*Dec 24 15:11:02.522: ISAKMP-PAK: (0):received packet from 190.0.1.1 dport 500 sport 500 Global (N) NEW SA *Dec 24 15:11:02.523: ISAKMP: (0):Created a peer struct for 190.0.1.1, peer port 500 *Dec 24 15:11:02.523: ISAKMP: (0):New peer created peer = 0x7F2AF1603520 peer_handle = 0x80000002 *Dec 24 15:11:02.523: ISAKMP: (0):Locking peer struct 0x7F2AF1603520, refcount 1 for crypto_isakmp_process_block *Dec 24 15:11:02.523: ISAKMP: (0):local port 500, remote port 500 *Dec 24 15:11:02.524: ISAKMP: (0):insert sa successfully sa = 7F2ADA2AB098 *Dec 24 15:11:02.537: ISAKMP: (0):Input = IKE_MESG_FROM_PEER, IKE_MM_EXCH *Dec 24 15:11:02.537: ISAKMP: (0):Old State = IKE_READY New State = IKE_R_MM1 *Dec 24 15:11:02.545: ISAKMP: (0):processing SA payload. message ID = 0 *Dec 24 15:11:02.546: ISAKMP: (0):processing vendor id payload *Dec 24 15:11:02.546: ISAKMP: (0):vendor ID seems Unity/DPD but major 123 mismatch *Dec 24 15:11:02.546: ISAKMP: (0):vendor ID is NAT-T v2 *Dec 24 15:11:02.546: ISAKMP: (0):processing vendor id payload *Dec 24 15:11:02.546: ISAKMP: (0):vendor ID seems Unity/DPD but major 157 mismatch *Dec 24 15:11:02.546: ISAKMP: (0):vendor ID is NAT-T v3 *Dec 24 15:11:02.546: ISAKMP: (0):processing vendor id payload *Dec 24 15:11:02.546: ISAKMP: (0):vendor ID seems Unity/DPD but major 69 mismatch *Dec 24 15:11:02.546: ISAKMP: (0):vendor ID is NAT-T RFC 3947 *Dec 24 15:11:02.546: ISAKMP: (0):processing vendor id payload *Dec 24 15:11:02.546: ISAKMP: (0):processing IKE frag vendor id payload *Dec 24 15:11:02.546: ISAKMP: (0):Support for IKE Fragmentation not enabled *Dec 24 15:11:02.546: ISAKMP: (0):found peer pre-shared key matching 190.0.1.1 *Dec 24 15:11:02.546: ISAKMP: (0):local preshared key found *Dec 24 15:11:02.546: ISAKMP: (0):Scanning profiles for xauth ... *Dec 24 15:11:02.546: ISAKMP: (0):Checking ISAKMP transform 1 against priority 10 policy *Dec 24 15:11:02.546: ISAKMP: (0): default group 2 *Dec 24 15:11:02.546: ISAKMP: (0): encryption 3DES-CBC *Dec 24 15:11:02.546: ISAKMP: (0): hash MD5 *Dec 24 15:11:02.546: ISAKMP: (0): auth pre-share *Dec 24 15:11:02.546: ISAKMP: (0): life type in seconds *Dec 24 15:11:02.546: ISAKMP: life duration (VPI) of 0x0 0x1 0x51 0x80 *Dec 24 15:11:02.547: ISAKMP: (0):atts are acceptable. Next payload is 0 *Dec 24 15:11:02.547: ISAKMP: (0):Acceptable atts:actual life: 86400 *Dec 24 15:11:02.547: ISAKMP: (0):Acceptable atts:life: 0 *Dec 24 15:11:02.547: ISAKMP: (0):Fill atts in sa vpi_length:4 *Dec 24 15:11:02.547: ISAKMP: (0):Fill atts in sa life_in_seconds:86400 *Dec 24 15:11:02.547: ISAKMP: (0):Returning Actual lifetime: 86400 *Dec 24 15:11:02.547: ISAKMP: (0):Started lifetime timer: 86400. *Dec 24 15:11:02.549: ISAKMP: (0):processing vendor id payload *Dec 24 15:11:02.549: ISAKMP: (0):vendor ID seems Unity/DPD but major 123 mismatch *Dec 24 15:11:02.549: ISAKMP: (0):vendor ID is NAT-T v2 *Dec 24 15:11:02.549: ISAKMP: (0):processing vendor id payload *Dec 24 15:11:02.549: ISAKMP: (0):vendor ID seems Unity/DPD but major 157 mismatch *Dec 24 15:11:02.549: ISAKMP: (0):vendor ID is NAT-T v3 *Dec 24 15:11:02.549: ISAKMP: (0):processing vendor id payload *Dec 24 15:11:02.549: ISAKMP: (0):vendor ID seems Unity/DPD but major 69 mismatch *Dec 24 15:11:02.549: ISAKMP: (0):vendor ID is NAT-T RFC 3947 *Dec 24 15:11:02.550: ISAKMP: (0):processing vendor id payload *Dec 24 15:11:02.550: ISAKMP: (0):processing IKE frag vendor id payload *Dec 24 15:11:02.550: ISAKMP: (0):Support for IKE Fragmentation not enabled *Dec 24 15:11:02.550: ISAKMP: (0):Input = IKE_MESG_INTERNAL, IKE_PROCESS_MAIN_MODE *Dec 24 15:11:02.550: ISAKMP: (0):Old State = IKE_R_MM1 New State = IKE_R_MM1 *Dec 24 15:11:02.550: ISAKMP: (0):constructed NAT-T vendor-rfc3947 ID *Dec 24 15:11:02.550: ISAKMP-PAK: (0):sending packet to 190.0.1.1 my_port 500 peer_port 500 (R) MM_SA_SETUP *Dec 24 15:11:02.550: ISAKMP: (0):Sending an IKE IPv4 Packet. *Dec 24 15:11:02.551: ISAKMP: (0):Input = IKE_MESG_INTERNAL, IKE_PROCESS_COMPLETE *Dec 24 15:11:02.551: ISAKMP: (0):Old State = IKE_R_MM1 New State = IKE_R_MM2 *Dec 24 15:11:02.627: ISAKMP-PAK: (0):received packet from 190.0.1.1 dport 500 sport 500 Global (R) MM_SA_SETUP *Dec 24 15:11:02.628: ISAKMP: (0):Input = IKE_MESG_FROM_PEER, IKE_MM_EXCH *Dec 24 15:11:02.628: ISAKMP: (0):Old State = IKE_R_MM2 New State = IKE_R_MM3 *Dec 24 15:11:02.628: ISAKMP: (0):processing KE payload. message ID = 0 *Dec 24 15:11:02.631: ISAKMP: (0):processing NONCE payload. message ID = 0 *Dec 24 15:11:02.631: ISAKMP: (0):found peer pre-shared key matching 190.0.1.1 *Dec 24 15:11:02.632: ISAKMP: (1001):processing vendor id payload *Dec 24 15:11:02.633: ISAKMP: (1001):vendor ID is Unity *Dec 24 15:11:02.633: ISAKMP: (1001):processing vendor id payload *Dec 24 15:11:02.633: ISAKMP: (1001):vendor ID seems Unity/DPD but major 74 mismatch *Dec 24 15:11:02.633: ISAKMP: (1001):vendor ID is XAUTH *Dec 24 15:11:02.633: ISAKMP: (1001):processing vendor id payload *Dec 24 15:11:02.633: ISAKMP: (1001):speaking to another IOS box! *Dec 24 15:11:02.633: ISAKMP: (1001):processing vendor id payload *Dec 24 15:11:02.633: ISAKMP: (1001):vendor ID seems Unity/DPD but hash mismatch *Dec 24 15:11:02.633: ISAKMP: (1001):received payload type 20 *Dec 24 15:11:02.633: ISAKMP: (1001):His hash no match - this node outside NAT *Dec 24 15:11:02.633: ISAKMP: (1001):received payload type 20 *Dec 24 15:11:02.633: ISAKMP: (1001):No NAT Found for self or peer *Dec 24 15:11:02.633: ISAKMP: (1001):Input = IKE_MESG_INTERNAL, IKE_PROCESS_MAIN_MODE *Dec 24 15:11:02.633: ISAKMP: (1001):Old State = IKE_R_MM3 New State = IKE_R_MM3 *Dec 24 15:11:02.633: ISAKMP-PAK: (1001):sending packet to 190.0.1.1 my_port 500 peer_port 500 (R) MM_KEY_EXCH *Dec 24 15:11:02.633: ISAKMP: (1001):Sending an IKE IPv4 Packet. *Dec 24 15:11:02.634: ISAKMP: (1001):Input = IKE_MESG_INTERNAL, IKE_PROCESS_COMPLETE *Dec 24 15:11:02.634: ISAKMP: (1001):Old State = IKE_R_MM3 New State = IKE_R_MM4 *Dec 24 15:11:02.674: ISAKMP-PAK: (1001):received packet from 190.0.1.1 dport 500 sport 500 Global (R) MM_KEY_EXCH *Dec 24 15:11:02.674: ISAKMP: (1001):Input = IKE_MESG_FROM_PEER, IKE_MM_EXCH *Dec 24 15:11:02.674: ISAKMP: (1001):Old State = IKE_R_MM4 New State = IKE_R_MM5 *Dec 24 15:11:02.675: ISAKMP: (1001):processing ID payload. message ID = 0 *Dec 24 15:11:02.675: ISAKMP: (1001):ID payload next-payload : 8 type : 1 *Dec 24 15:11:02.675: ISAKMP: (1001): address : 190.0.1.1 *Dec 24 15:11:02.675: ISAKMP: (1001): protocol : 17 port : 0 length : 12 *Dec 24 15:11:02.675: ISAKMP: (0):peer matches *none* of the profiles *Dec 24 15:11:02.675: ISAKMP: (1001):processing HASH payload. message ID = 0 *Dec 24 15:11:02.675: ISAKMP: (1001):received payload type 17 *Dec 24 15:11:02.696: ISAKMP: (1001):processing vendor id payload *Dec 24 15:11:02.696: ISAKMP: (1001):vendor ID is DPD *Dec 24 15:11:02.696: ISAKMP: (1001):SA authentication status: authenticated *Dec 24 15:11:02.696: ISAKMP: (1001):SA has been authenticated with 190.0.1.1 *Dec 24 15:11:02.696: ISAKMP: (0):Trying to insert a peer 203.0.113.1/190.0.1.1/500/, *Dec 24 15:11:02.696: ISAKMP: (0): and inserted successfully 7F2AF1603520. *Dec 24 15:11:02.696: ISAKMP: (1001):Input = IKE_MESG_INTERNAL, IKE_PROCESS_MAIN_MODE *Dec 24 15:11:02.696: ISAKMP: (1001):Old State = IKE_R_MM5 New State = IKE_R_MM5 *Dec 24 15:11:02.696: ISAKMP: (1001):SA is doing *Dec 24 15:11:02.696: ISAKMP: (1001):pre-shared key authentication using id type ID_IPV4_ADDR *Dec 24 15:11:02.696: ISAKMP: (1001):ID payload next-payload : 8 type : 1 *Dec 24 15:11:02.696: ISAKMP: (1001): address : 203.0.113.1 *Dec 24 15:11:02.696: ISAKMP: (1001): protocol : 17 port : 500 length : 12 *Dec 24 15:11:02.696: ISAKMP: (1001):Total payload length: 12 *Dec 24 15:11:02.696: ISAKMP: (1001):Returning Actual lifetime: 86400 *Dec 24 15:11:02.696: ISAKMP-PAK: (1001):sending packet to 190.0.1.1 my_port 500 peer_port 500 (R) MM_KEY_EXCH *Dec 24 15:11:02.696: ISAKMP: (1001):Sending an IKE IPv4 Packet. *Dec 24 15:11:02.697: ISAKMP: (1001):Input = IKE_MESG_INTERNAL, IKE_PROCESS_COMPLETE *Dec 24 15:11:02.697: ISAKMP: (1001):Old State = IKE_R_MM5 New State = IKE_P1_COMPLETE *Dec 24 15:11:02.697: ISAKMP: (1001):Input = IKE_MESG_INTERNAL, IKE_PHASE1_COMPLETE *Dec 24 15:11:02.697: ISAKMP: (1001):Old State = IKE_P1_COMPLETE New State = IKE_P1_COMPLETE *Dec 24 15:11:02.733: ISAKMP-PAK: (1001):received packet from 190.0.1.1 dport 500 sport 500 Global (R) QM_IDLE *Dec 24 15:11:02.734: ISAKMP: (1001):set new node 4098183699 to QM_IDLE *Dec 24 15:11:02.734: ISAKMP: (1001):processing HASH payload. message ID = 4098183699 *Dec 24 15:11:02.734: ISAKMP: (1001):processing SA payload. message ID = 4098183699 *Dec 24 15:11:02.734: ISAKMP: (1001):Checking IPSec proposal 1 *Dec 24 15:11:02.734: ISAKMP: (1001):transform 1, ESP_3DES *Dec 24 15:11:02.734: ISAKMP: (1001): attributes in transform: *Dec 24 15:11:02.734: ISAKMP: (1001): SA life type in seconds *Dec 24 15:11:02.735: ISAKMP: (1001): SA life duration (basic) of 28800 *Dec 24 15:11:02.735: ISAKMP: (1001): SA life type in kilobytes *Dec 24 15:11:02.735: ISAKMP: SA life duration (VPI) of 0x0 0x46 0x50 0x0 *Dec 24 15:11:02.735: ISAKMP: (1001): encaps is 1 (Tunnel) *Dec 24 15:11:02.735: ISAKMP: (1001): authenticator is HMAC-MD5 *Dec 24 15:11:02.735: ISAKMP: (1001):atts are acceptable. *Dec 24 15:11:02.735: IPSEC(validate_proposal_request): proposal part #1 *Dec 24 15:11:02.735: IPSEC(validate_proposal_request): proposal part #1, (key eng. msg.) INBOUND local= 203.0.113.1:0, remote= 190.0.1.1:0, local_proxy= 10.11.11.0/255.255.255.0/256/0, remote_proxy= 10.10.9.0/255.255.255.0/256/0, protocol= ESP, transform= esp-3des esp-md5-hmac (Tunnel), lifedur= 0s and 0kb, spi= 0x0(0), conn_id= 0, keysize= 0, flags= 0x0 *Dec 24 15:11:02.737: Crypto mapdb : proxy_match src addr : 10.11.11.0 dst addr : 10.10.9.0 protocol : 0 src port : 0 dst port : 0 *Dec 24 15:11:02.746: (ipsec_process_proposal)Map Accepted: CM, 10 *Dec 24 15:11:02.746: ISAKMP: (1001):processing NONCE payload. message ID = 4098183699 *Dec 24 15:11:02.746: ISAKMP: (1001):processing ID payload. message ID = 4098183699 *Dec 24 15:11:02.746: ISAKMP: (1001):processing ID payload. message ID = 4098183699 *Dec 24 15:11:02.746: ISAKMP: (1001):processing NOTIFY INITIAL_CONTACT protocol 1 spi 0, message ID = 4098183699, sa = 0x7F2ADA2AB098 *Dec 24 15:11:02.746: ISAKMP: (1001):SA authentication status: authenticated *Dec 24 15:11:02.746: ISAKMP: (1001):Process initial contact, bring down existing phase 1 and 2 SA's with local 203.0.113.1 remote 190.0.1.1 remote port 500 *Dec 24 15:11:02.747: ISAKMP: (1001):QM Responder gets spi *Dec 24 15:11:02.747: ISAKMP: (1001):Node 4098183699, Input = IKE_MESG_FROM_PEER, IKE_QM_EXCH *Dec 24 15:11:02.747: ISAKMP: (1001):Old State = IKE_QM_READY New State = IKE_QM_SPI_STARVE *Dec 24 15:11:02.747: ISAKMP: (1001):Node 4098183699, Input = IKE_MESG_INTERNAL, IKE_GOT_SPI *Dec 24 15:11:02.747: ISAKMP: (1001):Old State = IKE_QM_SPI_STARVE New State = IKE_QM_IPSEC_INSTALL_AWAIT *Dec 24 15:11:02.747: IPSEC(key_engine): got a queue event with 1 KMI message(s) *Dec 24 15:11:02.747: IPSEC(key_engine): got a queue event with 1 KMI message(s) *Dec 24 15:11:02.747: Crypto mapdb : proxy_match src addr : 10.11.11.0 dst addr : 10.10.9.0 protocol : 256 src port : 0 dst port : 0 *Dec 24 15:11:02.747: IPSEC(crypto_ipsec_create_ipsec_sas): Map found CM, 10 *Dec 24 15:11:02.748: IPSEC(crypto_ipsec_sa_find_ident_head): reconnecting with the same proxies and peer 190.0.1.1 *Dec 24 15:11:02.755: IPSEC(get_old_outbound_sa_for_peer): No outbound SA found for peer 7F2AF52820D0 *Dec 24 15:11:02.755: IPSEC(create_sa): sa created, (sa) sa_dest= 203.0.113.1, sa_proto= 50, sa_spi= 0x6FB6A10F(1874239759), sa_trans= esp-3des esp-md5-hmac , sa_conn_id= 2001 sa_lifetime(k/sec)= (4608000/3600), (identity) local= 203.0.113.1:0, remote= 190.0.1.1:0, local_proxy= 10.11.11.0/255.255.255.0/256/0, remote_proxy= 10.10.9.0/255.255.255.0/256/0 *Dec 24 15:11:02.756: IPSEC(create_sa): sa created, (sa) sa_dest= 190.0.1.1, sa_proto= 50, sa_spi= 0x8B4B7C(9128828), sa_trans= esp-3des esp-md5-hmac , sa_conn_id= 2002 sa_lifetime(k/sec)= (4608000/3600), (identity) local= 203.0.113.1:0, remote= 190.0.1.1:0, local_proxy= 10.11.11.0/255.255.255.0/256/0, remote_proxy= 10.10.9.0/255.255.255.0/256/0 *Dec 24 15:11:03.322: ISAKMP-ERROR: (0):Failed to find peer index node to update peer_info_list *Dec 24 15:11:03.322: ISAKMP: (1001):Received IPSec Install callback... proceeding with the negotiation *Dec 24 15:11:03.322: ISAKMP: (1001):Successfully installed IPSEC SA (SPI:0x6FB6A10F) on GigabitEthernet1 *Dec 24 15:11:03.322: ISAKMP-PAK: (1001):sending packet to 190.0.1.1 my_port 500 peer_port 500 (R) QM_IDLE *Dec 24 15:11:03.322: ISAKMP: (1001):Sending an IKE IPv4 Packet. *Dec 24 15:11:03.323: ISAKMP: (1001):Node 4098183699, Input = IKE_MESG_FROM_IPSEC, IPSEC_INSTALL_DONE *Dec 24 15:11:03.323: ISAKMP: (1001):Old State = IKE_QM_IPSEC_INSTALL_AWAIT New State = IKE_QM_R_QM2 *Dec 24 15:11:03.355: ISAKMP-PAK: (1001):received packet from 190.0.1.1 dport 500 sport 500 Global (R) QM_IDLE *Dec 24 15:11:03.355: ISAKMP: (1001):set new node 1200923926 to QM_IDLE *Dec 24 15:11:03.355: ISAKMP: (1001):processing HASH payload. message ID = 1200923926 *Dec 24 15:11:03.355: ISAKMP: (1001):processing DELETE payload. message ID = 1200923926 *Dec 24 15:11:03.355: ISAKMP: (1001):deleting other-spi 9128828 message ID = 4098183699 *Dec 24 15:11:03.355: ISAKMP-ERROR: (1001):deleting node 4098183699 error TRUE reason "Delete Larval" *Dec 24 15:11:03.355: ISAKMP: (1001):peer does not do paranoid keepalives. *Dec 24 15:11:03.355: ISAKMP: (1001):Enqueued KEY_MGR_DELETE_SAS for IPSEC SA (SPI:0x8B4B7C) *Dec 24 15:11:03.355: ISAKMP: (1001):deleting node 1200923926 error FALSE reason "Informational (in) state 1" *Dec 24 15:11:03.355: IPSEC(key_engine): got a queue event with 1 KMI message(s) *Dec 24 15:11:03.355: IDB is NULL : in crypto_ipsec_key_engine_delete_sas (), 5383 *Dec 24 15:11:03.355: IPSEC(key_engine_delete_sas): rec'd delete notify from ISAKMP *Dec 24 15:11:03.355: IPSEC: delete incomplete sa: 0x7F2AF5284730 *Dec 24 15:11:03.355: IPSEC(key_engine_delete_sas): delete SA with spi 0x8B4B7C proto 50 for 190.0.1.1 *Dec 24 15:11:03.355: ISAKMP-ERROR: (0):Failed to find peer index node to update peer_info_list *Dec 24 15:11:03.355: IPSEC(update_current_outbound_sa): updated peer 190.0.1.1 current outbound sa to SPI 0 *Dec 24 15:11:03.355: IPSEC(delete_sa): deleting SA, (sa) sa_dest= 203.0.113.1, sa_proto= 50, sa_spi= 0x6FB6A10F(1874239759), sa_trans= esp-3des esp-md5-hmac , sa_conn_id= 2001 sa_lifetime(k/sec)= (4608000/3600), (identity) local= 203.0.113.1:0, remote= 190.0.1.1:0, local_proxy= 10.11.11.0/255.255.255.0/256/0, remote_proxy= 10.10.9.0/255.255.255.0/256/0 *Dec 24 15:11:03.355: IPSEC(delete_sa): deleting SA, (sa) sa_dest= 190.0.1.1, sa_proto= 50, sa_spi= 0x8B4B7C(9128828), sa_trans= esp-3des esp-md5-hmac , sa_conn_id= 2002 sa_lifetime(k/sec)= (4608000/3600), (identity) local= 203.0.113.1:0, remote= 190.0.1.1:0, local_proxy= 10.11.11.0/255.255.255.0/256/0, remote_proxy= 10.10.9.0/255.255.255.0/256/0 *Dec 24 15:11:03.356: IPSEC(send_delete_notify_kmi): not sending KEY_ENGINE_DELETE_SAS *Dec 24 15:11:03.361: ISAKMP-PAK: (1001):received packet from 190.0.1.1 dport 500 sport 500 Global (R) QM_IDLE *Dec 24 15:11:03.361: ISAKMP: (1001):set new node 1491606100 to QM_IDLE *Dec 24 15:11:03.361: ISAKMP: (1001):processing HASH payload. message ID = 1491606100 *Dec 24 15:11:03.361: ISAKMP: (1001):processing DELETE payload. message ID = 1491606100 *Dec 24 15:11:03.361: ISAKMP: (1001):peer does not do paranoid keepalives. *Dec 24 15:11:03.361: ISAKMP: (1001):deleting SA reason "No reason" state (R) QM_IDLE (peer 190.0.1.1) *Dec 24 15:11:03.361: ISAKMP: (1001):deleting node 1491606100 error FALSE reason "Informational (in) state 1" *Dec 24 15:11:03.361: ISAKMP: (1001):set new node 2360102432 to QM_IDLE *Dec 24 15:11:03.361: ISAKMP-PAK: (1001):sending packet to 190.0.1.1 my_port 500 peer_port 500 (R) QM_IDLE *Dec 24 15:11:03.361: ISAKMP: (1001):Sending an IKE IPv4 Packet. *Dec 24 15:11:03.362: ISAKMP: (1001):purging node 2360102432 *Dec 24 15:11:03.362: ISAKMP: (1001):Input = IKE_MESG_INTERNAL, IKE_PHASE1_DEL *Dec 24 15:11:03.362: ISAKMP: (1001):Old State = IKE_P1_COMPLETE New State = IKE_DEST_SA *Dec 24 15:11:03.362: ISAKMP: (1001):deleting SA reason "No reason" state (R) QM_IDLE (peer 190.0.1.1) *Dec 24 15:11:03.362: ISAKMP: (0):Unlocking peer struct 0x7F2AF1603520 for isadb_mark_sa_deleted(), count 0 *Dec 24 15:11:03.365: ISAKMP: (1001):Input = IKE_MESG_FROM_PEER, IKE_MM_EXCH *Dec 24 15:11:03.365: ISAKMP: (1001):Old State = IKE_DEST_SA New State = IKE_DEST_SA *Dec 24 15:11:03.399: IPSEC(ident_delete_notify_kmi): Failed to send KEY_ENG_DELETE_SAS *Dec 24 15:11:03.399: IPSEC(ident_update_final_flow_stats): Collect Final Stats and update MIB IPSEC get IKMP peer index from peer 0x7F2AF52820D0 ikmp handle 0x80000002 IPSEC IKMP peer index 0 [ident_update_final_flow_stats] : Flow delete complete event received for flow id 0x24000001,peer index 0 *Dec 24 15:11:03.407: ISAKMP: (0):Deleting peer node by peer_reap for 190.0.1.1: 7F2AF1603520 *Dec 24 15:11:03.412: IPSEC(key_engine): got a queue event with 1 KMI message(s) *Dec 24 15:11:53.356: ISAKMP: (1001):purging node 4098183699 *Dec 24 15:11:53.357: ISAKMP: (1001):purging node 1200923926 *Dec 24 15:11:53.361: ISAKMP: (1001):purging node 1491606100 *Dec 24 15:12:03.371: ISAKMP: (1001):purging SA., sa=7F2ADA2AB098, delme=7F2ADA2AB098