Chillas-RTR#sh log Syslog logging: enabled (0 messages dropped, 3 messages rate-limited, 0 flushes, 0 overruns, xml disabled, filtering disabled) No Active Message Discriminator. No Inactive Message Discriminator. Console logging: level debugging, 150 messages logged, xml disabled, filtering disabled Monitor logging: level debugging, 0 messages logged, xml disabled, filtering disabled Buffer logging: level debugging, 150 messages logged, xml disabled, filtering disabled Exception Logging: size (4096 bytes) Count and timestamp logging messages: disabled Persistent logging: disabled No active filter modules. Trap logging: level informational, 147 message lines logged Logging Source-Interface: VRF Name: TLS Profiles: Log Buffer (102400 bytes): *Aug 23 03:22:49.890: %ISR_THROUGHPUT-6-CRYPTO: Crypto level has been set to 50000 kbps *Aug 23 03:22:52.554: %SMART_LIC-6-AGENT_ENABLED: Smart Agent for Licensing is enabled *Aug 23 03:22:52.894: %SMART_LIC-6-EXPORT_CONTROLLED: Usage of export controlled features is not allowedESG-PM-ACL:[subsys-init] Init ESG-ACL subsystem starting *Aug 23 03:22:55.560: ESG-PM-ACL:[subsys-init] Init ESG-ACL platform API reg *Aug 23 03:22:55.560: ESG-PM-ACL:[subsys-init] Init ESG-ACL subsystem ended *Aug 23 03:22:55.561: *Aug 23 03:23:00.354: %SPANTREE-5-EXTENDED_SYSID: Extended SysId enabled for type vlan *Aug 23 03:23:00.413: %TLSCLIENT-5-TLSCLIENT_IOS: TLS Client is IOS based *Aug 23 03:23:00.711: %CRYPTO_ENGINE-5-CSDL_COMPLIANCE_ENFORCED: Cisco PSB security compliance is being enforced *Aug 23 03:23:00.711: %CRYPTO_ENGINE-5-CSDL_COMPLIANCE_EXCEPTION_ADDED: Cisco PSB security compliance exception has been added by this platform for use of RSA Key Size *Aug 23 03:23:00.861: %CRYPTO_ENGINE-5-CSDL_COMPLIANCE_EXCEPTION_ADDED: Cisco PSB security compliance exception has been added by Crypto IKEv2 for use of DES *Aug 23 03:23:00.862: %CRYPTO_ENGINE-5-CSDL_COMPLIANCE_EXCEPTION_ADDED: Cisco PSB security compliance exception has been added by Crypto IKEv2 for use of 3DES *Aug 23 03:23:00.862: %CRYPTO_ENGINE-5-CSDL_COMPLIANCE_EXCEPTION_ADDED: Cisco PSB security compliance exception has been added by Crypto IKEv2 for use of DH *Aug 23 03:23:00.862: %CRYPTO_ENGINE-5-CSDL_COMPLIANCE_EXCEPTION_ADDED: Cisco PSB security compliance exception has been added by Crypto IKEv2 for use of MD5 *Aug 23 03:23:00.862: %CRYPTO_ENGINE-5-CSDL_COMPLIANCE_EXCEPTION_ADDED: Cisco PSB security compliance exception has been added by Crypto IKEv2 for use of SHA1 *Aug 23 03:23:00.872: %CRYPTO_ENGINE-5-CSDL_COMPLIANCE_EXCEPTION_ADDED: Cisco PSB security compliance exception has been added by Crypto IKMP for use of DES *Aug 23 03:23:00.872: %CRYPTO_ENGINE-5-CSDL_COMPLIANCE_EXCEPTION_ADDED: Cisco PSB security compliance exception has been added by Crypto IKMP for use of 3DES *Aug 23 03:23:00.873: %CRYPTO_ENGINE-5-CSDL_COMPLIANCE_EXCEPTION_ADDED: Cisco PSB security compliance exception has been added by Crypto IKMP for use of DH *Aug 23 03:23:00.873: %CRYPTO_ENGINE-5-CSDL_COMPLIANCE_EXCEPTION_ADDED: Cisco PSB security compliance exception has been added by Crypto IKMP for use of MD5 *Aug 23 03:23:00.873: %CRYPTO_ENGINE-5-CSDL_COMPLIANCE_EXCEPTION_ADDED: Cisco PSB security compliance exception has been added by Crypto IKMP for use of SHA1 *Aug 23 03:23:00.875: %CRYPTO_ENGINE-5-CSDL_COMPLIANCE_EXCEPTION_ADDED: Cisco PSB security compliance exception has been added by IPSEC key engine for use of 3DES *Aug 23 03:23:00.876: %CRYPTO_ENGINE-5-CSDL_COMPLIANCE_EXCEPTION_ADDED: Cisco PSB security compliance exception has been added by IPSEC key engine for use of MD5 *Aug 23 03:23:00.876: %CRYPTO_ENGINE-5-CSDL_COMPLIANCE_EXCEPTION_ADDED: Cisco PSB security compliance exception has been added by IPSEC key engine for use of DES *Aug 23 03:23:00.966: %CRYPTO_ENGINE-5-CSDL_COMPLIANCE_EXCEPTION_ADDED: Cisco PSB security compliance exception has been added by Syslog Traps for use of MD5 *Aug 23 03:23:00.966: %CRYPTO_ENGINE-5-CSDL_COMPLIANCE_EXCEPTION_ADDED: Cisco PSB security compliance exception has been added by Syslog Traps for use of DES *Aug 23 03:23:00.967: %CRYPTO_ENGINE-5-CSDL_COMPLIANCE_EXCEPTION_ADDED: Cisco PSB security compliance exception has been added by Syslog Traps for use of 3DES *Aug 23 03:23:01.581: %LINK-3-UPDOWN: Interface Lsmpi0, changed state to up *Aug 23 03:23:01.620: %LINK-3-UPDOWN: Interface EOBC0, changed state to up *Aug 23 03:23:01.621: %LINK-3-UPDOWN: Interface LIIN0, changed state to up *Aug 23 03:23:01.706: %CRYPTO_ENGINE-5-CSDL_COMPLIANCE_EXCEPTION_ADDED: Cisco PSB security compliance exception has been added by encrypt proc for use of 3DES *Aug 23 03:23:01.706: %CRYPTO_ENGINE-5-CSDL_COMPLIANCE_EXCEPTION_ADDED: Cisco PSB security compliance exception has been added by encrypt proc for use of MD5 *Aug 23 03:23:01.706: %CRYPTO_ENGINE-5-CSDL_COMPLIANCE_EXCEPTION_ADDED: Cisco PSB security compliance exception has been added by encrypt proc for use of DES *Aug 23 03:23:01.778: %PNP-6-PNP_DISCOVERY_STARTED: PnP Discovery started *Aug 23 03:22:04.449: %BOOT-5-OPMODE_LOG: R0/0: binos: System booted in AUTONOMOUS mode *Aug 23 03:22:53.032: %CMLIB-6-THROUGHPUT_VALUE: R0/0: cmand: Throughput license found, throughput set to 50000 kbps *Aug 23 03:23:03.478: %LINEPROTO-5-UPDOWN: Line protocol on Interface Vlan1, changed state to down *Aug 23 03:23:03.480: %LINEPROTO-5-UPDOWN: Line protocol on Interface Lsmpi0, changed state to up *Aug 23 03:23:03.483: %LINEPROTO-5-UPDOWN: Line protocol on Interface EOBC0, changed state to up *Aug 23 03:23:03.484: %LINEPROTO-5-UPDOWN: Line protocol on Interface LIIN0, changed state to up *Aug 23 03:23:05.912: %ONEP_BASE-6-SS_ENABLED: ONEP: Service set Base was enabled by Default *Aug 23 03:23:08.373: %SYS-7-NVRAM_INIT_WAIT_TIME: Waited 0 seconds for NVRAM to be available *Aug 23 03:23:09.091: %CRYPTO_ENGINE-5-KEY_ADDITION: A key named TP-self-signed-731374665 has been generated or imported by crypto config *Aug 23 03:23:09.109: %CRYPTO_ENGINE-5-KEY_ADDITION: A key named Chillas-RTR.dibpak.com has been generated or imported by crypto config *Aug 23 03:23:09.148: %CRYPTO_ENGINE-5-CSDL_COMPLIANCE_EXCEPTION_ADDED: Cisco PSB security compliance exception has been added by PDU DISPATCHER for use of MD5 *Aug 23 03:23:09.148: %CRYPTO_ENGINE-5-CSDL_COMPLIANCE_EXCEPTION_ADDED: Cisco PSB security compliance exception has been added by PDU DISPATCHER for use of DES *Aug 23 03:23:09.148: %CRYPTO_ENGINE-5-CSDL_COMPLIANCE_EXCEPTION_ADDED: Cisco PSB security compliance exception has been added by PDU DISPATCHER for use of 3DES *Aug 23 03:23:09.148: %CRYPTO_ENGINE-5-CSDL_COMPLIANCE_EXCEPTION_ADDED: Cisco PSB security compliance exception has been added by SNMP ENGINE for use of MD5 *Aug 23 03:23:09.148: %CRYPTO_ENGINE-5-CSDL_COMPLIANCE_EXCEPTION_ADDED: Cisco PSB security compliance exception has been added by SNMP ENGINE for use of DES *Aug 23 03:23:09.149: %CRYPTO_ENGINE-5-CSDL_COMPLIANCE_EXCEPTION_ADDED: Cisco PSB security compliance exception has been added by SNMP ENGINE for use of 3DES *Aug 23 03:23:09.156: %CRYPTO_ENGINE-5-CSDL_COMPLIANCE_EXCEPTION_ADDED: Cisco PSB security compliance exception has been added by SNMP Traps for use of MD5 *Aug 23 03:23:09.156: %CRYPTO_ENGINE-5-CSDL_COMPLIANCE_EXCEPTION_ADDED: Cisco PSB security compliance exception has been added by SNMP Traps for use of DES *Aug 23 03:23:09.156: %CRYPTO_ENGINE-5-CSDL_COMPLIANCE_EXCEPTION_ADDED: Cisco PSB security compliance exception has been added by SNMP Traps for use of 3DES *Aug 23 03:23:09.161: %SYS-6-PRIVCFG_DECRYPT_SUCCESS: Successfully apply the private config file *Aug 23 03:23:09.731: %PKI-6-TRUSTPOINT_CREATE: Trustpoint: TP-self-signed-731374665 created succesfully *Aug 23 03:23:09.741: %PKI-6-TRUSTPOINT_CREATE: Trustpoint: SLA-TrustPoint created succesfully *Aug 23 03:23:10.501: %OSPF-6-DFT_OPT: Protocol timers for fast convergence are Enabled. *Aug 23 03:23:10.746: %LINEPROTO-5-UPDOWN: Line protocol on Interface Vlan2, changed state to down *Aug 23 03:23:11.102: %LINEPROTO-5-UPDOWN: Line protocol on Interface Tunnel100, changed state to down *Aug 23 03:23:11.186: %AAAA-4-CLI_DEPRECATED: WARNING: Command has been added to the configuration using a type 0 password. However, recommended to migrate to strong type-6 encryption *Aug 23 03:23:11.187: %AAAA-4-CLI_DEPRECATED: WARNING: Command has been added to the configuration using a type 0 password. However, recommended to migrate to strong type-6 encryption *Aug 23 03:23:11.189: %AAAA-4-CLI_DEPRECATED: WARNING: Command has been added to the configuration using a type 0 password. However, recommended to migrate to strong type-6 encryption *Aug 23 03:23:11.189: %AAAA-4-CLI_DEPRECATED: WARNING: Command has been added to the configuration using a type 0 password. However, recommended to migrate to strong type-6 encryption *Aug 23 03:23:11.209: %LINEPROTO-5-UPDOWN: Line protocol on Interface Tunnel300, changed state to down *Aug 23 03:23:11.278: %SYS-5-CONFIG_I: Configured from memory by console *Aug 23 03:23:11.341: %LINEPROTO-5-UPDOWN: Line protocol on Interface Tunnel600, changed state to down *Aug 23 03:23:11.503: %LINEPROTO-5-UPDOWN: Line protocol on Interface Vlan14, changed state to down *Aug 23 03:23:11.504: %LINEPROTO-5-UPDOWN: Line protocol on Interface Vlan300, changed state to down *Aug 23 03:23:11.535: %IOSXE_OIR-6-REMSPA: SPA removed from subslot 0/0, interfaces disabled *Aug 23 03:23:11.535: %IOSXE_OIR-6-REMSPA: SPA removed from subslot 0/1, interfaces disabled *Aug 23 03:23:11.552: %SPA_OIR-6-OFFLINECARD: SPA (C1121-2x1GE) offline in subslot 0/0 *Aug 23 03:23:11.561: %SPA_OIR-6-OFFLINECARD: SPA (C1121-ES-4) offline in subslot 0/1 *Aug 23 03:23:11.675: %IOSXE_OIR-6-INSCARD: Card (fp) inserted in slot F0 *Aug 23 03:23:11.675: %IOSXE_OIR-6-ONLINECARD: Card (fp) online in slot F0 *Aug 23 03:23:11.753: %IOSXE_OIR-6-INSCARD: Card (cc) inserted in slot 0 *Aug 23 03:23:11.753: %IOSXE_OIR-6-ONLINECARD: Card (cc) online in slot 0 *Aug 23 03:23:12.080: %IOSXE_OIR-6-INSSPA: SPA inserted in subslot 0/0 *Aug 23 03:23:12.083: %IOSXE_OIR-6-INSSPA: SPA inserted in subslot 0/1 *Aug 23 03:23:12.493: %SSH-5-ENABLED: SSH 2.0 has been enabled *Aug 23 03:23:12.612: %CRYPTO-6-ISAKMP_ON_OFF: ISAKMP is OFF *Aug 23 03:23:12.613: %CRYPTO-6-GDOI_ON_OFF: GDOI is OFF *Aug 23 03:23:12.686: %CRYPTO-6-ISAKMP_ON_OFF: ISAKMP is ON *Aug 23 03:23:13.323: %SYS-5-RESTART: System restarted -- Cisco IOS Software [Bengaluru], ISR Software (ARMV8EL_LINUX_IOSD-UNIVERSALK9-M), Version 17.6.5, RELEASE SOFTWARE (fc2) Technical Support: http://www.cisco.com/techsupport Copyright (c) 1986-2023 by Cisco Systems, Inc. Compiled Wed 25-Jan-23 15:15 by mcpre *Aug 23 03:23:14.203: %SNMP-5-COLDSTART: SNMP agent on host Chillas-RTR is undergoing a cold start *Aug 23 03:23:17.207: %LINK-3-UPDOWN: Interface GigabitEthernet0/1/0, changed state to down *Aug 23 03:23:17.224: %LINK-3-UPDOWN: Interface GigabitEthernet0/1/1, changed state to down *Aug 23 03:23:17.227: %LINK-3-UPDOWN: Interface GigabitEthernet0/1/2, changed state to down *Aug 23 03:23:17.232: %LINK-3-UPDOWN: Interface GigabitEthernet0/1/3, changed state to down *Aug 23 03:23:18.796: %LINEPROTO-5-UPDOWN: Line protocol on Interface GigabitEthernet0/1/0, changed state to down *Aug 23 03:23:18.797: %LINEPROTO-5-UPDOWN: Line protocol on Interface GigabitEthernet0/1/1, changed state to down *Aug 23 03:23:18.797: %LINEPROTO-5-UPDOWN: Line protocol on Interface GigabitEthernet0/1/2, changed state to down *Aug 23 03:23:18.798: %LINEPROTO-5-UPDOWN: Line protocol on Interface GigabitEthernet0/1/3, changed state to down *Aug 23 03:23:18.868: %PNP-6-PNP_BEST_UDI_UPDATE: Best UDI [PID:C1121-4P,VID:V01,SN:FGL2347L4D9] identified via (entity-mibs) *Aug 23 03:23:18.869: %PNP-6-PNP_CDP_UPDATE: Device UDI [PID:C1121-4P,VID:V01,SN:FGL2347L4D9] identified for CDP *Aug 23 03:23:18.870: %PNP-6-PNP_DISCOVERY_STOPPED: PnP Discovery stopped (Startup Config Present) *Aug 23 03:23:20.887: %CRYPTO-6-GDOI_ON_OFF: GDOI is OFF *Aug 23 03:23:20.963: %SPA_OIR-6-ONLINECARD: SPA (C1121-ES-4) online in subslot 0/1 *Aug 23 03:23:21.309: %PKI-6-TRUSTPOINT_CREATE: Trustpoint: CISCO_IDEVID_SUDI created succesfully *Aug 23 03:23:21.332: %CRYPTO_ENGINE-5-KEY_ADDITION: A key named CISCO_IDEVID_SUDI has been generated or imported by pki-sudi *Aug 23 03:23:21.360: %PKI-6-TRUSTPOINT_CREATE: Trustpoint: CISCO_IDEVID_SUDI0 created succesfully *Aug 23 03:23:21.368: %PKI-2-NON_AUTHORITATIVE_CLOCK: PKI functions can not be initialized until an authoritative time source, like NTP, can be obtained. *Aug 23 03:23:21.864: %SYS-5-CONFIG_P: Configured programmatically by process EPM CREATE DEFAULT CWA URL ACL from console as console *Aug 23 03:23:23.285: %SPA_OIR-6-ONLINECARD: SPA (C1121-2x1GE) online in subslot 0/0 *Aug 23 03:23:25.127: %LINK-3-UPDOWN: Interface GigabitEthernet0/0/0, changed state to down *Aug 23 03:23:27.358: %CRYPTO_ENGINE-5-KEY_ADDITION: A key named TP-self-signed-731374665.server has been generated or imported by crypto-engine *Aug 23 03:23:28.611: %LINK-3-UPDOWN: Interface GigabitEthernet0/1/0, changed state to up *Aug 23 03:23:30.028: %LINK-3-UPDOWN: Interface GigabitEthernet0/0/0, changed state to up *Aug 23 03:23:30.038: %LINK-3-UPDOWN: Interface GigabitEthernet0/0/1, changed state to up *Aug 23 03:23:30.617: %LINEPROTO-5-UPDOWN: Line protocol on Interface GigabitEthernet0/1/0, changed state to up *Aug 23 03:23:31.028: %LINEPROTO-5-UPDOWN: Line protocol on Interface GigabitEthernet0/0/0, changed state to up *Aug 23 03:23:31.043: %LINEPROTO-5-UPDOWN: Line protocol on Interface GigabitEthernet0/0/1, changed state to up *Aug 23 03:23:32.644: %LINEPROTO-5-UPDOWN: Line protocol on Interface Vlan1, changed state to up *Aug 23 03:23:32.652: %LINEPROTO-5-UPDOWN: Line protocol on Interface Vlan2, changed state to up *Aug 23 03:23:32.655: %LINEPROTO-5-UPDOWN: Line protocol on Interface Vlan14, changed state to up *Aug 23 03:23:32.661: %LINEPROTO-5-UPDOWN: Line protocol on Interface Vlan300, changed state to up *Aug 23 03:23:36.657: %LINEPROTO-5-UPDOWN: Line protocol on Interface Tunnel100, changed state to up *Aug 23 03:23:44.367: %CALL_HOME-6-CALL_HOME_ENABLED: Call-home is enabled by Smart Agent for Licensing. *Aug 23 03:23:51.140: %SMART_LIC-6-REPORTING_REQUIRED: A Usage report acknowledgement will be required in 56 days. *Aug 23 03:23:51.875: %OSPF-5-ADJCHG: Process 100, Nbr 10.1.22.5 on Tunnel100 from LOADING to FULL, Loading Done *Aug 23 03:23:58.786: %DHCPD-4-PING_CONFLICT: DHCP address conflict: server pinged 172.27.24.226. *Aug 23 03:24:01.703: %CRYPTO_ENGINE-4-CSDL_COMPLIANCE_RSA_WEAK_KEYS: RSA keypair Chillas-RTR.dibpak.com is in violation of Cisco security compliance guidelines and will be rejected by future releases. *Aug 23 03:26:07.972: %SMART_LIC-3-COMM_FAILED: Communications failure with the Cisco Smart License Utility (CSLU) : Unable to resolve server hostname/domain name *Aug 23 03:26:41.279: %DHCPD-4-PING_CONFLICT: DHCP address conflict: server pinged 172.19.62.130. *Aug 23 03:31:35.753: %LINEPROTO-5-UPDOWN: Line protocol on Interface Tunnel600, changed state to up *Aug 23 03:31:35.782: %LINEPROTO-5-UPDOWN: Line protocol on Interface Tunnel300, changed state to up *Aug 23 03:31:42.189: %OSPF-5-ADJCHG: Process 100, Nbr 10.97.0.78 on Tunnel600 from LOADING to FULL, Loading Done *Aug 23 03:31:45.062: %OSPF-5-ADJCHG: Process 100, Nbr 10.1.23.5 on Tunnel300 from LOADING to FULL, Loading Done *Aug 23 03:34:25.627: %LINEPROTO-5-UPDOWN: Line protocol on Interface Tunnel300, changed state to down *Aug 23 03:34:25.634: %OSPF-5-ADJCHG: Process 100, Nbr 10.1.23.5 on Tunnel300 from FULL to DOWN, Neighbor Down: Interface down or detached *Aug 23 03:34:27.615: %LINEPROTO-5-UPDOWN: Line protocol on Interface Tunnel600, changed state to down *Aug 23 03:34:27.619: %OSPF-5-ADJCHG: Process 100, Nbr 10.97.0.78 on Tunnel600 from FULL to DOWN, Neighbor Down: Interface down or detached *Aug 23 03:40:49.676: %LINEPROTO-5-UPDOWN: Line protocol on Interface Tunnel600, changed state to up *Aug 23 03:40:49.721: %LINEPROTO-5-UPDOWN: Line protocol on Interface Tunnel300, changed state to up *Aug 23 03:40:52.804: %OSPF-5-ADJCHG: Process 100, Nbr 10.97.0.78 on Tunnel600 from LOADING to FULL, Loading Done *Aug 23 03:40:55.691: %OSPF-5-ADJCHG: Process 100, Nbr 10.1.23.5 on Tunnel300 from LOADING to FULL, Loading Done *Aug 23 03:47:01.624: %LINEPROTO-5-UPDOWN: Line protocol on Interface Tunnel300, changed state to down *Aug 23 03:47:01.628: %OSPF-5-ADJCHG: Process 100, Nbr 10.1.23.5 on Tunnel300 from FULL to DOWN, Neighbor Down: Interface down or detached *Aug 23 03:47:05.623: %LINEPROTO-5-UPDOWN: Line protocol on Interface Tunnel600, changed state to down *Aug 23 03:47:05.630: %OSPF-5-ADJCHG: Process 100, Nbr 10.97.0.78 on Tunnel600 from FULL to DOWN, Neighbor Down: Interface down or detached *Aug 23 03:50:43.925: %LINEPROTO-5-UPDOWN: Line protocol on Interface Tunnel600, changed state to up *Aug 23 03:50:43.969: %LINEPROTO-5-UPDOWN: Line protocol on Interface Tunnel300, changed state to up *Aug 23 03:50:44.889: %OSPF-5-ADJCHG: Process 100, Nbr 10.1.23.5 on Tunnel300 from LOADING to FULL, Loading Done *Aug 23 03:50:56.245: %OSPF-5-ADJCHG: Process 100, Nbr 10.97.0.78 on Tunnel600 from LOADING to FULL, Loading Done *Aug 23 05:57:55.778: %CRYPTO_ENGINE-5-CSDL_COMPLIANCE_EXCEPTION_ADDED: Cisco PSB security compliance exception has been added by SSH Process for use of MD5 *Aug 23 05:58:06.305: %SEC_LOGIN-5-LOGIN_SUCCESS: Login Success [user: raza.shah] [Source: 172.16.3.48] [localport: 22] at 05:58:06 UTC Fri Aug 23 2024 *Aug 23 06:00:08.992: %SYS-6-LOGOUT: User raza.shah has exited tty session 1(172.16.3.48) *Aug 23 06:06:44.852: %CRYPTO_ENGINE-5-CSDL_COMPLIANCE_EXCEPTION_ADDED: Cisco PSB security compliance exception has been added by SSH Process for use of MD5 *Aug 23 06:06:56.785: %SEC_LOGIN-5-LOGIN_SUCCESS: Login Success [user: kamran.akhtar] [Source: 172.16.3.110] [localport: 22] at 06:06:56 UTC Fri Aug 23 2024 Chillas-RTR#