HostedDB - Dedicated UNIX Servers

index_173
UNCLASSIFIED Advanced Security Services  Version 1.0g  UNCLASSIFIED 173   North# 00:19:35: ISAKMP (1): beginning Quick Mode exchange, M-ID of 405257172 00:19:35: ISAKMP (1): sending packet to 7.12.1.29 (I) QM_IDLE 00:19:35: ISAKMP (1): received packet from 7.12.1.20 (I) QM_IDLE 00:19:35: ISAKMP (1): processing SA payload. message ID = 405257172 00:19:35: ISAKMP (1): Checking IPSec proposal 1 00:19:35: ISAKMP: transform 1, ESP_3DES 00:19:35: ISAKMP:   attributes in transform: 00:19:35: ISAKMP:      encaps is 1 00:19:35: ISAKMP:      SA life type in seconds 00:19:35: ISAKMP:      SA life duration (basic) of 3600 00:19:35: ISAKMP:      SA life type in kilobytes 00:19:35: ISAKMP:      SA life duration (VPI) of  0x0 0x46 0x50 0x0 00:19:35: ISAKMP:      authenticator is HMAC-SHA 00:19:35: ISAKMP (1): atts are acceptable. 00:19:35: ISAKMP (1): processing NONCE payload. message ID = 405257172 00:19:35: ISAKMP (1): processing ID payload. message ID = 405257172 00:19:35: ISAKMP (1): Creating IPSec SAs 00:19:35:         inbound SA from 7.12.1.20 to 14.2.0.20                       (proxy 7.12.1.20 to 14.2.0.20  ) 00:19:35:         has spi 59056543 and conn_id 4 and flags 4 00:19:35:         lifetime of 3600 seconds 00:19:35:         lifetime of 4608000 kilobytes 00:19:35:         outbound SA from 14.2.0.20 to 7.12.1.20                        (proxy  14.2.0.20 to 7.12.1.20  ) 00:19:35:         has spi 595658916 and conn_id 5 and flags 4 00:19:35:         lifetime of 3600 seconds 00:19:35:         lifetime of 4608000 kilobytes 00:19:35: ISAKMP (1): sending packet to 7.12.1.20 (I) QM_IDLE North# no debug all North# debug crypto ipsec Crypto IPSEC debugging is on North# ping 7.12.1.20 North# 4w0d: IPSEC(validate_proposal_request): proposal part #1,   (key eng. msg.) dest= 7.12.1.20, src= 14.2.0.20,     dest_proxy= 7.12.1.20/255.255.255.255/0/0 (type=1),     src_proxy= 14.2.0.20/255.255.255.255/0/0 (type=1),     protocol= ESP, transform= 3esp-des esp-sha-hmac ,     lifedur= 0s and 0kb,     spi= 0x0(0), conn_id= 0, keysize= 0, flags= 0x4 4w0d: IPSEC(key_engine): got a queue event... 4w0d: IPSEC(spi_response): getting spi 595658916 for SA         from 14.2.0.20   to 7.12.1.20    for prot 3 4w0d: IPSEC(key_engine): got a queue event... 4w0d: IPSEC(initialize_sas): ,