Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Cisco Systems VPN Client Version 4.8.01 (0640)
- Copyright (C) 1998-2007 Cisco Systems, Inc. All Rights Reserved.
- Client Type(s): Linux
- Running on: Linux 2.6.18-274.7.1.el5 #1 SMP Thu Oct 20 16:21:01 EDT 2011 x86_64
- Config file directory: /etc/opt/cisco-vpnclient
- 1 17:38:30.410 12/06/2011 Sev=Warning/3 CLI/0x83900004
- Unable to purge old log files. Function returned -1.
- 2 17:38:30.420 12/06/2011 Sev=Info/4 CVPND/0x4340001F
- Privilege Separation: restoring MTU on primary interface.
- 3 17:38:30.420 12/06/2011 Sev=Debug/7 CM/0x43100033
- Auto-initiation watch: started
- 4 17:38:30.420 12/06/2011 Sev=Debug/7 CM/0x43100033
- Auto-initiation watch: interface change handler invoked
- 5 17:38:30.420 12/06/2011 Sev=Debug/7 CM/0x43100033
- Auto-initiation watch: auto-initiation is currently disabled
- 6 17:38:30.420 12/06/2011 Sev=Info/4 CVPND/0x4340000F
- Started cvpnd:
- Cisco Systems VPN Client Version 4.8.01 (0640)
- Copyright (C) 1998-2007 Cisco Systems, Inc. All Rights Reserved.
- Client Type(s): Linux
- Running on: Linux 2.6.18-274.7.1.el5 #1 SMP Thu Oct 20 16:21:01 EDT 2011 x86_64
- 7 17:38:31.412 12/06/2011 Sev=Info/4 CLI/0x43900002
- Started vpnclient:
- Cisco Systems VPN Client Version 4.8.01 (0640)
- Copyright (C) 1998-2007 Cisco Systems, Inc. All Rights Reserved.
- Client Type(s): Linux
- Running on: Linux 2.6.18-274.7.1.el5 #1 SMP Thu Oct 20 16:21:01 EDT 2011 x86_64
- 8 17:38:31.412 12/06/2011 Sev=Info/4 CM/0x43100002
- Begin connection process
- 9 17:38:31.413 12/06/2011 Sev=Debug/7 CM/0x43100033
- Auto-initiation watch: stopped
- 10 17:38:31.413 12/06/2011 Sev=Info/4 CM/0x43100004
- Establish secure connection
- 11 17:38:31.413 12/06/2011 Sev=Info/4 CM/0x43100024
- Attempt connection with server "188.254.221.8"
- 12 17:38:31.413 12/06/2011 Sev=Info/6 CM/0x4310002F
- Allocated local TCP port 27172 for TCP connection.
- 13 17:38:32.413 12/06/2011 Sev=Info/4 CM/0x43100029
- TCP connection established on port 443 with server "188.254.221.8"
- 14 17:38:32.413 12/06/2011 Sev=Info/4 CM/0x43100024
- Attempt connection with server "188.254.221.8"
- 15 17:38:32.413 12/06/2011 Sev=Info/4 CVPND/0x43400019
- Privilege Separation: binding to port: (500).
- 16 17:38:32.413 12/06/2011 Sev=Info/4 CVPND/0x43400019
- Privilege Separation: binding to port: (4500).
- 17 17:38:32.413 12/06/2011 Sev=Info/6 IKE/0x4300003B
- Attempting to establish a connection with 188.254.221.8.
- 18 17:38:32.413 12/06/2011 Sev=Debug/9 IKE/0x43000091
- Unable to acquire local IP address after 0 attempts (over 12 seconds), probably due to network socket failure.
- 19 17:38:32.414 12/06/2011 Sev=Debug/7 IKE/0x43000076
- NAV Trace->SA: I_Cookie=9DEC0371AE8D20EE R_Cookie=0000000000000000 CurState: AM_INITIAL Event: EV_INITIATOR
- 20 17:38:32.414 12/06/2011 Sev=Debug/7 IKE/0x43000076
- NAV Trace->SA: I_Cookie=9DEC0371AE8D20EE R_Cookie=0000000000000000 CurState: AM_SND_MSG1 Event: EV_GEN_DHKEY
- 21 17:38:32.416 12/06/2011 Sev=Debug/7 IKE/0x43000076
- NAV Trace->SA: I_Cookie=9DEC0371AE8D20EE R_Cookie=0000000000000000 CurState: AM_SND_MSG1 Event: EV_BLD_MSG
- 22 17:38:32.416 12/06/2011 Sev=Debug/7 IKE/0x43000076
- NAV Trace->SA: I_Cookie=9DEC0371AE8D20EE R_Cookie=0000000000000000 CurState: AM_SND_MSG1 Event: EV_START_RETRY_TMR
- 23 17:38:32.417 12/06/2011 Sev=Debug/7 IKE/0x43000076
- NAV Trace->SA: I_Cookie=9DEC0371AE8D20EE R_Cookie=0000000000000000 CurState: AM_SND_MSG1 Event: EV_SND_MSG
- 24 17:38:32.417 12/06/2011 Sev=Info/4 IKE/0x43000013
- SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Frag), VID(Unity)) to 188.254.221.8
- 25 17:38:32.417 12/06/2011 Sev=Decode/11 IKE/0x43000001
- ISAKMP Header
- Initiator COOKIE: 9DEC0371AE8D20EE
- Responder COOKIE: 0000000000000000
- Next Payload: Security Association
- Ver (Hex): 10
- Exchange Type: Aggressive Mode
- Flags: (none)
- MessageID(Hex): 0
- Length: 832
- Payload Security Association
- Next Payload: Key Exchange
- Reserved: 00
- Payload Length: 556
- DOI: IPsec
- Situation: (SIT_IDENTITY_ONLY)
- Payload Proposal
- Next Payload: None
- Reserved: 00
- Payload Length: 544
- Proposal #: 1
- Protocol-Id: PROTO_ISAKMP
- SPI Size: 0
- # of transforms: 14
- Payload Transform
- Next Payload: Transform
- Reserved: 00
- Payload Length: 40
- Transform #: 1
- Transform-Id: KEY_IKE
- Reserved2: 0000
- Encryption Algorithm: AES-CBC
- Hash Algorithm: SHA1
- Group Description: Group 2
- Authentication Method: XAUTHInitPreShared
- Life Type: seconds
- Life Duration (Hex): 0020C49B
- Key Length: 256
- Payload Transform
- Next Payload: Transform
- Reserved: 00
- Payload Length: 40
- Transform #: 2
- Transform-Id: KEY_IKE
- Reserved2: 0000
- Encryption Algorithm: AES-CBC
- Hash Algorithm: MD5
- Group Description: Group 2
- Authentication Method: XAUTHInitPreShared
- Life Type: seconds
- Life Duration (Hex): 0020C49B
- Key Length: 256
- Payload Transform
- Next Payload: Transform
- Reserved: 00
- Payload Length: 40
- Transform #: 3
- Transform-Id: KEY_IKE
- Reserved2: 0000
- Encryption Algorithm: AES-CBC
- Hash Algorithm: SHA1
- Group Description: Group 2
- Authentication Method: Preshared key
- Life Type: seconds
- Life Duration (Hex): 0020C49B
- Key Length: 256
- Payload Transform
- Next Payload: Transform
- Reserved: 00
- Payload Length: 40
- Transform #: 4
- Transform-Id: KEY_IKE
- Reserved2: 0000
- Encryption Algorithm: AES-CBC
- Hash Algorithm: MD5
- Group Description: Group 2
- Authentication Method: Preshared key
- Life Type: seconds
- Life Duration (Hex): 0020C49B
- Key Length: 256
- Payload Transform
- Next Payload: Transform
- Reserved: 00
- Payload Length: 40
- Transform #: 5
- Transform-Id: KEY_IKE
- Reserved2: 0000
- Encryption Algorithm: AES-CBC
- Hash Algorithm: SHA1
- Group Description: Group 2
- Authentication Method: XAUTHInitPreShared
- Life Type: seconds
- Life Duration (Hex): 0020C49B
- Key Length: 128
- Payload Transform
- Next Payload: Transform
- Reserved: 00
- Payload Length: 40
- Transform #: 6
- Transform-Id: KEY_IKE
- Reserved2: 0000
- Encryption Algorithm: AES-CBC
- Hash Algorithm: MD5
- Group Description: Group 2
- Authentication Method: XAUTHInitPreShared
- Life Type: seconds
- Life Duration (Hex): 0020C49B
- Key Length: 128
- Payload Transform
- Next Payload: Transform
- Reserved: 00
- Payload Length: 40
- Transform #: 7
- Transform-Id: KEY_IKE
- Reserved2: 0000
- Encryption Algorithm: AES-CBC
- Hash Algorithm: SHA1
- Group Description: Group 2
- Authentication Method: Preshared key
- Life Type: seconds
- Life Duration (Hex): 0020C49B
- Key Length: 128
- Payload Transform
- Next Payload: Transform
- Reserved: 00
- Payload Length: 40
- Transform #: 8
- Transform-Id: KEY_IKE
- Reserved2: 0000
- Encryption Algorithm: AES-CBC
- Hash Algorithm: MD5
- Group Description: Group 2
- Authentication Method: Preshared key
- Life Type: seconds
- Life Duration (Hex): 0020C49B
- Key Length: 128
- Payload Transform
- Next Payload: Transform
- Reserved: 00
- Payload Length: 36
- Transform #: 9
- Transform-Id: KEY_IKE
- Reserved2: 0000
- Encryption Algorithm: 3DES-CBC
- Hash Algorithm: SHA1
- Group Description: Group 2
- Authentication Method: XAUTHInitPreShared
- Life Type: seconds
- Life Duration (Hex): 0020C49B
- Payload Transform
- Next Payload: Transform
- Reserved: 00
- Payload Length: 36
- Transform #: 10
- Transform-Id: KEY_IKE
- Reserved2: 0000
- Encryption Algorithm: 3DES-CBC
- Hash Algorithm: MD5
- Group Description: Group 2
- Authentication Method: XAUTHInitPreShared
- Life Type: seconds
- Life Duration (Hex): 0020C49B
- Payload Transform
- Next Payload: Transform
- Reserved: 00
- Payload Length: 36
- Transform #: 11
- Transform-Id: KEY_IKE
- Reserved2: 0000
- Encryption Algorithm: 3DES-CBC
- Hash Algorithm: SHA1
- Group Description: Group 2
- Authentication Method: Preshared key
- Life Type: seconds
- Life Duration (Hex): 0020C49B
- Payload Transform
- Next Payload: Transform
- Reserved: 00
- Payload Length: 36
- Transform #: 12
- Transform-Id: KEY_IKE
- Reserved2: 0000
- Encryption Algorithm: 3DES-CBC
- Hash Algorithm: MD5
- Group Description: Group 2
- Authentication Method: Preshared key
- Life Type: seconds
- Life Duration (Hex): 0020C49B
- Payload Transform
- Next Payload: Transform
- Reserved: 00
- Payload Length: 36
- Transform #: 13
- Transform-Id: KEY_IKE
- Reserved2: 0000
- Encryption Algorithm: DES-CBC
- Hash Algorithm: MD5
- Group Description: Group 2
- Authentication Method: XAUTHInitPreShared
- Life Type: seconds
- Life Duration (Hex): 0020C49B
- Payload Transform
- Next Payload: None
- Reserved: 00
- Payload Length: 36
- Transform #: 14
- Transform-Id: KEY_IKE
- Reserved2: 0000
- Encryption Algorithm: DES-CBC
- Hash Algorithm: MD5
- Group Description: Group 2
- Authentication Method: Preshared key
- Life Type: seconds
- Life Duration (Hex): 0020C49B
- Payload Key Exchange
- Next Payload: Nonce
- Reserved: 00
- Payload Length: 132
- Data (In Hex): 0046E3C593E246571D524730250357A2816C74D27CC25253BA5C8125E9436A01B5AB039C4B88D0E7437BA4BEFF18EFE6043726AD1C2F29C08B5FCE9A90F4B12063997F12E5A0F81372F6E80A3355921677E76B6F594E12802B4E01C35A23C482DFF419AC131AA5A597AB7C010F5BA80D35692E08EE5103F2D28C14384B8745A3
- Payload Nonce
- Next Payload: Identification
- Reserved: 00
- Payload Length: 24
- Data (In Hex): CA71F1ABAA7679BFC6BA552FA915066E89A25DE5
- Payload Identification
- Next Payload: Vendor ID
- Reserved: 00
- Payload Length: 16
- ID Type: ID_KEY_ID
- Protocol ID(UDP/TCP, etc...): 17
- Port: 500
- ID Data: server_6
- Payload Vendor ID
- Next Payload: Vendor ID
- Reserved: 00
- Payload Length: 12
- Data (In Hex): 09002689DFD6B712
- Payload Vendor ID
- Next Payload: Vendor ID
- Reserved: 00
- Payload Length: 20
- Data (In Hex): AFCAD71368A1F1C96B8696FC77570100
- Payload Vendor ID
- Next Payload: Vendor ID
- Reserved: 00
- Payload Length: 24
- Data (In Hex): 4048B7D56EBCE88525E7DE7F00D6C2D380000000
- Payload Vendor ID
- Next Payload: None
- Reserved: 00
- Payload Length: 20
- Data (In Hex): 12F5F28C457168A9702D9FE274CC0100
- 26 17:38:32.417 12/06/2011 Sev=Debug/7 IKE/0x43000076
- NAV Trace->SA: I_Cookie=9DEC0371AE8D20EE R_Cookie=0000000000000000 CurState: AM_WAIT_MSG2 Event: EV_NO_EVENT
- 27 17:38:32.527 12/06/2011 Sev=Info/5 IKE/0x4300002F
- Received ISAKMP packet: peer = 188.254.221.8
- 28 17:38:32.527 12/06/2011 Sev=Info/4 IKE/0x43000014
- RECEIVING <<< ISAKMP OAK AG (SA, VID(Unity), VID(dpd), VID(?), VID(Xauth), KE, ID, NON, HASH) from 188.254.221.8
- 29 17:38:32.527 12/06/2011 Sev=Decode/11 IKE/0x43000001
- ISAKMP Header
- Initiator COOKIE: 9DEC0371AE8D20EE
- Responder COOKIE: 1EB46FBE28D7F5C2
- Next Payload: Security Association
- Ver (Hex): 10
- Exchange Type: Aggressive Mode
- Flags: (none)
- MessageID(Hex): 0
- Length: 348
- Payload Security Association
- Next Payload: Vendor ID
- Reserved: 00
- Payload Length: 56
- DOI: IPsec
- Situation: (SIT_IDENTITY_ONLY)
- Payload Proposal
- Next Payload: None
- Reserved: 00
- Payload Length: 44
- Proposal #: 1
- Protocol-Id: PROTO_ISAKMP
- SPI Size: 0
- # of transforms: 1
- Payload Transform
- Next Payload: None
- Reserved: 00
- Payload Length: 36
- Transform #: 1
- Transform-Id: KEY_IKE
- Reserved2: 0000
- Encryption Algorithm: 3DES-CBC
- Hash Algorithm: SHA1
- Group Description: Group 2
- Authentication Method: XAUTHInitPreShared
- Life Type: seconds
- Life Duration (Hex): 0020C49B
- Payload Vendor ID
- Next Payload: Vendor ID
- Reserved: 00
- Payload Length: 20
- Data (In Hex): 12F5F28C457168A9702D9FE274CC0100
- Payload Vendor ID
- Next Payload: Vendor ID
- Reserved: 00
- Payload Length: 20
- Data (In Hex): AFCAD71368A1F1C96B8696FC77570100
- Payload Vendor ID
- Next Payload: Vendor ID
- Reserved: 00
- Payload Length: 20
- Data (In Hex): EB73C8A328D6F5C211767B37DE584248
- Payload Vendor ID
- Next Payload: Key Exchange
- Reserved: 00
- Payload Length: 12
- Data (In Hex): 09002689DFD6B712
- Payload Key Exchange
- Next Payload: Identification
- Reserved: 00
- Payload Length: 132
- Data (In Hex): B695F61F5DEE3681E22E28CF81DF026989CCFB9024970D1994AB4F81C290D576DEDE1FA16957F4EC79416F82340DD614C703F23801A9363F07AA008BAA3CC0A073CB812ACD13955242DEB49EA15C35423870F83C654605884768A8C60EE8273E5601E5E41FF24D195A217830186CE2D9A2A7F175B74B94EE3E19EA20E016085D
- Payload Identification
- Next Payload: Nonce
- Reserved: 00
- Payload Length: 12
- ID Type: IPv4 Address
- Protocol ID(UDP/TCP, etc...): 0
- Port: 0
- ID Data: 192.168.1.130
- Payload Nonce
- Next Payload: Hash
- Reserved: 00
- Payload Length: 24
- Data (In Hex): 490DC488490AD041A0A05FFD7AADA8197976CC1D
- Payload Hash
- Next Payload: None
- Reserved: 00
- Payload Length: 24
- Data (In Hex): 0E98B22938F3F0E6908CC86DAA11D32FDC32DAEA
- 30 17:38:32.527 12/06/2011 Sev=Debug/7 IKE/0x43000076
- NAV Trace->SA: I_Cookie=9DEC0371AE8D20EE R_Cookie=1EB46FBE28D7F5C2 CurState: AM_WAIT_MSG2 Event: EV_RCVD_MSG
- 31 17:38:32.527 12/06/2011 Sev=Info/5 IKE/0x43000001
- Peer is a Cisco-Unity compliant peer
- 32 17:38:32.527 12/06/2011 Sev=Info/5 IKE/0x43000001
- Peer supports DPD
- 33 17:38:32.527 12/06/2011 Sev=Info/5 IKE/0x43000001
- Peer supports DWR Code Only
- 34 17:38:32.527 12/06/2011 Sev=Info/5 IKE/0x43000001
- Peer supports XAUTH
- 35 17:38:32.527 12/06/2011 Sev=Debug/7 IKE/0x43000076
- NAV Trace->SA: I_Cookie=9DEC0371AE8D20EE R_Cookie=1EB46FBE28D7F5C2 CurState: AM_WAIT_MSG2 Event: EV_GEN_SKEYID
- 36 17:38:32.530 12/06/2011 Sev=Debug/7 IKE/0x43000076
- NAV Trace->SA: I_Cookie=9DEC0371AE8D20EE R_Cookie=1EB46FBE28D7F5C2 CurState: AM_WAIT_MSG2 Event: EV_AUTHENTICATE_PEER
- 37 17:38:32.530 12/06/2011 Sev=Debug/7 IKE/0x43000076
- NAV Trace->SA: I_Cookie=9DEC0371AE8D20EE R_Cookie=1EB46FBE28D7F5C2 CurState: AM_WAIT_MSG2 Event: EV_ADJUST_PORT
- 38 17:38:32.530 12/06/2011 Sev=Debug/7 IKE/0x43000076
- NAV Trace->SA: I_Cookie=9DEC0371AE8D20EE R_Cookie=1EB46FBE28D7F5C2 CurState: AM_WAIT_MSG2 Event: EV_CRYPTO_ACTIVE
- 39 17:38:32.530 12/06/2011 Sev=Debug/7 IKE/0x43000076
- NAV Trace->SA: I_Cookie=9DEC0371AE8D20EE R_Cookie=1EB46FBE28D7F5C2 CurState: AM_SND_MSG3 Event: EV_BLD_MSG
- 40 17:38:32.530 12/06/2011 Sev=Debug/8 IKE/0x43000001
- IOS Vendor ID Contruction started
- 41 17:38:32.530 12/06/2011 Sev=Info/6 IKE/0x43000001
- IOS Vendor ID Contruction successful
- 42 17:38:32.530 12/06/2011 Sev=Debug/7 IKE/0x43000076
- NAV Trace->SA: I_Cookie=9DEC0371AE8D20EE R_Cookie=1EB46FBE28D7F5C2 CurState: AM_SND_MSG3 Event: EV_SND_MSG
- 43 17:38:32.530 12/06/2011 Sev=Info/4 IKE/0x43000013
- SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 188.254.221.8
- 44 17:38:32.530 12/06/2011 Sev=Decode/11 IKE/0x43000001
- ISAKMP Header
- Initiator COOKIE: 9DEC0371AE8D20EE
- Responder COOKIE: 1EB46FBE28D7F5C2
- Next Payload: Hash
- Ver (Hex): 10
- Exchange Type: Aggressive Mode
- Flags: (Encryption)
- MessageID(Hex): 0
- Length: 120
- Payload Hash
- Next Payload: Notification
- Reserved: 00
- Payload Length: 24
- Data (In Hex): 06C9B8A259B66CB82FF8148D95CA2D2015417A06
- Payload Notification
- Next Payload: Vendor ID
- Reserved: 00
- Payload Length: 28
- DOI: IPsec
- Protocol-ID: PROTO_ISAKMP
- Spi Size: 16
- Notify Type: STATUS_INITIAL_CONTACT
- SPI: 9DEC0371AE8D20EE1EB46FBE28D7F5C2
- Payload Vendor ID
- Next Payload: Vendor ID
- Reserved: 00
- Payload Length: 20
- Data (In Hex): 682BA46CAE8C20EEB0DF1FAB88F3603B
- Payload Vendor ID
- Next Payload: None
- Reserved: 00
- Payload Length: 20
- Data (In Hex): 12F5F28C457168A9702D9FE274CC0100
- 45 17:38:32.530 12/06/2011 Sev=Debug/7 IKE/0x43000076
- NAV Trace->SA: I_Cookie=9DEC0371AE8D20EE R_Cookie=1EB46FBE28D7F5C2 CurState: CMN_P1_CMPL Event: EV_P1_CMPL
- 46 17:38:32.530 12/06/2011 Sev=Info/4 IKE/0x43000083
- IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4
- 47 17:38:32.530 12/06/2011 Sev=Info/4 CM/0x4310000E
- Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system
- 48 17:38:32.530 12/06/2011 Sev=Debug/7 IKE/0x43000076
- NAV Trace->SA: I_Cookie=9DEC0371AE8D20EE R_Cookie=1EB46FBE28D7F5C2 CurState: CMN_P1_CMPL Event: EV_CHK_4REKEY
- 49 17:38:32.530 12/06/2011 Sev=Debug/7 IKE/0x43000076
- NAV Trace->SA: I_Cookie=9DEC0371AE8D20EE R_Cookie=1EB46FBE28D7F5C2 CurState: CMN_P1_CMPL Event: EV_CHK_4XAUTH
- 50 17:38:32.530 12/06/2011 Sev=Debug/7 IKE/0x43000076
- NAV Trace->SA: I_Cookie=9DEC0371AE8D20EE R_Cookie=1EB46FBE28D7F5C2 CurState: CMN_XAUTH_PROG Event: EV_INIT_XAUTH
- 51 17:38:32.530 12/06/2011 Sev=Debug/7 IKE/0x43000076
- NAV Trace->SA: I_Cookie=9DEC0371AE8D20EE R_Cookie=1EB46FBE28D7F5C2 CurState: CMN_XAUTH_PROG Event: EV_NO_EVENT
- 52 17:38:32.549 12/06/2011 Sev=Info/5 IKE/0x4300002F
- Received ISAKMP packet: peer = 188.254.221.8
- 53 17:38:32.549 12/06/2011 Sev=Info/4 IKE/0x43000014
- RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:STATUS_RESP_LIFETIME) from 188.254.221.8
- 54 17:38:32.549 12/06/2011 Sev=Decode/11 IKE/0x43000001
- ISAKMP Header
- Initiator COOKIE: 9DEC0371AE8D20EE
- Responder COOKIE: 1EB46FBE28D7F5C2
- Next Payload: Hash
- Ver (Hex): 10
- Exchange Type: Informational
- Flags: (Encryption)
- MessageID(Hex): 9F8F5F60
- Length: 100
- Payload Hash
- Next Payload: Notification
- Reserved: 00
- Payload Length: 24
- Data (In Hex): 939C98735ACDD579650FC2943403041E29F31304
- Payload Notification
- Next Payload: None
- Reserved: 00
- Payload Length: 40
- DOI: IPsec
- Protocol-ID: PROTO_ISAKMP
- Spi Size: 16
- Notify Type: STATUS_RESP_LIFETIME
- SPI: 9DEC0371AE8D20EE1EB46FBE28D7F5C2
- Data:
- Life Type: seconds
- Life Duration (Hex): 00015180
- 55 17:38:32.549 12/06/2011 Sev=Debug/7 IKE/0x43000076
- NAV Trace->SA: I_Cookie=9DEC0371AE8D20EE R_Cookie=1EB46FBE28D7F5C2 CurState: CMN_XAUTH_PROG Event: EV_RESET_LIFETIME
- 56 17:38:32.549 12/06/2011 Sev=Info/5 IKE/0x43000045
- RESPONDER-LIFETIME notify has value of 86400 seconds
- 57 17:38:32.549 12/06/2011 Sev=Info/5 IKE/0x43000047
- This SA has already been alive for 0 seconds, setting expiry to 86400 seconds from now
- 58 17:38:32.549 12/06/2011 Sev=Debug/7 IKE/0x43000076
- NAV Trace->SA: I_Cookie=9DEC0371AE8D20EE R_Cookie=1EB46FBE28D7F5C2 CurState: CMN_XAUTH_PROG Event: EV_NO_EVENT
- 59 17:38:32.554 12/06/2011 Sev=Info/5 IKE/0x4300002F
- Received ISAKMP packet: peer = 188.254.221.8
- 60 17:38:32.554 12/06/2011 Sev=Info/4 IKE/0x43000014
- RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 188.254.221.8
- 61 17:38:32.554 12/06/2011 Sev=Decode/11 IKE/0x43000001
- ISAKMP Header
- Initiator COOKIE: 9DEC0371AE8D20EE
- Responder COOKIE: 1EB46FBE28D7F5C2
- Next Payload: Hash
- Ver (Hex): 10
- Exchange Type: Transaction
- Flags: (Encryption)
- MessageID(Hex): EFF49E45
- Length: 76
- Payload Hash
- Next Payload: Attributes
- Reserved: 00
- Payload Length: 24
- Data (In Hex): 06A6DFAD04FC715FA8EFF283ECF8CFD2EBE70502
- Payload Attributes
- Next Payload: None
- Reserved: 00
- Payload Length: 16
- Type: ISAKMP_CFG_REQUEST
- Reserved: 00
- Identifier: 0000
- XAUTH User Name: (empty)
- XAUTH User Password: (empty)
- 62 17:38:32.554 12/06/2011 Sev=Debug/7 IKE/0x43000076
- NAV Trace->TM: MsgID=EFF49E45 CurState: TM_INITIAL Event: EV_RCVD_MSG
- 63 17:38:32.554 12/06/2011 Sev=Debug/7 IKE/0x43000076
- NAV Trace->TM: MsgID=EFF49E45 CurState: TM_PCS_XAUTH_REQ Event: EV_INIT_XAUTH
- 64 17:38:32.554 12/06/2011 Sev=Info/4 CM/0x43100015
- Launch xAuth application
- 65 17:38:32.554 12/06/2011 Sev=Debug/7 IKE/0x43000076
- NAV Trace->TM: MsgID=EFF49E45 CurState: TM_PCS_XAUTH_REQ Event: EV_START_RETRY_TMR
- 66 17:38:32.554 12/06/2011 Sev=Debug/7 IKE/0x43000076
- NAV Trace->TM: MsgID=EFF49E45 CurState: TM_WAIT_4USER Event: EV_NO_EVENT
- 67 17:38:37.560 12/06/2011 Sev=Info/4 CM/0x43100017
- xAuth application returned
- 68 17:38:37.560 12/06/2011 Sev=Debug/7 IKE/0x43000076
- NAV Trace->TM: MsgID=EFF49E45 CurState: TM_WAIT_4USER Event: EV_RCVD_USER_INPUT
- 69 17:38:37.560 12/06/2011 Sev=Debug/7 IKE/0x43000076
- NAV Trace->TM: MsgID=EFF49E45 CurState: TM_WAIT_4USER Event: EV_SND_MSG
- 70 17:38:37.560 12/06/2011 Sev=Info/4 IKE/0x43000013
- SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 188.254.221.8
- 71 17:38:37.560 12/06/2011 Sev=Decode/11 IKE/0x43000001
- ISAKMP Header
- Initiator COOKIE: 9DEC0371AE8D20EE
- Responder COOKIE: 1EB46FBE28D7F5C2
- Next Payload: Hash
- Ver (Hex): 10
- Exchange Type: Transaction
- Flags: (Encryption)
- MessageID(Hex): EFF49E45
- Length: 80
- Payload Hash
- Next Payload: Attributes
- Reserved: 00
- Payload Length: 24
- Data (In Hex): 6D49E9DA5DFB62F3744604A6899A919C5A3D7F03
- Payload Attributes
- Next Payload: None
- Reserved: 00
- Payload Length: 28
- Type: ISAKMP_CFG_REPLY
- Reserved: 00
- Identifier: 0000
- XAUTH User Name: (data not displayed)
- XAUTH User Password: (data not displayed)
- 72 17:38:37.560 12/06/2011 Sev=Debug/7 IKE/0x43000076
- NAV Trace->TM: MsgID=EFF49E45 CurState: TM_XAUTHREQ_DONE Event: EV_XAUTHREQ_DONE
- 73 17:38:37.560 12/06/2011 Sev=Debug/7 IKE/0x43000076
- NAV Trace->TM: MsgID=EFF49E45 CurState: TM_XAUTHREQ_DONE Event: EV_NO_EVENT
- 74 17:38:37.578 12/06/2011 Sev=Info/5 IKE/0x4300002F
- Received ISAKMP packet: peer = 188.254.221.8
- 75 17:38:37.578 12/06/2011 Sev=Info/4 IKE/0x43000014
- RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 188.254.221.8
- 76 17:38:37.578 12/06/2011 Sev=Decode/11 IKE/0x43000001
- ISAKMP Header
- Initiator COOKIE: 9DEC0371AE8D20EE
- Responder COOKIE: 1EB46FBE28D7F5C2
- Next Payload: Hash
- Ver (Hex): 10
- Exchange Type: Transaction
- Flags: (Encryption)
- MessageID(Hex): FC4BB999
- Length: 68
- Payload Hash
- Next Payload: Attributes
- Reserved: 00
- Payload Length: 24
- Data (In Hex): DB521247CA195F8C0E262971AF33A8EE3613D287
- Payload Attributes
- Next Payload: None
- Reserved: 00
- Payload Length: 12
- Type: ISAKMP_CFG_SET
- Reserved: 00
- Identifier: 0000
- XAUTH Status: Pass
- 77 17:38:37.578 12/06/2011 Sev=Debug/7 IKE/0x43000076
- NAV Trace->TM: MsgID=FC4BB999 CurState: TM_INITIAL Event: EV_RCVD_MSG
- 78 17:38:37.578 12/06/2011 Sev=Debug/7 IKE/0x43000076
- NAV Trace->TM: MsgID=FC4BB999 CurState: TM_PCS_XAUTH_SET Event: EV_INIT_XAUTH
- 79 17:38:37.578 12/06/2011 Sev=Debug/7 IKE/0x43000076
- NAV Trace->TM: MsgID=FC4BB999 CurState: TM_PCS_XAUTH_SET Event: EV_CHK_AUTH_RESULT
- 80 17:38:37.579 12/06/2011 Sev=Info/4 IKE/0x43000013
- SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 188.254.221.8
- 81 17:38:37.579 12/06/2011 Sev=Decode/11 IKE/0x43000001
- ISAKMP Header
- Initiator COOKIE: 9DEC0371AE8D20EE
- Responder COOKIE: 1EB46FBE28D7F5C2
- Next Payload: Hash
- Ver (Hex): 10
- Exchange Type: Transaction
- Flags: (Encryption)
- MessageID(Hex): FC4BB999
- Length: 60
- Payload Hash
- Next Payload: Attributes
- Reserved: 00
- Payload Length: 24
- Data (In Hex): 7CCF21043F0E6B787898033D368A92EE5CB317F1
- Payload Attributes
- Next Payload: None
- Reserved: 00
- Payload Length: 8
- Type: ISAKMP_CFG_ACK
- Reserved: 00
- Identifier: 0000
- 82 17:38:37.579 12/06/2011 Sev=Debug/7 IKE/0x43000076
- NAV Trace->TM: MsgID=FC4BB999 CurState: TM_XAUTH_DONE Event: EV_XAUTH_DONE_SUC
- 83 17:38:37.579 12/06/2011 Sev=Debug/7 IKE/0x43000076
- NAV Trace->TM: MsgID=FC4BB999 CurState: TM_XAUTH_DONE Event: EV_NO_EVENT
- 84 17:38:37.579 12/06/2011 Sev=Debug/7 IKE/0x43000076
- NAV Trace->TM: MsgID=EFF49E45 CurState: TM_XAUTHREQ_DONE Event: EV_TERM_REQUEST
- 85 17:38:37.579 12/06/2011 Sev=Debug/7 IKE/0x43000076
- NAV Trace->TM: MsgID=EFF49E45 CurState: TM_FREE Event: EV_REMOVE
- 86 17:38:37.579 12/06/2011 Sev=Debug/7 IKE/0x43000076
- NAV Trace->TM: MsgID=EFF49E45 CurState: TM_FREE Event: EV_NO_EVENT
- 87 17:38:37.579 12/06/2011 Sev=Debug/7 IKE/0x43000076
- NAV Trace->SA: I_Cookie=9DEC0371AE8D20EE R_Cookie=1EB46FBE28D7F5C2 CurState: CMN_XAUTH_PROG Event: EV_XAUTH_DONE_SUC
- 88 17:38:37.579 12/06/2011 Sev=Info/4 CM/0x4310000E
- Established Phase 1 SA. 1 Crypto Active IKE SA, 1 User Authenticated IKE SA in the system
- 89 17:38:37.579 12/06/2011 Sev=Debug/8 IKE/0x4300004C
- Starting DPD timer for IKE SA (I_Cookie=9DEC0371AE8D20EE R_Cookie=1EB46FBE28D7F5C2) sa->state = 1, sa->dpd.worry_freq(mSec) = 5000
- 90 17:38:37.579 12/06/2011 Sev=Debug/7 IKE/0x43000076
- NAV Trace->SA: I_Cookie=9DEC0371AE8D20EE R_Cookie=1EB46FBE28D7F5C2 CurState: CMN_MODECFG_PROG Event: EV_INIT_MODECFG
- 91 17:38:37.579 12/06/2011 Sev=Debug/7 IKE/0x43000076
- NAV Trace->SA: I_Cookie=9DEC0371AE8D20EE R_Cookie=1EB46FBE28D7F5C2 CurState: CMN_MODECFG_PROG Event: EV_NO_EVENT
- 92 17:38:37.579 12/06/2011 Sev=Debug/7 IKE/0x43000076
- NAV Trace->TM: MsgID=4AB8E37F CurState: TM_INITIAL Event: EV_INIT_MODECFG
- 93 17:38:37.579 12/06/2011 Sev=Debug/7 IKE/0x43000076
- NAV Trace->TM: MsgID=4AB8E37F CurState: TM_SND_MODECFGREQ Event: EV_START_RETRY_TMR
- 94 17:38:37.579 12/06/2011 Sev=Debug/7 IKE/0x43000076
- NAV Trace->TM: MsgID=4AB8E37F CurState: TM_SND_MODECFGREQ Event: EV_SND_MSG
- 95 17:38:37.579 12/06/2011 Sev=Info/4 IKE/0x43000013
- SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 188.254.221.8
- 96 17:38:37.579 12/06/2011 Sev=Decode/11 IKE/0x43000001
- ISAKMP Header
- Initiator COOKIE: 9DEC0371AE8D20EE
- Responder COOKIE: 1EB46FBE28D7F5C2
- Next Payload: Hash
- Ver (Hex): 10
- Exchange Type: Transaction
- Flags: (Encryption)
- MessageID(Hex): 4AB8E37F
- Length: 182
- Payload Hash
- Next Payload: Attributes
- Reserved: 00
- Payload Length: 24
- Data (In Hex): F2129C67816B4FC40C775795AB29665877C445E2
- Payload Attributes
- Next Payload: None
- Reserved: 00
- Payload Length: 130
- Type: ISAKMP_CFG_REQUEST
- Reserved: 00
- Identifier: 0000
- IPv4 Address: (empty)
- IPv4 Netmask: (empty)
- IPv4 DNS: (empty)
- IPv4 NBNS (WINS): (empty)
- Address Expiry: (empty)
- Cisco extension: Banner: (empty)
- Cisco extension: Save PWD: (empty)
- Cisco extension: Default Domain Name: (empty)
- Cisco extension: Split Include: (empty)
- Cisco extension: Split DNS Name: (empty)
- Cisco extension: Do PFS: (empty)
- Cisco extension: Backup Servers: (empty)
- Cisco extension: Smart Card Removal Disconnect: (empty)
- Application Version: Cisco Systems VPN Client 4.8.01 (0640):Linux
- Cisco extension: Firewall Type: (empty)
- Cisco extension: Dynamic DNS Hostname: Testserver
- Cisco extension: Include Local LAN: (empty)
- 97 17:38:37.579 12/06/2011 Sev=Debug/7 IKE/0x43000076
- NAV Trace->TM: MsgID=4AB8E37F CurState: TM_WAIT_MODECFGREPLY Event: EV_NO_EVENT
- 98 17:38:43.578 12/06/2011 Sev=Debug/7 IKE/0x43000076
- NAV Trace->TM: MsgID=4AB8E37F CurState: TM_WAIT_MODECFGREPLY Event: EV_RETRY_TMO
- 99 17:38:43.578 12/06/2011 Sev=Debug/7 IKE/0x43000076
- NAV Trace->TM: MsgID=4AB8E37F CurState: TM_SND_MODECFGREQ Event: EV_RESEND
- 100 17:38:43.578 12/06/2011 Sev=Debug/7 IKE/0x43000076
- NAV Trace->TM: MsgID=4AB8E37F CurState: TM_SND_MODECFGREQ Event: EV_START_RETRY_TMR
- 101 17:38:43.578 12/06/2011 Sev=Debug/7 IKE/0x43000076
- NAV Trace->TM: MsgID=4AB8E37F CurState: TM_SND_MODECFGREQ Event: EV_SND_MSG
- 102 17:38:43.578 12/06/2011 Sev=Info/4 IKE/0x43000021
- Retransmitting last packet!
- 103 17:38:43.578 12/06/2011 Sev=Info/4 IKE/0x43000013
- SENDING >>> ISAKMP OAK TRANS *(Retransmission) to 188.254.221.8
- 104 17:38:43.578 12/06/2011 Sev=Debug/7 IKE/0x43000076
- NAV Trace->TM: MsgID=4AB8E37F CurState: TM_WAIT_MODECFGREPLY Event: EV_NO_EVENT
- 105 17:38:44.093 12/06/2011 Sev=Info/5 IKE/0x4300002F
- Received ISAKMP packet: peer = 188.254.221.8
- 106 17:38:44.093 12/06/2011 Sev=Info/4 IKE/0x43000014
- RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 188.254.221.8
- 107 17:38:44.093 12/06/2011 Sev=Decode/11 IKE/0x43000001
- ISAKMP Header
- Initiator COOKIE: 9DEC0371AE8D20EE
- Responder COOKIE: 1EB46FBE28D7F5C2
- Next Payload: Hash
- Ver (Hex): 10
- Exchange Type: Transaction
- Flags: (Encryption)
- MessageID(Hex): 4AB8E37F
- Length: 372
- Payload Hash
- Next Payload: Attributes
- Reserved: 00
- Payload Length: 24
- Data (In Hex): C86371C8CE1CE4AC8D73C1A807299A45A1774517
- Payload Attributes
- Next Payload: None
- Reserved: 00
- Payload Length: 315
- Type: ISAKMP_CFG_REPLY
- Reserved: 00
- Identifier: 0000
- IPv4 Address: 10.10.10.6
- IPv4 Netmask: 255.255.255.0
- IPv4 DNS: 8.8.8.8
- Address Expiry: 2052129024
- Cisco extension: Save PWD: No
- Cisco extension: Default Domain Name: cisco.com
- Cisco extension: Split DNS Name: (empty)
- Cisco extension: Smart Card Removal Disconnect: No
- Application Version: Cisco IOS Software, 1841 Software (C1841-ADVENTERPRISEK9-M), Version 15.1(4)M, RELEASE SOFTWARE (fc1)
- Technical Support: http://www.cisco.com/techsupport
- Copyright (c) 1986-2011 by Cisco Systems, Inc.
- Compiled Thu 24-Mar-11 13:12 by prod_rel_team
- 108 17:38:44.093 12/06/2011 Sev=Debug/7 IKE/0x43000076
- NAV Trace->TM: MsgID=4AB8E37F CurState: TM_WAIT_MODECFGREPLY Event: EV_RCVD_MSG
- 109 17:38:44.093 12/06/2011 Sev=Info/5 IKE/0x43000010
- MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_ADDRESS: , value = 10.10.10.6
- 110 17:38:44.093 12/06/2011 Sev=Info/5 IKE/0x43000010
- MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NETMASK: , value = 255.255.255.0
- 111 17:38:44.093 12/06/2011 Sev=Info/5 IKE/0x43000010
- MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_DNS(1): , value = 8.8.8.8
- 112 17:38:44.093 12/06/2011 Sev=Info/5 IKE/0x83000017
- MODE_CFG_REPLY: The received (INTERNAL_ADDRESS_EXPIRY) attribute and value (134744072) is not supported
- 113 17:38:44.093 12/06/2011 Sev=Info/5 IKE/0x4300000D
- MODE_CFG_REPLY: Attribute = MODECFG_UNITY_SAVEPWD: , value = 0x00000000
- 114 17:38:44.093 12/06/2011 Sev=Info/5 IKE/0x4300000E
- MODE_CFG_REPLY: Attribute = MODECFG_UNITY_DEFDOMAIN: , value = cisco.com
- 115 17:38:44.093 12/06/2011 Sev=Info/5 IKE/0x83000015
- MODE_CFG_REPLY: Received MODECFG_UNITY_SPLITDNS_NAME attribute with no data
- 116 17:38:44.093 12/06/2011 Sev=Info/5 IKE/0x4300000D
- MODE_CFG_REPLY: Attribute = MODECFG_UNITY_SMARTCARD_REMOVAL_DISCONNECT: , value = 0x00000000
- 117 17:38:44.093 12/06/2011 Sev=Info/5 IKE/0x4300000E
- MODE_CFG_REPLY: Attribute = APPLICATION_VERSION, value = Cisco IOS Software, 1841 Software (C1841-ADVENTERPRISEK9-M), Version 15.1(4)M, RELEASE SOFTWARE (fc1)
- Technical Support: http://www.cisco.com/techsupport
- Copyright (c) 1986-2011 by Cisco Systems, Inc.
- Compiled Thu 24-Mar-11 13:12 by prod_rel_team
- 118 17:38:44.093 12/06/2011 Sev=Debug/7 IKE/0x43000076
- NAV Trace->TM: MsgID=4AB8E37F CurState: TM_MODECFG_DONE Event: EV_MODECFG_DONE_SUC
- 119 17:38:44.093 12/06/2011 Sev=Debug/7 IKE/0x43000076
- NAV Trace->TM: MsgID=4AB8E37F CurState: TM_MODECFG_DONE Event: EV_NO_EVENT
- 120 17:38:44.093 12/06/2011 Sev=Debug/7 IKE/0x43000076
- NAV Trace->SA: I_Cookie=9DEC0371AE8D20EE R_Cookie=1EB46FBE28D7F5C2 CurState: CMN_MODECFG_PROG Event: EV_MODECFG_DONE_SUC
- 121 17:38:44.093 12/06/2011 Sev=Info/4 CM/0x43100019
- Mode Config data received
- 122 17:38:44.094 12/06/2011 Sev=Debug/7 IKE/0x43000015
- intf_data: lcl=0x0DCB0F0A, mask=0x00F8FFFF, bcast=0xFFCF0F0A, bcast_vra=0xFF0A0A0A
- 123 17:38:44.094 12/06/2011 Sev=Debug/7 IKE/0x43000076
- NAV Trace->SA: I_Cookie=9DEC0371AE8D20EE R_Cookie=1EB46FBE28D7F5C2 CurState: CMN_MODECFG_PROG Event: EV_INIT_P2
- 124 17:38:44.094 12/06/2011 Sev=Info/4 IKE/0x43000056
- Received a key request from Driver: Local IP = 10.10.10.6, GW IP = 188.254.221.8, Remote IP = 0.0.0.0
- 125 17:38:44.094 12/06/2011 Sev=Debug/7 IKE/0x43000076
- NAV Trace->SA: I_Cookie=9DEC0371AE8D20EE R_Cookie=1EB46FBE28D7F5C2 CurState: CMN_ACTIVE Event: EV_NO_EVENT
- 126 17:38:44.094 12/06/2011 Sev=Debug/7 IKE/0x43000076
- NAV Trace->QM: MsgID=10B173CC CurState: QM_INITIAL Event: EV_INITIATOR
- 127 17:38:44.094 12/06/2011 Sev=Debug/7 IKE/0x43000076
- NAV Trace->QM: MsgID=10B173CC CurState: QM_BLD_MSG1 Event: EV_CHK_PFS
- 128 17:38:44.094 12/06/2011 Sev=Debug/7 IKE/0x43000076
- NAV Trace->QM: MsgID=10B173CC CurState: QM_BLD_MSG1 Event: EV_BLD_MSG
- 129 17:38:44.094 12/06/2011 Sev=Debug/7 IKE/0x43000076
- NAV Trace->QM: MsgID=10B173CC CurState: QM_SND_MSG1 Event: EV_START_RETRY_TMR
- 130 17:38:44.094 12/06/2011 Sev=Debug/7 IKE/0x43000076
- NAV Trace->QM: MsgID=10B173CC CurState: QM_SND_MSG1 Event: EV_SND_MSG
- 131 17:38:44.095 12/06/2011 Sev=Info/4 IKE/0x43000013
- SENDING >>> ISAKMP OAK QM *(HASH, SA, NON, ID, ID) to 188.254.221.8
- 132 17:38:44.095 12/06/2011 Sev=Decode/11 IKE/0x43000001
- ISAKMP Header
- Initiator COOKIE: 9DEC0371AE8D20EE
- Responder COOKIE: 1EB46FBE28D7F5C2
- Next Payload: Hash
- Ver (Hex): 10
- Exchange Type: Quick Mode
- Flags: (Encryption)
- MessageID(Hex): 10B173CC
- Length: 1026
- Payload Hash
- Next Payload: Security Association
- Reserved: 00
- Payload Length: 24
- Data (In Hex): B850FB5EF7D9D2F8836E2213294A08834F97A30D
- Payload Security Association
- Next Payload: Nonce
- Reserved: 00
- Payload Length: 922
- DOI: IPsec
- Situation: (SIT_IDENTITY_ONLY)
- Payload Proposal
- Next Payload: Proposal
- Reserved: 00
- Payload Length: 44
- Proposal #: 1
- Protocol-Id: PROTO_IPSEC_ESP
- SPI Size: 4
- # of transforms: 1
- SPI: 23C491EC
- Payload Transform
- Next Payload: None
- Reserved: 00
- Payload Length: 32
- Transform #: 1
- Transform-Id: ESP_AES
- Reserved2: 0000
- Authentication Algorithm: MD5
- Key Length: 256
- Encapsulation Mode: Tunnel
- Life Type: Seconds
- Life Duration (Hex): 0020C49B
- Payload Proposal
- Next Payload: Proposal
- Reserved: 00
- Payload Length: 34
- Proposal #: 1
- Protocol-Id: PROTO_IPCOMP
- SPI Size: 2
- # of transforms: 1
- SPI: 3B6B
- Payload Transform
- Next Payload: None
- Reserved: 00
- Payload Length: 24
- Transform #: 1
- Transform-Id: IPCOMP_LZS
- Reserved2: 0000
- Encapsulation Mode: Tunnel
- Life Type: Seconds
- Life Duration (Hex): 0020C49B
- Payload Proposal
- Next Payload: Proposal
- Reserved: 00
- Payload Length: 44
- Proposal #: 2
- Protocol-Id: PROTO_IPSEC_ESP
- SPI Size: 4
- # of transforms: 1
- SPI: 23C491EC
- Payload Transform
- Next Payload: None
- Reserved: 00
- Payload Length: 32
- Transform #: 1
- Transform-Id: ESP_AES
- Reserved2: 0000
- Authentication Algorithm: SHA1
- Key Length: 256
- Encapsulation Mode: Tunnel
- Life Type: Seconds
- Life Duration (Hex): 0020C49B
- Payload Proposal
- Next Payload: Proposal
- Reserved: 00
- Payload Length: 34
- Proposal #: 2
- Protocol-Id: PROTO_IPCOMP
- SPI Size: 2
- # of transforms: 1
- SPI: 8AD2
- Payload Transform
- Next Payload: None
- Reserved: 00
- Payload Length: 24
- Transform #: 1
- Transform-Id: IPCOMP_LZS
- Reserved2: 0000
- Encapsulation Mode: Tunnel
- Life Type: Seconds
- Life Duration (Hex): 0020C49B
- Payload Proposal
- Next Payload: Proposal
- Reserved: 00
- Payload Length: 44
- Proposal #: 3
- Protocol-Id: PROTO_IPSEC_ESP
- SPI Size: 4
- # of transforms: 1
- SPI: 23C491EC
- Payload Transform
- Next Payload: None
- Reserved: 00
- Payload Length: 32
- Transform #: 1
- Transform-Id: ESP_AES
- Reserved2: 0000
- Authentication Algorithm: MD5
- Key Length: 128
- Encapsulation Mode: Tunnel
- Life Type: Seconds
- Life Duration (Hex): 0020C49B
- Payload Proposal
- Next Payload: Proposal
- Reserved: 00
- Payload Length: 34
- Proposal #: 3
- Protocol-Id: PROTO_IPCOMP
- SPI Size: 2
- # of transforms: 1
- SPI: 5AE1
- Payload Transform
- Next Payload: None
- Reserved: 00
- Payload Length: 24
- Transform #: 1
- Transform-Id: IPCOMP_LZS
- Reserved2: 0000
- Encapsulation Mode: Tunnel
- Life Type: Seconds
- Life Duration (Hex): 0020C49B
- Payload Proposal
- Next Payload: Proposal
- Reserved: 00
- Payload Length: 44
- Proposal #: 4
- Protocol-Id: PROTO_IPSEC_ESP
- SPI Size: 4
- # of transforms: 1
- SPI: 23C491EC
- Payload Transform
- Next Payload: None
- Reserved: 00
- Payload Length: 32
- Transform #: 1
- Transform-Id: ESP_AES
- Reserved2: 0000
- Authentication Algorithm: SHA1
- Key Length: 128
- Encapsulation Mode: Tunnel
- Life Type: Seconds
- Life Duration (Hex): 0020C49B
- Payload Proposal
- Next Payload: Proposal
- Reserved: 00
- Payload Length: 34
- Proposal #: 4
- Protocol-Id: PROTO_IPCOMP
- SPI Size: 2
- # of transforms: 1
- SPI: 9599
- Payload Transform
- Next Payload: None
- Reserved: 00
- Payload Length: 24
- Transform #: 1
- Transform-Id: IPCOMP_LZS
- Reserved2: 0000
- Encapsulation Mode: Tunnel
- Life Type: Seconds
- Life Duration (Hex): 0020C49B
- Payload Proposal
- Next Payload: Proposal
- Reserved: 00
- Payload Length: 44
- Proposal #: 5
- Protocol-Id: PROTO_IPSEC_ESP
- SPI Size: 4
- # of transforms: 1
- SPI: 23C491EC
- Payload Transform
- Next Payload: None
- Reserved: 00
- Payload Length: 32
- Transform #: 1
- Transform-Id: ESP_AES
- Reserved2: 0000
- Authentication Algorithm: MD5
- Key Length: 256
- Encapsulation Mode: Tunnel
- Life Type: Seconds
- Life Duration (Hex): 0020C49B
- Payload Proposal
- Next Payload: Proposal
- Reserved: 00
- Payload Length: 44
- Proposal #: 6
- Protocol-Id: PROTO_IPSEC_ESP
- SPI Size: 4
- # of transforms: 1
- SPI: 23C491EC
- Payload Transform
- Next Payload: None
- Reserved: 00
- Payload Length: 32
- Transform #: 1
- Transform-Id: ESP_AES
- Reserved2: 0000
- Authentication Algorithm: SHA1
- Key Length: 256
- Encapsulation Mode: Tunnel
- Life Type: Seconds
- Life Duration (Hex): 0020C49B
- Payload Proposal
- Next Payload: Proposal
- Reserved: 00
- Payload Length: 44
- Proposal #: 7
- Protocol-Id: PROTO_IPSEC_ESP
- SPI Size: 4
- # of transforms: 1
- SPI: 23C491EC
- Payload Transform
- Next Payload: None
- Reserved: 00
- Payload Length: 32
- Transform #: 1
- Transform-Id: ESP_AES
- Reserved2: 0000
- Authentication Algorithm: MD5
- Key Length: 128
- Encapsulation Mode: Tunnel
- Life Type: Seconds
- Life Duration (Hex): 0020C49B
- Payload Proposal
- Next Payload: Proposal
- Reserved: 00
- Payload Length: 44
- Proposal #: 8
- Protocol-Id: PROTO_IPSEC_ESP
- SPI Size: 4
- # of transforms: 1
- SPI: 23C491EC
- Payload Transform
- Next Payload: None
- Reserved: 00
- Payload Length: 32
- Transform #: 1
- Transform-Id: ESP_AES
- Reserved2: 0000
- Authentication Algorithm: SHA1
- Key Length: 128
- Encapsulation Mode: Tunnel
- Life Type: Seconds
- Life Duration (Hex): 0020C49B
- Payload Proposal
- Next Payload: Proposal
- Reserved: 00
- Payload Length: 40
- Proposal #: 9
- Protocol-Id: PROTO_IPSEC_ESP
- SPI Size: 4
- # of transforms: 1
- SPI: 23C491EC
- Payload Transform
- Next Payload: None
- Reserved: 00
- Payload Length: 28
- Transform #: 1
- Transform-Id: ESP_3DES
- Reserved2: 0000
- Authentication Algorithm: MD5
- Encapsulation Mode: Tunnel
- Life Type: Seconds
- Life Duration (Hex): 0020C49B
- Payload Proposal
- Next Payload: Proposal
- Reserved: 00
- Payload Length: 34
- Proposal #: 9
- Protocol-Id: PROTO_IPCOMP
- SPI Size: 2
- # of transforms: 1
- SPI: 539F
- Payload Transform
- Next Payload: None
- Reserved: 00
- Payload Length: 24
- Transform #: 1
- Transform-Id: IPCOMP_LZS
- Reserved2: 0000
- Encapsulation Mode: Tunnel
- Life Type: Seconds
- Life Duration (Hex): 0020C49B
- Payload Proposal
- Next Payload: Proposal
- Reserved: 00
- Payload Length: 40
- Proposal #: 10
- Protocol-Id: PROTO_IPSEC_ESP
- SPI Size: 4
- # of transforms: 1
- SPI: 23C491EC
- Payload Transform
- Next Payload: None
- Reserved: 00
- Payload Length: 28
- Transform #: 1
- Transform-Id: ESP_3DES
- Reserved2: 0000
- Authentication Algorithm: SHA1
- Encapsulation Mode: Tunnel
- Life Type: Seconds
- Life Duration (Hex): 0020C49B
- Payload Proposal
- Next Payload: Proposal
- Reserved: 00
- Payload Length: 34
- Proposal #: 10
- Protocol-Id: PROTO_IPCOMP
- SPI Size: 2
- # of transforms: 1
- SPI: 5DF3
- Payload Transform
- Next Payload: None
- Reserved: 00
- Payload Length: 24
- Transform #: 1
- Transform-Id: IPCOMP_LZS
- Reserved2: 0000
- Encapsulation Mode: Tunnel
- Life Type: Seconds
- Life Duration (Hex): 0020C49B
- Payload Proposal
- Next Payload: Proposal
- Reserved: 00
- Payload Length: 40
- Proposal #: 11
- Protocol-Id: PROTO_IPSEC_ESP
- SPI Size: 4
- # of transforms: 1
- SPI: 23C491EC
- Payload Transform
- Next Payload: None
- Reserved: 00
- Payload Length: 28
- Transform #: 1
- Transform-Id: ESP_3DES
- Reserved2: 0000
- Authentication Algorithm: MD5
- Encapsulation Mode: Tunnel
- Life Type: Seconds
- Life Duration (Hex): 0020C49B
- Payload Proposal
- Next Payload: Proposal
- Reserved: 00
- Payload Length: 40
- Proposal #: 12
- Protocol-Id: PROTO_IPSEC_ESP
- SPI Size: 4
- # of transforms: 1
- SPI: 23C491EC
- Payload Transform
- Next Payload: None
- Reserved: 00
- Payload Length: 28
- Transform #: 1
- Transform-Id: ESP_3DES
- Reserved2: 0000
- Authentication Algorithm: SHA1
- Encapsulation Mode: Tunnel
- Life Type: Seconds
- Life Duration (Hex): 0020C49B
- Payload Proposal
- Next Payload: Proposal
- Reserved: 00
- Payload Length: 40
- Proposal #: 13
- Protocol-Id: PROTO_IPSEC_ESP
- SPI Size: 4
- # of transforms: 1
- SPI: 23C491EC
- Payload Transform
- Next Payload: None
- Reserved: 00
- Payload Length: 28
- Transform #: 1
- Transform-Id: ESP_DES
- Reserved2: 0000
- Authentication Algorithm: MD5
- Encapsulation Mode: Tunnel
- Life Type: Seconds
- Life Duration (Hex): 0020C49B
- Payload Proposal
- Next Payload: Proposal
- Reserved: 00
- Payload Length: 34
- Proposal #: 13
- Protocol-Id: PROTO_IPCOMP
- SPI Size: 2
- # of transforms: 1
- SPI: 2DF5
- Payload Transform
- Next Payload: None
- Reserved: 00
- Payload Length: 24
- Transform #: 1
- Transform-Id: IPCOMP_LZS
- Reserved2: 0000
- Encapsulation Mode: Tunnel
- Life Type: Seconds
- Life Duration (Hex): 0020C49B
- Payload Proposal
- Next Payload: Proposal
- Reserved: 00
- Payload Length: 40
- Proposal #: 14
- Protocol-Id: PROTO_IPSEC_ESP
- SPI Size: 4
- # of transforms: 1
- SPI: 23C491EC
- Payload Transform
- Next Payload: None
- Reserved: 00
- Payload Length: 28
- Transform #: 1
- Transform-Id: ESP_DES
- Reserved2: 0000
- Authentication Algorithm: MD5
- Encapsulation Mode: Tunnel
- Life Type: Seconds
- Life Duration (Hex): 0020C49B
- Payload Proposal
- Next Payload: Proposal
- Reserved: 00
- Payload Length: 40
- Proposal #: 15
- Protocol-Id: PROTO_IPSEC_ESP
- SPI Size: 4
- # of transforms: 1
- SPI: 23C491EC
- Payload Transform
- Next Payload: None
- Reserved: 00
- Payload Length: 28
- Transform #: 1
- Transform-Id: ESP_NULL
- Reserved2: 0000
- Authentication Algorithm: MD5
- Encapsulation Mode: Tunnel
- Life Type: Seconds
- Life Duration (Hex): 0020C49B
- Payload Proposal
- Next Payload: None
- Reserved: 00
- Payload Length: 40
- Proposal #: 16
- Protocol-Id: PROTO_IPSEC_ESP
- SPI Size: 4
- # of transforms: 1
- SPI: 23C491EC
- Payload Transform
- Next Payload: None
- Reserved: 00
- Payload Length: 28
- Transform #: 1
- Transform-Id: ESP_NULL
- Reserved2: 0000
- Authentication Algorithm: SHA1
- Encapsulation Mode: Tunnel
- Life Type: Seconds
- Life Duration (Hex): 0020C49B
- Payload Nonce
- Next Payload: Identification
- Reserved: 00
- Payload Length: 24
- Data (In Hex): 85E50771BF50C082786F12AFEEC3F41E7FAB2E59
- Payload Identification
- Next Payload: Identification
- Reserved: 00
- Payload Length: 12
- ID Type: IPv4 Address
- Protocol ID(UDP/TCP, etc...): 0
- Port: 0
- ID Data: 10.10.10.6
- Payload Identification
- Next Payload: None
- Reserved: 00
- Payload Length: 16
- ID Type: IPv4 Subnet
- Protocol ID(UDP/TCP, etc...): 0
- Port: 0
- ID Data: /0.0.0.0
- 133 17:38:44.095 12/06/2011 Sev=Debug/7 IKE/0x43000076
- NAV Trace->QM: MsgID=10B173CC CurState: QM_WAIT_MSG2 Event: EV_NO_EVENT
- 134 17:38:44.152 12/06/2011 Sev=Info/5 IKE/0x4300002F
- Received ISAKMP packet: peer = 188.254.221.8
- 135 17:38:44.152 12/06/2011 Sev=Info/4 IKE/0x43000014
- RECEIVING <<< ISAKMP OAK QM *(HASH, SA, NON, ID, ID, NOTIFY:STATUS_RESP_LIFETIME) from 188.254.221.8
- 136 17:38:44.152 12/06/2011 Sev=Decode/11 IKE/0x43000001
- ISAKMP Header
- Initiator COOKIE: 9DEC0371AE8D20EE
- Responder COOKIE: 1EB46FBE28D7F5C2
- Next Payload: Hash
- Ver (Hex): 10
- Exchange Type: Quick Mode
- Flags: (Encryption)
- MessageID(Hex): 10B173CC
- Length: 204
- Payload Hash
- Next Payload: Security Association
- Reserved: 00
- Payload Length: 24
- Data (In Hex): 4527D7434FD0D4AABC806FBA6618B318D32AF8A3
- Payload Security Association
- Next Payload: Nonce
- Reserved: 00
- Payload Length: 52
- DOI: IPsec
- Situation: (SIT_IDENTITY_ONLY)
- Payload Proposal
- Next Payload: None
- Reserved: 00
- Payload Length: 40
- Proposal #: 1
- Protocol-Id: PROTO_IPSEC_ESP
- SPI Size: 4
- # of transforms: 1
- SPI: 6BA867B6
- Payload Transform
- Next Payload: None
- Reserved: 00
- Payload Length: 28
- Transform #: 1
- Transform-Id: ESP_3DES
- Reserved2: 0000
- Encapsulation Mode: Tunnel
- Life Type: Seconds
- Life Duration (Hex): 0020C49B
- Authentication Algorithm: SHA1
- Payload Nonce
- Next Payload: Identification
- Reserved: 00
- Payload Length: 24
- Data (In Hex): 13686D9318AFBED785BECD92DEF5C7102A61CF9B
- Payload Identification
- Next Payload: Identification
- Reserved: 00
- Payload Length: 12
- ID Type: IPv4 Address
- Protocol ID(UDP/TCP, etc...): 0
- Port: 0
- ID Data: 10.10.10.6
- Payload Identification
- Next Payload: Notification
- Reserved: 00
- Payload Length: 16
- ID Type: IPv4 Subnet
- Protocol ID(UDP/TCP, etc...): 0
- Port: 0
- ID Data: /0.0.0.0
- Payload Notification
- Next Payload: None
- Reserved: 00
- Payload Length: 40
- DOI: IPsec
- Protocol-ID: PROTO_IPSEC_ESP
- Spi Size: 4
- Notify Type: STATUS_RESP_LIFETIME
- SPI: 6BA867B6
- Data:
- Life Type: Seconds
- Life Duration (Hex): 00000E10
- Life Type: Kilobytes
- Life Duration (Hex): 00465000
- 137 17:38:44.152 12/06/2011 Sev=Debug/7 IKE/0x43000076
- NAV Trace->QM: MsgID=10B173CC CurState: QM_WAIT_MSG2 Event: EV_RCVD_MSG
- 138 17:38:44.152 12/06/2011 Sev=Info/5 IKE/0x43000045
- RESPONDER-LIFETIME notify has value of 3600 seconds
- 139 17:38:44.152 12/06/2011 Sev=Info/5 IKE/0x43000046
- RESPONDER-LIFETIME notify has value of 4608000 kb
- 140 17:38:44.152 12/06/2011 Sev=Debug/7 IKE/0x43000076
- NAV Trace->QM: MsgID=10B173CC CurState: QM_WAIT_MSG2 Event: EV_CHK_PFS
- 141 17:38:44.152 12/06/2011 Sev=Debug/7 IKE/0x43000076
- NAV Trace->QM: MsgID=10B173CC CurState: QM_BLD_MSG3 Event: EV_BLD_MSG
- 142 17:38:44.152 12/06/2011 Sev=Debug/7 IKE/0x43000076
- NAV Trace->QM: MsgID=10B173CC CurState: QM_BLD_MSG3 Event: EV_CHK_WAIT4MSG4
- 143 17:38:44.152 12/06/2011 Sev=Debug/7 IKE/0x43000076
- NAV Trace->QM: MsgID=10B173CC CurState: QM_SND_MSG3 Event: EV_SND_MSG
- 144 17:38:44.152 12/06/2011 Sev=Info/4 IKE/0x43000013
- SENDING >>> ISAKMP OAK QM *(HASH) to 188.254.221.8
- 145 17:38:44.152 12/06/2011 Sev=Decode/11 IKE/0x43000001
- ISAKMP Header
- Initiator COOKIE: 9DEC0371AE8D20EE
- Responder COOKIE: 1EB46FBE28D7F5C2
- Next Payload: Hash
- Ver (Hex): 10
- Exchange Type: Quick Mode
- Flags: (Encryption)
- MessageID(Hex): 10B173CC
- Length: 52
- Payload Hash
- Next Payload: None
- Reserved: 00
- Payload Length: 24
- Data (In Hex): 32F36E8CB899BEFF82EFE21B1961363B832D6670
- 146 17:38:44.152 12/06/2011 Sev=Debug/7 IKE/0x43000076
- NAV Trace->QM: MsgID=10B173CC CurState: QM_SND_MSG3 Event: EV_CHK_WAIT4MSG4
- 147 17:38:44.152 12/06/2011 Sev=Debug/7 IKE/0x43000076
- NAV Trace->QM: MsgID=10B173CC CurState: QM_P2_CMPL Event: EV_GEN_QM_KEY
- 148 17:38:44.152 12/06/2011 Sev=Info/5 IKE/0x43000059
- Loading IPsec SA (MsgID=10B173CC OUTBOUND SPI = 0x6BA867B6 INBOUND SPI = 0x23C491EC)
- 149 17:38:44.152 12/06/2011 Sev=Info/5 IKE/0x43000025
- Loaded OUTBOUND ESP SPI: 0x6BA867B6
- 150 17:38:44.152 12/06/2011 Sev=Info/5 IKE/0x43000026
- Loaded INBOUND ESP SPI: 0x23C491EC
- 151 17:38:44.152 12/06/2011 Sev=Debug/7 IKE/0x43000076
- NAV Trace->QM: MsgID=10B173CC CurState: QM_P2_CMPL Event: EV_ACTIVATE_IPSEC_SA
- 152 17:38:44.157 12/06/2011 Sev=Info/4 CM/0x43100034
- The Virtual Adapter was enabled:
- IP=10.10.10.6/255.255.255.0
- DNS=8.8.8.8,0.0.0.0
- WINS=0.0.0.0,0.0.0.0
- Domain=cisco.com
- Split DNS Names=
- 153 17:38:44.158 12/06/2011 Sev=Info/4 CM/0x43100038
- Successfully saved route changes to file.
- 154 17:38:44.158 12/06/2011 Sev=Info/6 CM/0x43100036
- The routing table was updated for the Virtual Adapter
- 155 17:38:44.158 12/06/2011 Sev=Info/4 CM/0x4310001A
- One secure connection established
- 156 17:38:44.158 12/06/2011 Sev=Info/4 CVPND/0x4340001E
- Privilege Separation: reducing MTU on primary interface.
- 157 17:38:44.163 12/06/2011 Sev=Info/4 CVPND/0x4340001B
- Privilege Separation: backing up resolv.conf file.
- 158 17:38:44.163 12/06/2011 Sev=Info/4 CVPND/0x4340001D
- Privilege Separation: chown( /etc/resolv.conf.vpnbackup, uid=0, gid=0 ).
- 159 17:38:44.163 12/06/2011 Sev=Info/4 CVPND/0x43400018
- Privilege Separation: opening file: (/etc/resolv.conf).
- 160 17:38:44.163 12/06/2011 Sev=Info/4 CM/0x4310003B
- Address watch added for 10.15.203.13. Current hostname: Testserver, Current address(es): 10.15.203.13, 10.10.10.6.
- 161 17:38:44.163 12/06/2011 Sev=Info/4 CM/0x4310003B
- Address watch added for 10.10.10.6. Current hostname: Testserver, Current address(es): 10.15.203.13, 10.10.10.6.
- 162 17:38:44.163 12/06/2011 Sev=Debug/7 IKE/0x43000076
- NAV Trace->QM: MsgID=10B173CC CurState: QM_ACTIVE Event: EV_NO_EVENT
- 163 17:39:08.199 12/06/2011 Sev=Debug/7 IKE/0x43000076
- NAV Trace->TM: MsgID=FC4BB999 CurState: TM_XAUTH_DONE Event: EV_PURGE_TMO
- 164 17:39:08.199 12/06/2011 Sev=Debug/7 IKE/0x43000076
- NAV Trace->TM: MsgID=FC4BB999 CurState: TM_FREE Event: EV_REMOVE
- 165 17:39:08.199 12/06/2011 Sev=Debug/7 IKE/0x43000076
- NAV Trace->TM: MsgID=FC4BB999 CurState: TM_FREE Event: EV_NO_EVENT
- 166 17:39:14.199 12/06/2011 Sev=Debug/7 IKE/0x43000076
- NAV Trace->TM: MsgID=4AB8E37F CurState: TM_MODECFG_DONE Event: EV_PURGE_TMO
- 167 17:39:14.199 12/06/2011 Sev=Debug/7 IKE/0x43000076
- NAV Trace->TM: MsgID=4AB8E37F CurState: TM_FREE Event: EV_REMOVE
- 168 17:39:14.199 12/06/2011 Sev=Debug/7 IKE/0x43000076
- NAV Trace->TM: MsgID=4AB8E37F CurState: TM_FREE Event: EV_NO_EVENT
- 169 17:54:09.687 12/06/2011 Sev=Info/4 CM/0x4310000A
- Secure connections terminated
- 170 17:54:09.687 12/06/2011 Sev=Info/4 IKE/0x43000001
- IKE received signal to terminate VPN connection
- 171 17:54:09.687 12/06/2011 Sev=Debug/7 IKE/0x43000076
- NAV Trace->SA: I_Cookie=9DEC0371AE8D20EE R_Cookie=1EB46FBE28D7F5C2 CurState: CMN_ACTIVE Event: EV_PROMPT_TERM
- 172 17:54:09.687 12/06/2011 Sev=Debug/7 IKE/0x43000076
- NAV Trace->SA: I_Cookie=9DEC0371AE8D20EE R_Cookie=1EB46FBE28D7F5C2 CurState: CMN_TERMINATE Event: EV_PROMPT_TERM
- 173 17:54:09.687 12/06/2011 Sev=Debug/7 IKE/0x43000076
- NAV Trace->SA: I_Cookie=9DEC0371AE8D20EE R_Cookie=1EB46FBE28D7F5C2 CurState: CMN_TERMINATE Event: EV_NO_EVENT
- 174 17:54:09.687 12/06/2011 Sev=Debug/7 IKE/0x43000076
- NAV Trace->QM: MsgID=10B173CC CurState: QM_ACTIVE Event: EV_TERM_REQUEST
- 175 17:54:09.687 12/06/2011 Sev=Debug/7 IKE/0x43000076
- NAV Trace->QM: MsgID=10B173CC CurState: QM_FREE Event: EV_REMOVE
- 176 17:54:09.687 12/06/2011 Sev=Info/4 IKE/0x43000013
- SENDING >>> ISAKMP OAK INFO *(HASH, DEL) to 188.254.221.8
- 177 17:54:09.687 12/06/2011 Sev=Decode/11 IKE/0x43000001
- ISAKMP Header
- Initiator COOKIE: 9DEC0371AE8D20EE
- Responder COOKIE: 1EB46FBE28D7F5C2
- Next Payload: Hash
- Ver (Hex): 10
- Exchange Type: Informational
- Flags: (Encryption)
- MessageID(Hex): E7135FE1
- Length: 72
- Payload Hash
- Next Payload: Delete
- Reserved: 00
- Payload Length: 24
- Data (In Hex): 6EE9434A4C9CCCD7DE22100956B93BCC78F51F99
- Payload Delete
- Next Payload: None
- Reserved: 00
- Payload Length: 20
- DOI: IPsec
- Protocol-ID: PROTO_IPSEC_ESP
- Spi Size: 4
- # of SPIs: 2
- SPI (Hex dump): 23C491EC6BA867B6
- 178 17:54:09.687 12/06/2011 Sev=Info/5 IKE/0x43000018
- Deleting IPsec SA: (OUTBOUND SPI = 6BA867B6 INBOUND SPI = 23C491EC)
- 179 17:54:09.687 12/06/2011 Sev=Info/4 IKE/0x43000049
- Discarding IPsec SA negotiation, MsgID=10B173CC
- 180 17:54:09.687 12/06/2011 Sev=Debug/7 IKE/0x43000076
- NAV Trace->QM: MsgID=10B173CC CurState: QM_FREE Event: EV_NO_EVENT
- 181 17:54:09.687 12/06/2011 Sev=Debug/7 IKE/0x43000076
- NAV Trace->SA: I_Cookie=9DEC0371AE8D20EE R_Cookie=1EB46FBE28D7F5C2 CurState: CMN_TERMINATE Event: EV_PROMPT_DELETE
- 182 17:54:09.687 12/06/2011 Sev=Debug/8 IKE/0x4300004D
- Stopping DPD timer for IKE SA : I_Cookie=9DEC0371AE8D20EE R_Cookie=1EB46FBE28D7F5C2
- 183 17:54:09.687 12/06/2011 Sev=Info/4 IKE/0x43000017
- Marking IKE SA for deletion (I_Cookie=9DEC0371AE8D20EE R_Cookie=1EB46FBE28D7F5C2) reason = DEL_REASON_RESET_SADB
- 184 17:54:09.687 12/06/2011 Sev=Info/4 IKE/0x43000013
- SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to 188.254.221.8
- 185 17:54:09.687 12/06/2011 Sev=Decode/11 IKE/0x43000001
- ISAKMP Header
- Initiator COOKIE: 9DEC0371AE8D20EE
- Responder COOKIE: 1EB46FBE28D7F5C2
- Next Payload: Hash
- Ver (Hex): 10
- Exchange Type: Informational
- Flags: (Encryption)
- MessageID(Hex): 71CE4D25
- Length: 84
- Payload Hash
- Next Payload: Delete With Reason
- Reserved: 00
- Payload Length: 24
- Data (In Hex): 95A629FF4F1D2A3244A7C45870CB9B6CB41C7C87
- Payload Delete With Reason
- Next Payload: None
- Reserved: 00
- Payload Length: 32
- DOI: Isakmp
- Protocol-ID: PROTO_ISAKMP
- Spi Size: 16
- # of SPIs: 1
- T Flag: FALSE
- Delete Reason Code: 2
- SPI (Hex dump): 9DEC0371AE8D20EE1EB46FBE28D7F5C2
- 186 17:54:09.687 12/06/2011 Sev=Debug/7 IKE/0x43000076
- NAV Trace->SA: I_Cookie=9DEC0371AE8D20EE R_Cookie=1EB46FBE28D7F5C2 CurState: CMN_FREE Event: EV_NO_EVENT
- 187 17:54:09.687 12/06/2011 Sev=Debug/7 IKE/0x43000076
- NAV Trace->SA: I_Cookie=9DEC0371AE8D20EE R_Cookie=1EB46FBE28D7F5C2 CurState: CMN_FREE Event: EV_EMPTY_P1_SA
- 188 17:54:09.687 12/06/2011 Sev=Debug/7 IKE/0x43000076
- NAV Trace->SA: I_Cookie=9DEC0371AE8D20EE R_Cookie=1EB46FBE28D7F5C2 CurState: CMN_FREE Event: EV_NO_EVENT
- 189 17:54:09.688 12/06/2011 Sev=Info/6 CM/0x43100037
- The routing table was returned to original state prior to Virtual Adapter
- 190 17:54:09.701 12/06/2011 Sev=Info/4 CM/0x43100035
- The Virtual Adapter was disabled
- 191 17:54:09.701 12/06/2011 Sev=Info/4 IKE/0x4300004B
- Discarding IKE SA negotiation (I_Cookie=9DEC0371AE8D20EE R_Cookie=1EB46FBE28D7F5C2) reason = DEL_REASON_RESET_SADB
- 192 17:54:09.701 12/06/2011 Sev=Info/4 CM/0x43100013
- Phase 1 SA deleted cause by DEL_REASON_RESET_SADB. 0 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system
- 193 17:54:09.701 12/06/2011 Sev=Info/4 CVPND/0x4340001C
- Privilege Separation: restoring resolv.conf file.
- 194 17:54:09.701 12/06/2011 Sev=Info/4 CVPND/0x4340001D
- Privilege Separation: chown( /etc/resolv.conf, uid=0, gid=0 ).
- 195 17:54:09.701 12/06/2011 Sev=Info/5 CM/0x43100025
- Initializing CVPNDrv
- 196 17:54:09.702 12/06/2011 Sev=Info/4 CM/0x4310002D
- Resetting TCP connection on port 443
- 197 17:54:09.702 12/06/2011 Sev=Info/6 CM/0x43100030
- Removed local TCP port 27172 for TCP connection.
- 198 17:54:09.702 12/06/2011 Sev=Info/6 CM/0x43100031
- Tunnel to headend device 188.254.221.8 disconnected: duration: 0 days 0:15:25
- 199 17:54:09.702 12/06/2011 Sev=Debug/7 CM/0x43100033
- Auto-initiation watch: started
- 200 17:54:09.702 12/06/2011 Sev=Debug/7 CM/0x43100033
- Auto-initiation watch: interface change handler invoked
- 201 17:54:09.702 12/06/2011 Sev=Debug/7 CM/0x43100033
- Auto-initiation watch: auto-initiation is currently disabled
- 202 17:54:09.702 12/06/2011 Sev=Info/4 CVPND/0x4340001F
- Privilege Separation: restoring MTU on primary interface.
- 203 17:54:09.702 12/06/2011 Sev=Info/5 CM/0x43100025
- Initializing CVPNDrv
- 204 17:54:09.702 12/06/2011 Sev=Warning/3 CM/0x83100011
- VPNStopComplete call failed with error code 0
- 205 17:54:09.702 12/06/2011 Sev=Info/4 CVPND/0x4340001F
- Privilege Separation: restoring MTU on primary interface.
- 206 17:54:09.702 12/06/2011 Sev=Info/4 CVPND/0x4340000C
- Stopped service:
- 207 17:54:09.702 12/06/2011 Sev=Debug/7 CM/0x43100033
- Auto-initiation watch: stopped
- 208 17:54:09.702 12/06/2011 Sev=Info/4 CVPND/0x4340001F
- Privilege Separation: restoring MTU on primary interface.
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement