalive 20 ! crypto isakmp client configuration group cisco key test1234 pool test acl 120 ! ! !--- Transform set "test" which uses Triple DES !--- encryptions and MD5 (HMAC variant) !--- for data packet authentication: crypto ipsec transform-set test esp-3des esp-md5-hmac crypto ipsec transform-set foo esp-3des esp-sha-hmac ! crypto ipsec profile greprotect ! ! !--- Dynamic crypto map. crypto dynamic-map dynmap 1 set transform-set foo match address 199 ! ! crypto map test client authentication list userauthen crypto map test isakmp authorization list foo crypto map test client configuration address respond !--- Adds a dynamic crypto map set to a static crypto map set. crypto map test 20 ipsec-isakmp dynamic dynmap ! ! ! voice call carrier capacity active ! ! ! ! ! ! ! no voice hpi capture buffer no voice hpi capture destination ! ! mta receive maximum-recipients 0 ! ! controller T1 0/0 framing sf linecode ami ! controller T1 0/1 framing sf linecode ami ! ! ! interface Loopback0 ip address 10.100.100.1 255.255.255.0 ip nat inside ! interface FastEthernet0/0 ip address 172.16.142.191 255.255.255.0 ip nat outside no ip route-cache no ip mroute-cache duplex auto speed auto !--- Applies a crypto map set to an interface. crypto map test ! interface FastEthernet0/1 ip address 10.130.13.13 255.255.0.0 duplex auto speed auto ! ip local pool test 192.168.1.1 192.168.1.250 ip nat inside source route-map nonat interface FastEthernet0/0 overload no ip http server no ip http secure-server ip classless ip route 0.0.0.0 0.0.0.0 172.16.142.1 ! ip pim bidir-enable ! ! access-list 101 permit ip any any access-list 101 permit esp any any access-list 101 permit udp any any eq isakmp access-list 101 permit ip 192.168.0.0 0.0.255.255 10.100.100.0 0.0.0.255 access-list 111 permit ip 10.100.100.0 0.0.0.255 10.10.10.0 0.0.0.255 access-list 112 deny ip 10.100.100.0 0.0.0.255 10.10.10.0 0.0.0.255 access-list 112 deny ip 10.100.100.0 0.0.0.255 192.168.1.0 0.0.0.255 access-list 112 permit ip 10.100.100.0 0.0.0.255 any access-list 120 permit ip 10.100.100.0 0.0.0.255 192.168.1.0 0.0.0.255 !--- IPsec access list defines which traffic to protect. access-list 199 permit ip 10.100.100.0 0.0.0.255 192.168.1.0 0.0.0.255 access-list 199 permit ip host 172.16.142.191 192.168.1.0 0.0.0.255 ! route-map nonat permit 10 match ip address 112 ! radius-server authorization permit missing Service-Type call rsvp-sync ! ! mgcp profile default ! dial-peer cor custom ! ! ! ! ! line con 0 exec-timeout 0 0 line aux 0 line vty 0 4 password cisco ! ! end 2621#
ここでは、設定が正常に機能しているかどうかを確認します。
アウトプット インタープリタ ツール(登録ユーザ専用)(OIT)は、特定の show コマンドをサポートします。OIT を使用して、show コマンドの出力の分析を表示します。
show crypto isakmp sa:ピアにおける現在の Internet Key Exchange(IKE; インターネット鍵交換)Security Association(SA; セキュリティ アソシエーション)をすべて表示します。
2621#show crypto isakmp sa f_vrf/i_vrf dst src state conn-id slot / 172.16.142.191 171.69.89.82 QM_IDLE 4 0
show crypto ipsec sa:現在の SA で使用されている設定を表示します。
2621#show crypto ipsec sa interface: FastEthernet0/0 Crypto map tag: test, local addr. 172.16.142.191 protected vrf: local ident (addr/mask/prot/port): (10.100.100.0/255.255.255.0/0/0) !--- Subnet behind local VPN router. remote ident (addr/mask/prot/port): (192.168.1.3/255.255.255.255/0/0) !--- Subnet behind remote VPN router. current_peer: 171.69.89.82:4500 PERMIT, flags={} #pkts encaps: 11, #pkts encrypt: 11, #pkts digest 11 #pkts decaps: 11, #pkts decrypt: 11, #pkts verify 11 #pkts compressed: 0, #pkts decompressed: 0 #pkts not compressed: 0, #pkts compr. failed: 0 #pkts not decompressed: 0, #pkts decompress failed: 0 #send errors 0, #recv errors 0 local crypto endpt.: 172.16.142.191, remote crypto endpt.: 171.69.89.82 !--- IP address of Encapsulating Security Payload (ESP) endpoints. path mtu 1500, media mtu 1500 current outbound spi: 9A12903F inbound esp sas: spi: 0xD44C2AFE(3561761534) !--- SPI inbound (ESP tunnel). transform: esp-3des esp-sha-hmac , in use settings ={Tunnel UDP-Encaps, } slot: 0, conn id: 2002, flow_id: 3, crypto map: test sa timing: remaining key lifetime (k/sec): (4513510/3476) IV size: 8 bytes replay detection support: Y inbound ah sas: inbound pcp sas: outbound esp sas: spi: 0x9A12903F(2584907839) !--- Security parameter index (SPI) outbound (ESP tunnel). transform: esp-3des esp-sha-hmac , in use settings ={Tunnel UDP-Encaps, } slot: 0, conn id: 2003, flow_id: 4, crypto map: test sa timing: remaining key lifetime (k/sec): (4513511/3476) IV size: 8 bytes replay detection support: Y outbound ah sas: outbound pcp sas: protected vrf: local ident (addr/mask/prot/port): (172.16.142.191/255.255.255.255/0/0) !--- Next tunnel. remote ident (addr/mask/prot/port): (192.168.1.3/255.255.255.255/0/0) current_peer: 171.69.89.82:4500 PERMIT, flags={} #pkts encaps: 0, #pkts encrypt: 0, #pkts digest 0 #pkts decaps: 0, #pkts decrypt: 0, #pkts verify 0 #pkts compressed: 0, #pkts decompressed: 0 #pkts not compressed: 0, #pkts compr. failed: 0 #pkts not decompressed: 0, #pkts decompress failed: 0 #send errors 0, #recv errors 0 local crypto endpt.: 172.16.142.191, remote crypto endpt.: 171.69.89.82 path mtu 1500, media mtu 1500 current outbound spi: 1CD14C06 inbound esp sas: spi: 0x1EAC399E(514603422) transform: esp-3des esp-sha-hmac , in use settings ={Tunnel UDP-Encaps, } slot: 0, conn id: 2000, flow_id: 1, crypto map: test sa timing: remaining key lifetime (k/sec): (4434590/3471) IV size: 8 bytes replay detection support: Y inbound ah sas: inbound pcp sas: outbound esp sas: spi: 0x1CD14C06(483478534) transform: esp-3des esp-sha-hmac , in use settings ={Tunnel UDP-Encaps, } slot: 0, conn id: 2001, flow_id: 2, crypto map: test sa timing: remaining key lifetime (k/sec): (4434590/3469) IV size: 8 bytes replay detection support: Y outbound ah sas: outbound pcp sas:
show crypyo engine connection active:暗号化エンジンの統計情報を表示します。パケットカウントを表示します。
2621#show crypyo engine connection active ID Interface IP-Address State Algorithm Encrypt Decrypt 4 FastEthernet0/0 172.16.142.191 set HMAC_MD5+3DES_56_C 0 0 2000 FastEthernet0/0 172.16.142.191 set HMAC_SHA+3DES_56_C 0 0 2001 FastEthernet0/0 172.16.142.191 set HMAC_SHA+3DES_56_C 0 0 2002 FastEthernet0/0 172.16.142.191 set HMAC_SHA+3DES_56_C 0 11 2003 FastEthernet0/0 172.16.142.191 set HMAC_SHA+3DES_56_C 11 0
show crypto engine [brief | configuration]:暗号化エンジンの設定情報の概要を表示します。このコマンドは、特権 EXEC モードで使用します。このコマンドによって、すべての暗号化エンジンが表示され、AIM-VPN 製品名も表示されます。
2621#show crypto engine configuration crypto engine name: unknown !--- Name of the crypto engine as assigned with the !--- key-name argument in the crypto key generate dss command. crypto engine type: software !--- If "software" is listed, the crypto engine resides in either !--- the Route Switch Processor (RSP) (the Cisco IOS crypto engine) or !--- in a second-generation Versatile Interface Processor (VIP2). serial number: A3FFDBBB crypto engine state: installed !--- The state "installed" indicates that a crypto engine is located !--- in the given slot, but is not configured for encryption. crypto engine in slot: N/A platform: Cisco Software Crypto Engine Encryption Process Info: input queue size: 500 input queue top: 34 input queue bot: 34 input queue count: 0 Crypto Adjacency Counts: Lock Count: 0 Unlock Count: 0 crypto lib version: 14.0.0 ipsec lib version: 2.0.0
show crypto isakmp sa detail nat:ISAKMP SA NAT の詳細を表示します。
2621#show crypto isakmp sa detail nat Codes: C - IKE configuration mode, D - Dead Peer Detection K - Keepalives, N - NAT-traversal X - IKE Extended Authentication psk - Preshared key, rsig - RSA signature renc - RSA encryption f_vrf/i_vrf Conn id Local Remote Encr Hash Auth DH Lifetime Capabilities / 4 172.16.142.191 171.69.89.82 3des md5 2 23:56:43 CDXN NAT keepalive(sec) 20 In local 172.16.142.191:4500 remote cisco:4500
f_vrf/i_vrf:IKE SA の Front Door Virtual Routing and Forwarding(F_VRF)および Inside VRF(I_VRF)です。FVRF がグローバルの場合、出力には f_vrf が空のフィールドとして表示されます。
このセクションは、設定のトラブルシューティングを行う際に参照してください。
アウトプット インタープリタ ツール(登録ユーザ専用)(OIT)は、特定の show コマンドをサポートします。OIT を使用して、show コマンドの出力の分析を表示します。
その他のトラブルシューティング情報については、『IP Security のトラブルシューティング - debug コマンドの理解と使用』を参照してください。
注:debug コマンドを使用する前に、『debug コマンドの重要な情報』を参照してください。
この設定では、設定されたとおりに NAT キープアライブを 20 秒ごとに受信します。
debug crypto ipsec:フェーズ 2 の IPsec ネゴシエーションを表示します。
debug crypto isakmp:フェーズ 1 の ISAKMP ネゴシエーションを表示します。
debug crypto engine - 暗号化されたトラフィックを表示します。
2621# 2621# *Mar 1 00:32:03.171: ISAKMP (0:4): received packet from 171.69.89.82 dport 4500 sport 4500 Global (R) QM_IDLE *Mar 1 00:32:03.171: ISAKMP: set new node 1489874950 to QM_IDLE *Mar 1 00:32:03.175: ISAKMP (0:4): processing HASH payload. message ID = 1489874950 *Mar 1 00:32:03.175: ISAKMP (0:4): processing NOTIFY unknown protocol 1 spi 0, message ID = 1489874950, sa = 82443410 *Mar 1 00:32:03.175: ISAKMP (0:4): deleting node 1489874950 error FALSE reason "informational (in) state 1" *Mar 1 00:32:03.175: ISAKMP (0:4): Input = IKE_MESG_FROM_PEER, IKE_INFO_NOTIFY *Mar 1 00:32:03.175: ISAKMP (0:4): Old State = IKE_P1_COMPLETE New State = IKE_P1_COMPLETE *Mar 1 00:32:13.115: ISAKMP (0:4): purging node 428915319 *Mar 1 00:32:23.199: ISAKMP (0:4): received packet from 171.69.89.82 dport 4500 sport 4500 Global (R) QM_IDLE *Mar 1 00:32:23.199: ISAKMP: set new node -1483946735 to QM_IDLE *Mar 1 00:32:23.203: ISAKMP (0:4): processing HASH payload. message ID = -1483946735 *Mar 1 00:32:23.203: ISAKMP (0:4): processing NOTIFY unknown protocol 1 spi 0, message ID = -1483946735, sa = 82443410 *Mar 1 00:32:23.203: ISAKMP (0:4): deleting node -1483946735 error FALSE reason "informational (in) state 1" *Mar 1 00:32:23.203: ISAKMP (0:4): Input = IKE_MESG_FROM_PEER, IKE_INFO_NOTIFY *Mar 1 00:32:23.203: ISAKMP (0:4): Old State = IKE_P1_COMPLETE New State = IKE_P1_COMPLETE *Mar 1 00:32:33.147: ISAKMP (0:4): purging node -1677054470
debug ip packet [detail]:一般的な IP に関するデバッグ情報と、IP security option(IPSO; IP セキュリティ オプション)のセキュリティ トランザクションを表示します。
debug ip icmp:Internet Control Message Protocol(ICMP; インターネット制御メッセージ プロトコル)トランザクションに関する情報を表示します。
Generic IP: ICMP packet debugging is on IP packet debugging is on (detailed) *Mar 1 00:38:43.735: IP: s=171.69.89.82 (FastEthernet0/0), d=172.16.142.191 (FastEthernet0/0), len 108, rcvd 3 *Mar 1 00:38:43.735: UDP src=4500, dst=4500 *Mar 1 00:38:48.863: IP: s=192.168.1.3 (FastEthernet0/0), d=10.100.100.1, len 60, rcvd 4 *Mar 1 00:38:48.863: ICMP type=8, code=0 *Mar 1 00:38:48.863: ICMP: echo reply sent, src 10.100.100.1, dst 192.168.1.3 *Mar 1 00:38:48.867: IP: s=10.100.100.1 (local), d=192.168.1.3 (FastEthernet0/0), len 60, sending *Mar 1 00:38:48.867: ICMP type=0, code=0 *Mar 1 00:38:49.863: IP: s=192.168.1.3 (FastEthernet0/0), d=10.100.100.1, len 60, rcvd 4 *Mar 1 00:38:49.863: ICMP type=8, code=0 *Mar 1 00:38:49.863: ICMP: echo reply sent, src 10.100.100.1, dst 192.168.1.3 *Mar 1 00:38:49.863: IP: s=10.100.100.1 (local), d=192.168.1.3 (FastEthernet0/0), len 60, sending *Mar 1 00:38:49.867: ICMP type=0, code=0 *Mar 1 00:38:50.863: IP: s=192.168.1.3 (FastEthernet0/0), d=10.100.100.1, len 60, rcvd 4 *Mar 1 00:38:50.867: ICMP type=8, code=0 *Mar 1 00:38:50.867: ICMP: echo reply sent, src 10.100.100.1, dst 192.168.1.3 *Mar 1 00:38:50.867: IP: s=10.100.100.1 (local), d=192.168.1.3 (FastEthernet0/0), len 60, sending *Mar 1 00:38:50.867: ICMP type=0, code=0 *Mar 1 00:38:51.867: IP: s=192.168.1.3 (FastEthernet0/0), d=10.100.100.1, len 60, rcvd 4 *Mar 1 00:38:51.867: ICMP type=8, code=0 *Mar 1 00:38:51.867: ICMP: echo reply sent, src 10.100.100.1, dst 192.168.1.3
debug crypto ipsec:フェーズ 2 の IPsec ネゴシエーションを表示します。
debug crypto isakmp:フェーズ 1 の ISAKMP ネゴシエーションを表示します。
debug crypto engine - 暗号化されたトラフィックを表示します。
2621# 2621# 2621# 2621# *Mar 1 00:27:54.735: ISAKMP (0:0): received packet from 171.69.89.82 dport 500 sport 500 Global (N) NEW SA *Mar 1 00:27:54.739: ISAKMP: Created a peer struct for 171.69.89.82, peer port 500 *Mar 1 00:27:54.739: ISAKMP: Locking peer struct 0x82C88D44, IKE refcount 1 for crypto_ikmp_config_initialize_sa *Mar 1 00:27:54.739: ISAKMP (0:0): Setting client config settings 82A819DC *Mar 1 00:27:54.739: ISAKMP (0:0): (Re)Setting client xauth list and state *Mar 1 00:27:54.739: ISAKMP: local port 500, remote port 500 *Mar 1 00:27:54.743: ISAKMP: Find a dup sa in the avl tree during calling isadb_insert sa = 82443410 *Mar 1 00:27:54.743: ISAKMP (0:4): processing SA payload. message ID = 0 *Mar 1 00:27:54.743: ISAKMP (0:4): processing ID payload. message ID = 0 *Mar 1 00:27:54.743: ISAKMP (0:4): peer matches *none* of the profiles *Mar 1 00:27:54.743: ISAKMP (0:4): processing vendor id payload *Mar 1 00:27:54.743: ISAKMP (0:4): vendor ID seems Unity/DPD but major 215 mismatch *Mar 1 00:27:54.747: ISAKMP (0:4): vendor ID is XAUTH *Mar 1 00:27:54.747: ISAKMP (0:4): processing vendor id payload *Mar 1 00:27:54.747: ISAKMP (0:4): vendor ID is DPD *Mar 1 00:27:54.747: ISAKMP (0:4): processing vendor id payload *Mar 1 00:27:54.747: ISAKMP (0:4): vendor ID seems Unity/DPD but major 123 mismatch *Mar 1 00:27:54.747: ISAKMP (0:4): vendor ID is NAT-T v2 *Mar 1 00:27:54.747: ISAKMP (0:4): processing vendor id payload *Mar 1 00:27:54.747: ISAKMP (0:4): vendor ID seems Unity/DPD but major 194 mismatch *Mar 1 00:27:54.751: ISAKMP (0:4): processing vendor id payload *Mar 1 00:27:54.751: ISAKMP (0:4): vendor ID is Unity *Mar 1 00:27:54.751: ISAKMP (0:4) Authentication by xauth preshared *Mar 1 00:27:54.751: ISAKMP (0:4): Checking ISAKMP transform 1 against priority 20 policy *Mar 1 00:27:54.751: ISAKMP: encryption AES-CBC *Mar 1 00:27:54.751: ISAKMP: hash SHA *Mar 1 00:27:54.751: ISAKMP: default group 2 *Mar 1 00:27:54.751: ISAKMP: auth XAUTHInitPreShared *Mar 1 00:27:54.751: ISAKMP: life type in seconds *Mar 1 00:27:54.751: ISAKMP: life duration (VPI) of 0x0 0x20 0xC4 0x9B *Mar 1 00:27:54.755: ISAKMP: keylength of 256 *Mar 1 00:27:54.755: ISAKMP (0:4): Encryption algorithm offered does not match policy! *Mar 1 00:27:54.755: ISAKMP (0:4): atts are not acceptable. Next payload is 3 *Mar 1 00:27:54.755: ISAKMP (0:4): Checking ISAKMP transform 2 against priority 20 policy *Mar 1 00:27:54.755: ISAKMP: encryption AES-CBC *Mar 1 00:27:54.755: ISAKMP: hash MD5 *Mar 1 00:27:54.755: ISAKMP: default group 2 *Mar 1 00:27:54.755: ISAKMP: auth XAUTHInitPreShared *Mar 1 00:27:54.755: ISAKMP: life type in seconds *Mar 1 00:27:54.755: ISAKMP: life duration (VPI) of 0x0 0x20 0xC4 0x9B *Mar 1 00:27:54.759: ISAKMP: keylength of 256 *Mar 1 00:27:54.759: ISAKMP (0:4): Encryption algorithm offered does not match policy! *Mar 1 00:27:54.759: ISAKMP (0:4): atts are not acceptable. Next payload is 3 *Mar 1 00:27:54.759: ISAKMP (0:4): Checking ISAKMP transform 3 against priority 20 policy *Mar 1 00:27:54.759: ISAKMP: encryption AES-CBC *Mar 1 00:27:54.759: ISAKMP: hash SHA *Mar 1 00:27:54.759: ISAKMP: default group 2 *Mar 1 00:27:54.759: ISAKMP: auth pre-share *Mar 1 00:27:54.759: ISAKMP: life type in seconds *Mar 1 00:27:54.759: ISAKMP: life duration (VPI) of 0x0 0x20 0xC4 0x9B *Mar 1 00:27:54.759: ISAKMP: keylength of 256 *Mar 1 00:27:54.763: ISAKMP (0:4): Encryption algorithm offered does not match policy! *Mar 1 00:27:54.763: ISAKMP (0:4): atts are not acceptable. Next payload is 3 *Mar 1 00:27:54.763: ISAKMP (0:4): Checking ISAKMP transform 4 against priority 20 policy *Mar 1 00:27:54.763: ISAKMP: encryption AES-CBC *Mar 1 00:27:54.763: ISAKMP: hash MD5 *Mar 1 00:27:54.763: ISAKMP: default group 2 *Mar 1 00:27:54.763: ISAKMP: auth pre-share *Mar 1 00:27:54.763: ISAKMP: life type in seconds *Mar 1 00:27:54.763: ISAKMP: life duration (VPI) of 0x0 0x20 0xC4 0x9B *Mar 1 00:27:54.763: ISAKMP: keylength of 256 *Mar 1 00:27:54.763: ISAKMP (0:4): Encryption algorithm offered does not match policy! *Mar 1 00:27:54.767: ISAKMP (0:4): atts are not acceptable. Next payload is 3 *Mar 1 00:27:54.767: ISAKMP (0:4): Checking ISAKMP transform 5 against priority 20 policy *Mar 1 00:27:54.767: ISAKMP: encryption AES-CBC *Mar 1 00:27:54.767: ISAKMP: hash SHA *Mar 1 00:27:54.767: ISAKMP: default group 2 *Mar 1 00:27:54.767: ISAKMP: auth XAUTHInitPreShared *Mar 1 00:27:54.767: ISAKMP: life type in seconds *Mar 1 00:27:54.767: ISAKMP: life duration (VPI) of 0x0 0x20 0xC4 0x9B *Mar 1 00:27:54.767: ISAKMP: keylength of 192 *Mar 1 00:27:54.767: ISAKMP (0:4): Encryption algorithm offered does not match policy! *Mar 1 00:27:54.771: ISAKMP (0:4): atts are not acceptable. Next payload is 3 *Mar 1 00:27:54.771: ISAKMP (0:4): Checking ISAKMP transform 6 against priority 20 policy *Mar 1 00:27:54.771: ISAKMP: encryption AES-CBC *Mar 1 00:27:54.771: ISAKMP: hash MD5 *Mar 1 00:27:54.771: ISAKMP: default group 2 *Mar 1 00:27:54.771: ISAKMP: auth XAUTHInitPreShared *Mar 1 00:27:54.771: ISAKMP: life type in seconds *Mar 1 00:27:54.771: ISAKMP: life duration (VPI) of 0x0 0x20 0xC4 0x9B *Mar 1 00:27:54.771: ISAKMP: keylength of 192 *Mar 1 00:27:54.771: ISAKMP (0:4): Encryption algorithm offered does not match policy! *Mar 1 00:27:54.771: ISAKMP (0:4): atts are not acceptable. Next payload is 3 *Mar 1 00:27:54.775: ISAKMP (0:4): Checking ISAKMP transform 7 against priority 20 policy *Mar 1 00:27:54.775: ISAKMP: encryption AES-CBC *Mar 1 00:27:54.775: ISAKMP: hash SHA *Mar 1 00:27:54.775: ISAKMP: default group 2 *Mar 1 00:27:54.775: ISAKMP: auth pre-share *Mar 1 00:27:54.775: ISAKMP: life type in seconds *Mar 1 00:27:54.775: ISAKMP: life duration (VPI) of 0x0 0x20 0xC4 0x9B *Mar 1 00:27:54.775: ISAKMP: keylength of 192 *Mar 1 00:27:54.775: ISAKMP (0:4): Encryption algorithm 1 00:27:54.783: ISAKMP: hash SHAoffered does not match policy! *Mar 1 00:27:54.775: ISAKMP (0:4): atts are not acceptable. Next payload is 3 *Mar 1 00:27:54.775: ISAKMP (0:4): Checking ISAKMP transform 8 against priority 20 policy *Mar 1 00:27:54.779: ISAKMP: encryption AES-CBC *Mar 1 00:27:54.779: ISAKMP: hash MD5 *Mar 1 00:27:54.779: ISAKMP: default group 2 *Mar 1 00:27:54.779: ISAKMP: auth pre-share *Mar 1 00:27:54.779: ISAKMP: life type in seconds *Mar 1 00:27:54.779: ISAKMP: life duration (VPI) of 0x0 0x20 0xC4 0x9B *Mar 1 00:27:54.779: ISAKMP: keylength of 192 *Mar 1 00:27:54.779: ISAKMP (0:4): Encryption algorithm offered does not match policy! *Mar 1 00:27:54.779: ISAKMP (0:4): atts are not acceptable. Next payload is 3 *Mar 1 00:27:54.779: ISAKMP (0:4): Checking ISAKMP transform 9 against priority 20 policy *Mar 1 00:27:54.783: ISAKMP: encryption AES-CBC *Mar *Mar 1 00:27:54.783: ISAKMP: default group 2 *Mar 1 00:27:54.783: ISAKMP: auth XAUTHInitPreShared *Mar 1 00:27:54.783: ISAKMP: life type in seconds *Mar 1 00:27:54.783: ISAKMP: life duration (VPI) of 0x0 0x20 0xC4 0x9B *Mar 1 00:27:54.783: ISAKMP: keylength of 128 *Mar 1 00:27:54.783: ISAKMP (0:4): Encryption algorithm offered does not match policy! *Mar 1 00:27:54.783: ISAKMP (0:4): atts are not acceptable. Next payload is 3 *Mar 1 00:27:54.783: ISAKMP (0:4): Checking ISAKMP transform 10 against priority 20 policy *Mar 1 00:27:54.783: ISAKMP: encryption AES-CBC *Mar 1 00:27:54.787: ISAKMP: hash MD5 *Mar 1 00:27:54.787: ISAKMP: default group 2 *Mar 1 00:27:54.787: ISAKMP: auth XAUTHInitPreShared *Mar 1 00:27:54.787: ISAKMP: life type in seconds *Mar 1 00:27:54.787: ISAKMP: life duration (VPI) of 0x0 0x20 0xC4 0x9B *Mar 1 00:27:54.787: ISAKMP: keylength of 128 *Mar 1 00:27:54.787: ISAKMP (0:4): Encryption algorithm offered does not match policy! *Mar 1 00:27:54.787: ISAKMP (0:4): atts are not acceptable. Next payload is 3 *Mar 1 00:27:54.787: ISAKMP (0:4): Checking ISAKMP transform 11 against priority 20 policy *Mar 1 00:27:54.787: ISAKMP: encryption AES-CBC *Mar 1 00:27:54.787: ISAKMP: hash SHA *Mar 1 00:27:54.791: ISAKMP: default group 2 *Mar 1 00:27:54.791: ISAKMP: auth pre-share *Mar 1 00:27:54.791: ISAKMP: life type in seconds *Mar 1 00:27:54.791: ISAKMP: life duration (VPI) of 0x0 0x20 0xC4 0x9B *Mar 1 00:27:54.791: ISAKMP: keylength of 128 *Mar 1 00:27:54.791: ISAKMP (0:4): Encryption algorithm offered does not match policy! *Mar 1 00:27:54.791: ISAKMP (0:4): atts are not acceptable. Next payload is 3 *Mar 1 00:27:54.791: ISAKMP (0:4): Checking ISAKMP transform 12 against priority 20 policy *Mar 1 00:27:54.791: ISAKMP: encryption AES-CBC *Mar 1 00:27:54.791: ISAKMP: hash MD5 *Mar 1 00:27:54.791: ISAKMP: default group 2 *Mar 1 00:27:54.795: ISAKMP: auth pre-share *Mar 1 00:27:54.795: ISAKMP: life type in seconds *Mar 1 00:27:54.795: ISAKMP: life duration (VPI) of 0x0 0x20 0xC4 0x9B *Mar 1 00:27:54.795: ISAKMP: keylength of 128 *Mar 1 00:27:54.795: ISAKMP (0:4): Encryption algorithm offered does not match policy! *Mar 1 00:27:54.795: ISAKMP (0:4): atts are not acceptable. Next payload 7:54.795: ISAKMP: hash SHAis 3 *Mar 1 00:27:54.795: ISAKMP (0:4): Checking ISAKMP transform 13 against priority 20 policy *Mar 1 00:27:54.795: ISAKMP: encryption 3DES-CBC *Mar 1 00:2 *Mar 1 00:27:54.795: ISAKMP: default group 2 *Mar 1 00:27:54.795: ISAKMP: auth XAUTHInitPreShared *Mar 1 00:27:54.799: ISAKMP: life type in seconds *Mar 1 00:27:54.799: ISAKMP: life duration (VPI) of 0x0 0x20 0xC4 0x9B *Mar 1 00:27:54.799: ISAKMP (0:4): Hash algorithm offered does not match policy! *Mar 1 00:27:54.799: ISAKMP (0:4): atts are not acceptable. Next payload is 3 *Mar 1 00:27:54.799: ISAKMP (0:4): Checking ISAKMP transform 14 against priority 20 policy *Mar 1 00:27:54.799: ISAKMP: encryption 3DES-CBC *Mar 1 00:27:54.799: ISAKMP: hash MD5 *Mar 1 00:27:54.799: ISAKMP: default group 2 *Mar 1 00:27:54.799: ISAKMP: auth XAUTHInitPreShared *Mar 1 00:27:54.799: ISAKMP: life type in seconds *Mar 1 00:27:54.803: ISAKMP: life duration (VPI) of 0x0 0x20 0xC4 0x9B *Mar 1 00:27:54.803: ISAKMP (0:4): atts are acceptable. Next payload is 3 *Mar 1 00:27:55.015: ISAKMP (0:4): processing KE payload. message ID = 0 *Mar 1 00:27:55.287: ISAKMP (0:4): processing NONCE payload. message ID = 0 *Mar 1 00:27:55.287: ISAKMP (0:4): vendor ID is NAT-T v2 *Mar 1 00:27:55.287: ISAKMP (0:4): Input = IKE_MESG_FROM_PEER, IKE_AM_EXCH *Mar 1 00:27:55.291: ISAKMP (0:4): Old State = IKE_READY New State = IKE_R_AM_AAA_AWAIT *Mar 1 00:27:55.291: ISAKMP: got callback 1 *Mar 1 00:27:55.295: ISAKMP (0:4): SKEYID state generated *Mar 1 00:27:55.299: ISAKMP (0:4): constructed NAT-T vendor-02 ID *Mar 1 00:27:55.299: ISAKMP (0:4): SA is doing pre-shared key authentication plus XAUTH using id type ID_IPV4_ADDR *Mar 1 00:27:55.299: ISAKMP (4): ID payload next-payload : 10 type : 1 addr : 172.16.142.191 protocol : 17 port : 0 length : 8 *Mar 1 00:27:55.299: ISAKMP (4): Total payload length: 12 *Mar 1 00:27:55.303: ISAKMP (0:4): constructed HIS NAT-D *Mar 1 00:27:55.303: ISAKMP (0:4): constructed MINE NAT-D *Mar 1 00:27:55.303: ISAKMP (0:4): sending packet to 171.69.89.82 my_port 500 peer_port 500 (R) AG_INIT_EXCH *Mar 1 00:27:55.303: ISAKMP (0:4): Input = IKE_MESG_FROM_AAA, PRESHARED_KEY_REPLY *Mar 1 00:27:55.303: ISAKMP (0:4): Old State = IKE_R_AM_AAA_AWAIT New State = IKE_R_AM2 *Mar 1 00:27:55.391: ISAKMP (0:4): received packet from 171.69.89.82 dport 4500 sport 4500 Global (R) AG_INIT_EXCH *Mar 1 00:27:55.395: ISAKMP (0:4): processing HASH payload. message ID = 0 *Mar 1 00:27:55.395: ISAKMP (0:4): processing NOTIFY INITIAL_CONTACT protocol 1 spi 0, message ID = 0, sa = 82443410 *Mar 1 00:27:55.399: ISAKMP (0:4): Process initial contact, bring down existing phase 1 and 2 SA's with local 172.16.142.191 remote 171.69.89.82 remote port 4500 *Mar 1 00:27:55.399: ISAKMP (0:4): returning IP addr to the address pool *Mar 1 00:27:55.399: ISAKMP:received payload type 17 *Mar 1 00:27:55.399: ISAKMP (0:4): Detected NAT-D payload *Mar 1 00:27:55.399: ISAKMP (0:4): recalc my hash for NAT-D *Mar 1 00:27:55.399: ISAKMP (0:4): NAT match MINE hash *Mar 1 00:27:55.399: ISAKMP:received payload type 17 *Mar 1 00:27:55.399: ISAKMP (0:4): Detected NAT-D payload *Mar 1 00:27:55.399: ISAKMP (0:4): recalc his hash for NAT-D *Mar 1 00:27:55.403: ISAKMP (0:4): NAT does not match HIS hash *Mar 1 00:27:55.403: hash received: 93 31 EB 5E 30 E2 A0 C4 D3 6F 3E B1 B7 F AE C3 *Mar 1 00:27:55.403: his nat hash : 14 64 77 EC E8 DC 78 B9 F9 DC 2B 46 CB E8 1D 4 *Mar 1 00:27:55.403: ISAKMP (0:4): SA has been authenticated with 171.69.89.82 *Mar 1 00:27:55.407: ISAKMP (0:4): Detected port floating to port = 4500 *Mar 1 00:27:55.407: ISAKMP: Trying to insert a peer 171.69.89.82/4500/, and inserted successfully. *Mar 1 00:27:55.407: ISAKMP (0:4): IKE_DPD is enabled, initializing timers *Mar 1 00:27:55.407: ISAKMP: set new node 772423690 to CONF_XAUTH *Mar 1 00:27:55.411: ISAKMP (0:4): sending packet to 171.69.89.82 my_port 4500 peer_port 4500 (R) QM_IDLE *Mar 1 00:27:55.411: ISAKMP (0:4): purging node 772423690 *Mar 1 00:27:55.411: ISAKMP: Sending phase 1 responder lifetime 86400 *Mar 1 00:27:55.411: ISAKMP (0:4): peer matches *none* of the profiles *Mar 1 00:27:55.411: ISAKMP (0:4): Input = IKE_MESG_FROM_PEER, IKE_AM_EXCH *Mar 1 00:27:55.411: ISAKMP (0:4): Old State = IKE_R_AM2 New State = IKE_P1_COMPLETE *Mar 1 00:27:55.415: IPSEC(key_engine): got a queue event... *Mar 1 00:27:55.415: ISAKMP (0:4): Need XAUTH *Mar 1 00:27:55.415: ISAKMP (0:4): Input = IKE_MESG_INTERNAL, IKE_PHASE1_COMPLETE *Mar 1 00:27:55.415: ISAKMP (0:4): Old State = IKE_P1_COMPLETE New State = IKE_XAUTH_AAA_START_LOGIN_AWAIT *Mar 1 00:27:55.419: ISAKMP: got callback 1 *Mar 1 00:27:55.419: ISAKMP: set new node -266369278 to CONF_XAUTH *Mar 1 00:27:55.419: ISAKMP/xauth: request attribute XAUTH_USER_NAME_V2 *Mar 1 00:27:55.419: ISAKMP/xauth: request attribute XAUTH_USER_PASSWORD_V2 *Mar 1 00:27:55.419: ISAKMP (0:4): initiating peer config to 171.69.89.82. ID = -266369278 *Mar 1 00:27:55.423: ISAKMP (0:4): sending packet to 171.69.89.82 my_port 4500 peer_port 4500 (R) CONF_XAUTH *Mar 1 00:27:55.423: ISAKMP (0:4): Input = IKE_MESG_FROM_AAA, IKE_AAA_START_LOGIN *Mar 1 00:27:55.423: ISAKMP (0:4): Old State = IKE_XAUTH_AAA_START_LOGIN_AWAIT New State = IKE_XAUTH_REQ_SENT *Mar 1 00:27:55.959: ISAKMP (0:3): purging node 1153289263 *Mar 1 00:28:00.423: ISAKMP (0:4): retransmitting phase 2 CONF_XAUTH -266369278 ... *Mar 1 00:28:00.423: ISAKMP (0:4): incrementing error counter on sa: retransmit phase 2 *Mar 1 00:28:00.423: ISAKMP (0:4): incrementing error counter on sa: retransmit phase 2 *Mar 1 00:28:00.423: ISAKMP (0:4): retransmitting phase 2 -266369278 CONF_XAUTH *Mar 1 00:28:00.423: ISAKMP (0:4): sending packet to 171.69.89.82 my_port 4500 peer_port 4500 (R) CONF_XAUTH *Mar 1 00:28:02.635: ISAKMP (0:4): received packet from 171.69.89.82 dport 4500 sport 4500 Global (R) CONF_XAUTH *Mar 1 00:28:02.635: ISAKMP (0:4): processing transaction payload from 171.69.89.82. message ID = -266369278 *Mar 1 00:28:02.639: ISAKMP: Config payload REPLY *Mar 1 00:28:02.639: ISAKMP/xauth: reply attribute XAUTH_USER_NAME_V2 *Mar 1 00:28:02.639: ISAKMP/xauth: reply attribute XAUTH_USER_PASSWORD_V2 *Mar 1 00:28:02.639: ISAKMP (0:4): deleting node -266369278 error FALSE reason "done with xauth request/reply exchange" *Mar 1 00:28:02.639: ISAKMP (0:4): Input = IKE_MESG_FROM_PEER, IKE_CFG_REPLY *Mar 1 00:28:02.639: ISAKMP (0:4): Old State = IKE_XAUTH_REQ_SENT New State = IKE_XAUTH_AAA_CONT_LOGIN_AWAIT *Mar 1 00:28:02.643: ISAKMP: got callback 1 *Mar 1 00:28:02.643: ISAKMP: set new node -1548124746 to CONF_XAUTH *Mar 1 00:28:02.643: ISAKMP (0:4): initiating peer config to 171.69.89.82. ID = -1548124746 *Mar 1 00:28:02.647: ISAKMP (0:4): sending packet to 171.69.89.82 my_port 4500 peer_port 4500 (R) CONF_XAUTH *Mar 1 00:28:02.647: ISAKMP (0:4): Input = IKE_MESG_FROM_AAA, IKE_AAA_CONT_LOGIN *Mar 1 00:28:02.647: ISAKMP (0:4): Old State = IKE_XAUTH_AAA_CONT_LOGIN_AWAIT New State = IKE_XAUTH_SET_SENT *Mar 1 00:28:02.663: ISAKMP (0:4): received packet from 171.69.89.82 dport 4500 sport 4500 Global (R) CONF_XAUTH *Mar 1 00:28:02.663: ISAKMP (0:4): processing transaction payload from 171.69.89.82. message ID = -1548124746 *Mar 1 00:28:02.663: ISAKMP: Config payload ACK *Mar 1 00:28:02.663: ISAKMP (0:4): XAUTH ACK Processed *Mar 1 00:28:02.667: ISAKMP (0:4): deleting node -1548124746 error FALSE reason "done with transaction" *Mar 1 00:28:02.667: ISAKMP (0:4): Input = IKE_MESG_FROM_PEER, IKE_CFG_ACK *Mar 1 00:28:02.667: ISAKMP (0:4): Old State = IKE_XAUTH_SET_SENT New State = IKE_P1_COMPLETE *Mar 1 00:28:02.667: ISAKMP (0:4): Input = IKE_MESG_INTERNAL, IKE_PHASE1_COMPLETE *Mar 1 00:28:02.667: ISAKMP (0:4): Old State = IKE_P1_COMPLETE New State = IKE_P1_COMPLETE *Mar 1 00:28:02.675: ISAKMP (0:4): received packet from 171.69.89.82 dport 4500 sport 4500 Global (R) QM_IDLE *Mar 1 00:28:02.675: ISAKMP: set new node 1973520613 to QM_IDLE *Mar 1 00:28:02.679: ISAKMP (0:4): processing transaction payload from 171.69.89.82. message ID = 1973520613 *Mar 1 00:28:02.679: ISAKMP: Config payload REQUEST *Mar 1 00:28:02.679: ISAKMP (0:4): checking request: *Mar 1 00:28:02.679: ISAKMP: IP4_ADDRESS *Mar 1 00:28:02.679: ISAKMP: IP4_NETMASK *Mar 1 00:28:02.679: ISAKMP: IP4_DNS *Mar 1 00:28:02.683: ISAKMP: IP4_NBNS *Mar 1 00:28:02.683: ISAKMP: ADDRESS_EXPIRY *Mar 1 00:28:02.683: ISAKMP: APPLICATION_VERSION *Mar 1 00:28:02.683: ISAKMP: UNKNOWN Unknown Attr: 0x7000 *Mar 1 00:28:02.683: ISAKMP: UNKNOWN Unknown Attr: 0x7001 *Mar 1 00:28:02.683: ISAKMP: DEFAULT_DOMAIN *Mar 1 00:28:02.683: ISAKMP: SPLIT_INCLUDE *Mar 1 00:28:02.683: ISAKMP: UNKNOWN Unknown Attr: 0x7003 *Mar 1 00:28:02.683: ISAKMP: UNKNOWN Unknown Attr: 0x7007 *Mar 1 00:28:02.683: ISAKMP: UNKNOWN Unknown Attr: 0x7008 *Mar 1 00:28:02.683: ISAKMP: UNKNOWN Unknown Attr: 0x7009 *Mar 1 00:28:02.687: ISAKMP: UNKNOWN Unknown Attr: 0x700A *Mar 1 00:28:02.687: ISAKMP (0:4): Input = IKE_MESG_FROM_PEER, IKE_CFG_REQUEST *Mar 1 00:28:02.687: ISAKMP (0:4): Old State = IKE_P1_COMPLETE New State = IKE_CONFIG_AUTHOR_AAA_AWAIT *Mar 1 00:28:02.691: ISAKMP: got callback 1 *Mar 1 00:28:02.695: ISAKMP (0:4): attributes sent in message: *Mar 1 00:28:02.695: Address: 0.2.0.0 *Mar 1 00:28:02.695: ISAKMP (0:4): allocating address 192.168.1.3 *Mar 1 00:28:02.695: ISAKMP: Sending private address: 192.168.1.3 *Mar 1 00:28:02.695: ISAKMP: Sending ADDRESS_EXPIRY seconds left to use the address: 86392 *Mar 1 00:28:02.695: ISAKMP: Sending APPLICATION_VERSION string: Cisco Internetwork Operating System Software IOS (tm) C2600 Software (C2600-IK9O3S3-M), Version 12.2(13.7)T1, MAINTENANCE INTERIM SOFTWARE TAC Support: http://www.cisco.com/tac Copyright (c) 1986-2002 by cisco Systems, Inc. Compiled Sat 21-Dec-02 14:10 by ccai *Mar 1 00:28:02.699: ISAKMP (0/4): Unknown Attr: UNKNOWN (0x7000) *Mar 1 00:28:02.699: ISAKMP (0/4): Unknown Attr: UNKNOWN (0x7001) *Mar 1 00:28:02.699: ISAKMP: Sending split include name 120 network 10.100.100.0 mask 255.255.255.0 protocol 0, src port 0, dst port 0 *Mar 1 00:28:02.699: ISAKMP (0/4): Unknown Attr: UNKNOWN (0x7003) *Mar 1 00:28:02.699: ISAKMP (0/4): Unknown Attr: UNKNOWN (0x7007) *Mar 1 00:28:02.699: ISAKMP (0/4): Unknown Attr: UNKNOWN (0x7008) *Mar 1 00:28:02.699: ISAKMP (0/4): Unknown Attr: UNKNOWN (0x7009) *Mar 1 00:28:02.699: ISAKMP (0/4): Unknown Attr: UNKNOWN (0x700A) *Mar 1 00:28:02.703: ISAKMP (0:4): responding to peer config from 171.69.89.82. ID = 1973520613 *Mar 1 00:28:02.703: ISAKMP (0:4): sending packet to 171.69.89.82 my_port 4500 peer_port 4500 (R) CONF_ADDR *Mar 1 00:28:02.707: ISAKMP (0:4): deleting node 1973520613 error FALSE reason "" *Mar 1 00:28:02.707: ISAKMP (0:4): Input = IKE_MESG_FROM_AAA, IKE_AAA_GROUP_ATTR *Mar 1 00:28:02.707: ISAKMP (0:4): Old State = IKE_CONFIG_AUTHOR_AAA_AWAIT New State = IKE_P1_COMPLETE *Mar 1 00:28:02.775: ISAKMP (0:4): received packet from 171.69.89.82 dport 4500 sport 4500 Global (R) QM_IDLE *Mar 1 00:28:02.775: ISAKMP: set new node 1783469429 to QM_IDLE *Mar 1 00:28:02.787: ISAKMP (0:4): processing HASH payload. message ID = 1783469429 *Mar 1 00:28:02.787: ISAKMP (0:4): processing SA payload. message ID = 1783469429 *Mar 1 00:28:02.787: ISAKMP (0:4): Checking IPSec proposal 1 *Mar 1 00:28:02.787: ISAKMP: transform 1, ESP_AES *Mar 1 00:28:02.787: ISAKMP: attributes in transform: *Mar 1 00:28:02.787: ISAKMP: authenticator is HMAC-MD5 *Mar 1 00:28:02.787: ISAKMP: encaps is 61443 *Mar 1 00:28:02.791: ISAKMP: key length is 256 *Mar 1 00:28:02.791: ISAKMP: SA life type in seconds *Mar 1 00:28:02.791: ISAKMP: SA life duration (VPI) of 0x0 0x20 0xC4 0x9B *Mar 1 00:28:02.791: ISAKMP (0:4): atts are acceptable. *Mar 1 00:28:02.791: ISAKMP (0:4): Checking IPSec proposal 1 *Mar 1 00:28:02.791: ISAKMP (0:4): transform 1, IPPCP LZS *Mar 1 00:28:02.791: ISAKMP: attributes in transform: *Mar 1 00:28:02.791: ISAKMP: encaps is 61443 *Mar 1 00:28:02.795: ISAKMP: SA life type in seconds *Mar 1 00:28:02.795: ISAKMP: SA life duration (VPI) of 0x0 0x20 0xC4 0x9B *Mar 1 00:28:02.795: ISAKMP (0:4): atts are acceptable. *Mar 1 00:28:02.795: IPSEC(validate_proposal_request): proposal part #1, (key eng. msg.) INBOUND local= 172.16.142.191, remote= 171.69.89.82, local_proxy= 172.16.142.191/255.255.255.255/0/0 (type=1), remote_proxy= 192.168.1.3/255.255.255.255/0/0 (type=1), protocol= ESP, transform= esp-aes 256 esp-md5-hmac , lifedur= 0s and 0kb, spi= 0x0(0), conn_id= 0, keysize= 256, flags= 0x400 *Mar 1 00:28:02.799: IPSEC(validate_proposal_request): proposal part #2, (key eng. msg.) INBOUND local= 172.16.142.191, remote= 171.69.89.82, local_proxy= 172.16.142.191/255.255.255.255/0/0 (type=1), remote_proxy= 192.168.1.3/255.255.255.255/0/0 (type=1), protocol= PCP, transform= comp-lzs , lifedur= 0s and 0kb, spi= 0x0(0), conn_id= 0, keysize= 0, flags= 0x400 *Mar 1 00:28:02.799: IPSEC(kei_proxy): head = test, map->ivrf = , kei->ivrf = *Mar 1 00:28:02.799: IPSEC(validate_transform_proposal): no IPSEC cryptomap exists for local address 172.16.142.191 *Mar 1 00:28:02.799: ISAKMP (0:4): IPSec policy invalidated proposal *Mar 1 00:28:02.803: ISAKMP (0:4): Checking IPSec proposal 2 *Mar 1 00:28:02.803: ISAKMP: transform 1, ESP_AES *Mar 1 00:28:02.803: ISAKMP: attributes in transform: *Mar 1 00:28:02.803: ISAKMP: authenticator is HMAC-SHA *Mar 1 00:28:02.803: ISAKMP: encaps is 61443 *Mar 1 00:28:02.803: ISAKMP: key length is 256 *Mar 1 00:28:02.803: ISAKMP: SA life type in seconds *Mar 1 00:28:02.803: ISAKMP: SA life duration (VPI) of 0x0 0x20 0xC4 0x9B *Mar 1 00:28:02.803: ISAKMP (0:4): atts are acceptable. *Mar 1 00:28:02.807: ISAKMP (0:4): Checking IPSec proposal 2 *Mar 1 00:28:02.807: ISAKMP (0:4): transform 1, IPPCP LZS *Mar 1 00:28:02.807: ISAKMP: attributes in transform: *Mar 1 00:28:02.807: ISAKMP: encaps is 61443 *Mar 1 00:28:02.807: ISAKMP: SA life type in seconds *Mar 1 00:28:02.807: ISAKMP: SA life duration (VPI) of 0x0 0x20 0xC4 0x9B *Mar 1 00:28:02.807: ISAKMP (0:4): atts are acceptable. *Mar 1 00:28:02.807: IPSEC(validate_proposal_request): proposal part #1, (key eng. msg.) INBOUND local= 172.16.142.191, remote= 171.69.89.82, local_proxy= 172.16.142.191/255.255.255.255/0/0 (type=1), remote_proxy= 192.168.1.3/255.255.255.255/0/0 (type=1), protocol= ESP, transform= esp-aes 256 esp-sha-hmac , lifedur= 0s and 0kb, spi= 0x0(0), conn_id= 0, keysize= 256, flags= 0x400 *Mar 1 00:28:02.811: IPSEC(validate_proposal_request): proposal part #2, (key eng. msg.) INBOUND local= 172.16.142.191, remote= 171.69.89.82, local_proxy= 172.16.142.191/255.255.255.255/0/0 (type=1), remote_proxy= 192.168.1.3/255.255.255.255/0/0 (type=1), protocol= PCP, transform= comp-lzs , lifedur= 0s and 0kb, spi= 0x0(0), conn_id= 0, keysize= 0, flags= 0x400 *Mar 1 00:28:02.815: IPSEC(kei_proxy): head = test, map->ivrf = , kei->ivrf = *Mar 1 00:28:02.815: IPSEC(validate_transform_proposal): no IPSEC cryptomap exists for local address 172.16.142.191 *Mar 1 00:28:02.815: ISAKMP (0:4): IPSec policy invalidated proposal *Mar 1 00:28:02.815: ISAKMP (0:4): Checking IPSec proposal 3 *Mar 1 00:28:02.815: ISAKMP: transform 1, ESP_AES *Mar 1 00:28:02.815: ISAKMP: attributes in transform: *Mar 1 00:28:02.815: ISAKMP: authenticator is HMAC-MD5 *Mar 1 00:28:02.815: ISAKMP: encaps is 61443 *Mar 1 00:28:02.815: ISAKMP: key length is 128 *Mar 1 00:28:02.819: ISAKMP: SA life type in seconds *Mar 1 00:28:02.819: ISAKMP: SA life duration (VPI) of 0x0 0x20 0xC4 0x9B *Mar 1 00:28:02.819: ISAKMP (0:4): atts are acceptable. *Mar 1 00:28:02.819: ISAKMP (0:4): Checking IPSec proposal 3 *Mar 1 00:28:02.819: ISAKMP (0:4): transform 1, IPPCP LZS *Mar 1 00:28:02.819: ISAKMP: attributes in transform: *Mar 1 00:28:02.819: ISAKMP: encaps is 61443 *Mar 1 00:28:02.819: ISAKMP: SA life type in seconds *Mar 1 00:28:02.823: ISAKMP: SA life duration (VPI) of 0x0 0x20 0xC4 0x9B *Mar 1 00:28:02.823: ISAKMP (0:4): atts are acceptable. *Mar 1 00:28:02.823: IPSEC(validate_proposal_request): proposal part #1, (key eng. msg.) INBOUND local= 172.16.142.191, remote= 171.69.89.82, local_proxy= 172.16.142.191/255.255.255.255/0/0 (type=1), remote_proxy= 192.168.1.3/255.255.255.255/0/0 (type=1), protocol= ESP, transform= esp-aes esp-md5-hmac , lifedur= 0s and 0kb, spi= 0x0(0), conn_id= 0, keysize= 128, flags= 0x400 *Mar 1 00:28:02.827: IPSEC(validate_proposal_request): proposal part #2, (key eng. msg.) INBOUND local= 172.16.142.191, remote= 171.69.89.82, local_proxy= 172.16.142.191/255.255.255.255/0/0 (type=1), remote_proxy= 192.168.1.3/255.255.255.255/0/0 (type=1), protocol= PCP, transform= comp-lzs , lifedur= 0s and 0kb, spi= 0x0(0), conn_id= 0, keysize= 0, flags= 0x400 *Mar 1 00:28:02.827: IPSEC(kei_proxy): head = test, map->ivrf = , kei->ivrf = *Mar 1 00:28:02.827: IPSEC(validate_transform_proposal): no IPSEC cryptomap exists for local address 172.16.142.191 *Mar 1 00:28:02.827: ISAKMP (0:4): IPSec policy invalidated proposal *Mar 1 00:28:02.831: ISAKMP (0:4): Checking IPSec proposal 4 *Mar 1 00:28:02.831: ISAKMP: transform 1, ESP_AES *Mar 1 00:28:02.831: ISAKMP: attributes in transform: *Mar 1 00:28:02.831: ISAKMP: authenticator is HMAC-SHA *Mar 1 00:28:02.831: ISAKMP: encaps is 61443 *Mar 1 00:28:02.831: ISAKMP: key length is 128 *Mar 1 00:28:02.831: ISAKMP: SA life type in seconds *Mar 1 00:28:02.831: ISAKMP: SA life duration (VPI) of 0x0 0x20 0xC4 0x9B *Mar 1 00:28:02.831: ISAKMP (0:4): atts are acceptable. *Mar 1 00:28:02.835: ISAKMP (0:4): Checking IPSec proposal 4 *Mar 1 00:28:02.835: ISAKMP (0:4): transform 1, IPPCP LZS *Mar 1 00:28:02.835: ISAKMP: attributes in transform: *Mar 1 00:28:02.835: ISAKMP: encaps is 61443 *Mar 1 00:28:02.835: ISAKMP: SA life type in seconds *Mar 1 00:28:02.835: ISAKMP: SA life duration (VPI) of 0x0 0x20 0xC4 0x9B *Mar 1 00:28:02.835: ISAKMP (0:4): atts are acceptable. *Mar 1 00:28:02.835: IPSEC(validate_proposal_request): proposal part #1, (key eng. msg.) INBOUND local= 172.16.142.191, remote= 171.69.89.82, local_proxy= 172.16.142.191/255.255.255.255/0/0 (type=1), remote_proxy= 192.168.1.3/255.255.255.255/0/0 (type=1), protocol= ESP, transform= esp-aes esp-sha-hmac , lifedur= 0s and 0kb, spi= 0x0(0), conn_id= 0, keysize= 128, flags= 0x400 *Mar 1 00:28:02.839: IPSEC(validate_proposal_request): proposal part #2, (key eng. msg.) INBOUND local= 172.16.142.191, remote= 171.69.89.82, local_proxy= 172.16.142.191/255.255.255.255/0/0 (type=1), remote_proxy= 192.168.1.3/255.255.255.255/0/0 (type=1), protocol= PCP, transform= comp-lzs , lifedur= 0s and 0kb, spi= 0x0(0), conn_id= 0, keysize= 0, flags= 0x400 *Mar 1 00:28:02.843: IPSEC(kei_proxy): head = test, map->ivrf = , kei->ivrf = *Mar 1 00:28:02.843: IPSEC(validate_transform_proposal): no IPSEC cryptomap exists for local address 172.16.142.191 *Mar 1 00:28:02.843: ISAKMP (0:4): IPSec policy invalidated proposal *Mar 1 00:28:02.843: ISAKMP (0:4): Checking IPSec proposal 5 *Mar 1 00:28:02.843: ISAKMP: transform 1, ESP_AES *Mar 1 00:28:02.843: ISAKMP: attributes in transform: *Mar 1 00:28:02.843: ISAKMP: authenticator is HMAC-MD5 *Mar 1 00:28:02.843: ISAKMP: encaps is 61443 *Mar 1 00:28:02.843: ISAKMP: key length is 256 *Mar 1 00:28:02.847: ISAKMP: SA life type in seconds *Mar 1 00:28:02.847: ISAKMP: SA life duration (VPI) of 0x0 0x20 0xC4 0x9B *Mar 1 00:28:02.847: ISAKMP (0:4): atts are acceptable. *Mar 1 00:28:02.847: IPSEC(validate_proposal_request): proposal part #1, (key eng. msg.) INBOUND local= 172.16.142.191, remote= 171.69.89.82, local_proxy= 172.16.142.191/255.255.255.255/0/0 (type=1), remote_proxy= 192.168.1.3/255.255.255.255/0/0 (type=1), protocol= ESP, transform= esp-aes 256 esp-md5-hmac , lifedur= 0s and 0kb, spi= 0x0(0), conn_id= 0, keysize= 256, flags= 0x400 *Mar 1 00:28:02.851: IPSEC(kei_proxy): head = test, map->ivrf = , kei->ivrf = *Mar 1 00:28:02.851: IPSEC(validate_transform_proposal): no IPSEC cryptomap exists for local address 172.16.142.191 *Mar 1 00:28:02.851: ISAKMP (0:4): IPSec policy invalidated proposal *Mar 1 00:28:02.851: ISAKMP (0:4): Checking IPSec proposal 6 *Mar 1 00:28:02.851: ISAKMP: transform 1, ESP_AES *Mar 1 00:28:02.851: ISAKMP: attributes in transform: *Mar 1 00:28:02.851: ISAKMP: authenticator is HMAC-SHA *Mar 1 00:28:02.855: ISAKMP: encaps is 61443 *Mar 1 00:28:02.855: ISAKMP: key length is 256 *Mar 1 00:28:02.855: ISAKMP: SA life type in seconds *Mar 1 00:28:02.855: ISAKMP: SA life duration (VPI) of 0x0 0x20 0xC4 0x9B *Mar 1 00:28:02.855: ISAKMP (0:4): atts are acceptable. *Mar 1 00:28:02.855: IPSEC(validate_proposal_request): proposal part #1, (key eng. msg.) INBOUND local= 172.16.142.191, remote= 171.69.89.82, local_proxy= 172.16.142.191/255.255.255.255/0/0 (type=1), remote_proxy= 192.168.1.3/255.255.255.255/0/0 (type=1), protocol= ESP, transform= esp-aes 256 esp-sha-hmac , lifedur= 0s and 0kb, spi= 0x0(0), conn_id= 0, keysize= 256, flags= 0x400 *Mar 1 00:28:02.859: IPSEC(kei_proxy): head = test, map->ivrf = , kei->ivrf = *Mar 1 00:28:02.859: IPSEC(validate_transform_proposal): no IPSEC cryptomap exists for local address 172.16.142.191 *Mar 1 00:28:02.859: ISAKMP (0:4): IPSec policy invalidated proposal *Mar 1 00:28:02.859: ISAKMP (0:4): Checking IPSec proposal 7 *Mar 1 00:28:02.859: ISAKMP: transform 1, ESP_AES *Mar 1 00:28:02.863: ISAKMP: attributes in transform: *Mar 1 00:28:02.863: ISAKMP: authenticator is HMAC-MD5 *Mar 1 00:28:02.863: ISAKMP: encaps is 61443 *Mar 1 00:28:02.863: ISAKMP: key length is 128 *Mar 1 00:28:02.863: ISAKMP: SA life type in seconds *Mar 1 00:28:02.863: ISAKMP: SA life duration (VPI) of 0x0 0x20 0xC4 0x9B *Mar 1 00:28:02.863: ISAKMP (0:4): atts are acceptable. *Mar 1 00:28:02.863: IPSEC(validate_proposal_request): proposal part #1, (key eng. msg.) INBOUND local= 172.16.142.191, remote= 171.69.89.82, local_proxy= 172.16.142.191/255.255.255.255/0/0 (type=1), remote_proxy= 192.168.1.3/255.255.255.255/0/0 (type=1), protocol= ESP, transform= esp-aes esp-md5-hmac , lifedur= 0s and 0kb, spi= 0x0(0), conn_id= 0, keysize= 128, flags= 0x400 *Mar 1 00:28:02.867: IPSEC(kei_proxy): head = test, map->ivrf = , kei->ivrf = *Mar 1 00:28:02.867: IPSEC(validate_transform_proposal): no IPSEC cryptomap exists for local address 172.16.142.191 *Mar 1 00:28:02.867: ISAKMP (0:4): IPSec policy invalidated proposal *Mar 1 00:28:02.867: ISAKMP (0:4): Checking IPSec proposal 8 *Mar 1 00:28:02.871: ISAKMP: transform 1, ESP_AES *Mar 1 00:28:02.871: ISAKMP: attributes in transform: *Mar 1 00:28:02.871: ISAKMP: authenticator is HMAC-SHA *Mar 1 00:28:02.871: ISAKMP: encaps is 61443 *Mar 1 00:28:02.871: ISAKMP: key length is 128 *Mar 1 00:28:02.871: ISAKMP: SA life type in seconds *Mar 1 00:28:02.871: ISAKMP: SA life duration (VPI) of 0x0 0x20 0xC4 0x9B *Mar 1 00:28:02.871: ISAKMP (0:4): atts are acceptable. *Mar 1 00:28:02.875: IPSEC(validate_proposal_request): proposal part #1, (key eng. msg.) INBOUND local= 172.16.142.191, remote= 171.69.89.82, local_proxy= 172.16.142.191/255.255.255.255/0/0 (type=1), remote_proxy= 192.168.1.3/255.255.255.255/0/0 (type=1), protocol= ESP, transform= esp-aes esp-sha-hmac , lifedur= 0s and 0kb, spi= 0x0(0), conn_id= 0, keysize= 128, flags= 0x400 *Mar 1 00:28:02.875: IPSEC(kei_proxy): head = test, map->ivrf = , kei->ivrf = *Mar 1 00:28:02.875: IPSEC(validate_transform_proposal): no IPSEC cryptomap exists for local address 172.16.142.191 *Mar 1 00:28:02.879: ISAKMP (0:4): IPSec policy invalidated proposal *Mar 1 00:28:02.879: ISAKMP (0:4): Checking IPSec proposal 9 *Mar 1 00:28:02.879: ISAKMP: transform 1, ESP_3DES *Mar 1 00:28:02.879: ISAKMP: attributes in transform: *Mar 1 00:28:02.879: ISAKMP: authenticator is HMAC-MD5 *Mar 1 00:28:02.879: ISAKMP: encaps is 61443 *Mar 1 00:28:02.879: ISAKMP: SA life type in seconds *Mar 1 00:28:02.879: ISAKMP: SA life duration (VPI) of 0x0 0x20 0xC4 0x9B *Mar 1 00:28:02.879: ISAKMP (0:4): atts are acceptable. *Mar 1 00:28:02.883: ISAKMP (0:4): Checking IPSec proposal 9 *Mar 1 00:28:02.883: ISAKMP (0:4): transform 1, IPPCP LZS *Mar 1 00:28:02.883: ISAKMP: attributes in transform: *Mar 1 00:28:02.883: ISAKMP: encaps is 61443 *Mar 1 00:28:02.883: ISAKMP: SA life type in seconds *Mar 1 00:28:02.883: ISAKMP: SA life duration (VPI) of 0x0 0x20 0xC4 0x9B *Mar 1 00:28:02.883: ISAKMP (0:4): atts are acceptable. *Mar 1 00:28:02.883: IPSEC(validate_proposal_request): proposal part #1, (key eng. msg.) INBOUND local= 172.16.142.191, remote= 171.69.89.82, local_proxy= 172.16.142.191/255.255.255.255/0/0 (type=1), remote_proxy= 192.168.1.3/255.255.255.255/0/0 (type=1), protocol= ESP, transform= esp-3des esp-md5-hmac , lifedur= 0s and 0kb, spi= 0x0(0), conn_id= 0, keysize= 0, flags= 0x400 *Mar 1 00:28:02.887: IPSEC(validate_proposal_request): proposal part #2, (key eng. msg.) INBOUND local= 172.16.142.191, remote= 171.69.89.82, local_proxy= 172.16.142.191/255.255.255.255/0/0 (type=1), remote_proxy= 192.168.1.3/255.255.255.255/0/0 (type=1), protocol= PCP, transform= comp-lzs , lifedur= 0s and 0kb, spi= 0x0(0), conn_id= 0, keysize= 0, flags= 0x400 *Mar 1 00:28:02.891: IPSEC(kei_proxy): head = test, map->ivrf = , kei->ivrf = *Mar 1 00:28:02.891: IPSEC(validate_transform_proposal): no IPSEC cryptomap exists for local address 172.16.142.191 *Mar 1 00:28:02.891: ISAKMP (0:4): IPSec policy invalidated proposal *Mar 1 00:28:02.891: ISAKMP (0:4): Checking IPSec proposal 10 *Mar 1 00:28:02.891: ISAKMP: transform 1, ESP_3DES *Mar 1 00:28:02.891: ISAKMP: attributes in transform: *Mar 1 00:28:02.891: ISAKMP: authenticator is HMAC-SHA *Mar 1 00:28:02.891: ISAKMP: encaps is 61443 *Mar 1 00:28:02.891: ISAKMP: SA life type in seconds *Mar 1 00:28:02.891: ISAKMP: SA life duration (VPI) of 0x0 0x20 0xC4 0x9B *Mar 1 00:28:02.895: ISAKMP (0:4): atts are acceptable. *Mar 1 00:28:02.895: ISAKMP (0:4): Checking IPSec proposal 10 *Mar 1 00:28:02.895: ISAKMP (0:4): transform 1, IPPCP LZS *Mar 1 00:28:02.895: ISAKMP: attributes in transform: *Mar 1 00:28:02.895: ISAKMP: encaps is 61443 *Mar 1 00:28:02.895: ISAKMP: SA life type in seconds *Mar 1 00:28:02.895: ISAKMP: SA life duration (VPI) of 0x0 0x20 0xC4 0x9B *Mar 1 00:28:02.899: ISAKMP (0:4): atts are acceptable. *Mar 1 00:28:02.899: IPSEC(validate_proposal_request): proposal part #1, (key eng. msg.) INBOUND local= 172.16.142.191, remote= 171.69.89.82, local_proxy= 172.16.142.191/255.255.255.255/0/0 (type=1), remote_proxy= 192.168.1.3/255.255.255.255/0/0 (type=1), protocol= ESP, transform= esp-3des esp-sha-hmac , lifedur= 0s and 0kb, spi= 0x0(0), conn_id= 0, keysize= 0, flags= 0x400 *Mar 1 00:28:02.899: IPSEC(validate_proposal_request): proposal part #2 *Mar 1 00:28:02.923: ISAKMP (0:4): asking for 1 spis from ipsec *Mar 1 00:28:02.923: ISAKMP (0:4): Node 1783469429, Input = IKE_MESG_FROM_PEER, IKE_QM_EXCH *Mar 1 00:28:02.923: ISAKMP (0:4): Old State = IKE_QM_READY New State = IKE_QM_SPI_STARVE *Mar 1 00:28:02.923: IPSEC(key_engine): got a queue event... *Mar 1 00:28:02.923: IPSEC(spi_response): getting spi 514603422 for SA from 172.16.142.191 to 171.69.89.82 for prot 3 *Mar 1 00:28:02.927: ISAKMP: received ke message (2/1) *Mar 1 00:28:03.175: ISAKMP (0:4): sending packet to 171.69.89.82 my_port 4500 peer_port 4500 (R) QM_IDLE *Mar 1 00:28:03.179: ISAKMP (0:4): Node 1783469429, Input = IKE_MESG_FROM_IPSEC, IKE_SPI_REPLY *Mar 1 00:28:03.179: ISAKMP (0:4): Old State = IKE_QM_SPI_STARVE New State = IKE_QM_R_QM2 *Mar 1 00:28:03.239: ISAKMP (0:4): received packet from 171.69.89.82 dport 4500 sport 4500 Global (R) QM_IDLE *Mar 1 00:28:03.247: ISAKMP: Locking peer struct 0x82C88D44, IPSEC refcount 1 for for stuff_ke *Mar 1 00:28:03.247: ISAKMP (0:4): Creating IPSec SAs *Mar 1 00:28:03.251: inbound SA from 171.69.89.82 to 172.16.142.191 (f/i) 0/ 0 (proxy 192.168.1.3 to 172.16.142.191) *Mar 1 00:28:03.251: has spi 0x1EAC399E and conn_id 2000 and flags 400 *Mar 1 00:28:03.263: IPSEC(create_sa): sa created, (sa) sa_dest= 171.69.89.82, sa_prot= 50, sa_spi= 0x1CD14C06(483478534), sa_trans= esp-3des esp-sha-hmac , sa_conn_id= 2001 *Mar 1 00:28:06.675: ISAKMP (0:4): received packet from 171.69.89.82 dport 4500 sport 4500 Global (R) QM_IDLE *Mar 1 00:28:06.679: ISAKMP: set new node -2064779316 to QM_IDLE *Mar 1 00:28:06.687: ISAKMP (0:4): processing HASH payload. message ID = -2064779316 *Mar 1 00:28:06.687: ISAKMP (0:4): processing SA payload. message ID = -2064779316 *Mar 1 00:28:06.687: ISAKMP (0:4): Checking IPSec proposal 1 *Mar 1 00:28:06.687: ISAKMP: transform 1, ESP_AES *Mar 1 00:28:06.687: ISAKMP: attributes in transform: *Mar 1 00:28:06.691: ISAKMP: authenticator is HMAC-MD5 *Mar 1 00:28:06.691: ISAKMP: encaps is 61443 *Mar 1 00:28:06.691: ISAKMP: key length is 256 *Mar 1 00:28:06.691: ISAKMP: SA life type in seconds *Mar 1 00:28:06.691: ISAKMP: SA life duration (VPI) of 0x0 0x20 0xC4 0x9B *Mar 1 00:28:06.691: ISAKMP (0:4): atts are acceptable. *Mar 1 00:28:06.691: ISAKMP (0:4): Checking IPSec proposal 1 *Mar 1 00:28:06.691: ISAKMP (0:4): transform 1, IPPCP LZS *Mar 1 00:28:06.691: ISAKMP: attributes in transform: *Mar 1 00:28:06.695: ISAKMP: encaps is 61443 *Mar 1 00:28:06.695: ISAKMP: SA life type in seconds *Mar 1 00:28:06.695: ISAKMP: SA life duration (VPI) of 0x0 0x20 0xC4 0x9B *Mar 1 00:28:06.695: ISAKMP (0:4): atts are acceptable. *Mar 1 00:28:06.835: IPSEC(spi_response): getting spi 3561761534 for SA from 172.16.142.191 to 171.69.89.82 for prot 3 *Mar 1 00:28:06.835: ISAKMP: received ke message (2/1) *Mar 1 00:28:07.127: ISAKMP (0:4): sending packet to 171.69.89.82 my_port 4500 peer_port 4500 (R) QM_IDLE *Mar 1 00:28:07.127: ISAKMP (0:4): Node -2064779316, Input = IKE_MESG_FROM_IPSEC, IKE_SPI_REPLY *Mar 1 00:28:07.127: ISAKMP (0:4): Old State = IKE_QM_SPI_STARVE New State = IKE_QM_R_QM2 *Mar 1 00:28:07.143: ISAKMP (0:4): received packet from 171.69.89.82 dport 4500 sport 4500 Global (R) QM_IDLE *Mar 1 00:28:07.151: ISAKMP: Locking peer struct 0x82C88D44, IPSEC refcount 2 for for stuff_ke *Mar 1 00:28:07.151: ISAKMP (0:4): Creating IPSec SAs *Mar 1 00:28:07.151: inbound SA from 171.69.89.82 to 172.16.142.191 (f/i) 0/ 0 (proxy 192.168.1.3 to 10.100.100.0) *Mar 1 00:28:07.151: has spi 0xD44C2AFE and conn_id 2002 and flags 400 *Mar 1 00:28:07.151: lifetime of 2147483 seconds *Mar 1 00:28:07.151: has client flags 0x10 *Mar 1 00:28:07.151: outbound SA from 172.16.142.191 to 171.69.89.82 (f/i) 0/ 0 (proxy 10.100.100.0 to 192.168.1.3 ), (sa) sa_dest= 171.69.89.82, sa_prot= 50, sa_spi= 0x9A12903F(2584907839), sa_trans= esp-3des esp-sha-hmac , sa_conn_id= 2003 *Mar 1 00:28:15.983: ISAKMP (0:3): purging node -457362469 *Mar 1 00:28:22.863: ISAKMP (0:4): received packet from 171.69.89.82 dport 4500 sport 4500 Global (R) QM_IDLE *Mar 1 00:28:22.863: ISAKMP: set new node 442126453 to QM_IDLE *Mar 1 00:28:22.867: ISAKMP (0:4): processing HASH payload. message ID = 442126453 *Mar 1 00:28:22.867: ISAKMP (0:4): processing NOTIFY unknown protocol 1 spi 0, message ID = 442126453, sa = 82443410 *Mar 1 00:28:22.867: ISAKMP (0:4): deleting node 442126453 error FALSE reason "informational (in) state 1" *Mar 1 00:28:22.867: ISAKMP (0:4): Input = IKE_MESG_FROM_PEER, IKE_INFO_NOTIFY *Mar 1 00:28:22.867: ISAKMP (0:4): Old State = IKE_P1_COMPLETE New State = IKE_P1_COMPLETE *Mar 1 00:28:28.643: ISAKMP (0:3): purging node -118562945 *Mar 1 00:28:28.651: ISAKMP (0:3): purging node 24622273 *Mar 1 00:28:28.659: ISAKMP (0:3): purging node -1276758667 *Mar 1 00:28:38.667: ISAKMP (0:3): purging SA., sa=8242A5AC, delme=8242A5AC *Mar 1 00:28:38.667: ISAKMP (0:3): purging node 452292968 *Mar 1 00:28:38.667: ISAKMP (0:3): purging node 1331016929 *Mar 1 00:28:38.667: ISAKMP (0:3): returning address 192.168.1.2 to pool *Mar 1 00:28:38.667: ISAKMP: Unlocking IKE struct 0x827CBB44 for declare_sa_dead(), count 0 *Mar 1 00:28:42.891: ISAKMP (0:4): received packet from 171.69.89.82 dport 4500 sport 4500 Global (R) QM_IDLE *Mar 1 00:28:42.891: ISAKMP: set new node 505402511 to QM_IDLE *Mar 1 00:28:42.895: ISAKMP (0:4): processing HASH payload. message ID = 505402511 *Mar 1 00:28:42.895: ISAKMP (0:4): processing NOTIFY unknown protocol 1 spi 0, message ID = 505402511, sa = 82443410 *Mar 1 00:28:42.895: ISAKMP (0:4): deleting node 505402511 error FALSE reason "informational (in) state 1" *Mar 1 00:28:42.895: ISAKMP (0:4): Input = IKE_MESG_FROM_PEER, IKE_INFO_NOTIFY *Mar 1 00:28:42.895: ISAKMP (0:4): Old State = IKE_P1_COMPLETE New State = IKE_P1_COMPLETE *Mar 1 00:28:52.707: ISAKMP (0:4): purging node 1973520613 *Mar 1 00:28:53.255: ISAKMP (0:4): purging node 1783469429 *Mar 1 00:28:57.155: ISAKMP (0:4): purging node -2064779316 *Mar 1 00:29:02.919: ISAKMP (0:4): received packet from 171.69.89.82 dport 4500 sport 4500 Global (R) QM_IDLE *Mar 1 00:29:02.919: ISAKMP: set new node -526976638 to QM_IDLE *Mar 1 00:29:02.923: ISAKMP (0:4): processing HASH payload. message ID = -526976638 *Mar 1 00:29:02.923: ISAKMP (0:4): processing NOTIFY unknown protocol 1 spi 0, message ID = -526976638, sa = 82443410 *Mar 1 00:29:02.923: ISAKMP (0:4): deleting node -526976638 error FALSE reason "informational (in) state 1" *Mar 1 00:29:02.923: ISAKMP (0:4): Input = IKE_MESG_FROM_PEER, IKE_INFO_NOTIFY *Mar 1 00:29:02.923: ISAKMP (0:4): Old State = IKE_P1_COMPLETE New State = IKE_P1_COMPLETE *Mar 1 00:29:12.867: ISAKMP (0:4): purging node 442126453 *Mar 1 00:29:22.951: ISAKMP (0:4): received packet from 171.69.89.82 dport 4500 sport 4500 Global (R) QM_IDLE *Mar 1 00:29:22.955: ISAKMP: set new node 1718060095 to QM_IDLE *Mar 1 00:29:22.955: ISAKMP (0:4): processing HASH payload. message ID = 1718060095 *Mar 1 00:29:22.955: ISAKMP (0:4): processing NOTIFY unknown protocol 1 spi 0, message ID = 1718060095, sa = 82443410 *Mar 1 00:29:22.955: ISAKMP (0:4): deleting node 1718060095 error FALSE reason "informational (in) state 1" *Mar 1 00:29:22.959: ISAKMP (0:4): Input = IKE_MESG_FROM_PEER, IKE_INFO_NOTIFY *Mar 1 00:29:22.959: ISAKMP (0:4): Old State = IKE_P1_COMPLETE New State = IKE_P1_COMPLETE