New 16

Download as txt, pdf, or txt
Download as txt, pdf, or txt
You are on page 1of 6

tional Information:

Forward Flow based lookup yields rule:


out id=0x5588ee6910, priority=70, domain=encrypt, deny=false
hits=24, user_data=0x0, cs_id=0x55a1897f40, reverse, flags=0x0, protocol=6
src ip/id=10.128.196.3, mask=255.255.255.255, port=0, tag=any
dst ip/id=10.27.107.91, mask=255.255.255.255, port=3306, tag=any, dscp=0x0,
nsg_id=none
input_ifc=any, output_ifc=Outside

Result:
input-interface: Inside
input-status: up
input-line-status: up
output-interface: Outside
output-status: up
output-line-status: up
Action: drop
Drop-reason: (acl-drop) Flow is denied by configured rule, Drop-location: frame
0x000000aaaceea698 flow (NA)/NA

APSGP-FRP-ASA-VPN-01/pri/act#
APSGP-FRP-ASA-VPN-01/pri/act#
APSGP-FRP-ASA-VPN-01/pri/act#
APSGP-FRP-ASA-VPN-01/pri/act#
APSGP-FRP-ASA-VPN-01/pri/act#
APSGP-FRP-ASA-VPN-01/pri/act#
APSGP-FRP-ASA-VPN-01/pri/act#
APSGP-FRP-ASA-VPN-01/pri/act#
APSGP-FRP-ASA-VPN-01/pri/act#
APSGP-FRP-ASA-VPN-01/pri/act#
APSGP-FRP-ASA-VPN-01/pri/act# sh run cry map
crypto map outsidemap 1 match address armor-cracl-grps
crypto map outsidemap 1 set pfs group5
crypto map outsidemap 1 set peer armor-peer armor-peer2
crypto map outsidemap 1 set ikev2 ipsec-proposal Armor_VPN
crypto map outsidemap 1 set security-association lifetime seconds 28800
crypto map outsidemap 2 match address SAMPOERNA_BANK_ACL
crypto map outsidemap 2 set pfs
crypto map outsidemap 2 set peer 139.255.58.254
crypto map outsidemap 2 set ikev2 ipsec-proposal SAMPOERNA_BANK
crypto map outsidemap 2 set security-association lifetime seconds 3600
crypto map outsidemap 3 match address ACL-EBAO-UAT
crypto map outsidemap 3 set peer 18.163.142.162
crypto map outsidemap 3 set ikev2 ipsec-proposal HK_EBAO_UAT
crypto map outsidemap 3 set security-association lifetime seconds 3600
crypto map outsidemap 4 match address ACL-EBAO-PROD
crypto map outsidemap 4 set peer 18.166.118.145
crypto map outsidemap 4 set ikev2 ipsec-proposal HK_EBAO_PROD
crypto map outsidemap 4 set security-association lifetime seconds 3600
crypto map outsidemap interface Outside
APSGP-FRP-ASA-VPN-01/pri/act#
APSGP-FRP-ASA-VPN-01/pri/act#
APSGP-FRP-ASA-VPN-01/pri/act#
APSGP-FRP-ASA-VPN-01/pri/act#
APSGP-FRP-ASA-VPN-01/pri/act# debu
APSGP-FRP-ASA-VPN-01/pri/act# debug cry
APSGP-FRP-ASA-VPN-01/pri/act# debug crypto con
APSGP-FRP-ASA-VPN-01/pri/act# debug crypto condition pe
APSGP-FRP-ASA-VPN-01/pri/act# debug crypto condition peer 18.166.118.145
APSGP-FRP-ASA-VPN-01/pri/act# debug crypto ikev2 platform 128
APSGP-FRP-ASA-VPN-01/pri/act# debug crypto ikev2 protocol 128
APSGP-FRP-ASA-VPN-01/pri/act#
APSGP-FRP-ASA-VPN-01/pri/act#
APSGP-FRP-ASA-VPN-01/pri/act#
APSGP-FRP-ASA-VPN-01/pri/act#
APSGP-FRP-ASA-VPN-01/pri/act#
APSGP-FRP-ASA-VPN-01/pri/act#
APSGP-FRP-ASA-VPN-01/pri/act#
APSGP-FRP-ASA-VPN-01/pri/act#
APSGP-FRP-ASA-VPN-01/pri/act# IKEv2-PROTO-7: (2986): Request has mess_id 30;
expected 30 through 30

(2986):
IKEv2-PROTO-4: (2986): Received Packet [From 18.166.118.145:4500/To
103.98.132.6:4500/VRF i0:f0]
(2986): Initiator SPI : 35695B2C438F572D - Responder SPI : 774241973444F29D Message
id: 30
(2986): IKEv2 INFORMATIONAL Exchange REQUESTIKEv2-PROTO-5: (2986): Next payload:
ENCR, version: 2.0 (2986): Exchange type: INFORMATIONAL, flags: INITIATOR (2986):
Message id: 30, length: 80(2986):
Payload contents:
IKEv2-PLAT-4: (2986): Decrypt success status returned via ipc 1
(2986):
(2986): Decrypted packet:(2986): Data: 80 bytes
(2986): REAL Decrypted packet:(2986): Data: 0 bytes
IKEv2-PROTO-7: (2986): SM Trace-> SA: I_SPI=35695B2C438F572D R_SPI=774241973444F29D
(R) MsgID = 0000001E CurState: READY Event: EV_RECV_INFO_REQ
IKEv2-PROTO-7: (2986): Action: Action_Null
IKEv2-PROTO-7: (2986): SM Trace-> SA: I_SPI=35695B2C438F572D R_SPI=774241973444F29D
(R) MsgID = 0000001E CurState: INFO_R Event: EV_RECV_INFO_REQ
IKEv2-PROTO-4: (2986): Received DPD/liveness query
IKEv2-PROTO-4: (2986): Building packet for encryption.
IKEv2-PROTO-4: (2986): Sending ACK to informational exchange
IKEv2-PROTO-7: (2986): SM Trace-> SA: I_SPI=35695B2C438F572D R_SPI=774241973444F29D
(R) MsgID = 0000001E CurState: INFO_R Event: EV_ENCRYPT_MSG
IKEv2-PLAT-4: (2986): Encrypt success status returned via ipc 1
IKEv2-PROTO-7: (2986): SM Trace-> SA: I_SPI=35695B2C438F572D R_SPI=774241973444F29D
(R) MsgID = 0000001E CurState: INFO_R Event: EV_NO_EVENT
IKEv2-PROTO-7: (2986): Locked SA.Event EV_FREE_NEG queued in the state EXIT
IKEv2-PROTO-7: (2986): SM Trace-> SA: I_SPI=35695B2C438F572D R_SPI=774241973444F29D
(R) MsgID = 0000001E CurState: INFO_R Event: EV_OK_ENCRYPT_RESP
IKEv2-PROTO-7: (2986): Action: Action_Null
IKEv2-PROTO-7: (2986): SM Trace-> SA: I_SPI=35695B2C438F572D R_SPI=774241973444F29D
(R) MsgID = 0000001E CurState: INFO_R Event: EV_TRYSEND
(2986):
IKEv2-PROTO-4: (2986): Sending Packet [To 18.166.118.145:4500/From
103.98.132.6:4500/VRF i0:f0]
(2986): Initiator SPI : 35695B2C438F572D - Responder SPI : 774241973444F29D Message
id: 30
(2986): IKEv2 INFORMATIONAL Exchange RESPONSEIKEv2-PROTO-5: (2986): Next payload:
ENCR, version: 2.0 (2986): Exchange type: INFORMATIONAL, flags: RESPONDER MSG-
RESPONSE (2986): Message id: 30, length: 80(2986):
Payload contents:
sh(2986): ENCR(2986): Next payload: NONE, reserved: 0x0, length: 52
(2986): Encrypted data: 48 bytes
(2986):
IKEv2-PLAT-5: (2986): SENT PKT [INFORMATIONAL] [Chubb-Peer]:4500-
>[18.166.118.145]:4500 InitSPI=0x35695b2c438f572d RespSPI=0x774241973444f29d
MID=0000001e
IKEv2-PROTO-7: (2986): SM Trace-> SA: I_SPI=35695B2C438F572D R_SPI=774241973444F29D
(R) MsgID = 0000001E CurState: INFO_R Event: EV_CHK_INFO_TYPE
IKEv2-PROTO-7: (2986): SM Trace-> SA: I_SPI=35695B2C438F572D R_SPI=774241973444F29D
(R) MsgID = 0000001E CurState: INFO_R Event: EV_START_DEL_NEG_TMR
IKEv2-PROTO-7: (2986): Action: Action_Null
IKEv2-PROTO-7: (2986): SM Trace-> SA: I_SPI=35695B2C438F572D R_SPI=774241973444F29D
(R) MsgID = 0000001E CurState: EXIT Event: EV_CHK_PENDING
IKEv2-PROTO-7: (2986): Sent response with message id 30, Requests can be accepted
from range 31 to 31
IKEv2-PROTO-7: (2986): SM Trace-> SA: I_SPI=35695B2C438F572D R_SPI=774241973444F29D
(R) MsgID = 0000001E CurState: EXIT Event: EV_NO_EVENT
IKEv2-PROTO-7: (2986): SM Trace-> SA: I_SPI=35695B2C438F572D R_SPI=774241973444F29D
(R) MsgID = 0000001D CurState: EXIT Event: EV_FREE_NEG
IKEv2-PROTO-7: (2986): Deleting negotiation context for peer message ID: 0x1d
his

APSGP-FRP-ASA-VPN-01/pri/act#
APSGP-FRP-ASA-VPN-01/pri/act#
APSGP-FRP-ASA-VPN-01/pri/act#
APSGP-FRP-ASA-VPN-01/pri/act#
APSGP-FRP-ASA-VPN-01/pri/act#
APSGP-FRP-ASA-VPN-01/pri/act#
APSGP-FRP-ASA-VPN-01/pri/act#
APSGP-FRP-ASA-VPN-01/pri/act#
APSGP-FRP-ASA-VPN-01/pri/act# IKEv2-PROTO-7: (2986): Request has mess_id 31;
expected 31 through 31

(2986):
IKEv2-PROTO-4: (2986): Received Packet [From 18.166.118.145:4500/To
103.98.132.6:4500/VRF i0:f0]
(2986): Initiator SPI : 35695B2C438F572D - Responder SPI : 774241973444F29D Message
id: 31
(2986): IKEv2 INFORMATIONAL Exchange REQUESTIKEv2-PROTO-5: (2986): Next payload:
ENCR, version: 2.0 (2986): Exchange type: INFORMATIONAL, flags: INITIATOR (2986):
Message id: 31, length: 80(2986):
Payload contents:
IKEv2-PLAT-4: (2986): Decrypt success status returned via ipc 1
(2986):
(2986): Decrypted packet:(2986): Data: 80 bytes
(2986): REAL Decrypted packet:(2986): Data: 0 bytes
IKEv2-PROTO-7: (2986): SM Trace-> SA: I_SPI=35695B2C438F572D R_SPI=774241973444F29D
(R) MsgID = 0000001F CurState: READY Event: EV_RECV_INFO_REQ
IKEv2-PROTO-7: (2986): Action: Action_Null
IKEv2-PROTO-7: (2986): SM Trace-> SA: I_SPI=35695B2C438F572D R_SPI=774241973444F29D
(R) MsgID = 0000001F CurState: INFO_R Event: EV_RECV_INFO_REQ
IKEv2-PROTO-4: (2986): Received DPD/liveness query
IKEv2-PROTO-4: (2986): Building packet for encryption.
IKEv2-PROTO-4: (2986): Sending ACK to informational exchange
IKEv2-PROTO-7: (2986): SM Trace-> SA: I_SPI=35695B2C438F572D R_SPI=774241973444F29D
(R) MsgID = 0000001F CurState: INFO_R Event: EV_ENCRYPT_MSG
IKEv2-PLAT-4: (2986): Encrypt success status returned via ipc 1
IKEv2-PROTO-7: (2986): SM Trace-> SA: I_SPI=35695B2C438F572D R_SPI=774241973444F29D
(R) MsgID = 0000001F CurState: INFO_R Event: EV_NO_EVENT
IKEv2-PROTO-7: (2986): Locked SA.Event EV_FREE_NEG queued in the state EXIT
IKEv2-PROTO-7: (2986): SM Trace-> SA: I_SPI=35695B2C438F572D R_SPI=774241973444F29D
(R) MsgID = 0000001F CurState: INFO_R Event: EV_OK_ENCRYPT_RESP
IKEv2-PROTO-7: (2986): Action: Action_Null
IKEv2-PROTO-7: (2986): SM Trace-> SA: I_SPI=35695B2C438F572D R_SPI=774241973444F29D
(R) MsgID = 0000001F CurState: INFO_R Event: EV_TRYSEND
(2986):
IKEv2-PROTO-4: (2986): Sending Packet [To 18.166.118.145:4500/From
103.98.132.6:4500/VRF i0:f0]
(2986): Initiator SPI : 35695B2C438F572D - Responder SPI : 774241973444F29D Message
id: 31
(2986): IKEv2 INFORMATIONAL Exchange RESPONSEIKEv2-PROTO-5: (2986): Next payload:
ENCR, version: 2.0 (2986): Exchange type: INFORMATIONAL, flags: RESPONDER MSG-
RESPONSE (2986): Message id: 31, length: 80(2986):
Payload contents:
(2986): ENCR(2986): Next payload: NONE, reserved: 0x0, length: 52
(2986): Encrypted data: 48 bytes
(2986):
IKEv2-PLAT-5: (2986): SENT PKT [INFORMATIONAL] [Chubb-Peer]:4500-
>[18.166.118.145]:4500 InitSPI=0x35695b2c438f572d RespSPI=0x774241973444f29d
MID=0000001f
IKEv2-PROTO-7: (2986): SM Trace-> SA: I_SPI=35695B2C438F572D R_SPI=774241973444F29D
(R) MsgID = 0000001F CurState: INFO_R Event: EV_CHK_INFO_TYPE
IKEv2-PROTO-7: (2986): SM Trace-> SA: I_SPI=35695B2C438F572D R_SPI=774241973444F29D
(R) MsgID = 0000001F CurState: INFO_R Event: EV_START_DEL_NEG_TMR
IKEv2-PROTO-7: (2986): Action: Action_Null
IKEv2-PROTO-7: (2986): SM Trace-> SA: I_SPI=35695B2C438F572D R_SPI=774241973444F29D
(R) MsgID = 0000001F CurState: EXIT Event: EV_CHK_PENDING
IKEv2-PROTO-7: (2986): Sent response with message id 31, Requests can be accepted
from range 32 to 32
IKEv2-PROTO-7: (2986): SM Trace-> SA: I_SPI=35695B2C438F572D R_SPI=774241973444F29D
(R) MsgID = 0000001F CurState: EXIT Event: EV_NO_EVENT
IKEv2-PROTO-7: (2986): SM Trace-> SA: I_SPI=35695B2C438F572D R_SPI=774241973444F29D
(R) MsgID = 0000001E CurState: EXIT Event: EV_FREE_NEG
IKEv2-PROTO-7: (2986): Deleting negotiation context for peer message ID: 0x1e
IKEv2-PROTO-7: (2986): Request has mess_id 32; expected 32 through 32

(2986):
IKEv2-PROTO-4: (2986): Received Packet [From 18.166.118.145:4500/To
103.98.132.6:4500/VRF i0:f0]
(2986): Initiator SPI : 35695B2C438F572D - Responder SPI : 774241973444F29D Message
id: 32
(2986): IKEv2 INFORMATIONAL Exchange REQUESTIKEv2-PROTO-5: (2986): Next payload:
ENCR, version: 2.0 (2986): Exchange type: INFORMATIONAL, flags: INITIATOR (2986):
Message id: 32, length: 80(2986):
Payload contents:
IKEv2-PLAT-4: (2986): Decrypt success status returned via ipc 1
(2986):
(2986): Decrypted packet:(2986): Data: 80 bytes
(2986): REAL Decrypted packet:(2986): Data: 0 bytes
IKEv2-PROTO-7: (2986): SM Trace-> SA: I_SPI=35695B2C438F572D R_SPI=774241973444F29D
(R) MsgID = 00000020 CurState: READY Event: EV_RECV_INFO_REQ
IKEv2-PROTO-7: (2986): Action: Action_Null
IKEv2-PROTO-7: (2986): SM Trace-> SA: I_SPI=35695B2C438F572D R_SPI=774241973444F29D
(R) MsgID = 00000020 CurState: INFO_R Event: EV_RECV_INFO_REQ
IKEv2-PROTO-4: (2986): Received DPD/liveness query
IKEv2-PROTO-4: (2986): Building packet for encryption.
IKEv2-PROTO-4: (2986): Sending ACK to informational exchange
IKEv2-PROTO-7: (2986): SM Trace-> SA: I_SPI=35695B2C438F572D R_SPI=774241973444F29D
(R) MsgID = 00000020 CurState: INFO_R Event: EV_ENCRYPT_MSG
IKEv2-PLAT-4: (2986): Encrypt success status returned via ipc 1
IKEv2-PROTO-7: (2986): SM Trace-> SA: I_SPI=35695B2C438F572D R_SPI=774241973444F29D
(R) MsgID = 00000020 CurState: INFO_R Event: EV_NO_EVENT
IKEv2-PROTO-7: (2986): Locked SA.Event EV_FREE_NEG queued in the state EXIT
IKEv2-PROTO-7: (2986): SM Trace-> SA: I_SPI=35695B2C438F572D R_SPI=774241973444F29D
(R) MsgID = 00000020 CurState: INFO_R Event: EV_OK_ENCRYPT_RESP
IKEv2-PROTO-7: (2986): Action: Action_Null
IKEv2-PROTO-7: (2986): SM Trace-> SA: I_SPI=35695B2C438F572D R_SPI=774241973444F29D
(R) MsgID = 00000020 CurState: INFO_R Event: EV_TRYSEND
(2986):
IKEv2-PROTO-4: (2986): Sending Packet [To 18.166.118.145:4500/From
103.98.132.6:4500/VRF i0:f0]
(2986): Initiator SPI : 35695B2C438F572D - Responder SPI : 774241973444F29D Message
id: 32
(2986): IKEv2 INFORMATIONAL Exchange RESPONSEIKEv2-PROTO-5: (2986): Next payload:
ENCR, version: 2.0 (2986): Exchange type: INFORMATIONAL, flags: RESPONDER MSG-
RESPONSE (2986): Message id: 32, length: 80(2986):
Payload contents:
(2986): ENCR(2986): Next payload: NONE, reserved: 0x0, length: 52
(2986): Encrypted data: 48 bytes
(2986):
IKEv2-PLAT-5: (2986): SENT PKT [INFORMATIONAL] [Chubb-Peer]:4500-
>[18.166.118.145]:4500 InitSPI=0x35695b2c438f572d RespSPI=0x774241973444f29d
MID=00000020
IKEv2-PROTO-7: (2986): SM Trace-> SA: I_SPI=35695B2C438F572D R_SPI=774241973444F29D
(R) MsgID = 00000020 CurState: INFO_R Event: EV_CHK_INFO_TYPE
IKEv2-PROTO-7: (2986): SM Trace-> SA: I_SPI=35695B2C438F572D R_SPI=774241973444F29D
(R) MsgID = 00000020 CurState: INFO_R Event: EV_START_DEL_NEG_TMR
IKEv2-PROTO-7: (2986): Action: Action_Null
IKEv2-PROTO-7: (2986): SM Trace-> SA: I_SPI=35695B2C438F572D R_SPI=774241973444F29D
(R) MsgID = 00000020 CurState: EXIT Event: EV_CHK_PENDING
IKEv2-PROTO-7: (2986): Sent response with message id 32, Requests can be accepted
from range 33 to 33
IKEv2-PROTO-7: (2986): SM Trace-> SA: I_SPI=35695B2C438F572D R_SPI=774241973444F29D
(R) MsgID = 00000020 CurState: EXIT Event: EV_NO_EVENT
IKEv2-PROTO-7: (2986): SM Trace-> SA: I_SPI=35695B2C438F572D R_SPI=774241973444F29D
(R) MsgID = 0000001F CurState: EXIT Event: EV_FREE_NEG
IKEv2-PROTO-7: (2986): Deleting negotiation context for peer message ID: 0x1f
IKEv2-PROTO-7: (2986): Request has mess_id 33; expected 33 through 33

(2986):
IKEv2-PROTO-4: (2986): Received Packet [From 18.166.118.145:4500/To
103.98.132.6:4500/VRF i0:f0]
(2986): Initiator SPI : 35695B2C438F572D - Responder SPI : 774241973444F29D Message
id: 33
(2986): IKEv2 INFORMATIONAL Exchange REQUESTIKEv2-PROTO-5: (2986): Next payload:
ENCR, version: 2.0 (2986): Exchange type: INFORMATIONAL, flags: INITIATOR (2986):
Message id: 33, length: 80(2986):
Payload contents:
IKEv2-PLAT-4: (2986): Decrypt success status returned via ipc 1
(2986):
(2986): Decrypted packet:(2986): Data: 80 bytes
(2986): REAL Decrypted packet:(2986): Data: 0 bytes
IKEv2-PROTO-7: (2986): SM Trace-> SA: I_SPI=35695B2C438F572D R_SPI=774241973444F29D
(R) MsgID = 00000021 CurState: READY Event: EV_RECV_INFO_REQ
IKEv2-PROTO-7: (2986): Action: Action_Null
IKEv2-PROTO-7: (2986): SM Trace-> SA: I_SPI=35695B2C438F572D R_SPI=774241973444F29D
(R) MsgID = 00000021 CurState: INFO_R Event: EV_RECV_INFO_REQ
IKEv2-PROTO-4: (2986): Received DPD/liveness query
IKEv2-PROTO-4: (2986): Building packet for encryption.
IKEv2-PROTO-4: (2986): Sending ACK to informational exchange
IKEv2-PROTO-7: (2986): SM Trace-> SA: I_SPI=35695B2C438F572D R_SPI=774241973444F29D
(R) MsgID = 00000021 CurState: INFO_R Event: EV_ENCRYPT_MSG
IKEv2-PLAT-4: (2986): Encrypt success status returned via ipc 1
IKEv2-PROTO-7: (2986): SM Trace-> SA: I_SPI=35695B2C438F572D R_SPI=774241973444F29D
(R) MsgID = 00000021 CurState: INFO_R Event: EV_NO_EVENT
IKEv2-PROTO-7: (2986): Locked SA.Event EV_FREE_NEG queued in the state EXIT
IKEv2-PROTO-7: (2986): SM Trace-> SA: I_SPI=35695B2C438F572D R_SPI=774241973444F29D
(R) MsgID = 00000021 CurState: INFO_R Event: EV_OK_ENCRYPT_RESP
IKEv2-PROTO-7: (2986): Action: Action_Null
IKEv2-PROTO-7: (2986): SM Trace-> SA: I_SPI=35695B2C438F572D R_SPI=774241973444F29D
(R) MsgID = 00000021 CurState: INFO_R Event: EV_TRYSEND
(2986):
IKEv2-PROTO-4: (2986): Sending Packet [To 18.166.118.145:4500/From
103.98.132.6:4500/VRF i0:f0]
(2986): Initiator SPI : 35695B2C438F572D - Responder SPI : 774241973444F29D Message
id: 33
(2986): IKEv2 INFORMATIONAL Exchange RESPONSEIKEv2-PROTO-5: (2986): Next payload:
ENCR, version: 2.0 (2986): Exchange type: INFORMATIONAL, flags: RESPONDER MSG-
RESPONSE (2986): Message id: 33, length: 80(2986):
Payload contents:
(2986): ENCR(2986): Next payload: NONE, reserved: 0x0, length: 52
(2986): Encrypted data: 48 bytes
(2986):
IKEv2-PLAT-5: (2986): SENT PKT [INFORMATIONAL] [Chubb-Peer]:4500-
>[18.166.118.145]:4500 InitSPI=0x35695b2c438f572d RespSPI=0x774241973444f29d
MID=00000021
IKEv2-PROTO-7: (2986): SM Trace-> SA: I_SPI=35695B2C438F572D R_SPI=774241973444F29D
(R) MsgID = 00000021 CurState: INFO_R Event: EV_CHK_INFO_TYPE
IKEv2-PROTO-7: (2986): SM Trace-> SA: I_SPI=35695B2C438F572D R_SPI=774241973444F29D
(R) MsgID = 00000021 CurState: INFO_R Event: EV_START_DEL_NEG_TMR
IKEv2-PROTO-7: (2986): Action: Action_Null
IKEv2-PROTO-7: (2986): SM Trace-> SA: I_SPI=35695B2C438F572D R_SPI=774241973444F29D
(R) MsgID = 00000021 CurState: EXIT Event: EV_CHK_PENDING
IKEv2-PROTO-7: (2986): Sent response with message id 33, Requests can be accepted
from range 34 to 34
IKEv2-PROTO-7: (2986): SM Trace-> SA: I_SPI=35695B2C438F572D R_SPI=774241973444F29D
(R) MsgID = 00000021 CurState: EXIT Event: EV_NO_EVENT
IKEv2-PROTO-7: (2986): SM Trace-> SA: I_SPI=35695B2C438F572D R_SPI=774241973444F29D
(R) MsgID = 00000020 CurState: EXIT Event: EV_FREE_NEG
IKEv2-PROTO-7: (2986): Deleting negotiation context for peer message ID: 0x20

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy