MUnionRafaela# Sep 27 10:31:59.842: ISAKMP:(2050):purging SA., sa=873D0938, delme=873D0938 Sep 27 10:31:59.898: IPSEC(key_engine): request timer fired: count = 2, (identity) local= 192.168.9.223:0, remote= 190.13.88.176:0, local_proxy= 192.168.6.0/255.255.255.0/0/0 (type=4), remote_proxy= 192.168.1.0/255.255.255.0/0/0 (type=4) Sep 27 10:31:59.966: ISAKMP:(2051): retransmitting phase 1 MM_KEY_EXCH... Sep 27 10:31:59.966: ISAKMP:(2051):peer does not do paranoid keepalives. Sep 27 10:31:59.966: ISAKMP:(2051):deleting SA reason "Death by retransmission P1" state (I) MM_KEY_EXCH (peer 190.13.88.176) Sep 27 10:31:59.966: ISAKMP:(2051):deleting SA reason "Death by retransmission P1" state (I) MM_KEY_EXCH (peer 190.13.88.176) Sep 27 10:31:59.966: ISAKMP: Unlocking peer struct 0x85B0F52C for isadb_mark_sa_deleted(), count 0 Sep 27 10:31:59.966: ISAKMP: Deleting peer node by peer_reap for 190.13.88.176: 85B0F52C Sep 27 10:31:59.966: ISAKMP:(2051):deleting node 1175558812 error FALSE reason "IKE deleted" Sep 27 10:31:59.966: ISAKMP:(2051):deleting node -705061977 error FALSE reason "IKE deleted" Sep 27 10:31:59.966: ISAKMP:(2051):deleting node 392101099 error FALSE reason "IKE deleted" MUnionRafaela# MUnionRafaela# MUnionRafaela# Sep 27 10:31:59.966: ISAKMP:(2051):deleting node 1864349411 error FALSE reason "IKE deleted" Sep 27 10:31:59.966: ISAKMP:(2051):deleting node 574804185 error FALSE reason "IKE deleted" Sep 27 10:31:59.966: ISAKMP:(2051):Input = IKE_MESG_INTERNAL, IKE_PHASE1_DEL Sep 27 10:31:59.966: ISAKMP:(2051):Old State = IKE_I_MM5 New State = IKE_DEST_SA Sep 27 10:31:59.966: IPSEC(key_engine): got a queue event with 1 KMI message(s) Sep 27 10:32:02.894: IPSEC(sa_request): , (key eng. msg.) OUTBOUND local= 192.168.9.223:500, remote= 190.13.88.176:500, local_proxy= 192.168.6.0/255.255.255.0/0/0 (type=4), remote_proxy= 192.168.1.0/255.255.255.0/0/0 (type=4), protocol= AH, transform= ah-sha-hmac (Tunnel), lifedur= 3600s and 4608000kb, spi= 0x0(0), conn_id= 0, keysize= 0, flags= 0x4000 Sep 27 10:32:02.894: IPSEC(sa_request): , (key eng. msg.) OUTBOUND local= 192.168.9.223:500, remote= 190.13.88.176:500, local_proxy= 192.168.6.0/255.255.255.0/0/0 (type=4), remote_proxy= 192.168.1.0/255.255.255.0/0/0 (type=4), protocol= ESP, transform= esp-aes esp-sha-hmac (Tunnel), lifedur= 3600s and 4608000kb, spi= 0x0(0), conn_id= 0, keysize= 128, flags= 0x0 Sep 27 10:32:02.898: ISAKMP:(0): SA request profile is (NULL) Sep 27 10:32:02.898: ISAKMP: Created a peer struct for 190.13.88.176, peer port 500 Sep 27 10:32:02.898: ISAKMP: New peer created peer = 0x85B0F52C peer_handle = 0x800029F6 Sep 27 10:32:02.898: ISAKMP: Locking peer struct 0x85B0F52C, refcount 1 for isakmp_initiator Sep 27 10:32:02.898: ISAKMP: local port 500, remote port 500 Sep 27 10:32:02.898: ISAKMP: set new node 0 to QM_IDLE Sep 27 10:32:02.898: ISAKMP: Find a dup sa in the avl tree during calling isadb_insert sa = 873D0938 Sep 27 10:32:02.898: ISAKMP:(0):Can not start Aggressive mode, trying Main mode. Sep 27 10:32:02.898: ISAKMP:(0):found peer pre-shared key matching 190.13.88.176 Sep 27 10:32:02.898: ISAKMP:(0): constructed NAT-T vendor-rfc3947 ID Sep 27 10:32:02.898: ISAKMP:(0): constructed NAT-T vendor-07 ID Sep 27 10:32:02.898: ISAKMP:(0): constructed NAT-T vendor-03 ID Sep 27 10:32:02.898: ISAKMP:(0): constructed NAT-T vendor-02 ID Sep 27 10:32:02.898: ISAKMP:(0):Input = IKE_MESG_FROM_IPSEC, IKE_SA_REQ_MM Sep 27 10:32:02.898: ISAKMP:(0):Old State = IKE_READY New State = IKE_I_MM1 Sep 27 10:32:02.898: ISAKMP:(0): beginning Main Mode exchange Sep 27 10:32:02.898: ISAKMP:(0): sending packet to 190.13.88.176 my_port 500 peer_port 500 (I) MM_NO_STATE Sep 27 10:32:02.898: ISAKMP:(0):Sending an IKE IPv4 Packet. Sep 27 10:32:02.914: ISAKMP (0): received packet from 190.13.88.176 dport 500 sport 500 Global (I) MM_NO_STATE Sep 27 10:32:02.914: ISAKMP:(0):Input = IKE_MESG_FROM_PEER, IKE_MM_EXCH Sep 27 10:32:02.914: ISAKMP:(0):Old State = IKE_I_MM1 New State = IKE_I_MM2 Sep 27 10:32:02.918: ISAKMP:(0): processing SA payload. message ID = 0 Sep 27 10:32:02.918: ISAKMP:(0): processing vendor id payload Sep 27 10:32:02.918: ISAKMP:(0): vendor ID seems Unity/DPD but major 215 mismatch Sep 27 10:32:02.918: ISAKMP:(0): vendor ID is XAUTH Sep 27 10:32:02.918: ISAKMP:(0): processing vendor id payload Sep 27 10:32:02.918: ISAKMP:(0): vendor ID is DPD Sep 27 10:32:02.918: ISAKMP:(0): processing vendor id payload Sep 27 10:32:02.918: ISAKMP:(0): vendor ID seems Unity/DPD but major 69 mismatch Sep 27 10:32:02.918: ISAKMP (0): vendor ID is NAT-T RFC 3947 Sep 27 10:32:02.918: ISAKMP:(0):found peer pre-shared key matching 190.13.88.176 Sep 27 10:32:02.918: ISAKMP:(0): local preshared key found Sep 27 10:32:02.918: ISAKMP : Scanning profiles for xauth ... Sep 27 10:32:02.918: ISAKMP:(0):Checking ISAKMP transform 1 against priority 1 policy Sep 27 10:32:02.918: ISAKMP: encryption AES-CBC Sep 27 10:32:02.918: ISAKMP: keylength of 128 Sep 27 10:32:02.918: ISAKMP: hash SHA Sep 27 10:32:02.918: ISAKMP: default group 2 Sep 27 10:32:02.918: ISAKMP: auth pre-share Sep 27 10:32:02.918: ISAKMP: life type in seconds Sep 27 10:32:02.918: ISAKMP: life duration (VPI) of 0x0 0x1 0x51 0x80 Sep 27 10:32:02.918: ISAKMP:(0):atts are acceptable. Next payload is 0 Sep 27 10:32:02.918: ISAKMP:(0):Acceptable atts:actual life: 0 Sep 27 10:32:02.918: ISAKMP:(0):Acceptable atts:life: 0 Sep 27 10:32:02.918: ISAKMP:(0):Fill atts in sa vpi_length:4 Sep 27 10:32:02.918: ISAKMP:(0):Fill atts in sa life_in_seconds:86400 Sep 27 10:32:02.918: ISAKMP:(0):Returning Actual lifetime: 86400 Sep 27 10:32:02.918: ISAKMP:(0)::Started lifetime timer: 86400. Sep 27 10:32:02.918: ISAKMP:(0): processing vendor id payload Sep 27 10:32:02.918: ISAKMP:(0): vendor ID seems Unity/DPD but major 215 mismatch Sep 27 10:32:02.918: ISAKMP:(0): vendor ID is XAUTH Sep 27 10:32:02.918: ISAKMP:(0): processing vendor id payload Sep 27 10:32:02.918: ISAKMP:(0): vendor ID is DPD Sep 27 10:32:02.918: ISAKMP:(0): processing vendor id payload Sep 27 10:32:02.918: ISAKMP:(0): vendor ID seems Unity/DPD but major 69 mismatch Sep 27 10:32:02.918: ISAKMP (0): vendor ID is NAT-T RFC 3947 Sep 27 10:32:02.918: ISAKMP:(0):Input = IKE_MESG_INTERNAL, IKE_PROCESS_MAIN_MODE Sep 27 10:32:02.918: ISAKMP:(0):Old State = IKE_I_MM2 New State = IKE_I_MM2 Sep 27 10:32:02.918: ISAKMP:(0): sending packet to 190.13.88.176 my_port 500 peer_port 500 (I) MM_SA_SETUP Sep 27 10:32:02.918: ISAKMP:(0):Sending an IKE IPv4 Packet. Sep 27 10:32:02.922: ISAKMP:(0):Input = IKE_MESG_INTERNAL, IKE_PROCESS_COMPLETE Sep 27 10:32:02.922: ISAKMP:(0):Old State = IKE_I_MM2 New State = IKE_I_MM3 Sep 27 10:32:02.938: ISAKMP (0): received packet from 190.13.88.176 dport 500 sport 500 Global (I) MM_SA_SETUP Sep 27 10:32:02.938: ISAKMP:(0):Input = IKE_MESG_FROM_PEER, IKE_MM_EXCH Sep 27 10:32:02.938: ISAKMP:(0):Old State = IKE_I_MM3 New State = IKE_I_MM4 Sep 27 10:32:02.938: ISAKMP:(0): processing KE payload. message ID = 0 Sep 27 10:32:02.970: ISAKMP:(0): processing NONCE payload. message ID = 0 Sep 27 10:32:02.970: ISAKMP:(0):found peer pre-shared key matching 190.13.88.176 Sep 27 10:32:02.970: ISAKMP:received payload type 20 Sep 27 10:32:02.970: ISAKMP (2052): NAT found, both nodes inside NAT Sep 27 10:32:02.970: ISAKMP:received payload type 20 Sep 27 10:32:02.970: ISAKMP (2052): My hash no match - this node inside NAT Sep 27 10:32:02.970: ISAKMP:(2052):Input = IKE_MESG_INTERNAL, IKE_PROCESS_MAIN_MODE Sep 27 10:32:02.970: ISAKMP:(2052):Old State = IKE_I_MM4 New State = IKE_I_MM4 Sep 27 10:32:02.970: ISAKMP:(2052):Send initial contact Sep 27 10:32:02.970: ISAKMP:(2052):SA is doing pre-shared key authentication using id type ID_IPV4_ADDR Sep 27 10:32:02.970: ISAKMP (2052): ID payload next-payload : 8 type : 1 address : 192.168.9.223 protocol : 17 port : 0 length : 12 Sep 27 10:32:02.970: ISAKMP:(2052):Total payload length: 12 Sep 27 10:32:02.970: ISAKMP:(2052): sending packet to 190.13.88.176 my_port 4500 peer_port 4500 (I) MM_KEY_EXCH Sep 27 10:32:02.970: ISAKMP:(2052):Sending an IKE IPv4 Packet. Sep 27 10:32:02.970: ISAKMP:(2052):Input = IKE_MESG_INTERNAL, IKE_PROCESS_COMPLETE Sep 27 10:32:02.970: ISAKMP:(2052):Old State = IKE_I_MM4 New State = IKE_I_MM5 Sep 27 10:32:02.986: ISAKMP (2052): received packet from 190.13.88.176 dport 500 sport 500 Global (I) MM_KEY_EXCH Sep 27 10:32:02.986: ISAKMP: set new node 94997080 to QM_IDLE Sep 27 10:32:02.986: ISAKMP (2052): received packet from 190.13.88.176 dport 500 sport 500 Global (I) MM_KEY_EXCH Sep 27 10:32:02.986: ISAKMP (2052): received packet from 190.13.88.176 dport 500 sport 500 Global (I) MM_KEY_EXCH Sep 27 10:32:02.986: ISAKMP (2052): received packet from 190.13.88.176 dport 500 sport 500 Global (I) MM_KEY_EXCH Sep 27 10:32:02.990: ISAKMP (2052): received packet from 190.13.88.176 dport 500 sport 500 Global (I) MM_KEY_EXCH Sep 27 10:32:02.990: ISAKMP: Info Notify message requeue retry counter exceeded sa request from 190.13.88.176 to 192.168.9.223. Sep 27 10:32:12.970: ISAKMP:(2052): retransmitting phase 1 MM_KEY_EXCH... Sep 27 10:32:12.970: ISAKMP (2052): incrementing error counter on sa, attempt 1 of 5: retransmit phase 1 Sep 27 10:32:12.970: ISAKMP:(2052): retransmitting phase 1 MM_KEY_EXCH Sep 27 10:32:12.970: ISAKMP:(2052): sending packet to 190.13.88.176 my_port 4500 peer_port 4500 (I) MM_KEY_EXCH Sep 27 10:32:12.970: ISAKMP:(2052):Sending an IKE IPv4 Packet. Sep 27 10:32:12.986: ISAKMP (2052): received packet from 190.13.88.176 dport 500 sport 500 Global (I) MM_KEY_EXCH Sep 27 10:32:12.986: ISAKMP: set new node 1432092324 to QM_IDLE Sep 27 10:32:12.986: ISAKMP (2052): received packet from 190.13.88.176 dport 500 sport 500 Global (I) MM_KEY_EXCH Sep 27 10:32:12.986: ISAKMP (2052): received packet from 190.13.88.176 dport 500 sport 500 Global (I) MM_KEY_EXCH Sep 27 10:32:12.986: ISAKMP (2052): received packet from 190.13.88.176 dport 500 sport 500 Global (I) MM_KEY_EXCH Sep 27 10:32:12.986: ISAKMP (2052): received packet from 190.13.88.176 dport 500 sport 500 Global (I) MM_KEY_EXCH Sep 27 10:32:12.986: ISAKMP: Info Notify message requeue retry counter exceeded sa request from 190.13.88.176 to 192.168.9.223. Sep 27 10:32:22.970: ISAKMP:(2052): retransmitting phase 1 MM_KEY_EXCH... Sep 27 10:32:22.970: ISAKMP (2052): incrementing error counter on sa, attempt 2 of 5: retransmit phase 1 Sep 27 10:32:22.970: ISAKMP:(2052): retransmitting phase 1 MM_KEY_EXCH Sep 27 10:32:22.970: ISAKMP:(2052): sending packet to 190.13.88.176 my_port 4500 peer_port 4500 (I) MM_KEY_EXCH Sep 27 10:32:22.970: ISAKMP:(2052):Sending an IKE IPv4 Packet. Sep 27 10:32:22.986: ISAKMP (2052): received packet from 190.13.88.176 dport 500 sport 500 Global (I) MM_KEY_EXCH Sep 27 10:32:22.986: ISAKMP: set new node -66700339 to QM_IDLE Sep 27 10:32:22.986: ISAKMP (2052): received packet from 190.13.88.176 dport 500 sport 500 Global (I) MM_KEY_EXCH Sep 27 10:32:22.986: ISAKMP (2052): received packet from 190.13.88.176 dport 500 sport 500 Global (I) MM_KEY_EXCH Sep 27 10:32:22.986: ISAKMP (2052): received packet from 190.13.88.176 dport 500 sport 500 Global (I) MM_KEY_EXCH Sep 27 10:32:22.986: ISAKMP (2052): received packet from 190.13.88.176 dport 500 sport 500 Global (I) MM_KEY_EXCH Sep 27 10:32:22.986: ISAKMP: Info Notify message requeue retry counter exceeded sa request from 190.13.88.176 to 192.168.9.223. Sep 27 10:32:32.894: IPSEC(key_engine): request timer fired: count = 1, (identity) local= 192.168.9.223:0, remote= 190.13.88.176:0, local_proxy= 192.168.6.0/255.255.255.0/0/0 (type=4), remote_proxy= 192.168.1.0/255.255.255.0/0/0 (type=4) Sep 27 10:32:32.894: IPSEC(sa_request): , (key eng. msg.) OUTBOUND local= 192.168.9.223:500, remote= 190.13.88.176:500, local_proxy= 192.168.6.0/255.255.255.0/0/0 (type=4), remote_proxy= 192.168.1.0/255.255.255.0/0/0 (type=4), protocol= AH, transform= ah-sha-hmac (Tunnel), lifedur= 3600s and 4608000kb, spi= 0x0(0), conn_id= 0, keysize= 0, flags= 0x4000 Sep 27 10:32:32.894: IPSEC(sa_request): , (key eng. msg.) OUTBOUND local= 192.168.9.223:500, remote= 190.13.88.176:500, local_proxy= 192.168.6.0/255.255.255.0/0/0 (type=4), remote_proxy= 192.168.1.0/255.255.255.0/0/0 (type=4), protocol= ESP, transform= esp-aes esp-sha-hmac (Tunnel), lifedur= 3600s and 4608000kb, spi= 0x0(0), conn_id= 0, keysize= 128, flags= 0x0 Sep 27 10:32:32.894: ISAKMP: set new node 0 to QM_IDLE Sep 27 10:32:32.894: ISAKMP:(2052):SA is still budding. Attached new ipsec request to it. (local 192.168.9.223, remote 190.13.88.176) Sep 27 10:32:32.894: ISAKMP: Error while processing SA request: Failed to initialize SA Sep 27 10:32:32.894: ISAKMP: Error while processing KMI message 0, error 2. Sep 27 10:32:32.970: ISAKMP:(2052): retransmitting phase 1 MM_KEY_EXCH... Sep 27 10:32:32.970: ISAKMP (2052): incrementing error counter on sa, attempt 3 of 5: retransmit phase 1 Sep 27 10:32:32.970: ISAKMP:(2052): retransmitting phase 1 MM_KEY_EXCH Sep 27 10:32:32.970: ISAKMP:(2052): sending packet to 190.13.88.176 my_port 4500 peer_port 4500 (I) MM_KEY_EXCH Sep 27 10:32:32.970: ISAKMP:(2052):Sending an IKE IPv4 Packet. MUnionRafaela#unde MUnionRafaela#undebug all All possible debugging has been turned off MUnionRafaela#