IpSEC vpn dropped every day in peak hours
Hi, there,
our l2l vpn keeps dropping around 11am and 4pm, never happened during night and weekend.
the main errior is"Removing peer from correlator table failed, no match!"
the detail log is attached(from asa side)
pls help me with this
we are using asa5510 7.0 and pix 501 6.3
part of the log
"4|Jun 23 2010 10:31:00|713903: IP = x.x.x.138, Error: Unable to remove PeerTblEntry
3|Jun 23 2010 10:31:00|713902: IP = x.x.x.138, Removing peer from peer table failed, no match!
7|Jun 23 2010 10:31:00|713906: IP = x.x.x.138, sending delete/delete with reason message
7|Jun 23 2010 10:31:00|713906: IP = x.x.x.138, IKE SA MM:4d24e98b terminating: flags 0x01000002, refcnt 0, tuncnt 0
7|Jun 23 2010 10:31:00|715065: IP = x.x.x.138, IKE MM Responder FSM error history (struct &0x1930e90) <state>, <event>: MM_DONE, EV_ERROR-->MM_WAIT_MSG3, EV_TIMEOUT-->MM_WAIT_MSG3, NullEvent-->MM_SND_MSG2, EV_SND_MSG-->MM_SND_MSG2, EV_START_TMR-->MM_SND_MSG2, EV_RESEND_MSG-->MM_WAIT_MSG3, EV_TIMEOUT-->MM_WAIT_MSG3, NullEvent
4|Jun 23 2010 10:30:54|713903: IP = x.x.x.138, Error: Unable to remove PeerTblEntry
3|Jun 23 2010 10:30:54|713902: IP = x.x.x.138, Removing peer from peer table failed, no match!
7|Jun 23 2010 10:30:54|713906: IP = x.x.x.138, sending delete/delete with reason message
7|Jun 23 2010 10:30:54|713906: IP = x.x.x.138, IKE SA MM:57d21f6d terminating: flags 0x01000002, refcnt 0, tuncnt 0
7|Jun 23 2010 10:30:54|715065: IP = x.x.x.138, IKE MM Responder FSM error history (struct &0x398d228) <state>, <event>: MM_DONE, EV_ERROR-->MM_WAIT_MSG3, EV_TIMEOUT-->MM_WAIT_MSG3, NullEvent-->MM_SND_MSG2, EV_SND_MSG-->MM_SND_MSG2, EV_START_TMR-->MM_SND_MSG2, EV_RESEND_MSG-->MM_WAIT_MSG3, EV_TIMEOUT-->MM_WAIT_MSG3, NullEvent
7|Jun 23 2010 10:30:52|713236: IP = x.x.x.138, IKE_DECODE RESENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 108
7|Jun 23 2010 10:30:46|713236: IP = x.x.x.138, IKE_DECODE RESENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 108
7|Jun 23 2010 10:30:44|713236: IP = x.x.x.138, IKE_DECODE RESENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 108
6|Jun 23 2010 10:30:44|713905: IP = x.x.x.138, P1 Retransmit msg dispatched to MM FSM
5|Jun 23 2010 10:30:44|713201: IP = x.x.x.138, Duplicate Phase 1 packet detected. Retransmitting last packet.
6|Jun 23 2010 10:30:43|713219: IP = x.x.x.138, Queuing KEY-ACQUIRE messages to be processed when P1 SA is complete.
7|Jun 23 2010 10:30:42|713236: IP = x.x.x.138, IKE_DECODE RESENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 108
7|Jun 23 2010 10:30:38|713236: IP = x.x.x.138, IKE_DECODE RESENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 108
7|Jun 23 2010 10:30:34|713236: IP = x.x.x.138, IKE_DECODE SENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 108
7|Jun 23 2010 10:30:34|715046: IP = x.x.x.138, constructing Fragmentation VID + extended capabilities payload
7|Jun 23 2010 10:30:34|715046: IP = x.x.x.138, constructing ISAKMP SA payload
7|Jun 23 2010 10:30:34|715028: IP = x.x.x.138, IKE SA Proposal # 1, Transform # 0 acceptable Matches global IKE entry # 5
7|Jun 23 2010 10:30:34|715047: IP = x.x.x.138, processing IKE SA payload
7|Jun 23 2010 10:30:34|715049: IP = x.x.x.138, Received DPD VID
7|Jun 23 2010 10:30:34|715047: IP = x.x.x.138, processing VID payload
7|Jun 23 2010 10:30:34|713906: IP = x.x.x.138, Oakley proposal is acceptable
7|Jun 23 2010 10:30:34|715047: IP = x.x.x.138, processing SA payload
7|Jun 23 2010 10:30:34|713236: IP = x.x.x.138, IKE_DECODE RECEIVED Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 104
7|Jun 23 2010 10:30:30|713236: IP = x.x.x.138, IKE_DECODE RESENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 108
7|Jun 23 2010 10:30:22|713236: IP = x.x.x.138, IKE_DECODE SENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 108
7|Jun 23 2010 10:30:22|715046: IP = x.x.x.138, constructing Fragmentation VID + extended capabilities payload
7|Jun 23 2010 10:30:22|715046: IP = x.x.x.138, constructing ISAKMP SA payload
7|Jun 23 2010 10:30:22|715028: IP = x.x.x.138, IKE SA Proposal # 1, Transform # 0 acceptable Matches global IKE entry # 5
7|Jun 23 2010 10:30:22|715047: IP = x.x.x.138, processing IKE SA payload
7|Jun 23 2010 10:30:22|715049: IP = x.x.x.138, Received DPD VID
7|Jun 23 2010 10:30:22|715047: IP = x.x.x.138, processing VID payload
7|Jun 23 2010 10:30:22|713906: IP = x.x.x.138, Oakley proposal is acceptable
7|Jun 23 2010 10:30:22|715047: IP = x.x.x.138, processing SA payload
7|Jun 23 2010 10:30:22|713236: IP = x.x.x.138, IKE_DECODE RECEIVED Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 104
4|Jun 23 2010 10:30:18|713903: IP = x.x.x.138, Error: Unable to remove PeerTblEntry
3|Jun 23 2010 10:30:18|713902: IP = x.x.x.138, Removing peer from peer table failed, no match!
7|Jun 23 2010 10:30:18|713906: IP = x.x.x.138, sending delete/delete with reason message
appreciated.
Alex
7|Jun 24 2010 11:41:55|713236: IP = x.x.198.138, IKE_DECODE RESENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 108
7|Jun 24 2010 11:41:49|713236: IP = x.x.198.138, IKE_DECODE SENDING Message (msgid=0) with payloads : HDR + KE (4) + NONCE (10) + VENDOR (13) + VENDOR (13) + VENDOR (13) + VENDOR (13) + NONE (0) total length : 256
7|Jun 24 2010 11:41:49|713906: Group = DefaultRAGroup, IP = x.x.198.138, Generating keys for Responder...
7|Jun 24 2010 11:41:49|713906: IP = x.x.198.138, Connection landed on tunnel_group DefaultRAGroup
7|Jun 24 2010 11:41:49|715048: IP = x.x.198.138, Send Altiga/Cisco VPN3000/Cisco ASA GW VID
7|Jun 24 2010 11:41:49|715046: IP = x.x.198.138, constructing VID payload
7|Jun 24 2010 11:41:49|715038: IP = x.x.198.138, Constructing ASA spoofing IOS Vendor ID payload (version: 1.0.0, capabilities: 20000001)
7|Jun 24 2010 11:41:49|715048: IP = x.x.198.138, Send IOS VID
7|Jun 24 2010 11:41:49|715046: IP = x.x.198.138, constructing xauth V6 VID payload
7|Jun 24 2010 11:41:49|715046: IP = x.x.198.138, constructing Cisco Unity VID payload
7|Jun 24 2010 11:41:49|715046: IP = x.x.198.138, constructing nonce payload
7|Jun 24 2010 11:41:49|715046: IP = x.x.198.138, constructing ke payload
7|Jun 24 2010 11:41:49|715047: IP = x.x.198.138, processing nonce payload
7|Jun 24 2010 11:41:49|715047: IP = x.x.198.138, processing ISA_KE payload
7|Jun 24 2010 11:41:49|715047: IP = x.x.198.138, processing ke payload
7|Jun 24 2010 11:41:49|713236: IP = x.x.198.138, IKE_DECODE RECEIVED Message (msgid=0) with payloads : HDR + KE (4) + NONCE (10) + NONE (0) total length : 180
7|Jun 24 2010 11:41:48|713236: IP = x.x.198.138, IKE_DECODE SENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 108
7|Jun 24 2010 11:41:48|715046: IP = x.x.198.138, constructing Fragmentation VID + extended capabilities payload
7|Jun 24 2010 11:41:48|715046: IP = x.x.198.138, constructing ISAKMP SA payload
7|Jun 24 2010 11:41:48|715028: IP = x.x.198.138, IKE SA Proposal # 1, Transform # 0 acceptable Matches global IKE entry # 4
7|Jun 24 2010 11:41:48|715047: IP = x.x.198.138, processing IKE SA payload
7|Jun 24 2010 11:41:48|713906: IP = x.x.198.138, Oakley proposal is acceptable
7|Jun 24 2010 11:41:48|715047: IP = x.x.198.138, processing SA payload
7|Jun 24 2010 11:41:48|713236: IP = x.x.198.138, IKE_DECODE RECEIVED Message (msgid=0) with payloads : HDR + SA (1) + NONE (0) total length : 84
7|Jun 24 2010 11:41:47|713236: IP = x.x.198.138, IKE_DECODE SENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 108
7|Jun 24 2010 11:41:47|715046: IP = x.x.198.138, constructing Fragmentation VID + extended capabilities payload
7|Jun 24 2010 11:41:47|715046: IP = x.x.198.138, constructing ISAKMP SA payload
7|Jun 24 2010 11:41:47|715028: IP = x.x.198.138, IKE SA Proposal # 1, Transform # 0 acceptable Matches global IKE entry # 4
7|Jun 24 2010 11:41:47|715047: IP = x.x.198.138, processing IKE SA payload
7|Jun 24 2010 11:41:47|713906: IP = x.x.198.138, Oakley proposal is acceptable
7|Jun 24 2010 11:41:47|715047: IP = x.x.198.138, processing SA payload
7|Jun 24 2010 11:41:47|713236: IP = x.x.198.138, IKE_DECODE RECEIVED Message (msgid=0) with payloads : HDR + SA (1) + NONE (0) total length : 84
6|Jun 24 2010 11:41:44|302014: Teardown TCP connection 1078 for outside:x.x.198.138/16546 to NP Identity Ifc:66.92.228.251/443 duration 0:00:01 bytes 937 TCP FINs
6|Jun 24 2010 11:41:44|605005: Login permitted from x.x.198.138/16546 to outside:66.92.228.251/https for user "alex"
6|Jun 24 2010 11:41:43|302013: Built inbound TCP connection 1078 for outside:x.x.198.138/16546 (x.x.198.138/16546) to NP Identity Ifc:66.92.228.251/443 (66.92.228.251/443)
4|Jun 24 2010 11:41:42|713903: IP = x.x.198.138, Error: Unable to remove PeerTblEntry
3|Jun 24 2010 11:41:42|713902: IP = x.x.198.138, Removing peer from peer table failed, no match!
7|Jun 24 2010 11:41:42|713906: IP = x.x.198.138, sending delete/delete with reason message
7|Jun 24 2010 11:41:42|713906: IP = x.x.198.138, IKE SA MM:7f14d974 terminating: flags 0x01000002, refcnt 0, tuncnt 0
7|Jun 24 2010 11:41:42|715065: IP = x.x.198.138, IKE MM Responder FSM error history (struct &0x3946b30) , : MM_DONE, EV_ERROR-->MM_WAIT_MSG3, EV_TIMEOUT-->MM_WAIT_MSG3, NullEvent-->MM_SND_MSG2, EV_SND_MSG-->MM_SND_MSG2, EV_START_TMR-->MM_SND_MSG2, EV_RESEND_MSG-->MM_WAIT_MSG3, EV_TIMEOUT-->MM_WAIT_MSG3, NullEvent
6|Jun 24 2010 11:41:41|605005: Login permitted from x.x.198.138/16548 to outside:66.92.228.251/https for user "alex"
6|Jun 24 2010 11:41:41|302013: Built inbound TCP connection 1063 for outside:x.x.198.138/16548 (x.x.198.138/16548) to NP Identity Ifc:66.92.228.251/443 (66.92.228.251/443)
6|Jun 24 2010 11:41:40|302014: Teardown TCP connection 1062 for outside:x.x.198.138/16544 to NP Identity Ifc:66.92.228.251/443 duration 0:00:01 bytes 852 TCP FINs
6|Jun 24 2010 11:41:39|605005: Login permitted from x.x.198.138/16544 to outside:66.92.228.251/https for user "alex"
6|Jun 24 2010 11:41:39|302013: Built inbound TCP connection 1062 for outside:x.x.198.138/16544 (x.x.198.138/16544) to NP Identity Ifc:66.92.228.251/443 (66.92.228.251/443)
6|Jun 24 2010 11:41:37|302014: Teardown TCP connection 1061 for outside:x.x.198.138/16542 to NP Identity Ifc:66.92.228.251/443 duration 0:00:01 bytes 905 TCP FINs
6|Jun 24 2010 11:41:37|605005: Login permitted from x.x.198.138/16542 to outside:66.92.228.251/https for user "alex"
7|Jun 24 2010 11:41:36|710002: TCP access permitted from x.x.198.138/16542 to outside:66.92.228.251/https
6|Jun 24 2010 11:41:36|302013: Built inbound TCP connection 1061 for outside:x.x.198.138/16542 (x.x.198.138/16542) to NP Identity Ifc:66.92.228.251/443 (66.92.228.251/443)
7|Jun 24 2010 11:41:34|713236: IP = x.x.198.138, IKE_DECODE RESENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 108
6|Jun 24 2010 11:41:30|302014: Teardown TCP connection 904 for outside:x.x.198.138/16538 to NP Identity Ifc:66.92.228.251/22 duration 0:01:42 bytes 23872 TCP FINs
6|Jun 24 2010 11:41:29|315011: SSH session from x.x.198.138 on interface outside for user "alex" terminated normally
7|Jun 24 2010 11:41:26|713236: IP = x.x.198.138, IKE_DECODE RESENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 108
6|Jun 24 2010 11:41:26|713905: IP = x.x.198.138, P1 Retransmit msg dispatched to MM FSM
5|Jun 24 2010 11:41:26|713201: IP = x.x.198.138, Duplicate Phase 1 packet detected. Retransmitting last packet.
7|Jun 24 2010 11:41:24|713236: IP = x.x.198.138, IKE_DECODE RESENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 108
7|Jun 24 2010 11:41:16|713236: IP = x.x.198.138, IKE_DECODE SENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 108
7|Jun 24 2010 11:41:16|715046: IP = x.x.198.138, constructing Fragmentation VID + extended capabilities payload
7|Jun 24 2010 11:41:16|715046: IP = x.x.198.138, constructing ISAKMP SA payload
7|Jun 24 2010 11:41:16|715028: IP = x.x.198.138, IKE SA Proposal # 1, Transform # 0 acceptable Matches global IKE entry # 4
7|Jun 24 2010 11:41:16|715047: IP = x.x.198.138, processing IKE SA payload
7|Jun 24 2010 11:41:16|713906: IP = x.x.198.138, Oakley proposal is acceptable
7|Jun 24 2010 11:41:16|715047: IP = x.x.198.138, processing SA payload
7|Jun 24 2010 11:41:16|713236: IP = x.x.198.138, IKE_DECODE RECEIVED Message (msgid=0) with payloads : HDR + SA (1) + NONE (0) total length : 84
7|Jun 24 2010 11:41:14|713906: Group = DefaultL2LGroup, IP = x.x.198.138, Responder resending last msg
6|Jun 24 2010 11:41:14|713905: Group = DefaultL2LGroup, IP = x.x.198.138, P1 Retransmit msg dispatched to MM FSM
5|Jun 24 2010 11:41:14|713201: Group = DefaultL2LGroup, IP = x.x.198.138, Duplicate Phase 1 packet detected. Retransmitting last packet.
7|Jun 24 2010 11:41:08|713906: IP = x.x.198.138, sending delete/delete with reason message
7|Jun 24 2010 11:41:08|713906: IP = x.x.198.138, IKE SA MM:bf61672f terminating: flags 0x01000002, refcnt 0, tuncnt 0
7|Jun 24 2010 11:41:08|715065: IP = x.x.198.138, IKE MM Responder FSM error history (struct &0x395c160) , : MM_DONE, EV_ERROR-->MM_WAIT_MSG3, EV_TIMEOUT-->MM_WAIT_MSG3, NullEvent-->MM_SND_MSG2, EV_SND_MSG-->MM_SND_MSG2, EV_START_TMR-->MM_SND_MSG2, EV_RESEND_MSG-->MM_WAIT_MSG3, EV_TIMEOUT-->MM_WAIT_MSG3, NullEvent
7|Jun 24 2010 11:41:04|713906: Group = DefaultL2LGroup, IP = x.x.198.138, Starting phase 1 rekey timer: 64800000 (ms)
3|Jun 24 2010 11:41:04|713122: IP = x.x.198.138, Keep-alives configured on but peer does not support keep-alives (type = None)
7|Jun 24 2010 11:41:04|713121: IP = x.x.198.138, Keep-alive type for this connection: None
3|Jun 24 2010 11:41:04|713119: Group = DefaultL2LGroup, IP = x.x.198.138, PHASE 1 COMPLETED
7|Jun 24 2010 11:41:04|713236: IP = x.x.198.138, IKE_DECODE SENDING Message (msgid=0) with payloads : HDR + ID (5) + HASH (8) + VENDOR (13) + NONE (0) total length : 84
7|Jun 24 2010 11:41:04|715046: Group = DefaultL2LGroup, IP = x.x.198.138, constructing dpd vid payload
7|Jun 24 2010 11:41:04|715076: Group = DefaultL2LGroup, IP = x.x.198.138, Computing hash for ISAKMP
7|Jun 24 2010 11:41:04|715046: Group = DefaultL2LGroup, IP = x.x.198.138, constructing hash payload
7|Jun 24 2010 11:41:04|715046: Group = DefaultL2LGroup, IP = x.x.198.138, constructing ID payload
4|Jun 24 2010 11:41:04|713903: Group = DefaultL2LGroup, IP = x.x.198.138, Freeing previously allocated memory for authorization-dn-attributes
7|Jun 24 2010 11:41:04|713906: IP = x.x.198.138, Connection landed on tunnel_group DefaultL2LGroup
7|Jun 24 2010 11:41:04|715076: Group = DefaultL2LGroup, IP = x.x.198.138, Computing hash for ISAKMP
7|Jun 24 2010 11:41:04|715047: Group = DefaultL2LGroup, IP = x.x.198.138, processing hash payload
7|Jun 24 2010 11:41:04|714011: Group = DefaultL2LGroup, IP = x.x.198.138, ID_IPV4_ADDR ID received
7|Jun 24 2010 11:41:04|715047: Group = DefaultL2LGroup, IP = x.x.198.138, processing ID payload
7|Jun 24 2010 11:41:04|713236: IP = x.x.198.138, IKE_DECODE RECEIVED Message (msgid=0) with payloads : HDR + ID (5) + HASH (8) + NONE (0) total length : 64
7|Jun 24 2010 11:41:04|713906: Group = DefaultL2LGroup, IP = x.x.198.138, Generating keys for Responder...
6|Jun 24 2010 11:41:04|713905: Group = DefaultRAGroup, IP = x.x.198.138, WARNING, had problems decrypting packet, probably due to mismatched pre-shared key. Switching user to tunnel-group: DefaultL2LGroup
5|Jun 24 2010 11:41:04|713904: Group = DefaultRAGroup, IP = x.x.198.138, Received encrypted Oakley Main Mode packet with invalid payloads, MessID = 0
6|Jun 24 2010 11:41:03|713905: Group = DefaultRAGroup, IP = x.x.198.138, P1 Retransmit msg dispatched to MM FSM
5|Jun 24 2010 11:41:03|713201: Group = DefaultRAGroup, IP = x.x.198.138, Duplicate Phase 1 packet detected. Retransmitting last packet.
7|Jun 24 2010 11:41:00|713236: IP = x.x.198.138, IKE_DECODE RESENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 108
7|Jun 24 2010 11:40:53|713236: IP = x.x.198.138, IKE_DECODE SENDING Message (msgid=0) with payloads : HDR + KE (4) + NONCE (10) + VENDOR (13) + VENDOR (13) + VENDOR (13) + VENDOR (13) + NONE (0) total length : 256
7|Jun 24 2010 11:40:53|713906: Group = DefaultRAGroup, IP = x.x.198.138, Generating keys for Responder...
7|Jun 24 2010 11:40:53|713906: IP = x.x.198.138, Connection landed on tunnel_group DefaultRAGroup
7|Jun 24 2010 11:40:53|715048: IP = x.x.198.138, Send Altiga/Cisco VPN3000/Cisco ASA GW VID
7|Jun 24 2010 11:40:53|715046: IP = x.x.198.138, constructing VID payload
7|Jun 24 2010 11:40:53|715038: IP = x.x.198.138, Constructing ASA spoofing IOS Vendor ID payload (version: 1.0.0, capabilities: 20000001)
7|Jun 24 2010 11:40:53|715048: IP = x.x.198.138, Send IOS VID
7|Jun 24 2010 11:40:53|715046: IP = x.x.198.138, constructing xauth V6 VID payload
7|Jun 24 2010 11:40:53|715046: IP = x.x.198.138, constructing Cisco Unity VID payload
7|Jun 24 2010 11:40:53|715046: IP = x.x.198.138, constructing nonce payload
7|Jun 24 2010 11:40:53|715046: IP = x.x.198.138, constructing ke payload
7|Jun 24 2010 11:40:53|715047: IP = x.x.198.138, processing nonce payload
7|Jun 24 2010 11:40:53|715047: IP = x.x.198.138, processing ISA_KE payload
7|Jun 24 2010 11:40:53|715047: IP = x.x.198.138, processing ke payload
7|Jun 24 2010 11:40:53|713236: IP = x.x.198.138, IKE_DECODE RECEIVED Message (msgid=0) with payloads : HDR + KE (4) + NONCE (10) + NONE (0) total length : 180
7|Jun 24 2010 11:40:52|713236: IP = x.x.198.138, IKE_DECODE RESENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 108
6|Jun 24 2010 11:40:52|713905: IP = x.x.198.138, P1 Retransmit msg dispatched to MM FSM
5|Jun 24 2010 11:40:52|713201: IP = x.x.198.138, Duplicate Phase 1 packet detected. Retransmitting last packet.
7|Jun 24 2010 11:40:52|713236: IP = x.x.198.138, IKE_DECODE RESENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 108
7|Jun 24 2010 11:40:50|713236: IP = x.x.198.138, IKE_DECODE RESENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 108
7|Jun 24 2010 11:40:44|713236: IP = x.x.198.138, IKE_DECODE RESENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 108
7|Jun 24 2010 11:40:42|713236: IP = x.x.198.138, IKE_DECODE SENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 108
7|Jun 24 2010 11:40:42|715046: IP = x.x.198.138, constructing Fragmentation VID + extended capabilities payload
7|Jun 24 2010 11:40:42|715046: IP = x.x.198.138, constructing ISAKMP SA payload
7|Jun 24 2010 11:40:42|715028: IP = x.x.198.138, IKE SA Proposal # 1, Transform # 0 acceptable Matches global IKE entry # 4
7|Jun 24 2010 11:40:42|715047: IP = x.x.198.138, processing IKE SA payload
7|Jun 24 2010 11:40:42|713906: IP = x.x.198.138, Oakley proposal is acceptable
7|Jun 24 2010 11:40:42|715047: IP = x.x.198.138, processing SA payload
7|Jun 24 2010 11:40:42|713236: IP = x.x.198.138, IKE_DECODE RECEIVED Message (msgid=0) with payloads : HDR + SA (1) + NONE (0) total length : 84
7|Jun 24 2010 11:40:36|713236: IP = x.x.198.138, IKE_DECODE SENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 108
7|Jun 24 2010 11:40:36|715046: IP = x.x.198.138, constructing Fragmentation VID + extended capabilities payload
7|Jun 24 2010 11:40:36|715046: IP = x.x.198.138, constructing ISAKMP SA payload
7|Jun 24 2010 11:40:36|715028: IP = x.x.198.138, IKE SA Proposal # 1, Transform # 0 acceptable Matches global IKE entry # 4
7|Jun 24 2010 11:40:36|715047: IP = x.x.198.138, processing IKE SA payload
7|Jun 24 2010 11:40:36|713906: IP = x.x.198.138, Oakley proposal is acceptable
7|Jun 24 2010 11:40:36|715047: IP = x.x.198.138, processing SA payload
7|Jun 24 2010 11:40:36|713236: IP = x.x.198.138, IKE_DECODE RECEIVED Message (msgid=0) with payloads : HDR + SA (1) + NONE (0) total length : 84
4|Jun 24 2010 11:40:32|713903: IP = x.x.198.138, Error: Unable to remove PeerTblEntry
3|Jun 24 2010 11:40:32|713902: IP = x.x.198.138, Removing peer from peer table failed, no match!
7|Jun 24 2010 11:40:32|713906: IP = x.x.198.138, sending delete/delete with reason message
7|Jun 24 2010 11:40:32|713906: IP = x.x.198.138, IKE SA MM:52cdd2a3 terminating: flags 0x01000002, refcnt 0, tuncnt 0
7|Jun 24 2010 11:40:32|715065: IP = x.x.198.138, IKE MM Responder FSM error history (struct &0x39665d0) , : MM_DONE, EV_ERROR-->MM_WAIT_MSG3, EV_TIMEOUT-->MM_WAIT_MSG3, NullEvent-->MM_SND_MSG2, EV_SND_MSG-->MM_SND_MSG2, EV_START_TMR-->MM_SND_MSG2, EV_RESEND_MSG-->MM_WAIT_MSG3, EV_TIMEOUT-->MM_WAIT_MSG3, NullEvent
7|Jun 24 2010 11:40:24|713236: IP = x.x.198.138, IKE_DECODE RESENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 108
7|Jun 24 2010 11:40:18|710005: TCP request discarded from x.x.198.138/16538 to outside:66.92.228.251/22
7|Jun 24 2010 11:40:18|710005: TCP request discarded from x.x.198.138/16538 to outside:66.92.228.251/22
7|Jun 24 2010 11:40:18|710005: TCP request discarded from x.x.198.138/16538 to outside:66.92.228.251/22
7|Jun 24 2010 11:40:16|713236: IP = x.x.198.138, IKE_DECODE RESENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 108
6|Jun 24 2010 11:40:16|713905: IP = x.x.198.138, P1 Retransmit msg dispatched to MM FSM
5|Jun 24 2010 11:40:16|713201: IP = x.x.198.138, Duplicate Phase 1 packet detected. Retransmitting last packet.
7|Jun 24 2010 11:40:13|713236: IP = x.x.198.138, IKE_DECODE RESENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 108
7|Jun 24 2010 11:40:08|710005: TCP request discarded from x.x.198.138/16538 to outside:66.92.228.251/22
7|Jun 24 2010 11:40:05|713236: IP = x.x.198.138, IKE_DECODE SENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 108
7|Jun 24 2010 11:40:05|715046: IP = x.x.198.138, constructing Fragmentation VID + extended capabilities payload
7|Jun 24 2010 11:40:05|715046: IP = x.x.198.138, constructing ISAKMP SA payload
7|Jun 24 2010 11:40:05|715028: IP = x.x.198.138, IKE SA Proposal # 1, Transform # 0 acceptable Matches global IKE entry # 4
7|Jun 24 2010 11:40:05|715047: IP = x.x.198.138, processing IKE SA payload
7|Jun 24 2010 11:40:05|713906: IP = x.x.198.138, Oakley proposal is acceptable
7|Jun 24 2010 11:40:05|715047: IP = x.x.198.138, processing SA payload
7|Jun 24 2010 11:40:05|713236: IP = x.x.198.138, IKE_DECODE RECEIVED Message (msgid=0) with payloads : HDR + SA (1) + NONE (0) total length : 84
4|Jun 24 2010 11:40:01|713903: Group = DefaultRAGroup, IP = x.x.198.138, Error: Unable to remove PeerTblEntry
3|Jun 24 2010 11:40:01|713902: Group = DefaultRAGroup, IP = x.x.198.138, Removing peer from peer table failed, no match!
7|Jun 24 2010 11:40:01|713236: IP = x.x.198.138, IKE_DECODE SENDING Message (msgid=d8b6f0a6) with payloads : HDR + HASH (8) + DELETE (12) + NONE (0) total length : 80
7|Jun 24 2010 11:40:01|715046: Group = DefaultRAGroup, IP = x.x.198.138, constructing qm hash payload
7|Jun 24 2010 11:40:01|715046: Group = DefaultRAGroup, IP = x.x.198.138, constructing IKE delete payload
7|Jun 24 2010 11:40:01|715046: Group = DefaultRAGroup, IP = x.x.198.138, constructing blank hash payload
7|Jun 24 2010 11:40:01|713906: Group = DefaultRAGroup, IP = x.x.198.138, sending delete/delete with reason message
7|Jun 24 2010 11:40:01|713906: Group = DefaultRAGroup, IP = x.x.198.138, IKE SA MM:a3ae7411 terminating: flags 0x01000002, refcnt 0, tuncnt 0
7|Jun 24 2010 11:40:01|715065: Group = DefaultRAGroup, IP = x.x.198.138, IKE MM Responder FSM error history (struct &0x39665d0) , : MM_DONE, EV_ERROR-->MM_WAIT_MSG5, EV_PROB_AUTH_FAIL-->MM_WAIT_MSG5, EV_TIMEOUT-->MM_WAIT_MSG5, NullEvent-->MM_SND_MSG4, EV_CRYPTO_ACTIVE-->MM_SND_MSG4, EV_SND_MSG-->MM_SND_MSG4, EV_START_TMR-->MM_SND_MSG4, EV_RESEND_MSG
6|Jun 24 2010 11:39:56|605005: Login permitted from x.x.198.138/16538 to outside:66.92.228.251/ssh for user "alex"
6|Jun 24 2010 11:39:56|109005: Authentication succeeded for user 'alex' from x.x.198.138/16538 to 66.92.228.251/22 on interface outside
7|Jun 24 2010 11:39:47|710002: TCP access permitted from x.x.198.138/16538 to outside:66.92.228.251/ssh
6|Jun 24 2010 11:39:47|302013: Built inbound TCP connection 904 for outside:x.x.198.138/16538 (x.x.198.138/16538) to NP Identity Ifc:66.92.228.251/22 (66.92.228.251/22)
6|Jun 24 2010 11:39:45|713905: Group = DefaultRAGroup, IP = x.x.198.138, P1 Retransmit msg dispatched to MM FSM
5|Jun 24 2010 11:39:45|713201: Group = DefaultRAGroup, IP = x.x.198.138, Duplicate Phase 1 packet detected. Retransmitting last packet.
4|Jun 24 2010 11:39:38|713903: Group = DefaultRAGroup, IP = x.x.198.138, Error: Unable to remove PeerTblEntry
3|Jun 24 2010 11:39:38|713902: Group = DefaultRAGroup, IP = x.x.198.138, Removing peer from peer table failed, no match!
7|Jun 24 2010 11:39:38|713236: IP = x.x.198.138, IKE_DECODE SENDING Message (msgid=3207fb99) with payloads : HDR + HASH (8) + DELETE (12) + NONE (0) total length : 80
7|Jun 24 2010 11:39:38|715046: Group = DefaultRAGroup, IP = x.x.198.138, constructing qm hash payload
7|Jun 24 2010 11:39:38|715046: Group = DefaultRAGroup, IP = x.x.198.138, constructing IKE delete payload
7|Jun 24 2010 11:39:38|715046: Group = DefaultRAGroup, IP = x.x.198.138, constructing blank hash payload
7|Jun 24 2010 11:39:38|713906: Group = DefaultRAGroup, IP = x.x.198.138, sending delete/delete with reason message
7|Jun 24 2010 11:39:38|713906: Group = DefaultRAGroup, IP = x.x.198.138, IKE SA MM:25ae2f9b terminating: flags 0x01000002, refcnt 0, tuncnt 0
7|Jun 24 2010 11:39:38|715065: Group = DefaultRAGroup, IP = x.x.198.138, IKE MM Responder FSM error history (struct &0x3966fd8) , : MM_DONE, EV_ERROR-->MM_WAIT_MSG5, EV_PROB_AUTH_FAIL-->MM_WAIT_MSG5, EV_TIMEOUT-->MM_WAIT_MSG5, NullEvent-->MM_SND_MSG4, EV_CRYPTO_ACTIVE-->MM_SND_MSG4, EV_SND_MSG-->MM_SND_MSG4, EV_START_TMR-->MM_SND_MSG4, EV_RESEND_MSG
7|Jun 24 2010 11:39:35|713236: IP = x.x.198.138, IKE_DECODE SENDING Message (msgid=0) with payloads : HDR + KE (4) + NONCE (10) + VENDOR (13) + VENDOR (13) + VENDOR (13) + VENDOR (13) + NONE (0) total length : 256
7|Jun 24 2010 11:39:35|713906: Group = DefaultRAGroup, IP = x.x.198.138, Generating keys for Responder...
7|Jun 24 2010 11:39:35|713906: IP = x.x.198.138, Connection landed on tunnel_group DefaultRAGroup
7|Jun 24 2010 11:39:35|715048: IP = x.x.198.138, Send Altiga/Cisco VPN3000/Cisco ASA GW VID
7|Jun 24 2010 11:39:35|715046: IP = x.x.198.138, constructing VID payload
7|Jun 24 2010 11:39:35|715038: IP = x.x.198.138, Constructing ASA spoofing IOS Vendor ID payload (version: 1.0.0, capabilities: 20000001)
7|Jun 24 2010 11:39:35|715048: IP = x.x.198.138, Send IOS VID
7|Jun 24 2010 11:39:35|715046: IP = x.x.198.138, constructing xauth V6 VID payload
7|Jun 24 2010 11:39:35|715046: IP = x.x.198.138, constructing Cisco Unity VID payload
7|Jun 24 2010 11:39:35|715046: IP = x.x.198.138, constructing nonce payload
7|Jun 24 2010 11:39:35|715046: IP = x.x.198.138, constructing ke payload
7|Jun 24 2010 11:39:35|715047: IP = x.x.198.138, processing nonce payload
7|Jun 24 2010 11:39:35|715047: IP = x.x.198.138, processing ISA_KE payload
7|Jun 24 2010 11:39:35|715047: IP = x.x.198.138, processing ke payload
7|Jun 24 2010 11:39:35|713236: IP = x.x.198.138, IKE_DECODE RECEIVED Message (msgid=0) with payloads : HDR + KE (4) + NONCE (10) + NONE (0) total length : 180
7|Jun 24 2010 11:39:34|713236: IP = x.x.198.138, IKE_DECODE SENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 108
7|Jun 24 2010 11:39:34|715046: IP = x.x.198.138, constructing Fragmentation VID + extended capabilities payload
7|Jun 24 2010 11:39:34|715046: IP = x.x.198.138, constructing ISAKMP SA payload
7|Jun 24 2010 11:39:34|715028: IP = x.x.198.138, IKE SA Proposal # 1, Transform # 0 acceptable Matches global IKE entry # 4
7|Jun 24 2010 11:39:34|715047: IP = x.x.198.138, processing IKE SA payload
7|Jun 24 2010 11:39:34|713906: IP = x.x.198.138, Oakley proposal is acceptable
7|Jun 24 2010 11:39:34|715047: IP = x.x.198.138, processing SA payload
7|Jun 24 2010 11:39:34|713236: IP = x.x.198.138, IKE_DECODE RECEIVED Message (msgid=0) with payloads : HDR + SA (1) + NONE (0) total length : 84
4|Jun 24 2010 11:39:29|713903: IP = x.x.198.138, Error: Unable to remove PeerTblEntry
3|Jun 24 2010 11:39:29|713902: IP = x.x.198.138, Removing peer from peer table failed, no match!
7|Jun 24 2010 11:39:29|713906: IP = x.x.198.138, sending delete/delete with reason message
7|Jun 24 2010 11:39:29|713906: IP = x.x.198.138, IKE SA MM:93ebdc10 terminating: flags 0x01000002, refcnt 0, tuncnt 0
7|Jun 24 2010 11:39:29|715065: IP = x.x.198.138, IKE MM Responder FSM error history (struct &0x3924540) , : MM_DONE, EV_ERROR-->MM_WAIT_MSG3, EV_TIMEOUT-->MM_WAIT_MSG3, NullEvent-->MM_SND_MSG2, EV_SND_MSG-->MM_SND_MSG2, EV_START_TMR-->MM_SND_MSG2, EV_RESEND_MSG-->MM_WAIT_MSG3, EV_TIMEOUT-->MM_WAIT_MSG3, NullEvent
6|Jun 24 2010 11:39:22|713905: Group = DefaultRAGroup, IP = x.x.198.138, P1 Retransmit msg dispatched to MM FSM
5|Jun 24 2010 11:39:22|713201: Group = DefaultRAGroup, IP = x.x.198.138, Duplicate Phase 1 packet detected. Retransmitting last packet.
7|Jun 24 2010 11:39:21|713236: IP = x.x.198.138, IKE_DECODE RESENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 108
7|Jun 24 2010 11:39:13|713236: IP = x.x.198.138, IKE_DECODE RESENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 108
7|Jun 24 2010 11:39:12|713236: IP = x.x.198.138, IKE_DECODE SENDING Message (msgid=0) with payloads : HDR + KE (4) + NONCE (10) + VENDOR (13) + VENDOR (13) + VENDOR (13) + VENDOR (13) + NONE (0) total length : 256
7|Jun 24 2010 11:39:12|713906: Group = DefaultRAGroup, IP = x.x.198.138, Generating keys for Responder...
7|Jun 24 2010 11:39:12|713906: IP = x.x.198.138, Connection landed on tunnel_group DefaultRAGroup
7|Jun 24 2010 11:39:12|715048: IP = x.x.198.138, Send Altiga/Cisco VPN3000/Cisco ASA GW VID
7|Jun 24 2010 11:39:12|715046: IP = x.x.198.138, constructing VID payload
7|Jun 24 2010 11:39:12|715038: IP = x.x.198.138, Constructing ASA spoofing IOS Vendor ID payload (version: 1.0.0, capabilities: 20000001)
7|Jun 24 2010 11:39:12|715048: IP = x.x.198.138, Send IOS VID
7|Jun 24 2010 11:39:12|715046: IP = x.x.198.138, constructing xauth V6 VID payload
7|Jun 24 2010 11:39:12|715046: IP = x.x.198.138, constructing Cisco Unity VID payload
7|Jun 24 2010 11:39:12|715046: IP = x.x.198.138, constructing nonce payload
7|Jun 24 2010 11:39:12|715046: IP = x.x.198.138, constructing ke payload
7|Jun 24 2010 11:39:12|715047: IP = x.x.198.138, processing nonce payload
7|Jun 24 2010 11:39:12|715047: IP = x.x.198.138, processing ISA_KE payload
7|Jun 24 2010 11:39:12|715047: IP = x.x.198.138, processing ke payload
7|Jun 24 2010 11:39:12|713236: IP = x.x.198.138, IKE_DECODE RECEIVED Message (msgid=0) with payloads : HDR + KE (4) + NONCE (10) + NONE (0) total length : 180
7|Jun 24 2010 11:39:11|713236: IP = x.x.198.138, IKE_DECODE RESENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 108
7|Jun 24 2010 11:39:05|713236: IP = x.x.198.138, IKE_DECODE RESENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 108
7|Jun 24 2010 11:39:03|713236: IP = x.x.198.138, IKE_DECODE SENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 108
7|Jun 24 2010 11:39:03|715046: IP = x.x.198.138, constructing Fragmentation VID + extended capabilities payload
7|Jun 24 2010 11:39:03|715046: IP = x.x.198.138, constructing ISAKMP SA payload
7|Jun 24 2010 11:39:03|715028: IP = x.x.198.138, IKE SA Proposal # 1, Transform # 0 acceptable Matches global IKE entry # 4
7|Jun 24 2010 11:39:03|715047: IP = x.x.198.138, processing IKE SA payload
7|Jun 24 2010 11:39:03|713906: IP = x.x.198.138, Oakley proposal is acceptable
7|Jun 24 2010 11:39:03|715047: IP = x.x.198.138, processing SA payload
7|Jun 24 2010 11:39:03|713236: IP = x.x.198.138, IKE_DECODE RECEIVED Message (msgid=0) with payloads : HDR + SA (1) + NONE (0) total length : 84
7|Jun 24 2010 11:38:57|713236: IP = x.x.198.138, IKE_DECODE SENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 108
7|Jun 24 2010 11:38:57|715046: IP = x.x.198.138, constructing Fragmentation VID + extended capabilities payload
7|Jun 24 2010 11:38:57|715046: IP = x.x.198.138, constructing ISAKMP SA payload
7|Jun 24 2010 11:38:57|715028: IP = x.x.198.138, IKE SA Proposal # 1, Transform # 0 acceptable Matches global IKE entry # 4
7|Jun 24 2010 11:38:57|715047: IP = x.x.198.138, processing IKE SA payload
7|Jun 24 2010 11:38:57|713906: IP = x.x.198.138, Oakley proposal is acceptable
7|Jun 24 2010 11:38:57|715047: IP = x.x.198.138, processing SA payload
7|Jun 24 2010 11:38:57|713236: IP = x.x.198.138, IKE_DECODE RECEIVED Message (msgid=0) with payloads : HDR + SA (1) + NONE (0) total length : 84
4|Jun 24 2010 11:38:53|713903: IP = x.x.198.138, Error: Unable to remove PeerTblEntry
3|Jun 24 2010 11:38:53|713902: IP = x.x.198.138, Removing peer from peer table failed, no match!
7|Jun 24 2010 11:38:53|713906: IP = x.x.198.138, sending delete/delete with reason message
7|Jun 24 2010 11:38:53|713906: IP = x.x.198.138, IKE SA MM:53b90578 terminating: flags 0x01000002, refcnt 0, tuncnt 0
7|Jun 24 2010 11:38:53|715065: IP = x.x.198.138, IKE MM Responder FSM error history (struct &0x39213e8) , : MM_DONE, EV_ERROR-->MM_WAIT_MSG3, EV_TIMEOUT-->MM_WAIT_MSG3, NullEvent-->MM_SND_MSG2, EV_SND_MSG-->MM_SND_MSG2, EV_START_TMR-->MM_SND_MSG2, EV_RESEND_MSG-->MM_WAIT_MSG3, EV_TIMEOUT-->MM_WAIT_MSG3, NullEvent
4|Jun 24 2010 11:38:50|713903: IP = x.x.198.138, Error: Unable to remove PeerTblEntry
3|Jun 24 2010 11:38:50|713902: IP = x.x.198.138, Removing peer from peer table failed, no match!
7|Jun 24 2010 11:38:50|713906: IP = x.x.198.138, sending delete/delete with reason message
7|Jun 24 2010 11:38:50|713906: IP = x.x.198.138, IKE SA MM:646ffb22 terminating: flags 0x01000002, refcnt 0, tuncnt 0
7|Jun 24 2010 11:38:50|715065: IP = x.x.198.138, IKE MM Responder FSM error history (struct &0x395f388) , : MM_DONE, EV_ERROR-->MM_WAIT_MSG3, EV_TIMEOUT-->MM_WAIT_MSG3, NullEvent-->MM_SND_MSG2, EV_SND_MSG-->MM_SND_MSG2, EV_START_TMR-->MM_SND_MSG2, EV_RESEND_MSG-->MM_WAIT_MSG3, EV_TIMEOUT-->MM_WAIT_MSG3, NullEvent
7|Jun 24 2010 11:38:45|713236: IP = x.x.198.138, IKE_DECODE RESENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 108
7|Jun 24 2010 11:38:42|713236: IP = x.x.198.138, IKE_DECODE RESENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 108
7|Jun 24 2010 11:38:37|713236: IP = x.x.198.138, IKE_DECODE RESENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 108
6|Jun 24 2010 11:38:37|713905: IP = x.x.198.138, P1 Retransmit msg dispatched to MM FSM
5|Jun 24 2010 11:38:37|713201: IP = x.x.198.138, Duplicate Phase 1 packet detected. Retransmitting last packet.
7|Jun 24 2010 11:38:35|713236: IP = x.x.198.138, IKE_DECODE RESENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 108
7|Jun 24 2010 11:38:34|713236: IP = x.x.198.138, IKE_DECODE RESENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 108
6|Jun 24 2010 11:38:30|606003: ASDM logging session number 0 from x.x.198.138 started
6|Jun 24 2010 11:38:30|605005: Login permitted from x.x.198.138/16530 to outside:66.92.228.251/https for user "alex"
6|Jun 24 2010 11:38:29|302013: Built inbound TCP connection 783 for outside:x.x.198.138/16530 (x.x.198.138/16530) to NP Identity Ifc:66.92.228.251/443 (66.92.228.251/443)
7|Jun 24 2010 11:38:27|713236: IP = x.x.198.138, IKE_DECODE SENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 108
7|Jun 24 2010 11:38:27|715046: IP = x.x.198.138, constructing Fragmentation VID + extended capabilities payload
7|Jun 24 2010 11:38:27|715046: IP = x.x.198.138, constructing ISAKMP SA payload
7|Jun 24 2010 11:38:27|715028: IP = x.x.198.138, IKE SA Proposal # 1, Transform # 0 acceptable Matches global IKE entry # 4
7|Jun 24 2010 11:38:27|715047: IP = x.x.198.138, processing IKE SA payload
7|Jun 24 2010 11:38:27|713906: IP = x.x.198.138, Oakley proposal is acceptable
7|Jun 24 2010 11:38:27|715047: IP = x.x.198.138, processing SA payload
7|Jun 24 2010 11:38:27|713236: IP = x.x.198.138, IKE_DECODE RECEIVED Message (msgid=0) with payloads : HDR + SA (1) + NONE (0) total length : 84
7|Jun 24 2010 11:38:26|713236: IP = x.x.198.138, IKE_DECODE RESENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 108
6|Jun 24 2010 11:38:22|302014: Teardown TCP connection 782 for outside:x.x.198.138/16527 to NP Identity Ifc:66.92.228.251/443 duration 0:00:01 bytes 1449 TCP FINs
6|Jun 24 2010 11:38:21|605005: Login permitted from x.x.198.138/16527 to outside:66.92.228.251/https for user "alex"
7|Jun 24 2010 11:38:21|710002: TCP access permitted from x.x.198.138/16527 to outside:66.92.228.251/https
6|Jun 24 2010 11:38:21|302013: Built inbound TCP connection 782 for outside:x.x.198.138/16527 (x.x.198.138/16527) to NP Identity Ifc:66.92.228.251/443 (66.92.228.251/443)
7|Jun 24 2010 11:38:18|713236: IP = x.x.198.138, IKE_DECODE SENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 108
7|Jun 24 2010 11:38:18|715046: IP = x.x.198.138, constructing Fragmentation VID + extended capabilities payload
7|Jun 24 2010 11:38:18|715046: IP = x.x.198.138, constructing ISAKMP SA payload
7|Jun 24 2010 11:38:18|715028: IP = x.x.198.138, IKE SA Proposal # 1, Transform # 0 acceptable Matches global IKE entry # 4
7|Jun 24 2010 11:38:18|715047: IP = x.x.198.138, processing IKE SA payload
7|Jun 24 2010 11:38:18|713906: IP = x.x.198.138, Oakley proposal is acceptable
7|Jun 24 2010 11:38:18|715047: IP = x.x.198.138, processing SA payload
7|Jun 24 2010 11:38:18|713236: IP = x.x.198.138, IKE_DECODE RECEIVED Message (msgid=0) with payloads : HDR + SA (1) + NONE (0) total length : 84
7|Jun 24 2010 11:36:47|713236: IP = x.x.198.138, IKE_DECODE RESENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 108
7|Jun 24 2010 11:36:45|713236: IP = x.x.198.138, IKE_DECODE RESENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 108
7|Jun 24 2010 11:36:39|713236: IP = x.x.198.138, IKE_DECODE SENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 108
7|Jun 24 2010 11:36:39|715046: IP = x.x.198.138, constructing Fragmentation VID + extended capabilities payload
7|Jun 24 2010 11:36:39|715046: IP = x.x.198.138, constructing ISAKMP SA payload
7|Jun 24 2010 11:36:39|715028: IP = x.x.198.138, IKE SA Proposal # 1, Transform # 0 acceptable Matches global IKE entry # 4
7|Jun 24 2010 11:36:39|715047: IP = x.x.198.138, processing IKE SA payload
7|Jun 24 2010 11:36:39|713906: IP = x.x.198.138, Oakley proposal is acceptable
7|Jun 24 2010 11:36:39|715047: IP = x.x.198.138, processing SA payload
7|Jun 24 2010 11:36:39|713236: IP = x.x.198.138, IKE_DECODE RECEIVED Message (msgid=0) with payloads : HDR + SA (1) + NONE (0) total length : 84
7|Jun 24 2010 11:36:37|713236: IP = x.x.198.138, IKE_DECODE SENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 108
7|Jun 24 2010 11:36:37|715046: IP = x.x.198.138, constructing Fragmentation VID + extended capabilities payload
7|Jun 24 2010 11:36:37|715046: IP = x.x.198.138, constructing ISAKMP SA payload
7|Jun 24 2010 11:36:37|715028: IP = x.x.198.138, IKE SA Proposal # 1, Transform # 0 acceptable Matches global IKE entry # 4
7|Jun 24 2010 11:36:37|715047: IP = x.x.198.138, processing IKE SA payload
7|Jun 24 2010 11:36:37|713906: IP = x.x.198.138, Oakley proposal is acceptable
7|Jun 24 2010 11:36:37|715047: IP = x.x.198.138, processing SA payload
7|Jun 24 2010 11:36:37|713236: IP = x.x.198.138, IKE_DECODE RECEIVED Message (msgid=0) with payloads : HDR + SA (1) + NONE (0) total length : 84
4|Jun 24 2010 11:36:33|713903: IP = x.x.198.138, Error: Unable to remove PeerTblEntry
3|Jun 24 2010 11:36:33|713902: IP = x.x.198.138, Removing peer from peer table failed, no match!
7|Jun 24 2010 11:36:33|713906: IP = x.x.198.138, sending delete/delete with reason message
7|Jun 24 2010 11:36:33|713906: IP = x.x.198.138, IKE SA MM:019e0e53 terminating: flags 0x01000002, refcnt 0, tuncnt 0
7|Jun 24 2010 11:36:33|715065: IP = x.x.198.138, IKE MM Responder FSM error history (struct &0x3938f50) , : MM_DONE, EV_ERROR-->MM_WAIT_MSG3, EV_TIMEOUT-->MM_WAIT_MSG3, NullEvent-->MM_SND_MSG2, EV_SND_MSG-->MM_SND_MSG2, EV_START_TMR-->MM_SND_MSG2, EV_RESEND_MSG-->MM_WAIT_MSG3, EV_TIMEOUT-->MM_WAIT_MSG3, NullEvent
4|Jun 24 2010 11:36:31|713903: IP = x.x.198.138, Error: Unable to remove PeerTblEntry
3|Jun 24 2010 11:36:31|713902: IP = x.x.198.138, Removing peer from peer table failed, no match!
7|Jun 24 2010 11:36:31|713906: IP = x.x.198.138, sending delete/delete with reason message
7|Jun 24 2010 11:36:31|713906: IP = x.x.198.138, IKE SA MM:635d12a3 terminating: flags 0x01000002, refcnt 0, tuncnt 0
7|Jun 24 2010 11:36:31|715065: IP = x.x.198.138, IKE MM Responder FSM error history (struct &0x3951bd8) , : MM_DONE, EV_ERROR-->MM_WAIT_MSG3, EV_TIMEOUT-->MM_WAIT_MSG3, NullEvent-->MM_SND_MSG2, EV_SND_MSG-->MM_SND_MSG2, EV_START_TMR-->MM_SND_MSG2, EV_RESEND_MSG-->MM_WAIT_MSG3, EV_TIMEOUT-->MM_WAIT_MSG3, NullEvent
7|Jun 24 2010 11:36:25|713236: IP = x.x.198.138, IKE_DECODE RESENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 108
7|Jun 24 2010 11:36:23|713236: IP = x.x.198.138, IKE_DECODE RESENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 108
7|Jun 24 2010 11:36:17|713236: IP = x.x.198.138, IKE_DECODE RESENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 108
6|Jun 24 2010 11:36:17|713905: IP = x.x.198.138, P1 Retransmit msg dispatched to MM FSM
5|Jun 24 2010 11:36:17|713201: IP = x.x.198.138, Duplicate Phase 1 packet detected. Retransmitting last packet.
7|Jun 24 2010 11:36:15|713236: IP = x.x.198.138, IKE_DECODE RESENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 108
7|Jun 24 2010 11:36:15|713236: IP = x.x.198.138, IKE_DECODE RESENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 108
7|Jun 24 2010 11:36:07|713236: IP = x.x.198.138, IKE_DECODE RESENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 108
7|Jun 24 2010 11:36:07|713236: IP = x.x.198.138, IKE_DECODE SENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 108
7|Jun 24 2010 11:36:07|715046: IP = x.x.198.138, constructing Fragmentation VID + extended capabilities payload
7|Jun 24 2010 11:36:07|715046: IP = x.x.198.138, constructing ISAKMP SA payload
7|Jun 24 2010 11:36:07|715028: IP = x.x.198.138, IKE SA Proposal # 1, Transform # 0 acceptable Matches global IKE entry # 4
7|Jun 24 2010 11:36:07|715047: IP = x.x.198.138, processing IKE SA payload
7|Jun 24 2010 11:36:07|713906: IP = x.x.198.138, Oakley proposal is acceptable
7|Jun 24 2010 11:36:07|715047: IP = x.x.198.138, processing SA payload
7|Jun 24 2010 11:36:07|713236: IP = x.x.198.138, IKE_DECODE RECEIVED Message (msgid=0) with payloads : HDR + SA (1) + NONE (0) total length : 84
4|Jun 24 2010 11:36:00|713903: IP = x.x.198.138, Error: Unable to remove PeerTblEntry
3|Jun 24 2010 11:36:00|713902: IP = x.x.198.138, Removing peer from peer table failed, no match!
7|Jun 24 2010 11:36:00|713906: IP = x.x.198.138, sending delete/delete with reason message
7|Jun 24 2010 11:36:00|713906: IP = x.x.198.138, IKE SA MM:829b8b51 terminating: flags 0x01000002, refcnt 0, tuncnt 0
7|Jun 24 2010 11:36:00|715065: IP = x.x.198.138, IKE MM Responder FSM error history (struct &0x3951160) , : MM_DONE, EV_ERROR-->MM_WAIT_MSG3, EV_TIMEOUT-->MM_WAIT_MSG3, NullEvent-->MM_SND_MSG2, EV_SND_MSG-->MM_SND_MSG2, EV_START_TMR-->MM_SND_MSG2, EV_RESEND_MSG-->MM_WAIT_MSG3, EV_TIMEOUT-->MM_WAIT_MSG3, NullEvent
7|Jun 24 2010 11:35:59|713236: IP = x.x.198.138, IKE_DECODE SENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 108
7|Jun 24 2010 11:35:59|715046: IP = x.x.198.138, constructing Fragmentation VID + extended capabilities payload
7|Jun 24 2010 11:35:59|715046: IP = x.x.198.138, constructing ISAKMP SA payload
7|Jun 24 2010 11:35:59|715028: IP = x.x.198.138, IKE SA Proposal # 1, Transform # 0 acceptable Matches global IKE entry # 4
7|Jun 24 2010 11:35:59|715047: IP = x.x.198.138, processing IKE SA payload
7|Jun 24 2010 11:35:59|713906: IP = x.x.198.138, Oakley proposal is acceptable
7|Jun 24 2010 11:35:59|715047: IP = x.x.198.138, processing SA payload
7|Jun 24 2010 11:35:59|713236: IP = x.x.198.138, IKE_DECODE RECEIVED Message (msgid=0) with payloads : HDR + SA (1) + NONE (0) total length : 84
4|Jun 24 2010 11:35:55|713903: IP = x.x.198.138, Error: Unable to remove PeerTblEntry
3|Jun 24 2010 11:35:55|713902: IP = x.x.198.138, Removing peer from peer table failed, no match!
7|Jun 24 2010 11:35:55|713906: IP = x.x.198.138, sending delete/delete with reason message
7|Jun 24 2010 11:35:55|713906: IP = x.x.198.138, IKE SA MM:af21e9c3 terminating: flags 0x01000002, refcnt 0, tuncnt 0
7|Jun 24 2010 11:35:55|715065: IP = x.x.198.138, IKE MM Responder FSM error history (struct &0x39197a0) , : MM_DONE, EV_ERROR-->MM_WAIT_MSG3, EV_TIMEOUT-->MM_WAIT_MSG3, NullEvent-->MM_SND_MSG2, EV_SND_MSG-->MM_SND_MSG2, EV_START_TMR-->MM_SND_MSG2, EV_RESEND_MSG-->MM_WAIT_MSG3, EV_TIMEOUT-->MM_WAIT_MSG3, NullEvent
7|Jun 24 2010 11:35:52|713236: IP = x.x.198.138, IKE_DECODE RESENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 108
7|Jun 24 2010 11:35:47|713236: IP = x.x.198.138, IKE_DECODE RESENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 108
7|Jun 24 2010 11:35:44|713236: IP = x.x.198.138, IKE_DECODE RESENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 108
7|Jun 24 2010 11:35:39|713236: IP = x.x.198.138, IKE_DECODE RESENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 108
6|Jun 24 2010 11:35:39|713905: IP = x.x.198.138, P1 Retransmit msg dispatched to MM FSM
5|Jun 24 2010 11:35:39|713201: IP = x.x.198.138, Duplicate Phase 1 packet detected. Retransmitting last packet.
7|Jun 24 2010 11:35:37|713236: IP = x.x.198.138, IKE_DECODE RESENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 108
7|Jun 24 2010 11:35:36|713236: IP = x.x.198.138, IKE_DECODE RESENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 108
7|Jun 24 2010 11:35:29|713236: IP = x.x.198.138, IKE_DECODE SENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 108
7|Jun 24 2010 11:35:29|715046: IP = x.x.198.138, constructing Fragmentation VID + extended capabilities payload
7|Jun 24 2010 11:35:29|715046: IP = x.x.198.138, constructing ISAKMP SA payload
7|Jun 24 2010 11:35:29|715028: IP = x.x.198.138, IKE SA Proposal # 1, Transform # 0 acceptable Matches global IKE entry # 4
7|Jun 24 2010 11:35:29|715047: IP = x.x.198.138, processing IKE SA payload
7|Jun 24 2010 11:35:29|713906: IP = x.x.198.138, Oakley proposal is acceptable
7|Jun 24 2010 11:35:29|715047: IP = x.x.198.138, processing SA payload
7|Jun 24 2010 11:35:29|713236: IP = x.x.198.138, IKE_DECODE RECEIVED Message (msgid=0) with payloads : HDR + SA (1) + NONE (0) total length : 84
7|Jun 24 2010 11:35:28|713236: IP = x.x.198.138, IKE_DECODE SENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 108
7|Jun 24 2010 11:35:28|715046: IP = x.x.198.138, constructing Fragmentation VID + extended capabilities payload
7|Jun 24 2010 11:35:28|715046: IP = x.x.198.138, constructing ISAKMP SA payload
7|Jun 24 2010 11:35:28|715028: IP = x.x.198.138, IKE SA Proposal # 1, Transform # 0 acceptable Matches global IKE entry # 4
7|Jun 24 2010 11:35:28|715047: IP = x.x.198.138, processing IKE SA payload
7|Jun 24 2010 11:35:28|713906: IP = x.x.198.138, Oakley proposal is acceptable
7|Jun 24 2010 11:35:28|715047: IP = x.x.198.138, processing SA payload
7|Jun 24 2010 11:35:28|713236: IP = x.x.198.138, IKE_DECODE RECEIVED Message (msgid=0) with payloads : HDR + SA (1) + NONE (0) total length : 84
4|Jun 24 2010 11:35:24|713903: IP = x.x.198.138, Error: Unable to remove PeerTblEntry
3|Jun 24 2010 11:35:24|713902: IP = x.x.198.138, Removing peer from peer table failed, no match!
7|Jun 24 2010 11:35:24|713906: IP = x.x.198.138, sending delete/delete with reason message
7|Jun 24 2010 11:35:24|713906: IP = x.x.198.138, IKE SA MM:b89f79e9 terminating: flags 0x01000002, refcnt 0, tuncnt 0
7|Jun 24 2010 11:35:24|715065: IP = x.x.198.138, IKE MM Responder FSM error history (struct &0x3950798) , : MM_DONE, EV_ERROR-->MM_WAIT_MSG3, EV_TIMEOUT-->MM_WAIT_MSG3, NullEvent-->MM_SND_MSG2, EV_SND_MSG-->MM_SND_MSG2, EV_START_TMR-->MM_SND_MSG2, EV_RESEND_MSG-->MM_WAIT_MSG3, EV_TIMEOUT-->MM_WAIT_MSG3, NullEvent
7|Jun 24 2010 11:35:16|713236: IP = x.x.198.138, IKE_DECODE RESENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 108
7|Jun 24 2010 11:35:08|713236: IP = x.x.198.138, IKE_DECODE RESENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 108
6|Jun 24 2010 11:35:08|713905: IP = x.x.198.138, P1 Retransmit msg dispatched to MM FSM
5|Jun 24 2010 11:35:08|713201: IP = x.x.198.138, Duplicate Phase 1 packet detected. Retransmitting last packet.
4|Jun 24 2010 11:35:07|713903: Group = DefaultRAGroup, IP = x.x.198.138, Error: Unable to remove PeerTblEntry
3|Jun 24 2010 11:35:07|713902: Group = DefaultRAGroup, IP = x.x.198.138, Removing peer from peer table failed, no match!
7|Jun 24 2010 11:35:07|713236: IP = x.x.198.138, IKE_DECODE SENDING Message (msgid=1daa1d52) with payloads : HDR + HASH (8) + DELETE (12) + NONE (0) total length : 80
7|Jun 24 2010 11:35:07|715046: Group = DefaultRAGroup, IP = x.x.198.138, constructing qm hash payload
7|Jun 24 2010 11:35:07|715046: Group = DefaultRAGroup, IP = x.x.198.138, constructing IKE delete payload
7|Jun 24 2010 11:35:07|715046: Group = DefaultRAGroup, IP = x.x.198.138, constructing blank hash payload
7|Jun 24 2010 11:35:07|713906: Group = DefaultRAGroup, IP = x.x.198.138, sending delete/delete with reason message
7|Jun 24 2010 11:35:07|713906: Group = DefaultRAGroup, IP = x.x.198.138, IKE SA MM:77cfc698 terminating: flags 0x01000002, refcnt 0, tuncnt 0
7|Jun 24 2010 11:35:07|715065: Group = DefaultRAGroup, IP = x.x.198.138, IKE MM Responder FSM error history (struct &0x3919758) , : MM_DONE, EV_ERROR-->MM_WAIT_MSG5, EV_PROB_AUTH_FAIL-->MM_WAIT_MSG5, EV_TIMEOUT-->MM_WAIT_MSG5, NullEvent-->MM_SND_MSG4, EV_CRYPTO_ACTIVE-->MM_SND_MSG4, EV_SND_MSG-->MM_SND_MSG4, EV_START_TMR-->MM_SND_MSG4, EV_RESEND_MSG
7|Jun 24 2010 11:35:06|713236: IP = x.x.198.138, IKE_DECODE RESENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 108
7|Jun 24 2010 11:34:58|713236: IP = x.x.198.138, IKE_DECODE SENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 108
7|Jun 24 2010 11:34:58|715046: IP = x.x.198.138, constructing Fragmentation VID + extended capabilities payload
7|Jun 24 2010 11:34:58|715046: IP = x.x.198.138, constructing ISAKMP SA payload
7|Jun 24 2010 11:34:58|715028: IP = x.x.198.138, IKE SA Proposal # 1, Transform # 0 acceptable Matches global IKE entry # 4
7|Jun 24 2010 11:34:58|715047: IP = x.x.198.138, processing IKE SA payload
7|Jun 24 2010 11:34:58|713906: IP = x.x.198.138, Oakley proposal is acceptable
7|Jun 24 2010 11:34:58|715047: IP = x.x.198.138, processing SA payload
7|Jun 24 2010 11:34:58|713236: IP = x.x.198.138, IKE_DECODE RECEIVED Message (msgid=0) with payloads : HDR + SA (1) + NONE (0) total length : 84
4|Jun 24 2010 11:34:48|713903: IP = x.x.198.138, Error: Unable to remove PeerTblEntry
3|Jun 24 2010 11:34:48|713902: IP = x.x.198.138, Removing peer from peer table failed, no match!
7|Jun 24 2010 11:34:48|713906: IP = x.x.198.138, sending delete/delete with reason message
7|Jun 24 2010 11:34:48|713906: IP = x.x.198.138, IKE SA MM:834a5b7d terminating: flags 0x01000002, refcnt 0, tuncnt 0
7|Jun 24 2010 11:34:48|715065: IP = x.x.198.138, IKE MM Responder FSM error history (struct &0x391b8d8) , : MM_DONE, EV_ERROR-->MM_WAIT_MSG3, EV_TIMEOUT-->MM_WAIT_MSG3, NullEvent-->MM_SND_MSG2, EV_SND_MSG-->MM_SND_MSG2, EV_START_TMR-->MM_SND_MSG2, EV_RESEND_MSG-->MM_WAIT_MSG3, EV_TIMEOUT-->MM_WAIT_MSG3, NullEvent
7|Jun 24 2010 11:34:40|713236: IP = x.x.198.138, IKE_DECODE RESENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 108
7|Jun 24 2010 11:34:35|713236: IP = x.x.198.138, IKE_DECODE SENDING Message (msgid=0) with payloads : HDR + KE (4) + NONCE (10) + VENDOR (13) + VENDOR (13) + VENDOR (13) + VENDOR (13) + NONE (0) total length : 256
7|Jun 24 2010 11:34:35|713906: Group = DefaultRAGroup, IP = x.x.198.138, Generating keys for Responder...
7|Jun 24 2010 11:34:35|713906: IP = x.x.198.138, Connection landed on tunnel_group DefaultRAGroup
7|Jun 24 2010 11:34:35|715048: IP = x.x.198.138, Send Altiga/Cisco VPN3000/Cisco ASA GW VID
7|Jun 24 2010 11:34:35|715046: IP = x.x.198.138, constructing VID payload
7|Jun 24 2010 11:34:35|715038: IP = x.x.198.138, Constructing ASA spoofing IOS Vendor ID payload (version: 1.0.0, capabilities: 20000001)
7|Jun 24 2010 11:34:35|715048: IP = x.x.198.138, Send IOS VID
7|Jun 24 2010 11:34:35|715046: IP = x.x.198.138, constructing xauth V6 VID payload
7|Jun 24 2010 11:34:35|715046: IP = x.x.198.138, constructing Cisco Unity VID payload
7|Jun 24 2010 11:34:35|715046: IP = x.x.198.138, constructing nonce payload
7|Jun 24 2010 11:34:35|715046: IP = x.x.198.138, constructing ke payload
7|Jun 24 2010 11:34:35|715047: IP = x.x.198.138, processing nonce payload
7|Jun 24 2010 11:34:35|715047: IP = x.x.198.138, processing ISA_KE payload
7|Jun 24 2010 11:34:35|715047: IP = x.x.198.138, processing ke payload
7|Jun 24 2010 11:34:35|713236: IP = x.x.198.138, IKE_DECODE RECEIVED Message (msgid=0) with payloads : HDR + KE (4) + NONCE (10) + NONE (0) total length : 180
7|Jun 24 2010 11:34:34|713236: IP = x.x.198.138, IKE_DECODE RESENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 108
6|Jun 24 2010 11:34:34|713905: IP = x.x.198.138, P1 Retransmit msg dispatched to MM FSM
5|Jun 24 2010 11:34:34|713201: IP = x.x.198.138, Duplicate Phase 1 packet detected. Retransmitting last packet.
7|Jun 24 2010 11:34:32|713236: IP = x.x.198.138, IKE_DECODE RESENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 108
7|Jun 24 2010 11:34:31|713236: IP = x.x.198.138, IKE_DECODE RESENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 108
6|Jun 24 2010 11:34:24|606003: ASDM logging session number 0 from x.x.198.138 started
6|Jun 24 2010 11:34:24|605005: Login permitted from x.x.198.138/16490 to outside:66.92.228.251/https for user "alex"
7|Jun 24 2010 11:34:24|713236: IP = x.x.198.138, IKE_DECODE RESENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 108
7|Jun 24 2010 11:34:24|710002: TCP access permitted from x.x.198.138/16490 to outside:66.92.228.251/https
6|Jun 24 2010 11:34:24|302013: Built inbound TCP connection 151 for outside:x.x.198.138/16490 (x.x.198.138/16490) to NP Identity Ifc:66.92.228.251/443 (66.92.228.251/443)
7|Jun 24 2010 11:34:23|713236: IP = x.x.198.138, IKE_DECODE SENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 108
7|Jun 24 2010 11:34:23|715046: IP = x.x.198.138, constructing Fragmentation VID + extended capabilities payload
7|Jun 24 2010 11:34:23|715046: IP = x.x.198.138, constructing ISAKMP SA payload
7|Jun 24 2010 11:34:23|715028: IP = x.x.198.138, IKE SA Proposal # 1, Transform # 0 acceptable Matches global IKE entry # 4
7|Jun 24 2010 11:34:23|715047: IP = x.x.198.138, processing IKE SA payload
7|Jun 24 2010 11:34:23|713906: IP = x.x.198.138, Oakley proposal is acceptable
7|Jun 24 2010 11:34:23|715047: IP = x.x.198.138, processing SA payload
7|Jun 24 2010 11:34:23|713236: IP = x.x.198.138, IKE_DECODE RECEIVED Message (msgid=0) with payloads : HDR + SA (1) + NONE (0) total length : 84
7|Jun 24 2010 11:34:20|710005: TCP request discarded from x.x.198.138/16373 to outside:66.92.228.251/443
6|Jun 24 2010 11:34:20|106015: Deny TCP (no connection) from x.x.198.138/16373 to 66.92.228.251/443 flags FIN PSH ACK on interface outside
4|Jun 24 2010 11:34:17|713903: IP = x.x.198.138, Error: Unable to remove PeerTblEntry
3|Jun 24 2010 11:34:17|713902: IP = x.x.198.138, Removing peer from peer table failed, no match!
7|Jun 24 2010 11:34:17|713906: IP = x.x.198.138, sending delete/delete with reason message
7|Jun 24 2010 11:34:17|713906: IP = x.x.198.138, IKE SA MM:948e665a terminating: flags 0x01000002, refcnt 0, tuncnt 0
7|Jun 24 2010 11:34:17|715065: IP = x.x.198.138, IKE MM Responder FSM error history (struct &0x3919758) , : MM_DONE, EV_ERROR-->MM_WAIT_MSG3, EV_TIMEOUT-->MM_WAIT_MSG3, NullEvent-->MM_SND_MSG2, EV_SND_MSG-->MM_SND_MSG2, EV_START_TMR-->MM_SND_MSG2, EV_RESEND_MSG-->MM_WAIT_MSG3, EV_TIMEOUT-->MM_WAIT_MSG3, NullEvent
7|Jun 24 2010 11:34:16|713236: IP = x.x.198.138, IKE_DECODE SENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 108
7|Jun 24 2010 11:34:16|715046: IP = x.x.198.138, constructing Fragmentation VID + extended capabilities payload
7|Jun 24 2010 11:34:16|715046: IP = x.x.198.138, constructing ISAKMP SA payload
7|Jun 24 2010 11:34:16|715028: IP = x.x.198.138, IKE SA Proposal # 1, Transform # 0 acceptable Matches global IKE entry # 4
7|Jun 24 2010 11:34:16|715047: IP = x.x.198.138, processing IKE SA payload
7|Jun 24 2010 11:34:16|713906: IP = x.x.198.138, Oakley proposal is acceptable
7|Jun 24 2010 11:34:16|715047: IP = x.x.198.138, processing SA payload
7|Jun 24 2010 11:34:16|713236: IP = x.x.198.138, IKE_DECODE RECEIVED Message (msgid=0) with payloads : HDR + SA (1) + NONE (0) total length : 84
7|Jun 24 2010 11:34:09|713236: IP = x.x.198.138, IKE_DECODE RESENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 108
7|Jun 24 2010 11:31:45|713236: IP = x.x.198.138, IKE_DECODE SENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 108
7|Jun 24 2010 11:31:45|715046: IP = x.x.198.138, constructing Fragmentation VID + extended capabilities payload
7|Jun 24 2010 11:31:45|715046: IP = x.x.198.138, constructing ISAKMP SA payload
7|Jun 24 2010 11:31:45|715028: IP = x.x.198.138, IKE SA Proposal # 1, Transform # 0 acceptable Matches global IKE entry # 4
7|Jun 24 2010 11:31:45|715047: IP = x.x.198.138, processing IKE SA payload
7|Jun 24 2010 11:31:45|713906: IP = x.x.198.138, Oakley proposal is acceptable
7|Jun 24 2010 11:31:45|715047: IP = x.x.198.138, processing SA payload
7|Jun 24 2010 11:31:45|713236: IP = x.x.198.138, IKE_DECODE RECEIVED Message (msgid=0) with payloads : HDR + SA (1) + NONE (0) total length : 84
4|Jun 24 2010 11:31:41|713903: IP = x.x.198.138, Error: Unable to remove PeerTblEntry
3|Jun 24 2010 11:31:41|713902: IP = x.x.198.138, Removing peer from peer table failed, no match!
7|Jun 24 2010 11:31:41|713906: IP = x.x.198.138, sending delete/delete with reason message
7|Jun 24 2010 11:31:41|713906: IP = x.x.198.138, IKE SA MM:0d6d4e0d terminating: flags 0x01000002, refcnt 0, tuncnt 0
7|Jun 24 2010 11:31:41|715065: IP = x.x.198.138, IKE MM Responder FSM error history (struct &0x3940150) , : MM_DONE, EV_ERROR-->MM_WAIT_MSG3, EV_TIMEOUT-->MM_WAIT_MSG3, NullEvent-->MM_SND_MSG2, EV_SND_MSG-->MM_SND_MSG2, EV_START_TMR-->MM_SND_MSG2, EV_RESEND_MSG-->MM_WAIT_MSG3, EV_TIMEOUT-->MM_WAIT_MSG3, NullEvent
4|Jun 24 2010 11:31:41|713903: IP = x.x.198.138, Error: Unable to remove PeerTblEntry
3|Jun 24 2010 11:31:41|713902: IP = x.x.198.138, Removing peer from peer table failed, no match!
7|Jun 24 2010 11:31:41|713906: IP = x.x.198.138, sending delete/delete with reason message
7|Jun 24 2010 11:31:41|713906: IP = x.x.198.138, IKE SA MM:b60acf34 terminating: flags 0x01000002, refcnt 0, tuncnt 0
7|Jun 24 2010 11:31:41|715065: IP = x.x.198.138, IKE MM Responder FSM error history (struct &0x39d54a0) , : MM_DONE, EV_ERROR-->MM_WAIT_MSG3, EV_TIMEOUT-->MM_WAIT_MSG3, NullEvent-->MM_SND_MSG2, EV_SND_MSG-->MM_SND_MSG2, EV_START_TMR-->MM_SND_MSG2, EV_RESEND_MSG-->MM_WAIT_MSG3, EV_TIMEOUT-->MM_WAIT_MSG3, NullEvent
7|Jun 24 2010 11:31:33|713236: IP = x.x.198.138, IKE_DECODE RESENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 108
7|Jun 24 2010 11:31:33|713236: IP = x.x.198.138, IKE_DECODE RESENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 108
7|Jun 24 2010 11:31:25|713236: IP = x.x.198.138, IKE_DECODE RESENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 108
7|Jun 24 2010 11:31:25|713236: IP = x.x.198.138, IKE_DECODE RESENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 108
6|Jun 24 2010 11:31:25|713905: IP = x.x.198.138, P1 Retransmit msg dispatched to MM FSM
5|Jun 24 2010 11:31:25|713201: IP = x.x.198.138, Duplicate Phase 1 packet detected. Retransmitting last packet.
7|Jun 24 2010 11:31:23|713236: IP = x.x.198.138, IKE_DECODE RESENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 108
7|Jun 24 2010 11:31:17|713236: IP = x.x.198.138, IKE_DECODE RESENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 108
7|Jun 24 2010 11:31:15|713236: IP = x.x.198.138, IKE_DECODE SENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 108
7|Jun 24 2010 11:31:15|715046: IP = x.x.198.138, constructing Fragmentation VID + extended capabilities payload
7|Jun 24 2010 11:31:15|715046: IP = x.x.198.138, constructing ISAKMP SA payload
7|Jun 24 2010 11:31:15|715028: IP = x.x.198.138, IKE SA Proposal # 1, Transform # 0 acceptable Matches global IKE entry # 4
7|Jun 24 2010 11:31:15|715047: IP = x.x.198.138, processing IKE SA payload
7|Jun 24 2010 11:31:15|713906: IP = x.x.198.138, Oakley proposal is acceptable
7|Jun 24 2010 11:31:15|715047: IP = x.x.198.138, processing SA payload
7|Jun 24 2010 11:31:15|713236: IP = x.x.198.138, IKE_DECODE RECEIVED Message (msgid=0) with payloads : HDR + SA (1) + NONE (0) total length : 84
7|Jun 24 2010 11:31:09|713236: IP = x.x.198.138, IKE_DECODE SENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 108
7|Jun 24 2010 11:31:09|715046: IP = x.x.198.138, constructing Fragmentation VID + extended capabilities payload
7|Jun 24 2010 11:31:09|715046: IP = x.x.198.138, constructing ISAKMP SA payload
7|Jun 24 2010 11:31:09|715028: IP = x.x.198.138, IKE SA Proposal # 1, Transform # 0 acceptable Matches global IKE entry # 4
7|Jun 24 2010 11:31:09|715047: IP = x.x.198.138, processing IKE SA payload
7|Jun 24 2010 11:31:09|713906: IP = x.x.198.138, Oakley proposal is acceptable
7|Jun 24 2010 11:31:09|715047: IP = x.x.198.138, processing SA payload
7|Jun 24 2010 11:31:09|713236: IP = x.x.198.138, IKE_DECODE RECEIVED Message (msgid=0) with payloads : HDR + SA (1) + NONE (0) total length : 84
4|Jun 24 2010 11:31:07|713903: IP = x.x.198.138, Error: Unable to remove PeerTblEntry
3|Jun 24 2010 11:31:07|713902: IP = x.x.198.138, Removing peer from peer table failed, no match!
7|Jun 24 2010 11:31:07|713906: IP = x.x.198.138, sending delete/delete with reason message
7|Jun 24 2010 11:31:07|713906: IP = x.x.198.138, IKE SA MM:164fb835 terminating: flags 0x01000002, refcnt 0, tuncnt 0
7|Jun 24 2010 11:31:07|715065: IP = x.x.198.138, IKE MM Responder FSM error history (struct &0x3940150) , : MM_DONE, EV_ERROR-->MM_WAIT_MSG3, EV_TIMEOUT-->MM_WAIT_MSG3, NullEvent-->MM_SND_MSG2, EV_SND_MSG-->MM_SND_MSG2, EV_START_TMR-->MM_SND_MSG2, EV_RESEND_MSG-->MM_WAIT_MSG3, EV_TIMEOUT-->MM_WAIT_MSG3, NullEvent
4|Jun 24 2010 11:31:05|713903: IP = x.x.198.138, Error: Unable to remove PeerTblEntry
3|Jun 24 2010 11:31:05|713902: IP = x.x.198.138, Removing peer from peer table failed, no match!
7|Jun 24 2010 11:31:05|713906: IP = x.x.198.138, sending delete/delete with reason message
7|Jun 24 2010 11:31:05|713906: IP = x.x.198.138, IKE SA MM:5905f9ea terminating: flags 0x01000002, refcnt 0, tuncnt 0
7|Jun 24 2010 11:31:05|715065: IP = x.x.198.138, IKE MM Responder FSM error history (struct &0x395fff0) , : MM_DONE, EV_ERROR-->MM_WAIT_MSG3, EV_TIMEOUT-->MM_WAIT_MSG3, NullEvent-->MM_SND_MSG2, EV_SND_MSG-->MM_SND_MSG2, EV_START_TMR-->MM_SND_MSG2, EV_RESEND_MSG-->MM_WAIT_MSG3, EV_TIMEOUT-->MM_WAIT_MSG3, NullEvent
7|Jun 24 2010 11:30:59|713236: IP = x.x.198.138, IKE_DECODE RESENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 108
7|Jun 24 2010 11:30:57|713236: IP = x.x.198.138, IKE_DECODE RESENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 108
7|Jun 24 2010 11:30:51|713236: IP = x.x.198.138, IKE_DECODE RESENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 108
7|Jun 24 2010 11:30:49|713236: IP = x.x.198
Similar Messages
-
Wireless connection drops every day -- iTunes 8.02 the problem??
Hello! Our iMac is connected to the internet via Airport, and we have rarely had problems with the connection. For the last two weeks, when I get on the iMac for the first time that day, I have to reconnect to the wireless network through the Airport Setup Assistant every single time. I've tried resetting our cable modem and Airport -- no effect on the problem. I've tried going into sleep mode without logging off to see if that might help -- nope. I've tried repairing permissions in the off-chance that that might help -- no again.
In something that seems more than just a coincidence, we updated our iTunes to 8.02 about two weeks ago, and that's when this problem began happening. I am especially suspicious that there's a link because we did not update iTunes on our Macbook and it has no problem whatsoever staying connected to the exact same wireless network.
Two questions, then:
-- Is the iTunes 8.02 update the problem?
-- If so, how do I go back to iTunes 7.7?
Thanks!Hi, I'm new to iTunes and apple, but this is happening to me too! I've got iTunes 8 and whenever I run it, my wireless connection drops (disables itself) and cannot be restarted without rebooting the machine. Did you manage to find an answer?
-
Why does my broadband drop every day?
Is there a reason why I disconnect - on average - once a day:
Jan 1 13:09:12 WAN Connection: Ethernet link down.
Jan 2 07:56:03 WAN Connection: Ethernet link down.
Jan 3 08:09:42 WAN Connection: Ethernet link down.
Jan 3 11:55:21 WAN Connection: Ethernet link down.
Jan 4 08:17:11 WAN Connection: Ethernet link down.
Jan 4 08:23:51 WAN Connection: Ethernet link down.
Jan 7 11:50:50 WAN Connection: Ethernet link down.
Jan 7 11:51:51 WAN Connection: Ethernet link down.
Jan 8 09:52:24 WAN Connection: Ethernet link down.
Jan 9 10:56:35 WAN Connection: Ethernet link down.
Jan 11 05:14:28 WAN Connection: Ethernet link down.
Jan 11 10:27:19 WAN Connection: Ethernet link down.
Jan 11 12:19:49 WAN Connection: Ethernet link down.
Jan 12 05:04:49 WAN Connection: Ethernet link down.
Jan 13 08:01:47 WAN Connection: Ethernet link down.
Jan 14 07:25:18 WAN Connection: Ethernet link down.
Jan 14 12:11:39 WAN Connection: Ethernet link down.
Jan 14 14:00:21 WAN Connection: Ethernet link down.
...unfortunately I lost power over the new year period so I only have two weeks data at present, however, I did have a period of about 60 days showing the same pattern. That's 60 days of disconnecting once a day or so. Surely this isn't "normal"?
Before anyone says it - yes, I have changed to the master socket, changed microfilters, etc etc. None of it makes any difference, nor can I detect any pattern in the dropouts. Any thoughts / help much appreciated.And this morning after a 13hour connection:
Modulation : ADSL2+
Annex Mode : Annex A/L
Line State : up
Lan Tx : 685472
Lan Rx : 407167
ADSL Tx : 381046
ADSL Rx : 612308744
CRC Down : 0
CRC Up : 38865
FEC Down : 0
FEC Up : 12769
HEC Down : 27787
HEC Up : 0
SNR Up : 7.1
SNR Down : 6.7
Line Attenuation Up : 21.7
Line Attenuation Down : 42.0
Data Rate Up : 1011
Data Rate Down : 7206
I noticed that that when I tried to connect this morning nothing happened ie all the lights are on but when it doesn't load the webpage and after about 2 minutes the router resets. It may be that the connections are dropping when the router is first used after a long period of inactivity? Those errors are still creeping up...
No - it isn't connected to the test socket at the moment, I suppose you are going to say move it and see if this still happens? I will try a bit later but it didn't make a difference last time I moved it. -
Troubleshooting IPSEC VPN LAN-toLAN
PIX 515E's on both ends, one with version 7 of PIX IOS, and one with version 6 -- also, there are no firmware upgrades to the PIX running IOS v6.
IPSEC VPN drops completely in a completely random fashion, and it comes back up after the SA's are cleared. Is the best step at this point to upgrade the v6 PIX to all current firmware and PIX IOS versions? What would I look for after the upgrades if the issue were not resolved?Hi there i had this problem, but my scenario was like having a router connected to two PIX running 6.3 code. After several testing i got it to work in both 6.x and 7.x. I will attach the config for your reference. The configurations have been picked up from the cisco site only, and i believe it works pretty fine. Another thing could you have a debug isakmp sa and debug ipsec running on your pix so that we could find out the problem, post your logs in case you have collected the error messages.
-Hoogen -
I have several recuring alarms set up on iCal for each day of the week. In the past few weeks, an alarm will occasionaly notify me roughly 15 minutes to an hour and a half late. These daily alarms are identical and repeat every day and there seems to be no apparent pattern to why or when an alarm happens after the event is past.
I assume you meant iCal rather than iTunes? Yes, iCal the time zone is correct. The delayed alarms only happen sporadically. Since I posted this message, the problem stopped happening every day at the same time, but it still happens occasionally with no rhyme or reason as to when. It's gotten so that I can't depend on my iCal alarms anymore.
-
my iPhone 4 appears with no service every day, i have to make restart and a few hours later again the same problem, Any other solution please???
This is almost always a symptom of a phone that was jailbroken or hacked to unlock it.
Where did you get the phone? -
Hey all,
I just posted this as feedback to Apple, but I would like to hear your opinions on this as well.
The problem is that my iTunes and computer are stuttering at the beginning of every song, because all my smart playlists have to be updated with the new information that the previous song has been played. This causes iTunes to freeze up for about 20 to 25 seconds at the start of every new song, despite having quite a fast computer with plenty of RAM.
The culprit of course is that I have a large library (13k songs), as well as dozens of smart playlists depending on each other. However, the question is whether I should be punished for this? After all, you want to fill up that 80GB iPod, no? Anyways, I'm suggesting an extra option that would get rid of these issues no matter how big your library is or how many smart playlists you've got.
The feature I'm suggesting that would get rid of this issue is the following: instead of updating all smart playlists 'realtime', give the user the option of doing this live updating real time, every x hours, every day or only at startup. You could give the user this option either for every playlist independently, or globally in the settings for iTunes. With this extra option, I would configure iTunes to update my playlists every 4 hours or something like that, and I would get the stuttering only every 4 hours instead of every 4 minutes, as it's right now.
Are there any other people who would like this option?
What do you think? Useful? Rubbish?
Sincerely,
Tijl KindtAre you sure that this is the problem? I have a 300 gig library with numerous interdependent smart playlists. I also mostly play iTunes over Airtunes. I don't have this problem. I do see some slowness in launching iTunes as a result of the smart playlists but once it's open, I don't have a problem. I'm guessing you turned live updating off on all the playlists to see if that solved the problem as I don't know how else you would have come to this conclusion.
The only short term fix I can see is to turn off live updating on at least some of the playlists and then turn it back on periodically. -
Users VPN drops after every 5 mins
Hi everyone,
We have user whose remote VPN drops after every 5 mins.
Need to know whats things i can check to troubleshoot the issue?
User connects by RSA Token.
ISP connection is ok its not issue.
Any thing i can check in ASA ?
Thanks
MaheshOn the client side, have you tested wired vs wireless to see if the problems exists in both? If it's only one of them but not the other, try updating the drivers. Also, if it's windows 7, take a look at the power settings in control panel. I've seen where agressive power settings will shut off the network port when idle. Not that big of a deal in a LAN environment but it wreaks havoc on VPN.
-
Spotlight on G5 spotlighting every day for hours
hi all,
I have installed Leopard 10.5.3 on my G5 2.3 dual (4 FW disks attached on it) and since then Spotlight searches for files every day for hours, on all disks, internal and external;
I really don't know what SL is looking for and why these searches are endless,
but it's so frustrating when I need to find a file because SLing is not available during its search;
I have the same problem with my MBP 15" Penryn 2.4GHz but only when external disks are on;
has anybody out there any idea about that? I wonder, is that normal function?
thanks for helping_What malware was found by ClamXav? Most likely, it was Windows malware. Also, unfortunately, most likely it was Windows malware attached to e-mail messages, in which case deleting it from ClamXav probably corrupted one or more of your mailboxes. Assuming you're using Mail, you should probably rebuild all your mailboxes, by selecting each one, one at a time, and using the Rebuild command in the Mailbox menu on each.
Regarding Mac malware, you most likely have nothing to fear. There isn't much malware out there for Macs, and all of it is very rare. Of course, if you're actually using Mac OS X 10.5.8, as your profile indicates, you have fewer defenses than users of more up-to-date systems. For more on this topic, see my Mac Malware Guide.
As to the downloads, there are many things that could account for that. Jon P D gave a couple excellent possibilities. Regarding the wifi, if you're using a wifi router to create a network without a password, or with weak WEP encryption, you could easily have someone piggybacking on your wifi and using your bandwidth without permission. Lock down the network with WPA2 encryption and a good, strong password that people won't be able to guess.
Also, note that Mac OS X downloads updates automatically in the background, and there were a number of large updates this week. If you have a connection that only allows you to download a certain amount per month, you may want to turn that option off in System Preferences -> Software Update, so that you can choose when new updates are downloaded. -
I have an even weirder problem. I skype every night with a person nearby, and the call mac-to-mac is dropped every night at exactly the same hour, to the minute. I have to close skype and restart it and call again and then it works without problems.
I have my imac connected to hi-speed cable.
Any ideas anyone? Thanks!You should post in Skype forums.
-
Cisco ASA 5505 Ipsec VPN and random connection dropping issues.
Hello,
We are currently having issues with a ASA 5505 Ipsec VPN. It was configured about 7-8 months ago and has been running very well..up until the last few weeks. For some reason, the VPN tends to randomly disconnect any user clients connected a lot. Furthermore, sometimes it actually connects; however does not put us on the local network for some reason and unable to browse file server. We have tried rebooting the ASA a few times and our ISP Time Warner informed us there are no signs of packet loss but still unable to pinpoint the problem. Sometimes users close out of VPN client completely, reopen several times and then it works. However it's never really consistent enough and hasn't been the last few weeks. No configuration changes have been made to ASA at all. Furthermore, the Cisco Ipsec VPN client version is: 5.0.70
Directly below is our current running config (modded for public). Any help or ideas would be greatly appreciated. Otherwise, if everything looks good...then I will defer back to our ISP Time Warner:
: Saved
ASA Version 8.4(2)
hostname domainasa
domain-name adomain.local
enable password cTfsR84pqF5Xohw. encrypted
passwd 2KFQnbNIdI.2KYOU encrypted
names
interface Ethernet0/0
switchport access vlan 2
interface Ethernet0/1
interface Ethernet0/2
interface Ethernet0/3
interface Ethernet0/4
interface Ethernet0/5
interface Ethernet0/6
interface Ethernet0/7
interface Vlan1
nameif inside
security-level 100
ip address 192.168.2.1 255.255.255.0
interface Vlan2
nameif outside
security-level 0
ip address 205.101.1.240 255.255.255.248
ftp mode passive
clock timezone EST -5
clock summer-time EDT recurring
dns domain-lookup inside
dns domain-lookup outside
dns server-group DefaultDNS
name-server 192.168.2.60
domain-name adomain.local
same-security-traffic permit intra-interface
object network obj_any
subnet 0.0.0.0 0.0.0.0
object network SBS_2011
host 192.168.2.60
object network NETWORK_OBJ_192.168.2.0_24
subnet 192.168.2.0 255.255.255.0
object network NETWORK_OBJ_192.168.5.192_
27
subnet 192.168.5.192 255.255.255.224
object network Https_Access
host 192.168.2.90
description Spam Hero
object-group network DM_INLINE_NETWORK_1
network-object object SPAM1
network-object object SPAM2
network-object object SPAM3
network-object object SPAM4
network-object object SPAM5
network-object object SPAM6
network-object object SPAM7
network-object object SPAM8
object-group service RDP tcp
description Microsoft RDP
port-object eq 3389
access-list outside_access_in extended permit tcp object-group DM_INLINE_NETWORK_1 object SBS_2011 eq smtp
access-list outside_access_in extended permit tcp any object SBS_2011 eq https
access-list outside_access_in extended permit icmp any interface outside
access-list outside_access_in remark External RDP Access
access-list outside_access_in extended permit tcp any object SBS_2011 object-group RDP
access-list domain_splitTunnelAcl standard permit 192.168.2.0 255.255.255.0
pager lines 24
logging asdm informational
mtu inside 1500
mtu outside 1500
ip local pool test 192.168.10.1-192.168.10.5 mask 255.255.255.0
ip local pool VPN_Users 192.168.5.194-192.168.5.22
0 mask 255.255.255.0
icmp unreachable rate-limit 1 burst-size 1
no asdm history enable
arp timeout 14400
nat (inside,outside) source static NETWORK_OBJ_192.168.2.0_24
NETWORK_OBJ_192.168.2.0_24
destination static NETWORK_OBJ_192.168.5.192_
27 NETWORK_OBJ_192.168.5.192_
27 no-proxy-arp route-lookup
object network obj_any
nat (inside,outside) dynamic interface
object network SBS_2011
nat (inside,outside) static interface service tcp smtp smtp
object network Https_Access
nat (inside,outside) static interface service tcp https https
nat (inside,outside) after-auto source dynamic any interface
access-group outside_access_in in interface outside
route outside 0.0.0.0 0.0.0.0 205.101.1.239 1
timeout xlate 3:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
timeout tcp-proxy-reassembly 0:01:00
timeout floating-conn 0:00:00
dynamic-access-policy-reco
rd DfltAccessPolicy
user-identity default-domain LOCAL
http server enable
http 192.168.2.0 255.255.255.0 inside
http 192.168.1.0 255.255.255.0 inside
no snmp-server location
no snmp-server contact
snmp-server enable traps snmp authentication linkup linkdown coldstart warmstart
crypto ipsec ikev1 transform-set ESP-3DES-SHA esp-3des esp-sha-hmac
crypto ipsec ikev1 transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac
crypto ipsec ikev1 transform-set ESP-DES-SHA esp-des esp-sha-hmac
crypto ipsec ikev1 transform-set ESP-DES-MD5 esp-des esp-md5-hmac
crypto ipsec ikev1 transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac
crypto ipsec ikev1 transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac
crypto ipsec ikev1 transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac
crypto ipsec ikev1 transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac
crypto ipsec ikev1 transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac
crypto ipsec ikev1 transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac
crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set pfs group1
crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set ikev1 transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5
crypto map outside_map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP
crypto map outside_map interface outside
crypto ikev1 enable outside
crypto ikev1 policy 10
authentication pre-share
encryption 3des
hash sha
group 2
lifetime 86400
telnet 192.168.2.0 255.255.255.0 inside
telnet timeout 5
ssh timeout 5
console timeout 0
dhcpd address 192.168.2.160-192.168.2.19
9 inside
dhcpd dns 192.168.2.60 24.29.99.36 interface inside
dhcpd wins 192.168.2.60 24.29.99.36 interface inside
dhcpd domain adomain interface inside
threat-detection basic-threat
threat-detection statistics access-list
no threat-detection statistics tcp-intercept
webvpn
group-policy domain internal
group-policy domain attributes
wins-server value 192.168.2.60
dns-server value 192.168.2.60
vpn-tunnel-protocol ikev1
split-tunnel-policy tunnelspecified
split-tunnel-network-list value domain_splitTunnelAcl
default-domain value adomain.local
username ben password zWCAaitV3CB.GA87 encrypted privilege 0
username ben attributes
vpn-group-policy domain
username sdomain password FATqd4I1ZoqyQ/MN encrypted
username sdomain attributes
vpn-group-policy domain
username adomain password V5.hvhZU4S8NwGg/ encrypted
username adomain attributes
vpn-group-policy domain
service-type admin
username jdomain password uODal3Mlensb8d.t encrypted privilege 0
username jdomain attributes
vpn-group-policy domain
service-type admin
tunnel-group domain type remote-access
tunnel-group domain general-attributes
address-pool VPN_Users
default-group-policy domain
tunnel-group domain ipsec-attributes
ikev1 pre-shared-key *****
class-map inspection_default
match default-inspection-traffic
policy-map type inspect dns preset_dns_map
parameters
message-length maximum client auto
message-length maximum 512
policy-map global_policy
class inspection_default
inspect dns preset_dns_map
inspect ftp
inspect h323 h225
inspect h323 ras
inspect rsh
inspect rtsp
inspect esmtp
inspect sqlnet
inspect skinny
inspect sunrpc
inspect xdmcp
inspect sip
inspect netbios
inspect tftp
inspect ip-options
inspect icmp
service-policy global_policy global
prompt hostname context
no call-home reporting anonymous
Cryptochecksum:e2466a5b754
eebcdb0cef
f051bef91d
9
: end
no asdm history enable
Thanks againHello Belnet,
What do the logs show from the ASA.
Can you post them ??
Any other question..Sure..Just remember to rate all of the community answers.
Julio -
Need urgent help in configuring Client to Site IPSec VPN with Hairpinning on Cisco ASA5510 - 8.2(1).
The following is the Layout:
There are two Leased Lines for Internet access - 1.1.1.1 & 2.2.2.2, the latter being the Standard Default route, the former one is for backup.
I have been able to configure Client to Site IPSec VPN
1) With access from Outside to only the Internal Network (172.16.0.0/24) behind the asa
2) With Split tunnel with simultaneous assess to internal LAN and Outside Internet.
But I have not been able to make tradiotional Hairpinng model work in this scenario.
I followed every possible sugestions made in this regard in many Discussion Topics but still no luck. Can someone please help me out here???
Following is the Running-Conf with Normal Client to Site IPSec VPN configured with No internat Access:
LIMITATION: Can't Boot into any other ios image for some unavoidable reason, must use 8.2(1)
running-conf --- Working normal Client to Site VPN without internet access/split tunnel
ASA Version 8.2(1)
hostname ciscoasa
domain-name cisco.campus.com
enable password xxxxxxxxxxxxxx encrypted
passwd xxxxxxxxxxxxxx encrypted
names
interface GigabitEthernet0/0
nameif internet1-outside
security-level 0
ip address 1.1.1.1 255.255.255.240
interface GigabitEthernet0/1
nameif internet2-outside
security-level 0
ip address 2.2.2.2 255.255.255.224
interface GigabitEthernet0/2
nameif dmz-interface
security-level 0
ip address 10.0.1.1 255.255.255.0
interface GigabitEthernet0/3
nameif campus-lan
security-level 0
ip address 172.16.0.1 255.255.0.0
interface Management0/0
nameif CSC-MGMT
security-level 100
ip address 10.0.0.4 255.255.255.0
boot system disk0:/asa821-k8.bin
boot system disk0:/asa843-k8.bin
ftp mode passive
dns server-group DefaultDNS
domain-name cisco.campus.com
same-security-traffic permit inter-interface
same-security-traffic permit intra-interface
object-group network cmps-lan
object-group network csc-ip
object-group network www-inside
object-group network www-outside
object-group service tcp-80
object-group service udp-53
object-group service https
object-group service pop3
object-group service smtp
object-group service tcp80
object-group service http-s
object-group service pop3-110
object-group service smtp25
object-group service udp53
object-group service ssh
object-group service tcp-port
object-group service udp-port
object-group service ftp
object-group service ftp-data
object-group network csc1-ip
object-group service all-tcp-udp
access-list INTERNET1-IN extended permit ip host 1.2.2.2 host 2.2.2.3
access-list CSC-OUT extended permit ip host 10.0.0.5 any
access-list CAMPUS-LAN extended permit tcp 172.16.0.0 255.255.0.0 any eq www
access-list CAMPUS-LAN extended permit tcp 172.16.0.0 255.255.0.0 any eq https
access-list CAMPUS-LAN extended permit tcp 172.16.0.0 255.255.0.0 any eq ssh
access-list CAMPUS-LAN extended permit tcp 172.16.0.0 255.255.0.0 any eq ftp
access-list CAMPUS-LAN extended permit udp 172.16.0.0 255.255.0.0 any eq domain
access-list CAMPUS-LAN extended permit tcp 172.16.0.0 255.255.0.0 any eq smtp
access-list CAMPUS-LAN extended permit tcp 172.16.0.0 255.255.0.0 any eq pop3
access-list CAMPUS-LAN extended permit ip any any
access-list csc-acl remark scan web and mail traffic
access-list csc-acl extended permit tcp any any eq smtp
access-list csc-acl extended permit tcp any any eq pop3
access-list csc-acl remark scan web and mail traffic
access-list INTERNET2-IN extended permit tcp any host 1.1.1.2 eq 993
access-list INTERNET2-IN extended permit tcp any host 1.1.1.2 eq imap4
access-list INTERNET2-IN extended permit tcp any host 1.1.1.2 eq 465
access-list INTERNET2-IN extended permit tcp any host 1.1.1.2 eq www
access-list INTERNET2-IN extended permit tcp any host 1.1.1.2 eq https
access-list INTERNET2-IN extended permit tcp any host 1.1.1.2 eq smtp
access-list INTERNET2-IN extended permit tcp any host 1.1.1.2 eq pop3
access-list INTERNET2-IN extended permit ip any host 1.1.1.2
access-list nonat extended permit ip 172.16.0.0 255.255.0.0 172.16.0.0 255.255.0.0
access-list DNS-inspect extended permit tcp any any eq domain
access-list DNS-inspect extended permit udp any any eq domain
access-list capin extended permit ip host 172.16.1.234 any
access-list capin extended permit ip host 172.16.1.52 any
access-list capin extended permit ip any host 172.16.1.52
access-list capin extended permit ip host 172.16.0.82 host 172.16.0.61
access-list capin extended permit ip host 172.16.0.61 host 172.16.0.82
access-list capout extended permit ip host 2.2.2.2 any
access-list capout extended permit ip any host 2.2.2.2
access-list campus-lan_nat0_outbound extended permit ip 172.16.0.0 255.255.0.0 192.168.150.0 255.255.255.0
pager lines 24
logging enable
logging buffered debugging
logging asdm informational
mtu internet1-outside 1500
mtu internet2-outside 1500
mtu dmz-interface 1500
mtu campus-lan 1500
mtu CSC-MGMT 1500
ip local pool vpnpool1 192.168.150.2-192.168.150.250 mask 255.255.255.0
ip verify reverse-path interface internet2-outside
ip verify reverse-path interface dmz-interface
ip verify reverse-path interface campus-lan
ip verify reverse-path interface CSC-MGMT
no failover
icmp unreachable rate-limit 1 burst-size 1
asdm image disk0:/asdm-621.bin
no asdm history enable
arp timeout 14400
global (internet1-outside) 1 interface
global (internet2-outside) 1 interface
nat (campus-lan) 0 access-list campus-lan_nat0_outbound
nat (campus-lan) 1 0.0.0.0 0.0.0.0
nat (CSC-MGMT) 1 10.0.0.5 255.255.255.255
static (CSC-MGMT,internet2-outside) 2.2.2.3 10.0.0.5 netmask 255.255.255.255
access-group INTERNET2-IN in interface internet1-outside
access-group INTERNET1-IN in interface internet2-outside
access-group CAMPUS-LAN in interface campus-lan
access-group CSC-OUT in interface CSC-MGMT
route internet2-outside 0.0.0.0 0.0.0.0 2.2.2.5 1
route internet1-outside 0.0.0.0 0.0.0.0 1.1.1.5 2
timeout xlate 3:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
timeout tcp-proxy-reassembly 0:01:00
dynamic-access-policy-record DfltAccessPolicy
aaa authentication ssh console LOCAL
aaa authentication enable console LOCAL
http server enable
http 10.0.0.2 255.255.255.255 CSC-MGMT
http 10.0.0.8 255.255.255.255 CSC-MGMT
http 1.2.2.2 255.255.255.255 internet2-outside
http 1.2.2.2 255.255.255.255 internet1-outside
no snmp-server location
no snmp-server contact
snmp-server enable traps snmp authentication linkup linkdown coldstart
crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac
crypto ipsec transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac
crypto ipsec transform-set ESP-DES-SHA esp-des esp-sha-hmac
crypto ipsec transform-set ESP-DES-MD5 esp-des esp-md5-hmac
crypto ipsec transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac
crypto ipsec transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac
crypto ipsec transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac
crypto ipsec transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac
crypto ipsec transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac
crypto ipsec transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac
crypto ipsec security-association lifetime seconds 28800
crypto ipsec security-association lifetime kilobytes 4608000
crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set pfs group5
crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5
crypto map internet2-outside_map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP
crypto map internet2-outside_map interface internet2-outside
crypto ca trustpoint _SmartCallHome_ServerCA
crl configure
crypto ca certificate chain _SmartCallHome_ServerCA
certificate ca xyzxyzxyzyxzxyzxyzxyzxxyzyxzyxzy
a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as
a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as
a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as
a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as
a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as
a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as
a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as
a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as
a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as
a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as
a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as
a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as
a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as
a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as
a67a897as a67a897as a67a897as a67a897as a67a897as
quit
crypto isakmp enable internet2-outside
crypto isakmp policy 10
authentication pre-share
encryption aes
hash md5
group 2
lifetime 86400
telnet 10.0.0.2 255.255.255.255 CSC-MGMT
telnet 10.0.0.8 255.255.255.255 CSC-MGMT
telnet timeout 5
ssh 1.2.3.3 255.255.255.240 internet1-outside
ssh 1.2.2.2 255.255.255.255 internet1-outside
ssh 1.2.2.2 255.255.255.255 internet2-outside
ssh timeout 5
console timeout 0
threat-detection basic-threat
threat-detection statistics access-list
no threat-detection statistics tcp-intercept
webvpn
group-policy VPN_TG_1 internal
group-policy VPN_TG_1 attributes
vpn-tunnel-protocol IPSec
username ssochelpdesk password xxxxxxxxxxxxxx encrypted privilege 15
username administrator password xxxxxxxxxxxxxx encrypted privilege 15
username vpnuser1 password xxxxxxxxxxxxxx encrypted privilege 0
username vpnuser1 attributes
vpn-group-policy VPN_TG_1
tunnel-group VPN_TG_1 type remote-access
tunnel-group VPN_TG_1 general-attributes
address-pool vpnpool1
default-group-policy VPN_TG_1
tunnel-group VPN_TG_1 ipsec-attributes
pre-shared-key *
class-map cmap-DNS
match access-list DNS-inspect
class-map csc-class
match access-list csc-acl
policy-map type inspect dns preset_dns_map
parameters
message-length maximum 512
policy-map global_policy
class csc-class
csc fail-open
class cmap-DNS
inspect dns preset_dns_map
service-policy global_policy global
prompt hostname context
Cryptochecksum: y0y0y0y0y0y0y0y0y0y0y0y0y0y
: end
Neither Adding dynamic NAT for 192.168.150.0/24 on outside interface works, nor does the sysopt connection permit-vpn works
Please tell what needs to be done here, to hairpin all the traffic to internet comming from VPN Clients.
That is I need clients conected via VPN tunnel, when connected to internet, should have their IP's NAT'ted against the internet2-outside interface address 2.2.2.2, as it happens for the Campus Clients (172.16.0.0/16)
I'm not much conversant with everything involved in here, therefore please be elaborative in your replies. Please let me know if you need any more information regarding this setup to answer my query.
Thanks & Regards
maxsHi Jouni,
Thanks again for your help, got it working. Actually the problem was ASA needed some time after configuring to work properly ( ?????? ). I configured and tested several times within a short period, during the day and was not working initially, GUI packet tracer was showing some problems (IPSEC Spoof detected) and also there was this left out dns. Its working fine now.
But my problem is not solved fully here.
Does hairpinning model allow access to the campus LAN behind ASA also?. Coz the setup is working now as i needed, and I can access Internet with the NAT'ed ip address (outside-interface). So far so good. But now I cannot access the Campus LAN behind the asa.
Here the packet tracer output for the traffic:
packet-tracer output
asa# packet-tracer input internet2-outside tcp 192.168.150.1 56482 172.16.1.249 22
Phase: 1
Type: ACCESS-LIST
Subtype:
Result: ALLOW
Config:
Implicit Rule
Additional Information:
MAC Access list
Phase: 2
Type: FLOW-LOOKUP
Subtype:
Result: ALLOW
Config:
Additional Information:
Found no matching flow, creating a new flow
Phase: 3
Type: ROUTE-LOOKUP
Subtype: input
Result: ALLOW
Config:
Additional Information:
in 172.16.0.0 255.255.0.0 campus-lan
Phase: 4
Type: ROUTE-LOOKUP
Subtype: input
Result: ALLOW
Config:
Additional Information:
in 192.168.150.1 255.255.255.255 internet2-outside
Phase: 5
Type: ACCESS-LIST
Subtype: log
Result: ALLOW
Config:
access-group internnet1-in in interface internet2-outside
access-list internnet1-in extended permit ip 192.168.150.0 255.255.255.0 any
Additional Information:
Phase: 6
Type: IP-OPTIONS
Subtype:
Result: ALLOW
Config:
Additional Information:
Phase: 7
Type: CP-PUNT
Subtype:
Result: ALLOW
Config:
Additional Information:
Phase: 8
Type: VPN
Subtype: ipsec-tunnel-flow
Result: ALLOW
Config:
Additional Information:
Phase: 9
Type: NAT-EXEMPT
Subtype: rpf-check
Result: ALLOW
Config:
Additional Information:
Phase: 10
Type: NAT
Subtype:
Result: DROP
Config:
nat (internet2-outside) 1 192.168.150.0 255.255.255.0
match ip internet2-outside 192.168.150.0 255.255.255.0 campus-lan any
dynamic translation to pool 1 (No matching global)
translate_hits = 14, untranslate_hits = 0
Additional Information:
Result:
input-interface: internet2-outside
input-status: up
input-line-status: up
output-interface: internet2-outside
output-status: up
output-line-status: up
Action: drop
Drop-reason: (acl-drop) Flow is denied by configured rule
The problem here as you can see is the Rule for dynamic nat that I added to make hairpin work at first place
dynamic nat
asa(config)#nat (internet2-outside) 1 192.168.150.0 255.255.255.0
Is it possible to access both
1)LAN behind ASA
2)INTERNET via HAIRPINNING
simultaneously via a single tunnel-group?
If it can be done, how do I do it. What changes do I need to make here to get simultaneous access to my LAN also?
Thanks & Regards
Abhijit -
Poor speed in peak hours - losing will to live - o...
Hi BT,
I am almost at the point of begging someone to help me here, thank you in advance for your time and insight. It was with a heavy heart that I departed from BE There after Sky's takeover, and invested a little faith in BT. I started a contract for BT Total Broadband 3, and received an immaculate service for the first ten days or so of my contract.
Then, quite suddenly, I started receiving dramatic drop-outs in peak hours only. As I type this, BT Speedtest reports downstream of 18.95mbps (as quoted) but by tonight, it will be down to around 0.05-0.1. This is with both a wireless and wired test, and has endured, every day, for around a month now. I work from home, and it's losing me money every night; if I restart the router then it sometimes picks up by a few mbps, but within minutes has returned to where it was.
I have a query open with BT Technical help department who, unlike general customer services, have been very responsive and helpful! I have been sending them regular diagnostics, however no-one can yet seem to identify what the problem is. They first suggested resetting to factory settings - no change. I then ran the full diagnostics with the aid of a BT worker's call last Friday, including TAP3 and everything that comes after, and the verdict was that my Broadband is 'performing extremely poorly and that a fault would be raised'.
I found this reassuring; however another employee called me this morning to tell me BT had spoken to the exchange, and ascertained that supposedly everything was 'fine with my line'. She suggested I try testing the service using the master socket in the white BT box, however there is no response when I try this - I cannot connect to Broadband, or get a dial tone. I am keen to know how much of an issue this could be, and whether this represents a problem on 'my' side or BT's? I have tried changing filter - same result. I have also called 17070 and there appears to be absolutely zero noise on my line.
I am at my wits' end, and constantly curse the decision I made to throw away a connection that hadn't misfired once in three years for one that is effectively unusable in the evenings/weekends. I have also recently finished a full time study course, money is short and I am slowly suspecting that I am going to be strong-armed into paying exorbitant engineers' fees to look at a connection that, with my previous ISP, functioned perfectly. This is desperately depressing; please, please could someone try and help?
This is my current ADSL status at 13.30:
ADSL Line Status
Connection Information
Line state:
Connected
Connection time:
0 days, 00:30:55
Downstream:
20.9 Mbps
Upstream:
1.133 Mbps
ADSL Settings
VPI/VCI:
0/38
Type:
PPPoA
Modulation:
G.992.5 Annex A
Latency type:
Fast
Noise margin (Down/Up):
3.0 dB / 6.0 dB
Line attenuation (Down/Up):
14.5 dB / 7.5 dB
Output power (Down/Up):
19.9 dBm / 11.5 dBm
FEC Events (Down/Up):
0 / 0
CRC Events (Down/Up):
63 / 32Hi there, thanks for your response
Connection time is short due to my testing via the test socket about half an hour before posting on here. As in the above post, there is no response from the test socket; the master socket works fine (apart from the obvious slow-down issues in peak hours). The master socket is the only one in the house, and I've used it without issue for years before switching over to BT.
These are the requested full stats which I've just obtained (I had to restart the router again, which will explain the short connection time again!)
ADSL Line Status
Connection Information
Line state:
Connected
Connection time:
0 days, 00:03:52
Downstream:
21.02 Mbps
Upstream:
1.129 Mbps
ADSL Settings
VPI/VCI:
0/38
Type:
PPPoA
Modulation:
G.992.5 Annex A
Latency type:
Fast
Noise margin (Down/Up):
3.0 dB / 6.6 dB
Line attenuation (Down/Up):
14.5 dB / 7.5 dB
Output power (Down/Up):
19.8 dBm / 11.0 dBm
FEC Events (Down/Up):
0 / 0
CRC Events (Down/Up):
1 / 0
Loss of Framing (Local/Remote):
0 / 0
Loss of Signal (Local/Remote):
0 / 0
Loss of Power (Local/Remote):
0 / 0
HEC Events (Down/Up):
0 / 7
Error Seconds (Local/Remote):
68 / 0
PS - if you want me to leave it a while before posting stats, given the router has just been restarted, just let me know and I'll make this happen! -
IPSec VPN Resets before Isakmp Lifetime Expires
Hi,
I have a IPSec tunnel between ASA5520 and 1841. The ISAKMP lifetime is set to the default 24 hours on both end. No volume limit is configured. But the tunnel resets itself 1.5 hours ahead every day. I need to keep the resetting at night so that my special application won't be broken during work hours.
I thougt the premature resetting was due to IOS version on the router. I upgraded to a new version but did not fix the problem.
Besides the resetting, everything else is working fine.
Any ideas are appreciated.Hi,
One on my logs in ASA is as follows. (IP address is modified.)
Apr 16 2009 00:52:16: %ASA-4-113019: Group = ABC.ABC.177.202, Username = ABC.ABC.177.202, IP = NZ_Router, Session disconnected. Session Type: IPSecLAN2LAN, Duration: 22h:48m:33s, Bytes xmt: 983291523, Bytes rcv: 982279579, Reason: Idle Timeout
Apr 16 2009 23:40:50: %ASA-3-713902: Group = ABC.ABC.177.202, IP = ABC.ABC.177.202, Removing peer from peer table failed, no match!
Apr 16 2009 23:40:50: %ASA-3-713902: Group = ABC.ABC.177.202, IP = ABC.ABC.177.202, Removing peer from peer table failed, no match!
Apr 16 2009 23:40:50: %ASA-4-713903: Group = ABC.ABC.177.202, IP = ABC.ABC.177.202, Error: Unable to remove PeerTblEntry
Apr 16 2009 23:40:50: %ASA-4-113019: Group = ABC.ABC.177.202, Username = ABC.ABC.177.202, IP = NZ_Router, Session disconnected. Session Type: IPSecLAN2LAN, Duration: 22h:48m:32s, Bytes xmt: 751281811, Bytes rcv: 1447481492, Reason: User Requested
The disconnection reason can be either 'User Requested' or 'Idle Timeout'. When 'Idle Timeout', the application won't get dropped; when 'User Requested', the application gets dropped.
Thanks. -
ASA 5505 Site-to-Site VPN dropping at end of lifetime
I have 4 ASA 5505's with Site-to-Site IPSEC VPN tunnels built between them. One of the tunnels stays up just fine but the other 2 drop at the end of the SA lifetime for a period of time equal to 10% of the SA lifetime.
Orignially, I had the the lifetime set to 1 hour and the tunnels would drop for 6 minutes. I changed the lifetime to 8 hours (480 minutes) and they dropped for 48 minutes. I've gone over the configurations and the only differences I can find is that the sites where the tunnel drops have the outside interface forwarded to an VOIP server and all ports but SIP blocked.Can you post the configs?
Maybe you are looking for
-
Invoice matching report in AR Donwpayment Invoice
Hi Expert, Customer would like to see AR Downpayment Invoice matching report as follow. May I know how to derive the information? BP name(A) D/P Inv No(B). Total amount in D/P Inv(C) Amount applied in invoices(D) Remaining balance(E)=C-D and
-
LSMW to upload open items BSIS/BSAD
Hi all! is possible upload open items BSIS/BSAD with LSMW or have we an other method? thanks
-
Dates for import are all wrong
Hiya - I have been trying to import clips made last week. The date is correct but the year is 2009. They will put themselves into a 2009 event folder with other projects in. I have tried to create a 2010 event folder and drag the project into it but
-
Check list document to get my scenario certified by SAP
Does someone have standard documents that state rules to fllow while developing PI scenarios? this is basically to get my project certified by SAP.. what are the things SAP looks for before certifying PI scenarios created by me? thanks in advance.
-
Red X Battery Issue Prevalent After Reset
I have the dreaded red X on my battery icon when attempting to charge, ive already run a factory reset (and lost stuff because apparently "backup paused, cloud service unable to connect" but thats beside the point), and yet this issue is still there,