<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Try adding these commands in VPN</title>
    <link>https://community.cisco.com/t5/vpn/cisco-asa-5515-mikrotik-site-to-site-ipsec-vpn/m-p/2824550#M106972</link>
    <description>&lt;P&gt;Try adding these commands along with previously mentioned debug commands:&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;logging on
logging enable
logging monitor 7
logging buffered 7
logging buffer-size 1048576&lt;/PRE&gt;
&lt;P&gt;Regards,&lt;BR /&gt;Dinesh Moudgil&lt;/P&gt;
&lt;P&gt;P.S. Please rate helpful posts.&lt;/P&gt;</description>
    <pubDate>Thu, 12 Nov 2015 09:20:00 GMT</pubDate>
    <dc:creator>Dinesh Moudgil</dc:creator>
    <dc:date>2015-11-12T09:20:00Z</dc:date>
    <item>
      <title>Cisco ASA 5515 + Mikrotik Site-to-Site IPsec VPN</title>
      <link>https://community.cisco.com/t5/vpn/cisco-asa-5515-mikrotik-site-to-site-ipsec-vpn/m-p/2824545#M106967</link>
      <description>&lt;P&gt;Good day. I have problem in installing IPsec VPN between Cisco ASA-5515 and mikrotik 951. I want to use ikev1 only.&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Here it is my network:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;LAN 10.7.0.1/24 --&amp;gt; Mikrotik &amp;lt;-- WAN 2.2.2.2 &amp;lt;--INTERNET--&amp;gt; WAN 1.1.1.1&lt;SPAN&gt;&amp;nbsp;--&amp;gt; Cisco&amp;nbsp;&amp;lt;-- LAN 10.6.0.254/24&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;Config of Mikrotik router:&lt;BR /&gt;&lt;SPAN&gt;[admin@Brest-R] &amp;gt; ip ipsec peer print&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Flags: X - disabled, D - dynamic&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;address=1.1.1.1/32 local-address=2.2.2.2 passive=no port=500 auth-method=pre-shared-key secret="test" generate-policy=no policy-template-group=default exchange-mode=main send-initial-contact=yes nat-traversal=no proposal-check=obey hash-algorithm=sha1 enc-algorithm=3des dh-group=modp1024 lifetime=1d lifebytes=0 dpd-interval=2m dpd-maximum-failures=2&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;[admin@Brest-R] &amp;gt;ipsec policy print&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Flags: T - template, X - disabled, D - dynamic, I - inactive, * - default&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src-address=10.7.0.0/24 src-port=any dst-address=10.6.0.0/24 dst-port=any protocol=all action=encrypt level=require ipsec-protocols=esp tunnel=yes sa-src-address=2.2.2.2 sa-dst-address=1.1.1.1 proposal=test priority=0&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;[admin@Brest-R] &amp;gt; ip ipsec proposal print&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Flags: X - disabled, * - default&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;name="test" auth-algorithms=md5,sha1,sha512 enc-algorithms=3des,aes-256-cbc lifetime=30m pfs-group=none&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;I see that phase 1 is ok:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;[admin@Brest-R] &amp;gt; ip ipsec remote-peers print&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;0 local-address=2.2.2.2 remote-address=1.1.1.1 state=established side=initiator established=18h11m6s&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;But if I will try ping from mikrotik to cisco asa lan interface - I see next:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;[admin@Brest-R] &amp;gt; ping 10.6.0.254 src-address=10.7.0.1&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;SEQ HOST&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; SIZE TTL TIME&amp;nbsp;&amp;nbsp;STATUS&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;0 10.6.0.254&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;timeout&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;sent=5 received=0 packet-loss=100%&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;echo: ipsec,debug new acquire 2.2.2.2 [0]&amp;lt;=&amp;gt;1.1.1.1[0]&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;echo: ipsec,debug suitable outbound SP found: 10.7.0.0/24[0] 10.6.0.0/24[0] proto=any dir=out&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;echo: ipsec,debug suitable inbound SP found: 10.6.0.0/24[0] 10.7.0.0/24[0] proto=any dir=in&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;echo: ipsec,debug no configuration found for 1.1.1.1.&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;echo: ipsec,error failed to begin ipsec sa negotiation.&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Config of Cisco ASA you can see below:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;interface GigabitEthernet0/1&lt;BR /&gt; description&amp;nbsp;blablabla&lt;BR /&gt; nameif WAN&lt;BR /&gt; security-level 0&lt;BR /&gt; ip address 1.1.1.1&amp;nbsp;255.255.255.224&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;interface GigabitEthernet0/2&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;nameif TEST&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;security-level 100&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;ip address 10.6.0.254 255.255.255.0&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;crypto map WAN_map 1 match address WAN_cryptomap&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;crypto map WAN_map 1 set peer 2.2.2.2&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;crypto map WAN_map 1 set ikev1 transform-set ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA ESP-3DES-MD5&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;crypto map WAN_map 1 set security-association lifetime seconds 86400&lt;BR /&gt;&lt;SPAN&gt;crypto map WAN_map 1 set nat-t-disable&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;crypto map WAN_map 1 set reverse-route&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;crypto map WAN_map interface WAN&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;crypto ikev1 enable WAN&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;access-list WAN_cryptomap line 1 extended permit ip 10.6.0.0 255.255.255.0 10.7.0.0 255.255.255.0 (hitcnt=3) 0xf48c7385&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;nat (LAN,WAN) source dynamic any interface&lt;BR /&gt;nat (TEST,WAN) source static NETWORK_OBJ_10.6.0.0_24 NETWORK_OBJ_10.6.0.0_24 destination static NETWORK_OBJ_10.7.0.0_24 NETWORK_OBJ_10.7.0.0_24 no-proxy-arp route-lookup&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;ASA# show crypto ikev1 sa&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;IKEv1 SAs:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp; Active SA: 1&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;Rekey SA: 0 (A tunnel will report 1 Active and 1 Rekey SA during rekey)&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Total IKE SA: 1&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;1&amp;nbsp;&amp;nbsp; IKE Peer: 2.2.2.2&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;Type&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;: L2L&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Role&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;: responder&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;Rekey&amp;nbsp;&amp;nbsp; : no&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;State&amp;nbsp;&amp;nbsp; : MM_ACTIVE&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;ASA# show crypto isakmp sa detail&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;IKEv1 SAs:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp; Active SA: 1&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;Rekey SA: 0 (A tunnel will report 1 Active and 1 Rekey SA during rekey)&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Total IKE SA: 1&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;1&amp;nbsp;&amp;nbsp; IKE Peer: 2.2.2.2&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;Type&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;: L2L&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Role&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;: responder&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;Rekey&amp;nbsp;&amp;nbsp; : no&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;State&amp;nbsp;&amp;nbsp; : MM_ACTIVE&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;Encrypt : 3des&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;Hash&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;: SHA&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;Auth&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;: preshared&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Lifetime: 86400&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;Lifetime Remaining: 19844&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;ASA# show crypto isakmp&lt;/P&gt;
&lt;P&gt;IKEv1 SAs:&lt;/P&gt;
&lt;P&gt;Active SA: 1&lt;BR /&gt; Rekey SA: 0 (A tunnel will report 1 Active and 1 Rekey SA during rekey)&lt;BR /&gt;Total IKE SA: 1&lt;/P&gt;
&lt;P&gt;1 IKE Peer: 86.57.168.157&lt;BR /&gt; Type : L2L Role : responder&lt;BR /&gt; Rekey : no State : MM_ACTIVE&lt;/P&gt;
&lt;P&gt;There are no IKEv2 SAs&lt;/P&gt;
&lt;P&gt;ASA# show crypto ipsec sa&lt;/P&gt;
&lt;P&gt;There are no ipsec sas&lt;/P&gt;
&lt;P&gt;As I see, problem in second phase of IKEv1. It doesn't want to set up.&lt;/P&gt;</description>
      <pubDate>Sat, 22 Feb 2020 04:33:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/vpn/cisco-asa-5515-mikrotik-site-to-site-ipsec-vpn/m-p/2824545#M106967</guid>
      <dc:creator>falangerr</dc:creator>
      <dc:date>2020-02-22T04:33:16Z</dc:date>
    </item>
    <item>
      <title>Hi falangerr,</title>
      <link>https://community.cisco.com/t5/vpn/cisco-asa-5515-mikrotik-site-to-site-ipsec-vpn/m-p/2824546#M106968</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;A href="https://supportforums.cisco.com/users/falangerr" title="View user profile." class="username" lang="" about="/users/falangerr" typeof="sioc:UserAccount" property="foaf:name" datatype=""&gt;falangerr&lt;/A&gt;,&lt;/P&gt;
&lt;P&gt;The error&amp;nbsp;&lt;/P&gt;
&lt;P&gt;"&lt;SPAN&gt;echo: ipsec,debug no configuration found for 1.1.1.1.&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;echo: ipsec,error failed to begin ipsec sa negotiation.&lt;/SPAN&gt;"&lt;/P&gt;
&lt;P&gt;states that you do not have configuration for remote ASA peer 1.1.1.1. Can you verify the configuraiton on Mikrotik device?&lt;/P&gt;
&lt;P&gt;Once done, please share the output of the following debug commands:&lt;BR /&gt;debug crypto condition peer&amp;nbsp;&lt;BR /&gt;debug crypto ipsec 255&lt;BR /&gt;&lt;BR /&gt;Regards,&lt;BR /&gt;Dinesh Moudgil&lt;BR /&gt;&lt;BR /&gt;P.S. Please rate helpful posts.&lt;/P&gt;</description>
      <pubDate>Thu, 12 Nov 2015 08:49:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/vpn/cisco-asa-5515-mikrotik-site-to-site-ipsec-vpn/m-p/2824546#M106968</guid>
      <dc:creator>Dinesh Moudgil</dc:creator>
      <dc:date>2015-11-12T08:49:15Z</dc:date>
    </item>
    <item>
      <title>This Mikrotik have IPsec</title>
      <link>https://community.cisco.com/t5/vpn/cisco-asa-5515-mikrotik-site-to-site-ipsec-vpn/m-p/2824547#M106969</link>
      <description>&lt;P&gt;This Mikrotik have IPsec tunnel with other Mikrotik, and it is work fine. Config in generall for tunnel between two Mikrotik routers is similar.&lt;/P&gt;
&lt;P&gt;I entered two commands as you asked:&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;debug crypto condition peer&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;debug crypto ipsec 255&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;And nothing appear. I see clear console.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Here it is all&amp;nbsp;config of my Mikrotik router at this moment:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 12.0pt; line-height: 115%; font-family: 'Arial','sans-serif'; color: #333333;"&gt;[admin@Brest-R] &amp;gt;&amp;gt; ip ipsec peer print&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 12.0pt; line-height: 115%; font-family: 'Arial','sans-serif'; color: #333333;"&gt;Flags: X - disabled, D - dynamic&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 12.0pt; line-height: 115%; font-family: 'Arial','sans-serif'; color: #333333;"&gt;&amp;nbsp;0&amp;nbsp;&amp;nbsp;&amp;nbsp; address=1.1.1.1/32 local-address=2.2.2.2 passive=no port=500 auth-method=pre-shared-key secret="test" generate-policy=no policy-template-group=group1 exchange-mode=main send-initial-contact=yes nat-traversal=no proposal-check=obey hash-algorithm=sha1 enc-algorithm=3des,aes-128,aes-192,aes-256 dh-group=modp1024 lifetime=1d lifebytes=0 dpd-interval=2m dpd-maximum-failures=2&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 12.0pt; line-height: 115%; font-family: 'Arial','sans-serif'; color: #333333;"&gt;&amp;nbsp;[admin@Brest-R] &amp;gt;&amp;gt; ip ipsec policy print&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 12.0pt; line-height: 115%; font-family: 'Arial','sans-serif'; color: #333333;"&gt;Flags: T - template, X - disabled, D - dynamic, I - inactive, * - default&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 12.0pt; line-height: 115%; font-family: 'Arial','sans-serif'; color: #333333;"&gt;&amp;nbsp;2&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src-address=10.7.0.0/24 src-port=any dst-address=10.6.0.0/24 dst-port=any protocol=all action=encrypt level=require ipsec-protocols=esp tunnel=yes sa-src-address=86.57.168.157 sa-dst-address=213.184.230.160 proposal=test priority=0&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 12.0pt; line-height: 115%; font-family: 'Arial','sans-serif'; color: #333333;"&gt;[admin@Brest-R] &amp;gt;&amp;gt; ip ipsec proposal print&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 12.0pt; line-height: 115%; font-family: 'Arial','sans-serif'; color: #333333;"&gt;Flags: X - disabled, * - default&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 12.0pt; line-height: 115%; font-family: 'Arial','sans-serif'; color: #333333;"&gt;&amp;nbsp;1&amp;nbsp;&amp;nbsp;&amp;nbsp; name="test" auth-algorithms=md5,sha1,sha512 enc-algorithms=3des,aes-256-cbc lifetime=1d pfs-group=none&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;[admin@Brest-R] &amp;gt;&amp;gt; ip firewall nat print&lt;/P&gt;
&lt;P&gt;Flags: X - disabled, I - invalid, D - dynamic&lt;/P&gt;
&lt;P&gt;&amp;nbsp;0&amp;nbsp;&amp;nbsp;&amp;nbsp; chain=srcnat action=accept src-address=10.7.0.0/24 dst-address=10.8.0.0/24 log=no log-prefix=""&lt;/P&gt;
&lt;UL&gt;
&lt;LI style="margin-left: 20.25pt; text-indent: -18.0pt;"&gt;&lt;SPAN style="font: 7.0pt 'Times New Roman';"&gt; &lt;/SPAN&gt;chain=srcnat action=accept src-address=10.7.0.0/24 dst-address=10.6.0.0/24 log=no log-prefix=""&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;[admin@Brest-R] &amp;gt;&amp;gt; ip firewall filter print&lt;/P&gt;
&lt;P&gt;Flags: X - disabled, I - invalid, D - dynamic&lt;/P&gt;
&lt;P&gt;&amp;nbsp;0&amp;nbsp;&amp;nbsp;&amp;nbsp; ;;; Allow ICMP&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; chain=input action=accept protocol=icmp log=no log-prefix=""&lt;/P&gt;
&lt;P&gt;&amp;nbsp;1&amp;nbsp;&amp;nbsp;&amp;nbsp; ;;; Allow related and established connections&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; chain=input action=accept connection-state=established,related log=no log-prefix=""&lt;/P&gt;
&lt;P&gt;&amp;nbsp;2&amp;nbsp;&amp;nbsp;&amp;nbsp; ;;; Forward established and related connections&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; chain=forward action=accept connection-state=established,related log=no log-prefix=""&lt;/P&gt;
&lt;P&gt;&amp;nbsp;3&amp;nbsp;&amp;nbsp;&amp;nbsp; chain=input action=accept src-address=10.8.0.0/24 in-interface=Byfly-PPPoE log=no log-prefix=""&lt;/P&gt;
&lt;P&gt;&amp;nbsp;4&amp;nbsp;&amp;nbsp;&amp;nbsp; chain=input action=accept src-address=10.6.0.0/24 in-interface=Byfly-PPPoE log=no log-prefix=""&lt;/P&gt;
&lt;P&gt;&amp;nbsp;5&amp;nbsp;&amp;nbsp;&amp;nbsp; ;;; Allow IKE&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; chain=input action=accept protocol=udp dst-port=500 log=no log-prefix=""&lt;/P&gt;
&lt;P&gt;&amp;nbsp;6&amp;nbsp;&amp;nbsp;&amp;nbsp; ;;; Allow IPSec-esp&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; chain=input action=accept protocol=ipsec-esp log=no log-prefix=""&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 12 Nov 2015 09:11:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/vpn/cisco-asa-5515-mikrotik-site-to-site-ipsec-vpn/m-p/2824547#M106969</guid>
      <dc:creator>falangerr</dc:creator>
      <dc:date>2015-11-12T09:11:32Z</dc:date>
    </item>
    <item>
      <title>You will need to enter the</title>
      <link>https://community.cisco.com/t5/vpn/cisco-asa-5515-mikrotik-site-to-site-ipsec-vpn/m-p/2824548#M106970</link>
      <description>&lt;P&gt;You will need to enter the peer IP as well.&lt;BR /&gt;&lt;BR /&gt;e.g.&amp;nbsp;&lt;BR /&gt;&lt;SPAN&gt;debug crypto condition peer &amp;nbsp;x.x.x.x (mikrotik's device public&amp;nbsp;IP)&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;debug crypto ipsec 255&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Moreover, the error is indicating issue on Mikrotik device's configuration for ASA.&lt;BR /&gt;The fact that other VPN tunnels are working fine on Mikrotik does not confirm that the device is configured correctly to negotiate phase 2 with ASA although the debugs from ASA can confirm this thing.&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;Regards,&lt;BR /&gt;Dinesh Moudgil&lt;/P&gt;
&lt;P&gt;P.S. Please rate helpful posts.&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 12 Nov 2015 09:11:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/vpn/cisco-asa-5515-mikrotik-site-to-site-ipsec-vpn/m-p/2824548#M106970</guid>
      <dc:creator>Dinesh Moudgil</dc:creator>
      <dc:date>2015-11-12T09:11:33Z</dc:date>
    </item>
    <item>
      <title>I entered command with global</title>
      <link>https://community.cisco.com/t5/vpn/cisco-asa-5515-mikrotik-site-to-site-ipsec-vpn/m-p/2824549#M106971</link>
      <description>&lt;P&gt;I entered command with global IP of my Mikrotik router, I understand it. But I doesn't see any debug messages in console.&lt;/P&gt;
&lt;P&gt;Maybe problem in that my Mikrotik router work with specific encryption or hach algorithm not so good.&lt;/P&gt;</description>
      <pubDate>Thu, 12 Nov 2015 09:17:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/vpn/cisco-asa-5515-mikrotik-site-to-site-ipsec-vpn/m-p/2824549#M106971</guid>
      <dc:creator>falangerr</dc:creator>
      <dc:date>2015-11-12T09:17:05Z</dc:date>
    </item>
    <item>
      <title>Try adding these commands</title>
      <link>https://community.cisco.com/t5/vpn/cisco-asa-5515-mikrotik-site-to-site-ipsec-vpn/m-p/2824550#M106972</link>
      <description>&lt;P&gt;Try adding these commands along with previously mentioned debug commands:&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;logging on
logging enable
logging monitor 7
logging buffered 7
logging buffer-size 1048576&lt;/PRE&gt;
&lt;P&gt;Regards,&lt;BR /&gt;Dinesh Moudgil&lt;/P&gt;
&lt;P&gt;P.S. Please rate helpful posts.&lt;/P&gt;</description>
      <pubDate>Thu, 12 Nov 2015 09:20:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/vpn/cisco-asa-5515-mikrotik-site-to-site-ipsec-vpn/m-p/2824550#M106972</guid>
      <dc:creator>Dinesh Moudgil</dc:creator>
      <dc:date>2015-11-12T09:20:00Z</dc:date>
    </item>
    <item>
      <title>User Access Verification</title>
      <link>https://community.cisco.com/t5/vpn/cisco-asa-5515-mikrotik-site-to-site-ipsec-vpn/m-p/2824551#M106973</link>
      <description>&lt;P&gt;User Access Verification&lt;/P&gt;
&lt;P&gt;Username:&amp;nbsp;xxxxxx&lt;BR /&gt;Password: **********&lt;BR /&gt;Type help or '?' for a list of available commands.&lt;BR /&gt;ASA&amp;gt; en&lt;BR /&gt;Password: **********&lt;BR /&gt;ASA# conf t&lt;BR /&gt;ASA(config)# logg&lt;BR /&gt;ASA(config)# logging on&lt;BR /&gt;ASA(config)# logg&lt;BR /&gt;ASA(config)# logging enab&lt;BR /&gt;ASA(config)# logg&lt;BR /&gt;ASA(config)# logging monitor 7&lt;BR /&gt;ASA(config)# logging buffered 7&lt;BR /&gt;ASA(config)# logging buffer-size 1048576&lt;BR /&gt;ASA(config)# debug crypto condition peer&amp;nbsp;2.2.2.2&lt;BR /&gt;ASA(config)# debug crypto ipsec 255&lt;/P&gt;
&lt;P&gt;ASA(config)# show debug&lt;BR /&gt;debug crypto ipsec enabled at level 255&lt;/P&gt;
&lt;P&gt;Crypto conditional debug is turned ON&lt;/P&gt;
&lt;P&gt;IKE peer IP address filters:&lt;BR /&gt;2.2.2.2/32&lt;/P&gt;
&lt;P&gt;ASA(config)#&lt;/P&gt;
&lt;P&gt;And nothing happened. Ofcourse during this I tried to drop tunnel and get it up again.&lt;/P&gt;
&lt;P&gt;In ASDM I can see only this:&lt;/P&gt;
&lt;TABLE&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD&gt;5&lt;/TD&gt;
&lt;TD&gt;Nov 12 2015&lt;/TD&gt;
&lt;TD&gt;12:35:37&lt;/TD&gt;
&lt;TD&gt;&lt;/TD&gt;
&lt;TD&gt;&lt;/TD&gt;
&lt;TD&gt;&lt;/TD&gt;
&lt;TD&gt;&lt;/TD&gt;
&lt;TD&gt;&lt;/TD&gt;
&lt;TD&gt;Group = 2.2.2.2, IP = 2.2.2.2, PHASE 1 COMPLETED&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;TABLE&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD&gt;6&lt;/TD&gt;
&lt;TD&gt;Nov 12 2015&lt;/TD&gt;
&lt;TD&gt;12:35:37&lt;/TD&gt;
&lt;TD&gt;&lt;/TD&gt;
&lt;TD&gt;&lt;/TD&gt;
&lt;TD&gt;&lt;/TD&gt;
&lt;TD&gt;&lt;/TD&gt;
&lt;TD&gt;&lt;/TD&gt;
&lt;TD&gt;AAA retrieved default group policy (GroupPolicy_2.2.2.2) for user =&amp;nbsp;2.2.2.2&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 12 Nov 2015 09:38:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/vpn/cisco-asa-5515-mikrotik-site-to-site-ipsec-vpn/m-p/2824551#M106973</guid>
      <dc:creator>falangerr</dc:creator>
      <dc:date>2015-11-12T09:38:35Z</dc:date>
    </item>
    <item>
      <title>Also I can show debug from</title>
      <link>https://community.cisco.com/t5/vpn/cisco-asa-5515-mikrotik-site-to-site-ipsec-vpn/m-p/2824552#M106974</link>
      <description>&lt;P&gt;Also I can show debug from Mikrotik&lt;/P&gt;
&lt;P&gt;echo: ipsec,debug initiate new phase 1 negotiation: 2.2.2.2[500]&amp;lt;=&amp;gt;1.1.1.1[500]&lt;BR /&gt;echo: ipsec,debug begin Identity Protection mode.&lt;BR /&gt;echo: ipsec,debug sent phase1 packet 2.2.2.2[500]&amp;lt;=&amp;gt;1.1.1.1[500] 7b14e7063c4be7e5:0000000000000000&lt;BR /&gt;echo: ipsec,debug received broken Microsoft ID: FRAGMENTATION&lt;BR /&gt;echo: ipsec,debug sent phase1 packet 2.2.2.2[500]&amp;lt;=&amp;gt;1.1.1.1[500] 7b14e7063c4be7e5:1c3ed76289a2750c&lt;BR /&gt;echo: ipsec,debug received Vendor ID: CISCO-UNITY&lt;BR /&gt;echo: ipsec,debug received Vendor ID: draft-ietf-ipsra-isakmp-xauth-06.txt&lt;BR /&gt;echo: ipsec,debug sent phase1 packet 2.2.2.2[500]&amp;lt;=&amp;gt;1.1.1.1[500] 7b14e7063c4be7e5:1c3ed76289a2750c&lt;BR /&gt;echo: ipsec,debug received Vendor ID: DPD&lt;BR /&gt;echo: ipsec,debug ISAKMP-SA established 2.2.2.2[500]-1.1.1.1[500] spi:7b14e7063c4be7e5:1c3ed76289a2750c&lt;/P&gt;</description>
      <pubDate>Thu, 12 Nov 2015 10:01:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/vpn/cisco-asa-5515-mikrotik-site-to-site-ipsec-vpn/m-p/2824552#M106974</guid>
      <dc:creator>falangerr</dc:creator>
      <dc:date>2015-11-12T10:01:12Z</dc:date>
    </item>
    <item>
      <title>Hi falangerr ,Phase 2</title>
      <link>https://community.cisco.com/t5/vpn/cisco-asa-5515-mikrotik-site-to-site-ipsec-vpn/m-p/2824553#M106975</link>
      <description>&lt;P&gt;Hi &lt;A href="https://supportforums.cisco.com/users/falangerr" title="View user profile." class="username" lang="" about="/users/falangerr" typeof="sioc:UserAccount" property="foaf:name" datatype=""&gt;falangerr&lt;/A&gt;&amp;nbsp;,&lt;BR /&gt;&lt;BR /&gt;Phase 2 parameters, crypto access-list and transform set seem to match in this case. Can you confirm if you are connected via console to ASA?&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;1. Have you applied the crypto map at WAN interface.&lt;BR /&gt;2. Please share the output of show run log&lt;BR /&gt;3.&amp;nbsp;Is any of the device behing NATed device.&amp;nbsp;&lt;BR /&gt;4. Check the output of "show log" if you see any debugs.&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;Regards,&lt;BR /&gt;Dinesh Moudgil&lt;/P&gt;
&lt;P&gt;P.S. Please rate helpful posts.&lt;/P&gt;</description>
      <pubDate>Thu, 12 Nov 2015 11:53:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/vpn/cisco-asa-5515-mikrotik-site-to-site-ipsec-vpn/m-p/2824553#M106975</guid>
      <dc:creator>Dinesh Moudgil</dc:creator>
      <dc:date>2015-11-12T11:53:46Z</dc:date>
    </item>
    <item>
      <title>I connect to the ASA with</title>
      <link>https://community.cisco.com/t5/vpn/cisco-asa-5515-mikrotik-site-to-site-ipsec-vpn/m-p/2824554#M106976</link>
      <description>&lt;P&gt;I connect to the ASA with help of ssh, telnet or ASDM. Also, I can connect by console cable? But usually I use SSH or ASDM. There are few transform sets which was created for connections. I created them to avoid situation when some devices don't want work with specific algorithms.&lt;/P&gt;
&lt;P&gt;1. Yes, I did.&lt;/P&gt;
&lt;P&gt;crypto map WAN_map interface WAN&lt;/P&gt;
&lt;P&gt;2.&amp;nbsp;ASA# show run log&lt;BR /&gt;logging enable&lt;BR /&gt;logging buffer-size 1048576&lt;BR /&gt;logging monitor debugging&lt;BR /&gt;logging buffered debugging&lt;BR /&gt;logging asdm informational&lt;/P&gt;
&lt;P&gt;3. No, all two devices have global ip. That is why NAT-T doesn't need. And I don't forget about excluding networks from NAT for ASA:&lt;/P&gt;
&lt;P&gt;ASA# show nat&lt;BR /&gt;Manual NAT Policies (Section 1)&lt;BR /&gt;1 (LAN) to (WAN) source dynamic any interface&lt;BR /&gt; translate_hits = 767, untranslate_hits = 6&lt;BR /&gt;2 (TEST) to (WAN) source static NETWORK_OBJ_10.6.0.0_24 NETWORK_OBJ_10.6.0.0_24 destination static NETWORK_OBJ_10.7.0.0_24 NETWORK_OBJ_10.7.0.0_24 no-proxy-arp route-lookup&lt;BR /&gt; translate_hits = 0, untranslate_hits = 0&lt;/P&gt;
&lt;P&gt;and for Mikrotik:&lt;/P&gt;
&lt;P&gt;[admin@Brest-R] &amp;gt;&amp;gt; ip firewall nat print&lt;BR /&gt;Flags: X - disabled, I - invalid, D - dynamic&lt;BR /&gt;1 chain=srcnat action=accept src-address=10.7.0.0/24 dst-address=10.6.0.0/24 log=no log-prefix=""&lt;/P&gt;
&lt;P&gt;4. I wrote messages about Phase 1which I saw in ASDM. Ofcourse&amp;nbsp;I can see this in&amp;nbsp;&lt;SPAN&gt;"show log". And additionally:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;%ASA-7-715036: Group = 2.2.2.2, IP = 2.2.2.2, Sending keep-alive of type DPD R-U-THERE (seq number 0x6027656)&lt;BR /&gt;%ASA-7-715046: Group = 2.2.2.2, IP = 2.2.2.2, constructing blank hash payload&lt;BR /&gt;%ASA-7-715046: Group = 2.2.2.2, IP = 2.2.2.2, constructing qm hash payload&lt;BR /&gt;%ASA-7-713236: IP = 2.2.2.2, IKE_DECODE SENDING Message (msgid=cb77946b) with payloads : HDR + HASH (8) + NOTIFY (11) + NONE (0) total length : 84&lt;BR /&gt;%ASA-7-713236: IP = 2.2.2.2, IKE_DECODE RECEIVED Message (msgid=a6c73290) with payloads : HDR + HASH (8) + NOTIFY (11) + NONE (0) total length : 84&lt;BR /&gt;%ASA-7-715047: Group = 2.2.2.2, IP = 2.2.2.2, processing hash payload&lt;BR /&gt;%ASA-7-715047: Group = 2.2.2.2, IP = 2.2.2.2, processing notify payload&lt;BR /&gt;%ASA-7-715075: Group = 2.2.2.2, IP = 2.2.2.2, Received keep-alive of type DPD R-U-THERE-ACK (seq number 0x6027656)&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 12 Nov 2015 12:31:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/vpn/cisco-asa-5515-mikrotik-site-to-site-ipsec-vpn/m-p/2824554#M106976</guid>
      <dc:creator>falangerr</dc:creator>
      <dc:date>2015-11-12T12:31:16Z</dc:date>
    </item>
    <item>
      <title>Thanks , you are on the right</title>
      <link>https://community.cisco.com/t5/vpn/cisco-asa-5515-mikrotik-site-to-site-ipsec-vpn/m-p/2824555#M106977</link>
      <description>&lt;P&gt;Thanks , you are on the right track.&lt;/P&gt;
&lt;P&gt;Perform the following steps.&lt;BR /&gt;1. Run "clear log buffer"&lt;BR /&gt;&lt;BR /&gt;2. Enable the debugs via&lt;BR /&gt;&lt;SPAN&gt;debug crypto condition peer&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;debug crypto isakmp 255&lt;BR /&gt;debug crypto ipsec 255&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;3. Initiate the VPN tunnel.&lt;BR /&gt;4. Share the whole output of "show logg"&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;Regards,&lt;BR /&gt;Dinesh Moudgil&lt;BR /&gt;&lt;BR /&gt;P.S. Please rate helpful posts.&lt;/P&gt;</description>
      <pubDate>Thu, 12 Nov 2015 12:46:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/vpn/cisco-asa-5515-mikrotik-site-to-site-ipsec-vpn/m-p/2824555#M106977</guid>
      <dc:creator>Dinesh Moudgil</dc:creator>
      <dc:date>2015-11-12T12:46:48Z</dc:date>
    </item>
    <item>
      <title>Thank you for your help. You</title>
      <link>https://community.cisco.com/t5/vpn/cisco-asa-5515-mikrotik-site-to-site-ipsec-vpn/m-p/2824556#M106978</link>
      <description>&lt;P&gt;Thank you for your help. You can see output below:&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;ASA# show logging&lt;BR /&gt;Syslog logging: enabled&lt;BR /&gt; Facility: 20&lt;BR /&gt; Timestamp logging: disabled&lt;BR /&gt; Standby logging: disabled&lt;BR /&gt; Debug-trace logging: disabled&lt;BR /&gt; Console logging: disabled&lt;BR /&gt; Monitor logging: level debugging, 64034 messages logged&lt;BR /&gt; Buffer logging: level debugging, 63980 messages logged&lt;BR /&gt; Trap logging: disabled&lt;BR /&gt; Permit-hostdown logging: disabled&lt;BR /&gt; History logging: disabled&lt;BR /&gt; Device ID: disabled&lt;BR /&gt; Mail logging: disabled&lt;BR /&gt; ASDM logging: level informational, 57742 messages logged&lt;BR /&gt;%ASA-5-111008: User 'enable_15' executed the 'clear logging buffer' command.&lt;BR /&gt;%ASA-5-111010: User 'enable_15', running 'CLI' from IP 10.1.1.197, executed 'clear logging buffer'&lt;BR /&gt;%ASA-7-710005: TCP request discarded from 194.154.73.234/35623 to WAN:213.184.230.178/25&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.13/56978 to LAN:255.255.255.255/1947&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.13/56978 to TEST:255.255.255.255/1947&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.211/2051 to LAN:255.255.255.255/7437&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.211/2051 to TEST:255.255.255.255/7437&lt;BR /&gt;%ASA-7-715036: Group = 2.2.2.2, IP = 2.2.2.2, Sending keep-alive of type DPD R-U-THERE (seq number 0x5626898a)&lt;BR /&gt;%ASA-7-715046: Group = 2.2.2.2, IP = 2.2.2.2, constructing blank hash payload&lt;BR /&gt;%ASA-7-715046: Group = 2.2.2.2, IP = 2.2.2.2, constructing qm hash payload&lt;BR /&gt;%ASA-7-713236: IP = 2.2.2.2, IKE_DECODE SENDING Message (msgid=f4a901f1) with payloads : HDR + HASH (8) + NOTIFY (11) + NONE (0) total length : 84&lt;BR /&gt;%ASA-7-713236: IP = 2.2.2.2, IKE_DECODE RECEIVED Message (msgid=ed8f7871) with payloads : HDR + HASH (8) + NOTIFY (11) + NONE (0) total length : 84&lt;BR /&gt;%ASA-7-715047: Group = 2.2.2.2, IP = 2.2.2.2, processing hash payload&lt;BR /&gt;%ASA-7-715047: Group = 2.2.2.2, IP = 2.2.2.2, processing notify payload&lt;BR /&gt;%ASA-7-715075: Group = 2.2.2.2, IP = 2.2.2.2, Received keep-alive of type DPD R-U-THERE-ACK (seq number 0x5626898a)&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.1/67 to TEST:255.255.255.255/68&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.1/67 to LAN:255.255.255.255/68&lt;BR /&gt;%ASA-7-710005: TCP request discarded from 194.154.73.234/35623 to WAN:213.184.230.178/25&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.211/2051 to LAN:255.255.255.255/7437&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.211/2051 to TEST:255.255.255.255/7437&lt;BR /&gt;%ASA-7-710005: TCP request discarded from 84.51.43.226/9484 to WAN:213.184.230.178/25&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.1/67 to TEST:255.255.255.255/68&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.1/67 to LAN:255.255.255.255/68&lt;BR /&gt;%ASA-5-111008: User 'enable_15' executed the 'debug crypto condition peer 2.2.2.2' command.&lt;BR /&gt;%ASA-5-111010: User 'enable_15', running 'CLI' from IP 10.1.1.197, executed 'debug crypto condition peer 2.2.2.2'&lt;BR /&gt;%ASA-5-111008: User 'enable_15' executed the 'debug crypto isakmp 255' command.&lt;BR /&gt;%ASA-5-111010: User 'enable_15', running 'CLI' from IP 10.1.1.197, executed 'debug crypto isakmp 255'&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.137/68 to LAN:255.255.255.255/67&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.137/68 to TEST:255.255.255.255/67&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.23/17500 to LAN:255.255.255.255/17500&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.23/17500 to TEST:255.255.255.255/17500&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.23/17500 to LAN:255.255.255.255/17500&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.23/17500 to TEST:255.255.255.255/17500&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.146/17500 to LAN:255.255.255.255/17500&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.146/17500 to TEST:255.255.255.255/17500&lt;BR /&gt;%ASA-5-111008: User 'enable_15' executed the 'debug crypto ipsec 255' command.&lt;BR /&gt;%ASA-5-111010: User 'enable_15', running 'CLI' from IP 10.1.1.197, executed 'debug crypto ipsec 255'&lt;BR /&gt;%ASA-6-302013: Built inbound TCP connection 10784 for LAN:10.1.1.197/59083 (10.1.1.197/59083) to identity:10.1.1.254/443 (10.1.1.254/443)&lt;BR /&gt;%ASA-6-725001: Starting SSL handshake with client LAN:10.1.1.197/59083 for TLSv1 session.&lt;BR /&gt;%ASA-7-725010: Device supports the following 4 cipher(s).&lt;BR /&gt;%ASA-7-725011: Cipher[1] : RC4-SHA&lt;BR /&gt;%ASA-7-725011: Cipher[2] : AES128-SHA&lt;BR /&gt;%ASA-7-725011: Cipher[3] : AES256-SHA&lt;BR /&gt;%ASA-7-725011: Cipher[4] : DES-CBC3-SHA&lt;BR /&gt;%ASA-7-725008: SSL client LAN:10.1.1.197/59083 proposes the following 8 cipher(s).&lt;BR /&gt;%ASA-7-725011: Cipher[1] : AES128-SHA&lt;BR /&gt;%ASA-7-725011: Cipher[2] : DHE-RSA-AES128-SHA&lt;BR /&gt;%ASA-7-725011: Cipher[3] : DHE-DSS-AES128-SHA&lt;BR /&gt;%ASA-7-725011: Cipher[4] : DES-CBC3-SHA&lt;BR /&gt;%ASA-7-725011: Cipher[5] : EDH-RSA-DES-CBC3-SHA&lt;BR /&gt;%ASA-7-725011: Cipher[6] : EDH-DSS-DES-CBC3-SHA&lt;BR /&gt;%ASA-7-725011: Cipher[7] : RC4-SHA&lt;BR /&gt;%ASA-7-725011: Cipher[8] : RC4-MD5&lt;BR /&gt;%ASA-7-725012: Device chooses cipher : RC4-SHA for the SSL session with client LAN:10.1.1.197/59083&lt;BR /&gt;%ASA-6-725002: Device completed SSL handshake with client LAN:10.1.1.197/59083&lt;BR /&gt;%ASA-6-113012: AAA user authentication Successful : local database : user = admin&lt;BR /&gt;%ASA-6-113008: AAA transaction status ACCEPT : user = admin&lt;BR /&gt;%ASA-6-611101: User authentication succeeded: Uname: admin&lt;BR /&gt;%ASA-6-605005: Login permitted from 10.1.1.197/59083 to LAN:10.1.1.254/https for user "admin"&lt;BR /&gt;%ASA-7-111009: User 'admin' executed cmd: show module cxsc details&lt;BR /&gt;%ASA-6-725007: SSL session with client LAN:10.1.1.197/59083 terminated.&lt;BR /&gt;%ASA-6-302014: Teardown TCP connection 10784 for LAN:10.1.1.197/59083 to identity:10.1.1.254/443 duration 0:00:00 bytes 1662 TCP Reset-O&lt;BR /&gt;%ASA-6-106015: Deny TCP (no connection) from 10.1.1.197/59083 to 10.1.1.254/443 flags FIN ACK on interface LAN&lt;BR /&gt;%ASA-7-710005: TCP request discarded from 10.1.1.197/59083 to LAN:10.1.1.254/443&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 192.168.88.1/5678 to LAN:255.255.255.255/5678&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 192.168.88.1/5678 to TEST:255.255.255.255/5678&lt;BR /&gt;%ASA-7-713236: IP = 2.2.2.2, IKE_DECODE RECEIVED Message (msgid=a4ee31c4) with payloads : HDR + HASH (8) + DELETE (12) + NONE (0) total length : 80&lt;BR /&gt;%ASA-7-715047: Group = 2.2.2.2, IP = 2.2.2.2, processing hash payload&lt;BR /&gt;%ASA-7-713906: Group = 2.2.2.2, IP = 2.2.2.2, processing delete&lt;BR /&gt;%ASA-5-713050: Group = 2.2.2.2, IP = 2.2.2.2, Connection terminated for peer 2.2.2.2. Reason: Peer Terminate Remote Proxy 0.0.0.0, Local Proxy 0.0.0.0&lt;BR /&gt;%ASA-7-713906: Group = 2.2.2.2, IP = 2.2.2.2, IKE SA MM:c54dda3a terminating: flags 0x01004802, refcnt 0, tuncnt 0&lt;BR /&gt;%ASA-5-713259: Group = 2.2.2.2, IP = 2.2.2.2, Session is being torn down. Reason: User Requested&lt;BR /&gt;%ASA-4-113019: Group = 2.2.2.2, Username = 2.2.2.2, IP = 2.2.2.2, Session disconnected. Session Type: LAN-to-LAN, Duration: 0h:12m:45s, Bytes xmt: 0, Bytes rcv: 0, Reason: User Requested&lt;BR /&gt;%ASA-7-713906: Ignoring msg to mark SA with dsID 98304 dead because SA deleted&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.211/2051 to TEST:255.255.255.255/7437&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.211/2051 to LAN:255.255.255.255/7437&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.147/68 to LAN:255.255.255.255/67&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.147/68 to TEST:255.255.255.255/67&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.1/67 to TEST:255.255.255.255/68&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.1/67 to LAN:255.255.255.255/68&lt;BR /&gt;%ASA-7-710005: TCP request discarded from 194.154.73.234/35623 to WAN:213.184.230.178/25&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.84/17500 to LAN:255.255.255.255/17500&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.84/17500 to TEST:255.255.255.255/17500&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.211/2051 to LAN:255.255.255.255/7437&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.211/2051 to TEST:255.255.255.255/7437&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.100.100.4/62976 to LAN:255.255.255.255/62976&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.100.100.4/62976 to TEST:255.255.255.255/62976&lt;BR /&gt;%ASA-4-733100: [ Scanning] drop rate-1 exceeded. Current burst rate is 6 per second, max configured rate is 10; Current average rate is 9 per second, max configured rate is 5; Cumulative total count is 5978&lt;BR /&gt;%ASA-7-713236: IP = 2.2.2.2, IKE_DECODE RECEIVED Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + VENDOR (13) + NONE (0) total length : 244&lt;BR /&gt;%ASA-7-715047: IP = 2.2.2.2, processing SA payload&lt;BR /&gt;%ASA-7-713906: IP = 2.2.2.2, Oakley proposal is acceptable&lt;BR /&gt;%ASA-7-715047: IP = 2.2.2.2, processing VID payload&lt;BR /&gt;%ASA-7-715049: IP = 2.2.2.2, Received Cisco Unity client VID&lt;BR /&gt;%ASA-7-715047: IP = 2.2.2.2, processing VID payload&lt;BR /&gt;%ASA-7-715049: IP = 2.2.2.2, Received DPD VID&lt;BR /&gt;%ASA-7-715047: IP = 2.2.2.2, processing IKE SA payload&lt;BR /&gt;%ASA-7-715028: IP = 2.2.2.2, IKE SA Proposal # 1, Transform # 4 acceptable Matches global IKE entry # 13&lt;BR /&gt;%ASA-7-715046: IP = 2.2.2.2, constructing ISAKMP SA payload&lt;BR /&gt;%ASA-7-715046: IP = 2.2.2.2, constructing Fragmentation VID + extended capabilities payload&lt;BR /&gt;%ASA-7-713236: IP = 2.2.2.2, IKE_DECODE SENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 112&lt;BR /&gt;%ASA-7-713236: IP = 2.2.2.2, IKE_DECODE RECEIVED Message (msgid=0) with payloads : HDR + KE (4) + NONCE (10) + NONE (0) total length : 188&lt;BR /&gt;%ASA-7-715047: IP = 2.2.2.2, processing ke payload&lt;BR /&gt;%ASA-7-715047: IP = 2.2.2.2, processing ISA_KE payload&lt;BR /&gt;%ASA-7-715047: IP = 2.2.2.2, processing nonce payload&lt;BR /&gt;%ASA-7-715046: IP = 2.2.2.2, constructing ke payload&lt;BR /&gt;%ASA-7-715046: IP = 2.2.2.2, constructing nonce payload&lt;BR /&gt;%ASA-7-715046: IP = 2.2.2.2, constructing Cisco Unity VID payload&lt;BR /&gt;%ASA-7-715046: IP = 2.2.2.2, constructing xauth V6 VID payload&lt;BR /&gt;%ASA-7-715048: IP = 2.2.2.2, Send IOS VID&lt;BR /&gt;%ASA-7-715038: IP = 2.2.2.2, Constructing ASA spoofing IOS Vendor ID payload (version: 1.0.0, capabilities: 20000001)&lt;BR /&gt;%ASA-7-715046: IP = 2.2.2.2, constructing VID payload&lt;BR /&gt;%ASA-7-715048: IP = 2.2.2.2, Send Altiga/Cisco VPN3000/Cisco ASA GW VID&lt;BR /&gt;%ASA-7-713906: IP = 2.2.2.2, Connection landed on tunnel_group 2.2.2.2&lt;BR /&gt;%ASA-7-713906: Group = 2.2.2.2, IP = 2.2.2.2, Generating keys for Responder...&lt;BR /&gt;%ASA-7-713236: IP = 2.2.2.2, IKE_DECODE SENDING Message (msgid=0) with payloads : HDR + KE (4) + NONCE (10) + VENDOR (13) + VENDOR (13) + VENDOR (13) + VENDOR (13) + NONE (0) total length : 256&lt;BR /&gt;%ASA-7-713236: IP = 2.2.2.2, IKE_DECODE RECEIVED Message (msgid=0) with payloads : HDR + ID (5) + HASH (8) + NONE (0) total length : 64&lt;BR /&gt;%ASA-7-715047: Group = 2.2.2.2, IP = 2.2.2.2, processing ID payload&lt;BR /&gt;%ASA-7-714011: Group = 2.2.2.2, IP = 2.2.2.2, ID_IPV4_ADDR ID received&lt;BR /&gt;2.2.2.2&lt;BR /&gt;%ASA-7-715047: Group = 2.2.2.2, IP = 2.2.2.2, processing hash payload&lt;BR /&gt;%ASA-7-715076: Group = 2.2.2.2, IP = 2.2.2.2, Computing hash for ISAKMP&lt;BR /&gt;%ASA-7-713906: IP = 2.2.2.2, Connection landed on tunnel_group 2.2.2.2&lt;BR /&gt;%ASA-7-715046: Group = 2.2.2.2, IP = 2.2.2.2, constructing ID payload&lt;BR /&gt;%ASA-7-715046: Group = 2.2.2.2, IP = 2.2.2.2, constructing hash payload&lt;BR /&gt;%ASA-7-715076: Group = 2.2.2.2, IP = 2.2.2.2, Computing hash for ISAKMP&lt;BR /&gt;%ASA-7-715046: Group = 2.2.2.2, IP = 2.2.2.2, constructing dpd vid payload&lt;BR /&gt;%ASA-7-713236: IP = 2.2.2.2, IKE_DECODE SENDING Message (msgid=0) with payloads : HDR + ID (5) + HASH (8) + VENDOR (13) + NONE (0) total length : 84&lt;BR /&gt;%ASA-6-113009: AAA retrieved default group policy (GroupPolicy_2.2.2.2) for user = 2.2.2.2&lt;BR /&gt;%ASA-5-713119: Group = 2.2.2.2, IP = 2.2.2.2, PHASE 1 COMPLETED&lt;BR /&gt;%ASA-7-713121: IP = 2.2.2.2, Keep-alive type for this connection: DPD&lt;BR /&gt;%ASA-7-715080: Group = 2.2.2.2, IP = 2.2.2.2, Starting P1 rekey timer: 82080 seconds.&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.211/2051 to LAN:255.255.255.255/7437&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.211/2051 to TEST:255.255.255.255/7437&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.211/2051 to LAN:255.255.255.255/7437&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.211/2051 to TEST:255.255.255.255/7437&lt;BR /&gt;%ASA-7-710005: TCP request discarded from 84.51.43.226/4905 to WAN:213.184.230.178/25&lt;BR /&gt;%ASA-6-302013: Built inbound TCP connection 10786 for LAN:10.1.1.197/59084 (10.1.1.197/59084) to identity:10.1.1.254/443 (10.1.1.254/443)&lt;BR /&gt;%ASA-6-725001: Starting SSL handshake with client LAN:10.1.1.197/59084 for TLSv1 session.&lt;BR /&gt;%ASA-7-725010: Device supports the following 4 cipher(s).&lt;BR /&gt;%ASA-7-725011: Cipher[1] : RC4-SHA&lt;BR /&gt;%ASA-7-725011: Cipher[2] : AES128-SHA&lt;BR /&gt;%ASA-7-725011: Cipher[3] : AES256-SHA&lt;BR /&gt;%ASA-7-725011: Cipher[4] : DES-CBC3-SHA&lt;BR /&gt;%ASA-7-725008: SSL client LAN:10.1.1.197/59084 proposes the following 8 cipher(s).&lt;BR /&gt;%ASA-7-725011: Cipher[1] : AES128-SHA&lt;BR /&gt;%ASA-7-725011: Cipher[2] : DHE-RSA-AES128-SHA&lt;BR /&gt;%ASA-7-725011: Cipher[3] : DHE-DSS-AES128-SHA&lt;BR /&gt;%ASA-7-725011: Cipher[4] : DES-CBC3-SHA&lt;BR /&gt;%ASA-7-725011: Cipher[5] : EDH-RSA-DES-CBC3-SHA&lt;BR /&gt;%ASA-7-725011: Cipher[6] : EDH-DSS-DES-CBC3-SHA&lt;BR /&gt;%ASA-7-725011: Cipher[7] : RC4-SHA&lt;BR /&gt;%ASA-7-725011: Cipher[8] : RC4-MD5&lt;BR /&gt;%ASA-7-725012: Device chooses cipher : RC4-SHA for the SSL session with client LAN:10.1.1.197/59084&lt;BR /&gt;%ASA-6-725002: Device completed SSL handshake with client LAN:10.1.1.197/59084&lt;BR /&gt;%ASA-6-113012: AAA user authentication Successful : local database : user = admin&lt;BR /&gt;%ASA-6-113008: AAA transaction status ACCEPT : user = admin&lt;BR /&gt;%ASA-6-611101: User authentication succeeded: Uname: admin&lt;BR /&gt;%ASA-6-605005: Login permitted from 10.1.1.197/59084 to LAN:10.1.1.254/https for user "admin"&lt;BR /&gt;%ASA-7-111009: User 'admin' executed cmd: show module cxsc details&lt;BR /&gt;%ASA-6-725007: SSL session with client LAN:10.1.1.197/59084 terminated.&lt;BR /&gt;%ASA-6-302014: Teardown TCP connection 10786 for LAN:10.1.1.197/59084 to identity:10.1.1.254/443 duration 0:00:00 bytes 1662 TCP Reset-O&lt;BR /&gt;%ASA-6-106015: Deny TCP (no connection) from 10.1.1.197/59084 to 10.1.1.254/443 flags FIN ACK on interface LAN&lt;BR /&gt;%ASA-7-710005: TCP request discarded from 10.1.1.197/59084 to LAN:10.1.1.254/443&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.211/2051 to LAN:255.255.255.255/7437&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.211/2051 to TEST:255.255.255.255/7437&lt;BR /&gt;%ASA-7-710005: TCP request discarded from 84.51.43.226/4905 to WAN:213.184.230.178/25&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.211/2051 to LAN:255.255.255.255/7437&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.211/2051 to TEST:255.255.255.255/7437&lt;BR /&gt;%ASA-7-609001: Built local-host WAN:10.7.0.1&lt;BR /&gt;%ASA-6-302020: Built outbound ICMP connection for faddr 10.7.0.1/0 gaddr 213.184.230.178/1088 laddr 213.184.230.178/1088&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.211/2051 to LAN:255.255.255.255/7437&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.211/2051 to TEST:255.255.255.255/7437&lt;BR /&gt;%ASA-7-710005: TCP request discarded from 84.51.43.226/4905 to WAN:213.184.230.178/25&lt;BR /&gt;%ASA-6-302013: Built inbound TCP connection 10789 for LAN:10.1.1.197/59085 (10.1.1.197/59085) to identity:10.1.1.254/443 (10.1.1.254/443)&lt;BR /&gt;%ASA-6-725001: Starting SSL handshake with client LAN:10.1.1.197/59085 for TLSv1 session.&lt;BR /&gt;%ASA-7-725010: Device supports the following 4 cipher(s).&lt;BR /&gt;%ASA-7-725011: Cipher[1] : RC4-SHA&lt;BR /&gt;%ASA-7-725011: Cipher[2] : AES128-SHA&lt;BR /&gt;%ASA-7-725011: Cipher[3] : AES256-SHA&lt;BR /&gt;%ASA-7-725011: Cipher[4] : DES-CBC3-SHA&lt;BR /&gt;%ASA-7-725008: SSL client LAN:10.1.1.197/59085 proposes the following 8 cipher(s).&lt;BR /&gt;%ASA-7-725011: Cipher[1] : AES128-SHA&lt;BR /&gt;%ASA-7-725011: Cipher[2] : DHE-RSA-AES128-SHA&lt;BR /&gt;%ASA-7-725011: Cipher[3] : DHE-DSS-AES128-SHA&lt;BR /&gt;%ASA-7-725011: Cipher[4] : DES-CBC3-SHA&lt;BR /&gt;%ASA-7-725011: Cipher[5] : EDH-RSA-DES-CBC3-SHA&lt;BR /&gt;%ASA-7-725011: Cipher[6] : EDH-DSS-DES-CBC3-SHA&lt;BR /&gt;%ASA-7-725011: Cipher[7] : RC4-SHA&lt;BR /&gt;%ASA-7-725011: Cipher[8] : RC4-MD5&lt;BR /&gt;%ASA-7-725012: Device chooses cipher : RC4-SHA for the SSL session with client LAN:10.1.1.197/59085&lt;BR /&gt;%ASA-6-725002: Device completed SSL handshake with client LAN:10.1.1.197/59085&lt;BR /&gt;%ASA-6-113012: AAA user authentication Successful : local database : user = admin&lt;BR /&gt;%ASA-6-113008: AAA transaction status ACCEPT : user = admin&lt;BR /&gt;%ASA-6-611101: User authentication succeeded: Uname: admin&lt;BR /&gt;%ASA-6-605005: Login permitted from 10.1.1.197/59085 to LAN:10.1.1.254/https for user "admin"&lt;BR /&gt;%ASA-7-111009: User 'admin' executed cmd: show module cxsc details&lt;BR /&gt;%ASA-6-725007: SSL session with client LAN:10.1.1.197/59085 terminated.&lt;BR /&gt;%ASA-6-302014: Teardown TCP connection 10789 for LAN:10.1.1.197/59085 to identity:10.1.1.254/443 duration 0:00:00 bytes 1662 TCP Reset-O&lt;BR /&gt;%ASA-6-106015: Deny TCP (no connection) from 10.1.1.197/59085 to 10.1.1.254/443 flags FIN ACK on interface LAN&lt;BR /&gt;%ASA-7-710005: TCP request discarded from 10.1.1.197/59085 to LAN:10.1.1.254/443&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.211/2051 to LAN:255.255.255.255/7437&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.211/2051 to TEST:255.255.255.255/7437&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.127/17500 to LAN:255.255.255.255/17500&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.127/17500 to TEST:255.255.255.255/17500&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.154/68 to LAN:255.255.255.255/67&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.154/68 to TEST:255.255.255.255/67&lt;BR /&gt;%ASA-4-733100: [ Scanning] drop rate-1 exceeded. Current burst rate is 9 per second, max configured rate is 10; Current average rate is 10 per second, max configured rate is 5; Cumulative total count is 6070&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.211/2051 to LAN:255.255.255.255/7437&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.211/2051 to TEST:255.255.255.255/7437&lt;BR /&gt;%ASA-7-715036: Group = 2.2.2.2, IP = 2.2.2.2, Sending keep-alive of type DPD R-U-THERE (seq number 0x513d064)&lt;BR /&gt;%ASA-7-715046: Group = 2.2.2.2, IP = 2.2.2.2, constructing blank hash payload&lt;BR /&gt;%ASA-7-715046: Group = 2.2.2.2, IP = 2.2.2.2, constructing qm hash payload&lt;BR /&gt;%ASA-7-713236: IP = 2.2.2.2, IKE_DECODE SENDING Message (msgid=8c4f9f7) with payloads : HDR + HASH (8) + NOTIFY (11) + NONE (0) total length : 84&lt;BR /&gt;%ASA-7-713236: IP = 2.2.2.2, IKE_DECODE RECEIVED Message (msgid=a519933d) with payloads : HDR + HASH (8) + NOTIFY (11) + NONE (0) total length : 84&lt;BR /&gt;%ASA-7-715047: Group = 2.2.2.2, IP = 2.2.2.2, processing hash payload&lt;BR /&gt;%ASA-7-715047: Group = 2.2.2.2, IP = 2.2.2.2, processing notify payload&lt;BR /&gt;%ASA-7-715075: Group = 2.2.2.2, IP = 2.2.2.2, Received keep-alive of type DPD R-U-THERE-ACK (seq number 0x513d064)&lt;BR /&gt;%ASA-5-111008: User 'enable_15' executed the 'ping 10.7.0.1' command.&lt;BR /&gt;%ASA-5-111010: User 'enable_15', running 'CLI' from IP 10.1.1.197, executed 'ping 10.7.0.1'&lt;BR /&gt;%ASA-6-302021: Teardown ICMP connection for faddr 10.7.0.1/0 gaddr 213.184.230.178/1088 laddr 213.184.230.178/1088&lt;BR /&gt;%ASA-7-609002: Teardown local-host WAN:10.7.0.1 duration 0:00:08&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.1/5678 to TEST:255.255.255.255/5678&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.1/5678 to LAN:255.255.255.255/5678&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 192.168.88.3/5678 to TEST:255.255.255.255/5678&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 192.168.88.3/5678 to LAN:255.255.255.255/5678&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.169/68 to LAN:255.255.255.255/67&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.169/68 to TEST:255.255.255.255/67&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.211/2051 to LAN:255.255.255.255/7437&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.211/2051 to TEST:255.255.255.255/7437&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.23/17500 to LAN:255.255.255.255/17500&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.23/17500 to TEST:255.255.255.255/17500&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.23/17500 to LAN:255.255.255.255/17500&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.23/17500 to TEST:255.255.255.255/17500&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.146/17500 to LAN:255.255.255.255/17500&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.146/17500 to TEST:255.255.255.255/17500&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.211/2051 to LAN:255.255.255.255/7437&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.211/2051 to TEST:255.255.255.255/7437&lt;BR /&gt;%ASA-7-710005: TCP request discarded from 84.51.43.226/33967 to WAN:213.184.230.178/25&lt;BR /&gt;%ASA-6-302013: Built inbound TCP connection 10791 for LAN:10.1.1.197/59087 (10.1.1.197/59087) to identity:10.1.1.254/443 (10.1.1.254/443)&lt;BR /&gt;%ASA-6-725001: Starting SSL handshake with client LAN:10.1.1.197/59087 for TLSv1 session.&lt;BR /&gt;%ASA-7-725010: Device supports the following 4 cipher(s).&lt;BR /&gt;%ASA-7-725011: Cipher[1] : RC4-SHA&lt;BR /&gt;%ASA-7-725011: Cipher[2] : AES128-SHA&lt;BR /&gt;%ASA-7-725011: Cipher[3] : AES256-SHA&lt;BR /&gt;%ASA-7-725011: Cipher[4] : DES-CBC3-SHA&lt;BR /&gt;%ASA-7-725008: SSL client LAN:10.1.1.197/59087 proposes the following 8 cipher(s).&lt;BR /&gt;%ASA-7-725011: Cipher[1] : AES128-SHA&lt;BR /&gt;%ASA-7-725011: Cipher[2] : DHE-RSA-AES128-SHA&lt;BR /&gt;%ASA-7-725011: Cipher[3] : DHE-DSS-AES128-SHA&lt;BR /&gt;%ASA-7-725011: Cipher[4] : DES-CBC3-SHA&lt;BR /&gt;%ASA-7-725011: Cipher[5] : EDH-RSA-DES-CBC3-SHA&lt;BR /&gt;%ASA-7-725011: Cipher[6] : EDH-DSS-DES-CBC3-SHA&lt;BR /&gt;%ASA-7-725011: Cipher[7] : RC4-SHA&lt;BR /&gt;%ASA-7-725011: Cipher[8] : RC4-MD5&lt;BR /&gt;%ASA-7-725012: Device chooses cipher : RC4-SHA for the SSL session with client LAN:10.1.1.197/59087&lt;BR /&gt;%ASA-6-725002: Device completed SSL handshake with client LAN:10.1.1.197/59087&lt;BR /&gt;%ASA-6-113012: AAA user authentication Successful : local database : user = admin&lt;BR /&gt;%ASA-6-113008: AAA transaction status ACCEPT : user = admin&lt;BR /&gt;%ASA-6-611101: User authentication succeeded: Uname: admin&lt;BR /&gt;%ASA-6-605005: Login permitted from 10.1.1.197/59087 to LAN:10.1.1.254/https for user "admin"&lt;BR /&gt;%ASA-7-111009: User 'admin' executed cmd: show module cxsc details&lt;BR /&gt;%ASA-6-725007: SSL session with client LAN:10.1.1.197/59087 terminated.&lt;BR /&gt;%ASA-6-302014: Teardown TCP connection 10791 for LAN:10.1.1.197/59087 to identity:10.1.1.254/443 duration 0:00:00 bytes 1662 TCP Reset-O&lt;BR /&gt;%ASA-6-106015: Deny TCP (no connection) from 10.1.1.197/59087 to 10.1.1.254/443 flags FIN ACK on interface LAN&lt;BR /&gt;%ASA-7-710005: TCP request discarded from 10.1.1.197/59087 to LAN:10.1.1.254/443&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.13/56978 to LAN:255.255.255.255/1947&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.13/56978 to TEST:255.255.255.255/1947&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.84/17500 to LAN:255.255.255.255/17500&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.84/17500 to TEST:255.255.255.255/17500&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.211/2051 to LAN:255.255.255.255/7437&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.211/2051 to TEST:255.255.255.255/7437&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.100.100.4/62976 to LAN:255.255.255.255/62976&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.100.100.4/62976 to TEST:255.255.255.255/62976&lt;BR /&gt;%ASA-7-710005: TCP request discarded from 84.51.43.226/33967 to WAN:213.184.230.178/25&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.211/2051 to LAN:255.255.255.255/7437&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.211/2051 to TEST:255.255.255.255/7437&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.211/2051 to LAN:255.255.255.255/7437&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.211/2051 to TEST:255.255.255.255/7437&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.117/68 to LAN:255.255.255.255/67&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.117/68 to TEST:255.255.255.255/67&lt;BR /&gt;%ASA-7-710005: TCP request discarded from 84.51.43.226/33967 to WAN:213.184.230.178/25&lt;BR /&gt;%ASA-5-111008: User 'enable_15' executed the 'undebug all' command.&lt;BR /&gt;%ASA-6-302013: Built inbound TCP connection 10793 for LAN:10.1.1.197/59088 (10.1.1.197/59088) to identity:10.1.1.254/443 (10.1.1.254/443)&lt;BR /&gt;%ASA-6-725001: Starting SSL handshake with client LAN:10.1.1.197/59088 for TLSv1 session.&lt;BR /&gt;%ASA-7-725010: Device supports the following 4 cipher(s).&lt;BR /&gt;%ASA-7-725011: Cipher[1] : RC4-SHA&lt;BR /&gt;%ASA-7-725011: Cipher[2] : AES128-SHA&lt;BR /&gt;%ASA-7-725011: Cipher[3] : AES256-SHA&lt;BR /&gt;%ASA-7-725011: Cipher[4] : DES-CBC3-SHA&lt;BR /&gt;%ASA-7-725008: SSL client LAN:10.1.1.197/59088 proposes the following 8 cipher(s).&lt;BR /&gt;%ASA-7-725011: Cipher[1] : AES128-SHA&lt;BR /&gt;%ASA-7-725011: Cipher[2] : DHE-RSA-AES128-SHA&lt;BR /&gt;%ASA-7-725011: Cipher[3] : DHE-DSS-AES128-SHA&lt;BR /&gt;%ASA-7-725011: Cipher[4] : DES-CBC3-SHA&lt;BR /&gt;%ASA-7-725011: Cipher[5] : EDH-RSA-DES-CBC3-SHA&lt;BR /&gt;%ASA-7-725011: Cipher[6] : EDH-DSS-DES-CBC3-SHA&lt;BR /&gt;%ASA-7-725011: Cipher[7] : RC4-SHA&lt;BR /&gt;%ASA-7-725011: Cipher[8] : RC4-MD5&lt;BR /&gt;%ASA-7-725012: Device chooses cipher : RC4-SHA for the SSL session with client LAN:10.1.1.197/59088&lt;BR /&gt;%ASA-6-725002: Device completed SSL handshake with client LAN:10.1.1.197/59088&lt;BR /&gt;%ASA-6-113012: AAA user authentication Successful : local database : user = admin&lt;BR /&gt;%ASA-6-113008: AAA transaction status ACCEPT : user = admin&lt;BR /&gt;%ASA-6-611101: User authentication succeeded: Uname: admin&lt;BR /&gt;%ASA-6-605005: Login permitted from 10.1.1.197/59088 to LAN:10.1.1.254/https for user "admin"&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 0.0.0.0/5678 to LAN:255.255.255.255/5678&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 0.0.0.0/5678 to TEST:255.255.255.255/5678&lt;BR /&gt;%ASA-7-111009: User 'admin' executed cmd: show module cxsc details&lt;BR /&gt;%ASA-6-725007: SSL session with client LAN:10.1.1.197/59088 terminated.&lt;BR /&gt;%ASA-6-302014: Teardown TCP connection 10793 for LAN:10.1.1.197/59088 to identity:10.1.1.254/443 duration 0:00:00 bytes 1662 TCP Reset-O&lt;BR /&gt;%ASA-6-106015: Deny TCP (no connection) from 10.1.1.197/59088 to 10.1.1.254/443 flags FIN ACK on interface LAN&lt;BR /&gt;%ASA-7-710005: TCP request discarded from 10.1.1.197/59088 to LAN:10.1.1.254/443&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.211/2051 to LAN:255.255.255.255/7437&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.211/2051 to TEST:255.255.255.255/7437&lt;BR /&gt;%ASA-4-733100: [ Scanning] drop rate-1 exceeded. Current burst rate is 6 per second, max configured rate is 10; Current average rate is 10 per second, max configured rate is 5; Cumulative total count is 6227&lt;BR /&gt;%ASA-7-715036: Group = 2.2.2.2, IP = 2.2.2.2, Sending keep-alive of type DPD R-U-THERE (seq number 0x513d065)&lt;BR /&gt;%ASA-7-715046: Group = 2.2.2.2, IP = 2.2.2.2, constructing blank hash payload&lt;BR /&gt;%ASA-7-715046: Group = 2.2.2.2, IP = 2.2.2.2, constructing qm hash payload&lt;BR /&gt;%ASA-7-713236: IP = 2.2.2.2, IKE_DECODE SENDING Message (msgid=494c6c52) with payloads : HDR + HASH (8) + NOTIFY (11) + NONE (0) total length : 84&lt;BR /&gt;%ASA-7-713236: IP = 2.2.2.2, IKE_DECODE RECEIVED Message (msgid=fb6c60f8) with payloads : HDR + HASH (8) + NOTIFY (11) + NONE (0) total length : 84&lt;BR /&gt;%ASA-7-715047: Group = 2.2.2.2, IP = 2.2.2.2, processing hash payload&lt;BR /&gt;%ASA-7-715047: Group = 2.2.2.2, IP = 2.2.2.2, processing notify payload&lt;BR /&gt;%ASA-7-715075: Group = 2.2.2.2, IP = 2.2.2.2, Received keep-alive of type DPD R-U-THERE-ACK (seq number 0x513d065)&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.211/2051 to LAN:255.255.255.255/7437&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.211/2051 to TEST:255.255.255.255/7437&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.211/2051 to LAN:255.255.255.255/7437&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.211/2051 to TEST:255.255.255.255/7437&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.80/68 to LAN:255.255.255.255/67&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.80/68 to TEST:255.255.255.255/67&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.1/67 to TEST:255.255.255.255/68&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.1/67 to LAN:255.255.255.255/68&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.91/68 to LAN:255.255.255.255/67&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.91/68 to TEST:255.255.255.255/67&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.211/2051 to LAN:255.255.255.255/7437&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.211/2051 to TEST:255.255.255.255/7437&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.127/17500 to LAN:255.255.255.255/17500&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.127/17500 to TEST:255.255.255.255/17500&lt;BR /&gt;%ASA-6-302013: Built inbound TCP connection 10795 for LAN:10.1.1.197/59089 (10.1.1.197/59089) to identity:10.1.1.254/443 (10.1.1.254/443)&lt;BR /&gt;%ASA-6-725001: Starting SSL handshake with client LAN:10.1.1.197/59089 for TLSv1 session.&lt;BR /&gt;%ASA-7-725010: Device supports the following 4 cipher(s).&lt;BR /&gt;%ASA-7-725011: Cipher[1] : RC4-SHA&lt;BR /&gt;%ASA-7-725011: Cipher[2] : AES128-SHA&lt;BR /&gt;%ASA-7-725011: Cipher[3] : AES256-SHA&lt;BR /&gt;%ASA-7-725011: Cipher[4] : DES-CBC3-SHA&lt;BR /&gt;%ASA-7-725008: SSL client LAN:10.1.1.197/59089 proposes the following 8 cipher(s).&lt;BR /&gt;%ASA-7-725011: Cipher[1] : AES128-SHA&lt;BR /&gt;%ASA-7-725011: Cipher[2] : DHE-RSA-AES128-SHA&lt;BR /&gt;%ASA-7-725011: Cipher[3] : DHE-DSS-AES128-SHA&lt;BR /&gt;%ASA-7-725011: Cipher[4] : DES-CBC3-SHA&lt;BR /&gt;%ASA-7-725011: Cipher[5] : EDH-RSA-DES-CBC3-SHA&lt;BR /&gt;%ASA-7-725011: Cipher[6] : EDH-DSS-DES-CBC3-SHA&lt;BR /&gt;%ASA-7-725011: Cipher[7] : RC4-SHA&lt;BR /&gt;%ASA-7-725011: Cipher[8] : RC4-MD5&lt;BR /&gt;%ASA-7-725012: Device chooses cipher : RC4-SHA for the SSL session with client LAN:10.1.1.197/59089&lt;BR /&gt;%ASA-6-725002: Device completed SSL handshake with client LAN:10.1.1.197/59089&lt;BR /&gt;%ASA-6-113012: AAA user authentication Successful : local database : user = admin&lt;BR /&gt;%ASA-6-113008: AAA transaction status ACCEPT : user = admin&lt;BR /&gt;%ASA-6-611101: User authentication succeeded: Uname: admin&lt;BR /&gt;%ASA-6-605005: Login permitted from 10.1.1.197/59089 to LAN:10.1.1.254/https for user "admin"&lt;BR /&gt;%ASA-7-111009: User 'admin' executed cmd: show module cxsc details&lt;BR /&gt;%ASA-6-725007: SSL session with client LAN:10.1.1.197/59089 terminated.&lt;BR /&gt;%ASA-6-302014: Teardown TCP connection 10795 for LAN:10.1.1.197/59089 to identity:10.1.1.254/443 duration 0:00:00 bytes 1662 TCP Reset-O&lt;BR /&gt;%ASA-6-106015: Deny TCP (no connection) from 10.1.1.197/59089 to 10.1.1.254/443 flags FIN ACK on interface LAN&lt;BR /&gt;%ASA-7-710005: TCP request discarded from 10.1.1.197/59089 to LAN:10.1.1.254/443&lt;/P&gt;</description>
      <pubDate>Thu, 12 Nov 2015 13:05:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/vpn/cisco-asa-5515-mikrotik-site-to-site-ipsec-vpn/m-p/2824556#M106978</guid>
      <dc:creator>falangerr</dc:creator>
      <dc:date>2015-11-12T13:05:14Z</dc:date>
    </item>
    <item>
      <title>Looking at the debugs:-</title>
      <link>https://community.cisco.com/t5/vpn/cisco-asa-5515-mikrotik-site-to-site-ipsec-vpn/m-p/2824557#M106979</link>
      <description>&lt;P&gt;Looking at the debugs:-&lt;/P&gt;
&lt;P&gt;%ASA-7-713236: IP = 2.2.2.2, &lt;SPAN style="text-decoration: underline;"&gt;&lt;STRONG&gt;IKE_DECODE RECEIVED&lt;/STRONG&gt; &lt;/SPAN&gt;Message (msgid=a4ee31c4) with payloads : HDR + HASH (8) + DELETE (12) + NONE (0) total length : 80&lt;BR /&gt;%ASA-7-715047: Group = 2.2.2.2, IP = 2.2.2.2, processing hash payload&lt;BR /&gt;%ASA-7-713906: Group = 2.2.2.2, IP = 2.2.2.2,&lt;SPAN style="text-decoration: underline;"&gt;&lt;STRONG&gt; processing delete&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;BR /&gt;%ASA-5-713050: Group = 2.2.2.2, IP = 2.2.2.2, &lt;SPAN style="text-decoration: underline;"&gt;&lt;STRONG&gt;Connection terminated &lt;/STRONG&gt;&lt;/SPAN&gt;for peer 2.2.2.2. &lt;SPAN style="text-decoration: underline;"&gt;&lt;STRONG&gt;Reason: Peer Terminate&lt;/STRONG&gt;&lt;/SPAN&gt; Remote Proxy 0.0.0.0, Local Proxy 0.0.0.0&lt;BR /&gt;%ASA-7-713906: Group = 2.2.2.2, IP = 2.2.2.2, IKE SA MM:c54dda3a terminating: flags 0x01004802, refcnt 0, tuncnt 0&lt;BR /&gt;%ASA-5-713259: Group = 2.2.2.2, IP = 2.2.2.2, &lt;SPAN style="text-decoration: underline;"&gt;&lt;STRONG&gt;Session is being torn down. Reason: User Requested&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;BR /&gt;%ASA-4-113019: Group = 2.2.2.2, Username = 2.2.2.2, IP = 2.2.2.2, Session disconnected. Session Type: LAN-to-LAN, Duration: 0h:12m:45s, Bytes xmt: 0, Bytes rcv: 0, Reason: User Requested&lt;BR /&gt;%ASA-7-713906: Ignoring msg to mark SA with dsID 98304 dead because SA deleted&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;You can see that we are getting a delete message from remote side and after processing , the session is torn down.&lt;/P&gt;
&lt;P&gt;Can you confirm if you have a VPN tunnel on Mikrotik having overlapping subnets to anothet VPN peer.&amp;nbsp;Also check if the interesting traffic is properly configured.&lt;BR /&gt;&lt;BR /&gt;Try removing the other tunnel from Mikrotik and initiate the tunnel to see if this tunnel comes up. It seems like Mikrotik device is sending the delete message and thus causing issue.There is nothing much we can do on the ASA side. You might want to put it up on Mikrotik forum as well.&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;Regards,&lt;BR /&gt;Dinesh Moudgil&lt;/P&gt;
&lt;P&gt;P.S. Please rate helpful posts.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 12 Nov 2015 14:31:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/vpn/cisco-asa-5515-mikrotik-site-to-site-ipsec-vpn/m-p/2824557#M106979</guid>
      <dc:creator>Dinesh Moudgil</dc:creator>
      <dc:date>2015-11-12T14:31:02Z</dc:date>
    </item>
    <item>
      <title>Thank's for help. This part</title>
      <link>https://community.cisco.com/t5/vpn/cisco-asa-5515-mikrotik-site-to-site-ipsec-vpn/m-p/2824558#M106980</link>
      <description>&lt;P&gt;Thank's for help. This part of log show this moment when I manually kill IPsec connection from Mikrotik to show you full process of negotiation.&lt;/P&gt;
&lt;P&gt;And yes. There was two VPN tunnels on those Mikrotik. The second tunnel is disabled now and nothing changed.&lt;/P&gt;</description>
      <pubDate>Thu, 12 Nov 2015 14:41:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/vpn/cisco-asa-5515-mikrotik-site-to-site-ipsec-vpn/m-p/2824558#M106980</guid>
      <dc:creator>falangerr</dc:creator>
      <dc:date>2015-11-12T14:41:20Z</dc:date>
    </item>
    <item>
      <title>Hi falangerr, </title>
      <link>https://community.cisco.com/t5/vpn/cisco-asa-5515-mikrotik-site-to-site-ipsec-vpn/m-p/2824559#M106981</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;A href="https://supportforums.cisco.com/users/falangerr"&gt;&lt;SPAN style="color: windowtext; text-decoration: none; text-underline: none;"&gt;falangerr&lt;/SPAN&gt;&lt;/A&gt;,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I reviewed the debugs, and I agree with Dinesh we receive process delete from the remote end. However I have one more concern why we received remote proxy as "any any" instead of specific one ?&lt;/P&gt;
&lt;P&gt;Could you please check with remote end to conform what is the remote proxy they used.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In most third party devices I see they build tunnel using 2 ways one is Route based and another is access-list based, please inform the remote end to use Mirrored crypto ACL. The remote end ACl should be like "10.7.0.0 255.255.255.0&amp;nbsp;10.6.0.0 255.255.255.0"&amp;nbsp;&lt;/P&gt;
&lt;P&gt;And if they use “any any” on the other end always we should be the initiator always.&lt;/P&gt;
&lt;P&gt;This kind of peer termination problem occurs, Consider your tunnel is up as you initiated the traffic, Since remote end us using “any any” consider remote end initiate the traffic apart from 10.6.0.0/24 and ASA &amp;nbsp;receives crypto ACL as any any as shown in the log and chances that we delete the tunnel since ASA don’t have that in the crypto map.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So to avoid this situations make the Crypto ACL to be mirrored.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Please let me know the below information&lt;/P&gt;
&lt;P&gt;Was the tunnel coming up when you initiate the traffic from ASA end ? The reason I ask you is the below output show its up for 12M and tearing it down ?&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 11.0pt; font-family: 'Arial','sans-serif'; color: #333333; background: white;"&gt;Requested&lt;/SPAN&gt;&lt;SPAN style="font-size: 11.0pt; font-family: 'Arial','sans-serif'; color: #333333;"&gt;&lt;BR style="outline: none; orphans: auto; text-align: start; widows: 1; -webkit-text-stroke-width: 0px; word-spacing: 0px;" /&gt; &lt;SPAN style="background: white;"&gt;&lt;SPAN style="orphans: auto; text-align: start; widows: 1; -webkit-text-stroke-width: 0px; float: none; word-spacing: 0px;"&gt;%ASA-4-113019: Group = 2.2.2.2, Username = 2.2.2.2, IP = 2.2.2.2, Session disconnected. Session Type: LAN-to-LAN, Duration: 0h:12m:45s, Bytes xmt: 0, Bytes rcv: 0, Reason: User Requested&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-family: 'Century','serif'; color: black;"&gt;Thanks,&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-family: 'Century','serif'; color: black;"&gt;Regards,&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-family: 'Century','serif'; color: black;"&gt;Swj.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 13 Nov 2015 05:58:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/vpn/cisco-asa-5515-mikrotik-site-to-site-ipsec-vpn/m-p/2824559#M106981</guid>
      <dc:creator>swj</dc:creator>
      <dc:date>2015-11-13T05:58:54Z</dc:date>
    </item>
    <item>
      <title>Good day! We receive process</title>
      <link>https://community.cisco.com/t5/vpn/cisco-asa-5515-mikrotik-site-to-site-ipsec-vpn/m-p/2824560#M106982</link>
      <description>&lt;P&gt;Good day!&amp;nbsp;W&lt;SPAN&gt;e receive process delete from the remote end (from Mikrotik) because I manually kill vpn connection to show full process of starting ike.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;I don't actually understand what you mean in words "remote proxy as any any". If you mean &amp;nbsp;ACL which should specify interesting traffic - Mikrotik has mirrored policy (like cisco ACL):&lt;/P&gt;
&lt;P&gt;[admin@Brest-R] &amp;gt; ip ipsec policy print&lt;BR /&gt;Flags: T - template, X - disabled, D - dynamic, I - inactive, * - default&lt;BR /&gt; 0 TX* group=group1 src-address=::/0 dst-address=::/0 protocol=all proposal=default template=yes&lt;/P&gt;
&lt;P&gt;2 src-address=10.7.0.0/24 src-port=any dst-address=10.6.0.0/24 dst-port=any protocol=all action=encrypt&lt;BR /&gt; level=require ipsec-protocols=esp tunnel=yes sa-src-address=2.2.2.2 sa-dst-address=1.1.1.1&lt;BR /&gt; proposal=test priority=0&lt;/P&gt;
&lt;P&gt;And Mikrotik rules is more like ACL then router based.&lt;/P&gt;
&lt;P&gt;When first phase is up, I always try to ping from Mikrotik with command:&lt;/P&gt;
&lt;P&gt;[admin@Brest-R] &amp;gt; ping 10.6.0.1 src-address=10.7.0.1&lt;/P&gt;
&lt;P&gt;And from ASA with command:&lt;/P&gt;
&lt;P&gt;ASA# ping 10.7.0.1&lt;BR /&gt;Type escape sequence to abort.&lt;BR /&gt;Sending 5, 100-byte ICMP Echos to 10.7.0.1, timeout is 2 seconds:&lt;BR /&gt;?????&lt;BR /&gt;Success rate is 0 percent (0/5)&lt;/P&gt;
&lt;P&gt;I do ping from two devices at one time when first phase of negotiation comming up.&lt;/P&gt;
&lt;P&gt;And the last. You can see 12 minutes uptime because tunnel was in up state 12 minutes, until I manually drop it down. Tunnel can be in up state one, two , three , ten hours and etc. it is doesn't matter. But second phase of negotiation has never installed between this two devices : (&lt;/P&gt;</description>
      <pubDate>Fri, 13 Nov 2015 07:59:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/vpn/cisco-asa-5515-mikrotik-site-to-site-ipsec-vpn/m-p/2824560#M106982</guid>
      <dc:creator>falangerr</dc:creator>
      <dc:date>2015-11-13T07:59:01Z</dc:date>
    </item>
    <item>
      <title>What i mean by remote proxy</title>
      <link>https://community.cisco.com/t5/vpn/cisco-asa-5515-mikrotik-site-to-site-ipsec-vpn/m-p/2824561#M106983</link>
      <description>&lt;P&gt;What i mean by remote proxy any any&amp;nbsp;&lt;/P&gt;
&lt;P&gt;%ASA-5-713050: Group = 2.2.2.2, IP = 2.2.2.2, Connection terminated for peer 2.2.2.2. Reason: &lt;STRONG&gt;Peer Terminate Remote Proxy 0.0.0.0, Local Proxy 0.0.0.0&lt;/STRONG&gt; &amp;gt;&amp;gt;&amp;gt;.&amp;gt; &amp;nbsp;&lt;/P&gt;
&lt;P&gt;Anf one more thing from the debugs provided i can see phase-1 completed however there is no IPSEC debugs i see after the pahse-1. Please can you collect the ipsec debugs again.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 13 Nov 2015 19:54:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/vpn/cisco-asa-5515-mikrotik-site-to-site-ipsec-vpn/m-p/2824561#M106983</guid>
      <dc:creator>swj</dc:creator>
      <dc:date>2015-11-13T19:54:01Z</dc:date>
    </item>
    <item>
      <title>Unfortunatly I don't know the</title>
      <link>https://community.cisco.com/t5/vpn/cisco-asa-5515-mikrotik-site-to-site-ipsec-vpn/m-p/2824562#M106984</link>
      <description>&lt;P&gt;Unfortunatly I don't know the reason why we see 0.0.0.0 instead of specific IP address. I can only tell that&amp;nbsp;addresses of local and remote peers are specified on Mikrotik router:&lt;/P&gt;
&lt;P&gt;address=1.1.1.1/32 local-address=2.2.2.2&amp;nbsp;passive=no port=500 auth-method=pre-shared-key&amp;nbsp;secret="test" generate-policy=no policy-template-group=group1 exchange-mode=main send-initial-contact=yes&amp;nbsp;nat-traversal=no proposal-check=obey hash-algorithm=sha1 enc-algorithm=3des,aes-128,aes-192,aes-256&amp;nbsp;dh-group=modp1024 lifetime=1d lifebytes=0 dpd-interval=2m dpd-maximum-failures=2&lt;/P&gt;
&lt;P&gt;And it has specific policies for this peers:&lt;/P&gt;
&lt;P&gt;src-address=10.7.0.0/24 src-port=any dst-address=10.6.0.0/24 dst-port=any protocol=all action=encrypt&amp;nbsp;level=require ipsec-protocols=esp tunnel=yes sa-src-address=2.2.2.2&amp;nbsp;sa-dst-address=1.1.1.1 proposal=newland priority=0&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;And here it is my log again. Tunnel was in down state at moment of start logging.&lt;/P&gt;
&lt;P&gt;Newland-ASA(config)# show logging&lt;BR /&gt;Syslog logging: enabled&lt;BR /&gt; Facility: 20&lt;BR /&gt; Timestamp logging: disabled&lt;BR /&gt; Standby logging: disabled&lt;BR /&gt; Debug-trace logging: disabled&lt;BR /&gt; Console logging: disabled&lt;BR /&gt; Monitor logging: level debugging, 658720 messages logged&lt;BR /&gt; Buffer logging: level debugging, 658666 messages logged&lt;BR /&gt; Trap logging: disabled&lt;BR /&gt; Permit-hostdown logging: disabled&lt;BR /&gt; History logging: disabled&lt;BR /&gt; Device ID: disabled&lt;BR /&gt; Mail logging: disabled&lt;BR /&gt; ASDM logging: level informational, 74808 messages logged&lt;BR /&gt;%ASA-5-111008: User 'enable_15' executed the 'clear logging buffer' command.&lt;BR /&gt;%ASA-5-111010: User 'enable_15', running 'CLI' from IP 10.1.1.197, executed 'clear logging buffer'&lt;BR /&gt;%ASA-5-111008: User 'enable_15' executed the 'debug crypto condition peer 2.2.2.2' command.&lt;BR /&gt;%ASA-5-111010: User 'enable_15', running 'CLI' from IP 10.1.1.197, executed 'debug crypto condition peer 2.2.2.2'&lt;BR /&gt;%ASA-5-111008: User 'enable_15' executed the 'debug crypto isakmp 255' command.&lt;BR /&gt;%ASA-5-111010: User 'enable_15', running 'CLI' from IP 10.1.1.197, executed 'debug crypto isakmp 255'&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.211/2051 to LAN:255.255.255.255/7437&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.211/2051 to TEST:255.255.255.255/7437&lt;BR /&gt;%ASA-5-111008: User 'enable_15' executed the 'debug crypto ipsec 255' command.&lt;BR /&gt;%ASA-5-111010: User 'enable_15', running 'CLI' from IP 10.1.1.197, executed 'debug crypto ipsec 255'&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 176.192.187.45/12179 to WAN:1.1.1.1/9000&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.127/17500 to LAN:255.255.255.255/17500&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.127/17500 to TEST:255.255.255.255/17500&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.211/2051 to LAN:255.255.255.255/7437&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.211/2051 to TEST:255.255.255.255/7437&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 176.192.187.45/12179 to WAN:1.1.1.1/9000&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.211/2051 to LAN:255.255.255.255/7437&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.211/2051 to TEST:255.255.255.255/7437&lt;BR /&gt;%ASA-4-733100: [ Scanning] drop rate-1 exceeded. Current burst rate is 5 per second, max configured rate is 10; Current average rate is 12 per second, max configured rate is 5; Cumulative total count is 7271&lt;BR /&gt;%ASA-7-713236: IP = 2.2.2.2, IKE_DECODE RECEIVED Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + VENDOR (13) + NONE (0) total length : 244&lt;BR /&gt;%ASA-7-715047: IP = 2.2.2.2, processing SA payload&lt;BR /&gt;%ASA-7-713906: IP = 2.2.2.2, Oakley proposal is acceptable&lt;BR /&gt;%ASA-7-715047: IP = 2.2.2.2, processing VID payload&lt;BR /&gt;%ASA-7-715049: IP = 2.2.2.2, Received Cisco Unity client VID&lt;BR /&gt;%ASA-7-715047: IP = 2.2.2.2, processing VID payload&lt;BR /&gt;%ASA-7-715049: IP = 2.2.2.2, Received DPD VID&lt;BR /&gt;%ASA-7-715047: IP = 2.2.2.2, processing IKE SA payload&lt;BR /&gt;%ASA-7-715028: IP = 2.2.2.2, IKE SA Proposal # 1, Transform # 4 acceptable Matches global IKE entry # 13&lt;BR /&gt;%ASA-7-715046: IP = 2.2.2.2, constructing ISAKMP SA payload&lt;BR /&gt;%ASA-7-715046: IP = 2.2.2.2, constructing Fragmentation VID + extended capabilities payload&lt;BR /&gt;%ASA-7-713236: IP = 2.2.2.2, IKE_DECODE SENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 112&lt;BR /&gt;%ASA-7-713236: IP = 2.2.2.2, IKE_DECODE RECEIVED Message (msgid=0) with payloads : HDR + KE (4) + NONCE (10) + NONE (0) total length : 188&lt;BR /&gt;%ASA-7-715047: IP = 2.2.2.2, processing ke payload&lt;BR /&gt;%ASA-7-715047: IP = 2.2.2.2, processing ISA_KE payload&lt;BR /&gt;%ASA-7-715047: IP = 2.2.2.2, processing nonce payload&lt;BR /&gt;%ASA-7-715046: IP = 2.2.2.2, constructing ke payload&lt;BR /&gt;%ASA-7-715046: IP = 2.2.2.2, constructing nonce payload&lt;BR /&gt;%ASA-7-715046: IP = 2.2.2.2, constructing Cisco Unity VID payload&lt;BR /&gt;%ASA-7-715046: IP = 2.2.2.2, constructing xauth V6 VID payload&lt;BR /&gt;%ASA-7-715048: IP = 2.2.2.2, Send IOS VID&lt;BR /&gt;%ASA-7-715038: IP = 2.2.2.2, Constructing ASA spoofing IOS Vendor ID payload (version: 1.0.0, capabilities: 20000001)&lt;BR /&gt;%ASA-7-715046: IP = 2.2.2.2, constructing VID payload&lt;BR /&gt;%ASA-7-715048: IP = 2.2.2.2, Send Altiga/Cisco VPN3000/Cisco ASA GW VID&lt;BR /&gt;%ASA-7-713906: IP = 2.2.2.2, Connection landed on tunnel_group 2.2.2.2&lt;BR /&gt;%ASA-7-713906: Group = 2.2.2.2, IP = 2.2.2.2, Generating keys for Responder...&lt;BR /&gt;%ASA-7-713236: IP = 2.2.2.2, IKE_DECODE SENDING Message (msgid=0) with payloads : HDR + KE (4) + NONCE (10) + VENDOR (13) + VENDOR (13) + VENDOR (13) + VENDOR (13) + NONE (0) total length : 256&lt;BR /&gt;%ASA-6-302013: Built inbound TCP connection 13094 for LAN:10.1.1.197/52695 (10.1.1.197/52695) to identity:10.1.1.254/443 (10.1.1.254/443)&lt;BR /&gt;%ASA-6-725001: Starting SSL handshake with client LAN:10.1.1.197/52695 for TLSv1 session.&lt;BR /&gt;%ASA-7-725010: Device supports the following 4 cipher(s).&lt;BR /&gt;%ASA-7-725011: Cipher[1] : RC4-SHA&lt;BR /&gt;%ASA-7-725011: Cipher[2] : AES128-SHA&lt;BR /&gt;%ASA-7-725011: Cipher[3] : AES256-SHA&lt;BR /&gt;%ASA-7-725011: Cipher[4] : DES-CBC3-SHA&lt;BR /&gt;%ASA-7-725008: SSL client LAN:10.1.1.197/52695 proposes the following 8 cipher(s).&lt;BR /&gt;%ASA-7-725011: Cipher[1] : AES128-SHA&lt;BR /&gt;%ASA-7-725011: Cipher[2] : DHE-RSA-AES128-SHA&lt;BR /&gt;%ASA-7-725011: Cipher[3] : DHE-DSS-AES128-SHA&lt;BR /&gt;%ASA-7-725011: Cipher[4] : DES-CBC3-SHA&lt;BR /&gt;%ASA-7-725011: Cipher[5] : EDH-RSA-DES-CBC3-SHA&lt;BR /&gt;%ASA-7-725011: Cipher[6] : EDH-DSS-DES-CBC3-SHA&lt;BR /&gt;%ASA-7-725011: Cipher[7] : RC4-SHA&lt;BR /&gt;%ASA-7-725011: Cipher[8] : RC4-MD5&lt;BR /&gt;%ASA-7-725012: Device chooses cipher : RC4-SHA for the SSL session with client LAN:10.1.1.197/52695&lt;BR /&gt;%ASA-6-725002: Device completed SSL handshake with client LAN:10.1.1.197/52695&lt;BR /&gt;%ASA-6-113012: AAA user authentication Successful : local database : user = admin&lt;BR /&gt;%ASA-6-113008: AAA transaction status ACCEPT : user = admin&lt;BR /&gt;%ASA-6-611101: User authentication succeeded: Uname: admin&lt;BR /&gt;%ASA-6-605005: Login permitted from 10.1.1.197/52695 to LAN:10.1.1.254/https for user "admin"&lt;BR /&gt;%ASA-7-713236: IP = 2.2.2.2, IKE_DECODE RECEIVED Message (msgid=0) with payloads : HDR + ID (5) + HASH (8) + NONE (0) total length : 64&lt;BR /&gt;%ASA-7-715047: Group = 2.2.2.2, IP = 2.2.2.2, processing ID payload&lt;BR /&gt;%ASA-7-714011: Group = 2.2.2.2, IP = 2.2.2.2, ID_IPV4_ADDR ID received&lt;BR /&gt;2.2.2.2&lt;BR /&gt;%ASA-7-715047: Group = 2.2.2.2, IP = 2.2.2.2, processing hash payload&lt;BR /&gt;%ASA-7-715076: Group = 2.2.2.2, IP = 2.2.2.2, Computing hash for ISAKMP&lt;BR /&gt;%ASA-7-713906: IP = 2.2.2.2, Connection landed on tunnel_group 2.2.2.2&lt;BR /&gt;%ASA-7-715046: Group = 2.2.2.2, IP = 2.2.2.2, constructing ID payload&lt;BR /&gt;%ASA-7-715046: Group = 2.2.2.2, IP = 2.2.2.2, constructing hash payload&lt;BR /&gt;%ASA-7-715076: Group = 2.2.2.2, IP = 2.2.2.2, Computing hash for ISAKMP&lt;BR /&gt;%ASA-7-715046: Group = 2.2.2.2, IP = 2.2.2.2, constructing dpd vid payload&lt;BR /&gt;%ASA-7-713236: IP = 2.2.2.2, IKE_DECODE SENDING Message (msgid=0) with payloads : HDR + ID (5) + HASH (8) + VENDOR (13) + NONE (0) total length : 84&lt;BR /&gt;%ASA-6-113009: AAA retrieved default group policy (GroupPolicy_2.2.2.2) for user = 2.2.2.2&lt;BR /&gt;%ASA-5-713119: Group = 2.2.2.2, IP = 2.2.2.2, PHASE 1 COMPLETED&lt;BR /&gt;%ASA-7-713121: IP = 2.2.2.2, Keep-alive type for this connection: DPD&lt;BR /&gt;%ASA-7-715080: Group = 2.2.2.2, IP = 2.2.2.2, Starting P1 rekey timer: 82080 seconds.&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.211/2051 to LAN:255.255.255.255/7437&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.211/2051 to TEST:255.255.255.255/7437&lt;BR /&gt;%ASA-7-111009: User 'admin' executed cmd: show module cxsc details&lt;BR /&gt;%ASA-6-725007: SSL session with client LAN:10.1.1.197/52695 terminated.&lt;BR /&gt;%ASA-6-302014: Teardown TCP connection 13094 for LAN:10.1.1.197/52695 to identity:10.1.1.254/443 duration 0:00:00 bytes 1662 TCP Reset-O&lt;BR /&gt;%ASA-6-106015: Deny TCP (no connection) from 10.1.1.197/52695 to 10.1.1.254/443 flags FIN ACK on interface LAN&lt;BR /&gt;%ASA-7-710005: TCP request discarded from 10.1.1.197/52695 to LAN:10.1.1.254/443&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.100.100.4/62976 to LAN:255.255.255.255/62976&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.100.100.4/62976 to TEST:255.255.255.255/62976&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 192.168.88.3/5678 to LAN:255.255.255.255/5678&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 192.168.88.3/5678 to TEST:255.255.255.255/5678&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.13/56978 to LAN:255.255.255.255/1947&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.13/56978 to TEST:255.255.255.255/1947&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 176.192.187.45/12179 to WAN:1.1.1.1/9000&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.211/2051 to LAN:255.255.255.255/7437&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.211/2051 to TEST:255.255.255.255/7437&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.23/17500 to LAN:255.255.255.255/17500&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.23/17500 to TEST:255.255.255.255/17500&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.23/17500 to LAN:255.255.255.255/17500&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.23/17500 to TEST:255.255.255.255/17500&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.211/2051 to LAN:255.255.255.255/7437&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.211/2051 to TEST:255.255.255.255/7437&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.211/2051 to LAN:255.255.255.255/7437&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.211/2051 to TEST:255.255.255.255/7437&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.111/17500 to TEST:255.255.255.255/17500&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.111/17500 to LAN:255.255.255.255/17500&lt;BR /&gt;%ASA-6-302013: Built inbound TCP connection 13096 for LAN:10.1.1.197/52696 (10.1.1.197/52696) to identity:10.1.1.254/443 (10.1.1.254/443)&lt;BR /&gt;%ASA-6-725001: Starting SSL handshake with client LAN:10.1.1.197/52696 for TLSv1 session.&lt;BR /&gt;%ASA-7-725010: Device supports the following 4 cipher(s).&lt;BR /&gt;%ASA-7-725011: Cipher[1] : RC4-SHA&lt;BR /&gt;%ASA-7-725011: Cipher[2] : AES128-SHA&lt;BR /&gt;%ASA-7-725011: Cipher[3] : AES256-SHA&lt;BR /&gt;%ASA-7-725011: Cipher[4] : DES-CBC3-SHA&lt;BR /&gt;%ASA-7-725008: SSL client LAN:10.1.1.197/52696 proposes the following 8 cipher(s).&lt;BR /&gt;%ASA-7-725011: Cipher[1] : AES128-SHA&lt;BR /&gt;%ASA-7-725011: Cipher[2] : DHE-RSA-AES128-SHA&lt;BR /&gt;%ASA-7-725011: Cipher[3] : DHE-DSS-AES128-SHA&lt;BR /&gt;%ASA-7-725011: Cipher[4] : DES-CBC3-SHA&lt;BR /&gt;%ASA-7-725011: Cipher[5] : EDH-RSA-DES-CBC3-SHA&lt;BR /&gt;%ASA-7-725011: Cipher[6] : EDH-DSS-DES-CBC3-SHA&lt;BR /&gt;%ASA-7-725011: Cipher[7] : RC4-SHA&lt;BR /&gt;%ASA-7-725011: Cipher[8] : RC4-MD5&lt;BR /&gt;%ASA-7-725012: Device chooses cipher : RC4-SHA for the SSL session with client LAN:10.1.1.197/52696&lt;BR /&gt;%ASA-6-725002: Device completed SSL handshake with client LAN:10.1.1.197/52696&lt;BR /&gt;%ASA-6-113012: AAA user authentication Successful : local database : user = admin&lt;BR /&gt;%ASA-6-113008: AAA transaction status ACCEPT : user = admin&lt;BR /&gt;%ASA-6-611101: User authentication succeeded: Uname: admin&lt;BR /&gt;%ASA-6-605005: Login permitted from 10.1.1.197/52696 to LAN:10.1.1.254/https for user "admin"&lt;BR /&gt;%ASA-7-111009: User 'admin' executed cmd: show module cxsc details&lt;BR /&gt;%ASA-6-725007: SSL session with client LAN:10.1.1.197/52696 terminated.&lt;BR /&gt;%ASA-6-302014: Teardown TCP connection 13096 for LAN:10.1.1.197/52696 to identity:10.1.1.254/443 duration 0:00:00 bytes 1662 TCP Reset-O&lt;BR /&gt;%ASA-6-106015: Deny TCP (no connection) from 10.1.1.197/52696 to 10.1.1.254/443 flags FIN ACK on interface LAN&lt;BR /&gt;%ASA-7-710005: TCP request discarded from 10.1.1.197/52696 to LAN:10.1.1.254/443&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.211/2051 to LAN:255.255.255.255/7437&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.211/2051 to TEST:255.255.255.255/7437&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.161/68 to LAN:255.255.255.255/67&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.161/68 to TEST:255.255.255.255/67&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 176.114.205.102/49105 to WAN:1.1.1.1/9000&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.211/2051 to LAN:255.255.255.255/7437&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.211/2051 to TEST:255.255.255.255/7437&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 0.0.0.0/5678 to LAN:255.255.255.255/5678&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 0.0.0.0/5678 to TEST:255.255.255.255/5678&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.211/2051 to LAN:255.255.255.255/7437&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.211/2051 to TEST:255.255.255.255/7437&lt;BR /&gt;%ASA-4-733100: [ Scanning] drop rate-1 exceeded. Current burst rate is 6 per second, max configured rate is 10; Current average rate is 12 per second, max configured rate is 5; Cumulative total count is 7334&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 176.114.205.102/49105 to WAN:1.1.1.1/9000&lt;BR /&gt;%ASA-7-715036: Group = 2.2.2.2, IP = 2.2.2.2, Sending keep-alive of type DPD R-U-THERE (seq number 0x2b8a09a6)&lt;BR /&gt;%ASA-7-715046: Group = 2.2.2.2, IP = 2.2.2.2, constructing blank hash payload&lt;BR /&gt;%ASA-7-715046: Group = 2.2.2.2, IP = 2.2.2.2, constructing qm hash payload&lt;BR /&gt;%ASA-7-713236: IP = 2.2.2.2, IKE_DECODE SENDING Message (msgid=efe509bb) with payloads : HDR + HASH (8) + NOTIFY (11) + NONE (0) total length : 84&lt;BR /&gt;%ASA-7-713236: IP = 2.2.2.2, IKE_DECODE RECEIVED Message (msgid=d9014cb7) with payloads : HDR + HASH (8) + NOTIFY (11) + NONE (0) total length : 84&lt;BR /&gt;%ASA-7-715047: Group = 2.2.2.2, IP = 2.2.2.2, processing hash payload&lt;BR /&gt;%ASA-7-715047: Group = 2.2.2.2, IP = 2.2.2.2, processing notify payload&lt;BR /&gt;%ASA-7-715075: Group = 2.2.2.2, IP = 2.2.2.2, Received keep-alive of type DPD R-U-THERE-ACK (seq number 0x2b8a09a6)&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 93.178.113.253/41479 to WAN:1.1.1.1/9000&lt;BR /&gt;%ASA-6-302013: Built inbound TCP connection 13098 for LAN:10.1.1.197/52697 (10.1.1.197/52697) to identity:10.1.1.254/443 (10.1.1.254/443)&lt;BR /&gt;%ASA-6-725001: Starting SSL handshake with client LAN:10.1.1.197/52697 for TLSv1 session.&lt;BR /&gt;%ASA-7-725010: Device supports the following 4 cipher(s).&lt;BR /&gt;%ASA-7-725011: Cipher[1] : RC4-SHA&lt;BR /&gt;%ASA-7-725011: Cipher[2] : AES128-SHA&lt;BR /&gt;%ASA-7-725011: Cipher[3] : AES256-SHA&lt;BR /&gt;%ASA-7-725011: Cipher[4] : DES-CBC3-SHA&lt;BR /&gt;%ASA-7-725008: SSL client LAN:10.1.1.197/52697 proposes the following 8 cipher(s).&lt;BR /&gt;%ASA-7-725011: Cipher[1] : AES128-SHA&lt;BR /&gt;%ASA-7-725011: Cipher[2] : DHE-RSA-AES128-SHA&lt;BR /&gt;%ASA-7-725011: Cipher[3] : DHE-DSS-AES128-SHA&lt;BR /&gt;%ASA-7-725011: Cipher[4] : DES-CBC3-SHA&lt;BR /&gt;%ASA-7-725011: Cipher[5] : EDH-RSA-DES-CBC3-SHA&lt;BR /&gt;%ASA-7-725011: Cipher[6] : EDH-DSS-DES-CBC3-SHA&lt;BR /&gt;%ASA-7-725011: Cipher[7] : RC4-SHA&lt;BR /&gt;%ASA-7-725011: Cipher[8] : RC4-MD5&lt;BR /&gt;%ASA-7-725012: Device chooses cipher : RC4-SHA for the SSL session with client LAN:10.1.1.197/52697&lt;BR /&gt;%ASA-6-725002: Device completed SSL handshake with client LAN:10.1.1.197/52697&lt;BR /&gt;%ASA-6-113012: AAA user authentication Successful : local database : user = admin&lt;BR /&gt;%ASA-6-113008: AAA transaction status ACCEPT : user = admin&lt;BR /&gt;%ASA-6-611101: User authentication succeeded: Uname: admin&lt;BR /&gt;%ASA-6-605005: Login permitted from 10.1.1.197/52697 to LAN:10.1.1.254/https for user "admin"&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 217.29.190.250/37258 to WAN:1.1.1.1/9000&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.211/2051 to LAN:255.255.255.255/7437&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.211/2051 to TEST:255.255.255.255/7437&lt;BR /&gt;%ASA-7-111009: User 'admin' executed cmd: show module cxsc details&lt;BR /&gt;%ASA-6-725007: SSL session with client LAN:10.1.1.197/52697 terminated.&lt;BR /&gt;%ASA-6-302014: Teardown TCP connection 13098 for LAN:10.1.1.197/52697 to identity:10.1.1.254/443 duration 0:00:00 bytes 1662 TCP Reset-O&lt;BR /&gt;%ASA-6-106015: Deny TCP (no connection) from 10.1.1.197/52697 to 10.1.1.254/443 flags FIN ACK on interface LAN&lt;BR /&gt;%ASA-7-710005: TCP request discarded from 10.1.1.197/52697 to LAN:10.1.1.254/443&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 217.29.190.250/37258 to WAN:1.1.1.1/9000&lt;BR /&gt;%ASA-7-710005: TCP request discarded from 217.29.190.250/58688 to WAN:1.1.1.1/9000&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.127/17500 to LAN:255.255.255.255/17500&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.127/17500 to TEST:255.255.255.255/17500&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 93.178.113.253/41479 to WAN:1.1.1.1/9000&lt;BR /&gt;%ASA-7-710005: TCP request discarded from 93.178.113.253/64092 to WAN:1.1.1.1/9000&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.211/2051 to LAN:255.255.255.255/7437&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.211/2051 to TEST:255.255.255.255/7437&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 176.114.205.102/49105 to WAN:1.1.1.1/9000&lt;BR /&gt;%ASA-6-302020: Built outbound ICMP connection for faddr 10.7.0.1/0 gaddr 1.1.1.1/1840 laddr 1.1.1.1/1840&lt;BR /&gt;%ASA-7-710005: TCP request discarded from 217.29.190.250/58688 to WAN:1.1.1.1/9000&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 217.29.190.250/37258 to WAN:1.1.1.1/9000&lt;BR /&gt;%ASA-7-710005: TCP request discarded from 93.178.113.253/64092 to WAN:1.1.1.1/9000&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.211/2051 to LAN:255.255.255.255/7437&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.211/2051 to TEST:255.255.255.255/7437&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 93.178.113.253/41479 to WAN:1.1.1.1/9000&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.1/60783 to TEST:255.255.255.255/5678&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.1/60783 to LAN:255.255.255.255/5678&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.86/68 to LAN:255.255.255.255/67&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.86/68 to TEST:255.255.255.255/67&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.1/67 to TEST:255.255.255.255/68&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.1/67 to LAN:255.255.255.255/68&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.211/2051 to LAN:255.255.255.255/7437&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.211/2051 to TEST:255.255.255.255/7437&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.100.100.4/62976 to LAN:255.255.255.255/62976&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.100.100.4/62976 to TEST:255.255.255.255/62976&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.107/68 to LAN:255.255.255.255/67&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.107/68 to TEST:255.255.255.255/67&lt;BR /&gt;%ASA-6-302013: Built inbound TCP connection 13101 for LAN:10.1.1.197/52698 (10.1.1.197/52698) to identity:10.1.1.254/443 (10.1.1.254/443)&lt;BR /&gt;%ASA-6-725001: Starting SSL handshake with client LAN:10.1.1.197/52698 for TLSv1 session.&lt;BR /&gt;%ASA-7-725010: Device supports the following 4 cipher(s).&lt;BR /&gt;%ASA-7-725011: Cipher[1] : RC4-SHA&lt;BR /&gt;%ASA-7-725011: Cipher[2] : AES128-SHA&lt;BR /&gt;%ASA-7-725011: Cipher[3] : AES256-SHA&lt;BR /&gt;%ASA-7-725011: Cipher[4] : DES-CBC3-SHA&lt;BR /&gt;%ASA-7-725008: SSL client LAN:10.1.1.197/52698 proposes the following 8 cipher(s).&lt;BR /&gt;%ASA-7-725011: Cipher[1] : AES128-SHA&lt;BR /&gt;%ASA-7-725011: Cipher[2] : DHE-RSA-AES128-SHA&lt;BR /&gt;%ASA-7-725011: Cipher[3] : DHE-DSS-AES128-SHA&lt;BR /&gt;%ASA-7-725011: Cipher[4] : DES-CBC3-SHA&lt;BR /&gt;%ASA-7-725011: Cipher[5] : EDH-RSA-DES-CBC3-SHA&lt;BR /&gt;%ASA-7-725011: Cipher[6] : EDH-DSS-DES-CBC3-SHA&lt;BR /&gt;%ASA-7-725011: Cipher[7] : RC4-SHA&lt;BR /&gt;%ASA-7-725011: Cipher[8] : RC4-MD5&lt;BR /&gt;%ASA-7-725012: Device chooses cipher : RC4-SHA for the SSL session with client LAN:10.1.1.197/52698&lt;BR /&gt;%ASA-6-725002: Device completed SSL handshake with client LAN:10.1.1.197/52698&lt;BR /&gt;%ASA-6-113012: AAA user authentication Successful : local database : user = admin&lt;BR /&gt;%ASA-6-113008: AAA transaction status ACCEPT : user = admin&lt;BR /&gt;%ASA-6-611101: User authentication succeeded: Uname: admin&lt;BR /&gt;%ASA-6-605005: Login permitted from 10.1.1.197/52698 to LAN:10.1.1.254/https for user "admin"&lt;BR /&gt;%ASA-7-111009: User 'admin' executed cmd: show module cxsc details&lt;BR /&gt;%ASA-6-725007: SSL session with client LAN:10.1.1.197/52698 terminated.&lt;BR /&gt;%ASA-6-302014: Teardown TCP connection 13101 for LAN:10.1.1.197/52698 to identity:10.1.1.254/443 duration 0:00:00 bytes 1662 TCP Reset-O&lt;BR /&gt;%ASA-6-106015: Deny TCP (no connection) from 10.1.1.197/52698 to 10.1.1.254/443 flags FIN ACK on interface LAN&lt;BR /&gt;%ASA-7-710005: TCP request discarded from 10.1.1.197/52698 to LAN:10.1.1.254/443&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 192.168.88.1/5678 to LAN:255.255.255.255/5678&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 192.168.88.1/5678 to TEST:255.255.255.255/5678&lt;BR /&gt;%ASA-7-710005: TCP request discarded from 217.29.190.250/58688 to WAN:1.1.1.1/9000&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 217.29.190.250/37258 to WAN:1.1.1.1/9000&lt;BR /&gt;%ASA-7-710005: TCP request discarded from 93.178.113.253/64092 to WAN:1.1.1.1/9000&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.211/2051 to LAN:255.255.255.255/7437&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.211/2051 to TEST:255.255.255.255/7437&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 93.178.113.253/41479 to WAN:1.1.1.1/9000&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.146/68 to LAN:255.255.255.255/67&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.146/68 to TEST:255.255.255.255/67&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.23/17500 to LAN:255.255.255.255/17500&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.23/17500 to TEST:255.255.255.255/17500&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.23/17500 to LAN:255.255.255.255/17500&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.23/17500 to TEST:255.255.255.255/17500&lt;BR /&gt;%ASA-5-111008: User 'enable_15' executed the 'ping 10.7.0.1' command.&lt;BR /&gt;%ASA-5-111010: User 'enable_15', running 'CLI' from IP 10.1.1.197, executed 'ping 10.7.0.1'&lt;BR /&gt;%ASA-6-302021: Teardown ICMP connection for faddr 10.7.0.1/0 gaddr 1.1.1.1/1840 laddr 1.1.1.1/1840&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.211/2051 to TEST:255.255.255.255/7437&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.211/2051 to LAN:255.255.255.255/7437&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 0.0.0.0/68 to LAN:255.255.255.255/67&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 0.0.0.0/68 to TEST:255.255.255.255/67&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.1/67 to TEST:255.255.255.255/68&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.1/67 to LAN:255.255.255.255/68&lt;BR /&gt;%ASA-4-733100: [ Scanning] drop rate-1 exceeded. Current burst rate is 8 per second, max configured rate is 10; Current average rate is 12 per second, max configured rate is 5; Cumulative total count is 7256&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 31.23.228.61/57975 to WAN:1.1.1.1/9000&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.211/2051 to LAN:255.255.255.255/7437&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.211/2051 to TEST:255.255.255.255/7437&lt;BR /&gt;%ASA-5-111008: User 'enable_15' executed the 'undebug all' command.&lt;BR /&gt;%ASA-7-715036: Group = 2.2.2.2, IP = 2.2.2.2, Sending keep-alive of type DPD R-U-THERE (seq number 0x2b8a09a7)&lt;BR /&gt;%ASA-7-715046: Group = 2.2.2.2, IP = 2.2.2.2, constructing blank hash payload&lt;BR /&gt;%ASA-7-715046: Group = 2.2.2.2, IP = 2.2.2.2, constructing qm hash payload&lt;BR /&gt;%ASA-7-713236: IP = 2.2.2.2, IKE_DECODE SENDING Message (msgid=88b0cb2c) with payloads : HDR + HASH (8) + NOTIFY (11) + NONE (0) total length : 84&lt;BR /&gt;%ASA-7-713236: IP = 2.2.2.2, IKE_DECODE RECEIVED Message (msgid=d95a1561) with payloads : HDR + HASH (8) + NOTIFY (11) + NONE (0) total length : 84&lt;BR /&gt;%ASA-7-715047: Group = 2.2.2.2, IP = 2.2.2.2, processing hash payload&lt;BR /&gt;%ASA-7-715047: Group = 2.2.2.2, IP = 2.2.2.2, processing notify payload&lt;BR /&gt;%ASA-7-715075: Group = 2.2.2.2, IP = 2.2.2.2, Received keep-alive of type DPD R-U-THERE-ACK (seq number 0x2b8a09a7)&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.111/17500 to LAN:255.255.255.255/17500&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.111/17500 to TEST:255.255.255.255/17500&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.13/56978 to LAN:255.255.255.255/1947&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.13/56978 to TEST:255.255.255.255/1947&lt;BR /&gt;%ASA-6-302013: Built inbound TCP connection 13103 for LAN:10.1.1.197/52699 (10.1.1.197/52699) to identity:10.1.1.254/443 (10.1.1.254/443)&lt;BR /&gt;%ASA-6-725001: Starting SSL handshake with client LAN:10.1.1.197/52699 for TLSv1 session.&lt;BR /&gt;%ASA-7-725010: Device supports the following 4 cipher(s).&lt;BR /&gt;%ASA-7-725011: Cipher[1] : RC4-SHA&lt;BR /&gt;%ASA-7-725011: Cipher[2] : AES128-SHA&lt;BR /&gt;%ASA-7-725011: Cipher[3] : AES256-SHA&lt;BR /&gt;%ASA-7-725011: Cipher[4] : DES-CBC3-SHA&lt;BR /&gt;%ASA-7-725008: SSL client LAN:10.1.1.197/52699 proposes the following 8 cipher(s).&lt;BR /&gt;%ASA-7-725011: Cipher[1] : AES128-SHA&lt;BR /&gt;%ASA-7-725011: Cipher[2] : DHE-RSA-AES128-SHA&lt;BR /&gt;%ASA-7-725011: Cipher[3] : DHE-DSS-AES128-SHA&lt;BR /&gt;%ASA-7-725011: Cipher[4] : DES-CBC3-SHA&lt;BR /&gt;%ASA-7-725011: Cipher[5] : EDH-RSA-DES-CBC3-SHA&lt;BR /&gt;%ASA-7-725011: Cipher[6] : EDH-DSS-DES-CBC3-SHA&lt;BR /&gt;%ASA-7-725011: Cipher[7] : RC4-SHA&lt;BR /&gt;%ASA-7-725011: Cipher[8] : RC4-MD5&lt;BR /&gt;%ASA-7-725012: Device chooses cipher : RC4-SHA for the SSL session with client LAN:10.1.1.197/52699&lt;BR /&gt;%ASA-6-725002: Device completed SSL handshake with client LAN:10.1.1.197/52699&lt;BR /&gt;%ASA-6-113012: AAA user authentication Successful : local database : user = admin&lt;BR /&gt;%ASA-6-113008: AAA transaction status ACCEPT : user = admin&lt;BR /&gt;%ASA-6-611101: User authentication succeeded: Uname: admin&lt;BR /&gt;%ASA-6-605005: Login permitted from 10.1.1.197/52699 to LAN:10.1.1.254/https for user "admin"&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.211/2051 to LAN:255.255.255.255/7437&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.211/2051 to TEST:255.255.255.255/7437&lt;BR /&gt;%ASA-7-111009: User 'admin' executed cmd: show module cxsc details&lt;BR /&gt;%ASA-6-725007: SSL session with client LAN:10.1.1.197/52699 terminated.&lt;BR /&gt;%ASA-6-302014: Teardown TCP connection 13103 for LAN:10.1.1.197/52699 to identity:10.1.1.254/443 duration 0:00:00 bytes 1662 TCP Reset-O&lt;BR /&gt;%ASA-6-106015: Deny TCP (no connection) from 10.1.1.197/52699 to 10.1.1.254/443 flags FIN ACK on interface LAN&lt;BR /&gt;%ASA-7-710005: TCP request discarded from 10.1.1.197/52699 to LAN:10.1.1.254/443&lt;BR /&gt;%ASA-7-710005: TCP request discarded from 78.58.205.83/64777 to WAN:1.1.1.1/9000&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 78.58.205.83/30682 to WAN:1.1.1.1/9000&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.70/68 to LAN:255.255.255.255/67&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.70/68 to TEST:255.255.255.255/67&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.1/67 to LAN:255.255.255.255/68&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.1/67 to TEST:255.255.255.255/68&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.85/68 to LAN:255.255.255.255/67&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.85/68 to TEST:255.255.255.255/67&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.211/2051 to LAN:255.255.255.255/7437&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.211/2051 to TEST:255.255.255.255/7437&lt;BR /&gt;%ASA-7-710005: TCP request discarded from 78.58.205.83/64777 to WAN:1.1.1.1/9000&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 78.58.205.83/30682 to WAN:1.1.1.1/9000&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.211/2051 to LAN:255.255.255.255/7437&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.211/2051 to TEST:255.255.255.255/7437&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.158/68 to LAN:255.255.255.255/67&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.158/68 to TEST:255.255.255.255/67&lt;BR /&gt;%ASA-6-302021: Teardown ICMP connection for faddr 10.7.0.1/0 gaddr 1.1.1.1/1032 laddr 10.1.1.1/1032&lt;BR /&gt;%ASA-7-609002: Teardown local-host WAN:10.7.0.1 duration 0:01:09&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.211/2051 to LAN:255.255.255.255/7437&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.211/2051 to TEST:255.255.255.255/7437&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 95.26.255.60/19982 to WAN:1.1.1.1/9000&lt;BR /&gt;%ASA-7-710005: TCP request discarded from 78.58.205.83/64777 to WAN:1.1.1.1/9000&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 78.58.205.83/30682 to WAN:1.1.1.1/9000&lt;BR /&gt;%ASA-6-302013: Built inbound TCP connection 13105 for LAN:10.1.1.197/52706 (10.1.1.197/52706) to identity:10.1.1.254/443 (10.1.1.254/443)&lt;BR /&gt;%ASA-6-725001: Starting SSL handshake with client LAN:10.1.1.197/52706 for TLSv1 session.&lt;/P&gt;</description>
      <pubDate>Mon, 16 Nov 2015 08:08:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/vpn/cisco-asa-5515-mikrotik-site-to-site-ipsec-vpn/m-p/2824562#M106984</guid>
      <dc:creator>falangerr</dc:creator>
      <dc:date>2015-11-16T08:08:16Z</dc:date>
    </item>
    <item>
      <title>Hi falangerr,</title>
      <link>https://community.cisco.com/t5/vpn/cisco-asa-5515-mikrotik-site-to-site-ipsec-vpn/m-p/2824563#M106985</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;A href="https://supportforums.cisco.com/users/falangerr" title="View user profile." class="username" lang="" about="/users/falangerr" typeof="sioc:UserAccount" property="foaf:name" datatype=""&gt;falangerr&lt;/A&gt;,&lt;/P&gt;
&lt;P&gt;I am afraid we do not see any phase 2 debugs here. All we get is Phase 1 completion message and keepalive packets between VPN endpoints.&lt;/P&gt;
&lt;P&gt;%ASA-5-713119: Group = 2.2.2.2, IP = 2.2.2.2, &lt;EM&gt;&lt;SPAN style="text-decoration: underline;"&gt;&lt;STRONG&gt;PHASE 1 COMPLETED&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;%ASA-7-715036: Group = 2.2.2.2, IP = 2.2.2.2, &lt;EM&gt;&lt;SPAN style="text-decoration: underline;"&gt;&lt;STRONG&gt;Sending keep-alive of type DPD&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/EM&gt; R-U-THERE (seq number 0x2b8a09a7)&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;%ASA-7-715075: Group = 2.2.2.2, IP = 2.2.2.2, &lt;EM&gt;&lt;SPAN style="text-decoration: underline;"&gt;&lt;STRONG&gt;Received keep-alive of type DPD&lt;/STRONG&gt; &lt;/SPAN&gt;&lt;/EM&gt;R-U-THERE-ACK (seq number 0x2b8a09a7)&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;Can you please confirm if you have the following commands while taking debugs:&lt;BR /&gt;debug crypto condition peer &lt;SPAN&gt;2.2.2.2&lt;/SPAN&gt;&lt;BR /&gt;debug crypto ipsec 200&lt;BR /&gt;&lt;BR /&gt;Regards,&lt;BR /&gt;Dinesh Moudgil&lt;BR /&gt;&lt;BR /&gt;P.S. Please rate helpful posts.&lt;/P&gt;</description>
      <pubDate>Tue, 17 Nov 2015 18:06:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/vpn/cisco-asa-5515-mikrotik-site-to-site-ipsec-vpn/m-p/2824563#M106985</guid>
      <dc:creator>Dinesh Moudgil</dc:creator>
      <dc:date>2015-11-17T18:06:05Z</dc:date>
    </item>
    <item>
      <title>Hi Dinesh Moudgil! </title>
      <link>https://community.cisco.com/t5/vpn/cisco-asa-5515-mikrotik-site-to-site-ipsec-vpn/m-p/2824564#M106986</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;A href="https://supportforums.cisco.com/users/dmoudgil" title="View user profile." class="username" lang="" about="/users/dmoudgil" typeof="sioc:UserAccount" property="foaf:name" datatype=""&gt;Dinesh Moudgil&lt;/A&gt;!&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Yes, I see that we don't have phase 2 of negotiation. I told about it earlier. In the output above you can see such commands as:&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;%ASA-5-111008: User 'enable_15' executed the 'clear logging buffer' command.&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;%ASA-5-111010: User 'enable_15', running 'CLI' from IP 10.1.1.197, executed 'clear logging buffer'&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;%ASA-5-111008: User 'enable_15' executed the 'debug crypto condition peer 2.2.2.2' command.&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;%ASA-5-111010: User 'enable_15', running 'CLI' from IP 10.1.1.197, executed 'debug crypto condition peer 2.2.2.2'&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;%ASA-5-111008: User 'enable_15' executed the 'debug crypto isakmp 255' command.&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;%ASA-5-111010: User 'enable_15', running 'CLI' from IP 10.1.1.197, executed 'debug crypto isakmp 255'&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;%ASA-7-710005: UDP request discarded from 10.1.1.211/2051 to LAN:255.255.255.255/7437&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;%ASA-7-710005: UDP request discarded from 10.1.1.211/2051 to TEST:255.255.255.255/7437&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;%ASA-5-111008: User 'enable_15' executed the 'debug crypto ipsec 255' command.&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;%ASA-5-111010: User 'enable_15', running 'CLI' from IP 10.1.1.197, executed 'debug crypto ipsec 255'&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;But if you want to see only&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;SPAN style="font-size: 11.0pt; font-family: 'Arial','sans-serif'; color: #4b4b4b;"&gt;debug crypto condition peer 2.2.2.2&lt;BR /&gt; debug crypto ipsec 200&lt;BR /&gt; Here it is: &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;SPAN style="font-size: 11.0pt; font-family: 'Arial','sans-serif'; color: #4b4b4b;"&gt;Newland-ASA# show logging&lt;BR /&gt;Syslog logging: enabled&lt;BR /&gt; Facility: 20&lt;BR /&gt; Timestamp logging: disabled&lt;BR /&gt; Standby logging: disabled&lt;BR /&gt; Debug-trace logging: disabled&lt;BR /&gt; Console logging: disabled&lt;BR /&gt; Monitor logging: level debugging, 1018381 messages logged&lt;BR /&gt; Buffer logging: level debugging, 1018327 messages logged&lt;BR /&gt; Trap logging: disabled&lt;BR /&gt; Permit-hostdown logging: disabled&lt;BR /&gt; History logging: disabled&lt;BR /&gt; Device ID: disabled&lt;BR /&gt; Mail logging: disabled&lt;BR /&gt; ASDM logging: level informational, 98808 messages logged&lt;BR /&gt;%ASA-5-111008: User 'enable_15' executed the 'clear logging buffer' command.&lt;BR /&gt;%ASA-5-111010: User 'enable_15', running 'CLI' from IP 10.1.1.197, executed 'clear logging buffer'&lt;BR /&gt;%ASA-5-111008: User 'enable_15' executed the 'debug crypto condition peer 2.2.2.2' command.&lt;BR /&gt;%ASA-5-111010: User 'enable_15', running 'CLI' from IP 10.1.1.197, executed 'debug crypto condition peer 2.2.2.2'&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.211/2051 to LAN:255.255.255.255/7437&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.211/2051 to TEST:255.255.255.255/7437&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.161/68 to LAN:255.255.255.255/67&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.161/68 to TEST:255.255.255.255/67&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.1/60783 to TEST:255.255.255.255/5678&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.1/60783 to LAN:255.255.255.255/5678&lt;BR /&gt;%ASA-4-733100: [ Scanning] drop rate-1 exceeded. Current burst rate is 4 per second, max configured rate is 10; Current average rate is 10 per second, max configured rate is 5; Cumulative total count is 6381&lt;BR /&gt;%ASA-4-733100: [ Scanning] drop rate-2 exceeded. Current burst rate is 0 per second, max configured rate is 8; Current average rate is 12 per second, max configured rate is 4; Cumulative total count is 46674&lt;BR /&gt;%ASA-5-111008: User 'enable_15' executed the 'debug crypto ipsec 200' command.&lt;BR /&gt;%ASA-5-111010: User 'enable_15', running 'CLI' from IP 10.1.1.197, executed 'debug crypto ipsec 200'&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.211/2051 to LAN:255.255.255.255/7437&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.211/2051 to TEST:255.255.255.255/7437&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.23/17500 to LAN:255.255.255.255/17500&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.23/17500 to TEST:255.255.255.255/17500&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.23/17500 to LAN:255.255.255.255/17500&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.23/17500 to TEST:255.255.255.255/17500&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.211/2051 to LAN:255.255.255.255/7437&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.211/2051 to TEST:255.255.255.255/7437&lt;BR /&gt;%ASA-7-713236: IP = 2.2.2.2, IKE_DECODE RECEIVED Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + VENDOR (13) + NONE (0) total length : 244&lt;BR /&gt;%ASA-7-715047: IP = 2.2.2.2, processing SA payload&lt;BR /&gt;%ASA-7-713906: IP = 2.2.2.2, Oakley proposal is acceptable&lt;BR /&gt;%ASA-7-715047: IP = 2.2.2.2, processing VID payload&lt;BR /&gt;%ASA-7-715049: IP = 2.2.2.2, Received Cisco Unity client VID&lt;BR /&gt;%ASA-7-715047: IP = 2.2.2.2, processing VID payload&lt;BR /&gt;%ASA-7-715049: IP = 2.2.2.2, Received DPD VID&lt;BR /&gt;%ASA-7-715047: IP = 2.2.2.2, processing IKE SA payload&lt;BR /&gt;%ASA-7-715028: IP = 2.2.2.2, IKE SA Proposal # 1, Transform # 4 acceptable Matches global IKE entry # 13&lt;BR /&gt;%ASA-7-715046: IP = 2.2.2.2, constructing ISAKMP SA payload&lt;BR /&gt;%ASA-7-715046: IP = 2.2.2.2, constructing Fragmentation VID + extended capabilities payload&lt;BR /&gt;%ASA-7-713236: IP = 2.2.2.2, IKE_DECODE SENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 112&lt;BR /&gt;%ASA-7-713236: IP = 2.2.2.2, IKE_DECODE RECEIVED Message (msgid=0) with payloads : HDR + KE (4) + NONCE (10) + NONE (0) total length : 188&lt;BR /&gt;%ASA-7-715047: IP = 2.2.2.2, processing ke payload&lt;BR /&gt;%ASA-7-715047: IP = 2.2.2.2, processing ISA_KE payload&lt;BR /&gt;%ASA-7-715047: IP = 2.2.2.2, processing nonce payload&lt;BR /&gt;%ASA-7-715046: IP = 2.2.2.2, constructing ke payload&lt;BR /&gt;%ASA-7-715046: IP = 2.2.2.2, constructing nonce payload&lt;BR /&gt;%ASA-7-715046: IP = 2.2.2.2, constructing Cisco Unity VID payload&lt;BR /&gt;%ASA-7-715046: IP = 2.2.2.2, constructing xauth V6 VID payload&lt;BR /&gt;%ASA-7-715048: IP = 2.2.2.2, Send IOS VID&lt;BR /&gt;%ASA-7-715038: IP = 2.2.2.2, Constructing ASA spoofing IOS Vendor ID payload (version: 1.0.0, capabilities: 20000001)&lt;BR /&gt;%ASA-7-715046: IP = 2.2.2.2, constructing VID payload&lt;BR /&gt;%ASA-7-715048: IP = 2.2.2.2, Send Altiga/Cisco VPN3000/Cisco ASA GW VID&lt;BR /&gt;%ASA-7-713906: IP = 2.2.2.2, Connection landed on tunnel_group 2.2.2.2&lt;BR /&gt;%ASA-7-713906: Group = 2.2.2.2, IP = 2.2.2.2, Generating keys for Responder...&lt;BR /&gt;%ASA-7-713236: IP = 2.2.2.2, IKE_DECODE SENDING Message (msgid=0) with payloads : HDR + KE (4) + NONCE (10) + VENDOR (13) + VENDOR (13) + VENDOR (13) + VENDOR (13) + NONE (0) total length : 256&lt;BR /&gt;%ASA-7-713236: IP = 2.2.2.2, IKE_DECODE RECEIVED Message (msgid=0) with payloads : HDR + ID (5) + HASH (8) + NONE (0) total length : 64&lt;BR /&gt;%ASA-7-715047: Group = 2.2.2.2, IP = 2.2.2.2, processing ID payload&lt;BR /&gt;%ASA-7-714011: Group = 2.2.2.2, IP = 2.2.2.2, ID_IPV4_ADDR ID received&lt;BR /&gt;2.2.2.2&lt;BR /&gt;%ASA-7-715047: Group = 2.2.2.2, IP = 2.2.2.2, processing hash payload&lt;BR /&gt;%ASA-7-715076: Group = 2.2.2.2, IP = 2.2.2.2, Computing hash for ISAKMP&lt;BR /&gt;%ASA-7-713906: IP = 2.2.2.2, Connection landed on tunnel_group 2.2.2.2&lt;BR /&gt;%ASA-7-715046: Group = 2.2.2.2, IP = 2.2.2.2, constructing ID payload&lt;BR /&gt;%ASA-7-715046: Group = 2.2.2.2, IP = 2.2.2.2, constructing hash payload&lt;BR /&gt;%ASA-7-715076: Group = 2.2.2.2, IP = 2.2.2.2, Computing hash for ISAKMP&lt;BR /&gt;%ASA-7-715046: Group = 2.2.2.2, IP = 2.2.2.2, constructing dpd vid payload&lt;BR /&gt;%ASA-7-713236: IP = 2.2.2.2, IKE_DECODE SENDING Message (msgid=0) with payloads : HDR + ID (5) + HASH (8) + VENDOR (13) + NONE (0) total length : 84&lt;BR /&gt;%ASA-6-113009: AAA retrieved default group policy (GroupPolicy_2.2.2.2) for user = 2.2.2.2&lt;BR /&gt;%ASA-5-713119: Group = 2.2.2.2, IP = 2.2.2.2, PHASE 1 COMPLETED&lt;BR /&gt;%ASA-7-713121: IP = 2.2.2.2, Keep-alive type for this connection: DPD&lt;BR /&gt;%ASA-7-715080: Group = 2.2.2.2, IP = 2.2.2.2, Starting P1 rekey timer: 82080 seconds.&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.92/68 to LAN:255.255.255.255/67&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.92/68 to TEST:255.255.255.255/67&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.211/2051 to LAN:255.255.255.255/7437&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.211/2051 to TEST:255.255.255.255/7437&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.100/17500 to LAN:255.255.255.255/17500&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.100/17500 to TEST:255.255.255.255/17500&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.211/2051 to LAN:255.255.255.255/7437&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.211/2051 to TEST:255.255.255.255/7437&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.65/53492 to TEST:255.255.255.255/8610&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.65/53492 to LAN:255.255.255.255/8610&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.65/53492 to LAN:255.255.255.255/8610&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.65/53492 to TEST:255.255.255.255/8610&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.211/2051 to LAN:255.255.255.255/7437&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.211/2051 to TEST:255.255.255.255/7437&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.102/17500 to LAN:255.255.255.255/17500&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.102/17500 to TEST:255.255.255.255/17500&lt;BR /&gt;%ASA-7-710005: TCP request discarded from 220.181.130.172/46405 to WAN:1.1.1.1/25&lt;BR /&gt;%ASA-7-710005: TCP request discarded from 220.181.130.172/46405 to WAN:1.1.1.1/25&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.211/2051 to LAN:255.255.255.255/7437&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.211/2051 to TEST:255.255.255.255/7437&lt;BR /&gt;%ASA-7-710005: TCP request discarded from 220.181.130.172/46405 to WAN:1.1.1.1/25&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 192.168.88.3/5678 to LAN:255.255.255.255/5678&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 192.168.88.3/5678 to TEST:255.255.255.255/5678&lt;BR /&gt;%ASA-4-733100: [ Scanning] drop rate-1 exceeded. Current burst rate is 5 per second, max configured rate is 10; Current average rate is 10 per second, max configured rate is 5; Cumulative total count is 6315&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.163/2414 to LAN:255.255.255.255/8610&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.163/2414 to LAN:255.255.255.255/8610&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.163/2414 to TEST:255.255.255.255/8610&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.163/2414 to TEST:255.255.255.255/8610&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.211/2051 to LAN:255.255.255.255/7437&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.211/2051 to TEST:255.255.255.255/7437&lt;BR /&gt;%ASA-7-710005: TCP request discarded from 220.181.130.172/46405 to WAN:1.1.1.1/25&lt;BR /&gt;%ASA-7-715036: Group = 2.2.2.2, IP = 2.2.2.2, Sending keep-alive of type DPD R-U-THERE (seq number 0x64d21e43)&lt;BR /&gt;%ASA-7-715046: Group = 2.2.2.2, IP = 2.2.2.2, constructing blank hash payload&lt;BR /&gt;%ASA-7-715046: Group = 2.2.2.2, IP = 2.2.2.2, constructing qm hash payload&lt;BR /&gt;%ASA-7-713236: IP = 2.2.2.2, IKE_DECODE SENDING Message (msgid=b64d980a) with payloads : HDR + HASH (8) + NOTIFY (11) + NONE (0) total length : 84&lt;BR /&gt;%ASA-7-713236: IP = 2.2.2.2, IKE_DECODE RECEIVED Message (msgid=ed6e9e6d) with payloads : HDR + HASH (8) + NOTIFY (11) + NONE (0) total length : 84&lt;BR /&gt;%ASA-7-715047: Group = 2.2.2.2, IP = 2.2.2.2, processing hash payload&lt;BR /&gt;%ASA-7-715047: Group = 2.2.2.2, IP = 2.2.2.2, processing notify payload&lt;BR /&gt;%ASA-7-715075: Group = 2.2.2.2, IP = 2.2.2.2, Received keep-alive of type DPD R-U-THERE-ACK (seq number 0x64d21e43)&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.211/2051 to LAN:255.255.255.255/7437&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.211/2051 to TEST:255.255.255.255/7437&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.111/17500 to LAN:255.255.255.255/17500&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.111/17500 to TEST:255.255.255.255/17500&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.211/2051 to TEST:255.255.255.255/7437&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.211/2051 to LAN:255.255.255.255/7437&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.13/56978 to LAN:255.255.255.255/1947&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.13/56978 to TEST:255.255.255.255/1947&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.100.100.4/62976 to LAN:255.255.255.255/62976&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.100.100.4/62976 to TEST:255.255.255.255/62976&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.211/2051 to LAN:255.255.255.255/7437&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.211/2051 to TEST:255.255.255.255/7437&lt;BR /&gt;%ASA-7-710005: TCP request discarded from 220.181.130.172/46405 to WAN:1.1.1.1/25&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.80/68 to LAN:255.255.255.255/67&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.80/68 to TEST:255.255.255.255/67&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.1/67 to LAN:255.255.255.255/68&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.1/67 to TEST:255.255.255.255/68&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.211/2051 to LAN:255.255.255.255/7437&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.211/2051 to TEST:255.255.255.255/7437&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.23/17500 to LAN:255.255.255.255/17500&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.23/17500 to TEST:255.255.255.255/17500&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.23/17500 to LAN:255.255.255.255/17500&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.23/17500 to TEST:255.255.255.255/17500&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 0.0.0.0/5678 to LAN:255.255.255.255/5678&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 0.0.0.0/5678 to TEST:255.255.255.255/5678&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.211/2051 to LAN:255.255.255.255/7437&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.211/2051 to TEST:255.255.255.255/7437&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.211/2051 to LAN:255.255.255.255/7437&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.211/2051 to TEST:255.255.255.255/7437&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.100/17500 to LAN:255.255.255.255/17500&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.100/17500 to TEST:255.255.255.255/17500&lt;BR /&gt;%ASA-7-710005: TCP request discarded from 220.181.130.172/48025 to WAN:1.1.1.1/25&lt;BR /&gt;%ASA-4-733100: [ Scanning] drop rate-1 exceeded. Current burst rate is 7 per second, max configured rate is 10; Current average rate is 10 per second, max configured rate is 5; Cumulative total count is 6310&lt;BR /&gt;%ASA-7-710005: TCP request discarded from 220.181.130.172/48025 to WAN:1.1.1.1/25&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.211/2051 to LAN:255.255.255.255/7437&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.211/2051 to TEST:255.255.255.255/7437&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 0.0.0.0/68 to LAN:255.255.255.255/67&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 0.0.0.0/68 to TEST:255.255.255.255/67&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 0.0.0.0/68 to LAN:255.255.255.255/67&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 0.0.0.0/68 to TEST:255.255.255.255/67&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 0.0.0.0/68 to LAN:255.255.255.255/67&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 0.0.0.0/68 to TEST:255.255.255.255/67&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.1/67 to LAN:255.255.255.255/68&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.1/67 to TEST:255.255.255.255/68&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.120/68 to LAN:255.255.255.255/67&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.120/68 to TEST:255.255.255.255/67&lt;BR /&gt;%ASA-7-715036: Group = 2.2.2.2, IP = 2.2.2.2, Sending keep-alive of type DPD R-U-THERE (seq number 0x64d21e44)&lt;BR /&gt;%ASA-7-715046: Group = 2.2.2.2, IP = 2.2.2.2, constructing blank hash payload&lt;BR /&gt;%ASA-7-715046: Group = 2.2.2.2, IP = 2.2.2.2, constructing qm hash payload&lt;BR /&gt;%ASA-7-713236: IP = 2.2.2.2, IKE_DECODE SENDING Message (msgid=332724cc) with payloads : HDR + HASH (8) + NOTIFY (11) + NONE (0) total length : 84&lt;BR /&gt;%ASA-7-713236: IP = 2.2.2.2, IKE_DECODE RECEIVED Message (msgid=e0a0e4a6) with payloads : HDR + HASH (8) + NOTIFY (11) + NONE (0) total length : 84&lt;BR /&gt;%ASA-7-715047: Group = 2.2.2.2, IP = 2.2.2.2, processing hash payload&lt;BR /&gt;%ASA-7-715047: Group = 2.2.2.2, IP = 2.2.2.2, processing notify payload&lt;BR /&gt;%ASA-7-715075: Group = 2.2.2.2, IP = 2.2.2.2, Received keep-alive of type DPD R-U-THERE-ACK (seq number 0x64d21e44)&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 0.0.0.0/68 to LAN:255.255.255.255/67&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 0.0.0.0/68 to TEST:255.255.255.255/67&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.1/67 to LAN:255.255.255.255/68&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.1/67 to TEST:255.255.255.255/68&lt;BR /&gt;%ASA-7-710005: TCP request discarded from 220.181.130.172/48025 to WAN:1.1.1.1/25&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 0.0.0.0/68 to LAN:255.255.255.255/67&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 0.0.0.0/68 to TEST:255.255.255.255/67&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.1/67 to TEST:255.255.255.255/68&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.1/67 to LAN:255.255.255.255/68&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.211/2051 to LAN:255.255.255.255/7437&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.211/2051 to TEST:255.255.255.255/7437&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.102/17500 to LAN:255.255.255.255/17500&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.102/17500 to TEST:255.255.255.255/17500&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.65/64242 to LAN:255.255.255.255/8610&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.65/64242 to LAN:255.255.255.255/8610&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.65/64242 to TEST:255.255.255.255/8610&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.65/64242 to TEST:255.255.255.255/8610&lt;BR /&gt;%ASA-7-710005: TCP request discarded from 220.181.130.172/48025 to WAN:1.1.1.1/25&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.211/2051 to TEST:255.255.255.255/7437&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.211/2051 to LAN:255.255.255.255/7437&lt;BR /&gt;%ASA-6-302020: Built outbound ICMP connection for faddr 10.7.0.1/0 gaddr 1.1.1.1/17746 laddr 1.1.1.1/17746&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 192.168.88.1/5678 to LAN:255.255.255.255/5678&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 192.168.88.1/5678 to TEST:255.255.255.255/5678&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 0.0.0.0/68 to LAN:255.255.255.255/67&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 0.0.0.0/68 to TEST:255.255.255.255/67&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.211/2051 to LAN:255.255.255.255/7437&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.211/2051 to TEST:255.255.255.255/7437&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 69.64.50.192/5092 to WAN:1.1.1.1/5060&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.163/2417 to LAN:255.255.255.255/8610&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.163/2417 to LAN:255.255.255.255/8610&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.163/2417 to TEST:255.255.255.255/8610&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.163/2417 to TEST:255.255.255.255/8610&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.200/68 to LAN:255.255.255.255/67&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.200/68 to TEST:255.255.255.255/67&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.211/2051 to LAN:255.255.255.255/7437&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.211/2051 to TEST:255.255.255.255/7437&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.111/17500 to LAN:255.255.255.255/17500&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.111/17500 to TEST:255.255.255.255/17500&lt;BR /&gt;%ASA-7-710005: TCP request discarded from 220.181.130.172/48025 to WAN:1.1.1.1/25&lt;BR /&gt;%ASA-6-302021: Teardown ICMP connection for faddr 10.7.0.1/0 gaddr 1.1.1.1/2002 laddr 10.1.1.1/2002&lt;BR /&gt;%ASA-5-111008: User 'enable_15' executed the 'ping 10.7.0.1' command.&lt;BR /&gt;%ASA-5-111010: User 'enable_15', running 'CLI' from IP 10.1.1.197, executed 'ping 10.7.0.1'&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.211/2051 to LAN:255.255.255.255/7437&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.211/2051 to TEST:255.255.255.255/7437&lt;BR /&gt;%ASA-6-302021: Teardown ICMP connection for faddr 10.7.0.1/0 gaddr 1.1.1.1/17746 laddr 1.1.1.1/17746&lt;BR /&gt;%ASA-7-609002: Teardown local-host WAN:10.7.0.1 duration 0:01:17&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.100.100.4/62976 to LAN:255.255.255.255/62976&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.100.100.4/62976 to TEST:255.255.255.255/62976&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.211/2051 to LAN:255.255.255.255/7437&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.211/2051 to TEST:255.255.255.255/7437&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.1/60783 to TEST:255.255.255.255/5678&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.1/60783 to LAN:255.255.255.255/5678&lt;BR /&gt;%ASA-4-733100: [ Scanning] drop rate-1 exceeded. Current burst rate is 5 per second, max configured rate is 10; Current average rate is 10 per second, max configured rate is 5; Cumulative total count is 6365&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.211/2051 to LAN:255.255.255.255/7437&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.211/2051 to TEST:255.255.255.255/7437&lt;BR /&gt;%ASA-7-715036: Group = 2.2.2.2, IP = 2.2.2.2, Sending keep-alive of type DPD R-U-THERE (seq number 0x64d21e45)&lt;BR /&gt;%ASA-7-715046: Group = 2.2.2.2, IP = 2.2.2.2, constructing blank hash payload&lt;BR /&gt;%ASA-7-715046: Group = 2.2.2.2, IP = 2.2.2.2, constructing qm hash payload&lt;BR /&gt;%ASA-7-713236: IP = 2.2.2.2, IKE_DECODE SENDING Message (msgid=2be4f18a) with payloads : HDR + HASH (8) + NOTIFY (11) + NONE (0) total length : 84&lt;BR /&gt;%ASA-7-713236: IP = 2.2.2.2, IKE_DECODE RECEIVED Message (msgid=f6fb205f) with payloads : HDR + HASH (8) + NOTIFY (11) + NONE (0) total length : 84&lt;BR /&gt;%ASA-7-715047: Group = 2.2.2.2, IP = 2.2.2.2, processing hash payload&lt;BR /&gt;%ASA-7-715047: Group = 2.2.2.2, IP = 2.2.2.2, processing notify payload&lt;BR /&gt;%ASA-7-715075: Group = 2.2.2.2, IP = 2.2.2.2, Received keep-alive of type DPD R-U-THERE-ACK (seq number 0x64d21e45)&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.23/17500 to LAN:255.255.255.255/17500&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.23/17500 to LAN:255.255.255.255/17500&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.23/17500 to TEST:255.255.255.255/17500&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.23/17500 to TEST:255.255.255.255/17500&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.211/2051 to LAN:255.255.255.255/7437&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.211/2051 to TEST:255.255.255.255/7437&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 0.0.0.0/68 to LAN:255.255.255.255/67&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 0.0.0.0/68 to TEST:255.255.255.255/67&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.13/56978 to LAN:255.255.255.255/1947&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.13/56978 to TEST:255.255.255.255/1947&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.211/2051 to LAN:255.255.255.255/7437&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.211/2051 to TEST:255.255.255.255/7437&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.100/17500 to LAN:255.255.255.255/17500&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.100/17500 to TEST:255.255.255.255/17500&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.211/2051 to LAN:255.255.255.255/7437&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.211/2051 to TEST:255.255.255.255/7437&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.131/68 to LAN:255.255.255.255/67&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.131/68 to TEST:255.255.255.255/67&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.211/2051 to LAN:255.255.255.255/7437&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.211/2051 to TEST:255.255.255.255/7437&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.102/17500 to LAN:255.255.255.255/17500&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.102/17500 to TEST:255.255.255.255/17500&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.211/2051 to LAN:255.255.255.255/7437&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.211/2051 to TEST:255.255.255.255/7437&lt;BR /&gt;%ASA-7-111009: User 'enable_15' executed cmd: show logging&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 192.168.88.3/5678 to LAN:255.255.255.255/5678&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 192.168.88.3/5678 to TEST:255.255.255.255/5678&lt;BR /&gt;%ASA-4-733100: [ Scanning] drop rate-1 exceeded. Current burst rate is 7 per second, max configured rate is 10; Current average rate is 10 per second, max configured rate is 5; Cumulative total count is 6518&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.211/2051 to LAN:255.255.255.255/7437&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.211/2051 to TEST:255.255.255.255/7437&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.65/57066 to LAN:255.255.255.255/8610&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.65/57066 to LAN:255.255.255.255/8610&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.65/57066 to TEST:255.255.255.255/8610&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.65/57066 to TEST:255.255.255.255/8610&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.163/2429 to LAN:255.255.255.255/8610&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.163/2429 to LAN:255.255.255.255/8610&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.163/2429 to TEST:255.255.255.255/8610&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.163/2429 to TEST:255.255.255.255/8610&lt;BR /&gt;%ASA-7-715036: Group = 2.2.2.2, IP = 2.2.2.2, Sending keep-alive of type DPD R-U-THERE (seq number 0x64d21e46)&lt;BR /&gt;%ASA-7-715046: Group = 2.2.2.2, IP = 2.2.2.2, constructing blank hash payload&lt;BR /&gt;%ASA-7-715046: Group = 2.2.2.2, IP = 2.2.2.2, constructing qm hash payload&lt;BR /&gt;%ASA-7-713236: IP = 2.2.2.2, IKE_DECODE SENDING Message (msgid=26be5e72) with payloads : HDR + HASH (8) + NOTIFY (11) + NONE (0) total length : 84&lt;BR /&gt;%ASA-7-713236: IP = 2.2.2.2, IKE_DECODE RECEIVED Message (msgid=9f3bb532) with payloads : HDR + HASH (8) + NOTIFY (11) + NONE (0) total length : 84&lt;BR /&gt;%ASA-7-715047: Group = 2.2.2.2, IP = 2.2.2.2, processing hash payload&lt;BR /&gt;%ASA-7-715047: Group = 2.2.2.2, IP = 2.2.2.2, processing notify payload&lt;BR /&gt;%ASA-7-715075: Group = 2.2.2.2, IP = 2.2.2.2, Received keep-alive of type DPD R-U-THERE-ACK (seq number 0x64d21e46)&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.211/2051 to LAN:255.255.255.255/7437&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.211/2051 to TEST:255.255.255.255/7437&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.111/17500 to LAN:255.255.255.255/17500&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.111/17500 to TEST:255.255.255.255/17500&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.211/2051 to LAN:255.255.255.255/7437&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.211/2051 to TEST:255.255.255.255/7437&lt;BR /&gt;%ASA-6-305012: Teardown dynamic ICMP translation from LAN:10.1.1.1/2002 to WAN:1.1.1.1/2002 duration 0:01:47&lt;BR /&gt;%ASA-7-609002: Teardown local-host LAN:10.1.1.1 duration 0:01:47&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.100.100.4/62976 to LAN:255.255.255.255/62976&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.100.100.4/62976 to TEST:255.255.255.255/62976&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 0.0.0.0/68 to LAN:255.255.255.255/67&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 0.0.0.0/68 to TEST:255.255.255.255/67&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.211/2051 to LAN:255.255.255.255/7437&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.211/2051 to TEST:255.255.255.255/7437&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.211/2051 to LAN:255.255.255.255/7437&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.211/2051 to TEST:255.255.255.255/7437&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.23/17500 to LAN:255.255.255.255/17500&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.23/17500 to TEST:255.255.255.255/17500&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.23/17500 to LAN:255.255.255.255/17500&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.23/17500 to TEST:255.255.255.255/17500&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 0.0.0.0/5678 to LAN:255.255.255.255/5678&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 0.0.0.0/5678 to TEST:255.255.255.255/5678&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.211/2051 to LAN:255.255.255.255/7437&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.211/2051 to TEST:255.255.255.255/7437&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.211/2051 to LAN:255.255.255.255/7437&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.211/2051 to TEST:255.255.255.255/7437&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.100/17500 to LAN:255.255.255.255/17500&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.100/17500 to TEST:255.255.255.255/17500&lt;BR /&gt;%ASA-4-733100: [ Scanning] drop rate-1 exceeded. Current burst rate is 3 per second, max configured rate is 10; Current average rate is 10 per second, max configured rate is 5; Cumulative total count is 6544&lt;BR /&gt;%ASA-7-111009: User 'enable_15' executed cmd: show logging&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.211/2051 to LAN:255.255.255.255/7437&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.211/2051 to TEST:255.255.255.255/7437&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.101/68 to LAN:255.255.255.255/67&lt;BR /&gt;%ASA-7-710005: UDP request discarded from 10.1.1.101/68 to TEST:255.255.255.255/67&lt;BR /&gt;%ASA-7-715036: Group = 2.2.2.2, IP = 2.2.2.2, Sending keep-alive of type DPD R-U-THERE (seq number 0x64d21e47)&lt;BR /&gt;%ASA-7-715046: Group = 2.2.2.2, IP = 2.2.2.2, constructing blank hash payload&lt;BR /&gt;%ASA-7-715046: Group = 2.2.2.2, IP = 2.2.2.2, constructing qm hash payload&lt;BR /&gt;%ASA-7-713236: IP = 2.2.2.2, IKE_DECODE SENDING Message (msgid=6e9b55ec) with payloads : HDR + HASH (8) + NOTIFY (11) + NONE (0) total length : 84&lt;BR /&gt;%ASA-7-713236: IP = 2.2.2.2, IKE_DECODE RECEIVED Message (msgid=ee377dbd) with payloads : HDR + HASH (8) + NOTIFY (11) + NONE (0) total length : 84&lt;BR /&gt;%ASA-7-715047: Group = 2.2.2.2, IP = 2.2.2.2, processing hash payload&lt;BR /&gt;%ASA-7-715047: Group = 2.2.2.2, IP = 2.2.2.2, processing notify payload&lt;BR /&gt;%ASA-7-715075: Group = 2.2.2.2, IP = 2.2.2.2, Received keep-alive of type DPD R-U-THERE-ACK (seq number 0x64d21e47)&lt;BR /&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;SPAN style="font-size: 11.0pt; font-family: 'Arial','sans-serif'; color: #4b4b4b;"&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;SPAN style="font-size: 11.0pt; font-family: 'Arial','sans-serif'; color: #4b4b4b;"&gt;Now &amp;nbsp;I will try to combine different parameters in transform sets in ASA and proposal in Mikrotik. Maybe this two devices (when work together) don't like some kinds of encryption or hash algorithm.&amp;nbsp;Thanks for help.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 18 Nov 2015 07:09:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/vpn/cisco-asa-5515-mikrotik-site-to-site-ipsec-vpn/m-p/2824564#M106986</guid>
      <dc:creator>falangerr</dc:creator>
      <dc:date>2015-11-18T07:09:39Z</dc:date>
    </item>
  </channel>
</rss>

