I have the following information with "ikesnoop -on -verbose"
2010-05-31 10:04:30: IkeSnoop: Sending IKE packet to 213.30.4.50:4500
Exchange type : Quick mode
ISAKMP Version : 1.0
Flags : E (encryption)
Cookies : 0x703b3556a5a8f86c -> 0x3d34a9b55dca2de6
Message ID : 0x72dc8b3e
Packet length : 284 bytes
# payloads : 5
Payloads:
HASH (Hash)
Payload data length : 16 bytes
SA (Security Association)
Payload data length : 180 bytes
DOI : 1 (IPsec DOI)
Proposal 1/1
Protocol 1/1
Protocol ID : ESP
SPI Size : 4
SPI Value : 0xd9e14b63
Transform 1/6
Transform ID : Rijndael (aes)
Key length : 128
Authentication algorithm : HMAC-MD5
SA life type : Seconds
SA life duration : 3600
Encapsulation mode : UDP Tunnel
Transform 2/6
Transform ID : Rijndael (aes)
Key length : 128
Authentication algorithm : HMAC-SHA-1
SA life type : Seconds
SA life duration : 3600
Encapsulation mode : UDP Tunnel
Transform 3/6
Transform ID : 3DES
Authentication algorithm : HMAC-MD5
SA life type : Seconds
SA life duration : 3600
Encapsulation mode : UDP Tunnel
Transform 4/6
Transform ID : 3DES
Authentication algorithm : HMAC-SHA-1
SA life type : Seconds
SA life duration : 3600
Encapsulation mode : UDP Tunnel
Transform 5/6
Transform ID : Blowfish
Key length : 128
Authentication algorithm : HMAC-MD5
SA life type : Seconds
SA life duration : 3600
Encapsulation mode : UDP Tunnel
Transform 6/6
Transform ID : Blowfish
Key length : 128
Authentication algorithm : HMAC-SHA-1
SA life type : Seconds
SA life duration : 3600
Encapsulation mode : UDP Tunnel
NONCE (Nonce)
Payload data length : 16 bytes
ID (Identification)
Payload data length : 12 bytes
ID : ipv4_subnet(any:0,[0..7]=100.0.0.0/24)
ID (Identification)
Payload data length : 12 bytes
ID : ipv4_subnet(any:0,[0..7]=10.0.0.0/20)
2010-05-31 10:04:30: IkeSnoop: Received IKE packet from 213.30.4.50:4500
Exchange type : Informational
ISAKMP Version : 1.0
Flags : E (encryption)
Cookies : 0x703b3556a5a8f86c -> 0x3d34a9b55dca2de6
Message ID : 0x75c20886
Packet length : 84 bytes
# payloads : 2
Payloads:
HASH (Hash)
Payload data length : 16 bytes
N (Notification)
Payload data length : 32 bytes
Protocol ID : ISAKMP
Notification : Responder lifetime
2010-05-31 10:04:30: IkeSnoop: Received IKE packet from 213.30.4.50:4500
Exchange type : Informational
ISAKMP Version : 1.0
Flags : E (encryption)
Cookies : 0x703b3556a5a8f86c -> 0x3d34a9b55dca2de6
Message ID : 0xf1fb25a1
Packet length : 76 bytes
# payloads : 2
Payloads:
HASH (Hash)
Payload data length : 16 bytes
D (Delete)
Payload data length : 24 bytes
Protocol ID : ISAKMP
Delete SPIs : 0x703b3556a5a8f86c3d34a9b55dca2de6