dial hard peer correspondent

Hello

I need help with this.  We have a dial out peer and it is mapped on the incoming side and calls do not come out to the carrier.  Instead the tower to the PBX.

PBX: 10.21.10.12

Carrier: 1.1.1.1

LAN cube: 10.21.10.250

The call: 13053284888

Called: 8889990 * 3051234567

!

Dial-peer voice voip 200

Carrier1 description come OUT

translation-profile outgoing Carrier1

destination-pattern 1 [2-9]... [2-9]......

session protocol sipv2

session target ipv4:1.1.1.1

!

Dial-peer voice voip 201

Description INCOMING FS

destination-model ^ 1... $

session protocol sipv2

session target ipv4:10.21.10.12

--------------------------------------------------------------------------

GUEST sip:[email protected]/ * / SIP/2.0
Via: SIP/2.0/UDP 10.21.10.12:5080; rport; branch = z9hG4bK4FSD31mDDt79e
Max-Forwards: 69
From: "1001" <> [email protected]/ * / >; tag = 4FcXBHZ4X3tZg
To: <> [email protected]/ * / >
Call ID: d49e922e-09be-1235-41bf-005056820b2e
CSeq: INVITATION 97726988
Contact: <> [email protected]/ * /: 5080; transport = udp; GW = f170dc57-cdf4-4115-933 c-7c9b5d4e1fed >
User-Agent: FreeSWITCH
Allow: INVITE, ACK, BYE, CANCEL, OPTIONS, MESSAGE, INFO, UPDATE, REGISTER, CONSULT, INFORM
Supported: timer, path, replaces
Allow-events: talk, waiting, Conference, see
Content-Type: application/sdp
Content-Disposition: session
Content-Length: 289
X - accountcode: 10.21.10.12
X-FS-Support: update_display, send_info
Remote-Party-ID: "1001" <> [email protected]/ * / >; left = call; screen = yes; intimacy = off

v = 0
o = FreeSWITCH 1476108761 1476108762 IN IP4 10.21.10.12
s = FreeSWITCH
c = IN IP4 10.21.10.12
t = 0 0
m = audio RTP/AVP 0 8 3 101 13 17344
a = rtpmap:0 PCMU/8000
a = rtpmap:8 PCMA/8000
a rtpmap:3 GSM/8000 =
a rtpmap:101 telephone-event/8000 =
a = fmtp:101 0-16
a = rtpmap:13 CN/8000
a = ptime:20

* 10 Oct 18:35:19.261: //-1/213CC85D9ABD/CCAPI/cc_api_display_ie_subfields:
cc_api_call_setup_ind_common:
Cisco-username = 13053284888
-ccCallInfo IE subfields-
Cisco-ani = 13053284888
Cisco-anitype = 0
Cisco-aniplan = 0
Cisco-anipi = 0
Cisco-anisi = 1
dest = 8889990 * 3051234567
Cisco-desttype = 0
Cisco-destplan = 0
Cisco-ISDS = FFFFFFFF
Cisco-rdn =
Cisco-rdntype = 0
Cisco-rdnplan = 0
Cisco-rdnpi =-1
Cisco-rdnsi =-1
Cisco-redirectreason = - 1 fwd_final_type = 0
final_redirectNumber =
hunt_group_timeout = 0

* 10 Oct 18:35:19.261: //-1/213CC85D9ABD/CCAPI/cc_api_call_setup_ind_common:
Interface = 0x23036E14, call Info)
Number = 13053284888, (Calling Name =) (TON = unknown, NPI = unknown, screening = User, spent, presentation = allowed).
Called number = 8889990 * 3051234567(TON=Unknown, NPI=Unknown);
The appeal translated = FALSE, Subscriber Type Str = unknown, FinalDestinationFlag = TRUE,
Incoming dial-peer = 200, progress Indication = NULL (0), Calling THE Present = TRUE,
Road Trkgrp Label source, label Trkgrp road target = CLID Transparent = FALSE), call Id = 1530
* 10 Oct 18:35:19.261: //-1/213CC85D9ABD/CCAPI/ccCheckClipClir:
In: Component number = 13053284888 (TON = unknown, NPI = unknown, screening = User, spent, presentation = allowed)
* 10 Oct 18:35:19.261: //-1/213CC85D9ABD/CCAPI/ccCheckClipClir:
Departures: Component number = 13053284888 (TONE = unknown, NPI = unknown = User, spent, screening presentation allowed =)
* 10 Oct 18:35:19.261: //-1/xxxxxxxxxxxx/CCAPI/cc_get_feature_vsa:

* 18:35:19.261 Oct 10: cc_get_feature_vsa success of malloc
* 10 Oct 18:35:19.261: //-1/xxxxxxxxxxxx/CCAPI/cc_get_feature_vsa:

* 18:35:19.261 Oct 10: number of cc_get_feature_vsa is 1
* 10 Oct 18:35:19.261: //-1/xxxxxxxxxxxx/CCAPI/cc_get_feature_vsa:

* 18:35:19.261 Oct 10: the FEATURE_VSA attributes are: feature_name:0, feature_time:592111880, feature_id:1482
* Oct 10 18:35:19.261: / / 1530, 213CC85D9ABD, CCAPI, cc_api_call_setup_ind_common:
Set up the event sent;
Call Info (number = 13053284888 (TON = unknown, NPI = unknown, screening = User, spent, presentation = allowed),)
Called number = 8889990 * 3051234567(TON=Unknown, NPI=Unknown))
* Oct 10 18:35:19.261: / / 1530, 213CC85D9ABD, CCAPI, cc_process_call_setup_ind:
Event = 0x22C44B78
* 10 Oct 18:35:19.261: //-1/xxxxxxxxxxxx/CCAPI/cc_setupind_match_search:
Try again with the demoted called number 8889990 * 3051234567
* Oct 10 18:35:19.261: / / 1530, 213CC85D9ABD, CCAPI, ccCallSetContext:
Context = 0x3DF0A054
* Oct 10 18:35:19.265: / / 1530, 213CC85D9ABD, CCAPI, cc_process_call_setup_ind:
> Handed CCAPI cid 1530 with tag 200 app '_ManagedAppProcess_Default '.
* Oct 10 18:35:19.265: / / 1530, 213CC85D9ABD, CCAPI, ccCallProceeding:
Progress Indication = NULL (0)
* Oct 10 18:35:19.265: / / 1530, 213CC85D9ABD, CCAPI, ccCallDisconnect:
Value = 1, Tag = 0x0, entry calls (previous disconnection Cause = 0, remove the Cause = 0)
* Oct 10 18:35:19.265: / / 1530, 213CC85D9ABD, CCAPI, ccCallDisconnect:
Value = 1, entered calls (Responsed = TRUE, Cause value = 1)
* Oct 10 18:35:19.265: / / 1530/213CC85D9ABD/SIP/Msg/ccsipDisplayMsg:
Envoy:
SIP/2.0 100 trying
Via: SIP/2.0/UDP 10.21.10.12:5080; rport; branch = z9hG4bK4FSD31mDDt79e
From: "1001" <> [email protected]/ * / >; tag = 4FcXBHZ4X3tZg
To: <> [email protected]/ * / >
Date: Monday, October 10, 2016 18:35:19 GMT
Call ID: d49e922e-09be-1235-41bf-005056820b2e
CSeq: INVITATION 97726988
Allow-events: telephone-event
Server: Cisco-SIPGateway/IOS-15.2.4.M7
Content-Length: 0

* Oct 10 18:35:19.265: / / 1530/213CC85D9ABD/SIP/Msg/ccsipDisplayMsg:
Envoy:
SIP/2.0 404 not found
Via: SIP/2.0/UDP 10.21.10.12:5080; rport; branch = z9hG4bK4FSD31mDDt79e
From: "1001" <> [email protected]/ * / >; tag = 4FcXBHZ4X3tZg
To: <> [email protected]/ * / >; tag = 969 D 148-ACD
Date: Monday, October 10, 2016 18:35:19 GMT
Call ID: d49e922e-09be-1235-41bf-005056820b2e
CSeq: INVITATION 97726988
Allow-events: telephone-event
Server: Cisco-SIPGateway/IOS-15.2.4.M7
Reason: Q.850; cause = 1
Content-Length: 0

* 10 Oct 18:35:19.265: //-1/xxxxxxxxxxxx/SIP/Msg/ccsipDisplayMsg:
Received:
SIP ACK:[email protected]/ * / SIP/2.0
Via: SIP/2.0/UDP 10.21.10.12:5080; rport; branch = z9hG4bK4FSD31mDDt79e
Max-Forwards: 69
From: "1001" <> [email protected]/ * / >; tag = 4FcXBHZ4X3tZg
To: <> [email protected]/ * / >; tag = 969 D 148-ACD
Call ID: d49e922e-09be-1235-41bf-005056820b2e
CSeq: ACK 97726988
Content-Length: 0

Always 2 dial peers matching a dial incoming peer and a dial out peer.

so now the counterpart of incoming dial from freeswitch you need a counterpart of incoming dialing, probably get you matched on component number (who represents the family number (s) call number on the freeswitch. then put a translation model to the same inbound dial peer, who 8889990 prefixes * the outgoing dialpeer to create a n, which corresponds to 8889990 * 3051234567 as a model and that it points to the IP address of) your carrier.   That's the theory, you must follow

Tags: Cisco Support

Similar Questions

  • Help setting up Dial-Peer in the CME

    Hello experts,

    I tried to set up my network voice for 2 days but no luck.

    Here is my scenario:

    CUCM

    CME

    IRIS PBX

    +++ Posted inside Config.

    CME and PBX are PRI resources; I can see active layer 1 and Layer 2 multi_Frame_Established in 'display the ISDN State '.

    SIP trunk of CUCM to established CMF.

    Cannot communicate registered CUCM to analog phones in PBX Voip phones.

    Several times analog voip calls work and then some changes in the PBX, which in fact shit once again. (Those that have been made by PBX technician)

    VoIP ext: 1003

    Analog position: 270

    !! for voip analog calls

    In CUCM:

    Routing model: 9XXX--> to the trunk of the CME

    In the CME:

    The destination model: 9... --> E1 card (with auto stripping)

    !! for analog / voip calls

    In PBX access code 4 and stripped when sending guys.

    that the means to post analogue for reach 1003 user consist 41003 and 4 will be stripped.

    In the CME:

    The destination model: 1... --> session target ipv4:

    With this configuration in the 'debugging ccapi inout"see"transfer number is NULL"and

    in the "show history of last calls 1" am see reason code "1 c" - invalid number.

    After some research, this are my ideas but not tested:

    1. I have incoming dial Exchange files corresponds to the movement of e1 card:

    voice pots Dial-peer X

    incoming called-number. T

    (2) I have to configure dtmf-relay-notify sip and dtmf-relay rtp - nte to accept the numbers of telephone service.

    (3) need to create any DIDs for incoming calls to pbx?

    Please help me on this point, how could I get from analog to voip calls and vice versa, which I think is fair? If this is not the case, what would be the alternatives? where we should use the dtmf-relay command. ?

    Thanks to all in advance.

    Current config:

    type 0 1 e1 card
    network-clock-participate wic 1
    network-clock-select 1 E1 1/0/1
    primary-qsig ISDN switch type
    voip phone service
    h323 connections allow h323
    allow connections h323 to SIP
    allow connections sip h323
    allow sip to sip connections
    no service additional h450.2
    no service additional h450.3
    Fax protocol t38 ls-redundancy version 0 0 hs-redundancy 0 help none
    SIP
    Registration Server expires max 600 min 60
    no update-callerid
    !
    voice class codec 1
    preferably 1 codec g729br8
    codec preference 2 g729r8
    g723ar63 preferably 3 codec
    g711ulaw codec preference 4
    g711alaw preferably 5 codec
    !
    controller E1 1/0/1
    No.-CRC4 framing
    time intervals PRI - Group 1-31
    !
    Voice-port 1/0/1:15
    Capitalization in the carrier speech
    MGCP
    MGCP behavior considered range tgcp only
    MGCP comedia-role behavior no
    disable the behavior MGCP comedia-check-media-src
    disable the behavior of MGCP comedia-sdp-force
    !
    profile MGCP default
    !
    !
    !
    !
    Dial-peer voice 3 pots
    destination-style 9...
    port 0/1/1:15
    !
    Dial-peer voice 1 voip
    destination-model 1...
    session target ipv4:10.15.108.242
    !
    !
    !
    !
    access controller
    Shutdown
    !
    !
    phone service
    MAX conferences 8-6 win
    transfer full-consult system
    !
    !

    OK, lets delete all of your peers-Dial and start from scratch.

    For testing purposes, we will test with specific numbers.  We can get more general thereafter.  Try the following tips for incoming traffic.

    voice pots Dial-peer 10

    / / DESC # incoming Iris PBX #.

    incoming called-number.

    direct line to inside
    Forward-digits all the

    Then lets try this for your Call Manager Dial-Peer

    Dial-peer voice voip 20

    destination-model 501

    session protocol sipv2

    session target ipv4: CUCM_IP

    If please retest and propose some outputs fresh showing.

    debugging ccapi inout voice

    ccsip debug messages

    Debug ISDN q931

  • I need help finding this hard drive HP

    I'll try to find a second hard drive corresponding to buy for my laptop but I can't find it on the hp website. I have not spent one hour and no luck, geese. in any case, my laptop computer and a hard drive is:

    HP dv7-6c95dx

    750 GB HDD at 5400 RPM with HP ProtectSmart hard drive Protection

    I want to get another hard drive, exactly like the one above, so the two hard drives are a matching pair.

    Then I have to find the special cable for it, yes an another headache. any help would be a great guy, thank you...

    Maintenance & Service dv7 notebook guidehas the information you need. See the list of parts shown for the part number.

    From the Manual:

    Supports the following double hard drive
    configurations:
    ● 2 TB: (1 TB, 5400 RPM, 12.5 mm × 2)
    ● 1500 GB: (750 GB, 7200 RPM, 9.5 mm × 2)
    ● 1500 GB: (750 GB, 5400 RPM, 9.5 mm × 2)
    ● 1 TB: (500 GB, 5400 RPM, 9.5 mm × 2)

    Hard drive (2, 2.5-inch, SATA, does not include support, connection cable, Shield of Mylar or screw):

    1 TB 5400 RPM, 12.7 mm 638974-001
    750 GB, 7200 RPM, 9.5 mm 633252-001
    750 GB, 5400 RPM, 9.5 mm 634250-001
    640 GB, 5400 RPM, 9.5 mm 603785-001
    500 GB, 7200 RPM, 9.5 mm 608218-001
    500 GB, 5400 RPM, 9.5 mm 634932-001
    320 GB, 7200 RPM, 9.5 mm 634862-001
    320 GB, 5400 RPM, 9.5 mm 622643-001

    Hard disk hardware kit (not shown, includes support, connector cable, Mylar)
    Shield and screws) 665597-001

    You can order parts by parts HP online store. You can save some money by ordering identical pieces from another provider online.

  • Problem router Cisco and Checkpoint VPN

    Hello

    I couldn't establish vp from site to site between cisco and checkpoint. Can you please check the logs?

    Thank you.

    * 29 sept 08:17:22.627: IPSEC (sa_request):,.
    (Eng. msg key.) Local OUTGOING = Y.Y.Y.Y:500, distance = X.X.X.X:500,
    local_proxy = 192.168.222.0/255.255.255.0/256/0,
    remote_proxy = 10.0.10.0/255.255.255.0/256/0,
    Protocol = ESP, transform = esp - aes 256 esp-sha-hmac (Tunnel),
    lifedur = 3600 s and KB 4608000,
    SPI = 0 x 0 (0), id_conn = 0, keysize = 256, flags = 0 x 0
    * 29 sep 08:17:22.631: ISAKMP: (0): profile of THE request is (NULL)
    * 29 sep 08:17:22.631: ISAKMP: created a struct peer X.X.X.X, peer port 500
    * 29 sep 08:17:22.631: ISAKMP: new created position = 0x88AD1AB0 peer_handle = 0 x 80000004
    * 29 sep 08:17:22.631: ISAKMP: lock struct 0x88AD1AB0, refcount 1 to peer isakmp_initiator
    * 29 sep 08:17:22.631: ISAKMP: 500 local port, remote port 500
    * 29 sep 08:17:22.631: ISAKMP: set new node 0 to QM_IDLE
    * 29 sep 08:17:22.631: ISAKMP: (0): insert his with his 88AF7D94 = success
    * 29 sep 08:17:22.631: ISAKMP: (0): cannot start aggressive mode, try the main mode.
    * 29 sep 08:17:22.631: ISAKMP: (0): pre-shared key found peer corresponding X.X.X.X
    * 29 sep 08:17:22.631: ISAKMP: (0): built of NAT - T of the seller-rfc3947 ID
    * 29 sep 08:17:22.631: ISAKMP: (0): built the seller-07 ID NAT - t
    * 29 sep 08:17:22.631: ISAKMP: (0): built of NAT - T of the seller-03 IDexit
    Router (config) #n
    * 29 sep 08:17:22.631: ISAKMP: (0): built the seller-02 ID NAT - t
    * 08:17:22.631 Sept. 29: ISAKMP: (0): entry = IKE_MESG_FROM_IPSEC, IKE_SA_REQ_MM
    * 08:17:22.631 Sept. 29: ISAKMP: (0): former State = new State IKE_READY = IKE_I_MM1

    * 29 sep 08:17:22.631: ISAKMP: (0): Beginner Main Mode Exchange
    * 29 sep 08:17:22.631: ISAKMP: (0): package to X.X.X.X my_port 500 peer_port 500 (I) sending MM_NO_STATE
    * 08:17:22.631 Sept. 29: ISAKMP: (0): a Packet.o IKE IPv4 send

    * 29 sep 08:17:32.631: ISAKMP: (0): transmit phase 1 MM_NO_STATE...
    * 29 sep 08:17:32.631: ISAKMP (0): increment the count of errors on his, try 1 5: retransmit the phase 1
    * 29 sep 08:17:32.631: ISAKMP: (0): transmit phase 1 MM_NO_STATE
    * 29 sep 08:17:32.631: ISAKMP: (0): package to X.X.X.X my_port 500 peer_port 500 (I) sending MM_NO_STATE
    * 08:17:32.631 Sept. 29: ISAKMP: (0): sending of a CPVPN IKE IPvaccess lists

    * 29 sep 08:17:42.631: ISAKMP: (0): transmit phase 1 MM_NO_STATE...
    * 29 sep 08:17:42.631: ISAKMP (0): increment the count of errors on his, try 2 of 5: retransmit the phase 1
    * 29 sep 08:17:42.631: ISAKMP: (0): transmit phase 1 MM_NO_STATE
    * 29 sep 08:17:42.631: ISAKMP: (0): package to X.X.X.X my_port 500 peer_port 500 (I) sending MM_NO_STATE
    * 08:17:42.631 Sept. 29: ISAKMP: (0): sending a packet IPv4 IKE...
    * 29 sep 08:17:52.627: IPSEC (key_engine): request timer shot: count = 1,.
    local (identity) = Y.Y.Y.Y:0, distance = X.X.X.X:0,
    local_proxy = 192.168.222.0/255.255.255.0/256/0,
    remote_proxy = 10.0.10.0/255.255.255.0/256/0
    * 29 sept 08:17:52.627: IPSEC (sa_request):,.
    (Eng. msg key.) Local OUTGOING = Y.Y.Y.Y:500, distance = X.X.X.X:500,
    local_proxy = 192.168.222.0/255.255.255.0/256/0,
    remote_proxy = 10.0.10.0/255.255.255.0/256/0,
    Protocol = ESP, transform = esp - aes 256 esp-sha-hmac (Tunnel),
    lifedur = 3600 s and KB 4608000,
    SPI = 0 x 0 (0), id_conn = 0, keysize = 256, flags = 0 x 0
    * 29 sep 08:17:52.627: ISAKMP: set new node 0 to QM_IDLE
    * 29 sep 08:17:52.627: ISAKMP: (0): SA is still budding. Attached new request ipsec. (local Y.Y.Y.Y, distance X.X.X.X)
    * 29 sep 08:17:52.627: ISAKMP: error during the processing of HIS application: failed to initialize SA
    * 29 sep 08:17:52.627: ISAKMP: error while processing message KMI 0, error 2.
    * 29 sep 08:17:52.631: ISAKMP: (0): transmit phase 1 MM_NO_STATE...
    * 29 sep 08:17:52.631: ISAKMP (0): increment the count of errors on his, try 3 of 5: retransmit the phase 1
    * 29 sep 08:17:52.631: ISAKMP: (0): transmit phase 1 MM_NO_STATE
    * 29 sep 08:17:52.631: ISAKMP: (0): package to X.X.X.X my_port 500 peer_port 500 (I) sending MM_NO_STATE
    * 08:17:52.631 Sept. 29: ISAKMP: (0): sending a packet IPv4 IKE.
    * 29 sep 08:18:02.631: ISAKMP: (0): transmit phase 1 MM_NO_STATE...
    * 29 sep 08:18:02.631: ISAKMP (0): increment the count of errors on his, try 4 out 5: retransmit the phase 1
    * 29 sep 08:18:02.631: ISAKMP: (0): transmit phase 1 MM_NO_STATE
    * 29 sep 08:18:02.631: ISAKMP: (0): package to X.X.X.X my_port 500 peer_port 500 (I) sending MM_NO_STATE
    * 08:18:02.631 Sept. 29: ISAKMP: (0): sending a packet IPv4 IKE.
    * 29 sep 08:18:12.631: ISAKMP: (0): transmit phase 1 MM_NO_STATE...
    * 29 sep 08:18:12.631: ISAKMP (0): increment the count of errors on his, try 5 of 5: retransmit the phase 1
    * 29 sep 08:18:12.631: ISAKMP: (0): transmit phase 1 MM_NO_STATE
    * 29 sep 08:18:12.631: ISAKMP: (0): package to X.X.X.X my_port 500 peer_port 500 (I) sending MM_NO_STATE
    * 08:18:12.631 Sept. 29: ISAKMP: (0): sending a packet IPv4 IKE.
    * 29 sep 08:18:22.627: IPSEC (key_engine): request timer shot: count = 2,.
    local (identity) = Y.Y.Y.Y:0, distance = X.X.X.X:0,
    local_proxy = 192.168.222.0/255.255.255.0/256/0,
    remote_proxy = 10.0.10.0/255.255.255.0/256/0
    * 29 sep 08:18:22.631: ISAKMP: (0): transmit phase 1 MM_NO_STATE...
    * 29 sep 08:18:22.631: ISAKMP: (0): the peer is not paranoid KeepAlive.

    * 29 sep 08:18:22.631: ISAKMP: (0): removal of reason ITS status of 'Death by retransmission P1' (I) MM_NO_STATE (peer X.X.X.X)
    * 29 sep 08:18:22.631: ISAKMP: (0): removal of reason ITS status of 'Death by retransmission P1' (I) MM_NO_STATE (peer X.X.X.X)
    * 29 sep 08:18:22.631: ISAKMP: Unlocking counterpart struct 0x88AD1AB0 for isadb_mark_sa_deleted(), count 0
    * 29 sep 08:18:22.631: ISAKMP: delete peer node by peer_reap for X.X.X.X: 88AD1AB0
    * 29 sep 08:18:22.631: ISAKMP: (0): node-930113685 error suppression FALSE reason 'IKE deleted.
    * 29 sep 08:18:22.631: ISAKMP: (0): error suppression node 661004686 FALSE reason 'IKE deleted.
    * 08:18:22.631 Sept. 29: ISAKMP: (0): entry = IKE_MESG_INTERNAL, IKE_PHASE1_DEL
    * 08:18:22.631 Sept. 29: ISAKMP: (0): former State = new State IKE_I_MM1 = IKE_DEST_SA

    * 29 sep 08:18:22.631: IPSEC (key_engine): had an event of the queue with 1 KMI message (s)
    * 29 sept 08:18:27.559: IPSEC (sa_request):,.
    (Eng. msg key.) Local OUTGOING = Y.Y.Y.Y:500, distance = X.X.X.X:500,
    local_proxy = 192.168.222.0/255.255.255.0/256/0,
    remote_proxy = 10.0.10.0/255.255.255.0/256/0,
    Protocol = ESP, transform = esp - aes 256 esp-sha-hmac (Tunnel),
    lifedur = 3600 s and KB 4608000,
    SPI = 0 x 0 (0), id_conn = 0, keysize = 256, flags = 0 x 0
    * 29 sep 08:18:27.559: ISAKMP: (0): profile of THE request is (NULL)
    * 29 sep 08:18:27.559: ISAKMP: created a struct peer X.X.X.X, peer port 500
    * 29 sep 08:18:27.559: ISAKMP: new created position = 0x85EDF1F0 peer_handle = 0 x 80000005
    * 29 sep 08:18:27.559: ISAKMP: lock struct 0x85EDF1F0, refcount 1 to peer isakmp_initiator
    * 29 sep 08:18:27.559: ISAKMP: 500 local port, remote port 500
    * 29 sep 08:18:27.559: ISAKMP: set new node 0 to QM_IDLE
    * 29 sep 08:18:27.559: ISAKMP: find a dup her to the tree during the isadb_insert his 88C1CE60 = call BVA
    * 29 sep 08:18:27.559: ISAKMP: (0): cannot start aggressive mode, try the main mode.
    * 29 sep 08:18:27.559: ISAKMP: (0): pre-shared key found peer corresponding X.X.X.X
    * 29 sep 08:18:27.559: ISAKMP: (0): built of NAT - T of the seller-rfc3947 ID
    * 29 sep 08:18:27.559: ISAKMP: (0): built the seller-07 ID NAT - t
    * 29 sep 08:18:27.559: ISAKMP: (0): built of NAT - T of the seller-03 ID
    * 29 sep 08:18:27.559: ISAKMP: (0): built the seller-02 ID NAT - t
    * 08:18:27.559 Sept. 29: ISAKMP: (0): entry = IKE_MESG_FROM_IPSEC, IKE_SA_REQ_MM
    * 08:18:27.559 Sept. 29: ISAKMP: (0): former State = new State IKE_READY = IKE_I_MM1

    * 29 sep 08:18:27.559: ISAKMP: (0): Beginner Main Mode Exchange
    * 29 sep 08:18:27.559: ISAKMP: (0): package to X.X.X.X my_port 500 peer_port 500 (I) sending MM_NO_STATE
    * 08:18:27.559 Sept. 29: ISAKMP: (0): sending a packet IPv4 IKE.
    * 29 sep 08:18:37.559: ISAKMP: (0): transmit phase 1 MM_NO_STATE...
    * 29 sep 08:18:37.559: ISAKMP (0): increment the count of errors on his, try 1 5: retransmit the phase 1
    * 29 sep 08:18:37.559: ISAKMP: (0): transmit phase 1 MM_NO_STATE
    * 29 sep 08:18:37.559: ISAKMP: (0): package to X.X.X.X my_port 500 peer_port 500 (I) sending MM_NO_STATE
    * 08:18:37.559 Sept. 29: ISAKMP: (0): sending a packet IPv4 IKE.
    * 29 sep 08:18:47.559: ISAKMP: (0): transmit phase 1 MM_NO_STATE...
    * 29 sep 08:18:47.559: ISAKMP (0): increment the count of errors on his, try 2 of 5: retransmit the phase 1
    * 29 sep 08:18:47.559: ISAKMP: (0): transmit phase 1 MM_NO_STATE
    * 29 sep 08:18:47.559: ISAKMP: (0): package to X.X.X.X my_port 500 peer_port 500 (I) sending MM_NO_STATE
    * 08:18:47.559 Sept. 29: ISAKMP: (0): sending a packet IPv4 IKE.

    * 29 sep 08:18:57.559: IPSEC (key_engine): request timer shot: count = 1,.
    local (identity) = Y.Y.Y.Y:0, distance = X.X.X.X:0,
    local_proxy = 192.168.222.0/255.255.255.0/256/0,
    remote_proxy = 10.0.10.0/255.255.255.0/256/0
    * 29 sept 08:18:57.559: IPSEC (sa_request):,.
    (Eng. msg key.) Local OUTGOING = Y.Y.Y.Y:500, distance = X.X.X.X:500,
    local_proxy = 192.168.222.0/255.255.255.0/256/0,
    remote_proxy = 10.0.10.0/255.255.255.0/256/0,
    Protocol = ESP, transform = esp - aes 256 esp-sha-hmac (Tunnel),
    lifedur = 3600 s and KB 4608000,
    SPI = 0 x 0 (0), id_conn = 0, keysize = 256, flags = 0 x 0
    * 29 sep 08:18:57.559: ISAKMP: set new node 0 to QM_IDLE
    * 29 sep 08:18:57.559: ISAKMP: (0): SA is still budding. Attached new request ipsec. (local Y.Y.Y.Y, distance X.X.X.X)
    * 29 sep 08:18:57.559: ISAKMP: error during the processing of HIS application: failed to initialize SA
    * 29 sep 08:18:57.559: ISAKMP: error while processing message KMI 0, error 2.
    * 29 sep 08:18:57.559: ISAKMP: (0): transmit phase 1 MM_NO_STATE...
    * 29 sep 08:18:57.559: ISAKMP (0): increment the count of errors on his, try 3 of 5: retransmit the phase 1
    * 29 sep 08:18:57.559: ISAKMP: (0): transmit phase 1 MM_NO_STATE
    * 29 sep 08:18:57.559: ISAKMP: (0): package to X.X.X.X my_port 500 peer_port 500 (I) sending MM_NO_STATE
    Router #.
    Router #.
    * 08:18:57.559 Sept. 29: ISAKMP: (0): sending a packet IPv4 IKE.
    * 29 sep 08:19:07.559: ISAKMP: (0): transmit phase 1 MM_NO_STATE...
    * 29 sep 08:19:07.559: ISAKMP (0): increment the count of errors on his, try 4 out 5: retransmit the phase 1
    * 29 sep 08:19:07.559: ISAKMP: (0): transmit phase 1 MM_NO_STATE
    * 29 sep 08:19:07.559: ISAKMP: (0): package to X.X.X.X my_port 500 peer_port 500 (I) sending MM_NO_STATE
    * 08:19:07.559 Sept. 29: ISAKMP: (0): sending a packet IPv4 IKE.
    Router #.
    Router #un all
    All possible debugging has been disabled

    The log shows main mode setup has failed.  See if this helps: http://www.itcertnotes.com/2011/04/ipsec-stuck-in-mmsasetup-and-mmnostat...

  • Tunnel VPN IPSEC site 2 Site will not appear.

    Hello Experts,

    I was wondering if I can get help on creating an IPSEC VPN between a Cisco 2921 and ASA 550 x tunnel. Here is the config

    See the race | s crypto

    Crypto pki token removal timeout default 0

    crypto ISAKMP policy 1

    BA aes

    preshared authentication

    Group 2

    lifetime 28800

    ISAKMP crypto key address A.A.A.A xxxxxxxxxxxxxxxxxxxxxx

    Crypto ipsec transform-set ESP-AES128-SHA aes - esp esp-sha-hmac

    transport mode

    ICQ-2-ILAND 1 ipsec-isakmp crypto map

    defined by peer A.A.A.A

    game of transformation-ESP-AES128-SHA

    match the address iland_london_s2s_vpn

    ICQ-2-ILAND crypto card

    The config on the remote end has not been shared with me, so I don't know if I'm doing something wrong locally, or if the remote end is configured incorrectly.

    The command Sh crypto isakmp its the following message

    ISAKMP crypto to show his
    IPv4 Crypto ISAKMP Security Association
    DST CBC conn-State id
    A.A.A.A B.B.B.B MM_NO_STATE 1231 ACTIVE (deleted)      

    IPv6 Crypto ISAKMP Security Association

    See the session encryption
    Current state of the session crypto

    Interface: GigabitEthernet0/0
    The session state: DOWN-NEGOTIATION
    Peer: Port A.A.A.A 500
    IKEv1 SA: local B.B.B.Bremote 500 A.A.A.A500 inactive
    IKEv1 SA: local B.B.B.Bremote 500 A.A.A.A500 inactive
    FLOW IPSEC: allowed ip 10.20.111.0/255.255.255.0 10.120.1.0/255.255.255.0
    Active sAs: 0, origin: card crypto
    FLOW IPSEC: allowed ip 10.10.0.0/255.255.0.0 10.120.1.0/255.255.255.0
    Active sAs: 0, origin: card crypto

    The command debug crypto isakmp debug logs are listed below.

    ISAKMP: (0): pre-shared key local found
    08:51:52.019 on 6 Dec: ISAKMP: analysis of the profiles for xauth...
    08:51:52.019 on 6 Dec: ISAKMP: (0): audit ISAKMP transform 1 against the policy of priority 1
    08:51:52.019 on 6 Dec: ISAKMP: AES - CBC encryption
    08:51:52.019 on 6 Dec: ISAKMP: keylength 128
    08:51:52.019 on 6 Dec: ISAKMP: SHA hash
    08:51:52.019 on 6 Dec: ISAKMP: group by default 2
    08:51:52.019 on 6 Dec: ISAKMP: pre-shared key auth
    08:51:52.019 on 6 Dec: ISAKMP: type of life in seconds
    08:51:52.019 on 6 Dec: ISAKMP: life (basic) of 28800
    08:51:52.019 on 6 Dec: ISAKMP: (0): atts are acceptable. Next payload is 0
    08:51:52.019 on 6 Dec: ISAKMP: (0): Acceptable atts: real life: 0
    08:51:52.019 on 6 Dec: ISAKMP: (0): Acceptable atts:life: 0
    08:51:52.019 on 6 Dec: ISAKMP: (0): base life_in_seconds:28800
    08:51:52.019 on 6 Dec: ISAKMP: (0): return real life: 28800
    08:51:52.019 on 6 Dec: ISAKMP: (0): timer life Started: 28800.

    DEC 6 08:51:52.019: ISAKMP: (0): load useful vendor id of treatment
    DEC 6 08:51:52.019: ISAKMP: (0): provider ID seems the unit/DPD but major incompatibility of 123
    DEC 6 08:51:52.019: ISAKMP: (0): provider ID is NAT - T v2
    DEC 6 08:51:52.019: ISAKMP: (0): load useful vendor id of treatment
    DEC 6 08:51:52.019: ISAKMP: (0): IKE frag vendor processing id payload
    08:51:52.019 on 6 Dec: ISAKMP: (0): IKE Fragmentation support not enabled
    08:51:52.019 on 6 Dec: ISAKMP: (0): entry = IKE_MESG_INTERNAL, IKE_PROCESS_MAIN_MODE
    08:51:52.019 on 6 Dec: ISAKMP: (0): former State = new State IKE_I_MM2 = IKE_I_MM2

    DEC 6 08:51:52.019: ISAKMP: (0): A packet is sent. A.A.A my_port 500 peer_port 500 (I) MM_SA_SETUP
    08:51:52.019 on 6 Dec: ISAKMP: (0): sending a packet IPv4 IKE.
    08:51:52.019 on 6 Dec: ISAKMP: (0): entry = IKE_MESG_INTERNAL, IKE_PROCESS_COMPLETE
    08:51:52.019 on 6 Dec: ISAKMP: (0): former State = new State IKE_I_MM2 = IKE_I_MM3

    08:51:52.155 on 6 Dec: ISAKMP (0): packet received dport 500 sport Global 500 (I) MM_SA_SETUP A.A.A.A
    08:51:52.155 on 6 Dec: ISAKMP: (0): entry = IKE_MESG_FROM_PEER, IKE_MM_EXCH
    08:51:52.155 on 6 Dec: ISAKMP: (0): former State = new State IKE_I_MM3 = IKE_I_MM4

    DEC 6 08:51:52.155: ISAKMP: (0): processing KE payload. Message ID = 0
    DEC 6 08:51:52.175: ISAKMP: (0): processing NONCE payload. Message ID = 0
    08:51:52.175 on 6 Dec: ISAKMP: (0): pre-shared key found peer corresponding to A.A.A.A
    DEC 6 08:51:52.175: ISAKMP: (1227): load useful vendor id of treatment
    DEC 6 08:51:52.175: ISAKMP: (1227): provider ID is the unit
    DEC 6 08:51:52.175: ISAKMP: (1227): load useful vendor id of treatment
    DEC 6 08:51:52.175: ISAKMP: (1227): provider ID seems the unit/DPD but major incompatibility of 92
    DEC 6 08:51:52.175: ISAKMP: (1227): provider ID is XAUTH
    DEC 6 08:51:52.175: ISAKMP: (1227): load useful vendor id of treatment
    DEC 6 08:51:52.175: ISAKMP: (1227): addressing another box of IOS!
    DEC 6 08:51:52.175: ISAKMP: (1227): load useful vendor id of treatment
    08:51:52.175 on 6 Dec: ISAKMP: (1227): vendor ID seems the unit/DPD but hash mismatch
    08:51:52.175 on 6 Dec: ISAKMP: receives the payload type 20
    08:51:52.175 on 6 Dec: ISAKMP (1227): sound not hash no match - this node outside NAT
    08:51:52.175 on 6 Dec: ISAKMP: receives the payload type 20
    08:51:52.175 on 6 Dec: ISAKMP (1227): No. NAT found for oneself or peer
    08:51:52.175 on 6 Dec: ISAKMP: (1227): entry = IKE_MESG_INTERNAL, IKE_PROCESS_MAIN_MODE
    08:51:52.179 on 6 Dec: ISAKMP: (1227): former State = new State IKE_I_MM4 = IKE_I_MM4

    08:51:52.179 on 6 Dec: ISAKMP: (1227): send initial contact
    08:51:52.179 on 6 Dec: ISAKMP: (1227): ITS been pre-shared key, using id ID_IPV4_ADDR type authentication
    08:51:52.179 on 6 Dec: ISAKMP (1227): payload ID
    next payload: 8
    type: 1
    address: B.B.B.B
    Protocol: 17
    Port: 500
    Length: 12
    08:51:52.179 on 6 Dec: ISAKMP: (1227): the total payload length: 12
    DEC 6 08:51:52.179: ISAKMP: (1227): A packet is sent. A.A.A my_port 500 peer_port 500 (I) MM_KEY_EXCH
    08:51:52.179 on 6 Dec: ISAKMP: (1227): sending a packet IPv4 IKE.
    08:51:52.179 on 6 Dec: ISAKMP: (1227): entry = IKE_MESG_INTERNAL, IKE_PROCESS_COMPLETE
    08:51:52.179 on 6 Dec: ISAKMP: (1227): former State = new State IKE_I_MM4 = IKE_I_MM5

    08:51:52.315 on 6 Dec: ISAKMP (1227): packet received dport 500 sport Global 500 (I) MM_KEY_EXCH A.A.A.A
    DEC 6 08:51:52.315: ISAKMP: (1227): payload ID for treatment. Message ID = 0
    08:51:52.315 on 6 Dec: ISAKMP (1227): payload ID
    next payload: 8
    type: 1
    address: A.A.A.A
    Protocol: 17
    Port: 0
    Length: 12
    DEC 6 08:51:52.315: ISAKMP: (0): peer games * no * profiles
    DEC 6 08:51:52.315: ISAKMP: (1227): HASH payload processing. Message ID = 0
    08:51:52.315 on 6 Dec: ISAKMP: received payload type 17
    DEC 6 08:51:52.315: ISAKMP: (1227): load useful vendor id of treatment
    DEC 6 08:51:52.315: ISAKMP: (1227): provider ID is DPD
    08:51:52.315 on 6 Dec: ISAKMP: (1227): SA authentication status:
    authenticated
    08:51:52.315 on 6 Dec: ISAKMP: (1227): SA has been authenticated with A.A.A.A
    08:51:52.315 on 6 Dec: ISAKMP: try to insert a B.B.B.B/A.A.A.A/500/ peer and inserted 2B79E8BC successfully.
    08:51:52.315 on 6 Dec: ISAKMP: (1227): entry = IKE_MESG_FROM_PEER, IKE_MM_EXCH
    08:51:52.315 on 6 Dec: ISAKMP: (1227): former State = new State IKE_I_MM5 = IKE_I_MM6

    08:51:52.315 on 6 Dec: ISAKMP: (1227): entry = IKE_MESG_INTERNAL, IKE_PROCESS_MAIN_MODE
    08:51:52.315 on 6 Dec: ISAKMP: (1227): former State = new State IKE_I_MM6 = IKE_I_MM6

    08:51:52.315 on 6 Dec: ISAKMP: (1227): entry = IKE_MESG_INTERNAL, IKE_PROCESS_COMPLETE
    08:51:52.315 on 6 Dec: ISAKMP: (1227): former State = new State IKE_I_MM6 = IKE_P1_COMPLETE

    08:51:52.315 on 6 Dec: ISAKMP: (1227): start Quick Mode Exchange, M - ID 1511581970
    08:51:52.315 on 6 Dec: ISAKMP: (1227): initiator QM gets spi
    DEC 6 08:51:52.315: ISAKMP: (1227): A packet is sent. A.A.A my_port 500 peer_port 500 (I) QM_IDLE
    08:51:52.315 on 6 Dec: ISAKMP: (1227): sending a packet IPv4 IKE.
    08:51:52.315 on 6 Dec: ISAKMP: (1227): entrance, node 1511581970 = IKE_MESG_INTERNAL, IKE_INIT_QM
    08:51:52.315 on 6 Dec: ISAKMP: (1227): former State = new State IKE_QM_READY = IKE_QM_I_QM1
    08:51:52.315 on 6 Dec: ISAKMP: (1227): entry = IKE_MESG_INTERNAL, IKE_PHASE1_COMPLETE
    08:51:52.315 on 6 Dec: ISAKMP: (1227): former State = new State IKE_P1_COMPLETE = IKE_P1_COMPLETE

    08:51:52.455 on 6 Dec: ISAKMP (1227): packet received dport 500 sport Global 500 (I) QM_IDLE A.A.A.A
    08:51:52.455 on 6 Dec: ISAKMP: node set-1740216573 to QM_IDLE
    DEC 6 08:51:52.455: ISAKMP: (1227): HASH payload processing. Message ID = 2554750723
    DEC 6 08:51:52.455: ISAKMP: (1227): treatment protocol NOTIFIER PROPOSAL_NOT_CHOSEN 3
    0, message ID SPI = 2554750723, a = 0x2B78D574
    08:51:52.455 on 6 Dec: ISAKMP: (1227): node-1740216573 error suppression FALSE reason 'informational (en) State 1.
    08:51:52.455 on 6 Dec: ISAKMP: (1227): entry = IKE_MESG_FROM_PEER, IKE_INFO_NOTIFY
    08:51:52.455 on 6 Dec: ISAKMP: (1227): former State = new State IKE_P1_COMPLETE = IKE_P1_COMPLETE

    08:51:52.455 on 6 Dec: ISAKMP (1227): packet received dport 500 sport Global 500 (I) QM_IDLE A.A.A.A
    08:51:52.455 on 6 Dec: ISAKMP: node set 1297146574 to QM_IDLE
    DEC 6 08:51:52.455: ISAKMP: (1227): HASH payload processing. Message ID = 1297146574
    DEC 6 08:51:52.455: ISAKMP: (1227): treatment of payload to DELETE. Message ID = 1297146574
    08:51:52.455 on 6 Dec: ISAKMP: (1227): peer does not paranoid KeepAlive.

    08:51:52.455 on 6 Dec: ISAKMP: (1227): removal of HIS State "No reason" why (I) QM_IDLE (post A.A.A.A)
    08:51:52.455 on 6 Dec: ISAKMP: (1227): error suppression node 1297146574 FALSE reason 'informational (en) State 1.
    08:51:52.455 on 6 Dec: ISAKMP: node set-1178304129 to QM_IDLE
    DEC 6 08:51:52.455: ISAKMP: (1227): A packet is sent. A.A.A my_port 500 peer_port 500 (I) QM_IDLE
    08:51:52.455 on 6 Dec: ISAKMP: (1227): sending a packet IPv4 IKE.
    08:51:52.455 on 6 Dec: ISAKMP: (1227): purge the node-1178304129
    08:51:52.455 on 6 Dec: ISAKMP: (1227): entry = IKE_MESG_INTERNAL, IKE_PHASE1_DEL
    08:51:52.455 on 6 Dec: ISAKMP: (1227): former State = new State IKE_P1_COMPLETE = IKE_DEST_SA

    08:51:52.455 on 6 Dec: ISAKMP: (1227): removal of HIS State "No reason" why (I) QM_IDLE (post A.A.A.A)
    08:51:52.455 on 6 Dec: ISAKMP: Unlocking counterpart struct 0x2B79E8BC for isadb_mark_sa_deleted(), count 0
    08:51:52.455 on 6 Dec: ISAKMP: delete peer node by peer_reap for A.A.A.A: 2B79E8BC
    08:51:52.455 on 6 Dec: ISAKMP: (1227): error suppression node 1511581970 FALSE reason 'IKE deleted.
    08:51:52.455 on 6 Dec: ISAKMP: (1227): entry = IKE_MESG_FROM_PEER, IKE_MM_EXCH
    08:51:52.455 on 6 Dec: ISAKMP: (1227): former State = new State IKE_DEST_SA = IKE_DEST_SA

    Would appreciate any help you can provide.

    Kind regards

    Sidney Dsouza

    The phase 2 does not complete since there is no visible SPI value. In addition, depending on your configuration Transport mode is configured for phase 2 However, debug displays the tunnel mode.

    Thus, as suggested earlier to debug this further and find the root cause we need to match the configuration settings in Phase 2 with regard to the remote device.

    Hope that helps.

    Kind regards

    Anuj

  • VPN site to Site btw Pix535 and 2811 router, can't get to work

    Hi, everyone, I spent a few days doing a VPN site-to site between PIX535 and 2811 router but returned empty-handed, I followed the instructions here:

    http://www.Cisco.com/en/us/products/ps9422/products_configuration_example09186a0080b4ae61.shtml

    #1: config PIX:

    : Saved

    : Written by enable_15 to the 18:05:33.678 EDT Saturday, October 20, 2012

    !

    8.0 (4) version PIX

    !

    hostname pix535

    !

    interface GigabitEthernet0

    Description to cable-modem

    nameif outside

    security-level 0

    address IP X.X.138.132 255.255.255.0

    OSPF cost 10

    !

    interface GigabitEthernet1

    Description inside 10/16

    nameif inside

    security-level 100

    IP 10.1.1.254 255.255.0.0

    OSPF cost 10

    !

    outside_access_in of access allowed any ip an extended list

    access extensive list ip 10.1.0.0 inside_nat0_outbound allow 255.255.0.0 10.20.0.0 255.255.0.0

    inside_nat0_outbound list of allowed ip extended access all 10.1.1.192 255.255.255.248

    outside_cryptomap_dyn_60 list of allowed ip extended access all 10.1.1.192 255.255.255.248

    access extensive list ip 10.1.0.0 outside_1_cryptomap allow 255.255.0.0 10.20.0.0 255.255.0.0

    pager lines 24

    cnf-8-ip 10.1.1.192 mask - 10.1.1.199 IP local pool 255.255.0.0

    Global interface 10 (external)

    15 1.2.4.5 (outside) global

    NAT (inside) 0-list of access inside_nat0_outbound

    NAT (inside) 15 10.1.0.0 255.255.0.0

    Access-group outside_access_in in interface outside

    Route outside 0.0.0.0 0.0.0.0 X.X.138.1 1

    Crypto ipsec transform-set ESP-DES-MD5 esp - esp-md5-hmac

    Crypto ipsec transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac

    Crypto ipsec transform-set ESP-AES-256-SHA 256 - aes - esp esp-sha-hmac

    Crypto ipsec transform-set ESP-3DES-MD5-esp-3des esp-md5-hmac

    Crypto ipsec transform-set esp-SHA-ESP-3DES-3des esp-sha-hmac

    Crypto ipsec transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac

    Crypto ipsec transform-set ESP-AES-128-SHA aes - esp esp-sha-hmac

    Crypto ipsec transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac

    Crypto ipsec transform-set ESP-AES-128-MD5-esp - aes esp-md5-hmac

    Crypto ipsec transform-set ESP-DES-SHA esp - esp-sha-hmac

    life crypto ipsec security association seconds 28800

    Crypto ipsec kilobytes of life - safety 4608000 association

    Crypto-map dynamic outside_dyn_map 20 the value transform-set ESP-3DES-SHA MD5-ESP-3DES ESP-DES-MD5

    life together - the association of security crypto dynamic-map outside_dyn_map 20 28800 seconds

    Crypto-map dynamic outside_dyn_map 20 kilobytes of life together - the association of safety 4608000

    Crypto-map dynamic outside_dyn_map 40 value transform-set ESP-3DES-SHA MD5-ESP-3DES ESP-DES-SHA

    life together - the association of security crypto dynamic-map outside_dyn_map 40 28800 seconds

    Crypto-map dynamic outside_dyn_map 40 kilobytes of life together - the association of safety 4608000

    Dynamic crypto map outside_dyn_map 60 match address outside_cryptomap_dyn_60

    Crypto-map dynamic outside_dyn_map 60 value transform-set ESP-3DES-MD5 ESP-3DES-SHA ESP-DES-MD5 ESP-DES-SHA

    life together - the association of security crypto dynamic-map outside_dyn_map 60 28800 seconds

    Crypto-map dynamic outside_dyn_map 60 kilobytes of life together - the association of safety 4608000

    Dynamic crypto map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set pfs

    Crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 value transform-set ESP-SHA-3DES ESP-MD5-3DES ESP-DES-SHA ESP-DES-MD5

    Dynamic crypto map SYSTEM_DEFAULT_CRYPTO_MAP 65535 define security association lifetime 28800 seconds

    cryptographic kilobytes 4608000 life of the set - the association of security of the 65535 SYSTEM_DEFAULT_CRYPTO_MAP of the dynamic-map

    card crypto outside_map 1 match address outside_1_cryptomap

    outside_map game 1 card crypto peer X.X.21.29

    card crypto outside_map 1 set of transformation-ESP-DES-SHA

    outside_map map 1 lifetime of security association set seconds 28800 crypto

    card crypto outside_map 1 set security-association life kilobytes 4608000

    outside_map card crypto 65534 isakmp ipsec dynamic SYSTEM_DEFAULT_CRYPTO_MAP

    map outside_map 65535-isakmp ipsec crypto dynamic outside_dyn_map

    outside_map interface card crypto outside

    ISAKMP crypto identity hostname

    crypto ISAKMP allow outside

    crypto ISAKMP policy 10

    preshared authentication

    the Encryption

    sha hash

    Group 1

    life 86400

    crypto ISAKMP policy 20

    preshared authentication

    3des encryption

    sha hash

    Group 2

    life 86400

    crypto ISAKMP policy 65535

    preshared authentication

    3des encryption

    sha hash

    Group 2

    life 86400

    Crypto isakmp nat-traversal 3600

    internal GroupPolicy1 group strategy

    cnf-vpn-cls group policy internal

    attributes of cnf-vpn-cls-group policy

    value of 10.1.1.7 WINS server

    value of 10.1.1.7 DNS server 10.1.1.205

    Protocol-tunnel-VPN IPSec l2tp ipsec

    field default value x.com

    sean U/h5bFVjXlIDx8BtqPFrQw password user name is nt encrypted

    IPSec-attributes tunnel-group DefaultRAGroup

    pre-shared-key secret1

    RADIUS-sdi-xauth

    tunnel-group DefaultRAGroup ppp-attributes

    ms-chap-v2 authentication

    tunnel-group cnf-vpn-cls type remote access

    tunnel-group global cnf-vpn-cls-attributes

    cnf-8-ip address pool

    Group Policy - by default-cnf-vpn-cls

    tunnel-group cnf-CC-vpn-ipsec-attributes

    pre-shared-key secret2

    ISAKMP ikev1-user authentication no

    tunnel-group cnf-vpn-cls ppp-attributes

    ms-chap-v2 authentication

    tunnel-group X.X.21.29 type ipsec-l2l

    IPSec-attributes tunnel-Group X.X.21.29

    Pre-shared key SECRET

    !

    class-map inspection_default

    match default-inspection-traffic

    !

    !

    !

    global service-policy global_policy

    context of prompt hostname

    Cryptochecksum:9780edb09bc7debe147db1e7d52ec39c

    : end

    #2: 2811 router config:

    !

    ! Last configuration change to 09:15:32 PST Friday, October 19, 2012 by cnfla

    ! NVRAM config update at 13:45:03 PST Tuesday, October 16, 2012

    !

    version 12.4

    horodateurs service debug datetime msec

    Log service timestamps datetime msec

    no password encryption service

    !

    hostname THE-2800

    !

    !

    Crypto pki trustpoint TP-self-signed-1411740556

    enrollment selfsigned

    name of the object cn = IOS - Self - signed - certificate - 1411740556

    revocation checking no

    rsakeypair TP-self-signed-1411740556

    !

    !

    TP-self-signed-1411740556 crypto pki certificate chain

    certificate self-signed 01

    308201A 8 A0030201 02020101 3082023F 300 D 0609 2A 864886 F70D0101 04050030

    2 060355 04031326 494F532D 53656 C 66 2 AND 536967 6E65642D 43657274 31312F30

    69666963 31343131 37343035 6174652D 3536301E 170 3132 31303136 32303435

    30335A 17 0D 323030 31303130 30303030 305A 3031 06035504 03132649 312F302D

    4F532D53 5369676E 656C662D 43 65727469 66696361 74652 31 34313137 65642D

    34303535 3630819F 300 D 0609 2A 864886 01050003, 818, 0030, 81890281 F70D0101

    8100F75F F1BDAD9B DE9381FD 7EAF9685 CF15A317 165B 5188 1 B 424825 9C66AA28

    C990B2D3 D69A2F0F D745DB0E 2BB4995D 73415AC4 F01B2019 C4BCF9E0 84373199

    E599B86C 17DBDCE6 47EBE0E3 8DBC90B2 9B4E217A 87F04BF7 A182501E 24381019

    A61D2C05 5404DE88 DA2A1ADC A81B7F65 C318B697 7ED69DF1 2769E4C8 F3449B33

    010001A 3 67306530 1 130101 FF040530 030101FF 30120603 0F060355 35AF0203

    1104 B 0 300982 074C412D 32383030 551D 551 2304 18301680 14B56EEB 301F0603

    88054CCA BB8CF8E8 F44BFE2C B77954E1 52301 D 06 04160414 B56EEB88 03551D0E

    054CCABB 8CF8E8F4 4BFE2CB7 7954E152 300 D 0609 2A 864886 F70D0101 04050003

    81810056 58755 56 331294F8 BEC4FEBC 54879FF5 0FCC73D4 B964BA7A 07D 20452

    E7F40F42 8B 355015 77156C9F AAA45F9F 59CDD27F 89FE7560 F08D953B FC19FD2D

    310DA96E A5F3E83B 52D515F8 7B4C99CF 4CECC3F7 1A0D4909 BD08C373 50BB53CC

    659 4246 2CB7B79F 43D94D96 586F9103 9B4659B6 5C8DDE4F 7CC5FC68 C4AD197A 4EC322 C

    quit smoking

    !

    !

    !

    crypto ISAKMP policy 1

    preshared authentication

    ISAKMP crypto key address SECRET X.X.138.132 No.-xauth

    !

    !

    Crypto ipsec transform-set the-2800-trans-set esp - esp-sha-hmac

    !

    map 1 la-2800-ipsec policy ipsec-isakmp crypto

    ipsec vpn Description policy

    defined by peer X.X.138.132

    the transform-set the-2800-trans-set value

    match address 101

    !

    !

    !

    !

    !

    !

    interface FastEthernet0/0

    Description WAN side

    address IP X.X.216.29 255.255.255.248

    NAT outside IP

    IP virtual-reassembly

    automatic duplex

    automatic speed

    No cdp enable

    No mop enabled

    card crypto 2800-ipsec-policy

    !

    interface FastEthernet0/1

    Description side LAN

    IP 10.20.1.1 255.255.255.0

    IP nat inside

    IP virtual-reassembly

    full duplex

    automatic speed

    No mop enabled

    !

    IP nat inside source map route sheep interface FastEthernet0/0 overload

    access-list 10 permit X.X.138.132

    access-list 99 allow 64.236.96.53

    access-list 99 allow 98.82.1.202

    access list 101 remark vpn tunnerl acl

    Note access-list 101 category SDM_ACL = 4

    policy of access list 101 remark tunnel

    access-list 101 permit ip 10.20.0.0 0.0.0.255 10.1.0.0 0.0.255.255

    access-list 110 deny ip 10.20.0.0 0.0.0.255 10.1.0.0 0.0.255.255

    access-list 110 permit ip 10.20.0.0 0.0.0.255 any

    public RO SNMP-server community

    !

    !

    !

    sheep allowed 10 route map

    corresponds to the IP 110

    !

    !

    !

    !

    WebVPN gateway gateway_1

    IP address X.X.216.29 port 443

    SSL trustpoint TP-self-signed-1411740556

    development

    !

    WebVPN install svc flash:/webvpn/svc.pkg

    !

    WebVPN gateway-1 context

    title 'b '.

    secondary-color white

    color of the title #CCCC66

    text-color black

    SSL authentication check all

    !

    !

    policy_1 political group

    functions compatible svc

    SVC-pool of addresses "WebVPN-Pool."

    SVC Dungeon-client-installed

    SVC split include 10.20.0.0 255.255.0.0

    Group Policy - by default-policy_1

    Gateway gateway_1

    development

    !

    !

    end

    #3: test Pix to the router:


    ITS enabled: 1

    Generate a new key SA: 0 (a tunnel report Active 1 and 1 to generate a new key during the generate a new key)

    Total SA IKE: 1

    1 peer IKE: X.X.21.29

    Type: user role: initiator

    Generate a new key: no State: MM_WAIT_MSG2

    > DEBUG:

    12:07:14 pix535:Oct 22 Oct 22 12:20:28 EDT: % PIX-vpn-3-713902: IP = X.X.21.29, Removing peer to peer table has not, no match
    !
    22 Oct 12:07:14 pix535: 22 Oct 12:20:28 EDT: % PIX-vpn-4-713903: IP = X.X.21.29, error: cannot delete PeerTblEntry
    #4: test the router to pix:
    LA - 2800 #sh crypto isakmp his
    IPv4 Crypto ISAKMP Security Association
    status of DST CBC State conn-id slot
    X.X.138.132 X.X.216.29 MM_KEY_EXCH 1017 ASSETS 0
    > debug
    LA - 2800 #ping 10.1.1.7 source 10.20.1.1
    Type to abort escape sequence.
    Send 5, echoes ICMP 100 bytes to 10.1.1.7, time-out is 2 seconds:
    Packet sent with a source address of 10.20.1.1
    Oct 22 16:24:33.945: ISAKMP: (0): profile of THE request is (NULL)
    22 Oct 16:24:33.945: ISAKMP: created a struct peer X.X.138.132, peer port 500
    22 Oct 16:24:33.945: ISAKMP: new created position = 0x488B25C8 peer_handle = 0 x 80000013
    22 Oct 16:24:33.945: ISAKMP: lock struct 0x488B25C8, refcount 1 to peer isakmp_initiator
    22 Oct 16:24:33.945: ISAKMP: 500 local port, remote port 500
    22 Oct 16:24:33.945: ISAKMP: set new node 0 to QM_IDLE
    22 Oct 16:24:33.945: ISAKMP: find a dup her to the tree during the isadb_insert his 487720 A 0 = call BVA
    22 Oct 16:24:33.945: ISAKMP: (0): cannot start aggressive mode, try the main mode.
    22 Oct 16:24:33.945: ISAKMP: (0): pair found pre-shared key matching 70.169.138.132
    Oct 22 16:24:33.945: ISAKMP: (0): built of NAT - T of the seller-rfc3947 ID
    Oct 22 16:24:33.945: ISAKMP: (0): built the seller-07 ID NAT - t
    Oct 22 16:24:33.945: ISAKMP: (0): built of NAT - T of the seller-03 ID
    Oct 22 16:24:33.945: ISAKMP: (0): built the seller-02 ID NAT - t
    22 Oct 16:24:33.945: ISAKMP: (0): entry = IKE_MESG_FROM_IPSEC, IKE_SA_REQ_MM
    22 Oct 16:24:33.945: ISAKMP: (0): former State = new State IKE_READY = IKE_I_MM1
    Oct 22 16:24:33.945: ISAKMP: (0): Beginner Main Mode Exchange
    Oct 22 16:24:33.945: ISAKMP: (0): package X.X.138.132 my_port 500 peer_port 500 (I) sending MM_NO_STATE
    22 Oct 16:24:33.945: ISAKMP: (0): sending a packet IPv4 IKE.
    22 Oct 16:24:34.049: ISAKMP (0:0): packet received dport 500 sport Global 500 (I) MM_NO_STATE X.X.138.132
    22 Oct 16:24:34.049: ISAKMP: (0): entry = IKE_MESG_FROM_PEER, IKE_MM_EXCH
    22 Oct 16:24:34.049: ISAKMP: (0): former State = new State IKE_I_MM1 = IKE_I_MM2
    Oct 22 16:24:34.049: ISAKMP: (0): treatment ITS payload. Message ID = 0
    Oct 22 16:24:34.049: ISAKMP: (0): load useful vendor id of treatment
    Oct 22 16:24:34.049: ISAKMP: (0): provider ID seems the unit/DPD but major incompatibility of 123
    Oct 22 16:24:34.049: ISAKMP: (0): provider ID is NAT - T v2
    Oct 22 16:24:34.049: ISAKMP: (0): load useful vendor id of treatment
    Oct 22 16:24:34.049: ISAKMP: (0): provider ID seems the unit/DPD but major incompatibility of 194
    22 Oct 16:24:34.053: ISAKMP: (0): pair found pre-shared key matching 70.169.138.132
    Oct 22 16:24:34.053: ISAKMP: (0): pre-shared key local found
    22 Oct 16:24:34.053: ISAKMP: analysis of the profiles for xauth...
    22 Oct 16:24:34.053: ISAKMP: (0): audit ISAKMP transform 1 against the policy of priority 1
    22 Oct 16:24:34.053: ISAKMP: DES-CBC encryption
    22 Oct 16:24:34.053: ISAKMP: SHA hash
    22 Oct 16:24:34.053: ISAKMP: default group 1
    22 Oct 16:24:34.053: ISAKMP: pre-shared key auth
    22 Oct 16:24:34.053: ISAKMP: type of life in seconds
    22 Oct 16:24:34.053: ISAKMP: life (IPV) 0 x 0 0 x 1 0 x 51 0x80
    22 Oct 16:24:34.053: ISAKMP: (0): atts are acceptable
    . Next payload is 0
    22 Oct 16:24:34.053: ISAKMP: (0): Acceptable atts: real life: 0
    22 Oct 16:24:34.053: ISAKMP: (0): Acceptable atts:life: 0
    22 Oct 16:24:34.053: ISAKMP: (0): fill atts in his vpi_length:4
    22 Oct 16:24:34.053: ISAKMP: (0): fill atts in his life_in_seconds:86400
    22 Oct 16:24:34.053: ISAKMP: (0): return real life: 86400
    22 Oct 16:24:34.053: ISAKMP: (0): timer life Started: 86400.
    Oct 22 16:24:34.053: ISAKMP: (0): load useful vendor id of treatment
    Oct 22 16:24:34.053: ISAKMP: (0): provider ID seems the unit/DPD but major incompatibility of 123
    Oct 22 16:24:34.053: ISAKMP: (0): provider ID is NAT - T v2
    Oct 22 16:24:34.053: ISAKMP: (0): load useful vendor id of treatment
    Oct 22 16:24:34.053: ISAKMP: (0): provider ID seems the unit/DPD but major incompatibility of 194
    22 Oct 16:24:34.053: ISAKMP: (0): entry = IKE_MESG_INTERNAL, IKE_PROCESS_MAIN_MODE
    22 Oct 16:24:34.053: ISAKMP: (0): former State = new State IKE_I_MM2 = IKE_I_MM2
    Oct 22 16:24:34.057: ISAKMP: (0): package X.X.138.132 my_port 500 peer_port 500 (I) sending MM_SA_SETUP
    22 Oct 16:24:34.057: ISAKMP: (0): sending a packet IPv4 IKE.
    22 Oct 16:24:34.057: ISAKMP: (0): entry = IKE_MESG_INTERNAL, IKE_PROCESS_COMPLETE
    22 Oct 16:24:34.057: ISAKMP: (0): former State = new State IKE_I_MM2 = IKE_I_MM3
    22 Oct 16:24:34.181: ISAKMP (0:0): packet received dport 500 sport Global 500 (I) MM_SA_SETUP X.X.138.132
    22 Oct 16:24:34.181: ISAKMP: (0): entry = IKE_MESG_FROM_PEER, IKE_MM_EXCH
    22 Oct 16:24:34.181: ISAKMP: (0): former State = new State IKE_I_MM3 = IKE_I_MM4
    Oct 22 16:24:34.181: ISAKMP: (0): processing KE payload. Message ID = 0
    Oct 22 16:24:34.217: ISAKMP: (0): processing NONCE payload. Message ID = 0
    22 Oct 16:24:34.217: ISAKMP: (0): pre-shared key found peer corresponding to X.X.138.132
    Oct 22 16:24:34.217: ISAKMP: (1018): load useful vendor id of treatment
    Oct 22 16:24:34.217: ISAKMP: (1018): provider ID is the unit
    Oct 22 16:24:34.217: ISAKMP: (1018): load useful vendor id of treatment
    Oct 22 16:24:34.217: ISAKMP: (1018): provider ID seems the unit/DPD but major incompatibility of 55
    Oct 22 16:24:34.217: ISAKMP: (1018): provider ID is XAUTH
    Oct 22 16:24:34.217: ISAKMP: (1018): load useful vendor id of treatment
    Oct 22 16:24:34.217: ISAKMP: (1018): addressing another box of IOS
    !
    Oct 22 16:24:34.221: ISAKMP: (1018): load useful vendor id of treatment
    22 Oct 16:24:34.221: ISAKMP: (1018): vendor ID seems the unit/DPD but hash mismatch
    22 Oct 16:24:34.221: ISAKMP: receives the payload type 20
    22 Oct 16:24:34.221: ISAKMP: receives the payload type 20
    22 Oct 16:24:34.221: ISAKMP: (1018): entry = IKE_MESG_INTERNAL, IKE_PROCESS_MAIN_MODE
    22 Oct 16:24:34.221: ISAKMP: (1018): former State = new State IKE_I_MM4 = IKE_I_MM4
    22 Oct 16:24:34.221: ISAKMP: (1018): send initial contact
    22 Oct 16:24:34.221: ISAKMP: (1018): ITS been pre-shared key, using id ID_IPV4_ADDR type authentication
    22 Oct 16:24:34.221: ISAKMP (0:1018): payload ID
    next payload: 8
    type: 1
    address: X.X.216.29
    Protocol: 17
    Port: 500
    Length: 12
    22 Oct 16:24:34.221: ISAKMP: (1018): the total payload length: 12
    Oct 22 16:24:34.221: ISAKMP: (1018): package X.X.138.132 my_port 500 peer_port 500 (I) sending MM_KEY_EXCH
    22 Oct 16:24:34.221: ISAKMP: (1018): sending a packet IPv4 IKE.
    22 Oct 16:24:34.225: ISAKMP: (1018): entry = IKE_MESG_INTERNAL, IKE_PROCESS_COMPLETE
    22 Oct 16:24:34.225: ISAKMP: (1018): former State = new State IKE_I_MM4 = IKE_I_MM5
    ...
    22 Oct 16:24:38.849: ISAKMP: (1017): purge the node 198554740
    22 Oct 16:24:38.849: ISAKMP: (1017): purge the node 812380002
    22 Oct 16:24:38.849: ISAKMP: (1017): purge node 773209335...
    Success rate is 0% (0/5)
    # THE-2800
    Oct 22 16:24:44.221: ISAKMP: (1018): transmit phase 1 MM_KEY_EXCH...
    22 Oct 16:24:44.221: ISAKMP (0:1018): increment the count of errors on his, try 1 5: retransmit the phase 1
    Oct 22 16:24:44.221: ISAKMP: (1018): transmit phase 1 MM_KEY_EXCH
    Oct 22 16:24:44.221: ISAKMP: (1018): package X.X.138.132 my_port 500 peer_port 500 (I) sending MM_KEY_EXCH
    22 Oct 16:24:44.221: ISAKMP: (1018): sending a packet IPv4 IKE.
    22 Oct 16:24:44.317: ISAKMP (0:1018): packet received dport 500 sport Global 500 (I) MM_KEY_EXCH X.X.138.132
    Oct 22 16:24:44.317: ISAKMP: (1018): package of phase 1 is a duplicate of a previous package.
    Oct 22 16:24:44.321: ISAKMP: (1018): retransmission jumped to the stage 1 (time elapsed since the last transmission 96)
    22 Oct 16:24:48.849: ISAKMP: (1017): serving SA., his is 469BAD60, delme is 469BAD60
    22 Oct 16:24:52.313: ISAKMP (0:1018): packet received dport 500 sport Global 500 (I) MM_KEY_EXCH X.X.138.132
    Oct 22 16:24:52.313: ISAKMP: (1018): package of phase 1 is a duplicate of a previous package.
    Oct 22 16:24:52.313: ISAKMP: (1018): retransmission due to phase 1 of retransmission
    Oct 22 16:24:52.813: ISAKMP: (1018): transmit phase 1 MM_KEY_EXCH...
    22 Oct 16:24:52.813: ISAKMP (0:1018): increment the count of errors on his, try 2 of 5: retransmit the phase 1
    Oct 22 16:24:52.813: ISAKMP: (1018): transmit phase 1 MM_KEY_EXCH
    Oct 22 16:24:52.813: ISAKMP: (1018): package X.X138.132 my_port 500 peer_port 500 (I) sending MM_KEY_EXCH
    22 Oct 16:24:52.813: ISAKMP: (1018): sending a packet IPv4 IKE.
    Oct 22 16:24:52.913: ISAKMP: (1018): package of phase 1 is a duplicate of a previous package.
    Oct 22 16:24:52.913: ISAKMP: (1018): retransmission jumped to the stage 1 (time elapsed since the last transmission of 100)
    22 Oct 16:25:00.905: ISAKMP (0:1018): packet received dport 500 sport Global 500 (I) MM_KEY_EXCH X.X.138.132
    22 Oct 16:25:00.905: ISAKMP: node set 422447177 to QM_IDLE
    ....
    22 Oct 16:25:03.941: ISAKMP: (1018): SA is still budding. New application of ipsec in the annex
    . (local 1 X. X.216.29, remote X.X.138.132)
    22 Oct 16:25:03.941: ISAKMP: error during the processing of HIS application: failed to initialize SA
    22 Oct 16:25:03.941: ISAKMP: error while processing message KMI 0, error 2.
    Oct 22 16:25:12.814: ISAKMP: (1018): transmit phase 1 MM_KEY_EXCH...
    22 Oct 16:25:12.814: ISAKMP (0:1018): increment the count of errors on his, try 4 out 5: retransmit the phase 1
    Oct 22 16:25:12.814: ISAKMP: (1018): transmit phase 1 MM_KEY_EXCH
    Oct 22 16:25:12.814: ISAKMP: (1018): package X.X.138.132 my_port 500 peer_port 500 (I) sending MM_KEY_EXCH
    22 Oct 16:25:12.814: ISAKMP: (1018): sending a packet IPv4 IKE.
    Oct 22 16:25:22.814: ISAKMP: (1018): transmit phase 1 MM_KEY_EXCH...
    22 Oct 16:25:22.814: ISAKMP (0:1018): increment the count of errors on his, try 5 of 5: retransmit the phase 1
    Oct 22 16:25:22.814: ISAKMP: (1018): transmit phase 1 MM_KEY_EXCH
    Oct 22 16:25:22.814: ISAKMP: (1018): package X.X.138.132 my_port 500 peer_port 500 (I) sending MM_KEY_EXCH
    22 Oct 16:25:22.814: ISAKMP: (1018): sending a packet IPv4 IKE.
    Oct 22 16:25:32.814: ISAKMP: (1018): transmit phase 1 MM_KEY_EXCH...
    22 Oct 16:25:32.814: ISAKMP: (1018): peer does not paranoid KeepAlive.
    ......

    22 Oct 16:25:32.814: ISAKMP: (1018): removal of reason ITS status of 'Death by retransmission P1' (I) MM_KEY_EXCH (post 70.169.138.132)

    22 Oct 16:25:32.814: ISAKMP: (1018): removal of reason ITS status of 'Death by retransmission P1' (I) MM_KEY_EXCH (post 70.169.138.132)

    22 Oct 16:25:32.814: ISAKMP: Unlocking counterpart struct 0x488B25C8 for isadb_mark_sa_deleted(), count 0

    22 Oct 16:25:32.814: ISAKMP: delete peer node by peer_reap for X.X.138.132: 488B25C8

    22 Oct 16:25:32.814: ISAKMP: (1018): error suppression node 1112432180 FALSE reason 'IKE deleted.

    22 Oct 16:25:32.814: ISAKMP: (1018): error suppression node 422447177 FALSE reason 'IKE deleted.

    22 Oct 16:25:32.814: ISAKMP: (1018): node-278980615 error suppression FALSE reason 'IKE deleted.

    22 Oct 16:25:32.814: ISAKMP: (1018): entry = IKE_MESG_INTERNAL, IKE_PHASE1_DEL

    22 Oct 16:25:32.814: ISAKMP: (1018): former State = new State IKE_I_MM5 = IKE_DEST_SA

    22 Oct 16:26:22.816: ISAKMP: (1018): purge the node 1112432180

    22 Oct 16:26:22.816: ISAKMP: (1018): purge the node 422447177

    22 Oct 16:26:22.816: ISAKMP: (1018): purge the node-278980615

    22 Oct 16:26:32.816: ISAKMP: (1018): serving SA., its A 487720, 0 =, delme = A 487720, 0

    The PIX is also used VPN client, such as the VPN Cicso 5.0 client access, works very well. Router is used as a server SSL VPN, too much work

    I know there are a lot of data here, I hope that these data may be useful for diagnostic purposes.

    All suggestions and tips are greatly appreciated.

    Sean

    Recommended action:

    On the PIX:

    no card crypto outside_map 1

    !

    crypto ISAKMP policy 5

    preshared authentication

    3des encryption

    sha hash

    Group 2

    life 86400

    !

    card crypto outside_map 10 correspondence address outside_1_cryptomap

    crypto outside_map 10 peer X.X.216.29 card game

    outside_map crypto 10 card value transform-set ESP-3DES-SHA

    life safety association set card crypto outside_map 10 28800 seconds

    card crypto outside_map 10 set security-association life kilobytes 4608000

    !

    tunnel-group X.X.216.29 type ipsec-l2l

    IPSec-attributes tunnel-Group X.X.216.29

    Pre-shared key SECRET

    !

    On the router:

    crypto ISAKMP policy 10

    preshared authentication

    Group 2

    3des encryption

    !

    Crypto ipsec transform-set esp-SHA-ESP-3DES-3des esp-sha-hmac

    output

    !

    card 10 la-2800-ipsec policy ipsec-isakmp crypto

    ipsec vpn Description policy

    defined by peer X.X.138.132

    game of transformation-ESP-3DES-SHA

    match address 101

    !

    No crypto card-2800-ipsec-policy 1

    Let me know how it goes.

    Portu.

    Please note all useful posts

    Post edited by: Javier Portuguez

  • Need to convert vmdk using pRDM vmkfstools command

    Need to convert to pRDM vmdk format command. tried to convert using cold migration that it stuck at 23 percent. Are there vmkfstools or powercli to convert?

    You can try the host command line is:

    vmkfstools -i /vmfs/volumes/source-ds/source-vm/source.vmdk/vmfs/volumes/target-ds/target-vm/target. VMDK

    You can optionally add thin d in case you want to that thin target to be configured.

    What you need to do - before running the command - is to ensure that the size of the disk in the hard file corresponds to the actual size of the LUN in case the LUN has been resized / increased at some point.

    André

  • preference outbound Dial-peer, how to set

    Hi all

    I have a case where a customer wants all calls except 34xx having LTD only
    and 34xx be masked to 3400. It's a 200 range 34xx and 35xx

    voice POTS dial-peer 1
    destination-model 0 t
    Disable fax speed
    restrict LTD
    direct line to inside
    port 0/2/0:15

    Dial-peer voice 7 pots
    Description block caller ID
    destination-model 0 t
    incoming called number 434...
    Disable fax speed
    CLID network-number 0357543400
    direct line to inside
    port 0/2/0:15

    This translates into calls randomly with the mask and no caller ID,

    the idea was that called-number incoming 434... in pots of equal voice dial 7, would give all calls with the 434xx monitoring and resume monitoring dial-peer voice 1 pots. However, this is not the case. I read that this incoming called number takes the monitoring.

    However see the numbering even detail, shows that calls get closer the two counterparts-dial and its using both dial peer.

    can someone clarify for me details about what patten matching dial takes preference. or an alternative.

    Concerning

    First you have to determine when you say "patten destination differentiate through the introductory call for instance' that you will use this command to match an incoming or outgoing dial peer dial peer. Since the destination-model command can be used to match the two dial peers, but the use is dfferent

    Dial Peer additional information

    The dial peer attribute destination-model has different behavior when it is applied to the feet of the incoming or outgoing call:

    • For inbound dial peers, the destination model is compared to the number calling (ANI string).

    • For outbound dial peers, the destination model is compared to the numbers dialed (DNIS string):

    So corresponding to a help outgoing dial peer destination-model against the call number is not possible. Just use the command preferably as suggested by Langlois, it will be your best shot in pre deciding outbound dial peers must be selected using the same destination model.

    Concerning

    Deepak

  • How a dial-peer SIP Trunk using a Registrar?

    Hi all

    I'll put up a GUY using two records.  With the generous help of people on this forum, I got records in doubles to work.  But now I need to know how to configure the dial-peer to use registration information.  For example, I have this set up:

    SIP - ua

    Password 08114342101A0A1A43 7 authentication username 5555555555

    ...

    IPv4:11.11.11.11:6034 at the office 1 expires 3600

    Registrar 2 ipv4:22.22.22.22:6035 expires 3600

    How to configure a dial-peer to send traffic to one of the recordings?  I tried this, and it does not work:

    Dial-peer voice voip 105

    Description * outgoing SIP Trunk call *.

    translation-profile outgoing PSTN_Outgoing

    destination-model 91%...

    session protocol sipv2

    Registrar of target session? WHAT SHOULD I USE HERE?

    codec voice-class 2

    DTMF-relay rtp - nte

    No vad

    Thanks in advance.

    Hi Tod,

    Please go through this post, hope that it answers your question:

    http://tekcert.com/blog/2011/02/03/CME-configuration-example-SIP-trunks-ViaTalk-and-voipms

    Specify the article accordingly.

    Kind regards

    Kevin

  • Dial-Peer out of the CME, for UC540 does not

    Dear Experts,

    We have a UC560 HQ and the new branch with 2811 router. These sites linked via VPN using fortigate. The connectivity between sites is in place and we are able to ping both the sites and networks of voice successfully.

    I have configured dial-peers on both sites. The headquarters at the local branch calls succeed without problem, but when we compose branch at HQ, we get a fast busy signal. Here is the config of dial peers

    AC-

    Dial-peer voice 300 voip
    destination-model 3...
    session target ipv4:192.168.110.1
    DTMF-relay h245 alphanumeric
    No vad

    Branch-

    Dial-peer voice 800 voip
    destination-model 8...
    session target ipv4:192.168.201.2
    DTMF-relay h245 alphanumeric
    No vad

    CSIM results of branch-

    CSIM start 891
    CSIM: called number = 891, number of loops = 1 ping count = 0

    CSIM err csimDisconnected recvd DISC cid (786)
    CSIM: loop = 1, failed = 1
    CSIM: call attempt = 1, Setup failed = 1, your failed = 0

    Please please advise. Thank you.

    Hi, it's like application of fraud alleged toll-free which dismissed the appeal of the site BR.

    1076043: 11 Oct 14:36:29.759: / / 282614/B639957688BC/CCAPI/cc_api_call_setup_ind_common:
    Set up the event sent;
    Call Info (number = 308(TON = unknown, NPI = unknown, not projected = screening, presentation = authorized),
       Called number = 807 (Unknown = TON, NPI = unknown))

    1076047: 11 Oct 14:36:29.763: / / 282614/B639957688BC/CCAPI/cc_process_call_setup_ind:
    > Handed CCAPI cid 282614 tagged 300 to app "" _ManagedAppProcess_TOLLFRAUD_APP".
    1076048: 11 Oct 14:36:29.763: / / 282614/B639957688BC/CCAPI/ccCallDisconnect:
       Value = 21, Tag = 0x0, entry calls (previous disconnection Cause = 0, remove the Cause = 0)

    you need to add the address IP of GW BR (192.168.110.1) slot ' voice voip service > reliable list of IPS "as shown below.

    voip phone service
    list of approved IP addresses
    IPv4 192.168.110.1

    For you reference: https://supportforums.cisco.com/document/46566/understanding-toll-fraud-...

  • Problems with dial-peer between routers cisco 3925

    Good afternoon...

    I have a problem when we want to connect telephony between two routers 3925, on both routers and I configured the

    telephone service (phone service), I released my phone and there is an internal communication in each of them (I can do

    between the phones of the same router), each router I have configured a dial-position intercomunicarlos and this is where the problem arises. When I try a telephone line in the router for each B telephone router A composed the Ringout timeout and mark Unknow number is finished, when I make a call, the router that has the phone number of this brand, I run sh call status command and tells me that there is an ongoing call and you use , the problem with the dial-peer, is that it seems that the other router you call never happens.

    I help a lot to get an overview of why this happens.

    Thank you

    Excuse my English is not very good

    In addition what IOS you're running, calls can be prevented by the mechanism of toll-free fraud if it is 15.1 or newer.

    HTH,

    Chris

  • Hard disk space do not correspond with the size of all the content files!

    In the properties of "my computer", my placeholder is (?) 114 GB
    My files are almost empty!
    If I choose theall files on the hard drive and click Properties, the size is only 50 GB!
    All waste are removed, I ran degfragmatation and my memory Visual option is 'auto '.
    I do not understand why this submission therefore difference between.
    Can you help me please?

    In the properties of "my computer", my placeholder is (?) 114 GB
    My files are almost empty!
    If I choose theall files on the hard drive and click Properties, the size is only 50 GB!
    All waste are removed, I ran degfragmatation and my memory Visual option is 'auto '.
    I do not understand why this submission therefore difference between.
    Can you help me please?

    ... I forgot... my laptop is very recent, almost 15 days...

  • Dial the direct IP address of E20 E20 /-to-peer

    Hello

    We try to replace Polycoms by E20 in our small office.  We always try to get the E20 to accept the static Ip address.  He will gladly accept a DHCP offering if the product is connected to a local VIRTUAL network with a DHCP server.  If specify us a static IP address, it shows network not found message.

    Everything we try to do is make a direct ccall-to-peer use a publicly routed IP address.  Of course, since we are still not able to use static IP addresses, in our test configuration, we have two units connected on a private subnet (172.16.140.50 and 172.16.140.51), which is to assign a DHCP address for both units.  Is it possible to call direct ip from 172.16.140.50 to 172.16.140.51?

    Thank you

    DD

    Hi DD,

    A couple of things to check. I don't know whether a problem with the IP address conflict, I think that Ravi pointed out correctly that if it is a conflict with the IP address, you can send it.

    Just to add to that, Yes, you can make direct calls. In order to make direct calls, make sure that the version of the software on the E20 is TE4.1. Once you have the E20 running this version, you can configure the E20 as a H323 endpoint and you would be able to make direct calls to public IP addresses.

    For more information, please see the release notes for TE4.1:

    FTP://FTP.Tandberg.com/pub/software/endpoints/Te/Cisco%20IP%20Video%20Phone%20E20%20TE%20Software%20release%20Notes%20 (TE4) .pdf

    You can assign IP addresses to the E20 and then make the Direct call setup mode. Connect to the API and the following number:

    xConfiguration H323 profile 1 CallSetup Mode: Direct

    Hope that answers your question.

    Kind regards

    Saint André

  • Site to Site &amp; Dialer Dual Wan VPN

    Hello!

    I have some problems with a Cisco 1941 running 15.2...

    I have two interfaces WAN ADSL (PPPoE Dialer). I want normal Internet traffic through DSL - 1 and VPN through DSL - 2. So I put the default route through Dialer1 and the route heading to the IP of the Brach-Site (R.R.R.R), through Dialer2.

    on the R1: Ping R.R.R.R-> works fine

    A2: Ping Y.Y.Y.Y-> works fine

    R2: ssh Y.Y.Y.Y-> works fine

    so I guess that routing should work?

    but the VPN be established:

    router-wi #show cry sess

    Current state of the session crypto

    Interface: Dialer1

    The session state: DOWN-NEGOTIATION

    Peer: Port B.B.B.B 500

    IKEv1 SA: local X.X.X.Xremote of 500 B.B.B.Bidle 500

    FLOW IPSEC: allowed ip 172.20.100.0/255.255.255.0 172.20.110.0/255.255.255.0

    Active sAs: 0, origin: card crypto

    FLOW IPSEC: allowed ip 192.168.100.0/255.255.255.0 192.168.40.0/255.255.255.0

    Active sAs: 0, origin: card crypto

    Interface: Dialer2

    The session state: down

    Peer: B.B.B.B port 500

    FLOW IPSEC: allowed ip 172.20.100.0/255.255.255.0 172.20.110.0/255.255.255.0

    Active sAs: 0, origin: card crypto

    FLOW IPSEC: allowed ip 192.168.100.0/255.255.255.0 192.168.40.0/255.255.255.0

    Active sAs: 0, origin: card crypto

    Even when I remove the Card Crypto VPN - D1, without VPN can be established. Only when I stop the Dialer1 interface and the default Route also goes throug Dialer2 VPN is properly set up.

    R1 config:

    .....

    track 1 ip sla 1

    period 5-2

    !

    Track 2 ip sla 2

    period 5-2

    !

    crypto ISAKMP policy 1

    BA aes 256

    sha512 hash

    preshared authentication

    !

    ISAKMP crypto key xxxxx address R.R.R.R

    ISAKMP xauth timeout 10 crypto

    !

    Crypto ipsec transform-set esp - aes 256 esp-sha512-hmac VPN_TS

    !

    map VPN crypto -D1 10 ipsec-isakmp

    defined by peer R.R.R.R

    game of transformation-VPN_TS

    match address VPN_1

    map VPN - D1 20 ipsec-isakmp crypto

    defined by peer R.R.R.R

    game of transformation-VPN_TS

    match address VPN_2

    !

    map VPN crypto -D2 10 ipsec-isakmp

    defined by peer R.R.R.R

    game of transformation-VPN_TS

    match address VPN_1

    map VPN - D2 20 ipsec-isakmp crypto

    defined by peer R.R.R.R

    game of transformation-VPN_TS

    match address VPN_2

    !

    interface GigabitEthernet0/0

    Green description

    no ip address

    IP virtual-reassembly in

    IP tcp adjust-mss 1412

    automatic duplex

    automatic speed

    !

    interface GigabitEthernet0/0.1

    Wlan (network VPN_1) description

    encapsulation dot1Q 2 native

    192.168.100.2 IP address 255.255.255.0

    NBAR IP protocol discovery

    penetration of the IP stream

    stream IP output

    IP nat inside

    IP virtual-reassembly in

    !

    interface GigabitEthernet0/1

    Orange Description

    no ip address

    IP tcp adjust-mss 1412

    automatic duplex

    automatic speed

    !

    interface GigabitEthernet0/1.1

    Description VPN_2 network

    encapsulation dot1Q 1 native

    IP 172.20.100.2 255.255.255.0

    NBAR IP protocol discovery

    penetration of the IP stream

    stream IP output

    IP virtual-reassembly in

    !

    interface FastEthernet0/0/0

    Description-= DSL-1 =-

    no ip address

    automatic duplex

    automatic speed

    PPPoE enable global group

    PPPoE-client dial-pool-number 1

    !

    interface FastEthernet0/0/1

    Description-= DSL-2 =-

    no ip address

    IP virtual-reassembly in

    automatic duplex

    automatic speed

    PPPoE enable global group

    PPPoE-client dial-pool-number 2

    !

    interface Dialer1

    Description-= DSL-1 (Vdsl) =-

    the negotiated IP address

    IP mtu 1452

    NBAR IP protocol discovery

    penetration of the IP stream

    stream IP output

    NAT outside IP

    IP virtual-reassembly in

    encapsulation ppp

    Dialer pool 1

    Dialer-Group 1

    PPP authentication chap callin pap

    PPP chap hostname [email protected] / * /

    PPP chap password 0 xxx

    PPP pap sent-username [email protected] / * / password 0 xxx

    card crypto VPN - D1

    !

    interface Dialer2

    Description-= DSL-2 (T - DSL) =-

    the negotiated IP address

    IP mtu 1452

    NBAR IP protocol discovery

    penetration of the IP stream

    stream IP output

    NAT outside IP

    IP virtual-reassembly in

    encapsulation ppp

    Dialer pool 2

    Dialer-Group 2

    PPP authentication chap callin pap

    PPP chap hostname [email protected] / * /

    PPP chap password 0 xxx

    PPP pap sent-username [email protected] / * / password 0 xxx

    card crypto VPN - D2

    !

    .......

    !

    The dns server IP

    IP nat inside source map route DSL - 1 interface Dialer1 overload

    IP nat inside source map route DSL - 2 interface Dialer2 overload

    IP route B.B.B.B 255.255.255.255 Dialer2 10 track 2

    IP route 0.0.0.0 0.0.0.0 Dialer1 30 track 1

    IP route 0.0.0.0 0.0.0.0 Dialer2 50 track 2

    !

    VPN_2 extended IP access list

    IP 172.20.100.0 allow 0.0.0.255 172.20.110.0 0.0.0.255

    VPN_1 extended IP access list

    IP 192.168.100.0 allow 0.0.0.255 192.168.40.0 0.0.0.255

    !

    radius of the IP source-interface GigabitEthernet0/0.1

    ALS IP 1

    X.X.X.X ICMP echo

    tag Check DSL-1

    threshold of 300

    timeout 500

    frequency 5

    IP SLA annex 1 point of life to always start-time now

    ALS IP 2

    Y.Y.Y.Y ICMP echo

    tag check DSL - 2

    threshold of 300

    timeout 500

    frequency 1

    IP SLA annex 2 to always start-time life now

    access-list 100 remark = NAT Route - Map DSL-1 LCA =-

    access-list 100 deny ip 192.168.100.0 0.0.0.255 192.168.40.0 0.0.0.255

    access-list 100 permit ip 192.168.100.0 0.0.0.255 any

    access list 101 remark = NAT Route - Map DSL-2 ABI =-

    access-list 101 deny ip 192.168.100.0 0.0.0.255 192.168.40.0 0.0.0.255

    access-list 101 permit ip 192.168.100.0 0.0.0.255 any

    Dialer-list 1 ip protocol allow

    Dialer-list 2 ip protocol allow

    !

    10 allowed DSL-2 route map

    corresponds to the IP 101

    match interface Dialer2

    DSL-1 allowed route map 10

    corresponds to the IP 100

    match interface Dialer1

    R2 config:

    ....

    10 VPN ipsec-isakmp crypto map

    defined peer Y.Y.Y.Y

    defined peer X.X.X.X

    game of transformation-VPN_TS

    match address VPN_1

    20 VPN ipsec-isakmp crypto map

    defined peer Y.Y.Y.Y

    defined peer X.X.X.X

    game of transformation-VPN_TS

    match address VPN_2

    ...

    Yes you can incorporate these underneath routes as well on track 2, however track 2 fails, you must have a failover to dsl1 itinerary, with highest should cost 100 road.

    IP route 192.168.40.0 255.255.255.0 Dialer 2 track 2 name VPN-1_to_R2_via_DSL-2

    IP route 172.20.110.0 255.255.255.0 Dialer 2 track 2 name VPN-2_to_R2_via_DSL-2

    Hope that helps.

    Thank you

    Rizwan James

    Post edited by: Mohamed Rizwan

  • MacBook Pro hard repeated panics of the kernel

    Hello

    I knew panic the kernel repeated on my MacBook Pro (retina, 15 inch, mid-2014). In general, a piece of software will be "quit unexpectedly" a few times (Web Safari, Mail, Finder content). Then, randomly, the system will be completely freeze two seconds and restart.

    I tried running with the system in Mode safe, but panicking kernel continue to hinder. Then I erased the hard drive and reinstalled the new El Capitan (and later upgrade to Sierra). I continued to experiment with these error messages and panics of the kernel, which I can only assume means that I have a hardware problem.

    I take the unit to a Genius Bar next week, but in the meantime, I was wondering if someone could look over panic report and identify a possible cause? I have never added or changed everything - the MacBook is exactly as it was when I bought it.

    Panic report *.

    panic (cpu 6 0xffffff80013ef077 appellant): "Possible memory corruption: pmap_pv_remove (0xffffff80208925e0, 0x10f621000, 0 x 40, 0 40000, 0xffffff81e9943b8c, 0xffffff81e9943b80): pv_list null!" @/Library/Caches/com.apple.xbs/Sources/xnu/xnu-3789.1.32/osfmk/i386/pm ap_internal.h:786

    Backtrace (CPU 6), frame: return address

    0xffffff81e99439b0: 0xffffff80012f748c

    0xffffff81e9943a30: 0xffffff80013ef077

    0xffffff81e9943bc0: 0xffffff80013735e1

    0xffffff81e9943d50: 0xffffff8001374ea5

    0xffffff81e9943f30: 0xffffff800140a35c

    0xffffff81e9943fb0: 0xffffff80012a9655

    The process corresponding to the current thread BSD name: ReportCrash

    Mac OS version:

    A 16, 323

    Kernel version:

    16.0.0 Darwin kernel version: Mon Aug 29 17:56:20 PDT 2016; root:XNU-3789.1.32~3/RELEASE_X86_64

    Kernel UUID: 622D2470-C34D-31F9-A62B-6AA9A3C6A3CD

    Slide kernel: 0 x 0000000001000000

    Text of core base: 0xffffff8001200000

    Text __HIB base: 0xffffff8001100000

    Name of system model: MacBookPro11, 2 (Mac-3CBD00234E554E41)

    Availability of the system in nanoseconds: 618091097144

    last load kext to 499153283898: com.apple.iokit.IOBluetoothUSBDFU 5.0.0f18 (addr 0xffffff7f8418c000 size 12288)

    Finally unloaded kext to 379778273675: com.apple.driver.AppleXsanScheme 3 (addr 0xffffff7f83523000 size 40960)

    kexts responsible:

    com.apple.iokit.IOBluetoothUSBDFU 5.0.0f18

    com.apple.driver.AppleUSBTCKeyEventDriver 251

    com.apple.driver.AudioAUUC 1.70

    com.apple.driver.ApplePlatformEnabler 2.7.0d0

    com.apple.driver.AGPM 110.23.7

    com.apple.driver.X86PlatformShim 1.0.0

    com Apple.filesystems.autofs 3.0

    com.apple.driver.AppleOSXWatchdog 1

    com.apple.driver.AppleGraphicsDevicePolicy 3.13.60

    com.apple.driver.AppleHDA 276.26

    com.apple.driver.AppleUpstreamUserClient 3.6.4

    com Apple.Driver.pmtelemetry 1

    com.apple.iokit.IOUserEthernet 1.0.1

    com.apple.iokit.IOBluetoothSerialManager 5.0.0f18

    com.apple.Dont_Steal_Mac_OS_X 7.0.0

    com.apple.driver.AppleIntelHD5000Graphics 10.1.8

    com.apple.driver.AppleBacklight 170.9.10

    com.apple.driver.AppleHV 1

    com.apple.iokit.BroadcomBluetoothHostControllerUSBTransport 5.0.0f18

    com.apple.driver.AppleIntelSlowAdaptiveClocking 4.0.0

    com.apple.driver.AppleSMCLMU 208

    com.apple.driver.AppleMCCSControl 1.2.13

    com.apple.driver.AppleLPC 3.1

    com.apple.driver.AppleCameraInterface 5.57.0

    com.apple.driver.AppleIntelFramebufferAzul 10.1.8

    com.apple.driver.AppleThunderboltIP 3.0.8

    com.apple.driver.AppleUSBCardReader 404.1.1

    com.apple.driver.AppleUSBTCButtons 251

    com.apple.driver.AppleUSBTCKeyboard 251

    com.apple.AppleFSCompression.AppleFSCompressionTypeDataless 1.0.0d1

    com.apple.AppleFSCompression.AppleFSCompressionTypeZlib 1.0.0

    com.apple.BootCache 39

    com Apple.filesystems.HFS.kext 366.1.1

    com.apple.iokit.IOAHCIBlockStorage 295.1.1

    com.apple.driver.AppleAHCIPort 326

    com.apple.driver.AirPort.Brcm4360 1100.37.1a16

    com.apple.driver.AppleSmartBatteryManager 161.0.0

    com.apple.driver.AppleRTC 2.0

    com.apple.driver.AppleACPIButtons 5.0

    com.apple.driver.AppleHPET 1.8

    com.apple.driver.AppleSMBIOS 2.1

    com.apple.driver.AppleACPIEC 5.0

    com.apple.driver.AppleAPIC 1.7

    com Apple.NKE.applicationfirewall 171

    com Apple.Security.Quarantine 3

    com.apple.security.TMSafetyNet 8

    com Apple.Driver.USB.cdc 5.0.0

    com Apple.kext.Triggers 1.0

    com.apple.driver.DspFuncLib 276.26

    com.apple.kext.OSvKernDSPLib 525

    com.apple.iokit.IOSerialFamily 11

    com.apple.iokit.IOSurface 152

    com.apple.iokit.IOBluetoothHostControllerUSBTransport 5.0.0f18

    com.apple.iokit.IOBluetoothHostControllerTransport 5.0.0f18

    com.apple.iokit.IOBluetoothFamily 5.0.0f18

    com.apple.iokit.IOSlowAdaptiveClockingFamily 1.0.0

    com.apple.driver.AppleSMBusController 1.0.14d1

    com.apple.driver.AppleBacklightExpert 1.1.0

    com.apple.iokit.IONDRVSupport 2.4.1

    com.apple.driver.AppleGraphicsControl 3.13.60

    com.apple.driver.X86PlatformPlugin 1.0.0

    com.apple.driver.AppleSMC 3.1.9

    com.apple.driver.IOPlatformPluginFamily 6.0.0d8

    com.apple.AppleGraphicsDeviceControl 3.13.60

    com.apple.iokit.IOAcceleratorFamily2 288.13

    com.apple.driver.AppleHDAController 276.26

    com.apple.iokit.IOGraphicsFamily 2.4.1

    com.apple.iokit.IOHDAFamily 276.26

    com.apple.iokit.IOAudioFamily 205.11

    com.apple.vecLib.kext 1.2.0

    com.apple.iokit.IOSCSIBlockCommandsDevice 394

    com.apple.iokit.IOUSBMassStorageDriver 131.1.1

    com.apple.iokit.IOSCSIArchitectureModelFamily 394

    com.apple.driver.usb.AppleUSBHub 1.1

    com.apple.driver.AppleUSBMultitouch 258

    com.apple.driver.usb.IOUSBHostHIDDevice 1.1

    com.Apple.Driver.USB.Networking 5.0.0

    com.apple.driver.usb.AppleUSBHostCompositeDevice 1.1

    com.apple.driver.CoreStorage 540

    com Apple.filesystems.HFS.Encodings.kext 1

    com.apple.iokit.IOAHCIFamily 288

    com.apple.driver.AppleThunderboltDPInAdapter 4.5.3

    com.apple.driver.AppleThunderboltDPAdapterFamily 4.5.3

    com.apple.driver.AppleThunderboltPCIDownAdapter 2.0.3

    com.apple.driver.AppleThunderboltNHI 4.1.3

    com.apple.iokit.IOThunderboltFamily 6.2.1

    com.apple.iokit.IO80211Family 1200.12.2

    com.apple.driver.mDNSOffloadUserClient 1.0.1b8

    com.apple.iokit.IONetworkingFamily 3.2

    com Apple.Driver.corecapture 1.0.4

    com.apple.driver.usb.AppleUSBHostPacketFilter 1.0

    com.apple.iokit.IOUSBFamily 900.4.1

    com.apple.driver.usb.AppleUSBXHCIPCI 1.1

    com.apple.driver.usb.AppleUSBXHCI 1.1

    com.apple.iokit.IOUSBHostFamily 1.1

    com.apple.driver.AppleUSBHostMergeProperties 1.1

    com.apple.driver.AppleEFINVRAM 2.1

    com.apple.driver.AppleBusPowerController 1.0

    com.apple.driver.AppleEFIRuntime 2.0

    com.apple.iokit.IOHIDFamily 2.0.0

    com.apple.iokit.IOSMBusFamily 1.1

    com Apple.Security.sandbox 300.0

    com.apple.kext.AppleMatch 1.0.0d1

    com.apple.driver.AppleKeyStore 2

    com.apple.driver.AppleMobileFileIntegrity 1.0.5

    com.apple.driver.AppleCredentialManager 1.0

    com.apple.driver.DiskImages 444

    com.apple.iokit.IOStorageFamily 2.1

    com.apple.iokit.IOReportFamily 31

    com.apple.driver.AppleFDEKeyStore 28.30

    com.apple.driver.AppleACPIPlatform 5.0

    com.apple.iokit.IOPCIFamily 2.9

    com.apple.iokit.IOACPIFamily 1.4

    com.apple.kec.Libm 1

    com Apple.KEC.pthread 1

    com Apple.KEC.corecrypto 1.0

    System profile:

    Airport: spairport_wireless_card_type_airport_extreme (0x14E4, 0 x 134), Broadcom BCM43xx 1.0 (7.21.171.10.1a16)

    Bluetooth: Version 5.0.0f18, 3 services, 27 aircraft, 1 incoming serial ports

    Bus crush: MacBook Pro, Apple Inc., 17.1

    Memory module: BANK 0/DIMM0, 8 GB, DDR3, 1600 MHz, 0x802C, 0x31364B544631473634485A2D314736453120

    Memory module: BANK 1/DIMM0, 8 GB, DDR3, 1600 MHz, 0x802C, 0x31364B544631473634485A2D314736453120

    USB device: USB 3.0 Bus

    USB device: Apple keyboard / Trackpad

    USB device: Hub BRCM20702

    USB Device: USB Bluetooth host controller

    Serial ATA Device: APPLE SM0256F, 251 GB SSD

    Model: MacBookPro11 2, MBP112.0138.B17 of BootROM, 4 processors, Intel Core i7, 2.2 GHz, 16 GB, MSC 2.18f15

    Network service: Wi - Fi, AirPort, en0

    Graphics card: Intel integrated Iris Pro, Intel Iris Pro,

    Model: MacBookPro11 2, MBP112.0138.B17 of BootROM, 4 processors, Intel Core i7, 2.2 GHz, 16 GB, MSC 2.18f15

    Graphics card: Intel integrated Iris Pro, Intel Iris Pro,

    Memory module: BANK 0/DIMM0, 8 GB, DDR3, 1600 MHz, 0x802C, 0x31364B544631473634485A2D314736453120

    Memory module: BANK 1/DIMM0, 8 GB, DDR3, 1600 MHz, 0x802C, 0x31364B544631473634485A2D314736453120

    Airport: spairport_wireless_card_type_airport_extreme (0x14E4, 0 x 134), Broadcom BCM43xx 1.0 (7.21.171.10.1a16)

    Bluetooth: Version 5.0.0f18, 3 services, 27 aircraft, 1 incoming serial ports

    Network service: Wi - Fi, AirPort, en0

    Serial ATA Device: APPLE SM0256F, 251 GB SSD

    USB device: USB 3.0 Bus

    USB device: Apple keyboard / Trackpad

    USB device: Hub BRCM20702

    USB Device: USB Bluetooth host controller

    Bus crush: MacBook Pro, Apple Inc., 17.1

    You seem running unmodified Mac OS (no third party kernel extensions added). Mac OS do not plant this way. You should pay attention to this statement in the accident report:

    panic (cpu 6 0xffffff80013ef077 appellant): "Possible memory corruption:

Maybe you are looking for