MED-F5510-MDF# debug crypto isakmp 200 MED-F5510-MDF# debug crypto ipsec 200 MED-F5510-MDF# debug crypto engine 200 MED-F5510-MDF# Oct 15 14:00:51 [IKEv1]: IP = 96.239.196.24, IKE_DECODE RECEIVED Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + VENDOR (13) + VENDOR (13) + NONE (0) total length : 148 Oct 15 14:00:51 [IKEv1 DEBUG]: IP = 96.239.196.24, processing SA payload Oct 15 14:00:51 [IKEv1 DEBUG]: IP = 96.239.196.24, Oakley proposal is acceptable Oct 15 14:00:51 [IKEv1 DEBUG]: IP = 96.239.196.24, processing VID payload Oct 15 14:00:51 [IKEv1 DEBUG]: IP = 96.239.196.24, Received NAT-Traversal ver 02 VID Oct 15 14:00:51 [IKEv1 DEBUG]: IP = 96.239.196.24, processing VID payload Oct 15 14:00:51 [IKEv1 DEBUG]: IP = 96.239.196.24, Received NAT-Traversal ver 03 VID Oct 15 14:00:51 [IKEv1 DEBUG]: IP = 96.239.196.24, processing VID payload Oct 15 14:00:51 [IKEv1 DEBUG]: IP = 96.239.196.24, Received Fragmentation VID Oct 15 14:00:51 [IKEv1 DEBUG]: IP = 96.239.196.24, IKE Peer included IKE fragmentation capability flags: Main Mode: True Aggressive Mode: True Oct 15 14:00:51 [IKEv1 DEBUG]: IP = 96.239.196.24, processing IKE SA payload Oct 15 14:00:51 [IKEv1 DEBUG]: IP = 96.239.196.24, IKE SA Proposal # 1, Transform # 1 acceptable Matches global IKE entry # 2 Oct 15 14:00:51 [IKEv1 DEBUG]: IP = 96.239.196.24, constructing ISAKMP SA payload Oct 15 14:00:51 [IKEv1 DEBUG]: IP = 96.239.196.24, constructing NAT-Traversal VID ver 02 payload Oct 15 14:00:51 [IKEv1 DEBUG]: IP = 96.239.196.24, constructing Fragmentation VID + extended capabilities payload Oct 15 14:00:51 [IKEv1]: IP = 96.239.196.24, IKE_DECODE SENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + VENDOR (13) + NONE (0) total length : 128 Oct 15 14:00:51 [IKEv1]: IP = 96.239.196.24, IKE_DECODE RECEIVED Message (msgid=0) with payloads : HDR + KE (4) + NONCE (10) + VENDOR (13) + VENDOR (13) + VENDOR (13) + VENDOR (13) + NAT-D (130) + NAT-D (130) + NONE (0) total length : 304 Oct 15 14:00:51 [IKEv1 DEBUG]: IP = 96.239.196.24, processing ke payload Oct 15 14:00:51 [IKEv1 DEBUG]: IP = 96.239.196.24, processing ISA_KE payload Oct 15 14:00:51 [IKEv1 DEBUG]: IP = 96.239.196.24, processing nonce payload Oct 15 14:00:51 [IKEv1 DEBUG]: IP = 96.239.196.24, processing VID payload Oct 15 14:00:51 [IKEv1 DEBUG]: IP = 96.239.196.24, Received Cisco Unity client VID Oct 15 14:00:51 [IKEv1 DEBUG]: IP = 96.239.196.24, processing VID payload Oct 15 14:00:51 [IKEv1 DEBUG]: IP = 96.239.196.24, Received xauth V6 VID Oct 15 14:00:51 [IKEv1 DEBUG]: IP = 96.239.196.24, processing VID payload Oct 15 14:00:51 [IKEv1 DEBUG]: IP = 96.239.196.24, Processing VPN3000/ASA spoofing IOS Vendor ID payload (version: 1.0.0, capabilities: 20000001) Oct 15 14:00:51 [IKEv1 DEBUG]: IP = 96.239.196.24, processing VID payload Oct 15 14:00:51 [IKEv1 DEBUG]: IP = 96.239.196.24, Received Altiga/Cisco VPN3000/Cisco ASA GW VID Oct 15 14:00:51 [IKEv1 DEBUG]: IP = 96.239.196.24, processing NAT-Discovery payload Oct 15 14:00:51 [IKEv1 DEBUG]: IP = 96.239.196.24, computing NAT Discovery hash Oct 15 14:00:51 [IKEv1 DEBUG]: IP = 96.239.196.24, processing NAT-Discovery payload Oct 15 14:00:51 [IKEv1 DEBUG]: IP = 96.239.196.24, computing NAT Discovery hash Oct 15 14:00:51 [IKEv1 DEBUG]: IP = 96.239.196.24, constructing ke payload Oct 15 14:00:51 [IKEv1 DEBUG]: IP = 96.239.196.24, constructing nonce payload Oct 15 14:00:51 [IKEv1 DEBUG]: IP = 96.239.196.24, constructing Cisco Unity VID payload Oct 15 14:00:51 [IKEv1 DEBUG]: IP = 96.239.196.24, constructing xauth V6 VID payload Oct 15 14:00:51 [IKEv1 DEBUG]: IP = 96.239.196.24, Send IOS VID Oct 15 14:00:51 [IKEv1 DEBUG]: IP = 96.239.196.24, Constructing ASA spoofing IOS Vendor ID payload (version: 1.0.0, capabilities: 20000001) Oct 15 14:00:51 [IKEv1 DEBUG]: IP = 96.239.196.24, constructing VID payload Oct 15 14:00:51 [IKEv1 DEBUG]: IP = 96.239.196.24, Send Altiga/Cisco VPN3000/Cisco ASA GW VID Oct 15 14:00:51 [IKEv1 DEBUG]: IP = 96.239.196.24, constructing NAT-Discovery payload Oct 15 14:00:51 [IKEv1 DEBUG]: IP = 96.239.196.24, computing NAT Discovery hash Oct 15 14:00:51 [IKEv1 DEBUG]: IP = 96.239.196.24, constructing NAT-Discovery payload Oct 15 14:00:51 [IKEv1 DEBUG]: IP = 96.239.196.24, computing NAT Discovery hash Oct 15 14:00:51 [IKEv1]: IP = 96.239.196.24, Connection landed on tunnel_group 96.239.196.24 Oct 15 14:00:51 [IKEv1 DEBUG]: Group = 96.239.196.24, IP = 96.239.196.24, Generating keys for Responder... Oct 15 14:00:51 [IKEv1]: IP = 96.239.196.24, IKE_DECODE SENDING Message (msgid=0) with payloads : HDR + KE (4) + NONCE (10) + VENDOR (13) + VENDOR (13) + VENDOR (13) + VENDOR (13) + NAT-D (130) + NAT-D (130) + NONE (0) total length : 304 Oct 15 14:00:51 [IKEv1]: IP = 96.239.196.24, IKE_DECODE RECEIVED Message (msgid=0) with payloads : HDR + ID (5) + HASH (8) + IOS KEEPALIVE (128) + VENDOR (13) + NONE (0) total length : 96 Oct 15 14:00:51 [IKEv1 DEBUG]: Group = 96.239.196.24, IP = 96.239.196.24, processing ID payload Oct 15 14:00:51 [IKEv1 DECODE]: Group = 96.239.196.24, IP = 96.239.196.24, ID_IPV4_ADDR ID received 96.239.196.24 Oct 15 14:00:51 [IKEv1 DEBUG]: Group = 96.239.196.24, IP = 96.239.196.24, processing hash payload Oct 15 14:00:51 [IKEv1 DEBUG]: Group = 96.239.196.24, IP = 96.239.196.24, Computing hash for ISAKMP Oct 15 14:00:51 [IKEv1 DEBUG]: IP = 96.239.196.24, Processing IOS keep alive payload: proposal=32767/32767 sec. Oct 15 14:00:51 [IKEv1 DEBUG]: Group = 96.239.196.24, IP = 96.239.196.24, processing VID payload Oct 15 14:00:51 [IKEv1 DEBUG]: Group = 96.239.196.24, IP = 96.239.196.24, Received DPD VID Oct 15 14:00:51 [IKEv1]: Group = 96.239.196.24, IP = 96.239.196.24, Automatic NAT Detection Status: Remote end is NOT behind a NAT device This end is NOT behind a NAT device Oct 15 14:00:51 [IKEv1]: IP = 96.239.196.24, Connection landed on tunnel_group 96.239.196.24 Oct 15 14:00:51 [IKEv1]: Group = 96.239.196.24, IP = 96.239.196.24, Freeing previously allocated memory for authorization-dn-attributes Oct 15 14:00:51 [IKEv1 DEBUG]: Group = 96.239.196.24, IP = 96.239.196.24, constructing ID payload Oct 15 14:00:51 [IKEv1 DEBUG]: Group = 96.239.196.24, IP = 96.239.196.24, constructing hash payload Oct 15 14:00:51 [IKEv1 DEBUG]: Group = 96.239.196.24, IP = 96.239.196.24, Computing hash for ISAKMP Oct 15 14:00:51 [IKEv1 DEBUG]: IP = 96.239.196.24, Constructing IOS keep alive payload: proposal=32767/32767 sec. Oct 15 14:00:51 [IKEv1 DEBUG]: Group = 96.239.196.24, IP = 96.239.196.24, constructing dpd vid payload Oct 15 14:00:51 [IKEv1]: IP = 96.239.196.24, IKE_DECODE SENDING Message (msgid=0) with payloads : HDR + ID (5) + HASH (8) + IOS KEEPALIVE (128) + VENDOR (13) + NONE (0) total length : 96 Oct 15 14:00:51 [IKEv1]: Group = 96.239.196.24, IP = 96.239.196.24, PHASE 1 COMPLETED Oct 15 14:00:51 [IKEv1]: IP = 96.239.196.24, Keep-alive type for this connection: DPD Oct 15 14:00:51 [IKEv1 DEBUG]: Group = 96.239.196.24, IP = 96.239.196.24, Starting P1 rekey timer: 73440 seconds. Oct 15 14:00:52 [IKEv1 DECODE]: IP = 96.239.196.24, IKE Responder starting QM: msg id = 3e704059 Oct 15 14:00:52 [IKEv1]: IP = 96.239.196.24, IKE_DECODE RECEIVED Message (msgid=3e704059) with payloads : HDR + HASH (8) + SA (1) + NONCE (10) + ID (5) + ID (5) + NOTIFY (11) + NONE (0) total length : 196 Oct 15 14:00:52 [IKEv1 DEBUG]: Group = 96.239.196.24, IP = 96.239.196.24, processing hash payload Oct 15 14:00:52 [IKEv1 DEBUG]: Group = 96.239.196.24, IP = 96.239.196.24, processing SA payload Oct 15 14:00:52 [IKEv1 DEBUG]: Group = 96.239.196.24, IP = 96.239.196.24, processing nonce payload Oct 15 14:00:52 [IKEv1 DEBUG]: Group = 96.239.196.24, IP = 96.239.196.24, processing ID payload Oct 15 14:00:52 [IKEv1 DECODE]: Group = 96.239.196.24, IP = 96.239.196.24, ID_IPV4_ADDR_SUBNET ID received--0.0.0.0--0.0.0.0 Oct 15 14:00:52 [IKEv1]: Group = 96.239.196.24, IP = 96.239.196.24, Received remote IP Proxy Subnet data in ID Payload: Address 0.0.0.0, Mask 0.0.0.0, Protocol 0, Port 0 Oct 15 14:00:52 [IKEv1 DEBUG]: Group = 96.239.196.24, IP = 96.239.196.24, processing ID payload Oct 15 14:00:52 [IKEv1 DECODE]: Group = 96.239.196.24, IP = 96.239.196.24, ID_IPV4_ADDR_SUBNET ID received--0.0.0.0--0.0.0.0 Oct 15 14:00:52 [IKEv1]: Group = 96.239.196.24, IP = 96.239.196.24, Received local IP Proxy Subnet data in ID Payload: Address 0.0.0.0, Mask 0.0.0.0, Protocol 0, Port 0 Oct 15 14:00:52 [IKEv1 DEBUG]: Group = 96.239.196.24, IP = 96.239.196.24, processing notify payload Oct 15 14:00:52 [IKEv1]: Group = 96.239.196.24, IP = 96.239.196.24, QM IsRekeyed old sa not found by addr Oct 15 14:00:52 [IKEv1]: Group = 96.239.196.24, IP = 96.239.196.24, Static Crypto Map check, checking map = outside_map, seq = 1... Oct 15 14:00:52 [IKEv1]: Group = 96.239.196.24, IP = 96.239.196.24, Static Crypto Map check, map = outside_map, seq = 1, ACL does not match proxy IDs src:0.0.0.0 dst:0.0.0.0 Oct 15 14:00:52 [IKEv1]: Group = 96.239.196.24, IP = 96.239.196.24, Static Crypto Map check, checking map = outside_map, seq = 20... Oct 15 14:00:52 [IKEv1]: Group = 96.239.196.24, IP = 96.239.196.24, Static Crypto Map check, map = outside_map, seq = 20, ACL does not match proxy IDs src:0.0.0.0 dst:0.0.0.0 Oct 15 14:00:52 [IKEv1]: Group = 96.239.196.24, IP = 96.239.196.24, Rejecting IPSec tunnel: no matching crypto map entry for remote proxy 0.0.0.0/0.0.0.0/0/0 local proxy 0.0.0.0/0.0.0.0/0/0 on interface outside Oct 15 14:00:52 [IKEv1 DEBUG]: Group = 96.239.196.24, IP = 96.239.196.24, sending notify message Oct 15 14:00:52 [IKEv1 DEBUG]: Group = 96.239.196.24, IP = 96.239.196.24, constructing blank hash payload Oct 15 14:00:52 [IKEv1 DEBUG]: Group = 96.239.196.24, IP = 96.239.196.24, constructing qm hash payload Oct 15 14:00:52 [IKEv1]: IP = 96.239.196.24, IKE_DECODE SENDING Message (msgid=48e593d9) with payloads : HDR + HASH (8) + NOTIFY (11) + NONE (0) total length : 248 Oct 15 14:00:52 [IKEv1]: Group = 96.239.196.24, IP = 96.239.196.24, QM FSM error (P2 struct &0xd93b1e48, mess id 0x3e704059)! Oct 15 14:00:52 [IKEv1 DEBUG]: Group = 96.239.196.24, IP = 96.239.196.24, IKE QM Responder FSM error history (struct &0xd93b1e48) , : QM_DONE, EV_ERROR-->QM_BLD_MSG2, EV_NEGO_SA-->QM_BLD_MSG2, EV_IS_REKEY-->QM_BLD_MSG2, EV_CONFIRM_SA-->QM_BLD_MSG2, EV_PROC_MSG-->QM_BLD_MSG2, EV_HASH_OK-->QM_BLD_MSG2, NullEvent-->QM_BLD_MSG2, EV_COMP_HASH Oct 15 14:00:52 [IKEv1 DEBUG]: Group = 96.239.196.24, IP = 96.239.196.24, sending delete/delete with reason message Oct 15 14:00:52 [IKEv1]: Group = 96.239.196.24, IP = 96.239.196.24, Removing peer from correlator table failed, no match! Oct 15 14:00:52 [IKEv1 DEBUG]: Group = 96.239.196.24, IP = 96.239.196.24, IKE SA MM:d1612045 rcv'd Terminate: state MM_ACTIVE flags 0x0001c042, refcnt 1, tuncnt 0 Oct 15 14:00:52 [IKEv1 DEBUG]: Group = 96.239.196.24, IP = 96.239.196.24, IKE SA MM:d1612045 terminating: flags 0x0101c002, refcnt 0, tuncnt 0 Oct 15 14:00:52 [IKEv1 DEBUG]: Group = 96.239.196.24, IP = 96.239.196.24, sending delete/delete with reason message Oct 15 14:00:52 [IKEv1 DEBUG]: Group = 96.239.196.24, IP = 96.239.196.24, constructing blank hash payload Oct 15 14:00:52 [IKEv1 DEBUG]: Group = 96.239.196.24, IP = 96.239.196.24, constructing IKE delete payload Oct 15 14:00:52 [IKEv1 DEBUG]: Group = 96.239.196.24, IP = 96.239.196.24, constructing qm hash payload Oct 15 14:00:52 [IKEv1]: IP = 96.239.196.24, IKE_DECODE SENDING Message (msgid=103227b2) with payloads : HDR + HASH (8) + DELETE (12) + NONE (0) total length : 80 Oct 15 14:00:52 [IKEv1]: Ignoring msg to mark SA with dsID 1691648 dead because SA deleted Oct 15 14:01:55 [IKEv1]: IP = 96.239.196.24, IKE_DECODE RECEIVED Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + VENDOR (13) + VENDOR (13) + NONE (0) total length : 148 Oct 15 14:01:55 [IKEv1 DEBUG]: IP = 96.239.196.24, processing SA payload Oct 15 14:01:55 [IKEv1 DEBUG]: IP = 96.239.196.24, Oakley proposal is acceptable Oct 15 14:01:55 [IKEv1 DEBUG]: IP = 96.239.196.24, processing VID payload Oct 15 14:01:55 [IKEv1 DEBUG]: IP = 96.239.196.24, Received NAT-Traversal ver 02 VID Oct 15 14:01:55 [IKEv1 DEBUG]: IP = 96.239.196.24, processing VID payload Oct 15 14:01:55 [IKEv1 DEBUG]: IP = 96.239.196.24, Received NAT-Traversal ver 03 VID Oct 15 14:01:55 [IKEv1 DEBUG]: IP = 96.239.196.24, processing VID payload Oct 15 14:01:55 [IKEv1 DEBUG]: IP = 96.239.196.24, Received Fragmentation VID Oct 15 14:01:55 [IKEv1 DEBUG]: IP = 96.239.196.24, IKE Peer included IKE fragmentation capability flags: Main Mode: True Aggressive Mode: True Oct 15 14:01:55 [IKEv1 DEBUG]: IP = 96.239.196.24, processing IKE SA payload Oct 15 14:01:55 [IKEv1 DEBUG]: IP = 96.239.196.24, IKE SA Proposal # 1, Transform # 1 acceptable Matches global IKE entry # 2 Oct 15 14:01:55 [IKEv1 DEBUG]: IP = 96.239.196.24, constructing ISAKMP SA payload Oct 15 14:01:55 [IKEv1 DEBUG]: IP = 96.239.196.24, constructing NAT-Traversal VID ver 02 payload Oct 15 14:01:55 [IKEv1 DEBUG]: IP = 96.239.196.24, constructing Fragmentation VID + extended capabilities payload Oct 15 14:01:55 [IKEv1]: IP = 96.239.196.24, IKE_DECODE SENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + VENDOR (13) + NONE (0) total length : 128 Oct 15 14:01:55 [IKEv1]: IP = 96.239.196.24, IKE_DECODE RECEIVED Message (msgid=0) with payloads : HDR + KE (4) + NONCE (10) + VENDOR (13) + VENDOR (13) + VENDOR (13) + VENDOR (13) + NAT-D (130) + NAT-D (130) + NONE (0) total length : 304 Oct 15 14:01:55 [IKEv1 DEBUG]: IP = 96.239.196.24, processing ke payload Oct 15 14:01:55 [IKEv1 DEBUG]: IP = 96.239.196.24, processing ISA_KE payload Oct 15 14:01:55 [IKEv1 DEBUG]: IP = 96.239.196.24, processing nonce payload Oct 15 14:01:55 [IKEv1 DEBUG]: IP = 96.239.196.24, processing VID payload Oct 15 14:01:55 [IKEv1 DEBUG]: IP = 96.239.196.24, Received Cisco Unity client VID Oct 15 14:01:55 [IKEv1 DEBUG]: IP = 96.239.196.24, processing VID payload Oct 15 14:01:55 [IKEv1 DEBUG]: IP = 96.239.196.24, Received xauth V6 VID Oct 15 14:01:55 [IKEv1 DEBUG]: IP = 96.239.196.24, processing VID payload Oct 15 14:01:55 [IKEv1 DEBUG]: IP = 96.239.196.24, Processing VPN3000/ASA spoofing IOS Vendor ID payload (version: 1.0.0, capabilities: 20000001) Oct 15 14:01:55 [IKEv1 DEBUG]: IP = 96.239.196.24, processing VID payload Oct 15 14:01:55 [IKEv1 DEBUG]: IP = 96.239.196.24, Received Altiga/Cisco VPN3000/Cisco ASA GW VID Oct 15 14:01:55 [IKEv1 DEBUG]: IP = 96.239.196.24, processing NAT-Discovery payload Oct 15 14:01:55 [IKEv1 DEBUG]: IP = 96.239.196.24, computing NAT Discovery hash Oct 15 14:01:55 [IKEv1 DEBUG]: IP = 96.239.196.24, processing NAT-Discovery payload Oct 15 14:01:55 [IKEv1 DEBUG]: IP = 96.239.196.24, computing NAT Discovery hash Oct 15 14:01:55 [IKEv1 DEBUG]: IP = 96.239.196.24, constructing ke payload Oct 15 14:01:55 [IKEv1 DEBUG]: IP = 96.239.196.24, constructing nonce payload Oct 15 14:01:55 [IKEv1 DEBUG]: IP = 96.239.196.24, constructing Cisco Unity VID payload Oct 15 14:01:55 [IKEv1 DEBUG]: IP = 96.239.196.24, constructing xauth V6 VID payload Oct 15 14:01:55 [IKEv1 DEBUG]: IP = 96.239.196.24, Send IOS VID Oct 15 14:01:55 [IKEv1 DEBUG]: IP = 96.239.196.24, Constructing ASA spoofing IOS Vendor ID payload (version: 1.0.0, capabilities: 20000001) Oct 15 14:01:55 [IKEv1 DEBUG]: IP = 96.239.196.24, constructing VID payload Oct 15 14:01:55 [IKEv1 DEBUG]: IP = 96.239.196.24, Send Altiga/Cisco VPN3000/Cisco ASA GW VID Oct 15 14:01:55 [IKEv1 DEBUG]: IP = 96.239.196.24, constructing NAT-Discovery payload Oct 15 14:01:55 [IKEv1 DEBUG]: IP = 96.239.196.24, computing NAT Discovery hash Oct 15 14:01:55 [IKEv1 DEBUG]: IP = 96.239.196.24, constructing NAT-Discovery payload Oct 15 14:01:55 [IKEv1 DEBUG]: IP = 96.239.196.24, computing NAT Discovery hash Oct 15 14:01:55 [IKEv1]: IP = 96.239.196.24, Connection landed on tunnel_group 96.239.196.24 Oct 15 14:01:55 [IKEv1 DEBUG]: Group = 96.239.196.24, IP = 96.239.196.24, Generating keys for Responder... Oct 15 14:01:55 [IKEv1]: IP = 96.239.196.24, IKE_DECODE SENDING Message (msgid=0) with payloads : HDR + KE (4) + NONCE (10) + VENDOR (13) + VENDOR (13) + VENDOR (13) + VENDOR (13) + NAT-D (130) + NAT-D (130) + NONE (0) total length : 304 Oct 15 14:01:56 [IKEv1]: IP = 96.239.196.24, IKE_DECODE RECEIVED Message (msgid=0) with payloads : HDR + ID (5) + HASH (8) + IOS KEEPALIVE (128) + VENDOR (13) + NONE (0) total length : 96 Oct 15 14:01:56 [IKEv1 DEBUG]: Group = 96.239.196.24, IP = 96.239.196.24, processing ID payload Oct 15 14:01:56 [IKEv1 DECODE]: Group = 96.239.196.24, IP = 96.239.196.24, ID_IPV4_ADDR ID received 96.239.196.24 Oct 15 14:01:56 [IKEv1 DEBUG]: Group = 96.239.196.24, IP = 96.239.196.24, processing hash payload Oct 15 14:01:56 [IKEv1 DEBUG]: Group = 96.239.196.24, IP = 96.239.196.24, Computing hash for ISAKMP Oct 15 14:01:56 [IKEv1 DEBUG]: IP = 96.239.196.24, Processing IOS keep alive payload: proposal=32767/32767 sec. Oct 15 14:01:56 [IKEv1 DEBUG]: Group = 96.239.196.24, IP = 96.239.196.24, processing VID payload Oct 15 14:01:56 [IKEv1 DEBUG]: Group = 96.239.196.24, IP = 96.239.196.24, Received DPD VID Oct 15 14:01:56 [IKEv1]: Group = 96.239.196.24, IP = 96.239.196.24, Automatic NAT Detection Status: Remote end is NOT behind a NAT device This end is NOT behind a NAT device Oct 15 14:01:56 [IKEv1]: IP = 96.239.196.24, Connection landed on tunnel_group 96.239.196.24 Oct 15 14:01:56 [IKEv1]: Group = 96.239.196.24, IP = 96.239.196.24, Freeing previously allocated memory for authorization-dn-attributes Oct 15 14:01:56 [IKEv1 DEBUG]: Group = 96.239.196.24, IP = 96.239.196.24, constructing ID payload Oct 15 14:01:56 [IKEv1 DEBUG]: Group = 96.239.196.24, IP = 96.239.196.24, constructing hash payload Oct 15 14:01:56 [IKEv1 DEBUG]: Group = 96.239.196.24, IP = 96.239.196.24, Computing hash for ISAKMP Oct 15 14:01:56 [IKEv1 DEBUG]: IP = 96.239.196.24, Constructing IOS keep alive payload: proposal=32767/32767 sec. Oct 15 14:01:56 [IKEv1 DEBUG]: Group = 96.239.196.24, IP = 96.239.196.24, constructing dpd vid payload Oct 15 14:01:56 [IKEv1]: IP = 96.239.196.24, IKE_DECODE SENDING Message (msgid=0) with payloads : HDR + ID (5) + HASH (8) + IOS KEEPALIVE (128) + VENDOR (13) + NONE (0) total length : 96 Oct 15 14:01:56 [IKEv1]: Group = 96.239.196.24, IP = 96.239.196.24, PHASE 1 COMPLETED Oct 15 14:01:56 [IKEv1]: IP = 96.239.196.24, Keep-alive type for this connection: DPD Oct 15 14:01:56 [IKEv1 DEBUG]: Group = 96.239.196.24, IP = 96.239.196.24, Starting P1 rekey timer: 73440 seconds. Oct 15 14:01:56 [IKEv1 DECODE]: IP = 96.239.196.24, IKE Responder starting QM: msg id = 5ecb8673 Oct 15 14:01:56 [IKEv1]: IP = 96.239.196.24, IKE_DECODE RECEIVED Message (msgid=5ecb8673) with payloads : HDR + HASH (8) + SA (1) + NONCE (10) + ID (5) + ID (5) + NOTIFY (11) + NONE (0) total length : 196 Oct 15 14:01:56 [IKEv1 DEBUG]: Group = 96.239.196.24, IP = 96.239.196.24, processing hash payload Oct 15 14:01:56 [IKEv1 DEBUG]: Group = 96.239.196.24, IP = 96.239.196.24, processing SA payload Oct 15 14:01:56 [IKEv1 DEBUG]: Group = 96.239.196.24, IP = 96.239.196.24, processing nonce payload Oct 15 14:01:56 [IKEv1 DEBUG]: Group = 96.239.196.24, IP = 96.239.196.24, processing ID payload Oct 15 14:01:56 [IKEv1 DECODE]: Group = 96.239.196.24, IP = 96.239.196.24, ID_IPV4_ADDR_SUBNET ID received--0.0.0.0--0.0.0.0 Oct 15 14:01:56 [IKEv1]: Group = 96.239.196.24, IP = 96.239.196.24, Received remote IP Proxy Subnet data in ID Payload: Address 0.0.0.0, Mask 0.0.0.0, Protocol 0, Port 0 Oct 15 14:01:56 [IKEv1 DEBUG]: Group = 96.239.196.24, IP = 96.239.196.24, processing ID payload Oct 15 14:01:56 [IKEv1 DECODE]: Group = 96.239.196.24, IP = 96.239.196.24, ID_IPV4_ADDR_SUBNET ID received--0.0.0.0--0.0.0.0 Oct 15 14:01:56 [IKEv1]: Group = 96.239.196.24, IP = 96.239.196.24, Received local IP Proxy Subnet data in ID Payload: Address 0.0.0.0, Mask 0.0.0.0, Protocol 0, Port 0 Oct 15 14:01:56 [IKEv1 DEBUG]: Group = 96.239.196.24, IP = 96.239.196.24, processing notify payload Oct 15 14:01:56 [IKEv1]: Group = 96.239.196.24, IP = 96.239.196.24, QM IsRekeyed old sa not found by addr Oct 15 14:01:56 [IKEv1]: Group = 96.239.196.24, IP = 96.239.196.24, Static Crypto Map check, checking map = outside_map, seq = 1... Oct 15 14:01:56 [IKEv1]: Group = 96.239.196.24, IP = 96.239.196.24, Static Crypto Map check, map = outside_map, seq = 1, ACL does not match proxy IDs src:0.0.0.0 dst:0.0.0.0 Oct 15 14:01:56 [IKEv1]: Group = 96.239.196.24, IP = 96.239.196.24, Static Crypto Map check, checking map = outside_map, seq = 20... Oct 15 14:01:56 [IKEv1]: Group = 96.239.196.24, IP = 96.239.196.24, Static Crypto Map check, map = outside_map, seq = 20, ACL does not match proxy IDs src:0.0.0.0 dst:0.0.0.0 Oct 15 14:01:56 [IKEv1]: Group = 96.239.196.24, IP = 96.239.196.24, Rejecting IPSec tunnel: no matching crypto map entry for remote proxy 0.0.0.0/0.0.0.0/0/0 local proxy 0.0.0.0/0.0.0.0/0/0 on interface outside Oct 15 14:01:56 [IKEv1 DEBUG]: Group = 96.239.196.24, IP = 96.239.196.24, sending notify message Oct 15 14:01:56 [IKEv1 DEBUG]: Group = 96.239.196.24, IP = 96.239.196.24, constructing blank hash payload Oct 15 14:01:56 [IKEv1 DEBUG]: Group = 96.239.196.24, IP = 96.239.196.24, constructing qm hash payload Oct 15 14:01:56 [IKEv1]: IP = 96.239.196.24, IKE_DECODE SENDING Message (msgid=74c55dc3) with payloads : HDR + HASH (8) + NOTIFY (11) + NONE (0) total length : 248 Oct 15 14:01:56 [IKEv1]: Group = 96.239.196.24, IP = 96.239.196.24, QM FSM error (P2 struct &0xd925f980, mess id 0x5ecb8673)! Oct 15 14:01:56 [IKEv1 DEBUG]: Group = 96.239.196.24, IP = 96.239.196.24, IKE QM Responder FSM error history (struct &0xd925f980) , : QM_DONE, EV_ERROR-->QM_BLD_MSG2, EV_NEGO_SA-->QM_BLD_MSG2, EV_IS_REKEY-->QM_BLD_MSG2, EV_CONFIRM_SA-->QM_BLD_MSG2, EV_PROC_MSG-->QM_BLD_MSG2, EV_HASH_OK-->QM_BLD_MSG2, NullEvent-->QM_BLD_MSG2, EV_COMP_HASH Oct 15 14:01:56 [IKEv1 DEBUG]: Group = 96.239.196.24, IP = 96.239.196.24, sending delete/delete with reason message Oct 15 14:01:56 [IKEv1]: Group = 96.239.196.24, IP = 96.239.196.24, Removing peer from correlator table failed, no match! Oct 15 14:01:56 [IKEv1 DEBUG]: Group = 96.239.196.24, IP = 96.239.196.24, IKE SA MM:c5413933 rcv'd Terminate: state MM_ACTIVE flags 0x0001c042, refcnt 1, tuncnt 0 Oct 15 14:01:56 [IKEv1 DEBUG]: Group = 96.239.196.24, IP = 96.239.196.24, IKE SA MM:c5413933 terminating: flags 0x0101c002, refcnt 0, tuncnt 0 Oct 15 14:01:56 [IKEv1 DEBUG]: Group = 96.239.196.24, IP = 96.239.196.24, sending delete/delete with reason message Oct 15 14:01:56 [IKEv1 DEBUG]: Group = 96.239.196.24, IP = 96.239.196.24, constructing blank hash payload Oct 15 14:01:56 [IKEv1 DEBUG]: Group = 96.239.196.24, IP = 96.239.196.24, constructing IKE delete payload Oct 15 14:01:56 [IKEv1 DEBUG]: Group = 96.239.196.24, IP = 96.239.196.24, constructing qm hash payload Oct 15 14:01:56 [IKEv1]: IP = 96.239.196.24, IKE_DECODE SENDING Message (msgid=d31fad3a) with payloads : HDR + HASH (8) + DELETE (12) + NONE (0) total length : 80 Oct 15 14:01:56 [IKEv1]: Ignoring msg to mark SA with dsID 1695744 dead because SA deleted Oct 15 14:02:59 [IKEv1]: IP = 96.239.196.24, IKE_DECODE RECEIVED Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + VENDOR (13) + VENDOR (13) + NONE (0) total length : 148 Oct 15 14:02:59 [IKEv1 DEBUG]: IP = 96.239.196.24, processing SA payload Oct 15 14:02:59 [IKEv1 DEBUG]: IP = 96.239.196.24, Oakley proposal is acceptable Oct 15 14:02:59 [IKEv1 DEBUG]: IP = 96.239.196.24, processing VID payload Oct 15 14:02:59 [IKEv1 DEBUG]: IP = 96.239.196.24, Received NAT-Traversal ver 02 VID Oct 15 14:02:59 [IKEv1 DEBUG]: IP = 96.239.196.24, processing VID payload Oct 15 14:02:59 [IKEv1 DEBUG]: IP = 96.239.196.24, Received NAT-Traversal ver 03 VID Oct 15 14:02:59 [IKEv1 DEBUG]: IP = 96.239.196.24, processing VID payload Oct 15 14:02:59 [IKEv1 DEBUG]: IP = 96.239.196.24, Received Fragmentation VID Oct 15 14:02:59 [IKEv1 DEBUG]: IP = 96.239.196.24, IKE Peer included IKE fragmentation capability flags: Main Mode: True Aggressive Mode: True Oct 15 14:02:59 [IKEv1 DEBUG]: IP = 96.239.196.24, processing IKE SA payload Oct 15 14:02:59 [IKEv1 DEBUG]: IP = 96.239.196.24, IKE SA Proposal # 1, Transform # 1 acceptable Matches global IKE entry # 2 Oct 15 14:02:59 [IKEv1 DEBUG]: IP = 96.239.196.24, constructing ISAKMP SA payload Oct 15 14:02:59 [IKEv1 DEBUG]: IP = 96.239.196.24, constructing NAT-Traversal VID ver 02 payload Oct 15 14:02:59 [IKEv1 DEBUG]: IP = 96.239.196.24, constructing Fragmentation VID + extended capabilities payload Oct 15 14:02:59 [IKEv1]: IP = 96.239.196.24, IKE_DECODE SENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + VENDOR (13) + NONE (0) total length : 128 Oct 15 14:02:59 [IKEv1]: IP = 96.239.196.24, IKE_DECODE RECEIVED Message (msgid=0) with payloads : HDR + KE (4) + NONCE (10) + VENDOR (13) + VENDOR (13) + VENDOR (13) + VENDOR (13) + NAT-D (130) + NAT-D (130) + NONE (0) total length : 304 Oct 15 14:02:59 [IKEv1 DEBUG]: IP = 96.239.196.24, processing ke payload Oct 15 14:02:59 [IKEv1 DEBUG]: IP = 96.239.196.24, processing ISA_KE payload Oct 15 14:02:59 [IKEv1 DEBUG]: IP = 96.239.196.24, processing nonce payload Oct 15 14:02:59 [IKEv1 DEBUG]: IP = 96.239.196.24, processing VID payload Oct 15 14:02:59 [IKEv1 DEBUG]: IP = 96.239.196.24, Received Cisco Unity client VID Oct 15 14:02:59 [IKEv1 DEBUG]: IP = 96.239.196.24, processing VID payload Oct 15 14:02:59 [IKEv1 DEBUG]: IP = 96.239.196.24, Received xauth V6 VID Oct 15 14:02:59 [IKEv1 DEBUG]: IP = 96.239.196.24, processing VID payload Oct 15 14:02:59 [IKEv1 DEBUG]: IP = 96.239.196.24, Processing VPN3000/ASA spoofing IOS Vendor ID payload (version: 1.0.0, capabilities: 20000001) Oct 15 14:02:59 [IKEv1 DEBUG]: IP = 96.239.196.24, processing VID payload Oct 15 14:02:59 [IKEv1 DEBUG]: IP = 96.239.196.24, Received Altiga/Cisco VPN3000/Cisco ASA GW VID Oct 15 14:02:59 [IKEv1 DEBUG]: IP = 96.239.196.24, processing NAT-Discovery payload Oct 15 14:02:59 [IKEv1 DEBUG]: IP = 96.239.196.24, computing NAT Discovery hash Oct 15 14:02:59 [IKEv1 DEBUG]: IP = 96.239.196.24, processing NAT-Discovery payload Oct 15 14:02:59 [IKEv1 DEBUG]: IP = 96.239.196.24, computing NAT Discovery hash Oct 15 14:02:59 [IKEv1 DEBUG]: IP = 96.239.196.24, constructing ke payload Oct 15 14:02:59 [IKEv1 DEBUG]: IP = 96.239.196.24, constructing nonce payload Oct 15 14:02:59 [IKEv1 DEBUG]: IP = 96.239.196.24, constructing Cisco Unity VID payload Oct 15 14:02:59 [IKEv1 DEBUG]: IP = 96.239.196.24, constructing xauth V6 VID payload Oct 15 14:02:59 [IKEv1 DEBUG]: IP = 96.239.196.24, Send IOS VID Oct 15 14:02:59 [IKEv1 DEBUG]: IP = 96.239.196.24, Constructing ASA spoofing IOS Vendor ID payload (version: 1.0.0, capabilities: 20000001) Oct 15 14:02:59 [IKEv1 DEBUG]: IP = 96.239.196.24, constructing VID payload Oct 15 14:02:59 [IKEv1 DEBUG]: IP = 96.239.196.24, Send Altiga/Cisco VPN3000/Cisco ASA GW VID Oct 15 14:02:59 [IKEv1 DEBUG]: IP = 96.239.196.24, constructing NAT-Discovery payload Oct 15 14:02:59 [IKEv1 DEBUG]: IP = 96.239.196.24, computing NAT Discovery hash Oct 15 14:02:59 [IKEv1 DEBUG]: IP = 96.239.196.24, constructing NAT-Discovery payload Oct 15 14:02:59 [IKEv1 DEBUG]: IP = 96.239.196.24, computing NAT Discovery hash Oct 15 14:02:59 [IKEv1]: IP = 96.239.196.24, Connection landed on tunnel_group 96.239.196.24 Oct 15 14:02:59 [IKEv1 DEBUG]: Group = 96.239.196.24, IP = 96.239.196.24, Generating keys for Responder... Oct 15 14:02:59 [IKEv1]: IP = 96.239.196.24, IKE_DECODE SENDING Message (msgid=0) with payloads : HDR + KE (4) + NONCE (10) + VENDOR (13) + VENDOR (13) + VENDOR (13) + VENDOR (13) + NAT-D (130) + NAT-D (130) + NONE (0) total length : 304 Oct 15 14:03:00 [IKEv1]: IP = 96.239.196.24, IKE_DECODE RECEIVED Message (msgid=0) with payloads : HDR + ID (5) + HASH (8) + IOS KEEPALIVE (128) + VENDOR (13) + NONE (0) total length : 96 Oct 15 14:03:00 [IKEv1 DEBUG]: Group = 96.239.196.24, IP = 96.239.196.24, processing ID payload Oct 15 14:03:00 [IKEv1 DECODE]: Group = 96.239.196.24, IP = 96.239.196.24, ID_IPV4_ADDR ID received 96.239.196.24 Oct 15 14:03:00 [IKEv1 DEBUG]: Group = 96.239.196.24, IP = 96.239.196.24, processing hash payload Oct 15 14:03:00 [IKEv1 DEBUG]: Group = 96.239.196.24, IP = 96.239.196.24, Computing hash for ISAKMP Oct 15 14:03:00 [IKEv1 DEBUG]: IP = 96.239.196.24, Processing IOS keep alive payload: proposal=32767/32767 sec. Oct 15 14:03:00 [IKEv1 DEBUG]: Group = 96.239.196.24, IP = 96.239.196.24, processing VID payload Oct 15 14:03:00 [IKEv1 DEBUG]: Group = 96.239.196.24, IP = 96.239.196.24, Received DPD VID Oct 15 14:03:00 [IKEv1]: Group = 96.239.196.24, IP = 96.239.196.24, Automatic NAT Detection Status: Remote end is NOT behind a NAT device This end is NOT behind a NAT device Oct 15 14:03:00 [IKEv1]: IP = 96.239.196.24, Connection landed on tunnel_group 96.239.196.24 Oct 15 14:03:00 [IKEv1]: Group = 96.239.196.24, IP = 96.239.196.24, Freeing previously allocated memory for authorization-dn-attributes Oct 15 14:03:00 [IKEv1 DEBUG]: Group = 96.239.196.24, IP = 96.239.196.24, constructing ID payload Oct 15 14:03:00 [IKEv1 DEBUG]: Group = 96.239.196.24, IP = 96.239.196.24, constructing hash payload Oct 15 14:03:00 [IKEv1 DEBUG]: Group = 96.239.196.24, IP = 96.239.196.24, Computing hash for ISAKMP Oct 15 14:03:00 [IKEv1 DEBUG]: IP = 96.239.196.24, Constructing IOS keep alive payload: proposal=32767/32767 sec. Oct 15 14:03:00 [IKEv1 DEBUG]: Group = 96.239.196.24, IP = 96.239.196.24, constructing dpd vid payload Oct 15 14:03:00 [IKEv1]: IP = 96.239.196.24, IKE_DECODE SENDING Message (msgid=0) with payloads : HDR + ID (5) + HASH (8) + IOS KEEPALIVE (128) + VENDOR (13) + NONE (0) total length : 96 Oct 15 14:03:00 [IKEv1]: Group = 96.239.196.24, IP = 96.239.196.24, PHASE 1 COMPLETED Oct 15 14:03:00 [IKEv1]: IP = 96.239.196.24, Keep-alive type for this connection: DPD Oct 15 14:03:00 [IKEv1 DEBUG]: Group = 96.239.196.24, IP = 96.239.196.24, Starting P1 rekey timer: 73440 seconds. Oct 15 14:03:00 [IKEv1 DECODE]: IP = 96.239.196.24, IKE Responder starting QM: msg id = 238d839d Oct 15 14:03:00 [IKEv1]: IP = 96.239.196.24, IKE_DECODE RECEIVED Message (msgid=238d839d) with payloads : HDR + HASH (8) + SA (1) + NONCE (10) + ID (5) + ID (5) + NOTIFY (11) + NONE (0) total length : 196 Oct 15 14:03:00 [IKEv1 DEBUG]: Group = 96.239.196.24, IP = 96.239.196.24, processing hash payload Oct 15 14:03:00 [IKEv1 DEBUG]: Group = 96.239.196.24, IP = 96.239.196.24, processing SA payload Oct 15 14:03:00 [IKEv1 DEBUG]: Group = 96.239.196.24, IP = 96.239.196.24, processing nonce payload Oct 15 14:03:00 [IKEv1 DEBUG]: Group = 96.239.196.24, IP = 96.239.196.24, processing ID payload Oct 15 14:03:00 [IKEv1 DECODE]: Group = 96.239.196.24, IP = 96.239.196.24, ID_IPV4_ADDR_SUBNET ID received--0.0.0.0--0.0.0.0 Oct 15 14:03:00 [IKEv1]: Group = 96.239.196.24, IP = 96.239.196.24, Received remote IP Proxy Subnet data in ID Payload: Address 0.0.0.0, Mask 0.0.0.0, Protocol 0, Port 0 Oct 15 14:03:00 [IKEv1 DEBUG]: Group = 96.239.196.24, IP = 96.239.196.24, processing ID payload Oct 15 14:03:00 [IKEv1 DECODE]: Group = 96.239.196.24, IP = 96.239.196.24, ID_IPV4_ADDR_SUBNET ID received--0.0.0.0--0.0.0.0 Oct 15 14:03:00 [IKEv1]: Group = 96.239.196.24, IP = 96.239.196.24, Received local IP Proxy Subnet data in ID Payload: Address 0.0.0.0, Mask 0.0.0.0, Protocol 0, Port 0 Oct 15 14:03:00 [IKEv1 DEBUG]: Group = 96.239.196.24, IP = 96.239.196.24, processing notify payload Oct 15 14:03:00 [IKEv1]: Group = 96.239.196.24, IP = 96.239.196.24, QM IsRekeyed old sa not found by addr Oct 15 14:03:00 [IKEv1]: Group = 96.239.196.24, IP = 96.239.196.24, Static Crypto Map check, checking map = outside_map, seq = 1... Oct 15 14:03:00 [IKEv1]: Group = 96.239.196.24, IP = 96.239.196.24, Static Crypto Map check, map = outside_map, seq = 1, ACL does not match proxy IDs src:0.0.0.0 dst:0.0.0.0 Oct 15 14:03:00 [IKEv1]: Group = 96.239.196.24, IP = 96.239.196.24, Static Crypto Map check, checking map = outside_map, seq = 20... Oct 15 14:03:00 [IKEv1]: Group = 96.239.196.24, IP = 96.239.196.24, Static Crypto Map check, map = outside_map, seq = 20, ACL does not match proxy IDs src:0.0.0.0 dst:0.0.0.0 Oct 15 14:03:00 [IKEv1]: Group = 96.239.196.24, IP = 96.239.196.24, Rejecting IPSec tunnel: no matching crypto map entry for remote proxy 0.0.0.0/0.0.0.0/0/0 local proxy 0.0.0.0/0.0.0.0/0/0 on interface outside Oct 15 14:03:00 [IKEv1 DEBUG]: Group = 96.239.196.24, IP = 96.239.196.24, sending notify message Oct 15 14:03:00 [IKEv1 DEBUG]: Group = 96.239.196.24, IP = 96.239.196.24, constructing blank hash payload Oct 15 14:03:00 [IKEv1 DEBUG]: Group = 96.239.196.24, IP = 96.239.196.24, constructing qm hash payload Oct 15 14:03:00 [IKEv1]: IP = 96.239.196.24, IKE_DECODE SENDING Message (msgid=1bb373) with payloads : HDR + HASH (8) + NOTIFY (11) + NONE (0) total length : 248 Oct 15 14:03:00 [IKEv1]: Group = 96.239.196.24, IP = 96.239.196.24, QM FSM error (P2 struct &0xd914ae38, mess id 0x238d839d)! Oct 15 14:03:00 [IKEv1 DEBUG]: Group = 96.239.196.24, IP = 96.239.196.24, IKE QM Responder FSM error history (struct &0xd914ae38) , : QM_DONE, EV_ERROR-->QM_BLD_MSG2, EV_NEGO_SA-->QM_BLD_MSG2, EV_IS_REKEY-->QM_BLD_MSG2, EV_CONFIRM_SA-->QM_BLD_MSG2, EV_PROC_MSG-->QM_BLD_MSG2, EV_HASH_OK-->QM_BLD_MSG2, NullEvent-->QM_BLD_MSG2, EV_COMP_HASH Oct 15 14:03:00 [IKEv1 DEBUG]: Group = 96.239.196.24, IP = 96.239.196.24, sending delete/delete with reason message Oct 15 14:03:00 [IKEv1]: Group = 96.239.196.24, IP = 96.239.196.24, Removing peer from correlator table failed, no match! Oct 15 14:03:00 [IKEv1 DEBUG]: Group = 96.239.196.24, IP = 96.239.196.24, IKE SA MM:9834771b rcv'd Terminate: state MM_ACTIVE flags 0x0001c042, refcnt 1, tuncnt 0 Oct 15 14:03:00 [IKEv1 DEBUG]: Group = 96.239.196.24, IP = 96.239.196.24, IKE SA MM:9834771b terminating: flags 0x0101c002, refcnt 0, tuncnt 0 Oct 15 14:03:00 [IKEv1 DEBUG]: Group = 96.239.196.24, IP = 96.239.196.24, sending delete/delete with reason message Oct 15 14:03:00 [IKEv1 DEBUG]: Group = 96.239.196.24, IP = 96.239.196.24, constructing blank hash payload Oct 15 14:03:00 [IKEv1 DEBUG]: Group = 96.239.196.24, IP = 96.239.196.24, constructing IKE delete payload Oct 15 14:03:00 [IKEv1 DEBUG]: Group = 96.239.196.24, IP = 96.239.196.24, constructing qm hash payload Oct 15 14:03:00 [IKEv1]: IP = 96.239.196.24, IKE_DECODE SENDING Message (msgid=7acb363f) with payloads : HDR + HASH (8) + DELETE (12) + NONE (0) total length : 80 Oct 15 14:03:00 [IKEv1]: Ignoring msg to mark SA with dsID 1699840 dead because SA deleted Oct 15 14:04:03 [IKEv1]: IP = 96.239.196.24, IKE_DECODE RECEIVED Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + VENDOR (13) + VENDOR (13) + NONE (0) total length : 148 Oct 15 14:04:03 [IKEv1 DEBUG]: IP = 96.239.196.24, processing SA payload Oct 15 14:04:03 [IKEv1 DEBUG]: IP = 96.239.196.24, Oakley proposal is acceptable Oct 15 14:04:03 [IKEv1 DEBUG]: IP = 96.239.196.24, processing VID payload Oct 15 14:04:03 [IKEv1 DEBUG]: IP = 96.239.196.24, Received NAT-Traversal ver 02 VID Oct 15 14:04:03 [IKEv1 DEBUG]: IP = 96.239.196.24, processing VID payload Oct 15 14:04:03 [IKEv1 DEBUG]: IP = 96.239.196.24, Received NAT-Traversal ver 03 VID Oct 15 14:04:03 [IKEv1 DEBUG]: IP = 96.239.196.24, processing VID payload Oct 15 14:04:03 [IKEv1 DEBUG]: IP = 96.239.196.24, Received Fragmentation VID Oct 15 14:04:03 [IKEv1 DEBUG]: IP = 96.239.196.24, IKE Peer included IKE fragmentation capability flags: Main Mode: True Aggressive Mode: True Oct 15 14:04:03 [IKEv1 DEBUG]: IP = 96.239.196.24, processing IKE SA payload Oct 15 14:04:03 [IKEv1 DEBUG]: IP = 96.239.196.24, IKE SA Proposal # 1, Transform # 1 acceptable Matches global IKE entry # 2 Oct 15 14:04:03 [IKEv1 DEBUG]: IP = 96.239.196.24, constructing ISAKMP SA payload Oct 15 14:04:03 [IKEv1 DEBUG]: IP = 96.239.196.24, constructing NAT-Traversal VID ver 02 payload Oct 15 14:04:03 [IKEv1 DEBUG]: IP = 96.239.196.24, constructing Fragmentation VID + extended capabilities payload Oct 15 14:04:03 [IKEv1]: IP = 96.239.196.24, IKE_DECODE SENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + VENDOR (13) + NONE (0) total length : 128 Oct 15 14:04:04 [IKEv1]: IP = 96.239.196.24, IKE_DECODE RECEIVED Message (msgid=0) with payloads : HDR + KE (4) + NONCE (10) + VENDOR (13) + VENDOR (13) + VENDOR (13) + VENDOR (13) + NAT-D (130) + NAT-D (130) + NONE (0) total length : 304 Oct 15 14:04:04 [IKEv1 DEBUG]: IP = 96.239.196.24, processing ke payload Oct 15 14:04:04 [IKEv1 DEBUG]: IP = 96.239.196.24, processing ISA_KE payload Oct 15 14:04:04 [IKEv1 DEBUG]: IP = 96.239.196.24, processing nonce payload Oct 15 14:04:04 [IKEv1 DEBUG]: IP = 96.239.196.24, processing VID payload Oct 15 14:04:04 [IKEv1 DEBUG]: IP = 96.239.196.24, Received Cisco Unity client VID Oct 15 14:04:04 [IKEv1 DEBUG]: IP = 96.239.196.24, processing VID payload Oct 15 14:04:04 [IKEv1 DEBUG]: IP = 96.239.196.24, Received xauth V6 VID Oct 15 14:04:04 [IKEv1 DEBUG]: IP = 96.239.196.24, processing VID payload Oct 15 14:04:04 [IKEv1 DEBUG]: IP = 96.239.196.24, Processing VPN3000/ASA spoofing IOS Vendor ID payload (version: 1.0.0, capabilities: 20000001) Oct 15 14:04:04 [IKEv1 DEBUG]: IP = 96.239.196.24, processing VID payload Oct 15 14:04:04 [IKEv1 DEBUG]: IP = 96.239.196.24, Received Altiga/Cisco VPN3000/Cisco ASA GW VID Oct 15 14:04:04 [IKEv1 DEBUG]: IP = 96.239.196.24, processing NAT-Discovery payload Oct 15 14:04:04 [IKEv1 DEBUG]: IP = 96.239.196.24, computing NAT Discovery hash Oct 15 14:04:04 [IKEv1 DEBUG]: IP = 96.239.196.24, processing NAT-Discovery payload Oct 15 14:04:04 [IKEv1 DEBUG]: IP = 96.239.196.24, computing NAT Discovery hash Oct 15 14:04:04 [IKEv1 DEBUG]: IP = 96.239.196.24, constructing ke payload Oct 15 14:04:04 [IKEv1 DEBUG]: IP = 96.239.196.24, constructing nonce payload Oct 15 14:04:04 [IKEv1 DEBUG]: IP = 96.239.196.24, constructing Cisco Unity VID payload Oct 15 14:04:04 [IKEv1 DEBUG]: IP = 96.239.196.24, constructing xauth V6 VID payload Oct 15 14:04:04 [IKEv1 DEBUG]: IP = 96.239.196.24, Send IOS VID Oct 15 14:04:04 [IKEv1 DEBUG]: IP = 96.239.196.24, Constructing ASA spoofing IOS Vendor ID payload (version: 1.0.0, capabilities: 20000001) Oct 15 14:04:04 [IKEv1 DEBUG]: IP = 96.239.196.24, constructing VID payload Oct 15 14:04:04 [IKEv1 DEBUG]: IP = 96.239.196.24, Send Altiga/Cisco VPN3000/Cisco ASA GW VID Oct 15 14:04:04 [IKEv1 DEBUG]: IP = 96.239.196.24, constructing NAT-Discovery payload Oct 15 14:04:04 [IKEv1 DEBUG]: IP = 96.239.196.24, computing NAT Discovery hash Oct 15 14:04:04 [IKEv1 DEBUG]: IP = 96.239.196.24, constructing NAT-Discovery payload Oct 15 14:04:04 [IKEv1 DEBUG]: IP = 96.239.196.24, computing NAT Discovery hash Oct 15 14:04:04 [IKEv1]: IP = 96.239.196.24, Connection landed on tunnel_group 96.239.196.24 Oct 15 14:04:04 [IKEv1 DEBUG]: Group = 96.239.196.24, IP = 96.239.196.24, Generating keys for Responder... Oct 15 14:04:04 [IKEv1]: IP = 96.239.196.24, IKE_DECODE SENDING Message (msgid=0) with payloads : HDR + KE (4) + NONCE (10) + VENDOR (13) + VENDOR (13) + VENDOR (13) + VENDOR (13) + NAT-D (130) + NAT-D (130) + NONE (0) total length : 304 Oct 15 14:04:04 [IKEv1]: IP = 96.239.196.24, IKE_DECODE RECEIVED Message (msgid=0) with payloads : HDR + ID (5) + HASH (8) + IOS KEEPALIVE (128) + VENDOR (13) + NONE (0) total length : 96 Oct 15 14:04:04 [IKEv1 DEBUG]: Group = 96.239.196.24, IP = 96.239.196.24, processing ID payload Oct 15 14:04:04 [IKEv1 DECODE]: Group = 96.239.196.24, IP = 96.239.196.24, ID_IPV4_ADDR ID received 96.239.196.24 Oct 15 14:04:04 [IKEv1 DEBUG]: Group = 96.239.196.24, IP = 96.239.196.24, processing hash payload Oct 15 14:04:04 [IKEv1 DEBUG]: Group = 96.239.196.24, IP = 96.239.196.24, Computing hash for ISAKMP Oct 15 14:04:04 [IKEv1 DEBUG]: IP = 96.239.196.24, Processing IOS keep alive payload: proposal=32767/32767 sec. Oct 15 14:04:04 [IKEv1 DEBUG]: Group = 96.239.196.24, IP = 96.239.196.24, processing VID payload Oct 15 14:04:04 [IKEv1 DEBUG]: Group = 96.239.196.24, IP = 96.239.196.24, Received DPD VID Oct 15 14:04:04 [IKEv1]: Group = 96.239.196.24, IP = 96.239.196.24, Automatic NAT Detection Status: Remote end is NOT behind a NAT device This end is NOT behind a NAT device Oct 15 14:04:04 [IKEv1]: IP = 96.239.196.24, Connection landed on tunnel_group 96.239.196.24 Oct 15 14:04:04 [IKEv1]: Group = 96.239.196.24, IP = 96.239.196.24, Freeing previously allocated memory for authorization-dn-attributes Oct 15 14:04:04 [IKEv1 DEBUG]: Group = 96.239.196.24, IP = 96.239.196.24, constructing ID payload Oct 15 14:04:04 [IKEv1 DEBUG]: Group = 96.239.196.24, IP = 96.239.196.24, constructing hash payload Oct 15 14:04:04 [IKEv1 DEBUG]: Group = 96.239.196.24, IP = 96.239.196.24, Computing hash for ISAKMP Oct 15 14:04:04 [IKEv1 DEBUG]: IP = 96.239.196.24, Constructing IOS keep alive payload: proposal=32767/32767 sec. Oct 15 14:04:04 [IKEv1 DEBUG]: Group = 96.239.196.24, IP = 96.239.196.24, constructing dpd vid payload Oct 15 14:04:04 [IKEv1]: IP = 96.239.196.24, IKE_DECODE SENDING Message (msgid=0) with payloads : HDR + ID (5) + HASH (8) + IOS KEEPALIVE (128) + VENDOR (13) + NONE (0) total length : 96 Oct 15 14:04:04 [IKEv1]: Group = 96.239.196.24, IP = 96.239.196.24, PHASE 1 COMPLETED Oct 15 14:04:04 [IKEv1]: IP = 96.239.196.24, Keep-alive type for this connection: DPD Oct 15 14:04:04 [IKEv1 DEBUG]: Group = 96.239.196.24, IP = 96.239.196.24, Starting P1 rekey timer: 73440 seconds. Oct 15 14:04:04 [IKEv1 DECODE]: IP = 96.239.196.24, IKE Responder starting QM: msg id = 1998f140 Oct 15 14:04:04 [IKEv1]: IP = 96.239.196.24, IKE_DECODE RECEIVED Message (msgid=1998f140) with payloads : HDR + HASH (8) + SA (1) + NONCE (10) + ID (5) + ID (5) + NOTIFY (11) + NONE (0) total length : 196 Oct 15 14:04:04 [IKEv1 DEBUG]: Group = 96.239.196.24, IP = 96.239.196.24, processing hash payload Oct 15 14:04:04 [IKEv1 DEBUG]: Group = 96.239.196.24, IP = 96.239.196.24, processing SA payload Oct 15 14:04:04 [IKEv1 DEBUG]: Group = 96.239.196.24, IP = 96.239.196.24, processing nonce payload Oct 15 14:04:04 [IKEv1 DEBUG]: Group = 96.239.196.24, IP = 96.239.196.24, processing ID payload Oct 15 14:04:04 [IKEv1 DECODE]: Group = 96.239.196.24, IP = 96.239.196.24, ID_IPV4_ADDR_SUBNET ID received--0.0.0.0--0.0.0.0 Oct 15 14:04:04 [IKEv1]: Group = 96.239.196.24, IP = 96.239.196.24, Received remote IP Proxy Subnet data in ID Payload: Address 0.0.0.0, Mask 0.0.0.0, Protocol 0, Port 0 Oct 15 14:04:04 [IKEv1 DEBUG]: Group = 96.239.196.24, IP = 96.239.196.24, processing ID payload Oct 15 14:04:04 [IKEv1 DECODE]: Group = 96.239.196.24, IP = 96.239.196.24, ID_IPV4_ADDR_SUBNET ID received--0.0.0.0--0.0.0.0 Oct 15 14:04:04 [IKEv1]: Group = 96.239.196.24, IP = 96.239.196.24, Received local IP Proxy Subnet data in ID Payload: Address 0.0.0.0, Mask 0.0.0.0, Protocol 0, Port 0 Oct 15 14:04:04 [IKEv1 DEBUG]: Group = 96.239.196.24, IP = 96.239.196.24, processing notify payload Oct 15 14:04:04 [IKEv1]: Group = 96.239.196.24, IP = 96.239.196.24, QM IsRekeyed old sa not found by addr Oct 15 14:04:04 [IKEv1]: Group = 96.239.196.24, IP = 96.239.196.24, Static Crypto Map check, checking map = outside_map, seq = 1... Oct 15 14:04:04 [IKEv1]: Group = 96.239.196.24, IP = 96.239.196.24, Static Crypto Map check, map = outside_map, seq = 1, ACL does not match proxy IDs src:0.0.0.0 dst:0.0.0.0 Oct 15 14:04:04 [IKEv1]: Group = 96.239.196.24, IP = 96.239.196.24, Static Crypto Map check, checking map = outside_map, seq = 20... Oct 15 14:04:04 [IKEv1]: Group = 96.239.196.24, IP = 96.239.196.24, Static Crypto Map check, map = outside_map, seq = 20, ACL does not match proxy IDs src:0.0.0.0 dst:0.0.0.0 Oct 15 14:04:04 [IKEv1]: Group = 96.239.196.24, IP = 96.239.196.24, Rejecting IPSec tunnel: no matching crypto map entry for remote proxy 0.0.0.0/0.0.0.0/0/0 local proxy 0.0.0.0/0.0.0.0/0/0 on interface outside Oct 15 14:04:04 [IKEv1 DEBUG]: Group = 96.239.196.24, IP = 96.239.196.24, sending notify message Oct 15 14:04:04 [IKEv1 DEBUG]: Group = 96.239.196.24, IP = 96.239.196.24, constructing blank hash payload Oct 15 14:04:04 [IKEv1 DEBUG]: Group = 96.239.196.24, IP = 96.239.196.24, constructing qm hash payload Oct 15 14:04:04 [IKEv1]: IP = 96.239.196.24, IKE_DECODE SENDING Message (msgid=28a8c813) with payloads : HDR + HASH (8) + NOTIFY (11) + NONE (0) total length : 248 Oct 15 14:04:04 [IKEv1]: Group = 96.239.196.24, IP = 96.239.196.24, QM FSM error (P2 struct &0xd8e946f8, mess id 0x1998f140)! Oct 15 14:04:04 [IKEv1 DEBUG]: Group = 96.239.196.24, IP = 96.239.196.24, IKE QM Responder FSM error history (struct &0xd8e946f8) , : QM_DONE, EV_ERROR-->QM_BLD_MSG2, EV_NEGO_SA-->QM_BLD_MSG2, EV_IS_REKEY-->QM_BLD_MSG2, EV_CONFIRM_SA-->QM_BLD_MSG2, EV_PROC_MSG-->QM_BLD_MSG2, EV_HASH_OK-->QM_BLD_MSG2, NullEvent-->QM_BLD_MSG2, EV_COMP_HASH Oct 15 14:04:04 [IKEv1 DEBUG]: Group = 96.239.196.24, IP = 96.239.196.24, sending delete/delete with reason message Oct 15 14:04:04 [IKEv1]: Group = 96.239.196.24, IP = 96.239.196.24, Removing peer from correlator table failed, no match! Oct 15 14:04:04 [IKEv1 DEBUG]: Group = 96.239.196.24, IP = 96.239.196.24, IKE SA MM:062439c7 rcv'd Terminate: state MM_ACTIVE flags 0x0001c042, refcnt 1, tuncnt 0 Oct 15 14:04:04 [IKEv1 DEBUG]: Group = 96.239.196.24, IP = 96.239.196.24, IKE SA MM:062439c7 terminating: flags 0x0101c002, refcnt 0, tuncnt 0 Oct 15 14:04:04 [IKEv1 DEBUG]: Group = 96.239.196.24, IP = 96.239.196.24, sending delete/delete with reason message Oct 15 14:04:04 [IKEv1 DEBUG]: Group = 96.239.196.24, IP = 96.239.196.24, constructing blank hash payload Oct 15 14:04:04 [IKEv1 DEBUG]: Group = 96.239.196.24, IP = 96.239.196.24, constructing IKE delete payload Oct 15 14:04:04 [IKEv1 DEBUG]: Group = 96.239.196.24, IP = 96.239.196.24, constructing qm hash payload Oct 15 14:04:04 [IKEv1]: IP = 96.239.196.24, IKE_DECODE SENDING Message (msgid=aa10e4f7) with payloads : HDR + HASH (8) + DELETE (12) + NONE (0) total length : 80 Oct 15 14:04:04 [IKEv1]: Ignoring msg to mark SA with dsID 1703936 dead because SA deleted