本文檔提供使用Easy VPN (EzVPN)在Cisco 871路由器和Cisco 7200VXR路由器之間配置IPsec的示例。7200用作Easy VPN伺服器,871用作Easy VPN Remote。在本例中,兩台路由器上的環回介面都用作專用網路。這些介面可根據需要由其他介面(如快速乙太網或串列介面)替換。
要使用Easy VPN在PIX/ASA 7.x和Cisco 871路由器之間配置IPsec,請參閱將ASA 5500用作伺服器,將Cisco 871用作Easy VPN Remote的PIX/ASA 7.x Easy VPN配置示例。
要在Cisco IOS® Easy VPN Remote Hardware Client和PIX Easy VPN伺服器之間配置IPsec,請參閱IOS Easy VPN Remote Hardware Client到PIX Easy VPN伺服器配置示例。
要在網路擴展模式(NEM)下將Cisco IOS路由器配置為連線到Cisco VPN 3000集中器的EzVPN,請參閱使用VPN 3000集中器在Cisco IOS上配置Cisco EzVPN Client。
在嘗試此配置之前,請確保您對IPsec和Cisco 7200/871作業系統有基本的瞭解。
本文中的資訊係根據以下軟體和硬體版本:
Cisco Easy VPN Server是運行Cisco IOS®軟體版本12.4(4)T1的7200路由器(VXR)
Cisco Easy VPN Remote是運行Cisco IOS軟體版本12.4(2)T1的871W路由器
本文中的資訊是根據特定實驗室環境內的裝置所建立。文中使用到的所有裝置皆從已清除(預設)的組態來啟動。如果您的網路正在作用,請確保您已瞭解任何指令可能造成的影響。
如需文件慣例的詳細資訊,請參閱思科技術提示慣例。
本節提供用於設定本文件中所述功能的資訊。
注意:使用命令查詢工具(僅限註冊客戶)查詢關於用於本文的命令的更多資訊。
此文件使用以下網路設定:
註:環回介面正在模擬內部PC。
本檔案使用下列組態:
| Easy VPN伺服器(Cisco 7200VXR路由器) |
|---|
3-07-07-7200VXR#show running-config Building configuration... Current configuration : 2059 bytes ! version 12.4 service timestamps debug datetime msec service timestamps log datetime msec no service password-encryption ! hostname 3-07-07-7200VXR ! boot-start-marker boot-end-marker ! ! !--- Enable Authentication, Authorizing and Accounting (AAA) !--- for user authentication and group authorization. aaa new-model ! !--- Enable the AAA commands in order !--- to enable Xauth for user authentication. aaa authentication login userauthen local !--- Enable the AAA commands !--- in order to enable group authorization. aaa authorization network groupauthor local ! aaa session-id common ! resource policy ! ip subnet-zero ip cef ! ! !--- Define the username and password to use for Xauth. username cisco password 0 cisco123 ! ! !--- Create an Internet Security Association and !--- Key Management Protocol (ISAKMP) policy for Phase 1 negotiations. crypto isakmp policy 3 encr 3des authentication pre-share group 2 ! ! !--- Create a group with the pre-shared key for IKE authentication. crypto isakmp client configuration group vpngrp key cisco123 ! ! !--- Create the Phase 2 policy for actual data encryption. crypto ipsec transform-set myset esp-3des esp-sha-hmac ! !--- Create a dynamic map and !--- apply the transform set that was created earlier. crypto dynamic-map dynmap 10 set transform-set myset ! ! !--- Create the actual crypto map, !--- and apply the AAA lists that were created earlier. !--- These commands associate the AAA commands to the crypto map. crypto map clientmap client authentication list userauthen crypto map clientmap isakmp authorization list groupauthor crypto map clientmap 10 ipsec-isakmp dynamic dynmap ! ! ! interface Loopback10 ip address 10.10.10.1 255.255.255.0 ! interface GigabitEthernet0/1 ip address 158.100.101.254 255.255.255.0 ip nat inside ip virtual-reassembly duplex auto speed auto media-type rj45 no negotiation auto ! interface GigabitEthernet0/2 ip address 158.100.102.254 255.255.255.0 ip nat outside ip virtual-reassembly duplex auto speed 100 media-type rj45 no negotiation auto ! ! ! !--- Apply the crypto map on the interface where !--- traffic leaves the router. interface GigabitEthernet0/3 ip address 172.16.186.186 255.255.255.0 duplex auto speed auto media-type rj45 no negotiation auto crypto map clientmap ! interface FastEthernet1/0 no ip address shutdown duplex half ! ip default-gateway 172.16.186.1 ip classless ip route 0.0.0.0 0.0.0.0 172.16.186.1 no ip http server no ip http secure-server ! ! ip nat Stateful id 10 ip nat pool honnat 158.100.96.90 158.100.96.99 netmask 255.255.255.0 ip nat inside source route-map test pool honnat mapping-id 10 overload ! logging alarm informational access-list 100 permit ip any any ! route-map test permit 10 match ip address 100 ! ! ! ! control-plane ! ! ! ! ! ! gatekeeper shutdown ! ! line con 0 logging synchronous stopbits 1 line aux 0 stopbits 1 line vty 0 4 ! ! end |
| Easy VPN Remote(思科871W路由器) |
|---|
3-03-06-871W#show running-config
Current configuration : 1563 bytes
!
version 12.4
no service pad
service timestamps debug datetime msec
service timestamps log datetime msec
service password-encryption
!
hostname 3-03-06-871W
!
boot-start-marker
boot-end-marker
!
!
no aaa new-model
!
resource policy
!
ip cef
!
!
!
!
ip name-server 171.70.168.183
!
!
username cisco privilege 15 password 7 00071A150754
!
!
!
!
!--- Set the parameters to connect to the !--- appropriate Easy VPN group on the Easy VPN server.
crypto ipsec client ezvpn ez
connect auto
group vpngrp key cisco123
mode network-extension
peer 172.16.186.186
xauth userid mode interactive
!
!
!
!--- Define the inside interfaces that will access !--- and can be accessed via Easy VPN.
interface Loopback0
ip address 10.12.130.1 255.255.255.255
crypto ipsec client ezvpn ez inside
!
interface FastEthernet0
!
interface FastEthernet1
!
interface FastEthernet2
!
interface FastEthernet3
!--- Use the crypto ipsec client ezvpn
|
使用本節內容,確認您的組態是否正常運作。
輸出直譯器工具(僅供註冊客戶使用) (OIT)支援某些show指令。使用OIT檢視對show命令輸出的分析。
show crypto isakmp sa -顯示對等體上的所有當前Internet Key Exchange (IKE)安全關聯(SA)。
3-07-07-7200VXR#show crypto isakmp sa IPv4 Crypto ISAKMP SA dst src state conn-id slot status 172.16.186.186 172.16.186.130 QM_IDLE 1008 0 ACTIVE IPv6 Crypto ISAKMP SA
show crypto ipsec sa -顯示對等體之間構建的IPSec SA。
3-07-07-7200VXR#show crypto ipsec sa
interface: GigabitEthernet0/3
Crypto map tag: clientmap, local addr 172.16.186.186
protected vrf: (none)
local ident (addr/mask/prot/port): (0.0.0.0/0.0.0.0/0/0)
remote ident (addr/mask/prot/port): (10.12.130.1/255.255.255.255/0/0)
current_peer 172.16.186.130 port 500
PERMIT, flags={}
#pkts encaps: 5, #pkts encrypt: 5, #pkts digest: 5
#pkts decaps: 5, #pkts decrypt: 5, #pkts verify: 5
#pkts compressed: 0, #pkts decompressed: 0
#pkts not compressed: 0, #pkts compr. failed: 0
#pkts not decompressed: 0, #pkts decompress failed: 0
#send errors 0, #recv errors 0
local crypto endpt.: 172.16.186.186, remote crypto endpt.: 172.16.186.130
path mtu 1500, ip mtu 1500
current outbound spi: 0x29354010(691355664)
inbound esp sas:
spi: 0x6875F644(1752561220)
transform: esp-3des esp-sha-hmac ,
in use settings ={Tunnel, }
conn id: 11, flow_id: SW:11, crypto map: clientmap
sa timing: remaining key lifetime (k/sec): (4439946/3526)
IV size: 8 bytes
replay detection support: Y
Status: ACTIVE
inbound ah sas:
inbound pcp sas:
outbound esp sas:
spi: 0x29354010(691355664)
transform: esp-3des esp-sha-hmac ,
in use settings ={Tunnel, }
conn id: 12, flow_id: SW:12, crypto map: clientmap
sa timing: remaining key lifetime (k/sec): (4439946/3524)
IV size: 8 bytes
replay detection support: Y
Status: ACTIVE
show crypto isakmp sa -顯示對等體上的所有當前IKE SA。
3-03-06-871W#show crypto isakmp sa IPv4 Crypto ISAKMP SA dst src state conn-id slot status 172.16.186.186 172.16.186.130 QM_IDLE 2003 0 ACTIVE IPv6 Crypto ISAKMP SA
show crypto ipsec sa -顯示對等體之間構建的IPSec SA。
3-03-06-871W#show crypto ipsec sa
interface: FastEthernet4
Crypto map tag: FastEthernet4-head-0, local addr 172.16.186.130
protected vrf: (none)
local ident (addr/mask/prot/port): (10.12.130.1/255.255.255.255/0/0)
remote ident (addr/mask/prot/port): (0.0.0.0/0.0.0.0/0/0)
current_peer 172.16.186.186 port 500
PERMIT, flags={origin_is_acl,}
#pkts encaps: 5, #pkts encrypt: 5, #pkts digest: 5
#pkts decaps: 5, #pkts decrypt: 5, #pkts verify: 5
#pkts compressed: 0, #pkts decompressed: 0
#pkts not compressed: 0, #pkts compr. failed: 0
#pkts not decompressed: 0, #pkts decompress failed: 0
#send errors 0, #recv errors 0
local crypto endpt.: 172.16.186.130, remote crypto endpt.: 172.16.186.186
path mtu 1500, ip mtu 1500
current outbound spi: 0x6875F644(1752561220)
inbound esp sas:
spi: 0x29354010(691355664)
transform: esp-3des esp-sha-hmac ,
in use settings ={Tunnel, }
conn id: 11, flow_id: Motorola SEC 1.0:11, crypto map: FastEthernet4-head-0
sa timing: remaining key lifetime (k/sec): (4607687/3531)
IV size: 8 bytes
replay detection support: Y
Status: ACTIVE
inbound ah sas:
inbound pcp sas:
outbound esp sas:
spi: 0x6875F644(1752561220)
transform: esp-3des esp-sha-hmac ,
in use settings ={Tunnel, }
conn id: 12, flow_id: Motorola SEC 1.0:12, crypto map: FastEthernet4-head-0
sa timing: remaining key lifetime (k/sec): (4607687/3528)
IV size: 8 bytes
replay detection support: Y
Status: ACTIVE
outbound ah sas:
outbound pcp sas:
show crypto ipsec client ezvpn -顯示Cisco Easy VPN Remote配置。
3-03-06-871W#show crypto ipsec client ezvpn Easy VPN Remote Phase: 6 Tunnel name : ez Inside interface list: Loopback0 Outside interface: FastEthernet4 Current State: IPSEC_ACTIVE Last Event: SOCKET_UP Save Password: Disallowed Current EzVPN Peer: 172.16.186.186 3-03-06-871W#ping 10.10.10.1 source 10.12.130.1 Type escape sequence to abort. Sending 5, 100-byte ICMP Echos to 10.10.10.1, timeout is 2 seconds: Packet sent with a source address of 10.12.130.1 !!!!! Success rate is 100 percent (5/5), round-trip min/avg/max = 1/2/4 ms
使用本節內容,對組態進行疑難排解。
輸出直譯器工具(僅供註冊客戶使用) (OIT)支援某些show指令。使用OIT檢視對show命令輸出的分析。
附註:使用 debug 指令之前,請先參閱有關 Debug 指令的重要資訊。
如果已根據本文檔所述內容設定了Easy VPN Remote和Easy VPN伺服器,但是仍然遇到問題,請收集每個裝置的debug輸出和show命令的輸出,以供Cisco技術支援部門進行分析。
以下部分顯示了debug命令和示例輸出:
debug crypto ipsec -顯示第2階段的IPsec協商。
debug crypto isakmp - 顯示第1階段的ISAKMP協商。
3-07-07-7200VXR#debug crypto ipsec
3-07-07-7200VXR#debug crypto isakmp
*May 4 00:44:19.389: IPSEC(key_engine): got a queue event with 1 KMI message(s)
*May 4 00:44:20.937: ISAKMP (0:0): received packet from 172.16.186.130 dport
500 sport 500 Global (N) NEW SA
*May 4 00:44:20.937: ISAKMP: Created a peer struct for 172.16.186.130, peer port 500
*May 4 00:44:20.937: ISAKMP: New peer created peer = 0x6745B8E0
peer_handle = 0x80000009
*May 4 00:44:20.937: ISAKMP: Locking peer struct 0x6745B8E0, refcount 1
for crypto_isakmp_process_block
*May 4 00:44:20.937: ISAKMP:(0):Setting client config settings 6741FF98
*May 4 00:44:20.937: ISAKMP:(0):(Re)Setting client xauth list and state
*May 4 00:44:20.937: ISAKMP/xauth: initializing AAA request
*May 4 00:44:20.937: ISAKMP: local port 500, remote port 500
*May 4 00:44:20.937: ISAKMP: Find a dup sa in the avl tree during
calling isadb_insert sa = 67369734
*May 4 00:44:20.937: ISAKMP:(0): processing SA payload. message ID = 0
*May 4 00:44:20.937: ISAKMP:(0): processing ID payload. message ID = 0
*May 4 00:44:20.937: ISAKMP (0:0): ID payload
next-payload : 13
type : 11
group id : vpngrp
protocol : 17
port : 0
length : 14
*May 4 00:44:20.937: ISAKMP:(0):: peer matches *none* of the profiles
*May 4 00:44:20.937: ISAKMP:(0): processing vendor id payload
*May 4 00:44:20.937: ISAKMP:(0): vendor ID seems Unity/DPD but major 245 mismatch
*May 4 00:44:20.937: ISAKMP (0:0): vendor ID is NAT-T v7
*May 4 00:44:20.937: ISAKMP:(0): processing vendor id payload
*May 4 00:44:20.937: ISAKMP:(0): vendor ID seems Unity/DPD but major 157 mismatch
*May 4 00:44:20.937: ISAKMP:(0): vendor ID is NAT-T v3
*May 4 00:44:20.937: ISAKMP:(0): processing vendor id payload
*May 4 00:44:20.937: ISAKMP:(0): vendor ID seems Unity/DPD but major 123 mismatch
*May 4 00:44:20.937: ISAKMP:(0): vendor ID is NAT-T v2
*May 4 00:44:20.937: ISAKMP:(0): Authentication by xauth preshared
*May 4 00:44:20.937: ISAKMP:(0):Checking ISAKMP transform 1 against priority 3 policy
*May 4 00:44:20.937: ISAKMP: encryption AES-CBC
*May 4 00:44:20.937: ISAKMP: keylength of 128
*May 4 00:44:20.937: ISAKMP: hash SHA
*May 4 00:44:20.937: ISAKMP: default group 2
*May 4 00:44:20.937: ISAKMP: auth XAUTHInitPreShared
*May 4 00:44:20.937: ISAKMP: life type in seconds
*May 4 00:44:20.937: ISAKMP: life duration (VPI) of 0x0 0x20 0xC4 0x9B
*May 4 00:44:20.937: ISAKMP:(0):Encryption algorithm offered does not match policy!
*May 4 00:44:20.937: ISAKMP:(0):atts are not acceptable. Next payload is 3
*May 4 00:44:20.937: ISAKMP:(0):Checking ISAKMP transform 2 against priority 3 policy
*May 4 00:44:20.937: ISAKMP: encryption AES-CBC
*May 4 00:44:20.937: ISAKMP: keylength of 128
*May 4 00:44:20.937: ISAKMP: hash MD5
*May 4 00:44:20.937: ISAKMP: default group 2
*May 4 00:44:20.937: ISAKMP: auth XAUTHInitPreShared
*May 4 00:44:20.937: ISAKMP: life type in seconds
*May 4 00:44:20.937: ISAKMP: life duration (VPI) of 0x0 0x20 0xC4 0x9B
*May 4 00:44:20.937: ISAKMP:(0):Encryption algorithm offered does not match policy!
*May 4 00:44:20.937: ISAKMP:(0):atts are not acceptable. Next payload is 3
*May 4 00:44:20.937: ISAKMP:(0):Checking ISAKMP transform 3 against priority 3 policy
*May 4 00:44:20.937: ISAKMP: encryption AES-CBC
*May 4 00:44:20.937: ISAKMP: keylength of 192
*May 4 00:44:20.937: ISAKMP: hash SHA
*May 4 00:44:20.937: ISAKMP: default group 2
*May 4 00:44:20.937: ISAKMP: auth XAUTHInitPreShared
*May 4 00:44:20.937: ISAKMP: life type in seconds
*May 4 00:44:20.937: ISAKMP: life duration (VPI) of 0x0 0x20 0xC4 0x9B
*May 4 00:44:20.937: ISAKMP:(0):Encryption algorithm offered does not match policy!
*May 4 00:44:20.937: ISAKMP:(0):atts are not acceptable. Next payload is 3
*May 4 00:44:20.937: ISAKMP:(0):Checking ISAKMP transform 4 against priority 3 policy
*May 4 00:44:20.937: ISAKMP: encryption AES-CBC
*May 4 00:44:20.937: ISAKMP: keylength of 192
*May 4 00:44:20.937: ISAKMP: hash MD5
*May 4 00:44:20.937: ISAKMP: default group 2
*May 4 00:44:20.937: ISAKMP: auth XAUTHInitPreShared
*May 4 00:44:20.937: ISAKMP: life type in seconds
*May 4 00:44:20.937: ISAKMP: life duration (VPI) of 0x0 0x20 0xC4 0x9B
*May 4 00:44:20.937: ISAKMP:(0):Encryption algorithm offered does not match policy!
*May 4 00:44:20.937: ISAKMP:(0):atts are not acceptable. Next payload is 3
*May 4 00:44:20.937: ISAKMP:(0):Checking ISAKMP transform 5 against priority 3 policy
*May 4 00:44:20.937: ISAKMP: encryption AES-CBC
*May 4 00:44:20.937: ISAKMP: keylength of 256
*May 4 00:44:20.937: ISAKMP: hash SHA
*May 4 00:44:20.937: ISAKMP: default group 2
*May 4 00:44:20.937: ISAKMP: auth XAUTHInitPreShared
*May 4 00:44:20.937: ISAKMP: life type in seconds
*May 4 00:44:20.937: ISAKMP: life duration (VPI) of 0x0 0x20 0xC4 0x9B
*May 4 00:44:20.937: ISAKMP:(0):Encryption algorithm offered does not match policy!
*May 4 00:44:20.937: ISAKMP:(0):atts are not acceptable. Next payload is 3
*May 4 00:44:20.937: ISAKMP:(0):Checking ISAKMP transform 6 against priority 3 policy
*May 4 00:44:20.937: ISAKMP: encryption AES-CBC
*May 4 00:44:20.937: ISAKMP: keylength of 256
*May 4 00:44:20.941: ISAKMP: hash MD5
*May 4 00:44:20.941: ISAKMP: default group 2
*May 4 00:44:20.941: ISAKMP: auth XAUTHInitPreShared
*May 4 00:44:20.941: ISAKMP: life type in seconds
*May 4 00:44:20.941: ISAKMP: life duration (VPI) of 0x0 0x20 0xC4 0x9B
*May 4 00:44:20.941: ISAKMP:(0):Encryption algorithm offered does not match policy!
*May 4 00:44:20.941: ISAKMP:(0):atts are not acceptable. Next payload is 3
*May 4 00:44:20.941: ISAKMP:(0):Checking ISAKMP transform 7 against priority 3 policy
*May 4 00:44:20.941: ISAKMP: encryption AES-CBC
*May 4 00:44:20.941: ISAKMP: keylength of 128
*May 4 00:44:20.941: ISAKMP: hash SHA
*May 4 00:44:20.941: ISAKMP: default group 2
*May 4 00:44:20.941: ISAKMP: auth pre-share
*May 4 00:44:20.941: ISAKMP: life type in seconds
*May 4 00:44:20.941: ISAKMP: life duration (VPI) of 0x0 0x20 0xC4 0x9B
*May 4 00:44:20.941: ISAKMP:(0):Encryption algorithm offered does not match policy!
*May 4 00:44:20.941: ISAKMP:(0):atts are not acceptable. Next payload is 3
*May 4 00:44:20.941: ISAKMP:(0):Checking ISAKMP transform 8 against priority 3 policy
*May 4 00:44:20.941: ISAKMP: encryption AES-CBC
*May 4 00:44:20.941: ISAKMP: keylength of 128
*May 4 00:44:20.941: ISAKMP: hash MD5
*May 4 00:44:20.941: ISAKMP: default group 2
*May 4 00:44:20.941: ISAKMP: auth pre-share
*May 4 00:44:20.941: ISAKMP: life type in seconds
*May 4 00:44:20.941: ISAKMP: life duration (VPI) of 0x0 0x20 0xC4 0x9B
*May 4 00:44:20.941: ISAKMP:(0):Encryption algorithm offered does not match policy!
*May 4 00:44:20.941: ISAKMP:(0):atts are not acceptable. Next payload is 3
*May 4 00:44:20.941: ISAKMP:(0):Checking ISAKMP transform 9 against priority 3 policy
*May 4 00:44:20.941: ISAKMP: encryption AES-CBC
*May 4 00:44:20.941: ISAKMP: keylength of 192
*May 4 00:44:20.941: ISAKMP: hash SHA
*May 4 00:44:20.941: ISAKMP: default group 2
*May 4 00:44:20.941: ISAKMP: auth pre-share
*May 4 00:44:20.941: ISAKMP: life type in seconds
*May 4 00:44:20.941: ISAKMP: life duration (VPI) of 0x0 0x20 0xC4 0x9B
*May 4 00:44:20.941: ISAKMP:(0):Encryption algorithm offered does not match policy!
*May 4 00:44:20.941: ISAKMP:(0):atts are not acceptable. Next payload is 3
*May 4 00:44:20.941: ISAKMP:(0):Checking ISAKMP transform 10 against priority 3 policy
*May 4 00:44:20.941: ISAKMP: encryption AES-CBC
*May 4 00:44:20.941: ISAKMP: keylength of 192
*May 4 00:44:20.941: ISAKMP: hash MD5
*May 4 00:44:20.941: ISAKMP: default group 2
*May 4 00:44:20.941: ISAKMP: auth pre-share
*May 4 00:44:20.941: ISAKMP: life type in seconds
*May 4 00:44:20.941: ISAKMP: life duration (VPI) of 0x0 0x20 0xC4 0x9B
*May 4 00:44:20.941: ISAKMP:(0):Encryption algorithm offered does not match policy!
*May 4 00:44:20.941: ISAKMP:(0):atts are not acceptable. Next payload is 3
*May 4 00:44:20.941: ISAKMP:(0):Checking ISAKMP transform 11 against priority 3 policy
*May 4 00:44:20.941: ISAKMP: encryption AES-CBC
*May 4 00:44:20.941: ISAKMP: keylength of 256
*May 4 00:44:20.941: ISAKMP: hash SHA
*May 4 00:44:20.941: ISAKMP: default group 2
*May 4 00:44:20.941: ISAKMP: auth pre-share
*May 4 00:44:20.941: ISAKMP: life type in seconds
*May 4 00:44:20.941: ISAKMP: life duration (VPI) of 0x0 0x20 0xC4 0x9B
*May 4 00:44:20.941: ISAKMP:(0):Encryption algorithm offered does not match policy!
*May 4 00:44:20.941: ISAKMP:(0):atts are not acceptable. Next payload is 3
*May 4 00:44:20.941: ISAKMP:(0):Checking ISAKMP transform 12 against priority 3 policy
*May 4 00:44:20.941: ISAKMP: encryption AES-CBC
*May 4 00:44:20.941: ISAKMP: keylength of 256
*May 4 00:44:20.941: ISAKMP: hash MD5
*May 4 00:44:20.941: ISAKMP: default group 2
*May 4 00:44:20.941: ISAKMP: auth pre-share
*May 4 00:44:20.941: ISAKMP: life type in seconds
*May 4 00:44:20.941: ISAKMP: life duration (VPI) of 0x0 0x20 0xC4 0x9B
*May 4 00:44:20.941: ISAKMP:(0):Encryption algorithm offered does not match policy!
*May 4 00:44:20.941: ISAKMP:(0):atts are not acceptable. Next payload is 3
*May 4 00:44:20.941: ISAKMP:(0):Checking ISAKMP transform 13 against priority 3 policy
*May 4 00:44:20.941: ISAKMP: encryption 3DES-CBC
*May 4 00:44:20.941: ISAKMP: hash SHA
*May 4 00:44:20.941: ISAKMP: default group 2
*May 4 00:44:20.941: ISAKMP: auth XAUTHInitPreShared
*May 4 00:44:20.941: ISAKMP: life type in seconds
*May 4 00:44:20.941: ISAKMP: life duration (VPI) of 0x0 0x20 0xC4 0x9B
*May 4 00:44:20.941: ISAKMP:(0):atts are acceptable. Next payload is 3
*May 4 00:44:20.941: ISAKMP:(0): processing vendor id payload
*May 4 00:44:20.941: ISAKMP:(0): vendor ID seems Unity/DPD but major 245 mismatch
*May 4 00:44:20.941: ISAKMP (0:0): vendor ID is NAT-T v7
*May 4 00:44:20.941: ISAKMP:(0): processing vendor id payload
*May 4 00:44:20.941: ISAKMP:(0): vendor ID seems Unity/DPD but major 157 mismatch
*May 4 00:44:20.941: ISAKMP:(0): vendor ID is NAT-T v3
*May 4 00:44:20.941: ISAKMP:(0): processing vendor id payload
*May 4 00:44:20.941: ISAKMP:(0): vendor ID seems Unity/DPD but major 123 mismatch
*May 4 00:44:20.941: ISAKMP:(0): vendor ID is NAT-T v2
*May 4 00:44:20.941: ISAKMP:(0): processing KE payload. message ID = 0
*May 4 00:44:20.957: ISAKMP:(0): processing NONCE payload. message ID = 0
*May 4 00:44:20.957: ISAKMP:(0): processing vendor id payload
*May 4 00:44:20.957: ISAKMP:(0): vendor ID is DPD
*May 4 00:44:20.957: ISAKMP:(0): processing vendor id payload
*May 4 00:44:20.957: ISAKMP:(0): vendor ID seems Unity/DPD but major 79 mismatch
*May 4 00:44:20.957: ISAKMP:(0): vendor ID is XAUTH
*May 4 00:44:20.957: ISAKMP:(0): processing vendor id payload
*May 4 00:44:20.957: ISAKMP:(0): claimed IOS but failed authentication
*May 4 00:44:20.957: ISAKMP:(0): processing vendor id payload
*May 4 00:44:20.957: ISAKMP:(0): vendor ID is Unity
*May 4 00:44:20.957: ISAKMP:(0):Input = IKE_MESG_FROM_PEER, IKE_AM_EXCH
*May 4 00:44:20.957: ISAKMP:(0):Old State = IKE_READY New State = IKE_R_AM_AAA_AWAIT
*May 4 00:44:20.957: ISAKMP:(1008): constructed NAT-T vendor-07 ID
*May 4 00:44:20.957: ISAKMP:(1008):SA is doing pre-shared key authentication
plus XAUTH using id type ID_IPV4_ADDR
*May 4 00:44:20.957: ISAKMP (0:1008): ID payload
next-payload : 10
type : 1
address : 172.16.186.186
protocol : 17
port : 0
length : 12
*May 4 00:44:20.957: ISAKMP:(1008):Total payload length: 12
*May 4 00:44:20.957: ISAKMP:(1008): sending packet to 172.16.186.130 my_port
500 peer_port 500 (R) AG_INIT_EXCH
*May 4 00:44:20.957: ISAKMP:(1008):Input = IKE_MESG_FROM_AAA, PRESHARED_KEY_REPLY
*May 4 00:44:20.957: ISAKMP:(1008):Old State = IKE_R_AM_AAA_AWAIT New State = IKE_R_AM2
*May 4 00:44:20.985: ISAKMP (0:1008): received packet from 172.16.186.130 dport
500 sport 500 Global (R) AG_INIT_EXCH
*May 4 00:44:20.985: ISAKMP:(1008): processing HASH payload. message ID = 0
*May 4 00:44:20.985: ISAKMP:(1008): processing NOTIFY INITIAL_CONTACT protocol 1
spi 0, message ID = 0, sa = 67369734
*May 4 00:44:20.985: ISAKMP:(1008):SA authentication status:
authenticated
*May 4 00:44:20.985: ISAKMP:(1008):SA has been authenticated with 172.16.186.130
*May 4 00:44:20.985: ISAKMP:(1008):SA authentication status:
authenticated
*May 4 00:44:20.985: ISAKMP:(1008): Process initial contact,
bring down existing phase 1 and 2 SA's with local 172.16.186.186 remote 172.16.186.130
remote port 500
*May 4 00:44:20.985: ISAKMP:(1008):returning IP addr to the address pool
*May 4 00:44:20.985: ISAKMP: Trying to insert a peer 172.16.186.186/172.16.186.130/500/,
and inserted successfully 6745B8E0.
*May 4 00:44:20.985: ISAKMP: set new node 1361385973 to CONF_XAUTH
*May 4 00:44:20.985: ISAKMP:(1008):Sending NOTIFY RESPONDER_LIFETIME protocol 1
spi 1722618680, message ID = 1361385973
*May 4 00:44:20.985: ISAKMP:(1008): sending packet to 172.16.186.130 my_port 500
peer_port 500 (R) QM_IDLE
*May 4 00:44:20.985: ISAKMP:(1008):purging node 1361385973
*May 4 00:44:20.985: ISAKMP: Sending phase 1 responder lifetime 86400
*May 4 00:44:20.985: ISAKMP:(1008):Input = IKE_MESG_FROM_PEER, IKE_AM_EXCH
*May 4 00:44:20.985: ISAKMP:(1008):Old State = IKE_R_AM2 New State = IKE_P1_COMPLETE
!--- Requesting Xauth.
*May 4 00:44:20.985: IPSEC(key_engine): got a queue event with 1 KMI message(s)
*May 4 00:44:20.985: ISAKMP:(1008):Need XAUTH
*May 4 00:44:20.985: ISAKMP: set new node -605466681 to CONF_XAUTH
*May 4 00:44:20.985: ISAKMP/xauth: request attribute XAUTH_USER_NAME_V2
*May 4 00:44:20.985: ISAKMP/xauth: request attribute XAUTH_USER_PASSWORD_V2
*May 4 00:44:20.985: ISAKMP:(1008): initiating peer config to 172.16.186.130.
ID = -605466681
*May 4 00:44:20.985: ISAKMP:(1008): sending packet to 172.16.186.130 my_port
500 peer_port 500 (R) CONF_XAUTH
*May 4 00:44:20.985: ISAKMP:(1008):Input = IKE_MESG_INTERNAL, IKE_PHASE1_COMPLETE
*May 4 00:44:20.985: ISAKMP:(1008):Old State = IKE_P1_COMPLETE New State =
IKE_XAUTH_REQ_SENT
*May 4 00:44:35.985: ISAKMP:(1008): retransmitting phase 2 CONF_XAUTH -605466681 ...
*May 4 00:44:35.985: ISAKMP (0:1008): incrementing error counter on node,
attempt 1 of 5: retransmit phase 2
*May 4 00:44:35.985: ISAKMP (0:1008): incrementing error counter on sa,
attempt 1 of 5: retransmit phase 2
*May 4 00:44:35.985: ISAKMP:(1008): retransmitting phase 2 -605466681 CONF_XAUTH
*May 4 00:44:35.985: ISAKMP:(1008): sending packet to 172.16.186.130
my_port 500 peer_port 500 (R) CONF_XAUTH R#
3-07-07-7200VXR#
*May 4 00:44:50.985: ISAKMP:(1008): retransmitting phase 2 CONF_XAUTH -605466681 ...
*May 4 00:44:50.985: ISAKMP (0:1008): incrementing error counter on node,
attempt 2 of 5: retransmit phase 2
*May 4 00:44:50.985: ISAKMP (0:1008): incrementing error counter on sa,
attempt 2 of 5: retransmit phase 2
*May 4 00:44:50.985: ISAKMP:(1008): retransmitting phase 2 -605466681 CONF_XAUTH
*May 4 00:44:50.985: ISAKMP:(1008): sending packet to 172.16.186.130
my_port 500 peer_port 500 (R) CONF_XAUTH
3-07-07-7200VXR#
*May 4 00:45:01.997: ISAKMP (0:1008): received packet from 172.16.186.130
dport 500 sport 500 Global (R) CONF_XAUTH
*May 4 00:45:01.997: ISAKMP:(1008):processing transaction payload from
172.16.186.130. message ID = -605466681
*May 4 00:45:01.997: ISAKMP: Config payload REPLY
*May 4 00:45:01.997: ISAKMP/xauth: reply attribute XAUTH_USER_NAME_V2
*May 4 00:45:01.997: ISAKMP/xauth: reply attribute XAUTH_USER_PASSWORD_V2
*May 4 00:45:01.997: ISAKMP:(1008):deleting node -605466681 error FALSE
reason "Done with xauth request/reply exchange"
*May 4 00:45:01.997: ISAKMP:(1008):Input = IKE_MESG_FROM_PEER, IKE_CFG_REPLY
*May 4 00:45:01.997: ISAKMP:(1008):Old State = IKE_XAUTH_REQ_SENT
New State = IKE_XAUTH_AAA_CONT_LOGIN_AWAIT
*May 4 00:45:01.997: ISAKMP: set new node 1283697340 to CONF_XAUTH
*May 4 00:45:01.997: ISAKMP:(1008): initiating peer config to 172.16.186.130.
ID = 1283697340
*May 4 00:45:01.997: ISAKMP:(1008): sending packet to 172.16.186.130 my_port 5
3-07-07-7200VX00 peer_port 500 (R) CONF_XAUTH
*May 4 00:45:01.997: ISAKMP:(1008):Input = IKE_MESG_FROM_AAA, IKE_AAA_CONT_LOGIN
*May 4 00:45:01.997: ISAKMP:(1008):Old State = IKE_XAUTH_AAA_CONT_LOGIN_AWAIT
New State = IKE_XAUTH_SET_SENT
*May 4 00:45:02.005: ISAKMP (0:1008): received packet from 172.16.186.130
dport 500 sport 500 Global (R) CONF_XAUTH
*May 4 00:45:02.005: ISAKMP:(1008):processing transaction payload from 172.16.186.130.
message ID = 1283697340
*May 4 00:45:02.005: ISAKMP: Config payload ACK
*May 4 00:45:02.005: ISAKMP:(1008): XAUTH ACK Processed
*May 4 00:45:02.005: ISAKMP:(1008):deleting node 1283697340 error FALSE reason
"Transaction mode done"
*May 4 00:45:02.005: ISAKMP:(1008):Input = IKE_MESG_FROM_PEER, IKE_CFG_ACK
*May 4 00:45:02.005: ISAKMP:(1008):Old State = IKE_XAUTH_SET_SENT New State =
IKE_P1_COMPLETE
*May 4 00:45:02.005: ISAKMP:(1008):Input = IKE_MESG_INTERNAL, IKE_PHASE1_COMPLETE
*May 4 00:45:02.005: ISAKMP:(1008):Old State = IKE_P1_COMPLETE New State =
IKE_P1_COMPLETE
*May 4 00:45:02.005: ISAKMP (0:1008): received packet from 172.16.186.130
dport 500 sport 500 Global (R) QM_IDLE
*May 4 00:45:02.005: ISAKMP: set new node 104696831 to QM_IDLE
*May 4 00:45:02.005: ISAKMP:(1008):processing transaction payload from
172.16.186.130. message ID = 104696831
*May 4 00:45:02.005: ISAKMP: Config payload REQUEST
*May 4 00:45:02.005: ISAKMP:(1008):checking request:
*May 4 00:45:02.005: ISAKMP: MODECFG_CONFIG_URL
*May 4 00:45:02.005: ISAKMP: MODECFG_CONFIG_VERSION
*May 4 00:45:02.009: ISAKMP: IP4_DNS
*May 4 00:45:02.009: ISAKMP: IP4_DNS
*May 4 00:45:02.009: ISAKMP: IP4_NBNS
*May 4 00:45:02.009: ISAKMP: IP4_NBNS
*May 4 00:45:02.009: ISAKMP: SPLIT_INCLUDE
*May 4 00:45:02.009: ISAKMP: SPLIT_DNS
*May 4 00:45:02.009: ISAKMP: DEFAULT_DOMAIN
*May 4 00:45:02.009: ISAKMP: MODECFG_SAVEPWD
*May 4 00:45:02.009: ISAKMP: INCLUDE_LOCAL_LAN
*May 4 00:45:02.009: ISAKMP: PFS
*May 4 00:45:02.009: ISAKMP: BACKUP_SERVER
*May 4 00:45:02.009: ISAKMP: APPLICATION_VERSION
*May 4 00:45:02.009: ISAKMP: MODECFG-BANNER
*May 4 00:45:02.009: ISAKMP: MODECFG_IPSEC_INT_CONF
*May 4 00:45:02.009: ISAKMP/author: Author request for group vpngrpsuccessfully
sent to AAA
*May 4 00:45:02.009: ISAKMP:(1008):Input = IKE_MESG_FROM_PEER, IKE_CFG_REQUEST
*May 4 00:45:02.009: ISAKMP:(1008):Old State = IKE_P1_COMPLETE New State =
IKE_CONFIG_AUTHOR_AAA_AWAIT
*May 4 00:45:02.009: ISAKMP:(1008):Receive config attributes requested
butconfig attributes not in crypto map. Sending empty reply.
*May 4 00:45:02.009: ISAKMP:(1008):attributes sent in message:
*May 4 00:45:02.009: ISAKMP: Sending APPLICATION_VERSION string: Cisco
IOS Software, 7200 Software (C7200-ADVENTERPRISEK9-M),
Version 12.4(4)T1, RELEASE SOFTWARE (fc4)
Technical Support: http://www.cisco.com/techsupport
Copyright (c) 1986-2005 by Cisco Systems, Inc.
Compiled Wed 21-Dec-05 22:58 by ccai
*May 4 00:45:02.009: ISAKMP: Sending IPsec Interface Config reply value 0
*May 4 00:45:02.009: ISAKMP:(1008): responding to peer config from 172.16.186.130.
ID = 104696831
*May 4 00:45:02.009: ISAKMP:(1008): sending packet to 172.16.186.130 my_port
500 peer_port 500 (R) CONF_ADDR
*May 4 00:45:02.009: ISAKMP:(1008):deleting node 104696831 error FALSE reason
"No Error"
*May 4 00:45:02.009: ISAKMP:(1008):Input = IKE_MESG_FROM_AAA, IKE_AAA_GROUP_ATTR
*May 4 00:45:02.009: ISAKMP:(1008):Old State = IKE_CONFIG_AUTHOR_AAA_AWAIT
New State = IKE_P1_COMPLETE
*May 4 00:45:02.009: ISAKMP:(1008):Input = IKE_MESG_INTERNAL, IKE_PHASE1_COMPLETE
*May 4 00:45:02.009: ISAKMP:(1008):Old State = IKE_P1_COMPLETE New State =
IKE_P1_COMPLETE
*May 4 00:45:02.029: ISAKMP (0:1008): received packet from 172.16.186.130
dport 500 sport 500 Global (R) QM_IDLE
*May 4 00:45:02.029: ISAKMP: set new node -1665883002 to QM_IDLE
*May 4 00:45:02.029: ISAKMP:(1008): processing HASH payload. message ID = -1665883002
*May 4 00:45:02.029: ISAKMP:(1008): processing SA payload. message ID = -1665883002
*May 4 00:45:02.029: ISAKMP:(1008):Checking IPSec proposal 1
*May 4 00:45:02.029: ISAKMP: transform 1, ESP_AES
*May 4 00:45:02.029: ISAKMP: attributes in transform:
*May 4 00:45:02.029: ISAKMP: encaps is 1 (Tunnel)
*May 4 00:45:02.029: ISAKMP: SA life type in seconds
*May 4 00:45:02.029: ISAKMP: SA life duration (VPI) of 0x0 0x20 0xC4 0x9B
*May 4 00:45:02.029: ISAKMP: SA life type in kilobytes
*May 4 00:45:02.029: ISAKMP: SA life duration (VPI) of 0x0 0x46 0x50 0x0
*May 4 00:45:02.029: ISAKMP: authenticator is HMAC-SHA
*May 4 00:45:02.029: ISAKMP: key length is 128
*May 4 00:45:02.029: ISAKMP:(1008):atts are acceptable.
*May 4 00:45:02.029: IPSEC(validate_proposal_request): proposal part #1
*May 4 00:45:02.029: IPSEC(validate_proposal_request): proposal part #1,
(key eng. msg.) INBOUND local= 172.16.186.186, remote= 172.16.186.130,
local_proxy= 0.0.0.0/0.0.0.0/0/0 (type=4),
remote_proxy= 10.12.130.1/255.255.255.255/0/0 (type=1),
protocol= ESP, transform= esp-aes esp-sha-hmac (Tunnel),
lifedur= 0s and 0kb,
spi= 0x0(0), conn_id= 0, keysize= 128, flags= 0x0
*May 4 00:45:02.029: IPSEC(crypto_ipsec_process_proposal): transform proposal
not supported for identity:
{esp-aes esp-sha-hmac }
*May 4 00:45:02.029: ISAKMP:(1008): IPSec policy invalidated proposal
*May 4 00:45:02.029: ISAKMP:(1008):Checking IPSec proposal 2
*May 4 00:45:02.029: ISAKMP: transform 1, ESP_AES
*May 4 00:45:02.029: ISAKMP: attributes in transform:
*May 4 00:45:02.029: ISAKMP: encaps is 1 (Tunnel)
*May 4 00:45:02.029: ISAKMP: SA life type in seconds
*May 4 00:45:02.029: ISAKMP: SA life duration (VPI) of 0x0 0x20 0xC4 0x9B
*May 4 00:45:02.029: ISAKMP: SA life type in kilobytes
*May 4 00:45:02.029: ISAKMP: SA life duration (VPI) of 0x0 0x46 0x50 0x0
*May 4 00:45:02.029: ISAKMP: authenticator is HMAC-MD5
*May 4 00:45:02.029: ISAKMP: key length is 128
*May 4 00:45:02.029: ISAKMP:(1008):atts are acceptable.
*May 4 00:45:02.029: IPSEC(validate_proposal_request): proposal part #1
*May 4 00:45:02.029: IPSEC(validate_proposal_request): proposal part #1,
(key eng. msg.) INBOUND local= 172.16.186.186, remote= 172.16.186.130,
local_proxy= 0.0.0.0/0.0.0.0/0/0 (type=4),
remote_proxy= 10.12.130.1/255.255.255.255/0/0 (type=1),
protocol= ESP, transform= esp-aes esp-md5-hmac (Tunnel),
lifedur= 0s and 0kb,
spi= 0x0(0), conn_id= 0, keysize= 128, flags= 0x0
*May 4 00:45:02.029: IPSEC(crypto_ipsec_process_proposal): transform
proposal not supported for identity:
{esp-aes esp-md5-hmac }
*May 4 00:45:02.029: ISAKMP:(1008): IPSec policy invalidated proposal
*May 4 00:45:02.029: ISAKMP:(1008):Checking IPSec proposal 3
*May 4 00:45:02.029: ISAKMP: transform 1, ESP_AES
*May 4 00:45:02.029: ISAKMP: attributes in transform:
*May 4 00:45:02.029: ISAKMP: encaps is 1 (Tunnel)
*May 4 00:45:02.029: ISAKMP: SA life type in seconds
*May 4 00:45:02.029: ISAKMP: SA life duration (VPI) of 0x0 0x20 0xC4 0x9B
*May 4 00:45:02.029: ISAKMP: SA life type in kilobytes
*May 4 00:45:02.029: ISAKMP: SA life duration (VPI) of 0x0 0x46 0x50 0x0
*May 4 00:45:02.029: ISAKMP: authenticator is HMAC-SHA
*May 4 00:45:02.029: ISAKMP: key length is 192
*May 4 00:45:02.029: ISAKMP:(1008):atts are acceptable.
*May 4 00:45:02.029: IPSEC(validate_proposal_request): proposal part #1
*May 4 00:45:02.029: IPSEC(validate_proposal_request): proposal part #1,
(key eng. msg.) INBOUND local= 172.16.186.186, remote= 172.16.186.130,
local_proxy= 0.0.0.0/0.0.0.0/0/0 (type=4),
remote_proxy= 10.12.130.1/255.255.255.255/0/0 (type=1),
protocol= ESP, transform= esp-aes 192 esp-sha-hmac (Tunnel),
lifedur= 0s and 0kb,
spi= 0x0(0), conn_id= 0, keysize= 192, flags= 0x0
*May 4 00:45:02.029: IPSEC(crypto_ipsec_process_proposal): transform proposal
not supported for identity:
{esp-aes 192 esp-sha-hmac }
*May 4 00:45:02.029: ISAKMP:(1008): IPSec policy invalidated proposal
*May 4 00:45:02.029: ISAKMP:(1008):Checking IPSec proposal 4
*May 4 00:45:02.029: ISAKMP: transform 1, ESP_AES
*May 4 00:45:02.029: ISAKMP: attributes in transform:
*May 4 00:45:02.029: ISAKMP: encaps is 1 (Tunnel)
*May 4 00:45:02.029: ISAKMP: SA life type in seconds
*May 4 00:45:02.029: ISAKMP: SA life duration (VPI) of 0x0 0x20 0xC4 0x9B
*May 4 00:45:02.029: ISAKMP: SA life type in kilobytes
*May 4 00:45:02.029: ISAKMP: SA life duration (VPI) of 0x0 0x46 0x50 0x0
*May 4 00:45:02.029: ISAKMP: authenticator is HMAC-MD5
*May 4 00:45:02.029: ISAKMP: key length is 192
*May 4 00:45:02.029: ISAKMP:(1008):atts are acceptable.
*May 4 00:45:02.029: IPSEC(validate_proposal_request): proposal part #1
*May 4 00:45:02.029: IPSEC(validate_proposal_request): proposal part #1,
(key eng. msg.) INBOUND local= 172.16.186.186, remote= 172.16.186.130,
local_proxy= 0.0.0.0/0.0.0.0/0/0 (type=4),
remote_proxy= 10.12.130.1/255.255.255.255/0/0 (type=1),
protocol= ESP, transform= esp-aes 192 esp-md5-hmac (Tunnel),
lifedur= 0s and 0kb,
spi= 0x0(0), conn_id= 0, keysize= 192, flags= 0x0
*May 4 00:45:02.029: IPSEC(crypto_ipsec_process_proposal): transform proposal
not supported for identity:
{esp-aes 192 esp-md5-hmac }
*May 4 00:45:02.029: ISAKMP:(1008): IPSec policy invalidated proposal
*May 4 00:45:02.029: ISAKMP:(1008):Checking IPSec proposal 5
*May 4 00:45:02.029: ISAKMP: transform 1, ESP_AES
*May 4 00:45:02.029: ISAKMP: attributes in transform:
*May 4 00:45:02.029: ISAKMP: encaps is 1 (Tunnel)
*May 4 00:45:02.029: ISAKMP: SA life type in seconds
*May 4 00:45:02.029: ISAKMP: SA life duration (VPI) of 0x0 0x20 0xC4 0x9B
*May 4 00:45:02.029: ISAKMP: SA life type in kilobytes
*May 4 00:45:02.029: ISAKMP: SA life duration (VPI) of 0x0 0x46 0x50 0x0
*May 4 00:45:02.029: ISAKMP: authenticator is HMAC-SHA
*May 4 00:45:02.033: ISAKMP: key length is 256
*May 4 00:45:02.033: ISAKMP:(1008):atts are acceptable.
*May 4 00:45:02.033: IPSEC(validate_proposal_request): proposal part #1
*May 4 00:45:02.033: IPSEC(validate_proposal_request): proposal part #1,
(key eng. msg.) INBOUND local= 172.16.186.186, remote= 172.16.186.130,
local_proxy= 0.0.0.0/0.0.0.0/0/0 (type=4),
remote_proxy= 10.12.130.1/255.255.255.255/0/0 (type=1),
protocol= ESP, transform= esp-aes 256 esp-sha-hmac (Tunnel),
lifedur= 0s and 0kb,
spi= 0x0(0), conn_id= 0, keysize= 256, flags= 0x0
*May 4 00:45:02.033: IPSEC(crypto_ipsec_process_proposal): transform proposal
not supported for identity:
{esp-aes 256 esp-sha-hmac }
*May 4 00:45:02.033: ISAKMP:(1008): IPSec policy invalidated proposal
*May 4 00:45:02.033: ISAKMP:(1008):Checking IPSec proposal 6
*May 4 00:45:02.033: ISAKMP: transform 1, ESP_AES
*May 4 00:45:02.033: ISAKMP: attributes in transform:
*May 4 00:45:02.033: ISAKMP: encaps is 1 (Tunnel)
*May 4 00:45:02.033: ISAKMP: SA life type in seconds
*May 4 00:45:02.033: ISAKMP: SA life duration (VPI) of 0x0 0x20 0xC4 0x9B
*May 4 00:45:02.033: ISAKMP: SA life type in kilobytes
*May 4 00:45:02.033: ISAKMP: SA life duration (VPI) of 0x0 0x46 0x50 0x0
*May 4 00:45:02.033: ISAKMP: authenticator is HMAC-MD5
*May 4 00:45:02.033: ISAKMP: key length is 256
*May 4 00:45:02.033: ISAKMP:(1008):atts are acceptable.
*May 4 00:45:02.033: IPSEC(validate_proposal_request): proposal part #1
*May 4 00:45:02.033: IPSEC(validate_proposal_request): proposal part #1,
(key eng. msg.) INBOUND local= 172.16.186.186, remote= 172.16.186.130,
local_proxy= 0.0.0.0/0.0.0.0/0/0 (type=4),
remote_proxy= 10.12.130.1/255.255.255.255/0/0 (type=1),
protocol= ESP, transform= esp-aes 256 esp-md5-hmac (Tunnel),
lifedur= 0s and 0kb,
spi= 0x0(0), conn_id= 0, keysize= 256, flags= 0x0
*May 4 00:45:02.033: IPSEC(crypto_ipsec_process_proposal): transform
proposal not supported for identity:
{esp-aes 256 esp-md5-hmac }
*May 4 00:45:02.033: ISAKMP:(1008): IPSec policy invalidated proposal
*May 4 00:45:02.033: ISAKMP:(1008):Checking IPSec proposal 7
*May 4 00:45:02.033: ISAKMP: transform 1, ESP_3DES
*May 4 00:45:02.033: ISAKMP: attributes in transform:
*May 4 00:45:02.033: ISAKMP: encaps is 1 (Tunnel)
*May 4 00:45:02.033: ISAKMP: SA life type in seconds
*May 4 00:45:02.033: ISAKMP: SA life duration (VPI) of 0x0 0x20 0xC4 0x9B
*May 4 00:45:02.033: ISAKMP: SA life type in kilobytes
*May 4 00:45:02.033: ISAKMP: SA life duration (VPI) of 0x0 0x46 0x50 0x0
*May 4 00:45:02.033: ISAKMP: authenticator is HMAC-SHA
*May 4 00:45:02.033: ISAKMP:(1008):atts are acceptable.
*May 4 00:45:02.033: IPSEC(validate_proposal_request): proposal part #1
*May 4 00:45:02.033: IPSEC(validate_proposal_request): proposal part #1,
(key eng. msg.) INBOUND local= 172.16.186.186, remote= 172.16.186.130,
local_proxy= 0.0.0.0/0.0.0.0/0/0 (type=4),
remote_proxy= 10.12.130.1/255.255.255.255/0/0 (type=1),
protocol= ESP, transform= esp-3des esp-sha-hmac (Tunnel),
lifedur= 0s and 0kb,
spi= 0x0(0), conn_id= 0, keysize= 0, flags= 0x0
*May 4 00:45:02.033: ISAKMP:(1008): processing NONCE payload. message ID = -1665883002
*May 4 00:45:02.033: ISAKMP:(1008): processing ID payload. message ID = -1665883002
*May 4 00:45:02.033: ISAKMP:(1008): processing ID payload. message ID = -1665883002
*May 4 00:45:02.033: ISAKMP:(1008): asking for 1 spis from ipsec
*May 4 00:45:02.033: ISAKMP:(1008):Node -1665883002, Input = IKE_MESG_FROM_PEER, IKE_QM_EXCH
*May 4 00:45:02.033: ISAKMP:(1008):Old State = IKE_QM_READY New State = IKE_QM_SPI_STARVE
*May 4 00:45:02.033: IPSEC(key_engine): got a queue event with 1 KMI message(s)
*May 4 00:45:02.033: IPSEC(spi_response): getting spi 1752561220 for SA
from 172.16.186.186 to 172.16.186.130 for prot 3
*May 4 00:45:02.033: ISAKMP:(1008): Creating IPSec SAs
*May 4 00:45:02.033: inbound SA from 172.16.186.130 to 172.16.186.186 (f/i) 0/ 0
(proxy 10.12.130.1 to 0.0.0.0)
*May 4 00:45:02.033: has spi 0x6875F644 and conn_id 0
*May 4 00:45:02.033: lifetime of 2147483 seconds
*May 4 00:45:02.033: lifetime of 4608000 kilobytes
*May 4 00:45:02.033: outbound SA from 172.16.186.186 to 172.16.186.130 (f/i) 0/0
(proxy 0.0.0.0 to 10.12.130.1)
*May 4 00:45:02.033: has spi 0x29354010 and conn_id 0
*May 4 00:45:02.033: lifetime of 2147483 seconds
*May 4 00:45:02.033: lifetime of 4608000 kilobytes
*May 4 00:45:02.033: ISAKMP:(1008): sending packet to 172.16.186.130
my_port 500 peer_port 500 (R) QM_IDLE
*May 4 00:45:02.033: ISAKMP:(1008):Node -1665883002, Input = IKE_MESG_FROM_IPSEC, IKE_SPI_REPLY
*May 4 00:45:02.033: ISAKMP:(1008):Old State = IKE_QM_SPI_STARVE New State = IKE_QM_R_QM2
*May 4 00:45:02.033: IPSEC(key_engine): got a queue event with 1 KMI message(s)
*May 4 00:45:02.033: IPSec: Flow_switching Allocated flow for sibling 80000007
*May 4 00:45:02.033: IPSEC(policy_db_add_ident): src 0.0.0.0, dest 10.12.130.1, dest_port 0
*May 4 00:45:02.033: IPSEC(create_sa): sa created,
(sa) sa_dest= 172.16.186.186, sa_proto= 50,
sa_spi= 0x6875F644(1752561220),
sa_trans= esp-3des esp-sha-hmac , sa_conn_id= 11
*May 4 00:45:02.033: IPSEC(create_sa): sa created,
(sa) sa_dest= 172.16.186.130, sa_proto= 50,
sa_spi= 0x29354010(691355664),
sa_trans= esp-3des esp-sha-hmac , sa_conn_id= 12
*May 4 00:45:02.045: ISAKMP (0:1008): received packet from 172.16.186.130
dport 500 sport 500 Global (R) QM_IDLE
*May 4 00:45:02.045: ISAKMP:(1008):deleting node -1665883002 error
FALSE reason "QM done (await)"
*May 4 00:45:02.045: ISAKMP:(1008):Node -1665883002, Input = IKE_MESG_FROM_PEER,
IKE_QM_EXCH
*May 4 00:45:02.045: ISAKMP:(1008):Old State = IKE_QM_R_QM2 New State =
IKE_QM_PHASE2_COMPLETE
*May 4 00:45:02.045: IPSEC(key_engine): got a queue event with 1 KMI message(s)
*May 4 00:45:02.045: IPSEC(key_engine_enable_outbound): rec'd enable notify
from ISAKMP
*May 4 00:45:02.045: IPSEC(key_engine_enable_outbound): enable SA with spi 691355664/50
debug crypto ipsec -顯示第2階段的IPsec協商。
debug crypto isakmp -顯示第1階段的ISAKMP協商。
3-03-06-871W#debug crypto ipsec3-03-06-871W#debug crypto isakmp
*Jun 3 05:59:27.431: ISAKMP:(0): beginning Aggressive Mode exchange
*Jun 3 05:59:27.431: ISAKMP:(0): sending packet to 172.16.186.186 my_port
500 peer_port 500 (I) AG_INIT_EXCH
*Jun 3 05:59:27.455: ISAKMP (0:0): received packet from 172.16.186.186 dport
500 sport 500 Global (I) AG_INIT_EXCH
*Jun 3 05:59:27.455: ISAKMP:(0): processing SA payload. message ID = 0
*Jun 3 05:59:27.455: ISAKMP:(0): processing ID payload. message ID = 0
*Jun 3 05:59:27.455: ISAKMP (0:0): ID payload
next-payload : 10
type : 1
address : 172.16.186.186
protocol : 17
port : 0
length : 12
*Jun 3 05:59:27.455: ISAKMP:(0):: peer matches *none* of the profiles
*Jun 3 05:59:27.455: ISAKMP:(0): processing vendor id payload
*Jun 3 05:59:27.455: ISAKMP:(0): vendor ID is Unity
*Jun 3 05:59:27.455: ISAKMP:(0): processing vendor id payload
*Jun 3 05:59:27.455: ISAKMP:(0): vendor ID is DPD
*Jun 3 05:59:27.455: ISAKMP:(0): processing vendor id payload
*Jun 3 05:59:27.455: ISAKMP:(0): speaking to another IOS box!
*Jun 3 05:59:27.455: ISAKMP:(0): local preshared key found
*Jun 3 05:59:27.455: ISAKMP : Scanning profiles for xauth ...
*Jun 3 05:59:27.455: ISAKMP:(0): Authentication by xauth preshared
*Jun 3 05:59:27.455: ISAKMP:(0):Checking ISAKMP transform 1 against priority 65515 policy
*Jun 3 05:59:27.455: ISAKMP: encryption 3DES-CBC
*Jun 3 05:59:27.455: ISAKMP: hash SHA
*Jun 3 05:59:27.455: ISAKMP: default group 2
*Jun 3 05:59:27.459: ISAKMP: auth XAUTHInitPreShared
*Jun 3 05:59:27.459: ISAKMP: life type in seconds
*Jun 3 05:59:27.459: ISAKMP: life duration (VPI) of 0x0 0x20 0xC4 0x9B
*Jun 3 05:59:27.459: ISAKMP:(0):Encryption algorithm offered does not match policy!
*Jun 3 05:59:27.459: ISAKMP:(0):atts are not acceptable. Next payload is 0
*Jun 3 05:59:27.459: ISAKMP:(0):Checking ISAKMP transform 1 against priority 65516 policy
*Jun 3 05:59:27.459: ISAKMP: encryption 3DES-CBC
*Jun 3 05:59:27.459: ISAKMP: hash SHA
*Jun 3 05:59:27.459: ISAKMP: default group 2
*Jun 3 05:59:27.459: ISAKMP: auth XAUTHInitPreShared
*Jun 3 05:59:27.459: ISAKMP: life type in seconds
*Jun 3 05:59:27.459: ISAKMP: life duration (VPI) of 0x0 0x20 0xC4 0x9B
*Jun 3 05:59:27.459: ISAKMP:(0):Encryption algorithm offered does not match policy!
*Jun 3 05:59:27.459: ISAKMP:(0):atts are not acceptable. Next payload is 0
*Jun 3 05:59:27.459: ISAKMP:(0):Checking ISAKMP transform 1 against priority 65517 policy
*Jun 3 05:59:27.459: ISAKMP: encryption 3DES-CBC
*Jun 3 05:59:27.459: ISAKMP: hash SHA
*Jun 3 05:59:27.459: ISAKMP: default group 2
*Jun 3 05:59:27.459: ISAKMP: auth XAUTHInitPreShared
*Jun 3 05:59:27.459: ISAKMP: life type in seconds
*Jun 3 05:59:27.459: ISAKMP: life duration (VPI) of 0x0 0x20 0xC4 0x9B
*Jun 3 05:59:27.459: ISAKMP:(0):Encryption algorithm offered does not match policy!
*Jun 3 05:59:27.459: ISAKMP:(0):atts are not acceptable. Next payload is 0
*Jun 3 05:59:27.459: ISAKMP:(0):Checking ISAKMP transform 1 against priority 65518 policy
*Jun 3 05:59:27.459: ISAKMP: encryption 3DES-CBC
*Jun 3 05:59:27.459: ISAKMP: hash SHA
*Jun 3 05:59:27.459: ISAKMP: default group 2
*Jun 3 05:59:27.459: ISAKMP: auth XAUTHInitPreShared
*Jun 3 05:59:27.459: ISAKMP: life type in seconds
*Jun 3 05:59:27.459: ISAKMP: life duration (VPI) of 0x0 0x20 0xC4 0x9B
*Jun 3 05:59:27.459: ISAKMP:(0):Encryption algorithm offered does not match policy!
*Jun 3 05:59:27.459: ISAKMP:(0):atts are not acceptable. Next payload is 0
*Jun 3 05:59:27.459: ISAKMP:(0):Checking ISAKMP transform 1 against priority 65519 policy
*Jun 3 05:59:27.459: ISAKMP: encryption 3DES-CBC
*Jun 3 05:59:27.459: ISAKMP: hash SHA
*Jun 3 05:59:27.459: ISAKMP: default group 2
*Jun 3 05:59:27.459: ISAKMP: auth XAUTHInitPreShared
*Jun 3 05:59:27.459: ISAKMP: life type in seconds
*Jun 3 05:59:27.463: ISAKMP: life duration (VPI) of 0x0 0x20 0xC4 0x9B
*Jun 3 05:59:27.463: ISAKMP:(0):Encryption algorithm offered does not match policy!
*Jun 3 05:59:27.463: ISAKMP:(0):atts are not acceptable. Next payload is 0
*Jun 3 05:59:27.463: ISAKMP:(0):Checking ISAKMP transform 1 against priority 65520 policy
*Jun 3 05:59:27.463: ISAKMP: encryption 3DES-CBC
*Jun 3 05:59:27.463: ISAKMP: hash SHA
*Jun 3 05:59:27.463: ISAKMP: default group 2
*Jun 3 05:59:27.463: ISAKMP: auth XAUTHInitPreShared
*Jun 3 05:59:27.463: ISAKMP: life type in seconds
*Jun 3 05:59:27.463: ISAKMP: life duration (VPI) of 0x0 0x20 0xC4 0x9B
*Jun 3 05:59:27.463: ISAKMP:(0):Encryption algorithm offered does not match policy!
*Jun 3 05:59:27.463: ISAKMP:(0):atts are not acceptable. Next payload is 0
*Jun 3 05:59:27.463: ISAKMP:(0):Checking ISAKMP transform 1 against priority 65521 policy
*Jun 3 05:59:27.463: ISAKMP: encryption 3DES-CBC
*Jun 3 05:59:27.463: ISAKMP: hash SHA
*Jun 3 05:59:27.463: ISAKMP: default group 2
*Jun 3 05:59:27.463: ISAKMP: auth XAUTHInitPreShared
*Jun 3 05:59:27.463: ISAKMP: life type in seconds
*Jun 3 05:59:27.463: ISAKMP: life duration (VPI) of 0x0 0x20 0xC4 0x9B
*Jun 3 05:59:27.463: ISAKMP:(0):Encryption algorithm offered does not match policy!
*Jun 3 05:59:27.463: ISAKMP:(0):atts are not acceptable. Next payload is 0
*Jun 3 05:59:27.463: ISAKMP:(0):Checking ISAKMP transform 1 against priority 65522 policy
*Jun 3 05:59:27.463: ISAKMP: encryption 3DES-CBC
*Jun 3 05:59:27.463: ISAKMP: hash SHA
*Jun 3 05:59:27.463: ISAKMP: default group 2
*Jun 3 05:59:27.463: ISAKMP: auth XAUTHInitPreShared
*Jun 3 05:59:27.463: ISAKMP: life type in seconds
*Jun 3 05:59:27.463: ISAKMP: life duration (VPI) of 0x0 0x20 0xC4 0x9B
*Jun 3 05:59:27.463: ISAKMP:(0):Encryption algorithm offered does not match policy!
*Jun 3 05:59:27.463: ISAKMP:(0):atts are not acceptable. Next payload is 0
*Jun 3 05:59:27.463: ISAKMP:(0):Checking ISAKMP transform 1 against priority 65523 policy
*Jun 3 05:59:27.463: ISAKMP: encryption 3DES-CBC
*Jun 3 05:59:27.463: ISAKMP: hash SHA
*Jun 3 05:59:27.463: ISAKMP: default group 2
*Jun 3 05:59:27.463: ISAKMP: auth XAUTHInitPreShared
*Jun 3 05:59:27.463: ISAKMP: life type in seconds
*Jun 3 05:59:27.463: ISAKMP: life duration (VPI) of 0x0 0x20 0xC4 0x9B
*Jun 3 05:59:27.463: ISAKMP:(0):Encryption algorithm offered does not match policy!
*Jun 3 05:59:27.463: ISAKMP:(0):atts are not acceptable. Next payload is 0
*Jun 3 05:59:27.463: ISAKMP:(0):Checking ISAKMP transform 1 against priority 65524 policy
*Jun 3 05:59:27.467: ISAKMP: encryption 3DES-CBC
*Jun 3 05:59:27.467: ISAKMP: hash SHA
*Jun 3 05:59:27.467: ISAKMP: default group 2
*Jun 3 05:59:27.467: ISAKMP: auth XAUTHInitPreShared
*Jun 3 05:59:27.467: ISAKMP: life type in seconds
*Jun 3 05:59:27.467: ISAKMP: life duration (VPI) of 0x0 0x20 0xC4 0x9B
*Jun 3 05:59:27.467: ISAKMP:(0):Encryption algorithm offered does not match policy!
*Jun 3 05:59:27.467: ISAKMP:(0):atts are not acceptable. Next payload is 0
*Jun 3 05:59:27.467: ISAKMP:(0):Checking ISAKMP transform 1 against priority 65525 policy
*Jun 3 05:59:27.467: ISAKMP: encryption 3DES-CBC
*Jun 3 05:59:27.467: ISAKMP: hash SHA
*Jun 3 05:59:27.467: ISAKMP: default group 2
*Jun 3 05:59:27.467: ISAKMP: auth XAUTHInitPreShared
*Jun 3 05:59:27.467: ISAKMP: life type in seconds
*Jun 3 05:59:27.467: ISAKMP: life duration (VPI) of 0x0 0x20 0xC4 0x9B
*Jun 3 05:59:27.467: ISAKMP:(0):Encryption algorithm offered does not match policy!
*Jun 3 05:59:27.467: ISAKMP:(0):atts are not acceptable. Next payload is 0
*Jun 3 05:59:27.467: ISAKMP:(0):Checking ISAKMP transform 1 against priority 65526 policy
*Jun 3 05:59:27.467: ISAKMP: encryption 3DES-CBC
*Jun 3 05:59:27.467: ISAKMP: hash SHA
*Jun 3 05:59:27.467: ISAKMP: default group 2
*Jun 3 05:59:27.467: ISAKMP: auth XAUTHInitPreShared
*Jun 3 05:59:27.467: ISAKMP: life type in seconds
*Jun 3 05:59:27.467: ISAKMP: life duration (VPI) of 0x0 0x20 0xC4 0x9B
*Jun 3 05:59:27.467: ISAKMP:(0):Encryption algorithm offered does not match policy!
*Jun 3 05:59:27.467: ISAKMP:(0):atts are not acceptable. Next payload is 0
*Jun 3 05:59:27.467: ISAKMP:(0):Checking ISAKMP transform 1 against priority 65527 policy
*Jun 3 05:59:27.467: ISAKMP: encryption 3DES-CBC
*Jun 3 05:59:27.467: ISAKMP: hash SHA
*Jun 3 05:59:27.467: ISAKMP: default group 2
*Jun 3 05:59:27.467: ISAKMP: auth XAUTHInitPreShared
*Jun 3 05:59:27.467: ISAKMP: life type in seconds
*Jun 3 05:59:27.467: ISAKMP: life duration (VPI) of 0x0 0x20 0xC4 0x9B
*Jun 3 05:59:27.467: ISAKMP:(0):atts are acceptable. Next payload is 0
*Jun 3 05:59:27.467: ISAKMP (0:0): vendor ID is NAT-T v7
*Jun 3 05:59:27.467: ISAKMP:(0): processing KE payload. message ID = 0
*Jun 3 05:59:27.475: ISAKMP:(0): processing NONCE payload. message ID = 0
*Jun 3 05:59:27.475: ISAKMP:(2006): processing HASH payload. message ID = 0
*Jun 3 05:59:27.475: ISAKMP:(2006):SA authentication status:
authenticated
*Jun 3 05:59:27.475: ISAKMP:(2006):SA has been authenticated with 172.16.186.186
*Jun 3 05:59:27.475: ISAKMP:(2006):Send initial contact
*Jun 3 05:59:27.475: ISAKMP:(2006): sending packet to 172.16.186.186
my_port 500 peer_port 500 (I) AG_INIT_EXCH
*Jun 3 05:59:27.479: ISAKMP:(2006):Input = IKE_MESG_FROM_PEER, IKE_AM_EXCH
*Jun 3 05:59:27.479: ISAKMP:(2006):Old State = IKE_I_AM1 New State = IKE_P1_COMPLETE
*Jun 3 05:59:27.479: ISAKMP:(2006):Need XAUTH
*Jun 3 05:59:27.479: ISAKMP:(2006):Input = IKE_MESG_INTERNAL, IKE_PHASE1_COMPLETE
!--- Phase 1 (ISAKMP) is complete.
*Jun 3 05:59:27.479: ISAKMP:(2006):Old State = IKE_P1_COMPLETE New State = IKE_P1_COMPLETE
!--- Xauth initiates.
*Jun 3 05:59:27.479: ISAKMP (0:2006): received packet from 172.16.186.186
dport 500 sport 500 Global (I) CONF_XAUTH
*Jun 3 05:59:27.483: ISAKMP: set new node 850198625 to CONF_XAUTH
*Jun 3 05:59:27.487: ISAKMP:(2006):processing transaction payload from
172.16.186.186. message ID = -1517216966
*Jun 3 05:59:27.487: ISAKMP: Config payload REQUEST
*Jun 3 05:59:27.487: ISAKMP:(2006):checking request:
*Jun 3 05:59:27.487: ISAKMP: XAUTH_USER_NAME_V2
*Jun 3 05:59:27.487: ISAKMP: XAUTH_USER_PASSWORD_V2
*Jun 3 05:59:27.487: ISAKMP:(2006):Xauth process request
*Jun 3 05:59:27.487: ISAKMP:(2006):Input = IKE_MESG_FROM_PEER, IKE_CFG_REQUEST
*Jun 3 05:59:27.487: ISAKMP:(2006):Old State = IKE_P1_COMPLETE
New State = IKE_XAUTH_REPLY_AWAIT
*Jun 3 05:59:30.242: EZVPN(ez): Pending XAuth Request, Please enter the
following command:
*Jun 3 05:59:30.242: EZVPN: crypto ipsec client ezvpn xauth
!--- Enter the crypto ipsec client ezvpn xauth command.
3-03-06-871W#crypto ipsec client ezvpn xauth
Username: cisco
Password:
*Jun 3 06:02:46.498: username: cisco
*Jun 3 06:02:46.498: password: <omitted>
*Jun 3 06:02:46.498: ISAKMP:(2008): responding to peer config from
172.16.186.186. ID = -605466681
*Jun 3 06:02:46.498: ISAKMP:(2008): sending packet to 172.16.186.186 my_port
500 peer_port 500 (I) CONF_XAUTH
*Jun 3 06:02:46.498: ISAKMP:(2008):deleting node -605466681 error FALSE reason
"Done with xauth request/reply exchange"
*Jun 3 06:02:46.498: ISAKMP:(2008):Input = IKE_MESG_INTERNAL, IKE_XAUTH_REPLY_ATTR
*Jun 3 06:02:46.498: ISAKMP:(2008):Old State = IKE_XAUTH_REPLY_AWAIT New State =
IKE_XAUTH_REPLY_SENT
*Jun 3 06:02:46.502: ISAKMP (0:2008): received packet from 172.16.186.186 dport
500 sport 500 Global (I) CONF_XAUTH
*Jun 3 06:02:46.502: ISAKMP: set new node 1283697340 to CONF_XAUTH
*Jun 3 06:02:46.502: ISAKMP:(2008):processing transaction payload from
172.16.186.186. message ID = 1283697340
*Jun 3 06:02:46.502: ISAKMP: Config payload SET
*Jun 3 06:02:46.502: ISAKMP:(2008):Xauth process set, status = 1
*Jun 3 06:02:46.502: ISAKMP:(2008):checking SET:
*Jun 3 06:02:46.502: ISAKMP: XAUTH_STATUS_V2 XAUTH-OK
*Jun 3 06:02:46.502: ISAKMP:(2008):attributes sent in message:
*Jun 3 06:02:46.502: Status: 1
*Jun 3 06:02:46.506: ISAKMP:(2008): sending packet to 172.16.186.186
my_port 500 peer_port 500 (I) CONF_XAUTH
*Jun 3 06:02:46.506: ISAKMP:(2008):deleting node 1283697340 error FALSE
reason "No Error"
*Jun 3 06:02:46.506: ISAKMP:(2008):Input = IKE_MESG_FROM_PEER, IKE_CFG_SET
*Jun 3 06:02:46.506: ISAKMP:(2008):Old State = IKE_XAUTH_REPLY_SENT
New State = IKE_P1_COMPLETE
*Jun 3 06:02:46.506: ISAKMP:(2008):Need config/address
*Jun 3 06:02:46.506: ISAKMP: set new node 104696831 to CONF_ADDR
*Jun 3 06:02:46.506: ISAKMP: Sending APPLICATION_VERSION string: Cisco IOS
Software, C870 Software (C870-ADVIPSERVICESK9-M),
Experimental Version 12.4(20060201:210845)
[prchadal-CSCsb79792-haw_t_pi4 101]
Copyright (c) 1986-2006 by Cisco Systems, Inc.
Compiled Thu 02-Feb-06 03:19 by prchadal
*Jun 3 06:02:46.506: ISAKMP:(2008): initiating peer config to 172.16.186.186.
ID = 104696831
*Jun 3 06:02:46.506: ISAKMP:(2008): sending packet to 172.16.186.186 my_port
500 peer_port 500 (I) CONF_ADDR
*Jun 3 06:02:46.506: ISAKMP:(2008):Input = IKE_MESG_INTERNAL, IKE_PHASE1_COMPLETE
*Jun 3 06:02:46.506: ISAKMP:(2008):Old State = IKE_P1_COMPLETE New State =
IKE_CONFIG_MODE_REQ_SENT
*Jun 3 06:02:46.510: ISAKMP (0:2008): received packet from 172.16.186.186 dport
500 sport 500 Global (I) CONF_ADDR
*Jun 3 06:02:46.514: ISAKMP:(2008):processing transaction payload from
172.16.186.186. message ID = 104696831
*Jun 3 06:02:46.514: ISAKMP: Config payload REPLY
*Jun 3 06:02:46.514: ISAKMP(0:2008) process config reply
*Jun 3 06:02:46.514: ISAKMP:(2008):deleting node 104696831 error
FALSE reason "Transaction mode done"
*Jun 3 06:02:46.514: ISAKMP:(2008):Input = IKE_MESG_FROM_PEER, IKE_CFG_REPLY
*Jun 3 06:02:46.514: ISAKMP:(2008):Old State = IKE_CONFIG_MODE_REQ_SENT
New State = IKE_P1_COMPLETE
*Jun 3 06:02:46.518: insert of map into mapdb AVL failed, map + ace pair
already exists on the mapdb
*Jun 3 06:02:46.518: ISAKMP:(2008):Input = IKE_MESG_INTERNAL, IKE_PHASE1_COMPLETE
*Jun 3 06:02:46.518: ISAKMP:(2008):Old State = IKE_P1_COMPLETE New State =
IKE_P1_COMPLETE
*Jun 3 06:02:46.522: IPSEC(sa_request): ,
(key eng. msg.) OUTBOUND local= 172.16.186.130, remote= 172.16.186.186,
local_proxy= 10.12.130.1/255.255.255.255/0/0 (type=1),
remote_proxy= 0.0.0.0/0.0.0.0/0/0 (type=4),
protocol= ESP, transform= NONE (Tunnel),
lifedur= 2147483s and 4608000kb,
spi= 0xA0FC0985(2700872069), conn_id= 0, keysize= 128, flags= 0x2000
*Jun 3 06:02:46.522: IPSEC(sa_request): ,
(key eng. msg.) OUTBOUND local= 172.16.186.130, remote= 172.16.186.186,
local_proxy= 10.12.130.1/255.255.255.255/0/0 (type=1),
remote_proxy= 0.0.0.0/0.0.0.0/0/0 (type=4),
protocol= ESP, transform= NONE (Tunnel),
lifedur= 2147483s and 4608000kb,
spi= 0xBB426C9(196355785), conn_id= 0, keysize= 128, flags= 0x2000
*Jun 3 06:02:46.522: IPSEC(sa_request): ,
(key eng. msg.) OUTBOUND local= 172.16.186.130, remote= 172.16.186.186,
local_proxy= 10.12.130.1/255.255.255.255/0/0 (type=1),
remote_proxy= 0.0.0.0/0.0.0.0/0/0 (type=4),
protocol= ESP, transform= NONE (Tunnel),
lifedur= 2147483s and 4608000kb,
spi= 0xB349BB06(3007953670), conn_id= 0, keysize= 192, flags= 0x2000
*Jun 3 06:02:46.522: IPSEC(sa_request): ,
(key eng. msg.) OUTBOUND local= 172.16.186.130, remote= 172.16.186.186,
local_proxy= 10.12.130.1/255.255.255.255/0/0 (type=1),
remote_proxy= 0.0.0.0/0.0.0.0/0/0 (type=4),
protocol= ESP, transform= NONE (Tunnel),
lifedur= 2147483s and 4608000kb,
spi= 0xC114CFB8(3239366584), conn_id= 0, keysize= 192, flags= 0x2000
*Jun 3 06:02:46.522: IPSEC(sa_request): ,
(key eng. msg.) OUTBOUND local= 172.16.186.130, remote= 172.16.186.186,
local_proxy= 10.12.130.1/255.255.255.255/0/0 (type=1),
remote_proxy= 0.0.0.0/0.0.0.0/0/0 (type=4),
protocol= ESP, transform= NONE (Tunnel),
lifedur= 2147483s and 4608000kb,
spi= 0x2ED87C62(785939554), conn_id= 0, keysize= 256, flags= 0x2000
*Jun 3 06:02:46.522: IPSEC(sa_request): ,
(key eng. msg.) OUTBOUND local= 172.16.186.130, remote= 172.16.186.186,
local_proxy= 10.12.130.1/255.255.255.255/0/0 (type=1),
remote_proxy= 0.0.0.0/0.0.0.0/0/0 (type=4),
protocol= ESP, transform= NONE (Tunnel),
lifedur= 2147483s and 4608000kb,
spi= 0x226A6FF3(577400819), conn_id= 0, keysize= 256, flags= 0x2000
*Jun 3 06:02:46.522: IPSEC(sa_request): ,
(key eng. msg.) OUTBOUND local= 172.16.186.130, remote= 172.16.186.186,
local_proxy= 10.12.130.1/255.255.255.255/0/0 (type=1),
remote_proxy= 0.0.0.0/0.0.0.0/0/0 (type=4),
protocol= ESP, transform= NONE (Tunnel),
lifedur= 2147483s and 4608000kb,
spi= 0x29354010(691355664), conn_id= 0, keysize= 0, flags= 0x2000
*Jun 3 06:02:46.526: IPSEC(sa_request): ,
(key eng. msg.) OUTBOUND local= 172.16.186.130, remote= 172.16.186.186,
local_proxy= 10.12.130.1/255.255.255.255/0/0 (type=1),
remote_proxy= 0.0.0.0/0.0.0.0/0/0 (type=4),
protocol= ESP, transform= NONE (Tunnel),
lifedur= 2147483s and 4608000kb,
spi= 0x12111E5C(303111772), conn_id= 0, keysize= 0, flags= 0x2000
*Jun 3 06:02:46.526: IPSEC(sa_request): ,
(key eng. msg.) OUTBOUND local= 172.16.186.130, remote= 172.16.186.186,
local_proxy= 10.12.130.1/255.255.255.255/0/0 (type=1),
remote_proxy= 0.0.0.0/0.0.0.0/0/0 (type=4),
protocol= ESP, transform= NONE (Tunnel),
lifedur= 2147483s and 4608000kb,
spi= 0x98084B9A(2550680474), conn_id= 0, keysize= 0, flags= 0x2000
*Jun 3 06:02:46.526: IPSEC(sa_request): ,
(key eng. msg.) OUTBOUND local= 172.16.186.130, remote= 172.16.186.186,
local_proxy= 10.12.130.1/255.255.255.255/0/0 (type=1),
remote_proxy= 0.0.0.0/0.0.0.0/0/0 (type=4),
protocol= ESP, transform= NONE (Tunnel),
lifedur= 2147483s and 4608000kb,
spi= 0x9442501B(2487373851), conn_id= 0, keysize= 0, flags= 0x0
*Jun 3 06:02:46.526: ISAKMP: set new node 0 to QM_IDLE
*Jun 3 06:02:46.526: ISAKMP:(2008): sitting IDLE. Starting QM immediately (QM_IDLE)
*Jun 3 06:02:46.526: ISAKMP:(2008):beginning Quick Mode exchange, M-ID of -1665883002
*Jun 3 06:02:46.526: ISAKMP:(2008):QM Initiator gets spi
*Jun 3 06:02:46.530: ISAKMP:(2008): sending packet to 172.16.186.186 my_port
500 peer_port 500 (I) QM_IDLE
*Jun 3 06:02:46.530: ISAKMP:(2008):Node -1665883002, Input = IKE_MESG_INTERNAL,
IKE_INIT_QM
*Jun 3 06:02:46.530: ISAKMP:(2008):Old State = IKE_QM_READY New State = IKE_QM_I_QM1
*Jun 3 06:02:46.538: ISAKMP (0:2008): received packet from 172.16.186.186
dport 500 sport 500 Global (I) QM_IDLE
*Jun 3 06:02:46.538: ISAKMP:(2008): processing HASH payload. message ID = -1665883002
*Jun 3 06:02:46.538: ISAKMP:(2008): processing SA payload. message ID = -1665883002
*Jun 3 06:02:46.538: ISAKMP:(2008):Checking IPSec proposal 1
*Jun 3 06:02:46.538: ISAKMP: transform 1, ESP_3DES
*Jun 3 06:02:46.538: ISAKMP: attributes in transform:
*Jun 3 06:02:46.538: ISAKMP: encaps is 1 (Tunnel)
*Jun 3 06:02:46.538: ISAKMP: SA life type in seconds
*Jun 3 06:02:46.538: ISAKMP: SA life duration (VPI) of 0x0 0x20 0xC4 0x9B
*Jun 3 06:02:46.538: ISAKMP: SA life type in kilobytes
*Jun 3 06:02:46.538: ISAKMP: SA life duration (VPI) of 0x0 0x46 0x50 0x0
*Jun 3 06:02:46.542: ISAKMP: authenticator is HMAC-SHA
*Jun 3 06:02:46.542: ISAKMP:(2008):atts are acceptable.
*Jun 3 06:02:46.542: IPSEC(validate_proposal_request): proposal part #1
*Jun 3 06:02:46.542: IPSEC(validate_proposal_request): proposal part #1,
(key eng. msg.) INBOUND local= 172.16.186.130, remote= 172.16.186.186,
local_proxy= 10.12.130.1/255.255.255.255/0/0 (type=1),
remote_proxy= 0.0.0.0/0.0.0.0/0/0 (type=4),
protocol= ESP, transform= esp-3des esp-sha-hmac (Tunnel),
lifedur= 0s and 0kb,
spi= 0x0(0), conn_id= 0, keysize= 0, flags= 0x0
*Jun 3 06:02:46.542: Crypto mapdb : proxy_match
src addr : 10.12.130.1
dst addr : 0.0.0.0
protocol : 0
src port : 0
dst port : 0
*Jun 3 06:02:46.542: ISAKMP:(2008): processing NONCE payload. message ID = -1665883002
*Jun 3 06:02:46.542: ISAKMP:(2008): processing ID payload. message ID = -1665883002
*Jun 3 06:02:46.542: ISAKMP:(2008): processing ID payload. message ID = -1665883002
*Jun 3 06:02:46.542: ISAKMP:(2008): processing NOTIFY RESPONDER_LIFETIME protocol 3
spi 1752561220, message ID = -1665883002, sa = 83BCC9DC
*Jun 3 06:02:46.542: ISAKMP:(2008):SA authentication status:
authenticated
*Jun 3 06:02:46.542: ISAKMP:(2008): processing responder lifetime
*Jun 3 06:02:46.542: ISAKMP (2008): responder lifetime of 3600s
*Jun 3 06:02:46.542: ISAKMP:(2008): Creating IPSec SAs
*Jun 3 06:02:46.542: inbound SA from 172.16.186.186 to 172.16.186.130 (f/i) 0/ 0
(proxy 0.0.0.0 to 10.12.130.1)
*Jun 3 06:02:46.542: has spi 0x29354010 and conn_id 0
*Jun 3 06:02:46.542: lifetime of 3590 seconds
*Jun 3 06:02:46.542: lifetime of 4608000 kilobytes
*Jun 3 06:02:46.546: outbound SA from 172.16.186.130 to 172.16.186.186 (f/i) 0/0
(proxy 10.12.130.1 to 0.0.0.0)
*Jun 3 06:02:46.546: has spi 0x6875F644 and conn_id 0
*Jun 3 06:02:46.546: lifetime of 3590 seconds
*Jun 3 06:02:46.546: lifetime of 4608000 kilobytes
*Jun 3 06:02:46.546: ISAKMP:(2008): sending packet to 172.16.186.186
my_port 500 peer_port 500 (I) QM_IDLE
*Jun 3 06:02:46.546: ISAKMP:(2008):deleting node -1665883002 error FALSE
reason "No Error"
*Jun 3 06:02:46.546: ISAKMP:(2008):Node -1665883002, Input = IKE_MESG_FROM_PEER,
IKE_QM_EXCH
*Jun 3 06:02:46.546: ISAKMP:(2008):Old State = IKE_QM_I_QM1 New State =
IKE_QM_PHASE2_COMPLETE
*Jun 3 06:02:46.546: IPSEC(key_engine): got a queue event with 1 KMI message(s)
*Jun 3 06:02:46.546: Crypto mapdb : proxy_match
src addr : 10.12.130.1
dst addr : 0.0.0.0
protocol : 0
src port : 0
dst port : 0
*Jun 3 06:02:46.546: IPSEC(crypto_ipsec_sa_find_ident_head): reconnecting with
the same proxies and peer 172.16.186.186
*Jun 3 06:02:46.546: IPSEC(policy_db_add_ident): src 10.12.130.1, dest 0.0.0.0,
dest_port 0
*Jun 3 06:02:46.546: IPSEC(create_sa): sa created,
(sa) sa_dest= 172.16.186.130, sa_proto= 50,
sa_spi= 0x29354010(691355664),
sa_trans= esp-3des esp-sha-hmac , sa_conn_id= 11
*Jun 3 06:02:46.546: IPSEC(create_sa): sa created,
(sa) sa_dest= 172.16.186.186, sa_proto= 50,
sa_spi= 0x6875F644(1752561220),
sa_trans= esp-3des esp-sha-hmac , sa_conn_id= 12
*Jun 3 06:02:46.550: IPSEC(update_current_outbound_sa):
updated peer 172.16.186.186 current outbound sa to SPI 6875F644
*Jun 3 06:02:46.550: %CRYPTO-6-EZVPN_CONNECTION_UP: (Client)
User= Group=vpngrp Client_public_addr=172.16.186.130
Server_public_addr=172.16.186.186 NEM_Remote_Subnets=10.12.130.1/255.255.255.255
*Jun 3 06:02:47.130: ISAKMP: set new node -1866551769 to QM_IDLE
| 修訂 | 發佈日期 | 意見 |
|---|---|---|
1.0 |
13-Apr-2009
|
初始版本 |