SlideShare a Scribd company logo
1 of 6
7301#
*Aug 15 10:46:04.199: ISAKMP (0): received packet from 53.54.55.57 dport 500
sport 500 Global (N) NEW SA
*Aug 15 10:46:04.199: ISAKMP: Created a peer struct for 53.54.55.57, peer port
500
*Aug 15 10:46:04.199: ISAKMP: New peer created peer = 0x501A44A4 peer_handle =
0x80000003
*Aug 15 10:46:04.199: ISAKMP: Locking peer struct 0x501A44A4, refcount 1 for
crypto_isakmp_process_block
*Aug 15 10:46:04.199: ISAKMP: local port 500, remote port 500
*Aug 15 10:46:04.199: ISAKMP: Find a dup sa in the avl tree during calling
isadb_insert sa = 501882C0
*Aug 15 10:46:04.199: ISAKMP:(0):Input = IKE_MESG_FROM_PEER, IKE_MM_EXCH
*Aug 15 10:46:04.199: ISAKMP:(0):Old State = IKE_READY New State = IKE_R_MM1
*Aug 15 10:46:04.199: ISAKMP:(0): processing SA payload. message ID = 0
*Aug 15 10:46:04.199: ISAKMP:(0): processing vendor id payload
*Aug 15 10:46:04.199: ISAKMP:(0): vendor ID is DPD
*Aug 15 10:46:04.199: ISAKMP:(0):found peer pre-shared key matching 53.54.55.57
*Aug 15 10:46:04.199: ISAKMP:(0): local preshared key found
*Aug 15 10:46:04.199: ISAKMP : Scanning profiles for xauth ...
*Aug 15 10:46:04.199: ISAKMP:(0):Checking ISAKMP transform 1 against priority 10
policy
*Aug 15 10:46:04.199: ISAKMP: life type in seconds
*Aug 15 10:46:04.199: ISAKMP: life duration (VPI) of 0x0 0x1 0x51 0x80
*Aug 15 10:46:04.199: ISAKMP: encryption 3DES-CBC
*Aug 15 10:46:04.199: ISAKMP: auth pre-share
*Aug 15 10:46:04.199: ISAKMP: hash SHA
*Aug 15 10:46:04.199: ISAKMP: default group 5
*Aug 15 10:46:04.199: ISAKMP:(0):atts are acceptable. Next payload is 0
*Aug 15 10:46:04.199: ISAKMP:(0):Acceptable atts:actual life: 0
*Aug 15 10:46:04.199: ISAKMP:(0):Acceptable atts:life: 0
*Aug 15 10:46:04.199: ISAKMP:(0):Fill atts in sa vpi_length:4
*Aug 15 10:46:04.199: ISAKMP:(0):Fill atts in sa life_in_seconds:86400
*Aug 15 10:46:04.199: ISAKMP:(0):Returning Actual lifetime: 86400
*Aug 15 10:46:04.199: ISAKMP:(0)::Started lifetime timer: 86400.
*Aug 15 10:46:04.199: ISAKMP:(0): processing vendor id payload
*Aug 15 10:46:04.199: ISAKMP:(0): vendor ID is DPD
*Aug 15 10:46:04.199: ISAKMP:(0):Input = IKE_MESG_INTERNAL,
IKE_PROCESS_MAIN_MODE
*Aug 15 10:46:04.199: ISAKMP:(0):Old State = IKE_R_MM1 New State = IKE_R_MM1
*Aug 15 10:46:04.199: ISAKMP:(0): sending packet to 53.54.55.57 my_port 500
peer_port 500 (R) MM_SA_SETUP
*Aug 15 10:46:04.199: ISAKMP:(0):Sending an IKE IPv4 Packet.
*Aug 15 10:46:04.199: ISAKMP:(0):Input = IKE_MESG_INTERNAL, IKE_PROCESS_COMPLETE
*Aug 15 10:46:04.199: ISAKMP:(0):Old State = IKE_R_MM1 New State = IKE_R_MM2
*Aug 15 10:46:05.527: ISAKMP (0): received packet from 53.54.55.57 dport 500
sport 500 Global (R) MM_SA_SETUP
*Aug 15 10:46:05.527: ISAKMP:(0):Input = IKE_MESG_FROM_PEER, IKE_MM_EXCH
*Aug 15 10:46:05.527: ISAKMP:(0):Old State = IKE_R_MM2 New State = IKE_R_MM3
*Aug 15 10:46:05.527: ISAKMP:(0): processing KE payload. message ID = 0
*Aug 15 10:46:05.567: ISAKMP:(0): processing NONCE payload. message ID = 0
*Aug 15 10:46:05.567: ISAKMP:(0):found peer pre-shared key matching 53.54.55.57
*Aug 15 10:46:05.567: ISAKMP:(1002):Input = IKE_MESG_INTERNAL,
IKE_PROCESS_MAIN_MODE
*Aug 15 10:46:05.567: ISAKMP:(1002):Old State = IKE_R_MM3 New State = IKE_R_MM3
*Aug 15 10:46:05.567: ISAKMP:(1002): sending packet to 53.54.55.57 my_port 500
peer_port 500 (R) MM_KEY_EXCH
*Aug 15 10:46:05.567: ISAKMP:(1002):Sending an IKE IPv4 Packet.
*Aug 15 10:46:05.567: ISAKMP:(1002):Input = IKE_MESG_INTERNAL,
IKE_PROCESS_COMPLETE
*Aug 15 10:46:05.567: ISAKMP:(1002):Old State = IKE_R_MM3 New State = IKE_R_MM4
*Aug 15 10:46:06.919: ISAKMP (1002): received packet from 53.54.55.57 dport 500
sport 500 Global (R) MM_KEY_EXCH
*Aug 15 10:46:06.919: ISAKMP:(1002):Input = IKE_MESG_FROM_PEER, IKE_MM_EXCH
*Aug 15 10:46:06.919: ISAKMP:(1002):Old State = IKE_R_MM4 New State = IKE_R_MM5
*Aug 15 10:46:06.919: ISAKMP:(1002): processing ID payload. message ID = 0
*Aug 15 10:46:06.919: ISAKMP (1002): ID payload
next-payload : 8
type : 1
address : 53.54.55.57
protocol : 17
port : 500
length : 12
*Aug 15 10:46:06.919: ISAKMP:(0):: peer matches *none* of the profiles
*Aug 15 10:46:06.919: ISAKMP:(1002): processing HASH payload. message ID = 0
*Aug 15 10:46:06.919: ISAKMP:(1002):SA authentication status:
authenticated
*Aug 15 10:46:06.919: ISAKMP:(1002):SA has been authenticated with 53.54.55.57
*Aug 15 10:46:06.919: ISAKMP: Trying to insert a peer
53.54.55.56/53.54.55.57/500/, and inserted successfully 501A44A4.
*Aug 15 10:46:06.919: ISAKMP:(1002):Input = IKE_MESG_INTERNAL,
IKE_PROCESS_MAIN_MODE
*Aug 15 10:46:06.919: ISAKMP:(1002):Old State = IKE_R_MM5 New State = IKE_R_MM5
*Aug 15 10:46:06.919: ISAKMP:(1002):SA is doing pre-shared key authentication
using id type ID_IPV4_ADDR
*Aug 15 10:46:06.919: ISAKMP (1002): ID payload
next-payload : 8
type : 1
address : 53.54.55.56
protocol : 17
port : 500
length : 12
*Aug 15 10:46:06.919: ISAKMP:(1002):Total payload length: 12
*Aug 15 10:46:06.919: ISAKMP:(1002): sending packet to 53.54.55.57 my_port 500
peer_port 500 (R) MM_KEY_EXCH
*Aug 15 10:46:06.919: ISAKMP:(1002):Sending an IKE IPv4 Packet.
*Aug 15 10:46:06.919: ISAKMP:(1002):Input = IKE_MESG_INTERNAL,
IKE_PROCESS_COMPLETE
*Aug 15 10:46:06.919: ISAKMP:(1002):Old State = IKE_R_MM5 New State =
IKE_P1_COMPLETE
*Aug 15 10:46:06.919: ISAKMP:(1002):Input = IKE_MESG_INTERNAL,
IKE_PHASE1_COMPLETE
*Aug 15 10:46:06.919: ISAKMP:(1002):Old State = IKE_P1_COMPLETE New State =
IKE_P1_COMPLETE
*Aug 15 10:46:06.955: ISAKMP (1002): received packet from 53.54.55.57 dport 500
sport 500 Global (R) QM_IDLE
*Aug 15 10:46:06.955: ISAKMP: set new node -1028686484 to QM_IDLE
*Aug 15 10:46:06.955: ISAKMP:(1002): processing HASH payload. message ID =
-1028686484
*Aug 15 10:46:06.955: ISAKMP:(1002): processing NOTIFY INITIAL_CONTACT protocol
1
spi 0, message ID = -1028686484, sa = 501882C0
*Aug 15 10:46:06.955: ISAKMP:(1002):SA authentication status:
authenticated
*Aug 15 10:46:06.955: ISAKMP:(1002): Process initial contact,
bring down existing phase 1 and 2 SA's with local 53.54.55.56 remote 53.54.55.57
remote port 500
*Aug 15 10:46:06.955: ISAKMP:(1002):deleting node -1028686484 error FALSE reason
"Informational (in) state 1"
*Aug 15 10:46:06.955: ISAKMP:(1002):Input = IKE_MESG_FROM_PEER, IKE_INFO_NOTIFY
*Aug 15 10:46:06.955: ISAKMP:(1002):Old State = IKE_P1_COMPLETE New State =
IKE_P1_COMPLETE
*Aug 15 10:46:06.955: IPSEC(key_engine): got a queue event with 1 KMI message(s)
*Aug 15 10:46:08.479: ISAKMP (1002): received packet from 53.54.55.57 dport 500
sport 500 Global (R) QM_IDLE
*Aug 15 10:46:08.479: ISAKMP: set new node -441594065 to QM_IDLE
*Aug 15 10:46:08.479: ISAKMP:(1002): processing HASH payload. message ID =
-441594065
*Aug 15 10:46:08.479: ISAKMP:(1002): processing SA payload. message ID =
-441594065
*Aug 15 10:46:08.479: ISAKMP:(1002):Checking IPSec proposal 1
*Aug 15 10:46:08.479: ISAKMP: transform 1, ESP_3DES
*Aug 15 10:46:08.479: ISAKMP: attributes in transform:
*Aug 15 10:46:08.479: ISAKMP: SA life type in seconds
*Aug 15 10:46:08.479: ISAKMP: SA life duration (basic) of 43200
*Aug 15 10:46:08.479: ISAKMP: encaps is 2 (Transport)
*Aug 15 10:46:08.479: ISAKMP: authenticator is HMAC-SHA
*Aug 15 10:46:08.479: ISAKMP: group is 5
*Aug 15 10:46:08.479: ISAKMP:(1002):atts are acceptable.
*Aug 15 10:46:08.479: IPSEC(validate_proposal_request): proposal part #1
*Aug 15 10:46:08.479: IPSEC(validate_proposal_request): proposal part #1,
(key eng. msg.) INBOUND local= 53.54.55.56, remote= 53.54.55.57,
local_proxy= 53.54.55.56/255.255.255.255/47/0 (type=1),
remote_proxy= 53.54.55.57/255.255.255.255/47/0 (type=1),
protocol= ESP, transform= NONE (Transport),
lifedur= 0s and 0kb,
spi= 0x0(0), conn_id= 0, keysize= 0, flags= 0x0
*Aug 15 10:46:08.479: IPSEC-IFC MGRE/Tu0(53.54.55.56/53.54.55.57): connection
lookup returned 0
*Aug 15 10:46:08.479: IPSEC-IFC MGRE/Tu0: crypto_ss_listen_start already
listening
*Aug 15 10:46:08.479: IPSEC-IFC MGRE/Tu0(53.54.55.56/53.54.55.57): Opening a
socket with profile Profile3
*Aug 15 10:46:08.479: IPSEC-IFC MGRE/Tu0(53.54.55.56/53.54.55.57): connection
lookup returned 0
*Aug 15 10:46:08.479: IPSEC-IFC MGRE/Tu0(53.54.55.56/53.54.55.57): Triggering
tunnel immediately.
*Aug 15 10:46:08.479: IPSEC-IFC MGRE/Tu0(53.54.55.56/53.54.55.57):
tunnel_protection_start_pending_timer 66A672EC
*Aug 15 10:46:08.479: IPSEC-IFC MGRE/Tu0(53.54.55.56/53.54.55.57): Good listen
request
*Aug 15 10:46:08.479: insert of map into mapdb AVL failed, map + ace pair
already exists on the mapdb
*Aug 15 10:46:08.479: CRYPTO_SS(TUNNEL SEC): Passive open, socket info: local
53.54.55.56 53.54.55.56/255.255.255.255/0, remote 53.54.55.57
53.54.55.57/255.255.255.255/0, prot 47, ifc Tu0
*Aug 15 10:46:08.479: Crypto mapdb : proxy_match
src addr : 53.54.55.56
dst addr : 53.54.55.57
protocol : 47
src port : 0
dst port : 0
*Aug 15 10:46:08.479: ISAKMP:(1002): processing NONCE payload. message ID =
-441594065
*Aug 15 10:46:08.479: ISAKMP:(1002): processing KE payload. message ID =
-441594065
*Aug 15 10:46:08.479: CRYPTO_SS(TUNNEL SEC): Completed binding of application to
socket
*Aug 15 10:46:08.483: IPSEC-IFC MGRE/Tu0(53.54.55.56/53.54.55.57): connection
lookup returned 66A672EC
*Aug 15 10:46:08.483: IPSEC-IFC MGRE/Tu0(53.54.55.56/53.54.55.57): good socket
ready message
*Aug 15 10:46:08.519: ISAKMP:(1002): processing ID payload. message ID =
-441594065
*Aug 15 10:46:08.519: ISAKMP:(1002): processing ID payload. message ID =
-441594065
*Aug 15 10:46:08.519: ISAKMP:(1002):QM Responder gets spi
*Aug 15 10:46:08.519: ISAKMP:(1002):Node -441594065, Input = IKE_MESG_FROM_PEER,
IKE_QM_EXCH
*Aug 15 10:46:08.519: ISAKMP:(1002):Old State = IKE_QM_READY New State =
IKE_QM_SPI_STARVE
*Aug 15 10:46:08.519: ISAKMP:(1002): Creating IPSec SAs
*Aug 15 10:46:08.519: inbound SA from 53.54.55.57 to 53.54.55.56 (f/i)
0/ 0
(proxy 53.54.55.57 to 53.54.55.56)
*Aug 15 10:46:08.519: has spi 0x6CACC283 and conn_id 0
*Aug 15 10:46:08.519: lifetime of 43200 seconds
*Aug 15 10:46:08.519: outbound SA from 53.54.55.56 to 53.54.55.57 (f/i)
0/0
(proxy 53.54.55.56 to 53.54.55.57)
*Aug 15 10:46:08.519: has spi 0xD18416C and conn_id 0
*Aug 15 10:46:08.519: lifetime of 43200 seconds
*Aug 15 10:46:08.519: ISAKMP:(1002): sending packet to 53.54.55.57 my_port 500
peer_port 500 (R) QM_IDLE
*Aug 15 10:46:08.519: ISAKMP:(1002):Sending an IKE IPv4 Packet.
*Aug 15 10:46:08.523: ISAKMP:(1002):Node -441594065, Input = IKE_MESG_INTERNAL,
IKE_GOT_SPI
*Aug 15 10:46:08.523: ISAKMP:(1002):Old State = IKE_QM_SPI_STARVE New State =
IKE_QM_R_QM2
*Aug 15 10:46:08.523: IPSEC(key_engine): got a queue event with 1 KMI message(s)
*Aug 15 10:46:08.523: Crypto mapdb : proxy_match
src addr : 53.54.55.56
dst addr : 53.54.55.57
protocol : 47
src port : 0
dst port : 0
*Aug 15 10:46:08.523: IPSEC(crypto_ipsec_sa_find_ident_head): reconnecting with
the same proxies and peer 53.54.55.57
*Aug 15 10:46:08.523: IPSEC(policy_db_add_ident): src 53.54.55.56, dest
53.54.55.57, dest_port 0
*Aug 15 10:46:08.523: IPSEC(create_sa): sa created,
(sa) sa_dest= 53.54.55.56, sa_proto= 50,
sa_spi= 0x6CACC283(1823261315),
sa_trans= esp-3des esp-sha-hmac , sa_conn_id= 3
sa_lifetime(k/sec)= (4443761/3600)
*Aug 15 10:46:08.523: IPSEC(create_sa): sa created,
(sa) sa_dest= 53.54.55.57, sa_proto= 50,
sa_spi= 0xD18416C(219693420),
sa_trans= esp-3des esp-sha-hmac , sa_conn_id= 4
sa_lifetime(k/sec)= (4443761/3600)
*Aug 15 10:46:08.523: IPSEC(crypto_ipsec_update_ident_tunnel_decap_oce):
updating Tunnel0 ident 5097A2B4 with tun_decap_oce 66A6A9C0
*Aug 15 10:46:08.523: IPSEC-IFC MGRE/Tu0(53.54.55.56/53.54.55.57): connection
lookup returned 66A672EC
*Aug 15 10:46:08.523: IPSEC-IFC MGRE/Tu0(53.54.55.56/53.54.55.57):
tunnel_protection_socket_up
*Aug 15 10:46:08.523: IPSEC-IFC MGRE/Tu0(53.54.55.56/53.54.55.57): Signalling
NHRP
*Aug 15 10:46:08.523: IPSEC-IFC MGRE/Tu0(53.54.55.56/53.54.55.57): Got MTU
message mtu 1463
*Aug 15 10:46:08.523: IPSEC-IFC MGRE/Tu0(53.54.55.56/53.54.55.57): connection
lookup returned 66A672EC
*Aug 15 10:46:08.599: ISAKMP (1002): received packet from 53.54.55.57 dport 500
sport 500 Global (R) QM_IDLE
*Aug 15 10:46:08.599: ISAKMP:(1002):deleting node -441594065 error FALSE reason
"QM done (await)"
*Aug 15 10:46:08.599: ISAKMP:(1002):Node -441594065, Input = IKE_MESG_FROM_PEER,
IKE_QM_EXCH
*Aug 15 10:46:08.599: ISAKMP:(1002):Old State = IKE_QM_R_QM2 New State =
IKE_QM_PHASE2_COMPLETE
*Aug 15 10:46:08.599: IPSEC(key_engine): got a queue event with 1 KMI message(s)
*Aug 15 10:46:08.599: IPSEC(key_engine_enable_outbound): rec'd enable notify
from ISAKMP
*Aug 15 10:46:08.599: IPSEC(key_engine_enable_outbound): enable SA with spi
219693420/50
*Aug 15 10:46:08.599: IPSEC(update_current_outbound_sa): updated peer
53.54.55.57 current outbound sa to SPI D18416C
*Aug 15 10:46:09.947: NHRP-ERROR: Packet Recved with unsupported Address Family
Number.
*Aug 15 10:46:09.947: NHRP-ERROR: Incorrect NBMA Network length = 55 on Tunnel0
*Aug 15 10:46:14.959: NHRP-ERROR: Packet Recved with unsupported Address Family
Number.
*Aug 15 10:46:14.959: NHRP-ERROR: Incorrect NBMA Network length = 55 on Tunnel0
*Aug 15 10:46:19.959: NHRP-ERROR: Packet Recved with unsupported Address Family
Number.
*Aug 15 10:46:19.959: NHRP-ERROR: Incorrect NBMA Network length = 55 on Tunnel0
*Aug 15 10:46:24.959: NHRP-ERROR: Packet Recved with unsupported Address Family
Number.
*Aug 15 10:46:24.959: NHRP-ERROR: Incorrect NBMA Network length = 55 on Tunnel0
*Aug 15 10:46:29.959: NHRP-ERROR: Packet Recved with unsupported Address Family
Number.
*Aug 15 10:46:29.959: NHRP-ERROR: Incorrect NBMA Network length = 55 on Tunnel0
sport 500 Global (R) QM_IDLE
*Aug 15 10:46:08.599: ISAKMP:(1002):deleting node -441594065 error FALSE reason
"QM done (await)"
*Aug 15 10:46:08.599: ISAKMP:(1002):Node -441594065, Input = IKE_MESG_FROM_PEER,
IKE_QM_EXCH
*Aug 15 10:46:08.599: ISAKMP:(1002):Old State = IKE_QM_R_QM2 New State =
IKE_QM_PHASE2_COMPLETE
*Aug 15 10:46:08.599: IPSEC(key_engine): got a queue event with 1 KMI message(s)
*Aug 15 10:46:08.599: IPSEC(key_engine_enable_outbound): rec'd enable notify
from ISAKMP
*Aug 15 10:46:08.599: IPSEC(key_engine_enable_outbound): enable SA with spi
219693420/50
*Aug 15 10:46:08.599: IPSEC(update_current_outbound_sa): updated peer
53.54.55.57 current outbound sa to SPI D18416C
*Aug 15 10:46:09.947: NHRP-ERROR: Packet Recved with unsupported Address Family
Number.
*Aug 15 10:46:09.947: NHRP-ERROR: Incorrect NBMA Network length = 55 on Tunnel0
*Aug 15 10:46:14.959: NHRP-ERROR: Packet Recved with unsupported Address Family
Number.
*Aug 15 10:46:14.959: NHRP-ERROR: Incorrect NBMA Network length = 55 on Tunnel0
*Aug 15 10:46:19.959: NHRP-ERROR: Packet Recved with unsupported Address Family
Number.
*Aug 15 10:46:19.959: NHRP-ERROR: Incorrect NBMA Network length = 55 on Tunnel0
*Aug 15 10:46:24.959: NHRP-ERROR: Packet Recved with unsupported Address Family
Number.
*Aug 15 10:46:24.959: NHRP-ERROR: Incorrect NBMA Network length = 55 on Tunnel0
*Aug 15 10:46:29.959: NHRP-ERROR: Packet Recved with unsupported Address Family
Number.
*Aug 15 10:46:29.959: NHRP-ERROR: Incorrect NBMA Network length = 55 on Tunnel0

More Related Content

What's hot

Eincop Netwax Lab: Site 2 Site VPN with Routing Protocols
Eincop Netwax Lab: Site 2 Site VPN with Routing ProtocolsEincop Netwax Lab: Site 2 Site VPN with Routing Protocols
Eincop Netwax Lab: Site 2 Site VPN with Routing ProtocolsNetwax Lab
 
Watching And Manipulating Your Network Traffic
Watching And Manipulating Your Network TrafficWatching And Manipulating Your Network Traffic
Watching And Manipulating Your Network TrafficJosiah Ritchie
 
Nxll25 hsrp with failover
Nxll25 hsrp with failoverNxll25 hsrp with failover
Nxll25 hsrp with failoverNetwax Lab
 
Nxll21 ospf filtering & summarization
Nxll21 ospf filtering & summarizationNxll21 ospf filtering & summarization
Nxll21 ospf filtering & summarizationNetwax Lab
 
Analysis of Compromised Linux Server
Analysis of Compromised Linux ServerAnalysis of Compromised Linux Server
Analysis of Compromised Linux Serveranandvaidya
 
Configuring Ip Sec Between A Router And A Pix
Configuring Ip Sec Between A Router And A PixConfiguring Ip Sec Between A Router And A Pix
Configuring Ip Sec Between A Router And A Pixangelitoh11
 
How To Install and Configure Apache SSL on CentOS 7
How To Install and Configure Apache SSL on CentOS 7How To Install and Configure Apache SSL on CentOS 7
How To Install and Configure Apache SSL on CentOS 7VCP Muthukrishna
 
Eincop Netwax Lab: Redistribution
Eincop Netwax Lab: RedistributionEincop Netwax Lab: Redistribution
Eincop Netwax Lab: RedistributionNetwax Lab
 
Eincop Netwax Lab: Access List ii
Eincop Netwax Lab: Access List iiEincop Netwax Lab: Access List ii
Eincop Netwax Lab: Access List iiNetwax Lab
 
Nxll20 na ting
Nxll20 na ting Nxll20 na ting
Nxll20 na ting Netwax Lab
 
How To View Login History and Logout History on RHEL 7
How To View Login History and Logout History on RHEL 7How To View Login History and Logout History on RHEL 7
How To View Login History and Logout History on RHEL 7VCP Muthukrishna
 
Nxll10 v lan and trunking
Nxll10 v lan and trunkingNxll10 v lan and trunking
Nxll10 v lan and trunkingNetwax Lab
 
Nxll19 vrrp (virtual router redundancy protocol)
Nxll19 vrrp (virtual router redundancy protocol)Nxll19 vrrp (virtual router redundancy protocol)
Nxll19 vrrp (virtual router redundancy protocol)Netwax Lab
 
How To Check IE Enhanced Security Is Enabled Windows PowerShell
How To Check IE Enhanced Security Is Enabled Windows PowerShellHow To Check IE Enhanced Security Is Enabled Windows PowerShell
How To Check IE Enhanced Security Is Enabled Windows PowerShellVCP Muthukrishna
 
How To Protect SSH Access with Fail2Ban on RHEL 7
How To Protect SSH Access with Fail2Ban on RHEL 7How To Protect SSH Access with Fail2Ban on RHEL 7
How To Protect SSH Access with Fail2Ban on RHEL 7VCP Muthukrishna
 
Eincop Netwax Lab: EIGRP iii
Eincop Netwax Lab: EIGRP iiiEincop Netwax Lab: EIGRP iii
Eincop Netwax Lab: EIGRP iiiNetwax Lab
 
How To Check file exists and Delete PowerShell
How To Check file exists and Delete PowerShellHow To Check file exists and Delete PowerShell
How To Check file exists and Delete PowerShellVCP Muthukrishna
 

What's hot (20)

Eincop Netwax Lab: Site 2 Site VPN with Routing Protocols
Eincop Netwax Lab: Site 2 Site VPN with Routing ProtocolsEincop Netwax Lab: Site 2 Site VPN with Routing Protocols
Eincop Netwax Lab: Site 2 Site VPN with Routing Protocols
 
Watching And Manipulating Your Network Traffic
Watching And Manipulating Your Network TrafficWatching And Manipulating Your Network Traffic
Watching And Manipulating Your Network Traffic
 
Nxll25 hsrp with failover
Nxll25 hsrp with failoverNxll25 hsrp with failover
Nxll25 hsrp with failover
 
Nxll21 ospf filtering & summarization
Nxll21 ospf filtering & summarizationNxll21 ospf filtering & summarization
Nxll21 ospf filtering & summarization
 
Analysis of Compromised Linux Server
Analysis of Compromised Linux ServerAnalysis of Compromised Linux Server
Analysis of Compromised Linux Server
 
Configuring Ip Sec Between A Router And A Pix
Configuring Ip Sec Between A Router And A PixConfiguring Ip Sec Between A Router And A Pix
Configuring Ip Sec Between A Router And A Pix
 
How To Install and Configure Apache SSL on CentOS 7
How To Install and Configure Apache SSL on CentOS 7How To Install and Configure Apache SSL on CentOS 7
How To Install and Configure Apache SSL on CentOS 7
 
Eincop Netwax Lab: Redistribution
Eincop Netwax Lab: RedistributionEincop Netwax Lab: Redistribution
Eincop Netwax Lab: Redistribution
 
Eincop Netwax Lab: Access List ii
Eincop Netwax Lab: Access List iiEincop Netwax Lab: Access List ii
Eincop Netwax Lab: Access List ii
 
Nxll20 na ting
Nxll20 na ting Nxll20 na ting
Nxll20 na ting
 
How To View Login History and Logout History on RHEL 7
How To View Login History and Logout History on RHEL 7How To View Login History and Logout History on RHEL 7
How To View Login History and Logout History on RHEL 7
 
Nxll11 bgp
Nxll11 bgpNxll11 bgp
Nxll11 bgp
 
Nxll10 v lan and trunking
Nxll10 v lan and trunkingNxll10 v lan and trunking
Nxll10 v lan and trunking
 
Nxll26 bgp ii
Nxll26 bgp iiNxll26 bgp ii
Nxll26 bgp ii
 
Nxll19 vrrp (virtual router redundancy protocol)
Nxll19 vrrp (virtual router redundancy protocol)Nxll19 vrrp (virtual router redundancy protocol)
Nxll19 vrrp (virtual router redundancy protocol)
 
Lab 1 my sql tutorial
Lab 1 my sql tutorial Lab 1 my sql tutorial
Lab 1 my sql tutorial
 
How To Check IE Enhanced Security Is Enabled Windows PowerShell
How To Check IE Enhanced Security Is Enabled Windows PowerShellHow To Check IE Enhanced Security Is Enabled Windows PowerShell
How To Check IE Enhanced Security Is Enabled Windows PowerShell
 
How To Protect SSH Access with Fail2Ban on RHEL 7
How To Protect SSH Access with Fail2Ban on RHEL 7How To Protect SSH Access with Fail2Ban on RHEL 7
How To Protect SSH Access with Fail2Ban on RHEL 7
 
Eincop Netwax Lab: EIGRP iii
Eincop Netwax Lab: EIGRP iiiEincop Netwax Lab: EIGRP iii
Eincop Netwax Lab: EIGRP iii
 
How To Check file exists and Delete PowerShell
How To Check file exists and Delete PowerShellHow To Check file exists and Delete PowerShell
How To Check file exists and Delete PowerShell
 

Viewers also liked

Vigilancia colera
Vigilancia coleraVigilancia colera
Vigilancia coleraVesna Ivsic
 
木棉 小植體報告
木棉 小植體報告木棉 小植體報告
木棉 小植體報告irving CHOU
 
April Tomball Tea Party Email
April Tomball Tea Party EmailApril Tomball Tea Party Email
April Tomball Tea Party Emailfsh1969
 
Google In China Case Competition Written Report
Google In China Case Competition Written ReportGoogle In China Case Competition Written Report
Google In China Case Competition Written Reportkcg016
 
Aerospace Risk Management
Aerospace Risk ManagementAerospace Risk Management
Aerospace Risk ManagementQuality Guru
 
EwIms Software Brochure
EwIms Software BrochureEwIms Software Brochure
EwIms Software BrochureQuality Guru
 
Respiratory system
Respiratory systemRespiratory system
Respiratory systemPatrick814
 
B2X - India Standard Accounting Procedures - samsung V 1(Final)
B2X - India Standard Accounting Procedures - samsung V 1(Final)B2X - India Standard Accounting Procedures - samsung V 1(Final)
B2X - India Standard Accounting Procedures - samsung V 1(Final)suresh_advani
 
Teknik menjawab ea n. pahang 2006
Teknik menjawab ea n. pahang 2006Teknik menjawab ea n. pahang 2006
Teknik menjawab ea n. pahang 2006Cikgu Latifah
 
Doing business in canada
Doing business in canadaDoing business in canada
Doing business in canadaNicholas Church
 
Clothes and colours
Clothes and coloursClothes and colours
Clothes and coloursgatvitoria20
 

Viewers also liked (17)

Vigilancia colera
Vigilancia coleraVigilancia colera
Vigilancia colera
 
Redes
RedesRedes
Redes
 
木棉 小植體報告
木棉 小植體報告木棉 小植體報告
木棉 小植體報告
 
Christenson cel7002 5
Christenson cel7002 5Christenson cel7002 5
Christenson cel7002 5
 
April Tomball Tea Party Email
April Tomball Tea Party EmailApril Tomball Tea Party Email
April Tomball Tea Party Email
 
Survivor: Fiji
Survivor: FijiSurvivor: Fiji
Survivor: Fiji
 
Google In China Case Competition Written Report
Google In China Case Competition Written ReportGoogle In China Case Competition Written Report
Google In China Case Competition Written Report
 
Aerospace Risk Management
Aerospace Risk ManagementAerospace Risk Management
Aerospace Risk Management
 
EwIms Software Brochure
EwIms Software BrochureEwIms Software Brochure
EwIms Software Brochure
 
Respiratory system
Respiratory systemRespiratory system
Respiratory system
 
MINE
MINEMINE
MINE
 
Swisscom Student day
Swisscom Student daySwisscom Student day
Swisscom Student day
 
Aerospace QMS
Aerospace QMSAerospace QMS
Aerospace QMS
 
B2X - India Standard Accounting Procedures - samsung V 1(Final)
B2X - India Standard Accounting Procedures - samsung V 1(Final)B2X - India Standard Accounting Procedures - samsung V 1(Final)
B2X - India Standard Accounting Procedures - samsung V 1(Final)
 
Teknik menjawab ea n. pahang 2006
Teknik menjawab ea n. pahang 2006Teknik menjawab ea n. pahang 2006
Teknik menjawab ea n. pahang 2006
 
Doing business in canada
Doing business in canadaDoing business in canada
Doing business in canada
 
Clothes and colours
Clothes and coloursClothes and colours
Clothes and colours
 

Similar to 55debug

11thingsabout11g 12659705398222 Phpapp01
11thingsabout11g 12659705398222 Phpapp0111thingsabout11g 12659705398222 Phpapp01
11thingsabout11g 12659705398222 Phpapp01Karam Abuataya
 
11 Things About11g
11 Things About11g11 Things About11g
11 Things About11gfcamachob
 
OpenWorld Sep14 12c for_developers
OpenWorld Sep14 12c for_developersOpenWorld Sep14 12c for_developers
OpenWorld Sep14 12c for_developersConnor McDonald
 
Tracing Parallel Execution (UKOUG 2006)
Tracing Parallel Execution (UKOUG 2006)Tracing Parallel Execution (UKOUG 2006)
Tracing Parallel Execution (UKOUG 2006)Doug Burns
 
Cannot observe ingress packets
Cannot observe ingress packetsCannot observe ingress packets
Cannot observe ingress packetssoichi shigeta
 
Profiling of Oracle Function Calls
Profiling of Oracle Function CallsProfiling of Oracle Function Calls
Profiling of Oracle Function CallsEnkitec
 
Udp socket programming(Florian)
Udp socket programming(Florian)Udp socket programming(Florian)
Udp socket programming(Florian)Flor Ian
 

Similar to 55debug (8)

Logs
LogsLogs
Logs
 
11thingsabout11g 12659705398222 Phpapp01
11thingsabout11g 12659705398222 Phpapp0111thingsabout11g 12659705398222 Phpapp01
11thingsabout11g 12659705398222 Phpapp01
 
11 Things About11g
11 Things About11g11 Things About11g
11 Things About11g
 
OpenWorld Sep14 12c for_developers
OpenWorld Sep14 12c for_developersOpenWorld Sep14 12c for_developers
OpenWorld Sep14 12c for_developers
 
Tracing Parallel Execution (UKOUG 2006)
Tracing Parallel Execution (UKOUG 2006)Tracing Parallel Execution (UKOUG 2006)
Tracing Parallel Execution (UKOUG 2006)
 
Cannot observe ingress packets
Cannot observe ingress packetsCannot observe ingress packets
Cannot observe ingress packets
 
Profiling of Oracle Function Calls
Profiling of Oracle Function CallsProfiling of Oracle Function Calls
Profiling of Oracle Function Calls
 
Udp socket programming(Florian)
Udp socket programming(Florian)Udp socket programming(Florian)
Udp socket programming(Florian)
 

Recently uploaded

Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAbhinavSharma374939
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 

Recently uploaded (20)

Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog Converter
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 

55debug

  • 1. 7301# *Aug 15 10:46:04.199: ISAKMP (0): received packet from 53.54.55.57 dport 500 sport 500 Global (N) NEW SA *Aug 15 10:46:04.199: ISAKMP: Created a peer struct for 53.54.55.57, peer port 500 *Aug 15 10:46:04.199: ISAKMP: New peer created peer = 0x501A44A4 peer_handle = 0x80000003 *Aug 15 10:46:04.199: ISAKMP: Locking peer struct 0x501A44A4, refcount 1 for crypto_isakmp_process_block *Aug 15 10:46:04.199: ISAKMP: local port 500, remote port 500 *Aug 15 10:46:04.199: ISAKMP: Find a dup sa in the avl tree during calling isadb_insert sa = 501882C0 *Aug 15 10:46:04.199: ISAKMP:(0):Input = IKE_MESG_FROM_PEER, IKE_MM_EXCH *Aug 15 10:46:04.199: ISAKMP:(0):Old State = IKE_READY New State = IKE_R_MM1 *Aug 15 10:46:04.199: ISAKMP:(0): processing SA payload. message ID = 0 *Aug 15 10:46:04.199: ISAKMP:(0): processing vendor id payload *Aug 15 10:46:04.199: ISAKMP:(0): vendor ID is DPD *Aug 15 10:46:04.199: ISAKMP:(0):found peer pre-shared key matching 53.54.55.57 *Aug 15 10:46:04.199: ISAKMP:(0): local preshared key found *Aug 15 10:46:04.199: ISAKMP : Scanning profiles for xauth ... *Aug 15 10:46:04.199: ISAKMP:(0):Checking ISAKMP transform 1 against priority 10 policy *Aug 15 10:46:04.199: ISAKMP: life type in seconds *Aug 15 10:46:04.199: ISAKMP: life duration (VPI) of 0x0 0x1 0x51 0x80 *Aug 15 10:46:04.199: ISAKMP: encryption 3DES-CBC *Aug 15 10:46:04.199: ISAKMP: auth pre-share *Aug 15 10:46:04.199: ISAKMP: hash SHA *Aug 15 10:46:04.199: ISAKMP: default group 5 *Aug 15 10:46:04.199: ISAKMP:(0):atts are acceptable. Next payload is 0 *Aug 15 10:46:04.199: ISAKMP:(0):Acceptable atts:actual life: 0 *Aug 15 10:46:04.199: ISAKMP:(0):Acceptable atts:life: 0 *Aug 15 10:46:04.199: ISAKMP:(0):Fill atts in sa vpi_length:4 *Aug 15 10:46:04.199: ISAKMP:(0):Fill atts in sa life_in_seconds:86400 *Aug 15 10:46:04.199: ISAKMP:(0):Returning Actual lifetime: 86400 *Aug 15 10:46:04.199: ISAKMP:(0)::Started lifetime timer: 86400. *Aug 15 10:46:04.199: ISAKMP:(0): processing vendor id payload *Aug 15 10:46:04.199: ISAKMP:(0): vendor ID is DPD *Aug 15 10:46:04.199: ISAKMP:(0):Input = IKE_MESG_INTERNAL, IKE_PROCESS_MAIN_MODE *Aug 15 10:46:04.199: ISAKMP:(0):Old State = IKE_R_MM1 New State = IKE_R_MM1 *Aug 15 10:46:04.199: ISAKMP:(0): sending packet to 53.54.55.57 my_port 500 peer_port 500 (R) MM_SA_SETUP *Aug 15 10:46:04.199: ISAKMP:(0):Sending an IKE IPv4 Packet. *Aug 15 10:46:04.199: ISAKMP:(0):Input = IKE_MESG_INTERNAL, IKE_PROCESS_COMPLETE *Aug 15 10:46:04.199: ISAKMP:(0):Old State = IKE_R_MM1 New State = IKE_R_MM2 *Aug 15 10:46:05.527: ISAKMP (0): received packet from 53.54.55.57 dport 500 sport 500 Global (R) MM_SA_SETUP *Aug 15 10:46:05.527: ISAKMP:(0):Input = IKE_MESG_FROM_PEER, IKE_MM_EXCH *Aug 15 10:46:05.527: ISAKMP:(0):Old State = IKE_R_MM2 New State = IKE_R_MM3 *Aug 15 10:46:05.527: ISAKMP:(0): processing KE payload. message ID = 0 *Aug 15 10:46:05.567: ISAKMP:(0): processing NONCE payload. message ID = 0 *Aug 15 10:46:05.567: ISAKMP:(0):found peer pre-shared key matching 53.54.55.57 *Aug 15 10:46:05.567: ISAKMP:(1002):Input = IKE_MESG_INTERNAL, IKE_PROCESS_MAIN_MODE *Aug 15 10:46:05.567: ISAKMP:(1002):Old State = IKE_R_MM3 New State = IKE_R_MM3 *Aug 15 10:46:05.567: ISAKMP:(1002): sending packet to 53.54.55.57 my_port 500 peer_port 500 (R) MM_KEY_EXCH *Aug 15 10:46:05.567: ISAKMP:(1002):Sending an IKE IPv4 Packet.
  • 2. *Aug 15 10:46:05.567: ISAKMP:(1002):Input = IKE_MESG_INTERNAL, IKE_PROCESS_COMPLETE *Aug 15 10:46:05.567: ISAKMP:(1002):Old State = IKE_R_MM3 New State = IKE_R_MM4 *Aug 15 10:46:06.919: ISAKMP (1002): received packet from 53.54.55.57 dport 500 sport 500 Global (R) MM_KEY_EXCH *Aug 15 10:46:06.919: ISAKMP:(1002):Input = IKE_MESG_FROM_PEER, IKE_MM_EXCH *Aug 15 10:46:06.919: ISAKMP:(1002):Old State = IKE_R_MM4 New State = IKE_R_MM5 *Aug 15 10:46:06.919: ISAKMP:(1002): processing ID payload. message ID = 0 *Aug 15 10:46:06.919: ISAKMP (1002): ID payload next-payload : 8 type : 1 address : 53.54.55.57 protocol : 17 port : 500 length : 12 *Aug 15 10:46:06.919: ISAKMP:(0):: peer matches *none* of the profiles *Aug 15 10:46:06.919: ISAKMP:(1002): processing HASH payload. message ID = 0 *Aug 15 10:46:06.919: ISAKMP:(1002):SA authentication status: authenticated *Aug 15 10:46:06.919: ISAKMP:(1002):SA has been authenticated with 53.54.55.57 *Aug 15 10:46:06.919: ISAKMP: Trying to insert a peer 53.54.55.56/53.54.55.57/500/, and inserted successfully 501A44A4. *Aug 15 10:46:06.919: ISAKMP:(1002):Input = IKE_MESG_INTERNAL, IKE_PROCESS_MAIN_MODE *Aug 15 10:46:06.919: ISAKMP:(1002):Old State = IKE_R_MM5 New State = IKE_R_MM5 *Aug 15 10:46:06.919: ISAKMP:(1002):SA is doing pre-shared key authentication using id type ID_IPV4_ADDR *Aug 15 10:46:06.919: ISAKMP (1002): ID payload next-payload : 8 type : 1 address : 53.54.55.56 protocol : 17 port : 500 length : 12 *Aug 15 10:46:06.919: ISAKMP:(1002):Total payload length: 12 *Aug 15 10:46:06.919: ISAKMP:(1002): sending packet to 53.54.55.57 my_port 500 peer_port 500 (R) MM_KEY_EXCH *Aug 15 10:46:06.919: ISAKMP:(1002):Sending an IKE IPv4 Packet. *Aug 15 10:46:06.919: ISAKMP:(1002):Input = IKE_MESG_INTERNAL, IKE_PROCESS_COMPLETE *Aug 15 10:46:06.919: ISAKMP:(1002):Old State = IKE_R_MM5 New State = IKE_P1_COMPLETE *Aug 15 10:46:06.919: ISAKMP:(1002):Input = IKE_MESG_INTERNAL, IKE_PHASE1_COMPLETE *Aug 15 10:46:06.919: ISAKMP:(1002):Old State = IKE_P1_COMPLETE New State = IKE_P1_COMPLETE *Aug 15 10:46:06.955: ISAKMP (1002): received packet from 53.54.55.57 dport 500 sport 500 Global (R) QM_IDLE *Aug 15 10:46:06.955: ISAKMP: set new node -1028686484 to QM_IDLE *Aug 15 10:46:06.955: ISAKMP:(1002): processing HASH payload. message ID = -1028686484 *Aug 15 10:46:06.955: ISAKMP:(1002): processing NOTIFY INITIAL_CONTACT protocol 1 spi 0, message ID = -1028686484, sa = 501882C0 *Aug 15 10:46:06.955: ISAKMP:(1002):SA authentication status: authenticated *Aug 15 10:46:06.955: ISAKMP:(1002): Process initial contact, bring down existing phase 1 and 2 SA's with local 53.54.55.56 remote 53.54.55.57 remote port 500
  • 3. *Aug 15 10:46:06.955: ISAKMP:(1002):deleting node -1028686484 error FALSE reason "Informational (in) state 1" *Aug 15 10:46:06.955: ISAKMP:(1002):Input = IKE_MESG_FROM_PEER, IKE_INFO_NOTIFY *Aug 15 10:46:06.955: ISAKMP:(1002):Old State = IKE_P1_COMPLETE New State = IKE_P1_COMPLETE *Aug 15 10:46:06.955: IPSEC(key_engine): got a queue event with 1 KMI message(s) *Aug 15 10:46:08.479: ISAKMP (1002): received packet from 53.54.55.57 dport 500 sport 500 Global (R) QM_IDLE *Aug 15 10:46:08.479: ISAKMP: set new node -441594065 to QM_IDLE *Aug 15 10:46:08.479: ISAKMP:(1002): processing HASH payload. message ID = -441594065 *Aug 15 10:46:08.479: ISAKMP:(1002): processing SA payload. message ID = -441594065 *Aug 15 10:46:08.479: ISAKMP:(1002):Checking IPSec proposal 1 *Aug 15 10:46:08.479: ISAKMP: transform 1, ESP_3DES *Aug 15 10:46:08.479: ISAKMP: attributes in transform: *Aug 15 10:46:08.479: ISAKMP: SA life type in seconds *Aug 15 10:46:08.479: ISAKMP: SA life duration (basic) of 43200 *Aug 15 10:46:08.479: ISAKMP: encaps is 2 (Transport) *Aug 15 10:46:08.479: ISAKMP: authenticator is HMAC-SHA *Aug 15 10:46:08.479: ISAKMP: group is 5 *Aug 15 10:46:08.479: ISAKMP:(1002):atts are acceptable. *Aug 15 10:46:08.479: IPSEC(validate_proposal_request): proposal part #1 *Aug 15 10:46:08.479: IPSEC(validate_proposal_request): proposal part #1, (key eng. msg.) INBOUND local= 53.54.55.56, remote= 53.54.55.57, local_proxy= 53.54.55.56/255.255.255.255/47/0 (type=1), remote_proxy= 53.54.55.57/255.255.255.255/47/0 (type=1), protocol= ESP, transform= NONE (Transport), lifedur= 0s and 0kb, spi= 0x0(0), conn_id= 0, keysize= 0, flags= 0x0 *Aug 15 10:46:08.479: IPSEC-IFC MGRE/Tu0(53.54.55.56/53.54.55.57): connection lookup returned 0 *Aug 15 10:46:08.479: IPSEC-IFC MGRE/Tu0: crypto_ss_listen_start already listening *Aug 15 10:46:08.479: IPSEC-IFC MGRE/Tu0(53.54.55.56/53.54.55.57): Opening a socket with profile Profile3 *Aug 15 10:46:08.479: IPSEC-IFC MGRE/Tu0(53.54.55.56/53.54.55.57): connection lookup returned 0 *Aug 15 10:46:08.479: IPSEC-IFC MGRE/Tu0(53.54.55.56/53.54.55.57): Triggering tunnel immediately. *Aug 15 10:46:08.479: IPSEC-IFC MGRE/Tu0(53.54.55.56/53.54.55.57): tunnel_protection_start_pending_timer 66A672EC *Aug 15 10:46:08.479: IPSEC-IFC MGRE/Tu0(53.54.55.56/53.54.55.57): Good listen request *Aug 15 10:46:08.479: insert of map into mapdb AVL failed, map + ace pair already exists on the mapdb *Aug 15 10:46:08.479: CRYPTO_SS(TUNNEL SEC): Passive open, socket info: local 53.54.55.56 53.54.55.56/255.255.255.255/0, remote 53.54.55.57 53.54.55.57/255.255.255.255/0, prot 47, ifc Tu0 *Aug 15 10:46:08.479: Crypto mapdb : proxy_match src addr : 53.54.55.56 dst addr : 53.54.55.57 protocol : 47 src port : 0 dst port : 0 *Aug 15 10:46:08.479: ISAKMP:(1002): processing NONCE payload. message ID = -441594065 *Aug 15 10:46:08.479: ISAKMP:(1002): processing KE payload. message ID = -441594065 *Aug 15 10:46:08.479: CRYPTO_SS(TUNNEL SEC): Completed binding of application to socket *Aug 15 10:46:08.483: IPSEC-IFC MGRE/Tu0(53.54.55.56/53.54.55.57): connection lookup returned 66A672EC
  • 4. *Aug 15 10:46:08.483: IPSEC-IFC MGRE/Tu0(53.54.55.56/53.54.55.57): good socket ready message *Aug 15 10:46:08.519: ISAKMP:(1002): processing ID payload. message ID = -441594065 *Aug 15 10:46:08.519: ISAKMP:(1002): processing ID payload. message ID = -441594065 *Aug 15 10:46:08.519: ISAKMP:(1002):QM Responder gets spi *Aug 15 10:46:08.519: ISAKMP:(1002):Node -441594065, Input = IKE_MESG_FROM_PEER, IKE_QM_EXCH *Aug 15 10:46:08.519: ISAKMP:(1002):Old State = IKE_QM_READY New State = IKE_QM_SPI_STARVE *Aug 15 10:46:08.519: ISAKMP:(1002): Creating IPSec SAs *Aug 15 10:46:08.519: inbound SA from 53.54.55.57 to 53.54.55.56 (f/i) 0/ 0 (proxy 53.54.55.57 to 53.54.55.56) *Aug 15 10:46:08.519: has spi 0x6CACC283 and conn_id 0 *Aug 15 10:46:08.519: lifetime of 43200 seconds *Aug 15 10:46:08.519: outbound SA from 53.54.55.56 to 53.54.55.57 (f/i) 0/0 (proxy 53.54.55.56 to 53.54.55.57) *Aug 15 10:46:08.519: has spi 0xD18416C and conn_id 0 *Aug 15 10:46:08.519: lifetime of 43200 seconds *Aug 15 10:46:08.519: ISAKMP:(1002): sending packet to 53.54.55.57 my_port 500 peer_port 500 (R) QM_IDLE *Aug 15 10:46:08.519: ISAKMP:(1002):Sending an IKE IPv4 Packet. *Aug 15 10:46:08.523: ISAKMP:(1002):Node -441594065, Input = IKE_MESG_INTERNAL, IKE_GOT_SPI *Aug 15 10:46:08.523: ISAKMP:(1002):Old State = IKE_QM_SPI_STARVE New State = IKE_QM_R_QM2 *Aug 15 10:46:08.523: IPSEC(key_engine): got a queue event with 1 KMI message(s) *Aug 15 10:46:08.523: Crypto mapdb : proxy_match src addr : 53.54.55.56 dst addr : 53.54.55.57 protocol : 47 src port : 0 dst port : 0 *Aug 15 10:46:08.523: IPSEC(crypto_ipsec_sa_find_ident_head): reconnecting with the same proxies and peer 53.54.55.57 *Aug 15 10:46:08.523: IPSEC(policy_db_add_ident): src 53.54.55.56, dest 53.54.55.57, dest_port 0 *Aug 15 10:46:08.523: IPSEC(create_sa): sa created, (sa) sa_dest= 53.54.55.56, sa_proto= 50, sa_spi= 0x6CACC283(1823261315), sa_trans= esp-3des esp-sha-hmac , sa_conn_id= 3 sa_lifetime(k/sec)= (4443761/3600) *Aug 15 10:46:08.523: IPSEC(create_sa): sa created, (sa) sa_dest= 53.54.55.57, sa_proto= 50, sa_spi= 0xD18416C(219693420), sa_trans= esp-3des esp-sha-hmac , sa_conn_id= 4 sa_lifetime(k/sec)= (4443761/3600) *Aug 15 10:46:08.523: IPSEC(crypto_ipsec_update_ident_tunnel_decap_oce): updating Tunnel0 ident 5097A2B4 with tun_decap_oce 66A6A9C0 *Aug 15 10:46:08.523: IPSEC-IFC MGRE/Tu0(53.54.55.56/53.54.55.57): connection lookup returned 66A672EC *Aug 15 10:46:08.523: IPSEC-IFC MGRE/Tu0(53.54.55.56/53.54.55.57): tunnel_protection_socket_up *Aug 15 10:46:08.523: IPSEC-IFC MGRE/Tu0(53.54.55.56/53.54.55.57): Signalling NHRP *Aug 15 10:46:08.523: IPSEC-IFC MGRE/Tu0(53.54.55.56/53.54.55.57): Got MTU message mtu 1463 *Aug 15 10:46:08.523: IPSEC-IFC MGRE/Tu0(53.54.55.56/53.54.55.57): connection lookup returned 66A672EC *Aug 15 10:46:08.599: ISAKMP (1002): received packet from 53.54.55.57 dport 500
  • 5. sport 500 Global (R) QM_IDLE *Aug 15 10:46:08.599: ISAKMP:(1002):deleting node -441594065 error FALSE reason "QM done (await)" *Aug 15 10:46:08.599: ISAKMP:(1002):Node -441594065, Input = IKE_MESG_FROM_PEER, IKE_QM_EXCH *Aug 15 10:46:08.599: ISAKMP:(1002):Old State = IKE_QM_R_QM2 New State = IKE_QM_PHASE2_COMPLETE *Aug 15 10:46:08.599: IPSEC(key_engine): got a queue event with 1 KMI message(s) *Aug 15 10:46:08.599: IPSEC(key_engine_enable_outbound): rec'd enable notify from ISAKMP *Aug 15 10:46:08.599: IPSEC(key_engine_enable_outbound): enable SA with spi 219693420/50 *Aug 15 10:46:08.599: IPSEC(update_current_outbound_sa): updated peer 53.54.55.57 current outbound sa to SPI D18416C *Aug 15 10:46:09.947: NHRP-ERROR: Packet Recved with unsupported Address Family Number. *Aug 15 10:46:09.947: NHRP-ERROR: Incorrect NBMA Network length = 55 on Tunnel0 *Aug 15 10:46:14.959: NHRP-ERROR: Packet Recved with unsupported Address Family Number. *Aug 15 10:46:14.959: NHRP-ERROR: Incorrect NBMA Network length = 55 on Tunnel0 *Aug 15 10:46:19.959: NHRP-ERROR: Packet Recved with unsupported Address Family Number. *Aug 15 10:46:19.959: NHRP-ERROR: Incorrect NBMA Network length = 55 on Tunnel0 *Aug 15 10:46:24.959: NHRP-ERROR: Packet Recved with unsupported Address Family Number. *Aug 15 10:46:24.959: NHRP-ERROR: Incorrect NBMA Network length = 55 on Tunnel0 *Aug 15 10:46:29.959: NHRP-ERROR: Packet Recved with unsupported Address Family Number. *Aug 15 10:46:29.959: NHRP-ERROR: Incorrect NBMA Network length = 55 on Tunnel0
  • 6. sport 500 Global (R) QM_IDLE *Aug 15 10:46:08.599: ISAKMP:(1002):deleting node -441594065 error FALSE reason "QM done (await)" *Aug 15 10:46:08.599: ISAKMP:(1002):Node -441594065, Input = IKE_MESG_FROM_PEER, IKE_QM_EXCH *Aug 15 10:46:08.599: ISAKMP:(1002):Old State = IKE_QM_R_QM2 New State = IKE_QM_PHASE2_COMPLETE *Aug 15 10:46:08.599: IPSEC(key_engine): got a queue event with 1 KMI message(s) *Aug 15 10:46:08.599: IPSEC(key_engine_enable_outbound): rec'd enable notify from ISAKMP *Aug 15 10:46:08.599: IPSEC(key_engine_enable_outbound): enable SA with spi 219693420/50 *Aug 15 10:46:08.599: IPSEC(update_current_outbound_sa): updated peer 53.54.55.57 current outbound sa to SPI D18416C *Aug 15 10:46:09.947: NHRP-ERROR: Packet Recved with unsupported Address Family Number. *Aug 15 10:46:09.947: NHRP-ERROR: Incorrect NBMA Network length = 55 on Tunnel0 *Aug 15 10:46:14.959: NHRP-ERROR: Packet Recved with unsupported Address Family Number. *Aug 15 10:46:14.959: NHRP-ERROR: Incorrect NBMA Network length = 55 on Tunnel0 *Aug 15 10:46:19.959: NHRP-ERROR: Packet Recved with unsupported Address Family Number. *Aug 15 10:46:19.959: NHRP-ERROR: Incorrect NBMA Network length = 55 on Tunnel0 *Aug 15 10:46:24.959: NHRP-ERROR: Packet Recved with unsupported Address Family Number. *Aug 15 10:46:24.959: NHRP-ERROR: Incorrect NBMA Network length = 55 on Tunnel0 *Aug 15 10:46:29.959: NHRP-ERROR: Packet Recved with unsupported Address Family Number. *Aug 15 10:46:29.959: NHRP-ERROR: Incorrect NBMA Network length = 55 on Tunnel0