Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- *Dec 6 15:37:20.571: ISAKMP:(1003):atts are acceptable.
- *Dec 6 15:37:20.571: IPSEC(validate_proposal_request): proposal part #1
- *Dec 6 15:37:20.571: IPSEC(validate_proposal_request): proposal part #1,
- (key eng. msg.) INBOUND local= 192.168.1.130:0, remote= 212.39.64.67:0,
- local_proxy= 0.0.0.0/0.0.0.0/0/0 (type=4),
- remote_proxy= 10.10.10.6/255.255.255.255/0/0 (type=1),
- protocol= ESP, transform= NONE (Tunnel),
- lifedur= 0s and 0kb,
- spi= 0x0(0), conn_id= 0, keysize= 128, flags= 0x0
- *Dec 6 15:37:20.571: IPSEC(ipsec_process_proposal): transform proposal not supported for identity:
- {esp-aes esp-md5-hmac }
- *Dec 6 15:37:20.571: ISAKMP:(1003): IPSec policy invalidated proposal with error 256
- *Dec 6 15:37:20.571: ISAKMP:(1003):Checking IPSec proposal 8
- *Dec 6 15:37:20.571: ISAKMP: transform 1, ESP_AES
- *Dec 6 15:37:20.571: ISAKMP: attributes in transform:
- *Dec 6 15:37:20.571: ISAKMP: authenticator is HMAC-SHA
- *Dec 6 15:37:20.571: ISAKMP: key length is 128
- *Dec 6 15:37:20.571: ISAKMP: encaps is 1 (Tunnel)
- *Dec 6 15:37:20.571: ISAKMP: SA life type in seconds
- *Dec 6 15:37:20.571: ISAKMP: SA life duration (VPI) of 0x0 0x20 0xC4 0x9B
- *Dec 6 15:37:20.575: ISAKMP:(1003):atts are acceptable.
- *Dec 6 15:37:20.575: IPSEC(validate_proposal_request): proposal part #1
- *Dec 6 15:37:20.575: IPSEC(validate_proposal_request): proposal part #1,
- (key eng. msg.) INBOUND local= 192.168.1.130:0, remote= 212.39.64.67:0,
- local_proxy= 0.0.0.0/0.0.0.0/0/0 (type=4),
- remote_proxy= 10.10.10.6/255.255.255.255/0/0 (type=1),
- protocol= ESP, transform= NONE (Tunnel),
- lifedur= 0s and 0kb,
- spi= 0x0(0), conn_id= 0, keysize= 128, flags= 0x0
- *Dec 6 15:37:20.575: IPSEC(ipsec_process_proposal): transform proposal not supported for identity:
- {esp-aes esp-sha-hmac }
- *Dec 6 15:37:20.575: ISAKMP:(1003): IPSec policy invalidated proposal with error 256
- *Dec 6 15:37:20.575: ISAKMP:(1003):Checking IPSec proposal 9
- *Dec 6 15:37:20.575: ISAKMP: transform 1, ESP_3DES
- *Dec 6 15:37:20.575: ISAKMP: attributes in transform:
- *Dec 6 15:37:20.575: ISAKMP: authenticator is HMAC-MD5
- *Dec 6 15:37:20.575: ISAKMP: encaps is 1 (Tunnel)
- *Dec 6 15:37:20.575: ISAKMP: SA life type in seconds
- *Dec 6 15:37:20.575: ISAKMP: SA life duration (VPI) of 0x0 0x20 0xC4 0x9B
- *Dec 6 15:37:20.575: ISAKMP:(1003):atts are acceptable.
- *Dec 6 15:37:20.575: ISAKMP:(1003):Checking IPSec proposal 9
- *Dec 6 15:37:20.575: ISAKMP:(1003):transform 1, IPPCP LZS
- *Dec 6 15:37:20.575: ISAKMP: attributes in transform:
- *Dec 6 15:37:20.575: ISAKMP: encaps is 1 (Tunnel)
- *Dec 6 15:37:20.575: ISAKMP: SA life type in seconds
- *Dec 6 15:37:20.575: ISAKMP: SA life duration (VPI) of 0x0 0x20 0xC4 0x9B
- *Dec 6 15:37:20.575: ISAKMP:(1003):atts are acceptable.
- *Dec 6 15:37:20.575: IPSEC(validate_proposal_request): proposal part #1
- *Dec 6 15:37:20.575: IPSEC(validate_proposal_request): proposal part #1,
- (key eng. msg.) INBOUND local= 192.168.1.130:0, remote= 212.39.64.67:0,
- local_proxy= 0.0.0.0/0.0.0.0/0/0 (type=4),
- remote_proxy= 10.10.10.6/255.255.255.255/0/0 (type=1),
- protocol= ESP, transform= NONE (Tunnel),
- lifedur= 0s and 0kb,
- spi= 0x0(0), conn_id= 0, keysize= 0, flags= 0x0
- *Dec 6 15:37:20.575: IPSEC(validate_proposal_request): proposal part #2
- *Dec 6 15:37:20.575: IPSEC(validate_proposal_request): proposal part #2,
- (key eng. msg.) INBOUND local= 192.168.1.130:0, remote= 212.39.64.67:0,
- local_proxy= 0.0.0.0/0.0.0.0/0/0 (type=4),
- remote_proxy= 10.10.10.6/255.255.255.255/0/0 (type=1),
- protocol= PCP, transform= NONE (Tunnel),
- lifedur= 0s and 0kb,
- spi= 0x0(0), conn_id= 0, keysize= 0, flags= 0x0
- *Dec 6 15:37:20.575: IPSEC(ipsec_process_proposal): transform proposal not supported for identity:
- {esp-3des esp-md5-hmac comp-lzs }
- *Dec 6 15:37:20.575: ISAKMP:(1003): IPSec policy invalidated proposal with error 256
- *Dec 6 15:37:20.579: ISAKMP:(1003):Checking IPSec proposal 10
- *Dec 6 15:37:20.579: ISAKMP: transform 1, ESP_3DES
- *Dec 6 15:37:20.579: ISAKMP: attributes in transform:
- *Dec 6 15:37:20.579: ISAKMP: authenticator is HMAC-SHA
- *Dec 6 15:37:20.579: ISAKMP: encaps is 1 (Tunnel)
- *Dec 6 15:37:20.579: ISAKMP: SA life type in seconds
- *Dec 6 15:37:20.579: ISAKMP: SA life duration (VPI) of 0x0 0x20 0xC4 0x9B
- *Dec 6 15:37:20.579: ISAKMP:(1003):atts are acceptable.
- *Dec 6 15:37:20.579: ISAKMP:(1003):Checking IPSec proposal 10
- *Dec 6 15:37:20.579: ISAKMP:(1003):transform 1, IPPCP LZS
- *Dec 6 15:37:20.579: ISAKMP: attributes in transform:
- *Dec 6 15:37:20.579: ISAKMP: encaps is 1 (Tunnel)
- *Dec 6 15:37:20.579: ISAKMP: SA life type in seconds
- *Dec 6 15:37:20.579: ISAKMP: SA life duration (VPI) of 0x0 0x20 0xC4 0x9B
- *Dec 6 15:37:20.579: ISAKMP:(1003):atts are acceptable.
- *Dec 6 15:37:20.579: IPSEC(validate_proposal_request): proposal part #1
- *Dec 6 15:37:20.579: IPSEC(validate_proposal_request): proposal part #1,
- (key eng. msg.) INBOUND local= 192.168.1.130:0, remote= 212.39.64.67:0,
- local_proxy= 0.0.0.0/0.0.0.0/0/0 (type=4),
- remote_proxy= 10.10.10.6/255.255.255.255/0/0 (type=1),
- protocol= ESP, transform= NONE (Tunnel),
- lifedur= 0s and 0kb,
- spi= 0x0(0), conn_id= 0, keysize= 0, flags= 0x0
- *Dec 6 15:37:20.579: IPSEC(validate_proposal_request): proposal part #2
- *Dec 6 15:37:20.579: IPSEC(validate_proposal_request): proposal part #2,
- (key eng. msg.) INBOUND local= 192.168.1.130:0, remote= 212.39.64.67:0,
- local_proxy= 0.0.0.0/0.0.0.0/0/0 (type=4),
- remote_proxy= 10.10.10.6/255.255.255.255/0/0 (type=1),
- protocol= PCP, transform= NONE (Tunnel),
- lifedur= 0s and 0kb,
- spi= 0x0(0), conn_id= 0, keysize= 0, flags= 0x0
- *Dec 6 15:37:20.579: IPSEC(ipsec_process_proposal): transform proposal not supported for identity:
- {esp-3des esp-sha-hmac comp-lzs }
- *Dec 6 15:37:20.579: ISAKMP:(1003): IPSec policy invalidated proposal with error 256
- *Dec 6 15:37:20.579: ISAKMP:(1003):Checking IPSec proposal 11
- *Dec 6 15:37:20.579: ISAKMP: transform 1, ESP_3DES
- *Dec 6 15:37:20.579: ISAKMP: attributes in transform:
- *Dec 6 15:37:20.579: ISAKMP: authenticator is HMAC-MD5
- *Dec 6 15:37:20.579: ISAKMP: encaps is 1 (Tunnel)
- *Dec 6 15:37:20.579: ISAKMP: SA life type in seconds
- *Dec 6 15:37:20.579: ISAKMP: SA life duration (VPI) of 0x0 0x20 0xC4 0x9B
- *Dec 6 15:37:20.583: ISAKMP:(1003):atts are acceptable.
- *Dec 6 15:37:20.583: IPSEC(validate_proposal_request): proposal part #1
- *Dec 6 15:37:20.583: IPSEC(validate_proposal_request): proposal part #1,
- (key eng. msg.) INBOUND local= 192.168.1.130:0, remote= 212.39.64.67:0,
- local_proxy= 0.0.0.0/0.0.0.0/0/0 (type=4),
- remote_proxy= 10.10.10.6/255.255.255.255/0/0 (type=1),
- protocol= ESP, transform= NONE (Tunnel),
- lifedur= 0s and 0kb,
- spi= 0x0(0), conn_id= 0, keysize= 0, flags= 0x0
- *Dec 6 15:37:20.583: IPSEC(ipsec_process_proposal): transform proposal not supported for identity:
- {esp-3des esp-md5-hmac }
- *Dec 6 15:37:20.583: ISAKMP:(1003): IPSec policy invalidated proposal with error 256
- *Dec 6 15:37:20.583: ISAKMP:(1003):Checking IPSec proposal 12
- *Dec 6 15:37:20.583: ISAKMP: transform 1, ESP_3DES
- *Dec 6 15:37:20.583: ISAKMP: attributes in transform:
- *Dec 6 15:37:20.583: ISAKMP: authenticator is HMAC-SHA
- *Dec 6 15:37:20.583: ISAKMP: encaps is 1 (Tunnel)
- *Dec 6 15:37:20.583: ISAKMP: SA life type in seconds
- *Dec 6 15:37:20.583: ISAKMP: SA life duration (VPI) of 0x0 0x20 0xC4 0x9B
- *Dec 6 15:37:20.583: ISAKMP:(1003):atts are acceptable.
- *Dec 6 15:37:20.583: IPSEC(validate_proposal_request): proposal part #1
- *Dec 6 15:37:20.583: IPSEC(validate_proposal_request): proposal part #1,
- (key eng. msg.) INBOUND local= 192.168.1.130:0, remote= 212.39.64.67:0,
- local_proxy= 0.0.0.0/0.0.0.0/0/0 (type=4),
- remote_proxy= 10.10.10.6/255.255.255.255/0/0 (type=1),
- protocol= ESP, transform= NONE (Tunnel),
- lifedur= 0s and 0kb,
- spi= 0x0(0), conn_id= 0, keysize= 0, flags= 0x0
- *Dec 6 15:37:20.583: ISAKMP:(1003): processing NONCE payload. message ID = 280064972
- *Dec 6 15:37:20.583: ISAKMP:(1003): processing ID payload. message ID = 280064972
- *Dec 6 15:37:20.583: ISAKMP:(1003): processing ID payload. message ID = 280064972
- *Dec 6 15:37:20.583: ISAKMP:(1003):QM Responder gets spi
- *Dec 6 15:37:20.583: ISAKMP:(1003):Node 280064972, Input = IKE_MESG_FROM_PEER, IKE_QM_EXCH
- *Dec 6 15:37:20.583: ISAKMP:(1003):Old State = IKE_QM_READY New State = IKE_QM_SPI_STARVE
- *Dec 6 15:37:20.587: ISAKMP:(1003):deleting node 1253630847 error FALSE reason "No Error"
- *Dec 6 15:37:20.587: ISAKMP:(1003): Creating IPSec SAs
- *Dec 6 15:37:20.587: inbound SA from 212.39.64.67 to 192.168.1.130 (f/i) 0/ 0
- (proxy 10.10.10.6 to 0.0.0.0)
- *Dec 6 15:37:20.587: has spi 0x6BA867B6 and conn_id 0
- *Dec 6 15:37:20.587: lifetime of 2147483 seconds
- *Dec 6 15:37:20.587: outbound SA from 192.168.1.130 to 212.39.64.67 (f/i) 0/0
- (proxy 0.0.0.0 to 10.10.10.6)
- *Dec 6 15:37:20.587: has spi 0x23C491EC and conn_id 0
- *Dec 6 15:37:20.587: lifetime of 2147483 seconds
- *Dec 6 15:37:20.587: ISAKMP:(1003): sending packet to 212.39.64.67 my_port 500 peer_port 27172 (R) QM_IDLE
- *Dec 6 15:37:20.591: ISAKMP:(1003):Sending an IKE IPv4 Packet.
- *Dec 6 15:37:20.591: cTCP: demangling outbound IKE packet: 192.168.1.130:500->500 212.39.64.67:27172->500
- *Dec 6 15:37:20.591: cTCP: encapsulating IKE packet
- *Dec 6 15:37:20.591: cTCP: updating LOCAL Seq number to 45BE84E6
- *Dec 6 15:37:20.591: ISAKMP:(1003):Node 280064972, Input = IKE_MESG_INTERNAL, IKE_GOT_SPI
- *Dec 6 15:37:20.591: ISAKMP:(1003):Old State = IKE_QM_SPI_STARVE New State = IKE_QM_R_QM2
- *Dec 6 15:37:20.591: IPSEC(key_engine): got a queue event with 1 KMI message(s)
- *Dec 6 15:37:20.591: IPSEC(rte_mgr): VPN Route Event static keyword or dynamic SA create for 212.39.64.67
- *Dec 6 15:37:20.591: IPSEC(rte_mgr): VPN Route Refcount 1 FastEthernet0/0
- *Dec 6 15:37:20.591: IPSEC(rte_mgr): VPN Route Added 10.10.10.6 255.255.255.255 via 212.39.64.67 in IP DEFAULT TABLE with tag 0 distance 1
- *Dec 6 15:37:20.595: IPSEC(policy_db_add_ident): src 0.0.0.0, dest 10.10.10.6, dest_port 0
- *Dec 6 15:37:20.595: IPSEC(create_sa): sa created,
- (sa) sa_dest= 192.168.1.130, sa_proto= 50,
- sa_spi= 0x6BA867B6(1806198710),
- sa_trans= esp-3des esp-sha-hmac , sa_conn_id= 2005
- sa_lifetime(k/sec)= (4395466/3600)
- *Dec 6 15:37:20.595: IPSEC(create_sa): sa created,
- (sa) sa_dest= 212.39.64.67, sa_proto= 50,
- sa_spi= 0x23C491EC(600084972),
- sa_trans= esp-3des esp-sha-hmac , sa_conn_id= 2006
- sa_lifetime(k/sec)= (4395466/3600)
- *Dec 6 15:37:21.539: cTCP: Connection[665F7F20] 212.39.64.67:27172 192.168.1.130:443: found
- *Dec 6 15:37:21.539: cTCP: updating PEER Seq number to 10041C3
- *Dec 6 15:37:21.539: cTCP: Pak with contiguous buffer
- *Dec 6 15:37:21.539: cTCP: mangling IKE packet from peer: 212.39.64.67:500->27172 192.168.1.130:500->500
- *Dec 6 15:37:21.567: ISAKMP (1003): received packet from 212.39.64.67 dport 500 sport 27172 Global (R) QM_IDLE
- *Dec 6 15:37:21.567: ISAKMP:(1003):deleting node 280064972 error FALSE reason "QM done (await)"
- *Dec 6 15:37:21.571: ISAKMP:(1003):Node 280064972, Input = IKE_MESG_FROM_PEER, IKE_QM_EXCH
- *Dec 6 15:37:21.571: ISAKMP:(1003):Old State = IKE_QM_R_QM2 New State = IKE_QM_PHASE2_COMPLETE
- *Dec 6 15:37:21.571: IPSEC(key_engine): got a queue event with 1 KMI message(s)
- *Dec 6 15:37:21.571: IPSEC(key_engine_enable_outbound): rec'd enable notify from ISAKMP
- *Dec 6 15:37:21.571: IPSEC(key_engine_enable_outbound): enable SA with spi 600084972/50
- *Dec 6 15:37:21.571: IPSEC(update_current_outbound_sa): get enable SA peer 212.39.64.67 current outbound sa to SPI 23C491EC
- *Dec 6 15:37:21.571: IPSEC(update_current_outbound_sa): updated peer 212.39.64.67 current outbound sa to SPI 23C491EC
- Cisco#
- *Dec 6 15:38:10.587: ISAKMP:(1003):purging node 1253630847
- *Dec 6 15:38:11.571: ISAKMP:(1003):purging node 280064972
- Cisco#
- Cisco#
- Cisco#
- *Dec 6 15:42:09.631: cTCP: Connection[665F7F20] 212.39.64.67:27172 192.168.1.130:443: found
- *Dec 6 15:42:09.631: cTCP: Handshake done with 212.39.64.67:27172, packet came thru!
- *Dec 6 15:42:09.631: cTCP: DATA from 212.39.64.67:27172
- *Dec 6 15:43:54.015: ISAKMP:(1003):purging node -269181371
- *Dec 6 15:43:54.031: ISAKMP:(1003):purging node -62146151
- *Dec 6 15:47:10.603: cTCP: Connection[665F7F20] 212.39.64.67:27172 192.168.1.130:443: found
- *Dec 6 15:47:10.603: cTCP: Handshake done with 212.39.64.67:27172, packet came thru!
- *Dec 6 15:51:19.123: cTCP: updating PEER Seq number to 1004237
- *Dec 6 15:51:19.123: cTCP: Pak with particles
- *Dec 6 15:51:19.155: cTCP: encapsulating pak
- *Dec 6 15:51:19.155: cTCP: datagramstart 0xEEA0CA58, network_start 0xEEA0CA58, size 136
- *Dec 6 15:51:19.155: cTCP: Pak with contiguous buffer
- *Dec 6 15:51:19.155: cTCP: allocated new buffer
- *Dec 6 15:51:19.155: cTCP: updating LOCAL Seq number to 45BE856A
- *Dec 6 15:51:19.155: IP: s=192.168.1.130 (FastEthernet0/0), d=212.39.64.67 (FastEthernet0/0), len 172, cTCP
- *Dec 6 15:51:19.167: cTCP: updating PEER Seq number to 10042A3
- *Dec 6 15:51:19.167: cTCP: Pak with particles
- *Dec 6 15:51:19.211: cTCP: encapsulating pak
- *Dec 6 15:51:19.211: cTCP: datagramstart 0xEEA0BD58, network_start 0xEEA0BD58, size 96
- *Dec 6 15:51:19.211: cTCP: Pak with contiguous buffer
- *Dec 6 15:51:19.211: cTCP: allocated new buffer
- *Dec 6 15:51:19.211: cTCP: updating LOCAL Seq number to 45BE85C6
- *Dec 6 15:51:19.211: IP: s=192.168.1.130 (FastEthernet0/0), d=212.39.64.67 (FastEthernet0/0), len 132, cTCP
- *Dec 6 15:51:19.239: cTCP: updating PEER Seq number to 1004317
- *Dec 6 15:51:19.239: cTCP: Pak with particles
- *Dec 6 15:51:19.239: cTCP: sending gratuitous ack
- *Dec 6 15:51:19.239: cTCP: Sending (45BE85C6)ACK(1004318) to 212.39.64.67:27172
- *Dec 6 15:51:19.275: cTCP: encapsulating pak
- *Dec 6 15:51:19.275: cTCP: datagramstart 0xEEA0CA58, network_start 0xEEA0CA58, size 160
- *Dec 6 15:51:19.275: cTCP: Pak with contiguous buffer
- *Dec 6 15:51:19.275: cTCP: allocated new buffer
- *Dec 6 15:51:19.275: cTCP: updating LOCAL Seq number to 45BE8662
- *Dec 6 15:51:19.275: IP: s=192.168.1.130 (FastEthernet0/0), d=212.39.64.67 (FastEthernet0/0), len 196, cTCP
- *Dec 6 15:51:19.287: cTCP: updating PEER Seq number to 1004393
- *Dec 6 15:51:19.287: cTCP: Pak with particles
- *Dec 6 15:51:19.431: cTCP: encapsulating pak
- *Dec 6 15:51:19.431: cTCP: datagramstart 0xEEA0A698, network_start 0xEEA0A698, size 184
- *Dec 6 15:51:19.431: cTCP: Pak with contiguous buffer
- *Dec 6 15:51:19.431: cTCP: allocated new buffer
- *Dec 6 15:51:19.431: cTCP: updating LOCAL Seq number to 45BE8716
- *Dec 6 15:51:19.431: IP: s=192.168.1.130 (FastEthernet0/0), d=212.39.64.67 (FastEthernet0/0), len 220, cTCP
- *Dec 6 15:51:19.443: cTCP: updating PEER Seq number to 1004407
- *Dec 6 15:51:19.443: cTCP: Pak with particles
- *Dec 6 15:51:19.479: cTCP: encapsulating pak
- *Dec 6 15:51:19.479: cTCP: datagramstart 0xEEA0CA58, network_start 0xEEA0CA58, size 136
- *Dec 6 15:51:19.479: cTCP: Pak with contiguous buffer
- *Dec 6 15:51:19.479: cTCP: allocated new buffer
- *Dec 6 15:51:19.479: cTCP: updating LOCAL Seq number to 45BE879A
- *Dec 6 15:51:19.479: IP: s=192.168.1.130 (FastEthernet0/0), d=212.39.64.67 (FastEthernet0/0), len 172, cTCP
- *Dec 6 15:51:19.487: cTCP: updating PEER Seq number to 1004473
- *Dec 6 15:51:19.487: cTCP: Pak with particles
- *Dec 6 15:51:19.495: cTCP: encapsulating pak
- *Dec 6 15:51:19.495: cTCP: datagramstart 0xEEDDD618, network_start 0xEEDDD618, size 112
- *Dec 6 15:51:19.495: cTCP: Pak with contiguous buffer
- *Dec 6 15:51:19.495: cTCP: allocated new buffer
- *Dec 6 15:51:19.495: cTCP: updating LOCAL Seq number to 45BE8806
- *Dec 6 15:51:19.495: IP: s=192.168.1.130 (FastEthernet0/0), d=212.39.64.67 (FastEthernet0/0), len 148, cTCP
- *Dec 6 15:51:19.503: cTCP: updating PEER Seq number to 10044D7
- *Dec 6 15:51:19.503: cTCP: Pak with particles
- *Dec 6 15:51:19.503: cTCP: updating PEER Seq number to 10045CB
- *Dec 6 15:51:19.503: cTCP: Pak with particles
- *Dec 6 15:51:19.511: cTCP: encapsulating pak
- *Dec 6 15:51:19.511: cTCP: datagramstart 0xEEA0C3D8, network_start 0xEEA0C3D8, size 104
- *Dec 6 15:51:19.511: cTCP: Pak with contiguous buffer
- *Dec 6 15:51:19.511: cTCP: allocated new buffer
- *Dec 6 15:51:19.511: cTCP: updating LOCAL Seq number to 45BE886A
- *Dec 6 15:51:19.511: IP: s=192.168.1.130 (FastEthernet0/0), d=212.39.64.67 (FastEthernet0/0), len 140, cTCP
- *Dec 6 15:51:19.511: cTCP: encapsulating pak
- *Dec 6 15:51:19.511: cTCP: datagramstart 0xEEDDC298, network_start 0xEEDDC298, size 320
- *Dec 6 15:51:19.511: cTCP: Pak with contiguous buffer
- *Dec 6 15:51:19.511: cTCP: allocated new buffer
- *Dec 6 15:51:19.511: cTCP: updating LOCAL Seq number to 45BE89A6
- *Dec 6 15:51:19.511: IP: s=192.168.1.130 (FastEthernet0/0), d=212.39.64.67 (FastEthernet0/0), len 356, cTCP
- *Dec 6 15:51:19.511: cTCP: encapsulating pak
- *Dec 6 15:51:19.511: cTCP: datagramstart 0xEEDE8F58, network_start 0xEEDE8F58, size 1248
- *Dec 6 15:51:19.511: cTCP: Pak with contiguous buffer
- *Dec 6 15:51:19.515: cTCP: allocated new buffer
- *Dec 6 15:51:19.515: cTCP: updating LOCAL Seq number to 45BE8E82
- *Dec 6 15:51:19.515: IP: s=192.168.1.130 (FastEthernet0/0), d=212.39.64.67 (FastEthernet0/0), len 1284, cTCP
- *Dec 6 15:51:19.523: cTCP: updating PEER Seq number to 100462F
- *Dec 6 15:51:19.523: cTCP: Pak with particles
- *Dec 6 15:51:19.527: cTCP: updating PEER Seq number to 1004693
- *Dec 6 15:51:19.527: cTCP: Pak with particles
- *Dec 6 15:51:19.563: cTCP: updating PEER Seq number to 100478F
- *Dec 6 15:51:19.563: cTCP: Pak with particles
- *Dec 6 15:51:19.567: cTCP: encapsulating pak
- *Dec 6 15:51:19.567: cTCP: datagramstart 0xEEA0CD98, network_start 0xEEA0CD98, size 320
- *Dec 6 15:51:19.567: cTCP: Pak with contiguous buffer
- *Dec 6 15:51:19.567: cTCP: allocated new buffer
- *Dec 6 15:51:19.567: cTCP: updating LOCAL Seq number to 45BE8FBE
- *Dec 6 15:51:19.567: IP: s=192.168.1.130 (FastEthernet0/0), d=212.39.64.67 (FastEthernet0/0), len 356, cTCP
- *Dec 6 15:51:19.571: cTCP: encapsulating pak
- *Dec 6 15:51:19.571: cTCP: datagramstart 0xEEDE9D18, network_start 0xEEDE9D18, size 1408
- *Dec 6 15:51:19.571: cTCP: Pak with contiguous buffer
- *Dec 6 15:51:19.571: cTCP: allocated new buffer
- *Dec 6 15:51:19.571: cTCP: updating LOCAL Seq number to 45BE953A
- *Dec 6 15:51:19.571: IP: s=192.168.1.130 (FastEthernet0/0), d=212.39.64.67 (FastEthernet0/0), len 1444, cTCP
- *Dec 6 15:51:19.571: cTCP: encapsulating pak
- *Dec 6 15:51:19.571: cTCP: datagramstart 0xEEDEA3F8, network_start 0xEEDEA3F8, size 944
- *Dec 6 15:51:19.571: cTCP: Pak with contiguous buffer
- *Dec 6 15:51:19.571: cTCP: allocated new buffer
- *Dec 6 15:51:19.571: cTCP: updating LOCAL Seq number to 45BE98E6
- *Dec 6 15:51:19.571: IP: s=192.168.1.130 (FastEthernet0/0), d=212.39.64.67 (FastEthernet0/0), len 980, cTCP
- *Dec 6 15:51:19.583: cTCP: updating PEER Seq number to 10047F3
- *Dec 6 15:51:19.583: cTCP: Pak with particles
- *Dec 6 15:51:19.595: cTCP: updating PEER Seq number to 100486F
- *Dec 6 15:51:19.595: cTCP: Pak with particles
- *Dec 6 15:51:19.623: cTCP: updating PEER Seq number to 10048D3
- *Dec 6 15:51:19.623: cTCP: Pak with particles
- *Dec 6 15:51:19.627: cTCP: encapsulating pak
- *Dec 6 15:51:19.627: cTCP: datagramstart 0xEEDDCF98, network_start 0xEEDDCF98, size 208
- *Dec 6 15:51:19.627: cTCP: Pak with contiguous buffer
- *Dec 6 15:51:19.631: cTCP: allocated new buffer
- *Dec 6 15:51:19.631: cTCP: updating LOCAL Seq number to 45BE99B2
- *Dec 6 15:51:19.631: IP: s=192.168.1.130 (FastEthernet0/0), d=212.39.64.67 (FastEthernet0/0), len 244, cTCP
- *Dec 6 15:51:19.643: cTCP: updating PEER Seq number to 100494F
- *Dec 6 15:51:19.643: cTCP: Pak with particles
- *Dec 6 15:51:19.675: cTCP: encapsulating pak
- *Dec 6 15:51:19.675: cTCP: datagramstart 0xEEA0A9D8, network_start 0xEEA0A9D8, size 176
- *Dec 6 15:51:19.675: cTCP: Pak with contiguous buffer
- *Dec 6 15:51:19.675: cTCP: allocated new buffer
- *Dec 6 15:51:19.675: cTCP: updating LOCAL Seq number to 45BE9A5E
- *Dec 6 15:51:19.675: IP: s=192.168.1.130 (FastEthernet0/0), d=212.39.64.67 (FastEthernet0/0), len 212, cTCP
- *Dec 6 15:51:19.687: cTCP: updating PEER Seq number to 10049CB
- *Dec 6 15:51:19.687: cTCP: Pak with particles
- *Dec 6 15:51:19.723: cTCP: encapsulating pak
- *Dec 6 15:51:19.723: cTCP: datagramstart 0xEEA0A9D8, network_start 0xEEA0A9D8, size 176
- *Dec 6 15:51:19.723: cTCP: Pak with contiguous buffer
- *Dec 6 15:51:19.723: cTCP: allocated new buffer
- *Dec 6 15:51:19.723: cTCP: updating LOCAL Seq number to 45BE9B0A
- *Dec 6 15:51:19.723: IP: s=192.168.1.130 (FastEthernet0/0), d=212.39.64.67 (FastEthernet0/0), len 212, cTCP
- *Dec 6 15:51:19.735: cTCP: updating PEER Seq number to 1004A37
- *Dec 6 15:51:19.735: cTCP: Pak with particles
- *Dec 6 15:51:19.771: cTCP: encapsulating pak
- *Dec 6 15:51:19.771: cTCP: datagramstart 0xEEA0B6D8, network_start 0xEEA0B6D8, size 112
- *Dec 6 15:51:19.771: cTCP: Pak with contiguous buffer
- *Dec 6 15:51:19.771: cTCP: allocated new buffer
- *Dec 6 15:51:19.771: cTCP: updating LOCAL Seq number to 45BE9B76
- *Dec 6 15:51:19.771: IP: s=192.168.1.130 (FastEthernet0/0), d=212.39.64.67 (FastEthernet0/0), len 148, cTCP
- *Dec 6 15:51:19.787: cTCP: updating PEER Seq number to 1004A9B
- *Dec 6 15:51:19.787: cTCP: Pak with particles
- *Dec 6 15:51:19.787: cTCP: updating PEER Seq number to 1004BAF
- *Dec 6 15:51:19.787: cTCP: Pak with particles
- *Dec 6 15:51:19.823: cTCP: encapsulating pak
- *Dec 6 15:51:19.823: cTCP: datagramstart 0xEEDDBC18, network_start 0xEEDDBC18, size 104
- *Dec 6 15:51:19.823: cTCP: Pak with contiguous buffer
- *Dec 6 15:51:19.823: cTCP: allocated new buffer
- *Dec 6 15:51:19.823: cTCP: updating LOCAL Seq number to 45BE9BDA
- *Dec 6 15:51:19.827: IP: s=192.168.1.130 (FastEthernet0/0), d=212.39.64.67 (FastEthernet0/0), len 140, cTCP
- *Dec 6 15:51:19.827: cTCP: encapsulating pak
- *Dec 6 15:51:19.827: cTCP: datagramstart 0xEEDEB898, network_start 0xEEDEB898, size 1408
- *Dec 6 15:51:19.827: cTCP: Pak with contiguous buffer
- *Dec 6 15:51:19.827: cTCP: allocated new buffer
- *Dec 6 15:51:19.827: cTCP: updating LOCAL Seq number to 45BEA156
- *Dec 6 15:51:19.827: IP: s=192.168.1.130 (FastEthernet0/0), d=212.39.64.67 (FastEthernet0/0), len 1444, cTCP
- *Dec 6 15:51:19.827: cTCP: encapsulating pak
- *Dec 6 15:51:19.827: cTCP: datagramstart 0xEEA0BA18, network_start 0xEEA0BA18, size 208
- *Dec 6 15:51:19.827: cTCP: Pak with contiguous buffer
- *Dec 6 15:51:19.827: cTCP: allocated new buffer
- *Dec 6 15:51:19.827: cTCP: updating LOCAL Seq number to 45BEA222
- *Dec 6 15:51:19.827: IP: s=192.168.1.130 (FastEthernet0/0), d=212.39.64.67 (FastEthernet0/0), len 244, cTCP
- *Dec 6 15:51:19.839: cTCP: updating PEER Seq number to 1004C13
- *Dec 6 15:51:19.843: cTCP: Pak with particles
- *Dec 6 15:51:19.843: cTCP: updating PEER Seq number to 1004C77
- *Dec 6 15:51:19.843: cTCP: Pak with particles
- *Dec 6 15:51:19.883: cTCP: updating PEER Seq number to 1004D73
- *Dec 6 15:51:19.883: cTCP: Pak with particles
- *Dec 6 15:51:19.887: cTCP: encapsulating pak
- *Dec 6 15:51:19.887: cTCP: datagramstart 0xEEA0B058, network_start 0xEEA0B058, size 320
- *Dec 6 15:51:19.887: cTCP: Pak with contiguous buffer
- *Dec 6 15:51:19.887: cTCP: allocated new buffer
- *Dec 6 15:51:19.891: cTCP: updating LOCAL Seq number to 45BEA35E
- *Dec 6 15:51:19.891: IP: s=192.168.1.130 (FastEthernet0/0), d=212.39.64.67 (FastEthernet0/0), len 356, cTCP
- *Dec 6 15:51:19.891: cTCP: encapsulating pak
- *Dec 6 15:51:19.891: cTCP: datagramstart 0xEEDEC658, network_start 0xEEDEC658, size 1408
- *Dec 6 15:51:19.891: cTCP: Pak with contiguous buffer
- *Dec 6 15:51:19.891: cTCP: allocated new buffer
- *Dec 6 15:51:19.891: cTCP: updating LOCAL Seq number to 45BEA8DA
- *Dec 6 15:51:19.891: IP: s=192.168.1.130 (FastEthernet0/0), d=212.39.64.67 (FastEthernet0/0), len 1444, cTCP
- *Dec 6 15:51:19.891: cTCP: encapsulating pak
- *Dec 6 15:51:19.891: cTCP: datagramstart 0xEEDECD38, network_start 0xEEDECD38, size 752
- *Dec 6 15:51:19.891: cTCP: Pak with contiguous buffer
- *Dec 6 15:51:19.891: cTCP: allocated new buffer
- *Dec 6 15:51:19.891: cTCP: updating LOCAL Seq number to 45BEABC6
- *Dec 6 15:51:19.891: IP: s=192.168.1.130 (FastEthernet0/0), d=212.39.64.67 (FastEthernet0/0), len 788, cTCP
- *Dec 6 15:51:19.899: cTCP: updating PEER Seq number to 1004DD7
- *Dec 6 15:51:19.899: cTCP: Pak with particles
- *Dec 6 15:51:19.903: cTCP: updating PEER Seq number to 1004E3B
- *Dec 6 15:51:19.903: cTCP: Pak with particles
- *Dec 6 15:51:19.903: cTCP: updating PEER Seq number to 1004E9F
- *Dec 6 15:51:19.903: cTCP: Pak with particles
- *Dec 6 15:51:22.843: cTCP: updating PEER Seq number to 1004F03
- *Dec 6 15:51:22.843: cTCP: Pak with particles
- *Dec 6 15:51:22.843: cTCP: updating PEER Seq number to 1004F67
- *Dec 6 15:51:22.847: cTCP: Pak with particles
- *Dec 6 15:51:22.847: cTCP: sending gratuitous ack
- *Dec 6 15:51:22.847: cTCP: Sending (45BEABC6)ACK(1004F68) to 212.39.64.67:27172
- *Dec 6 15:51:22.851: cTCP: encapsulating pak
- *Dec 6 15:51:22.851: cTCP: datagramstart 0xEEDDD958, network_start 0xEEDDD958, size 104
- *Dec 6 15:51:22.851: cTCP: Pak with contiguous buffer
- *Dec 6 15:51:22.851: cTCP: allocated new buffer
- *Dec 6 15:51:22.851: cTCP: updating LOCAL Seq number to 45BEAC2A
- *Dec 6 15:51:22.851: IP: s=192.168.1.130 (FastEthernet0/0), d=212.39.64.67 (FastEthernet0/0), len 140, cTCP
- *Dec 6 15:51:22.863: cTCP: updating PEER Seq number to 1004FCB
- *Dec 6 15:51:22.863: cTCP: Pak with particles
- *Dec 6 15:51:22.883: cTCP: encapsulating pak
- *Dec 6 15:51:22.883: cTCP: datagramstart 0xEEDDBF58, network_start 0xEEDDBF58, size 104
- *Dec 6 15:51:22.883: cTCP: Pak with contiguous buffer
- *Dec 6 15:51:22.883: cTCP: allocated new buffer
- *Dec 6 15:51:22.883: cTCP: updating LOCAL Seq number to 45BEAC8E
- *Dec 6 15:51:22.883: IP: s=192.168.1.130 (FastEthernet0/0), d=212.39.64.67 (FastEthernet0/0), len 140, cTCP
- *Dec 6 15:51:22.895: cTCP: updating PEER Seq number to 100502F
- *Dec 6 15:51:22.895: cTCP: Pak with particles
- Cisco#
- *Dec 6 15:52:11.579: cTCP: Connection[665F7F20] 212.39.64.67:27172 192.168.1.130:443: found
- *Dec 6 15:52:11.579: cTCP: Handshake done with 212.39.64.67:27172, packet came thru!
- *Dec 6 15:52:11.579: cTCP: DATA from 212.39.64.67:27172
- *Dec 6 15:52:46.155: cTCP: Connection[665F7F20] 212.39.64.67:27172 192.168.1.130:443: found
- *Dec 6 15:52:46.155: cTCP: updating PEER Seq number to 1005093
- *Dec 6 15:52:46.155: cTCP: Pak with contiguous buffer
- *Dec 6 15:52:46.155: cTCP: mangling IKE packet from peer: 212.39.64.67:500->27172 192.168.1.130:500->500
- *Dec 6 15:52:46.155: cTCP: Connection[665F7F20] 212.39.64.67:27172 192.168.1.130:443: found
- *Dec 6 15:52:46.155: cTCP: updating PEER Seq number to 10050FF
- *Dec 6 15:52:46.155: cTCP: Pak with contiguous buffer
- *Dec 6 15:52:46.155: cTCP: mangling IKE packet from peer: 212.39.64.67:500->27172 192.168.1.130:500->500
- *Dec 6 15:52:46.155: ISAKMP (1003): received packet from 212.39.64.67 dport 500 sport 27172 Global (R) QM_IDLE
- *Dec 6 15:52:46.155: ISAKMP: set new node -418160671 to QM_IDLE
- *Dec 6 15:52:46.159: ISAKMP:(1003): processing HASH payload. message ID = 3876806625
- *Dec 6 15:52:46.159: ISAKMP:(1003): processing DELETE payload. message ID = 3876806625
- *Dec 6 15:52:46.159: ISAKMP:(1003):peer does not do paranoid keepalives.
- *Dec 6 15:52:46.159: ISAKMP:(1003):peer does not do paranoid keepalives.
- *Dec 6 15:52:46.159: ISAKMP:(1003):deleting node -418160671 error FALSE reason "Informational (in) state 1"
- *Dec 6 15:52:46.159: ISAKMP (1003): received packet from 212.39.64.67 dport 500 sport 27172 Global (R) QM_IDLE
- *Dec 6 15:52:46.159: ISAKMP: set new node 1909345573 to QM_IDLE
- *Dec 6 15:52:46.159: ISAKMP:(1003): processing HASH payload. message ID = 1909345573
- *Dec 6 15:52:46.159: ISAKMP:received payload type 18
- *Dec 6 15:52:46.159: ISAKMP:(1003):Processing delete with reason payload
- *Dec 6 15:52:46.159: ISAKMP:(1003):delete doi = 0
- *Dec 6 15:52:46.159: ISAKMP:(1003):delete protocol id = 1
- *Dec 6 15:52:46.159: ISAKMP:(1003):delete spi_size = 16
- *Dec 6 15:52:46.159: ISAKMP:(1003):delete num spis = 1
- *Dec 6 15:52:46.159: ISAKMP:(1003):delete_reason = 2
- *Dec 6 15:52:46.159: ISAKMP:(1003): processing DELETE_WITH_REASON payload, message ID = 1909345573, reason: DELETE_BY_USER_COMMAND
- *Dec 6 15:52:46.159: ISAKMP:(1003):peer does not do paranoid keepalives.
- *Dec 6 15:52:46.159: ISAKMP:(1003):peer does not do paranoid keepalives.
- *Dec 6 15:52:46.159: ISAKMP:(1003):deleting SA reason "BY user command" state (R) QM_IDLE (peer 212.39.64.67)
- *Dec 6 15:52:46.163: ISAKMP:(1003):deleting node 1909345573 error FALSE reason "Informational (in) state 1"
- *Dec 6 15:52:46.163: IPSEC(key_engine): got a queue event with 1 KMI message(s)
- *Dec 6 15:52:46.163: IPSEC(key_engine_delete_sas): rec'd delete notify from ISAKMP
- *Dec 6 15:52:46.163: IPSEC(key_engine_delete_sas): delete SA with spi 0x23C491EC proto 50 for 212.39.64.67
- *Dec 6 15:52:46.163: IPSEC(delete_sa): deleting SA,
- (sa) sa_dest= 192.168.1.130, sa_proto= 50,
- sa_spi= 0x6BA867B6(1806198710),
- sa_trans= esp-3des esp-sha-hmac , sa_conn_id= 2005
- sa_lifetime(k/sec)= (4395466/3600),
- (identity) local= 192.168.1.130:0, remote= 212.39.64.67:0,
- local_proxy= 0.0.0.0/0.0.0.0/0/0 (type=4),
- remote_proxy= 10.10.10.6/255.255.255.255/0/0 (type=1)
- *Dec 6 15:52:46.163: IPSEC(update_current_outbound_sa): updated peer 212.39.64.67 current outbound sa to SPI 0
- *Dec 6 15:52:46.163: IPSEC(delete_sa): deleting SA,
- (sa) sa_dest= 212.39.64.67, sa_proto= 50,
- sa_spi= 0x23C491EC(600084972),
- sa_trans= esp-3des esp-sha-hmac , sa_conn_id= 2006
- sa_lifetime(k/sec)= (4395466/3600),
- (identity) local= 192.168.1.130:0, remote= 212.39.64.67:0,
- local_proxy= 0.0.0.0/0.0.0.0/0/0 (type=4),
- remote_proxy= 10.10.10.6/255.255.255.255/0/0 (type=1)
- *Dec 6 15:52:46.163: IPSEC(rte_mgr): VPN Route Event Deleting dynamic maps for peer 212.39.64.67
- *Dec 6 15:52:46.163: IPSEC(rte_mgr): VPN Route Refcount 0 FastEthernet0/0
- *Dec 6 15:52:46.167: IPSEC(rte_mgr): VPN Route Removed 10.10.10.6 255.255.255.255 via 212.39.64.67 in IP DEFAULT TABLE FastEthernet0/0
- *Dec 6 15:52:46.167: IPSEC(key_engine): got a queue event with 1 KMI message(s)
- *Dec 6 15:52:46.167: IPSEC(key_engine_delete_sas): rec'd delete notify from ISAKMP
- *Dec 6 15:52:46.167: IPSEC(key_engine): got a queue event with 1 KMI message(s)
- *Dec 6 15:52:46.167: IPSEC(key_engine_delete_sas): rec'd delete notify from ISAKMP
- *Dec 6 15:52:46.167: IPSEC(key_engine_delete_sas): delete all SAs shared with peer 212.39.64.67
- *Dec 6 15:52:46.167: ISAKMP: set new node 441624097 to QM_IDLE
- *Dec 6 15:52:46.167: ISAKMP:(1003): sending packet to 212.39.64.67 my_port 500 peer_port 27172 (R) QM_IDLE
- *Dec 6 15:52:46.167: ISAKMP:(1003):Sending an IKE IPv4 Packet.
- *Dec 6 15:52:46.167: cTCP: demangling outbound IKE packet: 192.168.1.130:500->500 212.39.64.67:27172->500
- *Dec 6 15:52:46.167: cTCP: encapsulating IKE packet
- *Dec 6 15:52:46.167: cTCP: updating LOCAL Seq number to 45BEACFA
- *Dec 6 15:52:46.171: ISAKMP:(1003):purging node 441624097
- *Dec 6 15:52:46.171: ISAKMP:(1003):Input = IKE_MESG_INTERNAL, IKE_PHASE1_DEL
- *Dec 6 15:52:46.171: ISAKMP:(1003):Old State = IKE_P1_COMPLETE New State = IKE_DEST_SA
- *Dec 6 15:52:46.171: cTCP: Connection[665F7F20] 212.39.64.67:27172 192.168.1.130:443: found
- *Dec 6 15:52:46.171: cTCP: Handshake done with 212.39.64.67:27172, packet came thru!
- *Dec 6 15:52:46.171: cTCP: RST from 212.39.64.67:27172, but we don't trust!
- *Dec 6 15:52:46.175: cTCP: DATA from 212.39.64.67:27172
- *Dec 6 15:52:46.175: ISAKMP:(1003):deleting SA reason "BY user command" state (R) QM_IDLE (peer 212.39.64.67)
- *Dec 6 15:52:46.175: ISAKMP (1003): returning address 10.10.10.6 to pool
- *Dec 6 15:52:46.175: ISAKMP: Unlocking peer struct 0x6803F69C for isadb_mark_sa_deleted(), count 0
- *Dec 6 15:52:46.175: ISAKMP: returning address 10.10.10.6 to pool
- *Dec 6 15:52:46.175: cTCP: Sending (45BEACFA)RST(1005100) to 212.39.64.67:27172
- *Dec 6 15:52:46.175: cTCP: Connection[665F7F20] 212.39.64.67:27172 192.168.1.130:443: successfully removed
- *Dec 6 15:52:46.175: ISAKMP: Deleting peer node by peer_reap for 212.39.64.67: 6803F69C
- *Dec 6 15:52:46.175: ISAKMP: returning address 10.10.10.6 to pool
- *Dec 6 15:52:46.175: ISAKMP:(1003):Input = IKE_MESG_FROM_PEER, IKE_MM_EXCH
- *Dec 6 15:52:46.175: ISAKMP:(1003):Old State = IKE_DEST_SA New State = IKE_DEST_SA
- *Dec 6 15:52:46.179: IPSEC(key_engine): got a queue event with 1 KMI message(s)
- *Dec 6 15:52:46.183: cTCP: Connection[0] 212.39.64.67:27172 192.168.1.130:443: NOT found
- *Dec 6 15:52:46.183: cTCP: Packet [212.39.64.67:27172 192.168.1.130:443:], no existing connection
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement