*May 5 23:27:25.470 EET: ISAKMP (0:0): received packet from zz.yy.xx.vv dport 500 sport 500 Global (N) NEW SA *May 5 23:27:25.470 EET: ISAKMP: Created a peer struct for zz.yy.xx.vv, peer port 500 *May 5 23:27:25.470 EET: ISAKMP: New peer created peer = 0x83F03CF4 peer_handle = 0x800049E5 *May 5 23:27:25.470 EET: ISAKMP: Locking peer struct 0x83F03CF4, refcount 1 for crypto_isakmp_process_block *May 5 23:27:25.470 EET: ISAKMP:(0):Setting client config settings 83F1CC78 *May 5 23:27:25.470 EET: ISAKMP: local port 500, remote port 500 *May 5 23:27:25.470 EET: ISAKMP: Find a dup sa in the avl tree during calling isadb_insert sa = 84A37DEC *May 5 23:27:25.470 EET: ISAKMP:(0):Input = IKE_MESG_FROM_PEER, IKE_MM_EXCH *May 5 23:27:25.470 EET: ISAKMP:(0):Old State = IKE_READY New State = IKE_R_MM1 ` *May 5 23:27:25.470 EET: ISAKMP:(0): processing SA payload. message ID = 0 *May 5 23:27:25.470 EET: ISAKMP:(0): processing vendor id payload *May 5 23:27:25.470 EET: ISAKMP:(0): vendor ID seems Unity/DPD but major 19 mismatch *May 5 23:27:25.470 EET: ISAKMP:(0): processing vendor id payload *May 5 23:27:25.470 EET: ISAKMP:(0): vendor ID is DPD *May 5 23:27:25.470 EET: ISAKMP:(0): processing vendor id payload *May 5 23:27:25.470 EET: ISAKMP:(0): vendor ID seems Unity/DPD but major 102 mismatch *May 5 23:27:25.470 EET: ISAKMP:(0):found peer pre-shared key matching zz.yy.xx.vv *May 5 23:27:25.470 EET: ISAKMP:(0): local preshared key found *May 5 23:27:25.470 EET: ISAKMP : Scanning profiles for xauth ... *May 5 23:27:25.470 EET: ISAKMP:(0):Checking ISAKMP transform 1 against priority 10 policy *May 5 23:27:25.470 EET: ISAKMP: encryption 3DES-CBC *May 5 23:27:25.470 EET: ISAKMP: hash MD5 *May 5 23:27:25.470 EET: ISAKMP: default group 5 *May 5 23:27:25.470 EET: ISAKMP: auth pre-share *May 5 23:27:25.470 EET: ISAKMP: life type in seconds *May 5 23:27:25.470 EET: ISAKMP: life duration (basic) of 3600 *May 5 23:27:25.470 EET: ISAKMP:(0):Encryption algorithm offered does not match policy! *May 5 23:27:25.470 EET: ISAKMP:(0):atts are not acceptable. Next payload is 0 *May 5 23:27:25.470 EET: ISAKMP:(0):Checking ISAKMP transform 1 against priority 20 policy *May 5 23:27:25.470 EET: ISAKMP: encryption 3DES-CBC *May 5 23:27:25.474 EET: ISAKMP: hash MD5 *May 5 23:27:25.474 EET: ISAKMP: default group 5 *May 5 23:27:25.474 EET: ISAKMP: auth pre-share *May 5 23:27:25.474 EET: ISAKMP: life type in seconds *May 5 23:27:25.474 EET: ISAKMP: life duration (basic) of 3600 *May 5 23:27:25.474 EET: ISAKMP:(0):Hash algorithm offered does not match policy! *May 5 23:27:25.474 EET: ISAKMP:(0):atts are not acceptable. Next payload is 0 *May 5 23:27:25.474 EET: ISAKMP:(0):Checking ISAKMP transform 1 against priority 30 policy *May 5 23:27:25.474 EET: ISAKMP: encryption 3DES-CBC *May 5 23:27:25.474 EET: ISAKMP: hash MD5 *May 5 23:27:25.474 EET: ISAKMP: default group 5 *May 5 23:27:25.474 EET: ISAKMP: auth pre-share *May 5 23:27:25.474 EET: ISAKMP: life type in seconds *May 5 23:27:25.474 EET: ISAKMP: life duration (basic) of 3600 *May 5 23:27:25.474 EET: ISAKMP:(0):atts are acceptable. Next payload is 0 *May 5 23:27:25.474 EET: ISAKMP:(0):Acceptable atts:actual life: 0 *May 5 23:27:25.474 EET: ISAKMP:(0):Acceptable atts:life: 0 *May 5 23:27:25.474 EET: ISAKMP:(0):Basic life_in_seconds:3600 *May 5 23:27:25.474 EET: ISAKMP:(0):Returning Actual lifetime: 3600 *May 5 23:27:25.474 EET: ISAKMP:(0)::Started lifetime timer: 3600. *May 5 23:27:25.474 EET: ISAKMP:(0): processing vendor id payload *May 5 23:27:25.474 EET: ISAKMP:(0): vendor ID seems Unity/DPD but major 19 mismatch *May 5 23:27:25.474 EET: ISAKMP:(0): processing vendor id payload *May 5 23:27:25.474 EET: ISAKMP:(0): vendor ID is DPD *May 5 23:27:25.474 EET: ISAKMP:(0): processing vendor id payload *May 5 23:27:25.474 EET: ISAKMP:(0): vendor ID seems Unity/DPD but major 102 mismatch *May 5 23:27:25.474 EET: ISAKMP:(0):Input = IKE_MESG_INTERNAL, IKE_PROCESS_MAIN_MODE *May 5 23:27:25.474 EET: ISAKMP:(0):Old State = IKE_R_MM1 New State = IKE_R_MM1 *May 5 23:27:25.474 EET: ISAKMP:(0): sending packet to zz.yy.xx.vv my_port 500 peer_port 500 (R) MM_SA_SETUP *May 5 23:27:25.474 EET: ISAKMP:(0):Sending an IKE IPv4 Packet. *May 5 23:27:25.474 EET: ISAKMP:(0):Input = IKE_MESG_INTERNAL, IKE_PROCESS_COMPLETE *May 5 23:27:25.474 EET: ISAKMP:(0):Old State = IKE_R_MM1 New State = IKE_R_MM2 *May 5 23:27:25.534 EET: ISAKMP (0:0): received packet from zz.yy.xx.vv dport 500 sport 500 Global (R) MM_SA_SETUP *May 5 23:27:25.534 EET: ISAKMP:(0):Input = IKE_MESG_FROM_PEER, IKE_MM_EXCH *May 5 23:27:25.534 EET: ISAKMP:(0):Old State = IKE_R_MM2 New State = IKE_R_MM3 *May 5 23:27:25.534 EET: ISAKMP:(0): processing KE payload. message ID = 0 *May 5 23:27:25.626 EET: ISAKMP:(0): processing NONCE payload. message ID = 0 *May 5 23:27:25.626 EET: ISAKMP:(0):found peer pre-shared key matching zz.yy.xx.vv *May 5 23:27:25.626 EET: ISAKMP:(2921):Input = IKE_MESG_INTERNAL, IKE_PROCESS_MAIN_MODE *May 5 23:27:25.626 EET: ISAKMP:(2921):Old State = IKE_R_MM3 New State = IKE_R_MM3 *May 5 23:27:25.626 EET: ISAKMP:(2921): sending packet to zz.yy.xx.vv my_port 500 peer_port 500 (R) MM_KEY_EXCH *May 5 23:27:25.626 EET: ISAKMP:(2921):Sending an IKE IPv4 Packet. *May 5 23:27:25.630 EET: ISAKMP:(2921):Input = IKE_MESG_INTERNAL, IKE_PROCESS_COMPLETE *May 5 23:27:25.630 EET: ISAKMP:(2921):Old State = IKE_R_MM3 New State = IKE_R_MM4 *May 5 23:27:25.690 EET: ISAKMP (0:2921): received packet from zz.yy.xx.vv dport 500 sport 500 Global (R) MM_KEY_EXCH *May 5 23:27:25.690 EET: ISAKMP:(2921):Input = IKE_MESG_FROM_PEER, IKE_MM_EXCH *May 5 23:27:25.690 EET: ISAKMP:(2921):Old State = IKE_R_MM4 New State = IKE_R_MM5 *May 5 23:27:25.690 EET: ISAKMP:(2921): processing ID payload. message ID = 0 *May 5 23:27:25.690 EET: ISAKMP (0:2921): ID payload next-payload : 8 type : 1 address : zz.yy.xx.vv protocol : 17 port : 500 length : 12 *May 5 23:27:25.694 EET: ISAKMP:(0):: peer matches *none* of the profiles *May 5 23:27:25.694 EET: ISAKMP:(2921): processing HASH payload. message ID = 0 *May 5 23:27:25.694 EET: ISAKMP:(2921):SA authentication status: authenticated *May 5 23:27:25.694 EET: ISAKMP:(2921):SA has been authenticated with zz.yy.xx.vv *May 5 23:27:25.694 EET: ISAKMP: Trying to insert a peer vv.xx.yy.zz/zz.yy.xx.vv/500/, and inserted successfully 83F03CF4. *May 5 23:27:25.694 EET: ISAKMP:(2921):Input = IKE_MESG_INTERNAL, IKE_PROCESS_MAIN_MODE *May 5 23:27:25.694 EET: ISAKMP:(2921):Old State = IKE_R_MM5 New State = IKE_R_MM5 *May 5 23:27:25.694 EET: ISAKMP:(2921):SA is doing pre-shared key authentication using id type ID_IPV4_ADDR *May 5 23:27:25.694 EET: ISAKMP (0:2921): ID payload next-payload : 8 type : 1 address : vv.xx.yy.zz protocol : 17 port : 500 length : 12 *May 5 23:27:25.694 EET: ISAKMP:(2921):Total payload length: 12 *May 5 23:27:25.694 EET: ISAKMP:(2921): sending packet to zz.yy.xx.vv my_port 500 peer_port 500 (R) MM_KEY_EXCH *May 5 23:27:25.694 EET: ISAKMP:(2921):Sending an IKE IPv4 Packet. *May 5 23:27:25.694 EET: ISAKMP:(2921):Input = IKE_MESG_INTERNAL, IKE_PROCESS_COMPLETE *May 5 23:27:25.694 EET: ISAKMP:(2921):Old State = IKE_R_MM5 New State = IKE_P1_COMPLETE *May 5 23:27:25.694 EET: ISAKMP:(2921):Need config/address *May 5 23:27:25.694 EET: ISAKMP: set new node -745013984 to CONF_ADDR *May 5 23:27:25.694 EET: ISAKMP:(2921):No IP address pool defined for ISAKMP! *May 5 23:27:25.694 EET: ISAKMP:(2921):peer does not do paranoid keepalives. *May 5 23:27:25.694 EET: ISAKMP:(2921):deleting SA reason "Fail to allocate ip address" state (R) CONF_ADDR (peer zz.yy.xx.vv) *May 5 23:27:25.694 EET: ISAKMP:(2921):deleting node -745013984 error FALSE reason "No Error" *May 5 23:27:25.694 EET: ISAKMP:(2921):peer does not do paranoid keepalives. *May 5 23:27:25.694 EET: ISAKMP (0:2921): FSM action returned error: 2 *May 5 23:27:25.694 EET: ISAKMP:(2921):Input = IKE_MESG_INTERNAL, IKE_PHASE1_COMPLETE *May 5 23:27:25.694 EET: ISAKMP:(2921):Old State = IKE_P1_COMPLETE New State = IKE_CONFIG_MODE_SET_SENT *May 5 23:27:25.694 EET: ISAKMP: set new node -1471918487 to CONF_ADDR *May 5 23:27:25.694 EET: ISAKMP:(2921): sending packet to zz.yy.xx.vv my_port 500 peer_port 500 (R) CONF_ADDR *May 5 23:27:25.694 EET: ISAKMP:(2921):Sending an IKE IPv4 Packet. *May 5 23:27:25.698 EET: ISAKMP:(2921):purging node -1471918487 *May 5 23:27:25.698 EET: ISAKMP:(2921):Input = IKE_MESG_INTERNAL, IKE_PHASE1_DEL *May 5 23:27:25.698 EET: ISAKMP:(2921):Old State = IKE_CONFIG_MODE_SET_SENT New State = IKE_DEST_SA *May 5 23:27:25.698 EET: ISAKMP:(2921):deleting SA reason "Fail to allocate ip address" state (R) CONF_ADDR (peer zz.yy.xx.vv) *May 5 23:27:25.698 EET: ISAKMP:(0):Can't decrement IKE Call Admission Control stat incoming_active since it's already 0. *May 5 23:27:25.698 EET: ISAKMP: Unlocking peer struct 0x83F03CF4 for isadb_mark_sa_deleted(), count 0 *May 5 23:27:25.698 EET: ISAKMP: Deleting peer node by peer_reap for zz.yy.xx.vv: 83F03CF4 *May 5 23:27:25.698 EET: ISAKMP:(2921):deleting node -745013984 error FALSE reason "IKE deleted" *May 5 23:27:25.698 EET: ISAKMP:(2921):Input = IKE_MESG_FROM_PEER, IKE_MM_EXCH *May 5 23:27:25.698 EET: ISAKMP:(2921):Old State = IKE_DEST_SA New State = IKE_DEST_SA *May 5 23:27:25.698 EET: IPSEC(key_engine): got a queue event with 1 KMI message(s) *May 5 23:27:25.758 EET: ISAKMP (0:2921): received packet from zz.yy.xx.vv dport 500 sport 500 Global (R) MM_NO_STATE *May 5 23:27:35.734 EET: ISAKMP:(2920):purging node -1303609566 *May 5 23:27:39.102 EET: ISAKMP:(2509):purging node 593713156