Guest

IPSec Negotiation/IKE Protocols

IOS IPSec NAT Transparency with VPN Client Configuration Example

Cisco - IOS IPSec NAT Transparency with VPN Client Configuration Example

Document ID: 29760

Updated: Dec 07, 2006

   Print

Introduction

This document is a sample configuration for Cisco IOS® support of the IPsec Network Address Translation (NAT) Transparency feature. It introduces support for IPsec traffic to travel through NAT or Point Address Translation (PAT) in the network by addressing many known incompatabilites between NAT and IPsec.

Prerequisites

Requirements

There are no specific requirements for this document.

Components Used

The information in this document is based on these software and hardware versions:

  • Cisco 2621 Router 12.2.13.7T1 and later

  • Cisco VPN Client 3.6.3 (configuration not shown)

The information in this document was created from the devices in a specific lab environment. All of the devices used in this document started with a cleared (default) configuration. If your network is live, make sure that you understand the potential impact of any command.

Conventions

Refer to Cisco Technical Tips Conventions for more information on document conventions.

Configure

In this section, you are presented with the information to configure the features described in this document.

Note: Use the Command Lookup Tool (registered customers only) to find more information on the commands used in this document.

Network Diagram

This document uses this network setup:

ios-ipsec-nat-vpnclient-1.gif

Router Configuration

Complete these steps:

  1. Issue the show version command to display the software version that the switch runs.

    2621#show version
    Cisco Internetwork Operating System Software
    IOS (tm) C2600 Software (C2600-IK9O3S3-M), Version 12.2(13.7)T1,  
    MAINTENANCE INTERIM SOFTWARE
    TAC Support: http://www.cisco.com/tac
    Copyright (c) 1986-2002 by cisco Systems, Inc.
    Compiled Sat 21-Dec-02 14:10 by ccai
    Image text-base: 0x80008098, data-base: 0x818B6330
    
    ROM: System Bootstrap, Version 11.3(2)XA4, RELEASE SOFTWARE (fc1)
    ROM: C2600 Software (C2600-IK9O3S3-M), Version 12.2(13.7)T1,  
    MAINTENANCE INTERIM SOFTWARE
    
    2621 uptime is 33 minutes
    System returned to ROM by reload
    System image file is "flash:c2600-ik9o3s3-mz.122-13.7.T1"
    
    cisco 2621 (MPC860) processor (revision 0x102) with 60416K/5120K bytes of memory.
    Processor board ID JAB0407020V (2751454139)
    M860 processor: part number 0, mask 49
    Bridging software.
    X.25 software, Version 3.0.0.
    Primary Rate ISDN software, Version 1.1.
    2 FastEthernet/IEEE 802.3 interface(s)
    2 Channelized T1/PRI port(s)
    32K bytes of non-volatile configuration memory.
    16384K bytes of processor board System flash (Read/Write)
    
    Configuration register is 0x2102
  2. Issue the show run command.

    2621#show run
    Building configuration...
    
    Current configuration : 2899 bytes
    !
    version 12.2
    service timestamps debug datetime msec localtime
    service timestamps log datetime msec localtime
    no service password-encryption
    !
    hostname 2621
    !
    boot system flash
    logging queue-limit 100
    enable secret 5 $1$dGFC$VA28yOWzxlCKyj1dq8SkE/
    !
    username cisco password 0 cisco123
    username client password 0 testclient
    aaa new-model
    !
    !
    aaa authentication login userauthen local
    aaa authorization network foo local
    aaa session-id common
    ip subnet-zero
    ip cef
    !
    !
    no ip domain lookup
    ip domain name cisco.com
    !
    !
    !
    !
    crypto isakmp policy 20
     encr 3des
     hash md5
     authentication pre-share
     group 2
    crypto isakmp keepalive 40 5
    
    !--- Allows an IPsec node to send NAT keepalive 
    !--- packets every 20 seconds.
    
    crypto isakmp nat keepalive 20
    !
    crypto isakmp client configuration group cisco
     key test1234
     pool test
     acl 120
    !
    !
    
    !--- Transform set "test" which uses Triple DES 
    !--- encryptions and MD5 (HMAC variant) 
    !--- for data packet authentication: 
    
    crypto ipsec transform-set test esp-3des esp-md5-hmac
    crypto ipsec transform-set foo esp-3des esp-sha-hmac
    !
    crypto ipsec profile greprotect
    !
    !
    
    !--- Dynamic crypto map.
    
    crypto dynamic-map dynmap 1
     set transform-set foo
     match address 199
    !
    !
    crypto map test client authentication list userauthen
    crypto map test isakmp authorization list foo
    crypto map test client configuration address respond
    
    !--- Adds a dynamic crypto map set to a static crypto map set.
     
    crypto map test 20 ipsec-isakmp dynamic dynmap
    !
    !
    !
    voice call carrier capacity active
    !
    !
    !
    !
    !
    !
    !
    no voice hpi capture buffer
    no voice hpi capture destination
    !
    !
    mta receive maximum-recipients 0
    !
    !
    controller T1 0/0
     framing sf
     linecode ami
    !
    controller T1 0/1
     framing sf
     linecode ami
    !
    !
    !
    interface Loopback0
     ip address 10.100.100.1 255.255.255.0
     ip nat inside
    !
    interface FastEthernet0/0
     ip address 172.16.142.191 255.255.255.0
     ip nat outside
     no ip route-cache
     no ip mroute-cache
     duplex auto
     speed auto
     
    !--- Applies a crypto map set to an interface. 
    
     crypto map test
    !
    interface FastEthernet0/1
     ip address 10.130.13.13 255.255.0.0
     duplex auto
     speed auto
    !
    ip local pool test 192.168.1.1 192.168.1.250
    ip nat inside source route-map nonat interface FastEthernet0/0 overload
    no ip http server
    no ip http secure-server
    ip classless
    ip route 0.0.0.0 0.0.0.0 172.16.142.1
    !
    ip pim bidir-enable
    !
    !
    access-list 101 permit ip any any
    access-list 101 permit esp any any
    access-list 101 permit udp any any eq isakmp
    access-list 101 permit ip 192.168.0.0 0.0.255.255 10.100.100.0 0.0.0.255
    access-list 111 permit ip 10.100.100.0 0.0.0.255 10.10.10.0 0.0.0.255
    access-list 112 deny   ip 10.100.100.0 0.0.0.255 10.10.10.0 0.0.0.255
    access-list 112 deny   ip 10.100.100.0 0.0.0.255 192.168.1.0 0.0.0.255
    access-list 112 permit ip 10.100.100.0 0.0.0.255 any
    access-list 120 permit ip 10.100.100.0 0.0.0.255 192.168.1.0 0.0.0.255
    
    !--- IPsec access list defines which traffic to protect.
    
    access-list 199 permit ip 10.100.100.0 0.0.0.255 192.168.1.0 0.0.0.255
    access-list 199 permit ip host 172.16.142.191 192.168.1.0 0.0.0.255
    !
    route-map nonat permit 10
     match ip address 112
    !
    radius-server authorization permit missing Service-Type
    call rsvp-sync
    !
    !
    mgcp profile default
    !
    dial-peer cor custom
    !
    !
    !
    !
    !
    line con 0
     exec-timeout 0 0
    line aux 0
    line vty 0 4
     password cisco
    !
    !
    end
    
    2621#

Verify

Use this section to confirm that your configuration works properly.

The Output Interpreter Tool (registered customers only) (OIT) supports certain show commands. Use the OIT to view an analysis of show command output.

  • show crypto isakmp sa —Displays all current Internet Key Exchange (IKE) security associations (SAs) at a peer.

    2621#show crypto isakmp sa 
      f_vrf/i_vrf   dst            src             state       conn-id slot
           /        172.16.142.191  171.69.89.82    QM_IDLE      4       0
  • show crypto ipsec sa—Displays the settings used by current SAs.

    2621#show crypto ipsec sa
    
    interface: FastEthernet0/0
        Crypto map tag: test, local addr. 172.16.142.191
    
       protected vrf:
       local  ident (addr/mask/prot/port): (10.100.100.0/255.255.255.0/0/0) 
    
    !--- Subnet behind local VPN router.
    
       remote ident (addr/mask/prot/port): (192.168.1.3/255.255.255.255/0/0)  
    
    !--- Subnet behind remote VPN router.
    
       current_peer: 171.69.89.82:4500
         PERMIT, flags={}
        #pkts encaps: 11, #pkts encrypt: 11, #pkts digest 11
        #pkts decaps: 11, #pkts decrypt: 11, #pkts verify 11
        #pkts compressed: 0, #pkts decompressed: 0
        #pkts not compressed: 0, #pkts compr. failed: 0
        #pkts not decompressed: 0, #pkts decompress failed: 0
        #send errors 0, #recv errors 0
    
         local crypto endpt.: 172.16.142.191, remote crypto endpt.: 171.69.89.82  
    
    !--- IP address of Encapsulating Security Payload (ESP) endpoints.
    
         path mtu 1500, media mtu 1500
         current outbound spi: 9A12903F
    
         inbound esp sas:
          spi: 0xD44C2AFE(3561761534)		
    
    !--- SPI inbound (ESP tunnel).
    
            transform: esp-3des esp-sha-hmac ,
            in use settings ={Tunnel UDP-Encaps, }
            slot: 0, conn id: 2002, flow_id: 3, crypto map: test
            sa timing: remaining key lifetime (k/sec): (4513510/3476)
            IV size: 8 bytes
            replay detection support: Y
    
         inbound ah sas:
    
         inbound pcp sas:
    
         outbound esp sas:
          spi: 0x9A12903F(2584907839)				
    
    !--- Security parameter index (SPI) outbound (ESP tunnel).
    
            transform: esp-3des esp-sha-hmac ,
            in use settings ={Tunnel UDP-Encaps, }
            slot: 0, conn id: 2003, flow_id: 4, crypto map: test
            sa timing: remaining key lifetime (k/sec): (4513511/3476)
            IV size: 8 bytes
            replay detection support: Y
    
         outbound ah sas:
    
         outbound pcp sas:
    
       protected vrf:
       local  ident (addr/mask/prot/port): (172.16.142.191/255.255.255.255/0/0)				
    
    !--- Next tunnel.
    
       remote ident (addr/mask/prot/port): (192.168.1.3/255.255.255.255/0/0)
       current_peer: 171.69.89.82:4500
         PERMIT, flags={}
        #pkts encaps: 0, #pkts encrypt: 0, #pkts digest 0
        #pkts decaps: 0, #pkts decrypt: 0, #pkts verify 0
        #pkts compressed: 0, #pkts decompressed: 0
        #pkts not compressed: 0, #pkts compr. failed: 0
        #pkts not decompressed: 0, #pkts decompress failed: 0
        #send errors 0, #recv errors 0
    
         local crypto endpt.: 172.16.142.191, remote crypto endpt.: 171.69.89.82
         path mtu 1500, media mtu 1500
         current outbound spi: 1CD14C06
    
         inbound esp sas:
          spi: 0x1EAC399E(514603422)
            transform: esp-3des esp-sha-hmac ,
            in use settings ={Tunnel UDP-Encaps, }
            slot: 0, conn id: 2000, flow_id: 1, crypto map: test
            sa timing: remaining key lifetime (k/sec): (4434590/3471)
            IV size: 8 bytes
            replay detection support: Y
    
         inbound ah sas:
    
         inbound pcp sas:
    
         outbound esp sas:
          spi: 0x1CD14C06(483478534)
            transform: esp-3des esp-sha-hmac ,
            in use settings ={Tunnel UDP-Encaps, }
            slot: 0, conn id: 2001, flow_id: 2, crypto map: test
            sa timing: remaining key lifetime (k/sec): (4434590/3469)
            IV size: 8 bytes
            replay detection support: Y
    
         outbound ah sas:
    
         outbound pcp sas:
  • show crypyo engine connection active—Displays cryptography engine statistics. This shows packet counts.

    2621#show crypyo engine connection active
    
      ID Interface       IP-Address      State  Algorithm           Encrypt  Decrypt
       4 FastEthernet0/0 172.16.142.191  set    HMAC_MD5+3DES_56_C        0        0
    2000 FastEthernet0/0 172.16.142.191  set    HMAC_SHA+3DES_56_C        0        0
    2001 FastEthernet0/0 172.16.142.191  set    HMAC_SHA+3DES_56_C        0        0
    2002 FastEthernet0/0 172.16.142.191  set    HMAC_SHA+3DES_56_C        0       11
    2003 FastEthernet0/0 172.16.142.191  set    HMAC_SHA+3DES_56_C       11        0
  • show crypto engine [brief | configuration]—Displays a summary of the configuration information for the crypto engines. Use this command in privileged EXEC mode. This command displays all crypto engines and displays the AIM-VPN product name.

    2621#show crypto engine configuration
    
            crypto engine name:  unknown		
    
    !--- Name of the crypto engine as assigned with the 
    !--- key-name argument in the crypto key generate dss command.
    
            crypto engine type:  software		
    
    !--- If "software" is listed, the crypto engine resides in either 
    !--- the Route Switch Processor (RSP) (the Cisco IOS crypto engine) or 
    !--- in a second-generation Versatile Interface Processor (VIP2). 
    
    
                 serial number:  A3FFDBBB
    		
           crypto engine state:  installed		
    
    !--- The state "installed" indicates that a crypto engine is located 
    !--- in the given slot, but is not configured for encryption. 
    
         crypto engine in slot:  N/A
                      platform:  Cisco Software Crypto Engine
    
       Encryption Process Info:
              input queue size:  500
               input queue top:  34
               input queue bot:  34
             input queue count:  0
    
       Crypto Adjacency Counts:
                    Lock Count:  0
                  Unlock Count:  0
            crypto lib version:  14.0.0
             ipsec lib version:  2.0.0
  • show crypto isakmp sa detail nat—Displays ISAKMP SA NAT details.

    2621#show crypto isakmp sa detail nat
    Codes: C - IKE configuration mode, D - Dead Peer Detection
           K - Keepalives, N - NAT-traversal
           X - IKE Extended Authentication
           psk - Preshared key, rsig - RSA signature
           renc - RSA encryption
    
      f_vrf/i_vrf  Conn id   Local        Remote        Encr Hash Auth DH Lifetime Capabilities
           /        4     172.16.142.191  171.69.89.82  3des md5       2  23:56:43 CDXN
            NAT keepalive(sec) 20
            In local 172.16.142.191:4500 remote cisco:4500

    f_vrf/i_vrf - The front door virtual routing and forwarding (F_VRF) and the inside VRF (I_VRF) of the IKE SA. If the FVRF is global, the output shows f_vrf as an empty field.

Troubleshoot

Use this section to troubleshoot your configuration.

Troubleshooting Commands

The Output Interpreter Tool (registered customers only) (OIT) supports certain show commands. Use the OIT to view an analysis of show command output.

Refer to IP Security Troubleshooting - Understanding and Using debug Commands for additional troubleshooting information.

Note: Refer to Important Information on Debug Commands before you use debug commands.

This configuration receives NAT Keepalives every 20 seconds as configured.

  • debug crypto ipsec—Displays the IPsec negotiations of phase 2.

  • debug crypto isakmp —Displays the ISAKMP negotiations of phase 1.

  • debug crypto engine —Displays the traffic that is encrypted.

    2621#
    2621#
    *Mar  1 00:32:03.171: ISAKMP (0:4): received packet from 171.69.89.82 
                                        dport 4500 sport 4500 Global (R) QM_IDLE
    *Mar  1 00:32:03.171: ISAKMP: set new node 1489874950 to QM_IDLE
    *Mar  1 00:32:03.175: ISAKMP (0:4): processing HASH payload. message 
                                        ID = 1489874950
    *Mar  1 00:32:03.175: ISAKMP (0:4): processing NOTIFY unknown protocol 1
            spi 0, message ID = 1489874950, sa = 82443410
    *Mar  1 00:32:03.175: ISAKMP (0:4): deleting node 1489874950 error FALSE 
                                        reason "informational (in) state 1"
    *Mar  1 00:32:03.175: ISAKMP (0:4): Input = IKE_MESG_FROM_PEER, IKE_INFO_NOTIFY
    *Mar  1 00:32:03.175: ISAKMP (0:4): Old State = IKE_P1_COMPLETE  
                                        New State = IKE_P1_COMPLETE
    
    *Mar  1 00:32:13.115: ISAKMP (0:4): purging node 428915319
    *Mar  1 00:32:23.199: ISAKMP (0:4): received packet from 171.69.89.82 
                                        dport 4500 sport 4500 Global (R) QM_IDLE
    *Mar  1 00:32:23.199: ISAKMP: set new node -1483946735 to QM_IDLE
    *Mar  1 00:32:23.203: ISAKMP (0:4): processing HASH payload. message ID = -1483946735
    *Mar  1 00:32:23.203: ISAKMP (0:4): processing NOTIFY unknown protocol 1
            spi 0, message ID = -1483946735, sa = 82443410
    *Mar  1 00:32:23.203: ISAKMP (0:4): deleting node -1483946735 error 
                                        FALSE reason "informational (in) state 1"
    *Mar  1 00:32:23.203: ISAKMP (0:4): Input = IKE_MESG_FROM_PEER, IKE_INFO_NOTIFY
    *Mar  1 00:32:23.203: ISAKMP (0:4): Old State = IKE_P1_COMPLETE  
                                        New State = IKE_P1_COMPLETE
    
    *Mar  1 00:32:33.147: ISAKMP (0:4): purging node -1677054470
  • debug ip packet [detail]—Displays general IP debugging information and IP security option (IPSO) security transactions.

  • debug ip icmp—Displays information on Internal Control Message Protocol (ICMP) transactions.

    Generic IP:
      ICMP packet debugging is on
      IP packet debugging is on (detailed)
    
    *Mar  1 00:38:43.735: IP: s=171.69.89.82 (FastEthernet0/0), d=172.16.142.191 
                          (FastEthernet0/0), len 108, rcvd 3
    *Mar  1 00:38:43.735:     UDP src=4500, dst=4500
    *Mar  1 00:38:48.863: IP: s=192.168.1.3 (FastEthernet0/0), d=10.100.100.1, 
                          len 60, rcvd 4
    *Mar  1 00:38:48.863:     ICMP type=8, code=0
    *Mar  1 00:38:48.863: ICMP: echo reply sent, src 10.100.100.1, dst 192.168.1.3
    *Mar  1 00:38:48.867: IP: s=10.100.100.1 (local), d=192.168.1.3 (FastEthernet0/0), 
                          len 60, sending
    *Mar  1 00:38:48.867:     ICMP type=0, code=0
    *Mar  1 00:38:49.863: IP: s=192.168.1.3 (FastEthernet0/0), d=10.100.100.1, 
                          len 60, rcvd 4
    *Mar  1 00:38:49.863:     ICMP type=8, code=0
    *Mar  1 00:38:49.863: ICMP: echo reply sent, src 10.100.100.1, dst 192.168.1.3
    *Mar  1 00:38:49.863: IP: s=10.100.100.1 (local), d=192.168.1.3 (FastEthernet0/0), 
                          len 60, sending
    *Mar  1 00:38:49.867:     ICMP type=0, code=0
    *Mar  1 00:38:50.863: IP: s=192.168.1.3 (FastEthernet0/0), d=10.100.100.1, 
                          len 60, rcvd 4
    *Mar  1 00:38:50.867:     ICMP type=8, code=0
    *Mar  1 00:38:50.867: ICMP: echo reply sent, src 10.100.100.1, dst 192.168.1.3
    *Mar  1 00:38:50.867: IP: s=10.100.100.1 (local), d=192.168.1.3 (FastEthernet0/0), 
                          len 60, sending
    *Mar  1 00:38:50.867:     ICMP type=0, code=0
    *Mar  1 00:38:51.867: IP: s=192.168.1.3 (FastEthernet0/0), d=10.100.100.1, 
                          len 60, rcvd 4
    *Mar  1 00:38:51.867:     ICMP type=8, code=0
    *Mar  1 00:38:51.867: ICMP: echo reply sent, src 10.100.100.1, dst 192.168.1.3
  • debug crypto ipsec—Displays the IPsec negotiations of phase 2.

  • debug crypto isakmp —Displays the ISAKMP negotiations of phase 1.

  • debug crypto engine—Displays the traffic that is encrypted.

    2621#
    2621#
    2621#
    2621#
    *Mar  1 00:27:54.735: ISAKMP (0:0): received packet from 171.69.89.82 dport 
                                        500 sport 500 Global (N) NEW SA
    *Mar  1 00:27:54.739: ISAKMP: Created a peer struct for 171.69.89.82, peer port 500
    *Mar  1 00:27:54.739: ISAKMP: Locking peer struct 0x82C88D44, IKE refcount 
                          1 for crypto_ikmp_config_initialize_sa
    *Mar  1 00:27:54.739: ISAKMP (0:0): Setting client config settings 82A819DC
    *Mar  1 00:27:54.739: ISAKMP (0:0): (Re)Setting client xauth list  and state
    *Mar  1 00:27:54.739: ISAKMP: local port 500, remote port 500
    *Mar  1 00:27:54.743: ISAKMP: Find a dup sa in the avl tree during calling 
                          isadb_insert sa = 82443410
    *Mar  1 00:27:54.743: ISAKMP (0:4): processing SA payload. message ID = 0
    *Mar  1 00:27:54.743: ISAKMP (0:4): processing ID payload. message ID = 0
    *Mar  1 00:27:54.743: ISAKMP (0:4): peer matches *none* of the profiles
    *Mar  1 00:27:54.743: ISAKMP (0:4): processing vendor id payload
    *Mar  1 00:27:54.743: ISAKMP (0:4): vendor ID seems Unity/DPD but major 215 mismatch
    *Mar  1 00:27:54.747: ISAKMP (0:4): vendor ID is XAUTH
    *Mar  1 00:27:54.747: ISAKMP (0:4): processing vendor id payload
    *Mar  1 00:27:54.747: ISAKMP (0:4): vendor ID is DPD
    *Mar  1 00:27:54.747: ISAKMP (0:4): processing vendor id payload
    *Mar  1 00:27:54.747: ISAKMP (0:4): vendor ID seems Unity/DPD but major 123 mismatch
    *Mar  1 00:27:54.747: ISAKMP (0:4): vendor ID is NAT-T v2
    *Mar  1 00:27:54.747: ISAKMP (0:4): processing vendor id payload
    *Mar  1 00:27:54.747: ISAKMP (0:4): vendor ID seems Unity/DPD but major 194 mismatch
    *Mar  1 00:27:54.751: ISAKMP (0:4): processing vendor id payload
    *Mar  1 00:27:54.751: ISAKMP (0:4): vendor ID is Unity
    *Mar  1 00:27:54.751: ISAKMP (0:4) Authentication by xauth preshared
    *Mar  1 00:27:54.751: ISAKMP (0:4): Checking ISAKMP transform 1 against 
                                        priority 20 policy
    *Mar  1 00:27:54.751: ISAKMP:      encryption AES-CBC
    *Mar  1 00:27:54.751: ISAKMP:      hash SHA
    *Mar  1 00:27:54.751: ISAKMP:      default group 2
    *Mar  1 00:27:54.751: ISAKMP:      auth XAUTHInitPreShared
    *Mar  1 00:27:54.751: ISAKMP:      life type in seconds
    *Mar  1 00:27:54.751: ISAKMP:      life duration (VPI) of  0x0 0x20 0xC4 0x9B
    *Mar  1 00:27:54.755: ISAKMP:      keylength of 256
    *Mar  1 00:27:54.755: ISAKMP (0:4): Encryption algorithm offered does not 
                                        match policy!
    *Mar  1 00:27:54.755: ISAKMP (0:4): atts are not acceptable. Next payload is 3
    *Mar  1 00:27:54.755: ISAKMP (0:4): Checking ISAKMP transform 2 against 
                                        priority 20 policy
    *Mar  1 00:27:54.755: ISAKMP:      encryption AES-CBC
    *Mar  1 00:27:54.755: ISAKMP:      hash MD5
    *Mar  1 00:27:54.755: ISAKMP:      default group 2
    *Mar  1 00:27:54.755: ISAKMP:      auth XAUTHInitPreShared
    *Mar  1 00:27:54.755: ISAKMP:      life type in seconds
    *Mar  1 00:27:54.755: ISAKMP:      life duration (VPI) of  0x0 0x20 0xC4 0x9B
    *Mar  1 00:27:54.759: ISAKMP:      keylength of 256
    *Mar  1 00:27:54.759: ISAKMP (0:4): Encryption algorithm offered does not 
                                        match policy!
    *Mar  1 00:27:54.759: ISAKMP (0:4): atts are not acceptable. Next payload is 3
    *Mar  1 00:27:54.759: ISAKMP (0:4): Checking ISAKMP transform 3 against 
                                        priority 20 policy
    *Mar  1 00:27:54.759: ISAKMP:      encryption AES-CBC
    *Mar  1 00:27:54.759: ISAKMP:      hash SHA
    *Mar  1 00:27:54.759: ISAKMP:      default group 2
    *Mar  1 00:27:54.759: ISAKMP:      auth pre-share
    *Mar  1 00:27:54.759: ISAKMP:      life type in seconds
    *Mar  1 00:27:54.759: ISAKMP:      life duration (VPI) of  0x0 0x20 0xC4 0x9B
    *Mar  1 00:27:54.759: ISAKMP:      keylength of 256
    *Mar  1 00:27:54.763: ISAKMP (0:4): Encryption algorithm offered does not match 
                                        policy!
    *Mar  1 00:27:54.763: ISAKMP (0:4): atts are not acceptable. Next payload is 3
    *Mar  1 00:27:54.763: ISAKMP (0:4): Checking ISAKMP transform 4 against priority 
                                        20 policy
    *Mar  1 00:27:54.763: ISAKMP:      encryption AES-CBC
    *Mar  1 00:27:54.763: ISAKMP:      hash MD5
    *Mar  1 00:27:54.763: ISAKMP:      default group 2
    *Mar  1 00:27:54.763: ISAKMP:      auth pre-share
    *Mar  1 00:27:54.763: ISAKMP:      life type in seconds
    *Mar  1 00:27:54.763: ISAKMP:      life duration (VPI) of  0x0 0x20 0xC4 0x9B
    *Mar  1 00:27:54.763: ISAKMP:      keylength of 256
    *Mar  1 00:27:54.763: ISAKMP (0:4): Encryption algorithm offered does not match 
                                        policy!
    *Mar  1 00:27:54.767: ISAKMP (0:4): atts are not acceptable. Next payload is 3
    *Mar  1 00:27:54.767: ISAKMP (0:4): Checking ISAKMP transform 5 against priority 
                                        20 policy
    *Mar  1 00:27:54.767: ISAKMP:      encryption AES-CBC
    *Mar  1 00:27:54.767: ISAKMP:      hash SHA
    *Mar  1 00:27:54.767: ISAKMP:      default group 2
    *Mar  1 00:27:54.767: ISAKMP:      auth XAUTHInitPreShared
    *Mar  1 00:27:54.767: ISAKMP:      life type in seconds
    *Mar  1 00:27:54.767: ISAKMP:      life duration (VPI) of  0x0 0x20 0xC4 0x9B
    *Mar  1 00:27:54.767: ISAKMP:      keylength of 192
    *Mar  1 00:27:54.767: ISAKMP (0:4): Encryption algorithm offered does not match 
                                        policy!
    *Mar  1 00:27:54.771: ISAKMP (0:4): atts are not acceptable. Next payload is 3
    *Mar  1 00:27:54.771: ISAKMP (0:4): Checking ISAKMP transform 6 against priority 
                                        20 policy
    *Mar  1 00:27:54.771: ISAKMP:      encryption AES-CBC
    *Mar  1 00:27:54.771: ISAKMP:      hash MD5
    *Mar  1 00:27:54.771: ISAKMP:      default group 2
    *Mar  1 00:27:54.771: ISAKMP:      auth XAUTHInitPreShared
    *Mar  1 00:27:54.771: ISAKMP:      life type in seconds
    *Mar  1 00:27:54.771: ISAKMP:      life duration (VPI) of  0x0 0x20 0xC4 0x9B
    *Mar  1 00:27:54.771: ISAKMP:      keylength of 192
    *Mar  1 00:27:54.771: ISAKMP (0:4): Encryption algorithm offered does not match 
                                        policy!
    *Mar  1 00:27:54.771: ISAKMP (0:4): atts are not acceptable. Next payload is 3
    *Mar  1 00:27:54.775: ISAKMP (0:4): Checking ISAKMP transform 7 against priority 
                                        20 policy
    *Mar  1 00:27:54.775: ISAKMP:      encryption AES-CBC
    *Mar  1 00:27:54.775: ISAKMP:      hash SHA
    *Mar  1 00:27:54.775: ISAKMP:      default group 2
    *Mar  1 00:27:54.775: ISAKMP:      auth pre-share
    *Mar  1 00:27:54.775: ISAKMP:      life type in seconds
    *Mar  1 00:27:54.775: ISAKMP:      life duration (VPI) of  0x0 0x20 0xC4 0x9B
    *Mar  1 00:27:54.775: ISAKMP:      keylength of 192
    *Mar  1 00:27:54.775: ISAKMP (0:4): Encryption algorithm 1 00:27:54.783: ISAKMP:      
     hash SHAoffered does not match policy!
    *Mar  1 00:27:54.775: ISAKMP (0:4): atts are not acceptable. Next payload is 3
    *Mar  1 00:27:54.775: ISAKMP (0:4): Checking ISAKMP transform 8 against priority 
                                        20 policy
    *Mar  1 00:27:54.779: ISAKMP:      encryption AES-CBC
    *Mar  1 00:27:54.779: ISAKMP:      hash MD5
    *Mar  1 00:27:54.779: ISAKMP:      default group 2
    *Mar  1 00:27:54.779: ISAKMP:      auth pre-share
    *Mar  1 00:27:54.779: ISAKMP:      life type in seconds
    *Mar  1 00:27:54.779: ISAKMP:      life duration (VPI) of  0x0 0x20 0xC4 0x9B
    *Mar  1 00:27:54.779: ISAKMP:      keylength of 192
    *Mar  1 00:27:54.779: ISAKMP (0:4): Encryption algorithm offered does not match 
                                        policy!
    *Mar  1 00:27:54.779: ISAKMP (0:4): atts are not acceptable. Next payload is 3
    *Mar  1 00:27:54.779: ISAKMP (0:4): Checking ISAKMP transform 9 against priority 
                                        20 policy
    *Mar  1 00:27:54.783: ISAKMP:      encryption AES-CBC
    *Mar
    *Mar  1 00:27:54.783: ISAKMP:      default group 2
    *Mar  1 00:27:54.783: ISAKMP:      auth XAUTHInitPreShared
    *Mar  1 00:27:54.783: ISAKMP:      life type in seconds
    *Mar  1 00:27:54.783: ISAKMP:      life duration (VPI) of  0x0 0x20 0xC4 0x9B
    *Mar  1 00:27:54.783: ISAKMP:      keylength of 128
    *Mar  1 00:27:54.783: ISAKMP (0:4): Encryption algorithm offered does not match 
                                        policy!
    *Mar  1 00:27:54.783: ISAKMP (0:4): atts are not acceptable. Next payload is 3
    *Mar  1 00:27:54.783: ISAKMP (0:4): Checking ISAKMP transform 10 against 
                                        priority 20 policy
    *Mar  1 00:27:54.783: ISAKMP:      encryption AES-CBC
    *Mar  1 00:27:54.787: ISAKMP:      hash MD5
    *Mar  1 00:27:54.787: ISAKMP:      default group 2
    *Mar  1 00:27:54.787: ISAKMP:      auth XAUTHInitPreShared
    *Mar  1 00:27:54.787: ISAKMP:      life type in seconds
    *Mar  1 00:27:54.787: ISAKMP:      life duration (VPI) of  0x0 0x20 0xC4 0x9B
    *Mar  1 00:27:54.787: ISAKMP:      keylength of 128
    *Mar  1 00:27:54.787: ISAKMP (0:4): Encryption algorithm offered does not match 
                                        policy!
    *Mar  1 00:27:54.787: ISAKMP (0:4): atts are not acceptable. Next payload is 3
    *Mar  1 00:27:54.787: ISAKMP (0:4): Checking ISAKMP transform 11 against 
                                        priority 20 policy
    *Mar  1 00:27:54.787: ISAKMP:      encryption AES-CBC
    *Mar  1 00:27:54.787: ISAKMP:      hash SHA
    *Mar  1 00:27:54.791: ISAKMP:      default group 2
    *Mar  1 00:27:54.791: ISAKMP:      auth pre-share
    *Mar  1 00:27:54.791: ISAKMP:      life type in seconds
    *Mar  1 00:27:54.791: ISAKMP:      life duration (VPI) of  0x0 0x20 0xC4 0x9B
    *Mar  1 00:27:54.791: ISAKMP:      keylength of 128
    *Mar  1 00:27:54.791: ISAKMP (0:4): Encryption algorithm offered does not 
                                        match policy!
    *Mar  1 00:27:54.791: ISAKMP (0:4): atts are not acceptable. Next payload is 3
    *Mar  1 00:27:54.791: ISAKMP (0:4): Checking ISAKMP transform 12 against 
                                         priority 20 policy
    *Mar  1 00:27:54.791: ISAKMP:      encryption AES-CBC
    *Mar  1 00:27:54.791: ISAKMP:      hash MD5
    *Mar  1 00:27:54.791: ISAKMP:      default group 2
    *Mar  1 00:27:54.795: ISAKMP:      auth pre-share
    *Mar  1 00:27:54.795: ISAKMP:      life type in seconds
    *Mar  1 00:27:54.795: ISAKMP:      life duration (VPI) of  0x0 0x20 0xC4 0x9B
    *Mar  1 00:27:54.795: ISAKMP:      keylength of 128
    *Mar  1 00:27:54.795: ISAKMP (0:4): Encryption algorithm offered does not 
                                         match policy!
    *Mar  1 00:27:54.795: ISAKMP (0:4): atts are not acceptable. Next payload 
                                        7:54.795: ISAKMP:      hash SHAis 3
    *Mar  1 00:27:54.795: ISAKMP (0:4): Checking ISAKMP transform 13 against 
                                        priority 20 policy
    *Mar  1 00:27:54.795: ISAKMP:      encryption 3DES-CBC
    *Mar  1 00:2
    *Mar  1 00:27:54.795: ISAKMP:      default group 2
    *Mar  1 00:27:54.795: ISAKMP:      auth XAUTHInitPreShared
    *Mar  1 00:27:54.799: ISAKMP:      life type in seconds
    *Mar  1 00:27:54.799: ISAKMP:      life duration (VPI) of  0x0 0x20 0xC4 0x9B
    *Mar  1 00:27:54.799: ISAKMP (0:4): Hash algorithm offered does not match policy!
    *Mar  1 00:27:54.799: ISAKMP (0:4): atts are not acceptable. Next payload is 3
    *Mar  1 00:27:54.799: ISAKMP (0:4): Checking ISAKMP transform 14 against 
                                        priority 20 policy
    *Mar  1 00:27:54.799: ISAKMP:      encryption 3DES-CBC
    *Mar  1 00:27:54.799: ISAKMP:      hash MD5
    *Mar  1 00:27:54.799: ISAKMP:      default group 2
    *Mar  1 00:27:54.799: ISAKMP:      auth XAUTHInitPreShared
    *Mar  1 00:27:54.799: ISAKMP:      life type in seconds
    *Mar  1 00:27:54.803: ISAKMP:      life duration (VPI) of  0x0 0x20 0xC4 0x9B
    *Mar  1 00:27:54.803: ISAKMP (0:4): atts are acceptable. Next payload is 3
    *Mar  1 00:27:55.015: ISAKMP (0:4): processing KE payload. message ID = 0
    *Mar  1 00:27:55.287: ISAKMP (0:4): processing NONCE payload. message ID = 0
    *Mar  1 00:27:55.287: ISAKMP (0:4): vendor ID is NAT-T v2
    *Mar  1 00:27:55.287: ISAKMP (0:4): Input = IKE_MESG_FROM_PEER, IKE_AM_EXCH
    *Mar  1 00:27:55.291: ISAKMP (0:4): Old State = IKE_READY  New State = 
                                        IKE_R_AM_AAA_AWAIT
    
    *Mar  1 00:27:55.291: ISAKMP: got callback 1
    *Mar  1 00:27:55.295: ISAKMP (0:4): SKEYID state generated
    *Mar  1 00:27:55.299: ISAKMP (0:4): constructed NAT-T vendor-02 ID
    *Mar  1 00:27:55.299: ISAKMP (0:4): SA is doing pre-shared key authentication 
                                        plus XAUTH using id type ID_IPV4_ADDR
    *Mar  1 00:27:55.299: ISAKMP (4): ID payload
            next-payload : 10
            type         : 1
            addr         : 172.16.142.191
            protocol     : 17
            port         : 0
            length       : 8
    *Mar  1 00:27:55.299: ISAKMP (4): Total payload length: 12
    *Mar  1 00:27:55.303: ISAKMP (0:4): constructed HIS NAT-D
    *Mar  1 00:27:55.303: ISAKMP (0:4): constructed MINE NAT-D
    *Mar  1 00:27:55.303: ISAKMP (0:4): sending packet to 171.69.89.82 
                                        my_port 500 peer_port 500 (R) AG_INIT_EXCH
    *Mar  1 00:27:55.303: ISAKMP (0:4): Input = IKE_MESG_FROM_AAA, 
                                         PRESHARED_KEY_REPLY
    *Mar  1 00:27:55.303: ISAKMP (0:4): Old State = IKE_R_AM_AAA_AWAIT  
                                        New State = IKE_R_AM2
    
    *Mar  1 00:27:55.391: ISAKMP (0:4): received packet from 171.69.89.82 
                                        dport 4500 sport 4500 Global (R) AG_INIT_EXCH
    *Mar  1 00:27:55.395: ISAKMP (0:4): processing HASH payload. message ID = 0
    *Mar  1 00:27:55.395: ISAKMP (0:4): processing NOTIFY INITIAL_CONTACT protocol 1
            spi 0, message ID = 0, sa = 82443410
    *Mar  1 00:27:55.399: ISAKMP (0:4): Process initial contact,
    bring down existing phase 1 and 2 SA's with local 172.16.142.191 
                                      remote 171.69.89.82 remote port 4500
    *Mar  1 00:27:55.399: ISAKMP (0:4): returning IP addr to the address pool
    *Mar  1 00:27:55.399: ISAKMP:received payload type 17
    *Mar  1 00:27:55.399: ISAKMP (0:4): Detected NAT-D payload
    *Mar  1 00:27:55.399: ISAKMP (0:4): recalc my hash for NAT-D
    *Mar  1 00:27:55.399: ISAKMP (0:4): NAT match MINE hash
    *Mar  1 00:27:55.399: ISAKMP:received payload type 17
    *Mar  1 00:27:55.399: ISAKMP (0:4): Detected NAT-D payload
    *Mar  1 00:27:55.399: ISAKMP (0:4): recalc his hash for NAT-D
    *Mar  1 00:27:55.403: ISAKMP (0:4): NAT does not match HIS hash
    *Mar  1 00:27:55.403: hash received: 93 31 EB 5E 30 E2 A0 C4 D3 6F 3E B1 B7 
                                         F AE C3
    *Mar  1 00:27:55.403: his nat hash : 14 64 77 EC E8 DC 78 B9 F9 DC 2B 46 
                                         CB E8 1D 4
    *Mar  1 00:27:55.403: ISAKMP (0:4): SA has been authenticated with 171.69.89.82
    *Mar  1 00:27:55.407: ISAKMP (0:4): Detected port floating to port = 4500
    *Mar  1 00:27:55.407: ISAKMP: Trying to insert a peer 171.69.89.82/4500/,  
                                  and inserted successfully.
    *Mar  1 00:27:55.407: ISAKMP (0:4): IKE_DPD is enabled, initializing timers
    *Mar  1 00:27:55.407: ISAKMP: set new node 772423690 to CONF_XAUTH
    *Mar  1 00:27:55.411: ISAKMP (0:4): sending packet to 171.69.89.82 my_port 
                                         4500 peer_port 4500 (R) QM_IDLE
    *Mar  1 00:27:55.411: ISAKMP (0:4): purging node 772423690
    *Mar  1 00:27:55.411: ISAKMP: Sending phase 1 responder lifetime 86400
    
    *Mar  1 00:27:55.411: ISAKMP (0:4): peer matches *none* of the profiles
    *Mar  1 00:27:55.411: ISAKMP (0:4): Input = IKE_MESG_FROM_PEER, IKE_AM_EXCH
    *Mar  1 00:27:55.411: ISAKMP (0:4): Old State = IKE_R_AM2  New State = 
                                       IKE_P1_COMPLETE
    
    *Mar  1 00:27:55.415: IPSEC(key_engine): got a queue event...
    *Mar  1 00:27:55.415: ISAKMP (0:4): Need XAUTH
    *Mar  1 00:27:55.415: ISAKMP (0:4): Input = IKE_MESG_INTERNAL, 
                                        IKE_PHASE1_COMPLETE
    *Mar  1 00:27:55.415: ISAKMP (0:4): Old State = IKE_P1_COMPLETE  
                                        New State = IKE_XAUTH_AAA_START_LOGIN_AWAIT
    
    *Mar  1 00:27:55.419: ISAKMP: got callback 1
    *Mar  1 00:27:55.419: ISAKMP: set new node -266369278 to CONF_XAUTH
    *Mar  1 00:27:55.419: ISAKMP/xauth: request attribute XAUTH_USER_NAME_V2
    *Mar  1 00:27:55.419: ISAKMP/xauth: request attribute XAUTH_USER_PASSWORD_V2
    *Mar  1 00:27:55.419: ISAKMP (0:4): initiating peer config to 171.69.89.82. 
                                       ID = -266369278
    *Mar  1 00:27:55.423: ISAKMP (0:4): sending packet to 171.69.89.82 my_port 
                                        4500 peer_port 4500 (R) CONF_XAUTH
    *Mar  1 00:27:55.423: ISAKMP (0:4): Input = IKE_MESG_FROM_AAA, 
                                        IKE_AAA_START_LOGIN
    *Mar  1 00:27:55.423: ISAKMP (0:4): Old State = IKE_XAUTH_AAA_START_LOGIN_AWAIT  
                                        New State = IKE_XAUTH_REQ_SENT
    
    *Mar  1 00:27:55.959: ISAKMP (0:3): purging node 1153289263
    *Mar  1 00:28:00.423: ISAKMP (0:4): retransmitting phase 2 CONF_XAUTH    
                                       -266369278 ...
    *Mar  1 00:28:00.423: ISAKMP (0:4): incrementing error counter on sa: 
                                         retransmit phase 2
    *Mar  1 00:28:00.423: ISAKMP (0:4): incrementing error counter on sa: 
                                         retransmit phase 2
    *Mar  1 00:28:00.423: ISAKMP (0:4): retransmitting phase 2 -266369278 CONF_XAUTH
    *Mar  1 00:28:00.423: ISAKMP (0:4): sending packet to 171.69.89.82 my_port 
                                        4500 peer_port 4500 (R) CONF_XAUTH
    *Mar  1 00:28:02.635: ISAKMP (0:4): received packet from 171.69.89.82 dport 
                                        4500 sport 4500 Global (R) CONF_XAUTH
    *Mar  1 00:28:02.635: ISAKMP (0:4): processing transaction payload from 
                                        171.69.89.82. message ID = -266369278
    *Mar  1 00:28:02.639: ISAKMP: Config payload REPLY
    *Mar  1 00:28:02.639: ISAKMP/xauth: reply attribute XAUTH_USER_NAME_V2
    *Mar  1 00:28:02.639: ISAKMP/xauth: reply attribute XAUTH_USER_PASSWORD_V2
    *Mar  1 00:28:02.639: ISAKMP (0:4): deleting node -266369278 error FALSE 
                                        reason "done with xauth request/reply exchange"
    *Mar  1 00:28:02.639: ISAKMP (0:4): Input = IKE_MESG_FROM_PEER, IKE_CFG_REPLY
    *Mar  1 00:28:02.639: ISAKMP (0:4): Old State = IKE_XAUTH_REQ_SENT  
                                        New State = IKE_XAUTH_AAA_CONT_LOGIN_AWAIT
    
    *Mar  1 00:28:02.643: ISAKMP: got callback 1
    *Mar  1 00:28:02.643: ISAKMP: set new node -1548124746 to CONF_XAUTH
    *Mar  1 00:28:02.643: ISAKMP (0:4): initiating peer config to 171.69.89.82. 
                                  ID = -1548124746
    *Mar  1 00:28:02.647: ISAKMP (0:4): sending packet to 171.69.89.82 my_port 
                                        4500 peer_port 4500 (R) CONF_XAUTH
    *Mar  1 00:28:02.647: ISAKMP (0:4): Input = IKE_MESG_FROM_AAA, 
                                        IKE_AAA_CONT_LOGIN
    *Mar  1 00:28:02.647: ISAKMP (0:4): Old State = IKE_XAUTH_AAA_CONT_LOGIN_AWAIT  
                                        New State = IKE_XAUTH_SET_SENT
    
    *Mar  1 00:28:02.663: ISAKMP (0:4): received packet from 171.69.89.82 dport 
                                        4500 sport 4500 Global (R) CONF_XAUTH
    *Mar  1 00:28:02.663: ISAKMP (0:4): processing transaction payload from 
                                         171.69.89.82. message ID = -1548124746
    *Mar  1 00:28:02.663: ISAKMP: Config payload ACK
    *Mar  1 00:28:02.663: ISAKMP (0:4):        XAUTH ACK Processed
    *Mar  1 00:28:02.667: ISAKMP (0:4): deleting node -1548124746 error FALSE 
                                        reason "done with transaction"
    *Mar  1 00:28:02.667: ISAKMP (0:4): Input = IKE_MESG_FROM_PEER, IKE_CFG_ACK
    *Mar  1 00:28:02.667: ISAKMP (0:4): Old State = IKE_XAUTH_SET_SENT  
                                         New State = IKE_P1_COMPLETE
    
    *Mar  1 00:28:02.667: ISAKMP (0:4): Input = IKE_MESG_INTERNAL, 
                                        IKE_PHASE1_COMPLETE
    *Mar  1 00:28:02.667: ISAKMP (0:4): Old State = IKE_P1_COMPLETE  
                                         New State = IKE_P1_COMPLETE
    
    *Mar  1 00:28:02.675: ISAKMP (0:4): received packet from 171.69.89.82 
                                        dport 4500 sport 4500 Global (R) QM_IDLE
    *Mar  1 00:28:02.675: ISAKMP: set new node 1973520613 to QM_IDLE
    *Mar  1 00:28:02.679: ISAKMP (0:4): processing transaction payload from 
                                        171.69.89.82. message ID = 1973520613
    *Mar  1 00:28:02.679: ISAKMP: Config payload REQUEST
    *Mar  1 00:28:02.679: ISAKMP (0:4): checking request:
    *Mar  1 00:28:02.679: ISAKMP:    IP4_ADDRESS
    *Mar  1 00:28:02.679: ISAKMP:    IP4_NETMASK
    *Mar  1 00:28:02.679: ISAKMP:    IP4_DNS
    *Mar  1 00:28:02.683: ISAKMP:    IP4_NBNS
    *Mar  1 00:28:02.683: ISAKMP:    ADDRESS_EXPIRY
    *Mar  1 00:28:02.683: ISAKMP:    APPLICATION_VERSION
    *Mar  1 00:28:02.683: ISAKMP:    UNKNOWN Unknown Attr: 0x7000
    *Mar  1 00:28:02.683: ISAKMP:    UNKNOWN Unknown Attr: 0x7001
    *Mar  1 00:28:02.683: ISAKMP:    DEFAULT_DOMAIN
    *Mar  1 00:28:02.683: ISAKMP:    SPLIT_INCLUDE
    *Mar  1 00:28:02.683: ISAKMP:    UNKNOWN Unknown Attr: 0x7003
    *Mar  1 00:28:02.683: ISAKMP:    UNKNOWN Unknown Attr: 0x7007
    *Mar  1 00:28:02.683: ISAKMP:    UNKNOWN Unknown Attr: 0x7008
    *Mar  1 00:28:02.683: ISAKMP:    UNKNOWN Unknown Attr: 0x7009
    *Mar  1 00:28:02.687: ISAKMP:    UNKNOWN Unknown Attr: 0x700A
    *Mar  1 00:28:02.687: ISAKMP (0:4): Input = IKE_MESG_FROM_PEER, 
                                        IKE_CFG_REQUEST
    *Mar  1 00:28:02.687: ISAKMP (0:4): Old State = IKE_P1_COMPLETE  
                                        New State = IKE_CONFIG_AUTHOR_AAA_AWAIT
    
    *Mar  1 00:28:02.691: ISAKMP: got callback 1
    *Mar  1 00:28:02.695: ISAKMP (0:4): attributes sent in message:
    *Mar  1 00:28:02.695:         Address: 0.2.0.0
    *Mar  1 00:28:02.695: ISAKMP (0:4): allocating address 192.168.1.3
    *Mar  1 00:28:02.695: ISAKMP: Sending private address: 192.168.1.3
    *Mar  1 00:28:02.695: ISAKMP: Sending ADDRESS_EXPIRY seconds left to 
                                  use the address: 86392
    *Mar  1 00:28:02.695: ISAKMP: Sending APPLICATION_VERSION string: 
                                  Cisco Internetwork Operating System Software
    IOS (tm) C2600 Software (C2600-IK9O3S3-M), Version 12.2(13.7)T1,  
                                   MAINTENANCE INTERIM SOFTWARE
    TAC Support: http://www.cisco.com/tac
    Copyright (c) 1986-2002 by cisco Systems, Inc.
    Compiled Sat 21-Dec-02 14:10 by ccai
    *Mar  1 00:28:02.699: ISAKMP (0/4): Unknown Attr: UNKNOWN (0x7000)
    *Mar  1 00:28:02.699: ISAKMP (0/4): Unknown Attr: UNKNOWN (0x7001)
    *Mar  1 00:28:02.699: ISAKMP: Sending split include name 120 network 
                                  10.100.100.0 mask 255.255.255.0 protocol 0, 
                                  src port 0, dst port 0
    
    *Mar  1 00:28:02.699: ISAKMP (0/4): Unknown Attr: UNKNOWN (0x7003)
    *Mar  1 00:28:02.699: ISAKMP (0/4): Unknown Attr: UNKNOWN (0x7007)
    *Mar  1 00:28:02.699: ISAKMP (0/4): Unknown Attr: UNKNOWN (0x7008)
    *Mar  1 00:28:02.699: ISAKMP (0/4): Unknown Attr: UNKNOWN (0x7009)
    *Mar  1 00:28:02.699: ISAKMP (0/4): Unknown Attr: UNKNOWN (0x700A)
    *Mar  1 00:28:02.703: ISAKMP (0:4): responding to peer config from 
                                        171.69.89.82. ID = 1973520613
    *Mar  1 00:28:02.703: ISAKMP (0:4): sending packet to 171.69.89.82 my_port 
                                        4500 peer_port 4500 (R) CONF_ADDR
    *Mar  1 00:28:02.707: ISAKMP (0:4): deleting node 1973520613 error FALSE
                                        reason ""
    *Mar  1 00:28:02.707: ISAKMP (0:4): Input = IKE_MESG_FROM_AAA, 
                                        IKE_AAA_GROUP_ATTR
    *Mar  1 00:28:02.707: ISAKMP (0:4): Old State = IKE_CONFIG_AUTHOR_AAA_AWAIT  
                                        New State = IKE_P1_COMPLETE
    
    *Mar  1 00:28:02.775: ISAKMP (0:4): received packet from 171.69.89.82 
                                        dport 4500 sport 4500 Global (R) QM_IDLE
    *Mar  1 00:28:02.775: ISAKMP: set new node 1783469429 to QM_IDLE
    *Mar  1 00:28:02.787: ISAKMP (0:4): processing HASH payload. message 
                                        ID = 1783469429
    *Mar  1 00:28:02.787: ISAKMP (0:4): processing SA payload. message 
                                        ID = 1783469429
    *Mar  1 00:28:02.787: ISAKMP (0:4): Checking IPSec proposal 1
    *Mar  1 00:28:02.787: ISAKMP: transform 1, ESP_AES
    *Mar  1 00:28:02.787: ISAKMP:   attributes in transform:
    *Mar  1 00:28:02.787: ISAKMP:      authenticator is HMAC-MD5
    *Mar  1 00:28:02.787: ISAKMP:      encaps is 61443
    *Mar  1 00:28:02.791: ISAKMP:      key length is 256
    *Mar  1 00:28:02.791: ISAKMP:      SA life type in seconds
    *Mar  1 00:28:02.791: ISAKMP:      SA life duration (VPI) of  0x0 0x20 0xC4 0x9B
    *Mar  1 00:28:02.791: ISAKMP (0:4): atts are acceptable.
    *Mar  1 00:28:02.791: ISAKMP (0:4): Checking IPSec proposal 1
    *Mar  1 00:28:02.791: ISAKMP (0:4): transform 1, IPPCP LZS
    *Mar  1 00:28:02.791: ISAKMP:   attributes in transform:
    *Mar  1 00:28:02.791: ISAKMP:      encaps is 61443
    *Mar  1 00:28:02.795: ISAKMP:      SA life type in seconds
    *Mar  1 00:28:02.795: ISAKMP:      SA life duration (VPI) of  0x0 0x20 0xC4 0x9B
    *Mar  1 00:28:02.795: ISAKMP (0:4): atts are acceptable.
    *Mar  1 00:28:02.795: IPSEC(validate_proposal_request): proposal part #1,
      (key eng. msg.) INBOUND local= 172.16.142.191, remote= 171.69.89.82,
        local_proxy= 172.16.142.191/255.255.255.255/0/0 (type=1),
        remote_proxy= 192.168.1.3/255.255.255.255/0/0 (type=1),
        protocol= ESP, transform= esp-aes 256 esp-md5-hmac ,
        lifedur= 0s and 0kb,
        spi= 0x0(0), conn_id= 0, keysize= 256, flags= 0x400
    *Mar  1 00:28:02.799: IPSEC(validate_proposal_request): proposal part #2,
      (key eng. msg.) INBOUND local= 172.16.142.191, remote= 171.69.89.82,
        local_proxy= 172.16.142.191/255.255.255.255/0/0 (type=1),
        remote_proxy= 192.168.1.3/255.255.255.255/0/0 (type=1),
        protocol= PCP, transform= comp-lzs ,
        lifedur= 0s and 0kb,
        spi= 0x0(0), conn_id= 0, keysize= 0, flags= 0x400
    *Mar  1 00:28:02.799: IPSEC(kei_proxy): head = test, map->ivrf = , kei->ivrf =
    *Mar  1 00:28:02.799: IPSEC(validate_transform_proposal): no IPSEC cryptomap 
                           exists for local address 172.16.142.191
    *Mar  1 00:28:02.799: ISAKMP (0:4): IPSec policy invalidated proposal
    *Mar  1 00:28:02.803: ISAKMP (0:4): Checking IPSec proposal 2
    *Mar  1 00:28:02.803: ISAKMP: transform 1, ESP_AES
    *Mar  1 00:28:02.803: ISAKMP:   attributes in transform:
    *Mar  1 00:28:02.803: ISAKMP:      authenticator is HMAC-SHA
    *Mar  1 00:28:02.803: ISAKMP:      encaps is 61443
    *Mar  1 00:28:02.803: ISAKMP:      key length is 256
    *Mar  1 00:28:02.803: ISAKMP:      SA life type in seconds
    *Mar  1 00:28:02.803: ISAKMP:      SA life duration (VPI) of  0x0 
                                      0x20 0xC4 0x9B
    *Mar  1 00:28:02.803: ISAKMP (0:4): atts are acceptable.
    *Mar  1 00:28:02.807: ISAKMP (0:4): Checking IPSec proposal 2
    *Mar  1 00:28:02.807: ISAKMP (0:4): transform 1, IPPCP LZS
    *Mar  1 00:28:02.807: ISAKMP:   attributes in transform:
    *Mar  1 00:28:02.807: ISAKMP:      encaps is 61443
    *Mar  1 00:28:02.807: ISAKMP:      SA life type in seconds
    *Mar  1 00:28:02.807: ISAKMP:      SA life duration (VPI) of  0x0 
                                       0x20 0xC4 0x9B
    *Mar  1 00:28:02.807: ISAKMP (0:4): atts are acceptable.
    *Mar  1 00:28:02.807: IPSEC(validate_proposal_request): proposal part #1,
      (key eng. msg.) INBOUND local= 172.16.142.191, remote= 171.69.89.82,
        local_proxy= 172.16.142.191/255.255.255.255/0/0 (type=1),
        remote_proxy= 192.168.1.3/255.255.255.255/0/0 (type=1),
        protocol= ESP, transform= esp-aes 256 esp-sha-hmac ,
        lifedur= 0s and 0kb,
        spi= 0x0(0), conn_id= 0, keysize= 256, flags= 0x400
    *Mar  1 00:28:02.811: IPSEC(validate_proposal_request): proposal part #2,
      (key eng. msg.) INBOUND local= 172.16.142.191, remote= 171.69.89.82,
        local_proxy= 172.16.142.191/255.255.255.255/0/0 (type=1),
        remote_proxy= 192.168.1.3/255.255.255.255/0/0 (type=1),
        protocol= PCP, transform= comp-lzs ,
        lifedur= 0s and 0kb,
        spi= 0x0(0), conn_id= 0, keysize= 0, flags= 0x400
    *Mar  1 00:28:02.815: IPSEC(kei_proxy): head = test, map->ivrf = , kei->ivrf =
    *Mar  1 00:28:02.815: IPSEC(validate_transform_proposal): no IPSEC 
                           cryptomap exists for local address 172.16.142.191
    *Mar  1 00:28:02.815: ISAKMP (0:4): IPSec policy invalidated proposal
    *Mar  1 00:28:02.815: ISAKMP (0:4): Checking IPSec proposal 3
    *Mar  1 00:28:02.815: ISAKMP: transform 1, ESP_AES
    *Mar  1 00:28:02.815: ISAKMP:   attributes in transform:
    *Mar  1 00:28:02.815: ISAKMP:      authenticator is HMAC-MD5
    *Mar  1 00:28:02.815: ISAKMP:      encaps is 61443
    *Mar  1 00:28:02.815: ISAKMP:      key length is 128
    *Mar  1 00:28:02.819: ISAKMP:      SA life type in seconds
    *Mar  1 00:28:02.819: ISAKMP:      SA life duration (VPI) of  0x0 0x20 
                                       0xC4 0x9B
    *Mar  1 00:28:02.819: ISAKMP (0:4): atts are acceptable.
    *Mar  1 00:28:02.819: ISAKMP (0:4): Checking IPSec proposal 3
    *Mar  1 00:28:02.819: ISAKMP (0:4): transform 1, IPPCP LZS
    *Mar  1 00:28:02.819: ISAKMP:   attributes in transform:
    *Mar  1 00:28:02.819: ISAKMP:      encaps is 61443
    *Mar  1 00:28:02.819: ISAKMP:      SA life type in seconds
    *Mar  1 00:28:02.823: ISAKMP:      SA life duration (VPI) of  0x0 0x20 
                                       0xC4 0x9B
    *Mar  1 00:28:02.823: ISAKMP (0:4): atts are acceptable.
    *Mar  1 00:28:02.823: IPSEC(validate_proposal_request): proposal part #1,
      (key eng. msg.) INBOUND local= 172.16.142.191, remote= 171.69.89.82,
        local_proxy= 172.16.142.191/255.255.255.255/0/0 (type=1),
        remote_proxy= 192.168.1.3/255.255.255.255/0/0 (type=1),
        protocol= ESP, transform= esp-aes esp-md5-hmac ,
        lifedur= 0s and 0kb,
        spi= 0x0(0), conn_id= 0, keysize= 128, flags= 0x400
    *Mar  1 00:28:02.827: IPSEC(validate_proposal_request): proposal part #2,
      (key eng. msg.) INBOUND local= 172.16.142.191, remote= 171.69.89.82,
        local_proxy= 172.16.142.191/255.255.255.255/0/0 (type=1),
        remote_proxy= 192.168.1.3/255.255.255.255/0/0 (type=1),
        protocol= PCP, transform= comp-lzs ,
        lifedur= 0s and 0kb,
        spi= 0x0(0), conn_id= 0, keysize= 0, flags= 0x400
    *Mar  1 00:28:02.827: IPSEC(kei_proxy): head = test, map->ivrf = , kei->ivrf =
    *Mar  1 00:28:02.827: IPSEC(validate_transform_proposal): no IPSEC 
                          cryptomap exists for local address 172.16.142.191
    *Mar  1 00:28:02.827: ISAKMP (0:4): IPSec policy invalidated proposal
    *Mar  1 00:28:02.831: ISAKMP (0:4): Checking IPSec proposal 4
    *Mar  1 00:28:02.831: ISAKMP: transform 1, ESP_AES
    *Mar  1 00:28:02.831: ISAKMP:   attributes in transform:
    *Mar  1 00:28:02.831: ISAKMP:      authenticator is HMAC-SHA
    *Mar  1 00:28:02.831: ISAKMP:      encaps is 61443
    *Mar  1 00:28:02.831: ISAKMP:      key length is 128
    *Mar  1 00:28:02.831: ISAKMP:      SA life type in seconds
    *Mar  1 00:28:02.831: ISAKMP:      SA life duration (VPI) of  0x0 
                                       0x20 0xC4 0x9B
    *Mar  1 00:28:02.831: ISAKMP (0:4): atts are acceptable.
    *Mar  1 00:28:02.835: ISAKMP (0:4): Checking IPSec proposal 4
    *Mar  1 00:28:02.835: ISAKMP (0:4): transform 1, IPPCP LZS
    *Mar  1 00:28:02.835: ISAKMP:   attributes in transform:
    *Mar  1 00:28:02.835: ISAKMP:      encaps is 61443
    *Mar  1 00:28:02.835: ISAKMP:      SA life type in seconds
    *Mar  1 00:28:02.835: ISAKMP:      SA life duration (VPI) of  0x0 0x20 
                                       0xC4 0x9B
    *Mar  1 00:28:02.835: ISAKMP (0:4): atts are acceptable.
    *Mar  1 00:28:02.835: IPSEC(validate_proposal_request): proposal part #1,
      (key eng. msg.) INBOUND local= 172.16.142.191, remote= 171.69.89.82,
        local_proxy= 172.16.142.191/255.255.255.255/0/0 (type=1),
        remote_proxy= 192.168.1.3/255.255.255.255/0/0 (type=1),
        protocol= ESP, transform= esp-aes esp-sha-hmac ,
        lifedur= 0s and 0kb,
        spi= 0x0(0), conn_id= 0, keysize= 128, flags= 0x400
    *Mar  1 00:28:02.839: IPSEC(validate_proposal_request): proposal part #2,
      (key eng. msg.) INBOUND local= 172.16.142.191, remote= 171.69.89.82,
        local_proxy= 172.16.142.191/255.255.255.255/0/0 (type=1),
        remote_proxy= 192.168.1.3/255.255.255.255/0/0 (type=1),
        protocol= PCP, transform= comp-lzs ,
        lifedur= 0s and 0kb,
        spi= 0x0(0), conn_id= 0, keysize= 0, flags= 0x400
    *Mar  1 00:28:02.843: IPSEC(kei_proxy): head = test, map->ivrf = , kei->ivrf =
    *Mar  1 00:28:02.843: IPSEC(validate_transform_proposal): no IPSEC 
                           cryptomap exists for local address 172.16.142.191
    *Mar  1 00:28:02.843: ISAKMP (0:4): IPSec policy invalidated proposal
    *Mar  1 00:28:02.843: ISAKMP (0:4): Checking IPSec proposal 5
    *Mar  1 00:28:02.843: ISAKMP: transform 1, ESP_AES
    *Mar  1 00:28:02.843: ISAKMP:   attributes in transform:
    *Mar  1 00:28:02.843: ISAKMP:      authenticator is HMAC-MD5
    *Mar  1 00:28:02.843: ISAKMP:      encaps is 61443
    *Mar  1 00:28:02.843: ISAKMP:      key length is 256
    *Mar  1 00:28:02.847: ISAKMP:      SA life type in seconds
    *Mar  1 00:28:02.847: ISAKMP:      SA life duration (VPI) of  0x0 
                                       0x20 0xC4 0x9B
    *Mar  1 00:28:02.847: ISAKMP (0:4): atts are acceptable.
    *Mar  1 00:28:02.847: IPSEC(validate_proposal_request): proposal part #1,
      (key eng. msg.) INBOUND local= 172.16.142.191, remote= 171.69.89.82,
        local_proxy= 172.16.142.191/255.255.255.255/0/0 (type=1),
        remote_proxy= 192.168.1.3/255.255.255.255/0/0 (type=1),
        protocol= ESP, transform= esp-aes 256 esp-md5-hmac ,
        lifedur= 0s and 0kb,
        spi= 0x0(0), conn_id= 0, keysize= 256, flags= 0x400
    *Mar  1 00:28:02.851: IPSEC(kei_proxy): head = test, map->ivrf = , kei->ivrf =
    *Mar  1 00:28:02.851: IPSEC(validate_transform_proposal): no IPSEC 
                          cryptomap exists for local address 172.16.142.191
    *Mar  1 00:28:02.851: ISAKMP (0:4): IPSec policy invalidated proposal
    *Mar  1 00:28:02.851: ISAKMP (0:4): Checking IPSec proposal 6
    *Mar  1 00:28:02.851: ISAKMP: transform 1, ESP_AES
    *Mar  1 00:28:02.851: ISAKMP:   attributes in transform:
    *Mar  1 00:28:02.851: ISAKMP:      authenticator is HMAC-SHA
    *Mar  1 00:28:02.855: ISAKMP:      encaps is 61443
    *Mar  1 00:28:02.855: ISAKMP:      key length is 256
    *Mar  1 00:28:02.855: ISAKMP:      SA life type in seconds
    *Mar  1 00:28:02.855: ISAKMP:      SA life duration (VPI) of  0x0 
                                       0x20 0xC4 0x9B
    *Mar  1 00:28:02.855: ISAKMP (0:4): atts are acceptable.
    *Mar  1 00:28:02.855: IPSEC(validate_proposal_request): proposal part #1,
      (key eng. msg.) INBOUND local= 172.16.142.191, remote= 171.69.89.82,
        local_proxy= 172.16.142.191/255.255.255.255/0/0 (type=1),
        remote_proxy= 192.168.1.3/255.255.255.255/0/0 (type=1),
        protocol= ESP, transform= esp-aes 256 esp-sha-hmac ,
        lifedur= 0s and 0kb,
        spi= 0x0(0), conn_id= 0, keysize= 256, flags= 0x400
    *Mar  1 00:28:02.859: IPSEC(kei_proxy): head = test, map->ivrf = , kei->ivrf =
    *Mar  1 00:28:02.859: IPSEC(validate_transform_proposal): no IPSEC 
                           cryptomap exists for local address 172.16.142.191
    *Mar  1 00:28:02.859: ISAKMP (0:4): IPSec policy invalidated proposal
    *Mar  1 00:28:02.859: ISAKMP (0:4): Checking IPSec proposal 7
    *Mar  1 00:28:02.859: ISAKMP: transform 1, ESP_AES
    *Mar  1 00:28:02.863: ISAKMP:   attributes in transform:
    *Mar  1 00:28:02.863: ISAKMP:      authenticator is HMAC-MD5
    *Mar  1 00:28:02.863: ISAKMP:      encaps is 61443
    *Mar  1 00:28:02.863: ISAKMP:      key length is 128
    *Mar  1 00:28:02.863: ISAKMP:      SA life type in seconds
    *Mar  1 00:28:02.863: ISAKMP:      SA life duration (VPI) of  0x0 0x20 
                                       0xC4 0x9B
    *Mar  1 00:28:02.863: ISAKMP (0:4): atts are acceptable.
    *Mar  1 00:28:02.863: IPSEC(validate_proposal_request): proposal part #1,
      (key eng. msg.) INBOUND local= 172.16.142.191, remote= 171.69.89.82,
        local_proxy= 172.16.142.191/255.255.255.255/0/0 (type=1),
        remote_proxy= 192.168.1.3/255.255.255.255/0/0 (type=1),
        protocol= ESP, transform= esp-aes esp-md5-hmac ,
        lifedur= 0s and 0kb,
        spi= 0x0(0), conn_id= 0, keysize= 128, flags= 0x400
    *Mar  1 00:28:02.867: IPSEC(kei_proxy): head = test, map->ivrf = , kei->ivrf =
    *Mar  1 00:28:02.867: IPSEC(validate_transform_proposal): no IPSEC 
                           cryptomap exists for local address 172.16.142.191
    *Mar  1 00:28:02.867: ISAKMP (0:4): IPSec policy invalidated proposal
    *Mar  1 00:28:02.867: ISAKMP (0:4): Checking IPSec proposal 8
    *Mar  1 00:28:02.871: ISAKMP: transform 1, ESP_AES
    *Mar  1 00:28:02.871: ISAKMP:   attributes in transform:
    *Mar  1 00:28:02.871: ISAKMP:      authenticator is HMAC-SHA
    *Mar  1 00:28:02.871: ISAKMP:      encaps is 61443
    *Mar  1 00:28:02.871: ISAKMP:      key length is 128
    *Mar  1 00:28:02.871: ISAKMP:      SA life type in seconds
    *Mar  1 00:28:02.871: ISAKMP:      SA life duration (VPI) of  0x0 
                                       0x20 0xC4 0x9B
    *Mar  1 00:28:02.871: ISAKMP (0:4): atts are acceptable.
    *Mar  1 00:28:02.875: IPSEC(validate_proposal_request): proposal part #1,
      (key eng. msg.) INBOUND local= 172.16.142.191, remote= 171.69.89.82,
        local_proxy= 172.16.142.191/255.255.255.255/0/0 (type=1),
        remote_proxy= 192.168.1.3/255.255.255.255/0/0 (type=1),
        protocol= ESP, transform= esp-aes esp-sha-hmac ,
        lifedur= 0s and 0kb,
        spi= 0x0(0), conn_id= 0, keysize= 128, flags= 0x400
    *Mar  1 00:28:02.875: IPSEC(kei_proxy): head = test, map->ivrf = , kei->ivrf =
    *Mar  1 00:28:02.875: IPSEC(validate_transform_proposal): no IPSEC 
                           cryptomap exists for local address 172.16.142.191
    *Mar  1 00:28:02.879: ISAKMP (0:4): IPSec policy invalidated proposal
    *Mar  1 00:28:02.879: ISAKMP (0:4): Checking IPSec proposal 9
    *Mar  1 00:28:02.879: ISAKMP: transform 1, ESP_3DES
    *Mar  1 00:28:02.879: ISAKMP:   attributes in transform:
    *Mar  1 00:28:02.879: ISAKMP:      authenticator is HMAC-MD5
    *Mar  1 00:28:02.879: ISAKMP:      encaps is 61443
    *Mar  1 00:28:02.879: ISAKMP:      SA life type in seconds
    *Mar  1 00:28:02.879: ISAKMP:      SA life duration (VPI) of  0x0 0x20 
                                       0xC4 0x9B
    *Mar  1 00:28:02.879: ISAKMP (0:4): atts are acceptable.
    *Mar  1 00:28:02.883: ISAKMP (0:4): Checking IPSec proposal 9
    *Mar  1 00:28:02.883: ISAKMP (0:4): transform 1, IPPCP LZS
    *Mar  1 00:28:02.883: ISAKMP:   attributes in transform:
    *Mar  1 00:28:02.883: ISAKMP:      encaps is 61443
    *Mar  1 00:28:02.883: ISAKMP:      SA life type in seconds
    *Mar  1 00:28:02.883: ISAKMP:      SA life duration (VPI) of  0x0 0x20 
                                       0xC4 0x9B
    *Mar  1 00:28:02.883: ISAKMP (0:4): atts are acceptable.
    *Mar  1 00:28:02.883: IPSEC(validate_proposal_request): proposal part #1,
      (key eng. msg.) INBOUND local= 172.16.142.191, remote= 171.69.89.82,
        local_proxy= 172.16.142.191/255.255.255.255/0/0 (type=1),
        remote_proxy= 192.168.1.3/255.255.255.255/0/0 (type=1),
        protocol= ESP, transform= esp-3des esp-md5-hmac ,
        lifedur= 0s and 0kb,
        spi= 0x0(0), conn_id= 0, keysize= 0, flags= 0x400
    *Mar  1 00:28:02.887: IPSEC(validate_proposal_request): proposal part #2,
      (key eng. msg.) INBOUND local= 172.16.142.191, remote= 171.69.89.82,
        local_proxy= 172.16.142.191/255.255.255.255/0/0 (type=1),
        remote_proxy= 192.168.1.3/255.255.255.255/0/0 (type=1),
        protocol= PCP, transform= comp-lzs ,
        lifedur= 0s and 0kb,
        spi= 0x0(0), conn_id= 0, keysize= 0, flags= 0x400
    *Mar  1 00:28:02.891: IPSEC(kei_proxy): head = test, map->ivrf = , kei->ivrf =
    *Mar  1 00:28:02.891: IPSEC(validate_transform_proposal): no IPSEC 
                           cryptomap exists for local address 172.16.142.191
    *Mar  1 00:28:02.891: ISAKMP (0:4): IPSec policy invalidated proposal
    *Mar  1 00:28:02.891: ISAKMP (0:4): Checking IPSec proposal 10
    *Mar  1 00:28:02.891: ISAKMP: transform 1, ESP_3DES
    *Mar  1 00:28:02.891: ISAKMP:   attributes in transform:
    *Mar  1 00:28:02.891: ISAKMP:      authenticator is HMAC-SHA
    *Mar  1 00:28:02.891: ISAKMP:      encaps is 61443
    *Mar  1 00:28:02.891: ISAKMP:      SA life type in seconds
    *Mar  1 00:28:02.891: ISAKMP:      SA life duration (VPI) of  0x0 0x20 
                                       0xC4 0x9B
    *Mar  1 00:28:02.895: ISAKMP (0:4): atts are acceptable.
    *Mar  1 00:28:02.895: ISAKMP (0:4): Checking IPSec proposal 10
    *Mar  1 00:28:02.895: ISAKMP (0:4): transform 1, IPPCP LZS
    *Mar  1 00:28:02.895: ISAKMP:   attributes in transform:
    *Mar  1 00:28:02.895: ISAKMP:      encaps is 61443
    *Mar  1 00:28:02.895: ISAKMP:      SA life type in seconds
    *Mar  1 00:28:02.895: ISAKMP:      SA life duration (VPI) of  0x0 0x20 
                                       0xC4 0x9B
    *Mar  1 00:28:02.899: ISAKMP (0:4): atts are acceptable.
    *Mar  1 00:28:02.899: IPSEC(validate_proposal_request): proposal part #1,
      (key eng. msg.) INBOUND local= 172.16.142.191, remote= 171.69.89.82,
        local_proxy= 172.16.142.191/255.255.255.255/0/0 (type=1),
        remote_proxy= 192.168.1.3/255.255.255.255/0/0 (type=1),
        protocol= ESP, transform= esp-3des esp-sha-hmac ,
        lifedur= 0s and 0kb,
        spi= 0x0(0), conn_id= 0, keysize= 0, flags= 0x400
    *Mar  1 00:28:02.899: IPSEC(validate_proposal_request): proposal part #2
    *Mar  1 00:28:02.923: ISAKMP (0:4): asking for 1 spis from ipsec
    *Mar  1 00:28:02.923: ISAKMP (0:4): Node 1783469429, Input = 
                          IKE_MESG_FROM_PEER, IKE_QM_EXCH
    *Mar  1 00:28:02.923: ISAKMP (0:4): Old State = IKE_QM_READY  New State = 
                                       IKE_QM_SPI_STARVE
    *Mar  1 00:28:02.923: IPSEC(key_engine): got a queue event...
    *Mar  1 00:28:02.923: IPSEC(spi_response): getting spi 514603422 for SA
            from 172.16.142.191  to 171.69.89.82    for prot 3
    *Mar  1 00:28:02.927: ISAKMP: received ke message (2/1)
    *Mar  1 00:28:03.175: ISAKMP (0:4): sending packet to 171.69.89.82 my_port 
                                        4500 peer_port 4500 (R) QM_IDLE
    *Mar  1 00:28:03.179: ISAKMP (0:4): Node 1783469429, Input = 
                                        IKE_MESG_FROM_IPSEC, IKE_SPI_REPLY
    *Mar  1 00:28:03.179: ISAKMP (0:4): Old State = IKE_QM_SPI_STARVE  
                                        New State = IKE_QM_R_QM2
    *Mar  1 00:28:03.239: ISAKMP (0:4): received packet from 171.69.89.82 
                                        dport 4500 sport 4500 Global (R) QM_IDLE
    *Mar  1 00:28:03.247: ISAKMP: Locking peer struct 0x82C88D44, IPSEC 
                                  refcount 1 for for stuff_ke
    *Mar  1 00:28:03.247: ISAKMP (0:4): Creating IPSec SAs
    *Mar  1 00:28:03.251:         inbound SA from 171.69.89.82 to 172.16.142.191 
                                 (f/i)  0/ 0
            (proxy 192.168.1.3 to 172.16.142.191)
    *Mar  1 00:28:03.251:         has spi 0x1EAC399E and conn_id 2000 and 
    
                                  flags 400
    *Mar  1 00:28:03.263: IPSEC(create_sa): sa created,
      (sa) sa_dest= 171.69.89.82, sa_prot= 50,
        sa_spi= 0x1CD14C06(483478534),
        sa_trans= esp-3des esp-sha-hmac , sa_conn_id= 2001
    *Mar  1 00:28:06.675: ISAKMP (0:4): received packet from 171.69.89.82 
                                        dport 4500 sport 4500 Global (R) QM_IDLE
    *Mar  1 00:28:06.679: ISAKMP: set new node -2064779316 to QM_IDLE
    *Mar  1 00:28:06.687: ISAKMP (0:4): processing HASH payload. message 
                                        ID = -2064779316
    *Mar  1 00:28:06.687: ISAKMP (0:4): processing SA payload. message 
                                        ID = -2064779316
    *Mar  1 00:28:06.687: ISAKMP (0:4): Checking IPSec proposal 1
    *Mar  1 00:28:06.687: ISAKMP: transform 1, ESP_AES
    *Mar  1 00:28:06.687: ISAKMP:   attributes in transform:
    *Mar  1 00:28:06.691: ISAKMP:      authenticator is HMAC-MD5
    *Mar  1 00:28:06.691: ISAKMP:      encaps is 61443
    *Mar  1 00:28:06.691: ISAKMP:      key length is 256
    *Mar  1 00:28:06.691: ISAKMP:      SA life type in seconds
    *Mar  1 00:28:06.691: ISAKMP:      SA life duration (VPI) of  0x0 0x20 
    0xC4 0x9B
    *Mar  1 00:28:06.691: ISAKMP (0:4): atts are acceptable.
    *Mar  1 00:28:06.691: ISAKMP (0:4): Checking IPSec proposal 1
    *Mar  1 00:28:06.691: ISAKMP (0:4): transform 1, IPPCP LZS
    *Mar  1 00:28:06.691: ISAKMP:   attributes in transform:
    *Mar  1 00:28:06.695: ISAKMP:      encaps is 61443
    *Mar  1 00:28:06.695: ISAKMP:      SA life type in seconds
    *Mar  1 00:28:06.695: ISAKMP:      SA life duration (VPI) of  0x0 0x20 
                                       0xC4 0x9B
    *Mar  1 00:28:06.695: ISAKMP (0:4): atts are acceptable.
    *Mar  1 00:28:06.835: IPSEC(spi_response): getting spi 3561761534 for SA
            from 172.16.142.191  to 171.69.89.82    for prot 3
    *Mar  1 00:28:06.835: ISAKMP: received ke message (2/1)
    *Mar  1 00:28:07.127: ISAKMP (0:4): sending packet to 171.69.89.82 
                                 my_port 4500 peer_port 4500 (R) QM_IDLE
    *Mar  1 00:28:07.127: ISAKMP (0:4): Node -2064779316, Input = 
                                        IKE_MESG_FROM_IPSEC, IKE_SPI_REPLY
    *Mar  1 00:28:07.127: ISAKMP (0:4): Old State = IKE_QM_SPI_STARVE  
                                        New State = IKE_QM_R_QM2
    *Mar  1 00:28:07.143: ISAKMP (0:4): received packet from 171.69.89.82
                                        dport 4500 sport 4500 Global (R) QM_IDLE
    *Mar  1 00:28:07.151: ISAKMP: Locking peer struct 0x82C88D44, IPSEC 
                                   refcount 2 for for stuff_ke
    *Mar  1 00:28:07.151: ISAKMP (0:4): Creating IPSec SAs
    *Mar  1 00:28:07.151:         inbound SA from 171.69.89.82 to 
                                  172.16.142.191 (f/i)  0/ 0
            (proxy 192.168.1.3 to 10.100.100.0)
    *Mar  1 00:28:07.151:         has spi 0xD44C2AFE and conn_id 2002 
                                  and flags 400
    *Mar  1 00:28:07.151:         lifetime of 2147483 seconds
    *Mar  1 00:28:07.151:         has client flags 0x10
    *Mar  1 00:28:07.151:         outbound SA from 172.16.142.191  to 
                                 171.69.89.82    (f/i)  0/ 0 (proxy 10.100.100.0
                                 to 192.168.1.3    ),
      (sa) sa_dest= 171.69.89.82, sa_prot= 50,
        sa_spi= 0x9A12903F(2584907839),
        sa_trans= esp-3des esp-sha-hmac , sa_conn_id= 2003
    *Mar  1 00:28:15.983: ISAKMP (0:3): purging node -457362469
    *Mar  1 00:28:22.863: ISAKMP (0:4): received packet from 171.69.89.82 
                                        dport 4500 sport 4500 Global (R) QM_IDLE
    *Mar  1 00:28:22.863: ISAKMP: set new node 442126453 to QM_IDLE
    *Mar  1 00:28:22.867: ISAKMP (0:4): processing HASH payload. message 
                                        ID = 442126453
    *Mar  1 00:28:22.867: ISAKMP (0:4): processing NOTIFY unknown protocol 1
            spi 0, message ID = 442126453, sa = 82443410
    *Mar  1 00:28:22.867: ISAKMP (0:4): deleting node 442126453 error 
                                        FALSE reason "informational (in) state 1"
    *Mar  1 00:28:22.867: ISAKMP (0:4): Input = IKE_MESG_FROM_PEER, 
                                        IKE_INFO_NOTIFY
    *Mar  1 00:28:22.867: ISAKMP (0:4): Old State = IKE_P1_COMPLETE 
                                        New State = IKE_P1_COMPLETE
    
    *Mar  1 00:28:28.643: ISAKMP (0:3): purging node -118562945
    *Mar  1 00:28:28.651: ISAKMP (0:3): purging node 24622273
    *Mar  1 00:28:28.659: ISAKMP (0:3): purging node -1276758667
    *Mar  1 00:28:38.667: ISAKMP (0:3): purging SA., sa=8242A5AC, 
                                        delme=8242A5AC
    *Mar  1 00:28:38.667: ISAKMP (0:3): purging node 452292968
    *Mar  1 00:28:38.667: ISAKMP (0:3): purging node 1331016929
    *Mar  1 00:28:38.667: ISAKMP (0:3): returning address 192.168.1.2 to pool
    *Mar  1 00:28:38.667: ISAKMP: Unlocking IKE struct 0x827CBB44 for 
                                  declare_sa_dead(), count 0
    *Mar  1 00:28:42.891: ISAKMP (0:4): received packet from 171.69.89.82 
                                        dport 4500 sport 4500 Global (R) QM_IDLE
    *Mar  1 00:28:42.891: ISAKMP: set new node 505402511 to QM_IDLE
    *Mar  1 00:28:42.895: ISAKMP (0:4): processing HASH payload. message 
                                        ID = 505402511
    *Mar  1 00:28:42.895: ISAKMP (0:4): processing NOTIFY unknown protocol 1
            spi 0, message ID = 505402511, sa = 82443410
    *Mar  1 00:28:42.895: ISAKMP (0:4): deleting node 505402511 error 
                                        FALSE reason "informational (in) state 1"
    *Mar  1 00:28:42.895: ISAKMP (0:4): Input = IKE_MESG_FROM_PEER, 
                                        IKE_INFO_NOTIFY
    *Mar  1 00:28:42.895: ISAKMP (0:4): Old State = IKE_P1_COMPLETE  
                                        New State = IKE_P1_COMPLETE
    
    *Mar  1 00:28:52.707: ISAKMP (0:4): purging node 1973520613
    *Mar  1 00:28:53.255: ISAKMP (0:4): purging node 1783469429
    *Mar  1 00:28:57.155: ISAKMP (0:4): purging node -2064779316 
    *Mar  1 00:29:02.919: ISAKMP (0:4): received packet from 171.69.89.82 
                                         dport 4500 sport 4500 Global (R) QM_IDLE
    *Mar  1 00:29:02.919: ISAKMP: set new node -526976638 to QM_IDLE
    *Mar  1 00:29:02.923: ISAKMP (0:4): processing HASH payload. 
                                        message ID = -526976638
    *Mar  1 00:29:02.923: ISAKMP (0:4): processing NOTIFY unknown protocol 1
            spi 0, message ID = -526976638, sa = 82443410
    *Mar  1 00:29:02.923: ISAKMP (0:4): deleting node -526976638 error 
                                        FALSE reason "informational (in) state 1"
    *Mar  1 00:29:02.923: ISAKMP (0:4): Input = IKE_MESG_FROM_PEER, 
                                        IKE_INFO_NOTIFY
    *Mar  1 00:29:02.923: ISAKMP (0:4): Old State = IKE_P1_COMPLETE  
                                        New State = IKE_P1_COMPLETE
    
    *Mar  1 00:29:12.867: ISAKMP (0:4): purging node 442126453
    *Mar  1 00:29:22.951: ISAKMP (0:4): received packet from 171.69.89.82 
                                        dport 4500 sport 4500 Global (R) QM_IDLE
    *Mar  1 00:29:22.955: ISAKMP: set new node 1718060095 to QM_IDLE
    *Mar  1 00:29:22.955: ISAKMP (0:4): processing HASH payload. message 
                                        ID = 1718060095
    *Mar  1 00:29:22.955: ISAKMP (0:4): processing NOTIFY unknown protocol 1
            spi 0, message ID = 1718060095, sa = 82443410
    *Mar  1 00:29:22.955: ISAKMP (0:4): deleting node 1718060095 error 
                          FALSE reason "informational (in) state 1"
    *Mar  1 00:29:22.959: ISAKMP (0:4): Input = IKE_MESG_FROM_PEER, 
                                        IKE_INFO_NOTIFY
    *Mar  1 00:29:22.959: ISAKMP (0:4): Old State = IKE_P1_COMPLETE  
                                        New State = IKE_P1_COMPLETE

Related Information

Updated: Dec 07, 2006
Document ID: 29760