Support Forum
The Forums are a place to find answers on a range of Fortinet products from peers and product experts.
Liza1
New Contributor III

IPsec Remote Access VPN Problem Fortigate

Hello, I need your help. I'm trying to set up an IPsec remote access VPN on FortiGate for the first time. Unfortunately, when I try to connect, after clicking "Connect," it shows "timeout while connecting to IP address." I was following this guide.
https://community.fortinet.com/t5/FortiGate/Technical-Tip-How-to-configure-IPsec-remote-access-with-...
https://www.youtube.com/watch?v=diRUIQGnWqs

 

If you can, please help me — what could be the reason?

lsamson
lsamson
14 REPLIES 14
AEK
SuperUser
SuperUser

Hi Liza

On the remote FGT type this and try again.

diagnose vpn ike log-filter src-addr4 x.x.x.x
diagnose debug console timestamp enable
diagnose debug application ike -1
diagnose debug enable

Where x.x.x.x is the client public IP.

This should give you more information about the failure.

AEK
AEK
Liza1
New Contributor III

 # ike V=root:0: comes X.X.X.X:1068->X.X.X.X:500,ifindex=3,vrf=0,len=412....
ike V=root:0: IKEv1 exchange=Aggressive id=63bbeace24f33672/0000000000000000 len=412 vrf=0
ike 0: in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
ike V=root:0:63bbeace24f33672/0000000000000000:189: responder: aggressive mode get 1st message...
ike V=root:0:63bbeace24f33672/0000000000000000:189: VID CISCO-UNITY 12F5F28C457168A9702D9FE274CC0100
ike V=root:0:63bbeace24f33672/0000000000000000:189: VID RFC 3947 4A131C81070358455C5728F20E95452F
ike V=root:0:63bbeace24f33672/0000000000000000:189: VID draft-ietf-ipsec-nat-t-ike-02 CD60464335DF21F87CFDB2FC68B6A448
ike V=root:0:63bbeace24f33672/0000000000000000:189: VID draft-ietf-ipsec-nat-t-ike-02\n 90CB80913EBB696E086381B5EC427B1F
ike V=root:0:63bbeace24f33672/0000000000000000:189: VID draft-ietf-ipsra-isakmp-xauth-06.txt 09002689DFD6B712
ike V=root:0:63bbeace24f33672/0000000000000000:189: VID DPD AFCAD71368A1F1C96B8696FC77570100
ike V=root:0:63bbeace24f33672/0000000000000000:189: VID forticlient connect license 4C53427B6D465D1B337BB755A37A7FEF
ike V=root:0:63bbeace24f33672/0000000000000000:189: VID Fortinet Endpoint Control B4F01CA951E9DA8D0BAFBBD34AD3044E
ike V=root:0::189: peer identifier IPV4_ADDR 172.20.10.2
ike V=root:0: IKEv1 Aggressive, comes X.X.X.X:1068->X.X.X.X 3
ike V=root:0:63bbeace24f33672/0000000000000000:189: my proposal, gw Remote_access:
ike V=root:0:63bbeace24f33672/0000000000000000:189: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:189: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:189: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:189: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=128
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_HASH_ALG, val=SHA2_256.
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=AUTH_METHOD, val=PRESHARED_KEY_XAUTH_I.
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_GROUP, val=MODP2048.
ike V=root:0:63bbeace24f33672/0000000000000000:189: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:189: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:189: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:189: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:189: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=128
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_HASH_ALG, val=SHA2_256.
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=AUTH_METHOD, val=PRESHARED_KEY.
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_GROUP, val=MODP2048.
ike V=root:0:63bbeace24f33672/0000000000000000:189: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:189: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:189: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:189: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:189: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=128
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_HASH_ALG, val=SHA2_256.
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=AUTH_METHOD, val=PRESHARED_KEY_XAUTH_I.
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_GROUP, val=MODP1536.
ike V=root:0:63bbeace24f33672/0000000000000000:189: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:189: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:189: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:189: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:189: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=128
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_HASH_ALG, val=SHA2_256.
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=AUTH_METHOD, val=PRESHARED_KEY.
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_GROUP, val=MODP1536.
ike V=root:0:63bbeace24f33672/0000000000000000:189: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:189: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:189: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:189: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:189: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=256
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_HASH_ALG, val=SHA2_256.
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=AUTH_METHOD, val=PRESHARED_KEY_XAUTH_I.
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_GROUP, val=MODP2048.
ike V=root:0:63bbeace24f33672/0000000000000000:189: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:189: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:189: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:189: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:189: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=256
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_HASH_ALG, val=SHA2_256.
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=AUTH_METHOD, val=PRESHARED_KEY.
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_GROUP, val=MODP2048.
ike V=root:0:63bbeace24f33672/0000000000000000:189: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:189: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:189: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:189: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:189: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=256
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_HASH_ALG, val=SHA2_256.
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=AUTH_METHOD, val=PRESHARED_KEY_XAUTH_I.
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_GROUP, val=MODP1536.
ike V=root:0:63bbeace24f33672/0000000000000000:189: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:189: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:189: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:189: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:189: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=256
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_HASH_ALG, val=SHA2_256.
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=AUTH_METHOD, val=PRESHARED_KEY.
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_GROUP, val=MODP1536.
ike V=root:0:63bbeace24f33672/0000000000000000:189: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:189: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:189: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:189: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:189: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=128
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_HASH_ALG, val=SHA.
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=AUTH_METHOD, val=PRESHARED_KEY_XAUTH_I.
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_GROUP, val=MODP2048.
ike V=root:0:63bbeace24f33672/0000000000000000:189: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:189: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:189: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:189: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:189: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=128
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_HASH_ALG, val=SHA.
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=AUTH_METHOD, val=PRESHARED_KEY.
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_GROUP, val=MODP2048.
ike V=root:0:63bbeace24f33672/0000000000000000:189: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:189: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:189: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:189: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:189: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=128
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_HASH_ALG, val=SHA.
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=AUTH_METHOD, val=PRESHARED_KEY_XAUTH_I.
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_GROUP, val=MODP1536.
ike V=root:0:63bbeace24f33672/0000000000000000:189: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:189: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:189: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:189: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:189: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=128
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_HASH_ALG, val=SHA.
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=AUTH_METHOD, val=PRESHARED_KEY.
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_GROUP, val=MODP1536.
ike V=root:0:63bbeace24f33672/0000000000000000:189: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:189: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:189: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:189: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:189: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=256
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_HASH_ALG, val=SHA.
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=AUTH_METHOD, val=PRESHARED_KEY_XAUTH_I.
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_GROUP, val=MODP2048.
ike V=root:0:63bbeace24f33672/0000000000000000:189: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:189: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:189: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:189: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:189: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=256
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_HASH_ALG, val=SHA.
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=AUTH_METHOD, val=PRESHARED_KEY.
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_GROUP, val=MODP2048.
ike V=root:0:63bbeace24f33672/0000000000000000:189: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:189: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:189: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:189: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:189: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=256
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_HASH_ALG, val=SHA.
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=AUTH_METHOD, val=PRESHARED_KEY_XAUTH_I.
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_GROUP, val=MODP1536.
ike V=root:0:63bbeace24f33672/0000000000000000:189: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:189: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:189: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:189: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:189: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=256
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_HASH_ALG, val=SHA.
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=AUTH_METHOD, val=PRESHARED_KEY.
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_GROUP, val=MODP1536.
ike V=root:0:63bbeace24f33672/0000000000000000:189: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:189: incoming proposal:
ike V=root:0:63bbeace24f33672/0000000000000000:189: proposal id = 0:
ike V=root:0:63bbeace24f33672/0000000000000000:189: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:189: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:189: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=128
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_HASH_ALG, val=SHA.
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=AUTH_METHOD, val=PRESHARED_KEY.
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_GROUP, val=ECP384.
ike V=root:0:63bbeace24f33672/0000000000000000:189: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:189: proposal id = 0:
ike V=root:0:63bbeace24f33672/0000000000000000:189: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:189: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:189: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=256
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_HASH_ALG, val=SHA2_256.
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=AUTH_METHOD, val=PRESHARED_KEY.
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_GROUP, val=ECP384.
ike V=root:0:63bbeace24f33672/0000000000000000:189: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:189: negotiation failure
ike V=root:Negotiate ISAKMP SA Error:
ike V=root:0:63bbeace24f33672/0000000000000000:189: no SA proposal chosen
ike V=root:0: comes X.X.X.X:1068->X.X.X.X:500,ifindex=3,vrf=0,len=412....
ike V=root:0: IKEv1 exchange=Aggressive id=63bbeace24f33672/0000000000000000 len=412 vrf=0
ike 0: in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
ike V=root:0:63bbeace24f33672/0000000000000000:190: responder: aggressive mode get 1st message...
ike V=root:0:63bbeace24f33672/0000000000000000:190: VID CISCO-UNITY 12F5F28C457168A9702D9FE274CC0100
ike V=root:0:63bbeace24f33672/0000000000000000:190: VID RFC 3947 4A131C81070358455C5728F20E95452F
ike V=root:0:63bbeace24f33672/0000000000000000:190: VID draft-ietf-ipsec-nat-t-ike-02 CD60464335DF21F87CFDB2FC68B6A448
ike V=root:0:63bbeace24f33672/0000000000000000:190: VID draft-ietf-ipsec-nat-t-ike-02\n 90CB80913EBB696E086381B5EC427B1F
ike V=root:0:63bbeace24f33672/0000000000000000:190: VID draft-ietf-ipsra-isakmp-xauth-06.txt 09002689DFD6B712
ike V=root:0:63bbeace24f33672/0000000000000000:190: VID DPD AFCAD71368A1F1C96B8696FC77570100
ike V=root:0:63bbeace24f33672/0000000000000000:190: VID forticlient connect license 4C53427B6D465D1B337BB755A37A7FEF
ike V=root:0:63bbeace24f33672/0000000000000000:190: VID Fortinet Endpoint Control B4F01CA951E9DA8D0BAFBBD34AD3044E
ike V=root:0::190: peer identifier IPV4_ADDR 172.20.10.2
ike V=root:0: IKEv1 Aggressive, comes X.X.X.X:1068->X.X.X.X 3
ike V=root:0:63bbeace24f33672/0000000000000000:190: my proposal, gw Remote_access:
ike V=root:0:63bbeace24f33672/0000000000000000:190: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:190: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:190: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:190: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=128
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_HASH_ALG, val=SHA2_256.
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=AUTH_METHOD, val=PRESHARED_KEY_XAUTH_I.
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_GROUP, val=MODP2048.
ike V=root:0:63bbeace24f33672/0000000000000000:190: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:190: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:190: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:190: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:190: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=128
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_HASH_ALG, val=SHA2_256.
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=AUTH_METHOD, val=PRESHARED_KEY.
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_GROUP, val=MODP2048.
ike V=root:0:63bbeace24f33672/0000000000000000:190: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:190: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:190: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:190: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:190: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=128
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_HASH_ALG, val=SHA2_256.
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=AUTH_METHOD, val=PRESHARED_KEY_XAUTH_I.
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_GROUP, val=MODP1536.
ike V=root:0:63bbeace24f33672/0000000000000000:190: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:190: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:190: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:190: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:190: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=128
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_HASH_ALG, val=SHA2_256.
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=AUTH_METHOD, val=PRESHARED_KEY.
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_GROUP, val=MODP1536.
ike V=root:0:63bbeace24f33672/0000000000000000:190: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:190: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:190: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:190: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:190: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=256
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_HASH_ALG, val=SHA2_256.
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=AUTH_METHOD, val=PRESHARED_KEY_XAUTH_I.
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_GROUP, val=MODP2048.
ike V=root:0:63bbeace24f33672/0000000000000000:190: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:190: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:190: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:190: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:190: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=256
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_HASH_ALG, val=SHA2_256.
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=AUTH_METHOD, val=PRESHARED_KEY.
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_GROUP, val=MODP2048.
ike V=root:0:63bbeace24f33672/0000000000000000:190: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:190: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:190: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:190: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:190: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=256
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_HASH_ALG, val=SHA2_256.
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=AUTH_METHOD, val=PRESHARED_KEY_XAUTH_I.
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_GROUP, val=MODP1536.
ike V=root:0:63bbeace24f33672/0000000000000000:190: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:190: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:190: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:190: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:190: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=256
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_HASH_ALG, val=SHA2_256.
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=AUTH_METHOD, val=PRESHARED_KEY.
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_GROUP, val=MODP1536.
ike V=root:0:63bbeace24f33672/0000000000000000:190: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:190: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:190: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:190: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:190: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=128
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_HASH_ALG, val=SHA.
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=AUTH_METHOD, val=PRESHARED_KEY_XAUTH_I.
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_GROUP, val=MODP2048.
ike V=root:0:63bbeace24f33672/0000000000000000:190: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:190: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:190: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:190: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:190: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=128
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_HASH_ALG, val=SHA.
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=AUTH_METHOD, val=PRESHARED_KEY.
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_GROUP, val=MODP2048.
ike V=root:0:63bbeace24f33672/0000000000000000:190: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:190: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:190: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:190: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:190: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=128
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_HASH_ALG, val=SHA.
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=AUTH_METHOD, val=PRESHARED_KEY_XAUTH_I.
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_GROUP, val=MODP1536.
ike V=root:0:63bbeace24f33672/0000000000000000:190: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:190: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:190: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:190: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:190: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=128
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_HASH_ALG, val=SHA.
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=AUTH_METHOD, val=PRESHARED_KEY.
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_GROUP, val=MODP1536.
ike V=root:0:63bbeace24f33672/0000000000000000:190: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:190: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:190: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:190: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:190: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=256
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_HASH_ALG, val=SHA.
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=AUTH_METHOD, val=PRESHARED_KEY_XAUTH_I.
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_GROUP, val=MODP2048.
ike V=root:0:63bbeace24f33672/0000000000000000:190: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:190: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:190: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:190: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:190: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=256
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_HASH_ALG, val=SHA.
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=AUTH_METHOD, val=PRESHARED_KEY.
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_GROUP, val=MODP2048.
ike V=root:0:63bbeace24f33672/0000000000000000:190: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:190: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:190: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:190: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:190: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=256
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_HASH_ALG, val=SHA.
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=AUTH_METHOD, val=PRESHARED_KEY_XAUTH_I.
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_GROUP, val=MODP1536.
ike V=root:0:63bbeace24f33672/0000000000000000:190: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:190: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:190: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:190: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:190: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=256
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_HASH_ALG, val=SHA.
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=AUTH_METHOD, val=PRESHARED_KEY.
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_GROUP, val=MODP1536.
ike V=root:0:63bbeace24f33672/0000000000000000:190: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:190: incoming proposal:
ike V=root:0:63bbeace24f33672/0000000000000000:190: proposal id = 0:
ike V=root:0:63bbeace24f33672/0000000000000000:190: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:190: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:190: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=128
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_HASH_ALG, val=SHA.
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=AUTH_METHOD, val=PRESHARED_KEY.
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_GROUP, val=ECP384.
ike V=root:0:63bbeace24f33672/0000000000000000:190: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:190: proposal id = 0:
ike V=root:0:63bbeace24f33672/0000000000000000:190: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:190: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:190: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=256
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_HASH_ALG, val=SHA2_256.
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=AUTH_METHOD, val=PRESHARED_KEY.
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_GROUP, val=ECP384.
ike V=root:0:63bbeace24f33672/0000000000000000:190: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:190: negotiation failure
ike V=root:Negotiate ISAKMP SA Error:
ike V=root:0:63bbeace24f33672/0000000000000000:190: no SA proposal chosen
ike V=root:0: comes X.X.X.X:1068->X.X.X.X:500,ifindex=3,vrf=0,len=412....
ike V=root:0: IKEv1 exchange=Aggressive id=63bbeace24f33672/0000000000000000 len=412 vrf=0
ike 0: in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
ike V=root:0:63bbeace24f33672/0000000000000000:191: responder: aggressive mode get 1st message...
ike V=root:0:63bbeace24f33672/0000000000000000:191: VID CISCO-UNITY 12F5F28C457168A9702D9FE274CC0100
ike V=root:0:63bbeace24f33672/0000000000000000:191: VID RFC 3947 4A131C81070358455C5728F20E95452F
ike V=root:0:63bbeace24f33672/0000000000000000:191: VID draft-ietf-ipsec-nat-t-ike-02 CD60464335DF21F87CFDB2FC68B6A448
ike V=root:0:63bbeace24f33672/0000000000000000:191: VID draft-ietf-ipsec-nat-t-ike-02\n 90CB80913EBB696E086381B5EC427B1F
ike V=root:0:63bbeace24f33672/0000000000000000:191: VID draft-ietf-ipsra-isakmp-xauth-06.txt 09002689DFD6B712
ike V=root:0:63bbeace24f33672/0000000000000000:191: VID DPD AFCAD71368A1F1C96B8696FC77570100
ike V=root:0:63bbeace24f33672/0000000000000000:191: VID forticlient connect license 4C53427B6D465D1B337BB755A37A7FEF
ike V=root:0:63bbeace24f33672/0000000000000000:191: VID Fortinet Endpoint Control B4F01CA951E9DA8D0BAFBBD34AD3044E
ike V=root:0::191: peer identifier IPV4_ADDR 172.20.10.2
ike V=root:0: IKEv1 Aggressive, comes X.X.X.X:1068->X.X.X.X 3
ike V=root:0:63bbeace24f33672/0000000000000000:191: my proposal, gw Remote_access:
ike V=root:0:63bbeace24f33672/0000000000000000:191: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:191: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:191: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:191: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=128
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_HASH_ALG, val=SHA2_256.
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=AUTH_METHOD, val=PRESHARED_KEY_XAUTH_I.
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_GROUP, val=MODP2048.
ike V=root:0:63bbeace24f33672/0000000000000000:191: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:191: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:191: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:191: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:191: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=128
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_HASH_ALG, val=SHA2_256.
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=AUTH_METHOD, val=PRESHARED_KEY.
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_GROUP, val=MODP2048.
ike V=root:0:63bbeace24f33672/0000000000000000:191: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:191: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:191: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:191: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:191: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=128
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_HASH_ALG, val=SHA2_256.
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=AUTH_METHOD, val=PRESHARED_KEY_XAUTH_I.
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_GROUP, val=MODP1536.
ike V=root:0:63bbeace24f33672/0000000000000000:191: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:191: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:191: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:191: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:191: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=128
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_HASH_ALG, val=SHA2_256.
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=AUTH_METHOD, val=PRESHARED_KEY.
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_GROUP, val=MODP1536.
ike V=root:0:63bbeace24f33672/0000000000000000:191: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:191: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:191: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:191: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:191: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=256
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_HASH_ALG, val=SHA2_256.
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=AUTH_METHOD, val=PRESHARED_KEY_XAUTH_I.
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_GROUP, val=MODP2048.
ike V=root:0:63bbeace24f33672/0000000000000000:191: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:191: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:191: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:191: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:191: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=256
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_HASH_ALG, val=SHA2_256.
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=AUTH_METHOD, val=PRESHARED_KEY.
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_GROUP, val=MODP2048.
ike V=root:0:63bbeace24f33672/0000000000000000:191: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:191: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:191: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:191: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:191: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=256
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_HASH_ALG, val=SHA2_256.
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=AUTH_METHOD, val=PRESHARED_KEY_XAUTH_I.
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_GROUP, val=MODP1536.
ike V=root:0:63bbeace24f33672/0000000000000000:191: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:191: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:191: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:191: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:191: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=256
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_HASH_ALG, val=SHA2_256.
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=AUTH_METHOD, val=PRESHARED_KEY.
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_GROUP, val=MODP1536.
ike V=root:0:63bbeace24f33672/0000000000000000:191: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:191: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:191: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:191: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:191: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=128
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_HASH_ALG, val=SHA.
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=AUTH_METHOD, val=PRESHARED_KEY_XAUTH_I.
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_GROUP, val=MODP2048.
ike V=root:0:63bbeace24f33672/0000000000000000:191: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:191: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:191: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:191: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:191: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=128
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_HASH_ALG, val=SHA.
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=AUTH_METHOD, val=PRESHARED_KEY.
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_GROUP, val=MODP2048.
ike V=root:0:63bbeace24f33672/0000000000000000:191: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:191: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:191: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:191: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:191: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=128
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_HASH_ALG, val=SHA.
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=AUTH_METHOD, val=PRESHARED_KEY_XAUTH_I.
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_GROUP, val=MODP1536.
ike V=root:0:63bbeace24f33672/0000000000000000:191: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:191: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:191: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:191: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:191: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=128
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_HASH_ALG, val=SHA.
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=AUTH_METHOD, val=PRESHARED_KEY.
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_GROUP, val=MODP1536.
ike V=root:0:63bbeace24f33672/0000000000000000:191: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:191: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:191: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:191: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:191: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=256
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_HASH_ALG, val=SHA.
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=AUTH_METHOD, val=PRESHARED_KEY_XAUTH_I.
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_GROUP, val=MODP2048.
ike V=root:0:63bbeace24f33672/0000000000000000:191: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:191: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:191: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:191: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:191: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=256
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_HASH_ALG, val=SHA.
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=AUTH_METHOD, val=PRESHARED_KEY.
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_GROUP, val=MODP2048.
ike V=root:0:63bbeace24f33672/0000000000000000:191: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:191: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:191: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:191: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:191: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=256
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_HASH_ALG, val=SHA.
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=AUTH_METHOD, val=PRESHARED_KEY_XAUTH_I.
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_GROUP, val=MODP1536.
ike V=root:0:63bbeace24f33672/0000000000000000:191: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:191: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:191: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:191: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:191: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=256
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_HASH_ALG, val=SHA.
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=AUTH_METHOD, val=PRESHARED_KEY.
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_GROUP, val=MODP1536.
ike V=root:0:63bbeace24f33672/0000000000000000:191: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:191: incoming proposal:
ike V=root:0:63bbeace24f33672/0000000000000000:191: proposal id = 0:
ike V=root:0:63bbeace24f33672/0000000000000000:191: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:191: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:191: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=128
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_HASH_ALG, val=SHA.
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=AUTH_METHOD, val=PRESHARED_KEY.
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_GROUP, val=ECP384.
ike V=root:0:63bbeace24f33672/0000000000000000:191: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:191: proposal id = 0:
ike V=root:0:63bbeace24f33672/0000000000000000:191: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:191: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:191: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=256
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_HASH_ALG, val=SHA2_256.
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=AUTH_METHOD, val=PRESHARED_KEY.
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_GROUP, val=ECP384.
ike V=root:0:63bbeace24f33672/0000000000000000:191: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:191: negotiation failure
ike V=root:Negotiate ISAKMP SA Error:
ike V=root:0:63bbeace24f33672/0000000000000000:191: no SA proposal chosen
ike V=root:0: comes X.X.X.X:1068->X.X.X.X5:500,ifindex=3,vrf=0,len=412....
ike V=root:0: IKEv1 exchange=Aggressive id=63bbeace24f33672/0000000000000000 len=412 vrf=0
ike 0: in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
ike V=root:0:63bbeace24f33672/0000000000000000:192: responder: aggressive mode get 1st message...
ike V=root:0:63bbeace24f33672/0000000000000000:192: VID CISCO-UNITY 12F5F28C457168A9702D9FE274CC0100
ike V=root:0:63bbeace24f33672/0000000000000000:192: VID RFC 3947 4A131C81070358455C5728F20E95452F
ike V=root:0:63bbeace24f33672/0000000000000000:192: VID draft-ietf-ipsec-nat-t-ike-02 CD60464335DF21F87CFDB2FC68B6A448
ike V=root:0:63bbeace24f33672/0000000000000000:192: VID draft-ietf-ipsec-nat-t-ike-02\n 90CB80913EBB696E086381B5EC427B1F
ike V=root:0:63bbeace24f33672/0000000000000000:192: VID draft-ietf-ipsra-isakmp-xauth-06.txt 09002689DFD6B712
ike V=root:0:63bbeace24f33672/0000000000000000:192: VID DPD AFCAD71368A1F1C96B8696FC77570100
ike V=root:0:63bbeace24f33672/0000000000000000:192: VID forticlient connect license 4C53427B6D465D1B337BB755A37A7FEF
ike V=root:0:63bbeace24f33672/0000000000000000:192: VID Fortinet Endpoint Control B4F01CA951E9DA8D0BAFBBD34AD3044E
ike V=root:0::192: peer identifier IPV4_ADDR 172.20.10.2
ike V=root:0: IKEv1 Aggressive, comes X.X.X.X:1068->X.X.X.X 3
ike V=root:0:63bbeace24f33672/0000000000000000:192: my proposal, gw Remote_access:
ike V=root:0:63bbeace24f33672/0000000000000000:192: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:192: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:192: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:192: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=128
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_HASH_ALG, val=SHA2_256.
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=AUTH_METHOD, val=PRESHARED_KEY_XAUTH_I.
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_GROUP, val=MODP2048.
ike V=root:0:63bbeace24f33672/0000000000000000:192: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:192: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:192: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:192: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:192: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=128
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_HASH_ALG, val=SHA2_256.
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=AUTH_METHOD, val=PRESHARED_KEY.
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_GROUP, val=MODP2048.
ike V=root:0:63bbeace24f33672/0000000000000000:192: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:192: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:192: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:192: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:192: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=128
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_HASH_ALG, val=SHA2_256.
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=AUTH_METHOD, val=PRESHARED_KEY_XAUTH_I.
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_GROUP, val=MODP1536.
ike V=root:0:63bbeace24f33672/0000000000000000:192: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:192: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:192: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:192: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:192: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=128
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_HASH_ALG, val=SHA2_256.
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=AUTH_METHOD, val=PRESHARED_KEY.
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_GROUP, val=MODP1536.
ike V=root:0:63bbeace24f33672/0000000000000000:192: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:192: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:192: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:192: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:192: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=256
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_HASH_ALG, val=SHA2_256.
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=AUTH_METHOD, val=PRESHARED_KEY_XAUTH_I.
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_GROUP, val=MODP2048.
ike V=root:0:63bbeace24f33672/0000000000000000:192: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:192: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:192: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:192: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:192: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=256
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_HASH_ALG, val=SHA2_256.
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=AUTH_METHOD, val=PRESHARED_KEY.
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_GROUP, val=MODP2048.
ike V=root:0:63bbeace24f33672/0000000000000000:192: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:192: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:192: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:192: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:192: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=256
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_HASH_ALG, val=SHA2_256.
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=AUTH_METHOD, val=PRESHARED_KEY_XAUTH_I.
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_GROUP, val=MODP1536.
ike V=root:0:63bbeace24f33672/0000000000000000:192: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:192: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:192: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:192: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:192: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=256
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_HASH_ALG, val=SHA2_256.
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=AUTH_METHOD, val=PRESHARED_KEY.
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_GROUP, val=MODP1536.
ike V=root:0:63bbeace24f33672/0000000000000000:192: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:192: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:192: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:192: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:192: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=128
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_HASH_ALG, val=SHA.
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=AUTH_METHOD, val=PRESHARED_KEY_XAUTH_I.
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_GROUP, val=MODP2048.
ike V=root:0:63bbeace24f33672/0000000000000000:192: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:192: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:192: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:192: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:192: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=128
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_HASH_ALG, val=SHA.
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=AUTH_METHOD, val=PRESHARED_KEY.
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_GROUP, val=MODP2048.
ike V=root:0:63bbeace24f33672/0000000000000000:192: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:192: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:192: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:192: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:192: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=128
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_HASH_ALG, val=SHA.
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=AUTH_METHOD, val=PRESHARED_KEY_XAUTH_I.
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_GROUP, val=MODP1536.
ike V=root:0:63bbeace24f33672/0000000000000000:192: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:192: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:192: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:192: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:192: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=128
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_HASH_ALG, val=SHA.
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=AUTH_METHOD, val=PRESHARED_KEY.
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_GROUP, val=MODP1536.
ike V=root:0:63bbeace24f33672/0000000000000000:192: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:192: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:192: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:192: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:192: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=256
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_HASH_ALG, val=SHA.
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=AUTH_METHOD, val=PRESHARED_KEY_XAUTH_I.
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_GROUP, val=MODP2048.
ike V=root:0:63bbeace24f33672/0000000000000000:192: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:192: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:192: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:192: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:192: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=256
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_HASH_ALG, val=SHA.
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=AUTH_METHOD, val=PRESHARED_KEY.
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_GROUP, val=MODP2048.
ike V=root:0:63bbeace24f33672/0000000000000000:192: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:192: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:192: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:192: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:192: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=256
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_HASH_ALG, val=SHA.
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=AUTH_METHOD, val=PRESHARED_KEY_XAUTH_I.
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_GROUP, val=MODP1536.
ike V=root:0:63bbeace24f33672/0000000000000000:192: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:192: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:192: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:192: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:192: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=256
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_HASH_ALG, val=SHA.
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=AUTH_METHOD, val=PRESHARED_KEY.
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_GROUP, val=MODP1536.
ike V=root:0:63bbeace24f33672/0000000000000000:192: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:192: incoming proposal:
ike V=root:0:63bbeace24f33672/0000000000000000:192: proposal id = 0:
ike V=root:0:63bbeace24f33672/0000000000000000:192: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:192: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:192: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=128
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_HASH_ALG, val=SHA.
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=AUTH_METHOD, val=PRESHARED_KEY.
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_GROUP, val=ECP384.
ike V=root:0:63bbeace24f33672/0000000000000000:192: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:192: proposal id = 0:
ike V=root:0:63bbeace24f33672/0000000000000000:192: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:192: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:192: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=256
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_HASH_ALG, val=SHA2_256.
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=AUTH_METHOD, val=PRESHARED_KEY.
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_GROUP, val=ECP384.
ike V=root:0:63bbeace24f33672/0000000000000000:192: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:192: negotiation failure
ike V=root:Negotiate ISAKMP SA Error:
ike V=root:0:63bbeace24f33672/0000000000000000:192: no SA proposal chosen
ike :shrank heap by 159744 bytes

lsamson
lsamson
atahir
Staff
Staff

You need to verify four configuration points: Phase 1Phase 2Firewall Policy, and Routing.
Use IKE debug commands to gather data for IPsec Phase 1 and Phase 2.
Ping can help you check reachability, and finally, you can run a debug flow to verify how IPsec packets are being processed.

# diagnose debug flow filter clear

# diagnose debug flow filter dport <port>

# diagnose debug flow filter addr <IP address>

# diagnose debug flow trace start <count>

# diagnose debug enable

AT
Liza1
New Contributor III

this is debug infomation
 ike V=root:0: comes X.X.X.X:1068->X.X.X.X:500,ifindex=3,vrf=0,len=412....
ike V=root:0: IKEv1 exchange=Aggressive id=63bbeace24f33672/0000000000000000 len=412 vrf=0
ike 0: in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
ike V=root:0:63bbeace24f33672/0000000000000000:189: responder: aggressive mode get 1st message...
ike V=root:0:63bbeace24f33672/0000000000000000:189: VID CISCO-UNITY 12F5F28C457168A9702D9FE274CC0100
ike V=root:0:63bbeace24f33672/0000000000000000:189: VID RFC 3947 4A131C81070358455C5728F20E95452F
ike V=root:0:63bbeace24f33672/0000000000000000:189: VID draft-ietf-ipsec-nat-t-ike-02 CD60464335DF21F87CFDB2FC68B6A448
ike V=root:0:63bbeace24f33672/0000000000000000:189: VID draft-ietf-ipsec-nat-t-ike-02\n 90CB80913EBB696E086381B5EC427B1F
ike V=root:0:63bbeace24f33672/0000000000000000:189: VID draft-ietf-ipsra-isakmp-xauth-06.txt 09002689DFD6B712
ike V=root:0:63bbeace24f33672/0000000000000000:189: VID DPD AFCAD71368A1F1C96B8696FC77570100
ike V=root:0:63bbeace24f33672/0000000000000000:189: VID forticlient connect license 4C53427B6D465D1B337BB755A37A7FEF
ike V=root:0:63bbeace24f33672/0000000000000000:189: VID Fortinet Endpoint Control B4F01CA951E9DA8D0BAFBBD34AD3044E
ike V=root:0::189: peer identifier IPV4_ADDR 172.20.10.2
ike V=root:0: IKEv1 Aggressive, comes X.X.X.X:1068->X.X.X.X 3
ike V=root:0:63bbeace24f33672/0000000000000000:189: my proposal, gw Remote_access:
ike V=root:0:63bbeace24f33672/0000000000000000:189: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:189: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:189: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:189: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=128
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_HASH_ALG, val=SHA2_256.
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=AUTH_METHOD, val=PRESHARED_KEY_XAUTH_I.
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_GROUP, val=MODP2048.
ike V=root:0:63bbeace24f33672/0000000000000000:189: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:189: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:189: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:189: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:189: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=128
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_HASH_ALG, val=SHA2_256.
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=AUTH_METHOD, val=PRESHARED_KEY.
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_GROUP, val=MODP2048.
ike V=root:0:63bbeace24f33672/0000000000000000:189: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:189: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:189: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:189: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:189: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=128
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_HASH_ALG, val=SHA2_256.
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=AUTH_METHOD, val=PRESHARED_KEY_XAUTH_I.
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_GROUP, val=MODP1536.
ike V=root:0:63bbeace24f33672/0000000000000000:189: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:189: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:189: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:189: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:189: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=128
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_HASH_ALG, val=SHA2_256.
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=AUTH_METHOD, val=PRESHARED_KEY.
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_GROUP, val=MODP1536.
ike V=root:0:63bbeace24f33672/0000000000000000:189: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:189: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:189: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:189: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:189: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=256
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_HASH_ALG, val=SHA2_256.
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=AUTH_METHOD, val=PRESHARED_KEY_XAUTH_I.
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_GROUP, val=MODP2048.
ike V=root:0:63bbeace24f33672/0000000000000000:189: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:189: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:189: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:189: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:189: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=256
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_HASH_ALG, val=SHA2_256.
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=AUTH_METHOD, val=PRESHARED_KEY.
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_GROUP, val=MODP2048.
ike V=root:0:63bbeace24f33672/0000000000000000:189: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:189: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:189: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:189: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:189: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=256
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_HASH_ALG, val=SHA2_256.
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=AUTH_METHOD, val=PRESHARED_KEY_XAUTH_I.
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_GROUP, val=MODP1536.
ike V=root:0:63bbeace24f33672/0000000000000000:189: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:189: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:189: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:189: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:189: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=256
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_HASH_ALG, val=SHA2_256.
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=AUTH_METHOD, val=PRESHARED_KEY.
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_GROUP, val=MODP1536.
ike V=root:0:63bbeace24f33672/0000000000000000:189: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:189: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:189: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:189: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:189: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=128
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_HASH_ALG, val=SHA.
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=AUTH_METHOD, val=PRESHARED_KEY_XAUTH_I.
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_GROUP, val=MODP2048.
ike V=root:0:63bbeace24f33672/0000000000000000:189: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:189: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:189: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:189: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:189: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=128
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_HASH_ALG, val=SHA.
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=AUTH_METHOD, val=PRESHARED_KEY.
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_GROUP, val=MODP2048.
ike V=root:0:63bbeace24f33672/0000000000000000:189: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:189: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:189: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:189: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:189: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=128
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_HASH_ALG, val=SHA.
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=AUTH_METHOD, val=PRESHARED_KEY_XAUTH_I.
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_GROUP, val=MODP1536.
ike V=root:0:63bbeace24f33672/0000000000000000:189: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:189: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:189: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:189: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:189: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=128
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_HASH_ALG, val=SHA.
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=AUTH_METHOD, val=PRESHARED_KEY.
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_GROUP, val=MODP1536.
ike V=root:0:63bbeace24f33672/0000000000000000:189: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:189: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:189: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:189: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:189: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=256
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_HASH_ALG, val=SHA.
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=AUTH_METHOD, val=PRESHARED_KEY_XAUTH_I.
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_GROUP, val=MODP2048.
ike V=root:0:63bbeace24f33672/0000000000000000:189: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:189: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:189: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:189: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:189: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=256
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_HASH_ALG, val=SHA.
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=AUTH_METHOD, val=PRESHARED_KEY.
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_GROUP, val=MODP2048.
ike V=root:0:63bbeace24f33672/0000000000000000:189: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:189: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:189: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:189: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:189: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=256
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_HASH_ALG, val=SHA.
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=AUTH_METHOD, val=PRESHARED_KEY_XAUTH_I.
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_GROUP, val=MODP1536.
ike V=root:0:63bbeace24f33672/0000000000000000:189: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:189: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:189: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:189: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:189: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=256
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_HASH_ALG, val=SHA.
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=AUTH_METHOD, val=PRESHARED_KEY.
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_GROUP, val=MODP1536.
ike V=root:0:63bbeace24f33672/0000000000000000:189: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:189: incoming proposal:
ike V=root:0:63bbeace24f33672/0000000000000000:189: proposal id = 0:
ike V=root:0:63bbeace24f33672/0000000000000000:189: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:189: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:189: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=128
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_HASH_ALG, val=SHA.
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=AUTH_METHOD, val=PRESHARED_KEY.
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_GROUP, val=ECP384.
ike V=root:0:63bbeace24f33672/0000000000000000:189: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:189: proposal id = 0:
ike V=root:0:63bbeace24f33672/0000000000000000:189: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:189: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:189: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=256
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_HASH_ALG, val=SHA2_256.
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=AUTH_METHOD, val=PRESHARED_KEY.
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_GROUP, val=ECP384.
ike V=root:0:63bbeace24f33672/0000000000000000:189: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:189: negotiation failure
ike V=root:Negotiate ISAKMP SA Error:
ike V=root:0:63bbeace24f33672/0000000000000000:189: no SA proposal chosen
ike V=root:0: comes X.X.X.X:1068->X.X.X.X:500,ifindex=3,vrf=0,len=412....
ike V=root:0: IKEv1 exchange=Aggressive id=63bbeace24f33672/0000000000000000 len=412 vrf=0
ike 0: in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
ike V=root:0:63bbeace24f33672/0000000000000000:190: responder: aggressive mode get 1st message...
ike V=root:0:63bbeace24f33672/0000000000000000:190: VID CISCO-UNITY 12F5F28C457168A9702D9FE274CC0100
ike V=root:0:63bbeace24f33672/0000000000000000:190: VID RFC 3947 4A131C81070358455C5728F20E95452F
ike V=root:0:63bbeace24f33672/0000000000000000:190: VID draft-ietf-ipsec-nat-t-ike-02 CD60464335DF21F87CFDB2FC68B6A448
ike V=root:0:63bbeace24f33672/0000000000000000:190: VID draft-ietf-ipsec-nat-t-ike-02\n 90CB80913EBB696E086381B5EC427B1F
ike V=root:0:63bbeace24f33672/0000000000000000:190: VID draft-ietf-ipsra-isakmp-xauth-06.txt 09002689DFD6B712
ike V=root:0:63bbeace24f33672/0000000000000000:190: VID DPD AFCAD71368A1F1C96B8696FC77570100
ike V=root:0:63bbeace24f33672/0000000000000000:190: VID forticlient connect license 4C53427B6D465D1B337BB755A37A7FEF
ike V=root:0:63bbeace24f33672/0000000000000000:190: VID Fortinet Endpoint Control B4F01CA951E9DA8D0BAFBBD34AD3044E
ike V=root:0::190: peer identifier IPV4_ADDR 172.20.10.2
ike V=root:0: IKEv1 Aggressive, comes X.X.X.X:1068->X.X.X.X 3
ike V=root:0:63bbeace24f33672/0000000000000000:190: my proposal, gw Remote_access:
ike V=root:0:63bbeace24f33672/0000000000000000:190: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:190: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:190: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:190: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=128
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_HASH_ALG, val=SHA2_256.
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=AUTH_METHOD, val=PRESHARED_KEY_XAUTH_I.
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_GROUP, val=MODP2048.
ike V=root:0:63bbeace24f33672/0000000000000000:190: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:190: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:190: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:190: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:190: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=128
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_HASH_ALG, val=SHA2_256.
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=AUTH_METHOD, val=PRESHARED_KEY.
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_GROUP, val=MODP2048.
ike V=root:0:63bbeace24f33672/0000000000000000:190: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:190: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:190: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:190: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:190: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=128
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_HASH_ALG, val=SHA2_256.
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=AUTH_METHOD, val=PRESHARED_KEY_XAUTH_I.
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_GROUP, val=MODP1536.
ike V=root:0:63bbeace24f33672/0000000000000000:190: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:190: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:190: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:190: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:190: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=128
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_HASH_ALG, val=SHA2_256.
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=AUTH_METHOD, val=PRESHARED_KEY.
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_GROUP, val=MODP1536.
ike V=root:0:63bbeace24f33672/0000000000000000:190: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:190: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:190: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:190: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:190: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=256
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_HASH_ALG, val=SHA2_256.
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=AUTH_METHOD, val=PRESHARED_KEY_XAUTH_I.
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_GROUP, val=MODP2048.
ike V=root:0:63bbeace24f33672/0000000000000000:190: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:190: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:190: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:190: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:190: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=256
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_HASH_ALG, val=SHA2_256.
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=AUTH_METHOD, val=PRESHARED_KEY.
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_GROUP, val=MODP2048.
ike V=root:0:63bbeace24f33672/0000000000000000:190: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:190: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:190: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:190: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:190: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=256
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_HASH_ALG, val=SHA2_256.
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=AUTH_METHOD, val=PRESHARED_KEY_XAUTH_I.
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_GROUP, val=MODP1536.
ike V=root:0:63bbeace24f33672/0000000000000000:190: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:190: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:190: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:190: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:190: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=256
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_HASH_ALG, val=SHA2_256.
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=AUTH_METHOD, val=PRESHARED_KEY.
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_GROUP, val=MODP1536.
ike V=root:0:63bbeace24f33672/0000000000000000:190: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:190: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:190: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:190: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:190: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=128
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_HASH_ALG, val=SHA.
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=AUTH_METHOD, val=PRESHARED_KEY_XAUTH_I.
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_GROUP, val=MODP2048.
ike V=root:0:63bbeace24f33672/0000000000000000:190: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:190: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:190: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:190: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:190: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=128
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_HASH_ALG, val=SHA.
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=AUTH_METHOD, val=PRESHARED_KEY.
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_GROUP, val=MODP2048.
ike V=root:0:63bbeace24f33672/0000000000000000:190: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:190: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:190: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:190: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:190: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=128
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_HASH_ALG, val=SHA.
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=AUTH_METHOD, val=PRESHARED_KEY_XAUTH_I.
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_GROUP, val=MODP1536.
ike V=root:0:63bbeace24f33672/0000000000000000:190: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:190: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:190: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:190: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:190: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=128
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_HASH_ALG, val=SHA.
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=AUTH_METHOD, val=PRESHARED_KEY.
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_GROUP, val=MODP1536.
ike V=root:0:63bbeace24f33672/0000000000000000:190: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:190: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:190: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:190: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:190: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=256
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_HASH_ALG, val=SHA.
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=AUTH_METHOD, val=PRESHARED_KEY_XAUTH_I.
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_GROUP, val=MODP2048.
ike V=root:0:63bbeace24f33672/0000000000000000:190: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:190: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:190: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:190: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:190: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=256
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_HASH_ALG, val=SHA.
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=AUTH_METHOD, val=PRESHARED_KEY.
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_GROUP, val=MODP2048.
ike V=root:0:63bbeace24f33672/0000000000000000:190: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:190: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:190: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:190: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:190: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=256
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_HASH_ALG, val=SHA.
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=AUTH_METHOD, val=PRESHARED_KEY_XAUTH_I.
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_GROUP, val=MODP1536.
ike V=root:0:63bbeace24f33672/0000000000000000:190: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:190: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:190: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:190: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:190: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=256
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_HASH_ALG, val=SHA.
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=AUTH_METHOD, val=PRESHARED_KEY.
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_GROUP, val=MODP1536.
ike V=root:0:63bbeace24f33672/0000000000000000:190: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:190: incoming proposal:
ike V=root:0:63bbeace24f33672/0000000000000000:190: proposal id = 0:
ike V=root:0:63bbeace24f33672/0000000000000000:190: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:190: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:190: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=128
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_HASH_ALG, val=SHA.
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=AUTH_METHOD, val=PRESHARED_KEY.
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_GROUP, val=ECP384.
ike V=root:0:63bbeace24f33672/0000000000000000:190: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:190: proposal id = 0:
ike V=root:0:63bbeace24f33672/0000000000000000:190: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:190: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:190: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=256
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_HASH_ALG, val=SHA2_256.
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=AUTH_METHOD, val=PRESHARED_KEY.
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_GROUP, val=ECP384.
ike V=root:0:63bbeace24f33672/0000000000000000:190: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:190: negotiation failure
ike V=root:Negotiate ISAKMP SA Error:
ike V=root:0:63bbeace24f33672/0000000000000000:190: no SA proposal chosen
ike V=root:0: comes X.X.X.X:1068->X.X.X.X:500,ifindex=3,vrf=0,len=412....
ike V=root:0: IKEv1 exchange=Aggressive id=63bbeace24f33672/0000000000000000 len=412 vrf=0
ike 0: in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
ike V=root:0:63bbeace24f33672/0000000000000000:191: responder: aggressive mode get 1st message...
ike V=root:0:63bbeace24f33672/0000000000000000:191: VID CISCO-UNITY 12F5F28C457168A9702D9FE274CC0100
ike V=root:0:63bbeace24f33672/0000000000000000:191: VID RFC 3947 4A131C81070358455C5728F20E95452F
ike V=root:0:63bbeace24f33672/0000000000000000:191: VID draft-ietf-ipsec-nat-t-ike-02 CD60464335DF21F87CFDB2FC68B6A448
ike V=root:0:63bbeace24f33672/0000000000000000:191: VID draft-ietf-ipsec-nat-t-ike-02\n 90CB80913EBB696E086381B5EC427B1F
ike V=root:0:63bbeace24f33672/0000000000000000:191: VID draft-ietf-ipsra-isakmp-xauth-06.txt 09002689DFD6B712
ike V=root:0:63bbeace24f33672/0000000000000000:191: VID DPD AFCAD71368A1F1C96B8696FC77570100
ike V=root:0:63bbeace24f33672/0000000000000000:191: VID forticlient connect license 4C53427B6D465D1B337BB755A37A7FEF
ike V=root:0:63bbeace24f33672/0000000000000000:191: VID Fortinet Endpoint Control B4F01CA951E9DA8D0BAFBBD34AD3044E
ike V=root:0::191: peer identifier IPV4_ADDR 172.20.10.2
ike V=root:0: IKEv1 Aggressive, comes X.X.X.X:1068->X.X.X.X 3
ike V=root:0:63bbeace24f33672/0000000000000000:191: my proposal, gw Remote_access:
ike V=root:0:63bbeace24f33672/0000000000000000:191: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:191: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:191: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:191: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=128
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_HASH_ALG, val=SHA2_256.
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=AUTH_METHOD, val=PRESHARED_KEY_XAUTH_I.
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_GROUP, val=MODP2048.
ike V=root:0:63bbeace24f33672/0000000000000000:191: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:191: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:191: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:191: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:191: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=128
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_HASH_ALG, val=SHA2_256.
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=AUTH_METHOD, val=PRESHARED_KEY.
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_GROUP, val=MODP2048.
ike V=root:0:63bbeace24f33672/0000000000000000:191: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:191: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:191: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:191: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:191: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=128
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_HASH_ALG, val=SHA2_256.
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=AUTH_METHOD, val=PRESHARED_KEY_XAUTH_I.
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_GROUP, val=MODP1536.
ike V=root:0:63bbeace24f33672/0000000000000000:191: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:191: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:191: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:191: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:191: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=128
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_HASH_ALG, val=SHA2_256.
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=AUTH_METHOD, val=PRESHARED_KEY.
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_GROUP, val=MODP1536.
ike V=root:0:63bbeace24f33672/0000000000000000:191: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:191: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:191: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:191: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:191: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=256
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_HASH_ALG, val=SHA2_256.
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=AUTH_METHOD, val=PRESHARED_KEY_XAUTH_I.
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_GROUP, val=MODP2048.
ike V=root:0:63bbeace24f33672/0000000000000000:191: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:191: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:191: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:191: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:191: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=256
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_HASH_ALG, val=SHA2_256.
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=AUTH_METHOD, val=PRESHARED_KEY.
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_GROUP, val=MODP2048.
ike V=root:0:63bbeace24f33672/0000000000000000:191: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:191: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:191: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:191: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:191: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=256
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_HASH_ALG, val=SHA2_256.
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=AUTH_METHOD, val=PRESHARED_KEY_XAUTH_I.
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_GROUP, val=MODP1536.
ike V=root:0:63bbeace24f33672/0000000000000000:191: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:191: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:191: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:191: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:191: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=256
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_HASH_ALG, val=SHA2_256.
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=AUTH_METHOD, val=PRESHARED_KEY.
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_GROUP, val=MODP1536.
ike V=root:0:63bbeace24f33672/0000000000000000:191: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:191: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:191: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:191: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:191: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=128
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_HASH_ALG, val=SHA.
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=AUTH_METHOD, val=PRESHARED_KEY_XAUTH_I.
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_GROUP, val=MODP2048.
ike V=root:0:63bbeace24f33672/0000000000000000:191: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:191: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:191: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:191: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:191: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=128
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_HASH_ALG, val=SHA.
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=AUTH_METHOD, val=PRESHARED_KEY.
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_GROUP, val=MODP2048.
ike V=root:0:63bbeace24f33672/0000000000000000:191: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:191: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:191: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:191: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:191: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=128
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_HASH_ALG, val=SHA.
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=AUTH_METHOD, val=PRESHARED_KEY_XAUTH_I.
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_GROUP, val=MODP1536.
ike V=root:0:63bbeace24f33672/0000000000000000:191: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:191: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:191: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:191: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:191: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=128
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_HASH_ALG, val=SHA.
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=AUTH_METHOD, val=PRESHARED_KEY.
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_GROUP, val=MODP1536.
ike V=root:0:63bbeace24f33672/0000000000000000:191: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:191: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:191: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:191: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:191: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=256
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_HASH_ALG, val=SHA.
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=AUTH_METHOD, val=PRESHARED_KEY_XAUTH_I.
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_GROUP, val=MODP2048.
ike V=root:0:63bbeace24f33672/0000000000000000:191: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:191: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:191: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:191: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:191: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=256
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_HASH_ALG, val=SHA.
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=AUTH_METHOD, val=PRESHARED_KEY.
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_GROUP, val=MODP2048.
ike V=root:0:63bbeace24f33672/0000000000000000:191: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:191: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:191: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:191: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:191: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=256
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_HASH_ALG, val=SHA.
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=AUTH_METHOD, val=PRESHARED_KEY_XAUTH_I.
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_GROUP, val=MODP1536.
ike V=root:0:63bbeace24f33672/0000000000000000:191: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:191: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:191: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:191: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:191: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=256
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_HASH_ALG, val=SHA.
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=AUTH_METHOD, val=PRESHARED_KEY.
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_GROUP, val=MODP1536.
ike V=root:0:63bbeace24f33672/0000000000000000:191: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:191: incoming proposal:
ike V=root:0:63bbeace24f33672/0000000000000000:191: proposal id = 0:
ike V=root:0:63bbeace24f33672/0000000000000000:191: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:191: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:191: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=128
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_HASH_ALG, val=SHA.
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=AUTH_METHOD, val=PRESHARED_KEY.
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_GROUP, val=ECP384.
ike V=root:0:63bbeace24f33672/0000000000000000:191: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:191: proposal id = 0:
ike V=root:0:63bbeace24f33672/0000000000000000:191: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:191: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:191: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=256
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_HASH_ALG, val=SHA2_256.
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=AUTH_METHOD, val=PRESHARED_KEY.
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_GROUP, val=ECP384.
ike V=root:0:63bbeace24f33672/0000000000000000:191: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:191: negotiation failure
ike V=root:Negotiate ISAKMP SA Error:
ike V=root:0:63bbeace24f33672/0000000000000000:191: no SA proposal chosen
ike V=root:0: comes X.X.X.X:1068->X.X.X.X5:500,ifindex=3,vrf=0,len=412....
ike V=root:0: IKEv1 exchange=Aggressive id=63bbeace24f33672/0000000000000000 len=412 vrf=0
ike 0: in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
ike V=root:0:63bbeace24f33672/0000000000000000:192: responder: aggressive mode get 1st message...
ike V=root:0:63bbeace24f33672/0000000000000000:192: VID CISCO-UNITY 12F5F28C457168A9702D9FE274CC0100
ike V=root:0:63bbeace24f33672/0000000000000000:192: VID RFC 3947 4A131C81070358455C5728F20E95452F
ike V=root:0:63bbeace24f33672/0000000000000000:192: VID draft-ietf-ipsec-nat-t-ike-02 CD60464335DF21F87CFDB2FC68B6A448
ike V=root:0:63bbeace24f33672/0000000000000000:192: VID draft-ietf-ipsec-nat-t-ike-02\n 90CB80913EBB696E086381B5EC427B1F
ike V=root:0:63bbeace24f33672/0000000000000000:192: VID draft-ietf-ipsra-isakmp-xauth-06.txt 09002689DFD6B712
ike V=root:0:63bbeace24f33672/0000000000000000:192: VID DPD AFCAD71368A1F1C96B8696FC77570100
ike V=root:0:63bbeace24f33672/0000000000000000:192: VID forticlient connect license 4C53427B6D465D1B337BB755A37A7FEF
ike V=root:0:63bbeace24f33672/0000000000000000:192: VID Fortinet Endpoint Control B4F01CA951E9DA8D0BAFBBD34AD3044E
ike V=root:0::192: peer identifier IPV4_ADDR 172.20.10.2
ike V=root:0: IKEv1 Aggressive, comes X.X.X.X:1068->X.X.X.X 3
ike V=root:0:63bbeace24f33672/0000000000000000:192: my proposal, gw Remote_access:
ike V=root:0:63bbeace24f33672/0000000000000000:192: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:192: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:192: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:192: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=128
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_HASH_ALG, val=SHA2_256.
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=AUTH_METHOD, val=PRESHARED_KEY_XAUTH_I.
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_GROUP, val=MODP2048.
ike V=root:0:63bbeace24f33672/0000000000000000:192: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:192: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:192: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:192: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:192: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=128
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_HASH_ALG, val=SHA2_256.
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=AUTH_METHOD, val=PRESHARED_KEY.
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_GROUP, val=MODP2048.
ike V=root:0:63bbeace24f33672/0000000000000000:192: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:192: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:192: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:192: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:192: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=128
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_HASH_ALG, val=SHA2_256.
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=AUTH_METHOD, val=PRESHARED_KEY_XAUTH_I.
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_GROUP, val=MODP1536.
ike V=root:0:63bbeace24f33672/0000000000000000:192: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:192: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:192: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:192: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:192: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=128
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_HASH_ALG, val=SHA2_256.
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=AUTH_METHOD, val=PRESHARED_KEY.
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_GROUP, val=MODP1536.
ike V=root:0:63bbeace24f33672/0000000000000000:192: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:192: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:192: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:192: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:192: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=256
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_HASH_ALG, val=SHA2_256.
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=AUTH_METHOD, val=PRESHARED_KEY_XAUTH_I.
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_GROUP, val=MODP2048.
ike V=root:0:63bbeace24f33672/0000000000000000:192: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:192: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:192: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:192: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:192: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=256
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_HASH_ALG, val=SHA2_256.
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=AUTH_METHOD, val=PRESHARED_KEY.
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_GROUP, val=MODP2048.
ike V=root:0:63bbeace24f33672/0000000000000000:192: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:192: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:192: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:192: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:192: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=256
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_HASH_ALG, val=SHA2_256.
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=AUTH_METHOD, val=PRESHARED_KEY_XAUTH_I.
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_GROUP, val=MODP1536.
ike V=root:0:63bbeace24f33672/0000000000000000:192: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:192: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:192: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:192: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:192: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=256
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_HASH_ALG, val=SHA2_256.
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=AUTH_METHOD, val=PRESHARED_KEY.
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_GROUP, val=MODP1536.
ike V=root:0:63bbeace24f33672/0000000000000000:192: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:192: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:192: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:192: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:192: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=128
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_HASH_ALG, val=SHA.
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=AUTH_METHOD, val=PRESHARED_KEY_XAUTH_I.
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_GROUP, val=MODP2048.
ike V=root:0:63bbeace24f33672/0000000000000000:192: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:192: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:192: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:192: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:192: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=128
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_HASH_ALG, val=SHA.
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=AUTH_METHOD, val=PRESHARED_KEY.
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_GROUP, val=MODP2048.
ike V=root:0:63bbeace24f33672/0000000000000000:192: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:192: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:192: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:192: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:192: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=128
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_HASH_ALG, val=SHA.
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=AUTH_METHOD, val=PRESHARED_KEY_XAUTH_I.
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_GROUP, val=MODP1536.
ike V=root:0:63bbeace24f33672/0000000000000000:192: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:192: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:192: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:192: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:192: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=128
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_HASH_ALG, val=SHA.
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=AUTH_METHOD, val=PRESHARED_KEY.
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_GROUP, val=MODP1536.
ike V=root:0:63bbeace24f33672/0000000000000000:192: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:192: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:192: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:192: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:192: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=256
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_HASH_ALG, val=SHA.
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=AUTH_METHOD, val=PRESHARED_KEY_XAUTH_I.
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_GROUP, val=MODP2048.
ike V=root:0:63bbeace24f33672/0000000000000000:192: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:192: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:192: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:192: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:192: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=256
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_HASH_ALG, val=SHA.
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=AUTH_METHOD, val=PRESHARED_KEY.
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_GROUP, val=MODP2048.
ike V=root:0:63bbeace24f33672/0000000000000000:192: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:192: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:192: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:192: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:192: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=256
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_HASH_ALG, val=SHA.
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=AUTH_METHOD, val=PRESHARED_KEY_XAUTH_I.
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_GROUP, val=MODP1536.
ike V=root:0:63bbeace24f33672/0000000000000000:192: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:192: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:192: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:192: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:192: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=256
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_HASH_ALG, val=SHA.
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=AUTH_METHOD, val=PRESHARED_KEY.
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_GROUP, val=MODP1536.
ike V=root:0:63bbeace24f33672/0000000000000000:192: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:192: incoming proposal:
ike V=root:0:63bbeace24f33672/0000000000000000:192: proposal id = 0:
ike V=root:0:63bbeace24f33672/0000000000000000:192: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:192: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:192: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=128
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_HASH_ALG, val=SHA.
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=AUTH_METHOD, val=PRESHARED_KEY.
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_GROUP, val=ECP384.
ike V=root:0:63bbeace24f33672/0000000000000000:192: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:192: proposal id = 0:
ike V=root:0:63bbeace24f33672/0000000000000000:192: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:192: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:192: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=256
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_HASH_ALG, val=SHA2_256.
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=AUTH_METHOD, val=PRESHARED_KEY.
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_GROUP, val=ECP384.
ike V=root:0:63bbeace24f33672/0000000000000000:192: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:192: negotiation failure
ike V=root:Negotiate ISAKMP SA Error:
ike V=root:0:63bbeace24f33672/0000000000000000:192: no SA proposal chosen
ike :shrank heap by 159744 bytes

lsamson
lsamson
VinayHM
Staff
Staff
atahir
Staff
Staff

FYI
ike V=root:0:63bbeace24f33672/0000000000000000:189: negotiation failure
ike V=root:Negotiate ISAKMP SA Error:
ike V=root:0:63bbeace24f33672/0000000000000000:189: no SA proposal chosen

AT
Liza1
New Contributor III

what does it mean please help

lsamson
lsamson
atahir
Staff
Staff

The error “no SA proposal chosen” indicates that none of the proposals sent by the initiator matched the responder's accepted parameters.

AT
Liza1
New Contributor III

okay, i will try again and change in the responder's side parameters.After that, i will write you if it works.

lsamson
lsamson
Announcements
Check out our Community Chatter Blog! Click here to get involved
Labels
Top Kudoed Authors