Hi All,
I have configured a Pix to Pix VPN and I am having problems. When I ping from a local machine, the VPN process is started and then finished. I have double-checked the configurations and I cannot see a problem.
Any chance thes configurations and be looked at and checked over. I have attached the two pix configurations and a sample of the log. The network is a Pix 506E VPN'ing to a Pix515E. The log is from the Pix 515E when a ping is initiated. These configs were created using PDM.
Configs:
+++++++++++PIX506E PIXOS 6.3(5)+++++++++++++
: Saved
: Written by enable_15 at 04:27:19.394 UTC Thu Oct 5 2006
PIX Version 6.3(5)
interface ethernet0 auto
interface ethernet1 auto
nameif ethernet0 outside security0
nameif ethernet1 inside security100
enable password orMeD9LEZDGVgHNT encrypted
passwd zdWLaxrocvVoOrCk encrypted
hostname occelluss
domain-name qinetiq.com
fixup protocol dns maximum-length 512
fixup protocol ftp 21
fixup protocol h323 h225 1720
fixup protocol h323 ras 1718-1719
fixup protocol http 80
fixup protocol rsh 514
fixup protocol rtsp 554
fixup protocol sip 5060
fixup protocol sip udp 5060
fixup protocol skinny 2000
fixup protocol smtp 25
fixup protocol sqlnet 1521
fixup protocol tftp 69
names
name 10.7.1.0 Wirless-Logic
access-list inside_outbound_nat0_acl permit icmp any any
access-list inside_outbound_nat0_acl permit ip 192.168.5.0 255.255.255.0
Wirless-Logic 255.255.255.0
access-list outside_cryptomap_20 permit icmp any any
access-list outside_cryptomap_20 permit ip 192.168.5.0 255.255.255.0 Wirless-Logic
255.255.255.0
pager lines 24
logging on
logging buffered debugging
icmp permit any outside
icmp permit any inside
mtu outside 1500
mtu inside 1500
ip address outside 172.30.6.231 255.255.255.0
ip address inside 192.168.5.1 255.255.255.0
ip audit info action alarm
ip audit attack action alarm
pdm location 192.168.5.2 255.255.255.255 inside
pdm location Wirless-Logic 255.255.255.0 outside
pdm history enable
arp timeout 14400
nat (inside) 0 access-list inside_outbound_nat0_acl
route outside 0.0.0.0 0.0.0.0 172.30.6.20 1
timeout xlate 3:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00
timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00
timeout sip-disconnect 0:02:00 sip-invite 0:03:00
timeout uauth 0:05:00 absolute
aaa-server TACACS+ protocol tacacs+
aaa-server TACACS+ max-failed-attempts 3
aaa-server TACACS+ deadtime 10
aaa-server RADIUS protocol radius
aaa-server RADIUS max-failed-attempts 3
aaa-server RADIUS deadtime 10
aaa-server LOCAL protocol local
http server enable
http 192.168.5.2 255.255.255.255 inside
no snmp-server location
no snmp-server contact
snmp-server community public
no snmp-server enable traps
floodguard enable
sysopt connection permit-ipsec
crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac
crypto map outside_map 20 ipsec-isakmp
crypto map outside_map 20 match address outside_cryptomap_20
crypto map outside_map 20 set peer 213.161.69.90
crypto map outside_map 20 set transform-set ESP-3DES-SHA
crypto map outside_map interface outside
isakmp enable outside
isakmp key ******** address 213.161.69.90 netmask 255.255.255.255
isakmp identity address
isakmp policy 20 authentication pre-share
isakmp policy 20 encryption 3des
isakmp policy 20 hash sha
isakmp policy 20 group 2
isakmp policy 20 lifetime 86400
telnet timeout 5
ssh 0.0.0.0 0.0.0.0 inside
ssh timeout 5
console timeout 0
username aahmoye password 4ZTNRrbAGyemIZ2R encrypted privilege 2
terminal width 80
Cryptochecksum:b763da4578f5dc4adc7fd1d7cfbd4f07
+++++PIX515E PIXOS 7.0++++++++
: Saved
: Written by enable_15 at 05:00:03.064 UTC Thu Oct 5 2006
PIX Version 7.0(2)
names
!
interface Ethernet0
nameif outside
security-level 0
ip address 213.161.69.90 255.255.255.0
!
interface Ethernet1
nameif inside
security-level 100
ip address 10.7.1.1 255.255.255.0
!
enable password orMeD9LEZDGVgHNT encrypted
passwd zdWLaxrocvVoOrCk encrypted
hostname wireless-logic
domain-name default.domain.invalid
ftp mode passive
access-list inside_nat0_outbound extended permit ip 10.7.1.0 255.255.255.0
192.168.5.0 255.255.255.0
access-list inside_nat0_outbound extended permit icmp any any
access-list outside_cryptomap_20 extended permit ip 10.7.1.0 255.255.255.0
192.168.5.0 255.255.255.0
access-list outside_cryptomap_20 extended permit icmp any any
pager lines 24
logging enable
logging timestamp
logging buffered debugging
logging debug-trace
mtu outside 1500
mtu inside 1500
no failover
monitor-interface outside
monitor-interface inside
icmp permit any outside
icmp permit any inside
asdm image flash:/asdm-502.bin
no asdm history enable
arp timeout 14400
nat (inside) 0 access-list inside_nat0_outbound
route outside 85.159.168.0 255.255.255.0 213.161.69.1 1
timeout xlate 3:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00
timeout mgcp-pat 0:05:00 sip 0:30:00 sip_media 0:02:00
timeout uauth 0:05:00 absolute
username aahmoye password 4ZTNRrbAGyemIZ2R encrypted
http server enable
http 10.7.1.10 255.255.255.255 inside
no snmp-server location
no snmp-server contact
snmp-server enable traps snmp
crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac
crypto map outside_map 20 match address outside_cryptomap_20
crypto map outside_map 20 set peer 85.159.168.142
crypto map outside_map 20 set transform-set ESP-3DES-SHA
crypto map outside_map interface outside
isakmp identity address
isakmp enable outside
isakmp policy 10 authentication pre-share
isakmp policy 10 encryption 3des
isakmp policy 10 hash sha
isakmp policy 10 group 2
isakmp policy 10 lifetime 86400
telnet timeout 5
ssh timeout 5
console timeout 0
tunnel-group 85.159.168.142 type ipsec-l2l
tunnel-group 85.159.168.142 ipsec-attributes
pre-shared-key *
!
class-map inspection_default
match default-inspection-traffic
!
!
policy-map global_policy
class inspection_default
inspect dns maximum-length 512
inspect ftp
inspect h323 h225
inspect h323 ras
inspect netbios
inspect rsh
inspect rtsp
inspect skinny
inspect esmtp
inspect sqlnet
inspect sunrpc
inspect tftp
inspect sip
inspect xdmcp
!
service-policy global_policy global
Cryptochecksum:6b3e0021436624f7ec07a6022fb70528
++++++++++LOG DATA WHEN PING FROM PIX506E to PIX515E++++++++++++
y Subnet data in ID Payload: Address 0.0.0.0, Mask 0.0.0.0, Protocol 1, Port 0
Oct 05 2006 05:00:49: %PIX-7-715001: Group = 85.159.168.142, IP = 85.159.168.142,
Processing ID
Oct 05 2006 05:00:49: %PIX-7-714011: ID_IPV4_ADDR_SUBNET ID received--0.0.0.0--0.0.0.0
Oct 05 2006 05:00:49: %PIX-7-713034: Group = 85.159.168.142, IP = 85.159.168.142,
Received local IP Proxy Subnet data in ID Payload: Address 0.0.0.0, Mask 0.0
.0.0, Protocol 1, Port 0
Oct 05 2006 05:00:49: %PIX-5-713904: QM IsRekeyed old sa not found by addr
Oct 05 2006 05:00:49: %PIX-7-713221: Group = 85.159.168.142, IP = 85.159.168.142,
Static Crypto Map check, checking map = outside_map, seq = 20...
Oct 05 2006 05:00:49: %PIX-7-713222: Group = 85.159.168.142, IP = 85.159.168.142,
Static Crypto Map check, map = outside_map, seq = 20, ACL does not match proxy
IDs src:0.0.0.0 dst:0.0.0.0
Oct 05 2006 05:00:49: %PIX-3-713061: Group = 85.159.168.142, IP = 85.159.168.142,
Tunnel rejected: Crypto Map Policy not found for Src:0.0.0.0, Dst: 0.0.0.0!
Oct 05 2006 05:00:49: %PIX-7-713906: Group = 85.159.168.142, IP = 85.159.168.142,
sending notify message
Oct 05 2006 05:00:49: %PIX-7-713906: Group = 85.159.168.142, IP = 85.159.168.142,
constructing blank hash
Oct 05 2006 05:00:49: %PIX-7-713906: Group = 85.159.168.142, IP = 85.159.168.142,
constructing qm hash
Oct 05 2006 05:00:49: %PIX-7-713906: IP = 85.159.168.142, IKE DECODE SENDING Message
(msgid=f30164e4) with payloads : HDR + HASH (8) + NOTIFY (11) + NONE (0) to
tal length : 224
Oct 05 2006 05:00:49: %PIX-7-711001: Oct 05 05:00:49 [IKEv1]Oct 05 2006 05:00:49:
%PIX-3-713902: QM FSM error (P2 struct &0x1ecf5e8, mess id 0xf906c9fd)!
Oct 05 2006 05:00:49: %PIX-7-715065: Group = 85.159.168.142, IP = 85.159.168.142,
IKE QM Responder FSM error history (struct &0x1ecf5e8) <state>, <event>: QM_
DONE, EV_ERROR-->QM_BLD_MSG2, EV_NEGO_SA-->QM_BLD_MSG2, EV_IS_REKEY-->QM_BLD_MSG2,
EV_CONFIRM_SA
Oct 05 2006 05:00:49: %PIX-7-713906: sending delete/delete with reason message
Oct 05 2006 05:00:49: %PIX-3-713902: Group = 85.159.168.142, IP = 85.159.168.142,
Removing peer from correlator table failed, no match!
Oct 05 2006 05:00:49: %PIX-7-713906: Group = 85.159.168.142, IP = 85.159.168.142,
IKE SA MM:34ef98f6 rcv'd Terminate: state MM_ACTIVE flags 0x0001c042, refcnt
1, tuncnt 0
Oct 05 2006 05:00:49: %PIX-7-713906: Group = 85.159.168.142, IP = 85.159.168.142,
IKE SA MM:34ef98f6 terminating: flags 0x0101c002, refcnt 0, tuncnt 0
Oct 05 2006 05:00:49: %PIX-7-713906: sending delete/delete with reason message
Oct 05 2006 05:00:49: %PIX-7-713906: Group = 85.159.168.142, IP = 85.159.168.142,
constructing blank hash
Oct 05 2006 05:00:49: %PIX-7-713906: constructing IKE delete payload
Oct 05 2006 05:00:49: %PIX-7-713906: Group = 85.159.168.142, IP = 85.159.168.142,
constructing qm hash
Oct 05 2006 05:00:49: %PIX-7-713906: IP = 85.159.168.142, IKE DECODE SENDING Message
(msgid=281d9395) with payloads : HDR + HASH (8) + DELETE (12) + NONE (0) to
tal length : 80
Oct 05 2006 05:00:49: %PIX-4-113019: Group = 85.159.168.142, Username =
85.159.168.142, IP = 85.159.168.142, Session disconnected. Session Type:
IPSecLAN2LAN, D
uration: 0h:00m:00s, Bytes xmt: 0, Bytes rcv: 0, Reason: Unknown
Oct 05 2006 05:00:49: %PIX-7-711001: : QM IsRekeyed old sa not found by addr
Oct 05 2006 05:00:49: %PIX-7-711001: Oct 05 05:00:49 [IKEv1]Oct 05 2006 05:00:49:
%PIX-7-711001: : QM FSM error (P2 struct &0x1ecf5e8, mess id 0xf906c9fd)!
Oct 05 2006 05:00:49: %PIX-7-711001: Oct 05 05:00:49 [IKEv1]Oct 05 2006 05:00:49:
%PIX-7-711001: : Group = 85.159.168.142, IP = 85.159.168.142, Removing peer fr
om correlator table failed, no match!
Oct 05 2006 05:02:49: %PIX-6-302016: Teardown UDP connection 64 for
outside:85.159.168.142/500 to NP Identity Ifc:213.161.69.90/500 duration 0:02:30
bytes 2880
Oct 05 2006 05:02:49: %PIX-6-609002: Teardown local-host outside:85.159.168.142
duration 0:02:30
Oct 05 2006 05:02:49: %PIX-6-609002: Teardown local-host NP Identity
Ifc:213.161.69.90 duration 0:02:30
Help is dealy appreciated.
regards
Adrian
I have configured a Pix to Pix VPN and I am having problems. When I ping from a local machine, the VPN process is started and then finished. I have double-checked the configurations and I cannot see a problem.
Any chance thes configurations and be looked at and checked over. I have attached the two pix configurations and a sample of the log. The network is a Pix 506E VPN'ing to a Pix515E. The log is from the Pix 515E when a ping is initiated. These configs were created using PDM.
Configs:
+++++++++++PIX506E PIXOS 6.3(5)+++++++++++++
: Saved
: Written by enable_15 at 04:27:19.394 UTC Thu Oct 5 2006
PIX Version 6.3(5)
interface ethernet0 auto
interface ethernet1 auto
nameif ethernet0 outside security0
nameif ethernet1 inside security100
enable password orMeD9LEZDGVgHNT encrypted
passwd zdWLaxrocvVoOrCk encrypted
hostname occelluss
domain-name qinetiq.com
fixup protocol dns maximum-length 512
fixup protocol ftp 21
fixup protocol h323 h225 1720
fixup protocol h323 ras 1718-1719
fixup protocol http 80
fixup protocol rsh 514
fixup protocol rtsp 554
fixup protocol sip 5060
fixup protocol sip udp 5060
fixup protocol skinny 2000
fixup protocol smtp 25
fixup protocol sqlnet 1521
fixup protocol tftp 69
names
name 10.7.1.0 Wirless-Logic
access-list inside_outbound_nat0_acl permit icmp any any
access-list inside_outbound_nat0_acl permit ip 192.168.5.0 255.255.255.0
Wirless-Logic 255.255.255.0
access-list outside_cryptomap_20 permit icmp any any
access-list outside_cryptomap_20 permit ip 192.168.5.0 255.255.255.0 Wirless-Logic
255.255.255.0
pager lines 24
logging on
logging buffered debugging
icmp permit any outside
icmp permit any inside
mtu outside 1500
mtu inside 1500
ip address outside 172.30.6.231 255.255.255.0
ip address inside 192.168.5.1 255.255.255.0
ip audit info action alarm
ip audit attack action alarm
pdm location 192.168.5.2 255.255.255.255 inside
pdm location Wirless-Logic 255.255.255.0 outside
pdm history enable
arp timeout 14400
nat (inside) 0 access-list inside_outbound_nat0_acl
route outside 0.0.0.0 0.0.0.0 172.30.6.20 1
timeout xlate 3:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00
timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00
timeout sip-disconnect 0:02:00 sip-invite 0:03:00
timeout uauth 0:05:00 absolute
aaa-server TACACS+ protocol tacacs+
aaa-server TACACS+ max-failed-attempts 3
aaa-server TACACS+ deadtime 10
aaa-server RADIUS protocol radius
aaa-server RADIUS max-failed-attempts 3
aaa-server RADIUS deadtime 10
aaa-server LOCAL protocol local
http server enable
http 192.168.5.2 255.255.255.255 inside
no snmp-server location
no snmp-server contact
snmp-server community public
no snmp-server enable traps
floodguard enable
sysopt connection permit-ipsec
crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac
crypto map outside_map 20 ipsec-isakmp
crypto map outside_map 20 match address outside_cryptomap_20
crypto map outside_map 20 set peer 213.161.69.90
crypto map outside_map 20 set transform-set ESP-3DES-SHA
crypto map outside_map interface outside
isakmp enable outside
isakmp key ******** address 213.161.69.90 netmask 255.255.255.255
isakmp identity address
isakmp policy 20 authentication pre-share
isakmp policy 20 encryption 3des
isakmp policy 20 hash sha
isakmp policy 20 group 2
isakmp policy 20 lifetime 86400
telnet timeout 5
ssh 0.0.0.0 0.0.0.0 inside
ssh timeout 5
console timeout 0
username aahmoye password 4ZTNRrbAGyemIZ2R encrypted privilege 2
terminal width 80
Cryptochecksum:b763da4578f5dc4adc7fd1d7cfbd4f07
+++++PIX515E PIXOS 7.0++++++++
: Saved
: Written by enable_15 at 05:00:03.064 UTC Thu Oct 5 2006
PIX Version 7.0(2)
names
!
interface Ethernet0
nameif outside
security-level 0
ip address 213.161.69.90 255.255.255.0
!
interface Ethernet1
nameif inside
security-level 100
ip address 10.7.1.1 255.255.255.0
!
enable password orMeD9LEZDGVgHNT encrypted
passwd zdWLaxrocvVoOrCk encrypted
hostname wireless-logic
domain-name default.domain.invalid
ftp mode passive
access-list inside_nat0_outbound extended permit ip 10.7.1.0 255.255.255.0
192.168.5.0 255.255.255.0
access-list inside_nat0_outbound extended permit icmp any any
access-list outside_cryptomap_20 extended permit ip 10.7.1.0 255.255.255.0
192.168.5.0 255.255.255.0
access-list outside_cryptomap_20 extended permit icmp any any
pager lines 24
logging enable
logging timestamp
logging buffered debugging
logging debug-trace
mtu outside 1500
mtu inside 1500
no failover
monitor-interface outside
monitor-interface inside
icmp permit any outside
icmp permit any inside
asdm image flash:/asdm-502.bin
no asdm history enable
arp timeout 14400
nat (inside) 0 access-list inside_nat0_outbound
route outside 85.159.168.0 255.255.255.0 213.161.69.1 1
timeout xlate 3:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00
timeout mgcp-pat 0:05:00 sip 0:30:00 sip_media 0:02:00
timeout uauth 0:05:00 absolute
username aahmoye password 4ZTNRrbAGyemIZ2R encrypted
http server enable
http 10.7.1.10 255.255.255.255 inside
no snmp-server location
no snmp-server contact
snmp-server enable traps snmp
crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac
crypto map outside_map 20 match address outside_cryptomap_20
crypto map outside_map 20 set peer 85.159.168.142
crypto map outside_map 20 set transform-set ESP-3DES-SHA
crypto map outside_map interface outside
isakmp identity address
isakmp enable outside
isakmp policy 10 authentication pre-share
isakmp policy 10 encryption 3des
isakmp policy 10 hash sha
isakmp policy 10 group 2
isakmp policy 10 lifetime 86400
telnet timeout 5
ssh timeout 5
console timeout 0
tunnel-group 85.159.168.142 type ipsec-l2l
tunnel-group 85.159.168.142 ipsec-attributes
pre-shared-key *
!
class-map inspection_default
match default-inspection-traffic
!
!
policy-map global_policy
class inspection_default
inspect dns maximum-length 512
inspect ftp
inspect h323 h225
inspect h323 ras
inspect netbios
inspect rsh
inspect rtsp
inspect skinny
inspect esmtp
inspect sqlnet
inspect sunrpc
inspect tftp
inspect sip
inspect xdmcp
!
service-policy global_policy global
Cryptochecksum:6b3e0021436624f7ec07a6022fb70528
++++++++++LOG DATA WHEN PING FROM PIX506E to PIX515E++++++++++++
y Subnet data in ID Payload: Address 0.0.0.0, Mask 0.0.0.0, Protocol 1, Port 0
Oct 05 2006 05:00:49: %PIX-7-715001: Group = 85.159.168.142, IP = 85.159.168.142,
Processing ID
Oct 05 2006 05:00:49: %PIX-7-714011: ID_IPV4_ADDR_SUBNET ID received--0.0.0.0--0.0.0.0
Oct 05 2006 05:00:49: %PIX-7-713034: Group = 85.159.168.142, IP = 85.159.168.142,
Received local IP Proxy Subnet data in ID Payload: Address 0.0.0.0, Mask 0.0
.0.0, Protocol 1, Port 0
Oct 05 2006 05:00:49: %PIX-5-713904: QM IsRekeyed old sa not found by addr
Oct 05 2006 05:00:49: %PIX-7-713221: Group = 85.159.168.142, IP = 85.159.168.142,
Static Crypto Map check, checking map = outside_map, seq = 20...
Oct 05 2006 05:00:49: %PIX-7-713222: Group = 85.159.168.142, IP = 85.159.168.142,
Static Crypto Map check, map = outside_map, seq = 20, ACL does not match proxy
IDs src:0.0.0.0 dst:0.0.0.0
Oct 05 2006 05:00:49: %PIX-3-713061: Group = 85.159.168.142, IP = 85.159.168.142,
Tunnel rejected: Crypto Map Policy not found for Src:0.0.0.0, Dst: 0.0.0.0!
Oct 05 2006 05:00:49: %PIX-7-713906: Group = 85.159.168.142, IP = 85.159.168.142,
sending notify message
Oct 05 2006 05:00:49: %PIX-7-713906: Group = 85.159.168.142, IP = 85.159.168.142,
constructing blank hash
Oct 05 2006 05:00:49: %PIX-7-713906: Group = 85.159.168.142, IP = 85.159.168.142,
constructing qm hash
Oct 05 2006 05:00:49: %PIX-7-713906: IP = 85.159.168.142, IKE DECODE SENDING Message
(msgid=f30164e4) with payloads : HDR + HASH (8) + NOTIFY (11) + NONE (0) to
tal length : 224
Oct 05 2006 05:00:49: %PIX-7-711001: Oct 05 05:00:49 [IKEv1]Oct 05 2006 05:00:49:
%PIX-3-713902: QM FSM error (P2 struct &0x1ecf5e8, mess id 0xf906c9fd)!
Oct 05 2006 05:00:49: %PIX-7-715065: Group = 85.159.168.142, IP = 85.159.168.142,
IKE QM Responder FSM error history (struct &0x1ecf5e8) <state>, <event>: QM_
DONE, EV_ERROR-->QM_BLD_MSG2, EV_NEGO_SA-->QM_BLD_MSG2, EV_IS_REKEY-->QM_BLD_MSG2,
EV_CONFIRM_SA
Oct 05 2006 05:00:49: %PIX-7-713906: sending delete/delete with reason message
Oct 05 2006 05:00:49: %PIX-3-713902: Group = 85.159.168.142, IP = 85.159.168.142,
Removing peer from correlator table failed, no match!
Oct 05 2006 05:00:49: %PIX-7-713906: Group = 85.159.168.142, IP = 85.159.168.142,
IKE SA MM:34ef98f6 rcv'd Terminate: state MM_ACTIVE flags 0x0001c042, refcnt
1, tuncnt 0
Oct 05 2006 05:00:49: %PIX-7-713906: Group = 85.159.168.142, IP = 85.159.168.142,
IKE SA MM:34ef98f6 terminating: flags 0x0101c002, refcnt 0, tuncnt 0
Oct 05 2006 05:00:49: %PIX-7-713906: sending delete/delete with reason message
Oct 05 2006 05:00:49: %PIX-7-713906: Group = 85.159.168.142, IP = 85.159.168.142,
constructing blank hash
Oct 05 2006 05:00:49: %PIX-7-713906: constructing IKE delete payload
Oct 05 2006 05:00:49: %PIX-7-713906: Group = 85.159.168.142, IP = 85.159.168.142,
constructing qm hash
Oct 05 2006 05:00:49: %PIX-7-713906: IP = 85.159.168.142, IKE DECODE SENDING Message
(msgid=281d9395) with payloads : HDR + HASH (8) + DELETE (12) + NONE (0) to
tal length : 80
Oct 05 2006 05:00:49: %PIX-4-113019: Group = 85.159.168.142, Username =
85.159.168.142, IP = 85.159.168.142, Session disconnected. Session Type:
IPSecLAN2LAN, D
uration: 0h:00m:00s, Bytes xmt: 0, Bytes rcv: 0, Reason: Unknown
Oct 05 2006 05:00:49: %PIX-7-711001: : QM IsRekeyed old sa not found by addr
Oct 05 2006 05:00:49: %PIX-7-711001: Oct 05 05:00:49 [IKEv1]Oct 05 2006 05:00:49:
%PIX-7-711001: : QM FSM error (P2 struct &0x1ecf5e8, mess id 0xf906c9fd)!
Oct 05 2006 05:00:49: %PIX-7-711001: Oct 05 05:00:49 [IKEv1]Oct 05 2006 05:00:49:
%PIX-7-711001: : Group = 85.159.168.142, IP = 85.159.168.142, Removing peer fr
om correlator table failed, no match!
Oct 05 2006 05:02:49: %PIX-6-302016: Teardown UDP connection 64 for
outside:85.159.168.142/500 to NP Identity Ifc:213.161.69.90/500 duration 0:02:30
bytes 2880
Oct 05 2006 05:02:49: %PIX-6-609002: Teardown local-host outside:85.159.168.142
duration 0:02:30
Oct 05 2006 05:02:49: %PIX-6-609002: Teardown local-host NP Identity
Ifc:213.161.69.90 duration 0:02:30
Help is dealy appreciated.
regards
Adrian