Project

General

Profile

Bug #3047 » IPSEC_log.txt

Robert Holmes, 06/16/2013 05:14 PM

 
1
Jun 16 18:13:28 	racoon: [Self]: INFO: IPsec-SA established: ESP 68.109.226.37[500]->174.231.68.139[500] spi=44713849(0x2aa4779)
2
Jun 16 18:13:28 	racoon: [Self]: INFO: IPsec-SA established: ESP 68.109.226.37[500]->174.231.68.139[500] spi=49539060(0x2f3e7f4)
3
Jun 16 18:13:28 	racoon: INFO: Adjusting peer's encmode UDP-Tunnel(3)->Tunnel(1)
4
Jun 16 18:13:28 	racoon: INFO: Adjusting my encmode UDP-Tunnel->Tunnel
5
Jun 16 18:13:28 	racoon: INFO: Update the generated policy : 10.123.13.1/32[0] 10.123.12.0/24[0] proto=any dir=in
6
Jun 16 18:13:28 	racoon: [Self]: INFO: respond new phase 2 negotiation: 68.109.226.37[4500]<=>174.231.68.139[64636]
7
Jun 16 18:13:27 	racoon: WARNING: Ignored attribute 28683
8
Jun 16 18:13:27 	racoon: WARNING: Ignored attribute INTERNAL_ADDRESS_EXPIRY
9
Jun 16 18:13:27 	racoon: INFO: login succeeded for user "rmh1"
10
Jun 16 18:13:27 	racoon: INFO: Using port 0
11
Jun 16 18:13:26 	racoon: [Self]: INFO: ISAKMP-SA established 68.109.226.37[4500]-174.231.68.139[64636] spi:bb8359d6e0e4afe3:31710d0f0a1cc37a
12
Jun 16 18:13:26 	racoon: INFO: Sending Xauth request
13
Jun 16 18:13:26 	racoon: INFO: NAT detected: ME PEER
14
Jun 16 18:13:26 	racoon: [174.231.68.139] ERROR: notification INITIAL-CONTACT received in aggressive exchange.
15
Jun 16 18:13:26 	racoon: INFO: NAT-D payload #1 doesn't match
16
Jun 16 18:13:26 	racoon: INFO: NAT-D payload #0 doesn't match
17
Jun 16 18:13:26 	racoon: [Self]: INFO: NAT-T: ports changed to: 174.231.68.139[64636]<->68.109.226.37[4500]
18
Jun 16 18:13:26 	racoon: INFO: Adding xauth VID payload.
19
Jun 16 18:13:26 	racoon: [Self]: [68.109.226.37] INFO: Hashing 68.109.226.37[500] with algo #2 (NAT-T forced)
20
Jun 16 18:13:26 	racoon: [174.231.68.139] INFO: Hashing 174.231.68.139[22508] with algo #2 (NAT-T forced)
21
Jun 16 18:13:26 	racoon: INFO: Adding remote and local NAT-D payloads.
22
Jun 16 18:13:26 	racoon: [174.231.68.139] INFO: Selected NAT-T version: RFC 3947
23
Jun 16 18:13:26 	racoon: INFO: received Vendor ID: DPD
24
Jun 16 18:13:26 	racoon: INFO: received Vendor ID: CISCO-UNITY
25
Jun 16 18:13:26 	racoon: INFO: received Vendor ID: draft-ietf-ipsra-isakmp-xauth-06.txt
26
Jun 16 18:13:26 	racoon: INFO: received Vendor ID: draft-ietf-ipsec-nat-t-ike-02
27
Jun 16 18:13:26 	racoon: INFO: received Vendor ID: draft-ietf-ipsec-nat-t-ike-02
28
Jun 16 18:13:26 	racoon: INFO: received Vendor ID: draft-ietf-ipsec-nat-t-ike-03
29
Jun 16 18:13:26 	racoon: INFO: received Vendor ID: draft-ietf-ipsec-nat-t-ike-04
30
Jun 16 18:13:26 	racoon: INFO: received Vendor ID: draft-ietf-ipsec-nat-t-ike-05
31
Jun 16 18:13:26 	racoon: INFO: received Vendor ID: draft-ietf-ipsec-nat-t-ike-06
32
Jun 16 18:13:26 	racoon: INFO: received Vendor ID: draft-ietf-ipsec-nat-t-ike-07
33
Jun 16 18:13:26 	racoon: INFO: received Vendor ID: draft-ietf-ipsec-nat-t-ike-08
34
Jun 16 18:13:26 	racoon: INFO: received Vendor ID: RFC 3947
35
Jun 16 18:13:26 	racoon: INFO: received broken Microsoft ID: FRAGMENTATION
36
Jun 16 18:13:26 	racoon: INFO: begin Aggressive mode.
37
Jun 16 18:13:26 	racoon: [Self]: INFO: respond new phase 1 negotiation: 68.109.226.37[500]<=>174.231.68.139[22508]
38

    
(2-2/3)