shouldit
IS-IT--Management
- Feb 9, 2009
- 2
ASA Version 7.0(7)
interface Ethernet0/0
nameif outside
security-level 0
ip address *.*.*.* 255.255.255.252
!
interface Ethernet0/1
nameif inside
security-level 100
ip address 172.26.9.1 255.255.255.0
!
interface Ethernet0/2
shutdown
no nameif
no security-level
no ip address
!
interface Management0/0
nameif management
security-level 100
ip address 192.168.1.1 255.255.255.0
management-only
clock timezone cq 8
access-list nonat extended permit ip 172.26.9.0 255.255.255.0 192.168.129.0 255.255.255.0
asdm image disk0:/asdm-507.bin
nat-control
global (outside) 1 interface
nat (inside) 0 access-list nonat
nat (inside) 1 172.26.9.0 255.255.255.0
route outside 0.0.0.0 0.0.0.0 *.*.*.* 1
crypto ipsec transform-set ESP-DES-MD5 esp-des esp-md5-hmac
crypto dynamic-map dymap 10 set transform-set ESP-DES-MD5
crypto dynamic-map dymap 10 set reverse-route
crypto map mymap 65535 ipsec-isakmp dynamic dymap
crypto map mymap interface outside
isakmp identity address
isakmp enable outside
isakmp policy 10 authentication pre-share
isakmp policy 10 encryption des
isakmp policy 10 hash md5
isakmp policy 10 group 2
isakmp policy 10 lifetime 86400
tunnel-group DefaultRAGroup ipsec-attributes
pre-shared-key *
ASA Version 8.0(3)
interface Ethernet0/0
nameif outside
security-level 0
pppoe client vpdn group jtqy
ip address pppoe setroute
!
interface Ethernet0/1
nameif inside
security-level 100
ip address 192.168.129.1 255.255.255.0
access-list vpn extended permit ip 192.168.129.0 255.255.255.0 172.26.9.0 255.255.255.0
access-list nonat extended permit ip 192.168.129.0 255.255.255.0 172.26.9.0 255.255.255.0
global (outside) 1 interface
nat (inside) 0 access-list nonat
nat (inside) 1 192.168.129.0 255.255.255.0
crypto ipsec transform-set myset esp-des esp-md5-hmac
crypto map mymap 10 match address vpn
crypto map mymap 10 set peer 221.5.*.*
crypto map mymap 10 set transform-set myset
crypto map mymap interface outside
crypto isakmp identity hostname
crypto isakmp enable outside
crypto isakmp policy 30
authentication pre-share
encryption des
hash md5
group 2
lifetime 86400
no crypto isakmp nat-traversal
vpdn group jtqy request dialout pppoe
vpdn group jtqy localname ********
vpdn group jtqy ppp authentication pap
vpdn username ******** password *********
threat-detection basic-threat
threat-detection statistics access-list
tunnel-group 221.5.*.* type ipsec-l2l
tunnel-group 221.5.*.* ipsec-attributes
pre-shared-key *
ciscoasa(config)# show crypto isakmp sa
Active SA: 1
Rekey SA: 0 (A tunnel will report 1 Active and 1 Rekey SA during rekey)
Total IKE SA: 1
1 IKE Peer: 221.5.*.*
Type : user Role : initiator
Rekey : no State : MM_WAIT_MSG2
Feb 10 17:06:46 192.168.129.1 %ASA-7-609001: Built local-host outside:172.26.9.1
Feb 10 17:06:46 192.168.129.1 %ASA-7-609002: Teardown local-host outside:172.26.9.1 duration 0:00:00
Feb 10 17:06:46 192.168.129.1 %ASA-7-715077: Pitcher: received a key acquire message, spi 0x0
Feb 10 17:06:49 192.168.129.1 %ASA-7-710005: TCP request discarded from 98.204.188.143/63836 to outside:58.34.98.30/80
Feb 10 17:06:49 192.168.129.1 %ASA-7-713236: IP = 221.5.*.*, IKE_DECODE RESENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 108
Feb 10 17:06:57 192.168.129.1 %ASA-7-710005: TCP request discarded from 61.59.12.43/4828 to outside:58.34.98.30/8855
Feb 10 17:06:57 192.168.129.1 %ASA-7-713236: IP = 221.5.*.*, IKE_DECODE RESENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 108
Feb 10 17:06:57 192.168.129.1 %ASA-7-713236: IP = 221.5.*.*, IKE_DECODE RECEIVED Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 108
Feb 10 17:06:57 192.168.129.1 %ASA-7-715047: IP = 221.5.*.*, processing SA payload
Feb 10 17:06:57 192.168.129.1 %ASA-7-713906: IP = 221.5.*.*, Oakley proposal is acceptable
Feb 10 17:06:57 192.168.129.1 %ASA-7-715047: IP = 221.5.*.*, processing VID payload
Feb 10 17:06:57 192.168.129.1 %ASA-7-715049: IP = 221.5.*.*, Received Fragmentation VID
Feb 10 17:06:57 192.168.129.1 %ASA-7-715064: IP = 221.5.*.*, IKE Peer included IKE fragmentation capability flags: Main Mode: True Aggressive Mode: True
Feb 10 17:06:57 192.168.129.1 %ASA-7-715046: IP = 221.5.*.*, constructing ke payload
Feb 10 17:06:57 192.168.129.1 %ASA-7-715046: IP = 221.5.*.*, constructing nonce payload
Feb 10 17:06:57 192.168.129.1 %ASA-7-715046: IP = 221.5.*.*, constructing Cisco Unity VID payload
Feb 10 17:06:57 192.168.129.1 %ASA-7-715046: IP = 221.5.*.*, constructing xauth V6 VID payload
Feb 10 17:06:57 192.168.129.1 %ASA-7-715048: IP = 221.5.*.*, Send IOS VID
Feb 10 17:06:57 192.168.129.1 %ASA-7-715038: IP = 221.5.*.*, Constructing ASA spoofing IOS Vendor ID payload (version: 1.0.0, capabilities: 20000001)
Feb 10 17:06:57 192.168.129.1 %ASA-7-715046: IP = 221.5.*.*, constructing VID payload
Feb 10 17:06:57 192.168.129.1 %ASA-7-715048: IP = 221.5.*.*, Send Altiga/Cisco VPN3000/Cisco ASA GW VID
Feb 10 17:06:57 192.168.129.1 %ASA-7-713236: IP = 221.5.*.*, IKE_DECODE SENDING Message (msgid=0) with payloads : HDR + KE (4) + NONCE (10) + VENDOR (13) + VENDOR (13) + VENDOR (13) + VENDOR (13) + NONE (0) total length : 256
Feb 10 17:06:57 192.168.129.1 %ASA-7-713236: IP = 221.5.*.*, IKE_DECODE RESENDING Message (msgid=0) with payloads : HDR + KE (4) + NONCE (10) + VENDOR (13) + VENDOR (13) + VENDOR (13) + VENDOR (13) + NONE (0) total length : 256
Feb 10 17:06:57 192.168.129.1 %ASA-7-713236: IP = 221.5.*.*, IKE_DECODE RECEIVED Message (msgid=0) with payloads : HDR + KE (4) + NONCE (10) + VENDOR (13) + VENDOR (13) + VENDOR (13) + VENDOR (13) + NONE (0) total length : 256
Feb 10 17:06:57 192.168.129.1 %ASA-7-715047: IP = 221.5.*.*, processing ke payload
Feb 10 17:06:57 192.168.129.1 %ASA-7-715047: IP = 221.5.*.*, processing ISA_KE payload
Feb 10 17:06:57 192.168.129.1 %ASA-7-715047: IP = 221.5.*.*, processing nonce payload
Feb 10 17:06:57 192.168.129.1 %ASA-7-715047: IP = 221.5.*.*, processing VID payload
Feb 10 17:06:57 192.168.129.1 %ASA-7-715049: IP = 221.5.*.*, Received Cisco Unity client VID
Feb 10 17:06:57 192.168.129.1 %ASA-7-715047: IP = 221.5.*.*, processing VID payload
Feb 10 17:06:57 192.168.129.1 %ASA-7-715049: IP = 221.5.*.*, Received xauth V6 VID
Feb 10 17:06:57 192.168.129.1 %ASA-7-715047: IP = 221.5.*.*, processing VID payload
Feb 10 17:06:57 192.168.129.1 %ASA-7-715038: IP = 221.5.*.*, Processing VPN3000/ASA spoofing IOS Vendor ID payload (version: 1.0.0, capabilities: 20000001)
Feb 10 17:06:57 192.168.129.1 %ASA-7-715047: IP = 221.5.*.*, processing VID payload
Feb 10 17:06:57 192.168.129.1 %ASA-7-715049: IP = 221.5.*.*, Received Altiga/Cisco VPN3000/Cisco ASA GW VID
Feb 10 17:06:57 192.168.129.1 %ASA-7-713906: IP = 221.5.*.*, Connection landed on tunnel_group 221.5.*.*
Feb 10 17:06:57 192.168.129.1 %ASA-7-713906: Group = 221.5.*.*, IP = 221.5.*.*, Generating keys for Initiator...
Feb 10 17:06:57 192.168.129.1 %ASA-7-715046: Group = 221.5.*.*, IP = 221.5.*.*, constructing ID payload
Feb 10 17:06:57 192.168.129.1 %ASA-7-715046: Group = 221.5.*.*, IP = 221.5.*.*, constructing hash payload
Feb 10 17:06:57 192.168.129.1 %ASA-7-715076: Group = 221.5.*.*, IP = 221.5.*.*, Computing hash for ISAKMP
Feb 10 17:06:57 192.168.129.1 %ASA-7-715034: IP = 221.5.*.*, Constructing IOS keep alive payload: proposal=32767/32767 sec.
Feb 10 17:06:57 192.168.129.1 %ASA-7-715046: Group = 221.5.*.*, IP = 221.5.*.*, constructing dpd vid payload
Feb 10 17:06:57 192.168.129.1 %ASA-7-713236: IP = 221.5.*.*, IKE_DECODE SENDING Message (msgid=0) with payloads : HDR + ID (5) + HASH (8) + IOS KEEPALIVE (128) + VENDOR (13) + NONE (0) total length : 119
Feb 10 17:07:29 192.168.129.1 %ASA-7-715065: Group = 221.5.*.*, IP = 221.5.*.*, IKE MM Initiator FSM error history (struct &0xd468d8d0) <state>, <event>: MM_DONE, EV_ERROR-->MM_WAIT_MSG6, EV_PROB_AUTH_FAIL-->MM_WAIT_MSG6, EV_TIMEOUT-->MM_WAIT_MSG6, NullEvent-->MM_SND_MSG5, EV_SND_MSG-->MM_SND_MSG5, EV_START_TMR-->MM_SND_MSG5, EV_RESEND_MSG-->MM_WAIT_MSG6, EV_TIMEOUT
Feb 10 17:07:29 192.168.129.1 %ASA-7-713906: Group = 221.5.*.*, IP = 221.5.*.*, IKE SA MM:ef54f633 terminating: flags 0x0100c022, refcnt 0, tuncnt 0
Feb 10 17:07:29 192.168.129.1 %ASA-7-713906: Group = 221.5.*.*, IP = 221.5.*.*, sending delete/delete with reason message
Feb 10 17:07:29 192.168.129.1 %ASA-7-715046: Group = 221.5.*.*, IP = 221.5.*.*, constructing blank hash payload
Feb 10 17:07:29 192.168.129.1 %ASA-7-715046: Group = 221.5.*.*, IP = 221.5.*.*, constructing IKE delete payload
Feb 10 17:07:29 192.168.129.1 %ASA-7-715046: Group = 221.5.*.*, IP = 221.5.*.*, constructing qm hash payload
Feb 10 17:07:29 192.168.129.1 %ASA-7-713236: IP = 221.5.*.*, IKE_DECODE SENDING Message (msgid=82751ab6) with payloads : HDR + HASH (8) + DELETE (12) + NONE (0) total length : 76
Feb 10 17:10:00 192.168.129.1 %ASA-7-609001: Built local-host outside:221.5.*.*
Feb 10 17:10:00 192.168.129.1 %ASA-7-609002: Teardown local-host outside:221.5.*.* duration 0:00:00
Feb 10 17:10:03 192.168.129.1 %ASA-7-609001: Built local-host outside:172.26.9.1
Feb 10 17:10:03 192.168.129.1 %ASA-7-609002: Teardown local-host outside:172.26.9.1 duration 0:00:00
Feb 10 17:10:03 192.168.129.1 %ASA-7-715077: Pitcher: received a key acquire message, spi 0x0
Feb 10 17:10:03 192.168.129.1 %ASA-7-715046: IP = 221.5.*.*, constructing ISAKMP SA payload
Feb 10 17:10:03 192.168.129.1 %ASA-7-715046: IP = 221.5.*.*, constructing Fragmentation VID + extended capabilities payload
Feb 10 17:10:03 192.168.129.1 %ASA-7-713236: IP = 221.5.*.*, IKE_DECODE SENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 108
Feb 10 17:10:03 192.168.129.1 %ASA-7-609001: Built local-host outside:221.5.*.*
Feb 10 17:10:03 192.168.129.1 %ASA-7-713236: IP = 221.5.*.*, IKE_DECODE RECEIVED Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 108
Feb 10 17:10:03 192.168.129.1 %ASA-7-715047: IP = 221.5.*.*, processing SA payload
Feb 10 17:10:03 192.168.129.1 %ASA-7-713906: IP = 221.5.*.*, Oakley proposal is acceptable
Feb 10 17:10:03 192.168.129.1 %ASA-7-715047: IP = 221.5.*.*, processing VID payload
Feb 10 17:10:03 192.168.129.1 %ASA-7-715049: IP = 221.5.*.*, Received Fragmentation VID
Feb 10 17:10:03 192.168.129.1 %ASA-7-715064: IP = 221.5.*.*, IKE Peer included IKE fragmentation capability flags: Main Mode: True Aggressive Mode: True
Feb 10 17:10:03 192.168.129.1 %ASA-7-715046: IP = 221.5.*.*, constructing ke payload
Feb 10 17:10:03 192.168.129.1 %ASA-7-715046: IP = 221.5.*.*, constructing nonce payload
Feb 10 17:10:03 192.168.129.1 %ASA-7-715046: IP = 221.5.*.*, constructing Cisco Unity VID payload
Feb 10 17:10:03 192.168.129.1 %ASA-7-715046: IP = 221.5.*.*, constructing xauth V6 VID payload
Feb 10 17:10:03 192.168.129.1 %ASA-7-715048: IP = 221.5.*.*, Send IOS VID
Feb 10 17:10:03 192.168.129.1 %ASA-7-715038: IP = 221.5.*.*, Constructing ASA spoofing IOS Vendor ID payload (version: 1.0.0, capabilities: 20000001)
Feb 10 17:10:03 192.168.129.1 %ASA-7-715046: IP = 221.5.*.*, constructing VID payload
Feb 10 17:10:03 192.168.129.1 %ASA-7-715048: IP = 221.5.*.*, Send Altiga/Cisco VPN3000/Cisco ASA GW VID
Feb 10 17:10:03 192.168.129.1 %ASA-7-713236: IP = 221.5.*.*, IKE_DECODE SENDING Message (msgid=0) with payloads : HDR + KE (4) + NONCE (10) + VENDOR (13) + VENDOR (13) + VENDOR (13) + VENDOR (13) + NONE (0) total length : 256
Feb 10 17:10:04 192.168.129.1 %ASA-7-710005: TCP request discarded from 220.176.135.190/6000 to outside:58.34.98.30/1433
Feb 10 17:10:04 192.168.129.1 %ASA-7-710005: TCP request discarded from 87.238.159.51/26952 to outside:58.34.98.30/80
Feb 10 17:10:07 192.168.129.1 %ASA-7-710005: TCP request discarded from 87.238.159.51/26952 to outside:58.34.98.30/80
Feb 10 17:10:08 192.168.129.1 %ASA-7-609001: Built local-host outside:172.26.9.1
Feb 10 17:10:08 192.168.129.1 %ASA-7-609002: Teardown local-host outside:172.26.9.1 duration 0:00:00
Feb 10 17:10:08 192.168.129.1 %ASA-7-715077: Pitcher: received a key acquire message, spi 0x0
Feb 10 17:10:10 192.168.129.1 %ASA-7-710005: TCP request discarded from 61.59.12.43/1641 to outside:58.34.98.30/8855
Feb 10 17:10:11 192.168.129.1 %ASA-7-713236: IP = 221.5.*.*, IKE_DECODE RESENDING Message (msgid=0) with payloads : HDR + KE (4) + NONCE (10) + VENDOR (13) + VENDOR (13) + VENDOR (13) + VENDOR (13) + NONE (0) total length : 256
Feb 10 17:10:11 192.168.129.1 %ASA-7-713236: IP = 221.5.*.*, IKE_DECODE RESENDING Message (msgid=0) with payloads : HDR + KE (4) + NONCE (10) + VENDOR (13) + VENDOR (13) + VENDOR (13) + VENDOR (13) + NONE (0) total length : 256
Feb 10 17:10:11 192.168.129.1 %ASA-7-713236: IP = 221.5.*.*, IKE_DECODE RECEIVED Message (msgid=0) with payloads : HDR + KE (4) + NONCE (10) + VENDOR (13) + VENDOR (13) + VENDOR (13) + VENDOR (13) + NONE (0) total length : 256
Feb 10 17:10:11 192.168.129.1 %ASA-7-715047: IP = 221.5.*.*, processing ke payload
Feb 10 17:10:11 192.168.129.1 %ASA-7-715047: IP = 221.5.*.*, processing ISA_KE payload
Feb 10 17:10:11 192.168.129.1 %ASA-7-715047: IP = 221.5.*.*, processing nonce payload
Feb 10 17:10:11 192.168.129.1 %ASA-7-715047: IP = 221.5.*.*, processing VID payload
Feb 10 17:10:11 192.168.129.1 %ASA-7-715049: IP = 221.5.*.*, Received Cisco Unity client VID
Feb 10 17:10:11 192.168.129.1 %ASA-7-715047: IP = 221.5.*.*, processing VID payload
Feb 10 17:10:11 192.168.129.1 %ASA-7-715049: IP = 221.5.*.*, Received xauth V6 VID
Feb 10 17:10:11 192.168.129.1 %ASA-7-715047: IP = 221.5.*.*, processing VID payload
Feb 10 17:10:11 192.168.129.1 %ASA-7-715038: IP = 221.5.*.*, Processing VPN3000/ASA spoofing IOS Vendor ID payload (version: 1.0.0, capabilities: 20000001)
Feb 10 17:10:11 192.168.129.1 %ASA-7-715047: IP = 221.5.*.*, processing VID payload
Feb 10 17:10:11 192.168.129.1 %ASA-7-715049: IP = 221.5.*.*, Received Altiga/Cisco VPN3000/Cisco ASA GW VID
Feb 10 17:10:11 192.168.129.1 %ASA-7-713906: IP = 221.5.*.*, Connection landed on tunnel_group 221.5.*.*
Feb 10 17:10:11 192.168.129.1 %ASA-7-713906: Group = 221.5.*.*, IP = 221.5.*.*, Generating keys for Initiator...
Feb 10 17:10:11 192.168.129.1 %ASA-7-715046: Group = 221.5.*.*, IP = 221.5.*.*, constructing ID payload
Feb 10 17:10:11 192.168.129.1 %ASA-7-715046: Group = 221.5.*.*, IP = 221.5.*.*, constructing hash payload
Feb 10 17:10:11 192.168.129.1 %ASA-7-715076: Group = 221.5.*.*, IP = 221.5.*.*, Computing hash for ISAKMP
Feb 10 17:10:11 192.168.129.1 %ASA-7-715034: IP = 221.5.*.*, Constructing IOS keep alive payload: proposal=32767/32767 sec.
Feb 10 17:10:11 192.168.129.1 %ASA-7-715046: Group = 221.5.*.*, IP = 221.5.*.*, constructing dpd vid payload
Feb 10 17:10:11 192.168.129.1 %ASA-7-713236: IP = 221.5.*.*, IKE_DECODE SENDING Message (msgid=0) with payloads : HDR + ID (5) + HASH (8) + IOS KEEPALIVE (128) + VENDOR (13) + NONE (0) total length : 119
Feb 10 17:10:13 192.168.129.1 %ASA-7-710005: TCP request discarded from 87.238.159.51/26952 to outside:58.34.98.30/80
Feb 10 17:10:13 192.168.129.1 %ASA-7-609001: Built local-host outside:172.26.9.1
Feb 10 17:10:13 192.168.129.1 %ASA-7-609002: Teardown local-host outside:172.26.9.1 duration 0:00:00
Feb 10 17:10:13 192.168.129.1 %ASA-7-715077: Pitcher: received a key acquire message, spi 0x0
Feb 10 17:10:16 192.168.129.1 %ASA-7-710005: TCP request discarded from 61.59.12.43/1641 to outside:58.34.98.30/8855
Feb 10 17:10:18 192.168.129.1 %ASA-7-609001: Built local-host outside:172.26.9.1
Feb 10 17:10:18 192.168.129.1 %ASA-7-609002: Teardown local-host outside:172.26.9.1 duration 0:00:00
Feb 10 17:10:18 192.168.129.1 %ASA-7-715077: Pitcher: received a key acquire message, spi 0x0
Feb 10 17:10:23 192.168.129.1 %ASA-7-609001: Built local-host outside:172.26.9.1
Feb 10 17:10:23 192.168.129.1 %ASA-7-609002: Teardown local-host outside:172.26.9.1 duration 0:00:00
Feb 10 17:10:23 192.168.129.1 %ASA-7-715077: Pitcher: received a key acquire message, spi 0x0
Feb 10 17:10:28 192.168.129.1 %ASA-7-609001: Built local-host outside:172.26.9.1
Feb 10 17:10:28 192.168.129.1 %ASA-7-609002: Teardown local-host outside:172.26.9.1 duration 0:00:00
Feb 10 17:10:28 192.168.129.1 %ASA-7-715077: Pitcher: received a key acquire message, spi 0x0
Feb 10 17:10:31 192.168.129.1 %ASA-7-710005: TCP request discarded from 59.48.208.67/47942 to outside:58.34.98.30/12255
Feb 10 17:10:33 192.168.129.1 %ASA-7-609001: Built local-host outside:172.26.9.1
Feb 10 17:10:33 192.168.129.1 %ASA-7-609002: Teardown local-host outside:172.26.9.1 duration 0:00:00
Feb 10 17:10:33 192.168.129.1 %ASA-7-715077: Pitcher: received a key acquire message, spi 0x0
Feb 10 17:10:34 192.168.129.1 %ASA-7-710005: TCP request discarded from 59.48.208.67/47942 to outside:58.34.98.30/12255
Feb 10 17:10:35 192.168.129.1 %ASA-7-715065: Group = 221.5.*.*, IP = 221.5.*.*, IKE MM Initiator FSM error history (struct &0xd592d8b0) <state>, <event>: MM_DONE, EV_ERROR-->MM_WAIT_MSG6, EV_PROB_AUTH_FAIL-->MM_WAIT_MSG6, EV_TIMEOUT-->MM_WAIT_MSG6, NullEvent-->MM_SND_MSG5, EV_SND_MSG-->MM_SND_MSG5, EV_START_TMR-->MM_SND_MSG5, EV_RESEND_MSG-->MM_WAIT_MSG6, EV_TIMEOUT
Feb 10 17:10:35 192.168.129.1 %ASA-7-713906: Group = 221.5.*.*, IP = 221.5.*.*, IKE SA MM:f9562fb1 terminating: flags 0x0100c022, refcnt 0, tuncnt 0
Feb 10 17:10:35 192.168.129.1 %ASA-7-713906: Group = 221.5.*.*, IP = 221.5.*.*, sending delete/delete with reason message
Feb 10 17:10:35 192.168.129.1 %ASA-7-715046: Group = 221.5.*.*, IP = 221.5.*.*, constructing blank hash payload
Feb 10 17:10:35 192.168.129.1 %ASA-7-715046: Group = 221.5.*.*, IP = 221.5.*.*, constructing IKE delete payload
Feb 10 17:10:35 192.168.129.1 %ASA-7-715046: Group = 221.5.*.*, IP = 221.5.*.*, constructing qm hash payload
Feb 10 17:10:35 192.168.129.1 %ASA-7-713236: IP = 221.5.*.*, IKE_DECODE SENDING Message (msgid=5b9c9b6d) with payloads : HDR + HASH (8) + DELETE (12) + NONE (0) total length : 76
Feb 10 17:10:38 192.168.129.1 %ASA-7-710005: UDP request discarded from 58.60.15.34/8000 to outside:58.34.98.30/1079
Feb 10 17:10:38 192.168.129.1 %ASA-7-609001: Built local-host outside:172.26.9.1
Feb 10 17:10:38 192.168.129.1 %ASA-7-609002: Teardown local-host outside:172.26.9.1 duration 0:00:00
Feb 10 17:10:38 192.168.129.1 %ASA-7-715077: Pitcher: received a key acquire message, spi 0x0
Feb 10 17:10:38 192.168.129.1 %ASA-7-715046: IP = 221.5.*.*, constructing ISAKMP SA payload
Feb 10 17:10:38 192.168.129.1 %ASA-7-715046: IP = 221.5.*.*, constructing Fragmentation VID + extended capabilities payload
Feb 10 17:10:38 192.168.129.1 %ASA-7-713236: IP = 221.5.*.*, IKE_DECODE SENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 108
interface Ethernet0/0
nameif outside
security-level 0
ip address *.*.*.* 255.255.255.252
!
interface Ethernet0/1
nameif inside
security-level 100
ip address 172.26.9.1 255.255.255.0
!
interface Ethernet0/2
shutdown
no nameif
no security-level
no ip address
!
interface Management0/0
nameif management
security-level 100
ip address 192.168.1.1 255.255.255.0
management-only
clock timezone cq 8
access-list nonat extended permit ip 172.26.9.0 255.255.255.0 192.168.129.0 255.255.255.0
asdm image disk0:/asdm-507.bin
nat-control
global (outside) 1 interface
nat (inside) 0 access-list nonat
nat (inside) 1 172.26.9.0 255.255.255.0
route outside 0.0.0.0 0.0.0.0 *.*.*.* 1
crypto ipsec transform-set ESP-DES-MD5 esp-des esp-md5-hmac
crypto dynamic-map dymap 10 set transform-set ESP-DES-MD5
crypto dynamic-map dymap 10 set reverse-route
crypto map mymap 65535 ipsec-isakmp dynamic dymap
crypto map mymap interface outside
isakmp identity address
isakmp enable outside
isakmp policy 10 authentication pre-share
isakmp policy 10 encryption des
isakmp policy 10 hash md5
isakmp policy 10 group 2
isakmp policy 10 lifetime 86400
tunnel-group DefaultRAGroup ipsec-attributes
pre-shared-key *
ASA Version 8.0(3)
interface Ethernet0/0
nameif outside
security-level 0
pppoe client vpdn group jtqy
ip address pppoe setroute
!
interface Ethernet0/1
nameif inside
security-level 100
ip address 192.168.129.1 255.255.255.0
access-list vpn extended permit ip 192.168.129.0 255.255.255.0 172.26.9.0 255.255.255.0
access-list nonat extended permit ip 192.168.129.0 255.255.255.0 172.26.9.0 255.255.255.0
global (outside) 1 interface
nat (inside) 0 access-list nonat
nat (inside) 1 192.168.129.0 255.255.255.0
crypto ipsec transform-set myset esp-des esp-md5-hmac
crypto map mymap 10 match address vpn
crypto map mymap 10 set peer 221.5.*.*
crypto map mymap 10 set transform-set myset
crypto map mymap interface outside
crypto isakmp identity hostname
crypto isakmp enable outside
crypto isakmp policy 30
authentication pre-share
encryption des
hash md5
group 2
lifetime 86400
no crypto isakmp nat-traversal
vpdn group jtqy request dialout pppoe
vpdn group jtqy localname ********
vpdn group jtqy ppp authentication pap
vpdn username ******** password *********
threat-detection basic-threat
threat-detection statistics access-list
tunnel-group 221.5.*.* type ipsec-l2l
tunnel-group 221.5.*.* ipsec-attributes
pre-shared-key *
ciscoasa(config)# show crypto isakmp sa
Active SA: 1
Rekey SA: 0 (A tunnel will report 1 Active and 1 Rekey SA during rekey)
Total IKE SA: 1
1 IKE Peer: 221.5.*.*
Type : user Role : initiator
Rekey : no State : MM_WAIT_MSG2
Feb 10 17:06:46 192.168.129.1 %ASA-7-609001: Built local-host outside:172.26.9.1
Feb 10 17:06:46 192.168.129.1 %ASA-7-609002: Teardown local-host outside:172.26.9.1 duration 0:00:00
Feb 10 17:06:46 192.168.129.1 %ASA-7-715077: Pitcher: received a key acquire message, spi 0x0
Feb 10 17:06:49 192.168.129.1 %ASA-7-710005: TCP request discarded from 98.204.188.143/63836 to outside:58.34.98.30/80
Feb 10 17:06:49 192.168.129.1 %ASA-7-713236: IP = 221.5.*.*, IKE_DECODE RESENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 108
Feb 10 17:06:57 192.168.129.1 %ASA-7-710005: TCP request discarded from 61.59.12.43/4828 to outside:58.34.98.30/8855
Feb 10 17:06:57 192.168.129.1 %ASA-7-713236: IP = 221.5.*.*, IKE_DECODE RESENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 108
Feb 10 17:06:57 192.168.129.1 %ASA-7-713236: IP = 221.5.*.*, IKE_DECODE RECEIVED Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 108
Feb 10 17:06:57 192.168.129.1 %ASA-7-715047: IP = 221.5.*.*, processing SA payload
Feb 10 17:06:57 192.168.129.1 %ASA-7-713906: IP = 221.5.*.*, Oakley proposal is acceptable
Feb 10 17:06:57 192.168.129.1 %ASA-7-715047: IP = 221.5.*.*, processing VID payload
Feb 10 17:06:57 192.168.129.1 %ASA-7-715049: IP = 221.5.*.*, Received Fragmentation VID
Feb 10 17:06:57 192.168.129.1 %ASA-7-715064: IP = 221.5.*.*, IKE Peer included IKE fragmentation capability flags: Main Mode: True Aggressive Mode: True
Feb 10 17:06:57 192.168.129.1 %ASA-7-715046: IP = 221.5.*.*, constructing ke payload
Feb 10 17:06:57 192.168.129.1 %ASA-7-715046: IP = 221.5.*.*, constructing nonce payload
Feb 10 17:06:57 192.168.129.1 %ASA-7-715046: IP = 221.5.*.*, constructing Cisco Unity VID payload
Feb 10 17:06:57 192.168.129.1 %ASA-7-715046: IP = 221.5.*.*, constructing xauth V6 VID payload
Feb 10 17:06:57 192.168.129.1 %ASA-7-715048: IP = 221.5.*.*, Send IOS VID
Feb 10 17:06:57 192.168.129.1 %ASA-7-715038: IP = 221.5.*.*, Constructing ASA spoofing IOS Vendor ID payload (version: 1.0.0, capabilities: 20000001)
Feb 10 17:06:57 192.168.129.1 %ASA-7-715046: IP = 221.5.*.*, constructing VID payload
Feb 10 17:06:57 192.168.129.1 %ASA-7-715048: IP = 221.5.*.*, Send Altiga/Cisco VPN3000/Cisco ASA GW VID
Feb 10 17:06:57 192.168.129.1 %ASA-7-713236: IP = 221.5.*.*, IKE_DECODE SENDING Message (msgid=0) with payloads : HDR + KE (4) + NONCE (10) + VENDOR (13) + VENDOR (13) + VENDOR (13) + VENDOR (13) + NONE (0) total length : 256
Feb 10 17:06:57 192.168.129.1 %ASA-7-713236: IP = 221.5.*.*, IKE_DECODE RESENDING Message (msgid=0) with payloads : HDR + KE (4) + NONCE (10) + VENDOR (13) + VENDOR (13) + VENDOR (13) + VENDOR (13) + NONE (0) total length : 256
Feb 10 17:06:57 192.168.129.1 %ASA-7-713236: IP = 221.5.*.*, IKE_DECODE RECEIVED Message (msgid=0) with payloads : HDR + KE (4) + NONCE (10) + VENDOR (13) + VENDOR (13) + VENDOR (13) + VENDOR (13) + NONE (0) total length : 256
Feb 10 17:06:57 192.168.129.1 %ASA-7-715047: IP = 221.5.*.*, processing ke payload
Feb 10 17:06:57 192.168.129.1 %ASA-7-715047: IP = 221.5.*.*, processing ISA_KE payload
Feb 10 17:06:57 192.168.129.1 %ASA-7-715047: IP = 221.5.*.*, processing nonce payload
Feb 10 17:06:57 192.168.129.1 %ASA-7-715047: IP = 221.5.*.*, processing VID payload
Feb 10 17:06:57 192.168.129.1 %ASA-7-715049: IP = 221.5.*.*, Received Cisco Unity client VID
Feb 10 17:06:57 192.168.129.1 %ASA-7-715047: IP = 221.5.*.*, processing VID payload
Feb 10 17:06:57 192.168.129.1 %ASA-7-715049: IP = 221.5.*.*, Received xauth V6 VID
Feb 10 17:06:57 192.168.129.1 %ASA-7-715047: IP = 221.5.*.*, processing VID payload
Feb 10 17:06:57 192.168.129.1 %ASA-7-715038: IP = 221.5.*.*, Processing VPN3000/ASA spoofing IOS Vendor ID payload (version: 1.0.0, capabilities: 20000001)
Feb 10 17:06:57 192.168.129.1 %ASA-7-715047: IP = 221.5.*.*, processing VID payload
Feb 10 17:06:57 192.168.129.1 %ASA-7-715049: IP = 221.5.*.*, Received Altiga/Cisco VPN3000/Cisco ASA GW VID
Feb 10 17:06:57 192.168.129.1 %ASA-7-713906: IP = 221.5.*.*, Connection landed on tunnel_group 221.5.*.*
Feb 10 17:06:57 192.168.129.1 %ASA-7-713906: Group = 221.5.*.*, IP = 221.5.*.*, Generating keys for Initiator...
Feb 10 17:06:57 192.168.129.1 %ASA-7-715046: Group = 221.5.*.*, IP = 221.5.*.*, constructing ID payload
Feb 10 17:06:57 192.168.129.1 %ASA-7-715046: Group = 221.5.*.*, IP = 221.5.*.*, constructing hash payload
Feb 10 17:06:57 192.168.129.1 %ASA-7-715076: Group = 221.5.*.*, IP = 221.5.*.*, Computing hash for ISAKMP
Feb 10 17:06:57 192.168.129.1 %ASA-7-715034: IP = 221.5.*.*, Constructing IOS keep alive payload: proposal=32767/32767 sec.
Feb 10 17:06:57 192.168.129.1 %ASA-7-715046: Group = 221.5.*.*, IP = 221.5.*.*, constructing dpd vid payload
Feb 10 17:06:57 192.168.129.1 %ASA-7-713236: IP = 221.5.*.*, IKE_DECODE SENDING Message (msgid=0) with payloads : HDR + ID (5) + HASH (8) + IOS KEEPALIVE (128) + VENDOR (13) + NONE (0) total length : 119
Feb 10 17:07:29 192.168.129.1 %ASA-7-715065: Group = 221.5.*.*, IP = 221.5.*.*, IKE MM Initiator FSM error history (struct &0xd468d8d0) <state>, <event>: MM_DONE, EV_ERROR-->MM_WAIT_MSG6, EV_PROB_AUTH_FAIL-->MM_WAIT_MSG6, EV_TIMEOUT-->MM_WAIT_MSG6, NullEvent-->MM_SND_MSG5, EV_SND_MSG-->MM_SND_MSG5, EV_START_TMR-->MM_SND_MSG5, EV_RESEND_MSG-->MM_WAIT_MSG6, EV_TIMEOUT
Feb 10 17:07:29 192.168.129.1 %ASA-7-713906: Group = 221.5.*.*, IP = 221.5.*.*, IKE SA MM:ef54f633 terminating: flags 0x0100c022, refcnt 0, tuncnt 0
Feb 10 17:07:29 192.168.129.1 %ASA-7-713906: Group = 221.5.*.*, IP = 221.5.*.*, sending delete/delete with reason message
Feb 10 17:07:29 192.168.129.1 %ASA-7-715046: Group = 221.5.*.*, IP = 221.5.*.*, constructing blank hash payload
Feb 10 17:07:29 192.168.129.1 %ASA-7-715046: Group = 221.5.*.*, IP = 221.5.*.*, constructing IKE delete payload
Feb 10 17:07:29 192.168.129.1 %ASA-7-715046: Group = 221.5.*.*, IP = 221.5.*.*, constructing qm hash payload
Feb 10 17:07:29 192.168.129.1 %ASA-7-713236: IP = 221.5.*.*, IKE_DECODE SENDING Message (msgid=82751ab6) with payloads : HDR + HASH (8) + DELETE (12) + NONE (0) total length : 76
Feb 10 17:10:00 192.168.129.1 %ASA-7-609001: Built local-host outside:221.5.*.*
Feb 10 17:10:00 192.168.129.1 %ASA-7-609002: Teardown local-host outside:221.5.*.* duration 0:00:00
Feb 10 17:10:03 192.168.129.1 %ASA-7-609001: Built local-host outside:172.26.9.1
Feb 10 17:10:03 192.168.129.1 %ASA-7-609002: Teardown local-host outside:172.26.9.1 duration 0:00:00
Feb 10 17:10:03 192.168.129.1 %ASA-7-715077: Pitcher: received a key acquire message, spi 0x0
Feb 10 17:10:03 192.168.129.1 %ASA-7-715046: IP = 221.5.*.*, constructing ISAKMP SA payload
Feb 10 17:10:03 192.168.129.1 %ASA-7-715046: IP = 221.5.*.*, constructing Fragmentation VID + extended capabilities payload
Feb 10 17:10:03 192.168.129.1 %ASA-7-713236: IP = 221.5.*.*, IKE_DECODE SENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 108
Feb 10 17:10:03 192.168.129.1 %ASA-7-609001: Built local-host outside:221.5.*.*
Feb 10 17:10:03 192.168.129.1 %ASA-7-713236: IP = 221.5.*.*, IKE_DECODE RECEIVED Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 108
Feb 10 17:10:03 192.168.129.1 %ASA-7-715047: IP = 221.5.*.*, processing SA payload
Feb 10 17:10:03 192.168.129.1 %ASA-7-713906: IP = 221.5.*.*, Oakley proposal is acceptable
Feb 10 17:10:03 192.168.129.1 %ASA-7-715047: IP = 221.5.*.*, processing VID payload
Feb 10 17:10:03 192.168.129.1 %ASA-7-715049: IP = 221.5.*.*, Received Fragmentation VID
Feb 10 17:10:03 192.168.129.1 %ASA-7-715064: IP = 221.5.*.*, IKE Peer included IKE fragmentation capability flags: Main Mode: True Aggressive Mode: True
Feb 10 17:10:03 192.168.129.1 %ASA-7-715046: IP = 221.5.*.*, constructing ke payload
Feb 10 17:10:03 192.168.129.1 %ASA-7-715046: IP = 221.5.*.*, constructing nonce payload
Feb 10 17:10:03 192.168.129.1 %ASA-7-715046: IP = 221.5.*.*, constructing Cisco Unity VID payload
Feb 10 17:10:03 192.168.129.1 %ASA-7-715046: IP = 221.5.*.*, constructing xauth V6 VID payload
Feb 10 17:10:03 192.168.129.1 %ASA-7-715048: IP = 221.5.*.*, Send IOS VID
Feb 10 17:10:03 192.168.129.1 %ASA-7-715038: IP = 221.5.*.*, Constructing ASA spoofing IOS Vendor ID payload (version: 1.0.0, capabilities: 20000001)
Feb 10 17:10:03 192.168.129.1 %ASA-7-715046: IP = 221.5.*.*, constructing VID payload
Feb 10 17:10:03 192.168.129.1 %ASA-7-715048: IP = 221.5.*.*, Send Altiga/Cisco VPN3000/Cisco ASA GW VID
Feb 10 17:10:03 192.168.129.1 %ASA-7-713236: IP = 221.5.*.*, IKE_DECODE SENDING Message (msgid=0) with payloads : HDR + KE (4) + NONCE (10) + VENDOR (13) + VENDOR (13) + VENDOR (13) + VENDOR (13) + NONE (0) total length : 256
Feb 10 17:10:04 192.168.129.1 %ASA-7-710005: TCP request discarded from 220.176.135.190/6000 to outside:58.34.98.30/1433
Feb 10 17:10:04 192.168.129.1 %ASA-7-710005: TCP request discarded from 87.238.159.51/26952 to outside:58.34.98.30/80
Feb 10 17:10:07 192.168.129.1 %ASA-7-710005: TCP request discarded from 87.238.159.51/26952 to outside:58.34.98.30/80
Feb 10 17:10:08 192.168.129.1 %ASA-7-609001: Built local-host outside:172.26.9.1
Feb 10 17:10:08 192.168.129.1 %ASA-7-609002: Teardown local-host outside:172.26.9.1 duration 0:00:00
Feb 10 17:10:08 192.168.129.1 %ASA-7-715077: Pitcher: received a key acquire message, spi 0x0
Feb 10 17:10:10 192.168.129.1 %ASA-7-710005: TCP request discarded from 61.59.12.43/1641 to outside:58.34.98.30/8855
Feb 10 17:10:11 192.168.129.1 %ASA-7-713236: IP = 221.5.*.*, IKE_DECODE RESENDING Message (msgid=0) with payloads : HDR + KE (4) + NONCE (10) + VENDOR (13) + VENDOR (13) + VENDOR (13) + VENDOR (13) + NONE (0) total length : 256
Feb 10 17:10:11 192.168.129.1 %ASA-7-713236: IP = 221.5.*.*, IKE_DECODE RESENDING Message (msgid=0) with payloads : HDR + KE (4) + NONCE (10) + VENDOR (13) + VENDOR (13) + VENDOR (13) + VENDOR (13) + NONE (0) total length : 256
Feb 10 17:10:11 192.168.129.1 %ASA-7-713236: IP = 221.5.*.*, IKE_DECODE RECEIVED Message (msgid=0) with payloads : HDR + KE (4) + NONCE (10) + VENDOR (13) + VENDOR (13) + VENDOR (13) + VENDOR (13) + NONE (0) total length : 256
Feb 10 17:10:11 192.168.129.1 %ASA-7-715047: IP = 221.5.*.*, processing ke payload
Feb 10 17:10:11 192.168.129.1 %ASA-7-715047: IP = 221.5.*.*, processing ISA_KE payload
Feb 10 17:10:11 192.168.129.1 %ASA-7-715047: IP = 221.5.*.*, processing nonce payload
Feb 10 17:10:11 192.168.129.1 %ASA-7-715047: IP = 221.5.*.*, processing VID payload
Feb 10 17:10:11 192.168.129.1 %ASA-7-715049: IP = 221.5.*.*, Received Cisco Unity client VID
Feb 10 17:10:11 192.168.129.1 %ASA-7-715047: IP = 221.5.*.*, processing VID payload
Feb 10 17:10:11 192.168.129.1 %ASA-7-715049: IP = 221.5.*.*, Received xauth V6 VID
Feb 10 17:10:11 192.168.129.1 %ASA-7-715047: IP = 221.5.*.*, processing VID payload
Feb 10 17:10:11 192.168.129.1 %ASA-7-715038: IP = 221.5.*.*, Processing VPN3000/ASA spoofing IOS Vendor ID payload (version: 1.0.0, capabilities: 20000001)
Feb 10 17:10:11 192.168.129.1 %ASA-7-715047: IP = 221.5.*.*, processing VID payload
Feb 10 17:10:11 192.168.129.1 %ASA-7-715049: IP = 221.5.*.*, Received Altiga/Cisco VPN3000/Cisco ASA GW VID
Feb 10 17:10:11 192.168.129.1 %ASA-7-713906: IP = 221.5.*.*, Connection landed on tunnel_group 221.5.*.*
Feb 10 17:10:11 192.168.129.1 %ASA-7-713906: Group = 221.5.*.*, IP = 221.5.*.*, Generating keys for Initiator...
Feb 10 17:10:11 192.168.129.1 %ASA-7-715046: Group = 221.5.*.*, IP = 221.5.*.*, constructing ID payload
Feb 10 17:10:11 192.168.129.1 %ASA-7-715046: Group = 221.5.*.*, IP = 221.5.*.*, constructing hash payload
Feb 10 17:10:11 192.168.129.1 %ASA-7-715076: Group = 221.5.*.*, IP = 221.5.*.*, Computing hash for ISAKMP
Feb 10 17:10:11 192.168.129.1 %ASA-7-715034: IP = 221.5.*.*, Constructing IOS keep alive payload: proposal=32767/32767 sec.
Feb 10 17:10:11 192.168.129.1 %ASA-7-715046: Group = 221.5.*.*, IP = 221.5.*.*, constructing dpd vid payload
Feb 10 17:10:11 192.168.129.1 %ASA-7-713236: IP = 221.5.*.*, IKE_DECODE SENDING Message (msgid=0) with payloads : HDR + ID (5) + HASH (8) + IOS KEEPALIVE (128) + VENDOR (13) + NONE (0) total length : 119
Feb 10 17:10:13 192.168.129.1 %ASA-7-710005: TCP request discarded from 87.238.159.51/26952 to outside:58.34.98.30/80
Feb 10 17:10:13 192.168.129.1 %ASA-7-609001: Built local-host outside:172.26.9.1
Feb 10 17:10:13 192.168.129.1 %ASA-7-609002: Teardown local-host outside:172.26.9.1 duration 0:00:00
Feb 10 17:10:13 192.168.129.1 %ASA-7-715077: Pitcher: received a key acquire message, spi 0x0
Feb 10 17:10:16 192.168.129.1 %ASA-7-710005: TCP request discarded from 61.59.12.43/1641 to outside:58.34.98.30/8855
Feb 10 17:10:18 192.168.129.1 %ASA-7-609001: Built local-host outside:172.26.9.1
Feb 10 17:10:18 192.168.129.1 %ASA-7-609002: Teardown local-host outside:172.26.9.1 duration 0:00:00
Feb 10 17:10:18 192.168.129.1 %ASA-7-715077: Pitcher: received a key acquire message, spi 0x0
Feb 10 17:10:23 192.168.129.1 %ASA-7-609001: Built local-host outside:172.26.9.1
Feb 10 17:10:23 192.168.129.1 %ASA-7-609002: Teardown local-host outside:172.26.9.1 duration 0:00:00
Feb 10 17:10:23 192.168.129.1 %ASA-7-715077: Pitcher: received a key acquire message, spi 0x0
Feb 10 17:10:28 192.168.129.1 %ASA-7-609001: Built local-host outside:172.26.9.1
Feb 10 17:10:28 192.168.129.1 %ASA-7-609002: Teardown local-host outside:172.26.9.1 duration 0:00:00
Feb 10 17:10:28 192.168.129.1 %ASA-7-715077: Pitcher: received a key acquire message, spi 0x0
Feb 10 17:10:31 192.168.129.1 %ASA-7-710005: TCP request discarded from 59.48.208.67/47942 to outside:58.34.98.30/12255
Feb 10 17:10:33 192.168.129.1 %ASA-7-609001: Built local-host outside:172.26.9.1
Feb 10 17:10:33 192.168.129.1 %ASA-7-609002: Teardown local-host outside:172.26.9.1 duration 0:00:00
Feb 10 17:10:33 192.168.129.1 %ASA-7-715077: Pitcher: received a key acquire message, spi 0x0
Feb 10 17:10:34 192.168.129.1 %ASA-7-710005: TCP request discarded from 59.48.208.67/47942 to outside:58.34.98.30/12255
Feb 10 17:10:35 192.168.129.1 %ASA-7-715065: Group = 221.5.*.*, IP = 221.5.*.*, IKE MM Initiator FSM error history (struct &0xd592d8b0) <state>, <event>: MM_DONE, EV_ERROR-->MM_WAIT_MSG6, EV_PROB_AUTH_FAIL-->MM_WAIT_MSG6, EV_TIMEOUT-->MM_WAIT_MSG6, NullEvent-->MM_SND_MSG5, EV_SND_MSG-->MM_SND_MSG5, EV_START_TMR-->MM_SND_MSG5, EV_RESEND_MSG-->MM_WAIT_MSG6, EV_TIMEOUT
Feb 10 17:10:35 192.168.129.1 %ASA-7-713906: Group = 221.5.*.*, IP = 221.5.*.*, IKE SA MM:f9562fb1 terminating: flags 0x0100c022, refcnt 0, tuncnt 0
Feb 10 17:10:35 192.168.129.1 %ASA-7-713906: Group = 221.5.*.*, IP = 221.5.*.*, sending delete/delete with reason message
Feb 10 17:10:35 192.168.129.1 %ASA-7-715046: Group = 221.5.*.*, IP = 221.5.*.*, constructing blank hash payload
Feb 10 17:10:35 192.168.129.1 %ASA-7-715046: Group = 221.5.*.*, IP = 221.5.*.*, constructing IKE delete payload
Feb 10 17:10:35 192.168.129.1 %ASA-7-715046: Group = 221.5.*.*, IP = 221.5.*.*, constructing qm hash payload
Feb 10 17:10:35 192.168.129.1 %ASA-7-713236: IP = 221.5.*.*, IKE_DECODE SENDING Message (msgid=5b9c9b6d) with payloads : HDR + HASH (8) + DELETE (12) + NONE (0) total length : 76
Feb 10 17:10:38 192.168.129.1 %ASA-7-710005: UDP request discarded from 58.60.15.34/8000 to outside:58.34.98.30/1079
Feb 10 17:10:38 192.168.129.1 %ASA-7-609001: Built local-host outside:172.26.9.1
Feb 10 17:10:38 192.168.129.1 %ASA-7-609002: Teardown local-host outside:172.26.9.1 duration 0:00:00
Feb 10 17:10:38 192.168.129.1 %ASA-7-715077: Pitcher: received a key acquire message, spi 0x0
Feb 10 17:10:38 192.168.129.1 %ASA-7-715046: IP = 221.5.*.*, constructing ISAKMP SA payload
Feb 10 17:10:38 192.168.129.1 %ASA-7-715046: IP = 221.5.*.*, constructing Fragmentation VID + extended capabilities payload
Feb 10 17:10:38 192.168.129.1 %ASA-7-713236: IP = 221.5.*.*, IKE_DECODE SENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 108