<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>artículo Understanding IOS IPSec and IKE debugs - IKEv1 Aggressive Mode. en Security Knowledge Base</title>
    <link>https://community.cisco.com/t5/security-knowledge-base/understanding-ios-ipsec-and-ike-debugs-ikev1-aggressive-mode/ta-p/3123083</link>
    <description>&lt;P&gt;&lt;LI-TOC indent="15" liststyle="disc" maxheadinglevel="2"&gt;&lt;/LI-TOC&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Disclaimer: This is best&amp;nbsp; effort work only, it may (and probably is) not 100% correct. This work&amp;nbsp; will be corrected as corrective feedback is received.&lt;/EM&gt;&lt;/P&gt;&lt;H1&gt;1. Introduction&lt;/H1&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This&amp;nbsp; document will attempt to describe how to understand debugs on ASA when&amp;nbsp; aggressive mode and pre shared key (PSK) is being used.&lt;/P&gt;&lt;P&gt;How to translate certain debug lines into configuration.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What will not be discussed:&lt;/P&gt;&lt;P&gt;- passing traffic after tunnel has been established.&lt;/P&gt;&lt;P&gt;- basic concepts of IPSec or IKE.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;H1&gt;2. Core issue&lt;/H1&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;IKE and IPSec debugs tend to get cryptic, TAC will very often use them to understand where a problem with IPSec VPN tunnel &lt;STRONG&gt;establishment &lt;/STRONG&gt;is located.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;H1&gt;3. Scenario&lt;/H1&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Aggressive&amp;nbsp; mode is typically used in case of EZVPN, both software (Cisco VPN&amp;nbsp; client) and hardware clients (ASA 5505 or IOS routers), but only when&amp;nbsp; using pre shared key (PSK).&lt;/P&gt;&lt;P&gt;Those debugs are from IOS 15.0.1M5 EZVPN headend, EZVPN client will be a router (same version), in client mode.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;On server side I will be using DVTI, and client side no DVTI.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;H2&gt;3.1 Debugs used.&lt;/H2&gt;&lt;P&gt;debug crypto isakmp&lt;/P&gt;&lt;P&gt;debug crypto ipsec&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Optional debugs on client:&lt;/P&gt;&lt;PRE&gt;debug crypto ipsec client ezvpn&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Optional debugs on both (internal and containing WAY too much info to be discussed here)&lt;/P&gt;&lt;P&gt;debug crypto isakmp detail&lt;/P&gt;&lt;P&gt;debug crypto isakmp packet&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;H2&gt;3.2 Hardware client configuration.&lt;/H2&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;crypto ipsec client ezvpn EZ&lt;/P&gt;&lt;P&gt;connect manual&lt;/P&gt;&lt;P&gt;group cisco key cisco&lt;/P&gt;&lt;P&gt;mode client&lt;/P&gt;&lt;P&gt;peer 192.2.0.1 default&lt;/P&gt;&lt;P&gt;peer 192.2.0.2&lt;/P&gt;&lt;P&gt;username cisco password cisco&lt;/P&gt;&lt;P&gt;xauth userid mode local&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt;ip address 192.2.1.2 255.255.255.0&lt;/P&gt;&lt;P&gt;crypto ipsec client ezvpn EZ&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;interface Ethernet1/0&lt;/P&gt;&lt;P&gt;ip address 192.168.101.1 255.255.255.0&lt;/P&gt;&lt;P&gt;crypto ipsec client ezvpn EZ inside&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;H2&gt;3.3 Headend configuration.&lt;/H2&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;DVTI_Server#sh run | s aaa|crypto|Virtual&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;aaa authentication login AAA local&lt;/P&gt;&lt;P&gt;aaa authentication login AUTH local&lt;/P&gt;&lt;P&gt;aaa authorization network AUTH local&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;crypto isakmp policy 10&lt;/P&gt;&lt;P&gt;encr aes&lt;/P&gt;&lt;P&gt;authentication pre-share&lt;/P&gt;&lt;P&gt;group 2&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;crypto isakmp keepalive 120 5&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;crypto isakmp client configuration group cisco&lt;/P&gt;&lt;P&gt;key cisco&lt;/P&gt;&lt;P&gt;pool PRIMARY&lt;/P&gt;&lt;P&gt;save-password&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;crypto isakmp profile ISA_PRO&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; match identity group cisco&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; client authentication list AUTH&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; isakmp authorization list AUTH&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; client configuration address respond&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; virtual-template 1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set TRA esp-aes esp-sha-hmac&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;crypto ipsec profile PRO&lt;/P&gt;&lt;P&gt;set transform-set TRA&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;interface Virtual-Template1 type tunnel&lt;/P&gt;&lt;P&gt;no ip address&lt;/P&gt;&lt;P&gt;tunnel mode ipsec ipv4&lt;/P&gt;&lt;P&gt;tunnel protection ipsec profile PRO&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;H1&gt;4. Debugging&lt;/H1&gt;&lt;H2&gt;4.1 Phase 1 - Aggressive mode.&lt;/H2&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;H3&gt;4.1.1 Aggressive mode message 1 (AM1); sent from client to server.&lt;/H3&gt;&lt;P&gt;Includes:&lt;/P&gt;&lt;P&gt;- capabilities (Vendor IDs)&lt;/P&gt;&lt;P&gt;- isakmp proposals&lt;/P&gt;&lt;P&gt;- group (identity)&lt;/P&gt;&lt;P&gt;- PSK&lt;/P&gt;&lt;P&gt;- Diffie-Hellman exchange.&lt;/P&gt;&lt;P&gt;- Landing on a profile.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.035: ISAKMP (0): received packet from 192.2.1.2 dport 500 sport 500 Global (N) NEW SA&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.035: ISAKMP: Created a peer struct for 192.2.1.2, peer port 500&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.035: ISAKMP: New peer created peer = 0x5BFDED8 peer_handle = 0x80000007&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.035: ISAKMP: Locking peer struct 0x5BFDED8, refcount 1 for crypto_isakmp_process_block&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.035: ISAKMP: local port 500, remote port 500&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.035: ISAKMP:(0):insert sa successfully sa = 64487E8&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.035: ISAKMP:(0): processing SA payload. message ID = 0&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.035: ISAKMP:(0): processing ID payload. message ID = 0&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.035: ISAKMP (0): ID payload&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; next-payload : 13&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; type&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : 11&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;STRONG&gt;group id&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : cisco&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; protocol&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : 17&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; port&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; length&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : 13&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.035:&lt;STRONG&gt; ISAKMP:(0):: peer matches ISA_PRO profile&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.035: ISAKMP:(0):Setting client config settings 6407F30&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.035: ISAKMP:(0):(Re)Setting client xauth list&amp;nbsp; and state&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.035: ISAKMP/xauth: initializing AAA request&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.035: ISAKMP:(0): processing vendor id payload&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.035: ISAKMP:(0): vendor ID seems Unity/DPD but major 69 mismatch&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.035: ISAKMP (0): vendor ID is NAT-T RFC 3947&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.035: ISAKMP:(0): processing vendor id payload&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.035: ISAKMP:(0): vendor ID seems Unity/DPD but major 245 mismatch&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.035: ISAKMP (0): vendor ID is NAT-T v7&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.035: ISAKMP:(0): processing vendor id payload&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.035: ISAKMP:(0): vendor ID seems Unity/DPD but major 157 mismatch&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.035: ISAKMP:(0): vendor ID is NAT-T v3&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.035: ISAKMP:(0): processing vendor id payload&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.035: ISAKMP:(0): vendor ID seems Unity/DPD but major 123 mismatch&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.035: ISAKMP:(0): vendor ID is NAT-T v2&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.035: ISAKMP:(0): Authentication by xauth preshared&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.035: ISAKMP:(0):Checking ISAKMP transform 1 against priority 10 policy&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.035: ISAKMP:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; encryption AES-CBC&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.035: ISAKMP:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; keylength of 128&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.035: ISAKMP:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hash SHA&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.035: ISAKMP:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; default group 2&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.035: ISAKMP:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; auth XAUTHInitPreShared&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.035: ISAKMP:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; life type in seconds&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.035: ISAKMP:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; life duration (VPI) of&amp;nbsp; 0x0 0x20 0xC4 0x9B&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.035: ISAKMP:(0):atts are acceptable. Next payload is 3&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.035: ISAKMP:(0):Acceptable atts:actual life: 86400&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.035: ISAKMP:(0):Acceptable atts:life: 0&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.035: ISAKMP:(0):Fill atts in sa vpi_length:4&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.035: ISAKMP:(0):Fill atts in sa life_in_seconds:2147483&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.035: ISAKMP:(0):Returning Actual lifetime: 86400&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.035: ISAKMP:(0)::Started lifetime timer: 86400.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;H4&gt;Relevant configuration.&lt;/H4&gt;&lt;P&gt;ISAKMP being enabled on interface and at least one policy defined and matching what client sent.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;crypto isakmp policy 10&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;encr aes&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;authentication pre-share&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;group 2&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;crypto isakmp profile &lt;STRONG&gt;ISA_PRO&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp; match identity group &lt;STRONG&gt;cisco&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp; i&lt;STRONG&gt;sakmp authorization list AUTH&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;crypto isakmp client configuration group&lt;STRONG&gt; cisco&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;key cisco&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;H3&gt;4.1.2 Aggressive mode message 2 (AM2); sent from server to client.&lt;/H3&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Includes:&lt;/P&gt;&lt;P&gt;- capabilities&lt;/P&gt;&lt;P&gt;- DH exchange&lt;/P&gt;&lt;P&gt;- Identity&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.035: ISAKMP:(0): processing vendor id payload&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.035: ISAKMP:(0): vendor ID seems Unity/DPD but major 69 mismatch&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.035: ISAKMP (0):&lt;STRONG&gt; vendor ID is NAT-T RFC 3947&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.035: ISAKMP:(0): processing vendor id payload&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.035: ISAKMP:(0): vendor ID seems Unity/DPD but major 245 mismatch&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.035: ISAKMP (0): &lt;STRONG&gt;vendor ID is NAT-T v7&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.035: ISAKMP:(0): processing vendor id payload&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.035: ISAKMP:(0): vendor ID seems Unity/DPD but major 157 mismatch&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.035: ISAKMP:(0):&lt;STRONG&gt; vendor ID is NAT-T v3&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.035: ISAKMP:(0): processing vendor id payload&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.035: ISAKMP:(0): vendor ID seems Unity/DPD but major 123 mismatch&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.035: ISAKMP:(0): &lt;STRONG&gt;vendor ID is NAT-T v2&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.035: ISAKMP:(0): processing KE payload. message ID = 0&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.043: ISAKMP:(0): processing NONCE payload. message ID = 0&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.043: ISAKMP:(0): processing vendor id payload&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.043: ISAKMP:(0): &lt;STRONG&gt;vendor ID is DPD&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.043: ISAKMP:(0): processing vendor id payload&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.043: ISAKMP:(0): vendor ID seems Unity/DPD but major 33 mismatch&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.043: ISAKMP:(0): &lt;STRONG&gt;vendor ID is XAUTH&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.043: ISAKMP:(0): processing vendor id payload&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.043: ISAKMP:(0): &lt;STRONG&gt;claimed IOS but failed authentication&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.043: ISAKMP:(0): processing vendor id payload&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.043: ISAKMP:(0): &lt;STRONG&gt;vendor ID is Unity&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.043: ISAKMP:(0):Input = IKE_MESG_FROM_PEER, IKE_AM_EXCH&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.043: ISAKMP:(0):Old State = IKE_READY&amp;nbsp; New State = IKE_R_AM_AAA_AWAIT&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.063: ISAKMP:(1021): constructed NAT-T vendor-rfc3947 ID&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.063: ISAKMP:(1021):SA is doing pre-shared key authentication plus XAUTH using id type ID_IPV4_ADDR&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.063:&lt;STRONG&gt; ISAKMP (1021): ID payload&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; next-payload : 10&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; type&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : 1&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; address&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : 192.2.0.1&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; protocol&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; port&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; length&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : 12&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.063: ISAKMP:(1021):Total payload length: 12&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.063: ISAKMP:(1021): sending packet to 192.2.1.2 my_port 500 peer_port 500 (R) AG_INIT_EXCH&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.063: ISAKMP:(1021):Sending an IKE IPv4 Packet.&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.063: ISAKMP:(1021):Input = IKE_MESG_FROM_AAA, PRESHARED_KEY_REPLY&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.063: ISAKMP:(1021):Old State = IKE_R_AM_AAA_AWAIT&amp;nbsp; New State = IKE_R_AM2&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;H3&gt;4.1.3 Aggressive mode message 3 (AM3); Finish phase 1.&lt;/H3&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Contains:&lt;/P&gt;&lt;P&gt;- NAT discovery and decision.&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.091: ISAKMP (1021): received packet from 192.2.1.2 dport 500 sport 500 Global (R) AG_INIT_EXCH&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.091: ISAKMP:(1021): processing HASH payload. message ID = 0&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.091: ISAKMP:received payload type 20&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.091: ISAKMP (1021): His hash no match - this node outside NAT&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.091: ISAKMP:received payload type 20&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.091: ISAKMP (1021): &lt;STRONG&gt;No NAT Found for self or peer&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.091: ISAKMP:(1021): processing NOTIFY INITIAL_CONTACT protocol 1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; spi 0, message ID = 0, sa = 64487E8&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.091: ISAKMP:(1021):SA authentication status:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; authenticated&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.091: ISAKMP:(1021):SA has been authenticated with 192.2.1.2&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.091: ISAKMP:(1021):SA authentication status:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; authenticated&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.091: ISAKMP:(1021): Process initial contact,&lt;/P&gt;&lt;P&gt;bring down existing phase 1 and 2 SA's with local 192.2.0.1 remote 192.2.1.2 remote port 500&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.091: ISAKMP:(1021):returning IP addr to the address pool&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.091: ISAKMP: Trying to insert a peer 192.2.0.1/192.2.1.2/500/,&amp;nbsp; and inserted successfully 5BFDED8.&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.091: ISAKMP:(1021):Returning Actual lifetime: 86400&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.091: ISAKMP: set new node -110506246 to CONF_XAUTH&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.091: ISAKMP:(1021):Sending NOTIFY RESPONDER_LIFETIME protocol 1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; spi 95630072, message ID = -110506246&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.091: ISAKMP:(1021): sending packet to 192.2.1.2 my_port 500 peer_port 500 (R) QM_IDLE&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.091: ISAKMP:(1021):Sending an IKE IPv4 Packet.&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.091: ISAKMP:(1021):purging node -110506246&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.091: ISAKMP: Sending phase 1 responder lifetime 86400&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.091: ISAKMP:(1021):Input = IKE_MESG_FROM_PEER, IKE_AM_EXCH&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.091: ISAKMP:(1021):Old State = IKE_R_AM2&amp;nbsp; New State = IKE_P1_COMPLETE&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;H2&gt;4.2 Phase 1.5 - Xauth and Mode config.&lt;/H2&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;H3&gt;Xauth - eXtended AUTHentication. User authentication.&lt;/H3&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Authentication request sent from server to client.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.095: IPSEC(key_engine): got a queue event with 1 KMI message(s)&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;*Jun 17 07:33:19.095: ISAKMP:(1021):Need XAUTH&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.095: ISAKMP: set new node 212826605 to CONF_XAUTH&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;*Jun 17 07:33:19.095: ISAKMP/xauth: request attribute XAUTH_USER_NAME_V2&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;*Jun 17 07:33:19.095: ISAKMP/xauth: request attribute XAUTH_USER_PASSWORD_V2&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.095: ISAKMP:(1021): initiating peer config to 192.2.1.2. ID = 212826605&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.095: ISAKMP:(1021): sending packet to 192.2.1.2 my_port 500 peer_port 500 (R) CONF_XAUTH&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.095: ISAKMP:(1021):Sending an IKE IPv4 Packet.&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.095: ISAKMP:(1021):Input = IKE_MESG_INTERNAL, IKE_PHASE1_COMPLETE&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.095: ISAKMP:(1021):Old State = IKE_P1_COMPLETE&amp;nbsp; New State = IKE_XAUTH_REQ_SENT&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Authentication reply from client to server:&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.135: ISAKMP (1021): received packet from 192.2.1.2 dport 500 sport 500 Global (R) CONF_XAUTH&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.135: ISAKMP:(1021):processing transaction payload from 192.2.1.2. message ID = 212826605&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;*Jun 17 07:33:19.135: ISAKMP: Config payload REPLY&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;*Jun 17 07:33:19.135: ISAKMP/xauth: reply attribute XAUTH_USER_NAME_V2&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;*Jun 17 07:33:19.135: ISAKMP/xauth: reply attribute XAUTH_USER_PASSWORD_V2&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.135: ISAKMP:(1021):deleting node 212826605 error FALSE reason "Done with xauth request/reply exchange"&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.135: ISAKMP:(1021):Input = IKE_MESG_FROM_PEER, IKE_CFG_REPLY&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.135: ISAKMP:(1021):Old State = IKE_XAUTH_REQ_SENT&amp;nbsp; New State = IKE_XAUTH_AAA_CONT_LOGIN_AWAIT&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Server is checking xauth against AAA method specified.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.135: ISAKMP: set new node 1203692846 to CONF_XAUTH&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.135: ISAKMP:(1021): initiating peer config to 192.2.1.2. ID = 1203692846&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.135: ISAKMP:(1021): sending packet to 192.2.1.2 my_port 500 peer_port 500 (R) CONF_XAUTH&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.135: ISAKMP:(1021):Sending an IKE IPv4 Packet.&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.135: ISAKMP:(1021):Input = IKE_MESG_FROM_AAA, IKE_AAA_CONT_LOGIN&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.135: ISAKMP:(1021):Old State = IKE_XAUTH_AAA_CONT_LOGIN_AWAIT&amp;nbsp; New State = IKE_XAUTH_SET_SENT&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.139: ISAKMP (1021): received packet from 192.2.1.2 dport 500 sport 500 Global (R) CONF_XAUTH&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.139: ISAKMP:(1021):processing transaction payload from 192.2.1.2. message ID = 1203692846&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;*Jun 17 07:33:19.139: ISAKMP: Config payload ACK&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;*Jun 17 07:33:19.139: ISAKMP:(1021):&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; XAUTH ACK Processed&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.139: ISAKMP:(1021):deleting node 1203692846 error FALSE reason "Transaction mode done"&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.139: ISAKMP:(1021):Talking to a Unity Client&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.139: ISAKMP:(1021):Input = IKE_MESG_FROM_PEER, IKE_CFG_ACK&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.139: ISAKMP:(1021):Old State = IKE_XAUTH_SET_SENT&amp;nbsp; New State = IKE_P1_COMPLETE&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.139: ISAKMP:(1021):IKE_DPD is enabled, initializing timers&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.139: ISAKMP:(1021):Input = IKE_MESG_INTERNAL, IKE_PHASE1_COMPLETE&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.139: ISAKMP:(1021):Old State = IKE_P1_COMPLETE&amp;nbsp; New State = IKE_P1_COMPLETE&lt;/P&gt;&lt;H4&gt;Relevant configuration.&lt;/H4&gt;&lt;P&gt;crypto isakmp profile ISA_PRO&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp; client authentication list AUTH&lt;/STRONG&gt;&lt;/P&gt;&lt;H3&gt;Mode config - request and provide authentication attributes.&lt;/H3&gt;&lt;P&gt;Contains:&lt;/P&gt;&lt;P&gt;- Request for parameters to configure client.&lt;/P&gt;&lt;P&gt;- Reply - at least and IP address and mask in typical scenario.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What the client request, you will not that the client asks for IP address and if it's allowed to have the password saved.(Among other things).&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.139: ISAKMP (1021): received packet from 192.2.1.2 dport 500 sport 500 Global (R) QM_IDLE&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.139: ISAKMP: set new node 659439105 to QM_IDLE&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.139: ISAKMP:(1021):processing transaction payload from 192.2.1.2. message ID = 659439105&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.139: ISAKMP: Config payload REQUEST&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.139: ISAKMP:(1021):checking request:&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.139: ISAKMP:&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;STRONG&gt;IP4_ADDRESS&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.139: ISAKMP:&amp;nbsp;&amp;nbsp;&amp;nbsp; IP4_NETMASK&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.139: ISAKMP:&amp;nbsp;&amp;nbsp;&amp;nbsp; MODECFG_CONFIG_URL&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.139: ISAKMP:&amp;nbsp;&amp;nbsp;&amp;nbsp; MODECFG_CONFIG_VERSION&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.139: ISAKMP:&amp;nbsp;&amp;nbsp;&amp;nbsp; MODECFG_IPSEC_INT_CONF&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.139: ISAKMP:&amp;nbsp;&amp;nbsp;&amp;nbsp; IP4_DNS&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.139: ISAKMP:&amp;nbsp;&amp;nbsp;&amp;nbsp; IP4_DNS&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.139: ISAKMP:&amp;nbsp;&amp;nbsp;&amp;nbsp; IP4_NBNS&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.139: ISAKMP:&amp;nbsp;&amp;nbsp;&amp;nbsp; IP4_NBNS&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.139: ISAKMP:&amp;nbsp;&amp;nbsp;&amp;nbsp; SPLIT_INCLUDE&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.139: ISAKMP:&amp;nbsp;&amp;nbsp;&amp;nbsp; SPLIT_DNS&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.139: ISAKMP:&amp;nbsp;&amp;nbsp;&amp;nbsp; DEFAULT_DOMAIN&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.139: ISAKMP:&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;STRONG&gt;MODECFG_SAVEPWD&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.139: ISAKMP:&amp;nbsp;&amp;nbsp;&amp;nbsp; INCLUDE_LOCAL_LAN&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.139: ISAKMP:&amp;nbsp;&amp;nbsp;&amp;nbsp; PFS&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.139: ISAKMP:&amp;nbsp;&amp;nbsp;&amp;nbsp; BACKUP_SERVER&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.139: ISAKMP:&amp;nbsp;&amp;nbsp;&amp;nbsp; APPLICATION_VERSION&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.139: ISAKMP:&amp;nbsp;&amp;nbsp;&amp;nbsp; MODECFG_BANNER&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.139: ISAKMP:&amp;nbsp;&amp;nbsp;&amp;nbsp; MODECFG_HOSTNAME&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.139: ISAKMP/author: Author request for group ciscosuccessfully sent to AAA&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.139: ISAKMP:(1021):Input = IKE_MESG_FROM_PEER, IKE_CFG_REQUEST&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.139: ISAKMP:(1021):Old State = IKE_P1_COMPLETE&amp;nbsp; New State = IKE_CONFIG_AUTHOR_AAA_AWAIT&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Serer replies with:&lt;/P&gt;&lt;P&gt;- Here is your IP address - 10.1.1.100&lt;/P&gt;&lt;P&gt;- I am capable of doing VTI&lt;/P&gt;&lt;P&gt;- You can save passwords&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.139: IPSEC(key_engine): got a queue event with 1 KMI message(s)&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.143: %LINEPROTO-5-UPDOWN: Line protocol on Interface Virtual-Access3, changed state to down&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.143: ISAKMP:(1021):attributes sent in message:&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.143:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Address: 0.2.0.0&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;*Jun 17 07:33:19.147: ISAKMP:(1021):allocating address 10.1.1.100&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;*Jun 17 07:33:19.147: ISAKMP: Sending private address: 10.1.1.100&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.147: &lt;STRONG&gt;ISAKMP: Sending IPsec Interface Config reply value 1&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.147: &lt;STRONG&gt;ISAKMP: Sending save password reply value 1&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.147: ISAKMP: Sending APPLICATION_VERSION string: Cisco IOS Softwarea), Version 15.0(1)M5,&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Technical Support: &lt;/SPAN&gt;&lt;A href="http://www.cisco.com/techsupport" target="_blank"&gt;http://www.cisco.com/techsupport&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Copyright (c) 1986-2011 by Cisco Systems, Inc.&lt;/P&gt;&lt;P&gt;Compiled Thu 03-Mar-11 12:13 by prod_rel_team&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.147: ISAKMP (1021): Unknown Attr: MODECFG_HOSTNAME (0x700A)&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.147: ISAKMP:(1021): responding to peer config from 192.2.1.2. ID = 659439105&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.147: ISAKMP: Marking node 659439105 for late deletion&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.147: ISAKMP:(1021): sending packet to 192.2.1.2 my_port 500 peer_port 500 (R) CONF_ADDR&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.147: ISAKMP:(1021):Sending an IKE IPv4 Packet.&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.147: ISAKMP:(1021):Talking to a Unity Client&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.147: ISAKMP:(1021):Input = IKE_MESG_FROM_AAA, IKE_AAA_GROUP_ATTR&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.147: ISAKMP:(1021):Old State = IKE_CONFIG_AUTHOR_AAA_AWAIT&amp;nbsp; New State = IKE_P1_COMPLETE&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.147: ISAKMP:FSM error - Message from AAA grp/user.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;And phase 1.5 completes.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.147: ISAKMP:(1021):IKE_DPD is enabled, initializing timers&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.147: ISAKMP:(1021):Input = IKE_MESG_INTERNAL, IKE_PHASE1_COMPLETE&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.147: ISAKMP:(1021):Old State = IKE_P1_COMPLETE&amp;nbsp; New State = IKE_P1_COMPLETE&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.155: ISAKMP:(1021):IKE_DPD is enabled, initializing timers&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.155: ISAKMP:(1021):Input = IKE_MESG_INTERNAL, IKE_PHASE1_COMPLETE&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.155: ISAKMP:(1021):Old State = IKE_P1_COMPLETE&amp;nbsp; New State = IKE_P1_COMPLETE&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;H4&gt;Relevant configuration:&lt;/H4&gt;&lt;P&gt;crypto isakmp client configuration group cisco&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;pool PRIMARY&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;save-password&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;crypto isakmp profile ISA_PRO&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp; client configuration address respond&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp; virtual-template 1&lt;/STRONG&gt;&lt;/P&gt;&lt;H2&gt;4.3 Phase 2 - Quick mode.&lt;/H2&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;H3&gt;4.3.1 Quick mode message 1 (QM1)&lt;/H3&gt;&lt;P&gt;- phase two encryption algorithms (IPsec transform sets)&lt;/P&gt;&lt;P&gt;- tunnel type and encryption.&lt;/P&gt;&lt;P&gt;- proxy ID - "what I would like to put in the tunnel?"&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.179: ISAKMP (1021): received packet from 192.2.1.2 dport 500 sport 500 Global (R) QM_IDLE&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.179: ISAKMP: set new node 226234965 to QM_IDLE&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.179: ISAKMP:(1021): processing HASH payload. message ID = 226234965&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.179: ISAKMP:(1021): processing SA payload. message ID = 226234965&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.179: ISAKMP:(1021):Checking IPSec proposal 1&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.179: ISAKMP: transform 1,&lt;STRONG&gt; ESP_AES&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.179: ISAKMP:&amp;nbsp;&amp;nbsp; attributes in transform:&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.179: ISAKMP:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;STRONG&gt;encaps is 1 (Tunnel)&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.179: ISAKMP:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; SA life type in seconds&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.179: ISAKMP:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; SA life duration (VPI) of&amp;nbsp; 0x0 0x20 0xC4 0x9B&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.179: ISAKMP:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; SA life type in kilobytes&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.179: ISAKMP:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; SA life duration (VPI) of&amp;nbsp; 0x0 0x46 0x50 0x0&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.179: ISAKMP:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; authenticator is &lt;STRONG&gt;HMAC-SHA&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.179: ISAKMP:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; key length is 128&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;*Jun 17 07:33:19.179: ISAKMP:(1021):atts are acceptable.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.179: IPSEC(validate_proposal_request): proposal part #1&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.179: IPSEC(validate_proposal_request): proposal part #1,&lt;/P&gt;&lt;P&gt;&amp;nbsp; (key eng. msg.) INBOUND local= 192.2.0.1, remote= 192.2.1.2,&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; local_proxy= 0.0.0.0/0.0.0.0/0/0 (type=4),&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; remote_proxy= 10.1.1.100/255.255.255.255/0/0 (type=1),&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; protocol= ESP, transform= NONE&amp;nbsp; (Tunnel),&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; lifedur= 0s and 0kb,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; spi= 0x0(0), conn_id= 0, keysize= 128, flags= 0x0&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.179: insert of map into mapdb AVL failed, map + ace pair already exists on the mapdb&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.179: Crypto mapdb : proxy_match&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src addr&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : 0.0.0.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst addr&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : 10.1.1.100&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; protocol&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src port&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst port&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : 0&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.179: ISAKMP:(1021): processing NONCE payload. message ID = 226234965&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.179: ISAKMP:(1021): processing ID payload. message ID = 226234965&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.179: ISAKMP:(1021): processing ID payload. message ID = 226234965&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.179: ISAKMP:(1021):QM Responder gets spi&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.179: ISAKMP:(1021):Node 226234965, Input = IKE_MESG_FROM_PEER, IKE_QM_EXCH&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.179: ISAKMP:(1021):Old State = IKE_QM_READY&amp;nbsp; New State = IKE_QM_SPI_STARVE&lt;/P&gt;&lt;H4&gt;Relevant config&lt;/H4&gt;&lt;P&gt;crypto ipsec transform-set TRA &lt;STRONG&gt;esp-aes esp-sha-hmac&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;crypto ipsec profile PRO&lt;/P&gt;&lt;P&gt;set transform-set &lt;STRONG&gt;TRA&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;interface Virtual-Template1 type tunnel&lt;/P&gt;&lt;P&gt;tunnel protection ipsec profile &lt;STRONG&gt;PRO&lt;/STRONG&gt;&lt;/P&gt;&lt;H3&gt;4.3.2 Quick mode message 2 (QM2) - sever's reply and creation of SAs.&lt;/H3&gt;&lt;P&gt;*Jun 17 07:33:19.179: ISAKMP:(1021):deleting node 659439105 error FALSE reason "No Error"&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.179: ISAKMP:(1021): Creating IPSec SAs&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.179:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; inbound SA from 192.2.1.2 to 192.2.0.1 (f/i)&amp;nbsp; 0/ 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; (proxy 10.1.1.100 to 0.0.0.0)&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.179:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; has spi 0x1E448340 and conn_id 0&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.179:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; lifetime of 2147483 seconds&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.179:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; lifetime of 4608000 kilobytes&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.179:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; outbound SA from 192.2.0.1 to 192.2.1.2 (f/i) 0/0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; (proxy 0.0.0.0 to 10.1.1.100)&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.179:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; has spi&amp;nbsp; 0x3D7E4D33 and conn_id 0&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.179:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; lifetime of 2147483 seconds&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.179:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; lifetime of 4608000 kilobytes&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.179: ISAKMP:(1021): sending packet to 192.2.1.2 my_port 500 peer_port 500 (R) QM_IDLE&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.179: ISAKMP:(1021):Sending an IKE IPv4 Packet.&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.179: ISAKMP:(1021):Node 226234965, Input = IKE_MESG_INTERNAL, IKE_GOT_SPI&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.179: ISAKMP:(1021):Old State = IKE_QM_SPI_STARVE&amp;nbsp; New State = IKE_QM_R_QM2&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.179: IPSEC(key_engine): got a queue event with 1 KMI message(s)&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.179: Crypto mapdb : proxy_match&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src addr&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : 0.0.0.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst addr&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : 10.1.1.100&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; protocol&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src port&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst port&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : 0&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.179: IPSEC(crypto_ipsec_sa_find_ident_head): reconnecting with the same proxies and peer 192.2.1.2&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.179: IPSEC(rte_mgr): VPN Route Event Peer has changed but same proxies for peer 192.2.1.2&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.179: IPSEC(rte_mgr): VPN Route Event create SA based on crypto ACL in real time for 192.2.1.2&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.179: IPSEC(rte_mgr): VPN Route Refcount 1 Virtual-Access3&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.179: IPSEC(rte_mgr): VPN Route Added 10.1.1.100 255.255.255.255 via Virtual-Access3 in IP DEFAULT TABLE with tag 0 distance1&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.179: IPSEC(policy_db_add_ident): src 0.0.0.0, dest 10.1.1.100, dest_port 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.179: IPSEC(create_sa): sa created,&lt;/P&gt;&lt;P&gt;&amp;nbsp; (sa) sa_dest= 192.2.0.1, sa_proto= 50,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;STRONG&gt;sa_spi= 0x1E448340(507806528),&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; sa_trans= esp-aes esp-sha-hmac , sa_conn_id= 73&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; sa_lifetime(k/sec)= (4444443/3600)&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.179: IPSEC(create_sa): sa created,&lt;/P&gt;&lt;P&gt;&amp;nbsp; (sa) sa_dest= 192.2.1.2, sa_proto= 50,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; &lt;STRONG&gt;sa_spi= 0x3D7E4D33(1031687475),&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; sa_trans= esp-aes esp-sha-hmac , sa_conn_id= 74&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; sa_lifetime(k/sec)= (4444443/3600)&lt;/P&gt;&lt;H3&gt;4.3.3 Quick mode message 3 (QM3) - Finishing.&lt;/H3&gt;&lt;P&gt;*Jun 17 07:33:19.195: ISAKMP (1021): received packet from 192.2.1.2 dport 500 sport 500 Global (R) QM_IDLE&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.195: ISAKMP:(1021):deleting node 226234965 error FALSE reason "QM done (await)"&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.195: ISAKMP:(1021):Node 226234965, Input = IKE_MESG_FROM_PEER, IKE_QM_EXCH&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.195: ISAKMP:(1021):Old State = IKE_QM_R_QM2&amp;nbsp; New State = &lt;STRONG&gt;IKE_QM_PHASE2_COMPLETE&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.195: IPSEC(key_engine): got a queue event with 1 KMI message(s)&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.195: IPSEC(key_engine_enable_outbound): rec'd enable notify from ISAKMP&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.195: IPSEC(key_engine_enable_outbound): enable SA with spi 1031687475/50&lt;/P&gt;&lt;P&gt;DVTI_Server#&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.195: IPSEC(update_current_outbound_sa): updated peer 192.2.1.2 current outbound sa to SPI 3D7E4D33&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.771: ISAKMP (1021): received packet from 192.2.1.2 dport 500 sport 500 Global (R) QM_IDLE&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.771: ISAKMP: set new node -472138210 to QM_IDLE&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.771: ISAKMP:(1021): processing HASH payload. message ID = -472138210&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.771: ISAKMP:(1021): processing NOTIFY CLIENT_UPDATE protocol 1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; spi 0, message ID = -472138210, sa = 64487E8&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.771: ISAKMP:(0):Attribute type CLIENT_HOSTNAME, length = 13&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.771: ISAKMP:(0):Attribute type CLIENT_PLATFORM_NAME, length = 12&lt;/P&gt;&lt;P&gt;DVTI_Server#&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.771: ISAKMP:(0):Attribute type CLIENT_HARDWARE_SERIAL, length = 6&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.771: ISAKMP:(0):Attribute type CLIENT_MEMORY_SIZE, length = 8&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.771: ISAKMP:(0):Attribute type CLIENT_AVAILABLE_MEMORY, length = 8&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.771: ISAKMP:(0):Attribute type CLIENT_IMAGE_VERSION, length = 42&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.771: ISAKMP:(1021):deleting node -472138210 error FALSE reason "Informational (in) state 1"&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.771: ISAKMP:(1021):Input = IKE_MESG_FROM_PEER, IKE_INFO_NOTIFY&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.771: ISAKMP:(1021):Old State = IKE_P1_COMPLETE&amp;nbsp; New State = IKE_P1_COMPLETE&lt;/P&gt;&lt;H1&gt;5. Verification of tunnel.&lt;/H1&gt;&lt;P&gt;Let's have a look at established tunnel.&lt;/P&gt;&lt;H2&gt;5.1 ISAKMP&lt;/H2&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Let's understand if phase 1 is up and running.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Command:&lt;/P&gt;&lt;BLOCKQUOTE&gt;sh cry isa sa det&lt;/BLOCKQUOTE&gt;&lt;P&gt;Output:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;DVTI_Server#show crypto isa sa det&lt;/P&gt;&lt;PRE&gt;(...)&lt;/PRE&gt;&lt;P&gt;C-id&amp;nbsp; Local&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Remote&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; I-VRF&amp;nbsp;&amp;nbsp;&amp;nbsp; Status Encr Hash Auth DH Lifetime Cap.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;1021 &lt;STRONG&gt;192.2.0.1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.2.1.2&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ACTIVE aes&amp;nbsp; sha&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 2&amp;nbsp; 23:18:02&lt;/STRONG&gt; CDX&lt;/P&gt;&lt;H2&gt;5.2 IPSec&lt;/H2&gt;&lt;P&gt;Let's check if the device is ready to encrypt traffic (i.e. if both inbound and outbound SPIs are present).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Command:&lt;/P&gt;&lt;PRE&gt;show crypto ipsec sa peer 192.2.1.2&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Output:&lt;/P&gt;&lt;P&gt;(Some output omitted)&lt;/P&gt;&lt;P&gt;interface: Virtual-Access3&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Crypto map tag: Virtual-Access3-head-0, local addr 192.2.0.1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; protected vrf: (none)&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp; local&amp;nbsp; ident (addr/mask/prot/port): (0.0.0.0/0.0.0.0/0/0)&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp; remote ident (addr/mask/prot/port): (10.1.1.100/255.255.255.255/0/0)&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp; current_peer 192.2.1.2 port 500&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; PERMIT, flags={origin_is_acl,}&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; #pkts encaps: 0, #pkts encrypt: 0, #pkts digest: 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; #pkts decaps: 0, #pkts decrypt: 0, #pkts verify: 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; #pkts compressed: 0, #pkts decompressed: 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; #pkts not compressed: 0, #pkts compr. failed: 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; #pkts not decompressed: 0, #pkts decompress failed: 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; #send errors 0, #recv errors 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;STRONG&gt;local crypto endpt.: 192.2.0.1, remote crypto endpt.: 192.2.1.2&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; path mtu 1500, ip mtu 1500, ip mtu idb Ethernet0/0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; current outbound spi: 0x3D7E4D33(1031687475)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; PFS (Y/N): N, DH group: none&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; inbound esp sas:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;STRONG&gt;spi: 0x1E448340(507806528)&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; transform: esp-aes esp-sha-hmac ,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; in use settings ={Tunnel, }&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; conn id: 73, flow_id: SW:73, sibling_flags 80000046, crypto map: &lt;STRONG&gt;Virtual-Access3-head-0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; sa timing: remaining key lifetime (k/sec): (4444443/969)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; IV size: 16 bytes&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; replay detection support: Y&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Status: ACTIVE&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; outbound esp sas:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;STRONG&gt;spi: 0x3D7E4D33(1031687475)&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; transform: esp-aes esp-sha-hmac ,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; in use settings ={Tunnel, }&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; conn id: 74, flow_id: SW:74, sibling_flags 80000046, crypto map: &lt;STRONG&gt;Virtual-Access3-head-0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; sa timing: remaining key lifetime (k/sec): (4444443/969)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; IV size: 16 bytes&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; replay detection support: Y&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Status: ACTIVE&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;H1&gt;6. Further reading&lt;/H1&gt;&lt;P&gt;A good place to start is wikipedia article on IPSec.&lt;/P&gt;&lt;P&gt;Standard and references contains a lot of useful information:&lt;/P&gt;&lt;P&gt;&lt;A href="http://en.wikipedia.org/wiki/IPsec" target="_blank"&gt;http://en.wikipedia.org/wiki/IPsec&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Understanding main mode debugs on ASA:&lt;/P&gt;&lt;P&gt;&lt;A href="https://community.cisco.com/document/53656/understanding-asa-ipsec-and-ike-debugs-ikev1-main-mode" target="_blank"&gt;https://supportforums.cisco.com/docs/DOC-14044&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Understanding aggresive mode debug on ASA:&lt;/P&gt;&lt;P&gt;&lt;A href="https://community.cisco.com/document/52636/understanding-asa-ipsec-and-ike-debugs-ikev1-aggressive-mode" target="_blank"&gt;https://supportforums.cisco.com/docs/DOC-13715&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;H1&gt;7. Comments? feedback?&lt;/H1&gt;&lt;P&gt;Leave a comment to this document.&lt;/P&gt;</description>
    <pubDate>Tue, 29 Aug 2017 09:38:43 GMT</pubDate>
    <dc:creator>Marcin Latosiewicz</dc:creator>
    <dc:date>2017-08-29T09:38:43Z</dc:date>
    <item>
      <title>Understanding IOS IPSec and IKE debugs - IKEv1 Aggressive Mode.</title>
      <link>https://community.cisco.com/t5/security-knowledge-base/understanding-ios-ipsec-and-ike-debugs-ikev1-aggressive-mode/ta-p/3123083</link>
      <description>&lt;P&gt;&lt;LI-TOC indent="15" liststyle="disc" maxheadinglevel="2"&gt;&lt;/LI-TOC&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Disclaimer: This is best&amp;nbsp; effort work only, it may (and probably is) not 100% correct. This work&amp;nbsp; will be corrected as corrective feedback is received.&lt;/EM&gt;&lt;/P&gt;&lt;H1&gt;1. Introduction&lt;/H1&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This&amp;nbsp; document will attempt to describe how to understand debugs on ASA when&amp;nbsp; aggressive mode and pre shared key (PSK) is being used.&lt;/P&gt;&lt;P&gt;How to translate certain debug lines into configuration.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What will not be discussed:&lt;/P&gt;&lt;P&gt;- passing traffic after tunnel has been established.&lt;/P&gt;&lt;P&gt;- basic concepts of IPSec or IKE.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;H1&gt;2. Core issue&lt;/H1&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;IKE and IPSec debugs tend to get cryptic, TAC will very often use them to understand where a problem with IPSec VPN tunnel &lt;STRONG&gt;establishment &lt;/STRONG&gt;is located.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;H1&gt;3. Scenario&lt;/H1&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Aggressive&amp;nbsp; mode is typically used in case of EZVPN, both software (Cisco VPN&amp;nbsp; client) and hardware clients (ASA 5505 or IOS routers), but only when&amp;nbsp; using pre shared key (PSK).&lt;/P&gt;&lt;P&gt;Those debugs are from IOS 15.0.1M5 EZVPN headend, EZVPN client will be a router (same version), in client mode.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;On server side I will be using DVTI, and client side no DVTI.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;H2&gt;3.1 Debugs used.&lt;/H2&gt;&lt;P&gt;debug crypto isakmp&lt;/P&gt;&lt;P&gt;debug crypto ipsec&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Optional debugs on client:&lt;/P&gt;&lt;PRE&gt;debug crypto ipsec client ezvpn&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Optional debugs on both (internal and containing WAY too much info to be discussed here)&lt;/P&gt;&lt;P&gt;debug crypto isakmp detail&lt;/P&gt;&lt;P&gt;debug crypto isakmp packet&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;H2&gt;3.2 Hardware client configuration.&lt;/H2&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;crypto ipsec client ezvpn EZ&lt;/P&gt;&lt;P&gt;connect manual&lt;/P&gt;&lt;P&gt;group cisco key cisco&lt;/P&gt;&lt;P&gt;mode client&lt;/P&gt;&lt;P&gt;peer 192.2.0.1 default&lt;/P&gt;&lt;P&gt;peer 192.2.0.2&lt;/P&gt;&lt;P&gt;username cisco password cisco&lt;/P&gt;&lt;P&gt;xauth userid mode local&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt;ip address 192.2.1.2 255.255.255.0&lt;/P&gt;&lt;P&gt;crypto ipsec client ezvpn EZ&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;interface Ethernet1/0&lt;/P&gt;&lt;P&gt;ip address 192.168.101.1 255.255.255.0&lt;/P&gt;&lt;P&gt;crypto ipsec client ezvpn EZ inside&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;H2&gt;3.3 Headend configuration.&lt;/H2&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;DVTI_Server#sh run | s aaa|crypto|Virtual&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;aaa authentication login AAA local&lt;/P&gt;&lt;P&gt;aaa authentication login AUTH local&lt;/P&gt;&lt;P&gt;aaa authorization network AUTH local&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;crypto isakmp policy 10&lt;/P&gt;&lt;P&gt;encr aes&lt;/P&gt;&lt;P&gt;authentication pre-share&lt;/P&gt;&lt;P&gt;group 2&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;crypto isakmp keepalive 120 5&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;crypto isakmp client configuration group cisco&lt;/P&gt;&lt;P&gt;key cisco&lt;/P&gt;&lt;P&gt;pool PRIMARY&lt;/P&gt;&lt;P&gt;save-password&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;crypto isakmp profile ISA_PRO&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; match identity group cisco&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; client authentication list AUTH&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; isakmp authorization list AUTH&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; client configuration address respond&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; virtual-template 1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set TRA esp-aes esp-sha-hmac&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;crypto ipsec profile PRO&lt;/P&gt;&lt;P&gt;set transform-set TRA&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;interface Virtual-Template1 type tunnel&lt;/P&gt;&lt;P&gt;no ip address&lt;/P&gt;&lt;P&gt;tunnel mode ipsec ipv4&lt;/P&gt;&lt;P&gt;tunnel protection ipsec profile PRO&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;H1&gt;4. Debugging&lt;/H1&gt;&lt;H2&gt;4.1 Phase 1 - Aggressive mode.&lt;/H2&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;H3&gt;4.1.1 Aggressive mode message 1 (AM1); sent from client to server.&lt;/H3&gt;&lt;P&gt;Includes:&lt;/P&gt;&lt;P&gt;- capabilities (Vendor IDs)&lt;/P&gt;&lt;P&gt;- isakmp proposals&lt;/P&gt;&lt;P&gt;- group (identity)&lt;/P&gt;&lt;P&gt;- PSK&lt;/P&gt;&lt;P&gt;- Diffie-Hellman exchange.&lt;/P&gt;&lt;P&gt;- Landing on a profile.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.035: ISAKMP (0): received packet from 192.2.1.2 dport 500 sport 500 Global (N) NEW SA&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.035: ISAKMP: Created a peer struct for 192.2.1.2, peer port 500&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.035: ISAKMP: New peer created peer = 0x5BFDED8 peer_handle = 0x80000007&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.035: ISAKMP: Locking peer struct 0x5BFDED8, refcount 1 for crypto_isakmp_process_block&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.035: ISAKMP: local port 500, remote port 500&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.035: ISAKMP:(0):insert sa successfully sa = 64487E8&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.035: ISAKMP:(0): processing SA payload. message ID = 0&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.035: ISAKMP:(0): processing ID payload. message ID = 0&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.035: ISAKMP (0): ID payload&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; next-payload : 13&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; type&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : 11&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;STRONG&gt;group id&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : cisco&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; protocol&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : 17&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; port&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; length&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : 13&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.035:&lt;STRONG&gt; ISAKMP:(0):: peer matches ISA_PRO profile&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.035: ISAKMP:(0):Setting client config settings 6407F30&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.035: ISAKMP:(0):(Re)Setting client xauth list&amp;nbsp; and state&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.035: ISAKMP/xauth: initializing AAA request&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.035: ISAKMP:(0): processing vendor id payload&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.035: ISAKMP:(0): vendor ID seems Unity/DPD but major 69 mismatch&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.035: ISAKMP (0): vendor ID is NAT-T RFC 3947&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.035: ISAKMP:(0): processing vendor id payload&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.035: ISAKMP:(0): vendor ID seems Unity/DPD but major 245 mismatch&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.035: ISAKMP (0): vendor ID is NAT-T v7&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.035: ISAKMP:(0): processing vendor id payload&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.035: ISAKMP:(0): vendor ID seems Unity/DPD but major 157 mismatch&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.035: ISAKMP:(0): vendor ID is NAT-T v3&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.035: ISAKMP:(0): processing vendor id payload&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.035: ISAKMP:(0): vendor ID seems Unity/DPD but major 123 mismatch&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.035: ISAKMP:(0): vendor ID is NAT-T v2&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.035: ISAKMP:(0): Authentication by xauth preshared&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.035: ISAKMP:(0):Checking ISAKMP transform 1 against priority 10 policy&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.035: ISAKMP:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; encryption AES-CBC&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.035: ISAKMP:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; keylength of 128&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.035: ISAKMP:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hash SHA&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.035: ISAKMP:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; default group 2&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.035: ISAKMP:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; auth XAUTHInitPreShared&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.035: ISAKMP:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; life type in seconds&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.035: ISAKMP:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; life duration (VPI) of&amp;nbsp; 0x0 0x20 0xC4 0x9B&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.035: ISAKMP:(0):atts are acceptable. Next payload is 3&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.035: ISAKMP:(0):Acceptable atts:actual life: 86400&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.035: ISAKMP:(0):Acceptable atts:life: 0&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.035: ISAKMP:(0):Fill atts in sa vpi_length:4&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.035: ISAKMP:(0):Fill atts in sa life_in_seconds:2147483&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.035: ISAKMP:(0):Returning Actual lifetime: 86400&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.035: ISAKMP:(0)::Started lifetime timer: 86400.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;H4&gt;Relevant configuration.&lt;/H4&gt;&lt;P&gt;ISAKMP being enabled on interface and at least one policy defined and matching what client sent.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;crypto isakmp policy 10&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;encr aes&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;authentication pre-share&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;group 2&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;crypto isakmp profile &lt;STRONG&gt;ISA_PRO&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp; match identity group &lt;STRONG&gt;cisco&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp; i&lt;STRONG&gt;sakmp authorization list AUTH&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;crypto isakmp client configuration group&lt;STRONG&gt; cisco&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;key cisco&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;H3&gt;4.1.2 Aggressive mode message 2 (AM2); sent from server to client.&lt;/H3&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Includes:&lt;/P&gt;&lt;P&gt;- capabilities&lt;/P&gt;&lt;P&gt;- DH exchange&lt;/P&gt;&lt;P&gt;- Identity&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.035: ISAKMP:(0): processing vendor id payload&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.035: ISAKMP:(0): vendor ID seems Unity/DPD but major 69 mismatch&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.035: ISAKMP (0):&lt;STRONG&gt; vendor ID is NAT-T RFC 3947&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.035: ISAKMP:(0): processing vendor id payload&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.035: ISAKMP:(0): vendor ID seems Unity/DPD but major 245 mismatch&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.035: ISAKMP (0): &lt;STRONG&gt;vendor ID is NAT-T v7&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.035: ISAKMP:(0): processing vendor id payload&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.035: ISAKMP:(0): vendor ID seems Unity/DPD but major 157 mismatch&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.035: ISAKMP:(0):&lt;STRONG&gt; vendor ID is NAT-T v3&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.035: ISAKMP:(0): processing vendor id payload&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.035: ISAKMP:(0): vendor ID seems Unity/DPD but major 123 mismatch&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.035: ISAKMP:(0): &lt;STRONG&gt;vendor ID is NAT-T v2&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.035: ISAKMP:(0): processing KE payload. message ID = 0&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.043: ISAKMP:(0): processing NONCE payload. message ID = 0&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.043: ISAKMP:(0): processing vendor id payload&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.043: ISAKMP:(0): &lt;STRONG&gt;vendor ID is DPD&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.043: ISAKMP:(0): processing vendor id payload&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.043: ISAKMP:(0): vendor ID seems Unity/DPD but major 33 mismatch&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.043: ISAKMP:(0): &lt;STRONG&gt;vendor ID is XAUTH&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.043: ISAKMP:(0): processing vendor id payload&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.043: ISAKMP:(0): &lt;STRONG&gt;claimed IOS but failed authentication&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.043: ISAKMP:(0): processing vendor id payload&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.043: ISAKMP:(0): &lt;STRONG&gt;vendor ID is Unity&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.043: ISAKMP:(0):Input = IKE_MESG_FROM_PEER, IKE_AM_EXCH&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.043: ISAKMP:(0):Old State = IKE_READY&amp;nbsp; New State = IKE_R_AM_AAA_AWAIT&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.063: ISAKMP:(1021): constructed NAT-T vendor-rfc3947 ID&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.063: ISAKMP:(1021):SA is doing pre-shared key authentication plus XAUTH using id type ID_IPV4_ADDR&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.063:&lt;STRONG&gt; ISAKMP (1021): ID payload&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; next-payload : 10&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; type&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : 1&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; address&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : 192.2.0.1&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; protocol&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; port&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; length&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : 12&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.063: ISAKMP:(1021):Total payload length: 12&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.063: ISAKMP:(1021): sending packet to 192.2.1.2 my_port 500 peer_port 500 (R) AG_INIT_EXCH&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.063: ISAKMP:(1021):Sending an IKE IPv4 Packet.&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.063: ISAKMP:(1021):Input = IKE_MESG_FROM_AAA, PRESHARED_KEY_REPLY&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.063: ISAKMP:(1021):Old State = IKE_R_AM_AAA_AWAIT&amp;nbsp; New State = IKE_R_AM2&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;H3&gt;4.1.3 Aggressive mode message 3 (AM3); Finish phase 1.&lt;/H3&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Contains:&lt;/P&gt;&lt;P&gt;- NAT discovery and decision.&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.091: ISAKMP (1021): received packet from 192.2.1.2 dport 500 sport 500 Global (R) AG_INIT_EXCH&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.091: ISAKMP:(1021): processing HASH payload. message ID = 0&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.091: ISAKMP:received payload type 20&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.091: ISAKMP (1021): His hash no match - this node outside NAT&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.091: ISAKMP:received payload type 20&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.091: ISAKMP (1021): &lt;STRONG&gt;No NAT Found for self or peer&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.091: ISAKMP:(1021): processing NOTIFY INITIAL_CONTACT protocol 1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; spi 0, message ID = 0, sa = 64487E8&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.091: ISAKMP:(1021):SA authentication status:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; authenticated&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.091: ISAKMP:(1021):SA has been authenticated with 192.2.1.2&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.091: ISAKMP:(1021):SA authentication status:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; authenticated&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.091: ISAKMP:(1021): Process initial contact,&lt;/P&gt;&lt;P&gt;bring down existing phase 1 and 2 SA's with local 192.2.0.1 remote 192.2.1.2 remote port 500&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.091: ISAKMP:(1021):returning IP addr to the address pool&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.091: ISAKMP: Trying to insert a peer 192.2.0.1/192.2.1.2/500/,&amp;nbsp; and inserted successfully 5BFDED8.&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.091: ISAKMP:(1021):Returning Actual lifetime: 86400&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.091: ISAKMP: set new node -110506246 to CONF_XAUTH&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.091: ISAKMP:(1021):Sending NOTIFY RESPONDER_LIFETIME protocol 1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; spi 95630072, message ID = -110506246&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.091: ISAKMP:(1021): sending packet to 192.2.1.2 my_port 500 peer_port 500 (R) QM_IDLE&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.091: ISAKMP:(1021):Sending an IKE IPv4 Packet.&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.091: ISAKMP:(1021):purging node -110506246&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.091: ISAKMP: Sending phase 1 responder lifetime 86400&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.091: ISAKMP:(1021):Input = IKE_MESG_FROM_PEER, IKE_AM_EXCH&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.091: ISAKMP:(1021):Old State = IKE_R_AM2&amp;nbsp; New State = IKE_P1_COMPLETE&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;H2&gt;4.2 Phase 1.5 - Xauth and Mode config.&lt;/H2&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;H3&gt;Xauth - eXtended AUTHentication. User authentication.&lt;/H3&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Authentication request sent from server to client.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.095: IPSEC(key_engine): got a queue event with 1 KMI message(s)&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;*Jun 17 07:33:19.095: ISAKMP:(1021):Need XAUTH&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.095: ISAKMP: set new node 212826605 to CONF_XAUTH&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;*Jun 17 07:33:19.095: ISAKMP/xauth: request attribute XAUTH_USER_NAME_V2&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;*Jun 17 07:33:19.095: ISAKMP/xauth: request attribute XAUTH_USER_PASSWORD_V2&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.095: ISAKMP:(1021): initiating peer config to 192.2.1.2. ID = 212826605&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.095: ISAKMP:(1021): sending packet to 192.2.1.2 my_port 500 peer_port 500 (R) CONF_XAUTH&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.095: ISAKMP:(1021):Sending an IKE IPv4 Packet.&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.095: ISAKMP:(1021):Input = IKE_MESG_INTERNAL, IKE_PHASE1_COMPLETE&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.095: ISAKMP:(1021):Old State = IKE_P1_COMPLETE&amp;nbsp; New State = IKE_XAUTH_REQ_SENT&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Authentication reply from client to server:&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.135: ISAKMP (1021): received packet from 192.2.1.2 dport 500 sport 500 Global (R) CONF_XAUTH&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.135: ISAKMP:(1021):processing transaction payload from 192.2.1.2. message ID = 212826605&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;*Jun 17 07:33:19.135: ISAKMP: Config payload REPLY&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;*Jun 17 07:33:19.135: ISAKMP/xauth: reply attribute XAUTH_USER_NAME_V2&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;*Jun 17 07:33:19.135: ISAKMP/xauth: reply attribute XAUTH_USER_PASSWORD_V2&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.135: ISAKMP:(1021):deleting node 212826605 error FALSE reason "Done with xauth request/reply exchange"&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.135: ISAKMP:(1021):Input = IKE_MESG_FROM_PEER, IKE_CFG_REPLY&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.135: ISAKMP:(1021):Old State = IKE_XAUTH_REQ_SENT&amp;nbsp; New State = IKE_XAUTH_AAA_CONT_LOGIN_AWAIT&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Server is checking xauth against AAA method specified.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.135: ISAKMP: set new node 1203692846 to CONF_XAUTH&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.135: ISAKMP:(1021): initiating peer config to 192.2.1.2. ID = 1203692846&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.135: ISAKMP:(1021): sending packet to 192.2.1.2 my_port 500 peer_port 500 (R) CONF_XAUTH&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.135: ISAKMP:(1021):Sending an IKE IPv4 Packet.&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.135: ISAKMP:(1021):Input = IKE_MESG_FROM_AAA, IKE_AAA_CONT_LOGIN&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.135: ISAKMP:(1021):Old State = IKE_XAUTH_AAA_CONT_LOGIN_AWAIT&amp;nbsp; New State = IKE_XAUTH_SET_SENT&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.139: ISAKMP (1021): received packet from 192.2.1.2 dport 500 sport 500 Global (R) CONF_XAUTH&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.139: ISAKMP:(1021):processing transaction payload from 192.2.1.2. message ID = 1203692846&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;*Jun 17 07:33:19.139: ISAKMP: Config payload ACK&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;*Jun 17 07:33:19.139: ISAKMP:(1021):&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; XAUTH ACK Processed&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.139: ISAKMP:(1021):deleting node 1203692846 error FALSE reason "Transaction mode done"&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.139: ISAKMP:(1021):Talking to a Unity Client&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.139: ISAKMP:(1021):Input = IKE_MESG_FROM_PEER, IKE_CFG_ACK&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.139: ISAKMP:(1021):Old State = IKE_XAUTH_SET_SENT&amp;nbsp; New State = IKE_P1_COMPLETE&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.139: ISAKMP:(1021):IKE_DPD is enabled, initializing timers&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.139: ISAKMP:(1021):Input = IKE_MESG_INTERNAL, IKE_PHASE1_COMPLETE&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.139: ISAKMP:(1021):Old State = IKE_P1_COMPLETE&amp;nbsp; New State = IKE_P1_COMPLETE&lt;/P&gt;&lt;H4&gt;Relevant configuration.&lt;/H4&gt;&lt;P&gt;crypto isakmp profile ISA_PRO&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp; client authentication list AUTH&lt;/STRONG&gt;&lt;/P&gt;&lt;H3&gt;Mode config - request and provide authentication attributes.&lt;/H3&gt;&lt;P&gt;Contains:&lt;/P&gt;&lt;P&gt;- Request for parameters to configure client.&lt;/P&gt;&lt;P&gt;- Reply - at least and IP address and mask in typical scenario.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What the client request, you will not that the client asks for IP address and if it's allowed to have the password saved.(Among other things).&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.139: ISAKMP (1021): received packet from 192.2.1.2 dport 500 sport 500 Global (R) QM_IDLE&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.139: ISAKMP: set new node 659439105 to QM_IDLE&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.139: ISAKMP:(1021):processing transaction payload from 192.2.1.2. message ID = 659439105&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.139: ISAKMP: Config payload REQUEST&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.139: ISAKMP:(1021):checking request:&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.139: ISAKMP:&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;STRONG&gt;IP4_ADDRESS&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.139: ISAKMP:&amp;nbsp;&amp;nbsp;&amp;nbsp; IP4_NETMASK&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.139: ISAKMP:&amp;nbsp;&amp;nbsp;&amp;nbsp; MODECFG_CONFIG_URL&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.139: ISAKMP:&amp;nbsp;&amp;nbsp;&amp;nbsp; MODECFG_CONFIG_VERSION&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.139: ISAKMP:&amp;nbsp;&amp;nbsp;&amp;nbsp; MODECFG_IPSEC_INT_CONF&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.139: ISAKMP:&amp;nbsp;&amp;nbsp;&amp;nbsp; IP4_DNS&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.139: ISAKMP:&amp;nbsp;&amp;nbsp;&amp;nbsp; IP4_DNS&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.139: ISAKMP:&amp;nbsp;&amp;nbsp;&amp;nbsp; IP4_NBNS&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.139: ISAKMP:&amp;nbsp;&amp;nbsp;&amp;nbsp; IP4_NBNS&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.139: ISAKMP:&amp;nbsp;&amp;nbsp;&amp;nbsp; SPLIT_INCLUDE&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.139: ISAKMP:&amp;nbsp;&amp;nbsp;&amp;nbsp; SPLIT_DNS&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.139: ISAKMP:&amp;nbsp;&amp;nbsp;&amp;nbsp; DEFAULT_DOMAIN&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.139: ISAKMP:&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;STRONG&gt;MODECFG_SAVEPWD&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.139: ISAKMP:&amp;nbsp;&amp;nbsp;&amp;nbsp; INCLUDE_LOCAL_LAN&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.139: ISAKMP:&amp;nbsp;&amp;nbsp;&amp;nbsp; PFS&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.139: ISAKMP:&amp;nbsp;&amp;nbsp;&amp;nbsp; BACKUP_SERVER&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.139: ISAKMP:&amp;nbsp;&amp;nbsp;&amp;nbsp; APPLICATION_VERSION&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.139: ISAKMP:&amp;nbsp;&amp;nbsp;&amp;nbsp; MODECFG_BANNER&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.139: ISAKMP:&amp;nbsp;&amp;nbsp;&amp;nbsp; MODECFG_HOSTNAME&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.139: ISAKMP/author: Author request for group ciscosuccessfully sent to AAA&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.139: ISAKMP:(1021):Input = IKE_MESG_FROM_PEER, IKE_CFG_REQUEST&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.139: ISAKMP:(1021):Old State = IKE_P1_COMPLETE&amp;nbsp; New State = IKE_CONFIG_AUTHOR_AAA_AWAIT&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Serer replies with:&lt;/P&gt;&lt;P&gt;- Here is your IP address - 10.1.1.100&lt;/P&gt;&lt;P&gt;- I am capable of doing VTI&lt;/P&gt;&lt;P&gt;- You can save passwords&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.139: IPSEC(key_engine): got a queue event with 1 KMI message(s)&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.143: %LINEPROTO-5-UPDOWN: Line protocol on Interface Virtual-Access3, changed state to down&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.143: ISAKMP:(1021):attributes sent in message:&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.143:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Address: 0.2.0.0&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;*Jun 17 07:33:19.147: ISAKMP:(1021):allocating address 10.1.1.100&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;*Jun 17 07:33:19.147: ISAKMP: Sending private address: 10.1.1.100&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.147: &lt;STRONG&gt;ISAKMP: Sending IPsec Interface Config reply value 1&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.147: &lt;STRONG&gt;ISAKMP: Sending save password reply value 1&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.147: ISAKMP: Sending APPLICATION_VERSION string: Cisco IOS Softwarea), Version 15.0(1)M5,&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Technical Support: &lt;/SPAN&gt;&lt;A href="http://www.cisco.com/techsupport" target="_blank"&gt;http://www.cisco.com/techsupport&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Copyright (c) 1986-2011 by Cisco Systems, Inc.&lt;/P&gt;&lt;P&gt;Compiled Thu 03-Mar-11 12:13 by prod_rel_team&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.147: ISAKMP (1021): Unknown Attr: MODECFG_HOSTNAME (0x700A)&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.147: ISAKMP:(1021): responding to peer config from 192.2.1.2. ID = 659439105&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.147: ISAKMP: Marking node 659439105 for late deletion&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.147: ISAKMP:(1021): sending packet to 192.2.1.2 my_port 500 peer_port 500 (R) CONF_ADDR&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.147: ISAKMP:(1021):Sending an IKE IPv4 Packet.&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.147: ISAKMP:(1021):Talking to a Unity Client&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.147: ISAKMP:(1021):Input = IKE_MESG_FROM_AAA, IKE_AAA_GROUP_ATTR&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.147: ISAKMP:(1021):Old State = IKE_CONFIG_AUTHOR_AAA_AWAIT&amp;nbsp; New State = IKE_P1_COMPLETE&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.147: ISAKMP:FSM error - Message from AAA grp/user.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;And phase 1.5 completes.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.147: ISAKMP:(1021):IKE_DPD is enabled, initializing timers&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.147: ISAKMP:(1021):Input = IKE_MESG_INTERNAL, IKE_PHASE1_COMPLETE&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.147: ISAKMP:(1021):Old State = IKE_P1_COMPLETE&amp;nbsp; New State = IKE_P1_COMPLETE&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.155: ISAKMP:(1021):IKE_DPD is enabled, initializing timers&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.155: ISAKMP:(1021):Input = IKE_MESG_INTERNAL, IKE_PHASE1_COMPLETE&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.155: ISAKMP:(1021):Old State = IKE_P1_COMPLETE&amp;nbsp; New State = IKE_P1_COMPLETE&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;H4&gt;Relevant configuration:&lt;/H4&gt;&lt;P&gt;crypto isakmp client configuration group cisco&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;pool PRIMARY&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;save-password&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;crypto isakmp profile ISA_PRO&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp; client configuration address respond&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp; virtual-template 1&lt;/STRONG&gt;&lt;/P&gt;&lt;H2&gt;4.3 Phase 2 - Quick mode.&lt;/H2&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;H3&gt;4.3.1 Quick mode message 1 (QM1)&lt;/H3&gt;&lt;P&gt;- phase two encryption algorithms (IPsec transform sets)&lt;/P&gt;&lt;P&gt;- tunnel type and encryption.&lt;/P&gt;&lt;P&gt;- proxy ID - "what I would like to put in the tunnel?"&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.179: ISAKMP (1021): received packet from 192.2.1.2 dport 500 sport 500 Global (R) QM_IDLE&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.179: ISAKMP: set new node 226234965 to QM_IDLE&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.179: ISAKMP:(1021): processing HASH payload. message ID = 226234965&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.179: ISAKMP:(1021): processing SA payload. message ID = 226234965&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.179: ISAKMP:(1021):Checking IPSec proposal 1&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.179: ISAKMP: transform 1,&lt;STRONG&gt; ESP_AES&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.179: ISAKMP:&amp;nbsp;&amp;nbsp; attributes in transform:&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.179: ISAKMP:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;STRONG&gt;encaps is 1 (Tunnel)&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.179: ISAKMP:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; SA life type in seconds&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.179: ISAKMP:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; SA life duration (VPI) of&amp;nbsp; 0x0 0x20 0xC4 0x9B&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.179: ISAKMP:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; SA life type in kilobytes&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.179: ISAKMP:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; SA life duration (VPI) of&amp;nbsp; 0x0 0x46 0x50 0x0&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.179: ISAKMP:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; authenticator is &lt;STRONG&gt;HMAC-SHA&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.179: ISAKMP:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; key length is 128&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;*Jun 17 07:33:19.179: ISAKMP:(1021):atts are acceptable.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.179: IPSEC(validate_proposal_request): proposal part #1&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.179: IPSEC(validate_proposal_request): proposal part #1,&lt;/P&gt;&lt;P&gt;&amp;nbsp; (key eng. msg.) INBOUND local= 192.2.0.1, remote= 192.2.1.2,&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; local_proxy= 0.0.0.0/0.0.0.0/0/0 (type=4),&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; remote_proxy= 10.1.1.100/255.255.255.255/0/0 (type=1),&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; protocol= ESP, transform= NONE&amp;nbsp; (Tunnel),&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; lifedur= 0s and 0kb,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; spi= 0x0(0), conn_id= 0, keysize= 128, flags= 0x0&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.179: insert of map into mapdb AVL failed, map + ace pair already exists on the mapdb&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.179: Crypto mapdb : proxy_match&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src addr&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : 0.0.0.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst addr&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : 10.1.1.100&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; protocol&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src port&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst port&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : 0&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.179: ISAKMP:(1021): processing NONCE payload. message ID = 226234965&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.179: ISAKMP:(1021): processing ID payload. message ID = 226234965&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.179: ISAKMP:(1021): processing ID payload. message ID = 226234965&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.179: ISAKMP:(1021):QM Responder gets spi&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.179: ISAKMP:(1021):Node 226234965, Input = IKE_MESG_FROM_PEER, IKE_QM_EXCH&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.179: ISAKMP:(1021):Old State = IKE_QM_READY&amp;nbsp; New State = IKE_QM_SPI_STARVE&lt;/P&gt;&lt;H4&gt;Relevant config&lt;/H4&gt;&lt;P&gt;crypto ipsec transform-set TRA &lt;STRONG&gt;esp-aes esp-sha-hmac&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;crypto ipsec profile PRO&lt;/P&gt;&lt;P&gt;set transform-set &lt;STRONG&gt;TRA&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;interface Virtual-Template1 type tunnel&lt;/P&gt;&lt;P&gt;tunnel protection ipsec profile &lt;STRONG&gt;PRO&lt;/STRONG&gt;&lt;/P&gt;&lt;H3&gt;4.3.2 Quick mode message 2 (QM2) - sever's reply and creation of SAs.&lt;/H3&gt;&lt;P&gt;*Jun 17 07:33:19.179: ISAKMP:(1021):deleting node 659439105 error FALSE reason "No Error"&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.179: ISAKMP:(1021): Creating IPSec SAs&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.179:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; inbound SA from 192.2.1.2 to 192.2.0.1 (f/i)&amp;nbsp; 0/ 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; (proxy 10.1.1.100 to 0.0.0.0)&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.179:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; has spi 0x1E448340 and conn_id 0&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.179:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; lifetime of 2147483 seconds&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.179:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; lifetime of 4608000 kilobytes&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.179:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; outbound SA from 192.2.0.1 to 192.2.1.2 (f/i) 0/0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; (proxy 0.0.0.0 to 10.1.1.100)&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.179:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; has spi&amp;nbsp; 0x3D7E4D33 and conn_id 0&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.179:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; lifetime of 2147483 seconds&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.179:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; lifetime of 4608000 kilobytes&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.179: ISAKMP:(1021): sending packet to 192.2.1.2 my_port 500 peer_port 500 (R) QM_IDLE&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.179: ISAKMP:(1021):Sending an IKE IPv4 Packet.&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.179: ISAKMP:(1021):Node 226234965, Input = IKE_MESG_INTERNAL, IKE_GOT_SPI&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.179: ISAKMP:(1021):Old State = IKE_QM_SPI_STARVE&amp;nbsp; New State = IKE_QM_R_QM2&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.179: IPSEC(key_engine): got a queue event with 1 KMI message(s)&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.179: Crypto mapdb : proxy_match&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src addr&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : 0.0.0.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst addr&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : 10.1.1.100&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; protocol&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src port&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst port&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : 0&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.179: IPSEC(crypto_ipsec_sa_find_ident_head): reconnecting with the same proxies and peer 192.2.1.2&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.179: IPSEC(rte_mgr): VPN Route Event Peer has changed but same proxies for peer 192.2.1.2&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.179: IPSEC(rte_mgr): VPN Route Event create SA based on crypto ACL in real time for 192.2.1.2&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.179: IPSEC(rte_mgr): VPN Route Refcount 1 Virtual-Access3&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.179: IPSEC(rte_mgr): VPN Route Added 10.1.1.100 255.255.255.255 via Virtual-Access3 in IP DEFAULT TABLE with tag 0 distance1&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.179: IPSEC(policy_db_add_ident): src 0.0.0.0, dest 10.1.1.100, dest_port 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.179: IPSEC(create_sa): sa created,&lt;/P&gt;&lt;P&gt;&amp;nbsp; (sa) sa_dest= 192.2.0.1, sa_proto= 50,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;STRONG&gt;sa_spi= 0x1E448340(507806528),&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; sa_trans= esp-aes esp-sha-hmac , sa_conn_id= 73&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; sa_lifetime(k/sec)= (4444443/3600)&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.179: IPSEC(create_sa): sa created,&lt;/P&gt;&lt;P&gt;&amp;nbsp; (sa) sa_dest= 192.2.1.2, sa_proto= 50,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; &lt;STRONG&gt;sa_spi= 0x3D7E4D33(1031687475),&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; sa_trans= esp-aes esp-sha-hmac , sa_conn_id= 74&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; sa_lifetime(k/sec)= (4444443/3600)&lt;/P&gt;&lt;H3&gt;4.3.3 Quick mode message 3 (QM3) - Finishing.&lt;/H3&gt;&lt;P&gt;*Jun 17 07:33:19.195: ISAKMP (1021): received packet from 192.2.1.2 dport 500 sport 500 Global (R) QM_IDLE&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.195: ISAKMP:(1021):deleting node 226234965 error FALSE reason "QM done (await)"&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.195: ISAKMP:(1021):Node 226234965, Input = IKE_MESG_FROM_PEER, IKE_QM_EXCH&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.195: ISAKMP:(1021):Old State = IKE_QM_R_QM2&amp;nbsp; New State = &lt;STRONG&gt;IKE_QM_PHASE2_COMPLETE&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.195: IPSEC(key_engine): got a queue event with 1 KMI message(s)&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.195: IPSEC(key_engine_enable_outbound): rec'd enable notify from ISAKMP&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.195: IPSEC(key_engine_enable_outbound): enable SA with spi 1031687475/50&lt;/P&gt;&lt;P&gt;DVTI_Server#&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.195: IPSEC(update_current_outbound_sa): updated peer 192.2.1.2 current outbound sa to SPI 3D7E4D33&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.771: ISAKMP (1021): received packet from 192.2.1.2 dport 500 sport 500 Global (R) QM_IDLE&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.771: ISAKMP: set new node -472138210 to QM_IDLE&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.771: ISAKMP:(1021): processing HASH payload. message ID = -472138210&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.771: ISAKMP:(1021): processing NOTIFY CLIENT_UPDATE protocol 1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; spi 0, message ID = -472138210, sa = 64487E8&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.771: ISAKMP:(0):Attribute type CLIENT_HOSTNAME, length = 13&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.771: ISAKMP:(0):Attribute type CLIENT_PLATFORM_NAME, length = 12&lt;/P&gt;&lt;P&gt;DVTI_Server#&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.771: ISAKMP:(0):Attribute type CLIENT_HARDWARE_SERIAL, length = 6&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.771: ISAKMP:(0):Attribute type CLIENT_MEMORY_SIZE, length = 8&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.771: ISAKMP:(0):Attribute type CLIENT_AVAILABLE_MEMORY, length = 8&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.771: ISAKMP:(0):Attribute type CLIENT_IMAGE_VERSION, length = 42&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.771: ISAKMP:(1021):deleting node -472138210 error FALSE reason "Informational (in) state 1"&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.771: ISAKMP:(1021):Input = IKE_MESG_FROM_PEER, IKE_INFO_NOTIFY&lt;/P&gt;&lt;P&gt;*Jun 17 07:33:19.771: ISAKMP:(1021):Old State = IKE_P1_COMPLETE&amp;nbsp; New State = IKE_P1_COMPLETE&lt;/P&gt;&lt;H1&gt;5. Verification of tunnel.&lt;/H1&gt;&lt;P&gt;Let's have a look at established tunnel.&lt;/P&gt;&lt;H2&gt;5.1 ISAKMP&lt;/H2&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Let's understand if phase 1 is up and running.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Command:&lt;/P&gt;&lt;BLOCKQUOTE&gt;sh cry isa sa det&lt;/BLOCKQUOTE&gt;&lt;P&gt;Output:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;DVTI_Server#show crypto isa sa det&lt;/P&gt;&lt;PRE&gt;(...)&lt;/PRE&gt;&lt;P&gt;C-id&amp;nbsp; Local&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Remote&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; I-VRF&amp;nbsp;&amp;nbsp;&amp;nbsp; Status Encr Hash Auth DH Lifetime Cap.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;1021 &lt;STRONG&gt;192.2.0.1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.2.1.2&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ACTIVE aes&amp;nbsp; sha&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 2&amp;nbsp; 23:18:02&lt;/STRONG&gt; CDX&lt;/P&gt;&lt;H2&gt;5.2 IPSec&lt;/H2&gt;&lt;P&gt;Let's check if the device is ready to encrypt traffic (i.e. if both inbound and outbound SPIs are present).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Command:&lt;/P&gt;&lt;PRE&gt;show crypto ipsec sa peer 192.2.1.2&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Output:&lt;/P&gt;&lt;P&gt;(Some output omitted)&lt;/P&gt;&lt;P&gt;interface: Virtual-Access3&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Crypto map tag: Virtual-Access3-head-0, local addr 192.2.0.1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; protected vrf: (none)&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp; local&amp;nbsp; ident (addr/mask/prot/port): (0.0.0.0/0.0.0.0/0/0)&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp; remote ident (addr/mask/prot/port): (10.1.1.100/255.255.255.255/0/0)&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp; current_peer 192.2.1.2 port 500&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; PERMIT, flags={origin_is_acl,}&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; #pkts encaps: 0, #pkts encrypt: 0, #pkts digest: 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; #pkts decaps: 0, #pkts decrypt: 0, #pkts verify: 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; #pkts compressed: 0, #pkts decompressed: 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; #pkts not compressed: 0, #pkts compr. failed: 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; #pkts not decompressed: 0, #pkts decompress failed: 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; #send errors 0, #recv errors 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;STRONG&gt;local crypto endpt.: 192.2.0.1, remote crypto endpt.: 192.2.1.2&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; path mtu 1500, ip mtu 1500, ip mtu idb Ethernet0/0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; current outbound spi: 0x3D7E4D33(1031687475)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; PFS (Y/N): N, DH group: none&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; inbound esp sas:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;STRONG&gt;spi: 0x1E448340(507806528)&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; transform: esp-aes esp-sha-hmac ,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; in use settings ={Tunnel, }&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; conn id: 73, flow_id: SW:73, sibling_flags 80000046, crypto map: &lt;STRONG&gt;Virtual-Access3-head-0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; sa timing: remaining key lifetime (k/sec): (4444443/969)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; IV size: 16 bytes&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; replay detection support: Y&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Status: ACTIVE&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; outbound esp sas:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;STRONG&gt;spi: 0x3D7E4D33(1031687475)&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; transform: esp-aes esp-sha-hmac ,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; in use settings ={Tunnel, }&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; conn id: 74, flow_id: SW:74, sibling_flags 80000046, crypto map: &lt;STRONG&gt;Virtual-Access3-head-0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; sa timing: remaining key lifetime (k/sec): (4444443/969)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; IV size: 16 bytes&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; replay detection support: Y&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Status: ACTIVE&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;H1&gt;6. Further reading&lt;/H1&gt;&lt;P&gt;A good place to start is wikipedia article on IPSec.&lt;/P&gt;&lt;P&gt;Standard and references contains a lot of useful information:&lt;/P&gt;&lt;P&gt;&lt;A href="http://en.wikipedia.org/wiki/IPsec" target="_blank"&gt;http://en.wikipedia.org/wiki/IPsec&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Understanding main mode debugs on ASA:&lt;/P&gt;&lt;P&gt;&lt;A href="https://community.cisco.com/document/53656/understanding-asa-ipsec-and-ike-debugs-ikev1-main-mode" target="_blank"&gt;https://supportforums.cisco.com/docs/DOC-14044&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Understanding aggresive mode debug on ASA:&lt;/P&gt;&lt;P&gt;&lt;A href="https://community.cisco.com/document/52636/understanding-asa-ipsec-and-ike-debugs-ikev1-aggressive-mode" target="_blank"&gt;https://supportforums.cisco.com/docs/DOC-13715&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;H1&gt;7. Comments? feedback?&lt;/H1&gt;&lt;P&gt;Leave a comment to this document.&lt;/P&gt;</description>
      <pubDate>Tue, 29 Aug 2017 09:38:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/security-knowledge-base/understanding-ios-ipsec-and-ike-debugs-ikev1-aggressive-mode/ta-p/3123083</guid>
      <dc:creator>Marcin Latosiewicz</dc:creator>
      <dc:date>2017-08-29T09:38:43Z</dc:date>
    </item>
    <item>
      <title>Re: Understanding IOS IPSec and IKE debugs - IKEv1 Aggressive Mode.</title>
      <link>https://community.cisco.com/t5/security-knowledge-base/understanding-ios-ipsec-and-ike-debugs-ikev1-aggressive-mode/tac-p/3123084#M1902</link>
      <description>&lt;P&gt;appreciate for the work！&lt;/P&gt;</description>
      <pubDate>Mon, 20 Jun 2011 13:23:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/security-knowledge-base/understanding-ios-ipsec-and-ike-debugs-ikev1-aggressive-mode/tac-p/3123084#M1902</guid>
      <dc:creator>wuhao_xiaotong</dc:creator>
      <dc:date>2011-06-20T13:23:37Z</dc:date>
    </item>
  </channel>
</rss>

