Oct 31 15:48:49 69.28.185.2 0: 00:00:09: %LINK-3-UPDOWN: Interface Ethernet0, changed state to up Oct 31 15:48:49 himinbjorg kernel: Oct 31 15:48:49 69.28.185.2 0: 00:00:09: %LINK-3-UPDOWN: Interface Ethernet0, changed state to up Oct 31 15:48:49 69.28.185.2 1: 00:00:09: %LINK-3-UPDOWN: Interface Serial0, changed state to down Oct 31 15:48:49 himinbjorg kernel: Oct 31 15:48:49 69.28.185.2 1: 00:00:09: %LINK-3-UPDOWN: Interface Serial0, changed state to down Oct 31 15:48:49 69.28.185.2 2: 00:00:12: %LINEPROTO-5-UPDOWN: Line protocol on Interface Ethernet0, changed state to up Oct 31 15:48:49 69.28.185.2 3: 00:00:27: %LINEPROTO-5-UPDOWN: Line protocol on Interface Ethernet0, changed state to up Oct 31 15:48:49 69.28.185.2 4: *Feb 28 19:00:31 EST: %LINEPROTO-5-UPDOWN: Line protocol on Interface Tunnel0, changed state to down Oct 31 15:48:49 69.28.185.2 5: *Feb 28 19:00:34 EST: %LINK-5-CHANGED: Interface Serial0, changed state to administratively down Oct 31 15:48:49 69.28.185.2 6: *Feb 28 19:00:35 EST: %LINEPROTO-5-UPDOWN: Line protocol on Interface Serial0, changed state to down Oct 31 15:48:49 69.28.185.2 7: *Feb 28 19:00:36 EST: %SYS-5-CONFIG_I: Configured from memory by console Oct 31 15:48:49 69.28.185.2 8: *Feb 28 19:01:23 EST: %SYS-5-RESTART: System restarted -- Oct 31 15:48:50 69.28.185.2 9: Cisco Internetwork Operating System Software Oct 31 15:48:50 69.28.185.2 10: IOS (tm) 2500 Software (C2500-IK8OS-L), Version 12.2(32), RELEASE SOFTWARE (fc1) Oct 31 15:48:50 69.28.185.2 11: Copyright (c) 1986-2005 by cisco Systems, Inc. Oct 31 15:48:50 69.28.185.2 12: Compiled Fri 02-Dec-05 16:15 by Oct 31 15:48:50 69.28.185.2 13: *Feb 28 19:01:23 EST: %SNMP-5-COLDSTART: SNMP agent on host c2509-1 is undergoing a cold start Oct 31 15:48:50 69.28.185.2 14: Oct 31 15:48:49 EST: %LINEPROTO-5-UPDOWN: Line protocol on Interface Tunnel0, changed state to up Oct 31 15:50:30 69.28.185.2 15: Oct 31 15:50:27 EST: ISAKMP (0:0): received packet from 192.136.64.116 (N) NEW SA Oct 31 15:50:30 69.28.185.2 16: Oct 31 15:50:27 EST: ISAKMP: local port 500, remote port 500 Oct 31 15:50:30 69.28.185.2 17: Oct 31 15:50:27 EST: ISAKMP (0:1): processing SA payload. message ID = 0 Oct 31 15:50:30 69.28.185.2 18: Oct 31 15:50:27 EST: ISAKMP (0:1): found peer pre-shared key matching 192.136.64.116 Oct 31 15:50:30 69.28.185.2 19: Oct 31 15:50:27 EST: ISAKMP (0:1): Checking ISAKMP transform 1 against priority 1 policy Oct 31 15:50:31 69.28.185.2 20: Oct 31 15:50:27 EST: ISAKMP: life type in seconds Oct 31 15:50:31 69.28.185.2 21: Oct 31 15:50:27 EST: ISAKMP: life duration (basic) of 6000 Oct 31 15:50:31 69.28.185.2 22: Oct 31 15:50:27 EST: ISAKMP: encryption DES-CBC Oct 31 15:50:31 69.28.185.2 23: Oct 31 15:50:27 EST: ISAKMP: auth pre-share Oct 31 15:50:31 69.28.185.2 24: Oct 31 15:50:27 EST: ISAKMP: hash MD5 Oct 31 15:50:31 69.28.185.2 25: Oct 31 15:50:27 EST: ISAKMP: default group 2 Oct 31 15:50:31 69.28.185.2 26: Oct 31 15:50:27 EST: ISAKMP (0:1): atts are acceptable. Next payload is 0 Oct 31 15:50:31 69.28.185.2 27: Oct 31 15:50:27 EST: CryptoEngine0: generate alg parameter Oct 31 15:50:31 69.28.185.2 28: Oct 31 15:50:30 EST: CRYPTO_ENGINE: Dh phase 1 status: 0 Oct 31 15:50:31 69.28.185.2 29: Oct 31 15:50:30 EST: CRYPTO_ENGINE: Dh phase 1 status: 0 Oct 31 15:50:31 69.28.185.2 30: Oct 31 15:50:30 EST: ISAKMP (0:1): processing vendor id payload Oct 31 15:50:31 69.28.185.2 31: Oct 31 15:50:30 EST: ISAKMP (0:1): SA is doing pre-shared key authentication using id type ID_IPV4_ADDR Oct 31 15:50:32 69.28.185.2 32: Oct 31 15:50:30 EST: ISAKMP (0:1): sending packet to 192.136.64.116 (R) MM_SA_SETUP Oct 31 15:50:33 69.28.185.2 33: Oct 31 15:50:30 EST: ISAKMP (0:1): received packet from 192.136.64.116 (R) MM_SA_SETUP Oct 31 15:50:34 69.28.185.2 34: Oct 31 15:50:30 EST: ISAKMP (0:1): processing KE payload. message ID = 0 Oct 31 15:50:34 69.28.185.2 35: Oct 31 15:50:30 EST: CryptoEngine0: generate alg parameter Oct 31 15:50:34 69.28.185.2 36: Oct 31 15:50:33 EST: ISAKMP (0:1): processing NONCE payload. message ID = 0 Oct 31 15:50:34 69.28.185.2 37: Oct 31 15:50:33 EST: ISAKMP (0:1): found peer pre-shared key matching 192.136.64.116 Oct 31 15:50:34 69.28.185.2 38: Oct 31 15:50:33 EST: CryptoEngine0: create ISAKMP SKEYID for conn id 1 Oct 31 15:50:34 69.28.185.2 39: Oct 31 15:50:33 EST: ISAKMP (0:1): SKEYID state generated Oct 31 15:50:34 69.28.185.2 40: Oct 31 15:50:33 EST: ISAKMP (0:1): sending packet to 192.136.64.116 (R) MM_KEY_EXCH Oct 31 15:50:34 69.28.185.2 41: Oct 31 15:50:33 EST: ISAKMP (0:1): received packet from 192.136.64.116 (R) MM_KEY_EXCH Oct 31 15:50:34 69.28.185.2 42: Oct 31 15:50:33 EST: ISAKMP (0:1): processing ID payload. message ID = 0 Oct 31 15:50:34 69.28.185.2 43: Oct 31 15:50:33 EST: ISAKMP (0:1): processing HASH payload. message ID = 0 Oct 31 15:50:35 69.28.185.2 44: Oct 31 15:50:33 EST: CryptoEngine0: generate hmac context for conn id 1 Oct 31 15:50:35 69.28.185.2 45: Oct 31 15:50:33 EST: ISAKMP (0:1): SA has been authenticated with 192.136.64.116 Oct 31 15:50:35 69.28.185.2 46: Oct 31 15:50:33 EST: ISAKMP (1): ID payload Oct 31 15:50:35 69.28.185.2 47: next-payload : 8 Oct 31 15:50:35 69.28.185.2 48: type : 1 Oct 31 15:50:35 69.28.185.2 49: protocol : 17 Oct 31 15:50:35 69.28.185.2 50: port : 500 Oct 31 15:50:35 69.28.185.2 51: length : 8 Oct 31 15:50:35 69.28.185.2 52: Oct 31 15:50:33 EST: ISAKMP (1): Total payload length: 12 Oct 31 15:50:35 69.28.185.2 53: Oct 31 15:50:33 EST: CryptoEngine0: generate hmac context for conn id 1 Oct 31 15:50:35 69.28.185.2 54: Oct 31 15:50:33 EST: CryptoEngine0: clear dh number for conn id 1 Oct 31 15:50:35 69.28.185.2 55: Oct 31 15:50:33 EST: ISAKMP (0:1): sending packet to 192.136.64.116 (R) QM_IDLE Oct 31 15:50:36 69.28.185.2 56: Oct 31 15:50:33 EST: ISAKMP (0:1): received packet from 192.136.64.116 (R) QM_IDLE Oct 31 15:50:36 69.28.185.2 57: Oct 31 15:50:33 EST: CryptoEngine0: generate hmac context for conn id 1 Oct 31 15:50:36 69.28.185.2 58: Oct 31 15:50:33 EST: ISAKMP (0:1): processing HASH payload. message ID = -947424521 Oct 31 15:50:36 69.28.185.2 59: Oct 31 15:50:33 EST: ISAKMP (0:1): processing NOTIFY INITIAL_CONTACT protocol 1 Oct 31 15:50:36 69.28.185.2 60: spi 0, message ID = -947424521, sa = 6637A0 Oct 31 15:50:36 69.28.185.2 61: Oct 31 15:50:33 EST: ISAKMP (0:1): deleting node -947424521 error FALSE reason "informational (in) state 1" Oct 31 15:50:39 69.28.185.2 62: Oct 31 15:50:34 EST: ISAKMP (0:1): received packet from 192.136.64.116 (R) QM_IDLE Oct 31 15:50:39 69.28.185.2 63: Oct 31 15:50:34 EST: CryptoEngine0: generate hmac context for conn id 1 Oct 31 15:50:40 69.28.185.2 64: Oct 31 15:50:34 EST: ISAKMP (0:1): processing HASH payload. message ID = -1437669735 Oct 31 15:50:40 69.28.185.2 65: Oct 31 15:50:34 EST: ISAKMP (0:1): processing SA payload. message ID = -1437669735 Oct 31 15:50:40 69.28.185.2 66: Oct 31 15:50:34 EST: ISAKMP (0:1): Checking IPSec proposal 1 Oct 31 15:50:40 69.28.185.2 67: Oct 31 15:50:34 EST: ISAKMP: transform 1, ESP_DES Oct 31 15:50:40 69.28.185.2 68: Oct 31 15:50:34 EST: ISAKMP: attributes in transform: Oct 31 15:50:40 69.28.185.2 69: Oct 31 15:50:34 EST: ISAKMP: SA life type in seconds Oct 31 15:50:40 69.28.185.2 70: Oct 31 15:50:34 EST: ISAKMP: SA life duration (basic) of 6000 Oct 31 15:50:40 69.28.185.2 71: Oct 31 15:50:34 EST: ISAKMP: encaps is 1 Oct 31 15:50:40 69.28.185.2 72: Oct 31 15:50:34 EST: ISAKMP: authenticator is HMAC-MD5 Oct 31 15:50:40 69.28.185.2 73: Oct 31 15:50:34 EST: ISAKMP: group is 2 Oct 31 15:50:41 69.28.185.2 74: Oct 31 15:50:34 EST: validate proposal 0 Oct 31 15:50:41 69.28.185.2 75: Oct 31 15:50:34 EST: ISAKMP (0:1): atts are acceptable. Oct 31 15:50:41 69.28.185.2 76: Oct 31 15:50:34 EST: IPSEC(validate_proposal_request): proposal part #1, Oct 31 15:50:41 69.28.185.2 77: (key eng. msg.) INBOUND local= 69.28.185.2, remote= 192.136.64.116, Oct 31 15:50:41 69.28.185.2 78: local_proxy= 172.16.0.0/255.255.255.0/0/0 (type=4), Oct 31 15:50:41 69.28.185.2 79: remote_proxy= 0.0.0.0/0.0.0.0/0/0 (type=4), Oct 31 15:50:41 69.28.185.2 80: protocol= ESP, transform= esp-des esp-md5-hmac , Oct 31 15:50:41 69.28.185.2 81: lifedur= 0s and 0kb, Oct 31 15:50:41 69.28.185.2 82: spi= 0x0(0), conn_id= 0, keysize= 0, flags= 0x24 Oct 31 15:50:41 69.28.185.2 83: Oct 31 15:50:35 EST: validate proposal request 0 Oct 31 15:50:41 69.28.185.2 84: Oct 31 15:50:35 EST: CryptoEngine0: generate alg parameter Oct 31 15:50:42 69.28.185.2 85: Oct 31 15:50:37 EST: CRYPTO_ENGINE: Dh phase 1 status: 0 Oct 31 15:50:42 69.28.185.2 86: Oct 31 15:50:37 EST: CRYPTO_ENGINE: Dh phase 1 status: 0 Oct 31 15:50:42 69.28.185.2 87: Oct 31 15:50:37 EST: ISAKMP (0:1): processing NONCE payload. message ID = -1437669735 Oct 31 15:50:42 69.28.185.2 88: Oct 31 15:50:37 EST: ISAKMP (0:1): processing KE payload. message ID = -1437669735 Oct 31 15:50:42 69.28.185.2 89: Oct 31 15:50:37 EST: CryptoEngine0: generate alg parameter Oct 31 15:50:42 69.28.185.2 90: Oct 31 15:50:40 EST: ISAKMP (0:1): processing ID payload. message ID = -1437669735 Oct 31 15:50:42 69.28.185.2 91: Oct 31 15:50:40 EST: ISAKMP (0:1): processing ID payload. message ID = -1437669735 Oct 31 15:50:42 69.28.185.2 92: Oct 31 15:50:40 EST: ISAKMP (0:1): asking for 1 spis from ipsec Oct 31 15:50:42 69.28.185.2 93: Oct 31 15:50:40 EST: IPSEC(key_engine): got a queue event... Oct 31 15:50:42 69.28.185.2 94: Oct 31 15:50:40 EST: IPSEC(spi_response): getting spi 1764991009 for SA Oct 31 15:50:43 69.28.185.2 95: from 69.28.185.2 to 192.136.64.116 for prot 3 Oct 31 15:50:43 69.28.185.2 96: Oct 31 15:50:40 EST: ISAKMP: received ke message (2/1) Oct 31 15:50:43 69.28.185.2 97: Oct 31 15:50:40 EST: CryptoEngine0: generate hmac context for conn id 1 Oct 31 15:50:43 69.28.185.2 98: Oct 31 15:50:40 EST: ISAKMP (0:1): sending packet to 192.136.64.116 (R) QM_IDLE Oct 31 15:50:43 69.28.185.2 99: Oct 31 15:50:41 EST: ISAKMP (0:1): received packet from 192.136.64.116 (R) QM_IDLE Oct 31 15:50:43 69.28.185.2 100: Oct 31 15:50:41 EST: CryptoEngine0: generate hmac context for conn id 1 Oct 31 15:50:43 69.28.185.2 101: Oct 31 15:50:41 EST: ipsec allocate flow 0 Oct 31 15:50:43 69.28.185.2 102: Oct 31 15:50:41 EST: ipsec allocate flow 0 Oct 31 15:50:43 69.28.185.2 103: Oct 31 15:50:41 EST: CryptoEngine0: clear dh number for conn id 1 Oct 31 15:50:43 69.28.185.2 104: Oct 31 15:50:41 EST: ISAKMP (0:1): Creating IPSec SAs Oct 31 15:50:43 69.28.185.2 105: Oct 31 15:50:41 EST: inbound SA from 192.136.64.116 to 69.28.185.2 Oct 31 15:50:43 69.28.185.2 106: (proxy 0.0.0.0 to 172.16.0.0) Oct 31 15:50:44 69.28.185.2 107: Oct 31 15:50:41 EST: has spi 0x6933A021 and conn_id 2000 and flags 25 Oct 31 15:50:44 69.28.185.2 108: Oct 31 15:50:41 EST: lifetime of 6000 seconds Oct 31 15:50:44 69.28.185.2 109: Oct 31 15:50:41 EST: outbound SA from 69.28.185.2 to 192.136.64.116 (proxy 172.16.0.0 to 0.0.0.0 ) Oct 31 15:50:44 69.28.185.2 110: Oct 31 15:50:41 EST: has spi 30496130 and conn_id 2001 and flags 2D Oct 31 15:50:44 69.28.185.2 111: Oct 31 15:50:41 EST: lifetime of 6000 seconds Oct 31 15:50:44 69.28.185.2 112: Oct 31 15:50:41 EST: ISAKMP (0:1): deleting node -1437669735 error FALSE reason "quick mode done (await()" Oct 31 15:50:44 69.28.185.2 113: Oct 31 15:50:41 EST: IPSEC(key_engine): got a queue event... Oct 31 15:50:44 69.28.185.2 114: Oct 31 15:50:41 EST: IPSEC(initialize_sas): , Oct 31 15:50:44 69.28.185.2 115: (key eng. msg.) INBOUND Oct 31 15:50:44 69.28.185.2 116: local= 69.28.185.2, remote= 192.136.64.116, Oct 31 15:50:44 69.28.185.2 117: local_proxy= 172.16.0.0/255.255.255.0/0/0 (type=4), Oct 31 15:50:45 69.28.185.2 118: remote_proxy= 0.0.0.0/0.0.0.0/0/0 (type=4), Oct 31 15:50:45 69.28.185.2 119: protocol= ESP, transform= esp-des esp-md5-hmac , Oct 31 15:50:45 69.28.185.2 120: lifedur= 6000s and 0kb, Oct 31 15:50:45 69.28.185.2 121: spi= 0x6933A021(1764991009), conn_id= 2000, keysize= 0, flags= 0x25 Oct 31 15:50:45 69.28.185.2 122: Oct 31 15:50:41 EST: IPSEC(initialize_sas): , Oct 31 15:50:45 69.28.185.2 123: (key eng. msg.) OUTBOUND local= 69.28.185.2, remote= 192.136.64.116, Oct 31 15:50:45 69.28.185.2 124: local_proxy= 172.16.0.0/255.255.255.0/0/0 (type=4), Oct 31 15:50:45 69.28.185.2 125: remote_proxy= 0.0.0.0/0.0.0.0/0/0 (type=4), Oct 31 15:50:45 69.28.185.2 126: protocol= ESP, transform= esp-des esp-md5-hmac , Oct 31 15:50:45 69.28.185.2 127: lifedur= 6000s and 0kb, Oct 31 15:50:46 69.28.185.2 128: spi= 0x1D15582(30496130), conn_id= 2001, keysize= 0, flags= 0x2D Oct 31 15:50:46 69.28.185.2 129: Oct 31 15:50:41 EST: IPSEC(create_sa): sa created, Oct 31 15:50:46 69.28.185.2 130: (sa) sa_dest= 69.28.185.2, sa_prot= 50, Oct 31 15:50:46 69.28.185.2 131: sa_spi= 0x6933A021(1764991009), Oct 31 15:50:46 69.28.185.2 132: sa_trans= esp-des esp-md5-hmac , sa_conn_id= 2000 Oct 31 15:50:46 69.28.185.2 133: Oct 31 15:50:41 EST: IPSEC(create_sa): sa created, Oct 31 15:50:46 69.28.185.2 134: (sa) sa_dest= 192.136.64.116, sa_prot= 50, Oct 31 15:50:46 69.28.185.2 135: sa_spi= 0x1D15582(30496130), Oct 31 15:50:46 69.28.185.2 136: sa_trans= esp-des esp-md5-hmac , sa_conn_id= 2001 Oct 31 15:51:25 69.28.185.2 137: Oct 31 15:51:23 EST: ISAKMP (0:1): purging node -947424521 Oct 31 15:51:32 69.28.185.2 138: Oct 31 15:51:31 EST: ISAKMP (0:1): purging node -1437669735