New 16
New 16
New 16
Result:
input-interface: Inside
input-status: up
input-line-status: up
output-interface: Outside
output-status: up
output-line-status: up
Action: drop
Drop-reason: (acl-drop) Flow is denied by configured rule, Drop-location: frame
0x000000aaaceea698 flow (NA)/NA
APSGP-FRP-ASA-VPN-01/pri/act#
APSGP-FRP-ASA-VPN-01/pri/act#
APSGP-FRP-ASA-VPN-01/pri/act#
APSGP-FRP-ASA-VPN-01/pri/act#
APSGP-FRP-ASA-VPN-01/pri/act#
APSGP-FRP-ASA-VPN-01/pri/act#
APSGP-FRP-ASA-VPN-01/pri/act#
APSGP-FRP-ASA-VPN-01/pri/act#
APSGP-FRP-ASA-VPN-01/pri/act#
APSGP-FRP-ASA-VPN-01/pri/act#
APSGP-FRP-ASA-VPN-01/pri/act# sh run cry map
crypto map outsidemap 1 match address armor-cracl-grps
crypto map outsidemap 1 set pfs group5
crypto map outsidemap 1 set peer armor-peer armor-peer2
crypto map outsidemap 1 set ikev2 ipsec-proposal Armor_VPN
crypto map outsidemap 1 set security-association lifetime seconds 28800
crypto map outsidemap 2 match address SAMPOERNA_BANK_ACL
crypto map outsidemap 2 set pfs
crypto map outsidemap 2 set peer 139.255.58.254
crypto map outsidemap 2 set ikev2 ipsec-proposal SAMPOERNA_BANK
crypto map outsidemap 2 set security-association lifetime seconds 3600
crypto map outsidemap 3 match address ACL-EBAO-UAT
crypto map outsidemap 3 set peer 18.163.142.162
crypto map outsidemap 3 set ikev2 ipsec-proposal HK_EBAO_UAT
crypto map outsidemap 3 set security-association lifetime seconds 3600
crypto map outsidemap 4 match address ACL-EBAO-PROD
crypto map outsidemap 4 set peer 18.166.118.145
crypto map outsidemap 4 set ikev2 ipsec-proposal HK_EBAO_PROD
crypto map outsidemap 4 set security-association lifetime seconds 3600
crypto map outsidemap interface Outside
APSGP-FRP-ASA-VPN-01/pri/act#
APSGP-FRP-ASA-VPN-01/pri/act#
APSGP-FRP-ASA-VPN-01/pri/act#
APSGP-FRP-ASA-VPN-01/pri/act#
APSGP-FRP-ASA-VPN-01/pri/act# debu
APSGP-FRP-ASA-VPN-01/pri/act# debug cry
APSGP-FRP-ASA-VPN-01/pri/act# debug crypto con
APSGP-FRP-ASA-VPN-01/pri/act# debug crypto condition pe
APSGP-FRP-ASA-VPN-01/pri/act# debug crypto condition peer 18.166.118.145
APSGP-FRP-ASA-VPN-01/pri/act# debug crypto ikev2 platform 128
APSGP-FRP-ASA-VPN-01/pri/act# debug crypto ikev2 protocol 128
APSGP-FRP-ASA-VPN-01/pri/act#
APSGP-FRP-ASA-VPN-01/pri/act#
APSGP-FRP-ASA-VPN-01/pri/act#
APSGP-FRP-ASA-VPN-01/pri/act#
APSGP-FRP-ASA-VPN-01/pri/act#
APSGP-FRP-ASA-VPN-01/pri/act#
APSGP-FRP-ASA-VPN-01/pri/act#
APSGP-FRP-ASA-VPN-01/pri/act#
APSGP-FRP-ASA-VPN-01/pri/act# IKEv2-PROTO-7: (2986): Request has mess_id 30;
expected 30 through 30
(2986):
IKEv2-PROTO-4: (2986): Received Packet [From 18.166.118.145:4500/To
103.98.132.6:4500/VRF i0:f0]
(2986): Initiator SPI : 35695B2C438F572D - Responder SPI : 774241973444F29D Message
id: 30
(2986): IKEv2 INFORMATIONAL Exchange REQUESTIKEv2-PROTO-5: (2986): Next payload:
ENCR, version: 2.0 (2986): Exchange type: INFORMATIONAL, flags: INITIATOR (2986):
Message id: 30, length: 80(2986):
Payload contents:
IKEv2-PLAT-4: (2986): Decrypt success status returned via ipc 1
(2986):
(2986): Decrypted packet:(2986): Data: 80 bytes
(2986): REAL Decrypted packet:(2986): Data: 0 bytes
IKEv2-PROTO-7: (2986): SM Trace-> SA: I_SPI=35695B2C438F572D R_SPI=774241973444F29D
(R) MsgID = 0000001E CurState: READY Event: EV_RECV_INFO_REQ
IKEv2-PROTO-7: (2986): Action: Action_Null
IKEv2-PROTO-7: (2986): SM Trace-> SA: I_SPI=35695B2C438F572D R_SPI=774241973444F29D
(R) MsgID = 0000001E CurState: INFO_R Event: EV_RECV_INFO_REQ
IKEv2-PROTO-4: (2986): Received DPD/liveness query
IKEv2-PROTO-4: (2986): Building packet for encryption.
IKEv2-PROTO-4: (2986): Sending ACK to informational exchange
IKEv2-PROTO-7: (2986): SM Trace-> SA: I_SPI=35695B2C438F572D R_SPI=774241973444F29D
(R) MsgID = 0000001E CurState: INFO_R Event: EV_ENCRYPT_MSG
IKEv2-PLAT-4: (2986): Encrypt success status returned via ipc 1
IKEv2-PROTO-7: (2986): SM Trace-> SA: I_SPI=35695B2C438F572D R_SPI=774241973444F29D
(R) MsgID = 0000001E CurState: INFO_R Event: EV_NO_EVENT
IKEv2-PROTO-7: (2986): Locked SA.Event EV_FREE_NEG queued in the state EXIT
IKEv2-PROTO-7: (2986): SM Trace-> SA: I_SPI=35695B2C438F572D R_SPI=774241973444F29D
(R) MsgID = 0000001E CurState: INFO_R Event: EV_OK_ENCRYPT_RESP
IKEv2-PROTO-7: (2986): Action: Action_Null
IKEv2-PROTO-7: (2986): SM Trace-> SA: I_SPI=35695B2C438F572D R_SPI=774241973444F29D
(R) MsgID = 0000001E CurState: INFO_R Event: EV_TRYSEND
(2986):
IKEv2-PROTO-4: (2986): Sending Packet [To 18.166.118.145:4500/From
103.98.132.6:4500/VRF i0:f0]
(2986): Initiator SPI : 35695B2C438F572D - Responder SPI : 774241973444F29D Message
id: 30
(2986): IKEv2 INFORMATIONAL Exchange RESPONSEIKEv2-PROTO-5: (2986): Next payload:
ENCR, version: 2.0 (2986): Exchange type: INFORMATIONAL, flags: RESPONDER MSG-
RESPONSE (2986): Message id: 30, length: 80(2986):
Payload contents:
sh(2986): ENCR(2986): Next payload: NONE, reserved: 0x0, length: 52
(2986): Encrypted data: 48 bytes
(2986):
IKEv2-PLAT-5: (2986): SENT PKT [INFORMATIONAL] [Chubb-Peer]:4500-
>[18.166.118.145]:4500 InitSPI=0x35695b2c438f572d RespSPI=0x774241973444f29d
MID=0000001e
IKEv2-PROTO-7: (2986): SM Trace-> SA: I_SPI=35695B2C438F572D R_SPI=774241973444F29D
(R) MsgID = 0000001E CurState: INFO_R Event: EV_CHK_INFO_TYPE
IKEv2-PROTO-7: (2986): SM Trace-> SA: I_SPI=35695B2C438F572D R_SPI=774241973444F29D
(R) MsgID = 0000001E CurState: INFO_R Event: EV_START_DEL_NEG_TMR
IKEv2-PROTO-7: (2986): Action: Action_Null
IKEv2-PROTO-7: (2986): SM Trace-> SA: I_SPI=35695B2C438F572D R_SPI=774241973444F29D
(R) MsgID = 0000001E CurState: EXIT Event: EV_CHK_PENDING
IKEv2-PROTO-7: (2986): Sent response with message id 30, Requests can be accepted
from range 31 to 31
IKEv2-PROTO-7: (2986): SM Trace-> SA: I_SPI=35695B2C438F572D R_SPI=774241973444F29D
(R) MsgID = 0000001E CurState: EXIT Event: EV_NO_EVENT
IKEv2-PROTO-7: (2986): SM Trace-> SA: I_SPI=35695B2C438F572D R_SPI=774241973444F29D
(R) MsgID = 0000001D CurState: EXIT Event: EV_FREE_NEG
IKEv2-PROTO-7: (2986): Deleting negotiation context for peer message ID: 0x1d
his
APSGP-FRP-ASA-VPN-01/pri/act#
APSGP-FRP-ASA-VPN-01/pri/act#
APSGP-FRP-ASA-VPN-01/pri/act#
APSGP-FRP-ASA-VPN-01/pri/act#
APSGP-FRP-ASA-VPN-01/pri/act#
APSGP-FRP-ASA-VPN-01/pri/act#
APSGP-FRP-ASA-VPN-01/pri/act#
APSGP-FRP-ASA-VPN-01/pri/act#
APSGP-FRP-ASA-VPN-01/pri/act# IKEv2-PROTO-7: (2986): Request has mess_id 31;
expected 31 through 31
(2986):
IKEv2-PROTO-4: (2986): Received Packet [From 18.166.118.145:4500/To
103.98.132.6:4500/VRF i0:f0]
(2986): Initiator SPI : 35695B2C438F572D - Responder SPI : 774241973444F29D Message
id: 31
(2986): IKEv2 INFORMATIONAL Exchange REQUESTIKEv2-PROTO-5: (2986): Next payload:
ENCR, version: 2.0 (2986): Exchange type: INFORMATIONAL, flags: INITIATOR (2986):
Message id: 31, length: 80(2986):
Payload contents:
IKEv2-PLAT-4: (2986): Decrypt success status returned via ipc 1
(2986):
(2986): Decrypted packet:(2986): Data: 80 bytes
(2986): REAL Decrypted packet:(2986): Data: 0 bytes
IKEv2-PROTO-7: (2986): SM Trace-> SA: I_SPI=35695B2C438F572D R_SPI=774241973444F29D
(R) MsgID = 0000001F CurState: READY Event: EV_RECV_INFO_REQ
IKEv2-PROTO-7: (2986): Action: Action_Null
IKEv2-PROTO-7: (2986): SM Trace-> SA: I_SPI=35695B2C438F572D R_SPI=774241973444F29D
(R) MsgID = 0000001F CurState: INFO_R Event: EV_RECV_INFO_REQ
IKEv2-PROTO-4: (2986): Received DPD/liveness query
IKEv2-PROTO-4: (2986): Building packet for encryption.
IKEv2-PROTO-4: (2986): Sending ACK to informational exchange
IKEv2-PROTO-7: (2986): SM Trace-> SA: I_SPI=35695B2C438F572D R_SPI=774241973444F29D
(R) MsgID = 0000001F CurState: INFO_R Event: EV_ENCRYPT_MSG
IKEv2-PLAT-4: (2986): Encrypt success status returned via ipc 1
IKEv2-PROTO-7: (2986): SM Trace-> SA: I_SPI=35695B2C438F572D R_SPI=774241973444F29D
(R) MsgID = 0000001F CurState: INFO_R Event: EV_NO_EVENT
IKEv2-PROTO-7: (2986): Locked SA.Event EV_FREE_NEG queued in the state EXIT
IKEv2-PROTO-7: (2986): SM Trace-> SA: I_SPI=35695B2C438F572D R_SPI=774241973444F29D
(R) MsgID = 0000001F CurState: INFO_R Event: EV_OK_ENCRYPT_RESP
IKEv2-PROTO-7: (2986): Action: Action_Null
IKEv2-PROTO-7: (2986): SM Trace-> SA: I_SPI=35695B2C438F572D R_SPI=774241973444F29D
(R) MsgID = 0000001F CurState: INFO_R Event: EV_TRYSEND
(2986):
IKEv2-PROTO-4: (2986): Sending Packet [To 18.166.118.145:4500/From
103.98.132.6:4500/VRF i0:f0]
(2986): Initiator SPI : 35695B2C438F572D - Responder SPI : 774241973444F29D Message
id: 31
(2986): IKEv2 INFORMATIONAL Exchange RESPONSEIKEv2-PROTO-5: (2986): Next payload:
ENCR, version: 2.0 (2986): Exchange type: INFORMATIONAL, flags: RESPONDER MSG-
RESPONSE (2986): Message id: 31, length: 80(2986):
Payload contents:
(2986): ENCR(2986): Next payload: NONE, reserved: 0x0, length: 52
(2986): Encrypted data: 48 bytes
(2986):
IKEv2-PLAT-5: (2986): SENT PKT [INFORMATIONAL] [Chubb-Peer]:4500-
>[18.166.118.145]:4500 InitSPI=0x35695b2c438f572d RespSPI=0x774241973444f29d
MID=0000001f
IKEv2-PROTO-7: (2986): SM Trace-> SA: I_SPI=35695B2C438F572D R_SPI=774241973444F29D
(R) MsgID = 0000001F CurState: INFO_R Event: EV_CHK_INFO_TYPE
IKEv2-PROTO-7: (2986): SM Trace-> SA: I_SPI=35695B2C438F572D R_SPI=774241973444F29D
(R) MsgID = 0000001F CurState: INFO_R Event: EV_START_DEL_NEG_TMR
IKEv2-PROTO-7: (2986): Action: Action_Null
IKEv2-PROTO-7: (2986): SM Trace-> SA: I_SPI=35695B2C438F572D R_SPI=774241973444F29D
(R) MsgID = 0000001F CurState: EXIT Event: EV_CHK_PENDING
IKEv2-PROTO-7: (2986): Sent response with message id 31, Requests can be accepted
from range 32 to 32
IKEv2-PROTO-7: (2986): SM Trace-> SA: I_SPI=35695B2C438F572D R_SPI=774241973444F29D
(R) MsgID = 0000001F CurState: EXIT Event: EV_NO_EVENT
IKEv2-PROTO-7: (2986): SM Trace-> SA: I_SPI=35695B2C438F572D R_SPI=774241973444F29D
(R) MsgID = 0000001E CurState: EXIT Event: EV_FREE_NEG
IKEv2-PROTO-7: (2986): Deleting negotiation context for peer message ID: 0x1e
IKEv2-PROTO-7: (2986): Request has mess_id 32; expected 32 through 32
(2986):
IKEv2-PROTO-4: (2986): Received Packet [From 18.166.118.145:4500/To
103.98.132.6:4500/VRF i0:f0]
(2986): Initiator SPI : 35695B2C438F572D - Responder SPI : 774241973444F29D Message
id: 32
(2986): IKEv2 INFORMATIONAL Exchange REQUESTIKEv2-PROTO-5: (2986): Next payload:
ENCR, version: 2.0 (2986): Exchange type: INFORMATIONAL, flags: INITIATOR (2986):
Message id: 32, length: 80(2986):
Payload contents:
IKEv2-PLAT-4: (2986): Decrypt success status returned via ipc 1
(2986):
(2986): Decrypted packet:(2986): Data: 80 bytes
(2986): REAL Decrypted packet:(2986): Data: 0 bytes
IKEv2-PROTO-7: (2986): SM Trace-> SA: I_SPI=35695B2C438F572D R_SPI=774241973444F29D
(R) MsgID = 00000020 CurState: READY Event: EV_RECV_INFO_REQ
IKEv2-PROTO-7: (2986): Action: Action_Null
IKEv2-PROTO-7: (2986): SM Trace-> SA: I_SPI=35695B2C438F572D R_SPI=774241973444F29D
(R) MsgID = 00000020 CurState: INFO_R Event: EV_RECV_INFO_REQ
IKEv2-PROTO-4: (2986): Received DPD/liveness query
IKEv2-PROTO-4: (2986): Building packet for encryption.
IKEv2-PROTO-4: (2986): Sending ACK to informational exchange
IKEv2-PROTO-7: (2986): SM Trace-> SA: I_SPI=35695B2C438F572D R_SPI=774241973444F29D
(R) MsgID = 00000020 CurState: INFO_R Event: EV_ENCRYPT_MSG
IKEv2-PLAT-4: (2986): Encrypt success status returned via ipc 1
IKEv2-PROTO-7: (2986): SM Trace-> SA: I_SPI=35695B2C438F572D R_SPI=774241973444F29D
(R) MsgID = 00000020 CurState: INFO_R Event: EV_NO_EVENT
IKEv2-PROTO-7: (2986): Locked SA.Event EV_FREE_NEG queued in the state EXIT
IKEv2-PROTO-7: (2986): SM Trace-> SA: I_SPI=35695B2C438F572D R_SPI=774241973444F29D
(R) MsgID = 00000020 CurState: INFO_R Event: EV_OK_ENCRYPT_RESP
IKEv2-PROTO-7: (2986): Action: Action_Null
IKEv2-PROTO-7: (2986): SM Trace-> SA: I_SPI=35695B2C438F572D R_SPI=774241973444F29D
(R) MsgID = 00000020 CurState: INFO_R Event: EV_TRYSEND
(2986):
IKEv2-PROTO-4: (2986): Sending Packet [To 18.166.118.145:4500/From
103.98.132.6:4500/VRF i0:f0]
(2986): Initiator SPI : 35695B2C438F572D - Responder SPI : 774241973444F29D Message
id: 32
(2986): IKEv2 INFORMATIONAL Exchange RESPONSEIKEv2-PROTO-5: (2986): Next payload:
ENCR, version: 2.0 (2986): Exchange type: INFORMATIONAL, flags: RESPONDER MSG-
RESPONSE (2986): Message id: 32, length: 80(2986):
Payload contents:
(2986): ENCR(2986): Next payload: NONE, reserved: 0x0, length: 52
(2986): Encrypted data: 48 bytes
(2986):
IKEv2-PLAT-5: (2986): SENT PKT [INFORMATIONAL] [Chubb-Peer]:4500-
>[18.166.118.145]:4500 InitSPI=0x35695b2c438f572d RespSPI=0x774241973444f29d
MID=00000020
IKEv2-PROTO-7: (2986): SM Trace-> SA: I_SPI=35695B2C438F572D R_SPI=774241973444F29D
(R) MsgID = 00000020 CurState: INFO_R Event: EV_CHK_INFO_TYPE
IKEv2-PROTO-7: (2986): SM Trace-> SA: I_SPI=35695B2C438F572D R_SPI=774241973444F29D
(R) MsgID = 00000020 CurState: INFO_R Event: EV_START_DEL_NEG_TMR
IKEv2-PROTO-7: (2986): Action: Action_Null
IKEv2-PROTO-7: (2986): SM Trace-> SA: I_SPI=35695B2C438F572D R_SPI=774241973444F29D
(R) MsgID = 00000020 CurState: EXIT Event: EV_CHK_PENDING
IKEv2-PROTO-7: (2986): Sent response with message id 32, Requests can be accepted
from range 33 to 33
IKEv2-PROTO-7: (2986): SM Trace-> SA: I_SPI=35695B2C438F572D R_SPI=774241973444F29D
(R) MsgID = 00000020 CurState: EXIT Event: EV_NO_EVENT
IKEv2-PROTO-7: (2986): SM Trace-> SA: I_SPI=35695B2C438F572D R_SPI=774241973444F29D
(R) MsgID = 0000001F CurState: EXIT Event: EV_FREE_NEG
IKEv2-PROTO-7: (2986): Deleting negotiation context for peer message ID: 0x1f
IKEv2-PROTO-7: (2986): Request has mess_id 33; expected 33 through 33
(2986):
IKEv2-PROTO-4: (2986): Received Packet [From 18.166.118.145:4500/To
103.98.132.6:4500/VRF i0:f0]
(2986): Initiator SPI : 35695B2C438F572D - Responder SPI : 774241973444F29D Message
id: 33
(2986): IKEv2 INFORMATIONAL Exchange REQUESTIKEv2-PROTO-5: (2986): Next payload:
ENCR, version: 2.0 (2986): Exchange type: INFORMATIONAL, flags: INITIATOR (2986):
Message id: 33, length: 80(2986):
Payload contents:
IKEv2-PLAT-4: (2986): Decrypt success status returned via ipc 1
(2986):
(2986): Decrypted packet:(2986): Data: 80 bytes
(2986): REAL Decrypted packet:(2986): Data: 0 bytes
IKEv2-PROTO-7: (2986): SM Trace-> SA: I_SPI=35695B2C438F572D R_SPI=774241973444F29D
(R) MsgID = 00000021 CurState: READY Event: EV_RECV_INFO_REQ
IKEv2-PROTO-7: (2986): Action: Action_Null
IKEv2-PROTO-7: (2986): SM Trace-> SA: I_SPI=35695B2C438F572D R_SPI=774241973444F29D
(R) MsgID = 00000021 CurState: INFO_R Event: EV_RECV_INFO_REQ
IKEv2-PROTO-4: (2986): Received DPD/liveness query
IKEv2-PROTO-4: (2986): Building packet for encryption.
IKEv2-PROTO-4: (2986): Sending ACK to informational exchange
IKEv2-PROTO-7: (2986): SM Trace-> SA: I_SPI=35695B2C438F572D R_SPI=774241973444F29D
(R) MsgID = 00000021 CurState: INFO_R Event: EV_ENCRYPT_MSG
IKEv2-PLAT-4: (2986): Encrypt success status returned via ipc 1
IKEv2-PROTO-7: (2986): SM Trace-> SA: I_SPI=35695B2C438F572D R_SPI=774241973444F29D
(R) MsgID = 00000021 CurState: INFO_R Event: EV_NO_EVENT
IKEv2-PROTO-7: (2986): Locked SA.Event EV_FREE_NEG queued in the state EXIT
IKEv2-PROTO-7: (2986): SM Trace-> SA: I_SPI=35695B2C438F572D R_SPI=774241973444F29D
(R) MsgID = 00000021 CurState: INFO_R Event: EV_OK_ENCRYPT_RESP
IKEv2-PROTO-7: (2986): Action: Action_Null
IKEv2-PROTO-7: (2986): SM Trace-> SA: I_SPI=35695B2C438F572D R_SPI=774241973444F29D
(R) MsgID = 00000021 CurState: INFO_R Event: EV_TRYSEND
(2986):
IKEv2-PROTO-4: (2986): Sending Packet [To 18.166.118.145:4500/From
103.98.132.6:4500/VRF i0:f0]
(2986): Initiator SPI : 35695B2C438F572D - Responder SPI : 774241973444F29D Message
id: 33
(2986): IKEv2 INFORMATIONAL Exchange RESPONSEIKEv2-PROTO-5: (2986): Next payload:
ENCR, version: 2.0 (2986): Exchange type: INFORMATIONAL, flags: RESPONDER MSG-
RESPONSE (2986): Message id: 33, length: 80(2986):
Payload contents:
(2986): ENCR(2986): Next payload: NONE, reserved: 0x0, length: 52
(2986): Encrypted data: 48 bytes
(2986):
IKEv2-PLAT-5: (2986): SENT PKT [INFORMATIONAL] [Chubb-Peer]:4500-
>[18.166.118.145]:4500 InitSPI=0x35695b2c438f572d RespSPI=0x774241973444f29d
MID=00000021
IKEv2-PROTO-7: (2986): SM Trace-> SA: I_SPI=35695B2C438F572D R_SPI=774241973444F29D
(R) MsgID = 00000021 CurState: INFO_R Event: EV_CHK_INFO_TYPE
IKEv2-PROTO-7: (2986): SM Trace-> SA: I_SPI=35695B2C438F572D R_SPI=774241973444F29D
(R) MsgID = 00000021 CurState: INFO_R Event: EV_START_DEL_NEG_TMR
IKEv2-PROTO-7: (2986): Action: Action_Null
IKEv2-PROTO-7: (2986): SM Trace-> SA: I_SPI=35695B2C438F572D R_SPI=774241973444F29D
(R) MsgID = 00000021 CurState: EXIT Event: EV_CHK_PENDING
IKEv2-PROTO-7: (2986): Sent response with message id 33, Requests can be accepted
from range 34 to 34
IKEv2-PROTO-7: (2986): SM Trace-> SA: I_SPI=35695B2C438F572D R_SPI=774241973444F29D
(R) MsgID = 00000021 CurState: EXIT Event: EV_NO_EVENT
IKEv2-PROTO-7: (2986): SM Trace-> SA: I_SPI=35695B2C438F572D R_SPI=774241973444F29D
(R) MsgID = 00000020 CurState: EXIT Event: EV_FREE_NEG
IKEv2-PROTO-7: (2986): Deleting negotiation context for peer message ID: 0x20