No. Time Source Destination Protocol Info 7 17.177861 192.168.1.236 ISAKMP Aggressive Ethernet II, Src: (), Dst: () Internet Protocol, Src: 192.168.1.236 (192.168.1.236), Dst: () User Datagram Protocol, Src Port: sg-lm (1659), Dst Port: isakmp (500) Source port: sg-lm (1659) Destination port: isakmp (500) Length: 428 Checksum: 0x5766 [correct] [Good Checksum: True] [Bad Checksum: False] Internet Security Association and Key Management Protocol Initiator cookie: FBC769FEED7FA8F0 Responder cookie: 0000000000000000 Next payload: Security Association (1) Version: 1.0 Exchange type: Aggressive (4) Flags: 0x00 .... ...0 = Not encrypted .... ..0. = No commit .... .0.. = No authentication Message ID: 0x00000000 Length: 420 Security Association payload Next payload: Vendor ID (13) Payload length: 164 Domain of interpretation: IPSEC (1) Situation: IDENTITY (1) Proposal payload # 1 Next payload: NONE (0) Payload length: 152 Proposal number: 1 Protocol ID: ISAKMP (1) SPI Size: 0 Proposal transforms: 4 Transform payload # 1 Next payload: Transform (3) Payload length: 36 Transform number: 1 Transform ID: KEY_IKE (1) Encryption-Algorithm (1): DES-CBC (1) Hash-Algorithm (2): MD5 (1) Authentication-Method (3): PSK (1) Group-Description (4): Alternate 1024-bit MODP group (2) Life-Type (11): Seconds (1) Life-Duration (12): Duration-Value (864000) Transform payload # 2 Next payload: Transform (3) Payload length: 36 Transform number: 2 Transform ID: KEY_IKE (1) Encryption-Algorithm (1): DES-CBC (1) Hash-Algorithm (2): SHA (2) Authentication-Method (3): PSK (1) Group-Description (4): Alternate 1024-bit MODP group (2) Life-Type (11): Seconds (1) Life-Duration (12): Duration-Value (864000) Transform payload # 3 Next payload: Transform (3) Payload length: 36 Transform number: 3 Transform ID: KEY_IKE (1) Encryption-Algorithm (1): 3DES-CBC (5) Hash-Algorithm (2): MD5 (1) Authentication-Method (3): PSK (1) Group-Description (4): Alternate 1024-bit MODP group (2) Life-Type (11): Seconds (1) Life-Duration (12): Duration-Value (864000) Transform payload # 4 Next payload: NONE (0) Payload length: 36 Transform number: 4 Transform ID: KEY_IKE (1) Encryption-Algorithm (1): 3DES-CBC (5) Hash-Algorithm (2): SHA (2) Authentication-Method (3): PSK (1) Group-Description (4): Alternate 1024-bit MODP group (2) Life-Type (11): Seconds (1) Life-Duration (12): Duration-Value (864000) Vendor ID: 4C5643372E312E323A5850 Next payload: Key Exchange (4) Payload length: 15 Vendor ID: 4C5643372E312E323A5850 Key Exchange payload Next payload: Nonce (10) Payload length: 132 Key Exchange Data (128 bytes / 1024 bits) Nonce payload Next payload: Identification (5) Payload length: 68 Nonce Data Identification payload Next payload: NONE (0) Payload length: 13 ID type: 3 ID type: USER_FQDN (3) Protocol ID: Unused Port: Unused Identification data: !@#$% No. Time Source Destination Protocol Info 8 17.269798 192.168.1.236 ISAKMP Aggressive Ethernet II, Src: (), Dst: () Internet Protocol, Src: (), Dst: 192.168.1.236 (192.168.1.236) User Datagram Protocol, Src Port: isakmp (500), Dst Port: sg-lm (1659) Source port: isakmp (500) Destination port: sg-lm (1659) Length: 316 Checksum: 0x0000 (none) Good Checksum: False Bad Checksum: False Internet Security Association and Key Management Protocol Initiator cookie: FBC769FEED7FA8F0 Responder cookie: 983CAFC2DCDD7F2B Next payload: Security Association (1) Version: 1.0 Exchange type: Aggressive (4) Flags: 0x00 .... ...0 = Not encrypted .... ..0. = No commit .... .0.. = No authentication Message ID: 0x00000000 Length: 308 Security Association payload Next payload: Key Exchange (4) Payload length: 64 Domain of interpretation: IPSEC (1) Situation: IDENTITY (1) Proposal payload # 1 Next payload: NONE (0) Payload length: 52 Proposal number: 1 Protocol ID: ISAKMP (1) SPI Size: 8 Proposal transforms: 1 SPI: 0x983CAFC2DCDD7F2B Transform payload # 4 Next payload: NONE (0) Payload length: 36 Transform number: 4 Transform ID: KEY_IKE (1) Encryption-Algorithm (1): 3DES-CBC (5) Hash-Algorithm (2): SHA (2) Authentication-Method (3): PSK (1) Group-Description (4): Alternate 1024-bit MODP group (2) Life-Type (11): Seconds (1) Life-Duration (12): Duration-Value (864000) Key Exchange payload Next payload: Nonce (10) Payload length: 132 Key Exchange Data (128 bytes / 1024 bits) Nonce payload Next payload: Identification (5) Payload length: 20 Nonce Data Identification payload Next payload: Hash (8) Payload length: 12 ID type: 1 ID type: IPV4_ADDR (1) Protocol ID: Unused Port: Unused Identification data: Hash payload Next payload: Vendor ID (13) Payload length: 24 Hash Data Vendor ID: 4C5647392E322E3234353A425249434B3A392E322E323435 Next payload: NONE (0) Payload length: 28 Vendor ID: 4C5647392E322E3234353A425249434B3A392E322E323435 No. Time Source Destination Protocol Info 9 17.273487 192.168.1.236 ISAKMP Aggressive Ethernet II, Src: (), Dst: () Internet Protocol, Src: 192.168.1.236 (192.168.1.236), Dst: () User Datagram Protocol, Src Port: sg-lm (1659), Dst Port: isakmp (500) Source port: sg-lm (1659) Destination port: isakmp (500) Length: 60 Checksum: 0x3410 [correct] [Good Checksum: True] [Bad Checksum: False] Internet Security Association and Key Management Protocol Initiator cookie: FBC769FEED7FA8F0 Responder cookie: 983CAFC2DCDD7F2B Next payload: Hash (8) Version: 1.0 Exchange type: Aggressive (4) Flags: 0x00 .... ...0 = Not encrypted .... ..0. = No commit .... .0.. = No authentication Message ID: 0x00000000 Length: 52 Hash payload Next payload: NONE (0) Payload length: 24 Hash Data No. Time Source Destination Protocol Info Frame 10 (110 bytes on wire, 110 bytes captured) Ethernet II, Src: (), Dst: () Internet Protocol, Src: (), Dst: 192.168.1.236 (192.168.1.236) User Datagram Protocol, Src Port: isakmp (500), Dst Port: sg-lm (1659) Source port: isakmp (500) Destination port: sg-lm (1659) Length: 76 Checksum: 0x0000 (none) Good Checksum: False Bad Checksum: False Internet Security Association and Key Management Protocol Initiator cookie: FBC769FEED7FA8F0 Responder cookie: 983CAFC2DCDD7F2B Next payload: Hash (8) Version: 1.0 Exchange type: Informational (5) Flags: 0x01 .... ...1 = Encrypted .... ..0. = No commit .... .0.. = No authentication Message ID: 0x91554653 Length: 68 Encrypted payload (40 bytes) No. Time Source Destination Protocol Info 11 17.368956 192.168.1.236 ISAKMP Informational Ethernet II, Src: (), Dst: () Internet Protocol, Src: 192.168.1.236 (192.168.1.236), Dst: () User Datagram Protocol, Src Port: sg-lm (1659), Dst Port: isakmp (500) Source port: sg-lm (1659) Destination port: isakmp (500) Length: 132 Checksum: 0x666c [correct] [Good Checksum: True] [Bad Checksum: False] Internet Security Association and Key Management Protocol Initiator cookie: FBC769FEED7FA8F0 Responder cookie: 983CAFC2DCDD7F2B Next payload: Hash (8) Version: 1.0 Exchange type: Informational (5) Flags: 0x01 .... ...1 = Encrypted .... ..0. = No commit .... .0.. = No authentication Message ID: 0x8cef22c1 Length: 124 Encrypted payload (96 bytes) No. Time Source Destination Protocol Info Ethernet II, Src: (), Dst: () Internet Protocol, Src: (), Dst: 192.168.1.236 (192.168.1.236) User Datagram Protocol, Src Port: isakmp (500), Dst Port: sg-lm (1659) Source port: isakmp (500) Destination port: sg-lm (1659) Length: 748 Checksum: 0x0000 (none) Good Checksum: False Bad Checksum: False Internet Security Association and Key Management Protocol Initiator cookie: FBC769FEED7FA8F0 Responder cookie: 983CAFC2DCDD7F2B Next payload: Hash (8) Version: 1.0 Exchange type: Informational (5) Flags: 0x01 .... ...1 = Encrypted .... ..0. = No commit .... .0.. = No authentication Message ID: 0xb513fedf Length: 740 Encrypted payload (712 bytes) No. Time Source Destination Protocol Info Ethernet II, Src: (), Dst: () Internet Protocol, Src: 192.168.1.236 (192.168.1.236), Dst: () User Datagram Protocol, Src Port: sg-lm (1659), Dst Port: isakmp (500) Source port: sg-lm (1659) Destination port: isakmp (500) Length: 1668 Checksum: 0x3bcf [correct] [Good Checksum: True] [Bad Checksum: False] Internet Security Association and Key Management Protocol Initiator cookie: FBC769FEED7FA8F0 Responder cookie: 983CAFC2DCDD7F2B Next payload: Hash (8) Version: 1.0 Exchange type: Quick Mode (32) Flags: 0x01 .... ...1 = Encrypted .... ..0. = No commit .... .0.. = No authentication Message ID: 0x20ccb4d6 Length: 1660 Encrypted payload (1632 bytes) No. Time Source Destination Protocol Info Ethernet II, Src: (), Dst: () Internet Protocol, Src: (), Dst: 192.168.1.236 (192.168.1.236) User Datagram Protocol, Src Port: isakmp (500), Dst Port: sg-lm (1659) Source port: isakmp (500) Destination port: sg-lm (1659) Length: 188 Checksum: 0x0000 (none) Good Checksum: False Bad Checksum: False Internet Security Association and Key Management Protocol Initiator cookie: FBC769FEED7FA8F0 Responder cookie: 983CAFC2DCDD7F2B Next payload: Hash (8) Version: 1.0 Exchange type: Quick Mode (32) Flags: 0x01 .... ...1 = Encrypted .... ..0. = No commit .... .0.. = No authentication Message ID: 0x20ccb4d6 Length: 180 Encrypted payload (152 bytes) No. Time Source Destination Protocol Info 17 20.874288 192.168.1.236 ISAKMP Quick Mode Ethernet II, Src: (), Dst: () Internet Protocol, Src: 192.168.1.236 (192.168.1.236), Dst: () User Datagram Protocol, Src Port: sg-lm (1659), Dst Port: isakmp (500) Source port: sg-lm (1659) Destination port: isakmp (500) Length: 60 Checksum: 0x6c2b [correct] [Good Checksum: True] [Bad Checksum: False] Internet Security Association and Key Management Protocol Initiator cookie: FBC769FEED7FA8F0 Responder cookie: 983CAFC2DCDD7F2B Next payload: Hash (8) Version: 1.0 Exchange type: Quick Mode (32) Flags: 0x01 .... ...1 = Encrypted .... ..0. = No commit .... .0.. = No authentication Message ID: 0x20ccb4d6 Length: 52 Encrypted payload (24 bytes) No. Time Source Destination Protocol Info 18 20.975815 192.168.1.236 ISAKMP Informational Ethernet II, Src: (), Dst: () Internet Protocol, Src: (), Dst: 192.168.1.236 (192.168.1.236) User Datagram Protocol, Src Port: isakmp (500), Dst Port: sg-lm (1659) Source port: isakmp (500) Destination port: sg-lm (1659) Length: 92 Checksum: 0x0000 (none) Good Checksum: False Bad Checksum: False Internet Security Association and Key Management Protocol Initiator cookie: FBC769FEED7FA8F0 Responder cookie: 983CAFC2DCDD7F2B Next payload: Hash (8) Version: 1.0 Exchange type: Informational (5) Flags: 0x01 .... ...1 = Encrypted .... ..0. = No commit .... .0.. = No authentication Message ID: 0xd1e996e7 Length: 84 Encrypted payload (56 bytes) No. Time Source Destination Protocol Info 21 21.535865 Broadcast ARP Gratuitous ARP for (Request) Ethernet II, Src: (), Dst: Broadcast (ff:ff:ff:ff:ff:ff) Address Resolution Protocol (request/gratuitous ARP) Hardware type: Ethernet (0x0001) Protocol type: IP (0x0800) Hardware size: 6 Protocol size: 4 Opcode: request (0x0001) Sender MAC address: () Sender IP address: () Target MAC address: 00:00:00_00:00:00 (00:00:00:00:00:00) Target IP address: () No. Time Source Destination Protocol Info 28 22.420799 Broadcast ARP Gratuitous ARP for (Request) tring: arp] Ethernet II, Src: (), Dst: Broadcast (ff:ff:ff:ff:ff:ff) Address Resolution Protocol (request/gratuitous ARP) Hardware type: Ethernet (0x0001) Protocol type: IP (0x0800) Hardware size: 6 Protocol size: 4 Opcode: request (0x0001) Sender MAC address: () Sender IP address: () Target MAC address: 00:00:00_00:00:00 (00:00:00:00:00:00) Target IP address: () No. Time Source Destination Protocol Info 31 23.420795 Broadcast ARP Gratuitous ARP for (Request) Ethernet II, Src: (), Dst: Broadcast (ff:ff:ff:ff:ff:ff) Address Resolution Protocol (request/gratuitous ARP) Hardware type: Ethernet (0x0001) Protocol type: IP (0x0800) Hardware size: 6 Protocol size: 4 Opcode: request (0x0001) Sender MAC address: () Sender IP address: () Target MAC address: 00:00:00_00:00:00 (00:00:00:00:00:00) Target IP address: () No. Time Source Destination Protocol Info 37 27.431043 Broadcast ARP Who has ? Tell 192.168.1.236 Ethernet II, Src: (), Dst: Broadcast (ff:ff:ff:ff:ff:ff) Address Resolution Protocol (request) Hardware type: Ethernet (0x0001) Protocol type: IP (0x0800) Hardware size: 6 Protocol size: 4 Opcode: request (0x0001) Sender MAC address: () Sender IP address: 192.168.1.236 (192.168.1.236) Target MAC address: 00:00:00_00:00:00 (00:00:00:00:00:00) Target IP address: () No. Time Source Destination Protocol Info 38 27.431083 ARP is at Ethernet II, Src: (), Dst: () Address Resolution Protocol (reply) Hardware type: Ethernet (0x0001) Protocol type: IP (0x0800) Hardware size: 6 Protocol size: 4 Opcode: reply (0x0002) Sender MAC address: () Sender IP address: () Target MAC address: () Target IP address: 192.168.1.236 (192.168.1.236) No. Time Source Destination Protocol Info 39 27.431095 ICMP Echo (ping) request Ethernet II, Src: (), Dst: () Internet Protocol, Src: (), Dst: () Internet Control Message Protocol Type: 8 (Echo (ping) request) Code: 0 () Checksum: 0x485c [correct] Identifier: 0x0400 Sequence number: 256 (0x0100) Data (32 bytes) No. Time Source Destination Protocol Info 42 27.939265 ICMP Echo (ping) reply Ethernet II, Src: (), Dst: () Internet Protocol, Src: (), Dst: () Internet Control Message Protocol Type: 0 (Echo (ping) reply) Code: 0 () Checksum: 0x505c [correct] Identifier: 0x0400 Sequence number: 256 (0x0100) Data (32 bytes) No. Time Source Destination Protocol Info Ethernet II, Src: (), Dst: () Internet Protocol, Src: (), Dst: () Internet Control Message Protocol Type: 8 (Echo (ping) request) Code: 0 () Checksum: 0x475c [correct] Identifier: 0x0400 Sequence number: 512 (0x0200) Data (32 bytes) No. Time Source Destination Protocol Info 44 28.860815 ICMP Echo (ping) reply Ethernet II, Src: (), Dst: () Internet Protocol, Src: (), Dst: () Internet Control Message Protocol Type: 0 (Echo (ping) reply) Code: 0 () Checksum: 0x4f5c [correct] Identifier: 0x0400 Sequence number: 512 (0x0200) Data (32 bytes)