cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
4788
Views
0
Helpful
10
Replies

DMVPN IKEv1 Phase 1 RSA-Sig issue

Clément
Level 1
Level 1

Hello everyone,

 

I am managing a DMVPN infrastructure with two Hubs and around a thousand of Spokes.

There is approximatively all Spokes "Tunnel 2" going to Hub2 UP and running well.

I had move the HUB1 from a datacenter to another and since, i have around 70% of the Spokes "Tunnel 1" that are coming backed.

 

For thoses who are not working fine i've investigate many days and found that there is an issue on IKE phase 1 just after MM_5. This is not going to MM_6 SA Authenticated.

 

If i'm configuring the Spoke With a Pre-share key, all the phases goes well and the tunnel is UP.

There is no issue around UDP 500 / UDP 4500 blocked trafic as i've made some capture trafic and able to see the trames going through. (And like i said if i use a preshare key the tunnel goes UP).

 

I've tried to delete and renew the trustpoint with new CA and new receiving a new Certificate but still...

 

So...

 

I'm having a HUB with the following configuration :

 

 

#show crypto isakmp policy 

Global IKE policy
Protection suite of priority 1
	encryption algorithm:	AES - Advanced Encryption Standard (256 bit keys).
	hash algorithm:		Secure Hash Standard
	authentication method:	Pre-Shared Key
	Diffie-Hellman group:	#2 (1024 bit)
	lifetime:		86400 seconds, no volume limit
Protection suite of priority 2
	encryption algorithm:	AES - Advanced Encryption Standard (256 bit keys).
	hash algorithm:		Secure Hash Standard
	authentication method:	Pre-Shared Key
	Diffie-Hellman group:	#2 (1024 bit)
	lifetime:		86400 seconds, no volume limit
Protection suite of priority 3
	encryption algorithm:	AES - Advanced Encryption Standard (256 bit keys).
	hash algorithm:		Secure Hash Standard
	authentication method:	Rivest-Shamir-Adleman Signature
	Diffie-Hellman group:	#1 (768 bit)
	lifetime:		86400 seconds, no volume limit
Protection suite of priority 10
	encryption algorithm:	AES - Advanced Encryption Standard (256 bit keys).
	hash algorithm:		Secure Hash Standard
	authentication method:	Pre-Shared Key
	Diffie-Hellman group:	#2 (1024 bit)
	lifetime:		28800 seconds, no volume limit
Protection suite of priority 20
	encryption algorithm:	DES - Data Encryption Standard (56 bit keys).
	hash algorithm:		Secure Hash Standard
	authentication method:	Rivest-Shamir-Adleman Signature
	Diffie-Hellman group:	#1 (768 bit)
	lifetime:		86400 seconds, no volume limit
Protection suite of priority 42
	encryption algorithm:	AES - Advanced Encryption Standard (256 bit keys).
	hash algorithm:		Secure Hash Standard
	authentication method:	Pre-Shared Key
        Diffie-Hellman group:	#2 (1024 bit)
        lifetime:		86400 seconds, no volume limit

 

And Spokes with this configuration : 

 

#show crypto isakmp policy 

Global IKE policy
Protection suite of priority 1
	encryption algorithm:	AES - Advanced Encryption Standard (256 bit keys).
	hash algorithm:		Secure Hash Standard
	authentication method:	Rivest-Shamir-Adleman Signature
	Diffie-Hellman group:	#1 (768 bit)
	lifetime:		86400 seconds, no volume limit

So the Policy 1 pf the Spoke Match the Policy 3 of the HUB.

If i do a "show crypto pki certificates verbose" on the Spoke, i can see that the certificate is valide and active.

If i enable "debug dmvpn all all" on the spokes i have no indication on any certificate error or ISAKMP error.

 

 

 

 

I'm staying here for the moment in my explaination. I will provide some configuration lines and debug lines to help you help me in the resolution.

 

Hope you'll be able to help me it's quite annoying !

 

Thanks a lot in advance.

Best,

 

 

10 Replies 10

Hello,

 

post the full configs of the hub and a non-working spoke...

HUB01

!
version 15.5
no service pad
service tcp-keepalives-in
service tcp-keepalives-out
service timestamps debug datetime localtime show-timezone
service timestamps log datetime msec localtime show-timezone
service password-encryption
no platform punt-keepalive disable-kernel-core
!
hostname HUB01
!
boot-start-marker
boot system flash bootflash:asr1001x-universalk9.03.15.01.S.155-2.S1-std.SPA.bin
boot system flash bootflash:asr1001x-universalk9.03.13.02.S.154-3.S2-ext.SPA.bin
boot-end-marker
!
!
vrf definition Mgmt-intf
 !
 address-family ipv4
 exit-address-family
 !
 address-family ipv6
 exit-address-family
!
security authentication failure rate 10 log
security passwords min-length 6
logging buffered 256000
no logging console
enable secret 5 XX
!
aaa new-model
!
!
aaa group server radius radius1
 server X.X.X.X
 attribute nas-port none
!
aaa authentication login default local

!
!
!
!
!
aaa session-id common
clock timezone GMT 0 0
no ip source-route
no ip gratuitous-arps
!
!
!
!
!
!
!
!
!


no ip bootp server
ip domain name XX.XX
ip name-server 8.8.8.8

!
!
!
!
!
!
!
!
!
!
subscriber templating
!
multilink bundle-name authenticated
!
!
!
!
!
!
!         
!
crypto pki trustpoint X.X.X.X
 enrollment mode ra
 enrollment url http://X.X.X.X:P/certsrv/mscep/mscep.dll
 revocation-check none
!
!
crypto pki certificate chain X.X.X.X
 certificate XX
 XX
  	quit
 certificate ca XX
  XX
  	quit

archive
 path tftp://X.X.X.X/Hub01_ASR1001-X_Config_
 write-memory
 time-period 720
spanning-tree extend system-id
!
username XX privilege 15 password 7 XX
!
redundancy
 mode none
!
!
!
!
!
!
ip ssh maxstartups 5
ip ssh time-out 60
ip ssh authentication-retries 4
ip ssh logging events
ip ssh version 2
ip ssh pubkey-chain
  username X
   key-hash ssh-rsa XX
lldp run
!
! 
!
!
!
!
!
crypto isakmp policy 1
 encr aes 256
 authentication pre-share
 group 2
!
crypto isakmp policy 2
 encr aes 256
 authentication pre-share
 group 2
!
crypto isakmp policy 3
 encr aes 256
!
crypto isakmp policy 10
 encr aes 256
 authentication pre-share
 group 2
 lifetime 28800
!
crypto isakmp policy 20
!
crypto isakmp policy 42
 encr aes 256
 authentication pre-share
 group 2

crypto isakmp invalid-spi-recovery
crypto isakmp keepalive 120
!
!
!
crypto ipsec transform-set CLIENT_SET esp-aes 256 esp-sha-hmac 
 mode tunnel
crypto ipsec transform-set trans2 esp-3des esp-md5-hmac 
 mode tunnel
crypto ipsec transform-set trans1 esp-aes 256 esp-md5-hmac 
 mode transport require
crypto ipsec transform-set trans3 esp-aes 256 esp-sha-hmac 
 mode tunnel
crypto ipsec transform-set trans4 esp-aes 256 esp-sha-hmac 
 mode tunnel
crypto ipsec nat-transparency spi-matching
!         
crypto ipsec profile VPNCLIENT
 set transform-set CLIENT_SET 
!
!
crypto ipsec profile vpnprof
 set transform-set trans1 
!
!
crypto dynamic-map VPNCLIENT 100
 set transform-set CLIENT_SET 
!
!
!
!
!
!
! 
! 
!
!
interface Loopback1
 no ip address
 shutdown
!
interface Tunnel1
 bandwidth 50000
 ip address 10.243.31.254 255.255.224.0
 no ip redirects
 ip mtu 1300
 ip nat inside
 ip hello-interval eigrp 1 30
 ip hold-time eigrp 1 90
 ip nhrp authentication XX
 ip nhrp map multicast dynamic
 ip nhrp network-id XX
 ip nhrp holdtime 360
 ip nhrp registration no-unique
 ip nhrp redirect
 ip summary-address eigrp 1 10.241.0.0 255.255.0.0
 ip tcp adjust-mss 1260
 delay 1200
 tunnel source GigabitEthernet0/0/0
 tunnel mode gre multipoint
 tunnel key XX
 tunnel path-mtu-discovery
 tunnel protection ipsec profile vpnprof
 ip virtual-reassembly
 no ip virtual-reassembly-out
!
interface TenGigabitEthernet0/0/0
 no ip address
 shutdown
!
interface TenGigabitEthernet0/0/1
 no ip address
 shutdown
!
interface GigabitEthernet0/0/0
 description Public Interface
 ip address XX XX
 ip mtu 1480
 ip nat outside
 ip access-group WANInterface in
 ip tcp adjust-mss 1440
 negotiation auto
 crypto map VPN
 crypto ipsec fragmentation after-encryption
 ip virtual-reassembly
 ip virtual-reassembly-out
!
interface GigabitEthernet0/0/1
 description Private LAN
 ip address X.X.X.X 255.255.255.0
 ip nat inside
 ip access-group LANInterface in
 negotiation auto
 ip virtual-reassembly
!
interface GigabitEthernet0/0/2
 ip address X.X.X.X 255.255.255.0
 ip nat inside
 ip access-group XX in
 negotiation auto
 ip virtual-reassembly
!
interface GigabitEthernet0/0/3
 no ip address
 shutdown
 negotiation auto
!
interface GigabitEthernet0/0/4
 no ip address
 shutdown
 negotiation auto
!
interface GigabitEthernet0/0/5
 no ip address
 shutdown
 negotiation auto
!
interface GigabitEthernet0
 vrf forwarding Mgmt-intf
 no ip address
 shutdown
 negotiation auto
!
interface Virtual-Template1 type tunnel
 ip unnumbered GigabitEthernet0/0/0
 tunnel mode ipsec ipv4
 tunnel protection ipsec profile VPNCLIENT
 ip virtual-reassembly
!
!
router eigrp 1
 distribute-list EIGRP_distribute out 
 network X  0.0.31.255
 network X 0.0.0.255
 redistribute static
 passive-interface default
 no passive-interface Tunnel1
 no eigrp log-neighbor-changes
 no eigrp log-neighbor-warnings
!

ip nat log translations syslog
ip nat translation timeout 120
ip nat translation tcp-timeout 120
ip nat translation udp-timeout 60
ip nat translation max-entries 1000000

ip nat inside source list NAT_Internet interface GigabitEthernet0/0/0 overload


ip forward-protocol nd
!
no ip http server
no ip http secure-server
!
!
!
ip radius source-interface GigabitEthernet0/0/1 
no logging trap
!
!
!
!
radius-server attribute 4 X
radius-server host X timeout 120 retransmit 4 key 7 XX
!
radius server RadiusMaster
!
!
control-plane
!
 !
 !
 !
 !
!
!
!
!
!
line con 0
 length 0
 stopbits 1
line aux 0
 stopbits 1
line vty 0 4
 access-class 1 in
 exec-timeout 30 0
 transport input ssh
!
ntp server 3.be.pool.ntp.org minpoll 10
!
end

Spoke

version 15.1
no service pad
service timestamps debug datetime localtime
service timestamps log datetime localtime
service password-encryption
!
hostname SPOKE_1255
!
boot-start-marker
boot-end-marker
!
!
logging buffered 64000
no logging console
enable secret 5 XX
!
aaa new-model
!
!
aaa authentication login default local
!
!
!
!
!
aaa session-id common
!
memory-size iomem 10
clock timezone GMT 0 0
clock summer-time GMT+1 recurring last Sun Mar 0:00 last Sun Oct 0:00
crypto pki token default removal timeout 0
!         
crypto pki trustpoint hub02.X.X:P
 enrollment mode ra
 enrollment url http://hub02.X.X:P/certsrv/mscep/mscep.dll
 revocation-check crl none
!
crypto pki trustpoint hub01.X.X:P
 enrollment mode ra
 enrollment url http://hub01.X.X:P/certsrv/mscep/mscep.dll
 revocation-check crl none
!
!
crypto pki certificate chain hub02.X.X:PP
 certificate XX
         XX
  	quit
 certificate ca XX
  XX
  	quit
crypto pki certificate chain hub01.X.X:PP
 certificate X
XX
  	quit
 certificate ca XX
XX
  	quit
ip source-route
!
!
!
!
!
ip cef
ip domain name X.X
ip inspect name FW ftp timeout 3600
ip inspect name FW h323 timeout 3600
ip inspect name FW http timeout 3600
ip inspect name FW rcmd timeout 3600
ip inspect name FW realaudio timeout 3600
ip inspect name FW smtp timeout 3600
ip inspect name FW sqlnet timeout 3600
ip inspect name FW streamworks timeout 3600
ip inspect name FW tcp timeout 3600
ip inspect name FW tftp timeout 30
ip inspect name FW udp timeout 15
ip inspect name FW dns
ip inspect name FW vdolive timeout 3600
no ipv6 cef
!
!
multilink bundle-name authenticated

!
!
username XX password 7 XX
!
!
!
!
ip ssh time-out 60
ip ssh version 2
! 
!
crypto isakmp policy 1
 encr aes 256
crypto isakmp keepalive 120
!
!
crypto ipsec transform-set trans1 esp-aes 256 esp-md5-hmac 
 mode transport require
!
crypto ipsec profile vpnprof1
 set security-association idle-time 120
 set transform-set trans1 
!
crypto ipsec profile vpnprof2
 set security-association idle-time 120
 set transform-set trans1 
!
!
!         
!
!
!
interface Loopback1
 ip address 1.1.5.235 255.255.255.255
 ip nat inside
 ip virtual-reassembly in
 ip tcp adjust-mss 1452
!
interface Tunnel1
 bandwidth 1000
 ip address 10.243.4.235 255.255.224.0
 no ip redirects
 ip mtu 1400
 ip nat outside
 ip nhrp authentication XX
 ip nhrp map 10.243.31.254 HUB01_IP
 ip nhrp map multicast HUB01_IP
 ip nhrp network-id XX
 ip nhrp holdtime 600
 ip nhrp nhs 10.243.31.254
 ip virtual-reassembly in
 ip tcp adjust-mss 1360
 delay 1000
 tunnel source FastEthernet4
 tunnel mode gre multipoint
 tunnel key XX
 tunnel protection ipsec profile vpnprof1 shared
!
interface Tunnel2
 bandwidth 1000
 ip address 10.243.36.235 255.255.224.0
 no ip redirects
 ip mtu 1400
 ip nat outside
 ip nhrp authentication XX
 ip nhrp map 10.243.63.254 HUB02_IP
 ip nhrp map multicast HUB02_IP
 ip nhrp network-id XX
 ip nhrp holdtime 600
 ip nhrp nhs 10.243.63.254
 ip virtual-reassembly in
 ip tcp adjust-mss 1360
 delay 1100
 tunnel source FastEthernet4
 tunnel mode gre multipoint
 tunnel key XX
 tunnel protection ipsec profile vpnprof2 shared
!
interface FastEthernet0
 spanning-tree portfast
!
interface FastEthernet1
 spanning-tree portfast
!
interface FastEthernet2
 spanning-tree portfast
!
interface FastEthernet3
 spanning-tree portfast
!
interface FastEthernet4
 ip address dhcp
 ip access-group Filter_OUT in
 ip nat outside
 ip virtual-reassembly in
 duplex auto
 speed auto
!
interface Vlan1
 description ***Local LAN***
 ip address 172.20.0.1 255.255.0.0
 ip access-group Filter_IN in
 ip nat inside
 ip inspect FW in
 ip virtual-reassembly in
!
!
router eigrp 1
 distribute-list Distribute out Tunnel1
 distribute-list Distribute out Tunnel2
 network X 0.0.31.255
 network X 0.0.31.255
 redistribute static
 offset-list 10 in 10 Tunnel2 
 passive-interface default
 no passive-interface Tunnel1
 no passive-interface Tunnel2
!
ip forward-protocol nd
no ip http server
no ip http secure-server
!
!
ip dns server
ip nat inside source list NAT_Internet interface FastEthernet4 overload

ip route 0.0.0.0 0.0.0.0 dhcp
!
ip access-list standard Distribute
 permit 10.89.204.0 0.0.1.255
!
ip access-list extended Filter_IN
 permit ip 172.20.0.0 0.0.255.255 10.242.0.0 0.0.255.255
 permit ip 172.20.0.0 0.0.255.255 10.240.0.0 0.0.0.255
 permit ip 172.20.0.0 0.0.255.255 10.241.0.0 0.0.0.255
 permit ip 172.20.0.0 0.0.255.255 10.244.255.0 0.0.0.255
 permit ip 172.20.0.0 0.0.255.255 10.244.254.0 0.0.0.255
 deny   ip 172.20.0.0 0.0.255.255 10.0.0.0 0.255.255.255
 permit ip 172.20.0.0 0.0.255.255 any
 permit gre 172.20.0.0 0.0.255.255 any
 permit esp 172.20.0.0 0.0.255.255 any
ip access-list extended Filter_OUT
 permit ip host HUB01 any
 permit icmp any any unreachable
 permit icmp any any echo-reply
 permit icmp any any packet-too-big
 permit icmp any any time-exceeded
 permit icmp any any traceroute
 permit icmp any any administratively-prohibited
 permit icmp any any echo
 permit tcp any any eq 22
 permit udp any any eq bootpc
 permit udp any eq domain any
 permit gre any any
 permit ip host HUB02 any
 permit esp host HUB01 any
ip access-list extended NAT_Internal
 permit ip 172.20.0.0 0.0.255.255 10.0.0.0 0.255.255.255
ip access-list extended NAT_Internet
 deny   ip 172.20.0.0 0.0.255.255 10.0.0.0 0.255.255.255
 permit ip 172.20.0.0 0.0.255.255 any
!
logging esm config
no cdp run

!
!
!
!
route-map NAT_Internal permit 10
 match ip address NAT_Internal
!
!
!
control-plane
!
!
line con 0
 logging synchronous
 no modem enable
line aux 0
line vty 0 4
 logging synchronous
 transport input ssh
!
ntp server 10.243.31.254
ntp server 10.243.63.254
end

 

Debug Spoke (debug dmvpn all all)

 

Jun  1 10:29:24: IPSEC-IFC MGRE/Tu1[shared]: Checking tunnel status.
Jun  1 10:29:24: IPSEC-IFC MGRE/Tu1[shared]: tunnel coming up
Jun  1 10:29:24: IPSEC-IFC MGRE/Tu1[shared]: crypto_ss_listen_start already listening
Jun  1 10:29:24: CRYPTO_SS(TUNNEL SEC): Application started listening
Jun  1 10:29:25: IPSEC-IFC MGRE/Tu1[shared]: crypto_ss_listen_start already listening
Jun  1 10:29:25: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): Opening a socket with profile vpnprof1
Jun  1 10:29:25: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): connection lookup returned 0
Jun  1 10:29:25: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): Triggering tunnel immediately.
Jun  1 10:29:25: IPSEC-IFC MGRE/Tu1[shared]: Adding Tunnel1 tunnel interface to shared list
Jun  1 10:29:25: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): connection lookup returned 87C36B58
Jun  1 10:29:25: IPSEC-IFC MGRE/Tu1[shared]: Socket 87C36B58 for HUB01_IP not open or does not exist
Jun  1 10:29:25: insert of map into mapdb AVL failed, map + ace pair already exists on the mapdb
Jun  1 10:29:25: CRYPTO_SS(TUNNEL SEC): Active open, socket info: local SRC_IP SRC_IP/255.255.255.255/0, remote HUB01_IP HUB01_IP/255.255.255.255/0,  prot 47, ifc Tu1
Jun  1 10:29:25: IPSEC(recalculate_mtu): reset sadb_root 88243F1C mtu to 1500
Jun  1 10:29:25: IPSEC(sa_request): ,
  (key eng. msg.) OUTBOUND local= SRC_IP:500, remote= HUB01_IP:500,
    local_proxy= SRC_IP/255.255.255.255/47/0,
    remote_proxy= HUB01_IP/255.255.255.255/47/0,
    protocol= ESP, transform= esp-aes 256 esp-md5-hmac  (Transport), 
    lifedur= 3600s and 4608000kb, 
    spi= 0x0(0), conn_id= 0, keysize= 256, flags= 0x0
Jun  1 10:29:25: ISAKMP:(0): SA request profile is (NULL)
Jun  1 10:29:25: ISAKMP: Created a peer struct for HUB01_IP, peer port 500
Jun  1 10:29:25: ISAKMP: New peer created peer = 0x8847D7E0 peer_handle = 0x8000644D
Jun  1 10:29:25: ISAKMP: Locking peer struct 0x8847D7E0, refcount 1 for isakmp_initiator
Jun  1 10:29:25: ISAKMP: local port 500, remote port 500
Jun  1 10:29:25: ISAKMP: set new node 0 to QM_IDLE      
Jun  1 10:29:25: ISAKMP:(0):insert sa successfully sa = 87BF14CC
Jun  1 10:29:25: ISAKMP:(0):Can not start Aggressive mode, trying Main mode.
Jun  1 10:29:25: ISAKMP:(0):No pre-shared key with HUB01_IP!
Jun  1 10:29:25: ISAKMP:(0): IKE->PKI Get configured TrustPoints state (I) MM_NO_STATE (peer HUB01_IP)
Jun  1 10:29:25: ISAKMP:(0): PKI->IKE Got configured TrustPoints state (I) MM_NO_STATE (peer HUB01_IP)
Jun  1 10:29:25: ISAKMP:(0): constructed NAT-T vendor-rfc3947 ID
Jun  1 10:29:25: ISAKMP:(0): constructed NAT-T vendor-07 ID
Jun  1 10:29:25: ISAKMP:(0): constructed NAT-T vendor-03 ID
Jun  1 10:29:25: ISAKMP:(0): constructed NAT-T vendor-02 ID
Jun  1 10:29:25: ISAKMP:(0):Input = IKE_MESG_FROM_IPSEC, IKE_SA_REQ_MM
Jun  1 10:29:25: ISAKMP:(0):Old State = IKE_READY  New State = IKE_I_MM1 

Jun  1 10:29:25: ISAKMP:(0): beginning Main Mode exchange
Jun  1 10:29:25: ISAKMP:(0): sending packet to HUB01_IP my_port 500 peer_port 500 (I) MM_NO_STATE
Jun  1 10:29:25: ISAKMP:(0):Sending an IKE IPv4 Packet.
Jun  1 10:29:25: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): connection lookup returned 87C36B58
Jun  1 10:29:25: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): good socket ready message
Jun  1 10:29:25: %SYS-5-CONFIG_I: Configured from console by admin on vty0 ( )
Jun  1 10:29:25: ISAKMP (0): received packet from HUB01_IP dport 500 sport 500 Global (I) MM_NO_STATE
Jun  1 10:29:25: ISAKMP:(0):Input = IKE_MESG_FROM_PEER, IKE_MM_EXCH
Jun  1 10:29:25: ISAKMP:(0):Old State = IKE_I_MM1  New State = IKE_I_MM2 

Jun  1 10:29:25: ISAKMP:(0): processing SA payload. message ID = 0
Jun  1 10:29:25: ISAKMP:(0): processing vendor id payload
Jun  1 10:29:25: ISAKMP:(0): vendor ID seems Unity/DPD but major 69 mismatch
Jun  1 10:29:25: ISAKMP (0): vendor ID is NAT-T RFC 3947
Jun  1 10:29:25: ISAKMP : Scanning profiles for xauth ...
Jun  1 10:29:25: ISAKMP:(0): IKE->PKI Get configured TrustPoints state (I) MM_NO_STATE (peer HUB01_IP)
Jun  1 10:29:25: ISAKMP:(0): PKI->IKE Got configured TrustPoints state (I) MM_NO_STATE (peer HUB01_IP)
Jun  1 10:29:25: ISAKMP:(0):Checking ISAKMP transform 1 against priority 1 policy
Jun  1 10:29:25: ISAKMP:      encryption AES-CBC
Jun  1 10:29:25: ISAKMP:      keylength of 256
Jun  1 10:29:25: ISAKMP:      hash SHA
Jun  1 10:29:25: ISAKMP:      default group 1
Jun  1 10:29:25: ISAKMP:      auth RSA sig
Jun  1 10:29:25: ISAKMP:      life type in seconds
Jun  1 10:29:25: ISAKMP:      life duration (VPI) of  0x0 0x1 0x51 0x80 
Jun  1 10:29:25: ISAKMP:(0):atts are acceptable. Next payload is 0
Jun  1 10:29:25: ISAKMP:(0):Acceptable atts:actual life: 0
Jun  1 10:29:25: ISAKMP:(0):Acceptable atts:life: 0
Jun  1 10:29:25: ISAKMP:(0):Fill atts in sa vpi_length:4
Jun  1 10:29:25: ISAKMP:(0):Fill atts in sa life_in_seconds:86400
Jun  1 10:29:25: ISAKMP:(0): IKE->PKI Start PKI Session state (I) MM_NO_STATE (peer HUB01_IP)
Jun  1 10:29:25: ISAKMP:(0): PKI->IKE Started PKI Session state (I) MM_NO_STATE (peer HUB01_IP)
Jun  1 10:29:25: ISAKMP:(0):Returning Actual lifetime: 86400
Jun  1 10:29:25: ISAKMP:(0)::Started lifetime timer: 86400.

Jun  1 10:29:25: ISAKMP:(0): processing vendor id payload
Jun  1 10:29:25: ISAKMP:(0): vendor ID seems Unity/DPD but major 69 mismatch
Jun  1 10:29:25: ISAKMP (0): vendor ID is NAT-T RFC 3947
Jun  1 10:29:25: ISAKMP:(0):Input = IKE_MESG_INTERNAL, IKE_PROCESS_MAIN_MODE
Jun  1 10:29:25: ISAKMP:(0):Old State = IKE_I_MM2  New State = IKE_I_MM2 

Jun  1 10:29:25: ISAKMP:(0): IKE->PKI Get configured TrustPoints state (I) MM_SA_SETUP (peer HUB01_IP)
Jun  1 10:29:25: ISAKMP:(0): PKI->IKE Got configured TrustPoints state (I) MM_SA_SETUP (peer HUB01_IP)
Jun  1 10:29:25: ISAKMP:(0): IKE->PKI Get IssuerNames state (I) MM_SA_SETUP (peer HUB01_IP)
Jun  1 10:29:25: ISAKMP:(0): PKI->IKE Got IssuerNames state (I) MM_SA_SETUP (peer HUB01_IP)
Jun  1 10:29:25: ISAKMP (0): constructing CERT_REQ for issuer cn= DOMAIN,dc=FQ,dc=DN
Jun  1 10:29:25: ISAKMP (0): constructing CERT_REQ for issuer cn=CAServer,dc=DomainName,dc=local
Jun  1 10:29:25: ISAKMP:(0): sending packet to HUB01_IP my_port 500 peer_port 500 (I) MM_SA_SETUP
Jun  1 10:29:25: ISAKMP:(0):Sending an IKE IPv4 Packet.
Jun  1 10:29:25: ISAKMP:(0):Input = IKE_MESG_INTERNAL, IKE_PROCESS_COMPLETE
Jun  1 10:29:25: ISAKMP:(0):Old State = IKE_I_MM2  New State = IKE_I_MM3 

Jun  1 10:29:25: ISAKMP (0): received packet from HUB01_IP dport 500 sport 500 Global (I) MM_SA_SETUP
Jun  1 10:29:25: ISAKMP:(0):Input = IKE_MESG_FROM_PEER, IKE_MM_EXCH
Jun  1 10:29:25: ISAKMP:(0):Old State = IKE_I_MM3  New State = IKE_I_MM4 

Jun  1 10:29:25: ISAKMP:(0): processing KE payload. message ID = 0
Jun  1 10:29:25: ISAKMP:(0): processing NONCE payload. message ID = 0
Jun  1 10:29:25: ISAKMP:(2111): processing CERT_REQ payload. message ID = 0
Jun  1 10:29:25: ISAKMP:(2111): peer wants a CT_X509_SIGNATURE cert
Jun  1 10:29:25: ISAKMP:(2111): peer wants cert issued by cn= DOMAIN,dc=FQ,dc=DN
Jun  1 10:29:25:  Choosing trustpoint hub01.FQDN.com:PORT as issuer
Jun  1 10:29:25: ISAKMP:(2111): processing vendor id payload
Jun  1 10:29:25: ISAKMP:(2111): vendor ID is Unity
Jun  1 10:29:25: ISAKMP:(2111): processing vendor id payload
Jun  1 10:29:25: ISAKMP:(2111): vendor ID is DPD
Jun  1 10:29:25: ISAKMP:(2111): processing vendor id payload
Jun  1 10:29:25: ISAKMP:(2111): speaking to another IOS box!
Jun  1 10:29:25: ISAKMP:received payload type 20
Jun  1 10:29:25: ISAKMP (2111): NAT found, both nodes inside NAT
Jun  1 10:29:25: ISAKMP:received payload type 20
Jun  1 10:29:25: ISAKMP (2111): My hash no match -  this node inside NAT
Jun  1 10:29:25: ISAKMP:(2111):Input = IKE_MESG_INTERNAL, IKE_PROCESS_MAIN_MODE
Jun  1 10:29:25: ISAKMP:(2111):Old State = IKE_I_MM4  New State = IKE_I_MM4 

Jun  1 10:29:25: ISAKMP:(2111):Send initial contact
Jun  1 10:29:25: ISAKMP:(2111): IKE->PKI Get self CertificateChain state (I) MM_KEY_EXCH (peer HUB01_IP)
Jun  1 10:29:25: ISAKMP:(2111): PKI->IKE Got self CertificateChain state (I) MM_KEY_EXCH (peer HUB01_IP)
Jun  1 10:29:25: ISAKMP:(2111): IKE->PKI Get SubjectName state (I) MM_KEY_EXCH (peer HUB01_IP)
Jun  1 10:29:25: ISAKMP:(2111): PKI->IKE Got SubjectName state (I) MM_KEY_EXCH (peer HUB01_IP)
Jun  1 10:29:25: ISAKMP:(2111):My ID configured as IPv4 Addr, but Addr not in Cert!
Jun  1 10:29:25: ISAKMP:(2111):Using FQDN as My ID
Jun  1 10:29:25: ISAKMP:(2111):SA is doing RSA signature authentication using id type ID_FQDN
Jun  1 10:29:25: ISAKMP (2111): ID payload 
	next-payload : 6
	type         : 2 
	FQDN name    : SPOKE.FQDN.XYZ 
	protocol     : 17 
	port         : 0 
	length       : 25
Jun  1 10:29:25: ISAKMP:(2111):Total payload length: 25
Jun  1 10:29:25: ISAKMP:(2111): IKE->PKI Get CertificateChain to be sent to peer state (I) MM_KEY_EXCH (peer HUB01_IP)
Jun  1 10:29:25: ISAKMP:(2111): PKI->IKE Got CertificateChain to be sent to peer state (I) MM_KEY_EXCH (peer HUB01_IP)
Jun  1 10:29:25: ISAKMP (2111): constructing CERT payload for hostname=SPOKE.FQDN.XYZ
Jun  1 10:29:25: ISKAMP: growing send buffer from 1024 to 3072
Jun  1 10:29:25: ISAKMP:(2111): using the hub01.FQDN.com:PORT trustpoint's keypair to sign
Jun  1 10:29:25: ISAKMP:(2111): sending packet to HUB01_IP my_port 4500 peer_port 4500 (I) MM_KEY_EXCH
Jun  1 10:29:25: ISAKMP:(2111):Sending an IKE IPv4 Packet.
Jun  1 10:29:25: ISAKMP:(2111):Input = IKE_MESG_INTERNAL, IKE_PROCESS_COMPLETE
Jun  1 10:29:25: ISAKMP:(2111):Old State = IKE_I_MM4  New State = IKE_I_MM5 

Jun  1 10:29:25: ISAKMP (0): received packet from HUB01_IP dport 4500 sport 4500 Global (N) NEW SA
SPOKE_0268#
Jun  1 10:29:25: %CRYPTO-4-IKMP_NO_SA: IKE message from HUB01_IP has no SA and is not an initialization offer
Jun  1 10:29:26: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): connection lookup returned 87C36B58
Jun  1 10:29:26: %LINK-3-UPDOWN: Interface Tunnel1, changed state to up
Jun  1 10:29:26: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): connection lookup returned 87C36B58
Jun  1 10:29:26: IPSEC(ERROR): crypto_notify_rp Rejected notify RP, elapse time 80 < 1000

Jun  1 10:29:26: IPSEC-IFC MGRE/Tu1[shared]: tunnel coming up
Jun  1 10:29:26: IPSEC-IFC MGRE/Tu1[shared]: crypto_ss_listen_start already listening
Jun  1 10:29:26: IPSEC-IFC MGRE/Tu1[shared]: crypto_ss_listen_start already listening
Jun  1 10:29:26: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): Opening a socket with profile vpnprof1
Jun  1 10:29:26: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): connection lookup returned 87C36B58
Jun  1 10:29:26: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): Socket is already open. Ignoring.
SPOKE_0268#
Jun  1 10:29:26: %LINEPROTO-5-UPDOWN: Line protocol on Interface Tunnel1, changed state to up
SPOKE_0268#
Jun  1 10:29:27: IPSEC(ERROR): crypto_notify_rp Rejected notify RP, elapse time 0 < 1000

Jun  1 10:29:27: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): connection lookup returned 87C36B58
Jun  1 10:29:27: IPSEC(ERROR): crypto_notify_rp Rejected notify RP, elapse time 284 < 1000

SPOKE_0268#
Jun  1 10:29:31: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): connection lookup returned 87C36B58
Jun  1 10:29:32: IPSEC(ERROR): crypto_notify_rp Rejected notify RP, elapse time 608 < 1000

Jun  1 10:29:32: IPSEC(ERROR): crypto_notify_rp Rejected notify RP, elapse time 608 < 1000

Jun  1 10:29:32: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): connection lookup returned 87C36B58
Jun  1 10:29:32: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): Found Tunnel1 interface in shared list
Jun  1 10:29:32: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): Removing Tunnel1 interface from shared list
Jun  1 10:29:32: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): Closing socket
Jun  1 10:29:32: CRYPTO_SS(TUNNEL SEC): Closed socket.
Jun  1 10:29:32: CRYPTO_SS(TUNNEL SEC): local SRC_IP SRC_IP/255.255.255.255/0, remote HUB01_IP HUB01_IP/255.255.255.255/0, prot 47, ifc Tu1
Jun  1 10:29:32: ISAKMP:(2111):peer does not do paranoid keepalives.

Jun  1 10:29:32: ISAKMP:(2111):deleting SA reason "P1 delete notify (in)" state (I) MM_KEY_EXCH (peer HUB01_IP)
Jun  1 10:29:32: ISAKMP:(2111):deleting SA reason "P1 delete notify (in)" state (I) MM_KEY_EXCH (peer HUB01_IP) 
Jun  1 10:29:32: ISAKMP: Unlocking peer struct 0x8847D7E0 for isadb_mark_sa_deleted(), count 0
Jun  1 10:29:32: ISAKMP: Deleting peer node by peer_reap for HUB01_IP: 8847D7E0
Jun  1 10:29:32: ISAKMP:(2111):deleting node -779529369 error FALSE reason "IKE deleted"
Jun  1 10:29:32: ISAKMP:(2111): IKE->PKI End PKI Session state (I) MM_NO_STATE (peer HUB01_IP)
Jun  1 10:29:32: ISAKMP:(2111): PKI->IKE Ended PKI Session state (I) MM_NO_STATE (peer HUB01_IP)
Jun  1 10:29:32: ISAKMP:(2111):Input = IKE_MESG_INTERNAL, IKE_PHASE1_DEL
Jun  1 10:29:32: ISAKMP:(2111):Old State = IKE_I_MM5  New State = IKE_DEST_SA 

Jun  1 10:29:32: IPSEC(key_engine): got a queue event with 1 KMI message(s)
SPOKE_0268#
Jun  1 10:29:39: IPSEC-IFC MGRE/Tu1[shared]: crypto_ss_listen_start already listening
Jun  1 10:29:39: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): Opening a socket with profile vpnprof1
Jun  1 10:29:39: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): connection lookup returned 0
Jun  1 10:29:39: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): Triggering tunnel immediately.
Jun  1 10:29:39: IPSEC-IFC MGRE/Tu1[shared]: Adding Tunnel1 tunnel interface to shared list
Jun  1 10:29:39: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): connection lookup returned 87454954
Jun  1 10:29:39: IPSEC-IFC MGRE/Tu1[shared]: Socket 87454954 for HUB01_IP not open or does not exist
Jun  1 10:29:39: insert of map into mapdb AVL failed, map + ace pair already exists on the mapdb
Jun  1 10:29:39: CRYPTO_SS(TUNNEL SEC): Active open, socket info: local SRC_IP SRC_IP/255.255.255.255/0, remote HUB01_IP HUB01_IP/255.255.255.255/0,  prot 47, ifc Tu1
Jun  1 10:29:39: IPSEC(recalculate_mtu): reset sadb_root 88243F1C mtu to 1500
Jun  1 10:29:39: IPSEC(sa_request): ,
  (key eng. msg.) OUTBOUND local= SRC_IP:500, remote= HUB01_IP:500,
    local_proxy= SRC_IP/255.255.255.255/47/0,
    remote_proxy= HUB01_IP/255.255.255.255/47/0,
    protocol= ESP, transform= esp-aes 256 esp-md5-hmac  (Transport), 
    lifedur= 3600s and 4608000kb, 
    spi= 0x0(0), conn_id= 0, keysize= 256, flags= 0x0
Jun  1 10:29:39: ISAKMP:(0): SA request profile is (NULL)
Jun  1 10:29:39: ISAKMP: Created a peer struct for HUB01_IP, peer port 500
Jun  1 10:29:39: ISAKMP: New peer created peer = 0x87C36B58 peer_handle = 0x8000644F
Jun  1 10:29:39: ISAKMP: Locking peer struct 0x87C36B58, refcount 1 for isakmp_initiator
Jun  1 10:29:39: ISAKMP: local port 500, remote port 500
Jun  1 10:29:39: ISAKMP: set new node 0 to QM_IDLE      
Jun  1 10:29:39: ISAKMP: Find a dup sa in the avl tree during calling isadb_insert sa = 87BF0498
Jun  1 10:29:39: ISAKMP:(0):Can not start Aggressive mode, trying Main mode.
Jun  1 10:29:39: ISAKMP:(0):No pre-shared key with HUB01_IP!
Jun  1 10:29:39: ISAKMP:(0): IKE->PKI Get configured TrustPoints state (I) MM_NO_STATE (peer HUB01_IP)
Jun  1 10:29:39: ISAKMP:(0): PKI->IKE Got configured TrustPoints state (I) MM_NO_STATE (peer HUB01_IP)
Jun  1 10:29:39: ISAKMP:(0): constructed NAT-T vendor-rfc3947 ID
Jun  1 10:29:39: ISAKMP:(0): constructed NAT-T vendor-07 ID
Jun  1 10:29:39: ISAKMP:(0): constructed NAT-T vendor-03 ID
Jun  1 10:29:39: ISAKMP:(0): constructed NAT-T vendor-02 ID
Jun  1 10:29:39: ISAKMP:(0):Input = IKE_MESG_FROM_IPSEC, IKE_SA_REQ_MM
Jun  1 10:29:39: ISAKMP:(0):Old State = IKE_READY  New State = IKE_I_MM1 

Jun  1 10:29:39: ISAKMP:(0): beginning Main Mode exchange
Jun  1 10:29:39: ISAKMP:(0): sending packet to HUB01_IP my_port 500 peer_port 500 (I) MM_NO_STATE
Jun  1 10:29:39: ISAKMP:(0):Sending an IKE IPv4 Packet.
Jun  1 10:29:39: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): connection lookup returned 87454954
Jun  1 10:29:39: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): good socket ready message
Jun  1 10:29:39: ISAKMP (0): received packet from HUB01_IP dport 500 sport 500 Global (I) MM_NO_STATE
Jun  1 10:29:39: ISAKMP:(0):Input = IKE_MESG_FROM_PEER, IKE_MM_EXCH
Jun  1 10:29:39: ISAKMP:(0):Old State = IKE_I_MM1  New State = IKE_I_MM2 

Jun  1 10:29:39: ISAKMP:(0): processing SA payload. message ID = 0
Jun  1 10:29:39: ISAKMP:(0): processing vendor id payload
Jun  1 10:29:39: ISAKMP:(0): vendor ID seems Unity/DPD but major 69 mismatch
Jun  1 10:29:39: ISAKMP (0): vendor ID is NAT-T RFC 3947
Jun  1 10:29:39: ISAKMP : Scanning profiles for xauth ...
Jun  1 10:29:39: ISAKMP:(0): IKE->PKI Get configured TrustPoints state (I) MM_NO_STATE (peer HUB01_IP)
Jun  1 10:29:39: ISAKMP:(0): PKI->IKE Got configured TrustPoints state (I) MM_NO_STATE (peer HUB01_IP)
Jun  1 10:29:39: ISAKMP:(0):Checking ISAKMP transform 1 against priority 1 policy
Jun  1 10:29:39: ISAKMP:      encryption AES-CBC
Jun  1 10:29:39: ISAKMP:      keylength of 256
Jun  1 10:29:39: ISAKMP:      hash SHA
Jun  1 10:29:39: ISAKMP:      default group 1
Jun  1 10:29:39: ISAKMP:      auth RSA sig
Jun  1 10:29:39: ISAKMP:      life type in seconds
Jun  1 10:29:39: ISAKMP:      life duration (VPI) of  0x0 0x1 0x51 0x80 
Jun  1 10:29:39: ISAKMP:(0):atts are acceptable. Next payload is 0
Jun  1 10:29:39: ISAKMP:(0):Acceptable atts:actual life: 0
Jun  1 10:29:39: ISAKMP:(0):Acceptable atts:life: 0
Jun  1 10:29:39: ISAKMP:(0):Fill atts in sa vpi_length:4
Jun  1 10:29:39: ISAKMP:(0):Fill atts in sa life_in_seconds:86400
Jun  1 10:29:39: ISAKMP:(0): IKE->PKI Start PKI Session state (I) MM_NO_STATE (peer HUB01_IP)
Jun  1 10:29:39: ISAKMP:(0): PKI->IKE Started PKI Session state (I) MM_NO_STATE (peer HUB01_IP)
Jun  1 10:29:39: ISAKMP:(0):Returning Actual lifetime: 86400
Jun  1 10:29:39: ISAKMP:(0)::Started lifetime timer: 86400.

Jun  1 10:29:39: ISAKMP:(0): processing vendor id payload
Jun  1 10:29:39: ISAKMP:(0): vendor ID seems Unity/DPD but major 69 mismatch
Jun  1 10:29:39: ISAKMP (0): vendor ID is NAT-T RFC 3947
Jun  1 10:29:39: ISAKMP:(0):Input = IKE_MESG_INTERNAL, IKE_PROCESS_MAIN_MODE
Jun  1 10:29:39: ISAKMP:(0):Old State = IKE_I_MM2  New State = IKE_I_MM2 

Jun  1 10:29:39: ISAKMP:(0): IKE->PKI Get configured TrustPoints state (I) MM_SA_SETUP (peer HUB01_IP)
Jun  1 10:29:39: ISAKMP:(0): PKI->IKE Got configured TrustPoints state (I) MM_SA_SETUP (peer HUB01_IP)
Jun  1 10:29:39: ISAKMP:(0): IKE->PKI Get IssuerNames state (I) MM_SA_SETUP (peer HUB01_IP)
Jun  1 10:29:39: ISAKMP:(0): PKI->IKE Got IssuerNames state (I) MM_SA_SETUP (peer HUB01_IP)
Jun  1 10:29:39: ISAKMP (0): constructing CERT_REQ for issuer cn= DOMAIN,dc=FQ,dc=DN
Jun  1 10:29:39: ISAKMP (0): constructing CERT_REQ for issuer cn=CAServer,dc=DomainName,dc=local
Jun  1 10:29:39: ISAKMP:(0): sending packet to HUB01_IP my_port 500 peer_port 500 (I) MM_SA_SETUP
Jun  1 10:29:39: ISAKMP:(0):Sending an IKE IPv4 Packet.
Jun  1 10:29:39: ISAKMP:(0):Input = IKE_MESG_INTERNAL, IKE_PROCESS_COMPLETE
Jun  1 10:29:39: ISAKMP:(0):Old State = IKE_I_MM2  New State = IKE_I_MM3 

Jun  1 10:29:39: ISAKMP (0): received packet from HUB01_IP dport 500 sport 500 Global (I) MM_SA_SETUP
Jun  1 10:29:39: ISAKMP:(0):Input = IKE_MESG_FROM_PEER, IKE_MM_EXCH
Jun  1 10:29:39: ISAKMP:(0):Old State = IKE_I_MM3  New State = IKE_I_MM4 

Jun  1 10:29:39: ISAKMP:(0): processing KE payload. message ID = 0
Jun  1 10:29:39: ISAKMP:(0): processing NONCE payload. message ID = 0
Jun  1 10:29:39: ISAKMP:(2112): processing CERT_REQ payload. message ID = 0
Jun  1 10:29:39: ISAKMP:(2112): peer wants a CT_X509_SIGNATURE cert
Jun  1 10:29:39: ISAKMP:(2112): peer wants cert issued by cn= DOMAIN,dc=FQ,dc=DN
Jun  1 10:29:39:  Choosing trustpoint hub01.FQDN.com:PORT as issuer
Jun  1 10:29:39: ISAKMP:(2112): processing vendor id payload
Jun  1 10:29:39: ISAKMP:(2112): vendor ID is Unity
Jun  1 10:29:39: ISAKMP:(2112): processing vendor id payload
Jun  1 10:29:39: ISAKMP:(2112): vendor ID is DPD
Jun  1 10:29:39: ISAKMP:(2112): processing vendor id payload
Jun  1 10:29:39: ISAKMP:(2112): speaking to another IOS box!
Jun  1 10:29:39: ISAKMP:received payload type 20
Jun  1 10:29:39: ISAKMP (2112): NAT found, both nodes inside NAT
Jun  1 10:29:39: ISAKMP:received payload type 20
Jun  1 10:29:39: ISAKMP (2112): My hash no match -  this node inside NAT
Jun  1 10:29:39: ISAKMP:(2112):Input = IKE_MESG_INTERNAL, IKE_PROCESS_MAIN_MODE
Jun  1 10:29:39: ISAKMP:(2112):Old State = IKE_I_MM4  New State = IKE_I_MM4 

Jun  1 10:29:39: ISAKMP:(2112):Send initial contact
Jun  1 10:29:39: ISAKMP:(2112): IKE->PKI Get self CertificateChain state (I) MM_KEY_EXCH (peer HUB01_IP)
Jun  1 10:29:39: ISAKMP:(2112): PKI->IKE Got self CertificateChain state (I) MM_KEY_EXCH (peer HUB01_IP)
Jun  1 10:29:39: ISAKMP:(2112): IKE->PKI Get SubjectName state (I) MM_KEY_EXCH (peer HUB01_IP)
Jun  1 10:29:39: ISAKMP:(2112): PKI->IKE Got SubjectName state (I) MM_KEY_EXCH (peer HUB01_IP)
Jun  1 10:29:39: ISAKMP:(2112):My ID configured as IPv4 Addr, but Addr not in Cert!
Jun  1 10:29:39: ISAKMP:(2112):Using FQDN as My ID
Jun  1 10:29:39: ISAKMP:(2112):SA is doing RSA signature authentication using id type ID_FQDN
Jun  1 10:29:39: ISAKMP (2112): ID payload 
	next-payload : 6
	type         : 2 
	FQDN name    : SPOKE.FQDN.XYZ 
	protocol     : 17 
	port         : 0 
	length       : 25
Jun  1 10:29:39: ISAKMP:(2112):Total payload length: 25
Jun  1 10:29:39: ISAKMP:(2112): IKE->PKI Get CertificateChain to be sent to peer state (I) MM_KEY_EXCH (peer HUB01_IP)
Jun  1 10:29:39: ISAKMP:(2112): PKI->IKE Got CertificateChain to be sent to peer state (I) MM_KEY_EXCH (peer HUB01_IP)
Jun  1 10:29:39: ISAKMP (2112): constructing CERT payload for hostname=SPOKE.FQDN.XYZ
Jun  1 10:29:39: ISKAMP: growing send buffer from 1024 to 3072
Jun  1 10:29:39: ISAKMP:(2112): using the hub01.FQDN.com:PORT trustpoint's keypair to sign
Jun  1 10:29:39: ISAKMP:(2112): sending packet to HUB01_IP my_port 4500 peer_port 4500 (I) MM_KEY_EXCH
Jun  1 10:29:39: ISAKMP:(2112):Sending an IKE IPv4 Packet.
Jun  1 10:29:39: ISAKMP:(2112):Input = IKE_MESG_INTERNAL, IKE_PROCESS_COMPLETE
SPOKE_0268#
Jun  1 10:29:39: ISAKMP:(2112):Old State = IKE_I_MM4  New State = IKE_I_MM5 

Jun  1 10:29:39: ISAKMP (2111): received packet from HUB01_IP dport 4500 sport 4500 Global (I) MM_NO_STATE
Jun  1 10:29:40: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): connection lookup returned 87454954
SPOKE_0268#
Jun  1 10:29:41: IPSEC(ERROR): crypto_notify_rp Rejected notify RP, elapse time 916 < 1000

Jun  1 10:29:41: IPSEC(ERROR): crypto_notify_rp Rejected notify RP, elapse time 916 < 1000

SPOKE_0268#
Jun  1 10:29:42: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): connection lookup returned 87454954
SPOKE_0268#
Jun  1 10:29:44: IPSEC(ERROR): crypto_notify_rp Rejected notify RP, elapse time 0 < 1000

SPOKE_0268#
Jun  1 10:29:45: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): connection lookup returned 87454954
Jun  1 10:29:45: IPSEC(ERROR): crypto_notify_rp Rejected notify RP, elapse time 536 < 1000

Jun  1 10:29:45: IPSEC(ERROR): crypto_notify_rp Rejected notify RP, elapse time 536 < 1000

Jun  1 10:29:46: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): connection lookup returned 87454954
Jun  1 10:29:46: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): Found Tunnel1 interface in shared list
Jun  1 10:29:46: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): Removing Tunnel1 interface from shared list
Jun  1 10:29:46: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): Closing socket
Jun  1 10:29:46: CRYPTO_SS(TUNNEL SEC): Closed socket.
Jun  1 10:29:46: CRYPTO_SS(TUNNEL SEC): local SRC_IP SRC_IP/255.255.255.255/0, remote HUB01_IP HUB01_IP/255.255.255.255/0, prot 47, ifc Tu1
Jun  1 10:29:46: ISAKMP:(2112):peer does not do paranoid keepalives.

Jun  1 10:29:46: ISAKMP:(2112):deleting SA reason "P1 delete notify (in)" state (I) MM_KEY_EXCH (peer HUB01_IP)
Jun  1 10:29:46: ISAKMP:(2111):peer does not do paranoid keepalives.

Jun  1 10:29:46: ISAKMP:(2112):deleting SA reason "P1 delete notify (in)" state (I) MM_KEY_EXCH (peer HUB01_IP) 
Jun  1 10:29:46: ISAKMP: Unlocking peer struct 0x87C36B58 for isadb_mark_sa_deleted(), count 0
Jun  1 10:29:46: ISAKMP: Deleting peer node by peer_reap for HUB01_IP: 87C36B58
Jun  1 10:29:46: ISAKMP:(2112):deleting node 104430948 error FALSE reason "IKE deleted"
Jun  1 10:29:46: ISAKMP:(2112): IKE->PKI End PKI Session state (I) MM_NO_STATE (peer HUB01_IP)
Jun  1 10:29:46: ISAKMP:(2112): PKI->IKE Ended PKI Session state (I) MM_NO_STATE (peer HUB01_IP)
Jun  1 10:29:46: ISAKMP:(2112):Input = IKE_MESG_INTERNAL, IKE_PHASE1_DEL
Jun  1 10:29:46: ISAKMP:(2112):Old State = IKE_I_MM5  New State = IKE_DEST_SA 

Jun  1 10:29:46: IPSEC(key_engine): got a queue event with 1 KMI message(s)
SPOKE_0268#
Jun  1 10:29:51: IPSEC-IFC MGRE/Tu1[shared]: crypto_ss_listen_start already listening
Jun  1 10:29:51: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): Opening a socket with profile vpnprof1
Jun  1 10:29:51: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): connection lookup returned 0
Jun  1 10:29:51: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): Triggering tunnel immediately.
Jun  1 10:29:51: IPSEC-IFC MGRE/Tu1[shared]: Adding Tunnel1 tunnel interface to shared list
Jun  1 10:29:51: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): connection lookup returned 87C36B58
Jun  1 10:29:51: IPSEC-IFC MGRE/Tu1[shared]: Socket 87C36B58 for HUB01_IP not open or does not exist
Jun  1 10:29:51: insert of map into mapdb AVL failed, map + ace pair already exists on the mapdb
Jun  1 10:29:51: CRYPTO_SS(TUNNEL SEC): Active open, socket info: local SRC_IP SRC_IP/255.255.255.255/0, remote HUB01_IP HUB01_IP/255.255.255.255/0,  prot 47, ifc Tu1
Jun  1 10:29:51: IPSEC(recalculate_mtu): reset sadb_root 88243F1C mtu to 1500
Jun  1 10:29:51: IPSEC(sa_request): ,
  (key eng. msg.) OUTBOUND local= SRC_IP:500, remote= HUB01_IP:500,
    local_proxy= SRC_IP/255.255.255.255/47/0,
    remote_proxy= HUB01_IP/255.255.255.255/47/0,
    protocol= ESP, transform= esp-aes 256 esp-md5-hmac  (Transport), 
    lifedur= 3600s and 4608000kb, 
    spi= 0x0(0), conn_id= 0, keysize= 256, flags= 0x0
Jun  1 10:29:51: ISAKMP:(0): SA request profile is (NULL)
Jun  1 10:29:51: ISAKMP: Created a peer struct for HUB01_IP, peer port 500
Jun  1 10:29:51: ISAKMP: New peer created peer = 0x87F130E8 peer_handle = 0x80006451
Jun  1 10:29:51: ISAKMP: Locking peer struct 0x87F130E8, refcount 1 for isakmp_initiator
Jun  1 10:29:51: ISAKMP: local port 500, remote port 500
Jun  1 10:29:51: ISAKMP: set new node 0 to QM_IDLE      
Jun  1 10:29:51: ISAKMP: Find a dup sa in the avl tree during calling isadb_insert sa = 87B3DC10
Jun  1 10:29:51: ISAKMP:(0):Can not start Aggressive mode, trying Main mode.
Jun  1 10:29:51: ISAKMP:(0):No pre-shared key with HUB01_IP!
Jun  1 10:29:51: ISAKMP:(0): IKE->PKI Get configured TrustPoints state (I) MM_NO_STATE (peer HUB01_IP)
Jun  1 10:29:51: ISAKMP:(0): PKI->IKE Got configured TrustPoints state (I) MM_NO_STATE (peer HUB01_IP)
Jun  1 10:29:51: ISAKMP:(0): constructed NAT-T vendor-rfc3947 ID
Jun  1 10:29:51: ISAKMP:(0): constructed NAT-T vendor-07 ID
Jun  1 10:29:51: ISAKMP:(0): constructed NAT-T vendor-03 ID
Jun  1 10:29:51: ISAKMP:(0): constructed NAT-T vendor-02 ID
Jun  1 10:29:51: ISAKMP:(0):Input = IKE_MESG_FROM_IPSEC, IKE_SA_REQ_MM
Jun  1 10:29:51: ISAKMP:(0):Old State = IKE_READY  New State = IKE_I_MM1 

Jun  1 10:29:51: ISAKMP:(0): beginning Main Mode exchange
Jun  1 10:29:51: ISAKMP:(0): sending packet to HUB01_IP my_port 500 peer_port 500 (I) MM_NO_STATE
Jun  1 10:29:51: ISAKMP:(0):Sending an IKE IPv4 Packet.
Jun  1 10:29:51: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): connection lookup returned 87C36B58
Jun  1 10:29:51: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): good socket ready message
Jun  1 10:29:51: ISAKMP (0): received packet from HUB01_IP dport 500 sport 500 Global (I) MM_NO_STATE
Jun  1 10:29:51: ISAKMP:(0):Input = IKE_MESG_FROM_PEER, IKE_MM_EXCH
Jun  1 10:29:51: ISAKMP:(0):Old State = IKE_I_MM1  New State = IKE_I_MM2 

Jun  1 10:29:51: ISAKMP:(0): processing SA payload. message ID = 0
Jun  1 10:29:51: ISAKMP:(0): processing vendor id payload
Jun  1 10:29:51: ISAKMP:(0): vendor ID seems Unity/DPD but major 69 mismatch
Jun  1 10:29:51: ISAKMP (0): vendor ID is NAT-T RFC 3947
Jun  1 10:29:51: ISAKMP : Scanning profiles for xauth ...
Jun  1 10:29:51: ISAKMP:(0): IKE->PKI Get configured TrustPoints state (I) MM_NO_STATE (peer HUB01_IP)
Jun  1 10:29:51: ISAKMP:(0): PKI->IKE Got configured TrustPoints state (I) MM_NO_STATE (peer HUB01_IP)
Jun  1 10:29:51: ISAKMP:(0):Checking ISAKMP transform 1 against priority 1 policy
Jun  1 10:29:51: ISAKMP:      encryption AES-CBC
Jun  1 10:29:51: ISAKMP:      keylength of 256
Jun  1 10:29:51: ISAKMP:      hash SHA
Jun  1 10:29:51: ISAKMP:      default group 1
Jun  1 10:29:51: ISAKMP:      auth RSA sig
Jun  1 10:29:51: ISAKMP:      life type in seconds
Jun  1 10:29:51: ISAKMP:      life duration (VPI) of  0x0 0x1 0x51 0x80 
Jun  1 10:29:51: ISAKMP:(0):atts are acceptable. Next payload is 0
Jun  1 10:29:51: ISAKMP:(0):Acceptable atts:actual life: 0
Jun  1 10:29:51: ISAKMP:(0):Acceptable atts:life: 0
Jun  1 10:29:51: ISAKMP:(0):Fill atts in sa vpi_length:4
Jun  1 10:29:51: ISAKMP:(0):Fill atts in sa life_in_seconds:86400
Jun  1 10:29:51: ISAKMP:(0): IKE->PKI Start PKI Session state (I) MM_NO_STATE (peer HUB01_IP)
Jun  1 10:29:51: ISAKMP:(0): PKI->IKE Started PKI Session state (I) MM_NO_STATE (peer HUB01_IP)
Jun  1 10:29:51: ISAKMP:(0):Returning Actual lifetime: 86400
Jun  1 10:29:51: ISAKMP:(0)::Started lifetime timer: 86400.

Jun  1 10:29:51: ISAKMP:(0): processing vendor id payload
Jun  1 10:29:51: ISAKMP:(0): vendor ID seems Unity/DPD but major 69 mismatch
Jun  1 10:29:51: ISAKMP (0): vendor ID is NAT-T RFC 3947
Jun  1 10:29:51: ISAKMP:(0):Input = IKE_MESG_INTERNAL, IKE_PROCESS_MAIN_MODE
Jun  1 10:29:51: ISAKMP:(0):Old State = IKE_I_MM2  New State = IKE_I_MM2 

Jun  1 10:29:51: ISAKMP:(0): IKE->PKI Get configured TrustPoints state (I) MM_SA_SETUP (peer HUB01_IP)
Jun  1 10:29:51: ISAKMP:(0): PKI->IKE Got configured TrustPoints state (I) MM_SA_SETUP (peer HUB01_IP)
Jun  1 10:29:51: ISAKMP:(0): IKE->PKI Get IssuerNames state (I) MM_SA_SETUP (peer HUB01_IP)
Jun  1 10:29:51: ISAKMP:(0): PKI->IKE Got IssuerNames state (I) MM_SA_SETUP (peer HUB01_IP)
Jun  1 10:29:51: ISAKMP (0): constructing CERT_REQ for issuer cn= DOMAIN,dc=FQ,dc=DN
Jun  1 10:29:51: ISAKMP (0): constructing CERT_REQ for issuer cn=CAServer,dc=DomainName,dc=local
Jun  1 10:29:51: ISAKMP:(0): sending packet to HUB01_IP my_port 500 peer_port 500 (I) MM_SA_SETUP
Jun  1 10:29:51: ISAKMP:(0):Sending an IKE IPv4 Packet.
Jun  1 10:29:51: ISAKMP:(0):Input = IKE_MESG_INTERNAL, IKE_PROCESS_COMPLETE
Jun  1 10:29:51: ISAKMP:(0):Old State = IKE_I_MM2  New State = IKE_I_MM3 

Jun  1 10:29:51: ISAKMP (0): received packet from HUB01_IP dport 500 sport 500 Global (I) MM_SA_SETUP
Jun  1 10:29:51: ISAKMP:(0):Input = IKE_MESG_FROM_PEER, IKE_MM_EXCH
Jun  1 10:29:51: ISAKMP:(0):Old State = IKE_I_MM3  New State = IKE_I_MM4 

Jun  1 10:29:51: ISAKMP:(0): processing KE payload. message ID = 0
Jun  1 10:29:51: ISAKMP:(0): processing NONCE payload. message ID = 0
Jun  1 10:29:51: ISAKMP:(2113): processing CERT_REQ payload. message ID = 0
Jun  1 10:29:51: ISAKMP:(2113): peer wants a CT_X509_SIGNATURE cert
Jun  1 10:29:51: ISAKMP:(2113): peer wants cert issued by cn= DOMAIN,dc=FQ,dc=DN
Jun  1 10:29:51:  Choosing trustpoint hub01.FQDN.com:PORT as issuer
Jun  1 10:29:51: ISAKMP:(2113): processing vendor id payload
Jun  1 10:29:51: ISAKMP:(2113): vendor ID is Unity
Jun  1 10:29:51: ISAKMP:(2113): processing vendor id payload
Jun  1 10:29:51: ISAKMP:(2113): vendor ID is DPD
Jun  1 10:29:51: ISAKMP:(2113): processing vendor id payload
Jun  1 10:29:51: ISAKMP:(2113): speaking to another IOS box!
Jun  1 10:29:51: ISAKMP:received payload type 20
Jun  1 10:29:51: ISAKMP (2113): NAT found, both nodes inside NAT
Jun  1 10:29:51: ISAKMP:received payload type 20
Jun  1 10:29:51: ISAKMP (2113): My hash no match -  this node inside NAT
Jun  1 10:29:51: ISAKMP:(2113):Input = IKE_MESG_INTERNAL, IKE_PROCESS_MAIN_MODE
Jun  1 10:29:51: ISAKMP:(2113):Old State = IKE_I_MM4  New State = IKE_I_MM4 

Jun  1 10:29:51: ISAKMP:(2113):Send initial contact
Jun  1 10:29:51: ISAKMP:(2113): IKE->PKI Get self CertificateChain state (I) MM_KEY_EXCH (peer HUB01_IP)
Jun  1 10:29:51: ISAKMP:(2113): PKI->IKE Got self CertificateChain state (I) MM_KEY_EXCH (peer HUB01_IP)
Jun  1 10:29:51: ISAKMP:(2113): IKE->PKI Get SubjectName state (I) MM_KEY_EXCH (peer HUB01_IP)
Jun  1 10:29:51: ISAKMP:(2113): PKI->IKE Got SubjectName state (I) MM_KEY_EXCH (peer HUB01_IP)
Jun  1 10:29:51: ISAKMP:(2113):My ID configured as IPv4 Addr, but Addr not in Cert!
Jun  1 10:29:51: ISAKMP:(2113):Using FQDN as My ID
Jun  1 10:29:51: ISAKMP:(2113):SA is doing RSA signature authentication using id type ID_FQDN
Jun  1 10:29:51: ISAKMP (2113): ID payload 
	next-payload : 6
	type         : 2 
	FQDN name    : SPOKE.FQDN.XYZ 
	protocol     : 17 
	port         : 0 
	length       : 25
Jun  1 10:29:51: ISAKMP:(2113):Total payload length: 25
Jun  1 10:29:51: ISAKMP:(2113): IKE->PKI Get CertificateChain to be sent to peer state (I) MM_KEY_EXCH (peer HUB01_IP)
Jun  1 10:29:51: ISAKMP:(2113): PKI->IKE Got CertificateChain to be sent to peer state (I) MM_KEY_EXCH (peer HUB01_IP)
Jun  1 10:29:51: ISAKMP (2113): constructing CERT payload for hostname=SPOKE.FQDN.XYZ
Jun  1 10:29:51: ISKAMP: growing send buffer from 1024 to 3072
Jun  1 10:29:51: ISAKMP:(2113): using the hub01.FQDN.com:PORT trustpoint's keypair to sign
Jun  1 10:29:51: ISAKMP:(2113): sending packet to HUB01_IP my_port 4500 peer_port 4500 (I) MM_KEY_EXCH
Jun  1 10:29:51: ISAKMP:(2113):Sending an IKE IPv4 Packet.
Jun  1 10:29:51: ISAKMP:(2113):Input = IKE_MESG_INTERNAL, IKE_PROCESS_COMPLETE
SPOKE_0268#
Jun  1 10:29:51: ISAKMP:(2113):Old State = IKE_I_MM4  New State = IKE_I_MM5 

Jun  1 10:29:51: ISAKMP (2112): received packet from HUB01_IP dport 4500 sport 4500 Global (I) MM_NO_STATE
Jun  1 10:29:52: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): connection lookup returned 87C36B58
SPOKE_0268#
Jun  1 10:29:54: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): connection lookup returned 87C36B58
Jun  1 10:29:54: IPSEC(ERROR): crypto_notify_rp Rejected notify RP, elapse time 92 < 1000

Jun  1 10:29:54: IPSEC(ERROR): crypto_notify_rp Rejected notify RP, elapse time 92 < 1000

Jun  1 10:29:54: IPSEC(ERROR): crypto_notify_rp Rejected notify RP, elapse time 488 < 1000

Jun  1 10:29:54: IPSEC(ERROR): crypto_notify_rp Rejected notify RP, elapse time 488 < 1000

SPOKE_0268#
Jun  1 10:29:57: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): connection lookup returned 87C36B58
Jun  1 10:29:58: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): connection lookup returned 87C36B58
Jun  1 10:29:58: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): Found Tunnel1 interface in shared list
Jun  1 10:29:58: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): Removing Tunnel1 interface from shared list
Jun  1 10:29:58: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): Closing socket
Jun  1 10:29:58: CRYPTO_SS(TUNNEL SEC): Closed socket.
Jun  1 10:29:58: CRYPTO_SS(TUNNEL SEC): local SRC_IP SRC_IP/255.255.255.255/0, remote HUB01_IP HUB01_IP/255.255.255.255/0, prot 47, ifc Tu1
Jun  1 10:29:58: ISAKMP:(2113):peer does not do paranoid keepalives.

Jun  1 10:29:58: ISAKMP:(2113):deleting SA reason "P1 delete notify (in)" state (I) MM_KEY_EXCH (peer HUB01_IP)
Jun  1 10:29:58: ISAKMP:(2112):peer does not do paranoid keepalives.

Jun  1 10:29:58: ISAKMP:(2111):peer does not do paranoid keepalives.

Jun  1 10:29:58: ISAKMP:(2113):deleting SA reason "P1 delete notify (in)" state (I) MM_KEY_EXCH (peer HUB01_IP) 
Jun  1 10:29:58: ISAKMP: Unlocking peer struct 0x87F130E8 for isadb_mark_sa_deleted(), count 0
Jun  1 10:29:58: ISAKMP: Deleting peer node by peer_reap for HUB01_IP: 87F130E8
Jun  1 10:29:58: ISAKMP:(2113):deleting node 1779760591 error FALSE reason "IKE deleted"
Jun  1 10:29:58: ISAKMP:(2113): IKE->PKI End PKI Session state (I) MM_NO_STATE (peer HUB01_IP)
Jun  1 10:29:58: ISAKMP:(2113): PKI->IKE Ended PKI Session state (I) MM_NO_STATE (peer HUB01_IP)
Jun  1 10:29:58: ISAKMP:(2113):Input = IKE_MESG_INTERNAL, IKE_PHASE1_DEL
Jun  1 10:29:58: ISAKMP:(2113):Old State = IKE_I_MM5  New State = IKE_DEST_SA 

Jun  1 10:29:58: IPSEC(key_engine): got a queue event with 1 KMI message(s)
SPOKE_0268#
Jun  1 10:30:05: IPSEC-IFC MGRE/Tu1[shared]: crypto_ss_listen_start already listening
Jun  1 10:30:05: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): Opening a socket with profile vpnprof1
Jun  1 10:30:05: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): connection lookup returned 0
Jun  1 10:30:05: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): Triggering tunnel immediately.
Jun  1 10:30:05: IPSEC-IFC MGRE/Tu1[shared]: Adding Tunnel1 tunnel interface to shared list
Jun  1 10:30:05: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): connection lookup returned 8763F940
Jun  1 10:30:05: IPSEC-IFC MGRE/Tu1[shared]: Socket 8763F940 for HUB01_IP not open or does not exist
Jun  1 10:30:05: insert of map into mapdb AVL failed, map + ace pair already exists on the mapdb
Jun  1 10:30:05: CRYPTO_SS(TUNNEL SEC): Active open, socket info: local SRC_IP SRC_IP/255.255.255.255/0, remote HUB01_IP HUB01_IP/255.255.255.255/0,  prot 47, ifc Tu1
Jun  1 10:30:05: IPSEC(recalculate_mtu): reset sadb_root 88243F1C mtu to 1500
Jun  1 10:30:05: IPSEC(sa_request): ,
  (key eng. msg.) OUTBOUND local= SRC_IP:500, remote= HUB01_IP:500,
    local_proxy= SRC_IP/255.255.255.255/47/0,
    remote_proxy= HUB01_IP/255.255.255.255/47/0,
    protocol= ESP, transform= esp-aes 256 esp-md5-hmac  (Transport), 
    lifedur= 3600s and 4608000kb, 
    spi= 0x0(0), conn_id= 0, keysize= 256, flags= 0x0
Jun  1 10:30:05: ISAKMP:(0): SA request profile is (NULL)
Jun  1 10:30:05: ISAKMP: Created a peer struct for HUB01_IP, peer port 500
Jun  1 10:30:05: ISAKMP: New peer created peer = 0x87454954 peer_handle = 0x80006453
Jun  1 10:30:05: ISAKMP: Locking peer struct 0x87454954, refcount 1 for isakmp_initiator
Jun  1 10:30:05: ISAKMP: local port 500, remote port 500
Jun  1 10:30:05: ISAKMP: set new node 0 to QM_IDLE      
Jun  1 10:30:05: ISAKMP: Find a dup sa in the avl tree during calling isadb_insert sa = 87D82C70
Jun  1 10:30:05: ISAKMP:(0):Can not start Aggressive mode, trying Main mode.
Jun  1 10:30:05: ISAKMP:(0):No pre-shared key with HUB01_IP!
Jun  1 10:30:05: ISAKMP:(0): IKE->PKI Get configured TrustPoints state (I) MM_NO_STATE (peer HUB01_IP)
Jun  1 10:30:05: ISAKMP:(0): PKI->IKE Got configured TrustPoints state (I) MM_NO_STATE (peer HUB01_IP)
Jun  1 10:30:05: ISAKMP:(0): constructed NAT-T vendor-rfc3947 ID
Jun  1 10:30:05: ISAKMP:(0): constructed NAT-T vendor-07 ID
Jun  1 10:30:05: ISAKMP:(0): constructed NAT-T vendor-03 ID
Jun  1 10:30:05: ISAKMP:(0): constructed NAT-T vendor-02 ID
Jun  1 10:30:05: ISAKMP:(0):Input = IKE_MESG_FROM_IPSEC, IKE_SA_REQ_MM
Jun  1 10:30:05: ISAKMP:(0):Old State = IKE_READY  New State = IKE_I_MM1 

Jun  1 10:30:05: ISAKMP:(0): beginning Main Mode exchange
Jun  1 10:30:05: ISAKMP:(0): sending packet to HUB01_IP my_port 500 peer_port 500 (I) MM_NO_STATE
Jun  1 10:30:05: ISAKMP:(0):Sending an IKE IPv4 Packet.
Jun  1 10:30:05: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): connection lookup returned 8763F940
Jun  1 10:30:05: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): good socket ready message
Jun  1 10:30:05: ISAKMP (0): received packet from HUB01_IP dport 500 sport 500 Global (I) MM_NO_STATE
Jun  1 10:30:05: ISAKMP:(0):Input = IKE_MESG_FROM_PEER, IKE_MM_EXCH
Jun  1 10:30:05: ISAKMP:(0):Old State = IKE_I_MM1  New State = IKE_I_MM2 

Jun  1 10:30:05: ISAKMP:(0): processing SA payload. message ID = 0
Jun  1 10:30:05: ISAKMP:(0): processing vendor id payload
Jun  1 10:30:05: ISAKMP:(0): vendor ID seems Unity/DPD but major 69 mismatch
Jun  1 10:30:05: ISAKMP (0): vendor ID is NAT-T RFC 3947
Jun  1 10:30:05: ISAKMP : Scanning profiles for xauth ...
Jun  1 10:30:05: ISAKMP:(0): IKE->PKI Get configured TrustPoints state (I) MM_NO_STATE (peer HUB01_IP)
Jun  1 10:30:05: ISAKMP:(0): PKI->IKE Got configured TrustPoints state (I) MM_NO_STATE (peer HUB01_IP)
Jun  1 10:30:05: ISAKMP:(0):Checking ISAKMP transform 1 against priority 1 policy
Jun  1 10:30:05: ISAKMP:      encryption AES-CBC
Jun  1 10:30:05: ISAKMP:      keylength of 256
Jun  1 10:30:05: ISAKMP:      hash SHA
Jun  1 10:30:05: ISAKMP:      default group 1
Jun  1 10:30:05: ISAKMP:      auth RSA sig
Jun  1 10:30:05: ISAKMP:      life type in seconds
Jun  1 10:30:05: ISAKMP:      life duration (VPI) of  0x0 0x1 0x51 0x80 
Jun  1 10:30:05: ISAKMP:(0):atts are acceptable. Next payload is 0
Jun  1 10:30:05: ISAKMP:(0):Acceptable atts:actual life: 0
Jun  1 10:30:05: ISAKMP:(0):Acceptable atts:life: 0
Jun  1 10:30:05: ISAKMP:(0):Fill atts in sa vpi_length:4
Jun  1 10:30:05: ISAKMP:(0):Fill atts in sa life_in_seconds:86400
Jun  1 10:30:05: ISAKMP:(0): IKE->PKI Start PKI Session state (I) MM_NO_STATE (peer HUB01_IP)
Jun  1 10:30:05: ISAKMP:(0): PKI->IKE Started PKI Session state (I) MM_NO_STATE (peer HUB01_IP)
Jun  1 10:30:05: ISAKMP:(0):Returning Actual lifetime: 86400
Jun  1 10:30:05: ISAKMP:(0)::Started lifetime timer: 86400.

Jun  1 10:30:05: ISAKMP:(0): processing vendor id payload
Jun  1 10:30:05: ISAKMP:(0): vendor ID seems Unity/DPD but major 69 mismatch
Jun  1 10:30:05: ISAKMP (0): vendor ID is NAT-T RFC 3947
Jun  1 10:30:05: ISAKMP:(0):Input = IKE_MESG_INTERNAL, IKE_PROCESS_MAIN_MODE
Jun  1 10:30:05: ISAKMP:(0):Old State = IKE_I_MM2  New State = IKE_I_MM2 

Jun  1 10:30:05: ISAKMP:(0): IKE->PKI Get configured TrustPoints state (I) MM_SA_SETUP (peer HUB01_IP)
Jun  1 10:30:05: ISAKMP:(0): PKI->IKE Got configured TrustPoints state (I) MM_SA_SETUP (peer HUB01_IP)
Jun  1 10:30:05: ISAKMP:(0): IKE->PKI Get IssuerNames state (I) MM_SA_SETUP (peer HUB01_IP)
Jun  1 10:30:05: ISAKMP:(0): PKI->IKE Got IssuerNames state (I) MM_SA_SETUP (peer HUB01_IP)
Jun  1 10:30:05: ISAKMP (0): constructing CERT_REQ for issuer cn= DOMAIN,dc=FQ,dc=DN
Jun  1 10:30:05: ISAKMP (0): constructing CERT_REQ for issuer cn=CAServer,dc=DomainName,dc=local
Jun  1 10:30:05: ISAKMP:(0): sending packet to HUB01_IP my_port 500 peer_port 500 (I) MM_SA_SETUP
Jun  1 10:30:05: ISAKMP:(0):Sending an IKE IPv4 Packet.
Jun  1 10:30:05: ISAKMP:(0):Input = IKE_MESG_INTERNAL, IKE_PROCESS_COMPLETE
Jun  1 10:30:05: ISAKMP:(0):Old State = IKE_I_MM2  New State = IKE_I_MM3 

Jun  1 10:30:05: ISAKMP (0): received packet from HUB01_IP dport 500 sport 500 Global (I) MM_SA_SETUP
Jun  1 10:30:05: ISAKMP:(0):Input = IKE_MESG_FROM_PEER, IKE_MM_EXCH
Jun  1 10:30:05: ISAKMP:(0):Old State = IKE_I_MM3  New State = IKE_I_MM4 

Jun  1 10:30:05: ISAKMP:(0): processing KE payload. message ID = 0
Jun  1 10:30:05: ISAKMP:(0): processing NONCE payload. message ID = 0
Jun  1 10:30:05: ISAKMP:(2114): processing CERT_REQ payload. message ID = 0
Jun  1 10:30:05: ISAKMP:(2114): peer wants a CT_X509_SIGNATURE cert
Jun  1 10:30:05: ISAKMP:(2114): peer wants cert issued by cn= DOMAIN,dc=FQ,dc=DN
Jun  1 10:30:05:  Choosing trustpoint hub01.FQDN.com:PORT as issuer
Jun  1 10:30:05: ISAKMP:(2114): processing vendor id payload
Jun  1 10:30:05: ISAKMP:(2114): vendor ID is Unity
Jun  1 10:30:05: ISAKMP:(2114): processing vendor id payload
Jun  1 10:30:05: ISAKMP:(2114): vendor ID is DPD
Jun  1 10:30:05: ISAKMP:(2114): processing vendor id payload
Jun  1 10:30:05: ISAKMP:(2114): speaking to another IOS box!
Jun  1 10:30:05: ISAKMP:received payload type 20
Jun  1 10:30:05: ISAKMP (2114): NAT found, both nodes inside NAT
Jun  1 10:30:05: ISAKMP:received payload type 20
Jun  1 10:30:05: ISAKMP (2114): My hash no match -  this node inside NAT
Jun  1 10:30:05: ISAKMP:(2114):Input = IKE_MESG_INTERNAL, IKE_PROCESS_MAIN_MODE
Jun  1 10:30:05: ISAKMP:(2114):Old State = IKE_I_MM4  New State = IKE_I_MM4 

Jun  1 10:30:05: ISAKMP:(2114):Send initial contact
Jun  1 10:30:05: ISAKMP:(2114): IKE->PKI Get self CertificateChain state (I) MM_KEY_EXCH (peer HUB01_IP)
Jun  1 10:30:05: ISAKMP:(2114): PKI->IKE Got self CertificateChain state (I) MM_KEY_EXCH (peer HUB01_IP)
Jun  1 10:30:05: ISAKMP:(2114): IKE->PKI Get SubjectName state (I) MM_KEY_EXCH (peer HUB01_IP)
Jun  1 10:30:05: ISAKMP:(2114): PKI->IKE Got SubjectName state (I) MM_KEY_EXCH (peer HUB01_IP)
Jun  1 10:30:05: ISAKMP:(2114):My ID configured as IPv4 Addr, but Addr not in Cert!
Jun  1 10:30:05: ISAKMP:(2114):Using FQDN as My ID
Jun  1 10:30:05: ISAKMP:(2114):SA is doing RSA signature authentication using id type ID_FQDN
Jun  1 10:30:05: ISAKMP (2114): ID payload 
	next-payload : 6
	type         : 2 
	FQDN name    : SPOKE.FQDN.XYZ 
	protocol     : 17 
	port         : 0 
	length       : 25
Jun  1 10:30:05: ISAKMP:(2114):Total payload length: 25
Jun  1 10:30:05: ISAKMP:(2114): IKE->PKI Get CertificateChain to be sent to peer state (I) MM_KEY_EXCH (peer HUB01_IP)
Jun  1 10:30:05: ISAKMP:(2114): PKI->IKE Got CertificateChain to be sent to peer state (I) MM_KEY_EXCH (peer HUB01_IP)
Jun  1 10:30:05: ISAKMP (2114): constructing CERT payload for hostname=SPOKE.FQDN.XYZ
Jun  1 10:30:05: ISKAMP: growing send buffer from 1024 to 3072
Jun  1 10:30:05: ISAKMP:(2114): using the hub01.FQDN.com:PORT trustpoint's keypair to sign
Jun  1 10:30:05: ISAKMP:(2114): sending packet to HUB01_IP my_port 4500 peer_port 4500 (I) MM_KEY_EXCH
Jun  1 10:30:05: ISAKMP:(2114):Sending an IKE IPv4 Packet.
Jun  1 10:30:05: ISAKMP:(2114):Input = IKE_MESG_INTERNAL, IKE_PROCESS_COMPLETE
SPOKE_0268#
Jun  1 10:30:05: ISAKMP:(2114):Old State = IKE_I_MM4  New State = IKE_I_MM5 

Jun  1 10:30:05: ISAKMP (2113): received packet from HUB01_IP dport 4500 sport 4500 Global (I) MM_NO_STATE
Jun  1 10:30:05: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): connection lookup returned 8763F940
SPOKE_0268#
Jun  1 10:30:07: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): connection lookup returned 8763F940
SPOKE_0268#
Jun  1 10:30:08: IPSEC(ERROR): crypto_notify_rp Rejected notify RP, elapse time 0 < 1000

SPOKE_0268#
Jun  1 10:30:10: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): connection lookup returned 8763F940
Jun  1 10:30:11: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): connection lookup returned 8763F940
Jun  1 10:30:11: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): Found Tunnel1 interface in shared list
Jun  1 10:30:11: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): Removing Tunnel1 interface from shared list
Jun  1 10:30:11: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): Closing socket
Jun  1 10:30:11: CRYPTO_SS(TUNNEL SEC): Closed socket.
Jun  1 10:30:11: CRYPTO_SS(TUNNEL SEC): local SRC_IP SRC_IP/255.255.255.255/0, remote HUB01_IP HUB01_IP/255.255.255.255/0, prot 47, ifc Tu1
Jun  1 10:30:11: ISAKMP:(2114):peer does not do paranoid keepalives.

Jun  1 10:30:11: ISAKMP:(2114):deleting SA reason "P1 delete notify (in)" state (I) MM_KEY_EXCH (peer HUB01_IP)
Jun  1 10:30:11: ISAKMP:(2113):peer does not do paranoid keepalives.

Jun  1 10:30:11: ISAKMP:(2112):peer does not do paranoid keepalives.

Jun  1 10:30:11: ISAKMP:(2111):peer does not do paranoid keepalives.

Jun  1 10:30:11: ISAKMP:(2114):deleting SA reason "P1 delete notify (in)" state (I) MM_KEY_EXCH (peer HUB01_IP) 
Jun  1 10:30:11: ISAKMP: Unlocking peer struct 0x87454954 for isadb_mark_sa_deleted(), count 0
Jun  1 10:30:11: ISAKMP: Deleting peer node by peer_reap for HUB01_IP: 87454954
Jun  1 10:30:11: ISAKMP:(2114):deleting node -1692886380 error FALSE reason "IKE deleted"
Jun  1 10:30:11: ISAKMP:(2114): IKE->PKI End PKI Session state (I) MM_NO_STATE (peer HUB01_IP)
Jun  1 10:30:11: ISAKMP:(2114): PKI->IKE Ended PKI Session state (I) MM_NO_STATE (peer HUB01_IP)
Jun  1 10:30:11: ISAKMP:(2114):Input = IKE_MESG_INTERNAL, IKE_PHASE1_DEL
Jun  1 10:30:11: ISAKMP:(2114):Old State = IKE_I_MM5  New State = IKE_DEST_SA 

Jun  1 10:30:11: IPSEC(key_engine): got a queue event with 1 KMI message(s)
SPOKE_0268#
Jun  1 10:30:18: IPSEC-IFC MGRE/Tu1[shared]: crypto_ss_listen_start already listening
Jun  1 10:30:18: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): Opening a socket with profile vpnprof1
Jun  1 10:30:18: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): connection lookup returned 0
Jun  1 10:30:18: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): Triggering tunnel immediately.
Jun  1 10:30:18: IPSEC-IFC MGRE/Tu1[shared]: Adding Tunnel1 tunnel interface to shared list
Jun  1 10:30:18: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): connection lookup returned 87454954
Jun  1 10:30:18: IPSEC-IFC MGRE/Tu1[shared]: Socket 87454954 for HUB01_IP not open or does not exist
Jun  1 10:30:18: insert of map into mapdb AVL failed, map + ace pair already exists on the mapdb
Jun  1 10:30:18: CRYPTO_SS(TUNNEL SEC): Active open, socket info: local SRC_IP SRC_IP/255.255.255.255/0, remote HUB01_IP HUB01_IP/255.255.255.255/0,  prot 47, ifc Tu1
Jun  1 10:30:18: IPSEC(recalculate_mtu): reset sadb_root 88243F1C mtu to 1500
Jun  1 10:30:18: IPSEC(sa_request): ,
  (key eng. msg.) OUTBOUND local= SRC_IP:500, remote= HUB01_IP:500,
    local_proxy= SRC_IP/255.255.255.255/47/0,
    remote_proxy= HUB01_IP/255.255.255.255/47/0,
    protocol= ESP, transform= esp-aes 256 esp-md5-hmac  (Transport), 
    lifedur= 3600s and 4608000kb, 
    spi= 0x0(0), conn_id= 0, keysize= 256, flags= 0x0
Jun  1 10:30:18: ISAKMP:(0): SA request profile is (NULL)
Jun  1 10:30:18: ISAKMP: Created a peer struct for HUB01_IP, peer port 500
Jun  1 10:30:18: ISAKMP: New peer created peer = 0x8763F940 peer_handle = 0x80006455
Jun  1 10:30:18: ISAKMP: Locking peer struct 0x8763F940, refcount 1 for isakmp_initiator
Jun  1 10:30:18: ISAKMP: local port 500, remote port 500
Jun  1 10:30:18: ISAKMP: set new node 0 to QM_IDLE      
Jun  1 10:30:18: ISAKMP: Find a dup sa in the avl tree during calling isadb_insert sa = 87A9F57C
Jun  1 10:30:18: ISAKMP:(0):Can not start Aggressive mode, trying Main mode.
Jun  1 10:30:18: ISAKMP:(0):No pre-shared key with HUB01_IP!
Jun  1 10:30:18: ISAKMP:(0): IKE->PKI Get configured TrustPoints state (I) MM_NO_STATE (peer HUB01_IP)
Jun  1 10:30:18: ISAKMP:(0): PKI->IKE Got configured TrustPoints state (I) MM_NO_STATE (peer HUB01_IP)
Jun  1 10:30:18: ISAKMP:(0): constructed NAT-T vendor-rfc3947 ID
Jun  1 10:30:18: ISAKMP:(0): constructed NAT-T vendor-07 ID
Jun  1 10:30:18: ISAKMP:(0): constructed NAT-T vendor-03 ID
Jun  1 10:30:18: ISAKMP:(0): constructed NAT-T vendor-02 ID
Jun  1 10:30:18: ISAKMP:(0):Input = IKE_MESG_FROM_IPSEC, IKE_SA_REQ_MM
Jun  1 10:30:18: ISAKMP:(0):Old State = IKE_READY  New State = IKE_I_MM1 

Jun  1 10:30:18: ISAKMP:(0): beginning Main Mode exchange
Jun  1 10:30:18: ISAKMP:(0): sending packet to HUB01_IP my_port 500 peer_port 500 (I) MM_NO_STATE
Jun  1 10:30:18: ISAKMP:(0):Sending an IKE IPv4 Packet.
Jun  1 10:30:18: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): connection lookup returned 87454954
Jun  1 10:30:18: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): good socket ready message
Jun  1 10:30:18: ISAKMP (0): received packet from HUB01_IP dport 500 sport 500 Global (I) MM_NO_STATE
Jun  1 10:30:18: ISAKMP:(0):Input = IKE_MESG_FROM_PEER, IKE_MM_EXCH
Jun  1 10:30:18: ISAKMP:(0):Old State = IKE_I_MM1  New State = IKE_I_MM2 

Jun  1 10:30:18: ISAKMP:(0): processing SA payload. message ID = 0
Jun  1 10:30:18: ISAKMP:(0): processing vendor id payload
Jun  1 10:30:18: ISAKMP:(0): vendor ID seems Unity/DPD but major 69 mismatch
Jun  1 10:30:18: ISAKMP (0): vendor ID is NAT-T RFC 3947
Jun  1 10:30:18: ISAKMP : Scanning profiles for xauth ...
Jun  1 10:30:18: ISAKMP:(0): IKE->PKI Get configured TrustPoints state (I) MM_NO_STATE (peer HUB01_IP)
Jun  1 10:30:18: ISAKMP:(0): PKI->IKE Got configured TrustPoints state (I) MM_NO_STATE (peer HUB01_IP)
Jun  1 10:30:18: ISAKMP:(0):Checking ISAKMP transform 1 against priority 1 policy
Jun  1 10:30:18: ISAKMP:      encryption AES-CBC
Jun  1 10:30:18: ISAKMP:      keylength of 256
Jun  1 10:30:18: ISAKMP:      hash SHA
Jun  1 10:30:18: ISAKMP:      default group 1
Jun  1 10:30:18: ISAKMP:      auth RSA sig
Jun  1 10:30:18: ISAKMP:      life type in seconds
Jun  1 10:30:18: ISAKMP:      life duration (VPI) of  0x0 0x1 0x51 0x80 
Jun  1 10:30:18: ISAKMP:(0):atts are acceptable. Next payload is 0
Jun  1 10:30:18: ISAKMP:(0):Acceptable atts:actual life: 0
Jun  1 10:30:18: ISAKMP:(0):Acceptable atts:life: 0
Jun  1 10:30:18: ISAKMP:(0):Fill atts in sa vpi_length:4
Jun  1 10:30:18: ISAKMP:(0):Fill atts in sa life_in_seconds:86400
Jun  1 10:30:18: ISAKMP:(0): IKE->PKI Start PKI Session state (I) MM_NO_STATE (peer HUB01_IP)
Jun  1 10:30:18: ISAKMP:(0): PKI->IKE Started PKI Session state (I) MM_NO_STATE (peer HUB01_IP)
Jun  1 10:30:18: ISAKMP:(0):Returning Actual lifetime: 86400
Jun  1 10:30:18: ISAKMP:(0)::Started lifetime timer: 86400.

Jun  1 10:30:18: ISAKMP:(0): processing vendor id payload
Jun  1 10:30:18: ISAKMP:(0): vendor ID seems Unity/DPD but major 69 mismatch
Jun  1 10:30:18: ISAKMP (0): vendor ID is NAT-T RFC 3947
Jun  1 10:30:18: ISAKMP:(0):Input = IKE_MESG_INTERNAL, IKE_PROCESS_MAIN_MODE
Jun  1 10:30:18: ISAKMP:(0):Old State = IKE_I_MM2  New State = IKE_I_MM2 

Jun  1 10:30:18: ISAKMP:(0): IKE->PKI Get configured TrustPoints state (I) MM_SA_SETUP (peer HUB01_IP)
Jun  1 10:30:18: ISAKMP:(0): PKI->IKE Got configured TrustPoints state (I) MM_SA_SETUP (peer HUB01_IP)
Jun  1 10:30:18: ISAKMP:(0): IKE->PKI Get IssuerNames state (I) MM_SA_SETUP (peer HUB01_IP)
Jun  1 10:30:18: ISAKMP:(0): PKI->IKE Got IssuerNames state (I) MM_SA_SETUP (peer HUB01_IP)
Jun  1 10:30:18: ISAKMP (0): constructing CERT_REQ for issuer cn= DOMAIN,dc=FQ,dc=DN
Jun  1 10:30:18: ISAKMP (0): constructing CERT_REQ for issuer cn=CAServer,dc=DomainName,dc=local
Jun  1 10:30:18: ISAKMP:(0): sending packet to HUB01_IP my_port 500 peer_port 500 (I) MM_SA_SETUP
Jun  1 10:30:18: ISAKMP:(0):Sending an IKE IPv4 Packet.
Jun  1 10:30:18: ISAKMP:(0):Input = IKE_MESG_INTERNAL, IKE_PROCESS_COMPLETE
Jun  1 10:30:18: ISAKMP:(0):Old State = IKE_I_MM2  New State = IKE_I_MM3 

Jun  1 10:30:18: ISAKMP (0): received packet from HUB01_IP dport 500 sport 500 Global (I) MM_SA_SETUP
Jun  1 10:30:18: ISAKMP:(0):Input = IKE_MESG_FROM_PEER, IKE_MM_EXCH
Jun  1 10:30:18: ISAKMP:(0):Old State = IKE_I_MM3  New State = IKE_I_MM4 

Jun  1 10:30:18: ISAKMP:(0): processing KE payload. message ID = 0
Jun  1 10:30:18: ISAKMP:(0): processing NONCE payload. message ID = 0
Jun  1 10:30:18: ISAKMP:(2115): processing CERT_REQ payload. message ID = 0
Jun  1 10:30:18: ISAKMP:(2115): peer wants a CT_X509_SIGNATURE cert
Jun  1 10:30:18: ISAKMP:(2115): peer wants cert issued by cn= DOMAIN,dc=FQ,dc=DN
Jun  1 10:30:18:  Choosing trustpoint hub01.FQDN.com:PORT as issuer
Jun  1 10:30:18: ISAKMP:(2115): processing vendor id payload
Jun  1 10:30:18: ISAKMP:(2115): vendor ID is Unity
Jun  1 10:30:18: ISAKMP:(2115): processing vendor id payload
Jun  1 10:30:18: ISAKMP:(2115): vendor ID is DPD
Jun  1 10:30:18: ISAKMP:(2115): processing vendor id payload
Jun  1 10:30:18: ISAKMP:(2115): speaking to another IOS box!
Jun  1 10:30:18: ISAKMP:received payload type 20
Jun  1 10:30:18: ISAKMP (2115): NAT found, both nodes inside NAT
Jun  1 10:30:18: ISAKMP:received payload type 20
Jun  1 10:30:18: ISAKMP (2115): My hash no match -  this node inside NAT
Jun  1 10:30:18: ISAKMP:(2115):Input = IKE_MESG_INTERNAL, IKE_PROCESS_MAIN_MODE
Jun  1 10:30:18: ISAKMP:(2115):Old State = IKE_I_MM4  New State = IKE_I_MM4 

Jun  1 10:30:18: ISAKMP:(2115):Send initial contact
Jun  1 10:30:18: ISAKMP:(2115): IKE->PKI Get self CertificateChain state (I) MM_KEY_EXCH (peer HUB01_IP)
Jun  1 10:30:18: ISAKMP:(2115): PKI->IKE Got self CertificateChain state (I) MM_KEY_EXCH (peer HUB01_IP)
Jun  1 10:30:18: ISAKMP:(2115): IKE->PKI Get SubjectName state (I) MM_KEY_EXCH (peer HUB01_IP)
Jun  1 10:30:18: ISAKMP:(2115): PKI->IKE Got SubjectName state (I) MM_KEY_EXCH (peer HUB01_IP)
Jun  1 10:30:18: ISAKMP:(2115):My ID configured as IPv4 Addr, but Addr not in Cert!
Jun  1 10:30:18: ISAKMP:(2115):Using FQDN as My ID
Jun  1 10:30:18: ISAKMP:(2115):SA is doing RSA signature authentication using id type ID_FQDN
Jun  1 10:30:18: ISAKMP (2115): ID payload 
	next-payload : 6
	type         : 2 
	FQDN name    : SPOKE.FQDN.XYZ 
	protocol     : 17 
	port         : 0 
	length       : 25
Jun  1 10:30:18: ISAKMP:(2115):Total payload length: 25
Jun  1 10:30:18: ISAKMP:(2115): IKE->PKI Get CertificateChain to be sent to peer state (I) MM_KEY_EXCH (peer HUB01_IP)
Jun  1 10:30:18: ISAKMP:(2115): PKI->IKE Got CertificateChain to be sent to peer state (I) MM_KEY_EXCH (peer HUB01_IP)
Jun  1 10:30:18: ISAKMP (2115): constructing CERT payload for hostname=SPOKE.FQDN.XYZ
Jun  1 10:30:18: ISKAMP: growing send buffer from 1024 to 3072
Jun  1 10:30:18: ISAKMP:(2115): using the hub01.FQDN.com:PORT trustpoint's keypair to sign
Jun  1 10:30:18: ISAKMP:(2115): sending packet to HUB01_IP my_port 4500 peer_port 4500 (I) MM_KEY_EXCH
Jun  1 10:30:18: ISAKMP:(2115):Sending an IKE IPv4 Packet.
Jun  1 10:30:18: ISAKMP:(2115):Input = IKE_MESG_INTERNAL, IKE_PROCESS_COMPLETE
SPOKE_0268#
Jun  1 10:30:18: ISAKMP:(2115):Old State = IKE_I_MM4  New State = IKE_I_MM5 

Jun  1 10:30:18: ISAKMP (2114): received packet from HUB01_IP dport 4500 sport 4500 Global (I) MM_NO_STATE
Jun  1 10:30:19: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): connection lookup returned 87454954
SPOKE_0268#
Jun  1 10:30:21: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): connection lookup returned 87454954
SPOKE_0268#
Jun  1 10:30:22: ISAKMP:(2111):purging node -779529369
Jun  1 10:30:22: IPSEC(ERROR): crypto_notify_rp Rejected notify RP, elapse time 0 < 1000

SPOKE_0268#
Jun  1 10:30:24: IPSEC(ERROR): crypto_notify_rp Rejected notify RP, elapse time 0 < 1000

Jun  1 10:30:24: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): connection lookup returned 87454954
Jun  1 10:30:24: IPSEC(ERROR): crypto_notify_rp Rejected notify RP, elapse time 412 < 1000

Jun  1 10:30:25: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): connection lookup returned 87454954
Jun  1 10:30:25: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): Found Tunnel1 interface in shared list
Jun  1 10:30:25: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): Removing Tunnel1 interface from shared list
Jun  1 10:30:25: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): Closing socket
Jun  1 10:30:25: CRYPTO_SS(TUNNEL SEC): Closed socket.
Jun  1 10:30:25: CRYPTO_SS(TUNNEL SEC): local SRC_IP SRC_IP/255.255.255.255/0, remote HUB01_IP HUB01_IP/255.255.255.255/0, prot 47, ifc Tu1
Jun  1 10:30:25: ISAKMP:(2115):peer does not do paranoid keepalives.

Jun  1 10:30:25: ISAKMP:(2115):deleting SA reason "P1 delete notify (in)" state (I) MM_KEY_EXCH (peer HUB01_IP)
Jun  1 10:30:25: ISAKMP:(2114):peer does not do paranoid keepalives.

Jun  1 10:30:25: ISAKMP:(2113):peer does not do paranoid keepalives.

Jun  1 10:30:25: ISAKMP:(2112):peer does not do paranoid keepalives.

Jun  1 10:30:25: ISAKMP:(2111):peer does not do paranoid keepalives.

Jun  1 10:30:25: ISAKMP:(2115):deleting SA reason "P1 delete notify (in)" state (I) MM_KEY_EXCH (peer HUB01_IP) 
Jun  1 10:30:25: ISAKMP: Unlocking peer struct 0x8763F940 for isadb_mark_sa_deleted(), count 0
SPOKE_0268#
Jun  1 10:30:25: ISAKMP: Deleting peer node by peer_reap for HUB01_IP: 8763F940
Jun  1 10:30:25: ISAKMP:(2115):deleting node -680561793 error FALSE reason "IKE deleted"
Jun  1 10:30:25: ISAKMP:(2115): IKE->PKI End PKI Session state (I) MM_NO_STATE (peer HUB01_IP)
Jun  1 10:30:25: ISAKMP:(2115): PKI->IKE Ended PKI Session state (I) MM_NO_STATE (peer HUB01_IP)
Jun  1 10:30:25: ISAKMP:(2115):Input = IKE_MESG_INTERNAL, IKE_PHASE1_DEL
Jun  1 10:30:25: ISAKMP:(2115):Old State = IKE_I_MM5  New State = IKE_DEST_SA 

Jun  1 10:30:25: IPSEC(key_engine): got a queue event with 1 KMI message(s)
SPOKE_0268#
Jun  1 10:30:31: IPSEC-IFC MGRE/Tu1[shared]: crypto_ss_listen_start already listening
Jun  1 10:30:31: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): Opening a socket with profile vpnprof1
Jun  1 10:30:31: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): connection lookup returned 0
Jun  1 10:30:31: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): Triggering tunnel immediately.
Jun  1 10:30:31: IPSEC-IFC MGRE/Tu1[shared]: Adding Tunnel1 tunnel interface to shared list
Jun  1 10:30:31: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): connection lookup returned 87C36B58
Jun  1 10:30:31: IPSEC-IFC MGRE/Tu1[shared]: Socket 87C36B58 for HUB01_IP not open or does not exist
Jun  1 10:30:31: insert of map into mapdb AVL failed, map + ace pair already exists on the mapdb
Jun  1 10:30:31: CRYPTO_SS(TUNNEL SEC): Active open, socket info: local SRC_IP SRC_IP/255.255.255.255/0, remote HUB01_IP HUB01_IP/255.255.255.255/0,  prot 47, ifc Tu1
Jun  1 10:30:31: IPSEC(recalculate_mtu): reset sadb_root 88243F1C mtu to 1500
Jun  1 10:30:31: IPSEC(sa_request): ,
  (key eng. msg.) OUTBOUND local= SRC_IP:500, remote= HUB01_IP:500,
    local_proxy= SRC_IP/255.255.255.255/47/0,
    remote_proxy= HUB01_IP/255.255.255.255/47/0,
    protocol= ESP, transform= esp-aes 256 esp-md5-hmac  (Transport), 
    lifedur= 3600s and 4608000kb, 
    spi= 0x0(0), conn_id= 0, keysize= 256, flags= 0x0
Jun  1 10:30:31: ISAKMP:(0): SA request profile is (NULL)
Jun  1 10:30:31: ISAKMP: Created a peer struct for HUB01_IP, peer port 500
Jun  1 10:30:31: ISAKMP: New peer created peer = 0x8763F940 peer_handle = 0x80006457
Jun  1 10:30:31: ISAKMP: Locking peer struct 0x8763F940, refcount 1 for isakmp_initiator
Jun  1 10:30:31: ISAKMP: local port 500, remote port 500
Jun  1 10:30:31: ISAKMP: set new node 0 to QM_IDLE      
Jun  1 10:30:31: ISAKMP: Find a dup sa in the avl tree during calling isadb_insert sa = 87C638F4
Jun  1 10:30:31: ISAKMP:(0):Can not start Aggressive mode, trying Main mode.
Jun  1 10:30:31: ISAKMP:(0):No pre-shared key with HUB01_IP!
Jun  1 10:30:31: ISAKMP:(0): IKE->PKI Get configured TrustPoints state (I) MM_NO_STATE (peer HUB01_IP)
Jun  1 10:30:31: ISAKMP:(0): PKI->IKE Got configured TrustPoints state (I) MM_NO_STATE (peer HUB01_IP)
Jun  1 10:30:31: ISAKMP:(0): constructed NAT-T vendor-rfc3947 ID
Jun  1 10:30:31: ISAKMP:(0): constructed NAT-T vendor-07 ID
Jun  1 10:30:31: ISAKMP:(0): constructed NAT-T vendor-03 ID
Jun  1 10:30:31: ISAKMP:(0): constructed NAT-T vendor-02 ID
Jun  1 10:30:31: ISAKMP:(0):Input = IKE_MESG_FROM_IPSEC, IKE_SA_REQ_MM
Jun  1 10:30:31: ISAKMP:(0):Old State = IKE_READY  New State = IKE_I_MM1 

Jun  1 10:30:31: ISAKMP:(0): beginning Main Mode exchange
Jun  1 10:30:31: ISAKMP:(0): sending packet to HUB01_IP my_port 500 peer_port 500 (I) MM_NO_STATE
Jun  1 10:30:31: ISAKMP:(0):Sending an IKE IPv4 Packet.
Jun  1 10:30:31: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): connection lookup returned 87C36B58
Jun  1 10:30:31: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): good socket ready message
Jun  1 10:30:31: ISAKMP (0): received packet from HUB01_IP dport 500 sport 500 Global (I) MM_NO_STATE
Jun  1 10:30:31: ISAKMP:(0):Input = IKE_MESG_FROM_PEER, IKE_MM_EXCH
Jun  1 10:30:31: ISAKMP:(0):Old State = IKE_I_MM1  New State = IKE_I_MM2 

Jun  1 10:30:31: ISAKMP:(0): processing SA payload. message ID = 0
Jun  1 10:30:31: ISAKMP:(0): processing vendor id payload
Jun  1 10:30:31: ISAKMP:(0): vendor ID seems Unity/DPD but major 69 mismatch
Jun  1 10:30:31: ISAKMP (0): vendor ID is NAT-T RFC 3947
Jun  1 10:30:31: ISAKMP : Scanning profiles for xauth ...
Jun  1 10:30:31: ISAKMP:(0): IKE->PKI Get configured TrustPoints state (I) MM_NO_STATE (peer HUB01_IP)
Jun  1 10:30:31: ISAKMP:(0): PKI->IKE Got configured TrustPoints state (I) MM_NO_STATE (peer HUB01_IP)
Jun  1 10:30:31: ISAKMP:(0):Checking ISAKMP transform 1 against priority 1 policy
Jun  1 10:30:31: ISAKMP:      encryption AES-CBC
Jun  1 10:30:31: ISAKMP:      keylength of 256
Jun  1 10:30:31: ISAKMP:      hash SHA
Jun  1 10:30:31: ISAKMP:      default group 1
Jun  1 10:30:31: ISAKMP:      auth RSA sig
Jun  1 10:30:31: ISAKMP:      life type in seconds
Jun  1 10:30:31: ISAKMP:      life duration (VPI) of  0x0 0x1 0x51 0x80 
Jun  1 10:30:31: ISAKMP:(0):atts are acceptable. Next payload is 0
Jun  1 10:30:31: ISAKMP:(0):Acceptable atts:actual life: 0
Jun  1 10:30:31: ISAKMP:(0):Acceptable atts:life: 0
Jun  1 10:30:31: ISAKMP:(0):Fill atts in sa vpi_length:4
Jun  1 10:30:31: ISAKMP:(0):Fill atts in sa life_in_seconds:86400
Jun  1 10:30:31: ISAKMP:(0): IKE->PKI Start PKI Session state (I) MM_NO_STATE (peer HUB01_IP)
Jun  1 10:30:31: ISAKMP:(0): PKI->IKE Started PKI Session state (I) MM_NO_STATE (peer HUB01_IP)
Jun  1 10:30:31: ISAKMP:(0):Returning Actual lifetime: 86400
Jun  1 10:30:31: ISAKMP:(0)::Started lifetime timer: 86400.

Jun  1 10:30:31: ISAKMP:(0): processing vendor id payload
Jun  1 10:30:31: ISAKMP:(0): vendor ID seems Unity/DPD but major 69 mismatch
Jun  1 10:30:31: ISAKMP (0): vendor ID is NAT-T RFC 3947
Jun  1 10:30:31: ISAKMP:(0):Input = IKE_MESG_INTERNAL, IKE_PROCESS_MAIN_MODE
Jun  1 10:30:31: ISAKMP:(0):Old State = IKE_I_MM2  New State = IKE_I_MM2 

Jun  1 10:30:31: ISAKMP:(0): IKE->PKI Get configured TrustPoints state (I) MM_SA_SETUP (peer HUB01_IP)
Jun  1 10:30:31: ISAKMP:(0): PKI->IKE Got configured TrustPoints state (I) MM_SA_SETUP (peer HUB01_IP)
Jun  1 10:30:31: ISAKMP:(0): IKE->PKI Get IssuerNames state (I) MM_SA_SETUP (peer HUB01_IP)
Jun  1 10:30:31: ISAKMP:(0): PKI->IKE Got IssuerNames state (I) MM_SA_SETUP (peer HUB01_IP)
Jun  1 10:30:31: ISAKMP (0): constructing CERT_REQ for issuer cn= DOMAIN,dc=FQ,dc=DN
Jun  1 10:30:31: ISAKMP (0): constructing CERT_REQ for issuer cn=CAServer,dc=DomainName,dc=local
Jun  1 10:30:31: ISAKMP:(0): sending packet to HUB01_IP my_port 500 peer_port 500 (I) MM_SA_SETUP
Jun  1 10:30:31: ISAKMP:(0):Sending an IKE IPv4 Packet.
Jun  1 10:30:31: ISAKMP:(0):Input = IKE_MESG_INTERNAL, IKE_PROCESS_COMPLETE
Jun  1 10:30:31: ISAKMP:(0):Old State = IKE_I_MM2  New State = IKE_I_MM3 

Jun  1 10:30:31: ISAKMP (0): received packet from HUB01_IP dport 500 sport 500 Global (I) MM_SA_SETUP
Jun  1 10:30:31: ISAKMP:(0):Input = IKE_MESG_FROM_PEER, IKE_MM_EXCH
Jun  1 10:30:31: ISAKMP:(0):Old State = IKE_I_MM3  New State = IKE_I_MM4 

Jun  1 10:30:31: ISAKMP:(0): processing KE payload. message ID = 0
Jun  1 10:30:31: ISAKMP:(0): processing NONCE payload. message ID = 0
Jun  1 10:30:31: ISAKMP:(2116): processing CERT_REQ payload. message ID = 0
Jun  1 10:30:31: ISAKMP:(2116): peer wants a CT_X509_SIGNATURE cert
Jun  1 10:30:31: ISAKMP:(2116): peer wants cert issued by cn= DOMAIN,dc=FQ,dc=DN
Jun  1 10:30:31:  Choosing trustpoint hub01.FQDN.com:PORT as issuer
Jun  1 10:30:31: ISAKMP:(2116): processing vendor id payload
Jun  1 10:30:31: ISAKMP:(2116): vendor ID is Unity
Jun  1 10:30:31: ISAKMP:(2116): processing vendor id payload
Jun  1 10:30:31: ISAKMP:(2116): vendor ID is DPD
Jun  1 10:30:31: ISAKMP:(2116): processing vendor id payload
Jun  1 10:30:31: ISAKMP:(2116): speaking to another IOS box!
Jun  1 10:30:31: ISAKMP:received payload type 20
Jun  1 10:30:31: ISAKMP (2116): NAT found, both nodes inside NAT
Jun  1 10:30:31: ISAKMP:received payload type 20
Jun  1 10:30:31: ISAKMP (2116): My hash no match -  this node inside NAT
Jun  1 10:30:31: ISAKMP:(2116):Input = IKE_MESG_INTERNAL, IKE_PROCESS_MAIN_MODE
Jun  1 10:30:31: ISAKMP:(2116):Old State = IKE_I_MM4  New State = IKE_I_MM4 

Jun  1 10:30:31: ISAKMP:(2116):Send initial contact
Jun  1 10:30:31: ISAKMP:(2116): IKE->PKI Get self CertificateChain state (I) MM_KEY_EXCH (peer HUB01_IP)
Jun  1 10:30:31: ISAKMP:(2116): PKI->IKE Got self CertificateChain state (I) MM_KEY_EXCH (peer HUB01_IP)
Jun  1 10:30:31: ISAKMP:(2116): IKE->PKI Get SubjectName state (I) MM_KEY_EXCH (peer HUB01_IP)
Jun  1 10:30:31: ISAKMP:(2116): PKI->IKE Got SubjectName state (I) MM_KEY_EXCH (peer HUB01_IP)
Jun  1 10:30:31: ISAKMP:(2116):My ID configured as IPv4 Addr, but Addr not in Cert!
Jun  1 10:30:31: ISAKMP:(2116):Using FQDN as My ID
Jun  1 10:30:31: ISAKMP:(2116):SA is doing RSA signature authentication using id type ID_FQDN
Jun  1 10:30:31: ISAKMP (2116): ID payload 
	next-payload : 6
	type         : 2 
	FQDN name    : SPOKE.FQDN.XYZ 
	protocol     : 17 
	port         : 0 
	length       : 25
Jun  1 10:30:31: ISAKMP:(2116):Total payload length: 25
Jun  1 10:30:31: ISAKMP:(2116): IKE->PKI Get CertificateChain to be sent to peer state (I) MM_KEY_EXCH (peer HUB01_IP)
Jun  1 10:30:31: ISAKMP:(2116): PKI->IKE Got CertificateChain to be sent to peer state (I) MM_KEY_EXCH (peer HUB01_IP)
Jun  1 10:30:31: ISAKMP (2116): constructing CERT payload for hostname=SPOKE.FQDN.XYZ
Jun  1 10:30:31: ISKAMP: growing send buffer from 1024 to 3072
Jun  1 10:30:31: ISAKMP:(2116): using the hub01.FQDN.com:PORT trustpoint's keypair to sign
Jun  1 10:30:31: ISAKMP:(2116): sending packet to HUB01_IP my_port 4500 peer_port 4500 (I) MM_KEY_EXCH
Jun  1 10:30:31: ISAKMP:(2116):Sending an IKE IPv4 Packet.
Jun  1 10:30:31: ISAKMP:(2116):Input = IKE_MESG_INTERNAL, IKE_PROCESS_COMPLETE
SPOKE_0268#
Jun  1 10:30:31: ISAKMP:(2116):Old State = IKE_I_MM4  New State = IKE_I_MM5 

Jun  1 10:30:31: ISAKMP (2115): received packet from HUB01_IP dport 4500 sport 4500 Global (I) MM_NO_STATE
Jun  1 10:30:32: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): connection lookup returned 87C36B58
Jun  1 10:30:32: IPSEC(ERROR): crypto_notify_rp Rejected notify RP, elapse time 240 < 1000

Jun  1 10:30:32: IPSEC(ERROR): crypto_notify_rp Rejected notify RP, elapse time 240 < 1000

SPOKE_0268#
Jun  1 10:30:32: ISAKMP:(2111):purging SA., sa=87BF14CC, delme=87BF14CC
SPOKE_0268#
Jun  1 10:30:34: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): connection lookup returned 87C36B58
Jun  1 10:30:34: IPSEC(ERROR): crypto_notify_rp Rejected notify RP, elapse time 280 < 1000

Jun  1 10:30:34: IPSEC(ERROR): crypto_notify_rp Rejected notify RP, elapse time 280 < 1000

SPOKE_0268#
Jun  1 10:30:36: IPSEC-IFC MGRE/Tu2[shared](SRC_IP/188.65.206.34): connection lookup returned 87D3CB04
Jun  1 10:30:36: ISAKMP:(2112):purging node 104430948
Jun  1 10:30:36: IPSEC(ERROR): crypto_notify_rp Rejected notify RP, elapse time 0 < 1000

SPOKE_0268#
Jun  1 10:30:37: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): connection lookup returned 87C36B58
Jun  1 10:30:37: IPSEC(ERROR): crypto_notify_rp Rejected notify RP, elapse time 876 < 1000

Jun  1 10:30:38: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): connection lookup returned 87C36B58
Jun  1 10:30:38: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): Found Tunnel1 interface in shared list
Jun  1 10:30:38: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): Removing Tunnel1 interface from shared list
Jun  1 10:30:38: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): Closing socket
Jun  1 10:30:38: CRYPTO_SS(TUNNEL SEC): Closed socket.
Jun  1 10:30:38: CRYPTO_SS(TUNNEL SEC): local SRC_IP SRC_IP/255.255.255.255/0, remote HUB01_IP HUB01_IP/255.255.255.255/0, prot 47, ifc Tu1
Jun  1 10:30:38: ISAKMP:(2116):peer does not do paranoid keepalives.

Jun  1 10:30:38: ISAKMP:(2116):deleting SA reason "P1 delete notify (in)" state (I) MM_KEY_EXCH (peer HUB01_IP)
Jun  1 10:30:38: ISAKMP:(2115):peer does not do paranoid keepalives.

Jun  1 10:30:38: ISAKMP:(2114):peer does not do paranoid keepalives.

Jun  1 10:30:38: ISAKMP:(2113):peer does not do paranoid keepalives.

Jun  1 10:30:38: ISAKMP:(2112):peer does not do paranoid keepalives.

Jun  1 10:30:38: ISAKMP:(2116):deleting SA reason "P1 delete notify (in)" state (I) MM_KEY_EXCH (peer HUB01_IP) 
Jun  1 10:30:38: ISAKMP: Unlocking peer struct 0x8763F940 for isadb_mark_sa_deleted(), count 0
Jun  1 10:30:38: ISAKMP: Deleting peer node by peer_reap for HUB01_IP: 8763F940
Jun  1 10:30:38: ISAKMP:(2116):deleting node 283939560 error FALSE reason "IKE deleted"
Jun  1 10:30:38: ISAKMP:(2116): IKE->PKI End PKI Session state (I) MM_NO_STATE (peer HUB01_IP)
Jun  1 10:30:38: ISAKMP:(2116): PKI->IKE Ended PKI Session state (I) MM_NO_STATE (peer HUB01_IP)
Jun  1 10:30:38: ISAKMP:(2116):Input = IKE_MESG_INTERNAL, IKE_PHASE1_DEL
Jun  1 10:30:38: ISAKMP:(2116):Old State = IKE_I_MM5  New State = IKE_DEST_SA 

Jun  1 10:30:38: IPSEC(key_engine): got a queue event with 1 KMI message(s)
SPOKE_0268#
Jun  1 10:30:43: IPSEC-IFC MGRE/Tu1[shared]: crypto_ss_listen_start already listening
Jun  1 10:30:43: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): Opening a socket with profile vpnprof1
Jun  1 10:30:43: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): connection lookup returned 0
Jun  1 10:30:43: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): Triggering tunnel immediately.
Jun  1 10:30:43: IPSEC-IFC MGRE/Tu1[shared]: Adding Tunnel1 tunnel interface to shared list
Jun  1 10:30:43: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): connection lookup returned 87454954
Jun  1 10:30:43: IPSEC-IFC MGRE/Tu1[shared]: Socket 87454954 for HUB01_IP not open or does not exist
Jun  1 10:30:43: insert of map into mapdb AVL failed, map + ace pair already exists on the mapdb
Jun  1 10:30:43: CRYPTO_SS(TUNNEL SEC): Active open, socket info: local SRC_IP SRC_IP/255.255.255.255/0, remote HUB01_IP HUB01_IP/255.255.255.255/0,  prot 47, ifc Tu1
Jun  1 10:30:43: IPSEC(recalculate_mtu): reset sadb_root 88243F1C mtu to 1500
Jun  1 10:30:43: IPSEC(sa_request): ,
  (key eng. msg.) OUTBOUND local= SRC_IP:500, remote= HUB01_IP:500,
    local_proxy= SRC_IP/255.255.255.255/47/0,
    remote_proxy= HUB01_IP/255.255.255.255/47/0,
    protocol= ESP, transform= esp-aes 256 esp-md5-hmac  (Transport), 
    lifedur= 3600s and 4608000kb, 
    spi= 0x0(0), conn_id= 0, keysize= 256, flags= 0x0
Jun  1 10:30:43: ISAKMP:(0): SA request profile is (NULL)
Jun  1 10:30:43: ISAKMP: Created a peer struct for HUB01_IP, peer port 500
Jun  1 10:30:43: ISAKMP: New peer created peer = 0x87898B00 peer_handle = 0x80006459
Jun  1 10:30:43: ISAKMP: Locking peer struct 0x87898B00, refcount 1 for isakmp_initiator
Jun  1 10:30:43: ISAKMP: local port 500, remote port 500
Jun  1 10:30:43: ISAKMP: set new node 0 to QM_IDLE      
Jun  1 10:30:43: ISAKMP: Find a dup sa in the avl tree during calling isadb_insert sa = 87BF1428
Jun  1 10:30:43: ISAKMP:(0):Can not start Aggressive mode, trying Main mode.
Jun  1 10:30:43: ISAKMP:(0):No pre-shared key with HUB01_IP!
Jun  1 10:30:43: ISAKMP:(0): IKE->PKI Get configured TrustPoints state (I) MM_NO_STATE (peer HUB01_IP)
Jun  1 10:30:43: ISAKMP:(0): PKI->IKE Got configured TrustPoints state (I) MM_NO_STATE (peer HUB01_IP)
Jun  1 10:30:43: ISAKMP:(0): constructed NAT-T vendor-rfc3947 ID
Jun  1 10:30:43: ISAKMP:(0): constructed NAT-T vendor-07 ID
Jun  1 10:30:43: ISAKMP:(0): constructed NAT-T vendor-03 ID
Jun  1 10:30:43: ISAKMP:(0): constructed NAT-T vendor-02 ID
Jun  1 10:30:43: ISAKMP:(0):Input = IKE_MESG_FROM_IPSEC, IKE_SA_REQ_MM
Jun  1 10:30:43: ISAKMP:(0):Old State = IKE_READY  New State = IKE_I_MM1 

Jun  1 10:30:43: ISAKMP:(0): beginning Main Mode exchange
Jun  1 10:30:43: ISAKMP:(0): sending packet to HUB01_IP my_port 500 peer_port 500 (I) MM_NO_STATE
Jun  1 10:30:43: ISAKMP:(0):Sending an IKE IPv4 Packet.
Jun  1 10:30:43: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): connection lookup returned 87454954
Jun  1 10:30:43: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): good socket ready message
Jun  1 10:30:43: ISAKMP (0): received packet from HUB01_IP dport 500 sport 500 Global (I) MM_NO_STATE
Jun  1 10:30:43: ISAKMP:(0):Input = IKE_MESG_FROM_PEER, IKE_MM_EXCH
Jun  1 10:30:43: ISAKMP:(0):Old State = IKE_I_MM1  New State = IKE_I_MM2 

Jun  1 10:30:43: ISAKMP:(0): processing SA payload. message ID = 0
Jun  1 10:30:43: ISAKMP:(0): processing vendor id payload
Jun  1 10:30:43: ISAKMP:(0): vendor ID seems Unity/DPD but major 69 mismatch
Jun  1 10:30:43: ISAKMP (0): vendor ID is NAT-T RFC 3947
Jun  1 10:30:43: ISAKMP : Scanning profiles for xauth ...
Jun  1 10:30:43: ISAKMP:(0): IKE->PKI Get configured TrustPoints state (I) MM_NO_STATE (peer HUB01_IP)
Jun  1 10:30:43: ISAKMP:(0): PKI->IKE Got configured TrustPoints state (I) MM_NO_STATE (peer HUB01_IP)
Jun  1 10:30:43: ISAKMP:(0):Checking ISAKMP transform 1 against priority 1 policy
Jun  1 10:30:43: ISAKMP:      encryption AES-CBC
Jun  1 10:30:43: ISAKMP:      keylength of 256
Jun  1 10:30:43: ISAKMP:      hash SHA
Jun  1 10:30:43: ISAKMP:      default group 1
Jun  1 10:30:43: ISAKMP:      auth RSA sig
Jun  1 10:30:43: ISAKMP:      life type in seconds
Jun  1 10:30:43: ISAKMP:      life duration (VPI) of  0x0 0x1 0x51 0x80 
Jun  1 10:30:43: ISAKMP:(0):atts are acceptable. Next payload is 0
Jun  1 10:30:43: ISAKMP:(0):Acceptable atts:actual life: 0
Jun  1 10:30:43: ISAKMP:(0):Acceptable atts:life: 0
Jun  1 10:30:43: ISAKMP:(0):Fill atts in sa vpi_length:4
Jun  1 10:30:43: ISAKMP:(0):Fill atts in sa life_in_seconds:86400
Jun  1 10:30:43: ISAKMP:(0): IKE->PKI Start PKI Session state (I) MM_NO_STATE (peer HUB01_IP)
Jun  1 10:30:43: ISAKMP:(0): PKI->IKE Started PKI Session state (I) MM_NO_STATE (peer HUB01_IP)
Jun  1 10:30:43: ISAKMP:(0):Returning Actual lifetime: 86400
Jun  1 10:30:43: ISAKMP:(0)::Started lifetime timer: 86400.

Jun  1 10:30:43: ISAKMP:(0): processing vendor id payload
Jun  1 10:30:43: ISAKMP:(0): vendor ID seems Unity/DPD but major 69 mismatch
Jun  1 10:30:43: ISAKMP (0): vendor ID is NAT-T RFC 3947
Jun  1 10:30:43: ISAKMP:(0):Input = IKE_MESG_INTERNAL, IKE_PROCESS_MAIN_MODE
Jun  1 10:30:43: ISAKMP:(0):Old State = IKE_I_MM2  New State = IKE_I_MM2 

Jun  1 10:30:43: ISAKMP:(0): IKE->PKI Get configured TrustPoints state (I) MM_SA_SETUP (peer HUB01_IP)
Jun  1 10:30:43: ISAKMP:(0): PKI->IKE Got configured TrustPoints state (I) MM_SA_SETUP (peer HUB01_IP)
Jun  1 10:30:43: ISAKMP:(0): IKE->PKI Get IssuerNames state (I) MM_SA_SETUP (peer HUB01_IP)
Jun  1 10:30:43: ISAKMP:(0): PKI->IKE Got IssuerNames state (I) MM_SA_SETUP (peer HUB01_IP)
Jun  1 10:30:43: ISAKMP (0): constructing CERT_REQ for issuer cn= DOMAIN,dc=FQ,dc=DN
Jun  1 10:30:43: ISAKMP (0): constructing CERT_REQ for issuer cn=CAServer,dc=DomainName,dc=local
Jun  1 10:30:43: ISAKMP:(0): sending packet to HUB01_IP my_port 500 peer_port 500 (I) MM_SA_SETUP
Jun  1 10:30:43: ISAKMP:(0):Sending an IKE IPv4 Packet.
Jun  1 10:30:43: ISAKMP:(0):Input = IKE_MESG_INTERNAL, IKE_PROCESS_COMPLETE
Jun  1 10:30:43: ISAKMP:(0):Old State = IKE_I_MM2  New State = IKE_I_MM3 

Jun  1 10:30:43: ISAKMP (0): received packet from HUB01_IP dport 500 sport 500 Global (I) MM_SA_SETUP
Jun  1 10:30:43: ISAKMP:(0):Input = IKE_MESG_FROM_PEER, IKE_MM_EXCH
Jun  1 10:30:43: ISAKMP:(0):Old State = IKE_I_MM3  New State = IKE_I_MM4 

Jun  1 10:30:43: ISAKMP:(0): processing KE payload. message ID = 0
Jun  1 10:30:44: ISAKMP:(0): processing NONCE payload. message ID = 0
Jun  1 10:30:44: ISAKMP:(2117): processing CERT_REQ payload. message ID = 0
Jun  1 10:30:44: ISAKMP:(2117): peer wants a CT_X509_SIGNATURE cert
Jun  1 10:30:44: ISAKMP:(2117): peer wants cert issued by cn= DOMAIN,dc=FQ,dc=DN
Jun  1 10:30:44:  Choosing trustpoint hub01.FQDN.com:PORT as issuer
Jun  1 10:30:44: ISAKMP:(2117): processing vendor id payload
Jun  1 10:30:44: ISAKMP:(2117): vendor ID is Unity
Jun  1 10:30:44: ISAKMP:(2117): processing vendor id payload
Jun  1 10:30:44: ISAKMP:(2117): vendor ID is DPD
Jun  1 10:30:44: ISAKMP:(2117): processing vendor id payload
Jun  1 10:30:44: ISAKMP:(2117): speaking to another IOS box!
Jun  1 10:30:44: ISAKMP:received payload type 20
Jun  1 10:30:44: ISAKMP (2117): NAT found, both nodes inside NAT
Jun  1 10:30:44: ISAKMP:received payload type 20
Jun  1 10:30:44: ISAKMP (2117): My hash no match -  this node inside NAT
Jun  1 10:30:44: ISAKMP:(2117):Input = IKE_MESG_INTERNAL, IKE_PROCESS_MAIN_MODE
Jun  1 10:30:44: ISAKMP:(2117):Old State = IKE_I_MM4  New State = IKE_I_MM4 

Jun  1 10:30:44: ISAKMP:(2117):Send initial contact
Jun  1 10:30:44: ISAKMP:(2117): IKE->PKI Get self CertificateChain state (I) MM_KEY_EXCH (peer HUB01_IP)
Jun  1 10:30:44: ISAKMP:(2117): PKI->IKE Got self CertificateChain state (I) MM_KEY_EXCH (peer HUB01_IP)
Jun  1 10:30:44: ISAKMP:(2117): IKE->PKI Get SubjectName state (I) MM_KEY_EXCH (peer HUB01_IP)
Jun  1 10:30:44: ISAKMP:(2117): PKI->IKE Got SubjectName state (I) MM_KEY_EXCH (peer HUB01_IP)
Jun  1 10:30:44: ISAKMP:(2117):My ID configured as IPv4 Addr, but Addr not in Cert!
Jun  1 10:30:44: ISAKMP:(2117):Using FQDN as My ID
Jun  1 10:30:44: ISAKMP:(2117):SA is doing RSA signature authentication using id type ID_FQDN
Jun  1 10:30:44: ISAKMP (2117): ID payload 
	next-payload : 6
	type         : 2 
	FQDN name    : SPOKE.FQDN.XYZ 
	protocol     : 17 
	port         : 0 
	length       : 25
Jun  1 10:30:44: ISAKMP:(2117):Total payload length: 25
Jun  1 10:30:44: ISAKMP:(2117): IKE->PKI Get CertificateChain to be sent to peer state (I) MM_KEY_EXCH (peer HUB01_IP)
Jun  1 10:30:44: ISAKMP:(2117): PKI->IKE Got CertificateChain to be sent to peer state (I) MM_KEY_EXCH (peer HUB01_IP)
Jun  1 10:30:44: ISAKMP (2117): constructing CERT payload for hostname=SPOKE.FQDN.XYZ
Jun  1 10:30:44: ISKAMP: growing send buffer from 1024 to 3072
Jun  1 10:30:44: ISAKMP:(2117): using the hub01.FQDN.com:PORT trustpoint's keypair to sign
Jun  1 10:30:44: ISAKMP:(2117): sending packet to HUB01_IP my_port 4500 peer_port 4500 (I) MM_KEY_EXCH
Jun  1 10:30:44: ISAKMP:(2117):Sending an IKE IPv4 Packet.
Jun  1 10:30:44: ISAKMP:(2117):Input = IKE_MESG_INTERNAL, IKE_PROCESS_COMPLETE
SPOKE_0268#
Jun  1 10:30:44: ISAKMP:(2117):Old State = IKE_I_MM4  New State = IKE_I_MM5 

Jun  1 10:30:44: ISAKMP (2116): received packet from HUB01_IP dport 4500 sport 4500 Global (I) MM_NO_STATE
Jun  1 10:30:44: IPSEC(ERROR): crypto_notify_rp Rejected notify RP, elapse time 0 < 1000

Jun  1 10:30:44: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): connection lookup returned 87454954
Jun  1 10:30:44: IPSEC(ERROR): crypto_notify_rp Rejected notify RP, elapse time 500 < 1000

SPOKE_0268#
Jun  1 10:30:45: IPSEC(ERROR): crypto_notify_rp Rejected notify RP, elapse time 0 < 1000

Jun  1 10:30:46: ISAKMP:(2112):purging SA., sa=87BF0498, delme=87BF0498
Jun  1 10:30:46: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): connection lookup returned 87454954
Jun  1 10:30:46: IPSEC(ERROR): crypto_notify_rp Rejected notify RP, elapse time 648 < 1000

SPOKE_0268#
Jun  1 10:30:48: ISAKMP:(2113):purging node 1779760591
Jun  1 10:30:49: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): connection lookup returned 87454954
SPOKE_0268#
Jun  1 10:30:50: IPSEC(ERROR): crypto_notify_rp Rejected notify RP, elapse time 768 < 1000

Jun  1 10:30:50: IPSEC(ERROR): crypto_notify_rp Rejected notify RP, elapse time 768 < 1000

Jun  1 10:30:50: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): connection lookup returned 87454954
Jun  1 10:30:50: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): Found Tunnel1 interface in shared list
Jun  1 10:30:50: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): Removing Tunnel1 interface from shared list
Jun  1 10:30:50: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): Closing socket
Jun  1 10:30:50: CRYPTO_SS(TUNNEL SEC): Closed socket.
Jun  1 10:30:50: CRYPTO_SS(TUNNEL SEC): local SRC_IP SRC_IP/255.255.255.255/0, remote HUB01_IP HUB01_IP/255.255.255.255/0, prot 47, ifc Tu1
Jun  1 10:30:50: ISAKMP:(2117):peer does not do paranoid keepalives.

Jun  1 10:30:50: ISAKMP:(2117):deleting SA reason "P1 delete notify (in)" state (I) MM_KEY_EXCH (peer HUB01_IP)
Jun  1 10:30:50: ISAKMP:(2116):peer does not do paranoid keepalives.

Jun  1 10:30:50: ISAKMP:(2115):peer does not do paranoid keepalives.

Jun  1 10:30:50: ISAKMP:(2114):peer does not do paranoid keepalives.

Jun  1 10:30:50: ISAKMP:(2113):peer does not do paranoid keepalives.

Jun  1 10:30:50: ISAKMP:(2117):deleting SA reason "P1 delete notify (in)" state (I) MM_KEY_EXCH (peer HUB01_IP) 
Jun  1 10:30:50: ISAKMP: Unlocking peer struct 0x87898B00 for isadb_mark_sa_deleted(), count 0
Jun  1 10:30:50: ISAKMP: Deleting peer node by peer_reap for HUB01_IP: 87898B00
Jun  1 10:30:50: ISAKMP:(2117):deleting node 1162453125 error FALSE reason "IKE deleted"
Jun  1 10:30:50: ISAKMP:(2117): IKE->PKI End PKI Session state (I) MM_NO_STATE (peer HUB01_IP)
Jun  1 10:30:50: ISAKMP:(2117): PKI->IKE Ended PKI Session state (I) MM_NO_STATE (peer HUB01_IP)
Jun  1 10:30:50: ISAKMP:(2117):Input = IKE_MESG_INTERNAL, IKE_PHASE1_DEL
SPOKE_0268#
Jun  1 10:30:50: ISAKMP:(2117):Old State = IKE_I_MM5  New State = IKE_DEST_SA 

Jun  1 10:30:50: IPSEC(key_engine): got a queue event with 1 KMI message(s)
SPOKE_0268#
Jun  1 10:30:57: IPSEC-IFC MGRE/Tu1[shared]: crypto_ss_listen_start already listening
Jun  1 10:30:57: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): Opening a socket with profile vpnprof1
Jun  1 10:30:57: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): connection lookup returned 0
Jun  1 10:30:57: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): Triggering tunnel immediately.
Jun  1 10:30:57: IPSEC-IFC MGRE/Tu1[shared]: Adding Tunnel1 tunnel interface to shared list
Jun  1 10:30:57: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): connection lookup returned 87C36B58
Jun  1 10:30:57: IPSEC-IFC MGRE/Tu1[shared]: Socket 87C36B58 for HUB01_IP not open or does not exist
Jun  1 10:30:57: insert of map into mapdb AVL failed, map + ace pair already exists on the mapdb
Jun  1 10:30:57: CRYPTO_SS(TUNNEL SEC): Active open, socket info: local SRC_IP SRC_IP/255.255.255.255/0, remote HUB01_IP HUB01_IP/255.255.255.255/0,  prot 47, ifc Tu1
Jun  1 10:30:57: IPSEC(recalculate_mtu): reset sadb_root 88243F1C mtu to 1500
Jun  1 10:30:57: IPSEC(sa_request): ,
  (key eng. msg.) OUTBOUND local= SRC_IP:500, remote= HUB01_IP:500,
    local_proxy= SRC_IP/255.255.255.255/47/0,
    remote_proxy= HUB01_IP/255.255.255.255/47/0,
    protocol= ESP, transform= esp-aes 256 esp-md5-hmac  (Transport), 
    lifedur= 3600s and 4608000kb, 
    spi= 0x0(0), conn_id= 0, keysize= 256, flags= 0x0
Jun  1 10:30:57: ISAKMP:(0): SA request profile is (NULL)
Jun  1 10:30:57: ISAKMP: Created a peer struct for HUB01_IP, peer port 500
Jun  1 10:30:57: ISAKMP: New peer created peer = 0x8847D7E0 peer_handle = 0x8000645B
Jun  1 10:30:57: ISAKMP: Locking peer struct 0x8847D7E0, refcount 1 for isakmp_initiator
Jun  1 10:30:57: ISAKMP: local port 500, remote port 500
Jun  1 10:30:57: ISAKMP: set new node 0 to QM_IDLE      
Jun  1 10:30:57: ISAKMP: Find a dup sa in the avl tree during calling isadb_insert sa = 87BF0498
Jun  1 10:30:57: ISAKMP:(0):Can not start Aggressive mode, trying Main mode.
Jun  1 10:30:57: ISAKMP:(0):No pre-shared key with HUB01_IP!
Jun  1 10:30:57: ISAKMP:(0): IKE->PKI Get configured TrustPoints state (I) MM_NO_STATE (peer HUB01_IP)
Jun  1 10:30:57: ISAKMP:(0): PKI->IKE Got configured TrustPoints state (I) MM_NO_STATE (peer HUB01_IP)
Jun  1 10:30:57: ISAKMP:(0): constructed NAT-T vendor-rfc3947 ID
Jun  1 10:30:57: ISAKMP:(0): constructed NAT-T vendor-07 ID
Jun  1 10:30:57: ISAKMP:(0): constructed NAT-T vendor-03 ID
Jun  1 10:30:57: ISAKMP:(0): constructed NAT-T vendor-02 ID
Jun  1 10:30:57: ISAKMP:(0):Input = IKE_MESG_FROM_IPSEC, IKE_SA_REQ_MM
Jun  1 10:30:57: ISAKMP:(0):Old State = IKE_READY  New State = IKE_I_MM1 

Jun  1 10:30:57: ISAKMP:(0): beginning Main Mode exchange
Jun  1 10:30:57: ISAKMP:(0): sending packet to HUB01_IP my_port 500 peer_port 500 (I) MM_NO_STATE
Jun  1 10:30:57: ISAKMP:(0):Sending an IKE IPv4 Packet.
Jun  1 10:30:57: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): connection lookup returned 87C36B58
Jun  1 10:30:57: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): good socket ready message
Jun  1 10:30:57: ISAKMP (0): received packet from HUB01_IP dport 500 sport 500 Global (I) MM_NO_STATE
Jun  1 10:30:57: ISAKMP:(0):Input = IKE_MESG_FROM_PEER, IKE_MM_EXCH
Jun  1 10:30:57: ISAKMP:(0):Old State = IKE_I_MM1  New State = IKE_I_MM2 

Jun  1 10:30:57: ISAKMP:(0): processing SA payload. message ID = 0
Jun  1 10:30:57: ISAKMP:(0): processing vendor id payload
Jun  1 10:30:57: ISAKMP:(0): vendor ID seems Unity/DPD but major 69 mismatch
Jun  1 10:30:57: ISAKMP (0): vendor ID is NAT-T RFC 3947
Jun  1 10:30:57: ISAKMP : Scanning profiles for xauth ...
Jun  1 10:30:57: ISAKMP:(0): IKE->PKI Get configured TrustPoints state (I) MM_NO_STATE (peer HUB01_IP)
Jun  1 10:30:57: ISAKMP:(0): PKI->IKE Got configured TrustPoints state (I) MM_NO_STATE (peer HUB01_IP)
Jun  1 10:30:57: ISAKMP:(0):Checking ISAKMP transform 1 against priority 1 policy
Jun  1 10:30:57: ISAKMP:      encryption AES-CBC
Jun  1 10:30:57: ISAKMP:      keylength of 256
Jun  1 10:30:57: ISAKMP:      hash SHA
Jun  1 10:30:57: ISAKMP:      default group 1
Jun  1 10:30:57: ISAKMP:      auth RSA sig
Jun  1 10:30:57: ISAKMP:      life type in seconds
Jun  1 10:30:57: ISAKMP:      life duration (VPI) of  0x0 0x1 0x51 0x80 
Jun  1 10:30:57: ISAKMP:(0):atts are acceptable. Next payload is 0
Jun  1 10:30:57: ISAKMP:(0):Acceptable atts:actual life: 0
Jun  1 10:30:57: ISAKMP:(0):Acceptable atts:life: 0
Jun  1 10:30:57: ISAKMP:(0):Fill atts in sa vpi_length:4
Jun  1 10:30:57: ISAKMP:(0):Fill atts in sa life_in_seconds:86400
Jun  1 10:30:57: ISAKMP:(0): IKE->PKI Start PKI Session state (I) MM_NO_STATE (peer HUB01_IP)
Jun  1 10:30:57: ISAKMP:(0): PKI->IKE Started PKI Session state (I) MM_NO_STATE (peer HUB01_IP)
Jun  1 10:30:57: ISAKMP:(0):Returning Actual lifetime: 86400
Jun  1 10:30:57: ISAKMP:(0)::Started lifetime timer: 86400.

Jun  1 10:30:57: ISAKMP:(0): processing vendor id payload
Jun  1 10:30:57: ISAKMP:(0): vendor ID seems Unity/DPD but major 69 mismatch
Jun  1 10:30:57: ISAKMP (0): vendor ID is NAT-T RFC 3947
Jun  1 10:30:57: ISAKMP:(0):Input = IKE_MESG_INTERNAL, IKE_PROCESS_MAIN_MODE
Jun  1 10:30:57: ISAKMP:(0):Old State = IKE_I_MM2  New State = IKE_I_MM2 

Jun  1 10:30:57: ISAKMP:(0): IKE->PKI Get configured TrustPoints state (I) MM_SA_SETUP (peer HUB01_IP)
Jun  1 10:30:57: ISAKMP:(0): PKI->IKE Got configured TrustPoints state (I) MM_SA_SETUP (peer HUB01_IP)
Jun  1 10:30:57: ISAKMP:(0): IKE->PKI Get IssuerNames state (I) MM_SA_SETUP (peer HUB01_IP)
Jun  1 10:30:57: ISAKMP:(0): PKI->IKE Got IssuerNames state (I) MM_SA_SETUP (peer HUB01_IP)
Jun  1 10:30:57: ISAKMP (0): constructing CERT_REQ for issuer cn= DOMAIN,dc=FQ,dc=DN
Jun  1 10:30:57: ISAKMP (0): constructing CERT_REQ for issuer cn=CAServer,dc=DomainName,dc=local
Jun  1 10:30:57: ISAKMP:(0): sending packet to HUB01_IP my_port 500 peer_port 500 (I) MM_SA_SETUP
Jun  1 10:30:57: ISAKMP:(0):Sending an IKE IPv4 Packet.
Jun  1 10:30:57: ISAKMP:(0):Input = IKE_MESG_INTERNAL, IKE_PROCESS_COMPLETE
Jun  1 10:30:57: ISAKMP:(0):Old State = IKE_I_MM2  New State = IKE_I_MM3 

Jun  1 10:30:57: ISAKMP (0): received packet from HUB01_IP dport 500 sport 500 Global (I) MM_SA_SETUP
Jun  1 10:30:57: ISAKMP:(0):Input = IKE_MESG_FROM_PEER, IKE_MM_EXCH
Jun  1 10:30:57: ISAKMP:(0):Old State = IKE_I_MM3  New State = IKE_I_MM4 

Jun  1 10:30:57: ISAKMP:(0): processing KE payload. message ID = 0
Jun  1 10:30:57: ISAKMP:(0): processing NONCE payload. message ID = 0
Jun  1 10:30:57: ISAKMP:(2118): processing CERT_REQ payload. message ID = 0
Jun  1 10:30:57: ISAKMP:(2118): peer wants a CT_X509_SIGNATURE cert
Jun  1 10:30:57: ISAKMP:(2118): peer wants cert issued by cn= DOMAIN,dc=FQ,dc=DN
Jun  1 10:30:57:  Choosing trustpoint hub01.FQDN.com:PORT as issuer
Jun  1 10:30:57: ISAKMP:(2118): processing vendor id payload
Jun  1 10:30:57: ISAKMP:(2118): vendor ID is Unity
Jun  1 10:30:57: ISAKMP:(2118): processing vendor id payload
Jun  1 10:30:57: ISAKMP:(2118): vendor ID is DPD
Jun  1 10:30:57: ISAKMP:(2118): processing vendor id payload
Jun  1 10:30:57: ISAKMP:(2118): speaking to another IOS box!
Jun  1 10:30:57: ISAKMP:received payload type 20
Jun  1 10:30:57: ISAKMP (2118): NAT found, both nodes inside NAT
Jun  1 10:30:57: ISAKMP:received payload type 20
Jun  1 10:30:57: ISAKMP (2118): My hash no match -  this node inside NAT
Jun  1 10:30:57: ISAKMP:(2118):Input = IKE_MESG_INTERNAL, IKE_PROCESS_MAIN_MODE
Jun  1 10:30:57: ISAKMP:(2118):Old State = IKE_I_MM4  New State = IKE_I_MM4 

Jun  1 10:30:57: ISAKMP:(2118):Send initial contact
Jun  1 10:30:57: ISAKMP:(2118): IKE->PKI Get self CertificateChain state (I) MM_KEY_EXCH (peer HUB01_IP)
Jun  1 10:30:57: ISAKMP:(2118): PKI->IKE Got self CertificateChain state (I) MM_KEY_EXCH (peer HUB01_IP)
Jun  1 10:30:57: ISAKMP:(2118): IKE->PKI Get SubjectName state (I) MM_KEY_EXCH (peer HUB01_IP)
Jun  1 10:30:57: ISAKMP:(2118): PKI->IKE Got SubjectName state (I) MM_KEY_EXCH (peer HUB01_IP)
Jun  1 10:30:57: ISAKMP:(2118):My ID configured as IPv4 Addr, but Addr not in Cert!
Jun  1 10:30:57: ISAKMP:(2118):Using FQDN as My ID
Jun  1 10:30:57: ISAKMP:(2118):SA is doing RSA signature authentication using id type ID_FQDN
Jun  1 10:30:57: ISAKMP (2118): ID payload 
	next-payload : 6
	type         : 2 
	FQDN name    : SPOKE.FQDN.XYZ 
	protocol     : 17 
	port         : 0 
	length       : 25
Jun  1 10:30:57: ISAKMP:(2118):Total payload length: 25
Jun  1 10:30:57: ISAKMP:(2118): IKE->PKI Get CertificateChain to be sent to peer state (I) MM_KEY_EXCH (peer HUB01_IP)
Jun  1 10:30:57: ISAKMP:(2118): PKI->IKE Got CertificateChain to be sent to peer state (I) MM_KEY_EXCH (peer HUB01_IP)
Jun  1 10:30:57: ISAKMP (2118): constructing CERT payload for hostname=SPOKE.FQDN.XYZ
Jun  1 10:30:57: ISKAMP: growing send buffer from 1024 to 3072
Jun  1 10:30:57: ISAKMP:(2118): using the hub01.FQDN.com:PORT trustpoint's keypair to sign
Jun  1 10:30:57: ISAKMP:(2118): sending packet to HUB01_IP my_port 4500 peer_port 4500 (I) MM_KEY_EXCH
Jun  1 10:30:57: ISAKMP:(2118):Sending an IKE IPv4 Packet.
Jun  1 10:30:57: ISAKMP:(2118):Input = IKE_MESG_INTERNAL, IKE_PROCESS_COMPLETE
SPOKE_0268#
Jun  1 10:30:57: ISAKMP:(2118):Old State = IKE_I_MM4  New State = IKE_I_MM5 

Jun  1 10:30:57: ISAKMP (2117): received packet from HUB01_IP dport 4500 sport 4500 Global (I) MM_NO_STATE
Jun  1 10:30:58: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): connection lookup returned 87C36B58
SPOKE_0268#
Jun  1 10:30:58: ISAKMP:(2113):purging SA., sa=87B3DC10, delme=87B3DC10
Jun  1 10:30:59: IPSEC(ERROR): crypto_notify_rp Rejected notify RP, elapse time 0 < 1000

SPOKE_0268#
Jun  1 10:31:00: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): connection lookup returned 87C36B58
Jun  1 10:31:00: IPSEC(ERROR): crypto_notify_rp Rejected notify RP, elapse time 288 < 1000

SPOKE_0268#
Jun  1 10:31:01: ISAKMP:(2114):purging node -1692886380
SPOKE_0268#
Jun  1 10:31:03: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): connection lookup returned 87C36B58
Jun  1 10:31:04: IPSEC(ERROR): crypto_notify_rp Rejected notify RP, elapse time 684 < 1000

Jun  1 10:31:04: IPSEC(ERROR): crypto_notify_rp Rejected notify RP, elapse time 684 < 1000

Jun  1 10:31:04: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): connection lookup returned 87C36B58
Jun  1 10:31:04: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): Found Tunnel1 interface in shared list
Jun  1 10:31:04: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): Removing Tunnel1 interface from shared list
Jun  1 10:31:04: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): Closing socket
Jun  1 10:31:04: CRYPTO_SS(TUNNEL SEC): Closed socket.
Jun  1 10:31:04: CRYPTO_SS(TUNNEL SEC): local SRC_IP SRC_IP/255.255.255.255/0, remote HUB01_IP HUB01_IP/255.255.255.255/0, prot 47, ifc Tu1
Jun  1 10:31:04: ISAKMP:(2118):peer does not do paranoid keepalives.

Jun  1 10:31:04: ISAKMP:(2118):deleting SA reason "P1 delete notify (in)" state (I) MM_KEY_EXCH (peer HUB01_IP)
Jun  1 10:31:04: ISAKMP:(2117):peer does not do paranoid keepalives.

Jun  1 10:31:04: ISAKMP:(2116):peer does not do paranoid keepalives.

Jun  1 10:31:04: ISAKMP:(2115):peer does not do paranoid keepalives.

Jun  1 10:31:04: ISAKMP:(2114):peer does not do paranoid keepalives.

Jun  1 10:31:04: ISAKMP:(2118):deleting SA reason "P1 delete notify (in)" state (I) MM_KEY_EXCH (peer HUB01_IP) 
Jun  1 10:31:04: ISAKMP: Unlocking peer struct 0x8847D7E0 for isadb_mark_sa_deleted(), count 0
Jun  1 10:31:04: ISAKMP: Deleting peer node by peer_reap for HUB01_IP: 8847D7E0
Jun  1 10:31:04: ISAKMP:(2118):deleting node 1996799020 error FALSE reason "IKE deleted"
Jun  1 10:31:04: ISAKMP:(2118): IKE->PKI End PKI Session state (I) MM_NO_STATE (peer HUB01_IP)
Jun  1 10:31:04: ISAKMP:(2118): PKI->IKE Ended PKI Session state (I) MM_NO_STATE (peer HUB01_IP)
Jun  1 10:31:04: ISAKMP:(2118):Input = IKE_MESG_INTERNAL, IKE_PHASE1_DEL
Jun  1 10:31:04: ISAKMP:(2118):Old State = IKE_I_MM5  New State = IKE_DEST_SA 

Jun  1 10:31:04: IPSEC(key_engine): got a queue event with 1 KMI message(s)
SPOKE_0268#
Jun  1 10:31:10: IPSEC-IFC MGRE/Tu1[shared]: crypto_ss_listen_start already listening
Jun  1 10:31:10: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): Opening a socket with profile vpnprof1
Jun  1 10:31:10: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): connection lookup returned 0
Jun  1 10:31:10: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): Triggering tunnel immediately.
Jun  1 10:31:10: IPSEC-IFC MGRE/Tu1[shared]: Adding Tunnel1 tunnel interface to shared list
Jun  1 10:31:10: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): connection lookup returned 87454954
Jun  1 10:31:10: IPSEC-IFC MGRE/Tu1[shared]: Socket 87454954 for HUB01_IP not open or does not exist
Jun  1 10:31:10: insert of map into mapdb AVL failed, map + ace pair already exists on the mapdb
Jun  1 10:31:10: CRYPTO_SS(TUNNEL SEC): Active open, socket info: local SRC_IP SRC_IP/255.255.255.255/0, remote HUB01_IP HUB01_IP/255.255.255.255/0,  prot 47, ifc Tu1
Jun  1 10:31:10: IPSEC(recalculate_mtu): reset sadb_root 88243F1C mtu to 1500
Jun  1 10:31:10: IPSEC(sa_request): ,
  (key eng. msg.) OUTBOUND local= SRC_IP:500, remote= HUB01_IP:500,
    local_proxy= SRC_IP/255.255.255.255/47/0,
    remote_proxy= HUB01_IP/255.255.255.255/47/0,
    protocol= ESP, transform= esp-aes 256 esp-md5-hmac  (Transport), 
    lifedur= 3600s and 4608000kb, 
    spi= 0x0(0), conn_id= 0, keysize= 256, flags= 0x0
Jun  1 10:31:10: ISAKMP:(0): SA request profile is (NULL)
Jun  1 10:31:10: ISAKMP: Created a peer struct for HUB01_IP, peer port 500
Jun  1 10:31:10: ISAKMP: New peer created peer = 0x8763F940 peer_handle = 0x8000645D
Jun  1 10:31:10: ISAKMP: Locking peer struct 0x8763F940, refcount 1 for isakmp_initiator
Jun  1 10:31:10: ISAKMP: local port 500, remote port 500
Jun  1 10:31:10: ISAKMP: set new node 0 to QM_IDLE      
Jun  1 10:31:10: ISAKMP: Find a dup sa in the avl tree during calling isadb_insert sa = 87C92A2C
Jun  1 10:31:10: ISAKMP:(0):Can not start Aggressive mode, trying Main mode.
Jun  1 10:31:10: ISAKMP:(0):No pre-shared key with HUB01_IP!
Jun  1 10:31:10: ISAKMP:(0): IKE->PKI Get configured TrustPoints state (I) MM_NO_STATE (peer HUB01_IP)
Jun  1 10:31:10: ISAKMP:(0): PKI->IKE Got configured TrustPoints state (I) MM_NO_STATE (peer HUB01_IP)
Jun  1 10:31:10: ISAKMP:(0): constructed NAT-T vendor-rfc3947 ID
Jun  1 10:31:10: ISAKMP:(0): constructed NAT-T vendor-07 ID
Jun  1 10:31:10: ISAKMP:(0): constructed NAT-T vendor-03 ID
Jun  1 10:31:10: ISAKMP:(0): constructed NAT-T vendor-02 ID
Jun  1 10:31:10: ISAKMP:(0):Input = IKE_MESG_FROM_IPSEC, IKE_SA_REQ_MM
Jun  1 10:31:10: ISAKMP:(0):Old State = IKE_READY  New State = IKE_I_MM1 

Jun  1 10:31:10: ISAKMP:(0): beginning Main Mode exchange
Jun  1 10:31:10: ISAKMP:(0): sending packet to HUB01_IP my_port 500 peer_port 500 (I) MM_NO_STATE
Jun  1 10:31:10: ISAKMP:(0):Sending an IKE IPv4 Packet.
Jun  1 10:31:10: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): connection lookup returned 87454954
Jun  1 10:31:10: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): good socket ready message
Jun  1 10:31:10: ISAKMP (0): received packet from HUB01_IP dport 500 sport 500 Global (I) MM_NO_STATE
Jun  1 10:31:10: ISAKMP:(0):Input = IKE_MESG_FROM_PEER, IKE_MM_EXCH
Jun  1 10:31:10: ISAKMP:(0):Old State = IKE_I_MM1  New State = IKE_I_MM2 

Jun  1 10:31:10: ISAKMP:(0): processing SA payload. message ID = 0
Jun  1 10:31:10: ISAKMP:(0): processing vendor id payload
Jun  1 10:31:10: ISAKMP:(0): vendor ID seems Unity/DPD but major 69 mismatch
Jun  1 10:31:10: ISAKMP (0): vendor ID is NAT-T RFC 3947
Jun  1 10:31:10: ISAKMP : Scanning profiles for xauth ...
Jun  1 10:31:10: ISAKMP:(0): IKE->PKI Get configured TrustPoints state (I) MM_NO_STATE (peer HUB01_IP)
Jun  1 10:31:10: ISAKMP:(0): PKI->IKE Got configured TrustPoints state (I) MM_NO_STATE (peer HUB01_IP)
Jun  1 10:31:10: ISAKMP:(0):Checking ISAKMP transform 1 against priority 1 policy
Jun  1 10:31:10: ISAKMP:      encryption AES-CBC
Jun  1 10:31:10: ISAKMP:      keylength of 256
Jun  1 10:31:10: ISAKMP:      hash SHA
Jun  1 10:31:10: ISAKMP:      default group 1
Jun  1 10:31:10: ISAKMP:      auth RSA sig
Jun  1 10:31:10: ISAKMP:      life type in seconds
Jun  1 10:31:10: ISAKMP:      life duration (VPI) of  0x0 0x1 0x51 0x80 
Jun  1 10:31:10: ISAKMP:(0):atts are acceptable. Next payload is 0
Jun  1 10:31:10: ISAKMP:(0):Acceptable atts:actual life: 0
Jun  1 10:31:10: ISAKMP:(0):Acceptable atts:life: 0
Jun  1 10:31:10: ISAKMP:(0):Fill atts in sa vpi_length:4
Jun  1 10:31:10: ISAKMP:(0):Fill atts in sa life_in_seconds:86400
Jun  1 10:31:10: ISAKMP:(0): IKE->PKI Start PKI Session state (I) MM_NO_STATE (peer HUB01_IP)
Jun  1 10:31:10: ISAKMP:(0): PKI->IKE Started PKI Session state (I) MM_NO_STATE (peer HUB01_IP)
Jun  1 10:31:10: ISAKMP:(0):Returning Actual lifetime: 86400
Jun  1 10:31:10: ISAKMP:(0)::Started lifetime timer: 86400.

Jun  1 10:31:10: ISAKMP:(0): processing vendor id payload
Jun  1 10:31:10: ISAKMP:(0): vendor ID seems Unity/DPD but major 69 mismatch
Jun  1 10:31:10: ISAKMP (0): vendor ID is NAT-T RFC 3947
Jun  1 10:31:10: ISAKMP:(0):Input = IKE_MESG_INTERNAL, IKE_PROCESS_MAIN_MODE
Jun  1 10:31:10: ISAKMP:(0):Old State = IKE_I_MM2  New State = IKE_I_MM2 

Jun  1 10:31:10: ISAKMP:(0): IKE->PKI Get configured TrustPoints state (I) MM_SA_SETUP (peer HUB01_IP)
Jun  1 10:31:10: ISAKMP:(0): PKI->IKE Got configured TrustPoints state (I) MM_SA_SETUP (peer HUB01_IP)
Jun  1 10:31:10: ISAKMP:(0): IKE->PKI Get IssuerNames state (I) MM_SA_SETUP (peer HUB01_IP)
Jun  1 10:31:10: ISAKMP:(0): PKI->IKE Got IssuerNames state (I) MM_SA_SETUP (peer HUB01_IP)
Jun  1 10:31:10: ISAKMP (0): constructing CERT_REQ for issuer cn= DOMAIN,dc=FQ,dc=DN
Jun  1 10:31:10: ISAKMP (0): constructing CERT_REQ for issuer cn=CAServer,dc=DomainName,dc=local
Jun  1 10:31:10: ISAKMP:(0): sending packet to HUB01_IP my_port 500 peer_port 500 (I) MM_SA_SETUP
Jun  1 10:31:10: ISAKMP:(0):Sending an IKE IPv4 Packet.
Jun  1 10:31:10: ISAKMP:(0):Input = IKE_MESG_INTERNAL, IKE_PROCESS_COMPLETE
Jun  1 10:31:10: ISAKMP:(0):Old State = IKE_I_MM2  New State = IKE_I_MM3 

Jun  1 10:31:10: ISAKMP (0): received packet from HUB01_IP dport 500 sport 500 Global (I) MM_SA_SETUP
Jun  1 10:31:10: ISAKMP:(0):Input = IKE_MESG_FROM_PEER, IKE_MM_EXCH
Jun  1 10:31:10: ISAKMP:(0):Old State = IKE_I_MM3  New State = IKE_I_MM4 

Jun  1 10:31:10: ISAKMP:(0): processing KE payload. message ID = 0
Jun  1 10:31:10: ISAKMP:(0): processing NONCE payload. message ID = 0
Jun  1 10:31:10: ISAKMP:(2119): processing CERT_REQ payload. message ID = 0
Jun  1 10:31:10: ISAKMP:(2119): peer wants a CT_X509_SIGNATURE cert
Jun  1 10:31:10: ISAKMP:(2119): peer wants cert issued by cn= DOMAIN,dc=FQ,dc=DN
Jun  1 10:31:10:  Choosing trustpoint hub01.FQDN.com:PORT as issuer
Jun  1 10:31:10: ISAKMP:(2119): processing vendor id payload
Jun  1 10:31:10: ISAKMP:(2119): vendor ID is Unity
Jun  1 10:31:10: ISAKMP:(2119): processing vendor id payload
Jun  1 10:31:10: ISAKMP:(2119): vendor ID is DPD
Jun  1 10:31:10: ISAKMP:(2119): processing vendor id payload
Jun  1 10:31:10: ISAKMP:(2119): speaking to another IOS box!
Jun  1 10:31:10: ISAKMP:received payload type 20
Jun  1 10:31:10: ISAKMP (2119): NAT found, both nodes inside NAT
Jun  1 10:31:10: ISAKMP:received payload type 20
Jun  1 10:31:10: ISAKMP (2119): My hash no match -  this node inside NAT
Jun  1 10:31:10: ISAKMP:(2119):Input = IKE_MESG_INTERNAL, IKE_PROCESS_MAIN_MODE
Jun  1 10:31:10: ISAKMP:(2119):Old State = IKE_I_MM4  New State = IKE_I_MM4 

Jun  1 10:31:10: ISAKMP:(2119):Send initial contact
Jun  1 10:31:10: ISAKMP:(2119): IKE->PKI Get self CertificateChain state (I) MM_KEY_EXCH (peer HUB01_IP)
Jun  1 10:31:10: ISAKMP:(2119): PKI->IKE Got self CertificateChain state (I) MM_KEY_EXCH (peer HUB01_IP)
Jun  1 10:31:10: ISAKMP:(2119): IKE->PKI Get SubjectName state (I) MM_KEY_EXCH (peer HUB01_IP)
Jun  1 10:31:10: ISAKMP:(2119): PKI->IKE Got SubjectName state (I) MM_KEY_EXCH (peer HUB01_IP)
Jun  1 10:31:10: ISAKMP:(2119):My ID configured as IPv4 Addr, but Addr not in Cert!
Jun  1 10:31:10: ISAKMP:(2119):Using FQDN as My ID
Jun  1 10:31:10: ISAKMP:(2119):SA is doing RSA signature authentication using id type ID_FQDN
Jun  1 10:31:10: ISAKMP (2119): ID payload 
	next-payload : 6
	type         : 2 
	FQDN name    : SPOKE.FQDN.XYZ 
	protocol     : 17 
	port         : 0 
	length       : 25
Jun  1 10:31:10: ISAKMP:(2119):Total payload length: 25
Jun  1 10:31:10: ISAKMP:(2119): IKE->PKI Get CertificateChain to be sent to peer state (I) MM_KEY_EXCH (peer HUB01_IP)
Jun  1 10:31:10: ISAKMP:(2119): PKI->IKE Got CertificateChain to be sent to peer state (I) MM_KEY_EXCH (peer HUB01_IP)
Jun  1 10:31:10: ISAKMP (2119): constructing CERT payload for hostname=SPOKE.FQDN.XYZ
Jun  1 10:31:10: ISKAMP: growing send buffer from 1024 to 3072
Jun  1 10:31:10: ISAKMP:(2119): using the hub01.FQDN.com:PORT trustpoint's keypair to sign
Jun  1 10:31:10: ISAKMP:(2119): sending packet to HUB01_IP my_port 4500 peer_port 4500 (I) MM_KEY_EXCH
Jun  1 10:31:10: ISAKMP:(2119):Sending an IKE IPv4 Packet.
Jun  1 10:31:10: ISAKMP:(2119):Input = IKE_MESG_INTERNAL, IKE_PROCESS_COMPLETE
SPOKE_0268#
Jun  1 10:31:10: ISAKMP:(2119):Old State = IKE_I_MM4  New State = IKE_I_MM5 

Jun  1 10:31:11: ISAKMP (2118): received packet from HUB01_IP dport 4500 sport 4500 Global (I) MM_NO_STATE
Jun  1 10:31:11: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): connection lookup returned 87454954
Jun  1 10:31:11: ISAKMP:(2114):purging SA., sa=87D82C70, delme=87D82C70
SPOKE_0268#
Jun  1 10:31:13: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): connection lookup returned 87454954
Jun  1 10:31:14: IPSEC(ERROR): crypto_notify_rp Rejected notify RP, elapse time 968 < 1000

Jun  1 10:31:14: IPSEC(ERROR): crypto_notify_rp Rejected notify RP, elapse time 968 < 1000

SPOKE_0268#
Jun  1 10:31:14: IPSEC(ERROR): crypto_notify_rp Rejected notify RP, elapse time 0 < 1000

SPOKE_0268#
Jun  1 10:31:15: ISAKMP:(2115):purging node -680561793
Jun  1 10:31:16: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): connection lookup returned 87454954
SPOKE_0268#
Jun  1 10:31:17: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): connection lookup returned 87454954
Jun  1 10:31:17: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): Found Tunnel1 interface in shared list
Jun  1 10:31:17: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): Removing Tunnel1 interface from shared list
Jun  1 10:31:17: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): Closing socket
Jun  1 10:31:17: CRYPTO_SS(TUNNEL SEC): Closed socket.
Jun  1 10:31:17: CRYPTO_SS(TUNNEL SEC): local SRC_IP SRC_IP/255.255.255.255/0, remote HUB01_IP HUB01_IP/255.255.255.255/0, prot 47, ifc Tu1
Jun  1 10:31:17: ISAKMP:(2119):peer does not do paranoid keepalives.

Jun  1 10:31:17: ISAKMP:(2119):deleting SA reason "P1 delete notify (in)" state (I) MM_KEY_EXCH (peer HUB01_IP)
Jun  1 10:31:17: ISAKMP:(2118):peer does not do paranoid keepalives.

Jun  1 10:31:17: ISAKMP:(2117):peer does not do paranoid keepalives.

Jun  1 10:31:17: ISAKMP:(2116):peer does not do paranoid keepalives.

Jun  1 10:31:17: ISAKMP:(2115):peer does not do paranoid keepalives.

Jun  1 10:31:17: ISAKMP:(2119):deleting SA reason "P1 delete notify (in)" state (I) MM_KEY_EXCH (peer HUB01_IP) 
Jun  1 10:31:17: ISAKMP: Unlocking peer struct 0x8763F940 for isadb_mark_sa_deleted(), count 0
SPOKE_0268#
Jun  1 10:31:17: ISAKMP: Deleting peer node by peer_reap for HUB01_IP: 8763F940
Jun  1 10:31:17: ISAKMP:(2119):deleting node 347174396 error FALSE reason "IKE deleted"
Jun  1 10:31:17: ISAKMP:(2119): IKE->PKI End PKI Session state (I) MM_NO_STATE (peer HUB01_IP)
Jun  1 10:31:17: ISAKMP:(2119): PKI->IKE Ended PKI Session state (I) MM_NO_STATE (peer HUB01_IP)
Jun  1 10:31:17: ISAKMP:(2119):Input = IKE_MESG_INTERNAL, IKE_PHASE1_DEL
Jun  1 10:31:17: ISAKMP:(2119):Old State = IKE_I_MM5  New State = IKE_DEST_SA 

Jun  1 10:31:17: IPSEC(key_engine): got a queue event with 1 KMI message(s)
SPOKE_0268#
Jun  1 10:31:23: IPSEC-IFC MGRE/Tu1[shared]: crypto_ss_listen_start already listening
Jun  1 10:31:23: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): Opening a socket with profile vpnprof1
Jun  1 10:31:23: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): connection lookup returned 0
Jun  1 10:31:23: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): Triggering tunnel immediately.
Jun  1 10:31:23: IPSEC-IFC MGRE/Tu1[shared]: Adding Tunnel1 tunnel interface to shared list
Jun  1 10:31:23: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): connection lookup returned 87C36B58
Jun  1 10:31:23: IPSEC-IFC MGRE/Tu1[shared]: Socket 87C36B58 for HUB01_IP not open or does not exist
Jun  1 10:31:23: insert of map into mapdb AVL failed, map + ace pair already exists on the mapdb
Jun  1 10:31:23: CRYPTO_SS(TUNNEL SEC): Active open, socket info: local SRC_IP SRC_IP/255.255.255.255/0, remote HUB01_IP HUB01_IP/255.255.255.255/0,  prot 47, ifc Tu1
Jun  1 10:31:23: IPSEC(recalculate_mtu): reset sadb_root 88243F1C mtu to 1500
Jun  1 10:31:23: IPSEC(sa_request): ,
  (key eng. msg.) OUTBOUND local= SRC_IP:500, remote= HUB01_IP:500,
    local_proxy= SRC_IP/255.255.255.255/47/0,
    remote_proxy= HUB01_IP/255.255.255.255/47/0,
    protocol= ESP, transform= esp-aes 256 esp-md5-hmac  (Transport), 
    lifedur= 3600s and 4608000kb, 
    spi= 0x0(0), conn_id= 0, keysize= 256, flags= 0x0
Jun  1 10:31:23: ISAKMP:(0): SA request profile is (NULL)
Jun  1 10:31:23: ISAKMP: Created a peer struct for HUB01_IP, peer port 500
Jun  1 10:31:23: ISAKMP: New peer created peer = 0x8847D7E0 peer_handle = 0x8000645F
Jun  1 10:31:23: ISAKMP: Locking peer struct 0x8847D7E0, refcount 1 for isakmp_initiator
Jun  1 10:31:23: ISAKMP: local port 500, remote port 500
Jun  1 10:31:23: ISAKMP: set new node 0 to QM_IDLE      
Jun  1 10:31:23: ISAKMP: Find a dup sa in the avl tree during calling isadb_insert sa = 87B3DC10
Jun  1 10:31:23: ISAKMP:(0):Can not start Aggressive mode, trying Main mode.
Jun  1 10:31:23: ISAKMP:(0):No pre-shared key with HUB01_IP!
Jun  1 10:31:23: ISAKMP:(0): IKE->PKI Get configured TrustPoints state (I) MM_NO_STATE (peer HUB01_IP)
Jun  1 10:31:23: ISAKMP:(0): PKI->IKE Got configured TrustPoints state (I) MM_NO_STATE (peer HUB01_IP)
Jun  1 10:31:23: ISAKMP:(0): constructed NAT-T vendor-rfc3947 ID
Jun  1 10:31:23: ISAKMP:(0): constructed NAT-T vendor-07 ID
Jun  1 10:31:23: ISAKMP:(0): constructed NAT-T vendor-03 ID
Jun  1 10:31:23: ISAKMP:(0): constructed NAT-T vendor-02 ID
Jun  1 10:31:23: ISAKMP:(0):Input = IKE_MESG_FROM_IPSEC, IKE_SA_REQ_MM
Jun  1 10:31:23: ISAKMP:(0):Old State = IKE_READY  New State = IKE_I_MM1 

Jun  1 10:31:23: ISAKMP:(0): beginning Main Mode exchange
Jun  1 10:31:23: ISAKMP:(0): sending packet to HUB01_IP my_port 500 peer_port 500 (I) MM_NO_STATE
Jun  1 10:31:23: ISAKMP:(0):Sending an IKE IPv4 Packet.
Jun  1 10:31:23: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): connection lookup returned 87C36B58
SPOKE_0268#
Jun  1 10:31:23: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): good socket ready message
Jun  1 10:31:23: ISAKMP (0): received packet from HUB01_IP dport 500 sport 500 Global (I) MM_NO_STATE
Jun  1 10:31:23: ISAKMP:(0):Input = IKE_MESG_FROM_PEER, IKE_MM_EXCH
Jun  1 10:31:23: ISAKMP:(0):Old State = IKE_I_MM1  New State = IKE_I_MM2 

Jun  1 10:31:23: ISAKMP:(0): processing SA payload. message ID = 0
Jun  1 10:31:23: ISAKMP:(0): processing vendor id payload
Jun  1 10:31:23: ISAKMP:(0): vendor ID seems Unity/DPD but major 69 mismatch
Jun  1 10:31:23: ISAKMP (0): vendor ID is NAT-T RFC 3947
Jun  1 10:31:23: ISAKMP : Scanning profiles for xauth ...
Jun  1 10:31:23: ISAKMP:(0): IKE->PKI Get configured TrustPoints state (I) MM_NO_STATE (peer HUB01_IP)
Jun  1 10:31:23: ISAKMP:(0): PKI->IKE Got configured TrustPoints state (I) MM_NO_STATE (peer HUB01_IP)
Jun  1 10:31:23: ISAKMP:(0):Checking ISAKMP transform 1 against priority 1 policy
Jun  1 10:31:23: ISAKMP:      encryption AES-CBC
Jun  1 10:31:23: ISAKMP:      keylength of 256
Jun  1 10:31:23: ISAKMP:      hash SHA
Jun  1 10:31:23: ISAKMP:      default group 1
Jun  1 10:31:23: ISAKMP:      auth RSA sig
Jun  1 10:31:23: ISAKMP:      life type in seconds
Jun  1 10:31:23: ISAKMP:      life duration (VPI) of  0x0 0x1 0x51 0x80 
Jun  1 10:31:23: ISAKMP:(0):atts are acceptable. Next payload is 0
Jun  1 10:31:23: ISAKMP:(0):Acceptable atts:actual life: 0
Jun  1 10:31:23: ISAKMP:(0):Acceptable atts:life: 0
Jun  1 10:31:23: ISAKMP:(0):Fill atts in sa vpi_length:4
Jun  1 10:31:23: ISAKMP:(0):Fill atts in sa life_in_seconds:86400
Jun  1 10:31:23: ISAKMP:(0): IKE->PKI Start PKI Session state (I) MM_NO_STATE (peer HUB01_IP)
Jun  1 10:31:23: ISAKMP:(0): PKI->IKE Started PKI Session state (I) MM_NO_STATE (peer HUB01_IP)
Jun  1 10:31:23: ISAKMP:(0):Returning Actual lifetime: 86400
Jun  1 10:31:23: ISAKMP:(0)::Started lifetime timer: 86400.

Jun  1 10:31:23: ISAKMP:(0): processing vendor id payload
Jun  1 10:31:23: ISAKMP:(0): vendor ID seems Unity/DPD but major 69 mismatch
Jun  1 10:31:23: ISAKMP (0): vendor ID is NAT-T RFC 3947
Jun  1 10:31:23: ISAKMP:(0):Input = IKE_MESG_INTERNAL, IKE_PROCESS_MAIN_MODE
Jun  1 10:31:23: ISAKMP:(0):Old State = IKE_I_MM2  New State = IKE_I_MM2 

Jun  1 10:31:23: ISAKMP:(0): IKE->PKI Get configured TrustPoints state (I) MM_SA_SETUP (peer HUB01_IP)
Jun  1 10:31:23: ISAKMP:(0): PKI->IKE Got configured TrustPoints state (I) MM_SA_SETUP (peer HUB01_IP)
Jun  1 10:31:23: ISAKMP:(0): IKE->PKI Get IssuerNames state (I) MM_SA_SETUP (peer HUB01_IP)
Jun  1 10:31:23: ISAKMP:(0): PKI->IKE Got IssuerNames state (I) MM_SA_SETUP (peer HUB01_IP)
Jun  1 10:31:23: ISAKMP (0): constructing CERT_REQ for issuer cn= DOMAIN,dc=FQ,dc=DN
Jun  1 10:31:23: ISAKMP (0): constructing CERT_REQ for issuer cn=CAServer,dc=DomainName,dc=local
Jun  1 10:31:23: ISAKMP:(0): sending packet to HUB01_IP my_port 500 peer_port 500 (I) MM_SA_SETUP
Jun  1 10:31:23: ISAKMP:(0):Sending an IKE IPv4 Packet.
Jun  1 10:31:23: ISAKMP:(0):Input = IKE_MESG_INTERNAL, IKE_PROCESS_COMPLETE
Jun  1 10:31:23: ISAKMP:(0):Old State = IKE_I_MM2  New State = IKE_I_MM3 

Jun  1 10:31:23: IPSEC(ERROR): crypto_notify_rp Rejected notify RP, elapse time 0 < 1000

Jun  1 10:31:23: ISAKMP (0): received packet from HUB01_IP dport 500 sport 500 Global (I) MM_SA_SETUP
Jun  1 10:31:23: ISAKMP:(0):Input = IKE_MESG_FROM_PEER, IKE_MM_EXCH
Jun  1 10:31:23: ISAKMP:(0):Old State = IKE_I_MM3  New State = IKE_I_MM4 

Jun  1 10:31:23: ISAKMP:(0): processing KE payload. message ID = 0
Jun  1 10:31:23: ISAKMP:(0): processing NONCE payload. message ID = 0
Jun  1 10:31:23: ISAKMP:(2120): processing CERT_REQ payload. message ID = 0
Jun  1 10:31:23: ISAKMP:(2120): peer wants a CT_X509_SIGNATURE cert
Jun  1 10:31:23: ISAKMP:(2120): peer wants cert issued by cn= DOMAIN,dc=FQ,dc=DN
Jun  1 10:31:23:  Choosing trustpoint hub01.FQDN.com:PORT as issuer
Jun  1 10:31:23: ISAKMP:(2120): processing vendor id payload
Jun  1 10:31:23: ISAKMP:(2120): vendor ID is Unity
Jun  1 10:31:23: ISAKMP:(2120): processing vendor id payload
Jun  1 10:31:23: ISAKMP:(2120): vendor ID is DPD
Jun  1 10:31:23: ISAKMP:(2120): processing vendor id payload
Jun  1 10:31:23: ISAKMP:(2120): speaking to another IOS box!
Jun  1 10:31:23: ISAKMP:received payload type 20
Jun  1 10:31:23: ISAKMP (2120): NAT found, both nodes inside NAT
Jun  1 10:31:23: ISAKMP:received payload type 20
Jun  1 10:31:23: ISAKMP (2120): My hash no match -  this node inside NAT
Jun  1 10:31:23: ISAKMP:(2120):Input = IKE_MESG_INTERNAL, IKE_PROCESS_MAIN_MODE
Jun  1 10:31:23: ISAKMP:(2120):Old State = IKE_I_MM4  New State = IKE_I_MM4 

Jun  1 10:31:23: ISAKMP:(2120):Send initial contact
Jun  1 10:31:23: ISAKMP:(2120): IKE->PKI Get self CertificateChain state (I) MM_KEY_EXCH (peer HUB01_IP)
Jun  1 10:31:23: ISAKMP:(2120): PKI->IKE Got self CertificateChain state (I) MM_KEY_EXCH (peer HUB01_IP)
Jun  1 10:31:23: ISAKMP:(2120): IKE->PKI Get SubjectName state (I) MM_KEY_EXCH (peer HUB01_IP)
Jun  1 10:31:23: ISAKMP:(2120): PKI->IKE Got SubjectName state (I) MM_KEY_EXCH (peer HUB01_IP)
Jun  1 10:31:23: ISAKMP:(2120):My ID configured as IPv4 Addr, but Addr not in Cert!
Jun  1 10:31:23: ISAKMP:(2120):Using FQDN as My ID
Jun  1 10:31:23: ISAKMP:(2120):SA is doing RSA signature authentication using id type ID_FQDN
Jun  1 10:31:23: ISAKMP (2120): ID payload 
	next-payload : 6
	type         : 2 
	FQDN name    : SPOKE.FQDN.XYZ 
	protocol     : 17 
	port         : 0 
	length       : 25
Jun  1 10:31:23: ISAKMP:(2120):Total payload length: 25
Jun  1 10:31:23: ISAKMP:(2120): IKE->PKI Get CertificateChain to be sent to peer state (I) MM_KEY_EXCH (peer HUB01_IP)
Jun  1 10:31:23: ISAKMP:(2120): PKI->IKE Got CertificateChain to be sent to peer state (I) MM_KEY_EXCH (peer HUB01_IP)
Jun  1 10:31:23: ISAKMP (2120): constructing CERT payload for hostname=SPOKE.FQDN.XYZ
Jun  1 10:31:23: ISKAMP: growing send buffer from 1024 to 3072
Jun  1 10:31:23: ISAKMP:(2120): using the hub01.FQDN.com:PORT trustpoint's keypair to sign
Jun  1 10:31:23: ISAKMP:(2120): sending packet to HUB01_IP my_port 4500 peer_port 4500 (I) MM_KEY_EXCH
Jun  1 10:31:23: ISAKMP:(2120):Sending an IKE IPv4 Packet.
Jun  1 10:31:23: ISAKMP:(2120):Input = IKE_MESG_INTERNAL, IKE_PROCESS_COMPLETE
SPOKE_0268#
Jun  1 10:31:23: ISAKMP:(2120):Old State = IKE_I_MM4  New State = IKE_I_MM5 

Jun  1 10:31:23: ISAKMP (2119): received packet from HUB01_IP dport 4500 sport 4500 Global (I) MM_NO_STATE
Jun  1 10:31:23: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): connection lookup returned 87C36B58
Jun  1 10:31:23: IPSEC(ERROR): crypto_notify_rp Rejected notify RP, elapse time 680 < 1000

Jun  1 10:31:24: IPSEC(ERROR): crypto_notify_rp Rejected notify RP, elapse time 0 < 1000

SPOKE_0268#
Jun  1 10:31:25: ISAKMP:(2115):purging SA., sa=87A9F57C, delme=87A9F57C
Jun  1 10:31:25: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): connection lookup returned 87C36B58
SPOKE_0268#
Jun  1 10:31:27: IPSEC(ERROR): crypto_notify_rp Rejected notify RP, elapse time 0 < 1000

SPOKE_0268#
Jun  1 10:31:28: ISAKMP:(2116):purging node 283939560
Jun  1 10:31:29: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): connection lookup returned 87C36B58
Jun  1 10:31:30: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): connection lookup returned 87C36B58
Jun  1 10:31:30: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): Found Tunnel1 interface in shared list
Jun  1 10:31:30: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): Removing Tunnel1 interface from shared list
Jun  1 10:31:30: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): Closing socket
Jun  1 10:31:30: CRYPTO_SS(TUNNEL SEC): Closed socket.
Jun  1 10:31:30: CRYPTO_SS(TUNNEL SEC): local SRC_IP SRC_IP/255.255.255.255/0, remote HUB01_IP HUB01_IP/255.255.255.255/0, prot 47, ifc Tu1
Jun  1 10:31:30: ISAKMP:(2120):peer does not do paranoid keepalives.

Jun  1 10:31:30: ISAKMP:(2120):deleting SA reason "P1 delete notify (in)" state (I) MM_KEY_EXCH (peer HUB01_IP)
Jun  1 10:31:30: ISAKMP:(2119):peer does not do paranoid keepalives.

Jun  1 10:31:30: ISAKMP:(2118):peer does not do paranoid keepalives.

Jun  1 10:31:30: ISAKMP:(2117):peer does not do paranoid keepalives.

Jun  1 10:31:30: ISAKMP:(2116):peer does not do paranoid keepalives.

Jun  1 10:31:30: ISAKMP:(2120):deleting SA reason "P1 delete notify (in)" state (I) MM_KEY_EXCH (peer HUB01_IP) 
Jun  1 10:31:30: ISAKMP: Unlocking peer struct 0x8847D7E0 for isadb_mark_sa_deleted(), count 0
SPOKE_0268#
Jun  1 10:31:30: ISAKMP: Deleting peer node by peer_reap for HUB01_IP: 8847D7E0
Jun  1 10:31:30: ISAKMP:(2120):deleting node 989920234 error FALSE reason "IKE deleted"
Jun  1 10:31:30: ISAKMP:(2120): IKE->PKI End PKI Session state (I) MM_NO_STATE (peer HUB01_IP)
Jun  1 10:31:30: ISAKMP:(2120): PKI->IKE Ended PKI Session state (I) MM_NO_STATE (peer HUB01_IP)
Jun  1 10:31:30: ISAKMP:(2120):Input = IKE_MESG_INTERNAL, IKE_PHASE1_DEL
Jun  1 10:31:30: ISAKMP:(2120):Old State = IKE_I_MM5  New State = IKE_DEST_SA 

Jun  1 10:31:30: IPSEC(key_engine): got a queue event with 1 KMI message(s)
SPOKE_0268#
Jun  1 10:31:36: IPSEC-IFC MGRE/Tu1[shared]: crypto_ss_listen_start already listening
Jun  1 10:31:36: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): Opening a socket with profile vpnprof1
Jun  1 10:31:36: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): connection lookup returned 0
Jun  1 10:31:36: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): Triggering tunnel immediately.
Jun  1 10:31:36: IPSEC-IFC MGRE/Tu1[shared]: Adding Tunnel1 tunnel interface to shared list
Jun  1 10:31:36: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): connection lookup returned 87454954
Jun  1 10:31:36: IPSEC-IFC MGRE/Tu1[shared]: Socket 87454954 for HUB01_IP not open or does not exist
Jun  1 10:31:36: insert of map into mapdb AVL failed, map + ace pair already exists on the mapdb
Jun  1 10:31:36: CRYPTO_SS(TUNNEL SEC): Active open, socket info: local SRC_IP SRC_IP/255.255.255.255/0, remote HUB01_IP HUB01_IP/255.255.255.255/0,  prot 47, ifc Tu1
Jun  1 10:31:36: IPSEC(recalculate_mtu): reset sadb_root 88243F1C mtu to 1500
Jun  1 10:31:36: IPSEC(sa_request): ,
  (key eng. msg.) OUTBOUND local= SRC_IP:500, remote= HUB01_IP:500,
    local_proxy= SRC_IP/255.255.255.255/47/0,
    remote_proxy= HUB01_IP/255.255.255.255/47/0,
    protocol= ESP, transform= esp-aes 256 esp-md5-hmac  (Transport), 
    lifedur= 3600s and 4608000kb, 
    spi= 0x0(0), conn_id= 0, keysize= 256, flags= 0x0
Jun  1 10:31:36: ISAKMP:(0): SA request profile is (NULL)
Jun  1 10:31:36: ISAKMP: Created a peer struct for HUB01_IP, peer port 500
Jun  1 10:31:36: ISAKMP: New peer created peer = 0x8763F940 peer_handle = 0x80006461
Jun  1 10:31:36: ISAKMP: Locking peer struct 0x8763F940, refcount 1 for isakmp_initiator
Jun  1 10:31:36: ISAKMP: local port 500, remote port 500
Jun  1 10:31:36: ISAKMP: set new node 0 to QM_IDLE      
Jun  1 10:31:36: ISAKMP: Find a dup sa in the avl tree during calling isadb_insert sa = 87A9F57C
Jun  1 10:31:36: ISAKMP:(0):Can not start Aggressive mode, trying Main mode.
Jun  1 10:31:36: ISAKMP:(0):No pre-shared key with HUB01_IP!
Jun  1 10:31:36: ISAKMP:(0): IKE->PKI Get configured TrustPoints state (I) MM_NO_STATE (peer HUB01_IP)
Jun  1 10:31:36: ISAKMP:(0): PKI->IKE Got configured TrustPoints state (I) MM_NO_STATE (peer HUB01_IP)
Jun  1 10:31:36: ISAKMP:(0): constructed NAT-T vendor-rfc3947 ID
Jun  1 10:31:36: ISAKMP:(0): constructed NAT-T vendor-07 ID
Jun  1 10:31:36: ISAKMP:(0): constructed NAT-T vendor-03 ID
Jun  1 10:31:36: ISAKMP:(0): constructed NAT-T vendor-02 ID
Jun  1 10:31:36: ISAKMP:(0):Input = IKE_MESG_FROM_IPSEC, IKE_SA_REQ_MM
Jun  1 10:31:36: ISAKMP:(0):Old State = IKE_READY  New State = IKE_I_MM1 

Jun  1 10:31:36: ISAKMP:(0): beginning Main Mode exchange
Jun  1 10:31:36: ISAKMP:(0): sending packet to HUB01_IP my_port 500 peer_port 500 (I) MM_NO_STATE
Jun  1 10:31:36: ISAKMP:(0):Sending an IKE IPv4 Packet.
Jun  1 10:31:36: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): connection lookup returned 87454954
Jun  1 10:31:36: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): good socket ready message
Jun  1 10:31:36: ISAKMP (0): received packet from HUB01_IP dport 500 sport 500 Global (I) MM_NO_STATE
Jun  1 10:31:36: ISAKMP:(0):Input = IKE_MESG_FROM_PEER, IKE_MM_EXCH
Jun  1 10:31:36: ISAKMP:(0):Old State = IKE_I_MM1  New State = IKE_I_MM2 

Jun  1 10:31:36: ISAKMP:(0): processing SA payload. message ID = 0
Jun  1 10:31:36: ISAKMP:(0): processing vendor id payload
Jun  1 10:31:36: ISAKMP:(0): vendor ID seems Unity/DPD but major 69 mismatch
Jun  1 10:31:36: ISAKMP (0): vendor ID is NAT-T RFC 3947
Jun  1 10:31:36: ISAKMP : Scanning profiles for xauth ...
Jun  1 10:31:36: ISAKMP:(0): IKE->PKI Get configured TrustPoints state (I) MM_NO_STATE (peer HUB01_IP)
Jun  1 10:31:36: ISAKMP:(0): PKI->IKE Got configured TrustPoints state (I) MM_NO_STATE (peer HUB01_IP)
Jun  1 10:31:36: ISAKMP:(0):Checking ISAKMP transform 1 against priority 1 policy
Jun  1 10:31:36: ISAKMP:      encryption AES-CBC
Jun  1 10:31:36: ISAKMP:      keylength of 256
Jun  1 10:31:36: ISAKMP:      hash SHA
Jun  1 10:31:36: ISAKMP:      default group 1
Jun  1 10:31:36: ISAKMP:      auth RSA sig
Jun  1 10:31:36: ISAKMP:      life type in seconds
Jun  1 10:31:36: ISAKMP:      life duration (VPI) of  0x0 0x1 0x51 0x80 
Jun  1 10:31:36: ISAKMP:(0):atts are acceptable. Next payload is 0
Jun  1 10:31:36: ISAKMP:(0):Acceptable atts:actual life: 0
Jun  1 10:31:36: ISAKMP:(0):Acceptable atts:life: 0
Jun  1 10:31:36: ISAKMP:(0):Fill atts in sa vpi_length:4
Jun  1 10:31:36: ISAKMP:(0):Fill atts in sa life_in_seconds:86400
Jun  1 10:31:36: ISAKMP:(0): IKE->PKI Start PKI Session state (I) MM_NO_STATE (peer HUB01_IP)
Jun  1 10:31:36: ISAKMP:(0): PKI->IKE Started PKI Session state (I) MM_NO_STATE (peer HUB01_IP)
Jun  1 10:31:36: ISAKMP:(0):Returning Actual lifetime: 86400
Jun  1 10:31:36: ISAKMP:(0)::Started lifetime timer: 86400.

Jun  1 10:31:36: ISAKMP:(0): processing vendor id payload
Jun  1 10:31:36: ISAKMP:(0): vendor ID seems Unity/DPD but major 69 mismatch
Jun  1 10:31:36: ISAKMP (0): vendor ID is NAT-T RFC 3947
Jun  1 10:31:36: ISAKMP:(0):Input = IKE_MESG_INTERNAL, IKE_PROCESS_MAIN_MODE
Jun  1 10:31:36: ISAKMP:(0):Old State = IKE_I_MM2  New State = IKE_I_MM2 

Jun  1 10:31:36: ISAKMP:(0): IKE->PKI Get configured TrustPoints state (I) MM_SA_SETUP (peer HUB01_IP)
Jun  1 10:31:36: ISAKMP:(0): PKI->IKE Got configured TrustPoints state (I) MM_SA_SETUP (peer HUB01_IP)
Jun  1 10:31:36: ISAKMP:(0): IKE->PKI Get IssuerNames state (I) MM_SA_SETUP (peer HUB01_IP)
SPOKE_0268#
Jun  1 10:31:36: ISAKMP:(0): PKI->IKE Got IssuerNames state (I) MM_SA_SETUP (peer HUB01_IP)
Jun  1 10:31:36: ISAKMP (0): constructing CERT_REQ for issuer cn= DOMAIN,dc=FQ,dc=DN
Jun  1 10:31:36: ISAKMP (0): constructing CERT_REQ for issuer cn=CAServer,dc=DomainName,dc=local
Jun  1 10:31:36: ISAKMP:(0): sending packet to HUB01_IP my_port 500 peer_port 500 (I) MM_SA_SETUP
Jun  1 10:31:36: ISAKMP:(0):Sending an IKE IPv4 Packet.
Jun  1 10:31:36: ISAKMP:(0):Input = IKE_MESG_INTERNAL, IKE_PROCESS_COMPLETE
Jun  1 10:31:36: ISAKMP:(0):Old State = IKE_I_MM2  New State = IKE_I_MM3 

Jun  1 10:31:36: ISAKMP (0): received packet from HUB01_IP dport 500 sport 500 Global (I) MM_SA_SETUP
Jun  1 10:31:36: ISAKMP:(0):Input = IKE_MESG_FROM_PEER, IKE_MM_EXCH
Jun  1 10:31:36: ISAKMP:(0):Old State = IKE_I_MM3  New State = IKE_I_MM4 

Jun  1 10:31:36: ISAKMP:(0): processing KE payload. message ID = 0
Jun  1 10:31:36: ISAKMP:(0): processing NONCE payload. message ID = 0
Jun  1 10:31:36: ISAKMP:(2121): processing CERT_REQ payload. message ID = 0
Jun  1 10:31:36: ISAKMP:(2121): peer wants a CT_X509_SIGNATURE cert
Jun  1 10:31:36: ISAKMP:(2121): peer wants cert issued by cn= DOMAIN,dc=FQ,dc=DN
Jun  1 10:31:36:  Choosing trustpoint hub01.FQDN.com:PORT as issuer
Jun  1 10:31:36: ISAKMP:(2121): processing vendor id payload
Jun  1 10:31:36: ISAKMP:(2121): vendor ID is Unity
Jun  1 10:31:36: ISAKMP:(2121): processing vendor id payload
Jun  1 10:31:36: ISAKMP:(2121): vendor ID is DPD
Jun  1 10:31:36: ISAKMP:(2121): processing vendor id payload
Jun  1 10:31:36: ISAKMP:(2121): speaking to another IOS box!
Jun  1 10:31:36: ISAKMP:received payload type 20
Jun  1 10:31:36: ISAKMP (2121): NAT found, both nodes inside NAT
Jun  1 10:31:36: ISAKMP:received payload type 20
Jun  1 10:31:36: ISAKMP (2121): My hash no match -  this node inside NAT
Jun  1 10:31:36: ISAKMP:(2121):Input = IKE_MESG_INTERNAL, IKE_PROCESS_MAIN_MODE
Jun  1 10:31:36: ISAKMP:(2121):Old State = IKE_I_MM4  New State = IKE_I_MM4 

Jun  1 10:31:36: ISAKMP:(2121):Send initial contact
Jun  1 10:31:36: ISAKMP:(2121): IKE->PKI Get self CertificateChain state (I) MM_KEY_EXCH (peer HUB01_IP)
Jun  1 10:31:36: ISAKMP:(2121): PKI->IKE Got self CertificateChain state (I) MM_KEY_EXCH (peer HUB01_IP)
Jun  1 10:31:36: ISAKMP:(2121): IKE->PKI Get SubjectName state (I) MM_KEY_EXCH (peer HUB01_IP)
Jun  1 10:31:36: ISAKMP:(2121): PKI->IKE Got SubjectName state (I) MM_KEY_EXCH (peer HUB01_IP)
Jun  1 10:31:36: ISAKMP:(2121):My ID configured as IPv4 Addr, but Addr not in Cert!
Jun  1 10:31:36: ISAKMP:(2121):Using FQDN as My ID
Jun  1 10:31:36: ISAKMP:(2121):SA is doing RSA signature authentication using id type ID_FQDN
Jun  1 10:31:36: ISAKMP (2121): ID payload 
	next-payload : 6
	type         : 2 
	FQDN name    : SPOKE.FQDN.XYZ 
	protocol     : 17 
	port         : 0 
	length       : 25
Jun  1 10:31:36: ISAKMP:(2121):Total payload length: 25
Jun  1 10:31:36: ISAKMP:(2121): IKE->PKI Get CertificateChain to be sent to peer state (I) MM_KEY_EXCH (peer HUB01_IP)
Jun  1 10:31:36: ISAKMP:(2121): PKI->IKE Got CertificateChain to be sent to peer state (I) MM_KEY_EXCH (peer HUB01_IP)
Jun  1 10:31:36: ISAKMP (2121): constructing CERT payload for hostname=SPOKE.FQDN.XYZ
Jun  1 10:31:36: ISKAMP: growing send buffer from 1024 to 3072
Jun  1 10:31:36: ISAKMP:(2121): using the hub01.FQDN.com:PORT trustpoint's keypair to sign
Jun  1 10:31:36: ISAKMP:(2121): sending packet to HUB01_IP my_port 4500 peer_port 4500 (I) MM_KEY_EXCH
Jun  1 10:31:36: ISAKMP:(2121):Sending an IKE IPv4 Packet.
Jun  1 10:31:36: ISAKMP:(2121):Input = IKE_MESG_INTERNAL, IKE_PROCESS_COMPLETE
SPOKE_0268#
Jun  1 10:31:36: ISAKMP:(2121):Old State = IKE_I_MM4  New State = IKE_I_MM5 

Jun  1 10:31:36: ISAKMP (2120): received packet from HUB01_IP dport 4500 sport 4500 Global (I) MM_NO_STATE
Jun  1 10:31:36: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): connection lookup returned 87454954
Jun  1 10:31:37: IPSEC(ERROR): crypto_notify_rp Rejected notify RP, elapse time 136 < 1000

Jun  1 10:31:37: IPSEC(ERROR): crypto_notify_rp Rejected notify RP, elapse time 136 < 1000

SPOKE_0268#
Jun  1 10:31:38: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): connection lookup returned 87454954
Jun  1 10:31:38: ISAKMP:(2116):purging SA., sa=87C638F4, delme=87C638F4
SPOKE_0268#
Jun  1 10:31:40: ISAKMP:(2117):purging node 1162453125
SPOKE_0268#
Jun  1 10:31:41: IPSEC(ERROR): crypto_notify_rp Rejected notify RP, elapse time 0 < 1000

Jun  1 10:31:41: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): connection lookup returned 87454954
Jun  1 10:31:41: IPSEC(ERROR): crypto_notify_rp Rejected notify RP, elapse time 28 < 1000

Jun  1 10:31:42: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): connection lookup returned 87454954
Jun  1 10:31:42: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): Found Tunnel1 interface in shared list
Jun  1 10:31:42: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): Removing Tunnel1 interface from shared list
Jun  1 10:31:42: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): Closing socket
Jun  1 10:31:42: CRYPTO_SS(TUNNEL SEC): Closed socket.
Jun  1 10:31:42: CRYPTO_SS(TUNNEL SEC): local SRC_IP SRC_IP/255.255.255.255/0, remote HUB01_IP HUB01_IP/255.255.255.255/0, prot 47, ifc Tu1
Jun  1 10:31:42: ISAKMP:(2121):peer does not do paranoid keepalives.

Jun  1 10:31:42: ISAKMP:(2121):deleting SA reason "P1 delete notify (in)" state (I) MM_KEY_EXCH (peer HUB01_IP)
Jun  1 10:31:42: ISAKMP:(2120):peer does not do paranoid keepalives.

Jun  1 10:31:42: ISAKMP:(2119):peer does not do paranoid keepalives.

Jun  1 10:31:42: ISAKMP:(2118):peer does not do paranoid keepalives.

Jun  1 10:31:42: ISAKMP:(2117):peer does not do paranoid keepalives.

Jun  1 10:31:42: ISAKMP:(2121):deleting SA reason "P1 delete notify (in)" state (I) MM_KEY_EXCH (peer HUB01_IP) 
Jun  1 10:31:42: ISAKMP: Unlocking peer struct 0x8763F940 for isadb_mark_sa_deleted(), count 0
SPOKE_0268#
Jun  1 10:31:42: ISAKMP: Deleting peer node by peer_reap for HUB01_IP: 8763F940
Jun  1 10:31:42: ISAKMP:(2121):deleting node 2143496957 error FALSE reason "IKE deleted"
Jun  1 10:31:42: ISAKMP:(2121): IKE->PKI End PKI Session state (I) MM_NO_STATE (peer HUB01_IP)
Jun  1 10:31:42: ISAKMP:(2121): PKI->IKE Ended PKI Session state (I) MM_NO_STATE (peer HUB01_IP)
Jun  1 10:31:42: ISAKMP:(2121):Input = IKE_MESG_INTERNAL, IKE_PHASE1_DEL
Jun  1 10:31:42: ISAKMP:(2121):Old State = IKE_I_MM5  New State = IKE_DEST_SA 

Jun  1 10:31:42: IPSEC(key_engine): got a queue event with 1 KMI message(s)
SPOKE_0268#
Jun  1 10:31:49: IPSEC-IFC MGRE/Tu1[shared]: crypto_ss_listen_start already listening
Jun  1 10:31:49: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): Opening a socket with profile vpnprof1
Jun  1 10:31:49: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): connection lookup returned 0
Jun  1 10:31:49: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): Triggering tunnel immediately.
Jun  1 10:31:49: IPSEC-IFC MGRE/Tu1[shared]: Adding Tunnel1 tunnel interface to shared list
Jun  1 10:31:49: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): connection lookup returned 87C36B58
Jun  1 10:31:49: IPSEC-IFC MGRE/Tu1[shared]: Socket 87C36B58 for HUB01_IP not open or does not exist
Jun  1 10:31:49: insert of map into mapdb AVL failed, map + ace pair already exists on the mapdb
Jun  1 10:31:49: CRYPTO_SS(TUNNEL SEC): Active open, socket info: local SRC_IP SRC_IP/255.255.255.255/0, remote HUB01_IP HUB01_IP/255.255.255.255/0,  prot 47, ifc Tu1
Jun  1 10:31:49: IPSEC(recalculate_mtu): reset sadb_root 88243F1C mtu to 1500
Jun  1 10:31:49: IPSEC(sa_request): ,
  (key eng. msg.) OUTBOUND local= SRC_IP:500, remote= HUB01_IP:500,
    local_proxy= SRC_IP/255.255.255.255/47/0,
    remote_proxy= HUB01_IP/255.255.255.255/47/0,
    protocol= ESP, transform= esp-aes 256 esp-md5-hmac  (Transport), 
    lifedur= 3600s and 4608000kb, 
    spi= 0x0(0), conn_id= 0, keysize= 256, flags= 0x0
Jun  1 10:31:49: ISAKMP:(0): SA request profile is (NULL)
Jun  1 10:31:49: ISAKMP: Created a peer struct for HUB01_IP, peer port 500
Jun  1 10:31:49: ISAKMP: New peer created peer = 0x8847D7E0 peer_handle = 0x80006463
Jun  1 10:31:49: ISAKMP: Locking peer struct 0x8847D7E0, refcount 1 for isakmp_initiator
Jun  1 10:31:49: ISAKMP: local port 500, remote port 500
Jun  1 10:31:49: ISAKMP: set new node 0 to QM_IDLE      
Jun  1 10:31:49: ISAKMP: Find a dup sa in the avl tree during calling isadb_insert sa = 87C62CC0
Jun  1 10:31:49: ISAKMP:(0):Can not start Aggressive mode, trying Main mode.
Jun  1 10:31:49: ISAKMP:(0):No pre-shared key with HUB01_IP!
Jun  1 10:31:49: ISAKMP:(0): IKE->PKI Get configured TrustPoints state (I) MM_NO_STATE (peer HUB01_IP)
Jun  1 10:31:49: ISAKMP:(0): PKI->IKE Got configured TrustPoints state (I) MM_NO_STATE (peer HUB01_IP)
Jun  1 10:31:49: ISAKMP:(0): constructed NAT-T vendor-rfc3947 ID
Jun  1 10:31:49: ISAKMP:(0): constructed NAT-T vendor-07 ID
Jun  1 10:31:49: ISAKMP:(0): constructed NAT-T vendor-03 ID
Jun  1 10:31:49: ISAKMP:(0): constructed NAT-T vendor-02 ID
Jun  1 10:31:49: ISAKMP:(0):Input = IKE_MESG_FROM_IPSEC, IKE_SA_REQ_MM
Jun  1 10:31:49: ISAKMP:(0):Old State = IKE_READY  New State = IKE_I_MM1 

Jun  1 10:31:49: ISAKMP:(0): beginning Main Mode exchange
Jun  1 10:31:49: ISAKMP:(0): sending packet to HUB01_IP my_port 500 peer_port 500 (I) MM_NO_STATE
Jun  1 10:31:49: ISAKMP:(0):Sending an IKE IPv4 Packet.
Jun  1 10:31:49: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): connection lookup returned 87C36B58
Jun  1 10:31:49: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): good socket ready message
Jun  1 10:31:50: ISAKMP (0): received packet from HUB01_IP dport 500 sport 500 Global (I) MM_NO_STATE
Jun  1 10:31:50: ISAKMP:(0):Input = IKE_MESG_FROM_PEER, IKE_MM_EXCH
Jun  1 10:31:50: ISAKMP:(0):Old State = IKE_I_MM1  New State = IKE_I_MM2 

Jun  1 10:31:50: ISAKMP:(0): processing SA payload. message ID = 0
Jun  1 10:31:50: ISAKMP:(0): processing vendor id payload
Jun  1 10:31:50: ISAKMP:(0): vendor ID seems Unity/DPD but major 69 mismatch
Jun  1 10:31:50: ISAKMP (0): vendor ID is NAT-T RFC 3947
Jun  1 10:31:50: ISAKMP : Scanning profiles for xauth ...
Jun  1 10:31:50: ISAKMP:(0): IKE->PKI Get configured TrustPoints state (I) MM_NO_STATE (peer HUB01_IP)
Jun  1 10:31:50: ISAKMP:(0): PKI->IKE Got configured TrustPoints state (I) MM_NO_STATE (peer HUB01_IP)
Jun  1 10:31:50: ISAKMP:(0):Checking ISAKMP transform 1 against priority 1 policy
Jun  1 10:31:50: ISAKMP:      encryption AES-CBC
Jun  1 10:31:50: ISAKMP:      keylength of 256
Jun  1 10:31:50: ISAKMP:      hash SHA
Jun  1 10:31:50: ISAKMP:      default group 1
Jun  1 10:31:50: ISAKMP:      auth RSA sig
Jun  1 10:31:50: ISAKMP:      life type in seconds
Jun  1 10:31:50: ISAKMP:      life duration (VPI) of  0x0 0x1 0x51 0x80 
Jun  1 10:31:50: ISAKMP:(0):atts are acceptable. Next payload is 0
Jun  1 10:31:50: ISAKMP:(0):Acceptable atts:actual life: 0
Jun  1 10:31:50: ISAKMP:(0):Acceptable atts:life: 0
Jun  1 10:31:50: ISAKMP:(0):Fill atts in sa vpi_length:4
Jun  1 10:31:50: ISAKMP:(0):Fill atts in sa life_in_seconds:86400
Jun  1 10:31:50: ISAKMP:(0): IKE->PKI Start PKI Session state (I) MM_NO_STATE (peer HUB01_IP)
Jun  1 10:31:50: ISAKMP:(0): PKI->IKE Started PKI Session state (I) MM_NO_STATE (peer HUB01_IP)
Jun  1 10:31:50: ISAKMP:(0):Returning Actual lifetime: 86400
Jun  1 10:31:50: ISAKMP:(0)::Started lifetime timer: 86400.

Jun  1 10:31:50: ISAKMP:(0): processing vendor id payload
Jun  1 10:31:50: ISAKMP:(0): vendor ID seems Unity/DPD but major 69 mismatch
Jun  1 10:31:50: ISAKMP (0): vendor ID is NAT-T RFC 3947
Jun  1 10:31:50: ISAKMP:(0):Input = IKE_MESG_INTERNAL, IKE_PROCESS_MAIN_MODE
Jun  1 10:31:50: ISAKMP:(0):Old State = IKE_I_MM2  New State = IKE_I_MM2 

Jun  1 10:31:50: ISAKMP:(0): IKE->PKI Get configured TrustPoints state (I) MM_SA_SETUP (peer HUB01_IP)
Jun  1 10:31:50: ISAKMP:(0): PKI->IKE Got configured TrustPoints state (I) MM_SA_SETUP (peer HUB01_IP)
Jun  1 10:31:50: ISAKMP:(0): IKE->PKI Get IssuerNames state (I) MM_SA_SETUP (peer HUB01_IP)
Jun  1 10:31:50: ISAKMP:(0): PKI->IKE Got IssuerNames state (I) MM_SA_SETUP (peer HUB01_IP)
Jun  1 10:31:50: ISAKMP (0): constructing CERT_REQ for issuer cn= DOMAIN,dc=FQ,dc=DN
Jun  1 10:31:50: ISAKMP (0): constructing CERT_REQ for issuer cn=CAServer,dc=DomainName,dc=local
Jun  1 10:31:50: ISAKMP:(0): sending packet to HUB01_IP my_port 500 peer_port 500 (I) MM_SA_SETUP
Jun  1 10:31:50: ISAKMP:(0):Sending an IKE IPv4 Packet.
Jun  1 10:31:50: ISAKMP:(0):Input = IKE_MESG_INTERNAL, IKE_PROCESS_COMPLETE
Jun  1 10:31:50: ISAKMP:(0):Old State = IKE_I_MM2  New State = IKE_I_MM3 

Jun  1 10:31:50: ISAKMP (0): received packet from HUB01_IP dport 500 sport 500 Global (I) MM_SA_SETUP
Jun  1 10:31:50: ISAKMP:(0):Input = IKE_MESG_FROM_PEER, IKE_MM_EXCH
Jun  1 10:31:50: ISAKMP:(0):Old State = IKE_I_MM3  New State = IKE_I_MM4 

Jun  1 10:31:50: ISAKMP:(0): processing KE payload. message ID = 0
Jun  1 10:31:50: ISAKMP:(0): processing NONCE payload. message ID = 0
Jun  1 10:31:50: ISAKMP:(2122): processing CERT_REQ payload. message ID = 0
Jun  1 10:31:50: ISAKMP:(2122): peer wants a CT_X509_SIGNATURE cert
Jun  1 10:31:50: ISAKMP:(2122): peer wants cert issued by cn= DOMAIN,dc=FQ,dc=DN
Jun  1 10:31:50:  Choosing trustpoint hub01.FQDN.com:PORT as issuer
Jun  1 10:31:50: ISAKMP:(2122): processing vendor id payload
Jun  1 10:31:50: ISAKMP:(2122): vendor ID is Unity
Jun  1 10:31:50: ISAKMP:(2122): processing vendor id payload
Jun  1 10:31:50: ISAKMP:(2122): vendor ID is DPD
Jun  1 10:31:50: ISAKMP:(2122): processing vendor id payload
Jun  1 10:31:50: ISAKMP:(2122): speaking to another IOS box!
Jun  1 10:31:50: ISAKMP:received payload type 20
Jun  1 10:31:50: ISAKMP (2122): NAT found, both nodes inside NAT
Jun  1 10:31:50: ISAKMP:received payload type 20
Jun  1 10:31:50: ISAKMP (2122): My hash no match -  this node inside NAT
Jun  1 10:31:50: ISAKMP:(2122):Input = IKE_MESG_INTERNAL, IKE_PROCESS_MAIN_MODE
Jun  1 10:31:50: ISAKMP:(2122):Old State = IKE_I_MM4  New State = IKE_I_MM4 

Jun  1 10:31:50: ISAKMP:(2122):Send initial contact
Jun  1 10:31:50: ISAKMP:(2122): IKE->PKI Get self CertificateChain state (I) MM_KEY_EXCH (peer HUB01_IP)
Jun  1 10:31:50: ISAKMP:(2122): PKI->IKE Got self CertificateChain state (I) MM_KEY_EXCH (peer HUB01_IP)
Jun  1 10:31:50: ISAKMP:(2122): IKE->PKI Get SubjectName state (I) MM_KEY_EXCH (peer HUB01_IP)
Jun  1 10:31:50: ISAKMP:(2122): PKI->IKE Got SubjectName state (I) MM_KEY_EXCH (peer HUB01_IP)
Jun  1 10:31:50: ISAKMP:(2122):My ID configured as IPv4 Addr, but Addr not in Cert!
Jun  1 10:31:50: ISAKMP:(2122):Using FQDN as My ID
Jun  1 10:31:50: ISAKMP:(2122):SA is doing RSA signature authentication using id type ID_FQDN
Jun  1 10:31:50: ISAKMP (2122): ID payload 
	next-payload : 6
	type         : 2 
	FQDN name    : SPOKE.FQDN.XYZ 
	protocol     : 17 
	port         : 0 
	length       : 25
Jun  1 10:31:50: ISAKMP:(2122):Total payload length: 25
Jun  1 10:31:50: ISAKMP:(2122): IKE->PKI Get CertificateChain to be sent to peer state (I) MM_KEY_EXCH (peer HUB01_IP)
Jun  1 10:31:50: ISAKMP:(2122): PKI->IKE Got CertificateChain to be sent to peer state (I) MM_KEY_EXCH (peer HUB01_IP)
Jun  1 10:31:50: ISAKMP (2122): constructing CERT payload for hostname=SPOKE.FQDN.XYZ
Jun  1 10:31:50: ISKAMP: growing send buffer from 1024 to 3072
Jun  1 10:31:50: ISAKMP:(2122): using the hub01.FQDN.com:PORT trustpoint's keypair to sign
Jun  1 10:31:50: ISAKMP:(2122): sending packet to HUB01_IP my_port 4500 peer_port 4500 (I) MM_KEY_EXCH
Jun  1 10:31:50: ISAKMP:(2122):Sending an IKE IPv4 Packet.
Jun  1 10:31:50: ISAKMP:(2122):Input = IKE_MESG_INTERNAL, IKE_PROCESS_COMPLETE
SPOKE_0268#
Jun  1 10:31:50: ISAKMP:(2122):Old State = IKE_I_MM4  New State = IKE_I_MM5 

Jun  1 10:31:50: ISAKMP (2121): received packet from HUB01_IP dport 4500 sport 4500 Global (I) MM_NO_STATE
Jun  1 10:31:50: ISAKMP:(2117):purging SA., sa=87BF1428, delme=87BF1428
Jun  1 10:31:50: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): connection lookup returned 87C36B58
Jun  1 10:31:51: IPSEC(ERROR): crypto_notify_rp Rejected notify RP, elapse time 480 < 1000

Jun  1 10:31:51: IPSEC(ERROR): crypto_notify_rp Rejected notify RP, elapse time 480 < 1000

SPOKE_0268#
Jun  1 10:31:52: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): connection lookup returned 87C36B58
SPOKE_0268#
Jun  1 10:31:54: IPSEC(ERROR): crypto_notify_rp Rejected notify RP, elapse time 0 < 1000

Jun  1 10:31:54: ISAKMP:(2118):purging node 1996799020
SPOKE_0268#
Jun  1 10:31:55: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): connection lookup returned 87C36B58
Jun  1 10:31:55: IPSEC(ERROR): crypto_notify_rp Rejected notify RP, elapse time 324 < 1000

Jun  1 10:31:55: IPSEC(ERROR): crypto_notify_rp Rejected notify RP, elapse time 324 < 1000

Jun  1 10:31:56: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): connection lookup returned 87C36B58
Jun  1 10:31:56: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): Found Tunnel1 interface in shared list
Jun  1 10:31:56: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): Removing Tunnel1 interface from shared list
Jun  1 10:31:56: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): Closing socket
Jun  1 10:31:56: CRYPTO_SS(TUNNEL SEC): Closed socket.
Jun  1 10:31:56: CRYPTO_SS(TUNNEL SEC): local SRC_IP SRC_IP/255.255.255.255/0, remote HUB01_IP HUB01_IP/255.255.255.255/0, prot 47, ifc Tu1
Jun  1 10:31:56: ISAKMP:(2122):peer does not do paranoid keepalives.

Jun  1 10:31:56: ISAKMP:(2122):deleting SA reason "P1 delete notify (in)" state (I) MM_KEY_EXCH (peer HUB01_IP)
Jun  1 10:31:56: ISAKMP:(2121):peer does not do paranoid keepalives.

Jun  1 10:31:56: ISAKMP:(2120):peer does not do paranoid keepalives.

Jun  1 10:31:56: ISAKMP:(2119):peer does not do paranoid keepalives.

Jun  1 10:31:56: ISAKMP:(2118):peer does not do paranoid keepalives.

Jun  1 10:31:56: ISAKMP:(2122):deleting SA reason "P1 delete notify (in)" state (I) MM_KEY_EXCH (peer HUB01_IP) 
Jun  1 10:31:56: ISAKMP: Unlocking peer struct 0x8847D7E0 for isadb_mark_sa_deleted(), count 0
Jun  1 10:31:56: ISAKMP: Deleting peer node by peer_reap for HUB01_IP: 8847D7E0
Jun  1 10:31:56: ISAKMP:(2122):deleting node -926115534 error FALSE reason "IKE deleted"
Jun  1 10:31:56: ISAKMP:(2122): IKE->PKI End PKI Session state (I) MM_NO_STATE (peer HUB01_IP)
Jun  1 10:31:56: ISAKMP:(2122): PKI->IKE Ended PKI Session state (I) MM_NO_STATE (peer HUB01_IP)
Jun  1 10:31:56: ISAKMP:(2122):Input = IKE_MESG_INTERNAL, IKE_PHASE1_DEL
Jun  1 10:31:56: ISAKMP:(2122):Old State = IKE_I_MM5  New State = IKE_DEST_SA 

Jun  1 10:31:56: IPSEC(key_engine): got a queue event with 1 KMI message(s)
SPOKE_0268#
Jun  1 10:32:02: IPSEC-IFC MGRE/Tu1[shared]: crypto_ss_listen_start already listening
Jun  1 10:32:02: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): Opening a socket with profile vpnprof1
Jun  1 10:32:02: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): connection lookup returned 0
Jun  1 10:32:02: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): Triggering tunnel immediately.
Jun  1 10:32:02: IPSEC-IFC MGRE/Tu1[shared]: Adding Tunnel1 tunnel interface to shared list
Jun  1 10:32:02: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): connection lookup returned 87454954
Jun  1 10:32:02: IPSEC-IFC MGRE/Tu1[shared]: Socket 87454954 for HUB01_IP not open or does not exist
Jun  1 10:32:02: insert of map into mapdb AVL failed, map + ace pair already exists on the mapdb
Jun  1 10:32:02: CRYPTO_SS(TUNNEL SEC): Active open, socket info: local SRC_IP SRC_IP/255.255.255.255/0, remote HUB01_IP HUB01_IP/255.255.255.255/0,  prot 47, ifc Tu1
Jun  1 10:32:02: IPSEC(recalculate_mtu): reset sadb_root 88243F1C mtu to 1500
Jun  1 10:32:02: IPSEC(sa_request): ,
  (key eng. msg.) OUTBOUND local= SRC_IP:500, remote= HUB01_IP:500,
    local_proxy= SRC_IP/255.255.255.255/47/0,
    remote_proxy= HUB01_IP/255.255.255.255/47/0,
    protocol= ESP, transform= esp-aes 256 esp-md5-hmac  (Transport), 
    lifedur= 3600s and 4608000kb, 
    spi= 0x0(0), conn_id= 0, keysize= 256, flags= 0x0
Jun  1 10:32:02: ISAKMP:(0): SA request profile is (NULL)
Jun  1 10:32:02: ISAKMP: Created a peer struct for HUB01_IP, peer port 500
Jun  1 10:32:02: ISAKMP: New peer created peer = 0x87BD69F8 peer_handle = 0x80006465
Jun  1 10:32:02: ISAKMP: Locking peer struct 0x87BD69F8, refcount 1 for isakmp_initiator
Jun  1 10:32:02: ISAKMP: local port 500, remote port 500
Jun  1 10:32:02: ISAKMP: set new node 0 to QM_IDLE      
Jun  1 10:32:02: ISAKMP: Find a dup sa in the avl tree during calling isadb_insert sa = 877C00A8
Jun  1 10:32:02: ISAKMP:(0):Can not start Aggressive mode, trying Main mode.
Jun  1 10:32:02: ISAKMP:(0):No pre-shared key with HUB01_IP!
Jun  1 10:32:02: ISAKMP:(0): IKE->PKI Get configured TrustPoints state (I) MM_NO_STATE (peer HUB01_IP)
Jun  1 10:32:02: ISAKMP:(0): PKI->IKE Got configured TrustPoints state (I) MM_NO_STATE (peer HUB01_IP)
Jun  1 10:32:02: ISAKMP:(0): constructed NAT-T vendor-rfc3947 ID
Jun  1 10:32:02: ISAKMP:(0): constructed NAT-T vendor-07 ID
Jun  1 10:32:02: ISAKMP:(0): constructed NAT-T vendor-03 ID
Jun  1 10:32:02: ISAKMP:(0): constructed NAT-T vendor-02 ID
Jun  1 10:32:02: ISAKMP:(0):Input = IKE_MESG_FROM_IPSEC, IKE_SA_REQ_MM
Jun  1 10:32:02: ISAKMP:(0):Old State = IKE_READY  New State = IKE_I_MM1 

Jun  1 10:32:02: ISAKMP:(0): beginning Main Mode exchange
Jun  1 10:32:02: ISAKMP:(0): sending packet to HUB01_IP my_port 500 peer_port 500 (I) MM_NO_STATE
Jun  1 10:32:02: ISAKMP:(0):Sending an IKE IPv4 Packet.
Jun  1 10:32:02: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): connection lookup returned 87454954
Jun  1 10:32:02: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): good socket ready message
Jun  1 10:32:02: ISAKMP (0): received packet from HUB01_IP dport 500 sport 500 Global (I) MM_NO_STATE
Jun  1 10:32:02: ISAKMP:(0):Input = IKE_MESG_FROM_PEER, IKE_MM_EXCH
Jun  1 10:32:02: ISAKMP:(0):Old State = IKE_I_MM1  New State = IKE_I_MM2 

Jun  1 10:32:02: ISAKMP:(0): processing SA payload. message ID = 0
Jun  1 10:32:02: ISAKMP:(0): processing vendor id payload
Jun  1 10:32:02: ISAKMP:(0): vendor ID seems Unity/DPD but major 69 mismatch
Jun  1 10:32:02: ISAKMP (0): vendor ID is NAT-T RFC 3947
Jun  1 10:32:02: ISAKMP : Scanning profiles for xauth ...
Jun  1 10:32:02: ISAKMP:(0): IKE->PKI Get configured TrustPoints state (I) MM_NO_STATE (peer HUB01_IP)
Jun  1 10:32:02: ISAKMP:(0): PKI->IKE Got configured TrustPoints state (I) MM_NO_STATE (peer HUB01_IP)
Jun  1 10:32:02: ISAKMP:(0):Checking ISAKMP transform 1 against priority 1 policy
Jun  1 10:32:02: ISAKMP:      encryption AES-CBC
Jun  1 10:32:02: ISAKMP:      keylength of 256
Jun  1 10:32:02: ISAKMP:      hash SHA
Jun  1 10:32:02: ISAKMP:      default group 1
Jun  1 10:32:02: ISAKMP:      auth RSA sig
Jun  1 10:32:02: ISAKMP:      life type in seconds
Jun  1 10:32:02: ISAKMP:      life duration (VPI) of  0x0 0x1 0x51 0x80 
Jun  1 10:32:02: ISAKMP:(0):atts are acceptable. Next payload is 0
Jun  1 10:32:02: ISAKMP:(0):Acceptable atts:actual life: 0
Jun  1 10:32:02: ISAKMP:(0):Acceptable atts:life: 0
Jun  1 10:32:02: ISAKMP:(0):Fill atts in sa vpi_length:4
Jun  1 10:32:02: ISAKMP:(0):Fill atts in sa life_in_seconds:86400
Jun  1 10:32:02: ISAKMP:(0): IKE->PKI Start PKI Session state (I) MM_NO_STATE (peer HUB01_IP)
Jun  1 10:32:02: ISAKMP:(0): PKI->IKE Started PKI Session state (I) MM_NO_STATE (peer HUB01_IP)
Jun  1 10:32:02: ISAKMP:(0):Returning Actual lifetime: 86400
Jun  1 10:32:02: ISAKMP:(0)::Started lifetime timer: 86400.

Jun  1 10:32:02: ISAKMP:(0): processing vendor id payload
Jun  1 10:32:02: ISAKMP:(0): vendor ID seems Unity/DPD but major 69 mismatch
Jun  1 10:32:02: ISAKMP (0): vendor ID is NAT-T RFC 3947
Jun  1 10:32:02: ISAKMP:(0):Input = IKE_MESG_INTERNAL, IKE_PROCESS_MAIN_MODE
Jun  1 10:32:02: ISAKMP:(0):Old State = IKE_I_MM2  New State = IKE_I_MM2 

Jun  1 10:32:02: ISAKMP:(0): IKE->PKI Get configured TrustPoints state (I) MM_SA_SETUP (peer HUB01_IP)
Jun  1 10:32:02: ISAKMP:(0): PKI->IKE Got configured TrustPoints state (I) MM_SA_SETUP (peer HUB01_IP)
Jun  1 10:32:02: ISAKMP:(0): IKE->PKI Get IssuerNames state (I) MM_SA_SETUP (peer HUB01_IP)
Jun  1 10:32:02: ISAKMP:(0): PKI->IKE Got IssuerNames state (I) MM_SA_SETUP (peer HUB01_IP)
Jun  1 10:32:02: ISAKMP (0): constructing CERT_REQ for issuer cn= DOMAIN,dc=FQ,dc=DN
Jun  1 10:32:02: ISAKMP (0): constructing CERT_REQ for issuer cn=CAServer,dc=DomainName,dc=local
Jun  1 10:32:02: ISAKMP:(0): sending packet to HUB01_IP my_port 500 peer_port 500 (I) MM_SA_SETUP
Jun  1 10:32:02: ISAKMP:(0):Sending an IKE IPv4 Packet.
Jun  1 10:32:02: ISAKMP:(0):Input = IKE_MESG_INTERNAL, IKE_PROCESS_COMPLETE
Jun  1 10:32:02: ISAKMP:(0):Old State = IKE_I_MM2  New State = IKE_I_MM3 

Jun  1 10:32:02: ISAKMP (0): received packet from HUB01_IP dport 500 sport 500 Global (I) MM_SA_SETUP
Jun  1 10:32:02: ISAKMP:(0):Input = IKE_MESG_FROM_PEER, IKE_MM_EXCH
Jun  1 10:32:02: ISAKMP:(0):Old State = IKE_I_MM3  New State = IKE_I_MM4 

Jun  1 10:32:02: ISAKMP:(0): processing KE payload. message ID = 0
Jun  1 10:32:02: ISAKMP:(0): processing NONCE payload. message ID = 0
Jun  1 10:32:02: ISAKMP:(2123): processing CERT_REQ payload. message ID = 0
Jun  1 10:32:02: ISAKMP:(2123): peer wants a CT_X509_SIGNATURE cert
Jun  1 10:32:02: ISAKMP:(2123): peer wants cert issued by cn= DOMAIN,dc=FQ,dc=DN
Jun  1 10:32:02:  Choosing trustpoint hub01.FQDN.com:PORT as issuer
Jun  1 10:32:02: ISAKMP:(2123): processing vendor id payload
Jun  1 10:32:02: ISAKMP:(2123): vendor ID is Unity
Jun  1 10:32:02: ISAKMP:(2123): processing vendor id payload
Jun  1 10:32:02: ISAKMP:(2123): vendor ID is DPD
Jun  1 10:32:02: ISAKMP:(2123): processing vendor id payload
Jun  1 10:32:02: ISAKMP:(2123): speaking to another IOS box!
Jun  1 10:32:02: ISAKMP:received payload type 20
Jun  1 10:32:02: ISAKMP (2123): NAT found, both nodes inside NAT
Jun  1 10:32:02: ISAKMP:received payload type 20
Jun  1 10:32:02: ISAKMP (2123): My hash no match -  this node inside NAT
Jun  1 10:32:02: ISAKMP:(2123):Input = IKE_MESG_INTERNAL, IKE_PROCESS_MAIN_MODE
Jun  1 10:32:02: ISAKMP:(2123):Old State = IKE_I_MM4  New State = IKE_I_MM4 

Jun  1 10:32:02: ISAKMP:(2123):Send initial contact
Jun  1 10:32:02: ISAKMP:(2123): IKE->PKI Get self CertificateChain state (I) MM_KEY_EXCH (peer HUB01_IP)
Jun  1 10:32:02: ISAKMP:(2123): PKI->IKE Got self CertificateChain state (I) MM_KEY_EXCH (peer HUB01_IP)
Jun  1 10:32:02: ISAKMP:(2123): IKE->PKI Get SubjectName state (I) MM_KEY_EXCH (peer HUB01_IP)
Jun  1 10:32:02: ISAKMP:(2123): PKI->IKE Got SubjectName state (I) MM_KEY_EXCH (peer HUB01_IP)
Jun  1 10:32:02: ISAKMP:(2123):My ID configured as IPv4 Addr, but Addr not in Cert!
Jun  1 10:32:02: ISAKMP:(2123):Using FQDN as My ID
Jun  1 10:32:02: ISAKMP:(2123):SA is doing RSA signature authentication using id type ID_FQDN
Jun  1 10:32:02: ISAKMP (2123): ID payload 
	next-payload : 6
	type         : 2 
	FQDN name    : SPOKE.FQDN.XYZ 
	protocol     : 17 
	port         : 0 
	length       : 25
Jun  1 10:32:02: ISAKMP:(2123):Total payload length: 25
Jun  1 10:32:02: ISAKMP:(2123): IKE->PKI Get CertificateChain to be sent to peer state (I) MM_KEY_EXCH (peer HUB01_IP)
Jun  1 10:32:02: ISAKMP:(2123): PKI->IKE Got CertificateChain to be sent to peer state (I) MM_KEY_EXCH (peer HUB01_IP)
Jun  1 10:32:02: ISAKMP (2123): constructing CERT payload for hostname=SPOKE.FQDN.XYZ
Jun  1 10:32:02: ISKAMP: growing send buffer from 1024 to 3072
Jun  1 10:32:02: ISAKMP:(2123): using the hub01.FQDN.com:PORT trustpoint's keypair to sign
Jun  1 10:32:02: ISAKMP:(2123): sending packet to HUB01_IP my_port 4500 peer_port 4500 (I) MM_KEY_EXCH
Jun  1 10:32:02: ISAKMP:(2123):Sending an IKE IPv4 Packet.
Jun  1 10:32:02: ISAKMP:(2123):Input = IKE_MESG_INTERNAL, IKE_PROCESS_COMPLETE
SPOKE_0268#
Jun  1 10:32:02: ISAKMP:(2123):Old State = IKE_I_MM4  New State = IKE_I_MM5 

Jun  1 10:32:02: ISAKMP (2122): received packet from HUB01_IP dport 4500 sport 4500 Global (I) MM_NO_STATE
Jun  1 10:32:03: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): connection lookup returned 87454954
SPOKE_0268#
Jun  1 10:32:04: IPSEC(ERROR): crypto_notify_rp Rejected notify RP, elapse time 696 < 1000

Jun  1 10:32:04: IPSEC(ERROR): crypto_notify_rp Rejected notify RP, elapse time 696 < 1000

Jun  1 10:32:04: ISAKMP:(2118):purging SA., sa=87BF0498, delme=87BF0498
SPOKE_0268#
Jun  1 10:32:05: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): connection lookup returned 87454954
Jun  1 10:32:05: IPSEC(ERROR): crypto_notify_rp Rejected notify RP, elapse time 32 < 1000

Jun  1 10:32:05: IPSEC(ERROR): crypto_notify_rp Rejected notify RP, elapse time 32 < 1000

SPOKE_0268#
Jun  1 10:32:07: ISAKMP:(2119):purging node 347174396
SPOKE_0268#
Jun  1 10:32:09: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): connection lookup returned 87454954
Jun  1 10:32:10: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): connection lookup returned 87454954
Jun  1 10:32:10: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): Found Tunnel1 interface in shared list
Jun  1 10:32:10: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): Removing Tunnel1 interface from shared list
Jun  1 10:32:10: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): Closing socket
Jun  1 10:32:10: CRYPTO_SS(TUNNEL SEC): Closed socket.
Jun  1 10:32:10: CRYPTO_SS(TUNNEL SEC): local SRC_IP SRC_IP/255.255.255.255/0, remote HUB01_IP HUB01_IP/255.255.255.255/0, prot 47, ifc Tu1
Jun  1 10:32:10: ISAKMP:(2123):peer does not do paranoid keepalives.

Jun  1 10:32:10: ISAKMP:(2123):deleting SA reason "P1 delete notify (in)" state (I) MM_KEY_EXCH (peer HUB01_IP)
Jun  1 10:32:10: ISAKMP:(2122):peer does not do paranoid keepalives.

Jun  1 10:32:10: ISAKMP:(2121):peer does not do paranoid keepalives.

Jun  1 10:32:10: ISAKMP:(2120):peer does not do paranoid keepalives.

Jun  1 10:32:10: ISAKMP:(2119):peer does not do paranoid keepalives.

Jun  1 10:32:10: ISAKMP:(2123):deleting SA reason "P1 delete notify (in)" state (I) MM_KEY_EXCH (peer HUB01_IP) 
Jun  1 10:32:10: ISAKMP: Unlocking peer struct 0x87BD69F8 for isadb_mark_sa_deleted(), count 0
Jun  1 10:32:10: ISAKMP: Deleting peer node by peer_reap for HUB01_IP: 87BD69F8
Jun  1 10:32:10: ISAKMP:(2123):deleting node 216143393 error FALSE reason "IKE deleted"
Jun  1 10:32:10: ISAKMP:(2123): IKE->PKI End PKI Session state (I) MM_NO_STATE (peer HUB01_IP)
Jun  1 10:32:10: ISAKMP:(2123): PKI->IKE Ended PKI Session state (I) MM_NO_STATE (peer HUB01_IP)
Jun  1 10:32:10: ISAKMP:(2123):Input = IKE_MESG_INTERNAL, IKE_PHASE1_DEL
Jun  1 10:32:10: ISAKMP:(2123):Old State = IKE_I_MM5  New State = IKE_DEST_SA 

Jun  1 10:32:10: IPSEC(key_engine): got a queue event with 1 KMI message(s)
SPOKE_0268#
Jun  1 10:32:16: IPSEC-IFC MGRE/Tu1[shared]: crypto_ss_listen_start already listening
Jun  1 10:32:16: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): Opening a socket with profile vpnprof1
Jun  1 10:32:16: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): connection lookup returned 0
Jun  1 10:32:16: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): Triggering tunnel immediately.
Jun  1 10:32:16: IPSEC-IFC MGRE/Tu1[shared]: Adding Tunnel1 tunnel interface to shared list
Jun  1 10:32:16: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): connection lookup returned 87C36B58
Jun  1 10:32:16: IPSEC-IFC MGRE/Tu1[shared]: Socket 87C36B58 for HUB01_IP not open or does not exist
Jun  1 10:32:16: insert of map into mapdb AVL failed, map + ace pair already exists on the mapdb
Jun  1 10:32:16: CRYPTO_SS(TUNNEL SEC): Active open, socket info: local SRC_IP SRC_IP/255.255.255.255/0, remote HUB01_IP HUB01_IP/255.255.255.255/0,  prot 47, ifc Tu1
Jun  1 10:32:16: IPSEC(recalculate_mtu): reset sadb_root 88243F1C mtu to 1500
Jun  1 10:32:16: IPSEC(sa_request): ,
  (key eng. msg.) OUTBOUND local= SRC_IP:500, remote= HUB01_IP:500,
    local_proxy= SRC_IP/255.255.255.255/47/0,
    remote_proxy= HUB01_IP/255.255.255.255/47/0,
    protocol= ESP, transform= esp-aes 256 esp-md5-hmac  (Transport), 
    lifedur= 3600s and 4608000kb, 
    spi= 0x0(0), conn_id= 0, keysize= 256, flags= 0x0
Jun  1 10:32:16: ISAKMP:(0): SA request profile is (NULL)
Jun  1 10:32:16: ISAKMP: Created a peer struct for HUB01_IP, peer port 500
Jun  1 10:32:16: ISAKMP: New peer created peer = 0x87873894 peer_handle = 0x80006467
Jun  1 10:32:16: ISAKMP: Locking peer struct 0x87873894, refcount 1 for isakmp_initiator
Jun  1 10:32:16: ISAKMP: local port 500, remote port 500
Jun  1 10:32:16: ISAKMP: set new node 0 to QM_IDLE      
Jun  1 10:32:16: ISAKMP: Find a dup sa in the avl tree during calling isadb_insert sa = 87D82C70
Jun  1 10:32:16: ISAKMP:(0):Can not start Aggressive mode, trying Main mode.
Jun  1 10:32:16: ISAKMP:(0):No pre-shared key with HUB01_IP!
Jun  1 10:32:16: ISAKMP:(0): IKE->PKI Get configured TrustPoints state (I) MM_NO_STATE (peer HUB01_IP)
Jun  1 10:32:16: ISAKMP:(0): PKI->IKE Got configured TrustPoints state (I) MM_NO_STATE (peer HUB01_IP)
Jun  1 10:32:16: ISAKMP:(0): constructed NAT-T vendor-rfc3947 ID
Jun  1 10:32:16: ISAKMP:(0): constructed NAT-T vendor-07 ID
Jun  1 10:32:16: ISAKMP:(0): constructed NAT-T vendor-03 ID
Jun  1 10:32:16: ISAKMP:(0): constructed NAT-T vendor-02 ID
Jun  1 10:32:16: ISAKMP:(0):Input = IKE_MESG_FROM_IPSEC, IKE_SA_REQ_MM
Jun  1 10:32:16: ISAKMP:(0):Old State = IKE_READY  New State = IKE_I_MM1 

Jun  1 10:32:16: ISAKMP:(0): beginning Main Mode exchange
Jun  1 10:32:16: ISAKMP:(0): sending packet to HUB01_IP my_port 500 peer_port 500 (I) MM_NO_STATE
Jun  1 10:32:16: ISAKMP:(0):Sending an IKE IPv4 Packet.
Jun  1 10:32:16: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): connection lookup returned 87C36B58
SPOKE_0268#
Jun  1 10:32:16: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): good socket ready message
Jun  1 10:32:16: ISAKMP (0): received packet from HUB01_IP dport 500 sport 500 Global (I) MM_NO_STATE
Jun  1 10:32:16: ISAKMP:(0):Input = IKE_MESG_FROM_PEER, IKE_MM_EXCH
Jun  1 10:32:16: ISAKMP:(0):Old State = IKE_I_MM1  New State = IKE_I_MM2 

Jun  1 10:32:16: ISAKMP:(0): processing SA payload. message ID = 0
Jun  1 10:32:16: ISAKMP:(0): processing vendor id payload
Jun  1 10:32:16: ISAKMP:(0): vendor ID seems Unity/DPD but major 69 mismatch
Jun  1 10:32:16: ISAKMP (0): vendor ID is NAT-T RFC 3947
Jun  1 10:32:16: ISAKMP : Scanning profiles for xauth ...
Jun  1 10:32:16: ISAKMP:(0): IKE->PKI Get configured TrustPoints state (I) MM_NO_STATE (peer HUB01_IP)
Jun  1 10:32:16: ISAKMP:(0): PKI->IKE Got configured TrustPoints state (I) MM_NO_STATE (peer HUB01_IP)
Jun  1 10:32:16: ISAKMP:(0):Checking ISAKMP transform 1 against priority 1 policy
Jun  1 10:32:16: ISAKMP:      encryption AES-CBC
Jun  1 10:32:16: ISAKMP:      keylength of 256
Jun  1 10:32:16: ISAKMP:      hash SHA
Jun  1 10:32:16: ISAKMP:      default group 1
Jun  1 10:32:16: ISAKMP:      auth RSA sig
Jun  1 10:32:16: ISAKMP:      life type in seconds
Jun  1 10:32:16: ISAKMP:      life duration (VPI) of  0x0 0x1 0x51 0x80 
Jun  1 10:32:16: ISAKMP:(0):atts are acceptable. Next payload is 0
Jun  1 10:32:16: ISAKMP:(0):Acceptable atts:actual life: 0
Jun  1 10:32:16: ISAKMP:(0):Acceptable atts:life: 0
Jun  1 10:32:16: ISAKMP:(0):Fill atts in sa vpi_length:4
Jun  1 10:32:16: ISAKMP:(0):Fill atts in sa life_in_seconds:86400
Jun  1 10:32:16: ISAKMP:(0): IKE->PKI Start PKI Session state (I) MM_NO_STATE (peer HUB01_IP)
Jun  1 10:32:16: ISAKMP:(0): PKI->IKE Started PKI Session state (I) MM_NO_STATE (peer HUB01_IP)
Jun  1 10:32:16: ISAKMP:(0):Returning Actual lifetime: 86400
Jun  1 10:32:16: ISAKMP:(0)::Started lifetime timer: 86400.

Jun  1 10:32:16: ISAKMP:(0): processing vendor id payload
Jun  1 10:32:16: ISAKMP:(0): vendor ID seems Unity/DPD but major 69 mismatch
Jun  1 10:32:16: ISAKMP (0): vendor ID is NAT-T RFC 3947
Jun  1 10:32:16: ISAKMP:(0):Input = IKE_MESG_INTERNAL, IKE_PROCESS_MAIN_MODE
Jun  1 10:32:16: ISAKMP:(0):Old State = IKE_I_MM2  New State = IKE_I_MM2 

Jun  1 10:32:16: ISAKMP:(0): IKE->PKI Get configured TrustPoints state (I) MM_SA_SETUP (peer HUB01_IP)
Jun  1 10:32:16: ISAKMP:(0): PKI->IKE Got configured TrustPoints state (I) MM_SA_SETUP (peer HUB01_IP)
Jun  1 10:32:16: ISAKMP:(0): IKE->PKI Get IssuerNames state (I) MM_SA_SETUP (peer HUB01_IP)
Jun  1 10:32:16: ISAKMP:(0): PKI->IKE Got IssuerNames state (I) MM_SA_SETUP (peer HUB01_IP)
Jun  1 10:32:16: ISAKMP (0): constructing CERT_REQ for issuer cn= DOMAIN,dc=FQ,dc=DN
Jun  1 10:32:16: ISAKMP (0): constructing CERT_REQ for issuer cn=CAServer,dc=DomainName,dc=local
Jun  1 10:32:16: ISAKMP:(0): sending packet to HUB01_IP my_port 500 peer_port 500 (I) MM_SA_SETUP
Jun  1 10:32:16: ISAKMP:(0):Sending an IKE IPv4 Packet.
Jun  1 10:32:16: ISAKMP:(0):Input = IKE_MESG_INTERNAL, IKE_PROCESS_COMPLETE
Jun  1 10:32:16: ISAKMP:(0):Old State = IKE_I_MM2  New State = IKE_I_MM3 

Jun  1 10:32:16: ISAKMP (0): received packet from HUB01_IP dport 500 sport 500 Global (I) MM_SA_SETUP
Jun  1 10:32:16: ISAKMP:(0):Input = IKE_MESG_FROM_PEER, IKE_MM_EXCH
Jun  1 10:32:16: ISAKMP:(0):Old State = IKE_I_MM3  New State = IKE_I_MM4 

Jun  1 10:32:16: ISAKMP:(0): processing KE payload. message ID = 0
Jun  1 10:32:16: ISAKMP:(0): processing NONCE payload. message ID = 0
Jun  1 10:32:16: ISAKMP:(2124): processing CERT_REQ payload. message ID = 0
Jun  1 10:32:16: ISAKMP:(2124): peer wants a CT_X509_SIGNATURE cert
Jun  1 10:32:16: ISAKMP:(2124): peer wants cert issued by cn= DOMAIN,dc=FQ,dc=DN
Jun  1 10:32:16:  Choosing trustpoint hub01.FQDN.com:PORT as issuer
Jun  1 10:32:16: ISAKMP:(2124): processing vendor id payload
Jun  1 10:32:16: ISAKMP:(2124): vendor ID is Unity
Jun  1 10:32:16: ISAKMP:(2124): processing vendor id payload
Jun  1 10:32:16: ISAKMP:(2124): vendor ID is DPD
Jun  1 10:32:16: ISAKMP:(2124): processing vendor id payload
Jun  1 10:32:16: ISAKMP:(2124): speaking to another IOS box!
Jun  1 10:32:16: ISAKMP:received payload type 20
Jun  1 10:32:16: ISAKMP (2124): NAT found, both nodes inside NAT
Jun  1 10:32:16: ISAKMP:received payload type 20
Jun  1 10:32:16: ISAKMP (2124): My hash no match -  this node inside NAT
Jun  1 10:32:16: ISAKMP:(2124):Input = IKE_MESG_INTERNAL, IKE_PROCESS_MAIN_MODE
Jun  1 10:32:16: ISAKMP:(2124):Old State = IKE_I_MM4  New State = IKE_I_MM4 

Jun  1 10:32:16: ISAKMP:(2124):Send initial contact
Jun  1 10:32:16: ISAKMP:(2124): IKE->PKI Get self CertificateChain state (I) MM_KEY_EXCH (peer HUB01_IP)
Jun  1 10:32:16: ISAKMP:(2124): PKI->IKE Got self CertificateChain state (I) MM_KEY_EXCH (peer HUB01_IP)
Jun  1 10:32:16: ISAKMP:(2124): IKE->PKI Get SubjectName state (I) MM_KEY_EXCH (peer HUB01_IP)
Jun  1 10:32:16: ISAKMP:(2124): PKI->IKE Got SubjectName state (I) MM_KEY_EXCH (peer HUB01_IP)
Jun  1 10:32:16: ISAKMP:(2124):My ID configured as IPv4 Addr, but Addr not in Cert!
Jun  1 10:32:16: ISAKMP:(2124):Using FQDN as My ID
Jun  1 10:32:16: ISAKMP:(2124):SA is doing RSA signature authentication using id type ID_FQDN
Jun  1 10:32:16: ISAKMP (2124): ID payload 
	next-payload : 6
	type         : 2 
	FQDN name    : SPOKE.FQDN.XYZ 
	protocol     : 17 
	port         : 0 
	length       : 25
Jun  1 10:32:16: ISAKMP:(2124):Total payload length: 25
Jun  1 10:32:16: ISAKMP:(2124): IKE->PKI Get CertificateChain to be sent to peer state (I) MM_KEY_EXCH (peer HUB01_IP)
Jun  1 10:32:16: ISAKMP:(2124): PKI->IKE Got CertificateChain to be sent to peer state (I) MM_KEY_EXCH (peer HUB01_IP)
Jun  1 10:32:16: ISAKMP (2124): constructing CERT payload for hostname=SPOKE.FQDN.XYZ
Jun  1 10:32:16: ISKAMP: growing send buffer from 1024 to 3072
Jun  1 10:32:16: ISAKMP:(2124): using the hub01.FQDN.com:PORT trustpoint's keypair to sign
Jun  1 10:32:16: ISAKMP:(2124): sending packet to HUB01_IP my_port 4500 peer_port 4500 (I) MM_KEY_EXCH
Jun  1 10:32:16: ISAKMP:(2124):Sending an IKE IPv4 Packet.
Jun  1 10:32:16: ISAKMP:(2124):Input = IKE_MESG_INTERNAL, IKE_PROCESS_COMPLETE
SPOKE_0268#
Jun  1 10:32:16: ISAKMP:(2124):Old State = IKE_I_MM4  New State = IKE_I_MM5 

Jun  1 10:32:16: ISAKMP (2123): received packet from HUB01_IP dport 4500 sport 4500 Global (I) MM_NO_STATE
Jun  1 10:32:17: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): connection lookup returned 87C36B58
Jun  1 10:32:17: ISAKMP:(2119):purging SA., sa=87C92A2C, delme=87C92A2C
SPOKE_0268#
Jun  1 10:32:18: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): connection lookup returned 87C36B58
SPOKE_0268#
Jun  1 10:32:20: IPSEC(ERROR): crypto_notify_rp Rejected notify RP, elapse time 0 < 1000

Jun  1 10:32:20: ISAKMP:(2120):purging node 989920234
SPOKE_0268#
Jun  1 10:32:21: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): connection lookup returned 87C36B58
Jun  1 10:32:22: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): connection lookup returned 87C36B58
Jun  1 10:32:22: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): Found Tunnel1 interface in shared list
Jun  1 10:32:22: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): Removing Tunnel1 interface from shared list
Jun  1 10:32:22: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): Closing socket
Jun  1 10:32:22: CRYPTO_SS(TUNNEL SEC): Closed socket.
Jun  1 10:32:22: CRYPTO_SS(TUNNEL SEC): local SRC_IP SRC_IP/255.255.255.255/0, remote HUB01_IP HUB01_IP/255.255.255.255/0, prot 47, ifc Tu1
Jun  1 10:32:22: ISAKMP:(2124):peer does not do paranoid keepalives.

Jun  1 10:32:22: ISAKMP:(2124):deleting SA reason "P1 delete notify (in)" state (I) MM_KEY_EXCH (peer HUB01_IP)
Jun  1 10:32:22: ISAKMP:(2123):peer does not do paranoid keepalives.

Jun  1 10:32:22: ISAKMP:(2122):peer does not do paranoid keepalives.

Jun  1 10:32:22: ISAKMP:(2121):peer does not do paranoid keepalives.

Jun  1 10:32:22: ISAKMP:(2120):peer does not do paranoid keepalives.

Jun  1 10:32:22: ISAKMP:(2124):deleting SA reason "P1 delete notify (in)" state (I) MM_KEY_EXCH (peer HUB01_IP) 
Jun  1 10:32:22: ISAKMP: Unlocking peer struct 0x87873894 for isadb_mark_sa_deleted(), count 0
Jun  1 10:32:22: ISAKMP: Deleting peer node by peer_reap for HUB01_IP: 87873894
Jun  1 10:32:22: ISAKMP:(2124):deleting node -1539160926 error FALSE reason "IKE deleted"
Jun  1 10:32:22: ISAKMP:(2124): IKE->PKI End PKI Session state (I) MM_NO_STATE (peer HUB01_IP)
Jun  1 10:32:22: ISAKMP:(2124): PKI->IKE Ended PKI Session state (I) MM_NO_STATE (peer HUB01_IP)
Jun  1 10:32:22: ISAKMP:(2124):Input = IKE_MESG_INTERNAL, IKE_PHASE1_DEL
Jun  1 10:32:22: ISAKMP:(2124):Old State = IKE_I_MM5  New State = IKE_DEST_SA 

Jun  1 10:32:22: IPSEC(key_engine): got a queue event with 1 KMI message(s)
SPOKE_0268#
Jun  1 10:32:29: IPSEC-IFC MGRE/Tu1[shared]: crypto_ss_listen_start already listening
Jun  1 10:32:29: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): Opening a socket with profile vpnprof1
Jun  1 10:32:29: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): connection lookup returned 0
Jun  1 10:32:29: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): Triggering tunnel immediately.
Jun  1 10:32:29: IPSEC-IFC MGRE/Tu1[shared]: Adding Tunnel1 tunnel interface to shared list
Jun  1 10:32:29: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): connection lookup returned 87454954
Jun  1 10:32:29: IPSEC-IFC MGRE/Tu1[shared]: Socket 87454954 for HUB01_IP not open or does not exist
Jun  1 10:32:29: insert of map into mapdb AVL failed, map + ace pair already exists on the mapdb
Jun  1 10:32:29: CRYPTO_SS(TUNNEL SEC): Active open, socket info: local SRC_IP SRC_IP/255.255.255.255/0, remote HUB01_IP HUB01_IP/255.255.255.255/0,  prot 47, ifc Tu1
Jun  1 10:32:29: IPSEC(recalculate_mtu): reset sadb_root 88243F1C mtu to 1500
Jun  1 10:32:29: IPSEC(sa_request): ,
  (key eng. msg.) OUTBOUND local= SRC_IP:500, remote= HUB01_IP:500,
    local_proxy= SRC_IP/255.255.255.255/47/0,
    remote_proxy= HUB01_IP/255.255.255.255/47/0,
    protocol= ESP, transform= esp-aes 256 esp-md5-hmac  (Transport), 
    lifedur= 3600s and 4608000kb, 
    spi= 0x0(0), conn_id= 0, keysize= 256, flags= 0x0
Jun  1 10:32:29: ISAKMP:(0): SA request profile is (NULL)
Jun  1 10:32:29: ISAKMP: Created a peer struct for HUB01_IP, peer port 500
Jun  1 10:32:29: ISAKMP: New peer created peer = 0x87898B00 peer_handle = 0x80006469
Jun  1 10:32:29: ISAKMP: Locking peer struct 0x87898B00, refcount 1 for isakmp_initiator
Jun  1 10:32:29: ISAKMP: local port 500, remote port 500
Jun  1 10:32:29: ISAKMP: set new node 0 to QM_IDLE      
Jun  1 10:32:29: ISAKMP: Find a dup sa in the avl tree during calling isadb_insert sa = 877C0AC4
Jun  1 10:32:29: ISAKMP:(0):Can not start Aggressive mode, trying Main mode.
Jun  1 10:32:29: ISAKMP:(0):No pre-shared key with HUB01_IP!
Jun  1 10:32:29: ISAKMP:(0): IKE->PKI Get configured TrustPoints state (I) MM_NO_STATE (peer HUB01_IP)
Jun  1 10:32:29: ISAKMP:(0): PKI->IKE Got configured TrustPoints state (I) MM_NO_STATE (peer HUB01_IP)
Jun  1 10:32:29: ISAKMP:(0): constructed NAT-T vendor-rfc3947 ID
Jun  1 10:32:29: ISAKMP:(0): constructed NAT-T vendor-07 ID
Jun  1 10:32:29: ISAKMP:(0): constructed NAT-T vendor-03 ID
Jun  1 10:32:29: ISAKMP:(0): constructed NAT-T vendor-02 ID
Jun  1 10:32:29: ISAKMP:(0):Input = IKE_MESG_FROM_IPSEC, IKE_SA_REQ_MM
Jun  1 10:32:29: ISAKMP:(0):Old State = IKE_READY  New State = IKE_I_MM1 

Jun  1 10:32:29: ISAKMP:(0): beginning Main Mode exchange
Jun  1 10:32:29: ISAKMP:(0): sending packet to HUB01_IP my_port 500 peer_port 500 (I) MM_NO_STATE
Jun  1 10:32:29: ISAKMP:(0):Sending an IKE IPv4 Packet.
Jun  1 10:32:29: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): connection lookup returned 87454954
Jun  1 10:32:29: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): good socket ready message
Jun  1 10:32:29: ISAKMP (0): received packet from HUB01_IP dport 500 sport 500 Global (I) MM_NO_STATE
Jun  1 10:32:29: ISAKMP:(0):Input = IKE_MESG_FROM_PEER, IKE_MM_EXCH
Jun  1 10:32:29: ISAKMP:(0):Old State = IKE_I_MM1  New State = IKE_I_MM2 

Jun  1 10:32:29: ISAKMP:(0): processing SA payload. message ID = 0
Jun  1 10:32:29: ISAKMP:(0): processing vendor id payload
Jun  1 10:32:29: ISAKMP:(0): vendor ID seems Unity/DPD but major 69 mismatch
Jun  1 10:32:29: ISAKMP (0): vendor ID is NAT-T RFC 3947
Jun  1 10:32:29: ISAKMP : Scanning profiles for xauth ...
Jun  1 10:32:29: ISAKMP:(0): IKE->PKI Get configured TrustPoints state (I) MM_NO_STATE (peer HUB01_IP)
Jun  1 10:32:29: ISAKMP:(0): PKI->IKE Got configured TrustPoints state (I) MM_NO_STATE (peer HUB01_IP)
Jun  1 10:32:29: ISAKMP:(0):Checking ISAKMP transform 1 against priority 1 policy
Jun  1 10:32:29: ISAKMP:      encryption AES-CBC
Jun  1 10:32:29: ISAKMP:      keylength of 256
Jun  1 10:32:29: ISAKMP:      hash SHA
Jun  1 10:32:29: ISAKMP:      default group 1
Jun  1 10:32:29: ISAKMP:      auth RSA sig
Jun  1 10:32:29: ISAKMP:      life type in seconds
Jun  1 10:32:29: ISAKMP:      life duration (VPI) of  0x0 0x1 0x51 0x80 
Jun  1 10:32:29: ISAKMP:(0):atts are acceptable. Next payload is 0
Jun  1 10:32:29: ISAKMP:(0):Acceptable atts:actual life: 0
Jun  1 10:32:29: ISAKMP:(0):Acceptable atts:life: 0
Jun  1 10:32:29: ISAKMP:(0):Fill atts in sa vpi_length:4
Jun  1 10:32:29: ISAKMP:(0):Fill atts in sa life_in_seconds:86400
Jun  1 10:32:29: ISAKMP:(0): IKE->PKI Start PKI Session state (I) MM_NO_STATE (peer HUB01_IP)
Jun  1 10:32:29: ISAKMP:(0): PKI->IKE Started PKI Session state (I) MM_NO_STATE (peer HUB01_IP)
Jun  1 10:32:29: ISAKMP:(0):Returning Actual lifetime: 86400
Jun  1 10:32:29: ISAKMP:(0)::Started lifetime timer: 86400.

Jun  1 10:32:29: ISAKMP:(0): processing vendor id payload
Jun  1 10:32:29: ISAKMP:(0): vendor ID seems Unity/DPD but major 69 mismatch
Jun  1 10:32:29: ISAKMP (0): vendor ID is NAT-T RFC 3947
Jun  1 10:32:29: ISAKMP:(0):Input = IKE_MESG_INTERNAL, IKE_PROCESS_MAIN_MODE
Jun  1 10:32:29: ISAKMP:(0):Old State = IKE_I_MM2  New State = IKE_I_MM2 

Jun  1 10:32:29: ISAKMP:(0): IKE->PKI Get configured TrustPoints state (I) MM_SA_SETUP (peer HUB01_IP)
Jun  1 10:32:29: ISAKMP:(0): PKI->IKE Got configured TrustPoints state (I) MM_SA_SETUP (peer HUB01_IP)
Jun  1 10:32:29: ISAKMP:(0): IKE->PKI Get IssuerNames state (I) MM_SA_SETUP (peer HUB01_IP)
Jun  1 10:32:29: ISAKMP:(0): PKI->IKE Got IssuerNames state (I) MM_SA_SETUP (peer HUB01_IP)
Jun  1 10:32:29: ISAKMP (0): constructing CERT_REQ for issuer cn= DOMAIN,dc=FQ,dc=DN
Jun  1 10:32:29: ISAKMP (0): constructing CERT_REQ for issuer cn=CAServer,dc=DomainName,dc=local
Jun  1 10:32:29: ISAKMP:(0): sending packet to HUB01_IP my_port 500 peer_port 500 (I) MM_SA_SETUP
Jun  1 10:32:29: ISAKMP:(0):Sending an IKE IPv4 Packet.
Jun  1 10:32:29: ISAKMP:(0):Input = IKE_MESG_INTERNAL, IKE_PROCESS_COMPLETE
Jun  1 10:32:29: ISAKMP:(0):Old State = IKE_I_MM2  New State = IKE_I_MM3 

Jun  1 10:32:29: ISAKMP (0): received packet from HUB01_IP dport 500 sport 500 Global (I) MM_SA_SETUP
Jun  1 10:32:29: ISAKMP:(0):Input = IKE_MESG_FROM_PEER, IKE_MM_EXCH
Jun  1 10:32:29: ISAKMP:(0):Old State = IKE_I_MM3  New State = IKE_I_MM4 

Jun  1 10:32:29: ISAKMP:(0): processing KE payload. message ID = 0
Jun  1 10:32:29: ISAKMP:(0): processing NONCE payload. message ID = 0
Jun  1 10:32:29: ISAKMP:(2125): processing CERT_REQ payload. message ID = 0
Jun  1 10:32:29: ISAKMP:(2125): peer wants a CT_X509_SIGNATURE cert
Jun  1 10:32:29: ISAKMP:(2125): peer wants cert issued by cn= DOMAIN,dc=FQ,dc=DN
Jun  1 10:32:29:  Choosing trustpoint hub01.FQDN.com:PORT as issuer
Jun  1 10:32:29: ISAKMP:(2125): processing vendor id payload
Jun  1 10:32:29: ISAKMP:(2125): vendor ID is Unity
Jun  1 10:32:29: ISAKMP:(2125): processing vendor id payload
Jun  1 10:32:29: ISAKMP:(2125): vendor ID is DPD
Jun  1 10:32:29: ISAKMP:(2125): processing vendor id payload
Jun  1 10:32:29: ISAKMP:(2125): speaking to another IOS box!
Jun  1 10:32:29: ISAKMP:received payload type 20
Jun  1 10:32:29: ISAKMP (2125): NAT found, both nodes inside NAT
Jun  1 10:32:29: ISAKMP:received payload type 20
Jun  1 10:32:29: ISAKMP (2125): My hash no match -  this node inside NAT
Jun  1 10:32:29: ISAKMP:(2125):Input = IKE_MESG_INTERNAL, IKE_PROCESS_MAIN_MODE
Jun  1 10:32:29: ISAKMP:(2125):Old State = IKE_I_MM4  New State = IKE_I_MM4 

Jun  1 10:32:29: ISAKMP:(2125):Send initial contact
Jun  1 10:32:29: ISAKMP:(2125): IKE->PKI Get self CertificateChain state (I) MM_KEY_EXCH (peer HUB01_IP)
Jun  1 10:32:29: ISAKMP:(2125): PKI->IKE Got self CertificateChain state (I) MM_KEY_EXCH (peer HUB01_IP)
Jun  1 10:32:29: ISAKMP:(2125): IKE->PKI Get SubjectName state (I) MM_KEY_EXCH (peer HUB01_IP)
Jun  1 10:32:29: ISAKMP:(2125): PKI->IKE Got SubjectName state (I) MM_KEY_EXCH (peer HUB01_IP)
Jun  1 10:32:29: ISAKMP:(2125):My ID configured as IPv4 Addr, but Addr not in Cert!
Jun  1 10:32:29: ISAKMP:(2125):Using FQDN as My ID
Jun  1 10:32:29: ISAKMP:(2125):SA is doing RSA signature authentication using id type ID_FQDN
Jun  1 10:32:29: ISAKMP (2125): ID payload 
	next-payload : 6
	type         : 2 
	FQDN name    : SPOKE.FQDN.XYZ 
	protocol     : 17 
	port         : 0 
	length       : 25
Jun  1 10:32:29: ISAKMP:(2125):Total payload length: 25
Jun  1 10:32:29: ISAKMP:(2125): IKE->PKI Get CertificateChain to be sent to peer state (I) MM_KEY_EXCH (peer HUB01_IP)
Jun  1 10:32:29: ISAKMP:(2125): PKI->IKE Got CertificateChain to be sent to peer state (I) MM_KEY_EXCH (peer HUB01_IP)
Jun  1 10:32:29: ISAKMP (2125): constructing CERT payload for hostname=SPOKE.FQDN.XYZ
Jun  1 10:32:29: ISKAMP: growing send buffer from 1024 to 3072
Jun  1 10:32:29: ISAKMP:(2125): using the hub01.FQDN.com:PORT trustpoint's keypair to sign
Jun  1 10:32:29: ISAKMP:(2125): sending packet to HUB01_IP my_port 4500 peer_port 4500 (I) MM_KEY_EXCH
Jun  1 10:32:29: ISAKMP:(2125):Sending an IKE IPv4 Packet.
Jun  1 10:32:29: ISAKMP:(2125):Input = IKE_MESG_INTERNAL, IKE_PROCESS_COMPLETE
SPOKE_0268#
Jun  1 10:32:29: ISAKMP:(2125):Old State = IKE_I_MM4  New State = IKE_I_MM5 

Jun  1 10:32:29: ISAKMP (2124): received packet from HUB01_IP dport 4500 sport 4500 Global (I) MM_NO_STATE
Jun  1 10:32:30: ISAKMP:(2120):purging SA., sa=87B3DC10, delme=87B3DC10
Jun  1 10:32:30: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): connection lookup returned 87454954
SPOKE_0268#
Jun  1 10:32:32: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): connection lookup returned 87454954
Jun  1 10:32:32: ISAKMP:(2121):purging node 2143496957
SPOKE_0268#
Jun  1 10:32:33: IPSEC(ERROR): crypto_notify_rp Rejected notify RP, elapse time 0 < 1000

Jun  1 10:32:34: IPSEC(ERROR): crypto_notify_rp Rejected notify RP, elapse time 492 < 1000

Jun  1 10:32:34: IPSEC(ERROR): crypto_notify_rp Rejected notify RP, elapse time 492 < 1000

SPOKE_0268#
Jun  1 10:32:35: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): connection lookup returned 87454954
Jun  1 10:32:36: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): connection lookup returned 87454954
Jun  1 10:32:36: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): Found Tunnel1 interface in shared list
Jun  1 10:32:36: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): Removing Tunnel1 interface from shared list
Jun  1 10:32:36: IPSEC-IFC MGRE/Tu1[shared](SRC_IP/HUB01_IP): Closing socket
Jun  1 10:32:36: CRYPTO_SS(TUNNEL SEC): Closed socket.
Jun  1 10:32:36: CRYPTO_SS(TUNNEL SEC): local SRC_IP SRC_IP/255.255.255.255/0, remote HUB01_IP HUB01_IP/255.255.255.255/0, prot 47, ifc Tu1
Jun  1 10:32:36: ISAKMP:(2125):peer does not do paranoid keepalives.

Jun  1 10:32:36: ISAKMP:(2125):deleting SA reason "P1 delete notify (in)" state (I) MM_KEY_EXCH (peer HUB01_IP)
Jun  1 10:32:36: ISAKMP:(2124):peer does not do paranoid keepalives.

Jun  1 10:32:36: ISAKMP:(2123):peer does not do paranoid keepalives.

Jun  1 10:32:36: ISAKMP:(2122):peer does not do paranoid keepalives.

Jun  1 10:32:36: ISAKMP:(2121):peer does not do paranoid keepalives.

Jun  1 10:32:36: ISAKMP:(2125):deleting SA reason "P1 delete notify (in)" state (I) MM_KEY_EXCH (peer HUB01_IP) 
Jun  1 10:32:36: ISAKMP: Unlocking peer struct 0x87898B00 for isadb_mark_sa_deleted(), count 0
Jun  1 10:32:36: ISAKMP: Deleting peer node by peer_reap for HUB01_IP: 87898B00
Jun  1 10:32:36: ISAKMP:(2125):deleting node 879246213 error FALSE reason "IKE deleted"
Jun  1 10:32:36: ISAKMP:(2125): IKE->PKI End PKI Session state (I) MM_NO_STATE (peer HUB01_IP)
Jun  1 10:32:36: ISAKMP:(2125): PKI->IKE Ended PKI Session state (I) MM_NO_STATE (peer HUB01_IP)
Jun  1 10:32:36: ISAKMP:(2125):Input = IKE_MESG_INTERNAL, IKE_PHASE1_DEL
Jun  1 10:32:36: ISAKMP:(2125):Old State = IKE_I_MM5  New State = IKE_DEST_SA 

Jun  1 10:32:36: IPSEC(key_engine): got a queue event with 1 KMI message(s)

Hello,

 

I noticed on your hub router, there is no crypto map VPN ?

 

interface GigabitEthernet0/0/0
description Public Interface
ip address XX XX
ip mtu 1480
ip nat outside
ip access-group WANInterface in
ip tcp adjust-mss 1440
negotiation auto
crypto map VPN
crypto ipsec fragmentation after-encryption
ip virtual-reassembly
ip virtual-reassembly-out

Hi,
Thanks for your help.

Yes, there is. i've delete those parts of the copy/paste as there is sensitives informations and also because there are needed for IPSEC with distants points that have no purposes with de DMVPN infrastructure.

Hello,

 

Does anybody have a clue ?

I can provide more information if needed !

Best

Hello,

 

which access list is being matched in the crypto map ? Did you leave anything else out of the configuration you have posted ?

Hello,

Thanks for your help i'm very happy.
The DMVPN do not user the crypto map. The instruction about the crypto map that you can see in the interfaces configuration of GE0/0/0 is for IPSEC connection with other point.
For the DMVPN i use GRE protection, NHRP parameters and an ipsec transform set profile.

yes i leaved many things for security purposes

Hello,

 

Any ideas, any advices ?

 

best,