Hi
Trying to setup a site to site VPN and despite what I believe to be similar settings on both ends (Mikrotik to Zywall 110) the negociation fails.
04:47:41 ipsec,info initiate new phase 1 (Identity Protection): *.*.*.*[500]<=>*.*.*.*[500]
04:47:41 ipsec,debug new cookie:
04:47:41 ipsec,debug 774122eeae510ced
04:47:41 ipsec,debug add payload of len 168, next type 13
04:47:41 ipsec,debug add payload of len 16, next type 13
04:47:41 ipsec,debug add payload of len 16, next type 13
04:47:41 ipsec,debug add payload of len 16, next type 13
04:47:41 ipsec,debug add payload of len 16, next type 13
04:47:41 ipsec,debug add payload of len 16, next type 13
04:47:41 ipsec,debug add payload of len 16, next type 13
04:47:41 ipsec,debug add payload of len 16, next type 13
04:47:41 ipsec,debug add payload of len 16, next type 13
04:47:41 ipsec,debug add payload of len 16, next type 13
04:47:41 ipsec,debug add payload of len 16, next type 13
04:47:41 ipsec,debug add payload of len 16, next type 13
04:47:41 ipsec,debug add payload of len 16, next type 13
04:47:41 ipsec,debug add payload of len 16, next type 0
04:47:41 ipsec,debug 460 bytes from *.*.*.*[500] to *.*.*.*[500]
04:47:41 ipsec,debug 1 times of 460 bytes message will be sent to *.*.*.*[500]
04:47:41 ipsec,debug,packet 774122ee ae510ced 00000000 00000000 01100200 00000000 000001cc 0d0000ac
04:47:41 ipsec,debug,packet 00000001 00000001 000000a0 01010004 03000028 01010000 800b0001 000c0004
04:47:41 ipsec,debug,packet 00015180 80010007 800e0080 80030001 80020002 8004000e 03000028 02010000
04:47:41 ipsec,debug,packet 800b0001 000c0004 00015180 80010007 800e0080 80030001 80020002 80040002
04:47:41 ipsec,debug,packet 03000024 03010000 800b0001 000c0004 00015180 80010005 80030001 80020002
04:47:41 ipsec,debug,packet 8004000e 00000024 04010000 800b0001 000c0004 00015180 80010005 80030001
04:47:41 ipsec,debug,packet 80020002 80040002 0d000014 4a131c81 07035845 5c5728f2 0e95452f 0d000014
04:47:41 ipsec,debug,packet 8f8d8382 6d246b6f c7a8a6a4 28c11de8 0d000014 439b59f8 ba676c4c 7737ae22
04:47:41 ipsec,debug,packet eab8f582 0d000014 4d1e0e13 6deafa34 c4f3ea9f 02ec7285 0d000014 80d0bb3d
04:47:41 ipsec,debug,packet ef54565e e84645d4 c85ce3ee 0d000014 9909b64e ed937c65 73de52ac e952fa6b
04:47:41 ipsec,debug,packet 0d000014 7d9419a6 5310ca6f 2c179d92 15529d56 0d000014 cd604643 35df21f8
04:47:41 ipsec,debug,packet 7cfdb2fc 68b6a448 0d000014 90cb8091 3ebb696e 086381b5 ec427b1f 0d000014
04:47:41 ipsec,debug,packet 16f6ca16 e4a4066d 83821a0f 0aeaa862 0d000014 4485152d 18b6bbcd 0be8a846
04:47:41 ipsec,debug,packet 9579ddcc 0d000014 12f5f28c 457168a9 702d9fe2 74cc0100 00000014 afcad713
04:47:41 ipsec,debug,packet 68a1f1c9 6b8696fc 77570100
04:47:41 ipsec sent phase1 packet *.*.*.*[500]<=>*.*.*.*[500] 774122eeae510ced:0000000000000000
04:47:41 ipsec,debug ===== received 260 bytes from *.*.*.*[500] to *.*.*.*[500]
04:47:41 ipsec,debug,packet 774122ee ae510ced 93bdab8b cd026b1c 01100200 00000000 00000104 0d000038
04:47:41 ipsec,debug,packet 00000001 00000001 0000002c 01010001 00000024 04010000 800b0001 000c0004
04:47:41 ipsec,debug,packet 00015180 80010005 80030001 80020002 80040002 0d000014 f758f226 68750f03
04:47:41 ipsec,debug,packet b08df6eb e1d00403 0d000012 afcad713 68a1f1c9 6b8696fc 77570d00 0014cd60
04:47:41 ipsec,debug,packet 464335df 21f87cfd b2fc68b6 a4480d00 001490cb 80913ebb 696e0863 81b5ec42
04:47:41 ipsec,debug,packet 7b1f0d00 00147d94 19a65310 ca6f2c17 9d921552 9d560d00 00144a13 1c810703
04:47:41 ipsec,debug,packet 58455c57 28f20e95 452f0d00 0014afca d71368a1 f1c96b86 96fc7757 01000d00
04:47:41 ipsec,debug,packet 0012afca d71368a1 f1c96b86 96fc7757 00000014 12f5f28c 457168a9 702d9fe2
04:47:41 ipsec,debug,packet 74cc0100
04:47:41 ipsec,debug begin.
04:47:41 ipsec,debug seen nptype=1(sa) len=56
04:47:41 ipsec,debug seen nptype=13(vid) len=20
04:47:41 ipsec,debug seen nptype=13(vid) len=18
04:47:41 ipsec,debug seen nptype=13(vid) len=20
04:47:41 ipsec,debug seen nptype=13(vid) len=20
04:47:41 ipsec,debug seen nptype=13(vid) len=20
04:47:41 ipsec,debug seen nptype=13(vid) len=20
04:47:41 ipsec,debug seen nptype=13(vid) len=20
04:47:41 ipsec,debug seen nptype=13(vid) len=18
04:47:41 ipsec,debug seen nptype=13(vid) len=20
04:47:41 ipsec,debug succeed.
04:47:41 ipsec,debug received unknown Vendor ID
04:47:41 ipsec,debug f758f226 68750f03 b08df6eb e1d00403
04:47:41 ipsec,debug received unknown Vendor ID
04:47:41 ipsec,debug afcad713 68a1f1c9 6b8696fc 7757
04:47:41 ipsec received Vendor ID: draft-ietf-ipsec-nat-t-ike-02
04:47:41 ipsec received Vendor ID: draft-ietf-ipsec-nat-t-ike-02\n
04:47:41 ipsec received Vendor ID: draft-ietf-ipsec-nat-t-ike-03
04:47:41 ipsec received Vendor ID: RFC 3947
04:47:41 ipsec received Vendor ID: DPD
04:47:41 ipsec,debug remote supports DPD
04:47:41 ipsec,debug received unknown Vendor ID
04:47:41 ipsec,debug afcad713 68a1f1c9 6b8696fc 7757
04:47:41 ipsec received Vendor ID: CISCO-UNITY
04:47:41 ipsec *.*.*.* Selected NAT-T version: RFC 3947
04:47:41 ipsec,debug total SA len=52
04:47:41 ipsec,debug 00000001 00000001 0000002c 01010001 00000024 04010000 800b0001 000c0004
04:47:41 ipsec,debug 00015180 80010005 80030001 80020002 80040002
04:47:41 ipsec,debug begin.
04:47:41 ipsec,debug seen nptype=2(prop) len=44
04:47:41 ipsec,debug succeed.
04:47:41 ipsec,debug proposal #1 len=44
04:47:41 ipsec,debug begin.
04:47:41 ipsec,debug seen nptype=3(trns) len=36
04:47:41 ipsec,debug succeed.
04:47:41 ipsec,debug transform #4 len=36
04:47:41 ipsec,debug type=Life Type, flag=0x8000, lorv=seconds
04:47:41 ipsec,debug type=Life Duration, flag=0x0000, lorv=4
04:47:41 ipsec,debug type=Encryption Algorithm, flag=0x8000, lorv=3DES-CBC
04:47:41 ipsec,debug,packet encryption(3des)
04:47:41 ipsec,debug type=Authentication Method, flag=0x8000, lorv=pre-shared key
04:47:41 ipsec,debug type=Hash Algorithm, flag=0x8000, lorv=SHA
04:47:41 ipsec,debug hash(sha1)
04:47:41 ipsec,debug type=Group Description, flag=0x8000, lorv=1024-bit MODP group
04:47:41 ipsec,debug dh(modp1024)
04:47:41 ipsec,debug pair 1:
04:47:41 ipsec,debug 0x4a23a0: next=(nil) tnext=(nil)
04:47:41 ipsec,debug proposal #1: 1 transform
04:47:41 ipsec,debug -checking with pre-shared key auth-
04:47:41 ipsec,debug prop#=1, prot-id=ISAKMP, spi-size=0, #trns=1
04:47:41 ipsec,debug trns#=4, trns-id=IKE
04:47:41 ipsec,debug type=Life Type, flag=0x8000, lorv=seconds
04:47:41 ipsec,debug type=Life Duration, flag=0x0000, lorv=4
04:47:41 ipsec,debug type=Encryption Algorithm, flag=0x8000, lorv=3DES-CBC
04:47:41 ipsec,debug type=Authentication Method, flag=0x8000, lorv=pre-shared key
04:47:41 ipsec,debug type=Hash Algorithm, flag=0x8000, lorv=SHA
04:47:41 ipsec,debug type=Group Description, flag=0x8000, lorv=1024-bit MODP group
04:47:41 ipsec,debug -compare proposal #1: Local:Peer
04:47:41 ipsec,debug (lifetime = 86400:86400)
04:47:41 ipsec,debug (lifebyte = 0:0)
04:47:41 ipsec,debug enctype = AES-CBC:3DES-CBC
04:47:41 ipsec,debug (encklen = 128:0)
04:47:41 ipsec,debug hashtype = SHA:SHA
04:47:41 ipsec,debug authmethod = pre-shared key:pre-shared key
04:47:41 ipsec,debug dh_group = 2048-bit MODP group:1024-bit MODP group
04:47:41 ipsec,debug -compare proposal #2: Local:Peer
04:47:41 ipsec,debug (lifetime = 86400:86400)
04:47:41 ipsec,debug (lifebyte = 0:0)
04:47:41 ipsec,debug enctype = AES-CBC:3DES-CBC
04:47:41 ipsec,debug (encklen = 128:0)
04:47:41 ipsec,debug hashtype = SHA:SHA
04:47:41 ipsec,debug authmethod = pre-shared key:pre-shared key
04:47:41 ipsec,debug dh_group = 1024-bit MODP group:1024-bit MODP group
04:47:41 ipsec,debug -compare proposal #3: Local:Peer
04:47:41 ipsec,debug (lifetime = 86400:86400)
04:47:41 ipsec,debug (lifebyte = 0:0)
04:47:41 ipsec,debug enctype = 3DES-CBC:3DES-CBC
04:47:41 ipsec,debug (encklen = 0:0)
04:47:41 ipsec,debug hashtype = SHA:SHA
04:47:41 ipsec,debug authmethod = pre-shared key:pre-shared key
04:47:41 ipsec,debug dh_group = 2048-bit MODP group:1024-bit MODP group
04:47:41 ipsec,debug -compare proposal #4: Local:Peer
04:47:41 ipsec,debug (lifetime = 86400:86400)
04:47:41 ipsec,debug (lifebyte = 0:0)
04:47:41 ipsec,debug enctype = 3DES-CBC:3DES-CBC
04:47:41 ipsec,debug (encklen = 0:0)
04:47:41 ipsec,debug hashtype = SHA:SHA
04:47:41 ipsec,debug authmethod = pre-shared key:pre-shared key
04:47:41 ipsec,debug dh_group = 1024-bit MODP group:1024-bit MODP group
04:47:41 ipsec,debug -an acceptable proposal found-
04:47:41 ipsec,debug dh(modp1024)
04:47:41 ipsec,debug -agreed on pre-shared key auth-
04:47:41 ipsec,debug ===
04:47:41 ipsec,debug dh(modp1024)
04:47:41 ipsec,debug,packet compute DH's private.
04:47:41 ipsec,debug,packet 6bf05d17 0dd9b0d8 d7da8ad2 0eaa61dc 167b994d 52433839 515f3bf1 ee87ee22
04:47:41 ipsec,debug,packet 97f50239 042fd370 0fedcfac 6a5480ee f0b10586 5bfb18b4 4ab9b7a9 de2a99b8
04:47:41 ipsec,debug,packet d5c9db64 43811bc5 7875233b 6a4468b0 d3b85e64 ae3f98c6 2a683208 91b2f19b
04:47:41 ipsec,debug,packet eaa5815a 085f15df 27774dac 8bcf457d 7241f103 a3253222 6c5345f9 896be679
04:47:41 ipsec,debug,packet compute DH's public.
04:47:41 ipsec,debug,packet b1463674 132c0bf1 8c0277ae 56475cd5 7ddeb7d7 e0cbd768 4446970b aa792a6a
04:47:41 ipsec,debug,packet c82c8fc2 c8782091 93629401 501cf0a9 21d83269 7a4a9338 abd08ecf 1b2ccb20
04:47:41 ipsec,debug,packet 0421e784 9afbb23d e3d67855 6bb16322 d4afdf19 6dcf83c1 dd1aac3c 02653e58
04:47:41 ipsec,debug,packet ccc108a4 f93ffc0c 1fc2cab0 63cc4a11 bd635137 b7aba85e ba33e121 ebb7d4a8
04:47:41 ipsec *.*.*.* Hashing *.*.*.*[500] with algo #2
04:47:41 ipsec,debug hash(sha1)
04:47:41 ipsec *.*.*.* Hashing *.*.*.*[500] with algo #2
04:47:41 ipsec,debug hash(sha1)
04:47:41 ipsec Adding remote and local NAT-D payloads.
04:47:41 ipsec,debug add payload of len 128, next type 10
04:47:41 ipsec,debug add payload of len 24, next type 20
04:47:41 ipsec,debug add payload of len 20, next type 20
04:47:41 ipsec,debug add payload of len 20, next type 0
04:47:41 ipsec,debug 236 bytes from *.*.*.*[500] to *.*.*.*[500]
04:47:41 ipsec,debug 1 times of 236 bytes message will be sent to *.*.*.*[500]
04:47:41 ipsec,debug,packet 774122ee ae510ced 93bdab8b cd026b1c 04100200 00000000 000000ec 0a000084
04:47:41 ipsec,debug,packet b1463674 132c0bf1 8c0277ae 56475cd5 7ddeb7d7 e0cbd768 4446970b aa792a6a
04:47:41 ipsec,debug,packet c82c8fc2 c8782091 93629401 501cf0a9 21d83269 7a4a9338 abd08ecf 1b2ccb20
04:47:41 ipsec,debug,packet 0421e784 9afbb23d e3d67855 6bb16322 d4afdf19 6dcf83c1 dd1aac3c 02653e58
04:47:41 ipsec,debug,packet ccc108a4 f93ffc0c 1fc2cab0 63cc4a11 bd635137 b7aba85e ba33e121 ebb7d4a8
04:47:41 ipsec,debug,packet 1400001c e9c55410 1d66046a 824d15b2 2f1bdf2d e3836fbe ebdf351e 14000018
04:47:41 ipsec,debug,packet 48be2a0a b42ee115 0c0b736a 65cbfba6 22a503e5 00000018 50006dbb a0886b0c
04:47:41 ipsec,debug,packet 5e288b75 15bf05cf 4d450da4
04:47:41 ipsec sent phase1 packet *.*.*.*[500]<=>*.*.*.*[500] 774122eeae510ced:93bdab8bcd026b1c
04:47:41 ipsec,debug ===== received 228 bytes from *.*.*.*[500] to *.*.*.*[500]
04:47:41 ipsec,debug,packet 774122ee ae510ced 93bdab8b cd026b1c 04100200 00000000 000000e4 0a000084
04:47:41 ipsec,debug,packet 21ed2c0a 7834dc3f a4f7006e e3b534fc e2a0b2da 14a19e71 697caef3 a59c69ca
04:47:41 ipsec,debug,packet d5fc66db ae528b40 d9a432c5 049dbdc8 9792d99e b5c4f64c 23e86c6e 5ff058d2
04:47:41 ipsec,debug,packet 34caf433 214bc942 7160f0dc 0a3433c6 81bce8bd 65cc62b6 47dac5f4 1c5d4e19
04:47:41 ipsec,debug,packet e3077b88 afc90c19 9d9e7207 878ee7b3 02144673 ea3667d4 5d66d52d a61f27c7
04:47:41 ipsec,debug,packet 14000014 6e0313d4 5470b7d4 31e426dc 5abf6afe 14000018 50006dbb a0886b0c
04:47:41 ipsec,debug,packet 5e288b75 15bf05cf 4d450da4 00000018 48be2a0a b42ee115 0c0b736a 65cbfba6
04:47:41 ipsec,debug,packet 22a503e5
04:47:41 ipsec,debug begin.
04:47:41 ipsec,debug seen nptype=4(ke) len=132
04:47:41 ipsec,debug seen nptype=10(nonce) len=20
04:47:41 ipsec,debug seen nptype=20(nat-d) len=24
04:47:41 ipsec,debug seen nptype=20(nat-d) len=24
04:47:41 ipsec,debug succeed.
04:47:41 ipsec *.*.*.* Hashing *.*.*.*[500] with algo #2
04:47:41 ipsec,debug hash(sha1)
04:47:41 ipsec NAT-D payload #0 verified
04:47:41 ipsec *.*.*.* Hashing *.*.*.*[500] with algo #2
04:47:41 ipsec,debug hash(sha1)
04:47:41 ipsec NAT-D payload #1 verified
04:47:41 ipsec NAT not detected
04:47:41 ipsec,debug ===
04:47:41 ipsec,debug dh(modp1024)
04:47:41 ipsec,debug,packet compute DH's shared.
04:47:41 ipsec,debug,packet
04:47:41 ipsec,debug,packet 414985bc 23c0a861 fd1e6afb f703ded6 26656c4d 92cba0a2 5a36181c f437dcda
04:47:41 ipsec,debug,packet 946ec9ac 62d980aa c8135621 51de2773 eccac719 139d48fb ab97eee5 a1daceb6
04:47:41 ipsec,debug,packet 60e4d1be 353e9896 b3f37f75 39819487 5e73d88e 5681495f 78fbc001 74dc90a4
04:47:41 ipsec,debug,packet 873e5ba4 c0c58b06 872a0a47 696ec6c1 71ebba07 2a72d5be 1d20be9e e8fb6f0b
04:47:41 ipsec,debug nonce 1:
04:47:41 ipsec,debug e9c55410 1d66046a 824d15b2 2f1bdf2d e3836fbe ebdf351e
04:47:41 ipsec,debug nonce 2:
04:47:41 ipsec,debug 6e0313d4 5470b7d4 31e426dc 5abf6afe
04:47:41 ipsec,debug,packet hmac(hmac_sha1)
04:47:41 ipsec,debug SKEYID computed:
04:47:41 ipsec,debug d9f63d6b c0ba44d3 954c2010 2d65c077 91811d19
04:47:41 ipsec,debug,packet hmac(hmac_sha1)
04:47:41 ipsec,debug SKEYID_d computed:
04:47:41 ipsec,debug cf965e37 2a60537e b8ddcc1c 2f725b26 8cfb950b
04:47:41 ipsec,debug,packet hmac(hmac_sha1)
04:47:41 ipsec,debug SKEYID_a computed:
04:47:41 ipsec,debug bbb80bbf c6d432b9 4f0ad64a b151a2c0 1eaf839d
04:47:41 ipsec,debug,packet hmac(hmac_sha1)
04:47:41 ipsec,debug SKEYID_e computed:
04:47:41 ipsec,debug d482415f d86268d8 3feec92c 4c3db984 744a99ad
04:47:41 ipsec,debug,packet encryption(3des)
04:47:41 ipsec,debug hash(sha1)
04:47:41 ipsec,debug len(SKEYID_e) < len(Ka) (20 < 24), generating long key (Ka = K1 | K2 | ...)
04:47:41 ipsec,debug,packet hmac(hmac_sha1)
04:47:41 ipsec,debug compute intermediate encryption key K1
04:47:41 ipsec,debug 00
04:47:41 ipsec,debug 8e07e014 2175a0e5 c4e4a158 cebb1515 15b4d07e
04:47:41 ipsec,debug,packet hmac(hmac_sha1)
04:47:41 ipsec,debug compute intermediate encryption key K2
04:47:41 ipsec,debug 8e07e014 2175a0e5 c4e4a158 cebb1515 15b4d07e
04:47:41 ipsec,debug f1b3a35f 7ce1a050 8126ad1b d45e5055 2bdfcb2f
04:47:41 ipsec,debug final encryption key computed:
04:47:41 ipsec,debug 8e07e014 2175a0e5 c4e4a158 cebb1515 15b4d07e f1b3a35f
04:47:41 ipsec,debug hash(sha1)
04:47:41 ipsec,debug,packet encryption(3des)
04:47:41 ipsec,debug IV computed:
04:47:41 ipsec,debug 6488ee21 ef768c51
04:47:41 ipsec,debug use ID type of IPv4_address
04:47:41 ipsec,debug,packet HASH with:
04:47:41 ipsec,debug,packet b1463674 132c0bf1 8c0277ae 56475cd5 7ddeb7d7 e0cbd768 4446970b aa792a6a
04:47:41 ipsec,debug,packet c82c8fc2 c8782091 93629401 501cf0a9 21d83269 7a4a9338 abd08ecf 1b2ccb20
04:47:41 ipsec,debug,packet 0421e784 9afbb23d e3d67855 6bb16322 d4afdf19 6dcf83c1 dd1aac3c 02653e58
04:47:41 ipsec,debug,packet ccc108a4 f93ffc0c 1fc2cab0 63cc4a11 bd635137 b7aba85e ba33e121 ebb7d4a8
04:47:41 ipsec,debug,packet 21ed2c0a 7834dc3f a4f7006e e3b534fc e2a0b2da 14a19e71 697caef3 a59c69ca
04:47:41 ipsec,debug,packet d5fc66db ae528b40 d9a432c5 049dbdc8 9792d99e b5c4f64c 23e86c6e 5ff058d2
04:47:41 ipsec,debug,packet 34caf433 214bc942 7160f0dc 0a3433c6 81bce8bd 65cc62b6 47dac5f4 1c5d4e19
04:47:41 ipsec,debug,packet e3077b88 afc90c19 9d9e7207 878ee7b3 02144673 ea3667d4 5d66d52d a61f27c7
04:47:41 ipsec,debug,packet 774122ee ae510ced 93bdab8b cd026b1c 00000001 00000001 000000a0 01010004
04:47:41 ipsec,debug,packet 03000028 01010000 800b0001 000c0004 00015180 80010007 800e0080 80030001
04:47:41 ipsec,debug,packet 80020002 8004000e 03000028 02010000 800b0001 000c0004 00015180 80010007
04:47:41 ipsec,debug,packet 800e0080 80030001 80020002 80040002 03000024 03010000 800b0001 000c0004
04:47:41 ipsec,debug,packet 00015180 80010005 80030001 80020002 8004000e 00000024 04010000 800b0001
04:47:41 ipsec,debug,packet 000c0004 00015180 80010005 80030001 80020002 80040002 011101f4 55c3eff1
04:47:41 ipsec,debug,packet hmac(hmac_sha1)
04:47:41 ipsec,debug,packet HASH computed:
04:47:41 ipsec,debug,packet 905bece8 c9b89c9f abe6fba6 127a8c14 4ab2058a
04:47:41 ipsec,debug add payload of len 8, next type 8
04:47:41 ipsec,debug add payload of len 20, next type 0
04:47:41 ipsec,debug,packet begin encryption.
04:47:41 ipsec,debug,packet encryption(3des)
04:47:41 ipsec,debug,packet pad length = 4
04:47:41 ipsec,debug,packet 0800000c 011101f4 55c3eff1 00000018 905bece8 c9b89c9f abe6fba6 127a8c14
04:47:41 ipsec,debug,packet 4ab2058a 751dd703
04:47:41 ipsec,debug,packet encryption(3des)
04:47:41 ipsec,debug,packet with key:
04:47:41 ipsec,debug,packet 8e07e014 2175a0e5 c4e4a158 cebb1515 15b4d07e f1b3a35f
04:47:41 ipsec,debug,packet encrypted payload by IV:
04:47:41 ipsec,debug,packet 6488ee21 ef768c51
04:47:41 ipsec,debug,packet save IV for next:
04:47:41 ipsec,debug,packet 09fc4289 a7e70bb3
04:47:41 ipsec,debug,packet encrypted.
04:47:41 ipsec,debug 68 bytes from *.*.*.*[500] to *.*.*.*[500]
04:47:41 ipsec,debug 1 times of 68 bytes message will be sent to *.*.*.*[500]
04:47:41 ipsec,debug,packet 774122ee ae510ced 93bdab8b cd026b1c 05100201 00000000 00000044 b35677d6
04:47:41 ipsec,debug,packet a9744402 93c055c3 1d8ae468 d3d48f14 8b3999e0 de0fa740 d05d5c81 09fc4289
04:47:41 ipsec,debug,packet a7e70bb3
04:47:41 ipsec sent phase1 packet *.*.*.*[500]<=>*.*.*.*[500] 774122eeae510ced:93bdab8bcd026b1c
04:47:41 ipsec,debug ===== received 173 bytes from *.*.*.*[500] to *.*.*.*[500]
04:47:41 ipsec,debug,packet 774122ee ae510ced 93bdab8b cd026b1c 0b100500 f3fe0dc3 000000ad 00000091
04:47:41 ipsec,debug,packet 00000001 01100001 774122ee ae510ced 93bdab8b cd026b1c 800c0001 80030035
04:47:41 ipsec,debug,packet 00030028 35f4dada bd8c63f9 ed719438 929913f7 3c7e7629 fae2e438 7c122903
04:47:41 ipsec,debug,packet fa0b6e85 83a4795a 68990aaa 80050000 00060035 496e636f 72726563 74207072
04:47:41 ipsec,debug,packet 652d7368 61726564 206b6579 2028496e 76616c69 64206e65 78742070 61796c6f
04:47:41 ipsec,debug,packet 61642076 616c7565 29800800 00
04:47:41 ipsec,debug receive Information.
04:47:41 ipsec *.*.*.* none message must be encrypted
04:47:43 sstp,packet Takacs4 recv control packet type: echo request
04:47:43 sstp,packet 10 01 00 08 00 08 00 00
04:47:43 sstp,packet Takacs4 sent control packet type: echo response
04:47:43 sstp,packet 10 01 00 08 00 09 00 00
04:47:43 sstp,packet Takacs4 sent control packet type: echo request
04:47:43 sstp,packet 10 01 00 08 00 08 00 00
04:47:43 sstp,packet Takacs4 recv control packet type: echo response
04:47:43 sstp,packet 10 01 00 08 00 09 00 00
04:47:51 ipsec,debug 68 bytes from *.*.*.*[500] to *.*.*.*[500]
04:47:51 ipsec,debug 1 times of 68 bytes message will be sent to *.*.*.*[500]
04:47:51 ipsec,debug,packet 774122ee ae510ced 93bdab8b cd026b1c 05100201 00000000 00000044 b35677d6
04:47:51 ipsec,debug,packet a9744402 93c055c3 1d8ae468 d3d48f14 8b3999e0 de0fa740 d05d5c81 09fc4289
04:47:51 ipsec,debug,packet a7e70bb3
04:47:51 ipsec resent phase1 packet *.*.*.*[500]<=>*.*.*.*[500] 774122eeae510ced:93bdab8bcd026b1c
04:48:01 ipsec,debug 68 bytes from *.*.*.*[500] to *.*.*.*[500]
04:48:01 ipsec,debug 1 times of 68 bytes message will be sent to *.*.*.*[500]
04:48:01 ipsec,debug,packet 774122ee ae510ced 93bdab8b cd026b1c 05100201 00000000 00000044 b35677d6
04:48:01 ipsec,debug,packet a9744402 93c055c3 1d8ae468 d3d48f14 8b3999e0 de0fa740 d05d5c81 09fc4289
04:48:01 ipsec,debug,packet a7e70bb3
04:48:01 ipsec resent phase1 packet *.*.*.*[500]<=>*.*.*.*[500] 774122eeae510ced:93bdab8bcd026b1c
04:48:11 ipsec,debug 68 bytes from *.*.*.*[500] to *.*.*.*[500]
04:48:11 ipsec,debug 1 times of 68 bytes message will be sent to *.*.*.*[500]
04:48:11 ipsec,debug,packet 774122ee ae510ced 93bdab8b cd026b1c 05100201 00000000 00000044 b35677d6
04:48:11 ipsec,debug,packet a9744402 93c055c3 1d8ae468 d3d48f14 8b3999e0 de0fa740 d05d5c81 09fc4289
04:48:11 ipsec,debug,packet a7e70bb3
04:48:11 ipsec resent phase1 packet *.*.*.*[500]<=>*.*.*.*[500] 774122eeae510ced:93bdab8bcd026b1c
04:48:21 ipsec,debug 68 bytes from *.*.*.*[500] to *.*.*.*[500]
04:48:21 ipsec,debug 1 times of 68 bytes message will be sent to *.*.*.*[500]
04:48:21 ipsec,debug,packet 774122ee ae510ced 93bdab8b cd026b1c 05100201 00000000 00000044 b35677d6
04:48:21 ipsec,debug,packet a9744402 93c055c3 1d8ae468 d3d48f14 8b3999e0 de0fa740 d05d5c81 09fc4289
04:48:21 ipsec,debug,packet a7e70bb3
04:48:21 ipsec resent phase1 packet *.*.*.*[500]<=>*.*.*.*[500] 774122eeae510ced:93bdab8bcd026b1c
04:48:31 ipsec,debug 68 bytes from *.*.*.*[500] to *.*.*.*[500]
04:48:31 ipsec,debug 1 times of 68 bytes message will be sent to *.*.*.*[500]
04:48:31 ipsec,debug,packet 774122ee ae510ced 93bdab8b cd026b1c 05100201 00000000 00000044 b35677d6
04:48:31 ipsec,debug,packet a9744402 93c055c3 1d8ae468 d3d48f14 8b3999e0 de0fa740 d05d5c81 09fc4289
04:48:31 ipsec,debug,packet a7e70bb3
04:48:31 ipsec resent phase1 packet *.*.*.*[500]<=>*.*.*.*[500] 774122eeae510ced:93bdab8bcd026b1c
04:48:41 ipsec,error phase1 negotiation failed due to time up *.*.*.*[500]<=>*.*.*.*[500] 774122eeae510ced:93bdab8bcd026b1c
Anything obvious for the more expert eyes… ? Thanks !









