jimmyk -> ISA to Cisco 3030 vpn (10.Oct.2006 12:25:17 PM)
|
Hello, I can get the Cisco 3030 VPN Concentrator to establish an IPSEC tunnel to a Linksys Router, but I cannot get the Cisco 3030 VPN Concentrator to establish an IPSEC tunnel to ISA 2004 SP2. The ip address 1.1.1.1 is the endpoint on the ISA. The ip address 2.2.2.2 is the endpoint on the Cisco 3030. Here is the output from the ISA log. I have BOLDENED what I feel are the pertinent parts. Any help is greatly appreciated. 10-09: 10:36:43:312:700 Creating socket directly on MS base provider. Bypassing LSPs 10-09: 10:36:43:312:700 Creating socket directly on MS base provider. Bypassing LSPs 10-09: 10:36:43:312:700 Creating socket directly on MS base provider. Bypassing LSPs 10-09: 10:36:43:312:700 Initialization OK 10-09: 11:24:29:900:778 Acquire from driver: op=00000006 src=1.1.1.1.0 dst=10.1.0.81.0 proto = 0, SrcMask=255.255.255.255, DstMask=255.255.255.0, Tunnel 1, TunnelEndpt=2.2.2.2 Inbound TunnelEndpt=1.1.1.1 10-09: 11:24:29:916:2e0 Filter to match: Src 2.2.2.2 Dst 1.1.1.1 10-09: 11:24:29:916:2e0 MM PolicyName: ISA Server CompanyX #2 MM Policy 10-09: 11:24:29:916:2e0 MMPolicy dwFlags 0 SoftSAExpireTime 28800 10-09: 11:24:29:916:2e0 MMOffer[0] LifetimeSec 86400 QMLimit 0 DHGroup 2 10-09: 11:24:29:916:2e0 MMOffer[0] Encrypt: Triple DES CBC Hash: MD5 10-09: 11:24:29:916:2e0 Auth[0]:PresharedKey KeyLen 36 10-09: 11:24:29:916:2e0 QM PolicyName: ISA Server CompanyX #2 QM Policy dwFlags 0 10-09: 11:24:29:916:2e0 QMOffer[0] LifetimeKBytes 0 LifetimeSec 86400 10-09: 11:24:29:916:2e0 QMOffer[0] dwFlags 0 dwPFSGroup 0 10-09: 11:24:29:916:2e0 Algo[0] Operation: ESP Algo: Triple DES CBC HMAC: MD5 10-09: 11:24:29:916:2e0 Starting Negotiation: src = 1.1.1.1.0500, dst = 2.2.2.2.0500, proto = 00, context = 00000006, ProxySrc = 1.1.1.1.0000, ProxyDst = 10.1.0.0.0000 SrcMask = 255.255.255.255 DstMask = 255.255.255.0 10-09: 11:24:29:916:2e0 constructing ISAKMP Header 10-09: 11:24:29:916:2e0 constructing SA (ISAKMP) 10-09: 11:24:29:916:2e0 Constructing Vendor MS NT5 ISAKMPOAKLEY 10-09: 11:24:29:916:2e0 Constructing Vendor FRAGMENTATION 10-09: 11:24:29:916:2e0 Constructing Vendor draft-ietf-ipsec-nat-t-ike-02 10-09: 11:24:29:916:2e0 Constructing Vendor Vid-Initial-Contact 10-09: 11:24:29:916:2e0 10-09: 11:24:29:916:2e0 Sending: SA = 0x00122C50 to 2.2.2.2:Type 2.500 10-09: 11:24:29:916:2e0 ISAKMP Header: (V1.0), len = 168 10-09: 11:24:29:916:2e0 I-COOKIE 3e3a5fc3d412eb41 10-09: 11:24:29:916:2e0 R-COOKIE 0000000000000000 10-09: 11:24:29:916:2e0 exchange: Oakley Main Mode 10-09: 11:24:29:916:2e0 flags: 0 10-09: 11:24:29:916:2e0 next payload: SA 10-09: 11:24:29:916:2e0 message ID: 00000000 10-09: 11:24:29:916:2e0 Ports S:f401 D:f401 10-09: 11:24:29:931:2e0 10-09: 11:24:29:931:2e0 Receive: (get) SA = 0x00122c50 from 2.2.2.2.500 10-09: 11:24:29:931:2e0 ISAKMP Header: (V1.0), len = 108 10-09: 11:24:29:931:2e0 I-COOKIE 3e3a5fc3d412eb41 10-09: 11:24:29:931:2e0 R-COOKIE c161efb8a77e5d79 10-09: 11:24:29:931:2e0 exchange: Oakley Main Mode 10-09: 11:24:29:931:2e0 flags: 0 10-09: 11:24:29:931:2e0 next payload: SA 10-09: 11:24:29:931:2e0 message ID: 00000000 10-09: 11:24:29:931:2e0 processing payload SA 10-09: 11:24:29:931:2e0 Received Phase 1 Transform 1 10-09: 11:24:29:931:2e0 Encryption Alg Triple DES CBC(5) 10-09: 11:24:29:931:2e0 Hash Alg MD5(1) 10-09: 11:24:29:931:2e0 Oakley Group 2 10-09: 11:24:29:931:2e0 Auth Method Preshared Key(1) 10-09: 11:24:29:931:2e0 Life type in Seconds 10-09: 11:24:29:931:2e0 Life duration of 86400 10-09: 11:24:29:931:2e0 Phase 1 SA accepted: transform=1 10-09: 11:24:29:931:2e0 SA - Oakley proposal accepted 10-09: 11:24:29:931:2e0 processing payload VENDOR ID 10-09: 11:24:29:931:2e0 Received VendorId FRAGMENTATION 10-09: 11:24:29:931:2e0 ClearFragList 10-09: 11:24:29:931:2e0 constructing ISAKMP Header 10-09: 11:24:29:962:2e0 constructing KE 10-09: 11:24:29:962:2e0 constructing NONCE (ISAKMP) 10-09: 11:24:29:962:2e0 10-09: 11:24:29:962:2e0 Sending: SA = 0x00122C50 to 2.2.2.2:Type 2.500 10-09: 11:24:29:962:2e0 ISAKMP Header: (V1.0), len = 184 10-09: 11:24:29:962:2e0 I-COOKIE 3e3a5fc3d412eb41 10-09: 11:24:29:962:2e0 R-COOKIE c161efb8a77e5d79 10-09: 11:24:29:962:2e0 exchange: Oakley Main Mode 10-09: 11:24:29:962:2e0 flags: 0 10-09: 11:24:29:962:2e0 next payload: KE 10-09: 11:24:29:962:2e0 message ID: 00000000 10-09: 11:24:29:962:2e0 Ports S:f401 D:f401 10-09: 11:24:30:25:2e0 10-09: 11:24:30:25:2e0 Receive: (get) SA = 0x00122c50 from 2.2.2.2.500 10-09: 11:24:30:25:2e0 ISAKMP Header: (V1.0), len = 256 10-09: 11:24:30:25:2e0 I-COOKIE 3e3a5fc3d412eb41 10-09: 11:24:30:25:2e0 R-COOKIE c161efb8a77e5d79 10-09: 11:24:30:25:2e0 exchange: Oakley Main Mode 10-09: 11:24:30:25:2e0 flags: 0 10-09: 11:24:30:25:2e0 next payload: KE 10-09: 11:24:30:25:2e0 message ID: 00000000 10-09: 11:24:30:25:2e0 processing payload KE 10-09: 11:24:30:41:2e0 processing payload NONCE 10-09: 11:24:30:41:2e0 processing payload VENDOR ID 10-09: 11:24:30:41:2e0 processing payload VENDOR ID 10-09: 11:24:30:41:2e0 processing payload VENDOR ID 10-09: 11:24:30:41:2e0 processing payload VENDOR ID 10-09: 11:24:30:41:2e0 ClearFragList 10-09: 11:24:30:41:2e0 constructing ISAKMP Header 10-09: 11:24:30:41:2e0 constructing ID 10-09: 11:24:30:41:2e0 MM ID Type 1 10-09: 11:24:30:41:2e0 MM ID 434fbf7e 10-09: 11:24:30:41:2e0 constructing HASH 10-09: 11:24:30:41:2e0 10-09: 11:24:30:41:2e0 Sending: SA = 0x00122C50 to 2.2.2.2:Type 2.500 10-09: 11:24:30:41:2e0 ISAKMP Header: (V1.0), len = 60 10-09: 11:24:30:41:2e0 I-COOKIE 3e3a5fc3d412eb41 10-09: 11:24:30:41:2e0 R-COOKIE c161efb8a77e5d79 10-09: 11:24:30:41:2e0 exchange: Oakley Main Mode 10-09: 11:24:30:41:2e0 flags: 1 ( encrypted ) 10-09: 11:24:30:41:2e0 next payload: ID 10-09: 11:24:30:41:2e0 message ID: 00000000 10-09: 11:24:30:41:2e0 Ports S:f401 D:f401 10-09: 11:24:30:165:2e0 10-09: 11:24:30:165:2e0 Receive: (get) SA = 0x00122c50 from 2.2.2.2.500 10-09: 11:24:30:165:2e0 ISAKMP Header: (V1.0), len = 84 10-09: 11:24:30:165:2e0 I-COOKIE 3e3a5fc3d412eb41 10-09: 11:24:30:165:2e0 R-COOKIE c161efb8a77e5d79 10-09: 11:24:30:165:2e0 exchange: Oakley Main Mode 10-09: 11:24:30:165:2e0 flags: 1 ( encrypted ) 10-09: 11:24:30:165:2e0 next payload: ID 10-09: 11:24:30:165:2e0 message ID: 00000000 10-09: 11:24:30:165:2e0 processing payload ID 10-09: 11:24:30:165:2e0 processing payload HASH 10-09: 11:24:30:165:2e0 AUTH: Phase I authentication accepted 10-09: 11:24:30:165:2e0 processing payload VENDOR ID 10-09: 11:24:30:165:2e0 ClearFragList 10-09: 11:24:30:165:2e0 MM established. SA: 00122C50 10-09: 11:24:30:181:2e0 QM PolicyName: ISA Server CompanyX #2 QM Policy dwFlags 0 10-09: 11:24:30:181:2e0 QMOffer[0] LifetimeKBytes 0 LifetimeSec 86400 10-09: 11:24:30:181:2e0 QMOffer[0] dwFlags 0 dwPFSGroup 0 10-09: 11:24:30:181:2e0 Algo[0] Operation: ESP Algo: Triple DES CBC HMAC: MD5 10-09: 11:24:30:181:2e0 GetSpi: src = 10.1.0.0.0000, dst = 1.1.1.1.0000, proto = 00, context = 00000006, srcMask = 255.255.255.0, destMask = 255.255.255.255, TunnelFilter 1 10-09: 11:24:30:181:2e0 Setting SPI 957874780 10-09: 11:24:30:181:2e0 constructing ISAKMP Header 10-09: 11:24:30:181:2e0 constructing HASH (null) 10-09: 11:24:30:181:2e0 constructing SA (IPSEC) 10-09: 11:24:30:181:2e0 constructing NONCE (IPSEC) 10-09: 11:24:30:181:2e0 constructing ID (proxy) 10-09: 11:24:30:181:2e0 constructing ID (proxy) 10-09: 11:24:30:181:2e0 constructing HASH (QM) 10-09: 11:24:30:181:2e0 10-09: 11:24:30:181:2e0 Sending: SA = 0x00122C50 to 2.2.2.2:Type 2.500 10-09: 11:24:30:181:2e0 ISAKMP Header: (V1.0), len = 156 10-09: 11:24:30:181:2e0 I-COOKIE 3e3a5fc3d412eb41 10-09: 11:24:30:181:2e0 R-COOKIE c161efb8a77e5d79 10-09: 11:24:30:181:2e0 exchange: Oakley Quick Mode 10-09: 11:24:30:181:2e0 flags: 1 ( encrypted ) 10-09: 11:24:30:181:2e0 next payload: HASH 10-09: 11:24:30:181:2e0 message ID: 81c7baa1 10-09: 11:24:30:181:2e0 Ports S:f401 D:f401 10-09: 11:24:30:197:2e0 10-09: 11:24:30:197:2e0 Receive: (get) SA = 0x00122c50 from 2.2.2.2.500 10-09: 11:24:30:197:2e0 ISAKMP Header: (V1.0), len = 76 10-09: 11:24:30:197:2e0 I-COOKIE 3e3a5fc3d412eb41 10-09: 11:24:30:197:2e0 R-COOKIE c161efb8a77e5d79 10-09: 11:24:30:197:2e0 exchange: ISAKMP Informational Exchange 10-09: 11:24:30:197:2e0 flags: 1 ( encrypted ) 10-09: 11:24:30:197:2e0 next payload: HASH 10-09: 11:24:30:197:2e0 message ID: 248b093e 10-09: 11:24:30:197:2e0 processing HASH (Notify/Delete) 10-09: 11:24:30:197:2e0 processing payload DELETE 10-09: 11:24:30:197:2e0 SA Dead. sa:00122C50 status:35ef 10-09: 11:24:30:197:2e0 CE Dead. sa:00122C50 ce:000E1EE8 status:35ef 10-09: 11:24:30:197:2e0 Data Protection Mode (Quick Mode) 10-09: 11:24:30:197:2e0 Source IP Address 1.1.1.1 Source IP Address Mask 255.255.255.255 Destination IP Address 10.1.0.0 Destination IP Address Mask 255.255.255.0 Protocol 0 Source Port 0 Destination Port 0 IKE Local Addr 1.1.1.1 IKE Peer Addr 2.2.2.2 IKE Source Port 500 IKE Destination Port 500 Peer Private Addr 10-09: 11:24:30:197:2e0 Preshared key ID. Peer IP Address: 2.2.2.2 10-09: 11:24:30:197:2e0 Me 10-09: 11:24:30:197:2e0 IKE SA deleted by peer before establishment completed 10-09: 11:24:30:197:2e0 Processed third (ID) payload Initiator. Delta Time 1 0x0 0x0 10-09: 11:24:30:197:2e0 isadb_set_status sa:00122C50 centry:000E1EE8 status 35ef 10-09: 11:24:30:197:2e0 Re-initiating SA SRC=7ebf4f43 DST=180a 10-09: 11:24:30:197:2e0 Internal Acquire: op=00000006 src=1.1.1.1.0 dst=10.1.0.0.0 proto = 0, SrcMask=255.255.255.255, DstMask=255.255.255.0, Tunnel 1, TunnelEndpt=2.2.2.2 Inbound TunnelEndpt=1.1.1.1, InitiateEvent=00000000, IKE SrcPort=500 IKE DstPort=500 10-09: 11:24:30:197:2e0 isadb_set_status sa:00122C50 centry:00000000 status 35ef 10-09: 11:24:30:259:e54 Filter to match: Src 2.2.2.2 Dst 1.1.1.1 10-09: 11:24:30:259:e54 MM PolicyName: ISA Server CompanyX #2 MM Policy 10-09: 11:24:30:259:e54 MMPolicy dwFlags 0 SoftSAExpireTime 28800 10-09: 11:24:30:259:e54 MMOffer[0] LifetimeSec 86400 QMLimit 0 DHGroup 2 10-09: 11:24:30:259:e54 MMOffer[0] Encrypt: Triple DES CBC Hash: MD5 10-09: 11:24:30:259:e54 Auth[0]:PresharedKey KeyLen 36 10-09: 11:24:30:259:e54 QM PolicyName: ISA Server CompanyX #2 QM Policy dwFlags 0 10-09: 11:24:30:259:e54 QMOffer[0] LifetimeKBytes 0 LifetimeSec 86400 10-09: 11:24:30:259:e54 QMOffer[0] dwFlags 0 dwPFSGroup 0 10-09: 11:24:30:259:e54 Algo[0] Operation: ESP Algo: Triple DES CBC HMAC: MD5 10-09: 11:24:30:259:e54 Starting Negotiation: src = 1.1.1.1.0500, dst = 2.2.2.2.0500, proto = 00, context = 00000006, ProxySrc = 1.1.1.1.0000, ProxyDst = 10.1.0.0.0000 SrcMask = 255.255.255.255 DstMask = 255.255.255.0 10-09: 11:24:30:259:e54 constructing ISAKMP Header 10-09: 11:24:30:259:e54 constructing SA (ISAKMP) 10-09: 11:24:30:259:e54 Constructing Vendor MS NT5 ISAKMPOAKLEY 10-09: 11:24:30:259:e54 Constructing Vendor FRAGMENTATION 10-09: 11:24:30:259:e54 Constructing Vendor draft-ietf-ipsec-nat-t-ike-02 10-09: 11:24:30:259:e54 10-09: 11:24:30:259:e54 Sending: SA = 0x00122FB8 to 2.2.2.2:Type 2.500 10-09: 11:24:30:259:e54 ISAKMP Header: (V1.0), len = 148 10-09: 11:24:30:259:e54 I-COOKIE e59749e4903bb9a2 10-09: 11:24:30:259:e54 R-COOKIE 0000000000000000 10-09: 11:24:30:259:e54 exchange: Oakley Main Mode 10-09: 11:24:30:259:e54 flags: 0 10-09: 11:24:30:259:e54 next payload: SA 10-09: 11:24:30:259:e54 message ID: 00000000 10-09: 11:24:30:259:e54 Ports S:f401 D:f401 10-09: 11:24:30:275:e54 10-09: 11:24:30:275:e54 Receive: (get) SA = 0x00122fb8 from 2.2.2.2.500 10-09: 11:24:30:275:e54 ISAKMP Header: (V1.0), len = 108 10-09: 11:24:30:275:e54 I-COOKIE e59749e4903bb9a2 10-09: 11:24:30:275:e54 R-COOKIE ae60f81c0e5995a8 10-09: 11:24:30:275:e54 exchange: Oakley Main Mode 10-09: 11:24:30:275:e54 flags: 0 10-09: 11:24:30:275:e54 next payload: SA 10-09: 11:24:30:275:e54 message ID: 00000000 10-09: 11:24:30:275:e54 processing payload SA 10-09: 11:24:30:275:e54 Received Phase 1 Transform 1 10-09: 11:24:30:275:e54 Encryption Alg Triple DES CBC(5) 10-09: 11:24:30:275:e54 Hash Alg MD5(1) 10-09: 11:24:30:275:e54 Oakley Group 2 10-09: 11:24:30:275:e54 Auth Method Preshared Key(1) 10-09: 11:24:30:275:e54 Life type in Seconds 10-09: 11:24:30:275:e54 Life duration of 86400 10-09: 11:24:30:275:e54 Phase 1 SA accepted: transform=1 10-09: 11:24:30:275:e54 SA - Oakley proposal accepted 10-09: 11:24:30:275:e54 processing payload VENDOR ID 10-09: 11:24:30:275:e54 Received VendorId FRAGMENTATION 10-09: 11:24:30:275:e54 ClearFragList 10-09: 11:24:30:275:e54 constructing ISAKMP Header 10-09: 11:24:30:306:e54 constructing KE 10-09: 11:24:30:306:e54 constructing NONCE (ISAKMP) 10-09: 11:24:30:306:e54 10-09: 11:24:30:306:e54 Sending: SA = 0x00122FB8 to 2.2.2.2:Type 2.500 10-09: 11:24:30:306:e54 ISAKMP Header: (V1.0), len = 184 10-09: 11:24:30:306:e54 I-COOKIE e59749e4903bb9a2 10-09: 11:24:30:306:e54 R-COOKIE ae60f81c0e5995a8 10-09: 11:24:30:306:e54 exchange: Oakley Main Mode 10-09: 11:24:30:306:e54 flags: 0 10-09: 11:24:30:306:e54 next payload: KE 10-09: 11:24:30:306:e54 message ID: 00000000 10-09: 11:24:30:306:e54 Ports S:f401 D:f401 10-09: 11:24:30:384:e54 10-09: 11:24:30:384:e54 Receive: (get) SA = 0x00122fb8 from 2.2.2.2.500 10-09: 11:24:30:384:e54 ISAKMP Header: (V1.0), len = 256 10-09: 11:24:30:384:e54 I-COOKIE e59749e4903bb9a2 10-09: 11:24:30:384:e54 R-COOKIE ae60f81c0e5995a8 10-09: 11:24:30:384:e54 exchange: Oakley Main Mode 10-09: 11:24:30:384:e54 flags: 0 10-09: 11:24:30:384:e54 next payload: KE 10-09: 11:24:30:384:e54 message ID: 00000000 10-09: 11:24:30:384:e54 processing payload KE 10-09: 11:24:30:400:e54 processing payload NONCE 10-09: 11:24:30:400:e54 processing payload VENDOR ID 10-09: 11:24:30:400:e54 processing payload VENDOR ID 10-09: 11:24:30:400:e54 processing payload VENDOR ID 10-09: 11:24:30:400:e54 processing payload VENDOR ID 10-09: 11:24:30:400:e54 ClearFragList 10-09: 11:24:30:400:e54 constructing ISAKMP Header 10-09: 11:24:30:400:e54 constructing ID 10-09: 11:24:30:400:e54 MM ID Type 1 10-09: 11:24:30:400:e54 MM ID 434fbf7e 10-09: 11:24:30:400:e54 constructing HASH 10-09: 11:24:30:400:e54 10-09: 11:24:30:400:e54 Sending: SA = 0x00122FB8 to 2.2.2.2:Type 2.500 10-09: 11:24:30:400:e54 ISAKMP Header: (V1.0), len = 60 10-09: 11:24:30:400:e54 I-COOKIE e59749e4903bb9a2 10-09: 11:24:30:400:e54 R-COOKIE ae60f81c0e5995a8 10-09: 11:24:30:400:e54 exchange: Oakley Main Mode 10-09: 11:24:30:400:e54 flags: 1 ( encrypted ) 10-09: 11:24:30:400:e54 next payload: ID 10-09: 11:24:30:400:e54 message ID: 00000000 10-09: 11:24:30:400:e54 Ports S:f401 D:f401 10-09: 11:24:30:509:e54 10-09: 11:24:30:509:e54 Receive: (get) SA = 0x00122fb8 from 2.2.2.2.500 10-09: 11:24:30:509:e54 ISAKMP Header: (V1.0), len = 84 10-09: 11:24:30:509:e54 I-COOKIE e59749e4903bb9a2 10-09: 11:24:30:509:e54 R-COOKIE ae60f81c0e5995a8 10-09: 11:24:30:509:e54 exchange: Oakley Main Mode 10-09: 11:24:30:509:e54 flags: 1 ( encrypted ) 10-09: 11:24:30:509:e54 next payload: ID 10-09: 11:24:30:509:e54 message ID: 00000000 10-09: 11:24:30:509:e54 processing payload ID 10-09: 11:24:30:509:e54 processing payload HASH 10-09: 11:24:30:509:e54 AUTH: Phase I authentication accepted 10-09: 11:24:30:509:e54 processing payload VENDOR ID 10-09: 11:24:30:509:e54 ClearFragList 10-09: 11:24:30:509:e54 MM established. SA: 00122FB8 10-09: 11:24:30:509:e54 QM PolicyName: ISA Server CompanyX #2 QM Policy dwFlags 0 10-09: 11:24:30:509:e54 QMOffer[0] LifetimeKBytes 0 LifetimeSec 86400 10-09: 11:24:30:509:e54 QMOffer[0] dwFlags 0 dwPFSGroup 0 10-09: 11:24:30:509:e54 Algo[0] Operation: ESP Algo: Triple DES CBC HMAC: MD5 10-09: 11:24:30:509:e54 GetSpi: src = 10.1.0.0.0000, dst = 1.1.1.1.0000, proto = 00, context = 00000006, srcMask = 255.255.255.0, destMask = 255.255.255.255, TunnelFilter 1 10-09: 11:24:30:509:e54 Setting SPI 957874780 10-09: 11:24:30:509:e54 constructing ISAKMP Header 10-09: 11:24:30:509:e54 constructing HASH (null) 10-09: 11:24:30:509:e54 constructing SA (IPSEC) 10-09: 11:24:30:509:e54 constructing NONCE (IPSEC) 10-09: 11:24:30:509:e54 constructing ID (proxy) 10-09: 11:24:30:509:e54 constructing ID (proxy) 10-09: 11:24:30:509:e54 constructing HASH (QM) 10-09: 11:24:30:509:e54 10-09: 11:24:30:509:e54 Sending: SA = 0x00122FB8 to 2.2.2.2:Type 2.500 10-09: 11:24:30:509:e54 ISAKMP Header: (V1.0), len = 156 10-09: 11:24:30:509:e54 I-COOKIE e59749e4903bb9a2 10-09: 11:24:30:509:e54 R-COOKIE ae60f81c0e5995a8 10-09: 11:24:30:509:e54 exchange: Oakley Quick Mode 10-09: 11:24:30:509:e54 flags: 1 ( encrypted ) 10-09: 11:24:30:509:e54 next payload: HASH 10-09: 11:24:30:509:e54 message ID: 0eef9e0e 10-09: 11:24:30:509:e54 Ports S:f401 D:f401 10-09: 11:24:30:540:e54 10-09: 11:24:30:540:e54 Receive: (get) SA = 0x00122fb8 from 2.2.2.2.500 10-09: 11:24:30:540:e54 ISAKMP Header: (V1.0), len = 76 10-09: 11:24:30:540:e54 I-COOKIE e59749e4903bb9a2 10-09: 11:24:30:540:e54 R-COOKIE ae60f81c0e5995a8 10-09: 11:24:30:540:e54 exchange: ISAKMP Informational Exchange 10-09: 11:24:30:540:e54 flags: 1 ( encrypted ) 10-09: 11:24:30:540:e54 next payload: HASH 10-09: 11:24:30:540:e54 message ID: e0a5b0b8 10-09: 11:24:30:540:e54 processing HASH (Notify/Delete) 10-09: 11:24:30:540:e54 processing payload DELETE 10-09: 11:24:30:540:e54 SA Dead. sa:00122FB8 status:35ef 10-09: 11:24:30:540:e54 isadb_set_status sa:00122FB8 centry:00000000 status 35ef 10-09: 11:24:30:540:e54 Data Protection Mode (Quick Mode) 10-09: 11:24:30:540:e54 Source IP Address 1.1.1.1 Source IP Address Mask 255.255.255.255 Destination IP Address 10.1.0.0 Destination IP Address Mask 255.255.255.0 Protocol 0 Source Port 0 Destination Port 0 IKE Local Addr 1.1.1.1 IKE Peer Addr 2.2.2.2 IKE Source Port 500 IKE Destination Port 500 Peer Private Addr 10-09: 11:24:30:540:e54 Preshared key ID. Peer IP Address: 2.2.2.2 10-09: 11:24:30:540:e54 Me 10-09: 11:24:30:540:e54 IKE SA deleted by peer before establishment completed 10-09: 11:24:30:540:e54 Processed third (ID) payload Initiator(Internal). Delta Time 0 0x0 0x0 10-09: 11:24:30:540:e54 isadb_set_status sa:00122FB8 centry:000E2020 status 35ef 10-09: 11:24:33:868:e54 ClearFragList 10-09: 11:24:33:868:e54 ClearFragList
|
|
|
|