Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- asa-fw1/pri/act(config)# debug crypto ikev1 200
- asa-fw1/pri/act(config)# Sep 15 03:14:00 [IKEv1]IP = 193.164.94.47, IKE Initiator: New Phase 1, Intf inside, IKE Peer 193.164.94.47 local Proxy Address 0.0.0.0, remote Proxy Address 10.200.4.0, Crypto map (CRYPTO-MAP)
- Sep 15 03:14:00 [IKEv1 DEBUG]IP = 193.164.94.47, constructing ISAKMP SA payload
- Sep 15 03:14:00 [IKEv1 DEBUG]IP = 193.164.94.47, constructing NAT-Traversal VID ver 02 payload
- Sep 15 03:14:00 [IKEv1 DEBUG]IP = 193.164.94.47, constructing NAT-Traversal VID ver 03 payload
- Sep 15 03:14:00 [IKEv1 DEBUG]IP = 193.164.94.47, constructing NAT-Traversal VID ver RFC payload
- Sep 15 03:14:00 [IKEv1 DEBUG]IP = 193.164.94.47, constructing Fragmentation VID + extended capabilities payload
- Sep 15 03:14:00 [IKEv1]IP = 193.164.94.47, IKE_DECODE SENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + VENDOR (13) + VENDOR (13) + VENDOR (13) + NONE (0) total length : 248
- Sep 15 03:14:00 [IKEv1]IP = 193.164.94.47, IKE_DECODE RECEIVED Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + VENDOR (13) + NONE (0) total length : 128
- Sep 15 03:14:00 [IKEv1 DEBUG]IP = 193.164.94.47, processing SA payload
- Sep 15 03:14:00 [IKEv1 DEBUG]IP = 193.164.94.47, Oakley proposal is acceptable
- Sep 15 03:14:00 [IKEv1 DEBUG]IP = 193.164.94.47, processing VID payload
- Sep 15 03:14:00 [IKEv1 DEBUG]IP = 193.164.94.47, Received NAT-Traversal RFC VID
- Sep 15 03:14:00 [IKEv1 DEBUG]IP = 193.164.94.47, processing VID payload
- Sep 15 03:14:00 [IKEv1 DEBUG]IP = 193.164.94.47, Received DPD VID
- Sep 15 03:14:00 [IKEv1 DEBUG]IP = 193.164.94.47, constructing ke payload
- Sep 15 03:14:00 [IKEv1 DEBUG]IP = 193.164.94.47, constructing nonce payload
- Sep 15 03:14:00 [IKEv1 DEBUG]IP = 193.164.94.47, constructing Cisco Unity VID payload
- Sep 15 03:14:00 [IKEv1 DEBUG]IP = 193.164.94.47, constructing xauth V6 VID payload
- Sep 15 03:14:00 [IKEv1 DEBUG]IP = 193.164.94.47, Send IOS VID
- Sep 15 03:14:00 [IKEv1 DEBUG]IP = 193.164.94.47, Constructing ASA spoofing IOS Vendor ID payload (version: 1.0.0, capabilities: 20000001)
- Sep 15 03:14:00 [IKEv1 DEBUG]IP = 193.164.94.47, constructing VID payload
- Sep 15 03:14:00 [IKEv1 DEBUG]IP = 193.164.94.47, Send Altiga/Cisco VPN3000/Cisco ASA GW VID
- Sep 15 03:14:00 [IKEv1 DEBUG]IP = 193.164.94.47, constructing NAT-Discovery payload
- Sep 15 03:14:00 [IKEv1 DEBUG]IP = 193.164.94.47, computing NAT Discovery hash
- Sep 15 03:14:00 [IKEv1 DEBUG]IP = 193.164.94.47, constructing NAT-Discovery payload
- Sep 15 03:14:00 [IKEv1 DEBUG]IP = 193.164.94.47, computing NAT Discovery hash
- Sep 15 03:14:00 [IKEv1]IP = 193.164.94.47, IKE_DECODE SENDING Message (msgid=0) with payloads : HDR + KE (4) + NONCE (10) + VENDOR (13) + VENDOR (13) + VENDOR (13) + VENDOR (13) + NAT-D (20) + NAT-D (20) + NONE (0) total length : 264
- Sep 15 03:14:01 [IKEv1]IP = 193.164.94.47, IKE_DECODE RECEIVED Message (msgid=0) with payloads : HDR + KE (4) + NONCE (10) + NAT-D (20) + NAT-D (20) + NONE (0) total length : 188
- Sep 15 03:14:01 [IKEv1 DEBUG]IP = 193.164.94.47, processing ke payload
- Sep 15 03:14:01 [IKEv1 DEBUG]IP = 193.164.94.47, processing ISA_KE payload
- Sep 15 03:14:01 [IKEv1 DEBUG]IP = 193.164.94.47, processing nonce payload
- Sep 15 03:14:01 [IKEv1 DEBUG]IP = 193.164.94.47, processing NAT-Discovery payload
- Sep 15 03:14:01 [IKEv1 DEBUG]IP = 193.164.94.47, computing NAT Discovery hash
- Sep 15 03:14:01 [IKEv1 DEBUG]IP = 193.164.94.47, processing NAT-Discovery payload
- Sep 15 03:14:01 [IKEv1 DEBUG]IP = 193.164.94.47, computing NAT Discovery hash
- Sep 15 03:14:01 [IKEv1]IP = 193.164.94.47, Connection landed on tunnel_group 193.164.94.47
- Sep 15 03:14:01 [IKEv1 DEBUG]Group = 193.164.94.47, IP = 193.164.94.47, Generating keys for Initiator...
- Sep 15 03:14:01 [IKEv1 DEBUG]Group = 193.164.94.47, IP = 193.164.94.47, constructing ID payload
- Sep 15 03:14:01 [IKEv1 DEBUG]Group = 193.164.94.47, IP = 193.164.94.47, constructing hash payload
- Sep 15 03:14:01 [IKEv1 DEBUG]Group = 193.164.94.47, IP = 193.164.94.47, Computing hash for ISAKMP
- Sep 15 03:14:01 [IKEv1 DEBUG]Group = 193.164.94.47, IP = 193.164.94.47, constructing dpd vid payload
- Sep 15 03:14:01 [IKEv1]IP = 193.164.94.47, IKE_DECODE SENDING Message (msgid=0) with payloads : HDR + ID (5) + HASH (8) + VENDOR (13) + NONE (0) total length : 80
- Sep 15 03:14:01 [IKEv1]Group = 193.164.94.47, IP = 193.164.94.47, Automatic NAT Detection Status: Remote end IS behind a NAT device This end is NOT behind a NAT device
- Sep 15 03:14:01 [IKEv1]Group = 193.164.94.47, IP = 193.164.94.47, Floating NAT-T to port 4500
- Sep 15 03:14:01 [IKEv1]IP = 193.164.94.47, IKE_DECODE RECEIVED Message (msgid=0) with payloads : HDR + ID (5) + HASH (8) + NONE (0) total length : 67
- Sep 15 03:14:01 [IKEv1 DEBUG]Group = 193.164.94.47, IP = 193.164.94.47, processing ID payload
- Sep 15 03:14:01 [IKEv1 DECODE]Group = 193.164.94.47, IP = 193.164.94.47, ID_FQDN ID received, len 11
- 0000: 616C692D 6265696A 696E67 ali-beijing
- Sep 15 03:14:01 [IKEv1 DEBUG]Group = 193.164.94.47, IP = 193.164.94.47, processing hash payload
- Sep 15 03:14:01 [IKEv1 DEBUG]Group = 193.164.94.47, IP = 193.164.94.47, Computing hash for ISAKMP
- Sep 15 03:14:01 [IKEv1]IP = 193.164.94.47, Connection landed on tunnel_group 193.164.94.47
- Sep 15 03:14:01 [IKEv1 DEBUG]Group = 193.164.94.47, IP = 193.164.94.47, Proposing only UDP-Encapsulated-Tunnel and UDP-Encapsulated-Transport modes defined by NAT-Traversal
- Sep 15 03:14:01 [IKEv1 DEBUG]Group = 193.164.94.47, IP = 193.164.94.47, Oakley begin quick mode
- Sep 15 03:14:01 [IKEv1 DECODE]Group = 193.164.94.47, IP = 193.164.94.47, IKE Initiator starting QM: msg id = b6aed5ce
- Sep 15 03:14:01 [IKEv1]Group = 193.164.94.47, IP = 193.164.94.47, PHASE 1 COMPLETED
- Sep 15 03:14:01 [IKEv1]IP = 193.164.94.47, Keep-alive type for this connection: DPD
- Sep 15 03:14:01 [IKEv1 DEBUG]Group = 193.164.94.47, IP = 193.164.94.47, Starting P1 rekey timer: 64800 seconds.
- Sep 15 03:14:01 [IKEv1]Group = 193.164.94.47, IP = 193.164.94.47, Add to IKEv1 Tunnel Table succeeded for SA with logical ID 67371008
- Sep 15 03:14:01 [IKEv1]Group = 193.164.94.47, IP = 193.164.94.47, Add to IKEv1 MIB Table succeeded for SA with logical ID 67371008
- Sep 15 03:14:01 [IKEv1 DEBUG]Group = 193.164.94.47, IP = 193.164.94.47, IKE got SPI from key engine: SPI = 0x78a097ae
- Sep 15 03:14:01 [IKEv1 DEBUG]Group = 193.164.94.47, IP = 193.164.94.47, oakley constucting quick mode
- Sep 15 03:14:01 [IKEv1 DEBUG]Group = 193.164.94.47, IP = 193.164.94.47, constructing blank hash payload
- Sep 15 03:14:01 [IKEv1 DEBUG]Group = 193.164.94.47, IP = 193.164.94.47, constructing IPSec SA payload
- Sep 15 03:14:01 [IKEv1 DEBUG]Group = 193.164.94.47, IP = 193.164.94.47, constructing IPSec nonce payload
- Sep 15 03:14:01 [IKEv1 DEBUG]Group = 193.164.94.47, IP = 193.164.94.47, constructing pfs ke payload
- Sep 15 03:14:01 [IKEv1 DEBUG]Group = 193.164.94.47, IP = 193.164.94.47, constructing proxy ID
- Sep 15 03:14:01 [IKEv1 DEBUG]Group = 193.164.94.47, IP = 193.164.94.47, Transmitting Proxy Id:
- Local subnet: 0.0.0.0 mask 0.0.0.0 Protocol 0 Port 0
- Remote subnet: 10.200.4.0 Mask 255.255.255.0 Protocol 0 Port 0
- Sep 15 03:14:01 [IKEv1 DECODE]Group = 193.164.94.47, IP = 193.164.94.47, IKE Initiator sending Initial Contact
- Sep 15 03:14:01 [IKEv1 DEBUG]Group = 193.164.94.47, IP = 193.164.94.47, constructing qm hash payload
- Sep 15 03:14:01 [IKEv1 DECODE]Group = 193.164.94.47, IP = 193.164.94.47, IKE Initiator sending 1st QM pkt: msg id = b6aed5ce
- Sep 15 03:14:01 [IKEv1]IP = 193.164.94.47, IKE_DECODE SENDING Message (msgid=b6aed5ce) with payloads : HDR + HASH (8) + SA (1) + NONCE (10) + KE (4) + ID (5) + ID (5) + NOTIFY (11) + NONE (0) total length : 336
- Sep 15 03:14:10 [IKEv1]IP = 193.164.94.47, IKE_DECODE RECEIVED Message (msgid=ef141d54) with payloads : HDR + HASH (8) + NOTIFY (11) + NONE (0) total length : 80
- Sep 15 03:14:10 [IKEv1 DEBUG]Group = 193.164.94.47, IP = 193.164.94.47, processing hash payload
- Sep 15 03:14:10 [IKEv1 DEBUG]Group = 193.164.94.47, IP = 193.164.94.47, processing notify payload
- Sep 15 03:14:10 [IKEv1 DEBUG]Group = 193.164.94.47, IP = 193.164.94.47, Received keep-alive of type DPD R-U-THERE (seq number 0xead)
- Sep 15 03:14:10 [IKEv1 DEBUG]Group = 193.164.94.47, IP = 193.164.94.47, Sending keep-alive of type DPD R-U-THERE-ACK (seq number 0xead)
- Sep 15 03:14:10 [IKEv1 DEBUG]Group = 193.164.94.47, IP = 193.164.94.47, constructing blank hash payload
- Sep 15 03:14:10 [IKEv1 DEBUG]Group = 193.164.94.47, IP = 193.164.94.47, constructing qm hash payload
- Sep 15 03:14:10 [IKEv1]IP = 193.164.94.47, IKE_DECODE SENDING Message (msgid=5c198f22) with payloads : HDR + HASH (8) + NOTIFY (11) + NONE (0) total length : 80
- Sep 15 03:14:20 [IKEv1]IP = 193.164.94.47, IKE_DECODE RECEIVED Message (msgid=263bc2e6) with payloads : HDR + HASH (8) + NOTIFY (11) + NONE (0) total length : 80
- Sep 15 03:14:20 [IKEv1 DEBUG]Group = 193.164.94.47, IP = 193.164.94.47, processing hash payload
- Sep 15 03:14:20 [IKEv1 DEBUG]Group = 193.164.94.47, IP = 193.164.94.47, processing notify payload
- Sep 15 03:14:20 [IKEv1 DEBUG]Group = 193.164.94.47, IP = 193.164.94.47, Received keep-alive of type DPD R-U-THERE (seq number 0xeae)
- Sep 15 03:14:20 [IKEv1 DEBUG]Group = 193.164.94.47, IP = 193.164.94.47, Sending keep-alive of type DPD R-U-THERE-ACK (seq number 0xeae)
- Sep 15 03:14:20 [IKEv1 DEBUG]Group = 193.164.94.47, IP = 193.164.94.47, constructing blank hash payload
- Sep 15 03:14:20 [IKEv1 DEBUG]Group = 193.164.94.47, IP = 193.164.94.47, constructing qm hash payload
- Sep 15 03:14:20 [IKEv1]IP = 193.164.94.47, IKE_DECODE SENDING Message (msgid=4a811f7d) with payloads : HDR + HASH (8) + NOTIFY (11) + NONE (0) total length : 80
- Sep 15 03:14:30 [IKEv1]IP = 193.164.94.47, IKE_DECODE RECEIVED Message (msgid=99c74a85) with payloads : HDR + HASH (8) + NOTIFY (11) + NONE (0) total length : 80
- Sep 15 03:14:30 [IKEv1 DEBUG]Group = 193.164.94.47, IP = 193.164.94.47, processing hash payload
- Sep 15 03:14:30 [IKEv1 DEBUG]Group = 193.164.94.47, IP = 193.164.94.47, processing notify payload
- Sep 15 03:14:30 [IKEv1 DEBUG]Group = 193.164.94.47, IP = 193.164.94.47, Received keep-alive of type DPD R-U-THERE (seq number 0xeaf)
- Sep 15 03:14:30 [IKEv1 DEBUG]Group = 193.164.94.47, IP = 193.164.94.47, Sending keep-alive of type DPD R-U-THERE-ACK (seq number 0xeaf)
- Sep 15 03:14:30 [IKEv1 DEBUG]Group = 193.164.94.47, IP = 193.164.94.47, constructing blank hash payload
- Sep 15 03:14:30 [IKEv1 DEBUG]Group = 193.164.94.47, IP = 193.164.94.47, constructing qm hash payload
- Sep 15 03:14:30 [IKEv1]IP = 193.164.94.47, IKE_DECODE SENDING Message (msgid=14019cc3) with payloads : HDR + HASH (8) + NOTIFY (11) + NONE (0) total length : 80
- Sep 15 03:14:33 [IKEv1]Group = 193.164.94.47, IP = 193.164.94.47, QM FSM error (P2 struct &0x00007f41f1085ae0, mess id 0xb6aed5ce)!
- Sep 15 03:14:33 [IKEv1 DEBUG]Group = 193.164.94.47, IP = 193.164.94.47, IKE QM Initiator FSM error history (struct &0x00007f41f1085ae0) <state>, <event>: QM_DONE, EV_ERROR-->QM_WAIT_MSG2, EV_TIMEOUT-->QM_WAIT_MSG2, NullEvent-->QM_SND_MSG1, EV_SND_MSG-->QM_SND_MSG1, EV_START_TMR-->QM_SND_MSG1, EV_RESEND_MSG-->QM_WAIT_MSG2, EV_TIMEOUT-->QM_WAIT_MSG2, NullEvent
- Sep 15 03:14:33 [IKEv1 DEBUG]Group = 193.164.94.47, IP = 193.164.94.47, sending delete/delete with reason message
- Sep 15 03:14:33 [IKEv1 DEBUG]Group = 193.164.94.47, IP = 193.164.94.47, constructing blank hash payload
- Sep 15 03:14:33 [IKEv1 DEBUG]Group = 193.164.94.47, IP = 193.164.94.47, constructing IPSec delete payload
- Sep 15 03:14:33 [IKEv1 DEBUG]Group = 193.164.94.47, IP = 193.164.94.47, constructing qm hash payload
- Sep 15 03:14:33 [IKEv1]IP = 193.164.94.47, IKE_DECODE SENDING Message (msgid=e183475d) with payloads : HDR + HASH (8) + DELETE (12) + NONE (0) total length : 64
- Sep 15 03:14:33 [IKEv1 DEBUG]Group = 193.164.94.47, IP = 193.164.94.47, IKE Deleting SA: Remote Proxy 10.200.4.0, Local Proxy 0.0.0.0
- Sep 15 03:14:33 [IKEv1]Group = 193.164.94.47, IP = 193.164.94.47, Removing peer from correlator table failed, no match!
- Sep 15 03:14:33 [IKEv1 DEBUG]Group = 193.164.94.47, IP = 193.164.94.47, IKE SA MM:aafd3096 rcv'd Terminate: state MM_ACTIVE flags 0x00000062, refcnt 1, tuncnt 0
- Sep 15 03:14:33 [IKEv1]Group = 193.164.94.47, IP = 193.164.94.47, Remove from IKEv1 Tunnel Table succeeded for SA with logicalId 67371008
- Sep 15 03:14:33 [IKEv1]Group = 193.164.94.47, IP = 193.164.94.47, Remove from IKEv1 MIB Table succeeded for SA with logical ID 67371008
- Sep 15 03:14:33 [IKEv1 DEBUG]Group = 193.164.94.47, IP = 193.164.94.47, IKE SA MM:aafd3096 terminating: flags 0x01000022, refcnt 0, tuncnt 0
- Sep 15 03:14:33 [IKEv1 DEBUG]Group = 193.164.94.47, IP = 193.164.94.47, sending delete/delete with reason message
- Sep 15 03:14:33 [IKEv1 DEBUG]Group = 193.164.94.47, IP = 193.164.94.47, constructing blank hash payload
- Sep 15 03:14:33 [IKEv1 DEBUG]Group = 193.164.94.47, IP = 193.164.94.47, constructing IKE delete payload
- Sep 15 03:14:33 [IKEv1 DEBUG]Group = 193.164.94.47, IP = 193.164.94.47, constructing qm hash payload
- Sep 15 03:14:33 [IKEv1]IP = 193.164.94.47, IKE_DECODE SENDING Message (msgid=dfd8ec7) with payloads : HDR + HASH (8) + DELETE (12) + NONE (0) total length : 76
- Sep 15 03:14:33 [IKEv1]Group = 193.164.94.47, IP = 193.164.94.47, Session is being torn down. Reason: Lost Service
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement