Jan 16 15:38:29 [IKEv1 DEBUG]: Group = 199.111.175.5, IP = 199.111.175.5, Sending keep-alive of type DPD R-U-THERE (seq number 0xbc66192) Jan 16 15:38:29 [IKEv1 DEBUG]: Group = 199.111.175.5, IP = 199.111.175.5, constructing blank hash payload Jan 16 15:38:29 [IKEv1 DEBUG]: Group = 199.111.175.5, IP = 199.111.175.5, constructing qm hash payload Jan 16 15:38:29 [IKEv1]: IP = 199.111.175.5, IKE_DECODE SENDING Message (msgid=fa8fde8b) with payloads : HDR + HASH (8) + NOTIFY (11) + NONE (0) total length : 84 Jan 16 15:38:29 [IKEv1 DEBUG]: Group = 184.0.251.78, IP = 184.0.251.78, Sending keep-alive of type DPD R-U-THERE (seq number 0x526f0f86) Jan 16 15:38:29 [IKEv1 DEBUG]: Group = 184.0.251.78, IP = 184.0.251.78, constructing blank hash payload Jan 16 15:38:29 [IKEv1 DEBUG]: Group = 184.0.251.78, IP = 184.0.251.78, constructing qm hash payload Jan 16 15:38:29 [IKEv1]: IP = 184.0.251.78, IKE_DECODE SENDING Message (msgid=a3a01fb0) with payloads : HDR + HASH (8) + NOTIFY (11) + NONE (0) total length : 84 Jan 16 15:38:29 [IKEv1]: IP = 184.0.251.78, IKE_DECODE RECEIVED Message (msgid=4d7b47aa) with payloads : HDR + HASH (8) + NOTIFY (11) + NONE (0) total length : 84 Jan 16 15:38:29 [IKEv1 DEBUG]: Group = 184.0.251.78, IP = 184.0.251.78, processing hash payload Jan 16 15:38:29 [IKEv1 DEBUG]: Group = 184.0.251.78, IP = 184.0.251.78, processing notify payload Jan 16 15:38:29 [IKEv1 DEBUG]: Group = 184.0.251.78, IP = 184.0.251.78, Received keep-alive of type DPD R-U-THERE-ACK (seq number 0x526f0f86) Jan 16 15:38:29 [IKEv1]: IP = 199.111.175.5, IKE_DECODE RECEIVED Message (msgid=4e3883dc) with payloads : HDR + HASH (8) + NOTIFY (11) + NONE (0) total length : 84 Jan 16 15:38:29 [IKEv1 DEBUG]: Group = 199.111.175.5, IP = 199.111.175.5, processing hash payload Jan 16 15:38:29 [IKEv1 DEBUG]: Group = 199.111.175.5, IP = 199.111.175.5, processing notify payload Jan 16 15:38:29 [IKEv1 DEBUG]: Group = 199.111.175.5, IP = 199.111.175.5, Received keep-alive of type DPD R-U-THERE-ACK (seq number 0xbc66192) Jan 16 15:38:30 [IKEv1 DEBUG]: Pitcher: received a key acquire message, spi 0x0 IPSEC(crypto_map_check): crypto map 184.1.126.140 1 does not hole match for ACL Primary-ISP1_1_cryptomap. IPSEC(crypto_map_check): crypto map 184.1.126.140 2 does not hole match for ACL Primary-ISP1_2_cryptomap. IPSEC(crypto_map_check): crypto map 184.1.126.140 3 does not hole match for ACL Primary-ISP1_3_cryptomap. Jan 16 15:38:30 [IKEv1]: IP = 202.6.12.244, Queuing KEY-ACQUIRE messages to be processed when P1 SA is complete. Jan 16 15:38:30 [IKEv1 DEBUG]: IP = 202.6.12.244, IKE MM Initiator FSM error history (struct &0xab4b6aa8) , : MM_DONE, EV_ERROR-->MM_WAIT_MSG2, EV_RETRY-->MM_WAIT_MSG2, EV_TIMEOUT-->MM_WAIT_MSG2, NullEvent-->MM_SND_MSG1, EV_SND_MSG-->MM_SND_MSG1, EV_START_TMR-->MM_SND_MSG1, EV_RESEND_MSG-->MM_WAIT_MSG2, EV_RETRY Jan 16 15:38:30 [IKEv1 DEBUG]: IP = 202.6.12.244, IKE SA MM:e2ed40c0 terminating: flags 0x01000022, refcnt 0, tuncnt 0 Jan 16 15:38:30 [IKEv1 DEBUG]: IP = 202.6.12.244, sending delete/delete with reason message Jan 16 15:38:30 [IKEv1]: IP = 202.6.12.244, Removing peer from peer table failed, no match! Jan 16 15:38:30 [IKEv1]: IP = 202.6.12.244, Error: Unable to remove PeerTblEntry Jan 16 15:38:31 [IKEv1 DEBUG]: Pitcher: received a key acquire message, spi 0x0 IPSEC(crypto_map_check): crypto map 184.1.126.140 1 does not hole match for ACL Primary-ISP1_1_cryptomap. IPSEC(crypto_map_check): crypto map 184.1.126.140 2 does not hole match for ACL Primary-ISP1_2_cryptomap. IPSEC(crypto_map_check): crypto map 184.1.126.140 3 does not hole match for ACL Primary-ISP1_3_cryptomap. Jan 16 15:38:31 [IKEv1]: IP = 184.1.126.140, IKE Initiator: New Phase 1, Intf inside, IKE Peer 184.1.126.140 local Proxy Address 10.80.0.0, remote Proxy Address 10.70.0.0, Crypto map (184.1.126.140) Jan 16 15:38:31 [IKEv1 DEBUG]: IP = 184.1.126.140, constructing ISAKMP SA payload Jan 16 15:38:31 [IKEv1 DEBUG]: IP = 184.1.126.140, constructing NAT-Traversal VID ver 02 payload Jan 16 15:38:31 [IKEv1 DEBUG]: IP = 184.1.126.140, constructing NAT-Traversal VID ver 03 payload Jan 16 15:38:31 [IKEv1 DEBUG]: IP = 184.1.126.140, constructing NAT-Traversal VID ver RFC payload Jan 16 15:38:31 [IKEv1 DEBUG]: IP = 184.1.126.140, constructing Fragmentation VID + extended capabilities payload Jan 16 15:38:31 [IKEv1]: IP = 184.1.126.140, IKE_DECODE SENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + VENDOR (13) + VENDOR (13) + VENDOR (13) + NONE (0) total length : 204 Jan 16 15:38:31 [IKEv1]: IP = 184.1.126.140, IKE_DECODE RECEIVED Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 104 Jan 16 15:38:31 [IKEv1 DEBUG]: IP = 184.1.126.140, processing SA payload Jan 16 15:38:31 [IKEv1 DEBUG]: IP = 184.1.126.140, Oakley proposal is acceptable Jan 16 15:38:31 [IKEv1 DEBUG]: IP = 184.1.126.140, processing VID payload Jan 16 15:38:31 [IKEv1 DEBUG]: IP = 184.1.126.140, Received NAT-Traversal RFC VID Jan 16 15:38:31 [IKEv1 DEBUG]: IP = 184.1.126.140, constructing ke payload Jan 16 15:38:31 [IKEv1 DEBUG]: IP = 184.1.126.140, constructing nonce payload Jan 16 15:38:31 [IKEv1 DEBUG]: IP = 184.1.126.140, constructing Cisco Unity VID payload Jan 16 15:38:31 [IKEv1 DEBUG]: IP = 184.1.126.140, constructing xauth V6 VID payload Jan 16 15:38:31 [IKEv1 DEBUG]: IP = 184.1.126.140, Send IOS VID Jan 16 15:38:31 [IKEv1 DEBUG]: IP = 184.1.126.140, Constructing ASA spoofing IOS Vendor ID payload (version: 1.0.0, capabilities: 20000001) Jan 16 15:38:31 [IKEv1 DEBUG]: IP = 184.1.126.140, constructing VID payload Jan 16 15:38:31 [IKEv1 DEBUG]: IP = 184.1.126.140, Send Altiga/Cisco VPN3000/Cisco ASA GW VID Jan 16 15:38:31 [IKEv1 DEBUG]: IP = 184.1.126.140, constructing NAT-Discovery payload Jan 16 15:38:31 [IKEv1 DEBUG]: IP = 184.1.126.140, computing NAT Discovery hash Jan 16 15:38:31 [IKEv1 DEBUG]: IP = 184.1.126.140, constructing NAT-Discovery payload Jan 16 15:38:31 [IKEv1 DEBUG]: IP = 184.1.126.140, computing NAT Discovery hash Jan 16 15:38:31 [IKEv1]: IP = 184.1.126.140, IKE_DECODE SENDING Message (msgid=0) with payloads : HDR + KE (4) + NONCE (10) + VENDOR (13) + VENDOR (13) + VENDOR (13) + VENDOR (13) + NAT-D (20) + NAT-D (20) + NONE (0) total length : 304 Jan 16 15:38:31 [IKEv1]: IP = 184.1.126.140, IKE_DECODE RECEIVED Message (msgid=0) with payloads : HDR + KE (4) + NONCE (10) + VENDOR (13) + VENDOR (13) + VENDOR (13) + VENDOR (13) + NAT-D (20) + NAT-D (20) + NONE (0) total length : 304 Jan 16 15:38:31 [IKEv1 DEBUG]: IP = 184.1.126.140, processing ke payload Jan 16 15:38:31 [IKEv1 DEBUG]: IP = 184.1.126.140, processing ISA_KE payload Jan 16 15:38:31 [IKEv1 DEBUG]: IP = 184.1.126.140, processing nonce payload Jan 16 15:38:31 [IKEv1 DEBUG]: IP = 184.1.126.140, processing VID payload Jan 16 15:38:31 [IKEv1 DEBUG]: IP = 184.1.126.140, Received Cisco Unity client VID Jan 16 15:38:31 [IKEv1 DEBUG]: IP = 184.1.126.140, processing VID payload Jan 16 15:38:31 [IKEv1 DEBUG]: IP = 184.1.126.140, Received DPD VID Jan 16 15:38:31 [IKEv1 DEBUG]: IP = 184.1.126.140, processing VID payload Jan 16 15:38:31 [IKEv1 DEBUG]: IP = 184.1.126.140, Processing IOS/PIX Vendor ID payload (version: 1.0.0, capabilities: 00000f7f) Jan 16 15:38:31 [IKEv1 DEBUG]: IP = 184.1.126.140, processing VID payload Jan 16 15:38:31 [IKEv1 DEBUG]: IP = 184.1.126.140, Received xauth V6 VID Jan 16 15:38:31 [IKEv1 DEBUG]: IP = 184.1.126.140, processing NAT-Discovery payload Jan 16 15:38:31 [IKEv1 DEBUG]: IP = 184.1.126.140, computing NAT Discovery hash Jan 16 15:38:31 [IKEv1 DEBUG]: IP = 184.1.126.140, processing NAT-Discovery payload Jan 16 15:38:31 [IKEv1 DEBUG]: IP = 184.1.126.140, computing NAT Discovery hash Jan 16 15:38:31 [IKEv1]: IP = 184.1.126.140, Connection landed on tunnel_group 184.1.126.140 Jan 16 15:38:31 [IKEv1 DEBUG]: Group = 184.1.126.140, IP = 184.1.126.140, Generating keys for Initiator... Jan 16 15:38:31 [IKEv1 DEBUG]: Group = 184.1.126.140, IP = 184.1.126.140, constructing ID payload Jan 16 15:38:31 [IKEv1 DEBUG]: Group = 184.1.126.140, IP = 184.1.126.140, constructing hash payload Jan 16 15:38:31 [IKEv1 DEBUG]: Group = 184.1.126.140, IP = 184.1.126.140, Computing hash for ISAKMP Jan 16 15:38:31 [IKEv1 DEBUG]: IP = 184.1.126.140, Constructing IOS keep alive payload: proposal=32767/32767 sec. Jan 16 15:38:31 [IKEv1 DEBUG]: Group = 184.1.126.140, IP = 184.1.126.140, constructing dpd vid payload Jan 16 15:38:31 [IKEv1]: IP = 184.1.126.140, IKE_DECODE SENDING Message (msgid=0) with payloads : HDR + ID (5) + HASH (8) + IOS KEEPALIVE (128) + VENDOR (13) + NONE (0) total length : 96 Jan 16 15:38:31 [IKEv1]: Group = 184.1.126.140, IP = 184.1.126.140, Automatic NAT Detection Status: Remote end is NOT behind a NAT device This end is NOT behind a NAT device Jan 16 15:38:32 [IKEv1]: IP = 184.1.126.140, IKE_DECODE RECEIVED Message (msgid=0) with payloads : HDR + ID (5) + HASH (8) + IOS KEEPALIVE (128) + NONE (0) total length : 84 Jan 16 15:38:32 [IKEv1 DEBUG]: Group = 184.1.126.140, IP = 184.1.126.140, processing ID payload Jan 16 15:38:32 [IKEv1 DECODE]: Group = 184.1.126.140, IP = 184.1.126.140, ID_IPV4_ADDR ID received 184.1.126.140 Jan 16 15:38:32 [IKEv1 DEBUG]: Group = 184.1.126.140, IP = 184.1.126.140, processing hash payload Jan 16 15:38:32 [IKEv1 DEBUG]: Group = 184.1.126.140, IP = 184.1.126.140, Computing hash for ISAKMP Jan 16 15:38:32 [IKEv1 DEBUG]: IP = 184.1.126.140, Processing IOS keep alive payload: proposal=10/2 sec. Jan 16 15:38:32 [IKEv1 DEBUG]: IP = 184.1.126.140, Starting IOS keepalive monitor: 20 sec. Jan 16 15:38:32 [IKEv1]: IP = 184.1.126.140, Connection landed on tunnel_group 184.1.126.140 Jan 16 15:38:32 [IKEv1 DEBUG]: Group = 184.1.126.140, IP = 184.1.126.140, Oakley begin quick mode Jan 16 15:38:32 [IKEv1 DECODE]: Group = 184.1.126.140, IP = 184.1.126.140, IKE Initiator starting QM: msg id = 1621baf5 Jan 16 15:38:32 [IKEv1]: Group = 184.1.126.140, IP = 184.1.126.140, PHASE 1 COMPLETED Jan 16 15:38:32 [IKEv1]: IP = 184.1.126.140, Keep-alive type for this connection: DPD Jan 16 15:38:32 [IKEv1 DEBUG]: Group = 184.1.126.140, IP = 184.1.126.140, Starting P1 rekey timer: 82080 seconds. IPSEC: New embryonic SA created @ 0xAEBF6530, SCB: 0xAEBBA3C0, Direction: inbound SPI : 0x9E2770C4 Session ID: 0x0469E000 VPIF num : 0x00000002 Tunnel type: l2l Protocol : esp Lifetime : 240 seconds Jan 16 15:38:32 [IKEv1 DEBUG]: Group = 184.1.126.140, IP = 184.1.126.140, IKE got SPI from key engine: SPI = 0x9e2770c4 Jan 16 15:38:32 [IKEv1 DEBUG]: Group = 184.1.126.140, IP = 184.1.126.140, oakley constucting quick mode Jan 16 15:38:32 [IKEv1 DEBUG]: Group = 184.1.126.140, IP = 184.1.126.140, constructing blank hash payload Jan 16 15:38:32 [IKEv1 DEBUG]: Group = 184.1.126.140, IP = 184.1.126.140, constructing IPSec SA payload Jan 16 15:38:32 [IKEv1 DEBUG]: Group = 184.1.126.140, IP = 184.1.126.140, constructing IPSec nonce payload Jan 16 15:38:32 [IKEv1 DEBUG]: Group = 184.1.126.140, IP = 184.1.126.140, constructing proxy ID Jan 16 15:38:32 [IKEv1 DEBUG]: Group = 184.1.126.140, IP = 184.1.126.140, Transmitting Proxy Id: Local subnet: 10.80.0.0 mask 255.255.0.0 Protocol 0 Port 0 Remote subnet: 10.70.0.0 Mask 255.255.0.0 Protocol 0 Port 0 Jan 16 15:38:32 [IKEv1 DECODE]: Group = 184.1.126.140, IP = 184.1.126.140, IKE Initiator sending Initial Contact Jan 16 15:38:32 [IKEv1 DEBUG]: Group = 184.1.126.140, IP = 184.1.126.140, constructing qm hash payload Jan 16 15:38:32 [IKEv1 DECODE]: Group = 184.1.126.140, IP = 184.1.126.140, IKE Initiator sending 1st QM pkt: msg id = 1621baf5 Jan 16 15:38:32 [IKEv1]: IP = 184.1.126.140, IKE_DECODE SENDING Message (msgid=1621baf5) with payloads : HDR + HASH (8) + SA (1) + NONCE (10) + ID (5) + ID (5) + NOTIFY (11) + NONE (0) total length : 196 Jan 16 15:38:37 [IKEv1 DEBUG]: Pitcher: received a key acquire message, spi 0x0 IPSEC(crypto_map_check): crypto map 184.1.126.140 1 does not hole match for ACL Primary-ISP1_1_cryptomap. IPSEC(crypto_map_check): crypto map 184.1.126.140 2 does not hole match for ACL Primary-ISP1_2_cryptomap. IPSEC(crypto_map_check): crypto map 184.1.126.140 3 does not hole match for ACL Primary-ISP1_3_cryptomap. Jan 16 15:38:39 [IKEv1 DEBUG]: Group = 199.111.175.5, IP = 199.111.175.5, Sending keep-alive of type DPD R-U-THERE (seq number 0xbc66193) Jan 16 15:38:39 [IKEv1 DEBUG]: Group = 199.111.175.5, IP = 199.111.175.5, constructing blank hash payload Jan 16 15:38:39 [IKEv1 DEBUG]: Group = 199.111.175.5, IP = 199.111.175.5, constructing qm hash payload Jan 16 15:38:39 [IKEv1]: IP = 199.111.175.5, IKE_DECODE SENDING Message (msgid=f44e7293) with payloads : HDR + HASH (8) + NOTIFY (11) + NONE (0) total length : 84 Jan 16 15:38:39 [IKEv1 DEBUG]: Group = 184.0.251.78, IP = 184.0.251.78, Sending keep-alive of type DPD R-U-THERE (seq number 0x526f0f87) Jan 16 15:38:39 [IKEv1 DEBUG]: Group = 184.0.251.78, IP = 184.0.251.78, constructing blank hash payload Jan 16 15:38:39 [IKEv1 DEBUG]: Group = 184.0.251.78, IP = 184.0.251.78, constructing qm hash payload Jan 16 15:38:39 [IKEv1]: IP = 184.0.251.78, IKE_DECODE SENDING Message (msgid=4e18ab7d) with payloads : HDR + HASH (8) + NOTIFY (11) + NONE (0) total length : 84 Jan 16 15:38:39 [IKEv1]: IP = 184.0.251.78, IKE_DECODE RECEIVED Message (msgid=a63c5d27) with payloads : HDR + HASH (8) + NOTIFY (11) + NONE (0) total length : 84 Jan 16 15:38:39 [IKEv1 DEBUG]: Group = 184.0.251.78, IP = 184.0.251.78, processing hash payload Jan 16 15:38:39 [IKEv1 DEBUG]: Group = 184.0.251.78, IP = 184.0.251.78, processing notify payload Jan 16 15:38:39 [IKEv1 DEBUG]: Group = 184.0.251.78, IP = 184.0.251.78, Received keep-alive of type DPD R-U-THERE-ACK (seq number 0x526f0f87) Jan 16 15:38:39 [IKEv1]: IP = 199.111.175.5, IKE_DECODE RECEIVED Message (msgid=9e9e8215) with payloads : HDR + HASH (8) + NOTIFY (11) + NONE (0) total length : 84 Jan 16 15:38:39 [IKEv1 DEBUG]: Group = 199.111.175.5, IP = 199.111.175.5, processing hash payload Jan 16 15:38:39 [IKEv1 DEBUG]: Group = 199.111.175.5, IP = 199.111.175.5, processing notify payload Jan 16 15:38:39 [IKEv1 DEBUG]: Group = 199.111.175.5, IP = 199.111.175.5, Received keep-alive of type DPD R-U-THERE-ACK (seq number 0xbc66193) Jan 16 15:38:42 [IKEv1 DEBUG]: Pitcher: received a key acquire message, spi 0x0 IPSEC(crypto_map_check): crypto map 184.1.126.140 1 does not hole match for ACL Primary-ISP1_1_cryptomap. IPSEC(crypto_map_check): crypto map 184.1.126.140 2 does not hole match for ACL Primary-ISP1_2_cryptomap. IPSEC(crypto_map_check): crypto map 184.1.126.140 3 does not hole match for ACL Primary-ISP1_3_cryptomap. Jan 16 15:38:47 [IKEv1 DEBUG]: Pitcher: received a key acquire message, spi 0x0 IPSEC(crypto_map_check): crypto map 184.1.126.140 1 does not hole match for ACL Primary-ISP1_1_cryptomap. IPSEC(crypto_map_check): crypto map 184.1.126.140 2 does not hole match for ACL Primary-ISP1_2_cryptomap. IPSEC(crypto_map_check): crypto map 184.1.126.140 3 does not hole match for ACL Primary-ISP1_3_cryptomap. Jan 16 15:38:48 [IKEv1 DEBUG]: Pitcher: received a key acquire message, spi 0x0 IPSEC(crypto_map_check): crypto map 184.1.126.140 1 does not hole match for ACL Primary-ISP1_1_cryptomap. IPSEC(crypto_map_check): crypto map 184.1.126.140 2 does not hole match for ACL Primary-ISP1_2_cryptomap. IPSEC(crypto_map_check): crypto map 184.1.126.140 3 does not hole match for ACL Primary-ISP1_3_cryptomap. Jan 16 15:38:49 [IKEv1 DEBUG]: Group = 199.111.175.5, IP = 199.111.175.5, Sending keep-alive of type DPD R-U-THERE (seq number 0xbc66194) Jan 16 15:38:49 [IKEv1 DEBUG]: Group = 199.111.175.5, IP = 199.111.175.5, constructing blank hash payload Jan 16 15:38:49 [IKEv1 DEBUG]: Group = 199.111.175.5, IP = 199.111.175.5, constructing qm hash payload Jan 16 15:38:49 [IKEv1]: IP = 199.111.175.5, IKE_DECODE SENDING Message (msgid=f3707190) with payloads : HDR + HASH (8) + NOTIFY (11) + NONE (0) total length : 84 Jan 16 15:38:49 [IKEv1 DEBUG]: Group = 184.0.251.78, IP = 184.0.251.78, Sending keep-alive of type DPD R-U-THERE (seq number 0x526f0f88) Jan 16 15:38:49 [IKEv1 DEBUG]: Group = 184.0.251.78, IP = 184.0.251.78, constructing blank hash payload Jan 16 15:38:49 [IKEv1 DEBUG]: Group = 184.0.251.78, IP = 184.0.251.78, constructing qm hash payload Jan 16 15:38:49 [IKEv1]: IP = 184.0.251.78, IKE_DECODE SENDING Message (msgid=59994248) with payloads : HDR + HASH (8) + NOTIFY (11) + NONE (0) total length : 84 Jan 16 15:38:49 [IKEv1 DEBUG]: Group = 184.1.126.140, IP = 184.1.126.140, Sending keep-alive of type DPD R-U-THERE (seq number 0x7061a39e) Jan 16 15:38:49 [IKEv1 DEBUG]: Group = 184.1.126.140, IP = 184.1.126.140, constructing blank hash payload Jan 16 15:38:49 [IKEv1 DEBUG]: Group = 184.1.126.140, IP = 184.1.126.140, constructing qm hash payload Jan 16 15:38:49 [IKEv1]: IP = 184.1.126.140, IKE_DECODE SENDING Message (msgid=dbcf464e) with payloads : HDR + HASH (8) + NOTIFY (11) + NONE (0) total length : 84 Jan 16 15:38:49 [IKEv1]: IP = 184.0.251.78, IKE_DECODE RECEIVED Message (msgid=d7b8c7ba) with payloads : HDR + HASH (8) + NOTIFY (11) + NONE (0) total length : 84 Jan 16 15:38:49 [IKEv1 DEBUG]: Group = 184.0.251.78, IP = 184.0.251.78, processing hash payload Jan 16 15:38:49 [IKEv1 DEBUG]: Group = 184.0.251.78, IP = 184.0.251.78, processing notify payload Jan 16 15:38:49 [IKEv1 DEBUG]: Group = 184.0.251.78, IP = 184.0.251.78, Received keep-alive of type DPD R-U-THERE-ACK (seq number 0x526f0f88) Jan 16 15:38:49 [IKEv1]: IP = 199.111.175.5, IKE_DECODE RECEIVED Message (msgid=d060f7f9) with payloads : HDR + HASH (8) + NOTIFY (11) + NONE (0) total length : 84 Jan 16 15:38:49 [IKEv1 DEBUG]: Group = 199.111.175.5, IP = 199.111.175.5, processing hash payload Jan 16 15:38:49 [IKEv1 DEBUG]: Group = 199.111.175.5, IP = 199.111.175.5, processing notify payload Jan 16 15:38:49 [IKEv1 DEBUG]: Group = 199.111.175.5, IP = 199.111.175.5, Received keep-alive of type DPD R-U-THERE-ACK (seq number 0xbc66194) Jan 16 15:38:50 [IKEv1 DEBUG]: Pitcher: received a key acquire message, spi 0x0 IPSEC(crypto_map_check): crypto map 184.1.126.140 1 does not hole match for ACL Primary-ISP1_1_cryptomap. IPSEC(crypto_map_check): crypto map 184.1.126.140 2 does not hole match for ACL Primary-ISP1_2_cryptomap. IPSEC(crypto_map_check): crypto map 184.1.126.140 3 does not hole match for ACL Primary-ISP1_3_cryptomap. Jan 16 15:38:51 [IKEv1 DEBUG]: Group = 184.1.126.140, IP = 184.1.126.140, Sending keep-alive of type DPD R-U-THERE (seq number 0x7061a39f) Jan 16 15:38:51 [IKEv1 DEBUG]: Group = 184.1.126.140, IP = 184.1.126.140, constructing blank hash payload Jan 16 15:38:51 [IKEv1 DEBUG]: Group = 184.1.126.140, IP = 184.1.126.140, constructing qm hash payload Jan 16 15:38:51 [IKEv1]: IP = 184.1.126.140, IKE_DECODE SENDING Message (msgid=cf31507c) with payloads : HDR + HASH (8) + NOTIFY (11) + NONE (0) total length : 84 Jan 16 15:38:53 [IKEv1 DEBUG]: Pitcher: received a key acquire message, spi 0x0 IPSEC(crypto_map_check): crypto map 184.1.126.140 1 does not hole match for ACL Primary-ISP1_1_cryptomap. IPSEC(crypto_map_check): crypto map 184.1.126.140 2 does not hole match for ACL Primary-ISP1_2_cryptomap. IPSEC(crypto_map_check): crypto map 184.1.126.140 3 does not hole match for ACL Primary-ISP1_3_cryptomap. Jan 16 15:38:53 [IKEv1 DEBUG]: Group = 184.1.126.140, IP = 184.1.126.140, Sending keep-alive of type DPD R-U-THERE (seq number 0x7061a3a0) Jan 16 15:38:53 [IKEv1 DEBUG]: Group = 184.1.126.140, IP = 184.1.126.140, constructing blank hash payload Jan 16 15:38:53 [IKEv1 DEBUG]: Group = 184.1.126.140, IP = 184.1.126.140, constructing qm hash payload Jan 16 15:38:53 [IKEv1]: IP = 184.1.126.140, IKE_DECODE SENDING Message (msgid=285086ac) with payloads : HDR + HASH (8) + NOTIFY (11) + NONE (0) total length : 84 Jan 16 15:38:55 [IKEv1]: Group = 184.1.126.140, IP = 184.1.126.140, IKE lost contact with remote peer, deleting connection (keepalive type: DPD) Jan 16 15:38:55 [IKEv1 DEBUG]: Group = 184.1.126.140, IP = 184.1.126.140, IKE SA MM:cb2106ca rcv'd Terminate: state MM_ACTIVE flags 0x0000c062, refcnt 1, tuncnt 1 Jan 16 15:38:55 [IKEv1 DEBUG]: Group = 184.1.126.140, IP = 184.1.126.140, sending delete/delete with reason message Jan 16 15:38:55 [IKEv1 DEBUG]: Group = 184.1.126.140, IP = 184.1.126.140, constructing blank hash payload Jan 16 15:38:55 [IKEv1]: Group = 184.1.126.140, IP = 184.1.126.140, construct_ipsec_delete(): No SPI to identify Phase 2 SA! Jan 16 15:38:55 [IKEv1 DEBUG]: Group = 184.1.126.140, IP = 184.1.126.140, IKE Deleting SA: Remote Proxy 10.70.0.0, Local Proxy 10.80.0.0 Jan 16 15:38:55 [IKEv1]: Group = 184.1.126.140, IP = 184.1.126.140, Removing peer from correlator table failed, no match! Jan 16 15:38:55 [IKEv1 DEBUG]: Group = 184.1.126.140, IP = 184.1.126.140, IKE SA MM:cb2106ca terminating: flags 0x0100c022, refcnt 0, tuncnt 0 Jan 16 15:38:55 [IKEv1 DEBUG]: Group = 184.1.126.140, IP = 184.1.126.140, sending delete/delete with reason message Jan 16 15:38:55 [IKEv1 DEBUG]: Group = 184.1.126.140, IP = 184.1.126.140, constructing blank hash payload Jan 16 15:38:55 [IKEv1 DEBUG]: Group = 184.1.126.140, IP = 184.1.126.140, constructing IKE delete payload Jan 16 15:38:55 [IKEv1 DEBUG]: Group = 184.1.126.140, IP = 184.1.126.140, constructing qm hash payload Jan 16 15:38:55 [IKEv1]: IP = 184.1.126.140, IKE_DECODE SENDING Message (msgid=3d9e4c29) with payloads : HDR + HASH (8) + DELETE (12) + NONE (0) total length : 80 Jan 16 15:38:55 [IKEv1 DEBUG]: Pitcher: received key delete msg, spi 0x9e2770c4 Jan 16 15:38:55 [IKEv1]: Ignoring msg to mark SA with dsID 74047488 dead because SA deleted Jan 16 15:38:55 [IKEv1]: IP = 184.1.126.140, Received encrypted packet with no matching SA, dropping Jan 16 15:38:56 [IKEv1 DEBUG]: Pitcher: received a key acquire message, spi 0x0 IPSEC(crypto_map_check): crypto map 184.1.126.140 1 does not hole match for ACL Primary-ISP1_1_cryptomap. IPSEC(crypto_map_check): crypto map 184.1.126.140 2 does not hole match for ACL Primary-ISP1_2_cryptomap. IPSEC(crypto_map_check): crypto map 184.1.126.140 3 does not hole match for ACL Primary-ISP1_3_cryptomap. Jan 16 15:38:56 [IKEv1]: IP = 202.6.12.244, IKE Initiator: New Phase 1, Intf inside, IKE Peer 202.6.12.244 local Proxy Address 10.80.0.0, remote Proxy Address 10.70.0.0, Crypto map (184.1.126.140) Jan 16 15:38:56 [IKEv1 DEBUG]: IP = 202.6.12.244, constructing ISAKMP SA payload Jan 16 15:38:56 [IKEv1 DEBUG]: IP = 202.6.12.244, constructing NAT-Traversal VID ver 02 payload Jan 16 15:38:56 [IKEv1 DEBUG]: IP = 202.6.12.244, constructing NAT-Traversal VID ver 03 payload Jan 16 15:38:56 [IKEv1 DEBUG]: IP = 202.6.12.244, constructing NAT-Traversal VID ver RFC payload Jan 16 15:38:56 [IKEv1 DEBUG]: IP = 202.6.12.244, constructing Fragmentation VID + extended capabilities payload Jan 16 15:38:56 [IKEv1]: IP = 202.6.12.244, IKE_DECODE SENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + VENDOR (13) + VENDOR (13) + VENDOR (13) + NONE (0) total length : 204 Jan 16 15:38:59 [IKEv1 DEBUG]: Pitcher: received a key acquire message, spi 0x0 IPSEC(crypto_map_check): crypto map 184.1.126.140 1 does not hole match for ACL Primary-ISP1_1_cryptomap. IPSEC(crypto_map_check): crypto map 184.1.126.140 2 does not hole match for ACL Primary-ISP1_2_cryptomap. IPSEC(crypto_map_check): crypto map 184.1.126.140 3 does not hole match for ACL Primary-ISP1_3_cryptomap. Jan 16 15:38:59 [IKEv1]: IP = 202.6.12.244, Queuing KEY-ACQUIRE messages to be processed when P1 SA is complete. Jan 16 15:38:59 [IKEv1 DEBUG]: Group = 199.111.175.5, IP = 199.111.175.5, Sending keep-alive of type DPD R-U-THERE (seq number 0xbc66195) Jan 16 15:38:59 [IKEv1 DEBUG]: Group = 199.111.175.5, IP = 199.111.175.5, constructing blank hash payload Jan 16 15:38:59 [IKEv1 DEBUG]: Group = 199.111.175.5, IP = 199.111.175.5, constructing qm hash payload Jan 16 15:38:59 [IKEv1]: IP = 199.111.175.5, IKE_DECODE SENDING Message (msgid=96272927) with payloads : HDR + HASH (8) + NOTIFY (11) + NONE (0) total length : 84 Jan 16 15:38:59 [IKEv1 DEBUG]: Group = 184.0.251.78, IP = 184.0.251.78, Sending keep-alive of type DPD R-U-THERE (seq number 0x526f0f89) Jan 16 15:38:59 [IKEv1 DEBUG]: Group = 184.0.251.78, IP = 184.0.251.78, constructing blank hash payload Jan 16 15:38:59 [IKEv1 DEBUG]: Group = 184.0.251.78, IP = 184.0.251.78, constructing qm hash payload Jan 16 15:38:59 [IKEv1]: IP = 184.0.251.78, IKE_DECODE SENDING Message (msgid=df8474b3) with payloads : HDR + HASH (8) + NOTIFY (11) + NONE (0) total length : 84 Jan 16 15:38:59 [IKEv1]: IP = 184.0.251.78, IKE_DECODE RECEIVED Message (msgid=3812807f) with payloads : HDR + HASH (8) + NOTIFY (11) + NONE (0) total length : 84 Jan 16 15:38:59 [IKEv1 DEBUG]: Group = 184.0.251.78, IP = 184.0.251.78, processing hash payload Jan 16 15:38:59 [IKEv1 DEBUG]: Group = 184.0.251.78, IP = 184.0.251.78, processing notify payload Jan 16 15:38:59 [IKEv1 DEBUG]: Group = 184.0.251.78, IP = 184.0.251.78, Received keep-alive of type DPD R-U-THERE-ACK (seq number 0x526f0f89) Jan 16 15:38:59 [IKEv1]: IP = 199.111.175.5, IKE_DECODE RECEIVED Message (msgid=6f810b0c) with payloads : HDR + HASH (8) + NOTIFY (11) + NONE (0) total length : 84 Jan 16 15:38:59 [IKEv1 DEBUG]: Group = 199.111.175.5, IP = 199.111.175.5, processing hash payload Jan 16 15:38:59 [IKEv1 DEBUG]: Group = 199.111.175.5, IP = 199.111.175.5, processing notify payload Jan 16 15:38:59 [IKEv1 DEBUG]: Group = 199.111.175.5, IP = 199.111.175.5, Received keep-alive of type DPD R-U-THERE-ACK (seq number 0xbc66195) Jan 16 15:39:04 [IKEv1]: IP = 202.6.12.244, IKE_DECODE RESENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + VENDOR (13) + VENDOR (13) + VENDOR (13) + NONE (0) total length : 204 Jan 16 15:39:04 [IKEv1 DEBUG]: Pitcher: received a key acquire message, spi 0x0 IPSEC(crypto_map_check): crypto map 184.1.126.140 1 does not hole match for ACL Primary-ISP1_1_cryptomap. IPSEC(crypto_map_check): crypto map 184.1.126.140 2 does not hole match for ACL Primary-ISP1_2_cryptomap. IPSEC(crypto_map_check): crypto map 184.1.126.140 3 does not hole match for ACL Primary-ISP1_3_cryptomap. Jan 16 15:39:04 [IKEv1]: IP = 202.6.12.244, Queuing KEY-ACQUIRE messages to be processed when P1 SA is complete. Jan 16 15:39:08 [IKEv1]: IP = 184.1.126.140, IKE_DECODE RECEIVED Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + VENDOR (13) + VENDOR (13) + VENDOR (13) + NONE (0) total length : 164 Jan 16 15:39:08 [IKEv1 DEBUG]: IP = 184.1.126.140, processing SA payload Jan 16 15:39:08 [IKEv1 DEBUG]: IP = 184.1.126.140, Oakley proposal is acceptable Jan 16 15:39:08 [IKEv1 DEBUG]: IP = 184.1.126.140, processing VID payload Jan 16 15:39:08 [IKEv1 DEBUG]: IP = 184.1.126.140, Received NAT-Traversal RFC VID Jan 16 15:39:08 [IKEv1 DEBUG]: IP = 184.1.126.140, processing VID payload Jan 16 15:39:08 [IKEv1 DEBUG]: IP = 184.1.126.140, processing VID payload Jan 16 15:39:08 [IKEv1 DEBUG]: IP = 184.1.126.140, Received NAT-Traversal ver 03 VID Jan 16 15:39:08 [IKEv1 DEBUG]: IP = 184.1.126.140, processing VID payload Jan 16 15:39:08 [IKEv1 DEBUG]: IP = 184.1.126.140, Received NAT-Traversal ver 02 VID Jan 16 15:39:08 [IKEv1 DEBUG]: IP = 184.1.126.140, processing IKE SA payload Jan 16 15:39:08 [IKEv1 DEBUG]: IP = 184.1.126.140, IKE SA Proposal # 1, Transform # 1 acceptable Matches global IKE entry # 3 Jan 16 15:39:08 [IKEv1 DEBUG]: IP = 184.1.126.140, constructing ISAKMP SA payload Jan 16 15:39:08 [IKEv1 DEBUG]: IP = 184.1.126.140, constructing NAT-Traversal VID ver 02 payload Jan 16 15:39:08 [IKEv1 DEBUG]: IP = 184.1.126.140, constructing Fragmentation VID + extended capabilities payload Jan 16 15:39:08 [IKEv1]: IP = 184.1.126.140, IKE_DECODE SENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + VENDOR (13) + NONE (0) total length : 128 Jan 16 15:39:08 [IKEv1]: IP = 184.1.126.140, IKE_DECODE RECEIVED Message (msgid=0) with payloads : HDR + KE (4) + NONCE (10) + VENDOR (13) + VENDOR (13) + VENDOR (13) + NAT-D (130) + NAT-D (130) + NONE (0) total length : 284 Jan 16 15:39:08 [IKEv1 DEBUG]: IP = 184.1.126.140, processing ke payload Jan 16 15:39:08 [IKEv1 DEBUG]: IP = 184.1.126.140, processing ISA_KE payload Jan 16 15:39:08 [IKEv1 DEBUG]: IP = 184.1.126.140, processing nonce payload Jan 16 15:39:08 [IKEv1 DEBUG]: IP = 184.1.126.140, processing VID payload Jan 16 15:39:08 [IKEv1 DEBUG]: IP = 184.1.126.140, Received DPD VID Jan 16 15:39:08 [IKEv1 DEBUG]: IP = 184.1.126.140, processing VID payload Jan 16 15:39:08 [IKEv1 DEBUG]: IP = 184.1.126.140, Processing IOS/PIX Vendor ID payload (version: 1.0.0, capabilities: 00000f6f) Jan 16 15:39:08 [IKEv1 DEBUG]: IP = 184.1.126.140, processing VID payload Jan 16 15:39:08 [IKEv1 DEBUG]: IP = 184.1.126.140, Received xauth V6 VID Jan 16 15:39:08 [IKEv1 DEBUG]: IP = 184.1.126.140, processing NAT-Discovery payload Jan 16 15:39:08 [IKEv1 DEBUG]: IP = 184.1.126.140, computing NAT Discovery hash Jan 16 15:39:08 [IKEv1 DEBUG]: IP = 184.1.126.140, processing NAT-Discovery payload Jan 16 15:39:08 [IKEv1 DEBUG]: IP = 184.1.126.140, computing NAT Discovery hash Jan 16 15:39:08 [IKEv1 DEBUG]: IP = 184.1.126.140, constructing ke payload Jan 16 15:39:08 [IKEv1 DEBUG]: IP = 184.1.126.140, constructing nonce payload Jan 16 15:39:08 [IKEv1 DEBUG]: IP = 184.1.126.140, constructing Cisco Unity VID payload Jan 16 15:39:08 [IKEv1 DEBUG]: IP = 184.1.126.140, constructing xauth V6 VID payload Jan 16 15:39:08 [IKEv1 DEBUG]: IP = 184.1.126.140, Send IOS VID Jan 16 15:39:08 [IKEv1 DEBUG]: IP = 184.1.126.140, Constructing ASA spoofing IOS Vendor ID payload (version: 1.0.0, capabilities: 20000001) Jan 16 15:39:08 [IKEv1 DEBUG]: IP = 184.1.126.140, constructing VID payload Jan 16 15:39:08 [IKEv1 DEBUG]: IP = 184.1.126.140, Send Altiga/Cisco VPN3000/Cisco ASA GW VID Jan 16 15:39:08 [IKEv1 DEBUG]: IP = 184.1.126.140, constructing NAT-Discovery payload Jan 16 15:39:08 [IKEv1 DEBUG]: IP = 184.1.126.140, computing NAT Discovery hash Jan 16 15:39:08 [IKEv1 DEBUG]: IP = 184.1.126.140, constructing NAT-Discovery payload Jan 16 15:39:08 [IKEv1 DEBUG]: IP = 184.1.126.140, computing NAT Discovery hash Jan 16 15:39:08 [IKEv1]: IP = 184.1.126.140, Connection landed on tunnel_group 184.1.126.140 Jan 16 15:39:08 [IKEv1 DEBUG]: Group = 184.1.126.140, IP = 184.1.126.140, Generating keys for Responder... Jan 16 15:39:08 [IKEv1]: IP = 184.1.126.140, IKE_DECODE SENDING Message (msgid=0) with payloads : HDR + KE (4) + NONCE (10) + VENDOR (13) + VENDOR (13) + VENDOR (13) + VENDOR (13) + NAT-D (130) + NAT-D (130) + NONE (0) total length : 304