ciscofirewall#
*Jan 11 04:50:15.256: ISAKMP (0:0): received packet from 128.12.2.10 dport 500 sport 500 Global (N) NEW SA
*Jan 11 04:50:15.256: ISAKMP: Found a peer struct for 128.12.2.10, peer port 500
*Jan 11 04:50:15.256: ISAKMP: Locking peer struct 0x820F90C8, IKE refcount 2 for crypto_isakmp_process_block
*Jan 11 04:50:15.260: ISAKMP: local port 500, remote port 500
*Jan 11 04:50:15.260: ISAKMP: Find a dup sa in the avl tree during calling isadb_insert sa = 82792F30
*Jan 11 04:50:15.260: ISAKMP:(0:0:N/A:0):Input = IKE_MESG_FROM_PEER, IKE_MM_EXCH
*Jan 11 04:50:15.260: ISAKMP:(0:0:N/A:0):Old State = IKE_READY  New State = IKE_R_MM1

*Jan 11 04:50:15.264: ISAKMP:(0:0:N/A:0): processing SA payload. message ID = 0
*Jan 11 04:50:15.264: ISAKMP:(0:0:N/A:0):Looking for a matching key for 128.12.2.10 in default
*Jan 11 04:50:15.264: ISAKMP:(0:0:N/A:0): : success
*Jan 11 04:50:15.264: ISAKMP:(0:0:N/A:0):found peer pre-shared key matching 128.12.2.10
*Jan 11 04:50:15.264: ISAKMP:(0:0:N/A:0): local preshared key found
*Jan 11 04:50:15.264: ISAKMP : Scanning profiles for xauth ...
*Jan 11 04:50:15.264: ISAKMP:(0:0:N/A:0):Checking ISAKMP transform 0 against priority 1 policy
*Jan 11 04:50:15.268: ISAKMP:      life type in seconds
*Jan 11 04:50:15.268: ISAKMP:      life duration (basic) of 3600
*Jan 11 04:50:15.268: ISAKMP:      encryption 3DES-CBC
*Jan 11 04:50:15.268: ISAKMP:      hash SHA
*Jan 11 04:50:15.268: ISAKMP:      auth pre-share
*Jan 11 04:50:15.268: ISAKMP:      default group 5
*Jan 11 04:50:15.268: ISAKMP:(0:0:N/A:0):Hash algorithm offered does not match policy!
*Jan 11 04:50:15.268: ISAKMP:(0:0:N/A:0):atts are not acceptable. Next payload is 3
*Jan 11 04:50:15.268: ISAKMP:(0:0:N/A:0):Checking ISAKMP transform 1 against priority 1 policy
*Jan 11 04:50:15.268: ISAKMP:      life type in seconds
*Jan 11 04:50:15.272: ISAKMP:      life duration (basic) of 3600
*Jan 11 04:50:15.272: ISAKMP:      encryption 3DES-CBC
*Jan 11 04:50:15.272: ISAKMP:      hash MD5
*Jan 11 04:50:15.272: ISAKMP:      auth pre-share
*Jan 11 04:50:15.272: ISAKMP:      default group 5
*Jan 11 04:50:15.272: ISAKMP:(0:0:N/A:0):Diffie-Hellman group offered does not match policy!
*Jan 11 04:50:15.272: ISAKMP:(0:0:N/A:0):atts are not acceptable. Next payload is 3
*Jan 11 04:50:15.272: ISAKMP:(0:0:N/A:0):Checking ISAKMP transform 2 against priority 1 policy
*Jan 11 04:50:15.272: ISAKMP:      life type in seconds
*Jan 11 04:50:15.272: ISAKMP:      life duration (basic) of 3600
*Jan 11 04:50:15.276: ISAKMP:      encryption 3DES-CBC
*Jan 11 04:50:15.276: ISAKMP:      hash SHA
*Jan 11 04:50:15.276: ISAKMP:      auth pre-share
*Jan 11 04:50:15.276: ISAKMP:      default group 2
*Jan 11 04:50:15.276: ISAKMP:(0:0:N/A:0):Hash algorithm offered does not match policy!
*Jan 11 04:50:15.276: ISAKMP:(0:0:N/A:0):atts are not acceptable. Next payload is 3
*Jan 11 04:50:15.276: ISAKMP:(0:0:N/A:0):Checking ISAKMP transform 3 against priority 1 policy
*Jan 11 04:50:15.276: ISAKMP:      life type in seconds
*Jan 11 04:50:15.276: ISAKMP:      life duration (basic) of 3600
*Jan 11 04:50:15.276: ISAKMP:      encryption 3DES-CBC
*Jan 11 04:50:15.280: ISAKMP:      hash MD5
*Jan 11 04:50:15.280: ISAKMP:      auth pre-share
*Jan 11 04:50:15.280: ISAKMP:      default group 2
*Jan 11 04:50:15.280: ISAKMP:(0:0:N/A:0):atts are acceptable. Next payload is 0
*Jan 11 04:50:15.740: ISAKMP:(0:19:HW:2):Input = IKE_MESG_INTERNAL, IKE_PROCESS_MAIN_MODE
*Jan 11 04:50:15.740: ISAKMP:(0:19:HW:2):Old State = IKE_R_MM1  New State = IKE_R_MM1

*Jan 11 04:50:15.740: ISAKMP:(0:19:HW:2): sending packet to 128.12.2.10 my_port 500 peer_port 500 (R) MM_SA_SETUP
*Jan 11 04:50:15.744: ISAKMP:(0:19:HW:2):Input = IKE_MESG_INTERNAL, IKE_PROCESS_COMPLETE
*Jan 11 04:50:15.744: ISAKMP:(0:19:HW:2):Old State = IKE_R_MM1  New State = IKE_R_MM2

*Jan 11 04:50:15.764: ISAKMP (0:268435475): received packet from 128.12.2.10 dport 500 sport 500 Global (R) MM_SA_SETUP
*Jan 11 04:50:15.764: ISAKMP:(0:19:HW:2):Input = IKE_MESG_FROM_PEER, IKE_MM_EXCH
*Jan 11 04:50:15.764: ISAKMP:(0:19:HW:2):Old State = IKE_R_MM2  New State = IKE_R_MM3

*Jan 11 04:50:15.768: ISAKMP:(0:19:HW:2): processing KE payload. message ID = 0
*Jan 11 04:50:16.228: ISAKMP:(0:19:HW:2): processing NONCE payload. message ID = 0
*Jan 11 04:50:16.228: ISAKMP:(0:0:N/A:0):Looking for a matching key for 128.12.2.10 in default
*Jan 11 04:50:16.228: ISAKMP:(0:0:N/A:0): : success
*Jan 11 04:50:16.228: ISAKMP:(0:19:HW:2):found peer pre-shared key matching 128.12.2.10
*Jan 11 04:50:16.232: ISAKMP:(0:19:HW:2):SKEYID state generated
*Jan 11 04:50:16.236: ISAKMP:(0:19:HW:2):Input = IKE_MESG_INTERNAL, IKE_PROCESS_MAIN_MODE
*Jan 11 04:50:16.236: ISAKMP:(0:19:HW:2):Old State = IKE_R_MM3  New State = IKE_R_MM3

*Jan 11 04:50:16.236: ISAKMP:(0:19:HW:2): sending packet to 128.12.2.10 my_port 500 peer_port 500 (R) MM_KEY_EXCH
*Jan 11 04:50:16.240: ISAKMP:(0:19:HW:2):Input = IKE_MESG_INTERNAL, IKE_PROCESS_COMPLETE
*Jan 11 04:50:16.240: ISAKMP:(0:19:HW:2):Old State = IKE_R_MM3  New State = IKE_R_MM4

*Jan 11 04:50:16.248: ISAKMP (0:268435475): received packet from 128.12.2.10 dport 500 sport 500 Global (R) MM_KEY_EXCH
*Jan 11 04:50:16.252: ISAKMP:(0:19:HW:2):Input = IKE_MESG_FROM_PEER, IKE_MM_EXCH
*Jan 11 04:50:16.252: ISAKMP:(0:19:HW:2):Old State = IKE_R_MM4  New State = IKE_R_MM5

*Jan 11 04:50:16.256: ISAKMP:(0:19:HW:2): processing ID payload. message ID = 0
*Jan 11 04:50:16.256: ISAKMP (0:268435475): ID payload
        next-payload : 8
        type         : 1
        address      : 128.12.2.10
        protocol     : 0
        port         : 0
        length       : 12
*Jan 11 04:50:16.256: ISAKMP:(0:19:HW:2):: peer matches *none* of the profiles
*Jan 11 04:50:16.256: ISAKMP:(0:19:HW:2): processing HASH payload. message ID = 0
*Jan 11 04:50:16.260: ISAKMP:(0:19:HW:2):SA authentication status:
        authenticated
*Jan 11 04:50:16.260: ISAKMP:(0:19:HW:2):SA has been authenticated with 128.12.2.10
*Jan 11 04:50:16.264: ISAKMP:(0:19:HW:2):Input = IKE_MESG_INTERNAL, IKE_PROCESS_MAIN_MODE
*Jan 11 04:50:16.264: ISAKMP:(0:19:HW:2):Old State = IKE_R_MM5  New State = IKE_R_MM5

*Jan 11 04:50:16.264: ISAKMP:(0:19:HW:2):SA is doing pre-shared key authentication using id type ID_IPV4_ADDR
*Jan 11 04:50:16.264: ISAKMP (0:268435475): ID payload
        next-payload : 8
        type         : 1
        address      : 128.12.1.155
        protocol     : 17
        port         : 500
        length       : 12
*Jan 11 04:50:16.268: ISAKMP:(0:19:HW:2):Total payload length: 12
*Jan 11 04:50:16.276: ISAKMP:(0:19:HW:2): sending packet to 128.12.2.10 my_port 500 peer_port 500 (R) MM_KEY_EXCH
*Jan 11 04:50:16.276: ISAKMP:(0:19:HW:2):Input = IKE_MESG_INTERNAL, IKE_PROCESS_COMPLETE
*Jan 11 04:50:16.276: ISAKMP:(0:19:HW:2):Old State = IKE_R_MM5  New State = IKE_P1_COMPLETE

*Jan 11 04:50:16.280: ISAKMP:(0:19:HW:2):Input = IKE_MESG_INTERNAL, IKE_PHASE1_COMPLETE
*Jan 11 04:50:16.280: ISAKMP:(0:19:HW:2):Old State = IKE_P1_COMPLETE  New State = IKE_P1_COMPLETE

*Jan 11 04:50:16.304: ISAKMP (0:268435475): received packet from 128.12.2.10 dport 500 sport 500 Global (R) QM_IDLE
*Jan 11 04:50:16.304: ISAKMP: set new node -1369348334 to QM_IDLE
*Jan 11 04:50:16.312: ISAKMP:(0:19:HW:2): processing HASH payload. message ID = -1369348334
*Jan 11 04:50:16.312: ISAKMP:(0:19:HW:2): processing SA payload. message ID = -1369348334
*Jan 11 04:50:16.312: ISAKMP:(0:19:HW:2):Checking IPSec proposal 0
*Jan 11 04:50:16.312: ISAKMP: transform 0, ESP_3DES
*Jan 11 04:50:16.312: ISAKMP:   attributes in transform:
*Jan 11 04:50:16.312: ISAKMP:      group is 2
*Jan 11 04:50:16.312: ISAKMP:      encaps is 1 (Tunnel)
*Jan 11 04:50:16.312: ISAKMP:      SA life type in seconds
*Jan 11 04:50:16.312: ISAKMP:      SA life duration (basic) of 28800
*Jan 11 04:50:16.312: ISAKMP:      authenticator is HMAC-SHA
*Jan 11 04:50:16.316: ISAKMP:(0:19:HW:2):atts are acceptable.
*Jan 11 04:50:16.316: IPSEC(validate_proposal_request): proposal part #1,
  (key eng. msg.) INBOUND local= 128.12.1.155, remote= 128.12.2.10,
    local_proxy= 192.168.1.0/255.255.255.0/0/0 (type=4),
    remote_proxy= 128.12.3.0/255.255.255.0/0/0 (type=4),
    protocol= ESP, transform= esp-3des esp-sha-hmac  (Tunnel),
    lifedur= 0s and 0kb,
    spi= 0x0(0), conn_id= 0, keysize= 0, flags= 0x22
*Jan 11 04:50:16.316: Crypto mapdb : proxy_match
        src addr     : 192.168.1.0
        dst addr     : 128.12.3.0
        protocol     : 0
        src port     : 0
        dst port     : 0
*Jan 11 04:50:16.780: ISAKMP:(0:19:HW:2): processing NONCE payload. message ID = -1369348334
*Jan 11 04:50:16.784: ISAKMP:(0:19:HW:2): processing KE payload. message ID = -1369348334
*Jan 11 04:50:17.224: ISAKMP:(0:19:HW:2): processing ID payload. message ID = -1369348334
*Jan 11 04:50:17.224: ISAKMP:(0:19:HW:2): processing ID payload. message ID = -1369348334
*Jan 11 04:50:17.224: ISAKMP:(0:19:HW:2): asking for 1 spis from ipsec
*Jan 11 04:50:17.224: ISAKMP:(0:19:HW:2):Node -1369348334, Input = IKE_MESG_FROM_PEER, IKE_QM_EXCH
*Jan 11 04:50:17.224: ISAKMP:(0:19:HW:2):Old State = IKE_QM_READY  New State = IKE_QM_SPI_STARVE
*Jan 11 04:50:17.228: ISAKMP (0:268435475): received packet from 128.12.2.10 dport 500 sport 500 Global (R) QM_IDLE
*Jan 11 04:50:17.228: ISAKMP: set new node 1161295945 to QM_IDLE
*Jan 11 04:50:17.232: IPSEC(key_engine): got a queue event with 1 kei messages
*Jan 11 04:50:17.232: IPSEC(spi_response): getting spi 3722893057 for SA
        from 128.12.1.155 to 128.12.2.10 for prot 3
*Jan 11 04:50:17.236: ISAKMP:(0:19:HW:2): processing HASH payload. message ID = 1161295945
*Jan 11 04:50:17.236: ISAKMP:(0:19:HW:2): processing SA payload. message ID = 1161295945
*Jan 11 04:50:17.236: ISAKMP:(0:19:HW:2):Checking IPSec proposal 0
*Jan 11 04:50:17.240: ISAKMP: transform 0, ESP_3DES
*Jan 11 04:50:17.240: ISAKMP:   attributes in transform:
*Jan 11 04:50:17.240: ISAKMP:      group is 2
*Jan 11 04:50:17.240: ISAKMP:      encaps is 1 (Tunnel)
*Jan 11 04:50:17.240: ISAKMP:      SA life type in seconds
*Jan 11 04:50:17.240: ISAKMP:      SA life duration (basic) of 28800
*Jan 11 04:50:17.240: ISAKMP:      authenticator is HMAC-SHA
*Jan 11 04:50:17.240: ISAKMP:(0:19:HW:2):atts are acceptable.
*Jan 11 04:50:17.244: IPSEC(validate_proposal_request): proposal part #1,
  (key eng. msg.) INBOUND local= 128.12.1.155, remote= 128.12.2.10,
    local_proxy= 192.168.1.0/255.255.255.0/0/0 (type=4),
    remote_proxy= 128.12.3.0/255.255.255.0/0/0 (type=4),
    protocol= ESP, transform= esp-3des esp-sha-hmac  (Tunnel),
    lifedur= 0s and 0kb,
    spi= 0x0(0), conn_id= 0, keysize= 0, flags= 0x22
*Jan 11 04:50:17.244: Crypto mapdb : proxy_match
        src addr     : 192.168.1.0
        dst addr     : 128.12.3.0
        protocol     : 0
        src port     : 0
        dst port     : 0
*Jan 11 04:50:17.704: ISAKMP:(0:19:HW:2): processing NONCE payload. message ID = 1161295945
*Jan 11 04:50:17.704: ISAKMP:(0:19:HW:2): processing KE payload. message ID = 1161295945
*Jan 11 04:50:18.152: ISAKMP:(0:19:HW:2): processing ID payload. message ID = 1161295945
*Jan 11 04:50:18.152: ISAKMP:(0:19:HW:2): processing ID payload. message ID = 1161295945
*Jan 11 04:50:18.156: ISAKMP:(0:19:HW:2): asking for 1 spis from ipsec
*Jan 11 04:50:18.156: ISAKMP:(0:19:HW:2):Node 1161295945, Input = IKE_MESG_FROM_PEER, IKE_QM_EXCH
*Jan 11 04:50:18.156: ISAKMP:(0:19:HW:2):Old State = IKE_QM_READY  New State = IKE_QM_SPI_STARVE
*Jan 11 04:50:18.156: ISAKMP: received ke message (2/1)
*Jan 11 04:50:18.160: IPSEC(key_engine): got a queue event with 1 kei messages
*Jan 11 04:50:18.160: IPSEC(spi_response): getting spi 1555148067 for SA
        from 128.12.1.155 to 128.12.2.10 for prot 3
*Jan 11 04:50:18.172: ISAKMP: Locking peer struct 0x820F90C8, IPSEC refcount 1 for for stuff_ke
*Jan 11 04:50:18.172: ISAKMP:(0:19:HW:2): Creating IPSec SAs
*Jan 11 04:50:18.172:         inbound SA from 128.12.2.10 to 128.12.1.155 (f/i)  0/ 0
        (proxy 128.12.3.0 to 192.168.1.0)
*Jan 11 04:50:18.172:         has spi 0xDDE6D701 and conn_id 0 and flags 23
*Jan 11 04:50:18.172:         lifetime of 28800 seconds
*Jan 11 04:50:18.172:         has client flags 0x0
*Jan 11 04:50:18.172:         outbound SA from 128.12.1.155 to 128.12.2.10 (f/i) 0/0
        (proxy 192.168.1.0 to 128.12.3.0)
*Jan 11 04:50:18.176:         has spi 1976674602 and conn_id 0 and flags 2B
*Jan 11 04:50:18.176:         lifetime of 28800 seconds
*Jan 11 04:50:18.176:         has client flags 0x0
*Jan 11 04:50:18.176: IPSEC(key_engine): got a queue event with 2 kei messages
*Jan 11 04:50:18.176: IPSEC(initialize_sas): ,
  (key eng. msg.) INBOUND local= 128.12.1.155, remote= 128.12.2.10,
    local_proxy= 192.168.1.0/255.255.255.0/0/0 (type=4),
    remote_proxy= 128.12.3.0/255.255.255.0/0/0 (type=4),
    protocol= ESP, transform= esp-3des esp-sha-hmac  (Tunnel),
    lifedur= 28800s and 0kb,
    spi= 0xDDE6D701(3722893057), conn_id= 0, keysize= 0, flags= 0x23
*Jan 11 04:50:18.180: IPSEC(initialize_sas): ,
  (key eng. msg.) OUTBOUND local= 128.12.1.155, remote= 128.12.2.10,
    local_proxy= 192.168.1.0/255.255.255.0/0/0 (type=4),
    remote_proxy= 128.12.3.0/255.255.255.0/0/0 (type=4),
    protocol= ESP, transform= esp-3des esp-sha-hmac  (Tunnel),
    lifedur= 28800s and 0kb,
    spi= 0x75D1A92A(1976674602), conn_id= 0, keysize= 0, flags= 0x2B
*Jan 11 04:50:18.180: Crypto mapdb : proxy_match
        src addr     : 192.168.1.0
        dst addr     : 128.12.3.0
        protocol     : 0
        src port     : 0
        dst port     : 0
*Jan 11 04:50:18.184: IPSEC(crypto_ipsec_sa_find_ident_head): reconnecting with the same proxies and 128.12.2.10
*Jan 11 04:50:18.184: IPSec: Flow_switching Allocated flow for sibling 80000007
*Jan 11 04:50:18.184: IPSEC(policy_db_add_ident): src 192.168.1.0, dest 128.12.3.0, dest_port 0

*Jan 11 04:50:18.184: ISAKMP: Locking peer struct 0x820F90C8, IPSEC refcount 2 for from create_transforms
*Jan 11 04:50:18.184: IPSEC(create_sa): sa created,
  (sa) sa_dest= 128.12.1.155, sa_proto= 50,
    sa_spi= 0xDDE6D701(3722893057),
    sa_trans= esp-3des esp-sha-hmac , sa_conn_id= 2002
*Jan 11 04:50:18.188: IPSEC(create_sa): sa created,
  (sa) sa_dest= 128.12.2.10, sa_proto= 50,
    sa_spi= 0x75D1A92A(1976674602),
    sa_trans= esp-3des esp-sha-hmac , sa_conn_id= 2001
*Jan 11 04:50:18.188: ISAKMP: Unlocking IPSEC struct 0x820F90C8 from create_transforms, count 1
*Jan 11 04:50:18.192: ISAKMP:(0:19:HW:2): sending packet to 128.12.2.10 my_port 500 peer_port 500 (R) QM_IDLE
*Jan 11 04:50:18.192: ISAKMP:(0:19:HW:2):Node -1369348334, Input = IKE_MESG_FROM_IPSEC, IKE_SPI_REPLY
*Jan 11 04:50:18.192: ISAKMP:(0:19:HW:2):Old State = IKE_QM_SPI_STARVE  New State = IKE_QM_R_QM2
*Jan 11 04:50:18.196: ISAKMP: received ke message (2/1)
*Jan 11 04:50:18.208: ISAKMP: Locking peer struct 0x820F90C8, IPSEC refcount 2 for for stuff_ke
*Jan 11 04:50:18.208: ISAKMP:(0:19:HW:2): Creating IPSec SAs
*Jan 11 04:50:18.208:         inbound SA from 128.12.2.10 to 128.12.1.155 (f/i)  0/ 0
        (proxy 128.12.3.0 to 192.168.1.0)
*Jan 11 04:50:18.208:         has spi 0x5CB1AD23 and conn_id 0 and flags 23
*Jan 11 04:50:18.208:         lifetime of 28800 seconds
*Jan 11 04:50:18.208:         has client flags 0x0
*Jan 11 04:50:18.212:         outbound SA from 128.12.1.155 to 128.12.2.10 (f/i) 0/0
        (proxy 192.168.1.0 to 128.12.3.0)
*Jan 11 04:50:18.212:         has spi 1976674603 and conn_id 0 and flags 2B
*Jan 11 04:50:18.212:         lifetime of 28800 seconds
*Jan 11 04:50:18.212:         has client flags 0x0
*Jan 11 04:50:18.216: IPSEC(key_engine): got a queue event with 2 kei messages
*Jan 11 04:50:18.216: IPSEC(initialize_sas): ,
  (key eng. msg.) INBOUND local= 128.12.1.155, remote= 128.12.2.10,
    local_proxy= 192.168.1.0/255.255.255.0/0/0 (type=4),
    remote_proxy= 128.12.3.0/255.255.255.0/0/0 (type=4),
    protocol= ESP, transform= esp-3des esp-sha-hmac  (Tunnel),
    lifedur= 28800s and 0kb,
    spi= 0x5CB1AD23(1555148067), conn_id= 0, keysize= 0, flags= 0x23
*Jan 11 04:50:18.216: IPSEC(initialize_sas): ,
  (key eng. msg.) OUTBOUND local= 128.12.1.155, remote= 128.12.2.10,
    local_proxy= 192.168.1.0/255.255.255.0/0/0 (type=4),
    remote_proxy= 128.12.3.0/255.255.255.0/0/0 (type=4),
    protocol= ESP, transform= esp-3des esp-sha-hmac  (Tunnel),
    lifedur= 28800s and 0kb,
    spi= 0x75D1A92B(1976674603), conn_id= 0, keysize= 0, flags= 0x2B
*Jan 11 04:50:18.220: Crypto mapdb : proxy_match
        src addr     : 192.168.1.0
        dst addr     : 128.12.3.0
        protocol     : 0
        src port     : 0
        dst port     : 0
*Jan 11 04:50:18.220: IPSEC(crypto_ipsec_sa_find_ident_head): reconnecting with the same proxies and 128.12.2.10
*Jan 11 04:50:18.220: IPSec: Flow_switching Allocated flow for sibling 80000006
*Jan 11 04:50:18.220: ISAKMP: Locking peer struct 0x820F90C8, IPSEC refcount 3 for from create_transforms
*Jan 11 04:50:18.220: IPSEC(create_sa): sa created,
  (sa) sa_dest= 128.12.1.155, sa_proto= 50,
    sa_spi= 0x5CB1AD23(1555148067),
    sa_trans= esp-3des esp-sha-hmac , sa_conn_id= 2004
*Jan 11 04:50:18.224: IPSEC(create_sa): sa created,
  (sa) sa_dest= 128.12.2.10, sa_proto= 50,
    sa_spi= 0x75D1A92B(1976674603),
    sa_trans= esp-3des esp-sha-hmac , sa_conn_id= 2003
*Jan 11 04:50:18.224: ISAKMP: Unlocking IPSEC struct 0x820F90C8 from create_transforms, count 2
*Jan 11 04:50:18.224: ISAKMP:(0:19:HW:2): sending packet to 128.12.2.10 my_port 500 peer_port 500 (R) QM_IDLE
*Jan 11 04:50:18.228: ISAKMP:(0:19:HW:2):Node 1161295945, Input = IKE_MESG_FROM_IPSEC, IKE_SPI_REPLY
*Jan 11 04:50:18.228: ISAKMP:(0:19:HW:2):Old State = IKE_QM_SPI_STARVE  New State = IKE_QM_R_QM2
*Jan 11 04:50:18.240: ISAKMP (0:268435475): received packet from 128.12.2.10 dport 500 sport 500 Global (R) QM_IDLE
*Jan 11 04:50:18.244: ISAKMP:(0:19:HW:2):deleting node -1369348334 error FALSE reason "QM done (await)"
*Jan 11 04:50:18.244: ISAKMP:(0:19:HW:2):Node -1369348334, Input = IKE_MESG_FROM_PEER, IKE_QM_EXCH
*Jan 11 04:50:18.248: ISAKMP:(0:19:HW:2):Old State = IKE_QM_R_QM2  New State = IKE_QM_PHASE2_COMPLETE
*Jan 11 04:50:18.248: IPSEC(key_engine): got a queue event with 1 kei messages
*Jan 11 04:50:18.248: IPSEC(key_engine_enable_outbound): rec'd enable notify from ISAKMP
*Jan 11 04:50:18.248: IPSEC(key_engine_enable_outbound): enable SA with spi 1976674602/50
*Jan 11 04:50:18.256: ISAKMP (0:268435475): received packet from 128.12.2.10 dport 500 sport 500 Global (R) QM_IDLE
*Jan 11 04:50:18.264: ISAKMP:(0:19:HW:2):deleting node 1161295945 error FALSE reason "QM done (await)"
*Jan 11 04:50:18.264: ISAKMP:(0:19:HW:2):Node 1161295945, Input = IKE_MESG_FROM_PEER, IKE_QM_EXCH
*Jan 11 04:50:18.264: ISAKMP:(0:19:HW:2):Old State = IKE_QM_R_QM2  New State = IKE_QM_PHASE2_COMPLETE
*Jan 11 04:50:18.268: IPSEC(key_engine): got a queue event with 1 kei messages
*Jan 11 04:50:18.268: IPSEC(key_engine_enable_outbound): rec'd enable notify from ISAKMP
*Jan 11 04:50:18.268: IPSEC(key_engine_enable_outbound): enable SA with spi 1976674603/50
*Jan 11 04:50:22.292: ISAKMP (0:268435475): received packet from 128.12.2.10 dport 500 sport 500 Global (R) QM_IDLE
*Jan 11 04:50:22.292: ISAKMP: set new node 2069466402 to QM_IDLE
*Jan 11 04:50:22.296: ISAKMP:(0:19:HW:2): processing HASH payload. message ID = 2069466402
*Jan 11 04:50:22.300: ISAKMP:(0:19:HW:2): processing DELETE payload. message ID = 2069466402
*Jan 11 04:50:22.300: ISAKMP:(0:19:HW:2):peer does not do paranoid keepalives.

*Jan 11 04:50:22.300: ISAKMP:(0:19:HW:2):deleting node 2069466402 error FALSE reason "Informational (in) state 1"
*Jan 11 04:50:22.300: IPSEC(key_engine): got a queue event with 1 kei messages
*Jan 11 04:50:22.300: IPSEC(key_engine_delete_sas): rec'd delete notify from ISAKMP
*Jan 11 04:50:22.300: IPSEC(key_engine_delete_sas): delete SA with spi 0x75D1A92B proto 50 for 128.12.2.10
*Jan 11 04:50:22.304: IPSEC(delete_sa): deleting SA,
  (sa) sa_dest= 128.12.1.155, sa_proto= 50,
    sa_spi= 0x5CB1AD23(1555148067),
    sa_trans= esp-3des esp-sha-hmac , sa_conn_id= 2004,
  (identity) local= 128.12.1.155, remote= 128.12.2.10,
    local_proxy= 192.168.1.0/255.255.255.0/0/0 (type=4),
    remote_proxy= 128.12.3.0/255.255.255.0/0/0 (type=4)
*Jan 11 04:50:22.304: IPSEC(delete_sa): deleting SA,
  (sa) sa_dest= 128.12.2.10, sa_proto= 50,
    sa_spi= 0x75D1A92B(1976674603),
    sa_trans= esp-3des esp-sha-hmac , sa_conn_id= 2003,
  (identity) local= 128.12.1.155, remote= 128.12.2.10,
    local_proxy= 192.168.1.0/255.255.255.0/0/0 (type=4),
    remote_proxy= 128.12.3.0/255.255.255.0/0/0 (type=4)
*Jan 11 04:50:22.308: IPSec: Flow_switching Deallocated flow for sibling 80000006
*Jan 11 04:50:22.308: ISAKMP: Unlocking IPSEC struct 0x820F90C8 from delete_siblings, count 1
*Jan 11 04:50:22.316: ISAKMP (0:268435475): received packet from 128.12.2.10 dport 500 sport 500 Global (R) QM_IDLE
*Jan 11 04:50:22.316: ISAKMP: set new node -360895682 to QM_IDLE
*Jan 11 04:50:22.324: ISAKMP:(0:19:HW:2): processing HASH payload. message ID = -360895682
*Jan 11 04:50:22.324: ISAKMP:(0:19:HW:2): processing DELETE payload. message ID = -360895682
*Jan 11 04:50:22.324: ISAKMP:(0:19:HW:2):peer does not do paranoid keepalives.

*Jan 11 04:50:22.324: ISAKMP:(0:19:HW:2):deleting node -360895682 error FALSE reason "Informational (in) state 1"
*Jan 11 04:50:22.328: ISAKMP (0:268435475): received packet from 128.12.2.10 dport 500 sport 500 Global (R) QM_IDLE
*Jan 11 04:50:22.328: ISAKMP: set new node -636937774 to QM_IDLE
*Jan 11 04:50:22.328: IPSEC(key_engine): got a queue event with 1 kei messages
*Jan 11 04:50:22.328: IPSEC(key_engine_delete_sas): rec'd delete notify from ISAKMP
*Jan 11 04:50:22.332: IPSEC(key_engine_delete_sas): delete SA with spi 0x75D1A92A proto 50 for 128.12.2.10
*Jan 11 04:50:22.332: IPSEC(delete_sa): deleting SA,
  (sa) sa_dest= 128.12.1.155, sa_proto= 50,
    sa_spi= 0xDDE6D701(3722893057),
    sa_trans= esp-3des esp-sha-hmac , sa_conn_id= 2002,
  (identity) local= 128.12.1.155, remote= 128.12.2.10,
    local_proxy= 192.168.1.0/255.255.255.0/0/0 (type=4),
    remote_proxy= 128.12.3.0/255.255.255.0/0/0 (type=4)
*Jan 11 04:50:22.336: IPSEC(delete_sa): deleting SA,
  (sa) sa_dest= 128.12.2.10, sa_proto= 50,
    sa_spi= 0x75D1A92A(1976674602),
    sa_trans= esp-3des esp-sha-hmac , sa_conn_id= 2001,
  (identity) local= 128.12.1.155, remote= 128.12.2.10,
    local_proxy= 192.168.1.0/255.255.255.0/0/0 (type=4),
    remote_proxy= 128.12.3.0/255.255.255.0/0/0 (type=4)
*Jan 11 04:50:22.336: IPSec: Flow_switching Deallocated flow for sibling 80000007
*Jan 11 04:50:22.336: ISAKMP: Unlocking IPSEC struct 0x820F90C8 from delete_siblings, count 0
*Jan 11 04:50:22.344: ISAKMP:(0:19:HW:2): processing HASH payload. message ID = -636937774
*Jan 11 04:50:22.344: ISAKMP:(0:19:HW:2): processing DELETE payload. message ID = -636937774
*Jan 11 04:50:22.344: ISAKMP:(0:19:HW:2):peer does not do paranoid keepalives.

*Jan 11 04:50:22.348: ISAKMP:(0:19:HW:2):deleting SA reason "No reason" state (R) QM_IDLE       (peer 128.12.2.10)
*Jan 11 04:50:22.348: ISAKMP:(0:19:HW:2):deleting node -636937774 error FALSE reason "Informational (in) state 1"
*Jan 11 04:50:22.348: ISAKMP:(0:19:HW:2):Input = IKE_MESG_INTERNAL, IKE_PHASE1_DEL
*Jan 11 04:50:22.352: ISAKMP:(0:19:HW:2):Old State = IKE_P1_COMPLETE  New State = IKE_DEST_SA

*Jan 11 04:50:22.352: ISAKMP:(0:19:HW:2):deleting SA reason "No reason" state (R) QM_IDLE       (peer 128.12.2.10)
*Jan 11 04:50:22.352: ISAKMP: Unlocking IKE struct 0x820F90C8 for isadb_mark_sa_deleted(), count 1
*Jan 11 04:50:22.356: ISAKMP:(0:19:HW:2):deleting node -1369348334 error FALSE reason "IKE deleted"
*Jan 11 04:50:22.356: ISAKMP:(0:19:HW:2):deleting node 1161295945 error FALSE reason "IKE deleted"
*Jan 11 04:50:22.356: ISAKMP:(0:19:HW:2):deleting node 2069466402 error FALSE reason "IKE deleted"
*Jan 11 04:50:22.356: ISAKMP:(0:19:HW:2):deleting node -360895682 error FALSE reason "IKE deleted"
*Jan 11 04:50:22.356: ISAKMP:(0:19:HW:2):deleting node -636937774 error FALSE reason "IKE deleted"
*Jan 11 04:50:22.356: ISAKMP:(0:19:HW:2):Input = IKE_MESG_FROM_PEER, IKE_MM_EXCH
*Jan 11 04:50:22.360: ISAKMP:(0:19:HW:2):Old State = IKE_DEST_SA  New State = IKE_DEST_SA

*Jan 11 04:51:12.356: ISAKMP:(0:19:HW:2):purging node -1369348334
*Jan 11 04:51:12.356: ISAKMP:(0:19:HW:2):purging node 1161295945
*Jan 11 04:51:12.356: ISAKMP:(0:19:HW:2):purging node 2069466402
*Jan 11 04:51:12.356: ISAKMP:(0:19:HW:2):purging node -360895682
*Jan 11 04:51:12.360: ISAKMP:(0:19:HW:2):purging node -636937774
*Jan 11 04:51:22.356: ISAKMP:(0:19:HW:2):purging SA., sa=82792F30, delme=82792F30

Back to main article