hello all,
i am having issues trying to connect a Cisco IOS router as easy VPN client to the HQ easy VPN server - VPN 3000 series concentrator. can anybody tell from the crypto debugs on the remote router what the issue might be?
RTRSlovakiaWH#
RTRSlovakiaWH#conf t
Enter configuration commands, one per line. End with CNTL/Z.
RTRSlovakiaWH(config)#int eth 1
000123: *Mar 1 00:03:59.095 UTC: IPSEC(key_engine): major = 1
000124: *Mar 1 00:03:59.095 UTC: IPSEC(key_engine): expired_timer
RTRSlovakiaWH(config-if)#c
rypto ipsec client ezvpn uk
RTRSlovakiaWH(config-if)#
000125: *Mar 1 00:04:02.631 UTC: %CRYPTO-6-ISAKMP_ON_OFF: ISAKMP is ON
000126: *Mar 1 00:04:02.631 UTC: ISAKMP: Looking for a matching key for 212.86.84.40 in default
000127: *Mar 1 00:04:02.635 UTC: ISAKMP: received ke message (1/1)
000128: *Mar 1 00:04:02.635 UTC: ISAKMP:(0:0:N/A:0): SA request profile is (NULL)
000129: *Mar 1 00:04:02.635 UTC: ISAKMP: Created a peer struct for 212.86.84.40, peer port 500
000130: *Mar 1 00:04:02.635 UTC: ISAKMP: Locking peer struct 0x81A6EFB4, IKE refcount 1 for isakmp_initiator
000131: *Mar 1 00:04:02.635 UTC: ISAKMP:(0:0:N/A:0):Setting
client config settings 81B52744
000132: *Mar 1 00:04:02.635 UTC: ISAKMP: local port 500, remote port 500
000133: *Mar 1 00:04:02.639 UTC: insert sa successfully sa = 818AB56C
000134: *Mar 1 00:04:02.639 UTC: ISAKMP:(0:1:HW:2): client mode configured.
000135: *Mar 1 00:04:02.639 UTC: ISAKMP:(0:1:HW:2): constructed NAT-T vendor-03 ID
000136: *Mar 1 00:04:02.643 UTC: ISAKMP:(0:1:HW:2): constructed NAT-T vendor-02 ID
A pre-shared key for address mask 212.86.84.40 255.255.255.255 already exists!
000137: *Mar 1 00:04:03.083 UTC: ISAKMP:(0:1:HW:2):SA is doing pre-shared key authentication plus XAUTH using id type ID_KEY_ID
000138: *Mar 1 00:04:03.083 UTC: ISAKMP (0:268435457): ID payload
next-payload : 13
type : 11
group id : NCHSlovakiaWH100
protocol : 17
port : 0
length : 24
000139: *Mar 1 00:04:03.083 UTC: ISAKMP:(0:1:HW:2):Total payload length: 24
000140: *Mar 1 00:04:03.083 UTC: ISAKMP:(0:1:HW:2):Input = IKE_MESG_FROM_IPSEC, IKE_SA_REQ_AM
000141: *Mar 1 00:04:03.083 UTC: ISAKMP:(0:1:HW:2):Old State = IKE_READY New State = ýo)úbal (I) AG_INIT_EXCH
000145: *Mar 1 00:04:03.423 UTC: ISAKMP:(0:1:HW:2): processing SA payload. message ID = 0
000146: *Mar 1 00:04:03.423 UTC: ISAKMP:(0:1:HW:2): processing ID payload. message ID = 0
000147: *Mar 1 00:04:03.423 UTC: ISAKMP (0:268435457): ID payload
next-payload : 8
type : 1
address : 212.86.84.40
protocol : 17
port : 0
length : 12
000148: *Mar 1 00:04:03.427 UTC: ISAKMP:(0:1:HW:2): processing vendor id payload
000149: *Mar 1 00:04:03.427 UTC: ISAKMP:(0:1:HW:2): vendor ID is Unity
000150: *Mar 1 00:04:03.427 UTC: ISAKMP:(0:1:HW:2): processing vendor id payload
000151: *Mar 1 00:04:03.427 UTC: ISAKMP:(0:1:HW:2): vendor ID seems Unity/DPD but major 215 mismatch
000152: *Mar 1 00:04:03.427 UTC: ISAKMP:(0:1:HW:2): vendor ID is XAUTH
000153: *Mar 1 00:04:03.427 UTC: ISAKMP:(0:1:HW:2): processing vendor id payload
000154: *Mar 1 00:04:03.427 UTC: ISAKMP:(0:1:HW:2): vendor ID is DPD
000155: *Mar 1 00:04:03.431 UTC: ISAKMP:(0:1:HW:2): local preshared key found
000156: *Mar 1 00:04:03.431 UTC: ISAKMP : Scanning profiles for xauth ...
000157: *Mar 1 00:04:03.431 UTC: ISAKMP:(0:1:HW:2): Authentication by xauth preshared
000158: *Mar 1 00:04:03.431 UTC: ISAKMP:(0:1:HW:2):Checking
ISAKMP transform 2 against priority 65527 policy
000159: *Mar 1 00:04:03.431 UTC: ISAKMP: encryption 3DES-CBC
000160: *Mar 1 00:04:03.431 UTC: ISAKMP: hash MD5
000161: *Mar 1 00:04:03.431 UTC: ISAKMP: default group 2
000162: *Mar 1 00:04:03.431 UTC: ISAKMP: auth XAUTHInitPreShared
000163: *Mar 1 00:04:03.435 UTC: ISAKMP: life type in seconds
000164: *Mar 1 00:04:03.435 UTC: ISAKMP: life duration (VPI) of 0x0 0x20 0xC4 0x9B
000165: *Mar 1 00:04:03.435 UTC: ISAKMP:(0:1:HW:2):Hash algorithm offered does not match policy!
000166: *Mar 1 00:04:03.435 UTC: ISAKMP:(0:1:HW:2):atts are not acceptable. Next payload is 0
000167: *Mar 1 00:04:03.435 UTC: ISAKMP:(0:1:HW:2):Checking
ISAKMP transform 2 against priority 65528 policy
000168: *Mar 1 00:04:03.435 UTC: ISAKMP: encryption 3DES-CBC
000169: *Mar 1 00:04:03.435 UTC: ISAKMP: hash MD5
000170: *Mar 1 00:04:03.435 UTC: ISAKMP: default group 2
000171: *Mar 1 00:04:03.439 UTC: ISAKMP: auth XAUTHInitPreShared
000172: *Mar 1 00:04:03.439 UTC: ISAKMP: life type in seconds
000173: *Mar 1 00:04:03.439 UTC: ISAKMP: life duration (VPI) of 0x0 0x20 0xC4 0x9B
000174: *Mar 1 00:04:03.439 UTC: ISAKMP:(0:1:HW:2):atts are acceptable. Next payload is 0
000175: *Mar 1 00:04:03.439 UTC: ISAKMP:(0:1:HW:2): processing KE payload. message ID = 0
000176: *Mar 1 00:04:03.879 UTC: ISAKMP:(0:1:HW:2): processing NONCE payload. message ID = 0
000177: *Mar 1 00:04:03.883 UTC: ISAKMP:(0:1:HW:2):SKEYID state generated
000178: *Mar 1 00:04:03.883 UTC: ISAKMP:(0:1:HW:2): processing HASH payload. message ID = 0
000179: *Mar 1 00:04:03.891 UTC: ISAKMP:(0:1:HW:2): vendor ID is NAT-T v2
000180: *Mar 1 00:04:03.891 UTC: ISAKMP:received payload type 17
000181: *Mar 1 00:04:03.891 UTC: ISAKMP:received payload type 17
000182: *Mar 1 00:04:03.891 UTC: ISAKMP:(0:1:HW:2):SA has been authenticated with 212.86.84.40
000183: *Mar 1 00:04:03.891 UTC: ISAKMP: Trying to insert a peer 211.86.83.218/212.86.84.40
/500/, and inserted successfully.
000184: *Mar 1 00:04:03.891 UTC: ISAKMP:(0:1:HW:2):: peer matches *none* of the profiles
000185: *Mar 1 00:04:03.891 UTC: ISAKMP:(0:1:HW:2):Send initial contact
000186: *Mar 1 00:04:03.899 UTC: ISAKMP:(0:1:HW:2): sending packet to 212.86.84.40 my_port 500 peer_port 500 (I) AG_INIT_EXCH
000187: *Mar 1 00:04:03.899 UTC: ISAKMP:(0:1:HW:2):Input = IKE_MESG_FROM_PEER, IKE_AM_EXCH
000188: *Mar 1 00:04:03.899 UTC: ISAKMP:(0:1:HW:2):Old State = IKE_I_AM1 New State = IKE_P1_COMPLETE
000189: *Mar 1 00:04:03.903 UTC: ISAKMP:(0:1:HW:2):Need XAUTH
000190: *Mar 1 00:04:03.903 UTC: ISAKMP:(0:1:HW:2):Input = IKE_MESG_INTERNAL, IKE_PHASE1_COMPLETE
000191: *Mar 1 00:04:03.903 UTC: ISAKMP:(0:1:HW:2):Old State = IKE_P1_COMPLETE New State = IKE_P1_COMPLETE
000192: *Mar 1 00:04:03.911 UTC: ISAKMP (0:268435457): received packet from 212.86.84.40 dport 500 sport 500 Global (I) CONF_XAUTH
000193: *Mar 1 00:04:03.911 UTC: ISAKMP: set new node 1393683013 to CONF_XAUTH
000194: *Mar 1 00:04:03.915 UTC: ISAKMP:(0:1:HW:2):processi
ng transaction payload from 212.86.84.40. message ID = 1393683013
000195: *Mar 1 00:04:03.919 UTC: ISAKMP: Config payload REQUEST
000196: *Mar 1 00:04:03.919 UTC: ISAKMP:(0:1:HW:2):checking
request:
000197: *Mar 1 00:04:03.919 UTC: ISAKMP: XAUTH_TYPE_V2
000198: *Mar 1 00:04:03.919 UTC: ISAKMP: XAUTH_USER_NAME_V2
000199: *Mar 1 00:04:03.919 UTC: ISAKMP: XAUTH_USER_PASSWORD_V2
000200: *Mar 1 00:04:03.923 UTC: ISAKMP: XAUTH_MESSAGE_V2
000201: *Mar 1 00:04:03.923 UTC: ISAKMP:(0:1:HW:2):Xauth process request
000202: *Mar 1 00:04:03.923 UTC: ISAKMP:(0:1:HW:2):Input = IKE_MESG_FROM_PEER, IKE_CFG_REQUEST
000203: *Mar 1 00:04:03.923 UTC: ISAKMP:(0:1:HW:2):Old State = IKE_P1_COMPLETE New State = IKE_XAUTH_REPLY_AWAIT
000204: *Mar 1 00:04:03.927 UTC: xauth-type: 0
000205: *Mar 1 00:04:03.927 UTC: username: NCHSlovakiaWH200
000206: *Mar 1 00:04:03.927 UTC: password: <omitted>
000207: *Mar 1 00:04:03.927 UTC: message <Enter Username and Password.>
000208: *Mar 1 00:04:03.931 UTC: ISAKMP:(0:1:HW:2): responding to peer config from 212.86.84.40. ID = 1393683013
000209: *Mar 1 00:04:03.931 UTC: ISAKMP:(0:1:HW:2): sending packet to 212.86.84.40 my_port 500 peer_port 500 (I) CONF_XAUTH
000210: *Mar 1 00:04:03.939 UTC: ISAKMP:(0:1:HW:2):deleting
node 1393683013 error FALSE reason "done with xauth request/reply exchange"
000211: *Mar 1 00:04:03.939 UTC: ISAKMP:(0:1:HW:2):Input = IKE_MESG_INTERNAL, IKE_XAUTH_REPLY_ATTR
000212: *Mar 1 00:04:03.939 UTC: ISAKMP:(0:1:HW:2):Old State = IKE_XAUTH_REPLY_AWAIT New State = IKE_XAUTH_REPLY_SENT
000213: *Mar 1 00:04:04.247 UTC: ISAKMP (0:268435457): received packet from 212.86.84.40 dport 500 sport 500 Global (I) CONF_XAUTH
000214: *Mar 1 00:04:04.247 UTC: ISAKMP: set new node -556280520 to CONF_XAUTH
000215: *Mar 1 00:04:04.251 UTC: ISAKMP:(0:1:HW:2):processi
ng transaction payload from 212.86.84.40. message ID = -556280520
000216: *Mar 1 00:04:04.255 UTC: ISAKMP: Config payload SET
000217: *Mar 1 00:04:04.255 UTC: ISAKMP:(0:1:HW:2):Xauth process set, status = 1
000218: *Mar 1 00:04:04.255 UTC: ISAKMP:(0:1:HW:2):checking
SET:
000219: *Mar 1 00:04:04.255 UTC: ISAKMP: XAUTH_STATUS_V2 XAUTH-OK
000220: *Mar 1 00:04:04.255 UTC: ISAKMP:(0:1:HW:2):attribut
es sent in message:
000221: *Mar 1 00:04:04.255 UTC: Status: 1
000222: *Mar 1 00:04:04.267 UTC: ISAKMP:(0:1:HW:2): sending packet to 212.86.84.40 my_port 500 peer_port 500 (I) CONF_XAUTH
000223: *Mar 1 00:04:04.267 UTC: ISAKMP:(0:1:HW:2):deleting
node -556280520 error FALSE reason ""
000224: *Mar 1 00:04:04.267 UTC: ISAKMP:(0:1:HW:2):Input = IKE_MESG_FROM_PEER, IKE_CFG_SET
000225: *Mar 1 00:04:04.267 UTC: ISAKMP:(0:1:HW:2):Old State = IKE_XAUTH_REPLY_SENT New State = IKE_P1_COMPLETE
000226: *Mar 1 00:04:04.271 UTC: ISAKMP:(0:1:HW:2):Need config/address
000227: *Mar 1 00:04:04.271 UTC: ISAKMP:(0:1:HW:2):Need config/address
000228: *Mar 1 00:04:04.271 UTC: ISAKMP: set new node -868256208 to CONF_ADDR
000229: *Mar 1 00:04:04.271 UTC: ISAKMP: Sending APPLICATION_VERSION string:
Cisco IOS Software, C831 Software (C831-K9O3SY6-M), Version 12.3(2)XE, EARLY DEPLOYMENT RELEASE SOFTWARE (fc1)
Synched to technology version 12.3(3.5)T
TAC Support:
http://www.cisco.com/tac
Copyright (c) 1986-2003 by Cisco Systems, Inc.
Compiled Wed 19-Nov-03 03:13 by ealyon
000230: *Mar 1 00:04:04.271 UTC: ISAKMP:(0:1:HW:2): initiating peer config to 212.86.84.40. ID = -868256208
000231: *Mar 1 00:04:04.275 UTC: ISAKMP:(0:1:HW:2): sending packet to 212.86.84.40 my_port 500 peer_port 500 (I) CONF_ADDR
000232: *Mar 1 00:04:04.275 UTC: ISAKMP:(0:1:HW:2):Input = IKE_MESG_INTERNAL, IKE_PHASE1_COMPLETE
000233: *Mar 1 00:04:04.275 UTC: ISAKMP:(0:1:HW:2):Old State = IKE_P1_COMPLETE New State = IKE_CONFIG_MODE_REQ_SENT
000234: *Mar 1 00:04:04.283 UTC: ISAKMP (0:268435457): received packet from 212.86.84.40 dport 500 sport 500 Global (I) CONF_ADDR
000235: *Mar 1 00:04:04.287 UTC: ISAKMP:(0:1:HW:2):processi
ng transaction payload from 212.86.84.40. message ID = -868256208
000236: *Mar 1 00:04:04.291 UTC: ISAKMP: Config payload REPLY
000237: *Mar 1 00:04:04.291 UTC: ISAKMP(0:268435457) process config reply
000238: *Mar 1 00:04:04.291 UTC: ISAKMP:(0:1:HW:2):deleting
node -868256208 error FALSE reason "done with transaction"
000239: *Mar 1 00:04:04.291 UTC: ISAKMP:(0:1:HW:2):Input = IKE_MESG_FROM_PEER, IKE_CFG_REPLY
000240: *Mar 1 00:04:04.291 UTC: ISAKMP:(0:1:HW:2):Old State = IKE_CONFIG_MODE_REQ_SENT New State = IKE_P1_COMPLETE
000241: *Mar 1 00:04:04.315 UTC: ISAKMP:(0:1:HW:2):Input = IKE_MESG_INTERNAL, IKE_PHASE1_COMPLETE
000242: *Mar 1 00:04:04.315 UTC: ISAKMP:(0:1:HW:2):Old State = IKE_P1_COMPLETE New State = IKE_P1_COMPLETE
000243: *Mar 1 00:04:04.315 UTC: IPSEC(sa_request): ,
(key eng. msg.) OUTBOUND local= 211.86.83.218, remote= 212.86.84.40,
local_proxy= 10.4.80.0/255.255.240.0/0/
0 (type=4),
remote_proxy= 10.0.0.0/255.255.240.0/0/0
(type=4),
protocol= ESP, transform= esp-3des esp-sha-hmac ,
lifedur= 2147483s and 4608000kb,
spi= 0xFF5455B9(4283717049), conn_id= 0, keysize= 0, flags= 0x400A
000244: *Mar 1 00:04:04.319 UTC: IPSEC(sa_request): ,
(key eng. msg.) OUTBOUND local= 211.86.83.218, remote= 212.86.84.40,
local_proxy= 10.4.80.0/255.255.240.0/0/
0 (type=4),
remote_proxy= 10.0.0.0/255.255.240.0/0/0
(type=4),
protocol= ESP, transform= esp-3des esp-md5-hmac ,
lifedur= 2147483s and 4608000kb,
spi= 0x28BE689F(683567263), conn_id= 0, keysize= 0, flags= 0x400A
000245: *Mar 1 00:04:04.319 UTC: IPSEC(sa_request): ,
(key eng. msg.) OUTBOUND local= 211.86.83.218, remote= 212.86.84.40,
local_proxy= 10.4.80.0/255.255.240.0/0/
0 (type=4),
remote_proxy= 10.0.0.0/255.255.240.0/0/0
(type=4),
protocol= ESP, transform= esp-des esp-sha-hmac ,
lifedur= 2147483s and 4608000kb,
spi= 0x4F649719(1331992345), conn_id= 0, keysize= 0, flags= 0x400A
000246: *Mar 1 00:04:04.323 UTC: IPSEC(sa_request): ,
(key eng. msg.) OUTBOUND local= 211.86.83.218, remote= 212.86.84.40,
local_proxy= 10.4.80.0/255.255.240.0/0/
0 (type=4),
remote_proxy= 10.0.0.0/255.255.240.0/0/0
(type=4),
protocol= ESP, transform= esp-des esp-md5-hmac ,
lifedur= 2147483s and 4608000kb,
spi= 0xCA427891(3393353873), conn_id= 0, keysize= 0, flags= 0x400A
000247: *Mar 1 00:04:04.327 UTC: ISAKMP: received ke message (1/4)
000248: *Mar 1 00:04:04.327 UTC: ISAKMP: set new node 0 to QM_IDLE
000249: *Mar 1 00:04:04.327 UTC: ISAKMP:(0:1:HW:2): sitting IDLE. Starting QM immediately (QM_IDLE )
000250: *Mar 1 00:04:04.327 UTC: ISAKMP:(0:1:HW:2):beginnin
g Quick Mode exchange, M-ID of -1767969252
000251: *Mar 1 00:04:04.339 UTC: IPSEC(sa_request): ,
(key eng. msg.) OUTBOUND local= 211.86.83.218, remote= 212.86.84.40,
local_proxy= 10.4.80.0/255.255.240.0/0/
0 (type=4),
remote_proxy= 172.17.0.0/255.255.0.0/0/0
(type=4),
protocol= ESP, transform= esp-3des esp-sha-hmac ,
lifedur= 2147483s and 4608000kb,
spi= 0xB8711355(3094418261), conn_id= 0, keysize= 0, flags= 0x400A
000252: *Mar 1 00:04:04.347 UTC: IPSEC(sa_request): ,
(key eng. msg.) OUTBOUND local= 211.86.83.218, remote= 212.86.84.40,
local_proxy= 10.4.80.0/255.255.240.0/0/
0 (type=4),
remote_proxy= 172.17.0.0/255.255.0.0/0/0
(type=4),
protocol= ESP, transform= esp-3des esp-md5-hmac ,
lifedur= 2147483s and 4608000kb,
spi= 0x81E02099(2178949273), conn_id= 0, keysize= 0, flags= 0x400A
000253: *Mar 1 00:04:04.347 UTC: IPSEC(sa_request): ,
(key eng. msg.) OUTBOUND local= 211.86.83.218, remote= 212.86.84.40,
local_proxy= 10.4.80.0/255.255.240.0/0/
0 (type=4),
remote_proxy= 172.17.0.0/255.255.0.0/0/0
(type=4),
protocol= ESP, transform= esp-des esp-sha-hmac ,
lifedur= 2147483s and 4608000kb,
spi= 0x4E143C9B(1309949083), conn_id= 0, keysize= 0, flags= 0x400A
000254: *Mar 1 00:04:04.351 UTC: IPSEC(sa_request): ,
(key eng. msg.) OUTBOUND local= 211.86.83.218, remote= 212.86.84.40,
local_proxy= 10.4.80.0/255.255.240.0/0/
0 (type=4),
remote_proxy= 172.17.0.0/255.255.0.0/0/0
(type=4),
protocol= ESP, transform= esp-des esp-md5-hmac ,
lifedur= 2147483s and 4608000kb,
spi= 0xE4B6ABFE(3837176830), conn_id= 0, keysize= 0, flags= 0x400A
000255: *Mar 1 00:04:04.359 UTC: ISAKMP:(0:1:HW:2): sending packet to 212.86.84.40 my_port 500 peer_port 500 (I) QM_IDLE
000256: *Mar 1 00:04:04.359 UTC: ISAKMP:(0:1:HW:2):Node -1767969252, Input = IKE_MESG_INTERNAL, IKE_INIT_QM
000257: *Mar 1 00:04:04.359 UTC: ISAKMP:(0:1:HW:2):Old State = IKE_QM_READY New State = IKE_QM_I_QM1
000258: *Mar 1 00:04:04.359 UTC: ISAKMP: received ke message (1/4)
000259: *Mar 1 00:04:04.359 UTC: ISAKMP: set new node 0 to QM_IDLE
000260: *Mar 1 00:04:04.359 UTC: ISAKMP:(0:1:HW:2): sitting IDLE. Starting QM immediately (QM_IDLE )
000261: *Mar 1 00:04:04.359 UTC: ISAKMP:(0:1:HW:2):beginnin
g Quick Mode exchange, M-ID of 808372997
000262: *Mar 1 00:04:04.367 UTC: IPSEC(sa_request): ,
(key eng. msg.) OUTBOUND local= 211.86.83.218, remote= 212.86.84.40,
local_proxy= 10.4.80.0/255.255.240.0/0/
0 (type=4),
remote_proxy= 10.0.16.71/255.255.255.255
/0/0 (type=1),
protocol= ESP, transform= esp-3des esp-sha-hmac ,
lifedur= 2147483s and 4608000kb,
spi= 0xF88A3E55(4169809493), conn_id= 0, keysize= 0, flags= 0x400A
000263: *Mar 1 00:04:04.371 UTC: IPSEC(sa_request): ,
(key eng. msg.) OUTBOUND local= 211.86.83.218, remote= 212.86.84.40,
local_proxy= 10.4.80.0/255.255.240.0/0/
0 (type=4),
remote_proxy= 10.0.16.71/255.255.255.255
/0/0 (type=1),
protocol= ESP, transform= esp-3des esp-md5-hmac ,
lifedur= 2147483s and 4608000kb,
spi= 0x592F1CBC(1496259772), conn_id= 0, keysize= 0, flags= 0x400A
000264: *Mar 1 00:04:04.371 UTC: IPSEC(sa_request): ,
(key eng. msg.) OUTBOUND local= 211.86.83.218, remote= 212.86.84.40,
local_proxy= 10.4.80.0/255.255.240.0/0/
0 (type=4),
remote_proxy= 10.0.16.71/255.255.255.255
/0/0 (type=1),
protocol= ESP, transform= esp-des esp-sha-hmac ,
lifedur= 2147483s and 4608000kb,
spi= 0x41869D2C(1099341100), conn_id= 0, keysize= 0, flags= 0x400A
000265: *Mar 1 00:04:04.375 UTC: IPSEC(sa_request): ,
(key eng. msg.) OUTBOUND local= 211.86.83.218, remote= 212.86.84.40,
local_proxy= 10.4.80.0/255.255.240.0/0/
0 (type=4),
remote_proxy= 10.0.16.71/255.255.255.255
/0/0 (type=1),
protocol= ESP, transform= esp-des esp-md5-hmac ,
lifedur= 2147483s and 4608000kb,
spi= 0xBF73A07C(3212025980), conn_id= 0, keysize= 0, flags= 0x400A
000266: *Mar 1 00:04:04.391 UTC: IPSEC(sa_request): ,
(key eng. msg.) OUTBOUND local= 211.86.83.218, remote= 212.86.84.40,
local_proxy= 10.4.80.0/255.255.240.0/0/
0 (type=4),
remote_proxy= 10.0.80.0/255.255.240.0/0/
0 (type=4),
protocol= ESP, transform= esp-3des esp-sha-hmac ,
lifedur= 2147483s and 4608000kb,
spi= 0xF8F7F182(4176998786), conn_id= 0, keysize= 0, flags= 0x400A
000267: *Mar 1 00:04:04.395 UTC: IPSEC(sa_request): ,
(key eng. msg.) OUTBOUND local= 211.86.83.218, remote= 212.86.84.40,
local_proxy= 10.4.80.0/255.255.240.0/0/
0 (type=4),
remote_proxy= 10.0.80.0/255.255.240.0/0/
0 (type=4),
protocol= ESP, transform= esp-3des esp-md5-hmac ,
lifedur= 2147483s and 4608000kb,
spi= 0x1F9A25DA(530195930), conn_id= 0, keysize= 0, flags= 0x400A
000268: *Mar 1 00:04:04.395 UTC: IPSEC(sa_request): ,
(key eng. msg.) OUTBOUND local= 211.86.83.218, remote= 212.86.84.40,
local_proxy= 10.4.80.0/255.255.240.0/0/
0 (type=4),
remote_proxy= 10.0.80.0/255.255.240.0/0/
0 (type=4),
protocol= ESP, transform= esp-des esp-sha-hmac ,
lifedur= 2147483s and 4608000kb,
spi= 0x7A977E69(2056748649), conn_id= 0, keysize= 0, flags= 0x400A
000269: *Mar 1 00:04:04.399 UTC: IPSEC(sa_request): ,
(key eng. msg.) OUTBOUND local= 211.86.83.218, remote= 212.86.84.40,
local_proxy= 10.4.80.0/255.255.240.0/0/
0 (type=4),
remote_proxy= 10.0.80.0/255.255.240.0/0/
0 (type=4),
protocol= ESP, transform= esp-des esp-md5-hmac ,
lifedur= 2147483s and 4608000kb,
spi= 0xDDA2D5E4(3718436324), conn_id= 0, keysize= 0, flags= 0x400A
000270: *Mar 1 00:04:04.403 UTC: ISAKMP:(0:1:HW:2): sending packet to 212.86.84.40 my_port 500 peer_port 500 (I) QM_IDLE
000271: *Mar 1 00:04:04.407 UTC: ISAKMP:(0:1:HW:2):Node 808372997, Input = IKE_MESG_INTERNAL, IKE_INIT_QM
000272: *Mar 1 00:04:04.407 UTC: ISAKMP:(0:1:HW:2):Old State = IKE_QM_READY New State = IKE_QM_I_QM1
000273: *Mar 1 00:04:04.415 UTC: IPSEC(sa_request): ,
(key eng. msg.) OUTBOUND local= 211.86.83.218, remote= 212.86.84.40,
local_proxy= 10.4.80.0/255.255.240.0/0/
0 (type=4),
remote_proxy= 10.2.128.0/255.255.240.0/0
/0 (type=4),
protocol= ESP, transform= esp-3des esp-sha-hmac ,
lifedur= 2147483s and 4608000kb,
spi= 0x3AE2B059(987934809), conn_id= 0, keysize= 0, flags= 0x400A
000274: *Mar 1 00:04:04.415 UTC: IPSEC(sa_request): ,
(key eng. msg.) OUTBOUND local= 211.86.83.218, remote= 212.86.84.40,
local_proxy= 10.4.80.0/255.255.240.0/0/
0 (type=4),
remote_proxy= 10.2.128.0/255.255.240.0/0
/0 (type=4),
protocol= ESP, transform= esp-3des esp-md5-hmac ,
lifedur= 2147483s and 4608000kb,
spi= 0x46A4B4A3(1185199267), conn_id= 0, keysize= 0, flags= 0x400A
000275: *Mar 1 00:04:04.419 UTC: IPSEC(sa_request): ,
(key eng. msg.) OUTBOUND local= 211.86.83.218, remote= 212.86.84.40,
local_proxy= 10.4.80.0/255.255.240.0/0/
0 (type=4),
remote_proxy= 10.2.128.0/255.255.240.0/0
/0 (type=4),
protocol= ESP, transform= esp-des esp-sha-hmac ,
lifedur= 2147483s and 4608000kb,
spi= 0x8173E299(2171855513), conn_id= 0, keysize= 0, flags= 0x400A
000276: *Mar 1 00:04:04.419 UTC: IPSEC(sa_request): ,
(key eng. msg.) OUTBOUND local= 211.86.83.218, remote= 212.86.84.40,
local_proxy= 10.4.80.0/255.255.240.0/0/
0 (type=4),
remote_proxy= 10.2.128.0/255.255.240.0/0
/0 (type=4),
protocol= ESP, transform= esp-des esp-md5-hmac ,
lifedur= 2147483s and 4608000kb,
spi= 0xA31707A3(2736195491), conn_id= 0, keysize= 0, flags= 0x400A
000277: *Mar 1 00:04:04.423 UTC: ISAKMP (0:268435457): received packet from 212.86.84.40 dport 500 sport 500 Global (I) QM_IDLE
000278: *Mar 1 00:04:04.423 UTC: ISAKMP: set new node -833937446 to QM_IDLE
000279: *Mar 1 00:04:04.431 UTC: ISAKMP:(0:1:HW:2): processing HASH payload. message ID = -833937446
000280: *Mar 1 00:04:04.431 UTC: ISAKMP:(0:1:HW:2): processing NOTIFY RESPONDER_LIFETIME protocol 1
spi 0, message ID = -833937446, sa = 818AB56C
000281: *Mar 1 00:04:04.431 UTC: ISAKMP:(0:1:HW:2): processing responder lifetime
000282: *Mar 1 00:04:04.431 UTC: ISAKMP:(0:1:HW:2): start processing isakmp responder lifetime
000283: *Mar 1 00:04:04.431 UTC: ISAKMP:(0:1:HW:2): restart ike sa timer to 86400 secs
000284: *Mar 1 00:04:04.439 UTC: ISAKMP:(0:1:HW:2):deleting
node -833937446 error FALSE reason "informational (in) state 1"
000285: *Mar 1 00:04:04.439 UTC: ISAKMP:(0:1:HW:2):Input = IKE_MESG_FROM_PEER, IKE_INFO_NOTIFY
000286: *Mar 1 00:04:04.439 UTC: ISAKMP:(0:1:HW:2):Old State = IKE_P1_COMPLETE New State = IKE_P1_COMPLETE
000287: *Mar 1 00:04:04.439 UTC: ISAKMP (0:268435457): received packet from 212.86.84.40 dport 500 sport 500 Global (I) QM_IDLE
000288: *Mar 1 00:04:04.439 UTC: ISAKMP: set new node -527525587 to QM_IDLE
000289: *Mar 1 00:04:04.443 UTC: ISAKMP:(0:1:HW:2): processing HASH payload. message ID = -527525587
000290: *Mar 1 00:04:04.443 UTC: ISAKMP:(0:1:HW:2): processing DELETE payload. message ID = -527525587
000291: *Mar 1 00:04:04.443 UTC: ISAKMP:(0:1:HW:2):peer does not do paranoid keepalives.
000292: *Mar 1 00:04:04.443 UTC: ISAKMP:(0:1:HW:2):deleting
SA reason "P1 delete notify (in)" state (I) QM_IDLE (peer 212.86.84.40) input queue 0
000293: *Mar 1 00:04:04.443 UTC: ISAKMP:(0:1:HW:2):deleting
node -527525587 error FALSE reason "informational (in) state 1"
000294: *Mar 1 00:04:04.447 UTC: ISAKMP:(0:1:HW:2):Input = IKE_MESG_FROM_PEER, IKE_INFO_DELETE
000295: *Mar 1 00:04:04.447 UTC: ISAKMP:(0:1:HW:2):Old State = IKE_P1_COMPLETE New State = IKE_P1_COMPLETE
000296: *Mar 1 00:04:04.447 UTC: ISAKMP: received ke message (1/4)
000297: *Mar 1 00:04:04.447 UTC: ISAKMP: set new node 0 to QM_IDLE
000298: *Mar 1 00:04:04.447 UTC: ISAKMP:(0:1:HW:2): sitting IDLE. Starting QM immediately (QM_IDLE )
000299: *Mar 1 00:04:04.447 UTC: ISAKMP:(0:1:HW:2):beginnin
g Quick Mode exchange, M-ID of 297923612
000300: *Mar 1 00:04:04.455 UTC: ISAKMP:(0:1:HW:2): sending packet to 212.86.84.40 my_port 500 peer_port 500 (I) QM_IDLE
000301: *Mar 1 00:04:04.455 UTC: ISAKMP:(0:1:HW:2):Node 297923612, Input = IKE_MESG_INTERNAL, IKE_INIT_QM
000302: *Mar 1 00:04:04.455 UTC: ISAKMP:(0:1:HW:2):Old State = IKE_QM_READY New State = IKE_QM_I_QM1
000303: *Mar 1 00:04:04.459 UTC: ISAKMP:(0:1:HW:2):Input = IKE_MESG_INTERNAL, IKE_PHASE1_DEL
000304: *Mar 1 00:04:04.459 UTC: ISAKMP:(0:1:HW:2):Old State = IKE_P1_COMPLETE New State = IKE_DEST_SA
000305: *Mar 1 00:04:04.459 UTC: ISAKMP: received ke message (1/4)
000306: *Mar 1 00:04:04.459 UTC: ISAKMP: set new node 0 to QM_IDLE
000307: *Mar 1 00:04:04.463 UTC: ISAKMP:(0:1:HW:2): sitting IDLE. Starting QM immediately (QM_IDLE )
000308: *Mar 1 00:04:04.463 UTC: ISAKMP:(0:1:HW:2):beginnin
g Quick Mode exchange, M-ID of 2017300063
000309: *Mar 1 00:04:04.471 UTC: ISAKMP:(0:1:HW:2): sending packet to 212.86.84.40 my_port 500 peer_port 500 (I) QM_IDLE
000310: *Mar 1 00:04:04.471 UTC: ISAKMP:(0:1:HW:2):Node 2017300063, Input = IKE_MESG_INTERNAL, IKE_INIT_QM
000311: *Mar 1 00:04:04.471 UTC: ISAKMP:(0:1:HW:2):Old State = IKE_QM_READY New State = IKE_QM_I_QM1
000312: *Mar 1 00:04:04.475 UTC: ISAKMP (0:268435457): received packet from 212.86.84.40 dport 500 sport 500 Global (I) QM_IDLE
000313: *Mar 1 00:04:04.475 UTC: ISAKMP (0:268435457): received packet from 212.86.84.40 dport 500 sport 500 Global (I) QM_IDLE
000314: *Mar 1 00:04:04.479 UTC: ISAKMP:(0:1:HW:2):deleting
SA reason "" state (I) QM_IDLE (peer 212.86.84.40) input queue 0
000315: *Mar 1 00:04:04.479 UTC: ISAKMP: Unlocking IKE struct 0x81A6EFB4 for isadb_mark_sa_deleted(), count 0
000316: *Mar 1 00:04:04.479 UTC: ISAKMP: Deleting peer node by peer_reap for 212.86.84.40: 81A6EFB4
000317: *Mar 1 00:04:04.483 UTC: ISAKMP:(0:1:HW:2):deleting
node -1767969252 error FALSE reason ""
000318: *Mar 1 00:04:04.483 UTC: ISAKMP:(0:1:HW:2):deleting
node 808372997 error FALSE reason ""
000319: *Mar 1 00:04:04.483 UTC: ISAKMP:(0:1:HW:2):deleting
node 297923612 error FALSE reason ""
000320: *Mar 1 00:04:04.487 UTC: ISAKMP:(0:1:HW:2):deleting
node 2017300063 error FALSE reason ""
000321: *Mar 1 00:04:04.487 UTC: ISAKMP:(0:1:HW:2):Input = IKE_MESG_FROM_PEER, IKE_MM_EXCH
000322: *Mar 1 00:04:04.487 UTC: ISAKMP:(0:1:HW:2):Old State = IKE_DEST_SA New State = IKE_DEST_SA
000323: *Mar 1 00:04:04.487 UTC: ISAKMP: received ke message (1/4)
000324: *Mar 1 00:04:04.487 UTC: ISAKMP: set new node 0 to QM_IDLE
000325: *Mar 1 00:04:04.487 UTC: ISAKMP:(0:1:HW:2): beginning Main Mode exchange
000326: *Mar 1 00:04:04.519 UTC: ISAKMP: received ke message (1/1)
000327: *Mar 1 00:04:04.523 UTC: ISAKMP:(0:0:N/A:0): SA request profile is (NULL)
000328: *Mar 1 00:04:04.523 UTC: ISAKMP: Created a peer struct for 212.86.84.40, peer port 500
000329: *Mar 1 00:04:04.523 UTC: ISAKMP: Locking peer struct 0x818AAADC, IKE refcount 1 for isakmp_initiator
000330: *Mar 1 00:04:04.523 UTC: ISAKMP:(0:0:N/A:0):Setting
client config settings 8153B2EC
000331: *Mar 1 00:04:04.523 UTC: ISAKMP: local port 500, remote port 500
000332: *Mar 1 00:04:04.527 UTC: ISAKMP: Find a dup sa in the avl tree during calling isadb_insert sa = 81C345E8
000333: *Mar 1 00:04:04.527 UTC: ISAKMP:(0:2:HW:2): client mode configured.
000334: *Mar 1 00:04:04.527 UTC: ISAKMP:(0:2:HW:2): constructed NAT-T vendor-03 ID
000335: *Mar 1 00:04:04.531 UTC: ISAKMP:(0:2:HW:2): constructed NAT-T vendor-02 ID
000336: *Mar 1 00:04:04.979 UTC: ISAKMP:(0:2:HW:2):SA is doing pre-shared key authentication plus XAUTH using id type ID_KEY_ID
000337: *Mar 1 00:04:04.979 UTC: ISAKMP (0:268435458): ID payload
next-payload : 13
type : 11
group id : NCHSlovakiaWH100
protocol : 17
port : 0
length : 24
000338: *Mar 1 00:04:04.979 UTC: ISAKMP:(0:2:HW:2):Total payload length: 24
000339: *Mar 1 00:04:04.979 UTC: ISAKMP:(0:2:HW:2):Input = IKE_MESG_FROM_IPSEC, IKE_SA_REQ_AM
000340: *Mar 1 00:04:04.983 UTC: ISAKMP:(0:2:HW:2):Old State = IKE_READY New State = IKE_I_AM1
000341: *Mar 1 00:04:04.983 UTC: ISAKMP:(0:2:HW:2): beginning Aggressive Mode exchange
000342: *Mar 1 00:04:04.983 UTC: ISAKMP:(0:2:HW:2): sending packet to 212.86.84.40 my_port 500 peer_port 500 (I) AG_INIT_EXCH
000343: *Mar 1 00:04:05.323 UTC: ISAKMP (0:268435458): received packet from 212.86.84.40 dport 500 sport 500 Global (I) AG_INIT_EXCH
000344: *Mar 1 00:04:05.327 UTC: ISAKMP:(0:2:HW:2): processing SA payload. message ID = 0
000345: *Mar 1 00:04:05.327 UTC: ISAKMP:(0:2:HW:2): processing ID payload. message ID = 0
000346: *Mar 1 00:04:05.327 UTC: ISAKMP (0:268435458): ID payload
next-payload : 8
type : 1
address : 212.86.84.40
protocol : 17
port : 0
length : 12
000347: *Mar 1 00:04:05.327 UTC: ISAKMP:(0:2:HW:2): processing vendor id payload
000348: *Mar 1 00:04:05.327 UTC: ISAKMP:(0:2:HW:2): vendor ID is Unity
000349: *Mar 1 00:04:05.331 UTC: ISAKMP:(0:2:HW:2): processing vendor id payload
000350: *Mar 1 00:04:05.331 UTC: ISAKMP:(0:2:HW:2): vendor ID seems Unity/DPD but major 215 mismatch
000351: *Mar 1 00:04:05.331 UTC: ISAKMP:(0:2:HW:2): vendor ID is XAUTH
000352: *Mar 1 00:04:05.331 UTC: ISAKMP:(0:2:HW:2): processing vendor id payload
000353: *Mar 1 00:04:05.331 UTC: ISAKMP:(0:2:HW:2): vendor ID is DPD
000354: *Mar 1 00:04:05.331 UTC: ISAKMP:(0:2:HW:2): local preshared key found
000355: *Mar 1 00:04:05.331 UTC: ISAKMP : Scanning profiles for xauth ...
000356: *Mar 1 00:04:05.335 UTC: ISAKMP:(0:2:HW:2): Authentication by xauth preshared
000357: *Mar 1 00:04:05.335 UTC: ISAKMP:(0:2:HW:2):Checking
ISAKMP transform 2 against priority 65527 policy
000358: *Mar 1 00:04:05.335 UTC: ISAKMP: encryption 3DES-CBC
000359: *Mar 1 00:04:05.335 UTC: ISAKMP: hash MD5
000360: *Mar 1 00:04:05.335 UTC: ISAKMP: default group 2
000361: *Mar 1 00:04:05.335 UTC: ISAKMP: auth XAUTHInitPreShared
000362: *Mar 1 00:04:05.335 UTC: ISAKMP: life type in seconds
000363: *Mar 1 00:04:05.335 UTC: ISAKMP: life duration (VPI) of 0x0 0x20 0xC4 0x9B
000364: *Mar 1 00:04:05.335 UTC: ISAKMP:(0:2:HW:2):Hash algorithm offered does not match policy!
000365: *Mar 1 00:04:05.339 UTC: ISAKMP:(0:2:HW:2):atts are not acceptable. Next payload is 0
000366: *Mar 1 00:04:05.339 UTC: ISAKMP:(0:2:HW:2):Checking
ISAKMP transform 2 against priority 65528 policy
000367: *Mar 1 00:04:05.339 UTC: ISAKMP: encryption 3DES-CBC
000368: *Mar 1 00:04:05.339 UTC: ISAKMP: hash MD5
000369: *Mar 1 00:04:05.339 UTC: ISAKMP: default group 2
000370: *Mar 1 00:04:05.339 UTC: ISAKMP: auth XAUTHInitPreShared
000371: *Mar 1 00:04:05.339 UTC: ISAKMP: life type in seconds
000372: *Mar 1 00:04:05.343 UTC: ISAKMP: life duration (VPI) of 0x0 0x20 0xC4 0x9B
000373: *Mar 1 00:04:05.343 UTC: ISAKMP:(0:2:HW:2):atts are acceptable. Next payload is 0
000374: *Mar 1 00:04:05.343 UTC: ISAKMP:(0:2:HW:2): processing KE payload. message ID = 0
000375: *Mar 1 00:04:05.775 UTC: ISAKMP:(0:2:HW:2): processing NONCE payload. message ID = 0
000376: *Mar 1 00:04:05.783 UTC: ISAKMP:(0:2:HW:2):SKEYID state generated
000377: *Mar 1 00:04:05.783 UTC: ISAKMP:(0:2:HW:2): processing HASH payload. message ID = 0
000378: *Mar 1 00:04:05.791 UTC: ISAKMP:(0:2:HW:2): vendor ID is NAT-T v2
000379: *Mar 1 00:04:05.791 UTC: ISAKMP:received payload type 17
000380: *Mar 1 00:04:05.791 UTC: ISAKMP:received payload type 17
000381: *Mar 1 00:04:05.791 UTC: ISAKMP:(0:2:HW:2):SA has been authenticated with 212.86.84.40
000382: *Mar 1 00:04:05.791 UTC: ISAKMP: Trying to insert a peer 211.86.83.218/212.86.84.40
/500/, and inserted successfully.
000383: *Mar 1 00:04:05.791 UTC: ISAKMP:(0:2:HW:2):: peer matches *none* of the profiles
000384: *Mar 1 00:04:05.795 UTC: ISAKMP:(0:2:HW:2):Send initial contact
000385: *Mar 1 00:04:05.799 UTC: ISAKMP:(0:2:HW:2): sending packet to 212.86.84.40 my_port 500 peer_port 500 (I) AG_INIT_EXCH
000386: *Mar 1 00:04:05.799 UTC: ISAKMP:(0:2:HW:2):Input = IKE_MESG_FROM_PEER, IKE_AM_EXCH
000387: *Mar 1 00:04:05.799 UTC: ISAKMP:(0:2:HW:2):Old State = IKE_I_AM1 New State = IKE_P1_COMPLETE
000388: *Mar 1 00:04:05.799 UTC: ISAKMP:(0:2:HW:2):Need XAUTH
000389: *Mar 1 00:04:05.799 UTC: ISAKMP:(0:2:HW:2):Input = IKE_MESG_INTERNAL, IKE_PHASE1_COMPLETE
000390: *Mar 1 00:04:05.803 UTC: ISAKMP:(0:2:HW:2):Old State = IKE_P1_COMPLETE New State = IKE_P1_COMPLETE
000391: *Mar 1 00:04:05.811 UTC: ISAKMP (0:268435458): received packet from 212.86.84.40 dport 500 sport 500 Global (I) CONF_XAUTH
000392: *Mar 1 00:04:05.811 UTC: ISAKMP: set new node -1006186145 to CONF_XAUTH
000393: *Mar 1 00:04:05.815 UTC: ISAKMP:(0:2:HW:2):processi
ng transaction payload from 212.86.84.40. message ID = -1006186145
000394: *Mar 1 00:04:05.819 UTC: ISAKMP: Config payload REQUEST
000395: *Mar 1 00:04:05.819 UTC: ISAKMP:(0:2:HW:2):checking
request:
000396: *Mar 1 00:04:05.819 UTC: ISAKMP: XAUTH_TYPE_V2
000397: *Mar 1 00:04:05.819 UTC: ISAKMP: XAUTH_USER_NAME_V2
000398: *Mar 1 00:04:05.819 UTC: ISAKMP: XAUTH_USER_PASSWORD_V2
000399: *Mar 1 00:04:05.819 UTC: ISAKMP: XAUTH_MESSAGE_V2
000400: *Mar 1 00:04:05.819 UTC: ISAKMP:(0:2:HW:2):Xauth process request
000401: *Mar 1 00:04:05.819 UTC: ISAKMP:(0:2:HW:2):Input = IKE_MESG_FROM_PEER, IKE_CFG_REQUEST
000402: *Mar 1 00:04:05.823 UTC: ISAKMP:(0:2:HW:2):Old State = IKE_P1_COMPLETE New State = IKE_XAUTH_REPLY_AWAIT
000403: *Mar 1 00:04:05.823 UTC: xauth-type: 0
000404: *Mar 1 00:04:05.823 UTC: username: NCHSlovakiaWH200
000405: *Mar 1 00:04:05.823 UTC: password: <omitted>
000411: *Mar 1 00:04:05.835 UTC: ISAKMP:(0:2:HW:2):Old State = IKE_XAUTH_REPLY_AWAIT New State = IKE_XAUTH_REPLY_SENT
000412: *Mar 1 00:04:06.175 UTC: ISAKMP (0:268435458): received packet from 212.86.84.40 dport 500 sport 500 Global (I) CONF_XAUTH
000413: *Mar 1 00:04:06.175 UTC: ISAKMP: set new node -1101248849 to CONF_XAUTH
000414: *Mar 1 00:04:06.179 UTC: ISAKMP:(0:2:HW:2):processi
ng transaction payload from 212.86.84.40. message ID = -1101248849
000415: *Mar 1 00:04:06.183 UTC: ISAKMP: Config payload SET
000416: *Mar 1 00:04:06.183 UTC: ISAKMP:(0:2:HW:2):Xauth process set, status = 1
000417: *Mar 1 00:04:06.183 UTC: ISAKMP:(0:2:HW:2):checking
SET:
000429: *Mar 1 00:04:06.203 UTC: ISAKMP:(0:2:HW:2): initiating peer config to 212.86.84.40. ID = -1249823783
000430: *Mar 1 00:04:06.203 UTC: ISAKMP:(0:2:HW:2): sending packet to 212.86.84.40 my_port 500 peer_port 500 (I) CONF_ADDR
000431: *Mar 1 00:04:06.203 UTC: ISAKMP:(0:2:HW:2):Input = IKE_MESG_INTERNAL, IKE_PHASE1_COMPLETE
000432: *Mar 1 00:04:06.203 UTC: ISAKMP:(0:2:HW:2):Old State = IKE_P1_COMPLETE New State = IKE_CONFIG_MODE_REQ_SENT
000433: *Mar 1 00:04:06.859 UTC: ISAKMP (0:268435458): received packet from 212.86.84.40 dport 500 sport 500 Global (I) CONF_ADDR
000452: *Mar 1 00:04:14.211 UTC: ISAKMP (0:268435458): received packet from 212.86.84.40 dport 500 sport 500 Global (I) QM_IDLE
000453: *Mar 1 00:04:14.211 UTC: ISAKMP:(0:2:HW:2): phase 2 packet is a duplicate of a previous packet.
000454: *Mar 1 00:04:14.211 UTC: ISAKMP:(0:2:HW:2): retransmitting due to retransmit phase 2
000455: *Mar 1 00:04:14.211 UTC: ISAKMP:(0:2:HW:2): retransmitting phase 2 QM_IDLE -1249823783 ...
000456: *Mar 1 00:04:14.711 UTC: ISAKMP:(0:2:HW:2): retransmitting phase 2 QM_IDLE -1249823783 ...
000457: *Mar 1 00:04:14.711 UTC: ISAKMP:(0:2:HW:2):incremen
ting error counter on sa: retransmit phase 2
000458: *Mar 1 00:04:14.711 UTC: ISAKMP:(0:2:HW:2):incremen
ting error counter on sa: retransmit phase 2
000459: *Mar 1 00:04:14.711 UTC: ISAKMP:(0:2:HW:2): retransmitting phase 2 -1249823783 QM_IDLE
000460: *Mar 1 00:04:14.711 UTC: ISAKMP:(0:2:HW:2): sending packet to 212.86.84.40 my_port 500 peer_port 500 (I) QM_IDLE
000461: *Mar 1 00:04:19.095 UTC: IPSEC(key_engine): major = 1
000462: *Mar 1 00:04:19.095 UTC: IPSEC(key_engine): expired_timer
000463: *Mar 1 00:04:22.211 UTC: ISAKMP (0:268435458): received packet from 212.86.84.40 dport 500 sport 500 Global (I) QM_IDLE
000464: *Mar 1 00:04:22.211 UTC: ISAKMP:(0:2:HW:2): phase 2 packet is a duplicate of a previous packet.
000465: *Mar 1 00:04:22.211 UTC: ISAKMP:(0:2:HW:2): retransmitting due to retransmit phase 2
000466: *Mar 1 00:04:22.211 UTC: ISAKMP:(0:2:HW:2): retransmitting phase 2 QM_IDLE -1249823783 ...
000467: *Mar 1 00:04:22.711 UTC: ISAKMP:(0:2:HW:2): retransmitting phase 2 QM_IDLE -1249823783 ...
000468: *Mar 1 00:04:22.711 UTC: ISAKMP:(0:2:HW:2):incremen
ting error counter on sa: retransmit phase 2
000469: *Mar 1 00:04:22.711 UTC: ISAKMP:(0:2:HW:2):incremen
ting error counter on sa: retransmit phase 2
000470: *Mar 1 00:04:22.711 UTC: ISAKMP:(0:2:HW:2): retransmitting phase 2 -1249823783 QM_IDLE
000471: *Mar 1 00:04:22.711 UTC: ISAKMP:(0:2:HW:2): sending packet to 212.86.84.40 my_port 500 peer_port 500 (I) QM_IDLE
000472: *Mar 1 00:04:22.715 UTC: ISAKMP (0:268435458): received packet from 212.86.84.40 dport 500 sport 500 Global (I) QM_IDLE
000473: *Mar 1 00:04:22.719 UTC: ISAKMP:(0:2:HW:2): phase 2 packet is a duplicate of a previous packet.
000474: *Mar 1 00:04:22.719 UTC: ISAKMP:(0:2:HW:2): retransmission skipped for phase 2 (time since last transmission 4)
000475: *Mar 1 00:04:30.719 UTC: ISAKMP (0:268435458): received packet from 212.86.84.40 dport 500 sport 500 Global (I) QM_IDLE
000476: *Mar 1 00:04:30.719 UTC: ISAKMP: set new node 840256213 to QM_IDLE
000477: *Mar 1 00:04:30.723 UTC: ISAKMP:(0:2:HW:2): processing HASH payload. message ID = 840256213
000478: *Mar 1 00:04:30.723 UTC: ISAKMP:(0:2:HW:2): processing DELETE payload. message ID = 840256213
000479: *Mar 1 00:04:30.723 UTC: ISAKMP:(0:2:HW:2):peer does not do paranoid keepalives.
000480: *Mar 1 00:04:30.727 UTC: ISAKMP:(0:2:HW:2):deleting
SA reason "P1 delete notify (in)" state (I) QM_IDLE (peer 212.86.84.40) input queue 0
000481: *Mar 1 00:04:30.727 UTC: ISAKMP:(0:2:HW:2):deleting
node 840256213 error FALSE reason "informational (in) state 1"
000482: *Mar 1 00:04:30.727 UTC: ISAKMP:(0:2:HW:2):Input = IKE_MESG_FROM_PEER, IKE_INFO_DELETE
000483: *Mar 1 00:04:30.727 UTC: ISAKMP:(0:2:HW:2):Old State = IKE_P1_COMPLETE New State = IKE_P1_COMPLETE
000484: *Mar 1 00:04:30.731 UTC: ISAKMP:(0:2:HW:2):Input = IKE_MESG_INTERNAL, IKE_PHASE1_DEL
000485: *Mar 1 00:04:30.731 UTC: ISAKMP:(0:2:HW:2):Old State = IKE_P1_COMPLETE New State = IKE_DEST_SA
000486: *Mar 1 00:04:30.731 UTC: ISAKMP:(0:2:HW:2):deleting
SA reason "" state (I) QM_IDLE (peer 212.86.84.40) input queue 0
000487: *Mar 1 00:04:30.731 UTC: ISAKMP: Unlocking IKE struct 0x818AAADC for isadb_mark_sa_deleted(), count 0
000488: *Mar 1 00:04:30.735 UTC: ISAKMP: Deleting peer node by peer_reap for 212.86.84.40: 818AAADC
000489: *Mar 1 00:04:30.735 UTC: ISAKMP:(0:2:HW:2):Input = IKE_MESG_FROM_PEER, IKE_MM_EXCH
000490: *Mar 1 00:04:30.735 UTC: ISAKMP:(0:2:HW:2):Old State = IKE_DEST_SA New State = IKE_DEST_SA
000491: *Mar 1 00:04:32.711 UTC: ISAKMP:(0:2:HW:2): retransmitting phase 2 MM_NO_STATE -1249823783 ...
000492: *Mar 1 00:04:32.711 UTC: ISAKMP:(0:2:HW:2):incremen
ting error counter on sa: retransmit phase 2
000493: *Mar 1 00:04:32.711 UTC: ISAKMP:(0:2:HW:2):incremen
ting error counter on sa: retransmit phase 2
000494: *Mar 1 00:04:32.711 UTC: ISAKMP:(0:2:HW:2): retransmitting phase 2 -1249823783 MM_NO_STATE
000495: *Mar 1 00:04:32.711 UTC: ISAKMP:(0:2:HW:2): sending packet to 212.86.84.40 my_port 500 peer_port 500 (I) MM_NO_STATE
000496: *Mar 1 00:04:39.095 UTC: IPSEC(key_engine): major = 1
000497: *Mar 1 00:04:39.095 UTC: IPSEC(key_engine): expired_timer
000498: *Mar 1 00:04:42.711 UTC: ISAKMP:(0:2:HW:2): retransmitting phase 2 MM_NO_STATE -1249823783 ...
000499: *Mar 1 00:04:42.711 UTC: ISAKMP:(0:2:HW:2):incremen
ting error counter on sa: retransmit phase 2
000500: *Mar 1 00:04:42.711 UTC: ISAKMP:(0:2:HW:2):incremen
ting error counter on sa: retransmit phase 2
000501: *Mar 1 00:04:42.711 UTC: ISAKMP:(0:2:HW:2): retransmitting phase 2 -1249823783 MM_NO_STATE
000502: *Mar 1 00:04:42.711 UTC: ISAKMP:(0:2:HW:2): sending packet to 212.86.84.40 my_port 500 peer_port 500 (I) MM_NO_STATE
000503: *Mar 1 00:04:49.823 UTC: %CDP-4-DUPLEX_MISMATCH: duplex mismatch discovered on Ethernet1 (not full duplex), with INTERNET-SWITCH GigabitEthernet0/13 (full duplex).
000504: *Mar 1 00:04:52.711 UTC: ISAKMP:(0:2:HW:2): retransmitting phase 2 MM_NO_STATE -1249823783 ...
000505: *Mar 1 00:04:52.711 UTC: ISAKMP:(0:2:HW:2):incremen
ting error counter on sa: retransmit phase 2
000506: *Mar 1 00:04:52.711 UTC: ISAKMP:(0:2:HW:2):incremen
ting error counter on sa: retransmit phase 2
000507: *Mar 1 00:04:52.711 UTC: ISAKMP:(0:2:HW:2): retransmitting phase 2 -1249823783 MM_NO_STATE
000508: *Mar 1 00:04:52.711 UTC: ISAKMP:(0:2:HW:2): sending packet to 212.86.84.40 my_port 500 peer_port 500 (I) MM_NO_STATE
000509: *Mar 1 00:04:54.291 UTC: ISAKMP:(0:1:HW:2):purging node -868256208
000510: *Mar 1 00:04:54.439 UTC: ISAKMP:(0:1:HW:2):purging node -833937446
000511: *Mar 1 00:04:54.443 UTC: ISAKMP:(0:1:HW:2):purging node -527525587
000512: *Mar 1 00:04:54.483 UTC: ISAKMP:(0:1:HW:2):purging node -1767969252
000513: *Mar 1 00:04:54.483 UTC: ISAKMP:(0:1:HW:2):purging node 808372997
000514: *Mar 1 00:04:54.483 UTC: ISAKMP:(0:1:HW:2):purging node 297923612
000515: *Mar 1 00:04:54.487 UTC: ISAKMP:(0:1:HW:2):purging node 2017300063
000516: *Mar 1 00:04:56.871 UTC: ISAKMP:(0:2:HW:2):purging node -1249823783
000517: *Mar 1 00:04:59.095 UTC: IPSEC(key_engine): major = 1
000518: *Mar 1 00:04:59.095 UTC: IPSEC(key_engine): expired_timer
000519: *Mar 1 00:05:04.487 UTC: ISAKMP:(0:1:HW:2):purging SA., sa=818AB56C, delme=818AB56C
000520: *Mar 1 00:05:04.487 UTC: ISAKMP:(0:1:HW:2):purging node -1908192671
000521: *Mar 1 00:05:04.487 UTC: ISAKMP:(0:1:HW:2):purging node -556280520
000522: *Mar 1 00:05:04.487 UTC: ISAKMP:(0:1:HW:2):purging node 1393683013
000523: *Mar 1 00:05:19.095 UTC: IPSEC(key_engine): major = 1
000524: *Mar 1 00:05:19.095 UTC: IPSEC(key_engine): expired_timer
000525: *Mar 1 00:05:20.727 UTC: ISAKMP:(0:2:HW:2):purging node 840256213
000526: *Mar 1 00:05:30.735 UTC: ISAKMP:(0:2:HW:2):purging SA., sa=81C345E8, delme=81C345E8
000527: *Mar 1 00:05:30.735 UTC: ISAKMP:(0:2:HW:2):purging node -1101248849
000528: *Mar 1 00:05:30.735 UTC: ISAKMP:(0:2:HW:2):purging node -1006186145
RTRSlovakiaWH(config-if)#
RTRSlovakiaWH(config-if)#
RTRSlovakiaWH(config-if)#
RTRSlovakiaWH(config-if)#
RTRSlovakiaWH(config-if)#
RTRSlovakiaWH(config-if)#^
Z
RTRSlovakiaWH#
RTRSlovakiaWH#
000529: *Mar 1 00:05:39.095 UTC: IPSEC(key_engine): major = 1
000530: *Mar 1 00:05:39.095 UTC: IPSEC(key_engine): expired_timer
RTRSlovakiaWH#
RTRSlovakiaWH#un
000531: *Mar 1 00:05:39.103 UTC: %SYS-5-CONFIG_I: Configured from console by 5Targat3 on console alll
undebug alll
^
% Invalid input detected at '^' marker.
RTRSlovakiaWH#
RTRSlovakiaWH#un alll
All possible debugging has been turned off
RTRSlovakiaWH#
RTRSlovakiaWH#
RTRSlovakiaWH#exit