cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
538
Views
0
Helpful
1
Replies

Cisco VPN Client disconnect few seconds

knet40001
Level 1
Level 1

I have a problem Cisco2821 + Cisco Vpn Client
Client can connect on the router, but after a few seconds, disconnection and get an error 433: (Reason Not Specified by Peer)

Config:

hostname test2 

boot-start-marker 
boot system flash:c2800nm-advsecurityk9-mz.151-4.M7.bin 
boot-end-marker 

logging buffered 52000 
no logging console 
enable secret 4 [spass] 

aaa new-model 

aaa authentication login default local 
aaa authentication login sdm_vpn_xauth_ml_9 local 
aaa authorization network sdm_vpn_group_ml_9 local 

aaa session-id common 

clock timezone CET 1 0 
clock summer-time CET recurring last Sun Mar 2:00 last Sun Oct 2:00 

dot11 syslog 
no ip subnet-zero 
ip source-route 

ip cef 
no ip dhcp use vrf connected 
ip dhcp excluded-address 192.168.0.1 192.168.0.254 

ip flow-cache timeout active 1 
ip domain name domena.local 
ip ips notify SDEE 
ip address-pool dhcp-pool 

multilink bundle-name authenticated 

crypto pki server CiscoCA 
 database level names 
 lifetime certificate 1 
 lifetime ca-certificate 1 
 lifetime enrollment-request 2 
crypto pki token default removal timeout 0 

crypto pki trustpoint TP-self-signed-282370580 
 enrollment selfsigned 
 subject-name cn=IOS-Self-Signed-Certificate-282370580 
 revocation-check none 
 rsakeypair TP-self-signed-282370580 

crypto pki trustpoint EZVPN 
 enrollment url http://[]ip]:80 
 subject-name CN=CiscoCA OU=VPN 
 revocation-check crl 

crypto pki trustpoint CiscoCA 
 query certificate 
 revocation-check crl 
 rsakeypair CiscoCA 

crypto pki certificate chain TP-self-signed-282370580 
 certificate self-signed 01 
        quit 
crypto pki certificate chain EZVPN 
 certificate 03 
  3082021D 34 
        quit 
 certificate ca 01 
  308201FD  A9 
        quit 
crypto pki certificate chain CiscoCA 
 certificate ca 01 
  308201FD 3 A9 
        quit 

license udi pid CISCO2821 sn FCZ0 
username admin privilege 15 secret 4 [pass] 
username user secret 4 [pass] 

redundancy 

crypto isakmp policy 2 
 encr 3des 
 group 2 
crypto isakmp identity dn 
crypto isakmp keepalive 10 

crypto isakmp client configuration group VPN 
 pool SDM_POOL 
 acl VPN_ACL 
crypto isakmp profile PROFIL_IKE 
   ca trust-point EZVPN 
   match identity group VPN 
   client authentication list sdm_vpn_xauth_ml_9 
   isakmp authorization list sdm_vpn_group_ml_9 
   client configuration address respond 

crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac 

crypto dynamic-map DYNAMIC_MAP 10 
 set security-association idle-time 1200 
 set transform-set ESP-3DES-SHA 
 set isakmp-profile PROFIL_IKE 
 reverse-route 

crypto map CRYPTO 65535 ipsec-isakmp dynamic DYNAMIC_MAP 

interface GigabitEthernet0/0 
 ip address [ip] 
 ip flow ingress 
 ip nat outside 
 ip virtual-reassembly in 
 crypto map CRYPTO 

interface Vlan1 
 description LAN 
 ip address 192.168.0.1 255.255.255.0 
 ip flow ingress 
 ip nat inside 
 ip virtual-reassembly in 

ip local pool SDM_POOL 192.168.0.200 192.168.0.210 
ip forward-protocol nd 
ip http server 
no ip http secure-server 
ip http timeout-policy idle 5 life 86400 requests 10000 
ip route 0.0.0.0 0.0.0.0 [ip] 

ip access-list extended VPN_ACL 
 permit ip host 192.168.0.10 192.168.0.0 0.0.0.255 
 permit ip host 192.168.0.20 192.168.0.0 0.0.0.255 
 permit ip host 192.168.0.30 192.168.0.0 0.0.0.255 
  
logging trap debugging 
no cdp run 
snmp-server ifindex persist 

control-plane 

line con 0 
line aux 0 
line vty 0 4 
 transport input all 
 transport output telnet ssh

 

Logs:

:57.742: ISAKMP:      auth RSA sig 
003441: Apr 28 09:56:57.742: ISAKMP:      life type in seconds 
003442: Apr 28 09:56:57.742: ISAKMP:      life duration (VPI) of  0x0 0x20 0xC4 0x9B 
003443: Apr 28 09:56:57.742: ISAKMP:      keylength of 128 
003444: Apr 28 09:56:57.742: ISAKMP:(0):Encryption algorithm offered does not match policy! 
003445: Apr 28 09:56:57.742: ISAKMP:(0):atts are not acceptable. Next payload is 3 
003446: Apr 28 09:56:57.742: ISAKMP:(0):Checking ISAKMP transform 13 against priority 2 policy 
003447: Apr 28 09:56:57.742: ISAKMP:      encryption AES-CBC 
003448: Apr 28 09:56:57.742: ISAKMP:      hash SHA 
003449: Apr 28 09:56:57.742: ISAKMP:      default group 2 
003450: Apr 28 09:56:57.742: ISAKMP:      auth XAUTHInitRSA 
003451: Apr 28 09:56:57.742: ISAKMP:      life type in seconds 
003452: Apr 28 09:56:57.742: ISAKMP:      life duration (VPI) of  0x0 0x20 0xC4 0x9B 
003453: Apr 28 09:56:57.742: ISAKMP:      keylength of 128 
003454: Apr 28 09:56:57.742: ISAKMP:(0):Encryption algorithm offered does not match policy! 
003455: Apr 28 09:56:57.742: ISAKMP:(0):atts are not acceptable. Next payload is 3 
[...] 
003522: Apr 28 09:56:57.746: ISAKMP:(0):Checking ISAKMP transform 21 against priority 2 policy 
003523: Apr 28 09:56:57.746: ISAKMP:      encryption 3DES-CBC 
003524: Apr 28 09:56:57.746: ISAKMP:      hash SHA 
003525: Apr 28 09:56:57.746: ISAKMP:      default group 2 
003526: Apr 28 09:56:57.746: ISAKMP:      auth XAUTHInitRSA 
003527: Apr 28 09:56:57.746: ISAKMP:      life type in seconds 
003528: Apr 28 09:56:57.746: ISAKMP:      life duration (VPI) of  0x0 0x20 0xC4 0x9B 
003529: Apr 28 09:56:57.746: ISAKMP:(0):atts are acceptable. Next payload is 3 
003530: Apr 28 09:56:57.746: ISAKMP:(0):Acceptable atts:actual life: 86400 
003531: Apr 28 09:56:57.746: ISAKMP:(0):Acceptable atts:life: 0 
003532: Apr 28 09:56:57.746: ISAKMP:(0):Fill atts in sa vpi_length:4 
003533: Apr 28 09:56:57.746: ISAKMP:(0):Fill atts in sa life_in_seconds:2147483 
003534: Apr 28 09:56:57.746: ISAKMP:(0): IKE->PKI Start PKI Session state (R) MM_NO_STATE (peer [IP-client]) 
003535: Apr 28 09:56:57.746: ISAKMP:(0): PKI->IKE Started PKI Session state (R) MM_NO_STATE (peer [IP-client]) 
003536: Apr 28 09:56:57.746: ISAKMP:(0):Returning Actual lifetime: 86400 
003537: Apr 28 09:56:57.746: ISAKMP:(0)::Started lifetime timer: 86400. 

003538: Apr 28 09:56:57.746: ISAKMP:(0): vendor ID is NAT-T v2 
003539: Apr 28 09:56:57.746: ISAKMP:(0):Input = IKE_MESG_INTERNAL, IKE_PROCESS_MAIN_MODE 
003540: Apr 28 09:56:57.746: ISAKMP:(0):Old State = IKE_R_MM1  New State = IKE_R_MM1 

003541: Apr 28 09:56:57.746: ISAKMP:(0): constructed NAT-T vendor-02 ID 
003542: Apr 28 09:56:57.746: ISAKMP:(0): sending packet to [IP-client] my_port 500 peer_port 45177 (R) MM_SA_SETUP 
003543: Apr 28 09:56:57.746: ISAKMP:(0):Sending an IKE IPv4 Packet. 
003544: Apr 28 09:56:57.746: ISAKMP:(0):Input = IKE_MESG_INTERNAL, IKE_PROCESS_COMPLETE 
003545: Apr 28 09:56:57.746: ISAKMP:(0):Old State = IKE_R_MM1  New State = IKE_R_MM2 

003546: Apr 28 09:56:57.758: ISAKMP (0): received packet from [IP-client] dport 500 sport 45177 Global (R) MM_SA_SETUP 
003547: Apr 28 09:56:57.758: ISAKMP:(0):Input = IKE_MESG_FROM_PEER, IKE_MM_EXCH 
003548: Apr 28 09:56:57.758: ISAKMP:(0):Old State = IKE_R_MM2  New State = IKE_R_MM3 

003549: Apr 28 09:56:57.758: ISAKMP:(0): processing KE payload. message ID = 0 
003550: Apr 28 09:56:57.798: ISAKMP:(0): processing NONCE payload. message ID = 0 
003551: Apr 28 09:56:57.798: ISAKMP:received payload type 20 
003552: Apr 28 09:56:57.798: ISAKMP (1004): His hash no match - this node outside NAT 
003553: Apr 28 09:56:57.798: ISAKMP:received payload type 20 
003554: Apr 28 09:56:57.798: ISAKMP (1004): His hash no match - this node outside NAT 
003555: Apr 28 09:56:57.798: ISAKMP:(1004):Input = IKE_MESG_INTERNAL, IKE_PROCESS_MAIN_MODE 
003556: Apr 28 09:56:57.802: ISAKMP:(1004):Old State = IKE_R_MM3  New State = IKE_R_MM3 

003557: Apr 28 09:56:57.802: ISAKMP:(1004): IKE->PKI Get configured TrustPoints state (R) MM_KEY_EXCH (peer [IP-client]) 
003558: Apr 28 09:56:57.802: ISAKMP:(1004): PKI->IKE Got configured TrustPoints state (R) MM_KEY_EXCH (peer [IP-client]) 
003559: Apr 28 09:56:57.802: ISAKMP:(1004): IKE->PKI Get IssuerNames state (R) MM_KEY_EXCH (peer [IP-client]) 
003560: Apr 28 09:56:57.802: ISAKMP:(1004): PKI->IKE Got IssuerNames state (R) MM_KEY_EXCH (peer [IP-client]) 
003561: Apr 28 09:56:57.802: ISAKMP (1004): constructing CERT_REQ for issuer cn=CiscoCA 
003562: Apr 28 09:56:57.802: ISAKMP:(1004): sending packet to [IP-client] my_port 500 peer_port 45177 (R) MM_KEY_EXCH 
003563: Apr 28 09:56:57.802: ISAKMP:(1004):Sending an IKE IPv4 Packet. 
003564: Apr 28 09:56:57.802: ISAKMP:(1004):Input = IKE_MESG_INTERNAL, IKE_PROCESS_COMPLETE 
003565: Apr 28 09:56:57.802: ISAKMP:(1004):Old State = IKE_R_MM3  New State = IKE_R_MM4 

003566: Apr 28 09:56:57.846: ISAKMP (1004): received packet from [IP-client] dport 4500 sport 45180 Global (R) MM_KEY_EXCH 
003567: Apr 28 09:56:57.850: ISAKMP:(1004):Input = IKE_MESG_FROM_PEER, IKE_MM_EXCH 
003568: Apr 28 09:56:57.850: ISAKMP:(1004):Old State = IKE_R_MM4  New State = IKE_R_MM5 

003569: Apr 28 09:56:57.850: ISAKMP:(1004): processing ID payload. message ID = 0 
003570: Apr 28 09:56:57.850: ISAKMP (1004): ID payload 
        next-payload : 6 
        type         : 9 
        Dist. name   : cn=CiscoCA,ou=VPN_Soft_User 
        protocol     : 17 
        port         : 0 
        length       : 52 
003571: Apr 28 09:56:57.850: ISAKMP:(0):: UNITY's identity group: OU = VPN_Soft_User 
003572: Apr 28 09:56:57.850: ISAKMP:(0):: peer matches PROFIL_IKE profile 
003573: Apr 28 09:56:57.850: ISAKMP:(1004):Setting client config settings 47E22574 
003574: Apr 28 09:56:57.850: ISAKMP:(1004):(Re)Setting client xauth list  and state 
003575: Apr 28 09:56:57.850: ISAKMP/xauth: initializing AAA request 
003576: Apr 28 09:56:57.850: ISAKMP:(1004): processing CERT payload. message ID = 0 
003577: Apr 28 09:56:57.850: ISAKMP:(1004): processing a CT_X509_SIGNATURE cert 
003578: Apr 28 09:56:57.850: ISAKMP:(1004): IKE->PKI Add peer's certificate state (R) MM_KEY_EXCH (peer [IP-client]) 
003579: Apr 28 09:56:57.854: ISAKMP:(1004): PKI->IKE Added peer's certificate state (R) MM_KEY_EXCH (peer [IP-client]) 
003580: Apr 28 09:56:57.854: ISAKMP:(1004): IKE->PKI Get PeerCertificateChain state (R) MM_KEY_EXCH (peer [IP-client]) 
003581: Apr 28 09:56:57.854: ISAKMP:(1004): PKI->IKE Got PeerCertificateChain state (R) MM_KEY_EXCH (peer [IP-client]) 
003582: Apr 28 09:56:57.854: ISAKMP:(1004): peer's pubkey is cached 
003583: Apr 28 09:56:57.854: ISAKMP:(0): Creating CERT validation list: EZVPN, 
003584: Apr 28 09:56:57.854: ISAKMP:(1004): IKE->PKI Validate certificate chain state (R) MM_KEY_EXCH (peer [IP-client]) 
003585: Apr 28 09:56:57.854: ISAKMP:(1004): PKI->IKE Validate certificate chain state (R) MM_KEY_EXCH (peer [IP-client]) 
003586: Apr 28 09:56:57.854: ISAKMP:(1004): OU = VPN_Soft_User 
003587: Apr 28 09:56:57.854: ISAKMP:(1004):Profile has no keyring, aborting key search 
003588: Apr 28 09:56:57.854: ISAKMP:(1004):(Re)Setting client xauth list sdm_vpn_xauth_ml_9 and state 
003589: Apr 28 09:56:57.854: ISAKMP/xauth: initializing AAA request 
003590: Apr 28 09:56:57.854: ISAKMP:(1004): processing CERT_REQ payload. message ID = 0 
003591: Apr 28 09:56:57.854: ISAKMP:(1004): peer wants a CT_X509_SIGNATURE cert 
003592: Apr 28 09:56:57.854: ISAKMP:(1004): peer wants cert issued by cn=CiscoCA 
003593: Apr 28 09:56:57.854: ISAKMP: Examining profile list for trustpoint EZVPN 
003594: Apr 28 09:56:57.854: ISAKMP: Found matching profile for EZVPN 
003595: Apr 28 09:56:57.854:  Choosing trustpoint EZVPN as issuer 
003596: Apr 28 09:56:57.854: ISAKMP:(1004): processing SIG payload. message ID = 0 
003597: Apr 28 09:56:57.870: ISAKMP:(1004): processing NOTIFY INITIAL_CONTACT protocol 1 
        spi 0, message ID = 0, sa = 0x48AF2A28 
003598: Apr 28 09:56:57.870: ISAKMP:(1004):SA authentication status: 
        authenticated 
003599: Apr 28 09:56:57.870: ISAKMP:(1004):SA has been authenticated with [IP-client] 
003600: Apr 28 09:56:57.870: ISAKMP:(1004):Detected port floating to port = 45180 
003601: Apr 28 09:56:57.870: ISAKMP: Trying to find existing peer [IP-router]/[IP-client]/45180/ 
003602: Apr 28 09:56:57.870: ISAKMP:(1004):SA authentication status: 
        authenticated 
003603: Apr 28 09:56:57.870: ISAKMP:(1004): Process initial contact, 
bring down existing phase 1 and 2 SA's with local [IP-router] remote [IP-client] remote port 45180 
003604: Apr 28 09:56:57.870: ISAKMP:(1004):returning IP addr to the address pool 
003605: Apr 28 09:56:57.870: ISAKMP: Trying to insert a peer [IP-router]/[IP-client]/45180/,  and inserted successfully 48D14CD4. 
003606: Apr 28 09:56:57.870: ISAKMP:(1004):Input = IKE_MESG_INTERNAL, IKE_PROCESS_MAIN_MODE 
003607: Apr 28 09:56:57.870: ISAKMP:(1004):Old State = IKE_R_MM5  New State = IKE_R_MM5 

003608: Apr 28 09:56:57.870: ISAKMP:(1004): IKE->PKI Get self CertificateChain state (R) MM_KEY_EXCH (peer [IP-client]) 
003609: Apr 28 09:56:57.870: ISAKMP:(1004): PKI->IKE Got self CertificateChain state (R) MM_KEY_EXCH (peer [IP-client]) 
003610: Apr 28 09:56:57.870: ISAKMP:(1004): IKE->PKI Get SubjectName state (R) MM_KEY_EXCH (peer [IP-client]) 
003611: Apr 28 09:56:57.874: ISAKMP:(1004): PKI->IKE Got SubjectName state (R) MM_KEY_EXCH (peer [IP-client]) 
003612: Apr 28 09:56:57.874: ISAKMP:(1004): IKE->PKI Get self CertificateChain state (R) MM_KEY_EXCH (peer [IP-client]) 
003613: Apr 28 09:56:57.874: ISAKMP:(1004): PKI->IKE Got self CertificateChain IKE->PKI Get subject name attribute state (R) MM_KEY_EXCH (peer [IP-client]) 
003614: Apr 28 09:56:57.874: ISAKMP:(1004): PKI->IKE Got subject name attribute state (R) MM_KEY_EXCH (peer [IP-client]) 
003615: Apr 28 09:56:57.874: ISAKMP:(1004):SA is doing RSA signature authentication plus XAUTH using id type ID_DER_ASN1_DN 
003616: Apr 28 09:56:57.874: ISAKMP (1004): ID payload 
        next-payload : 6 
        type         : 9 
        Dist. name   : hostname=test2.domena.local,cn=CiscoCA OU=VPN_Soft_User 
        protocol     : 17 
        port         : 0 
        length       : 80 
003617: Apr 28 09:56:57.874: ISAKMP:(1004):Total payload length: 80 
003618: Apr 28 09:56:57.874: ISAKMP:(1004): IKE->PKI Get CertificateChain to be sent to peer state (R) MM_KEY_EXCH (peer [IP-client]) 
003619: Apr 28 09:56:57.874: ISAKMP:(1004): PKI->IKE Got CertificateChain to be sent to peer state (R) MM_KEY_EXCH (peer [IP-client]) 
003620: Apr 28 09:56:57.878: ISAKMP (1004): constructing CERT payload for hostname=test2.domena.local,cn=CiscoCA OU=VPN_Soft_User 
003621: Apr 28 09:56:57.878: ISAKMP:(1004): using the EZVPN trustpoint's keypair to sign 
003622: Apr 28 09:56:57.942: ISAKMP:(1004): sending packet to [IP-client] my_port 4500 peer_port 45180 (R) MM_KEY_EXCH 
003623: Apr 28 09:56:57.942: ISAKMP:(1004):Sending an IKE IPv4 Packet. 
003624: Apr 28 09:56:57.942: ISAKMP:(1004):Returning Actual lifetime: 86400 
003625: Apr 28 09:56:57.942: ISAKMP: set new node -671883512 to CONF_XAUTH 
003626: Apr 28 09:56:57.942: ISAKMP:(1004):Sending NOTIFY RESPONDER_LIFETIME protocol 1 
        spi 1201109376, message ID = 3623083784 
003627: Apr 28 09:56:57.942: ISAKMP:(1004): sending packet to [IP-client] my_port 4500 peer_port 45180 (R) CONF_XAUTH 
003628: Apr 28 09:56:57.942: ISAKMP:(1004):Sending an IKE IPv4 Packet. 
003629: Apr 28 09:56:57.942: ISAKMP: Sending phase 1 responder lifetime 86400 

003630: Apr 28 09:56:57.942: ISAKMP:(1004):Input = IKE_MESG_INTERNAL, IKE_PROCESS_COMPLETE 
003631: Apr 28 09:56:57.942: ISAKMP:(1004):Old State = IKE_R_MM5  New State = IKE_P1_COMPLETE 

003632: Apr 28 09:56:57.942: ISAKMP:(1004):Need XAUTH 
003633: Apr 28 09:56:57.942: ISAKMP: set new node -2091524048 to CONF_XAUTH 
003634: Apr 28 09:56:57.942: ISAKMP/xauth: request attribute XAUTH_USER_NAME_V2 
003635: Apr 28 09:56:57.942: ISAKMP/xauth: request attribute XAUTH_USER_PASSWORD_V2 
003636: Apr 28 09:56:57.942: ISAKMP:(1004): initiating peer config to [IP-client]. ID = 2203443248 
003637: Apr 28 09:56:57.942: ISAKMP:(1004): sending packet to [IP-client] my_port 4500 peer_port 45180 (R) CONF_XAUTH 
003638: Apr 28 09:56:57.942: ISAKMP:(1004):Sending an IKE IPv4 Packet. 
003639: Apr 28 09:56:57.942: ISAKMP:(1004):Input = IKE_MESG_INTERNAL, IKE_PHASE1_COMPLETE 
003640: Apr 28 09:56:57.942: ISAKMP:(1004):Old State = IKE_P1_COMPLETE  New State = IKE_XAUTH_REQ_SENT 
003641: Apr 28 09:56:59.890: ISAKMP:(1003):purging node 1078068616 
003642: Apr 28 09:56:59.898: ISAKMP:(1003):purging node 357984103 
003643: Apr 28 09:57:00.118: ISAKMP (1004): received packet from [IP-client] dport 4500 sport 45180 Global (R) CONF_XAUTH 
003644: Apr 28 09:57:00.118: ISAKMP:(1004):processing transaction payload from [IP-client]. message ID = -2091524048 
003645: Apr 28 09:57:00.118: ISAKMP: Config payload REPLY 
003646: Apr 28 09:57:00.118: ISAKMP/xauth: reply attribute XAUTH_USER_NAME_V2 
003647: Apr 28 09:57:00.118: ISAKMP/xauth: reply attribute XAUTH_USER_PASSWORD_V2 
003648: Apr 28 09:57:00.118: ISAKMP:(1004):deleting node -2091524048 error FALSE reason "Done with xauth request/reply exchange003649: Apr 28 09:57:00.118: ISAKMP:(1004):Input = IKE_MESG_FROM_PEER, IKE_CFG_REPLY 
003650: Apr 28 09:57:00.118: ISAKMP:(1004):Old State = IKE_XAUTH_REQ_SENT  New State = IKE_XAUTH_AAA_CONT_LOGIN_AWAIT 

003651: Apr 28 09:57:00.118: ISAKMP: set new node 278284536 to CONF_XAUTH 
003652: Apr 28 09:57:00.118: ISAKMP:(1004): initiating peer config to [IP-client]. ID = 278284536 
003653: Apr 28 09:57:00.118: ISAKMP:(1004): sending packet to [IP-client] my_port 4500 peer_port 45180 (R) CONF_XAUTH 
003654: Apr 28 09:57:00.118: ISAKMP:(1004):Sending an IKE IPv4 Packet. 
003655: Apr 28 09:57:00.118: ISAKMP:(1004):Input = IKE_MESG_FROM_AAA, IKE_AAA_CONT_LOGIN 
003656: Apr 28 09:57:00.118: ISAKMP:(1004):Old State = IKE_XAUTH_AAA_CONT_LOGIN_AWAIT  New State = IKE_XAUTH_SET_SENT 

003657: Apr 28 09:57:00.126: ISAKMP (1004): received packet from [IP-client] dport 4500 sport 45180 Global (R) CONF_XAUTH 
003658: Apr 28 09:57:00.126: ISAKMP:(1004):processing transaction payload from [IP-client]. message ID = 278284536 
003659: Apr 28 09:57:00.126: ISAKMP: Config payload ACK 
003660: Apr 28 09:57:00.126: ISAKMP:(1004):       (blank) XAUTH ACK Processed 
003661: Apr 28 09:57:00.126: ISAKMP:(1004):deleting node 278284536 error FALSE reason "Transaction mode done" 
003662: Apr 28 09:57:00.126: ISAKMP:(1004):Talking to a Unity Client 
003663: Apr 28 09:57:00.126: ISAKMP:(1004):Input = IKE_MESG_FROM_PEER, IKE_CFG_ACK 
003664: Apr 28 09:57:00.126: ISAKMP:(1004):Old State = IKE_XAUTH_SET_SENT  New State = IKE_P1_COMPLETE 

003665: Apr 28 09:57:00.126: ISAKMP:(1004):IKE_DPD is enabled, initializing timers 
003666: Apr 28 09:57:00.126: ISAKMP:(1004): IKE->PKI End PKI Session state (R) QM_IDLE       (peer [IP-client]) 
003667: Apr 28 09:57:00.126: ISAKMP:(1004): PKI->IKE Ended PKI session state (R) QM_IDLE       (peer [IP-client]) 
003668: Apr 28 09:57:00.126: ISAKMP:(1004):Input = IKE_MESG_INTERNAL, IKE_PHASE1_COMPLETE 
003669: Apr 28 09:57:00.126: ISAKMP:(1004):Old State = IKE_P1_COMPLETE  New State = IKE_P1_COMPLETE 

003670: Apr 28 09:57:00.134: ISAKMP (1004): received packet from [IP-client] dport 4500 sport 45180 Global (R) QM_IDLE 
003671: Apr 28 09:57:00.134: ISAKMP: set new node -520535932 to QM_IDLE 
003672: Apr 28 09:57:00.134: ISAKMP:(1004):processing transaction payload from [IP-client]. message ID = -520535932 
003673: Apr 28 09:57:00.134: ISAKMP: Config payload REQUEST 
003674: Apr 28 09:57:00.134: ISAKMP:(1004):checking request: 
003675: Apr 28 09:57:00.134: ISAKMP:    IP4_ADDRESS 
003676: Apr 28 09:57:00.134: ISAKMP:    IP4_NETMASK 
003677: Apr 28 09:57:00.134: ISAKMP:    IP4_DNS 
003678: Apr 28 09:57:00.134: ISAKMP:    IP4_NBNS 
003679: Apr 28 09:57:00.134: ISAKMP:    ADDRESS_EXPIRY 
003680: Apr 28 09:57:00.134: ISAKMP:    MODECFG_BANNER 
003681: Apr 28 09:57:00.134: ISAKMP:    MODECFG_SAVEPWD 
003682: Apr 28 09:57:00.134: ISAKMP:    DEFAULT_DOMAIN 
003683: Apr 28 09:57:00.134: ISAKMP:    SPLIT_INCLUDE 
003684: Apr 28 09:57:00.134: ISAKMP:    SPLIT_DNS 
003685: Apr 28 09:57:00.134: ISAKMP:    PFS 
003686: Apr 28 09:57:00.134: ISAKMP:    MODECFG_BROWSER_PROXY 
003687: Apr 28 09:57:00.134: ISAKMP:    BACKUP_SERVER 
003688: Apr 28 09:57:00.134: ISAKMP:    MODECFG_SMARTCARD_REMOVAL_DISCONNECT 
003689: Apr 28 09:57:00.134: ISAKMP:    APPLICATION_VERSION 
003690: Apr 28 09:57:00.134: ISAKMP: Client Version is : Cisco Systems VPN Client 5.0.07.0440:WinNTp 
003691: Apr 28 09:57:00.134: ISAKMP:    FW_RECORD 
003692: Apr 28 09:57:00.134: ISAKMP:    MODECFG_HOSTNAME 
003693: Apr 28 09:57:00.134: ISAKMP:    INCLUDE_LOCAL_LAN 
003694: Apr 28 09:57:00.134: ISAKMP/author: Author request for group VPN_Soft_Usersuccessfully sent to AAA 
003695: Apr 28 09:57:00.134: ISAKMP:(1004):Input = IKE_MESG_FROM_PEER, IKE_CFG_REQUEST 
003696: Apr 28 09:57:00.134: ISAKMP:(1004):Old State = IKE_P1_COMPLETE  New State = IKE_CONFIG_AUTHOR_AAA_AWAIT 

003697: Apr 28 09:57:00.134: ISAKMP:(1004):attributes sent in message: 
003698: Apr 28 09:57:00.134:         Address: 0.2.0.0 
003699: Apr 28 09:57:00.138: ISAKMP:(1004):allocating address 192.168.0.223 
003700: Apr 28 09:57:00.138: ISAKMP: Sending private address: 192.168.0.223 
003701: Apr 28 09:57:00.138: ISAKMP: Sending subnet mask: 255.255.255.0 
003702: Apr 28 09:57:00.138: ISAKMP: Sending ADDRESS_EXPIRY seconds left to use the address: 86397 
003703: Apr 28 09:57:00.138: ISAKMP: Sending save password reply value 0 
003705: Apr 28 09:57:00.138: ISAKMP: Sending split include name VPN_Soft_ACL network 192.168.0.10 mask 255.255.255.255 protocol 0, src port 0, dst port 0 

003706: Apr 28 09:57:00.138: ISAKMP: Sending split include name VPN_Soft_ACL network 192.168.0.20 mask 255.255.255.255 protocol 0, src port 0, dst port 0 

003707: Apr 28 09:57:00.138: ISAKMP: Sending split include name VPN_Soft_ACL network 192.168.0.30 mask 255.255.255.255 protocol 0, src port 0, dst port 0 

003713: Apr 28 09:57:00.138: ISAKMP: Sending smartcard_removal_disconnect reply 
                  value 0 
003714: Apr 28 09:57:00.138: ISAKMP: Sending APPLICATION_VERSION string: Cisco IOS Software, 2800 Software (C2800NM-ADVSECURITYK9-M), Version 15.1(4)M7, RELEASE SOFTWARE (fc2) 
Technical Support: http://www.cisco.com/techsupport 
Copyright (c) 1986-2013 by Cisco Systems, Inc. 
Compiled Mon 16-Sep-13 00:31 by prod_rel_team 
003715: Apr 28 09:57:00.138: ISAKMP (1004): Unknown Attr: MODECFG_HOSTNAME (0x700A) 
003716: Apr 28 09:57:00.138: ISAKMP:(1004): responding to peer config from [IP-client]. ID = 3774431364 
003717: Apr 28 09:57:00.138: ISAKMP: Marking node 3774431364 for late deletion 
003718: Apr 28 09:57:00.138: ISAKMP:(1004): sending packet to [IP-client] my_port 4500 peer_port 45180 (R) CONF_ADDR 
003719: Apr 28 09:57:00.138: ISAKMP:(1004):Sending an IKE IPv4 Packet. 
003720: Apr 28 09:57:00.138: ISAKMP:(1004):Talking to a Unity Client 
003721: Apr 28 09:57:00.138: ISAKMP:(1004):Input = IKE_MESG_FROM_AAA, IKE_AAA_GROUP_ATTR 
003722: Apr 28 09:57:00.138: ISAKMP:(1004):Old State = IKE_CONFIG_AUTHOR_AAA_AWAIT  New State = IKE_P1_COMPLETE 

003723: Apr 28 09:57:00.138: ISAKMP:FSM error - Message from AAA grp/user. 

003724: Apr 28 09:57:00.142: ISAKMP:(1004):IKE_DPD is enabled, initializing timers 
003725: Apr 28 09:57:00.142: ISAKMP:(1004):Input = IKE_MESG_INTERNAL, IKE_PHASE1_COMPLETE 
003726: Apr 28 09:57:00.142: ISAKMP:(1004):Old State = IKE_P1_COMPLETE  New State = IKE_P1_COMPLETE 

003727: Apr 28 09:57:00.150: ISAKMP (1004): received packet from [IP-client] dport 4500 sport 45180 Global (R) QM_IDLE 
003728: Apr 28 09:57:00.150: ISAKMP: set new node 1822881572 to QM_IDLE 
003729: Apr 28 09:57:00.154: ISAKMP:(1004): processing HASH payload. message ID = 1822881572 
003730: Apr 28 09:57:00.154: ISAKMP:(1004): processing SA payload. message ID = 1822881572 
003731: Apr 28 09:57:00.154: ISAKMP:(1004):Checking IPSec proposal 1 
003732: Apr 28 09:57:00.154: ISAKMP: transform 1, ESP_AES 
003733: Apr 28 09:57:00.154: ISAKMP:   attributes in transform: 
003734: Apr 28 09:57:00.154: ISAKMP:      authenticator is HMAC-MD5 
003735: Apr 28 09:57:00.154: ISAKMP:      key length is 256 
003736: Apr 28 09:57:00.154: ISAKMP:      encaps is 61443 (Tunnel-UDP) 
003737: Apr 28 09:57:00.154: ISAKMP:      SA life type in seconds 
003738: Apr 28 09:57:00.154: ISAKMP:      SA life duration (VPI) of  0x0 0x20 0xC4 0x9B 
003739: Apr 28 09:57:00.154: ISAKMP:(1004):atts are acceptable. 
003740: Apr 28 09:57:00.154: ISAKMP:(1004):Checking IPSec proposal 1 
003741: Apr 28 09:57:00.154: ISAKMP:(1004):transform 1, IPPCP LZS 
003742: Apr 28 09:57:00.154: ISAKMP:   attributes in transform: 
003743: Apr 28 09:57:00.154: ISAKMP:      encaps is 61443 (Tunnel-UDP) 
003744: Apr 28 09:57:00.154: ISAKMP:      SA life type in seconds 
003745: Apr 28 09:57:00.154: ISAKMP:      SA life duration (VPI) of  0x0 0x20 0xC4 0x9B 
003746: Apr 28 09:57:00.154: ISAKMP:(1004):atts are acceptable. 
003747: Apr 28 09:57:00.154: ISAKMP:(1004): IPSec policy invalidated proposal with error 256 
003748: Apr 28 09:57:00.154: ISAKMP:(1004):Checking IPSec proposal 2 
003749: Apr 28 09:57:00.154: ISAKMP: transform 1, ESP_AES 
003750: Apr 28 09:57:00.154: ISAKMP:   attributes in transform: 
003751: Apr 28 09:57:00.154: ISAKMP:      authenticator is HMAC-SHA 
003752: Apr 28 09:57:00.154: ISAKMP:      key length is 256 
003753: Apr 28 09:57:00.154: ISAKMP:      encaps is 61443 (Tunnel-UDP) 
003754: Apr 28 09:57:00.154: ISAKMP:      SA life type in seconds 
003755: Apr 28 09:57:00.154: ISAKMP:      SA life duration (VPI) of  0x0 0x20 0xC4 0x9B 
003756: Apr 28 09:57:00.154: ISAKMP:(1004):atts are acceptable. 
[...] 
003839: Apr 28 09:57:00.158: ISAKMP:(1004):Checking IPSec proposal 9 
003840: Apr 28 09:57:00.158: ISAKMP: transform 1, ESP_3DES 
003841: Apr 28 09:57:00.158: ISAKMP:   attributes in transform: 
003842: Apr 28 09:57:00.158: ISAKMP:      authenticator is HMAC-MD5 
003843: Apr 28 09:57:00.158: ISAKMP:      encaps is 61443 (Tunnel-UDP) 
003844: Apr 28 09:57:00.158: ISAKMP:      SA life type in seconds 
003845: Apr 28 09:57:00.158: ISAKMP:      SA life duration (VPI) of  0x0 0x20 0xC4 0x9B 
003846: Apr 28 09:57:00.158: ISAKMP:(1004):atts are acceptable. 
003847: Apr 28 09:57:00.158: ISAKMP:(1004):Checking IPSec proposal 9 
003848: Apr 28 09:57:00.158: ISAKMP:(1004):transform 1, IPPCP LZS 
003849: Apr 28 09:57:00.158: ISAKMP:   attributes in transform: 
003850: Apr 28 09:57:00.158: ISAKMP:      encaps is 61443 (Tunnel-UDP) 
003851: Apr 28 09:57:00.158: ISAKMP:      SA life type in seconds 
003852: Apr 28 09:57:00.158: ISAKMP:      SA life duration (VPI) of  0x0 0x20 0xC4 0x9B 
003853: Apr 28 09:57:00.158: ISAKMP:(1004):atts are acceptable. 
003854: Apr 28 09:57:00.158: ISAKMP:(1004): IPSec policy invalidated proposal with error 256 
003855: Apr 28 09:57:00.158: ISAKMP:(1004):Checking IPSec proposal 10 
003856: Apr 28 09:57:00.162: ISAKMP: transform 1, ESP_3DES 
003857: Apr 28 09:57:00.162: ISAKMP:   attributes in transform: 
003858: Apr 28 09:57:00.162: ISAKMP:      authenticator is HMAC-SHA 
003859: Apr 28 09:57:00.162: ISAKMP:      encaps is 61443 (Tunnel-UDP) 
003860: Apr 28 09:57:00.162: ISAKMP:      SA life type in seconds 
003861: Apr 28 09:57:00.162: ISAKMP:      SA life duration (VPI) of  0x0 0x20 0xC4 0x9B 
003862: Apr 28 09:57:00.162: ISAKMP:(1004):atts are acceptable. 
003863: Apr 28 09:57:00.162: ISAKMP:(1004):Checking IPSec proposal 10 
003864: Apr 28 09:57:00.162: ISAKMP:(1004):transform 1, IPPCP LZS 
003865: Apr 28 09:57:00.162: ISAKMP:   attributes in transform: 
003866: Apr 28 09:57:00.162: ISAKMP:      encaps is 61443 (Tunnel-UDP) 
003867: Apr 28 09:57:00.162: ISAKMP:      SA life type in seconds 
003868: Apr 28 09:57:00.162: ISAKMP:      SA life duration (VPI) of  0x0 0x20 0xC4 0x9B 
003869: Apr 28 09:57:00.162: ISAKMP:(1004):atts are acceptable. 
003870: Apr 28 09:57:00.162: ISAKMP:(1004): IPSec policy invalidated proposal with error 256 
003871: Apr 28 09:57:00.162: ISAKMP:(1004):Checking IPSec proposal 11 
003872: Apr 28 09:57:00.162: ISAKMP: transform 1, ESP_3DES 
003873: Apr 28 09:57:00.162: ISAKMP:   attributes in transform: 
003874: Apr 28 09:57:00.162: ISAKMP:      authenticator is HMAC-MD5 
003875: Apr 28 09:57:00.162: ISAKMP:      encaps is 61443 (Tunnel-UDP) 
003876: Apr 28 09:57:00.162: ISAKMP:      SA life type in seconds 
003877: Apr 28 09:57:00.162: ISAKMP:      SA life duration (VPI) of  0x0 0x20 0xC4 0x9B 
003878: Apr 28 09:57:00.162: ISAKMP:(1004):atts are acceptable. 
003879: Apr 28 09:57:00.162: ISAKMP:(1004): IPSec policy invalidated proposal with error 256 
003880: Apr 28 09:57:00.162: ISAKMP:(1004):Checking IPSec proposal 12 
003881: Apr 28 09:57:00.162: ISAKMP: transform 1, ESP_3DES 
003882: Apr 28 09:57:00.162: ISAKMP:   attributes in transform: 
003883: Apr 28 09:57:00.162: ISAKMP:      authenticator is HMAC-SHA 
003884: Apr 28 09:57:00.162: ISAKMP:      encaps is 61443 (Tunnel-UDP) 
003885: Apr 28 09:57:00.162: ISAKMP:      SA life type in seconds 
003886: Apr 28 09:57:00.162: ISAKMP:      SA life duration (VPI) of  0x0 0x20 0xC4 0x9B 
003887: Apr 28 09:57:00.162: ISAKMP:(1004):atts are acceptable. 
003888: Apr 28 09:57:00.162: ISAKMP:(1004): processing NONCE payload. message ID = 1822881572 
003889: Apr 28 09:57:00.162: ISAKMP:(1004): processing ID payload. message ID = 1822881572 
003890: Apr 28 09:57:00.162: ISAKMP:(1004): processing ID payload. message ID = 1822881572 
003891: Apr 28 09:57:00.162: ISAKMP:(1004):QM Responder gets spi 
003892: Apr 28 09:57:00.162: ISAKMP:(1004):Node 1822881572, Input = IKE_MESG_FROM_PEER, IKE_QM_EXCH 
003893: Apr 28 09:57:00.162: ISAKMP:(1004):Old State = IKE_QM_READY  New State = IKE_QM_SPI_STARVE 
003894: Apr 28 09:57:00.162: ISAKMP:(1004):deleting node -520535932 error FALSE reason "No Error" 
003895: Apr 28 09:57:00.162: ISAKMP:(1004): Creating IPSec SAs 
003896: Apr 28 09:57:00.162:         inbound SA from [IP-client] to [IP-router] (f/i)  0/ 0 
        (proxy 192.168.0.223 to 0.0.0.0) 
003897: Apr 28 09:57:00.162:         has spi 0xA684DC76 and conn_id 0 
003898: Apr 28 09:57:00.162:         lifetime of 2147483 seconds 
003899: Apr 28 09:57:00.162:         outbound SA from [IP-router] to [IP-client] (f/i) 0/0 
        (proxy 0.0.0.0 to 192.168.0.223) 
003900: Apr 28 09:57:00.162:         has spi  0xCABB4957 and conn_id 0 
003901: Apr 28 09:57:00.162:         lifetime of 2147483 seconds 
003902: Apr 28 09:57:00.166: ISAKMP:(1004): sending packet to [IP-client] my_port 4500 peer_port 45180 (R) QM_IDLE 
003903: Apr 28 09:57:00.166: ISAKMP:(1004):Sending an IKE IPv4 Packet. 
003904: Apr 28 09:57:00.166: ISAKMP:(1004):Node 1822881572, Input = IKE_MESG_INTERNAL, IKE_GOT_SPI 
003905: Apr 28 09:57:00.166: ISAKMP:(1004):Old State = IKE_QM_SPI_STARVE  New State = IKE_QM_R_QM2 
003906: Apr 28 09:57:00.170: ISAKMP (1004): received packet from [IP-client] dport 4500 sport 45180 Global (R) QM_IDLE 
003907: Apr 28 09:57:00.170: ISAKMP:(1004):deleting node 1822881572 error FALSE reason "QM done (await)" 
003908: Apr 28 09:57:00.170: ISAKMP:(1004):Node 1822881572, Input = IKE_MESG_FROM_PEER, IKE_QM_EXCH 
003909: Apr 28 09:57:00.170: ISAKMP:(1004):Old State = IKE_QM_R_QM2  New State = IKE_QM_PHASE2_COMPLETE 
003910: Apr 28 09:57:02.942: ISAKMP:(1004): retransmitting phase 2 QM_IDLE       -671883512 ... 
003911: Apr 28 09:57:02.942: ISAKMP (1004): incrementing error counter on node, attempt 1 of 5: retransmit phase 2 
003912: Apr 28 09:57:02.942: ISAKMP (1004): incrementing error counter on sa, attempt 1 of 5: retransmit phase 2 
003913: Apr 28 09:57:02.942: ISAKMP:(1004): retransmitting phase 2 -671883512 QM_IDLE 
003914: Apr 28 09:57:02.942: ISAKMP:(1004): sending packet to [IP-client] my_port 4500 peer_port 45180 (R) QM_IDLE 
003915: Apr 28 09:57:02.942: ISAKMP:(1004):Sending an IKE IPv4 Packet. 
003916: Apr 28 09:57:09.898: ISAKMP:(1003):purging SA., sa=47E21B58, delme=47E21B58 
003917: Apr 28 09:57:09.898: ISAKMP:(1003):purging node -474075933 
003918: Apr 28 09:57:09.898: ISAKMP:(1003):purging node -1070239682 
003919: Apr 28 09:57:09.898: ISAKMP:(1003):purging node -2059470720 
003920: Apr 28 09:57:10.438: ISAKMP (1004): received packet from [IP-client] dport 4500 sport 45180 Global (R) QM_IDLE 
003921: Apr 28 09:57:10.438: ISAKMP: set new node -397863734 to QM_IDLE 
003922: Apr 28 09:57:10.438: ISAKMP:(1004): processing HASH payload. message ID = 3897103562 
003923: Apr 28 09:57:10.438: ISAKMP:(1004): processing NOTIFY DPD/R_U_THERE protocol 1 
        spi 0, message ID = 3897103562, sa = 0x48AF2A28 
003924: Apr 28 09:57:10.438: ISAKMP:(1004):deleting node -397863734 error FALSE reason "Informational (in) state 1" 
003925: Apr 28 09:57:10.438: ISAKMP:(1004):Input = IKE_MESG_FROM_PEER, IKE_INFO_NOTIFY 
003926: Apr 28 09:57:10.438: ISAKMP:(1004):Old State = IKE_P1_COMPLETE  New State = IKE_P1_COMPLETE 

003927: Apr 28 09:57:10.438: ISAKMP:(1004):DPD/R_U_THERE received from peer [IP-client], sequence 0x1110708 
003928: Apr 28 09:57:10.438: ISAKMP: set new node 531059587 to QM_IDLE 
003929: Apr 28 09:57:10.438: ISAKMP:(1004):Sending NOTIFY DPD/R_U_THERE_ACK protocol 1 
        spi 1201109384, message ID = 531059587 
003930: Apr 28 09:57:10.438: ISAKMP:(1004): seq. no 0x1110708 
003931: Apr 28 09:57:10.438: ISAKMP:(1004): sending packet to [IP-client] my_port 4500 peer_port 45180 (R) QM_IDLE 
003932: Apr 28 09:57:10.438: ISAKMP:(1004):Sending an IKE IPv4 Packet. 
003933: Apr 28 09:57:10.438: ISAKMP:(1004):purging node 531059587 
003934: Apr 28 09:57:10.438: ISAKMP:(1004):Input = IKE_MESG_FROM_PEER, IKE_MESG_KEEP_ALIVE 
003935: Apr 28 09:57:10.438: ISAKMP:(1004):Old State = IKE_P1_COMPLETE  New State = IKE_P1_COMPLETE 

003936: Apr 28 09:57:12.942: ISAKMP:(1004): retransmitting phase 2 QM_IDLE       -671883512 ... 
003937: Apr 28 09:57:12.942: ISAKMP (1004): incrementing error counter on node, attempt 2 of 5: retransmit phase 2 
003938: Apr 28 09:57:12.942: ISAKMP (1004): incrementing error counter on sa, attempt 2 of 5: retransmit phase 2 
003939: Apr 28 09:57:12.942: ISAKMP:(1004): retransmitting phase 2 -671883512 QM_IDLE 
003940: Apr 28 09:57:12.942: ISAKMP:(1004): sending packet to [IP-client] my_port 4500 peer_port 45180 (R) QM_IDLE 
003941: Apr 28 09:57:12.942: ISAKMP:(1004):Sending an IKE IPv4 Packet. 
003942: Apr 28 09:57:20.574: ISAKMP (1004): received packet from [IP-client] dport 4500 sport 45180 Global (R) QM_IDLE 
003943: Apr 28 09:57:20.574: ISAKMP: set new node 949428875 to QM_IDLE 
003944: Apr 28 09:57:20.574: ISAKMP:(1004): processing HASH payload. message ID = 949428875 
003945: Apr 28 09:57:20.574: ISAKMP:(1004): processing NOTIFY DPD/R_U_THERE protocol 1 
        spi 0, message ID = 949428875, sa = 0x48AF2A28 
003946: Apr 28 09:57:20.574: ISAKMP:(1004):deleting node 949428875 error FALSE reason "Informational (in) state 1" 
003947: Apr 28 09:57:20.574: ISAKMP:(1004):Input = IKE_MESG_FROM_PEER, IKE_INFO_NOTIFY 
003948: Apr 28 09:57:20.574: ISAKMP:(1004):Old State = IKE_P1_COMPLETE  New State = IKE_P1_COMPLETE 

003949: Apr 28 09:57:20.574: ISAKMP:(1004):DPD/R_U_THERE received from peer [IP-client], sequence 0x1110709 
003950: Apr 28 09:57:20.574: ISAKMP: set new node 2125691700 to QM_IDLE 
003951: Apr 28 09:57:20.574: ISAKMP:(1004):Sending NOTIFY DPD/R_U_THERE_ACK protocol 1 
        spi 1201109384, message ID = 2125691700 
003952: Apr 28 09:57:20.574: ISAKMP:(1004): seq. no 0x1110709 
003953: Apr 28 09:57:20.574: ISAKMP:(1004): sending packet to [IP-client] my_port 4500 peer_port 45180 (R) QM_IDLE 
003954: Apr 28 09:57:20.578: ISAKMP:(1004):Sending an IKE IPv4 Packet. 
003955: Apr 28 09:57:20.578: ISAKMP:(1004):purging node 2125691700 
003956: Apr 28 09:57:20.578: ISAKMP:(1004):Input = IKE_MESG_FROM_PEER, IKE_MESG_KEEP_ALIVE 
003957: Apr 28 09:57:20.578: ISAKMP:(1004):Old State = IKE_P1_COMPLETE  New State = IKE_P1_COMPLETE 

003958: Apr 28 09:57:22.942: ISAKMP:(1004): retransmitting phase 2 QM_IDLE       -671883512 ... 
003959: Apr 28 09:57:22.942: ISAKMP (1004): incrementing error counter on node, attempt 3 of 5: retransmit phase 2 
003960: Apr 28 09:57:22.942: ISAKMP (1004): incrementing error counter on sa, attempt 3 of 5: retransmit phase 2 
003961: Apr 28 09:57:22.942: ISAKMP:(1004): retransmitting phase 2 -671883512 QM_IDLE 
003962: Apr 28 09:57:22.942: ISAKMP:(1004): sending packet to [IP-client] my_port 4500 peer_port 45180 (R) QM_IDLE 
003963: Apr 28 09:57:22.942: ISAKMP:(1004):Sending an IKE IPv4 Packet. 
003964: Apr 28 09:57:30.758: ISAKMP (1004): received packet from [IP-client] dport 4500 sport 45180 Global (R) QM_IDLE 
003965: Apr 28 09:57:30.758: ISAKMP: set new node -1450052665 to QM_IDLE 
003966: Apr 28 09:57:30.758: ISAKMP:(1004): processing HASH payload. message ID = 2844914631 
003967: Apr 28 09:57:30.758: ISAKMP:(1004): processing NOTIFY DPD/R_U_THERE protocol 1 
        spi 0, message ID = 2844914631, sa = 0x48AF2A28 
003968: Apr 28 09:57:30.758: ISAKMP:(1004):deleting node -1450052665 error FALSE reason "Informational (in) state 1" 
003969: Apr 28 09:57:30.758: ISAKMP:(1004):Input = IKE_MESG_FROM_PEER, IKE_INFO_NOTIFY 
003970: Apr 28 09:57:30.758: ISAKMP:(1004):Old State = IKE_P1_COMPLETE  New State = IKE_P1_COMPLETE 

003971: Apr 28 09:57:30.758: ISAKMP:(1004):DPD/R_U_THERE received from peer [IP-client], sequence 0x111070A 
003972: Apr 28 09:57:30.758: ISAKMP: set new node 1710331817 to QM_IDLE 
003973: Apr 28 09:57:30.758: ISAKMP:(1004):Sending NOTIFY DPD/R_U_THERE_ACK protocol 1 
        spi 1201109384, message ID = 1710331817 
003974: Apr 28 09:57:30.758: ISAKMP:(1004): seq. no 0x111070A 
003975: Apr 28 09:57:30.758: ISAKMP:(1004): sending packet to [IP-client] my_port 4500 peer_port 45180 (R) QM_IDLE 
003976: Apr 28 09:57:30.762: ISAKMP:(1004):Sending an IKE IPv4 Packet. 
003977: Apr 28 09:57:30.762: ISAKMP:(1004):purging node 1710331817 
003978: Apr 28 09:57:30.762: ISAKMP:(1004):Input = IKE_MESG_FROM_PEER, IKE_MESG_KEEP_ALIVE 
003979: Apr 28 09:57:30.762: ISAKMP:(1004):Old State = IKE_P1_COMPLETE  New State = IKE_P1_COMPLETE 

003980: Apr 28 09:57:32.943: ISAKMP:(1004): retransmitting phase 2 QM_IDLE       -671883512 ... 
003981: Apr 28 09:57:32.943: ISAKMP (1004): incrementing error counter on node, attempt 4 of 5: retransmit phase 2 
003982: Apr 28 09:57:32.943: ISAKMP (1004): incrementing error counter on sa, attempt 4 of 5: retransmit phase 2 
003983: Apr 28 09:57:32.943: ISAKMP:(1004): retransmitting phase 2 -671883512 QM_IDLE 
003984: Apr 28 09:57:32.943: ISAKMP:(1004): sending packet to [IP-client] my_port 4500 peer_port 45180 (R) QM_IDLE 
003985: Apr 28 09:57:32.943: ISAKMP:(1004):Sending an IKE IPv4 Packet. 
003986: Apr 28 09:57:40.975: ISAKMP (1004): received packet from [IP-client] dport 4500 sport 45180 Global (R) QM_IDLE 
003987: Apr 28 09:57:40.975: ISAKMP: set new node -1712758536 to QM_IDLE 
003988: Apr 28 09:57:40.975: ISAKMP:(1004): processing HASH payload. message ID = 2582208760 
003989: Apr 28 09:57:40.975: ISAKMP:(1004): processing NOTIFY DPD/R_U_THERE protocol 1 
        spi 0, message ID = 2582208760, sa = 0x48AF2A28 
003990: Apr 28 09:57:40.975: ISAKMP:(1004):deleting node -1712758536 error FALSE reason "Informational (in) state 1" 
003991: Apr 28 09:57:40.975: ISAKMP:(1004):Input = IKE_MESG_FROM_PEER, IKE_INFO_NOTIFY 
003992: Apr 28 09:57:40.975: ISAKMP:(1004):Old State = IKE_P1_COMPLETE  New State = IKE_P1_COMPLETE 

003993: Apr 28 09:57:40.975: ISAKMP:(1004):DPD/R_U_THERE received from peer [IP-client], sequence 0x111070B 
003994: Apr 28 09:57:40.975: ISAKMP: set new node 1642495793 to QM_IDLE 
003995: Apr 28 09:57:40.975: ISAKMP:(1004):Sending NOTIFY DPD/R_U_THERE_ACK protocol 1 
        spi 1201109384, message ID = 1642495793 
003996: Apr 28 09:57:40.975: ISAKMP:(1004): seq. no 0x111070B 
003997: Apr 28 09:57:40.975: ISAKMP:(1004): sending packet to [IP-client] my_port 4500 peer_port 45180 (R) QM_IDLE 
003998: Apr 28 09:57:40.975: ISAKMP:(1004):Sending an IKE IPv4 Packet. 
003999: Apr 28 09:57:40.979: ISAKMP:(1004):purging node 1642495793 
004000: Apr 28 09:57:40.979: ISAKMP:(1004):Input = IKE_MESG_FROM_PEER, IKE_MESG_KEEP_ALIVE 
004001: Apr 28 09:57:40.979: ISAKMP:(1004):Old State = IKE_P1_COMPLETE  New State = IKE_P1_COMPLETE 

004002: Apr 28 09:57:42.943: ISAKMP:(1004): retransmitting phase 2 QM_IDLE       -671883512 ... 
004003: Apr 28 09:57:42.943: ISAKMP (1004): incrementing error counter on node, attempt 5 of 5: retransmit phase 2 
004004: Apr 28 09:57:42.943: ISAKMP (1004): incrementing error counter on sa, attempt 5 of 5: retransmit phase 2 
004005: Apr 28 09:57:42.943: ISAKMP:(1004): retransmitting phase 2 -671883512 QM_IDLE 
004006: Apr 28 09:57:42.943: ISAKMP:(1004): sending packet to [IP-client] my_port 4500 peer_port 45180 (R) QM_IDLE 
004007: Apr 28 09:57:42.943: ISAKMP:(1004):Sending an IKE IPv4 Packet. 
004008: Apr 28 09:57:50.163: ISAKMP:(1004):purging node -520535932 
004009: Apr 28 09:57:50.171: ISAKMP:(1004):purging node 1822881572 
004010: Apr 28 09:57:51.159: ISAKMP (1004): received packet from [IP-client] dport 4500 sport 45180 Global (R) QM_IDLE 
004011: Apr 28 09:57:51.159: ISAKMP: set new node 603664258 to QM_IDLE 
004012: Apr 28 09:57:51.159: ISAKMP:(1004): processing HASH payload. message ID = 603664258 
004013: Apr 28 09:57:51.159: ISAKMP:(1004): processing NOTIFY DPD/R_U_THERE protocol 1 
        spi 0, message ID = 603664258, sa = 0x48AF2A28 
004014: Apr 28 09:57:51.159: ISAKMP:(1004):deleting node 603664258 error FALSE reason "Informational (in) state 1" 
004015: Apr 28 09:57:51.159: ISAKMP:(1004):Input = IKE_MESG_FROM_PEER, IKE_INFO_NOTIFY 
004016: Apr 28 09:57:51.159: ISAKMP:(1004):Old State = IKE_P1_COMPLETE  New State = IKE_P1_COMPLETE 

004017: Apr 28 09:57:51.163: ISAKMP:(1004):DPD/R_U_THERE received from peer [IP-client], sequence 0x111070C 
004018: Apr 28 09:57:51.163: ISAKMP: set new node -303455399 to QM_IDLE 
004019: Apr 28 09:57:51.163: ISAKMP:(1004):Sending NOTIFY DPD/R_U_THERE_ACK protocol 1 
        spi 1201109384, message ID = 3991511897 
004020: Apr 28 09:57:51.163: ISAKMP:(1004): seq. no 0x111070C 
004021: Apr 28 09:57:51.163: ISAKMP:(1004):peer does not do paranoid keepalives. 

004022: Apr 28 09:57:51.163: ISAKMP:(1004):peer does not do paranoid keepalives. 

004023: Apr 28 09:57:51.163: ISAKMP:(1004):deleting SA reason "Death by retransmission throw" state (R) QM_IDLE       (peer [IP-client]) 
004024: Apr 28 09:57:51.163: ISAKMP:(1004):Input = IKE_MESG_FROM_PEER, IKE_MESG_KEEP_ALIVE 
004025: Apr 28 09:57:51.163: ISAKMP:(1004):Old State = IKE_P1_COMPLETE  New State = IKE_P1_COMPLETE 

004026: Apr 28 09:57:51.163: ISAKMP: set new node -515412245 to QM_IDLE 
004027: Apr 28 09:57:51.167: ISAKMP:(1004): sending packet to [IP-client] my_port 4500 peer_port 45180 (R) QM_IDLE 
004028: Apr 28 09:57:51.167: ISAKMP:(1004):Sending an IKE IPv4 Packet. 
004029: Apr 28 09:57:51.167: ISAKMP:(1004):purging node -515412245 
004030: Apr 28 09:57:51.167: ISAKMP:(1004):Input = IKE_MESG_INTERNAL, IKE_PHASE1_DEL 
004031: Apr 28 09:57:51.167: ISAKMP:(1004):Old State = IKE_P1_COMPLETE  New State = IKE_DEST_SA 

004032: Apr 28 09:57:51.167: ISAKMP:(1004):deleting SA reason "Death by retransmission throw" state (R) QM_IDLE       (peer [IP-client]) 
004033: Apr 28 09:57:51.167: ISAKMP (1004): returning address 192.168.0.223 to pool 
004034: Apr 28 09:57:51.167: ISAKMP: Unlocking peer struct 0x48D14CD4 for isadb_mark_sa_deleted(), count 0 
004035: Apr 28 09:57:51.167: crypto_ikmp_dpd_refcount_zero: Freeing dpd profile_name PROFIL_IKE 
004036: Apr 28 09:57:51.167: ISAKMP: returning address 192.168.0.223 to pool 
004037: Apr 28 09:57:51.167: ISAKMP: Deleting peer node by peer_reap for [IP-client]: 48D14CD4 
004038: Apr 28 09:57:51.167: ISAKMP: returning address 192.168.0.223 to pool 
004039: Apr 28 09:57:51.167: ISAKMP:(1004):deleting node -671883512 error FALSE reason "IKE deleted" 
004040: Apr 28 09:57:51.167: ISAKMP:(1004):deleting node -303455399 error FALSE reason "IKE deleted" 
004041: Apr 28 09:57:51.167: ISAKMP:(1004):Input = IKE_MESG_FROM_PEER, IKE_MM_EXCH 
004042: Apr 28 09:57:51.167: ISAKMP:(1004):Old State = IKE_DEST_SA  New State = IKE_DEST_SA 

004043: Apr 28 09:58:00.439: ISAKMP:(1004):purging node -397863734 

1 Reply 1

knet40001
Level 1
Level 1

Sorry, that answer alone on your posts, but maybe someone toss an idea.

I went to the version of IOS: c2800nm-adventerprisek9-mz.124-25g.bin
I have no problem breaking, nor any retransmission phase 2 - but I want to run on 15.1.x 

Previously, he was soft:
c2800nm-advsecurityk9-mz.151-4.M7

And also I tried to c2800nm-advsecurityk9-mz.151-4.M9