Advertisement
Guest User

Untitled

a guest
Dec 6th, 2011
519
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
C 32.65 KB | None | 0 0
  1. *Dec  6 15:37:20.571: ISAKMP:(1003):atts are acceptable.
  2. *Dec  6 15:37:20.571: IPSEC(validate_proposal_request): proposal part #1
  3. *Dec  6 15:37:20.571: IPSEC(validate_proposal_request): proposal part #1,
  4.   (key eng. msg.) INBOUND local= 192.168.1.130:0, remote= 212.39.64.67:0,
  5.     local_proxy= 0.0.0.0/0.0.0.0/0/0 (type=4),
  6.     remote_proxy= 10.10.10.6/255.255.255.255/0/0 (type=1),
  7.     protocol= ESP, transform= NONE  (Tunnel),
  8.     lifedur= 0s and 0kb,
  9.     spi= 0x0(0), conn_id= 0, keysize= 128, flags= 0x0
  10. *Dec  6 15:37:20.571: IPSEC(ipsec_process_proposal): transform proposal not supported for identity:
  11.     {esp-aes esp-md5-hmac }
  12. *Dec  6 15:37:20.571: ISAKMP:(1003): IPSec policy invalidated proposal with error 256
  13. *Dec  6 15:37:20.571: ISAKMP:(1003):Checking IPSec proposal 8
  14. *Dec  6 15:37:20.571: ISAKMP: transform 1, ESP_AES
  15. *Dec  6 15:37:20.571: ISAKMP:   attributes in transform:
  16. *Dec  6 15:37:20.571: ISAKMP:      authenticator is HMAC-SHA
  17. *Dec  6 15:37:20.571: ISAKMP:      key length is 128
  18. *Dec  6 15:37:20.571: ISAKMP:      encaps is 1 (Tunnel)
  19. *Dec  6 15:37:20.571: ISAKMP:      SA life type in seconds
  20. *Dec  6 15:37:20.571: ISAKMP:      SA life duration (VPI) of  0x0 0x20 0xC4 0x9B
  21. *Dec  6 15:37:20.575: ISAKMP:(1003):atts are acceptable.
  22. *Dec  6 15:37:20.575: IPSEC(validate_proposal_request): proposal part #1
  23. *Dec  6 15:37:20.575: IPSEC(validate_proposal_request): proposal part #1,
  24.   (key eng. msg.) INBOUND local= 192.168.1.130:0, remote= 212.39.64.67:0,
  25.     local_proxy= 0.0.0.0/0.0.0.0/0/0 (type=4),
  26.     remote_proxy= 10.10.10.6/255.255.255.255/0/0 (type=1),
  27.     protocol= ESP, transform= NONE  (Tunnel),
  28.     lifedur= 0s and 0kb,
  29.     spi= 0x0(0), conn_id= 0, keysize= 128, flags= 0x0
  30. *Dec  6 15:37:20.575: IPSEC(ipsec_process_proposal): transform proposal not supported for identity:
  31.     {esp-aes esp-sha-hmac }
  32. *Dec  6 15:37:20.575: ISAKMP:(1003): IPSec policy invalidated proposal with error 256
  33. *Dec  6 15:37:20.575: ISAKMP:(1003):Checking IPSec proposal 9
  34. *Dec  6 15:37:20.575: ISAKMP: transform 1, ESP_3DES
  35. *Dec  6 15:37:20.575: ISAKMP:   attributes in transform:
  36. *Dec  6 15:37:20.575: ISAKMP:      authenticator is HMAC-MD5
  37. *Dec  6 15:37:20.575: ISAKMP:      encaps is 1 (Tunnel)
  38. *Dec  6 15:37:20.575: ISAKMP:      SA life type in seconds
  39. *Dec  6 15:37:20.575: ISAKMP:      SA life duration (VPI) of  0x0 0x20 0xC4 0x9B
  40. *Dec  6 15:37:20.575: ISAKMP:(1003):atts are acceptable.
  41. *Dec  6 15:37:20.575: ISAKMP:(1003):Checking IPSec proposal 9
  42. *Dec  6 15:37:20.575: ISAKMP:(1003):transform 1, IPPCP LZS
  43. *Dec  6 15:37:20.575: ISAKMP:   attributes in transform:
  44. *Dec  6 15:37:20.575: ISAKMP:      encaps is 1 (Tunnel)
  45. *Dec  6 15:37:20.575: ISAKMP:      SA life type in seconds
  46. *Dec  6 15:37:20.575: ISAKMP:      SA life duration (VPI) of  0x0 0x20 0xC4 0x9B
  47. *Dec  6 15:37:20.575: ISAKMP:(1003):atts are acceptable.
  48. *Dec  6 15:37:20.575: IPSEC(validate_proposal_request): proposal part #1
  49. *Dec  6 15:37:20.575: IPSEC(validate_proposal_request): proposal part #1,
  50.   (key eng. msg.) INBOUND local= 192.168.1.130:0, remote= 212.39.64.67:0,
  51.     local_proxy= 0.0.0.0/0.0.0.0/0/0 (type=4),
  52.     remote_proxy= 10.10.10.6/255.255.255.255/0/0 (type=1),
  53.     protocol= ESP, transform= NONE  (Tunnel),
  54.     lifedur= 0s and 0kb,
  55.     spi= 0x0(0), conn_id= 0, keysize= 0, flags= 0x0
  56. *Dec  6 15:37:20.575: IPSEC(validate_proposal_request): proposal part #2
  57. *Dec  6 15:37:20.575: IPSEC(validate_proposal_request): proposal part #2,
  58.   (key eng. msg.) INBOUND local= 192.168.1.130:0, remote= 212.39.64.67:0,
  59.     local_proxy= 0.0.0.0/0.0.0.0/0/0 (type=4),
  60.     remote_proxy= 10.10.10.6/255.255.255.255/0/0 (type=1),
  61.     protocol= PCP, transform= NONE  (Tunnel),
  62.     lifedur= 0s and 0kb,
  63.     spi= 0x0(0), conn_id= 0, keysize= 0, flags= 0x0
  64. *Dec  6 15:37:20.575: IPSEC(ipsec_process_proposal): transform proposal not supported for identity:
  65.     {esp-3des esp-md5-hmac comp-lzs }
  66. *Dec  6 15:37:20.575: ISAKMP:(1003): IPSec policy invalidated proposal with error 256
  67. *Dec  6 15:37:20.579: ISAKMP:(1003):Checking IPSec proposal 10
  68. *Dec  6 15:37:20.579: ISAKMP: transform 1, ESP_3DES
  69. *Dec  6 15:37:20.579: ISAKMP:   attributes in transform:
  70. *Dec  6 15:37:20.579: ISAKMP:      authenticator is HMAC-SHA
  71. *Dec  6 15:37:20.579: ISAKMP:      encaps is 1 (Tunnel)
  72. *Dec  6 15:37:20.579: ISAKMP:      SA life type in seconds
  73. *Dec  6 15:37:20.579: ISAKMP:      SA life duration (VPI) of  0x0 0x20 0xC4 0x9B
  74. *Dec  6 15:37:20.579: ISAKMP:(1003):atts are acceptable.
  75. *Dec  6 15:37:20.579: ISAKMP:(1003):Checking IPSec proposal 10
  76. *Dec  6 15:37:20.579: ISAKMP:(1003):transform 1, IPPCP LZS
  77. *Dec  6 15:37:20.579: ISAKMP:   attributes in transform:
  78. *Dec  6 15:37:20.579: ISAKMP:      encaps is 1 (Tunnel)
  79. *Dec  6 15:37:20.579: ISAKMP:      SA life type in seconds
  80. *Dec  6 15:37:20.579: ISAKMP:      SA life duration (VPI) of  0x0 0x20 0xC4 0x9B
  81. *Dec  6 15:37:20.579: ISAKMP:(1003):atts are acceptable.
  82. *Dec  6 15:37:20.579: IPSEC(validate_proposal_request): proposal part #1
  83. *Dec  6 15:37:20.579: IPSEC(validate_proposal_request): proposal part #1,
  84.   (key eng. msg.) INBOUND local= 192.168.1.130:0, remote= 212.39.64.67:0,
  85.     local_proxy= 0.0.0.0/0.0.0.0/0/0 (type=4),
  86.     remote_proxy= 10.10.10.6/255.255.255.255/0/0 (type=1),
  87.     protocol= ESP, transform= NONE  (Tunnel),
  88.     lifedur= 0s and 0kb,
  89.     spi= 0x0(0), conn_id= 0, keysize= 0, flags= 0x0
  90. *Dec  6 15:37:20.579: IPSEC(validate_proposal_request): proposal part #2
  91. *Dec  6 15:37:20.579: IPSEC(validate_proposal_request): proposal part #2,
  92.   (key eng. msg.) INBOUND local= 192.168.1.130:0, remote= 212.39.64.67:0,
  93.     local_proxy= 0.0.0.0/0.0.0.0/0/0 (type=4),
  94.     remote_proxy= 10.10.10.6/255.255.255.255/0/0 (type=1),
  95.     protocol= PCP, transform= NONE  (Tunnel),
  96.     lifedur= 0s and 0kb,
  97.     spi= 0x0(0), conn_id= 0, keysize= 0, flags= 0x0
  98. *Dec  6 15:37:20.579: IPSEC(ipsec_process_proposal): transform proposal not supported for identity:
  99.     {esp-3des esp-sha-hmac comp-lzs }
  100. *Dec  6 15:37:20.579: ISAKMP:(1003): IPSec policy invalidated proposal with error 256
  101. *Dec  6 15:37:20.579: ISAKMP:(1003):Checking IPSec proposal 11
  102. *Dec  6 15:37:20.579: ISAKMP: transform 1, ESP_3DES
  103. *Dec  6 15:37:20.579: ISAKMP:   attributes in transform:
  104. *Dec  6 15:37:20.579: ISAKMP:      authenticator is HMAC-MD5
  105. *Dec  6 15:37:20.579: ISAKMP:      encaps is 1 (Tunnel)
  106. *Dec  6 15:37:20.579: ISAKMP:      SA life type in seconds
  107. *Dec  6 15:37:20.579: ISAKMP:      SA life duration (VPI) of  0x0 0x20 0xC4 0x9B
  108. *Dec  6 15:37:20.583: ISAKMP:(1003):atts are acceptable.
  109. *Dec  6 15:37:20.583: IPSEC(validate_proposal_request): proposal part #1
  110. *Dec  6 15:37:20.583: IPSEC(validate_proposal_request): proposal part #1,
  111.   (key eng. msg.) INBOUND local= 192.168.1.130:0, remote= 212.39.64.67:0,
  112.     local_proxy= 0.0.0.0/0.0.0.0/0/0 (type=4),
  113.     remote_proxy= 10.10.10.6/255.255.255.255/0/0 (type=1),
  114.     protocol= ESP, transform= NONE  (Tunnel),
  115.     lifedur= 0s and 0kb,
  116.     spi= 0x0(0), conn_id= 0, keysize= 0, flags= 0x0
  117. *Dec  6 15:37:20.583: IPSEC(ipsec_process_proposal): transform proposal not supported for identity:
  118.     {esp-3des esp-md5-hmac }
  119. *Dec  6 15:37:20.583: ISAKMP:(1003): IPSec policy invalidated proposal with error 256
  120. *Dec  6 15:37:20.583: ISAKMP:(1003):Checking IPSec proposal 12
  121. *Dec  6 15:37:20.583: ISAKMP: transform 1, ESP_3DES
  122. *Dec  6 15:37:20.583: ISAKMP:   attributes in transform:
  123. *Dec  6 15:37:20.583: ISAKMP:      authenticator is HMAC-SHA
  124. *Dec  6 15:37:20.583: ISAKMP:      encaps is 1 (Tunnel)
  125. *Dec  6 15:37:20.583: ISAKMP:      SA life type in seconds
  126. *Dec  6 15:37:20.583: ISAKMP:      SA life duration (VPI) of  0x0 0x20 0xC4 0x9B
  127. *Dec  6 15:37:20.583: ISAKMP:(1003):atts are acceptable.
  128. *Dec  6 15:37:20.583: IPSEC(validate_proposal_request): proposal part #1
  129. *Dec  6 15:37:20.583: IPSEC(validate_proposal_request): proposal part #1,
  130.   (key eng. msg.) INBOUND local= 192.168.1.130:0, remote= 212.39.64.67:0,
  131.     local_proxy= 0.0.0.0/0.0.0.0/0/0 (type=4),
  132.     remote_proxy= 10.10.10.6/255.255.255.255/0/0 (type=1),
  133.     protocol= ESP, transform= NONE  (Tunnel),
  134.     lifedur= 0s and 0kb,
  135.     spi= 0x0(0), conn_id= 0, keysize= 0, flags= 0x0
  136. *Dec  6 15:37:20.583: ISAKMP:(1003): processing NONCE payload. message ID = 280064972
  137. *Dec  6 15:37:20.583: ISAKMP:(1003): processing ID payload. message ID = 280064972
  138. *Dec  6 15:37:20.583: ISAKMP:(1003): processing ID payload. message ID = 280064972
  139. *Dec  6 15:37:20.583: ISAKMP:(1003):QM Responder gets spi
  140. *Dec  6 15:37:20.583: ISAKMP:(1003):Node 280064972, Input = IKE_MESG_FROM_PEER, IKE_QM_EXCH
  141. *Dec  6 15:37:20.583: ISAKMP:(1003):Old State = IKE_QM_READY  New State = IKE_QM_SPI_STARVE
  142. *Dec  6 15:37:20.587: ISAKMP:(1003):deleting node 1253630847 error FALSE reason "No Error"
  143. *Dec  6 15:37:20.587: ISAKMP:(1003): Creating IPSec SAs
  144. *Dec  6 15:37:20.587:         inbound SA from 212.39.64.67 to 192.168.1.130 (f/i)  0/ 0
  145.         (proxy 10.10.10.6 to 0.0.0.0)
  146. *Dec  6 15:37:20.587:         has spi 0x6BA867B6 and conn_id 0
  147. *Dec  6 15:37:20.587:         lifetime of 2147483 seconds
  148. *Dec  6 15:37:20.587:         outbound SA from 192.168.1.130 to 212.39.64.67 (f/i) 0/0
  149.         (proxy 0.0.0.0 to 10.10.10.6)
  150. *Dec  6 15:37:20.587:         has spi  0x23C491EC and conn_id 0
  151. *Dec  6 15:37:20.587:         lifetime of 2147483 seconds
  152. *Dec  6 15:37:20.587: ISAKMP:(1003): sending packet to 212.39.64.67 my_port 500 peer_port 27172 (R) QM_IDLE      
  153. *Dec  6 15:37:20.591: ISAKMP:(1003):Sending an IKE IPv4 Packet.
  154. *Dec  6 15:37:20.591: cTCP: demangling outbound IKE packet: 192.168.1.130:500->500 212.39.64.67:27172->500
  155. *Dec  6 15:37:20.591: cTCP: encapsulating IKE packet
  156. *Dec  6 15:37:20.591: cTCP: updating LOCAL Seq number to 45BE84E6
  157. *Dec  6 15:37:20.591: ISAKMP:(1003):Node 280064972, Input = IKE_MESG_INTERNAL, IKE_GOT_SPI
  158. *Dec  6 15:37:20.591: ISAKMP:(1003):Old State = IKE_QM_SPI_STARVE  New State = IKE_QM_R_QM2
  159. *Dec  6 15:37:20.591: IPSEC(key_engine): got a queue event with 1 KMI message(s)
  160. *Dec  6 15:37:20.591: IPSEC(rte_mgr): VPN Route Event static keyword or dynamic SA create for 212.39.64.67
  161. *Dec  6 15:37:20.591: IPSEC(rte_mgr): VPN Route Refcount 1 FastEthernet0/0
  162. *Dec  6 15:37:20.591: IPSEC(rte_mgr): VPN Route Added 10.10.10.6 255.255.255.255 via 212.39.64.67 in IP DEFAULT TABLE with tag 0 distance 1
  163. *Dec  6 15:37:20.595: IPSEC(policy_db_add_ident): src 0.0.0.0, dest 10.10.10.6, dest_port 0
  164.  
  165. *Dec  6 15:37:20.595: IPSEC(create_sa): sa created,
  166.   (sa) sa_dest= 192.168.1.130, sa_proto= 50,
  167.     sa_spi= 0x6BA867B6(1806198710),
  168.     sa_trans= esp-3des esp-sha-hmac , sa_conn_id= 2005
  169.     sa_lifetime(k/sec)= (4395466/3600)
  170. *Dec  6 15:37:20.595: IPSEC(create_sa): sa created,
  171.   (sa) sa_dest= 212.39.64.67, sa_proto= 50,
  172.     sa_spi= 0x23C491EC(600084972),
  173.     sa_trans= esp-3des esp-sha-hmac , sa_conn_id= 2006
  174.     sa_lifetime(k/sec)= (4395466/3600)
  175. *Dec  6 15:37:21.539: cTCP: Connection[665F7F20] 212.39.64.67:27172 192.168.1.130:443:  found
  176. *Dec  6 15:37:21.539: cTCP: updating PEER Seq number to 10041C3
  177. *Dec  6 15:37:21.539: cTCP: Pak with contiguous buffer
  178. *Dec  6 15:37:21.539: cTCP: mangling IKE packet from peer: 212.39.64.67:500->27172 192.168.1.130:500->500
  179. *Dec  6 15:37:21.567: ISAKMP (1003): received packet from 212.39.64.67 dport 500 sport 27172 Global (R) QM_IDLE      
  180. *Dec  6 15:37:21.567: ISAKMP:(1003):deleting node 280064972 error FALSE reason "QM done (await)"
  181. *Dec  6 15:37:21.571: ISAKMP:(1003):Node 280064972, Input = IKE_MESG_FROM_PEER, IKE_QM_EXCH
  182. *Dec  6 15:37:21.571: ISAKMP:(1003):Old State = IKE_QM_R_QM2  New State = IKE_QM_PHASE2_COMPLETE
  183. *Dec  6 15:37:21.571: IPSEC(key_engine): got a queue event with 1 KMI message(s)
  184. *Dec  6 15:37:21.571: IPSEC(key_engine_enable_outbound): rec'd enable notify from ISAKMP
  185. *Dec  6 15:37:21.571: IPSEC(key_engine_enable_outbound): enable SA with spi 600084972/50
  186. *Dec  6 15:37:21.571: IPSEC(update_current_outbound_sa): get enable SA peer 212.39.64.67 current outbound sa to SPI 23C491EC
  187. *Dec  6 15:37:21.571: IPSEC(update_current_outbound_sa): updated peer 212.39.64.67 current outbound sa to SPI 23C491EC
  188. Cisco#
  189. *Dec  6 15:38:10.587: ISAKMP:(1003):purging node 1253630847
  190. *Dec  6 15:38:11.571: ISAKMP:(1003):purging node 280064972
  191. Cisco#
  192. Cisco#
  193. Cisco#
  194. *Dec  6 15:42:09.631: cTCP: Connection[665F7F20] 212.39.64.67:27172 192.168.1.130:443:  found
  195. *Dec  6 15:42:09.631: cTCP: Handshake done with 212.39.64.67:27172, packet came thru!
  196. *Dec  6 15:42:09.631: cTCP: DATA from 212.39.64.67:27172
  197. *Dec  6 15:43:54.015: ISAKMP:(1003):purging node -269181371
  198. *Dec  6 15:43:54.031: ISAKMP:(1003):purging node -62146151
  199. *Dec  6 15:47:10.603: cTCP: Connection[665F7F20] 212.39.64.67:27172 192.168.1.130:443:  found
  200. *Dec  6 15:47:10.603: cTCP: Handshake done with 212.39.64.67:27172, packet came thru!
  201. *Dec  6 15:51:19.123: cTCP: updating PEER Seq number to 1004237
  202. *Dec  6 15:51:19.123: cTCP: Pak with particles
  203. *Dec  6 15:51:19.155: cTCP: encapsulating pak
  204. *Dec  6 15:51:19.155: cTCP: datagramstart 0xEEA0CA58, network_start 0xEEA0CA58, size 136
  205. *Dec  6 15:51:19.155: cTCP: Pak with contiguous buffer
  206. *Dec  6 15:51:19.155:  cTCP: allocated new buffer
  207. *Dec  6 15:51:19.155: cTCP: updating LOCAL Seq number to 45BE856A
  208. *Dec  6 15:51:19.155: IP: s=192.168.1.130 (FastEthernet0/0), d=212.39.64.67 (FastEthernet0/0), len 172, cTCP
  209. *Dec  6 15:51:19.167: cTCP: updating PEER Seq number to 10042A3
  210. *Dec  6 15:51:19.167: cTCP: Pak with particles
  211. *Dec  6 15:51:19.211: cTCP: encapsulating pak
  212. *Dec  6 15:51:19.211: cTCP: datagramstart 0xEEA0BD58, network_start 0xEEA0BD58, size 96
  213. *Dec  6 15:51:19.211: cTCP: Pak with contiguous buffer
  214. *Dec  6 15:51:19.211:  cTCP: allocated new buffer
  215. *Dec  6 15:51:19.211: cTCP: updating LOCAL Seq number to 45BE85C6
  216. *Dec  6 15:51:19.211: IP: s=192.168.1.130 (FastEthernet0/0), d=212.39.64.67 (FastEthernet0/0), len 132, cTCP
  217. *Dec  6 15:51:19.239: cTCP: updating PEER Seq number to 1004317
  218. *Dec  6 15:51:19.239: cTCP: Pak with particles
  219. *Dec  6 15:51:19.239: cTCP: sending gratuitous ack
  220. *Dec  6 15:51:19.239: cTCP: Sending (45BE85C6)ACK(1004318) to 212.39.64.67:27172
  221. *Dec  6 15:51:19.275: cTCP: encapsulating pak
  222. *Dec  6 15:51:19.275: cTCP: datagramstart 0xEEA0CA58, network_start 0xEEA0CA58, size 160
  223. *Dec  6 15:51:19.275: cTCP: Pak with contiguous buffer
  224. *Dec  6 15:51:19.275:  cTCP: allocated new buffer
  225. *Dec  6 15:51:19.275: cTCP: updating LOCAL Seq number to 45BE8662
  226. *Dec  6 15:51:19.275: IP: s=192.168.1.130 (FastEthernet0/0), d=212.39.64.67 (FastEthernet0/0), len 196, cTCP
  227. *Dec  6 15:51:19.287: cTCP: updating PEER Seq number to 1004393
  228. *Dec  6 15:51:19.287: cTCP: Pak with particles
  229. *Dec  6 15:51:19.431: cTCP: encapsulating pak
  230. *Dec  6 15:51:19.431: cTCP: datagramstart 0xEEA0A698, network_start 0xEEA0A698, size 184
  231. *Dec  6 15:51:19.431: cTCP: Pak with contiguous buffer
  232. *Dec  6 15:51:19.431:  cTCP: allocated new buffer
  233. *Dec  6 15:51:19.431: cTCP: updating LOCAL Seq number to 45BE8716
  234. *Dec  6 15:51:19.431: IP: s=192.168.1.130 (FastEthernet0/0), d=212.39.64.67 (FastEthernet0/0), len 220, cTCP
  235. *Dec  6 15:51:19.443: cTCP: updating PEER Seq number to 1004407
  236. *Dec  6 15:51:19.443: cTCP: Pak with particles
  237. *Dec  6 15:51:19.479: cTCP: encapsulating pak
  238. *Dec  6 15:51:19.479: cTCP: datagramstart 0xEEA0CA58, network_start 0xEEA0CA58, size 136
  239. *Dec  6 15:51:19.479: cTCP: Pak with contiguous buffer
  240. *Dec  6 15:51:19.479:  cTCP: allocated new buffer
  241. *Dec  6 15:51:19.479: cTCP: updating LOCAL Seq number to 45BE879A
  242. *Dec  6 15:51:19.479: IP: s=192.168.1.130 (FastEthernet0/0), d=212.39.64.67 (FastEthernet0/0), len 172, cTCP
  243. *Dec  6 15:51:19.487: cTCP: updating PEER Seq number to 1004473
  244. *Dec  6 15:51:19.487: cTCP: Pak with particles
  245. *Dec  6 15:51:19.495: cTCP: encapsulating pak
  246. *Dec  6 15:51:19.495: cTCP: datagramstart 0xEEDDD618, network_start 0xEEDDD618, size 112
  247. *Dec  6 15:51:19.495: cTCP: Pak with contiguous buffer
  248. *Dec  6 15:51:19.495:  cTCP: allocated new buffer
  249. *Dec  6 15:51:19.495: cTCP: updating LOCAL Seq number to 45BE8806
  250. *Dec  6 15:51:19.495: IP: s=192.168.1.130 (FastEthernet0/0), d=212.39.64.67 (FastEthernet0/0), len 148, cTCP
  251. *Dec  6 15:51:19.503: cTCP: updating PEER Seq number to 10044D7
  252. *Dec  6 15:51:19.503: cTCP: Pak with particles
  253. *Dec  6 15:51:19.503: cTCP: updating PEER Seq number to 10045CB
  254. *Dec  6 15:51:19.503: cTCP: Pak with particles
  255. *Dec  6 15:51:19.511: cTCP: encapsulating pak
  256. *Dec  6 15:51:19.511: cTCP: datagramstart 0xEEA0C3D8, network_start 0xEEA0C3D8, size 104
  257. *Dec  6 15:51:19.511: cTCP: Pak with contiguous buffer
  258. *Dec  6 15:51:19.511:  cTCP: allocated new buffer
  259. *Dec  6 15:51:19.511: cTCP: updating LOCAL Seq number to 45BE886A
  260. *Dec  6 15:51:19.511: IP: s=192.168.1.130 (FastEthernet0/0), d=212.39.64.67 (FastEthernet0/0), len 140, cTCP
  261. *Dec  6 15:51:19.511: cTCP: encapsulating pak
  262. *Dec  6 15:51:19.511: cTCP: datagramstart 0xEEDDC298, network_start 0xEEDDC298, size 320
  263. *Dec  6 15:51:19.511: cTCP: Pak with contiguous buffer
  264. *Dec  6 15:51:19.511:  cTCP: allocated new buffer
  265. *Dec  6 15:51:19.511: cTCP: updating LOCAL Seq number to 45BE89A6
  266. *Dec  6 15:51:19.511: IP: s=192.168.1.130 (FastEthernet0/0), d=212.39.64.67 (FastEthernet0/0), len 356, cTCP
  267. *Dec  6 15:51:19.511: cTCP: encapsulating pak
  268. *Dec  6 15:51:19.511: cTCP: datagramstart 0xEEDE8F58, network_start 0xEEDE8F58, size 1248
  269. *Dec  6 15:51:19.511: cTCP: Pak with contiguous buffer
  270. *Dec  6 15:51:19.515:  cTCP: allocated new buffer
  271. *Dec  6 15:51:19.515: cTCP: updating LOCAL Seq number to 45BE8E82
  272. *Dec  6 15:51:19.515: IP: s=192.168.1.130 (FastEthernet0/0), d=212.39.64.67 (FastEthernet0/0), len 1284, cTCP
  273. *Dec  6 15:51:19.523: cTCP: updating PEER Seq number to 100462F
  274. *Dec  6 15:51:19.523: cTCP: Pak with particles
  275. *Dec  6 15:51:19.527: cTCP: updating PEER Seq number to 1004693
  276. *Dec  6 15:51:19.527: cTCP: Pak with particles
  277. *Dec  6 15:51:19.563: cTCP: updating PEER Seq number to 100478F
  278. *Dec  6 15:51:19.563: cTCP: Pak with particles
  279. *Dec  6 15:51:19.567: cTCP: encapsulating pak
  280. *Dec  6 15:51:19.567: cTCP: datagramstart 0xEEA0CD98, network_start 0xEEA0CD98, size 320
  281. *Dec  6 15:51:19.567: cTCP: Pak with contiguous buffer
  282. *Dec  6 15:51:19.567:  cTCP: allocated new buffer
  283. *Dec  6 15:51:19.567: cTCP: updating LOCAL Seq number to 45BE8FBE
  284. *Dec  6 15:51:19.567: IP: s=192.168.1.130 (FastEthernet0/0), d=212.39.64.67 (FastEthernet0/0), len 356, cTCP
  285. *Dec  6 15:51:19.571: cTCP: encapsulating pak
  286. *Dec  6 15:51:19.571: cTCP: datagramstart 0xEEDE9D18, network_start 0xEEDE9D18, size 1408
  287. *Dec  6 15:51:19.571: cTCP: Pak with contiguous buffer
  288. *Dec  6 15:51:19.571:  cTCP: allocated new buffer
  289. *Dec  6 15:51:19.571: cTCP: updating LOCAL Seq number to 45BE953A
  290. *Dec  6 15:51:19.571: IP: s=192.168.1.130 (FastEthernet0/0), d=212.39.64.67 (FastEthernet0/0), len 1444, cTCP
  291. *Dec  6 15:51:19.571: cTCP: encapsulating pak
  292. *Dec  6 15:51:19.571: cTCP: datagramstart 0xEEDEA3F8, network_start 0xEEDEA3F8, size 944
  293. *Dec  6 15:51:19.571: cTCP: Pak with contiguous buffer
  294. *Dec  6 15:51:19.571:  cTCP: allocated new buffer
  295. *Dec  6 15:51:19.571: cTCP: updating LOCAL Seq number to 45BE98E6
  296. *Dec  6 15:51:19.571: IP: s=192.168.1.130 (FastEthernet0/0), d=212.39.64.67 (FastEthernet0/0), len 980, cTCP
  297. *Dec  6 15:51:19.583: cTCP: updating PEER Seq number to 10047F3
  298. *Dec  6 15:51:19.583: cTCP: Pak with particles
  299. *Dec  6 15:51:19.595: cTCP: updating PEER Seq number to 100486F
  300. *Dec  6 15:51:19.595: cTCP: Pak with particles
  301. *Dec  6 15:51:19.623: cTCP: updating PEER Seq number to 10048D3
  302. *Dec  6 15:51:19.623: cTCP: Pak with particles
  303. *Dec  6 15:51:19.627: cTCP: encapsulating pak
  304. *Dec  6 15:51:19.627: cTCP: datagramstart 0xEEDDCF98, network_start 0xEEDDCF98, size 208
  305. *Dec  6 15:51:19.627: cTCP: Pak with contiguous buffer
  306. *Dec  6 15:51:19.631:  cTCP: allocated new buffer
  307. *Dec  6 15:51:19.631: cTCP: updating LOCAL Seq number to 45BE99B2
  308. *Dec  6 15:51:19.631: IP: s=192.168.1.130 (FastEthernet0/0), d=212.39.64.67 (FastEthernet0/0), len 244, cTCP
  309. *Dec  6 15:51:19.643: cTCP: updating PEER Seq number to 100494F
  310. *Dec  6 15:51:19.643: cTCP: Pak with particles
  311. *Dec  6 15:51:19.675: cTCP: encapsulating pak
  312. *Dec  6 15:51:19.675: cTCP: datagramstart 0xEEA0A9D8, network_start 0xEEA0A9D8, size 176
  313. *Dec  6 15:51:19.675: cTCP: Pak with contiguous buffer
  314. *Dec  6 15:51:19.675:  cTCP: allocated new buffer
  315. *Dec  6 15:51:19.675: cTCP: updating LOCAL Seq number to 45BE9A5E
  316. *Dec  6 15:51:19.675: IP: s=192.168.1.130 (FastEthernet0/0), d=212.39.64.67 (FastEthernet0/0), len 212, cTCP
  317. *Dec  6 15:51:19.687: cTCP: updating PEER Seq number to 10049CB
  318. *Dec  6 15:51:19.687: cTCP: Pak with particles
  319. *Dec  6 15:51:19.723: cTCP: encapsulating pak
  320. *Dec  6 15:51:19.723: cTCP: datagramstart 0xEEA0A9D8, network_start 0xEEA0A9D8, size 176
  321. *Dec  6 15:51:19.723: cTCP: Pak with contiguous buffer
  322. *Dec  6 15:51:19.723:  cTCP: allocated new buffer
  323. *Dec  6 15:51:19.723: cTCP: updating LOCAL Seq number to 45BE9B0A
  324. *Dec  6 15:51:19.723: IP: s=192.168.1.130 (FastEthernet0/0), d=212.39.64.67 (FastEthernet0/0), len 212, cTCP
  325. *Dec  6 15:51:19.735: cTCP: updating PEER Seq number to 1004A37
  326. *Dec  6 15:51:19.735: cTCP: Pak with particles
  327. *Dec  6 15:51:19.771: cTCP: encapsulating pak
  328. *Dec  6 15:51:19.771: cTCP: datagramstart 0xEEA0B6D8, network_start 0xEEA0B6D8, size 112
  329. *Dec  6 15:51:19.771: cTCP: Pak with contiguous buffer
  330. *Dec  6 15:51:19.771:  cTCP: allocated new buffer
  331. *Dec  6 15:51:19.771: cTCP: updating LOCAL Seq number to 45BE9B76
  332. *Dec  6 15:51:19.771: IP: s=192.168.1.130 (FastEthernet0/0), d=212.39.64.67 (FastEthernet0/0), len 148, cTCP
  333. *Dec  6 15:51:19.787: cTCP: updating PEER Seq number to 1004A9B
  334. *Dec  6 15:51:19.787: cTCP: Pak with particles
  335. *Dec  6 15:51:19.787: cTCP: updating PEER Seq number to 1004BAF
  336. *Dec  6 15:51:19.787: cTCP: Pak with particles
  337. *Dec  6 15:51:19.823: cTCP: encapsulating pak
  338. *Dec  6 15:51:19.823: cTCP: datagramstart 0xEEDDBC18, network_start 0xEEDDBC18, size 104
  339. *Dec  6 15:51:19.823: cTCP: Pak with contiguous buffer
  340. *Dec  6 15:51:19.823:  cTCP: allocated new buffer
  341. *Dec  6 15:51:19.823: cTCP: updating LOCAL Seq number to 45BE9BDA
  342. *Dec  6 15:51:19.827: IP: s=192.168.1.130 (FastEthernet0/0), d=212.39.64.67 (FastEthernet0/0), len 140, cTCP
  343. *Dec  6 15:51:19.827: cTCP: encapsulating pak
  344. *Dec  6 15:51:19.827: cTCP: datagramstart 0xEEDEB898, network_start 0xEEDEB898, size 1408
  345. *Dec  6 15:51:19.827: cTCP: Pak with contiguous buffer
  346. *Dec  6 15:51:19.827:  cTCP: allocated new buffer
  347. *Dec  6 15:51:19.827: cTCP: updating LOCAL Seq number to 45BEA156
  348. *Dec  6 15:51:19.827: IP: s=192.168.1.130 (FastEthernet0/0), d=212.39.64.67 (FastEthernet0/0), len 1444, cTCP
  349. *Dec  6 15:51:19.827: cTCP: encapsulating pak
  350. *Dec  6 15:51:19.827: cTCP: datagramstart 0xEEA0BA18, network_start 0xEEA0BA18, size 208
  351. *Dec  6 15:51:19.827: cTCP: Pak with contiguous buffer
  352. *Dec  6 15:51:19.827:  cTCP: allocated new buffer
  353. *Dec  6 15:51:19.827: cTCP: updating LOCAL Seq number to 45BEA222
  354. *Dec  6 15:51:19.827: IP: s=192.168.1.130 (FastEthernet0/0), d=212.39.64.67 (FastEthernet0/0), len 244, cTCP
  355. *Dec  6 15:51:19.839: cTCP: updating PEER Seq number to 1004C13
  356. *Dec  6 15:51:19.843: cTCP: Pak with particles
  357. *Dec  6 15:51:19.843: cTCP: updating PEER Seq number to 1004C77
  358. *Dec  6 15:51:19.843: cTCP: Pak with particles
  359. *Dec  6 15:51:19.883: cTCP: updating PEER Seq number to 1004D73
  360. *Dec  6 15:51:19.883: cTCP: Pak with particles
  361. *Dec  6 15:51:19.887: cTCP: encapsulating pak
  362. *Dec  6 15:51:19.887: cTCP: datagramstart 0xEEA0B058, network_start 0xEEA0B058, size 320
  363. *Dec  6 15:51:19.887: cTCP: Pak with contiguous buffer
  364. *Dec  6 15:51:19.887:  cTCP: allocated new buffer
  365. *Dec  6 15:51:19.891: cTCP: updating LOCAL Seq number to 45BEA35E
  366. *Dec  6 15:51:19.891: IP: s=192.168.1.130 (FastEthernet0/0), d=212.39.64.67 (FastEthernet0/0), len 356, cTCP
  367. *Dec  6 15:51:19.891: cTCP: encapsulating pak
  368. *Dec  6 15:51:19.891: cTCP: datagramstart 0xEEDEC658, network_start 0xEEDEC658, size 1408
  369. *Dec  6 15:51:19.891: cTCP: Pak with contiguous buffer
  370. *Dec  6 15:51:19.891:  cTCP: allocated new buffer
  371. *Dec  6 15:51:19.891: cTCP: updating LOCAL Seq number to 45BEA8DA
  372. *Dec  6 15:51:19.891: IP: s=192.168.1.130 (FastEthernet0/0), d=212.39.64.67 (FastEthernet0/0), len 1444, cTCP
  373. *Dec  6 15:51:19.891: cTCP: encapsulating pak
  374. *Dec  6 15:51:19.891: cTCP: datagramstart 0xEEDECD38, network_start 0xEEDECD38, size 752
  375. *Dec  6 15:51:19.891: cTCP: Pak with contiguous buffer
  376. *Dec  6 15:51:19.891:  cTCP: allocated new buffer
  377. *Dec  6 15:51:19.891: cTCP: updating LOCAL Seq number to 45BEABC6
  378. *Dec  6 15:51:19.891: IP: s=192.168.1.130 (FastEthernet0/0), d=212.39.64.67 (FastEthernet0/0), len 788, cTCP
  379. *Dec  6 15:51:19.899: cTCP: updating PEER Seq number to 1004DD7
  380. *Dec  6 15:51:19.899: cTCP: Pak with particles
  381. *Dec  6 15:51:19.903: cTCP: updating PEER Seq number to 1004E3B
  382. *Dec  6 15:51:19.903: cTCP: Pak with particles
  383. *Dec  6 15:51:19.903: cTCP: updating PEER Seq number to 1004E9F
  384. *Dec  6 15:51:19.903: cTCP: Pak with particles
  385. *Dec  6 15:51:22.843: cTCP: updating PEER Seq number to 1004F03
  386. *Dec  6 15:51:22.843: cTCP: Pak with particles
  387. *Dec  6 15:51:22.843: cTCP: updating PEER Seq number to 1004F67
  388. *Dec  6 15:51:22.847: cTCP: Pak with particles
  389. *Dec  6 15:51:22.847: cTCP: sending gratuitous ack
  390. *Dec  6 15:51:22.847: cTCP: Sending (45BEABC6)ACK(1004F68) to 212.39.64.67:27172
  391. *Dec  6 15:51:22.851: cTCP: encapsulating pak
  392. *Dec  6 15:51:22.851: cTCP: datagramstart 0xEEDDD958, network_start 0xEEDDD958, size 104
  393. *Dec  6 15:51:22.851: cTCP: Pak with contiguous buffer
  394. *Dec  6 15:51:22.851:  cTCP: allocated new buffer
  395. *Dec  6 15:51:22.851: cTCP: updating LOCAL Seq number to 45BEAC2A
  396. *Dec  6 15:51:22.851: IP: s=192.168.1.130 (FastEthernet0/0), d=212.39.64.67 (FastEthernet0/0), len 140, cTCP
  397. *Dec  6 15:51:22.863: cTCP: updating PEER Seq number to 1004FCB
  398. *Dec  6 15:51:22.863: cTCP: Pak with particles
  399. *Dec  6 15:51:22.883: cTCP: encapsulating pak
  400. *Dec  6 15:51:22.883: cTCP: datagramstart 0xEEDDBF58, network_start 0xEEDDBF58, size 104
  401. *Dec  6 15:51:22.883: cTCP: Pak with contiguous buffer
  402. *Dec  6 15:51:22.883:  cTCP: allocated new buffer
  403. *Dec  6 15:51:22.883: cTCP: updating LOCAL Seq number to 45BEAC8E
  404. *Dec  6 15:51:22.883: IP: s=192.168.1.130 (FastEthernet0/0), d=212.39.64.67 (FastEthernet0/0), len 140, cTCP
  405. *Dec  6 15:51:22.895: cTCP: updating PEER Seq number to 100502F
  406. *Dec  6 15:51:22.895: cTCP: Pak with particles
  407. Cisco#
  408. *Dec  6 15:52:11.579: cTCP: Connection[665F7F20] 212.39.64.67:27172 192.168.1.130:443:  found
  409. *Dec  6 15:52:11.579: cTCP: Handshake done with 212.39.64.67:27172, packet came thru!
  410. *Dec  6 15:52:11.579: cTCP: DATA from 212.39.64.67:27172
  411. *Dec  6 15:52:46.155: cTCP: Connection[665F7F20] 212.39.64.67:27172 192.168.1.130:443:  found
  412. *Dec  6 15:52:46.155: cTCP: updating PEER Seq number to 1005093
  413. *Dec  6 15:52:46.155: cTCP: Pak with contiguous buffer
  414. *Dec  6 15:52:46.155: cTCP: mangling IKE packet from peer: 212.39.64.67:500->27172 192.168.1.130:500->500
  415. *Dec  6 15:52:46.155: cTCP: Connection[665F7F20] 212.39.64.67:27172 192.168.1.130:443:  found
  416. *Dec  6 15:52:46.155: cTCP: updating PEER Seq number to 10050FF
  417. *Dec  6 15:52:46.155: cTCP: Pak with contiguous buffer
  418. *Dec  6 15:52:46.155: cTCP: mangling IKE packet from peer: 212.39.64.67:500->27172 192.168.1.130:500->500
  419. *Dec  6 15:52:46.155: ISAKMP (1003): received packet from 212.39.64.67 dport 500 sport 27172 Global (R) QM_IDLE      
  420. *Dec  6 15:52:46.155: ISAKMP: set new node -418160671 to QM_IDLE      
  421. *Dec  6 15:52:46.159: ISAKMP:(1003): processing HASH payload. message ID = 3876806625
  422. *Dec  6 15:52:46.159: ISAKMP:(1003): processing DELETE payload. message ID = 3876806625
  423. *Dec  6 15:52:46.159: ISAKMP:(1003):peer does not do paranoid keepalives.
  424.  
  425. *Dec  6 15:52:46.159: ISAKMP:(1003):peer does not do paranoid keepalives.
  426.  
  427. *Dec  6 15:52:46.159: ISAKMP:(1003):deleting node -418160671 error FALSE reason "Informational (in) state 1"
  428. *Dec  6 15:52:46.159: ISAKMP (1003): received packet from 212.39.64.67 dport 500 sport 27172 Global (R) QM_IDLE      
  429. *Dec  6 15:52:46.159: ISAKMP: set new node 1909345573 to QM_IDLE      
  430. *Dec  6 15:52:46.159: ISAKMP:(1003): processing HASH payload. message ID = 1909345573
  431. *Dec  6 15:52:46.159: ISAKMP:received payload type 18
  432. *Dec  6 15:52:46.159: ISAKMP:(1003):Processing delete with reason payload
  433. *Dec  6 15:52:46.159: ISAKMP:(1003):delete doi = 0
  434. *Dec  6 15:52:46.159: ISAKMP:(1003):delete protocol id = 1
  435. *Dec  6 15:52:46.159: ISAKMP:(1003):delete spi_size =  16
  436. *Dec  6 15:52:46.159: ISAKMP:(1003):delete num spis = 1
  437. *Dec  6 15:52:46.159: ISAKMP:(1003):delete_reason = 2
  438. *Dec  6 15:52:46.159: ISAKMP:(1003): processing DELETE_WITH_REASON payload, message ID = 1909345573, reason: DELETE_BY_USER_COMMAND
  439. *Dec  6 15:52:46.159: ISAKMP:(1003):peer does not do paranoid keepalives.
  440.  
  441. *Dec  6 15:52:46.159: ISAKMP:(1003):peer does not do paranoid keepalives.
  442.  
  443. *Dec  6 15:52:46.159: ISAKMP:(1003):deleting SA reason "BY user command" state (R) QM_IDLE       (peer 212.39.64.67)
  444. *Dec  6 15:52:46.163: ISAKMP:(1003):deleting node 1909345573 error FALSE reason "Informational (in) state 1"
  445. *Dec  6 15:52:46.163: IPSEC(key_engine): got a queue event with 1 KMI message(s)
  446. *Dec  6 15:52:46.163: IPSEC(key_engine_delete_sas): rec'd delete notify from ISAKMP
  447. *Dec  6 15:52:46.163: IPSEC(key_engine_delete_sas): delete SA with spi 0x23C491EC proto 50 for 212.39.64.67
  448. *Dec  6 15:52:46.163: IPSEC(delete_sa): deleting SA,
  449.   (sa) sa_dest= 192.168.1.130, sa_proto= 50,
  450.     sa_spi= 0x6BA867B6(1806198710),
  451.     sa_trans= esp-3des esp-sha-hmac , sa_conn_id= 2005
  452.     sa_lifetime(k/sec)= (4395466/3600),
  453.   (identity) local= 192.168.1.130:0, remote= 212.39.64.67:0,
  454.     local_proxy= 0.0.0.0/0.0.0.0/0/0 (type=4),
  455.     remote_proxy= 10.10.10.6/255.255.255.255/0/0 (type=1)
  456. *Dec  6 15:52:46.163: IPSEC(update_current_outbound_sa): updated peer 212.39.64.67 current outbound sa to SPI 0
  457. *Dec  6 15:52:46.163: IPSEC(delete_sa): deleting SA,
  458.   (sa) sa_dest= 212.39.64.67, sa_proto= 50,
  459.     sa_spi= 0x23C491EC(600084972),
  460.     sa_trans= esp-3des esp-sha-hmac , sa_conn_id= 2006
  461.     sa_lifetime(k/sec)= (4395466/3600),
  462.   (identity) local= 192.168.1.130:0, remote= 212.39.64.67:0,
  463.     local_proxy= 0.0.0.0/0.0.0.0/0/0 (type=4),
  464.     remote_proxy= 10.10.10.6/255.255.255.255/0/0 (type=1)
  465. *Dec  6 15:52:46.163: IPSEC(rte_mgr): VPN Route Event Deleting dynamic maps for peer 212.39.64.67
  466. *Dec  6 15:52:46.163: IPSEC(rte_mgr): VPN Route Refcount 0 FastEthernet0/0
  467. *Dec  6 15:52:46.167: IPSEC(rte_mgr): VPN Route Removed 10.10.10.6 255.255.255.255 via 212.39.64.67 in IP DEFAULT TABLE FastEthernet0/0
  468. *Dec  6 15:52:46.167: IPSEC(key_engine): got a queue event with 1 KMI message(s)
  469. *Dec  6 15:52:46.167: IPSEC(key_engine_delete_sas): rec'd delete notify from ISAKMP
  470. *Dec  6 15:52:46.167: IPSEC(key_engine): got a queue event with 1 KMI message(s)
  471. *Dec  6 15:52:46.167: IPSEC(key_engine_delete_sas): rec'd delete notify from ISAKMP
  472. *Dec  6 15:52:46.167: IPSEC(key_engine_delete_sas): delete all SAs shared with peer 212.39.64.67
  473. *Dec  6 15:52:46.167: ISAKMP: set new node 441624097 to QM_IDLE      
  474. *Dec  6 15:52:46.167: ISAKMP:(1003): sending packet to 212.39.64.67 my_port 500 peer_port 27172 (R) QM_IDLE      
  475. *Dec  6 15:52:46.167: ISAKMP:(1003):Sending an IKE IPv4 Packet.
  476. *Dec  6 15:52:46.167: cTCP: demangling outbound IKE packet: 192.168.1.130:500->500 212.39.64.67:27172->500
  477. *Dec  6 15:52:46.167: cTCP: encapsulating IKE packet
  478. *Dec  6 15:52:46.167: cTCP: updating LOCAL Seq number to 45BEACFA
  479. *Dec  6 15:52:46.171: ISAKMP:(1003):purging node 441624097
  480. *Dec  6 15:52:46.171: ISAKMP:(1003):Input = IKE_MESG_INTERNAL, IKE_PHASE1_DEL
  481. *Dec  6 15:52:46.171: ISAKMP:(1003):Old State = IKE_P1_COMPLETE  New State = IKE_DEST_SA
  482.  
  483. *Dec  6 15:52:46.171: cTCP: Connection[665F7F20] 212.39.64.67:27172 192.168.1.130:443:  found
  484. *Dec  6 15:52:46.171: cTCP: Handshake done with 212.39.64.67:27172, packet came thru!
  485. *Dec  6 15:52:46.171: cTCP: RST from 212.39.64.67:27172, but we don't trust!
  486. *Dec  6 15:52:46.175: cTCP: DATA from 212.39.64.67:27172
  487. *Dec  6 15:52:46.175: ISAKMP:(1003):deleting SA reason "BY user command" state (R) QM_IDLE       (peer 212.39.64.67)
  488. *Dec  6 15:52:46.175: ISAKMP (1003): returning address 10.10.10.6 to pool
  489. *Dec  6 15:52:46.175: ISAKMP: Unlocking peer struct 0x6803F69C for isadb_mark_sa_deleted(), count 0
  490. *Dec  6 15:52:46.175: ISAKMP: returning address 10.10.10.6 to pool
  491. *Dec  6 15:52:46.175: cTCP: Sending (45BEACFA)RST(1005100) to 212.39.64.67:27172
  492. *Dec  6 15:52:46.175: cTCP: Connection[665F7F20] 212.39.64.67:27172 192.168.1.130:443: successfully removed
  493. *Dec  6 15:52:46.175: ISAKMP: Deleting peer node by peer_reap for 212.39.64.67: 6803F69C
  494. *Dec  6 15:52:46.175: ISAKMP: returning address 10.10.10.6 to pool
  495. *Dec  6 15:52:46.175: ISAKMP:(1003):Input = IKE_MESG_FROM_PEER, IKE_MM_EXCH
  496. *Dec  6 15:52:46.175: ISAKMP:(1003):Old State = IKE_DEST_SA  New State = IKE_DEST_SA
  497.  
  498. *Dec  6 15:52:46.179: IPSEC(key_engine): got a queue event with 1 KMI message(s)
  499. *Dec  6 15:52:46.183: cTCP: Connection[0] 212.39.64.67:27172 192.168.1.130:443: NOT found
  500. *Dec  6 15:52:46.183: cTCP: Packet [212.39.64.67:27172 192.168.1.130:443:], no existing connection
  501.  
  502.  
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement