<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: VPN issue in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/vpn-issue/m-p/1402675#M673783</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi thanks for the reply. Config on the other end is good, the sa looks exactly the same with encrypts but no decrypts.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The correct no nat are definitely in place both ends, aswell as everything else that is required. I've reconfigured it many times at both ends, and just doing that sometimes makes the tunnel start passing traffic again (unless just coincidence...) and then stops again a while later (after 20 minutes last time).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Both devices on 8.0(5).&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sat, 10 Apr 2010 12:39:47 GMT</pubDate>
    <dc:creator>Gatling_uk</dc:creator>
    <dc:date>2010-04-10T12:39:47Z</dc:date>
    <item>
      <title>VPN issue</title>
      <link>https://community.cisco.com/t5/network-security/vpn-issue/m-p/1402673#M673765</link>
      <description>&lt;P&gt;Hello all,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a very strange VPN issue that I cannot get to the bottom of... Hopefully someone can provide some assistance.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The tunnel comes up fine, phase 1 and phase 2 complete successfully, but no traffic passes over the tunnel. This has been an intermittent problem for some time, but the tunnel has now not been passing traffic for the last 24 hours. I can see in the IPsec SA that the packets are being encrypted, but they never reach the other end.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I can verify that all details match exactly on both ends phase 1 and phase 2 encryption methods the same, isakmp policies identical, same keys, definitely no pfs set at one end or anything silly like that. As I mentioned, this is an intermittent problem, and the tunnel comes up fine, but traffic doesnt always reach the remote destination.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here's the SA from one end:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Crypto map tag: outside_map, seq num: 20, local addr: &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; access-list outside_20_cryptomap extended permit ip 192.168.42.0 255.255.255.0 10.20.0.0 255.255.0.0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; local ident (addr/mask/prot/port): (192.168.42.0/255.255.255.0/0/0)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; remote ident (addr/mask/prot/port): (10.20.0.0/255.255.0.0/0/0)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; current_peer: &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; #pkts encaps: 574, #pkts encrypt: 574, #pkts digest: 574&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; #pkts decaps: 0, #pkts decrypt: 0, #pkts verify: 0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; #pkts compressed: 0, #pkts decompressed: 0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; #pkts not compressed: 574, #pkts comp failed: 0, #pkts decomp failed: 0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; #pre-frag successes: 0, #pre-frag failures: 0, #fragments created: 0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; #PMTUs sent: 0, #PMTUs rcvd: 0, #decapsulated frgs needing reassembly: 0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; #send errors: 0, #recv errors: 0&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; local crypto endpt.: , remote crypto endpt.: &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; path mtu 1500, ipsec overhead 58, media mtu 1500&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; current outbound spi: 031A699D&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; current inbound spi : 07DB85CB&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; inbound esp sas:&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; spi: 0x07DB85CB (131827147)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; transform: esp-3des esp-sha-hmac no compression&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; in use settings ={L2L, Tunnel, }&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; slot: 0, conn_id: 20480, crypto-map: outside_map&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; sa timing: remaining key lifetime (kB/sec): (4374000/27416)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; IV size: 8 bytes&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; replay detection support: Y&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Anti replay bitmap:&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0x00000000 0x00000001&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; outbound esp sas:&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; spi: 0x031A699D (52062621)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; transform: esp-3des esp-sha-hmac no compression&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; in use settings ={L2L, Tunnel, }&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; slot: 0, conn_id: 20480, crypto-map: outside_map&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; sa timing: remaining key lifetime (kB/sec): (4373959/27416)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; IV size: 8 bytes&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; replay detection support: Y&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Anti replay bitmap:&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0x00000000 0x00000001&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Crypto map tag: outside_map, seq num: 20, local addr: &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; access-list outside_20_cryptomap extended permit ip 192.168.42.0 255.255.255.0 10.18.0.0 255.255.0.0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; local ident (addr/mask/prot/port): (192.168.42.0/255.255.255.0/0/0)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; remote ident (addr/mask/prot/port): (10.18.0.0/255.255.0.0/0/0)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; current_peer: &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; #pkts encaps: 22, #pkts encrypt: 22, #pkts digest: 22&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; #pkts decaps: 0, #pkts decrypt: 0, #pkts verify: 0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; #pkts compressed: 0, #pkts decompressed: 0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; #pkts not compressed: 22, #pkts comp failed: 0, #pkts decomp failed: 0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; #pre-frag successes: 0, #pre-frag failures: 0, #fragments created: 0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; #PMTUs sent: 0, #PMTUs rcvd: 0, #decapsulated frgs needing reassembly: 0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; #send errors: 0, #recv errors: 0&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; local crypto endpt.: , remote crypto endpt.:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; path mtu 1500, ipsec overhead 58, media mtu 1500&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; current outbound spi: E1DC892F&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; current inbound spi : C39A46F9&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; inbound esp sas:&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; spi: 0xC39A46F9 (3281667833)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; transform: esp-3des esp-sha-hmac no compression&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; in use settings ={L2L, Tunnel, }&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; slot: 0, conn_id: 20480, crypto-map: outside_map&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; sa timing: remaining key lifetime (kB/sec): (4374000/27475)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; IV size: 8 bytes&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; replay detection support: Y&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Anti replay bitmap:&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0x00000000 0x00000001&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; outbound esp sas:&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; spi: 0xE1DC892F (3789326639)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; transform: esp-3des esp-sha-hmac no compression&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; in use settings ={L2L, Tunnel, }&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; slot: 0, conn_id: 20480, crypto-map: outside_map&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; sa timing: remaining key lifetime (kB/sec): (4373998/27473)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; IV size: 8 bytes&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; replay detection support: Y&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Anti replay bitmap:&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0x00000000 0x00000001&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here's some releavnt debugging information from tunnel establishment:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt;"&gt;Apr 09 01:21:09 [IKEv1]: IP = "Remote IP", Queuing KEY-ACQUIRE messages to be processed when P1 SA is complete.&lt;BR /&gt;Apr 09 01:21:09 [IKEv1 DEBUG]: Pitcher: received a key acquire message, spi 0x0&lt;BR /&gt;Apr 09 01:21:09 [IKEv1]: IP = "Remote IP", Queuing KEY-ACQUIRE messages to be processed when P1 SA is complete.&lt;BR /&gt;Apr 09 01:21:10 [IKEv1 DEBUG]: Pitcher: received a key acquire message, spi 0x0&lt;BR /&gt;Apr 09 01:21:10 [IKEv1]: IP = "Remote IP", Queuing KEY-ACQUIRE messages to be processed when P1 SA is complete.&lt;BR /&gt;Apr 09 01:21:11 [IKEv1 DEBUG]: Pitcher: received a key acquire message, spi 0x0&lt;BR /&gt;Apr 09 01:21:11 [IKEv1]: IP = "Remote IP", Queuing KEY-ACQUIRE messages to be processed when P1 SA is complete.&lt;BR /&gt;Apr 09 01:21:11 [IKEv1]: IP = "Remote IP", IKE_DECODE RESENDING Message (msgid=0) with payloads : HDR + KE (4) + NONCE (10) + VENDOR (13) + VENDOR (13) + VENDOR (13) + VENDOR (13) + NONE (0) total length : 256&lt;BR /&gt;Apr 09 01:21:11 [IKEv1]: IP = "Remote IP", IKE_DECODE RECEIVED Message (msgid=0) with payloads : HDR + NOTIFY (11) + NONE (0) total length : 68&lt;BR /&gt;Apr 09 01:21:11 [IKEv1]: IP = "Remote IP", IKE_DECODE RECEIVED Message (msgid=0) with payloads : HDR + NOTIFY (11) + NONE (0) total length : 68&lt;BR /&gt;Apr 09 01:21:11 [IKEv1]: IP = "Remote IP", Received an un-encrypted INVALID_COOKIE notify message, dropping&lt;BR /&gt;Apr 09 01:21:11 [IKEv1]: IP = "Remote IP", Information Exchange processing failed&lt;BR /&gt;Apr 09 01:21:12 [IKEv1 DEBUG]: Pitcher: received a key acquire message, spi 0x0&lt;BR /&gt;Apr 09 01:21:12 [IKEv1]: IP = "Remote IP", Queuing KEY-ACQUIRE messages to be processed when P1 SA is complete.&lt;BR /&gt;Apr 09 01:21:12 [IKEv1 DEBUG]: Pitcher: received a key acquire message, spi 0x0&lt;BR /&gt;Apr 09 01:21:12 [IKEv1]: IP = "Remote IP", Queuing KEY-ACQUIRE messages to be processed when P1 SA is complete.&lt;BR /&gt;Apr 09 01:21:12 [IKEv1]: IP = "Remote IP", IKE_DECODE RECEIVED Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + VENDOR (13) + VENDOR (13) + NONE (0) total length : 336&lt;BR /&gt;Apr 09 01:21:12 [IKEv1 DEBUG]: IP = "Remote IP", processing SA payload&lt;BR /&gt;Apr 09 01:21:12 [IKEv1]: Phase 1 failure:&amp;nbsp; Mismatched attribute types for class Group Description:&amp;nbsp; Rcv'd: Group 2&amp;nbsp; Cfg'd: Group 5&lt;BR /&gt;Apr 09 01:21:12 [IKEv1]: Phase 1 failure:&amp;nbsp; Mismatched attribute types for class Group Description:&amp;nbsp; Rcv'd: Group 2&amp;nbsp; Cfg'd: Group 1&lt;BR /&gt;Apr 09 01:21:12 [IKEv1]: Phase 1 failure:&amp;nbsp; Mismatched attribute types for class Group Description:&amp;nbsp; Rcv'd: Group 2&amp;nbsp; Cfg'd: Group 5&lt;BR /&gt;Apr 09 01:21:12 [IKEv1]: Phase 1 failure:&amp;nbsp; Mismatched attribute types for class Group Description:&amp;nbsp; Rcv'd: Group 2&amp;nbsp; Cfg'd: Group 1&lt;BR /&gt;Apr 09 01:21:12 [IKEv1]: Phase 1 failure:&amp;nbsp; Mismatched attribute types for class Group Description:&amp;nbsp; Rcv'd: Group 2&amp;nbsp; Cfg'd: Group 1&lt;BR /&gt;Apr 09 01:21:12 [IKEv1]: Phase 1 failure:&amp;nbsp; Mismatched attribute types for class Group Description:&amp;nbsp; Rcv'd: Group 2&amp;nbsp; Cfg'd: Group 5&lt;BR /&gt;Apr 09 01:21:12 [IKEv1]: Phase 1 failure:&amp;nbsp; Mismatched attribute types for class Group Description:&amp;nbsp; Rcv'd: Group 2&amp;nbsp; Cfg'd: Group 1&lt;BR /&gt;Apr 09 01:21:12 [IKEv1]: Phase 1 failure:&amp;nbsp; Mismatched attribute types for class Group Description:&amp;nbsp; Rcv'd: Group 5&amp;nbsp; Cfg'd: Group 2&lt;BR /&gt;Apr 09 01:21:12 [IKEv1]: Phase 1 failure:&amp;nbsp; Mismatched attribute types for class Group Description:&amp;nbsp; Rcv'd: Group 5&amp;nbsp; Cfg'd: Group 1&lt;BR /&gt;Apr 09 01:21:12 [IKEv1]: Phase 1 failure:&amp;nbsp; Mismatched attribute types for class Group Description:&amp;nbsp; Rcv'd: Group 5&amp;nbsp; Cfg'd: Group 2&lt;BR /&gt;Apr 09 01:21:12 [IKEv1]: Phase 1 failure:&amp;nbsp; Mismatched attribute types for class Group Description:&amp;nbsp; Rcv'd: Group 2&amp;nbsp; Cfg'd: Group 5&lt;BR /&gt;Apr 09 01:21:12 [IKEv1]: Phase 1 failure:&amp;nbsp; Mismatched attribute types for class Group Description:&amp;nbsp; Rcv'd: Group 2&amp;nbsp; Cfg'd: Group 1&lt;BR /&gt;Apr 09 01:21:12 [IKEv1]: Phase 1 failure:&amp;nbsp; Mismatched attribute types for class Group Description:&amp;nbsp; Rcv'd: Group 2&amp;nbsp; Cfg'd: Group 1&lt;BR /&gt;Apr 09 01:21:12 [IKEv1]: Phase 1 failure:&amp;nbsp; Mismatched attribute types for class Group Description:&amp;nbsp; Rcv'd: Group 2&amp;nbsp; Cfg'd: Group 5&lt;BR /&gt;Apr 09 01:21:12 [IKEv1]: Phase 1 failure:&amp;nbsp; Mismatched attribute types for class Group Description:&amp;nbsp; Rcv'd: Group 2&amp;nbsp; Cfg'd: Group 1&lt;BR /&gt;Apr 09 01:21:12 [IKEv1]: Phase 1 failure:&amp;nbsp; Mismatched attribute types for class Group Description:&amp;nbsp; Rcv'd: Group 2&amp;nbsp; Cfg'd: Group 5&lt;BR /&gt;Apr 09 01:21:12 [IKEv1]: Phase 1 failure:&amp;nbsp; Mismatched attribute types for class Group Description:&amp;nbsp; Rcv'd: Group 2&amp;nbsp; Cfg'd: Group 1&lt;BR /&gt;Apr 09 01:21:12 [IKEv1]: Phase 1 failure:&amp;nbsp; Mismatched attribute types for class Group Description:&amp;nbsp; Rcv'd: Group 2&amp;nbsp; Cfg'd: Group 1&lt;BR /&gt;Apr 09 01:21:12 [IKEv1]: Phase 1 failure:&amp;nbsp; Mismatched attribute types for class Group Description:&amp;nbsp; Rcv'd: Group 2&amp;nbsp; Cfg'd: Group 5&lt;BR /&gt;Apr 09 01:21:12 [IKEv1]: Phase 1 failure:&amp;nbsp; Mismatched attribute types for class Group Description:&amp;nbsp; Rcv'd: Group 2&amp;nbsp; Cfg'd: Group 1&lt;BR /&gt;Apr 09 01:21:12 [IKEv1]: Phase 1 failure:&amp;nbsp; Mismatched attribute types for class Group Description:&amp;nbsp; Rcv'd: Group 1&amp;nbsp; Cfg'd: Group 2&lt;BR /&gt;Apr 09 01:21:12 [IKEv1]: Phase 1 failure:&amp;nbsp; Mismatched attribute types for class Group Description:&amp;nbsp; Rcv'd: Group 1&amp;nbsp; Cfg'd: Group 5&lt;BR /&gt;Apr 09 01:21:12 [IKEv1]: Phase 1 failure:&amp;nbsp; Mismatched attribute types for class Group Description:&amp;nbsp; Rcv'd: Group 1&amp;nbsp; Cfg'd: Group 2&lt;BR /&gt;Apr 09 01:21:12 [IKEv1]: Phase 1 failure:&amp;nbsp; Mismatched attribute types for class Group Description:&amp;nbsp; Rcv'd: Group 1&amp;nbsp; Cfg'd: Group 2&lt;BR /&gt;Apr 09 01:21:12 [IKEv1]: Phase 1 failure:&amp;nbsp; Mismatched attribute types for class Group Description:&amp;nbsp; Rcv'd: Group 1&amp;nbsp; Cfg'd: Group 2&lt;BR /&gt;Apr 09 01:21:12 [IKEv1]: Phase 1 failure:&amp;nbsp; Mismatched attribute types for class Group Description:&amp;nbsp; Rcv'd: Group 1&amp;nbsp; Cfg'd: Group 2&lt;BR /&gt;Apr 09 01:21:12 [IKEv1]: Phase 1 failure:&amp;nbsp; Mismatched attribute types for class Group Description:&amp;nbsp; Rcv'd: Group 1&amp;nbsp; Cfg'd: Group 5&lt;BR /&gt;Apr 09 01:21:12 [IKEv1]: Phase 1 failure:&amp;nbsp; Mismatched attribute types for class Group Description:&amp;nbsp; Rcv'd: Group 1&amp;nbsp; Cfg'd: Group 2&lt;BR /&gt;Apr 09 01:21:12 [IKEv1]: Phase 1 failure:&amp;nbsp; Mismatched attribute types for class Group Description:&amp;nbsp; Rcv'd: Group 1&amp;nbsp; Cfg'd: Group 2&lt;BR /&gt;Apr 09 01:21:12 [IKEv1]: Phase 1 failure:&amp;nbsp; Mismatched attribute types for class Group Description:&amp;nbsp; Rcv'd: Group 1&amp;nbsp; Cfg'd: Group 2&lt;BR /&gt;Apr 09 01:21:12 [IKEv1 DEBUG]: IP = "Remote IP", Oakley proposal is acceptable&lt;BR /&gt;Apr 09 01:21:12 [IKEv1 DEBUG]: IP = "Remote IP", processing VID payload&lt;BR /&gt;Apr 09 01:21:12 [IKEv1 DEBUG]: IP = "Remote IP", Received NAT-Traversal ver 02 VID&lt;BR /&gt;Apr 09 01:21:12 [IKEv1 DEBUG]: IP = "Remote IP", processing VID payload&lt;BR /&gt;Apr 09 01:21:12 [IKEv1 DEBUG]: IP = "Remote IP", Received NAT-Traversal ver 03 VID&lt;BR /&gt;Apr 09 01:21:12 [IKEv1 DEBUG]: IP = "Remote IP", processing VID payload&lt;BR /&gt;Apr 09 01:21:12 [IKEv1 DEBUG]: IP = "Remote IP", Received Fragmentation VID&lt;BR /&gt;Apr 09 01:21:12 [IKEv1 DEBUG]: IP = "Remote IP", IKE Peer included IKE fragmentation capability flags:&amp;nbsp; Main Mode:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; True&amp;nbsp; Aggressive Mode:&amp;nbsp; True&lt;BR /&gt;Apr 09 01:21:12 [IKEv1 DEBUG]: IP = "Remote IP", processing IKE SA payload&lt;BR /&gt;Apr 09 01:21:12 [IKEv1]: Phase 1 failure:&amp;nbsp; Mismatched attribute types for class Group Description:&amp;nbsp; Rcv'd: Group 2&amp;nbsp; Cfg'd: Group 5&lt;BR /&gt;Apr 09 01:21:12 [IKEv1]: Phase 1 failure:&amp;nbsp; Mismatched attribute types for class Group Description:&amp;nbsp; Rcv'd: Group 2&amp;nbsp; Cfg'd: Group 1&lt;BR /&gt;Apr 09 01:21:12 [IKEv1]: Phase 1 failure:&amp;nbsp; Mismatched attribute types for class Group Description:&amp;nbsp; Rcv'd: Group 2&amp;nbsp; Cfg'd: Group 5&lt;BR /&gt;Apr 09 01:21:12 [IKEv1]: Phase 1 failure:&amp;nbsp; Mismatched attribute types for class Group Description:&amp;nbsp; Rcv'd: Group 2&amp;nbsp; Cfg'd: Group 1&lt;BR /&gt;Apr 09 01:21:12 [IKEv1]: Phase 1 failure:&amp;nbsp; Mismatched attribute types for class Group Description:&amp;nbsp; Rcv'd: Group 2&amp;nbsp; Cfg'd: Group 1&lt;BR /&gt;Apr 09 01:21:12 [IKEv1]: Phase 1 failure:&amp;nbsp; Mismatched attribute types for class Group Description:&amp;nbsp; Rcv'd: Group 2&amp;nbsp; Cfg'd: Group 5&lt;BR /&gt;Apr 09 01:21:12 [IKEv1]: Phase 1 failure:&amp;nbsp; Mismatched attribute types for class Group Description:&amp;nbsp; Rcv'd: Group 2&amp;nbsp; Cfg'd: Group 1&lt;BR /&gt;Apr 09 01:21:12 [IKEv1]: Phase 1 failure:&amp;nbsp; Mismatched attribute types for class Group Description:&amp;nbsp; Rcv'd: Group 5&amp;nbsp; Cfg'd: Group 2&lt;BR /&gt;Apr 09 01:21:12 [IKEv1]: Phase 1 failure:&amp;nbsp; Mismatched attribute types for class Group Description:&amp;nbsp; Rcv'd: Group 5&amp;nbsp; Cfg'd: Group 1&lt;BR /&gt;Apr 09 01:21:12 [IKEv1]: Phase 1 failure:&amp;nbsp; Mismatched attribute types for class Group Description:&amp;nbsp; Rcv'd: Group 5&amp;nbsp; Cfg'd: Group 2&lt;BR /&gt;Apr 09 01:21:12 [IKEv1]: Phase 1 failure:&amp;nbsp; Mismatched attribute types for class Group Description:&amp;nbsp; Rcv'd: Group 2&amp;nbsp; Cfg'd: Group 5&lt;BR /&gt;Apr 09 01:21:12 [IKEv1]: Phase 1 failure:&amp;nbsp; Mismatched attribute types for class Group Description:&amp;nbsp; Rcv'd: Group 2&amp;nbsp; Cfg'd: Group 1&lt;BR /&gt;Apr 09 01:21:12 [IKEv1]: Phase 1 failure:&amp;nbsp; Mismatched attribute types for class Group Description:&amp;nbsp; Rcv'd: Group 2&amp;nbsp; Cfg'd: Group 1&lt;BR /&gt;Apr 09 01:21:12 [IKEv1]: Phase 1 failure:&amp;nbsp; Mismatched attribute types for class Group Description:&amp;nbsp; Rcv'd: Group 2&amp;nbsp; Cfg'd: Group 5&lt;BR /&gt;Apr 09 01:21:12 [IKEv1]: Phase 1 failure:&amp;nbsp; Mismatched attribute types for class Group Description:&amp;nbsp; Rcv'd: Group 2&amp;nbsp; Cfg'd: Group 1&lt;BR /&gt;Apr 09 01:21:12 [IKEv1]: Phase 1 failure:&amp;nbsp; Mismatched attribute types for class Group Description:&amp;nbsp; Rcv'd: Group 2&amp;nbsp; Cfg'd: Group 5&lt;BR /&gt;Apr 09 01:21:12 [IKEv1]: Phase 1 failure:&amp;nbsp; Mismatched attribute types for class Group Description:&amp;nbsp; Rcv'd: Group 2&amp;nbsp; Cfg'd: Group 1&lt;BR /&gt;Apr 09 01:21:12 [IKEv1]: Phase 1 failure:&amp;nbsp; Mismatched attribute types for class Group Description:&amp;nbsp; Rcv'd: Group 2&amp;nbsp; Cfg'd: Group 1&lt;BR /&gt;Apr 09 01:21:12 [IKEv1]: Phase 1 failure:&amp;nbsp; Mismatched attribute types for class Group Description:&amp;nbsp; Rcv'd: Group 2&amp;nbsp; Cfg'd: Group 5&lt;BR /&gt;Apr 09 01:21:12 [IKEv1]: Phase 1 failure:&amp;nbsp; Mismatched attribute types for class Group Description:&amp;nbsp; Rcv'd: Group 2&amp;nbsp; Cfg'd: Group 1&lt;BR /&gt;Apr 09 01:21:12 [IKEv1]: Phase 1 failure:&amp;nbsp; Mismatched attribute types for class Group Description:&amp;nbsp; Rcv'd: Group 1&amp;nbsp; Cfg'd: Group 2&lt;BR /&gt;Apr 09 01:21:12 [IKEv1]: Phase 1 failure:&amp;nbsp; Mismatched attribute types for class Group Description:&amp;nbsp; Rcv'd: Group 1&amp;nbsp; Cfg'd: Group 5&lt;BR /&gt;Apr 09 01:21:12 [IKEv1]: Phase 1 failure:&amp;nbsp; Mismatched attribute types for class Group Description:&amp;nbsp; Rcv'd: Group 1&amp;nbsp; Cfg'd: Group 2&lt;BR /&gt;Apr 09 01:21:12 [IKEv1]: Phase 1 failure:&amp;nbsp; Mismatched attribute types for class Group Description:&amp;nbsp; Rcv'd: Group 1&amp;nbsp; Cfg'd: Group 2&lt;BR /&gt;Apr 09 01:21:12 [IKEv1]: Phase 1 failure:&amp;nbsp; Mismatched attribute types for class Group Description:&amp;nbsp; Rcv'd: Group 1&amp;nbsp; Cfg'd: Group 2&lt;BR /&gt;Apr 09 01:21:12 [IKEv1]: Phase 1 failure:&amp;nbsp; Mismatched attribute types for class Group Description:&amp;nbsp; Rcv'd: Group 1&amp;nbsp; Cfg'd: Group 2&lt;BR /&gt;Apr 09 01:21:12 [IKEv1]: Phase 1 failure:&amp;nbsp; Mismatched attribute types for class Group Description:&amp;nbsp; Rcv'd: Group 1&amp;nbsp; Cfg'd: Group 5&lt;BR /&gt;Apr 09 01:21:12 [IKEv1]: Phase 1 failure:&amp;nbsp; Mismatched attribute types for class Group Description:&amp;nbsp; Rcv'd: Group 1&amp;nbsp; Cfg'd: Group 2&lt;BR /&gt;Apr 09 01:21:12 [IKEv1]: Phase 1 failure:&amp;nbsp; Mismatched attribute types for class Group Description:&amp;nbsp; Rcv'd: Group 1&amp;nbsp; Cfg'd: Group 2&lt;BR /&gt;Apr 09 01:21:12 [IKEv1]: Phase 1 failure:&amp;nbsp; Mismatched attribute types for class Group Description:&amp;nbsp; Rcv'd: Group 1&amp;nbsp; Cfg'd: Group 2&lt;BR /&gt;Apr 09 01:21:12 [IKEv1 DEBUG]: IP = "Remote IP", IKE SA Proposal # 1, Transform # 1 acceptable&amp;nbsp; Matches global IKE entry # 8&lt;BR /&gt;Apr 09 01:21:12 [IKEv1 DEBUG]: IP = "Remote IP", constructing ISAKMP SA payload&lt;BR /&gt;Apr 09 01:21:12 [IKEv1 DEBUG]: IP = "Remote IP", constructing Fragmentation VID + extended capabilities payload&lt;BR /&gt;Apr 09 01:21:12 [IKEv1]: IP = "Remote IP", IKE_DECODE SENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 112&lt;BR /&gt;Apr 09 01:21:12 [IKEv1]: IP = "Remote IP", IKE_DECODE RECEIVED Message (msgid=0) with payloads : HDR + KE (4) + NONCE (10) + VENDOR (13) + VENDOR (13) + VENDOR (13) + VENDOR (13) + NONE (0) total length : 256&lt;BR /&gt;Apr 09 01:21:12 [IKEv1 DEBUG]: IP = "Remote IP", processing ke payload&lt;BR /&gt;Apr 09 01:21:12 [IKEv1 DEBUG]: IP = "Remote IP", processing ISA_KE payload&lt;BR /&gt;Apr 09 01:21:12 [IKEv1 DEBUG]: IP = "Remote IP", processing nonce payload&lt;BR /&gt;Apr 09 01:21:12 [IKEv1 DEBUG]: IP = "Remote IP", processing VID payload&lt;BR /&gt;Apr 09 01:21:12 [IKEv1 DEBUG]: IP = "Remote IP", Received Cisco Unity client VID&lt;BR /&gt;Apr 09 01:21:12 [IKEv1 DEBUG]: IP = "Remote IP", processing VID payload&lt;BR /&gt;Apr 09 01:21:12 [IKEv1 DEBUG]: IP = "Remote IP", Received xauth V6 VID&lt;BR /&gt;Apr 09 01:21:12 [IKEv1 DEBUG]: IP = "Remote IP", processing VID payload&lt;BR /&gt;Apr 09 01:21:12 [IKEv1 DEBUG]: IP = "Remote IP", Processing VPN3000/ASA spoofing IOS Vendor ID payload (version: 1.0.0, capabilities: 20000001)&lt;BR /&gt;Apr 09 01:21:12 [IKEv1 DEBUG]: IP = "Remote IP", processing VID payload&lt;BR /&gt;Apr 09 01:21:12 [IKEv1 DEBUG]: IP = "Remote IP", Received Altiga/Cisco VPN3000/Cisco ASA GW VID&lt;BR /&gt;Apr 09 01:21:12 [IKEv1 DEBUG]: IP = "Remote IP", constructing ke payload&lt;BR /&gt;Apr 09 01:21:12 [IKEv1 DEBUG]: IP = "Remote IP", constructing nonce payload&lt;BR /&gt;Apr 09 01:21:12 [IKEv1 DEBUG]: IP = "Remote IP", constructing Cisco Unity VID payload&lt;BR /&gt;Apr 09 01:21:12 [IKEv1 DEBUG]: IP = "Remote IP", constructing xauth V6 VID payload&lt;BR /&gt;Apr 09 01:21:12 [IKEv1 DEBUG]: IP = "Remote IP", Send IOS VID&lt;BR /&gt;Apr 09 01:21:12 [IKEv1 DEBUG]: IP = "Remote IP", Constructing ASA spoofing IOS Vendor ID payload (version: 1.0.0, capabilities: 20000001)&lt;BR /&gt;Apr 09 01:21:12 [IKEv1 DEBUG]: IP = "Remote IP", constructing VID payload&lt;BR /&gt;Apr 09 01:21:12 [IKEv1 DEBUG]: IP = "Remote IP", Send Altiga/Cisco VPN3000/Cisco ASA GW VID&lt;BR /&gt;Apr 09 01:21:12 [IKEv1]: IP = "Remote IP", Connection landed on tunnel_group "Remote IP"&lt;BR /&gt;Apr 09 01:21:12 [IKEv1 DEBUG]: Group = "Remote IP", IP = "Remote IP", Generating keys for Responder...&lt;BR /&gt;Apr 09 01:21:12 [IKEv1]: IP = "Remote IP", IKE_DECODE SENDING Message (msgid=0) with payloads : HDR + KE (4) + NONCE (10) + VENDOR (13) + VENDOR (13) + VENDOR (13) + VENDOR (13) + NONE (0) total length : 256&lt;BR /&gt;Apr 09 01:21:12 [IKEv1]: IP = "Remote IP", IKE_DECODE RECEIVED Message (msgid=0) with payloads : HDR + ID (5) + HASH (8) + IOS KEEPALIVE (128) + VENDOR (13) + NONE (0) total length : 96&lt;BR /&gt;Apr 09 01:21:12 [IKEv1 DEBUG]: Group = "Remote IP", IP = "Remote IP", processing ID payload&lt;BR /&gt;Apr 09 01:21:12 [IKEv1 DECODE]: Group = "Remote IP", IP = "Remote IP", ID_IPV4_ADDR ID received&lt;BR /&gt;"Remote IP"&lt;BR /&gt;Apr 09 01:21:12 [IKEv1 DEBUG]: Group = "Remote IP", IP = "Remote IP", processing hash payload&lt;BR /&gt;Apr 09 01:21:12 [IKEv1 DEBUG]: Group = "Remote IP", IP = "Remote IP", Computing hash for ISAKMP&lt;BR /&gt;Apr 09 01:21:12 [IKEv1 DEBUG]: IP = "Remote IP", Processing IOS keep alive payload: proposal=32767/32767 sec.&lt;BR /&gt;Apr 09 01:21:12 [IKEv1 DEBUG]: Group = "Remote IP", IP = "Remote IP", processing VID payload&lt;BR /&gt;Apr 09 01:21:12 [IKEv1 DEBUG]: Group = "Remote IP", IP = "Remote IP", Received DPD VID&lt;BR /&gt;Apr 09 01:21:12 [IKEv1]: IP = "Remote IP", Connection landed on tunnel_group "Remote IP"&lt;BR /&gt;Apr 09 01:21:12 [IKEv1]: Group = "Remote IP", IP = "Remote IP", Freeing previously allocated memory for authorization-dn-attributes&lt;BR /&gt;Apr 09 01:21:12 [IKEv1 DEBUG]: Group = "Remote IP", IP = "Remote IP", constructing ID payload&lt;BR /&gt;Apr 09 01:21:12 [IKEv1 DEBUG]: Group = "Remote IP", IP = "Remote IP", constructing hash payload&lt;BR /&gt;Apr 09 01:21:12 [IKEv1 DEBUG]: Group = "Remote IP", IP = "Remote IP", Computing hash for ISAKMP&lt;BR /&gt;Apr 09 01:21:13 [IKEv1 DEBUG]: IP = "Remote IP", Constructing IOS keep alive payload: proposal=32767/32767 sec.&lt;BR /&gt;Apr 09 01:21:13 [IKEv1 DEBUG]: Group = "Remote IP", IP = "Remote IP", constructing dpd vid payload&lt;BR /&gt;Apr 09 01:21:13 [IKEv1]: IP = "Remote IP", IKE_DECODE SENDING Message (msgid=0) with payloads : HDR + ID (5) + HASH (8) + IOS KEEPALIVE (128) + VENDOR (13) + NONE (0) total length : 96&lt;BR /&gt;Apr 09 01:21:13 [IKEv1]: Group = "Remote IP", IP = "Remote IP", PHASE 1 COMPLETED&lt;BR /&gt;Apr 09 01:21:13 [IKEv1]: IP = "Remote IP", Keep-alive type for this connection: DPD&lt;BR /&gt;Apr 09 01:21:13 [IKEv1 DEBUG]: Group = "Remote IP", IP = "Remote IP", Starting P1 rekey timer: 82080 seconds.&lt;BR /&gt;Apr 09 01:21:13 [IKEv1 DECODE]: IP = "Remote IP", IKE Responder starting QM: msg id = 725b37af&lt;BR /&gt;Apr 09 01:21:13 [IKEv1]: IP = "Remote IP", IKE_DECODE RECEIVED Message (msgid=725b37af) with payloads : HDR + HASH (8) + SA (1) + NONCE (10) + ID (5) + ID (5) + NOTIFY (11) + NONE (0) total length : 196&lt;BR /&gt;Apr 09 01:21:13 [IKEv1 DEBUG]: Group = "Remote IP", IP = "Remote IP", processing hash payload&lt;BR /&gt;Apr 09 01:21:13 [IKEv1 DEBUG]: Group = "Remote IP", IP = "Remote IP", processing SA payload&lt;BR /&gt;Apr 09 01:21:13 [IKEv1 DEBUG]: Group = "Remote IP", IP = "Remote IP", processing nonce payload&lt;BR /&gt;Apr 09 01:21:13 [IKEv1 DEBUG]: Group = "Remote IP", IP = "Remote IP", processing ID payload&lt;BR /&gt;Apr 09 01:21:13 [IKEv1 DECODE]: Group = "Remote IP", IP = "Remote IP", ID_IPV4_ADDR_SUBNET ID received--10.20.0.0--255.255.0.0&lt;BR /&gt;Apr 09 01:21:13 [IKEv1]: Group = "Remote IP", IP = "Remote IP", Received remote IP Proxy Subnet data in ID Payload:&amp;nbsp;&amp;nbsp; Address 10.20.0.0, Mask 255.255.0.0, Protocol 0, Port 0&lt;BR /&gt;Apr 09 01:21:13 [IKEv1 DEBUG]: Group = "Remote IP", IP = "Remote IP", processing ID payload&lt;BR /&gt;Apr 09 01:21:13 [IKEv1 DECODE]: Group = "Remote IP", IP = "Remote IP", ID_IPV4_ADDR_SUBNET ID received--192.168.42.0--255.255.255.0&lt;BR /&gt;Apr 09 01:21:13 [IKEv1]: Group = "Remote IP", IP = "Remote IP", Received local IP Proxy Subnet data in ID Payload:&amp;nbsp;&amp;nbsp; Address 192.168.42.0, Mask 255.255.255.0, Protocol 0, Port 0&lt;BR /&gt;Apr 09 01:21:13 [IKEv1 DEBUG]: Group = "Remote IP", IP = "Remote IP", processing notify payload&lt;BR /&gt;Apr 09 01:21:13 [IKEv1]: Group = "Remote IP", IP = "Remote IP", QM IsRekeyed old sa not found by addr&lt;BR /&gt;Apr 09 01:21:13 [IKEv1]: Group = "Remote IP", IP = "Remote IP", Static Crypto Map check, checking map = outside_map, seq = 20...&lt;BR /&gt;Apr 09 01:21:13 [IKEv1]: Group = "Remote IP", IP = "Remote IP", Static Crypto Map check, map outside_map, seq = 20 is a successful match&lt;BR /&gt;Apr 09 01:21:13 [IKEv1]: Group = "Remote IP", IP = "Remote IP", IKE Remote Peer configured for crypto map: outside_map&lt;BR /&gt;Apr 09 01:21:13 [IKEv1 DEBUG]: Group = "Remote IP", IP = "Remote IP", processing IPSec SA payload&lt;BR /&gt;Apr 09 01:21:13 [IKEv1 DEBUG]: Group = "Remote IP", IP = "Remote IP", IPSec SA Proposal # 1, Transform # 1 acceptable&amp;nbsp; Matches global IPSec SA entry # 20&lt;BR /&gt;Apr 09 01:21:13 [IKEv1]: Group = "Remote IP", IP = "Remote IP", IKE: requesting SPI!&lt;BR /&gt;Apr 09 01:21:13 [IKEv1 DEBUG]: IP = "Remote IP", IKE SA MM:e91450a7 terminating:&amp;nbsp; flags 0x01000022, refcnt 0, tuncnt 0&lt;BR /&gt;Apr 09 01:21:13 [IKEv1 DEBUG]: IP = "Remote IP", sending delete/delete with reason message&lt;BR /&gt;Apr 09 01:21:13 [IKEv1 DEBUG]: Group = "Remote IP", IP = "Remote IP", IKE got SPI from key engine: SPI = 0x0241c8d3&lt;BR /&gt;Apr 09 01:21:13 [IKEv1 DEBUG]: Group = "Remote IP", IP = "Remote IP", oakley constucting quick mode&lt;BR /&gt;Apr 09 01:21:13 [IKEv1 DEBUG]: Group = "Remote IP", IP = "Remote IP", constructing blank hash payload&lt;BR /&gt;Apr 09 01:21:13 [IKEv1 DEBUG]: Group = "Remote IP", IP = "Remote IP", constructing IPSec SA payload&lt;BR /&gt;Apr 09 01:21:13 [IKEv1 DEBUG]: Group = "Remote IP", IP = "Remote IP", constructing IPSec nonce payload&lt;BR /&gt;Apr 09 01:21:13 [IKEv1 DEBUG]: Group = "Remote IP", IP = "Remote IP", constructing proxy ID&lt;BR /&gt;Apr 09 01:21:13 [IKEv1 DEBUG]: Group = "Remote IP", IP = "Remote IP", Transmitting Proxy Id:&lt;BR /&gt;&amp;nbsp; Remote subnet: 10.20.0.0&amp;nbsp; Mask 255.255.0.0 Protocol 0&amp;nbsp; Port 0&lt;BR /&gt;&amp;nbsp; Local subnet:&amp;nbsp; 192.168.42.0&amp;nbsp; mask 255.255.255.0 Protocol 0&amp;nbsp; Port 0&lt;BR /&gt;Apr 09 01:21:13 [IKEv1 DEBUG]: Group = "Remote IP", IP = "Remote IP", constructing qm hash payload&lt;BR /&gt;Apr 09 01:21:13 [IKEv1 DECODE]: Group = "Remote IP", IP = "Remote IP", IKE Responder sending 2nd QM pkt: msg id = 725b37af&lt;BR /&gt;Apr 09 01:21:13 [IKEv1]: IP = "Remote IP", IKE_DECODE SENDING Message (msgid=725b37af) with payloads : HDR + HASH (8) + SA (1) + NONCE (10) + ID (5) + ID (5) + NONE (0) total length : 168&lt;BR /&gt;Apr 09 01:21:13 [IKEv1]: IP = "Remote IP", IKE_DECODE RECEIVED Message (msgid=725b37af) with payloads : HDR + HASH (8) + NONE (0) total length : 52&lt;BR /&gt;Apr 09 01:21:13 [IKEv1 DEBUG]: Group = "Remote IP", IP = "Remote IP", processing hash payload&lt;BR /&gt;Apr 09 01:21:13 [IKEv1 DEBUG]: Group = "Remote IP", IP = "Remote IP", loading all IPSEC SAs&lt;BR /&gt;Apr 09 01:21:13 [IKEv1 DEBUG]: Group = "Remote IP", IP = "Remote IP", Generating Quick Mode Key!&lt;BR /&gt;Apr 09 01:21:13 [IKEv1 DEBUG]: Group = "Remote IP", IP = "Remote IP", NP encrypt rule look up for crypto map outside_map 20 matching ACL outside_20_cryptomap: returned cs_id=d5e41a50; rule=d3e1cce8&lt;BR /&gt;Apr 09 01:21:13 [IKEv1 DEBUG]: Group = "Remote IP", IP = "Remote IP", Generating Quick Mode Key!&lt;BR /&gt;Apr 09 01:21:13 [IKEv1 DEBUG]: Group = "Remote IP", IP = "Remote IP", NP encrypt rule look up for crypto map outside_map 20 matching ACL outside_20_cryptomap: returned cs_id=d5e41a50; rule=d3e1cce8&lt;BR /&gt;Apr 09 01:21:13 [IKEv1]: Group = "Remote IP", IP = "Remote IP", Security negotiation complete for LAN-to-LAN Group ("Remote IP")&amp;nbsp; Responder, Inbound SPI = 0x0241c8d3, Outbound SPI = 0xc40740ac&lt;BR /&gt;Apr 09 01:21:13 [IKEv1 DEBUG]: Group = "Remote IP", IP = "Remote IP", IKE got a KEY_ADD msg for SA: SPI = 0xc40740ac&lt;BR /&gt;Apr 09 01:21:13 [IKEv1 DEBUG]: Group = "Remote IP", IP = "Remote IP", Pitcher: received KEY_UPDATE, spi 0x241c8d3&lt;BR /&gt;Apr 09 01:21:13 [IKEv1 DEBUG]: Group = "Remote IP", IP = "Remote IP", Starting P2 rekey timer: 27360 seconds.&lt;BR /&gt;Apr 09 01:21:13 [IKEv1]: Group = "Remote IP", IP = "Remote IP", PHASE 2 COMPLETED (msgid=725b37af)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can anyone see anything wrong with this tunnel establishment at all? Everything looks fine as far as I can tell. There is also 2 other VPNs configured on this firewall, and 1 of them has also had this issue for around an hour yesterday, the other 1 has functioned correctly all the time. ISPs at both end insist there is no connectivity problems between the 2 remote networks, and I'm inclined to believe them because the tunnel connects fine, and I can connect to resources on public address at either end from both networks.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I don't see how this can be a config issue, because it has been working 90% of the time until the last 24 hours. Totally out of ideas, anyone else got any?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Gat&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 17:30:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-issue/m-p/1402673#M673765</guid>
      <dc:creator>Gatling_uk</dc:creator>
      <dc:date>2019-03-11T17:30:55Z</dc:date>
    </item>
    <item>
      <title>Re: VPN issue</title>
      <link>https://community.cisco.com/t5/network-security/vpn-issue/m-p/1402674#M673773</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Based on the SAs, traffic are being encrypted, but this end never got the reply back from the other end.&lt;/P&gt;&lt;P&gt;You might want to check the output of "show crypto ipsec sa" from the other end. If it's showing decrypts, but no encrypts, it can mean 2 things:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) NAT exemptions are probably not configured correctly&lt;/P&gt;&lt;P&gt;2) Potentially there are outbound ACL that might block the traffic&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would start checking config on the other end.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 09 Apr 2010 11:40:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-issue/m-p/1402674#M673773</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2010-04-09T11:40:19Z</dc:date>
    </item>
    <item>
      <title>Re: VPN issue</title>
      <link>https://community.cisco.com/t5/network-security/vpn-issue/m-p/1402675#M673783</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi thanks for the reply. Config on the other end is good, the sa looks exactly the same with encrypts but no decrypts.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The correct no nat are definitely in place both ends, aswell as everything else that is required. I've reconfigured it many times at both ends, and just doing that sometimes makes the tunnel start passing traffic again (unless just coincidence...) and then stops again a while later (after 20 minutes last time).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Both devices on 8.0(5).&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 10 Apr 2010 12:39:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-issue/m-p/1402675#M673783</guid>
      <dc:creator>Gatling_uk</dc:creator>
      <dc:date>2010-04-10T12:39:47Z</dc:date>
    </item>
    <item>
      <title>Re: VPN issue</title>
      <link>https://community.cisco.com/t5/network-security/vpn-issue/m-p/1402676#M673802</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Looks like ESP packets are not getting to either sides if you just have encrypt packets but no decrypts on both sides.&lt;/P&gt;&lt;P&gt;By any chance there is anything between the path that might block ESP packet?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 10 Apr 2010 12:45:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-issue/m-p/1402676#M673802</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2010-04-10T12:45:46Z</dc:date>
    </item>
  </channel>
</rss>

