Jun 15 14:08:41 [IKEv1]: IP = , IKE_DECODE RECEIVED Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + VENDOR (13) + VENDOR (13) + VENDOR (13) + NONE (0) total length : 160
Jun 15 14:08:41 [IKEv1 DEBUG]: IP = , processing SA payload
Jun 15 14:08:41 [IKEv1 DEBUG]: IP = , Oakley proposal is acceptable
Jun 15 14:08:41 [IKEv1 DEBUG]: IP = , processing VID payload
Jun 15 14:08:41 [IKEv1 DEBUG]: IP = , Received NAT-Traversal ver 03 VID
Jun 15 14:08:41 [IKEv1 DEBUG]: IP = , processing VID payload
Jun 15 14:08:41 [IKEv1 DEBUG]: IP = , processing VID payload
Jun 15 14:08:41 [IKEv1 DEBUG]: IP = , processing VID payload
Jun 15 14:08:41 [IKEv1 DEBUG]: IP = , Received DPD VID
Jun 15 14:08:41 [IKEv1 DEBUG]: IP = , processing IKE SA payload
Jun 15 14:08:41 [IKEv1 DEBUG]: IP = , IKE SA Proposal # 1, Transform # 0 acceptable Matches global IKE entry # 5
Jun 15 14:08:41 [IKEv1 DEBUG]: IP = , constructing ISAKMP SA payload
Jun 15 14:08:41 [IKEv1 DEBUG]: IP = , constructing NAT-Traversal VID ver 03 payload
Jun 15 14:08:41 [IKEv1 DEBUG]: IP = , constructing Fragmentation VID + extended capabilities payload
Jun 15 14:08:41 [IKEv1]: IP = , IKE_DECODE SENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + VENDOR (13) + NONE (0) total length : 124
Jun 15 14:08:41 [IKEv1]: IP = , IKE_DECODE RECEIVED Message (msgid=0) with payloads : HDR + KE (4) + NONCE (10) + NAT-D (130) + NAT-D (130) + NONE (0) total length : 228
Jun 15 14:08:41 [IKEv1 DEBUG]: IP = , processing ke payload
Jun 15 14:08:41 [IKEv1 DEBUG]: IP = , processing ISA_KE payload
Jun 15 14:08:41 [IKEv1 DEBUG]: IP = , processing nonce payload
Jun 15 14:08:41 [IKEv1 DEBUG]: IP = , processing NAT-Discovery payload
Jun 15 14:08:41 [IKEv1 DEBUG]: IP = , computing NAT Discovery hash
Jun 15 14:08:41 [IKEv1 DEBUG]: IP = , processing NAT-Discovery payload
Jun 15 14:08:41 [IKEv1 DEBUG]: IP = , computing NAT Discovery hash
Jun 15 14:08:41 [IKEv1 DEBUG]: IP = , constructing ke payload
Jun 15 14:08:41 [IKEv1 DEBUG]: IP = , constructing nonce payload
Jun 15 14:08:41 [IKEv1 DEBUG]: IP = , constructing Cisco Unity VID payload
Jun 15 14:08:41 [IKEv1 DEBUG]: IP = , constructing xauth V6 VID payload
Jun 15 14:08:41 [IKEv1 DEBUG]: IP = , Send IOS VID
Jun 15 14:08:41 [IKEv1 DEBUG]: IP = , Constructing ASA spoofing IOS Vendor ID payload (version: 1.0.0, capabilities: 20000001)
Jun 15 14:08:41 [IKEv1 DEBUG]: IP = , constructing VID payload
Jun 15 14:08:41 [IKEv1 DEBUG]: IP = , Send Altiga/Cisco VPN3000/Cisco ASA GW VID
Jun 15 14:08:41 [IKEv1 DEBUG]: IP = , constructing NAT-Discovery payload
Jun 15 14:08:41 [IKEv1 DEBUG]: IP = , computing NAT Discovery hash
Jun 15 14:08:41 [IKEv1 DEBUG]: IP = , constructing NAT-Discovery payload
Jun 15 14:08:41 [IKEv1 DEBUG]: IP = , computing NAT Discovery hash
Jun 15 14:08:41 [IKEv1]: IP = , Connection landed on tunnel_group DefaultL2LGroup
Jun 15 14:08:41 [IKEv1 DEBUG]: Group = DefaultL2LGroup, IP = , Generating keys for Responder...
Jun 15 14:08:41 [IKEv1]: IP = , IKE_DECODE SENDING Message (msgid=0) with payloads : HDR + KE (4) + NONCE (10) + VENDOR (13) + VENDOR (13) + VENDOR (13) + VENDOR (13) + NAT-D (130) + NAT-D (130) + NONE (0) total length : 304
Jun 15 14:08:41 [IKEv1]: IP = , IKE_DECODE RECEIVED Message (msgid=0) with payloads : HDR + ID (5) + HASH (8) + NONE (0) total length : 64
Jun 15 14:08:41 [IKEv1 DEBUG]: Group = DefaultL2LGroup, IP = , processing ID payload
Jun 15 14:08:41 [IKEv1 DECODE]: Group = DefaultL2LGroup, IP = , ID_IPV4_ADDR ID received
192.168.2.102
Jun 15 14:08:41 [IKEv1 DEBUG]: Group = DefaultL2LGroup, IP = , processing hash payload
Jun 15 14:08:41 [IKEv1 DEBUG]: Group = DefaultL2LGroup, IP = , Computing hash for ISAKMP
Jun 15 14:08:41 [IKEv1]: Group = DefaultL2LGroup, IP = , Automatic NAT Detection Status: Remote end IS behind a NAT device This end is NOT behind a NAT device
Jun 15 14:08:41 [IKEv1]: IP = , Connection landed on tunnel_group DefaultL2LGroup
Jun 15 14:08:41 [IKEv1 DEBUG]: Group = DefaultL2LGroup, IP = , constructing ID payload
Jun 15 14:08:41 [IKEv1 DEBUG]: Group = DefaultL2LGroup, IP = , constructing hash payload
Jun 15 14:08:41 [IKEv1 DEBUG]: Group = DefaultL2LGroup, IP = , Computing hash for ISAKMP
Jun 15 14:08:41 [IKEv1 DEBUG]: Group = DefaultL2LGroup, IP = , constructing dpd vid payload
Jun 15 14:08:41 [IKEv1]: IP = , IKE_DECODE SENDING Message (msgid=0) with payloads : HDR + ID (5) + HASH (8) + VENDOR (13) + NONE (0) total length : 84
Jun 15 14:08:41 [IKEv1]: Group = DefaultL2LGroup, IP = , PHASE 1 COMPLETED
Jun 15 14:08:41 [IKEv1]: IP = , Keep-alive type for this connection: DPD
Jun 15 14:08:41 [IKEv1 DEBUG]: Group = DefaultL2LGroup, IP = , Starting P1 rekey timer: 21600 seconds.
Jun 15 14:08:41 [IKEv1 DECODE]: IP = , IKE Responder starting QM: msg id = 660136e6
Jun 15 14:08:41 [IKEv1]: IP = , IKE_DECODE RECEIVED Message (msgid=660136e6) with payloads : HDR + HASH (8) + SA (1) + NONCE (10) + ID (5) + ID (5) + NONE (0) total length : 196
Jun 15 14:08:41 [IKEv1 DEBUG]: Group = DefaultL2LGroup, IP = , processing hash payload
Jun 15 14:08:41 [IKEv1 DEBUG]: Group = DefaultL2LGroup, IP = , processing SA payload
Jun 15 14:08:41 [IKEv1 DEBUG]: Group = DefaultL2LGroup, IP = , processing nonce payload
Jun 15 14:08:41 [IKEv1 DEBUG]: Group = DefaultL2LGroup, IP = , processing ID payload
Jun 15 14:08:41 [IKEv1 DECODE]: Group = DefaultL2LGroup, IP = , ID_IPV4_ADDR_SUBNET ID received--192.168.2.16--255.255.255.248
Jun 15 14:08:41 [IKEv1]: Group = DefaultL2LGroup, IP = , Received remote IP Proxy Subnet data in ID Payload: Address 192.168.2.16, Mask 255.255.255.248, Protocol 0, Port 0
Jun 15 14:08:41 [IKEv1 DEBUG]: Group = DefaultL2LGroup, IP = , processing ID payload
Jun 15 14:08:41 [IKEv1 DECODE]: Group = DefaultL2LGroup, IP = , ID_IPV4_ADDR_SUBNET ID received--10.0.0.0--255.0.0.0
Jun 15 14:08:41 [IKEv1]: Group = DefaultL2LGroup, IP = , Received local IP Proxy Subnet data in ID Payload: Address 10.0.0.0, Mask 255.0.0.0, Protocol 0, Port 0
Jun 15 14:08:41 [IKEv1]: Group = DefaultL2LGroup, IP = , QM IsRekeyed old sa not found by addr
Jun 15 14:08:41 [IKEv1]: Group = DefaultL2LGroup, IP = , Static Crypto Map check, checking map = remoteVPN, seq = 40...
Jun 15 14:08:41 [IKEv1]: Group = DefaultL2LGroup, IP = , Static Crypto Map check, map = remoteVPN, seq = 40, ACL does not match proxy IDs src:192.168.2.16 dst:10.0.0.0
Jun 15 14:08:41 [IKEv1 DEBUG]: Group = DefaultL2LGroup, IP = , Selecting only UDP-Encapsulated-Tunnel and UDP-Encapsulated-Transport modes defined by NAT-Traversal
Jun 15 14:08:41 [IKEv1]: Group = DefaultL2LGroup, IP = , IKE Remote Peer configured for crypto map: remoteIPSEC
Jun 15 14:08:41 [IKEv1 DEBUG]: Group = DefaultL2LGroup, IP = , processing IPSec SA payload
Jun 15 14:08:41 [IKEv1 DEBUG]: Group = DefaultL2LGroup, IP = , IPSec SA Proposal # 0, Transform # 0 acceptable Matches global IPSec SA entry # 1
Jun 15 14:08:41 [IKEv1]: Group = DefaultL2LGroup, IP = , IKE: requesting SPI!
Jun 15 14:08:41 [IKEv1 DEBUG]: Group = DefaultL2LGroup, IP = , IKE got SPI from key engine: SPI = 0x93c61514
Jun 15 14:08:41 [IKEv1 DEBUG]: Group = DefaultL2LGroup, IP = , oakley constucting quick mode
Jun 15 14:08:41 [IKEv1 DEBUG]: Group = DefaultL2LGroup, IP = , constructing blank hash payload
Jun 15 14:08:41 [IKEv1 DEBUG]: Group = DefaultL2LGroup, IP = , constructing IPSec SA payload
Jun 15 14:08:41 [IKEv1 DEBUG]: Group = DefaultL2LGroup, IP = , constructing IPSec nonce payload
Jun 15 14:08:41 [IKEv1 DEBUG]: Group = DefaultL2LGroup, IP = , constructing proxy ID
Jun 15 14:08:41 [IKEv1 DEBUG]: Group = DefaultL2LGroup, IP = , Transmitting Proxy Id:
Remote subnet: 192.168.2.16 Mask 255.255.255.248 Protocol 0 Port 0
Local subnet: 10.0.0.0 mask 255.0.0.0 Protocol 0 Port 0
Jun 15 14:08:41 [IKEv1 DEBUG]: Group = DefaultL2LGroup, IP = , constructing qm hash payload
Jun 15 14:08:41 [IKEv1 DECODE]: Group = DefaultL2LGroup, IP = , IKE Responder sending 2nd QM pkt: msg id = 660136e6
Jun 15 14:08:41 [IKEv1]: IP = , IKE_DECODE SENDING Message (msgid=660136e6) with payloads : HDR + HASH (8) + SA (1) + NONCE (10) + ID (5) + ID (5) + NONE (0) total length : 160
Jun 15 14:08:43 [IKEv1]: IP = , IKE_DECODE RECEIVED Message (msgid=660136e6) with payloads : HDR + HASH (8) + NONE (0) total length : 52
Jun 15 14:08:43 [IKEv1 DEBUG]: Group = DefaultL2LGroup, IP = , processing hash payload
Jun 15 14:08:43 [IKEv1 DEBUG]: Group = DefaultL2LGroup, IP = , loading all IPSEC SAs
Jun 15 14:08:43 [IKEv1 DEBUG]: Group = DefaultL2LGroup, IP = , Generating Quick Mode Key!
Jun 15 14:08:43 [IKEv1 DEBUG]: Group = DefaultL2LGroup, IP = , NP encrypt rule look up for crypto map remoteIPSEC 1 matching ACL Unknown: returned cs_id=ad385890; rule=00000000
Jun 15 14:08:43 [IKEv1 DEBUG]: Group = DefaultL2LGroup, IP = , Generating Quick Mode Key!
Jun 15 14:08:43 [IKEv1 DEBUG]: Group = DefaultL2LGroup, IP = , NP encrypt rule look up for crypto map remoteIPSEC 1 matching ACL Unknown: returned cs_id=ad385890; rule=00000000
Jun 15 14:08:43 [IKEv1]: Group = DefaultL2LGroup, IP = , Security negotiation complete for LAN-to-LAN Group (DefaultL2LGroup) Responder, Inbound SPI = 0x93c61514, Outbound SPI = 0x1e8d4b4b
Jun 15 14:08:43 [IKEv1 DEBUG]: Group = DefaultL2LGroup, IP = , IKE got a KEY_ADD msg for SA: SPI = 0x1e8d4b4b
Jun 15 14:08:43 [IKEv1 DEBUG]: Group = DefaultL2LGroup, IP = , Pitcher: received KEY_UPDATE, spi 0x93c61514
Jun 15 14:08:43 [IKEv1 DEBUG]: Group = DefaultL2LGroup, IP = , Starting P2 rekey timer: 27358 seconds.
Jun 15 14:08:43 [IKEv1]: Group = DefaultL2LGroup, IP = , PHASE 2 COMPLETED (msgid=660136e6)
Jun 15 14:08:43 [IKEv1]: Group = DefaultL2LGroup, IP = , Adding static route for L2L peer coming in on a dynamic map. address: 192.168.2.16, mask: 255.255.255.248
Jun 15 14:08:43 [IKEv1 DECODE]: IP = , IKE Responder starting QM: msg id = 101acf86
Jun 15 14:08:43 [IKEv1]: IP = , IKE_DECODE RECEIVED Message (msgid=101acf86) with payloads : HDR + HASH (8) + SA (1) + NONCE (10) + ID (5) + ID (5) + NONE (0) total length : 196
Jun 15 14:08:43 [IKEv1 DEBUG]: Group = DefaultL2LGroup, IP = , processing hash payload
Jun 15 14:08:43 [IKEv1 DEBUG]: Group = DefaultL2LGroup, IP = , processing SA payload
Jun 15 14:08:43 [IKEv1 DEBUG]: Group = DefaultL2LGroup, IP = , processing nonce payload
Jun 15 14:08:43 [IKEv1 DEBUG]: Group = DefaultL2LGroup, IP = , processing ID payload
Jun 15 14:08:43 [IKEv1 DECODE]: Group = DefaultL2LGroup, IP = , ID_IPV4_ADDR_SUBNET ID received--192.168.2.16--255.255.255.248
Jun 15 14:08:43 [IKEv1]: Group = DefaultL2LGroup, IP = , Received remote IP Proxy Subnet data in ID Payload: Address 192.168.2.16, Mask 255.255.255.248, Protocol 0, Port 0
Jun 15 14:08:43 [IKEv1 DEBUG]: Group = DefaultL2LGroup, IP = , processing ID payload
Jun 15 14:08:43 [IKEv1 DECODE]: Group = DefaultL2LGroup, IP = , ID_IPV4_ADDR_SUBNET ID received--10.0.0.0--255.0.0.0
Jun 15 14:08:43 [IKEv1]: Group = DefaultL2LGroup, IP = , Received local IP Proxy Subnet data in ID Payload: Address 10.0.0.0, Mask 255.0.0.0, Protocol 0, Port 0
Jun 15 14:08:43 [IKEv1]: Group = DefaultL2LGroup, IP = , Static Crypto Map check, checking map = remoteVPN, seq = 40...
Jun 15 14:08:43 [IKEv1]: Group = DefaultL2LGroup, IP = , Static Crypto Map check, map = remoteVPN, seq = 40, ACL does not match proxy IDs src:192.168.2.16 dst:10.0.0.0
Jun 15 14:08:43 [IKEv1 DEBUG]: Group = DefaultL2LGroup, IP = , Selecting only UDP-Encapsulated-Tunnel and UDP-Encapsulated-Transport modes defined by NAT-Traversal
Jun 15 14:08:43 [IKEv1]: Group = DefaultL2LGroup, IP = , IKE Remote Peer configured for crypto map: remoteIPSEC
Jun 15 14:08:43 [IKEv1 DEBUG]: Group = DefaultL2LGroup, IP = , processing IPSec SA payload
Jun 15 14:08:43 [IKEv1 DEBUG]: Group = DefaultL2LGroup, IP = , IPSec SA Proposal # 0, Transform # 0 acceptable Matches global IPSec SA entry # 1
Jun 15 14:08:43 [IKEv1]: Group = DefaultL2LGroup, IP = , IKE: requesting SPI!
Jun 15 14:08:43 [IKEv1 DEBUG]: Group = DefaultL2LGroup, IP = , Active unit process rekey delete event for remote peer .
Jun 15 14:08:43 [IKEv1 DEBUG]: Group = DefaultL2LGroup, IP = , IKE got SPI from key engine: SPI = 0xc048d54a
Jun 15 14:08:43 [IKEv1 DEBUG]: Group = DefaultL2LGroup, IP = , oakley constucting quick mode
Jun 15 14:08:43 [IKEv1 DEBUG]: Group = DefaultL2LGroup, IP = , constructing blank hash payload
Jun 15 14:08:43 [IKEv1 DEBUG]: Group = DefaultL2LGroup, IP = , constructing IPSec SA payload
Jun 15 14:08:43 [IKEv1 DEBUG]: Group = DefaultL2LGroup, IP = , constructing IPSec nonce payload
Jun 15 14:08:43 [IKEv1 DEBUG]: Group = DefaultL2LGroup, IP = , constructing proxy ID
Jun 15 14:08:43 [IKEv1 DEBUG]: Group = DefaultL2LGroup, IP = , Transmitting Proxy Id:
Remote subnet: 192.168.2.16 Mask 255.255.255.248 Protocol 0 Port 0
Local subnet: 10.0.0.0 mask 255.0.0.0 Protocol 0 Port 0
Jun 15 14:08:43 [IKEv1 DEBUG]: Group = DefaultL2LGroup, IP = , constructing qm hash payload
Jun 15 14:08:43 [IKEv1 DECODE]: Group = DefaultL2LGroup, IP = , IKE Responder sending 2nd QM pkt: msg id = 101acf86
Jun 15 14:08:43 [IKEv1]: IP = , IKE_DECODE SENDING Message (msgid=101acf86) with payloads : HDR + HASH (8) + SA (1) + NONCE (10) + ID (5) + ID (5) + NONE (0) total length : 160
Jun 15 14:08:43 [IKEv1]: IP = , IKE_DECODE RECEIVED Message (msgid=101acf86) with payloads : HDR + HASH (8) + NONE (0) total length : 52
Jun 15 14:08:43 [IKEv1 DEBUG]: Group = DefaultL2LGroup, IP = , processing hash payload
Jun 15 14:08:43 [IKEv1 DEBUG]: Group = DefaultL2LGroup, IP = , loading all IPSEC SAs
Jun 15 14:08:43 [IKEv1 DEBUG]: Group = DefaultL2LGroup, IP = , Generating Quick Mode Key!
Jun 15 14:08:43 [IKEv1 DEBUG]: Group = DefaultL2LGroup, IP = , NP encrypt rule look up for crypto map remoteIPSEC 1 matching ACL Unknown: returned cs_id=ad385890; rule=00000000
Jun 15 14:08:43 [IKEv1 DEBUG]: Group = DefaultL2LGroup, IP = , Generating Quick Mode Key!
Jun 15 14:08:43 [IKEv1 DEBUG]: Group = DefaultL2LGroup, IP = , NP encrypt rule look up for crypto map remoteIPSEC 1 matching ACL Unknown: returned cs_id=ad385890; rule=00000000
Jun 15 14:08:43 [IKEv1]: Group = DefaultL2LGroup, IP = , Security negotiation complete for LAN-to-LAN Group (DefaultL2LGroup) Responder, Inbound SPI = 0xc048d54a, Outbound SPI = 0x1e8d4b4c
Jun 15 14:08:43 [IKEv1 DEBUG]: Group = DefaultL2LGroup, IP = , IKE got a KEY_ADD msg for SA: SPI = 0x1e8d4b4c
Jun 15 14:08:43 [IKEv1 DEBUG]: Group = DefaultL2LGroup, IP = , Pitcher: received KEY_UPDATE, spi 0xc048d54a
Jun 15 14:08:43 [IKEv1 DEBUG]: Group = DefaultL2LGroup, IP = , Starting P2 rekey timer: 27360 seconds.
Jun 15 14:08:43 [IKEv1]: Group = DefaultL2LGroup, IP = , PHASE 2 COMPLETED (msgid=101acf86)
Jun 15 14:08:43 [IKEv1]: Group = DefaultL2LGroup, IP = , Adding static route for L2L peer coming in on a dynamic map. address: 192.168.2.16, mask: 255.255.255.248
Jun 15 14:08:43 [IKEv1]: IP = , IKE_DECODE RECEIVED Message (msgid=9fedaced) with payloads : HDR + HASH (8) + DELETE (12) + NONE (0) total length : 68
Jun 15 14:08:43 [IKEv1 DEBUG]: Group = DefaultL2LGroup, IP = , processing hash payload
Jun 15 14:08:43 [IKEv1 DEBUG]: Group = DefaultL2LGroup, IP = , processing delete
Jun 15 14:08:43 [IKEv1]: Group = DefaultL2LGroup, IP = , Connection terminated for peer DefaultL2LGroup. Reason: Peer Terminate Remote Proxy 192.168.2.16, Local Proxy 10.0.0.0
Jun 15 14:08:43 [IKEv1 DEBUG]: Group = DefaultL2LGroup, IP = , Active unit receives a delete event for remote peer .
Jun 15 14:08:43 [IKEv1 DEBUG]: Group = DefaultL2LGroup, IP = , IKE Deleting SA: Remote Proxy 192.168.2.16, Local Proxy 10.0.0.0
Jun 15 14:08:43 [IKEv1 DEBUG]: Pitcher: received key delete msg, spi 0xc048d54a
Jun 15 14:08:43 [IKEv1 DEBUG]: Pitcher: received key delete msg, spi 0xc048d54a
Jun 15 14:08:43 [IKEv1 DEBUG]: Pitcher: received key delete msg, spi 0x1e8d4b4c
Jun 15 14:08:44 [IKEv1]: IP = , IKE_DECODE RECEIVED Message (msgid=5d1605d1) with payloads : HDR + HASH (8) + DELETE (12) + NONE (0) total length : 68
Jun 15 14:08:44 [IKEv1 DEBUG]: Group = DefaultL2LGroup, IP = , processing hash payload
Jun 15 14:08:44 [IKEv1 DEBUG]: Group = DefaultL2LGroup, IP = , processing delete
Jun 15 14:08:44 [IKEv1]: Group = DefaultL2LGroup, IP = , IKE Received delete for rekeyed centry IKE peer: 192.168.2.16, centry addr: ae5c4b20, msgid: 0x660136e6
Jun 15 14:08:44 [IKEv1]: IP = , IKE_DECODE RECEIVED Message (msgid=bd3d15a) with payloads : HDR + HASH (8) + DELETE (12) + NONE (0) total length : 80
Jun 15 14:08:44 [IKEv1 DEBUG]: Group = DefaultL2LGroup, IP = , processing hash payload
Jun 15 14:08:44 [IKEv1 DEBUG]: Group = DefaultL2LGroup, IP = , processing delete
Jun 15 14:08:44 [IKEv1]: Group = DefaultL2LGroup, IP = , Connection terminated for peer DefaultL2LGroup. Reason: Peer Terminate Remote Proxy N/A, Local Proxy N/A
Jun 15 14:08:44 [IKEv1 DEBUG]: Group = DefaultL2LGroup, IP = , Active unit receives a delete event for remote peer .
Jun 15 14:08:44 [IKEv1 DEBUG]: Group = DefaultL2LGroup, IP = , IKE Deleting SA: Remote Proxy 192.168.2.16, Local Proxy 10.0.0.0
Jun 15 14:08:44 [IKEv1]: Group = DefaultL2LGroup, IP = , Deleting static route for L2L peer that came in on a dynamic map. address: 192.168.2.16, mask: 255.255.255.248
Jun 15 14:08:44 [IKEv1]: MSG_FSM_QM lookup failed (handle 660136e6)!
Jun 15 14:08:44 [IKEv1 DEBUG]: Group = DefaultL2LGroup, IP = , IKE SA MM:1c75c630 terminating: flags 0x01000802, refcnt 0, tuncnt 0
Jun 15 14:08:44 [IKEv1]: Group = DefaultL2LGroup, IP = , Session is being torn down. Reason: User Requested
Jun 15 14:08:44 [IKEv1]: Ignoring msg to mark SA with dsID 4358144 dead because SA deleted
Jun 15 14:08:44 [IKEv1 DEBUG]: Pitcher: received key delete msg, spi 0x93c61514
Jun 15 14:08:44 [IKEv1 DEBUG]: Pitcher: received key delete msg, spi 0x1e8d4b4b