cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
3239
Views
0
Helpful
3
Replies

IKE MM Initiator FSM error history (struct &amp;0x000000ffcc241ea0) <state>, <event>: MM_DONE, EV_ERROR-->MM_WAIT_MSG6, EV_PROB_AUTH_FAIL-->MM_WAIT_MSG6, EV_TI-truncated-

BGFIT40686
Level 1
Level 1

Hello I am new in a company and I was asked to configure a vpn. I configured as it was requested but I keep getting this error. 

My equipement is a cisco firepower.

 

Message #493 : May 20 09:51:37 [IKEv1 DEBUG]Message #494 : Group = X.X.X.29, IP = X.X.X.29, IKE MM Initiator FSM error history (struct &amp;0x000000ffcc241ea0) <state>, <event>: MM_DONE, EV_ERROR-->MM_WAIT_MSG6, EV_PROB_AUTH_FAIL-->MM_WAIT_MSG6, EV_TI-truncated-

 

Can anyone please tell me where the problem is.

 

IKEv1 SAs:

Active SA: 1
Rekey SA: 0 (A tunnel will report 1 Active and 1 Rekey SA during rekey)
Total IKE SA: 1

1 IKE Peer: X.X.X.29
Type : L2L Role : initiator
Rekey : no State : MM_WAIT_MSG6

3 Replies 3

@BGFIT40686 

If PSK doesn’t match, initiator stays at MM_WAIT_MSG6....I'd double check and re-enter the pre-shared key on both ends.

I have tried it but nothing changed

Below is my full debugs

 

Message #1 : May 19 15:09:03 [IKEv1 DEBUG]Message #2 : IP = X.X.X.29, processing ke payload
Message #3 : May 19 15:09:03 [IKEv1 DEBUG]Message #4 : IP = X.X.X.29, processing ISA_KE payload
Message #5 : May 19 15:09:03 [IKEv1 DEBUG]Message #6 : IP = X.X.X.29, processing nonce payload
Message #7 : May 19 15:09:03 [IKEv1 DEBUG]Message #8 : IP = X.X.X.29, processing NAT-Discovery payload
Message #9 : May 19 15:09:03 [IKEv1 DEBUG]Message #10 : IP = X.X.X.29, computing NAT Discovery hash
Message #11 : May 19 15:09:03 [IKEv1 DEBUG]Message #12 : IP = X.X.X.29, processing NAT-Discovery payload
Message #13 : May 19 15:09:03 [IKEv1 DEBUG]Message #14 : IP = X.X.X.29, computing NAT Discovery hash
Message #15 : May 19 15:09:03 [IKEv1]Message #16 : IP = X.X.X.29, Connection landed on tunnel_group X.X.X.29
Message #17 : May 19 15:09:03 [IKEv1 DEBUG]Message #18 : Group = X.X.X.29, IP = X.X.X.29, Generating keys for Initiator...
Message #19 : May 19 15:09:03 [IKEv1 DEBUG]Message #20 : Group = X.X.X.29, IP = X.X.X.29, constructing ID payload
Message #21 : May 19 15:09:03 [IKEv1 DEBUG]Message #22 : Group = X.X.X.29, IP = X.X.X.29, constructing hash payload
Message #23 : May 19 15:09:03 [IKEv1 DEBUG]Message #24 : Group = X.X.X.29, IP = X.X.X.29, Computing hash for ISAKMP
Message #25 : May 19 15:09:03 [IKEv1 DEBUG]Message #26 : Group = X.X.X.29, IP = X.X.X.29, constructing dpd vid payload
Message #27 : May 19 15:09:03 [IKEv1]Message #28 : IP = X.X.X.29, IKE_DECODE SENDING Message (msgid=0) with payloads : HDR + ID (5) + HASH (8) + VENDOR (13) + NONE (0) total length : 84
Message #29 : May 19 15:09:03 [IKEv1]Message #30 : Group = X.X.X.29, IP = X.X.X.29, Automatic NAT Detection Status: Remote end IS behind a NAT device This end IS behind a NAT device
Message #31 : May 19 15:09:03 [IKEv1]Message #32 : Group = X.X.X.29, IP = X.X.X.29, Floating NAT-T to port 4500
Message #33 : May 19 15:09:35 [IKEv1 DEBUG]Message #34 : Group = X.X.X.29, IP = X.X.X.29, IKE MM Initiator FSM error history (struct &amp;0x000000ffc5c95950) <state>, <event>: MM_DONE, EV_ERROR-->MM_WAIT_MSG6, EV_PROB_AUTH_FAIL-->MM_WAIT_MSG6, EV_TI-truncated-
Message #35 : May 19 15:09:35 [IKEv1 DEBUG]Message #36 : Group = X.X.X.29, IP = X.X.X.29, IKE SA MM:c8b0b861 terminating: flags 0x01008022, refcnt 0, tuncnt 0
Message #37 : May 19 15:09:35 [IKEv1 DEBUG]Message #38 : Group = X.X.X.29, IP = X.X.X.29, sending delete/delete with reason message
Message #39 : May 19 15:09:35 [IKEv1 DEBUG]Message #40 : Group = X.X.X.29, IP = X.X.X.29, constructing blank hash payload
Message #41 : May 19 15:09:35 [IKEv1 DEBUG]Message #42 : Group = X.X.X.29, IP = X.X.X.29, constructing IKE delete payload
Message #43 : May 19 15:09:35 [IKEv1 DEBUG]Message #44 : Group = X.X.X.29, IP = X.X.X.29, constructing qm hash payload
Message #45 : May 19 15:09:35 [IKEv1]Message #46 : IP = X.X.X.29, IKE_DECODE SENDING Message (msgid=50adbcd) with payloads : HDR + HASH (8) + DELETE (12) + NONE (0) total length : 80
Message #47 : May 19 15:09:35 [IKEv1]Message #48 : Group = X.X.X.29, IP = X.X.X.29, Warning: Ignoring IKE SA (dst) without VM bit set
Message #49 : May 19 15:09:38 [IKEv1]Message #50 : IP = X.X.X.29, IKE Initiator: New Phase 1, Intf inside, IKE Peer X.X.X.29 local Proxy Address 10.245.0.11, remote Proxy Address 192.168.1.0, Crypto map (s2sCryptoMap)
Message #51 : May 19 15:09:38 [IKEv1 DEBUG]Message #52 : IP = X.X.X.29, constructing ISAKMP SA payload
Message #53 : May 19 15:09:38 [IKEv1 DEBUG]Message #54 : IP = X.X.X.29, constructing NAT-Traversal VID ver 02 payload
Message #55 : May 19 15:09:38 [IKEv1 DEBUG]Message #56 : IP = X.X.X.29, constructing NAT-Traversal VID ver 03 payload
Message #57 : May 19 15:09:38 [IKEv1 DEBUG]Message #58 : IP = X.X.X.29, constructing NAT-Traversal VID ver RFC payload
Message #59 : May 19 15:09:38 [IKEv1 DEBUG]Message #60 : IP = X.X.X.29, constructing Fragmentation VID + extended capabilities payload
Message #61 : May 19 15:09:38 [IKEv1]Message #62 : IP = X.X.X.29, IKE_DECODE SENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + VENDOR (13) + VENDOR (13) + VENDOR (13) + NONE (0) total length : 172
Message #63 : May 19 15:09:38 [IKEv1]Message #64 : IP = X.X.X.29, IKE_DECODE RECEIVED Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + VENDOR (13) + VENDOR (13) + VENDOR (13) + NONE (0) total length : 160
Message #65 : May 19 15:09:38 [IKEv1 DEBUG]Message #66 : IP = X.X.X.29, processing SA payload
Message #67 : May 19 15:09:38 [IKEv1 DEBUG]Message #68 : IP = X.X.X.29, Oakley proposal is acceptable
Message #69 : May 19 15:09:38 [IKEv1 DEBUG]Message #70 : IP = X.X.X.29, processing VID payload
Message #71 : May 19 15:09:38 [IKEv1 DEBUG]Message #72 : IP = X.X.X.29, Received xauth V6 VID
Message #73 : May 19 15:09:38 [IKEv1 DEBUG]Message #74 : IP = X.X.X.29, processing VID payload
Message #75 : May 19 15:09:38 [IKEv1 DEBUG]Message #76 : IP = X.X.X.29, Received DPD VID
Message #77 : May 19 15:09:38 [IKEv1 DEBUG]Message #78 : IP = X.X.X.29, processing VID payload
Message #79 : May 19 15:09:38 [IKEv1 DEBUG]Message #80 : IP = X.X.X.29, Received Fragmentation VID
Message #81 : May 19 15:09:38 [IKEv1 DEBUG]Message #82 : IP = X.X.X.29, IKE Peer included IKE fragmentation capability flags: Main Mode: True Aggressive Mode: False
Message #83 : May 19 15:09:38 [IKEv1 DEBUG]Message #84 : IP = X.X.X.29, processing VID payload
Message #85 : May 19 15:09:38 [IKEv1 DEBUG]Message #86 : IP = X.X.X.29, Received NAT-Traversal RFC VID
Message #87 : May 19 15:09:38 [IKEv1 DEBUG]Message #88 : IP = X.X.X.29, constructing ke payload
Message #89 : May 19 15:09:38 [IKEv1 DEBUG]Message #90 : IP = X.X.X.29, constructing nonce payload
Message #91 : May 19 15:09:38 [IKEv1 DEBUG]Message #92 : IP = X.X.X.29, constructing Cisco Unity VID payload
Message #93 : May 19 15:09:38 [IKEv1 DEBUG]Message #94 : IP = X.X.X.29, constructing xauth V6 VID payload
Message #95 : May 19 15:09:38 [IKEv1 DEBUG]Message #96 : IP = X.X.X.29, Send IOS VID
Message #97 : May 19 15:09:38 [IKEv1 DEBUG]Message #98 : IP = X.X.X.29, Constructing ASA spoofing IOS Vendor ID payload (version: 1.0.0, capabilities: 20000001)
Message #99 : May 19 15:09:38 [IKEv1 DEBUG]Message #100 : IP = X.X.X.29, constructing VID payload
Message #101 : May 19 15:09:38 [IKEv1 DEBUG]Message #102 : IP = X.X.X.29, Send Altiga/Cisco VPN3000/Cisco ASA GW VID
Message #103 : May 19 15:09:38 [IKEv1 DEBUG]Message #104 : IP = X.X.X.29, constructing NAT-Discovery payload
Message #105 : May 19 15:09:38 [IKEv1 DEBUG]Message #106 : IP = X.X.X.29, computing NAT Discovery hash
Message #107 : May 19 15:09:38 [IKEv1 DEBUG]Message #108 : IP = X.X.X.29, constructing NAT-Discovery payload
Message #109 : May 19 15:09:38 [IKEv1 DEBUG]Message #110 : IP = X.X.X.29, computing NAT Discovery hash
Message #111 : May 19 15:09:38 [IKEv1]Message #112 : IP = X.X.X.29, IKE_DECODE SENDING Message (msgid=0) with payloads : HDR + KE (4) + NONCE (10) + VENDOR (13) + VENDOR (13) + VENDOR (13) + VENDOR (13) + NAT-D (20) + NAT-D (20) + NONE (0) total le-truncated-
Message #113 : May 19 15:09:38 [IKEv1]Message #114 : IP = X.X.X.29, IKE_DECODE RECEIVED Message (msgid=0) with payloads : HDR + KE (4) + NONCE (10) + NAT-D (20) + NAT-D (20) + NONE (0) total length : 308
Message #115 : May 19 15:09:38 [IKEv1 DEBUG]Message #116 : IP = X.X.X.29, processing ke payload
Message #117 : May 19 15:09:38 [IKEv1 DEBUG]Message #118 : IP = X.X.X.29, processing ISA_KE payload
Message #119 : May 19 15:09:38 [IKEv1 DEBUG]Message #120 : IP = X.X.X.29, processing nonce payload
Message #121 : May 19 15:09:38 [IKEv1 DEBUG]Message #122 : IP = X.X.X.29, processing NAT-Discovery payload
Message #123 : May 19 15:09:38 [IKEv1 DEBUG]Message #124 : IP = X.X.X.29, computing NAT Discovery hash
Message #125 : May 19 15:09:38 [IKEv1 DEBUG]Message #126 : IP = X.X.X.29, processing NAT-Discovery payload
Message #127 : May 19 15:09:38 [IKEv1 DEBUG]Message #128 : IP = X.X.X.29, computing NAT Discovery hash
Message #129 : May 19 15:09:38 [IKEv1]Message #130 : IP = X.X.X.29, Connection landed on tunnel_group X.X.X.29
Message #131 : May 19 15:09:38 [IKEv1 DEBUG]Message #132 : Group = X.X.X.29, IP = X.X.X.29, Generating keys for Initiator...
Message #133 : May 19 15:09:38 [IKEv1 DEBUG]Message #134 : Group = X.X.X.29, IP = X.X.X.29, constructing ID payload
Message #135 : May 19 15:09:38 [IKEv1 DEBUG]Message #136 : Group = X.X.X.29, IP = X.X.X.29, constructing hash payload
Message #137 : May 19 15:09:38 [IKEv1 DEBUG]Message #138 : Group = X.X.X.29, IP = X.X.X.29, Computing hash for ISAKMP
Message #139 : May 19 15:09:38 [IKEv1 DEBUG]Message #140 : Group = X.X.X.29, IP = X.X.X.29, constructing dpd vid payload
Message #141 : May 19 15:09:38 [IKEv1]Message #142 : IP = X.X.X.29, IKE_DECODE SENDING Message (msgid=0) with payloads : HDR + ID (5) + HASH (8) + VENDOR (13) + NONE (0) total length : 84
Message #143 : May 19 15:09:38 [IKEv1]Message #144 : Group = X.X.X.29, IP = X.X.X.29, Automatic NAT Detection Status: Remote end IS behind a NAT device This end IS behind a NAT device
Message #145 : May 19 15:09:38 [IKEv1]Message #146 : Group = X.X.X.29, IP = X.X.X.29, Floating NAT-T to port 4500
Message #147 : May 20 09:41:31 [IKEv1]Message #148 : IP = X.X.X.29, IKE Initiator: New Phase 1, Intf inside, IKE Peer X.X.X.29 local Proxy Address 10.245.0.11, remote Proxy Address 192.168.86.0, Crypto map (s2sCryptoMap)
Message #149 : May 20 09:41:31 [IKEv1 DEBUG]Message #150 : IP = X.X.X.29, constructing ISAKMP SA payload
Message #151 : May 20 09:41:31 [IKEv1 DEBUG]Message #152 : IP = X.X.X.29, constructing NAT-Traversal VID ver 02 payload
Message #153 : May 20 09:41:31 [IKEv1 DEBUG]Message #154 : IP = X.X.X.29, constructing NAT-Traversal VID ver 03 payload
Message #155 : May 20 09:41:31 [IKEv1 DEBUG]Message #156 : IP = X.X.X.29, constructing NAT-Traversal VID ver RFC payload
Message #157 : May 20 09:41:31 [IKEv1 DEBUG]Message #158 : IP = X.X.X.29, constructing Fragmentation VID + extended capabilities payload
Message #159 : May 20 09:41:31 [IKEv1]Message #160 : IP = X.X.X.29, IKE_DECODE SENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + VENDOR (13) + VENDOR (13) + VENDOR (13) + NONE (0) total length : 172
Message #161 : May 20 09:41:32 [IKEv1]Message #162 : IP = X.X.X.29, IKE_DECODE RECEIVED Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + VENDOR (13) + VENDOR (13) + VENDOR (13) + NONE (0) total length : 164
Message #163 : May 20 09:41:32 [IKEv1 DEBUG]Message #164 : IP = X.X.X.29, processing SA payload
Message #165 : May 20 09:41:32 [IKEv1 DEBUG]Message #166 : IP = X.X.X.29, Oakley proposal is acceptable
Message #167 : May 20 09:41:32 [IKEv1 DEBUG]Message #168 : IP = X.X.X.29, processing VID payload
Message #169 : May 20 09:41:32 [IKEv1 DEBUG]Message #170 : IP = X.X.X.29, Received xauth V6 VID
Message #171 : May 20 09:41:32 [IKEv1 DEBUG]Message #172 : IP = X.X.X.29, processing VID payload
Message #173 : May 20 09:41:32 [IKEv1 DEBUG]Message #174 : IP = X.X.X.29, Received DPD VID
Message #175 : May 20 09:41:32 [IKEv1 DEBUG]Message #176 : IP = X.X.X.29, processing VID payload
Message #177 : May 20 09:41:32 [IKEv1 DEBUG]Message #178 : IP = X.X.X.29, Received Fragmentation VID
Message #179 : May 20 09:41:32 [IKEv1 DEBUG]Message #180 : IP = X.X.X.29, IKE Peer included IKE fragmentation capability flags: Main Mode: True Aggressive Mode: False
Message #181 : May 20 09:41:32 [IKEv1 DEBUG]Message #182 : IP = X.X.X.29, processing VID payload
Message #183 : May 20 09:41:32 [IKEv1 DEBUG]Message #184 : IP = X.X.X.29, Received NAT-Traversal RFC VID
Message #185 : May 20 09:41:32 [IKEv1 DEBUG]Message #186 : IP = X.X.X.29, constructing ke payload
Message #187 : May 20 09:41:32 [IKEv1 DEBUG]Message #188 : IP = X.X.X.29, constructing nonce payload
Message #189 : May 20 09:41:32 [IKEv1 DEBUG]Message #190 : IP = X.X.X.29, constructing Cisco Unity VID payload
Message #191 : May 20 09:41:32 [IKEv1 DEBUG]Message #192 : IP = X.X.X.29, constructing xauth V6 VID payload
Message #193 : May 20 09:41:32 [IKEv1 DEBUG]Message #194 : IP = X.X.X.29, Send IOS VID
Message #195 : May 20 09:41:32 [IKEv1 DEBUG]Message #196 : IP = X.X.X.29, Constructing ASA spoofing IOS Vendor ID payload (version: 1.0.0, capabilities: 20000001)
Message #197 : May 20 09:41:32 [IKEv1 DEBUG]Message #198 : IP = X.X.X.29, constructing VID payload
Message #199 : May 20 09:41:32 [IKEv1 DEBUG]Message #200 : IP = X.X.X.29, Send Altiga/Cisco VPN3000/Cisco ASA GW VID
Message #201 : May 20 09:41:32 [IKEv1 DEBUG]Message #202 : IP = X.X.X.29, constructing NAT-Discovery payload
Message #203 : May 20 09:41:32 [IKEv1 DEBUG]Message #204 : IP = X.X.X.29, computing NAT Discovery hash
Message #205 : May 20 09:41:32 [IKEv1 DEBUG]Message #206 : IP = X.X.X.29, constructing NAT-Discovery payload
Message #207 : May 20 09:41:32 [IKEv1 DEBUG]Message #208 : IP = X.X.X.29, computing NAT Discovery hash
Message #209 : May 20 09:41:32 [IKEv1]Message #210 : IP = X.X.X.29, IKE_DECODE SENDING Message (msgid=0) with payloads : HDR + KE (4) + NONCE (10) + VENDOR (13) + VENDOR (13) + VENDOR (13) + VENDOR (13) + NAT-D (20) + NAT-D (20) + NONE (0) total le-truncated-
Message #211 : May 20 09:41:32 [IKEv1]Message #212 : IP = X.X.X.29, IKE_DECODE RECEIVED Message (msgid=0) with payloads : HDR + KE (4) + NONCE (10) + NAT-D (20) + NAT-D (20) + NONE (0) total length : 308
Message #213 : May 20 09:41:32 [IKEv1 DEBUG]Message #214 : IP = X.X.X.29, processing ke payload
Message #215 : May 20 09:41:32 [IKEv1 DEBUG]Message #216 : IP = X.X.X.29, processing ISA_KE payload
Message #217 : May 20 09:41:32 [IKEv1 DEBUG]Message #218 : IP = X.X.X.29, processing nonce payload
Message #219 : May 20 09:41:32 [IKEv1 DEBUG]Message #220 : IP = X.X.X.29, processing NAT-Discovery payload
Message #221 : May 20 09:41:32 [IKEv1 DEBUG]Message #222 : IP = X.X.X.29, computing NAT Discovery hash
Message #223 : May 20 09:41:32 [IKEv1 DEBUG]Message #224 : IP = X.X.X.29, processing NAT-Discovery payload
Message #225 : May 20 09:41:32 [IKEv1 DEBUG]Message #226 : IP = X.X.X.29, computing NAT Discovery hash
Message #227 : May 20 09:41:32 [IKEv1]Message #228 : IP = X.X.X.29, Connection landed on tunnel_group X.X.X.29
Message #229 : May 20 09:41:32 [IKEv1 DEBUG]Message #230 : Group = X.X.X.29, IP = X.X.X.29, Generating keys for Initiator...
Message #231 : May 20 09:41:32 [IKEv1 DEBUG]Message #232 : Group = X.X.X.29, IP = X.X.X.29, constructing ID payload
Message #233 : May 20 09:41:32 [IKEv1 DEBUG]Message #234 : Group = X.X.X.29, IP = X.X.X.29, constructing hash payload
Message #235 : May 20 09:41:32 [IKEv1 DEBUG]Message #236 : Group = X.X.X.29, IP = X.X.X.29, Computing hash for ISAKMP
Message #237 : May 20 09:41:32 [IKEv1 DEBUG]Message #238 : Group = X.X.X.29, IP = X.X.X.29, constructing dpd vid payload
Message #239 : May 20 09:41:32 [IKEv1]Message #240 : IP = X.X.X.29, IKE_DECODE SENDING Message (msgid=0) with payloads : HDR + ID (5) + HASH (8) + VENDOR (13) + NONE (0) total length : 84
Message #241 : May 20 09:41:32 [IKEv1]Message #242 : Group = X.X.X.29, IP = X.X.X.29, Automatic NAT Detection Status: Remote end IS behind a NAT device This end IS behind a NAT device
Message #243 : May 20 09:41:32 [IKEv1]Message #244 : Group = X.X.X.29, IP = X.X.X.29, Floating NAT-T to port 4500
Message #245 : May 20 09:42:04 [IKEv1 DEBUG]Message #246 : Group = X.X.X.29, IP = X.X.X.29, IKE MM Initiator FSM error history (struct &amp;0x000000ffc85d6ae0) <state>, <event>: MM_DONE, EV_ERROR-->MM_WAIT_MSG6, EV_PROB_AUTH_FAIL-->MM_WAIT_MSG6, EV_TI-truncated-
Message #247 : May 20 09:42:04 [IKEv1 DEBUG]Message #248 : Group = X.X.X.29, IP = X.X.X.29, IKE SA MM:e1fbd602 terminating: flags 0x01008022, refcnt 0, tuncnt 0
Message #249 : May 20 09:42:04 [IKEv1 DEBUG]Message #250 : Group = X.X.X.29, IP = X.X.X.29, sending delete/delete with reason message
Message #251 : May 20 09:42:04 [IKEv1 DEBUG]Message #252 : Group = X.X.X.29, IP = X.X.X.29, constructing blank hash payload
Message #253 : May 20 09:42:04 [IKEv1 DEBUG]Message #254 : Group = X.X.X.29, IP = X.X.X.29, constructing IKE delete payload
Message #255 : May 20 09:42:04 [IKEv1 DEBUG]Message #256 : Group = X.X.X.29, IP = X.X.X.29, constructing qm hash payload
Message #257 : May 20 09:42:04 [IKEv1]Message #258 : IP = X.X.X.29, IKE_DECODE SENDING Message (msgid=700b9930) with payloads : HDR + HASH (8) + DELETE (12) + NONE (0) total length : 80
Message #259 : May 20 09:42:04 [IKEv1]Message #260 : Group = X.X.X.29, IP = X.X.X.29, Warning: Ignoring IKE SA (dst) without VM bit set
Message #261 : May 20 09:42:06 [IKEv1]Message #262 : IP = X.X.X.29, IKE Initiator: New Phase 1, Intf inside, IKE Peer X.X.X.29 local Proxy Address 10.245.0.11, remote Proxy Address 192.168.86.0, Crypto map (s2sCryptoMap)
Message #263 : May 20 09:42:06 [IKEv1 DEBUG]Message #264 : IP = X.X.X.29, constructing ISAKMP SA payload
Message #265 : May 20 09:42:06 [IKEv1 DEBUG]Message #266 : IP = X.X.X.29, constructing NAT-Traversal VID ver 02 payload
Message #267 : May 20 09:42:06 [IKEv1 DEBUG]Message #268 : IP = X.X.X.29, constructing NAT-Traversal VID ver 03 payload
Message #269 : May 20 09:42:06 [IKEv1 DEBUG]Message #270 : IP = X.X.X.29, constructing NAT-Traversal VID ver RFC payload
Message #271 : May 20 09:42:06 [IKEv1 DEBUG]Message #272 : IP = X.X.X.29, constructing Fragmentation VID + extended capabilities payload
Message #273 : May 20 09:42:06 [IKEv1]Message #274 : IP = X.X.X.29, IKE_DECODE SENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + VENDOR (13) + VENDOR (13) + VENDOR (13) + NONE (0) total length : 172
Message #275 : May 20 09:42:14 [IKEv1]Message #276 : IP = X.X.X.29, IKE_DECODE RESENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + VENDOR (13) + VENDOR (13) + VENDOR (13) + NONE (0) total length : 172
Message #277 : May 20 09:42:22 [IKEv1]Message #278 : IP = X.X.X.29, IKE_DECODE RESENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + VENDOR (13) + VENDOR (13) + VENDOR (13) + NONE (0) total length : 172
Message #279 : May 20 09:42:23 [IKEv1]Message #280 : IP = X.X.X.29, IKE_DECODE RECEIVED Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + VENDOR (13) + VENDOR (13) + VENDOR (13) + NONE (0) total length : 164
Message #281 : May 20 09:42:23 [IKEv1 DEBUG]Message #282 : IP = X.X.X.29, processing SA payload
Message #283 : May 20 09:42:23 [IKEv1 DEBUG]Message #284 : IP = X.X.X.29, Oakley proposal is acceptable
Message #285 : May 20 09:42:23 [IKEv1 DEBUG]Message #286 : IP = X.X.X.29, processing VID payload
Message #287 : May 20 09:42:23 [IKEv1 DEBUG]Message #288 : IP = X.X.X.29, Received xauth V6 VID
Message #289 : May 20 09:42:23 [IKEv1 DEBUG]Message #290 : IP = X.X.X.29, processing VID payload
Message #291 : May 20 09:42:23 [IKEv1 DEBUG]Message #292 : IP = X.X.X.29, Received DPD VID
Message #293 : May 20 09:42:23 [IKEv1 DEBUG]Message #294 : IP = X.X.X.29, processing VID payload
Message #295 : May 20 09:42:23 [IKEv1 DEBUG]Message #296 : IP = X.X.X.29, Received Fragmentation VID
Message #297 : May 20 09:42:23 [IKEv1 DEBUG]Message #298 : IP = X.X.X.29, IKE Peer included IKE fragmentation capability flags: Main Mode: True Aggressive Mode: False
Message #299 : May 20 09:42:23 [IKEv1 DEBUG]Message #300 : IP = X.X.X.29, processing VID payload
Message #301 : May 20 09:42:23 [IKEv1 DEBUG]Message #302 : IP = X.X.X.29, Received NAT-Traversal RFC VID
Message #303 : May 20 09:42:23 [IKEv1 DEBUG]Message #304 : IP = X.X.X.29, constructing ke payload
Message #305 : May 20 09:42:23 [IKEv1 DEBUG]Message #306 : IP = X.X.X.29, constructing nonce payload
Message #307 : May 20 09:42:23 [IKEv1 DEBUG]Message #308 : IP = X.X.X.29, constructing Cisco Unity VID payload
Message #309 : May 20 09:42:23 [IKEv1 DEBUG]Message #310 : IP = X.X.X.29, constructing xauth V6 VID payload
Message #311 : May 20 09:42:23 [IKEv1 DEBUG]Message #312 : IP = X.X.X.29, Send IOS VID
Message #313 : May 20 09:42:23 [IKEv1 DEBUG]Message #314 : IP = X.X.X.29, Constructing ASA spoofing IOS Vendor ID payload (version: 1.0.0, capabilities: 20000001)
Message #315 : May 20 09:42:23 [IKEv1 DEBUG]Message #316 : IP = X.X.X.29, constructing VID payload
Message #317 : May 20 09:42:23 [IKEv1 DEBUG]Message #318 : IP = X.X.X.29, Send Altiga/Cisco VPN3000/Cisco ASA GW VID
Message #319 : May 20 09:42:23 [IKEv1 DEBUG]Message #320 : IP = X.X.X.29, constructing NAT-Discovery payload
Message #321 : May 20 09:42:23 [IKEv1 DEBUG]Message #322 : IP = X.X.X.29, computing NAT Discovery hash
Message #323 : May 20 09:42:23 [IKEv1 DEBUG]Message #324 : IP = X.X.X.29, constructing NAT-Discovery payload
Message #325 : May 20 09:42:23 [IKEv1 DEBUG]Message #326 : IP = X.X.X.29, computing NAT Discovery hash
Message #327 : May 20 09:42:23 [IKEv1]Message #328 : IP = X.X.X.29, IKE_DECODE SENDING Message (msgid=0) with payloads : HDR + KE (4) + NONCE (10) + VENDOR (13) + VENDOR (13) + VENDOR (13) + VENDOR (13) + NAT-D (20) + NAT-D (20) + NONE (0) total le-truncated-
Message #329 : May 20 09:42:23 [IKEv1]Message #330 : IP = X.X.X.29, IKE_DECODE RECEIVED Message (msgid=0) with payloads : HDR + KE (4) + NONCE (10) + NAT-D (20) + NAT-D (20) + NONE (0) total length : 308
Message #331 : May 20 09:42:23 [IKEv1 DEBUG]Message #332 : IP = X.X.X.29, processing ke payload
Message #333 : May 20 09:42:23 [IKEv1 DEBUG]Message #334 : IP = X.X.X.29, processing ISA_KE payload
Message #335 : May 20 09:42:23 [IKEv1 DEBUG]Message #336 : IP = X.X.X.29, processing nonce payload
Message #337 : May 20 09:42:23 [IKEv1 DEBUG]Message #338 : IP = X.X.X.29, processing NAT-Discovery payload
Message #339 : May 20 09:42:23 [IKEv1 DEBUG]Message #340 : IP = X.X.X.29, computing NAT Discovery hash
Message #341 : May 20 09:42:23 [IKEv1 DEBUG]Message #342 : IP = X.X.X.29, processing NAT-Discovery payload
Message #343 : May 20 09:42:23 [IKEv1 DEBUG]Message #344 : IP = X.X.X.29, computing NAT Discovery hash
Message #345 : May 20 09:42:23 [IKEv1]Message #346 : IP = X.X.X.29, Connection landed on tunnel_group X.X.X.29
Message #347 : May 20 09:42:23 [IKEv1 DEBUG]Message #348 : Group = X.X.X.29, IP = X.X.X.29, Generating keys for Initiator...
Message #349 : May 20 09:42:23 [IKEv1 DEBUG]Message #350 : Group = X.X.X.29, IP = X.X.X.29, constructing ID payload
Message #351 : May 20 09:42:23 [IKEv1 DEBUG]Message #352 : Group = X.X.X.29, IP = X.X.X.29, constructing hash payload
Message #353 : May 20 09:42:23 [IKEv1 DEBUG]Message #354 : Group = X.X.X.29, IP = X.X.X.29, Computing hash for ISAKMP
Message #355 : May 20 09:42:23 [IKEv1 DEBUG]Message #356 : Group = X.X.X.29, IP = X.X.X.29, constructing dpd vid payload
Message #357 : May 20 09:42:23 [IKEv1]Message #358 : IP = X.X.X.29, IKE_DECODE SENDING Message (msgid=0) with payloads : HDR + ID (5) + HASH (8) + VENDOR (13) + NONE (0) total length : 84
Message #359 : May 20 09:42:23 [IKEv1]Message #360 : Group = X.X.X.29, IP = X.X.X.29, Automatic NAT Detection Status: Remote end IS behind a NAT device This end IS behind a NAT device
Message #361 : May 20 09:42:23 [IKEv1]Message #362 : Group = X.X.X.29, IP = X.X.X.29, Floating NAT-T to port 4500
Message #363 : May 20 09:50:25 [IKEv1 DEBUG]Message #364 : Group = X.X.X.29, IP = X.X.X.29, IKE MM Initiator FSM error history (struct &amp;0x000000ffc5a9f630) <state>, <event>: MM_DONE, EV_ERROR-->MM_WAIT_MSG6, EV_PROB_AUTH_FAIL-->MM_WAIT_MSG6, EV_TI-truncated-
Message #365 : May 20 09:50:25 [IKEv1 DEBUG]Message #366 : Group = X.X.X.29, IP = X.X.X.29, IKE SA MM:ba18c3f4 terminating: flags 0x01008022, refcnt 0, tuncnt 0
Message #367 : May 20 09:50:25 [IKEv1 DEBUG]Message #368 : Group = X.X.X.29, IP = X.X.X.29, sending delete/delete with reason message
Message #369 : May 20 09:50:25 [IKEv1 DEBUG]Message #370 : Group = X.X.X.29, IP = X.X.X.29, constructing blank hash payload
Message #371 : May 20 09:50:25 [IKEv1 DEBUG]Message #372 : Group = X.X.X.29, IP = X.X.X.29, constructing IKE delete payload
Message #373 : May 20 09:50:25 [IKEv1 DEBUG]Message #374 : Group = X.X.X.29, IP = X.X.X.29, constructing qm hash payload
Message #375 : May 20 09:50:25 [IKEv1]Message #376 : IP = X.X.X.29, IKE_DECODE SENDING Message (msgid=a4f33bc5) with payloads : HDR + HASH (8) + DELETE (12) + NONE (0) total length : 80
Message #377 : May 20 09:50:25 [IKEv1]Message #378 : Group = X.X.X.29, IP = X.X.X.29, Warning: Ignoring IKE SA (dst) without VM bit set
Message #379 : May 20 09:51:02 [IKEv1 DEBUG]Message #380 : Group = X.X.X.29, IP = X.X.X.29, IKE MM Initiator FSM error history (struct &amp;0x000000ffb84e07f0) <state>, <event>: MM_DONE, EV_ERROR-->MM_WAIT_MSG6, EV_PROB_AUTH_FAIL-->MM_WAIT_MSG6, EV_TI-truncated-
Message #381 : May 20 09:51:02 [IKEv1 DEBUG]Message #382 : Group = X.X.X.29, IP = X.X.X.29, IKE SA MM:052cf0e1 terminating: flags 0x01008022, refcnt 0, tuncnt 0
Message #383 : May 20 09:51:02 [IKEv1 DEBUG]Message #384 : Group = X.X.X.29, IP = X.X.X.29, sending delete/delete with reason message
Message #385 : May 20 09:51:02 [IKEv1 DEBUG]Message #386 : Group = X.X.X.29, IP = X.X.X.29, constructing blank hash payload
Message #387 : May 20 09:51:02 [IKEv1 DEBUG]Message #388 : Group = X.X.X.29, IP = X.X.X.29, constructing IKE delete payload
Message #389 : May 20 09:51:02 [IKEv1 DEBUG]Message #390 : Group = X.X.X.29, IP = X.X.X.29, constructing qm hash payload
Message #391 : May 20 09:51:02 [IKEv1]Message #392 : IP = X.X.X.29, IKE_DECODE SENDING Message (msgid=fe16c91b) with payloads : HDR + HASH (8) + DELETE (12) + NONE (0) total length : 80
Message #393 : May 20 09:51:02 [IKEv1]Message #394 : Group = X.X.X.29, IP = X.X.X.29, Warning: Ignoring IKE SA (dst) without VM bit set
Message #395 : May 20 09:51:04 [IKEv1]Message #396 : IP = X.X.X.29, IKE Initiator: New Phase 1, Intf inside, IKE Peer X.X.X.29 local Proxy Address 10.245.0.11, remote Proxy Address 192.168.1.0, Crypto map (s2sCryptoMap)
Message #397 : May 20 09:51:04 [IKEv1 DEBUG]Message #398 : IP = X.X.X.29, constructing ISAKMP SA payload
Message #399 : May 20 09:51:04 [IKEv1 DEBUG]Message #400 : IP = X.X.X.29, constructing NAT-Traversal VID ver 02 payload
Message #401 : May 20 09:51:04 [IKEv1 DEBUG]Message #402 : IP = X.X.X.29, constructing NAT-Traversal VID ver 03 payload
Message #403 : May 20 09:51:04 [IKEv1 DEBUG]Message #404 : IP = X.X.X.29, constructing NAT-Traversal VID ver RFC payload
Message #405 : May 20 09:51:04 [IKEv1 DEBUG]Message #406 : IP = X.X.X.29, constructing Fragmentation VID + extended capabilities payload
Message #407 : May 20 09:51:04 [IKEv1]Message #408 : IP = X.X.X.29, IKE_DECODE SENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + VENDOR (13) + VENDOR (13) + VENDOR (13) + NONE (0) total length : 172
Message #409 : May 20 09:51:05 [IKEv1]Message #410 : IP = X.X.X.29, IKE_DECODE RECEIVED Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + VENDOR (13) + VENDOR (13) + VENDOR (13) + NONE (0) total length : 164
Message #411 : May 20 09:51:05 [IKEv1 DEBUG]Message #412 : IP = X.X.X.29, processing SA payload
Message #413 : May 20 09:51:05 [IKEv1 DEBUG]Message #414 : IP = X.X.X.29, Oakley proposal is acceptable
Message #415 : May 20 09:51:05 [IKEv1 DEBUG]Message #416 : IP = X.X.X.29, processing VID payload
Message #417 : May 20 09:51:05 [IKEv1 DEBUG]Message #418 : IP = X.X.X.29, Received xauth V6 VID
Message #419 : May 20 09:51:05 [IKEv1 DEBUG]Message #420 : IP = X.X.X.29, processing VID payload
Message #421 : May 20 09:51:05 [IKEv1 DEBUG]Message #422 : IP = X.X.X.29, Received DPD VID
Message #423 : May 20 09:51:05 [IKEv1 DEBUG]Message #424 : IP = X.X.X.29, processing VID payload
Message #425 : May 20 09:51:05 [IKEv1 DEBUG]Message #426 : IP = X.X.X.29, Received Fragmentation VID
Message #427 : May 20 09:51:05 [IKEv1 DEBUG]Message #428 : IP = X.X.X.29, IKE Peer included IKE fragmentation capability flags: Main Mode: True Aggressive Mode: False
Message #429 : May 20 09:51:05 [IKEv1 DEBUG]Message #430 : IP = X.X.X.29, processing VID payload
Message #431 : May 20 09:51:05 [IKEv1 DEBUG]Message #432 : IP = X.X.X.29, Received NAT-Traversal RFC VID
Message #433 : May 20 09:51:05 [IKEv1 DEBUG]Message #434 : IP = X.X.X.29, constructing ke payload
Message #435 : May 20 09:51:05 [IKEv1 DEBUG]Message #436 : IP = X.X.X.29, constructing nonce payload
Message #437 : May 20 09:51:05 [IKEv1 DEBUG]Message #438 : IP = X.X.X.29, constructing Cisco Unity VID payload
Message #439 : May 20 09:51:05 [IKEv1 DEBUG]Message #440 : IP = X.X.X.29, constructing xauth V6 VID payload
Message #441 : May 20 09:51:05 [IKEv1 DEBUG]Message #442 : IP = X.X.X.29, Send IOS VID
Message #443 : May 20 09:51:05 [IKEv1 DEBUG]Message #444 : IP = X.X.X.29, Constructing ASA spoofing IOS Vendor ID payload (version: 1.0.0, capabilities: 20000001)
Message #445 : May 20 09:51:05 [IKEv1 DEBUG]Message #446 : IP = X.X.X.29, constructing VID payload
Message #447 : May 20 09:51:05 [IKEv1 DEBUG]Message #448 : IP = X.X.X.29, Send Altiga/Cisco VPN3000/Cisco ASA GW VID
Message #449 : May 20 09:51:05 [IKEv1 DEBUG]Message #450 : IP = X.X.X.29, constructing NAT-Discovery payload
Message #451 : May 20 09:51:05 [IKEv1 DEBUG]Message #452 : IP = X.X.X.29, computing NAT Discovery hash
Message #453 : May 20 09:51:05 [IKEv1 DEBUG]Message #454 : IP = X.X.X.29, constructing NAT-Discovery payload
Message #455 : May 20 09:51:05 [IKEv1 DEBUG]Message #456 : IP = X.X.X.29, computing NAT Discovery hash
Message #457 : May 20 09:51:05 [IKEv1]Message #458 : IP = X.X.X.29, IKE_DECODE SENDING Message (msgid=0) with payloads : HDR + KE (4) + NONCE (10) + VENDOR (13) + VENDOR (13) + VENDOR (13) + VENDOR (13) + NAT-D (20) + NAT-D (20) + NONE (0) total le-truncated-
Message #459 : May 20 09:51:05 [IKEv1]Message #460 : IP = X.X.X.29, IKE_DECODE RECEIVED Message (msgid=0) with payloads : HDR + KE (4) + NONCE (10) + NAT-D (20) + NAT-D (20) + NONE (0) total length : 308
Message #461 : May 20 09:51:05 [IKEv1 DEBUG]Message #462 : IP = X.X.X.29, processing ke payload
Message #463 : May 20 09:51:05 [IKEv1 DEBUG]Message #464 : IP = X.X.X.29, processing ISA_KE payload
Message #465 : May 20 09:51:05 [IKEv1 DEBUG]Message #466 : IP = X.X.X.29, processing nonce payload
Message #467 : May 20 09:51:05 [IKEv1 DEBUG]Message #468 : IP = X.X.X.29, processing NAT-Discovery payload
Message #469 : May 20 09:51:05 [IKEv1 DEBUG]Message #470 : IP = X.X.X.29, computing NAT Discovery hash
Message #471 : May 20 09:51:05 [IKEv1 DEBUG]Message #472 : IP = X.X.X.29, processing NAT-Discovery payload
Message #473 : May 20 09:51:05 [IKEv1 DEBUG]Message #474 : IP = X.X.X.29, computing NAT Discovery hash
Message #475 : May 20 09:51:05 [IKEv1]Message #476 : IP = X.X.X.29, Connection landed on tunnel_group X.X.X.29
Message #477 : May 20 09:51:05 [IKEv1 DEBUG]Message #478 : Group = X.X.X.29, IP = X.X.X.29, Generating keys for Initiator...
Message #479 : May 20 09:51:05 [IKEv1 DEBUG]Message #480 : Group = X.X.X.29, IP = X.X.X.29, constructing ID payload
Message #481 : May 20 09:51:05 [IKEv1 DEBUG]Message #482 : Group = X.X.X.29, IP = X.X.X.29, constructing hash payload
Message #483 : May 20 09:51:05 [IKEv1 DEBUG]Message #484 : Group = X.X.X.29, IP = X.X.X.29, Computing hash for ISAKMP
Message #485 : May 20 09:51:05 [IKEv1 DEBUG]Message #486 : Group = X.X.X.29, IP = X.X.X.29, constructing dpd vid payload
Message #487 : May 20 09:51:05 [IKEv1]Message #488 : IP = X.X.X.29, IKE_DECODE SENDING Message (msgid=0) with payloads : HDR + ID (5) + HASH (8) + VENDOR (13) + NONE (0) total length : 84
Message #489 : May 20 09:51:05 [IKEv1]Message #490 : Group = X.X.X.29, IP = X.X.X.29, Automatic NAT Detection Status: Remote end IS behind a NAT device This end IS behind a NAT device
Message #491 : May 20 09:51:05 [IKEv1]Message #492 : Group = X.X.X.29, IP = X.X.X.29, Floating NAT-T to port 4500
Message #493 : May 20 09:51:37 [IKEv1 DEBUG]Message #494 : Group = X.X.X.29, IP = X.X.X.29, IKE MM Initiator FSM error history (struct &amp;0x000000ffcc241ea0) <state>, <event>: MM_DONE, EV_ERROR-->MM_WAIT_MSG6, EV_PROB_AUTH_FAIL-->MM_WAIT_MSG6, EV_TI-truncated-
Message #495 : May 20 09:51:37 [IKEv1 DEBUG]Message #496 : Group = X.X.X.29, IP = X.X.X.29, IKE SA MM:0249f9c7 terminating: flags 0x01008022, refcnt 0, tuncnt 0
Message #497 : May 20 09:51:37 [IKEv1 DEBUG]Message #498 : Group = X.X.X.29, IP = X.X.X.29, sending delete/delete with reason message
Message #499 : May 20 09:51:37 [IKEv1 DEBUG]Message #500 : Group = X.X.X.29, IP = X.X.X.29, constructing blank hash payload
Message #501 : May 20 09:51:37 [IKEv1 DEBUG]Message #502 : Group = X.X.X.29, IP = X.X.X.29, constructing IKE delete payload
Message #503 : May 20 09:51:37 [IKEv1 DEBUG]Message #504 : Group = X.X.X.29, IP = X.X.X.29, constructing qm hash payload
Message #505 : May 20 09:51:37 [IKEv1]Message #506 : IP = X.X.X.29, IKE_DECODE SENDING Message (msgid=b253dbf0) with payloads : HDR + HASH (8) + DELETE (12) + NONE (0) total length : 80
Message #507 : May 20 09:51:37 [IKEv1]Message #508 : Group = X.X.X.29, IP = X.X.X.29, Warning: Ignoring IKE SA (dst) without VM bit set
Message #509 : May 20 09:51:39 [IKEv1]Message #510 : IP = X.X.X.29, IKE Initiator: New Phase 1, Intf inside, IKE Peer X.X.X.29 local Proxy Address 10.245.0.11, remote Proxy Address 192.168.1.0, Crypto map (s2sCryptoMap)
Message #511 : May 20 09:51:39 [IKEv1 DEBUG]Message #512 : IP = X.X.X.29, constructing ISAKMP SA payload
Message #513 : May 20 09:51:39 [IKEv1 DEBUG]Message #514 : IP = X.X.X.29, constructing NAT-Traversal VID ver 02 payload
Message #515 : May 20 09:51:39 [IKEv1 DEBUG]Message #516 : IP = X.X.X.29, constructing NAT-Traversal VID ver 03 payload
Message #517 : May 20 09:51:39 [IKEv1 DEBUG]Message #518 : IP = X.X.X.29, constructing NAT-Traversal VID ver RFC payload
Message #519 : May 20 09:51:39 [IKEv1 DEBUG]Message #520 : IP = X.X.X.29, constructing Fragmentation VID + extended capabilities payload
Message #521 : May 20 09:51:39 [IKEv1]Message #522 : IP = X.X.X.29, IKE_DECODE SENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + VENDOR (13) + VENDOR (13) + VENDOR (13) + NONE (0) total length : 172
Message #523 : May 20 09:51:40 [IKEv1]Message #524 : IP = X.X.X.29, IKE_DECODE RECEIVED Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + VENDOR (13) + VENDOR (13) + VENDOR (13) + NONE (0) total length : 164
Message #525 : May 20 09:51:40 [IKEv1 DEBUG]Message #526 : IP = X.X.X.29, processing SA payload
Message #527 : May 20 09:51:40 [IKEv1 DEBUG]Message #528 : IP = X.X.X.29, Oakley proposal is acceptable
Message #529 : May 20 09:51:40 [IKEv1 DEBUG]Message #530 : IP = X.X.X.29, processing VID payload
Message #531 : May 20 09:51:40 [IKEv1 DEBUG]Message #532 : IP = X.X.X.29, Received xauth V6 VID
Message #533 : May 20 09:51:40 [IKEv1 DEBUG]Message #534 : IP = X.X.X.29, processing VID payload
Message #535 : May 20 09:51:40 [IKEv1 DEBUG]Message #536 : IP = X.X.X.29, Received DPD VID
Message #537 : May 20 09:51:40 [IKEv1 DEBUG]Message #538 : IP = X.X.X.29, processing VID payload
Message #539 : May 20 09:51:40 [IKEv1 DEBUG]Message #540 : IP = X.X.X.29, Received Fragmentation VID
Message #541 : May 20 09:51:40 [IKEv1 DEBUG]Message #542 : IP = X.X.X.29, IKE Peer included IKE fragmentation capability flags: Main Mode: True Aggressive Mode: False
Message #543 : May 20 09:51:40 [IKEv1 DEBUG]Message #544 : IP = X.X.X.29, processing VID payload
Message #545 : May 20 09:51:40 [IKEv1 DEBUG]Message #546 : IP = X.X.X.29, Received NAT-Traversal RFC VID
Message #547 : May 20 09:51:40 [IKEv1 DEBUG]Message #548 : IP = X.X.X.29, constructing ke payload
Message #549 : May 20 09:51:40 [IKEv1 DEBUG]Message #550 : IP = X.X.X.29, constructing nonce payload
Message #551 : May 20 09:51:40 [IKEv1 DEBUG]Message #552 : IP = X.X.X.29, constructing Cisco Unity VID payload
Message #553 : May 20 09:51:40 [IKEv1 DEBUG]Message #554 : IP = X.X.X.29, constructing xauth V6 VID payload
Message #555 : May 20 09:51:40 [IKEv1 DEBUG]Message #556 : IP = X.X.X.29, Send IOS VID
Message #557 : May 20 09:51:40 [IKEv1 DEBUG]Message #558 : IP = X.X.X.29, Constructing ASA spoofing IOS Vendor ID payload (version: 1.0.0, capabilities: 20000001)
Message #559 : May 20 09:51:40 [IKEv1 DEBUG]Message #560 : IP = X.X.X.29, constructing VID payload
Message #561 : May 20 09:51:40 [IKEv1 DEBUG]Message #562 : IP = X.X.X.29, Send Altiga/Cisco VPN3000/Cisco ASA GW VID
Message #563 : May 20 09:51:40 [IKEv1 DEBUG]Message #564 : IP = X.X.X.29, constructing NAT-Discovery payload
Message #565 : May 20 09:51:40 [IKEv1 DEBUG]Message #566 : IP = X.X.X.29, computing NAT Discovery hash
Message #567 : May 20 09:51:40 [IKEv1 DEBUG]Message #568 : IP = X.X.X.29, constructing NAT-Discovery payload
Message #569 : May 20 09:51:40 [IKEv1 DEBUG]Message #570 : IP = X.X.X.29, computing NAT Discovery hash
Message #571 : May 20 09:51:40 [IKEv1]Message #572 : IP = X.X.X.29, IKE_DECODE SENDING Message (msgid=0) with payloads : HDR + KE (4) + NONCE (10) + VENDOR (13) + VENDOR (13) + VENDOR (13) + VENDOR (13) + NAT-D (20) + NAT-D (20) + NONE (0) total le-truncated-
Message #573 : May 20 09:51:40 [IKEv1]Message #574 : IP = X.X.X.29, IKE_DECODE RECEIVED Message (msgid=0) with payloads : HDR + KE (4) + NONCE (10) + NAT-D (20) + NAT-D (20) + NONE (0) total length : 308
Message #575 : May 20 09:51:40 [IKEv1 DEBUG]Message #576 : IP = X.X.X.29, processing ke payload
Message #577 : May 20 09:51:40 [IKEv1 DEBUG]Message #578 : IP = X.X.X.29, processing ISA_KE payload
Message #579 : May 20 09:51:40 [IKEv1 DEBUG]Message #580 : IP = X.X.X.29, processing nonce payload
Message #581 : May 20 09:51:40 [IKEv1 DEBUG]Message #582 : IP = X.X.X.29, processing NAT-Discovery payload
Message #583 : May 20 09:51:40 [IKEv1 DEBUG]Message #584 : IP = X.X.X.29, computing NAT Discovery hash
Message #585 : May 20 09:51:40 [IKEv1 DEBUG]Message #586 : IP = X.X.X.29, processing NAT-Discovery payload
Message #587 : May 20 09:51:40 [IKEv1 DEBUG]Message #588 : IP = X.X.X.29, computing NAT Discovery hash
Message #589 : May 20 09:51:40 [IKEv1]Message #590 : IP = X.X.X.29, Connection landed on tunnel_group X.X.X.29
Message #591 : May 20 09:51:40 [IKEv1 DEBUG]Message #592 : Group = X.X.X.29, IP = X.X.X.29, Generating keys for Initiator...
Message #593 : May 20 09:51:40 [IKEv1 DEBUG]Message #594 : Group = X.X.X.29, IP = X.X.X.29, constructing ID payload
Message #595 : May 20 09:51:40 [IKEv1 DEBUG]Message #596 : Group = X.X.X.29, IP = X.X.X.29, constructing hash payload
Message #597 : May 20 09:51:40 [IKEv1 DEBUG]Message #598 : Group = X.X.X.29, IP = X.X.X.29, Computing hash for ISAKMP
Message #599 : May 20 09:51:40 [IKEv1 DEBUG]Message #600 : Group = X.X.X.29, IP = X.X.X.29, constructing dpd vid payload
Message #601 : May 20 09:51:40 [IKEv1]Message #602 : IP = X.X.X.29, IKE_DECODE SENDING Message (msgid=0) with payloads : HDR + ID (5) + HASH (8) + VENDOR (13) + NONE (0) total length : 84
Message #603 : May 20 09:51:40 [IKEv1]Message #604 : Group = X.X.X.29, IP = X.X.X.29, Automatic NAT Detection Status: Remote end IS behind a NAT device This end IS behind a NAT device
Message #605 : May 20 09:51:40 [IKEv1]Message #606 : Group = X.X.X.29, IP = X.X.X.29, Floating NAT-T to port 4500