=~=~=~=~=~=~=~=~=~=~=~= PuTTY log 2008.03.16 14:28:58 =~=~=~=~=~=~=~=~=~=~=~= debug cryopto isakmp Crypto ISAKMP debugging is on c877w# 002685: Mar 16 14:29:13.389 aest: ISAKMP (0:0): received packet from 121.219.144.177 dport 500 sport 500 Global (N) NEW SA 002686: Mar 16 14:29:13.389 aest: ISAKMP: Found a peer struct for 121.219.144.177, peer port 500 002687: Mar 16 14:29:13.389 aest: ISAKMP: Locking peer struct 0x843606D0, refcount 2 for crypto_isakmp_process_block 002688: Mar 16 14:29:13.389 aest: ISAKMP:(0):(Re)Setting client xauth list sdm_vpn_xauth_ml_1 and state 002689: Mar 16 14:29:13.389 aest: ISAKMP/xauth: initializing AAA request 002690: Mar 16 14:29:13.389 aest: ISAKMP: local port 500, remote port 500 002691: Mar 16 14:29:13.389 aest: ISAKMP: Find a dup sa in the avl tree during calling isadb_insert sa = 82F294C8 002692: Mar 16 14:29:13.389 aest: ISAKMP:(0):Input = IKE_MESG_FROM_PEER, IKE_MM_EXCH 002693: Mar 16 14:29:13.389 aest: ISAKMP:(0):Old State = IKE_READY New State = IKE_R_MM1 002694: Mar 16 14:29:13.389 aest: ISAKMP:(0): processing SA payload. message ID = 0 002695: Mar 16 14:29:13.389 aest: ISAKMP:(0): processing vendor id payload 002696: Mar 16 14:29:13.393 aest: ISAKMP:(0): vendor ID is DPD 002697: Mar 16 14:29:13.393 aest: ISAKMP:(0): processing vendor id payload 002698: Mar 16 14:29:13.393 aest: ISAKMP:(0): vendor ID seems Unity/DPD but major 69 mismatch 002699: Mar 16 14:29:13.393 aest: ISAKMP:(0): processing vendor id payload 002700: Mar 16 14:29:13.393 aest: ISAKMP:(0): vendor ID seems Unity/DPD but major 157 mismatch 002701: Mar 16 14:29:13.393 aest: ISAKMP:(0): vendor ID is NAT-T v3 002702: Mar 16 14:29:13.393 aest: ISAKMP:(0): processing vendor id payload 002703: Mar 16 14:29:13.393 aest: ISAKMP:(0): vendor ID seems Unity/DPD but major 123 mismatch 002704: Mar 16 14:29:13.393 aest: ISAKMP:(0): vendor ID is NAT-T v2 002705: Mar 16 14:29:13.393 aest: ISAKMP:(0): processing vendor id payload 002706: Mar 16 14:29:13.393 aest: ISAKMP:(0): vendor ID seems Unity/DPD but major 164 mismatch 002707: Mar 16 14:29:13.393 aest: ISAKMP:(0): processing vendor id payload 002708: Mar 16 14:29:13.393 aest: ISAKMP:(0): vendor ID seems Unity/DPD but major 221 mismatch 002709: Mar 16 14:29:13.393 aest: ISAKMP:(0):found peer pre-shared key matching 121.219.144.177 002710: Mar 16 14:29:13.393 aest: ISAKMP:(0): local preshared key found 002711: Mar 16 14:29:13.393 aest: ISAKMP:(0): Authentication by xauth preshared 002712: Mar 16 14:29:13.393 aest: ISAKMP:(0):Checking ISAKMP transform 0 against priority 1 policy 002713: Mar 16 14:29:13.393 aest: ISAKMP: life type in seconds 002714: Mar 16 14:29:13.393 aest: ISAKMP: life duration (basic) of 28800 002715: Mar 16 14:29:13.393 aest: ISAKMP: encryption 3DES-CBC 002716: Mar 16 14:29:13.393 aest: ISAKMP: hash MD5 002717: Mar 16 14:29:13.393 aest: ISAKMP: auth pre-share 002718: Mar 16 14:29:13.393 aest: ISAKMP: default group 2 002719: Mar 16 14:29:13.397 aest: ISAKMP:(0):Hash algorithm offered does not match policy! 002720: Mar 16 14:29:13.397 aest: ISAKMP:(0):atts are not acceptable. Next payload is 0 002721: Mar 16 14:29:13.397 aest: ISAKMP:(0):Checking ISAKMP transform 0 against priority 2 policy 002722: Mar 16 14:29:13.397 aest: ISAKMP: life type in seconds 002723: Mar 16 14:29:13.397 aest: ISAKMP: life duration (basic) of 28800 002724: Mar 16 14:29:13.397 aest: ISAKMP: encryption 3DES-CBC 002725: Mar 16 14:29:13.397 aest: ISAKMP: hash MD5 002726: Mar 16 14:29:13.397 aest: ISAKMP: auth pre-share 002727: Mar 16 14:29:13.397 aest: ISAKMP: default group 2 002728: Mar 16 14:29:13.397 aest: ISAKMP:(0):Encryption algorithm offered does not match policy! 002729: Mar 16 14:29:13.397 aest: ISAKMP:(0):atts are not acceptable. Next payload is 0 002730: Mar 16 14:29:13.397 aest: ISAKMP:(0):Checking ISAKMP transform 0 against priority 100 policy 002731: Mar 16 14:29:13.397 aest: ISAKMP: life type in seconds 002732: Mar 16 14:29:13.397 aest: ISAKMP: life duration (basic) of 28800 002733: Mar 16 14:29:13.397 aest: ISAKMP: encryption 3DES-CBC 002734: Mar 16 14:29:13.397 aest: ISAKMP: hash MD5 002735: Mar 16 14:29:13.397 aest: ISAKMP: auth pre-share 002736: Mar 16 14:29:13.397 aest: ISAKMP: default group 2 002737: Mar 16 14:29:13.397 aest: ISAKMP:(0):atts are acceptable. Next payload is 0 002738: Mar 16 14:29:13.397 aest: ISAKMP:(0): processing vendor id payload 002739: Mar 16 14:29:13.397 aest: ISAKMP:(0): vendor ID is DPD 002740: Mar 16 14:29:13.397 aest: ISAKMP:(0): processing vendor id payload 002741: Mar 16 14:29:13.397 aest: ISAKMP:(0): vendor ID seems Unity/DPD but major 69 mismatch 002742: Mar 16 14:29:13.397 aest: ISAKMP:(0): processing vendor id payload 002743: Mar 16 14:29:13.397 aest: ISAKMP:(0): vendor ID seems Unity/DPD but major 157 mismatch 002744: Mar 16 14:29:13.401 aest: ISAKMP:(0): vendor ID is NAT-T v3 002745: Mar 16 14:29:13.401 aest: ISAKMP:(0): processing vendor id payload 002746: Mar 16 14:29:13.401 aest: ISAKMP:(0): vendor ID seems Unity/DPD but major 123 mismatch 002747: Mar 16 14:29:13.401 aest: ISAKMP:(0): vendor ID is NAT-T v2 002748: Mar 16 14:29:13.401 aest: ISAKMP:(0): processing vendor id payload 002749: Mar 16 14:29:13.401 aest: ISAKMP:(0): vendor ID seems Unity/DPD but major 164 mismatch 002750: Mar 16 14:29:13.401 aest: ISAKMP:(0): processing vendor id payload 002751: Mar 16 14:29:13.401 aest: ISAKMP:(0): vendor ID seems Unity/DPD but major 221 mismatch 002752: Mar 16 14:29:13.401 aest: ISAKMP:(0):Input = IKE_MESG_INTERNAL, IKE_PROCESS_MAIN_MODE 002753: Mar 16 14:29:13.401 aest: ISAKMP:(0):Old State = IKE_R_MM1 New State = IKE_R_MM1 002754: Mar 16 14:29:13.401 aest: ISAKMP:(0): constructed NAT-T vendor-03 ID 002755: Mar 16 14:29:13.401 aest: ISAKMP:(0): sending packet to 121.219.144.177 my_port 500 peer_port 500 (R) MM_SA_SETUP 002756: Mar 16 14:29:13.401 aest: ISAKMP:(0):Sending an IKE IPv4 Packet. 002757: Mar 16 14:29:13.405 aest: ISAKMP:(0):Input = IKE_MESG_INTERNAL, IKE_PROCESS_COMPLETE 002758: Mar 16 14:29:13.405 aest: ISAKMP:(0):Old State = IKE_R_MM1 New State = IKE_R_MM2 002759: Mar 16 14:29:13.857 aest: ISAKMP (0:0): received packet from 121.219.144.177 dport 500 sport 500 Global (R) MM_SA_SETUP 002760: Mar 16 14:29:13.857 aest: ISAKMP:(0):Input = IKE_MESG_FROM_PEER, IKE_MM_EXCH 002761: Mar 16 14:29:13.857 aest: ISAKMP:(0):Old State = IKE_R_MM2 New State = IKE_R_MM3 002762: Mar 16 14:29:13.861 aest: ISAKMP:(0): processing KE payload. message ID = 0 002763: Mar 16 14:29:13.905 aest: ISAKMP:(0): processing NONCE payload. message ID = 0 002764: Mar 16 14:29:13.905 aest: ISAKMP:(0):found peer pre-shared key matching 121.219.144.177 002765: Mar 16 14:29:13.905 aest: ISAKMP:received payload type 20 002766: Mar 16 14:29:13.905 aest: ISAKMP:received payload type 20 002767: Mar 16 14:29:13.905 aest: ISAKMP:(2093):Input = IKE_MESG_INTERNAL, IKE_PROCESS_MAIN_MODE 002768: Mar 16 14:29:13.905 aest: ISAKMP:(2093):Old State = IKE_R_MM3 New State = IKE_R_MM3 002769: Mar 16 14:29:13.905 aest: ISAKMP:(2093): sending packet to 121.219.144.177 my_port 500 peer_port 500 (R) MM_KEY_EXCH 002770: Mar 16 14:29:13.905 aest: ISAKMP:(2093):Sending an IKE IPv4 Packet. 002771: Mar 16 14:29:13.909 aest: ISAKMP:(2093):Input = IKE_MESG_INTERNAL, IKE_PROCESS_COMPLETE 002772: Mar 16 14:29:13.909 aest: ISAKMP:(2093):Old State = IKE_R_MM3 New State = IKE_R_MM4 002773: Mar 16 14:29:14.501 aest: ISAKMP (0:2093): received packet from 121.219.144.177 dport 500 sport 500 Global (R) MM_KEY_EXCH 002774: Mar 16 14:29:14.501 aest: ISAKMP:(2093):Input = IKE_MESG_FROM_PEER, IKE_MM_EXCH 002775: Mar 16 14:29:14.501 aest: ISAKMP:(2093):Old State = IKE_R_MM4 New State = IKE_R_MM5 002776: Mar 16 14:29:14.501 aest: ISAKMP:(2093): processing ID payload. message ID = 0 002777: Mar 16 14:29:14.501 aest: ISAKMP (0:2093): ID payload next-payload : 8 type : 1 address : 121.219.144.177 protocol : 0 port : 0 length : 12 002778: Mar 16 14:29:14.505 aest: ISAKMP:(0):: peer matches *none* of the profiles 002779: Mar 16 14:29:14.505 aest: ISAKMP:(2093): processing HASH payload. message ID = 0 002780: Mar 16 14:29:14.505 aest: ISAKMP:(2093): processing NOTIFY INITIAL_CONTACT protocol 1 spi 0, message ID = 0, sa = 82F294C8 002781: Mar 16 14:29:14.505 aest: ISAKMP:(2093):SA authentication status: authenticated 002782: Mar 16 14:29:14.505 aest: ISAKMP:(2093):SA has been authenticated with 121.219.144.177 002783: Mar 16 14:29:14.505 aest: ISAKMP:(2093):SA authentication status: authenticated 002784: Mar 16 14:29:14.505 aest: ISAKMP:(2093): Process initial contact, bring down existing phase 1 and 2 SA's with local 124.179.211.60 remote 121.219.144.177 remote port 500 002785: Mar 16 14:29:14.505 aest: ISAKMP:(2093):returning IP addr to the address pool 002786: Mar 16 14:29:14.505 aest: ISAKMP:(2092):received initial contact, deleting SA 002787: Mar 16 14:29:14.505 aest: ISAKMP:(2092):peer does not do paranoid keepalives. 002788: Mar 16 14:29:14.505 aest: ISAKMP:(2092):peer does not do paranoid keepalives. 002789: Mar 16 14:29:14.505 aest: ISAKMP:(2092):deleting SA reason "Receive initial contact" state (R) CONF_XAUTH (peer 121.219.144.177) 002790: Mar 16 14:29:14.505 aest: ISAKMP:(2093):Input = IKE_MESG_INTERNAL, IKE_PROCESS_MAIN_MODE 002791: Mar 16 14:29:14.509 aest: ISAKMP:(2093):Old State = IKE_R_MM5 New State = IKE_R_MM5 002792: Mar 16 14:29:14.509 aest: ISAKMP: set new node -1071519299 to CONF_XAUTH 002793: Mar 16 14:29:14.509 aest: ISAKMP:(2092): sending packet to 121.219.144.177 my_port 500 peer_port 500 (R) CONF_XAUTH 002794: Mar 16 14:29:14.509 aest: ISAKMP:(2092):Sending an IKE IPv4 Packet. 002795: Mar 16 14:29:14.509 aest: ISAKMP:(2092):purging node -1071519299 002796: Mar 16 14:29:14.509 aest: ISAKMP:(2092):Input = IKE_MESG_INTERNAL, IKE_PHASE1_DEL 002797: Mar 16 14:29:14.513 aest: ISAKMP:(2092):Old State = IKE_XAUTH_REQ_SENT New State = IKE_DEST_SA 002798: Mar 16 14:29:14.513 aest: ISAKMP:(2093):SA is doing pre-shared key authentication using id type ID_IPV4_ADDR 002799: Mar 16 14:29:14.513 aest: ISAKMP (0:2093): ID payload next-payload : 8 type : 1 address : 124.179.211.60 protocol : 17 port : 500 length : 12 002800: Mar 16 14:29:14.513 aest: ISAKMP:(2093):Total payload length: 12 002801: Mar 16 14:29:14.513 aest: ISAKMP:(2093): sending packet to 121.219.144.177 my_port 500 peer_port 500 (R) MM_KEY_EXCH 002802: Mar 16 14:29:14.513 aest: ISAKMP:(2093):Sending an IKE IPv4 Packet. 002803: Mar 16 14:29:14.513 aest: ISAKMP:(2093):Input = IKE_MESG_INTERNAL, IKE_PROCESS_COMPLETE 002804: Mar 16 14:29:14.513 aest: ISAKMP:(2093):Old State = IKE_R_MM5 New State = IKE_P1_COMPLETE 002805: Mar 16 14:29:14.517 aest: ISAKMP:(2092):deleting SA reason "Receive initial contact" state (R) CONF_XAUTH (peer 121.219.144.177) 002806: Mar 16 14:29:14.517 aest: ISAKMP: Unlocking peer struct 0x843606D0 for isadb_mark_sa_deleted(), count 1 002807: Mar 16 14:29:14.517 aest: ISAKMP:(2092):deleting node -1366518370 error FALSE reason "IKE deleted" 002808: Mar 16 14:29:14.517 aest: ISAKMP:(2092):Input = IKE_MESG_FROM_PEER, IKE_MM_EXCH 002809: Mar 16 14:29:14.517 aest: ISAKMP:(2092):Old State = IKE_DEST_SA New State = IKE_DEST_SA 002810: Mar 16 14:29:14.517 aest: ISAKMP:(2093):Need XAUTH 002811: Mar 16 14:29:14.517 aest: ISAKMP: set new node -1484653125 to CONF_XAUTH 002812: Mar 16 14:29:14.517 aest: ISAKMP/xauth: request attribute XAUTH_TYPE 002813: Mar 16 14:29:14.517 aest: ISAKMP/xauth: request attribute XAUTH_USER_NAME 002814: Mar 16 14:29:14.521 aest: ISAKMP/xauth: request attribute XAUTH_USER_PASSWORD 002815: Mar 16 14:29:14.521 aest: ISAKMP:(2093): initiating peer config to 121.219.144.177. ID = -1484653125 002816: Mar 16 14:29:14.521 aest: ISAKMP:(2093): sending packet to 121.219.144.177 my_port 500 peer_port 500 (R) CONF_XAUTH 002817: Mar 16 14:29:14.521 aest: ISAKMP:(2093):Sending an IKE IPv4 Packet. 002818: Mar 16 14:29:14.521 aest: ISAKMP:(2093):Input = IKE_MESG_INTERNAL, IKE_PHASE1_COMPLETE 002819: Mar 16 14:29:14.521 aest: ISAKMP:(2093):Old State = IKE_P1_COMPLETE New State = IKE_XAUTH_REQ_SENT 002820: Mar 16 14:29:14.705 aest: ISAKMP (0:2093): received packet from 121.219.144.177 dport 500 sport 500 Global (R) CONF_XAUTH 002821: Mar 16 14:29:15.981 aest: %SEC-6-IPACCESSLOGP: list 101 denied udp 24.64.56.95(23473) -> 124.179.211.60(1026), 1 packet 002822: Mar 16 14:29:17.648 aest: ISAKMP (0:2093): received packet from 121.219.144.177 dport 500 sport 500 Global (R) CONF_XAUTH 002823: Mar 16 14:29:23.578 aest: ISAKMP:(2089):purging SA., sa=84406284, delme=84406284 002824: Mar 16 14:29:23.578 aest: ISAKMP:(2089):purging node -212774560 002825: Mar 16 14:29:23.630 aest: ISAKMP (0:2093): received packet from 121.219.144.177 dport 500 sport 500 Global (R) CONF_XAUTH 002826: Mar 16 14:29:28.081 aest: ISAKMP (0:0): received packet from 121.219.144.177 dport 500 sport 500 Global (N) NEW SA 002827: Mar 16 14:29:28.081 aest: ISAKMP: Found a peer struct for 121.219.144.177, peer port 500 002828: Mar 16 14:29:28.081 aest: ISAKMP: Locking peer struct 0x843606D0, refcount 2 for crypto_isakmp_process_block 002829: Mar 16 14:29:28.081 aest: ISAKMP:(0):(Re)Setting client xauth list sdm_vpn_xauth_ml_1 and state 002830: Mar 16 14:29:28.081 aest: ISAKMP/xauth: initializing AAA request 002831: Mar 16 14:29:28.085 aest: ISAKMP: local port 500, remote port 500 002832: Mar 16 14:29:28.085 aest: ISAKMP: Find a dup sa in the avl tree during calling isadb_insert sa = 843FA4B4 002833: Mar 16 14:29:28.085 aest: ISAKMP:(0):Input = IKE_MESG_FROM_PEER, IKE_MM_EXCH 002834: Mar 16 14:29:28.085 aest: ISAKMP:(0):Old State = IKE_READY New State = IKE_R_MM1 002835: Mar 16 14:29:28.085 aest: ISAKMP:(0): processing SA payload. message ID = 0 002836: Mar 16 14:29:28.085 aest: ISAKMP:(0): processing vendor id payload 002837: Mar 16 14:29:28.085 aest: ISAKMP:(0): vendor ID is DPD 002838: Mar 16 14:29:28.085 aest: ISAKMP:(0): processing vendor id payload 002839: Mar 16 14:29:28.085 aest: ISAKMP:(0): vendor ID seems Unity/DPD but major 69 mismatch 002840: Mar 16 14:29:28.085 aest: ISAKMP:(0): processing vendor id payload 002841: Mar 16 14:29:28.085 aest: ISAKMP:(0): vendor ID seems Unity/DPD but major 157 mismatch 002842: Mar 16 14:29:28.085 aest: ISAKMP:(0): vendor ID is NAT-T v3 002843: Mar 16 14:29:28.085 aest: ISAKMP:(0): processing vendor id payload 002844: Mar 16 14:29:28.085 aest: ISAKMP:(0): vendor ID seems Unity/DPD but major 123 mismatch 002845: Mar 16 14:29:28.089 aest: ISAKMP:(0): vendor ID is NAT-T v2 002846: Mar 16 14:29:28.089 aest: ISAKMP:(0): processing vendor id payload 002847: Mar 16 14:29:28.089 aest: ISAKMP:(0): vendor ID seems Unity/DPD but major 164 mismatch 002848: Mar 16 14:29:28.089 aest: ISAKMP:(0): processing vendor id payload 002849: Mar 16 14:29:28.089 aest: ISAKMP:(0): vendor ID seems Unity/DPD but major 221 mismatch 002850: Mar 16 14:29:28.089 aest: ISAKMP:(0):found peer pre-shared key matching 121.219.144.177 002851: Mar 16 14:29:28.089 aest: ISAKMP:(0): local preshared key found 002852: Mar 16 14:29:28.089 aest: ISAKMP:(0): Authentication by xauth preshared 002853: Mar 16 14:29:28.089 aest: ISAKMP:(0):Checking ISAKMP transform 0 against priority 1 policy 002854: Mar 16 14:29:28.089 aest: ISAKMP: life type in seconds 002855: Mar 16 14:29:28.089 aest: ISAKMP: life duration (basic) of 28800 002856: Mar 16 14:29:28.089 aest: ISAKMP: encryption 3DES-CBC 002857: Mar 16 14:29:28.089 aest: ISAKMP: hash MD5 002858: Mar 16 14:29:28.089 aest: ISAKMP: auth pre-share 002859: Mar 16 14:29:28.089 aest: ISAKMP: default group 2 002860: Mar 16 14:29:28.089 aest: ISAKMP:(0):Hash algorithm offered does not match policy! 002861: Mar 16 14:29:28.089 aest: ISAKMP:(0):atts are not acceptable. Next payload is 0 002862: Mar 16 14:29:28.089 aest: ISAKMP:(0):Checking ISAKMP transform 0 against priority 2 policy 002863: Mar 16 14:29:28.089 aest: ISAKMP: life type in seconds 002864: Mar 16 14:29:28.089 aest: ISAKMP: life duration (basic) of 28800 002865: Mar 16 14:29:28.089 aest: ISAKMP: encryption 3DES-CBC 002866: Mar 16 14:29:28.089 aest: ISAKMP: hash MD5 002867: Mar 16 14:29:28.089 aest: ISAKMP: auth pre-share 002868: Mar 16 14:29:28.089 aest: ISAKMP: default group 2 002869: Mar 16 14:29:28.089 aest: ISAKMP:(0):Encryption algorithm offered does not match policy! 002870: Mar 16 14:29:28.089 aest: ISAKMP:(0):atts are not acceptable. Next payload is 0 002871: Mar 16 14:29:28.093 aest: ISAKMP:(0):Checking ISAKMP transform 0 against priority 100 policy 002872: Mar 16 14:29:28.093 aest: ISAKMP: life type in seconds 002873: Mar 16 14:29:28.093 aest: ISAKMP: life duration (basic) of 28800 002874: Mar 16 14:29:28.093 aest: ISAKMP: encryption 3DES-CBC 002875: Mar 16 14:29:28.093 aest: ISAKMP: hash MD5 002876: Mar 16 14:29:28.093 aest: ISAKMP: auth pre-share 002877: Mar 16 14:29:28.093 aest: ISAKMP: default group 2 002878: Mar 16 14:29:28.093 aest: ISAKMP:(0):atts are acceptable. Next payload is 0 002879: Mar 16 14:29:28.093 aest: ISAKMP:(0): processing vendor id payload 002880: Mar 16 14:29:28.093 aest: ISAKMP:(0): vendor ID is DPD 002881: Mar 16 14:29:28.093 aest: ISAKMP:(0): processing vendor id payload 002882: Mar 16 14:29:28.093 aest: ISAKMP:(0): vendor ID seems Unity/DPD but major 69 mismatch 002883: Mar 16 14:29:28.093 aest: ISAKMP:(0): processing vendor id payload 002884: Mar 16 14:29:28.093 aest: ISAKMP:(0): vendor ID seems Unity/DPD but major 157 mismatch 002885: Mar 16 14:29:28.093 aest: ISAKMP:(0): vendor ID is NAT-T v3 002886: Mar 16 14:29:28.093 aest: ISAKMP:(0): processing vendor id payload 002887: Mar 16 14:29:28.093 aest: ISAKMP:(0): vendor ID seems Unity/DPD but major 123 mismatch 002888: Mar 16 14:29:28.093 aest: ISAKMP:(0): vendor ID is NAT-T v2 002889: Mar 16 14:29:28.093 aest: ISAKMP:(0): processing vendor id payload 002890: Mar 16 14:29:28.093 aest: ISAKMP:(0): vendor ID seems Unity/DPD but major 164 mismatch 002891: Mar 16 14:29:28.093 aest: ISAKMP:(0): processing vendor id payload 002892: Mar 16 14:29:28.097 aest: ISAKMP:(0): vendor ID seems Unity/DPD but major 221 mismatch 002893: Mar 16 14:29:28.097 aest: ISAKMP:(0):Input = IKE_MESG_INTERNAL, IKE_PROCESS_MAIN_MODE 002894: Mar 16 14:29:28.097 aest: ISAKMP:(0):Old State = IKE_R_MM1 New State = IKE_R_MM1 002895: Mar 16 14:29:28.097 aest: ISAKMP:(0): constructed NAT-T vendor-03 ID 002896: Mar 16 14:29:28.097 aest: ISAKMP:(0): sending packet to 121.219.144.177 my_port 500 peer_port 500 (R) MM_SA_SETUP 002897: Mar 16 14:29:28.097 aest: ISAKMP:(0):Sending an IKE IPv4 Packet. 002898: Mar 16 14:29:28.097 aest: ISAKMP:(0):Input = IKE_MESG_INTERNAL, IKE_PROCESS_COMPLETE 002899: Mar 16 14:29:28.097 aest: ISAKMP:(0):Old State = IKE_R_MM1 New State = IKE_R_MM2 002900: Mar 16 14:29:28.545 aest: ISAKMP (0:0): received packet from 121.219.144.177 dport 500 sport 500 Global (R) MM_SA_SETUP 002901: Mar 16 14:29:28.545 aest: ISAKMP:(0):Input = IKE_MESG_FROM_PEER, IKE_MM_EXCH 002902: Mar 16 14:29:28.545 aest: ISAKMP:(0):Old State = IKE_R_MM2 New State = IKE_R_MM3 002903: Mar 16 14:29:28.549 aest: ISAKMP:(0): processing KE payload. message ID = 0 002904: Mar 16 14:29:28.593 aest: ISAKMP:(0): processing NONCE payload. message ID = 0 002905: Mar 16 14:29:28.593 aest: ISAKMP:(0):found peer pre-shared key matching 121.219.144.177 002906: Mar 16 14:29:28.593 aest: ISAKMP:received payload type 20 002907: Mar 16 14:29:28.593 aest: ISAKMP:received payload type 20 002908: Mar 16 14:29:28.593 aest: ISAKMP:(2094):Input = IKE_MESG_INTERNAL, IKE_PROCESS_MAIN_MODE 002909: Mar 16 14:29:28.593 aest: ISAKMP:(2094):Old State = IKE_R_MM3 New State = IKE_R_MM3 002910: Mar 16 14:29:28.593 aest: ISAKMP:(2094): sending packet to 121.219.144.177 my_port 500 peer_port 500 (R) MM_KEY_EXCH 002911: Mar 16 14:29:28.593 aest: ISAKMP:(2094):Sending an IKE IPv4 Packet. 002912: Mar 16 14:29:28.597 aest: ISAKMP:(2094):Input = IKE_MESG_INTERNAL, IKE_PROCESS_COMPLETE 002913: Mar 16 14:29:28.597 aest: ISAKMP:(2094):Old State = IKE_R_MM3 New State = IKE_R_MM4 002914: Mar 16 14:29:29.197 aest: ISAKMP (0:2094): received packet from 121.219.144.177 dport 500 sport 500 Global (R) MM_KEY_EXCH 002915: Mar 16 14:29:29.197 aest: ISAKMP:(2094):Input = IKE_MESG_FROM_PEER, IKE_MM_EXCH 002916: Mar 16 14:29:29.197 aest: ISAKMP:(2094):Old State = IKE_R_MM4 New State = IKE_R_MM5 002917: Mar 16 14:29:29.197 aest: ISAKMP:(2094): processing ID payload. message ID = 0 002918: Mar 16 14:29:29.197 aest: ISAKMP (0:2094): ID payload next-payload : 8 type : 1 address : 121.219.144.177 protocol : 0 port : 0 length : 12 002919: Mar 16 14:29:29.197 aest: ISAKMP:(0):: peer matches *none* of the profiles 002920: Mar 16 14:29:29.197 aest: ISAKMP:(2094): processing HASH payload. message ID = 0 002921: Mar 16 14:29:29.197 aest: ISAKMP:(2094): processing NOTIFY INITIAL_CONTACT protocol 1 spi 0, message ID = 0, sa = 843FA4B4 002922: Mar 16 14:29:29.197 aest: ISAKMP:(2094):SA authentication status: authenticated 002923: Mar 16 14:29:29.197 aest: ISAKMP:(2094):SA has been authenticated with 121.219.144.177 002924: Mar 16 14:29:29.197 aest: ISAKMP:(2094):SA authentication status: authenticated 002925: Mar 16 14:29:29.201 aest: ISAKMP:(2094): Process initial contact, bring down existing phase 1 and 2 SA's with local 124.179.211.60 remote 121.219.144.177 remote port 500 002926: Mar 16 14:29:29.201 aest: ISAKMP:(2094):returning IP addr to the address pool 002927: Mar 16 14:29:29.201 aest: ISAKMP:(2093):received initial contact, deleting SA 002928: Mar 16 14:29:29.201 aest: ISAKMP:(2093):peer does not do paranoid keepalives. 002929: Mar 16 14:29:29.201 aest: ISAKMP:(2093):peer does not do paranoid keepalives. 002930: Mar 16 14:29:29.201 aest: ISAKMP:(2093):deleting SA reason "Receive initial contact" state (R) CONF_XAUTH (peer 121.219.144.177) 002931: Mar 16 14:29:29.201 aest: ISAKMP:(2094):Input = IKE_MESG_INTERNAL, IKE_PROCESS_MAIN_MODE 002932: Mar 16 14:29:29.201 aest: ISAKMP:(2094):Old State = IKE_R_MM5 New State = IKE_R_MM5 002933: Mar 16 14:29:29.205 aest: ISAKMP: set new node -1105771789 to CONF_XAUTH 002934: Mar 16 14:29:29.205 aest: ISAKMP:(2093): sending packet to 121.219.144.177 my_port 500 peer_port 500 (R) CONF_XAUTH 002935: Mar 16 14:29:29.205 aest: ISAKMP:(2093):Sending an IKE IPv4 Packet. 002936: Mar 16 14:29:29.205 aest: ISAKMP:(2093):purging node -1105771789 002937: Mar 16 14:29:29.205 aest: ISAKMP:(2093):Input = IKE_MESG_INTERNAL, IKE_PHASE1_DEL 002938: Mar 16 14:29:29.205 aest: ISAKMP:(2093):Old State = IKE_XAUTH_REQ_SENT New State = IKE_DEST_SA 002939: Mar 16 14:29:29.205 aest: ISAKMP:(2094):SA is doing pre-shared key authentication using id type ID_IPV4_ADDR 002940: Mar 16 14:29:29.205 aest: ISAKMP (0:2094): ID payload next-payload : 8 type : 1 address : 124.179.211.60 protocol : 17 port : 500 length : 12 002941: Mar 16 14:29:29.209 aest: ISAKMP:(2094):Total payload length: 12 002942: Mar 16 14:29:29.209 aest: ISAKMP:(2094): sending packet to 121.219.144.177 my_port 500 peer_port 500 (R) MM_KEY_EXCH 002943: Mar 16 14:29:29.209 aest: ISAKMP:(2094):Sending an IKE IPv4 Packet. 002944: Mar 16 14:29:29.209 aest: ISAKMP:(2094):Input = IKE_MESG_INTERNAL, IKE_PROCESS_COMPLETE 002945: Mar 16 14:29:29.209 aest: ISAKMP:(2094):Old State = IKE_R_MM5 New State = IKE_P1_COMPLETE 002946: Mar 16 14:29:29.209 aest: ISAKMP:(2093):deleting SA reason "Receive initial contact" state (R) CONF_XAUTH (peer 121.219.144.177) 002947: Mar 16 14:29:29.209 aest: ISAKMP: Unlocking peer struct 0x843606D0 for isadb_mark_sa_deleted(), count 1 002948: Mar 16 14:29:29.209 aest: ISAKMP:(2093):deleting node -1484653125 error FALSE reason "IKE deleted" 002949: Mar 16 14:29:29.213 aest: ISAKMP:(2093):Input = IKE_MESG_FROM_PEER, IKE_MM_EXCH 002950: Mar 16 14:29:29.213 aest: ISAKMP:(2093):Old State = IKE_DEST_SA New State = IKE_DEST_SA 002951: Mar 16 14:29:29.213 aest: ISAKMP:(2094):Need XAUTH 002952: Mar 16 14:29:29.213 aest: ISAKMP: set new node -788467935 to CONF_XAUTH 002953: Mar 16 14:29:29.213 aest: ISAKMP/xauth: request attribute XAUTH_TYPE 002954: Mar 16 14:29:29.213 aest: ISAKMP/xauth: request attribute XAUTH_USER_NAME 002955: Mar 16 14:29:29.213 aest: ISAKMP/xauth: request attribute XAUTH_USER_PASSWORD 002956: Mar 16 14:29:29.213 aest: ISAKMP:(2094): initiating peer config to 121.219.144.177. ID = -788467935 002957: Mar 16 14:29:29.213 aest: ISAKMP:(2094): sending packet to 121.219.144.177 my_port 500 peer_port 500 (R) CONF_XAUTH 002958: Mar 16 14:29:29.213 aest: ISAKMP:(2094):Sending an IKE IPv4 Packet. 002959: Mar 16 14:29:29.213 aest: ISAKMP:(2094):Input = IKE_MESG_INTERNAL, IKE_PHASE1_COMPLETE 002960: Mar 16 14:29:29.217 aest: ISAKMP:(2094):Old State = IKE_P1_COMPLETE New State = IKE_XAUTH_REQ_SENT 002961: Mar 16 14:29:29.273 aest: ISAKMP (0:2094): received packet from 121.219.144.177 dport 500 sport 500 Global (R) CONF_XAUTH 002962: Mar 16 14:29:32.248 aest: ISAKMP (0:2094): received packet from 121.219.144.177 dport 500 sport 500 Global (R) CONF_XAUTH c877w#exit 002963: Mar 16 14:29:38.230 aest: ISAKMP (0:2094): received packet from 121.219.144.177 dport 500 sport 500 Global (R) CONF_XAUTH 002964: Mar 16 14:29:38.470 aest: ISAKMP:(2090):purging SA., sa=8440E19C, delme=8440E19C 002965: Mar 16 14:29:38.470 aest: ISAKMP:(2090):purging node 542187127