Jan 10 20:40:26: ISAKMP-PAK: (0):received packet from 10.101.1.10 dport 500 sport 500 Global (N) NEW SA
Jan 10 20:40:26: ISAKMP: (0):Created a peer struct for 10.101.1.10, peer port 500
Jan 10 20:40:26: ISAKMP: (0):New peer created peer = 0x1752DF48 peer_handle = 0x80327127
Jan 10 20:40:26: ISAKMP: (0):Locking peer struct 0x1752DF48, refcount 1 for crypto_isakmp_process_block
Jan 10 20:40:26: ISAKMP: (0):local port 500, remote port 500
Jan 10 20:40:26: ISAKMP: (0):Find a dup sa in the avl tree during calling isadb_insert sa = 13E4004C
Jan 10 20:40:26: ISAKMP: (0):Input = IKE_MESG_FROM_PEER, IKE_MM_EXCH
Jan 10 20:40:26: ISAKMP: (0):Old State = IKE_READY New State = IKE_R_MM1
Jan 10 20:40:26: ISAKMP: (0):processing SA payload. message ID = 0
Jan 10 20:40:26: ISAKMP: (0):processing vendor id payload
Jan 10 20:40:26: ISAKMP: (0):vendor ID seems Unity/DPD but major 215 mismatch
Jan 10 20:40:26: ISAKMP: (0):vendor ID is XAUTH
Jan 10 20:40:26: ISAKMP: (0):processing vendor id payload
Jan 10 20:40:26: ISAKMP: (0):vendor ID is DPD
Jan 10 20:40:26: ISAKMP: (0):processing vendor id payload
Jan 10 20:40:26: ISAKMP: (0):processing IKE frag vendor id payload
Jan 10 20:40:26: ISAKMP: (0):Support for IKE Fragmentation not enabled
Jan 10 20:40:26: ISAKMP: (0):processing vendor id payload
Jan 10 20:40:26: ISAKMP: (0):vendor ID seems Unity/DPD but major 69 mismatch
Jan 10 20:40:26: ISAKMP: (0):vendor ID is NAT-T RFC 3947
Jan 10 20:40:26: ISAKMP: (0):processing vendor id payload
Jan 10 20:40:26: ISAKMP: (0):vendor ID seems Unity/DPD but major 123 mismatch
Jan 10 20:40:26: ISAKMP: (0):vendor ID is NAT-T v2
Jan 10 20:40:26: ISAKMP: (0):found peer pre-shared key matching 10.101.1.10
Jan 10 20:40:26: ISAKMP: (0):local preshared key found
Jan 10 20:40:26: ISAKMP: (0):Checking ISAKMP transform 1 against priority 25 policy
Jan 10 20:40:26: ISAKMP: (0): encryption 3DES-CBC
Jan 10 20:40:26: ISAKMP: (0): hash SHA
Jan 10 20:40:26: ISAKMP: (0): default group 2
Jan 10 20:40:26: ISAKMP: (0): auth pre-share
Jan 10 20:40:26: ISAKMP: (0): life type in seconds
Jan 10 20:40:26: ISAKMP: life duration (VPI) of 0x0 0x1 0x4F 0xF0
Jan 10 20:40:26: ISAKMP: (0):atts are acceptable. Next payload is 0
Jan 10 20:40:26: ISAKMP: (0):Acceptable atts:actual life: 86000
Jan 10 20:40:26: ISAKMP: (0):Acceptable atts:life: 0
Jan 10 20:40:26: ISAKMP: (0):Fill atts in sa vpi_length:4
Jan 10 20:40:26: ISAKMP: (0):Fill atts in sa life_in_seconds:86000
Jan 10 20:40:26: ISAKMP: (0):Returning Actual lifetime: 86000
Jan 10 20:40:26: ISAKMP: (0):Started lifetime timer: 86000.
Jan 10 20:40:26: ISAKMP: (0):processing vendor id payload
Jan 10 20:40:26: ISAKMP: (0):vendor ID seems Unity/DPD but major 215 mismatch
Jan 10 20:40:26: ISAKMP: (0):vendor ID is XAUTH
Jan 10 20:40:26: ISAKMP: (0):processing vendor id payload
Jan 10 20:40:26: ISAKMP: (0):vendor ID is DPD
Jan 10 20:40:26: ISAKMP: (0):processing vendor id payload
Jan 10 20:40:26: ISAKMP: (0):processing IKE frag vendor id payload
Jan 10 20:40:26: ISAKMP: (0):Support for IKE Fragmentation not enabled
Jan 10 20:40:26: ISAKMP: (0):processing vendor id payload
Jan 10 20:40:26: ISAKMP: (0):vendor ID seems Unity/DPD but major 69 mismatch
Jan 10 20:40:26: ISAKMP: (0):vendor ID is NAT-T RFC 3947
Jan 10 20:40:26: ISAKMP: (0):processing vendor id payload
Jan 10 20:40:26: ISAKMP: (0):vendor ID seems Unity/DPD but major 123 mismatch
Jan 10 20:40:26: ISAKMP: (0):vendor ID is NAT-T v2
Jan 10 20:40:26: ISAKMP: (0):Input = IKE_MESG_INTERNAL, IKE_PROCESS_MAIN_MODE
Jan 10 20:40:26: ISAKMP: (0):Old State = IKE_R_MM1 New State = IKE_R_MM1
Jan 10 20:40:26: ISAKMP: (0):constructed NAT-T vendor-rfc3947 ID
Jan 10 20:40:26: ISAKMP-PAK: (0):sending packet to 10.101.1.10 my_port 500 peer_port 500 (R) MM_SA_SETUP
Jan 10 20:40:26: ISAKMP: (0):Sending an IKE IPv4 Packet.
Jan 10 20:40:26: ISAKMP: (0):Input = IKE_MESG_INTERNAL, IKE_PROCESS_COMPLETE
Jan 10 20:40:26: ISAKMP: (0):Old State = IKE_R_MM1 New State = IKE_R_MM2
Jan 10 20:40:27: ISAKMP-PAK: (0):received packet from 10.101.1.10 dport 500 sport 500 Global (R) MM_SA_SETUP
Jan 10 20:40:27: ISAKMP: (0):Input = IKE_MESG_FROM_PEER, IKE_MM_EXCH
Jan 10 20:40:27: ISAKMP: (0):Old State = IKE_R_MM2 New State = IKE_R_MM3
Jan 10 20:40:27: ISAKMP: (0):processing KE payload. message ID = 0
Jan 10 20:40:27: ISAKMP: (0):processing NONCE payload. message ID = 0
Jan 10 20:40:27: ISAKMP: (0):found peer pre-shared key matching 10.101.1.10
Jan 10 20:40:27: ISAKMP: (15288):received payload type 20
Jan 10 20:40:27: ISAKMP: (15288):NAT found, both nodes inside NAT
Jan 10 20:40:27: ISAKMP: (15288):received payload type 20
Jan 10 20:40:27: ISAKMP: (15288):NAT found, both nodes inside NAT
Jan 10 20:40:27: ISAKMP: (15288):Input = IKE_MESG_INTERNAL, IKE_PROCESS_MAIN_MODE
Jan 10 20:40:27: ISAKMP: (15288):Old State = IKE_R_MM3 New State = IKE_R_MM3
Jan 10 20:40:27: ISAKMP-PAK: (15288):sending packet to 10.101.1.10 my_port 500 peer_port 500 (R) MM_KEY_EXCH
Jan 10 20:40:27: ISAKMP: (15288):Sending an IKE IPv4 Packet.
Jan 10 20:40:27: ISAKMP: (15288):Input = IKE_MESG_INTERNAL, IKE_PROCESS_COMPLETE
Jan 10 20:40:27: ISAKMP: (15288):Old State = IKE_R_MM3 New State = IKE_R_MM4
Jan 10 20:40:27: ISAKMP-PAK: (15288):received packet from 10.101.1.10 dport 4500 sport 4500 Global (R) MM_KEY_EXCH
Jan 10 20:40:27: ISAKMP: (15288):Input = IKE_MESG_FROM_PEER, IKE_MM_EXCH
Jan 10 20:40:27: ISAKMP: (15288):Old State = IKE_R_MM4 New State = IKE_R_MM5
Jan 10 20:40:27: ISAKMP: (15288):processing ID payload. message ID = 0
Jan 10 20:40:27: ISAKMP: (15288):ID payload
next-payload : 8
type : 1
Jan 10 20:40:27: ISAKMP: (15288): address : 10.101.1.10
Jan 10 20:40:27: ISAKMP: (15288): protocol : 0
port : 0
length : 12
Jan 10 20:40:27: ISAKMP: (15288):processing HASH payload. message ID = 0
Jan 10 20:40:27: ISAKMP: (15288):processing NOTIFY INITIAL_CONTACT protocol 1
spi 0, message ID = 0, sa = 0x13E4004C
Jan 10 20:40:27: ISAKMP: (15288):SA authentication status:
authenticated
Jan 10 20:40:27: ISAKMP: (15288):SA has been authenticated with 10.101.1.10
Jan 10 20:40:27: ISAKMP: (15288):Detected port floating to port = 4500
Jan 10 20:40:27: ISAKMP: (15288):Trying to find existing peer192.168.170.254/10.101.1.10/4500/
Jan 10 20:40:27: ISAKMP: (15288):SA authentication status:
authenticated
Jan 10 20:40:27: ISAKMP: (15288):Process initial contact,
bring down existing phase 1 and 2 SA's with local192.168.170.254 remote 10.101.1.10 remote port 4500
Jan 10 20:40:27: ISAKMP: (0):Trying to insert a peer192.168.170.254/10.101.1.10/4500/,
Jan 10 20:40:27: ISAKMP: (0): and inserted successfully 1752DF48.
Jan 10 20:40:27: ISAKMP: (15288):Setting UDP ENC peer struct 0x102168DC sa= 0x13E4004C
Jan 10 20:40:27: ISAKMP: (15288):Input = IKE_MESG_INTERNAL, IKE_PROCESS_MAIN_MODE
Jan 10 20:40:27: ISAKMP: (15288):Old State = IKE_R_MM5 New State = IKE_R_MM5
Jan 10 20:40:27: ISAKMP: (15288):SA is doing
Jan 10 20:40:27: ISAKMP: (15288):pre-shared key authentication using id type ID_IPV4_ADDR
Jan 10 20:40:27: ISAKMP: (15288):ID payload
next-payload : 8
type : 1
Jan 10 20:40:27: ISAKMP: (15288): address :192.168.170.254
Jan 10 20:40:27: ISAKMP: (15288): protocol : 17
port : 0
length : 12
Jan 10 20:40:27: ISAKMP: (15288):Total payload length: 12
Jan 10 20:40:27: ISAKMP-PAK: (15288):sending packet to 10.101.1.10 my_port 4500 peer_port 4500 (R) MM_KEY_EXCH
Jan 10 20:40:27: ISAKMP: (15288):Sending an IKE IPv4 Packet.
Jan 10 20:40:27: ISAKMP: (15288):Input = IKE_MESG_INTERNAL, IKE_PROCESS_COMPLETE
Jan 10 20:40:27: ISAKMP: (15288):Old State = IKE_R_MM5 New State = IKE_P1_COMPLETE
Jan 10 20:40:27: ISAKMP: (15288):IKE_DPD is enabled, initializing timers
Jan 10 20:40:27: ISAKMP: (15288):Input = IKE_MESG_INTERNAL, IKE_PHASE1_COMPLETE
Jan 10 20:40:27: ISAKMP: (15288):Old State = IKE_P1_COMPLETE New State = IKE_P1_COMPLETE
Jan 10 20:40:27: ISAKMP-PAK: (15288):received packet from 10.101.1.10 dport 4500 sport 4500 Global (R) QM_IDLE
Jan 10 20:40:27: ISAKMP: (15288):set new node -1813728279 to QM_IDLE
Jan 10 20:40:27: ISAKMP: (15288):processing HASH payload. message ID = 2481239017
Jan 10 20:40:27: ISAKMP: (15288):processing DELETE payload. message ID = 2481239017
Jan 10 20:40:27: ISAKMP: (15288):peer does not do paranoid keepalives.
Jan 10 20:40:27: ISAKMP: (15288):deleting SA reason "No reason" state (R) QM_IDLE (peer 10.101.1.10)
Jan 10 20:40:27: ISAKMP: (15288):deleting node -1813728279 error FALSE reason "Informational (in) state 1"
Jan 10 20:40:27: IPSec: Key engine got a KEY_MGR_CHECK_MORE_SAS message
Jan 10 20:40:27: ISAKMP (15288): IPSec has no more SA's with this peer. Won't keepalive phase 1.
Jan 10 20:40:27: ISAKMP: (15288):set new node 603792729 to QM_IDLE
Jan 10 20:40:27: ISAKMP-PAK: (15288):sending packet to 10.101.1.10 my_port 4500 peer_port 4500 (R) QM_IDLE
Jan 10 20:40:27: ISAKMP: (15288):Sending an IKE IPv4 Packet.
Jan 10 20:40:27: ISAKMP: (15288):purging node 603792729
Jan 10 20:40:27: ISAKMP: (15288):Input = IKE_MESG_INTERNAL, IKE_PHASE1_DEL
Jan 10 20:40:27: ISAKMP: (15288):Old State = IKE_P1_COMPLETE New State = IKE_DEST_SA
Jan 10 20:40:27: ISAKMP: (15288):deleting SA reason "No reason" state (R) QM_IDLE (peer 10.101.1.10)
Jan 10 20:40:27: ISAKMP: (0):Unlocking peer struct 0x1752DF48 for isadb_mark_sa_deleted(), count 0
Jan 10 20:40:27: ISAKMP: (0):Deleting peer node by peer_reap for 10.101.1.10: 1752DF48
Jan 10 20:40:27: ISAKMP: (15288):Input = IKE_MESG_FROM_PEER, IKE_MM_EXCH
Jan 10 20:40:27: ISAKMP: (15288):Old State = IKE_DEST_SA New State = IKE_DEST_SA
Jan 10 20:40:27: ISAKMP: (15286):purging SA., sa=1065BC8, delme=1065BC8