はじめに
掲題の通り、CCNPの学習を深めるために検証した際の記録です。
IPsecやGREトンネルの説明は調べるとよくでてくるので、説明は割愛します。
検証
構成図
基本的な構成は下記です。RT01とRT04でGREトンネルとIPsecで接続しています。

通信の中を確認したいので、RT02とRT03の間にL2SWを接続し、RT02とRT03間の通信をパケットキャプチャします。

IPsecの設定有無で見え方の違いも確認してみます。
設定
※管理用(ログイン用)にVLAN99を作成しています。VLAN99はIPsecの設定には関係はありません。
流し込みconfig
以下、検証設定のために実行コマンドです。
RT01
conf t
crypto isakmp policy 1
encry 3des
hash md5
authentication pre-share
group 2
crypto isakmp key orange address 172.16.1.4
crypto isakmp keepalive 10 periodic
crypto ipsec transform-set ORANGE-IPSEC esp-3des esp-md5-hmac
mode transport
ip access-list extended Allow-ipsec-p2p
permit gre host 172.16.0.1 host 172.16.1.4
crypto map Cryoto-ipsec-map 1 ipsec-isakmp
set peer 172.16.1.4
set transform-set ORANGE-IPSEC
match address Allow-ipsec-p2p
interface FastEthernet0
ip address 10.0.0.1 255.255.255.0
ip tcp adjust-mss 1332
no shutdown
interface GigabitEthernet 8
ip address 172.16.0.1 255.255.255.0
no shutdown
crypto map Cryoto-ipsec-map
interface Tunnel 0
ip address 192.168.1.1 255.255.255.0
ip mtu 1372
tunnel source GigabitEthernet8
tunnel destination 172.16.1.4
ip route 0.0.0.0 0.0.0.0 Tunnel0
ip route 172.16.1.4 255.255.255.255 172.16.0.2
end
wr
RT02
conf t
vlan 10
exit
interface vlan 10
ip address 10.0.0.2 255.255.255.0
interface GigabitEthernet0
switchport access vlan 10
exit
interface FastEthernet0
ip address 10.10.2.2 255.255.255.0
no shutdown
interface GigabitEthernet 8
ip address 172.16.0.2 255.255.255.0
no shutdown
ip route 172.16.1.0 255.255.255.0 10.10.2.3
end
wr
RT03
conf t
vlan 10
exit
interface vlan 10
ip address 10.0.1.3 255.255.255.0
interface GigabitEthernet0
switchport access vlan 10
exit
interface FastEthernet0
ip address 10.10.2.3 255.255.255.0
no shutdown
interface GigabitEthernet 8
ip address 172.16.1.3 255.255.255.0
no shutdown
ip route 172.16.0.0 255.255.255.0 10.10.2.2
end
wr
RT04
conf t
crypto isakmp policy 1
encry 3des
hash md5
authentication pre-share
group 2
crypto isakmp key orange address 172.16.0.1
crypto isakmp keepalive 10 periodic
crypto ipsec transform-set ORANGE-IPSEC esp-3des esp-md5-hmac
mode transport
ip access-list extended Allow-ipsec-p2p
permit gre host 172.16.1.4 host 172.16.0.1
crypto map Cryoto-ipsec-map 1 ipsec-isakmp
set peer 172.16.0.1
set transform-set ORANGE-IPSEC
match address Allow-ipsec-p2p
interface FastEthernet0
ip address 10.0.1.4 255.255.255.0
ip tcp adjust-mss 1332
no shutdown
interface GigabitEthernet 8
ip address 172.16.1.4 255.255.255.0
no shutdown
crypto map Cryoto-ipsec-map
interface Tunnel 0
ip address 192.168.1.2 255.255.255.0
ip mtu 1372
tunnel source GigabitEthernet8
tunnel destination 172.16.0.1
ip route 0.0.0.0 0.0.0.0 Tunnel0
ip route 172.16.0.1 255.255.255.255 172.16.1.3
end
wr
sh run
検証に使用したconfigを載せます。
RT01# sh run
RT01#sh run
Building configuration...
Current configuration : 2680 bytes
!
! Last configuration change at 04:48:45 UTC Tue Jan 28 2025 by admin
!
version 15.4
service timestamps debug datetime msec
service timestamps log datetime msec
service password-encryption
!
hostname RT01
!
boot-start-marker
boot-end-marker
!
!
enable secret 5 $1$WJFk$6QRnNnLWC.ajxzqfzkYi4/
!
no aaa new-model
memory-size iomem 15
!
!
!
!
!
!
!
!
!
!
!
!
!
!
no ip domain lookup
ip domain name orange.local
ip cef
no ipv6 cef
!
!
!
!
!
multilink bundle-name authenticated
!
!
!
!
!
!
!
!
cts logging verbose
license udi pid C891FJ-K9 sn FGL2505LDK2
!
!
vtp mode transparent
username admin password 7 1218011A1B05
!
!
!
!
!
vlan 99
!
ip ssh version 2
!
!
crypto isakmp policy 1
encr 3des
hash md5
authentication pre-share
group 2
crypto isakmp key orange address 172.16.1.4
crypto isakmp keepalive 10 periodic
!
!
crypto ipsec transform-set ORANGE-IPSEC esp-3des esp-md5-hmac
mode transport
!
!
!
crypto map Cryoto-ipsec-map 1 ipsec-isakmp
set peer 172.16.1.4
set transform-set ORANGE-IPSEC
match address Allow-ipsec-p2p
!
!
!
!
!
!
interface Tunnel0
ip address 192.168.1.1 255.255.255.0
ip mtu 1372
tunnel source GigabitEthernet8
tunnel destination 172.16.1.4
!
interface BRI0
no ip address
encapsulation hdlc
shutdown
isdn termination multidrop
!
interface FastEthernet0
ip address 10.0.0.1 255.255.255.0
ip tcp adjust-mss 1332
duplex auto
speed auto
!
interface GigabitEthernet0
no ip address
!
interface GigabitEthernet1
no ip address
!
interface GigabitEthernet2
no ip address
!
interface GigabitEthernet3
no ip address
!
interface GigabitEthernet4
no ip address
!
interface GigabitEthernet5
no ip address
!
interface GigabitEthernet6
no ip address
!
interface GigabitEthernet7
switchport access vlan 99
no ip address
!
interface GigabitEthernet8
ip address 172.16.0.1 255.255.255.0
duplex auto
speed auto
crypto map Cryoto-ipsec-map
!
interface Vlan1
no ip address
!
interface Vlan99
ip address 192.168.99.3 255.255.255.0
!
interface Async3
no ip address
encapsulation slip
!
ip forward-protocol nd
no ip http server
no ip http secure-server
!
!
ip route 0.0.0.0 0.0.0.0 Tunnel0
ip route 172.16.1.4 255.255.255.255 172.16.0.2
!
ip access-list extended Allow-ipsec-p2p
permit gre host 172.16.0.1 host 172.16.1.4
!
!
!
control-plane
!
!
mgcp behavior rsip-range tgcp-only
mgcp behavior comedia-role none
mgcp behavior comedia-check-media-src disable
mgcp behavior comedia-sdp-force disable
!
mgcp profile default
!
!
!
!
!
!
!
line con 0
login local
no modem enable
line aux 0
line 3
modem InOut
speed 115200
flowcontrol hardware
line vty 0 4
login local
transport input all
!
scheduler allocate 20000 1000
!
!
!
end
RT02# sh run
RT02#sh run
Building configuration...
Current configuration : 2080 bytes
!
! Last configuration change at 01:04:12 UTC Tue Jan 28 2025 by admin
!
version 15.4
service timestamps debug datetime msec
service timestamps log datetime msec
service password-encryption
!
hostname RT02
!
boot-start-marker
boot-end-marker
!
!
enable secret 5 $1$Vkhk$mzfGeEt/yBY7LMijPoV21/
!
no aaa new-model
memory-size iomem 15
!
!
!
!
!
!
!
!
!
!
!
!
!
!
no ip domain lookup
ip domain name orange.local
ip cef
no ipv6 cef
!
!
!
!
!
multilink bundle-name authenticated
!
!
!
!
!
!
!
!
cts logging verbose
license udi pid C891FJ-K9 sn FGL2505LDK4
!
!
vtp mode transparent
username admin password 7 070E25414707
!
!
!
!
!
vlan 10,99
!
ip ssh version 2
!
!
!
!
!
!
!
!
!
!
!
interface BRI0
no ip address
encapsulation hdlc
shutdown
isdn termination multidrop
!
interface FastEthernet0
ip address 10.10.2.2 255.255.255.0
duplex auto
speed auto
!
interface GigabitEthernet0
switchport access vlan 10
no ip address
!
interface GigabitEthernet1
no ip address
!
interface GigabitEthernet2
no ip address
!
interface GigabitEthernet3
no ip address
!
interface GigabitEthernet4
no ip address
!
interface GigabitEthernet5
no ip address
!
interface GigabitEthernet6
no ip address
!
interface GigabitEthernet7
switchport access vlan 99
no ip address
!
interface GigabitEthernet8
ip address 172.16.0.2 255.255.255.0
duplex auto
speed auto
!
interface Vlan1
no ip address
!
interface Vlan10
ip address 10.0.0.2 255.255.255.0
!
interface Vlan99
ip address 192.168.99.4 255.255.255.0
!
interface Async3
no ip address
encapsulation slip
!
ip forward-protocol nd
no ip http server
no ip http secure-server
!
!
ip route 172.16.1.0 255.255.255.0 10.10.2.3
!
!
!
control-plane
!
!
mgcp behavior rsip-range tgcp-only
mgcp behavior comedia-role none
mgcp behavior comedia-check-media-src disable
mgcp behavior comedia-sdp-force disable
!
mgcp profile default
!
!
!
!
!
!
!
line con 0
login local
no modem enable
line aux 0
line 3
modem InOut
speed 115200
flowcontrol hardware
line vty 0 4
login local
transport input all
!
scheduler allocate 20000 1000
!
!
!
end
RT03# sh run
RT03#sh run
Building configuration...
Current configuration : 2059 bytes
!
! Last configuration change at 01:13:00 UTC Tue Jan 28 2025 by admin
!
version 15.4
service timestamps debug datetime msec
service timestamps log datetime msec
service password-encryption
!
hostname RT03
!
boot-start-marker
boot-end-marker
!
!
enable secret 5 $1$io5s$H45.fHTZi4WsynedlDusr1
!
no aaa new-model
!
!
!
!
!
!
!
!
!
!
!
!
!
!
no ip domain lookup
ip domain name orange.local
ip cef
no ipv6 cef
!
!
!
!
!
multilink bundle-name authenticated
!
!
!
!
!
!
!
!
cts logging verbose
license udi pid C891FJ-K9 sn FGL2333210N
!
!
vtp mode transparent
username admin password 7 070E25414707
!
!
!
!
!
vlan 10,99
!
!
!
!
!
!
!
!
!
!
!
!
interface BRI0
no ip address
encapsulation hdlc
shutdown
isdn termination multidrop
!
interface FastEthernet0
ip address 10.10.2.3 255.255.255.0
duplex auto
speed auto
!
interface GigabitEthernet0
switchport access vlan 10
no ip address
!
interface GigabitEthernet1
no ip address
!
interface GigabitEthernet2
no ip address
!
interface GigabitEthernet3
no ip address
!
interface GigabitEthernet4
no ip address
!
interface GigabitEthernet5
no ip address
!
interface GigabitEthernet6
no ip address
!
interface GigabitEthernet7
switchport access vlan 99
no ip address
!
interface GigabitEthernet8
ip address 172.16.1.3 255.255.255.0
duplex auto
speed auto
!
interface Vlan1
no ip address
!
interface Vlan10
ip address 10.0.1.3 255.255.255.0
!
interface Vlan99
ip address 192.168.99.5 255.255.255.0
!
interface Async3
no ip address
encapsulation slip
!
ip forward-protocol nd
no ip http server
no ip http secure-server
!
!
ip route 172.16.0.0 255.255.255.0 10.10.2.2
ip ssh version 2
!
!
!
control-plane
!
!
mgcp behavior rsip-range tgcp-only
mgcp behavior comedia-role none
mgcp behavior comedia-check-media-src disable
mgcp behavior comedia-sdp-force disable
!
mgcp profile default
!
!
!
!
!
!
!
line con 0
login local
no modem enable
line aux 0
line 3
modem InOut
speed 115200
flowcontrol hardware
line vty 0 4
login local
transport input all
!
scheduler allocate 20000 1000
!
!
!
end
RT04# sh run
RT04#sh run
Building configuration...
Current configuration : 2680 bytes
!
! Last configuration change at 04:47:31 UTC Tue Jan 28 2025 by admin
!
version 15.4
service timestamps debug datetime msec
service timestamps log datetime msec
service password-encryption
!
hostname RT04
!
boot-start-marker
boot-end-marker
!
!
enable secret 5 $1$bAlC$CYqdi73zMml1PZfAOldV1/
!
no aaa new-model
memory-size iomem 15
!
!
!
!
!
!
!
!
!
!
!
!
!
!
no ip domain lookup
ip domain name orange.local
ip cef
no ipv6 cef
!
!
!
!
!
multilink bundle-name authenticated
!
!
!
!
!
!
!
!
cts logging verbose
license udi pid C891FJ-K9 sn FGL2505LDKP
!
!
vtp mode transparent
username admin password 7 020700560208
!
!
!
!
!
vlan 99
!
ip ssh version 2
!
!
crypto isakmp policy 1
encr 3des
hash md5
authentication pre-share
group 2
crypto isakmp key orange address 172.16.0.1
crypto isakmp keepalive 10 periodic
!
!
crypto ipsec transform-set ORANGE-IPSEC esp-3des esp-md5-hmac
mode transport
!
!
!
crypto map Cryoto-ipsec-map 1 ipsec-isakmp
set peer 172.16.0.1
set transform-set ORANGE-IPSEC
match address Allow-ipsec-p2p
!
!
!
!
!
!
interface Tunnel0
ip address 192.168.1.2 255.255.255.0
ip mtu 1372
tunnel source GigabitEthernet8
tunnel destination 172.16.0.1
!
interface BRI0
no ip address
encapsulation hdlc
shutdown
isdn termination multidrop
!
interface FastEthernet0
ip address 10.0.1.4 255.255.255.0
ip tcp adjust-mss 1332
duplex auto
speed auto
!
interface GigabitEthernet0
no ip address
!
interface GigabitEthernet1
no ip address
!
interface GigabitEthernet2
no ip address
!
interface GigabitEthernet3
no ip address
!
interface GigabitEthernet4
no ip address
!
interface GigabitEthernet5
no ip address
!
interface GigabitEthernet6
no ip address
!
interface GigabitEthernet7
switchport access vlan 99
no ip address
!
interface GigabitEthernet8
ip address 172.16.1.4 255.255.255.0
duplex auto
speed auto
crypto map Cryoto-ipsec-map
!
interface Vlan1
no ip address
!
interface Vlan99
ip address 192.168.99.6 255.255.255.0
!
interface Async3
no ip address
encapsulation slip
!
ip forward-protocol nd
no ip http server
no ip http secure-server
!
!
ip route 0.0.0.0 0.0.0.0 Tunnel0
ip route 172.16.0.1 255.255.255.255 172.16.1.3
!
ip access-list extended Allow-ipsec-p2p
permit gre host 172.16.1.4 host 172.16.0.1
!
!
!
control-plane
!
!
mgcp behavior rsip-range tgcp-only
mgcp behavior comedia-role none
mgcp behavior comedia-check-media-src disable
mgcp behavior comedia-sdp-force disable
!
mgcp profile default
!
!
!
!
!
!
!
line con 0
login local
no modem enable
line aux 0
line 3
modem InOut
speed 115200
flowcontrol hardware
line vty 0 4
login local
transport input all
!
scheduler allocate 20000 1000
!
!
!
end
設定とパケットについて
ルーティングについて
当たり前ですが、RT02とRT03にはRT01とRT04が持つセグメントを持っていますが、トンネリングされているので問題なくRT01からRT04への通信が行うことができます。トンネリングされていないと、RT02やRT03が持つセグメントでIP重複が発生する可能性がありますので、トンネリングの効用についても一緒に確認しています。
暗号化の対象に注目する
紹介しているconfigを環境に合わせてIPを変更すればあまり考えずに使えますが、設定項目について少しだけ補足。
RT01内の「ip access-list extended Allow-ipsec-p2p」の「permit gre host 172.16.0.1 host 172.16.1.4」の部分。GREを使わないでIPsecだけを使う場合と比較すると、通信処理の部分の理解にもつながります。
IPsec単体の場合、この部分の指定は「permit ip 10.0.0.0 0.0.0.255 10.10.1.0 0.0.0.255」になります。このパラメータでIPsecで転送するパケットの範囲を指定します。10.0.0.0/24から10.0.1.0/24宛の通信があった場合、IPsecで暗号化するという意味になります。
では、今回の「permit gre host 172.16.0.1 host 172.16.1.4」はどうなるか。GREトンネルの通信が発生した場合IPsecの暗号化を行うこと言うことになります。つまり、通信処理の順序は
①ルーティングテーブルを確認
②トンネルインターフェースがネクストホップ
③GREのトンネリング
④IPsecの暗号化
となるわけです。GREのルーティング対象になるパケットはすべてIPsec暗号化してくれるので、configとしてすっきりするわけです。1行で収まってしまう分存在感がないので、注目してみました。
暗号化時のパケット
PC01からPC04にICMP(Ping)を行います。
IPSecによって暗号化されているので、ICMP自体の通信は見えません。(所々ISAKMPが挟まっています)

ステータス確認
コマンド:sh crypt isakmap sa
stateが「QM_Idle」になっていると、IKEフェーズ1の成功していることを示しています。このステータスが「-」や「MM_NO_STATE」の場合、IPsec通信の設定を見直しや構成しているルータの設定、途中経路の疎通を確認する必要があります。
実行結果
RT01#sh crypto isakmp sa
IPv4 Crypto ISAKMP SA
dst src state conn-id status
172.16.1.4 172.16.0.1 QM_IDLE 2001 ACTIVE
IPv6 Crypto ISAKMP SA
コマンド:sh crypt isakmap sa
注目するところは「 #pkts encaps: 4, #pkts encrypt: 4, #pkts digest: 4」「#pkts decaps: 4, #pkts decrypt: 4, #pkts verify: 4」の部分。IPsec通信が発生した分だけカウンタが上がるので、このカウンタが上がらない場合はIPsecの通信ができていないことになります。
RT01#sh crypto ipsec sa
interface: GigabitEthernet8
Crypto map tag: Crypto-ipsec-map, local addr 172.16.0.1
protected vrf: (none)
local ident (addr/mask/prot/port): (172.16.0.1/255.255.255.255/47/0)
remote ident (addr/mask/prot/port): (172.16.1.4/255.255.255.255/47/0)
current_peer 172.16.1.4 port 500
PERMIT, flags={origin_is_acl,}
#pkts encaps: 4, #pkts encrypt: 4, #pkts digest: 4
#pkts decaps: 4, #pkts decrypt: 4, #pkts verify: 4
#pkts compressed: 0, #pkts decompressed: 0
#pkts not compressed: 0, #pkts compr. failed: 0
#pkts not decompressed: 0, #pkts decompress failed: 0
#send errors 0, #recv errors 0
local crypto endpt.: 172.16.0.1, remote crypto endpt.: 172.16.1.4
plaintext mtu 1466, path mtu 1500, ip mtu 1500, ip mtu idb GigabitEthernet8
current outbound spi: 0x9ECCD2E2(2664223458)
PFS (Y/N): N, DH group: none
inbound esp sas:
spi: 0x8CAB6047(2360041543)
transform: esp-3des esp-md5-hmac ,
in use settings ={Transport, }
conn id: 1, flow_id: Onboard VPN:1, sibling_flags 80004000, crypto map: Crypto-ipsec-map
sa timing: remaining key lifetime (k/sec): (4170458/3476)
IV size: 8 bytes
replay detection support: Y
Status: ACTIVE(ACTIVE)
inbound ah sas:
inbound pcp sas:
outbound esp sas:
spi: 0x9ECCD2E2(2664223458)
transform: esp-3des esp-md5-hmac ,
in use settings ={Transport, }
conn id: 2, flow_id: Onboard VPN:2, sibling_flags 80004000, crypto map: Crypto-ipsec-map
sa timing: remaining key lifetime (k/sec): (4170458/3476)
IV size: 8 bytes
replay detection support: Y
Status: ACTIVE(ACTIVE)
outbound ah sas:
outbound pcp sas:
IPsecを無効にしたときのパケット
一度IPsecを無効にしてみます。(RT04でも同じコマンドを実行)
RT01#conf t
Enter configuration commands, one per line. End with CNTL/Z.
RT01(config)#int gigabitEthernet 8
RT01(config-if)#no crypto map Crypto-ipsec-map
RT01(config-if)#end
isamkp、ipsecのステータスは下記の通り。
RT01#sh crypto isakmp sa
IPv4 Crypto ISAKMP SA
dst src state conn-id status
172.16.1.4 172.16.0.1 MM_NO_STATE 2001 ACTIVE (deleted)
IPv6 Crypto ISAKMP SA
RT01#sh crypto ipsec sa
No SAs found
PC01からPingを実行し、その時のRT02とRT03間の通信を見てみます。先ほどとの違いは明確で、ICMPの通信がそのまま見えます。一見GREトンネルもされていなさそうですが、172.16.0.1から172.16.1.14宛のパケットでちゃんとカプセリングされています。

うまくいかないときはdebugを有効にする
下記コマンドでdebugを有効にしておきます。logはけっこうな量が出力されるので、logの保存容量も相応に大きくしておきます。
debug crypt isakmp
debug crypt ipsec
logging buffered 512000
IPsec成功ログ
検証時は失敗する中で突如成功して、どこから成功のログ?という感じになることが多かったので、成功時に出力されるログを記録として残しておきます。少し長いですが。
RT01 # sh log
RT01#sh logging
Syslog logging: enabled (0 messages dropped, 3 messages rate-limited, 0 flushes, 0 overruns, xml disabled, filtering disabled)
No Active Message Discriminator.
No Inactive Message Discriminator.
Console logging: level debugging, 295 messages logged, xml disabled,
filtering disabled
Monitor logging: level debugging, 0 messages logged, xml disabled,
filtering disabled
Buffer logging: level debugging, 250 messages logged, xml disabled,
filtering disabled
Exception Logging: size (8192 bytes)
Count and timestamp logging messages: disabled
Persistent logging: disabled
No active filter modules.
Trap logging: level informational, 51 message lines logged
Logging Source-Interface: VRF Name:
Log Buffer (51200 bytes):
*Mar 18 14:20:24.303: %SYS-5-LOG_CONFIG_CHANGE: Buffer logging: level debugging, xml disabled, filtering disabled, size (51200)
*Mar 18 14:20:24.983: %SYS-5-CONFIG_I: Configured from console by admin on vty0 (192.168.99.252)
*Mar 18 14:21:04.655: IPSEC(sa_request): ,
(key eng. msg.) OUTBOUND local= 172.16.0.1:500, remote= 172.16.1.4:500,
local_proxy= 172.16.0.1/255.255.255.255/47/0,
remote_proxy= 172.16.1.4/255.255.255.255/47/0,
protocol= ESP, transform= esp-3des esp-md5-hmac (Transport),
lifedur= 3600s and 4608000kb,
spi= 0x0(0), conn_id= 0, keysize= 0, flags= 0x0
*Mar 18 14:21:04.655: ISAKMP:(0): SA request profile is (NULL)
*Mar 18 14:21:04.659: ISAKMP: Created a peer struct for 172.16.1.4, peer port 500
*Mar 18 14:21:04.659: ISAKMP: New peer created peer = 0x361D584 peer_handle = 0x80000002
*Mar 18 14:21:04.659: ISAKMP: Locking peer struct 0x361D584, refcount 1 for isakmp_initiator
*Mar 18 14:21:04.659: ISAKMP: local port 500, remote port 500
*Mar 18 14:21:04.659: ISAKMP: set new node 0 to QM_IDLE
*Mar 18 14:21:04.659: ISAKMP:(0):insert sa successfully sa = 2B8128C
*Mar 18 14:21:04.659: ISAKMP:(0):Can not start Aggressive mode, trying Main mode.
*Mar 18 14:21:04.659: ISAKMP:(0):found peer pre-shared key matching 172.16.1.4
*Mar 18 14:21:04.659: ISAKMP:(0): constructed NAT-T vendor-rfc3947 ID
*Mar 18 14:21:04.659: ISAKMP:(0): constructed NAT-T vendor-07 ID
*Mar 18 14:21:04.659: ISAKMP:(0): constructed NAT-T vendor-03 ID
*Mar 18 14:21:04.659: ISAKMP:(0): constructed NAT-T vendor-02 ID
*Mar 18 14:21:04.659: ISAKMP:(0):Input = IKE_MESG_FROM_IPSEC, IKE_SA_REQ_MM
*Mar 18 14:21:04.659: ISAKMP:(0):Old State = IKE_READY New State = IKE_I_MM1
*Mar 18 14:21:04.659: ISAKMP:(0): beginning Main Mode exchange
*Mar 18 14:21:04.659: ISAKMP:(0): sending packet to 172.16.1.4 my_port 500 peer_port 500 (I) MM_NO_STATE
*Mar 18 14:21:04.659: ISAKMP:(0):Sending an IKE IPv4 Packet.
*Mar 18 14:21:04.663: ISAKMP (0): received packet from 172.16.1.4 dport 500 sport 500 Global (I) MM_NO_STATE
*Mar 18 14:21:04.663: ISAKMP:(0):Input = IKE_MESG_FROM_PEER, IKE_MM_EXCH
*Mar 18 14:21:04.663: ISAKMP:(0):Old State = IKE_I_MM1 New State = IKE_I_MM2
*Mar 18 14:21:04.663: ISAKMP:(0): processing SA payload. message ID = 0
*Mar 18 14:21:04.663: ISAKMP:(0): processing vendor id payload
*Mar 18 14:21:04.663: ISAKMP:(0): vendor ID seems Unity/DPD but major 69 mismatch
*Mar 18 14:21:04.663: ISAKMP (0): vendor ID is NAT-T RFC 3947
*Mar 18 14:21:04.663: ISAKMP:(0):found peer pre-shared key matching 172.16.1.4
*Mar 18 14:21:04.663: ISAKMP:(0): local preshared key found
*Mar 18 14:21:04.663: ISAKMP : Scanning profiles for xauth ...
*Mar 18 14:21:04.663: ISAKMP:(0):Checking ISAKMP transform 1 against priority 1 policy
*Mar 18 14:21:04.663: ISAKMP: encryption 3DES-CBC
*Mar 18 14:21:04.663: ISAKMP: hash MD5
*Mar 18 14:21:04.663: ISAKMP: default group 2
*Mar 18 14:21:04.663: ISAKMP: auth pre-share
*Mar 18 14:21:04.663: ISAKMP: life type in seconds
*Mar 18 14:21:04.663: ISAKMP: life duration (VPI) of 0x0 0x1 0x51 0x80
*Mar 18 14:21:04.663: ISAKMP:(0):atts are acceptable. Next payload is 0
*Mar 18 14:21:04.663: ISAKMP:(0):Acceptable atts:actual life: 0
*Mar 18 14:21:04.663: ISAKMP:(0):Acceptable atts:life: 0
*Mar 18 14:21:04.663: ISAKMP:(0):Fill atts in sa vpi_length:4
*Mar 18 14:21:04.663: ISAKMP:(0):Fill atts in sa life_in_seconds:86400
*Mar 18 14:21:04.663: ISAKMP:(0):Returning Actual lifetime: 86400
*Mar 18 14:21:04.663: ISAKMP:(0)::Started lifetime timer: 86400.
*Mar 18 14:21:04.663: ISAKMP:(0): processing vendor id payload
*Mar 18 14:21:04.663: ISAKMP:(0): vendor ID seems Unity/DPD but major 69 mismatch
*Mar 18 14:21:04.663: ISAKMP (0): vendor ID is NAT-T RFC 3947
*Mar 18 14:21:04.663: ISAKMP:(0):Input = IKE_MESG_INTERNAL, IKE_PROCESS_MAIN_MODE
*Mar 18 14:21:04.663: ISAKMP:(0):Old State = IKE_I_MM2 New State = IKE_I_MM2
*Mar 18 14:21:04.663: ISAKMP:(0): sending packet to 172.16.1.4 my_port 500 peer_port 500 (I) MM_SA_SETUP
*Mar 18 14:21:04.663: ISAKMP:(0):Sending an IKE IPv4 Packet.
*Mar 18 14:21:04.663: ISAKMP:(0):Input = IKE_MESG_INTERNAL, IKE_PROCESS_COMPLETE
*Mar 18 14:21:04.663: ISAKMP:(0):Old State = IKE_I_MM2 New State = IKE_I_MM3
*Mar 18 14:21:04.667: ISAKMP (0): received packet from 172.16.1.4 dport 500 sport 500 Global (I) MM_SA_SETUP
*Mar 18 14:21:04.667: ISAKMP:(0):Input = IKE_MESG_FROM_PEER, IKE_MM_EXCH
*Mar 18 14:21:04.667: ISAKMP:(0):Old State = IKE_I_MM3 New State = IKE_I_MM4
*Mar 18 14:21:04.667: ISAKMP:(0): processing KE payload. message ID = 0
*Mar 18 14:21:04.671: ISAKMP:(0): processing NONCE payload. message ID = 0
*Mar 18 14:21:04.671: ISAKMP:(0):found peer pre-shared key matching 172.16.1.4
*Mar 18 14:21:04.671: ISAKMP:(2001): processing vendor id payload
*Mar 18 14:21:04.671: ISAKMP:(2001): vendor ID is Unity
*Mar 18 14:21:04.671: ISAKMP:(2001): processing vendor id payload
*Mar 18 14:21:04.671: ISAKMP:(2001): vendor ID is DPD
*Mar 18 14:21:04.671: ISAKMP:(2001): processing vendor id payload
*Mar 18 14:21:04.671: ISAKMP:(2001): speaking to another IOS box!
*Mar 18 14:21:04.671: ISAKMP:received payload type 20
*Mar 18 14:21:04.671: ISAKMP (2001): His hash no match - this node outside NAT
*Mar 18 14:21:04.671: ISAKMP:received payload type 20
*Mar 18 14:21:04.671: ISAKMP (2001): No NAT Found for self or peer
*Mar 18 14:21:04.671: ISAKMP:(2001):Input = IKE_MESG_INTERNAL, IKE_PROCESS_MAIN_MODE
*Mar 18 14:21:04.671: ISAKMP:(2001):Old State = IKE_I_MM4 New State = IKE_I_MM4
*Mar 18 14:21:04.671: ISAKMP:(2001):Send initial contact
*Mar 18 14:21:04.671: ISAKMP:(2001):SA is doing pre-shared key authentication using id type ID_IPV4_ADDR
*Mar 18 14:21:04.671: ISAKMP (2001): ID payload
next-payload : 8
type : 1
address : 172.16.0.1
protocol : 17
port : 500
length : 12
*Mar 18 14:21:04.671: ISAKMP:(2001):Total payload length: 12
*Mar 18 14:21:04.671: ISAKMP:(2001): sending packet to 172.16.1.4 my_port 500 peer_port 500 (I) MM_KEY_EXCH
*Mar 18 14:21:04.671: ISAKMP:(2001):Sending an IKE IPv4 Packet.
*Mar 18 14:21:04.671: ISAKMP:(2001):Input = IKE_MESG_INTERNAL, IKE_PROCESS_COMPLETE
*Mar 18 14:21:04.671: ISAKMP:(2001):Old State = IKE_I_MM4 New State = IKE_I_MM5
*Mar 18 14:21:04.675: ISAKMP (2001): received packet from 172.16.1.4 dport 500 sport 500 Global (I) MM_KEY_EXCH
*Mar 18 14:21:04.675: ISAKMP:(2001): processing ID payload. message ID = 0
*Mar 18 14:21:04.675: ISAKMP (2001): ID payload
next-payload : 8
type : 1
address : 172.16.1.4
protocol : 17
port : 500
length : 12
*Mar 18 14:21:04.675: ISAKMP:(0):: peer matches *none* of the profiles
*Mar 18 14:21:04.675: ISAKMP:(2001): processing HASH payload. message ID = 0
*Mar 18 14:21:04.675: ISAKMP:(2001):SA authentication status:
authenticated
*Mar 18 14:21:04.675: ISAKMP:(2001):SA has been authenticated with 172.16.1.4
*Mar 18 14:21:04.675: ISAKMP: Trying to insert a peer 172.16.0.1/172.16.1.4/500/, and inserted successfully 361D584.
*Mar 18 14:21:04.675: ISAKMP:(2001):Input = IKE_MESG_FROM_PEER, IKE_MM_EXCH
*Mar 18 14:21:04.675: ISAKMP:(2001):Old State = IKE_I_MM5 New State = IKE_I_MM6
*Mar 18 14:21:04.675: ISAKMP:(2001):Input = IKE_MESG_INTERNAL, IKE_PROCESS_MAIN_MODE
*Mar 18 14:21:04.675: ISAKMP:(2001):Old State = IKE_I_MM6 New State = IKE_I_MM6
*Mar 18 14:21:04.675: ISAKMP:(2001):Input = IKE_MESG_INTERNAL, IKE_PROCESS_COMPLETE
*Mar 18 14:21:04.675: ISAKMP:(2001):Old State = IKE_I_MM6 New State = IKE_P1_COMPLETE
*Mar 18 14:21:04.675: ISAKMP:(2001):IKE_DPD is enabled, initializing timers
*Mar 18 14:21:04.675: ISAKMP:(2001):beginning Quick Mode exchange, M-ID of 332082047
*Mar 18 14:21:04.675: ISAKMP:(2001):QM Initiator gets spi
*Mar 18 14:21:04.675: ISAKMP:(2001): sending packet to 172.16.1.4 my_port 500 peer_port 500 (I) QM_IDLE
*Mar 18 14:21:04.675: ISAKMP:(2001):Sending an IKE IPv4 Packet.
*Mar 18 14:21:04.675: ISAKMP:(2001):Node 332082047, Input = IKE_MESG_INTERNAL, IKE_INIT_QM
*Mar 18 14:21:04.675: ISAKMP:(2001):Old State = IKE_QM_READY New State = IKE_QM_I_QM1
*Mar 18 14:21:04.675: ISAKMP:(2001):Input = IKE_MESG_INTERNAL, IKE_PHASE1_COMPLETE
*Mar 18 14:21:04.675: ISAKMP:(2001):Old State = IKE_P1_COMPLETE New State = IKE_P1_COMPLETE
*Mar 18 14:21:04.679: ISAKMP (2001): received packet from 172.16.1.4 dport 500 sport 500 Global (I) QM_IDLE
*Mar 18 14:21:04.679: ISAKMP:(2001): processing HASH payload. message ID = 332082047
*Mar 18 14:21:04.679: ISAKMP:(2001): processing SA payload. message ID = 332082047
*Mar 18 14:21:04.679: ISAKMP:(2001):Checking IPSec proposal 1
*Mar 18 14:21:04.679: ISAKMP: transform 1, ESP_3DES
*Mar 18 14:21:04.679: ISAKMP: attributes in transform:
*Mar 18 14:21:04.679: ISAKMP: encaps is 2 (Transport)
*Mar 18 14:21:04.679: ISAKMP: SA life type in seconds
*Mar 18 14:21:04.679: ISAKMP: SA life duration (basic) of 3600
*Mar 18 14:21:04.679: ISAKMP: SA life type in kilobytes
*Mar 18 14:21:04.679: ISAKMP: SA life duration (VPI) of 0x0 0x46 0x50 0x0
*Mar 18 14:21:04.679: ISAKMP: authenticator is HMAC-MD5
*Mar 18 14:21:04.679: ISAKMP:(2001):atts are acceptable.
*Mar 18 14:21:04.679: IPSEC(validate_proposal_request): proposal part #1
*Mar 18 14:21:04.679: IPSEC(validate_proposal_request): proposal part #1,
(key eng. msg.) INBOUND local= 172.16.0.1:0, remote= 172.16.1.4:0,
local_proxy= 172.16.0.1/255.255.255.255/47/0,
remote_proxy= 172.16.1.4/255.255.255.255/47/0,
protocol= ESP, transform= esp-3des esp-md5-hmac (Transport),
lifedur= 0s and 0kb,
spi= 0x0(0), conn_id= 0, keysize= 0, flags= 0x0
*Mar 18 14:21:04.679: Crypto mapdb : proxy_match
src addr : 172.16.0.1
dst addr : 172.16.1.4
protocol : 47
src port : 0
dst port : 0
*Mar 18 14:21:04.679: (ipsec_process_proposal)Map Accepted: Crypto-ipsec-map, 1
*Mar 18 14:21:04.679: ISAKMP:(2001): processing NONCE payload. message ID = 332082047
*Mar 18 14:21:04.679: ISAKMP:(2001): processing ID payload. message ID = 332082047
*Mar 18 14:21:04.679: ISAKMP:(2001): processing ID payload. message ID = 332082047
*Mar 18 14:21:04.683: ISAKMP:(2001):Node 332082047, Input = IKE_MESG_FROM_PEER, IKE_QM_EXCH
*Mar 18 14:21:04.683: ISAKMP:(2001):Old State = IKE_QM_I_QM1 New State = IKE_QM_IPSEC_INSTALL_AWAIT
*Mar 18 14:21:04.683: IPSEC(key_engine): got a queue event with 1 KMI message(s)
*Mar 18 14:21:04.683: Crypto mapdb : proxy_match
src addr : 172.16.0.1
dst addr : 172.16.1.4
protocol : 47
src port : 0
dst port : 0
*Mar 18 14:21:04.683: IPSEC(crypto_ipsec_create_ipsec_sas): Map found Crypto-ipsec-map, 1
*Mar 18 14:21:04.683: IPSEC(crypto_ipsec_sa_find_ident_head): reconnecting with the same proxies and peer 172.16.1.4
*Mar 18 14:21:04.683: IPSEC(create_sa): sa created,
(sa) sa_dest= 172.16.0.1, sa_proto= 50,
sa_spi= 0x8CAB6047(2360041543),
sa_trans= esp-3des esp-md5-hmac , sa_conn_id= 1
sa_lifetime(k/sec)= (4608000/3600),
(identity) local= 172.16.0.1:0, remote= 172.16.1.4:0,
local_proxy= 172.16.0.1/255.255.255.255/47/0,
remote_proxy= 172.16.1.4/255.255.255.255/47/0
*Mar 18 14:21:04.683: IPSEC(create_sa): sa created,
(sa) sa_dest= 172.16.1.4, sa_proto= 50,
sa_spi= 0x9ECCD2E2(2664223458),
sa_trans= esp-3des esp-md5-hmac , sa_conn_id= 2
sa_lifetime(k/sec)= (4608000/3600),
(identity) local= 172.16.0.1:0, remote= 172.16.1.4:0,
local_proxy= 172.16.0.1/255.255.255.255/47/0,
remote_proxy= 172.16.1.4/255.255.255.255/47/0
*Mar 18 14:21:04.683: IPSEC: Expand action denied, notify RP
*Mar 18 14:21:04.683: ISAKMP: Failed to find peer index node to update peer_info_list
*Mar 18 14:21:04.683: ISAKMP:(2001):Received IPSec Install callback... proceeding with the negotiation
*Mar 18 14:21:04.683: ISAKMP:(2001):Successfully installed IPSEC SA (SPI:0x8CAB6047) on GigabitEthernet8
*Mar 18 14:21:04.683: ISAKMP:(2001): sending packet to 172.16.1.4 my_port 500 peer_port 500 (I) QM_IDLE
*Mar 18 14:21:04.683: ISAKMP:(2001):Sending an IKE IPv4 Packet.
*Mar 18 14:21:04.683: ISAKMP:(2001):deleting node 332082047 error FALSE reason "No Error"
*Mar 18 14:21:04.683: ISAKMP:(2001):Node 332082047, Input = IKE_MESG_FROM_IPSEC, IPSEC_INSTALL_DONE
*Mar 18 14:21:04.683: ISAKMP:(2001):Old State = IKE_QM_IPSEC_INSTALL_AWAIT New State = IKE_QM_PHASE2_COMPLETE
*Mar 18 14:21:14.675: ISAKMP: set new node 1259728541 to QM_IDLE
*Mar 18 14:21:14.675: ISAKMP:(2001):Sending NOTIFY DPD/R_U_THERE protocol 1
spi 54704528, message ID = 1259728541
*Mar 18 14:21:14.675: ISAKMP:(2001): seq. no 0x63071F96
*Mar 18 14:21:14.675: ISAKMP:(2001): sending packet to 172.16.1.4 my_port 500 peer_port 500 (I) QM_IDLE
*Mar 18 14:21:14.675: ISAKMP:(2001):Sending an IKE IPv4 Packet.
*Mar 18 14:21:14.675: ISAKMP:(2001):purging node 1259728541
*Mar 18 14:21:14.675: ISAKMP:(2001):Input = IKE_MESG_FROM_TIMER, IKE_TIMER_IM_ALIVE
*Mar 18 14:21:14.675: ISAKMP:(2001):Old State = IKE_P1_COMPLETE New State = IKE_P1_COMPLETE
*Mar 18 14:21:14.675: ISAKMP (2001): received packet from 172.16.1.4 dport 500 sport 500 Global (I) QM_IDLE
*Mar 18 14:21:14.675: ISAKMP: set new node 1588210084 to QM_IDLE
*Mar 18 14:21:14.675: ISAKMP:(2001): processing HASH payload. message ID = 1588210084
*Mar 18 14:21:14.675: ISAKMP:(2001): processing NOTIFY DPD/R_U_THERE protocol 1
spi 0, message ID = 1588210084, sa = 0x2B8128C
*Mar 18 14:21:14.675: ISAKMP:(2001):deleting node 1588210084 error FALSE reason "Informational (in) state 1"
*Mar 18 14:21:14.675: ISAKMP:(2001):Input = IKE_MESG_FROM_PEER, IKE_INFO_NOTIFY
*Mar 18 14:21:14.675: ISAKMP:(2001):Old State = IKE_P1_COMPLETE New State = IKE_P1_COMPLETE
*Mar 18 14:21:14.675: ISAKMP:(2001):DPD/R_U_THERE received from peer 172.16.1.4, sequence 0x33508612
*Mar 18 14:21:14.675: ISAKMP: set new node -477532072 to QM_IDLE
*Mar 18 14:21:14.675: ISAKMP:(2001):Sending NOTIFY DPD/R_U_THERE_ACK protocol 1
spi 54704456, message ID = 3817435224
*Mar 18 14:21:14.675: ISAKMP:(2001): seq. no 0x33508612
*Mar 18 14:21:14.675: ISAKMP:(2001): sending packet to 172.16.1.4 my_port 500 peer_port 500 (I) QM_IDLE
*Mar 18 14:21:14.675: ISAKMP:(2001):Sending an IKE IPv4 Packet.
*Mar 18 14:21:14.675: ISAKMP:(2001):purging node -477532072
*Mar 18 14:21:14.675: ISAKMP:(2001):Input = IKE_MESG_FROM_PEER, IKE_MESG_KEEP_ALIVE
*Mar 18 14:21:14.675: ISAKMP:(2001):Old State = IKE_P1_COMPLETE New State = IKE_P1_COMPLETE
*Mar 18 14:21:14.675: ISAKMP (2001): received packet from 172.16.1.4 dport 500 sport 500 Global (I) QM_IDLE
*Mar 18 14:21:14.675: ISAKMP: set new node 1680226564 to QM_IDLE
*Mar 18 14:21:14.675: ISAKMP:(2001): processing HASH payload. message ID = 1680226564
*Mar 18 14:21:14.675: ISAKMP:(2001): processing NOTIFY DPD/R_U_THERE_ACK protocol 1
spi 0, message ID = 1680226564, sa = 0x2B8128C
*Mar 18 14:21:14.675: ISAKMP:(2001): DPD/R_U_THERE_ACK received from peer 172.16.1.4, sequence 0x63071F96
*Mar 18 14:21:14.675: ISAKMP:(2001):deleting node 1680226564 error FALSE reason "Informational (in) state 1"
*Mar 18 14:21:14.675: ISAKMP:(2001):Input = IKE_MESG_FROM_PEER, IKE_INFO_NOTIFY
*Mar 18 14:21:14.675: ISAKMP:(2001):Old State = IKE_P1_COMPLETE New State = IKE_P1_COMPLETE
*Mar 18 14:21:17.155: ISAKMP (2001): received packet from 172.16.1.4 dport 500 sport 500 Global (I) QM_IDLE
*Mar 18 14:21:17.155: ISAKMP: set new node -1091190389 to QM_IDLE
*Mar 18 14:21:17.155: ISAKMP:(2001): processing HASH payload. message ID = 3203776907
*Mar 18 14:21:17.155: ISAKMP:(2001): processing NOTIFY DPD/R_U_THERE protocol 1
spi 0, message ID = 3203776907, sa = 0x2B8128C
*Mar 18 14:21:17.155: ISAKMP:(2001):deleting node -1091190389 error FALSE reason "Informational (in) state 1"
*Mar 18 14:21:17.155: ISAKMP:(2001):Input = IKE_MESG_FROM_PEER, IKE_INFO_NOTIFY
*Mar 18 14:21:17.155: ISAKMP:(2001):Old State = IKE_P1_COMPLETE New State = IKE_P1_COMPLETE
*Mar 18 14:21:17.155: ISAKMP:(2001):DPD/R_U_THERE received from peer 172.16.1.4, sequence 0x33508613
*Mar 18 14:21:17.155: ISAKMP: set new node 705161519 to QM_IDLE
*Mar 18 14:21:17.155: ISAKMP:(2001):Sending NOTIFY DPD/R_U_THERE_ACK protocol 1
spi 54704456, message ID = 705161519
*Mar 18 14:21:17.155: ISAKMP:(2001): seq. no 0x33508613
*Mar 18 14:21:17.155: ISAKMP:(2001): sending packet to 172.16.1.4 my_port 500 peer_port 500 (I) QM_IDLE
*Mar 18 14:21:17.155: ISAKMP:(2001):Sending an IKE IPv4 Packet.
*Mar 18 14:21:17.155: ISAKMP:(2001):purging node 705161519
*Mar 18 14:21:17.155: ISAKMP:(2001):Input = IKE_MESG_FROM_PEER, IKE_MESG_KEEP_ALIVE
*Mar 18 14:21:17.155: ISAKMP:(2001):Old State = IKE_P1_COMPLETE New State = IKE_P1_COMPLETE
*Mar 18 14:21:24.563: ISAKMP: set new node 1225461111 to QM_IDLE
*Mar 18 14:21:24.563: ISAKMP:(2001):Sending NOTIFY DPD/R_U_THERE protocol 1
spi 54704528, message ID = 1225461111
*Mar 18 14:21:24.563: ISAKMP:(2001): seq. no 0x63071F97
*Mar 18 14:21:24.563: ISAKMP:(2001): sending packet to 172.16.1.4 my_port 500 peer_port 500 (I) QM_IDLE
*Mar 18 14:21:24.563: ISAKMP:(2001):Sending an IKE IPv4 Packet.
*Mar 18 14:21:24.563: ISAKMP:(2001):purging node 1225461111
*Mar 18 14:21:24.563: ISAKMP:(2001):Input = IKE_MESG_FROM_TIMER, IKE_TIMER_IM_ALIVE
*Mar 18 14:21:24.563: ISAKMP:(2001):Old State = IKE_P1_COMPLETE New State = IKE_P1_COMPLETE
*Mar 18 14:21:24.563: ISAKMP (2001): received packet from 172.16.1.4 dport 500 sport 500 Global (I) QM_IDLE
*Mar 18 14:21:24.563: ISAKMP: set new node -393489513 to QM_IDLE
*Mar 18 14:21:24.563: ISAKMP:(2001): processing HASH payload. message ID = 3901477783
*Mar 18 14:21:24.563: ISAKMP:(2001): processing NOTIFY DPD/R_U_THERE_ACK protocol 1
spi 0, message ID = 3901477783, sa = 0x2B8128C
*Mar 18 14:21:24.563: ISAKMP:(2001): DPD/R_U_THERE_ACK received from peer 172.16.1.4, sequence 0x63071F97
*Mar 18 14:21:24.563: ISAKMP:(2001):deleting node -393489513 error FALSE reason "Informational (in) state 1"
*Mar 18 14:21:24.563: ISAKMP:(2001):Input = IKE_MESG_FROM_PEER, IKE_INFO_NOTIFY
*Mar 18 14:21:24.563: ISAKMP:(2001):Old State = IKE_P1_COMPLETE New State = IKE_P1_COMPLETE
*Mar 18 14:21:27.123: ISAKMP (2001): received packet from 172.16.1.4 dport 500 sport 500 Global (I) QM_IDLE
*Mar 18 14:21:27.123: ISAKMP: set new node 1011759196 to QM_IDLE
*Mar 18 14:21:27.123: ISAKMP:(2001): processing HASH payload. message ID = 1011759196
*Mar 18 14:21:27.123: ISAKMP:(2001): processing NOTIFY DPD/R_U_THERE protocol 1
spi 0, message ID = 1011759196, sa = 0x2B8128C
*Mar 18 14:21:27.123: ISAKMP:(2001):deleting node 1011759196 error FALSE reason "Informational (in) state 1"
*Mar 18 14:21:27.123: ISAKMP:(2001):Input = IKE_MESG_FROM_PEER, IKE_INFO_NOTIFY
*Mar 18 14:21:27.123: ISAKMP:(2001):Old State = IKE_P1_COMPLETE New State = IKE_P1_COMPLETE
*Mar 18 14:21:27.123: ISAKMP:(2001):DPD/R_U_THERE received from peer 172.16.1.4, sequence 0x33508614
*Mar 18 14:21:27.123: ISAKMP: set new node 142360442 to QM_IDLE
*Mar 18 14:21:27.123: ISAKMP:(2001):Sending NOTIFY DPD/R_U_THERE_ACK protocol 1
spi 54704456, message ID = 142360442
*Mar 18 14:21:27.123: ISAKMP:(2001): seq. no 0x33508614
*Mar 18 14:21:27.123: ISAKMP:(2001): sending packet to 172.16.1.4 my_port 500 peer_port 500 (I) QM_IDLE
*Mar 18 14:21:27.123: ISAKMP:(2001):Sending an IKE IPv4 Packet.
*Mar 18 14:21:27.123: ISAKMP:(2001):purging node 142360442
*Mar 18 14:21:27.123: ISAKMP:(2001):Input = IKE_MESG_FROM_PEER, IKE_MESG_KEEP_ALIVE
*Mar 18 14:21:27.123: ISAKMP:(2001):Old State = IKE_P1_COMPLETE New State = IKE_P1_COMPLETE
解除を忘れずに。下記で解除できます。
undebug all

