*Jun 20 14:56:47:416 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.1/500 Sending an IPv4 packet. *Jun 20 14:56:47:417 2019 Branch_R1 IKE/7/EVENT: vrf = 0, src = 192.168.1.100, dst = 192.168.1.1/500 Sent data to socket successfully. *Jun 20 14:57:02:046 2019 Branch_R1 IKE/7/EVENT: Received packet successfully. *Jun 20 14:57:02:046 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Received packet from 192.168.1.2 source port 500 destination port 500. *Jun 20 14:57:02:046 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 I-Cookie: da00a3efe57bdbb2 R-Cookie: 0000000000000000 next payload: SA version: ISAKMP Version 1.0 exchange mode: Main flags: message ID: 0 length: 168 *Jun 20 14:57:02:046 2019 Branch_R1 IKE/7/EVENT: IKE thread 1099099873968 processes a job. *Jun 20 14:57:02:046 2019 Branch_R1 IKE/7/EVENT: Phase1 process started. *Jun 20 14:57:02:047 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Collision of phase 1 negotiation is found. *Jun 20 14:57:02:047 2019 Branch_R1 IKE/7/EVENT: Phase 1 Exchange chooses role: Local is initiator *Jun 20 14:57:04:414 2019 Branch_R1 IKE/7/EVENT: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Retransmission of phase 1 packet timed out. *Jun 20 14:57:04:415 2019 Branch_R1 IKE/7/ERROR: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Failed to negotiate IKE SA. *Jun 20 14:57:05:264 2019 Branch_R1 IKE/7/EVENT: Received message from ipsec. *Jun 20 14:57:05:264 2019 Branch_R1 IKE/7/EVENT: Received SA acquire message from IPsec. *Jun 20 14:57:05:265 2019 Branch_R1 IKE/7/EVENT: IKE thread 1099099873968 processes a job. *Jun 20 14:57:05:265 2019 Branch_R1 IKE/7/EVENT: Received SA acquire message from IPsec. *Jun 20 14:57:05:265 2019 Branch_R1 IKE/7/EVENT: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Set IPsec SA state to IKE_P2_STATE_INIT. *Jun 20 14:57:05:265 2019 Branch_R1 IKE/7/EVENT: IKE SA not found. Initiate IKE SA negotiation. *Jun 20 14:57:05:265 2019 Branch_R1 IKE/7/EVENT: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Obtained profile 2. *Jun 20 14:57:05:265 2019 Branch_R1 IKE/7/EVENT: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Initiator created an SA for peer 192.168.1.2, local port 500, remote port 500. *Jun 20 14:57:05:265 2019 Branch_R1 IKE/7/EVENT: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Set IKE SA state to IKE_P1_STATE_INIT. *Jun 20 14:57:05:265 2019 Branch_R1 IKE/7/EVENT: IKE thread 1099099873968 processes a job. *Jun 20 14:57:05:265 2019 Branch_R1 IKE/7/EVENT: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Begin Main mode exchange. *Jun 20 14:57:05:265 2019 Branch_R1 IKE/7/EVENT: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Pre-shared key matching address 192.168.1.2 not found. *Jun 20 14:57:05:266 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Encryption algorithm is AES-CBC. *Jun 20 14:57:05:266 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Key length is 256 bits. *Jun 20 14:57:05:266 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Hash algorithm is HMAC-SHA1. *Jun 20 14:57:05:266 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 DH group 14. *Jun 20 14:57:05:266 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Authentication method is RSA signature. *Jun 20 14:57:05:266 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Lifetime type is in seconds. *Jun 20 14:57:05:266 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Life duration is 86400. *Jun 20 14:57:05:266 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Construct transfrom payload for transform 1. *Jun 20 14:57:05:266 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Constructed SA payload. *Jun 20 14:57:05:266 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Construct NAT-T rfc3947 vendor ID payload. *Jun 20 14:57:05:266 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Construct NAT-T draft3 vendor ID payload. *Jun 20 14:57:05:266 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Construct NAT-T draft2 vendor ID payload. *Jun 20 14:57:05:266 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Construct NAT-T draft1 vendor ID payload. *Jun 20 14:57:05:266 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Construct XAUTH Cisco Unity 1.0 vendor ID payload. *Jun 20 14:57:05:267 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Construct XAUTH draft6 vendor ID payload. *Jun 20 14:57:05:267 2019 Branch_R1 IKE/7/EVENT: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 IKE SA state changed from IKE_P1_STATE_INIT to IKE_P1_STATE_SEND1. *Jun 20 14:57:05:267 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Sending packet to 192.168.1.2 remote port 500, local port 500. *Jun 20 14:57:05:267 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 I-Cookie: 949a59089f65867f R-Cookie: 0000000000000000 next payload: SA version: ISAKMP Version 1.0 exchange mode: Main flags: message ID: 0 length: 200 *Jun 20 14:57:05:267 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Sending an IPv4 packet. *Jun 20 14:57:05:267 2019 Branch_R1 IKE/7/EVENT: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Sent data to socket successfully. *Jun 20 14:57:05:271 2019 Branch_R1 IKE/7/EVENT: Received packet successfully. *Jun 20 14:57:05:271 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Received packet from 192.168.1.2 source port 500 destination port 500. *Jun 20 14:57:05:272 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 I-Cookie: 949a59089f65867f R-Cookie: f723b1590dd73d0b next payload: SA version: ISAKMP Version 1.0 exchange mode: Main flags: message ID: 0 length: 108 *Jun 20 14:57:05:272 2019 Branch_R1 IKE/7/EVENT: IKE thread 1099099873968 processes a job. *Jun 20 14:57:05:272 2019 Branch_R1 IKE/7/EVENT: Phase1 process started. *Jun 20 14:57:05:272 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Received ISAKMP Security Association Payload. *Jun 20 14:57:05:272 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Received ISAKMP Vendor ID Payload. *Jun 20 14:57:05:272 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Process SA payload. *Jun 20 14:57:05:272 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Check ISAKMP transform 1. *Jun 20 14:57:05:272 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Encryption algorithm is AES-CBC. *Jun 20 14:57:05:272 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Key length is 256 bytes. *Jun 20 14:57:05:272 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 HASH algorithm is HMAC-SHA1. *Jun 20 14:57:05:272 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 DH group is 14. *Jun 20 14:57:05:272 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Authentication method is RSA signature. *Jun 20 14:57:05:272 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Lifetime type is 1. *Jun 20 14:57:05:272 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Life duration is 86400. *Jun 20 14:57:05:273 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Attributes is acceptable. *Jun 20 14:57:05:273 2019 Branch_R1 IKE/7/EVENT: Oakley transform 1 is acceptable. *Jun 20 14:57:05:273 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Process vendor ID payload. *Jun 20 14:57:05:273 2019 Branch_R1 IKE/7/EVENT: Vendor ID NAT-T rfc3947 is matched. *Jun 20 14:57:05:288 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Construct KE payload. *Jun 20 14:57:05:288 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Construct NONCE payload. *Jun 20 14:57:05:289 2019 Branch_R1 IKE/7/ERROR: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Failed to construct certificate request payload. *Jun 20 14:57:05:289 2019 Branch_R1 IKE/7/ERROR: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Failed to negotiate IKE SA. *Jun 20 14:57:05:414 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.1/500 Retransmit phase 1 packet. *Jun 20 14:57:05:415 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.1/500 Sending packet to 192.168.1.1 remote port 500, local port 500. *Jun 20 14:57:05:415 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.1/500 I-Cookie: 571c6f241078c936 R-Cookie: 0000000000000000 next payload: SA version: ISAKMP Version 1.0 exchange mode: Main flags: message ID: 0 length: 200 *Jun 20 14:57:05:415 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.1/500 Sending an IPv4 packet. *Jun 20 14:57:05:415 2019 Branch_R1 IKE/7/EVENT: vrf = 0, src = 192.168.1.100, dst = 192.168.1.1/500 Sent data to socket successfully. *Jun 20 14:57:08:264 2019 Branch_R1 IKE/7/EVENT: Received message from ipsec. *Jun 20 14:57:08:264 2019 Branch_R1 IKE/7/EVENT: Received SA acquire message from IPsec. *Jun 20 14:57:08:264 2019 Branch_R1 IKE/7/EVENT: IKE thread 1099099873968 processes a job. *Jun 20 14:57:08:264 2019 Branch_R1 IKE/7/EVENT: Received SA acquire message from IPsec. *Jun 20 14:57:08:265 2019 Branch_R1 IKE/7/EVENT: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Set IPsec SA state to IKE_P2_STATE_INIT. *Jun 20 14:57:08:265 2019 Branch_R1 IKE/7/EVENT: IKE SA not found. Initiate IKE SA negotiation. *Jun 20 14:57:08:265 2019 Branch_R1 IKE/7/EVENT: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Obtained profile 2. *Jun 20 14:57:08:265 2019 Branch_R1 IKE/7/EVENT: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Initiator created an SA for peer 192.168.1.2, local port 500, remote port 500. *Jun 20 14:57:08:265 2019 Branch_R1 IKE/7/EVENT: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Set IKE SA state to IKE_P1_STATE_INIT. *Jun 20 14:57:08:265 2019 Branch_R1 IKE/7/EVENT: IKE thread 1099099873968 processes a job. *Jun 20 14:57:08:265 2019 Branch_R1 IKE/7/EVENT: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Begin Main mode exchange. *Jun 20 14:57:08:265 2019 Branch_R1 IKE/7/EVENT: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Pre-shared key matching address 192.168.1.2 not found. *Jun 20 14:57:08:265 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Encryption algorithm is AES-CBC. *Jun 20 14:57:08:265 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Key length is 256 bits. *Jun 20 14:57:08:265 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Hash algorithm is HMAC-SHA1. *Jun 20 14:57:08:266 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 DH group 14. *Jun 20 14:57:08:266 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Authentication method is RSA signature. *Jun 20 14:57:08:266 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Lifetime type is in seconds. *Jun 20 14:57:08:266 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Life duration is 86400. *Jun 20 14:57:08:266 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Construct transfrom payload for transform 1. *Jun 20 14:57:08:266 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Constructed SA payload. *Jun 20 14:57:08:266 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Construct NAT-T rfc3947 vendor ID payload. *Jun 20 14:57:08:266 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Construct NAT-T draft3 vendor ID payload. *Jun 20 14:57:08:266 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Construct NAT-T draft2 vendor ID payload. *Jun 20 14:57:08:266 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Construct NAT-T draft1 vendor ID payload. *Jun 20 14:57:08:266 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Construct XAUTH Cisco Unity 1.0 vendor ID payload. *Jun 20 14:57:08:266 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Construct XAUTH draft6 vendor ID payload. *Jun 20 14:57:08:266 2019 Branch_R1 IKE/7/EVENT: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 IKE SA state changed from IKE_P1_STATE_INIT to IKE_P1_STATE_SEND1. *Jun 20 14:57:08:266 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Sending packet to 192.168.1.2 remote port 500, local port 500. *Jun 20 14:57:08:267 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 I-Cookie: af50260161cbf16b R-Cookie: 0000000000000000 next payload: SA version: ISAKMP Version 1.0 exchange mode: Main flags: message ID: 0 length: 200 *Jun 20 14:57:08:267 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Sending an IPv4 packet. *Jun 20 14:57:08:267 2019 Branch_R1 IKE/7/EVENT: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Sent data to socket successfully. *Jun 20 14:57:10:817 2019 Branch_R1 IKE/7/EVENT: Received packet successfully. *Jun 20 14:57:10:817 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Received packet from 192.168.1.2 source port 500 destination port 500. *Jun 20 14:57:10:817 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 I-Cookie: 949a59089f65867f R-Cookie: f723b1590dd73d0b next payload: SA version: ISAKMP Version 1.0 exchange mode: Main flags: message ID: 0 length: 108 *Jun 20 14:57:10:818 2019 Branch_R1 IKE/7/EVENT: IKE thread 1099099873968 processes a job. *Jun 20 14:57:10:818 2019 Branch_R1 IKE/7/EVENT: Phase1 process started. *Jun 20 14:57:10:818 2019 Branch_R1 IKE/7/ERROR: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Can't find IKE SA. *Jun 20 14:57:13:416 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Retransmit phase 1 packet. *Jun 20 14:57:13:416 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Sending packet to 192.168.1.2 remote port 500, local port 500. *Jun 20 14:57:13:416 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 I-Cookie: af50260161cbf16b R-Cookie: 0000000000000000 next payload: SA version: ISAKMP Version 1.0 exchange mode: Main flags: message ID: 0 length: 200 *Jun 20 14:57:13:417 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Sending an IPv4 packet. *Jun 20 14:57:13:417 2019 Branch_R1 IKE/7/EVENT: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Sent data to socket successfully. *Jun 20 14:57:22:414 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.1/500 Retransmit phase 1 packet. *Jun 20 14:57:22:415 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.1/500 Sending packet to 192.168.1.1 remote port 500, local port 500. *Jun 20 14:57:22:415 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.1/500 I-Cookie: 571c6f241078c936 R-Cookie: 0000000000000000 next payload: SA version: ISAKMP Version 1.0 exchange mode: Main flags: message ID: 0 length: 200 *Jun 20 14:57:22:415 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.1/500 Sending an IPv4 packet. *Jun 20 14:57:22:415 2019 Branch_R1 IKE/7/EVENT: vrf = 0, src = 192.168.1.100, dst = 192.168.1.1/500 Sent data to socket successfully. *Jun 20 14:57:22:417 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Retransmit phase 1 packet. *Jun 20 14:57:22:417 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Sending packet to 192.168.1.2 remote port 500, local port 500. *Jun 20 14:57:22:417 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 I-Cookie: af50260161cbf16b R-Cookie: 0000000000000000 next payload: SA version: ISAKMP Version 1.0 exchange mode: Main flags: message ID: 0 length: 200 *Jun 20 14:57:22:417 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Sending an IPv4 packet. *Jun 20 14:57:22:417 2019 Branch_R1 IKE/7/EVENT: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Sent data to socket successfully. *Jun 20 14:57:23:817 2019 Branch_R1 IKE/7/EVENT: Received packet successfully. *Jun 20 14:57:23:817 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Received packet from 192.168.1.2 source port 500 destination port 500. *Jun 20 14:57:23:817 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 I-Cookie: 949a59089f65867f R-Cookie: f723b1590dd73d0b next payload: SA version: ISAKMP Version 1.0 exchange mode: Main flags: message ID: 0 length: 108 *Jun 20 14:57:23:818 2019 Branch_R1 IKE/7/EVENT: IKE thread 1099099873968 processes a job. *Jun 20 14:57:23:818 2019 Branch_R1 IKE/7/EVENT: Phase1 process started. *Jun 20 14:57:23:818 2019 Branch_R1 IKE/7/ERROR: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Can't find IKE SA. *Jun 20 14:57:33:414 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Retransmit phase 1 packet. *Jun 20 14:57:33:415 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Sending packet to 192.168.1.2 remote port 500, local port 500. *Jun 20 14:57:33:415 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 I-Cookie: af50260161cbf16b R-Cookie: 0000000000000000 next payload: SA version: ISAKMP Version 1.0 exchange mode: Main flags: message ID: 0 length: 200 *Jun 20 14:57:33:415 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Sending an IPv4 packet. *Jun 20 14:57:33:415 2019 Branch_R1 IKE/7/EVENT: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Sent data to socket successfully. *Jun 20 14:57:34:817 2019 Branch_R1 IKE/7/EVENT: Received packet successfully. *Jun 20 14:57:34:817 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Received packet from 192.168.1.2 source port 500 destination port 500. *Jun 20 14:57:34:817 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 I-Cookie: 949a59089f65867f R-Cookie: f723b1590dd73d0b next payload: SA version: ISAKMP Version 1.0 exchange mode: Main flags: message ID: 0 length: 108 *Jun 20 14:57:34:818 2019 Branch_R1 IKE/7/EVENT: IKE thread 1099099873968 processes a job. *Jun 20 14:57:34:818 2019 Branch_R1 IKE/7/EVENT: Phase1 process started. *Jun 20 14:57:34:818 2019 Branch_R1 IKE/7/ERROR: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Can't find IKE SA. *Jun 20 14:57:39:414 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.1/500 Retransmit phase 1 packet. *Jun 20 14:57:39:415 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.1/500 Sending packet to 192.168.1.1 remote port 500, local port 500. *Jun 20 14:57:39:415 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.1/500 I-Cookie: 571c6f241078c936 R-Cookie: 0000000000000000 next payload: SA version: ISAKMP Version 1.0 exchange mode: Main flags: message ID: 0 length: 200 *Jun 20 14:57:39:415 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.1/500 Sending an IPv4 packet. *Jun 20 14:57:39:415 2019 Branch_R1 IKE/7/EVENT: vrf = 0, src = 192.168.1.100, dst = 192.168.1.1/500 Sent data to socket successfully. *Jun 20 14:57:45:414 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Retransmit phase 1 packet. *Jun 20 14:57:45:415 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Sending packet to 192.168.1.2 remote port 500, local port 500. *Jun 20 14:57:45:415 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 I-Cookie: af50260161cbf16b R-Cookie: 0000000000000000 next payload: SA version: ISAKMP Version 1.0 exchange mode: Main flags: message ID: 0 length: 200 *Jun 20 14:57:45:415 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Sending an IPv4 packet. *Jun 20 14:57:45:415 2019 Branch_R1 IKE/7/EVENT: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Sent data to socket successfully. *Jun 20 14:57:48:817 2019 Branch_R1 IKE/7/EVENT: Received packet successfully. *Jun 20 14:57:48:817 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Received packet from 192.168.1.2 source port 500 destination port 500. *Jun 20 14:57:48:817 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 I-Cookie: 949a59089f65867f R-Cookie: f723b1590dd73d0b next payload: SA version: ISAKMP Version 1.0 exchange mode: Main flags: message ID: 0 length: 108 *Jun 20 14:57:48:818 2019 Branch_R1 IKE/7/EVENT: IKE thread 1099099873968 processes a job. *Jun 20 14:57:48:818 2019 Branch_R1 IKE/7/EVENT: Phase1 process started. *Jun 20 14:57:48:818 2019 Branch_R1 IKE/7/ERROR: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Can't find IKE SA. *Jun 20 14:57:59:414 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Retransmit phase 1 packet. *Jun 20 14:57:59:415 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Sending packet to 192.168.1.2 remote port 500, local port 500. *Jun 20 14:57:59:415 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 I-Cookie: af50260161cbf16b R-Cookie: 0000000000000000 next payload: SA version: ISAKMP Version 1.0 exchange mode: Main flags: message ID: 0 length: 200 *Jun 20 14:57:59:415 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Sending an IPv4 packet. *Jun 20 14:57:59:415 2019 Branch_R1 IKE/7/EVENT: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Sent data to socket successfully. *Jun 20 14:58:07:817 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Received packet from 192.168.1.2 source port 500 destination port 500. *Jun 20 14:58:07:817 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 I-Cookie: 949a59089f65867f R-Cookie: f723b1590dd73d0b next payload: SA version: ISAKMP Version 1.0 exchange mode: Main flags: message ID: 0 length: 108 *Jun 20 14:58:07:818 2019 Branch_R1 IKE/7/EVENT: IKE thread 1099099873968 processes a job. *Jun 20 14:58:07:818 2019 Branch_R1 IKE/7/EVENT: Phase1 process started. *Jun 20 14:58:07:818 2019 Branch_R1 IKE/7/ERROR: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Can't find IKE SA. *Jun 20 14:58:15:414 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.1/500 Retransmit phase 1 packet. *Jun 20 14:58:15:415 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.1/500 Sending packet to 192.168.1.1 remote port 500, local port 500. *Jun 20 14:58:15:415 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.1/500 I-Cookie: 264c0688cd40a799 R-Cookie: 0000000000000000 next payload: SA version: ISAKMP Version 1.0 exchange mode: Main flags: message ID: 0 length: 200 *Jun 20 14:58:15:415 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.1/500 Sending an IPv4 packet. *Jun 20 14:58:15:415 2019 Branch_R1 IKE/7/EVENT: vrf = 0, src = 192.168.1.100, dst = 192.168.1.1/500 Sent data to socket successfully. *Jun 20 14:58:18:414 2019 Branch_R1 IKE/7/EVENT: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Retransmission of phase 1 packet timed out. *Jun 20 14:58:18:415 2019 Branch_R1 IKE/7/ERROR: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Failed to negotiate IKE SA. *Jun 20 14:58:20:264 2019 Branch_R1 IKE/7/EVENT: Received message from ipsec. *Jun 20 14:58:20:264 2019 Branch_R1 IKE/7/EVENT: Received SA acquire message from IPsec. *Jun 20 14:58:20:265 2019 Branch_R1 IKE/7/EVENT: IKE thread 1099099873968 processes a job. *Jun 20 14:58:20:265 2019 Branch_R1 IKE/7/EVENT: Received SA acquire message from IPsec. *Jun 20 14:58:20:265 2019 Branch_R1 IKE/7/EVENT: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Set IPsec SA state to IKE_P2_STATE_INIT. *Jun 20 14:58:20:265 2019 Branch_R1 IKE/7/EVENT: IKE SA not found. Initiate IKE SA negotiation. *Jun 20 14:58:20:265 2019 Branch_R1 IKE/7/EVENT: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Obtained profile 2. *Jun 20 14:58:20:265 2019 Branch_R1 IKE/7/EVENT: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Initiator created an SA for peer 192.168.1.2, local port 500, remote port 500. *Jun 20 14:58:20:265 2019 Branch_R1 IKE/7/EVENT: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Set IKE SA state to IKE_P1_STATE_INIT. *Jun 20 14:58:20:265 2019 Branch_R1 IKE/7/EVENT: IKE thread 1099099873968 processes a job. *Jun 20 14:58:20:265 2019 Branch_R1 IKE/7/EVENT: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Begin Main mode exchange. *Jun 20 14:58:20:265 2019 Branch_R1 IKE/7/EVENT: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Pre-shared key matching address 192.168.1.2 not found. *Jun 20 14:58:20:266 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Encryption algorithm is AES-CBC. *Jun 20 14:58:20:266 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Key length is 256 bits. *Jun 20 14:58:20:266 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Hash algorithm is HMAC-SHA1. *Jun 20 14:58:20:266 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 DH group 14. *Jun 20 14:58:20:266 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Authentication method is RSA signature. *Jun 20 14:58:20:266 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Lifetime type is in seconds. *Jun 20 14:58:20:266 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Life duration is 86400. *Jun 20 14:58:20:266 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Construct transfrom payload for transform 1. *Jun 20 14:58:20:266 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Constructed SA payload. *Jun 20 14:58:20:266 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Construct NAT-T rfc3947 vendor ID payload. *Jun 20 14:58:20:266 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Construct NAT-T draft3 vendor ID payload. *Jun 20 14:58:20:266 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Construct NAT-T draft2 vendor ID payload. *Jun 20 14:58:20:266 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Construct NAT-T draft1 vendor ID payload. *Jun 20 14:58:20:266 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Construct XAUTH Cisco Unity 1.0 vendor ID payload. *Jun 20 14:58:20:267 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Construct XAUTH draft6 vendor ID payload. *Jun 20 14:58:20:267 2019 Branch_R1 IKE/7/EVENT: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 IKE SA state changed from IKE_P1_STATE_INIT to IKE_P1_STATE_SEND1. *Jun 20 14:58:20:267 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Sending packet to 192.168.1.2 remote port 500, local port 500. *Jun 20 14:58:20:267 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 I-Cookie: 7e0245aba1dca7f4 R-Cookie: 0000000000000000 next payload: SA version: ISAKMP Version 1.0 exchange mode: Main flags: message ID: 0 length: 200 *Jun 20 14:58:20:267 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Sending an IPv4 packet. *Jun 20 14:58:20:267 2019 Branch_R1 IKE/7/EVENT: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Sent data to socket successfully. *Jun 20 14:58:20:271 2019 Branch_R1 IKE/7/EVENT: Received packet successfully. *Jun 20 14:58:20:271 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Received packet from 192.168.1.2 source port 500 destination port 500. *Jun 20 14:58:20:272 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 I-Cookie: 7e0245aba1dca7f4 R-Cookie: d228f86fb982d3bb next payload: SA version: ISAKMP Version 1.0 exchange mode: Main flags: message ID: 0 length: 108 *Jun 20 14:58:20:272 2019 Branch_R1 IKE/7/EVENT: IKE thread 1099099873968 processes a job. *Jun 20 14:58:20:272 2019 Branch_R1 IKE/7/EVENT: Phase1 process started. *Jun 20 14:58:20:272 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Received ISAKMP Security Association Payload. *Jun 20 14:58:20:272 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Received ISAKMP Vendor ID Payload. *Jun 20 14:58:20:272 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Process SA payload. *Jun 20 14:58:20:272 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Check ISAKMP transform 1. *Jun 20 14:58:20:272 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Encryption algorithm is AES-CBC. *Jun 20 14:58:20:272 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Key length is 256 bytes. *Jun 20 14:58:20:272 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 HASH algorithm is HMAC-SHA1. *Jun 20 14:58:20:272 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 DH group is 14. *Jun 20 14:58:20:272 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Authentication method is RSA signature. *Jun 20 14:58:20:272 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Lifetime type is 1. *Jun 20 14:58:20:273 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Life duration is 86400. *Jun 20 14:58:20:273 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Attributes is acceptable. *Jun 20 14:58:20:273 2019 Branch_R1 IKE/7/EVENT: Oakley transform 1 is acceptable. *Jun 20 14:58:20:273 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Process vendor ID payload. *Jun 20 14:58:20:273 2019 Branch_R1 IKE/7/EVENT: Vendor ID NAT-T rfc3947 is matched. *Jun 20 14:58:20:288 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Construct KE payload. *Jun 20 14:58:20:288 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Construct NONCE payload. *Jun 20 14:58:20:289 2019 Branch_R1 IKE/7/ERROR: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Failed to construct certificate request payload. *Jun 20 14:58:20:289 2019 Branch_R1 IKE/7/ERROR: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Failed to negotiate IKE SA. *Jun 20 14:58:23:264 2019 Branch_R1 IKE/7/EVENT: Received message from ipsec. *Jun 20 14:58:23:264 2019 Branch_R1 IKE/7/EVENT: Received SA acquire message from IPsec. *Jun 20 14:58:23:264 2019 Branch_R1 IKE/7/EVENT: IKE thread 1099099873968 processes a job. *Jun 20 14:58:23:264 2019 Branch_R1 IKE/7/EVENT: Received SA acquire message from IPsec. *Jun 20 14:58:23:265 2019 Branch_R1 IKE/7/EVENT: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Set IPsec SA state to IKE_P2_STATE_INIT. *Jun 20 14:58:23:265 2019 Branch_R1 IKE/7/EVENT: IKE SA not found. Initiate IKE SA negotiation. *Jun 20 14:58:23:265 2019 Branch_R1 IKE/7/EVENT: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Obtained profile 2. *Jun 20 14:58:23:265 2019 Branch_R1 IKE/7/EVENT: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Initiator created an SA for peer 192.168.1.2, local port 500, remote port 500. *Jun 20 14:58:23:265 2019 Branch_R1 IKE/7/EVENT: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Set IKE SA state to IKE_P1_STATE_INIT. *Jun 20 14:58:23:265 2019 Branch_R1 IKE/7/EVENT: IKE thread 1099099873968 processes a job. *Jun 20 14:58:23:265 2019 Branch_R1 IKE/7/EVENT: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Begin Main mode exchange. *Jun 20 14:58:23:265 2019 Branch_R1 IKE/7/EVENT: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Pre-shared key matching address 192.168.1.2 not found. *Jun 20 14:58:23:265 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Encryption algorithm is AES-CBC. *Jun 20 14:58:23:265 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Key length is 256 bits. *Jun 20 14:58:23:265 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Hash algorithm is HMAC-SHA1. *Jun 20 14:58:23:266 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 DH group 14. *Jun 20 14:58:23:266 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Authentication method is RSA signature. *Jun 20 14:58:23:266 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Lifetime type is in seconds. *Jun 20 14:58:23:266 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Life duration is 86400. *Jun 20 14:58:23:266 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Construct transfrom payload for transform 1. *Jun 20 14:58:23:266 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Constructed SA payload. *Jun 20 14:58:23:266 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Construct NAT-T rfc3947 vendor ID payload. *Jun 20 14:58:23:266 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Construct NAT-T draft3 vendor ID payload. *Jun 20 14:58:23:266 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Construct NAT-T draft2 vendor ID payload. *Jun 20 14:58:23:266 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Construct NAT-T draft1 vendor ID payload. *Jun 20 14:58:23:266 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Construct XAUTH Cisco Unity 1.0 vendor ID payload. *Jun 20 14:58:23:266 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Construct XAUTH draft6 vendor ID payload. *Jun 20 14:58:23:266 2019 Branch_R1 IKE/7/EVENT: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 IKE SA state changed from IKE_P1_STATE_INIT to IKE_P1_STATE_SEND1. *Jun 20 14:58:23:266 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Sending packet to 192.168.1.2 remote port 500, local port 500. *Jun 20 14:58:23:267 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 I-Cookie: 69886d24783e4917 R-Cookie: 0000000000000000 next payload: SA version: ISAKMP Version 1.0 exchange mode: Main flags: message ID: 0 length: 200 *Jun 20 14:58:23:267 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Sending an IPv4 packet. *Jun 20 14:58:23:267 2019 Branch_R1 IKE/7/EVENT: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Sent data to socket successfully. *Jun 20 14:58:23:271 2019 Branch_R1 IKE/7/EVENT: Received packet successfully. *Jun 20 14:58:23:271 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Received packet from 192.168.1.2 source port 500 destination port 500. *Jun 20 14:58:23:271 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 I-Cookie: 69886d24783e4917 R-Cookie: d2caec95083b9805 next payload: SA version: ISAKMP Version 1.0 exchange mode: Main flags: message ID: 0 length: 108 *Jun 20 14:58:23:271 2019 Branch_R1 IKE/7/EVENT: IKE thread 1099099873968 processes a job. *Jun 20 14:58:23:271 2019 Branch_R1 IKE/7/EVENT: Phase1 process started. *Jun 20 14:58:23:272 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Received ISAKMP Security Association Payload. *Jun 20 14:58:23:272 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Received ISAKMP Vendor ID Payload. *Jun 20 14:58:23:272 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Process SA payload. *Jun 20 14:58:23:272 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Check ISAKMP transform 1. *Jun 20 14:58:23:272 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Encryption algorithm is AES-CBC. *Jun 20 14:58:23:272 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Key length is 256 bytes. *Jun 20 14:58:23:272 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 HASH algorithm is HMAC-SHA1. *Jun 20 14:58:23:272 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 DH group is 14. *Jun 20 14:58:23:272 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Authentication method is RSA signature. *Jun 20 14:58:23:272 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Lifetime type is 1. *Jun 20 14:58:23:272 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Life duration is 86400. *Jun 20 14:58:23:272 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Attributes is acceptable. *Jun 20 14:58:23:272 2019 Branch_R1 IKE/7/EVENT: Oakley transform 1 is acceptable. *Jun 20 14:58:23:272 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Process vendor ID payload. *Jun 20 14:58:23:273 2019 Branch_R1 IKE/7/EVENT: Vendor ID NAT-T rfc3947 is matched. *Jun 20 14:58:23:287 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Construct KE payload. *Jun 20 14:58:23:288 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Construct NONCE payload. *Jun 20 14:58:23:289 2019 Branch_R1 IKE/7/ERROR: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Failed to construct certificate request payload. *Jun 20 14:58:23:289 2019 Branch_R1 IKE/7/ERROR: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Failed to negotiate IKE SA. *Jun 20 14:58:26:264 2019 Branch_R1 IKE/7/EVENT: Received message from ipsec. *Jun 20 14:58:26:264 2019 Branch_R1 IKE/7/EVENT: Received SA acquire message from IPsec. *Jun 20 14:58:26:264 2019 Branch_R1 IKE/7/EVENT: IKE thread 1099099873968 processes a job. *Jun 20 14:58:26:265 2019 Branch_R1 IKE/7/EVENT: Received SA acquire message from IPsec. *Jun 20 14:58:26:265 2019 Branch_R1 IKE/7/EVENT: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Set IPsec SA state to IKE_P2_STATE_INIT. *Jun 20 14:58:26:265 2019 Branch_R1 IKE/7/EVENT: IKE SA not found. Initiate IKE SA negotiation. *Jun 20 14:58:26:265 2019 Branch_R1 IKE/7/EVENT: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Obtained profile 2. *Jun 20 14:58:26:265 2019 Branch_R1 IKE/7/EVENT: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Initiator created an SA for peer 192.168.1.2, local port 500, remote port 500. *Jun 20 14:58:26:265 2019 Branch_R1 IKE/7/EVENT: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Set IKE SA state to IKE_P1_STATE_INIT. *Jun 20 14:58:26:265 2019 Branch_R1 IKE/7/EVENT: IKE thread 1099099873968 processes a job. *Jun 20 14:58:26:266 2019 Branch_R1 IKE/7/EVENT: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Begin Main mode exchange. *Jun 20 14:58:26:266 2019 Branch_R1 IKE/7/EVENT: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Pre-shared key matching address 192.168.1.2 not found. *Jun 20 14:58:26:266 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Encryption algorithm is AES-CBC. *Jun 20 14:58:26:266 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Key length is 256 bits. *Jun 20 14:58:26:266 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Hash algorithm is HMAC-SHA1. *Jun 20 14:58:26:266 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 DH group 14. *Jun 20 14:58:26:266 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Authentication method is RSA signature. *Jun 20 14:58:26:267 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Lifetime type is in seconds. *Jun 20 14:58:26:267 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Life duration is 86400. *Jun 20 14:58:26:267 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Construct transfrom payload for transform 1. *Jun 20 14:58:26:267 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Constructed SA payload. *Jun 20 14:58:26:267 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Construct NAT-T rfc3947 vendor ID payload. *Jun 20 14:58:26:267 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Construct NAT-T draft3 vendor ID payload. *Jun 20 14:58:26:267 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Construct NAT-T draft2 vendor ID payload. *Jun 20 14:58:26:268 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Construct NAT-T draft1 vendor ID payload. *Jun 20 14:58:26:268 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Construct XAUTH Cisco Unity 1.0 vendor ID payload. *Jun 20 14:58:26:268 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Construct XAUTH draft6 vendor ID payload. *Jun 20 14:58:26:268 2019 Branch_R1 IKE/7/EVENT: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 IKE SA state changed from IKE_P1_STATE_INIT to IKE_P1_STATE_SEND1. *Jun 20 14:58:26:268 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Sending packet to 192.168.1.2 remote port 500, local port 500. *Jun 20 14:58:26:268 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 I-Cookie: 1c445b78def4b44b R-Cookie: 0000000000000000 next payload: SA version: ISAKMP Version 1.0 exchange mode: Main flags: message ID: 0 length: 200 *Jun 20 14:58:26:268 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Sending an IPv4 packet. *Jun 20 14:58:26:268 2019 Branch_R1 IKE/7/EVENT: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Sent data to socket successfully. *Jun 20 14:58:26:273 2019 Branch_R1 IKE/7/EVENT: Received packet successfully. *Jun 20 14:58:26:273 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Received packet from 192.168.1.2 source port 500 destination port 500. *Jun 20 14:58:26:273 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 I-Cookie: 1c445b78def4b44b R-Cookie: 760eb64140d45138 next payload: SA version: ISAKMP Version 1.0 exchange mode: Main flags: message ID: 0 length: 108 *Jun 20 14:58:26:273 2019 Branch_R1 IKE/7/EVENT: IKE thread 1099099873968 processes a job. *Jun 20 14:58:26:273 2019 Branch_R1 IKE/7/EVENT: Phase1 process started. *Jun 20 14:58:26:273 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Received ISAKMP Security Association Payload. *Jun 20 14:58:26:274 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Received ISAKMP Vendor ID Payload. *Jun 20 14:58:26:274 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Process SA payload. *Jun 20 14:58:26:274 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Check ISAKMP transform 1. *Jun 20 14:58:26:274 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Encryption algorithm is AES-CBC. *Jun 20 14:58:26:274 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Key length is 256 bytes. *Jun 20 14:58:26:274 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 HASH algorithm is HMAC-SHA1. *Jun 20 14:58:26:274 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 DH group is 14. *Jun 20 14:58:26:274 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Authentication method is RSA signature. *Jun 20 14:58:26:275 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Lifetime type is 1. *Jun 20 14:58:26:275 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Life duration is 86400. *Jun 20 14:58:26:275 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Attributes is acceptable. *Jun 20 14:58:26:275 2019 Branch_R1 IKE/7/EVENT: Oakley transform 1 is acceptable. *Jun 20 14:58:26:275 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Process vendor ID payload. *Jun 20 14:58:26:275 2019 Branch_R1 IKE/7/EVENT: Vendor ID NAT-T rfc3947 is matched. *Jun 20 14:58:26:290 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Construct KE payload. *Jun 20 14:58:26:290 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Construct NONCE payload. *Jun 20 14:58:26:291 2019 Branch_R1 IKE/7/ERROR: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Failed to construct certificate request payload. *Jun 20 14:58:26:291 2019 Branch_R1 IKE/7/ERROR: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Failed to negotiate IKE SA. *Jun 20 14:58:26:415 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.1/500 Retransmit phase 1 packet. *Jun 20 14:58:26:415 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.1/500 Sending packet to 192.168.1.1 remote port 500, local port 500. *Jun 20 14:58:26:415 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.1/500 I-Cookie: 264c0688cd40a799 R-Cookie: 0000000000000000 next payload: SA version: ISAKMP Version 1.0 exchange mode: Main flags: message ID: 0 length: 200 *Jun 20 14:58:26:415 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.1/500 Sending an IPv4 packet. *Jun 20 14:58:26:415 2019 Branch_R1 IKE/7/EVENT: vrf = 0, src = 192.168.1.100, dst = 192.168.1.1/500 Sent data to socket successfully. *Jun 20 14:58:29:264 2019 Branch_R1 IKE/7/EVENT: Received message from ipsec. *Jun 20 14:58:29:264 2019 Branch_R1 IKE/7/EVENT: Received SA acquire message from IPsec. *Jun 20 14:58:29:264 2019 Branch_R1 IKE/7/EVENT: IKE thread 1099099873968 processes a job. *Jun 20 14:58:29:265 2019 Branch_R1 IKE/7/EVENT: Received SA acquire message from IPsec. *Jun 20 14:58:29:265 2019 Branch_R1 IKE/7/EVENT: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Set IPsec SA state to IKE_P2_STATE_INIT. *Jun 20 14:58:29:265 2019 Branch_R1 IKE/7/EVENT: IKE SA not found. Initiate IKE SA negotiation. *Jun 20 14:58:29:265 2019 Branch_R1 IKE/7/EVENT: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Obtained profile 2. *Jun 20 14:58:29:265 2019 Branch_R1 IKE/7/EVENT: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Initiator created an SA for peer 192.168.1.2, local port 500, remote port 500. *Jun 20 14:58:29:265 2019 Branch_R1 IKE/7/EVENT: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Set IKE SA state to IKE_P1_STATE_INIT. *Jun 20 14:58:29:266 2019 Branch_R1 IKE/7/EVENT: IKE thread 1099099873968 processes a job. *Jun 20 14:58:29:266 2019 Branch_R1 IKE/7/EVENT: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Begin Main mode exchange. *Jun 20 14:58:29:266 2019 Branch_R1 IKE/7/EVENT: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Pre-shared key matching address 192.168.1.2 not found. *Jun 20 14:58:29:266 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Encryption algorithm is AES-CBC. *Jun 20 14:58:29:266 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Key length is 256 bits. *Jun 20 14:58:29:266 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Hash algorithm is HMAC-SHA1. *Jun 20 14:58:29:266 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 DH group 14. *Jun 20 14:58:29:266 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Authentication method is RSA signature. *Jun 20 14:58:29:267 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Lifetime type is in seconds. *Jun 20 14:58:29:267 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Life duration is 86400. *Jun 20 14:58:29:267 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Construct transfrom payload for transform 1. *Jun 20 14:58:29:267 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Constructed SA payload. *Jun 20 14:58:29:267 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Construct NAT-T rfc3947 vendor ID payload. *Jun 20 14:58:29:267 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Construct NAT-T draft3 vendor ID payload. *Jun 20 14:58:29:267 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Construct NAT-T draft2 vendor ID payload. *Jun 20 14:58:29:267 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Construct NAT-T draft1 vendor ID payload. *Jun 20 14:58:29:268 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Construct XAUTH Cisco Unity 1.0 vendor ID payload. *Jun 20 14:58:29:268 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Construct XAUTH draft6 vendor ID payload. *Jun 20 14:58:29:268 2019 Branch_R1 IKE/7/EVENT: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 IKE SA state changed from IKE_P1_STATE_INIT to IKE_P1_STATE_SEND1. *Jun 20 14:58:29:268 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Sending packet to 192.168.1.2 remote port 500, local port 500. *Jun 20 14:58:29:268 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 I-Cookie: e98b6bfd7561626d R-Cookie: 0000000000000000 next payload: SA version: ISAKMP Version 1.0 exchange mode: Main flags: message ID: 0 length: 200 *Jun 20 14:58:29:268 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Sending an IPv4 packet. *Jun 20 14:58:29:268 2019 Branch_R1 IKE/7/EVENT: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Sent data to socket successfully. *Jun 20 14:58:31:817 2019 Branch_R1 IKE/7/EVENT: Received packet successfully. *Jun 20 14:58:31:817 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Received packet from 192.168.1.2 source port 500 destination port 500. *Jun 20 14:58:31:817 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 I-Cookie: 1c445b78def4b44b R-Cookie: 760eb64140d45138 next payload: SA version: ISAKMP Version 1.0 exchange mode: Main flags: message ID: 0 length: 108 *Jun 20 14:58:31:818 2019 Branch_R1 IKE/7/EVENT: IKE thread 1099099873968 processes a job. *Jun 20 14:58:31:818 2019 Branch_R1 IKE/7/EVENT: Phase1 process started. *Jun 20 14:58:31:818 2019 Branch_R1 IKE/7/ERROR: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Can't find IKE SA. *Jun 20 14:58:34:416 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Retransmit phase 1 packet. *Jun 20 14:58:34:417 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Sending packet to 192.168.1.2 remote port 500, local port 500. *Jun 20 14:58:34:417 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 I-Cookie: e98b6bfd7561626d R-Cookie: 0000000000000000 next payload: SA version: ISAKMP Version 1.0 exchange mode: Main flags: message ID: 0 length: 200 *Jun 20 14:58:59:416 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Sending an IPv4 packet. *Jun 20 14:58:59:416 2019 Branch_R1 IKE/7/EVENT: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Sent data to socket successfully. *Jun 20 14:58:59:817 2019 Branch_R1 IKE/7/EVENT: Received packet successfully. *Jun 20 14:58:59:818 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Received packet from 192.168.1.2 source port 500 destination port 500. *Jun 20 14:58:59:818 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 I-Cookie: 1c445b78def4b44b R-Cookie: 760eb64140d45138 next payload: SA version: ISAKMP Version 1.0 exchange mode: Main flags: message ID: 0 length: 108 *Jun 20 14:58:59:818 2019 Branch_R1 IKE/7/EVENT: IKE thread 1099099873968 processes a job. *Jun 20 14:58:59:818 2019 Branch_R1 IKE/7/EVENT: Phase1 process started. *Jun 20 14:58:59:818 2019 Branch_R1 IKE/7/ERROR: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Can't find IKE SA. *Jun 20 14:59:11:414 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Retransmit phase 1 packet. *Jun 20 14:59:11:415 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Sending packet to 192.168.1.2 remote port 500, local port 500. *Jun 20 14:59:11:415 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 I-Cookie: e98b6bfd7561626d R-Cookie: 0000000000000000 next payload: SA version: ISAKMP Version 1.0 exchange mode: Main flags: message ID: 0 length: 200 *Jun 20 14:59:11:415 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Sending an IPv4 packet. *Jun 20 14:59:11:415 2019 Branch_R1 IKE/7/EVENT: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Sent data to socket successfully. *Jun 20 14:59:16:415 2019 Branch_R1 IKE/7/EVENT: vrf = 0, src = 192.168.1.100, dst = 192.168.1.1/500 Retransmission of phase 1 packet timed out. *Jun 20 14:59:16:415 2019 Branch_R1 IKE/7/ERROR: vrf = 0, src = 192.168.1.100, dst = 192.168.1.1/500 Failed to negotiate IKE SA. *Jun 20 14:59:17:817 2019 Branch_R1 IKE/7/EVENT: Received packet successfully. *Jun 20 14:59:17:817 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Received packet from 192.168.1.2 source port 500 destination port 500. *Jun 20 14:59:17:817 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 I-Cookie: 1c445b78def4b44b R-Cookie: 760eb64140d45138 next payload: SA version: ISAKMP Version 1.0 exchange mode: Main flags: message ID: 0 length: 108 *Jun 20 14:59:17:818 2019 Branch_R1 IKE/7/EVENT: IKE thread 1099099873968 processes a job. *Jun 20 14:59:17:818 2019 Branch_R1 IKE/7/EVENT: Phase1 process started. *Jun 20 14:59:17:818 2019 Branch_R1 IKE/7/ERROR: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Can't find IKE SA. *Jun 20 14:59:19:264 2019 Branch_R1 IKE/7/EVENT: Received message from ipsec. *Jun 20 14:59:19:264 2019 Branch_R1 IKE/7/EVENT: Received SA acquire message from IPsec. *Jun 20 14:59:19:264 2019 Branch_R1 IKE/7/EVENT: IKE thread 1099099873968 processes a job. *Jun 20 14:59:19:264 2019 Branch_R1 IKE/7/EVENT: Received SA acquire message from IPsec. I-Cookie: b4758910dadc1266 R-Cookie: 0000000000000000 next payload: SA version: ISAKMP Version 1.0 exchange mode: Main flags: message ID: 0 length: 200 *Jun 20 14:59:35:415 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.1/500 Sending an IPv4 packet. *Jun 20 14:59:35:415 2019 Branch_R1 IKE/7/EVENT: vrf = 0, src = 192.168.1.100, dst = 192.168.1.1/500 Sent data to socket successfully. *Jun 20 14:59:35:817 2019 Branch_R1 IKE/7/EVENT: Received packet successfully. *Jun 20 14:59:35:817 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Received packet from 192.168.1.2 source port 500 destination port 500. *Jun 20 14:59:35:818 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 I-Cookie: 1c445b78def4b44b R-Cookie: 760eb64140d45138 next payload: SA version: ISAKMP Version 1.0 exchange mode: Main flags: message ID: 0 length: 108 *Jun 20 14:59:35:818 2019 Branch_R1 IKE/7/EVENT: IKE thread 1099099873968 processes a job. *Jun 20 14:59:35:818 2019 Branch_R1 IKE/7/EVENT: Phase1 process started. *Jun 20 14:59:35:818 2019 Branch_R1 IKE/7/ERROR: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Can't find IKE SA. *Jun 20 14:59:50:414 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.1/500 Retransmit phase 1 packet. *Jun 20 14:59:50:415 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.1/500 Sending packet to 192.168.1.1 remote port 500, local port 500. *Jun 20 14:59:50:415 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.1/500 I-Cookie: b4758910dadc1266 R-Cookie: 0000000000000000 next payload: SA version: ISAKMP Version 1.0 exchange mode: Main flags: message ID: 0 length: 200 *Jun 20 14:59:50:415 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.1/500 Sending an IPv4 packet. *Jun 20 14:59:50:415 2019 Branch_R1 IKE/7/EVENT: vrf = 0, src = 192.168.1.100, dst = 192.168.1.1/500 Sent data to socket successfully. *Jun 20 14:59:53:046 2019 Branch_R1 IKE/7/EVENT: Received packet successfully. *Jun 20 14:59:53:046 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Received packet from 192.168.1.2 source port 500 destination port 500. *Jun 20 14:59:53:046 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 I-Cookie: e8d02170f90dd5d9 R-Cookie: 0000000000000000 next payload: SA version: ISAKMP Version 1.0 exchange mode: Main flags: message ID: 0 length: 168 *Jun 20 14:59:53:046 2019 Branch_R1 IKE/7/EVENT: IKE thread 1099099873968 processes a job. *Jun 20 14:59:53:047 2019 Branch_R1 IKE/7/EVENT: Phase1 process started. *Jun 20 14:59:53:047 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Collision of phase 1 negotiation is found. *Jun 20 14:59:53:047 2019 Branch_R1 IKE/7/EVENT: Phase 1 Exchange chooses role: Local is responder *Jun 20 14:59:53:047 2019 Branch_R1 IKE/7/ERROR: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Failed to negotiate IKE SA. *Jun 20 14:59:53:048 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Begin a new phase 1 negotiation as responder. *Jun 20 14:59:53:048 2019 Branch_R1 IKE/7/EVENT: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Responder created an SA for peer 192.168.1.2, local port 500, remote port 500. *Jun 20 14:59:53:048 2019 Branch_R1 IKE/7/EVENT: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Set IKE SA state to IKE_P1_STATE_INIT. *Jun 20 14:59:53:048 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Received ISAKMP Security Association Payload. *Jun 20 14:59:53:048 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Received ISAKMP Vendor ID Payload. *Jun 20 14:59:53:048 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Received ISAKMP Vendor ID Payload. *Jun 20 14:59:53:048 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Received ISAKMP Vendor ID Payload. *Jun 20 14:59:53:048 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Received ISAKMP Vendor ID Payload. *Jun 20 14:59:53:048 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Process vendor ID payload. *Jun 20 14:59:53:048 2019 Branch_R1 IKE/7/EVENT: Vendor ID NAT-T rfc3947 is matched. *Jun 20 14:59:53:048 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Process SA payload. *Jun 20 14:59:53:048 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Check ISAKMP transform 1. *Jun 20 14:59:53:048 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Encryption algorithm is AES-CBC. *Jun 20 14:59:53:049 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Key length is 256 bytes. *Jun 20 14:59:53:049 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 HASH algorithm is HMAC-SHA1. *Jun 20 14:59:53:049 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 DH group is 14. *Jun 20 14:59:53:049 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Authentication method is RSA signature. *Jun 20 14:59:53:049 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Lifetime type is 1. *Jun 20 14:59:53:049 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Life duration is 86400. *Jun 20 14:59:53:049 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Attributes is acceptable. *Jun 20 14:59:53:049 2019 Branch_R1 IKE/7/EVENT: Oakley transform 1 is acceptable. *Jun 20 14:59:53:049 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Constructed SA payload *Jun 20 14:59:53:049 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Construct NAT-T rfc3947 vendor ID payload. *Jun 20 14:59:53:049 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Construct XAUTH Cisco Unity 1.0 vendor ID payload. *Jun 20 14:59:53:049 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Construct XAUTH draft6 vendor ID payload. *Jun 20 14:59:53:049 2019 Branch_R1 IKE/7/EVENT: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 IKE SA state changed from IKE_P1_STATE_INIT to IKE_P1_STATE_SEND2. *Jun 20 14:59:53:050 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Sending packet to 192.168.1.2 remote port 500, local port 500. *Jun 20 14:59:53:050 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 I-Cookie: e8d02170f90dd5d9 R-Cookie: 43e442ba021f7e60 next payload: SA version: ISAKMP Version 1.0 exchange mode: Main flags: message ID: 0 length: 140 *Jun 20 14:59:53:050 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Sending an IPv4 packet. *Jun 20 14:59:53:050 2019 Branch_R1 IKE/7/EVENT: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Sent data to socket successfully. *Jun 20 14:59:53:217 2019 Branch_R1 IKE/7/EVENT: Received packet successfully. *Jun 20 14:59:53:217 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Received packet from 192.168.1.2 source port 500 destination port 500. *Jun 20 14:59:53:217 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 I-Cookie: e8d02170f90dd5d9 R-Cookie: 43e442ba021f7e60 next payload: KE version: ISAKMP Version 1.0 exchange mode: Main flags: message ID: 0 length: 412 *Jun 20 14:59:53:217 2019 Branch_R1 IKE/7/EVENT: IKE thread 1099099873968 processes a job. *Jun 20 14:59:53:217 2019 Branch_R1 IKE/7/EVENT: Phase1 process started. *Jun 20 14:59:53:217 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Received ISAKMP Key Exchange Payload. *Jun 20 14:59:53:218 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Received ISAKMP Nonce Payload. *Jun 20 14:59:53:218 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Received ISAKMP Certificate RequestPayload. *Jun 20 14:59:53:218 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Received ISAKMP NAT-D Payload. *Jun 20 14:59:53:218 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Received ISAKMP NAT-D Payload. *Jun 20 14:59:53:218 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Received ISAKMP Vendor ID Payload. *Jun 20 14:59:53:218 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Process KE payload. *Jun 20 14:59:53:218 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Process NONCE payload. *Jun 20 14:59:53:218 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Received 2 NAT-D payload. *Jun 20 14:59:53:218 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Process certificate request payload. *Jun 20 14:59:53:218 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Received certificate request payload that contains issuer name CN=DCvpnnetPRD-CA1-CA. *Jun 20 14:59:53:218 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Process vendor ID payload. *Jun 20 14:59:53:218 2019 Branch_R1 IKE/7/EVENT: Vendor ID DPD is matched. *Jun 20 14:59:53:233 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Construct KE payload. *Jun 20 14:59:53:234 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Construct NONCE payload. *Jun 20 14:59:53:234 2019 Branch_R1 IKE/7/ERROR: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Failed to construct certificate request payload. *Jun 20 14:59:53:234 2019 Branch_R1 IKE/7/ERROR: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Failed to negotiate IKE SA. *Jun 20 14:59:53:264 2019 Branch_R1 IKE/7/EVENT: Received message from ipsec. *Jun 20 14:59:53:264 2019 Branch_R1 IKE/7/EVENT: Received SA acquire message from IPsec. *Jun 20 14:59:53:270 2019 Branch_R1 IKE/7/EVENT: IKE thread 1099099873968 processes a job. *Jun 20 14:59:53:270 2019 Branch_R1 IKE/7/EVENT: Received SA acquire message from IPsec. *Jun 20 14:59:53:270 2019 Branch_R1 IKE/7/EVENT: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Set IPsec SA state to IKE_P2_STATE_INIT. *Jun 20 14:59:53:270 2019 Branch_R1 IKE/7/EVENT: IKE SA not found. Initiate IKE SA negotiation. *Jun 20 14:59:53:270 2019 Branch_R1 IKE/7/EVENT: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Obtained profile 2. *Jun 20 14:59:53:270 2019 Branch_R1 IKE/7/EVENT: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Initiator created an SA for peer 192.168.1.2, local port 500, remote port 500. *Jun 20 14:59:53:270 2019 Branch_R1 IKE/7/EVENT: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Set IKE SA state to IKE_P1_STATE_INIT. *Jun 20 14:59:53:271 2019 Branch_R1 IKE/7/EVENT: IKE thread 1099099873968 processes a job. *Jun 20 14:59:53:271 2019 Branch_R1 IKE/7/EVENT: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Begin Main mode exchange. *Jun 20 14:59:53:271 2019 Branch_R1 IKE/7/EVENT: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Pre-shared key matching address 192.168.1.2 not found. *Jun 20 14:59:53:271 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Encryption algorithm is AES-CBC. *Jun 20 14:59:53:271 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Key length is 256 bits. *Jun 20 14:59:53:272 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Hash algorithm is HMAC-SHA1. *Jun 20 14:59:53:272 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 DH group 14. *Jun 20 14:59:53:272 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Authentication method is RSA signature. *Jun 20 14:59:53:272 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Lifetime type is in seconds. *Jun 20 14:59:53:272 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Life duration is 86400. *Jun 20 14:59:53:272 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Construct transfrom payload for transform 1. *Jun 20 14:59:53:272 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Constructed SA payload. *Jun 20 14:59:53:272 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Construct NAT-T rfc3947 vendor ID payload. *Jun 20 14:59:53:273 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Construct NAT-T draft3 vendor ID payload. *Jun 20 14:59:53:273 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Construct NAT-T draft2 vendor ID payload. *Jun 20 14:59:53:273 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Construct NAT-T draft1 vendor ID payload. *Jun 20 14:59:53:273 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Construct XAUTH Cisco Unity 1.0 vendor ID payload. *Jun 20 14:59:53:273 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Construct XAUTH draft6 vendor ID payload. *Jun 20 14:59:53:273 2019 Branch_R1 IKE/7/EVENT: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 IKE SA state changed from IKE_P1_STATE_INIT to IKE_P1_STATE_SEND1. *Jun 20 14:59:53:273 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Sending packet to 192.168.1.2 remote port 500, local port 500. *Jun 20 14:59:53:274 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 I-Cookie: d84342894b87f573 R-Cookie: 0000000000000000 next payload: SA version: ISAKMP Version 1.0 exchange mode: Main flags: message ID: 0 length: 200 *Jun 20 14:59:53:274 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Sending an IPv4 packet. *Jun 20 14:59:53:274 2019 Branch_R1 IKE/7/EVENT: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Sent data to socket successfully. *Jun 20 14:59:53:279 2019 Branch_R1 IKE/7/EVENT: Received packet successfully. *Jun 20 14:59:53:279 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Received packet from 192.168.1.2 source port 500 destination port 500. *Jun 20 14:59:53:279 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 I-Cookie: d84342894b87f573 R-Cookie: 5281f78233fdb0e4 next payload: SA version: ISAKMP Version 1.0 exchange mode: Main flags: message ID: 0 length: 108 *Jun 20 14:59:53:279 2019 Branch_R1 IKE/7/EVENT: IKE thread 1099099873968 processes a job. *Jun 20 14:59:53:279 2019 Branch_R1 IKE/7/EVENT: Phase1 process started. *Jun 20 14:59:53:279 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Received ISAKMP Security Association Payload. *Jun 20 14:59:53:279 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Received ISAKMP Vendor ID Payload. *Jun 20 14:59:53:280 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Process SA payload. *Jun 20 14:59:53:280 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Check ISAKMP transform 1. *Jun 20 14:59:53:280 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Encryption algorithm is AES-CBC. *Jun 20 14:59:53:280 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Key length is 256 bytes. *Jun 20 14:59:53:280 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 HASH algorithm is HMAC-SHA1. *Jun 20 14:59:53:280 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 DH group is 14. *Jun 20 14:59:53:280 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Authentication method is RSA signature. *Jun 20 14:59:53:281 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Lifetime type is 1. *Jun 20 14:59:53:281 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Life duration is 86400. *Jun 20 14:59:53:281 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Attributes is acceptable. *Jun 20 14:59:53:281 2019 Branch_R1 IKE/7/EVENT: Oakley transform 1 is acceptable. *Jun 20 14:59:53:281 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Process vendor ID payload. *Jun 20 14:59:53:281 2019 Branch_R1 IKE/7/EVENT: Vendor ID NAT-T rfc3947 is matched. *Jun 20 14:59:53:296 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Construct KE payload. *Jun 20 14:59:53:296 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Construct NONCE payload. *Jun 20 14:59:53:297 2019 Branch_R1 IKE/7/ERROR: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Failed to construct certificate request payload. *Jun 20 14:59:53:297 2019 Branch_R1 IKE/7/ERROR: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Failed to negotiate IKE SA. *Jun 20 14:59:56:264 2019 Branch_R1 IKE/7/EVENT: Received message from ipsec. *Jun 20 14:59:56:264 2019 Branch_R1 IKE/7/EVENT: Received SA acquire message from IPsec. *Jun 20 14:59:56:264 2019 Branch_R1 IKE/7/EVENT: IKE thread 1099099873968 processes a job. *Jun 20 14:59:56:265 2019 Branch_R1 IKE/7/EVENT: Received SA acquire message from IPsec. *Jun 20 14:59:56:265 2019 Branch_R1 IKE/7/EVENT: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Set IPsec SA state to IKE_P2_STATE_INIT. *Jun 20 14:59:56:265 2019 Branch_R1 IKE/7/EVENT: IKE SA not found. Initiate IKE SA negotiation. *Jun 20 14:59:56:265 2019 Branch_R1 IKE/7/EVENT: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Obtained profile 2. *Jun 20 14:59:56:265 2019 Branch_R1 IKE/7/EVENT: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Initiator created an SA for peer 192.168.1.2, local port 500, remote port 500. *Jun 20 14:59:56:265 2019 Branch_R1 IKE/7/EVENT: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Set IKE SA state to IKE_P1_STATE_INIT. *Jun 20 14:59:56:266 2019 Branch_R1 IKE/7/EVENT: IKE thread 1099099873968 processes a job. *Jun 20 14:59:56:266 2019 Branch_R1 IKE/7/EVENT: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Begin Main mode exchange. *Jun 20 14:59:56:266 2019 Branch_R1 IKE/7/EVENT: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Pre-shared key matching address 192.168.1.2 not found. *Jun 20 14:59:56:266 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Encryption algorithm is AES-CBC. *Jun 20 14:59:56:266 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Key length is 256 bits. *Jun 20 14:59:56:266 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Hash algorithm is HMAC-SHA1. *Jun 20 14:59:56:266 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 DH group 14. *Jun 20 14:59:56:266 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Authentication method is RSA signature. *Jun 20 14:59:56:267 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Lifetime type is in seconds. *Jun 20 14:59:56:267 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Life duration is 86400. *Jun 20 14:59:56:267 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Construct transfrom payload for transform 1. *Jun 20 14:59:56:267 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Constructed SA payload. *Jun 20 14:59:56:267 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Construct NAT-T rfc3947 vendor ID payload. *Jun 20 14:59:56:267 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Construct NAT-T draft3 vendor ID payload. *Jun 20 14:59:56:267 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Construct NAT-T draft2 vendor ID payload. *Jun 20 14:59:56:268 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Construct NAT-T draft1 vendor ID payload. *Jun 20 14:59:56:268 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Construct XAUTH Cisco Unity 1.0 vendor ID payload. *Jun 20 14:59:56:268 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Construct XAUTH draft6 vendor ID payload. *Jun 20 14:59:56:268 2019 Branch_R1 IKE/7/EVENT: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 IKE SA state changed from IKE_P1_STATE_INIT to IKE_P1_STATE_SEND1. *Jun 20 14:59:56:268 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Sending packet to 192.168.1.2 remote port 500, local port 500. *Jun 20 14:59:56:268 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 I-Cookie: 30e50741f7a59bec R-Cookie: 0000000000000000 next payload: SA version: ISAKMP Version 1.0 exchange mode: Main flags: message ID: 0 length: 200 *Jun 20 14:59:56:268 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Sending an IPv4 packet. *Jun 20 14:59:56:269 2019 Branch_R1 IKE/7/EVENT: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Sent data to socket successfully. *Jun 20 14:59:56:273 2019 Branch_R1 IKE/7/EVENT: Received packet successfully. *Jun 20 14:59:56:273 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Received packet from 192.168.1.2 source port 500 destination port 500. *Jun 20 14:59:56:273 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 I-Cookie: 30e50741f7a59bec R-Cookie: 0ca9a17f3cb75581 next payload: SA version: ISAKMP Version 1.0 exchange mode: Main flags: message ID: 0 length: 108 *Jun 20 14:59:56:274 2019 Branch_R1 IKE/7/EVENT: IKE thread 1099099873968 processes a job. *Jun 20 14:59:56:274 2019 Branch_R1 IKE/7/EVENT: Phase1 process started. *Jun 20 14:59:56:274 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Received ISAKMP Security Association Payload. *Jun 20 14:59:56:274 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Received ISAKMP Vendor ID Payload. *Jun 20 14:59:56:274 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Process SA payload. *Jun 20 14:59:56:274 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Check ISAKMP transform 1. *Jun 20 14:59:56:274 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Encryption algorithm is AES-CBC. *Jun 20 14:59:56:275 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Key length is 256 bytes. *Jun 20 14:59:56:275 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 HASH algorithm is HMAC-SHA1. *Jun 20 14:59:56:275 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 DH group is 14. *Jun 20 14:59:56:275 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Authentication method is RSA signature. *Jun 20 14:59:56:275 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Lifetime type is 1. *Jun 20 14:59:56:275 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Life duration is 86400. *Jun 20 14:59:56:275 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Attributes is acceptable. *Jun 20 14:59:56:275 2019 Branch_R1 IKE/7/EVENT: Oakley transform 1 is acceptable. *Jun 20 14:59:56:276 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Process vendor ID payload. *Jun 20 14:59:56:276 2019 Branch_R1 IKE/7/EVENT: Vendor ID NAT-T rfc3947 is matched. *Jun 20 14:59:56:305 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Construct KE payload. *Jun 20 14:59:56:305 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Construct NONCE payload. *Jun 20 14:59:56:306 2019 Branch_R1 IKE/7/ERROR: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Failed to construct certificate request payload. *Jun 20 14:59:56:306 2019 Branch_R1 IKE/7/ERROR: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Failed to negotiate IKE SA. *Jun 20 14:59:59:264 2019 Branch_R1 IKE/7/EVENT: Received message from ipsec. *Jun 20 14:59:59:264 2019 Branch_R1 IKE/7/EVENT: Received SA acquire message from IPsec. *Jun 20 14:59:59:264 2019 Branch_R1 IKE/7/EVENT: IKE thread 1099099873968 processes a job. *Jun 20 14:59:59:264 2019 Branch_R1 IKE/7/EVENT: Received SA acquire message from IPsec. *Jun 20 14:59:59:265 2019 Branch_R1 IKE/7/EVENT: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Set IPsec SA state to IKE_P2_STATE_INIT. *Jun 20 14:59:59:265 2019 Branch_R1 IKE/7/EVENT: IKE SA not found. Initiate IKE SA negotiation. *Jun 20 14:59:59:265 2019 Branch_R1 IKE/7/EVENT: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Obtained profile 2. *Jun 20 14:59:59:265 2019 Branch_R1 IKE/7/EVENT: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Initiator created an SA for peer 192.168.1.2, local port 500, remote port 500. *Jun 20 14:59:59:265 2019 Branch_R1 IKE/7/EVENT: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Set IKE SA state to IKE_P1_STATE_INIT. *Jun 20 14:59:59:265 2019 Branch_R1 IKE/7/EVENT: IKE thread 1099099873968 processes a job. *Jun 20 14:59:59:265 2019 Branch_R1 IKE/7/EVENT: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Begin Main mode exchange. *Jun 20 14:59:59:265 2019 Branch_R1 IKE/7/EVENT: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Pre-shared key matching address 192.168.1.2 not found. *Jun 20 14:59:59:265 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Encryption algorithm is AES-CBC. *Jun 20 14:59:59:265 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Key length is 256 bits. *Jun 20 14:59:59:265 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Hash algorithm is HMAC-SHA1. *Jun 20 14:59:59:266 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 DH group 14. *Jun 20 14:59:59:266 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Authentication method is RSA signature. *Jun 20 14:59:59:266 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Lifetime type is in seconds. *Jun 20 14:59:59:266 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Life duration is 86400. *Jun 20 14:59:59:266 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Construct transfrom payload for transform 1. *Jun 20 14:59:59:266 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Constructed SA payload. *Jun 20 14:59:59:266 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Construct NAT-T rfc3947 vendor ID payload. *Jun 20 14:59:59:266 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Construct NAT-T draft3 vendor ID payload. *Jun 20 14:59:59:266 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Construct NAT-T draft2 vendor ID payload. *Jun 20 14:59:59:266 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Construct NAT-T draft1 vendor ID payload. *Jun 20 14:59:59:266 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Construct XAUTH Cisco Unity 1.0 vendor ID payload. *Jun 20 14:59:59:266 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Construct XAUTH draft6 vendor ID payload. *Jun 20 14:59:59:266 2019 Branch_R1 IKE/7/EVENT: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 IKE SA state changed from IKE_P1_STATE_INIT to IKE_P1_STATE_SEND1. *Jun 20 14:59:59:267 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Sending packet to 192.168.1.2 remote port 500, local port 500. *Jun 20 14:59:59:267 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 I-Cookie: f39ebed5f8bc1877 R-Cookie: 0000000000000000 next payload: SA version: ISAKMP Version 1.0 exchange mode: Main flags: message ID: 0 length: 200 *Jun 20 14:59:59:267 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Sending an IPv4 packet. *Jun 20 14:59:59:267 2019 Branch_R1 IKE/7/EVENT: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Sent data to socket successfully. *Jun 20 15:00:01:817 2019 Branch_R1 IKE/7/EVENT: Received packet successfully. *Jun 20 15:00:01:817 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Received packet from 192.168.1.2 source port 500 destination port 500. *Jun 20 15:00:01:817 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 I-Cookie: 30e50741f7a59bec R-Cookie: 0ca9a17f3cb75581 next payload: SA version: ISAKMP Version 1.0 exchange mode: Main flags: message ID: 0 length: 108 *Jun 20 15:00:01:818 2019 Branch_R1 IKE/7/EVENT: IKE thread 1099099873968 processes a job. *Jun 20 15:00:01:818 2019 Branch_R1 IKE/7/EVENT: Phase1 process started. *Jun 20 15:00:01:818 2019 Branch_R1 IKE/7/ERROR: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Can't find IKE SA. *Jun 20 15:00:04:416 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Retransmit phase 1 packet. *Jun 20 15:00:04:417 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Sending packet to 192.168.1.2 remote port 500, local port 500. *Jun 20 15:00:04:417 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 I-Cookie: f39ebed5f8bc1877 R-Cookie: 0000000000000000 next payload: SA version: ISAKMP Version 1.0 exchange mode: Main flags: message ID: 0 length: 200 *Jun 20 15:00:04:417 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Sending an IPv4 packet. *Jun 20 15:00:04:417 2019 Branch_R1 IKE/7/EVENT: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Sent data to socket successfully. *Jun 20 15:00:06:415 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.1/500 Retransmit phase 1 packet. *Jun 20 15:00:06:415 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.1/500 Sending packet to 192.168.1.1 remote port 500, local port 500. *Jun 20 15:00:06:415 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.1/500 I-Cookie: b4758910dadc1266 R-Cookie: 0000000000000000 next payload: SA version: ISAKMP Version 1.0 exchange mode: Main flags: message ID: 0 length: 200 *Jun 20 15:00:06:415 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.1/500 Sending an IPv4 packet. *Jun 20 15:00:06:415 2019 Branch_R1 IKE/7/EVENT: vrf = 0, src = 192.168.1.100, dst = 192.168.1.1/500 Sent data to socket successfully. *Jun 20 15:00:11:817 2019 Branch_R1 IKE/7/EVENT: Received packet successfully. *Jun 20 15:00:11:817 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Received packet from 192.168.1.2 source port 500 destination port 500. *Jun 20 15:00:11:818 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 I-Cookie: 30e50741f7a59bec R-Cookie: 0ca9a17f3cb75581 next payload: SA version: ISAKMP Version 1.0 exchange mode: Main flags: message ID: 0 length: 108 *Jun 20 15:00:11:818 2019 Branch_R1 IKE/7/EVENT: IKE thread 1099099873968 processes a job. *Jun 20 15:00:11:818 2019 Branch_R1 IKE/7/EVENT: Phase1 process started. *Jun 20 15:00:11:818 2019 Branch_R1 IKE/7/ERROR: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Can't find IKE SA. *Jun 20 15:00:18:414 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Retransmit phase 1 packet. *Jun 20 15:00:18:415 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Sending packet to 192.168.1.2 remote port 500, local port 500. *Jun 20 15:00:18:415 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 I-Cookie: f39ebed5f8bc1877 R-Cookie: 0000000000000000 next payload: SA version: ISAKMP Version 1.0 exchange mode: Main flags: message ID: 0 length: 200 *Jun 20 15:00:18:415 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Sending an IPv4 packet. *Jun 20 15:00:18:415 2019 Branch_R1 IKE/7/EVENT: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Sent data to socket successfully. *Jun 20 15:00:21:415 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.1/500 Retransmit phase 1 packet. *Jun 20 15:00:21:415 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.1/500 Sending packet to 192.168.1.1 remote port 500, local port 500. *Jun 20 15:00:21:415 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.1/500 I-Cookie: b4758910dadc1266 R-Cookie: 0000000000000000 next payload: SA version: ISAKMP Version 1.0 exchange mode: Main flags: message ID: 0 length: 200 *Jun 20 15:00:21:415 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.1/500 Sending an IPv4 packet. *Jun 20 15:00:21:415 2019 Branch_R1 IKE/7/EVENT: vrf = 0, src = 192.168.1.100, dst = 192.168.1.1/500 Sent data to socket successfully. *Jun 20 15:00:25:817 2019 Branch_R1 IKE/7/EVENT: Received packet successfully. *Jun 20 15:00:25:817 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Received packet from 192.168.1.2 source port 500 destination port 500. *Jun 20 15:00:25:818 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 I-Cookie: 30e50741f7a59bec R-Cookie: 0ca9a17f3cb75581 next payload: SA version: ISAKMP Version 1.0 exchange mode: Main flags: message ID: 0 length: 108 *Jun 20 15:00:25:818 2019 Branch_R1 IKE/7/EVENT: IKE thread 1099099873968 processes a job. *Jun 20 15:00:25:818 2019 Branch_R1 IKE/7/EVENT: Phase1 process started. *Jun 20 15:00:25:818 2019 Branch_R1 IKE/7/ERROR: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Can't find IKE SA. *Jun 20 15:00:36:415 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Retransmit phase 1 packet. *Jun 20 15:00:36:415 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Sending packet to 192.168.1.2 remote port 500, local port 500. *Jun 20 15:00:36:415 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 I-Cookie: f39ebed5f8bc1877 R-Cookie: 0000000000000000 next payload: SA version: ISAKMP Version 1.0 exchange mode: Main flags: message ID: 0 length: 200 *Jun 20 15:00:36:415 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Sending an IPv4 packet. *Jun 20 15:00:36:415 2019 Branch_R1 IKE/7/EVENT: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Sent data to socket successfully. *Jun 20 15:00:40:817 2019 Branch_R1 IKE/7/EVENT: Received packet successfully. *Jun 20 15:00:40:817 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Received packet from 192.168.1.2 source port 500 destination port 500. *Jun 20 15:00:40:818 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 I-Cookie: 30e50741f7a59bec R-Cookie: 0ca9a17f3cb75581 next payload: SA version: ISAKMP Version 1.0 exchange mode: Main flags: message ID: 0 length: 108 *Jun 20 15:00:40:818 2019 Branch_R1 IKE/7/EVENT: IKE thread 1099099873968 processes a job. *Jun 20 15:00:40:818 2019 Branch_R1 IKE/7/EVENT: Phase1 process started. *Jun 20 15:00:40:818 2019 Branch_R1 IKE/7/ERROR: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Can't find IKE SA. *Jun 20 15:00:42:414 2019 Branch_R1 IKE/7/EVENT: vrf = 0, src = 192.168.1.100, dst = 192.168.1.1/500 Retransmission of phase 1 packet timed out. *Jun 20 15:00:42:415 2019 Branch_R1 IKE/7/ERROR: vrf = 0, src = 192.168.1.100, dst = 192.168.1.1/500 Failed to negotiate IKE SA. *Jun 20 15:00:43:264 2019 Branch_R1 IKE/7/EVENT: Received message from ipsec. *Jun 20 15:00:43:264 2019 Branch_R1 IKE/7/EVENT: Received SA acquire message from IPsec. *Jun 20 15:00:43:264 2019 Branch_R1 IKE/7/EVENT: IKE thread 1099099873968 processes a job. *Jun 20 15:00:43:264 2019 Branch_R1 IKE/7/EVENT: Received SA acquire message from IPsec. *Jun 20 15:00:43:265 2019 Branch_R1 IKE/7/EVENT: vrf = 0, src = 192.168.1.100, dst = 192.168.1.1/500 Set IPsec SA state to IKE_P2_STATE_INIT. *Jun 20 15:00:43:265 2019 Branch_R1 IKE/7/EVENT: IKE SA not found. Initiate IKE SA negotiation. *Jun 20 15:00:43:265 2019 Branch_R1 IKE/7/EVENT: vrf = 0, src = 192.168.1.100, dst = 192.168.1.1/500 Obtained profile 1. *Jun 20 15:00:43:265 2019 Branch_R1 IKE/7/EVENT: vrf = 0, src = 192.168.1.100, dst = 192.168.1.1/500 Initiator created an SA for peer 192.168.1.1, local port 500, remote port 500. *Jun 20 15:00:43:265 2019 Branch_R1 IKE/7/EVENT: vrf = 0, src = 192.168.1.100, dst = 192.168.1.1/500 Set IKE SA state to IKE_P1_STATE_INIT. *Jun 20 15:00:43:265 2019 Branch_R1 IKE/7/EVENT: IKE thread 1099099873968 processes a job. *Jun 20 15:00:43:265 2019 Branch_R1 IKE/7/EVENT: vrf = 0, src = 192.168.1.100, dst = 192.168.1.1/500 Begin Main mode exchange. *Jun 20 15:00:43:265 2019 Branch_R1 IKE/7/EVENT: vrf = 0, src = 192.168.1.100, dst = 192.168.1.1/500 Pre-shared key matching address 192.168.1.1 not found. *Jun 20 15:00:43:265 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.1/500 Encryption algorithm is AES-CBC. *Jun 20 15:00:43:265 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.1/500 Key length is 256 bits. *Jun 20 15:00:43:265 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.1/500 Hash algorithm is HMAC-SHA1. *Jun 20 15:00:43:265 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.1/500 DH group 14. *Jun 20 15:00:43:266 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.1/500 Authentication method is RSA signature. *Jun 20 15:00:43:266 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.1/500 Lifetime type is in seconds. *Jun 20 15:00:43:266 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.1/500 Life duration is 86400. *Jun 20 15:00:43:266 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.1/500 Construct transfrom payload for transform 1. *Jun 20 15:00:43:266 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.1/500 Constructed SA payload. *Jun 20 15:00:43:266 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.1/500 Construct NAT-T rfc3947 vendor ID payload. *Jun 20 15:00:43:266 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.1/500 Construct NAT-T draft3 vendor ID payload. *Jun 20 15:00:43:266 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.1/500 Construct NAT-T draft2 vendor ID payload. *Jun 20 15:00:43:266 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.1/500 Construct NAT-T draft1 vendor ID payload. *Jun 20 15:00:43:266 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.1/500 Construct XAUTH Cisco Unity 1.0 vendor ID payload. *Jun 20 15:00:43:266 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.1/500 Construct XAUTH draft6 vendor ID payload. *Jun 20 15:00:43:266 2019 Branch_R1 IKE/7/EVENT: vrf = 0, src = 192.168.1.100, dst = 192.168.1.1/500 IKE SA state changed from IKE_P1_STATE_INIT to IKE_P1_STATE_SEND1. *Jun 20 15:00:43:266 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.1/500 Sending packet to 192.168.1.1 remote port 500, local port 500. *Jun 20 15:00:43:267 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.1/500 I-Cookie: 0ffc33675829934f R-Cookie: 0000000000000000 next payload: SA version: ISAKMP Version 1.0 exchange mode: Main flags: message ID: 0 length: 200 *Jun 20 15:00:43:267 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.1/500 Sending an IPv4 packet. *Jun 20 15:00:43:267 2019 Branch_R1 IKE/7/EVENT: vrf = 0, src = 192.168.1.100, dst = 192.168.1.1/500 Sent data to socket successfully. *Jun 20 15:00:48:416 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.1/500 Retransmit phase 1 packet. *Jun 20 15:00:48:417 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.1/500 Sending packet to 192.168.1.1 remote port 500, local port 500. *Jun 20 15:00:48:417 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.1/500 I-Cookie: 0ffc33675829934f R-Cookie: 0000000000000000 next payload: SA version: ISAKMP Version 1.0 exchange mode: Main flags: message ID: 0 length: 200 *Jun 20 15:00:48:417 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.1/500 Sending an IPv4 packet. *Jun 20 15:00:48:417 2019 Branch_R1 IKE/7/EVENT: vrf = 0, src = 192.168.1.100, dst = 192.168.1.1/500 Sent data to socket successfully. *Jun 20 15:00:50:414 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Retransmit phase 1 packet. *Jun 20 15:00:50:415 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Sending packet to 192.168.1.2 remote port 500, local port 500. *Jun 20 15:00:50:415 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 I-Cookie: f39ebed5f8bc1877 R-Cookie: 0000000000000000 next payload: SA version: ISAKMP Version 1.0 exchange mode: Main flags: message ID: 0 length: 200 *Jun 20 15:00:50:415 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Sending an IPv4 packet. *Jun 20 15:00:50:415 2019 Branch_R1 IKE/7/EVENT: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Sent data to socket successfully. *Jun 20 15:00:56:416 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.1/500 Retransmit phase 1 packet. *Jun 20 15:00:56:417 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.1/500 Sending packet to 192.168.1.1 remote port 500, local port 500. *Jun 20 15:00:56:417 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.1/500 I-Cookie: 0ffc33675829934f R-Cookie: 0000000000000000 next payload: SA version: ISAKMP Version 1.0 exchange mode: Main flags: message ID: 0 length: 200 *Jun 20 15:00:56:417 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.1/500 Sending an IPv4 packet. *Jun 20 15:00:56:417 2019 Branch_R1 IKE/7/EVENT: vrf = 0, src = 192.168.1.100, dst = 192.168.1.1/500 Sent data to socket successfully. *Jun 20 15:01:02:817 2019 Branch_R1 IKE/7/EVENT: Received packet successfully. *Jun 20 15:01:02:817 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Received packet from 192.168.1.2 source port 500 destination port 500. *Jun 20 15:01:02:818 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 I-Cookie: 30e50741f7a59bec R-Cookie: 0ca9a17f3cb75581 next payload: SA version: ISAKMP Version 1.0 exchange mode: Main flags: message ID: 0 length: 108 *Jun 20 15:01:02:818 2019 Branch_R1 IKE/7/EVENT: IKE thread 1099099873968 processes a job. *Jun 20 15:01:02:818 2019 Branch_R1 IKE/7/EVENT: Phase1 process started. *Jun 20 15:01:02:818 2019 Branch_R1 IKE/7/ERROR: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Can't find IKE SA. *Jun 20 15:01:05:414 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Retransmit phase 1 packet. *Jun 20 15:01:05:415 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Sending packet to 192.168.1.2 remote port 500, local port 500. *Jun 20 15:01:05:415 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 I-Cookie: f39ebed5f8bc1877 R-Cookie: 0000000000000000 next payload: SA version: ISAKMP Version 1.0 exchange mode: Main flags: message ID: 0 length: 200 *Jun 20 15:01:05:415 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Sending an IPv4 packet. *Jun 20 15:01:05:415 2019 Branch_R1 IKE/7/EVENT: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Sent data to socket successfully. *Jun 20 15:01:12:414 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.1/500 Retransmit phase 1 packet. *Jun 20 15:01:12:415 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.1/500 Sending packet to 192.168.1.1 remote port 500, local port 500. *Jun 20 15:01:12:415 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.1/500 I-Cookie: 0ffc33675829934f R-Cookie: 0000000000000000 next payload: SA version: ISAKMP Version 1.0 exchange mode: Main flags: message ID: 0 length: 200 *Jun 20 15:01:12:415 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.1/500 Sending an IPv4 packet. *Jun 20 15:01:12:415 2019 Branch_R1 IKE/7/EVENT: vrf = 0, src = 192.168.1.100, dst = 192.168.1.1/500 Sent data to socket successfully. *Jun 20 15:01:20:046 2019 Branch_R1 IKE/7/EVENT: Received packet successfully. *Jun 20 15:01:20:046 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Received packet from 192.168.1.2 source port 500 destination port 500. *Jun 20 15:01:20:046 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 I-Cookie: 9b5a72f9b87695c7 R-Cookie: 0000000000000000 next payload: SA version: ISAKMP Version 1.0 exchange mode: Main flags: message ID: 0 length: 168 *Jun 20 15:01:20:047 2019 Branch_R1 IKE/7/EVENT: IKE thread 1099099873968 processes a job. *Jun 20 15:01:20:047 2019 Branch_R1 IKE/7/EVENT: Phase1 process started. *Jun 20 15:01:20:047 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Collision of phase 1 negotiation is found. *Jun 20 15:01:20:047 2019 Branch_R1 IKE/7/EVENT: Phase 1 Exchange chooses role: Local is responder *Jun 20 15:01:20:047 2019 Branch_R1 IKE/7/ERROR: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Failed to negotiate IKE SA. *Jun 20 15:01:20:048 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Begin a new phase 1 negotiation as responder. *Jun 20 15:01:20:048 2019 Branch_R1 IKE/7/EVENT: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Responder created an SA for peer 192.168.1.2, local port 500, remote port 500. *Jun 20 15:01:20:048 2019 Branch_R1 IKE/7/EVENT: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Set IKE SA state to IKE_P1_STATE_INIT. *Jun 20 15:01:20:048 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Received ISAKMP Security Association Payload. *Jun 20 15:01:20:048 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Received ISAKMP Vendor ID Payload. *Jun 20 15:01:20:048 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Received ISAKMP Vendor ID Payload. *Jun 20 15:01:20:048 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Received ISAKMP Vendor ID Payload. *Jun 20 15:01:20:048 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Received ISAKMP Vendor ID Payload. *Jun 20 15:01:20:048 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Process vendor ID payload. *Jun 20 15:01:20:048 2019 Branch_R1 IKE/7/EVENT: Vendor ID NAT-T rfc3947 is matched. *Jun 20 15:01:20:048 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Process SA payload. *Jun 20 15:01:20:048 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Check ISAKMP transform 1. *Jun 20 15:01:20:049 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Encryption algorithm is AES-CBC. *Jun 20 15:01:20:049 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Key length is 256 bytes. *Jun 20 15:01:20:049 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 HASH algorithm is HMAC-SHA1. *Jun 20 15:01:20:049 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 DH group is 14. *Jun 20 15:01:20:049 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Authentication method is RSA signature. *Jun 20 15:01:20:049 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Lifetime type is 1. *Jun 20 15:01:20:049 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Life duration is 86400. *Jun 20 15:01:20:049 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Attributes is acceptable. *Jun 20 15:01:20:049 2019 Branch_R1 IKE/7/EVENT: Oakley transform 1 is acceptable. *Jun 20 15:01:20:049 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Constructed SA payload *Jun 20 15:01:20:049 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Construct NAT-T rfc3947 vendor ID payload. *Jun 20 15:01:20:049 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Construct XAUTH Cisco Unity 1.0 vendor ID payload. *Jun 20 15:01:20:049 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Construct XAUTH draft6 vendor ID payload. *Jun 20 15:01:20:050 2019 Branch_R1 IKE/7/EVENT: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 IKE SA state changed from IKE_P1_STATE_INIT to IKE_P1_STATE_SEND2. *Jun 20 15:01:20:050 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Sending packet to 192.168.1.2 remote port 500, local port 500. *Jun 20 15:01:20:050 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 I-Cookie: 9b5a72f9b87695c7 R-Cookie: 9118e1d46198af61 next payload: SA version: ISAKMP Version 1.0 exchange mode: Main flags: message ID: 0 length: 140 *Jun 20 15:01:20:050 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Sending an IPv4 packet. *Jun 20 15:01:20:050 2019 Branch_R1 IKE/7/EVENT: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Sent data to socket successfully. *Jun 20 15:01:20:217 2019 Branch_R1 IKE/7/EVENT: Received packet successfully. *Jun 20 15:01:20:217 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Received packet from 192.168.1.2 source port 500 destination port 500. *Jun 20 15:01:20:217 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 I-Cookie: 9b5a72f9b87695c7 R-Cookie: 9118e1d46198af61 next payload: KE version: ISAKMP Version 1.0 exchange mode: Main flags: message ID: 0 length: 412 *Jun 20 15:01:20:217 2019 Branch_R1 IKE/7/EVENT: IKE thread 1099099873968 processes a job. *Jun 20 15:01:20:218 2019 Branch_R1 IKE/7/EVENT: Phase1 process started. *Jun 20 15:01:20:218 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Received ISAKMP Key Exchange Payload. *Jun 20 15:01:20:218 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Received ISAKMP Nonce Payload. *Jun 20 15:01:20:218 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Received ISAKMP Certificate RequestPayload. *Jun 20 15:01:20:218 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Received ISAKMP NAT-D Payload. *Jun 20 15:01:20:218 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Received ISAKMP NAT-D Payload. *Jun 20 15:01:20:218 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Received ISAKMP Vendor ID Payload. *Jun 20 15:01:20:218 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Process KE payload. *Jun 20 15:01:20:218 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Process NONCE payload. *Jun 20 15:01:20:218 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Received 2 NAT-D payload. *Jun 20 15:01:20:218 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Process certificate request payload. *Jun 20 15:01:20:219 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Received certificate request payload that contains issuer name CN=DCvpnnetPRD-CA1-CA. *Jun 20 15:01:20:219 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Process vendor ID payload. *Jun 20 15:01:20:219 2019 Branch_R1 IKE/7/EVENT: Vendor ID DPD is matched. *Jun 20 15:01:20:233 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Construct KE payload. *Jun 20 15:01:20:234 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Construct NONCE payload. *Jun 20 15:01:20:234 2019 Branch_R1 IKE/7/ERROR: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Failed to construct certificate request payload. *Jun 20 15:01:20:234 2019 Branch_R1 IKE/7/ERROR: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Failed to negotiate IKE SA. *Jun 20 15:01:20:264 2019 Branch_R1 IKE/7/EVENT: Received message from ipsec. *Jun 20 15:01:20:264 2019 Branch_R1 IKE/7/EVENT: Received SA acquire message from IPsec. *Jun 20 15:01:20:265 2019 Branch_R1 IKE/7/EVENT: IKE thread 1099099873968 processes a job. *Jun 20 15:01:20:265 2019 Branch_R1 IKE/7/EVENT: Received SA acquire message from IPsec. *Jun 20 15:01:20:265 2019 Branch_R1 IKE/7/EVENT: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Set IPsec SA state to IKE_P2_STATE_INIT. *Jun 20 15:01:20:265 2019 Branch_R1 IKE/7/EVENT: IKE SA not found. Initiate IKE SA negotiation. *Jun 20 15:01:20:265 2019 Branch_R1 IKE/7/EVENT: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Obtained profile 2. *Jun 20 15:01:20:265 2019 Branch_R1 IKE/7/EVENT: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Initiator created an SA for peer 192.168.1.2, local port 500, remote port 500. *Jun 20 15:01:20:265 2019 Branch_R1 IKE/7/EVENT: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Set IKE SA state to IKE_P1_STATE_INIT. *Jun 20 15:01:20:266 2019 Branch_R1 IKE/7/EVENT: IKE thread 1099099873968 processes a job. *Jun 20 15:01:20:266 2019 Branch_R1 IKE/7/EVENT: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Begin Main mode exchange. *Jun 20 15:01:20:266 2019 Branch_R1 IKE/7/EVENT: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Pre-shared key matching address 192.168.1.2 not found. *Jun 20 15:01:20:266 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Encryption algorithm is AES-CBC. *Jun 20 15:01:20:266 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Key length is 256 bits. *Jun 20 15:01:20:266 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Hash algorithm is HMAC-SHA1. *Jun 20 15:01:20:266 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 DH group 14. *Jun 20 15:01:20:266 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Authentication method is RSA signature. *Jun 20 15:01:20:267 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Lifetime type is in seconds. *Jun 20 15:01:20:267 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Life duration is 86400. *Jun 20 15:01:20:267 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Construct transfrom payload for transform 1. *Jun 20 15:01:20:267 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Constructed SA payload. *Jun 20 15:01:20:267 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Construct NAT-T rfc3947 vendor ID payload. *Jun 20 15:01:20:267 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Construct NAT-T draft3 vendor ID payload. *Jun 20 15:01:20:267 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Construct NAT-T draft2 vendor ID payload. *Jun 20 15:01:20:267 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Construct NAT-T draft1 vendor ID payload. *Jun 20 15:01:20:268 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Construct XAUTH Cisco Unity 1.0 vendor ID payload. *Jun 20 15:01:20:268 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Construct XAUTH draft6 vendor ID payload. *Jun 20 15:01:20:268 2019 Branch_R1 IKE/7/EVENT: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 IKE SA state changed from IKE_P1_STATE_INIT to IKE_P1_STATE_SEND1. *Jun 20 15:01:20:268 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500 Sending packet to 192.168.1.2 remote port 500, local port 500. *Jun 20 15:01:20:268 2019 Branch_R1 IKE/7/PACKET: vrf = 0, src = 192.168.1.100, dst = 192.168.1.2/500