Monitor unlimited number of servers
Filter log events
Create email and web-based reports

Direct access to Microsoft articles
Customized keywords for major search engines
Access to premium content

Event ID: 546 Source: Security

IKE security association establishment failed because peer sent invalid proposal.
Mode: Key Exchange Mode (Main Mode)

Source IP Address <ip>
Source IP Address Mask <ip>
Destination IP Address <ip>
Destination IP Address Mask <ip>
Protocol 0
Source Port 0
Destination Port 0

Attribute: Authentication Method
Expected value: RSA Signature with Certificates
Received value: Kerberos (GSSAPI).
This error occurred because it was impossible to agree on the security attributes necessary for protecting the traffic. The Attribute value shows which attribute was under contention. The Expected value shows what was expected, and the Received value shows what value the peer sent. See the link to "MonitorWare Event Reference" for additional information on this event.

Windows Event Log Analysis Splunk App

Build a great reporting interface using Splunk, one of the leaders in the Security Information and Event Management (SIEM) field, linking the collected Windows events to



Cisco ASA Log Analyzer Splunk App

Obtain enhanced visibility into Cisco ASA firewall logs using the free Firegen for Cisco ASA Splunk App. Take advantage of dashboards built to optimize the threat analysis process.