1812 VPN dropped

Hi,
My VPN through Cisco 1812 dropped second time. In SDM Syslog there were in both time the next lines:
Crypto engine: onboard 0 State changed to: Initialized
Crypto Engine: onboard 0 State changed to: Enabled
Interface FastEthernet1, changed state to up
Interface FastEthernet0, changed state to up
Line protocol in Interface Fast Ethernet0, changed state to up
Line protocol in Interface Fast Ethernet1, changed state to up
USB init complete
Line protocol on Interface FastEthernet changed state to down
and after this nothing to cold restart router. I don't know, what could be happen. Can anybody help me?
George

Change the isakmp policy parameters and make sure that the parameters are same in the both ends.

Similar Messages

  • Users VPN drops after every 5 mins

                       Hi everyone,
    We have user whose remote VPN drops after every 5 mins.
    Need to know whats things i can check to troubleshoot the issue?
    User connects by RSA Token.
    ISP connection is ok its not issue.
    Any thing i can check in ASA ?
    Thanks
    Mahesh

    On the client side, have you tested wired vs wireless to see if the problems exists in both?  If it's only one of them but not the other, try updating the drivers.  Also, if it's windows 7, take a look at the power settings in control panel.  I've seen where agressive power settings will shut off the network port when idle.  Not that big of a deal in a LAN environment but it wreaks havoc on VPN.

  • ASA 5505 Site-to-Site VPN dropping at end of lifetime

    I have 4 ASA 5505's with Site-to-Site IPSEC VPN tunnels built between them.  One of the tunnels stays up just fine but the other 2 drop at the end of the SA lifetime for a period of time equal to 10% of the SA lifetime.
    Orignially, I had the the lifetime set to 1 hour and the tunnels would drop for 6 minutes.  I changed the lifetime to 8 hours (480 minutes) and they dropped for 48 minutes.  I've gone over the configurations and the only differences I can find is that the sites where the tunnel drops have the outside interface forwarded to an VOIP server and all ports but SIP blocked.

    Can you post the configs?

  • Remote VPN drop

    Hi, ..
    There are Multiple Remote access connections comes to my VPN Concentrator.
    each remote office whos connected to my VPN can just connect with ONE PC only.
    when he tries to use VPN software to create new connection he success BUT the first drop.
    the solution was to Create Microsoft VPN Connection so that more than one person can connect from each office.
    I need to let them connect using Cisco VPN Software NOT microsoft.

    Hello,
    Could you use the firewall/router connecting your remote sites to the internet to setup a LAN-to-LAN VPN?
    In case this is not possible, did the clients configure "Enable Transparent tunneling" with IPSec over UDP? It somehow sounds like a NAT/PAT problem in conjunction with "VPN passthrough" on lower end DSL/cable routers. They might only support one IPSec tunnel at a time.
    The transparent tunneling can be configured in the client through "Connection entries -> Modify" and then a new window pops up where you can select the "transport" tab and enable transparent tunneling with UDP.
    Hope this helps! Please rate all posts.
    Regards, Martin

  • Srp521w VPN dropping at the same time everyday

    I have the latest firmware of FW:1.01.11 but everyday the last 4 days, the tunnels dropped at 5:31am and reconnects within a few minutes. There are 2 vpn tunnels, one for data and one for voice. Using 3des/sha1 with 28800 lifetime. Internet is going through the wan and voice is turned off and this workaround was used as well.
    https://supportforums.cisco.com/docs/DOC-12874

    This is a standard facet of most VPNs - the problem lies in your NAT router since both clients appear to come from the same IP address as far as the VPN server is concerned, and the router can't separate out the traffic.
    There are a couple of solutions.
    First, the built-in VPN server supports L2TP and PPTP protocols. You should be able to connect one system under each protocol, so that gets your two machines connected.
    Second, you can replace your NAT router with one that supports multiple VPN clients (often termed 'VPN passthrough').
    Third, setup a site-to-site tunnel so that your entire LAN is connected to the VPN (this saves you from having to run a separate VPN client on each machine, but is typically only worth it when you have more machines).

  • Interprovider MPLS VPN - "drop -- rewrite null"

    Hi,
    i have an interprovider VPN where a remote route is received on ASBR and forwarded to my AS PE but traffic coing from my PE is dropped because label forwarding is not installed:
    c2851-ASBR#sh ip bgp vpnv4 all la
    Network Next Hop In label/Out label
    Route Distinguisher: 3302:141141
    10.0.0.0/24 172.26.107.94 20/100192
    81.114.246.16/29 172.16.0.4 22/18
    192.168.0.0 172.16.0.4 21/16
    c2851-ASBR#sh mpls forwarding-table
    Local Outgoing Prefix Bytes tag Outgoing Next Hop
    tag tag or VC or Tunnel Id switched interface
    16 Pop tag 172.16.0.4/32 0 Gi0/1 172.26.0.2
    21 16 3302:141141:192.168.0.0/24 \
    0 Gi0/1 172.26.0.2
    22 18 3302:141141:81.114.246.16/29 \
    0 Gi0/1 172.26.0.2
    As you can see the label 100192 is not present in the mpls forwarding.
    If i create the vrf on the ASBR everithing works correctly:
    c2851-ASBR#sh mpls forwarding-table
    Local Outgoing Prefix Bytes tag Outgoing Next Hop
    tag tag or VC or Tunnel Id switched interface
    16 Pop tag 172.16.0.4/32 0 Gi0/1 172.26.0.2
    20 100192 10.0.0.0/24[V] 488 Gi0/0.124 172.26.107.94
    21 16 192.168.0.0/24[V] 472 Gi0/1 172.26.0.2
    22 18 81.114.246.16/29[V] \
    0 Gi0/1 172.26.0.2
    Thanks
    S.

    the lab setup is quite simple:
    AS1 PE --ibgp-- AS1 ASBR (172.26.107.94) ----ebgp---- AS2 ASBR (172.26.107.93) --ibgp-- AS2 PE (lo0 172.16.0.4)
    From the AS2 ASBR the next hop for the internal route is the lo0 of the AS2 PE and the next hop for the AS1 route is the ip address of the btb interface (the ebgp peer is built on the directed connected interface). So no problem on the ebgp next hop.
    The label swap from 22 to 18 is unidirectional and is used for the traffic coming from AS1 PE directed to the AS2 PE for destination network annouced by AS2PE.
    From the AS2PE point of view there is no problem on the traffic forwarding (label 20 is imposed to the packet and this is the right behaviour) but AS2ASBR doesn't swap it with label 100192 because it is not in the mpls forwarding table. so i think that the problem is not on the PE but in the behaviour of the ASBR.
    s.

  • IpSEC vpn dropped every day in peak hours

    Hi, there,
    our l2l vpn keeps dropping around 11am and 4pm, never happened during night and weekend.
    the main errior is"Removing peer from correlator table failed, no match!"
    the detail log is attached(from asa side)
    pls help me with this
    we are using asa5510 7.0 and pix 501 6.3
    part of the log
    "4|Jun 23 2010 10:31:00|713903: IP = x.x.x.138, Error: Unable to remove PeerTblEntry
    3|Jun 23 2010 10:31:00|713902: IP = x.x.x.138, Removing peer from peer table failed, no match!
    7|Jun 23 2010 10:31:00|713906: IP = x.x.x.138, sending delete/delete with reason message
    7|Jun 23 2010 10:31:00|713906: IP = x.x.x.138, IKE SA MM:4d24e98b terminating:  flags 0x01000002, refcnt 0, tuncnt 0
    7|Jun 23 2010 10:31:00|715065: IP = x.x.x.138, IKE MM Responder FSM error history (struct &0x1930e90)  <state>, <event>:  MM_DONE, EV_ERROR-->MM_WAIT_MSG3, EV_TIMEOUT-->MM_WAIT_MSG3, NullEvent-->MM_SND_MSG2, EV_SND_MSG-->MM_SND_MSG2, EV_START_TMR-->MM_SND_MSG2, EV_RESEND_MSG-->MM_WAIT_MSG3, EV_TIMEOUT-->MM_WAIT_MSG3, NullEvent
    4|Jun 23 2010 10:30:54|713903: IP = x.x.x.138, Error: Unable to remove PeerTblEntry
    3|Jun 23 2010 10:30:54|713902: IP = x.x.x.138, Removing peer from peer table failed, no match!
    7|Jun 23 2010 10:30:54|713906: IP = x.x.x.138, sending delete/delete with reason message
    7|Jun 23 2010 10:30:54|713906: IP = x.x.x.138, IKE SA MM:57d21f6d terminating:  flags 0x01000002, refcnt 0, tuncnt 0
    7|Jun 23 2010 10:30:54|715065: IP = x.x.x.138, IKE MM Responder FSM error history (struct &0x398d228)  <state>, <event>:  MM_DONE, EV_ERROR-->MM_WAIT_MSG3, EV_TIMEOUT-->MM_WAIT_MSG3, NullEvent-->MM_SND_MSG2, EV_SND_MSG-->MM_SND_MSG2, EV_START_TMR-->MM_SND_MSG2, EV_RESEND_MSG-->MM_WAIT_MSG3, EV_TIMEOUT-->MM_WAIT_MSG3, NullEvent
    7|Jun 23 2010 10:30:52|713236: IP = x.x.x.138, IKE_DECODE RESENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 108
    7|Jun 23 2010 10:30:46|713236: IP = x.x.x.138, IKE_DECODE RESENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 108
    7|Jun 23 2010 10:30:44|713236: IP = x.x.x.138, IKE_DECODE RESENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 108
    6|Jun 23 2010 10:30:44|713905: IP = x.x.x.138, P1 Retransmit msg dispatched to MM FSM
    5|Jun 23 2010 10:30:44|713201: IP = x.x.x.138, Duplicate Phase 1 packet detected.  Retransmitting last packet.
    6|Jun 23 2010 10:30:43|713219: IP = x.x.x.138, Queuing KEY-ACQUIRE messages to be processed when P1 SA is complete.
    7|Jun 23 2010 10:30:42|713236: IP = x.x.x.138, IKE_DECODE RESENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 108
    7|Jun 23 2010 10:30:38|713236: IP = x.x.x.138, IKE_DECODE RESENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 108
    7|Jun 23 2010 10:30:34|713236: IP = x.x.x.138, IKE_DECODE SENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 108
    7|Jun 23 2010 10:30:34|715046: IP = x.x.x.138, constructing Fragmentation VID + extended capabilities payload
    7|Jun 23 2010 10:30:34|715046: IP = x.x.x.138, constructing ISAKMP SA payload
    7|Jun 23 2010 10:30:34|715028: IP = x.x.x.138, IKE SA Proposal # 1, Transform # 0 acceptable  Matches global IKE entry # 5
    7|Jun 23 2010 10:30:34|715047: IP = x.x.x.138, processing IKE SA payload
    7|Jun 23 2010 10:30:34|715049: IP = x.x.x.138, Received DPD VID
    7|Jun 23 2010 10:30:34|715047: IP = x.x.x.138, processing VID payload
    7|Jun 23 2010 10:30:34|713906: IP = x.x.x.138, Oakley proposal is acceptable
    7|Jun 23 2010 10:30:34|715047: IP = x.x.x.138, processing SA payload
    7|Jun 23 2010 10:30:34|713236: IP = x.x.x.138, IKE_DECODE RECEIVED Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 104
    7|Jun 23 2010 10:30:30|713236: IP = x.x.x.138, IKE_DECODE RESENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 108
    7|Jun 23 2010 10:30:22|713236: IP = x.x.x.138, IKE_DECODE SENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 108
    7|Jun 23 2010 10:30:22|715046: IP = x.x.x.138, constructing Fragmentation VID + extended capabilities payload
    7|Jun 23 2010 10:30:22|715046: IP = x.x.x.138, constructing ISAKMP SA payload
    7|Jun 23 2010 10:30:22|715028: IP = x.x.x.138, IKE SA Proposal # 1, Transform # 0 acceptable  Matches global IKE entry # 5
    7|Jun 23 2010 10:30:22|715047: IP = x.x.x.138, processing IKE SA payload
    7|Jun 23 2010 10:30:22|715049: IP = x.x.x.138, Received DPD VID
    7|Jun 23 2010 10:30:22|715047: IP = x.x.x.138, processing VID payload
    7|Jun 23 2010 10:30:22|713906: IP = x.x.x.138, Oakley proposal is acceptable
    7|Jun 23 2010 10:30:22|715047: IP = x.x.x.138, processing SA payload
    7|Jun 23 2010 10:30:22|713236: IP = x.x.x.138, IKE_DECODE RECEIVED Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 104
    4|Jun 23 2010 10:30:18|713903: IP = x.x.x.138, Error: Unable to remove PeerTblEntry
    3|Jun 23 2010 10:30:18|713902: IP = x.x.x.138, Removing peer from peer table failed, no match!
    7|Jun 23 2010 10:30:18|713906: IP = x.x.x.138, sending delete/delete with reason message
    appreciated.
    Alex

    7|Jun 24 2010 11:41:55|713236: IP = x.x.198.138, IKE_DECODE RESENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 108
    7|Jun 24 2010 11:41:49|713236: IP = x.x.198.138, IKE_DECODE SENDING Message (msgid=0) with payloads : HDR + KE (4) + NONCE (10) + VENDOR (13) + VENDOR (13) + VENDOR (13) + VENDOR (13) + NONE (0) total length : 256
    7|Jun 24 2010 11:41:49|713906: Group = DefaultRAGroup, IP = x.x.198.138, Generating keys for Responder...
    7|Jun 24 2010 11:41:49|713906: IP = x.x.198.138, Connection landed on tunnel_group DefaultRAGroup
    7|Jun 24 2010 11:41:49|715048: IP = x.x.198.138, Send Altiga/Cisco VPN3000/Cisco ASA GW VID
    7|Jun 24 2010 11:41:49|715046: IP = x.x.198.138, constructing VID payload
    7|Jun 24 2010 11:41:49|715038: IP = x.x.198.138, Constructing ASA spoofing IOS Vendor ID payload (version: 1.0.0, capabilities: 20000001)
    7|Jun 24 2010 11:41:49|715048: IP = x.x.198.138, Send IOS VID
    7|Jun 24 2010 11:41:49|715046: IP = x.x.198.138, constructing xauth V6 VID payload
    7|Jun 24 2010 11:41:49|715046: IP = x.x.198.138, constructing Cisco Unity VID payload
    7|Jun 24 2010 11:41:49|715046: IP = x.x.198.138, constructing nonce payload
    7|Jun 24 2010 11:41:49|715046: IP = x.x.198.138, constructing ke payload
    7|Jun 24 2010 11:41:49|715047: IP = x.x.198.138, processing nonce payload
    7|Jun 24 2010 11:41:49|715047: IP = x.x.198.138, processing ISA_KE payload
    7|Jun 24 2010 11:41:49|715047: IP = x.x.198.138, processing ke payload
    7|Jun 24 2010 11:41:49|713236: IP = x.x.198.138, IKE_DECODE RECEIVED Message (msgid=0) with payloads : HDR + KE (4) + NONCE (10) + NONE (0) total length : 180
    7|Jun 24 2010 11:41:48|713236: IP = x.x.198.138, IKE_DECODE SENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 108
    7|Jun 24 2010 11:41:48|715046: IP = x.x.198.138, constructing Fragmentation VID + extended capabilities payload
    7|Jun 24 2010 11:41:48|715046: IP = x.x.198.138, constructing ISAKMP SA payload
    7|Jun 24 2010 11:41:48|715028: IP = x.x.198.138, IKE SA Proposal # 1, Transform # 0 acceptable  Matches global IKE entry # 4
    7|Jun 24 2010 11:41:48|715047: IP = x.x.198.138, processing IKE SA payload
    7|Jun 24 2010 11:41:48|713906: IP = x.x.198.138, Oakley proposal is acceptable
    7|Jun 24 2010 11:41:48|715047: IP = x.x.198.138, processing SA payload
    7|Jun 24 2010 11:41:48|713236: IP = x.x.198.138, IKE_DECODE RECEIVED Message (msgid=0) with payloads : HDR + SA (1) + NONE (0) total length : 84
    7|Jun 24 2010 11:41:47|713236: IP = x.x.198.138, IKE_DECODE SENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 108
    7|Jun 24 2010 11:41:47|715046: IP = x.x.198.138, constructing Fragmentation VID + extended capabilities payload
    7|Jun 24 2010 11:41:47|715046: IP = x.x.198.138, constructing ISAKMP SA payload
    7|Jun 24 2010 11:41:47|715028: IP = x.x.198.138, IKE SA Proposal # 1, Transform # 0 acceptable  Matches global IKE entry # 4
    7|Jun 24 2010 11:41:47|715047: IP = x.x.198.138, processing IKE SA payload
    7|Jun 24 2010 11:41:47|713906: IP = x.x.198.138, Oakley proposal is acceptable
    7|Jun 24 2010 11:41:47|715047: IP = x.x.198.138, processing SA payload
    7|Jun 24 2010 11:41:47|713236: IP = x.x.198.138, IKE_DECODE RECEIVED Message (msgid=0) with payloads : HDR + SA (1) + NONE (0) total length : 84
    6|Jun 24 2010 11:41:44|302014: Teardown TCP connection 1078 for outside:x.x.198.138/16546 to NP Identity Ifc:66.92.228.251/443 duration 0:00:01 bytes 937 TCP FINs
    6|Jun 24 2010 11:41:44|605005: Login permitted from x.x.198.138/16546 to outside:66.92.228.251/https for user "alex"
    6|Jun 24 2010 11:41:43|302013: Built inbound TCP connection 1078 for outside:x.x.198.138/16546 (x.x.198.138/16546) to NP Identity Ifc:66.92.228.251/443 (66.92.228.251/443)
    4|Jun 24 2010 11:41:42|713903: IP = x.x.198.138, Error: Unable to remove PeerTblEntry
    3|Jun 24 2010 11:41:42|713902: IP = x.x.198.138, Removing peer from peer table failed, no match!
    7|Jun 24 2010 11:41:42|713906: IP = x.x.198.138, sending delete/delete with reason message
    7|Jun 24 2010 11:41:42|713906: IP = x.x.198.138, IKE SA MM:7f14d974 terminating:  flags 0x01000002, refcnt 0, tuncnt 0
    7|Jun 24 2010 11:41:42|715065: IP = x.x.198.138, IKE MM Responder FSM error history (struct &0x3946b30)  , :  MM_DONE, EV_ERROR-->MM_WAIT_MSG3, EV_TIMEOUT-->MM_WAIT_MSG3, NullEvent-->MM_SND_MSG2, EV_SND_MSG-->MM_SND_MSG2, EV_START_TMR-->MM_SND_MSG2, EV_RESEND_MSG-->MM_WAIT_MSG3, EV_TIMEOUT-->MM_WAIT_MSG3, NullEvent
    6|Jun 24 2010 11:41:41|605005: Login permitted from x.x.198.138/16548 to outside:66.92.228.251/https for user "alex"
    6|Jun 24 2010 11:41:41|302013: Built inbound TCP connection 1063 for outside:x.x.198.138/16548 (x.x.198.138/16548) to NP Identity Ifc:66.92.228.251/443 (66.92.228.251/443)
    6|Jun 24 2010 11:41:40|302014: Teardown TCP connection 1062 for outside:x.x.198.138/16544 to NP Identity Ifc:66.92.228.251/443 duration 0:00:01 bytes 852 TCP FINs
    6|Jun 24 2010 11:41:39|605005: Login permitted from x.x.198.138/16544 to outside:66.92.228.251/https for user "alex"
    6|Jun 24 2010 11:41:39|302013: Built inbound TCP connection 1062 for outside:x.x.198.138/16544 (x.x.198.138/16544) to NP Identity Ifc:66.92.228.251/443 (66.92.228.251/443)
    6|Jun 24 2010 11:41:37|302014: Teardown TCP connection 1061 for outside:x.x.198.138/16542 to NP Identity Ifc:66.92.228.251/443 duration 0:00:01 bytes 905 TCP FINs
    6|Jun 24 2010 11:41:37|605005: Login permitted from x.x.198.138/16542 to outside:66.92.228.251/https for user "alex"
    7|Jun 24 2010 11:41:36|710002: TCP access permitted from x.x.198.138/16542 to outside:66.92.228.251/https
    6|Jun 24 2010 11:41:36|302013: Built inbound TCP connection 1061 for outside:x.x.198.138/16542 (x.x.198.138/16542) to NP Identity Ifc:66.92.228.251/443 (66.92.228.251/443)
    7|Jun 24 2010 11:41:34|713236: IP = x.x.198.138, IKE_DECODE RESENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 108
    6|Jun 24 2010 11:41:30|302014: Teardown TCP connection 904 for outside:x.x.198.138/16538 to NP Identity Ifc:66.92.228.251/22 duration 0:01:42 bytes 23872 TCP FINs
    6|Jun 24 2010 11:41:29|315011: SSH session from x.x.198.138 on interface outside for user "alex" terminated normally
    7|Jun 24 2010 11:41:26|713236: IP = x.x.198.138, IKE_DECODE RESENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 108
    6|Jun 24 2010 11:41:26|713905: IP = x.x.198.138, P1 Retransmit msg dispatched to MM FSM
    5|Jun 24 2010 11:41:26|713201: IP = x.x.198.138, Duplicate Phase 1 packet detected.  Retransmitting last packet.
    7|Jun 24 2010 11:41:24|713236: IP = x.x.198.138, IKE_DECODE RESENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 108
    7|Jun 24 2010 11:41:16|713236: IP = x.x.198.138, IKE_DECODE SENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 108
    7|Jun 24 2010 11:41:16|715046: IP = x.x.198.138, constructing Fragmentation VID + extended capabilities payload
    7|Jun 24 2010 11:41:16|715046: IP = x.x.198.138, constructing ISAKMP SA payload
    7|Jun 24 2010 11:41:16|715028: IP = x.x.198.138, IKE SA Proposal # 1, Transform # 0 acceptable  Matches global IKE entry # 4
    7|Jun 24 2010 11:41:16|715047: IP = x.x.198.138, processing IKE SA payload
    7|Jun 24 2010 11:41:16|713906: IP = x.x.198.138, Oakley proposal is acceptable
    7|Jun 24 2010 11:41:16|715047: IP = x.x.198.138, processing SA payload
    7|Jun 24 2010 11:41:16|713236: IP = x.x.198.138, IKE_DECODE RECEIVED Message (msgid=0) with payloads : HDR + SA (1) + NONE (0) total length : 84
    7|Jun 24 2010 11:41:14|713906: Group = DefaultL2LGroup, IP = x.x.198.138, Responder resending last msg
    6|Jun 24 2010 11:41:14|713905: Group = DefaultL2LGroup, IP = x.x.198.138, P1 Retransmit msg dispatched to MM FSM
    5|Jun 24 2010 11:41:14|713201: Group = DefaultL2LGroup, IP = x.x.198.138, Duplicate Phase 1 packet detected.  Retransmitting last packet.
    7|Jun 24 2010 11:41:08|713906: IP = x.x.198.138, sending delete/delete with reason message
    7|Jun 24 2010 11:41:08|713906: IP = x.x.198.138, IKE SA MM:bf61672f terminating:  flags 0x01000002, refcnt 0, tuncnt 0
    7|Jun 24 2010 11:41:08|715065: IP = x.x.198.138, IKE MM Responder FSM error history (struct &0x395c160)  , :  MM_DONE, EV_ERROR-->MM_WAIT_MSG3, EV_TIMEOUT-->MM_WAIT_MSG3, NullEvent-->MM_SND_MSG2, EV_SND_MSG-->MM_SND_MSG2, EV_START_TMR-->MM_SND_MSG2, EV_RESEND_MSG-->MM_WAIT_MSG3, EV_TIMEOUT-->MM_WAIT_MSG3, NullEvent
    7|Jun 24 2010 11:41:04|713906: Group = DefaultL2LGroup, IP = x.x.198.138, Starting phase 1 rekey timer: 64800000 (ms)
    3|Jun 24 2010 11:41:04|713122: IP = x.x.198.138, Keep-alives configured on but peer does not support keep-alives (type = None)
    7|Jun 24 2010 11:41:04|713121: IP = x.x.198.138, Keep-alive type for this connection: None
    3|Jun 24 2010 11:41:04|713119: Group = DefaultL2LGroup, IP = x.x.198.138, PHASE 1 COMPLETED
    7|Jun 24 2010 11:41:04|713236: IP = x.x.198.138, IKE_DECODE SENDING Message (msgid=0) with payloads : HDR + ID (5) + HASH (8) + VENDOR (13) + NONE (0) total length : 84
    7|Jun 24 2010 11:41:04|715046: Group = DefaultL2LGroup, IP = x.x.198.138, constructing dpd vid payload
    7|Jun 24 2010 11:41:04|715076: Group = DefaultL2LGroup, IP = x.x.198.138, Computing hash for ISAKMP
    7|Jun 24 2010 11:41:04|715046: Group = DefaultL2LGroup, IP = x.x.198.138, constructing hash payload
    7|Jun 24 2010 11:41:04|715046: Group = DefaultL2LGroup, IP = x.x.198.138, constructing ID payload
    4|Jun 24 2010 11:41:04|713903: Group = DefaultL2LGroup, IP = x.x.198.138, Freeing previously allocated memory for authorization-dn-attributes
    7|Jun 24 2010 11:41:04|713906: IP = x.x.198.138, Connection landed on tunnel_group DefaultL2LGroup
    7|Jun 24 2010 11:41:04|715076: Group = DefaultL2LGroup, IP = x.x.198.138, Computing hash for ISAKMP
    7|Jun 24 2010 11:41:04|715047: Group = DefaultL2LGroup, IP = x.x.198.138, processing hash payload
    7|Jun 24 2010 11:41:04|714011: Group = DefaultL2LGroup, IP = x.x.198.138, ID_IPV4_ADDR ID received
    7|Jun 24 2010 11:41:04|715047: Group = DefaultL2LGroup, IP = x.x.198.138, processing ID payload
    7|Jun 24 2010 11:41:04|713236: IP = x.x.198.138, IKE_DECODE RECEIVED Message (msgid=0) with payloads : HDR + ID (5) + HASH (8) + NONE (0) total length : 64
    7|Jun 24 2010 11:41:04|713906: Group = DefaultL2LGroup, IP = x.x.198.138, Generating keys for Responder...
    6|Jun 24 2010 11:41:04|713905: Group = DefaultRAGroup, IP = x.x.198.138, WARNING, had problems decrypting packet, probably due to mismatched pre-shared key.  Switching user to tunnel-group: DefaultL2LGroup
    5|Jun 24 2010 11:41:04|713904: Group = DefaultRAGroup, IP = x.x.198.138, Received encrypted Oakley Main Mode packet with invalid payloads, MessID = 0
    6|Jun 24 2010 11:41:03|713905: Group = DefaultRAGroup, IP = x.x.198.138, P1 Retransmit msg dispatched to MM FSM
    5|Jun 24 2010 11:41:03|713201: Group = DefaultRAGroup, IP = x.x.198.138, Duplicate Phase 1 packet detected.  Retransmitting last packet.
    7|Jun 24 2010 11:41:00|713236: IP = x.x.198.138, IKE_DECODE RESENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 108
    7|Jun 24 2010 11:40:53|713236: IP = x.x.198.138, IKE_DECODE SENDING Message (msgid=0) with payloads : HDR + KE (4) + NONCE (10) + VENDOR (13) + VENDOR (13) + VENDOR (13) + VENDOR (13) + NONE (0) total length : 256
    7|Jun 24 2010 11:40:53|713906: Group = DefaultRAGroup, IP = x.x.198.138, Generating keys for Responder...
    7|Jun 24 2010 11:40:53|713906: IP = x.x.198.138, Connection landed on tunnel_group DefaultRAGroup
    7|Jun 24 2010 11:40:53|715048: IP = x.x.198.138, Send Altiga/Cisco VPN3000/Cisco ASA GW VID
    7|Jun 24 2010 11:40:53|715046: IP = x.x.198.138, constructing VID payload
    7|Jun 24 2010 11:40:53|715038: IP = x.x.198.138, Constructing ASA spoofing IOS Vendor ID payload (version: 1.0.0, capabilities: 20000001)
    7|Jun 24 2010 11:40:53|715048: IP = x.x.198.138, Send IOS VID
    7|Jun 24 2010 11:40:53|715046: IP = x.x.198.138, constructing xauth V6 VID payload
    7|Jun 24 2010 11:40:53|715046: IP = x.x.198.138, constructing Cisco Unity VID payload
    7|Jun 24 2010 11:40:53|715046: IP = x.x.198.138, constructing nonce payload
    7|Jun 24 2010 11:40:53|715046: IP = x.x.198.138, constructing ke payload
    7|Jun 24 2010 11:40:53|715047: IP = x.x.198.138, processing nonce payload
    7|Jun 24 2010 11:40:53|715047: IP = x.x.198.138, processing ISA_KE payload
    7|Jun 24 2010 11:40:53|715047: IP = x.x.198.138, processing ke payload
    7|Jun 24 2010 11:40:53|713236: IP = x.x.198.138, IKE_DECODE RECEIVED Message (msgid=0) with payloads : HDR + KE (4) + NONCE (10) + NONE (0) total length : 180
    7|Jun 24 2010 11:40:52|713236: IP = x.x.198.138, IKE_DECODE RESENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 108
    6|Jun 24 2010 11:40:52|713905: IP = x.x.198.138, P1 Retransmit msg dispatched to MM FSM
    5|Jun 24 2010 11:40:52|713201: IP = x.x.198.138, Duplicate Phase 1 packet detected.  Retransmitting last packet.
    7|Jun 24 2010 11:40:52|713236: IP = x.x.198.138, IKE_DECODE RESENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 108
    7|Jun 24 2010 11:40:50|713236: IP = x.x.198.138, IKE_DECODE RESENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 108
    7|Jun 24 2010 11:40:44|713236: IP = x.x.198.138, IKE_DECODE RESENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 108
    7|Jun 24 2010 11:40:42|713236: IP = x.x.198.138, IKE_DECODE SENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 108
    7|Jun 24 2010 11:40:42|715046: IP = x.x.198.138, constructing Fragmentation VID + extended capabilities payload
    7|Jun 24 2010 11:40:42|715046: IP = x.x.198.138, constructing ISAKMP SA payload
    7|Jun 24 2010 11:40:42|715028: IP = x.x.198.138, IKE SA Proposal # 1, Transform # 0 acceptable  Matches global IKE entry # 4
    7|Jun 24 2010 11:40:42|715047: IP = x.x.198.138, processing IKE SA payload
    7|Jun 24 2010 11:40:42|713906: IP = x.x.198.138, Oakley proposal is acceptable
    7|Jun 24 2010 11:40:42|715047: IP = x.x.198.138, processing SA payload
    7|Jun 24 2010 11:40:42|713236: IP = x.x.198.138, IKE_DECODE RECEIVED Message (msgid=0) with payloads : HDR + SA (1) + NONE (0) total length : 84
    7|Jun 24 2010 11:40:36|713236: IP = x.x.198.138, IKE_DECODE SENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 108
    7|Jun 24 2010 11:40:36|715046: IP = x.x.198.138, constructing Fragmentation VID + extended capabilities payload
    7|Jun 24 2010 11:40:36|715046: IP = x.x.198.138, constructing ISAKMP SA payload
    7|Jun 24 2010 11:40:36|715028: IP = x.x.198.138, IKE SA Proposal # 1, Transform # 0 acceptable  Matches global IKE entry # 4
    7|Jun 24 2010 11:40:36|715047: IP = x.x.198.138, processing IKE SA payload
    7|Jun 24 2010 11:40:36|713906: IP = x.x.198.138, Oakley proposal is acceptable
    7|Jun 24 2010 11:40:36|715047: IP = x.x.198.138, processing SA payload
    7|Jun 24 2010 11:40:36|713236: IP = x.x.198.138, IKE_DECODE RECEIVED Message (msgid=0) with payloads : HDR + SA (1) + NONE (0) total length : 84
    4|Jun 24 2010 11:40:32|713903: IP = x.x.198.138, Error: Unable to remove PeerTblEntry
    3|Jun 24 2010 11:40:32|713902: IP = x.x.198.138, Removing peer from peer table failed, no match!
    7|Jun 24 2010 11:40:32|713906: IP = x.x.198.138, sending delete/delete with reason message
    7|Jun 24 2010 11:40:32|713906: IP = x.x.198.138, IKE SA MM:52cdd2a3 terminating:  flags 0x01000002, refcnt 0, tuncnt 0
    7|Jun 24 2010 11:40:32|715065: IP = x.x.198.138, IKE MM Responder FSM error history (struct &0x39665d0)  , :  MM_DONE, EV_ERROR-->MM_WAIT_MSG3, EV_TIMEOUT-->MM_WAIT_MSG3, NullEvent-->MM_SND_MSG2, EV_SND_MSG-->MM_SND_MSG2, EV_START_TMR-->MM_SND_MSG2, EV_RESEND_MSG-->MM_WAIT_MSG3, EV_TIMEOUT-->MM_WAIT_MSG3, NullEvent
    7|Jun 24 2010 11:40:24|713236: IP = x.x.198.138, IKE_DECODE RESENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 108
    7|Jun 24 2010 11:40:18|710005: TCP request discarded from x.x.198.138/16538 to outside:66.92.228.251/22
    7|Jun 24 2010 11:40:18|710005: TCP request discarded from x.x.198.138/16538 to outside:66.92.228.251/22
    7|Jun 24 2010 11:40:18|710005: TCP request discarded from x.x.198.138/16538 to outside:66.92.228.251/22
    7|Jun 24 2010 11:40:16|713236: IP = x.x.198.138, IKE_DECODE RESENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 108
    6|Jun 24 2010 11:40:16|713905: IP = x.x.198.138, P1 Retransmit msg dispatched to MM FSM
    5|Jun 24 2010 11:40:16|713201: IP = x.x.198.138, Duplicate Phase 1 packet detected.  Retransmitting last packet.
    7|Jun 24 2010 11:40:13|713236: IP = x.x.198.138, IKE_DECODE RESENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 108
    7|Jun 24 2010 11:40:08|710005: TCP request discarded from x.x.198.138/16538 to outside:66.92.228.251/22
    7|Jun 24 2010 11:40:05|713236: IP = x.x.198.138, IKE_DECODE SENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 108
    7|Jun 24 2010 11:40:05|715046: IP = x.x.198.138, constructing Fragmentation VID + extended capabilities payload
    7|Jun 24 2010 11:40:05|715046: IP = x.x.198.138, constructing ISAKMP SA payload
    7|Jun 24 2010 11:40:05|715028: IP = x.x.198.138, IKE SA Proposal # 1, Transform # 0 acceptable  Matches global IKE entry # 4
    7|Jun 24 2010 11:40:05|715047: IP = x.x.198.138, processing IKE SA payload
    7|Jun 24 2010 11:40:05|713906: IP = x.x.198.138, Oakley proposal is acceptable
    7|Jun 24 2010 11:40:05|715047: IP = x.x.198.138, processing SA payload
    7|Jun 24 2010 11:40:05|713236: IP = x.x.198.138, IKE_DECODE RECEIVED Message (msgid=0) with payloads : HDR + SA (1) + NONE (0) total length : 84
    4|Jun 24 2010 11:40:01|713903: Group = DefaultRAGroup, IP = x.x.198.138, Error: Unable to remove PeerTblEntry
    3|Jun 24 2010 11:40:01|713902: Group = DefaultRAGroup, IP = x.x.198.138, Removing peer from peer table failed, no match!
    7|Jun 24 2010 11:40:01|713236: IP = x.x.198.138, IKE_DECODE SENDING Message (msgid=d8b6f0a6) with payloads : HDR + HASH (8) + DELETE (12) + NONE (0) total length : 80
    7|Jun 24 2010 11:40:01|715046: Group = DefaultRAGroup, IP = x.x.198.138, constructing qm hash payload
    7|Jun 24 2010 11:40:01|715046: Group = DefaultRAGroup, IP = x.x.198.138, constructing IKE delete payload
    7|Jun 24 2010 11:40:01|715046: Group = DefaultRAGroup, IP = x.x.198.138, constructing blank hash payload
    7|Jun 24 2010 11:40:01|713906: Group = DefaultRAGroup, IP = x.x.198.138, sending delete/delete with reason message
    7|Jun 24 2010 11:40:01|713906: Group = DefaultRAGroup, IP = x.x.198.138, IKE SA MM:a3ae7411 terminating:  flags 0x01000002, refcnt 0, tuncnt 0
    7|Jun 24 2010 11:40:01|715065: Group = DefaultRAGroup, IP = x.x.198.138, IKE MM Responder FSM error history (struct &0x39665d0)  , :  MM_DONE, EV_ERROR-->MM_WAIT_MSG5, EV_PROB_AUTH_FAIL-->MM_WAIT_MSG5, EV_TIMEOUT-->MM_WAIT_MSG5, NullEvent-->MM_SND_MSG4, EV_CRYPTO_ACTIVE-->MM_SND_MSG4, EV_SND_MSG-->MM_SND_MSG4, EV_START_TMR-->MM_SND_MSG4, EV_RESEND_MSG
    6|Jun 24 2010 11:39:56|605005: Login permitted from x.x.198.138/16538 to outside:66.92.228.251/ssh for user "alex"
    6|Jun 24 2010 11:39:56|109005: Authentication succeeded for user 'alex' from x.x.198.138/16538 to 66.92.228.251/22 on interface outside
    7|Jun 24 2010 11:39:47|710002: TCP access permitted from x.x.198.138/16538 to outside:66.92.228.251/ssh
    6|Jun 24 2010 11:39:47|302013: Built inbound TCP connection 904 for outside:x.x.198.138/16538 (x.x.198.138/16538) to NP Identity Ifc:66.92.228.251/22 (66.92.228.251/22)
    6|Jun 24 2010 11:39:45|713905: Group = DefaultRAGroup, IP = x.x.198.138, P1 Retransmit msg dispatched to MM FSM
    5|Jun 24 2010 11:39:45|713201: Group = DefaultRAGroup, IP = x.x.198.138, Duplicate Phase 1 packet detected.  Retransmitting last packet.
    4|Jun 24 2010 11:39:38|713903: Group = DefaultRAGroup, IP = x.x.198.138, Error: Unable to remove PeerTblEntry
    3|Jun 24 2010 11:39:38|713902: Group = DefaultRAGroup, IP = x.x.198.138, Removing peer from peer table failed, no match!
    7|Jun 24 2010 11:39:38|713236: IP = x.x.198.138, IKE_DECODE SENDING Message (msgid=3207fb99) with payloads : HDR + HASH (8) + DELETE (12) + NONE (0) total length : 80
    7|Jun 24 2010 11:39:38|715046: Group = DefaultRAGroup, IP = x.x.198.138, constructing qm hash payload
    7|Jun 24 2010 11:39:38|715046: Group = DefaultRAGroup, IP = x.x.198.138, constructing IKE delete payload
    7|Jun 24 2010 11:39:38|715046: Group = DefaultRAGroup, IP = x.x.198.138, constructing blank hash payload
    7|Jun 24 2010 11:39:38|713906: Group = DefaultRAGroup, IP = x.x.198.138, sending delete/delete with reason message
    7|Jun 24 2010 11:39:38|713906: Group = DefaultRAGroup, IP = x.x.198.138, IKE SA MM:25ae2f9b terminating:  flags 0x01000002, refcnt 0, tuncnt 0
    7|Jun 24 2010 11:39:38|715065: Group = DefaultRAGroup, IP = x.x.198.138, IKE MM Responder FSM error history (struct &0x3966fd8)  , :  MM_DONE, EV_ERROR-->MM_WAIT_MSG5, EV_PROB_AUTH_FAIL-->MM_WAIT_MSG5, EV_TIMEOUT-->MM_WAIT_MSG5, NullEvent-->MM_SND_MSG4, EV_CRYPTO_ACTIVE-->MM_SND_MSG4, EV_SND_MSG-->MM_SND_MSG4, EV_START_TMR-->MM_SND_MSG4, EV_RESEND_MSG
    7|Jun 24 2010 11:39:35|713236: IP = x.x.198.138, IKE_DECODE SENDING Message (msgid=0) with payloads : HDR + KE (4) + NONCE (10) + VENDOR (13) + VENDOR (13) + VENDOR (13) + VENDOR (13) + NONE (0) total length : 256
    7|Jun 24 2010 11:39:35|713906: Group = DefaultRAGroup, IP = x.x.198.138, Generating keys for Responder...
    7|Jun 24 2010 11:39:35|713906: IP = x.x.198.138, Connection landed on tunnel_group DefaultRAGroup
    7|Jun 24 2010 11:39:35|715048: IP = x.x.198.138, Send Altiga/Cisco VPN3000/Cisco ASA GW VID
    7|Jun 24 2010 11:39:35|715046: IP = x.x.198.138, constructing VID payload
    7|Jun 24 2010 11:39:35|715038: IP = x.x.198.138, Constructing ASA spoofing IOS Vendor ID payload (version: 1.0.0, capabilities: 20000001)
    7|Jun 24 2010 11:39:35|715048: IP = x.x.198.138, Send IOS VID
    7|Jun 24 2010 11:39:35|715046: IP = x.x.198.138, constructing xauth V6 VID payload
    7|Jun 24 2010 11:39:35|715046: IP = x.x.198.138, constructing Cisco Unity VID payload
    7|Jun 24 2010 11:39:35|715046: IP = x.x.198.138, constructing nonce payload
    7|Jun 24 2010 11:39:35|715046: IP = x.x.198.138, constructing ke payload
    7|Jun 24 2010 11:39:35|715047: IP = x.x.198.138, processing nonce payload
    7|Jun 24 2010 11:39:35|715047: IP = x.x.198.138, processing ISA_KE payload
    7|Jun 24 2010 11:39:35|715047: IP = x.x.198.138, processing ke payload
    7|Jun 24 2010 11:39:35|713236: IP = x.x.198.138, IKE_DECODE RECEIVED Message (msgid=0) with payloads : HDR + KE (4) + NONCE (10) + NONE (0) total length : 180
    7|Jun 24 2010 11:39:34|713236: IP = x.x.198.138, IKE_DECODE SENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 108
    7|Jun 24 2010 11:39:34|715046: IP = x.x.198.138, constructing Fragmentation VID + extended capabilities payload
    7|Jun 24 2010 11:39:34|715046: IP = x.x.198.138, constructing ISAKMP SA payload
    7|Jun 24 2010 11:39:34|715028: IP = x.x.198.138, IKE SA Proposal # 1, Transform # 0 acceptable  Matches global IKE entry # 4
    7|Jun 24 2010 11:39:34|715047: IP = x.x.198.138, processing IKE SA payload
    7|Jun 24 2010 11:39:34|713906: IP = x.x.198.138, Oakley proposal is acceptable
    7|Jun 24 2010 11:39:34|715047: IP = x.x.198.138, processing SA payload
    7|Jun 24 2010 11:39:34|713236: IP = x.x.198.138, IKE_DECODE RECEIVED Message (msgid=0) with payloads : HDR + SA (1) + NONE (0) total length : 84
    4|Jun 24 2010 11:39:29|713903: IP = x.x.198.138, Error: Unable to remove PeerTblEntry
    3|Jun 24 2010 11:39:29|713902: IP = x.x.198.138, Removing peer from peer table failed, no match!
    7|Jun 24 2010 11:39:29|713906: IP = x.x.198.138, sending delete/delete with reason message
    7|Jun 24 2010 11:39:29|713906: IP = x.x.198.138, IKE SA MM:93ebdc10 terminating:  flags 0x01000002, refcnt 0, tuncnt 0
    7|Jun 24 2010 11:39:29|715065: IP = x.x.198.138, IKE MM Responder FSM error history (struct &0x3924540)  , :  MM_DONE, EV_ERROR-->MM_WAIT_MSG3, EV_TIMEOUT-->MM_WAIT_MSG3, NullEvent-->MM_SND_MSG2, EV_SND_MSG-->MM_SND_MSG2, EV_START_TMR-->MM_SND_MSG2, EV_RESEND_MSG-->MM_WAIT_MSG3, EV_TIMEOUT-->MM_WAIT_MSG3, NullEvent
    6|Jun 24 2010 11:39:22|713905: Group = DefaultRAGroup, IP = x.x.198.138, P1 Retransmit msg dispatched to MM FSM
    5|Jun 24 2010 11:39:22|713201: Group = DefaultRAGroup, IP = x.x.198.138, Duplicate Phase 1 packet detected.  Retransmitting last packet.
    7|Jun 24 2010 11:39:21|713236: IP = x.x.198.138, IKE_DECODE RESENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 108
    7|Jun 24 2010 11:39:13|713236: IP = x.x.198.138, IKE_DECODE RESENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 108
    7|Jun 24 2010 11:39:12|713236: IP = x.x.198.138, IKE_DECODE SENDING Message (msgid=0) with payloads : HDR + KE (4) + NONCE (10) + VENDOR (13) + VENDOR (13) + VENDOR (13) + VENDOR (13) + NONE (0) total length : 256
    7|Jun 24 2010 11:39:12|713906: Group = DefaultRAGroup, IP = x.x.198.138, Generating keys for Responder...
    7|Jun 24 2010 11:39:12|713906: IP = x.x.198.138, Connection landed on tunnel_group DefaultRAGroup
    7|Jun 24 2010 11:39:12|715048: IP = x.x.198.138, Send Altiga/Cisco VPN3000/Cisco ASA GW VID
    7|Jun 24 2010 11:39:12|715046: IP = x.x.198.138, constructing VID payload
    7|Jun 24 2010 11:39:12|715038: IP = x.x.198.138, Constructing ASA spoofing IOS Vendor ID payload (version: 1.0.0, capabilities: 20000001)
    7|Jun 24 2010 11:39:12|715048: IP = x.x.198.138, Send IOS VID
    7|Jun 24 2010 11:39:12|715046: IP = x.x.198.138, constructing xauth V6 VID payload
    7|Jun 24 2010 11:39:12|715046: IP = x.x.198.138, constructing Cisco Unity VID payload
    7|Jun 24 2010 11:39:12|715046: IP = x.x.198.138, constructing nonce payload
    7|Jun 24 2010 11:39:12|715046: IP = x.x.198.138, constructing ke payload
    7|Jun 24 2010 11:39:12|715047: IP = x.x.198.138, processing nonce payload
    7|Jun 24 2010 11:39:12|715047: IP = x.x.198.138, processing ISA_KE payload
    7|Jun 24 2010 11:39:12|715047: IP = x.x.198.138, processing ke payload
    7|Jun 24 2010 11:39:12|713236: IP = x.x.198.138, IKE_DECODE RECEIVED Message (msgid=0) with payloads : HDR + KE (4) + NONCE (10) + NONE (0) total length : 180
    7|Jun 24 2010 11:39:11|713236: IP = x.x.198.138, IKE_DECODE RESENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 108
    7|Jun 24 2010 11:39:05|713236: IP = x.x.198.138, IKE_DECODE RESENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 108
    7|Jun 24 2010 11:39:03|713236: IP = x.x.198.138, IKE_DECODE SENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 108
    7|Jun 24 2010 11:39:03|715046: IP = x.x.198.138, constructing Fragmentation VID + extended capabilities payload
    7|Jun 24 2010 11:39:03|715046: IP = x.x.198.138, constructing ISAKMP SA payload
    7|Jun 24 2010 11:39:03|715028: IP = x.x.198.138, IKE SA Proposal # 1, Transform # 0 acceptable  Matches global IKE entry # 4
    7|Jun 24 2010 11:39:03|715047: IP = x.x.198.138, processing IKE SA payload
    7|Jun 24 2010 11:39:03|713906: IP = x.x.198.138, Oakley proposal is acceptable
    7|Jun 24 2010 11:39:03|715047: IP = x.x.198.138, processing SA payload
    7|Jun 24 2010 11:39:03|713236: IP = x.x.198.138, IKE_DECODE RECEIVED Message (msgid=0) with payloads : HDR + SA (1) + NONE (0) total length : 84
    7|Jun 24 2010 11:38:57|713236: IP = x.x.198.138, IKE_DECODE SENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 108
    7|Jun 24 2010 11:38:57|715046: IP = x.x.198.138, constructing Fragmentation VID + extended capabilities payload
    7|Jun 24 2010 11:38:57|715046: IP = x.x.198.138, constructing ISAKMP SA payload
    7|Jun 24 2010 11:38:57|715028: IP = x.x.198.138, IKE SA Proposal # 1, Transform # 0 acceptable  Matches global IKE entry # 4
    7|Jun 24 2010 11:38:57|715047: IP = x.x.198.138, processing IKE SA payload
    7|Jun 24 2010 11:38:57|713906: IP = x.x.198.138, Oakley proposal is acceptable
    7|Jun 24 2010 11:38:57|715047: IP = x.x.198.138, processing SA payload
    7|Jun 24 2010 11:38:57|713236: IP = x.x.198.138, IKE_DECODE RECEIVED Message (msgid=0) with payloads : HDR + SA (1) + NONE (0) total length : 84
    4|Jun 24 2010 11:38:53|713903: IP = x.x.198.138, Error: Unable to remove PeerTblEntry
    3|Jun 24 2010 11:38:53|713902: IP = x.x.198.138, Removing peer from peer table failed, no match!
    7|Jun 24 2010 11:38:53|713906: IP = x.x.198.138, sending delete/delete with reason message
    7|Jun 24 2010 11:38:53|713906: IP = x.x.198.138, IKE SA MM:53b90578 terminating:  flags 0x01000002, refcnt 0, tuncnt 0
    7|Jun 24 2010 11:38:53|715065: IP = x.x.198.138, IKE MM Responder FSM error history (struct &0x39213e8)  , :  MM_DONE, EV_ERROR-->MM_WAIT_MSG3, EV_TIMEOUT-->MM_WAIT_MSG3, NullEvent-->MM_SND_MSG2, EV_SND_MSG-->MM_SND_MSG2, EV_START_TMR-->MM_SND_MSG2, EV_RESEND_MSG-->MM_WAIT_MSG3, EV_TIMEOUT-->MM_WAIT_MSG3, NullEvent
    4|Jun 24 2010 11:38:50|713903: IP = x.x.198.138, Error: Unable to remove PeerTblEntry
    3|Jun 24 2010 11:38:50|713902: IP = x.x.198.138, Removing peer from peer table failed, no match!
    7|Jun 24 2010 11:38:50|713906: IP = x.x.198.138, sending delete/delete with reason message
    7|Jun 24 2010 11:38:50|713906: IP = x.x.198.138, IKE SA MM:646ffb22 terminating:  flags 0x01000002, refcnt 0, tuncnt 0
    7|Jun 24 2010 11:38:50|715065: IP = x.x.198.138, IKE MM Responder FSM error history (struct &0x395f388)  , :  MM_DONE, EV_ERROR-->MM_WAIT_MSG3, EV_TIMEOUT-->MM_WAIT_MSG3, NullEvent-->MM_SND_MSG2, EV_SND_MSG-->MM_SND_MSG2, EV_START_TMR-->MM_SND_MSG2, EV_RESEND_MSG-->MM_WAIT_MSG3, EV_TIMEOUT-->MM_WAIT_MSG3, NullEvent
    7|Jun 24 2010 11:38:45|713236: IP = x.x.198.138, IKE_DECODE RESENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 108
    7|Jun 24 2010 11:38:42|713236: IP = x.x.198.138, IKE_DECODE RESENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 108
    7|Jun 24 2010 11:38:37|713236: IP = x.x.198.138, IKE_DECODE RESENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 108
    6|Jun 24 2010 11:38:37|713905: IP = x.x.198.138, P1 Retransmit msg dispatched to MM FSM
    5|Jun 24 2010 11:38:37|713201: IP = x.x.198.138, Duplicate Phase 1 packet detected.  Retransmitting last packet.
    7|Jun 24 2010 11:38:35|713236: IP = x.x.198.138, IKE_DECODE RESENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 108
    7|Jun 24 2010 11:38:34|713236: IP = x.x.198.138, IKE_DECODE RESENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 108
    6|Jun 24 2010 11:38:30|606003: ASDM logging session number 0 from x.x.198.138 started
    6|Jun 24 2010 11:38:30|605005: Login permitted from x.x.198.138/16530 to outside:66.92.228.251/https for user "alex"
    6|Jun 24 2010 11:38:29|302013: Built inbound TCP connection 783 for outside:x.x.198.138/16530 (x.x.198.138/16530) to NP Identity Ifc:66.92.228.251/443 (66.92.228.251/443)
    7|Jun 24 2010 11:38:27|713236: IP = x.x.198.138, IKE_DECODE SENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 108
    7|Jun 24 2010 11:38:27|715046: IP = x.x.198.138, constructing Fragmentation VID + extended capabilities payload
    7|Jun 24 2010 11:38:27|715046: IP = x.x.198.138, constructing ISAKMP SA payload
    7|Jun 24 2010 11:38:27|715028: IP = x.x.198.138, IKE SA Proposal # 1, Transform # 0 acceptable  Matches global IKE entry # 4
    7|Jun 24 2010 11:38:27|715047: IP = x.x.198.138, processing IKE SA payload
    7|Jun 24 2010 11:38:27|713906: IP = x.x.198.138, Oakley proposal is acceptable
    7|Jun 24 2010 11:38:27|715047: IP = x.x.198.138, processing SA payload
    7|Jun 24 2010 11:38:27|713236: IP = x.x.198.138, IKE_DECODE RECEIVED Message (msgid=0) with payloads : HDR + SA (1) + NONE (0) total length : 84
    7|Jun 24 2010 11:38:26|713236: IP = x.x.198.138, IKE_DECODE RESENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 108
    6|Jun 24 2010 11:38:22|302014: Teardown TCP connection 782 for outside:x.x.198.138/16527 to NP Identity Ifc:66.92.228.251/443 duration 0:00:01 bytes 1449 TCP FINs
    6|Jun 24 2010 11:38:21|605005: Login permitted from x.x.198.138/16527 to outside:66.92.228.251/https for user "alex"
    7|Jun 24 2010 11:38:21|710002: TCP access permitted from x.x.198.138/16527 to outside:66.92.228.251/https
    6|Jun 24 2010 11:38:21|302013: Built inbound TCP connection 782 for outside:x.x.198.138/16527 (x.x.198.138/16527) to NP Identity Ifc:66.92.228.251/443 (66.92.228.251/443)
    7|Jun 24 2010 11:38:18|713236: IP = x.x.198.138, IKE_DECODE SENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 108
    7|Jun 24 2010 11:38:18|715046: IP = x.x.198.138, constructing Fragmentation VID + extended capabilities payload
    7|Jun 24 2010 11:38:18|715046: IP = x.x.198.138, constructing ISAKMP SA payload
    7|Jun 24 2010 11:38:18|715028: IP = x.x.198.138, IKE SA Proposal # 1, Transform # 0 acceptable  Matches global IKE entry # 4
    7|Jun 24 2010 11:38:18|715047: IP = x.x.198.138, processing IKE SA payload
    7|Jun 24 2010 11:38:18|713906: IP = x.x.198.138, Oakley proposal is acceptable
    7|Jun 24 2010 11:38:18|715047: IP = x.x.198.138, processing SA payload
    7|Jun 24 2010 11:38:18|713236: IP = x.x.198.138, IKE_DECODE RECEIVED Message (msgid=0) with payloads : HDR + SA (1) + NONE (0) total length : 84
    7|Jun 24 2010 11:36:47|713236: IP = x.x.198.138, IKE_DECODE RESENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 108
    7|Jun 24 2010 11:36:45|713236: IP = x.x.198.138, IKE_DECODE RESENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 108
    7|Jun 24 2010 11:36:39|713236: IP = x.x.198.138, IKE_DECODE SENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 108
    7|Jun 24 2010 11:36:39|715046: IP = x.x.198.138, constructing Fragmentation VID + extended capabilities payload
    7|Jun 24 2010 11:36:39|715046: IP = x.x.198.138, constructing ISAKMP SA payload
    7|Jun 24 2010 11:36:39|715028: IP = x.x.198.138, IKE SA Proposal # 1, Transform # 0 acceptable  Matches global IKE entry # 4
    7|Jun 24 2010 11:36:39|715047: IP = x.x.198.138, processing IKE SA payload
    7|Jun 24 2010 11:36:39|713906: IP = x.x.198.138, Oakley proposal is acceptable
    7|Jun 24 2010 11:36:39|715047: IP = x.x.198.138, processing SA payload
    7|Jun 24 2010 11:36:39|713236: IP = x.x.198.138, IKE_DECODE RECEIVED Message (msgid=0) with payloads : HDR + SA (1) + NONE (0) total length : 84
    7|Jun 24 2010 11:36:37|713236: IP = x.x.198.138, IKE_DECODE SENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 108
    7|Jun 24 2010 11:36:37|715046: IP = x.x.198.138, constructing Fragmentation VID + extended capabilities payload
    7|Jun 24 2010 11:36:37|715046: IP = x.x.198.138, constructing ISAKMP SA payload
    7|Jun 24 2010 11:36:37|715028: IP = x.x.198.138, IKE SA Proposal # 1, Transform # 0 acceptable  Matches global IKE entry # 4
    7|Jun 24 2010 11:36:37|715047: IP = x.x.198.138, processing IKE SA payload
    7|Jun 24 2010 11:36:37|713906: IP = x.x.198.138, Oakley proposal is acceptable
    7|Jun 24 2010 11:36:37|715047: IP = x.x.198.138, processing SA payload
    7|Jun 24 2010 11:36:37|713236: IP = x.x.198.138, IKE_DECODE RECEIVED Message (msgid=0) with payloads : HDR + SA (1) + NONE (0) total length : 84
    4|Jun 24 2010 11:36:33|713903: IP = x.x.198.138, Error: Unable to remove PeerTblEntry
    3|Jun 24 2010 11:36:33|713902: IP = x.x.198.138, Removing peer from peer table failed, no match!
    7|Jun 24 2010 11:36:33|713906: IP = x.x.198.138, sending delete/delete with reason message
    7|Jun 24 2010 11:36:33|713906: IP = x.x.198.138, IKE SA MM:019e0e53 terminating:  flags 0x01000002, refcnt 0, tuncnt 0
    7|Jun 24 2010 11:36:33|715065: IP = x.x.198.138, IKE MM Responder FSM error history (struct &0x3938f50)  , :  MM_DONE, EV_ERROR-->MM_WAIT_MSG3, EV_TIMEOUT-->MM_WAIT_MSG3, NullEvent-->MM_SND_MSG2, EV_SND_MSG-->MM_SND_MSG2, EV_START_TMR-->MM_SND_MSG2, EV_RESEND_MSG-->MM_WAIT_MSG3, EV_TIMEOUT-->MM_WAIT_MSG3, NullEvent
    4|Jun 24 2010 11:36:31|713903: IP = x.x.198.138, Error: Unable to remove PeerTblEntry
    3|Jun 24 2010 11:36:31|713902: IP = x.x.198.138, Removing peer from peer table failed, no match!
    7|Jun 24 2010 11:36:31|713906: IP = x.x.198.138, sending delete/delete with reason message
    7|Jun 24 2010 11:36:31|713906: IP = x.x.198.138, IKE SA MM:635d12a3 terminating:  flags 0x01000002, refcnt 0, tuncnt 0
    7|Jun 24 2010 11:36:31|715065: IP = x.x.198.138, IKE MM Responder FSM error history (struct &0x3951bd8)  , :  MM_DONE, EV_ERROR-->MM_WAIT_MSG3, EV_TIMEOUT-->MM_WAIT_MSG3, NullEvent-->MM_SND_MSG2, EV_SND_MSG-->MM_SND_MSG2, EV_START_TMR-->MM_SND_MSG2, EV_RESEND_MSG-->MM_WAIT_MSG3, EV_TIMEOUT-->MM_WAIT_MSG3, NullEvent
    7|Jun 24 2010 11:36:25|713236: IP = x.x.198.138, IKE_DECODE RESENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 108
    7|Jun 24 2010 11:36:23|713236: IP = x.x.198.138, IKE_DECODE RESENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 108
    7|Jun 24 2010 11:36:17|713236: IP = x.x.198.138, IKE_DECODE RESENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 108
    6|Jun 24 2010 11:36:17|713905: IP = x.x.198.138, P1 Retransmit msg dispatched to MM FSM
    5|Jun 24 2010 11:36:17|713201: IP = x.x.198.138, Duplicate Phase 1 packet detected.  Retransmitting last packet.
    7|Jun 24 2010 11:36:15|713236: IP = x.x.198.138, IKE_DECODE RESENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 108
    7|Jun 24 2010 11:36:15|713236: IP = x.x.198.138, IKE_DECODE RESENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 108
    7|Jun 24 2010 11:36:07|713236: IP = x.x.198.138, IKE_DECODE RESENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 108
    7|Jun 24 2010 11:36:07|713236: IP = x.x.198.138, IKE_DECODE SENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 108
    7|Jun 24 2010 11:36:07|715046: IP = x.x.198.138, constructing Fragmentation VID + extended capabilities payload
    7|Jun 24 2010 11:36:07|715046: IP = x.x.198.138, constructing ISAKMP SA payload
    7|Jun 24 2010 11:36:07|715028: IP = x.x.198.138, IKE SA Proposal # 1, Transform # 0 acceptable  Matches global IKE entry # 4
    7|Jun 24 2010 11:36:07|715047: IP = x.x.198.138, processing IKE SA payload
    7|Jun 24 2010 11:36:07|713906: IP = x.x.198.138, Oakley proposal is acceptable
    7|Jun 24 2010 11:36:07|715047: IP = x.x.198.138, processing SA payload
    7|Jun 24 2010 11:36:07|713236: IP = x.x.198.138, IKE_DECODE RECEIVED Message (msgid=0) with payloads : HDR + SA (1) + NONE (0) total length : 84
    4|Jun 24 2010 11:36:00|713903: IP = x.x.198.138, Error: Unable to remove PeerTblEntry
    3|Jun 24 2010 11:36:00|713902: IP = x.x.198.138, Removing peer from peer table failed, no match!
    7|Jun 24 2010 11:36:00|713906: IP = x.x.198.138, sending delete/delete with reason message
    7|Jun 24 2010 11:36:00|713906: IP = x.x.198.138, IKE SA MM:829b8b51 terminating:  flags 0x01000002, refcnt 0, tuncnt 0
    7|Jun 24 2010 11:36:00|715065: IP = x.x.198.138, IKE MM Responder FSM error history (struct &0x3951160)  , :  MM_DONE, EV_ERROR-->MM_WAIT_MSG3, EV_TIMEOUT-->MM_WAIT_MSG3, NullEvent-->MM_SND_MSG2, EV_SND_MSG-->MM_SND_MSG2, EV_START_TMR-->MM_SND_MSG2, EV_RESEND_MSG-->MM_WAIT_MSG3, EV_TIMEOUT-->MM_WAIT_MSG3, NullEvent
    7|Jun 24 2010 11:35:59|713236: IP = x.x.198.138, IKE_DECODE SENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 108
    7|Jun 24 2010 11:35:59|715046: IP = x.x.198.138, constructing Fragmentation VID + extended capabilities payload
    7|Jun 24 2010 11:35:59|715046: IP = x.x.198.138, constructing ISAKMP SA payload
    7|Jun 24 2010 11:35:59|715028: IP = x.x.198.138, IKE SA Proposal # 1, Transform # 0 acceptable  Matches global IKE entry # 4
    7|Jun 24 2010 11:35:59|715047: IP = x.x.198.138, processing IKE SA payload
    7|Jun 24 2010 11:35:59|713906: IP = x.x.198.138, Oakley proposal is acceptable
    7|Jun 24 2010 11:35:59|715047: IP = x.x.198.138, processing SA payload
    7|Jun 24 2010 11:35:59|713236: IP = x.x.198.138, IKE_DECODE RECEIVED Message (msgid=0) with payloads : HDR + SA (1) + NONE (0) total length : 84
    4|Jun 24 2010 11:35:55|713903: IP = x.x.198.138, Error: Unable to remove PeerTblEntry
    3|Jun 24 2010 11:35:55|713902: IP = x.x.198.138, Removing peer from peer table failed, no match!
    7|Jun 24 2010 11:35:55|713906: IP = x.x.198.138, sending delete/delete with reason message
    7|Jun 24 2010 11:35:55|713906: IP = x.x.198.138, IKE SA MM:af21e9c3 terminating:  flags 0x01000002, refcnt 0, tuncnt 0
    7|Jun 24 2010 11:35:55|715065: IP = x.x.198.138, IKE MM Responder FSM error history (struct &0x39197a0)  , :  MM_DONE, EV_ERROR-->MM_WAIT_MSG3, EV_TIMEOUT-->MM_WAIT_MSG3, NullEvent-->MM_SND_MSG2, EV_SND_MSG-->MM_SND_MSG2, EV_START_TMR-->MM_SND_MSG2, EV_RESEND_MSG-->MM_WAIT_MSG3, EV_TIMEOUT-->MM_WAIT_MSG3, NullEvent
    7|Jun 24 2010 11:35:52|713236: IP = x.x.198.138, IKE_DECODE RESENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 108
    7|Jun 24 2010 11:35:47|713236: IP = x.x.198.138, IKE_DECODE RESENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 108
    7|Jun 24 2010 11:35:44|713236: IP = x.x.198.138, IKE_DECODE RESENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 108
    7|Jun 24 2010 11:35:39|713236: IP = x.x.198.138, IKE_DECODE RESENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 108
    6|Jun 24 2010 11:35:39|713905: IP = x.x.198.138, P1 Retransmit msg dispatched to MM FSM
    5|Jun 24 2010 11:35:39|713201: IP = x.x.198.138, Duplicate Phase 1 packet detected.  Retransmitting last packet.
    7|Jun 24 2010 11:35:37|713236: IP = x.x.198.138, IKE_DECODE RESENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 108
    7|Jun 24 2010 11:35:36|713236: IP = x.x.198.138, IKE_DECODE RESENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 108
    7|Jun 24 2010 11:35:29|713236: IP = x.x.198.138, IKE_DECODE SENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 108
    7|Jun 24 2010 11:35:29|715046: IP = x.x.198.138, constructing Fragmentation VID + extended capabilities payload
    7|Jun 24 2010 11:35:29|715046: IP = x.x.198.138, constructing ISAKMP SA payload
    7|Jun 24 2010 11:35:29|715028: IP = x.x.198.138, IKE SA Proposal # 1, Transform # 0 acceptable  Matches global IKE entry # 4
    7|Jun 24 2010 11:35:29|715047: IP = x.x.198.138, processing IKE SA payload
    7|Jun 24 2010 11:35:29|713906: IP = x.x.198.138, Oakley proposal is acceptable
    7|Jun 24 2010 11:35:29|715047: IP = x.x.198.138, processing SA payload
    7|Jun 24 2010 11:35:29|713236: IP = x.x.198.138, IKE_DECODE RECEIVED Message (msgid=0) with payloads : HDR + SA (1) + NONE (0) total length : 84
    7|Jun 24 2010 11:35:28|713236: IP = x.x.198.138, IKE_DECODE SENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 108
    7|Jun 24 2010 11:35:28|715046: IP = x.x.198.138, constructing Fragmentation VID + extended capabilities payload
    7|Jun 24 2010 11:35:28|715046: IP = x.x.198.138, constructing ISAKMP SA payload
    7|Jun 24 2010 11:35:28|715028: IP = x.x.198.138, IKE SA Proposal # 1, Transform # 0 acceptable  Matches global IKE entry # 4
    7|Jun 24 2010 11:35:28|715047: IP = x.x.198.138, processing IKE SA payload
    7|Jun 24 2010 11:35:28|713906: IP = x.x.198.138, Oakley proposal is acceptable
    7|Jun 24 2010 11:35:28|715047: IP = x.x.198.138, processing SA payload
    7|Jun 24 2010 11:35:28|713236: IP = x.x.198.138, IKE_DECODE RECEIVED Message (msgid=0) with payloads : HDR + SA (1) + NONE (0) total length : 84
    4|Jun 24 2010 11:35:24|713903: IP = x.x.198.138, Error: Unable to remove PeerTblEntry
    3|Jun 24 2010 11:35:24|713902: IP = x.x.198.138, Removing peer from peer table failed, no match!
    7|Jun 24 2010 11:35:24|713906: IP = x.x.198.138, sending delete/delete with reason message
    7|Jun 24 2010 11:35:24|713906: IP = x.x.198.138, IKE SA MM:b89f79e9 terminating:  flags 0x01000002, refcnt 0, tuncnt 0
    7|Jun 24 2010 11:35:24|715065: IP = x.x.198.138, IKE MM Responder FSM error history (struct &0x3950798)  , :  MM_DONE, EV_ERROR-->MM_WAIT_MSG3, EV_TIMEOUT-->MM_WAIT_MSG3, NullEvent-->MM_SND_MSG2, EV_SND_MSG-->MM_SND_MSG2, EV_START_TMR-->MM_SND_MSG2, EV_RESEND_MSG-->MM_WAIT_MSG3, EV_TIMEOUT-->MM_WAIT_MSG3, NullEvent
    7|Jun 24 2010 11:35:16|713236: IP = x.x.198.138, IKE_DECODE RESENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 108
    7|Jun 24 2010 11:35:08|713236: IP = x.x.198.138, IKE_DECODE RESENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 108
    6|Jun 24 2010 11:35:08|713905: IP = x.x.198.138, P1 Retransmit msg dispatched to MM FSM
    5|Jun 24 2010 11:35:08|713201: IP = x.x.198.138, Duplicate Phase 1 packet detected.  Retransmitting last packet.
    4|Jun 24 2010 11:35:07|713903: Group = DefaultRAGroup, IP = x.x.198.138, Error: Unable to remove PeerTblEntry
    3|Jun 24 2010 11:35:07|713902: Group = DefaultRAGroup, IP = x.x.198.138, Removing peer from peer table failed, no match!
    7|Jun 24 2010 11:35:07|713236: IP = x.x.198.138, IKE_DECODE SENDING Message (msgid=1daa1d52) with payloads : HDR + HASH (8) + DELETE (12) + NONE (0) total length : 80
    7|Jun 24 2010 11:35:07|715046: Group = DefaultRAGroup, IP = x.x.198.138, constructing qm hash payload
    7|Jun 24 2010 11:35:07|715046: Group = DefaultRAGroup, IP = x.x.198.138, constructing IKE delete payload
    7|Jun 24 2010 11:35:07|715046: Group = DefaultRAGroup, IP = x.x.198.138, constructing blank hash payload
    7|Jun 24 2010 11:35:07|713906: Group = DefaultRAGroup, IP = x.x.198.138, sending delete/delete with reason message
    7|Jun 24 2010 11:35:07|713906: Group = DefaultRAGroup, IP = x.x.198.138, IKE SA MM:77cfc698 terminating:  flags 0x01000002, refcnt 0, tuncnt 0
    7|Jun 24 2010 11:35:07|715065: Group = DefaultRAGroup, IP = x.x.198.138, IKE MM Responder FSM error history (struct &0x3919758)  , :  MM_DONE, EV_ERROR-->MM_WAIT_MSG5, EV_PROB_AUTH_FAIL-->MM_WAIT_MSG5, EV_TIMEOUT-->MM_WAIT_MSG5, NullEvent-->MM_SND_MSG4, EV_CRYPTO_ACTIVE-->MM_SND_MSG4, EV_SND_MSG-->MM_SND_MSG4, EV_START_TMR-->MM_SND_MSG4, EV_RESEND_MSG
    7|Jun 24 2010 11:35:06|713236: IP = x.x.198.138, IKE_DECODE RESENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 108
    7|Jun 24 2010 11:34:58|713236: IP = x.x.198.138, IKE_DECODE SENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 108
    7|Jun 24 2010 11:34:58|715046: IP = x.x.198.138, constructing Fragmentation VID + extended capabilities payload
    7|Jun 24 2010 11:34:58|715046: IP = x.x.198.138, constructing ISAKMP SA payload
    7|Jun 24 2010 11:34:58|715028: IP = x.x.198.138, IKE SA Proposal # 1, Transform # 0 acceptable  Matches global IKE entry # 4
    7|Jun 24 2010 11:34:58|715047: IP = x.x.198.138, processing IKE SA payload
    7|Jun 24 2010 11:34:58|713906: IP = x.x.198.138, Oakley proposal is acceptable
    7|Jun 24 2010 11:34:58|715047: IP = x.x.198.138, processing SA payload
    7|Jun 24 2010 11:34:58|713236: IP = x.x.198.138, IKE_DECODE RECEIVED Message (msgid=0) with payloads : HDR + SA (1) + NONE (0) total length : 84
    4|Jun 24 2010 11:34:48|713903: IP = x.x.198.138, Error: Unable to remove PeerTblEntry
    3|Jun 24 2010 11:34:48|713902: IP = x.x.198.138, Removing peer from peer table failed, no match!
    7|Jun 24 2010 11:34:48|713906: IP = x.x.198.138, sending delete/delete with reason message
    7|Jun 24 2010 11:34:48|713906: IP = x.x.198.138, IKE SA MM:834a5b7d terminating:  flags 0x01000002, refcnt 0, tuncnt 0
    7|Jun 24 2010 11:34:48|715065: IP = x.x.198.138, IKE MM Responder FSM error history (struct &0x391b8d8)  , :  MM_DONE, EV_ERROR-->MM_WAIT_MSG3, EV_TIMEOUT-->MM_WAIT_MSG3, NullEvent-->MM_SND_MSG2, EV_SND_MSG-->MM_SND_MSG2, EV_START_TMR-->MM_SND_MSG2, EV_RESEND_MSG-->MM_WAIT_MSG3, EV_TIMEOUT-->MM_WAIT_MSG3, NullEvent
    7|Jun 24 2010 11:34:40|713236: IP = x.x.198.138, IKE_DECODE RESENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 108
    7|Jun 24 2010 11:34:35|713236: IP = x.x.198.138, IKE_DECODE SENDING Message (msgid=0) with payloads : HDR + KE (4) + NONCE (10) + VENDOR (13) + VENDOR (13) + VENDOR (13) + VENDOR (13) + NONE (0) total length : 256
    7|Jun 24 2010 11:34:35|713906: Group = DefaultRAGroup, IP = x.x.198.138, Generating keys for Responder...
    7|Jun 24 2010 11:34:35|713906: IP = x.x.198.138, Connection landed on tunnel_group DefaultRAGroup
    7|Jun 24 2010 11:34:35|715048: IP = x.x.198.138, Send Altiga/Cisco VPN3000/Cisco ASA GW VID
    7|Jun 24 2010 11:34:35|715046: IP = x.x.198.138, constructing VID payload
    7|Jun 24 2010 11:34:35|715038: IP = x.x.198.138, Constructing ASA spoofing IOS Vendor ID payload (version: 1.0.0, capabilities: 20000001)
    7|Jun 24 2010 11:34:35|715048: IP = x.x.198.138, Send IOS VID
    7|Jun 24 2010 11:34:35|715046: IP = x.x.198.138, constructing xauth V6 VID payload
    7|Jun 24 2010 11:34:35|715046: IP = x.x.198.138, constructing Cisco Unity VID payload
    7|Jun 24 2010 11:34:35|715046: IP = x.x.198.138, constructing nonce payload
    7|Jun 24 2010 11:34:35|715046: IP = x.x.198.138, constructing ke payload
    7|Jun 24 2010 11:34:35|715047: IP = x.x.198.138, processing nonce payload
    7|Jun 24 2010 11:34:35|715047: IP = x.x.198.138, processing ISA_KE payload
    7|Jun 24 2010 11:34:35|715047: IP = x.x.198.138, processing ke payload
    7|Jun 24 2010 11:34:35|713236: IP = x.x.198.138, IKE_DECODE RECEIVED Message (msgid=0) with payloads : HDR + KE (4) + NONCE (10) + NONE (0) total length : 180
    7|Jun 24 2010 11:34:34|713236: IP = x.x.198.138, IKE_DECODE RESENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 108
    6|Jun 24 2010 11:34:34|713905: IP = x.x.198.138, P1 Retransmit msg dispatched to MM FSM
    5|Jun 24 2010 11:34:34|713201: IP = x.x.198.138, Duplicate Phase 1 packet detected.  Retransmitting last packet.
    7|Jun 24 2010 11:34:32|713236: IP = x.x.198.138, IKE_DECODE RESENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 108
    7|Jun 24 2010 11:34:31|713236: IP = x.x.198.138, IKE_DECODE RESENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 108
    6|Jun 24 2010 11:34:24|606003: ASDM logging session number 0 from x.x.198.138 started
    6|Jun 24 2010 11:34:24|605005: Login permitted from x.x.198.138/16490 to outside:66.92.228.251/https for user "alex"
    7|Jun 24 2010 11:34:24|713236: IP = x.x.198.138, IKE_DECODE RESENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 108
    7|Jun 24 2010 11:34:24|710002: TCP access permitted from x.x.198.138/16490 to outside:66.92.228.251/https
    6|Jun 24 2010 11:34:24|302013: Built inbound TCP connection 151 for outside:x.x.198.138/16490 (x.x.198.138/16490) to NP Identity Ifc:66.92.228.251/443 (66.92.228.251/443)
    7|Jun 24 2010 11:34:23|713236: IP = x.x.198.138, IKE_DECODE SENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 108
    7|Jun 24 2010 11:34:23|715046: IP = x.x.198.138, constructing Fragmentation VID + extended capabilities payload
    7|Jun 24 2010 11:34:23|715046: IP = x.x.198.138, constructing ISAKMP SA payload
    7|Jun 24 2010 11:34:23|715028: IP = x.x.198.138, IKE SA Proposal # 1, Transform # 0 acceptable  Matches global IKE entry # 4
    7|Jun 24 2010 11:34:23|715047: IP = x.x.198.138, processing IKE SA payload
    7|Jun 24 2010 11:34:23|713906: IP = x.x.198.138, Oakley proposal is acceptable
    7|Jun 24 2010 11:34:23|715047: IP = x.x.198.138, processing SA payload
    7|Jun 24 2010 11:34:23|713236: IP = x.x.198.138, IKE_DECODE RECEIVED Message (msgid=0) with payloads : HDR + SA (1) + NONE (0) total length : 84
    7|Jun 24 2010 11:34:20|710005: TCP request discarded from x.x.198.138/16373 to outside:66.92.228.251/443
    6|Jun 24 2010 11:34:20|106015: Deny TCP (no connection) from x.x.198.138/16373 to 66.92.228.251/443 flags FIN PSH ACK  on interface outside
    4|Jun 24 2010 11:34:17|713903: IP = x.x.198.138, Error: Unable to remove PeerTblEntry
    3|Jun 24 2010 11:34:17|713902: IP = x.x.198.138, Removing peer from peer table failed, no match!
    7|Jun 24 2010 11:34:17|713906: IP = x.x.198.138, sending delete/delete with reason message
    7|Jun 24 2010 11:34:17|713906: IP = x.x.198.138, IKE SA MM:948e665a terminating:  flags 0x01000002, refcnt 0, tuncnt 0
    7|Jun 24 2010 11:34:17|715065: IP = x.x.198.138, IKE MM Responder FSM error history (struct &0x3919758)  , :  MM_DONE, EV_ERROR-->MM_WAIT_MSG3, EV_TIMEOUT-->MM_WAIT_MSG3, NullEvent-->MM_SND_MSG2, EV_SND_MSG-->MM_SND_MSG2, EV_START_TMR-->MM_SND_MSG2, EV_RESEND_MSG-->MM_WAIT_MSG3, EV_TIMEOUT-->MM_WAIT_MSG3, NullEvent
    7|Jun 24 2010 11:34:16|713236: IP = x.x.198.138, IKE_DECODE SENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 108
    7|Jun 24 2010 11:34:16|715046: IP = x.x.198.138, constructing Fragmentation VID + extended capabilities payload
    7|Jun 24 2010 11:34:16|715046: IP = x.x.198.138, constructing ISAKMP SA payload
    7|Jun 24 2010 11:34:16|715028: IP = x.x.198.138, IKE SA Proposal # 1, Transform # 0 acceptable  Matches global IKE entry # 4
    7|Jun 24 2010 11:34:16|715047: IP = x.x.198.138, processing IKE SA payload
    7|Jun 24 2010 11:34:16|713906: IP = x.x.198.138, Oakley proposal is acceptable
    7|Jun 24 2010 11:34:16|715047: IP = x.x.198.138, processing SA payload
    7|Jun 24 2010 11:34:16|713236: IP = x.x.198.138, IKE_DECODE RECEIVED Message (msgid=0) with payloads : HDR + SA (1) + NONE (0) total length : 84
    7|Jun 24 2010 11:34:09|713236: IP = x.x.198.138, IKE_DECODE RESENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 108
    7|Jun 24 2010 11:31:45|713236: IP = x.x.198.138, IKE_DECODE SENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 108
    7|Jun 24 2010 11:31:45|715046: IP = x.x.198.138, constructing Fragmentation VID + extended capabilities payload
    7|Jun 24 2010 11:31:45|715046: IP = x.x.198.138, constructing ISAKMP SA payload
    7|Jun 24 2010 11:31:45|715028: IP = x.x.198.138, IKE SA Proposal # 1, Transform # 0 acceptable  Matches global IKE entry # 4
    7|Jun 24 2010 11:31:45|715047: IP = x.x.198.138, processing IKE SA payload
    7|Jun 24 2010 11:31:45|713906: IP = x.x.198.138, Oakley proposal is acceptable
    7|Jun 24 2010 11:31:45|715047: IP = x.x.198.138, processing SA payload
    7|Jun 24 2010 11:31:45|713236: IP = x.x.198.138, IKE_DECODE RECEIVED Message (msgid=0) with payloads : HDR + SA (1) + NONE (0) total length : 84
    4|Jun 24 2010 11:31:41|713903: IP = x.x.198.138, Error: Unable to remove PeerTblEntry
    3|Jun 24 2010 11:31:41|713902: IP = x.x.198.138, Removing peer from peer table failed, no match!
    7|Jun 24 2010 11:31:41|713906: IP = x.x.198.138, sending delete/delete with reason message
    7|Jun 24 2010 11:31:41|713906: IP = x.x.198.138, IKE SA MM:0d6d4e0d terminating:  flags 0x01000002, refcnt 0, tuncnt 0
    7|Jun 24 2010 11:31:41|715065: IP = x.x.198.138, IKE MM Responder FSM error history (struct &0x3940150)  , :  MM_DONE, EV_ERROR-->MM_WAIT_MSG3, EV_TIMEOUT-->MM_WAIT_MSG3, NullEvent-->MM_SND_MSG2, EV_SND_MSG-->MM_SND_MSG2, EV_START_TMR-->MM_SND_MSG2, EV_RESEND_MSG-->MM_WAIT_MSG3, EV_TIMEOUT-->MM_WAIT_MSG3, NullEvent
    4|Jun 24 2010 11:31:41|713903: IP = x.x.198.138, Error: Unable to remove PeerTblEntry
    3|Jun 24 2010 11:31:41|713902: IP = x.x.198.138, Removing peer from peer table failed, no match!
    7|Jun 24 2010 11:31:41|713906: IP = x.x.198.138, sending delete/delete with reason message
    7|Jun 24 2010 11:31:41|713906: IP = x.x.198.138, IKE SA MM:b60acf34 terminating:  flags 0x01000002, refcnt 0, tuncnt 0
    7|Jun 24 2010 11:31:41|715065: IP = x.x.198.138, IKE MM Responder FSM error history (struct &0x39d54a0)  , :  MM_DONE, EV_ERROR-->MM_WAIT_MSG3, EV_TIMEOUT-->MM_WAIT_MSG3, NullEvent-->MM_SND_MSG2, EV_SND_MSG-->MM_SND_MSG2, EV_START_TMR-->MM_SND_MSG2, EV_RESEND_MSG-->MM_WAIT_MSG3, EV_TIMEOUT-->MM_WAIT_MSG3, NullEvent
    7|Jun 24 2010 11:31:33|713236: IP = x.x.198.138, IKE_DECODE RESENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 108
    7|Jun 24 2010 11:31:33|713236: IP = x.x.198.138, IKE_DECODE RESENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 108
    7|Jun 24 2010 11:31:25|713236: IP = x.x.198.138, IKE_DECODE RESENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 108
    7|Jun 24 2010 11:31:25|713236: IP = x.x.198.138, IKE_DECODE RESENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 108
    6|Jun 24 2010 11:31:25|713905: IP = x.x.198.138, P1 Retransmit msg dispatched to MM FSM
    5|Jun 24 2010 11:31:25|713201: IP = x.x.198.138, Duplicate Phase 1 packet detected.  Retransmitting last packet.
    7|Jun 24 2010 11:31:23|713236: IP = x.x.198.138, IKE_DECODE RESENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 108
    7|Jun 24 2010 11:31:17|713236: IP = x.x.198.138, IKE_DECODE RESENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 108
    7|Jun 24 2010 11:31:15|713236: IP = x.x.198.138, IKE_DECODE SENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 108
    7|Jun 24 2010 11:31:15|715046: IP = x.x.198.138, constructing Fragmentation VID + extended capabilities payload
    7|Jun 24 2010 11:31:15|715046: IP = x.x.198.138, constructing ISAKMP SA payload
    7|Jun 24 2010 11:31:15|715028: IP = x.x.198.138, IKE SA Proposal # 1, Transform # 0 acceptable  Matches global IKE entry # 4
    7|Jun 24 2010 11:31:15|715047: IP = x.x.198.138, processing IKE SA payload
    7|Jun 24 2010 11:31:15|713906: IP = x.x.198.138, Oakley proposal is acceptable
    7|Jun 24 2010 11:31:15|715047: IP = x.x.198.138, processing SA payload
    7|Jun 24 2010 11:31:15|713236: IP = x.x.198.138, IKE_DECODE RECEIVED Message (msgid=0) with payloads : HDR + SA (1) + NONE (0) total length : 84
    7|Jun 24 2010 11:31:09|713236: IP = x.x.198.138, IKE_DECODE SENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 108
    7|Jun 24 2010 11:31:09|715046: IP = x.x.198.138, constructing Fragmentation VID + extended capabilities payload
    7|Jun 24 2010 11:31:09|715046: IP = x.x.198.138, constructing ISAKMP SA payload
    7|Jun 24 2010 11:31:09|715028: IP = x.x.198.138, IKE SA Proposal # 1, Transform # 0 acceptable  Matches global IKE entry # 4
    7|Jun 24 2010 11:31:09|715047: IP = x.x.198.138, processing IKE SA payload
    7|Jun 24 2010 11:31:09|713906: IP = x.x.198.138, Oakley proposal is acceptable
    7|Jun 24 2010 11:31:09|715047: IP = x.x.198.138, processing SA payload
    7|Jun 24 2010 11:31:09|713236: IP = x.x.198.138, IKE_DECODE RECEIVED Message (msgid=0) with payloads : HDR + SA (1) + NONE (0) total length : 84
    4|Jun 24 2010 11:31:07|713903: IP = x.x.198.138, Error: Unable to remove PeerTblEntry
    3|Jun 24 2010 11:31:07|713902: IP = x.x.198.138, Removing peer from peer table failed, no match!
    7|Jun 24 2010 11:31:07|713906: IP = x.x.198.138, sending delete/delete with reason message
    7|Jun 24 2010 11:31:07|713906: IP = x.x.198.138, IKE SA MM:164fb835 terminating:  flags 0x01000002, refcnt 0, tuncnt 0
    7|Jun 24 2010 11:31:07|715065: IP = x.x.198.138, IKE MM Responder FSM error history (struct &0x3940150)  , :  MM_DONE, EV_ERROR-->MM_WAIT_MSG3, EV_TIMEOUT-->MM_WAIT_MSG3, NullEvent-->MM_SND_MSG2, EV_SND_MSG-->MM_SND_MSG2, EV_START_TMR-->MM_SND_MSG2, EV_RESEND_MSG-->MM_WAIT_MSG3, EV_TIMEOUT-->MM_WAIT_MSG3, NullEvent
    4|Jun 24 2010 11:31:05|713903: IP = x.x.198.138, Error: Unable to remove PeerTblEntry
    3|Jun 24 2010 11:31:05|713902: IP = x.x.198.138, Removing peer from peer table failed, no match!
    7|Jun 24 2010 11:31:05|713906: IP = x.x.198.138, sending delete/delete with reason message
    7|Jun 24 2010 11:31:05|713906: IP = x.x.198.138, IKE SA MM:5905f9ea terminating:  flags 0x01000002, refcnt 0, tuncnt 0
    7|Jun 24 2010 11:31:05|715065: IP = x.x.198.138, IKE MM Responder FSM error history (struct &0x395fff0)  , :  MM_DONE, EV_ERROR-->MM_WAIT_MSG3, EV_TIMEOUT-->MM_WAIT_MSG3, NullEvent-->MM_SND_MSG2, EV_SND_MSG-->MM_SND_MSG2, EV_START_TMR-->MM_SND_MSG2, EV_RESEND_MSG-->MM_WAIT_MSG3, EV_TIMEOUT-->MM_WAIT_MSG3, NullEvent
    7|Jun 24 2010 11:30:59|713236: IP = x.x.198.138, IKE_DECODE RESENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 108
    7|Jun 24 2010 11:30:57|713236: IP = x.x.198.138, IKE_DECODE RESENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 108
    7|Jun 24 2010 11:30:51|713236: IP = x.x.198.138, IKE_DECODE RESENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 108
    7|Jun 24 2010 11:30:49|713236: IP = x.x.198

  • Sonicwall DHCP over VPN drops packets

    I have a similar setup without any packet loss. I followed this article for setup. Hope it helps!
    http://www.sonicwall.com/downloads/Site_to_Site_VPN_Using_DHCP_over_VPn__SonicOS_Enhanced_at__.pdf

    Playing with TZ205 DHCP over VPN.
    Used Sonicwall GVC for management using static IP for years.  Having handful of other network changes recently I decided to turn on DHCP over the VPN.  It's a split tunnel.
    Last few days I've been having frequent packet drops every 5-10min.  RDP sessions have to re-sync, ect.  It always picks up in ~5-10 seconds.  Until the next drop ~5 min later.  Well after troubleshooting I've found it's the DHCP over VPN change.
    If I return to static IP on sonicwall virtual adapter it never drops any packets. (Sonicwall client settings set to allow DHCP or manual)
    Updated to SonicOS Enhanced 5.9.1.1-39o , DHCP assigned VPN clients still dropping.
    *DHCP server just assigns IP/Mask.  No GW or DNS.  Same as when I set static.
    Any ideas?  Thanks!
    This topic first appeared in the Spiceworks Community

  • VPN Drops Trying to Use EMTOGO

    I make a connection to my VPN on my PDA but the connection drops once I try to connect to em togo has one one else seen this issue.

    Hello There,
    There are a lot of Non standard connnections out there. Either your router is blocking VPN Connections, or in my case I have a Cisco 1811 Router that was doing the same thing. I choose Cisco IOS with Easy VPN, and selected manual Algorithms and boom I got connected. I would say give that a go and see if you get connected. You might need to log into your router and see what exactly your using.
    Thank you!

  • Troubleshooting VPN drops between 871 client and 2811

    My small company uses a 2811 ISR for VPN services (among other tasks such as internet access, p2p circuits to a second site, etc). I have a couple of remote users that have 871 routers that have occasional problems with their routers dropping their VPN tunnels to the 2811. I'm not really sure where to start with the troubleshooting. There are other clients (such as my own 871W) that seem to maintain a connection for weeks. These remote routers that do drop the connection usually reconnect at their next schedule attempt (180 seconds or so.)
    Most of the previous questions I've seen similar to this involve software clients but these are hardware routers as the clients and as such I'm not sure how to enable or retrieve logs for the VPN sessions.

    As expected, the isakmp lifetime is 86400, but for ipsec it merely reports how much time is left in the current sa.
    For example:
    router#show crypto isakmp policy
    Global IKE policy
    Protection suite of priority 3
    encryption algorithm: Three key triple DES
    hash algorithm: Secure Hash Standard
    authentication method: Pre-Shared Key
    Diffie-Hellman group: #2 (1024 bit)
    lifetime: 86400 seconds, no volume limit
    Default protection suite
    encryption algorithm: DES - Data Encryption Standard (56 bit keys).
    hash algorithm: Secure Hash Standard
    authentication method: Rivest-Shamir-Adleman Signature
    Diffie-Hellman group: #1 (768 bit)
    lifetime: 86400 seconds, no volume limit
    router#show crypto ipsec sa
    interface: Virtual-Access4
    Crypto map tag: Virtual-Access4-head-0, local addr 209.XXX.XXX.82
    protected vrf: (none)
    local ident (addr/mask/prot/port): (0.0.0.0/0.0.0.0/0/0)
    remote ident (addr/mask/prot/port): (0.0.0.0/0.0.0.0/0/0)
    current_peer 75.XXX.XXX.179 port 4500
    PERMIT, flags={origin_is_acl,}
    #pkts encaps: 681527, #pkts encrypt: 681527, #pkts digest: 681527
    #pkts decaps: 670316, #pkts decrypt: 670316, #pkts verify: 670316
    #pkts compressed: 0, #pkts decompressed: 0
    #pkts not compressed: 0, #pkts compr. failed: 0
    #pkts not decompressed: 0, #pkts decompress failed: 0
    #send errors 1, #recv errors 0
    local crypto endpt.: 209.XXX.XXX.82, remote crypto endpt.: 75.XXX.XXX.179
    path mtu 1500, ip mtu 1500, ip mtu idb FastEthernet0/1
    current outbound spi: 0xF0C2D65C(4039300700)
    inbound esp sas:
    spi: 0x2A7171E4(712077796)
    transform: esp-3des esp-sha-hmac ,
    in use settings ={Tunnel UDP-Encaps, }
    conn id: 4093, flow_id: NETGX:2093, crypto map: Virtual-Access4-head-0
    sa timing: remaining key lifetime (k/sec): (4577435/1047)
    IV size: 8 bytes
    replay detection support: Y
    Status: ACTIVE
    inbound ah sas:
    inbound pcp sas:
    outbound esp sas:
    spi: 0xF0C2D65C(4039300700)
    transform: esp-3des esp-sha-hmac ,
    in use settings ={Tunnel UDP-Encaps, }
    conn id: 4094, flow_id: NETGX:2094, crypto map: Virtual-Access4-head-0
    sa timing: remaining key lifetime (k/sec): (4572865/1027)
    IV size: 8 bytes
    replay detection support: Y
    Status: ACTIVE
    outbound ah sas:
    outbound pcp sas:

  • VPN Dropped Connection

    Just upgraded to Windows 8.1. I'm having problems connecting my VPN. After setup the vpn connects after about 20 seconds it cuts out. Also noticed that my internet connection was gone the came back. Any ideas

    Hi
    Unstable connection after upgrade OS to 8.1, you need to upgrade your wifi or LAN driver as well

  • 1720 VPN and Winproxy behind 826, VPN drop outs

    DSL into 826. Winproxy and 1720 into 826.
    1. Can the 826 prevent VPN traffic while allowing web traffic to flow thru Proxy?
    2. Does the Proxy server setting in IE connection override default gateway IP?
    The problem is that VPN clients have Default GW as IP to 1720 and proxy server WinProxy IP. Connections are unstable w/ no correlations. Web and VPN can both work or either or none.

    You could block all "non-proxy" access through the router by creating an access list doing so. The only IP you would allow through would be the proxy server's requests and then, only it's source address and proxy ports if you want to be very specific. As I understand it, when you configure a proxy setting in a browser, any request the browser makes (http, https, ftp, etc.) will be directed to only the proxy address and the default gateway will never be used. The PC would only use the default gateway for any non-browser client applications (VPN client software, telnet, ping, smtp, pop3, etc.) Of course, if you blocked all "non-proxy" traffic as I suggested, none of these applications wil work unless you modify your access list to allow them.

  • S2S VPN Dropping GroupWise Connection

    We have a S2S vpn between two BM 3.8.4 servers. At the remote site, the
    user has a full GroupWise 7.0.2 client running in caching mode, which
    connects to the post office at the home site. Everything will work fine
    for about 4 hours, then the GW client will fail to connect. The only way
    to recover is to reboot the client system. While the GW client will not
    connect, all other services through the tunnel work fine. The servers
    never lose contact, and I can even remote the system in question while it
    can't connect to GW.
    There is nothing scheduled to run every 4 hours on the system or the
    servers. The NIC is not set to power off. We sent another system to the
    remote site, and brought his back here. The new system at the remote site
    does the same thing, but the old system connected to the post
    office locally without going through the vpn stays connected.
    I looked at the old (2004) post from Craig about making sure the connection
    can be initiated from both sides, and it can. Am I missing something?
    TIA

    In article <f6Fkk.13632$[email protected]>, Randall Diekmeyer
    wrote:
    > It seems to happen every four hours. Would a packet capture from the BM
    > server do? That would save me from a 10 hr round trip. :-)
    >
    That's hard to say. Capturing packets might just get you a bunch of
    encrypted traffic and miss what is going on at the client. Wouldn't hurt
    though.
    Why not try to remote into the problem PC and install wireshark, and then
    use it remotely? Either RDP, or VNC. You'll have to filter out the remote
    control traffic, and probably other stuff as well, but you will at least
    see what is happening where it is important.
    Craig Johnson
    Novell Support Connection SysOp
    *** For a current patch list, tips, handy files and books on
    BorderManager, go to http://www.craigjconsulting.com ***

  • Rv042 vpn dropped

    Hi
    Sometime we have a problem with some custumers with a  (all day  and don’t reconnect automatiquely). We’ve try many configuration and update, mtu size, new rv042 and it’s don’t resolve the problem
    Other custumers  have this problem but  one time in a mouth or 2 or 3 mouth.
    We’ve trying other router from another brand and resolve the problem in one place. We don’t want to change all custumers for the new router we want to keep rv042 because we like it and about 60 was install in many place.
    Thanks for your help

    Hi,
    I get this error too with my site-to-site VPN.
    In central office Keep Alive, NAT Traversal and DPD is activated.
    In remote office Agressive mode, NAT Traversal and DPD is activated.
    VPN is goes down and after few seconds goes up.
    This is the log from RV042 from central office:
    Nov 26 14:38:50 2009
        VPN Log
       ignoring Delete SA payload: IPSEC SA not found (maybe expired)
    Nov 26 14:38:50 2009
        VPN Log
       ignoring Delete SA payload: IPSEC SA not found (maybe expired)
    Nov 26 14:38:50 2009
        VPN Log
       ignoring Delete SA payload: IPSEC SA not found (maybe expired)
    Nov 26 14:38:50 2009
        VPN Log
       ignoring Delete SA payload: IPSEC SA not found (maybe expired)
    Nov 26 14:38:50 2009
        VPN Log
       Dead Peer Detection Start, DPD delay timer=10 sec  timeout=10 sec
    Nov 26 14:38:50 2009
        VPN Log
       [Tunnel Negotiation Info] Quick Mode Phase 2 SA Established, IPSec Tunnel Connected
    Nov 26 14:38:50 2009
        VPN Log
       [Tunnel Negotiation Info] >>> Initiator Send Quick Mode 3rd packet
    Nov 26 14:38:50 2009
        VPN Log
       [Tunnel Negotiation Info] Outbound SPI value = 71a9ceb5
    Nov 26 14:38:50 2009
        VPN Log
       [Tunnel Negotiation Info] Inbound  SPI value = d7661b0f
    Nov 26 14:38:50 2009
        VPN Log
       [Tunnel Negotiation Info] <<< Initiator Received Quick Mode 2nd packet
    Nov 26 14:38:49 2009
        VPN Log
       [Tunnel Negotiation Info] >>> Initiator send Quick Mode 1st packet
    Nov 26 14:38:49 2009
        VPN Log
       initiating Quick Mode PSK+ENCRYPT+TUNNEL+PFS+NAT-T to replace #589
    Software version on both routers is                  1.3.12.6-tm. We had no problem with connectivity between sites in this time.

  • Will L2L VPN Drop if i modify the ACL

    hi i have site to site IPSEC VPN established between 2 Sites.
    it has 200+ ACL Lines in it.
    My question is if i add another ACL statement , will it cause tunnel to bounce? just want to make sure i dont make tunnel down in peak production time.
    Regards,
    M

    yes, thats what has been done, but IPSEC SA not coming up for newly added ACL. and showing send errors in output, so i thought to remove and re add the ACL and see if that helps:-s
    sh crypto ipsec sa | b 113.230.74
       remote ident (addr/mask/prot/port): (113.230.74.0/255.255.255.0/0/0)
       current_peer 194.46.82.71 port 500
         PERMIT, flags={origin_is_acl,}
        #pkts encaps: 0, #pkts encrypt: 0, #pkts digest: 0
        #pkts decaps: 0, #pkts decrypt: 0, #pkts verify: 0
        #pkts compressed: 0, #pkts decompressed: 0
        #pkts not compressed: 0, #pkts compr. failed: 0
        #pkts not decompressed: 0, #pkts decompress failed: 0
        #send errors 180, #recv errors 0
         local crypto endpt.: 184.100.24.12, remote crypto endpt.: 194.46.82.71
         path mtu 1500, ip mtu 1500
         current outbound spi: 0x0(0)
         inbound esp sas:
         inbound ah sas:
         inbound pcp sas:
         outbound esp sas:
         outbound ah sas:

Maybe you are looking for

  • Animated GIFs in Captivate 2 or 3

    I have 31 lessons (PowerPoint) that contain animated GIFs. If I import these into Captivate 2 or Captivate 3, will these animations within the animated GIFs be maintained? Thanks for any replies! All the best with your own projects. Dean

  • Invalid key length on hard drive. Can this be fixed?

    Hello, I have a question about an error I am receiving with a hard drive I have been using for a few months on an imac G3 (the slot loading version). I bought this used 80 GIG hard drive on ebay for a friend of mine and I helped him transfer all his

  • Load balancing issues?

    Could someone help me with load balancing, current stats: I have a limited understanding, but from what I can make out, we have a significant number of clients being denied association and load balancing to different AP's but then the candidate count

  • Pages merge data from Filemaker Pro 8?

    I just purchased an iMac Intel Duo Core. I had been using ClarisWorks 4 on my previous Mac. I could do many things with it, including mail merge, printing class attendance roster, lists to insert in my planner, select, copy and paste email addresses

  • Infotype not accesible after transporting to client 900

    I have created a new infotype 9000 which is a copy of infotype 0000 in client 100. it works fine in client 100 but while transporting to 400 and 900 it gives a warning message with return code 4 and the same infotype is not accesible in client 900. I