6|Nov 19 2014|12:03:48|302014|217.174.237.139|49928|193.155.236.70|10000|Teardown TCP connection 4103369 for wan_primary:217.174.237.139/49928 to identity:193.155.236.70/10000 duration 0:00:00 bytes 400 TCP Reset-O 7|Nov 19 2014|12:03:48|713236|||||IP = 217.174.237.139, IKE_DECODE SENDING Message (msgid=0) with payloads : HDR + SA (1) + KE (4) + NONCE (10) + ID (5) + HASH (8) + VENDOR (13) + VENDOR (13) + VENDOR (13) + VENDOR (13) + VENDOR (13) + NONE (0) total length : 376 7|Nov 19 2014|12:03:48|715048|||||Group = TMASB_TEST2, IP = 217.174.237.139, Send Altiga/Cisco VPN3000/Cisco ASA GW VID 7|Nov 19 2014|12:03:48|715046|||||Group = TMASB_TEST2, IP = 217.174.237.139, constructing VID payload 7|Nov 19 2014|12:03:48|715046|||||Group = TMASB_TEST2, IP = 217.174.237.139, constructing Fragmentation VID + extended capabilities payload 7|Nov 19 2014|12:03:48|715046|||||Group = TMASB_TEST2, IP = 217.174.237.139, constructing dpd vid payload 7|Nov 19 2014|12:03:48|715046|||||Group = TMASB_TEST2, IP = 217.174.237.139, constructing xauth V6 VID payload 7|Nov 19 2014|12:03:48|715046|||||Group = TMASB_TEST2, IP = 217.174.237.139, constructing Cisco Unity VID payload 7|Nov 19 2014|12:03:48|715076|||||Group = TMASB_TEST2, IP = 217.174.237.139, Computing hash for ISAKMP 7|Nov 19 2014|12:03:48|715046|||||Group = TMASB_TEST2, IP = 217.174.237.139, constructing hash payload 7|Nov 19 2014|12:03:48|715046|||||Group = TMASB_TEST2, IP = 217.174.237.139, constructing ID payload 7|Nov 19 2014|12:03:48|713906|||||Group = TMASB_TEST2, IP = 217.174.237.139, Generating keys for Responder... 7|Nov 19 2014|12:03:48|715046|||||Group = TMASB_TEST2, IP = 217.174.237.139, constructing nonce payload 7|Nov 19 2014|12:03:48|715046|||||Group = TMASB_TEST2, IP = 217.174.237.139, constructing ke payload 7|Nov 19 2014|12:03:48|715046|||||Group = TMASB_TEST2, IP = 217.174.237.139, constructing ISAKMP SA payload 7|Nov 19 2014|12:03:48|715028|||||Group = TMASB_TEST2, IP = 217.174.237.139, IKE SA Proposal # 1, Transform # 14 acceptable Matches global IKE entry # 5 7|Nov 19 2014|12:03:48|715047|||||Group = TMASB_TEST2, IP = 217.174.237.139, processing IKE SA payload 7|Nov 19 2014|12:03:48|713906|||||IP = 217.174.237.139, Connection landed on tunnel_group TMASB_TEST2 7|Nov 19 2014|12:03:48|715064|||||IP = 217.174.237.139, IKE Peer included IKE fragmentation capability flags: Main Mode: True Aggressive Mode: True 7|Nov 19 2014|12:03:48|715049|||||IP = 217.174.237.139, Received Fragmentation VID 7|Nov 19 2014|12:03:48|715047|||||IP = 217.174.237.139, processing VID payload 7|Nov 19 2014|12:03:48|715049|||||IP = 217.174.237.139, Received xauth V6 VID 7|Nov 19 2014|12:03:48|715047|||||IP = 217.174.237.139, processing VID payload 7|Nov 19 2014|12:03:48|715049|||||IP = 217.174.237.139, Received Cisco Unity client VID 7|Nov 19 2014|12:03:48|715047|||||IP = 217.174.237.139, processing VID payload 7|Nov 19 2014|12:03:48|715047|||||IP = 217.174.237.139, processing ID payload 7|Nov 19 2014|12:03:48|715047|||||IP = 217.174.237.139, processing nonce payload 7|Nov 19 2014|12:03:48|715047|||||IP = 217.174.237.139, processing ISA_KE payload 7|Nov 19 2014|12:03:48|715047|||||IP = 217.174.237.139, processing ke payload 7|Nov 19 2014|12:03:48|715047|||||IP = 217.174.237.139, processing SA payload 7|Nov 19 2014|12:03:48|713906|||||IP = 217.174.237.139, Responder: IPSec over TCP encapsulation is used local TCP port: 10000 peer TCP port: 49928 7|Nov 19 2014|12:03:48|713236|||||IP = 217.174.237.139, IKE_DECODE RECEIVED Message (msgid=0) with payloads : HDR + SA (1) + KE (4) + NONCE (10) + ID (5) + VENDOR (13) + VENDOR (13) + VENDOR (13) + NONE (0) total length : 975 6|Nov 19 2014|12:03:48|302015|217.174.237.139|49928|193.155.236.70|500|Built inbound UDP connection 4103370 for wan_primary:217.174.237.139/49928 (217.174.237.139/49928) to identity:193.155.236.70/500 (193.155.236.70/500) 6|Nov 19 2014|12:03:48|302013|217.174.237.139|49928|193.155.236.70|10000|Built inbound TCP connection 4103369 for wan_primary:217.174.237.139/49928 (217.174.237.139/49928) to identity:193.155.236.70/10000 (193.155.236.70/10000) 7|Nov 19 2014|12:03:47|713236|||||IP = 217.174.237.139, IKE_DECODE SENDING Message (msgid=6478ec6c) with payloads : HDR + HASH (8) + DELETE (12) + NONE (0) total length : 80 7|Nov 19 2014|12:03:47|715046|||||Group = TMASB_TEST2, IP = 217.174.237.139, constructing qm hash payload 7|Nov 19 2014|12:03:47|715046|||||Group = TMASB_TEST2, IP = 217.174.237.139, constructing IKE delete payload 7|Nov 19 2014|12:03:47|715046|||||Group = TMASB_TEST2, IP = 217.174.237.139, constructing blank hash payload 7|Nov 19 2014|12:03:47|713906|||||Group = TMASB_TEST2, IP = 217.174.237.139, sending delete/delete with reason message 7|Nov 19 2014|12:03:47|713906|||||Group = TMASB_TEST2, IP = 217.174.237.139, IKE SA AM:18ce252c terminating: flags 0x0100c001, refcnt 0, tuncnt 0 7|Nov 19 2014|12:03:47|715065|||||Group = TMASB_TEST2, IP = 217.174.237.139, IKE AM Responder FSM error history (struct &0xb40cbb00) , : AM_DONE, EV_ERROR-->AM_WAIT_MSG3, EV_PROB_AUTH_FAIL-->AM_WAIT_MSG3, EV_TIMEOUT-->AM_WAIT_MSG3, NullEvent-->AM_SND_MSG2, EV_CHECK_SPOOF-->AM_SND_MSG2, EV_CRYPTO_ACTIVE-->AM_SND_MSG2, EV_SND_MSG-->AM_SND_MSG2, EV_START_TMR 6|Nov 19 2014|12:03:40|302016|217.174.237.139|15843|193.155.236.70|500|Teardown UDP connection 4102850 for wan_primary:217.174.237.139/15843 to identity:193.155.236.70/500 duration 0:02:01 bytes 975 6|Nov 19 2014|12:03:16|302014|217.174.237.139|16474|193.155.236.70|10000|Teardown TCP connection 4103249 for wan_primary:217.174.237.139/16474 to identity:193.155.236.70/10000 duration 0:00:00 bytes 400 TCP Reset-O 7|Nov 19 2014|12:03:15|713236|||||IP = 217.174.237.139, IKE_DECODE SENDING Message (msgid=0) with payloads : HDR + SA (1) + KE (4) + NONCE (10) + ID (5) + HASH (8) + VENDOR (13) + VENDOR (13) + VENDOR (13) + VENDOR (13) + VENDOR (13) + NONE (0) total length : 376 7|Nov 19 2014|12:03:15|715048|||||Group = TMASB_TEST2, IP = 217.174.237.139, Send Altiga/Cisco VPN3000/Cisco ASA GW VID 7|Nov 19 2014|12:03:15|715046|||||Group = TMASB_TEST2, IP = 217.174.237.139, constructing VID payload 7|Nov 19 2014|12:03:15|715046|||||Group = TMASB_TEST2, IP = 217.174.237.139, constructing Fragmentation VID + extended capabilities payload 7|Nov 19 2014|12:03:15|715046|||||Group = TMASB_TEST2, IP = 217.174.237.139, constructing dpd vid payload 7|Nov 19 2014|12:03:15|715046|||||Group = TMASB_TEST2, IP = 217.174.237.139, constructing xauth V6 VID payload 7|Nov 19 2014|12:03:15|715046|||||Group = TMASB_TEST2, IP = 217.174.237.139, constructing Cisco Unity VID payload 7|Nov 19 2014|12:03:15|715076|||||Group = TMASB_TEST2, IP = 217.174.237.139, Computing hash for ISAKMP 7|Nov 19 2014|12:03:15|715046|||||Group = TMASB_TEST2, IP = 217.174.237.139, constructing hash payload 7|Nov 19 2014|12:03:15|715046|||||Group = TMASB_TEST2, IP = 217.174.237.139, constructing ID payload 7|Nov 19 2014|12:03:15|713906|||||Group = TMASB_TEST2, IP = 217.174.237.139, Generating keys for Responder... 7|Nov 19 2014|12:03:15|715046|||||Group = TMASB_TEST2, IP = 217.174.237.139, constructing nonce payload 7|Nov 19 2014|12:03:15|715046|||||Group = TMASB_TEST2, IP = 217.174.237.139, constructing ke payload 7|Nov 19 2014|12:03:15|715046|||||Group = TMASB_TEST2, IP = 217.174.237.139, constructing ISAKMP SA payload 7|Nov 19 2014|12:03:15|715028|||||Group = TMASB_TEST2, IP = 217.174.237.139, IKE SA Proposal # 1, Transform # 14 acceptable Matches global IKE entry # 5 7|Nov 19 2014|12:03:15|715047|||||Group = TMASB_TEST2, IP = 217.174.237.139, processing IKE SA payload 7|Nov 19 2014|12:03:15|713906|||||IP = 217.174.237.139, Connection landed on tunnel_group TMASB_TEST2 7|Nov 19 2014|12:03:15|715064|||||IP = 217.174.237.139, IKE Peer included IKE fragmentation capability flags: Main Mode: True Aggressive Mode: True 7|Nov 19 2014|12:03:15|715049|||||IP = 217.174.237.139, Received Fragmentation VID 7|Nov 19 2014|12:03:15|715047|||||IP = 217.174.237.139, processing VID payload 7|Nov 19 2014|12:03:15|715049|||||IP = 217.174.237.139, Received xauth V6 VID 7|Nov 19 2014|12:03:15|715047|||||IP = 217.174.237.139, processing VID payload 7|Nov 19 2014|12:03:15|715049|||||IP = 217.174.237.139, Received Cisco Unity client VID 7|Nov 19 2014|12:03:15|715047|||||IP = 217.174.237.139, processing VID payload 7|Nov 19 2014|12:03:15|715047|||||IP = 217.174.237.139, processing ID payload 7|Nov 19 2014|12:03:15|715047|||||IP = 217.174.237.139, processing nonce payload 7|Nov 19 2014|12:03:15|715047|||||IP = 217.174.237.139, processing ISA_KE payload 7|Nov 19 2014|12:03:15|715047|||||IP = 217.174.237.139, processing ke payload 7|Nov 19 2014|12:03:15|715047|||||IP = 217.174.237.139, processing SA payload 7|Nov 19 2014|12:03:15|713906|||||IP = 217.174.237.139, Responder: IPSec over TCP encapsulation is used local TCP port: 10000 peer TCP port: 16474 7|Nov 19 2014|12:03:15|713236|||||IP = 217.174.237.139, IKE_DECODE RECEIVED Message (msgid=0) with payloads : HDR + SA (1) + KE (4) + NONCE (10) + ID (5) + VENDOR (13) + VENDOR (13) + VENDOR (13) + NONE (0) total length : 975 6|Nov 19 2014|12:03:15|302015|217.174.237.139|16474|193.155.236.70|500|Built inbound UDP connection 4103250 for wan_primary:217.174.237.139/16474 (217.174.237.139/16474) to identity:193.155.236.70/500 (193.155.236.70/500) 6|Nov 19 2014|12:03:15|302013|217.174.237.139|16474|193.155.236.70|10000|Built inbound TCP connection 4103249 for wan_primary:217.174.237.139/16474 (217.174.237.139/16474) to identity:193.155.236.70/10000 (193.155.236.70/10000) 7|Nov 19 2014|12:03:15|713236|||||IP = 217.174.237.139, IKE_DECODE SENDING Message (msgid=359ca7c4) with payloads : HDR + HASH (8) + DELETE (12) + NONE (0) total length : 80 7|Nov 19 2014|12:03:15|715046|||||Group = TMASB_TEST2, IP = 217.174.237.139, constructing qm hash payload 7|Nov 19 2014|12:03:15|715046|||||Group = TMASB_TEST2, IP = 217.174.237.139, constructing IKE delete payload 7|Nov 19 2014|12:03:15|715046|||||Group = TMASB_TEST2, IP = 217.174.237.139, constructing blank hash payload 7|Nov 19 2014|12:03:15|713906|||||Group = TMASB_TEST2, IP = 217.174.237.139, sending delete/delete with reason message 7|Nov 19 2014|12:03:15|713906|||||Group = TMASB_TEST2, IP = 217.174.237.139, IKE SA AM:7cb07d69 terminating: flags 0x0100c001, refcnt 0, tuncnt 0 7|Nov 19 2014|12:03:15|715065|||||Group = TMASB_TEST2, IP = 217.174.237.139, IKE AM Responder FSM error history (struct &0xb40cbb00) , : AM_DONE, EV_ERROR-->AM_WAIT_MSG3, EV_PROB_AUTH_FAIL-->AM_WAIT_MSG3, EV_TIMEOUT-->AM_WAIT_MSG3, NullEvent-->AM_SND_MSG2, EV_CHECK_SPOOF-->AM_SND_MSG2, EV_CRYPTO_ACTIVE-->AM_SND_MSG2, EV_SND_MSG-->AM_SND_MSG2, EV_START_TMR 6|Nov 19 2014|12:03:08|302016|217.174.237.139|50176|193.155.236.70|500|Teardown UDP connection 4102655 for wan_primary:217.174.237.139/50176 to identity:193.155.236.70/500 duration 0:02:01 bytes 975 6|Nov 19 2014|12:02:44|302014|217.174.237.139|37032|193.155.236.70|10000|Teardown TCP connection 4103141 for wan_primary:217.174.237.139/37032 to identity:193.155.236.70/10000 duration 0:00:00 bytes 400 TCP Reset-O 7|Nov 19 2014|12:02:43|713236|||||IP = 217.174.237.139, IKE_DECODE SENDING Message (msgid=0) with payloads : HDR + SA (1) + KE (4) + NONCE (10) + ID (5) + HASH (8) + VENDOR (13) + VENDOR (13) + VENDOR (13) + VENDOR (13) + VENDOR (13) + NONE (0) total length : 376 7|Nov 19 2014|12:02:43|715048|||||Group = TMASB_TEST2, IP = 217.174.237.139, Send Altiga/Cisco VPN3000/Cisco ASA GW VID 7|Nov 19 2014|12:02:43|715046|||||Group = TMASB_TEST2, IP = 217.174.237.139, constructing VID payload 7|Nov 19 2014|12:02:43|715046|||||Group = TMASB_TEST2, IP = 217.174.237.139, constructing Fragmentation VID + extended capabilities payload 7|Nov 19 2014|12:02:43|715046|||||Group = TMASB_TEST2, IP = 217.174.237.139, constructing dpd vid payload 7|Nov 19 2014|12:02:43|715046|||||Group = TMASB_TEST2, IP = 217.174.237.139, constructing xauth V6 VID payload 7|Nov 19 2014|12:02:43|715046|||||Group = TMASB_TEST2, IP = 217.174.237.139, constructing Cisco Unity VID payload 7|Nov 19 2014|12:02:43|715076|||||Group = TMASB_TEST2, IP = 217.174.237.139, Computing hash for ISAKMP 7|Nov 19 2014|12:02:43|715046|||||Group = TMASB_TEST2, IP = 217.174.237.139, constructing hash payload 7|Nov 19 2014|12:02:43|715046|||||Group = TMASB_TEST2, IP = 217.174.237.139, constructing ID payload 7|Nov 19 2014|12:02:43|713906|||||Group = TMASB_TEST2, IP = 217.174.237.139, Generating keys for Responder... 7|Nov 19 2014|12:02:43|715046|||||Group = TMASB_TEST2, IP = 217.174.237.139, constructing nonce payload 7|Nov 19 2014|12:02:43|715046|||||Group = TMASB_TEST2, IP = 217.174.237.139, constructing ke payload 7|Nov 19 2014|12:02:43|715046|||||Group = TMASB_TEST2, IP = 217.174.237.139, constructing ISAKMP SA payload 7|Nov 19 2014|12:02:43|715028|||||Group = TMASB_TEST2, IP = 217.174.237.139, IKE SA Proposal # 1, Transform # 14 acceptable Matches global IKE entry # 5 7|Nov 19 2014|12:02:43|715047|||||Group = TMASB_TEST2, IP = 217.174.237.139, processing IKE SA payload 7|Nov 19 2014|12:02:43|713906|||||IP = 217.174.237.139, Connection landed on tunnel_group TMASB_TEST2 7|Nov 19 2014|12:02:43|715064|||||IP = 217.174.237.139, IKE Peer included IKE fragmentation capability flags: Main Mode: True Aggressive Mode: True 7|Nov 19 2014|12:02:43|715049|||||IP = 217.174.237.139, Received Fragmentation VID 7|Nov 19 2014|12:02:43|715047|||||IP = 217.174.237.139, processing VID payload 7|Nov 19 2014|12:02:43|715049|||||IP = 217.174.237.139, Received xauth V6 VID 7|Nov 19 2014|12:02:43|715047|||||IP = 217.174.237.139, processing VID payload 7|Nov 19 2014|12:02:43|715049|||||IP = 217.174.237.139, Received Cisco Unity client VID 7|Nov 19 2014|12:02:43|715047|||||IP = 217.174.237.139, processing VID payload 7|Nov 19 2014|12:02:43|715047|||||IP = 217.174.237.139, processing ID payload 7|Nov 19 2014|12:02:43|715047|||||IP = 217.174.237.139, processing nonce payload 7|Nov 19 2014|12:02:43|715047|||||IP = 217.174.237.139, processing ISA_KE payload 7|Nov 19 2014|12:02:43|715047|||||IP = 217.174.237.139, processing ke payload 7|Nov 19 2014|12:02:43|715047|||||IP = 217.174.237.139, processing SA payload 7|Nov 19 2014|12:02:43|713906|||||IP = 217.174.237.139, Responder: IPSec over TCP encapsulation is used local TCP port: 10000 peer TCP port: 37032 7|Nov 19 2014|12:02:43|713236|||||IP = 217.174.237.139, IKE_DECODE RECEIVED Message (msgid=0) with payloads : HDR + SA (1) + KE (4) + NONCE (10) + ID (5) + VENDOR (13) + VENDOR (13) + VENDOR (13) + NONE (0) total length : 975 6|Nov 19 2014|12:02:43|302015|217.174.237.139|37032|193.155.236.70|500|Built inbound UDP connection 4103142 for wan_primary:217.174.237.139/37032 (217.174.237.139/37032) to identity:193.155.236.70/500 (193.155.236.70/500) 6|Nov 19 2014|12:02:43|302013|217.174.237.139|37032|193.155.236.70|10000|Built inbound TCP connection 4103141 for wan_primary:217.174.237.139/37032 (217.174.237.139/37032) to identity:193.155.236.70/10000 (193.155.236.70/10000) 7|Nov 19 2014|12:02:43|713236|||||IP = 217.174.237.139, IKE_DECODE SENDING Message (msgid=f293df8c) with payloads : HDR + HASH (8) + DELETE (12) + NONE (0) total length : 80 7|Nov 19 2014|12:02:43|715046|||||Group = TMASB_TEST2, IP = 217.174.237.139, constructing qm hash payload 7|Nov 19 2014|12:02:43|715046|||||Group = TMASB_TEST2, IP = 217.174.237.139, constructing IKE delete payload 7|Nov 19 2014|12:02:43|715046|||||Group = TMASB_TEST2, IP = 217.174.237.139, constructing blank hash payload 7|Nov 19 2014|12:02:43|713906|||||Group = TMASB_TEST2, IP = 217.174.237.139, sending delete/delete with reason message 7|Nov 19 2014|12:02:43|713906|||||Group = TMASB_TEST2, IP = 217.174.237.139, IKE SA AM:9c6f64a6 terminating: flags 0x0100c001, refcnt 0, tuncnt 0 7|Nov 19 2014|12:02:43|715065|||||Group = TMASB_TEST2, IP = 217.174.237.139, IKE AM Responder FSM error history (struct &0xb40cbb00) , : AM_DONE, EV_ERROR-->AM_WAIT_MSG3, EV_PROB_AUTH_FAIL-->AM_WAIT_MSG3, EV_TIMEOUT-->AM_WAIT_MSG3, NullEvent-->AM_SND_MSG2, EV_CHECK_SPOOF-->AM_SND_MSG2, EV_CRYPTO_ACTIVE-->AM_SND_MSG2, EV_SND_MSG-->AM_SND_MSG2, EV_START_TMR 6|Nov 19 2014|12:02:11|302014|217.174.237.139|43044|193.155.236.70|10000|Teardown TCP connection 4102978 for wan_primary:217.174.237.139/43044 to identity:193.155.236.70/10000 duration 0:00:00 bytes 400 TCP Reset-O 7|Nov 19 2014|12:02:11|713236|||||IP = 217.174.237.139, IKE_DECODE SENDING Message (msgid=0) with payloads : HDR + SA (1) + KE (4) + NONCE (10) + ID (5) + HASH (8) + VENDOR (13) + VENDOR (13) + VENDOR (13) + VENDOR (13) + VENDOR (13) + NONE (0) total length : 376 7|Nov 19 2014|12:02:11|715048|||||Group = TMASB_TEST2, IP = 217.174.237.139, Send Altiga/Cisco VPN3000/Cisco ASA GW VID 7|Nov 19 2014|12:02:11|715046|||||Group = TMASB_TEST2, IP = 217.174.237.139, constructing VID payload 7|Nov 19 2014|12:02:11|715046|||||Group = TMASB_TEST2, IP = 217.174.237.139, constructing Fragmentation VID + extended capabilities payload 7|Nov 19 2014|12:02:11|715046|||||Group = TMASB_TEST2, IP = 217.174.237.139, constructing dpd vid payload 7|Nov 19 2014|12:02:11|715046|||||Group = TMASB_TEST2, IP = 217.174.237.139, constructing xauth V6 VID payload 7|Nov 19 2014|12:02:11|715046|||||Group = TMASB_TEST2, IP = 217.174.237.139, constructing Cisco Unity VID payload 7|Nov 19 2014|12:02:11|715076|||||Group = TMASB_TEST2, IP = 217.174.237.139, Computing hash for ISAKMP 7|Nov 19 2014|12:02:11|715046|||||Group = TMASB_TEST2, IP = 217.174.237.139, constructing hash payload 7|Nov 19 2014|12:02:11|715046|||||Group = TMASB_TEST2, IP = 217.174.237.139, constructing ID payload 7|Nov 19 2014|12:02:11|713906|||||Group = TMASB_TEST2, IP = 217.174.237.139, Generating keys for Responder... 7|Nov 19 2014|12:02:11|715046|||||Group = TMASB_TEST2, IP = 217.174.237.139, constructing nonce payload 7|Nov 19 2014|12:02:11|715046|||||Group = TMASB_TEST2, IP = 217.174.237.139, constructing ke payload 7|Nov 19 2014|12:02:11|715046|||||Group = TMASB_TEST2, IP = 217.174.237.139, constructing ISAKMP SA payload 7|Nov 19 2014|12:02:11|715028|||||Group = TMASB_TEST2, IP = 217.174.237.139, IKE SA Proposal # 1, Transform # 14 acceptable Matches global IKE entry # 5 7|Nov 19 2014|12:02:11|715047|||||Group = TMASB_TEST2, IP = 217.174.237.139, processing IKE SA payload 7|Nov 19 2014|12:02:11|713906|||||IP = 217.174.237.139, Connection landed on tunnel_group TMASB_TEST2 7|Nov 19 2014|12:02:11|715064|||||IP = 217.174.237.139, IKE Peer included IKE fragmentation capability flags: Main Mode: True Aggressive Mode: True 7|Nov 19 2014|12:02:11|715049|||||IP = 217.174.237.139, Received Fragmentation VID 7|Nov 19 2014|12:02:11|715047|||||IP = 217.174.237.139, processing VID payload 7|Nov 19 2014|12:02:11|715049|||||IP = 217.174.237.139, Received xauth V6 VID 7|Nov 19 2014|12:02:11|715047|||||IP = 217.174.237.139, processing VID payload 7|Nov 19 2014|12:02:11|715049|||||IP = 217.174.237.139, Received Cisco Unity client VID 7|Nov 19 2014|12:02:11|715047|||||IP = 217.174.237.139, processing VID payload 7|Nov 19 2014|12:02:11|715047|||||IP = 217.174.237.139, processing ID payload 7|Nov 19 2014|12:02:11|715047|||||IP = 217.174.237.139, processing nonce payload 7|Nov 19 2014|12:02:11|715047|||||IP = 217.174.237.139, processing ISA_KE payload 7|Nov 19 2014|12:02:11|715047|||||IP = 217.174.237.139, processing ke payload 7|Nov 19 2014|12:02:11|715047|||||IP = 217.174.237.139, processing SA payload 7|Nov 19 2014|12:02:11|713906|||||IP = 217.174.237.139, Responder: IPSec over TCP encapsulation is used local TCP port: 10000 peer TCP port: 43044 7|Nov 19 2014|12:02:11|713236|||||IP = 217.174.237.139, IKE_DECODE RECEIVED Message (msgid=0) with payloads : HDR + SA (1) + KE (4) + NONCE (10) + ID (5) + VENDOR (13) + VENDOR (13) + VENDOR (13) + NONE (0) total length : 975 6|Nov 19 2014|12:02:11|302015|217.174.237.139|43044|193.155.236.70|500|Built inbound UDP connection 4102979 for wan_primary:217.174.237.139/43044 (217.174.237.139/43044) to identity:193.155.236.70/500 (193.155.236.70/500) 6|Nov 19 2014|12:02:11|302013|217.174.237.139|43044|193.155.236.70|10000|Built inbound TCP connection 4102978 for wan_primary:217.174.237.139/43044 (217.174.237.139/43044) to identity:193.155.236.70/10000 (193.155.236.70/10000) 7|Nov 19 2014|12:02:10|713236|||||IP = 217.174.237.139, IKE_DECODE SENDING Message (msgid=ea521ab8) with payloads : HDR + HASH (8) + DELETE (12) + NONE (0) total length : 80 7|Nov 19 2014|12:02:10|715046|||||Group = TMASB_TEST2, IP = 217.174.237.139, constructing qm hash payload 7|Nov 19 2014|12:02:10|715046|||||Group = TMASB_TEST2, IP = 217.174.237.139, constructing IKE delete payload 7|Nov 19 2014|12:02:10|715046|||||Group = TMASB_TEST2, IP = 217.174.237.139, constructing blank hash payload 7|Nov 19 2014|12:02:10|713906|||||Group = TMASB_TEST2, IP = 217.174.237.139, sending delete/delete with reason message 7|Nov 19 2014|12:02:10|713906|||||Group = TMASB_TEST2, IP = 217.174.237.139, IKE SA AM:0bf99cba terminating: flags 0x0100c001, refcnt 0, tuncnt 0 7|Nov 19 2014|12:02:10|715065|||||Group = TMASB_TEST2, IP = 217.174.237.139, IKE AM Responder FSM error history (struct &0xb40cbb00) , : AM_DONE, EV_ERROR-->AM_WAIT_MSG3, EV_PROB_AUTH_FAIL-->AM_WAIT_MSG3, EV_TIMEOUT-->AM_WAIT_MSG3, NullEvent-->AM_SND_MSG2, EV_CHECK_SPOOF-->AM_SND_MSG2, EV_CRYPTO_ACTIVE-->AM_SND_MSG2, EV_SND_MSG-->AM_SND_MSG2, EV_START_TMR 6|Nov 19 2014|12:01:39|302014|217.174.237.139|15843|193.155.236.70|10000|Teardown TCP connection 4102849 for wan_primary:217.174.237.139/15843 to identity:193.155.236.70/10000 duration 0:00:00 bytes 400 TCP Reset-O 7|Nov 19 2014|12:01:38|713236|||||IP = 217.174.237.139, IKE_DECODE SENDING Message (msgid=0) with payloads : HDR + SA (1) + KE (4) + NONCE (10) + ID (5) + HASH (8) + VENDOR (13) + VENDOR (13) + VENDOR (13) + VENDOR (13) + VENDOR (13) + NONE (0) total length : 376 7|Nov 19 2014|12:01:38|715048|||||Group = TMASB_TEST2, IP = 217.174.237.139, Send Altiga/Cisco VPN3000/Cisco ASA GW VID 7|Nov 19 2014|12:01:38|715046|||||Group = TMASB_TEST2, IP = 217.174.237.139, constructing VID payload 7|Nov 19 2014|12:01:38|715046|||||Group = TMASB_TEST2, IP = 217.174.237.139, constructing Fragmentation VID + extended capabilities payload 7|Nov 19 2014|12:01:38|715046|||||Group = TMASB_TEST2, IP = 217.174.237.139, constructing dpd vid payload 7|Nov 19 2014|12:01:38|715046|||||Group = TMASB_TEST2, IP = 217.174.237.139, constructing xauth V6 VID payload 7|Nov 19 2014|12:01:38|715046|||||Group = TMASB_TEST2, IP = 217.174.237.139, constructing Cisco Unity VID payload 7|Nov 19 2014|12:01:38|715076|||||Group = TMASB_TEST2, IP = 217.174.237.139, Computing hash for ISAKMP 7|Nov 19 2014|12:01:38|715046|||||Group = TMASB_TEST2, IP = 217.174.237.139, constructing hash payload 7|Nov 19 2014|12:01:38|715046|||||Group = TMASB_TEST2, IP = 217.174.237.139, constructing ID payload 7|Nov 19 2014|12:01:38|713906|||||Group = TMASB_TEST2, IP = 217.174.237.139, Generating keys for Responder... 7|Nov 19 2014|12:01:38|715046|||||Group = TMASB_TEST2, IP = 217.174.237.139, constructing nonce payload 7|Nov 19 2014|12:01:38|715046|||||Group = TMASB_TEST2, IP = 217.174.237.139, constructing ke payload 7|Nov 19 2014|12:01:38|715046|||||Group = TMASB_TEST2, IP = 217.174.237.139, constructing ISAKMP SA payload 7|Nov 19 2014|12:01:38|715028|||||Group = TMASB_TEST2, IP = 217.174.237.139, IKE SA Proposal # 1, Transform # 14 acceptable Matches global IKE entry # 5 7|Nov 19 2014|12:01:38|715047|||||Group = TMASB_TEST2, IP = 217.174.237.139, processing IKE SA payload 7|Nov 19 2014|12:01:38|713906|||||IP = 217.174.237.139, Connection landed on tunnel_group TMASB_TEST2 7|Nov 19 2014|12:01:38|715064|||||IP = 217.174.237.139, IKE Peer included IKE fragmentation capability flags: Main Mode: True Aggressive Mode: True 7|Nov 19 2014|12:01:38|715049|||||IP = 217.174.237.139, Received Fragmentation VID 7|Nov 19 2014|12:01:38|715047|||||IP = 217.174.237.139, processing VID payload 7|Nov 19 2014|12:01:38|715049|||||IP = 217.174.237.139, Received xauth V6 VID 7|Nov 19 2014|12:01:38|715047|||||IP = 217.174.237.139, processing VID payload 7|Nov 19 2014|12:01:38|715049|||||IP = 217.174.237.139, Received Cisco Unity client VID 7|Nov 19 2014|12:01:38|715047|||||IP = 217.174.237.139, processing VID payload 7|Nov 19 2014|12:01:38|715047|||||IP = 217.174.237.139, processing ID payload 7|Nov 19 2014|12:01:38|715047|||||IP = 217.174.237.139, processing nonce payload 7|Nov 19 2014|12:01:38|715047|||||IP = 217.174.237.139, processing ISA_KE payload 7|Nov 19 2014|12:01:38|715047|||||IP = 217.174.237.139, processing ke payload 7|Nov 19 2014|12:01:38|715047|||||IP = 217.174.237.139, processing SA payload 7|Nov 19 2014|12:01:38|713906|||||IP = 217.174.237.139, Responder: IPSec over TCP encapsulation is used local TCP port: 10000 peer TCP port: 15843 7|Nov 19 2014|12:01:38|713236|||||IP = 217.174.237.139, IKE_DECODE RECEIVED Message (msgid=0) with payloads : HDR + SA (1) + KE (4) + NONCE (10) + ID (5) + VENDOR (13) + VENDOR (13) + VENDOR (13) + NONE (0) total length : 975 6|Nov 19 2014|12:01:38|302015|217.174.237.139|15843|193.155.236.70|500|Built inbound UDP connection 4102850 for wan_primary:217.174.237.139/15843 (217.174.237.139/15843) to identity:193.155.236.70/500 (193.155.236.70/500) 6|Nov 19 2014|12:01:38|302013|217.174.237.139|15843|193.155.236.70|10000|Built inbound TCP connection 4102849 for wan_primary:217.174.237.139/15843 (217.174.237.139/15843) to identity:193.155.236.70/10000 (193.155.236.70/10000) 7|Nov 19 2014|12:01:38|713236|||||IP = 217.174.237.139, IKE_DECODE SENDING Message (msgid=4be00590) with payloads : HDR + HASH (8) + DELETE (12) + NONE (0) total length : 80 7|Nov 19 2014|12:01:38|715046|||||Group = TMASB_TEST2, IP = 217.174.237.139, constructing qm hash payload 7|Nov 19 2014|12:01:38|715046|||||Group = TMASB_TEST2, IP = 217.174.237.139, constructing IKE delete payload 7|Nov 19 2014|12:01:38|715046|||||Group = TMASB_TEST2, IP = 217.174.237.139, constructing blank hash payload 7|Nov 19 2014|12:01:38|713906|||||Group = TMASB_TEST2, IP = 217.174.237.139, sending delete/delete with reason message 7|Nov 19 2014|12:01:38|713906|||||Group = TMASB_TEST2, IP = 217.174.237.139, IKE SA AM:276f708c terminating: flags 0x0100c001, refcnt 0, tuncnt 0 7|Nov 19 2014|12:01:38|715065|||||Group = TMASB_TEST2, IP = 217.174.237.139, IKE AM Responder FSM error history (struct &0xb40cbb00) , : AM_DONE, EV_ERROR-->AM_WAIT_MSG3, EV_PROB_AUTH_FAIL-->AM_WAIT_MSG3, EV_TIMEOUT-->AM_WAIT_MSG3, NullEvent-->AM_SND_MSG2, EV_CHECK_SPOOF-->AM_SND_MSG2, EV_CRYPTO_ACTIVE-->AM_SND_MSG2, EV_SND_MSG-->AM_SND_MSG2, EV_START_TMR 6|Nov 19 2014|12:01:07|302014|217.174.237.139|50176|193.155.236.70|10000|Teardown TCP connection 4102654 for wan_primary:217.174.237.139/50176 to identity:193.155.236.70/10000 duration 0:00:00 bytes 400 TCP Reset-O 7|Nov 19 2014|12:01:06|713236|||||IP = 217.174.237.139, IKE_DECODE SENDING Message (msgid=0) with payloads : HDR + SA (1) + KE (4) + NONCE (10) + ID (5) + HASH (8) + VENDOR (13) + VENDOR (13) + VENDOR (13) + VENDOR (13) + VENDOR (13) + NONE (0) total length : 376 7|Nov 19 2014|12:01:06|715048|||||Group = TMASB_TEST2, IP = 217.174.237.139, Send Altiga/Cisco VPN3000/Cisco ASA GW VID 7|Nov 19 2014|12:01:06|715046|||||Group = TMASB_TEST2, IP = 217.174.237.139, constructing VID payload 7|Nov 19 2014|12:01:06|715046|||||Group = TMASB_TEST2, IP = 217.174.237.139, constructing Fragmentation VID + extended capabilities payload 7|Nov 19 2014|12:01:06|715046|||||Group = TMASB_TEST2, IP = 217.174.237.139, constructing dpd vid payload 7|Nov 19 2014|12:01:06|715046|||||Group = TMASB_TEST2, IP = 217.174.237.139, constructing xauth V6 VID payload 7|Nov 19 2014|12:01:06|715046|||||Group = TMASB_TEST2, IP = 217.174.237.139, constructing Cisco Unity VID payload 7|Nov 19 2014|12:01:06|715076|||||Group = TMASB_TEST2, IP = 217.174.237.139, Computing hash for ISAKMP 7|Nov 19 2014|12:01:06|715046|||||Group = TMASB_TEST2, IP = 217.174.237.139, constructing hash payload 7|Nov 19 2014|12:01:06|715046|||||Group = TMASB_TEST2, IP = 217.174.237.139, constructing ID payload 7|Nov 19 2014|12:01:06|713906|||||Group = TMASB_TEST2, IP = 217.174.237.139, Generating keys for Responder... 7|Nov 19 2014|12:01:06|715046|||||Group = TMASB_TEST2, IP = 217.174.237.139, constructing nonce payload 7|Nov 19 2014|12:01:06|715046|||||Group = TMASB_TEST2, IP = 217.174.237.139, constructing ke payload 7|Nov 19 2014|12:01:06|715046|||||Group = TMASB_TEST2, IP = 217.174.237.139, constructing ISAKMP SA payload 7|Nov 19 2014|12:01:06|715028|||||Group = TMASB_TEST2, IP = 217.174.237.139, IKE SA Proposal # 1, Transform # 14 acceptable Matches global IKE entry # 5 7|Nov 19 2014|12:01:06|715047|||||Group = TMASB_TEST2, IP = 217.174.237.139, processing IKE SA payload 7|Nov 19 2014|12:01:06|713906|||||IP = 217.174.237.139, Connection landed on tunnel_group TMASB_TEST2 7|Nov 19 2014|12:01:06|715064|||||IP = 217.174.237.139, IKE Peer included IKE fragmentation capability flags: Main Mode: True Aggressive Mode: True 7|Nov 19 2014|12:01:06|715049|||||IP = 217.174.237.139, Received Fragmentation VID 7|Nov 19 2014|12:01:06|715047|||||IP = 217.174.237.139, processing VID payload 7|Nov 19 2014|12:01:06|715049|||||IP = 217.174.237.139, Received xauth V6 VID 7|Nov 19 2014|12:01:06|715047|||||IP = 217.174.237.139, processing VID payload 7|Nov 19 2014|12:01:06|715049|||||IP = 217.174.237.139, Received Cisco Unity client VID 7|Nov 19 2014|12:01:06|715047|||||IP = 217.174.237.139, processing VID payload 7|Nov 19 2014|12:01:06|715047|||||IP = 217.174.237.139, processing ID payload 7|Nov 19 2014|12:01:06|715047|||||IP = 217.174.237.139, processing nonce payload 7|Nov 19 2014|12:01:06|715047|||||IP = 217.174.237.139, processing ISA_KE payload 7|Nov 19 2014|12:01:06|715047|||||IP = 217.174.237.139, processing ke payload 7|Nov 19 2014|12:01:06|715047|||||IP = 217.174.237.139, processing SA payload 7|Nov 19 2014|12:01:06|713906|||||IP = 217.174.237.139, Responder: IPSec over TCP encapsulation is used local TCP port: 10000 peer TCP port: 50176 7|Nov 19 2014|12:01:06|713236|||||IP = 217.174.237.139, IKE_DECODE RECEIVED Message (msgid=0) with payloads : HDR + SA (1) + KE (4) + NONCE (10) + ID (5) + VENDOR (13) + VENDOR (13) + VENDOR (13) + NONE (0) total length : 975 6|Nov 19 2014|12:01:06|302015|217.174.237.139|50176|193.155.236.70|500|Built inbound UDP connection 4102655 for wan_primary:217.174.237.139/50176 (217.174.237.139/50176) to identity:193.155.236.70/500 (193.155.236.70/500) 6|Nov 19 2014|12:01:06|302013|217.174.237.139|50176|193.155.236.70|10000|Built inbound TCP connection 4102654 for wan_primary:217.174.237.139/50176 (217.174.237.139/50176) to identity:193.155.236.70/10000 (193.155.236.70/10000) 5|Nov 19 2014|12:00:56|111010|||||User 'markus.demmert', running 'CLI' from IP 0.0.0.0, executed 'capture asdm_cap_egress match ip 217.174.237.139 0.0.0.0' 5|Nov 19 2014|12:00:56|111008|||||User 'markus.demmert' executed the 'capture asdm_cap_egress match ip 217.174.237.139 0.0.0.0' command. 5|Nov 19 2014|12:00:56|111010|||||User 'markus.demmert', running 'CLI' from IP 0.0.0.0, executed 'capture asdm_cap_ingress match ip 217.174.237.139 0.0.0.0' 5|Nov 19 2014|12:00:56|111008|||||User 'markus.demmert' executed the 'capture asdm_cap_ingress match ip 217.174.237.139 0.0.0.0' command.