## 2016-05-21 20:14:56 : IKE<2.2.2.2> re-trans timer expired, msg retry (1) (80120f/2) ## 2016-05-21 20:14:56 : IKE<2.2.2.2> Responder sending IPv4 IP 2.2.2.2/port 500 ## 2016-05-21 20:14:56 : IKE<2.2.2.2> Send Phase 1 packet (len=196) ## 2016-05-21 20:14:57 : IKE<2.2.2.2> ike packet, len 120, action 0 ## 2016-05-21 20:14:57 : IKE<2.2.2.2> Catcher: received 92 bytes from socket. ## 2016-05-21 20:14:57 : IKE<2.2.2.2> ****** Recv packet if of vsys ****** ## 2016-05-21 20:14:57 : IKE<2.2.2.2> Catcher: get 92 bytes. src port 500 ## 2016-05-21 20:14:57 : IKE<0.0.0.0 > ISAKMP msg: len 92, nxp 5[ID], exch 2[MM], flag 01 E ## 2016-05-21 20:14:57 : IKE<2.2.2.2> Receive re-transmit IKE packet phase 1 SA(2.2.2.2) exchg(2) len(92) ## 2016-05-21 20:14:58 : IKE<2.2.2.2> re-trans timer expired, msg retry (9) (80120f/2) ## 2016-05-21 20:14:58 : IKE<2.2.2.2> Responder sending IPv4 IP 2.2.2.2/port 500 ## 2016-05-21 20:14:58 : IKE<2.2.2.2> Send Phase 1 packet (len=196) ## 2016-05-21 20:15:00 : IKE<2.2.2.2> re-trans timer expired, msg retry (2) (80120f/2) ## 2016-05-21 20:15:00 : IKE<2.2.2.2> Responder sending IPv4 IP 2.2.2.2/port 500 ## 2016-05-21 20:15:00 : IKE<2.2.2.2> Send Phase 1 packet (len=196) ## 2016-05-21 20:15:02 : IKE<2.2.2.2> re-trans timer expired, msg retry (10) (80120f/2) ## 2016-05-21 20:15:02 : IKE<2.2.2.2> Responder sending IPv4 IP 2.2.2.2/port 500 ## 2016-05-21 20:15:02 : IKE<2.2.2.2> Send Phase 1 packet (len=196) ## 2016-05-21 20:15:03 : reap_db. deleting p1sa 69996b4 ## 2016-05-21 20:15:03 : terminate_SA: trying to delete SA cause: 0 cond: 2 ## 2016-05-21 20:15:03 : peer_identity_unregister_p1_sa. ## 2016-05-21 20:15:03 : IKE<0.0.0.0 > delete peer identity 0x698fb1c ## 2016-05-21 20:15:03 : IKE<0.0.0.0 > peer_identity_remove_from_peer: num entry before remove <2> ## 2016-05-21 20:15:03 : peer_idt.c peer_identity_unregister_p1_sa 686: pidt deleted. ## 2016-05-21 20:15:03 : reap_db. deleting p1sa 6999210 ## 2016-05-21 20:15:03 : terminate_SA: trying to delete SA cause: 0 cond: 2 ## 2016-05-21 20:15:03 : IKE<2.2.2.2> xauth_cleanup() ## 2016-05-21 20:15:03 : IKE<2.2.2.2> Done cleaning up IKE Phase 1 SA ## 2016-05-21 20:15:03 : peer_identity_unregister_p1_sa. ## 2016-05-21 20:15:03 : IKE<0.0.0.0 > delete peer identity 0x69910bc ## 2016-05-21 20:15:03 : IKE<0.0.0.0 > peer_identity_remove_from_peer: num entry before remove <4> ## 2016-05-21 20:15:03 : peer_idt.c peer_identity_unregister_p1_sa 686: pidt deleted. ## 2016-05-21 20:15:03 : IKE<2.2.2.2> nhtb_list_update_status: vpn Dallas_VPN ## 2016-05-21 20:15:03 : IKE<2.2.2.2> ** link ready return 8 ## 2016-05-21 20:15:03 : IKE<2.2.2.2> sa_link_status_for_tunl_ifp: saidx 1, preliminary status 8 ## 2016-05-21 20:15:03 : IKE<2.2.2.2> local_if is bgroup0/0 ## 2016-05-21 20:15:04 : IKE<2.2.2.2> re-trans timer expired, msg retry (3) (80120f/2) ## 2016-05-21 20:15:04 : IKE<2.2.2.2> Responder sending IPv4 IP 2.2.2.2/port 500 ## 2016-05-21 20:15:04 : IKE<2.2.2.2> Send Phase 1 packet (len=196) ## 2016-05-21 20:15:04 : IKE<0.0.0.0 > Construct [DELETE] for IPSec ## 2016-05-21 20:15:04 : IKE<0.0.0.0 > ipsec del payload constructed, protocol=3, spi=9a585b20 ## 2016-05-21 20:15:04 : IKE<0.0.0.0 > spi hash node removed: type<2>,spi<9a585b20>,ip<199.188.209.36> ## 2016-05-21 20:15:06 : IKE<2.2.2.2> re-trans timer expired, msg retry (11) (80120f/2) ## 2016-05-21 20:15:06 : IKE<2.2.2.2> Phase 1: Retransmission limit has been reached. ## 2016-05-21 20:15:07 : IKE<2.2.2.2> ike packet, len 120, action 0 ## 2016-05-21 20:15:07 : IKE<2.2.2.2> Catcher: received 92 bytes from socket. ## 2016-05-21 20:15:07 : IKE<2.2.2.2> ****** Recv packet if of vsys ****** ## 2016-05-21 20:15:07 : IKE<2.2.2.2> Catcher: get 92 bytes. src port 500 ## 2016-05-21 20:15:07 : IKE<0.0.0.0 > ISAKMP msg: len 92, nxp 5[ID], exch 2[MM], flag 01 E ## 2016-05-21 20:15:07 : IKE<2.2.2.2> Receive re-transmit IKE packet phase 1 SA(2.2.2.2) exchg(2) len(92) ## 2016-05-21 20:15:08 : IKE<2.2.2.2> re-trans timer expired, msg retry (4) (80120f/2) ## 2016-05-21 20:15:08 : IKE<2.2.2.2> Responder sending IPv4 IP 2.2.2.2/port 500 ## 2016-05-21 20:15:08 : IKE<2.2.2.2> Send Phase 1 packet (len=196) ## 2016-05-21 20:15:12 : IKE<2.2.2.2> re-trans timer expired, msg retry (5) (80120f/2) ## 2016-05-21 20:15:12 : IKE<2.2.2.2> Responder sending IPv4 IP 2.2.2.2/port 500 ## 2016-05-21 20:15:12 : IKE<2.2.2.2> Send Phase 1 packet (len=196) ## 2016-05-21 20:15:12 : getProfileFromP1Proposal-> ## 2016-05-21 20:15:12 : find profile[0]=<00000005 00000002 00000001 00000002> for p1 proposal (id 5), xauth(0) ## 2016-05-21 20:15:12 : init p1sa, pidt = 0x0 ## 2016-05-21 20:15:12 : change peer identity for p1 sa, pidt = 0x0 ## 2016-05-21 20:15:12 : IKE<0.0.0.0 > peer_identity_create_with_uid: uid<0> ## 2016-05-21 20:15:12 : IKE<0.0.0.0 > create peer identity 0x698fb1c ## 2016-05-21 20:15:12 : IKE<0.0.0.0 > peer_identity_add_to_peer: num entry before add <1> ## 2016-05-21 20:15:12 : IKE<0.0.0.0 > peer_identity_add_to_peer: num entry after add <2> ## 2016-05-21 20:15:12 : peer identity 698fb1c created. ## 2016-05-21 20:15:12 : IKE<0.0.0.0 > EDIPI disabled ## 2016-05-21 20:15:12 : IKE<0.0.0.0 > set_phase1_transform, dh_group(2). ## 2016-05-21 20:15:12 : IKE<2.2.2.2> nhtb_list_update_status: vpn Dallas_VPN ## 2016-05-21 20:15:12 : IKE<2.2.2.2> ** link ready return 8 ## 2016-05-21 20:15:12 : IKE<2.2.2.2> sa_link_status_for_tunl_ifp: saidx 1, preliminary status 8 ## 2016-05-21 20:15:12 : IKE<2.2.2.2> local_if is bgroup0/0