MY-ASA-1a# debug crypto ikev1 255 MY-ASA-1a# MY-ASA-1a# # MY-ASA-1a# ################################# MY-ASA-1a# MY-ASA-1a# MY-ASA-1a# Dec 12 14:17:00 [IKEv1]IKE Receiver: Packet received on ### ASA-WAN-IP ###:500 from ### TP-LINK-WAN-IP ###:500 IKEv1 Recv RAW packet dump 50 f5 83 10 93 d7 ed 6b 00 00 00 00 00 00 00 00 | P......k........ 01 10 02 00 00 00 00 00 00 00 00 6c 0d 00 00 3c | ...........l...< 00 00 00 01 00 00 00 01 00 00 00 30 01 01 00 01 | ...........0.... 00 00 00 28 01 01 00 00 80 0b 00 01 00 0c 00 04 | ...(............ 00 01 51 80 80 01 00 07 80 0e 01 00 80 03 00 01 | ..Q............. 80 02 00 02 80 04 00 02 00 00 00 14 af ca d7 13 | ................ 68 a1 f1 c9 6b 86 96 fc 77 57 01 00 | h...k...wW.. RECV PACKET from ### TP-LINK-WAN-IP ### ISAKMP Header Initiator COOKIE: 50 f5 83 10 93 d7 ed 6b Responder COOKIE: 00 00 00 00 00 00 00 00 Next Payload: Security Association Version: 1.0 Exchange Type: Identity Protection (Main Mode) Flags: (none) MessageID: 00000000 Length: 1811939328 Payload Security Association Next Payload: Vendor ID Reserved: 00 Payload Length: 60 DOI: IPsec Situation:(SIT_IDENTITY_ONLY) Payload Proposal Next Payload: None Reserved: 00 Payload Length: 48 Proposal #: 1 Protocol-Id: PROTO_ISAKMP SPI Size: 0 # of transforms: 1 Payload Transform Next Payload: None Reserved: 00 Payload Length: 40 Transform #: 1 Transform-Id: KEY_IKE Reserved2: 0000 Life Type: seconds Life Duration (Hex): 00 01 51 80 Encryption Algorithm: AES-CBC Key Length: 256 Authentication Method: Preshared key Hash Algorithm: SHA1 Group Description: Group 2 Payload Vendor ID Next Payload: None Reserved: 00 Payload Length: 20 Data (In Hex): af ca d7 13 68 a1 f1 c9 6b 86 96 fc 77 57 01 00 Dec 12 14:17:00 [IKEv1]IP = ### TP-LINK-WAN-IP ###, IKE_DECODE RECEIVED Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 108 Dec 12 14:17:00 [IKEv1 DEBUG]IP = ### TP-LINK-WAN-IP ###, processing SA payload Dec 12 14:17:00 [IKEv1 DEBUG]IP = ### TP-LINK-WAN-IP ###, Oakley proposal is acceptable Dec 12 14:17:00 [IKEv1 DEBUG]IP = ### TP-LINK-WAN-IP ###, processing VID payload Dec 12 14:17:00 [IKEv1 DEBUG]IP = ### TP-LINK-WAN-IP ###, Received DPD VID Dec 12 14:17:00 [IKEv1 DEBUG]IP = ### TP-LINK-WAN-IP ###, processing IKE SA payload Dec 12 14:17:00 [IKEv1 DEBUG]IP = ### TP-LINK-WAN-IP ###, IKE SA Proposal # 1, Transform # 1 acceptable Matches global IKE entry # 5 Dec 12 14:17:00 [IKEv1 DEBUG]IP = ### TP-LINK-WAN-IP ###, constructing ISAKMP SA payload Dec 12 14:17:00 [IKEv1 DEBUG]IP = ### TP-LINK-WAN-IP ###, constructing Fragmentation VID + extended capabilities payload Dec 12 14:17:00 [IKEv1]IP = ### TP-LINK-WAN-IP ###, IKE_DECODE SENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 112 SENDING PACKET to ### TP-LINK-WAN-IP ### ISAKMP Header Initiator COOKIE: 50 f5 83 10 93 d7 ed 6b Responder COOKIE: 87 19 f1 4b bc a7 ef 46 Next Payload: Security Association Version: 1.0 Exchange Type: Identity Protection (Main Mode) Flags: (none) MessageID: 00000000 Length: 1879048192 Dec 12 14:17:00 [IKEv1]IKE Receiver: Packet received on ### ASA-WAN-IP ###:500 from ### TP-LINK-WAN-IP ###:500 IKEv1 Recv RAW packet dump 50 f5 83 10 93 d7 ed 6b 87 19 f1 4b bc a7 ef 46 | P......k...K...F 04 10 02 00 00 00 00 00 00 00 00 b4 0a 00 00 84 | ................ 76 86 c9 6b d3 6b ae 07 6f 1c 30 43 69 e4 7d 20 | v..k.k..o.0Ci.} c3 1b e2 ef 03 c4 a7 25 25 ba 6e 35 15 fa 0b 09 | .......%%.n5.... e7 5c df 70 b3 55 0f ea e0 37 2d be 11 7f 6c c8 | .\.p.U...7-..l. 2f 0c 86 76 92 16 45 a2 e0 1f f8 e4 77 56 1d 33 | /..v..E.....wV.3 a5 a8 b9 db b5 5e 48 d0 1e 3a c7 c2 1d ca e4 52 | .....^H..:.....R 1a b7 28 90 75 01 d6 e5 71 47 26 fb 4b ae a9 80 | ..(.u...qG&.K... 7c 28 6d cb 3f ec 83 1c 31 93 ed 89 e5 13 78 52 | |(m.?...1.....xR fd 29 87 47 04 3d e6 b2 5e c1 11 80 d6 08 30 99 | .).G.=..^.....0. 00 00 00 14 aa 7d d5 77 69 5d 6b fa a9 64 32 6c | .....}.wi]k..d2l c7 da ac 80 | .... RECV PACKET from ### TP-LINK-WAN-IP ### ISAKMP Header Initiator COOKIE: 50 f5 83 10 93 d7 ed 6b Responder COOKIE: 87 19 f1 4b bc a7 ef 46 Next Payload: Key Exchange Version: 1.0 Exchange Type: Identity Protection (Main Mode) Flags: (none) MessageID: 00000000 Length: 3019898880 Payload Key Exchange Next Payload: Nonce Reserved: 00 Payload Length: 132 Data: 76 86 c9 6b d3 6b ae 07 6f 1c 30 43 69 e4 7d 20 c3 1b e2 ef 03 c4 a7 25 25 ba 6e 35 15 fa 0b 09 e7 5c df 70 b3 55 0f ea e0 37 2d be 11 7f 6c c8 2f 0c 86 76 92 16 45 a2 e0 1f f8 e4 77 56 1d 33 a5 a8 b9 db b5 5e 48 d0 1e 3a c7 c2 1d ca e4 52 1a b7 28 90 75 01 d6 e5 71 47 26 fb 4b ae a9 80 7c 28 6d cb 3f ec 83 1c 31 93 ed 89 e5 13 78 52 fd 29 87 47 04 3d e6 b2 5e c1 11 80 d6 08 30 99 Payload Nonce Next Payload: None Reserved: 00 Payload Length: 20 Data: aa 7d d5 77 69 5d 6b fa a9 64 32 6c c7 da ac 80 Dec 12 14:17:00 [IKEv1]IP = ### TP-LINK-WAN-IP ###, IKE_DECODE RECEIVED Message (msgid=0) with payloads : HDR + KE (4) + NONCE (10) + NONE (0) total length : 180 Dec 12 14:17:00 [IKEv1 DEBUG]IP = ### TP-LINK-WAN-IP ###, processing ke payload Dec 12 14:17:00 [IKEv1 DEBUG]IP = ### TP-LINK-WAN-IP ###, processing ISA_KE payload Dec 12 14:17:00 [IKEv1 DEBUG]IP = ### TP-LINK-WAN-IP ###, processing nonce payload Dec 12 14:17:00 [IKEv1 DEBUG]IP = ### TP-LINK-WAN-IP ###, constructing ke payload Dec 12 14:17:00 [IKEv1 DEBUG]IP = ### TP-LINK-WAN-IP ###, constructing nonce payload Dec 12 14:17:00 [IKEv1 DEBUG]IP = ### TP-LINK-WAN-IP ###, constructing Cisco Unity VID payload Dec 12 14:17:00 [IKEv1 DEBUG]IP = ### TP-LINK-WAN-IP ###, constructing xauth V6 VID payload Dec 12 14:17:00 [IKEv1 DEBUG]IP = ### TP-LINK-WAN-IP ###, Send IOS VID Dec 12 14:17:00 [IKEv1 DEBUG]IP = ### TP-LINK-WAN-IP ###, Constructing ASA spoofing IOS Vendor ID payload (version: 1.0.0, capabilities: 20000001) Dec 12 14:17:00 [IKEv1 DEBUG]IP = ### TP-LINK-WAN-IP ###, constructing VID payload Dec 12 14:17:00 [IKEv1 DEBUG]IP = ### TP-LINK-WAN-IP ###, Send Altiga/Cisco VPN3000/Cisco ASA GW VID Dec 12 14:17:00 [IKEv1]IP = ### TP-LINK-WAN-IP ###, Connection landed on tunnel_group DefaultL2LGroup Dec 12 14:17:00 [IKEv1 DEBUG]Group = DefaultL2LGroup, IP = ### TP-LINK-WAN-IP ###, Generating keys for Responder... Dec 12 14:17:00 [IKEv1]IP = ### TP-LINK-WAN-IP ###, IKE_DECODE SENDING Message (msgid=0) with payloads : HDR + KE (4) + NONCE (10) + VENDOR (13) + VENDOR (13) + VENDOR (13) + VENDOR (13) + NONE (0) total length : 256 SENDING PACKET to ### TP-LINK-WAN-IP ### ISAKMP Header Initiator COOKIE: 50 f5 83 10 93 d7 ed 6b Responder COOKIE: 87 19 f1 4b bc a7 ef 46 Next Payload: Key Exchange Version: 1.0 Exchange Type: Identity Protection (Main Mode) Flags: (none) MessageID: 00000000 Length: 65536 Dec 12 14:17:00 [IKEv1]IKE Receiver: Packet received on ### ASA-WAN-IP ###:500 from ### TP-LINK-WAN-IP ###:500 IKEv1 Recv RAW packet dump 50 f5 83 10 93 d7 ed 6b 87 19 f1 4b bc a7 ef 46 | P......k...K...F 05 10 02 01 00 00 00 00 00 00 00 4c f2 cb e0 d1 | ...........L.... ed 64 54 fb 75 36 70 52 98 5d 95 ba 81 85 70 5f | .dT.u6pR.]....p_ 9b c9 83 88 64 94 e6 61 40 65 38 39 7d 0b 9d ac | ....d..a@e89}... c7 a8 5d 10 44 a2 7b 4a 44 9a f3 3e | ..].D.{JD..> RECV PACKET from ### TP-LINK-WAN-IP ### ISAKMP Header Initiator COOKIE: 50 f5 83 10 93 d7 ed 6b Responder COOKIE: 87 19 f1 4b bc a7 ef 46 Next Payload: Identification Version: 1.0 Exchange Type: Identity Protection (Main Mode) Flags: (Encryption) MessageID: 00000000 Length: 76 AFTER DECRYPTION ISAKMP Header Initiator COOKIE: 50 f5 83 10 93 d7 ed 6b Responder COOKIE: 87 19 f1 4b bc a7 ef 46 Next Payload: Identification Version: 1.0 Exchange Type: Identity Protection (Main Mode) Flags: (Encryption) MessageID: 00000000 Length: 76 Payload Identification Next Payload: Hash Reserved: 00 Payload Length: 12 ID Type: IPv4 Address (1) Protocol ID (UDP/TCP, etc...): 17 Port: 500 ID Data: 192.168.255.2 Payload Hash Next Payload: None Reserved: 00 Payload Length: 24 Data: 26 8a 9c 91 8d ab 3b b4 e5 66 98 7c c2 a8 36 b4 29 c0 fa 23 Dec 12 14:17:00 [IKEv1]IP = ### TP-LINK-WAN-IP ###, IKE_DECODE RECEIVED Message (msgid=0) with payloads : HDR + ID (5) + HASH (8) + NONE (0) total length : 64 Dec 12 14:17:00 [IKEv1 DEBUG]Group = DefaultL2LGroup, IP = ### TP-LINK-WAN-IP ###, processing ID payload Dec 12 14:17:00 [IKEv1 DECODE]Group = DefaultL2LGroup, IP = ### TP-LINK-WAN-IP ###, ID_IPV4_ADDR ID received 192.168.255.2 Dec 12 14:17:00 [IKEv1 DEBUG]Group = DefaultL2LGroup, IP = ### TP-LINK-WAN-IP ###, processing hash payload Dec 12 14:17:00 [IKEv1 DEBUG]Group = DefaultL2LGroup, IP = ### TP-LINK-WAN-IP ###, Computing hash for ISAKMP Dec 12 14:17:00 [IKEv1]IP = ### TP-LINK-WAN-IP ###, Connection landed on tunnel_group DefaultL2LGroup Dec 12 14:17:00 [IKEv1 DEBUG]Group = DefaultL2LGroup, IP = ### TP-LINK-WAN-IP ###, constructing ID payload Dec 12 14:17:00 [IKEv1 DEBUG]Group = DefaultL2LGroup, IP = ### TP-LINK-WAN-IP ###, constructing hash payload Dec 12 14:17:00 [IKEv1 DEBUG]Group = DefaultL2LGroup, IP = ### TP-LINK-WAN-IP ###, Computing hash for ISAKMP Dec 12 14:17:00 [IKEv1 DEBUG]Group = DefaultL2LGroup, IP = ### TP-LINK-WAN-IP ###, constructing dpd vid payload Dec 12 14:17:00 [IKEv1]IP = ### TP-LINK-WAN-IP ###, IKE_DECODE SENDING Message (msgid=0) with payloads : HDR + ID (5) + HASH (8) + VENDOR (13) + NONE (0) total length : 84 BEFORE ENCRYPTION RAW PACKET DUMP on SEND 50 f5 83 10 93 d7 ed 6b 87 19 f1 4b bc a7 ef 46 | P......k...K...F 05 10 02 00 00 00 00 00 1c 00 00 00 08 00 00 0c | ................ 01 11 01 f4 c3 0b bf dc 0d 00 00 18 74 55 c7 fb | ............tU.. 33 8a ef f3 b1 03 32 c8 9f 7a ee fb 30 36 1a 72 | 3.....2..z..06.r 00 00 00 14 af ca d7 13 68 a1 f1 c9 6b 86 96 fc | ........h...k... 77 57 01 00 | wW.. ISAKMP Header Initiator COOKIE: 50 f5 83 10 93 d7 ed 6b Responder COOKIE: 87 19 f1 4b bc a7 ef 46 Next Payload: Identification Version: 1.0 Exchange Type: Identity Protection (Main Mode) Flags: (none) MessageID: 00000000 Length: 28 Payload Identification Next Payload: Hash Reserved: 00 Payload Length: 12 ID Type: IPv4 Address (1) Protocol ID (UDP/TCP, etc...): 17 Port: 500 ID Data: ### ASA-WAN-IP ### Payload Hash Next Payload: Vendor ID Reserved: 00 Payload Length: 24 Data: 74 55 c7 fb 33 8a ef f3 b1 03 32 c8 9f 7a ee fb 30 36 1a 72 Payload Vendor ID Next Payload: None Reserved: 00 Payload Length: 20 Data (In Hex): af ca d7 13 68 a1 f1 c9 6b 86 96 fc 77 57 01 00 SENDING PACKET to ### TP-LINK-WAN-IP ### ISAKMP Header Initiator COOKIE: 50 f5 83 10 93 d7 ed 6b Responder COOKIE: 87 19 f1 4b bc a7 ef 46 Next Payload: Identification Version: 1.0 Exchange Type: Identity Protection (Main Mode) Flags: (Encryption) MessageID: 00000000 Length: 92 Dec 12 14:17:00 [IKEv1]Group = DefaultL2LGroup, IP = ### TP-LINK-WAN-IP ###, PHASE 1 COMPLETED Dec 12 14:17:00 [IKEv1]IP = ### TP-LINK-WAN-IP ###, Keep-alive type for this connection: DPD Dec 12 14:17:00 [IKEv1 DEBUG]Group = DefaultL2LGroup, IP = ### TP-LINK-WAN-IP ###, Starting P1 rekey timer: 64800 seconds. Dec 12 14:17:00 [IKEv1]Group = DefaultL2LGroup, IP = ### TP-LINK-WAN-IP ###, Add to IKEv1 Tunnel Table succeeded for SA with logical ID 835584 Dec 12 14:17:00 [IKEv1]Group = DefaultL2LGroup, IP = ### TP-LINK-WAN-IP ###, Add to IKEv1 MIB Table succeeded for SA with logical ID 835584 Dec 12 14:17:01 [IKEv1]IKE Receiver: Packet received on ### ASA-WAN-IP ###:500 from ### TP-LINK-WAN-IP ###:500 IKEv1 Recv RAW packet dump 50 f5 83 10 93 d7 ed 6b 87 19 f1 4b bc a7 ef 46 | P......k...K...F 08 10 20 01 98 f7 b8 57 00 00 00 ac bd 5d 36 16 | .. ....W.....]6. 59 cf 4e 6e c3 9d 44 84 f2 8d 90 b5 74 13 4e 58 | Y.Nn..D.....t.NX 87 6c 19 f7 ae 41 a4 03 e6 c8 39 3e ed f4 10 8f | .l...A....9>.... 3a ae 12 28 63 47 bf e9 47 18 5b a5 69 82 8a 6f | :..(cG..G.[.i..o 98 2a bc 63 2a b6 61 56 43 fa 91 c9 b9 b2 e4 91 | .*.c*.aVC....... b2 62 99 98 7a e3 1b 2c 55 df 9b 36 71 07 e3 cf | .b..z..,U..6q... fa 9b e5 14 4e 53 4c 06 dc 7f 46 a0 ff 1b 3a 5b | ....NSL..F...:[ 23 dc 71 35 da 9b 1e 74 33 26 7f ff 52 d4 15 ff | #.q5...t3&.R... b5 89 6b 1b 84 23 cf b2 26 04 ab 54 5b b9 52 7e | ..k..#..&..T[.R~ 52 06 65 3f 76 a1 49 44 8d a4 af 92 | R.e?v.ID.... RECV PACKET from ### TP-LINK-WAN-IP ### ISAKMP Header Initiator COOKIE: 50 f5 83 10 93 d7 ed 6b Responder COOKIE: 87 19 f1 4b bc a7 ef 46 Next Payload: Hash Version: 1.0 Exchange Type: Quick Mode Flags: (Encryption) MessageID: 98F7B857 Length: 172 Dec 12 14:17:01 [IKEv1 DECODE]IP = ### TP-LINK-WAN-IP ###, IKE Responder starting QM: msg id = 98f7b857 AFTER DECRYPTION ISAKMP Header Initiator COOKIE: 50 f5 83 10 93 d7 ed 6b Responder COOKIE: 87 19 f1 4b bc a7 ef 46 Next Payload: Hash Version: 1.0 Exchange Type: Quick Mode Flags: (Encryption) MessageID: 98F7B857 Length: 172 Payload Hash Next Payload: Security Association Reserved: 00 Payload Length: 24 Data: 51 22 47 7a ce 68 c1 30 e4 67 3d f6 6f ae 4c 60 e6 85 84 15 Payload Security Association Next Payload: Nonce Reserved: 00 Payload Length: 56 DOI: IPsec Situation:(SIT_IDENTITY_ONLY) Payload Proposal Next Payload: None Reserved: 00 Payload Length: 44 Proposal #: 1 Protocol-Id: PROTO_IPSEC_ESP SPI Size: 4 # of transforms: 1 SPI: 0d 59 51 79 Payload Transform Next Payload: None Reserved: 00 Payload Length: 32 Transform #: 1 Transform-Id: ESP_AES Reserved2: 0000 Life Type: Seconds Life Duration (Hex): 00 01 51 80 Encapsulation Mode: Tunnel Key Length: 256 Authentication Algorithm: SHA1 Payload Nonce Next Payload: Identification Reserved: 00 Payload Length: 20 Data: cf 0c d4 b4 00 94 f4 a6 8d 2c f9 ef e7 f8 dd 07 Payload Identification Next Payload: Identification Reserved: 00 Payload Length: 16 ID Type: IPv4 Subnet (4) Protocol ID (UDP/TCP, etc...): 0 Port: 0 ID Data: 172.29.1.0/255.255.255.0 Payload Identification Next Payload: None Reserved: 00 Payload Length: 16 ID Type: IPv4 Subnet (4) Protocol ID (UDP/TCP, etc...): 0 Port: 0 ID Data: 10.100.1.0/255.255.255.0 Dec 12 14:17:01 [IKEv1]IP = ### TP-LINK-WAN-IP ###, IKE_DECODE RECEIVED Message (msgid=98f7b857) with payloads : HDR + HASH (8) + SA (1) + NONCE (10) + ID (5) + ID (5) + NONE (0) total length : 160 Dec 12 14:17:01 [IKEv1 DEBUG]Group = DefaultL2LGroup, IP = ### TP-LINK-WAN-IP ###, processing hash payload Dec 12 14:17:01 [IKEv1 DEBUG]Group = DefaultL2LGroup, IP = ### TP-LINK-WAN-IP ###, processing SA payload Dec 12 14:17:01 [IKEv1 DEBUG]Group = DefaultL2LGroup, IP = ### TP-LINK-WAN-IP ###, processing nonce payload Dec 12 14:17:01 [IKEv1 DEBUG]Group = DefaultL2LGroup, IP = ### TP-LINK-WAN-IP ###, processing ID payload Dec 12 14:17:01 [IKEv1 DECODE]Group = DefaultL2LGroup, IP = ### TP-LINK-WAN-IP ###, ID_IPV4_ADDR_SUBNET ID received--172.29.1.0--255.255.255.0 Dec 12 14:17:01 [IKEv1]Group = DefaultL2LGroup, IP = ### TP-LINK-WAN-IP ###, Received remote IP Proxy Subnet data in ID Payload: Address 172.29.1.0, Mask 255.255.255.0, Protocol 0, Port 0 Dec 12 14:17:01 [IKEv1 DEBUG]Group = DefaultL2LGroup, IP = ### TP-LINK-WAN-IP ###, processing ID payload Dec 12 14:17:01 [IKEv1 DECODE]Group = DefaultL2LGroup, IP = ### TP-LINK-WAN-IP ###, ID_IPV4_ADDR_SUBNET ID received--10.100.1.0--255.255.255.0 Dec 12 14:17:01 [IKEv1]Group = DefaultL2LGroup, IP = ### TP-LINK-WAN-IP ###, Received local IP Proxy Subnet data in ID Payload: Address 10.100.1.0, Mask 255.255.255.0, Protocol 0, Port 0 Dec 12 14:17:01 [IKEv1]Group = DefaultL2LGroup, IP = ### TP-LINK-WAN-IP ###, QM IsRekeyed old sa not found by addr Dec 12 14:17:01 [IKEv1]Group = DefaultL2LGroup, IP = ### TP-LINK-WAN-IP ###, Static Crypto Map check, map MY, seq = 1 is a successful match Dec 12 14:17:01 [IKEv1]Group = DefaultL2LGroup, IP = ### TP-LINK-WAN-IP ###, IKE Remote Peer configured for crypto map: MY Dec 12 14:17:01 [IKEv1 DEBUG]Group = DefaultL2LGroup, IP = ### TP-LINK-WAN-IP ###, processing IPSec SA payload Dec 12 14:17:01 [IKEv1 DEBUG]Group = DefaultL2LGroup, IP = ### TP-LINK-WAN-IP ###, IPSec SA Proposal # 1, Transform # 1 acceptable Matches global IPSec SA entry # 1 Dec 12 14:17:01 [IKEv1]Group = DefaultL2LGroup, IP = ### TP-LINK-WAN-IP ###, IKE: requesting SPI! Dec 12 14:17:01 [IKEv1 DEBUG]Group = DefaultL2LGroup, IP = ### TP-LINK-WAN-IP ###, IKE got SPI from key engine: SPI = 0x9cf86954 Dec 12 14:17:01 [IKEv1 DEBUG]Group = DefaultL2LGroup, IP = ### TP-LINK-WAN-IP ###, oakley constucting quick mode Dec 12 14:17:01 [IKEv1 DEBUG]Group = DefaultL2LGroup, IP = ### TP-LINK-WAN-IP ###, constructing blank hash payload Dec 12 14:17:01 [IKEv1 DEBUG]Group = DefaultL2LGroup, IP = ### TP-LINK-WAN-IP ###, constructing IPSec SA payload Dec 12 14:17:01 [IKEv1]Group = DefaultL2LGroup, IP = ### TP-LINK-WAN-IP ###, Overriding Initiator's IPSec rekeying duration from 86400 to 28800 seconds Dec 12 14:17:01 [IKEv1]Group = DefaultL2LGroup, IP = ### TP-LINK-WAN-IP ###, Overriding Initiator's IPSec rekeying duration from 0 to 4608000 Kbs Dec 12 14:17:01 [IKEv1 DEBUG]Group = DefaultL2LGroup, IP = ### TP-LINK-WAN-IP ###, constructing IPSec nonce payload Dec 12 14:17:01 [IKEv1 DEBUG]Group = DefaultL2LGroup, IP = ### TP-LINK-WAN-IP ###, constructing proxy ID Dec 12 14:17:01 [IKEv1 DEBUG]Group = DefaultL2LGroup, IP = ### TP-LINK-WAN-IP ###, Transmitting Proxy Id: Remote subnet: 172.29.1.0 Mask 255.255.255.0 Protocol 0 Port 0 Local subnet: 10.100.1.0 mask 255.255.255.0 Protocol 0 Port 0 Dec 12 14:17:01 [IKEv1 DEBUG]Group = DefaultL2LGroup, IP = ### TP-LINK-WAN-IP ###, Sending RESPONDER LIFETIME notification to Initiator Dec 12 14:17:01 [IKEv1 DEBUG]Group = DefaultL2LGroup, IP = ### TP-LINK-WAN-IP ###, constructing qm hash payload Dec 12 14:17:01 [IKEv1 DECODE]Group = DefaultL2LGroup, IP = ### TP-LINK-WAN-IP ###, IKE Responder sending 2nd QM pkt: msg id = 98f7b857 Dec 12 14:17:01 [IKEv1]IP = ### TP-LINK-WAN-IP ###, IKE_DECODE SENDING Message (msgid=98f7b857) with payloads : HDR + HASH (8) + SA (1) + NONCE (10) + ID (5) + ID (5) + NOTIFY (11) + NONE (0) total length : 200 BEFORE ENCRYPTION RAW PACKET DUMP on SEND 50 f5 83 10 93 d7 ed 6b 87 19 f1 4b bc a7 ef 46 | P......k...K...F 08 10 20 00 57 b8 f7 98 1c 00 00 00 01 00 00 18 | .. .W........... 77 b3 d5 af 6d d1 37 1f 8a f7 83 e9 8a a2 14 d3 | w...m.7......... 53 88 61 b2 0a 00 00 38 00 00 00 01 00 00 00 01 | S.a....8........ 00 00 00 2c 01 03 04 01 9c f8 69 54 00 00 00 20 | ...,......iT... 01 0c 00 00 80 01 00 01 00 02 00 04 00 01 51 80 | ..............Q. 80 04 00 01 80 05 00 02 80 06 01 00 05 00 00 18 | ................ 7b 69 7a 2a bf 3c 95 bf aa a4 99 44 d6 7f de b2 | {iz*.<.....D... 76 44 44 87 05 00 00 10 04 00 00 00 ac 1d 01 00 | vDD............. ff ff ff 00 0b 00 00 10 04 00 00 00 0a 64 01 00 | .............d.. ff ff ff 00 00 00 00 24 00 00 00 01 03 04 60 00 | .......$......`. 9c f8 69 54 80 01 00 01 80 02 70 80 80 01 00 02 | ..iT......p..... 00 02 00 04 00 46 50 00 | .....FP. ISAKMP Header Initiator COOKIE: 50 f5 83 10 93 d7 ed 6b Responder COOKIE: 87 19 f1 4b bc a7 ef 46 Next Payload: Hash Version: 1.0 Exchange Type: Quick Mode Flags: (none) MessageID: 98F7B857 Length: 28 Payload Hash Next Payload: Security Association Reserved: 00 Payload Length: 24 Data: 77 b3 d5 af 6d d1 37 1f 8a f7 83 e9 8a a2 14 d3 53 88 61 b2 Payload Security Association Next Payload: Nonce Reserved: 00 Payload Length: 56 DOI: IPsec Situation:(SIT_IDENTITY_ONLY) Payload Proposal Next Payload: None Reserved: 00 Payload Length: 44 Proposal #: 1 Protocol-Id: PROTO_IPSEC_ESP SPI Size: 4 # of transforms: 1 SPI: 9c f8 69 54 Payload Transform Next Payload: None Reserved: 00 Payload Length: 32 Transform #: 1 Transform-Id: ESP_AES Reserved2: 0000 Life Type: Seconds Life Duration (Hex): 00 01 51 80 Encapsulation Mode: Tunnel Authentication Algorithm: SHA1 Key Length: 256 Payload Nonce Next Payload: Identification Reserved: 00 Payload Length: 24 Data: 7b 69 7a 2a bf 3c 95 bf aa a4 99 44 d6 7f de b2 76 44 44 87 Payload Identification Next Payload: Identification Reserved: 00 Payload Length: 16 ID Type: IPv4 Subnet (4) Protocol ID (UDP/TCP, etc...): 0 Port: 0 ID Data: 172.29.1.0/255.255.255.0 Payload Identification Next Payload: Notification Reserved: 00 Payload Length: 16 ID Type: IPv4 Subnet (4) Protocol ID (UDP/TCP, etc...): 0 Port: 0 ID Data: 10.100.1.0/255.255.255.0 Payload Notification Next Payload: None Reserved: 00 Payload Length: 36 DOI: IPsec Protocol-ID: PROTO_IPSEC_ESP Spi Size: 4 Notify Type: STATUS_RESP_LIFETIME SPI: 9c f8 69 54 Data: 80 01 00 01 80 02 70 80 80 01 00 02 00 02 00 04 00 46 50 00 Dec 12 14:17:01 [IKEv1]IKE Receiver: Packet received on ### ASA-WAN-IP ###:500 from ### TP-LINK-WAN-IP ###:500 IKEv1 Recv RAW packet dump 50 f5 83 10 93 d7 ed 6b 87 19 f1 4b bc a7 ef 46 | P......k...K...F 08 10 20 01 98 f7 b8 57 00 00 00 3c 4c 13 19 ef | .. ....W...