login as: admin
admin@YY.YY.YY.YY's password:
Logged in as administrator - admin
DFL-210:/> ikesnoop -on -v
Ike snooping is active - verbose mode; snooping address *
DFL-210:/> killsa -all
Destroying all IPsec & IKE SAs for all remote peers.
DFL-210:/> ping 192.168.9.55
Sending 1 4-byte ICMP ping to 192.168.9.55 from 192.168.0.54
2010-12-17 14:35:19: IkeSnoop: Sending IKE packet to XX.XX.XX.XX:500
Exchange type : Identity Protection (main mode)
ISAKMP Version : 1.0
Flags :
Cookies : 0x9227ee40b2134b -> 0x00000000
Message ID : 0x00000000
Packet length : 636 bytes
# payloads : 10
Payloads:
SA (Security Association)
Payload data length : 424 bytes
DOI : 1 (IPsec DOI)
Proposal 1/1
Protocol 1/1
Protocol ID : ISAKMP
SPI Size : 0
Transform 1/12
Transform ID : IKE
Encryption algorithm : Rijndael-cbc (aes)
Key length : 128
Hash algorithm : MD5
Authentication method : Pre-Shared Key
Group description : MODP 1024
Life type : Seconds
Life duration : 28800
Transform 2/12
Transform ID : IKE
Encryption algorithm : Rijndael-cbc (aes)
Key length : 128
Hash algorithm : SHA
Authentication method : Pre-Shared Key
Group description : MODP 1024
Life type : Seconds
Life duration : 28800
Transform 3/12
Transform ID : IKE
Encryption algorithm : 3DES-cbc
Hash algorithm : MD5
Authentication method : Pre-Shared Key
Group description : MODP 1024
Life type : Seconds
Life duration : 28800
Transform 4/12
Transform ID : IKE
Encryption algorithm : 3DES-cbc
Hash algorithm : SHA
Authentication method : Pre-Shared Key
Group description : MODP 1024
Life type : Seconds
Life duration : 28800
Transform 5/12
Transform ID : IKE
Encryption algorithm : DES-cbc
Hash algorithm : MD5
Authentication method : Pre-Shared Key
Group description : MODP 1024
Life type : Seconds
Life duration : 28800
Transform 6/12
Transform ID : IKE
Encryption algorithm : DES-cbc
Hash algorithm : SHA
Authentication method : Pre-Shared Key
Group description : MODP 1024
Life type : Seconds
Life duration : 28800
Transform 7/12
Transform ID : IKE
Encryption algorithm : Cast-cbc
Hash algorithm : MD5
Authentication method : Pre-Shared Key
Group description : MODP 1024
Life type : Seconds
Life duration : 28800
Transform 8/12
Transform ID : IKE
Encryption algorithm : Cast-cbc
Hash algorithm : SHA
Authentication method : Pre-Shared Key
Group description : MODP 1024
Life type : Seconds
Life duration : 28800
Transform 9/12
Transform ID : IKE
Encryption algorithm : Blowfish-cbc
Key length : 128
Hash algorithm : MD5
Authentication method : Pre-Shared Key
Group description : MODP 1024
Life type : Seconds
Life duration : 28800
Transform 10/12
Transform ID : IKE
Encryption algorithm : Blowfish-cbc
Key length : 128
Hash algorithm : SHA
Authentication method : Pre-Shared Key
Group description : MODP 1024
Life type : Seconds
Life duration : 28800
Transform 11/12
Transform ID : IKE
Encryption algorithm : Twofish-cbc
Key length : 128
Hash algorithm : MD5
Authentication method : Pre-Shared Key
Group description : MODP 1024
Life type : Seconds
Life duration : 28800
Transform 12/12
Transform ID : IKE
Encryption algorithm : Twofish-cbc
Key length : 128
Hash algorithm : SHA
Authentication method : Pre-Shared Key
Group description : MODP 1024
Life type : Seconds
Life duration : 28800
VID (Vendor ID)
Payload data length : 16 bytes
Vendor ID : 8f 9c c9 4e 01 24 8e cd f1 47 59 4c 28 4b 21 3b
Description : SSH Communications Security QuickSec 2.1.0
VID (Vendor ID)
Payload data length : 16 bytes
Vendor ID : 27 ba b5 dc 01 ea 07 60 ea 4e 31 90 ac 27 c0 d0
Description : draft-stenberg-ipsec-nat-traversal-01
VID (Vendor ID)
Payload data length : 16 bytes
Vendor ID : 61 05 c4 22 e7 68 47 e4 3f 96 84 80 12 92 ae cd
Description : draft-stenberg-ipsec-nat-traversal-02
VID (Vendor ID)
Payload data length : 16 bytes
Vendor ID : 44 85 15 2d 18 b6 bb cd 0b e8 a8 46 95 79 dd cc
Description : draft-ietf-ipsec-nat-t-ike-00
VID (Vendor ID)
Payload data length : 16 bytes
Vendor ID : cd 60 46 43 35 df 21 f8 7c fd b2 fc 68 b6 a4 48
Description : draft-ietf-ipsec-nat-t-ike-02
VID (Vendor ID)
Payload data length : 16 bytes
Vendor ID : 90 cb 80 91 3e bb 69 6e 08 63 81 b5 ec 42 7b 1f
Description : draft-ietf-ipsec-nat-t-ike-02
VID (Vendor ID)
Payload data length : 16 bytes
Vendor ID : 7d 94 19 a6 53 10 ca 6f 2c 17 9d 92 15 52 9d 56
Description : draft-ietf-ipsec-nat-t-ike-03
VID (Vendor ID)
Payload data length : 16 bytes
Vendor ID : 4a 13 1c 81 07 03 58 45 5c 57 28 f2 0e 95 45 2f
Description : RFC 3947
VID (Vendor ID)
Payload data length : 16 bytes
Vendor ID : af ca d7 13 68 a1 f1 c9 6b 86 96 fc 77 57 01 00
Description : draft-ietf-ipsec-dpd-00
2010-12-17 14:35:19: IkeSnoop: Received IKE packet from XX.XX.XX.XX:500
Exchange type : Identity Protection (main mode)
ISAKMP Version : 1.0
Flags :
Cookies : 0x9227ee40b2134b -> 0xd4127edce89692e9
Message ID : 0x00000000
Packet length : 100 bytes
# payloads : 2
Payloads:
SA (Security Association)
Payload data length : 48 bytes
DOI : 1 (IPsec DOI)
Proposal 1/1
Protocol 1/1
Protocol ID : ISAKMP
SPI Size : 0
Transform 1/1
Transform ID : IKE
Encryption algorithm : 3DES-cbc
Hash algorithm : SHA
Authentication method : Pre-Shared Key
Group description : MODP 1024
Life type : Seconds
Life duration : 28800
VID (Vendor ID)
Payload data length : 16 bytes
Vendor ID : af ca d7 13 68 a1 f1 c9 6b 86 96 fc 77 57 01 00
Description : draft-ietf-ipsec-dpd-00
2010-12-17 14:35:19: IkeSnoop: Sending IKE packet to XX.XX.XX.XX:500
Exchange type : Identity Protection (main mode)
ISAKMP Version : 1.0
Flags :
Cookies : 0x9227ee40b2134b -> 0xd4127edce89692e9
Message ID : 0x00000000
Packet length : 180 bytes
# payloads : 2
Payloads:
KE (Key Exchange)
Payload data length : 128 bytes
NONCE (Nonce)
Payload data length : 16 bytes
2010-12-17 14:35:20: IkeSnoop: Received IKE packet from XX.XX.XX.XX:500
Exchange type : Identity Protection (main mode)
ISAKMP Version : 1.0
Flags :
Cookies : 0x9227ee40b2134b -> 0xd4127edce89692e9
Message ID : 0x00000000
Packet length : 180 bytes
# payloads : 2
Payloads:
KE (Key Exchange)
Payload data length : 128 bytes
NONCE (Nonce)
Payload data length : 16 bytes
2010-12-17 14:35:20: IkeSnoop: Sending IKE packet to XX.XX.XX.XX:500
Exchange type : Identity Protection (main mode)
ISAKMP Version : 1.0
Flags : E (encryption)
Cookies : 0x9227ee40b2134b -> 0xd4127edce89692e9
Message ID : 0x00000000
Packet length : 76 bytes
# payloads : 3
Payloads:
ID (Identification)
Payload data length : 8 bytes
ID : ipv4(any:0,[0..3]=YY.YY.YY.YY)
HASH (Hash)
Payload data length : 20 bytes
N (Notification)
Payload data length : 8 bytes
Protocol ID : ISAKMP
Notification : Initial contact
2010-12-17 14:35:20: IkeSnoop: Received IKE packet from XX.XX.XX.XX:500
Exchange type : Identity Protection (main mode)
ISAKMP Version : 1.0
Flags : E (encryption)
Cookies : 0x9227ee40b2134b -> 0xd4127edce89692e9
Message ID : 0x00000000
Packet length : 64 bytes
# payloads : 2
Payloads:
ID (Identification)
Payload data length : 8 bytes
ID : ipv4(udp:500,[0..3]=XX.XX.XX.XX)
HASH (Hash)
Payload data length : 20 bytes
2010-12-17 14:35:20: IkeSnoop: Sending IKE packet to XX.XX.XX.XX:500
Exchange type : Quick mode
ISAKMP Version : 1.0
Flags : E (encryption)
Cookies : 0x9227ee40b2134b -> 0xd4127edce89692e9
Message ID : 0x02886a1a
Packet length : 620 bytes
# payloads : 6
Payloads:
HASH (Hash)
Payload data length : 20 bytes
SA (Security Association)
Payload data length : 380 bytes
DOI : 1 (IPsec DOI)
Proposal 1/1
Protocol 1/1
Protocol ID : ESP
SPI Size : 4
SPI Value : 0xbaf91e86
Transform 1/12
Transform ID : Rijndael (aes)
Key length : 128
Authentication algorithm : HMAC-MD5
SA life type : Seconds
SA life duration : 3600
Group description : MODP 1024
Encapsulation mode : Tunnel
Transform 2/12
Transform ID : Rijndael (aes)
Key length : 128
Authentication algorithm : HMAC-SHA-1
SA life type : Seconds
SA life duration : 3600
Group description : MODP 1024
Encapsulation mode : Tunnel
Transform 3/12
Transform ID : 3DES
Authentication algorithm : HMAC-MD5
SA life type : Seconds
SA life duration : 3600
Group description : MODP 1024
Encapsulation mode : Tunnel
Transform 4/12
Transform ID : 3DES
Authentication algorithm : HMAC-SHA-1
SA life type : Seconds
SA life duration : 3600
Group description : MODP 1024
Encapsulation mode : Tunnel
Transform 5/12
Transform ID : DES
Authentication algorithm : HMAC-MD5
SA life type : Seconds
SA life duration : 3600
Group description : MODP 1024
Encapsulation mode : Tunnel
Transform 6/12
Transform ID : DES
Authentication algorithm : HMAC-SHA-1
SA life type : Seconds
SA life duration : 3600
Group description : MODP 1024
Encapsulation mode : Tunnel
Transform 7/12
Transform ID : Cast
Authentication algorithm : HMAC-MD5
SA life type : Seconds
SA life duration : 3600
Group description : MODP 1024
Encapsulation mode : Tunnel
Transform 8/12
Transform ID : Cast
Authentication algorithm : HMAC-SHA-1
SA life type : Seconds
SA life duration : 3600
Group description : MODP 1024
Encapsulation mode : Tunnel
Transform 9/12
Transform ID : Blowfish
Key length : 128
Authentication algorithm : HMAC-MD5
SA life type : Seconds
SA life duration : 3600
Group description : MODP 1024
Encapsulation mode : Tunnel
Transform 10/12
Transform ID : Blowfish
Key length : 128
Authentication algorithm : HMAC-SHA-1
SA life type : Seconds
SA life duration : 3600
Group description : MODP 1024
Encapsulation mode : Tunnel
Transform 11/12
Transform ID : Twofish
Key length : 128
Authentication algorithm : HMAC-MD5
SA life type : Seconds
SA life duration : 3600
Group description : MODP 1024
Encapsulation mode : Tunnel
Transform 12/12
Transform ID : Twofish
Key length : 128
Authentication algorithm : HMAC-SHA-1
SA life type : Seconds
SA life duration : 3600
Group description : MODP 1024
Encapsulation mode : Tunnel
NONCE (Nonce)
Payload data length : 16 bytes
KE (Key Exchange)
Payload data length : 128 bytes
ID (Identification)
Payload data length : 12 bytes
ID : ipv4_subnet(any:0,[0..7]=192.168.0.0/24)
ID (Identification)
Payload data length : 12 bytes
ID : ipv4_subnet(any:0,[0..7]=192.168.9.0/24)
2010-12-17 14:35:20: IkeSnoop: Received IKE packet from XX.XX.XX.XX:500
Exchange type : Informational
ISAKMP Version : 1.0
Flags : E (encryption)
Cookies : 0x9227ee40b2134b -> 0xd4127edce89692e9
Message ID : 0xc70cb377
Packet length : 64 bytes
# payloads : 2
Payloads:
HASH (Hash)
Payload data length : 20 bytes
N (Notification)
Payload data length : 8 bytes
Protocol ID : ISAKMP
Notification : No proposal chosen
DFL-210:/>
Ping Results: Sent: 1, Received:0, Loss: 100%
DFL-210:/> ping XX.XX.XX.XX
Sending 1 4-byte ICMP ping to XX.XX.XX.XX from YY.YY.YY.YY
ICMP Reply from XX.XX.XX.XX seq=0 time= 50 ms TTL=44
Ping Results: Sent: 1, Received:1, Loss: 0%, Avg RTT: 50.0 ms
DFL-210:/> ping 192.168.9.54
Sending 1 4-byte ICMP ping to 192.168.9.54 from 192.168.0.54
2010-12-17 14:36:29: IkeSnoop: Sending IKE packet to XX.XX.XX.XX:500
Exchange type : Identity Protection (main mode)
ISAKMP Version : 1.0
Flags :
Cookies : 0x5f7059cb2d7c1eda -> 0x00000000
Message ID : 0x00000000
Packet length : 636 bytes
# payloads : 10
Payloads:
SA (Security Association)
Payload data length : 424 bytes
DOI : 1 (IPsec DOI)
Proposal 1/1
Protocol 1/1
Protocol ID : ISAKMP
SPI Size : 0
Transform 1/12
Transform ID : IKE
Encryption algorithm : Rijndael-cbc (aes)
Key length : 128
Hash algorithm : MD5
Authentication method : Pre-Shared Key
Group description : MODP 1024
Life type : Seconds
Life duration : 28800
Transform 2/12
Transform ID : IKE
Encryption algorithm : Rijndael-cbc (aes)
Key length : 128
Hash algorithm : SHA
Authentication method : Pre-Shared Key
Group description : MODP 1024
Life type : Seconds
Life duration : 28800
Transform 3/12
Transform ID : IKE
Encryption algorithm : 3DES-cbc
Hash algorithm : MD5
Authentication method : Pre-Shared Key
Group description : MODP 1024
Life type : Seconds
Life duration : 28800
Transform 4/12
Transform ID : IKE
Encryption algorithm : 3DES-cbc
Hash algorithm : SHA
Authentication method : Pre-Shared Key
Group description : MODP 1024
Life type : Seconds
Life duration : 28800
Transform 5/12
Transform ID : IKE
Encryption algorithm : DES-cbc
Hash algorithm : MD5
Authentication method : Pre-Shared Key
Group description : MODP 1024
Life type : Seconds
Life duration : 28800
Transform 6/12
Transform ID : IKE
Encryption algorithm : DES-cbc
Hash algorithm : SHA
Authentication method : Pre-Shared Key
Group description : MODP 1024
Life type : Seconds
Life duration : 28800
Transform 7/12
Transform ID : IKE
Encryption algorithm : Cast-cbc
Hash algorithm : MD5
Authentication method : Pre-Shared Key
Group description : MODP 1024
Life type : Seconds
Life duration : 28800
Transform 8/12
Transform ID : IKE
Encryption algorithm : Cast-cbc
Hash algorithm : SHA
Authentication method : Pre-Shared Key
Group description : MODP 1024
Life type : Seconds
Life duration : 28800
Transform 9/12
Transform ID : IKE
Encryption algorithm : Blowfish-cbc
Key length : 128
Hash algorithm : MD5
Authentication method : Pre-Shared Key
Group description : MODP 1024
Life type : Seconds
Life duration : 28800
Transform 10/12
Transform ID : IKE
Encryption algorithm : Blowfish-cbc
Key length : 128
Hash algorithm : SHA
Authentication method : Pre-Shared Key
Group description : MODP 1024
Life type : Seconds
Life duration : 28800
Transform 11/12
Transform ID : IKE
Encryption algorithm : Twofish-cbc
Key length : 128
Hash algorithm : MD5
Authentication method : Pre-Shared Key
Group description : MODP 1024
Life type : Seconds
Life duration : 28800
Transform 12/12
Transform ID : IKE
Encryption algorithm : Twofish-cbc
Key length : 128
Hash algorithm : SHA
Authentication method : Pre-Shared Key
Group description : MODP 1024
Life type : Seconds
Life duration : 28800
VID (Vendor ID)
Payload data length : 16 bytes
Vendor ID : 8f 9c c9 4e 01 24 8e cd f1 47 59 4c 28 4b 21 3b
Description : SSH Communications Security QuickSec 2.1.0
VID (Vendor ID)
Payload data length : 16 bytes
Vendor ID : 27 ba b5 dc 01 ea 07 60 ea 4e 31 90 ac 27 c0 d0
Description : draft-stenberg-ipsec-nat-traversal-01
VID (Vendor ID)
Payload data length : 16 bytes
Vendor ID : 61 05 c4 22 e7 68 47 e4 3f 96 84 80 12 92 ae cd
Description : draft-stenberg-ipsec-nat-traversal-02
VID (Vendor ID)
Payload data length : 16 bytes
Vendor ID : 44 85 15 2d 18 b6 bb cd 0b e8 a8 46 95 79 dd cc
Description : draft-ietf-ipsec-nat-t-ike-00
VID (Vendor ID)
Payload data length : 16 bytes
Vendor ID : cd 60 46 43 35 df 21 f8 7c fd b2 fc 68 b6 a4 48
Description : draft-ietf-ipsec-nat-t-ike-02
VID (Vendor ID)
Payload data length : 16 bytes
Vendor ID : 90 cb 80 91 3e bb 69 6e 08 63 81 b5 ec 42 7b 1f
Description : draft-ietf-ipsec-nat-t-ike-02
VID (Vendor ID)
Payload data length : 16 bytes
Vendor ID : 7d 94 19 a6 53 10 ca 6f 2c 17 9d 92 15 52 9d 56
Description : draft-ietf-ipsec-nat-t-ike-03
VID (Vendor ID)
Payload data length : 16 bytes
Vendor ID : 4a 13 1c 81 07 03 58 45 5c 57 28 f2 0e 95 45 2f
Description : RFC 3947
VID (Vendor ID)
Payload data length : 16 bytes
Vendor ID : af ca d7 13 68 a1 f1 c9 6b 86 96 fc 77 57 01 00
Description : draft-ietf-ipsec-dpd-00
2010-12-17 14:36:29: IkeSnoop: Received IKE packet from XX.XX.XX.XX:500
Exchange type : Identity Protection (main mode)
ISAKMP Version : 1.0
Flags :
Cookies : 0x5f7059cb2d7c1eda -> 0x9447a32c8d3cc8d2
Message ID : 0x00000000
Packet length : 100 bytes
# payloads : 2
Payloads:
SA (Security Association)
Payload data length : 48 bytes
DOI : 1 (IPsec DOI)
Proposal 1/1
Protocol 1/1
Protocol ID : ISAKMP
SPI Size : 0
Transform 1/1
Transform ID : IKE
Encryption algorithm : 3DES-cbc
Hash algorithm : SHA
Authentication method : Pre-Shared Key
Group description : MODP 1024
Life type : Seconds
Life duration : 28800
VID (Vendor ID)
Payload data length : 16 bytes
Vendor ID : af ca d7 13 68 a1 f1 c9 6b 86 96 fc 77 57 01 00
Description : draft-ietf-ipsec-dpd-00
2010-12-17 14:36:29: IkeSnoop: Sending IKE packet to XX.XX.XX.XX:500
Exchange type : Identity Protection (main mode)
ISAKMP Version : 1.0
Flags :
Cookies : 0x5f7059cb2d7c1eda -> 0x9447a32c8d3cc8d2
Message ID : 0x00000000
Packet length : 180 bytes
# payloads : 2
Payloads:
KE (Key Exchange)
Payload data length : 128 bytes
NONCE (Nonce)
Payload data length : 16 bytes
2010-12-17 14:36:29: IkeSnoop: Received IKE packet from XX.XX.XX.XX:500
Exchange type : Identity Protection (main mode)
ISAKMP Version : 1.0
Flags :
Cookies : 0x5f7059cb2d7c1eda -> 0x9447a32c8d3cc8d2
Message ID : 0x00000000
Packet length : 180 bytes
# payloads : 2
Payloads:
KE (Key Exchange)
Payload data length : 128 bytes
NONCE (Nonce)
Payload data length : 16 bytes
2010-12-17 14:36:29: IkeSnoop: Sending IKE packet to XX.XX.XX.XX:500
Exchange type : Identity Protection (main mode)
ISAKMP Version : 1.0
Flags : E (encryption)
Cookies : 0x5f7059cb2d7c1eda -> 0x9447a32c8d3cc8d2
Message ID : 0x00000000
Packet length : 76 bytes
# payloads : 3
Payloads:
ID (Identification)
Payload data length : 8 bytes
ID : ipv4(any:0,[0..3]=YY.YY.YY.YY)
HASH (Hash)
Payload data length : 20 bytes
N (Notification)
Payload data length : 8 bytes
Protocol ID : ISAKMP
Notification : Initial contact
2010-12-17 14:36:29: IkeSnoop: Received IKE packet from XX.XX.XX.XX:500
Exchange type : Identity Protection (main mode)
ISAKMP Version : 1.0
Flags : E (encryption)
Cookies : 0x5f7059cb2d7c1eda -> 0x9447a32c8d3cc8d2
Message ID : 0x00000000
Packet length : 64 bytes
# payloads : 2
Payloads:
ID (Identification)
Payload data length : 8 bytes
ID : ipv4(udp:500,[0..3]=XX.XX.XX.XX)
HASH (Hash)
Payload data length : 20 bytes
2010-12-17 14:36:29: IkeSnoop: Sending IKE packet to XX.XX.XX.XX:500
Exchange type : Quick mode
ISAKMP Version : 1.0
Flags : E (encryption)
Cookies : 0x5f7059cb2d7c1eda -> 0x9447a32c8d3cc8d2
Message ID : 0xb21e325c
Packet length : 620 bytes
# payloads : 6
Payloads:
HASH (Hash)
Payload data length : 20 bytes
SA (Security Association)
Payload data length : 380 bytes
DOI : 1 (IPsec DOI)
Proposal 1/1
Protocol 1/1
Protocol ID : ESP
SPI Size : 4
SPI Value : 0x8f41fe8b
Transform 1/12
Transform ID : Rijndael (aes)
Key length : 128
Authentication algorithm : HMAC-MD5
SA life type : Seconds
SA life duration : 3600
Group description : MODP 1024
Encapsulation mode : Tunnel
Transform 2/12
Transform ID : Rijndael (aes)
Key length : 128
Authentication algorithm : HMAC-SHA-1
SA life type : Seconds
SA life duration : 3600
Group description : MODP 1024
Encapsulation mode : Tunnel
Transform 3/12
Transform ID : 3DES
Authentication algorithm : HMAC-MD5
SA life type : Seconds
SA life duration : 3600
Group description : MODP 1024
Encapsulation mode : Tunnel
Transform 4/12
Transform ID : 3DES
Authentication algorithm : HMAC-SHA-1
SA life type : Seconds
SA life duration : 3600
Group description : MODP 1024
Encapsulation mode : Tunnel
Transform 5/12
Transform ID : DES
Authentication algorithm : HMAC-MD5
SA life type : Seconds
SA life duration : 3600
Group description : MODP 1024
Encapsulation mode : Tunnel
Transform 6/12
Transform ID : DES
Authentication algorithm : HMAC-SHA-1
SA life type : Seconds
SA life duration : 3600
Group description : MODP 1024
Encapsulation mode : Tunnel
Transform 7/12
Transform ID : Cast
Authentication algorithm : HMAC-MD5
SA life type : Seconds
SA life duration : 3600
Group description : MODP 1024
Encapsulation mode : Tunnel
Transform 8/12
Transform ID : Cast
Authentication algorithm : HMAC-SHA-1
SA life type : Seconds
SA life duration : 3600
Group description : MODP 1024
Encapsulation mode : Tunnel
Transform 9/12
Transform ID : Blowfish
Key length : 128
Authentication algorithm : HMAC-MD5
SA life type : Seconds
SA life duration : 3600
Group description : MODP 1024
Encapsulation mode : Tunnel
Transform 10/12
Transform ID : Blowfish
Key length : 128
Authentication algorithm : HMAC-SHA-1
SA life type : Seconds
SA life duration : 3600
Group description : MODP 1024
Encapsulation mode : Tunnel
Transform 11/12
Transform ID : Twofish
Key length : 128
Authentication algorithm : HMAC-MD5
SA life type : Seconds
SA life duration : 3600
Group description : MODP 1024
Encapsulation mode : Tunnel
Transform 12/12
Transform ID : Twofish
Key length : 128
Authentication algorithm : HMAC-SHA-1
SA life type : Seconds
SA life duration : 3600
Group description : MODP 1024
Encapsulation mode : Tunnel
NONCE (Nonce)
Payload data length : 16 bytes
KE (Key Exchange)
Payload data length : 128 bytes
ID (Identification)
Payload data length : 12 bytes
ID : ipv4_subnet(any:0,[0..7]=192.168.0.0/24)
ID (Identification)
Payload data length : 12 bytes
ID : ipv4_subnet(any:0,[0..7]=192.168.9.0/24)
2010-12-17 14:36:30: IkeSnoop: Received IKE packet from XX.XX.XX.XX:500
Exchange type : Informational
ISAKMP Version : 1.0
Flags : E (encryption)
Cookies : 0x5f7059cb2d7c1eda -> 0x9447a32c8d3cc8d2
Message ID : 0xaa432073
Packet length : 64 bytes
# payloads : 2
Payloads:
HASH (Hash)
Payload data length : 20 bytes
N (Notification)
Payload data length : 8 bytes
Protocol ID : ISAKMP
Notification : No proposal chosen
Ping Results: Sent: 1, Received:0, Loss: 100%
2010-12-17 14:37:18: IkeSnoop: Received IKE packet from XX.XX.XX.XX:500
2010-12-17 14:37:18: IkeSnoop: IKE packet belongs to unknown IKE SA
2010-12-17 14:37:28: IkeSnoop: Received IKE packet from XX.XX.XX.XX:500
2010-12-17 14:37:28: IkeSnoop: IKE packet belongs to unknown IKE SA
2010-12-17 14:37:38: IkeSnoop: Received IKE packet from XX.XX.XX.XX:500
2010-12-17 14:37:38: IkeSnoop: IKE packet belongs to unknown IKE SA