Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Sep 24 21:48:25 [IKEv1]IKE Receiver: Packet received on 192.168.2.120:500 from 192.168.2.100:500
- IKEv1 Recv RAW packet dump
- c1 99 fe 96 b6 55 28 24 00 00 00 00 00 00 00 00 | .....U($........
- 01 10 04 00 00 00 00 00 00 00 02 f8 04 00 01 24 | ...............$
- 00 00 00 01 00 00 00 01 00 00 01 18 01 01 00 08 | ................
- 03 00 00 24 01 01 00 00 80 0b 00 01 80 0c 0e 10 | ...$............
- 80 01 00 07 80 0e 01 00 80 03 fd e9 80 02 00 02 | ................
- 80 04 00 02 03 00 00 24 02 01 00 00 80 0b 00 01 | .......$........
- 80 0c 0e 10 80 01 00 07 80 0e 00 80 80 03 fd e9 | ................
- 80 02 00 02 80 04 00 02 03 00 00 24 03 01 00 00 | ...........$....
- 80 0b 00 01 80 0c 0e 10 80 01 00 07 80 0e 01 00 | ................
- 80 03 fd e9 80 02 00 01 80 04 00 02 03 00 00 24 | ...............$
- 04 01 00 00 80 0b 00 01 80 0c 0e 10 80 01 00 07 | ................
- 80 0e 00 80 80 03 fd e9 80 02 00 01 80 04 00 02 | ................
- 03 00 00 20 05 01 00 00 80 0b 00 01 80 0c 0e 10 | ... ............
- 80 01 00 05 80 03 fd e9 80 02 00 02 80 04 00 02 | ................
- 03 00 00 20 06 01 00 00 80 0b 00 01 80 0c 0e 10 | ... ............
- 80 01 00 05 80 03 fd e9 80 02 00 01 80 04 00 02 | ................
- 03 00 00 20 07 01 00 00 80 0b 00 01 80 0c 0e 10 | ... ............
- 80 01 00 01 80 03 fd e9 80 02 00 02 80 04 00 02 | ................
- 00 00 00 20 08 01 00 00 80 0b 00 01 80 0c 0e 10 | ... ............
- 80 01 00 01 80 03 fd e9 80 02 00 01 80 04 00 02 | ................
- 0a 00 00 84 04 d6 ef a4 7b dc d0 f7 84 2c 6c dc | ........{....,l.
- e5 8c 74 0e 98 b4 b7 7f f9 7f 5e f7 cc e3 45 fb | ..t.....^...E.
- 8e 4e 3b d1 cd f4 35 b2 bd e8 5f 0b 9b 56 e1 97 | .N;...5..._..V..
- ed 4b 29 f8 7c a9 00 5c 58 d3 c8 2f 29 19 4a e1 | .K).|..\X../).J.
- c6 8c c1 f9 17 4d 28 d1 28 4b b2 85 dd c9 e9 e0 | .....M(.(K......
- ca d9 e0 3d bf d5 26 c2 79 b7 cc 84 03 49 15 0c | ...=..&.y....I..
- 31 29 2e 78 07 21 e4 f3 67 29 7b 16 2b 35 48 72 | 1).x.!..g){.+5Hr
- 5b 7d 8d 51 ed f7 e3 33 25 76 1a 67 b0 ec 5b db | [}.Q...3%v.g..[.
- f2 4f 86 d6 05 00 00 14 9e 84 68 ac 88 f9 bd 6b | .O........h....k
- f1 ec 52 80 9e 92 d5 d4 0d 00 00 0c 0b 00 00 00 | ..R.............
- 74 65 73 74 0d 00 00 18 40 48 b7 d5 6e bc e8 85 | [email protected]...
- 25 e7 de 7f 00 d6 c2 d3 80 00 00 00 0d 00 00 14 | %..............
- 4a 13 1c 81 07 03 58 45 5c 57 28 f2 0e 95 45 2f | J.....XE\W(...E/
- 0d 00 00 14 4d f3 79 28 e9 fc 4f d1 b3 26 21 70 | ....M.y(..O..&!p
- d5 15 c6 62 0d 00 00 14 8f 8d 83 82 6d 24 6b 6f | ...b........m$ko
- c7 a8 a6 a4 28 c1 1d e8 0d 00 00 14 43 9b 59 f8 | ....(.......C.Y.
- ba 67 6c 4c 77 37 ae 22 ea b8 f5 82 0d 00 00 14 | .glLw7."........
- 4d 1e 0e 13 6d ea fa 34 c4 f3 ea 9f 02 ec 72 85 | M...m..4......r.
- 0d 00 00 14 80 d0 bb 3d ef 54 56 5e e8 46 45 d4 | .......=.TV^.FE.
- c8 5c e3 ee 0d 00 00 14 99 09 b6 4e ed 93 7c 65 | .\.........N..|e
- 73 de 52 ac e9 52 fa 6b 0d 00 00 14 7d 94 19 a6 | s.R..R.k....}...
- 53 10 ca 6f 2c 17 9d 92 15 52 9d 56 0d 00 00 14 | S..o,....R.V....
- cd 60 46 43 35 df 21 f8 7c fd b2 fc 68 b6 a4 48 | .`FC5.!.|...h..H
- 0d 00 00 14 90 cb 80 91 3e bb 69 6e 08 63 81 b5 | ........>.in.c..
- ec 42 7b 1f 0d 00 00 0c 09 00 26 89 df d6 b7 12 | .B{.......&.....
- 0d 00 00 14 12 f5 f2 8c 45 71 68 a9 70 2d 9f e2 | ........Eqh.p-..
- 74 cc 01 00 00 00 00 14 af ca d7 13 68 a1 f1 c9 | t...........h...
- 6b 86 96 fc 77 57 01 00 | k...wW..
- RECV PACKET from 192.168.2.100
- ISAKMP Header
- Initiator COOKIE: c1 99 fe 96 b6 55 28 24
- Responder COOKIE: 00 00 00 00 00 00 00 00
- Next Payload: Security Association
- Version: 1.0
- Exchange Type: Aggressive Mode
- Flags: (none)
- MessageID: 00000000
- Length: 4160880640
- Payload Security Association
- Next Payload: Key Exchange
- Reserved: 00
- Payload Length: 292
- DOI: IPsec
- Situation:(SIT_IDENTITY_ONLY)
- Payload Proposal
- Next Payload: None
- Reserved: 00
- Payload Length: 280
- Proposal #: 1
- Protocol-Id: PROTO_ISAKMP
- SPI Size: 0
- # of transforms: 8
- Payload Transform
- Next Payload: Transform
- Reserved: 00
- Payload Length: 36
- Transform #: 1
- Transform-Id: KEY_IKE
- Reserved2: 0000
- Life Type: seconds
- Life Duration (Hex): 0e 10
- Encryption Algorithm: AES-CBC
- Key Length: 256
- Authentication Method: XAUTH_INIT_PRESHRD
- Hash Algorithm: SHA1
- Group Description: Group 2
- Payload Transform
- Next Payload: Transform
- Reserved: 00
- Payload Length: 36
- Transform #: 2
- Transform-Id: KEY_IKE
- Reserved2: 0000
- Life Type: seconds
- Life Duration (Hex): 0e 10
- Encryption Algorithm: AES-CBC
- Key Length: 128
- Authentication Method: XAUTH_INIT_PRESHRD
- Hash Algorithm: SHA1
- Group Description: Group 2
- Payload Transform
- Next Payload: Transform
- Reserved: 00
- Payload Length: 36
- Transform #: 3
- Transform-Id: KEY_IKE
- Reserved2: 0000
- Life Type: seconds
- Life Duration (Hex): 0e 10
- Encryption Algorithm: AES-CBC
- Key Length: 256
- Authentication Method: XAUTH_INIT_PRESHRD
- Hash Algorithm: MD5
- Group Description: Group 2
- Payload Transform
- Next Payload: Transform
- Reserved: 00
- Payload Length: 36
- Transform #: 4
- Transform-Id: KEY_IKE
- Reserved2: 0000
- Life Type: seconds
- Life Duration (Hex): 0e 10
- Encryption Algorithm: AES-CBC
- Key Length: 128
- Authentication Method: XAUTH_INIT_PRESHRD
- Hash Algorithm: MD5
- Group Description: Group 2
- Payload Transform
- Next Payload: Transform
- Reserved: 00
- Payload Length: 32
- Transform #: 5
- Transform-Id: KEY_IKE
- Reserved2: 0000
- Life Type: seconds
- Life Duration (Hex): 0e 10
- Encryption Algorithm: 3DES-CBC
- Authentication Method: XAUTH_INIT_PRESHRD
- Hash Algorithm: SHA1
- Group Description: Group 2
- Payload Transform
- Next Payload: Transform
- Reserved: 00
- Payload Length: 32
- Transform #: 6
- Transform-Id: KEY_IKE
- Reserved2: 0000
- Life Type: seconds
- Life Duration (Hex): 0e 10
- Encryption Algorithm: 3DES-CBC
- Authentication Method: XAUTH_INIT_PRESHRD
- Hash Algorithm: MD5
- Group Description: Group 2
- Payload Transform
- Next Payload: Transform
- Reserved: 00
- Payload Length: 32
- Transform #: 7
- Transform-Id: KEY_IKE
- Reserved2: 0000
- Life Type: seconds
- Life Duration (Hex): 0e 10
- Encryption Algorithm: DES-CBC
- Authentication Method: XAUTH_INIT_PRESHRD
- Hash Algorithm: SHA1
- Group Description: Group 2
- Payload Transform
- Next Payload: None
- Reserved: 00
- Payload Length: 32
- Transform #: 8
- Transform-Id: KEY_IKE
- Reserved2: 0000
- Life Type: seconds
- Life Duration (Hex): 0e 10
- Encryption Algorithm: DES-CBC
- Authentication Method: XAUTH_INIT_PRESHRD
- Hash Algorithm: MD5
- Group Description: Group 2
- Payload Key Exchange
- Next Payload: Nonce
- Reserved: 00
- Payload Length: 132
- Data:
- 04 d6 ef a4 7b dc d0 f7 84 2c 6c dc e5 8c 74 0e
- 98 b4 b7 7f f9 7f 5e f7 cc e3 45 fb 8e 4e 3b d1
- cd f4 35 b2 bd e8 5f 0b 9b 56 e1 97 ed 4b 29 f8
- 7c a9 00 5c 58 d3 c8 2f 29 19 4a e1 c6 8c c1 f9
- 17 4d 28 d1 28 4b b2 85 dd c9 e9 e0 ca d9 e0 3d
- bf d5 26 c2 79 b7 cc 84 03 49 15 0c 31 29 2e 78
- 07 21 e4 f3 67 29 7b 16 2b 35 48 72 5b 7d 8d 51
- ed f7 e3 33 25 76 1a 67 b0 ec 5b db f2 4f 86 d6
- Payload Nonce
- Next Payload: Identification
- Reserved: 00
- Payload Length: 20
- Data:
- 9e 84 68 ac 88 f9 bd 6b f1 ec 52 80 9e 92 d5 d4
- Payload Identification
- Next Payload: Vendor ID
- Reserved: 00
- Payload Length: 12
- ID Type: ID_KEY_ID (11)
- Protocol ID (UDP/TCP, etc...): 0
- Port: 0
- ID Data: test
- Payload Vendor ID
- Next Payload: Vendor ID
- Reserved: 00
- Payload Length: 24
- Data (In Hex):
- 40 48 b7 d5 6e bc e8 85 25 e7 de 7f 00 d6 c2 d3
- 80 00 00 00
- Payload Vendor ID
- Next Payload: Vendor ID
- Reserved: 00
- Payload Length: 20
- Data (In Hex):
- 4a 13 1c 81 07 03 58 45 5c 57 28 f2 0e 95 45 2f
- Payload Vendor ID
- Next Payload: Vendor ID
- Reserved: 00
- Payload Length: 20
- Data (In Hex):
- 4d f3 79 28 e9 fc 4f d1 b3 26 21 70 d5 15 c6 62
- Payload Vendor ID
- Next Payload: Vendor ID
- Reserved: 00
- Payload Length: 20
- Data (In Hex):
- 8f 8d 83 82 6d 24 6b 6f c7 a8 a6 a4 28 c1 1d e8
- Payload Vendor ID
- Next Payload: Vendor ID
- Reserved: 00
- Payload Length: 20
- Data (In Hex):
- 43 9b 59 f8 ba 67 6c 4c 77 37 ae 22 ea b8 f5 82
- Payload Vendor ID
- Next Payload: Vendor ID
- Reserved: 00
- Payload Length: 20
- Data (In Hex):
- 4d 1e 0e 13 6d ea fa 34 c4 f3 ea 9f 02 ec 72 85
- Payload Vendor ID
- Next Payload: Vendor ID
- Reserved: 00
- Payload Length: 20
- Data (In Hex):
- 80 d0 bb 3d ef 54 56 5e e8 46 45 d4 c8 5c e3 ee
- Payload Vendor ID
- Next Payload: Vendor ID
- Reserved: 00
- Payload Length: 20
- Data (In Hex):
- 99 09 b6 4e ed 93 7c 65 73 de 52 ac e9 52 fa 6b
- Payload Vendor ID
- Next Payload: Vendor ID
- Reserved: 00
- Payload Length: 20
- Data (In Hex):
- 7d 94 19 a6 53 10 ca 6f 2c 17 9d 92 15 52 9d 56
- Payload Vendor ID
- Next Payload: Vendor ID
- Reserved: 00
- Payload Length: 20
- Data (In Hex):
- cd 60 46 43 35 df 21 f8 7c fd b2 fc 68 b6 a4 48
- Payload Vendor ID
- Next Payload: Vendor ID
- Reserved: 00
- Payload Length: 20
- Data (In Hex):
- 90 cb 80 91 3e bb 69 6e 08 63 81 b5 ec 42 7b 1f
- Payload Vendor ID
- Next Payload: Vendor ID
- Reserved: 00
- Payload Length: 12
- Data (In Hex): 09 00 26 89 df d6 b7 12
- Payload Vendor ID
- Next Payload: Vendor ID
- Reserved: 00
- Payload Length: 20
- Data (In Hex):
- 12 f5 f2 8c 45 71 68 a9 70 2d 9f e2 74 cc 01 00
- Payload Vendor ID
- Next Payload: None
- Reserved: 00
- Payload Length: 20
- Data (In Hex):
- af ca d7 13 68 a1 f1 c9 6b 86 96 fc 77 57 01 00
- Sep 24 21:48:25 [IKEv1]IP = 192.168.2.100, IKE_DECODE RECEIVED Message (msgid=0) with payloads : HDR + SA (1) + KE (4) + NONCE (10) + ID (5) + VENDOR (13) + VENDOR (13) + VENDOR (13) + VENDOR (13) + VENDOR (13) + VENDOR (13) + VENDOR (13) + VENDOR (13) + VENDOR (13) + VENDOR (13) + VENDOR (13) + VENDOR (13) + VENDOR (13) + VENDOR (13) + NONE (0) total length : 760
- Sep 24 21:48:25 [IKEv1 DEBUG]IP = 192.168.2.100, processing SA payload
- Sep 24 21:48:25 [IKEv1 DEBUG]IP = 192.168.2.100, processing ke payload
- Sep 24 21:48:25 [IKEv1 DEBUG]IP = 192.168.2.100, processing ISA_KE payload
- Sep 24 21:48:25 [IKEv1 DEBUG]IP = 192.168.2.100, processing nonce payload
- Sep 24 21:48:25 [IKEv1 DEBUG]IP = 192.168.2.100, processing ID payload
- Sep 24 21:48:25 [IKEv1 DEBUG]IP = 192.168.2.100, processing VID payload
- Sep 24 21:48:25 [IKEv1 DEBUG]IP = 192.168.2.100, Received Fragmentation VID
- Sep 24 21:48:25 [IKEv1 DEBUG]IP = 192.168.2.100, IKE Peer included IKE fragmentation capability flags: Main Mode: True Aggressive Mode: False
- Sep 24 21:48:25 [IKEv1 DEBUG]IP = 192.168.2.100, processing VID payload
- Sep 24 21:48:25 [IKEv1 DEBUG]IP = 192.168.2.100, Received NAT-Traversal RFC VID
- Sep 24 21:48:25 [IKEv1 DEBUG]IP = 192.168.2.100, processing VID payload
- Sep 24 21:48:25 [IKEv1 DEBUG]IP = 192.168.2.100, processing VID payload
- Sep 24 21:48:25 [IKEv1 DEBUG]IP = 192.168.2.100, processing VID payload
- Sep 24 21:48:25 [IKEv1 DEBUG]IP = 192.168.2.100, processing VID payload
- Sep 24 21:48:25 [IKEv1 DEBUG]IP = 192.168.2.100, processing VID payload
- Sep 24 21:48:25 [IKEv1 DEBUG]IP = 192.168.2.100, processing VID payload
- Sep 24 21:48:25 [IKEv1 DEBUG]IP = 192.168.2.100, processing VID payload
- Sep 24 21:48:25 [IKEv1 DEBUG]IP = 192.168.2.100, Received NAT-Traversal ver 03 VID
- Sep 24 21:48:25 [IKEv1 DEBUG]IP = 192.168.2.100, processing VID payload
- Sep 24 21:48:25 [IKEv1 DEBUG]IP = 192.168.2.100, processing VID payload
- Sep 24 21:48:25 [IKEv1 DEBUG]IP = 192.168.2.100, Received NAT-Traversal ver 02 VID
- Sep 24 21:48:25 [IKEv1 DEBUG]IP = 192.168.2.100, processing VID payload
- Sep 24 21:48:25 [IKEv1 DEBUG]IP = 192.168.2.100, Received xauth V6 VID
- Sep 24 21:48:25 [IKEv1 DEBUG]IP = 192.168.2.100, processing VID payload
- Sep 24 21:48:25 [IKEv1 DEBUG]IP = 192.168.2.100, Received Cisco Unity client VID
- Sep 24 21:48:25 [IKEv1 DEBUG]IP = 192.168.2.100, processing VID payload
- Sep 24 21:48:25 [IKEv1 DEBUG]IP = 192.168.2.100, Received DPD VID
- Sep 24 21:48:25 [IKEv1]IP = 192.168.2.100, Connection landed on tunnel_group test
- Sep 24 21:48:25 [IKEv1 DEBUG]Group = test, IP = 192.168.2.100, processing IKE SA payload
- Sep 24 21:48:25 [IKEv1 DEBUG]Group = test, IP = 192.168.2.100, IKE SA Proposal # 1, Transform # 1 acceptable Matches global IKE entry # 2
- Sep 24 21:48:25 [IKEv1 DEBUG]Group = test, IP = 192.168.2.100, constructing ISAKMP SA payload
- Sep 24 21:48:25 [IKEv1 DEBUG]Group = test, IP = 192.168.2.100, constructing ke payload
- Sep 24 21:48:25 [IKEv1 DEBUG]Group = test, IP = 192.168.2.100, constructing nonce payload
- Sep 24 21:48:25 [IKEv1 DEBUG]Group = test, IP = 192.168.2.100, Generating keys for Responder...
- Sep 24 21:48:25 [IKEv1 DEBUG]Group = test, IP = 192.168.2.100, constructing ID payload
- Sep 24 21:48:25 [IKEv1 DEBUG]Group = test, IP = 192.168.2.100, constructing hash payload
- Sep 24 21:48:25 [IKEv1 DEBUG]Group = test, IP = 192.168.2.100, Computing hash for ISAKMP
- Sep 24 21:48:25 [IKEv1 DEBUG]Group = test, IP = 192.168.2.100, constructing Cisco Unity VID payload
- Sep 24 21:48:25 [IKEv1 DEBUG]Group = test, IP = 192.168.2.100, constructing xauth V6 VID payload
- Sep 24 21:48:25 [IKEv1 DEBUG]Group = test, IP = 192.168.2.100, constructing dpd vid payload
- Sep 24 21:48:25 [IKEv1 DEBUG]Group = test, IP = 192.168.2.100, constructing NAT-Traversal VID ver RFC payload
- Sep 24 21:48:25 [IKEv1 DEBUG]Group = test, IP = 192.168.2.100, constructing NAT-Discovery payload
- Sep 24 21:48:25 [IKEv1 DEBUG]Group = test, IP = 192.168.2.100, computing NAT Discovery hash
- Sep 24 21:48:25 [IKEv1 DEBUG]Group = test, IP = 192.168.2.100, constructing NAT-Discovery payload
- Sep 24 21:48:25 [IKEv1 DEBUG]Group = test, IP = 192.168.2.100, computing NAT Discovery hash
- Sep 24 21:48:25 [IKEv1 DEBUG]Group = test, IP = 192.168.2.100, constructing Fragmentation VID + extended capabilities payload
- Sep 24 21:48:25 [IKEv1 DEBUG]Group = test, IP = 192.168.2.100, constructing VID payload
- Sep 24 21:48:25 [IKEv1 DEBUG]Group = test, IP = 192.168.2.100, Send Altiga/Cisco VPN3000/Cisco ASA GW VID
- Sep 24 21:48:25 [IKEv1]IP = 192.168.2.100, IKE_DECODE SENDING Message (msgid=0) with payloads : HDR + SA (1) + KE (4) + NONCE (10) + ID (5) + HASH (8) + VENDOR (13) + VENDOR (13) + VENDOR (13) + VENDOR (13) + NAT-D (20) + NAT-D (20) + VENDOR (13) + VENDOR (13) + NONE (0) total length : 440
- SENDING PACKET to 192.168.2.100
- ISAKMP Header
- Initiator COOKIE: c1 99 fe 96 b6 55 28 24
- Responder COOKIE: d7 d3 d2 14 e1 39 33 5a
- Next Payload: Security Association
- Version: 1.0
- Exchange Type: Aggressive Mode
- Flags: (none)
- MessageID: 00000000
- Length: 3087073280
- Sep 24 21:48:25 [IKEv1]IKE Receiver: Packet received on 192.168.2.120:500 from 192.168.2.100:500
- IKEv1 Recv RAW packet dump
- c1 99 fe 96 b6 55 28 24 d7 d3 d2 14 e1 39 33 5a | .....U($.....93Z
- 08 10 04 01 00 00 00 00 00 00 00 8c 4a 9f f1 10 | ............J...
- fb b1 06 d6 b4 bb 25 5e a3 ca 06 64 eb 85 3d 31 | ......%^...d..=1
- cc 66 ea ff 45 c5 e0 ee 9d d9 22 93 37 4b 21 ad | .f..E.....".7K!.
- fc 27 99 21 a9 99 c2 e9 2d 04 d5 c4 30 ca 3e 63 | .'.!....-...0.>c
- ed 6b 05 55 65 a7 70 12 df 43 22 6b a5 2f 4b 5d | .k.Ue.p..C"k./K]
- 3d ce 03 bf e1 8b 4e 97 4c 5f 3c 5f 0c dd 8f 9e | =.....N.L_<_....
- 03 0a dd a6 d6 bd c6 b5 68 a7 5d 9e ce 1f 97 27 | ........h.]....'
- c4 74 9a 0b 3f c7 2d f7 81 80 ed ee | .t..?.-.....
- RECV PACKET from 192.168.2.100
- ISAKMP Header
- Initiator COOKIE: c1 99 fe 96 b6 55 28 24
- Responder COOKIE: d7 d3 d2 14 e1 39 33 5a
- Next Payload: Hash
- Version: 1.0
- Exchange Type: Aggressive Mode
- Flags: (Encryption)
- MessageID: 00000000
- Length: 140
- AFTER DECRYPTION
- ISAKMP Header
- Initiator COOKIE: c1 99 fe 96 b6 55 28 24
- Responder COOKIE: d7 d3 d2 14 e1 39 33 5a
- Next Payload: Hash
- Version: 1.0
- Exchange Type: Aggressive Mode
- Flags: (Encryption)
- MessageID: 00000000
- Length: 140
- Payload Hash
- Next Payload: NAT-D
- Reserved: 00
- Payload Length: 24
- Data:
- 96 71 e9 a9 6f b8 71 ec 9d 8e b1 3c 8a 7e 07 91
- fd d4 38 d3
- Payload NAT-D
- Next Payload: NAT-D
- Reserved: 00
- Payload Length: 24
- Data:
- fc 7a 3e 9e 54 aa 3e ab 4e 70 9b c6 db 3d b4 a1
- da 3f 77 56
- Payload NAT-D
- Next Payload: Notification
- Reserved: 00
- Payload Length: 24
- Data:
- 42 65 ca b8 7a 56 fe 16 06 21 a3 f2 22 f4 be 5c
- c6 8e ce 4c
- Payload Notification
- Next Payload: None
- Reserved: 00
- Payload Length: 28
- DOI: IPsec
- Protocol-ID: PROTO_ISAKMP
- Spi Size: 16
- Notify Type: STATUS_INITIAL_CONTACT
- SPI:
- c1 99 fe 96 b6 55 28 24 d7 d3 d2 14 e1 39 33 5a
- Sep 24 21:48:25 [IKEv1]IP = 192.168.2.100, IKE_DECODE RECEIVED Message (msgid=0) with payloads : HDR + HASH (8) + NAT-D (20) + NAT-D (20) + NOTIFY (11) + NONE (0) total length : 128
- Sep 24 21:48:25 [IKEv1 DEBUG]Group = test, IP = 192.168.2.100, processing hash payload
- Sep 24 21:48:25 [IKEv1 DEBUG]Group = test, IP = 192.168.2.100, Computing hash for ISAKMP
- Sep 24 21:48:25 [IKEv1 DEBUG]Group = test, IP = 192.168.2.100, processing NAT-Discovery payload
- Sep 24 21:48:25 [IKEv1 DEBUG]Group = test, IP = 192.168.2.100, computing NAT Discovery hash
- Sep 24 21:48:25 [IKEv1 DEBUG]Group = test, IP = 192.168.2.100, processing NAT-Discovery payload
- Sep 24 21:48:25 [IKEv1 DEBUG]Group = test, IP = 192.168.2.100, computing NAT Discovery hash
- Sep 24 21:48:25 [IKEv1 DEBUG]Group = test, IP = 192.168.2.100, processing notify payload
- Sep 24 21:48:25 [IKEv1]Group = test, IP = 192.168.2.100, Automatic NAT Detection Status: Remote end is NOT behind a NAT device This end is NOT behind a NAT device
- Sep 24 21:48:25 [IKEv1 DEBUG]Group = test, IP = 192.168.2.100, constructing blank hash payload
- Sep 24 21:48:25 [IKEv1 DEBUG]Group = test, IP = 192.168.2.100, constructing qm hash payload
- Sep 24 21:48:25 [IKEv1]IP = 192.168.2.100, IKE_DECODE SENDING Message (msgid=d27a0bff) with payloads : HDR + HASH (8) + ATTR (14) + NONE (0) total length : 72
- BEFORE ENCRYPTION
- RAW PACKET DUMP on SEND
- c1 99 fe 96 b6 55 28 24 d7 d3 d2 14 e1 39 33 5a | .....U($.....93Z
- 08 10 06 00 ff 0b 7a d2 1c 00 00 00 0e 00 00 18 | ......z.........
- 3c 0b d6 4d d4 83 4b 35 87 a2 01 07 e0 1f 9e 50 | <..M..K5.......P
- fb bb d8 6a 00 00 00 14 01 00 00 00 c0 88 00 00 | ...j............
- 40 89 00 00 40 8a 00 00 | @...@...
- ISAKMP Header
- Initiator COOKIE: c1 99 fe 96 b6 55 28 24
- Responder COOKIE: d7 d3 d2 14 e1 39 33 5a
- Next Payload: Hash
- Version: 1.0
- Exchange Type: Transaction
- Flags: (none)
- MessageID: D27A0BFF
- Length: 28
- Payload Hash
- Next Payload: Attributes
- Reserved: 00
- Payload Length: 24
- Data:
- 3c 0b d6 4d d4 83 4b 35 87 a2 01 07 e0 1f 9e 50
- fb bb d8 6a
- Payload Attributes
- Next Payload: None
- Reserved: 00
- Payload Length: 20
- type: ISAKMP_CFG_REQUEST
- Reserved: 00
- Identifier: 0000
- XAUTH Type: Generic
- XAUTH User Name: (empty)
- XAUTH User Password: (empty)
- Sep 24 21:48:32 [IKEv1]IKE Receiver: Packet received on 192.168.2.120:500 from 192.168.2.100:500
- IKEv1 Recv RAW packet dump
- c1 99 fe 96 b6 55 28 24 d7 d3 d2 14 e1 39 33 5a | .....U($.....93Z
- 08 10 06 01 d2 7a 0b ff 00 00 00 5c 09 25 f9 1d | .....z.....\.%..
- e4 b4 eb d0 80 d0 c0 f5 5f 4f 8b a5 ab d5 87 d9 | ........_O......
- 50 36 67 a1 c2 00 87 2a 94 d6 6e 94 a3 d0 e0 bf | P6g....*..n.....
- 45 16 8d 56 3a f2 0c 7d c0 3b c5 7b 16 2d 4e 4f | E..V:..}.;.{.-NO
- 29 53 e3 49 93 01 b5 1a a2 25 8c aa | )S.I.....%..
- RECV PACKET from 192.168.2.100
- ISAKMP Header
- Initiator COOKIE: c1 99 fe 96 b6 55 28 24
- Responder COOKIE: d7 d3 d2 14 e1 39 33 5a
- Next Payload: Hash
- Version: 1.0
- Exchange Type: Transaction
- Flags: (Encryption)
- MessageID: D27A0BFF
- Length: 92
- AFTER DECRYPTION
- ISAKMP Header
- Initiator COOKIE: c1 99 fe 96 b6 55 28 24
- Responder COOKIE: d7 d3 d2 14 e1 39 33 5a
- Next Payload: Hash
- Version: 1.0
- Exchange Type: Transaction
- Flags: (Encryption)
- MessageID: D27A0BFF
- Length: 92
- Payload Hash
- Next Payload: Attributes
- Reserved: 00
- Payload Length: 24
- Data:
- be ec 0f 73 bb 42 60 8a 19 1e 58 8d a0 c5 fd fd
- 23 89 87 91
- Payload Attributes
- Next Payload: None
- Reserved: 00
- Payload Length: 28
- type: ISAKMP_CFG_REPLY
- Reserved: 00
- Identifier: 0000
- XAUTH User Name: (data not displayed)
- XAUTH User Password: (data not displayed)
- Sep 24 21:48:32 [IKEv1]IP = 192.168.2.100, IKE_DECODE RECEIVED Message (msgid=d27a0bff) with payloads : HDR + HASH (8) + ATTR (14) + NONE (0) total length : 80
- Sep 24 21:48:32 [IKEv1 DEBUG]Group = test, IP = 192.168.2.100, process_attr(): Enter!
- Sep 24 21:48:32 [IKEv1 DEBUG]Group = test, IP = 192.168.2.100, Processing MODE_CFG Reply attributes.
- RADIUS packet decode (authentication request)
- --------------------------------------
- Raw packet data (length = 251).....
- 01 33 00 fb ff ee 1c 4f 66 fb ca 35 59 1f 82 35 | .3.....Of..5Y..5
- 39 47 04 77 01 0a 6b 61 72 73 74 65 6e 73 02 12 | 9G.w..karstens..
- 0c a0 50 11 dc 28 79 28 b6 c4 00 d7 5c 1e e1 2c | ..P..(y(....\..,
- 05 06 00 07 f0 00 06 06 00 00 00 02 07 06 00 00 | ................
- 00 01 1e 0f 31 39 32 2e 31 36 38 2e 32 2e 31 32 | ....192.168.2.12
- 30 1f 0f 31 39 32 2e 31 36 38 2e 32 2e 31 30 30 | 0..192.168.2.100
- 3d 06 00 00 00 05 42 0f 31 39 32 2e 31 36 38 2e | =.....B.192.168.
- 32 2e 31 30 30 04 06 c0 a8 02 78 1a 31 00 00 00 | 2.100.....x.1...
- 09 01 2b 61 75 64 69 74 2d 73 65 73 73 69 6f 6e | ..+audit-session
- 2d 69 64 3d 30 61 30 61 30 31 30 31 30 30 30 37 | -id=0a0a01010007
- 66 30 30 30 35 36 30 34 36 66 61 39 1a 22 00 00 | f00056046fa9."..
- 00 09 01 1c 69 70 3a 73 6f 75 72 63 65 2d 69 70 | ....ip:source-ip
- 3d 31 39 32 2e 31 36 38 2e 32 2e 31 30 30 1a 0c | =192.168.2.100..
- 00 00 0c 04 92 06 74 65 73 74 1a 0c 00 00 0c 04 | ......test......
- 96 06 00 00 00 01 1a 15 00 00 00 09 01 0f 63 6f | ..............co
- 61 2d 70 75 73 68 3d 74 72 75 65 | a-push=true
- Parsed packet data.....
- Radius: Code = 1 (0x01)
- Radius: Identifier = 51 (0x33)
- Radius: Length = 251 (0x00FB)
- Radius: Vector: FFEE1C4F66FBCA35591F823539470477
- Radius: Type = 1 (0x01) User-Name
- Radius: Length = 10 (0x0A)
- Radius: Value (String) =
- 6b 61 72 73 74 65 6e 73 | karstens
- Radius: Type = 2 (0x02) User-Password
- Radius: Length = 18 (0x12)
- Radius: Value (String) =
- 0c a0 50 11 dc 28 79 28 b6 c4 00 d7 5c 1e e1 2c | ..P..(y(....\..,
- Radius: Type = 5 (0x05) NAS-Port
- Radius: Length = 6 (0x06)
- Radius: Value (Hex) = 0x7F000
- Radius: Type = 6 (0x06) Service-Type
- Radius: Length = 6 (0x06)
- Radius: Value (Hex) = 0x2
- Radius: Type = 7 (0x07) Framed-Protocol
- Radius: Length = 6 (0x06)
- Radius: Value (Hex) = 0x1
- Radius: Type = 30 (0x1E) Called-Station-Id
- Radius: Length = 15 (0x0F)
- Radius: Value (String) =
- 31 39 32 2e 31 36 38 2e 32 2e 31 32 30 | 192.168.2.120
- Radius: Type = 31 (0x1F) Calling-Station-Id
- Radius: Length = 15 (0x0F)
- Radius: Value (String) =
- 31 39 32 2e 31 36 38 2e 32 2e 31 30 30 | 192.168.2.100
- Radius: Type = 61 (0x3D) NAS-Port-Type
- Radius: Length = 6 (0x06)
- Radius: Value (Hex) = 0x5
- Radius: Type = 66 (0x42) Tunnel-Client-Endpoint
- Radius: Length = 15 (0x0F)
- Radius: Value (String) =
- 31 39 32 2e 31 36 38 2e 32 2e 31 30 30 | 192.168.2.100
- Radius: Type = 4 (0x04) NAS-IP-Address
- Radius: Length = 6 (0x06)
- Radius: Value (IP Address) = 192.168.2.120 (0xC0A80278)
- Radius: Type = 26 (0x1A) Vendor-Specific
- Radius: Length = 49 (0x31)
- Radius: Vendor ID = 9 (0x00000009)
- Radius: Type = 1 (0x01) Cisco-AV-pair
- Radius: Length = 43 (0x2B)
- Radius: Value (String) =
- 61 75 64 69 74 2d 73 65 73 73 69 6f 6e 2d 69 64 | audit-session-id
- 3d 30 61 30 61 30 31 30 31 30 30 30 37 66 30 30 | =0a0a01010007f00
- 30 35 36 30 34 36 66 61 39 | 056046fa9
- Radius: Type = 26 (0x1A) Vendor-Specific
- Radius: Length = 34 (0x22)
- Radius: Vendor ID = 9 (0x00000009)
- Radius: Type = 1 (0x01) Cisco-AV-pair
- Radius: Length = 28 (0x1C)
- Radius: Value (String) =
- 69 70 3a 73 6f 75 72 63 65 2d 69 70 3d 31 39 32 | ip:source-ip=192
- 2e 31 36 38 2e 32 2e 31 30 30 | .168.2.100
- Radius: Type = 26 (0x1A) Vendor-Specific
- Radius: Length = 12 (0x0C)
- Radius: Vendor ID = 3076 (0x00000C04)
- Radius: Type = 146 (0x92) Tunnel-Group-Name
- Radius: Length = 6 (0x06)
- Radius: Value (String) =
- 74 65 73 74 | test
- Radius: Type = 26 (0x1A) Vendor-Specific
- Radius: Length = 12 (0x0C)
- Radius: Vendor ID = 3076 (0x00000C04)
- Radius: Type = 150 (0x96) Client-Type
- Radius: Length = 6 (0x06)
- Radius: Value (Integer) = 1 (0x0001)
- Radius: Type = 26 (0x1A) Vendor-Specific
- Radius: Length = 21 (0x15)
- Radius: Vendor ID = 9 (0x00000009)
- Radius: Type = 1 (0x01) Cisco-AV-pair
- Radius: Length = 15 (0x0F)
- Radius: Value (String) =
- 63 6f 61 2d 70 75 73 68 3d 74 72 75 65 | coa-push=true
- RADIUS packet decode (response)
- --------------------------------------
- Raw packet data (length = 53).....
- 0b 33 00 35 bb 4d a1 35 01 a1 35 a1 0b ea 87 c7 | .3.5.M.5..5.....
- f8 9b a7 87 07 06 00 00 00 01 0d 06 00 00 00 01 | ................
- 12 09 54 6f 6b 65 6e 20 31 12 09 54 6f 6b 65 6e | ..Token 1..Token
- 20 32 18 03 30 | 2..0
- Parsed packet data.....
- Radius: Code = 11 (0x0B)
- Radius: Identifier = 51 (0x33)
- Radius: Length = 53 (0x0035)
- Radius: Vector: BB4DA13501A135A10BEA87C7F89BA787
- Radius: Type = 7 (0x07) Framed-Protocol
- Radius: Length = 6 (0x06)
- Radius: Value (Hex) = 0x1
- Radius: Type = 13 (0x0D) Framed-Compression
- Radius: Length = 6 (0x06)
- Radius: Value (Hex) = 0x1
- Radius: Type = 18 (0x12) Reply-Message
- Radius: Length = 9 (0x09)
- Radius: Value (String) =
- 54 6f 6b 65 6e 20 31 | Token 1
- Radius: Type = 18 (0x12) Reply-Message
- Radius: Length = 9 (0x09)
- Radius: Value (String) =
- 54 6f 6b 65 6e 20 32 | Token 2
- Radius: Type = 24 (0x18) State
- Radius: Length = 3 (0x03)
- Radius: Value (String) =
- 30 | 0
- Sep 24 21:48:40 [IKEv1 DEBUG]Group = test, IP = 192.168.2.100, Received challenge status!
- Sep 24 21:48:40 [IKEv1 DEBUG]Group = test, IP = 192.168.2.100, constructing blank hash payload
- Sep 24 21:48:40 [IKEv1 DEBUG]Group = test, IP = 192.168.2.100, constructing qm hash payload
- Sep 24 21:48:40 [IKEv1]IP = 192.168.2.100, IKE_DECODE SENDING Message (msgid=4807f8c0) with payloads : HDR + HASH (8) + ATTR (14) + NONE (0) total length : 79
- BEFORE ENCRYPTION
- RAW PACKET DUMP on SEND
- c1 99 fe 96 b6 55 28 24 d7 d3 d2 14 e1 39 33 5a | .....U($.....93Z
- 08 10 06 00 c0 f8 07 48 1c 00 00 00 0e 00 00 18 | .......H........
- 55 d1 bc 2f 69 05 3b fd 4b 17 4a 4f cb c7 2c e6 | U../i.;.K.JO..,.
- 99 70 cf 61 00 00 00 1b 01 00 00 00 c0 88 00 00 | .p.a............
- 40 8a 00 00 40 8c 00 07 54 6f 6b 65 6e 20 31 | @[email protected] 1
- ISAKMP Header
- Initiator COOKIE: c1 99 fe 96 b6 55 28 24
- Responder COOKIE: d7 d3 d2 14 e1 39 33 5a
- Next Payload: Hash
- Version: 1.0
- Exchange Type: Transaction
- Flags: (none)
- MessageID: 4807F8C0
- Length: 28
- Payload Hash
- Next Payload: Attributes
- Reserved: 00
- Payload Length: 24
- Data:
- 55 d1 bc 2f 69 05 3b fd 4b 17 4a 4f cb c7 2c e6
- 99 70 cf 61
- Payload Attributes
- Next Payload: None
- Reserved: 00
- Payload Length: 27
- type: ISAKMP_CFG_REQUEST
- Reserved: 00
- Identifier: 0000
- XAUTH Type: Generic
- XAUTH User Password: (empty)
- XAUTH Message: (data not displayed)
- Sep 24 21:48:46 [IKEv1]IKE Receiver: Packet received on 192.168.2.120:500 from 192.168.2.100:500
- IKEv1 Recv RAW packet dump
- c1 99 fe 96 b6 55 28 24 d7 d3 d2 14 e1 39 33 5a | .....U($.....93Z
- 08 10 06 01 48 07 f8 c0 00 00 00 4c 34 22 83 58 | ....H......L4".X
- 8f 3f c1 4e e8 72 5d 76 81 e4 a0 d5 44 08 42 c3 | .?.N.r]v....D.B.
- ba 6a b5 4d fb a3 6d c7 c5 25 73 2e e2 f7 73 30 | .j.M..m..%s...s0
- 6e a2 46 2c be 20 fc 44 e3 3f 3e 28 | n.F,. .D.?>(
- RECV PACKET from 192.168.2.100
- ISAKMP Header
- Initiator COOKIE: c1 99 fe 96 b6 55 28 24
- Responder COOKIE: d7 d3 d2 14 e1 39 33 5a
- Next Payload: Hash
- Version: 1.0
- Exchange Type: Transaction
- Flags: (Encryption)
- MessageID: 4807F8C0
- Length: 76
- AFTER DECRYPTION
- ISAKMP Header
- Initiator COOKIE: c1 99 fe 96 b6 55 28 24
- Responder COOKIE: d7 d3 d2 14 e1 39 33 5a
- Next Payload: Hash
- Version: 1.0
- Exchange Type: Transaction
- Flags: (Encryption)
- MessageID: 4807F8C0
- Length: 76
- Payload Hash
- Next Payload: Attributes
- Reserved: 00
- Payload Length: 24
- Data:
- 0c 85 42 ef f8 ee 92 32 15 7a 33 bf df fa 8f b0
- 64 20 bd 26
- Payload Attributes
- Next Payload: None
- Reserved: 00
- Payload Length: 18
- type: ISAKMP_CFG_REPLY
- Reserved: 00
- Identifier: 0000
- XAUTH User Password: (data not displayed)
- Sep 24 21:48:46 [IKEv1]IP = 192.168.2.100, IKE_DECODE RECEIVED Message (msgid=4807f8c0) with payloads : HDR + HASH (8) + ATTR (14) + NONE (0) total length : 70
- Sep 24 21:48:46 [IKEv1 DEBUG]Group = test, IP = 192.168.2.100, process_attr(): Enter!
- Sep 24 21:48:46 [IKEv1 DEBUG]Group = test, IP = 192.168.2.100, Processing MODE_CFG Reply attributes.
- RADIUS packet decode (authentication request)
- --------------------------------------
- Raw packet data (length = 254).....
- 01 35 00 fe 03 70 6a 0f c9 5c e6 c1 83 8d b2 08 | .5...pj..\......
- e2 13 8d d0 01 0a 6b 61 72 73 74 65 6e 73 02 12 | ......karstens..
- 82 58 36 50 b5 5c 57 58 2f cf 97 a0 69 80 65 8a | .X6P.\WX/...i.e.
- 05 06 00 07 f0 00 06 06 00 00 00 02 07 06 00 00 | ................
- 00 01 18 03 30 1e 0f 31 39 32 2e 31 36 38 2e 32 | ....0..192.168.2
- 2e 31 32 30 1f 0f 31 39 32 2e 31 36 38 2e 32 2e | .120..192.168.2.
- 31 30 30 3d 06 00 00 00 05 42 0f 31 39 32 2e 31 | 100=.....B.192.1
- 36 38 2e 32 2e 31 30 30 04 06 c0 a8 02 78 1a 31 | 68.2.100.....x.1
- 00 00 00 09 01 2b 61 75 64 69 74 2d 73 65 73 73 | .....+audit-sess
- 69 6f 6e 2d 69 64 3d 30 61 30 61 30 31 30 31 30 | ion-id=0a0a01010
- 30 30 37 66 30 30 30 35 36 30 34 36 66 61 39 1a | 007f00056046fa9.
- 22 00 00 00 09 01 1c 69 70 3a 73 6f 75 72 63 65 | "......ip:source
- 2d 69 70 3d 31 39 32 2e 31 36 38 2e 32 2e 31 30 | -ip=192.168.2.10
- 30 1a 0c 00 00 0c 04 92 06 74 65 73 74 1a 0c 00 | 0........test...
- 00 0c 04 96 06 00 00 00 01 1a 15 00 00 00 09 01 | ................
- 0f 63 6f 61 2d 70 75 73 68 3d 74 72 75 65 | .coa-push=true
- Parsed packet data.....
- Radius: Code = 1 (0x01)
- Radius: Identifier = 53 (0x35)
- Radius: Length = 254 (0x00FE)
- Radius: Vector: 03706A0FC95CE6C1838DB208E2138DD0
- Radius: Type = 1 (0x01) User-Name
- Radius: Length = 10 (0x0A)
- Radius: Value (String) =
- 6b 61 72 73 74 65 6e 73 | karstens
- Radius: Type = 2 (0x02) User-Password
- Radius: Length = 18 (0x12)
- Radius: Value (String) =
- 82 58 36 50 b5 5c 57 58 2f cf 97 a0 69 80 65 8a | .X6P.\WX/...i.e.
- Radius: Type = 5 (0x05) NAS-Port
- Radius: Length = 6 (0x06)
- Radius: Value (Hex) = 0x7F000
- Radius: Type = 6 (0x06) Service-Type
- Radius: Length = 6 (0x06)
- Radius: Value (Hex) = 0x2
- Radius: Type = 7 (0x07) Framed-Protocol
- Radius: Length = 6 (0x06)
- Radius: Value (Hex) = 0x1
- Radius: Type = 24 (0x18) State
- Radius: Length = 3 (0x03)
- Radius: Value (String) =
- 30 | 0
- Radius: Type = 30 (0x1E) Called-Station-Id
- Radius: Length = 15 (0x0F)
- Radius: Value (String) =
- 31 39 32 2e 31 36 38 2e 32 2e 31 32 30 | 192.168.2.120
- Radius: Type = 31 (0x1F) Calling-Station-Id
- Radius: Length = 15 (0x0F)
- Radius: Value (String) =
- 31 39 32 2e 31 36 38 2e 32 2e 31 30 30 | 192.168.2.100
- Radius: Type = 61 (0x3D) NAS-Port-Type
- Radius: Length = 6 (0x06)
- Radius: Value (Hex) = 0x5
- Radius: Type = 66 (0x42) Tunnel-Client-Endpoint
- Radius: Length = 15 (0x0F)
- Radius: Value (String) =
- 31 39 32 2e 31 36 38 2e 32 2e 31 30 30 | 192.168.2.100
- Radius: Type = 4 (0x04) NAS-IP-Address
- Radius: Length = 6 (0x06)
- Radius: Value (IP Address) = 192.168.2.120 (0xC0A80278)
- Radius: Type = 26 (0x1A) Vendor-Specific
- Radius: Length = 49 (0x31)
- Radius: Vendor ID = 9 (0x00000009)
- Radius: Type = 1 (0x01) Cisco-AV-pair
- Radius: Length = 43 (0x2B)
- Radius: Value (String) =
- 61 75 64 69 74 2d 73 65 73 73 69 6f 6e 2d 69 64 | audit-session-id
- 3d 30 61 30 61 30 31 30 31 30 30 30 37 66 30 30 | =0a0a01010007f00
- 30 35 36 30 34 36 66 61 39 | 056046fa9
- Radius: Type = 26 (0x1A) Vendor-Specific
- Radius: Length = 34 (0x22)
- Radius: Vendor ID = 9 (0x00000009)
- Radius: Type = 1 (0x01) Cisco-AV-pair
- Radius: Length = 28 (0x1C)
- Radius: Value (String) =
- 69 70 3a 73 6f 75 72 63 65 2d 69 70 3d 31 39 32 | ip:source-ip=192
- 2e 31 36 38 2e 32 2e 31 30 30 | .168.2.100
- Radius: Type = 26 (0x1A) Vendor-Specific
- Radius: Length = 12 (0x0C)
- Radius: Vendor ID = 3076 (0x00000C04)
- Radius: Type = 146 (0x92) Tunnel-Group-Name
- Radius: Length = 6 (0x06)
- Radius: Value (String) =
- 74 65 73 74 | test
- Radius: Type = 26 (0x1A) Vendor-Specific
- Radius: Length = 12 (0x0C)
- Radius: Vendor ID = 3076 (0x00000C04)
- Radius: Type = 150 (0x96) Client-Type
- Radius: Length = 6 (0x06)
- Radius: Value (Integer) = 1 (0x0001)
- Radius: Type = 26 (0x1A) Vendor-Specific
- Radius: Length = 21 (0x15)
- Radius: Vendor ID = 9 (0x00000009)
- Radius: Type = 1 (0x01) Cisco-AV-pair
- Radius: Length = 15 (0x0F)
- Radius: Value (String) =
- 63 6f 61 2d 70 75 73 68 3d 74 72 75 65 | coa-push=true
- RADIUS packet decode (response)
- --------------------------------------
- Raw packet data (length = 32).....
- 02 35 00 20 9c 50 42 e8 63 90 39 a1 06 51 51 a1 | .5. .PB.c.9..QQ.
- df b6 48 92 07 06 00 00 00 01 0d 06 00 00 00 01 | ..H.............
- Parsed packet data.....
- Radius: Code = 2 (0x02)
- Radius: Identifier = 53 (0x35)
- Radius: Length = 32 (0x0020)
- Radius: Vector: 9C5042E8639039A1065151A1DFB64892
- Radius: Type = 7 (0x07) Framed-Protocol
- Radius: Length = 6 (0x06)
- Radius: Value (Hex) = 0x1
- Radius: Type = 13 (0x0D) Framed-Compression
- Radius: Length = 6 (0x06)
- Radius: Value (Hex) = 0x1
- Sep 24 21:48:47 [IKEv1 DEBUG]Group = test, Username = karstens, IP = 192.168.2.100, IKEGetUserAttributes: primary DNS = cleared
- Sep 24 21:48:47 [IKEv1 DEBUG]Group = test, Username = karstens, IP = 192.168.2.100, IKEGetUserAttributes: secondary DNS = cleared
- Sep 24 21:48:47 [IKEv1 DEBUG]Group = test, Username = karstens, IP = 192.168.2.100, IKEGetUserAttributes: primary WINS = cleared
- Sep 24 21:48:47 [IKEv1 DEBUG]Group = test, Username = karstens, IP = 192.168.2.100, IKEGetUserAttributes: secondary WINS = cleared
- Sep 24 21:48:47 [IKEv1 DEBUG]Group = test, Username = karstens, IP = 192.168.2.100, IKEGetUserAttributes: IP Compression = disabled
- Sep 24 21:48:47 [IKEv1 DEBUG]Group = test, Username = karstens, IP = 192.168.2.100, IKEGetUserAttributes: Split Tunneling Policy = Disabled
- Sep 24 21:48:47 [IKEv1 DEBUG]Group = test, Username = karstens, IP = 192.168.2.100, IKEGetUserAttributes: Browser Proxy Setting = no-modify
- Sep 24 21:48:47 [IKEv1 DEBUG]Group = test, Username = karstens, IP = 192.168.2.100, IKEGetUserAttributes: Browser Proxy Bypass Local = disable
- Sep 24 21:48:47 [IKEv1]Group = test, Username = karstens, IP = 192.168.2.100, User (karstens) authenticated.
- Sep 24 21:48:47 [IKEv1 DEBUG]Group = test, Username = karstens, IP = 192.168.2.100, constructing blank hash payload
- Sep 24 21:48:47 [IKEv1 DEBUG]Group = test, Username = karstens, IP = 192.168.2.100, constructing qm hash payload
- Sep 24 21:48:47 [IKEv1]IP = 192.168.2.100, IKE_DECODE SENDING Message (msgid=3d3f34bb) with payloads : HDR + HASH (8) + ATTR (14) + NONE (0) total length : 64
- BEFORE ENCRYPTION
- RAW PACKET DUMP on SEND
- c1 99 fe 96 b6 55 28 24 d7 d3 d2 14 e1 39 33 5a | .....U($.....93Z
- 08 10 06 00 bb 34 3f 3d 1c 00 00 00 0e 00 00 18 | .....4?=........
- e5 45 de 9f 91 84 36 18 8a 98 50 d1 38 3f 56 81 | .E....6...P.8?V.
- e3 5f 5e 92 00 00 00 0c 03 00 00 00 c0 8f 00 01 | ._^.............
- ISAKMP Header
- Initiator COOKIE: c1 99 fe 96 b6 55 28 24
- Responder COOKIE: d7 d3 d2 14 e1 39 33 5a
- Next Payload: Hash
- Version: 1.0
- Exchange Type: Transaction
- Flags: (none)
- MessageID: 3D3F34BB
- Length: 28
- Payload Hash
- Next Payload: Attributes
- Reserved: 00
- Payload Length: 24
- Data:
- e5 45 de 9f 91 84 36 18 8a 98 50 d1 38 3f 56 81
- e3 5f 5e 92
- Payload Attributes
- Next Payload: None
- Reserved: 00
- Payload Length: 12
- type: ISAKMP_CFG_SET
- Reserved: 00
- Identifier: 0000
- XAUTH Status: Pass
- Sep 24 21:48:48 [IKEv1]IKE Receiver: Packet received on 192.168.2.120:500 from 192.168.2.100:500
- IKEv1 Recv RAW packet dump
- c1 99 fe 96 b6 55 28 24 d7 d3 d2 14 e1 39 33 5a | .....U($.....93Z
- 08 10 06 01 3d 3f 34 bb 00 00 00 4c 00 13 a8 92 | ....=?4....L....
- 30 98 e8 98 40 28 49 4a 74 39 46 96 31 f5 eb 0a | 0...@(IJt9F.1...
- be 59 67 1e f2 1d 29 0b d4 c2 5e 7e 88 b2 fc 8e | .Yg...)...^~....
- 00 4d 73 a0 b5 19 ba bd cd 47 44 21 | .Ms......GD!
- RECV PACKET from 192.168.2.100
- ISAKMP Header
- Initiator COOKIE: c1 99 fe 96 b6 55 28 24
- Responder COOKIE: d7 d3 d2 14 e1 39 33 5a
- Next Payload: Hash
- Version: 1.0
- Exchange Type: Transaction
- Flags: (Encryption)
- MessageID: 3D3F34BB
- Length: 76
- AFTER DECRYPTION
- ISAKMP Header
- Initiator COOKIE: c1 99 fe 96 b6 55 28 24
- Responder COOKIE: d7 d3 d2 14 e1 39 33 5a
- Next Payload: Hash
- Version: 1.0
- Exchange Type: Transaction
- Flags: (Encryption)
- MessageID: 3D3F34BB
- Length: 76
- Payload Hash
- Next Payload: Attributes
- Reserved: 00
- Payload Length: 24
- Data:
- 11 87 a5 16 eb ae 38 6f 70 af 06 47 fb eb e1 f5
- 78 f7 4f a7
- Payload Attributes
- Next Payload: None
- Reserved: 00
- Payload Length: 12
- type: ISAKMP_CFG_ACK
- Reserved: 00
- Identifier: 0000
- XAUTH Status: Fail
- Sep 24 21:48:48 [IKEv1]IP = 192.168.2.100, IKE_DECODE RECEIVED Message (msgid=3d3f34bb) with payloads : HDR + HASH (8) + ATTR (14) + NONE (0) total length : 64
- Sep 24 21:48:48 [IKEv1 DEBUG]Group = test, Username = karstens, IP = 192.168.2.100, process_attr(): Enter!
- Sep 24 21:48:48 [IKEv1 DEBUG]Group = test, Username = karstens, IP = 192.168.2.100, Processing cfg ACK attributes
- Sep 24 21:48:48 [IKEv1]IKE Receiver: Packet received on 192.168.2.120:500 from 192.168.2.100:500
- IKEv1 Recv RAW packet dump
- c1 99 fe 96 b6 55 28 24 d7 d3 d2 14 e1 39 33 5a | .....U($.....93Z
- 08 10 06 01 9e 44 57 83 00 00 00 ac a7 49 33 28 | .....DW......I3(
- a4 4b ae b2 39 e2 b0 9e 7b 3f 2d fd ab 96 d2 ec | .K..9...{?-.....
- e5 ef 7b 3d 2e 68 b3 6a 26 f3 5e b4 6d e4 28 15 | ..{=.h.j&.^.m.(.
- 47 f6 13 c0 27 88 ed de 28 0d 24 49 4d dd 61 3d | G...'...(.$IM.a=
- d6 8b c0 cf da 9e e8 a9 06 71 13 0c 76 4a 0b 2f | .........q..vJ./
- 9f ef 55 0b 1f 1b 68 76 20 74 06 c2 c7 6f ee eb | ..U...hv t...o..
- 50 42 ac 84 8c 0b 34 a9 0c e3 96 f3 2b d5 0c c9 | PB....4.....+...
- 5f f5 b6 d0 78 e7 39 01 f4 0b 04 b8 d5 9e 26 c5 | _...x.9.......&.
- 48 91 cf 16 2e 2f 14 f4 f2 ea 8f a0 8b 70 75 f9 | H..../.......pu.
- cc 75 3c 30 3f d3 f1 ee c6 ba 66 61 | .u<0?.....fa
- RECV PACKET from 192.168.2.100
- ISAKMP Header
- Initiator COOKIE: c1 99 fe 96 b6 55 28 24
- Responder COOKIE: d7 d3 d2 14 e1 39 33 5a
- Next Payload: Hash
- Version: 1.0
- Exchange Type: Transaction
- Flags: (Encryption)
- MessageID: 9E445783
- Length: 172
- AFTER DECRYPTION
- ISAKMP Header
- Initiator COOKIE: c1 99 fe 96 b6 55 28 24
- Responder COOKIE: d7 d3 d2 14 e1 39 33 5a
- Next Payload: Hash
- Version: 1.0
- Exchange Type: Transaction
- Flags: (Encryption)
- MessageID: 9E445783
- Length: 172
- Payload Hash
- Next Payload: Attributes
- Reserved: 00
- Payload Length: 24
- Data:
- d6 bc 27 80 97 27 3d 1f 5f f1 45 45 2d fa d2 de
- 93 2c 30 a1
- Payload Attributes
- Next Payload: None
- Reserved: 00
- Payload Length: 113
- type: ISAKMP_CFG_REQUEST
- Reserved: 00
- Identifier: 11FB
- IPv4 Address: (empty)
- IPv4 Netmask: (empty)
- IPv4 DNS: (empty)
- IPv4 NBNS (WINS): (empty)
- Address Expiry: (empty)
- Application Version:
- 43 69 73 63 6f 20 53 79 73 74 65 6d 73 20 56 50
- 4e 20 43 6c 69 65 6e 74 20 31 30 2e 31 30 2e 35
- 3a 4d 61 63 20 4f 53 20 58
- Cisco extension: Banner: (empty)
- Cisco extension: Default Domain Name: (empty)
- Cisco extension: Split DNS Name: (empty)
- Cisco extension: Split Include: (empty)
- Cisco extension: Include Local LAN: (empty)
- Cisco extension: Do PFS: (empty)
- Cisco extension: Save PWD: (empty)
- Cisco extension: Firewall Type: (empty)
- Cisco extension: Backup Servers: (empty)
- Cisco extension: Browser Proxy: (empty)
- Sep 24 21:48:48 [IKEv1]IP = 192.168.2.100, IKE_DECODE RECEIVED Message (msgid=9e445783) with payloads : HDR + HASH (8) + ATTR (14) + NONE (0) total length : 165
- Sep 24 21:48:48 [IKEv1 DEBUG]Group = test, Username = karstens, IP = 192.168.2.100, process_attr(): Enter!
- Sep 24 21:48:48 [IKEv1 DEBUG]Group = test, Username = karstens, IP = 192.168.2.100, Processing cfg Request attributes
- Sep 24 21:48:48 [IKEv1 DEBUG]Group = test, Username = karstens, IP = 192.168.2.100, MODE_CFG: Received request for IPV4 address!
- Sep 24 21:48:48 [IKEv1 DEBUG]Group = test, Username = karstens, IP = 192.168.2.100, MODE_CFG: Received request for IPV4 net mask!
- Sep 24 21:48:48 [IKEv1 DEBUG]Group = test, Username = karstens, IP = 192.168.2.100, MODE_CFG: Received request for DNS server address!
- Sep 24 21:48:48 [IKEv1 DEBUG]Group = test, Username = karstens, IP = 192.168.2.100, MODE_CFG: Received request for WINS server address!
- Sep 24 21:48:48 [IKEv1]Group = test, Username = karstens, IP = 192.168.2.100, Received unsupported transaction mode attribute: 5
- Sep 24 21:48:48 [IKEv1 DEBUG]Group = test, Username = karstens, IP = 192.168.2.100, MODE_CFG: Received request for Application Version!
- Sep 24 21:48:48 [IKEv1]Group = test, Username = karstens, IP = 192.168.2.100, Client Type: Mac OS X Client Application Version: 10.10.5
- Sep 24 21:48:48 [IKEv1 DEBUG]Group = test, Username = karstens, IP = 192.168.2.100, MODE_CFG: Received request for Banner!
- Sep 24 21:48:48 [IKEv1 DEBUG]Group = test, Username = karstens, IP = 192.168.2.100, MODE_CFG: Received request for Default Domain Name!
- Sep 24 21:48:48 [IKEv1 DEBUG]Group = test, Username = karstens, IP = 192.168.2.100, MODE_CFG: Received request for Split DNS!
- Sep 24 21:48:48 [IKEv1 DEBUG]Group = test, Username = karstens, IP = 192.168.2.100, MODE_CFG: Received request for Split Tunnel List!
- Sep 24 21:48:48 [IKEv1 DEBUG]Group = test, Username = karstens, IP = 192.168.2.100, MODE_CFG: Received request for Local LAN Include!
- Sep 24 21:48:48 [IKEv1 DEBUG]Group = test, Username = karstens, IP = 192.168.2.100, MODE_CFG: Received request for PFS setting!
- Sep 24 21:48:48 [IKEv1 DEBUG]Group = test, Username = karstens, IP = 192.168.2.100, MODE_CFG: Received request for Save PW setting!
- Sep 24 21:48:48 [IKEv1 DEBUG]Group = test, Username = karstens, IP = 192.168.2.100, MODE_CFG: Received request for FWTYPE!
- Sep 24 21:48:48 [IKEv1 DEBUG]Group = test, Username = karstens, IP = 192.168.2.100, MODE_CFG: Received request for backup ip-sec peer list!
- Sep 24 21:48:48 [IKEv1 DEBUG]Group = test, Username = karstens, IP = 192.168.2.100, MODE_CFG: Received request for Client Browser Proxy Setting!
- Sep 24 21:48:48 [IKEv1 DEBUG]Group = test, Username = karstens, IP = 192.168.2.100, Obtained IP addr (10.10.1.10) prior to initiating Mode Cfg (XAuth enabled)
- Sep 24 21:48:48 [IKEv1 DEBUG]Group = test, Username = karstens, IP = 192.168.2.100, Sending subnet mask (255.255.255.0) to remote client
- Sep 24 21:48:48 [IKEv1]Group = test, Username = karstens, IP = 192.168.2.100, Assigned private IP address 10.10.1.10 to remote user
- Sep 24 21:48:48 [IKEv1 DEBUG]Group = test, Username = karstens, IP = 192.168.2.100, constructing blank hash payload
- Sep 24 21:48:48 [IKEv1 DEBUG]Group = test, Username = karstens, IP = 192.168.2.100, Send Client Browser Proxy Attributes!
- Sep 24 21:48:48 [IKEv1 DEBUG]Group = test, Username = karstens, IP = 192.168.2.100, Browser Proxy set to No-Modify. Browser Proxy data will NOT be included in the mode-cfg reply
- Sep 24 21:48:48 [IKEv1 DEBUG]Group = test, Username = karstens, IP = 192.168.2.100, constructing qm hash payload
- Sep 24 21:48:48 [IKEv1]IP = 192.168.2.100, IKE_DECODE SENDING Message (msgid=9e445783) with payloads : HDR + HASH (8) + ATTR (14) + NONE (0) total length : 170
- BEFORE ENCRYPTION
- RAW PACKET DUMP on SEND
- c1 99 fe 96 b6 55 28 24 d7 d3 d2 14 e1 39 33 5a | .....U($.....93Z
- 08 10 06 00 83 57 44 9e 1c 00 00 00 0e 00 00 18 | .....WD.........
- 8a 37 6b fb 30 14 68 a2 7f 59 dd b1 0b 50 38 65 | .7k.0.h.Y...P8e
- 86 0a 0e c9 00 00 00 76 02 00 00 00 00 01 00 04 | .......v........
- 0a 0a 01 0a 00 02 00 04 ff ff ff 00 f0 01 00 00 | ................
- f0 07 00 00 00 07 00 52 43 69 73 63 6f 20 53 79 | .......RCisco Sy
- 73 74 65 6d 73 2c 20 49 6e 63 20 41 53 41 35 35 | stems, Inc ASA55
- 30 35 20 56 65 72 73 69 6f 6e 20 39 2e 32 28 34 | 05 Version 9.2(4
- 29 20 62 75 69 6c 74 20 62 79 20 62 75 69 6c 64 | ) built by build
- 65 72 73 20 6f 6e 20 54 75 65 20 31 34 2d 4a 75 | ers on Tue 14-Ju
- 6c 2d 31 35 20 32 32 3a 31 39 | l-15 22:19
- ISAKMP Header
- Initiator COOKIE: c1 99 fe 96 b6 55 28 24
- Responder COOKIE: d7 d3 d2 14 e1 39 33 5a
- Next Payload: Hash
- Version: 1.0
- Exchange Type: Transaction
- Flags: (none)
- MessageID: 9E445783
- Length: 28
- Payload Hash
- Next Payload: Attributes
- Reserved: 00
- Payload Length: 24
- Data:
- 8a 37 6b fb 30 14 68 a2 7f 59 dd b1 0b 50 38 65
- 86 0a 0e c9
- Payload Attributes
- Next Payload: None
- Reserved: 00
- Payload Length: 118
- type: ISAKMP_CFG_REPLY
- Reserved: 00
- Identifier: 0000
- IPv4 Address: 10.10.1.10
- IPv4 Netmask: 255.255.255.0
- Cisco extension: Save PWD: No
- Cisco extension: Do PFS: No
- Application Version:
- 43 69 73 63 6f 20 53 79 73 74 65 6d 73 2c 20 49
- 6e 63 20 41 53 41 35 35 30 35 20 56 65 72 73 69
- 6f 6e 20 39 2e 32 28 34 29 20 62 75 69 6c 74 20
- 62 79 20 62 75 69 6c 64 65 72 73 20 6f 6e 20 54
- 75 65 20 31 34 2d 4a 75 6c 2d 31 35 20 32 32 3a
- 31 39
- Sep 24 21:48:48 [IKEv1]IKE Receiver: Packet received on 192.168.2.120:500 from 192.168.2.100:500
- IKEv1 Recv RAW packet dump
- c1 99 fe 96 b6 55 28 24 d7 d3 d2 14 e1 39 33 5a | .....U($.....93Z
- 08 10 20 01 c5 cb 0b 9a 00 00 01 2c 63 cf 01 52 | .. ........,c..R
- 4e 3f c8 03 ce 78 6e 4f d1 7f 5f 50 e0 0b 82 28 | N?...xnO._P...(
- 86 7c a6 de a4 e9 2a 68 36 45 43 d4 5d 34 27 d5 | .|....*h6EC.]4'.
- ee 0e 83 bb 7d fd fc 62 b6 bb ad 4c 60 48 1a ca | ....}..b...L`H..
- eb 4d 40 1f f7 17 d9 31 1d d0 b1 e2 db f0 94 7d | [email protected].......}
- 9b b3 23 23 8d 7e 74 46 38 0e 87 e8 70 17 bf e0 | ..##.~tF8...p...
- f5 e2 04 a9 85 e2 a7 ca 05 8d a9 5a f9 e9 79 82 | ...........Z..y.
- 88 1c e8 90 c9 d4 50 c3 bb 31 ad a4 ca 4b 9e b9 | ......P..1...K..
- 40 a8 7d a3 d6 b3 1e b7 b3 05 78 2f 4d d9 7a a1 | @.}.......x/M.z.
- 0a 04 31 20 34 6a 32 ad ac 27 0c 3b bd 2b 24 30 | ..1 4j2..'.;.+$0
- f0 b4 ba a8 0f 7e 3a 5f 40 b2 06 31 2e ad 31 a1 | .....~:[email protected].
- 20 eb 7f 26 7f d0 f7 73 e1 69 88 a2 98 57 79 83 | .&..s.i...Wy.
- 2d 82 f7 09 c4 90 11 7e bc e7 5a dd 4e 62 11 eb | -......~..Z.Nb..
- de ca a0 b3 47 f5 ac a8 da 03 e2 09 4b 42 13 19 | ....G.......KB..
- 1b 4e c4 ab e8 1b 9a 9e 73 3c 6c b4 88 e6 f6 30 | .N......s<l....0
- 8a bd c5 85 d6 fb c4 2c a6 46 f8 b3 26 41 57 6e | .......,.F..&AWn
- f5 7c 82 ae cc dd c9 66 4d 54 50 aa 7c 6a d3 51 | .|.....fMTP.|j.Q
- 5f e7 81 43 f6 4f f6 a8 06 ff b1 b6 | _..C.O......
- RECV PACKET from 192.168.2.100
- ISAKMP Header
- Initiator COOKIE: c1 99 fe 96 b6 55 28 24
- Responder COOKIE: d7 d3 d2 14 e1 39 33 5a
- Next Payload: Hash
- Version: 1.0
- Exchange Type: Quick Mode
- Flags: (Encryption)
- MessageID: C5CB0B9A
- Length: 300
- Sep 24 21:48:48 [IKEv1 DECODE]IP = 192.168.2.100, IKE Responder starting QM: msg id = c5cb0b9a
- Sep 24 21:48:48 [IKEv1 DEBUG]Group = test, Username = karstens, IP = 192.168.2.100, Delay Quick Mode processing, Cert/Trans Exch/RM DSID in progress
- Sep 24 21:48:48 [IKEv1]Group = test, Username = karstens, IP = 192.168.2.100, Gratuitous ARP sent for 10.10.1.10
- Sep 24 21:48:48 [IKEv1 DEBUG]Group = test, Username = karstens, IP = 192.168.2.100, Resume Quick Mode processing, Cert/Trans Exch/RM DSID completed
- Sep 24 21:48:48 [IKEv1]Group = test, Username = karstens, IP = 192.168.2.100, PHASE 1 COMPLETED
- Sep 24 21:48:48 [IKEv1]IP = 192.168.2.100, Keep-alive type for this connection: DPD
- Sep 24 21:48:48 [IKEv1 DEBUG]Group = test, Username = karstens, IP = 192.168.2.100, Starting P1 rekey timer: 3420 seconds.
- AFTER DECRYPTION
- ISAKMP Header
- Initiator COOKIE: c1 99 fe 96 b6 55 28 24
- Responder COOKIE: d7 d3 d2 14 e1 39 33 5a
- Next Payload: Hash
- Version: 1.0
- Exchange Type: Quick Mode
- Flags: (Encryption)
- MessageID: C5CB0B9A
- Length: 300
- Payload Hash
- Next Payload: Security Association
- Reserved: 00
- Payload Length: 24
- Data:
- 50 19 bb 66 65 3c 4c 32 92 30 93 59 62 ae 74 05
- 6d 5e 77 28
- Payload Security Association
- Next Payload: Nonce
- Reserved: 00
- Payload Length: 184
- DOI: IPsec
- Situation:(SIT_IDENTITY_ONLY)
- Payload Proposal
- Next Payload: None
- Reserved: 00
- Payload Length: 172
- Proposal #: 1
- Protocol-Id: PROTO_IPSEC_ESP
- SPI Size: 4
- # of transforms: 6
- SPI: 01 cc bd 97
- Payload Transform
- Next Payload: Transform
- Reserved: 00
- Payload Length: 28
- Transform #: 1
- Transform-Id: ESP_AES
- Reserved2: 0000
- Life Type: Seconds
- Life Duration (Hex): 0e 10
- Encapsulation Mode: Tunnel
- Key Length: 256
- Authentication Algorithm: SHA1
- Payload Transform
- Next Payload: Transform
- Reserved: 00
- Payload Length: 28
- Transform #: 2
- Transform-Id: ESP_AES
- Reserved2: 0000
- Life Type: Seconds
- Life Duration (Hex): 0e 10
- Encapsulation Mode: Tunnel
- Key Length: 256
- Authentication Algorithm: MD5
- Payload Transform
- Next Payload: Transform
- Reserved: 00
- Payload Length: 28
- Transform #: 3
- Transform-Id: ESP_AES
- Reserved2: 0000
- Life Type: Seconds
- Life Duration (Hex): 0e 10
- Encapsulation Mode: Tunnel
- Key Length: 128
- Authentication Algorithm: SHA1
- Payload Transform
- Next Payload: Transform
- Reserved: 00
- Payload Length: 28
- Transform #: 4
- Transform-Id: ESP_AES
- Reserved2: 0000
- Life Type: Seconds
- Life Duration (Hex): 0e 10
- Encapsulation Mode: Tunnel
- Key Length: 128
- Authentication Algorithm: MD5
- Payload Transform
- Next Payload: Transform
- Reserved: 00
- Payload Length: 24
- Transform #: 5
- Transform-Id: ESP_3DES
- Reserved2: 0000
- Life Type: Seconds
- Life Duration (Hex): 0e 10
- Encapsulation Mode: Tunnel
- Authentication Algorithm: SHA1
- Payload Transform
- Next Payload: None
- Reserved: 00
- Payload Length: 24
- Transform #: 6
- Transform-Id: ESP_3DES
- Reserved2: 0000
- Life Type: Seconds
- Life Duration (Hex): 0e 10
- Encapsulation Mode: Tunnel
- Authentication Algorithm: MD5
- Payload Nonce
- Next Payload: Identification
- Reserved: 00
- Payload Length: 20
- Data:
- f2 ce 03 08 c9 96 85 20 5e fe 14 51 c1 95 69 e9
- Payload Identification
- Next Payload: Identification
- Reserved: 00
- Payload Length: 12
- ID Type: IPv4 Address (1)
- Protocol ID (UDP/TCP, etc...): 0
- Port: 0
- ID Data: 10.10.1.10
- Payload Identification
- Next Payload: None
- Reserved: 00
- Payload Length: 16
- ID Type: IPv4 Subnet (4)
- Protocol ID (UDP/TCP, etc...): 0
- Port: 0
- ID Data: 0.0.0.0/0.0.0.0
- Sep 24 21:48:48 [IKEv1]IP = 192.168.2.100, IKE_DECODE RECEIVED Message (msgid=c5cb0b9a) with payloads : HDR + HASH (8) + SA (1) + NONCE (10) + ID (5) + ID (5) + NONE (0) total length : 284
- Sep 24 21:48:48 [IKEv1 DEBUG]Group = test, Username = karstens, IP = 192.168.2.100, processing hash payload
- Sep 24 21:48:48 [IKEv1 DEBUG]Group = test, Username = karstens, IP = 192.168.2.100, processing SA payload
- Sep 24 21:48:48 [IKEv1 DEBUG]Group = test, Username = karstens, IP = 192.168.2.100, processing nonce payload
- Sep 24 21:48:48 [IKEv1 DEBUG]Group = test, Username = karstens, IP = 192.168.2.100, processing ID payload
- Sep 24 21:48:48 [IKEv1 DECODE]Group = test, Username = karstens, IP = 192.168.2.100, ID_IPV4_ADDR ID received
- 10.10.1.10
- Sep 24 21:48:48 [IKEv1]Group = test, Username = karstens, IP = 192.168.2.100, Received remote Proxy Host data in ID Payload: Address 10.10.1.10, Protocol 0, Port 0
- Sep 24 21:48:48 [IKEv1 DEBUG]Group = test, Username = karstens, IP = 192.168.2.100, processing ID payload
- Sep 24 21:48:48 [IKEv1 DECODE]Group = test, Username = karstens, IP = 192.168.2.100, ID_IPV4_ADDR_SUBNET ID received--0.0.0.0--0.0.0.0
- Sep 24 21:48:48 [IKEv1]Group = test, Username = karstens, IP = 192.168.2.100, Received local IP Proxy Subnet data in ID Payload: Address 0.0.0.0, Mask 0.0.0.0, Protocol 0, Port 0
- Sep 24 21:48:48 [IKEv1]Group = test, Username = karstens, IP = 192.168.2.100, QM IsRekeyed old sa not found by addr
- Sep 24 21:48:48 [IKEv1]Group = test, Username = karstens, IP = 192.168.2.100, Static Crypto Map check, map SYSTEM_DEFAULT_CRYPTO_MAP, seq = 65535 is a successful match
- Sep 24 21:48:48 [IKEv1]Group = test, Username = karstens, IP = 192.168.2.100, IKE Remote Peer configured for crypto map: SYSTEM_DEFAULT_CRYPTO_MAP
- Sep 24 21:48:48 [IKEv1 DEBUG]Group = test, Username = karstens, IP = 192.168.2.100, processing IPSec SA payload
- Sep 24 21:48:48 [IKEv1 DEBUG]Group = test, Username = karstens, IP = 192.168.2.100, IPSec SA Proposal # 1, Transform # 3 acceptable Matches global IPSec SA entry # 65535
- Sep 24 21:48:48 [IKEv1]Group = test, Username = karstens, IP = 192.168.2.100, IKE: requesting SPI!
- IPSEC: Received a PFKey message from IKE
- IPSEC: Parsing PFKey GETSPI message
- IPSEC: Creating IPsec SA
- IPSEC: Getting the inbound SPI
- IPSEC: New embryonic SA created @ 0xccf245e8,
- SCB: 0xCDDA8E80,
- Direction: inbound
- SPI : 0x7A59C06E
- Session ID: 0x0007F000
- VPIF num : 0x00000003
- Tunnel type: ra
- Protocol : esp
- Lifetime : 240 seconds
- Sep 24 21:48:48 [IKEv1 DEBUG]Group = test, Username = karstens, IP = 192.168.2.100, IKE got SPI from key engine: SPI = 0x7a59c06e
- Sep 24 21:48:48 [IKEv1 DEBUG]Group = test, Username = karstens, IP = 192.168.2.100, oakley constucting quick mode
- Sep 24 21:48:48 [IKEv1 DEBUG]Group = test, Username = karstens, IP = 192.168.2.100, constructing blank hash payload
- Sep 24 21:48:48 [IKEv1 DEBUG]Group = test, Username = karstens, IP = 192.168.2.100, constructing IPSec SA payload
- Sep 24 21:48:48 [IKEv1]Group = test, Username = karstens, IP = 192.168.2.100, Overriding Initiator's IPSec rekeying duration from 0 to 4608000 Kbs
- Sep 24 21:48:48 [IKEv1 DEBUG]Group = test, Username = karstens, IP = 192.168.2.100, constructing IPSec nonce payload
- Sep 24 21:48:48 [IKEv1 DEBUG]Group = test, Username = karstens, IP = 192.168.2.100, constructing proxy ID
- Sep 24 21:48:48 [IKEv1 DEBUG]Group = test, Username = karstens, IP = 192.168.2.100, Transmitting Proxy Id:
- Remote host: 10.10.1.10 Protocol 0 Port 0
- Local subnet: 0.0.0.0 mask 0.0.0.0 Protocol 0 Port 0
- Sep 24 21:48:48 [IKEv1 DEBUG]Group = test, Username = karstens, IP = 192.168.2.100, Sending RESPONDER LIFETIME notification to Initiator
- Sep 24 21:48:48 [IKEv1 DEBUG]Group = test, Username = karstens, IP = 192.168.2.100, constructing qm hash payload
- Sep 24 21:48:48 [IKEv1 DECODE]Group = test, Username = karstens, IP = 192.168.2.100, IKE Responder sending 2nd QM pkt: msg id = c5cb0b9a
- Sep 24 21:48:48 [IKEv1]IP = 192.168.2.100, IKE_DECODE SENDING Message (msgid=c5cb0b9a) with payloads : HDR + HASH (8) + SA (1) + NONCE (10) + ID (5) + ID (5) + NOTIFY (11) + NONE (0) total length : 184
- BEFORE ENCRYPTION
- RAW PACKET DUMP on SEND
- c1 99 fe 96 b6 55 28 24 d7 d3 d2 14 e1 39 33 5a | .....U($.....93Z
- 08 10 20 00 9a 0b cb c5 1c 00 00 00 01 00 00 18 | .. .............
- 4d c1 0f af ef 20 d9 d8 01 3f bf 29 95 1f d4 7f | M.... ...?.)...
- 3d d3 c2 ce 0a 00 00 34 00 00 00 01 00 00 00 01 | =......4........
- 00 00 00 28 01 03 04 01 7a 59 c0 6e 00 00 00 1c | ...(....zY.n....
- 01 0c 00 00 80 01 00 01 80 02 0e 10 80 04 00 01 | ................
- 80 05 00 02 80 06 00 80 05 00 00 18 da 02 b3 e7 | ................
- 72 8b 5c 14 5a d9 c5 9c 46 13 e9 2a 7e ec 41 97 | r.\.Z...F..*~.A.
- 05 00 00 0c 01 00 00 00 0a 0a 01 0a 0b 00 00 10 | ................
- 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 1c | ................
- 00 00 00 01 03 04 60 00 7a 59 c0 6e 80 01 00 02 | ......`.zY.n....
- 00 02 00 04 00 46 50 00 | .....FP.
- ISAKMP Header
- Initiator COOKIE: c1 99 fe 96 b6 55 28 24
- Responder COOKIE: d7 d3 d2 14 e1 39 33 5a
- Next Payload: Hash
- Version: 1.0
- Exchange Type: Quick Mode
- Flags: (none)
- MessageID: C5CB0B9A
- Length: 28
- Payload Hash
- Next Payload: Security Association
- Reserved: 00
- Payload Length: 24
- Data:
- 4d c1 0f af ef 20 d9 d8 01 3f bf 29 95 1f d4 7f
- 3d d3 c2 ce
- Payload Security Association
- Next Payload: Nonce
- Reserved: 00
- Payload Length: 52
- DOI: IPsec
- Situation:(SIT_IDENTITY_ONLY)
- Payload Proposal
- Next Payload: None
- Reserved: 00
- Payload Length: 40
- Proposal #: 1
- Protocol-Id: PROTO_IPSEC_ESP
- SPI Size: 4
- # of transforms: 1
- SPI: 7a 59 c0 6e
- Payload Transform
- Next Payload: None
- Reserved: 00
- Payload Length: 28
- Transform #: 1
- Transform-Id: ESP_AES
- Reserved2: 0000
- Life Type: Seconds
- Life Duration (Hex): 0e 10
- Encapsulation Mode: Tunnel
- Authentication Algorithm: SHA1
- Key Length: 128
- Payload Nonce
- Next Payload: Identification
- Reserved: 00
- Payload Length: 24
- Data:
- da 02 b3 e7 72 8b 5c 14 5a d9 c5 9c 46 13 e9 2a
- 7e ec 41 97
- Payload Identification
- Next Payload: Identification
- Reserved: 00
- Payload Length: 12
- ID Type: IPv4 Address (1)
- Protocol ID (UDP/TCP, etc...): 0
- Port: 0
- ID Data: 10.10.1.10
- Payload Identification
- Next Payload: Notification
- Reserved: 00
- Payload Length: 16
- ID Type: IPv4 Subnet (4)
- Protocol ID (UDP/TCP, etc...): 0
- Port: 0
- ID Data: 0.0.0.0/0.0.0.0
- Payload Notification
- Next Payload: None
- Reserved: 00
- Payload Length: 28
- DOI: IPsec
- Protocol-ID: PROTO_IPSEC_ESP
- Spi Size: 4
- Notify Type: STATUS_RESP_LIFETIME
- SPI: 7a 59 c0 6e
- Data: 80 01 00 02 00 02 00 04 00 46 50 00
- Sep 24 21:48:48 [IKEv1]IKE Receiver: Packet received on 192.168.2.120:500 from 192.168.2.100:500
- IKEv1 Recv RAW packet dump
- c1 99 fe 96 b6 55 28 24 d7 d3 d2 14 e1 39 33 5a | .....U($.....93Z
- 08 10 20 01 c5 cb 0b 9a 00 00 00 3c 78 81 b5 a0 | .. ........<x...
- 2d 19 33 d6 a8 97 30 95 fe e1 39 af 61 ba a3 c1 | -.3...0...9.a...
- 95 85 02 43 57 7d 18 d2 b1 2a 23 b8 | ...CW}...*#.
- RECV PACKET from 192.168.2.100
- ISAKMP Header
- Initiator COOKIE: c1 99 fe 96 b6 55 28 24
- Responder COOKIE: d7 d3 d2 14 e1 39 33 5a
- Next Payload: Hash
- Version: 1.0
- Exchange Type: Quick Mode
- Flags: (Encryption)
- MessageID: C5CB0B9A
- Length: 60
- AFTER DECRYPTION
- ISAKMP Header
- Initiator COOKIE: c1 99 fe 96 b6 55 28 24
- Responder COOKIE: d7 d3 d2 14 e1 39 33 5a
- Next Payload: Hash
- Version: 1.0
- Exchange Type: Quick Mode
- Flags: (Encryption)
- MessageID: C5CB0B9A
- Length: 60
- Payload Hash
- Next Payload: None
- Reserved: 00
- Payload Length: 24
- Data:
- 55 e0 a4 ae 2d 6e d7 a8 35 a0 42 fe e8 fe ba ec
- b0 d4 0a a6
- Sep 24 21:48:48 [IKEv1]IP = 192.168.2.100, IKE_DECODE RECEIVED Message (msgid=c5cb0b9a) with payloads : HDR + HASH (8) + NONE (0) total length : 52
- Sep 24 21:48:48 [IKEv1 DEBUG]Group = test, Username = karstens, IP = 192.168.2.100, processing hash payload
- Sep 24 21:48:48 [IKEv1 DEBUG]Group = test, Username = karstens, IP = 192.168.2.100, loading all IPSEC SAs
- Sep 24 21:48:48 [IKEv1 DEBUG]Group = test, Username = karstens, IP = 192.168.2.100, Generating Quick Mode Key!
- Sep 24 21:48:48 [IKEv1 DEBUG]Group = test, Username = karstens, IP = 192.168.2.100, NP encrypt rule look up for crypto map SYSTEM_DEFAULT_CRYPTO_MAP 65535 matching ACL Unknown: returned cs_id=ccd2a7c8; encrypt_rule=00000000; tunnelFlow_rule=00000000
- Sep 24 21:48:48 [IKEv1 DEBUG]Group = test, Username = karstens, IP = 192.168.2.100, Generating Quick Mode Key!
- IPSEC: Received a PFKey message from IKE
- IPSEC: Parsing PFKey ADD message
- IPSEC: Creating IPsec SA
- IPSEC: Adding the outbound SA, SPI: 0x01CCBD97
- IPSEC: New embryonic SA created @ 0xccee4d80,
- SCB: 0xCDDA8FC0,
- Direction: outbound
- SPI : 0x01CCBD97
- Session ID: 0x0007F000
- VPIF num : 0x00000003
- Tunnel type: ra
- Protocol : esp
- Lifetime : 240 seconds
- IPSEC: Completed host OBSA update, SPI 0x01CCBD97
- IPSEC: Creating outbound VPN context, SPI 0x01CCBD97
- Flags: 0x00000005
- SA : 0xccee4d80
- SPI : 0x01CCBD97
- MTU : 1500 bytes
- VCID : 0x00000000
- Peer : 0x00000000
- SCB : 0xBAF026E3
- Channel: 0xc8422d20
- IPSEC: Increment SA NP ref counter for outbound SPI 0x01CCBD97, old value: 0, new value: 1, (ctm_ipsec_create_vpn_context:7112)
- IPSEC: Completed outbound VPN context, SPI 0x01CCBD97
- VPN handle: 0x0019cb6c
- IPSEC: New outbound encrypt rule, SPI 0x01CCBD97
- Src addr: 0.0.0.0
- Src mask: 0.0.0.0
- Dst addr: 10.10.1.10
- Dst mask: 255.255.255.255
- Src ports
- Upper: 0
- Lower: 0
- Op : ignore
- Dst ports
- Upper: 0
- Lower: 0
- Op : ignore
- Protocol: 0
- Use protocol: false
- SPI: 0x00000000
- Use SPI: false
- IPSEC: Increment SA NP ref counter for outbound SPI 0x01CCBD97, old value: 1, new value: 2, (ctm_ipsec_create_acl_entry:6095)
- IPSEC: Completed outbound encrypt rule, SPI 0x01CCBD97
- Rule ID: 0xccd97368
- IPSEC: Decrement SA NP ref counter for outbound SPI 0x01CCBD97, old value: 2, new value: 1, (ctm_ipsec_create_acl_cb:5189)
- IPSEC: New outbound permit rule, SPI 0x01CCBD97
- Src addr: 192.168.2.120
- Src mask: 255.255.255.255
- Dst addr: 192.168.2.100
- Dst mask: 255.255.255.255
- Src ports
- Upper: 0
- Lower: 0
- Op : ignore
- Dst ports
- Upper: 0
- Lower: 0
- Op : ignore
- Protocol: 50
- Use protocol: true
- SPI: 0x01CCBD97
- Use SPI: true
- IPSEC: Increment SA NP ref counter for outbound SPI 0x01CCBD97, old value: 1, new value: 2, (ctm_ipsec_create_acl_entry:6237)
- IPSEC: Completed outbound permit rule, SPI 0x01CCBD97
- Rule ID: 0xcbf2d440
- IPSEC: Decrement SA NP ref counter for outbound SPI 0x01CCBD97, old value: 2, new value: 1, (ctm_ipsec_create_acl_cb:5189)
- IPSEC: Decrement SA NP ref counter for outbound SPI 0x01CCBD97, old value: 1, new value: 0, (ctm_np_vpn_context_cb:10892)
- IPSEC: Increment SA HW ref counter for outbound SPI 0x01CCBD97, old value: 0, new value: 1, (ctm_nlite_ipsec_create_hw_obsa:1174)
- Sep 24 21:48:48 [IKEv1 DEBUG]Group = test, Username = karstens, IP = 192.168.2.100, NP encrypt rule look up for crypto map SYSTEM_DEFAULT_CRYPTO_MAP 65535 matching ACL Unknown: returned cs_id=ccd2a7c8; encrypt_rule=00000000; tunnelFlow_rule=00000000
- Sep 24 21:48:48 [IKEv1]Group = test, Username = karstens, IP = 192.168.2.100, Security negotiation complete for User (karstens) Responder, Inbound SPI = 0x7a59c06e, Outbound SPI = 0x01ccbd97
- IPSEC: Decrement SA HW ref counter for outbound SPI 0x01CCBD97, old value: 1, new value: 0, (ctm_nlite_outbound_callback:4175)
- Sep 24 21:48:48 [IKEv1 DEBUG]Group = test, Username = karstens, IP = 192.168.2.100, IKE got a KEY_ADD msg for SA: SPI = 0x01ccbd97
- IPSEC: Received a PFKey message from IKE
- IPSEC: Parsing PFKey UPDATE message
- IPSEC: Creating IPsec SA
- IPSEC: Updating the inbound SA, SPI: 0x7A59C06E
- IPSEC: New embryonic SA created @ 0xccf245e8,
- SCB: 0xCDDA8E80,
- Direction: inbound
- SPI : 0x7A59C06E
- Session ID: 0x0007F000
- VPIF num : 0x00000003
- Tunnel type: ra
- Protocol : esp
- Lifetime : 240 seconds
- IPSEC: Completed host IBSA update, SPI 0x7A59C06E
- IPSEC: Creating inbound VPN context, SPI 0x7A59C06E
- Flags: 0x00000006
- SA : 0xccf245e8
- SPI : 0x7A59C06E
- MTU : 0 bytes
- VCID : 0x00000000
- Peer : 0x0019CB6C
- SCB : 0xBAEEEF55
- Channel: 0xc8422d20
- IPSEC: Increment SA NP ref counter for inbound SPI 0x7A59C06E, old value: 0, new value: 1, (ctm_ipsec_create_vpn_context:7026)
- IPSEC: Completed inbound VPN context, SPI 0x7A59C06E
- VPN handle: 0x001a0c2c
- IPSEC: Updating outbound VPN context 0x0019CB6C, SPI 0x01CCBD97
- Flags: 0x00000005
- SA : 0xccee4d80
- SPI : 0x01CCBD97
- MTU : 1500 bytes
- VCID : 0x00000000
- Peer : 0x001A0C2C
- SCB : 0xBAF026E3
- Channel: 0xc8422d20
- IPSEC: Increment SA NP ref counter for outbound SPI 0x01CCBD97, old value: 0, new value: 1, (ctm_ipsec_create_vpn_context:7099)
- IPSEC: Completed outbound VPN context, SPI 0x01CCBD97
- VPN handle: 0x0019cb6c
- IPSEC: Completed outbound inner rule, SPI 0x01CCBD97
- Rule ID: 0xccd97368
- IPSEC: Completed outbound outer SPD rule, SPI 0x01CCBD97
- Rule ID: 0xcbf2d440
- IPSEC: Decrement SA NP ref counter for outbound SPI 0x01CCBD97, old value: 1, new value: 0, (ctm_np_vpn_context_cb:10892)
- IPSEC: New inbound tunnel flow rule, SPI 0x7A59C06E
- Src addr: 10.10.1.10
- Src mask: 255.255.255.255
- Dst addr: 0.0.0.0
- Dst mask: 0.0.0.0
- Src ports
- Upper: 0
- Lower: 0
- Op : ignore
- Dst ports
- Upper: 0
- Lower: 0
- Op : ignore
- Protocol: 0
- Use protocol: false
- SPI: 0x00000000
- Use SPI: false
- IPSEC: Increment SA NP ref counter for inbound SPI 0x7A59C06E, old value: 1, new value: 2, (ctm_ipsec_create_acl_entry:5773)
- IPSEC: Completed inbound tunnel flow rule, SPI 0x7A59C06E
- Rule ID: 0xcdda9e10
- IPSEC: Decrement SA NP ref counter for inbound SPI 0x7A59C06E, old value: 2, new value: 1, (ctm_ipsec_create_acl_cb:5189)
- IPSEC: New inbound decrypt rule, SPI 0x7A59C06E
- Src addr: 192.168.2.100
- Src mask: 255.255.255.255
- Dst addr: 192.168.2.120
- Dst mask: 255.255.255.255
- Src ports
- Upper: 0
- Lower: 0
- Op : ignore
- Dst ports
- Upper: 0
- Lower: 0
- Op : ignore
- Protocol: 50
- Use protocol: true
- SPI: 0x7A59C06E
- Use SPI: true
- IPSEC: Increment SA NP ref counter for inbound SPI 0x7A59C06E, old value: 1, new value: 2, (ctm_ipsec_create_acl_entry:5896)
- IPSEC: Completed inbound decrypt rule, SPI 0x7A59C06E
- Rule ID: 0xcdda9eb8
- IPSEC: Decrement SA NP ref counter for inbound SPI 0x7A59C06E, old value: 2, new value: 1, (ctm_ipsec_create_acl_cb:5189)
- IPSEC: New inbound permit rule, SPI 0x7A59C06E
- Src addr: 192.168.2.100
- Src mask: 255.255.255.255
- Dst addr: 192.168.2.120
- Dst mask: 255.255.255.255
- Src ports
- Upper: 0
- Lower: 0
- Op : ignore
- Dst ports
- Upper: 0
- Lower: 0
- Op : ignore
- Protocol: 50
- Use protocol: true
- SPI: 0x7A59C06E
- Use SPI: true
- IPSEC: Increment SA NP ref counter for inbound SPI 0x7A59C06E, old value: 1, new value: 2, (ctm_ipsec_create_acl_entry:5896)
- IPSEC: Completed inbound permit rule, SPI 0x7A59C06E
- Rule ID: 0xcdda9f60
- IPSEC: Decrement SA NP ref counter for inbound SPI 0x7A59C06E, old value: 2, new value: 1, (ctm_ipsec_create_acl_cb:5189)
- IPSEC: Decrement SA NP ref counter for inbound SPI 0x7A59C06E, old value: 1, new value: 0, (ctm_np_vpn_context_cb:10892)
- IPSEC: Increment SA HW ref counter for inbound SPI 0x7A59C06E, old value: 0, new value: 1, (ctm_nlite_ipsec_create_hw_ibsa:747)
- IPSEC: Decrement SA HW ref counter for inbound SPI 0x7A59C06E, old value: 1, new value: 0, (ctm_nlite_inbound_callback:3022)
- IPSEC: Added SA to last received DB, SPI: 0x7A59C06E, user: karstens, peer: 192.168.2.100, SessionID: 0x0007F000
- Sep 24 21:48:48 [IKEv1 DEBUG]Group = test, Username = karstens, IP = 192.168.2.100, Pitcher: received KEY_UPDATE, spi 0x7a59c06e
- Sep 24 21:48:48 [IKEv1 DEBUG]Group = test, Username = karstens, IP = 192.168.2.100, Starting P2 rekey timer: 3420 seconds.
- Sep 24 21:48:48 [IKEv1]Group = test, Username = karstens, IP = 192.168.2.100, Adding static route for client address: 10.10.1.10
- Sep 24 21:48:48 [IKEv1]Group = test, Username = karstens, IP = 192.168.2.100, PHASE 2 COMPLETED (msgid=c5cb0b9a)
- Sep 24 21:48:50 [IKEv1]IKE Receiver: Packet received on 192.168.2.120:500 from 192.168.2.100:500
- IKEv1 Recv RAW packet dump
- c1 99 fe 96 b6 55 28 24 d7 d3 d2 14 e1 39 33 5a | .....U($.....93Z
- 08 10 05 01 ca 03 5f 6a 00 00 00 4c 86 e1 ce d3 | ......_j...L....
- 38 f4 81 c3 c3 3c a9 92 49 75 c2 09 1b 1b a1 98 | 8....<..Iu......
- 68 37 8d 5e cd 2b 3f e3 9f 8d c1 7a a6 bc b3 c3 | h7.^.+?....z....
- 40 79 09 91 7d d3 f7 1f 5e 4c ad 9c | @y..}...^L..
- RECV PACKET from 192.168.2.100
- ISAKMP Header
- Initiator COOKIE: c1 99 fe 96 b6 55 28 24
- Responder COOKIE: d7 d3 d2 14 e1 39 33 5a
- Next Payload: Hash
- Version: 1.0
- Exchange Type: Informational
- Flags: (Encryption)
- MessageID: CA035F6A
- Length: 76
- AFTER DECRYPTION
- ISAKMP Header
- Initiator COOKIE: c1 99 fe 96 b6 55 28 24
- Responder COOKIE: d7 d3 d2 14 e1 39 33 5a
- Next Payload: Hash
- Version: 1.0
- Exchange Type: Informational
- Flags: (Encryption)
- MessageID: CA035F6A
- Length: 76
- Payload Hash
- Next Payload: Delete
- Reserved: 00
- Payload Length: 24
- Data:
- 1d 51 3b f8 81 b1 d2 7d f6 56 3d b4 75 87 49 f0
- d3 6d ed 86
- Payload Delete
- Next Payload: None
- Reserved: 00
- Payload Length: 16
- DOI: IPsec
- Protocol-ID: PROTO_IPSEC_ESP
- Spi Size: 4
- # of SPIs: 1
- SPI (Hex dump): 01 cc bd 97
- Sep 24 21:48:50 [IKEv1]IP = 192.168.2.100, IKE_DECODE RECEIVED Message (msgid=ca035f6a) with payloads : HDR + HASH (8) + DELETE (12) + NONE (0) total length : 68
- Sep 24 21:48:50 [IKEv1 DEBUG]Group = test, Username = karstens, IP = 192.168.2.100, processing hash payload
- Sep 24 21:48:50 [IKEv1 DEBUG]Group = test, Username = karstens, IP = 192.168.2.100, processing delete
- Sep 24 21:48:50 [IKEv1]Group = test, Username = karstens, IP = 192.168.2.100, Connection terminated for peer karstens. Reason: Peer Terminate Remote Proxy 10.10.1.10, Local Proxy 0.0.0.0
- Sep 24 21:48:50 [IKEv1 DEBUG]Group = test, Username = karstens, IP = 192.168.2.100, Active unit receives a delete event for remote peer 192.168.2.100.
- Sep 24 21:48:50 [IKEv1 DEBUG]Group = test, Username = karstens, IP = 192.168.2.100, IKE Deleting SA: Remote Proxy 10.10.1.10, Local Proxy 0.0.0.0
- Sep 24 21:48:50 [IKEv1 DEBUG]Group = test, Username = karstens, IP = 192.168.2.100, IKE SA AM:14d2d3d7 rcv'd Terminate: state AM_ACTIVE flags 0x0861d041, refcnt 1, tuncnt 0
- Sep 24 21:48:50 [IKEv1 DEBUG]Group = test, Username = karstens, IP = 192.168.2.100, IKE SA AM:14d2d3d7 terminating: flags 0x0961d001, refcnt 0, tuncnt 0
- Sep 24 21:48:50 [IKEv1 DEBUG]Group = test, Username = karstens, IP = 192.168.2.100, sending delete/delete with reason message
- IPSEC: Received a PFKey message from IKE
- IPSEC: Destroy current outbound SPI: 0x01CCBD97
- IPSEC: Increment SA NP ref counter for outbound SPI 0x01CCBD97, old value: 0, new value: 1, (ctm_ipsec_delete_acl_entry:6666)
- IPSEC: Deleted outbound encrypt rule, SPI 0x01CCBD97
- Rule ID: 0xccd97368
- IPSEC: Decrement SA NP ref counter for outbound SPI 0x01CCBD97, old value: 1, new value: 0, (ctm_ipsec_delete_acl_cb:5293)
- IPSEC: Increment SA NP ref counter for outbound SPI 0x01CCBD97, old value: 0, new value: 1, (ctm_ipsec_delete_acl_entry:6666)
- IPSEC: Deleted outbound permit rule, SPI 0x01CCBD97
- Rule ID: 0xcbf2d440
- IPSEC: Decrement SA NP ref counter for outbound SPI 0x01CCBD97, old value: 1, new value: 0, (ctm_ipsec_delete_acl_cb:5293)
- IPSEC: Increment SA NP ref counter for outbound SPI 0x01CCBD97, old value: 0, new value: 1, (ctm_ipsec_free_sa:8461)
- IPSEC: Deleted outbound VPN context, SPI 0x01CCBD97
- VPN handle: 0x0019cb6c
- IPSEC: Decrement SA NP ref counter for outbound SPI 0x01CCBD97, old value: 1, new value: 0, (ctm_np_vpn_delete_cb:10952)
- IPSEC: Destroy current inbound SPI: 0x7A59C06E
- IPSEC: Increment SA NP ref counter for inbound SPI 0x7A59C06E, old value: 0, new value: 1, (ctm_ipsec_delete_acl_entry:6666)
- IPSEC: Deleted inbound decrypt rule, SPI 0x7A59C06E
- Rule ID: 0xcdda9eb8
- IPSEC: Decrement SA NP ref counter for inbound SPI 0x7A59C06E, old value: 1, new value: 0, (ctm_ipsec_delete_acl_cb:5293)
- IPSEC: Increment SA NP ref counter for inbound SPI 0x7A59C06E, old value: 0, new value: 1, (ctm_ipsec_delete_acl_entry:6666)
- IPSEC: Deleted inbound permit rule, SPI 0x7A59C06E
- Rule ID: 0xcdda9f60
- IPSEC: Decrement SA NP ref counter for inbound SPI 0x7A59C06E, old value: 1, new value: 0, (ctm_ipsec_delete_acl_cb:5293)
- IPSEC: Increment SA NP ref counter for inbound SPI 0x7A59C06E, old value: 0, new value: 1, (ctm_ipsec_delete_acl_entry:6666)
- IPSEC: Deleted inbound tunnel flow rule, SPI 0x7A59C06E
- Rule ID: 0xcdda9e10
- IPSEC: Decrement SA NP ref counter for inbound SPI 0x7A59C06E, old value: 1, new value: 0, (ctm_ipsec_delete_acl_cb:5293)
- IPSEC: Increment SA NP ref counter for inbound SPI 0x7A59C06E, old value: 0, new value: 1, (ctm_ipsec_free_sa:8461)
- IPSEC: Deleted inbound VPN context, SPI 0x7A59C06E
- VPN handle: 0x001a0c2c
- IPSEC: Decrement SA NP ref counter for inbound SPI 0x7A59C06E, old value: 1, new value: 0, (ctm_np_vpn_delete_cb:10952)
- IPSEC: Removed SA from last received DB, SPI: 0x7A59C06E, user: karstens, peer: 192.168.2.100, SessionID: 0x0007F000
- Sep 24 21:48:50 [IKEv1 DEBUG]Group = test, Username = karstens, IP = 192.168.2.100, constructing blank hash payload
- Sep 24 21:48:50 [IKEv1 DEBUG]Group = test, Username = karstens, IP = 192.168.2.100, constructing IKE delete payload
- Sep 24 21:48:50 [IKEv1 DEBUG]Group = test, Username = karstens, IP = 192.168.2.100, constructing qm hash payload
- Sep 24 21:48:50 [IKEv1]IP = 192.168.2.100, IKE_DECODE SENDING Message (msgid=4e0490ff) with payloads : HDR + HASH (8) + DELETE (12) + NONE (0) total length : 80
- BEFORE ENCRYPTION
- RAW PACKET DUMP on SEND
- c1 99 fe 96 b6 55 28 24 d7 d3 d2 14 e1 39 33 5a | .....U($.....93Z
- 08 10 05 00 ff 90 04 4e 1c 00 00 00 0c 00 00 18 | .......N........
- 93 d7 66 18 9c bf b8 b3 ce 13 18 ee 9a b7 93 9a | ..f.............
- 13 6f 74 c8 00 00 00 1c 00 00 00 01 01 10 00 01 | .ot.............
- c1 99 fe 96 b6 55 28 24 d7 d3 d2 14 e1 39 33 5a | .....U($.....93Z
- ISAKMP Header
- Initiator COOKIE: c1 99 fe 96 b6 55 28 24
- Responder COOKIE: d7 d3 d2 14 e1 39 33 5a
- Next Payload: Hash
- Version: 1.0
- Exchange Type: Informational
- Flags: (none)
- MessageID: 4E0490FF
- Length: 28
- Payload Hash
- Next Payload: Delete
- Reserved: 00
- Payload Length: 24
- Data:
- 93 d7 66 18 9c bf b8 b3 ce 13 18 ee 9a b7 93 9a
- 13 6f 74 c8
- Payload Delete
- Next Payload: None
- Reserved: 00
- Payload Length: 28
- DOI: IPsec
- Protocol-ID: PROTO_ISAKMP
- Spi Size: 16
- # of SPIs: 1
- SPI (Hex dump):
- c1 99 fe 96 b6 55 28 24 d7 d3 d2 14 e1 39 33 5a
- ISAKMP Header
- Initiator COOKIE: c1 99 fe 96 b6 55 28 24
- Responder COOKIE: d7 d3 d2 14 e1 39 33 5a
- Next Payload: Hash
- Version: 1.0
- Exchange Type: Informational
- Flags: (Encryption)
- MessageID: 4E0490FF
- Length: 92
- Sep 24 21:48:50 [IKEv1 DEBUG]Pitcher: received key delete msg, spi 0x7a59c06e
- Sep 24 21:48:50 [IKEv1 DEBUG]Pitcher: received key delete msg, spi 0x7a59c06e
- Sep 24 21:48:50 [IKEv1]Group = test, Username = karstens, IP = 192.168.2.100, Session is being torn down. Reason: User Requested
- Sep 24 21:48:50 [IKEv1]Group = test, Username = karstens, IP = 192.168.2.100, Deleting static route for client address: 10.10.1.10
- Sep 24 21:48:50 [IKEv1]Ignoring msg to mark SA with dsID 520192 dead because SA deleted
- Sep 24 21:48:50 [IKEv1]IKE Receiver: Packet received on 192.168.2.120:500 from 192.168.2.100:500
- IKEv1 Recv RAW packet dump
- c1 99 fe 96 b6 55 28 24 d7 d3 d2 14 e1 39 33 5a | .....U($.....93Z
- 08 10 05 01 c5 87 ef 90 00 00 00 5c fd d1 dd 17 | ...........\....
- 60 18 d6 29 d2 36 de 56 c3 83 16 53 31 39 b6 80 | `..).6.V...S19..
- 44 b1 bb fe 34 10 8f 22 ac 01 cb 3b 4b 47 73 7c | D...4.."...;KGs|
- 33 a0 15 51 29 ee 7f 6e 92 8e d5 92 34 54 46 43 | 3..Q).n....4TFC
- 6b 9f 4c f1 76 9e 27 46 18 fa bd a0 | k.L.v.'F....
- RECV PACKET from 192.168.2.100
- ISAKMP Header
- Initiator COOKIE: c1 99 fe 96 b6 55 28 24
- Responder COOKIE: d7 d3 d2 14 e1 39 33 5a
- Next Payload: Hash
- Version: 1.0
- Exchange Type: Informational
- Flags: (Encryption)
- MessageID: C587EF90
- Length: 92
- Sep 24 21:48:50 [IKEv1]IP = 192.168.2.100, Received encrypted packet with no matching SA, dropping
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement